<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://radar.offseq.com/</loc>
    <changefreq>hourly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats</loc>
    <changefreq>hourly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/map</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/feeds</loc>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?type=vulnerability</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?severity=critical</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?type=malware</loc>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40494-cwe-787-out-of-bounds-write-in-happ-d7181ae5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40494%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40493-cwe-787-out-of-bounds-write-in-happ-da0d28a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40493%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40492-cwe-787-out-of-bounds-write-in-happ-780830ff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40492%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40491-cwe-22-improper-limitation-of-a-pat-8fb3f370</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40491%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wkentaro%20gdown&amp;severity=medium&amp;id=69e2ee8ebdfbbecc59cda5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40490-cwe-200-exposure-of-sensitive-infor-4c645570</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40490%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AsyncHttpClient%20async-http-client&amp;severity=medium&amp;id=69e2e080bdfbbecc59c723b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1559-cwe-79-improper-neutralization-of-in-ac5deafd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69e2e080bdfbbecc59c72393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1838-cwe-79-improper-neutralization-of-in-b0d19334</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasunsen%20Hostel&amp;severity=medium&amp;id=69e2e080bdfbbecc59c7239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40489-cwe-121-stack-based-buffer-overflow-63bc89f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40489%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20editorconfig%20editorconfig-core-c&amp;severity=high&amp;id=69e2e080bdfbbecc59c723af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40487-cwe-79-improper-neutralization-of-i-d95bc08f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40487%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69e2e080bdfbbecc59c723ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35582-cwe-78-improper-neutralization-of-s-8a32499e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35582%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=high&amp;id=69e2e080bdfbbecc59c723a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35465-cwe-73-external-control-of-file-nam-276a142e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35465%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20freedomofpress%20securedrop-client&amp;severity=high&amp;id=69e2d977bdfbbecc59bbf816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40572-cwe-269-improper-privilege-manageme-6ff979fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40572%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20MinecAnton209%20NovumOS&amp;severity=critical&amp;id=69e2d977bdfbbecc59bbf825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40317-cwe-269-improper-privilege-manageme-d4098dd0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40317%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20MinecAnton209%20NovumOS&amp;severity=critical&amp;id=69e2d977bdfbbecc59bbf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40350-cwe-863-incorrect-authorization-in--410a207f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40350%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20leepeuker%20movary&amp;severity=high&amp;id=69e2d977bdfbbecc59bbf81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40485-cwe-307-improper-restriction-of-exc-cf6d1aaa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40485%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40336-cwe-401-missing-release-of-memory-a-a2494142</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40336%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e2c47fbdfbbecc59a12f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2262-cwe-200-exposure-of-sensitive-inform-bf4d032f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2262%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20easyappointments%20Easy%20Appointments&amp;severity=high&amp;id=69e2c47fbdfbbecc59a12f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40484-cwe-269-improper-privilege-manageme-9bb4be14</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40484%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69e2c47fbdfbbecc59a12f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40483-cwe-79-improper-neutralization-of-i-cb8800e1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40335-cwe-125-out-of-bounds-read-in-gphot-7d4c84a2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40335%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40334-cwe-170-improper-null-termination-i-ecdcb16f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40334%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e2c0dabdfbbecc599fc050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40582-cwe-288-authentication-bypass-using-58dc9576</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40582%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69e2c0dabdfbbecc599fc05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40333-cwe-125-out-of-bounds-read-in-gphot-d0b9db38</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40333%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e2c0dabdfbbecc599fc04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40480-cwe-639-authorization-bypass-throug-7ebb7a44</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40480%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40324-cwe-674-uncontrolled-recursion-in-c-0796aaf1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40324%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20ChilliCream%20graphql-platform&amp;severity=critical&amp;id=69e2c0dabdfbbecc599fc03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40482-cwe-89-improper-neutralization-of-s-efd3f903</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40482%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40323-cwe-345-insufficient-verification-o-ab02000f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40323%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20succinctlabs%20sp1&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40476-cwe-407-inefficient-algorithmic-com-930c0f33</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40476%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20webonyx%20graphql-php&amp;severity=medium&amp;id=69e2af46bdfbbecc59986553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5720-cwe-191-integer-underflow-wrap-or-wr-5076503c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5720%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20miniupnp%20project%20miniupnpd&amp;severity=high&amp;id=69e2abc2bdfbbecc5996b9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40474-cwe-284-improper-access-control-in--3a8ced96</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40474%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wger-project%20wger&amp;severity=high&amp;id=69e2abc2bdfbbecc5996b9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40353-cwe-79-improper-neutralization-of-i-32ce955d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40353%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wger-project%20wger&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40258-cwe-22-improper-limitation-of-a-pat-00f841f8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40258%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gramps-project%20gramps-web-api&amp;severity=critical&amp;id=69e2a83ebdfbbecc5994f12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40321-cwe-87-improper-neutralization-of-a-2d570284</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40321%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=69e2a83ebdfbbecc5994f140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40352-cwe-943-improper-neutralization-of--85ada05a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40352%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20labring%20FastGPT&amp;severity=high&amp;id=69e2a83ebdfbbecc5994f149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40306-cwe-330-use-of-insufficiently-rando-0a094187</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40306%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40305-cwe-285-improper-authorization-in-d-259f7178</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40305%3A%20CWE-285%3A%20Improper%20Authorization%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40351-cwe-943-improper-neutralization-of--9a2571c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40351%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69e2a83ebdfbbecc5994f144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40304-cwe-284-improper-access-control-in--69c6782f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40304%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20openziti%20zrok&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40303-cwe-400-uncontrolled-resource-consu-a3ee6743</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40303%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20openziti%20zrok&amp;severity=high&amp;id=69e2a136bdfbbecc5990836b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40196-cwe-708-incorrect-ownership-assignm-e4b4344c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40196%3A%20CWE-708%3A%20Incorrect%20Ownership%20Assignment%20in%20sysadminsmedia%20homebox&amp;severity=high&amp;id=69e2a136bdfbbecc59908358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40302-cwe-79-improper-neutralization-of-i-859f7360</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40302%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openziti%20zrok&amp;severity=medium&amp;id=69e2a136bdfbbecc59908367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40155-cwe-863-incorrect-authorization-in--178dd218</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40155%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=69e2a136bdfbbecc59908353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40301-cwe-79-improper-neutralization-of-i-bf3bd796</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40301%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rhukster%20dom-sanitizer&amp;severity=medium&amp;id=69e2a136bdfbbecc59908362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40299-cwe-601-url-redirection-to-untruste-c7560376</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40299%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20amannn%20next-intl&amp;severity=medium&amp;id=69e2a136bdfbbecc5990835c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35603-cwe-426-untrusted-search-path-in-an-d7db04c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35603%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20anthropics%20claude-code&amp;severity=medium&amp;id=69e29db8bdfbbecc598ee1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35402-cwe-284-improper-access-control-in--3725f4c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35402%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20neo4j-contrib%20mcp-neo4j&amp;severity=low&amp;id=69e29db8bdfbbecc598ee1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33436-cwe-20-improper-input-validation-in-995166fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33436%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=low&amp;id=69e29db8bdfbbecc598ee1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40286-cwe-79-improper-neutralization-of-i-b05f9ace</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40286%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40285-cwe-89-improper-neutralization-of-s-36595b32</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40285%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40527-cwe-78-improper-neutralization-of-s-8835a9bd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40527%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40284-cwe-79-improper-neutralization-of-i-a78ebb3c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40284%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29db8bdfbbecc598ee1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35512-cwe-122-heap-based-buffer-overflow--c91ef269</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35512%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29a32bdfbbecc598cc5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40282-cwe-79-improper-neutralization-of-i-a407d8de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40282%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29a32bdfbbecc598cc5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33689-cwe-125-out-of-bounds-read-in-neutr-038fd12f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33689%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29a32bdfbbecc598cc5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33145-cwe-78-improper-neutralization-of-s-356aab43</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33145%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=69e29a32bdfbbecc598cc5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40283-cwe-79-improper-neutralization-of-i-881385d3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40283%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29327bdfbbecc59895032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32624-cwe-122-heap-based-buffer-overflow--cb3226cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32624%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=69e29327bdfbbecc5989501f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33516-cwe-125-out-of-bounds-read-in-neutr-043d919d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33516%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29327bdfbbecc59895028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32650-cwe-757-in-anviz-anviz-crosschex-st-9f992419</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32650%3A%20CWE-757%20in%20Anviz%20Anviz%20CrossChex%20Standard&amp;severity=high&amp;id=69e29327bdfbbecc59895023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40434-cwe-940-in-anviz-anviz-crosschex-st-bb1f864a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40434%3A%20CWE-940%20in%20Anviz%20Anviz%20CrossChex%20Standard&amp;severity=high&amp;id=69e29327bdfbbecc59895035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35682-cwe-77-in-anviz-anviz-cx2-lite-firm-73192145</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35682%3A%20CWE-77%20in%20Anviz%20Anviz%20CX2%20Lite%20Firmware&amp;severity=high&amp;id=69e29327bdfbbecc5989502c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32623-cwe-122-heap-based-buffer-overflow--e8ed9695</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32623%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29327bdfbbecc5989501b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40066-cwe-494-in-anviz-anviz-cx7-firmware-8338be60</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40066%3A%20CWE-494%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa4bdfbbecc59867cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35546-cwe-306-in-anviz-anviz-cx7-firmware-147e04a2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35546%3A%20CWE-306%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=critical&amp;id=69e28fa4bdfbbecc59867cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40461-cwe-306-in-anviz-anviz-cx7-firmware-c1966de7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40461%3A%20CWE-306%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa7bdfbbecc59867d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32648-cwe-862-in-anviz-anviz-cx7-firmware-aaa03fdc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32648%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33569-cwe-319-in-anviz-anviz-cx7-firmware-b7940a80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33569%3A%20CWE-319%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32105-cwe-354-improper-validation-of-inte-71bf3dd4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32105%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20neutrinolabs%20xrdp&amp;severity=critical&amp;id=69e28fa3bdfbbecc59867c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32107-cwe-273-improper-check-for-dropped--30bf230c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32107%3A%20CWE-273%3A%20Improper%20Check%20for%20Dropped%20Privileges%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e28fa3bdfbbecc59867c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31927-cwe-23-in-anviz-anviz-cx7-firmware-64eea7cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31927%3A%20CWE-23%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40342-cwe-22-improper-limitation-of-a-pat-aa1db711</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40342%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FirebirdSQL%20firebird&amp;severity=critical&amp;id=69e28fa4bdfbbecc59867cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32324-cwe-321-use-of-hard-coded-cryptogra-6037edd2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32324%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa3bdfbbecc59867ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35061-cwe-862-in-anviz-anviz-cx7-firmware-3ac096cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35061%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33093-cwe-862-in-anviz-anviz-cx7-firmware-d552bc73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33093%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e2889bbdfbbecc59818af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35215-cwe-369-divide-by-zero-in-firebirds-3a7b530a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35215%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e2889bbdfbbecc59818afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34232-cwe-228-improper-handling-of-syntac-b5b28669</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34232%3A%20CWE-228%3A%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e2889bbdfbbecc59818af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33337-cwe-120-buffer-copy-without-checkin-5abedb12</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33337%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e28194bdfbbecc597b95dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6437-cwe-88-improper-neutralization-of-ar-9d56e73b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6437%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Amazon%20AWS%20EFS%20CSI%20Driver&amp;severity=medium&amp;id=69e28194bdfbbecc597b95e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28224-cwe-476-null-pointer-dereference-in-bc196dc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28224%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e28194bdfbbecc597b95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28214-cwe-190-integer-overflow-or-wraparo-2b0bca7e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28214%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20FirebirdSQL%20firebird&amp;severity=medium&amp;id=69e28194bdfbbecc597b95d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40525-cwe-636-not-failing-securely-fail-o-ce5e8d5f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40525%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Fail%20Open&apos;)%20in%20volcengine%20OpenViking&amp;severity=critical&amp;id=69e27e0fbdfbbecc5978c959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27890-cwe-119-improper-restriction-of-ope-87051bc6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27890%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28212-cwe-476-null-pointer-dereference-in-d3281e4a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28212%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65104-cwe-200-exposure-of-sensitive-infor-818cb5d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65104%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5718-cwe-434-unrestricted-upload-of-file--1133bfad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5718%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69e273aebdfbbecc5970e963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5710-cwe-22-improper-limitation-of-a-path-1345068b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5710%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69e273aebdfbbecc5970e95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40320-cwe-1336-improper-neutralization-of-7c3e97b3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40320%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Giskard-AI%20giskard-oss&amp;severity=medium&amp;id=69e273aebdfbbecc5970e958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40319-cwe-1333-inefficient-regular-expres-c4bed657</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40319%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Giskard-AI%20giskard-oss&amp;severity=low&amp;id=69e26ffebdfbbecc596e17be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40518-cwe-22-improper-limitation-of-a-pat-95c4c5a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bytedance%20deer-flow&amp;severity=high&amp;id=69e26909bdfbbecc5968fd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3464-cwe-22-improper-limitation-of-a-path-16d32bc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3464%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aguilatechnologies%20WP%20Customer%20Area&amp;severity=high&amp;id=69e28194bdfbbecc597b95e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21733-cwe-280-improper-handling-of-insuff-ad2adca4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21733%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40516-cwe-918-server-side-request-forgery-74d5147e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40516%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40515-cwe-863-incorrect-authorization-in--67f24981</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40515%3A%20CWE-863%20Incorrect%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21709-cwe-77-command-injection-generic-in-3efaa943</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21709%3A%20CWE-77%20Command%20Injection%20-%20Generic%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=69e253e3bdfbbecc593fb259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6497-server-side-request-forgery-in-prasa-47b23fe1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6497%3A%20Server-Side%20Request%20Forgery%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=69e253e3bdfbbecc593fb262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6284-cwe-521-in-horner-automation-cscape-17ab7886</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6284%3A%20CWE-521%20in%20Horner%20Automation%20Cscape&amp;severity=critical&amp;id=69e253e3bdfbbecc593fb25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cochat-launches-ai-collaboration-platform-to-comba-be9f2b7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoChat%20Launches%20AI%20Collaboration%20Platform%20to%20Combat%20Shadow%20AI&amp;severity=medium&amp;id=69e24cd8bdfbbecc5936df5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6496-path-traversal-in-prasathmani-tinyfi-efd352ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6496%3A%20Path%20Traversal%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41153-cwe-77-in-jetbrains-junie-621e3a60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41153%3A%20CWE-77%20in%20JetBrains%20Junie&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6493-cross-site-scripting-in-lukevella-ra-55aea1e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6493%3A%20Cross%20Site%20Scripting%20in%20lukevella%20rallly&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6492-information-disclosure-in-arnobt78-h-8be294ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6492%3A%20Information%20Disclosure%20in%20arnobt78%20Hotel%20Booking%20Management%20System&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6491-heap-based-buffer-overflow-in-libvip-10e77d09</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6491%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6490-sql-injection-in-querymine-sms-bc581eac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6490%3A%20SQL%20Injection%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leverage-leaked-government-intelligence-to-b4f7d6c6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20leverage%20leaked%20government%20intelligence%20tools%20to%20target%20everyday%20iOS%20users%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69e232d082d89c981ff8363c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6489-unrestricted-upload-in-querymine-sms-e4c4a996</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6489%3A%20Unrestricted%20Upload%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e232c582d89c981ff828a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6488-sql-injection-in-querymine-sms-fe0ba541</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6488%3A%20SQL%20Injection%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e232c582d89c981ff828a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6487-path-traversal-in-qihui-jtbc5-cms-3548fc5d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6487%3A%20Path%20Traversal%20in%20Qihui%20jtbc5%20CMS&amp;severity=medium&amp;id=69e22bbf82d89c981ff3d63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6507-out-of-bounds-write-in-red-hat-red-h-280b3ba7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6507%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69e22bbf82d89c981ff3d640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6486-cross-site-scripting-in-classroomboo-de02e171</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6486%3A%20Cross%20Site%20Scripting%20in%20classroombookings&amp;severity=medium&amp;id=69e22bbf82d89c981ff3d630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-satellite-cybersecurity-act-90k-chro-613e8ad0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Satellite%20Cybersecurity%20Act%2C%20%2490K%20Chrome%20Flaw%2C%20Teen%20Hacker%20Arrested&amp;severity=medium&amp;id=69e2213282d89c981fe4aa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23777-cwe-200-exposure-of-sensitive-infor-cd82fbb5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23777%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28263-cwe-79-improper-neutralization-of-i-1acafaea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28263%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46606-cwe-307-improper-restriction-of-exc-307f50dc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46606%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46605-cwe-384-session-fixation-in-dell-po-5b99807b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46605%3A%20CWE-384%3A%20Session%20Fixation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb2544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46641-cwe-287-improper-authentication-in--c16ae6fc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46641%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb254a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46607-cwe-287-improper-authentication-in--00ff1038</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46607%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb2547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35073-cwe-78-improper-neutralization-of-s-c1ee811f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35073%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35074-cwe-78-improper-neutralization-of-s-c4f8a7e5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35074%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35072-cwe-78-improper-neutralization-of-s-8793ed88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35072%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5131-cwe-918-server-side-request-forgery--eefe7b1a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5131%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Nomios%20Poland%20GREENmod&amp;severity=medium&amp;id=69e216a682d89c981fce584a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-draftkings-hacker-sentenced-to-prison-6dbd7bd3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20DraftKings%20Hacker%20Sentenced%20to%20Prison&amp;severity=medium&amp;id=69e20f9d82d89c981fc9fc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35153-cwe-88-improper-neutralization-of-a-7210f906</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35153%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e20fa682d89c981fca00e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6483-os-command-injection-in-wavlink-wl-w-2cff4fef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6483%3A%20OS%20Command%20Injection%20in%20Wavlink%20WL-WN530H4&amp;severity=high&amp;id=69e20fa682d89c981fca00eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lawmakers-gathered-quietly-to-talk-about-ai-angst--ccf87bec</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lawmakers%20Gathered%20Quietly%20to%20Talk%20About%20AI.%20Angst%20and%20Fears%20of%20%E2%80%98Destruction%E2%80%99%20Followed&amp;severity=low&amp;id=69e2089582d89c981fc3e568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-apache-activemq-vulnerability-exploited-in--98176e07</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Apache%20ActiveMQ%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69e2051182d89c981fbef2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/direct-sys-loader-and-cgrabber-stealer-five-stage--50867bbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Direct-Sys%20Loader%20and%20CGrabber%20Stealer%20Five-Stage%20Malware%20Chain&amp;severity=medium&amp;id=69e20c1982d89c981fc7230c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-north-korean-it-worker-scheme-facilitators-jai-6bb45449</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20North%20Korean%20IT%20Worker%20Scheme%20Facilitators%20Jailed%20in%20the%20US&amp;severity=medium&amp;id=69e1fe0982d89c981fb5bea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23779-cwe-77-improper-neutralization-of-s-9bc42051</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23779%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2142082d89c981fcd7c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23776-cwe-295-improper-certificate-valida-1a2a1c1a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23776%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e2142082d89c981fcd7c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15625-cwe-89-improper-neutralization-of-s-bf191582</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15625%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15624-cwe-256-plaintext-storage-of-a-pass-907ae5f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15624%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-macos-intrusion-from-lure-to-compromise-3c857763</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20macOS%20intrusion%20from%20lure%20to%20compromise&amp;severity=medium&amp;id=69e20c1982d89c981fc722f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15623-cwe-359-exposure-of-private-persona-24f01d16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15623%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/takes-aim-at-the-ransomware-throne-f043d8a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Takes%20Aim%20at%20the%20Ransomware%20Throne&amp;severity=medium&amp;id=69e216a482d89c981fce57d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/joomla-seo-spam-injector-obfuscated-php-backdoor-h-3d3ff1e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Joomla%20SEO%20Spam%20Injector%3A%20Obfuscated%20PHP%20Backdoor%20Hijacking%20Site%20Visitors&amp;severity=medium&amp;id=69e20c1982d89c981fc722ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15622-cwe-522-insufficiently-protected-cr-996dbedb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15622%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Enterprise%20Architect&amp;severity=medium&amp;id=69e1f70182d89c981fb0d486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23778-cwe-77-improper-neutralization-of-s-56720612</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23778%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e1f70182d89c981fb0d498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zionsiphon-malware-targets-ics-in-water-facilities-233fe40a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZionSiphon%20Malware%20Targets%20ICS%20in%20Water%20Facilities&amp;severity=medium&amp;id=69e1eff982d89c981faac8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6439-cwe-79-improper-neutralization-of-in-d245a58b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jconti%20VideoZen&amp;severity=medium&amp;id=69e1f70182d89c981fb0d49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23775-cwe-532-insertion-of-sensitive-info-d2230f77</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23775%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerProtect%20Data%20Domain%20appliances&amp;severity=high&amp;id=69e1f70182d89c981fb0d495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6494-improper-output-neutralization-for-l-4b481af2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6494%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=69e1f70182d89c981fb0d4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36568-cwe-522-insufficiently-protected-cr-2289d391</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36568%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Dell%20PowerProtect%20Data%20Domain%20BoostFS&amp;severity=high&amp;id=69e1f70182d89c981fb0d492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33392-cwe-1336-in-jetbrains-youtrack-3a31f8ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33392%3A%20CWE-1336%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=69e1ec7982d89c981fa85cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6451-cwe-352-cross-site-request-forgery-c-12074053</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6451%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tholstkabelbwde%20Plugin%3A%20CMS%20f%C3%BCr%20Motorrad%20Werkst%C3%A4tten&amp;severity=medium&amp;id=69e1ec7982d89c981fa85cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40002-cwe-269-improper-privilege-manageme-d0b7c01c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40002%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ZTE%20Red%20Magic%2011%20Pro%20(NX809J)&amp;severity=medium&amp;id=69e1ec7982d89c981fa85cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-ai-vulnerability-exposed-developer-devices-fd612bab</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%20AI%20Vulnerability%20Exposed%20Developer%20Devices&amp;severity=medium&amp;id=69e1e1ea82d89c981fa15800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23853-cwe-1391-use-of-weak-credentials-in-0ee220b0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23853%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e1e1f282d89c981fa18deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6441-cwe-862-missing-authorization-in-fli-d2f596ab</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6441%3A%20CWE-862%20Missing%20Authorization%20in%20flightbycanto%20Canto&amp;severity=medium&amp;id=69e1dae182d89c981f9ddccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4659-cwe-22-improper-limitation-of-a-path-b8b0c25b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4659%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=high&amp;id=69e1dae182d89c981f9ddcbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6443-cwe-506-embedded-malicious-code-in-e-b2b69859</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6443%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20essentialplugin%20Accordion%20and%20Accordion%20Slider&amp;severity=critical&amp;id=69e1dae182d89c981f9ddcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/53-ddos-domains-taken-down-by-law-enforcement-27effe64</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=53%20DDoS%20Domains%20Taken%20Down%20by%20Law%20Enforcement&amp;severity=medium&amp;id=69e1d75d82d89c981f9c927a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6421-uncontrolled-search-path-in-mobatek--798d08a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6421%3A%20Uncontrolled%20Search%20Path%20in%20Mobatek%20MobaXterm%20Home%20Edition&amp;severity=high&amp;id=69e1d07582d89c981f98f522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5797-cwe-74-improper-neutralization-of-sp-6841ef43</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5797%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=69e1d07582d89c981f98f516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6482-cwe-829-inclusion-of-functionality-f-9df924df</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6482%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20Rapid7%20Insight%20Agent&amp;severity=high&amp;id=69e1d07582d89c981f98f52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35496-improper-limitation-of-a-pathname-t-248f1cf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35496%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=low&amp;id=69e1c5c782d89c981f8f173b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34018-improper-neutralization-of-special--6f9210ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34018%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=medium&amp;id=69e1c5c782d89c981f8f1737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21719-improper-neutralization-of-special--543f1327</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21719%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=high&amp;id=69e1c5c782d89c981f8f1733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5502-cwe-862-missing-authorization-in-the-6f6eb17c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5502%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5427-cwe-862-missing-authorization-in-ext-b61f377a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5427%3A%20CWE-862%20Missing%20Authorization%20in%20extendthemes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5234-cwe-639-authorization-bypass-through-f0db2f8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5234%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6080-cwe-89-improper-neutralization-of-sp-ec35d5cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6080%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3330-cwe-89-improper-neutralization-of-sp-fc732859</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3330%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4853-cwe-22-improper-limitation-of-a-path-b235121a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4853%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20backupguard%20JetBackup%20%E2%80%93%20Backup%2C%20Restore%20%26%20Migrate&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5807-cwe-770-allocation-of-resources-with-1203bc9f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5807%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e1b7b882d89c981f6ce769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4525-cwe-201-insertion-of-sensitive-infor-f43b0959</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4525%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e2142082d89c981fcd7c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5052-cwe-918-server-side-request-forgery--f41ab259</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5052%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=69e2142082d89c981fcd7c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3605-cwe-288-authentication-bypass-using--3597885d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3605%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e2142082d89c981fcd7c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4666-cwe-862-missing-authorization-in-tom-a89a54e6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4666%3A%20CWE-862%20Missing%20Authorization%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=69e2142082d89c981fcd7c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-april-17th-2026-httpsiscs-6ec453ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20April%2017th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9896%2C%20(Fri%2C%20Apr%2017th)&amp;severity=medium&amp;id=69e1948f82d89c981f187ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3488-cwe-862-missing-authorization-in-ver-4c95e6b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3488%3A%20CWE-862%20Missing%20Authorization%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=medium&amp;id=69e2142082d89c981fcd7c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5231-cwe-79-improper-neutralization-of-in-a4f49703</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=high&amp;id=69e2142082d89c981fcd7c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4817-cwe-89-improper-neutralization-of-sp-15c87136</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4817%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=69e2142082d89c981fcd7c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5162-cwe-79-improper-neutralization-of-in-2911a812</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5162%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69e2142082d89c981fcd7c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-infection-with-sectop-rat-arechclien-841ddb7c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20infection%20with%20Sectop%20RAT%20(ArechClient2)%2C%20(Fri%2C%20Apr%2017th)&amp;severity=medium&amp;id=69e228ca82d89c981fea5e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-17-13b60f86</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-17&amp;severity=medium&amp;id=69e2cb5dbdfbbecc59a38896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37749-na-c4c6e5dc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37749%3A%20n%2Fa&amp;severity=critical&amp;id=69e24cdfbdfbbecc5936e931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31317-na-298e2b28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31317%3A%20n%2Fa&amp;severity=null&amp;id=69e2424ebdfbbecc592bf51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70795-na-3b058274</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70795%3A%20n%2Fa&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-17-3b7ad22d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-17&amp;severity=low&amp;id=69e189fb82d89c981f03051b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40265-cwe-862-missing-authorization-in-en-645b045f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40265%3A%20CWE-862%3A%20Missing%20Authorization%20in%20enchant97%20note-mark&amp;severity=medium&amp;id=69e1786e82d89c981fe335c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40263-cwe-208-observable-timing-discrepan-cfedb65e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40263%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20enchant97%20note-mark&amp;severity=low&amp;id=69e1786e82d89c981fe335c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40262-cwe-79-improper-neutralization-of-i-795a0901</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40262%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enchant97%20note-mark&amp;severity=high&amp;id=69e1786e82d89c981fe335c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22734-cwe-290-authentication-bypass-by-sp-5e7666ae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22734%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20Cloud%20Foundry%20UUA&amp;severity=high&amp;id=69e174eb82d89c981fe07a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40260-cwe-776-improper-restriction-of-rec-0042eef4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40260%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e1716682d89c981fde6ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40922-cwe-79-improper-neutralization-of-i-4ec62a5e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40922%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69e1716682d89c981fde6ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40322-cwe-79-improper-neutralization-of-i-7309fd84</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40322%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69e2142282d89c981fcd7cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40318-cwe-24-path-traversal-filedir-in-si-705041eb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40318%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69e2142282d89c981fcd7cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40259-cwe-285-improper-authorization-in-s-895cf1a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40259%3A%20CWE-285%3A%20Improper%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69e2142282d89c981fcd7ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58343-cwe-425-direct-request-forced-brows-9cba515d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58343%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Vision%20Helpdesk&amp;severity=medium&amp;id=69e166dc82d89c981fd8594b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40255-cwe-601-url-redirection-to-untruste-2655ea65</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40255%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20adonisjs%20http-server&amp;severity=medium&amp;id=69e166dc82d89c981fd8594f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41113-cwe-78-improper-neutralization-of-s-94bbf1c0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41113%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sagredo%20qmail&amp;severity=high&amp;id=69e15fdc82d89c981fd52eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40308-cwe-639-authorization-bypass-throug-2a3d8569</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40308%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20joedolson%20my-calendar&amp;severity=high&amp;id=69e158cb82d89c981fcfb81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39313-cwe-770-allocation-of-resources-wit-d82a0598</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39313%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20QuantGeekDev%20mcp-framework&amp;severity=high&amp;id=69e1554682d89c981fce0d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35469-cwe-770-allocation-of-resources-wit-42aeeefc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35469%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20moby%20spdystream&amp;severity=high&amp;id=69e1554682d89c981fce0d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34164-cwe-532-insertion-of-sensitive-info-7422ab0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34164%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20valtimo-platform%20valtimo&amp;severity=medium&amp;id=69e1554682d89c981fce0d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-compromised-dvrs-and-finding-the-90c96254</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Compromised%20DVRs%20and%20Finding%20Them%20in%20the%20Wild%2C%20(Thu%2C%20Apr%2016th)&amp;severity=medium&amp;id=69e026f282d89c981fac32b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54502-cwe-668-exposure-of-resource-to-wro-81812557</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54502%3A%20CWE-668%20%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=high&amp;id=69e135ad82d89c981fbaa760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54510-cwe-414-missing-lock-check-in-amd-a-02b6fcae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54510%3A%20CWE-414%20%20Missing%20Lock%20Check%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=69e135ad82d89c981fbaa767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6442-improper-validation-of-syntactic-cor-5ef413e4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6442%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Snowflake%20Cortex%20Code%20CLI&amp;severity=high&amp;id=69e135ad82d89c981fbaa76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43937-cwe-532-insertion-of-sensitive-info-e934c167</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43937%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e12b2c82d89c981fb4018a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43935-cwe-404-improper-resource-shutdown--7a666ab7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43935%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e12b2c82d89c981fb40187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43883-cwe-754-improper-check-for-unusual--f3e6c01f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43883%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e1241082d89c981fafb50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41082-cwe-24-path-traversal-filedir-in-oc-bd86f374</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41082%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20OCaml%20opam&amp;severity=high&amp;id=69e1241082d89c981fafb517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27820-cwe-120-buffer-copy-without-checkin-64d72ec9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27820%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ruby%20zlib&amp;severity=low&amp;id=69e1241082d89c981fafb513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24749-cwe-863-incorrect-authorization-in--5b90cce9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24749%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20silverstripe%20silverstripe-assets&amp;severity=medium&amp;id=69e11d0782d89c981fabdc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2336-cwe-331-insufficient-entropy-in-micr-ec06bd07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2336%3A%20CWE-331%20Insufficient%20entropy%20in%20Microchip%20IStaX&amp;severity=high&amp;id=69e11d0782d89c981fabdc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/government-cant-win-the-cyber-war-without-the-priv-64dfa608</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Government%20Can%E2%80%99t%20Win%20the%20Cyber%20War%20Without%20the%20Private%20Sector&amp;severity=medium&amp;id=69e2289d82d89c981fe9c065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41080-cwe-331-insufficient-entropy-in-lib-c31d4d69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41080%3A%20CWE-331%20Insufficient%20Entropy%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69e1160082d89c981fa7a67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36579-cwe-640-weak-password-recovery-mech-2b6472cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36579%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Dell%20Dell%20Pro%2014%20Essential%20PV14250&amp;severity=medium&amp;id=69e10ef782d89c981fa32a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5426-cwe-321-use-of-hard-coded-cryptograp-c04eb03f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5426%3A%20CWE-321%20Use%20of%20hard-coded%20cryptographic%20key%20in%20Digital%20Knowledge%20KnowledgeDeliver&amp;severity=null&amp;id=69e107ef82d89c981f9dd1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3324-cwe-288-authentication-bypass-using--8de21145</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3324%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Zohocorp%20ManageEngine%20Log360&amp;severity=high&amp;id=69e0fd6982d89c981f97e31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6409-cwe-20-improper-input-validation-in--22b0fb12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6409%3A%20CWE-20%20Improper%20input%20validation%20in%20Protocol%20Buffers%20Protobuf-php%20(Pecl)&amp;severity=high&amp;id=69e0fd6982d89c981f97e325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-widens-access-to-cybersecurity-model-after--1f8de97c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Widens%20Access%20to%20Cybersecurity%20Model%20After%20Anthropic%E2%80%99s%20Mythos%20Reveal&amp;severity=low&amp;id=69e0f2d882d89c981f918a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2840-cwe-79-improper-neutralization-of-in-a5c9240c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2840%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onlineoptimisation%20Email%20Encoder%20%E2%80%93%20Protect%20Email%20Addresses%20and%20Phone%20Numbers&amp;severity=medium&amp;id=69e0f2f482d89c981f91994c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5785-cwe-89-improper-neutralization-of-sp-0f41a3b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5785%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Zohocorp%20ManageEngine%20PAM360&amp;severity=high&amp;id=69e0ebd382d89c981f8ceb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31987-cwe-532-insertion-of-sensitive-info-033f814f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31987%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=null&amp;id=69e0ebd382d89c981f8ceb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4160-cwe-639-authorization-bypass-through-737667b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4160%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=69e0ebd382d89c981f8ceb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31843-cwe-284-improper-access-control-lea-f84d8bc9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31843%3A%20CWE-284%20Improper%20Access%20Control%20leading%20to%20unauthorized%20modification%20of%20executable%20application%20files%20in%20goodoneuz%20pay-uz&amp;severity=critical&amp;id=69e0e14482d89c981f87fef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-the-breach-inside-a-cargo-theft-actors-post-8348f717</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20the%20breach%3A%20inside%20a%20cargo%20theft%20actor&apos;s%20post-compromise%20playbook&amp;severity=medium&amp;id=69e0fd6282d89c981f97da61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breach-at-tennessee-hospital-affects-337000-2215ef61</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Breach%20at%20Tennessee%20Hospital%20Affects%20337%2C000&amp;severity=medium&amp;id=69e0da3c82d89c981f841d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15621-cwe-522-insufficiently-protected-cr-9776e2a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15621%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Enterprise%20Architect&amp;severity=medium&amp;id=69e0dabc82d89c981f8468d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/artemis-emerges-from-stealth-with-70-million-in-fu-27c08fc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Artemis%20Emerges%20From%20Stealth%20With%20%2470%20Million%20in%20Funding&amp;severity=medium&amp;id=69e0d5b782d89c981f81d0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/splunk-enterprise-update-patches-code-execution-vu-33e172b1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Splunk%20Enterprise%20Update%20Patches%20Code%20Execution%20Vulnerability&amp;severity=critical&amp;id=69e0cfb082d89c981f7e8c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-paid-out-23-million-at-zero-day-quest-20-e0e428a4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Paid%20Out%20%242.3%20Million%20at%20Zero%20Day%20Quest%202026%20Hacking%20Contest&amp;severity=high&amp;id=69e0c8a882d89c981f7bc401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3155-cwe-862-missing-authorization-in-one-0aec828d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3155%3A%20CWE-862%20Missing%20Authorization%20in%20onesignal%20OneSignal%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=low&amp;id=69e0cc2b82d89c981f7cd61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3369-cwe-79-improper-neutralization-of-in-c1a5e10f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codesolz%20Better%20Find%20and%20Replace%20%E2%80%93%20AI-Powered%20Suggestions&amp;severity=medium&amp;id=69e0cc2b82d89c981f7cd620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3489-cwe-89-improper-neutralization-of-sp-65d3fe0f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3489%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20designinvento%20DirectoryPress%20%E2%80%93%20Business%20Directory%20And%20Classified%20Ad%20Listing&amp;severity=high&amp;id=69e0cc2b82d89c981f7cd625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nist-prioritizes-nvd-enrichment-for-cves-in-cisa-k-99bc1f23</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NIST%20Prioritizes%20NVD%20Enrichment%20for%20CVEs%20in%20CISA%20KEV%2C%20Critical%20Software&amp;severity=critical&amp;id=69e0c1a082d89c981f784255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12624-cwe-613-insufficient-session-expira-f9b47282</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12624%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=69e0be2882d89c981f771dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-webex-is-37a04699</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Webex%2C%20ISE&amp;severity=critical&amp;id=69e0b71482d89c981f73ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6024-cwe-79-improper-neutralization-of-in-7fcbb74f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6024%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10242-cwe-79-improper-neutralization-of-i-2529889f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10242%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8010-cwe-611-improper-restriction-of-xml--bce8385c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8010%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=low&amp;id=69e0c29882d89c981f78d91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4867-cwe-79-improper-neutralization-of-in-2c045398</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4867%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-hits-automotive-data-expert-autovista-cfd6d3fc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Hits%20Automotive%20Data%20Expert%20Autovista&amp;severity=medium&amp;id=69e0ac8882d89c981f7004c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39987-update-how-attackers-weaponized-mar-14d626d1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39987%20update%3A%20How%20attackers%20weaponized%20marimo%20to%20deploy%20a%20blockchain%20botnet%20via%20HuggingFace&amp;severity=medium&amp;id=69e0be2682d89c981f771daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-code-gemini-cli-github-copilot-agents-vulne-9c48456f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Code%2C%20Gemini%20CLI%2C%20GitHub%20Copilot%20Agents%20Vulnerable%20to%20Prompt%20Injection%20via%20Comments&amp;severity=medium&amp;id=69e0a1fc82d89c981f6a5fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23772-cwe-269-improper-privilege-manageme-a3c398f9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23772%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20Storage%20Manager&amp;severity=high&amp;id=69e0a58082d89c981f6c48ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2374-cwe-611-improper-restriction-of-xml--936e0b78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2374%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=69e09e7782d89c981f68cc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0718-cwe-862-missing-authorization-in-wpx-3e9ed909</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0718%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=medium&amp;id=69e093ed82d89c981f63c7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14868-cwe-22-improper-limitation-of-a-pat-9bfe3656</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14868%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20shahinurislam%20Career%20Section&amp;severity=high&amp;id=69e093ed82d89c981f63c7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41035-cwe-130-improper-handling-of-length-bf643584</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41035%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Samba%20rsync&amp;severity=high&amp;id=69e08ce482d89c981f5edf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3876-cwe-79-improper-neutralization-of-in-8cfb67a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Prismatic&amp;severity=high&amp;id=69e08ce482d89c981f5edf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3355-cwe-79-improper-neutralization-of-in-af9beb0d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69e08ce482d89c981f5edf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13364-cwe-79-improper-neutralization-of-i-fce87c81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=medium&amp;id=69e08ce482d89c981f5edf06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3875-cwe-79-improper-neutralization-of-in-5cd448ae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Docs%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=69e08ce482d89c981f5edf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3995-cwe-79-improper-neutralization-of-in-936a3d6f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3995%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faridsaniee%20OPEN-BRAIN&amp;severity=medium&amp;id=69e08ce482d89c981f5edf28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1572-cwe-79-improper-neutralization-of-in-ca6fef49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1572%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20by%20Elementor&amp;severity=medium&amp;id=69e08ce482d89c981f5edf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1620-cwe-98-improper-control-of-filename--b5a6957f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1620%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20livemesh%20Livemesh%20Addons%20by%20Elementor&amp;severity=high&amp;id=69e08ce482d89c981f5edf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41034-cwe-125-out-of-bounds-read-in-ascen-1f86e56a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41034%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Ascensio%20ONLYOFFICE%20DocumentServer&amp;severity=medium&amp;id=69e0825782d89c981f59691a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3861-na-in-line-corporation-line-client-f-6f37bce9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3861%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=medium&amp;id=69e0825782d89c981f596914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41030-cwe-669-incorrect-resource-transfer-c35faeb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41030%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Ascensio%20ONLYOFFICE%20DesktopEditors&amp;severity=medium&amp;id=69e0825782d89c981f596917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3581-cwe-862-missing-authorization-in-ian-14ed62cf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3581%3A%20CWE-862%20Missing%20Authorization%20in%20iandunn%20Basic%20Google%20Maps%20Placemarks&amp;severity=medium&amp;id=69e077cc82d89c981f4f924c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3773-cwe-89-improper-neutralization-of-sp-7b7b79ff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3773%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onlineada%20Accessibility%20Suite%20by%20Ability%2C%20Inc&amp;severity=medium&amp;id=69e077cc82d89c981f4f9278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3614-cwe-862-missing-authorization-in-acy-936592c5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3614%3A%20CWE-862%20Missing%20Authorization%20in%20acyba%20AcyMailing%20%E2%80%93%20An%20Ultimate%20Newsletter%20Plugin%20and%20Marketing%20Automation%20Solution%20for%20WordPress&amp;severity=high&amp;id=69e077cc82d89c981f4f926f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3599-cwe-89-improper-neutralization-of-sp-80174081</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3599%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=high&amp;id=69e077cc82d89c981f4f9266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5050-cwe-347-improper-verification-of-cry-f44f9812</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5050%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20jconti%20Payment%20Gateway%20for%20Redsys%20%26%20WooCommerce%20Lite&amp;severity=high&amp;id=69e077cf82d89c981f4f92a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3551-cwe-79-improper-neutralization-of-in-6127ed29</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafasashi%20Custom%20New%20User%20Notification&amp;severity=medium&amp;id=69e077cc82d89c981f4f9239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3595-cwe-862-missing-authorization-in-imp-ae1beb14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3595%3A%20CWE-862%20Missing%20Authorization%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=medium&amp;id=69e077cc82d89c981f4f9250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3596-cwe-862-missing-authorization-in-imp-80944579</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3596%3A%20CWE-862%20Missing%20Authorization%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=critical&amp;id=69e077cc82d89c981f4f9259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22619-vulnerability-in-eaton-ipp-software-16180eb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22619%3A%20Vulnerability%20in%20Eaton%20IPP%20software&amp;severity=high&amp;id=69e077cc82d89c981f4f9236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22618-cwe-358-improperly-implemented-secu-cf580bd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22618%3A%20CWE-358%20Improperly%20implemented%20security%20check%20for%20standard%20in%20Eaton%20IPP%20software&amp;severity=medium&amp;id=69e077cc82d89c981f4f9233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22617-cwe-614-sensitive-cookie-in-https-s-c480a253</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22617%3A%20CWE-614%20Sensitive%20cookie%20in%20HTTPS%20session%20without%20&apos;secure&apos;%20attribute%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e077cc82d89c981f4f9230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22616-cwe-307-improper-restriction-of-exc-cae52f06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22616%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e06d5282d89c981f32f34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22615-cwe-20-improper-input-validation-in-d8d9bd6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22615%3A%20CWE-20%20Improper%20input%20validation%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e06d5282d89c981f32f34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40118-incorrectly-specified-destination-i-7da8b7a7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40118%3A%20Incorrectly%20specified%20destination%20in%20a%20communication%20channel%20in%20Arcserve%20UDP%20Console&amp;severity=medium&amp;id=69e06d5282d89c981f32f352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5070-cwe-79-improper-neutralization-of-in-86851c8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5070%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siteorigin%20Vantage&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3878-cwe-79-improper-neutralization-of-in-fb75070d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20WP%20Docs&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4032-cwe-79-improper-neutralization-of-in-838a1846</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kpumuk%20CodeColorer&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6351-cwe-93-improper-neutralization-of-cr-9661b33d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6351%3A%20CWE-93%20Improper%20neutralization%20of%20CRLF%20sequences%20(&apos;CRLF%20injection&apos;)%20in%20Openfind%20MailGates&amp;severity=high&amp;id=69e04d9c82d89c981f080c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41015-cwe-78-improper-neutralization-of-s-9268043e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41015%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radare%20radare2&amp;severity=high&amp;id=69e04d9c82d89c981f080c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6350-cwe-121-stack-based-buffer-overflow--d51a62db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6350%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Openfind%20MailGates&amp;severity=critical&amp;id=69e04d9c82d89c981f080c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3885-cwe-79-improper-neutralization-of-in-e174da38</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69e04d9c82d89c981f080c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6349-cwe-78-improper-neutralization-of-sp-76bba57a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6349%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20HGiga%20iSherlock-base-4.5&amp;severity=critical&amp;id=69e04d9c82d89c981f080c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3428-cwe-494-download-of-code-without-int-26258474</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3428%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ASUS%20Member%20Center(%E5%8D%8E%E7%A1%95%E5%A4%A7%E5%8E%85)&amp;severity=medium&amp;id=69e04d9c82d89c981f080c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1880-cwe-367-time-of-check-time-of-use-to-1419a365</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1880%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ASUS%20DriverHub&amp;severity=medium&amp;id=69e04d9c82d89c981f080c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-16th-2026-httpsis-4e785520</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%2016th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9894%2C%20(Thu%2C%20Apr%2016th)&amp;severity=medium&amp;id=69e0431082d89c981f00a466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6348-cwe-306-missing-authentication-for-c-2cb15b3d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6348%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Simopro%20Technology%20WinMatrix&amp;severity=critical&amp;id=69e04d9c82d89c981f080c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3299-cwe-79-improper-neutralization-of-in-00f10b35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20futtta%20WP%20YouTube%20Lyte&amp;severity=medium&amp;id=69e03f8c82d89c981fff3a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40505-cwe-150-improper-neutralization-of--b7f1cec7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40505%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Artifex%20Software%20Inc.%20MuPDF&amp;severity=medium&amp;id=69e03f8c82d89c981fff3a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40504-cwe-122-heap-based-buffer-overflow--7b35deb9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40504%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20marcobambini%20gravity&amp;severity=critical&amp;id=69e03f8c82d89c981fff3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40502-cwe-862-missing-authorization-in-hk-1a5016b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40502%3A%20CWE-862%20Missing%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e0388582d89c981fe55b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40503-cwe-22-improper-limitation-of-a-pat-3b442db8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40503%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e0388582d89c981fe55b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-17-acac79e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-17&amp;severity=medium&amp;id=69e21a1f82d89c981fcfb12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-16-957528d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-16&amp;severity=medium&amp;id=69e17bea82d89c981fe59751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37100-na-83e19342</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37100%3A%20n%2Fa&amp;severity=null&amp;id=69e107ef82d89c981f9dd1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37347-na-0e02ab98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37347%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6982d89c981f97e31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37346-na-f05890a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37346%3A%20n%2Fa&amp;severity=medium&amp;id=69e0fd6982d89c981f97e318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37345-na-9f6b0dc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37345%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6982d89c981f97e313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37344-na-260a4c1a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37344%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37343-na-f53e37eb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37343%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37342-na-2ee2645c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37342%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37341-na-f0dfe489</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37341%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37340-na-a90f9964</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37340%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37339-na-e993110f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37339%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37338-na-4930560d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37338%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37337-na-30fec7c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37337%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37336-na-8799e560</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37336%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30656-na-0ee1621e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30656%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30459-na-928f9818</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30459%3A%20n%2Fa&amp;severity=high&amp;id=69e0f2f482d89c981f919951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-16-211f6192</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-16&amp;severity=low&amp;id=69e06d3782d89c981f3256c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5363-cwe-326-inadequate-encryption-streng-e67227b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5363%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20TP-Link%20Systems%20Inc.%20Archer%20C7%20v5%20and%20v5.8&amp;severity=medium&amp;id=69e0271282d89c981fac389c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4880-cwe-269-improper-privilege-managemen-a28ccef6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4880%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ukrsolution%20Barcode%20Scanner%20(%2BMobile%20App)%20%E2%80%93%20Inventory%20manager%2C%20Order%20fulfillment%20system%2C%20POS%20(Point%20of%20Sale)&amp;severity=critical&amp;id=69e01ffb82d89c981fa83038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40193-cwe-90-improper-neutralization-of-s-daa16910</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40193%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20foxcpp%20maddy&amp;severity=high&amp;id=69e01ffb82d89c981fa83030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40947-cwe-426-untrusted-search-path-in-yu-5b9a0d86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40947%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Yubico%20libfido2&amp;severity=low&amp;id=69e01ffb82d89c981fa83035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40192-cwe-770-allocation-of-resources-wit-c6717f27</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40192%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20python-pillow%20Pillow&amp;severity=high&amp;id=69e01c6582d89c981fa691af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40316-cwe-94-improper-control-of-generati-262d4fe9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40316%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OWASP-BLT%20BLT&amp;severity=high&amp;id=69e018e182d89c981fa55552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4949-cwe-862-missing-authorization-in-pro-c72eecd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4949%3A%20CWE-862%20Missing%20Authorization%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=69e0c29882d89c981f78d924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6388-insufficient-granularity-of-access-c-fbeba818</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6388%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20GitOps&amp;severity=critical&amp;id=69e00aeb82d89c981f9f944b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1711-cwe-79-improper-neutralization-of-in-a6f1d39f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1711%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69e0074d82d89c981f9e1a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1564-cwe-80-improper-neutralization-of-sc-141c02ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1564%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script%20Related%20HTML%20Tags%20in%20a%20Web%20Page%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69e0074d82d89c981f9e1a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22676-cwe-732-incorrect-permission-assign-a3f7b3d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22676%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Barracuda%20Networks%20RMM&amp;severity=high&amp;id=69dffcc482d89c981f9a5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40173-cwe-200-exposure-of-sensitive-infor-65dfad21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40173%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69dffcc482d89c981f9a5a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40186-cwe-79-improper-neutralization-of-i-da6eb63e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40186%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dff5b982d89c981f9734d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39857-cwe-200-exposure-of-sensitive-infor-77d7fde2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39857%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35569-cwe-79-improper-neutralization-of-i-cf7e3ec0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35569%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=high&amp;id=69dfeeb382d89c981f94227d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33889-cwe-79-improper-neutralization-of-i-6ee4b412</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33889%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33888-cwe-863-incorrect-authorization-in--35d4ea2d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33888%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21726-vulnerability-in-grafana-loki-8cebd2e0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21726%3A%20Vulnerability%20in%20Grafana%20Loki&amp;severity=medium&amp;id=69dfeeb382d89c981f942271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6385-integer-overflow-or-wraparound-in-re-80c34cf6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6385%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Lightspeed%20Core&amp;severity=medium&amp;id=69dfe7c182d89c981f913eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41118-vulnerability-in-grafana-pyroscope-a9a6cd4c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41118%3A%20Vulnerability%20in%20Grafana%20Pyroscope&amp;severity=critical&amp;id=69dfe7b682d89c981f913c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33877-cwe-208-observable-timing-discrepan-455d361c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33877%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20apostrophecms%20apostrophe&amp;severity=low&amp;id=69dfe7b682d89c981f913c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6384-buffer-copy-without-checking-size-of-180df722</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6384%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=69dfe7be82d89c981f913e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6364-out-of-bounds-read-in-google-chrome-ee9b22e8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6364%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7be82d89c981f913e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6319-use-after-free-in-google-chrome-70128cb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6319%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6318-use-after-free-in-google-chrome-647ef04f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6318%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6363-type-confusion-in-google-chrome-778cc2b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6363%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6317-use-after-free-in-google-chrome-6551e6e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6317%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6362-use-after-free-in-google-chrome-418d3b95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6362%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7be82d89c981f913e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6361-heap-buffer-overflow-in-google-chrom-ed6c176c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6361%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6316-use-after-free-in-google-chrome-cc03a7ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6316%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6315-use-after-free-in-google-chrome-50d74272</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6315%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6314-out-of-bounds-write-in-google-chrome-2215667b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6314%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6313-insufficient-policy-enforcement-in-g-06ed9486</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6313%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=low&amp;id=69dfe7bc82d89c981f913de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6312-insufficient-policy-enforcement-in-g-6255dea0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6312%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=low&amp;id=69dfe7bc82d89c981f913de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6311-uninitialized-use-in-google-chrome-2d3a856f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6311%3A%20Uninitialized%20Use%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6310-use-after-free-in-google-chrome-484f6da9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6310%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6360-use-after-free-in-google-chrome-d3ebcedf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6360%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6309-use-after-free-in-google-chrome-d73ce66a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6309%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6308-out-of-bounds-read-in-google-chrome-168f3bc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6308%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6307-type-confusion-in-google-chrome-57982440</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6307%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6306-heap-buffer-overflow-in-google-chrom-06f9de62</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6306%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6305-heap-buffer-overflow-in-google-chrom-df697c78</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6305%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6304-use-after-free-in-google-chrome-2d9bad9b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6304%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6303-use-after-free-in-google-chrome-c3150b44</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6303%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6302-use-after-free-in-google-chrome-df0b9544</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6302%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6301-type-confusion-in-google-chrome-6e9014de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6301%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6300-use-after-free-in-google-chrome-d818b9fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6300%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6359-use-after-free-in-google-chrome-b470779c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6359%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6358-use-after-free-in-google-chrome-d445e92b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6358%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6299-use-after-free-in-google-chrome-b43675e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6299%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6298-heap-buffer-overflow-in-google-chrom-4814b240</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6298%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7b982d89c981f913cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6297-use-after-free-in-google-chrome-aec32456</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6297%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b682d89c981f913c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6296-heap-buffer-overflow-in-google-chrom-7fb66fda</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6296%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=critical&amp;id=69dfe7b682d89c981f913c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40919-out-of-bounds-write-in-red-hat-red--99c9240b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40919%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40918-incorrect-calculation-of-buffer-siz-7e419a48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40918%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40917-out-of-bounds-read-in-red-hat-red-h-b32d4ab9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40917%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40916-out-of-bounds-write-in-red-hat-red--f6a28f76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40916%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40915-integer-overflow-or-wraparound-in-r-da9bffb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40915%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21727-vulnerability-in-grafana-grafana-co-e8f95c9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21727%3A%20Vulnerability%20in%20Grafana%20Grafana%20Correlations&amp;severity=low&amp;id=69dfe7b682d89c981f913c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5189-cwe-798-use-of-hard-coded-credential-1496b711</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5189%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sonatype%20Nexus%20Repository&amp;severity=critical&amp;id=69dfe0a382d89c981f8dffa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33667-cwe-307-improper-restriction-of-exc-7202229d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33667%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20opf%20openproject&amp;severity=high&amp;id=69dfe0a382d89c981f8dff94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40256-cwe-22-improper-limitation-of-a-pat-021af117</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40256%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfe0a382d89c981f8dff9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34632-cwe-427-uncontrolled-search-path-el-f84269c1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34632%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Adobe%20Adobe%20Photoshop%20Installer&amp;severity=high&amp;id=69dfe0a382d89c981f8dff97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6245-buffer-access-with-incorrect-length--3f4db62e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6245%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69dfe0a382d89c981f8dffa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39845-cwe-918-server-side-request-forgery-d91487e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39845%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfe0a382d89c981f8dff9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34393-cwe-269-improper-privilege-manageme-05526187</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34393%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34244-cwe-200-exposure-of-sensitive-infor-a0c0c367</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34244%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6383-incorrect-authorization-in-red-hat-r-194df434</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6383%3A%20Incorrect%20Authorization%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Virtualization%204&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34242-cwe-22-improper-limitation-of-a-pat-6f9f4f5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34242%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33440-cwe-918-server-side-request-forgery-7310feef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33440%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33435-cwe-23-relative-path-traversal-in-w-8a812be9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33435%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4857-cwe-863-incorrect-authorization-in-s-b29d7e7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4857%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SailPoint%20Technologies%20IdentityIQ&amp;severity=high&amp;id=69dfd9a582d89c981f8a79eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33220-cwe-22-improper-limitation-of-a-pat-206cb2f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33220%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33214-cwe-862-missing-authorization-in-we-09b74691</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33214%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd29182d89c981f86fbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33212-cwe-284-improper-access-control-in--d4da3688</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33212%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=69dfd29182d89c981f86fbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spotting-cyberthreats-a-guide-for-blind-and-low-vi-a2afe435</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spotting%20cyberthreats%3A%20a%20guide%20for%20blind%20and%20low-vision%20users%20%7C%20Kaspersky%20official%20blog&amp;severity=low&amp;id=69dfcf2182d89c981f8542bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6290-cwe-863-in-rapid7-velociraptor-16ce8299</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6290%3A%20CWE-863%20in%20Rapid7%20Velociraptor&amp;severity=high&amp;id=69dfcf1982d89c981f85412e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32631-cwe-200-exposure-of-sensitive-infor-535ad14c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32631%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20git-for-windows%20git&amp;severity=high&amp;id=69dfcf1982d89c981f854123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5758-cwe-200-exposure-of-sensitive-inform-05642342</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5758%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Mafintosh%20Protocol-buffers-schema%20parser&amp;severity=medium&amp;id=69dfcf1982d89c981f85412a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-crypto-wallet-takeover-unlimited-usdt-appro-80de48d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Crypto%20Wallet%20Takeover%20Unlimited%20USDT%20Approval%20Exploitation%20via%20Trust%20Wallet%20QR%20Code%20Phishing&amp;severity=medium&amp;id=69dfcba782d89c981f83460d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-youtube-copyright-notices-can-steal-your-goog-4259ffad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20YouTube%20copyright%20notices%20can%20steal%20your%20Google%20login&amp;severity=medium&amp;id=69dfc80282d89c981f7dd9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sweden-blames-pro-russian-group-for-cyberattack-la-83236afa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sweden%20Blames%20Pro-Russian%20Group%20for%20Cyberattack%20Last%20Year%20on%20Its%20Energy%20Infrastructure&amp;severity=medium&amp;id=69dfc0fc82d89c981f74ea7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15610-cwe-502-deserialization-of-untruste-8e29d51c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15610%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20OpenText%2C%20Inc%20RightFax&amp;severity=critical&amp;id=69dfc10382d89c981f750b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63029-cwe-89-improper-neutralization-of-s-00805d70</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63029%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WC%20Lovers%20WCFM%20Marketplace&amp;severity=high&amp;id=69dfc10382d89c981f750b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6372-cwe-862-missing-authorization-in-pli-a5a0a62f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6372%3A%20CWE-862%20Missing%20Authorization%20in%20Plisio%20Accept%20Cryptocurrencies%20with%20Plisio&amp;severity=high&amp;id=69dfc10382d89c981f750b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-fake-proton-vpn-sites-to-gaming-mods-this-win-37383ac0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20fake%20Proton%20VPN%20sites%20to%20gaming%20mods%2C%20this%20Windows%20infostealer%20is%20everywhere&amp;severity=medium&amp;id=69dfcba782d89c981f834603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20136-improper-encoding-or-escaping-of-ou-f5759eaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20136%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20059-improper-neutralization-of-input-du-294c602d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20061-improper-neutralization-of-special--d2f61c7d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20061%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20060-url-redirection-to-untrusted-site-o-28f4102f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20060%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20170-improper-neutralization-of-script-r-0491a1ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20170%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Webex%20Contact%20Center&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20184-improper-certificate-validation-in--c47eb2ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20184%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20180-improper-limitation-of-a-pathname-t-7c0f2b38</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20180%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20152-authentication-bypass-by-primary-we-7ab53c44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20152%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Cisco%20Cisco%20Secure%20Web%20Appliance&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20161-improper-link-resolution-before-fil-285f4f28</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20161%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Cisco%20Cisco%20ThousandEyes%20Enterprise%20Agent&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20186-improper-neutralization-of-special--fe838f1c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20186%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20148-improper-limitation-of-a-pathname-t-77613593</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20148%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20147-improper-neutralization-of-special--69d7d44e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20147%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f682d89c981f6ee687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20081-relative-path-traversal-in-cisco-ci-ca9c26bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20081%3A%20Relative%20Path%20Traversal%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20078-relative-path-traversal-in-cisco-ci-32eb30c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20078%3A%20Relative%20Path%20Traversal%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20132-improper-neutralization-of-input-du-851bc956</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20132%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6370-cwe-79-improper-neutralization-of-in-d5a504fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6370%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HashThemes%20Mini%20Ajax%20Cart%20for%20WooCommerce&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15636-cwe-79-improper-neutralization-of-i-88c38273</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15636%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Emarket-design%20YouTube%20Showcase&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15635-cwe-352-cross-site-request-forgery--3a3da392</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15635%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Zaytech%20Smart%20Online%20Order%20for%20Clover&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53444-cwe-352-cross-site-request-forgery--55989ef9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53444%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DeluxeThemes%20Userpro&amp;severity=medium&amp;id=69dfb67782d89c981f6a459c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5387-cwe-862-in-aveva-pipeline-simulation-929b8708</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5387%3A%20CWE-862%20in%20AVEVA%20Pipeline%20Simulation%202025&amp;severity=critical&amp;id=69dfb67782d89c981f6a45a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20205-information-written-to-log-files-ca-c01d3c95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20205%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20MCP%20Server&amp;severity=high&amp;id=69dfaf6882d89c981f612b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20203-the-software-does-not-restrict-or-i-356224a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20203%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69dfaf6882d89c981f612b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20204-creating-and-using-insecure-tempora-f5cdc3ec</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20204%3A%20Creating%20and%20using%20insecure%20temporary%20files%20can%20leave%20application%20and%20system%20data%20vulnerable%20to%20attack.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69dfaf6882d89c981f612b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20202-the-software-does-not-properly-hand-a86b1619</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20202%3A%20The%20software%20does%20not%20properly%20handle%20when%20an%20input%20contains%20Unicode%20encoding.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69dfaf6882d89c981f612b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-n8n-n8mare-how-threat-actors-are-misusing-ai-w-78030375</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20n8n%20n8mare%3A%20How%20threat%20actors%20are%20misusing%20AI%20workflow%20automation&amp;severity=medium&amp;id=69dfcba782d89c981f8345f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ransomware-targets-turkey-via-adwind-rat-840bf63c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ransomware%20targets%20Turkey%20via%20Adwind%20RAT&amp;severity=medium&amp;id=69dfb66f82d89c981f6a420e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12141-cwe-200-information-disclosure-in-g-8996e2d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12141%3A%20CWE-200%3A%20Information%20Disclosure%20in%20Grafana%20Grafana%20Alerting&amp;severity=low&amp;id=69dfaf6882d89c981f612b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-mac-stealer-targeting-10k-crypto-wallets-2027ccd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Mac%20stealer%20targeting%20%2410K%2B%20crypto%20wallets&amp;severity=medium&amp;id=69dfb2ea82d89c981f6662d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-vulnerability-exposes-nginx-servers-to-h-33c1d10c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20Vulnerability%20Exposes%20Nginx%20Servers%20to%20Hacking&amp;severity=critical&amp;id=69dfa4dc82d89c981f4d965c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4682-cwe-121-stack-based-buffer-overflow--e9f0af64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4682%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20HP%20Inc%20HP%20DeskJet%202800e%20All-in-One%20Printer%20series&amp;severity=high&amp;id=69dfa86082d89c981f539bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4667-cwe-250-execution-with-unnecessary-p-749e3fc7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4667%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20HP%20Inc.%20OMEN%20Gaming%20Hub&amp;severity=high&amp;id=69dfa86082d89c981f539bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/capsule-security-emerges-from-stealth-with-7-milli-2250a1fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Capsule%20Security%20Emerges%20From%20Stealth%20With%20%247%20Million%20in%20Funding&amp;severity=medium&amp;id=69df9a5082d89c981f38985c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/by-design-flaw-in-mcp-could-enable-widespread-ai-s-5fc67ebf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98By%20Design%E2%80%99%20Flaw%20in%20MCP%20Could%20Enable%20Widespread%20AI%20Supply%20Chain%20Attacks&amp;severity=low&amp;id=69df96cc82d89c981f30469f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/100-chrome-extensions-steal-user-data-create-backd-7c4e8817</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=100%20Chrome%20Extensions%20Steal%20User%20Data%2C%20Create%20Backdoor&amp;severity=medium&amp;id=69df934882d89c981f291bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ciso-conversations-ross-mckerchar-ciso-at-sophos-d4cf0ac2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISO%20Conversations%3A%20Ross%20McKerchar%2C%20CISO%20at%20Sophos&amp;severity=medium&amp;id=69dfb6c182d89c981f6adf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25219-cwe-200-exposure-of-sensitive-infor-fd73ca6d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25219%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69df88bc82d89c981f17bd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4145-cwe-88-improper-neutralization-of-ar-2139207c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4145%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Software%20Fix&amp;severity=high&amp;id=69df88bc82d89c981f17bd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4135-cwe-59-improper-link-resolution-befo-04d17efd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4135%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Software%20Fix&amp;severity=medium&amp;id=69df88bc82d89c981f17bd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4134-cwe-427-uncontrolled-search-path-ele-29084f0b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4134%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Software%20Fix&amp;severity=high&amp;id=69df88bc82d89c981f17bd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1636-cwe-427-uncontrolled-search-path-ele-54c44a16</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1636%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Service%20Bridge&amp;severity=medium&amp;id=69df88bc82d89c981f17bd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0827-cwe-59-improper-link-resolution-befo-2f40ea17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0827%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Diagnostics&amp;severity=medium&amp;id=69df88bc82d89c981f17bd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mirax-rat-targeting-android-users-in-europe-af1aa70b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mirax%20RAT%20Targeting%20Android%20Users%20in%20Europe&amp;severity=medium&amp;id=69df81b482d89c981f0e2b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-vulnerabilities-patched-in-ivanti-neurons-for--9bbfd3ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Vulnerabilities%20Patched%20in%20Ivanti%20Neurons%20for%20ITSM&amp;severity=low&amp;id=69df7aac82d89c981ffeb537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1852-cwe-352-cross-site-request-forgery-c-da2bdb61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1852%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20woobeewoo%20Product%20Pricing%20Table%20by%20WooBeWoo&amp;severity=medium&amp;id=69df7ad282d89c981fff5f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-domain-could-have-handed-hackers-25k-endpoints--8d5021f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2410%20Domain%20Could%20Have%20Handed%20Hackers%2025k%20Endpoints%2C%20Including%20in%20OT%20and%20Gov%20Networks&amp;severity=medium&amp;id=69df702082d89c981feb85ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30778-cwe-202-exposure-of-sensitive-infor-b8fdce1f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30778%3A%20CWE-202%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking&amp;severity=high&amp;id=69df703082d89c981fec17be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-urges-extending-foreign-surveillance-program-b2cdc3b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Urges%20Extending%20Foreign%20Surveillance%20Program%20as%20Some%20Lawmakers%20Push%20for%20US%20Privacy%20Protections&amp;severity=medium&amp;id=69df691882d89c981fdff00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40786-missing-authorization-in-long-watch-21ffcda2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40786%3A%20Missing%20Authorization%20in%20Long%20Watch%20Studio%20MyRewards&amp;severity=medium&amp;id=69df6ca082d89c981fe573b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40784-authorization-bypass-through-user-c-0d8e9d5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40784%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mahmudul%20Hasan%20Arif%20FluentBoards&amp;severity=high&amp;id=69df6ca082d89c981fe573b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40764-cross-site-request-forgery-csrf-in--fe9b06a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40764%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=high&amp;id=69df6c9d82d89c981fe572fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40763-missing-authorization-in-wp-royal-r-ec477ac2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40763%3A%20Missing%20Authorization%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40745-improper-neutralization-of-special--dc1439ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40745%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons&amp;severity=high&amp;id=69df6c9d82d89c981fe572f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40742-missing-authorization-in-nelio-soft-356877bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40742%3A%20Missing%20Authorization%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40740-missing-authorization-in-themeum-tu-ca37fc88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40740%3A%20Missing%20Authorization%20in%20Themeum%20Tutor%20LMS&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40737-authorization-bypass-through-user-c-1c7de437</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40737%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20VillaTheme%20COMPE&amp;severity=medium&amp;id=69df6c9d82d89c981fe572ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40734-improper-neutralization-of-input-du-5fd327d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zahlan%20Categories%20Images&amp;severity=medium&amp;id=69df6c9d82d89c981fe572ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40730-missing-authorization-in-themegrill-046aebce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40730%3A%20Missing%20Authorization%20in%20ThemeGrill%20ThemeGrill%20Demo%20Importer&amp;severity=null&amp;id=69df6c9d82d89c981fe572e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40729-missing-authorization-in-bplugins-3-72f54865</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40729%3A%20Missing%20Authorization%20in%20bPlugins%203D%20viewer%20%E2%80%93%20Embed%203D%20Models&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40728-missing-authorization-in-blockart-m-cc1c2b87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40728%3A%20Missing%20Authorization%20in%20BlockArt%20Magazine%20Blocks&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33807-cwe-436-interpretation-conflict-in--e2fb5055</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33807%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20fastify%20%40fastify%2Fexpress&amp;severity=critical&amp;id=69df621082d89c981fd4ed1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33618-cwe-400-uncontrolled-resource-consu-7254c62d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33618%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Bosch%20BVMS&amp;severity=high&amp;id=69df621082d89c981fd4ed18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-fortisandbox-vulnerabili-634b7980</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20FortiSandbox%20Vulnerabilities&amp;severity=critical&amp;id=69df5e8c82d89c981fce644e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33808-cwe-436-interpretation-conflict-in--328b2649</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33808%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20fastify%20%40fastify%2Fexpress&amp;severity=critical&amp;id=69df621082d89c981fd4ed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chasing-an-angry-spark-3c7d252d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chasing%20an%20Angry%20Spark&amp;severity=medium&amp;id=69dfcba782d89c981f8345df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3505-cwe-770-allocation-of-resources-with-d473995c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3505%3A%20CWE-770%20Allocation%20of%20resources%20without%20limits%20or%20throttling%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=high&amp;id=69df5b0f82d89c981fca1f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5588-cwe-327-use-of-a-broken-or-risky-cry-873364df</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5588%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=medium&amp;id=69df5b0f82d89c981fca1f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5598-cwe-385-covert-timing-channel-in-leg-bc1f0a9b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5598%3A%20CWE-385%20Covert%20timing%20channel%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=critical&amp;id=69df5b0f82d89c981fca1f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0636-cwe-90-improper-neutralization-of-sp-cfb737a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0636%3A%20CWE-90%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20LDAP%20query%20(&apos;LDAP%20injection&apos;)%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=medium&amp;id=69df5b0f82d89c981fca1f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14813-cwe-327-use-of-a-broken-or-risky-cr-dcd827cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14813%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=critical&amp;id=69df5b0f82d89c981fca1f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52641-vulnerability-in-hcl-aion-64bbe7c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52641%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69df540182d89c981fbdb3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3643-cwe-79-improper-neutralization-of-in-68c05e6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onthemapmarketing%20Accessibly%20%E2%80%93%20WordPress%20Website%20Accessibility&amp;severity=high&amp;id=69df540182d89c981fbdb3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4011-cwe-79-improper-neutralization-of-in-7e0088fa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgwyer%20Power%20Charts%20%E2%80%93%20Responsive%20Beautiful%20Charts%20%26%20Graphs&amp;severity=medium&amp;id=69df540482d89c981fbdb58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3998-cwe-79-improper-neutralization-of-in-c6990476</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3998%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webmindpt%20WM%20JqMath&amp;severity=medium&amp;id=69df540182d89c981fbdb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1782-cwe-20-improper-input-validation-in--eeab536b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1782%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Wpmet%20MetForm%20Pro&amp;severity=medium&amp;id=69df540182d89c981fbdb3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3649-cwe-862-missing-authorization-in-col-aa0e913c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3649%3A%20CWE-862%20Missing%20Authorization%20in%20colbeinformatik%20Katalogportal-pdf-sync%20Widget&amp;severity=medium&amp;id=69df540182d89c981fbdb3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4091-cwe-352-cross-site-request-forgery-c-040ecd99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4091%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20faridsaniee%20OPEN-BRAIN&amp;severity=medium&amp;id=69df540482d89c981fbdb595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3461-cwe-288-authentication-bypass-using--9f822f26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3461%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20visaacceptancesolutions%20Visa%20Acceptance%20Solutions&amp;severity=critical&amp;id=69df540182d89c981fbdb3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3642-cwe-862-missing-authorization-in-for-b375c293</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3642%3A%20CWE-862%20Missing%20Authorization%20in%20forfront%20e-shot&amp;severity=medium&amp;id=69df540182d89c981fbdb3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4005-cwe-79-improper-neutralization-of-in-e039b1ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coachific%20Coachific%20Shortcode&amp;severity=medium&amp;id=69df540482d89c981fbdb587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4002-cwe-352-cross-site-request-forgery-c-5683203e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4002%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20petjeaf%20Petje.af&amp;severity=medium&amp;id=69df540482d89c981fbdb57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3659-cwe-79-improper-neutralization-of-in-ae3b6448</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3659%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bappidgreat%20WP%20Circliful&amp;severity=medium&amp;id=69df540182d89c981fbdb3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40899-cwe-79-improper-neutralization-of-i-1ebcb453</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40899%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=69df540182d89c981fbdb3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40897-cwe-863-incorrect-authorization-in--1c69b20c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40897%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=69df540182d89c981fbdb3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5694-cwe-79-improper-neutralization-of-in-5e6ec16b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aerin%20Quick%20Interest%20Slider&amp;severity=high&amp;id=69df733482d89c981ff25ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5617-cwe-639-authorization-bypass-through-c449e74b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5617%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20royalnavneet%20Login%20as%20User%20%E2%80%93%20Switch%20User%20%26%20WooCommerce%20Login%20as%20Customer&amp;severity=high&amp;id=69df733482d89c981ff25cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5717-cwe-79-improper-neutralization-of-in-46aa3ef6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5717%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20knighthawk%20VI%3A%20Include%20Post%20By&amp;severity=medium&amp;id=69df733482d89c981ff25cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-8-industrial-giants-publish-new--d3308aef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%208%20Industrial%20Giants%20Publish%20New%20Security%20Advisories&amp;severity=medium&amp;id=69df3b6482d89c981f8eec0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5088-cwe-338-use-of-cryptographically-wea-16c9eece</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5088%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20JDEGUEST%20Apache%3A%3AAPI%3A%3APassword&amp;severity=high&amp;id=69df426b82d89c981f9c89ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6293-cwe-352-cross-site-request-forgery-c-8623502d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6293%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20udamadu%20Inquiry%20form%20to%20posts%20or%20pages&amp;severity=medium&amp;id=69df37e082d89c981f89f024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5160-cross-site-scripting-xss-in-githubco-45eede9b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5160%3A%20Cross-site%20Scripting%20(XSS)%20in%20github.com%2Fyuin%2Fgoldmark%2Frenderer%2Fhtml&amp;severity=medium&amp;id=69df264b82d89c981f697e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26291-cross-site-scripting-xss-in-growi-i-00b9c4e6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26291%3A%20Cross-site%20scripting%20(XSS)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=69df1bce82d89c981f4dca69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5397-cwe-427-uncontrolled-search-path-ele-1f281f99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5397%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20OMRON%20SOCIAL%20SOLUTIONS%20CO.%2C%20Ltd.%20PowerAttendant%20Standard%20Edition&amp;severity=high&amp;id=69df1bce82d89c981f4dca6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1555-cwe-434-unrestricted-upload-of-file--be10bbcf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1555%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Owen%20WebStack&amp;severity=critical&amp;id=69df0daf82d89c981f2a19ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6328-cwe-20-improper-input-validation-in--ad367d4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6328%3A%20CWE-20%20Improper%20input%20validation%20in%20XQUIC%20Project%20XQUIC&amp;severity=high&amp;id=69df0daf82d89c981f2a19d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40499-cwe-78-improper-neutralization-of-s-c450c02e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40499%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69defc3b82d89c981ff96336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-15th-2026-httpsi-ba6ef2fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%2015th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9892%2C%20(Wed%2C%20Apr%2015th)&amp;severity=medium&amp;id=69def19182d89c981fe564ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1509-cwe-94-improper-control-of-generatio-77599009</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=69deee0b82d89c981fde9f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1541-cwe-639-authorization-bypass-through-426c90f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1541%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=69deee0b82d89c981fde9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4812-cwe-862-missing-authorization-in-wpe-838ccd66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4812%3A%20CWE-862%20Missing%20Authorization%20in%20wpengine%20Advanced%20Custom%20Fields%20(ACF%C2%AE)&amp;severity=medium&amp;id=69deee0b82d89c981fde9f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2834-cwe-79-improper-neutralization-of-in-ddccbea9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tokenoftrust%20Age%20Verification%20%26%20Identity%20Verification%20by%20Token%20of%20Trust&amp;severity=high&amp;id=69deee0b82d89c981fde9f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54550-cwe-94-improper-control-of-generati-3a6749d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54550%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dee70482d89c981fce52d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-for-ai-models-tue-apr-14th-f0af681b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20for%20AI%20Models%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dedc7882d89c981f4f4c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40105-cwe-80-improper-neutralization-of-s-7ff39b0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40105%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=69dee70482d89c981fce52d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40104-cwe-770-allocation-of-resources-wit-de9859be</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40104%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20xwiki%20org.xwiki.platform%3Axwiki-platform-oldcore&amp;severity=medium&amp;id=69ded8f482d89c981f22eddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-16-f3d2223b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-16&amp;severity=medium&amp;id=69e2285782d89c981fe85812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-15-a05f99ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-15&amp;severity=medium&amp;id=69e02a6a82d89c981fad373c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30993-na-5eef5dae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30993%3A%20n%2Fa&amp;severity=critical&amp;id=69dfcf1982d89c981f85411f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30995-na-594a4b29</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30995%3A%20n%2Fa&amp;severity=high&amp;id=69dfc80582d89c981f7ddbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30994-na-059d58d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30994%3A%20n%2Fa&amp;severity=high&amp;id=69dfc80582d89c981f7ddbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30996-na-7d1dfe4a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30996%3A%20n%2Fa&amp;severity=high&amp;id=69dfc10382d89c981f750b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30461-na-2320544e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30461%3A%20n%2Fa&amp;severity=high&amp;id=69dfb67782d89c981f6a45a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67841-na-90086889</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67841%3A%20n%2Fa&amp;severity=high&amp;id=69dfb67782d89c981f6a459f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30625-na-5f09f954</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30625%3A%20n%2Fa&amp;severity=critical&amp;id=69dfaf6882d89c981f612b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30624-na-874e93a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30624%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30617-na-a6d25840</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30617%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30616-na-6a957f7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30616%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30615-na-cfcaae0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30615%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30364-na-d86929a4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30364%3A%20n%2Fa&amp;severity=high&amp;id=69dfa86082d89c981f539bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53412-na-b7eb1768</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53412%3A%20n%2Fa&amp;severity=high&amp;id=69dfa86082d89c981f539bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-15-80bc2060</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-15&amp;severity=low&amp;id=69df507382d89c981fb85c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40096-cwe-79-improper-neutralization-of-i-9694f3f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40096%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immich-app%20immich&amp;severity=medium&amp;id=69ded8f482d89c981f22edd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40091-cwe-532-insertion-of-sensitive-info-ee619b09</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40091%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20authzed%20spicedb&amp;severity=medium&amp;id=69ded8f482d89c981f22edd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40090-cwe-22-improper-limitation-of-a-pat-c8ab49a7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40090%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zarf-dev%20zarf&amp;severity=high&amp;id=69ded57682d89c981f20b4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39984-cwe-295-improper-certificate-valida-1bc99de0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39984%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sigstore%20timestamp-authority&amp;severity=medium&amp;id=69ded57682d89c981f20b4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39971-cwe-113-improper-neutralization-of--47ba53ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39971%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20s9y%20Serendipity&amp;severity=high&amp;id=69ded57682d89c981f20b4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39963-cwe-565-reliance-on-cookies-without-d37d563e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39963%3A%20CWE-565%3A%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20s9y%20Serendipity&amp;severity=medium&amp;id=69ded57682d89c981f20b4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1314-cwe-862-missing-authorization-in-ibe-155c7412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1314%3A%20CWE-862%20Missing%20Authorization%20in%20iberezansky%203D%20FlipBook%20%E2%80%93%20PDF%20Embedder%2C%20PDF%20Flipbook%20Viewer%2C%20Flipbook%20Image%20Gallery&amp;severity=medium&amp;id=69dece6882d89c981f1bf9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2396-cwe-79-improper-neutralization-of-in-cb40c8a9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kimipooh%20List%20View%20Google%20Calendar&amp;severity=medium&amp;id=69dece6882d89c981f1bf9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15470-cwe-22-improper-limitation-of-a-pat-f1f9ed0c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15470%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DesigningMedia%20Eleganzo&amp;severity=medium&amp;id=69dece6882d89c981f1bf9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39884-cwe-88-improper-neutralization-of-a-0e46c7ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39884%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Flux159%20mcp-server-kubernetes&amp;severity=high&amp;id=69dece6882d89c981f1bf9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39399-cwe-20-improper-input-validation-in-f5d85126</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39399%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20NuGet%20NuGetGallery&amp;severity=critical&amp;id=69decae882d89c981f18b33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27297-integer-underflow-wrap-or-wraparoun-b9acb282</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27297%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27300-access-of-uninitialized-pointer-cwe-304f0a0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27300%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae582d89c981f18b2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27296-integer-underflow-wrap-or-wraparoun-992b6cdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27296%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27290-untrusted-search-path-cwe-426-in-ad-f194852f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27290%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27298-access-of-resource-using-incompatib-860e7c92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27298%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20(CWE-843)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27294-out-of-bounds-read-cwe-125-in-adobe-e15e9d93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27294%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27295-out-of-bounds-write-cwe-787-in-adob-53061293</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27295%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27301-heap-based-buffer-overflow-cwe-122--828495a7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27301%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae882d89c981f18b33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27299-improper-input-validation-cwe-20-in-d362f7f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27299%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae582d89c981f18b2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27293-heap-based-buffer-overflow-cwe-122--2afa605c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27293%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27292-use-after-free-cwe-416-in-adobe-ado-2db526ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27292%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35589-cwe-1385-missing-origin-validation--cb68aa18</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35589%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20HKUDS%20nanobot&amp;severity=high&amp;id=69dec76b82d89c981f15e829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33414-cwe-78-improper-neutralization-of-s-cc0c50f6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33414%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20containers%20podman&amp;severity=medium&amp;id=69dec76b82d89c981f15e825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40688-execute-unauthorized-code-or-comman-bd6906da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40688%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69dec76b82d89c981f15e82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33023-cwe-416-use-after-free-in-saitoha-l-125281c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33023%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69debcd482d89c981f0dfd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33021-cwe-416-use-after-free-in-saitoha-l-76a24acb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33021%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69debcd482d89c981f0dfd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34619-improper-limitation-of-a-pathname-t-f76b20d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34619%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b1a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27308-uncontrolled-resource-consumption-c-bfe4703f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27308%3A%20Uncontrolled%20Resource%20Consumption%20(CWE-400)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=69deb96d82d89c981f0b1a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27282-improper-input-validation-cwe-20-in-bd70f457</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27282%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b19f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27305-improper-limitation-of-a-pathname-t-1553d8cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27305%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b19fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27304-improper-input-validation-cwe-20-in-1237c730</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27304%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=69deb96d82d89c981f0b19fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27306-improper-input-validation-cwe-20-in-a1295e82</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27306%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b1a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27307-uncontrolled-resource-consumption-c-0de89358</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27307%3A%20Uncontrolled%20Resource%20Consumption%20(CWE-400)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=69deb96d82d89c981f0b1a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33020-cwe-122-heap-based-buffer-overflow--12ac4054</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33020%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33019-cwe-125-out-of-bounds-read-in-saito-51d22ad7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33019%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33018-cwe-416-use-after-free-in-saitoha-l-56970cc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33018%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40291-cwe-269-improper-privilege-manageme-2c622c0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40291%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb97082d89c981f0b1a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35196-cwe-78-improper-neutralization-of-s-ff921618</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35196%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb5cc82d89c981f06f4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34602-cwe-639-authorization-bypass-throug-a0532f99</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34602%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb5cc82d89c981f06f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15565-cwe-862-missing-authorization-in-ca-8c9d9668</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15565%3A%20CWE-862%20Missing%20Authorization%20in%20cartasi%20Nexi%20XPay&amp;severity=medium&amp;id=69deb5cc82d89c981f06f4c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34370-cwe-285-improper-authorization-in-c-f70cafa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34370%3A%20CWE-285%3A%20Improper%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69deb5cc82d89c981f06f4c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39907-cwe-73-external-control-of-file-nam-baea18b5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39907%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Unisys%20WebPerfect%20Image%20Suite&amp;severity=high&amp;id=69deb5cc82d89c981f06f4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39906-cwe-441-unintended-proxy-or-interme-ff8fdb0c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39906%3A%20CWE-441%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20Unisys%20WebPerfect%20Image%20Suite&amp;severity=high&amp;id=69deb5cc82d89c981f06f4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34631-out-of-bounds-write-cwe-787-in-adob-a620ceb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34631%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69deb5cc82d89c981f06f4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34161-cwe-79-improper-neutralization-of-i-b1414ebb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34161%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69deaedd82d89c981f01938a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34160-cwe-306-missing-authentication-for--293e1607</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34160%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f019385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33715-cwe-306-missing-authentication-for--8c8fe980</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33715%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f019381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33714-cwe-89-improper-neutralization-of-s-ac72effa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33714%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f01937d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27287-out-of-bounds-read-cwe-125-in-adobe-6398376a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27287%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69deab4182d89c981ffdeb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25133-cwe-79-improper-neutralization-of-i-aa387956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25133%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69deab4182d89c981ffdeb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25125-cwe-200-exposure-of-sensitive-infor-e22a1d73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25125%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20octobercms%20october&amp;severity=medium&amp;id=69deab4182d89c981ffdeb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40683-cwe-843-access-of-resource-using-in-9348968e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40683%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20OpenStack%20Keystone&amp;severity=high&amp;id=69dea0b582d89c981ff4544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34630-heap-based-buffer-overflow-cwe-122--453b983d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34630%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27312-heap-based-buffer-overflow-cwe-122--d2990c18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27312%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27222-divide-by-zero-cwe-369-in-adobe-bri-14b1e4dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27222%3A%20Divide%20By%20Zero%20(CWE-369)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=69dea0b582d89c981ff45438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27310-heap-based-buffer-overflow-cwe-122--3fb0f672</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27310%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff4543b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27311-heap-based-buffer-overflow-cwe-122--4e7b3f13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27311%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff4543e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27313-heap-based-buffer-overflow-cwe-122--c75d6669</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27313%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27289-out-of-bounds-read-cwe-125-in-adobe-94754a4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27289%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=69de99bf82d89c981fef099d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34618-out-of-bounds-write-cwe-787-in-adob-e1917b6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34618%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69de99bf82d89c981fef09a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34625-cross-site-scripting-dom-based-xss--f94b9c5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34625%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe4811d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34623-cross-site-scripting-dom-based-xss--e68699eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34623%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe48117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34624-cross-site-scripting-dom-based-xss--d894ffd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34624%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe4811a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-exploited-sharepoint-zero-day-an-c39d9142</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Exploited%20SharePoint%20Zero-Day%20and%20160%20Other%20Vulnerabilities&amp;severity=medium&amp;id=69de849482d89c981fdf4394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27288-cross-site-scripting-stored-xss-cwe-2673fa14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27288%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de849e82d89c981fdf5f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0207-cwe-532-insertion-of-sensitive-infor-85e65230</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0207%3A%20CWE-532%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20PureStorage%20FlashBlade&amp;severity=high&amp;id=69de849e82d89c981fdf5f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5752-cwe-94-improper-control-of-generatio-b7af0b75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5752%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cohere%20cohere-terrarium&amp;severity=critical&amp;id=69de849e82d89c981fdf5f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0209-cwe-783-operator-precedence-logic-er-43d7927d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0209%3A%20CWE-783%20Operator%20precedence%20logic%20error%20in%20PureStorage%20FlashArray&amp;severity=medium&amp;id=69de849e82d89c981fdf5f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5756-cwe-306-missing-authentication-for-c-3ed63c52</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5756%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Data%20Recognition%20Corporation%20Central%20Office%20Services%20-%20Content%20Hosting%20Component&amp;severity=high&amp;id=69de849e82d89c981fdf5f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5754-cwe-79-improper-neutralization-of-in-1f4c1272</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Radware%20Alteon%20vADC&amp;severity=medium&amp;id=69de849e82d89c981fdf5f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-april-2026-tue-apr-14th-ed4dfe0d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20April%202026.%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dfb6ec82d89c981f6b43d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-rowhammer-attacks-targeting-gddr6-kaspersky--5f662a36</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20Rowhammer%20attacks%20targeting%20GDDR6%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69de7db882d89c981fd91337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24907-cwe-79-improper-neutralization-of-i-2ab6df42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24907%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69de99bf82d89c981fef09a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27303-deserialization-of-untrusted-data-c-dbcf2de2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27303%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de8b9f82d89c981fe48123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34617-cross-site-scripting-xss-cwe-79-in--9611df67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34617%3A%20Cross-site%20Scripting%20(XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=high&amp;id=69de92a582d89c981fe9f16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21331-cross-site-scripting-reflected-xss--73045699</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21331%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=69de8b9f82d89c981fe48120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27246-cross-site-scripting-dom-based-xss--d488fcd6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27246%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de849e82d89c981fdf5f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34614-cross-site-scripting-reflected-xss--c45222b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34614%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=69de99bf82d89c981fef09a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27245-cross-site-scripting-reflected-xss--e445a643</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27245%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de99bf82d89c981fef09a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34615-deserialization-of-untrusted-data-c-e3f24a99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34615%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de8b9f82d89c981fe48126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27243-cross-site-scripting-reflected-xss--039e8e2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27243%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de92a582d89c981fe9f167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24906-cwe-79-improper-neutralization-of-i-7323d364</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24906%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69df733482d89c981ff25cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34628-heap-based-buffer-overflow-cwe-122--823d92b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34628%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34629-heap-based-buffer-overflow-cwe-122--3bf0ac91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34629%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34627-heap-based-buffer-overflow-cwe-122--f3bc7c57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34627%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27258-out-of-bounds-write-cwe-787-in-adob-f0f6cfde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27258%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=69de7a1d82d89c981fd6a728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32214-cwe-284-improper-access-control-in--487e8f7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32214%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33829-cwe-200-exposure-of-sensitive-infor-437402c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33829%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3b82d89c981fd6cf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33824-cwe-415-double-free-in-microsoft-wi-87d9fb32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33824%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=critical&amp;id=69de7a3b82d89c981fd6cf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33827-cwe-362-concurrent-execution-using--233b55bc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33827%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33115-cwe-416-use-after-free-in-microsoft-7e929fae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33115%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33114-cwe-822-untrusted-pointer-dereferen-23fb5e26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33114%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33104-cwe-362-concurrent-execution-using--813cfc41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33104%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33103-cwe-284-improper-access-control-in--7d25ac01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33103%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.0&amp;severity=medium&amp;id=69de7a3a82d89c981fd6cf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33101-cwe-416-use-after-free-in-microsoft-f7043ff8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33101%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33100-cwe-416-use-after-free-in-microsoft-3cedc0f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33100%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33099-cwe-416-use-after-free-in-microsoft-b8b53f34</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33099%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32225-cwe-693-protection-mechanism-failur-c89d948c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32225%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3882d89c981fd6cef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32203-cwe-121-stack-based-buffer-overflow-e50458b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32203%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3682d89c981fd6bd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26171-cwe-400-uncontrolled-resource-consu-35b472ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26171%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32201-cwe-20-improper-input-validation-in-2c06b3ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32201%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32200-cwe-416-use-after-free-in-microsoft-8c849f94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32200%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32199-cwe-416-use-after-free-in-microsoft-02ca380a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32199%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32198-cwe-416-use-after-free-in-microsoft-f8733311</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32198%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32197-cwe-416-use-after-free-in-microsoft-f71c4eb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32197%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32196-cwe-79-improper-neutralization-of-i-59478f29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32196%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=medium&amp;id=69de7a3482d89c981fd6bcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32190-cwe-416-use-after-free-in-microsoft-cabcfa42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32190%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32176-cwe-89-improper-neutralization-of-s-2b96a9fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32176%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=medium&amp;id=69de7a3282d89c981fd6bcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32171-cwe-522-insufficiently-protected-cr-cbd219b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32171%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20Logic%20Apps&amp;severity=high&amp;id=69de7a3282d89c981fd6bcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32164-cwe-362-concurrent-execution-using--1208c733</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32164%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3282d89c981fd6bca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32163-cwe-362-concurrent-execution-using--7bc136e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32163%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32162-cwe-349-acceptance-of-extraneous-un-4d597109</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32162%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32155-cwe-416-use-after-free-in-microsoft-170d6614</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32155%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a3082d89c981fd6bc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32153-cwe-416-use-after-free-in-microsoft-864a1c45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32153%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32151-cwe-200-exposure-of-sensitive-infor-733dc983</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32151%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2e82d89c981fd6bc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32150-cwe-362-concurrent-execution-using--895cb39d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32150%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32149-cwe-20-improper-input-validation-in-6d462a7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32149%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32091-cwe-362-concurrent-execution-using--ca8b3dbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32091%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32088-cwe-362-concurrent-execution-using--98704c94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32088%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a2e82d89c981fd6bc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32086-cwe-362-concurrent-execution-using--8fa5cd49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32086%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32084-cwe-200-exposure-of-sensitive-infor-e73a4b1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32084%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32080-cwe-416-use-after-free-in-microsoft-a3c0dea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32080%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69de7a2b82d89c981fd6bba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32079-cwe-200-exposure-of-sensitive-infor-9d61e560</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32079%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2a82d89c981fd6bba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32078-cwe-416-use-after-free-in-microsoft-9e05253d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32078%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2a82d89c981fd6bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32077-cwe-822-untrusted-pointer-dereferen-4a7c3005</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32077%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2a82d89c981fd6bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32076-cwe-125-out-of-bounds-read-in-micro-e50ab91b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32076%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a2782d89c981fd6ba71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32074-cwe-415-double-free-in-microsoft-wi-6993a728</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32074%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2782d89c981fd6ba6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32072-cwe-287-improper-authentication-in--cb921f80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32072%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2782d89c981fd6ba65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32070-cwe-416-use-after-free-in-microsoft-c2a86ecf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32070%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32069-cwe-415-double-free-in-microsoft-wi-052e17b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32069%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2782d89c981fd6ba5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32068-cwe-362-concurrent-execution-using--8fa9958c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32068%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27930-cwe-125-out-of-bounds-read-in-micro-a028a6ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27930%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2482d89c981fd6ba0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27928-cwe-20-improper-input-validation-in-3af173ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27928%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69de7a2482d89c981fd6ba05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27925-cwe-416-use-after-free-in-microsoft-b2af4507</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27925%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2482d89c981fd6b9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27923-cwe-416-use-after-free-in-microsoft-a1d83d45</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27923%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27922-cwe-416-use-after-free-in-microsoft-9e17349b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27922%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27920-cwe-822-untrusted-pointer-dereferen-41e8c3a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27920%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27916-cwe-416-use-after-free-in-microsoft-8199ddd9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27916%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27914-cwe-284-improper-access-control-in--0c3c451b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27914%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27913-cwe-20-improper-input-validation-in-4fef816e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27913%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27912-cwe-285-improper-authorization-in-m-4d0501e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27912%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27911-cwe-362-concurrent-execution-using--5f29327a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27911%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27910-cwe-280-improper-handling-of-insuff-924af22b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27910%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27909-cwe-416-use-after-free-in-microsoft-5fd4b2ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27909%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26184-cwe-126-buffer-over-read-in-microso-ad60a26c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26184%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1d82d89c981fd6a725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26182-cwe-416-use-after-free-in-microsoft-dc67948f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26182%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26178-cwe-681-incorrect-conversion-betwee-60374287</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26178%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26177-cwe-416-use-after-free-in-microsoft-4466664b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26177%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26176-cwe-122-heap-based-buffer-overflow--3555ecfe</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26176%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26173-cwe-362-concurrent-execution-using--bc17a212</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26173%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26172-cwe-362-concurrent-execution-using--d4bfead1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26172%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26170-cwe-20-improper-input-validation-in-bd46df79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26170%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26169-cwe-126-buffer-over-read-in-microso-d0ca5e4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26169%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1882d89c981fd6a689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26168-cwe-362-concurrent-execution-using--7b02765b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26168%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26163-cwe-415-double-free-in-microsoft-wi-830867f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26163%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26159-cwe-306-missing-authentication-for--ad6e8baf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26159%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26156-cwe-122-heap-based-buffer-overflow--6a57a6f9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26156%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26153-cwe-125-out-of-bounds-read-in-micro-36bba8cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26153%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1682d89c981fd6a630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26152-cwe-922-insecure-storage-of-sensiti-68f2db89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26152%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26143-cwe-20-improper-input-validation-in-08916d7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26143%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20PowerShell%207.4&amp;severity=high&amp;id=69de7a1682d89c981fd6a624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23666-cwe-755-improper-handling-of-except-c8599af8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23666%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5&amp;severity=high&amp;id=69de7a1482d89c981fd6a5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23657-cwe-416-use-after-free-in-microsoft-172fe6dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23657%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a1482d89c981fd6a5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20806-cwe-843-access-of-resource-using-in-2db342f6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20806%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20928-cwe-212-improper-removal-of-sensiti-d55f0b35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20928%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32212-cwe-59-improper-link-resolution-bef-a8315ee6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32212%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33826-cwe-20-improper-input-validation-in-ed85b68e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33826%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33825-cwe-1220-insufficient-granularity-o-73be6db2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33825%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Microsoft%20Microsoft%20Defender%20Antimalware%20Platform&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33822-cwe-125-out-of-bounds-read-in-micro-97400ae0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33822%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=69de7a3a82d89c981fd6cf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33120-cwe-822-untrusted-pointer-dereferen-338cc6ab</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33120%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20(GDR)&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33116-cwe-835-loop-with-unreachable-exit--6d2e9668</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33116%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33098-cwe-416-use-after-free-in-microsoft-14fa30d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33098%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3882d89c981fd6ceff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33096-cwe-125-out-of-bounds-read-in-micro-f99fbaaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33096%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a3882d89c981fd6cefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33095-cwe-416-use-after-free-in-microsoft-72848262</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33095%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3882d89c981fd6cef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32226-cwe-362-concurrent-execution-using--694f061d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32226%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5%20AND%204.7.2&amp;severity=medium&amp;id=69de7a3882d89c981fd6cef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32224-cwe-416-use-after-free-in-microsoft-b1f0a247</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32224%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=high&amp;id=69de7a3882d89c981fd6cef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32223-cwe-122-heap-based-buffer-overflow--3c007cd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32223%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69de7a3882d89c981fd6ceed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32222-cwe-822-untrusted-pointer-dereferen-e2689638</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32222%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3882d89c981fd6ceea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32221-cwe-122-heap-based-buffer-overflow--473ffa00</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32221%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3882d89c981fd6cee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32220-cwe-284-improper-access-control-in--a2aa9aa4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32220%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69de7a3882d89c981fd6cee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32219-cwe-415-double-free-in-microsoft-wi-31dc6599</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32219%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3682d89c981fd6bd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32218-cwe-532-insertion-of-sensitive-info-269049f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32218%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32217-cwe-532-insertion-of-sensitive-info-8c9fae6c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32217%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32216-cwe-476-null-pointer-dereference-in-37c0ed57</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32216%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32215-cwe-532-insertion-of-sensitive-info-fd4d1ad6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32215%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32202-cwe-693-protection-mechanism-failur-2f0cf818</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32202%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32195-cwe-121-stack-based-buffer-overflow-9606beb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32195%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32192-cwe-502-deserialization-of-untruste-07ba7463</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32192%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32189-cwe-416-use-after-free-in-microsoft-b211091f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32188-cwe-125-out-of-bounds-read-in-micro-9b236598</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32188%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32184-cwe-502-deserialization-of-untruste-a3c0ec1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32184%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20HPC%20Pack%202019&amp;severity=high&amp;id=69de7a3282d89c981fd6bcbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32183-cwe-77-improper-neutralization-of-s-4b6f9ccb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32183%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3282d89c981fd6bcba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32181-cwe-269-improper-privilege-manageme-16c18e6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32181%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a3282d89c981fd6bcb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32178-cwe-138-improper-neutralization-of--1098599a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32178%3A%20CWE-138%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3282d89c981fd6bcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32168-cwe-20-improper-input-validation-in-d5b2309c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32168%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69de7a3282d89c981fd6bcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32167-cwe-89-improper-neutralization-of-s-4dfb3470</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32167%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=medium&amp;id=69de7a3282d89c981fd6bca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32165-cwe-416-use-after-free-in-microsoft-c826ca80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3282d89c981fd6bca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0390-cwe-807-reliance-on-untrusted-inputs-645ada93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0390%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32160-cwe-362-concurrent-execution-using--b0e2a872</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32160%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32159-cwe-362-concurrent-execution-using--f1bafff5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32159%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32158-cwe-362-concurrent-execution-using--9e8e2131</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32158%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32157-cwe-416-use-after-free-in-microsoft-c1ea29fc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32157%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=69de7a3082d89c981fd6bc86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32156-cwe-416-use-after-free-in-microsoft-1ff5b5c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32156%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3082d89c981fd6bc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32154-cwe-416-use-after-free-in-microsoft-69fdc6d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32154%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3082d89c981fd6bc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32152-cwe-416-use-after-free-in-microsoft-5e3440ee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32152%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32093-cwe-362-concurrent-execution-using--ec561814</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32093%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32090-cwe-362-concurrent-execution-using--cdda107b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32090%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32089-cwe-416-use-after-free-in-microsoft-257d5db1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32089%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32087-cwe-122-heap-based-buffer-overflow--46a63183</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32087%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32085-cwe-200-exposure-of-sensitive-infor-41cb0b72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32085%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32083-cwe-362-concurrent-execution-using--66cd44bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32083%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32082-cwe-362-concurrent-execution-using--ed659fd9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32082%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32081-cwe-200-exposure-of-sensitive-infor-eaa6be22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32081%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32075-cwe-416-use-after-free-in-microsoft-f193305b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32075%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32073-cwe-416-use-after-free-in-microsoft-3211bff7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32073%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32071-cwe-476-null-pointer-dereference-in-f3c1af73</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32071%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27931-cwe-125-out-of-bounds-read-in-micro-9cddb35d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27931%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a2782d89c981fd6ba56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27929-cwe-367-time-of-check-time-of-use-t-7832f9c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27929%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6ba08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27927-cwe-362-concurrent-execution-using--2bc68001</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27927%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2482d89c981fd6ba02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27926-cwe-362-concurrent-execution-using--e10b68a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27926%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2482d89c981fd6b9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27924-cwe-416-use-after-free-in-microsoft-377a37ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27924%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27921-cwe-362-concurrent-execution-using--62fdd6b4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27921%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27919-cwe-822-untrusted-pointer-dereferen-87fe2437</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27919%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27918-cwe-362-concurrent-execution-using--0668203c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27918%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27917-cwe-416-use-after-free-in-microsoft-7740877c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27917%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27915-cwe-416-use-after-free-in-microsoft-71e31363</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27915%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27908-cwe-416-use-after-free-in-microsoft-9fbfd6e5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27908%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27907-cwe-191-integer-underflow-wrap-or-w-3c6fcbdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27907%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1d82d89c981fd6a72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27906-cwe-20-improper-input-validation-in-15b1add6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27906%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a1d82d89c981fd6a72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26183-cwe-284-improper-access-control-in--e52fa728</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26183%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a1d82d89c981fd6a722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26181-cwe-416-use-after-free-in-microsoft-0ec1d3f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26181%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1d82d89c981fd6a71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26180-cwe-122-heap-based-buffer-overflow--9ff59786</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26180%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26179-cwe-415-double-free-in-microsoft-wi-eef77c20</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26179%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26175-cwe-908-use-of-uninitialized-resour-152461da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26175%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1b82d89c981fd6a6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26174-cwe-362-concurrent-execution-using--28417f6f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26174%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26167-cwe-362-concurrent-execution-using--55e636ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26167%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26166-cwe-415-double-free-in-microsoft-wi-9232decb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26166%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1882d89c981fd6a680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26165-cwe-416-use-after-free-in-microsoft-abfbc4b8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1882d89c981fd6a67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26162-cwe-843-access-of-resource-using-in-db050af1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26162%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26161-cwe-822-untrusted-pointer-dereferen-41499af6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26161%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1882d89c981fd6a674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26160-cwe-306-missing-authentication-for--0ab417a0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26160%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26155-cwe-126-buffer-over-read-in-microso-490c3d1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26155%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1682d89c981fd6a636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26154-cwe-20-improper-input-validation-in-68836085</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26154%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a1682d89c981fd6a633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26151-cwe-357-insufficient-ui-warning-of--baf70412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26151%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26149-cwe-150-improper-neutralization-of--adf80a1e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26149%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Microsoft%20Microsoft%20Power%20Apps&amp;severity=critical&amp;id=69de7a1682d89c981fd6a627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23670-cwe-822-untrusted-pointer-dereferen-0022d68e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23670%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20945-cwe-79-improper-neutralization-of-i-ac52a74d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20945%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25184-cwe-362-concurrent-execution-using--2773ff78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25184%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1682d89c981fd6a621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23653-cwe-77-improper-neutralization-of-s-a7104260</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23653%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20930-cwe-362-concurrent-execution-using--d0dc4957</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20930%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1482d89c981fd6a5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22692-cwe-693-protection-mechanism-failur-9f968e3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22692%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20octobercms%20october&amp;severity=medium&amp;id=69de731682d89c981fcd5a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-55-vulnerabilities-across-11-product-19dbeb63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2055%20Vulnerabilities%20Across%2011%20Products&amp;severity=critical&amp;id=69de730182d89c981fcd5435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27284-out-of-bounds-read-cwe-125-in-adobe-7d74c03d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27284%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27285-heap-based-buffer-overflow-cwe-122--d9d30173</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27285%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69de731682d89c981fcd5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27286-heap-based-buffer-overflow-cwe-122--4630805d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27286%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69de731682d89c981fcd5a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27283-use-after-free-cwe-416-in-adobe-ind-6947ba14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27283%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27238-heap-based-buffer-overflow-cwe-122--f7fd79e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27238%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27291-out-of-bounds-write-cwe-787-in-adob-27b71255</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27291%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34622-improperly-controlled-modification--0326b95e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34622%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69de6c0582d89c981fc4d748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34626-improperly-controlled-modification--bd4cf4c2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34626%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69de6c0582d89c981fc4d74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61624-escalation-of-privilege-in-fortinet-171166f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61624%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69de650582d89c981fbed4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68649-escalation-of-privilege-in-fortinet-a0698cd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68649%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=69de650582d89c981fbed4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21741-execute-unauthorized-code-or-comman-0f7a52d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21741%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiNAC-F&amp;severity=low&amp;id=69de650582d89c981fbed4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39813-escalation-of-privilege-in-fortinet-082bcf5d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39813%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSandbox&amp;severity=critical&amp;id=69de650a82d89c981fbf0910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61848-execute-unauthorized-code-or-comman-458240a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61848%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=69de650582d89c981fbed4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22828-escalation-of-privilege-in-fortinet-0564d74b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22828%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAnalyzer%20Cloud&amp;severity=high&amp;id=69de650782d89c981fbf0855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39815-execute-unauthorized-code-or-comman-d6a1fcb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39815%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiDDoS-F&amp;severity=high&amp;id=69de650a82d89c981fbf0916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22573-information-disclosure-in-fortinet--07902490</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22573%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650782d89c981fbf084c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61886-execute-unauthorized-code-or-comman-5a3555e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61886%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39810-information-disclosure-in-fortinet--75ea6d30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39810%3A%20Information%20disclosure%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69de650782d89c981fbf0864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39811-denial-of-service-in-fortinet-forti-2563cace</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39811%3A%20Denial%20of%20service%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69de650a82d89c981fbf090a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23104-information-disclosure-in-fortinet--1b48f58e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23104%3A%20Information%20disclosure%20in%20Fortinet%20FortiVoice&amp;severity=medium&amp;id=69de650582d89c981fbed4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39812-execute-unauthorized-code-or-comman-5b024998</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39812%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69de650a82d89c981fbf090d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23708-escalation-of-privilege-in-fortinet-4da37711</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23708%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf0858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39814-execute-unauthorized-code-or-comman-c67b5e5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39814%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69de650a82d89c981fbf0913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25691-execute-unauthorized-code-or-comman-ba5ba8c1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25691%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf085b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59809-information-disclosure-in-fortinet--f1b923ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59809%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650582d89c981fbed4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22155-information-disclosure-in-fortinet--32ef1497</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22155%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650782d89c981fbf0849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21742-information-disclosure-in-fortinet--5a5a88a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21742%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/108-chrome-extensions-linked-to-data-exfiltration--8c012474</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=108%20Chrome%20Extensions%20Linked%20to%20Data%20Exfiltration%20and%20Session%20Theft%20via%20Shared%20C2%20Infrastructure&amp;severity=medium&amp;id=69de616b82d89c981fbc694d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22574-information-disclosure-in-fortinet--7c8cd4e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22574%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf084f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22154-escalation-of-privilege-in-fortinet-67e3b19b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22154%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53847-execute-unauthorized-code-or-comman-5f90cc02</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53847%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69de650582d89c981fbed4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22576-information-disclosure-in-fortinet--eccd0793</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22576%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf0852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27316-information-disclosure-in-fortinet--23983c6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27316%3A%20Information%20disclosure%20in%20Fortinet%20FortiSandbox&amp;severity=low&amp;id=69de650782d89c981fbf085e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39808-execute-unauthorized-code-or-comman-af629bfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39808%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=critical&amp;id=69de650782d89c981fbf0861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2401-cwe-532-insertion-of-sensitive-infor-d453bf47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2401%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=low&amp;id=69de5dec82d89c981fb97446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2400-cwe-93-improper-neutralization-of-cr-d42f5774</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2400%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2403-cwe-1284-improper-validation-of-spec-9964a9ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2403%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2405-cwe-400-uncontrolled-resource-consum-f72b6df0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2405%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2402-cwe-307-improper-restriction-of-exce-64f33449</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2402%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2404-cwe-116-improper-encoding-or-escapin-b02daa7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2404%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5713-cwe-121-stack-based-buffer-overflow--f68faa6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5713%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69de5df182d89c981fb975c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2399-cwe-22-improper-limitation-of-a-path-c929fbb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2399%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39809-execute-unauthorized-code-or-comman-ed3cd125</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39809%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69de5df182d89c981fb975ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4832-cwe-798-use-of-hard-coded-credential-ebfe7271</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4832%3A%20CWE-798%20Use%20of%20Hard-Coded%20Credentials%20in%20Schneider%20Electric%20Easergy%20MiCOM%20P14x&amp;severity=medium&amp;id=69de5df182d89c981fb975bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37980-improper-neutralization-of-input-du-20974fc9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69de56e582d89c981fb1904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4914-cwe-79-improper-neutralization-of-in-71edc76f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4914%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Ivanti%20Neurons%20for%20ITSM%20(On-Premise)&amp;severity=medium&amp;id=69de4ff282d89c981fa84ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4913-cwe-424-improper-protection-of-alter-48b0cd1c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4913%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20Ivanti%20Neurons%20for%20ITSM%20(On-Premise)&amp;severity=medium&amp;id=69de4ff282d89c981fa84c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/59-victims-zero-authentication-a-clickfix-campaign-64ad7f8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=59%20Victims%2C%20Zero%20Authentication%3A%20A%20ClickFix%20Campaign%20Force-Installs%20a%20Chrome%20Extension%20Banking%20Stealer%20and%20Leaves%20the%20Entire%20C2%20Wide%20Open&amp;severity=medium&amp;id=69de4c5382d89c981fa44b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4344-cwe-79-cross-site-scripting-xss-stor-9662e895</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4344%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4345-cwe-79-cross-site-scripting-xss-stor-de128268</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4345%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4369-cwe-79-cross-site-scripting-xss-stor-c9a1cc3b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4369%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8095-cwe-257-in-progress-software-corpora-f20f50ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8095%3A%20CWE-257%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=critical&amp;id=69de455082d89c981f9c8aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7389-cwe-552-in-progress-software-corpora-c6476335</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7389%3A%20CWE-552%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=high&amp;id=69de455082d89c981f9c8a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mythos-ready-security-csa-urges-cisos-to-prepare-f-bf8a68c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Mythos-Ready%E2%80%99%20Security%3A%20CSA%20Urges%20CISOs%20to%20Prepare%20for%20Accelerated%20AI%20Threats&amp;severity=high&amp;id=69de3ac082d89c981f8db41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europes-largest-gym-chain-says-data-breach-impacts-d650bf86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europe%E2%80%99s%20Largest%20Gym%20Chain%20Says%20Data%20Breach%20Impacts%201%20Million%20Members&amp;severity=medium&amp;id=69de373c82d89c981f5ace10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2450-cwe-520-net-misconfiguration-use-of--335f73f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2450%3A%20CWE-520%20.NET%20misconfiguration%3A%20use%20of%20impersonation%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=high&amp;id=69de374582d89c981f5b1485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2449-cwe-88-improper-neutralization-of-ar-cd196faa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2449%3A%20CWE-88%20Improper%20neutralization%20of%20argument%20delimiters%20in%20a%20command%20(&apos;argument%20injection&apos;)%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=critical&amp;id=69de303282d89c981f2e25f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24069-cwe-863-incorrect-authorization-in--a08b3733</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24069%3A%20CWE-863%20Incorrect%20Authorization%20in%20Kiuwan%20SAST&amp;severity=medium&amp;id=69de292b82d89c981f2a390c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-abap-vulnerability-a01b2740</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20ABAP%20Vulnerability&amp;severity=critical&amp;id=69de25a882d89c981f28f984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2332-cwe-444-inconsistent-interpretation--174fc831</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2332%3A%20CWE-444%20Inconsistent%20interpretation%20of%20HTTP%20requests%20(&apos;HTTP%20Request%2FResponse%20smuggling&apos;)%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69de25ad82d89c981f28fd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/triad-nexus-evades-sanctions-to-fuel-cybercrime-14f3246a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Triad%20Nexus%20Evades%20Sanctions%20to%20Fuel%20Cybercrime&amp;severity=medium&amp;id=69de1e9f82d89c981f23508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-adds-rust-dns-parser-to-pixel-phones-for-be-4f83f373</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Adds%20Rust%20DNS%20Parser%20to%20Pixel%20Phones%20for%20Better%20Security&amp;severity=low&amp;id=69de179782d89c981f1f8f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nightclub-giant-rci-hospitality-reports-data-breac-bed7c779</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nightclub%20Giant%20RCI%20Hospitality%20Reports%20Data%20Breach&amp;severity=medium&amp;id=69de0d0c82d89c981f1a3e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-windows-adobe-ac-ff246528</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Windows%2C%20Adobe%20Acrobat%20Vulnerabilities&amp;severity=low&amp;id=69de028082d89c981f1493f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pretexting-based-targeted-intrusion-analysis-of-fa-f57a71c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pretexting-Based%20Targeted%20Intrusion%3A%20Analysis%20of%20Facebook%20Reconnaissance%20and%20Software%20Tampering%20Attacks&amp;severity=medium&amp;id=69de099282d89c981f185723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/q1-2026-malware-statistics-report-for-linux-ssh-se-45d5088d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Q1%202026%20Malware%20Statistics%20Report%20for%20Linux%20SSH%20Servers&amp;severity=medium&amp;id=69de099282d89c981f18573a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/q1-2026-malware-statistics-report-for-windows-data-beb6a9fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Q1%202026%20Malware%20Statistics%20Report%20for%20Windows%20Database%20Servers&amp;severity=medium&amp;id=69de099282d89c981f18573e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33892-cwe-305-authentication-bypass-by-pr-d1d1565e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33892%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Siemens%20Industrial%20Edge%20Management%20Pro%20V1&amp;severity=high&amp;id=69de028682d89c981f14951c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27668-cwe-266-incorrect-privilege-assignm-3966ad74</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27668%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Siemens%20RUGGEDCOM%20CROSSBOW%20Secure%20Access%20Manager%20Primary%20(SAM-P)&amp;severity=high&amp;id=69de028682d89c981f149516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25654-cwe-639-authorization-bypass-throug-94590bb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25654%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=69de028682d89c981f149513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24032-cwe-347-improper-verification-of-cr-59b40820</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24032%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=69de028682d89c981f149510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40745-cwe-295-improper-certificate-valida-40b15c00</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40745%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20Siemens%20Software%20Center&amp;severity=low&amp;id=69de028682d89c981f14950d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31923-cwe-319-cleartext-transmission-of-s-568d8687</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31923%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=high&amp;id=69de028682d89c981f149519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33929-cwe-22-improper-limitation-of-a-pat-2d3fd231</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33929%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20PDFBox%20Examples&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31924-cwe-319-cleartext-transmission-of-s-194e8ae1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31924%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31908-cwe-75-failure-to-sanitize-special--741cc648</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31908%3A%20CWE-75%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=critical&amp;id=69ddf7fa82d89c981f0815e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4109-cwe-862-missing-authorization-in-arr-dc2bacc4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4109%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2582-cwe-94-improper-control-of-generatio-55d074f6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2582%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vendidero%20Germanized%20for%20WooCommerce&amp;severity=medium&amp;id=69dde66a82d89c981ffc957b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3017-cwe-502-deserialization-of-untrusted-13c099d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3017%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shapedplugin%20Smart%20Post%20Show%20%E2%80%93%20Post%20Grid%2C%20Post%20Carousel%20%26%20Slider%2C%20and%20List%20Category%20Posts&amp;severity=high&amp;id=69ddd4cb82d89c981fef0e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4059-cwe-79-improper-neutralization-of-in-714c11b5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=medium&amp;id=69ddbc3182d89c981fc24dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4479-cwe-79-improper-neutralization-of-in-f0bfaad2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodefactory%20WholeSale%20Products%20Dynamic%20Pricing%20Management%20WooCommerce&amp;severity=medium&amp;id=69ddbc3182d89c981fc24de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1607-cwe-79-improper-neutralization-of-in-0a460d9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20Booking.com%20Shortcode&amp;severity=medium&amp;id=69ddbc3182d89c981fc24dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40313-cwe-829-inclusion-of-functionality--2d33a73b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40313%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40289-cwe-306-missing-authentication-for--874e515b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40289%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40288-cwe-78-improper-neutralization-of-s-06bb92e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40288%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40287-cwe-94-improper-control-of-generati-5261cfa0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40287%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69ddbc3182d89c981fc24dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40315-cwe-89-improper-neutralization-of-s-999a7473</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40315%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69ddbc3182d89c981fc24dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4388-cwe-79-improper-neutralization-of-in-167b94fc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69ddaa9d82d89c981fae6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6227-cwe-22-improper-limitation-of-a-path-032a5e88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6227%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=high&amp;id=69ddaa9d82d89c981fae6a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-14th-2026-httpsisc-7c596c94</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%2014th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9890%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dda00f82d89c981fa6090a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6264-cwe-306-missing-authentication-for-c-26a424cb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6264%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Talend%20Talend%20JobServer&amp;severity=critical&amp;id=69ddaa9d82d89c981fae6a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39426-cwe-79-improper-neutralization-of-i-9106c343</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39426%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd9c8b82d89c981fa1192c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4352-cwe-89-improper-neutralization-of-sp-cdc75f12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4352%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69dd9c8b82d89c981fa11930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4365-cwe-862-missing-authorization-in-thi-8046e47d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4365%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=critical&amp;id=69dd9c8b82d89c981fa11934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39425-cwe-80-improper-neutralization-of-s-7656d9e4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39425%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd9c8b82d89c981fa11928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39419-cwe-74-improper-neutralization-of-s-734f4c72</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39419%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=low&amp;id=69dd9c8b82d89c981fa11923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39424-cwe-1236-improper-neutralization-of-e6ee8a15</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39424%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958b82d89c981f9c58a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39423-cwe-79-improper-neutralization-of-i-4b9705b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39423%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c582f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39422-cwe-79-improper-neutralization-of-i-0c702d0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39422%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c582a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39421-cwe-693-protection-mechanism-failur-b21ad8fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39421%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c5825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39420-cwe-693-protection-mechanism-failur-44d68598</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39420%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c5820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34264-cwe-204-observable-response-discrep-8e45814a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34264%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20SAP_SE%20SAP%20Human%20Capital%20Management%20for%20SAP%20S%2F4HANA&amp;severity=medium&amp;id=69dd958882d89c981f9c5817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34262-cwe-522-insufficiently-protected-cr-cde26fc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34262%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SAP_SE%20SAP%20HANA%20Cockpit%20and%20HANA%20Database%20Explorer&amp;severity=medium&amp;id=69dd958882d89c981f9c5813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34261-cwe-862-missing-authorization-in-sa-c726a93c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34261%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Analytics%20and%20SAP%20Content%20Management&amp;severity=medium&amp;id=69dd958882d89c981f9c580f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39418-cwe-918-server-side-request-forgery-badcbb3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39418%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c581b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34257-cwe-601-url-redirection-to-untruste-3a3250f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34257%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=medium&amp;id=69dd958882d89c981f9c580b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34256-cwe-862-missing-authorization-in-sa-6bf07d71</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34256%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20ERP%20and%20SAP%20S%2F4%20HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=high&amp;id=69dd958882d89c981f9c5807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27683-cwe-79-improper-neutralization-of-i-03fa2e5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69dd877882d89c981f920dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27681-cwe-89-improper-neutralization-of-s-a7704991</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27681%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20Business%20Planning%20and%20Consolidation%20and%20SAP%20Business%20Warehouse&amp;severity=critical&amp;id=69dd877882d89c981f920dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27679-cwe-862-missing-authorization-in-sa-90db80ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27679%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Frontend%20OData%20Service%20(Manage%20Reference%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27678-cwe-862-missing-authorization-in-sa-b49825de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27678%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Backend%20OData%20Service%20(Manage%20Reference%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27677-cwe-862-missing-authorization-in-sa-5a7f4542</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27677%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20OData%20Service%20(Manage%20Reference%20Equipment)&amp;severity=medium&amp;id=69dd877482d89c981f91f534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27676-cwe-862-missing-authorization-in-sa-f0093fbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27676%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20OData%20Service%20(Manage%20Technical%20Object%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27675-cwe-94-improper-control-of-generati-d79b5e7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27675%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Landscape%20Transformation&amp;severity=low&amp;id=69dd877482d89c981f91f52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27674-cwe-94-improper-control-of-generati-017daca5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27674%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java%20(Web%20Dynpro%20Java)&amp;severity=medium&amp;id=69dd877482d89c981f91f528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27673-cwe-862-missing-authorization-in-sa-0d3d76b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27673%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=medium&amp;id=69dd877482d89c981f91f524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27672-cwe-862-missing-authorization-in-sa-cbb9e4e4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27672%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20Material%20Master%20Application&amp;severity=medium&amp;id=69dd877482d89c981f91f520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24318-cwe-539-use-of-persistent-cookies-c-b5e0c8eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24318%3A%20CWE-539%3A%20Use%20of%20Persistent%20Cookies%20Containing%20Sensitive%20Information%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69dd877482d89c981f91f51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0512-cwe-79-improper-neutralization-of-in-f12252f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0512%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(SICF%20Handler%20in%20SRM%20Catalog)&amp;severity=medium&amp;id=69dd877482d89c981f91f518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39417-cwe-78-improper-neutralization-of-s-4644a8c0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39417%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd877882d89c981f920dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-15-4bca6267</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-15&amp;severity=medium&amp;id=69df507382d89c981fb85c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-14-de7e96bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-14&amp;severity=medium&amp;id=69ded8ea82d89c981f22a762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70023-na-8e2b761a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70023%3A%20n%2Fa&amp;severity=critical&amp;id=69de7a1482d89c981fd6a5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38533-na-76357efe</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38533%3A%20n%2Fa&amp;severity=medium&amp;id=69de5def82d89c981fb974df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38532-na-9e2b1a7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38532%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38530-na-2a555f71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38530%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38529-na-707c3506</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38529%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38528-na-96f7457a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38528%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38527-na-61b4f49b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38527%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38526-na-df6c8898</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38526%3A%20n%2Fa&amp;severity=critical&amp;id=69de5def82d89c981fb974c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65136-na-7288dd01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65136%3A%20n%2Fa&amp;severity=medium&amp;id=69de5dec82d89c981fb9743d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65135-na-31ed1bec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65135%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb9743a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65134-na-7cf4c1e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65134%3A%20n%2Fa&amp;severity=null&amp;id=69de5dec82d89c981fb97437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65133-na-972d16f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65133%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb97434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65132-na-f679a329</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65132%3A%20n%2Fa&amp;severity=medium&amp;id=69de5dec82d89c981fb97431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63939-na-64059743</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63939%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb9742e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69993-na-c06fcbbf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69993%3A%20n%2Fa&amp;severity=medium&amp;id=69de56e582d89c981fb19049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69893-na-68897447</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69893%3A%20n%2Fa&amp;severity=medium&amp;id=69de56e582d89c981fb19045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37602-na-75e0d8cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37602%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37601-na-c6edace0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37601%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37600-na-9dcd1e03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37600%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37598-na-a4dc131b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37598%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37597-na-672bf1be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37597%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37596-na-9b822437</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37596%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37595-na-e4e245bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37595%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37594-na-f4237f0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37594%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37593-na-b3454f76</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37593%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37592-na-24e4e97b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37592%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37591-na-d31493d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37591%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37590-na-442af028</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37590%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37589-na-fc0502ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37589%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30480-na-bf48b2a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30480%3A%20n%2Fa&amp;severity=medium&amp;id=69de4fef82d89c981fa84b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61260-na-0294716d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61260%3A%20n%2Fa&amp;severity=critical&amp;id=69de4fef82d89c981fa84b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31049-na-bfd86452</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31049%3A%20n%2Fa&amp;severity=critical&amp;id=69de455082d89c981f9c8aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-14-62da04f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-14&amp;severity=low&amp;id=69dda38b82d89c981fa8a874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34069-cwe-617-reachable-assertion-in-nimi-b4043ed2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34069%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20nimiq%20core-rs-albatross&amp;severity=medium&amp;id=69dd877882d89c981f920dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33948-cwe-170-improper-null-termination-i-a19631d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33948%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20jqlang%20jq&amp;severity=low&amp;id=69dd83f182d89c981f8ff256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40164-cwe-328-use-of-weak-hash-in-jqlang--2e4df7f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40164%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20jqlang%20jq&amp;severity=high&amp;id=69dd83f182d89c981f8ff25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5086-cwe-208-observable-timing-discrepanc-a3e1c12b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5086%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20NERDVANA%20Crypt%3A%3ASecretBuffer&amp;severity=high&amp;id=69dd75df82d89c981f793936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6203-cwe-601-url-redirection-to-untrusted-33a1f48a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6203%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69dd725c82d89c981f75a06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39979-cwe-125-out-of-bounds-read-in-jqlan-ef659246</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39979%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd725c82d89c981f75a06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39956-cwe-125-out-of-bounds-read-in-jqlan-b9793416</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39956%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd6ed782d89c981f72b22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4786-cwe-77-in-python-software-foundation-0859811e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4786%3A%20CWE-77%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69dd67d182d89c981f6a0138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33947-cwe-674-uncontrolled-recursion-in-j-e92b8dcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33947%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd67d182d89c981f6a0134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22563-cwe-20-improper-input-validation-in-4175b900</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22563%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22562-cwe-22-path-traversal-in-ubiquiti-i-464fb9b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22562%3A%20CWE-22%20Path%20Traversal%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22566-cwe-284-improper-access-control-gen-119ad1e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22566%3A%20CWE-284%20Improper%20Access%20Control%20-%20Generic%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=high&amp;id=69dd644b82d89c981f67c51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22565-cwe-20-improper-input-validation-in-bf7c6da9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22565%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=high&amp;id=69dd644b82d89c981f67c517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22564-cwe-284-improper-access-control-gen-9d486d7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22564%3A%20CWE-284%20Improper%20Access%20Control%20-%20Generic%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6224-sandbox-issue-in-nocobase-plugin-wor-972a9f2b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6224%3A%20Sandbox%20Issue%20in%20nocobase%20plugin-workflow-javascript&amp;severity=medium&amp;id=69dd60c882d89c981f657d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6220-server-side-request-forgery-in-humme-1003d9ad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6220%3A%20Server-Side%20Request%20Forgery%20in%20HummerRisk&amp;severity=medium&amp;id=69dd60c882d89c981f657cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6219-command-injection-in-aandrew-me-ytdo-7fe71fa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6219%3A%20Command%20Injection%20in%20aandrew-me%20ytDownloader&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6218-cross-site-scripting-in-aandrew-me-y-047a4078</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6218%3A%20Cross%20Site%20Scripting%20in%20aandrew-me%20ytDownloader&amp;severity=medium&amp;id=69dd563d82d89c981f59ffe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32272-cwe-89-improper-neutralization-of-s-d6729621</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32272%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69dd563d82d89c981f59ffd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32271-cwe-89-improper-neutralization-of-s-99cfae41</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32271%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69dd563d82d89c981f59ffd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6216-cross-site-scripting-in-dbgate-0a91b1d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6216%3A%20Cross%20Site%20Scripting%20in%20DbGate&amp;severity=medium&amp;id=69dd563d82d89c981f59ffe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32270-cwe-200-exposure-of-sensitive-infor-420217a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32270%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20commerce&amp;severity=low&amp;id=69dd4f3582d89c981f535a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6215-server-side-request-forgery-in-dbgat-f0b18b6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6215%3A%20Server-Side%20Request%20Forgery%20in%20DbGate&amp;severity=medium&amp;id=69de21bb82d89c981f275285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6202-sql-injection-in-code-projects-easy--bef2f821</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6202%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69dd44ab82d89c981f46e105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6201-improper-access-controls-in-codeastr-5f178a95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6201%3A%20Improper%20Access%20Controls%20in%20CodeAstro%20Online%20Job%20Portal&amp;severity=medium&amp;id=69dd44ab82d89c981f46e0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32605-cwe-125-out-of-bounds-read-in-nimiq-f8a5cdff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32605%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69dd44ab82d89c981f46e0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6200-stack-based-buffer-overflow-in-tenda-8a88ed16</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6200%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd3da482d89c981f3fccd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6199-stack-based-buffer-overflow-in-tenda-30cccc87</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6199%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd3da482d89c981f3fccca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6198-stack-based-buffer-overflow-in-tenda-4cf4d0af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6198%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd369b82d89c981f375085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40044-deserialization-of-untrusted-data-i-ddf575cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40044%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pancho%20Pachno&amp;severity=critical&amp;id=69dd369b82d89c981f37507a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40043-authorization-bypass-through-user-c-cd03f12c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40043%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f375076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40042-exposure-of-file-descriptor-to-unin-57db4884</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40042%3A%20Exposure%20of%20File%20Descriptor%20to%20Unintended%20Control%20Sphere%20(&apos;File%20Descriptor%20Leak&apos;)%20in%20pancho%20Pachno&amp;severity=critical&amp;id=69dd369b82d89c981f375072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40041-cross-site-request-forgery-csrf-in--f30108bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40041%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pancho%20Pachno&amp;severity=medium&amp;id=69dd369b82d89c981f37506e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40040-unrestricted-upload-of-file-with-da-ac271a05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40040%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f37506a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40039-authentication-bypass-by-primary-we-45f81d73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40039%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f375066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40038-improper-neutralization-of-input-du-7c227709</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40038%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pancho%20Pachno&amp;severity=medium&amp;id=69dd369b82d89c981f375062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6197-stack-based-buffer-overflow-in-tenda-1b570bd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6197%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd369b82d89c981f37507e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32316-cwe-122-heap-based-buffer-overflow--67a3b592</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32316%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20jqlang%20jq&amp;severity=high&amp;id=69dd2f9182d89c981f2dce11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6196-stack-based-buffer-overflow-in-tenda-d5008aaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6196%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd2f9182d89c981f2dce15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6195-os-command-injection-in-totolink-a71-657b0a43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6195%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dd369e82d89c981f37511d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6100-cwe-416-use-after-free-in-python-sof-0f033ecb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6100%3A%20CWE-416%20Use%20after%20free%20in%20Python%20Software%20Foundation%20CPython&amp;severity=critical&amp;id=69dd2f9182d89c981f2dce1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6194-stack-based-buffer-overflow-in-totol-a26bfb9e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6194%3A%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20A3002MU&amp;severity=high&amp;id=69dd44ab82d89c981f46e10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28291-cwe-78-improper-neutralization-of-s-96ab636e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28291%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20steveukx%20git-js&amp;severity=high&amp;id=69de21bb82d89c981f27528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3756-cwe-1284-improper-validation-of-spec-7704dd12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3756%3A%20CWE-1284%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20ABB%20AC800M%20(System%20800xA)&amp;severity=high&amp;id=69dd369e82d89c981f37511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6193-sql-injection-in-phpgurukul-daily-ex-c7eac9ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6193%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracking%20System&amp;severity=medium&amp;id=69de21bb82d89c981f275299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6192-integer-overflow-in-uclouvain-openjp-ef28e36c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6192%3A%20Integer%20Overflow%20in%20uclouvain%20openjpeg&amp;severity=medium&amp;id=69de21bb82d89c981f275290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39940-cwe-601-url-redirection-to-untruste-2a35287b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39940%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69dd1e0282d89c981f1b771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6191-sql-injection-in-itsourcecode-constr-e5549c5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6191%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b772c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6190-sql-injection-in-itsourcecode-constr-0f179bdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6190%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b7725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6189-sql-injection-in-sourcecodester-phar-96023dda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6189%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b771e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31991-cwe-307-improper-restriction-of-exc-c5c21653</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31991%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20HCLSoftware%20Velocity&amp;severity=medium&amp;id=69dd138382d89c981f0e28d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6188-sql-injection-in-sourcecodester-phar-06fa6ee4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6188%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd138382d89c981f0e28e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6231-cwe-20-improper-input-validation-in--97f26bbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6231%3A%20CWE-20%20Improper%20input%20validation%20in%20MongoDB%20Inc.%20C%20Driver&amp;severity=medium&amp;id=69dd138382d89c981f0e28ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6187-sql-injection-in-sourcecodester-phar-aea1d8b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6187%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd138382d89c981f0e28df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6186-buffer-overflow-in-utt-hiper-1200gw-043a1972</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6186%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69dd0c8782d89c981f09c95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-reader-0-day-96bf67be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Reader%200-day&amp;severity=medium&amp;id=69dd08e282d89c981f03878d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polymarket-trader-funds-at-risk-dprk-npm-package-s-2ee92661</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Polymarket%20Trader%20Funds%20at%20Risk%3A%20DPRK%20npm%20Package%20Steals%20Wallet%20Keys%20and%20Installs%20SSH%20Backdoor&amp;severity=medium&amp;id=69dd171882d89c981f125412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/live-c2-dump-recovering-every-stage-of-the-kill-ch-709bdb72</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Live%20C2%20Dump%20Recovering%20Every%20Stage%20of%20the%20Kill%20Chain%3A%20CHM%20Dropper%2C%20VBScript%20Stager%2C%20PowerShell%20Keylogger&amp;severity=medium&amp;id=69dd171882d89c981f12541a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-recruiter-campaign-targets-crypto-developers--85147d94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20recruiter%20campaign%20targets%20crypto%20developers%20with%20RAT&amp;severity=medium&amp;id=69dd137d82d89c981f0e1bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/refundee-inside-a-shadow-panel-phishing-as-a-servi-e71e8c6b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=REFUNDEE%3A%20Inside%20a%20Shadow%20Panel%20Phishing-as-a-Service%20Operation&amp;severity=medium&amp;id=69dd0fea82d89c981f0adb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-an-ottercookie-infostealer-campaign-acros-5d5ba2f6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20an%20OtterCookie%20Infostealer%20Campaign%20Across%20npm&amp;severity=medium&amp;id=69dd0c6682d89c981f09ae9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6184-cross-site-scripting-in-code-project-ba5c4786</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6184%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd0c8782d89c981f09c954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1462-cwe-502-deserialization-of-untrusted-6e6c5fa9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1462%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20keras-team%20keras-team%2Fkeras&amp;severity=high&amp;id=69dd057082d89c981f016d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6183-sql-injection-in-code-projects-simpl-974105a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6183%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd057082d89c981f016da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-targets-arabian-gulf-region-with-plug-40a84b9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Targets%20Arabian%20Gulf%20Region%20With%20PlugX&amp;severity=medium&amp;id=69dd01da82d89c981ff9dcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33858-cwe-502-deserialization-of-untruste-c129833d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33858%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dd057082d89c981f016d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6182-sql-injection-in-code-projects-simpl-82289a0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6182%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd057082d89c981f016d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-android-rat-turning-infected-devices-into-po-1b096751</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Android%20RAT%20turning%20infected%20devices%20into%20potential%20residential%20proxy%20nodes&amp;severity=medium&amp;id=69dd01db82d89c981ff9dd2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookingcom-says-hackers-accessed-user-information-fe24f788</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Booking.com%20Says%20Hackers%20Accessed%20User%20Information&amp;severity=medium&amp;id=69dcfe5782d89c981ff7af6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66236-cwe-532-insertion-of-sensitive-info-d9544988</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66236%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dd057082d89c981f016d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-leverage-claude-code-leak-as-social--8f910002</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Leverage%20Claude%20Code%20Leak%20as%20Social%20Engineering%20Lure%20to%20Distribute%20Malicious%20Payloads%20via%20GitHub&amp;severity=medium&amp;id=69dd01db82d89c981ff9dd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/browsergate-claims-of-linkedin-spying-clash-with-s-385b7592</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BrowserGate%3A%20Claims%20of%20LinkedIn%20%E2%80%98Spying%E2%80%99%20Clash%20With%20Security%20Research%20Findings&amp;severity=medium&amp;id=69dd0a1182d89c981f054399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13th-april-threat-intelligence-report-88885a79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69dceccf82d89c981fdf6988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-encystphp-webshell-mon-apr-13th-12c43e49</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20EncystPHP%20Webshell%2C%20(Mon%2C%20Apr%2013th)&amp;severity=medium&amp;id=69dcecc482d89c981fdf6328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34476-cwe-918-server-side-request-forgery-d592247b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34476%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking%20MCP&amp;severity=high&amp;id=69dcecd082d89c981fdf6a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-impacted-by-north-korea-linked-axios-supply-db914e14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Impacted%20by%20North%20Korea-Linked%20Axios%20Supply%20Chain%20Hack&amp;severity=medium&amp;id=69dce5bb82d89c981fda16e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/international-operation-targets-multimillion-dolla-5525d62a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=International%20Operation%20Targets%20Multimillion-Dollar%20Crypto%20Theft%20Schemes&amp;severity=medium&amp;id=69dcd7ac82d89c981fc769bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-privacy-while-using-smart-sex--988c951e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20privacy%20while%20using%20smart%20sex%20toys%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69dcd02982d89c981fbb38ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cpuid-hacked-to-serve-trojanized-cpu-z-and-hwmonit-7573c4c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CPUID%20Hacked%20to%20Serve%20Trojanized%20CPU-Z%20and%20HWMonitor%20Downloads&amp;severity=medium&amp;id=69dccd1f82d89c981fb6579e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-claude-website-distributes-plugx-rat-aa7431ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Claude%20Website%20Distributes%20PlugX%20RAT&amp;severity=medium&amp;id=69dcbf0f82d89c981f99f930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15632-cross-site-scripting-in-1panel-dev--7a3eba1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15632%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dcbf1a82d89c981f9a03c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35337-cwe-502-deserialization-of-untruste-675b4697</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35337%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20Client&amp;severity=high&amp;id=69dcbf1a82d89c981f9a03d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35565-cwe-79-improper-neutralization-of-i-3f694165</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20UI&amp;severity=medium&amp;id=69dcbf1a82d89c981f9a03e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cpu-z-hwmonitor-cpuidcom-watering-hole-attack-f42e55fc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CPU-Z%20%26%20HWMonitor%2C%20cpuid.com%2C%20Watering%20Hole%20Attack&amp;severity=medium&amp;id=69dcb11e82d89c981f84024d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4810-cwe-306-missing-authentication-for-c-90e44d82</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4810%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Google%20Cloud%20Agent%20Development%20Kit%20(ADK)&amp;severity=critical&amp;id=69dcb49d82d89c981f86edcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gmail-brings-end-to-end-encryption-to-android-and--0642b6a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gmail%20Brings%20End-to-End%20Encryption%20to%20Android%20and%20iOS%20for%20Enterprise%20Users&amp;severity=low&amp;id=69dca9f782d89c981f7d90e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0232-cwe-15-external-control-of-system-or-7ae8859f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0232%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=69dc9f6d82d89c981f660387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0233-cwe-295-improper-certificate-validat-3fa76797</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0233%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Palo%20Alto%20Networks%20Autonomous%20Digital%20Experience%20Manager&amp;severity=low&amp;id=69dc9f6d82d89c981f66038a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0234-cwe-347-improper-verification-of-cry-77c20c64</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0234%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Palo%20Alto%20Networks%20Cortex%20XSOAR%20Microsoft%20Teams%20Marketplace&amp;severity=high&amp;id=69dc9f6d82d89c981f66038d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5936-cwe-918-server-side-request-forgery--703e707e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5936%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Services%20API&amp;severity=high&amp;id=69dcd01e82d89c981fbb28e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5085-cwe-340-generation-of-predictable-nu-b0e46b2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5085%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20MCRAWFOR%20Solstice%3A%3ASession&amp;severity=critical&amp;id=69dcd01e82d89c981fbb28d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40436-cwe269-improper-privilege-managemen-3c704b13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40436%3A%20CWE%E2%80%91269%20Improper%20Privilege%20Management%20in%20ZTE%20ZXEDM%20iEMS&amp;severity=high&amp;id=69dcd01e82d89c981fbb28d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6168-stack-based-buffer-overflow-in-totol-926c3f9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6168%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A7000R&amp;severity=high&amp;id=69dcd01f82d89c981fbb2903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6167-sql-injection-in-code-projects-facul-930b857e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6167%3A%20SQL%20Injection%20in%20code-projects%20Faculty%20Management%20System&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34866-cwe-120-buffer-copy-without-checkin-299fb76a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34866%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34865-cwe-122-heap-based-buffer-overflow--f39e88a4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34865%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=69dcd01e82d89c981fbb28bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6166-sql-injection-in-code-projects-vehic-a755d753</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6166%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3830-cwe-89-sql-injection-in-product-filt-8d62abb0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3830%3A%20CWE-89%20SQL%20Injection%20in%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=high&amp;id=69dcd01e82d89c981fbb28cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15441-cwe-89-sql-injection-in-form-maker--b9ba0370</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15441%3A%20CWE-89%20SQL%20Injection%20in%20Form%20Maker%20by%2010Web&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6165-sql-injection-in-code-projects-vehic-c4e85e3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6165%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc86f082d89c981f39d666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6164-sql-injection-in-code-projects-lost--96df4a92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6164%3A%20SQL%20Injection%20in%20code-projects%20Lost%20and%20Found%20Thing%20Management&amp;severity=medium&amp;id=69dc86f082d89c981f39d65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6163-sql-injection-in-code-projects-lost--716fd1d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6163%3A%20SQL%20Injection%20in%20code-projects%20Lost%20and%20Found%20Thing%20Management&amp;severity=medium&amp;id=69dc86f082d89c981f39d657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21010-cwe-20-improper-input-validation-in-46318ce4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21010%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21008-cwe-200-exposure-of-sensitive-infor-f4dc6453</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21008%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40447-cwe-190-integer-overflow-or-wraparo-b9281796</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40447%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21014-cwe-284-improper-access-control-in--1fe32321</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21014%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Camera&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21013-cwe-276-incorrect-default-permissio-2eb54624</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21013%3A%20CWE-276%3A%20Incorrect%20Default%20Permission%20in%20Samsung%20Mobile%20Galaxy%20Wearable&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21012-cwe-73-external-control-of-file-nam-0e39053f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21012%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21011-cwe-266-incorrect-privilege-assignm-7ca30c25</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21011%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21009-cwe-754-improper-check-for-unusual--5cdeb51a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21009%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21007-cwe-754-improper-check-for-unusual--3067d701</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21007%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21006-cwe-284-improper-access-control-in--f34ac3c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21006%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6162-cross-site-scripting-in-phpgurukul-c-943de151</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6162%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21003-cwe-20-improper-input-validation-in-428207a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21003%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40446-cwe-843-access-of-resource-using-in-c8f86d8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40446%3A%20CWE-843%20Access%20of%20resource%20using%20incompatible%20type%20(&apos;type%20confusion&apos;)%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4782d89c981f24c288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25209-cwe-125-out-of-bounds-read-in-samsu-a8f7687c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25209%3A%20CWE-125%20Out-of-bounds%20read%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25208-cwe-190-integer-overflow-or-wraparo-e8a94f50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25208%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25207-cwe-787-out-of-bounds-write-in-sams-4980e58e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25207%3A%20CWE-787%20Out-of-bounds%20write%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6161-sql-injection-in-code-projects-simpl-2248136e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6161%3A%20SQL%20Injection%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25206-cwe-125-out-of-bounds-read-in-samsu-d749862b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25206%3A%20CWE-125%20Out-of-bounds%20read%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25205-cwe-122-heap-based-buffer-overflow--4584a89e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25205%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6160-file-and-directory-information-expos-fa73f35f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6160%3A%20File%20and%20Directory%20Information%20Exposure%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6159-cross-site-scripting-in-code-project-c7655aab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6159%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4782d89c981f24c292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34864-cwe-119-improper-restriction-of-ope-7e86aa19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34864%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34863-cwe-787-out-of-bounds-write-in-huaw-e3f550ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34863%3A%20CWE-787%20Out-of-bounds%20write%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34862-cwe-362-concurrent-execution-using--0efce1e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34862%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34861-cwe-362-concurrent-execution-using--2cbedd77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34861%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34859-cwe-416-use-after-free-in-huawei-ha-5f3182f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34859%3A%20CWE-416%20Use%20after%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34858-cwe-362-concurrent-execution-using--7cfd5c85</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34858%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34857-cwe-362-concurrent-execution-using--717a190f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34857%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35553-stack-based-buffer-overflow-in-dyna-e28ddf92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35553%3A%20Stack-based%20buffer%20overflow%20in%20Dynabook%20Inc.%20TOSRFEC.SYS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34855-cwe-20-improper-input-validation-in-fab36aeb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34855%3A%20CWE-20%20Improper%20input%20validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34854-cwe-416-use-after-free-in-huawei-ha-a4c7ceb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34854%3A%20CWE-416%20Use%20after%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6158-os-command-injection-in-totolink-n30-6e3cef0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6158%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=medium&amp;id=69dc7c4782d89c981f24c28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34849-cwe-362-concurrent-execution-using--0ae21aaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34849%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc7c4582d89c981f24c1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34856-cwe-362-concurrent-execution-using--b615401f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34856%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69dc6aaf82d89c981fecb079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34853-cwe-270-privilege-context-switching-47f2dae2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34853%3A%20CWE-270%20Privilege%20context%20switching%20error%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69dc6aaf82d89c981fecb075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28553-cwe-275-permission-issues-in-huawei-ad31a06e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28553%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34867-cwe-415-double-free-in-huawei-harmo-34799778</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34867%3A%20CWE-415%20Double%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34860-cwe-284-improper-access-control-in--0d2249cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34860%3A%20CWE-284%20Improper%20Access%20Control%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34852-cwe-835-loop-with-unreachable-exit--538938f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34852%3A%20CWE-835%20Loop%20with%20unreachable%20exit%20condition%20(&apos;infinite%20loop&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6157-buffer-overflow-in-totolink-a800r-47a7fe50</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6157%3A%20Buffer%20Overflow%20in%20Totolink%20A800R&amp;severity=high&amp;id=69dc6ab182d89c981fecb370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34851-cwe-362-concurrent-execution-using--40f83c52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34851%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc6aaf82d89c981fecb06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34850-cwe-362-concurrent-execution-using--4b5d699d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34850%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc6aaf82d89c981fecb068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6156-os-command-injection-in-totolink-a71-061dc469</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6156%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6ab182d89c981fecb369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6155-os-command-injection-in-totolink-a71-7391e9c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6155%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6ab182d89c981fecb362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6154-os-command-injection-in-totolink-a71-87e9e42c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6154%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6aaf82d89c981fecb08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6153-sql-injection-in-code-projects-vehic-31081b24</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6153%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6152-sql-injection-in-code-projects-vehic-235da6a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6152%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6179-cwe-79-improper-neutralization-of-in-f9fe77cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6179%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20FPT%20Software%20NightWolf%20Penetration%20Testing%20Platform&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6151-sql-injection-in-code-projects-vehic-256441ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6151%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6150-cross-site-scripting-in-code-project-deba8bdf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6150%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-april-13th-2026-httpsiscs-13a5275d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20April%2013th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9888%2C%20(Mon%2C%20Apr%2013th)&amp;severity=medium&amp;id=69dc4e8f82d89c981fb3cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6149-sql-injection-in-code-projects-vehic-9d23061b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6149%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6148-sql-injection-in-code-projects-vehic-bd615293</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6148%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6143-permissive-cross-domain-policy-with--b3323dd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6143%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20farion1231%20cc-switch&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6142-sql-injection-in-tushar-2223-hotel-m-4439ac4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6142%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel%20Management%20System&amp;severity=medium&amp;id=69dc440382d89c981fa0ac0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25204-cwe-502-deserialization-of-untruste-10355b57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25204%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc440382d89c981fa0abf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6141-os-command-injection-in-danielmiessl-45304d9b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6141%3A%20OS%20Command%20Injection%20in%20danielmiessler%20Personal_AI_Infrastructure&amp;severity=medium&amp;id=69dc440382d89c981fa0ac05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6140-os-command-injection-in-totolink-a71-8e1c7584</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6140%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc440382d89c981fa0abfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6139-os-command-injection-in-totolink-a71-92890d24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6139%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc440382d89c981fa0abf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6138-os-command-injection-in-totolink-a71-a4d695c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6138%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc35f382d89c981f798832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-14-aae7f576</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-14&amp;severity=medium&amp;id=69de33af82d89c981f2f83c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-13-425403c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-13&amp;severity=medium&amp;id=69dd876a82d89c981f91c0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26460-na-18771092</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26460%3A%20n%2Fa&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70936-na-3e41b6df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70936%3A%20n%2Fa&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31280-na-efadddcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31280%3A%20n%2Fa&amp;severity=null&amp;id=69dd563d82d89c981f59ffce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51414-na-91604ecd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51414%3A%20n%2Fa&amp;severity=high&amp;id=69dd563d82d89c981f59ffca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31048-na-cb39c07b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31048%3A%20n%2Fa&amp;severity=critical&amp;id=69dd44ab82d89c981f46e0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29955-na-ff239336</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29955%3A%20n%2Fa&amp;severity=high&amp;id=69dd369b82d89c981f37505e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36952-na-b681ec7b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36952%3A%20n%2Fa&amp;severity=low&amp;id=69dd1e0282d89c981f1b7717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36950-na-ccb4d705</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36950%3A%20n%2Fa&amp;severity=low&amp;id=69dd1e0282d89c981f1b7714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36948-na-73e247d5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36948%3A%20n%2Fa&amp;severity=high&amp;id=69dd1e0282d89c981f1b7710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36938-na-6e422029</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36938%3A%20n%2Fa&amp;severity=low&amp;id=69dd138382d89c981f0e28dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36937-na-01c3f985</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36937%3A%20n%2Fa&amp;severity=low&amp;id=69dd138382d89c981f0e28d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63743-na-26e8c8c0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63743%3A%20n%2Fa&amp;severity=medium&amp;id=69dd138382d89c981f0e28d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69627-na-7e25f884</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69627%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69624-na-547e4d69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69624%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66769-na-b9a9fdef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66769%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36941-na-44ede602</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36941%3A%20n%2Fa&amp;severity=low&amp;id=69dd057082d89c981f016d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30999-na-8fbedab9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30999%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30998-na-8cbe983f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30998%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30997-na-b89c6367</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30997%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36945-na-17861145</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36945%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36944-na-f9de8d02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36944%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36943-na-41506e89</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36943%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36942-na-b4d79b66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36942%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31283-na-a7ddfa0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31283%3A%20n%2Fa&amp;severity=critical&amp;id=69dcfe7a82d89c981ff7d604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31282-na-88dbd640</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31282%3A%20n%2Fa&amp;severity=critical&amp;id=69dcfe7a82d89c981ff7d600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31281-na-2b1c5812</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31281%3A%20n%2Fa&amp;severity=high&amp;id=69dcfe7a82d89c981ff7d5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29628-na-e13f5148</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29628%3A%20n%2Fa&amp;severity=medium&amp;id=69dcfe7a82d89c981ff7d5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36947-na-8bda4b83</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36947%3A%20n%2Fa&amp;severity=low&amp;id=69dcf3cf82d89c981fee9b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36946-na-1cc0a2fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36946%3A%20n%2Fa&amp;severity=low&amp;id=69dcf3cf82d89c981fee9b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36923-na-84469258</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36923%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36922-na-ecbf239b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36922%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36920-na-3b139a32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36920%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36919-na-2c9e4158</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36919%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36874-na-12d6a30b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36874%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36873-na-5c465477</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36873%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36872-na-b4ff357e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36872%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-13-91de2cd6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-13&amp;severity=low&amp;id=69dc86e282d89c981f39b609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6137-stack-based-buffer-overflow-in-tenda-189c6cd1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6137%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc327182d89c981f768b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6136-stack-based-buffer-overflow-in-tenda-fb08e76b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6136%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc2f0082d89c981f6be0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6135-stack-based-buffer-overflow-in-tenda-3254f476</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6135%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc2b6782d89c981f6938cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6134-stack-based-buffer-overflow-in-tenda-c1d0d543</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6134%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc27e482d89c981f652da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6133-stack-based-buffer-overflow-in-tenda-3b6543ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6133%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc245f82d89c981f62f978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6132-os-command-injection-in-totolink-a71-401747c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6132%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc20db82d89c981f45ab3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6131-os-command-injection-in-totolink-a71-ce3a9dd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6131%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc1d5782d89c981f304cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6130-os-command-injection-in-chatboxai-ch-705fc80d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6130%3A%20OS%20Command%20Injection%20in%20chatboxai%20chatbox&amp;severity=medium&amp;id=69dc19d482d89c981f05d631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6129-missing-authentication-in-zhayujie-c-9a9de156</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6129%3A%20Missing%20Authentication%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69dbfa3282d89c981fc610c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40396-cwe-670-always-incorrect-control-fl-7bfc9c43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40396%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69dbf32682d89c981fb00945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40395-cwe-770-allocation-of-resources-wit-311788da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40395%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20varnish-software%20Varnish%20Enterprise&amp;severity=medium&amp;id=69dbf32682d89c981fb00942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40394-cwe-670-always-incorrect-control-fl-e713a1d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40394%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69dbf32682d89c981fb0093f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40393-cwe-787-out-of-bounds-write-in-mesa-fa5bea91</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40393%3A%20CWE-787%20Out-of-bounds%20Write%20in%20mesa3d%20Mesa&amp;severity=high&amp;id=69dbefa382d89c981fa9bf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40386-cwe-191-integer-underflow-wrap-or-w-d3d5978b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40386%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20libexif%20project%20libexif&amp;severity=medium&amp;id=69dbe51682d89c981fa14164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40385-cwe-190-integer-overflow-or-wraparo-223f5288</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40385%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20libexif%20project%20libexif&amp;severity=medium&amp;id=69dbe51682d89c981fa14161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6126-missing-authentication-in-zhayujie-c-501c13d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6126%3A%20Missing%20Authentication%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69db781b82d89c981f3d4477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6125-code-injection-in-dromara-warm-flow-8c53d100</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6125%3A%20Code%20Injection%20in%20Dromara%20warm-flow&amp;severity=medium&amp;id=69db6d8f82d89c981f360dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6124-stack-based-buffer-overflow-in-tenda-4ff35eb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6124%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db630382d89c981f2e65bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6123-stack-based-buffer-overflow-in-tenda-96a0216c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6123%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db7e7c82d89c981f416476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-reader-zero-day-exploited-for-months-cd76f82f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Reader%20Zero-Day%20Exploited%20for%20Months&amp;severity=medium&amp;id=69db4deb82d89c981f1a302e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6122-stack-based-buffer-overflow-in-tenda-40cd8adb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6122%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db517682d89c981f1ce65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6121-stack-based-buffer-overflow-in-tenda-e3f9272e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db4a6682d89c981f186e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6120-stack-based-buffer-overflow-in-tenda-54bc050c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6120%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db38d382d89c981f09b1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6119-server-side-request-forgery-in-astrb-c678b667</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6119%3A%20Server-Side%20Request%20Forgery%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db31ca82d89c981f05ff23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6118-command-injection-in-astrbotdevs-ast-ac56d615</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6118%3A%20Command%20Injection%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db273e82d89c981fe5dd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6117-sandbox-issue-in-astrbotdevs-astrbot-00abdc7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6117%3A%20Sandbox%20Issue%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db273e82d89c981fe5dd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6116-os-command-injection-in-totolink-a71-15ee14e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6116%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db273e82d89c981fe5dd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6115-os-command-injection-in-totolink-a71-2eb78416</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6115%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db273e82d89c981fe5dd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6114-os-command-injection-in-totolink-a71-384165a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6114%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd60368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6113-os-command-injection-in-totolink-a71-16ad03cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6113%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd60361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6112-os-command-injection-in-totolink-a71-83c5f182</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6112%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd6035a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6111-server-side-request-forgery-in-found-2c681ea1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6111%3A%20Server-Side%20Request%20Forgery%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69db079a82d89c981fa08bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1116-cwe-79-improper-neutralization-of-in-c711f067</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69db079a82d89c981fa08be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6110-code-injection-in-foundationagents-m-f4c02c00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6110%3A%20Code%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69db079a82d89c981fa08be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6109-cross-site-request-forgery-in-founda-03848c85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6109%3A%20Cross-Site%20Request%20Forgery%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69daf99182d89c981f7b7ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6108-os-command-injection-in-1panel-dev-m-0d8b3931</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6108%3A%20OS%20Command%20Injection%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69db7e7c82d89c981f416488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6107-cross-site-scripting-in-1panel-dev-m-f1e01e0b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6107%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69db7e7c82d89c981f41647e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-13-b0fcb029</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-13&amp;severity=medium&amp;id=69dd136882d89c981f0d7575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-12-7b4cc969</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-12&amp;severity=medium&amp;id=69dc35ea82d89c981f7953ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-12-bd47b229</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-12&amp;severity=low&amp;id=69db667e82d89c981f307658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6106-cross-site-scripting-in-1panel-dev-m-cd592a06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6106%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dacbd682d89c981f306a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6105-improper-authorization-in-perfree-go-21e2d196</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6105%3A%20Improper%20Authorization%20in%20perfree%20go-fastdfs-web&amp;severity=medium&amp;id=69dac85b82d89c981f2de9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31845-cwe-79-improper-neutralization-of-i-5f1f2c55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Rukovoditel%20Rukovoditel%20CRM&amp;severity=critical&amp;id=69da972082d89c981f082366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23900-cwe-79-improper-neutralization-of-i-e50d7564</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phoca.cz%20phoca.cz%20-%20Phoca%20Maps%20for%20Joomla&amp;severity=medium&amp;id=69da4d4882d89c981fd2d7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5809-cwe-73-external-control-of-file-name-7d1ff4ec</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5809%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=69da00db1cc7ad14da61c7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34621-improperly-controlled-modification--1b9951d5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34621%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69da15f41cc7ad14da6d013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3371-cwe-639-authorization-bypass-through-6e97df2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3371%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69d9a5741cc7ad14da144113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4979-cwe-918-server-side-request-forgery--5030e4e2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4979%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d9a5741cc7ad14da144129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5144-cwe-269-improper-privilege-managemen-f1535bf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5144%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20boonebgorges%20BuddyPress%20Groupblog&amp;severity=high&amp;id=69d9a5741cc7ad14da144131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3498-cwe-79-improper-neutralization-of-in-2f47cf95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20BlockArt%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20Blocks%20%2CWordPress%20Block%20Plugin%2C%20Sections%20%26%20Template%20Library&amp;severity=medium&amp;id=69d9a5741cc7ad14da14411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4895-cwe-79-improper-neutralization-of-in-4c0d635b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69d9a5741cc7ad14da144120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5217-cwe-79-improper-neutralization-of-in-49825cdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20in%20Real%20Time&amp;severity=high&amp;id=69d9a5741cc7ad14da144142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5207-cwe-89-improper-neutralization-of-sp-9d26e41a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5207%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=medium&amp;id=69d9a5741cc7ad14da14413b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5226-cwe-79-improper-neutralization-of-in-a73b4818</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20in%20Real%20Time&amp;severity=medium&amp;id=69d9a5741cc7ad14da14414b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3358-cwe-862-missing-authorization-in-the-541a13ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3358%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69d9a5741cc7ad14da14410a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40354-cwe-61-unix-symbolic-link-symlink-f-067082f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40354%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Flatpak%20xdg-desktop-portal&amp;severity=low&amp;id=69d99e6e1cc7ad14da1225aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4157-cwe-78-improper-neutralization-of-sp-e916d229</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4157%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4156-cwe-121-stack-based-buffer-overflow--4cc3f2ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4156%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4155-cwe-540-inclusion-of-sensitive-infor-6f8550d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4155%3A%20CWE-540%3A%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5495-cwe-787-out-of-bounds-write-in-labce-29682a54</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5495%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5494-cwe-787-out-of-bounds-write-in-labce-1c6b705a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5494%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5493-cwe-787-out-of-bounds-write-in-labce-65326a90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5493%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5496-cwe-843-access-of-resource-using-inc-83683539</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5496%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4149-cwe-119-improper-restriction-of-oper-dcf90312</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4149%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Sonos%20Era%20300&amp;severity=critical&amp;id=69d99e6e1cc7ad14da1225b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-12-83aa8314</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-12&amp;severity=medium&amp;id=69dbf6a382d89c981fb12448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-11-b2ee18dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-11&amp;severity=medium&amp;id=69dae46a82d89c981f441f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-11-870bf8db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-11&amp;severity=low&amp;id=69d9ba841cc7ad14da1f0f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40199-cwe-130-improper-handling-of-length-73de8518</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40199%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20STIGTSP%20Net%3A%3ACIDR%3A%3ALite&amp;severity=medium&amp;id=69d9743b1cc7ad14daee2672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40198-cwe-1286-improper-validation-of-syn-dbf39b2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40198%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20STIGTSP%20Net%3A%3ACIDR%3A%3ALite&amp;severity=high&amp;id=69d9743b1cc7ad14daee266d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33118-spoofing-in-microsoft-microsoft-edg-828099eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33118%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69d96d341cc7ad14daec12be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33119-cwe-451-user-interface-ui-misrepres-3c84bf78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33119%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=69d96d341cc7ad14daec12c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5724-cwe-306-missing-authentication-for-c-2cb7d2d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5724%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Temporal%20Technologies%2C%20Inc.%20temporal&amp;severity=medium&amp;id=69d969b01cc7ad14daeabe2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40252-cwe-284-improper-access-control-in--2ccbdf06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40252%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69d9662c1cc7ad14dae9687b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40242-cwe-918-server-side-request-forgery-5eaaa2b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40242%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20getarcaneapp%20arcane&amp;severity=high&amp;id=69d962a81cc7ad14dae87051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40191-cwe-863-incorrect-authorization-in--1c3e33a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40191%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=medium&amp;id=69d95f431cc7ad14dae72c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40190-cwe-1321-improperly-controlled-modi-f84ee3e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40190%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20langchain-ai%20langsmith-sdk&amp;severity=medium&amp;id=69d9581c1cc7ad14dae48c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40189-cwe-862-missing-authorization-in-pa-3a1ae9b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40189%3A%20CWE-862%3A%20Missing%20Authorization%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d9581c1cc7ad14dae48c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40188-cwe-1314-missing-write-protection-f-3b40b321</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40188%3A%20CWE-1314%3A%20Missing%20Write%20Protection%20for%20Parametric%20Data%20Values%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40185-cwe-862-missing-authorization-in-ma-0fd98725</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40185%3A%20CWE-862%3A%20Missing%20Authorization%20in%20mauriceboe%20TREK&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40184-cwe-306-missing-authentication-for--4af6e206</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40184%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20mauriceboe%20TREK&amp;severity=low&amp;id=69d9581c1cc7ad14dae48c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40180-cwe-22-improper-limitation-of-a-pat-9f8db994</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40180%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20quarkiverse%20quarkus-openapi-generator&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40168-cwe-918-server-side-request-forgery-e96b88f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40168%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69d9d9721cc7ad14da3f862a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27460-cwe-409-improper-handling-of-highly-1160e850</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27460%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0fae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33737-cwe-611-improper-restriction-of-xml-c825261b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33737%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33736-cwe-639-authorization-bypass-throug-7ed8eb06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33736%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33710-cwe-330-use-of-insufficiently-rando-14b6a24b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33710%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d94d8f1cc7ad14dae0faf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33708-cwe-862-missing-authorization-in-ch-c3c25773</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33708%3A%20CWE-862%3A%20Missing%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33707-cwe-640-weak-password-recovery-mech-2af5871d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33707%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d94d8f1cc7ad14dae0fae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33706-cwe-269-improper-privilege-manageme-125a7abd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33706%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d94d8f1cc7ad14dae0fae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33705-cwe-538-insertion-of-sensitive-info-00b761cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33705%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f8633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33704-cwe-434-unrestricted-upload-of-file-9f5d6a2e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33704%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d9d9721cc7ad14da3f862f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33703-cwe-639-authorization-bypass-throug-cb9e803c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33703%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3446-vulnerability-in-python-software-fou-9e529bcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3446%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33702-cwe-639-authorization-bypass-throug-925fbc0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33702%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33698-cwe-552-files-or-directories-access-2b2046ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33698%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d943121cc7ad14dadcb199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33618-cwe-95-improper-neutralization-of-d-d093150c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33618%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33141-cwe-639-authorization-bypass-throug-8ba8b98b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33141%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32892-cwe-78-improper-neutralization-of-s-5b2019d4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32892%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d93c061cc7ad14dada4d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1502-vulnerability-in-python-software-fou-d29a3a25</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1502%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32932-cwe-601-url-redirection-to-untruste-630b1042</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32932%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32931-cwe-434-unrestricted-upload-of-file-4bedfb62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32931%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d93c061cc7ad14dada4d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32930-cwe-639-authorization-bypass-throug-898438cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32930%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d93c061cc7ad14dada4d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32894-cwe-476-null-pointer-dereference-in-cef4e8af</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32894%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32893-cwe-79-improper-neutralization-of-i-7ad4ff8e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32893%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d938791cc7ad14dad95283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31941-cwe-918-server-side-request-forgery-eae47332</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31941%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad9527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31940-cwe-384-session-fixation-in-chamilo-5447c6f8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31940%3A%20CWE-384%3A%20Session%20Fixation%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5483-insertion-of-sensitive-information-i-7240e491</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5483%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.16&amp;severity=high&amp;id=69d938791cc7ad14dad9528c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31939-cwe-22-improper-limitation-of-a-pat-40f7a66b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31939%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-organization-from-airsnitch-wi-37876665</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20organization%20from%20AirSnitch%20Wi-Fi%20vulnerabilities%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d931771cc7ad14dad5c79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40160-cwe-918-server-side-request-forgery-ff80f530</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40160%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d9d9751cc7ad14da3f8720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40159-cwe-200-exposure-of-sensitive-infor-d2289657</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40159%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f871d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40158-cwe-94-improper-control-of-generati-fa9a72f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40158%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d9d9721cc7ad14da3f863d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40157-cwe-22-improper-limitation-of-a-pat-3d24639a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40157%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d9d9751cc7ad14da3f871a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40156-cwe-94-improper-control-of-generati-73f8ee37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40156%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d9d9721cc7ad14da3f8650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40100-cwe-918-server-side-request-forgery-a0467b74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40100%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f864d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40097-cwe-129-improper-validation-of-arra-afec90ff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40097%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20smallstep%20certificates&amp;severity=low&amp;id=69d9d9721cc7ad14da3f8637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40074-cwe-755-improper-handling-of-except-ab3c4168</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40074%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20sveltejs%20kit&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f8648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40073-cwe-770-allocation-of-resources-wit-94ac7182</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40073%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20sveltejs%20kit&amp;severity=high&amp;id=69d9d9721cc7ad14da3f8643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40086-cwe-22-improper-limitation-of-a-pat-26967144</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40086%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danielgatis%20rembg&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40103-cwe-836-use-of-password-hash-instea-cc9ae4f5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40103%3A%20CWE-836%3A%20Use%20of%20Password%20Hash%20Instead%20of%20Password%20for%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35602-cwe-770-allocation-of-resources-wit-179f6de2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35602%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35601-cwe-93-improper-neutralization-of-c-b8fd76dd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35601%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f873b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35600-cwe-79-improper-neutralization-of-i-e4d51935</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35600%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35599-cwe-407-inefficient-algorithmic-com-60e6d707</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35599%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35598-cwe-862-missing-authorization-in-go-9155d27b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35598%3A%20CWE-862%3A%20Missing%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f872f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35597-cwe-307-improper-restriction-of-exc-f368b092</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35597%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35596-cwe-863-incorrect-authorization-in--fcc1ca1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35596%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35595-cwe-269-improper-privilege-manageme-a259bb47</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35595%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69d943121cc7ad14dadcb1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35594-cwe-613-insufficient-session-expira-e2a90dbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35594%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40023-cwe-116-improper-encoding-or-escapi-f19f4564</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40023%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4cxx&amp;severity=medium&amp;id=69d91fe11cc7ad14dacba377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34727-cwe-287-improper-authentication-in--cfd9d51e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34727%3A%20CWE-287%3A%20Improper%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69d91fde1cc7ad14dacba297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40021-cwe-116-improper-encoding-or-escapi-a5bdd51d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40021%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4net&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34481-cwe-116-improper-encoding-or-escapi-067c8388</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34481%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20JSON%20Template%20Layout&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34480-cwe-116-improper-encoding-or-escapi-b2386ff0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34480%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34479-cwe-116-improper-encoding-or-escapi-6c8114de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34479%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%201%20to%20Log4j%202%20bridge&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34478-cwe-684-incorrect-provision-of-spec-8f1d16cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34478%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34477-cwe-297-improper-validation-of-cert-d4dde496</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34477%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29043-cwe-122-heap-based-buffer-overflow--273d2e09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29043%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HDFGroup%20hdf5&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-cyberattack-stings-stryker-windows-z-4d4a8d15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Cyberattack%20Stings%20Stryker%2C%20Windows%20Zero-Day%2C%20China%20Supercomputer%20Hack&amp;severity=medium&amp;id=69d90e481cc7ad14dac44e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-patches-dozens-of-junos-os-vulner-fe030f73</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20Patches%20Dozens%20of%20Junos%20OS%20Vulnerabilities&amp;severity=critical&amp;id=69d900381cc7ad14dabf8a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40217-cwe-420-unprotected-alternate-chann-f9abccd5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40217%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20BerriAI%20LiteLLM&amp;severity=high&amp;id=69d907431cc7ad14dac20a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58920-cwe-79-improper-neutralization-of-i-c9e7ee08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58920%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zootemplate%20Cerato&amp;severity=high&amp;id=69d900441cc7ad14dabf8fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58913-cwe-98-improper-control-of-filename-a903f3ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58913%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CactusThemes%20VideoPro&amp;severity=high&amp;id=69d900441cc7ad14dabf8fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5804-cwe-98-improper-control-of-filename--57692503</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5804%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Case%20Themes%20Case%20Theme%20User&amp;severity=high&amp;id=69d900441cc7ad14dabf8fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33092-cwe-15-in-acronis-acronis-true-imag-376576fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33092%3A%20CWE-15%20in%20Acronis%20Acronis%20True%20Image%20OEM&amp;severity=high&amp;id=69d900441cc7ad14dabf8fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/industry-reactions-to-iran-hacking-ics-in-critical-f621dd3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Industry%20Reactions%20to%20Iran%20Hacking%20ICS%20in%20Critical%20Infrastructure%3A%20Feedback%20Friday&amp;severity=critical&amp;id=69d8f2271cc7ad14dab982a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5412-cwe-285-improper-authorization-in-ca-2eb08bc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5412%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Canonical%20Juju&amp;severity=critical&amp;id=69d8f2321cc7ad14dab98423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5774-cwe-362-concurrent-execution-using-s-9ae612a0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5774%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69d9d97c1cc7ad14da3f88ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orthanc-dicom-vulnerabilities-lead-to-crashes-rce-36ef54de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Orthanc%20DICOM%20Vulnerabilities%20Lead%20to%20Crashes%2C%20RCE&amp;severity=low&amp;id=69d8e79b1cc7ad14dab3dbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5777-cwe-306-missing-authentication-for-c-2883531c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5777%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20EGate%20Atom%203X%20Projector&amp;severity=high&amp;id=69d8e7a61cc7ad14dab3dea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39304-denial-of-service-via-out-of-memory-33ee0636</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39304%3A%20Denial%20of%20Service%20via%20Out%20of%20Memory%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Client&amp;severity=high&amp;id=69d8d98b1cc7ad14daad853a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-147-patches-60-vulnerabilities-including-tw-c47f3657</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20147%20Patches%2060%20Vulnerabilities%2C%20Including%20Two%20Critical%20Flaws%20Worth%20%2486%2C000&amp;severity=critical&amp;id=69d8d6081cc7ad14daac3dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-releases-fight-fraud-framework-12271865</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Releases%20Fight%20Fraud%20Framework&amp;severity=medium&amp;id=69d8cb7c1cc7ad14daa783bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4162-cwe-862-missing-authorization-in-roc-0356dad0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4162%3A%20CWE-862%20Missing%20Authorization%20in%20RocketGenius%20Gravity%20SMTP&amp;severity=high&amp;id=69d8c7f71cc7ad14daa5fce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6057-cwe-22-path-traversal-in-falkordb-fa-80645f49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6057%3A%20CWE-22%20Path%20Traversal%20in%20FalkorDB%20FalkorDB%20Browser&amp;severity=critical&amp;id=69d8c7f71cc7ad14daa5fce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-marimo-flaw-exploited-hours-after-public--82162d6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Marimo%20Flaw%20Exploited%20Hours%20After%20Public%20Disclosure&amp;severity=critical&amp;id=69d8c0a51cc7ad14daa30adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6042-inefficient-algorithmic-complexity-i-f62f8871</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6042%3A%20Inefficient%20Algorithmic%20Complexity%20in%20musl%20libc&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6038-sql-injection-in-code-projects-vehic-ca755ced</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6038%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3534a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33457-cwe-140-improper-neutralization-of--5b1489cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33457%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33456-cwe-140-improper-neutralization-of--0f4aeaea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33456%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33455-cwe-140-improper-neutralization-of--9d5c22ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33455%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6037-sql-injection-in-code-projects-vehic-469cfa07</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6037%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6036-sql-injection-in-code-projects-vehic-c8c5a593</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6036%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-memory-loader-drops-screenconnect-03401746</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-Memory%20Loader%20Drops%20ScreenConnect&amp;severity=medium&amp;id=69d8ceff1cc7ad14daa9150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-supply-chain-compromise-leads-to-rat-d-5471ad80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Package%20Supply%20Chain%20Compromise%20Leads%20to%20RAT%20Deployment&amp;severity=medium&amp;id=69d8cb821cc7ad14daa7855e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6035-cross-site-scripting-in-code-project-4b5e4f61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6035%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-rolls-out-cookie-theft-protections-in-chrom-6d88d9a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Rolls%20Out%20Cookie%20Theft%20Protections%20in%20Chrome&amp;severity=medium&amp;id=69d8abd81cc7ad14da99e7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6034-cross-site-scripting-in-code-project-dc8a4ac6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6034%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3536d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5525-cwe-121-stack-based-buffer-overflow--eed490de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5525%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Notepad%2B%2B%20Project%20Notepad%2B%2B&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-finds-vulnerability-exposing-millions-of-0f3042e8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Finds%20Vulnerability%20Exposing%20Millions%20of%20Android%20Crypto%20Wallet%20Users&amp;severity=medium&amp;id=69d8a8541cc7ad14da97e786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22750-vulnerability-in-vmware-spring-clou-95534ffc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22750%3A%20Vulnerability%20in%20VMware%20Spring%20Cloud%20Gateway&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa35358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6033-sql-injection-in-codeastro-online-cl-ffdda805</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6033%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6032-cross-site-scripting-in-code-project-382797a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6032%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d8a85b1cc7ad14da97ec05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6031-sql-injection-in-code-projects-simpl-075bdf26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6031%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d8a85b1cc7ad14da97ebfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6030-sql-injection-in-itsourcecode-constr-ef9de984</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6030%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d8a14c1cc7ad14da9459ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/obfuscated-javascript-or-nothing-thu-apr-9th-bb996e09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Obfuscated%20JavaScript%20or%20Nothing%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d89dc71cc7ad14da930bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6029-os-command-injection-in-totolink-a71-25809d7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6029%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1115-cwe-79-improper-neutralization-of-in-d36d67ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1115%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parisneo%20parisneo%2Flollms&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6028-os-command-injection-in-totolink-a71-9a88a334</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6028%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6027-os-command-injection-in-totolink-a71-31aeb5d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6027%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d896c01cc7ad14da90814c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4432-cwe-862-missing-authorization-in-yit-643fc10d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4432%3A%20CWE-862%20Missing%20Authorization%20in%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=69d896c01cc7ad14da908142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14545-cwe-94-improper-control-of-generati-3ff76783</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14545%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20YML%20for%20Yandex%20Market&amp;severity=medium&amp;id=69d896c01cc7ad14da90813a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28704-uncontrolled-search-path-element-in-0070be31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28704%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Japan%20Computer%20Emergency%20Response%20Team%20Coordination%20Center%20(JPCERT%2FCC)%20Emocheck&amp;severity=high&amp;id=69d896c01cc7ad14da90813d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6026-os-command-injection-in-totolink-a71-a189cd98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6026%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d896c01cc7ad14da908145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6025-os-command-injection-in-totolink-a71-da9e8d99</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6025%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8c0ef1cc7ad14daa353ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6024-path-traversal-in-tenda-i6-dd97391a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6024%3A%20Path%20Traversal%20in%20Tenda%20i6&amp;severity=medium&amp;id=69d8c0ef1cc7ad14daa353c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6016-stack-based-buffer-overflow-in-tenda-87108250</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6016%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa35382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6015-stack-based-buffer-overflow-in-tenda-303df20e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6015%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa3537b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6014-buffer-overflow-in-d-link-dir-513-d6993d66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6014%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4482-cwe-732-incorrect-permission-assignm-bd880abd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4482%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Rapid7%20Insight%20Agent&amp;severity=medium&amp;id=69d881ab1cc7ad14da707add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6013-buffer-overflow-in-d-link-dir-513-6c13a0cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6013%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6012-buffer-overflow-in-d-link-dir-513-ac2f7246</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6012%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6011-server-side-request-forgery-in-openc-b423bc79</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6011%3A%20Server-Side%20Request%20Forgery%20in%20OpenClaw&amp;severity=medium&amp;id=69d881ab1cc7ad14da707ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2305-cwe-79-improper-neutralization-of-in-ec8c241e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20addfunc%20AddFunc%20Head%20%26%20Footer%20Code&amp;severity=medium&amp;id=69d873981cc7ad14da5fb241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6010-sql-injection-in-codeastro-online-cl-d106f93e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6010%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d873981cc7ad14da5fb260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6007-sql-injection-in-itsourcecode-constr-62b9a200</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6007%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6006-sql-injection-in-code-projects-patie-2a1a603c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6006%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6005-sql-injection-in-code-projects-patie-08e27ebc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6005%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6004-sql-injection-in-code-projects-simpl-b10f2cc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6004%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d862041cc7ad14da50d951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6003-cross-site-scripting-in-code-project-cdc25457</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6003%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d862041cc7ad14da50d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6000-information-disclosure-in-code-proje-37b28a8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6000%3A%20Information%20Disclosure%20in%20code-projects%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=69d862041cc7ad14da50d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5999-improper-authorization-in-jeecgboot-8621e765</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5999%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=69d862041cc7ad14da50d93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5998-path-traversal-in-zhayujie-chatgpt-o-0d97bf7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5998%3A%20Path%20Traversal%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69d8577b1cc7ad14da4a0e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4305-cwe-79-improper-neutralization-of-in-420b397d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20WordPress%20Backup%2C%20Restore%20%26%20Migration%20Plugin%20%E2%80%93%20Backup%20WordPress%20Sites%20Safely&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4977-cwe-862-missing-authorization-in-sti-a4ee5ded</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4977%3A%20CWE-862%20Missing%20Authorization%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1924-cwe-352-cross-site-request-forgery-c-822f5202</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1263-cwe-79-improper-neutralization-of-in-11b0b0dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20usystemsgmbh%20Webling&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4057-cwe-862-missing-authorization-in-cod-ad9364fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4057%3A%20CWE-862%20Missing%20Authorization%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3360-cwe-862-missing-authorization-in-the-e76eed5e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3360%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=69d857791cc7ad14da4a0d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2712-cwe-863-incorrect-authorization-in-d-fc686a53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2712%3A%20CWE-863%20Incorrect%20Authorization%20in%20davidanderson%20WP-Optimize%20%E2%80%93%20Cache%2C%20Compress%20images%2C%20Minify%20%26%20Clean%20database%20to%20boost%20page%20speed%20%26%20performance&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4664-cwe-287-improper-authentication-in-i-4055877c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4664%3A%20CWE-287%20Improper%20Authentication%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25203-cwe-276-incorrect-default-permissio-03753a3c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25203%3A%20CWE-276%20Incorrect%20default%20permissions%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=69d857791cc7ad14da4a0d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5997-os-command-injection-in-totolink-a71-76c83173</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5997%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8577b1cc7ad14da4a0e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5996-os-command-injection-in-totolink-a71-7853c72c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5996%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d857791cc7ad14da4a0d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5995-os-command-injection-in-totolink-a71-27cc3191</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5995%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5994-os-command-injection-in-totolink-a71-2d1c7675</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5994%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5993-os-command-injection-in-totolink-a71-a914265d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5993%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5992-stack-based-buffer-overflow-in-tenda-c07121b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5992%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d843721cc7ad14da3fb3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-11-2d3e7714</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-11&amp;severity=medium&amp;id=69da49bb82d89c981fbccd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/d-link-dir-650in-authenticated-command-injection-dcfa2848</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=D-Link%20DIR-650IN%20-%20Authenticated%20Command%20Injection&amp;severity=medium&amp;id=69da14bc1cc7ad14da6c87c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/netbt-e-fatura-privilege-escalation-2d29044b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NetBT%20e-Fatura%20-%20Privilege%20Escalation&amp;severity=high&amp;id=69da14bc1cc7ad14da6c87be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36235-na-0ae03a2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36235%3A%20n%2Fa&amp;severity=critical&amp;id=69d9d97c1cc7ad14da3f88cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36234-na-a5ba7054</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36234%3A%20n%2Fa&amp;severity=critical&amp;id=69d9d97c1cc7ad14da3f88c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23782-na-0fdc13b3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23782%3A%20n%2Fa&amp;severity=high&amp;id=69d9d97c1cc7ad14da3f88c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23780-na-ab7a798d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23780%3A%20n%2Fa&amp;severity=high&amp;id=69d9d97c1cc7ad14da3f88c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-10-1d7bbbf2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-10&amp;severity=medium&amp;id=69d990531cc7ad14dafc4172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40200-cwe-670-always-incorrect-control-fl-f042e7c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40200%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20musl-libc%20musl&amp;severity=high&amp;id=69d934f31cc7ad14dad772cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23781-na-c225d0b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23781%3A%20n%2Fa&amp;severity=critical&amp;id=69d91fde1cc7ad14dacba26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36236-na-44ed902d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36236%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36233-na-5f0d3ffa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36233%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36232-na-0e8be59d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36232%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31262-na-06fac518</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31262%3A%20n%2Fa&amp;severity=medium&amp;id=69d911cc1cc7ad14dac5d987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29861-na-674eb41c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29861%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44560-na-078fe07f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44560%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40212-cwe-79-improper-neutralization-of-i-3208d4c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenStack%20Skyline&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3535c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-10-b8cac7f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-10&amp;severity=low&amp;id=69d89dbf1cc7ad14da92fe8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33551-cwe-863-incorrect-authorization-in--d9f794f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33551%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenStack%20Keystone&amp;severity=low&amp;id=69d862041cc7ad14da50d937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5991-stack-based-buffer-overflow-in-tenda-d9d7beab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5991%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d83edb1cc7ad14da371612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5990-stack-based-buffer-overflow-in-tenda-d9b58ad7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5990%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d83b611cc7ad14da35ec14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5989-stack-based-buffer-overflow-in-tenda-4ab9255d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5989%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d837d41cc7ad14da341bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5988-stack-based-buffer-overflow-in-tenda-f0bea76b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5988%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d830cb1cc7ad14da313a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34424-cwe-506-embedded-malicious-code-in--565778ad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34424%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20Nextendweb%20Smart%20Slider%203%20Pro%20for%20WordPress&amp;severity=critical&amp;id=69d830cb1cc7ad14da313a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5987-improper-neutralization-of-special-e-dbbbc8a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5987%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69d830cb1cc7ad14da313a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5986-inefficient-regular-expression-compl-786c5a63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5986%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Zod%20jsVideoUrlParser&amp;severity=medium&amp;id=69d82d481cc7ad14da2fc1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5985-sql-injection-in-code-projects-simpl-7a020e0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5985%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d829c91cc7ad14da2ebbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5984-buffer-overflow-in-d-link-dir-605l-1e0e7e69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5984%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d826401cc7ad14da2cd53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5983-buffer-overflow-in-d-link-dir-605l-7db7f7d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5983%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39848-cwe-306-missing-authentication-for--f97002da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39848%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%2010ij%20dockyard&amp;severity=medium&amp;id=69d822bf1cc7ad14da2ad173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40154-cwe-829-inclusion-of-functionality--9f489fbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40154%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d822bf1cc7ad14da2ad176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33791-cwe-78-improper-neutralization-of-s-fe83384c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33791%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bf1cc7ad14da2ad16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33790-cwe-754-improper-check-for-unusual--85692ec6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33790%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33787-cwe-754-improper-check-for-unusual--694a92be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33787%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33785-cwe-862-missing-authorization-in-ju-907520bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33785%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33784-cwe-1393-use-of-default-password-in-a5f42388</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33784%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20Juniper%20Networks%20JSI%20LWC&amp;severity=critical&amp;id=69d822bd1cc7ad14da2ac974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33783-cwe-686-function-call-with-incorrec-e831da69</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33783%3A%20CWE-686%20Function%20Call%20With%20Incorrect%20Argument%20Type%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33781-cwe-754-improper-check-for-unusual--5da4c39e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33781%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33778-cwe-1286-improper-validation-of-syn-7e44dea9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33778%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33776-cwe-862-missing-authorization-in-ju-76a39714</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33776%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33774-cwe-754-improper-check-for-unusual--42120f1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33774%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33771-cwe-521-weak-password-requirements--2b26f331</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33771%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Juniper%20Networks%20CTP%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13914-cwe-322-key-exchange-without-entity-37c05f82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13914%3A%20CWE-322%20Key%20Exchange%20without%20Entity%20Authentication%20in%20Juniper%20Networks%20Apstra&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33797-cwe-20-improper-input-validation-in-032bb2fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33797%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33779-cwe-296-improper-following-of-a-cer-0b4d9e12</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33779%3A%20CWE-296%20Improper%20Following%20of%20a%20Certificate&apos;s%20Chain%20of%20Trust%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5982-buffer-overflow-in-d-link-dir-605l-29438337</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5982%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d843771cc7ad14da3fb5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33775-cwe-401-missing-release-of-memory-a-f0fccbf5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33775%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40151-cwe-200-exposure-of-sensitive-infor-41548a8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40151%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33782-cwe-401-missing-release-of-memory-a-e886ea1e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33782%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843751cc7ad14da3fb550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33780-cwe-401-missing-release-of-memory-a-b58b1c8c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33780%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33773-cwe-1419-incorrect-initialization-o-03dd345c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33773%3A%20CWE-1419%20Incorrect%20Initialization%20of%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33786-cwe-754-improper-check-for-unusual--ee330a5e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33786%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843751cc7ad14da3fb553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21916-cwe-61-unix-symbolic-link-symlink-f-d17287ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21916%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d843721cc7ad14da3fb3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40153-cwe-526-cleartext-storage-of-sensit-f8d2a9e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40153%3A%20CWE-526%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d843771cc7ad14da3fb5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33788-cwe-306-missing-authentication-for--9816a849</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33788%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=69d843751cc7ad14da3fb556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40152-cwe-22-improper-limitation-of-a-pat-c32af342</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40152%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21919-cwe-821-incorrect-synchronization-i-6dad3dbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21919%3A%20CWE-821%20Incorrect%20Synchronization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21915-cwe-183-permissive-list-of-allowed--507f4fbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21915%3A%20CWE-183%20Permissive%20List%20of%20Allowed%20Input%20in%20Juniper%20Networks%20JSI%20LWC&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21904-cwe-79-improper-neutralization-of-i-dd40f02e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40150-cwe-918-server-side-request-forgery-f4493f40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d843771cc7ad14da3fb5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59969-cwe-120-buffer-copy-without-checkin-b5ea3861</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59969%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33793-cwe-250-execution-with-unnecessary--3bbff8ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33793%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d843751cc7ad14da3fb559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40149-cwe-396-declaration-of-catch-for-ge-02f2486d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40149%3A%20CWE-396%3A%20Declaration%20of%20Catch%20for%20Generic%20Exception%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843771cc7ad14da3fb5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40148-cwe-409-improper-handling-of-highly-d3e405c0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40148%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40117-cwe-862-missing-authorization-in-me-70fd32bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40117%3A%20CWE-862%3A%20Missing%20Authorization%20in%20MervinPraison%20PraisonAIAgents&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40116-cwe-770-allocation-of-resources-wit-314adf4e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40116%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40115-cwe-770-allocation-of-resources-wit-b5c41bbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40115%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843751cc7ad14da3fb568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40114-cwe-918-server-side-request-forgery-7451409a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40114%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40113-cwe-88-improper-neutralization-of-a-5a799066</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40113%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40112-cwe-79-improper-neutralization-of-i-bf712808</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843751cc7ad14da3fb55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5981-buffer-overflow-in-d-link-dir-605l-6fa03a4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5981%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d843771cc7ad14da3fb5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40111-cwe-78-improper-neutralization-of-s-03ac2b4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40111%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=critical&amp;id=69d843751cc7ad14da3fb55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40109-cwe-287-improper-authentication-in--838f1a64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40109%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fluxcd%20notification-controller&amp;severity=low&amp;id=69d818301cc7ad14da2455d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40107-cwe-918-server-side-request-forgery-d79e17bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40107%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69d818301cc7ad14da2455d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5980-buffer-overflow-in-d-link-dir-605l-e4664738</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5980%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d818301cc7ad14da2455de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5979-buffer-overflow-in-d-link-dir-605l-b22fd00b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5979%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d814ae1cc7ad14da21653e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5978-os-command-injection-in-totolink-a71-67e7851c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5978%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d814ae1cc7ad14da216536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40093-cwe-1284-improper-validation-of-spe-f1fcce45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40093%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69d814ae1cc7ad14da21652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/payroll-pirate-attacks-targeting-canadian-employee-53033fb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Payroll%20pirate%20attacks%20targeting%20Canadian%20employees&amp;severity=medium&amp;id=69d8ceff1cc7ad14daa91506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5977-os-command-injection-in-totolink-a71-090c4d25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5977%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d814ae1cc7ad14da21652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4436-cwe-306-in-gpl-odorizers-gpl750-xl4-dbe0f47c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4436%3A%20CWE-306%20in%20GPL%20Odorizers%20GPL750%20(XL4)&amp;severity=high&amp;id=69d80a201cc7ad14da1a948e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5976-os-command-injection-in-totolink-a71-3f6a2565</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5976%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d80a201cc7ad14da1a9493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13926-cwe-807-in-contemporary-controls-ba-6c5309fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13926%3A%20CWE-807%20in%20Contemporary%20Controls%20BASControl20&amp;severity=critical&amp;id=69d806d21cc7ad14da15a557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5975-os-command-injection-in-totolink-a71-9db2234a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5975%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d806d51cc7ad14da15a662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40088-cwe-78-improper-neutralization-of-s-245484f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40088%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d806d21cc7ad14da15a576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40089-cwe-918-server-side-request-forgery-35713674</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40089%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonicverse-eu%20audiostreaming-stack&amp;severity=critical&amp;id=69d806d21cc7ad14da15a57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35577-cwe-346-origin-validation-error-in--8745ce80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35577%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20apollographql%20apollo-mcp-server&amp;severity=medium&amp;id=69d806d21cc7ad14da15a568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34500-clientcert-authentication-does-not--63ca00a7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34500%3A%20CLIENT_CERT%20authentication%20does%20not%20fail%20as%20expected%20for%20some%20scenarios%20when%20soft%20fail%20is%20disabled%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d806d21cc7ad14da15a565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34487-cwe-532-insertion-of-sensitive-info-07344d29</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34487%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34486-cwe-311-missing-encryption-of-sensi-1ab7897d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34486%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40087-cwe-1336-improper-neutralization-of-fca192b1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40087%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20langchain-ai%20langchain&amp;severity=medium&amp;id=69d806d21cc7ad14da15a56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34483-cwe-116-improper-encoding-or-escapi-c352f5d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34483%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5974-os-command-injection-in-foundationag-8a1cc3ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5974%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d806d21cc7ad14da15a57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40077-cwe-184-incomplete-list-of-disallow-9c7f4ad8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40077%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20henrygd%20beszel&amp;severity=low&amp;id=69d7ff941cc7ad14da10e9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32990-cwe-20-improper-input-validation-in-0341ee1d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32990%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d7ff941cc7ad14da10e9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29146-padding-oracle-in-apache-software-f-295d2dfe</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29146%3A%20Padding%20Oracle%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29145-clientcert-authentication-does-not--11e42669</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29145%3A%20CLIENT_CERT%20authentication%20does%20not%20fail%20as%20expected%20for%20some%20scenarios%20when%20soft%20fail%20is%20disabled%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=69d7ff941cc7ad14da10e9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29129-configured-cipher-preference-order--0d71e2cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29129%3A%20Configured%20cipher%20preference%20order%20not%20preserved%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5973-os-command-injection-in-foundationag-59f6508b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5973%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ff961cc7ad14da10ea47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25854-cwe-601-url-redirection-to-untruste-d400d1c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25854%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d7ff941cc7ad14da10e9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24880-cwe-444-inconsistent-interpretation-eda0d8cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24880%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39977-cwe-22-improper-limitation-of-a-pat-bed6ef14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39977%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flatpak%20flatpak-builder&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34734-cwe-416-use-after-free-in-hdfgroup--d00b0ad3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34734%3A%20CWE-416%3A%20Use%20After%20Free%20in%20HDFGroup%20hdf5&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5972-os-command-injection-in-foundationag-a112b45e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5972%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ff961cc7ad14da10ea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35195-cwe-787-out-of-bounds-write-in-byte-0b549b4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35195%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88e1cc7ad14da0c179f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35186-cwe-789-memory-allocation-with-exce-60d4a794</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35186%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c170c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34988-cwe-119-improper-restriction-of-ope-738809df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34988%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c1709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34987-cwe-125-out-of-bounds-read-in-bytec-5d6922fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34987%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c1706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34983-cwe-416-use-after-free-in-bytecodea-5453e933</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34983%3A%20CWE-416%3A%20Use%20After%20Free%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c1703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34971-cwe-125-out-of-bounds-read-in-bytec-510a8be8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34971%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c1700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34946-cwe-670-always-incorrect-control-fl-797568c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34946%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34945-cwe-681-incorrect-conversion-betwee-93e30ae8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34945%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c16fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34944-cwe-248-uncaught-exception-in-bytec-19057013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34944%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34943-cwe-248-uncaught-exception-in-bytec-2b6ea09e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34943%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34942-cwe-129-improper-validation-of-arra-8b6d6f53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34942%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d806d51cc7ad14da15a669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34941-cwe-125-out-of-bounds-read-in-bytec-44d942e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34941%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d843791cc7ad14da3fb68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealer-campaign-impacting-sltt-macos-users-463cbc4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealer%20Campaign%20Impacting%20SLTT%20macOS%20Users&amp;severity=medium&amp;id=69d7f1821cc7ad14da06f834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1584-null-pointer-dereference-in-red-hat--56fa43b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1584%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5971-improper-neutralization-of-directive-5770f87f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5971%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39911-cwe-668-exposure-of-resource-to-wro-9576e92f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39911%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20hashgraph%20guardian&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39315-cwe-184-incomplete-list-of-disallow-a8a63c9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39315%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20unjs%20unhead&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5329-cwe-20-improper-input-validation-in--bf8aa5a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5329%3A%20CWE-20%20Improper%20input%20validation%20in%20Rapid7%20Velociraptor&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35207-cwe-295-improper-certificate-valida-e017082c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35207%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20linuxdeepin%20dde-control-center&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-fake-windows-support-website-delivers-passwor-edce3a29</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20fake%20Windows%20support%20website%20delivers%20password-stealing%20malware&amp;severity=medium&amp;id=69d7e6f61cc7ad14dafe7e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40072-cwe-918-server-side-request-forgery-61669d9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40072%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ethereum%20web3.py&amp;severity=low&amp;id=69d7e6ff1cc7ad14dafe8de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40070-cwe-347-improper-verification-of-cr-caaefd13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40070%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sgbett%20bsv-ruby-sdk&amp;severity=high&amp;id=69d7e6ff1cc7ad14dafe8de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40069-cwe-754-improper-check-for-unusual--107e7303</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40069%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20sgbett%20bsv-ruby-sdk&amp;severity=high&amp;id=69d7e6ff1cc7ad14dafe8dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39987-cwe-306-missing-authentication-for--7b043647</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39987%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20marimo-team%20marimo&amp;severity=critical&amp;id=69d7e6ff1cc7ad14dafe8dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39961-cwe-269-improper-privilege-manageme-9281336f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39961%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20aiven%20aiven-operator&amp;severity=medium&amp;id=69d843791cc7ad14da3fb693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39985-cwe-601-url-redirection-to-untruste-53c41450</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39985%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20aces%20Loris&amp;severity=medium&amp;id=69d843791cc7ad14da3fb69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39983-cwe-93-improper-neutralization-of-c-5c3326f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39983%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20patrickjuchli%20basic-ftp&amp;severity=high&amp;id=69d806d51cc7ad14da15a66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39981-cwe-22-improper-limitation-of-a-pat-3d5cb72d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39981%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Josh-XT%20AGiXT&amp;severity=high&amp;id=69d843791cc7ad14da3fb698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5970-code-injection-in-foundationagents-m-8f8c046d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5970%3A%20Code%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39980-cwe-1336-improper-neutralization-of-06ee5ee4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39980%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20OpenCTI-Platform%20opencti&amp;severity=critical&amp;id=69d7f88e1cc7ad14da0c17a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39976-cwe-287-improper-authentication-in--ed402c61</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39976%3A%20CWE-287%3A%20Improper%20Authentication%20in%20laravel%20passport&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39974-cwe-918-server-side-request-forgery-b8153f8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39974%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20czlonkowski%20n8n-mcp&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39972-cwe-1289-improper-validation-of-uns-b2f4daad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39972%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20dunglas%20mercure&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5962-path-traversal-in-tenda-ch22-8c2770fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5962%3A%20Path%20Traversal%20in%20Tenda%20CH22&amp;severity=medium&amp;id=69d7dc7c1cc7ad14daf451e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39959-cwe-770-allocation-of-resources-wit-3b1278fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39959%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20tmds%20Tmds.DBus&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39958-cwe-93-improper-neutralization-of-c-87cdf680</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39958%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20AOSC-Dev%20oma&amp;severity=medium&amp;id=69d7dc7c1cc7ad14daf451cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5961-sql-injection-in-code-projects-simpl-212dd00d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5961%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39957-cwe-863-incorrect-authorization-in--e2f07009</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39957%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=69d7d5661cc7ad14daeeafbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39856-cwe-125-out-of-bounds-read-in-mtroj-7ec6c2c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39856%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mtrojnar%20osslsigncode&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39855-cwe-125-out-of-bounds-read-in-mtroj-d24019ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39855%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mtrojnar%20osslsigncode&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40046-cwe-190-integer-overflow-or-wraparo-44ec5833</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40046%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=high&amp;id=69d7d5661cc7ad14daeeafc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33005-cwe-274-improper-handling-of-insuff-ac9e3c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33005%3A%20CWE-274%20Improper%20Handling%20of%20Insufficient%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33266-cwe-321-use-of-hard-coded-cryptogra-2ef088ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33266%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34020-cwe-598-use-of-get-request-method-w-60f3b614</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34020%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39853-cwe-121-stack-based-buffer-overflow-b0fc9cb2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39853%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20mtrojnar%20osslsigncode&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39843-cwe-918-server-side-request-forgery-320d8b73</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39843%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39941-cwe-79-improper-neutralization-of-i-7e221f3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39941%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5960-information-disclosure-in-code-proje-0cffe94e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5960%3A%20Information%20Disclosure%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d843791cc7ad14da3fb6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14551-cwe-1258-exposure-of-sensitive-syst-9638ed34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14551%3A%20CWE-1258%20Exposure%20of%20sensitive%20system%20information%20due%20to%20uncleared%20debug%20information%20in%20Canonical%20Ubuntu&amp;severity=low&amp;id=69d843791cc7ad14da3fb6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15480-cwe-1258-exposure-of-sensitive-syst-91250a7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15480%3A%20CWE-1258%20Exposure%20of%20sensitive%20system%20information%20due%20to%20uncleared%20debug%20information%20in%20Canonical%20Ubuntu&amp;severity=low&amp;id=69d843791cc7ad14da3fb6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35041-cwe-1333-inefficient-regular-expres-03a72d0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35041%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20nearform%20fast-jwt&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35040-cwe-697-incorrect-comparison-in-nea-15fbf83e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35040%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20nearform%20fast-jwt&amp;severity=medium&amp;id=69d843791cc7ad14da3fb6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4878-time-of-check-time-of-use-toctou-rac-180716e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4878%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5439-cwe-770-allocation-of-resources-with-074c2bff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5439%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5437-cwe-125-out-of-bounds-read-in-orthan-293b06ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5437%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5438-cwe-770-allocation-of-resources-with-79ed6dbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5438%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5440-cwe-770-allocation-of-resources-with-06df998f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5440%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5442-cwe-190-integer-overflow-or-wraparou-82cdd837</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5442%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5443-cwe-190-integer-overflow-or-wraparou-81ca17a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5443%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5445-cwe-125-out-of-bounds-read-in-orthan-76abb402</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5445%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5444-cwe-190-integer-overflow-or-wraparou-9c148454</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5444%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5441-cwe-125-out-of-bounds-read-in-orthan-a48040f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5441%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34757-cwe-416-use-after-free-in-pnggroup--e7c61505</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34757%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69d7bccb1cc7ad14dad7b12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34578-cwe-90-improper-neutralization-of-s-17b84668</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34578%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20opnsense%20core&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5959-improper-authentication-in-glinet-gl-10bc5666</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5959%3A%20Improper%20Authentication%20in%20GL.iNet%20GL-RM1&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4116-cwe-176-improper-handling-of-unicode-8fb56da1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4116%3A%20CWE-176%20Improper%20handling%20of%20unicode%20encoding%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4114-cwe-176-improper-handling-of-unicode-d58b930d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4114%3A%20CWE-176%20Improper%20handling%20of%20unicode%20encoding%20in%20SonicWall%20SMA1000&amp;severity=null&amp;id=69d7bccb1cc7ad14dad7b137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4113-cwe-204-observable-response-discrepa-f4d701a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4113%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4112-cwe-89-improper-neutralization-of-sp-b9df2c98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4112%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20SonicWall%20SMA1000&amp;severity=null&amp;id=69d7bccb1cc7ad14dad7b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4660-cwe-200-exposure-of-sensitive-inform-dbd7d623</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4660%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HashiCorp%20Tooling&amp;severity=high&amp;id=69d7b5c31cc7ad14dad0f199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-intelligence-ai-guardrails-bypassed-in-new-a-79953f19</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Intelligence%20AI%20Guardrails%20Bypassed%20in%20New%20Attack&amp;severity=medium&amp;id=69d7aeb91cc7ad14dac9d0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-we-trust-ai-no-but-eventually-we-must-e2dcb60f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20We%20Trust%20AI%3F%20No%20%E2%80%93%20But%20Eventually%20We%20Must&amp;severity=medium&amp;id=69d7ab341cc7ad14dac63dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2519-cwe-472-external-control-of-assumed--f77b1e5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2519%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20ladela%20Online%20Scheduling%20and%20Appointment%20Booking%20System%20%E2%80%93%20Bookly&amp;severity=medium&amp;id=69d8437c1cc7ad14da3fb791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3005-cwe-79-improper-neutralization-of-in-f4313294</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=69d7e6ff1cc7ad14dafe8df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-api-keys-in-android-apps-expose-gemini-endp-14a569b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20API%20Keys%20in%20Android%20Apps%20Expose%20Gemini%20Endpoints%20to%20Unauthorized%20Access&amp;severity=medium&amp;id=69d79d241cc7ad14daba7bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-networks-sonicwall-patch-high-severity-v-2ff5737b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Networks%2C%20SonicWall%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69d7961c1cc7ad14dab19540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57735-cwe-613-insufficient-session-expira-9dc4a2f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57735%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=critical&amp;id=69d78b8f1cc7ad14daa6c55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-roi-of-visibility-better-decisions-bett-17805858</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20ROI%20of%20Visibility%3A%20Better%20Decisions%2C%20Better%20Behavior%2C%20Better%20Security&amp;severity=medium&amp;id=69d788131cc7ad14daa31486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1490-cwe-94-improper-control-of-generatio-5517fc7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1490%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WAGO%20CC100%20(0751-9x01)&amp;severity=high&amp;id=69d78b8f1cc7ad14daa6c55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-bts-arirang-tour-tickets-k-pop-fans-being-tar-0be0f8a4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20BTS%20ARIRANG%20tour%20tickets%3A%20K-pop%20fans%20being%20targeted%20by%20scammers%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d843531cc7ad14da3f941e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-long-road-to-your-crypto-clipbanker-and-its-ma-4b0c512e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20long%20road%20to%20your%20crypto%3A%20ClipBanker%20and%20its%20marathon%20infection%20chain&amp;severity=medium&amp;id=69d7edfe1cc7ad14da04a129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-warns-of-new-campaign-targeting-bpos-to-ste-2ae94a62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Warns%20of%20New%20Campaign%20Targeting%20BPOs%20to%20Steal%20Corporate%20Data&amp;severity=medium&amp;id=69d776771cc7ad14da90de65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34185-cwe-89-improper-neutralization-of-s-b24b909e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34185%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Hydrosystem%20Control%20System&amp;severity=high&amp;id=69d779fb1cc7ad14da954be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34184-cwe-862-missing-authorization-in-hy-99f5b924</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34184%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Hydrosystem%20Control%20System&amp;severity=high&amp;id=69d779fb1cc7ad14da954bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4901-cwe-532-insertion-of-sensitive-infor-8b7a094e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4901%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hydrosystem%20Control%20System&amp;severity=medium&amp;id=69d779fb1cc7ad14da954be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62188-cwe-200-exposure-of-sensitive-infor-99fa2049</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62188%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=high&amp;id=69d779fb1cc7ad14da954bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34179-cwe-915-improperly-controlled-modif-752fa0b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34179%3A%20CWE-915%20Improperly%20controlled%20modification%20of%20Dynamically-Determined%20object%20attributes%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34178-cwe-20-improper-input-validation-in-47a9832a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34178%3A%20CWE-20%20Improper%20input%20validation%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34177-cwe-184-incomplete-list-of-disallow-fcea39f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34177%3A%20CWE-184%20Incomplete%20list%20of%20disallowed%20inputs%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34538-cwe-668-exposure-of-resource-to-wro-0014a9aa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34538%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69d773081cc7ad14da8bdc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-reader-zero-day-exploited-for-months-researc-bb17e8d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Reader%20Zero-Day%20Exploited%20for%20Months%3A%20Researcher&amp;severity=medium&amp;id=69d768671cc7ad14da81cf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/300000-people-impacted-by-eurail-data-breach-a952810e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=300%2C000%20People%20Impacted%20by%20Eurail%20Data%20Breach&amp;severity=medium&amp;id=69d764e31cc7ad14da7ab3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5854-os-command-injection-in-totolink-a71-6aac9f98</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5854%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d7ab3c1cc7ad14dac63fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/36-million-stolen-in-bitcoin-depot-hack-9a950dd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%243.6%20Million%20Stolen%20in%20Bitcoin%20Depot%20Hack&amp;severity=medium&amp;id=69d74c471cc7ad14da5c17cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5853-os-command-injection-in-totolink-a71-2b9f2bf4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5853%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d843791cc7ad14da3fb6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5852-os-command-injection-in-totolink-a71-675e6a7d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5852%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d7d5661cc7ad14daeeafd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5851-os-command-injection-in-totolink-a71-cec71662</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5851%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d745461cc7ad14da533b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5850-os-command-injection-in-totolink-a71-c437d074</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5850%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d745461cc7ad14da533b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5849-path-traversal-in-tenda-i12-633437ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5849%3A%20Path%20Traversal%20in%20Tenda%20i12&amp;severity=medium&amp;id=69d73e371cc7ad14da48c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5848-code-injection-in-jeecgboot-jimurepo-5ed759a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5848%3A%20Code%20Injection%20in%20jeecgboot%20JimuReport&amp;severity=medium&amp;id=69d73e371cc7ad14da48c735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5847-information-disclosure-in-code-proje-2971db23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5847%3A%20Information%20Disclosure%20in%20code-projects%20Movie%20Ticketing%20System&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5844-os-command-injection-in-d-link-dir-8-643de94e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5844%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-882&amp;severity=high&amp;id=69d733ab1cc7ad14da3bfe7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5842-authorization-bypass-in-decolua-9rou-1a856ee8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5842%3A%20Authorization%20Bypass%20in%20decolua%209router&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5841-path-traversal-in-tenda-i3-164f6532</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5841%3A%20Path%20Traversal%20in%20Tenda%20i3&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5840-sql-injection-in-phpgurukul-news-por-954d6b68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5840%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b3396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5839-sql-injection-in-phpgurukul-news-por-8075a883</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5839%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b338f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5838-sql-injection-in-phpgurukul-news-por-cde1d916</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5838%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b3388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5742-cwe-79-improper-neutralization-of-in-075f568f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d729211cc7ad14da1b337b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4336-cwe-79-improper-neutralization-of-in-a8fdf393</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4336%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Ultimate%20FAQ%20Accordion%20Plugin&amp;severity=medium&amp;id=69d729211cc7ad14da1b3371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1830-cwe-862-missing-authorization-in-dav-233f04bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1830%3A%20CWE-862%20Missing%20Authorization%20in%20davidfcarr%20Quick%20Playground&amp;severity=critical&amp;id=69d729211cc7ad14da1b336b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5837-sql-injection-in-phpgurukul-news-por-ed5b132e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5837%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5836-cross-site-scripting-in-code-project-5aecdbe0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5836%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5835-cross-site-scripting-in-code-project-c85ef674</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5835%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5834-cross-site-scripting-in-code-project-5de33a51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5834%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3568-cwe-639-authorization-bypass-through-4f70d3ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3568%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3574-cwe-79-improper-neutralization-of-in-05424aae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxdexperts%20Experto%20Dashboard%20for%20WooCommerce&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4429-cwe-79-improper-neutralization-of-in-1c6cee7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photoweblog%20OSM%20%E2%80%93%20OpenStreetMap&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5357-cwe-79-improper-neutralization-of-in-e6dba13a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5357%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4124-cwe-862-missing-authorization-in-oli-51e7aa24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4124%3A%20CWE-862%20Missing%20Authorization%20in%20oliverfriedmann%20Ziggeo&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5833-command-injection-in-awwaiid-mcp-ser-701bd158</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5833%3A%20Command%20Injection%20in%20awwaiid%20mcp-server-taskwarrior&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5832-server-side-request-forgery-in-atoto-14e72165</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5832%3A%20Server-Side%20Request%20Forgery%20in%20atototo%20api-lab-mcp&amp;severity=medium&amp;id=69d736f91cc7ad14da418a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-9th-2026-httpsisc-a0436d63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%209th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9886%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d7097b1cc7ad14daf111f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5831-os-command-injection-in-agions-taskf-212bac83</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5831%3A%20OS%20Command%20Injection%20in%20Agions%20taskflow-ai&amp;severity=medium&amp;id=69d736f91cc7ad14da418a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5830-stack-based-buffer-overflow-in-tenda-981c5f43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5830%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69d736f91cc7ad14da418a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4326-cwe-862-missing-authorization-in-web-dd66b007</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4326%3A%20CWE-862%20Missing%20Authorization%20in%20webilia%20Vertex%20Addons%20for%20Elementor&amp;severity=high&amp;id=69d736f91cc7ad14da418a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shaky-ceasefire-unlikely-to-stop-cyberattacks-from-6f18e0b3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shaky%20Ceasefire%20Unlikely%20to%20Stop%20Cyberattacks%20From%20Iran-Linked%20Hackers%20for%20Long&amp;severity=medium&amp;id=69d702731cc7ad14daeb9723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5829-sql-injection-in-code-projects-simpl-29fb31de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5829%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d736f91cc7ad14da418a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5828-sql-injection-in-code-projects-simpl-1d307435</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5828%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d736f91cc7ad14da418a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/number-usage-in-passwords-take-two-thu-apr-9th-403df6ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Number%20Usage%20in%20Passwords%3A%20Take%20Two%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d6fb701cc7ad14dae5c803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5827-sql-injection-in-code-projects-simpl-99d025b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5827%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd0205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5826-cross-site-scripting-in-code-project-39d2de4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5826%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd01fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5825-cross-site-scripting-in-code-project-cbb32e8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5825%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd01f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-10-8f59087b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-10&amp;severity=medium&amp;id=69d92a5f1cc7ad14dad12fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63238-na-9f8a7fac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63238%3A%20n%2Fa&amp;severity=medium&amp;id=69d843791cc7ad14da3fb68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70797-na-541710b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70797%3A%20n%2Fa&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zsh-59-rce-38823372</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZSH%205.9%20-%20RCE&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jumbo-website-manager-remote-code-execution-e1adfaac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jumbo%20Website%20Manager%20%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romm-440-xsscsrf-chain-26560fa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RomM%20%204.4.0%20-%20%20XSS_CSRF%20Chain&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react-server-1920-remote-code-execution-a47c1524</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React%20Server%2019.2.0%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-09-529a6852</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-09&amp;severity=medium&amp;id=69d83ed21cc7ad14da370704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30478-na-6c9f2b00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30478%3A%20n%2Fa&amp;severity=high&amp;id=69d814ae1cc7ad14da216545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29923-na-d93035f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29923%3A%20n%2Fa&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31170-na-b6e95fba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31170%3A%20n%2Fa&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c16f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30479-na-433cc714</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30479%3A%20n%2Fa&amp;severity=critical&amp;id=69d7d5661cc7ad14daeeafae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70365-na-eb904860</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70365%3A%20n%2Fa&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70364-na-586092fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70364%3A%20n%2Fa&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70811-na-92c3ea46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70811%3A%20n%2Fa&amp;severity=medium&amp;id=69d7bccb1cc7ad14dad7b121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70810-na-aca56658</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70810%3A%20n%2Fa&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50228-na-e450932f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50228%3A%20n%2Fa&amp;severity=critical&amp;id=69d7bccb1cc7ad14dad7b117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45806-na-0e08cff6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45806%3A%20n%2Fa&amp;severity=medium&amp;id=69d7b5c31cc7ad14dad0f194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-09-e95f5b79</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-09&amp;severity=low&amp;id=69d780fb1cc7ad14da9b687c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5824-sql-injection-in-code-projects-simpl-13fb8677</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5824%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d6ed861cc7ad14dac7072b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5823-sql-injection-in-itsourcecode-constr-d97f737e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5823%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d6e9e31cc7ad14dac41f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5815-stack-based-buffer-overflow-in-d-lin-6637b7b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5815%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-645&amp;severity=high&amp;id=69d6e6551cc7ad14dac1d68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5814-sql-injection-in-phpgurukul-online-c-86739237</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5814%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69d6e6551cc7ad14dac1d687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5813-sql-injection-in-phpgurukul-online-c-05695093</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5813%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69d6df4b1cc7ad14dabe8749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5812-business-logic-errors-in-sourcecodes-bdf698b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5812%3A%20Business%20Logic%20Errors%20in%20SourceCodester%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69d6dbd71cc7ad14dabd4729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3199-cwe-502-deserialization-of-untrusted-067114aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3199%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Sonatype%20Nexus%20Repository&amp;severity=critical&amp;id=69d6d8431cc7ad14dabb05cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3438-cwe-79-improper-neutralization-of-in-86971f0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=69d6d8431cc7ad14dabb05d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5811-business-logic-errors-in-sourcecodes-5f8fd1d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5811%3A%20Business%20Logic%20Errors%20in%20SourceCodester%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69d6d8431cc7ad14dabb05d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5810-cross-site-scripting-in-sourcecodest-fc4b6522</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5810%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69d6d13b1cc7ad14dab766c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40036-cwe-770-allocation-of-resources-wit-a6778d4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40036%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20obsidianforensics%20unfurl&amp;severity=high&amp;id=69d6d13b1cc7ad14dab766cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40035-cwe-489-active-debug-code-in-obsidi-883d1265</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40035%3A%20CWE-489%20Active%20Debug%20Code%20in%20obsidianforensics%20unfurl&amp;severity=critical&amp;id=69d6d13b1cc7ad14dab766cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40032-improper-neutralization-of-special--b7859277</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40032%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20tclahr%20UAC&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40031-cwe-427-uncontrolled-search-path-el-86bb5af2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40031%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20ufrisk%20MemProcFS&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40030-improper-neutralization-of-special--e7e4c480</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40030%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20khyrenz%20parseusbs&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40029-improper-neutralization-of-special--af174d66</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40029%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20khyrenz%20parseusbs&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40028-cwe-79-improper-neutralization-of-i-f38ecff8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40028%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yamato-Security%20hayabusa&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bf98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40027-cwe-22-improper-limitation-of-a-pat-c5e77607</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40027%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20abrignoni%20ALEAPP&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5808-cross-site-scripting-in-openstatushq-f958f2cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5808%3A%20Cross%20Site%20Scripting%20in%20openstatusHQ%20openstatus&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5711-cwe-79-improper-neutralization-of-in-b0a1f1ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pubudu-malalasekara%20Post%20Blocks%20%26%20Tools&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5919-insufficient-validation-of-untrusted-cc335c74</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5919%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca441cc7ad14dab3ce63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5918-inappropriate-implementation-in-goog-85bbee64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5918%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca421cc7ad14dab3ce0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5915-insufficient-validation-of-untrusted-40ff480c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5915%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3ce06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5914-type-confusion-in-google-chrome-d064b24a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5914%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3ce02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5913-out-of-bounds-read-in-google-chrome-4fd648ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5913%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5912-integer-overflow-in-google-chrome-73decb5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5912%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5911-policy-bypass-in-google-chrome-bc41f8ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5911%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca421cc7ad14dab3cdf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5910-integer-overflow-in-google-chrome-bb2b2b54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5910%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5909-integer-overflow-in-google-chrome-9cd1c959</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5909%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5908-integer-overflow-in-google-chrome-8af47645</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5908%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5907-insufficient-data-validation-in-goog-b8535f82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5907%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5906-incorrect-security-ui-in-google-chro-e55741d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5906%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5905-incorrect-security-ui-in-google-chro-b1cc01f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5905%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5904-use-after-free-in-google-chrome-033227fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5904%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca401cc7ad14dab3cdb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5903-policy-bypass-in-google-chrome-8f14a797</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5903%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5902-race-in-google-chrome-32d92464</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5902%3A%20Race%20in%20Google%20Chrome&amp;severity=critical&amp;id=69d6ca401cc7ad14dab3cda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5901-policy-bypass-in-google-chrome-0f88b312</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5901%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5900-policy-bypass-in-google-chrome-1d248127</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5900%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5899-incorrect-security-ui-in-google-chro-e7632c22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5899%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5898-incorrect-security-ui-in-google-chro-1ea6a19c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5898%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5897-incorrect-security-ui-in-google-chro-f3fa91bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5897%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5896-policy-bypass-in-google-chrome-4a875369</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5896%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5895-incorrect-security-ui-in-google-chro-be6e597f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5895%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5894-inappropriate-implementation-in-goog-2c81a6bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5894%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5893-race-in-google-chrome-5ddb3cf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5893%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5892-insufficient-policy-enforcement-in-g-cb6c6b8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5892%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5891-insufficient-policy-enforcement-in-g-db71c088</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5891%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5890-race-in-google-chrome-cc385d34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5890%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5889-cryptographic-flaw-in-google-chrome-df3ad6e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5889%3A%20Cryptographic%20Flaw%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5888-uninitialized-use-in-google-chrome-b2563f01</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5888%3A%20Uninitialized%20Use%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5887-insufficient-validation-of-untrusted-d67fafeb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5887%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5886-out-of-bounds-read-in-google-chrome-7ca4d0af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5886%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5885-insufficient-validation-of-untrusted-4ffcbeb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5885%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5884-insufficient-validation-of-untrusted-119bb8eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5884%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5883-use-after-free-in-google-chrome-adf1ec4a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5883%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5882-incorrect-security-ui-in-google-chro-700d0342</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5882%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5881-policy-bypass-in-google-chrome-e00814a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5881%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5880-incorrect-security-ui-in-google-chro-862c68eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5880%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5879-insufficient-validation-of-untrusted-bf0ed693</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5879%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5878-incorrect-security-ui-in-google-chro-b56f6a3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5878%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5877-use-after-free-in-google-chrome-4281f5a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5877%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5876-side-channel-information-leakage-in--bf8afdaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5876%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5875-policy-bypass-in-google-chrome-f0e918b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5875%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5874-use-after-free-in-google-chrome-f08fd110</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5874%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69d6ca391cc7ad14dab3cbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5873-out-of-bounds-read-and-write-in-goog-7d05a430</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5873%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5872-use-after-free-in-google-chrome-6bf1af4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5872%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5871-type-confusion-in-google-chrome-061cf3d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5871%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5870-integer-overflow-in-google-chrome-734323c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5870%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5869-heap-buffer-overflow-in-google-chrom-e9e2c0dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5869%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5868-heap-buffer-overflow-in-google-chrom-a7f123ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5868%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5867-heap-buffer-overflow-in-google-chrom-903da312</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5867%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5866-use-after-free-in-google-chrome-ca9dddbd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5866%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5865-type-confusion-in-google-chrome-eaffaa1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5865%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5864-heap-buffer-overflow-in-google-chrom-9e3c27ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5864%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca371cc7ad14dab3cb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5863-inappropriate-implementation-in-goog-eb628808</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5863%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5862-inappropriate-implementation-in-goog-1605f1f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5862%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5861-use-after-free-in-google-chrome-92acefd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5861%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5860-use-after-free-in-google-chrome-4fcd253c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5860%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5859-integer-overflow-in-google-chrome-baee9cba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5859%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5858-heap-buffer-overflow-in-google-chrom-15930810</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5858%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5806-cross-site-scripting-in-code-project-8a977b91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5806%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d6ca371cc7ad14dab3cb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39860-cwe-61-unix-symbolic-link-symlink-f-8f2fa90c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39860%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20NixOS%20nix&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39892-cwe-119-improper-restriction-of-ope-5b8d3307</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39892%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20pyca%20cryptography&amp;severity=medium&amp;id=69d6c32c1cc7ad14dab1ab4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39891-cwe-94-improper-control-of-generati-8cf06461</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39891%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d6c32c1cc7ad14dab1ab4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39890-cwe-502-deserialization-of-untruste-f407d865</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39890%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39889-cwe-200-exposure-of-sensitive-infor-5cac7484</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39889%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d6c32c1cc7ad14dab1ab44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39888-cwe-657-violation-of-secure-design--053285e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39888%3A%20CWE-657%3A%20Violation%20of%20Secure%20Design%20Principles%20in%20MervinPraison%20praisonaiagents&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39885-cwe-918-server-side-request-forgery-b0b6ba4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39885%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20agentfront%20frontmcp&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5805-sql-injection-in-code-projects-easy--cac7f445</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5805%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39883-cwe-426-untrusted-search-path-in-op-4a3a460e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39883%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20open-telemetry%20opentelemetry-go&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5436-cwe-22-improper-limitation-of-a-path-ba455af8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5436%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20MW%20WP%20Form&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5451-cwe-79-improper-neutralization-of-in-9369247d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20Extensions%20for%20Leaflet%20Map&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39882-cwe-789-memory-allocation-with-exce-341c852d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39882%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-go&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39429-cwe-862-missing-authorization-in-kc-6a375916</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39429%3A%20CWE-862%3A%20Missing%20Authorization%20in%20kcp-dev%20kcp&amp;severity=high&amp;id=69d6bc281cc7ad14daadeade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5803-server-side-request-forgery-in-bigsk-0808d0e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5803%3A%20Server-Side%20Request%20Forgery%20in%20bigsk1%20openai-realtime-ui&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39844-cwe-22-improper-limitation-of-a-pat-2aa72956</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39844%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39416-cwe-79-improper-neutralization-of-i-710941ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39416%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ail-project%20ail-framework&amp;severity=high&amp;id=69d6bc281cc7ad14daadeada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39415-cwe-602-client-side-enforcement-of--aa92afa9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39415%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20frappe%20lms&amp;severity=medium&amp;id=69d6bc281cc7ad14daadead7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39880-cwe-362-concurrent-execution-using--486d98d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39880%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20remnawave%20backend&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5802-os-command-injection-in-idachev-mcp--44929899</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5802%3A%20OS%20Command%20Injection%20in%20idachev%20mcp-javadc&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39862-cwe-78-improper-neutralization-of-s-e1fd5309</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39862%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shopify%20tophat&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39859-cwe-22-improper-limitation-of-a-pat-eb4e4019</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39859%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20harttle%20liquidjs&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39413-cwe-347-improper-verification-of-cr-65040a13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39413%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20HKUDS%20LightRAG&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39412-cwe-200-exposure-of-sensitive-infor-c828575b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39412%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20harttle%20liquidjs&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35525-cwe-61-unix-symbolic-link-symlink-f-c78ff532</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35525%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23869-cwe-502-deserialization-of-untruste-56f5fbec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23869%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data%2C%20(CWE-400)%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-turbopack&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canis-c2-exposed-previously-undocumented-cross-pla-e1c0317e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canis%20C2%20Exposed%3A%20Previously%20Undocumented%20Cross-Platform%20...&amp;severity=medium&amp;id=69d7e6f61cc7ad14dafe7e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35455-cwe-79-improper-neutralization-of-i-573d1665</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35455%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immich-app%20immich&amp;severity=high&amp;id=69d736f91cc7ad14da418a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35446-cwe-552-files-or-directories-access-9eb009af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35446%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20aces%20Loris&amp;severity=high&amp;id=69d6bc281cc7ad14daadeafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35403-cwe-79-improper-neutralization-of-i-664839e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35403%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aces%20Loris&amp;severity=medium&amp;id=69d736f91cc7ad14da418a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35400-cwe-59-improper-link-resolution-bef-9bad991e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35400%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20aces%20Loris&amp;severity=low&amp;id=69d6b51c1cc7ad14daaa5cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35169-cwe-79-improper-neutralization-of-i-2c58241a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35169%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=69d736f91cc7ad14da418a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35165-cwe-639-authorization-bypass-throug-77a552ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35165%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aces%20Loris&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34985-cwe-639-authorization-bypass-throug-b3f6cc2e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34985%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aces%20Loris&amp;severity=medium&amp;id=69d736f91cc7ad14da418a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20709-escalation-of-privilege-in-intelr-p-4405e30a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20709%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Pentium(R)%20Processor%20Silver%20Series%2C%20Intel(R)%20Celeron(R)%20Processor%20J%20Series%2C%20Intel(R)%20Celeron(R)%20Processor%20N%20Series%20may%20allow%20an%20escalation%20of%20privilege.%20Hardware%20reverse%20engineer%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20physical%20access%20when%20attack%20requirements%20are%20present%20with%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34392-cwe-552-files-or-directories-access-3dcf7cce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34392%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20aces%20Loris&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30818-cwe-78-improper-neutralization-of-s-1f2ec8c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30818%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30817-cwe-15-external-control-of-system-o-7377e4ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30817%3A%20CWE-15%20External%20control%20of%20system%20or%20configuration%20setting%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30816-cwe-15-external-control-of-system-o-ad8808da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30816%3A%20CWE-15%20External%20control%20of%20system%20or%20configuration%20setting%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30815-cwe-78-improper-neutralization-of-s-e64f09b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30815%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34166-cwe-400-uncontrolled-resource-consu-597ecf56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34166%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20harttle%20liquidjs&amp;severity=low&amp;id=69d736fd1cc7ad14da418acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30814-cwe-121-stack-based-buffer-overflow-55b44b4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30814%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33350-cwe-89-improper-neutralization-of-s-91697de3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33350%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27806-cwe-78-improper-neutralization-of-s-ba7f9fe1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27806%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=high&amp;id=69d736fb1cc7ad14da418a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30650-cwe-306-missing-authentication-for--762e46b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30650%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0811-cwe-352-cross-site-request-forgery-c-3f34647d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0811%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vsourz1td%20Advanced%20Contact%20form%207%20DB&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0814-cwe-862-missing-authorization-in-vso-88777e5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0814%3A%20CWE-862%20Missing%20Authorization%20in%20vsourz1td%20Advanced%20Contact%20form%207%20DB&amp;severity=medium&amp;id=69d736fb1cc7ad14da418a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2942-cwe-434-unrestricted-upload-of-file--b7e9cbd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2942%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20prosolution%20ProSolution%20WP%20Client&amp;severity=critical&amp;id=69d6b1991cc7ad14daa7cbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-007-cisco-sou-1add4738</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20007%20-%20Cisco%20Source%20Code%20Stolen%20via%20Trivy-Linked%20Breach%2C%20Google%20GTIG%20Tracks%20TeamPCP%20as%20UNC6780%2C%20and%20CISA%20KEV%20Deadline%20Arrives%20with%20No%20Standalone%20Advisory%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d68e701cc7ad14da93c4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32591-server-side-request-forgery-ssrf-in-522c3953</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32591%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d737011cc7ad14da419497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32590-deserialization-of-untrusted-data-i-2ac51227</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32590%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32589-authorization-bypass-through-user-c-a7beb159</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32589%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33466-cwe-22-improper-limitation-of-a-pat-c3f5e5cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33466%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Elastic%20Logstash&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33458-cwe-918-server-side-request-forgery-637efd36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33458%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d6b19c1cc7ad14daa7cc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33459-cwe-400-uncontrolled-resource-consu-70fe4680</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33459%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d737031cc7ad14da4194b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33460-cwe-863-incorrect-authorization-in--22d07900</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33460%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d737031cc7ad14da4194d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14243-generation-of-error-message-contain-a37e8c0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14243%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33461-cwe-863-incorrect-authorization-in--fa848cf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33461%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69d737031cc7ad14da4194db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4498-cwe-250-execution-with-unnecessary-p-df770b45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4498%3A%20CWE-250%20%20Execution%20with%20Unnecessary%20Privileges%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69d737031cc7ad14da4194de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2377-server-side-request-forgery-ssrf-in--81c7f9e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2377%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d6aa921cc7ad14daa3e922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4837-cwe-95-improper-neutralization-of-di-59dba1b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4837%3A%20CWE-95%20Improper%20neutralization%20of%20directives%20in%20dynamically%20evaluated%20code%20(&apos;eval%20injection&apos;)%20in%20Rapid7%20Insight%20Agent&amp;severity=medium&amp;id=69d729211cc7ad14da1b339d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-leakage-vulnerability-patched-in-openssl-53eed26d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Leakage%20Vulnerability%20Patched%20in%20OpenSSL&amp;severity=medium&amp;id=69d679581cc7ad14da88dc9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33753-cwe-295-improper-certificate-valida-6c184a01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33753%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20trailofbits%20rfc3161-client&amp;severity=medium&amp;id=69d672521cc7ad14da85d64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33229-cwe-862-missing-authorization-in-xw-2e4740d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33229%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=69d672521cc7ad14da85d649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-malware-uses-macos-script-editor-to-deliv-7a29e1d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Malware%20Uses%20macOS%20Script%20Editor%20to%20Deliver%20Atomic%20Stealer&amp;severity=medium&amp;id=69d6805e1cc7ad14da8bd0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39410-cwe-20-improper-input-validation-in-1020d1d4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39410%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20honojs%20hono&amp;severity=medium&amp;id=69d672521cc7ad14da85d658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39409-cwe-180-incorrect-behavior-order-va-1414983d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39409%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737041cc7ad14da419536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39408-cwe-22-improper-limitation-of-a-pat-66010df7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39408%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737061cc7ad14da419553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39407-cwe-22-improper-limitation-of-a-pat-eda2389a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39407%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737041cc7ad14da419531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39406-cwe-22-improper-limitation-of-a-pat-011619d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39406%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20node-server&amp;severity=medium&amp;id=69d672521cc7ad14da85d655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39394-cwe-93-improper-neutralization-of-c-77c1a2a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39394%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d737041cc7ad14da41952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39393-cwe-306-missing-authentication-for--2ef30390</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39393%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d737041cc7ad14da41953e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39392-cwe-79-improper-neutralization-of-i-2a311013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39392%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da41952b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-bug-lurked-in-apache-activemq-classic-for-13-y-def0a809</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20Bug%20Lurked%20in%20Apache%20ActiveMQ%20Classic%20for%2013%20Years&amp;severity=medium&amp;id=69d667c41cc7ad14da7efa7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39391-cwe-79-improper-neutralization-of-i-6c691515</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39391%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d672521cc7ad14da85d652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39390-cwe-79-improper-neutralization-of-i-3ca1c395</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39390%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da419528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39389-cwe-285-improper-authorization-in-c-861cb544</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39389%3A%20CWE-285%3A%20Improper%20Authorization%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da41953b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-honeypot-fingerprinting-scans-wed-apr-8th-8f55a218</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20Honeypot%20Fingerprinting%20Scans%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d667d01cc7ad14da7efc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58713-incorrect-default-permissions-in-re-e2dea4de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58713%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Process%20Automation%207&amp;severity=medium&amp;id=69d664421cc7ad14da7c09be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57853-incorrect-default-permissions-in-re-598e8725</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57853%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Web%20Terminal&amp;severity=medium&amp;id=69d664421cc7ad14da7c09b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57854-incorrect-default-permissions-in-re-a8e4f541</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57854%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Update%20Service&amp;severity=medium&amp;id=69d664421cc7ad14da7c09ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57851-incorrect-default-permissions-in-re-4a9ea030</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57851%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Multicluster%20Engine%20for%20Kubernetes&amp;severity=medium&amp;id=69d664421cc7ad14da7c09b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57847-incorrect-default-permissions-in-re-2124732f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57847%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=69d664421cc7ad14da7c09ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lua-based-malware-lucidrook-observed-in-target-41a1408d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Lua-based%20malware%20LucidRook%20observed%20in%20targeted%20attacks%20against%20Taiwanese%20organizations&amp;severity=medium&amp;id=69d683e41cc7ad14da8df5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-cybercrime-losses-neared-21-billion-in-2025-aee29786</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20Cybercrime%20Losses%20Neared%20%2421%20Billion%20in%202025&amp;severity=high&amp;id=69d659b41cc7ad14da6ff066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5795-cwe-226-sensitive-information-in-res-9bb8041f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5795%3A%20CWE-226%20Sensitive%20information%20in%20resource%20not%20removed%20before%20reuse%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69d729211cc7ad14da1b33a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2509-cwe-79-improper-neutralization-of-in-d2f401e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=69d737031cc7ad14da4194b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14816-cwe-317-cleartext-storage-of-sensit-e3c6f53b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14816%3A%20CWE-317%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20GUI%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=critical&amp;id=69d737041cc7ad14da419523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14815-cwe-312-cleartext-storage-of-sensit-1111c12c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14815%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=critical&amp;id=69d737041cc7ad14da41951e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35023-cwe-639-authorization-bypass-throug-032ebf5b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35023%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cloud%20Solutions%20SAS%20Wimi%20Teamwork&amp;severity=medium&amp;id=69d737061cc7ad14da419558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28261-cwe-532-insertion-of-sensitive-info-3383cc31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28261%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20Elastic%20Cloud%20Storage&amp;severity=high&amp;id=69d652ab1cc7ad14da6cf237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massachusetts-hospital-diverts-ambulances-as-cyber-a4d8f793</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massachusetts%20Hospital%20Diverts%20Ambulances%20as%20Cyberattack%20Causes%20Disruption&amp;severity=medium&amp;id=69d64ba31cc7ad14da6b63d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24511-cwe-209-generation-of-error-message-464099fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24511%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27102-cwe-266-incorrect-privilege-assignm-09eee350</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27102%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5302-cwe-942-permissive-cross-domain-poli-0fe04074</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5302%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20CoolerControl%20coolercontrold&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5300-cwe-306-missing-authentication-for-c-24cdf83c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5300%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20CoolerControl%20coolercontrold&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5301-cwe-79-improper-neutralization-of-in-aa6dc7fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5301%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoolerControl%20coolercontrol-ui&amp;severity=high&amp;id=69d64bc31cc7ad14da6b6b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-masjesu-ddos-botnet-targets-iot-devices-aef686d5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Masjesu%20DDoS%20Botnet%20Targets%20IoT%20Devices&amp;severity=critical&amp;id=69d641171cc7ad14da6710d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5208-cwe-78-improper-neutralization-of-sp-43d0d794</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CoolerControl%20coolercontrold&amp;severity=high&amp;id=69d641201cc7ad14da672288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28264-cwe-732-incorrect-permission-assign-c77bd300</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28264%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20PowerProtect%20Agent&amp;severity=low&amp;id=69d641201cc7ad14da672271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-targeting-critical-ninja-forms-bug-that-ex-4a20e46c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Targeting%20Critical%20Ninja%20Forms%20Bug%20That%20Exposes%20WordPress%20Sites%20to%20Takeover&amp;severity=critical&amp;id=69d63a0f1cc7ad14da63b20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3396-cwe-89-improper-neutralization-of-sp-b4d531e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3396%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shamimmoeen%20WCAPF%20%E2%80%93%20Ajax%20Product%20Filter%20for%20WooCommerce&amp;severity=high&amp;id=69d641201cc7ad14da672280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1672-cwe-352-cross-site-request-forgery-c-20c6ab40</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1672%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20realmag777%20BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&amp;severity=medium&amp;id=69d641201cc7ad14da672260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2481-cwe-79-improper-neutralization-of-in-74882230</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2481%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=69d641201cc7ad14da672274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3243-cwe-22-improper-limitation-of-a-path-47ffd1ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3243%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danbilabs%20Advanced%20Members%20for%20ACF&amp;severity=high&amp;id=69d641201cc7ad14da672278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1673-cwe-352-cross-site-request-forgery-c-e5802127</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1673%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20realmag777%20BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&amp;severity=medium&amp;id=69d641201cc7ad14da672267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1865-cwe-89-improper-neutralization-of-sp-26abc5f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1865%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69d641201cc7ad14da67226d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-disrupts-russian-espionage-operation-involving--40648239</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Disrupts%20Russian%20Espionage%20Operation%20Involving%20Hacked%20Routers%20and%20DNS%20Hijacking&amp;severity=medium&amp;id=69d6368b1cc7ad14da6116ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4300-cwe-79-improper-neutralization-of-in-28f97e93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery%20%E2%80%93%20Photo%20%26%20Image%20Slider&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fceb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4025-cwe-79-improper-neutralization-of-in-595e52c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4025%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lcweb-projects%20PrivateContent%20Free&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fce9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4303-cwe-79-improper-neutralization-of-in-668fbda1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osamaesh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fcec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4073-cwe-79-improper-neutralization-of-in-d7e9452f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dougblackjr%20pdfl.io&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fcea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-contagious-interview-campaign-spreads-dab88f6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea&apos;s%20Contagious%20Interview%20Campaign%20Spreads%20Across%205%20Ecosystems%2C%20Delivering%20Staged%20RAT%20Payloads&amp;severity=medium&amp;id=69d636951cc7ad14da612c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-64-bit-variant-of-the-infamous-lumma-f87ffc8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20The%2064-bit%20Variant%20of%20the%20Infamous%20Lumma%20Stealer&amp;severity=medium&amp;id=69d636951cc7ad14da612c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leveling-up-with-nightspire-ransomware-15a6d07c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leveling%20Up%20with%20NightSpire%20Ransomware&amp;severity=medium&amp;id=69d636951cc7ad14da612c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25776-code-injection-in-six-apart-ltd-mov-c0a38b7e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25776%3A%20Code%20injection%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=critical&amp;id=69d61a8c1cc7ad14da4e089b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33088-improper-neutralization-of-special--986381b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33088%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=high&amp;id=69d61a8c1cc7ad14da4e08a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39716-missing-authorization-in-ckthemes-f-5bb90c60</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39716%3A%20Missing%20Authorization%20in%20CKThemes%20Flipmart&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39715-missing-authorization-in-anytrack-a-c8c688ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39715%3A%20Missing%20Authorization%20in%20AnyTrack%20AnyTrack%20Affiliate%20Link%20Manager&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39714-missing-authorization-in-g5theme-g5-7e202b33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39714%3A%20Missing%20Authorization%20in%20G5Theme%20G5Plus%20April&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39713-missing-authorization-in-mailerclou-885e1e12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39713%3A%20Missing%20Authorization%20in%20mailercloud%20Mailercloud%20%26%238211%3B%20Integrate%20webforms%20and%20synchronize%20website%20contacts&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39712-improper-neutralization-of-script-r-e77d5193</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39712%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39711-insertion-of-sensitive-information--6fd7de96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39711%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20stmcan%20RT-Theme%2018%20%7C%20Extensions&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39710-cross-site-request-forgery-csrf-in--ffdaf480</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39710%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stmcan%20RT-Theme%2018%20%7C%20Extensions&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39709-insertion-of-sensitive-information--07f770e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39709%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20thetechtribe%20The%20Tribal&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39708-improper-neutralization-of-input-du-37293b52</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39708%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uicore%20UiCore%20Elements&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39707-missing-authorization-in-zealousweb-1c0f1e09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39707%3A%20Missing%20Authorization%20in%20ZealousWeb%20Accept%20PayPal%20Payments%20using%20Contact%20Form%207&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b00a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39706-missing-authorization-in-netro-syst-76ad30c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39706%3A%20Missing%20Authorization%20in%20Netro%20Systems%20Make%20My%20Trivia&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b00a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39705-missing-authorization-in-mulika-tea-3f637445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39705%3A%20Missing%20Authorization%20in%20Mulika%20Team%20MIPL%20WC%20Multisite%20Sync&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b009d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39704-missing-authorization-in-nfusionsol-461a37b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39704%3A%20Missing%20Authorization%20in%20nfusionsolutions%20Precious%20Metals%20Automated%20Product%20Pricing%20%26%238211%3B%20Pro&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b009a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39703-improper-neutralization-of-input-du-4f8d1788</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39703%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39702-improper-neutralization-of-input-du-605f6758</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39702%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wealcoder%20Animation%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39701-missing-authorization-in-andrew-sho-2a1a28f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39701%3A%20Missing%20Authorization%20in%20Andrew%20ShopWP&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39700-missing-authorization-in-wpxpo-wowo-434bf2b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39700%3A%20Missing%20Authorization%20in%20WPXPO%20WowOptin&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b008e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39699-missing-authorization-in-massiveshi-21bf615b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39699%3A%20Missing%20Authorization%20in%20massiveshift%20AI%20Workflow%20Automation&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b008b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39698-missing-authorization-in-publisherd-f1b61006</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39698%3A%20Missing%20Authorization%20in%20PublisherDesk%20The%20Publisher%20Desk%20ads.txt&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39697-missing-authorization-in-hbss-techn-f0e981c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39697%3A%20Missing%20Authorization%20in%20HBSS%20Technologies%20MAIO%20%26%238211%3B%20The%20new%20AI%20GEO%20%2F%20SEO%20tool&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39696-improper-neutralization-of-input-du-69c8831b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39696%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elfsight%20Elfsight%20WhatsApp%20Chat%20CC&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39694-missing-authorization-in-nsquared-s-37b8eff3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39694%3A%20Missing%20Authorization%20in%20NSquared%20Simply%20Schedule%20Appointments&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39693-improper-neutralization-of-input-du-a9c9bdc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39693%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fesomia%20FSM%20Custom%20Featured%20Image%20Caption&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39692-improper-neutralization-of-input-du-830a178a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39692%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b003d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39691-missing-authorization-in-adastracry-96af4a1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39691%3A%20Missing%20Authorization%20in%20AdAstraCrypto%20Cryptocurrency%20Donation%20Box%20%E2%80%93%20Bitcoin%20%26%20Crypto%20Donations&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b003a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39690-missing-authorization-in-paul-bearn-915d2868</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39690%3A%20Missing%20Authorization%20in%20Paul%20Bearne%20Author%20Avatars%20List%2FBlock&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39689-missing-authorization-in-eshipper-e-5e8bc15c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39689%3A%20Missing%20Authorization%20in%20eshipper%20eShipper%20Commerce&amp;severity=null&amp;id=69d6170c1cc7ad14da4b0034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39688-missing-authorization-in-glowlogix--4d7f1971</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39688%3A%20Missing%20Authorization%20in%20Glowlogix%20WP%20Frontend%20Profile&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39687-missing-authorization-in-rapid-car--54457d5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39687%3A%20Missing%20Authorization%20in%20Rapid%20Car%20Check%20Rapid%20Car%20Check%20Vehicle%20Data&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b002e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39686-exposure-of-sensitive-system-inform-a60b3975</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39686%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20bannersky%20BSK%20PDF%20Manager&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39685-missing-authorization-in-lvaudore-t-dfcb5c55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39685%3A%20Missing%20Authorization%20in%20lvaudore%20The%20Moneytizer&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39684-improper-control-of-filename-for-in-ef8b4fbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39684%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20UnTheme%20OrganicFood&amp;severity=high&amp;id=69d6170a1cc7ad14da4affe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39683-improper-neutralization-of-input-du-e59c4297</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chief%20Gnome%20Garden%20Gnome%20Package&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39682-missing-authorization-in-arjan-pron-4a6b3907</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39682%3A%20Missing%20Authorization%20in%20Arjan%20Pronk%20linkPizza-Manager&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39681-improper-control-of-filename-for-in-1690a4a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39681%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Homeo&amp;severity=high&amp;id=69d6170a1cc7ad14da4affd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39680-missing-authorization-in-mwp-develo-0cd2af4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39680%3A%20Missing%20Authorization%20in%20MWP%20Development%20Diet%20Calorie%20Calculator&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39679-improper-control-of-filename-for-in-427ce365</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39679%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Freeio&amp;severity=high&amp;id=69d6170a1cc7ad14da4affd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39678-missing-authorization-in-dotonpaper-6bffaa78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39678%3A%20Missing%20Authorization%20in%20DOTonPAPER%20Pinpoint%20Booking%20System&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39677-improper-control-of-filename-for-in-d312e518</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39677%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Emphires&amp;severity=high&amp;id=69d6170a1cc7ad14da4affcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39676-missing-authorization-in-shahjada-d-f847ca3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39676%3A%20Missing%20Authorization%20in%20Shahjada%20Download%20Manager&amp;severity=medium&amp;id=69d617091cc7ad14da4aff70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39675-missing-authorization-in-webmuehle--de1f4d2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39675%3A%20Missing%20Authorization%20in%20webmuehle%20Court%20Reservation&amp;severity=medium&amp;id=69d617091cc7ad14da4aff6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39674-improper-neutralization-of-input-du-f256b351</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Manoj%20Kumar%20MK%20Google%20Directions&amp;severity=medium&amp;id=69d617091cc7ad14da4aff6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39673-missing-authorization-in-shrikantka-a43e6ac7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39673%3A%20Missing%20Authorization%20in%20shrikantkale%20iZooto&amp;severity=medium&amp;id=69d617091cc7ad14da4aff67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39672-missing-authorization-in-shiptime-s-c1df82e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39672%3A%20Missing%20Authorization%20in%20shiptime%20ShipTime%3A%20Discounted%20Shipping%20Rates&amp;severity=medium&amp;id=69d617091cc7ad14da4aff64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39671-cross-site-request-forgery-csrf-in--cfec4007</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39671%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dotstore%20Extra%20Fees%20Plugin%20for%20WooCommerce&amp;severity=high&amp;id=69d617091cc7ad14da4aff61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39670-server-side-request-forgery-ssrf-in-9775c543</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39670%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Brecht%20Visual%20Link%20Preview&amp;severity=medium&amp;id=69d617091cc7ad14da4aff5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39668-missing-authorization-in-g5theme-bo-cf8964bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39668%3A%20Missing%20Authorization%20in%20g5theme%20Book%20Previewer%20for%20Woocommerce&amp;severity=medium&amp;id=69d617091cc7ad14da4aff5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39667-improper-neutralization-of-input-du-2d48dce4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39667%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jongmyoung%20Kim%20Korea%20SNS&amp;severity=medium&amp;id=69d617091cc7ad14da4aff58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39666-improper-neutralization-of-input-du-87b4cf8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20telepathy%20Hello%20Bar%20Popup%20Builder&amp;severity=medium&amp;id=69d617091cc7ad14da4aff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39665-improper-neutralization-of-input-du-8c22e649</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39665%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladimir%20Prelovac%20SEO%20Friendly%20Images&amp;severity=medium&amp;id=69d617071cc7ad14da4aff48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39663-missing-authorization-in-themetechm-be395ba6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39663%3A%20Missing%20Authorization%20in%20themetechmount%20TrueBooker&amp;severity=medium&amp;id=69d617071cc7ad14da4aff45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39662-missing-authorization-in-prowcplugi-bc63743f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39662%3A%20Missing%20Authorization%20in%20ProWCPlugins%20Product%20Price%20by%20Formula%20for%20WooCommerce&amp;severity=medium&amp;id=69d617071cc7ad14da4aff42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39660-missing-authorization-in-automattic-d4520bba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39660%3A%20Missing%20Authorization%20in%20Automattic%20WP%20Job%20Manager&amp;severity=medium&amp;id=69d617071cc7ad14da4aff3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39658-missing-authorization-in-coding-pan-6a730078</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39658%3A%20Missing%20Authorization%20in%20Coding%20Panda%20Panda%20Pods%20Repeater%20Field&amp;severity=medium&amp;id=69d617071cc7ad14da4aff3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39657-missing-authorization-in-leadlovers-d6a0a48b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39657%3A%20Missing%20Authorization%20in%20leadlovers%20leadlovers%20forms&amp;severity=medium&amp;id=69d617071cc7ad14da4aff39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39656-missing-authorization-in-razorpay-r-7b8f408a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39656%3A%20Missing%20Authorization%20in%20Razorpay%20Razorpay%20for%20WooCommerce&amp;severity=medium&amp;id=69d617071cc7ad14da4aff36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39654-improper-neutralization-of-input-du-8e014536</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39654%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashish%20Ajani%20WP%20Simple%20HTML%20Sitemap&amp;severity=null&amp;id=69d617071cc7ad14da4aff33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39653-missing-authorization-in-deepen-baj-12aea5fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39653%3A%20Missing%20Authorization%20in%20Deepen%20Bajracharya%20Video%20Conferencing%20with%20Zoom&amp;severity=medium&amp;id=69d617071cc7ad14da4aff30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39652-missing-authorization-in-igms-igms--5296a529</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39652%3A%20Missing%20Authorization%20in%20igms%20iGMS%20Direct%20Booking&amp;severity=medium&amp;id=69d617071cc7ad14da4aff2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39651-missing-authorization-in-totalsuite-944d0008</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39651%3A%20Missing%20Authorization%20in%20TotalSuite%20Total%20Poll%20Lite&amp;severity=medium&amp;id=69d617051cc7ad14da4afefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39650-missing-authorization-in-unitech-we-6e818b77</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39650%3A%20Missing%20Authorization%20in%20Unitech%20Web%20UnitechPay&amp;severity=medium&amp;id=69d617051cc7ad14da4afefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39649-missing-authorization-in-themebeez--ce475639</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39649%3A%20Missing%20Authorization%20in%20themebeez%20Royale%20News&amp;severity=medium&amp;id=69d617051cc7ad14da4afef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39648-missing-authorization-in-themebeez--b3361ed4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39648%3A%20Missing%20Authorization%20in%20themebeez%20Cream%20Blog&amp;severity=medium&amp;id=69d617051cc7ad14da4afef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39647-server-side-request-forgery-ssrf-in-8e42a0c1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39647%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonaar%20MP3%20Audio%20Player%20for%20Music%2C%20Radio%20%26%20Podcast%20by%20Sonaar&amp;severity=medium&amp;id=69d617051cc7ad14da4afef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39646-improper-neutralization-of-input-du-35cfcff0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bozdoz%20Leaflet%20Map&amp;severity=medium&amp;id=69d617051cc7ad14da4afeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39645-server-side-request-forgery-ssrf-in-bd2c4602</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39645%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Global%20Payments%20GlobalPayments%20WooCommerce&amp;severity=medium&amp;id=69d617051cc7ad14da4afeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39644-missing-authorization-in-roxnor-wp--0ca5b0ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39644%3A%20Missing%20Authorization%20in%20Roxnor%20Wp%20Ultimate%20Review&amp;severity=medium&amp;id=69d617051cc7ad14da4afee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39643-missing-authorization-in-payment-pl-e37c79ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39643%3A%20Missing%20Authorization%20in%20Payment%20Plugins%20Payment%20Plugins%20for%20PayPal%20WooCommerce&amp;severity=medium&amp;id=69d617051cc7ad14da4afee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39641-cross-site-request-forgery-csrf-in--2af9df80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39641%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Skywarrior%20Blackfyre&amp;severity=medium&amp;id=69d617051cc7ad14da4afee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39640-cross-site-request-forgery-csrf-in--2243ccb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39640%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mndpsingh287%20Theme%20Editor&amp;severity=critical&amp;id=69d617031cc7ad14da4afea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39639-missing-authorization-in-redpixelst-bee83bf4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39639%3A%20Missing%20Authorization%20in%20redpixelstudios%20RPS%20Include%20Content&amp;severity=medium&amp;id=69d617031cc7ad14da4afea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39638-improper-neutralization-of-input-du-7631301e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Qubely&amp;severity=medium&amp;id=69d617031cc7ad14da4afea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39637-missing-authorization-in-spabrice-m-bdd66bda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39637%3A%20Missing%20Authorization%20in%20SpabRice%20Mogi&amp;severity=medium&amp;id=69d617031cc7ad14da4afe9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39636-improper-neutralization-of-input-du-3c4a91d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d617031cc7ad14da4afe9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39635-cross-site-request-forgery-csrf-in--a32a3287</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39635%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Magazine&amp;severity=medium&amp;id=69d617031cc7ad14da4afe97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39634-cross-site-request-forgery-csrf-in--4494cb3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39634%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Portfolio&amp;severity=medium&amp;id=69d617031cc7ad14da4afe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39633-cross-site-request-forgery-csrf-in--0c89e848</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39633%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Car%20Rental&amp;severity=medium&amp;id=69d617031cc7ad14da4afe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39632-cross-site-request-forgery-csrf-in--876f30ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39632%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Blog&amp;severity=medium&amp;id=69d617031cc7ad14da4afe8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39631-missing-authorization-in-ronikunlim-056815bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39631%3A%20Missing%20Authorization%20in%20Ronik%40UnlimitedWP%20WPSchoolPress&amp;severity=medium&amp;id=69d617031cc7ad14da4afe8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39629-improper-neutralization-of-script-r-c319eefa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39629%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20Uminex&amp;severity=medium&amp;id=69d617011cc7ad14da4afdd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39628-improper-neutralization-of-script-r-396420fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39628%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20DukaMarket&amp;severity=medium&amp;id=69d617011cc7ad14da4afdd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39627-missing-authorization-in-wproyal-as-b41441e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39627%3A%20Missing%20Authorization%20in%20wproyal%20Ashe&amp;severity=medium&amp;id=69d617011cc7ad14da4afdd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39626-improper-neutralization-of-script-r-0f0d2bb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39626%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20Armania&amp;severity=medium&amp;id=69d617011cc7ad14da4afdce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39625-improper-neutralization-of-script-r-a01cb56a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39625%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20TechOne&amp;severity=medium&amp;id=69d617011cc7ad14da4afdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39624-missing-authorization-in-kutethemes-7c0e8504</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39624%3A%20Missing%20Authorization%20in%20kutethemes%20Biolife&amp;severity=medium&amp;id=69d617011cc7ad14da4afdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39623-improper-control-of-filename-for-in-4d2fd1c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39623%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20kutethemes%20Biolife&amp;severity=high&amp;id=69d617011cc7ad14da4afdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39622-missing-authorization-in-acmethemes-8703d7da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39622%3A%20Missing%20Authorization%20in%20acmethemes%20Education%20Base&amp;severity=medium&amp;id=69d617011cc7ad14da4afdc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39621-cross-site-request-forgery-csrf-in--6a2ce25f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39621%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20SpicePress&amp;severity=high&amp;id=69d617011cc7ad14da4afdbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39620-cross-site-request-forgery-csrf-in--fa017005</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39620%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20priyanshumittal%20Appointment&amp;severity=critical&amp;id=69d617011cc7ad14da4afdbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39619-cross-site-request-forgery-csrf-in--fb37f1cf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39619%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20priyanshumittal%20Busiprof&amp;severity=critical&amp;id=69d616fe1cc7ad14da4afd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39618-cross-site-request-forgery-csrf-in--ec5ce884</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39618%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themearile%20NewsExo&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39617-cross-site-request-forgery-csrf-in--10c0110c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20priyanshumittal%20Bluestreet&amp;severity=critical&amp;id=69d616fe1cc7ad14da4afd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39616-authorization-bypass-through-user-c-78d81e2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39616%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dFactory%20Download%20Attachments&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39615-improper-neutralization-of-input-du-251c6e78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shahjada%20Download%20Manager&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39614-missing-authorization-in-ilghera-jw-c0b4a550</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39614%3A%20Missing%20Authorization%20in%20ilGhera%20JW%20Player%20for%20WordPress&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39613-improper-control-of-filename-for-in-b90760c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39613%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20kutethemes%20Boutique&amp;severity=high&amp;id=69d616fe1cc7ad14da4afd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39612-missing-authorization-in-kutethemes-2d5544f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39612%3A%20Missing%20Authorization%20in%20kutethemes%20KuteShop&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39611-improper-control-of-filename-for-in-62d28ace</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39611%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20kutethemes%20KuteShop&amp;severity=high&amp;id=69d616fe1cc7ad14da4afd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39610-missing-authorization-in-pankaj-kum-c7e969a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39610%3A%20Missing%20Authorization%20in%20Pankaj%20Kumar%20WpXmas-Snow&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39609-missing-authorization-in-wavaco-wav-ac9b8fb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39609%3A%20Missing%20Authorization%20in%20Wava.co%20Wava%20Payment&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39608-missing-authorization-in-ipospays-i-faef3077</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39608%3A%20Missing%20Authorization%20in%20iPOSPays%20iPOSpays%20Gateways%20WC&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39607-missing-authorization-in-wpbens-fil-ece8b913</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39607%3A%20Missing%20Authorization%20in%20Wpbens%20Filter%20Plus&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39606-missing-authorization-in-foysal-imr-50c178ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39606%3A%20Missing%20Authorization%20in%20Foysal%20Imran%20BizReview&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39605-missing-authorization-in-obadiah-su-7ae924d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39605%3A%20Missing%20Authorization%20in%20Obadiah%20Super%20Custom%20Login&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39604-improper-neutralization-of-input-du-3872f08c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39604%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookTable%20Bookstore&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39603-cross-site-request-forgery-csrf-in--c72d1294</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39603%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Photography&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39602-missing-authorization-in-rustaurius-63531315</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39602%3A%20Missing%20Authorization%20in%20Rustaurius%20Order%20Tracking&amp;severity=null&amp;id=69d616fc1cc7ad14da4afc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39592-missing-authorization-in-andy-ha-de-80b4222f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39592%3A%20Missing%20Authorization%20in%20Andy%20Ha%20DEPART&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39588-missing-authorization-in-nmerii-nm--e798b4ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39588%3A%20Missing%20Authorization%20in%20nmerii%20NM%20Gift%20Registry%20and%20Wishlist%20Lite&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39586-insertion-of-sensitive-information--c19d163a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39586%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ateeq%20Rafeeq%20RepairBuddy&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39585-missing-authorization-in-arraytics--3cdfad1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39585%3A%20Missing%20Authorization%20in%20Arraytics%20Booktics&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39575-improper-neutralization-of-input-du-3d1e8b18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ronald%20Huereca%20Custom%20Query%20Blocks&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39572-exposure-of-sensitive-system-inform-a5237c39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39572%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20magepeopleteam%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39571-exposure-of-sensitive-system-inform-b08f32be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39571%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Themefic%20Instantio&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39570-insertion-of-sensitive-information--0254299a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39570%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39569-missing-authorization-in-aa-web-ser-1ea0bfe6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39569%3A%20Missing%20Authorization%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39566-exposure-of-sensitive-system-inform-bab9495d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39566%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39565-missing-authorization-in-magepeople-51b3362f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39565%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpTravelly&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39564-insertion-of-sensitive-information--f306c3d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39564%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39563-missing-authorization-in-illid-shar-6719974c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39563%3A%20Missing%20Authorization%20in%20ILLID%20Share%20This%20Image&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39562-missing-authorization-in-boldgrid-c-f3791555</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39562%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39561-missing-authorization-in-wp-chill-r-199a1e62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39561%3A%20Missing%20Authorization%20in%20WP%20Chill%20Revive.so&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39544-improper-control-of-filename-for-in-91cc223d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39544%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themeStek%20LabtechCO&amp;severity=high&amp;id=69d616f91cc7ad14da4afbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39543-missing-authorization-in-themefic-t-196247a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39543%3A%20Missing%20Authorization%20in%20Themefic%20Tourfic&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39542-insertion-of-sensitive-information--0460275f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39542%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Doofinder%20Doofinder%20for%20WooCommerce&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39541-improper-neutralization-of-input-du-73f33e9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39538-improper-control-of-filename-for-in-91d9ccf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39538%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Mikado%20Core&amp;severity=high&amp;id=69d616f91cc7ad14da4afbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39536-exposure-of-sensitive-system-inform-85ad2a2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39536%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WP%20Chill%20RSVP%20and%20Event%20Management&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39535-missing-authorization-in-fullworks--a42a2483</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39535%3A%20Missing%20Authorization%20in%20fullworks%20Display%20Eventbrite%20Events&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39521-server-side-request-forgery-ssrf-in-f2101bb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39521%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Nelio%20Software%20Nelio%20Content&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39520-missing-authorization-in-wedevs-wed-c70e74d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39520%3A%20Missing%20Authorization%20in%20weDevs%20weDocs&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39517-improper-neutralization-of-input-du-09284a0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20A%20WP%20Life%20Blog%20Filter&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39516-exposure-of-sensitive-system-inform-66aa6a83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39516%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39510-authorization-bypass-through-user-c-d1b52bbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39510%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20Chill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=low&amp;id=69d616f71cc7ad14da4afb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39509-missing-authorization-in-wpwax-dire-e5a0bac6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39509%3A%20Missing%20Authorization%20in%20wpWax%20Directorist&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39508-improper-neutralization-of-input-du-7de8079d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39508%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20Kohlbach%20Advanced%20Coupons%20for%20WooCommerce%20Coupons&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39506-missing-authorization-in-jordy-meow-8ed7dcf5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39506%3A%20Missing%20Authorization%20in%20Jordy%20Meow%20AI%20Engine%20(Pro)&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39505-missing-authorization-in-craig-hewi-7796c727</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39505%3A%20Missing%20Authorization%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39504-missing-authorization-in-instawp-in-9d2aa628</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39504%3A%20Missing%20Authorization%20in%20InstaWP%20InstaWP%20Connect&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39501-missing-authorization-in-realmag777-a60ba421</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39501%3A%20Missing%20Authorization%20in%20RealMag777%20FOX&amp;severity=medium&amp;id=69d616f51cc7ad14da4afb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39500-improper-neutralization-of-input-du-90bb209c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themesflat%20themesflat-addons-for-elementor&amp;severity=medium&amp;id=69d616f51cc7ad14da4afafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39497-improper-neutralization-of-special--41e1ab43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39497%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RealMag777%20FOX&amp;severity=high&amp;id=69d616f51cc7ad14da4afafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39496-improper-neutralization-of-special--7b4afd34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39496%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YayMail&amp;severity=high&amp;id=69d616f51cc7ad14da4afaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39495-improper-neutralization-of-special--e31f432d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39495%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NSquared%20Simply%20Schedule%20Appointments&amp;severity=high&amp;id=69d616f51cc7ad14da4afaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39487-improper-neutralization-of-special--6e2a6b79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39487%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ameliabooking%20Amelia&amp;severity=high&amp;id=69d616f51cc7ad14da4afaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39486-improper-neutralization-of-special--ca98010d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39486%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Chill%20Download%20Monitor&amp;severity=null&amp;id=69d616f51cc7ad14da4afaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39485-missing-authorization-in-embedplus--553b7b84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39485%3A%20Missing%20Authorization%20in%20embedplus%20Youtube%20Embed%20Plus&amp;severity=medium&amp;id=69d616f51cc7ad14da4afaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39484-url-redirection-to-untrusted-site-o-aefc8aa3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39484%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20John%20Darrel%20Hide%20My%20WP%20Ghost&amp;severity=medium&amp;id=69d616f51cc7ad14da4afae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39483-improper-neutralization-of-input-du-bde97d33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39483%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hidekazu%20Ishikawa%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=69d616f51cc7ad14da4afae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39482-improper-neutralization-of-input-du-72a40454</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39482%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PublishPress%20Post%20Expirator&amp;severity=medium&amp;id=69d616f31cc7ad14da4afaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39479-improper-neutralization-of-special--f248450f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39479%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Brainstorm%20Force%20OttoKit&amp;severity=high&amp;id=69d616f31cc7ad14da4afaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39477-missing-authorization-in-brainstorm-2883b008</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39477%3A%20Missing%20Authorization%20in%20Brainstorm%20Force%20CartFlows&amp;severity=medium&amp;id=69d616f31cc7ad14da4afaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39476-missing-authorization-in-syed-balkh-71ee3c64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39476%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20User%20Feedback&amp;severity=medium&amp;id=69d616f31cc7ad14da4afaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39475-improper-neutralization-of-special--4455fa78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39475%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Syed%20Balkhi%20User%20Feedback&amp;severity=high&amp;id=69d616f31cc7ad14da4afaa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39473-insertion-of-sensitive-information--68bbdf27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39473%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20P%C3%A4r%20Thernstr%C3%B6m%20Simple%20History&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39469-exposure-of-sensitive-system-inform-ea7f9095</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39469%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Softaculous%20PageLayer&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39466-improper-neutralization-of-special--5e225890</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39466%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Broken%20Link%20Checker&amp;severity=high&amp;id=69d616f31cc7ad14da4afa97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39464-server-side-request-forgery-ssrf-in-5f9f2910</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39464%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SeedProd%20Coming%20Soon%20Page%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20by%20SeedProd&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1396-cwe-79-improper-neutralization-of-in-d8ea9142</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magicplugins%20Magic%20Conversation%20For%20Gravity%20Forms&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hardening-security-management-console-settings-kas-196b1d89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hardening%20security%20management%20console%20settings%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d843531cc7ad14da3f9421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4330-cwe-639-authorization-bypass-through-5faf3f4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4330%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=69d60c5a1cc7ad14da40051f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4654-cwe-639-authorization-bypass-through-3569b1d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4654%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=medium&amp;id=69d60c5a1cc7ad14da400531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4655-cwe-79-improper-neutralization-of-in-b7a2a664</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4655%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d60c5a1cc7ad14da400539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4483-cwe-782-exposed-ioctl-with-insuffici-c15e4a28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4483%3A%20CWE-782%3A%20Exposed%20IOCTL%20with%20Insufficient%20Access%20Control%20in%20Moxa%20MxGeneralIo&amp;severity=high&amp;id=69d6330f1cc7ad14da5fceca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1794-cwe-79-improper-neutralization-of-in-5f6cbf28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johanaarstein%20AM%20LottiePlayer&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3781-cwe-89-improper-neutralization-of-sp-8de4ea08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3781%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tnomi%20Attendance%20Manager&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37386a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4141-cwe-352-cross-site-request-forgery-c-1bb39fd6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4141%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edckwt%20Quran%20Translations&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2838-cwe-79-improper-neutralization-of-in-58a6fbc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20idealwebdesignlk%20Whole%20Enquiry%20Cart%20for%20WooCommerce&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37382d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5506-cwe-79-improper-neutralization-of-in-4eeb5819</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lucascaro%20Wavr&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3618-cwe-79-improper-neutralization-of-in-c0a8e3b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestweblayout%20Columns%20by%20BestWebSoft%20%E2%80%93%20Additional%20Columns%20Plugin%20for%20Posts%20Pages%20and%20Widgets&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37385f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5167-cwe-639-authorization-bypass-through-7e74c610</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5167%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20masteriyo%20Masteriyo%20LMS%20%E2%80%93%20Online%20Course%20Builder%20for%20eLearning%2C%20LMS%20%26%20Education&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3477-cwe-862-missing-authorization-in-pro-ba62e916</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3477%3A%20CWE-862%20Missing%20Authorization%20in%20projectzealous01%20PZ%20Frontend%20Manager&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37383b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5508-cwe-79-improper-neutralization-of-in-d52f9afd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theyeti%20WowPress&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4808-cwe-434-unrestricted-upload-of-file--351bdd48</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4808%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tidevapps%20Gerador%20de%20Certificados%20%E2%80%93%20DevApps&amp;severity=high&amp;id=69d5fe4e1cc7ad14da373a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3142-cwe-79-improper-neutralization-of-in-28bf6e05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uniquecodergmailcom%20Pinterest%20Site%20Verification%20plugin%20using%20Meta%20Tag&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5169-cwe-79-improper-neutralization-of-in-e4e92042</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5169%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20udamadu%20Inquiry%20form%20to%20posts%20or%20pages&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3535-cwe-434-unrestricted-upload-of-file--f7fa2474</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3535%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mlfactory%20DSGVO%20Google%20Web%20Fonts%20GDPR&amp;severity=critical&amp;id=69d5fe4c1cc7ad14da37384d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3480-cwe-862-missing-authorization-in-bur-092801c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3480%3A%20CWE-862%20Missing%20Authorization%20in%20burlingtonbytes%20WP%20Blockade%20%E2%80%93%20Visual%20Page%20Builder&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4871-cwe-79-improper-neutralization-of-in-21516959</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4871%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pstruik%20Sports%20Club%20Management&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3594-cwe-200-exposure-of-sensitive-inform-fa14576c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3594%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4338-cwe-200-information-exposure-in-acti-e17048f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4338%3A%20CWE-200%20Information%20Exposure%20in%20ActivityPub&amp;severity=high&amp;id=69d5f7631cc7ad14da1ac467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5083-cwe-340-generation-of-predictable-nu-687eb344</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5083%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BEROV%20Ado%3A%3ASessions&amp;severity=medium&amp;id=69d5f0511cc7ad14da136bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5082-cwe-340-generation-of-predictable-nu-cfa6d925</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5082%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20Amon2%3A%3APlugin%3A%3AWeb%3A%3ACSRFDefender&amp;severity=medium&amp;id=69d5f0511cc7ad14da136bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3311-cwe-79-improper-neutralization-of-in-7dd384e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3311%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=69d5f0511cc7ad14da136bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27787-cross-site-scripting-xss-in-icz-cor-bd3c9fc2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27787%3A%20Cross-site%20scripting%20(XSS)%20in%20ICZ%20Corporation%20MATCHA%20SNS&amp;severity=medium&amp;id=69d5e9331cc7ad14da0af38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33273-unrestricted-upload-of-file-with-da-08282ecf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33273%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20ICZ%20Corporation%20MATCHA%20INVOICE&amp;severity=medium&amp;id=69d5e9331cc7ad14da0af38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24913-improper-neutralization-of-special--a0c970a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24913%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20ICZ%20Corporation%20MATCHA%20INVOICE&amp;severity=high&amp;id=69d5e9331cc7ad14da0af385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3239-cwe-79-improper-neutralization-of-in-e321677f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=69d5da2a43e2781badfbe5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3646-cwe-862-missing-authorization-in-eni-4151b69d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3646%3A%20CWE-862%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20R%2BL%20Carriers%20Edition&amp;severity=medium&amp;id=69d5da2a43e2781badfbe5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4299-cwe-862-missing-authorization-in-mai-39a16b63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4299%3A%20CWE-862%20Missing%20Authorization%20in%20mainwp%20MainWP%20Child%20Reports&amp;severity=medium&amp;id=69d5da2a43e2781badfbe611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4785-cwe-79-improper-neutralization-of-in-0c03eae6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4785%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69d5da2a43e2781badfbe629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4341-cwe-79-improper-neutralization-of-in-7abe1d49</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4341%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d5da2a43e2781badfbe621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3513-cwe-79-improper-neutralization-of-in-dd5c336b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20TableOn%20%E2%80%93%20WordPress%20Posts%20Table%20Filterable&amp;severity=medium&amp;id=69d5da2a43e2781badfbe5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4003-cwe-862-missing-authorization-in-fel-3d2461b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4003%3A%20CWE-862%20Missing%20Authorization%20in%20felixmartinez%20Users%20manager%20%E2%80%93%20PN&amp;severity=critical&amp;id=69d5da2a43e2781badfbe603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4333-cwe-79-improper-neutralization-of-in-74879927</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69d5da2a43e2781badfbe619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-disrupt-us-critical-infrastruc-e5d8387a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Disrupt%20US%20Critical%20Infrastructure%20via%20PLC%20Attacks&amp;severity=critical&amp;id=69d5c50e43e2781bade1a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2988-cwe-79-improper-neutralization-of-in-c3d5b403</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blubrry%20PowerPress%20Podcasting%20plugin%20by%20Blubrry&amp;severity=medium&amp;id=69d5cf9a43e2781badef2665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4379-cwe-79-improper-neutralization-of-in-dff1ae19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20firelightwp%20LightPress%20Lightbox&amp;severity=medium&amp;id=69d5cf9a43e2781badef2669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1163-cwe-613-insufficient-session-expirat-89ecf2fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1163%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20parisneo%20parisneo%2Flollms&amp;severity=medium&amp;id=69d5be0543e2781badde667d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-8th-2026-httpsis-20e60d29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%208th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9884%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d5b6fe43e2781badd932f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5726-cwe-121-stack-based-buffer-overflow--e858c143</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5726%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20ASDA-Soft&amp;severity=high&amp;id=69d5be0543e2781badde6681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3499-cwe-352-cross-site-request-forgery-c-c703541c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3499%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jkohlbach%20Product%20Feed%20PRO%20for%20WooCommerce%20by%20AdTribes%20%E2%80%93%20Product%20Feeds%20for%20WooCommerce&amp;severity=high&amp;id=69d5da2f43e2781badfbe70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3296-cwe-502-deserialization-of-untrusted-0f906f62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3296%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%2C%20Quiz%2C%20Survey%20%26%20Custom%20Form%20Builder&amp;severity=critical&amp;id=69d5da2d43e2781badfbe6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14732-cwe-87-improper-neutralization-of-a-c80c9004</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14732%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=69d5da2a43e2781badfbe631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32280-cwe-770-allocation-of-resources-wit-de80e7e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32280%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69d5da2d43e2781badfbe67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32281-cwe-407-inefficient-algorithmic-com-b72394eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32281%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69d5da2d43e2781badfbe684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27140-cwe-501-trust-boundary-violation-in-af12b387</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27140%3A%20CWE-501%3A%20Trust%20Boundary%20Violation%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=69d5da2a43e2781badfbe636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32283-cwe-667-improper-locking-in-go-stan-8f02aa51</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32283%3A%20CWE-667%3A%20Improper%20Locking%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=high&amp;id=69d5da2d43e2781badfbe690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32288-cwe-400-uncontrolled-resource-consu-6cf553fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32288%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20archive%2Ftar&amp;severity=medium&amp;id=69d5da2d43e2781badfbe696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27143-cwe-190-integer-overflow-or-wraparo-3cb5316f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27143%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Go%20toolchain%20cmd%2Fcompile&amp;severity=critical&amp;id=69d5da2d43e2781badfbe671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27144-cwe-440-expected-behavior-violation-79ce4188</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27144%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20Go%20toolchain%20cmd%2Fcompile&amp;severity=high&amp;id=69d5da2d43e2781badfbe678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33810-cwe-295-improper-certificate-valida-7c6514b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33810%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69d5da2d43e2781badfbe6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32289-cwe-79-improper-neutralization-of-i-bb1dc664</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32289%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Go%20standard%20library%20html%2Ftemplate&amp;severity=medium&amp;id=69d5da2d43e2781badfbe69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32282-cwe-61-unix-symbolic-link-symlink-f-45c62abb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32282%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Go%20standard%20library%20internal%2Fsyscall%2Funix&amp;severity=medium&amp;id=69d5da2d43e2781badfbe68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4788-cwe-532-insertion-of-sensitive-infor-b2599224</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4788%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Tivoli%20Netcool%20Impact&amp;severity=high&amp;id=69d5a90e43e2781badc258eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3357-cwe-502-deserialization-of-untrusted-adf6ffea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3357%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20Langflow%20Desktop&amp;severity=high&amp;id=69d5a90e43e2781badc258e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1346-cwe-250-execution-with-unnecessary-p-0c7a9e3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1346%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=critical&amp;id=69d5a90e43e2781badc258e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1343-cwe-918-server-side-request-forgery--fb6c56f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1343%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69d5a90e43e2781badc258e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/horilla-v13-rce-0b1af8fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Horilla%20v1.3%20-%20RCE&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-mmc-msc-eviltwin-local-admin-creation-4e805a5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20MMC%20MSC%20EvilTwin%20-%20Local%20Admin%20Creation&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sqlite-3501-heap-overflow-a085d62f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SQLite%203.50.1%20-%20Heap%20Overflow&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xibocms-334-rce-da56583b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=xibocms%203.3.4%20-%20RCE&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/7-zip-2400-directory-traversal-9985f72b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=7-Zip%2024.00%20-%20Directory%20Traversal&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortiweb-802-remote-code-execution-d02f75d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FortiWeb%20%208.0.2%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-09-6a284ade</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-09&amp;severity=medium&amp;id=69d780fb1cc7ad14da9b68aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30080-na-dfe8d7bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30080%3A%20n%2Fa&amp;severity=high&amp;id=69d737041cc7ad14da41951b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31017-na-c9a2ad62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31017%3A%20n%2Fa&amp;severity=critical&amp;id=69d737031cc7ad14da4194d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30075-na-e26c9b0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30075%3A%20n%2Fa&amp;severity=high&amp;id=69d737031cc7ad14da4194cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57175-cwe-259-use-of-hard-coded-password--3f56779a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57175%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Siklu%20EtherHaul%208010&amp;severity=medium&amp;id=69d737031cc7ad14da4194c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52222-na-e14790c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52222%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52221-na-d9756d46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52221%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da41948f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45059-na-da4be87d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45059%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da41948a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45058-na-9b99274a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45058%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45057-na-4fdbe786</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45057%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50665-na-87d73563</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50665%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50664-na-fce2f7ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50664%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50663-na-b4dcd5be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50663%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50662-na-8246a6d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50662%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50661-na-80b3206d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50661%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50660-na-18486f57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50660%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50659-na-3df7cbb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50659%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50657-na-2beef1d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50657%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50655-na-8161f53b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50655%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50654-na-474a2263</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50654%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50653-na-58791e05</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50653%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50652-na-250b1507</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50652%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50650-na-e59a18ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50650%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50649-na-0364b3d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50649%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50648-na-06f6f35d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50648%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50647-na-847ab36b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50647%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50646-na-f2566770</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50646%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50645-na-06e8d547</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50645%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50644-na-48254413</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50644%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50673-na-56b2d24f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50673%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50672-na-ba1cf499</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50672%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50671-na-fff78188</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50671%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50670-na-64c194af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50670%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50669-na-73b4f094</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50669%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50668-na-5da5fff6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50668%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50667-na-0d001b9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50667%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50666-na-3f2d51f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50666%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-08-88662dcf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-08&amp;severity=medium&amp;id=69d6ed521cc7ad14dac65b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31040-na-bf49c58b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31040%3A%20n%2Fa&amp;severity=critical&amp;id=69d672521cc7ad14da85d643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-08-006a6854</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-08&amp;severity=low&amp;id=69d5d31643e2781badf30886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4401-cwe-352-cross-site-request-forgery-c-786129b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4401%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpchill%20Download%20Monitor&amp;severity=medium&amp;id=69d593d643e2781bad930d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2263-cwe-862-missing-authorization-in-wpm-922a4ba2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2263%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Hustle%20%E2%80%93%20Email%20Marketing%2C%20Lead%20Generation%2C%20Optins%2C%20Popups&amp;severity=medium&amp;id=69d593d643e2781bad930d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1342-cwe-829-inclusion-of-functionality-f-958a04f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1342%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69d593d643e2781bad930d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5747-cwe-787-out-of-bounds-write-in-aws-f-b3ecdbf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5747%3A%20CWE-787%20Out-of-bounds%20write%20in%20AWS%20Firecracker&amp;severity=high&amp;id=69d593d643e2781bad930da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20628-cwe-1220-insufficient-granularity-o-a7a6b97a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20628%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Ping%20Identity%20PingIDM&amp;severity=medium&amp;id=69d5896b43e2781bad87a4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39936-cwe-79-improper-neutralization-of-i-7dd665bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39936%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Score%20Extension&amp;severity=medium&amp;id=69d5898e43e2781bad88a87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39935-cwe-79-improper-neutralization-of-i-4f937883</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39935%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CampaignEvents%20Extension&amp;severity=medium&amp;id=69d5898d43e2781bad88a87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39934-cwe-835-loop-with-unreachable-exit--3c5cb986</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39934%3A%20CWE-835%20Loop%20with%20unreachable%20exit%20condition%20(&apos;infinite%20loop&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=medium&amp;id=69d5826f43e2781bad7a17e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39933-cwe-79-improper-neutralization-of-i-01337219</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39933%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GlobalWatchlist%20Extension&amp;severity=medium&amp;id=69d5826f43e2781bad7a17c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39937-cwe-212-improper-removal-of-sensiti-6c7ae469</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39937%3A%20CWE-212%20Improper%20removal%20of%20sensitive%20information%20before%20storage%20or%20transfer%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CentralAuth%20Extension&amp;severity=high&amp;id=69d57b23aaed68159a6dfc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39847-cwe-22-improper-limitation-of-a-pat-645f3706</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39847%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20emmett-framework%20emmett&amp;severity=critical&amp;id=69d57b23aaed68159a6dfc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39846-cwe-79-improper-neutralization-of-i-d77ddc8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39846%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69d57b23aaed68159a6dfc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35406-cwe-400-uncontrolled-resource-consu-da0dd3f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35406%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20containers%20aardvark-dns&amp;severity=medium&amp;id=69d57b23aaed68159a6dfc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4065-cwe-862-missing-authorization-in-nex-9dddec99</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4065%3A%20CWE-862%20Missing%20Authorization%20in%20nextendweb%20Smart%20Slider%203&amp;severity=medium&amp;id=69d5779eaaed68159a6ad78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34582-cwe-841-improper-enforcement-of-beh-4800545c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34582%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20randombit%20botan&amp;severity=high&amp;id=69d5779eaaed68159a6ad783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34580-cwe-295-improper-certificate-valida-eaa06a84</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34580%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20randombit%20botan&amp;severity=critical&amp;id=69d5779eaaed68159a6ad780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34371-cwe-22-improper-limitation-of-a-pat-933bc4a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34371%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69d5779eaaed68159a6ad77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35568-cwe-346-origin-validation-error-in--286f27ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35568%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20modelcontextprotocol%20java-sdk&amp;severity=high&amp;id=69d5779eaaed68159a6ad786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35533-cwe-284-improper-access-control-in--c575f90b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35533%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20jdx%20mise&amp;severity=high&amp;id=69d5743aaaed68159a661746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34080-cwe-1289-improper-validation-of-uns-d20a9131</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34080%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20flatpak%20xdg-dbus-proxy&amp;severity=medium&amp;id=69d5743aaaed68159a661743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33439-cwe-502-deserialization-of-untruste-ba9f5241</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33439%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20OpenIdentityPlatform%20OpenAM&amp;severity=critical&amp;id=69d5743aaaed68159a661740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29181-cwe-770-allocation-of-resources-wit-bd8d6c9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29181%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-telemetry%20opentelemetry-go&amp;severity=high&amp;id=69d5874b43e2781bad84eb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27949-cwe-200-exposure-of-sensitive-infor-edab4ef3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27949%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20makeplane%20plane&amp;severity=low&amp;id=69d5874b43e2781bad84eafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39401-cwe-862-missing-authorization-in-jh-2110547e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39401%3A%20CWE-862%3A%20Missing%20Authorization%20in%20jhuckaby%20Cronicle&amp;severity=medium&amp;id=69d5698eaaed68159a5d8dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39400-cwe-79-improper-neutralization-of-i-8da42c7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39400%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jhuckaby%20Cronicle&amp;severity=medium&amp;id=69d5698eaaed68159a5d8df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39397-cwe-862-missing-authorization-in-de-8180a502</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39397%3A%20CWE-862%3A%20Missing%20Authorization%20in%20delmaredigital%20payload-puck&amp;severity=critical&amp;id=69d5698eaaed68159a5d8df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39395-cwe-754-improper-check-for-unusual--f6857bb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39395%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20sigstore%20cosign&amp;severity=medium&amp;id=69d5660baaed68159a5b407a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5741-os-command-injection-in-suvarchal-do-31706638</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5741%3A%20OS%20Command%20Injection%20in%20suvarchal%20docker-mcp-server&amp;severity=medium&amp;id=69d5660baaed68159a5b407d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39356-cwe-89-improper-neutralization-of-s-1f1d9545</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39356%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20drizzle-team%20drizzle-orm&amp;severity=high&amp;id=69d5660baaed68159a5b4073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14859-cwe-327-use-of-a-broken-or-risky-cr-93275ea7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14859%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Semtech%20LR1110&amp;severity=high&amp;id=69d5660baaed68159a5b406d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14858-cwe-226-sensitive-information-in-re-f6b360c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14858%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20Semtech%20LR1110&amp;severity=medium&amp;id=69d5660baaed68159a5b4069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14857-cwe-123-write-what-where-condition--c8c3a068</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14857%3A%20CWE-123%20Write-what-where%20Condition%20in%20Semtech%20LR1110&amp;severity=medium&amp;id=69d5660baaed68159a5b4066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32864-cwe-125-out-of-bounds-read-in-ni-la-6af518ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32864%3A%20CWE-125%20Out-of-bounds%20read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d5660baaed68159a5b4070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39382-cwe-78-improper-neutralization-of-s-b49396ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39382%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20dbt-labs%20dbt-core&amp;severity=critical&amp;id=69d5660baaed68159a5b4076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32863-cwe-125-out-of-bounds-read-in-ni-la-4bc30ff3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32863%3A%20CWE-125%20Out-of-bounds%20read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39381-cwe-863-incorrect-authorization-in--ea8cb850</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39381%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69d56287aaed68159a58f984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32862-cwe-787-out-of-bounds-write-in-ni-l-e080252e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32862%3A%20CWE-787%20Out-of-bounds%20write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39837-cwe-80-improper-neutralization-of-s-0845af33</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39837%3A%20CWE-80%20Improper%20neutralization%20of%20Script-Related%20HTML%20tags%20in%20a%20web%20page%20(basic%20XSS)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d56287aaed68159a58f989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32861-cwe-787-out-of-bounds-write-in-ni-l-febe3e90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32861%3A%20CWE-787%20Out-of-bounds%20write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39376-cwe-674-uncontrolled-recursion-in-k-a81ba893</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39376%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20kagisearch%20fastfeedparser&amp;severity=high&amp;id=69d56287aaed68159a58f981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39841-cwe-80-improper-neutralization-of-s-a175a700</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39841%3A%20CWE-80%20Improper%20neutralization%20of%20Script-Related%20HTML%20tags%20in%20a%20web%20page%20(basic%20XSS)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d56289aaed68159a58f9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32860-cwe-787-out-of-bounds-write-in-ni-l-b871832b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32860%3A%20CWE-787%C2%A0-%20Out%20of%20Bounds%20Write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39374-cwe-639-authorization-bypass-throug-07ac8902</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39374%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20makeplane%20plane&amp;severity=medium&amp;id=69d56287aaed68159a58f97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39840-cwe-79-improper-neutralization-of-i-1432962f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39840%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d56287aaed68159a58f98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39373-cwe-409-improper-handling-of-highly-78e8fadf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39373%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20latchset%20jwcrypto&amp;severity=medium&amp;id=69d56287aaed68159a58f97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39839-cwe-80-improper-neutralization-of-s-43014776</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39839%3A%20CWE-80%20Improper%20neutralization%20of%20Script-Related%20HTML%20tags%20in%20a%20web%20page%20(basic%20XSS)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d55f0aaaed68159a5629d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39371-cwe-352-cross-site-request-forgery--ad62fb02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39371%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20redwoodjs%20sdk&amp;severity=high&amp;id=69d55f0aaaed68159a5629cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39370-cwe-918-server-side-request-forgery-7f740e78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39370%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69d55f0aaaed68159a5629c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39369-cwe-22-improper-limitation-of-a-pat-d8d90b53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39369%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69d55f07aaed68159a562955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39368-cwe-918-server-side-request-forgery-41ed5d8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39368%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d55f07aaed68159a562952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39367-cwe-79-improper-neutralization-of-i-a2c0f0ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39367%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d55f07aaed68159a56294e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39366-cwe-345-insufficient-verification-o-78f504b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39366%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d55f07aaed68159a56294a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39838-cwe-79-improper-neutralization-of-i-92dcc43c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39838%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20ProofreadPage%20Extension&amp;severity=medium&amp;id=69d55f0aaaed68159a5629cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5739-code-injection-in-powerjob-55e7481f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5739%3A%20Code%20Injection%20in%20PowerJob&amp;severity=medium&amp;id=69d55f0aaaed68159a5629da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39365-cwe-22-improper-limitation-of-a-pat-1bdd4154</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39365%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite&amp;severity=medium&amp;id=69d55f07aaed68159a562947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39364-cwe-180-incorrect-behavior-order-va-9046ca3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39364%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20vitejs%20vite&amp;severity=high&amp;id=69d55f07aaed68159a562944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39363-cwe-200-exposure-of-sensitive-infor-318e5c87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39363%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20vitejs%20vite&amp;severity=high&amp;id=69d55f07aaed68159a562941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39322-cwe-287-improper-authentication-in--52a7d8f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39322%3A%20CWE-287%3A%20Improper%20Authentication%20in%20polarnl%20PolarLearn&amp;severity=critical&amp;id=69d55f07aaed68159a56293e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39355-cwe-862-missing-authorization-in-mg-7e4b58a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39355%3A%20CWE-862%3A%20Missing%20Authorization%20in%20MGeurts%20genealogy&amp;severity=critical&amp;id=69d5874b43e2781bad84eb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39354-cwe-639-authorization-bypass-throug-42d52418</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39354%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Erudika%20scoold&amp;severity=medium&amp;id=69d5874b43e2781bad84eb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5736-sql-injection-in-powerjob-52439f1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5736%3A%20SQL%20Injection%20in%20PowerJob&amp;severity=medium&amp;id=69d5874b43e2781bad84eb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5762-cwe-770-allocation-of-resources-with-356f3801</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5762%3A%20CWE-770%20Allocation%20of%20resources%20without%20limits%20or%20throttling%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20ReportIncident%20Extension&amp;severity=medium&amp;id=69d5874b43e2781bad84eb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-unveils-claude-mythos-a-cybersecurity-br-5fcf7a85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%C2%A0Unveils%20%E2%80%98Claude%20Mythos%E2%80%99%20%E2%80%93%20A%20Cybersecurity%20Breakthrough%20That%20Could%20Also%20Supercharge%20Attacks&amp;severity=critical&amp;id=69d550f2aaed68159a4b492d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22711-cwe-87-improper-neutralization-of-a-5efa9e0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22711%3A%20CWE-87%20Improper%20neutralization%20of%20alternate%20XSS%20syntax%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikilove%20Extension&amp;severity=medium&amp;id=69d5874b43e2781bad84eb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-little-bit-pivoting-what-web-shells-are-attacker-e7efe859</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Little%20Bit%20Pivoting%3A%20What%20Web%20Shells%20are%20Attackers%20Looking%20for%26%23x3f%3B%2C%20(Tue%2C%20Apr%207th)&amp;severity=critical&amp;id=69d54d6eaaed68159a48c750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39324-cwe-287-improper-authentication-in--fb314bd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39324%3A%20CWE-287%3A%20Improper%20Authentication%20in%20rack%20rack-session&amp;severity=critical&amp;id=69d549ecaaed68159a47390c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39321-cwe-208-observable-timing-discrepan-78f06f4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39321%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69d549ecaaed68159a473907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39337-cwe-94-improper-control-of-generati-d10607b6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39337%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d549ecaaed68159a47390f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39319-cwe-89-improper-neutralization-of-s-d67499f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39319%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39344-cwe-80-improper-neutralization-of-s-a8984072</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39344%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549eeaaed68159a473968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39343-cwe-89-improper-neutralization-of-s-261e41ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39343%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39342-cwe-89-improper-neutralization-of-s-7364aad1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39342%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d549ecaaed68159a47391e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39341-cwe-89-improper-neutralization-of-s-5581e9ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39341%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a47391b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39340-cwe-89-improper-neutralization-of-s-bd7d68e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39340%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39339-cwe-284-improper-access-control-in--d81b63be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39339%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d549ecaaed68159a473915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39338-cwe-79-improper-neutralization-of-i-e5710ece</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39338%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39336-cwe-79-improper-neutralization-of-i-0d695d4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39336%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69d54667aaed68159a45f2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39334-cwe-89-improper-neutralization-of-s-86f645fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39334%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39333-cwe-79-improper-neutralization-of-i-4197b72d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39333%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39332-cwe-79-improper-neutralization-of-i-58566cc9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39332%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39331-cwe-639-authorization-bypass-throug-d615f628</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39331%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39330-cwe-89-improper-neutralization-of-s-ee261c11</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39330%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39329-cwe-89-improper-neutralization-of-s-e56fe8e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39329%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39328-cwe-79-improper-neutralization-of-i-0bd6d06b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39328%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39327-cwe-89-improper-neutralization-of-s-676247de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39327%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39326-cwe-89-improper-neutralization-of-s-38ebd0e9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39326%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5660daaed68159a5b4136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39325-cwe-89-improper-neutralization-of-s-6b2e8d23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39325%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5874d43e2781bad84f53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39323-cwe-89-improper-neutralization-of-s-1746d817</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39323&amp;severity=null&amp;id=69d5874b43e2781bad84eb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39318-cwe-89-improper-neutralization-of-s-b28e5f1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39318%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5874d43e2781bad84f537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39335-cwe-79-improper-neutralization-of-i-1a28ade0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39335%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69d5874e43e2781bad84f790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39317-cwe-89-improper-neutralization-of-s-d04471fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39317&amp;severity=null&amp;id=69d5660baaed68159a5b4087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24175-cwe-248-uncaught-exception-in-nvidi-9f848a2c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24175%3A%20CWE-248%20Uncaught%20Exception%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d5874d43e2781bad84f525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24174-cwe-681-incorrect-conversion-betwee-f5c56edf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24174%3A%20CWE-681%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d5874d43e2781bad84f520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24173-cwe-190-integer-overflow-or-wraparo-7caeae47</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24173%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d5874b43e2781bad84eb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24147-cwe-22-improper-limitation-of-a-pat-f50a1d12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24147%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=69d55f0aaaed68159a5629e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24146-cwe-789-memory-allocation-with-exce-3e49f936</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24146%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d55f0aaaed68159a5629e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35576-cwe-79-improper-neutralization-of-i-6b4a2278</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35576%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5874d43e2781bad84f533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24156-cwe-502-deserialization-of-untruste-b62ca16f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24156%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20DALI&amp;severity=high&amp;id=69d55f0aaaed68159a5629eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22682-cwe-863-incorrect-authorization-in--2c6d5e70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22682%3A%20CWE-863%20Incorrect%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69d5874d43e2781bad84f51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35575-cwe-79-improper-neutralization-of-i-4f65591c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35575%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d550fbaaed68159a4b4b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22680-cwe-862-missing-authorization-in-vo-b1333a95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22680%3A%20CWE-862%20Missing%20Authorization%20in%20Volcengine%20OpenViking&amp;severity=medium&amp;id=69d5874d43e2781bad84f515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35572-cwe-918-server-side-request-forgery-9880f733</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35572%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5660baaed68159a5b4084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35573-cwe-22-improper-limitation-of-a-pat-cd7c363b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35573%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d5874d43e2781bad84f530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35574-cwe-79-improper-neutralization-of-i-964a1eb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35574%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d53bdbaaed68159a38bdbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39316-cwe-416-use-after-free-in-openprint-81491557</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39316%3A%20CWE-416%3A%20Use%20After%20Free%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d53bddaaed68159a38be0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39314-cwe-191-integer-underflow-wrap-or-w-216f8413</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39314%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d53bddaaed68159a38be09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35610-cwe-285-improper-authorization-in-p-8a184153</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35610%3A%20CWE-285%3A%20Improper%20Authorization%20in%20polarnl%20PolarLearn&amp;severity=high&amp;id=69d53bdbaaed68159a38bdc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23696-cwe-89-improper-neutralization-of-s-55a8fb9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23696%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Windmill%20Labs%20Windmill%20CE%20(Community%20Edition)&amp;severity=critical&amp;id=69d53bdbaaed68159a38bdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22683-cwe-862-missing-authorization-in-wi-68e61a60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22683%3A%20CWE-862%20Missing%20Authorization%20in%20Windmill%20Labs%20Windmill%20CE%20(Community%20Edition)&amp;severity=high&amp;id=69d53bdbaaed68159a38bda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39307-cwe-22-improper-limitation-of-a-pat-dcad6020</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39307%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d53bdbaaed68159a38bdce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39308-cwe-22-improper-limitation-of-a-pat-cbe46351</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39308%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d53bddaaed68159a38be06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39306-cwe-22-improper-limitation-of-a-pat-b272ba3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39306%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d53bdbaaed68159a38bdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39305-cwe-22-improper-limitation-of-a-pat-ee1c9c84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39305%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d53bdbaaed68159a38bdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35615-cwe-22-improper-limitation-of-a-pat-ac7728e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35615%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d53bdbaaed68159a38bdc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32588-cwe-400-uncontrolled-resource-consu-09d4adec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32588%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=medium&amp;id=69d53bdbaaed68159a38bdba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-new-rules-of-engagement-matching-agentic-attac-9364e595</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20New%20Rules%20of%20Engagement%3A%20Matching%20Agentic%20Attack%20Speed&amp;severity=medium&amp;id=69d534d4aaed68159a357310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27315-cwe-532-insertion-of-sensitive-info-6ca7f942</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27315%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=medium&amp;id=69d53bdbaaed68159a38bdb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35613-cwe-22-improper-limitation-of-a-pat-e3f4414f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35613%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moritzmyrz%20coursevault-preview&amp;severity=medium&amp;id=69d534e5aaed68159a357dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35611-cwe-1333-inefficient-regular-expres-c299d172</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35611%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20sporkmonger%20addressable&amp;severity=high&amp;id=69d534e5aaed68159a357dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35608-cwe-79-improper-neutralization-of-i-c1166cc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35608%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RoastSlav%20quickdrop&amp;severity=medium&amp;id=69d534e5aaed68159a357dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trent-ai-emerges-from-stealth-with-13-million-in-f-7a90dd79</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trent%20AI%20Emerges%20From%20Stealth%20With%20%2413%20Million%20in%20Funding&amp;severity=medium&amp;id=69d534d4aaed68159a357313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14821-uncontrolled-search-path-element-in-a80a017f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14821%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69d534e5aaed68159a357db8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27314-cwe-267-privilege-defined-with-unsa-7e231997</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27314%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=high&amp;id=69d534e5aaed68159a357dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4631-improper-neutralization-of-special-e-ba011f09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4631%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=critical&amp;id=69d534e5aaed68159a357dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14944-cwe-862-missing-authorization-in-in-6a37bcb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14944%3A%20CWE-862%20Missing%20Authorization%20in%20inisev%20BackupBliss%20%E2%80%93%20Backup%20%26%20Migration%20with%20Free%20Cloud%20Storage&amp;severity=medium&amp;id=69d534e5aaed68159a357dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35584-cwe-306-missing-authentication-for--587bb12d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35584%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69d5314faaed68159a33992b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39384-cwe-639-authorization-bypass-throug-fc977f46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39384%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69d5314faaed68159a33992e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35523-cwe-306-missing-authentication-for--051f992d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35523%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20strawberry-graphql%20strawberry&amp;severity=high&amp;id=69d5314faaed68159a33991a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35583-cwe-22-improper-limitation-of-a-pat-f33beecb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35583%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=medium&amp;id=69d5314faaed68159a339928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35581-cwe-78-improper-neutralization-of-s-c191187e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35581%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=high&amp;id=69d5314faaed68159a339925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35580-cwe-77-improper-neutralization-of-s-e4caccb1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35580%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=critical&amp;id=69d5314faaed68159a339920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35578-cwe-601-url-redirection-to-untruste-0a63bdb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35578&amp;severity=null&amp;id=69d5314faaed68159a33991d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35567-cwe-89-improper-neutralization-of-s-65faaa6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35567&amp;severity=null&amp;id=69d52a46aaed68159a30f8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35566-cwe-89-improper-neutralization-of-s-13b861c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35566&amp;severity=null&amp;id=69d52a46aaed68159a30f8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35534-cwe-79-improper-neutralization-of-i-4b6f14c4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35534%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d52a46aaed68159a30f8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flowise-vulnerability-in-attacker-crossha-a53d74a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flowise%20Vulnerability%20in%20Attacker%20Crosshairs&amp;severity=critical&amp;id=69d526c2aaed68159a2fe3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35571-cwe-79-improper-neutralization-of-i-7dab1fcc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35571%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=medium&amp;id=69d52a46aaed68159a30f8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35526-cwe-770-allocation-of-resources-wit-33a1f717</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35526%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20strawberry-graphql%20strawberry&amp;severity=high&amp;id=69d52a46aaed68159a30f8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4931-cwe-681-incorrect-conversion-between-185741c0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4931%3A%20CWE-681%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Marginal%20Marginal%20Smart%20Contract&amp;severity=medium&amp;id=69d52a47aaed68159a30f8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35521-cwe-78-improper-neutralization-of-s-d0980be3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35521%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52a46aaed68159a30f8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33816-cwe-697-incorrect-comparison-in-git-90a754f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33816%3A%20CWE-697%20%E2%80%94%20Incorrect%20Comparison%20in%20github.com%2Fjackc%2Fpgx%2Fv5%20github.com%2Fjackc%2Fpgx%2Fv5%2Fpgproto3&amp;severity=critical&amp;id=69d52a46aaed68159a30f89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33815-cwe-129-improper-validation-of-arra-24136267</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33815%3A%20CWE-129%20%E2%80%94%20Improper%20Validation%20of%20Array%20Index%20in%20github.com%2Fjackc%2Fpgx%2Fv5%20github.com%2Fjackc%2Fpgx%2Fv5%2Fpgproto3&amp;severity=critical&amp;id=69d52a46aaed68159a30f898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35520-cwe-78-improper-neutralization-of-s-1cae9e5c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35520%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52a46aaed68159a30f8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35519-cwe-78-improper-neutralization-of-s-ad11d3fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35519%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52a46aaed68159a30f89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1079-cwe-284-improper-access-control-in-p-d6216d38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1079%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Pegasystems%20Pega%20Browser%20Extension%20(PBE)&amp;severity=medium&amp;id=69d52341aaed68159a2ec570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35518-cwe-78-improper-neutralization-of-s-78f9c7fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35518%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52344aaed68159a2ec624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35517-cwe-78-improper-neutralization-of-s-f2c0d982</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35517%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52344aaed68159a2ec621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35516-cwe-918-server-side-request-forgery-5c669499</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35516%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69d52344aaed68159a2ec61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24819-vulnerability-in-nokia-mantaray-nm-038e8147</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24819%3A%20Vulnerability%20in%20Nokia%20MantaRay%20NM&amp;severity=medium&amp;id=69d52341aaed68159a2ec566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24818-vulnerability-in-nokia-mantaray-nm-1f8275a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24818%3A%20Vulnerability%20in%20Nokia%20MantaRay%20NM&amp;severity=high&amp;id=69d52341aaed68159a2ec563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24817-vulnerability-in-nokia-mantaray-nm-4f065fd9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24817%3A%20Vulnerability%20in%20Nokia%20MantaRay%20NM&amp;severity=high&amp;id=69d52341aaed68159a2ec560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35515-cwe-74-improper-neutralization-of-s-f8853fa9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35515%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nestjs%20nest&amp;severity=medium&amp;id=69d52344aaed68159a2ec61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1078-cwe-284-improper-access-control-in-p-5bac2281</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1078%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Pegasystems%20Pega%20Robot%20Studio&amp;severity=high&amp;id=69d52341aaed68159a2ec56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35492-cwe-22-improper-limitation-of-a-pat-f84dc278</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35492%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kedro-org%20kedro-plugins&amp;severity=medium&amp;id=69d52344aaed68159a2ec616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35491-cwe-863-incorrect-authorization-in--4cb4d025</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35491%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20pi-hole%20FTL&amp;severity=medium&amp;id=69d52344aaed68159a2ec613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5745-null-pointer-dereference-in-red-hat--880566c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5745%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d52346aaed68159a2ecada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35490-cwe-863-incorrect-authorization-in--fecf3683</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35490%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20dgtlmoon%20changedetection.io&amp;severity=critical&amp;id=69d52344aaed68159a2ec610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35489-cwe-639-authorization-bypass-throug-9fba6e7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35489%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69d52344aaed68159a2ec60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35488-cwe-749-exposed-dangerous-method-or-3a0a8a55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35488%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69d52344aaed68159a2ec608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35487-cwe-22-improper-limitation-of-a-pat-e2594a7d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35487%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=69d52341aaed68159a2ec57c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35486-cwe-918-server-side-request-forgery-46e64d20</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35486%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20oobabooga%20text-generation-webui&amp;severity=high&amp;id=69d52341aaed68159a2ec579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35485-cwe-22-improper-limitation-of-a-pat-077bd81d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=high&amp;id=69d51c3eaaed68159a2c1622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35484-cwe-22-improper-limitation-of-a-pat-1be27b8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35484%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=69d51c3eaaed68159a2c161f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35483-cwe-22-improper-limitation-of-a-pat-b3c7c859</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35483%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=69d51c3eaaed68159a2c161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35480-cwe-770-allocation-of-resources-wit-ce9cb61f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35480%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ipld%20go-ipld-prime&amp;severity=medium&amp;id=69d51c3eaaed68159a2c1617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4740-improper-certificate-validation-in-r-d209bf80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4740%3A%20Improper%20Certificate%20Validation%20in%20Red%20Hat%20Multicluster%20Engine%20for%20Kubernetes&amp;severity=high&amp;id=69d51c3eaaed68159a2c1634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35462-cwe-613-insufficient-session-expira-655ca154</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35462%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20papra-hq%20papra&amp;severity=medium&amp;id=69d51c3baaed68159a2c14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35461-cwe-918-server-side-request-forgery-1fc369b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35461%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20papra-hq%20papra&amp;severity=medium&amp;id=69d51c3baaed68159a2c14f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35460-cwe-80-improper-neutralization-of-s-a1b65bf5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35460%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20papra-hq%20papra&amp;severity=medium&amp;id=69d51c3baaed68159a2c14f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/severe-strongbox-vulnerability-patched-in-android-2406484f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Severe%20StrongBox%20Vulnerability%20Patched%20in%20Android&amp;severity=critical&amp;id=69d51530aaed68159a296f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33034-cwe-770-allocation-of-resources-wit-62744c5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33034%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20djangoproject%20Django&amp;severity=high&amp;id=69d51c3baaed68159a2c14ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33033-cwe-407-inefficient-algorithmic-com-29d5fe4e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33033%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69d51c3baaed68159a2c14e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4292-cwe-862-missing-authorization-in-dja-57d55899</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4292%3A%20CWE-862%3A%20Missing%20Authorization%20in%20djangoproject%20Django&amp;severity=low&amp;id=69d51c3eaaed68159a2c162f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4277-cwe-862-missing-authorization-in-dja-17fa66ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4277%3A%20CWE-862%3A%20Missing%20Authorization%20in%20djangoproject%20Django&amp;severity=critical&amp;id=69d51c3eaaed68159a2c162a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35457-cwe-770-allocation-of-resources-wit-4a7de5b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35457%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69d51c3baaed68159a2c14f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3902-cwe-290-authentication-bypass-by-spo-925d7235</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3902%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20djangoproject%20Django&amp;severity=high&amp;id=69d51c3eaaed68159a2c1625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35405-cwe-770-allocation-of-resources-wit-07b4b21d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35405%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69d51c3baaed68159a2c14ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5384-cwe-863-incorrect-authorization-in-r-4f054075</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5384%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c41aaed68159a2c16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5383-cwe-863-incorrect-authorization-in-r-7d8c86a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5383%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Explorer&amp;severity=medium&amp;id=69d51c41aaed68159a2c16d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5382-cwe-863-incorrect-authorization-in-r-c59deb95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5382%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=low&amp;id=69d51c41aaed68159a2c16cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5381-cwe-863-incorrect-authorization-in-r-72ccf558</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5381%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=low&amp;id=69d51c41aaed68159a2c16c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5380-cwe-863-incorrect-authorization-in-r-bbdccf91</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5380%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c41aaed68159a2c16c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5379-cwe-863-incorrect-authorization-in-r-bdf9f407</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5379%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=low&amp;id=69d51c41aaed68159a2c16c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5378-cwe-863-incorrect-authorization-in-r-b41d9219</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5378%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c41aaed68159a2c16bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5376-cwe-613-insufficient-control-of-reso-6f3cf9cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5376%3A%20CWE-613%3A%20Insufficient%20Control%20of%20Resources%20After%20Expiration%20or%20Release%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c3eaaed68159a2c1639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5375-cwe-200-exposure-of-sensitive-inform-03b25ad4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5375%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20runZero%20Platform&amp;severity=low&amp;id=69d52346aaed68159a2ecaea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5374-cwe-863-incorrect-authorization-in-r-9c41aa0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5374%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d52346aaed68159a2ecae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5373-cwe-269-improper-privilege-managemen-43a9d747</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5373%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20runZero%20Platform&amp;severity=high&amp;id=69d52346aaed68159a2ecae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5372-cwe-89-improper-neutralization-of-sp-38771393</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5372%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d52346aaed68159a2ecade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grafanaghost-attackers-can-abuse-grafana-to-leak-e-3a7cc7cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GrafanaGhost%3A%20Attackers%20Can%20Abuse%20Grafana%20to%20Leak%20Enterprise%20Data&amp;severity=medium&amp;id=69d50e26aaed68159a26aa2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dangers-of-telehealth-data-breaches-phishing-a-0ddbd472</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20dangers%20of%20telehealth%3A%20data%20breaches%2C%20phishing%2C%20and%20spam%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d5d94943e2781badfb7efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-why-automated-pentesting-alone-is-no-00c50312</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20Why%20Automated%20Pentesting%20Alone%20Is%20Not%20Enough&amp;severity=medium&amp;id=69d50724aaed68159a2422a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35554-cwe-416-use-after-free-in-apache-so-3aeacf12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35554%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20Kafka%20Clients&amp;severity=high&amp;id=69d50aa5aaed68159a256b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5627-cwe-29-path-traversal-filename-in-mi-9e476f7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5627%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=critical&amp;id=69d50aa5aaed68159a256b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22679-cwe-306-missing-authentication-for--330ac532</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22679%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Weaver%20Network%20Co.%2C%20Ltd.%20E-cology&amp;severity=critical&amp;id=69d50016aaed68159a219ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5735-vulnerability-in-mozilla-firefox-60096f4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5735%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5734-vulnerability-in-mozilla-firefox-c0373840</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5734%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5733-vulnerability-in-mozilla-firefox-05cd41e5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5733%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5732-vulnerability-in-mozilla-firefox-1f927624</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5732%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5731-vulnerability-in-mozilla-firefox-99d73722</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5731%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69d50016aaed68159a219cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22666-cwe-95-improper-neutralization-of-d-0f29c4fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22666%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Dolibarr%20Dolibarr%20ERP%2FCRM&amp;severity=high&amp;id=69d50016aaed68159a219cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28808-cwe-863-incorrect-authorization-in--234c0945</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28808%3A%20CWE-863%20Incorrect%20Authorization%20in%20Erlang%20OTP&amp;severity=high&amp;id=69d4fc92aaed68159a20604c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32144-cwe-295-improper-certificate-valida-27760d2a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32144%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Erlang%20OTP&amp;severity=high&amp;id=69d4fc92aaed68159a206054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23818-vulnerability-in-hewlett-packard-en-2e70c28e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23818%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Private%205G%20Core&amp;severity=high&amp;id=69d4fc92aaed68159a206049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39666-cwe-426-untrusted-search-path-in-ch-e2f0285d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39666%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=critical&amp;id=69d4fc92aaed68159a206046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3466-cwe-79-improper-neutralization-of-in-d80ce4e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3466%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69d4fc92aaed68159a20605c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gpubreach-root-shell-access-achieved-via-gpu-rowha-1215a777</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GPUBreach%3A%20Root%20Shell%20Access%20Achieved%20via%20GPU%20Rowhammer%20Attack&amp;severity=medium&amp;id=69d4ee82aaed68159a15c601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31842-cwe-444-inconsistent-interpretation-c345cdab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31842%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Tinyproxy%20Project%20Tinyproxy&amp;severity=high&amp;id=69d4ee89aaed68159a15cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta416-resumes-european-government-espionage-campai-95cb4807</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA416%20resumes%20European%20government%20espionage%20campaigns&amp;severity=medium&amp;id=69d4e778aaed68159a0e93d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detections-for-the-axios-supply-chain-compromise-828371e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detections%20for%20the%20Axios%20supply%20chain%20compromise&amp;severity=medium&amp;id=69d4eafdaaed68159a12948d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-fast-to-exploit-vulnerabilities--4446437b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Fast%20to%20Exploit%20Vulnerabilities%2C%20Breached%20Systems&amp;severity=medium&amp;id=69d4e497aaed68159a0d6d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/german-police-unmask-revil-ransomware-leader-662d4d22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=German%20Police%20Unmask%20REvil%20Ransomware%20Leader&amp;severity=medium&amp;id=69d4cedeaaed68159a05effa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34903-cwe-862-missing-authorization-in-oc-0cb4688b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34903%3A%20CWE-862%20Missing%20Authorization%20in%20OceanWP%20Ocean%20Extra&amp;severity=medium&amp;id=69d4cb5aaaed68159a04482c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34899-cwe-862-missing-authorization-in-en-4d9d2403</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34899%3A%20CWE-862%20Missing%20Authorization%20in%20Eniture%20technology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=medium&amp;id=69d4c452aaed68159a00e3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-house-seeks-to-slash-cisa-funding-by-707-mil-c930cb7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20House%20Seeks%20to%20Slash%20CISA%20Funding%20by%20%24707%20Million&amp;severity=critical&amp;id=69d4c0cfaaed68159afed9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34904-cwe-352-cross-site-request-forgery--d695f98e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34904%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Analytify%20Simple%20Social%20Media%20Share%20Buttons&amp;severity=high&amp;id=69d4c452aaed68159a00e3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34896-cwe-352-cross-site-request-forgery--25e0cb83</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34896%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Analytify%20Under%20Construction%2C%20Coming%20Soon%20%26%20Maintenance%20Mode&amp;severity=high&amp;id=69d4c452aaed68159a00e3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33227-cwe-22-improper-input-validation-fo-fcaded2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33227%3A%20CWE-22%20Improper%20input%20validation%20for%20resource%20loading%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Client&amp;severity=medium&amp;id=69d4bd49aaed68159afc7f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28810-cwe-340-generation-of-predictable-n-2cebe101</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28810%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69d4bd49aaed68159afc7f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34197-cwe-20-improper-input-validation-in-32baa8df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34197%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Broker&amp;severity=high&amp;id=69d4bd49aaed68159afc7f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3177-cwe-345-insufficient-verification-of-66835760</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3177%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20smub%20Charitable%20%E2%80%93%20Donation%20Plugin%20for%20WordPress%20%E2%80%93%20Fundraising%20with%20Recurring%20Donations%20%26%20More&amp;severity=medium&amp;id=69d4e4a2aaed68159a0d7521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5465-cwe-639-authorization-bypass-through-c68a4d21</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5465%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=high&amp;id=69d4af3baaed68159af4f58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1114-cwe-284-improper-access-control-in-p-40f6ba09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1114%3A%20CWE-284%20Improper%20Access%20Control%20in%20parisneo%20parisneo%2Flollms&amp;severity=critical&amp;id=69d4a832aaed68159ad9ba6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wynn-resorts-says-21000-employees-affected-by-shin-d88a1657</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wynn%20Resorts%20Says%2021%2C000%20Employees%20Affected%20by%20ShinyHunters%20Hack&amp;severity=high&amp;id=69d4a12aaaed68159ad2b8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4079-cwe-89-sql-injection-in-sql-chart-bu-96d8ce74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4079%3A%20CWE-89%20SQL%20Injection%20in%20SQL%20Chart%20Builder&amp;severity=medium&amp;id=69d4a832aaed68159ad9ba75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1900-cwe-862-missing-authorization-in-lin-eb4c0dc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1900%3A%20CWE-862%20Missing%20Authorization%20in%20Link%20Whisper%20Free&amp;severity=medium&amp;id=69d4a832aaed68159ad9ba72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15611-cwe-79-cross-site-scripting-xss-in--8c937f1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15611%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Popup%20Box&amp;severity=medium&amp;id=69d4a832aaed68159ad9ba6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65116-cwe-763-release-of-invalid-pointer--6df269bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65116%3A%20CWE-763%20Release%20of%20invalid%20pointer%20or%20reference%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Manager&amp;severity=medium&amp;id=69d49de1aaed68159acfad0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1839-cwe-502-deserialization-of-untrusted-5f6a12e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1839%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=69d49a21aaed68159acbc2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65115-cwe-73-external-control-of-file-nam-a8eb6ffa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65115%3A%20CWE-73%20External%20control%20of%20file%20name%20or%20path%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Manager&amp;severity=high&amp;id=69d49a21aaed68159acbc2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0740-cwe-434-unrestricted-upload-of-file--9ec11832</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0740%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SaturdayDrive%20Ninja%20Forms%20-%20File%20Uploads&amp;severity=critical&amp;id=69d48bf00a160ebd92416647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20446-cwe-787-out-of-bounds-write-in-medi-9fb40fd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20446%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69d47ddc0a160ebd9234c837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20433-cwe-787-out-of-bounds-write-in-medi-1d30900f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20433%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69d47ddc0a160ebd9234c834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20432-cwe-787-out-of-bounds-write-in-medi-f16f04fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20432%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69d47ddc0a160ebd9234c831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20431-cwe-770-allocation-of-resources-wit-c21cd2dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20431%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69d47ddc0a160ebd9234c82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5719-sql-injection-in-itsourcecode-constr-df554fa7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5719%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d46fca0a160ebd92208af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-7th-2026-httpsiscs-d1fa261a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%207th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9882%2C%20(Tue%2C%20Apr%207th)&amp;severity=medium&amp;id=69d465400a160ebd920711df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13044-cwe-340-generation-of-predictable-n-82b5f6dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13044%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20IBM%20Concert&amp;severity=medium&amp;id=69d461b90a160ebd9203cbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-08-2fb33380</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-08&amp;severity=medium&amp;id=69d660b31cc7ad14da71d60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-07-896477e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-07&amp;severity=medium&amp;id=69d59e5943e2781badb13b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31272-na-cc351abb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31272%3A%20n%2Fa&amp;severity=critical&amp;id=69d5874d43e2781bad84f52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31271-na-b10371a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31271%3A%20n%2Fa&amp;severity=critical&amp;id=69d5874d43e2781bad84f52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71058-na-060d58b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71058%3A%20n%2Fa&amp;severity=critical&amp;id=69d5874b43e2781bad84eb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69515-na-de1f3698</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69515%3A%20n%2Fa&amp;severity=critical&amp;id=69d55f07aaed68159a56293a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56015-na-10ff62bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56015%3A%20n%2Fa&amp;severity=high&amp;id=69d55f07aaed68159a562936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-07-45db4b77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-07&amp;severity=low&amp;id=69d542d9aaed68159a3c0b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70844-na-707f43dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70844%3A%20n%2Fa&amp;severity=medium&amp;id=69d534e5aaed68159a357dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36058-na-a04e0a3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36058%3A%20n%2Fa&amp;severity=critical&amp;id=69d5314faaed68159a339914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30460-na-cdb1ba2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30460%3A%20n%2Fa&amp;severity=high&amp;id=69d52341aaed68159a2ec573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52908-na-be591ca1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52908%3A%20n%2Fa&amp;severity=critical&amp;id=69d52341aaed68159a2ec569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36057-na-d4b2a2fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36057%3A%20n%2Fa&amp;severity=critical&amp;id=69d52341aaed68159a2ec55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30079-na-46b40ad6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30079%3A%20n%2Fa&amp;severity=critical&amp;id=69d51c3baaed68159a2c14e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62818-na-96afc532</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62818%3A%20n%2Fa&amp;severity=critical&amp;id=69d51c3baaed68159a2c14de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52909-na-7b723d69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52909%3A%20n%2Fa&amp;severity=critical&amp;id=69d51c3baaed68159a2c14da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5705-cross-site-scripting-in-code-project-773e54db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5705%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Hotel%20Booking&amp;severity=medium&amp;id=69d4459a0a160ebd92ea3486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5692-os-command-injection-in-totolink-a71-0e1d1ea0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5692%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d442150a160ebd92e8c0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5691-os-command-injection-in-totolink-a71-9ff38c07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5691%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d43e920a160ebd92e74967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5690-os-command-injection-in-totolink-a71-d07689a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5690%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d43b0e0a160ebd92e61f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5689-os-command-injection-in-totolink-a71-f836dc6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5689%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d437a00a160ebd92e4f4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5688-os-command-injection-in-totolink-a71-7df2adbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5688%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d434060a160ebd92e3c28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5687-stack-based-buffer-overflow-in-tenda-af9feb13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5687%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d430940a160ebd92e2809b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35454-cwe-22-improper-limitation-of-a-pat-cf5ff4e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35454%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20coder%20code-marketplace&amp;severity=high&amp;id=69d42d0d0a160ebd92e15bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35452-cwe-200-exposure-of-sensitive-infor-e07a1773</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35452%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d42d0d0a160ebd92e15bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35450-cwe-306-missing-authentication-for--f2435df8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35450%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d42d0d0a160ebd92e15bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35449-cwe-200-exposure-of-sensitive-infor-e15e3474</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35449%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d42d0d0a160ebd92e15bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5686-stack-based-buffer-overflow-in-tenda-a9c63a39</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5686%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d42d0d0a160ebd92e15bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35448-cwe-862-missing-authorization-in-ww-041cc36d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35448%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=low&amp;id=69d42d0d0a160ebd92e15bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35444-cwe-125-out-of-bounds-read-in-libsd-af3db040</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35444%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20libsdl-org%20SDL_image&amp;severity=high&amp;id=69d42d0d0a160ebd92e15bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35471-cwe-22-improper-limitation-of-a-pat-515b5296</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35471%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d4297c0a160ebd92e0093d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5709-cwe-78-improper-neutralization-of-sp-fb21bdcc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5709%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=high&amp;id=69d4297c0a160ebd92e00951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5685-stack-based-buffer-overflow-in-tenda-75bc7b03</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5685%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d4297c0a160ebd92e00940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5708-cwe-915-improperly-controlled-modifi-7d074816</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5708%3A%20CWE-915%20Improperly%20controlled%20modification%20of%20Dynamically-Determined%20object%20attributes%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=high&amp;id=69d4297c0a160ebd92e0094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5707-cwe-78-improper-neutralization-of-sp-0c568b48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5707%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=high&amp;id=69d4297c0a160ebd92e00947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35404-cwe-601-url-redirection-to-untruste-439d20b0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35404%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20openedx%20openedx-platform&amp;severity=medium&amp;id=69d425f60a160ebd92deddc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22675-cwe-79-improper-neutralization-of-i-3125cc30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OCS%20Inventory%20OCS%20Inventory%20NG%20Server&amp;severity=medium&amp;id=69d425f60a160ebd92deddbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35475-cwe-601-url-redirection-to-untruste-ac706b50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35475%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d425f60a160ebd92deddcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5684-stack-based-buffer-overflow-in-tenda-deeeb3f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5684%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d425f60a160ebd92deddd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35474-cwe-601-url-redirection-to-untruste-d9ca66d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35474%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d425f60a160ebd92deddc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35473-cwe-601-url-redirection-to-untruste-026e71eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35473%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d425f60a160ebd92deddc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35399-cwe-79-improper-neutralization-of-i-01d4cda6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35399%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69d422720a160ebd92dda200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35472-cwe-601-url-redirection-to-untruste-1a6f86c5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35472%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d422720a160ebd92dda203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35398-cwe-601-url-redirection-to-untruste-d1e8c203</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35398%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d422720a160ebd92dda1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35396-cwe-601-url-redirection-to-untruste-7af49979</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35396%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d422720a160ebd92dda1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35395-cwe-89-improper-neutralization-of-s-dd6d2d62</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35395%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69d422720a160ebd92dda1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35394-cwe-939-improper-authorization-in-h-ff73149b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35394%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20mobile-next%20mobile-mcp&amp;severity=high&amp;id=69d41eee0a160ebd92dcdbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35393-cwe-22-improper-limitation-of-a-pat-b57d1ba3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35393%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d41eee0a160ebd92dcdbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35392-cwe-22-improper-limitation-of-a-pat-4b67dff2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35392%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d41eee0a160ebd92dcdbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5683-stack-based-buffer-overflow-in-tenda-31031057</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5683%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=medium&amp;id=69d41b690a160ebd92db5976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-an-aienabled-device-code-phishing-campaign-a142ae3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20an%20AIenabled%20device%20code%20phishing%20campaign&amp;severity=medium&amp;id=69d425f50a160ebd92dedd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35391-cwe-348-use-of-less-trusted-source--c50ca1ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35391%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69d417e60a160ebd92da7f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35390-cwe-79-improper-neutralization-of-i-963b67d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35390%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bulwarkmail%20webmail&amp;severity=medium&amp;id=69d417e60a160ebd92da7f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35389-cwe-295-improper-certificate-valida-a699249f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35389%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69d417e60a160ebd92da7f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35213-cwe-1333-inefficient-regular-expres-174f25ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35213%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20hapijs%20content&amp;severity=high&amp;id=69d417e60a160ebd92da7f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35208-cwe-79-improper-neutralization-of-i-d04e197a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35208%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lichess-org%20lila&amp;severity=medium&amp;id=69d417e60a160ebd92da7f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35201-cwe-125-out-of-bounds-read-in-david-4802dc5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35201%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20davidfstr%20rdiscount&amp;severity=medium&amp;id=69d4982faaed68159ac9fe05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35200-cwe-436-interpretation-conflict-in--11991d06</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35200%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69d4982faaed68159ac9fe00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5682-risky-cryptographic-algorithm-in-mee-ff18ecc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5682%3A%20Risky%20Cryptographic%20Algorithm%20in%20Meesho%20Online%20Shopping%20App&amp;severity=medium&amp;id=69d4982faaed68159ac9fe08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35199-cwe-122-heap-based-buffer-overflow--aec400ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35199%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20microsoft%20SymCrypt&amp;severity=medium&amp;id=69d4982faaed68159ac9fdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35197-cwe-94-improper-control-of-generati-08451375</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35197%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mattieb%20dye&amp;severity=medium&amp;id=69d40d5a0a160ebd92d69897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35185-cwe-284-improper-access-control-in--87e54f7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35185%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20haxtheweb%20HAXiam&amp;severity=high&amp;id=69d40d5a0a160ebd92d69894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35184-cwe-89-improper-neutralization-of-s-f392ddab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35184%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20phili67%20ecclesiacrm&amp;severity=high&amp;id=69d40d5a0a160ebd92d6988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5681-sql-injection-in-itsourcecode-saniti-c40d4cdb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5681%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69d409da0a160ebd92d5a9da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35183-cwe-639-authorization-bypass-throug-c21973de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35183%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Ajax30%20BraveCMS-2.0&amp;severity=high&amp;id=69d409da0a160ebd92d5a9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35182-cwe-862-missing-authorization-in-aj-7e097403</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35182%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Ajax30%20BraveCMS-2.0&amp;severity=high&amp;id=69d409da0a160ebd92d5a9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35181-cwe-352-cross-site-request-forgery--a6817e6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35181%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d409d70a160ebd92d5a951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35180-cwe-352-cross-site-request-forgery--63177348</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35180%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d409d70a160ebd92d5a94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35179-cwe-862-missing-authorization-in-ww-2d01c7e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35179%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d409d70a160ebd92d5a947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5679-os-command-injection-in-totolink-a33-a94bd30b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5679%3A%20OS%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69d409da0a160ebd92d5a9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35176-cwe-125-out-of-bounds-read-in-trabu-d8cdef14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35176%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20trabucayre%20openFPGALoader&amp;severity=high&amp;id=69d409d70a160ebd92d5a944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35022-cwe-78-improper-neutralization-of-s-9ed949c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35022%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anthropic%20Claude%20Code&amp;severity=critical&amp;id=69d409d70a160ebd92d5a937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35021-cwe-78-improper-neutralization-of-s-0c10b810</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35021%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anthropic%20Claude%20Code&amp;severity=high&amp;id=69d409d70a160ebd92d5a933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35170-cwe-125-out-of-bounds-read-in-trabu-6c582391</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35170%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20trabucayre%20openFPGALoader&amp;severity=high&amp;id=69d409d70a160ebd92d5a93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35020-cwe-78-improper-neutralization-of-s-ecf20559</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35020%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anthropic%20Claude%20Code&amp;severity=high&amp;id=69d409d70a160ebd92d5a92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5678-os-command-injection-in-totolink-a71-30b2b01a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5678%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d402cf0a160ebd92d2b844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5677-os-command-injection-in-totolink-a71-8e1759cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5677%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d3ff4a0a160ebd92d10004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0049-denial-of-service-in-google-android-73e3359f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0049%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69d3ff4a0a160ebd92d0fffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48651-unknown-in-google-android-8892d81d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48651%3A%20Unknown%20in%20Google%20Android&amp;severity=medium&amp;id=69d40d5a0a160ebd92d6989b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5676-missing-authentication-in-totolink-a-4c98cc11</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5676%3A%20Missing%20Authentication%20in%20Totolink%20A8000R&amp;severity=medium&amp;id=69d3ff4a0a160ebd92d0fffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33817-413ceec5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33817&amp;severity=null&amp;id=69d737031cc7ad14da4194be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5675-sql-injection-in-itsourcecode-constr-61f7dbce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5675%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d3f8440a160ebd92cf69a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35174-cwe-22-improper-limitation-of-a-pat-c16d1487</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35174%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20xenocrat%20chyrp-lite&amp;severity=critical&amp;id=69d3f8440a160ebd92cf699f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35173-cwe-639-authorization-bypass-throug-cb83b4ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35173%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20xenocrat%20chyrp-lite&amp;severity=medium&amp;id=69d3f8440a160ebd92cf699b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35171-cwe-94-improper-control-of-generati-06939640</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35171%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kedro-org%20kedro&amp;severity=critical&amp;id=69d3f4be0a160ebd92ce2ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5672-sql-injection-in-code-projects-simpl-4f58dda2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5672%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35167-cwe-22-improper-limitation-of-a-pat-989e897d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35167%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kedro-org%20kedro&amp;severity=high&amp;id=69d3f4be0a160ebd92ce2ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35470-cwe-89-improper-neutralization-of-s-92f103df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35470%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69d3f4be0a160ebd92ce2efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35166-cwe-79-improper-neutralization-of-i-6bce5d1f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35166%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gohugoio%20hugo&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35164-cwe-434-unrestricted-upload-of-file-984d2f6a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35164%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ajax30%20BraveCMS-2.0&amp;severity=high&amp;id=69d3f4be0a160ebd92ce2eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35052-cwe-79-improper-neutralization-of-i-121184d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35052%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20man-group%20dtale&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35050-cwe-22-improper-limitation-of-a-pat-3480660e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35050%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=critical&amp;id=69d3f4be0a160ebd92ce2ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35209-cwe-1321-improperly-controlled-modi-76f08387</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35209%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20unjs%20defu&amp;severity=high&amp;id=69d3edbe0a160ebd92cb34cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35047-cwe-434-unrestricted-upload-of-file-a7c1a195</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35047%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ajax30%20BraveCMS-2.0&amp;severity=critical&amp;id=69d3edbe0a160ebd92cb34c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35046-cwe-79-improper-neutralization-of-i-8d304dd6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35046%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69d3edbe0a160ebd92cb34c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35045-cwe-639-authorization-bypass-throug-6f199385</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35045%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69d3edbe0a160ebd92cb34bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5671-cross-site-scripting-in-cyber-iii-st-fbf946b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5671%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3edbe0a160ebd92cb34d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35042-cwe-345-insufficient-verification-o-d4271e43</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35042%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20nearform%20fast-jwt&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35039-cwe-345-insufficient-verification-o-e6af2ea6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35039%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20nearform%20fast-jwt&amp;severity=critical&amp;id=69d3ea320a160ebd92c9fd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35037-cwe-918-server-side-request-forgery-b904914c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35037%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lin-snow%20Ech0&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35036-cwe-918-server-side-request-forgery-4db6c315</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35036%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lin-snow%20Ech0&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35035-cwe-79-improper-neutralization-of-i-6f9e3406</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35035%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35030-cwe-287-improper-authentication-in--918a2d56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35030%3A%20CWE-287%3A%20Improper%20Authentication%20in%20BerriAI%20litellm&amp;severity=critical&amp;id=69d3ea320a160ebd92c9fd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5670-unrestricted-upload-in-cyber-iii-stu-237569ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5670%3A%20Unrestricted%20Upload%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3ea320a160ebd92c9fd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35029-cwe-863-incorrect-authorization-in--ed3eedd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35029%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20BerriAI%20litellm&amp;severity=high&amp;id=69d3ea320a160ebd92c9fda1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34992-cwe-311-missing-encryption-of-sensi-93f490eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34992%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20antrea-io%20antrea&amp;severity=high&amp;id=69d4982faaed68159ac9fe11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5669-sql-injection-in-cyber-iii-student-m-6a572c5a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5669%3A%20SQL%20Injection%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3ea320a160ebd92c9fda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34989-cwe-79-improper-neutralization-of-i-bdfd6b20</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34989%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69d4982faaed68159ac9fe0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34981-cwe-918-server-side-request-forgery-6ba39912</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34981%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pavelzbornik%20whisperX-FastAPI&amp;severity=medium&amp;id=69d3dfa80a160ebd92c701e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34977-cwe-78-improper-neutralization-of-s-e8f0aace</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34977%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zeecka%20AperiSolve&amp;severity=critical&amp;id=69d3dfa80a160ebd92c701de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5668-cross-site-scripting-in-cyber-iii-st-14e3000c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5668%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3dfa80a160ebd92c701e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34976-cwe-862-missing-authorization-in-dg-edb4d75f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34976%3A%20CWE-862%3A%20Missing%20Authorization%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69d3dfa80a160ebd92c701db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34975-cwe-93-improper-neutralization-of-c-29f279cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34975%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20useplunk%20plunk&amp;severity=high&amp;id=69d3dfa80a160ebd92c701d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34841-cwe-494-download-of-code-without-in-97972daa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34841%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20usebruno%20bruno&amp;severity=critical&amp;id=69d3dfa80a160ebd92c701d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34783-cwe-22-improper-limitation-of-a-pat-b7f6108c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34783%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MontFerret%20ferret&amp;severity=high&amp;id=69d3dfa80a160ebd92c701ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34950-cwe-327-use-of-a-broken-or-risky-cr-19d5d528</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34950%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20nearform%20fast-jwt&amp;severity=critical&amp;id=69d3dc220a160ebd92c52bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34940-cwe-78-improper-neutralization-of-s-e39f3606</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34940%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kubeai-project%20kubeai&amp;severity=high&amp;id=69e0004582d89c981f9b91c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34756-cwe-770-allocation-of-resources-wit-6938b632</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34756%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69d49831aaed68159aca0f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34755-cwe-770-allocation-of-resources-wit-052948e9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34755%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69d402cf0a160ebd92d2b84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34753-cwe-918-server-side-request-forgery-5a76be30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34753%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69d49831aaed68159aca0f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21382-cwe-120-buffer-copy-without-checkin-dbfa725a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21382%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfad0a160ebd92c70959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21381-cwe-126-buffer-over-read-in-qualcom-97e60d99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21381%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfad0a160ebd92c70956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21380-cwe-416-use-after-free-in-qualcomm--39b98ba6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21380%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7026a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21378-cwe-126-buffer-over-read-in-qualcom-db6e8adf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21378%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21376-cwe-126-buffer-over-read-in-qualcom-4b558eed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21376%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21375-cwe-126-buffer-over-read-in-qualcom-3e9ef29c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21375%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21374-cwe-126-buffer-over-read-in-qualcom-ec97fd40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21374%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7025e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21373-cwe-126-buffer-over-read-in-qualcom-f1151391</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21373%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7025b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21372-cwe-122-heap-based-buffer-overflow--c4a06644</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21372%3A%20CWE-122%3A%20Heap-Based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21371-cwe-126-buffer-over-read-in-qualcom-59baca32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21371%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21367-cwe-126-buffer-over-read-in-qualcom-e1ac069c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21367%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47400-cwe-126-buffer-over-read-in-qualcom-bd042dbf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47400%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7024f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47392-cwe-190-integer-overflow-or-wraparo-02f5c4b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47392%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfa80a160ebd92c701f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47391-cwe-121-stack-based-buffer-overflow-1323497d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47391%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfa80a160ebd92c701f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47390-cwe-126-buffer-over-read-in-qualcom-de63c3be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47390%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d48bf00a160ebd9241664f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47389-cwe-120-buffer-copy-without-checkin-0c21b8f0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47389%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d48bf00a160ebd9241664c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47374-cwe-416-use-after-free-in-qualcomm--0d39ebfd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47374%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69d4982faaed68159ac9fe18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14032-cwe-862-missing-authorization-in-tw-75f09585</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14032%3A%20CWE-862%20Missing%20Authorization%20in%20Twitch%20Twitch%20Studio&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34589-cwe-190-integer-overflow-or-wraparo-670cf108</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34589%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69d47ddc0a160ebd9234c840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-deepmind-researchers-map-web-attacks-agains-aeea6bb9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20DeepMind%20Researchers%20Map%20Web%20Attacks%20Against%20AI%20Agents&amp;severity=low&amp;id=69d3d51a0a160ebd92c27878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34588-cwe-125-out-of-bounds-read-in-acade-6aa2dbfa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34588%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69d47ddc0a160ebd9234c83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34444-cwe-284-improper-access-control-in--55c5a0e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34444%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20scoder%20lupa&amp;severity=high&amp;id=69d402cf0a160ebd92d2b84b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5666-insecure-storage-of-sensitive-inform-5b3042a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5666%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20code-projects%20Online%20FIR%20System&amp;severity=medium&amp;id=69d49831aaed68159aca0f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34402-cwe-89-improper-neutralization-of-s-f739644e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34402&amp;severity=null&amp;id=69d3dfad0a160ebd92c7095c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33405-cwe-79-improper-neutralization-of-i-00265079</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=low&amp;id=69d3d1a00a160ebd92c130ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34380-cwe-190-integer-overflow-or-wraparo-5fee1a08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34380%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34379-cwe-704-incorrect-type-conversion-o-d3addab1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34379%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69d3d1a00a160ebd92c130df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34378-cwe-190-integer-overflow-or-wraparo-2a394764</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34378%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5704-unrestricted-upload-of-file-with-dan-b8ef14a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5704%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d3d1a30a160ebd92c13132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5665-sql-injection-in-code-projects-onlin-8cd984ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5665%3A%20SQL%20Injection%20in%20code-projects%20Online%20FIR%20System&amp;severity=medium&amp;id=69d3d1a30a160ebd92c1312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34217-cwe-668-exposure-of-resource-to-wro-58a29899</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34217%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20nyariv%20SandboxJS&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34211-cwe-674-uncontrolled-recursion-in-n-f8e7d7c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34211%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20nyariv%20SandboxJS&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34208-cwe-693-protection-mechanism-failur-e30541cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34208%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69d3d1a00a160ebd92c130d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34148-cwe-400-uncontrolled-resource-consu-a5ea008b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34148%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20%40fedify%20fedify&amp;severity=high&amp;id=69d3d1a00a160ebd92c130d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33752-cwe-918-server-side-request-forgery-e0c92d48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33752%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lexiforest%20curl_cffi&amp;severity=high&amp;id=69d3d1a00a160ebd92c130cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33510-cwe-87-improper-neutralization-of-a-fa85fbb2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33510%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20homarr-labs%20homarr&amp;severity=high&amp;id=69d3ce180a160ebd92c09cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34897-cwe-79-improper-neutralization-of-i-c217a2af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33406-cwe-79-improper-neutralization-of-i-32216ce3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33406%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33404-cwe-79-improper-neutralization-of-i-ebecab71</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33404%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=low&amp;id=69d3ce180a160ebd92c09cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33403-cwe-79-improper-neutralization-of-i-b74d02a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33403%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=medium&amp;id=69d3ce180a160ebd92c09ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34885-cwe-89-improper-neutralization-of-s-37e96e1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34885%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=high&amp;id=69d3ce180a160ebd92c09cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32602-cwe-367-time-of-check-time-of-use-t-01123955</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32602%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29047-cwe-89-improper-neutralization-of-s-892178f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29047%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3ce150a160ebd92c09c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26263-cwe-89-improper-neutralization-of-s-98f225c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26263%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3c70a0a160ebd92be8322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26027-cwe-79-improper-neutralization-of-i-5619f4b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26027%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3c70a0a160ebd92be831f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26026-cwe-94-improper-control-of-generati-4a1597fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26026%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=critical&amp;id=69d3c70a0a160ebd92be831c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25932-cwe-116-improper-encoding-or-escapi-427f3b13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25932%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3c70a0a160ebd92be8319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5663-os-command-injection-in-offis-dcmtk-23884b4d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5663%3A%20OS%20Command%20Injection%20in%20OFFIS%20DCMTK&amp;severity=medium&amp;id=69d3c3860a160ebd92bdb61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5661-denial-of-service-in-free5gc-ddea4988</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5661%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69d3c3860a160ebd92bdb615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5660-sql-injection-in-itsourcecode-constr-98f1115c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5660%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d3bc7e0a160ebd92bb5f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5659-deserialization-in-pytries-datrie-6b0a8d2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5659%3A%20Deserialization%20in%20pytries%20datrie&amp;severity=medium&amp;id=69d3b5770a160ebd92b7fa70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guardarian-users-targeted-with-malicious-strapi-np-667f63fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guardarian%20Users%20Targeted%20With%20Malicious%20Strapi%20NPM%20Packages&amp;severity=medium&amp;id=69d39cda0a160ebd92ab1d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5650-insecure-storage-of-sensitive-inform-4d29decf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5650%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20code-projects%20Online%20Application%20System%20for%20Admission&amp;severity=medium&amp;id=69d3a05e0a160ebd92acdcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/6th-april-threat-intelligence-report-2e352230</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=6th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69d399550a160ebd92a9b3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5649-sql-injection-in-code-projects-onlin-2974d006</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5649%3A%20SQL%20Injection%20in%20code-projects%20Online%20Application%20System%20for%20Admission&amp;severity=medium&amp;id=69d399550a160ebd92a9b3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-target-high-profile-nodejs-ma-25d12f06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Target%20High-Profile%20Node.js%20Maintainers&amp;severity=high&amp;id=69d395d20a160ebd92a6fec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5648-sql-injection-in-code-projects-simpl-a580976b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5648%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d395d90a160ebd92a70b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5647-cross-site-scripting-in-code-project-ce53e321</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5647%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d395d90a160ebd92a70b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5646-sql-injection-in-code-projects-easy--86537ffb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5646%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d38eca0a160ebd92a3e2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5645-sql-injection-in-projectworlds-car-r-7806b7f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5645%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20System&amp;severity=medium&amp;id=69d38eca0a160ebd92a3e2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5644-cross-site-scripting-in-cyber-iii-st-26209b3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5644%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d387c10a160ebd92a05aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5643-cross-site-scripting-in-cyber-iii-st-89b3b93c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5643%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d387c10a160ebd92a05ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-rushes-emergency-fixes-for-exploited-zero-0e3162fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Rushes%20Emergency%20Fixes%20for%20Exploited%20Zero-Day&amp;severity=low&amp;id=69d380ba0a160ebd929cdcbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5642-improper-authorization-in-cyber-iii--0ffbbeb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5642%3A%20Improper%20Authorization%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d380c00a160ebd929cdd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5673-out-of-bounds-read-in-red-hat-red-ha-0905ee9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5673%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d380c00a160ebd929cdd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5641-sql-injection-in-phpgurukul-online-s-f420b58d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5641%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d380c00a160ebd929cdd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5640-sql-injection-in-phpgurukul-online-s-35d2da80</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5640%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d379b20a160ebd9296724d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-often-are-redirects-used-in-phishing-in-2026x3-6e4aa013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20often%20are%20redirects%20used%20in%20phishing%20in%202026%26%23x3f%3B%2C%20(Mon%2C%20Apr%206th)&amp;severity=medium&amp;id=69d376340a160ebd9294c463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5639-sql-injection-in-phpgurukul-online-s-27b523e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5639%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d379b20a160ebd92967246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37977-origin-validation-error-in-red-hat--52323981</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37977%3A%20Origin%20Validation%20Error%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69d372ac0a160ebd9293290b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5638-path-traversal-in-heriklyma-cppwebfr-b0d21b50</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5638%3A%20Path%20Traversal%20in%20HerikLyma%20CPPWebFramework&amp;severity=medium&amp;id=69d372ac0a160ebd92932915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5637-sql-injection-in-projectworlds-car-r-292e4dae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5637%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20System&amp;severity=medium&amp;id=69d372ac0a160ebd9293290f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5636-sql-injection-in-phpgurukul-online-s-d95e00cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5636%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d36ba30a160ebd9290d554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5635-sql-injection-in-phpgurukul-online-s-b47bbe57</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5635%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d36ba30a160ebd9290d54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5634-sql-injection-in-projectworlds-car-r-fff45319</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5634%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=69d36ba30a160ebd9290d547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5633-server-side-request-forgery-in-assaf-31e6e672</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5633%3A%20Server-Side%20Request%20Forgery%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d3924a0a160ebd92a58b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5632-missing-authentication-in-assafelovi-40387971</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5632%3A%20Missing%20Authentication%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d35a0e0a160ebd92890b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5631-code-injection-in-assafelovic-gpt-re-ae6c8081</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5631%3A%20Code%20Injection%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d35a0e0a160ebd92890b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5630-cross-site-scripting-in-assafelovic--c377408d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5630%3A%20Cross%20Site%20Scripting%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d35a0e0a160ebd92890b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5629-stack-based-buffer-overflow-in-belki-abbd3417</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5629%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d34f820a160ebd9282cfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5628-stack-based-buffer-overflow-in-belki-732548e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5628%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d34c040a160ebd9280c17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5625-cross-site-scripting-in-assafelovic--72d4f926</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5625%3A%20Cross%20Site%20Scripting%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d34c040a160ebd9280c175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5624-cross-site-request-forgery-in-projec-fecacb04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5624%3A%20Cross-Site%20Request%20Forgery%20in%20ProjectSend&amp;severity=medium&amp;id=69d34c040a160ebd9280c16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5623-server-side-request-forgery-in-hceng-e59811be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5623%3A%20Server-Side%20Request%20Forgery%20in%20hcengineering%20Huly%20Platform&amp;severity=medium&amp;id=69d34c040a160ebd9280c168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5622-use-of-hard-coded-cryptographic-key--31b4d302</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5622%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20hcengineering%20Huly%20Platform&amp;severity=medium&amp;id=69d33a730a160ebd9261d5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5621-os-command-injection-in-chrischinchi-7676eab8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5621%3A%20OS%20Command%20Injection%20in%20ChrisChinchilla%20Vale-MCP&amp;severity=medium&amp;id=69d33a730a160ebd9261d5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5620-sql-injection-in-itsourcecode-constr-ab89fe24</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5620%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d33a730a160ebd9261d5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5619-os-command-injection-in-braffolk-mcp-d6998a0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5619%3A%20OS%20Command%20Injection%20in%20Braffolk%20mcp-summarization-functions&amp;severity=medium&amp;id=69d33a730a160ebd9261d5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5618-server-side-request-forgery-in-kalca-5e58cc4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5618%3A%20Server-Side%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69d32c5a0a160ebd92539b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5616-missing-authentication-in-jeecgboot-38bc1de7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5616%3A%20Missing%20Authentication%20in%20JeecgBoot&amp;severity=medium&amp;id=69d32c5a0a160ebd92539b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5615-cross-site-scripting-in-givanz-vvveb-1c1067fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5615%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvvebjs&amp;severity=medium&amp;id=69d32c5a0a160ebd92539b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5614-stack-based-buffer-overflow-in-belki-4bd2dba3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5614%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d32c5a0a160ebd92539b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5613-stack-based-buffer-overflow-in-belki-4e7d7f43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5613%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d348ef0a160ebd927fa927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5612-stack-based-buffer-overflow-in-belki-c7735710</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5612%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d348ef0a160ebd927fa91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5611-stack-based-buffer-overflow-in-belki-807657fa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5611%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d348ef0a160ebd927fa915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-april-6th-2026-httpsiscsa-2ee41ab0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20April%206th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9880%2C%20(Mon%2C%20Apr%206th)&amp;severity=medium&amp;id=69d313bf0a160ebd923e6280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5610-stack-based-buffer-overflow-in-belki-eb86f832</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5610%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d3103a0a160ebd923c912d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5609-stack-based-buffer-overflow-in-tenda-a4abeddf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5609%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69d3103a0a160ebd923c9126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5608-stack-based-buffer-overflow-in-belki-c4d65888</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5608%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69d305ae0a160ebd92332185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5607-server-side-request-forgery-in-imprv-cb207074</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5607%3A%20Server-Side%20Request%20Forgery%20in%20imprvhub%20mcp-browser-agent&amp;severity=medium&amp;id=69d305ae0a160ebd9233217f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5606-sql-injection-in-phpgurukul-online-s-9f42cde0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5606%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d2fb230a160ebd9229b829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-07-d0bfbefe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-07&amp;severity=medium&amp;id=69d542daaaed68159a3c0b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-madara-local-file-inclusion-8b9d5ae1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20%20Madara%20-%20Local%20File%20Inclusion&amp;severity=medium&amp;id=69d4e432aaed68159a0d45a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ritecms-310-authenticated-remote-code-execution-8102a11a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RiteCMS%203.1.0%20-%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d4e432aaed68159a0d459e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wbce-cms-164-remote-code-execution-cad05e4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WBCE%20CMS%201.6.4%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d4e432aaed68159a0d4599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zhiyuan-oa-arbitrary-file-upload-leading-b478c822</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zhiyuan%20OA%20-%20arbitrary%20file%20upload%20leading&amp;severity=medium&amp;id=69d4e432aaed68159a0d4594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grafana-1160-ssrf-cca26f05</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grafana%2011.6.0%20-%20SSRF&amp;severity=medium&amp;id=69d4e432aaed68159a0d458f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aspnet-8010-bypass-09598bc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASP.net%20%208.0.10%20-%20Bypass&amp;severity=medium&amp;id=69d4e432aaed68159a0d458a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/desktop-window-manager-core-library-100102400-priv-50e07b38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Desktop%20Window%20Manager%20Core%20Library%2010.0.10240.0%20-%20Privilege%20Escalation&amp;severity=high&amp;id=69d4e432aaed68159a0d4585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-kernel-elevation-of-privilege-6bda53b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Kernel%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=69d4e432aaed68159a0d4580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fortiweb-v801-auth-bypass-41827c94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20FortiWeb%20v8.0.1%20-%20Auth%20Bypass&amp;severity=medium&amp;id=69d4e432aaed68159a0d457b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-localhost-ip-200-ssrf-6852b3d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=is-localhost-ip%202.0.0%20-%20SSRF&amp;severity=medium&amp;id=69d4e432aaed68159a0d4576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31352-na-b621af4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31352%3A%20n%2Fa&amp;severity=medium&amp;id=69d4982faaed68159ac9fe21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31350-na-e6fb99eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31350%3A%20n%2Fa&amp;severity=medium&amp;id=69d4982faaed68159ac9fe1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-06-03ccef92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-06&amp;severity=medium&amp;id=69d44c990a160ebd92ef4b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54601-na-de1c7b61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54601%3A%20n%2Fa&amp;severity=high&amp;id=69d417e60a160ebd92da7f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57834-na-d6f58338</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57834%3A%20n%2Fa&amp;severity=high&amp;id=69d40d5a0a160ebd92d6988a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54602-na-d03a9d7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54602%3A%20n%2Fa&amp;severity=high&amp;id=69d409d70a160ebd92d5a92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54328-na-18af0f52</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54328%3A%20n%2Fa&amp;severity=critical&amp;id=69d409d70a160ebd92d5a927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58349-na-9f3c45dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58349%3A%20n%2Fa&amp;severity=critical&amp;id=69d402cf0a160ebd92d2b840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54324-na-8382b977</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54324%3A%20n%2Fa&amp;severity=high&amp;id=69d402cf0a160ebd92d2b83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59440-na-7905e51f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59440%3A%20n%2Fa&amp;severity=high&amp;id=69d3f8440a160ebd92cf6997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57835-na-a9c52f60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57835%3A%20n%2Fa&amp;severity=high&amp;id=69d3f8440a160ebd92cf6993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30613-na-a58e6b92</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30613%3A%20n%2Fa&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61166-na-90779fb3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61166%3A%20n%2Fa&amp;severity=medium&amp;id=69d3edbe0a160ebd92cb34bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31313-na-4ebc5a87</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31313%3A%20n%2Fa&amp;severity=medium&amp;id=69d3dfa80a160ebd92c701ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31354-na-36df3662</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31354%3A%20n%2Fa&amp;severity=medium&amp;id=69d3dc220a160ebd92c52bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31353-na-9fbc1a43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31353%3A%20n%2Fa&amp;severity=medium&amp;id=69d3dc220a160ebd92c52bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31351-na-0aac2020</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31351%3A%20n%2Fa&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31067-na-b9bd7456</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31067%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31066-na-2af03cb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31066%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31065-na-b7520b37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31065%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31063-na-c31fc392</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31063%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31062-na-40958597</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31062%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31061-na-b9e481ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31061%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31060-na-6d26087b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31060%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31059-na-9fbd7824</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31059%3A%20n%2Fa&amp;severity=critical&amp;id=69d3ce150a160ebd92c09c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31058-na-880ca1c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31058%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31053-na-a6a7c90d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31053%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31153-na-df948ad8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31153%3A%20n%2Fa&amp;severity=medium&amp;id=69d3c70a0a160ebd92be832d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31151-na-d0e23eb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31151%3A%20n%2Fa&amp;severity=critical&amp;id=69d3c70a0a160ebd92be8329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31150-na-06667191</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31150%3A%20n%2Fa&amp;severity=medium&amp;id=69d3c70a0a160ebd92be8325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30078-na-0c914f65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30078%3A%20n%2Fa&amp;severity=high&amp;id=69d3bc7e0a160ebd92bb5f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-06-c4385a78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-06&amp;severity=low&amp;id=69d30cad0a160ebd92390330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5605-stack-based-buffer-overflow-in-tenda-5175b382</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5605%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69d2f0950a160ebd92223704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5604-stack-based-buffer-overflow-in-tenda-db7d292f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5604%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69d2e98e0a160ebd921dd793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5603-os-command-injection-in-elgentos-mag-77273804</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5603%3A%20OS%20Command%20Injection%20in%20elgentos%20magento2-dev-mcp&amp;severity=medium&amp;id=69d2e60a0a160ebd921baa0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5602-os-command-injection-in-nor2-io-heim-b47b6f51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5602%3A%20OS%20Command%20Injection%20in%20Nor2-io%20heim-mcp&amp;severity=medium&amp;id=69d2e2860a160ebd921a0373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4272-cwe-306-missing-authentication-for-c-c9a0d783</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4272%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Honeywell%20Barcode%20Scanners&amp;severity=high&amp;id=69d2df020a160ebd921850c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5601-information-disclosure-in-acrel-elec-0d3391a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5601%3A%20Information%20Disclosure%20in%20Acrel%20Electrical%20Prepaid%20Cloud%20Platform&amp;severity=medium&amp;id=69d2df020a160ebd921850c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35679-cwe-358-improperly-implemented-secu-190d6e68</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35679%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Zcash%20zcashd&amp;severity=low&amp;id=69d2d4760a160ebd9210510c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5597-path-traversal-in-griptape-ai-gripta-63b77628</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5597%3A%20Path%20Traversal%20in%20griptape-ai%20griptape&amp;severity=medium&amp;id=69d2d4760a160ebd92105110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5596-sql-injection-in-griptape-ai-griptap-ba35b0fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5596%3A%20SQL%20Injection%20in%20griptape-ai%20griptape&amp;severity=medium&amp;id=69d2cd6e0a160ebd920c956e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5595-path-traversal-in-griptape-ai-gripta-afe36018</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5595%3A%20Path%20Traversal%20in%20griptape-ai%20griptape&amp;severity=medium&amp;id=69d2b8560a160ebd920208d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5594-code-injection-in-premai-io-premsql-97f422d1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5594%3A%20Code%20Injection%20in%20premAI-io%20premsql&amp;severity=medium&amp;id=69d2adca0a160ebd92fc0d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5587-sql-injection-in-wbbeyourself-mac-sq-ccb4e970</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5587%3A%20SQL%20Injection%20in%20wbbeyourself%20MAC-SQL&amp;severity=medium&amp;id=69d2aa460a160ebd92fa19c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5586-sql-injection-in-zhongyu09-openchatb-1cc59c89</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5586%3A%20SQL%20Injection%20in%20zhongyu09%20openchatbi&amp;severity=medium&amp;id=69d2a6c30a160ebd92f87995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5585-information-disclosure-in-tencent-ai-f43c5abe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5585%3A%20Information%20Disclosure%20in%20Tencent%20AI-Infra-Guard&amp;severity=medium&amp;id=69d29fba0a160ebd92f4a36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5584-code-injection-in-fosowl-agenticseek-5ebdc688</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5584%3A%20Code%20Injection%20in%20Fosowl%20agenticSeek&amp;severity=medium&amp;id=69d2952e0a160ebd92ee8ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5583-sql-injection-in-phpgurukul-online-s-7e53dc46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5583%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d291aa0a160ebd92ed361d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5580-sql-injection-in-codeastro-online-cl-588a3e11</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5580%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d28e260a160ebd92ebf79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5579-sql-injection-in-codeastro-online-cl-8a36bff3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5579%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d28aa20a160ebd92eae607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5578-sql-injection-in-codeastro-online-cl-270cae2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5578%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d2872d0a160ebd92e8c403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5577-sql-injection-in-song-li-crossbrowse-75f65393</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5577%3A%20SQL%20Injection%20in%20Song-Li%20cross_browser&amp;severity=medium&amp;id=69d2839a0a160ebd92e66794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5576-unrestricted-upload-in-sourcecodeste-8cf7d296</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5576%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Record%20Management%20System&amp;severity=medium&amp;id=69d280150a160ebd92e46934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5575-sql-injection-in-sourcecodester-reco-fd2e567e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5575%3A%20SQL%20Injection%20in%20SourceCodester%20Record%20Management%20System&amp;severity=medium&amp;id=69d27c920a160ebd92e1f0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5574-missing-authorization-in-technostrob-06b353f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5574%3A%20Missing%20Authorization%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2790f0a160ebd92e069e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5573-unrestricted-upload-in-technostrobe--f074c6ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5573%3A%20Unrestricted%20Upload%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2758a0a160ebd92df43da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5572-cross-site-request-forgery-in-techno-06441469</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5572%3A%20Cross-Site%20Request%20Forgery%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d26e830a160ebd92dcfb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5571-information-disclosure-in-technostro-516ca39f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5571%3A%20Information%20Disclosure%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d26afe0a160ebd92db2dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5570-improper-authentication-in-technostr-b7d1e5d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5570%3A%20Improper%20Authentication%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2677a0a160ebd92d9f069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5569-improper-access-controls-in-technost-c554c45e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5569%3A%20Improper%20Access%20Controls%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2677a0a160ebd92d9f063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5568-cross-site-scripting-in-akaunting-86cee6b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5568%3A%20Cross%20Site%20Scripting%20in%20Akaunting&amp;severity=medium&amp;id=69d2607d0a160ebd92d8087b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5567-buffer-overflow-in-tenda-m3-072d4fc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5567%3A%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=69d2607d0a160ebd92d80874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5599-cwe-653-improper-isolation-or-compar-fc614c1a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5599%3A%20CWE-653%20Improper%20isolation%20or%20compartmentalization%20in%20pretix%20Venueless&amp;severity=high&amp;id=69d2596b0a160ebd92d5b95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5566-buffer-overflow-in-utt-hiper-1250gw-91d9c7d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5566%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69d255e50a160ebd92d4a22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5565-sql-injection-in-code-projects-simpl-b07ef79f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5565%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d255e50a160ebd92d4a223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5564-sql-injection-in-code-projects-simpl-b881b02b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5564%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d24b5a0a160ebd92cf6eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5563-sql-injection-in-autohomecorp-frostm-2a715c16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5563%3A%20SQL%20Injection%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69d247d60a160ebd92ce48cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5562-code-injection-in-provectus-kafka-ui-442a7aab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5562%3A%20Code%20Injection%20in%20provectus%20kafka-ui&amp;severity=medium&amp;id=69d244520a160ebd92ccff0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5561-injection-in-campcodes-complete-pos--7e32e92a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5561%3A%20Injection%20in%20Campcodes%20Complete%20POS%20Management%20and%20Inventory%20System&amp;severity=medium&amp;id=69d240c80a160ebd92cc2116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5560-sql-injection-in-phpgurukul-online-s-96eac83b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5560%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d23d4b0a160ebd92ca42f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5559-improper-neutralization-of-special-e-0f220e7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5559%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20AntaresMugisho%20PyBlade&amp;severity=medium&amp;id=69d239c60a160ebd92c92f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5558-sql-injection-in-phpgurukul-phpguruk-e94dae7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5558%3A%20SQL%20Injection%20in%20PHPGurukul%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d236420a160ebd92c84fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5557-authentication-bypass-using-alternat-9548feee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5557%3A%20Authentication%20Bypass%20Using%20Alternate%20Channel%20in%20badlogic%20pi-mono&amp;severity=medium&amp;id=69d232be0a160ebd92c6ef65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5556-code-injection-in-badlogic-pi-mono-c43049d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5556%3A%20Code%20Injection%20in%20badlogic%20pi-mono&amp;severity=medium&amp;id=69d22f510a160ebd92c5a8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5555-sql-injection-in-code-projects-conce-8ea5e7de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5555%3A%20SQL%20Injection%20in%20code-projects%20Concert%20Ticket%20Reservation%20System&amp;severity=medium&amp;id=69d22bb60a160ebd92c4c66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5554-sql-injection-in-code-projects-conce-3e644e27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5554%3A%20SQL%20Injection%20in%20code-projects%20Concert%20Ticket%20Reservation%20System&amp;severity=medium&amp;id=69d22bb60a160ebd92c4c664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5553-sql-injection-in-itsourcecode-online-f04df440</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5553%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cellphone%20System&amp;severity=medium&amp;id=69d240c80a160ebd92cc211e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5552-sql-injection-in-phpgurukul-online-s-2c0bee43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5552%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d2212a0a160ebd92c0fdde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5551-sql-injection-in-itsourcecode-free-h-36ec2bc4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5551%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69d21da50a160ebd92bf5b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5550-stack-based-buffer-overflow-in-tenda-a47995aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5550%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=69d21a220a160ebd92bda2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5549-use-of-hard-coded-cryptographic-key--5da1f78a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5549%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Tenda%20AC10&amp;severity=medium&amp;id=69d21a220a160ebd92bda2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5548-stack-based-buffer-overflow-in-tenda-b21b0ead</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5548%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=69d240c80a160ebd92cc2125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5547-os-command-injection-in-tenda-ac10-059e62c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5547%3A%20OS%20Command%20Injection%20in%20Tenda%20AC10&amp;severity=medium&amp;id=69d20f950a160ebd92b9623e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5546-unrestricted-upload-in-campcodes-com-39af8247</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5546%3A%20Unrestricted%20Upload%20in%20Campcodes%20Complete%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=69d2050a0a160ebd92b5ca37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5544-stack-based-buffer-overflow-in-utt-h-45d31ae5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5544%3A%20Stack-based%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69d1f7600a160ebd92af7735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5543-sql-injection-in-phpgurukul-user-reg-7eff5247</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5543%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd9293977d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5542-cross-site-scripting-in-code-project-92369ba6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5542%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd92939775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5541-cross-site-scripting-in-code-project-9d9eda40</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5541%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd9293976e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5540-sql-injection-in-code-projects-simpl-d6b5d26d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5540%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd92939767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5590-null-pointer-dereference-in-zephyrpr-8d20064c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5590%3A%20NULL%20Pointer%20Dereference%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=69d1dada0a160ebd92844add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5539-cross-site-scripting-in-code-project-db8879a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5539%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1dada0a160ebd92844ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5538-server-side-request-forgery-in-qingd-fc47f9c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5538%3A%20Server-Side%20Request%20Forgery%20in%20QingdaoU%20OnlineJudge&amp;severity=medium&amp;id=69d1dada0a160ebd92844ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5537-sql-injection-in-halex-coursesel-763c9bf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5537%3A%20SQL%20Injection%20in%20halex%20CourseSEL&amp;severity=medium&amp;id=69d1dada0a160ebd92844aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5536-deserialization-in-fedml-ai-fedml-83857636</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5536%3A%20Deserialization%20in%20FedML-AI%20FedML&amp;severity=medium&amp;id=69d1dada0a160ebd92844ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5535-path-traversal-in-fedml-ai-fedml-a593f60b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5535%3A%20Path%20Traversal%20in%20FedML-AI%20FedML&amp;severity=medium&amp;id=69d1ccca0a160ebd92763d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5534-sql-injection-in-itsourcecode-online-c19ce8d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5534%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69d1ccca0a160ebd92763d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5533-cross-site-scripting-in-badlogic-pi--560a39e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5533%3A%20Cross%20Site%20Scripting%20in%20badlogic%20pi-mono&amp;severity=medium&amp;id=69d1beba0a160ebd9263934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5532-os-command-injection-in-scrapegrapha-517e04f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5532%3A%20OS%20Command%20Injection%20in%20ScrapeGraphAI%20scrapegraph-ai&amp;severity=medium&amp;id=69d1beba0a160ebd92639349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5531-cleartext-storage-in-a-file-or-on-di-a84e61b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5531%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=69d1beba0a160ebd92639342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5530-server-side-request-forgery-in-ollam-fdcf16de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5530%3A%20Server-Side%20Request%20Forgery%20in%20Ollama&amp;severity=medium&amp;id=69d1f7600a160ebd92af7748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5529-improper-authorization-in-dromara-la-95f7d62a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5529%3A%20Improper%20Authorization%20in%20Dromara%20lamp-cloud&amp;severity=medium&amp;id=69d1f7600a160ebd92af773e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-05-8e0ed497</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-05&amp;severity=medium&amp;id=69d2fb190a160ebd9229a5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-05-877aed8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-05&amp;severity=low&amp;id=69d1ec650a160ebd92aa0b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5528-os-command-injection-in-moussaabbadl-7c70d590</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5528%3A%20OS%20Command%20Injection%20in%20MoussaabBadla%20code-screenshot-mcp&amp;severity=medium&amp;id=69d1a29a0a160ebd92f0a043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5527-use-of-hard-coded-cryptographic-key--3a414038</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5527%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Tenda%204G03%20Pro&amp;severity=medium&amp;id=69d19f160a160ebd92e2b2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5526-improper-access-controls-in-tenda-4g-14b70564</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5526%3A%20Improper%20Access%20Controls%20in%20Tenda%204G03%20Pro&amp;severity=medium&amp;id=69d1f7600a160ebd92af7750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3666-cwe-22-improper-limitation-of-a-path-8b05d9d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3666%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=69d0f6560a160ebd92e6d966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2936-cwe-79-improper-neutralization-of-in-422ba84b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2936%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wp-buy%20Visitor%20Traffic%20Real%20Time%20Statistics&amp;severity=high&amp;id=69d0f6560a160ebd92e6d95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1233-cwe-798-use-of-hard-coded-credential-6c6e620c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1233%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20mvirik%20Text%20to%20Speech%20%E2%80%93%20TTSWP&amp;severity=high&amp;id=69d0f6560a160ebd92e6d95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14938-cwe-434-unrestricted-upload-of-file-2401272d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14938%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20purethemes%20Listeo-Core%20-%20Directory%20Plugin%20by%20Purethemes&amp;severity=medium&amp;id=69d0f6560a160ebd92e6d952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3309-cwe-94-improper-control-of-generatio-826c5da5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3309%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=69d0f6560a160ebd92e6d962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0626-cwe-79-improper-neutralization-of-in-5419438f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getwpfunnels%20WPFunnels%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20with%20Checkout%20%26%20One%20Click%20Upsell&amp;severity=medium&amp;id=69d0f6560a160ebd92e6d956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-commission-confirms-data-breach-linked-to-7237c06f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Commission%20Confirms%20Data%20Breach%20Linked%20to%20Trivy%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69d0ebcb0a160ebd92e486b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3445-cwe-862-missing-authorization-in-pro-38b78a54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3445%3A%20CWE-862%20Missing%20Authorization%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=high&amp;id=69d0cfab0a160ebd92dd86d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2826-cwe-862-missing-authorization-in-ste-6610cfb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2826%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=69d0cfab0a160ebd92dd86cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2437-cwe-79-improper-neutralization-of-in-0af0e1d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=medium&amp;id=69d0cfab0a160ebd92dd86c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5425-cwe-79-improper-neutralization-of-in-1c7aa2af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5425%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Social%20Photo%20Feed&amp;severity=high&amp;id=69d0cfab0a160ebd92dd86d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4896-cwe-639-authorization-bypass-through-8abf7432</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4896%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=high&amp;id=69d0c19a0a160ebd92d74647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13368-cwe-79-improper-neutralization-of-i-081a22a8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0552-cwe-79-improper-neutralization-of-in-1f4cccca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0737-cwe-79-improper-neutralization-of-in-4c65f006</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0738-cwe-79-improper-neutralization-of-in-c28c2c0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0738%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69d0c19a0a160ebd92d7463e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2600-cwe-79-improper-neutralization-of-in-49ef0340</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2600%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0664-cwe-79-improper-neutralization-of-in-897d2c33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15064-cwe-79-improper-neutralization-of-i-35918fc7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=69d0c19a0a160ebd92d7462d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2949-cwe-79-improper-neutralization-of-in-ba43818e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2949%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69d085d60a160ebd9291ffbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2924-cwe-79-improper-neutralization-of-in-c8383986</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20%E2%80%93%20Ultimate%20WordPress%20FSE%20Blocks%20Addons%20%26%20Ecosystem&amp;severity=medium&amp;id=69d085d60a160ebd9291ffb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3571-cwe-862-missing-authorization-in-gen-414f53ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3571%3A%20CWE-862%20Missing%20Authorization%20in%20genetechproducts%20Pie%20Register%20%E2%80%93%20User%20Registration%2C%20Profiles%20%26%20Content%20Restriction&amp;severity=medium&amp;id=69d074630a160ebd927ffddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35616-escalation-of-privilege-in-fortinet-1f903372</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35616%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientEMS&amp;severity=critical&amp;id=69d062ae0a160ebd92704c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-05-ff758128</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-05&amp;severity=medium&amp;id=69d27c8a0a160ebd92e1bfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-04-7eb28cb1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-04&amp;severity=medium&amp;id=69d1a9990a160ebd92071c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-04-b9a3641d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-04&amp;severity=low&amp;id=69d0cc1f0a160ebd92dc5a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34955-cwe-78-improper-neutralization-of-s-35d9d34b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34955%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04d960a160ebd926594f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34954-cwe-918-server-side-request-forgery-896ba330</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34954%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04a110a160ebd9264ca72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34953-cwe-863-incorrect-authorization-in--72e3ef5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34953%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d04a110a160ebd9264ca6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34952-cwe-306-missing-authentication-for--4a535aff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34952%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d04a110a160ebd9264ca6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34939-cwe-1333-inefficient-regular-expres-34333858</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34939%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d04a110a160ebd9264ca69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34938-cwe-693-protection-mechanism-failur-01ac669c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34938%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d04a110a160ebd9264ca66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34937-cwe-78-improper-neutralization-of-s-323a6925</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34937%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04a110a160ebd9264ca63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34936-cwe-918-server-side-request-forgery-f70ae3e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34936%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04a110a160ebd9264ca60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34934-cwe-89-improper-neutralization-of-s-2e7eac46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34934%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d046900a160ebd9263e690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34935-cwe-78-improper-neutralization-of-s-aa91a94a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34935%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d046900a160ebd9263e693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34824-cwe-125-out-of-bounds-read-in-mesop-38b40f4e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34824%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mesop-dev%20mesop&amp;severity=high&amp;id=69d046900a160ebd9263e68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34612-cwe-89-improper-neutralization-of-s-c7c6454f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34612%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kestra-io%20kestra&amp;severity=critical&amp;id=69d046900a160ebd9263e685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35468-cwe-252-unchecked-return-value-in-n-d12f56bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35468%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20nimiq%20core-rs-albatross&amp;severity=medium&amp;id=69d03f860a160ebd92619e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33184-cwe-191-integer-underflow-wrap-or-w-4ea8d7a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33184%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69d03f860a160ebd92619e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34061-cwe-345-insufficient-verification-o-7684b074</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34061%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20nimiq%20core-rs-albatross&amp;severity=medium&amp;id=69d03f860a160ebd92619e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34052-cwe-401-missing-release-of-memory-a-4d60fc53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34052%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20jupyterhub%20ltiauthenticator&amp;severity=medium&amp;id=69d03f860a160ebd92619e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33175-cwe-287-improper-authentication-in--900dd73d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33175%3A%20CWE-287%3A%20Improper%20Authentication%20in%20jupyterhub%20oauthenticator&amp;severity=high&amp;id=69d03c020a160ebd926055e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28797-cwe-20-improper-input-validation-in-23caf65b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28797%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20infiniflow%20ragflow&amp;severity=high&amp;id=69d038800a160ebd925f4637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34980-cwe-20-improper-input-validation-in-692dc2f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34980%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d2016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34979-cwe-122-heap-based-buffer-overflow--62848072</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34979%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d2013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34978-cwe-22-improper-limitation-of-a-pat-c074c0e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34978%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d2010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34990-cwe-287-improper-authentication-in--2f45c293</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34990%3A%20CWE-287%3A%20Improper%20Authentication%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d201a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27447-cwe-863-incorrect-authorization-in--07eb4b03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27447%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d200c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22665-cwe-178-improper-handling-of-case-s-4e82a4fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22665%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd92593012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22664-cwe-918-server-side-request-forgery-8828a448</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22664%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd9259300d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22663-cwe-862-missing-authorization-in-pr-a0e6cd29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22663%3A%20CWE-862%20Missing%20Authorization%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd92593008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22662-cwe-918-server-side-request-forgery-11de16a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22662%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20prompts.chat&amp;severity=medium&amp;id=69d026ec0a160ebd92593003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22661-cwe-22-improper-limitation-of-a-pat-e784ddc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22661%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd92592ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10681-cwe-798-in-gardyn-mobile-applicatio-18dc4351</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10681%3A%20CWE-798%20in%20Gardyn%20Mobile%20Application&amp;severity=high&amp;id=69d026ec0a160ebd92592ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25197-cwe-639-in-gardyn-cloud-api-0887f9ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25197%3A%20CWE-639%20in%20Gardyn%20Cloud%20API&amp;severity=critical&amp;id=69d026ec0a160ebd92593017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28766-cwe-306-in-gardyn-cloud-api-a7ac8e53</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28766%3A%20CWE-306%20in%20Gardyn%20Cloud%20API&amp;severity=critical&amp;id=69d026ec0a160ebd9259301d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28767-cwe-306-in-gardyn-cloud-api-7cf9d13d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28767%3A%20CWE-306%20in%20Gardyn%20Cloud%20API&amp;severity=medium&amp;id=69d023670a160ebd92577b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32646-cwe-306-in-gardyn-cloud-api-42895e3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32646%3A%20CWE-306%20in%20Gardyn%20Cloud%20API&amp;severity=high&amp;id=69d023670a160ebd92577b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35558-cwe-77-improper-neutralization-of-s-2fdf5088</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35558%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35559-cwe-787-out-of-bounds-write-in-amaz-64d68bf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35559%3A%20CWE-787%20Out-of-bounds%20write%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=medium&amp;id=69d023670a160ebd92577b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5485-cwe-78-improper-neutralization-of-sp-efef007b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5485%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32662-cwe-489-in-gardyn-cloud-api-d58ccfc1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32662%3A%20CWE-489%20in%20Gardyn%20Cloud%20API&amp;severity=medium&amp;id=69d023670a160ebd92577b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35562-cwe-770-allocation-of-resources-wit-55242724</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35562%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35561-cwe-862-missing-authorization-in-am-b3c9fe82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35561%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35560-cwe-295-improper-certificate-valida-6b4d3803</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35560%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28798-cwe-918-server-side-request-forgery-eeb1458a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28798%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IceWhaleTech%20ZimaOS&amp;severity=critical&amp;id=69d01fe40a160ebd92561113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5484-improper-access-controls-in-bookstac-dec9933e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5484%3A%20Improper%20Access%20Controls%20in%20BookStackApp%20BookStack&amp;severity=medium&amp;id=69d01c5f0a160ebd9254ff70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3184-authentication-bypass-by-alternate-n-f2f54bad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3184%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69d011d20a160ebd9251326c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2625-improper-verification-of-cryptograph-ee8d8567</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2625%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d00aca0a160ebd924e2a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5476-integer-overflow-in-nasa-cfs-5bb1bd57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5476%3A%20Integer%20Overflow%20in%20NASA%20cFS&amp;severity=low&amp;id=69cffcbb0a160ebd924911a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32186-cwe-918-server-side-request-forgery-56097844</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32186%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Bing&amp;severity=critical&amp;id=69cffcbb0a160ebd9249119e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5475-memory-corruption-in-nasa-cfs-13fbb9f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5475%3A%20Memory%20Corruption%20in%20NASA%20cFS&amp;severity=medium&amp;id=69cff9360a160ebd9247d56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0545-cwe-306-missing-authentication-for-c-c182a1fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0545%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69cff9360a160ebd9247d567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5474-heap-based-buffer-overflow-in-nasa-c-f6b3acaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5474%3A%20Heap-based%20Buffer%20Overflow%20in%20NASA%20cFS&amp;severity=medium&amp;id=69cff5b20a160ebd92462686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5473-deserialization-in-nasa-cfs-3e2a874c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5473%3A%20Deserialization%20in%20NASA%20cFS&amp;severity=low&amp;id=69cff2300a160ebd92448b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/managing-open-source-vulnerabilities-kaspersky-off-55d6c244</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Managing%20open-source%20vulnerabilities%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cfeb2e0a160ebd9241ea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5472-unrestricted-upload-in-projectsandpr-0cc309bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5472%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=69cfe7a20a160ebd9240d447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25118-cwe-598-use-of-get-request-method-w-96ae0d1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25118%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20immich-app%20immich&amp;severity=medium&amp;id=69cfe4200a160ebd923f9c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5471-use-of-hard-coded-cryptographic-key--5760eb8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5471%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Investory%20Toy%20Planet%20Trouble%20App&amp;severity=medium&amp;id=69cfe4200a160ebd923f9c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5470-server-side-request-forgery-in-mixel-d7026a99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5470%3A%20Server-Side%20Request%20Forgery%20in%20mixelpixx%20Google-Research-MCP&amp;severity=medium&amp;id=69cfe09b0a160ebd923e33cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27124-cwe-441-unintended-proxy-or-interme-8aae3b75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27124%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20jlowin%20fastmcp&amp;severity=high&amp;id=69cfdd290a160ebd923d52c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64340-cwe-78-improper-neutralization-of-s-051e5da6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64340%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jlowin%20fastmcp&amp;severity=medium&amp;id=69cfdd290a160ebd923d52bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23471-bbdc30cf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23471&amp;severity=null&amp;id=69dcf3cf82d89c981fee9b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5469-server-side-request-forgery-in-casdo-a22db068</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5469%3A%20Server-Side%20Request%20Forgery%20in%20Casdoor&amp;severity=medium&amp;id=69d01fe40a160ebd92561117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-related-campaigns-with-lnk-and-github-c2-91573c21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK-Related%20Campaigns%20with%20LNK%20and%20GitHub%20C2&amp;severity=medium&amp;id=69cff22d0a160ebd924486ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5468-cross-site-scripting-in-casdoor-7e8a0a24</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5468%3A%20Cross%20Site%20Scripting%20in%20Casdoor&amp;severity=medium&amp;id=69cfc47e0a160ebd922338ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28736-cwe-639-authorization-bypass-throug-75f52a86</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28736%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mattermost%20Focalboard&amp;severity=medium&amp;id=69cfc47e0a160ebd922338cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25773-cwe-89-improper-neutralization-of-s-43bf0e92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25773%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mattermost%20Focalboard&amp;severity=high&amp;id=69cfc47e0a160ebd922338c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-006-cert-eu-c-06f851f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20006%20-%20CERT-EU%20Confirms%20European%20Commission%20Cloud%20Breach%2C%20Sportradar%20Details%20Emerge%2C%20and%20Mandiant%20Quantifies%20Campaign%20at%201%2C000%26%23x2b%3B%20SaaS%20Environments%2C%20(Fri%2C%20Apr%203rd)&amp;severity=medium&amp;id=69cfc0f60a160ebd9221d9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trueconf-zero-day-exploited-in-asian-government-at-c6827a67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TrueConf%20Zero-Day%20Exploited%20in%20Asian%20Government%20Attacks&amp;severity=medium&amp;id=69cfb9ee0a160ebd921e736a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-chatgpt-data-leak-android-rootkit-wa-e5dd880b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20ChatGPT%20Data%20Leak%2C%20Android%20Rootkit%2C%20Water%20Facility%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69cfb66a0a160ebd921d0eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27655-cwe-79-improper-neutralization-of-i-6c9ead92</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27655%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfb2e50a160ebd921b3d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-sharefile-flaws-lead-to-unauthenticated-r-db626a4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20ShareFile%20Flaws%20Lead%20to%20Unauthenticated%20RCE&amp;severity=critical&amp;id=69cfaf620a160ebd9219b6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4108-cwe-79-improper-neutralization-of-in-77d35d30</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4108%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfb2e50a160ebd921b3d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5467-open-redirect-in-casdoor-d92e6490</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5467%3A%20Open%20Redirect%20in%20Casdoor&amp;severity=medium&amp;id=69cfabde0a160ebd92184cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4107-cwe-79-improper-neutralization-of-in-b7a2b682</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4107%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3880-cwe-79-improper-neutralization-of-in-4115e272</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3880%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3879-cwe-79-improper-neutralization-of-in-2109c30e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3879%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28703-cwe-79-improper-neutralization-of-i-105fef78</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28703%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28756-cwe-79-improper-neutralization-of-i-95c85518</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28756%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfa1520a160ebd92140866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-attack-surface-expands-as-enterprises-lose--2062976c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20Attack%20Surface%20Expands%20as%20Enterprises%20Lose%20Control&amp;severity=medium&amp;id=69cfc4ba0a160ebd9223c7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploited-in-large-scale-credential-ha-710eb52c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploited%20in%20Large-Scale%20Credential%20Harvesting%20Campaign&amp;severity=medium&amp;id=69cf9dce0a160ebd92126582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/t-mobile-sets-the-record-straight-on-latest-data-b-a56c8b52</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=T-Mobile%20Sets%20the%20Record%20Straight%20on%20Latest%20Data%20Breach%20Filing&amp;severity=medium&amp;id=69cf96c60a160ebd920f4081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28754-cwe-79-improper-neutralization-of-i-6d918354</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28754%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cf96cc0a160ebd920f4a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-technique-based-approach-to-hunting-web-delivere-aa216956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Technique-Based%20Approach%20to%20Hunting%20Web-Delivered%20Malware&amp;severity=medium&amp;id=69cff22d0a160ebd924486f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-drain-285-million-from-drift--80bba754</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Drain%20%24285%20Million%20From%20Drift%20in%2010%20Seconds&amp;severity=medium&amp;id=69cf8fbe0a160ebd920b65a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7024-cwe-276-incorrect-default-permission-97c73fb0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7024%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AIRBUS%20TETRA%20Connectivity%20Server%20(TCS)&amp;severity=medium&amp;id=69cf701a0a160ebd92f9a4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5462-use-of-hard-coded-cryptographic-key--cec5a6d5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5462%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Wahoo%20Fitness%20SYSTM%20App&amp;severity=medium&amp;id=69cf701a0a160ebd92f9a4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5458-use-of-hard-coded-cryptographic-key--9ad81a24</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5458%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Noelse%20Individuals%20%26%20Pro%20App&amp;severity=medium&amp;id=69cf69120a160ebd92df90e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5457-use-of-hard-coded-cryptographic-key--4bb86ba2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5457%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PropertyGuru%20AgentNet%20Singapore%20App&amp;severity=medium&amp;id=69cf658d0a160ebd92dcb2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5456-use-of-hard-coded-cryptographic-key--a777f37c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5456%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Align%20Technology%20My%20Invisalign%20App&amp;severity=medium&amp;id=69cf5e850a160ebd92d5742c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5455-use-of-hard-coded-cryptographic-key--ff603c53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5455%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Dialogue%20App&amp;severity=medium&amp;id=69cf5e850a160ebd92d57426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5454-use-of-hard-coded-cryptographic-key--c7599b26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5454%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20GRID%20Organiser%20App&amp;severity=medium&amp;id=69cf4ec6e6bfc5ba1d76734c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5463-cwe-77-improper-neutralization-of-sp-6f7ed040</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5463%3A%20CWE-77%20Improper%20neutralization%20of%20special%20elements%20leading%20to%20command%20injection%20in%20Dan%20McInerney%20pymetasploit3&amp;severity=critical&amp;id=69cf4ec6e6bfc5ba1d767352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5453-use-of-hard-coded-cryptographic-key--eebd2c8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5453%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Rico%20s%C3%B3%20vantagem%20pra%20investir%20App&amp;severity=medium&amp;id=69cf4ec6e6bfc5ba1d767346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35545-cwe-669-incorrect-resource-transfer-4f9b63c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35545%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35544-cwe-669-incorrect-resource-transfer-3cfa2528</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35544%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35543-cwe-669-incorrect-resource-transfer-2e3eea55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35543%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35542-cwe-669-incorrect-resource-transfer-1ee1fdc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35542%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35541-cwe-843-access-of-resource-using-in-6cfb8571</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35541%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35540-cwe-669-incorrect-resource-transfer-d7e9fcf3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35540%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35539-cwe-79-improper-neutralization-of-i-c4f66e2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35539%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35538-cwe-88-improper-neutralization-of-a-9cd34ca9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35538%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Roundcube%20Webmail&amp;severity=low&amp;id=69cf56590a160ebd92cd3e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35537-cwe-502-deserialization-of-untruste-e3e5ffd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35537%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Roundcube%20Webmail&amp;severity=low&amp;id=69cf362ae6bfc5ba1d4c9706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5452-use-of-hard-coded-cryptographic-key--d5424d8d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5452%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20UCC%20CampusConnect%20App&amp;severity=medium&amp;id=69cf362ae6bfc5ba1d4c970f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35536-cwe-159-improper-handling-of-invali-02ebbe3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35536%3A%20CWE-159%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20tornadoweb%20Tornado&amp;severity=high&amp;id=69cf362ae6bfc5ba1d4c9702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35535-cwe-271-privilege-dropping-lowering-83309c2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35535%3A%20CWE-271%20Privilege%20Dropping%20%2F%20Lowering%20Errors%20in%20Sudo%20project%20Sudo&amp;severity=high&amp;id=69cf565a0a160ebd92cd3eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28815-a-remote-attacker-can-supply-a-shor-45198375</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28815%3A%20A%20remote%20attacker%20can%20supply%20a%20short%20X-Wing%20HPKE%20encapsulated%20key%20and%20trigger%20an%20out-of-bounds%20read%20in%20the%20C%20decapsulation%20path%2C%20potentially%20causing%20a%20crash%20or%20memory%20disclosure%20depending%20on%20runtime%20protections.%20in%20Apple%20macOS&amp;severity=high&amp;id=69cf565a0a160ebd92cd3eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35508-cwe-79-improper-neutralization-of-i-2b165f2c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20milesmcc%20Shynet&amp;severity=medium&amp;id=69cf1a09e6bfc5ba1d18739d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35507-cwe-348-use-of-less-trusted-source--3dfca42c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35507%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20milesmcc%20Shynet&amp;severity=medium&amp;id=69cf1a09e6bfc5ba1d187399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-the-supply-chain-how-sentinelones-ai-edr--ae921dbc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20the%20Supply%20Chain%3A%20How%20SentinelOne&apos;s%20AI%20EDR%20Stops%20the%20...&amp;severity=medium&amp;id=69cff22d0a160ebd92448702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-04-86c459c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-04&amp;severity=medium&amp;id=69d15c420a160ebd92fdc245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59710-na-3fafd6d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59710%3A%20n%2Fa&amp;severity=high&amp;id=69d0a7090a160ebd92cef529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59709-na-482aa39f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59709%3A%20n%2Fa&amp;severity=medium&amp;id=69d0a7090a160ebd92cef51f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-03-448d30f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-03&amp;severity=medium&amp;id=69d058190a160ebd9267d399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28373-na-09617547</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28373%3A%20n%2Fa&amp;severity=critical&amp;id=69cff2300a160ebd92448b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26477-na-a491f893</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26477%3A%20n%2Fa&amp;severity=high&amp;id=69cfdd290a160ebd923d52c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59711-na-4eeb3c1b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59711%3A%20n%2Fa&amp;severity=high&amp;id=69cfdd290a160ebd923d52c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-03-d6f01094</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-03&amp;severity=low&amp;id=69cf1d84e6bfc5ba1d1ded65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32211-cwe-306-missing-authentication-for--955487bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32211%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Azure%20Web%20Apps&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d07550c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32173-cwe-287-improper-authentication-in--faaed594</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32173%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Azure%20SRE%20Agent%20Gateway%20-%20SignalR%20Hub&amp;severity=high&amp;id=69cefde9e6bfc5ba1d075509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33105-cwe-285-improper-authorization-in-m-73a608f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33105%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Kubernetes%20Service&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26135-cwe-918-server-side-request-forgery-b7428a35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26135%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Custom%20Locations%20Resource%20Provider&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33107-cwe-918-server-side-request-forgery-97f03653</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33107%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Databricks&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32213-cwe-285-improper-authorization-in-m-b7cd2d00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32213%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20AI%20Foundry&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d07550f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14033-cwe-122-heap-based-buffer-overflow--5ba0f01c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14033%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Belden%20Hirschmann%20EagleSDV&amp;severity=high&amp;id=69ceed4ae6bfc5ba1d039aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/risks-emerging-when-developing-or-using-open-sourc-65bd61cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Risks%2C%20emerging%20when%20developing%20or%20using%20open-source%20software&amp;severity=medium&amp;id=69cef91ee6bfc5ba1d055051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15620-cwe-306-missing-authentication-for--3a8bc232</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15620%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Belden%20Hirschmann%20HiOS%20Switch%20Platform&amp;severity=critical&amp;id=69cef2c1e6bfc5ba1d03d79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35467-cwe-522-insufficiently-protected-cr-7c0849fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35467%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20CERT%2FCC%20cveClient%2Fencrypt-storage.js&amp;severity=high&amp;id=69cef558e6bfc5ba1d04a7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35466-cwe-79-improper-neutralization-of-i-561895ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CERT%2FCC%20cveClient%2FcveInterface.js&amp;severity=medium&amp;id=69cef472e6bfc5ba1d047ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14034-improper-authentication-cwe-287-in--177567d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14034%3A%20Improper%20Authentication%20(CWE-287)%20in%20Belden%20Hirschmann%20HiEOS%20LRS11&amp;severity=critical&amp;id=69cef608e6bfc5ba1d04c2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34838-cwe-502-deserialization-of-untruste-f6c31d56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34838%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69cec5aae6bfc5ba1dfbd82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34834-cwe-287-improper-authentication-in--289edfd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34834%3A%20CWE-287%3A%20Improper%20Authentication%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69cec5aae6bfc5ba1dfbd828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34833-cwe-312-cleartext-storage-of-sensit-b51ce693</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34833%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69cec5aae6bfc5ba1dfbd823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34832-cwe-639-authorization-bypass-throug-53bea463</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34832%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Erudika%20scoold&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35383-cwe-540-inclusion-of-sensitive-info-d7621abd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35383%3A%20CWE-540%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20Bentley%20Systems%20iTwin%20Platform&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34762-cwe-20-improper-input-validation-in-7e4100c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34762%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ellanetworks%20core&amp;severity=low&amp;id=69cec5aae6bfc5ba1dfbd81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34761-cwe-476-null-pointer-dereference-in-5e11ac55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34761%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5420-use-of-hard-coded-cryptographic-key--225a1021</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5420%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Shinrays%20Games%20Goods%20Triple%20App&amp;severity=low&amp;id=69cec5aae6bfc5ba1dfbd837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34760-cwe-20-improper-input-validation-in-9529c1a4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34760%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34745-cwe-22-improper-limitation-of-a-pat-3a68f043</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34745%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=critical&amp;id=69cec35ae6bfc5ba1dfb4cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5429-cwe-79-improper-neutralization-of-in-0dc227b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5429%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=69cec35ae6bfc5ba1dfb4ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34743-cwe-122-heap-based-buffer-overflow--7a101be3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34743%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20tukaani-project%20xz&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34742-cwe-1188-insecure-default-initializ-4e5c2196</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34742%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=69cec35ae6bfc5ba1dfb4cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5418-server-side-request-forgery-in-appsm-c094f40b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5418%3A%20Server-Side%20Request%20Forgery%20in%20appsmithorg%20appsmith&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6dea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34736-cwe-287-improper-authentication-in--80eaaffe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34736%3A%20CWE-287%3A%20Improper%20Authentication%20in%20openedx%20openedx-platform&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43236-an-attacker-may-be-able-to-cause-un-e92b7e14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43236%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb81ae6bfc5ba1df6de14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43257-an-app-may-be-able-to-break-out-of--e2aaec50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43257%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34735-cwe-434-unrestricted-upload-of-file-f5d45c4f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34735%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HytaleModding%20wiki&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40849-an-app-may-be-able-to-break-out-of--c169fbdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40849%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44303-a-malicious-application-may-be-able-5e1d5890</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44303%3A%20A%20malicious%20application%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43210-processing-a-maliciously-crafted-me-956bf5fc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43210%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb81ae6bfc5ba1df6de07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44250-an-app-may-be-able-to-execute-arbit-072a711f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44250%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40858-an-app-may-be-able-to-access-contac-99748021</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40858%3A%20An%20app%20may%20be%20able%20to%20access%20Contacts%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5417-server-side-request-forgery-in-datae-d5f83fe0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5417%3A%20Server-Side%20Request%20Forgery%20in%20Dataease%20SQLbot&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6dea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43264-processing-a-maliciously-crafted-im-3fa309fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43264%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44286-an-attacker-with-physical-access-ca-66c9dde5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44286%3A%20An%20attacker%20with%20physical%20access%20can%20input%20keyboard%20events%20to%20apps%20running%20on%20a%20locked%20device%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44219-a-malicious-application-with-root-p-e93f0a1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44219%3A%20A%20malicious%20application%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43202-processing-a-file-may-lead-to-memor-9e453001</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43202%3A%20Processing%20a%20file%20may%20lead%20to%20memory%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43238-an-app-may-be-able-to-cause-unexpec-cb9a7852</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43238%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34730-cwe-22-improper-limitation-of-a-pat-0c6f1997</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34730%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34726-cwe-22-improper-limitation-of-a-pat-facde2ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34726%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43219-processing-a-maliciously-crafted-im-6b401487</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43219%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34581-cwe-288-authentication-bypass-using-897021e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34581%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-in-claude-code-emerges-days-2c1b21d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20in%20Claude%20Code%20Emerges%20Days%20After%20Source%20Leak&amp;severity=critical&amp;id=69ceb091e6bfc5ba1df36caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5414-improper-control-of-resource-identif-fcd854c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5414%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Newgen%20OmniDocs&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34717-cwe-89-improper-neutralization-of-s-63776762</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34717%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69ceb0a7e6bfc5ba1df381ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34715-cwe-113-improper-neutralization-of--5927154c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34715%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20vshakitskiy%20ewe&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34610-cwe-681-incorrect-conversion-betwee-3f84b0e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34610%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20smuellerDD%20leancrypto&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34606-cwe-79-improper-neutralization-of-i-a9d7fe2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34606%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5413-information-disclosure-in-newgen-omn-d0dfc533</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5413%3A%20Information%20Disclosure%20in%20Newgen%20OmniDocs&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34593-cwe-400-uncontrolled-resource-consu-4a24c715</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34593%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ash-project%20ash&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34591-cwe-22-improper-limitation-of-a-pat-b3677cbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34591%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20python-poetry%20poetry&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34828-cwe-613-insufficient-session-expira-ea1d03d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34828%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20knadh%20listmonk&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34584-cwe-639-authorization-bypass-throug-6b5821ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34584%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20knadh%20listmonk&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df1809d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5370-cross-site-scripting-in-krayin-larav-5380aa7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5370%3A%20Cross%20Site%20Scripting%20in%20krayin%20laravel-crm&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df180b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34590-cwe-918-server-side-request-forgery-eeb7f30d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34590%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df180a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34577-cwe-918-server-side-request-forgery-909b76e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34577%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69cea98de6bfc5ba1defd63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blurred-lines-adtech-abuse-delivers-browser-hijack-17589a6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blurred%20Lines%3A%20AdTech%20Abuse%20Delivers%20Browser%20Hijackers%20Through%20the%20Microsoft%20Store&amp;severity=medium&amp;id=69cea988e6bfc5ba1defd25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34576-cwe-918-server-side-request-forgery-b2391ee3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34576%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34124-cwe-120-buffer-copy-without-checkin-3bdb564c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34124%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34122-cwe-121-stack-based-buffer-overflow-417d8ccf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34122%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34121-cwe-287-improper-authentication-in--70bb008f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34121%3A%20CWE-287%20Improper%20Authentication%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34120-cwe-122-heap-based-buffer-overflow--ac6e1997</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34120%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34119-cwe-122-heap-based-buffer-overflow--623c460c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34119%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34118-cwe-122-heap-based-buffer-overflow--89dd0897</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34118%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5368-sql-injection-in-projectworlds-car-r-e18e0ca8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5368%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=69cea98de6bfc5ba1defd647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35414-cwe-670-always-incorrect-control-fl-e4d4c1c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35414%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20OpenBSD%20OpenSSH&amp;severity=medium&amp;id=69cea98de6bfc5ba1defd642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33271-cwe-732-in-acronis-acronis-true-ima-83d3446e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33271%3A%20CWE-732%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27774-cwe-427-in-acronis-acronis-true-ima-f5d81d91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27774%3A%20CWE-427%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28728-cwe-427-in-acronis-acronis-true-ima-d8de14ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28728%3A%20CWE-427%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5360-type-confusion-in-free5gc-b6640c32</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5360%3A%20Type%20Confusion%20in%20Free5GC&amp;severity=medium&amp;id=69cea282e6bfc5ba1ded3a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35388-cwe-420-unprotected-alternate-chann-db477462</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35388%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35387-cwe-670-always-incorrect-control-fl-852141e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35387%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5355-os-command-injection-in-trendnet-tew-5919378b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5355%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69cea282e6bfc5ba1ded3a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35386-cwe-696-incorrect-behavior-order-in-646d5041</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35386%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35385-cwe-281-improper-preservation-of-pe-48960da7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35385%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenBSD%20OpenSSH&amp;severity=high&amp;id=69cea98de6bfc5ba1defd64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5354-os-command-injection-in-trendnet-tew-c979efcf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5354%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69cec35ae6bfc5ba1dfb4cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35038-cwe-20-improper-input-validation-in-8b5fa3f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35038%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20SignalK%20signalk-server&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-rolls-out-darksword-exploit-protection-to-mo-bc92c3b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Rolls%20Out%20DarkSword%20Exploit%20Protection%20to%20More%20Devices&amp;severity=medium&amp;id=69ce97f5e6bfc5ba1dea5515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5353-os-command-injection-in-trendnet-tew-9f4b903f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5353%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34083-cwe-346-origin-validation-error-in--ca18c573</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34083%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33951-cwe-284-improper-access-control-in--c9ec4f21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33951%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33950-cwe-285-improper-authorization-in-s-42d339ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33950%3A%20CWE-285%3A%20Improper%20Authorization%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=69ce9803e6bfc5ba1dea5ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5352-os-command-injection-in-trendnet-tew-dda530c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5352%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65114-cwe-444-inconsistent-interpretation-24bc4154</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65114%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=69ce9803e6bfc5ba1dea5ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58136-cwe-670-always-incorrect-control-fl-428e4957</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58136%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=69ce9803e6bfc5ba1dea5abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5351-os-command-injection-in-trendnet-tew-74359ae2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5351%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9471e6bfc5ba1de9346c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5350-stack-based-buffer-overflow-in-trend-f5ac4019</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5350%3A%20Stack-based%20Buffer%20Overflow%20in%20Trendnet%20TEW-657BRM&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-talos-qilin-edr-killer-infection-chain-0d9ac91a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Talos%3A%20Qilin%20EDR%20killer%20infection%20chain&amp;severity=medium&amp;id=69cea988e6bfc5ba1defd24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5349-stack-based-buffer-overflow-in-trend-1ea24dda</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5349%3A%20Stack-based%20Buffer%20Overflow%20in%20Trendnet%20TEW-657BRM&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33746-cwe-287-improper-authentication-in--78811956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33746%3A%20CWE-287%3A%20Improper%20Authentication%20in%20ConvoyPanel%20panel&amp;severity=critical&amp;id=69ce8d6ee6bfc5ba1de64e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33544-cwe-362-concurrent-execution-using--60e2872c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33544%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20steveiliop56%20tinyauth&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5346-server-side-request-forgery-in-huime-f002dac4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5346%3A%20Server-Side%20Request%20Forgery%20in%20huimeicloud%20hm_editor&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33641-cwe-78-improper-neutralization-of-s-214e76d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33641%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3360d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33533-cwe-942-permissive-cross-domain-pol-c2e5f1b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33533%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32871-cwe-918-server-side-request-forgery-0687fde2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32871%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PrefectHQ%20fastmcp&amp;severity=critical&amp;id=69ce866ce6bfc5ba1de335fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempts-to-exploit-exposed-vite-installs-cve-2025-827c1913</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempts%20to%20Exploit%20Exposed%20%22Vite%22%20Installs%20(CVE-2025-30208)%2C%20(Thu%2C%20Apr%202nd)&amp;severity=medium&amp;id=69ce82dde6bfc5ba1de1d284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34974-cwe-79-improper-neutralization-of-i-8de569da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de3384b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34973-cwe-943-improper-neutralization-of--0361ce91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34973%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34729-cwe-79-improper-neutralization-of-i-ff1a0323</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34729%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce866ce6bfc5ba1de33616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34823-cwe-79-improper-neutralization-of-i-852fe0d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34822-cwe-79-improper-neutralization-of-i-a1876c88</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34821-cwe-79-improper-neutralization-of-i-29b5152c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34821%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34820-cwe-79-improper-neutralization-of-i-bd60eac2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34819-cwe-79-improper-neutralization-of-i-8942aadd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34818-cwe-79-improper-neutralization-of-i-61c0ae4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34817-cwe-79-improper-neutralization-of-i-1a0bd2b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34816-cwe-79-improper-neutralization-of-i-bf596a93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34816%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34815-cwe-79-improper-neutralization-of-i-02ff92e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34814-cwe-79-improper-neutralization-of-i-8d8fa93e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34813-cwe-79-improper-neutralization-of-i-a451dc1f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34812-cwe-79-improper-neutralization-of-i-921e323c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34812%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34811-cwe-79-improper-neutralization-of-i-22dddd64</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34810-cwe-79-improper-neutralization-of-i-3fae305a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3377f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34809-cwe-79-improper-neutralization-of-i-c8f386bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3377b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34808-cwe-79-improper-neutralization-of-i-5f915904</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34807-cwe-79-improper-neutralization-of-i-424a2944</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34806-cwe-79-improper-neutralization-of-i-da867409</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3376f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34805-cwe-79-improper-neutralization-of-i-d35ef2fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3376b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34804-cwe-79-improper-neutralization-of-i-4100c6c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34803-cwe-79-improper-neutralization-of-i-c5a9c48d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34802-cwe-79-improper-neutralization-of-i-9839a241</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34801-cwe-79-improper-neutralization-of-i-ef5dac74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34800-cwe-79-improper-neutralization-of-i-483fe746</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34799-cwe-79-improper-neutralization-of-i-efa3f37c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34798-cwe-79-improper-neutralization-of-i-cc36ce0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34798%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34797-improper-neutralization-of-special--ffdcbce6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34797%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34796-improper-neutralization-of-special--79152788</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34796%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34795-improper-neutralization-of-special--f96f1d2e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34795%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34794-improper-neutralization-of-special--d12f875a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34794%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34793-improper-neutralization-of-special--725bdc11</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34793%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34792-improper-neutralization-of-special--ef0a7278</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34792%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34791-improper-neutralization-of-special--46bc51d8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34791%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3361e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34790-cwe-22-improper-limitation-of-a-pat-061f357f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34790%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3361a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5344-path-traversal-in-textpattern-f83f8ea6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5344%3A%20Path%20Traversal%20in%20Textpattern&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de3384f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34728-cwe-22-improper-limitation-of-a-pat-020b73b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34728%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32629-cwe-20-improper-input-validation-in-98592881</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32629%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce866ce6bfc5ba1de335f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31937-cwe-407-inefficient-algorithmic-com-baa4c414</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31937%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31935-cwe-400-uncontrolled-resource-consu-a13b1298</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31935%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5342-out-of-bounds-read-in-libraw-6fbc52cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5342%3A%20Out-of-Bounds%20Read%20in%20LibRaw&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31934-cwe-407-inefficient-algorithmic-com-b2d2eef9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31934%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5339-command-injection-in-tenda-g103-5eb39526</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5339%3A%20Command%20Injection%20in%20Tenda%20G103&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31933-cwe-407-inefficient-algorithmic-com-ddce571b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31933%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31932-cwe-407-inefficient-algorithmic-com-f6b065e8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31932%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26928-cwe-354-improper-validation-of-inte-78673667</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26928%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Krajowa%20Izba%20Rozliczeniowa%20SzafirHost&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26927-cwe-348-use-of-less-trusted-source--37ed82cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26927%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20Krajowa%20Izba%20Rozliczeniowa%20Szafir%20SDK%20Web&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31931-cwe-476-null-pointer-dereference-in-9e69cdc4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31931%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5338-command-injection-in-tenda-g103-b6ed48f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5338%3A%20Command%20Injection%20in%20Tenda%20G103&amp;severity=medium&amp;id=69ce7bdce6bfc5ba1ddfe78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30867-cwe-617-reachable-assertion-in-emqx-785033b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30867%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20emqx%20CocoaMQTT&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35168-cwe-89-improper-neutralization-of-s-d5a2d66d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35168%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5334-sql-injection-in-itsourcecode-online-d20cf182</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5334%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28805-cwe-89-improper-neutralization-of-s-ce15ee60</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28805%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29782-cwe-502-deserialization-of-untruste-274e1222</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29782%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5333-command-injection-in-defaultfuction--b5a483d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5333%3A%20Command%20Injection%20in%20DefaultFuction%20Content-Management-System&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2737-cwe-79-improper-neutralization-of-in-4a30897e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3692-cwe-78-improper-neutralization-of-sp-3f6ac794</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3692%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5332-cross-site-scripting-in-xiaopi-panel-53e8a11b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5332%3A%20Cross%20Site%20Scripting%20in%20Xiaopi%20Panel&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2701-cwe-434-unrestricted-upload-of-file--41b41e42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2701%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Progress%20ShareFile%20Storage%20Zones%20Controller&amp;severity=critical&amp;id=69ce74d2e6bfc5ba1ddd16b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2699-cwe-698-execution-after-redirect-ear-4b64a3dc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2699%3A%20CWE-698%3A%20Execution%20After%20Redirect%20(EAR)%20in%20Progress%20ShareFile%20Storage%20Zones%20Controller&amp;severity=critical&amp;id=69ce74d2e6bfc5ba1ddd16b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5331-path-traversal-in-opencart-5c3ce989</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5331%3A%20Path%20Traversal%20in%20OpenCart&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34890-cwe-79-improper-neutralization-of-i-c66c3461</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20O%E2%80%99Donnell%20MSTW%20League%20Manager&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5330-improper-access-controls-in-sourceco-8bbff6ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5330%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Best%20Courier%20Management%20System&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4636-incorrect-behavior-order-authorizati-0cc8b635</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4636%3A%20Incorrect%20Behavior%20Order%3A%20Authorization%20Before%20Parsing%20and%20Canonicalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4634-excessive-platform-resource-consumpt-e63a2b27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4634%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4325-improper-isolation-or-compartmentali-bba41b6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4325%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4282-improper-isolation-or-compartmentali-80ba9520</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4282%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3872-url-redirection-to-untrusted-site-op-f57a586d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3872%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-and-high-severity-vulnerabi-87970731</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20and%20High-Severity%20Vulnerabilities&amp;severity=critical&amp;id=69ce6339e6bfc5ba1dd727e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5328-sql-injection-in-shsuishang-modulith-d2e7674c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5328%3A%20SQL%20Injection%20in%20shsuishang%20modulithshop&amp;severity=medium&amp;id=69ce634be6bfc5ba1dd72c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/250000-affected-by-data-breach-at-nacogdoches-memo-e5c6e74a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=250%2C000%20Affected%20by%20Data%20Breach%20at%20Nacogdoches%20Memorial%20Hospital&amp;severity=medium&amp;id=69ce5c31e6bfc5ba1dd4377d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5327-command-injection-in-efforthye-fast--2095b670</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5327%3A%20Command%20Injection%20in%20efforthye%20fast-filesystem-mcp&amp;severity=medium&amp;id=69ce5c3fe6bfc5ba1dd43aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5326-authorization-bypass-in-sourcecodest-1e83e563</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5326%3A%20Authorization%20Bypass%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69ce4e22e6bfc5ba1dced15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mercor-hit-by-litellm-supply-chain-attack-7b85edb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mercor%20Hit%20by%20LiteLLM%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69ce4a9ee6bfc5ba1dcd4fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32145-cwe-770-allocation-of-resources-wit-10bb908a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32145%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20gleam-wisp%20wisp&amp;severity=high&amp;id=69ce471be6bfc5ba1dcbccc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-crystalx-rat-emerges-1eb51c44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20CrystalX%20RAT%20Emerges&amp;severity=medium&amp;id=69ce3c8de6bfc5ba1dc7d5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5246-authorization-bypass-in-cesanta-mong-ae6eeaf9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5246%3A%20Authorization%20Bypass%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce3c9ae6bfc5ba1dc7d953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5245-stack-based-buffer-overflow-in-cesan-37061058</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5245%3A%20Stack-based%20Buffer%20Overflow%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33617-cwe-497-exposure-of-sensitive-syste-9798356f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33617%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33616-cwe-89-improper-neutralization-of-s-b558174c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33616%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33615-cwe-89-improper-neutralization-of-s-cc89f560</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33615%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=critical&amp;id=69ce82f2e6bfc5ba1de1d972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33614-cwe-89-improper-neutralization-of-s-efad6d82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33614%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33613-cwe-78-improper-neutralization-of-s-0a03d240</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33613%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce7bdce6bfc5ba1ddfe79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29136-cwe-79-improper-neutralization-of-i-7ca90c9a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29136%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-Site%20Scripting&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29139-cwe-288-authentication-bypass-using-94a56236</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29139%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29144-cwe-20-improper-input-validation-in-ad573e10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29144%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29143-cwe-20-improper-input-validation-in-1fea5cad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29143%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0634-cwe-88-improper-neutralization-of-ar-70949bd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0634%3A%20CWE-88%20Improper%20neutralization%20of%20argument%20delimiters%20in%20a%20command%20(&apos;argument%20injection&apos;)%20in%20TECNO%20Mobile%20TECNO%20Pova7%20Pro%205G&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc4189f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29138-cwe-90-improper-neutralization-of-s-69352f09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29138%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29131-cwe-90-improper-neutralization-of-s-69785704</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29131%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29142-cwe-325-missing-cryptographic-step--10414bc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29142%3A%20CWE-325%20Missing%20Cryptographic%20Step%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29137-cwe-20-improper-input-validation-in-7d8ef09b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29137%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29141-cwe-20-improper-input-validation-in-35e12996</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29141%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29135-cwe-20-improper-input-validation-in-531384d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29135%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29134-cwe-807-reliance-on-untrusted-input-0711a551</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29134%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29140-cwe-295-improper-certificate-valida-1bda9135</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29140%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce2afae6bfc5ba1dc065e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29133-cwe-20-improper-input-validation-in-6d190327</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29133%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29132-cwe-306-missing-authentication-for--afdaff4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29132%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5244-heap-based-buffer-overflow-in-cesant-a31023f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5244%3A%20Heap-based%20Buffer%20Overflow%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5032-cwe-200-exposure-of-sensitive-inform-e8a1194d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5032%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20boldgrid%20W3%20Total%20Cache&amp;severity=high&amp;id=69ce206de6bfc5ba1dba1550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0686-cwe-918-server-side-request-forgery--ae91b1ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0686%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pfefferle%20Webmention&amp;severity=high&amp;id=69ce206de6bfc5ba1dba1543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0688-cwe-918-server-side-request-forgery--d72e0c85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0688%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pfefferle%20Webmention&amp;severity=medium&amp;id=69ce206de6bfc5ba1dba154a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5325-cross-site-scripting-in-sourcecodest-0e3910bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5325%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20Customer%20Relationship%20Management%20System&amp;severity=medium&amp;id=69ce1964e6bfc5ba1db608a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5323-server-side-request-forgery-in-priya-eb225e7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5323%3A%20Server-Side%20Request%20Forgery%20in%20priyankark%20a11y-mcp&amp;severity=medium&amp;id=69ce125de6bfc5ba1db26106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1540-cwe-94-improper-control-of-generatio-c59967f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1540%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Spam%20Protect%20for%20Contact%20Form%207&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5322-sql-injection-in-alejandroarciniegas-379e6975</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5322%3A%20SQL%20Injection%20in%20AlejandroArciniegas%20mcp-data-vis&amp;severity=medium&amp;id=69ce044ee6bfc5ba1dac2508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4347-cwe-22-improper-limitation-of-a-path-17e5576b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4347%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20MW%20WP%20Form&amp;severity=high&amp;id=69ce044ee6bfc5ba1dac2503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5321-permissive-cross-domain-policy-with--484deffd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5321%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69cdf9c0e6bfc5ba1d93594a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5320-missing-authentication-in-vanna-ai-v-27b068c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5320%3A%20Missing%20Authentication%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69cdef39e6bfc5ba1d8a4eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5319-cross-site-scripting-in-itsourcecode-b7657577</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5319%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cde4a8e6bfc5ba1d70ae32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5318-out-of-bounds-write-in-libraw-d90882c4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5318%3A%20Out-of-bounds%20Write%20in%20LibRaw&amp;severity=medium&amp;id=69cdd316e6bfc5ba1d496d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5317-out-of-bounds-write-in-nothings-stb-3bd2dfb1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5317%3A%20Out-of-bounds%20Write%20in%20Nothings%20stb&amp;severity=medium&amp;id=69ce74d5e6bfc5ba1ddd1777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1243-vulnerability-in-ibm-content-navigat-a8af920e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1243%3A%20Vulnerability%20in%20IBM%20Content%20Navigator&amp;severity=medium&amp;id=69ce7bdce6bfc5ba1ddfe79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5316-allocation-of-resources-in-nothings--e599e034</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5316%3A%20Allocation%20of%20Resources%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cdb370e6bfc5ba1d0f636a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-03-8dc929ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-03&amp;severity=medium&amp;id=69d03bf90a160ebd92602460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-02-5aedb171</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-02&amp;severity=medium&amp;id=69cfc4810a160ebd9223393f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-02-f161eb17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-02&amp;severity=medium&amp;id=69cf04e8e6bfc5ba1d090aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30252-na-03589a2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30252%3A%20n%2Fa&amp;severity=medium&amp;id=69cef3d9e6bfc5ba1d047235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30251-na-e36bdc8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30251%3A%20n%2Fa&amp;severity=medium&amp;id=69cef356e6bfc5ba1d045060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26895-na-47bf4a92</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26895%3A%20n%2Fa&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30603-na-ae538424</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30603%3A%20n%2Fa&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34877-na-4fa5c075</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34877%3A%20n%2Fa&amp;severity=critical&amp;id=69cea282e6bfc5ba1ded3a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25212-na-87cac814</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25212%3A%20n%2Fa&amp;severity=critical&amp;id=69ce9803e6bfc5ba1dea5ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30332-na-a0fa4c0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30332%3A%20n%2Fa&amp;severity=high&amp;id=69ce9471e6bfc5ba1de93467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34876-na-d655599d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34876%3A%20n%2Fa&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21767-cwe-306-missing-authentication-for--f30553f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21767%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20HCLSoftware%20BigFix%20Platform&amp;severity=medium&amp;id=69cdb370e6bfc5ba1d0f6370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21765-cwe-732-incorrect-permission-assign-d20224ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21765%3A%20CWE-732%20%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20HCLSoftware%20BigFix%20Platform&amp;severity=high&amp;id=69cdafeee6bfc5ba1d0e2130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5315-out-of-bounds-read-in-nothings-stb-e375c1ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5315%3A%20Out-of-Bounds%20Read%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cdac8de6bfc5ba1d0c8246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66487-cwe-770-allocation-of-resources-wit-66913c96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66487%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Aspera%20Shares&amp;severity=low&amp;id=69cda8e6e6bfc5ba1d0b5794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66486-cwe-80-improper-neutralization-of-s-dec075eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66486%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b5791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66485-cwe-644-improper-neutralization-of--f6e8158d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66485%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b578e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32929-out-of-bounds-read-in-fuji-electric-599bf79b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32929%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b57a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32928-stack-based-buffer-overflow-in-fuji-f84a5b5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32928%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b57a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66484-vulnerability-in-ibm-aspera-shares-ad9e1822</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66484%3A%20Vulnerability%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b578b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32927-out-of-bounds-read-in-fuji-electric-a25c3241</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32927%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b579f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32926-out-of-bounds-read-in-fuji-electric-9a1a91dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32926%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b579b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32925-stack-based-buffer-overflow-in-fuji-6dac82d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32925%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b5797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66483-cwe-613-insufficient-session-expira-ee16a507</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66483%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b5788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36375-cwe-352-cross-site-request-forgery--28f4e6e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36375%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20DataPower%20Gateway%2010.6CD&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5314-out-of-bounds-read-in-nothings-stb-bdde5681</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5314%3A%20Out-of-Bounds%20Read%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cd9ad5e6bfc5ba1d063678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34572-cwe-284-improper-access-control-in--63f77787</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34572%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69cd93efe6bfc5ba1d0036ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3987-cwe-22-improper-limitation-of-a-path-318a1a63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3987%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69cd93efe6bfc5ba1d0036f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34571-cwe-79-improper-neutralization-of-i-055c896a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34571%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93efe6bfc5ba1d0036ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34570-cwe-284-improper-access-control-in--917f2c32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34570%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69cd93ece6bfc5ba1d00363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5313-denial-of-service-in-nothings-stb-3f5b6ef3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5313%3A%20Denial%20of%20Service%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cd93efe6bfc5ba1d0036f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34569-cwe-79-improper-neutralization-of-i-ebe55431</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34569%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34568-cwe-79-improper-neutralization-of-i-ae5d4369</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34567-cwe-79-improper-neutralization-of-i-5c12fe3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34567%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00362e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34566-cwe-79-improper-neutralization-of-i-937ed996</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34566%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00362a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34565-cwe-79-improper-neutralization-of-i-f662be7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34565%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34564-cwe-79-improper-neutralization-of-i-8f6e6ad8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34564%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34563-cwe-79-improper-neutralization-of-i-e0cd90ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00361d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34562-cwe-79-improper-neutralization-of-i-b2a73cac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34562%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cd93ece6bfc5ba1d003619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34561-cwe-79-improper-neutralization-of-i-b2df19ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34561%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cd93ece6bfc5ba1d003615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34560-cwe-79-improper-neutralization-of-i-f9f46ebc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34560%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69ce7bdce6bfc5ba1ddfe7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34559-cwe-79-improper-neutralization-of-i-7054532f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34559%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cec35ae6bfc5ba1dfb4d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2475-cwe-601-url-redirection-to-untrusted-81d4cc07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2475%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=low&amp;id=69cd8944e6bfc5ba1dfc32df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34543-cwe-908-use-of-uninitialized-resour-86e5cef9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34543%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34544-cwe-190-integer-overflow-or-wraparo-efaa8782</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34544%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4820-cwe-614-sensitive-cookie-in-https-se-fb43e146</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4820%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Maximo%20Application%20Suite&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34545-cwe-122-heap-based-buffer-overflow--18796f81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34545%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36373-cwe-497-exposure-of-sensitive-syste-8d6a2629</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36373%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataPower%20Gateway%2010.6CD&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13916-cwe-327-use-of-a-broken-or-risky-cr-094ead12</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13916%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1491-cwe-444-inconsistent-interpretation--f859d77e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1491%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34531-cwe-287-improper-authentication-in--374da8b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34531%3A%20CWE-287%3A%20Improper%20Authentication%20in%20miguelgrinberg%20Flask-HTTPAuth&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2862-cwe-444-inconsistent-interpretation--f24cc938</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2862%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1345-cwe-78-improper-neutralization-of-sp-ed530469</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1345%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69cd85bee6bfc5ba1df9d438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4101-cwe-287-improper-authentication-in-i-7c1be3e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4101%3A%20CWE-287%20Improper%20Authentication%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69cd85bee6bfc5ba1df9d44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4364-cwe-79-improper-neutralization-of-in-1bd7f249</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5312-improper-access-controls-in-d-link-d-cb27ea75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5312%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34525-cwe-20-improper-input-validation-in-e9b20bba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34525%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34520-cwe-113-improper-neutralization-of--111721c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34520%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cd85bee6bfc5ba1df9d440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34519-cwe-113-improper-neutralization-of--70b3077a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34519%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cd85bee6bfc5ba1df9d43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34518-cwe-200-exposure-of-sensitive-infor-10190518</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34518%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69ce7bdce6bfc5ba1ddfe7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34517-cwe-770-allocation-of-resources-wit-505e0ade</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34517%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34516-cwe-770-allocation-of-resources-wit-8668224c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34516%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34515-cwe-36-absolute-path-traversal-in-a-c7316820</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34515%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69ce9471e6bfc5ba1de93472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34514-cwe-113-improper-neutralization-of--4f1fe682</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34514%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69ce7bdce6bfc5ba1ddfe7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-script-that-gets-rid-of-ads-wed-apr-1st-503f23d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Script%20That%20Gets%20Rid%20of%20ADS%2C%20(Wed%2C%20Apr%201st)&amp;severity=medium&amp;id=69ccf91de6bfc5ba1dc22852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22815-cwe-400-uncontrolled-resource-consu-c8acea99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22815%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34513-cwe-770-allocation-of-resources-wit-a8a2860e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34513%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34456-cwe-284-improper-access-control-in--99ed6793</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34456%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20reviactyl%20panel&amp;severity=critical&amp;id=69cd7b33e6bfc5ba1df4980f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34455-cwe-89-improper-neutralization-of-s-b655e030</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34455%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HiEventsDev%20Hi.Events&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34750-cwe-22-improper-limitation-of-a-pat-b466bdec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34750%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df49823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34749-cwe-352-cross-site-request-forgery--8eac2e30</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34749%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df4981f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34748-cwe-79-improper-neutralization-of-i-edb944a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34748%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df4981c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34747-cwe-89-improper-neutralization-of-s-6146081e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34747%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5311-improper-access-controls-in-d-link-d-528d6a16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5311%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df49826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34746-cwe-918-server-side-request-forgery-27aa2220</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34746%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stranger-strings-yurei-ransomware-operator-toolkit-b88717bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stranger%20Strings%3A%20Yurei%20Ransomware%20Operator%20Toolkit%20Exposed&amp;severity=medium&amp;id=69cd7428e6bfc5ba1def5b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35000-cwe-184-incomplete-list-of-disallow-5d5e7007</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35000%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20dgtlmoon%20ChangeDetection.io&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9caef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5199-cwe-639-authorization-bypass-through-f024480b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5199%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Temporal%20Technologies%2C%20Inc.%20temporal&amp;severity=low&amp;id=69cd5f13e6bfc5ba1de6e545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34751-cwe-472-external-control-of-assumed-7a45aec3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34751%3A%20CWE-472%3A%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20payloadcms%20payload&amp;severity=critical&amp;id=69cd5f13e6bfc5ba1de6e53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34397-cwe-269-improper-privilege-manageme-ac0f8ecc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34397%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20himmelblau-idm%20himmelblau&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34376-cwe-863-incorrect-authorization-in--58a5425c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34376%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mrmn2%20PdfDing&amp;severity=high&amp;id=69cd5809e6bfc5ba1de493d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34236-cwe-331-insufficient-entropy-in-aut-5b5ef4db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34236%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20auth0%20auth0-PHP&amp;severity=high&amp;id=69cd5809e6bfc5ba1de493cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34159-cwe-119-improper-restriction-of-ope-71d608e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34159%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ggml-org%20llama.cpp&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34076-cwe-918-server-side-request-forgery-66475961</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34076%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20clerk%20javascript&amp;severity=high&amp;id=69cd6623e6bfc5ba1de9cbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34072-cwe-287-improper-authentication-in--c977ac52</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34072%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fccview%20cronmaster&amp;severity=high&amp;id=69cd5f16e6bfc5ba1de6e60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20090-improper-neutralization-of-input-du-c35f3078</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20089-improper-neutralization-of-input-du-ca0d51f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20089%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20087-improper-neutralization-of-input-du-35f27bdb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20087%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20088-improper-neutralization-of-input-du-02bcc2a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5310-use-of-hard-coded-cryptographic-key--f3646b0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5310%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=low&amp;id=69cd5f16e6bfc5ba1de6e60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20160-exposure-of-resource-to-wrong-spher-3290e5d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20160%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Cisco%20Cisco%20Smart%20Software%20Manager%20On-Prem&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20174-improper-limitation-of-a-pathname-t-f29065ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20174%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20151-insertion-of-sensitive-information--d4761117</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20151%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Cisco%20Cisco%20Smart%20Software%20Manager%20On-Prem&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20155-missing-authorization-in-cisco-cisc-f689f549</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20155%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20096-improper-neutralization-of-special--255348b1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20096%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20097-out-of-bounds-write-in-cisco-cisco--549f74cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20097%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Standalone)&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20094-improper-neutralization-of-special--15156e9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20094%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Standalone)&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20095-improper-neutralization-of-special--1a61b766</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20095%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9cb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20093-improper-input-validation-in-cisco--4922ce7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20093%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=critical&amp;id=69cd661ee6bfc5ba1de9cafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20085-improper-neutralization-of-input-du-1da11352</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9cafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20041-server-side-request-forgery-ssrf-in-eabba642</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20041%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9caf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20042-improper-certificate-validation-in--1a05cd72</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20042%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9caf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33990-cwe-918-server-side-request-forgery-02c9c2d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33990%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20docker%20model-runner&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33978-cwe-79-improper-neutralization-of-i-39c40437</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33978%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20notesnook&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35099-cwe-362-concurrent-execution-using--a2f5c300</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35099%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Lakeside%20Software%20SysTrack%20Agent&amp;severity=high&amp;id=69cd69c0e6bfc5ba1deb926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toy-giant-hasbro-hit-by-cyberattack-6970d5a3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Toy%20Giant%20Hasbro%20Hit%20by%20Cyberattack&amp;severity=medium&amp;id=69cd3be9e6bfc5ba1ddce51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4989-cwe-918-server-side-request-forgery--2822c454</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4989%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crystalx-rat-a-trojan-for-pranks-remote-access-and-e7339edb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrystalX%20RAT%3A%20a%20Trojan%20for%20pranks%2C%20remote%20access%2C%20and%20cryptocurrency%20theft%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cd34fae6bfc5ba1dda8bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-deepload-malware-dropped-in-clickfix-attacks-bb581dea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DeepLoad%20Malware%20Dropped%20in%20ClickFix%20Attacks&amp;severity=medium&amp;id=69cd34e1e6bfc5ba1dda7e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5175-cwe-862-in-devolutions-server-45e43dc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5175%3A%20CWE-862%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4925-cwe-862-in-devolutions-server-8fd83451</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4925%3A%20CWE-862%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4927-cwe-201-insertion-of-sensitive-infor-7cf72305</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4927%3A%20CWE-201%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4924-cwe-1390-in-devolutions-server-d7d2eda8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4924%3A%20CWE-1390%20in%20Devolutions%20Server&amp;severity=high&amp;id=69cd3867e6bfc5ba1ddc2e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4828-cwe-1390-in-devolutions-server-596962b9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4828%3A%20CWE-1390%20in%20Devolutions%20Server&amp;severity=high&amp;id=69cd3867e6bfc5ba1ddc2e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4829-cwe-287-in-devolutions-server-b2e61b41</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4829%3A%20CWE-287%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13535-cwe-79-improper-neutralization-of-i-e707a4a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13535%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%2080%2B%20Elementor%20Widgets%2C%204%20000%2B%20Elementor%20Templates%2C%20WooCommerce%2C%20Mega%20Menu%2C%20Popup%20Builder&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-zero-day-among-21-vulnerabilities-patche-54fdc91f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20Zero-Day%20Among%2021%20Vulnerabilities%20Patched%20in%20Chrome&amp;severity=medium&amp;id=69cd2dd9e6bfc5ba1dd7270c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-data-security-risks-from-china-made-m-6fc1b458</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Data%20Security%20Risks%20From%20China-Made%20Mobile%20Apps&amp;severity=medium&amp;id=69cd26d2e6bfc5ba1dd450e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35094-expired-pointer-dereference-in-red--f22d2f86</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35094%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69cd26f5e6bfc5ba1dd45f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35093-improper-control-of-generation-of-c-7b21388e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35093%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5271-vulnerability-in-python-software-fou-bed2426b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5271%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20pymanager&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34430-cwe-184-incomplete-list-of-disallow-3e65c84f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34430%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Bytedance%20Inc.%20DeerFlow&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34999-cwe-306-missing-authentication-for--59ead885</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34999%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Volcengine%20OpenViking&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-uranium-crypto-exchange-hacker-59d7b087</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Charges%20Uranium%20Crypto%20Exchange%20Hacker&amp;severity=medium&amp;id=69cd1fc9e6bfc5ba1dd1955e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-nexus-threat-actor-compromises-widely--67b5ee00</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Nexus%20Threat%20Actor%20Compromises%20Widely%20Used%20Axios%20NPM%20Package%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69cd70a4e6bfc5ba1ded84d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpacking-augmented-marauders-multi-pronged-casban-0e495343</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpacking%20Augmented%20Marauder%E2%80%99s%20Multi-Pronged%20Casbaneiro%20Campaigns&amp;severity=medium&amp;id=69cd3864e6bfc5ba1ddc2cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-axios-supply-chain-compromise-one-rat-t-38259c89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Axios%20supply%20chain%20compromise%20-%20one%20RAT%20to%20rule%20them%20all&amp;severity=medium&amp;id=69cd70a4e6bfc5ba1ded84c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35092-integer-overflow-or-wraparound-in-r-1580859a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35092%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35091-incorrect-check-of-function-return--9c3dab2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35091%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/latest-xloader-obfuscation-methods-and-network-pro-08dbc5b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Latest%20Xloader%20Obfuscation%20Methods%20and%20Network%20Protocol&amp;severity=medium&amp;id=69cd7428e6bfc5ba1def5b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-inbox-to-intrusion-multistage-remcos-rat-and--59cdc1b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Inbox%20to%20Intrusion%3A%20Multi%E2%80%91Stage%20Remcos%20RAT%20and%20C2%E2%80%91Delivered%20Payloads%20in%20Network&amp;severity=medium&amp;id=69cd3864e6bfc5ba1ddc2ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-front-end-library-npm-supply-chain-poisoning-9eef9940</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20Front-End%20Library%20npm%20Supply%20Chain%20Poisoning%20Alert&amp;severity=medium&amp;id=69cd34f2e6bfc5ba1dda89f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3877-cwe-79-improper-neutralization-of-in-2906697a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20VertiGIS%20VertiGIS%20FM&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0522-cwe-610-externally-controlled-refere-a44134fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0522%3A%20CWE-610%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20VertiGIS%20VertiGIS%20FM&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-005-first-con-187893ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20005%20-%20First%20Confirmed%20Victim%20Disclosure%2C%20Post-Compromise%20Cloud%20Enumeration%20Documented%2C%20and%20Axios%20Attribution%20Narrows%2C%20(Wed%2C%20Apr%201st)&amp;severity=medium&amp;id=69cd1c4fe6bfc5ba1dcfe81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22768-cwe-732-incorrect-permission-assign-6516d813</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22768%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20AppSync&amp;severity=high&amp;id=69cd11c0e6bfc5ba1dcba0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22767-cwe-61-unix-symbolic-link-symlink-f-7f0a5250</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22767%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Dell%20AppSync&amp;severity=high&amp;id=69cd11c0e6bfc5ba1dcba0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25601-cwe-798-use-of-hard-coded-credentia-f6a1fb4a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25601%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Metronik%20d.o.o.%20MEPIS%20RM&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24096-cwe-280-improper-handling-of-insuff-7723b1ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24096%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69ccf599e6bfc5ba1dc10444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0932-cwe-918-server-side-request-forgery--a1ba07b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0932%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=69ccf599e6bfc5ba1dc10440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1879-unrestricted-upload-in-harvard-unive-0364b373</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1879%3A%20Unrestricted%20Upload%20in%20Harvard%20University%20IQSS%20Dataverse&amp;severity=medium&amp;id=69ccee90e6bfc5ba1dbeb780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53828-cwe-228-in-ericsson-packet-core-con-8d45fc72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53828%3A%20CWE-228%20in%20Ericsson%20Packet%20Core%20Controller%20(PCC)&amp;severity=medium&amp;id=69ccee90e6bfc5ba1dbeb77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21630-cwe-89-improper-neutralization-of-s-f9ffd8d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21630%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc6714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23898-cwe-73-destructive-file-deletion-an-4b16a48a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23898%3A%20CWE-73%20Destructive%20File%20Deletion%20and%20Potential%20System%20Compromise%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=high&amp;id=69cce78be6bfc5ba1dbc671d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21629-cwe-284-improper-access-control-in--ffadd50c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21629%3A%20CWE-284%20Improper%20Access%20Control%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc670f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23899-cwe-284-improper-access-control-in--4257ef69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23899%3A%20CWE-284%20Improper%20Access%20Control%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=high&amp;id=69cce78be6bfc5ba1dbc6720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21631-cwe-79-improper-neutralization-of-i-92d153db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc6717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21632-cwe-79-improper-neutralization-of-i-cb31d573</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc671a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34889-cwe-79-improper-neutralization-of-i-fc72ebe4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69cce0a2e6bfc5ba1db4f246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-npm-package-breached-in-north-korean-supply--46479264</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20NPM%20Package%20Breached%20in%20North%20Korean%20Supply%20Chain%20Attack&amp;severity=low&amp;id=69ccdcfde6bfc5ba1daf8eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5261-unrestricted-upload-in-shandong-hote-e305c3a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5261%3A%20Unrestricted%20Upload%20in%20Shandong%20Hoteam%20InforCenter%20PLM&amp;severity=medium&amp;id=69ccd979e6bfc5ba1dae0250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4370-cwe-295-improper-certificate-validat-9bb2b3b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4370%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Canonical%20Juju&amp;severity=critical&amp;id=69ccd979e6bfc5ba1dae024d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-addresses-vertex-security-issues-after-rese-8ede5828</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Addresses%20Vertex%20Security%20Issues%20After%20Researchers%20Weaponize%20AI%20Agents&amp;severity=medium&amp;id=69ccceede6bfc5ba1da7e8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28265-cwe-35-path-traversal-in-dell-power-95e5b4b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28265%3A%20CWE-35%3A%20Path%20Traversal%20in%20Dell%20PowerStore&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa6537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5259-server-side-request-forgery-in-autoh-263f25bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5259%3A%20Server-Side%20Request%20Forgery%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa653a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27101-cwe-22-improper-limitation-of-a-pat-91a08efa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27101%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20Path%20Traversal%20in%20Dell%20Secure%20Connect%20Gateway&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa6534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5258-path-traversal-in-sanster-iopaint-674463db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5258%3A%20Path%20Traversal%20in%20Sanster%20IOPaint&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-laughing-rat-crystalx-combines-spyware-stealer-a-5579cd12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20laughing%20RAT%3A%20CrystalX%20combines%20spyware%3B%20stealer%3B%20and%20prankware%20features&amp;severity=medium&amp;id=69ccf214e6bfc5ba1dbff3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5257-sql-injection-in-code-projects-simpl-d962b8c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5257%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5256-sql-injection-in-code-projects-simpl-cd4b413e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5256%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2696-cwe-200-information-exposure-in-expo-c6c7420f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2696%3A%20CWE-200%20Information%20Exposure%20in%20Export%20All%20URLs&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15484-cwe-287-improper-authentication-in--ce94ec07</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15484%3A%20CWE-287%20Improper%20Authentication%20in%20Order%20Notification%20for%20WooCommerce&amp;severity=critical&amp;id=69ccb9d5e6bfc5ba1da0d484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5255-cross-site-scripting-in-code-project-b81dbea2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5255%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccaf49e6bfc5ba1d9c9961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5292-out-of-bounds-read-in-google-chrome-b15ff9cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5292%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c4e6bfc5ba1d993171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5291-inappropriate-implementation-in-goog-a4be30b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5291%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c4e6bfc5ba1d99316d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5290-use-after-free-in-google-chrome-83e792f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5290%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5289-use-after-free-in-google-chrome-b3278917</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5289%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5288-use-after-free-in-google-chrome-8b1fddc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5288%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5287-use-after-free-in-google-chrome-0142d8c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5287%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5273-use-after-free-in-google-chrome-9e1d72d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5273%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d993049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5286-use-after-free-in-google-chrome-34aabe80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5286%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5285-use-after-free-in-google-chrome-1cf97b5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5285%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5284-use-after-free-in-google-chrome-08b3d1bf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5284%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5283-inappropriate-implementation-in-goog-8cbcc8fc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5283%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c2e6bfc5ba1d9930e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5272-heap-buffer-overflow-in-google-chrom-fc402e90</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5272%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5282-out-of-bounds-read-in-google-chrome-c48d1b96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5282%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5281-use-after-free-in-google-chrome-a3c95c50</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5281%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5280-use-after-free-in-google-chrome-f1defb35</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5280%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5279-object-corruption-in-google-chrome-1e2351f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5279%3A%20Object%20corruption%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5278-use-after-free-in-google-chrome-795bf565</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5278%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d99305d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5277-integer-overflow-in-google-chrome-895e8161</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5277%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5276-insufficient-policy-enforcement-in-g-312e0a64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5276%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d993055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5275-heap-buffer-overflow-in-google-chrom-6d922d63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5275%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5274-integer-overflow-in-google-chrome-7a8b6e09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5274%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d99304d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5254-cross-site-scripting-in-welovemedia--c4c3c5aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5254%3A%20Cross%20Site%20Scripting%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d99303e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5253-cross-site-scripting-in-bufanyun-hot-0cbc0137</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5253%3A%20Cross%20Site%20Scripting%20in%20bufanyun%20HotGo&amp;severity=medium&amp;id=69cc96ade6bfc5ba1d9413ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5252-cross-site-scripting-in-z-9527-admin-c0179b5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5252%3A%20Cross%20Site%20Scripting%20in%20z-9527%20admin&amp;severity=medium&amp;id=69cc96ade6bfc5ba1d9413a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5251-dynamically-determined-object-attrib-a89ddae1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5251%3A%20Dynamically-Determined%20Object%20Attributes%20in%20z-9527%20admin&amp;severity=medium&amp;id=69cc889de6bfc5ba1d8929e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3774-cwe-200-exposure-of-sensitive-inform-09cde688</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3774%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3775-cwe-427-dll-hijacking-in-foxit-softw-ab6d3970</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3775%3A%20CWE-427%3A%20DLL%20Hijacking%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3776-cwe-476-null-pointer-dereference-in--9dd0d0dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3776%3A%20CWE-476%20NULL%20pointer%20dereference%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3780-cwe-426-untrusted-search-path-in-fox-e264b801</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3780%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3778-cwe-674-uncontrolled-recursion-in-fo-3d872c30</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3778%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d85411d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3779-cwe-416-use-after-free-in-foxit-soft-0f3310c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3779%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3777-cwe-416-use-after-free-in-foxit-soft-29267dd3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3777%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d85411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4947-cwe-284-improper-access-control-in-f-dce1d63f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4947%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Foxit%20Software%20Inc.%20na1.foxitesign.foxit.com&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d85412d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5249-cross-site-scripting-in-gougucms-9a138dfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5249%3A%20Cross%20Site%20Scripting%20in%20gougucms&amp;severity=medium&amp;id=69cc7a90e6bfc5ba1d854169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3831-cwe-862-missing-authorization-in-crm-eaf2a059</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3831%3A%20CWE-862%20Missing%20Authorization%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4374-cwe-611-improper-restriction-of-xml--8bd180bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4374%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d85412a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2394-cwe-126-buffer-over-read-in-rti-conn-3e28938c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2394%3A%20CWE-126%20Buffer%20Over-read%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=69cc7001e6bfc5ba1d749755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5248-dynamically-determined-object-attrib-f8b4af24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5248%3A%20Dynamically-Determined%20Object%20Attributes%20in%20gougucms&amp;severity=medium&amp;id=69cc7001e6bfc5ba1d749758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13855-cwe-89-improper-neutralization-of-s-df457862</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13855%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Storage%20Protect%20Server&amp;severity=high&amp;id=69cc7001e6bfc5ba1d749752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34873-na-4c47360d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34873%3A%20n%2Fa&amp;severity=critical&amp;id=69cec35ce6bfc5ba1dfb4d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-01-7d540e8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-01&amp;severity=medium&amp;id=69cdb368e6bfc5ba1d0f530e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66442-na-f8572be5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66442%3A%20n%2Fa&amp;severity=medium&amp;id=69cd77b1e6bfc5ba1df19f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30291-na-ebb091ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30291%3A%20n%2Fa&amp;severity=high&amp;id=69cd74cfe6bfc5ba1df01063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29598-na-2d280f25</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29598%3A%20n%2Fa&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df0105e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34872-na-52cdc6bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34872%3A%20n%2Fa&amp;severity=critical&amp;id=69cd74cfe6bfc5ba1df0104d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67807-na-3cdb3a2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67807%3A%20n%2Fa&amp;severity=medium&amp;id=69cd7413e6bfc5ba1def511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43028-na-a438d685</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43028%3A%20n%2Fa&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40489-na-a97611df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40489%3A%20n%2Fa&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34871-na-0e98fe73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34871%3A%20n%2Fa&amp;severity=medium&amp;id=69cd69c0e6bfc5ba1deb9268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31027-na-43cb3480</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31027%3A%20n%2Fa&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30643-na-324a0dae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30643%3A%20n%2Fa&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30292-na-9c827e2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30292%3A%20n%2Fa&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30273-na-53a2c388</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30273%3A%20n%2Fa&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34874-na-20e195fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34874%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9caeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25835-na-c7115649</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25835%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25833-na-39fc498d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25833%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30573-na-074185c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30573%3A%20n%2Fa&amp;severity=high&amp;id=69cd5f13e6bfc5ba1de6e558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30523-na-e91f0ac3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30523%3A%20n%2Fa&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34875-na-87e74112</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34875%3A%20n%2Fa&amp;severity=critical&amp;id=69cd5f13e6bfc5ba1de6e541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25834-na-b6e432ef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25834%3A%20n%2Fa&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30526-na-bfd1e890</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30526%3A%20n%2Fa&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67806-na-fbbc0c48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67806%3A%20n%2Fa&amp;severity=low&amp;id=69cd3867e6bfc5ba1ddc2e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67805-na-26c76182</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67805%3A%20n%2Fa&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30522-na-da16853b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30522%3A%20n%2Fa&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30289-na-3270a501</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30289%3A%20n%2Fa&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30287-na-8263b233</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30287%3A%20n%2Fa&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5240-cross-site-scripting-in-code-project-c4b471da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5240%3A%20Cross%20Site%20Scripting%20in%20code-projects%20BloodBank%20Managing%20System&amp;severity=medium&amp;id=69cc5e6ee6bfc5ba1d4effb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5238-sql-injection-in-itsourcecode-payrol-9ef6c417</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5238%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cc5e6ee6bfc5ba1d4effaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4668-cwe-89-improper-neutralization-of-sp-1cc6ecba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4668%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=69cc5aeae6bfc5ba1d4dd37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5237-sql-injection-in-itsourcecode-payrol-8d912d8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5237%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5236-heap-based-buffer-overflow-in-axioma-029b3e7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5236%3A%20Heap-based%20Buffer%20Overflow%20in%20Axiomatic%20Bento4&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2480-cwe-79-improper-neutralization-of-in-6b3f465a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2480%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def5047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34556-cwe-125-out-of-bounds-read-in-inter-6e7c0da0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34556%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34555-cwe-121-stack-based-buffer-overflow-c10bc34d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34555%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34554-cwe-125-out-of-bounds-read-in-inter-aafb7891</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34554%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7413e6bfc5ba1def511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34553-cwe-562-return-of-stack-variable-ad-2c16da57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34553%3A%20CWE-562%3A%20Return%20of%20Stack%20Variable%20Address%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34552-cwe-476-null-pointer-dereference-in-4bc7aebe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34552%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df0106e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5235-heap-based-buffer-overflow-in-axioma-070dd75a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5235%3A%20Heap-based%20Buffer%20Overflow%20in%20Axiomatic%20Bento4&amp;severity=medium&amp;id=69cd11c0e6bfc5ba1dcba0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34551-cwe-476-null-pointer-dereference-in-6e2f2b29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34551%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34550-cwe-681-incorrect-conversion-betwee-7e7c75d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34550%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def5052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34549-cwe-758-reliance-on-undefined-unspe-a6e68408</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34549%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34548-cwe-681-incorrect-conversion-betwee-65343c71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34548%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34547-cwe-758-reliance-on-undefined-unspe-51bc6a5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34547%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd26f8e6bfc5ba1dd46493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34546-cwe-369-divide-by-zero-in-internati-ab0b32a6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34546%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def504d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34542-cwe-121-stack-based-buffer-overflow-3dc3f0d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34542%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34541-cwe-476-null-pointer-dereference-in-97376314</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34541%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34540-cwe-122-heap-based-buffer-overflow--6ae50b02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34540%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34539-cwe-122-heap-based-buffer-overflow--a5ea5a6b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34539%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34537-cwe-758-reliance-on-undefined-unspe-8300a004</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34537%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34536-cwe-674-uncontrolled-recursion-in-i-aa01237b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34536%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34535-cwe-122-heap-based-buffer-overflow--68816653</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34535%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34534-cwe-122-heap-based-buffer-overflow--984e044e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34534%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34533-cwe-758-reliance-on-undefined-unspe-384b4f8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34533%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34605-cwe-79-improper-neutralization-of-i-fae01986</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34605%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34585-cwe-79-improper-neutralization-of-i-e55ddbb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34585%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34449-cwe-942-permissive-cross-domain-pol-0cb7b35e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34449%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69cc424fe6bfc5ba1d44f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34448-cwe-79-improper-neutralization-of-i-36bc82a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34448%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69cc424fe6bfc5ba1d44f4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34453-cwe-863-incorrect-authorization-in--a00bf5be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34453%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34451-cwe-22-improper-limitation-of-a-pat-34e7a1b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34451%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20anthropic-sdk-typescript&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34450-cwe-276-incorrect-default-permissio-e2dd2ab0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34450%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20anthropics%20anthropic-sdk-python&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34452-cwe-59-improper-link-resolution-bef-645fcbd8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34452%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20anthropics%20anthropic-sdk-python&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34442-cwe-20-improper-input-validation-in-98638d4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34442%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43dab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34443-cwe-918-server-side-request-forgery-82314a2d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34443%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43dab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34441-cwe-444-inconsistent-interpretation-822278a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34441%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34405-cwe-79-improper-neutralization-of-i-b15ea7cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nuxt-modules%20og-image&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34404-cwe-400-uncontrolled-resource-consu-46d515e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34404%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nuxt-modules%20og-image&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5215-improper-access-controls-in-d-link-d-79f88c69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5215%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cc3b45e6bfc5ba1d430caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5214-stack-based-buffer-overflow-in-d-lin-fc01fc98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5214%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc3b45e6bfc5ba1d430ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34401-cwe-611-improper-restriction-of-xml-a60b8584</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34401%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20microsoft%20XmlNotepad&amp;severity=medium&amp;id=69cc3b45e6bfc5ba1d430c9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34740-cwe-918-server-side-request-forgery-237de682</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34740%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c3e6bfc5ba1d418a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34739-cwe-79-improper-neutralization-of-i-3c670ea4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34739%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34738-cwe-285-improper-authorization-in-w-0862147d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34738%3A%20CWE-285%3A%20Improper%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34737-cwe-862-missing-authorization-in-ww-4c620e5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34737%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34733-cwe-284-improper-access-control-in--135c5460</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34733%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34732-cwe-306-missing-authentication-for--f0ad5c69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34732%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34731-cwe-306-missing-authentication-for--e79ff8e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34731%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69cc37c1e6bfc5ba1d418a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34716-cwe-79-improper-neutralization-of-i-9ebc5823</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34716%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34613-cwe-352-cross-site-request-forgery--11c5e554</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34613%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34611-cwe-352-cross-site-request-forgery--4e180877</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34611%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34396-cwe-79-improper-neutralization-of-i-d8a298c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34396%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34394-cwe-352-cross-site-request-forgery--35460bbd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34394%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69cc343ee6bfc5ba1d4033d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34395-cwe-862-missing-authorization-in-ww-1d4fc49d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34395%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc343ee6bfc5ba1d4033d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34586-cwe-863-incorrect-authorization-in--54e3e32d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34586%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mrmn2%20PdfDing&amp;severity=medium&amp;id=69cc343ee6bfc5ba1d4033d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1579-cwe-306-in-px4-autopilot-77f763f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1579%3A%20CWE-306%20in%20PX4%20Autopilot&amp;severity=critical&amp;id=69cc2d39e6bfc5ba1d3ba360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3470-cwe-20-improper-input-validation-in--65b0c784</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3470%3A%20CWE-20%20Improper%20input%20validation%20in%20SonicWall%20Email%20Security&amp;severity=low&amp;id=69cc2d39e6bfc5ba1d3ba36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3469-cwe-20-improper-input-validation-in--eaa3f9df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3469%3A%20CWE-20%20Improper%20input%20validation%20in%20SonicWall%20Email%20Security&amp;severity=low&amp;id=69cc2d39e6bfc5ba1d3ba369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3468-cwe-79-improper-neutralization-of-in-b52440e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3468%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SonicWall%20Email%20Security&amp;severity=medium&amp;id=69cc2d39e6bfc5ba1d3ba366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5213-stack-based-buffer-overflow-in-d-lin-5302c1ec</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5213%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2d39e6bfc5ba1d3ba377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5212-stack-based-buffer-overflow-in-d-lin-c2d1e0da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5212%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2d39e6bfc5ba1d3ba36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34784-cwe-285-improper-authorization-in-p-66d533fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34784%3A%20CWE-285%3A%20Improper%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cc2635e6bfc5ba1d366733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34215-cwe-200-exposure-of-sensitive-infor-5ac81827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34215%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cc2635e6bfc5ba1d36672c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34206-cwe-79-improper-neutralization-of-i-ce9b1789</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34206%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20libops%20captcha-protect&amp;severity=medium&amp;id=69cc2635e6bfc5ba1d366727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5211-stack-based-buffer-overflow-in-d-lin-71b7c6f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5211%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2635e6bfc5ba1d36673a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3356-cwe-306-missing-authentication-for-c-80869dad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3356%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Anritsu%20Remote%20Spectrum%20Monitor%20MS27100A&amp;severity=critical&amp;id=69cc1babe6bfc5ba1d32cc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5210-file-inclusion-in-sourcecodester-lea-7ae37a06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5210%3A%20File%20Inclusion%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5209-cross-site-scripting-in-sourcecodest-a847cd41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5209%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62184-cwe-79-improper-neutralization-of-i-9654bd5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62184%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69cc1babe6bfc5ba1d32cc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5206-sql-injection-in-code-projects-simpl-4acdb68f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5206%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Gym%20Management%20System&amp;severity=medium&amp;id=69cc0a0fe6bfc5ba1d2cf77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2123-cwe-280-improper-handling-of-insuffi-ea54619e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2123%3A%20CWE-280%20Improper%20handling%20of%20insufficient%20permissions%20or%20privileges%20in%20OpenText%20Operations%20Agent&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5190-cwe-787-out-of-bounds-write-in-aws-a-7d1c9bb7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5190%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AWS%20aws-c-event-stream&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32725-cwe-23-relative-path-traversal-in-s-31b04076</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32725%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20scitokens%20scitokens-cpp&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32726-cwe-863-incorrect-authorization-in--de3b423f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32726%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20scitokens%20scitokens-cpp&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34361-cwe-552-files-or-directories-access-66cb8838</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34361%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=critical&amp;id=69cbff80e6bfc5ba1d29f7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34360-cwe-918-server-side-request-forgery-5862110a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34360%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=medium&amp;id=69cbff80e6bfc5ba1d29f7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34359-cwe-346-origin-validation-error-in--7ddd6ff0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34359%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=high&amp;id=69cbff80e6bfc5ba1d29f7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-malware-campaign-delivers-vbscript-and-ms-ae2a5fd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20malware%20campaign%20delivers%20VBScript%20and%20MSI%20backdoors&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-compromise-of-axios-npm-package-c65fd242</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply-Chain%20Compromise%20of%20axios%20npm%20Package&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5205-server-side-request-forgery-in-chatw-40f6084d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5205%3A%20Server-Side%20Request%20Forgery%20in%20chatwoot&amp;severity=medium&amp;id=69cbf879e6bfc5ba1d2801af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24165-cwe-502-deserialization-of-untruste-abf108db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24165%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20BioNeMo%20Framework&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24164-cwe-502-deserialization-of-untruste-8f050d1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24164%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20BioNeMo%20Framework&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24154-cwe-78-improper-neutralization-of-s-e4e69e90</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24154%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20Jetson%20Xavier%20Series%2C%20Jetson%20Orin%20Series%20and%20Jetson%20Thor&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24153-cwe-501-trust-boundary-violation-in-e7a82e21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24153%3A%20CWE-501%20Trust%20Boundary%20Violation%20in%20NVIDIA%20Jetson%20Xavier%20Series%2C%20Jetson%20Orin%20Series%20and%20Jetson%20Thor&amp;severity=medium&amp;id=69cbf879e6bfc5ba1d28019b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24148-cwe-1188-initialization-of-a-resour-b1f9912a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24148%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20NVIDIA%20Jetson%20Xavier%20Series%20and%20Jetson%20Orin%20Series&amp;severity=high&amp;id=69cbf879e6bfc5ba1d280196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-widespread-eviltokens-kit-device-code-phishing-38053c6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20widespread%20EvilTokens%20kit%3A%20device%20code%20phishing%20as-a-service&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-footprints-tracking-ghostsocks-malware-88b2ff6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Footprints%3A%20Tracking%20GhostSocks%20Malware&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crysome-rat-an-advanced-persistent-net-remote-acce-50137084</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrySome%20RAT%20%3A%20An%20Advanced%20Persistent%20.NET%20Remote%20Access%20Trojan&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/one-click-away-inside-a-linkedin-phishing-attack-fb385e9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=One%20Click%20Away%3A%20Inside%20a%20LinkedIn%20Phishing%20Attack&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ringing-in-chaos-how-teampcp-weaponized-the-telnyx-877e2dda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ringing%20in%20Chaos%3A%20How%20TeamPCP%20Weaponized%20the%20Telnyx%20Python%20SDK&amp;severity=medium&amp;id=69d636951cc7ad14da612bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5087-cwe-338-use-of-cryptographically-wea-f1ae242d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5087%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20JJNAPIORK%20PAGI%3A%3AMiddleware%3A%3ASession%3A%3AStore%3A%3ACookie&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34243-cwe-77-improper-neutralization-of-s-be7fa18e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34243%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20njzjz%20wenxian&amp;severity=critical&amp;id=69cbf4f5e6bfc5ba1d2745cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34219-cwe-190-integer-overflow-or-wraparo-4cd76bc0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34219%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5204-stack-based-buffer-overflow-in-tenda-1d07a571</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5204%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cbedf2e6bfc5ba1d248110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5203-path-traversal-in-cms-made-simple-8956ef9c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5203%3A%20Path%20Traversal%20in%20CMS%20Made%20Simple&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d24810a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34240-cwe-347-improper-verification-of-cr-4aef725b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34240%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20appsup-dart%20jose&amp;severity=high&amp;id=69cbedf2e6bfc5ba1d248106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34237-cwe-942-permissive-cross-domain-pol-df6035ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34237%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20modelcontextprotocol%20java-sdk&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d248101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34235-cwe-125-out-of-bounds-read-in-pjsip-64e6e86d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34235%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-next-cybersecurity-crisis-isnt-breachesits-dat-617ce088</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Next%20Cybersecurity%20Crisis%20Isn%E2%80%99t%20Breaches%E2%80%94It%E2%80%99s%20Data%20You%20Can%E2%80%99t%20Trust&amp;severity=medium&amp;id=69cbea6ae6bfc5ba1d226c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34231-cwe-79-improper-neutralization-of-i-a3811ee5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34231%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mixxorz%20slippers&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22561-vulnerability-in-anthropic-claude-d-f8757e77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22561%3A%20Vulnerability%20in%20Anthropic%20Claude%20Desktop%20-%20Windows&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34227-cwe-306-missing-authentication-for--8ac78b6f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34227%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34218-cwe-269-improper-privilege-manageme-5469040d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34218%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20craigjbass%20clearancekit&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34595-cwe-843-access-of-resource-using-in-a99e068c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34595%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34574-cwe-697-incorrect-comparison-in-par-52fbaa27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34574%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34573-cwe-407-inefficient-algorithmic-com-0c0c9664</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34573%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cbe700e6bfc5ba1d219519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stolen-logins-are-fueling-everything-from-ransomwa-1ac187c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stolen%20Logins%20Are%20Fueling%20Everything%20From%20Ransomware%20to%20Nation-State%20Cyberattacks&amp;severity=medium&amp;id=69cbe361e6bfc5ba1d2085e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4819-cwe-532-in-floragunn-search-guard-fl-c836b24f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4819%3A%20CWE-532%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22569-cwe-1289-improper-validation-of-uns-79b5145f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22569%3A%20CWE-1289%20Improper%20validation%20of%20unsafe%20equivalence%20in%20input%20in%20Zscaler%20Zscaler%20Client%20Connector&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4818-cwe-285-in-floragunn-search-guard-fl-352b80c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4818%3A%20CWE-285%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d21952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/venom-stealer-raises-stakes-with-continuous-creden-8197636e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Venom%20Stealer%20Raises%20Stakes%20With%20Continuous%20Credential%20Harvesting&amp;severity=medium&amp;id=69cbdfdde6bfc5ba1d1e5b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34532-cwe-863-incorrect-authorization-in--d438f9ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34532%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4799-cwe-601-url-redirection-to-untrusted-e7eb6ba1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4799%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbdff9e6bfc5ba1d1e69d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34373-cwe-346-origin-validation-error-in--b9034bc6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34373%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbdff9e6bfc5ba1d1e69c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34363-cwe-362-concurrent-execution-using--0173ea9b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34363%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cbdff9e6bfc5ba1d1e69c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0596-cwe-78-improper-neutralization-of-sp-7a9aeb7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0596%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34224-cwe-367-time-of-check-time-of-use-t-04fec12b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34224%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69cbdff9e6bfc5ba1d1e69bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34214-cwe-212-improper-removal-of-sensiti-fe343f70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34214%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20trinodb%20trino&amp;severity=high&amp;id=69cbd8dce6bfc5ba1d1c31a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34209-cwe-294-authentication-bypass-by-ca-ae7e0cd6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34209%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20wevm%20mppx&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34210-cwe-697-incorrect-comparison-in-wev-005026cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34210%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20wevm%20mppx&amp;severity=medium&amp;id=69cbd8dce6bfc5ba1d1c31a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34377-cwe-347-improper-verification-of-cr-961af0bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34377%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ZcashFoundation%20zebra&amp;severity=high&amp;id=69cbd8dce6bfc5ba1d1c31ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34202-cwe-1336-improper-neutralization-of-80a87c57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34202%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20ZcashFoundation%20zebra&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c311e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-moves-from-oss-to-aws-environments-ec10ca3b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Moves%20From%20OSS%20to%20AWS%20Environments&amp;severity=medium&amp;id=69cbd551e6bfc5ba1d1b0977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20915-cwe-79-improper-neutralization-of-i-9c8aeba6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20915%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c30fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34172-cwe-1336-improper-neutralization-of-1aeae384</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34172%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Giskard-AI%20giskard-oss&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c311b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33276-cwe-79-improper-neutralization-of-i-3ffa7566</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33276%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c310c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34162-cwe-306-missing-authentication-for--6cb44fc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34162%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c310f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34163-cwe-918-server-side-request-forgery-df36ec79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34163%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crewai-vulnerabilities-expose-devices-to-hacking-845e6a48</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrewAI%20Vulnerabilities%20Expose%20Devices%20to%20Hacking&amp;severity=medium&amp;id=69cbce49e6bfc5ba1d18329f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-ransomware-is-now-after-your-data-and-how-to-p-6fc7d779</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20ransomware%20is%20now%20after%20your%20data%20%E2%80%94%20and%20how%20to%20protect%20your%20home%20storage%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cbce5ee6bfc5ba1d1838db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-truechaos-0-day-exploitation-against-sou-08e18aae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20TrueChaos%3A%200-Day%20Exploitation%20Against%20Southeast%20Asian%20Government%20Targets&amp;severity=medium&amp;id=69cc30c3e6bfc5ba1d3e44b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3308-cwe-190-integer-overflow-or-wraparou-b1a7029f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3308%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Artifex%20Software%20Inc.%20*PyMuPDF*%20MuPDF&amp;severity=high&amp;id=69cbd1cfe6bfc5ba1d19baec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27854-use-after-free-in-powerdns-dnsdist-e6e09fac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27854%3A%20Use%20After%20Free%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27853-out-of-bounds-write-in-powerdns-dns-ccd834c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27853%3A%20Out-of-bounds%20Write%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24030-uncontrolled-memory-allocation-in-p-60254c6e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24030%3A%20Uncontrolled%20Memory%20Allocation%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24029-incorrect-authorization-in-powerdns-a9ec0de4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24029%3A%20Incorrect%20Authorization%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24028-buffer-over-read-in-powerdns-dnsdis-62e4a5a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24028%3A%20Buffer%20Over-read%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-npm-distribution-compromised-in-supply-chain-c5ee45b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20NPM%20Distribution%20Compromised%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69cd1c4ee6bfc5ba1dcfe7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0397-overly-permissive-cross-domain-white-800b174d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0397%3A%20Overly%20Permissive%20Cross-domain%20Whitelist%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69cbb931e6bfc5ba1d10da47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-slashes-quantum-resource-requirements-for-b-41cc00eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Slashes%20Quantum%20Resource%20Requirements%20for%20Breaking%20Cryptocurrency%20Encryption&amp;severity=medium&amp;id=69cbb5afe6bfc5ba1d0f3172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0396-improper-neutralization-of-script-re-f60b6be7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0396%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69cbb931e6bfc5ba1d10da44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-critical-fortinet-forticlient-ems--a7f71706</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Critical%20Fortinet%20FortiClient%20EMS%20Flaw%20Begins&amp;severity=critical&amp;id=69cbb5afe6bfc5ba1d0f3176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14213-cwe-78-improper-neutralization-of-s-115c4b1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14213%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cato%20Networks%20Socket&amp;severity=high&amp;id=69cbb930e6bfc5ba1d10da40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14031-cwe-1395-dependency-on-vulnerable-t-b96af189</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14031%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20YVES%20Sereal%3A%3AEncoder&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14030-cwe-1395-dependency-on-vulnerable-t-a55e9ce0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14030%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20YVES%20Sereal%3A%3ADecoder&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4267-cwe-79-improper-neutralization-of-in-3a3951a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnbillion%20Query%20Monitor&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3191-cwe-352-cross-site-request-forgery-c-188285cf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3191%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20teckel%20Minify%20HTML&amp;severity=medium&amp;id=69cbb22ae6bfc5ba1d0de95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3139-cwe-639-authorization-bypass-through-8b75f73d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3139%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=69cbb22ae6bfc5ba1d0de95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34509-88c32a04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34509&amp;severity=null&amp;id=69cd26f5e6bfc5ba1dd45f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34508-6ec16998</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34508&amp;severity=null&amp;id=69cd26f5e6bfc5ba1dd45f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5198-sql-injection-in-code-projects-stude-8e459cec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5198%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cbaea5e6bfc5ba1d0cfdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/strongswan-flaw-allows-unauthenticated-attackers-t-6c936cd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StrongSwan%20Flaw%20Allows%20Unauthenticated%20Attackers%20to%20Crash%20VPNs&amp;severity=low&amp;id=69cba095e6bfc5ba1d069829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34887-cwe-79-improper-neutralization-of-i-959708a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Extend%20Themes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=69cba419e6bfc5ba1d08ffa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4400-cwe-639-authorization-bypass-through-c221da90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4400%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%201millionbot%20Millie%20chat&amp;severity=high&amp;id=69cba419e6bfc5ba1d08ffa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4399-cwe-1427-improper-neutralization-of--6d726c1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4399%3A%20CWE-1427%20Improper%20neutralization%20of%20input%20used%20for%20LLM%20prompting%20in%201millionbot%20Millie%20chat&amp;severity=high&amp;id=69cba419e6bfc5ba1d08ffa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lloyds-data-security-incident-impacts-450000-indiv-bf5b7289</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lloyds%20Data%20Security%20Incident%20Impacts%20450%2C000%20Individuals&amp;severity=medium&amp;id=69cb9d11e6bfc5ba1d05291b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15618-cwe-338-use-of-cryptographically-we-19be4bf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15618%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20MOCK%20Business%3A%3AOnlinePayment%3A%3AStoredTransaction&amp;severity=critical&amp;id=69cba419e6bfc5ba1d08ff9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5197-sql-injection-in-code-projects-stude-35da754e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5197%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cb9d1de6bfc5ba1d052b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4317-cwe-89-improper-neutralization-of-sp-e769b7b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4317%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Umami%20Software%20application%20Umami%20Software&amp;severity=critical&amp;id=69cb9d1de6bfc5ba1d052b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5196-sql-injection-in-code-projects-stude-b73c09b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5196%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cc1e09e6bfc5ba1d33b7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10559-cwe-22-improper-limitation-of-a-pat-a46b0034</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10559%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Factory%20Resource%20Manager&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10553-cwe-79-improper-neutralization-of-i-0ca743a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10553%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Factory%20Resource%20Manager&amp;severity=high&amp;id=69cbd1cfe6bfc5ba1d19baf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10551-cwe-79-improper-neutralization-of-i-5b79fb83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=69cb8b7de6bfc5ba1df48222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5201-heap-based-buffer-overflow-in-red-ha-598a08d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5201%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cb8b7de6bfc5ba1df48225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5195-sql-injection-in-code-projects-stude-bc053e71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5195%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cb8475e6bfc5ba1df0b3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/application-control-bypass-for-data-exfiltration-t-88c48161</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Application%20Control%20Bypass%20for%20Data%20Exfiltration%2C%20(Tue%2C%20Mar%2031st)&amp;severity=medium&amp;id=69cb79e9e6bfc5ba1deaad81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5186-double-free-in-nothings-stb-9e4c2f49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5186%3A%20Double%20Free%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cbedf4e6bfc5ba1d248139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dualscript-multi-stage-powershell-malwar-63268769</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20DualScript%3A%20Multi-Stage%20PowerShell%20Malware%20Targets%20Crypto&amp;severity=medium&amp;id=69cc1b98e6bfc5ba1d32c553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5185-heap-based-buffer-overflow-in-nothin-14d54f9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5185%3A%20Heap-based%20Buffer%20Overflow%20in%20Nothings%20stb_image&amp;severity=medium&amp;id=69cb6f5ce6bfc5ba1de4b856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5184-command-injection-in-trendnet-tew-71-9fc19bda</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5184%3A%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=medium&amp;id=69cb6f5ce6bfc5ba1de4b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-in-openai-codex-allowed-git-19b187ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20in%20OpenAI%20Codex%20Allowed%20GitHub%20Token%20Compromise&amp;severity=critical&amp;id=69cb6bd9e6bfc5ba1de2b835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3881-cwe-918-server-side-request-forgery--b7cb0fc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3881%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Performance%20Monitor&amp;severity=medium&amp;id=69cb6857e6bfc5ba1de0b6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5183-command-injection-in-trendnet-tew-71-6f0fe0f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5183%3A%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5182-sql-injection-in-sourcecodester-teac-5602a1a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5182%3A%20SQL%20Injection%20in%20SourceCodester%20Teacher%20Record%20System&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34881-cwe-918-server-side-request-forgery-4eec20a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34881%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenStack%20Glance&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1877-cwe-79-improper-neutralization-of-in-a66dc075</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnh10%20Auto%20Post%20Scheduler&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1834-cwe-80-improper-neutralization-of-sc-8611fff6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1834%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20vowelweb%20Ibtana%20%E2%80%93%20WordPress%20Website%20Builder&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5181-unrestricted-upload-in-sourcecodeste-d1cc0456</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5181%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9ced5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4146-cwe-79-improper-neutralization-of-in-f54775f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4146%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timwhitlock%20Loco%20Translate&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1710-cwe-285-improper-authorization-in-wo-825159fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1710%3A%20CWE-285%20Improper%20Authorization%20in%20woocommerce%20WooPayments%3A%20Integrated%20WooCommerce%20Payments&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1797-cwe-862-missing-authorization-in-the-54e9e4f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1797%3A%20CWE-862%20Missing%20Authorization%20in%20themetechmount%20TrueBooker%20%E2%80%93%20Appointment%20Booking%20and%20Scheduler%20System&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5180-sql-injection-in-sourcecodester-simp-c8e12654</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5180%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb4fb9e6bfc5ba1dc69fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5179-sql-injection-in-sourcecodester-simp-4bb61a7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5179%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb4fb9e6bfc5ba1dc69fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5178-command-injection-in-totolink-a3300r-d158d31b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5178%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cb41a9e6bfc5ba1dadee2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34073-cwe-295-improper-certificate-valida-10885c91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34073%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20pyca%20cryptography&amp;severity=low&amp;id=69cbd8dce6bfc5ba1d1c31b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34070-cwe-22-improper-limitation-of-a-pat-ac8541ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34070%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langchain-ai%20langchain&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5177-command-injection-in-totolink-a3300r-dabb0ca9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5177%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cbd1cfe6bfc5ba1d19baf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34060-cwe-94-improper-control-of-generati-bee34109</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34060%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Shopify%20ruby-lsp&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34054-cwe-427-uncontrolled-search-path-el-04e663ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34054%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20microsoft%20vcpkg&amp;severity=high&amp;id=69cbedf4e6bfc5ba1d248134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34043-cwe-400-uncontrolled-resource-consu-3f949807</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34043%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yahoo%20serialize-javascript&amp;severity=medium&amp;id=69cbd8dce6bfc5ba1d1c31b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34042-cwe-862-missing-authorization-in-ne-c419b6c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34042%3A%20CWE-862%3A%20Missing%20Authorization%20in%20nektos%20act&amp;severity=high&amp;id=69cc1babe6bfc5ba1d32cc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34041-cwe-74-improper-neutralization-of-s-7d4e514b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34041%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nektos%20act&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3300-cwe-94-improper-control-of-generatio-6c6e7217</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3300%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=critical&amp;id=69cb25a7e6bfc5ba1d9a95b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4020-cwe-200-exposure-of-sensitive-inform-b98091d8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4020%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20RocketGenius%20Gravity%20SMTP&amp;severity=high&amp;id=69cb25a7e6bfc5ba1d9a95b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5176-command-injection-in-totolink-a3300r-0198ea25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5176%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cb25a7e6bfc5ba1d9a95c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5115-cwe-319-cleartext-transmission-of-se-7a72caea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5115%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20PaperCut%20Papercut%20NG%2FMF&amp;severity=low&amp;id=69cb1e83e6bfc5ba1d972340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-004-databrick-d60c6a86</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20004%20-%20Databricks%20Investigating%20Alleged%20Compromise%2C%20TeamPCP%20Runs%20Dual%20Ransomware%20Operations%2C%20and%20AstraZeneca%20Data%20Released%2C%20(Mon%2C%20Mar%2030th)&amp;severity=medium&amp;id=69ca91e1e6bfc5ba1d4195f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32734-cwe-79-improper-neutralization-of-i-5b4bf0b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32734%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30879-cwe-79-improper-neutralization-of-i-315a156d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30879%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30940-cwe-22-improper-limitation-of-a-pat-4cf3d0c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30940%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30878-cwe-285-improper-authorization-in-b-0d863f22</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30878%3A%20CWE-285%3A%20Improper%20Authorization%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30877-cwe-78-improper-neutralization-of-s-36a348b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30877%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30880-cwe-78-improper-neutralization-of-s-5ac38c48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30880%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27697-cwe-89-improper-neutralization-of-s-4a7e4478</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27697%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21861-cwe-78-improper-neutralization-of-s-7b86deef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21861%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32957-cwe-434-unrestricted-upload-of-file-07ed5ff8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32957%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4794-cwe-79-improper-neutralization-of-in-b1682948</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4794%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20PaperCut%20PaperCut%20NG%2FMF&amp;severity=low&amp;id=69cb1e82e6bfc5ba1d9722d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-31-b94f0480</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-31&amp;severity=medium&amp;id=69cc61e8e6bfc5ba1d50ebb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30290-na-d795f9fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30290%3A%20n%2Fa&amp;severity=high&amp;id=69cc2635e6bfc5ba1d366722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30285-na-6a2d5cfa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30285%3A%20n%2Fa&amp;severity=critical&amp;id=69cc1f3ce6bfc5ba1d342c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30280-na-e7f28f90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30280%3A%20n%2Fa&amp;severity=medium&amp;id=69cc1f3ce6bfc5ba1d342c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30520-na-d7a777db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30520%3A%20n%2Fa&amp;severity=medium&amp;id=69cc1e09e6bfc5ba1d33b7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30286-na-fbc0b73a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30286%3A%20n%2Fa&amp;severity=critical&amp;id=69cc1e09e6bfc5ba1d33b7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30521-na-03f608fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30521%3A%20n%2Fa&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30283-na-ed1a86e8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30283%3A%20n%2Fa&amp;severity=critical&amp;id=69cc0a0fe6bfc5ba1d2cf778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30279-na-8a3ec826</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30279%3A%20n%2Fa&amp;severity=high&amp;id=69cc0a0fe6bfc5ba1d2cf772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30282-na-2cce3cba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30282%3A%20n%2Fa&amp;severity=critical&amp;id=69cc068ae6bfc5ba1d2beedf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30278-na-bacab0cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30278%3A%20n%2Fa&amp;severity=critical&amp;id=69cc068ae6bfc5ba1d2beeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30277-na-d58dc8e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30277%3A%20n%2Fa&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30284-na-5be1bb53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30284%3A%20n%2Fa&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30281-na-48ac7389</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30281%3A%20n%2Fa&amp;severity=critical&amp;id=69cbedf2e6bfc5ba1d2480ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30276-na-932d5438</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30276%3A%20n%2Fa&amp;severity=critical&amp;id=69cbedf2e6bfc5ba1d2480ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30314-na-bc561faf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30314%3A%20n%2Fa&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29870-na-e9224b82</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29870%3A%20n%2Fa&amp;severity=high&amp;id=69cbdff9e6bfc5ba1d1e69b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30312-na-6798d69d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30312%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c3108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30311-na-afb7abcc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30311%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c3104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30309-na-5d9d5ab8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30309%3A%20n%2Fa&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30310-na-ded13cc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30310%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd1cfe6bfc5ba1d19bae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-31-e1bb4eef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-31&amp;severity=low&amp;id=69cb3714e6bfc5ba1da38cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5157-cross-site-scripting-in-code-project-fa8372fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5157%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69cb096be6bfc5ba1d7e1fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5156-stack-based-buffer-overflow-in-tenda-95d1a648</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5156%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cb096be6bfc5ba1d7e1fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5155-stack-based-buffer-overflow-in-tenda-42fe2620</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5155%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cafedde6bfc5ba1d798140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5154-stack-based-buffer-overflow-in-tenda-0a4a9773</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5154%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cafedde6bfc5ba1d798139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5130-cwe-565-reliance-on-cookies-without--7fe086b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5130%3A%20CWE-565%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20jhimross%20Debugger%20%26%20Troubleshooter&amp;severity=high&amp;id=69cafb5ae6bfc5ba1d780867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32794-cwe-295-improper-certificate-valida-33e2597e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32794%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Provider%20for%20Databricks&amp;severity=medium&amp;id=69caf451e6bfc5ba1d7409b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5153-command-injection-in-tenda-ch22-ee0fb20b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5153%3A%20Command%20Injection%20in%20Tenda%20CH22&amp;severity=medium&amp;id=69caf0cde6bfc5ba1d729540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4257-cwe-94-improper-control-of-generatio-c9e2f160</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4257%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20supsysticcom%20Contact%20Form%20by%20Supsystic&amp;severity=critical&amp;id=69caf0cde6bfc5ba1d72953b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32877-cwe-125-out-of-bounds-read-in-rando-f9a11963</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32877%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20randombit%20botan&amp;severity=high&amp;id=69cae2bce6bfc5ba1d6c3e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32883-cwe-347-improper-verification-of-cr-1af6174a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32883%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20randombit%20botan&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32884-cwe-295-improper-certificate-valida-f12891c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32884%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20randombit%20botan&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5152-stack-based-buffer-overflow-in-tenda-50cbb48f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5152%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cae2bce6bfc5ba1d6c3e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34558-cwe-79-improper-neutralization-of-i-198231a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34558%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34557-cwe-79-improper-neutralization-of-i-f3fef655</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34557%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27599-cwe-79-improper-neutralization-of-i-cb40a560</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27599%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5150-sql-injection-in-code-projects-accou-ec58ae08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5150%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69cad830e6bfc5ba1d66dc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5148-sql-injection-in-yunaiv-yudao-cloud-5dc94026</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5148%3A%20SQL%20Injection%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69cad830e6bfc5ba1d66dc10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33026-cwe-312-cleartext-storage-of-sensit-de36c61f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33026%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69cad4ace6bfc5ba1d65117d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21710-vulnerability-in-nodejs-node-028748b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21710%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=69cacda7e6bfc5ba1d6188a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21716-vulnerability-in-nodejs-node-e1c41615</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21716%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=69cacda7e6bfc5ba1d6188b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21711-vulnerability-in-nodejs-node-ddaccfa2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21711%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21715-vulnerability-in-nodejs-node-14042404</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21715%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=69cacda7e6bfc5ba1d6188ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21717-vulnerability-in-nodejs-node-70bc0aac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21717%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21713-vulnerability-in-nodejs-node-4458c2af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21713%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21714-vulnerability-in-nodejs-node-a0eb338f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21714%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dshield-cowrie-honeypot-stats-and-when-sessions-di-88050524</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DShield%20(Cowrie)%20Honeypot%20Stats%20and%20When%20Sessions%20Disconnect%2C%20(Mon%2C%20Mar%2030th)&amp;severity=medium&amp;id=69c9bef1e6bfc5ba1d521ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5147-sql-injection-in-yunaiv-yudao-cloud-16d2d339</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5147%3A%20SQL%20Injection%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69caca21e6bfc5ba1d5f423b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3991-cwe-829-inclusion-of-functionality-f-131dca0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3991%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20Broadcom%20Data%20Loss%20Prevention&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcps-telnyx-attack-marks-a-shift-in-tactics-be-49f2484d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%E2%80%99s%20Telnyx%20Attack%20Marks%20a%20Shift%20in%20Tactics%20Beyond%20LiteLLM&amp;severity=medium&amp;id=69caed48e6bfc5ba1d70eba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3502-cwe-494-download-of-code-without-int-45ea491d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3502%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check.%20in%20TrueConf%20TrueConf%20Client&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5126-server-side-request-forgery-in-sourc-39062150</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5126%3A%20Server-Side%20Request%20Forgery%20in%20SourceCodester%20RSS%20Feed%20Parser&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33027-cwe-22-improper-limitation-of-a-pat-c07fecd3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33027%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33028-cwe-362-concurrent-execution-using--15669eaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33028%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69cabc11e6bfc5ba1d596df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33029-cwe-20-improper-input-validation-in-e829da5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33029%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33030-cwe-78-improper-neutralization-of-s-ce389835</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33030%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69cabc11e6bfc5ba1d596dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33032-cwe-306-missing-authentication-for--2512a116</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33032%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69cabc11e6bfc5ba1d596e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4046-cwe-617-reachable-assertion-in-the-g-18e966bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4046%3A%20CWE-617%20Reachable%20assertion%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69cab88de6bfc5ba1d56ff2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5125-os-command-injection-in-raine-consul-50411acc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5125%3A%20OS%20Command%20Injection%20in%20raine%20consult-llm-mcp&amp;severity=medium&amp;id=69cacae6e6bfc5ba1d5fd380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27508-cwe-79-improper-neutralization-of-i-f32f18c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27508%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Smoothwall%20Express&amp;severity=medium&amp;id=69caae00e6bfc5ba1d516fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26352-cwe-79-improper-neutralization-of-i-77ac9a7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26352%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Smoothwall%20Express&amp;severity=medium&amp;id=69caae00e6bfc5ba1d516fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5124-improper-access-controls-in-osrg-gob-b46befd3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5124%3A%20Improper%20Access%20Controls%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69caa6f9e6bfc5ba1d4dfd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5170-cwe-617-reachable-assertion-in-mongo-3f604185</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5170%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20MongoDB%20MongoDB%20Server&amp;severity=medium&amp;id=69ca9c71e6bfc5ba1d472626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5123-off-by-one-in-osrg-gobgp-3ed023a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5123%3A%20Off-by-One%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21712-vulnerability-in-nodejs-node-52636af1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21712%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d472595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5165-expired-pointer-dereference-in-red-h-b327eb88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5165%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5164-buffer-copy-without-checking-size-of-dd5cb921</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5164%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/healthcare-it-platform-carecloud-probing-potential-568e92da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Healthcare%20IT%20Platform%20CareCloud%20Probing%20Potential%20Data%20Breach&amp;severity=medium&amp;id=69ca8756e6bfc5ba1d3aa7d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5122-improper-access-controls-in-osrg-gob-ec99131e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5122%3A%20Improper%20Access%20Controls%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69ca8e5fe6bfc5ba1d3ebe50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-drift-how-llms-are-quietly-breaking-organiz-e69f5f70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Drift%3A%20How%20LLMs%20Are%20Quietly%20Breaking%20Organizational%20Access%20Control&amp;severity=medium&amp;id=69ca8756e6bfc5ba1d3aa7d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28528-cwe-125-out-of-bounds-read-in-bluek-e98e0a75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28528%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28527-cwe-125-out-of-bounds-read-in-bluek-bcfc2127</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28527%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28526-cwe-125-out-of-bounds-read-in-bluek-5b117bbe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28526%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-iron-curtain-for-ai-how-to-improve-autonomous-a-a6c72dc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20iron%20curtain%20for%20AI%3A%20how%20to%20improve%20autonomous%20AI%20agent%20security%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ca8053e6bfc5ba1d368b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3321-cwe-639-authorization-bypass-through-c880c1c8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3321%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20ON24%20ON24%20Q%26A%20chat&amp;severity=high&amp;id=69ca7cd8e6bfc5ba1d314847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-data-leakage-via-a-hidden-outbound-channel-77d73958</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20Data%20Leakage%20via%20a%20Hidden%20Outbound%20Channel%20in%20the%20Code%20Execution%20Runtime&amp;severity=medium&amp;id=69ca7944e6bfc5ba1d2fc939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/30th-march-threat-intelligence-report-e05488d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=30th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69cae257e6bfc5ba1d6c0684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4315-cwe-352-cross-site-request-forgery-c-3da322ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4315%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69ca75c0e6bfc5ba1d2d9bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4266-cwe-502-deserialization-of-untrusted-985082ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4266%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69ca75c0e6bfc5ba1d2d9beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-star-blizzard-adopts-darksword-ios-exp-08457acb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Star%20Blizzard%20Adopts%20DarkSword%20iOS%20Exploit%20Kit&amp;severity=high&amp;id=69ca67b1e6bfc5ba1d24dab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-commission-reports-cyber-intrusion-and-da-712b39a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Commission%20Reports%20Cyber%20Intrusion%20and%20Data%20Theft&amp;severity=medium&amp;id=69ca60a9e6bfc5ba1d1f9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacked-hospitals-hidden-spyware-iran-conflict-show-960e3022</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacked%20Hospitals%2C%20Hidden%20Spyware%3A%20Iran%20Conflict%20Shows%20How%20Digital%20Fight%20Is%20Ingrained%20in%20Warfare&amp;severity=high&amp;id=69ca5d25e6bfc5ba1d1d6402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telnyx-targeted-in-growing-teampcp-supply-chain-at-3b995e80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telnyx%20Targeted%20in%20Growing%20TeamPCP%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69ca59a1e6bfc5ba1d18f925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1612-cwe-798-use-of-hard-coded-credential-4f82f25a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1612%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20AL-KO%20Robolinho%20Update%20Software&amp;severity=medium&amp;id=69ca4f15e6bfc5ba1d110ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-fresh-citrix-netscaler-vulnerabili-cb88742d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Fresh%20Citrix%20NetScaler%20Vulnerability%20Begins&amp;severity=critical&amp;id=69ca4489e6bfc5ba1d06497d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5128-cwe-200-exposure-of-sensitive-inform-adf68c3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5128&amp;severity=null&amp;id=69ca480ee6bfc5ba1d09ad0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-brief-tax-scams-aim-to-steal-funds-from-t-4f3af72b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20brief%3A%20tax%20scams%20aim%20to%20steal%20funds%20from%20taxpayers&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-confirms-kash-patel-email-hack-as-us-offers-10-48617ffa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Confirms%20Kash%20Patel%20Email%20Hack%20as%20US%20Offers%20%2410M%20Reward%20for%20Hackers&amp;severity=medium&amp;id=69ca2f74e6bfc5ba1dec291a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4416-cwe-502-deserialization-of-untrusted-7c234af9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4416%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20GIGABYTE%20Performance%20Library&amp;severity=high&amp;id=69ca2f86e6bfc5ba1dec601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5121-vulnerability-in-red-hat-red-hat-ent-8ecef880</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5121%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207%20Extended%20Lifecycle%20Support&amp;severity=high&amp;id=69ca2f86e6bfc5ba1dec601f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25704-cwe-271-privilege-dropping-lowering-9551ffdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25704%3A%20CWE-271%3A%20Privilege%20Dropping%20%2F%20Lowering%20Errors%20in%20pop-os%20cosmic-greeter&amp;severity=medium&amp;id=69ca2f86e6bfc5ba1dec6014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4415-cwe-23-relative-path-traversal-in-gi-d148431b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4415%3A%20CWE-23%20Relative%20path%20traversal%20in%20GIGABYTE%20Gigabyte%20Control%20Center&amp;severity=critical&amp;id=69ca2f86e6bfc5ba1dec6017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3716-cwe-204-observable-response-discrepa-19d0288d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3716%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20Protect%20(on-prem)&amp;severity=medium&amp;id=69ca2f86e6bfc5ba1dec6011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15379-cwe-77-improper-neutralization-of-s-6f707b63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15379%3A%20CWE-77%20%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69ca2868e6bfc5ba1de5eb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-ex-7117a302</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20BIG-IP%20DoS%20Flaw%20Upgraded%20to%20Critical%20RCE%2C%20Now%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69ca2161e6bfc5ba1de1970a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2328-cwe-790-improper-filtering-of-specia-345e5887</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2328%3A%20CWE-790%20Improper%20Filtering%20of%20Special%20Elements%20in%20WAGO%20Device%20Sphere&amp;severity=high&amp;id=69ca2868e6bfc5ba1de5eb96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5119-cleartext-transmission-of-sensitive--a5271c6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5119%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca16d5e6bfc5ba1dd8ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5107-improper-access-controls-in-frroutin-1c6243fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5107%3A%20Improper%20Access%20Controls%20in%20FRRouting%20FRR&amp;severity=low&amp;id=69ca0c48e6bfc5ba1dd16be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5106-cross-site-scripting-in-code-project-9b1a6ed5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5106%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5105-command-injection-in-totolink-a3300r-3ffece95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5105%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9f3ace6bfc5ba1da3b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5104-command-injection-in-totolink-a3300r-967faa0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5104%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9e219e6bfc5ba1d89ce55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3124-cwe-639-authorization-bypass-through-6397300c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3124%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpchill%20Download%20Monitor&amp;severity=high&amp;id=69c9d408e6bfc5ba1d7f34a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15036-cwe-29-path-traversal-filename-in-m-bf2c3022</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15036%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69c9d408e6bfc5ba1d7f349e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5103-command-injection-in-totolink-a3300r-8a4403a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5103%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9d408e6bfc5ba1d7f34a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7741-cwe-259-use-of-hard-coded-password-i-5fed7c83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7741%3A%20CWE-259%20Use%20of%20hard-coded%20password%20in%20Yokogawa%20Electric%20Corporation%20CENTUM%20VP&amp;severity=low&amp;id=69c9befee6bfc5ba1d524370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5102-command-injection-in-totolink-a3300r-fdb9f73a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5102%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9befee6bfc5ba1d524373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-30-728f86ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-30&amp;severity=medium&amp;id=69cb1068e6bfc5ba1d83cbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30306-na-f64a590d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30306%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30313-na-8166a460</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30313%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30308-na-5353a88a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30308%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30305-na-259404ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30305%3A%20n%2Fa&amp;severity=critical&amp;id=69cad4ace6bfc5ba1d651178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30307-na-4ce41ceb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30307%3A%20n%2Fa&amp;severity=critical&amp;id=69cacda7e6bfc5ba1d6188b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29872-na-eca84de0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29872%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29925-na-684bc216</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29925%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29924-na-58efd28c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29924%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30077-na-c0138794</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30077%3A%20n%2Fa&amp;severity=high&amp;id=69cab88de6bfc5ba1d56ff26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29954-na-ffb2524c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29954%3A%20n%2Fa&amp;severity=high&amp;id=69caa6f9e6bfc5ba1d4dfd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29909-na-552e3807</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29909%3A%20n%2Fa&amp;severity=medium&amp;id=69caa6f9e6bfc5ba1d4dfd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-30-67c01efa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-30&amp;severity=low&amp;id=69caa6f0e6bfc5ba1d4dfb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33643-na-14732c9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33643%3A%20n%2Fa&amp;severity=high&amp;id=69caa378e6bfc5ba1d4bb8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30556-na-352c7804</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30556%3A%20n%2Fa&amp;severity=medium&amp;id=69caa378e6bfc5ba1d4bb8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29953-na-34aa1f9b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29953%3A%20n%2Fa&amp;severity=high&amp;id=69caa378e6bfc5ba1d4bb8b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34472-na-951eb9f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34472%3A%20n%2Fa&amp;severity=high&amp;id=69ca9c6fe6bfc5ba1d4725b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30562-na-d8e97f9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30562%3A%20n%2Fa&amp;severity=critical&amp;id=69ca9c6fe6bfc5ba1d4725ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30561-na-7eb11893</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30561%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30560-na-da409bb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30560%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30559-na-24a2fd68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30559%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30558-na-d1116e3c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30558%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30557-na-4d52faa3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30557%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d47259e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29597-na-2ce820bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29597%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d472599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33373-na-22e2186d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33373%3A%20n%2Fa&amp;severity=high&amp;id=69ca9568e6bfc5ba1d43cfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30566-na-30d77aa8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30566%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30565-na-d2474f6a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30565%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30564-na-dd3b9500</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30564%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30563-na-22b162a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30563%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30082-na-75c73eab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30082%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5101-command-injection-in-totolink-a3300r-08bf6741</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5101%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4176-cwe-1395-dependency-on-vulnerable-th-556b643e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4176%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20SHAY%20perl&amp;severity=critical&amp;id=69c994c1e6bfc5ba1d0997a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4946-cwe-78-improper-neutralization-of-sp-c53cae64</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4946%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20NSA%20Ghidra&amp;severity=high&amp;id=69c9832de6bfc5ba1dd34820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0558-cwe-287-improper-authentication-in-p-51fddf90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0558%3A%20CWE-287%20Improper%20Authentication%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc8618d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0560-cwe-918-server-side-request-forgery--5103940b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0560%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc86191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0562-cwe-863-incorrect-authorization-in-p-77e45474</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0562%3A%20CWE-863%20Incorrect%20Authorization%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc86195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34005-cwe-78-improper-neutralization-of-s-b117df4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34005%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Xiongmai%20DVR%2FNVR%20devices&amp;severity=high&amp;id=69c95e2e919ccadcdf40cfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5046-stack-based-buffer-overflow-in-tenda-7d25f76d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5046%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=69c93781919ccadcdf2a290a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5045-stack-based-buffer-overflow-in-tenda-2a8bfe4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5045%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=69c92cf6919ccadcdf22c137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5044-stack-based-buffer-overflow-in-belki-0a467880</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5044%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c91b64919ccadcdf191739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5043-stack-based-buffer-overflow-in-belki-d08945f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5043%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c90d85919ccadcdf10f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5042-stack-based-buffer-overflow-in-belki-bbfacd19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5042%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c902c8919ccadcdf09eac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-threat-landscape-digest-january-february-2026-5b11ad26</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Threat%20Landscape%20Digest%20January-February%202026&amp;severity=medium&amp;id=69c9885ae6bfc5ba1ddc37cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5041-command-injection-in-code-projects-c-82c5a99c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5041%3A%20Command%20Injection%20in%20code-projects%20Chamber%20of%20Commerce%20Membership%20Management%20System&amp;severity=medium&amp;id=69c8f839919ccadcdf040e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5037-stack-based-buffer-overflow-in-mxml-e2721322</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5037%3A%20Stack-based%20Buffer%20Overflow%20in%20mxml&amp;severity=medium&amp;id=69c8ea29919ccadcdffae6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5036-stack-based-buffer-overflow-in-tenda-210df5d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5036%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%204G06&amp;severity=high&amp;id=69c8dc1a919ccadcdfea42e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5035-sql-injection-in-code-projects-accou-b844fbad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5035%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8d18d919ccadcdfe4513a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5034-sql-injection-in-code-projects-accou-4be3d339</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5034%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8c37e919ccadcdfda1ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5033-sql-injection-in-code-projects-accou-9e1a8bbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5033%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8bc76919ccadcdfd4fa04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5031-improper-control-of-resource-identif-e4390a28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5031%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69c8b56e919ccadcdfd0c4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5030-command-injection-in-totolink-nr1800-e137d8f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5030%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=medium&amp;id=69c8aaee919ccadcdfb97398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5024-stack-based-buffer-overflow-in-d-lin-e70f155a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5024%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69c89cd1919ccadcdfa20329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5023-os-command-injection-in-dedeveloper2-cc03c992</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5023%3A%20OS%20Command%20Injection%20in%20DeDeveloper23%20codebase-mcp&amp;severity=medium&amp;id=69c88b3d919ccadcdf8ee47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2602-cwe-79-improper-neutralization-of-in-4cab52e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2602%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twentig%20Twentig%20Supercharged%20Block%20Editor%20%E2%80%93%20Blocks%2C%20Patterns%2C%20Starter%20Sites%2C%20Portfolio&amp;severity=medium&amp;id=69c88b3d919ccadcdf8ee47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5021-stack-based-buffer-overflow-in-tenda-f1fb8811</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5021%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c880b1919ccadcdf7c0d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5020-command-injection-in-totolink-a3600r-b468734a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5020%3A%20Command%20Injection%20in%20Totolink%20A3600R&amp;severity=medium&amp;id=69c879aa919ccadcdf6dd167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4851-cwe-502-deserialization-of-untrusted-4ee6eb90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4851%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20CASIANO%20GRID%3A%3AMachine&amp;severity=critical&amp;id=69c879aa919ccadcdf6dd163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-29-3c380d68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-29&amp;severity=medium&amp;id=69c9bee8e6bfc5ba1d520a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-29-d62cc526</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-29&amp;severity=medium&amp;id=69c98a2ce6bfc5ba1dddddec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-29-d4ae1112</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-29&amp;severity=low&amp;id=69c8fbb6919ccadcdf066a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5019-sql-injection-in-code-projects-simpl-bb8230db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5019%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c86817919ccadcdf560eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5018-sql-injection-in-code-projects-simpl-fa1c2f64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5018%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c85a06919ccadcdf4a2818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5017-sql-injection-in-code-projects-simpl-b274ffdd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5017%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c85a06919ccadcdf4a2811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5016-server-side-request-forgery-in-elecv-d734b993</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5016%3A%20Server-Side%20Request%20Forgery%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c84f7c919ccadcdf355adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5015-cross-site-scripting-in-elecv2-elecv-a07712f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5015%3A%20Cross%20Site%20Scripting%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c844ee919ccadcdf10d93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5014-path-traversal-in-elecv2-elecv2p-4b247b7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5014%3A%20Path%20Traversal%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c844ee919ccadcdf10d937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5013-path-traversal-in-elecv2-elecv2p-4c235acc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5013%3A%20Path%20Traversal%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c83c4f919ccadcdf051ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5012-os-command-injection-in-elecv2-elecv-a675e27e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5012%3A%20OS%20Command%20Injection%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c82a1b2b68dbd88eb19d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3256-cwe-340-generation-of-predictable-nu-ad49460d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3256%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20KTAT%20HTTP%3A%3ASession&amp;severity=critical&amp;id=69c826972b68dbd88eafb4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15604-cwe-340-generation-of-predictable-n-ca970ba1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15604%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20Amon2&amp;severity=critical&amp;id=69c823142b68dbd88eadbff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5011-code-injection-in-elecv2-elecv2p-e0ba6ef3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5011%3A%20Code%20Injection%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c823142b68dbd88eadc006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5007-os-command-injection-in-kazuph-mcp-d-8c5548a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5007%3A%20OS%20Command%20Injection%20in%20kazuph%20mcp-docs-rag&amp;severity=medium&amp;id=69c823142b68dbd88eadbffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5004-stack-based-buffer-overflow-in-wavli-7ae39014</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5004%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-WN579X3-C&amp;severity=high&amp;id=69c811842b68dbd88ea326b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5003-information-disclosure-in-promtengin-b6513727</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5003%3A%20Information%20Disclosure%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c811842b68dbd88ea326aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5002-injection-in-promtengineer-localgpt-1aabfd3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5002%3A%20Injection%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c80a782b68dbd88e9f987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cunning-predator-how-silver-fox-preys-on-japanes-697603f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20cunning%20predator%3A%20How%20Silver%20Fox%20preys%20on%20Japanese%20firms%20this%20tax%20season&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5001-unrestricted-upload-in-promtengineer-271f0511</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5001%3A%20Unrestricted%20Upload%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c7ffec2b68dbd88e794fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-003-operation-0ad14f82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20003%20-%20Operational%20Tempo%20Shift%20as%20Campaign%20Enters%20Monetization%20Phase%20With%20No%20New%20Compromises%20in%2048%20Hours%2C%20(Sat%2C%20Mar%2028th)&amp;severity=medium&amp;id=69c7f1db2b68dbd88e3e35d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5000-missing-authentication-in-promtengin-3eea2599</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5000%3A%20Missing%20Authentication%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c7ee562b68dbd88e316160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4999-path-traversal-in-z-9527-admin-04e5407b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4999%3A%20Path%20Traversal%20in%20z-9527%20admin&amp;severity=medium&amp;id=69c7ee562b68dbd88e31615a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4998-code-injection-in-sinaptik-ai-pandas-fd0c98b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4998%3A%20Code%20Injection%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7d9402b68dbd88efcd7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4997-path-traversal-in-sinaptik-ai-pandas-33b63c5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4997%3A%20Path%20Traversal%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7ceb42b68dbd88ef8dca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4996-sql-injection-in-sinaptik-ai-pandasa-a62f3dcb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4996%3A%20SQL%20Injection%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7c0a42b68dbd88ef18cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2595-cwe-79-improper-neutralization-of-in-ec76e7d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2595%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpquads%20Quads%20Ads%20Manager%20for%20Google%20AdSense&amp;severity=medium&amp;id=69c7bd322b68dbd88eeee801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9497-cwe-798-use-of-hard-coded-credential-05235081</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9497%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Microchip%20Time%20Provider%204100&amp;severity=medium&amp;id=69c7b6162b68dbd88eeae170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4995-cross-site-scripting-in-wandb-openui-72ab2620</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4995%3A%20Cross%20Site%20Scripting%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c7b2942b68dbd88ee17702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-themed-clickfix-attack-drops-infiniti-s-89c85cac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare-Themed%20ClickFix%20Attack%20Drops%20Infiniti%20Stealer%20on%20Macs&amp;severity=medium&amp;id=69c7af0f2b68dbd88edf21e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2442-cwe-93-improper-neutralization-of-cr-39aa3590</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2442%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=69c7a4822b68dbd88ed883f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4994-information-exposure-through-error-m-a1e2e3d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4994%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c83c4f919ccadcdf051abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4993-hard-coded-credentials-in-wandb-open-34206a49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4993%3A%20Hard-coded%20Credentials%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c83c4f919ccadcdf051ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telnyx-python-sdk-compromised-to-deliver-credentia-c990c297</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telnyx%20Python%20SDK%20Compromised%20to%20Deliver%20Credential-Stealing%20Malware&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-data-leaks-technical-analysis-and-tim-0df146b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Data%20Leaks%3A%20Technical%20Analysis%20and%20Timeline%20Attribution%20(2022%E2%80%932026)&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1307-cwe-200-exposure-of-sensitive-inform-15467f36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1307%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=69c77dd62b68dbd88eb19528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15445-cwe-862-missing-authorization-in-re-ebaf3148</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15445%3A%20CWE-862%20Missing%20Authorization%20in%20Restaurant%20Cafeteria&amp;severity=medium&amp;id=69c7734a2b68dbd88eabfb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12886-cwe-918-server-side-request-forgery-f4b6fece</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12886%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Laborator%20Oxygen%20-%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=69c74c9e2b68dbd88e79ce13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4987-cwe-20-improper-input-validation-in--6438ea07</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4987%3A%20CWE-20%20Improper%20Input%20Validation%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=high&amp;id=69c7307f2b68dbd88e6742d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-28-cf9131f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-28&amp;severity=medium&amp;id=69c86f15919ccadcdf5b95ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-28-e71c94e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-28&amp;severity=medium&amp;id=69c7e03f2b68dbd88effa8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-28-c40eedd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-28&amp;severity=low&amp;id=69c7501a2b68dbd88e7d74a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1679-buffer-copy-without-checking-size-of-5ca8f17f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1679%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=69c7145f2b68dbd88e5638f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4248-cwe-285-improper-authorization-in-ul-0446e863</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4248%3A%20CWE-285%20Improper%20Authorization%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=high&amp;id=69c706502b68dbd88e324709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33996-cwe-476-null-pointer-dereference-in-d8cb8d7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33996%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20benmcollins%20libjwt&amp;severity=medium&amp;id=69c706502b68dbd88e324705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33994-cwe-1321-improperly-controlled-modi-7ca08c52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33994%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33993-cwe-1321-improperly-controlled-modi-474a6f4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33993%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33991-cwe-89-improper-neutralization-of-s-585124c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33991%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69c702cd2b68dbd88e2edf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33936-cwe-20-improper-input-validation-in-2b6599fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33936%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tlsfuzzer%20python-ecdsa&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4992-cross-site-scripting-in-wandb-openui-e8f6e690</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4992%3A%20Cross%20Site%20Scripting%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4991-cross-site-scripting-in-qdocs-smart--297c25d4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4991%3A%20Cross%20Site%20Scripting%20in%20QDOCS%20Smart%20School%20Management%20System&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33989-cwe-22-improper-limitation-of-a-pat-761e1467</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33989%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mobile-next%20mobile-mcp&amp;severity=high&amp;id=69c6ff482b68dbd88e2a92a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33981-cwe-200-exposure-of-sensitive-infor-608754f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33981%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69c6ff482b68dbd88e2a929d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33980-cwe-943-improper-neutralization-of--dc16a759</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33980%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20pab1it0%20adx-mcp-server&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33979-cwe-183-permissive-list-of-allowed--75ae3464</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33979%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20AhmedAdelFahim%20express-xss-sanitizer&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33955-cwe-79-improper-neutralization-of-i-04111b1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33955%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20Notesnook%20Web%2FDesktop&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4990-improper-authorization-in-chatwoot-9cefc3d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4990%3A%20Improper%20Authorization%20in%20chatwoot&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4988-denial-of-service-in-open5gs-42cbf14d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4988%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4985-integer-overflow-in-dloebl-cgif-5e373785</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4985%3A%20Integer%20Overflow%20in%20dloebl%20CGIF&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33976-cwe-79-improper-neutralization-of-i-cedece5d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33976%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20Notesnook%20Web%2FDesktop&amp;severity=critical&amp;id=69c6fa4f3c064ed76ffa5f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33954-cwe-285-improper-authorization-in-k-60cf3f7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33954%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33953-cwe-918-server-side-request-forgery-aa47dbeb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33953%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27309-use-after-free-cwe-416-in-adobe-sub-e8186d78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27309%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33946-cwe-384-session-fixation-in-modelco-507e7510</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33946%3A%20CWE-384%3A%20Session%20Fixation%20in%20modelcontextprotocol%20ruby-sdk&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34226-cwe-201-insertion-of-sensitive-info-59be2af2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34226%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33943-cwe-94-improper-control-of-generati-83e18bd5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33943%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33941-cwe-79-improper-neutralization-of-i-0c3a00bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33941%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33940-cwe-94-improper-control-of-generati-e76af596</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33940%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33939-cwe-754-improper-check-for-unusual--3cf356be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33939%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33938-cwe-94-improper-control-of-generati-a3f5c858</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33938%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f3473c064ed76ff618a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33937-cwe-843-access-of-resource-using-in-5708b559</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33937%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=critical&amp;id=69c6f3473c064ed76ff618a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33916-cwe-79-improper-neutralization-of-i-5e8c53a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33916%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=medium&amp;id=69c6f3473c064ed76ff6189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33907-cwe-476-null-pointer-dereference-in-c5f76ee9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33907%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6f3473c064ed76ff61897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33906-cwe-269-improper-privilege-manageme-512598f2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33906%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ellanetworks%20core&amp;severity=high&amp;id=69c6f3473c064ed76ff61892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33904-cwe-833-deadlock-in-ellanetworks-co-00359507</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33904%3A%20CWE-833%3A%20Deadlock%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6f3473c064ed76ff6188d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33903-cwe-476-null-pointer-dereference-in-3ccc04e0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33903%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6efd03c064ed76ff473fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33896-cwe-295-improper-certificate-valida-cdbadd36</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33896%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efd03c064ed76ff473f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33895-cwe-347-improper-verification-of-cr-95f9ae6f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33895%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33894-cwe-347-improper-verification-of-cr-a7043394</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33894%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33891-cwe-835-loop-with-unreachable-exit--0b104492</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33891%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32187-defense-in-depth-in-microsoft-micro-ee466c6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32187&amp;severity=null&amp;id=69c6efce3c064ed76ff462cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33887-cwe-862-missing-authorization-in-st-d67a668d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33887%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33886-cwe-200-exposure-of-sensitive-infor-6b040762</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33886%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33885-cwe-601-url-redirection-to-untruste-93d7d876</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33885%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33884-cwe-863-incorrect-authorization-in--b5e8a17b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33884%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33883-cwe-79-improper-neutralization-of-i-0694226b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33883%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33882-cwe-20-improper-input-validation-in-7a276760</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33882%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33881-cwe-94-improper-control-of-generati-d4c95438</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33881%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20windmill-labs%20windmill&amp;severity=high&amp;id=69c6ec5f3c064ed76ff25048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33879-cwe-307-improper-restriction-of-exc-fb0fa8de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33879%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20londonaicentre%20FLIP&amp;severity=low&amp;id=69c6ec5f3c064ed76ff25045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4976-buffer-overflow-in-totolink-lr350-f0bc237b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4976%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=69c6ec5f3c064ed76ff2504b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33875-cwe-940-improper-verification-of-so-189b5f61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33875%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20gematik%20app-Authenticator&amp;severity=critical&amp;id=69c6ec5f3c064ed76ff25042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33874-cwe-78-improper-neutralization-of-s-4c942ed9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33874%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20gematik%20app-Authenticator&amp;severity=high&amp;id=69c6ec5f3c064ed76ff2503c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34046-cwe-639-authorization-bypass-throug-a0ee16dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34046%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c6e8bb3c064ed76ff077d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33873-cwe-94-improper-control-of-generati-cafbe4ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33873%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c6e8bb3c064ed76ff077be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33872-cwe-362-concurrent-execution-using--727f216c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33872%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20revelrylabs%20elixir-nodejs&amp;severity=high&amp;id=69c6e53a3c064ed76fede072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4975-stack-based-buffer-overflow-in-tenda-817f95ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4975%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69c6e53a3c064ed76fede086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4974-stack-based-buffer-overflow-in-tenda-15d8d9aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4974%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=69c6e53a3c064ed76fede07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4973-cross-site-scripting-in-sourcecodest-f50d41d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4973%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Quiz%20System&amp;severity=medium&amp;id=69c6e53a3c064ed76fede078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33765-cwe-78-improper-neutralization-of-s-3a7427e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33765%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20web&amp;severity=high&amp;id=69c6e1b93c064ed76febd417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33654-cwe-94-improper-control-of-generati-c2cfed7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33654%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20HKUDS%20nanobot&amp;severity=high&amp;id=69c6e1b93c064ed76febd414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34205-cwe-923-improper-restriction-of-com-dfad0bbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34205%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20home-assistant%20Home%20Assistant%20Operating%20System&amp;severity=critical&amp;id=69c6e1b93c064ed76febd41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34475-cwe-180-incorrect-behavior-order-va-77fc7370</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34475%3A%20CWE-180%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69c6e1b93c064ed76febd41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33045-cwe-79-improper-neutralization-of-i-245e58ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33045%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20home-assistant%20core&amp;severity=high&amp;id=69c6e1b93c064ed76febd410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33044-cwe-79-improper-neutralization-of-i-8931a13c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33044%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20home-assistant%20core&amp;severity=high&amp;id=69c6e1b93c064ed76febd40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32241-cwe-77-improper-neutralization-of-s-5b167894</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32241%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20flannel-io%20flannel&amp;severity=high&amp;id=69c6de373c064ed76fea1d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31951-cwe-200-exposure-of-sensitive-infor-2658a252</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31951%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69c6de373c064ed76fea1d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31950-cwe-284-improper-access-control-in--9692bdfc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31950%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69c6de373c064ed76fea1d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31945-cwe-918-server-side-request-forgery-6d761e69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31945%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69c6de373c064ed76fea1d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31943-cwe-918-server-side-request-forgery-37c34fc7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31943%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69c6de373c064ed76fea1d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34391-cwe-488-exposure-of-data-element-to-d0ca6277</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34391%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6de373c064ed76fea1d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34389-cwe-287-improper-authentication-in--a644a652</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34389%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6de373c064ed76fea1d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4972-cross-site-scripting-in-code-project-71861764</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4972%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4971-cross-site-request-forgery-in-source-69d6fee6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4971%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Note%20Taking%20App&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34388-cwe-703-improper-check-or-handling--939ff080</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34388%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-infrastructure-supply-chain-poisoning-alert-0bea3b94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Infrastructure%20Supply%20Chain%20Poisoning%20Alert&amp;severity=medium&amp;id=69c6de343c064ed76fea1bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aitm-phishing-targets-tiktok-business-accounts-usi-bb5b2f91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AitM%20Phishing%20Targets%20TikTok%20Business%20Accounts%20Using%20Cloudflare%20Turnstile%20Evasion&amp;severity=medium&amp;id=69c6de343c064ed76fea1be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bogus-website-fakes-virus-scan-installs-venom-stea-59949404</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bogus%20website%20fakes%20virus%20scan%2C%20installs%20Venom%20Stealer%20instead&amp;severity=medium&amp;id=69d636951cc7ad14da612bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34387-cwe-78-improper-neutralization-of-s-b0d45cde</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34387%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34386-cwe-89-improper-neutralization-of-s-4c1e8f40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34386%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34385-cwe-89-improper-neutralization-of-s-b5e82d09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34385%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29180-cwe-862-missing-authorization-in-fl-da4570c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29180%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4970-sql-injection-in-code-projects-socia-1b1f86da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4970%3A%20SQL%20Injection%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=69c6d0203c064ed76fe28e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4969-cross-site-scripting-in-code-project-e2e4a1f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4969%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=69c6d0203c064ed76fe28e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26061-cwe-770-allocation-of-resources-wit-73916d43</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26061%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20fleetdm%20fleet&amp;severity=high&amp;id=69c6d01e3c064ed76fe28e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26060-cwe-613-insufficient-session-expira-e9113065</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26060%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34375-cwe-79-improper-neutralization-of-i-f0b41eba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34375%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6d01e3c064ed76fe28e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34374-cwe-89-improper-neutralization-of-s-171f2208</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34374%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c6d01e3c064ed76fe28e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15612-cwe-295-improper-certificate-valida-2a970739</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15612%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Wazuh%20Wazuh%20Provisioning%20Scripts%20(Agent%20Build%20Environment)&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34369-cwe-862-missing-authorization-in-ww-b48b43d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34369%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34368-cwe-362-concurrent-execution-using--5d1f951f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34368%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6c9173c064ed76fdf38a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34364-cwe-863-incorrect-authorization-in--077b2b46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34364%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6c9173c064ed76fdf389d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15617-cwe-522-insufficiently-protected-cr-9454fac7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15617%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Wazuh%20Wazuh%20(GitHub%20Actions)&amp;severity=medium&amp;id=69c6c9173c064ed76fdf3893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4968-cross-site-request-forgery-in-source-af9ec2e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4968%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Diary%20App&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4966-sql-injection-in-itsourcecode-free-h-6dc1800b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4966%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c6c5913c064ed76fdb177b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4965-improper-neutralization-of-directive-9aea4106</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4965%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20letta-ai%20letta&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4964-server-side-request-forgery-in-letta-1bb98fde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4964%3A%20Server-Side%20Request%20Forgery%20in%20letta-ai%20letta&amp;severity=medium&amp;id=69c6c6913c064ed76fdc2946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4963-code-injection-in-huggingface-smolag-98db0746</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4963%3A%20Code%20Injection%20in%20huggingface%20smolagents&amp;severity=medium&amp;id=69c6c6913c064ed76fdc293d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4962-uncontrolled-search-path-in-ultravnc-34124aea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4962%3A%20Uncontrolled%20Search%20Path%20in%20UltraVNC&amp;severity=high&amp;id=69c6c5913c064ed76fdb178d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34362-cwe-613-insufficient-session-expira-8dde0450</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34362%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-iranian-hacking-group-claims-credit-for-hack-o-60a43961</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Iranian%20Hacking%20Group%20Claims%20Credit%20for%20Hack%20of%20FBI%20Director%20Kash%20Patel%E2%80%99s%20Personal%20Account&amp;severity=medium&amp;id=69c6b3fd3c064ed76fc55bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34247-cwe-862-missing-authorization-in-ww-01b2864d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34247%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15616-cwe-94-improper-control-of-generati-f69b8211</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15616%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Wazuh%20wazuh-agent&amp;severity=high&amp;id=69c6b7823c064ed76fc77d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34245-cwe-862-missing-authorization-in-ww-218357cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34245%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33867-cwe-312-cleartext-storage-of-sensit-e9914632</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33867%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c6b7823c064ed76fc77daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15615-cwe-276-incorrect-default-permissio-6c55aec2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15615%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Wazuh%20wazuh-manager&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15381-cwe-200-exposure-of-sensitive-infor-58cdecb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15381%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69c6c6913c064ed76fdc294c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33770-cwe-89-improper-neutralization-of-s-48be2040</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33770%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6c6913c064ed76fdc2961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28369-inconsistent-interpretation-of-http-710a6b03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28369%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc2957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28367-inconsistent-interpretation-of-http-86cc39b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28367%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc294f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28368-inconsistent-interpretation-of-http-8e8a214c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28368%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc2953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33767-cwe-89-improper-neutralization-of-s-be3257f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33767%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6c20e3c064ed76fce99b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4961-stack-based-buffer-overflow-in-tenda-7613bc02</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4961%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=69c6c20e3c064ed76fce99b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4960-stack-based-buffer-overflow-in-tenda-f1d5709e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4960%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=69c6c6913c064ed76fdc2965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32983-cwe-276-incorrect-default-permissio-2038176e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32983%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Wazuh%20wazuh-manager&amp;severity=medium&amp;id=69c6a9723c064ed76fbf9381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4959-missing-authentication-in-openbmb-xa-57f06968</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4959%3A%20Missing%20Authentication%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69c6a9723c064ed76fbf938c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4958-authorization-bypass-in-openbmb-xage-e355a4dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4958%3A%20Authorization%20Bypass%20in%20OpenBMB%20XAgent&amp;severity=low&amp;id=69c6a9723c064ed76fbf9385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/most-notable-supply-chain-attacks-of-2025-kaspersk-65bf714a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Most%20notable%20supply-chain%20attacks%20of%202025%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c69b673c064ed76fb8319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5027-cwe-22-improper-limitation-of-a-path-965c6426</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5027%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c69ee73c064ed76fb956b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4957-sensitive-information-in-log-files-i-50f0bde8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4957%3A%20Sensitive%20Information%20in%20Log%20Files%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69c69ee73c064ed76fb956aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4956-sql-injection-in-shenzhen-ruiming-te-2de04042</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4956%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c69ee73c064ed76fb956a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4955-sql-injection-in-shenzhen-ruiming-te-8eb7713e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4955%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c69ee73c064ed76fb9569d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5026-cwe-79-improper-neutralization-of-in-c75988b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5026%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c69ee73c064ed76fb956b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5025-cwe-862-missing-authorization-in-lan-fcc5962e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5025%3A%20CWE-862%20Missing%20Authorization%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69c69ee73c064ed76fb956b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5010-cwe-79-improper-neutralization-of-in-055aca8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5010%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Sanoma%20Clickedu&amp;severity=medium&amp;id=69c697e13c064ed76fb722b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-002-telnyx-py-dd315e4a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20002%20-%20Telnyx%20PyPI%20Compromise%2C%20Vect%20Ransomware%20Mass%20Affiliate%20Program%2C%20and%20First%20Named%20Victim%20Claim%2C%20(Fri%2C%20Mar%2027th)&amp;severity=medium&amp;id=69c694683c064ed76fb59f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5022-cwe-862-missing-authorization-in-lan-00d95863</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5022%3A%20CWE-862%20Missing%20Authorization%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69c697e33c064ed76fb722dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33766-cwe-918-server-side-request-forgery-f241f712</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33766%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33764-cwe-639-authorization-bypass-throug-9632a444</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33764%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-palo-alto-recruiter-scam-anti-deepfa-9f373486</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Palo%20Alto%20Recruiter%20Scam%2C%20Anti-Deepfake%20Chip%2C%20Google%20Sets%202029%20Quantum%20Deadline&amp;severity=medium&amp;id=69c6945a3c064ed76fb59acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33763-cwe-307-improper-restriction-of-exc-a4e305cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33763%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27876-vulnerability-in-grafana-grafana-en-b51cbbf8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27876%3A%20Vulnerability%20in%20Grafana%20Grafana%20Enterprise&amp;severity=critical&amp;id=69c697e13c064ed76fb72296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33761-cwe-862-missing-authorization-in-ww-8ddf3006</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33761%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33759-cwe-862-missing-authorization-in-ww-e274f6e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33759%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb7229c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1496-cwe-639-authorization-bypass-through-d8c09de9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1496%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Black%20Duck%20Coverity&amp;severity=critical&amp;id=69c694993c064ed76fb5b666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4954-sql-injection-in-mingsoft-mcms-4f540294</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4954%3A%20SQL%20Injection%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4953-server-side-request-forgery-in-mings-e5843174</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4953%3A%20Server-Side%20Request%20Forgery%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11604-cwe-532-insertion-of-sensitive-info-df89216d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11604%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20OpenText%20IDM%20Driver%20and%20Extensions&amp;severity=high&amp;id=69c694993c064ed76fb5b65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33755-cwe-89-improper-neutralization-of-s-75a40d5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33755%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=69c6949b3c064ed76fb5b753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33750-cwe-400-uncontrolled-resource-consu-59607088</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33750%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20juliangruber%20brace-expansion&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33748-cwe-22-improper-limitation-of-a-pat-59db9529</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33748%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moby%20buildkit&amp;severity=high&amp;id=69c6949b3c064ed76fb5b742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33284-cwe-20-improper-input-validation-in-ead42146</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33284%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20globaleaks%20globaleaks-whistleblowing-software&amp;severity=low&amp;id=69c694993c064ed76fb5b681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33206-cwe-23-relative-path-traversal-in-k-107aaef1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33206%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69c694993c064ed76fb5b67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33205-cwe-918-server-side-request-forgery-a841d997</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33205%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69c694993c064ed76fb5b67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13478-cwe-522-insufficiently-protected-cr-a00443b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13478%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20OpenText%20Identity%20Manager&amp;severity=high&amp;id=69c68d533c064ed76fb2aba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32859-cwe-79-improper-neutralization-of-i-bce14615</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32859%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Bytedance%20Inc.%20DeerFlow&amp;severity=medium&amp;id=69c68d533c064ed76fb2aba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4982-cwe-20-improper-input-validation-in--05602973</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4982%3A%20CWE-20%20Improper%20input%20validation%20in%20pretix%20Venueless&amp;severity=high&amp;id=69c67f433c064ed76facb4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4620-cwe-78-improper-neutralization-of-sp-aca82dd8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4620%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WX1500HP&amp;severity=high&amp;id=69c674b53c064ed76fa619de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4622-cwe-78-improper-neutralization-of-sp-3939268a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4622%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WG2600HS&amp;severity=high&amp;id=69c674b53c064ed76fa619e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4621-cwe-912-hidden-functionality-in-nec--04a5c93b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4621%3A%20CWE-912%3A%20Hidden%20Functionality%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20W1200EX(-MS)&amp;severity=medium&amp;id=69c674b53c064ed76fa619e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4619-cwe-22-improper-limitation-of-a-path-83322c52</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4619%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WX3600HP&amp;severity=medium&amp;id=69c671313c064ed76fa3fd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4309-cwe-862-missing-authorization-in-nec-06bc0ccd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4309%3A%20CWE-862%3A%20Missing%20Authorization%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20W1200EX(-MS)&amp;severity=medium&amp;id=69c671313c064ed76fa3fd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-high-severity-router-vulnerabiliti-8c193f30</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20High-Severity%20Router%20Vulnerabilities&amp;severity=high&amp;id=69c66dad3c064ed76fa11cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coruna-ios-exploit-kit-likely-an-update-to-operati-9113ab40</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coruna%20iOS%20Exploit%20Kit%20Likely%20an%20Update%20to%20Operation%20Triangulation&amp;severity=medium&amp;id=69c65f9d3c064ed76f950c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-ptc-vulnerability-that-had-ger-e5854258</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20PTC%20Vulnerability%20That%20Had%20German%20Police%20Mobilized&amp;severity=critical&amp;id=69c64e093c064ed76f7d2b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3457-cwe-79-improper-neutralization-of-in-6c12ff4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Thales%20Sentinel%20LDK%20Runtime&amp;severity=high&amp;id=69c64a8f3c064ed76f7aa1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-keitaro-abuse-part-2-one-platform-many-thre-3d831901</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Keitaro%20Abuse%20Part%202%3A%20One%20Platform%2C%20Many%20Threats&amp;severity=medium&amp;id=69c6518c3c064ed76f7f61aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brushworm-and-brushlogger-uncovered-415a1fb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BRUSHWORM%20and%20BRUSHLOGGER%20uncovered&amp;severity=medium&amp;id=69c6518c3c064ed76f7f6213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27860-improper-neutralization-of-special--6360e1c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27860%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=low&amp;id=69c63ffd3c064ed76f701ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27859-uncontrolled-resource-consumption-i-fe0e60ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27859%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27858-uncontrolled-resource-consumption-i-4ea18f33</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27858%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27857-uncontrolled-resource-consumption-i-0011fc23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27857%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27856-improper-authentication-in-open-xch-d601837d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27856%3A%20Improper%20Authentication%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27855-authentication-bypass-by-capture-re-77b5e888</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27855%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24031-improper-neutralization-of-special--f2f4e9b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24031%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0394-improper-limitation-of-a-pathname-to-145c4555</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0394%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59032-improper-input-validation-in-open-x-bd435fc8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59032%3A%20Improper%20Input%20Validation%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59031-exposure-of-sensitive-information-t-20c26aad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59031%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59028-improper-input-validation-in-open-x-87a912ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59028%3A%20Improper%20Input%20Validation%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14028-cwe-416-use-after-free-in-softing-s-b6d4a86a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14028%3A%20CWE-416%20Use%20after%20free%20in%20Softing%20smartLink%20HW-DP&amp;severity=medium&amp;id=69c61cf33c064ed76f58580c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22744-vulnerability-in-spring-spring-ai-8d7a4912</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22744%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22743-vulnerability-in-spring-spring-ai-78da137c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22743%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4948-incorrect-execution-assigned-permiss-0bd6a078</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4948%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c61cf33c064ed76f58582d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22742-vulnerability-in-spring-spring-ai-76d7852f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22742%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33366-missing-authentication-for-critical-004c493d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33366%3A%20Missing%20authentication%20for%20critical%20function%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=medium&amp;id=69c61cf33c064ed76f585829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33280-hidden-functionality-in-buffalo-inc-cfe45036</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33280%3A%20Hidden%20functionality%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32678-authentication-bypass-using-an-alte-3ed7b3d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32678%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32669-code-injection-in-buffalo-inc-buffa-9c341c29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32669%3A%20Code%20injection%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f58581d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27650-improper-neutralization-of-special--be872db1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27650%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22738-vulnerability-in-spring-spring-ai-473dec2d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22738%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=critical&amp;id=69c615c93c064ed76f536685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33559-cross-site-scripting-xss-in-mika-op-88322545</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33559%3A%20Cross-site%20scripting%20(XSS)%20in%20MiKa%20OpenStreetMap&amp;severity=medium&amp;id=69c615c93c064ed76f536688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3098-cwe-862-missing-authorization-in-nex-82bd35df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3098%3A%20CWE-862%20Missing%20Authorization%20in%20nextendweb%20Smart%20Slider%203&amp;severity=medium&amp;id=69c6c6933c064ed76fdc2987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4910-sql-injection-in-shenzhen-ruiming-te-af03ad8b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4910%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c66dbb3c064ed76fa122ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4909-cross-site-scripting-in-code-project-c59d5b0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4909%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c5ef1e3c064ed76f1376f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4908-sql-injection-in-code-projects-simpl-05928344</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4908%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c5ef1e3c064ed76f1376e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4907-server-side-request-forgery-in-page--8799229c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4907%3A%20Server-Side%20Request%20Forgery%20in%20Page-Replica%20Page%20Replica&amp;severity=medium&amp;id=69c6949d3c064ed76fb5b813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4906-stack-based-buffer-overflow-in-tenda-f24bafca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4906%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5da053c064ed76f01c452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33747-cwe-22-improper-limitation-of-a-pat-6a030cf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33747%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moby%20buildkit&amp;severity=high&amp;id=69c5da053c064ed76f01c442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33745-cwe-200-exposure-of-sensitive-infor-23c6c791</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33745%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69c5da053c064ed76f01c43f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33935-cwe-307-improper-restriction-of-exc-874ceb6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33935%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33890-cwe-284-improper-access-control-in--d138f9e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33890%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33735-cwe-285-improper-authorization-in-f-ea8d45fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33735%3A%20CWE-285%3A%20Improper%20Authorization%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33728-cwe-502-deserialization-of-untruste-d41c376a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33728%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20DataDog%20dd-trace-java&amp;severity=critical&amp;id=69c5d2fe3c064ed76ff4048b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33693-cwe-918-server-side-request-forgery-0d7a70f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33693%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LemmyNet%20lemmy&amp;severity=medium&amp;id=69c5d2fe3c064ed76ff4047c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33701-cwe-502-deserialization-of-untruste-08578920</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33701%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20open-telemetry%20opentelemetry-java-instrumentation&amp;severity=critical&amp;id=69c5d2fe3c064ed76ff40486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30568-na-c7d5136b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30568%3A%20n%2Fa&amp;severity=medium&amp;id=69c6c9173c064ed76fdf389a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30567-na-34ea507a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30567%3A%20n%2Fa&amp;severity=medium&amp;id=69c6c9173c064ed76fdf3897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30576-na-4a704b17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30576%3A%20n%2Fa&amp;severity=high&amp;id=69c6c6913c064ed76fdc295e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30574-na-1948478e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30574%3A%20n%2Fa&amp;severity=high&amp;id=69c6c6913c064ed76fdc295b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-27-783cd3d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-27&amp;severity=medium&amp;id=69c6c2053c064ed76fce23f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30575-na-ce7a4259</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30575%3A%20n%2Fa&amp;severity=high&amp;id=69c6b7823c064ed76fc77da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30571-na-aad3cfe6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30571%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30570-na-90f13cf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30570%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30569-na-778534d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30569%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30530-na-d795d87c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30530%3A%20n%2Fa&amp;severity=critical&amp;id=69c6acf53c064ed76fc0f14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30529-na-6d76fbec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30529%3A%20n%2Fa&amp;severity=high&amp;id=69c6acf53c064ed76fc0f14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30527-na-0e4ae47d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30527%3A%20n%2Fa&amp;severity=medium&amp;id=69c6acf53c064ed76fc0f149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30531-na-688119ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30531%3A%20n%2Fa&amp;severity=high&amp;id=69c6a9723c064ed76fbf937e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30302-na-b059f73c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30302%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a9723c064ed76fbf937b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30534-na-ad84f286</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30534%3A%20n%2Fa&amp;severity=high&amp;id=69c6a26b3c064ed76fbc6561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30533-na-901e8879</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30533%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a26b3c064ed76fbc655e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30532-na-be24c2b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30532%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a26b3c064ed76fbc655b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29871-na-8b7078d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29871%3A%20n%2Fa&amp;severity=high&amp;id=69c69ee73c064ed76fb9569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30637-na-e7b36711</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30637%3A%20n%2Fa&amp;severity=high&amp;id=69c697e13c064ed76fb72299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69988-na-4a2623b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69988%3A%20n%2Fa&amp;severity=medium&amp;id=69c697e13c064ed76fb72293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61190-na-08db7991</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61190%3A%20n%2Fa&amp;severity=medium&amp;id=69c697e13c064ed76fb7228e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30689-na-60d2c934</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30689%3A%20n%2Fa&amp;severity=high&amp;id=69c694993c064ed76fb5b676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30304-na-c6885618</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30304%3A%20n%2Fa&amp;severity=critical&amp;id=69c694993c064ed76fb5b670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30303-na-37247ce6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30303%3A%20n%2Fa&amp;severity=critical&amp;id=69c694993c064ed76fb5b66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69986-na-107043d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69986%3A%20n%2Fa&amp;severity=high&amp;id=69c694993c064ed76fb5b663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-27-89ac2f2e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-27&amp;severity=low&amp;id=69c635653c064ed76f6845e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33699-cwe-835-loop-with-unreachable-exit--d1313b63</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33699%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69c5d2fe3c064ed76ff40481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27893-cwe-693-protection-mechanism-failur-a0dfde92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27893%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20vllm-project%20vllm&amp;severity=high&amp;id=69c5c8713c064ed76fe63c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33697-cwe-322-key-exchange-without-entity-b574293b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33697%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20ultravioletrs%20cocos&amp;severity=high&amp;id=69c5c8713c064ed76fe63c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33945-cwe-22-improper-limitation-of-a-pat-4b327a65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33945%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20lxc%20incus&amp;severity=critical&amp;id=69c5c16a3c064ed76fe46d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33898-cwe-287-improper-authentication-in--26104083</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33898%3A%20CWE-287%3A%20Improper%20Authentication%20in%20lxc%20incus&amp;severity=high&amp;id=69c5c16a3c064ed76fe46d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4905-stack-based-buffer-overflow-in-tenda-a658b06f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4905%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c66dbb3c064ed76fa122e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4904-stack-based-buffer-overflow-in-tenda-f869e792</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4904%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c6c6933c064ed76fdc298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33897-cwe-1336-improper-neutralization-of-fafd9faa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33897%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20lxc%20incus&amp;severity=critical&amp;id=69c5ba613c064ed76fe1f5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33743-cwe-770-allocation-of-resources-wit-4c38ea14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33743%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33711-cwe-61-unix-symbolic-link-symlink-f-631adb75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33711%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33542-cwe-295-improper-certificate-valida-feeb9042</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33542%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4903-stack-based-buffer-overflow-in-tenda-b9940a9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4903%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5ba613c064ed76fe1f5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4902-stack-based-buffer-overflow-in-tenda-94214df0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4902%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5ba613c064ed76fe1f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4900-files-or-directories-accessible-in-c-df08f42b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4900%3A%20Files%20or%20Directories%20Accessible%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4899-cross-site-scripting-in-code-project-58c2a264</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4899%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33686-cwe-22-improper-limitation-of-a-pat-5344035e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33686%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20code16%20sharp&amp;severity=high&amp;id=69c5ac523c064ed76fd41c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12805-improper-isolation-or-compartmental-96bbe2f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12805%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.25&amp;severity=high&amp;id=69c5ac523c064ed76fd41c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33687-cwe-434-unrestricted-upload-of-file-ceb5ec07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33687%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20code16%20sharp&amp;severity=high&amp;id=69c5ac523c064ed76fd41c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28377-vulnerability-in-grafana-tempo-a7a1aaaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28377%3A%20Vulnerability%20in%20Grafana%20Tempo&amp;severity=high&amp;id=69c5ac523c064ed76fd41c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33672-cwe-1321-improperly-controlled-modi-73dc059c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33672%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20micromatch%20picomatch&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33671-cwe-1333-inefficient-regular-expres-753ec15d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33671%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20micromatch%20picomatch&amp;severity=high&amp;id=69c5a8ce3c064ed76fd1dae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0748-cwe-284-improper-access-control-in-d-2bf828b8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0748%3A%20CWE-284%20Improper%20Access%20Control%20in%20Drupal%20Internationalization%20(i18n)%20-%20i18n_node%20submodule&amp;severity=medium&amp;id=69c5a8ce3c064ed76fd1dade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4346-cwe-312-cleartext-storage-of-sensiti-056ca912</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4346%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20TP-Link%20Systems%20Inc.%20TL-WR850N%20v3&amp;severity=medium&amp;id=69c5a8ce3c064ed76fd1dae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33670-cwe-22-improper-limitation-of-a-pat-0880f67a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33670%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69c5a54b3c064ed76fcfc833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33669-cwe-125-out-of-bounds-read-in-siyua-064aace2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33669%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69c5a54b3c064ed76fcfc830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1556-cwe-200-exposure-of-sensitive-inform-0daf77f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1556%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Drupal%20Drupal%20File%20(Field)%20Paths&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33664-cwe-79-improper-neutralization-of-i-c3eb5eac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33664%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kestra-io%20kestra&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3650-cwe-401-in-grassroots-grassroots-dic-a3ef7ceb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3650%3A%20CWE-401%20in%20Grassroots%20Grassroots%20DICOM%20(GDCM)&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/etherrat-sysinfo-module-c2-on-ethereum-etherhiding-38f718e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EtherRAT%20%26%20SYS_INFO%20Module%3A%20C2%20on%20Ethereum%20(EtherHiding)%2C%20Target%20Selection%2C%20CDN-Like%20Beacons&amp;severity=medium&amp;id=69c5a8cd3c064ed76fd1d915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4898-cross-site-scripting-in-code-project-dc1fb1e1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4898%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc83b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33661-cwe-290-authentication-bypass-by-sp-0af23ed1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33661%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20yansongda%20pay&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33658-cwe-770-allocation-of-resources-wit-31281ecb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33658%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20rails%20activestorage&amp;severity=low&amp;id=69c5a54b3c064ed76fcfc821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33653-cwe-79-improper-neutralization-of-i-1514e992</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33653%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20farisc0de%20Uploady&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33645-cwe-22-improper-limitation-of-a-pat-2ac3bb97</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33645%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=high&amp;id=69c5a1c53c064ed76fce0c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33638-cwe-862-missing-authorization-in-li-48adeeb6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20lin-snow%20Ech0&amp;severity=medium&amp;id=69c5a1c53c064ed76fce0c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-attack-installs-fake-browser-extension-f-658dbe72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20attack%20installs%20fake%20browser%20extension%20for%20surveillance&amp;severity=medium&amp;id=69c5a8cd3c064ed76fd1d9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3622-cwe-125-out-of-bounds-read-in-tp-lin-e6d670e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3622%3A%20CWE-125%20Out-of-bounds%20read%20in%20TP-Link%20Systems%20Inc.%20TL-WR841N%20v14&amp;severity=high&amp;id=69c59e483c064ed76fcd549a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33545-cwe-89-improper-neutralization-of-s-5827a82d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33545%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=medium&amp;id=69c59e483c064ed76fcd5495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33541-cwe-400-uncontrolled-resource-consu-40a6ca87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33541%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20miraheze%20TSPortal&amp;severity=medium&amp;id=69c5973e3c064ed76fca3c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33738-cwe-79-improper-neutralization-of-i-ce3958ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33738%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LycheeOrg%20Lychee&amp;severity=medium&amp;id=69c5973e3c064ed76fca3c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4393-cwe-352-cross-site-request-forgery-c-f8a6aee5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4393%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Automated%20Logout&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4933-cwe-863-incorrect-authorization-in-d-e659c429</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4933%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Unpublished%20Node%20Permissions&amp;severity=high&amp;id=69c6c6943c064ed76fdc2a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3573-cwe-863-incorrect-authorization-in-d-6fdb0f15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3573%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=high&amp;id=69c6c6943c064ed76fdc29fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0965-external-control-of-file-name-or-pat-52e92e8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0965%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c6c6933c064ed76fdc2993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0967-inefficient-regular-expression-compl-86bb3a06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0967%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0968-null-pointer-dereference-in-red-hat--d915bdc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0968%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0964-improper-limitation-of-a-pathname-to-2ae13e3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0964%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c59e483c064ed76fcd549f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0966-buffer-underwrite-buffer-underflow-i-79e9d10d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0966%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21724-vulnerability-in-grafana-grafana-os-3abea496</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21724%3A%20Vulnerability%20in%20Grafana%20Grafana%20OSS&amp;severity=medium&amp;id=69c5a54c3c064ed76fcfc86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33375-vulnerability-in-grafana-grafana-os-67e46cbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33375%3A%20Vulnerability%20in%20Grafana%20Grafana%20OSS&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33644-cwe-918-server-side-request-forgery-18b4775d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33644%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=69c6c6933c064ed76fdc299b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3532-cwe-178-improper-handling-of-case-se-f8b1305e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3532%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6949d3c064ed76fb5b810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3531-cwe-288-authentication-bypass-using--7f0de8f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3531%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3530-cwe-918-server-side-request-forgery--497953a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3530%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3529-cwe-79-improper-neutralization-of-in-db408486</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3529%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Google%20Analytics%20GA4&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3528-cwe-79-improper-neutralization-of-in-0832454b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Calculation%20Fields&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3527-cwe-306-missing-authentication-for-c-8c4d2498</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3527%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Drupal%20AJAX%20Dashboard&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3526-cwe-863-incorrect-authorization-in-d-45205db2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3526%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20File%20Access%20Fix%20(deprecated)&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3525-cwe-863-incorrect-authorization-in-d-79c13952</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3525%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20File%20Access%20Fix%20(deprecated)&amp;severity=medium&amp;id=69c6c6933c064ed76fdc299f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2100-access-of-uninitialized-pointer-in-r-70c93daf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2100%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c59e483c064ed76fcd54a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33537-cwe-918-server-side-request-forgery-7e8f2ade</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33537%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LycheeOrg%20Lychee&amp;severity=medium&amp;id=69c6c6933c064ed76fdc2997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2239-improper-null-termination-in-red-hat-7affad82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2239%3A%20Improper%20Null%20Termination%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2272-integer-overflow-or-wraparound-in-re-e752abf5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2272%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69c5a54c3c064ed76fcfc87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2271-integer-overflow-or-wraparound-in-re-3121f72b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2271%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33532-cwe-674-uncontrolled-recursion-in-e-41e4ce98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33532%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20eemeli%20yaml&amp;severity=medium&amp;id=69c590393c064ed76fc7fe87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33632-cwe-862-missing-authorization-in-cr-df2ceb79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33632%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69c58caf3c064ed76fc67000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2436-expired-pointer-dereference-in-red-h-af2e8042</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2436%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c58caf3c064ed76fc66fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33631-cwe-862-missing-authorization-in-cr-914bd25a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33631%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69c58caf3c064ed76fc66ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33529-cwe-22-improper-limitation-of-a-pat-7d574b44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33529%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tobychui%20zoraxy&amp;severity=low&amp;id=69c58caf3c064ed76fc66ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33528-cwe-22-improper-limitation-of-a-pat-44f0b1de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33528%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20yusing%20godoxy&amp;severity=medium&amp;id=69c58caf3c064ed76fc66ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3121-incorrect-privilege-assignment-in-re-84c0c7ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3121%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69c589333c064ed76fb16803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3190-improper-handling-of-insufficient-pe-09076be7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3190%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69c589333c064ed76fb16807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33152-cwe-307-improper-restriction-of-exc-e7cae15a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33152%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20TandoorRecipes%20recipes&amp;severity=critical&amp;id=69c589313c064ed76fb167cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33153-cwe-89-improper-neutralization-of-s-5b9303b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33153%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69c589313c064ed76fb167d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33148-cwe-74-improper-neutralization-of-s-a7637ce2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33148%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29055-cwe-1230-exposure-of-sensitive-info-58c6e1d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29055%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26213-cwe-78-improper-neutralization-of-s-27248bb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26213%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20themactep%20thingino-firmware&amp;severity=high&amp;id=69c589313c064ed76fb167b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28503-cwe-639-authorization-bypass-throug-c45a9219</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28503%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33149-cwe-644-improper-neutralization-of--6d2eec85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33149%3A%20CWE-644%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69c589313c064ed76fb167ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33506-cwe-87-improper-neutralization-of-a-799c9e0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33506%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20ory%20polis&amp;severity=high&amp;id=69c589313c064ed76fb167d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33491-cwe-121-stack-based-buffer-overflow-786fa8ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33491%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20zenc-lang%20zenc&amp;severity=high&amp;id=69c582253c064ed76fa7cc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33505-cwe-89-improper-neutralization-of-s-7dc3388c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33505%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20keto&amp;severity=high&amp;id=69c582253c064ed76fa7cc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-001-x3f-check-550ef483</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20001%20-%20Checkmarx%20Scope%20Wider%20Than%20Reported%2C%20CISA%20KEV%20Entry%2C%20and%20Detection%20Tools%20Available%2C%20(Thu%2C%20Mar%2026th)&amp;severity=medium&amp;id=69c56d4ef4197a8e3bec2651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33504-cwe-89-improper-neutralization-of-s-f2d530e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33504%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20hydra&amp;severity=high&amp;id=69c574363c064ed76f96818a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33503-cwe-89-improper-neutralization-of-s-32e281db</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33503%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20kratos&amp;severity=high&amp;id=69c570d8f4197a8e3bef1f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33496-cwe-1289-improper-validation-of-uns-bd9362c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33496%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20ory%20oathkeeper&amp;severity=high&amp;id=69c570d8f4197a8e3bef1f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33495-cwe-862-missing-authorization-in-or-b18fe7c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33495%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ory%20oathkeeper&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33494-cwe-23-relative-path-traversal-in-o-d845cb54</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33494%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20ory%20oathkeeper&amp;severity=critical&amp;id=69c570d8f4197a8e3bef1f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33732-cwe-706-use-of-incorrectly-resolved-ec758fd5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33732%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20h3js%20srvx&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33490-cwe-706-use-of-incorrectly-resolved-76c4af93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33490%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20h3js%20h3&amp;severity=low&amp;id=69c570d8f4197a8e3bef1eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33487-cwe-347-improper-verification-of-cr-33820af1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33487%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20russellhaering%20goxmldsig&amp;severity=high&amp;id=69c570d8f4197a8e3bef1efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33486-cwe-918-server-side-request-forgery-62a4e798</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33486%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20roadiz%20core-bundle-dev-app&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33481-cwe-460-improper-cleanup-on-thrown--43cd4c99</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33481%3A%20CWE-460%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20anchore%20syft&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33477-cwe-863-incorrect-authorization-in--b8176694</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33477%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20error311%20FileRise&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33470-cwe-862-missing-authorization-in-bl-cf242ca5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33470%3A%20CWE-862%3A%20Missing%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33469-cwe-863-incorrect-authorization-in--e8c6070a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33469%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33468-cwe-89-improper-neutralization-of-s-c6315e5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33468%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69c569d6f4197a8e3be94d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33442-cwe-89-improper-neutralization-of-s-f971cd6e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33442%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69c569d6f4197a8e3be94d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34071-cwe-79-improper-neutralization-of-i-7eb8f515</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34071%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=medium&amp;id=69c569d8f4197a8e3be94dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33438-cwe-770-allocation-of-resources-wit-1428d408</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33438%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33430-cwe-732-incorrect-permission-assign-a2e24fdd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33430%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20beeware%20briefcase&amp;severity=high&amp;id=69c569d6f4197a8e3be94d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33636-cwe-125-out-of-bounds-read-in-pnggr-69be97d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33636%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=high&amp;id=69c569d6f4197a8e3be94d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33416-cwe-416-use-after-free-in-pnggroup--f5d1ae3b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33416%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pnggroup%20libpng&amp;severity=high&amp;id=69c569d6f4197a8e3be94d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33402-cwe-79-improper-neutralization-of-i-2723f0f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33402%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sakaiproject%20sakai&amp;severity=low&amp;id=69c569d6f4197a8e3be94d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33015-cwe-863-incorrect-authorization-in--329a7ec4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33015%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33014-cwe-863-incorrect-authorization-in--8d9fffcf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33014%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cff4197a8e3be49ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33009-cwe-362-concurrent-execution-using--5f9e12f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33009%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c562cdf4197a8e3be49a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29044-cwe-863-incorrect-authorization-in--4438817d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29044%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27828-cwe-416-use-after-free-in-everest-e-adf48606</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27828%3A%20CWE-416%3A%20Use%20After%20Free%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27816-cwe-787-out-of-bounds-write-in-ever-984d5d0d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27816%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27815-cwe-787-out-of-bounds-write-in-ever-bbd7f92c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27815%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27814-cwe-362-concurrent-execution-using--ab09716a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27814%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27813-cwe-416-use-after-free-in-everest-e-c8c578fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27813%3A%20CWE-416%3A%20Use%20After%20Free%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26074-cwe-362-concurrent-execution-using--22a9ae97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26074%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c562cdf4197a8e3be49a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26073-cwe-122-heap-based-buffer-overflow--2f7a5923</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26073%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4897-allocation-of-resources-without-limi-69f0a690</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4897%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26072-cwe-362-concurrent-execution-using--e4f31acc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26072%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26071-cwe-362-concurrent-execution-using--b57a7aa5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26071%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26070-cwe-362-concurrent-execution-using--18848e3e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26070%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26008-cwe-125-out-of-bounds-read-in-evere-7e88bae7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26008%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7d3c064ed76f9f9d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23995-cwe-121-stack-based-buffer-overflow-522c3df9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23995%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7d3c064ed76f9f9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22790-cwe-121-stack-based-buffer-overflow-96e39999</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22790%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c5583ef4197a8e3bdf81d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28298-cwe-79-improper-neutralization-of-i-936109e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28298%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=69c5583ef4197a8e3bdf81d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hightower-holding-data-breach-impacts-130000-86a37b28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hightower%20Holding%20Data%20Breach%20Impacts%20130%2C000&amp;severity=high&amp;id=69c53f99f4197a8e3bceb0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27664-cwe-787-out-of-bounds-write-in-siem-ebaa8618</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27664%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20CPCI85%20Central%20Processing%2FCommunication&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27663-cwe-770-allocation-of-resources-wit-e3eb94b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27663%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Siemens%20CPCI85%20Central%20Processing%2FCommunication&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28297-cwe-79-improper-neutralization-of-i-d551e15a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28297%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22593-cwe-193-off-by-one-error-in-everest-38a504ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22593%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33397-cwe-601-url-redirection-to-untruste-c4b42fd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33397%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20angular%20angular-cli&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33413-cwe-862-missing-authorization-in-et-61b60199</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33413%3A%20CWE-862%3A%20Missing%20Authorization%20in%20etcd-io%20etcd&amp;severity=high&amp;id=69c53915f4197a8e3bcae392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bind-updates-patch-high-severity-vulnerabilities-34793081</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BIND%20Updates%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69c5389ef4197a8e3bcaa6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2389-cwe-79-improper-neutralization-of-in-e95028db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2389%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=69c53915f4197a8e3bcae383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1032-cwe-352-cross-site-request-forgery-c-1b8f5a85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1032%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themifyme%20Conditional%20Menus&amp;severity=medium&amp;id=69c53915f4197a8e3bcae374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2231-cwe-79-improper-neutralization-of-in-d90c4f82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Booking%20%E2%80%93%20The%20Ultimate%20Appointments%20Scheduling%2C%20Events%20Booking%2C%20Events%20Calendar%20Solution&amp;severity=high&amp;id=69c53915f4197a8e3bcae37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2511-cwe-89-improper-neutralization-of-sp-f3faec51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2511%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rabilal%20JS%20Help%20Desk%20%E2%80%93%20AI-Powered%20Support%20%26%20Ticketing%20System&amp;severity=high&amp;id=69c53915f4197a8e3bcae389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55261-cwe-284-improper-access-control-in--baab77f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55261%3A%20CWE-284%3A%20Improper%20Access%20Control.%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55262-cwe-798-use-of-hardcoded-credential-37d59e42</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55262%3A%20CWE-798%3A%20Use%20of%20Hardcoded%20Credentials%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4877-cross-site-scripting-in-itsourcecode-604d0d38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4877%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4876-sql-injection-in-itsourcecode-free-h-ad659424</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4876%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55263-cwe-798-use-of-hardcoded-credential-b91db2da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55263%3A%20CWE-798%3A%20Use%20of%20Hardcoded%20Credentials%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55264-cwe-613-insufficient-session-expira-997c0a5b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55264%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c53915f4197a8e3bcae371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55265-cwe-200-exposure-of-sensitive-infor-68372ff5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55265%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55266-cwe-384-session-fixation-in-hcl-aft-d67e947d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55266%3A%20CWE-384%3A%20Session%20Fixation%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55267-cwe-434-unrestricted-upload-of-file-effaa833</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55267%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55268-cwe-799-improper-control-of-interac-a9785c6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55268%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55269-cwe-521-weak-password-requirements--4fb9c015</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55269%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-caught-deep-within-telecom-backbon-b3568828</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Caught%20Deep%20Within%20Telecom%20Backbone%20Infrastructure&amp;severity=high&amp;id=69c52e06f4197a8e3bc6dce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55270-cwe-20-improper-input-validation-in-faaf28cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55270%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55271-cwe-113-improper-control-of-http-me-7d4c8383</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55271%3A%20CWE-113%3A%20Improper%20Control%20of%20HTTP%20Messages%20and%20Headers%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55272-cwe-200-exposure-of-sensitive-infor-a28716b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55272%3A%20CWE-200-Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1961-vulnerability-in-red-hat-red-hat-sat-9642e238</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1961%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69c531a1f4197a8e3bc7dda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55273-cwe-829-inclusion-of-functionality--e07fdb4b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55273%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55274-cwe-942-permissive-cross-domain-sec-e7c033c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55274%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55275-cwe-557-concurrency-issues-is-a-cat-9231170e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55275%3A%20CWE-557%3A%20Concurrency%20Issues%20is%20a%20Category%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55276-cwe-200-exposure-of-sensitive-infor-18030854</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55276%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55277-cwe-1104-use-of-unmaintained-third--aa83e0be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55277%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third-Party%20Components%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-multiple-vulnerabilities-in-ios-soft-c1715c9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Multiple%20Vulnerabilities%20in%20IOS%20Software&amp;severity=high&amp;id=69c52a81f4197a8e3bc08f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4875-unrestricted-upload-in-itsourcecode--64bdb215</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4875%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c52aaff4197a8e3bc10e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41359-cwe-428-unquoted-search-path-or-ele-581de0c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41359%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20Smallsrv%20Small%20HTTP&amp;severity=high&amp;id=69c52aaff4197a8e3bc10dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4887-off-by-one-error-in-red-hat-red-hat--b0d53159</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4887%3A%20Off-by-one%20Error%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69c531a1f4197a8e3bc7ddac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/illuminating-voidlink-technical-analysis-of-the-vo-858d2e9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Illuminating%20VoidLink%3A%20Technical%20analysis%20of%20the%20VoidLink%20rootkit%20framework&amp;severity=medium&amp;id=69c575383c064ed76f98c818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41368-cwe-428-unquoted-search-path-or-ele-6e2efc0f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41368%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Smallsrv%20Small%20HTTP&amp;severity=high&amp;id=69c51ff3f4197a8e3baa8dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4809-cwe-434-unrestricted-upload-of-file--9d4d9e8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4809%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plank%20laravel-mediable&amp;severity=critical&amp;id=69c57a7f3c064ed76f9f9d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24068-cwe-306-missing-authentication-for--4e55fde7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24068%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Vienna%20Symphonic%20Library%20GmbH%20Vienna%20Assistant&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-redline-malware-administrator-extradited-t-54054e19</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20RedLine%20Malware%20Administrator%20Extradited%20to%20US&amp;severity=medium&amp;id=69c50757f4197a8e3b57d4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-scammers-use-legitimate-surveys-to-link-to-mal-1b778cc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20scammers%20use%20legitimate%20surveys%20to%20link%20to%20malicious%20sites%20%7C%20Kaspersky%20official%20blog&amp;severity=high&amp;id=69c503f9f4197a8e3b5009f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4263-cwe-863-in-hijiffy-hijiffy-chatbot-8b422826</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4263%3A%20CWE-863%20in%20HiJiffy%20HiJiffy%20Chatbot&amp;severity=medium&amp;id=69c5004ef4197a8e3b4e0c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4262-cwe-863-in-hijiffy-hijiffy-chatbot-f2ca6e4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4262%3A%20CWE-863%20in%20HiJiffy%20HiJiffy%20Chatbot&amp;severity=medium&amp;id=69c5004ef4197a8e3b4e0c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4862-buffer-overflow-in-utt-hiper-1250gw-40a2fb82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4862%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69c57a813c064ed76f9f9d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4861-stack-based-buffer-overflow-in-wavli-146cf306</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4861%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69c57a813c064ed76f9f9d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4860-deserialization-in-648540858-wvp-gb2-3497b1a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4860%3A%20Deserialization%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4850-sql-injection-in-code-projects-simpl-7c6222f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4850%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c4eb47f4197a8e3b1b37b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4849-cross-site-scripting-in-code-project-04fed99d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4849%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c4eb47f4197a8e3b1b37b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4874-server-side-request-forgery-ssrf-in--bac01e84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4874%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69c4e45ef4197a8e3b077baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4848-cross-site-scripting-in-dameng100-mu-d6b7d599</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4848%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4dd2ff4197a8e3b036cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32680-incorrect-default-permissions-in-ra-38982bf7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32680%3A%20Incorrect%20default%20permissions%20in%20RATOC%20Systems%2C%20Inc.%20RATOC%20RAID%20Monitoring%20Manager%20for%20Windows&amp;severity=high&amp;id=69c4dd2ff4197a8e3b036ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28760-uncontrolled-search-path-element-in-f4dfdefd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28760%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RATOC%20Systems%2C%20Inc.%20RATOC%20RAID%20Monitoring%20Manager%20for%20Windows&amp;severity=high&amp;id=69c4dd2ff4197a8e3b036ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4847-cross-site-scripting-in-dameng100-mu-5ccb2c60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4847%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1890-cwe-862-missing-authorization-in-lea-c5d9e609</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1890%3A%20CWE-862%20Missing%20Authorization%20in%20LeadConnector&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1430-cwe-79-cross-site-scripting-xss-in-w-525b9be3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1430%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Lightbox%202&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15488-cwe-863-incorrect-authorization-in--8e7b0524</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15488%3A%20CWE-863%20Incorrect%20Authorization%20in%20Responsive%20Plus&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15433-cwe-22-improper-limitation-of-a-pat-8ca8af04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15433%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Shared%20Files&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4846-cross-site-scripting-in-dameng100-mu-b3f0d512</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4846%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4845-cross-site-scripting-in-dameng100-mu-4a854e54</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4845%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1206-cwe-639-authorization-bypass-through-4a5589d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1206%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4844-sql-injection-in-code-projects-onlin-007ab24e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4844%3A%20SQL%20Injection%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4842-sql-injection-in-itsourcecode-online-aa2c2ede</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4842%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4389-cwe-79-improper-neutralization-of-in-91fdf8a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4389%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20DSGVO%20snippet%20for%20Leaflet%20Map%20and%20its%20Extensions&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33201-active-debug-code-in-green-house-co-51d82983</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33201%3A%20Active%20debug%20code%20in%20GREEN%20HOUSE%20CO.%2C%20LTD.%20Digital%20Photo%20Frame%20GH-WDF10A&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4841-sql-injection-in-code-projects-onlin-8238b60a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4841%3A%20SQL%20Injection%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4840-os-command-injection-in-netcore-powe-abf3a5bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4840%3A%20OS%20Command%20Injection%20in%20Netcore%20Power%2015AX&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4278-cwe-79-improper-neutralization-of-in-e053026e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Simple%20Download%20Counter&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4329-cwe-79-improper-neutralization-of-in-7fadd817</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4329%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Blackhole%20for%20Bad%20Bots&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4281-cwe-862-missing-authorization-in-tra-3757da8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4281%3A%20CWE-862%20Missing%20Authorization%20in%20trainingbusinesspros%20FormLift%20for%20Infusionsoft%20Web%20Forms&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2931-cwe-269-improper-privilege-managemen-010fd6d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2931%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4331-cwe-862-missing-authorization-in-pr--0dab2dca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4331%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4839-sql-injection-in-sourcecodester-food-e8aa90c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4839%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4838-sql-injection-in-sourcecodester-mala-615eeafb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4838%3A%20SQL%20Injection%20in%20SourceCodester%20Malawi%20Online%20Market&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4075-cwe-79-improper-neutralization-of-in-12e2e055</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4075%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xenioushk%20BWL%20Advanced%20FAQ%20Manager%20Lite&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1986-cwe-79-improper-neutralization-of-in-080d1d18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bakkbone%20FloristPress%20for%20Woo%20%E2%80%93%20Customize%20your%20eCommerce%20store%20for%20your%20Florist&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4335-cwe-79-improper-neutralization-of-in-06c1049a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4335%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shortpixel%20ShortPixel%20Image%20Optimizer%20%E2%80%93%20Optimize%20Images%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=69c574363c064ed76f968193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3328-cwe-502-deserialization-of-untrusted-c6e58efd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3328%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=69c574363c064ed76f96818d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15101-cwe-352-cross-site-request-forgery--69e6a66a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15101%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ASUS%20Router&amp;severity=high&amp;id=69c49a9bf4197a8e3ba4b858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4836-sql-injection-in-code-projects-accou-316a9d9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4836%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c49a9bf4197a8e3ba4b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4835-cross-site-scripting-in-code-project-fa7a83cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4835%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c49a9bf4197a8e3ba4b85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4484-cwe-862-missing-authorization-in-mas-b0ab7a1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4484%3A%20CWE-862%20Missing%20Authorization%20in%20masteriyo%20Masteriyo%20LMS%20%E2%80%93%20Online%20Course%20Builder%20for%20eLearning%2C%20LMS%20%26%20Education&amp;severity=high&amp;id=69c574363c064ed76f96819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4833-uncontrolled-recursion-in-orc-discou-358572e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4833%3A%20Uncontrolled%20Recursion%20in%20Orc%20discount&amp;severity=medium&amp;id=69c57a813c064ed76f9f9da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4831-improper-authentication-in-kalcaddle-40f256df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4831%3A%20Improper%20Authentication%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33285-cwe-20-improper-input-validation-in-e876aad9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33285%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33287-cwe-20-improper-input-validation-in-8d1f4372</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33287%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33942-cwe-502-deserialization-of-untruste-6acf0f28</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33942%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20saloonphp%20saloon&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33183-cwe-22-improper-limitation-of-a-pat-6fc6a028</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33183%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20saloonphp%20saloon&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33182-cwe-918-server-side-request-forgery-18e7372d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33182%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20saloonphp%20saloon&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4830-unrestricted-upload-in-kalcaddle-kod-a213e944</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4830%3A%20Unrestricted%20Upload%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33526-cwe-416-use-after-free-in-squid-cac-5f2ea159</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33526%3A%20CWE-416%3A%20Use%20After%20Free%20in%20squid-cache%20squid&amp;severity=critical&amp;id=69c4854ef4197a8e3b9c70cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33515-cwe-125-out-of-bounds-read-in-squid-bad315ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33515%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20squid-cache%20squid&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32748-cwe-413-improper-resource-locking-i-9668aaa3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32748%3A%20CWE-413%3A%20Improper%20Resource%20Locking%20in%20squid-cache%20squid&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-26-90d7bb1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-26&amp;severity=medium&amp;id=69c5cbec3c064ed76fe7358e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30463-na-586b440c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30463%3A%20n%2Fa&amp;severity=high&amp;id=69c589313c064ed76fb167c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29969-na-1728d200</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29969%3A%20n%2Fa&amp;severity=medium&amp;id=69c589313c064ed76fb167bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30458-na-4904e2a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30458%3A%20n%2Fa&amp;severity=critical&amp;id=69c582253c064ed76fa7cc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30457-na-d7294d25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30457%3A%20n%2Fa&amp;severity=critical&amp;id=69c582253c064ed76fa7cc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30162-na-48435b40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30162%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29934-na-6cb2fe65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29934%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29933-na-76fc1d31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29933%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29905-na-f2c91621</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29905%3A%20n%2Fa&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29976-na-cc0463b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29976%3A%20n%2Fa&amp;severity=medium&amp;id=69c5583ef4197a8e3bdf81dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-26-e34c1331</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-26&amp;severity=medium&amp;id=69c5155ff4197a8e3b699407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-26-6fa2acb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-26&amp;severity=low&amp;id=69c5155ff4197a8e3b6993ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4826-sql-injection-in-sourcecodester-sale-014c0565</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4826%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c473c4f4197a8e3b95d0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4758-cwe-22-improper-limitation-of-a-path-df4e4af3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4758%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=high&amp;id=69c473c4f4197a8e3b95d0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4825-sql-injection-in-sourcecodester-sale-57e01f2e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4825%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c465a0f4197a8e3b8c5c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-campaigns-targeting-windows-and-macos-c26c50a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Campaigns%20Targeting%20Windows%20and%20macOS&amp;severity=medium&amp;id=69c45b4af4197a8e3b8530f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4824-improper-privilege-management-in-ent-256ebce0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4824%3A%20Improper%20Privilege%20Management%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=high&amp;id=69c45b4bf4197a8e3b853230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4823-information-disclosure-in-enter-soft-fe52e1e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4823%3A%20Information%20Disclosure%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=low&amp;id=69c45b4bf4197a8e3b853229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-almost-everything-again-march-2026-e-8a57b153</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20(almost)%20everything%20again.%20March%202026%20edition.%2C%20(Wed%2C%20Mar%2025th)&amp;severity=medium&amp;id=69c4540cf4197a8e3b8345f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36187-cwe-532-insertion-of-sensitive-info-21a2100b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36187%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Knowledge%20Catalog%20Standard%20Cartridge&amp;severity=medium&amp;id=69c45423f4197a8e3b8350cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14684-cwe-117-improper-output-neutralizat-675e266b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14684%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20Maximo%20Application%20Suite%20-%20Monitor%20Component&amp;severity=medium&amp;id=69c45423f4197a8e3b8350cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14807-cwe-644-improper-neutralization-of--e705d38e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14807%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44d04f4197a8e3b816de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1015-cwe-918-server-side-request-forgery--fe2a9abf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1015%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44d04f4197a8e3b816de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1014-cwe-319-cleartext-transmission-of-se-5bb59961</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1014%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2483-cwe-79-improper-neutralization-of-in-01b82064</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2483%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64648-cwe-319-cleartext-transmission-of-s-948f3d08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64648%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b80833e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64647-cwe-1240-use-of-a-cryptographic-pri-9d2f9c2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64647%3A%20CWE-1240%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b80833b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2484-cwe-79-improper-neutralization-of-in-8686e32a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2484%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64646-cwe-14-compiler-removal-of-code-to--9d00dd55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64646%3A%20CWE-14%20Compiler%20Removal%20of%20Code%20to%20Clear%20Buffers%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36440-cwe-522-insufficiently-protected-cr-ac354b6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36440%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4822-creation-of-temporary-file-with-inse-2bbaf2cd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4822%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=high&amp;id=69c44986f4197a8e3b808396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36438-cwe-923-improper-restriction-of-com-1070ef1b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36438%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36422-cwe-352-cross-site-request-forgery--9037caee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36422%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b80832f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36258-cwe-256-plaintext-storage-of-a-pass-144ff010</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36258%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=69c44983f4197a8e3b80832c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2485-cwe-79-improper-neutralization-of-in-d0e0e6f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2485%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33249-cwe-863-incorrect-authorization-in--7f6c995e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33249%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7fad03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14974-cwe-639-authorization-bypass-throug-7e5352bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14974%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33223-cwe-290-authentication-bypass-by-sp-e3ccf04a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33223%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7facfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1262-cwe-209-generation-of-error-message--4ed78fae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1262%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33248-cwe-287-improper-authentication-in--a81f505e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33248%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7facff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14917-cwe-1393-use-of-default-password-in-ab8c3ff9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14917%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14912-cwe-918-server-side-request-forgery-cb0e7d2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14912%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14915-cwe-200-exposure-of-sensitive-infor-533c205b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14915%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14810-cwe-613-insufficient-session-expira-0d27dc5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14810%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33222-cwe-285-improper-authorization-in-n-d2948671</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33222%3A%20CWE-285%3A%20Improper%20Authorization%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1561-cwe-918-server-side-request-forgery--adcc7a2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1561%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7faccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14808-cwe-598-use-of-get-request-method-w-b05e7948</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14808%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=low&amp;id=69c44608f4197a8e3b7facb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14790-cwe-522-insufficiently-protected-cr-373250bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14790%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e9793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12708-cwe-798-use-of-hard-coded-credentia-e429c055</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12708%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e9790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33247-cwe-215-insertion-of-sensitive-info-38b359f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33247%3A%20CWE-215%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c4427ef4197a8e3b7e9796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33219-cwe-770-allocation-of-resources-wit-c95e60aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33219%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c43f15f4197a8e3b7dafe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33218-cwe-20-improper-input-validation-in-fea485f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33218%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33246-cwe-287-improper-authentication-in--c898d481</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33246%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c43f15f4197a8e3b7dafee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33217-cwe-863-incorrect-authorization-in--c7070ad9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33217%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33216-cwe-256-plaintext-storage-of-a-pass-27b1c15c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33216%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29785-cwe-476-null-pointer-dereference-in-7dd3aed5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29785%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27889-cwe-190-integer-overflow-or-wraparo-32673245</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27889%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43b99f4197a8e3b7c5650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33751-cwe-90-improper-neutralization-of-s-b0a156ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33751%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c430e5f4197a8e3b78e0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33749-cwe-79-improper-neutralization-of-i-904c9e5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33749%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c430e5f4197a8e3b78e0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33724-cwe-639-authorization-bypass-throug-8d5f5a1d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33724%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c42db5f4197a8e3b77dc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33809-cwe-400-uncontrolled-resource-consu-beac3202</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33809%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20golang.org%2Fx%2Fimage%20golang.org%2Fx%2Fimage%2Ftiff&amp;severity=medium&amp;id=69c42db5f4197a8e3b77dc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33722-cwe-863-incorrect-authorization-in--3e68670b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33722%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c477fbf4197a8e3b97b114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33720-cwe-863-incorrect-authorization-in--1556d918</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33720%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33713-cwe-89-improper-neutralization-of-s-44a2cba0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33713%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c422f4f4197a8e3b7492f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-pushes-remcos-rat-netsupport-r-ee8c4812</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20pushes%20Remcos%20RAT%2C%20NetSupport%20RAT%2C%20StealC%2C%20and%20Sectop%20RAT%20(ArechClient2)%2C%20(Wed%2C%20Mar%2025th)&amp;severity=medium&amp;id=69c33747f4197a8e3bad16e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33696-cwe-1321-improperly-controlled-modi-9ddf2aba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33696%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69c422f4f4197a8e3b7492f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33665-cwe-287-improper-authentication-in--29d56016</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33665%3A%20CWE-287%3A%20Improper%20Authentication%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c422f4f4197a8e3b7492f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33663-cwe-639-authorization-bypass-throug-7119d589</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33663%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c41f52f4197a8e3b733a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33660-cwe-94-improper-control-of-generati-e1c73d20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33660%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69c41f52f4197a8e3b733a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27496-cwe-908-use-of-uninitialized-resour-028f34c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27496%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c41f52f4197a8e3b733a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2414-cwe-639-authorization-bypass-through-311195cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2414%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20HYPR%20Server&amp;severity=medium&amp;id=69c41848f4197a8e3b706bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25645-cwe-377-insecure-temporary-file-in--0a7a2193</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25645%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20psf%20requests&amp;severity=medium&amp;id=69c41848f4197a8e3b706bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29092-cwe-613-insufficient-session-expira-030605f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29092%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20kiteworks%20Kiteworks%20Email%20Protection%20Gateway&amp;severity=medium&amp;id=69c41848f4197a8e3b706bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23636-cwe-434-unrestricted-upload-of-file-e86233b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23636%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=medium&amp;id=69c41848f4197a8e3b706bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23635-cwe-523-unprotected-transport-of-cr-3edcc72b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23635%3A%20CWE-523%3A%20Unprotected%20Transport%20of%20Credentials%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=medium&amp;id=69c41848f4197a8e3b706bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1712-cwe-266-incorrect-privilege-assignme-5bbca1c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1712%3A%20CWE-266%20Incorrect%20privilege%20assignment%20in%20HYPR%20Server&amp;severity=medium&amp;id=69c41848f4197a8e3b706bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34085-cwe-193-off-by-one-error-in-fontcon-a1337185</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34085%3A%20CWE-193%20Off-by-one%20Error%20in%20fontconfig%20project%20fontconfig&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df38204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trojanization-of-trivy-checkmarx-and-litellm-solut-76ab2283</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trojanization%20of%20Trivy%2C%20Checkmarx%2C%20and%20LiteLLM%20solutions%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c40dfef4197a8e3b6b43ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32573-improper-control-of-generation-of-c-2c0edccd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32573%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=critical&amp;id=69c41186f4197a8e3b6d7015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32567-improper-limitation-of-a-pathname-t-3382e216</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32567%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20icopydoc%20YML%20for%20Yandex%20Market&amp;severity=medium&amp;id=69c41186f4197a8e3b6d7012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32562-missing-authorization-in-wp-folio-t-f0e51ed8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32562%3A%20Missing%20Authorization%20in%20WP%20Folio%20Team%20PPWP&amp;severity=medium&amp;id=69c41186f4197a8e3b6d700f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32546-missing-authorization-in-stellarwp--93cf40ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32546%3A%20Missing%20Authorization%20in%20StellarWP%20Restrict%20Content&amp;severity=high&amp;id=69c41186f4197a8e3b6d700c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32545-improper-neutralization-of-input-du-8a5633fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Taboola%20Taboola%20Pixel&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32544-improper-neutralization-of-input-du-b8adb14f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OOPSpam%20Team%20OOPSpam%20Anti-Spam&amp;severity=high&amp;id=69c41184f4197a8e3b6d6feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32542-improper-neutralization-of-input-du-830f7ea0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32541-missing-authorization-in-premmerce--c97b7d13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32541%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20Redirect%20Manager&amp;severity=medium&amp;id=69c41184f4197a8e3b6d6fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32539-improper-neutralization-of-special--8d618b97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32539%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PublishPress%20PublishPress%20Revisions&amp;severity=critical&amp;id=69c41184f4197a8e3b6d6fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32538-insertion-of-sensitive-information--6016ed45</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32538%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Noor%20Alam%20SMTP%20Mailer&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32537-improper-control-of-filename-for-in-c5fa8348</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32537%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nK%20Visual%20Portfolio%2C%20Photo%20Gallery%20%26%20Post%20Grid&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32536-unrestricted-upload-of-file-with-da-30e15f7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32536%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20halfdata%20Green%20Downloads&amp;severity=critical&amp;id=69c41184f4197a8e3b6d6fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32535-authorization-bypass-through-user-c-fbf0d9b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32535%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=medium&amp;id=69c41184f4197a8e3b6d6fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32534-improper-neutralization-of-special--17829d2c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32534%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32532-improper-neutralization-of-input-du-ac5edecc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Contact%20Form%20%26%20Lead%20Form%20Elementor%20Builder&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32531-improper-control-of-filename-for-in-3d6efdb5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Kunco&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32530-incorrect-privilege-assignment-in-w-8827c7ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32530%3A%20Incorrect%20Privilege%20Assignment%20in%20WPFunnels%20Creator%20LMS&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32529-improper-neutralization-of-input-du-a9882ad5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20don-themes%20Molla&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32528-improper-neutralization-of-input-du-976fcd8a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20don-themes%20Riode&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32527-missing-authorization-in-crm-perks--eda475e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32527%3A%20Missing%20Authorization%20in%20CRM%20Perks%20WP%20Insightly%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=medium&amp;id=69c41182f4197a8e3b6d6f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32526-improper-neutralization-of-input-du-eb7cf27d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20Abandoned%20Cart%20Recovery%20for%20WooCommerce&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32525-improper-control-of-generation-of-c-10cda367</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32525%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20jetmonsters%20JetFormBuilder&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32524-unrestricted-upload-of-file-with-da-ddbe7892</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32524%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Jordy%20Meow%20Photo%20Engine&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32523-unrestricted-upload-of-file-with-da-30c41908</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32523%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20denishua%20WPJAM%20Basic&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32522-improper-limitation-of-a-pathname-t-fa6877c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32522%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20WooCommerce%20Support%20Ticket%20System&amp;severity=high&amp;id=69c41180f4197a8e3b6d6f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32521-improper-neutralization-of-input-du-4a72f545</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Northern%20Beaches%20Websites%20WP%20Custom%20Admin%20Interface&amp;severity=medium&amp;id=69c41180f4197a8e3b6d6f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32520-incorrect-privilege-assignment-in-a-5d9f8707</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32520%3A%20Incorrect%20Privilege%20Assignment%20in%20Andrew%20Munro%20%2F%20AffiliateWP%20RewardsWP&amp;severity=critical&amp;id=69c41180f4197a8e3b6d6f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32519-incorrect-privilege-assignment-in-b-8aea8889</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32519%3A%20Incorrect%20Privilege%20Assignment%20in%20Bit%20Apps%20Bit%20SMTP&amp;severity=critical&amp;id=69c41180f4197a8e3b6d6efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32518-improper-neutralization-of-input-du-9053212d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imithemes%20Gaea&amp;severity=high&amp;id=69c41180f4197a8e3b6d6efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32517-improper-neutralization-of-input-du-a0590be1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kleor%20Contact%20Manager&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32516-improper-neutralization-of-special--35bb8d98</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32516%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20Miraculous%20Core%20Plugin&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32515-missing-authorization-in-kamleshyad-ed9cf013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32515%3A%20Missing%20Authorization%20in%20kamleshyadav%20Miraculous&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32514-missing-authorization-in-anton-voyt-091d3c0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32514%3A%20Missing%20Authorization%20in%20Anton%20Voytenko%20Petitioner&amp;severity=medium&amp;id=69c41180f4197a8e3b6d6eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32513-deserialization-of-untrusted-data-i-d00dee70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32513%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Miguel%20Useche%20JS%20Archive%20List&amp;severity=high&amp;id=69c41180f4197a8e3b6d6eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32512-deserialization-of-untrusted-data-i-b9608d49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32512%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Pelicula&amp;severity=critical&amp;id=69c4117ef4197a8e3b6d6a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32511-deserialization-of-untrusted-data-i-e2a4eb69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32511%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mikado-Themes%20St%C3%A5l&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32510-deserialization-of-untrusted-data-i-81fc87c4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32510%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Kamperen&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32509-deserialization-of-untrusted-data-i-91be25ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32509%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Gracey&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32508-deserialization-of-untrusted-data-i-aaac9dad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32508%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mikado-Themes%20Halstein&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32507-deserialization-of-untrusted-data-i-86a48eec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Elated-Themes%20Leroux&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32506-deserialization-of-untrusted-data-i-11a3f625</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32506%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Archicon&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32505-improper-control-of-filename-for-in-756108d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32505%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20Kiddy&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32504-improper-control-of-filename-for-in-eb99558c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32504%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20VintWood&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32503-improper-control-of-filename-for-in-db36e62f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32503%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20Trendustry&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32502-deserialization-of-untrusted-data-i-259fb77d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Select-Themes%20Borgholm&amp;severity=critical&amp;id=69c4117bf4197a8e3b6d698e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32501-missing-authorization-in-wp-configu-85e5ff6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32501%3A%20Missing%20Authorization%20in%20wp-configurator%20WP%20Configurator%20Pro&amp;severity=high&amp;id=69c4117bf4197a8e3b6d698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32500-improper-control-of-filename-for-in-f87d3394</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32500%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20MetaMax&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32499-improper-neutralization-of-special--f2e4594a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32499%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20QuantumCloud%20ChatBot&amp;severity=critical&amp;id=69c4117bf4197a8e3b6d6985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32498-missing-authorization-in-metagauss--fd323904</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32498%3A%20Missing%20Authorization%20in%20Metagauss%20RegistrationMagic&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32497-weak-authentication-in-pickplugins--65a7d26f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32497%3A%20Weak%20Authentication%20in%20PickPlugins%20User%20Verification&amp;severity=medium&amp;id=69c4117bf4197a8e3b6d697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32496-improper-limitation-of-a-pathname-t-f9367de2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32496%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NYSL%20Spam%20Protect%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69c4117bf4197a8e3b6d697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32495-missing-authorization-in-link-softw-0177db45</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32495%3A%20Missing%20Authorization%20in%20Link%20Software%20LLC%20WP%20Terms%20Popup&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32494-improper-neutralization-of-input-du-0a3167aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32494%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Image%20Slider%20by%20Ays&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32493-improper-neutralization-of-input-du-7e045118</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20JobSearch&amp;severity=null&amp;id=69c4117bf4197a8e3b6d6973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32492-authentication-bypass-by-spoofing-i-48fca6f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32492%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32491-improper-neutralization-of-input-du-4b1d4953</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20Review%20Slider&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32490-improper-neutralization-of-input-du-a19709b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32490%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20TripAdvisor%20Review%20Slider&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32489-missing-authorization-in-bplugins-b-e50c755d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32489%3A%20Missing%20Authorization%20in%20bPlugins%20B%20Blocks&amp;severity=medium&amp;id=69c41179f4197a8e3b6d693f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32488-incorrect-privilege-assignment-in-w-e8ce43f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32488%3A%20Incorrect%20Privilege%20Assignment%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=69c41179f4197a8e3b6d693c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32485-missing-authorization-in-wedevs-wp--d23f13b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32485%3A%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=high&amp;id=69c41179f4197a8e3b6d6939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32484-deserialization-of-untrusted-data-i-c5fa625c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32484%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldGrid%20weForms&amp;severity=high&amp;id=69c41179f4197a8e3b6d6936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32483-missing-authorization-in-codepeople-f65c56f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32483%3A%20Missing%20Authorization%20in%20codepeople%20Contact%20Form%20Email&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32482-unrestricted-upload-of-file-with-da-5ecc0844</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32482%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20deothemes%20Ona&amp;severity=critical&amp;id=69c41179f4197a8e3b6d6930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32441-missing-authorization-in-webtoffee--d04ac58b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32441%3A%20Missing%20Authorization%20in%20WebToffee%20Comments%20Import%20%26%20Export&amp;severity=high&amp;id=69c41179f4197a8e3b6d692d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31921-missing-authorization-in-devteam-ha-ce279ec3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31921%3A%20Missing%20Authorization%20in%20Devteam%20HaywoodTech%20Product%20Rearrange%20for%20WooCommerce&amp;severity=high&amp;id=69c41177f4197a8e3b6d6918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31920-improper-neutralization-of-special--f0f4e53d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31920%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Devteam%20HaywoodTech%20Product%20Rearrange%20for%20WooCommerce&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31914-improper-neutralization-of-input-du-4e199ded</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31914%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hookandhook%20WP%20Courses%20LMS&amp;severity=medium&amp;id=69c41177f4197a8e3b6d6912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31913-improper-limitation-of-a-pathname-t-190f10fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31913%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Whitebox-Studio%20Scape&amp;severity=high&amp;id=69c41177f4197a8e3b6d690f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27095-deserialization-of-untrusted-data-i-3a0c4341</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27095%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation&amp;severity=critical&amp;id=69c41177f4197a8e3b6d690c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27088-improper-neutralization-of-input-du-10a8339d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Darna%20Framework&amp;severity=high&amp;id=69c41177f4197a8e3b6d6909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27087-improper-neutralization-of-input-du-c3c61ba6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27087%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Wolverine%20Framework&amp;severity=high&amp;id=69c41177f4197a8e3b6d6906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27084-deserialization-of-untrusted-data-i-e6ad1406</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27084%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Buisson&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27083-deserialization-of-untrusted-data-i-fb46cf45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27083%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Work%20%26%20Travel%20Company&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27082-deserialization-of-untrusted-data-i-3c16b289</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27082%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Love%20Story&amp;severity=critical&amp;id=69c41177f4197a8e3b6d68fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27081-improper-control-of-filename-for-in-b9e8b6ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Rosebud&amp;severity=high&amp;id=69c41174f4197a8e3b6d686b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27080-improper-control-of-filename-for-in-dd489a67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27080%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Deston&amp;severity=high&amp;id=69c41174f4197a8e3b6d6868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27079-improper-control-of-filename-for-in-5336a0a5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27079%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Amfissa&amp;severity=high&amp;id=69c41174f4197a8e3b6d6865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27078-improper-control-of-filename-for-in-72ce9988</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27078%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Emaurri&amp;severity=high&amp;id=69c41174f4197a8e3b6d6862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27077-improper-control-of-filename-for-in-40b7dc68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20MultiOffice&amp;severity=high&amp;id=69c41174f4197a8e3b6d685f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27076-improper-control-of-filename-for-in-b31dff94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20LuxeDrive&amp;severity=high&amp;id=69c41174f4197a8e3b6d685c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27075-improper-control-of-filename-for-in-9116c16b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27075%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Belfort&amp;severity=high&amp;id=69c41174f4197a8e3b6d6859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27073-use-of-hard-coded-credentials-in-ad-760a6dc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27073%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Addi%20Addi%20%26%238211%3B%20Cuotas%20que%20se%20adaptan%20a%20ti&amp;severity=high&amp;id=69c41174f4197a8e3b6d6856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27071-missing-authorization-in-arraytics--f16ab7b1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27071%3A%20Missing%20Authorization%20in%20Arraytics%20WPCafe&amp;severity=critical&amp;id=69c41174f4197a8e3b6d6853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27054-improper-neutralization-of-input-du-761ca3e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Soledad%20Data%20Migrator&amp;severity=high&amp;id=69c41174f4197a8e3b6d6850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27051-incorrect-privilege-assignment-in-u-035d2e67</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27051%3A%20Incorrect%20Privilege%20Assignment%20in%20uxper%20Golo&amp;severity=critical&amp;id=69c41172f4197a8e3b6d683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27049-authentication-bypass-using-an-alte-24d72b53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27049%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20NooTheme%20Jobica%20Core&amp;severity=critical&amp;id=69c41172f4197a8e3b6d683c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27048-improper-control-of-filename-for-in-8b7ba223</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20The%20Aisle%20Core&amp;severity=high&amp;id=69c41172f4197a8e3b6d6839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27047-improper-control-of-filename-for-in-845e4f48</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Curly%20Core&amp;severity=high&amp;id=69c41172f4197a8e3b6d6836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27046-missing-authorization-in-kaira-stor-444e1023</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27046%3A%20Missing%20Authorization%20in%20Kaira%20StoreCustomizer&amp;severity=medium&amp;id=69c41172f4197a8e3b6d6833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27045-deserialization-of-untrusted-data-i-a6914a73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27045%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sbthemes%20WooCommerce%20Infinite%20Scroll&amp;severity=high&amp;id=69c41172f4197a8e3b6d6830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27044-improper-control-of-generation-of-c-c10f38bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27044%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20TotalSuite%20Total%20Poll%20Lite&amp;severity=critical&amp;id=69c41172f4197a8e3b6d682d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27040-improper-limitation-of-a-pathname-t-dc8cd6ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27040%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AA-Team%20WZone&amp;severity=high&amp;id=69c41172f4197a8e3b6d682a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27039-improper-neutralization-of-special--9707ccfb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27039%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20WZone&amp;severity=high&amp;id=69c41172f4197a8e3b6d6827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25469-missing-authorization-in-viabill-fo-0b2405f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25469%3A%20Missing%20Authorization%20in%20ViaBill%20for%20WooCommerce%20ViaBill%20%26%238211%3B%20WooCommerce&amp;severity=medium&amp;id=69c41172f4197a8e3b6d6824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25465-improper-neutralization-of-input-du-b9f38aef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20CP%20Multi%20View%20Event%20Calendar&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25464-improper-control-of-filename-for-in-9d7d7430</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25464%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TieLabs%20Jannah&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25461-improper-neutralization-of-input-du-d64bbe4c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20Listeo%20Core&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25460-missing-authorization-in-liquidthem-dc3e13e5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25460%3A%20Missing%20Authorization%20in%20LiquidThemes%20Ave%20Core&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25458-improper-control-of-filename-for-in-993290d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25458%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Moments&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25457-improper-control-of-filename-for-in-027ff191</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25457%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Mixtape&amp;severity=high&amp;id=69c41170f4197a8e3b6d67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25456-missing-authorization-in-aarsiv-gro-66b0cf89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25456%3A%20Missing%20Authorization%20in%20Aarsiv%20Groups%20Automated%20FedEx%20live%2Fmanual%20rates%20with%20shipping%20labels&amp;severity=high&amp;id=69c41170f4197a8e3b6d67da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25455-missing-authorization-in-pickplugin-51114f3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25455%3A%20Missing%20Authorization%20in%20PickPlugins%20Product%20Slider%20for%20WooCommerce&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25454-missing-authorization-in-mvpthemes--168504b8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25454%3A%20Missing%20Authorization%20in%20MVPThemes%20The%20League&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25452-improper-neutralization-of-input-du-98103dff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDO%20Remoji&amp;severity=high&amp;id=69c41170f4197a8e3b6d67d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25447-improper-control-of-generation-of-c-a962fb02</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25447%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jonathan%20Daggerhart%20Widget%20Wrangler&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d676b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25437-missing-authorization-in-gzseo-37f57a2b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25437%3A%20Missing%20Authorization%20in%20GZSEO&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d6768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25435-improper-neutralization-of-input-du-6e8a091b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25435%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25430-missing-authorization-in-crm-perks--2f7a8884</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25430%3A%20Missing%20Authorization%20in%20CRM%20Perks%20Integration%20for%20Mailchimp%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Ninja%20Forms&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d6762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25429-deserialization-of-untrusted-data-i-c090ef86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25429%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpdive%20Nexa%20Blocks&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d675f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25417-improper-neutralization-of-input-du-db9ee3e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25417%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d675c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25414-incorrect-privilege-assignment-in-i-ae58ac67</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25414%3A%20Incorrect%20Privilege%20Assignment%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25413-unrestricted-upload-of-file-with-da-6b6e6389</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25413%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d6756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25406-authentication-bypass-using-an-alte-113a07b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25406%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Themeum%20Tutor%20LMS%20Pro&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25401-missing-authorization-in-arni-cinco-2a8cc6d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25401%3A%20Missing%20Authorization%20in%20Arni%20Cinco%20WPCargo%20Track%20%26%20Trace&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25400-deserialization-of-untrusted-data-i-e01202e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25400%3A%20Deserialization%20of%20Untrusted%20Data%20in%20thememount%20Apicona&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25398-missing-authorization-in-webilia-in-56d79e3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25398%3A%20Missing%20Authorization%20in%20Webilia%20Inc.%20Vertex%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69c4116bf4197a8e3b6d6694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25397-path-traversal-in-snowray-software--101897ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25397%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Snowray%20Software%20File%20Uploader%20for%20WooCommerce&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25396-missing-authorization-in-coderpress-f1f55866</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25396%3A%20Missing%20Authorization%20in%20CoderPress%20Commerce%20Coinbase%20For%20WooCommerce&amp;severity=high&amp;id=69c4116bf4197a8e3b6d668e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25390-missing-authorization-in-saad-iqbal-30d5d6a8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25390%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=medium&amp;id=69c4116bf4197a8e3b6d668b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25383-improper-neutralization-of-input-du-ad52f22e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Iqonic%20Design%20KiviCare&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25382-improper-control-of-filename-for-in-b1a3f429</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25382%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20IdealAuto&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25381-improper-control-of-filename-for-in-bf3ae8f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20LoveDate&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25380-improper-control-of-filename-for-in-4e514365</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25380%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20Feedy&amp;severity=high&amp;id=69c4116bf4197a8e3b6d667f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25379-improper-control-of-filename-for-in-41f5b03d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25379%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20StreamVid&amp;severity=high&amp;id=69c4116bf4197a8e3b6d667c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25377-improper-neutralization-of-special--774b684d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25377%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20eyecix%20Addon%20Jobsearch%20Chat&amp;severity=critical&amp;id=69c41169f4197a8e3b6d6605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25376-improper-neutralization-of-input-du-2017ea9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20Addon%20Jobsearch%20Chat&amp;severity=high&amp;id=69c41169f4197a8e3b6d6602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25373-improper-neutralization-of-input-du-50c7553d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25373%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ProgressionStudios%20Vayvo&amp;severity=high&amp;id=69c41169f4197a8e3b6d65ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25371-improper-neutralization-of-special--46b7e8b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25371%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20King-Theme%20Lumise%20Product%20Designer&amp;severity=critical&amp;id=69c41169f4197a8e3b6d65fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25366-improper-control-of-generation-of-c-95f22122</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25366%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Themeisle%20Woody%20ad%20snippets&amp;severity=critical&amp;id=69c41169f4197a8e3b6d65f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25365-missing-authorization-in-zgr-karala-13cb1701</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25365%3A%20Missing%20Authorization%20in%20%C3%96zg%C3%BCr%20KARALAR%20Kargo%20Takip&amp;severity=medium&amp;id=69c41169f4197a8e3b6d65f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25361-improper-neutralization-of-input-du-4f4fc631</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20WpEvently&amp;severity=high&amp;id=69c41169f4197a8e3b6d65f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25360-deserialization-of-untrusted-data-i-d79678be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25360%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Vex&amp;severity=high&amp;id=69c41169f4197a8e3b6d65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25359-deserialization-of-untrusted-data-i-e2af6acf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25359%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Pendulum&amp;severity=high&amp;id=69c41169f4197a8e3b6d65ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25358-deserialization-of-untrusted-data-i-869f82c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25358%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Meloo&amp;severity=high&amp;id=69c41169f4197a8e3b6d65e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25357-authentication-bypass-using-an-alte-e7be9ed2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25357%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20azzaroco%20Ultimate%20Membership%20Pro&amp;severity=high&amp;id=69c41167f4197a8e3b6d65d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25356-improper-neutralization-of-input-du-aedbab8d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Yobazar&amp;severity=high&amp;id=69c41167f4197a8e3b6d65cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25355-improper-neutralization-of-input-du-75f9668b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Sanzo&amp;severity=medium&amp;id=69c41167f4197a8e3b6d65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25354-improper-neutralization-of-input-du-58fc7554</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Reebox&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25353-improper-neutralization-of-input-du-b074cc58</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Nooni&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25352-improper-neutralization-of-input-du-3bf1831f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20MyDecor&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25351-improper-neutralization-of-input-du-ab648dad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20MyMedi&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25350-improper-neutralization-of-input-du-cf606794</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Miti&amp;severity=high&amp;id=69c41167f4197a8e3b6d65bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25349-improper-neutralization-of-input-du-ed2d256e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Loobek&amp;severity=high&amp;id=69c41167f4197a8e3b6d65ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25347-improper-neutralization-of-input-du-88ea1079</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Acato%20WP%20REST%20Cache&amp;severity=high&amp;id=69c41167f4197a8e3b6d65b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25346-improper-neutralization-of-input-du-d7dfaca8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25346%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20FAQ%20Builder%20AYS&amp;severity=high&amp;id=69c41165f4197a8e3b6d653d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25345-improper-validation-of-specified-qu-69a2904c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25345%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20GalleryCreator%20SimpLy%20Gallery&amp;severity=critical&amp;id=69c41165f4197a8e3b6d6539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25344-exposure-of-sensitive-system-inform-64e99ef5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25344%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20RadiusTheme%20Review%20Schema&amp;severity=medium&amp;id=69c41165f4197a8e3b6d6536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25342-improper-neutralization-of-input-du-75a343ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25342%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kutethemes%20Boutique&amp;severity=high&amp;id=69c41165f4197a8e3b6d6533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25341-improper-neutralization-of-input-du-de6a8483</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RSJoomla!%20RSFirewall!&amp;severity=high&amp;id=69c41165f4197a8e3b6d6530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25340-improper-neutralization-of-special--f22658f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25340%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=critical&amp;id=69c41165f4197a8e3b6d6527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25339-insertion-of-sensitive-information--fdbd3e98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25339%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=medium&amp;id=69c41165f4197a8e3b6d6523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25334-incorrect-privilege-assignment-in-w-09e2a0d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25334%3A%20Incorrect%20Privilege%20Assignment%20in%20wordpresschef%20Salon%20Booking%20System%20Pro&amp;severity=high&amp;id=69c41165f4197a8e3b6d6520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25328-improper-limitation-of-a-pathname-t-501c9a47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25328%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20add-ons.org%20Product%20File%20Upload%20for%20WooCommerce&amp;severity=medium&amp;id=69c41165f4197a8e3b6d651d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25327-missing-authorization-in-rustaurius-33400d06</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25327%3A%20Missing%20Authorization%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=medium&amp;id=69c41165f4197a8e3b6d651a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25317-missing-authorization-in-tychesoftw-01e3cefb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25317%3A%20Missing%20Authorization%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=high&amp;id=69c41163f4197a8e3b6d6267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25309-missing-authorization-in-publishpre-c18d5b56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25309%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Authors&amp;severity=high&amp;id=69c41163f4197a8e3b6d6264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25306-improper-neutralization-of-input-du-407c5d8f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25306%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=high&amp;id=69c41163f4197a8e3b6d6261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25304-improper-neutralization-of-input-du-3a5b82f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Jaroti&amp;severity=high&amp;id=69c41163f4197a8e3b6d625e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25035-authentication-bypass-using-an-alte-6dd433fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25035%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=critical&amp;id=69c41163f4197a8e3b6d625b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25034-missing-authorization-in-iqonic-des-53bb8eb7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25034%3A%20Missing%20Authorization%20in%20Iqonic%20Design%20KiviCare&amp;severity=medium&amp;id=69c41163f4197a8e3b6d6258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25033-improper-neutralization-of-input-du-fc49554a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uixthemes%20Motta%20Addons&amp;severity=high&amp;id=69c41163f4197a8e3b6d6255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25032-deserialization-of-untrusted-data-i-9bca17dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25032%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Ricky&amp;severity=critical&amp;id=69c41163f4197a8e3b6d6252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25031-deserialization-of-untrusted-data-i-4588f14a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25031%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Tasty%20Daily&amp;severity=critical&amp;id=69c41163f4197a8e3b6d624f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25030-deserialization-of-untrusted-data-i-0109f9ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25030%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Goldish&amp;severity=critical&amp;id=69c41163f4197a8e3b6d624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25029-deserialization-of-untrusted-data-i-e68eb6ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25029%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20KIDZ&amp;severity=critical&amp;id=69c41161f4197a8e3b6d6200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25026-missing-authorization-in-radiusthem-020ee7c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25026%3A%20Missing%20Authorization%20in%20RadiusTheme%20Team&amp;severity=high&amp;id=69c41161f4197a8e3b6d61fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25025-improper-neutralization-of-input-du-08bd84c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRestaurants&amp;severity=high&amp;id=69c41161f4197a8e3b6d61fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25018-improper-neutralization-of-input-du-acecd365</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stmcan%20NaturaLife%20Extensions&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25017-improper-control-of-filename-for-in-23c8041c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20stmcan%20NaturaLife%20Extensions&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25013-improper-neutralization-of-input-du-5848b46d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25013%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WHMCSdes%20Phox%20Hosting&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25009-missing-authorization-in-raratheme--b64d4e55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25009%3A%20Missing%20Authorization%20in%20raratheme%20Education%20Zone&amp;severity=medium&amp;id=69c41161f4197a8e3b6d61ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25007-improper-neutralization-of-special--a4ed9879</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25007%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=high&amp;id=69c41161f4197a8e3b6d61eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25002-authentication-bypass-using-an-alte-c78d2045</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25002%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ThimPress%20LearnPress%20%26%238211%3B%20Sepay%20Payment&amp;severity=high&amp;id=69c41161f4197a8e3b6d61e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25001-improper-control-of-generation-of-c-ae6f032c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25001%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Saad%20Iqbal%20Post%20Snippets&amp;severity=high&amp;id=69c41161f4197a8e3b6d61e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24993-improper-neutralization-of-special--b883dbcf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24993%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFactory%20Advanced%20WooCommerce%20Product%20Sales%20Reporting&amp;severity=critical&amp;id=69c4115ef4197a8e3b6d6123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24989-deserialization-of-untrusted-data-i-0edb2e84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24989%3A%20Deserialization%20of%20Untrusted%20Data%20in%20FantasticPlugins%20SUMO%20Affiliates%20Pro&amp;severity=critical&amp;id=69c4115ef4197a8e3b6d6120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24987-missing-authorization-in-activity-l-48712d63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24987%3A%20Missing%20Authorization%20in%20activity-log.com%20WP%20System%20Log&amp;severity=medium&amp;id=69c4115ef4197a8e3b6d611d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24983-improper-neutralization-of-input-du-8a35f7d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UpSolution%20UpSolution%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d611a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24981-deserialization-of-untrusted-data-i-1a27f81f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24981%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Visionary%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24980-improper-neutralization-of-input-du-1df2a693</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Visionary%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24979-improper-neutralization-of-input-du-023f42da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24979%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobica%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24978-deserialization-of-untrusted-data-i-03d2a2f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24978%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Jobica%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d610e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24977-improper-neutralization-of-special--9ccd0146</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24977%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115ef4197a8e3b6d610b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24976-deserialization-of-untrusted-data-i-46cea663</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24976%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24975-improper-neutralization-of-input-du-0f06049c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24975%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24974-deserialization-of-untrusted-data-i-4f8b54a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24974%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20CitiLights&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24973-improper-neutralization-of-input-du-1a6da9e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20CitiLights&amp;severity=high&amp;id=69c4115bf4197a8e3b6d602d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24972-missing-authorization-in-elated-the-25a8605d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24972%3A%20Missing%20Authorization%20in%20Elated-Themes%20Elated%20Listing&amp;severity=medium&amp;id=69c4115bf4197a8e3b6d602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24971-incorrect-privilege-assignment-in-e-e65fc594</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24971%3A%20Incorrect%20Privilege%20Assignment%20in%20Elated-Themes%20Search%20%26%20Go&amp;severity=critical&amp;id=69c4115bf4197a8e3b6d6027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24970-improper-limitation-of-a-pathname-t-d928e49c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24970%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20designingmedia%20Energox&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24969-improper-limitation-of-a-pathname-t-073273ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24969%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20designingmedia%20Instant%20VA&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24964-server-side-request-forgery-ssrf-in-d35e9aca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24964%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=medium&amp;id=69c4115bf4197a8e3b6d601e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24391-improper-neutralization-of-input-du-8ccacf79</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24391%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeMakers%20Car%20Dealer&amp;severity=high&amp;id=69c4115bf4197a8e3b6d601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24382-missing-authorization-in-wproyal-ne-1ebfd1e3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24382%3A%20Missing%20Authorization%20in%20wproyal%20News%20Magazine%20X&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24378-deserialization-of-untrusted-data-i-c4842179</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24378%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Metagauss%20EventPrime&amp;severity=critical&amp;id=69c41159f4197a8e3b6d5335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24376-missing-authorization-in-javier-cas-3689cba3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24376%3A%20Missing%20Authorization%20in%20Javier%20Casares%20WPVulnerability&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24373-incorrect-privilege-assignment-in-m-6a717786</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24373%3A%20Incorrect%20Privilege%20Assignment%20in%20Metagauss%20RegistrationMagic&amp;severity=high&amp;id=69c41159f4197a8e3b6d532d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24372-authentication-bypass-by-spoofing-i-e801fb02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24372%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20WP%20Swings%20Subscriptions%20for%20WooCommerce&amp;severity=high&amp;id=69c41159f4197a8e3b6d5329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24370-improper-neutralization-of-input-du-a2a0caf6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24370%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Theme-one%20The%20Grid&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24369-missing-authorization-in-theme-one--f3e247a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24369%3A%20Missing%20Authorization%20in%20Theme-one%20The%20Grid&amp;severity=high&amp;id=69c41159f4197a8e3b6d5322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24364-missing-authorization-in-wedevs-wp--d6b24059</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24364%3A%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=medium&amp;id=69c41159f4197a8e3b6d531f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24363-missing-authorization-in-loopus-wp--d34c4544</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24363%3A%20Missing%20Authorization%20in%20loopus%20WP%20Cost%20Estimation%20%26%20Payment%20Forms%20Builder&amp;severity=high&amp;id=69c41159f4197a8e3b6d531c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24362-missing-authorization-in-bdthemes-u-661e960a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24362%3A%20Missing%20Authorization%20in%20bdthemes%20Ultimate%20Post%20Kit&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24359-authentication-bypass-using-an-alte-949b7d59</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24359%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Dokan%2C%20Inc.%20Dokan&amp;severity=high&amp;id=69c41159f4197a8e3b6d5316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23979-improper-neutralization-of-input-du-b95473dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23979%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Softwebmedia%20Gyan%20Elements&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23977-missing-authorization-in-wpfactory--09d6c217</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23977%3A%20Missing%20Authorization%20in%20WPFactory%20Helpdesk%20Support%20Ticket%20System%20for%20WooCommerce&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23973-improper-neutralization-of-input-du-e36b0bae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Golo&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23972-missing-authorization-in-magepeople-6a39edcf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23972%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=medium&amp;id=69c41156f4197a8e3b6d529f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23971-deserialization-of-untrusted-data-i-107d0db3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23971%3A%20Deserialization%20of%20Untrusted%20Data%20in%20xtemos%20WoodMart&amp;severity=high&amp;id=69c41156f4197a8e3b6d529c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23807-improper-neutralization-of-input-du-e08c0582</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23807%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Socio%20WP%20Telegram%20Widget%20and%20Join%20Link&amp;severity=high&amp;id=69c41156f4197a8e3b6d5299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23806-missing-authorization-in-blueglass--7be7b6a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23806%3A%20Missing%20Authorization%20in%20BlueGlass%20Interactive%20AG%20Jobs%20for%20WordPress&amp;severity=high&amp;id=69c41156f4197a8e3b6d5296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22524-improper-neutralization-of-input-du-722e83cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Legacy%20Admin&amp;severity=high&amp;id=69c41156f4197a8e3b6d5293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22523-improper-neutralization-of-input-du-2f292154</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22523%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Ultra%20WordPress%20Admin&amp;severity=high&amp;id=69c41156f4197a8e3b6d5290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22520-improper-neutralization-of-input-du-bf44ecfb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Handmade%20Framework&amp;severity=high&amp;id=69c41156f4197a8e3b6d528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22516-improper-control-of-filename-for-in-411fc406</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22516%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wizor&apos;s&amp;severity=high&amp;id=69c41154f4197a8e3b6d521d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22515-improper-control-of-filename-for-in-92e1df77</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22515%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20VegaDays&amp;severity=high&amp;id=69c41154f4197a8e3b6d521a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22514-improper-control-of-filename-for-in-20e19566</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22514%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Unica&amp;severity=high&amp;id=69c41154f4197a8e3b6d5217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22513-improper-control-of-filename-for-in-1c531a8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22513%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Triompher&amp;severity=high&amp;id=69c41154f4197a8e3b6d5214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22512-improper-control-of-filename-for-in-602d5c6f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22512%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Roisin&amp;severity=high&amp;id=69c41154f4197a8e3b6d5211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22511-improper-control-of-filename-for-in-deff7abf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22511%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20NeoBeat&amp;severity=high&amp;id=69c41154f4197a8e3b6d520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22510-deserialization-of-untrusted-data-i-194f8c21</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22510%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Melody&amp;severity=high&amp;id=69c41154f4197a8e3b6d520b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22509-improper-control-of-filename-for-in-b5770cc2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22509%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Gioia&amp;severity=high&amp;id=69c41154f4197a8e3b6d5208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22508-improper-control-of-filename-for-in-57f9b376</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22508%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Dentalux&amp;severity=high&amp;id=69c41154f4197a8e3b6d5205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22507-deserialization-of-untrusted-data-i-af73ebf3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Beelove&amp;severity=critical&amp;id=69c41154f4197a8e3b6d5202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22506-improper-control-of-filename-for-in-9c54f3e7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22506%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Amoli&amp;severity=high&amp;id=69c41151f4197a8e3b6d5199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22505-deserialization-of-untrusted-data-i-3904281b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22505%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Morning%20Records&amp;severity=high&amp;id=69c41151f4197a8e3b6d5196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22504-improper-control-of-filename-for-in-e912a8a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22504%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ProLingua&amp;severity=high&amp;id=69c41151f4197a8e3b6d5193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22503-improper-control-of-filename-for-in-7fb487ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22503%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Nelson&amp;severity=high&amp;id=69c41151f4197a8e3b6d5190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22502-improper-control-of-filename-for-in-b429c1bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22502%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Mr.%20Cobbler&amp;severity=high&amp;id=69c41151f4197a8e3b6d518d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22500-deserialization-of-untrusted-data-i-6b3e8a60</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22500%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20m2%20%7C%20Construction%20and%20Tools%20Store&amp;severity=critical&amp;id=69c41151f4197a8e3b6d518a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22499-improper-control-of-filename-for-in-e88a1c55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22499%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Lella&amp;severity=high&amp;id=69c41151f4197a8e3b6d5187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22498-improper-control-of-filename-for-in-8cb213f8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22498%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Laurent&amp;severity=high&amp;id=69c41151f4197a8e3b6d5184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22496-improper-control-of-filename-for-in-3fd5999d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22496%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Hypnotherapy&amp;severity=high&amp;id=69c41151f4197a8e3b6d5181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22495-improper-control-of-filename-for-in-e572e336</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22495%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Greenville&amp;severity=high&amp;id=69c41151f4197a8e3b6d517e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22494-improper-control-of-filename-for-in-108280d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22494%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Good%20Homes&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22493-improper-control-of-filename-for-in-85abbaf4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22493%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Gaspard&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22491-improper-neutralization-of-input-du-c9c8f055</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22485-missing-authorization-in-ruhul-amin-fe036a67</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22485%3A%20Missing%20Authorization%20in%20Ruhul%20Amin%20My%20Album%20Gallery&amp;severity=medium&amp;id=69c4114ff4197a8e3b6d50b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22484-improper-neutralization-of-special--ea184701</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22484%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pebas%20Lisfinity%20Core&amp;severity=critical&amp;id=69c4114ff4197a8e3b6d50b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22480-deserialization-of-untrusted-data-i-beede38d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22480%3A%20Deserialization%20of%20Untrusted%20Data%20in%20WebToffee%20Product%20Feed%20for%20WooCommerce&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22448-improper-limitation-of-a-pathname-t-60ea4cb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22448%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flexcubed%20PitchPrint&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69358-missing-authorization-in-metagauss--bf9d4e77</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69358%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69347-authorization-bypass-through-user-c-13002512</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69347%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Convers%20Lab%20WPSubscription&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69096-improper-neutralization-of-input-du-080c5391</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Zorka&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20108-improper-neutralization-of-input-du-72c89549</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20108%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20112-improper-neutralization-of-input-du-a16672bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b699905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20113-improper-neutralization-of-crlf-seq-c2135bf5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20114-improper-validation-of-syntactic-co-57e09085</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20114%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20115-cleartext-transmission-of-sensitive-2338cc47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20115%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20083-improper-handling-of-extra-paramete-30a02b67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20083%3A%20Improper%20Handling%20of%20Extra%20Parameters%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20110-incorrect-privilege-assignment-in-c-02a77f10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20110%3A%20Incorrect%20Privilege%20Assignment%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b699902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20104-buffer-underwrite-buffer-underflow--3de1764a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20104%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20004-missing-reference-to-active-allocat-e6f24850</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20004%3A%20Missing%20Reference%20to%20Active%20Allocated%20Resource%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58341-cwe-89-improper-neutralization-of-s-4c430d30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58341%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Opencart%20OpenCart%20Core&amp;severity=high&amp;id=69c40a64f4197a8e3b6998e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20125-improper-handling-of-syntactically--365ab152</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20125%3A%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20Cisco%20IOS&amp;severity=high&amp;id=69c40a67f4197a8e3b699a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20012-missing-release-of-memory-after-eff-62169714</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20012%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20IOS&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20086-improper-handling-of-missing-values-f636f063</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20086%3A%20Improper%20Handling%20of%20Missing%20Values%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20084-uncontrolled-resource-consumption-i-1bc72f79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20084%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3218-cwe-79-improper-neutralization-of-in-846bf146</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3218%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Responsive%20Favicons&amp;severity=medium&amp;id=69c40334f4197a8e3b666f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3217-cwe-79-improper-neutralization-of-in-91bf5ea2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20SAML%20SSO%20-%20Service%20Provider&amp;severity=medium&amp;id=69c40334f4197a8e3b666f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3216-cwe-918-server-side-request-forgery--13e3758e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3216%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Drupal%20Drupal%20Canvas&amp;severity=medium&amp;id=69c40334f4197a8e3b666f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3215-cwe-79-improper-neutralization-of-in-677d9a3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3215%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Islandora&amp;severity=medium&amp;id=69c40331f4197a8e3b666ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3214-cwe-288-authentication-bypass-using--0a2b53c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3214%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20CAPTCHA&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3213-cwe-79-improper-neutralization-of-in-bf87487f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3213%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Anti-Spam%20by%20CleanTalk&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24750-cwe-79-improper-neutralization-of-i-ce0f5c25</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24750%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=high&amp;id=69c40331f4197a8e3b666eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3212-cwe-79-improper-neutralization-of-in-591aa3ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Tagify&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3211-cwe-352-cross-site-request-forgery-c-81964679</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3211%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Theme%20Negotiation%20by%20Rules&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3210-cwe-863-incorrect-authorization-in-d-21752fb0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3210%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Material%20Icons&amp;severity=medium&amp;id=69c40331f4197a8e3b666ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2349-cwe-79-improper-neutralization-of-in-08f298cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20UI%20Icons&amp;severity=medium&amp;id=69c40331f4197a8e3b666eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2348-cwe-79-improper-neutralization-of-in-8bb7024f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2348%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Quick%20Edit&amp;severity=medium&amp;id=69c40331f4197a8e3b666eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1917-cwe-288-authentication-bypass-using--e6ab6029</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1917%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Login%20Disable&amp;severity=medium&amp;id=69c40331f4197a8e3b666eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-cybercriminal-gets-2-year-prison-sentence--eacebc06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Cybercriminal%20Gets%202-Year%20Prison%20Sentence%20in%20US&amp;severity=medium&amp;id=69c3f19cf4197a8e3b553b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33268-cwe-400-uncontrolled-resource-consu-67964107</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33268%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Nanoleaf%20Lines&amp;severity=medium&amp;id=69c3f1b2f4197a8e3b5542d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23514-cwe-282-improper-ownership-manageme-7a0173a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23514%3A%20CWE-282%3A%20Improper%20Ownership%20Management%20in%20kiteworks%20core&amp;severity=high&amp;id=69c3f1b2f4197a8e3b5542d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-speeds-attacks-but-identity-remains-cybersecuri-34bed359</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Speeds%20Attacks%2C%20But%20Identity%20Remains%20Cybersecurity%E2%80%99s%20Weakest%20Link&amp;severity=medium&amp;id=69c3ee18f4197a8e3b53b59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3591-cwe-562-return-of-stack-variable-add-0a50bc6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3591%3A%20CWE-562%20Return%20of%20Stack%20Variable%20Address%20in%20ISC%20BIND%209&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3119-cwe-617-reachable-assertion-in-isc-b-7dde1da1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3119%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20BIND%209&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4815-cwe-89-improper-neutralization-of-sp-86ce3b3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4815%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4816-cwe-79-improper-neutralization-of-in-bb35cca3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4816%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3104-cwe-772-missing-release-of-resource--9a88f86a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3104%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20ISC%20BIND%209&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ios-macos-264-roll-out-with-fresh-security-patches-b250a770</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=iOS%2C%20macOS%2026.4%20Roll%20Out%20With%20Fresh%20Security%20Patches&amp;severity=medium&amp;id=69c3e38cf4197a8e3b4fd60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1519-cwe-606-unchecked-input-for-loop-con-5c130d5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1519%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20ISC%20BIND%209&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40842-cwe-79-improper-neutralization-of-i-f4ccbe80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40842%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40841-cwe-352-cross-site-request-forgery--52cb0b35</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40841%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=medium&amp;id=69c3e3c7f4197a8e3b4fe9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27260-cwe-790-in-ericsson-indoor-connect--70b4897e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27260%3A%20CWE-790%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4761-cwe-732-incorrect-permission-assignm-1eae1c84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4761%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20CODRA%20Panorama%20Suite&amp;severity=low&amp;id=69c3dca4f4197a8e3b4d5c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-bans-new-routers-made-outside-the-us-over-nati-0079eee7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Bans%20New%20Routers%20Made%20Outside%20the%20US%20Over%20National%20Security%20Risks&amp;severity=medium&amp;id=69c3d900f4197a8e3b4c48ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4760-cwe-552-files-or-directories-accessi-bd7c05a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4760%3A%20CWE-552%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20CODRA%20Panorama%20Suite&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-trivy-to-broad-oss-compromise-teampcp-hits-do-703cdc7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Trivy%20to%20Broad%20OSS%20Compromise%3A%20TeamPCP%20Hits%20Docker%20Hub%2C%20VS%20Code%2C%20PyPI&amp;severity=medium&amp;id=69c3ce74f4197a8e3b4950bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-malicious-pypi-packages-091bfe2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%3A%20Malicious%20PyPI%20Packages&amp;severity=medium&amp;id=69c3f1aef4197a8e3b553f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-package-litellm-supply-chain-compro-c04058b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Package%20-%20LiteLLM%20Supply%20Chain%20Compromise&amp;severity=medium&amp;id=69c3ee28f4197a8e3b53b8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23333-6b151339</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23333&amp;severity=null&amp;id=69dcf3cf82d89c981fee9b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23320-fa1f52b5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23320&amp;severity=null&amp;id=69cfe4200a160ebd923f9c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-prisons-russian-access-broker-for-aiding-ransom-df65fd02</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Prisons%20Russian%20Access%20Broker%20for%20Aiding%20Ransomware%20Attacks&amp;severity=medium&amp;id=69c3ab4cf4197a8e3b3a1b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3608-cwe-617-reachable-assertion-in-isc-k-fed4f439</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3608%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20Kea&amp;severity=high&amp;id=69c3a455f4197a8e3b370141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackerone-employee-data-exposed-in-massive-navia-b-c6b11c77</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HackerOne%20Employee%20Data%20Exposed%20in%20Massive%20Navia%20Breach&amp;severity=medium&amp;id=69c3963cf4197a8e3b2f4bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32326-missing-authentication-for-critical-9a481b76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32326%3A%20Missing%20authentication%20for%20critical%20function%20in%20Sharp%20Corporation%20home%205G%20HR01&amp;severity=medium&amp;id=69c39653f4197a8e3b2f5482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2343-cwe-200-information-exposure-in-pepr-b24bfe87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2343%3A%20CWE-200%20Information%20Exposure%20in%20PeproDev%20Ultimate%20Invoice&amp;severity=medium&amp;id=69c37d98f4197a8e3b0cd267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26306-uncontrolled-search-path-element-in-ee774158</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26306%3A%20Uncontrolled%20Search%20Path%20Element%20in%20OM%20Digital%20Solutions%20Corporation%20OM%20Workspace%20(Windows%20Edition)&amp;severity=high&amp;id=69c37d98f4197a8e3b0cd263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33253-unquoted-search-path-or-element-in--97bdffae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33253%3A%20Unquoted%20search%20path%20or%20element%20in%20SANYO%20DENKI%20CO.%2C%20LTD.%20SANUPS%20SOFTWARE%20STANDALONE&amp;severity=medium&amp;id=69c37690f4197a8e3bfb90e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guidance-for-detecting-investigating-and-defending-f813b422</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guidance%20for%20detecting%2C%20investigating%2C%20and%20defending%20against%20the%20Trivy%20supply%20chain%20compromise&amp;severity=medium&amp;id=69c3b5e5f4197a8e3b411ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2072-cwe-79-improper-neutralization-of-in-c6f3add7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2072%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=high&amp;id=69c34c81f4197a8e3bc565a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1166-cwe-601-url-redirection-to-untrusted-7de2151a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1166%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20Hitachi%20Hitachi%20Ops%20Center%20Administrator&amp;severity=medium&amp;id=69c34c7ef4197a8e3bc56508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4766-cwe-79-improper-neutralization-of-in-c6d9900c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4766%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devrix%20Easy%20Image%20Gallery&amp;severity=medium&amp;id=69c33e4ff4197a8e3bb9c1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4784-sql-injection-in-code-projects-simpl-1ba821cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4784%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c33e4ff4197a8e3bb9c1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28864-a-local-attacker-may-gain-access-to-881070fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28864%3A%20A%20local%20attacker%20may%20gain%20access%20to%20user&apos;s%20Keychain%20items%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69c333e1f4197a8e3baaec88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20691-a-maliciously-crafted-webpage-may-b-25f0d1f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20691%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28833-an-app-may-be-able-to-enumerate-a-u-fa046f85</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28833%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28825-an-app-may-be-able-to-modify-protec-1aa50dd2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28825%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20668-an-app-may-be-able-to-access-sensit-fb27d790</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20668%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20687-an-app-may-be-able-to-cause-unexpec-a39ac789</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20687%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333d8f4197a8e3baae878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20701-an-app-may-be-able-to-connect-to-a--7a65470e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20701%3A%20An%20app%20may%20be%20able%20to%20connect%20to%20a%20network%20share%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d9f4197a8e3baae9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43534-a-user-with-physical-access-to-an-i-a6c8aefa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43534%3A%20A%20user%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20bypass%20Activation%20Lock%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28868-an-app-may-be-able-to-disclose-kern-ac04a2d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28868%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20633-an-app-may-be-able-to-access-user-s-84a84ff2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20633%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28829-an-app-may-be-able-to-modify-protec-e359e57b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28829%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20664-processing-maliciously-crafted-web--5c90b907</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20664%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28891-an-app-may-be-able-to-break-out-of--ee90eae8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28891%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333e4f4197a8e3baaeda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28852-an-app-may-be-able-to-cause-a-denia-6621e6ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28852%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28844-an-attacker-may-gain-access-to-prot-bb0e69d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28844%3A%20An%20attacker%20may%20gain%20access%20to%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28845-an-app-may-be-able-to-access-protec-f04601d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28845%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28890-an-app-may-be-able-to-cause-unexpec-f5b333b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28890%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69c333e4f4197a8e3baaeda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20665-processing-maliciously-crafted-web--1173ad63</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20665%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20prevent%20Content%20Security%20Policy%20from%20being%20enforced%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28828-an-app-may-be-able-to-access-sensit-9a0b8461</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28828%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20632-an-app-may-be-able-to-access-sensit-13673933</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20632%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28886-a-user-in-a-privileged-network-posi-e3bd49f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28886%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20686-an-app-may-be-able-to-access-sensit-9f6a0432</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20686%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28824-an-app-may-be-able-to-access-sensit-b959c5c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28824%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28832-an-app-may-be-able-to-disclose-kern-40d9ae89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28832%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333ddf4197a8e3baaeaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20690-processing-an-audio-stream-in-a-mal-83d58a53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20690%3A%20Processing%20an%20audio%20stream%20in%20a%20maliciously%20crafted%20media%20file%20may%20terminate%20the%20process%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28865-an-attacker-in-a-privileged-network-fc3fc9e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28865%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20intercept%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e1f4197a8e3baaec91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28881-an-app-may-be-able-to-access-sensit-0e9705ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28881%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28839-an-app-may-be-able-to-access-sensit-0f2f7834</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28839%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28878-an-app-may-be-able-to-enumerate-a-u-d79e680b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28878%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28842-a-buffer-overflow-may-result-in-mem-7b712ac1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28842%3A%20A%20buffer%20overflow%20may%20result%20in%20memory%20corruption%20and%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333dff4197a8e3baaeb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28862-an-app-may-be-able-to-access-user-s-3d9dc891</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28862%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4783-sql-injection-in-itsourcecode-colleg-35d140b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4783%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20697-an-app-may-be-able-to-access-sensit-9485ad53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20697%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28835-mounting-a-maliciously-crafted-smb--0003d53f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28835%3A%20Mounting%20a%20maliciously%20crafted%20SMB%20network%20share%20may%20lead%20to%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28823-an-app-with-root-privileges-may-be--b80563d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28823%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20639-processing-a-maliciously-crafted-st-e26a8a3e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20639%3A%20Processing%20a%20maliciously%20crafted%20string%20may%20lead%20to%20heap%20corruption%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28874-a-remote-attacker-may-cause-an-unex-410e92ff</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28874%3A%20A%20remote%20attacker%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e1f4197a8e3baaecc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28858-a-remote-user-may-be-able-to-cause--a262d8bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28858%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69c333dff4197a8e3baaeb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28818-an-app-may-be-able-to-access-sensit-ad0b9870</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28818%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28859-a-malicious-website-may-be-able-to--67e98019</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28859%3A%20A%20malicious%20website%20may%20be%20able%20to%20process%20restricted%20web%20content%20outside%20the%20sandbox%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28875-a-remote-attacker-may-be-able-to-ca-8e041a65</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28875%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e3f4197a8e3baaed0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28822-an-attacker-may-be-able-to-cause-un-ca536b77</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28822%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28834-an-app-may-be-able-to-cause-unexpec-2543d750</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28834%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28863-an-app-may-be-able-to-fingerprint-t-22945cdf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28863%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28855-an-app-may-be-able-to-access-protec-629e8fff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28855%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333dff4197a8e3baaeb35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28879-processing-maliciously-crafted-web--a5982e22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28879%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28838-an-app-may-be-able-to-break-out-of--321bc65e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28838%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20622-an-app-may-be-able-to-capture-a-use-271f13f5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20622%3A%20An%20app%20may%20be%20able%20to%20capture%20a%20user&apos;s%20screen%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28880-an-app-may-be-able-to-enumerate-a-u-f03c14ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28880%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28817-a-sandboxed-process-may-be-able-to--7f2dd0fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28817%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d9f4197a8e3baae9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28856-an-attacker-with-physical-access-to-d9983940</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28856%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28895-an-attacker-with-physical-access-to-e2dd54e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28895%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20with%20Stolen%20Device%20Protection%20enabled%20may%20be%20able%20to%20access%20biometrics-gated%20Protected%20Apps%20with%20the%20passcode%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20637-an-app-may-be-able-to-cause-unexpec-2b4e9d40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20637%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20699-an-app-may-be-able-to-access-user-s-e0ba9421</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20699%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28876-an-app-may-be-able-to-access-sensit-f8905d44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28876%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e3f4197a8e3baaed11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28821-an-app-may-be-able-to-gain-elevated-3346a830</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28821%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333dcf4197a8e3baaea68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28837-an-app-may-be-able-to-access-sensit-51de8014</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28837%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333ddf4197a8e3baaeb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20695-an-app-may-be-able-to-determine-ker-86e9b47e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20695%3A%20An%20app%20may%20be%20able%20to%20determine%20kernel%20memory%20layout%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28861-a-malicious-website-may-be-able-to--0a3ac84d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28861%3A%20A%20malicious%20website%20may%20be%20able%20to%20access%20script%20message%20handlers%20intended%20for%20other%20origins%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20694-an-app-may-be-able-to-access-user-s-27d0a0a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20694%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28820-an-app-may-be-able-to-access-sensit-892a3022</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28820%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28877-an-app-may-be-able-to-access-sensit-cde6f9f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28877%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20657-parsing-a-maliciously-crafted-file--fe48ac48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20657%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20698-an-app-may-be-able-to-cause-unexpec-ee089061</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20698%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28882-an-app-may-be-able-to-enumerate-a-u-1f178a94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28882%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28894-a-remote-attacker-may-be-able-to-ca-94559fd5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28894%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e4f4197a8e3baaedb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28857-processing-maliciously-crafted-web--033a4e0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28857%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28841-a-buffer-overflow-may-result-in-mem-7edff32a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28841%3A%20A%20buffer%20overflow%20may%20result%20in%20memory%20corruption%20and%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28816-an-app-may-be-able-to-delete-files--0d563ae5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28816%3A%20An%20app%20may%20be%20able%20to%20delete%20files%20for%20which%20it%20does%20not%20have%20permission%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20607-an-app-may-be-able-to-access-protec-e1636f7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20607%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28870-an-app-may-be-able-to-access-sensit-61a14a2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28870%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28827-an-app-may-be-able-to-break-out-of--866bf185</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28827%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=69c333dcf4197a8e3baaea86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28831-an-app-may-be-able-to-access-sensit-0a0d5960</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28831%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20693-an-attacker-with-root-privileges-ma-fd1df3d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20693%3A%20An%20attacker%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28866-an-app-may-be-able-to-access-sensit-e391ed81</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28866%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28889-an-app-may-be-able-to-read-arbitrar-fc523636</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28889%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20as%20root%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69c333e4f4197a8e3baaeda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28893-a-document-may-be-written-to-a-temp-bf2cd019</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28893%3A%20A%20document%20may%20be%20written%20to%20a%20temporary%20file%20when%20using%20print%20preview%20in%20Apple%20macOS&amp;severity=low&amp;id=69c333e4f4197a8e3baaedb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20631-a-user-may-be-able-to-elevate-privi-d06eaa8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20631%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20670-an-app-may-be-able-to-access-sensit-ebf18b3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20670%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20688-an-app-may-be-able-to-break-out-of--e375fe5c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20688%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69c333d8f4197a8e3baae880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28892-an-app-may-be-able-to-modify-protec-85f340ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28892%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28867-an-app-may-be-able-to-leak-sensitiv-4e056b54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28867%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20kernel%20state%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaeca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28888-an-app-may-be-able-to-gain-root-pri-ce802b59</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28888%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20692-hide-ip-address-and-block-all-remot-38515bb6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20692%3A%20%22Hide%20IP%20Address%22%20and%20%22Block%20All%20Remote%20Content%22%20may%20not%20apply%20to%20all%20mail%20content%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28826-a-malicious-app-may-be-able-to-brea-b4ee0304</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28826%3A%20A%20malicious%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28871-visiting-a-maliciously-crafted-webs-0bb72ba0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28871%3A%20Visiting%20a%20maliciously%20crafted%20website%20may%20lead%20to%20a%20cross-site%20scripting%20attack%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20684-an-app-may-bypass-gatekeeper-checks-adf5ef9f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20684%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=low&amp;id=69c333d8f4197a8e3baae872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20651-an-app-may-be-able-to-access-sensit-2ad8b257</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20651%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70888-na-374234a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70888%3A%20n%2Fa&amp;severity=critical&amp;id=69c437ecf4197a8e3b7b145b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70887-na-c70e4b84</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70887%3A%20n%2Fa&amp;severity=high&amp;id=69c430e5f4197a8e3b78e0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70952-na-2156d229</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70952%3A%20n%2Fa&amp;severity=high&amp;id=69c42db5f4197a8e3b77dc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67030-na-afb99fd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67030%3A%20n%2Fa&amp;severity=high&amp;id=69c422f4f4197a8e3b7492ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30587-na-f23f021a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30587%3A%20n%2Fa&amp;severity=medium&amp;id=69c41f52f4197a8e3b733a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26833-na-3aff288d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26833%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26832-na-97f776ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26832%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26831-na-efc1cb46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26831%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26830-na-8e48233f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26830%3A%20n%2Fa&amp;severity=critical&amp;id=69c3fc2ef4197a8e3b6310ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59707-na-0e36166b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59707%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a5697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59706-na-7647217d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59706%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a5692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32991-na-ad6453b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32991%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a568e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-25-a4c3da16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-25&amp;severity=medium&amp;id=69c3f89bf4197a8e3b58cf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51348-na-49839eae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51348%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51347-na-d4cb4e6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51347%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51346-na-9901719e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51346%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-25-79be0e8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-25&amp;severity=low&amp;id=69c36877f4197a8e3bf0fc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4781-sql-injection-in-sourcecodester-sale-8fea11d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4781%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31eacf4197a8e3b930252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4780-sql-injection-in-sourcecodester-sale-0aabb496</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4780%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31eacf4197a8e3b93024b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4779-sql-injection-in-sourcecodester-sale-34a97998</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4779%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31444f4197a8e3b89c8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4778-sql-injection-in-sourcecodester-sale-e2f8a6fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4778%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31444f4197a8e3b89c89f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4777-sql-injection-in-sourcecodester-sale-7679cc78</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4777%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c30994f4197a8e3b843569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33215-cwe-287-improper-authentication-in--f98c82ec</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33215%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c2ff45f4197a8e3b7e83b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3912-vulnerability-in-tibco-activematrix--51059409</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3912%3A%20Vulnerability%20in%20Tibco%20ActiveMatrix%20BusinessWorks&amp;severity=high&amp;id=69c2fb83f4197a8e3b7c5800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24159-cwe-502-deserialization-of-untruste-4cf367d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24159%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69c2f483f4197a8e3b756250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4371-vulnerability-in-mozilla-thunderbird-58e87494</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4371%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=69c2f483f4197a8e3b75625a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24157-cwe-502-deserialization-of-untruste-51ca158e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24157%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69c2f483f4197a8e3b756246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3889-vulnerability-in-mozilla-thunderbird-acd3fb47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3889%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=69c2f483f4197a8e3b756255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24141-cwe-502-deserialization-of-untruste-4a313153</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24141%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NVIDIA%20Model%20Optimizer&amp;severity=high&amp;id=69c2f481f4197a8e3b7561ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24158-cwe-789-memory-allocation-with-exce-76762b56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24158%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f483f4197a8e3b75624b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4433-cwe-16-configuration-in-tenable-inc--77e088cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4433%3A%20CWE-16%3A%20Configuration%20in%20Tenable%2C%20Inc.%20Tenable%20Operation%20Technology&amp;severity=low&amp;id=69c2f483f4197a8e3b75625f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33254-cwe-362-concurrent-execution-using--358dfacc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33254%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f481f4197a8e3b7561ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33238-cwe-362-concurrent-execution-using--5023a4c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33238%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f481f4197a8e3b7561d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33244-cwe-502-deserialization-of-untruste-bbcc3bf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33244%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Apex&amp;severity=critical&amp;id=69c2f481f4197a8e3b7561db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24152-cwe-502-deserialization-of-untruste-f1609282</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24152%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f483f4197a8e3b756240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24151-cwe-502-deserialization-of-untruste-edcc003d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24151%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f483f4197a8e3b75623b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24150-cwe-502-deserialization-of-untruste-7d7967df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24150%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33248-cwe-502-deserialization-of-untruste-b308316e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33248%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33247-cwe-502-deserialization-of-untruste-7c655a3d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33247%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33242-cwe-1234-hardware-internal-or-debug-7f05d71a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33242%3A%20CWE-1234%20Hardware%20Internal%20or%20Debug%20Modes%20Allow%20Override%20of%20Locks%20in%20NVIDIA%20HGX%20and%20DGX%20B300&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33216-cwe-131-incorrect-calculation-of-bu-e9c18c9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33216%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20NVIDIA%20SNAP-4%20Container&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33215-cwe-823-use-of-out-of-range-pointer-770a2bb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33215%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20NVIDIA%20SNAP-4%20Container&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21790-cwe-346-origin-validation-error-in--93f27af8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21790%3A%20CWE-346%20Origin%20Validation%20Error%20in%20HCLSoftware%20Traveler&amp;severity=medium&amp;id=69c2f483f4197a8e3b756262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21783-cwe-209-generation-of-error-message-d80a7b98</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21783%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20HCLSoftware%20Traveler&amp;severity=medium&amp;id=69c2edf6f4197a8e3b721c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doe-publishes-5-year-energy-security-plan-6d04c94f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoE%20Publishes%205-Year%20Energy%20Security%20Plan&amp;severity=critical&amp;id=69c2e9f1f4197a8e3b6b4be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33353-cwe-200-exposure-of-sensitive-infor-83abbf70</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33353%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20charmbracelet%20soft-serve&amp;severity=high&amp;id=69c2edf6f4197a8e3b721c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33349-cwe-1284-improper-validation-of-spe-5951d6d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33349%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b6441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33345-cwe-639-authorization-bypass-throug-35b2980a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33345%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20solidtime-io%20solidtime&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b6437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33347-cwe-79-improper-neutralization-of-i-6f555a6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33347%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thephpleague%20commonmark&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33344-cwe-22-improper-limitation-of-a-pat-0882b1ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33344%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=high&amp;id=69c2ea08f4197a8e3b6b6433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33332-cwe-20-improper-input-validation-in-2d869574</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33332%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b642e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33331-cwe-79-improper-neutralization-of-i-b93f3ccf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33331%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20middleapi%20orpc&amp;severity=high&amp;id=69c2ea08f4197a8e3b6b6429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33330-cwe-863-incorrect-authorization-in--38a1725c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33330%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20error311%20FileRise&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33329-cwe-22-improper-limitation-of-a-pat-32ac2e5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33329%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20error311%20FileRise&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33326-cwe-863-incorrect-authorization-in--8907ce9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33326%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20keystonejs%20keystone&amp;severity=medium&amp;id=69c2e66df4197a8e3b68b9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22559-vulnerability-in-ubiquiti-inc-unifi-0f8f5993</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22559%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Server&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33769-cwe-20-improper-input-validation-in-371658e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33769%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20withastro%20astro&amp;severity=low&amp;id=69c2dfdbf4197a8e3b622b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33768-cwe-441-unintended-proxy-or-interme-3218654b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33768%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=69c2dfdbf4197a8e3b622b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29772-cwe-770-allocation-of-resources-wit-9b870df0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29772%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20withastro%20astro&amp;severity=medium&amp;id=69c2dfdbf4197a8e3b622b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33627-cwe-200-exposure-of-sensitive-infor-57b44982</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33627%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33624-cwe-367-time-of-check-time-of-use-t-3f3de1c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33624%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69c2dfdbf4197a8e3b622b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-agentic-ai-systems-need-better-governance-less-960019ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Agentic%20AI%20Systems%20Need%20Better%20Governance%20%E2%80%93%20Lessons%20from%20OpenClaw&amp;severity=medium&amp;id=69c2d85cf4197a8e3b5f901d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33539-cwe-89-improper-neutralization-of-s-dc735645</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33539%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33538-cwe-400-uncontrolled-resource-consu-c4ec715d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33538%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d885f4197a8e3b5f9731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33527-cwe-863-incorrect-authorization-in--61241643</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33527%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f966e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33508-cwe-674-uncontrolled-recursion-in-p-88d9bc87</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33508%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33498-cwe-674-uncontrolled-recursion-in-p-f531b788</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33498%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33429-cwe-203-observable-discrepancy-in-p-94a62658</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33429%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f9659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33421-cwe-863-incorrect-authorization-in--e6ca8acf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33421%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33409-cwe-287-improper-authentication-in--997c90ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33409%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2417-cwe-306-missing-authentication-for-c-51d6a910</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2417%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Pharos%20Controls%20Mosaic%20Show%20Controller&amp;severity=critical&amp;id=69c2d884f4197a8e3b5f963d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33323-cwe-204-observable-response-discrep-6bee72c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33323%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33417-cwe-613-insufficient-session-expira-936c37e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33417%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f964e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1995-cwe-269-improper-privilege-managemen-7a93156b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1995%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IDrive%20IDrive%20Cloud%20Backup%20Client%20for%20Windows&amp;severity=high&amp;id=69c2d884f4197a8e3b5f963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33401-cwe-918-server-side-request-forgery-4e8fa50b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33401%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c2d885f4197a8e3b5f9738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poland-faced-a-surge-in-cyberattacks-in-2025-inclu-3b57db40</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Poland%20Faced%20a%20Surge%20in%20Cyberattacks%20in%202025%2C%20Including%20a%20Major%20Assault%20on%20the%20Energy%20Sector&amp;severity=medium&amp;id=69c2d155f4197a8e3b5d60aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33400-cwe-79-improper-neutralization-of-i-493e3777</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33400%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69c2f483f4197a8e3b756265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33399-cwe-918-server-side-request-forgery-cf84da1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33399%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33407-cwe-918-server-side-request-forgery-a7731ef1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33407%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c32654f4197a8e3b9def6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33162-cwe-285-improper-authorization-in-c-da1da056</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33162%3A%20CWE-285%3A%20Improper%20Authorization%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32854-cwe-476-null-pointer-dereference-in-d1594274</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32854%3A%20CWE-476%20NULL%20pointer%20dereference%20in%20LibVNC%20LibVNCServer&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33161-cwe-200-exposure-of-sensitive-infor-cd01c76d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33161%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20cms&amp;severity=low&amp;id=69c2cdd9f4197a8e3b58a8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32853-cwe-125-out-of-bounds-read-in-libvn-e16c0516</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32853%3A%20CWE-125%20Out-of-bounds%20read%20in%20LibVNC%20LibVNCServer&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33160-cwe-639-authorization-bypass-throug-464a6dc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33160%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=low&amp;id=69c2cdd9f4197a8e3b58a8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33159-cwe-306-missing-authentication-for--f5031588</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33159%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33158-cwe-639-authorization-bypass-throug-363e3163</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33158%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33157-cwe-470-use-of-externally-controlle-3699fcc5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33157%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69c2cdd9f4197a8e3b58a8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11571-cwe-78-improper-neutralization-of-s-3fc53108</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11571%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20silabs.com%20Simplicity%20Studio%20v5&amp;severity=low&amp;id=69c2c348f4197a8e3b526730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33340-cwe-306-missing-authentication-for--5fb325d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33340%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ParisNeo%20lollms-webui&amp;severity=critical&amp;id=69c2bc3ff4197a8e3b4e78c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33700-cwe-639-authorization-bypass-throug-054a316e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33700%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a082a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33680-cwe-285-improper-authorization-in-g-fb472728</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33680%3A%20CWE-285%3A%20Improper%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a0825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33679-cwe-918-server-side-request-forgery-eaf389a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33679%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33678-cwe-639-authorization-bypass-throug-7a8fbc15</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33678%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a081c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33677-cwe-200-exposure-of-sensitive-infor-7005c106</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33677%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33676-cwe-863-incorrect-authorization-in--430de562</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33676%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33675-cwe-918-server-side-request-forgery-a4a2e4ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33675%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33668-cwe-285-improper-authorization-in-g-db7e34de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33668%3A%20CWE-285%3A%20Improper%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b1b2f4197a8e3b48d1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33474-cwe-400-uncontrolled-resource-consu-cbc62c26</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33474%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71275-improper-neutralization-of-special--43d87f37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71275&amp;severity=critical&amp;id=69c2b1b2f4197a8e3b48d19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33473-cwe-287-improper-authentication-in--a2cf1947</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33473%3A%20CWE-287%3A%20Improper%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33336-cwe-94-improper-control-of-generati-f13f91f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33336%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33335-cwe-939-improper-authorization-in-h-13d64f3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33335%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33334-cwe-94-improper-control-of-generati-8c4529ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33334%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33316-cwe-284-improper-access-control-in--e7133b87</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33316%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b1b2f4197a8e3b48d1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33315-cwe-288-authentication-bypass-using-33a19297</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33315%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33313-cwe-639-authorization-bypass-throug-3819a7c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33313%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4775-integer-overflow-or-wraparound-in-re-40cceae4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4775%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69c2b1b4f4197a8e3b48d204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27651-cwe-476-null-pointer-dereference-in-912c3cca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27651%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27654-cwe-122-heap-based-buffer-overflow--2af0e08b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27654%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28755-cwe-863-incorrect-authorization-in--f467972a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28755%3A%20CWE-863%20Incorrect%20Authorization%20in%20F5%20NGINX%20Open%20Source&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28753-cwe-93-improper-neutralization-of-c-1339d031</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28753%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20F5%20NGINX%20Open%20Source&amp;severity=low&amp;id=69c2a3a3f4197a8e3b3ed941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32647-cwe-125-out-of-bounds-read-in-f5-ng-a7252f06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32647%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27784-cwe-190-integer-overflow-or-wraparo-253e3178</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27784%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-ip-kvms-tue-mar-24th-4cc76409</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20IP%20KVMs%2C%20(Tue%2C%20Mar%2024th)&amp;severity=medium&amp;id=69c29929f4197a8e3b3ab299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/extortion-group-claims-it-hacked-astrazeneca-c789ce2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Extortion%20Group%20Claims%20It%20Hacked%20AstraZeneca&amp;severity=medium&amp;id=69c29914f4197a8e3b3aa81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-146-update-patches-high-severity-vulnerabil-2b284599</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20146%20Update%20Patches%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69c29590f4197a8e3b399a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33497-cwe-22-improper-limitation-of-a-pat-87983cfc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33497%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c32654f4197a8e3b9def72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33484-cwe-284-improper-access-control-in--12cb985b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33484%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c29cc3f4197a8e3b3c19e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33475-cwe-74-improper-neutralization-of-s-73b70903</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33475%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c28b09f4197a8e3b35a4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33309-cwe-22-improper-limitation-of-a-pat-84fddebc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33309%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c28b09f4197a8e3b35a4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4721-vulnerability-in-mozilla-firefox-6dd025a0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4721%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b320700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4729-vulnerability-in-mozilla-firefox-f354bef4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4729%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c2878af4197a8e3b320775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4720-vulnerability-in-mozilla-firefox-5d43aced</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4720%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4719-vulnerability-in-mozilla-firefox-960c9a13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4719%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b3206f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4718-vulnerability-in-mozilla-firefox-fa7e8262</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4718%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b3206f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4728-vulnerability-in-mozilla-firefox-5ddb899b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4728%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69c2878af4197a8e3b320771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4727-vulnerability-in-mozilla-firefox-919ac0a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4727%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c2878af4197a8e3b32076d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4726-vulnerability-in-mozilla-firefox-f6103856</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4726%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c2878af4197a8e3b320769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4717-vulnerability-in-mozilla-firefox-922cb8a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4717%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4716-vulnerability-in-mozilla-firefox-a027e1cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4716%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4715-vulnerability-in-mozilla-firefox-b5163d43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4715%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4714-vulnerability-in-mozilla-firefox-e1e63892</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4714%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4713-vulnerability-in-mozilla-firefox-8fab9dfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4713%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b32065b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4712-vulnerability-in-mozilla-firefox-09347642</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4712%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4725-vulnerability-in-mozilla-firefox-59f68556</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4725%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c2878af4197a8e3b320765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4711-vulnerability-in-mozilla-firefox-ac9b31bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4711%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b320651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4710-vulnerability-in-mozilla-firefox-a367fc3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4710%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b32064c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4709-vulnerability-in-mozilla-firefox-72f81ae4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4709%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4708-vulnerability-in-mozilla-firefox-666a9c38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4708%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4707-vulnerability-in-mozilla-firefox-b30575b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4707%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b32063b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4706-vulnerability-in-mozilla-firefox-41dc456f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4706%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4705-vulnerability-in-mozilla-firefox-aebd74cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4705%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b320630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4704-vulnerability-in-mozilla-firefox-48a24581</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4704%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4724-vulnerability-in-mozilla-firefox-7e256640</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4724%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b32070e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4723-vulnerability-in-mozilla-firefox-de4dae1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4723%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b32070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4702-vulnerability-in-mozilla-firefox-7faf28c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4702%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4722-vulnerability-in-mozilla-firefox-76ac478f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4722%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b320706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4701-vulnerability-in-mozilla-firefox-0c790ff2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4701%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4700-vulnerability-in-mozilla-firefox-3c91843a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4700%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4699-vulnerability-in-mozilla-firefox-c673b182</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4699%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4698-vulnerability-in-mozilla-firefox-d3d4ca52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4698%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4697-vulnerability-in-mozilla-firefox-d3acfb7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4697%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4696-vulnerability-in-mozilla-firefox-8a27d3d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4696%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4695-vulnerability-in-mozilla-firefox-3f6b7028</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4695%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4694-vulnerability-in-mozilla-firefox-bf4db9f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4694%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4693-vulnerability-in-mozilla-firefox-eacfa2e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4693%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b32057c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4692-vulnerability-in-mozilla-firefox-5fc771f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4692%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4691-vulnerability-in-mozilla-firefox-9174de8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4691%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4690-vulnerability-in-mozilla-firefox-ee977b2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4690%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b32056a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4689-vulnerability-in-mozilla-firefox-b716733f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4689%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4688-vulnerability-in-mozilla-firefox-dfce27ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4688%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b32055f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4687-vulnerability-in-mozilla-firefox-56480adc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4687%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4686-vulnerability-in-mozilla-firefox-acd27d6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4686%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b320553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4685-vulnerability-in-mozilla-firefox-5488cd5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4685%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b32054d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4684-vulnerability-in-mozilla-firefox-c7909fc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4684%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b320547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/31-million-impacted-by-qualderm-data-breach-357a3657</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3.1%20Million%20Impacted%20by%20QualDerm%20Data%20Breach&amp;severity=medium&amp;id=69c283fef4197a8e3b30f536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-built-a-vast-camera-network-to-control-dissen-3256d1f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Built%20a%20Vast%20Camera%20Network%20to%20Control%20Dissent.%20Israel%20Turned%20It%20Into%20a%20Targeting%20Tool&amp;severity=medium&amp;id=69c28077f4197a8e3b2f50b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bubbles-role-in-phishing-scams-kaspersky-official--90945582</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bubble%E2%80%99s%20role%20in%20phishing%20scams%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c28095f4197a8e3b2f5da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64998-cwe-522-insufficiently-protected-cr-c68fc6ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64998%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69c2796ff4197a8e3b2bf4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-citrix-netscaler-vulnerability-poised-for-a0221796</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Citrix%20NetScaler%20Vulnerability%20Poised%20for%20Exploitation%2C%20Security%20Firms%20Warn&amp;severity=critical&amp;id=69c275ecf4197a8e3b2a01dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canisterworm-gets-teeth-teampcps-kubernetes-wiper--dacfd3cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CanisterWorm%20Gets%20Teeth%3A%20TeamPCP&apos;s%20Kubernetes%20Wiper%20Targets%20Iran&amp;severity=medium&amp;id=69c27268f4197a8e3b26b87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mazda-says-employee-partner-information-stolen-in--76691a7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mazda%20Says%20Employee%2C%20Partner%20Information%20Stolen%20in%20Cyberattack&amp;severity=medium&amp;id=69c26b5ff4197a8e3b1ca237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stryker-says-malicious-file-found-during-probe-int-19d82340</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stryker%20Says%20Malicious%20File%20Found%20During%20Probe%20Into%20Iran-Linked%20Attack&amp;severity=medium&amp;id=69c259ccf4197a8e3b0ee67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-compromise-spreads-from-trivy-to-chec-c6a7f036</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20chain%20compromise%20spreads%20from%20Trivy%20to%20Checkmarx%20GitHub%20Actions&amp;severity=medium&amp;id=69c27606f4197a8e3b2a0dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kics-github-action-compromised-teampcp-supply-chai-d4e55ee8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KICS%20GitHub%20Action%20Compromised%3A%20TeamPCP%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69c27268f4197a8e3b26b875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracing-a-multi-vector-malware-campaign-from-vbs-t-a4e44d8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracing%20a%20Multi-Vector%20Malware%20Campaign%3A%20From%20VBS%20to%20Open%20Infrastructure&amp;severity=medium&amp;id=69c27606f4197a8e3b2a0df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4649-cwe-306-missing-authentication-for-c-54868a12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4649%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=medium&amp;id=69c24bbbf4197a8e3b0767dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32642-cwe-863-incorrect-authorization-in--6d40c7c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32642%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Artemis&amp;severity=low&amp;id=69c24838f4197a8e3b038194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3509-cwe-134-use-of-externally-controlled-c3c53097</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3509%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=69c244c0f4197a8e3b01d2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41660-cwe-669-incorrect-resource-transfer-2b926cb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41660%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=69c244c0f4197a8e3b01d2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4756-cwe-787-out-of-bounds-write-in-molot-3c347234</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4756%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2331ef4197a8e3bf9e000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4755-cwe-20-cwe-20-in-molotovcherry-andro-fb2c95b0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4755%3A%20CWE-20%20CWE-20%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=critical&amp;id=69c2331ef4197a8e3bf9dffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4754-cwe-79-cwe-79-in-molotovcherry-andro-178e7ad4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4754%3A%20CWE-79%20CWE-79%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2331ef4197a8e3bf9dffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33852-cwe-401-missing-release-of-memory-a-fe4efbca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33852%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2331ef4197a8e3bf9dff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33856-cwe-401-missing-release-of-memory-a-56d151b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33856%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c32654f4197a8e3b9def75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33855-cwe-190-integer-overflow-or-wraparo-ba6009c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33855%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2d885f4197a8e3b5f9740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33854-cwe-787-out-of-bounds-write-in-molo-4afe3ba1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33854%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2d885f4197a8e3b5f973d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33853-cwe-476-null-pointer-dereference-in-978106cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33853%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33847-cwe-119-improper-restriction-of-ope-65d3a8ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33847%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33849-cwe-119-improper-restriction-of-ope-4e22bddd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33849%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33848-cwe-119-improper-restriction-of-ope-37a09f65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33848%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33851-cwe-119-improper-restriction-of-ope-a4819350</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33851%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20joncampbell123%20doslib&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33850-cwe-787-out-of-bounds-write-in-wuje-e46fe604</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33850%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WujekFoliarz%20DualSenseY-v2&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4753-cwe-125-out-of-bounds-read-in-slajer-90f09ae8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4753%3A%20CWE-125%20Out-of-bounds%20Read%20in%20slajerek%20RetroDebugger&amp;severity=critical&amp;id=69c2a3a7f4197a8e3b3eda43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4752-cwe-416-use-after-free-in-no-chicken-d883c0b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4752%3A%20CWE-416%20Use%20After%20Free%20in%20No-Chicken%20Echo-Mate&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4751-cwe-476-null-pointer-dereference-in--212babee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4751%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20tmate-io%20tmate&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4750-cwe-125-out-of-bounds-read-in-fabian-95af46f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4750%3A%20CWE-125%20Out-of-bounds%20Read%20in%20fabiangreffrath%20woof&amp;severity=critical&amp;id=69c2a3a5f4197a8e3b3eda1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4749-nvd-cwe-noinfo-nvd-cwe-noinfo-in-alb-4161dd2e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4749%3A%20NVD-CWE-noinfo%20NVD-CWE-noinfo%20in%20albfan%20miraclecast&amp;severity=medium&amp;id=69c2250ef4197a8e3bf52229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4662-cwe-89-improper-neutralization-of-sp-f493c1eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4662%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69c29cc3f4197a8e3b3c19ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4283-cwe-862-missing-authorization-in-leg-b0b3a8d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4283%3A%20CWE-862%20Missing%20Authorization%20in%20legalweb%20WP%20DSGVO%20Tools%20(GDPR)&amp;severity=critical&amp;id=69c32654f4197a8e3b9def78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3138-cwe-862-missing-authorization-in-woo-b7898757</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3138%3A%20CWE-862%20Missing%20Authorization%20in%20woobewoo%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=medium&amp;id=69c2b1b4f4197a8e3b48d1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4640-cwe-306-missing-authentication-for-c-99bcad95</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4640%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4639-cwe-863-incorrect-authorization-in-g-0d3ccdb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4639%3A%20CWE-863%20Incorrect%20Authorization%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3260-allocation-of-resources-without-limi-9c8abed1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3260%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=medium&amp;id=69c2137bf4197a8e3be1035e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4632-sql-injection-in-itsourcecode-online-6fae771c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4632%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69c2137bf4197a8e3be10369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4627-os-command-injection-in-d-link-dir-8-f88408e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4627%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=69c2137bf4197a8e3be10362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4746-cwe-787-out-of-bounds-write-in-timep-fbe0e14b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4746%3A%20CWE-787%20Out-of-bounds%20Write%20in%20timeplus-io%20proton&amp;severity=critical&amp;id=69c2137bf4197a8e3be10373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4745-cwe-94-improper-control-of-generatio-1708b5aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4745%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dendibakh%20perf-ninja&amp;severity=critical&amp;id=69c2137bf4197a8e3be10370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4744-cwe-125-out-of-bounds-read-in-rizone-16fef5f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4744%3A%20CWE-125%20Out-of-bounds%20Read%20in%20rizonesoft%20Notepad3&amp;severity=critical&amp;id=69c2056ef4197a8e3bc8620e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4743-cwe-476-null-pointer-dereference-in--e4f3d4f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4743%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20taurusxin%20ncmdump&amp;severity=medium&amp;id=69c2056ef4197a8e3bc8620b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4742-cwe-444-inconsistent-interpretation--085908b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4742%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20visualfc%20liteide&amp;severity=low&amp;id=69c2056ef4197a8e3bc86208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4741-cwe-22-improper-limitation-of-a-path-4f50da47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4741%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TeamJCD%20JoyConDroid&amp;severity=high&amp;id=69c2056ef4197a8e3bc86205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4739-cwe-190-integer-overflow-or-wraparou-4dc9a6b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4739%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20InsightSoftwareConsortium%20ITK&amp;severity=critical&amp;id=69c2056ef4197a8e3bc86201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4738-cwe-119-improper-restriction-of-oper-a4946c18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4738%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20OSGeo%20gdal&amp;severity=critical&amp;id=69c2056cf4197a8e3bc861d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4737-cwe-416-use-after-free-in-no-chicken-d056668f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4737%3A%20CWE-416%20Use%20After%20Free%20in%20No-Chicken%20Echo-Mate&amp;severity=high&amp;id=69c2056cf4197a8e3bc861cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4736-cwe-229-improper-handling-of-values--bea050a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4736%3A%20CWE-229%20Improper%20Handling%20of%20Values%20in%20No-Chicken%20Echo-Mate&amp;severity=high&amp;id=69c2056cf4197a8e3bc861ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4735-cwe-502-deserialization-of-untrusted-f029cb07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4735%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20DTStack%20chunjun&amp;severity=high&amp;id=69c2056cf4197a8e3bc861c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4734-cwe-119-improper-restriction-of-oper-382b79d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4734%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20yoyofr%20modizer&amp;severity=critical&amp;id=69c2056cf4197a8e3bc861c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4733-cwe-200-exposure-of-sensitive-inform-1fe2438a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4733%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4732-cwe-125-out-of-bounds-read-in-tildea-3c7e0e4a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4732%3A%20CWE-125%20Out-of-bounds%20Read%20in%20tildearrow%20furnace&amp;severity=high&amp;id=69c2056cf4197a8e3bc861be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4626-cross-site-scripting-in-projectworld-7ed09412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4626%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Lawyer%20Management%20System&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4625-sql-injection-in-sourcecodester-onli-4ad2c890</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4625%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Admission%20System&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4731-cwe-190-integer-overflow-or-wraparou-38be7792</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4731%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20artraweditor%20ART&amp;severity=high&amp;id=69c2056cf4197a8e3bc861bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4624-sql-injection-in-sourcecodester-onli-ea1a8c4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4624%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=69c2d885f4197a8e3b5f9743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4623-server-side-request-forgery-in-defau-82e4f91b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4623%3A%20Server-Side%20Request%20Forgery%20in%20DefaultFuction%20Jeson-Customer-Relationship-Management-System&amp;severity=medium&amp;id=69c2b1b4f4197a8e3b48d1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33308-cwe-295-improper-certificate-valida-88c7e708</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33308%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20airtower-luna%20mod_gnutls&amp;severity=medium&amp;id=69c29cc3f4197a8e3b3c19e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33307-cwe-121-stack-based-buffer-overflow-3ecaed11</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33307%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20airtower-luna%20mod_gnutls&amp;severity=high&amp;id=69c1ecd0f4197a8e3bb7abb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3079-cwe-89-improper-neutralization-of-sp-7040e58f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3079%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20StellarWP%20LearnDash%20LMS&amp;severity=medium&amp;id=69c1ecd0f4197a8e3bb7abb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4617-improper-authorization-in-sourcecode-a241b185</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4617%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69c1e243f4197a8e3baf9862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4680-use-after-free-in-google-chrome-7b4e006d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4680%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1dec2f4197a8e3babfa4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4679-integer-overflow-in-google-chrome-d856ab98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4679%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1dec2f4197a8e3babfa48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4678-use-after-free-in-google-chrome-a69cdcbc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4678%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4677-out-of-bounds-read-in-google-chrome-6eb5e212</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4677%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4676-use-after-free-in-google-chrome-4a02e249</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4676%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4675-heap-buffer-overflow-in-google-chrom-92539054</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4675%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4674-out-of-bounds-read-in-google-chrome-ba772d3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4674%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4673-heap-buffer-overflow-in-google-chrom-5351942f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4673%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22739-vulnerability-in-spring-spring-clou-8aa646e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22739%3A%20Vulnerability%20in%20Spring%20Spring%20Cloud&amp;severity=high&amp;id=69c1debff4197a8e3babf86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4616-cross-site-scripting-in-bolo-blog-12348d86</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4616%3A%20Cross%20Site%20Scripting%20in%20bolo-blog&amp;severity=medium&amp;id=69c1debff4197a8e3babf875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33320-cwe-674-uncontrolled-recursion-in-t-76bc80ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33320%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20TomWright%20dasel&amp;severity=medium&amp;id=69c1debff4197a8e3babf872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33298-cwe-122-heap-based-buffer-overflow--058a7b47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33298%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=69c1debff4197a8e3babf86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30655-na-d0820e15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30655%3A%20n%2Fa&amp;severity=medium&amp;id=69c2e66df4197a8e3b68b9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30653-na-24c18f7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30653%3A%20n%2Fa&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29840-na-be31308d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29840%3A%20n%2Fa&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29839-na-b148bc9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29839%3A%20n%2Fa&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33554-na-db22b7fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33554%3A%20n%2Fa&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30662-na-02471498</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30662%3A%20n%2Fa&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30661-na-8fea80e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30661%3A%20n%2Fa&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-24-23e60c42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-24&amp;severity=medium&amp;id=69c2482ff4197a8e3b034543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-24-d05ef2d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-24&amp;severity=low&amp;id=69c2482ff4197a8e3b03453a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33211-cwe-22-improper-limitation-of-a-pat-2bb49643</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33211%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tektoncd%20pipeline&amp;severity=critical&amp;id=69c1e5e3f4197a8e3bb3f17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33286-cwe-913-improper-control-of-dynamic-fd76d864</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33286%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20graphiti-api%20graphiti&amp;severity=critical&amp;id=69c1e5e3f4197a8e3bb3f18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33283-cwe-476-null-pointer-dereference-in-5c3025db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33283%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c1e5e3f4197a8e3bb3f188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33282-cwe-476-null-pointer-dereference-in-f5a6c99c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33282%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=high&amp;id=69c1e5e3f4197a8e3bb3f185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33281-cwe-129-improper-validation-of-arra-f6f420a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33281%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33252-cwe-352-cross-site-request-forgery--1c298ddb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33252%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=69c1d434f4197a8e3ba042af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33241-cwe-770-allocation-of-resources-wit-6c94bc33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33241%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33242-cwe-22-improper-limitation-of-a-pat-bedfd725</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33242%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4615-sql-injection-in-sourcecodester-onli-a3a45347</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4615%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Catering%20Reservation&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4614-sql-injection-in-itsourcecode-saniti-769926fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4614%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33250-cwe-20-improper-input-validation-in-82eeaf69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33250%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20longturn%20freeciv21&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33202-cwe-74-improper-neutralization-of-s-ce0b2cbe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33202%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d434f4197a8e3ba04297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33195-cwe-22-improper-limitation-of-a-pat-44000d41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33195%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rails%20activestorage&amp;severity=high&amp;id=69c1d434f4197a8e3ba0428e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33176-cwe-400-uncontrolled-resource-consu-8c24e02c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33176%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4021-cwe-287-improper-authentication-in-c-9308bb23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4021%3A%20CWE-287%20Improper%20Authentication%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=high&amp;id=69c1d4a7f4197a8e3ba0b3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4056-cwe-862-missing-authorization-in-wpe-75122f33</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4056%3A%20CWE-862%20Missing%20Authorization%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3533-cwe-434-unrestricted-upload-of-file--68a0c277</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3533%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20artbees%20Jupiter%20X%20Core&amp;severity=high&amp;id=69c1d4a7f4197a8e3ba0b3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4001-cwe-95-improper-neutralization-of-di-ac901da0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4001%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20acowebs%20Woocommerce%20Custom%20Product%20Addons%20Pro&amp;severity=critical&amp;id=69c1d4a7f4197a8e3ba0b3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33174-cwe-789-memory-allocation-with-exce-2062726e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33174%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33173-cwe-925-improper-verification-of-in-43111a4f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33173%3A%20CWE-925%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33170-cwe-79-improper-neutralization-of-i-711e8380</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33170%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33169-cwe-400-uncontrolled-resource-consu-0628f812</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33169%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4613-sql-injection-in-sourcecodester-e-co-ecbd9642</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4613%3A%20SQL%20Injection%20in%20SourceCodester%20E-Commerce%20Site&amp;severity=medium&amp;id=69c1cd2bf4197a8e3b9b9472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33168-cwe-79-improper-neutralization-of-i-bc39b860</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33168%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20actionview&amp;severity=low&amp;id=69c1d4a7f4197a8e3ba0b408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33167-cwe-79-improper-neutralization-of-i-c52f453b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33167%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20actionpack&amp;severity=low&amp;id=69c1d4a7f4197a8e3ba0b403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3225-cwe-862-missing-authorization-in-thi-90e5b57c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3225%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4306-cwe-89-improper-neutralization-of-sp-8504a3a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4306%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=high&amp;id=69c1d4a9f4197a8e3ba0b48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2412-cwe-89-improper-neutralization-of-sp-8fc37751</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2412%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4066-cwe-862-missing-authorization-in-inc-871b678f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4066%3A%20CWE-862%20Missing%20Authorization%20in%20inc2734%20Smart%20Custom%20Fields&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4612-sql-injection-in-itsourcecode-free-h-7cf79c04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4612%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c1d4adf4197a8e3ba0b53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4681-cwe-94-improper-control-of-generatio-dce2340b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4681%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PTC%20Windchill%20PDMLink&amp;severity=critical&amp;id=69c1d4adf4197a8e3ba0b545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33634-cwe-506-embedded-malicious-code-in--163a34d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33634%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20aquasecurity%20setup-trivy&amp;severity=critical&amp;id=69c1b815f4197a8e3b932274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32300-cwe-285-improper-authorization-in-o-34aa4212</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32300%3A%20CWE-285%3A%20Improper%20Authorization%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1b815f4197a8e3b93226e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32299-cwe-284-improper-access-control-in--8058e34f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32299%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1b815f4197a8e3b932269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32279-cwe-918-server-side-request-forgery-d5a848f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32279%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opensource-workshop%20connect-cms&amp;severity=medium&amp;id=69c1b815f4197a8e3b932262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32912-6010818f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32912&amp;severity=null&amp;id=69c1d4adf4197a8e3ba0b53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32911-8533cf6f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32911&amp;severity=null&amp;id=69c1d4adf4197a8e3ba0b53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32910-685ea9ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32910&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32909-70fb35ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32909&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32908-d294f3c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32908&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32907-d72860c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32907&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32904-a79971b2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32904&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32903-16e6c7e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32903&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32902-5d202bfe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32902&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32901-ed154d9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32901&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32900-a199f6df</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32900&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32066-f88860ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32066&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32047-ddf09970</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32047&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32012-74b36520</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32012&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28483-12f1f14c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28483&amp;severity=null&amp;id=69c32654f4197a8e3b9def81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28455-d8f9feaf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28455&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22173-9c19c107</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22173&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32278-cwe-434-unrestricted-upload-of-file-f13f731d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32278%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1940-vulnerability-in-red-hat-red-hat-ent-05376571</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1940%3A%20Vulnerability%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c1d4adf4197a8e3ba0b548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32277-cwe-79-improper-neutralization-of-i-86b1f15c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32277%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4611-os-command-injection-in-totolink-x60-3ae7b1a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4611%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20X6000R&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32276-cwe-94-improper-control-of-generati-a03d82ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32276%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60949-cwe-200-exposure-of-sensitive-infor-63fae85a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60949%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Census%20CSWeb&amp;severity=critical&amp;id=69c1d4aef4197a8e3ba0b57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60948-cwe-79-improper-neutralization-of-i-341329c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60948%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Census%20CSWeb&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60947-cwe-434-unrestricted-upload-of-file-12a4f8c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60947%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Census%20CSWeb&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60946-cwe-22-improper-limitation-of-a-pat-1902b4db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60946%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Census%20CSWeb&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23882-cwe-78-improper-neutralization-of-s-d5b9e9d8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23882%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20blinkospace%20blinko&amp;severity=high&amp;id=69c1aa03f4197a8e3b8c35ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23485-cwe-22-improper-limitation-of-a-pat-f4e3f9d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23488-cwe-639-authorization-bypass-throug-9ede2719</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23488%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23487-cwe-639-authorization-bypass-throug-99878f35</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23487%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23486-cwe-200-exposure-of-sensitive-infor-22b9b024</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23486%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23480-cwe-288-authentication-bypass-using-857ce055</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23480%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tool-updates-lots-of-security-and-logic-fixes-mon--38257034</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tool%20updates%3A%20lots%20of%20security%20and%20logic%20fixes%2C%20(Mon%2C%20Mar%2023rd)&amp;severity=low&amp;id=69c1a67ff4197a8e3b8b7498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23481-cwe-22-improper-limitation-of-a-pat-6ab7581d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23481%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23484-cwe-22-improper-limitation-of-a-pat-c0f6a5a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23484%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23483-cwe-22-improper-limitation-of-a-pat-f1003822</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23483%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23482-cwe-22-improper-limitation-of-a-pat-7f430ae3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23482%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=high&amp;id=69c1a68ff4197a8e3b8b7ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3055-cwe-125-out-of-bounds-read-in-netsca-4eb4a414</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3055%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NetScaler%20ADC&amp;severity=critical&amp;id=69c1a302f4197a8e3b8aa1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4597-sql-injection-in-648540858-wvp-gb281-46ef2a06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4597%3A%20SQL%20Injection%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69c1a302f4197a8e3b8aa1e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4368-vulnerability-in-netscaler-adc-9513ba21</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4368%3A%20Vulnerability%20in%20NetScaler%20ADC&amp;severity=high&amp;id=69c1a302f4197a8e3b8aa1e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2298-cwe-88-improper-neutralization-of-ar-dcfd6ea3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2298%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=69c19bf3f4197a8e3b887547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32879-cwe-287-improper-authentication-in--ddbd79c1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32879%3A%20CWE-287%3A%20Improper%20Authentication%20in%20QuantumNous%20new-api&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4596-cross-site-scripting-in-projectworld-56938e19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4596%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Lawyer%20Management%20System&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30886-cwe-639-authorization-bypass-throug-27f24178</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30886%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20QuantumNous%20new-api&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27131-cwe-200-exposure-of-sensitive-infor-620cdf71</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27131%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20putyourlightson%20craft-sprig&amp;severity=medium&amp;id=69c194ecf4197a8e3b85fa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26209-cwe-674-uncontrolled-recursion-in-a-d5213351</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26209%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20agronholm%20cbor2&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33723-cwe-89-improper-neutralization-of-s-64220460</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33723%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33719-cwe-306-missing-authentication-for--f550060a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33719%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33717-cwe-434-unrestricted-upload-of-file-69bcb40c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33717%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33716-cwe-287-improper-authentication-in--a45ab5c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33716%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c18de6f4197a8e3b82dd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33690-cwe-348-use-of-less-trusted-source--d465d980</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33690%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33688-cwe-204-observable-response-discrep-2ae31524</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33688%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33685-cwe-862-missing-authorization-in-ww-72c96804</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33685%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0898-cwe-284-improper-access-control-in-p-030c9101</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0898%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Pegasystems%20Pega%20Robot%20Studio&amp;severity=critical&amp;id=69c18de6f4197a8e3b82dd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33683-cwe-79-improper-neutralization-of-i-42f6a9a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33681-cwe-22-improper-limitation-of-a-pat-f4244785</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33681%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33651-cwe-89-improper-neutralization-of-s-783a9dad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33651%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4595-cross-site-scripting-in-code-project-11b45a6f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4595%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c18de8f4197a8e3b82ea8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-iranian-nasir-security-is-targeting-the-energy-3994b510</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Iranian%20Nasir%20Security%20is%20Targeting%20The%20Energy%20Sector%20in%20the%20Middle%20East&amp;severity=medium&amp;id=69c1ad86f4197a8e3b8da034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15606-cwe-20-improper-input-validation-in-ebf95e38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15606%3A%20CWE-20%20Improper%20input%20validation%20in%20TP-Link%20Systems%20Inc.%20TD-W8961N%20v4.0&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33650-cwe-863-incorrect-authorization-in--5fb7dae5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33650%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33649-cwe-352-cross-site-request-forgery--1be8ecb0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33649%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33648-cwe-78-improper-neutralization-of-s-83c7ae01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33648%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33647-cwe-434-unrestricted-upload-of-file-b82e976f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33647%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33513-cwe-22-improper-limitation-of-a-pat-063f790f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33513%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33512-cwe-287-improper-authentication-in--09a67f4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33512%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15605-cwe-321-use-of-hard-coded-cryptogra-411a871b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15605%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15519-cwe-78-improper-neutralization-of-s-1eec4ee0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15519%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15518-cwe-78-improper-neutralization-of-s-c83afbf0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15518%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15517-cwe-306-missing-authentication-for--d24caf26</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15517%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4594-sql-injection-hibernate-in-erupts-er-82ccc1b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4594%3A%20SQL%20Injection%20Hibernate%20in%20erupts%20erupt&amp;severity=medium&amp;id=69c17fd9f4197a8e3b7d5de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4593-sql-injection-hibernate-in-erupts-er-2d6076e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4593%3A%20SQL%20Injection%20Hibernate%20in%20erupts%20erupt&amp;severity=medium&amp;id=69c1754df4197a8e3b789141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33507-cwe-352-cross-site-request-forgery--676b8efb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33507%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c171cff4197a8e3b777515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33502-cwe-918-server-side-request-forgery-8b7e8739</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33502%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c171cff4197a8e3b777511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33501-cwe-862-missing-authorization-in-ww-15f1a843</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33501%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33500-cwe-79-improper-neutralization-of-i-9b7b8f21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33500%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33499-cwe-79-improper-neutralization-of-i-04b61f15</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4592-improper-authentication-in-kalcaddle-0e340947</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4592%3A%20Improper%20Authentication%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c17fd9f4197a8e3b7d5dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33493-cwe-22-improper-limitation-of-a-pat-e1c4f89a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33493%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c171cff4197a8e3b777519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32845-cwe-190-integer-overflow-or-wraparo-0511ec41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32845%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20jkuhlmann%20cgltf&amp;severity=medium&amp;id=69c17c7cf4197a8e3b7b5a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33492-cwe-384-session-fixation-in-wwbn-av-973399eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33492%3A%20CWE-384%3A%20Session%20Fixation%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c16032f4197a8e3b6f2c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33488-cwe-326-inadequate-encryption-stren-6b555353</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33488%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c16032f4197a8e3b6f2c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4591-os-command-injection-in-kalcaddle-ko-e34b5b79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4591%3A%20OS%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m-trends-2026-initial-access-handoff-shrinks-from--7bb1d2f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M-Trends%202026%3A%20Initial%20Access%20Handoff%20Shrinks%20From%20Hours%20to%2022%20Seconds&amp;severity=medium&amp;id=69c155a4f4197a8e3b687c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chip-services-firm-trio-tech-says-subsidiary-hit-b-aa4297ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chip%20Services%20Firm%20Trio-Tech%20Says%20Subsidiary%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69c15220f4197a8e3b66a1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4590-cross-site-request-forgery-in-kalcad-72a943be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4590%3A%20Cross-Site%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=low&amp;id=69c1522ef4197a8e3b66a562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33485-cwe-89-improper-neutralization-of-s-c274543e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33485%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33483-cwe-770-allocation-of-resources-wit-75dd964b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33483%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33482-cwe-78-improper-neutralization-of-s-3886e14c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33482%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33480-cwe-918-server-side-request-forgery-e7b70dcf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33480%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33479-cwe-94-improper-control-of-generati-39924b37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33479%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33478-cwe-78-improper-neutralization-of-s-b6c81f37</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33478%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14e9ef4197a8e3b641c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33354-cwe-73-external-control-of-file-nam-49e4b6db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33354%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33352-cwe-89-improper-neutralization-of-s-bb241f0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33352%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14797f4197a8e3b602ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33351-cwe-918-server-side-request-forgery-ae5efa9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33351%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14797f4197a8e3b602aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33297-cwe-639-authorization-bypass-throug-8f970b76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33297%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c14797f4197a8e3b602aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aquas-trivy-vulnerability-scanner-hit-by-supply-ch-7c6dcbc1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aqua%E2%80%99s%20Trivy%20Vulnerability%20Scanner%20Hit%20by%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69c14410f4197a8e3b5e2f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/23rd-march-threat-intelligence-report-ceabc982</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=23rd%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69c14441f4197a8e3b5e3e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4647-out-of-bounds-read-in-red-hat-red-ha-36231e4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4647%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c14797f4197a8e3b602ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4645-loop-with-unreachable-exit-condition-6cd7e4c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4645&amp;severity=null&amp;id=69c14797f4197a8e3b602abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4589-server-side-request-forgery-in-kalca-2067b409</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4589%3A%20Server-Side%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c14797f4197a8e3b602ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4588-use-of-hard-coded-cryptographic-key--6d0f896a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4588%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c1398bf4197a8e3b580fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4587-improper-certificate-validation-in-h-097d952b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4587%3A%20Improper%20Certificate%20Validation%20in%20HybridAuth&amp;severity=medium&amp;id=69c1398bf4197a8e3b580fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1958-cwe-798-use-of-hard-coded-credential-fc23d20f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1958%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20BRI%20KlinikaXP%20Insertino&amp;severity=high&amp;id=69c1398bf4197a8e3b580fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31851-cwe-307-improper-restriction-of-exc-a96497fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31851%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31850-cwe-256-plaintext-storage-of-a-pass-36d1e4ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31850%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31849-cwe-352-cross-site-request-forgery--9fe3828a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31849%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31848-cwe-312-cleartext-storage-of-sensit-384352d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31848%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4586-unrestricted-upload-in-codephiliax-c-82ce6b58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4586%3A%20Unrestricted%20Upload%20in%20CodePhiliaX%20Chat2DB&amp;severity=medium&amp;id=69c16abef4197a8e3b7505be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31847-cwe-912-hidden-functionality-in-nex-b07dd3af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31847%3A%20CWE-912%20Hidden%20Functionality%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31846-cwe-306-missing-authentication-for--a9c2d2c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31846%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Nexxt%20Solutions%20Nebula%20300%2B%20%2F%20Tenda%20F3%20V2.0%20Firmware&amp;severity=high&amp;id=69c12ef9f4197a8e3b4f4049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32969-cwe-89-improper-neutralization-of-s-9351491e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69c127f2f4197a8e3b4567ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32968-cwe-78-improper-neutralization-of-s-6f1949ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32968%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20MB%20connect%20line%20mbCONNECT24&amp;severity=critical&amp;id=69c127f2f4197a8e3b4567e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4585-os-command-injection-in-tiandy-easy7-54d78cb3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4585%3A%20OS%20Command%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=critical&amp;id=69c127f2f4197a8e3b4567f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4584-cleartext-transmission-of-sensitive--afe1d79d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4584%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c127f2f4197a8e3b4567f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-patches-four-vulnerabilities-exploited-at-pwn-c42a1500</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20Patches%20Four%20Vulnerabilities%20Exploited%20at%20Pwn2Own&amp;severity=low&amp;id=69c120e8f4197a8e3b40ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4633-generation-of-error-message-containi-d7a7c0fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4633%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69c11d65f4197a8e3b3f53d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4583-authentication-bypass-by-capture-rep-6441f94b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4583%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c119e0f4197a8e3b3cb44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-fully-operational-despite-law-enforceme-6358f581</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Fully%20Operational%20Despite%20Law%20Enforcement%20Takedown&amp;severity=medium&amp;id=69c1165cf4197a8e3b3b0692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28809-cwe-611-improper-restriction-of-xml-6e572eae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28809%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20dropbox%20esaml&amp;severity=medium&amp;id=69c119e0f4197a8e3b3cb44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4582-missing-authentication-in-shenzhen-h-bdf6f3ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4582%3A%20Missing%20Authentication%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c10bd0f4197a8e3b33b915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4581-sql-injection-in-code-projects-simpl-f864cf7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4581%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c10bd0f4197a8e3b33b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostclaw-expands-beyond-npm-github-repositories-a-368823f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostClaw%20expands%20beyond%20npm%3A%20GitHub%20repositories%20and%20AI%20workflows%20deliver%20macOS%20infostealer&amp;severity=medium&amp;id=69c10bcff4197a8e3b33b87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4580-sql-injection-in-code-projects-simpl-e7825aa4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4580%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c10142f4197a8e3b28a6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4628-improper-access-control-in-red-hat-r-36ac1ffc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4628%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69c0fdbff4197a8e3b25d07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3587-cwe-912-hidden-functionality-in-wago-a4c55a72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3587%3A%20CWE-912%20Hidden%20Functionality%20in%20WAGO%20Lean%20Managed%20Switch%20852-1812&amp;severity=critical&amp;id=69c0f6b6f4197a8e3b21d85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4579-sql-injection-in-code-projects-simpl-5f3bc715</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4579%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c0efaff4197a8e3b1e6aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4578-cross-site-scripting-in-code-project-c0d98763</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4578%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0efaff4197a8e3b1e6aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13997-cwe-200-exposure-of-sensitive-infor-d51b2161</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13997%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%2080%2B%20Elementor%20Widgets%2C%204%20000%2B%20Elementor%20Templates%2C%20WooCommerce%2C%20Mega%20Menu%2C%20Popup%20Builder&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6229-cwe-79-improper-neutralization-of-in-231a13b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6229%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4577-cross-site-scripting-in-code-project-23780ee9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4577%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1969-cwe-434-unrestricted-upload-of-file--c0354933</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1969%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20trx_addons&amp;severity=medium&amp;id=69c0daaaf4197a8e3b15ada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4576-cross-site-scripting-in-code-project-134b1b69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4576%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4575-cross-site-scripting-in-code-project-40472f6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4575%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-releases-emergency-patch-for-critical-ident-3d33a815</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Releases%20Emergency%20Patch%20for%20Critical%20Identity%20Manager%20Vulnerability&amp;severity=critical&amp;id=69c0d38ff4197a8e3b12d6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10734-cwe-922-insecure-storage-of-sensiti-bad439f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10734%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10679-cwe-94-improper-control-of-generati-1b2de9ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10679%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=high&amp;id=69c0d39df4197a8e3b12da10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10731-cwe-285-improper-authorization-in-r-54a86519</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10731%3A%20CWE-285%20Improper%20Authorization%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4574-sql-injection-in-sourcecodester-simp-590bdc3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4574%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-learning%20System&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4573-sql-injection-in-sourcecodester-simp-6f478352</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4573%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-learning%20System&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4603-division-by-zero-in-jsrsasign-d0b63e96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4603%3A%20Division%20by%20zero%20in%20jsrsasign&amp;severity=medium&amp;id=69c0d39ff4197a8e3b12db18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4601-missing-cryptographic-step-in-jsrsas-1b19c447</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4601%3A%20Missing%20Cryptographic%20Step%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39ff4197a8e3b12db0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4599-incomplete-comparison-with-missing-f-9aee8aa7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4599%3A%20Incomplete%20Comparison%20with%20Missing%20Factors%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39df4197a8e3b12da43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4598-infinite-loop-in-jsrsasign-37374acf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4598%3A%20Infinite%20loop%20in%20jsrsasign&amp;severity=high&amp;id=69c0d39df4197a8e3b12da3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4602-incorrect-conversion-between-numeric-8eab0826</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4602%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20jsrsasign&amp;severity=high&amp;id=69c0d39ff4197a8e3b12db12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4600-improper-verification-of-cryptograph-546ca5ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4600%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39df4197a8e3b12da49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10736-cwe-285-improper-authorization-in-r-8dcd9600</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10736%3A%20CWE-285%20Improper%20Authorization%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4572-sql-injection-in-sourcecodester-sale-bb457c93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4572%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c12b75f4197a8e3b4d2fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4571-sql-injection-in-sourcecodester-sale-b8e8c39e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4571%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c16abef4197a8e3b7505b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4570-sql-injection-in-sourcecodester-sale-4006fb57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4570%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c171cff4197a8e3b77751d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4569-sql-injection-in-sourcecodester-sale-ef4f7718</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4569%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c0b3fdf4197a8e3be64bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4568-sql-injection-in-sourcecodester-sale-d163008f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4568%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c0a5dbf4197a8e3bdb4a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4567-stack-based-buffer-overflow-in-tenda-27ff1845</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4567%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=critical&amp;id=69c0a5dbf4197a8e3bdb4a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4566-stack-based-buffer-overflow-in-belki-8cb934b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4566%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c0a5dbf4197a8e3bdb4a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4606-cwe-250-execution-with-unnecessary-p-39d565c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4606%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20GeoVision%20GV-Edge%20Recording%20Manager&amp;severity=critical&amp;id=69c097cbf4197a8e3bd66623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4565-buffer-overflow-in-tenda-ac21-5d23ce15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4565%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=69c090cbf4197a8e3bd36054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52204-na-030c791a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52204%3A%20n%2Fa&amp;severity=medium&amp;id=69c19bf3f4197a8e3b887542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46879-na-e2beb03b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46879%3A%20n%2Fa&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46878-na-66a3746b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46878%3A%20n%2Fa&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30007-na-1658d953</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30007%3A%20n%2Fa&amp;severity=medium&amp;id=69c171cff4197a8e3b77750d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30006-na-b7b35e80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30006%3A%20n%2Fa&amp;severity=medium&amp;id=69c171cff4197a8e3b777509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26829-na-1d4912f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26829%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b7505a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26828-na-a163fedf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26828%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b7505a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24516-na-ecd959ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24516%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b75059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51226-na-d76be320</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51226%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51225-na-6216ff27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51225%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51224-na-96495e20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51224%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51223-na-3bf6f4be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51223%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51222-na-79d2d66d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51222%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-23-fcf08916</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-23&amp;severity=medium&amp;id=69c127e7f4197a8e3b450253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-23-8c3342de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-23&amp;severity=low&amp;id=69c097c3f4197a8e3bd6641a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4564-code-injection-in-yangzongzhuan-ruoy-64a205a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4564%3A%20Code%20Injection%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4563-authorization-bypass-in-maccms-eaf25abd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4563%3A%20Authorization%20Bypass%20in%20MacCMS&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2580-cwe-89-improper-neutralization-of-sp-b93f1b1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2580%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=69c07babf4197a8e3bc82349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4562-missing-authentication-in-maccms-3327321e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4562%3A%20Missing%20Authentication%20in%20MacCMS&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4558-os-command-injection-in-linksys-mr96-e5c4353d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4558%3A%20OS%20Command%20Injection%20in%20Linksys%20MR9600&amp;severity=high&amp;id=69c02acff4197a8e3ba6a972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4557-cross-site-scripting-in-code-project-2053ca14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4557%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c02acff4197a8e3ba6a96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33296-cwe-601-url-redirection-to-untruste-785f37e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33296%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WWBN%20AVideo&amp;severity=low&amp;id=69c023c9f4197a8e3ba36535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33295-cwe-79-improper-neutralization-of-i-4fafbbb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33295%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c023c9f4197a8e3ba36531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33294-cwe-918-server-side-request-forgery-a13589f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33294%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c02043f4197a8e3ba1f6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4555-stack-based-buffer-overflow-in-d-lin-d3320ca7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4555%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69c02043f4197a8e3ba1f6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4554-command-injection-in-tenda-f453-fa4e7404</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4554%3A%20Command%20Injection%20in%20Tenda%20F453&amp;severity=medium&amp;id=69c02043f4197a8e3ba1f6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33293-cwe-22-improper-limitation-of-a-pat-ff5dbc0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33293%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c02043f4197a8e3ba1f6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33319-cwe-78-improper-neutralization-of-s-96a640bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33319%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33292-cwe-22-improper-limitation-of-a-pat-24031473</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33292%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c0833cf4197a8e3bcdaa55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4553-stack-based-buffer-overflow-in-tenda-df9d32ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4553%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c00eaff4197a8e3b87db39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4552-stack-based-buffer-overflow-in-tenda-2d4d3dfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4552%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c0009ff4197a8e3b7d8e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4551-stack-based-buffer-overflow-in-tenda-a56904d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4551%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c0009ff4197a8e3b7d8e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4550-sql-injection-in-code-projects-simpl-5472b525</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4550%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Gym%20Management%20System&amp;severity=medium&amp;id=69bff615f4197a8e3b77b0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4549-authorization-bypass-in-mickasmt-nex-2c60ce48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4549%3A%20Authorization%20Bypass%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=low&amp;id=69bff615f4197a8e3b77b0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4548-improper-authorization-in-mickasmt-n-c85f7652</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4548%3A%20Improper%20Authorization%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=medium&amp;id=69bfef0bf4197a8e3b75ae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4547-business-logic-errors-in-mickasmt-ne-eba15f55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4547%3A%20Business%20Logic%20Errors%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=medium&amp;id=69bfef0bf4197a8e3b75ae7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4546-uncontrolled-search-path-in-flos-fre-73cfae25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4546%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=69bfef0bf4197a8e3b75ae78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4115-improper-verification-of-cryptograph-b4a4f2b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4115%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20PuTTY&amp;severity=medium&amp;id=69bfe0fbf4197a8e3b712c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4545-uncontrolled-search-path-in-flos-fre-4b0b234b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4545%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=69bfd2ebf4197a8e3b6b775b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4544-cross-site-scripting-in-wavlink-wl-w-1122168c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4544%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4543-command-injection-in-wavlink-wl-wn57-50f96d33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4543%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=69bfba4ff4197a8e3b61fc7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4542-path-traversal-in-sscms-2ffdaf39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4542%3A%20Path%20Traversal%20in%20SSCMS&amp;severity=medium&amp;id=69bfafc3f4197a8e3b5ee767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4541-improper-verification-of-cryptograph-bb085ec7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4541%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20janmojzis%20tinyssh&amp;severity=low&amp;id=69bfafc3f4197a8e3b5ee75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4540-sql-injection-in-projectworlds-onlin-4351ab2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4540%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Notes%20Sharing%20System&amp;severity=medium&amp;id=69bfa1b3f4197a8e3b5a1521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4539-inefficient-regular-expression-compl-cb34245c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4539%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20pygments&amp;severity=medium&amp;id=69bf85b4f4197a8e3b50f1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4538-deserialization-in-pytorch-3d5ae3d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4538%3A%20Deserialization%20in%20PyTorch&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4537-command-injection-in-cudy-tr1200-eb876869</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4537%3A%20Command%20Injection%20in%20Cudy%20TR1200&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4536-unrestricted-upload-in-acrel-environ-2a8656cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4536%3A%20Unrestricted%20Upload%20in%20Acrel%20Environmental%20Monitoring%20Cloud%20Platform&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4535-stack-based-buffer-overflow-in-tenda-8f2fc263</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4535%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69bf707bf4197a8e3b474c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4534-stack-based-buffer-overflow-in-tenda-65a33e73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4534%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69bf707bf4197a8e3b474c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3427-cwe-79-improper-neutralization-of-in-f396b435</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoast%20Yoast%20SEO%20%E2%80%93%20Advanced%20SEO%20with%20real-time%20guidance%20and%20built-in%20AI&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4314-cwe-269-improper-privilege-managemen-df6f51b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4314%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=69c0833cf4197a8e3bcdaa8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33550-cwe-308-use-of-single-factor-authen-6be57b9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33550%3A%20CWE-308%20Use%20of%20Single-factor%20Authentication%20in%20Alinto%20SOGo&amp;severity=low&amp;id=69bf545af4197a8e3b1d674e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71276-cwe-79-improper-neutralization-of-i-4b87c96d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alinto%20SOGo&amp;severity=medium&amp;id=69bf545af4197a8e3b1d674b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4533-sql-injection-in-code-projects-simpl-c9dcca98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4533%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69bf545af4197a8e3b1d6752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4532-files-or-directories-accessible-in-c-73433b3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4532%3A%20Files%20or%20Directories%20Accessible%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69bf49cef4197a8e3b18ce5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4531-denial-of-service-in-free5gc-a793a8cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4531%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69bf49cef4197a8e3b18ce53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-22-08f7f078</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-22&amp;severity=medium&amp;id=69c00b23f4197a8e3b82758b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-22-2b31dbc7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-22&amp;severity=low&amp;id=69bf7afff4197a8e3b4d698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4530-sql-injection-in-apconw-aix-db-2ac345d4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4530%3A%20SQL%20Injection%20in%20apconw%20Aix-DB&amp;severity=medium&amp;id=69bf2daff4197a8e3b0c09df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4529-stack-based-buffer-overflow-in-d-lin-7f100378</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4529%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DHP-1320&amp;severity=high&amp;id=69bf26a7f4197a8e3b098306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3629-cwe-269-improper-privilege-managemen-61196a39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3629%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=high&amp;id=69bf1f9ff4197a8e3b06ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4528-server-side-request-forgery-in-truel-6267e37d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4528%3A%20Server-Side%20Request%20Forgery%20in%20trueleaf%20ApiFlow&amp;severity=medium&amp;id=69bf1898f4197a8e3b034520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2756-missing-authentication-in-omnipemf-n-3c473c97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2756%3A%20Missing%20Authentication%20in%20OmniPEMF%20NeoRhythm&amp;severity=low&amp;id=69bed94ff4197a8e3be73e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4516-injection-in-foundation-agents-metag-cb474584</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4516%3A%20Injection%20in%20Foundation%20Agents%20MetaGPT&amp;severity=medium&amp;id=69beb627f4197a8e3bd740a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4515-code-injection-in-foundation-agents--00ba46ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4515%3A%20Code%20Injection%20in%20Foundation%20Agents%20MetaGPT&amp;severity=medium&amp;id=69be84f0f4197a8e3bc20cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-quest-kace-vulnerability-potentially-expl-c5cd699f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Quest%20KACE%20Vulnerability%20Potentially%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=69be7a63f4197a8e3bbd68e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4514-improper-access-controls-in-pbootcms-bb082049</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4514%3A%20Improper%20Access%20Controls%20in%20PbootCMS&amp;severity=medium&amp;id=69be7a70f4197a8e3bbd6d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4513-sql-injection-in-vanna-ai-vanna-6c0caded</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4513%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69be6fd7f4197a8e3bb95f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4511-injection-in-vanna-ai-vanna-87d5cbfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4511%3A%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69be5ac1f4197a8e3bb09e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4510-cross-site-scripting-in-pbootcms-efcb0958</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4510%3A%20Cross%20Site%20Scripting%20in%20PbootCMS&amp;severity=medium&amp;id=69be45a8f4197a8e3ba73aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4373-cwe-36-absolute-path-traversal-in-je-12b1586f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4373%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20jetmonsters%20JetFormBuilder%20%E2%80%94%20Dynamic%20Blocks%20Form%20Builder&amp;severity=high&amp;id=69be45a8f4197a8e3ba73aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4509-incomplete-blacklist-in-pbootcms-c754c3d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4509%3A%20Incomplete%20Blacklist%20in%20PbootCMS&amp;severity=medium&amp;id=69be3796f4197a8e3ba0643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4022-cwe-79-improper-neutralization-of-in-7a0fd10b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4022%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativedev4%20Show%20Posts%20list%20%E2%80%93%20Easy%20designs%2C%20filters%20and%20more&amp;severity=medium&amp;id=69be1811f4197a8e3b784400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3478-cwe-918-server-side-request-forgery--aeeaf0a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3478%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20benmoody%20Content%20Syndication%20Toolkit&amp;severity=high&amp;id=69be180ef4197a8e3b78435f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1914-cwe-79-improper-neutralization-of-in-2b6d007f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremyshapiro%20FuseDesk&amp;severity=medium&amp;id=69be1809f4197a8e3b783d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2501-cwe-79-improper-neutralization-of-in-788a7318</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20waianaeboy702%20Ed&apos;s%20Social%20Share&amp;severity=medium&amp;id=69be180df4197a8e3b7842cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4004-cwe-94-improper-control-of-generatio-7256d48a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4004%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20eoxia%20Task%20Manager&amp;severity=medium&amp;id=69be1811f4197a8e3b7843f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1278-cwe-79-improper-neutralization-of-in-a7319460</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ketanmujumdar%20Mandatory%20Field&amp;severity=medium&amp;id=69be1806f4197a8e3b783bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2121-cwe-79-improper-neutralization-of-in-4523a2ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2121%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweaver%20Weaver%20Show%20Posts&amp;severity=medium&amp;id=69be180bf4197a8e3b784269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2837-cwe-79-improper-neutralization-of-in-aca66766</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20systemsrtk%20Ricerca%20%E2%80%93%20advanced%20search&amp;severity=medium&amp;id=69be180df4197a8e3b7842e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1397-cwe-79-improper-neutralization-of-in-fe7f07ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peacefulqode%20PQ%20Addons%20%E2%80%93%20Creative%20Elementor%20Widgets&amp;severity=medium&amp;id=69be1807f4197a8e3b783c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2723-cwe-352-cross-site-request-forgery-c-29fc5831</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2723%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20phy9pas%20Post%20Snippits&amp;severity=medium&amp;id=69be180df4197a8e3b7842e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3997-cwe-79-improper-neutralization-of-in-6af7d70c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hoosierdragon%20Text%20Toggle&amp;severity=medium&amp;id=69be1811f4197a8e3b7843ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3354-cwe-79-improper-neutralization-of-in-c48c2947</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3354%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mooeypoo%20Wikilookup&amp;severity=medium&amp;id=69be180ef4197a8e3b784351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4143-cwe-352-cross-site-request-forgery-c-a75b1d3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4143%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20neo2oo5%20Neos%20Connector%20for%20Fakturama&amp;severity=medium&amp;id=69be1813f4197a8e3b784eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4261-cwe-862-missing-authorization-in-hus-fa4ebb4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4261%3A%20CWE-862%20Missing%20Authorization%20in%20husobj%20Expire%20Users&amp;severity=high&amp;id=69be1813f4197a8e3b784ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4161-cwe-79-improper-neutralization-of-in-d6365643</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4161%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revukangaroo%20Review%20Map%20by%20RevuKangaroo&amp;severity=medium&amp;id=69be1813f4197a8e3b784eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2720-cwe-862-missing-authorization-in-cod-9f638a74</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2720%3A%20CWE-862%20Missing%20Authorization%20in%20codeclove%20Hr%20Press%20Lite&amp;severity=medium&amp;id=69be180df4197a8e3b7842d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3554-cwe-79-improper-neutralization-of-in-b5e9e6fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sherkspear%20Sherk%20Custom%20Post%20Type%20Displays&amp;severity=medium&amp;id=69be1810f4197a8e3b784383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2503-cwe-89-improper-neutralization-of-sp-845cf738</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2503%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdive%20ElementCamp&amp;severity=medium&amp;id=69be180df4197a8e3b7842d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3353-cwe-79-improper-neutralization-of-in-0976e5f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intermod%20Comment%20SPAM%20Wiper&amp;severity=medium&amp;id=69be180ef4197a8e3b78434c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2351-cwe-73-external-control-of-file-name-465411d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2351%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20eoxia%20Task%20Manager&amp;severity=medium&amp;id=69be180bf4197a8e3b784289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1911-cwe-79-improper-neutralization-of-in-cc3c042e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1911%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viaviwebtech%20Twitter%20Feeds&amp;severity=medium&amp;id=69be1809f4197a8e3b783d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1648-cwe-918-server-side-request-forgery--062101f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1648%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20qrolic%20Performance%20Monitor&amp;severity=high&amp;id=69be1807f4197a8e3b783c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0609-cwe-79-improper-neutralization-of-in-c969af4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20logichunt%20Logo%20Slider%20%E2%80%93%20Logo%20Carousel%2C%20Logo%20Showcase%20%26%20Client%20Logo%20Slider%20Plugin&amp;severity=medium&amp;id=69be1806f4197a8e3b783b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1575-cwe-79-improper-neutralization-of-in-408cd466</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeric_izon%20Schema%20Shortcode&amp;severity=medium&amp;id=69be1807f4197a8e3b783c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3645-cwe-862-missing-authorization-in-pun-2d45e1ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3645%3A%20CWE-862%20Missing%20Authorization%20in%20punnel%20Punnel%20%E2%80%93%20Landing%20Page%20Builder&amp;severity=medium&amp;id=69be1810f4197a8e3b7843aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1275-cwe-79-improper-neutralization-of-in-dba442e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gbsdeveloper%20Multi%20Post%20Carousel%20by%20Category&amp;severity=medium&amp;id=69be1806f4197a8e3b783bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1908-cwe-79-improper-neutralization-of-in-b506e305</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1908%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minnur%20Integration%20with%20Hubspot%20Forms&amp;severity=medium&amp;id=69be1809f4197a8e3b783d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3617-cwe-79-improper-neutralization-of-in-1a4b1961</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20swergroup%20Paypal%20Shortcodes&amp;severity=medium&amp;id=69be1810f4197a8e3b78438f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1647-cwe-79-improper-neutralization-of-in-c9b2ffb5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20basiliskan%20Comment%20Genius&amp;severity=medium&amp;id=69be1807f4197a8e3b783c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3347-cwe-79-improper-neutralization-of-in-b23caa6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arevico%20Multi%20Functional%20Flexi%20Lightbox&amp;severity=medium&amp;id=69be180ef4197a8e3b784345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2427-cwe-79-improper-neutralization-of-in-80f98a8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kazunii%20itsukaita&amp;severity=medium&amp;id=69be180bf4197a8e3b78429b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4072-cwe-79-improper-neutralization-of-in-f39edd0d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tstachl%20WordPress%20PayPal%20Donation&amp;severity=medium&amp;id=69be1811f4197a8e3b78441d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3546-cwe-202-exposure-of-sensitive-inform-17645cba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3546%3A%20CWE-202%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20forfront%20e-shot&amp;severity=medium&amp;id=69be1810f4197a8e3b78437c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3333-cwe-79-improper-neutralization-of-in-6ad0c532</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minhnhut%20MinhNhut%20Link%20Gateway&amp;severity=medium&amp;id=69be180ef4197a8e3b784332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14037-cwe-352-cross-site-request-forgery--03a05b47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14037%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20invelity%20Invelity%20Product%20Feeds&amp;severity=high&amp;id=69be1806f4197a8e3b783b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4087-cwe-89-improper-neutralization-of-sp-e5eec0f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4087%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20samperrow%20Pre*%20Party%20Resource%20Hints&amp;severity=medium&amp;id=69be1811f4197a8e3b784443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1503-cwe-352-cross-site-request-forgery-c-9ddba76f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1503%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frankkoenen%20Plugin%20Name%3A%20login_register&amp;severity=medium&amp;id=69be1807f4197a8e3b783c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13785-cwe-94-improper-control-of-generati-ab6a1f39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13785%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20reputeinfosystems%20Contact%20Form%2C%20Survey%2C%20Quiz%20%26%20Popup%20Form%20Builder%20%E2%80%93%20ARForms&amp;severity=medium&amp;id=69be1806f4197a8e3b783b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3619-cwe-79-improper-neutralization-of-in-464c4dc3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tonyh-1%20Sheets2Table&amp;severity=medium&amp;id=69be1810f4197a8e3b784398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3331-cwe-352-cross-site-request-forgery-c-9da5a7b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3331%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chuckmo%20Lobot%20Slider%20Administrator&amp;severity=medium&amp;id=69be180ef4197a8e3b784328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1313-cwe-918-server-side-request-forgery--530406e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1313%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20eagerterrier%20MimeTypes%20Link%20Icons&amp;severity=high&amp;id=69be1806f4197a8e3b783bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3003-cwe-79-improper-neutralization-of-in-1c64fa1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3003%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vagaro%20Vagaro%20Booking%20Widget&amp;severity=high&amp;id=69be180df4197a8e3b7842f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1392-cwe-352-cross-site-request-forgery-c-4eab07f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1392%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20superrishi%20SR%20WP%20Minify%20HTML&amp;severity=medium&amp;id=69be1807f4197a8e3b783c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3460-cwe-20-improper-input-validation-in--49405daa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3460%3A%20CWE-20%20Improper%20Input%20Validation%20in%20xjb%20REST%20API%20TO%20MiniProgram&amp;severity=medium&amp;id=69be180ef4197a8e3b784356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3641-cwe-20-improper-input-validation-in--e26ee0b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3641%3A%20CWE-20%20Improper%20Input%20Validation%20in%20appmaxplataforma%20Appmax&amp;severity=medium&amp;id=69be1810f4197a8e3b78439f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3996-cwe-79-improper-neutralization-of-in-68478d14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sammyb%20WP%20Games%20Embed&amp;severity=medium&amp;id=69be1810f4197a8e3b7843c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3332-cwe-352-cross-site-request-forgery-c-c2f5142d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3332%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xhanch_studio%20Xhanch%20%E2%80%93%20My%20Advanced%20Settings&amp;severity=medium&amp;id=69be180ef4197a8e3b78432d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2468-cwe-89-improper-neutralization-of-sp-1117943b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2468%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quentn%20Quentn%20WP&amp;severity=high&amp;id=69be180df4197a8e3b7842c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2294-cwe-285-improper-authorization-in-ad-117c9b16</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2294%3A%20CWE-285%20Improper%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69be180bf4197a8e3b784285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1253-cwe-862-missing-authorization-in-ato-80830b1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1253%3A%20CWE-862%20Missing%20Authorization%20in%20atomchat%20Group%20Chat%20%26%20Video%20Chat%20by%20AtomChat&amp;severity=medium&amp;id=69be1806f4197a8e3b783ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1899-cwe-79-improper-neutralization-of-in-8084abd1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itpathsolutions%20Any%20Post%20Slider&amp;severity=medium&amp;id=69be1809f4197a8e3b783d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3651-cwe-862-missing-authorization-in-hak-486b71e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3651%3A%20CWE-862%20Missing%20Authorization%20in%20hakeemnala%20Build%20App%20Online&amp;severity=medium&amp;id=69be1810f4197a8e3b7843b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1806-cwe-79-improper-neutralization-of-in-f97469bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tourcms%20Tour%20%26%20Activity%20Operator%20Plugin%20for%20TourCMS&amp;severity=medium&amp;id=69be1809f4197a8e3b783d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1247-cwe-79-improper-neutralization-of-in-c6f3c974</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1247%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seosbg%20Survey&amp;severity=medium&amp;id=69be1806f4197a8e3b783ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1935-cwe-862-missing-authorization-in-bra-987f9535</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1935%3A%20CWE-862%20Missing%20Authorization%20in%20brainstation23%20Company%20Posts%20for%20LinkedIn&amp;severity=medium&amp;id=69be180bf4197a8e3b784264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1886-cwe-79-improper-neutralization-of-in-ac2ded26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1886%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hrs2015%20Go%20Night%20Pro%20%7C%20WordPress%20Dark%20Mode%20Plugin&amp;severity=medium&amp;id=69be1809f4197a8e3b783d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1891-cwe-79-improper-neutralization-of-in-fbd941f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dogrow%20Simple%20Football%20Scoreboard&amp;severity=medium&amp;id=69be1809f4197a8e3b783d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13910-cwe-79-improper-neutralization-of-i-f70b79dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20axton%20WP-WebAuthn&amp;severity=medium&amp;id=69be1806f4197a8e3b783b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4069-cwe-79-improper-neutralization-of-in-e056d151</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4069%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pftool%20Alfie%20%E2%80%93%20Feed%20Plugin&amp;severity=medium&amp;id=69be1811f4197a8e3b784412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2496-cwe-79-improper-neutralization-of-in-d1387e77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20waianaeboy702%20Ed&apos;s%20Font%20Awesome&amp;severity=medium&amp;id=69be180df4197a8e3b7842c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2424-cwe-79-improper-neutralization-of-in-9fbdb9b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2424%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20applixir%20Reward%20Video%20Ad%20for%20WordPress&amp;severity=medium&amp;id=69be180bf4197a8e3b784294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4084-cwe-79-improper-neutralization-of-in-2ab00629</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbednarek%20fyyd%20podcast%20shortcodes&amp;severity=medium&amp;id=69be1811f4197a8e3b78442d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4127-cwe-862-missing-authorization-in-cha-4f808c50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4127%3A%20CWE-862%20Missing%20Authorization%20in%20charlycharm%20Speedup%20Optimization&amp;severity=medium&amp;id=69be1813f4197a8e3b784ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1093-cwe-79-improper-neutralization-of-in-2d469579</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1093%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativewerkdesigns%20WPFAQBlock%E2%80%93%20FAQ%20%26%20Accordion%20Plugin%20For%20Gutenberg&amp;severity=medium&amp;id=69be1806f4197a8e3b783b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2290-cwe-918-server-side-request-forgery--493a61c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2290%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jurajsim%20Post%20Affiliate%20Pro&amp;severity=low&amp;id=69be180bf4197a8e3b784280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3506-cwe-862-missing-authorization-in-lar-e3524987</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3506%3A%20CWE-862%20Missing%20Authorization%20in%20larrykim%20WP-Chatbot%20for%20Messenger&amp;severity=medium&amp;id=69be1810f4197a8e3b784372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4067-cwe-79-improper-neutralization-of-in-bc0cb2da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nocaredev%20Ad%20Short&amp;severity=medium&amp;id=69be1811f4197a8e3b78440b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2277-cwe-79-improper-neutralization-of-in-34e2f15d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2277%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20larsdrasmussen%20rexCrawler&amp;severity=medium&amp;id=69be180bf4197a8e3b784272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1851-cwe-79-improper-neutralization-of-in-f86fc823</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deckercz%20iVysilani%20Shortcode&amp;severity=medium&amp;id=69be1809f4197a8e3b783d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4077-cwe-79-improper-neutralization-of-in-a742ebf9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miguelmartinezlopez%20Ecover%20Builder%20For%20Dummies&amp;severity=medium&amp;id=69be1811f4197a8e3b784424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1390-cwe-352-cross-site-request-forgery-c-5d433691</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1390%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20haghs%20Redirect%20countdown&amp;severity=medium&amp;id=69be1807f4197a8e3b783c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1378-cwe-352-cross-site-request-forgery-c-1972715a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1378%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20suifengtec%20WP%20Posts%20Re-order&amp;severity=medium&amp;id=69be1807f4197a8e3b783c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1393-cwe-352-cross-site-request-forgery-c-60eef6f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1393%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20omarnas%20Add%20Google%20Social%20Profiles%20to%20Knowledge%20Graph%20Box&amp;severity=medium&amp;id=69be1807f4197a8e3b783c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1854-cwe-79-improper-neutralization-of-in-ba6d190e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nosoycesaros%20Post%20Flagger&amp;severity=medium&amp;id=69be1809f4197a8e3b783d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1822-cwe-79-improper-neutralization-of-in-be7013d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tonysamperi%20WP%20NG%20Weather&amp;severity=medium&amp;id=69be1809f4197a8e3b783d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2941-cwe-862-missing-authorization-in-plu-785289cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2941%3A%20CWE-862%20Missing%20Authorization%20in%20plugli%20Linksy%20Search%20and%20Replace&amp;severity=high&amp;id=69be180df4197a8e3b7842ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4086-cwe-79-improper-neutralization-of-in-d801ad0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4086%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20newbiesup%20WP%20Random%20Button&amp;severity=medium&amp;id=69be1811f4197a8e3b78443c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2375-cwe-269-improper-privilege-managemen-b429e3ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2375%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20appcheap%20App%20Builder%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Flight&amp;severity=medium&amp;id=69be180bf4197a8e3b78428f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1800-cwe-89-improper-neutralization-of-sp-6508487b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1800%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wisdomlogix%20Fonts%20Manager%20%7C%20Custom%20Fonts&amp;severity=high&amp;id=69be1807f4197a8e3b783c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2440-cwe-79-improper-neutralization-of-in-5cce452d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=69be180df4197a8e3b7842bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3335-cwe-862-missing-authorization-in-fli-d6558976</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3335%3A%20CWE-862%20Missing%20Authorization%20in%20flightbycanto%20Canto&amp;severity=medium&amp;id=69be180ef4197a8e3b78433c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3570-cwe-862-missing-authorization-in-acu-58dc6d36</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3570%3A%20CWE-862%20Missing%20Authorization%20in%20acumenconsulting%20Smarter%20Analytics&amp;severity=medium&amp;id=69be1810f4197a8e3b78438a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3334-cwe-89-improper-neutralization-of-sp-c25ae167</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3334%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thoefter%20CMS%20Commander%20%E2%80%93%20Manage%20Multiple%20Sites&amp;severity=high&amp;id=69be180ef4197a8e3b784337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2279-cwe-89-improper-neutralization-of-sp-9177e77e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2279%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20silvercover%20myLinksDump&amp;severity=high&amp;id=69be180bf4197a8e3b784279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4302-cwe-918-server-side-request-forgery--5793ece4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4302%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpxpo%20WowOptin%3A%20Next-Gen%20Popup%20Maker%20%E2%80%93%20Create%20Stunning%20Popups%20and%20Optins%20for%20Lead%20Generation&amp;severity=high&amp;id=69bdff57f4197a8e3b623666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-21-7d29c70a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-21&amp;severity=medium&amp;id=69be5ab7f4197a8e3bb06acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-21-efa95b81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-21&amp;severity=low&amp;id=69be5ab7f4197a8e3bb06ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33238-cwe-22-improper-limitation-of-a-pat-e1bc9bf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33238%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bdda56b462d409683a8be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33237-cwe-918-server-side-request-forgery-84e662a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33237%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bdda56b462d409683a8bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2430-cwe-79-improper-neutralization-of-in-b2e5892d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2430%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=69bdda56b462d409683a8bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3474-cwe-22-improper-limitation-of-a-path-67cc90df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3474%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=69bdda56b462d409683a8c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3350-cwe-79-improper-neutralization-of-in-800f77b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsaad%20Image%20Alt%20Text%20Manager%20%E2%80%93%20Bulk%20%26%20Dynamic%20Alt%20Tags%20For%20image%20SEO%20Optimization%20%2B%20AI&amp;severity=medium&amp;id=69bdda56b462d409683a8bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3567-cwe-862-missing-authorization-in-swe-2ac2bc12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3567%3A%20CWE-862%20Missing%20Authorization%20in%20sweetdaisy86%20RepairBuddy%20%E2%80%93%20Repair%20Shop%20CRM%20%26%20Booking%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69bdda57b462d409683a8c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3516-cwe-79-improper-neutralization-of-in-7a01a687</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3516%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anssilaitila%20Contact%20List%20%E2%80%93%20Online%20Staff%20Directory%20%26%20Address%20Book&amp;severity=medium&amp;id=69bdda56b462d409683a8c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2352-cwe-79-improper-neutralization-of-in-eae8d2fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=69bdda56b462d409683a8bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4083-cwe-79-improper-neutralization-of-in-fe5ebc60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20demonisblack%20Scoreboard%20for%20HTML5%20Games%20Lite&amp;severity=medium&amp;id=69bdda57b462d409683a8c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3577-cwe-79-improper-neutralization-of-in-5f82dc59</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20Keep%20Backup%20Daily&amp;severity=medium&amp;id=69bdda57b462d409683a8c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3368-cwe-79-improper-neutralization-of-in-e08e88c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20Injection%20Guard&amp;severity=high&amp;id=69bdda56b462d409683a8bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3339-cwe-22-improper-limitation-of-a-path-290fd5b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3339%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20fahadmahmood%20Keep%20Backup%20Daily&amp;severity=low&amp;id=69bdda56b462d409683a8be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24060-cwe-319-in-automated-logic-webctrl--ad487a9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24060%3A%20CWE-319%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=critical&amp;id=69bdda56b462d409683a8bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32666-cwe-290-in-automated-logic-webctrl--daa6d934</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32666%3A%20CWE-290%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=high&amp;id=69bdd7ec1188d0bb0cbf88c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25086-cwe-605-in-automated-logic-webctrl--78c13bd9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25086%3A%20CWE-605%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=high&amp;id=69bdd7ec1188d0bb0cbf88c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33228-cwe-1321-improperly-controlled-modi-dfc6af7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33228%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20WebReflection%20flatted&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31926-cwe-522-in-igl-technologies-eparkin-4991a4ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31926%3A%20CWE-522%20in%20IGL-Technologies%20eParking.fi&amp;severity=medium&amp;id=69bdd4681188d0bb0cbbf668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32663-cwe-613-in-igl-technologies-eparkin-e29ec125</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32663%3A%20CWE-613%20in%20IGL-Technologies%20eParking.fi&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33210-cwe-134-use-of-externally-controlle-d675dffc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33210%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20ruby%20json&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31903-cwe-307-in-igl-technologies-eparkin-667c311e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31903%3A%20CWE-307%20in%20IGL-Technologies%20eParking.fi&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29796-cwe-306-in-igl-technologies-eparkin-fcf429f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29796%3A%20CWE-306%20in%20IGL-Technologies%20eParking.fi&amp;severity=critical&amp;id=69bdd4681188d0bb0cbbf678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22163-cwe-820-missing-synchronization-419-71f757dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22163%3A%20CWE-820%3A%20Missing%20Synchronization%20(4.19)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69bdda57b462d409683a8c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21732-cwe-823-use-of-out-of-range-pointer-4944e32e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21732%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20(4.16)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=69bdda57b462d409683a8c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28204-cwe-522-in-ctek-chargeportal-ff0258cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28204%3A%20CWE-522%20in%20CTEK%20Chargeportal&amp;severity=medium&amp;id=69bdda57b462d409683a8c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27649-cwe-613-in-ctek-chargeportal-b04619a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27649%3A%20CWE-613%20in%20CTEK%20Chargeportal&amp;severity=high&amp;id=69bdda57b462d409683a8c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31904-cwe-307-in-ctek-chargeportal-4055e4ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31904%3A%20CWE-307%20in%20CTEK%20Chargeportal&amp;severity=high&amp;id=69bdda57b462d409683a8c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25192-cwe-306-in-ctek-chargeportal-a1a8a9ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25192%3A%20CWE-306%20in%20CTEK%20Chargeportal&amp;severity=critical&amp;id=69bdda57b462d409683a8c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32810-cwe-732-incorrect-permission-assign-df095845</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32810%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20squidowl%20halloy&amp;severity=medium&amp;id=69bdda59b462d409683a8cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33209-cwe-79-improper-neutralization-of-i-3b6d619b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33209%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20avo-hq%20avo&amp;severity=medium&amp;id=69bdda59b462d409683a8cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32733-cwe-22-improper-limitation-of-a-pat-279ffebb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32733%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20squidowl%20halloy&amp;severity=high&amp;id=69bdda57b462d409683a8c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33204-cwe-400-uncontrolled-resource-consu-bbf89418</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33204%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kelvinmo%20simplejwt&amp;severity=high&amp;id=69bdda59b462d409683a8ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33476-cwe-22-improper-limitation-of-a-pat-3381414c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33476%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bdda59b462d409683a8cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33203-cwe-248-uncaught-exception-in-siyua-8441b75e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33203%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bdda59b462d409683a8cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4508-sql-injection-in-pbootcms-c1d7dbaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4508%3A%20SQL%20Injection%20in%20PbootCMS&amp;severity=medium&amp;id=69bdda59b462d409683a8cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33194-cwe-22-improper-limitation-of-a-pat-8d28cd73</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33194%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bdda59b462d409683a8cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33186-cwe-285-improper-authorization-in-g-3cfe069c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33186%3A%20CWE-285%3A%20Improper%20Authorization%20in%20grpc%20grpc-go&amp;severity=critical&amp;id=69bdcad201d25e334c8cba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3864-cwe-22-path-traversal-in-kubernetes--25c8737b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3864%3A%20CWE-22%20Path%20Traversal%20in%20Kubernetes%20CSI%20Driver%20for%20NFS&amp;severity=medium&amp;id=69bdcad201d25e334c8cba96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33180-cwe-200-exposure-of-sensitive-infor-6b7e33ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33180%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=high&amp;id=69bdcad201d25e334c8cba8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4507-sql-injection-in-mindinventory-minds-12bc1db4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4507%3A%20SQL%20Injection%20in%20Mindinventory%20MindSQL&amp;severity=medium&amp;id=69bdc5f74a1db2150bb853e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4506-code-injection-in-mindinventory-mind-8a38174d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4506%3A%20Code%20Injection%20in%20Mindinventory%20MindSQL&amp;severity=medium&amp;id=69bdc5f74a1db2150bb853dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23536-improper-limitation-of-a-pathname-t-62b17572</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23536%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%20(RHOAI)&amp;severity=high&amp;id=69bdc5f74a1db2150bb853d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33177-cwe-862-missing-authorization-in-st-f4221dee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33177%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69bdc1299e4ece4ed25050a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33172-cwe-79-improper-neutralization-of-i-2a2580b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33172%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69bdc1299e4ece4ed25050a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33171-cwe-22-improper-limitation-of-a-pat-305244fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33171%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69bdc1299e4ece4ed25050a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33166-cwe-22-improper-limitation-of-a-pat-5defed82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33166%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20allure-framework%20allure2&amp;severity=high&amp;id=69bdc1299e4ece4ed250509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32887-cwe-362-concurrent-execution-using--4cdd057f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32887%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Effect-TS%20effect&amp;severity=high&amp;id=69bdc1299e4ece4ed250509c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3584-cwe-94-improper-control-of-generatio-1e9c9524</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3584%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpchill%20Kali%20Forms%20%E2%80%94%20Contact%20Form%20%26%20Drag-and-Drop%20Builder&amp;severity=critical&amp;id=69bdbd91e2bf98efc48d0977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2378-cwe-1021-improper-restriction-of-ren-2eceb389</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2378%3A%20CWE-1021%20Improper%20restriction%20of%20rendered%20UI%20layers%20or%20frames%20in%20The%20BrowserCompany%20of%20New%20York%20ArcSearch&amp;severity=high&amp;id=69bdbd91e2bf98efc48d0974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/libyan-oil-refinery-among-targets-in-long-running--c19cb829</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Libyan%20Oil%20Refinery%20Among%20Targets%20in%20Long-running%20Likely%20Espionage%20Campaign&amp;severity=medium&amp;id=69c10bcff4197a8e3b33b84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33164-cwe-122-heap-based-buffer-overflow--c1a273ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33164%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20strukturag%20libde265&amp;severity=high&amp;id=69bdb3ffe32a4fbe5fced8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33165-cwe-787-out-of-bounds-write-in-stru-44da5709</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33165%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20strukturag%20libde265&amp;severity=medium&amp;id=69bdb3ffe32a4fbe5fced8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33156-cwe-426-untrusted-search-path-in-ni-e5b4bfb7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33156%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20NickeManarin%20ScreenToGif&amp;severity=high&amp;id=69bdb079e32a4fbe5fcd3b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33155-cwe-400-uncontrolled-resource-consu-c4229f4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33155%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20seperman%20deepdiff&amp;severity=high&amp;id=69bdb079e32a4fbe5fcd3b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33151-cwe-20-improper-input-validation-in-b9f920ea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33151%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20socketio%20socket.io&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33147-cwe-121-stack-based-buffer-overflow-67cddc2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33147%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20GenericMappingTools%20gmt&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4505-unrestricted-upload-in-eosphoros-ai--e3670476</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4505%3A%20Unrestricted%20Upload%20in%20eosphoros-ai%20DB-GPT&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4504-sql-injection-in-eosphoros-ai-db-gpt-5d8e60df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4504%3A%20SQL%20Injection%20in%20eosphoros-ai%20db-gpt&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33140-cwe-79-improper-neutralization-of-i-dec26bff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33140%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ParzivalHack%20PySpector&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33139-cwe-184-incomplete-list-of-disallow-d2e1b823</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33139%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20ParzivalHack%20PySpector&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4438-cwe-20-improper-input-validation-in--8e885aca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4438%3A%20CWE-20%20Improper%20input%20validation%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4437-cwe-125-out-of-bounds-read-in-the-gn-cd83f98f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4437%3A%20CWE-125%20Out-of-bounds%20read%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33126-cwe-918-server-side-request-forgery-49fe946d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33126%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4500-injection-in-bagofwords1-bagofwords-0dcba076</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4500%3A%20Injection%20in%20bagofwords1%20bagofwords&amp;severity=medium&amp;id=69bda5ede32a4fbe5fc68a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4499-os-command-injection-in-d-link-dir-8-5874f0f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4499%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-820LW&amp;severity=medium&amp;id=69bda5ede32a4fbe5fc68a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4497-os-command-injection-in-totolink-wa3-7ad2d73a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4497%3A%20OS%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=69bd9b64e32a4fbe5fc09f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33010-cwe-942-permissive-cross-domain-pol-e7fe03ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33010%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20doobidoo%20mcp-memory-service&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4496-os-command-injection-in-sigmade-git--6d5ca08b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4496%3A%20OS%20Command%20Injection%20in%20sigmade%20Git-MCP-Server&amp;severity=medium&amp;id=69bd97dde32a4fbe5fbf1b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32710-cwe-122-heap-based-buffer-overflow--ac2e8bf6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32710%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20MariaDB%20server&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32317-cwe-346-origin-validation-error-in--0e3db814</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32317%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20cryptomator%20android&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32318-cwe-346-origin-validation-error-in--2dbac183</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32318%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20cryptomator%20ios&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4495-cross-site-scripting-in-atjiu-pybbs-524d3045</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4495%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=69bd8d53e32a4fbe5fb6509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31836-cwe-285-improper-authorization-in-b-a370377c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31836%3A%20CWE-285%3A%20Improper%20Authorization%20in%20bluewave-labs%20Checkmate&amp;severity=high&amp;id=69bdbd91e2bf98efc48d097c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4494-cross-site-scripting-in-atjiu-pybbs-81e77a33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4494%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4493-stack-based-buffer-overflow-in-tenda-568400c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4493%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32844-cwe-79-improper-neutralization-of-i-55ddce3c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32844%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20XinLiangCoder%20php_api_doc&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d097f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4492-stack-based-buffer-overflow-in-tenda-86e6b8d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4492%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd82c5e32a4fbe5fb2018f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4491-stack-based-buffer-overflow-in-tenda-48c720e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4491%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4490-stack-based-buffer-overflow-in-tenda-d44337bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4490%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15608-cwe-121-stack-based-buffer-overflow-5c3b0431</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15608%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15607-cwe-77-improper-neutralization-of-s-5bce1db6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15607%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59383-cwe-121-in-qnap-systems-inc-media-s-96baa7ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59383%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20Media%20Streaming%20Add-on&amp;severity=low&amp;id=69bdbd91e2bf98efc48d0999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62843-cwe-923-in-qnap-systems-inc-quroute-20f6e0c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62843%3A%20CWE-923%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=low&amp;id=69bdbd93e2bf98efc48d0f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62844-cwe-1390-in-qnap-systems-inc-qurout-24231f48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62844%3A%20CWE-1390%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62845-cwe-150-in-qnap-systems-inc-quroute-cc06e106</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62845%3A%20CWE-150%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62846-cwe-89-in-qnap-systems-inc-qurouter-0aebad47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62846%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22895-cwe-79-in-qnap-systems-inc-quftp-se-12f14fbd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22895%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuFTP%20Service&amp;severity=low&amp;id=69bdbd93e2bf98efc48d0f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22897-cwe-78-in-qnap-systems-inc-qunetswi-663db162</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22897%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22898-cwe-306-in-qnap-systems-inc-qvr-pro-d9605d37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22898%3A%20CWE-306%20in%20QNAP%20Systems%20Inc.%20QVR%20Pro&amp;severity=critical&amp;id=69bdbd93e2bf98efc48d0f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22900-cwe-798-in-qnap-systems-inc-qunetsw-1c94d659</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22900%3A%20CWE-798%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22901-cwe-78-in-qnap-systems-inc-qunetswi-b98245bf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22901%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22902-cwe-78-in-qnap-systems-inc-qunetswi-91e83569</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22902%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bd7bc3e32a4fbe5faf4b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4489-stack-based-buffer-overflow-in-tenda-7a1a4d9e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4489%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd713de32a4fbe5faaf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-new-android-safeguards-operation-ali-1e852a2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20New%20Android%20Safeguards%2C%20Operation%20Alice%2C%20UK%20Toughens%20Cyber%20Reporting&amp;severity=medium&amp;id=69bd70fee32a4fbe5faae813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32989-cross-site-request-forgery-csrf-in--4fdf15cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32989%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Precurio%20Precurio%20Intranet%20Portal&amp;severity=high&amp;id=69bd713de32a4fbe5faaf817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32986-cwe-79-improper-neutralization-of-i-53f46ee9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Textpattern%20Textpattern%20CMS&amp;severity=medium&amp;id=69bd6dade32a4fbe5fa8ba88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4488-buffer-overflow-in-utt-hiper-1250gw-bdf7a1ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4488%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4519-vulnerability-in-python-software-fou-ec881397</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4519%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69bd66a5e32a4fbe5fa5cd32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3-men-charged-with-conspiring-to-smuggle-us-artifi-a64fb585</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%20Men%20Charged%20With%20Conspiring%20to%20Smuggle%20US%20Artificial%20Intelligence%20to%20China&amp;severity=high&amp;id=69bd5f6ae32a4fbe5fa2bedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33312-cwe-863-incorrect-authorization-in--770ceda6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33312%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69bd5fb1e32a4fbe5fa2ca4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29794-cwe-807-reliance-on-untrusted-input-e5332580</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29794%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69bd5fb1e32a4fbe5fa2ca49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4487-buffer-overflow-in-utt-hiper-1200gw-2ecb1ddb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4487%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69bd5fb1e32a4fbe5fa2ca51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4486-stack-based-buffer-overflow-in-d-lin-7fbf1468</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4486%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69bd5895e32a4fbe5f9d858c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4485-sql-injection-in-itsourcecode-colleg-6fa0fd0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4485%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69bd5190e32a4fbe5f999477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31382-cwe-79-improper-neutralization-of-i-63cadc09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31382%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Gainsight%20Gainsight%20Assist&amp;severity=medium&amp;id=69bd4e0ce32a4fbe5f8d64d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31381-cwe-598-use-of-get-request-method-w-f5d519cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31381%3A%20CWE-598%20Use%20of%20GET%20request%20method%20with%20sensitive%20query%20strings%20in%20Gainsight%20Gainsight%20Assist&amp;severity=medium&amp;id=69bd4e0ce32a4fbe5f8d64d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4434-cwe-295-improper-certificate-validat-669c3b4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4434%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Devolutions%20Server&amp;severity=high&amp;id=69bd4702e32a4fbe5f755168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-confirms-handala-link-to-iran-government-amid-t-ad25ca57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Confirms%20Handala%20Link%20to%20Iran%20Government%20Amid%20Takedown%20of%20Hackers%E2%80%99%20Sites&amp;severity=medium&amp;id=69bd3fc6e32a4fbe5f622e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/predator-spyware-disables-ios-camera-and-microphon-79d2b253</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Predator%20spyware%20disables%20iOS%20camera%20and%20microphone%20indicators%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69bdea2bf4197a8e3b3b6143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/navia-data-breach-impacts-27-million-45a1c180</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Navia%20Data%20Breach%20Impacts%202.7%20Million&amp;severity=medium&amp;id=69bd2aade32a4fbe5f53bb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33136-cwe-79-improper-neutralization-of-i-5f385205</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33136%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33135-cwe-79-improper-neutralization-of-i-cdd783b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33135%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-magento-sites-hit-in-ongoing-defaceme-12b3db1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Magento%20Sites%20Hit%20in%20Ongoing%20Defacement%20Campaign&amp;severity=medium&amp;id=69bd23a5e32a4fbe5f51f85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33134-cwe-89-improper-neutralization-of-s-a410423a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33134%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33133-cwe-89-improper-neutralization-of-s-e49a9cd5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33133%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69bd275fe32a4fbe5f531f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33131-cwe-290-authentication-bypass-by-sp-9e875424</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33131%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20h3js%20h3&amp;severity=high&amp;id=69bd23e7e32a4fbe5f52014e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/widespread-github-actions-tag-compromise-exposes-c-7ab138eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Widespread%20GitHub%20Actions%20Tag%20Compromise%20Exposes%20CI%2FCD%20Secrets&amp;severity=medium&amp;id=69bdb74ce32a4fbe5fd0512f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidstealer-debugging-chrome-to-steal-its-secrets-eb82d6ab</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidStealer%3A%20Debugging%20Chrome%20to%20Steal%20Its%20Secrets&amp;severity=medium&amp;id=69bdb74ce32a4fbe5fd0512a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33130-cwe-98-improper-control-of-filename-66c6c7a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33130%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20louislam%20uptime-kuma&amp;severity=medium&amp;id=69bd1cd0e32a4fbe5f4fde03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33129-cwe-208-observable-timing-discrepan-1f7546b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33129%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20h3js%20h3&amp;severity=medium&amp;id=69bd1cd0e32a4fbe5f4fddfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33128-cwe-93-improper-neutralization-of-c-fff9b3de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33128%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20h3js%20h3&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22324-cwe-98-improper-control-of-filename-ec806458</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22324%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Melania&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0677-cwe-502-deserialization-of-untrusted-eca92283</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0677%3A%20Deserialization%20of%20Untrusted%20Data%20in%20TotalSuite%20TotalContest%20Lite&amp;severity=null&amp;id=69bd194ce32a4fbe5f4ea6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33125-cwe-285-improper-authorization-in-b-c66f9dc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33125%3A%20CWE-285%3A%20Improper%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33124-cwe-287-improper-authentication-in--31f1f111</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33124%3A%20CWE-287%3A%20Improper%20Authentication%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=69bd5190e32a4fbe5f999481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32537-cwe-352-cross-site-request-forgery--fee9ab07</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32537%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20joshuae1974%20Flash%20Video%20Player&amp;severity=high&amp;id=69bd5895e32a4fbe5f9d8595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33123-cwe-400-uncontrolled-resource-consu-be1333fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33123%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69bd945ce32a4fbe5fbc7f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31119-cwe-79-improper-neutralization-of-i-e477788d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31119%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Vasilis%20Triantafyllou%20Special%20Box%20for%20Content&amp;severity=medium&amp;id=69bd38f3e32a4fbe5f57f055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33080-cwe-79-improper-neutralization-of-i-6232979d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33080%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20filamentphp%20filament&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32701-cwe-843-access-of-resource-using-in-4cc8eb58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32701%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20QwikDev%20qwik&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27625-cwe-22-improper-limitation-of-a-pat-64c622ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27625%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gsocket-backdoor-delivered-through-bash-script-fri-cf8c30b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GSocket%20Backdoor%20Delivered%20Through%20Bash%20Script%2C%20(Fri%2C%20Mar%2020th)&amp;severity=medium&amp;id=69bd0b08e32a4fbe5f491c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-langflow-vulnerability-exploited-hours-af-bdeb0c89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Langflow%20Vulnerability%20Exploited%20Hours%20After%20Public%20Disclosure&amp;severity=critical&amp;id=69bd0b09e32a4fbe5f491c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33075-cwe-494-download-of-code-without-in-52a1ff21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33075%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69bd0b4ce32a4fbe5f4933bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33072-cwe-798-use-of-hard-coded-credentia-9bae99e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33072%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20error311%20FileRise&amp;severity=high&amp;id=69bd0b4ce32a4fbe5f4933b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33071-cwe-434-unrestricted-upload-of-file-61b95bec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33071%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20error311%20FileRise&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2432-cwe-79-improper-neutralization-of-in-f8cd0cf5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20Custom%20Reports%20%E2%80%93%20Flexible%20reporting%20to%20track%20what%20matters%20most&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3550-cwe-862-missing-authorization-in-fir-75c59a70</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3550%3A%20CWE-862%20Missing%20Authorization%20in%20firetree%20RockPress&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2421-cwe-22-improper-limitation-of-a-path-f2c4c46a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2421%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ghera74%20ilGhera%20Carta%20Docente%20for%20WooCommerce&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33070-cwe-306-missing-authentication-for--851eeec5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33070%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20error311%20FileRise&amp;severity=low&amp;id=69bd0b4ce32a4fbe5f4933b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33069-cwe-125-out-of-bounds-read-in-pjsip-9b1ff4fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33069%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69bd6dade32a4fbe5fa8ba92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33068-cwe-807-reliance-on-untrusted-input-81883495</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33068%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69bd5190e32a4fbe5f99947e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33067-cwe-79-improper-neutralization-of-i-1a61bc50</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33067%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bd945ce32a4fbe5fbc7f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copyright-lures-mask-a-multi-stage-purelog-stealer-54532eb6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Copyright%20Lures%20Mask%20a%20Multi-Stage%20PureLog%20Stealer%20Attack%20on%20Key%20Industries&amp;severity=medium&amp;id=69bd0401e32a4fbe5f43542f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beast-ransomware-toolkit-a-proactive-threat-intell-3c323286</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beast%20Ransomware%20Toolkit%3A%20A%20Proactive%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69bd0401e32a4fbe5f435424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33066-cwe-79-improper-neutralization-of-i-f75d32b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33066%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33022-cwe-129-improper-validation-of-arra-b543ace7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33022%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69bcfd2fe32a4fbe5f3cd696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-and-kimwolf-ddos-botnets-disrupted-in-inter-329eec84</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20and%20Kimwolf%20DDoS%20Botnets%20Disrupted%20in%20International%20Operation&amp;severity=medium&amp;id=69bcf975e32a4fbe5f3bc392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33060-cwe-918-server-side-request-forgery-1b50a38a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33060%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ondata%20ckan-mcp-server&amp;severity=medium&amp;id=69bcf9b8e32a4fbe5f3bdae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33057-cwe-94-improper-control-of-generati-7b233148</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33057%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mesop-dev%20mesop&amp;severity=critical&amp;id=69bcf9b8e32a4fbe5f3bdae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33056-cwe-61-unix-symbolic-link-symlink-f-a61b77da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33056%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20alexcrichton%20tar-rs&amp;severity=medium&amp;id=69bcf9b8e32a4fbe5f3bdae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33055-cwe-843-access-of-resource-using-in-0fc0ef28</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33055%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20alexcrichton%20tar-rs&amp;severity=medium&amp;id=69bcf624e32a4fbe5f3a710c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4478-improper-verification-of-cryptograph-dd0fa87f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4478%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=critical&amp;id=69bcf624e32a4fbe5f3a7116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4477-use-of-hard-coded-cryptographic-key--fb0d66fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4477%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=low&amp;id=69bcf624e32a4fbe5f3a7111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33054-cwe-22-improper-limitation-of-a-pat-0da03659</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33054%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mesop-dev%20mesop&amp;severity=critical&amp;id=69bcf624e32a4fbe5f3a7107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33053-cwe-639-authorization-bypass-throug-1e144efc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33053%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69bcf624e32a4fbe5f3a7104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4476-missing-authentication-in-yi-technol-4206d120</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4476%3A%20Missing%20Authentication%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=medium&amp;id=69bcef1ee32a4fbe5f36fb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4475-hard-coded-credentials-in-yi-technol-fc23c5af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4475%3A%20Hard-coded%20Credentials%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=high&amp;id=69bceb98e32a4fbe5f35b7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4474-cross-site-scripting-in-itsourcecode-f76aefd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4474%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69bceb98e32a4fbe5f35b7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33051-cwe-79-improper-neutralization-of-i-bc102802</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33051%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69bce490e32a4fbe5f3388a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33043-cwe-942-permissive-cross-domain-pol-745876a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33043%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bce490e32a4fbe5f3388a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33041-cwe-200-exposure-of-sensitive-infor-3ba0bea1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33041%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bce490e32a4fbe5f3388a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33040-cwe-190-integer-overflow-or-wraparo-df6446c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33040%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69bce490e32a4fbe5f33889e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33039-cwe-918-server-side-request-forgery-15e3e0b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33039%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bce490e32a4fbe5f33889a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33038-cwe-306-missing-authentication-for--912771fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33038%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bd945ce32a4fbe5fbc7f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4473-sql-injection-in-itsourcecode-online-f08070d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4473%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69bd713ee32a4fbe5faaf827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32768-cwe-284-improper-access-control-in--07d9feb3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32768%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20chall-manager&amp;severity=high&amp;id=69bd713de32a4fbe5faaf822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33037-cwe-1188-insecure-default-initializ-824a27f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33037%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bdbd96e2bf98efc48d1059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33036-cwe-776-improper-restriction-of-rec-ba51d0ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33036%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33035-cwe-79-improper-neutralization-of-i-f45160e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33035%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bcda04e32a4fbe5f30468e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4472-sql-injection-in-itsourcecode-online-b296bbe9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4472%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcda04e32a4fbe5f304699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4471-sql-injection-in-itsourcecode-online-86d996d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4471%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcda04e32a4fbe5f304692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33025-cwe-89-improper-neutralization-of-s-1f4cc4d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33025%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo-Encoder&amp;severity=high&amp;id=69bcda04e32a4fbe5f30468a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33024-cwe-918-server-side-request-forgery-82e88a08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33024%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo-Encoder&amp;severity=critical&amp;id=69bcda04e32a4fbe5f304686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33017-cwe-94-improper-control-of-generati-d875cfa4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33017%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69bcda04e32a4fbe5f304681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33013-cwe-835-loop-with-unreachable-exit--ffe4a179</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33013%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20micronaut-projects%20micronaut-core&amp;severity=high&amp;id=69bcda04e32a4fbe5f30467a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33012-cwe-770-allocation-of-resources-wit-0ddd6ec8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33012%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20micronaut-projects%20micronaut-core&amp;severity=high&amp;id=69bcda04e32a4fbe5f304675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33011-cwe-670-always-incorrect-control-fl-dbb9303d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33011%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20nestjs%20nest&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4470-sql-injection-in-itsourcecode-online-eb805163</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4470%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32954-cwe-89-improper-neutralization-of-s-2ba0bacc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32954%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20frappe%20erpnext&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32953-cwe-303-incorrect-implementation-of-27501f28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32953%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20tillitis%20tkeyclient&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32950-cwe-89-improper-neutralization-of-s-bc0e21ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32950%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32949-cwe-918-server-side-request-forgery-12b78e1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32949%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32947-cwe-693-protection-mechanism-failur-f8ad5311</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32947%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4469-sql-injection-in-itsourcecode-online-bfdb9d05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4469%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32946-cwe-693-protection-mechanism-failur-35e9b997</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32946%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32945-cwe-122-heap-based-buffer-overflow--9ea99f4b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32945%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69bcc873e32a4fbe5f2a790f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32942-cwe-416-use-after-free-in-pjsip-pjp-5ca2cca4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32942%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69bcc873e32a4fbe5f2a790a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32941-cwe-770-allocation-of-resources-wit-1e571571</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32941%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4136-cwe-640-weak-password-recovery-mecha-33439421</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4136%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a791b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4038-cwe-862-missing-authorization-in-cod-c5151216</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4038%3A%20CWE-862%20Missing%20Authorization%20in%20CodeRevolution%20Aimogen%20Pro%20-%20All-in-One%20AI%20Content%20Writer%2C%20Editor%2C%20ChatBot%20%26%20Automation%20Toolkit&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a7917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32940-cwe-79-improper-neutralization-of-i-a0d7ab4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32940%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a7901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4468-command-injection-in-comfast-cf-ac10-b912fa2b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4468%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32938-cwe-22-improper-limitation-of-a-pat-6777c83d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32938%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a78fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33063-cwe-476-null-pointer-dereference-in-e3e3c4cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33063%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20ausf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33062-cwe-284-improper-access-control-in--3530c734</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33062%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20free5gc%20nrf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32937-cwe-129-improper-validation-of-arra-5fe376e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32937%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20free5gc%20chf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32891-cwe-80-improper-neutralization-of-s-b6e950f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32891%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20openVESSL%20Anchorr&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32933-cwe-674-uncontrolled-recursion-in-l-7067c409</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32933%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20LuckyPennySoftware%20AutoMapper&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32890-cwe-79-improper-neutralization-of-i-5121d7eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32890%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openVESSL%20Anchorr&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4467-command-injection-in-comfast-cf-ac10-d886df59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4467%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcbde5e32a4fbe5f2545ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21992-easily-exploitable-vulnerability-al-8b5ed83f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21992%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Identity%20Manager%20and%20Oracle%20Web%20Services%20Manager.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Identity%20Manager%20and%20Oracle%20Web%20Services%20Manager.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4466-command-injection-in-comfast-cf-ac10-988ceedb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4466%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcafd9e32a4fbe5f174d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4465-os-command-injection-in-d-link-dir-5-60ae23ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4465%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-513&amp;severity=medium&amp;id=69bcafd9e32a4fbe5f174cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32811-cwe-116-improper-encoding-or-escapi-b3515139</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32811%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20dadrus%20heimdall&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4464-integer-overflow-in-google-chrome-fa62e2e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4464%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4463-heap-buffer-overflow-in-google-chrom-dcdbc2fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4463%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4462-out-of-bounds-read-in-google-chrome-90b629db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4462%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4461-inappropriate-implementation-in-goog-911b60aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4461%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4460-out-of-bounds-read-in-google-chrome-1b58436f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4460%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4459-out-of-bounds-read-and-write-in-goog-a1209755</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4459%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4458-use-after-free-in-google-chrome-badd5fd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4458%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4457-type-confusion-in-google-chrome-f25568f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4457%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4456-use-after-free-in-google-chrome-262b8b39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4456%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4455-heap-buffer-overflow-in-google-chrom-1912bf38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4455%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4454-use-after-free-in-google-chrome-fca0b857</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4454%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4453-integer-overflow-in-google-chrome-558bb25a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4453%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69bcafd7e32a4fbe5f174c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4452-integer-overflow-in-google-chrome-6c804567</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4452%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4451-insufficient-validation-of-untrusted-327de6f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4451%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4450-out-of-bounds-write-in-google-chrome-3ac733c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4450%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4449-use-after-free-in-google-chrome-ed5f7a7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4449%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4448-heap-buffer-overflow-in-google-chrom-b57aa6f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4448%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4447-inappropriate-implementation-in-goog-a053af5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4447%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4446-use-after-free-in-google-chrome-e7753fdb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4446%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4445-use-after-free-in-google-chrome-7854d5d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4445%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4444-stack-buffer-overflow-in-google-chro-e900039f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4444%3A%20Stack%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4443-heap-buffer-overflow-in-google-chrom-546130a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4443%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4442-heap-buffer-overflow-in-google-chrom-6134e6a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4442%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4441-use-after-free-in-google-chrome-1460e210</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4441%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4440-out-of-bounds-read-and-write-in-goog-915aee25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4440%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4439-out-of-bounds-memory-access-in-googl-367adac0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4439%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32881-cwe-183-permissive-list-of-allowed--e7cfd7f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32881%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20vshakitskiy%20ewe&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32873-cwe-825-expired-pointer-dereference-5f2b4614</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32873%3A%20CWE-825%3A%20Expired%20Pointer%20Dereference%20in%20vshakitskiy%20ewe&amp;severity=high&amp;id=69bca5a4e32a4fbe5f143324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32880-cwe-79-improper-neutralization-of-i-0f4748dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32880%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32829-cwe-201-insertion-of-sensitive-info-e3d06045</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32829%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20PSeitz%20lz4_flex&amp;severity=high&amp;id=69bc9abfe32a4fbe5f103102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32828-cwe-918-server-side-request-forgery-fd4580ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32828%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20akuity%20kargo&amp;severity=medium&amp;id=69bc9abfe32a4fbe5f1030fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32771-cwe-22-improper-limitation-of-a-pat-ee98cf31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32771%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ctfer-io%20monitoring&amp;severity=high&amp;id=69bc9abfe32a4fbe5f1030f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32769-cwe-284-improper-access-control-in--1b163257</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32769%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20fullchain&amp;severity=high&amp;id=69bc9abfe32a4fbe5f1030f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32767-cwe-89-improper-neutralization-of-s-8a5766fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32767%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bc9abfe32a4fbe5f1030ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32766-cwe-436-interpretation-conflict-in--17af23a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32766%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20astral-sh%20tokio-tar&amp;severity=low&amp;id=69bc9033e32a4fbe5f0c4187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32985-cwe-306-missing-authentication-for--04629a96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32985%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Xerte%20Xerte%20Online%20Toolkits&amp;severity=critical&amp;id=69bc9033e32a4fbe5f0c418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30580-na-acb3a12b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30580%3A%20n%2Fa&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d098f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63260-na-ee22ee42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63260%3A%20n%2Fa&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55988-na-a8eae2c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55988%3A%20n%2Fa&amp;severity=high&amp;id=69bdb3ffe32a4fbe5fced8e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63261-na-1b8a124a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63261%3A%20n%2Fa&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30579-na-7fa2a6e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30579%3A%20n%2Fa&amp;severity=medium&amp;id=69bd82c5e32a4fbe5fb2018b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30578-na-78c92819</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30578%3A%20n%2Fa&amp;severity=medium&amp;id=69bd82c5e32a4fbe5fb20187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29828-na-1e771d97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29828%3A%20n%2Fa&amp;severity=medium&amp;id=69bd7bc3e32a4fbe5faf4b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67260-na-ea50c466</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67260%3A%20n%2Fa&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46597-na-da22297e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46597%3A%20n%2Fa&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46598-na-c6f81fe9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46598%3A%20n%2Fa&amp;severity=medium&amp;id=69bd66a5e32a4fbe5fa5cd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33372-na-01a2c6aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33372%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33371-na-d0924778</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33371%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33370-na-e6316dfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33370%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33369-na-78a1b374</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33369%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33368-na-9732165f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33368%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44722-na-6ff47388</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44722%3A%20n%2Fa&amp;severity=critical&amp;id=69bd5190e32a4fbe5f999473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-20-e4da03c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-20&amp;severity=medium&amp;id=69bd3c3fe32a4fbe5f59b660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-20-85216207</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-20&amp;severity=low&amp;id=69bd3c3ee32a4fbe5f59b636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-tax-search-leads-to-kernel-mode-avedr-kill-d1d929de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20Tax%20Search%20Leads%20to%20Kernel-Mode%20AV%2FEDR%20Kill&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22737-vulnerability-in-spring-spring-fram-c8bf04a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22737%3A%20Vulnerability%20in%20Spring%20Spring%20Framework&amp;severity=medium&amp;id=69bc9033e32a4fbe5f0c418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22735-vulnerability-in-spring-spring-foun-8a91afe3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22735%3A%20Vulnerability%20in%20Spring%20Spring%20Foundation&amp;severity=low&amp;id=69bc8cafe32a4fbe5f0a920a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22733-cwe-288-authentication-bypass-using-e6f80fbd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22733%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=69bc8929e32a4fbe5f08fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32763-cwe-89-improper-neutralization-of-s-62f7ca75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32763%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69bc85a4e32a4fbe5f07b2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32697-cwe-639-authorization-bypass-throug-143009ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32697%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=69bc85a4e32a4fbe5f07b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29109-cwe-502-deserialization-of-untruste-fbc0e466</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29109%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=high&amp;id=69bc85a4e32a4fbe5f07b2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29108-cwe-200-exposure-of-sensitive-infor-95944982</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29108%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=69bc85a4e32a4fbe5f07b2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22732-vulnerability-in-spring-spring-secu-2c8fbdd8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22732%3A%20Vulnerability%20in%20VMware%20Spring%20Security&amp;severity=critical&amp;id=69bc8223e32a4fbe5f062176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32721-cwe-79-improper-neutralization-of-i-8871f1a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32721%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openwrt%20luci&amp;severity=high&amp;id=69bc8223e32a4fbe5f062179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22731-cwe-288-authentication-bypass-using-09055fef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22731%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=69bc7e9ce32a4fbe5f04d5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4342-cwe-20-improper-input-validation-in--e41533f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4342%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69bc708fe32a4fbe5ffd51a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32815-cwe-287-improper-authentication-in--a6c343f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32815%3A%20CWE-287%3A%20Improper%20Authentication%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bc708fe32a4fbe5ffd51b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32754-cwe-79-improper-neutralization-of-i-21923976</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32754%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69bc708fe32a4fbe5ffd51ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32753-cwe-80-improper-neutralization-of-s-a6d22d39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32753%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69bc708fe32a4fbe5ffd51a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32194-cwe-77-improper-neutralization-of-s-b13d0979</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32194%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Bing%20Images&amp;severity=critical&amp;id=69bca5a4e32a4fbe5f143342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32750-cwe-22-improper-limitation-of-a-pat-1494f6ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32750%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32751-cwe-79-improper-neutralization-of-i-e319aed5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32751%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32749-cwe-73-external-control-of-file-nam-faba7104</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32749%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bc698ee32a4fbe5ffae0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3229-cwe-122-heap-based-buffer-overflow-i-110c9450</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3229%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20wofSSL%20wolfSSL&amp;severity=low&amp;id=69bc698ee32a4fbe5ffae0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26137-cwe-918-server-side-request-forgery-45e722c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26137%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Exchange%20Online&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26136-cwe-77-improper-neutralization-of-s-5da576f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26136%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Copilot&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24299-cwe-77-improper-neutralization-of-s-66ef9f33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24299%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23659-cwe-200-exposure-of-sensitive-infor-8cb9cf5a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23659%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Data%20Factory&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26120-cwe-918-server-side-request-forgery-1d36a6ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26120%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Bing&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23658-cwe-522-insufficiently-protected-cr-3581b2ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23658%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20DevOps%3A%20msazure&amp;severity=high&amp;id=69bc698ce32a4fbe5ffadffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32191-cwe-78-improper-neutralization-of-s-97a170f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32191%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Bing%20Images&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26138-cwe-918-server-side-request-forgery-ebca77b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26138%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26139-cwe-918-server-side-request-forgery-d1f7bdbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26139%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32169-cwe-918-server-side-request-forgery-b6b36f7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32169%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Cloud%20Shell&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32747-cwe-22-improper-limitation-of-a-pat-54548a0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32747%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bc698ee32a4fbe5ffae09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32622-cwe-862-missing-authorization-in-da-a6bc8eb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32622%3A%20CWE-862%3A%20Missing%20Authorization%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bc6600e32a4fbe5ff98433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30924-cwe-942-permissive-cross-domain-pol-3c08973c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30924%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20autobrr%20qui&amp;severity=critical&amp;id=69bc6600e32a4fbe5ff9842f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4428-cwe-299-improper-check-for-certifica-6e7e17f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4428%3A%20CWE-299%20Improper%20check%20for%20certificate%20revocation%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69bc6600e32a4fbe5ff98437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30836-cwe-287-improper-authentication-in--146fb37a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30836%3A%20CWE-287%3A%20Improper%20Authentication%20in%20smallstep%20certificates&amp;severity=critical&amp;id=69bca5a4e32a4fbe5f14337a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3849-cwe-787-out-of-bounds-write-in-wolfs-5398bc77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3849%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20wolfSSL%20Inc.%20wolfSSL&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27953-cwe-915-improperly-controlled-modif-7873cd73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27953%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20ormar-orm%20ormar&amp;severity=high&amp;id=69bca5a4e32a4fbe5f143360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3549-cwe-122-heap-based-buffer-overflow-i-c0d00cf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3549%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20wofSSL%20wolfSSL&amp;severity=high&amp;id=69bc5b75e32a4fbe5ff4fefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3503-cwe-335-incorrect-usage-of-seeds-in--21219b3e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3503%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20wolfSSL%20Inc.%20wolfSSL%20(wolfCrypt)&amp;severity=medium&amp;id=69bc42d8e32a4fbe5fe8af3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-screenconnect-vulnerability-exposes-machi-7e07b842</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20ScreenConnect%20Vulnerability%20Exposes%20Machine%20Keys&amp;severity=critical&amp;id=69bc381ae32a4fbe5fe48fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26940-cwe-1284-improper-validation-of-spe-3f14668f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26940%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26939-cwe-862-missing-authorization-in-el-103dd2d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26939%3A%20CWE-862%20Missing%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26933-cwe-129-improper-validation-of-arra-1b9518eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26933%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26931-cwe-789-memory-allocation-with-exce-91f97db1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26931%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Elastic%20Metricbeat&amp;severity=medium&amp;id=69bc2dc4e32a4fbe5fdefa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3029-cwe-22-improper-limitation-of-a-path-729e317c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3029%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Artifex%20Software%20Inc.%20*PyMuPDF*%20PyMuPDF&amp;severity=high&amp;id=69bc1fb1e32a4fbe5fd8213b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32869-cwe-79-improper-neutralization-of-i-9b4095a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd82137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32868-cwe-79-improper-neutralization-of-i-19f98a35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd82133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32867-cwe-639-authorization-bypass-throug-7f856db1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32867%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd8212f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32866-cwe-79-improper-neutralization-of-i-54776fae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd8212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32865-cwe-200-exposure-of-sensitive-infor-6b65c58b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32865%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20OPEXUS%20eComplaint&amp;severity=critical&amp;id=69bc1fb1e32a4fbe5fd82127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-readied-cyberattack-capabilities-for-response-f9c5f962</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Readied%20Cyberattack%20Capabilities%20for%20Response%20Prior%20to%20Epic%20Fury&amp;severity=medium&amp;id=69bc1876e32a4fbe5fd0e091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edr-killers-explained-beyond-the-drivers-086c7370</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EDR%20killers%20explained%3A%20Beyond%20the%20drivers&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-tax-season-becomes-cyberattack-season-phishin-ea935d25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20tax%20season%20becomes%20cyberattack%20season%3A%20Phishing%20and%20malware%20campaigns%20using%20tax-related%20lures&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marquis-data-breach-affects-672000-individuals-63033f85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marquis%20Data%20Breach%20Affects%20672%2C000%20Individuals&amp;severity=medium&amp;id=69bc116ee32a4fbe5fcdf9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27043-cwe-434-unrestricted-upload-of-file-cba2eddd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27043%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=69bc11b6e32a4fbe5fce058b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32843-cwe-79-improper-neutralization-of-i-a49337fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32843%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20LinkItONEDevGroup%20Location%20Aware%20Sensor%20System%20(LASS)&amp;severity=medium&amp;id=69bc11b6e32a4fbe5fce058e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22557-vulnerability-in-ubiquiti-inc-unifi-b488b1a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22557%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Application&amp;severity=critical&amp;id=69bc0a99e32a4fbe5fcbe3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22558-vulnerability-in-ubiquiti-inc-unifi-ab721e24</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22558%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Application&amp;severity=high&amp;id=69bc0a99e32a4fbe5fcbe402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4427-improper-validation-of-array-index-i-ded74843</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4427&amp;severity=null&amp;id=69bc0a99e32a4fbe5fcbe40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-spotlight-shinyhunters-fast-tracks-saas-acc-d16b4341</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Spotlight%3A%20ShinyHunters%20Fast-Tracks%20SaaS%20Access%20with%20Subdomain%20Impersonation&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2369-integer-underflow-wrap-or-wraparound-1a25d932</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2369%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69bc0a99e32a4fbe5fcbe405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-firm-aura-discloses-data-breach-impacting-e11ac2db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Firm%20Aura%20Discloses%20Data%20Breach%20Impacting%20900%2C000%20Records&amp;severity=medium&amp;id=69bc06e1e32a4fbe5fca1251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4426-incorrect-bitwise-shift-of-integer-i-9edcaece</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4426%3A%20Incorrect%20Bitwise%20Shift%20of%20Integer%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69bc0726e32a4fbe5fca202e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4424-out-of-bounds-read-in-red-hat-red-ha-49c7e3de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4424%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69bc0726e32a4fbe5fca2029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71260-cwe-502-deserialization-of-untruste-21e3c5f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71260%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=high&amp;id=69bc0011e32a4fbe5fc6a5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71259-cwe-918-server-side-request-forgery-2c78bf47</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71259%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71258-cwe-918-server-side-request-forgery-6d09c567</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71258%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71257-cwe-306-missing-authentication-for--cfdd0e6a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71257%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-exploits-zimbra-vulnerability-against--747fd31c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Exploits%20Zimbra%20Vulnerability%20Against%20Ukraine&amp;severity=medium&amp;id=69bbfc57e32a4fbe5fc44ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3511-cwe-611-improper-restriction-of-xml--d3394379</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3511%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Slovensko.Digital%20Autogram&amp;severity=high&amp;id=69bc0011e32a4fbe5fc6a5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3658-cwe-89-improper-neutralization-of-sp-4ce634e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3658%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69bbdce4e32a4fbe5fb75e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-invitation-to-infection-how-silentconnect-del-4ebdc8bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Invitation%20to%20Infection%3A%20How%20SILENTCONNECT%20Delivers%20ScreenConnect&amp;severity=medium&amp;id=69bbfc73e32a4fbe5fc45109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-targets-users-of-cobra-docguard-softwa-1c4323bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Targets%20Users%20of%20Cobra%20DocGuard%20Software&amp;severity=medium&amp;id=69bbfc73e32a4fbe5fc45100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dto-malware-that-takes-notes-d4134ff7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DTO%20malware%20that%20takes%20notes&amp;severity=medium&amp;id=69bbffd8e32a4fbe5fc68b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14716-cwe-287-improper-authentication-in--a0439e26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14716%3A%20CWE-287%20Improper%20Authentication%20in%20Secomea%20GateManager&amp;severity=medium&amp;id=69bbd963e32a4fbe5fb5a576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-attacks-exploiting-recent-sharepoint-171abc90</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Attacks%20Exploiting%20Recent%20SharePoint%20Vulnerability&amp;severity=critical&amp;id=69bbc79ae32a4fbe5faeae91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-firewall-vulnerability-exploited-as-zero-day-1e82d87b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Firewall%20Vulnerability%20Exploited%20as%20Zero-Day%20in%20Interlock%20Ransomware%20Attacks&amp;severity=medium&amp;id=69bbbd0de32a4fbe5fa90d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21788-cwe-79-improper-neutralization-of-i-8231cd45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21788%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCLSoftware%20Connections&amp;severity=medium&amp;id=69bbbd50e32a4fbe5fa91b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27070-cwe-79-improper-neutralization-of-i-037c654a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27070%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=high&amp;id=69bbbd50e32a4fbe5fa91b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27068-cwe-79-improper-neutralization-of-i-6464da4e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27068%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Howard%20Website%20LLMs.txt&amp;severity=null&amp;id=69bbbd50e32a4fbe5fa91b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27067-cwe-434-unrestricted-upload-of-file-001b9b9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27067%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Syarif%20Mobile%20App%20Editor&amp;severity=null&amp;id=69bbb9bce32a4fbe5fa803c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27065-cwe-98-improper-control-of-filename-c54e685b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20BuilderPress&amp;severity=null&amp;id=69bbb9bce32a4fbe5fa803c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25445-cwe-502-deserialization-of-untruste-38c3b1fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25445%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Membership%20Software%20WishList%20Member%20X&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25443-cwe-862-missing-authorization-in-do-b2a17dc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25443%3A%20Missing%20Authorization%20in%20Dotstore%20Fraud%20Prevention%20For%20Woocommerce&amp;severity=null&amp;id=69bbb9bce32a4fbe5fa803ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25442-cwe-79-improper-neutralization-of-i-53e83f86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QantumThemes%20Kentha&amp;severity=null&amp;id=69bbb9bce32a4fbe5fa803b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25438-cwe-79-improper-neutralization-of-i-5ae4c863</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Gutenberg%20Blocks&amp;severity=null&amp;id=69bbb9bce32a4fbe5fa803b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68836-cwe-79-improper-neutralization-of-i-442407f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68836%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Markbeljaars%20Table%20of%20Contents%20Creator&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67618-cwe-79-improper-neutralization-of-i-392796e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ArtstudioWorks%20Brookside&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62043-cwe-79-improper-neutralization-of-i-1f545989</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62043%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20WPSight%20WPCasa&amp;severity=medium&amp;id=69bbb9bce32a4fbe5fa803ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60237-cwe-502-deserialization-of-untruste-02398e83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60237%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themeton%20Finag&amp;severity=critical&amp;id=69bbb638e32a4fbe5fa6afee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60233-cwe-502-deserialization-of-untruste-e4dbbeab</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60233%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themeton%20Zuut&amp;severity=critical&amp;id=69bbb638e32a4fbe5fa6afeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53222-cwe-79-improper-neutralization-of-i-30abad9d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53222%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Opt-In%20Builder&amp;severity=null&amp;id=69bbb638e32a4fbe5fa6afe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50001-cwe-79-improper-neutralization-of-i-e0727e1a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50001%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=null&amp;id=69bbb638e32a4fbe5fa6afe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32223-cwe-639-authorization-bypass-throug-f19f8659</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32223%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Themeum%20Tutor%20LMS&amp;severity=null&amp;id=69bbb638e32a4fbe5fa6afe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3475-cwe-862-missing-authorization-in-ins-dcfee312</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3475%3A%20CWE-862%20Missing%20Authorization%20in%20instantpopupbuilder%20Instant%20Popup%20Builder%20%E2%80%93%20Powerful%20Popup%20Maker%20for%20Opt-ins%2C%20Email%20Newsletters%20%26%20Lead%20Generation&amp;severity=medium&amp;id=69bbabafe32a4fbe5fa0f1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42210-cwe-79-improper-neutralization-of-i-959be701</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42210%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCLSoftware%20Unica%20Marketing%20Operations%20(Plan)&amp;severity=high&amp;id=69bbabafe32a4fbe5fa0f1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25312-missing-authorization-in-metagauss--6088bf26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25312%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=null&amp;id=69cd7410e6bfc5ba1def5044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25471-cwe-288-authentication-bypass-using-fb51444f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25471%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Themepaste%20Admin%20Safety%20Guard&amp;severity=null&amp;id=69bba828e32a4fbe5f9f514f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27091-cwe-862-missing-authorization-in-ui-51d16ecd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27091%3A%20Missing%20Authorization%20in%20UiPress%20UiPress%20lite&amp;severity=null&amp;id=69bba122e32a4fbe5f9bab6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2571-cwe-200-exposure-of-sensitive-inform-4433356b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2571%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4006-cwe-79-improper-neutralization-of-in-57adcf74</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4006%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Draft%20List&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4120-cwe-79-improper-neutralization-of-in-ace8a1f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Info%20Cards%20%E2%80%93%20Add%20Text%20and%20Media%20in%20Card%20Layouts&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4068-cwe-352-cross-site-request-forgery-c-e2deb8f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4068%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pattihis%20Add%20Custom%20Fields%20to%20Media&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27093-cwe-98-improper-control-of-filename-113afdb1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27093%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Tripgo&amp;severity=null&amp;id=69bba122e32a4fbe5f9bab6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indonesianfoods-spam-campaign-89-000-junk-packages-02add850</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IndonesianFoods%20Spam%20Campaign%3A%2089%20000%20junk%20packages%20in%20npm&amp;severity=medium&amp;id=69bb8fc7e32a4fbe5f94a83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27096-cwe-502-deserialization-of-untruste-c54c368b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27096%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BuddhaThemes%20ColorFolio%20-%20Freelance%20Designer%20WordPress%20Theme&amp;severity=high&amp;id=69bb8f8fe32a4fbe5f949e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27397-cwe-639-authorization-bypass-throug-fd1f474c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27397%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Really%20Simple%20Plugins%20B.V.%20Really%20Simple%20Security%20Pro&amp;severity=medium&amp;id=69bb8f8fe32a4fbe5f949e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27413-cwe-89-improper-neutralization-of-s-2b17e884</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27413%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozmoslabs%20Profile%20Builder%20Pro&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27540-cwe-434-unrestricted-upload-of-file-64999286</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27540%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Rymera%20Web%20Co%20Pty%20Ltd.%20Woocommerce%20Wholesale%20Lead%20Capture&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27542-cwe-266-incorrect-privilege-assignm-fdf0645e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27542%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Rymera%20Web%20Co%20Pty%20Ltd.%20Woocommerce%20Wholesale%20Lead%20Capture&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28044-cwe-79-improper-neutralization-of-i-4c6375df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Media%20WP%20Rocket&amp;severity=medium&amp;id=69bc0726e32a4fbe5fca2033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28070-cwe-862-missing-authorization-in-ti-af8d6a7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28070%3A%20CWE-862%20Missing%20Authorization%20in%20Tips%20and%20Tricks%20HQ%20WP%20eMember&amp;severity=medium&amp;id=69bc11b6e32a4fbe5fce0592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28073-cwe-79-improper-neutralization-of-i-1bc1903b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tips%20and%20Tricks%20HQ%20WP%20eMember&amp;severity=high&amp;id=69bc0726e32a4fbe5fca2036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1238-cwe-79-improper-neutralization-of-in-a993bd3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=69bb817ee32a4fbe5f8e86eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36051-cwe-538-insertion-of-sensitive-info-ab618e1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36051%3A%20CWE-538%20Insertion%20of%20sensitive%20information%20into%20Externally-Accessible%20file%20or%20directory%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13995-cwe-1286-improper-validation-of-syn-68a57170</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13995%3A%20CWE-1286%20Improper%20validation%20of%20syntactic%20correctness%20of%20input%20in%20IBM%20QRadar&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15051-cwe-79-improper-neutralization-of-i-ad185818</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15051%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1276-cwe-79-improper-neutralization-of-in-5c8d8570</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1276%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interesting-message-stored-in-cowrie-logs-wed-mar--eed73e9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interesting%20Message%20Stored%20in%20Cowrie%20Logs%2C%20(Wed%2C%20Mar%2018th)&amp;severity=low&amp;id=69bb4676771bdb1749e386d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-19-f789201b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-19&amp;severity=medium&amp;id=69bc8ffae32a4fbe5f0bc8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25667-na-4878ddad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25667%3A%20n%2Fa&amp;severity=high&amp;id=69bc42d8e32a4fbe5fe8af3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30694-na-109950b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30694%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67115-na-fd8f50f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67115%3A%20n%2Fa&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67114-na-cfe87a40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67114%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fcac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67113-na-f177756a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67113%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67112-na-167598ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67112%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30403-na-47aad45b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30403%3A%20n%2Fa&amp;severity=high&amp;id=69bc2336e32a4fbe5fd9a333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30404-na-dc0e3c16</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30404%3A%20n%2Fa&amp;severity=high&amp;id=69bc1fb1e32a4fbe5fd82123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-19-a4f74c0b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-19&amp;severity=medium&amp;id=69bc1bf7e32a4fbe5fd2fcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30402-na-cbd8e1be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30402%3A%20n%2Fa&amp;severity=critical&amp;id=69bc1527e32a4fbe5fcfae7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69720-na-186d574f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69720%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20GNU%20ncurses&amp;severity=high&amp;id=69bc11b6e32a4fbe5fce0585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30711-na-52d1a31a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30711%3A%20n%2Fa&amp;severity=high&amp;id=69bc0a99e32a4fbe5fcbe40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-19-1560c5bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-19&amp;severity=low&amp;id=69bb8f56e32a4fbe5f948e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32743-cwe-121-stack-based-buffer-overflow-abcf5c62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32743%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69bb389a771bdb1749cfdbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32255-cwe-918-server-side-request-forgery-b38e16f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32255%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kanbn%20kan&amp;severity=high&amp;id=69bb3516771bdb1749cf1e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32805-cwe-22-improper-limitation-of-a-pat-c9094e96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32805%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ctfer-io%20romeo&amp;severity=high&amp;id=69bb2a8a771bdb1749cbc625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32737-cwe-284-improper-access-control-in--390bca84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32737%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20romeo&amp;severity=high&amp;id=69bb2a8a771bdb1749cbc621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32735-cwe-20-improper-input-validation-in-02f3ed92</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32735%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Chrimle%20openapi-to-java-records-mustache-templates-parent&amp;severity=low&amp;id=69bb2706771bdb1749cae220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15031-cwe-22-improper-limitation-of-a-pat-b338a25f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15031%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69bb2706771bdb1749cae217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32736-cwe-862-missing-authorization-in-hy-bd2f85e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32736%3A%20CWE-862%3A%20Missing%20Authorization%20in%20HytaleModding%20wiki&amp;severity=medium&amp;id=69bb2706771bdb1749cae226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32731-cwe-22-improper-limitation-of-a-pat-efa014e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32731%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20apostrophecms%20import-export&amp;severity=critical&amp;id=69bb2706771bdb1749cae21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32730-cwe-287-improper-authentication-in--15c69b59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32730%3A%20CWE-287%3A%20Improper%20Authentication%20in%20apostrophecms%20apostrophe&amp;severity=high&amp;id=69bb2706771bdb1749cae21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33163-cwe-200-exposure-of-sensitive-infor-bf0b3710</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33163%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2382771bdb1749c98987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33042-cwe-287-improper-authentication-in--316c227c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33042%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2382771bdb1749c98982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32944-cwe-674-uncontrolled-recursion-in-p-89a0ff68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32944%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2382771bdb1749c9897d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32943-cwe-367-time-of-check-time-of-use-t-09ac7473</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32943%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69bb2001771bdb1749c89335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32886-cwe-1321-improperly-controlled-modi-1739e4ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32886%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2001771bdb1749c89330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32878-cwe-1321-improperly-controlled-modi-f8c4ad57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32878%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c8932b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32770-cwe-248-uncaught-exception-in-parse-654e3258</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32770%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c89326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32742-cwe-915-improperly-controlled-modif-464116df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32742%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c89321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32728-cwe-79-improper-neutralization-of-i-9f80ada8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32728%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2001771bdb1749c8931a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32723-cwe-362-concurrent-execution-using--576a2875</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32723%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20nyariv%20SandboxJS&amp;severity=medium&amp;id=69bb1c7a771bdb1749c7cd1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32722-cwe-79-improper-neutralization-of-i-088ed356</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bloomberg%20memray&amp;severity=low&amp;id=69bb1c7a771bdb1749c7cd16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32703-cwe-79-improper-neutralization-of-i-f2afc489</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32703%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69bb18f8771bdb1749c6e132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32698-cwe-89-improper-neutralization-of-s-a9afd70e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32698%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69bb18f8771bdb1749c6e12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32700-cwe-362-concurrent-execution-using--b102bd89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32700%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20heartcombo%20devise&amp;severity=medium&amp;id=69bb5534e32a4fbe5f378d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25873-cwe-502-deserialization-of-untruste-9e0b0036</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25873%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Beijing%20Academy%20of%20Artificial%20Intelligence%20(BAAI)%20OmniGen2-RL&amp;severity=critical&amp;id=69bb11f2771bdb1749c4fa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32638-cwe-639-authorization-bypass-throug-a9775966</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32638%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=low&amp;id=69bb11f2771bdb1749c4fa3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32321-cwe-89-improper-neutralization-of-s-5fdfa0b3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32321%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=69bb11f2771bdb1749c4fa39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31971-cwe-121-stack-based-buffer-overflow-442a3df6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31971%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31970-cwe-122-heap-based-buffer-overflow--d4a345e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31970%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31969-cwe-122-heap-based-buffer-overflow--a2fbcdcb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31969%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4396-cwe-295-improper-certificate-validat-50860779</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4396%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Devolutions%20Hub%20Reporting%20Service&amp;severity=high&amp;id=69bb03e2771bdb1749c142fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31968-cwe-121-stack-based-buffer-overflow-dd9916c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31968%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb0078771bdb1749c07554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-collapse-of-predictive-security-in-the-age-of--11cf38f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Collapse%20of%20Predictive%20Security%20in%20the%20Age%20of%20Machine-Speed%20Attacks&amp;severity=medium&amp;id=69bb0027771bdb1749c06483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31967-cwe-125-out-of-bounds-read-in-samto-87c20809</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31967%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69bb0079771bdb1749c0755e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31966-cwe-125-out-of-bounds-read-in-samto-83340784</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31966%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69bb0078771bdb1749c07558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31965-cwe-125-out-of-bounds-read-in-samto-74a2b192</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31965%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69baf5d2771bdb1749bce2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31964-cwe-476-null-pointer-dereference-in-af5a51cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31964%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20samtools%20htslib&amp;severity=medium&amp;id=69baf24a771bdb1749bb3c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31963-cwe-122-heap-based-buffer-overflow--76b649a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31963%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69baf24a771bdb1749bb3c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3479-vulnerability-in-python-software-fou-7c646350</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3479%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69baf24a771bdb1749bb3c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31962-cwe-122-heap-based-buffer-overflow--f8425e97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31962%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69baf5d2771bdb1749bce2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32634-cwe-346-origin-validation-error-in--30d65730</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32634%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20nicolargo%20glances&amp;severity=high&amp;id=69baf5d2771bdb1749bce2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32633-cwe-200-exposure-of-sensitive-infor-1b1c198b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32633%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=critical&amp;id=69baf5d2771bdb1749bce2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32632-cwe-346-origin-validation-error-in--5bc32449</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32632%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20nicolargo%20glances&amp;severity=medium&amp;id=69bae7bf771bdb1749b795a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26948-cwe-1258-exposure-of-sensitive-syst-080f0205</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26948%3A%20CWE-1258%3A%20Exposure%20of%20Sensitive%20System%20Information%20Due%20to%20Uncleared%20Debug%20Information%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller&amp;severity=medium&amp;id=69bae7bf771bdb1749b7959c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26945-cwe-114-process-control-in-dell-int-7305f643</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26945%3A%20CWE-114%3A%20Process%20Control%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller&amp;severity=medium&amp;id=69bae7bf771bdb1749b79599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32611-cwe-89-improper-neutralization-of-s-86e6c23f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32611%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bae0bb771bdb1749b563de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32610-cwe-942-permissive-cross-domain-pol-3fbd2cf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32610%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bad9b2771bdb1749b240a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1463-cwe-98-improper-control-of-filename--497abb3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1463%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20smub%20Photo%20Gallery%2C%20Sliders%2C%20Proofing%20and%20Themes%20%E2%80%93%20NextGEN%20Gallery&amp;severity=high&amp;id=69bad9b2771bdb1749b2409e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-network-of-20000-fake-shops-9f73b038</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20network%20of%2020%2C000%2B%20fake%20shops&amp;severity=medium&amp;id=69bad271771bdb1749aed170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24063-cwe-276-incorrect-default-permissio-bcb180bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24063%3A%20CWE-276%20Incorrect%20default%20permissions%20in%20Arturia%20Software%20Center&amp;severity=high&amp;id=69bac82e771bdb1749ab0136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darksword-ios-exploit-kit-used-by-state-sponsored--9559b6ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98DarkSword%E2%80%99%20iOS%20Exploit%20Kit%20Used%20by%20State-Sponsored%20Hackers%2C%20Spyware%20Vendors&amp;severity=medium&amp;id=69bac7e7771bdb1749aaf3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-snappyclient-9437d7d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20SnappyClient&amp;severity=medium&amp;id=69bad5f5771bdb1749b06b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2992-cwe-862-missing-authorization-in-iqo-61572437</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2992%3A%20CWE-862%20Missing%20Authorization%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=high&amp;id=69bac82e771bdb1749ab014c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2991-cwe-287-improper-authentication-in-i-f76202b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2991%3A%20CWE-287%20Improper%20Authentication%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=high&amp;id=69bac82e771bdb1749ab0146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3090-cwe-79-improper-neutralization-of-in-ac88dbf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3090%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=high&amp;id=69bac830771bdb1749ab0209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2512-cwe-79-improper-neutralization-of-in-bd7804ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Code%20Embed&amp;severity=medium&amp;id=69bac82e771bdb1749ab0139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2559-cwe-862-missing-authorization-in-saa-20f1bf38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2559%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=medium&amp;id=69bac82e771bdb1749ab0140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24062-cwe-306-missing-authentication-for--28feee6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24062%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Arturia%20Software%20Center&amp;severity=high&amp;id=69bac82e771bdb1749ab0133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33004-vulnerability-in-jenkins-project-je-d55a21b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33004%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20LoadNinja%20Plugin&amp;severity=medium&amp;id=69bac82e771bdb1749ab015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33003-vulnerability-in-jenkins-project-je-bd0a6730</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33003%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20LoadNinja%20Plugin&amp;severity=medium&amp;id=69bac82e771bdb1749ab0158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33002-vulnerability-in-jenkins-project-je-feb222ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33002%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=69bac82e771bdb1749ab0155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33001-vulnerability-in-jenkins-project-je-34f276c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33001%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=69bac82e771bdb1749ab0152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eu-sanctions-chinese-iranian-firms-supporting-hack-8cec962a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EU%20Sanctions%20Chinese%2C%20Iranian%20Firms%20Supporting%20Hacking%20Operations&amp;severity=medium&amp;id=69babd5c771bdb1749a7527b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32609-cwe-200-exposure-of-sensitive-infor-2b5dd630</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32609%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69baba10771bdb1749a5df7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadow-ai-risk-how-saas-apps-are-quietly-enabling--358e50ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shadow%20AI%20Risk%3A%20How%20SaaS%20Apps%20Are%20Quietly%20Enabling%20Massive%20Breaches&amp;severity=medium&amp;id=69bab2d0771bdb1749a27281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3278-cwe-79-improper-neutralization-of-in-b96fd83c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3278%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20ZENworks%20Service%20Desk&amp;severity=high&amp;id=69bab319771bdb1749a293df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-adminer-wed-mar-18th-1dc2dc26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20%22adminer%22%2C%20(Wed%2C%20Mar%2018th)&amp;severity=medium&amp;id=69baa842771bdb17499e7319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25449-cwe-502-deserialization-of-untruste-72874dad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25449%3A%20Deserialization%20of%20Untrusted%20Data%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=69baabfa771bdb1749a00bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32694-cwe-343-predictable-value-range-fro-eff99390</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32694%3A%20CWE-343%20Predictable%20value%20range%20from%20previous%20values%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69baabfa771bdb1749a00bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32693-cwe-863-incorrect-authorization-in--0e03cd1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32693%3A%20CWE-863%20Incorrect%20Authorization%20in%20Canonical%20Juju&amp;severity=high&amp;id=69baa17f771bdb17499a872d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-likely-used-malware-stolen-credent-ec3ce55e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Likely%20Used%20Malware-Stolen%20Credentials%20in%20Stryker%20Breach&amp;severity=medium&amp;id=69baa13b771bdb17499a51a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-debuts-background-security-improvements-with-43f317f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Debuts%20Background%20Security%20Improvements%20With%20Fresh%20WebKit%20Patches&amp;severity=medium&amp;id=69ba9db7771bdb17499562f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32692-cwe-285-improper-authorization-in-c-8bb2a045</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32692%3A%20CWE-285%20Improper%20Authorization%20in%20Canonical%20Juju&amp;severity=high&amp;id=69baa17f771bdb17499a872a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32691-cwe-708-incorrect-ownership-assignm-4976f2b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32691%3A%20CWE-708%20Incorrect%20ownership%20assignment%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69ba9df8771bdb1749975689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-uncover-a-horabot-campaign-and-detect-this--b14c9474</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20uncover%20a%20Horabot%20campaign%20and%20detect%20this%20malware&amp;severity=medium&amp;id=69bad5f5771bdb1749b06b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41258-cwe-284-improper-access-control-in--8af3e8ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41258%3A%20CWE-284%20Improper%20Access%20Control%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69baba10771bdb1749a5df8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12518-cwe-79-improper-neutralization-of-i-9e0f1fb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12518%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bee%20Content%20Design%20Befree%20SDK&amp;severity=medium&amp;id=69ba88d6771bdb17497e74c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casting-a-wider-net-scaling-threat-c5bddf9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casting%20a%20Wider%20Net%3A%20Scaling%20Threat&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-roundish-uncovering-an-apt28-roundcube-e-a41e6b6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Roundish%3A%20Uncovering%20an%20APT28%20Roundcube%20Exploitation%20Toolkit%20Targeting%20Ukraine&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-trader-campaign-coordinated-weaponisati-15cb4f31</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Trader%20campaign%20-%20Coordinated%20weaponisation%20of%20cryptocurrency%20trading%20bots%20by%20suspected%20DPRK%20malware%20operators&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-spear-phishing-and-kakaotalk-linke-3131ee7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20Spear-Phishing%20and%20KakaoTalk-Linked%20Threat%20Campaign&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-discovers-4th-whatsapp-view-once-bypass-c88d9741</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Discovers%204th%20WhatsApp%20View%20Once%20Bypass%3B%20Meta%20Won%E2%80%99t%20Patch&amp;severity=medium&amp;id=69ba851a771bdb17497b443d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/minecraft-dark-tale-of-scams-malware-extortion-8865f2fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Minecraft%3A%20Dark%20Tale%20of%20Scams%2C%20Malware%20%26%20Extortion&amp;severity=medium&amp;id=69ba8c21771bdb174982ab3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-pudgy-world-site-steals-crypto-passwords-2eef4b1a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Pudgy%20World%20site%20steals%20crypto%20passwords&amp;severity=medium&amp;id=69ba8195771bdb174978bc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32565-cwe-862-missing-authorization-in-we-3beba4f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32565%3A%20Missing%20Authorization%20in%20Ajay%20Contextual%20Related%20Posts&amp;severity=null&amp;id=69ba73bc771bdb174968082d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1217-cwe-862-missing-authorization-in-yoa-3986046b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1217%3A%20CWE-862%20Missing%20Authorization%20in%20yoast%20Yoast%20Duplicate%20Post&amp;severity=medium&amp;id=69ba73bc771bdb174968081d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22729-vulnerability-in-vmware-spring-ai-96356f4f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22729%3A%20Vulnerability%20in%20VMware%20Spring%20AI&amp;severity=high&amp;id=69ba5b20771bdb174957e258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22730-vulnerability-in-vmware-spring-ai-ddcf48d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22730%3A%20Vulnerability%20in%20VMware%20Spring%20AI&amp;severity=high&amp;id=69ba5b20771bdb174957e25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22323-cwe-352-cross-site-request-forgery--ebdd149c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22323%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22322-cwe-79-improper-neutralization-of-i-b70e5235</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22322%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22321-cwe-121-stack-based-buffer-overflow-a8c2437b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22321%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22320-cwe-121-stack-based-buffer-overflow-da50b6da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22320%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22319-cwe-121-stack-based-buffer-overflow-5a355e4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22319%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22318-cwe-121-stack-based-buffer-overflow-6c12e31f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22318%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22317-cwe-77-improper-neutralization-of-s-2550f32c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22317%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22316-cwe-121-stack-based-buffer-overflow-8a351159</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22316%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31703-cwe-305-authentication-bypass-by-pr-50832b2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31703%3A%20CWE-305%20Authentication%20bypass%20by%20primary%20weakness%20in%20dahua%20NVR2-4KS3&amp;severity=low&amp;id=69ba579c771bdb17495548e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3512-cwe-79-improper-neutralization-of-in-0c263e50</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alhadeff%20Writeprint%20Stylometry&amp;severity=medium&amp;id=69ba5091771bdb1749512c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32608-cwe-78-improper-neutralization-of-s-c704207d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32608%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ba4605771bdb17494b9a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15363-cwe-79-cross-site-scripting-xss-in--97d02cde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15363%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Get%20Use%20APIs&amp;severity=medium&amp;id=69ba4605771bdb17494b99fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32596-cwe-200-exposure-of-sensitive-infor-34b688da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32596%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bacf27771bdb1749ad833a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32606-cwe-522-insufficiently-protected-cr-e3768d6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32606%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20lxc%20incus-os&amp;severity=high&amp;id=69bacf27771bdb1749ad833f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32268-cwe-862-missing-authorization-in-cr-ce09a57b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32268%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craftcms%20azure-blob&amp;severity=high&amp;id=69bae0bb771bdb1749b563e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4366-server-side-request-forgery-ssrf-in--602d24ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4366%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69baebb5771bdb1749b8ee09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32266-cwe-200-exposure-of-sensitive-infor-d1e81751</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32266%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20google-cloud&amp;severity=low&amp;id=69baebb5771bdb1749b8edfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1926-cwe-862-missing-authorization-in-wps-f2df5907</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1926%3A%20CWE-862%20Missing%20Authorization%20in%20wpswings%20Subscriptions%20for%20WooCommerce&amp;severity=medium&amp;id=69baba10771bdb1749a5df96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1780-cwe-79-improper-neutralization-of-in-1f16c6d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silentwind%20%5BCR%5DPaid%20Link%20Manager&amp;severity=medium&amp;id=69baba10771bdb1749a5df91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32265-cwe-200-exposure-of-sensitive-infor-a82c09db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32265%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20aws-s3&amp;severity=medium&amp;id=69baabfa771bdb1749a00be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32256-cwe-835-loop-with-unreachable-exit--10f47bf0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32256%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Borewit%20music-metadata&amp;severity=high&amp;id=69bab319771bdb1749a293e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2575-improper-handling-of-highly-compress-5b72b4d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2575%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69bab319771bdb1749a293e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32254-cwe-284-improper-access-control-in--d7b8155f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32254%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20cloudnativelabs%20kube-router&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31938-cwe-79-improper-neutralization-of-i-32085433</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31938%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parallax%20jsPDF&amp;severity=critical&amp;id=69ba1bd6771bdb17491a1d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31898-cwe-116-improper-encoding-or-escapi-53f2e4d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31898%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31891-cwe-89-improper-neutralization-of-s-bc4a2f9a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31891%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cockpit-HQ%20Cockpit&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31865-cwe-1321-improperly-controlled-modi-a5a2e633</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31865%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20elysiajs%20elysia&amp;severity=medium&amp;id=69ba1bd6771bdb17491a1d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30884-cwe-639-authorization-bypass-throug-1e3f429f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30884%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mdjnelson%20moodle-mod_customcert&amp;severity=critical&amp;id=69ba1bd6771bdb17491a1d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4268-cwe-79-improper-neutralization-of-in-8e1b8afd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=69baba10771bdb1749a5dfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28499-cwe-79-improper-neutralization-of-i-dfb77ddf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vapor%20leaf-kit&amp;severity=medium&amp;id=69b9ffb5771bdb17490566fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2603-missing-authentication-for-critical--81951507</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2603%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69b9ffb5771bdb174905670b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2092-improper-validation-of-specified-typ-9fe41714</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2092%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69b9ffb5771bdb1749056703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4356-cross-site-scripting-in-itsourcecode-e19faf6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4356%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b9ffb5771bdb1749056714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28674-cwe-434-unrestricted-upload-of-file-bf2dede6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28674%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20danvei233%20xiaoheiFS&amp;severity=high&amp;id=69b9f8b0771bdb174900ac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28673-cwe-78-improper-neutralization-of-s-cbfc2cfc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28673%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20danvei233%20xiaoheiFS&amp;severity=high&amp;id=69b9f8b0771bdb174900ac96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29057-cwe-444-inconsistent-interpretation-3abf3602</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29057%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27980-cwe-400-uncontrolled-resource-consu-0da2877b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27980%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27979-cwe-770-allocation-of-resources-wit-c71ea8d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27979%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-18-7a4bc157</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-18&amp;severity=medium&amp;id=69bb3f6b771bdb1749d20ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26740-na-479e1e73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26740%3A%20n%2Fa&amp;severity=high&amp;id=69baf5d2771bdb1749bce2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58112-na-453304de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58112%3A%20n%2Fa&amp;severity=high&amp;id=69baf5d2771bdb1749bce2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29859-na-26756cb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29859%3A%20n%2Fa&amp;severity=critical&amp;id=69bae7bf771bdb1749b7959f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30704-na-88a06cf6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30704%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30703-na-b3658dbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30703%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30702-na-67ba7464</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30702%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30701-na-29b2ed2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30701%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30048-na-a1cd5795</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30048%3A%20n%2Fa&amp;severity=medium&amp;id=69bae0bb771bdb1749b563c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29858-na-6892327b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29858%3A%20n%2Fa&amp;severity=high&amp;id=69bae0bb771bdb1749b563c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29856-na-335a9813</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29856%3A%20n%2Fa&amp;severity=high&amp;id=69bae0bb771bdb1749b563c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30695-na-bc21bf4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30695%3A%20n%2Fa&amp;severity=medium&amp;id=69badd33771bdb1749b3b1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30345-na-468e728e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30345%3A%20n%2Fa&amp;severity=high&amp;id=69badd33771bdb1749b3b1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67830-na-7a5c8d00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67830%3A%20n%2Fa&amp;severity=critical&amp;id=69bad9b2771bdb1749b2409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67829-na-b7fdee79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67829%3A%20n%2Fa&amp;severity=critical&amp;id=69bacf27771bdb1749ad8337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55046-na-0b9434d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55046%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55045-na-8ce233db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55045%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad832e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55044-na-2ac840c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55044%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55043-na-d4d61f97</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55043%3A%20n%2Fa&amp;severity=medium&amp;id=69bacf27771bdb1749ad8325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55041-na-16a37252</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55041%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55040-na-ade2e734</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55040%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad831d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-18-7ef0fac3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-18&amp;severity=medium&amp;id=69ba6fff771bdb174964e9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-18-d1a9599d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-18&amp;severity=low&amp;id=69ba6fff771bdb174964e9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27978-cwe-352-cross-site-request-forgery--f467b97f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27978%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9ee21771bdb1749ef1e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27977-cwe-1385-missing-origin-validation--d3f0918a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27977%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20vercel%20next.js&amp;severity=low&amp;id=69b9ee21771bdb1749ef1e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27895-cwe-185-incorrect-regular-expressio-4f0c19f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27895%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=69b9ee21771bdb1749ef1e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27894-cwe-98-improper-control-of-filename-350674cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27894%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=high&amp;id=69b9ea9e771bdb1749ed199c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27459-cwe-120-buffer-copy-without-checkin-dc2b5449</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27459%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pyca%20pyopenssl&amp;severity=high&amp;id=69b9e71a771bdb1749eb4c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4355-cross-site-scripting-in-portabilis-i-bdf7c588</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4355%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4354-cross-site-scripting-in-trendnet-tew-1222775d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4354%3A%20Cross%20Site%20Scripting%20in%20TRENDnet%20TEW-824DRU&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27448-cwe-636-not-failing-securely-failin-92685d63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27448%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20pyca%20pyopenssl&amp;severity=low&amp;id=69b9e71a771bdb1749eb4c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26004-cwe-639-authorization-bypass-throug-a14a243d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26004%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getsentry%20sentry&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26001-cwe-89-improper-neutralization-of-s-74e88095</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26001%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=high&amp;id=69b9e397771bdb1749e6bc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25937-cwe-287-improper-authentication-in--e6802984</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25937%3A%20CWE-287%3A%20Improper%20Authentication%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69b9e397771bdb1749e6bc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22727-cwe-306-in-cloudfoundry-cloud-found-0a9b4ea6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22727%3A%20CWE-306%20in%20Cloudfoundry%20Cloud%20Foundry&amp;severity=high&amp;id=69baebb5771bdb1749b8ee31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21994-easily-exploitable-vulnerability-al-d3394a07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21994%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit.%20in%20Oracle%20Corporation%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit&amp;severity=critical&amp;id=69baba10771bdb1749a5df9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1264-cwe-306-missing-authentication-for-c-f24c86cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1264%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=high&amp;id=69baebb5771bdb1749b8ee24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14031-cwe-77-improper-neutralization-of-s-5ae99fea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14031%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=high&amp;id=69baebb5771bdb1749b8ee17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20643-processing-maliciously-crafted-web--a352aaea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20643%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20bypass%20Same%20Origin%20Policy%20in%20Apple%20Safari&amp;severity=medium&amp;id=69b9d90c771bdb1749de4be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3856-cwe-353-missing-support-for-integrit-0459f212</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3856%3A%20CWE-353%20Missing%20support%20for%20integrity%20check%20in%20IBM%20Db2%20Recovery%20Expert&amp;severity=medium&amp;id=69baebb5771bdb1749b8ee3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1376-cwe-770-allocation-of-resources-with-360a5243</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1376%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=69b9d201771bdb1749dc5690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1267-cwe-200-exposure-of-sensitive-inform-952ffa1e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1267%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69b9d201771bdb1749dc568d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14806-cwe-524-use-of-cache-containing-sen-0e309db2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14806%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69b9d201771bdb1749dc568a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32838-cwe-319-cleartext-transmission-of-s-bf676878</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32838%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=high&amp;id=69b9ce80771bdb1749db6340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32839-cwe-352-cross-site-request-forgery--bbbd3906</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32839%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=medium&amp;id=69b9ce80771bdb1749db6345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32840-cwe-79-improper-neutralization-of-i-ec50d642</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32840%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=medium&amp;id=69b9ce80771bdb1749db634a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32842-cwe-312-cleartext-storage-of-sensit-517159b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32842%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=high&amp;id=69b9ce80771bdb1749db6354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32841-cwe-1108-excessive-reliance-on-glob-a4b3dee3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32841%3A%20CWE-1108%20Excessive%20reliance%20on%20global%20variables%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=critical&amp;id=69b9ce80771bdb1749db634f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4349-improper-authentication-in-duende-id-d9d51608</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4349%3A%20Improper%20Authentication%20in%20Duende%20IdentityServer4&amp;severity=medium&amp;id=69b9ce80771bdb1749db6359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2809-cwe-190-integer-overflow-or-wraparou-22bef509</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2809%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Netskope%20Endpoint%20DLP%20Module%20for%20Netskope%20Client&amp;severity=medium&amp;id=69b9bceb771bdb1749d5ffa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4359-cwe-158-improper-neutralization-of-n-2d40f3cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4359%3A%20CWE-158%20Improper%20neutralization%20of%20null%20byte%20or%20NUL%20character%20in%20MongoDB%20Inc%20MongoDB%20C%20Driver&amp;severity=low&amp;id=69b9b25d771bdb1749d3370d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25936-cwe-89-improper-neutralization-of-s-c21df4bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25936%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69b9b25d771bdb1749d33705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32981-cwe-22-improper-limitation-of-a-pat-0fe01765</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32981%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ray-project%20Ray&amp;severity=high&amp;id=69b9b25d771bdb1749d33708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3563-cwe-1289-improper-validation-of-unsa-d870739f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3563%3A%20CWE-1289%20Improper%20validation%20of%20unsafe%20equivalence%20in%20input%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=69b9aedc771bdb1749d151fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4064-cwe-862-in-devolutions-powershell-un-f966a742</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4064%3A%20CWE-862%20in%20Devolutions%20PowerShell%20Universal&amp;severity=high&amp;id=69b9aedc771bdb1749d15200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4295-cwe-829-inclusion-of-functionality-f-7d79dd05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4295%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=69b9aedc771bdb1749d15203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32836-cwe-789-memory-allocation-with-exce-2ce301df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32836%3A%20CWE-789%20Memory%20allocation%20with%20excessive%20size%20value%20in%20mackron%20dr_libs%20dr_flac.h&amp;severity=medium&amp;id=69b9aedc771bdb1749d151f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32837-cwe-170-improper-null-termination-i-5eedb995</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32837%3A%20CWE-170%20Improper%20null%20termination%20in%20mackron%20miniaudio&amp;severity=medium&amp;id=69b9aedc771bdb1749d151f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4358-cwe-415-double-free-in-mongodb-inc-m-68de9898</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4358%3A%20CWE-415%20Double%20free%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=69b9aedc771bdb1749d15207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15584-cwe-190-integer-overflow-or-wraparo-8dfc12a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15584%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Netskope%20Endpoint%20DLP%20Module%20for%20Netskope%20Client&amp;severity=medium&amp;id=69b9aedc771bdb1749d151ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66342-cwe-843-access-of-resource-using-in-3d123839</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66342%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Canva%20Affinity&amp;severity=high&amp;id=69b9aee0771bdb1749d152d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62500-cwe-125-out-of-bounds-read-in-canva-15a9bf0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62500%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aedc771bdb1749d1520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61979-cwe-125-out-of-bounds-read-in-canva-485677cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61979%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aedc771bdb1749d1520a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64733-cwe-125-out-of-bounds-read-in-canva-1672385e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64733%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66000-cwe-125-out-of-bounds-read-in-canva-8e074563</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66000%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64301-cwe-787-out-of-bounds-write-in-canv-6642b6f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64301%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canva%20Affinity&amp;severity=high&amp;id=69b9aede771bdb1749d1527a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64776-cwe-125-out-of-bounds-read-in-canva-f769b895</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64776%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64735-cwe-125-out-of-bounds-read-in-canva-856c0bfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64735%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66633-cwe-125-out-of-bounds-read-in-canva-a1da5d6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66633%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58427-cwe-125-out-of-bounds-read-in-canva-9906ffa1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58427%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1526e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66617-cwe-125-out-of-bounds-read-in-canva-fd95fd2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66617%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47873-cwe-125-out-of-bounds-read-in-canva-f292661c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47873%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1526a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61952-cwe-125-out-of-bounds-read-in-canva-67336838</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61952%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66503-cwe-125-out-of-bounds-read-in-canva-0c616519</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66503%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66042-cwe-125-out-of-bounds-read-in-canva-69b1913a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66042%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65119-cwe-125-out-of-bounds-read-in-canva-509aa906</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65119%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62403-cwe-125-out-of-bounds-read-in-canva-ce41bab2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62403%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20726-cwe-125-out-of-bounds-read-in-canva-d616f23f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20726%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22882-cwe-125-out-of-bounds-read-in-canva-faf26082</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22882%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3207-cwe-306-missing-authentication-for-c-2e3ff132</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3207%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20TIBCO%20TIBCO%20BPM%20Enterprise&amp;severity=high&amp;id=69b9a0ca771bdb1749cca9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21570-rce-remote-code-execution-in-atlass-f80a393b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21570%3A%20RCE%20(Remote%20Code%20Execution)%20in%20Atlassian%20Bamboo%20Data%20Center&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25534-cwe-918-server-side-request-forgery-618622b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25534%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20io.spinnaker.clouddriver%20clouddriver-artifacts&amp;severity=critical&amp;id=69b992ba771bdb1749c53e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32298-cwe-78-improper-neutralization-of-s-126d8a3d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32298%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ANGEET%20ES3%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32297-cwe-306-missing-authentication-for--72cb42a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32297%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ANGEET%20ES3%20KVM&amp;severity=critical&amp;id=69b992ba771bdb1749c53e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32296-cwe-306-missing-authentication-for--85524cc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32296%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Sipeed%20NanoKVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32293-cwe-295-improper-certificate-valida-f28092a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32293%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20GL-iNet%20Comet%20KVM&amp;severity=low&amp;id=69b992ba771bdb1749c53e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32292-cwe-307-improper-restriction-of-exc-7d4b6f55</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32292%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20GL-iNet%20Comet%20KVM&amp;severity=critical&amp;id=69b992ba771bdb1749c53e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32291-cwe-306-missing-authentication-for--185e1423</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32291%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GL-iNet%20Comet%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32290-cwe-345-insufficient-verification-o-e7ed7343</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32290%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20GL-iNet%20Comet%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4319-sql-injection-in-code-projects-simpl-7d8938bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4319%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69b98f36771bdb1749c45e0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4148-cwe-416-use-after-free-in-mongodb-in-c2315488</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4148%3A%20CWE-416%20Use%20after%20free%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4147-cwe-457-use-of-uninitialized-variabl-286bf321</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4147%3A%20CWE-457%20Use%20of%20uninitialized%20variable%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-companies-house-exposed-details-of-millions-of--23f1964d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Companies%20House%20Exposed%20Details%20of%20Millions%20of%20Firms&amp;severity=medium&amp;id=69b97666771bdb1749bd173a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21886-cwe-285-improper-authorization-in-o-93d93ba5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21886%3A%20CWE-285%3A%20Improper%20Authorization%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23759-cwe-78-improper-neutralization-of-s-623ecb96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23759%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Perle%20Systems%20IOLAN%20STS&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-botnet-exposed-via-open-directory-15-node--998fdeec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Botnet%20Exposed%20via%20Open%20Directory%3A%2015-Node%20Relay%20Network%20and%20Active%20C2&amp;severity=medium&amp;id=69b9ab21771bdb1749cfc092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4318-buffer-overflow-in-utt-hiper-810g-ec790824</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4318%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69b96f91771bdb1749ba8fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3564-cwe-347-improper-verification-of-cry-bef713bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3564%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ConnectWise%20ScreenConnect&amp;severity=critical&amp;id=69b96f91771bdb1749ba8fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13406-cwe-476-null-pointer-dereference-in-1d82e42d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13406%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Softing%20smartLink%20SW-HT&amp;severity=medium&amp;id=69b9688b771bdb1749b843f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3888-cwe-268-privilege-chaining-eecd8b2c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3888%3A%20CWE-268%20Privilege%20chaining&amp;severity=high&amp;id=69b96182771bdb1749b5a60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4324-improper-neutralization-of-special-e-98fe071b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4324%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.17%20for%20RHEL%209&amp;severity=medium&amp;id=69b96182771bdb1749b5a60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/robotic-surgery-giant-intuitive-discloses-cyberatt-4fdbff55</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Robotic%20Surgery%20Giant%20Intuitive%20Discloses%20Cyberattack&amp;severity=medium&amp;id=69b95a46771bdb1749b2c340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/174-vulnerabilities-targeted-by-rondodox-botnet-bc9d0c8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=174%20Vulnerabilities%20Targeted%20by%20RondoDox%20Botnet&amp;severity=medium&amp;id=69b94c36771bdb1749acf1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62320-cwe-79-improper-neutralization-of-i-2b1a260a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62320%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCL%20Sametime&amp;severity=medium&amp;id=69b948e6771bdb1749ab9e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ipv4-mapped-ipv6-addresses-tue-mar-17th-d7adc16f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IPv4%20Mapped%20IPv6%20Addresses%2C%20(Tue%2C%20Mar%2017th)&amp;severity=medium&amp;id=69b93e26771bdb1749a50eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31966-cwe-20-improper-input-validation-in-92f29c54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31966%3A%20CWE-20%20Improper%20input%20validation%20in%20HCL%20Sametime&amp;severity=low&amp;id=69b93e6f771bdb1749a53234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4271-use-after-free-in-red-hat-red-hat-en-295694a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4271%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b93ad5771bdb1749a35140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hydra-saiga-covert-espionage-and-infiltration-of-c-bebbdde9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hydra%20Saiga%3A%20Covert%20Espionage%20and%20Infiltration%20of%20Critical%20Utilities&amp;severity=medium&amp;id=69b9371d771bdb17499ff040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-backdoor-targeting-ukrainian-entities-with-pos-73165a5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20backdoor%20targeting%20Ukrainian%20entities%20with%20possible%20links%20to%20Laundry%20Bear&amp;severity=medium&amp;id=69b93aa1771bdb1749a33193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-slopoly-start-to-ai-enhanced-ransomware-attacks-1c535291</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Slopoly%20start%20to%20AI-enhanced%20ransomware%20attacks&amp;severity=medium&amp;id=69b93aa1771bdb1749a3316b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-year-old-wing-ftp-vulnerability-as-expl-5d2349a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Year-Old%20Wing%20FTP%20Vulnerability%20as%20Exploited&amp;severity=medium&amp;id=69b9339a771bdb17499dd609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/endgame-harvesting-inside-acrstealers-modern-infra-956f280d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Endgame%20Harvesting%3A%20Inside%20ACRStealer&apos;s%20Modern%20Infrastructure&amp;severity=medium&amp;id=69b93aa1771bdb1749a33163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28563-cwe-732-incorrect-permission-assign-799b8643</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28563%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69b93751771bdb1749a0201b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26929-cwe-732-incorrect-permission-assign-fb1d7d04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26929%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69b93751771bdb1749a02016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30911-cwe-862-missing-authorization-in-ap-4e7a9ef7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30911%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69b93751771bdb1749a0201f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-apis-and-ddos-collide-in-new-era-of-coordinated-b3ee374b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%2C%20APIs%20and%20DDoS%20Collide%20in%20New%20Era%20of%20Coordinated%20Cyberattacks&amp;severity=medium&amp;id=69b93017771bdb17499c4735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28779-cwe-668-exposure-of-resource-to-wro-1025f596</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28779%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69b92cc9771bdb17499ac8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3633-improper-neutralization-of-crlf-sequ-26894e87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3633%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b95372771bdb1749b00bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3632-improper-validation-of-syntactic-cor-2a317359</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3632%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b95372771bdb1749b00bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3634-improper-neutralization-of-crlf-sequ-4222e252</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3634%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b99a3b771bdb1749cb0cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacked-sites-deliver-vidar-infostealer-to-windows--2b7c4a7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacked%20sites%20deliver%20Vidar%20infostealer%20to%20Windows%20users&amp;severity=medium&amp;id=69b91afd771bdb17498f40cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4208-cwe-639-in-typo3-extension-e-mail-mf-74236ea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4208%3A%20CWE-639%20in%20TYPO3%20Extension%20%22E-Mail%20MFA%20Provider%22&amp;severity=high&amp;id=69b917ad771bdb17498cd9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4202-cwe-862-in-typo3-extension-redirect--04ee806f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4202%3A%20CWE-862%20in%20TYPO3%20Extension%20%22Redirect%20Tabs%22&amp;severity=low&amp;id=69b917ad771bdb17498cd9da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1323-cwe-502-deserialization-of-untrusted-3f51a0d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1323%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20Extension%20%22Mailqueue%22&amp;severity=medium&amp;id=69b917ad771bdb17498cd9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32586-cwe-862-missing-authorization-in-pl-b291f66c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32586%3A%20Missing%20Authorization%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=null&amp;id=69b9142a771bdb17498971f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4312-cwe-306-missing-authentication-for-c-6cd3271e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4312%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20DrangSoft%20GCB%2FFCB%20Audit%20Software&amp;severity=critical&amp;id=69b90619771bdb17497bdc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3237-low-privilege-user-can-modify-global-3a86964d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3237%3A%20Low-Privilege%20User%20Can%20Modify%20Global%20Signing%20Key%20Settings%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=low&amp;id=69b8ff11771bdb174976d616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4258-improper-verification-of-cryptograph-603f7543</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4258%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sjcl&amp;severity=high&amp;id=69b8e675771bdb17495b6829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4308-server-side-request-forgery-in-frdel-ed62dd56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4308%3A%20Server-Side%20Request%20Forgery%20in%20frdel%20agent-zero&amp;severity=medium&amp;id=69b8d4e1771bdb17492801c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2373-cwe-862-missing-authorization-in-wpr-b6b21bec</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2373%3A%20CWE-862%20Missing%20Authorization%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69b8d4e1771bdb17492801b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4307-path-traversal-in-frdel-agent-zero-cefe85ed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4307%3A%20Path%20Traversal%20in%20frdel%20agent-zero&amp;severity=medium&amp;id=69b8d4e1771bdb17492801bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2579-cwe-89-improper-neutralization-of-sp-b6d47505</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2579%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpxpo%20WowStore%20%E2%80%93%20Store%20Builder%20%26%20Product%20Blocks%20for%20WooCommerce&amp;severity=high&amp;id=69b99a3b771bdb1749cb0ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4289-sql-injection-in-tiandy-easy7-integr-ae21908d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4289%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4288-sql-injection-in-tiandy-easy7-integr-06ab2258</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4288%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-17-e13fec01</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-17&amp;severity=medium&amp;id=69b9edea771bdb1749ee41fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-17-2ec304ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-17&amp;severity=medium&amp;id=69b9dfdb771bdb1749e025a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30707-na-821062bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30707%3A%20n%2Fa&amp;severity=high&amp;id=69b9aedc771bdb1749d151f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-17-ef279015</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-17&amp;severity=low&amp;id=69b94fb7771bdb1749ae96c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4287-sql-injection-in-tiandy-easy7-integr-93aff348</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4287%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b8991d771bdb17496c94d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4285-path-traversal-in-taoofagi-easegen-a-f6a4578b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4285%3A%20Path%20Traversal%20in%20taoofagi%20easegen-admin&amp;severity=medium&amp;id=69b895a6771bdb17496b6f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iocs-indicators-of-compromise-for-the-coruna-ios-i-77074cb0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IoCs%20(Indicators%20of%20Compromise)%20for%20the%20Coruna%20iOS%20iPhone%20Web%20Malware%20Client%20Side%20Exploits%20Serving%20Web%20Malware%20Exploitation%20Kit&amp;severity=medium&amp;id=69b8a719771bdb1749884ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4284-server-side-request-forgery-in-taoof-abfaecba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4284%3A%20Server-Side%20Request%20Forgery%20in%20taoofagi%20easegen-admin&amp;severity=medium&amp;id=69b88e92771bdb17496901d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4177-cwe-122-heap-based-buffer-overflow-i-afb533fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4177%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TODDR%20YAML%3A%3ASyck&amp;severity=critical&amp;id=69b96182771bdb1749b5a612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21991-a-dtrace-component-dtprobed-allows--d5010724</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21991%3A%20A%20DTrace%20component%2C%20dtprobed%2C%20allows%20arbitrary%20file%20creation%20through%20crafted%20USDT%20provider%20names.%20in%20Oracle%20Corporation%20Oracle%20Linux&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29522-cwe-22-improper-limitation-of-a-pat-de2651fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29522%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ZwickRoell%20GmbH%20%26%20Co.%20KG%20Test%20Data%20Management&amp;severity=high&amp;id=69b86eef771bdb1749567832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30882-cwe-79-improper-neutralization-of-i-1bcc0b7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30882%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69b860dd771bdb17494840b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30881-cwe-89-improper-neutralization-of-s-35a3f971</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30881%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69b859da771bdb17492b2d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30876-cwe-204-observable-response-discrep-5062e6d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30876%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69b859da771bdb17492b2d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30875-cwe-94-improper-control-of-generati-e8036721</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30875%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69b859da771bdb17492b2d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28430-cwe-89-improper-neutralization-of-s-36133b16</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28430%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69b859da771bdb17492b2d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29516-cwe-732-incorrect-permission-assign-d2fa831b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29516%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Buffalo%20TeraStation%20NAS%20TS5400R&amp;severity=medium&amp;id=69b859da771bdb17492b2d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32267-cwe-863-incorrect-authorization-in--65bf3522</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32267%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32264-cwe-470-use-of-externally-controlle-86230fad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32264%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32263-cwe-470-use-of-externally-controlle-1ff05d12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32263%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32262-cwe-22-improper-limitation-of-a-pat-86adf377</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32262%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69b859da771bdb17492b2da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32261-cwe-1336-improper-neutralization-of-a2ec3f2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32261%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20webhooks&amp;severity=high&amp;id=69b852cf771bdb174922885d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69196-cwe-863-incorrect-authorization-in--28778044</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69196%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20jlowin%20fastmcp&amp;severity=high&amp;id=69b84f4b771bdb17491f5f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4269-cwe-340-generation-of-predictable-nu-fb138d24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4269%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20AWS%20Bedrock%20AgentCore%20Starter%20Toolkit&amp;severity=high&amp;id=69b84a02771bdb1749186945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4224-vulnerability-in-python-software-fou-801a81ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4224%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69b84a02771bdb174918693d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3644-vulnerability-in-python-software-fou-f654c911</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3644%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69b84a02771bdb174918694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4254-stack-based-buffer-overflow-in-tenda-501e8b3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4254%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=critical&amp;id=69b84a02771bdb174918695c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23862-cwe-77-improper-neutralization-of-s-596c049d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23862%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20ThinOS%2010&amp;severity=high&amp;id=69b84a02771bdb1749186949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23489-cwe-20-improper-input-validation-in-9483a14f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23489%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pluginsGLPI%20fields&amp;severity=critical&amp;id=69b83bfc9d4df4518377219e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4253-os-command-injection-in-tenda-ac8-dda13ebe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4253%3A%20OS%20Command%20Injection%20in%20Tenda%20AC8&amp;severity=medium&amp;id=69b83bfc9d4df451837721b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29510-cwe-79-improper-neutralization-of-i-09a1b43e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29510%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29513-cwe-79-improper-neutralization-of-i-f7867d3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29513%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29520-cwe-79-improper-neutralization-of-i-b64081a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29520%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29521-cwe-352-cross-site-request-forgery--51f9174d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29521%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4252-reliance-on-ip-address-for-authentic-a9de4650</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4252%3A%20Reliance%20on%20IP%20Address%20for%20Authentication%20in%20Tenda%20AC8&amp;severity=critical&amp;id=69b834f39d4df4518372fd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4270-cwe-424-improper-protection-of-alter-47f937dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4270%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20AWS%20AWS%20API%20MCP%20Server&amp;severity=medium&amp;id=69b8316f9d4df4518370fea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4251-unprotected-storage-of-credentials-i-283d0ba5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4251%3A%20Unprotected%20Storage%20of%20Credentials%20in%20CityData%20CityChat&amp;severity=low&amp;id=69b8316f9d4df4518370fea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-ebs-hack-only-4-corporate-giants-still-sile-f1281a4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20EBS%20Hack%3A%20Only%204%20Corporate%20Giants%20Still%20Silent%20on%20Potential%20Impact&amp;severity=medium&amp;id=69b826b09d4df451836ba889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4250-unprotected-storage-of-credentials-i-16e58c2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4250%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Albert%20Sa%C4%9Fl%C4%B1k%20Hizmetleri%20ve%20Ticaret%20Albert%20Health&amp;severity=low&amp;id=69b84a02771bdb1749186969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4276-cwe-20-improper-input-validation-in--25cdf739</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4276%3A%20CWE-20%20Improper%20Input%20Validation%20in%20LibreChat%20RAG%20API&amp;severity=high&amp;id=69b8316f9d4df4518370feb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62319-cwe-89-improper-neutralization-of-s-e743fbfb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62319%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20HCL%20Unica&amp;severity=critical&amp;id=69b84a02771bdb1749186966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32587-cwe-862-missing-authorization-in-sa-b875c90e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32587%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20WP%20EasyPay&amp;severity=null&amp;id=69b82a679d4df451836d9f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covert-rat-phishing-campaign-78be4171</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=COVERT%20RAT%3A%20Phishing%20Campaign&amp;severity=medium&amp;id=69b84937771bdb1749174e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gopix-banking-trojan-targeting-brazilian-financial-e4520c26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoPix%20banking%20Trojan%20targeting%20Brazilian%20financial%20institutions&amp;severity=medium&amp;id=69b84bd2771bdb17491b7596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-ai-hallucinations-turn-fatal-how-to-stay-grou-32659fc4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20AI%20hallucinations%20turn%20fatal%3A%20how%20to%20stay%20grounded%20in%20reality%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b820159d4df4518368ef91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32583-cwe-862-missing-authorization-in-we-e193183a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32583%3A%20CWE-862%20Missing%20Authorization%20in%20Webnus%20Inc.%20Modern%20Events%20Calendar&amp;severity=medium&amp;id=69b84a02771bdb174918694c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16th-march-threat-intelligence-report-4bbef5d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69b8200e9d4df4518368ee85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4243-unprotected-storage-of-credentials-i-1cba1252</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4243%3A%20Unprotected%20Storage%20of%20Credentials%20in%20La%20Nacion%20App&amp;severity=low&amp;id=69b84a03771bdb1749186ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2274-cwe-79-improper-neutralization-of-in-84affa94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2274%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Forcepoint%20Web%20Security%20(On-Prem)&amp;severity=medium&amp;id=69b84a03771bdb1749186ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52642-vulnerability-in-hcl-aion-2fa9faee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52642%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52646-vulnerability-in-hcl-aion-de4338ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52646%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-firm-executive-targeted-in-sophisticated--5b7b2a9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Firm%20Executive%20Targeted%20in%20Sophisticated%20Phishing%20Attack&amp;severity=medium&amp;id=69b8189f9d4df451836392af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52645-vulnerability-in-hcl-aion-65575b34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52645%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52649-vulnerability-in-hcl-aion-0c892b9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52649%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b818e49d4df4518363a2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4242-unprotected-storage-of-credentials-i-626d3672</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4242%3A%20Unprotected%20Storage%20of%20Credentials%20in%20BabyChakra%20Pregnancy%20%26%20Parenting%20App&amp;severity=low&amp;id=69b818e49d4df4518363a2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52644-vulnerability-in-hcl-aion-d7b212a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52644%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b818e49d4df4518363a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52643-vulnerability-in-hcl-aion-ed82191c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52643%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b818e49d4df4518363a2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52636-vulnerability-in-hcl-aion-eb617ebe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52636%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b818e49d4df4518363a2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25369-cwe-79-improper-neutralization-of-i-14cd5f30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25369%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX&amp;severity=null&amp;id=69b818e49d4df4518363a2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4241-sql-injection-in-itsourcecode-colleg-d3050c33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4241%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69b818e49d4df4518363a30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proxy-url-scans-with-ip-addresses-mon-mar-16th-c643cc2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2Fproxy%2F%20URL%20scans%20with%20IP%20addresses%2C%20(Mon%2C%20Mar%2016th)&amp;severity=medium&amp;id=69b80a8f9d4df451835f7661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4240-denial-of-service-in-open5gs-6a8519b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4240%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69b818e49d4df4518363a301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10461-cwe-20-improper-input-validation-in-97b28249</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10461%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Softing%20smartLink%20SW-HT&amp;severity=medium&amp;id=69b8073f9d4df451835e8b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10685-cwe-122-heap-based-buffer-overflow--75669fe2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10685%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Softing%20smartLink%20SW-PN&amp;severity=high&amp;id=69b8073f9d4df451835e8b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4239-improperly-controlled-modification-o-027708a7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4239%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20Lagom%20WHMCS%20Template&amp;severity=medium&amp;id=69b8073f9d4df451835e8b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52648-vulnerability-in-hcl-aion-ac473d72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52648%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b800489d4df451835c3dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-hit-asian-militaries-in-patie-149f8505</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Hit%20Asian%20Militaries%20in%20Patient%20Espionage%20Operation&amp;severity=medium&amp;id=69b800039d4df451835c3061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52638-vulnerability-in-hcl-aion-8685d6f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52638%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b800489d4df451835c3deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4238-sql-injection-in-itsourcecode-colleg-f8d11167</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4238%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69b7f94a9d4df45183593df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-targeting-vpn-users-in-new-credential-3b4bb8bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Targeting%20VPN%20Users%20in%20New%20Credential%20Theft%20Campaign&amp;severity=medium&amp;id=69b7f8fb9d4df45183592dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52637-vulnerability-in-hcl-aion-8b430d7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52637%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b7f94a9d4df45183593df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4237-sql-injection-in-itsourcecode-free-h-77ceda32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4237%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69b7f5ac9d4df45183583c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/forcememo-python-repositories-compromised-in-glass-95b214ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ForceMemo%3A%20Python%20Repositories%20Compromised%20in%20GlassWorm%20Aftermath&amp;severity=medium&amp;id=69b7f1f59d4df45183566d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3476-cwe-94-improper-control-of-generatio-12313441</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3476%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20Desktop&amp;severity=high&amp;id=69b7f2399d4df4518356864e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4236-sql-injection-in-itsourcecode-online-f9dbc71d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4236%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69b84a03771bdb1749186ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4235-sql-injection-in-itsourcecode-online-b710fa80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4235%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69b7e79a9d4df45183527dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/web-shells-tunnels-and-ransomware-dissecting-a-war-60be0a41</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Web%20Shells%2C%20Tunnels%2C%20and%20Ransomware%3A%20Dissecting%20a%20Warlock%20Attack&amp;severity=medium&amp;id=69b8529a771bdb1749224218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maas-vipkeylogger-campaign-62b90e30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MAAS%20VIP_Keylogger%20Campaign&amp;severity=medium&amp;id=69b7e3e19d4df45183505ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15554-cwe-525-use-of-web-browser-cache-co-e8f7211f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15554%3A%20CWE-525%20Use%20of%20web%20browser%20cache%20containing%20sensitive%20information%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15553-cwe-613-insufficient-session-expira-9c9413c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15553%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15552-cwe-613-insufficient-session-expira-6d752576</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15552%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4234-sql-injection-in-sscms-de760972</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4234%3A%20SQL%20Injection%20in%20SSCMS&amp;severity=medium&amp;id=69b7e4169d4df451835079cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-a-new-click-fix-variant-2fbb75b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20a%20new%20Click-fix%20variant&amp;severity=medium&amp;id=69b7e3e19d4df45183505ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-camelclone-multi-region-espionage-campai-046fce4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20CamelClone%3A%20Multi-Region%20Espionage%20Campaign%20Targets%20Government%20and%20Defense%20Entities%20Amidst%20Regional%20Tensions&amp;severity=medium&amp;id=69b7e05e9d4df451834e770f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-threat-actor-targets-persian-gulf-regi-90bc51f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-nexus%20Threat%20Actor%20Targets%20Persian%20Gulf%20Region%20With%20PlugX&amp;severity=medium&amp;id=69b7e05e9d4df451834e7746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-2561-uses-seo-poisoning-to-distribute-fake-v-c8e82c49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-2561%20uses%20SEO%20poisoning%20to%20distribute%20fake%20VPN%20clients%20for%20credential%20theft&amp;severity=medium&amp;id=69b7e05e9d4df451834e7765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handala-hack-unveiling-groups-modus-operandi-18c33a2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Handala%20Hack%22%20-%20Unveiling%20Group&apos;s%20Modus%20Operandi&amp;severity=medium&amp;id=69b7dcda9d4df451834d1c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishers-hide-scam-links-with-ipv6-trick-in-free-t-c357d956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishers%20hide%20scam%20links%20with%20IPv6%20trick%20in%20&apos;free%20toothbrush&apos;%20emails&amp;severity=medium&amp;id=69b7dcda9d4df451834d1c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3024-cwe-79-improper-neutralization-of-in-84fc643b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3024%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=medium&amp;id=69b8073f9d4df451835e8b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3023-cwe-943-improper-neutralization-of-s-0133fd93</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3023%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=medium&amp;id=69b8073f9d4df451835e8b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3022-cwe-943-improper-neutralization-of-s-a0c7d77b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3022%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3021-cwe-943-improper-neutralization-of-s-fb751ce2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3021%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3020-cwe-639-authorization-bypass-through-ef6ac061</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3020%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4233-path-traversal-in-thingsgateway-9caba6cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4233%3A%20Path%20Traversal%20in%20ThingsGateway&amp;severity=medium&amp;id=69b8316f9d4df4518370feac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3111-cwe-284-improper-access-control-in-e-4e65eb21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3111%3A%20CWE-284%20Improper%20Access%20Control%20in%20Educativa%20Campus&amp;severity=medium&amp;id=69b84a05771bdb1749186bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3110-cwe-284-improper-access-control-in-e-26eaccd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3110%3A%20CWE-284%20Improper%20Access%20Control%20in%20Educativa%20Campus&amp;severity=high&amp;id=69b84a03771bdb1749186af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4232-sql-injection-in-tiandy-integrated-m-54116443</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4232%3A%20SQL%20Injection%20in%20Tiandy%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7d6069d4df45183495a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11500-cwe-261-weak-encoding-for-password--70649efc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11500%3A%20CWE-261%20Weak%20Encoding%20for%20Password%20in%20tinycontrol%20Lan%20Kontroler%20v3.5&amp;severity=high&amp;id=69b7d6069d4df45183495a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15587-cwe-425-direct-request-forced-brows-8a07be74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15587%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20tinycontrol%20Lan%20Kontroler%20v3.5&amp;severity=high&amp;id=69b7d6069d4df45183495a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4231-server-side-request-forgery-in-vanna-0c884c83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4231%3A%20Server-Side%20Request%20Forgery%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7d6069d4df45183495a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-attempt-reported-at-polands-nuclear-resear-c106b6db</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Attempt%20Reported%20at%20Poland%E2%80%99s%20Nuclear%20Research%20Center&amp;severity=medium&amp;id=69b7c7c39d4df451833df70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4230-sql-injection-in-vanna-ai-vanna-d326f237</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4230%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7c4789d4df451833a5b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4229-sql-injection-in-vanna-ai-vanna-f50509b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4229%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7c4789d4df451833a5b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4228-command-injection-in-lb-link-bl-wr90-96738fe4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4228%3A%20Command%20Injection%20in%20LB-LINK%20BL-WR9000&amp;severity=medium&amp;id=69b7bd6a9d4df45183343b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4227-buffer-overflow-in-lb-link-bl-wr9000-4695df8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4227%3A%20Buffer%20Overflow%20in%20LB-LINK%20BL-WR9000&amp;severity=high&amp;id=69b7bd6a9d4df45183343b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4226-stack-based-buffer-overflow-in-lb-li-1aa90b19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4226%3A%20Stack-based%20Buffer%20Overflow%20in%20LB-LINK%20BL-WR9000&amp;severity=high&amp;id=69b7c1479d4df451833752d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4225-cross-site-scripting-in-cms-made-sim-fb8a5324</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4225%3A%20Cross%20Site%20Scripting%20in%20CMS%20Made%20Simple&amp;severity=medium&amp;id=69b7c1479d4df451833752cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4255-cwe-829-inclusion-of-functionality-f-64ab002d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4255%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20thermalright%20TR-VISION%20HOME&amp;severity=high&amp;id=69b7af5b9d4df4518329b048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32778-cwe-476-null-pointer-dereference-in-bd1cfa53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32778%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69b7af5b9d4df4518329b03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4223-sql-injection-in-itsourcecode-payrol-f7fd3546</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4223%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69b7af5b9d4df4518329b041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32777-cwe-835-loop-with-unreachable-exit--d8732131</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32777%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=69b7af5b9d4df4518329b037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32776-cwe-476-null-pointer-dereference-in-7a031374</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32776%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=69b7af5b9d4df4518329b033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25083-missing-authorization-in-growi-inc--8bfd0964</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25083%3A%20Missing%20authorization%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=high&amp;id=69b7af5b9d4df4518329b02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4222-path-traversal-in-sscms-6eb6cec9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4222%3A%20Path%20Traversal%20in%20SSCMS&amp;severity=medium&amp;id=69b7a8549d4df4518325f337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4221-unrestricted-upload-in-tiandy-easy7--730344dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4221%3A%20Unrestricted%20Upload%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7a8549d4df4518325f331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32775-cwe-191-integer-underflow-wrap-or-w-3ea2e343</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32775%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20libexif%20project%20libexif&amp;severity=high&amp;id=69dbe51682d89c981fa14167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4220-unrestricted-upload-in-technologies--184c105f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4220%3A%20Unrestricted%20Upload%20in%20Technologies%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7a8549d4df4518325f32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4219-hard-coded-credentials-in-index-conf-0c602181</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4219%3A%20Hard-coded%20Credentials%20in%20INDEX%20Conferences%20%26%20Exhibitions%20Organization%20YWF%20BPOF%20APGCS%20App&amp;severity=medium&amp;id=69b7a8549d4df4518325f325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4218-information-disclosure-in-myaedes-ap-e4a157bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4218%3A%20Information%20Disclosure%20in%20myAEDES%20App&amp;severity=low&amp;id=69b79ecc9d4df451831f7147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31386-improper-neutralization-of-special--9aa4ef0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31386%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LiteSpeed%20Technologies%20OpenLiteSpeed&amp;severity=high&amp;id=69b796c19d4df451831b8462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4217-key-management-error-in-xreal-nebula-2089e6f5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4217%3A%20Unprotected%20Storage%20of%20Credentials%20in%20XREAL%20Nebula%20App&amp;severity=low&amp;id=69b796c19d4df451831b846d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4216-hard-coded-credentials-in-i-sens-sma-30d479c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4216%3A%20Hard-coded%20Credentials%20in%20i-SENS%20SmartLog%20App&amp;severity=medium&amp;id=69b796c19d4df451831b8467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21005-cwe-22-improper-limitation-of-a-pat-3e867367</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21005%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(%26%2339%3BPath%20Traversal%26%2339%3B)%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21004-cwe-287-improper-authentication-in--b29f3ccc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21004%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c359d4df4518315ee9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4215-server-side-request-forgery-in-flowc-146eba46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4215%3A%20Server-Side%20Request%20Forgery%20in%20FlowCI%20flow-core-x&amp;severity=medium&amp;id=69b78c359d4df4518315eeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21002-cwe-347-improper-verification-of-cr-3a79b2e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21002%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69b78c359d4df4518315ee98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4214-stack-based-buffer-overflow-in-d-lin-5afe7392</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4214%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b78c359d4df4518315eeaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21001-cwe-35-path-traversal-in-samsung-mo-756e512d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21001%3A%20CWE-35%3A%20Path%20Traversal%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69b78c359d4df4518315ee95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21000-cwe-284-improper-access-control-in--8c6fbad1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21000%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=high&amp;id=69b78c359d4df4518315ee92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20999-cwe-294-authentication-bypass-by-re-a52b7f65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20999%3A%20CWE-294%20-%20Authentication%20Bypass%20by%20Replay%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20998-cwe-287-improper-authentication-in--725ff812</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20998%3A%20CWE-287%20-%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20997-cwe-347-improper-verification-of-cr-1bb3868e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20997%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c339d4df4518315ee12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20996-cwe-327-use-of-a-broken-or-risky-cr-af2f35f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20996%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c339d4df4518315ee0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20995-cwe-200-exposure-of-sensitive-infor-f4b85c12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20995%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c339d4df4518315ee0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20994-cwe-601-url-redirection-to-untruste-392c7409</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20994%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(%26%2339%3BOpen%20Redirect%26%2339%3B)%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=high&amp;id=69b78c339d4df4518315ee09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20993-cwe-926-improper-export-of-android--cdf26a4d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20993%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Assistant&amp;severity=medium&amp;id=69b78c339d4df4518315ee06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20992-cwe-285-improper-authorization-in-s-28f63449</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20992%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315ee03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20991-cwe-269-improper-privilege-manageme-789aa04d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20991%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315ee00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20990-cwe-926-improper-export-of-android--139f9df1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20990%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69b78c339d4df4518315edfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20989-cwe-347-improper-verification-of-cr-0138dde6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20989%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315edfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20988-cwe-925-improper-verification-of-in-ab79f070</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20988%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315edf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4213-stack-based-buffer-overflow-in-d-lin-87c01e3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4213%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b78c359d4df4518315eea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4212-stack-based-buffer-overflow-in-d-lin-423aef88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4212%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b77e229d4df45183f020d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4211-stack-based-buffer-overflow-in-d-lin-0a1f49a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4211%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b77e229d4df45183f020cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4210-command-injection-in-d-link-dns-120-af98b267</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4210%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4209-command-injection-in-d-link-dns-120-7d0fc20f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4209%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4207-command-injection-in-d-link-dns-120-f37b1a52</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4207%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4206-command-injection-in-d-link-dns-120-65477eea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4206%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b76c8f9d4df45183da5ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-march-16th-2026-httpsiscs-72e69648</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20March%2016th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9850%2C%20(Mon%2C%20Mar%2016th)&amp;severity=medium&amp;id=69b765529d4df45183d1e2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4205-command-injection-in-d-link-dns-120-1782b85d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4205%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4204-command-injection-in-d-link-dns-120-ebd2c6f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4204%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4203-command-injection-in-d-link-dns-120-d99c6b55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4203%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4201-unrestricted-upload-in-glowxq-glowxq-224c8b75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4201%3A%20Unrestricted%20Upload%20in%20glowxq%20glowxq-oj&amp;severity=medium&amp;id=69b757769d4df45183ae649a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4200-server-side-request-forgery-in-glowx-4505f74b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4200%3A%20Server-Side%20Request%20Forgery%20in%20glowxq%20glowxq-oj&amp;severity=medium&amp;id=69b7c1479d4df451833752e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4199-command-injection-in-bazinga012-mcpc-577e7fdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4199%3A%20Command%20Injection%20in%20bazinga012%20mcp_code_executor&amp;severity=medium&amp;id=69b7c1479d4df451833752d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-16-2b9e1ab1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-16&amp;severity=medium&amp;id=69b89c6a771bdb17496e1b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69902-na-285ff70a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69902%3A%20n%2Fa&amp;severity=critical&amp;id=69b86eef771bdb174956782c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50881-na-5ae0b55c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50881%3A%20n%2Fa&amp;severity=high&amp;id=69b867e7771bdb17494e9bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68971-na-bb07e2a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68971%3A%20n%2Fa&amp;severity=medium&amp;id=69b8648d771bdb17494b0d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69693-na-1c752da6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69693%3A%20n%2Fa&amp;severity=medium&amp;id=69b859da771bdb17492b2d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69809-na-431ba23d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69809%3A%20n%2Fa&amp;severity=critical&amp;id=69b852cf771bdb1749228859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69808-na-ee6b7db8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69808%3A%20n%2Fa&amp;severity=critical&amp;id=69b852cf771bdb1749228855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69727-na-a25b3bc5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69727%3A%20n%2Fa&amp;severity=medium&amp;id=69b84f4b771bdb17491f5f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57543-na-c23cf64e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57543%3A%20n%2Fa&amp;severity=medium&amp;id=69b84a02771bdb1749186963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69768-na-d4afeab5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69768%3A%20n%2Fa&amp;severity=high&amp;id=69b84a02771bdb1749186957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66687-na-bffe2a7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66687%3A%20n%2Fa&amp;severity=high&amp;id=69b83bfc9d4df4518377219a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65734-na-11ff5127</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65734%3A%20n%2Fa&amp;severity=medium&amp;id=69b834f39d4df4518372fd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30405-na-47c1317e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30405%3A%20n%2Fa&amp;severity=high&amp;id=69b8316f9d4df4518370fe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-16-a2ad58b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-16&amp;severity=medium&amp;id=69b831389d4df451837030f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69784-na-7ea76be7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69784%3A%20n%2Fa&amp;severity=high&amp;id=69b82a679d4df451836d9f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69783-na-b19d29eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69783%3A%20n%2Fa&amp;severity=high&amp;id=69b82a679d4df451836d9f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-16-ee2f10f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-16&amp;severity=low&amp;id=69b7a1159d4df4518320e4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4198-command-injection-in-hypermodel-labs-54b14dd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4198%3A%20Command%20Injection%20in%20hypermodel-labs%20mcp-server-auto-commit&amp;severity=medium&amp;id=69b745e29d4df451838ed4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4197-command-injection-in-d-link-dns-120-3ef2e999</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4197%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b745e29d4df451838ed4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4196-command-injection-in-d-link-dns-120-f9eb82fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4196%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b745e29d4df451838ed4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4195-command-injection-in-d-link-dns-120-0f05e6b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4195%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b73b569d4df45183888209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4194-improper-access-controls-in-d-link-d-75e423f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4194%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b73b569d4df45183888202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4193-improper-access-controls-in-d-link-d-86e0555a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4193%3A%20Improper%20Access%20Controls%20in%20D-Link%20DIR-823G&amp;severity=medium&amp;id=69b73b569d4df451838881f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4192-command-injection-in-avinashbole-qui-2518a2fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4192%3A%20Command%20Injection%20in%20AvinashBole%20quip-mcp-server&amp;severity=medium&amp;id=69b71bb39d4df451836c6ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4191-unrestricted-upload-in-jawherkl-node-89ece630</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4191%3A%20Unrestricted%20Upload%20in%20JawherKl%20node-api-postgres&amp;severity=medium&amp;id=69b7c1479d4df451833752e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4190-sql-injection-in-jawherkl-node-api-p-a54029ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4190%3A%20SQL%20Injection%20in%20JawherKl%20node-api-postgres&amp;severity=medium&amp;id=69b70a219d4df451835b4b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4189-sql-injection-in-phpipam-ff9d192d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4189%3A%20SQL%20Injection%20in%20phpipam&amp;severity=medium&amp;id=69b70a219d4df451835b4b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4188-stack-based-buffer-overflow-in-d-lin-4643e6f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4188%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=69b70a219d4df451835b4b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4187-missing-authentication-in-tiandy-eas-d0083b25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4187%3A%20Missing%20Authentication%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7069a9d4df451835804bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4186-cross-site-scripting-in-ueditor-9903830f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4186%3A%20Cross%20Site%20Scripting%20in%20UEditor&amp;severity=medium&amp;id=69b7069a9d4df451835804b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4185-stack-based-buffer-overflow-in-gpac-3793df76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4185%3A%20Stack-based%20Buffer%20Overflow%20in%20GPAC&amp;severity=medium&amp;id=69b7c1479d4df451833752ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4184-stack-based-buffer-overflow-in-d-lin-8b4d54d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4184%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b6f1829d4df45183499980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4183-stack-based-buffer-overflow-in-d-lin-2982ced2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4183%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df451833752f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4182-stack-based-buffer-overflow-in-d-lin-4b5e9537</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4182%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df45183375304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4181-stack-based-buffer-overflow-in-d-lin-ddee0ed4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4181%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df451833752fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28522-null-pointer-dereference-in-tuya-ar-2a93d27c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28522%3A%20NULL%20Pointer%20Dereference%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df45183375333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28519-heap-based-buffer-overflow-in-tuya--81bb398e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28519%3A%20Heap-based%20Buffer%20Overflow%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1479d4df4518337530b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28521-out-of-bounds-read-in-tuya-arduino--e207a043</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28521%3A%20Out-of-bounds%20Read%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df4518337532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28520-off-by-one-error-in-tuya-arduino-tu-f1d3cb47</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28520%3A%20Off-by-one%20Error%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df45183375329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4180-improper-access-controls-in-d-link-d-2aa3ab3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4180%3A%20Improper%20Access%20Controls%20in%20D-Link%20DIR-816&amp;severity=medium&amp;id=69b7c1499d4df45183375338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4175-cross-site-scripting-in-aureus-erp-ce517057</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4175%3A%20Cross%20Site%20Scripting%20in%20Aureus%20ERP&amp;severity=medium&amp;id=69b68f139d4df451830604a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4174-resource-consumption-in-radare2-2650e8ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4174%3A%20Resource%20Consumption%20in%20Radare2&amp;severity=medium&amp;id=69b68f139d4df4518306049a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/loblaw-data-breach-impacts-customer-information-81750628</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Loblaw%20Data%20Breach%20Impacts%20Customer%20Information&amp;severity=medium&amp;id=69b684539d4df45183fde128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14287-cwe-94-improper-control-of-generati-d9c339c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14287%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69b7c1499d4df4518337533f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4173-sql-injection-in-codephiliax-chat2db-3df7a560</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4173%3A%20SQL%20Injection%20in%20CodePhiliaX%20Chat2DB&amp;severity=medium&amp;id=69b67d7e9d4df45183f8681b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4172-stack-based-buffer-overflow-in-trend-df028a4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4172%3A%20Stack-based%20Buffer%20Overflow%20in%20TRENDnet%20TEW-632BRP&amp;severity=high&amp;id=69b676769d4df45183f31fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4171-authorization-bypass-in-codegenieapp-cf6d9b09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4171%3A%20Authorization%20Bypass%20in%20CodeGenieApp%20serverless-express&amp;severity=medium&amp;id=69b66e0a9b0f87e881d5b32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4170-os-command-injection-in-topsec-topac-9e1efe11</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4170%3A%20OS%20Command%20Injection%20in%20Topsec%20TopACM&amp;severity=critical&amp;id=69b670ed9d4df45183e9aed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4169-cross-site-scripting-in-tecnick-tcex-fd1ffac8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4169%3A%20Cross%20Site%20Scripting%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=69b64e669b0f87e881babec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4168-cross-site-scripting-in-tecnick-tcex-9346d093</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4168%3A%20Cross%20Site%20Scripting%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=69b64e669b0f87e881babeba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4167-stack-based-buffer-overflow-in-belki-ac4818a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4167%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69b64ae29b0f87e881b8f1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4166-cross-site-scripting-in-wavlink-wl-n-93ca904f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4166%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69b64ae29b0f87e881b8f1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4165-cross-site-scripting-in-worksuite-hr-a0a0992f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4165%3A%20Cross%20Site%20Scripting%20in%20Worksuite%20HR%2C%20CRM%20and%20Project%20Management&amp;severity=medium&amp;id=69b670ed9d4df45183e9aedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4164-command-injection-in-wavlink-wl-wn57-c028dcbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4164%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=critical&amp;id=69b62b3e9b0f87e881a99067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2233-cwe-862-missing-authorization-in-wed-191cba37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2233%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=medium&amp;id=69b619aa9b0f87e8819c13f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1947-cwe-639-authorization-bypass-through-412339ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1947%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=high&amp;id=69b60f1e9b0f87e88192b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1883-cwe-639-authorization-bypass-through-0e12c6db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1883%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wickedplugins%20Wicked%20Folders%20%E2%80%93%20Folder%20Organizer%20for%20Pages%2C%20Posts%2C%20and%20Custom%20Post%20Types&amp;severity=medium&amp;id=69b60f1e9b0f87e88192b12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3441-out-of-bounds-read-in-red-hat-red-ha-c29ec58c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3441%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b604929b0f87e88177d6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3442-out-of-bounds-read-in-red-hat-red-ha-01e6e081</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3442%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b604929b0f87e88177d6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-15-32473807</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-15&amp;severity=medium&amp;id=69b7492f9d4df45183906444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-15-4b6db233</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-15&amp;severity=medium&amp;id=69b680cc9d4df45183fb5170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-15-fc6b6048</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-15&amp;severity=low&amp;id=69b680cc9d4df45183fb5150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4163-command-injection-in-wavlink-wl-wn57-5fa0760b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4163%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=critical&amp;id=69b5e4e22f860ef94356585f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4179-loop-with-unreachable-exit-condition-9616b361</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4179%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=69b5ff079b0f87e881671219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0849-buffer-copy-without-checking-size-of-03e4aa02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0849%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=low&amp;id=69b5cfcb2f860ef94341a096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1870-cwe-862-missing-authorization-in-thi-2dfc483a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1870%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20Thim%20Kit%20for%20Elementor%20%E2%80%93%20Pre-built%20Templates%20%26%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69b562ce2f860ef943ef5275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-hpe-aos-cx-vulnerability-allows-admin-pas-c92fd2bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20HPE%20AOS-CX%20Vulnerability%20Allows%20Admin%20Password%20Resets&amp;severity=critical&amp;id=69b53f722f860ef943baf10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54920-cwe-502-deserialization-of-untruste-513e22e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54920%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Spark&amp;severity=high&amp;id=69b527072f860ef943974709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1948-cwe-862-missing-authorization-in-web-88b87899</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1948%3A%20CWE-862%20Missing%20Authorization%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69b4dd372f860ef94382b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-uses-clickfix-page-to-push-rem-aa9c64ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20uses%20ClickFix%20page%20to%20push%20Remcos%20RAT%2C%20(Sat%2C%20Mar%2014th)&amp;severity=medium&amp;id=69b4b9d92f860ef94307e3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-14-20b6e0de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-14&amp;severity=medium&amp;id=69b5f9c02f860ef9436a67d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-14-ad0bb0a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-14&amp;severity=low&amp;id=69b4d2712f860ef9434a4b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-14-1eabe221</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-14&amp;severity=medium&amp;id=69b4d2712f860ef9434a1b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0385-spoofing-in-microsoft-microsoft-edge-1b431653</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0385%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=69b48c5d2f860ef943c0bebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32724-cwe-416-use-after-free-in-px4-px4-a-01ac43e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32724%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b488d62f860ef943ba416b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3227-cwe-78-improper-neutralization-of-sp-ac440341</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3227%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20TL-WR802N%20v4&amp;severity=high&amp;id=69b488d62f860ef943ba4172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32720-cwe-284-improper-access-control-in--c14eb5d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32720%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20monitoring&amp;severity=high&amp;id=69b485502f860ef943b83400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32719-cwe-22-improper-limitation-of-a-pat-c20be6ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32719%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=medium&amp;id=69b485502f860ef943b833fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32717-cwe-863-incorrect-authorization-in--a6c8c004</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32717%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mintplex-Labs%20anything-llm&amp;severity=low&amp;id=69b485502f860ef943b833f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32715-cwe-863-incorrect-authorization-in--02a0b72c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32715%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mintplex-Labs%20anything-llm&amp;severity=low&amp;id=69b485502f860ef943b833f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32713-cwe-670-always-incorrect-control-fl-e4fe0408</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32713%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b485502f860ef943b833ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32709-cwe-22-improper-limitation-of-a-pat-51bc0c50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32709%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b485502f860ef943b833ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32708-cwe-121-stack-based-buffer-overflow-a8d143e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32708%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=high&amp;id=69b485502f860ef943b833e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32707-cwe-121-stack-based-buffer-overflow-87d08068</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32707%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32706-cwe-120-buffer-copy-without-checkin-09d5c9f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32706%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20PX4%20PX4-Autopilot&amp;severity=high&amp;id=69b481d42f860ef943b5ebc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32705-cwe-121-stack-based-buffer-overflow-487fae4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32705%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32616-cwe-74-improper-neutralization-of-s-ab6dc709</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32616%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20kasuganosoras%20Pigeon&amp;severity=high&amp;id=69b481d42f860ef943b5ebb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32704-cwe-285-improper-authorization-in-s-8e36d108</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32704%3A%20CWE-285%3A%20Improper%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26133-information-disclosure-in-microsoft-fe3e9176</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26133%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot%20for%20Android&amp;severity=high&amp;id=69b481d42f860ef943b5ebb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32640-cwe-915-improperly-controlled-modif-c6dbc3dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32640%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20danthedeckie%20simpleeval&amp;severity=high&amp;id=69b481d42f860ef943b5ebbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32772-cwe-669-incorrect-resource-transfer-fd58534d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32772%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20GNU%20inetutils&amp;severity=low&amp;id=69b47e482f860ef943b3ab7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32635-cwe-79-improper-neutralization-of-i-dc8aa9bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32635%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%40angular%20compiler&amp;severity=high&amp;id=69b47e482f860ef943b3ab77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32630-cwe-409-improper-handling-of-highly-276ae7f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32630%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20sindresorhus%20file-type&amp;severity=medium&amp;id=69b47e482f860ef943b3ab73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32628-cwe-89-improper-neutralization-of-s-a6db85bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32628%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69b47e482f860ef943b3ab6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32627-cwe-295-improper-certificate-valida-93534cac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32627%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69b47ac82f860ef943b21729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2491-cwe-306-missing-authentication-for-c-5feeb71e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2491%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20A-40&amp;severity=medium&amp;id=69b47ac82f860ef943b21725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3562-cwe-347-improper-verification-of-cry-0705c7b3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3562%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Philips%20Hue%20Bridge&amp;severity=medium&amp;id=69b47ac82f860ef943b21741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3561-cwe-122-heap-based-buffer-overflow-i-375556a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3561%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2173e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3560-cwe-122-heap-based-buffer-overflow-i-45c1d76e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3560%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2173b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3559-cwe-323-reusing-a-nonce-key-pair-in--315b5e3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3559%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3558-cwe-306-missing-authentication-for-c-e7247790</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3558%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3557-cwe-122-heap-based-buffer-overflow-i-348800c6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3557%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3556-cwe-122-heap-based-buffer-overflow-i-ceca564d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3556%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2172f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3555-cwe-122-heap-based-buffer-overflow-i-9ade4958</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3555%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2172c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32621-cwe-1321-improperly-controlled-modi-1de28d7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32621%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20%40apollo%20federation-internals&amp;severity=critical&amp;id=69b477402f860ef943af037e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32626-cwe-79-improper-neutralization-of-i-a50f3d86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32626%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=critical&amp;id=69b473bd2f860ef943aa93f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32614-cwe-347-improper-verification-of-cr-469bafa7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32614%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20emmansun%20gmsm&amp;severity=high&amp;id=69b473bd2f860ef943aa93f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0977-cwe-284-in-ibm-cics-transaction-gate-0f24da33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0977%3A%20CWE-284%20in%20IBM%20CICS%20Transaction%20Gateway%20for%20Multiplatforms&amp;severity=medium&amp;id=69b473bd2f860ef943aa93ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32617-cwe-942-permissive-cross-domain-pol-afe0fc22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32617%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69b473bd2f860ef943aa93f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32600-cwe-354-improper-validation-of-inte-e8cd52c9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32600%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20simplesamlphp%20xml-security&amp;severity=high&amp;id=69b473bf2f860ef943aa9457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32594-cwe-306-missing-authentication-for--2bea7820</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32594%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b473bd2f860ef943aa940d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13212-cwe-799-improper-control-of-interac-fc1bf1b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13212%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=69b473bd2f860ef943aa93fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13459-cwe-841-improper-enforcement-of-beh-49253c6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13459%3A%20CWE-841%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20IBM%20Aspera%20Console&amp;severity=low&amp;id=69b473bd2f860ef943aa93ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13460-cwe-204-observable-response-discrep-b46d5ee6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13460%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=69b473bd2f860ef943aa9402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32314-cwe-248-uncaught-exception-in-libp2-e25d0c75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32314%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20libp2p%20rust-yamux&amp;severity=high&amp;id=69b473bd2f860ef943aa940a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32313-cwe-354-improper-validation-of-inte-f09d9228</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32313%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20robrichards%20xmlseclibs&amp;severity=high&amp;id=69b473bd2f860ef943aa9405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31949-cwe-248-uncaught-exception-in-danny-d7418f23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31949%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69b4732e2f860ef943a92620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31944-cwe-306-missing-authentication-for--349af3c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31944%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69b4732e2f860ef943a9261d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31899-cwe-674-uncontrolled-recursion-in-k-d8a020a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31899%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Kozea%20CairoSVG&amp;severity=high&amp;id=69b4732e2f860ef943a92619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36368-cwe-89-improper-neutralization-of-s-eb4d8f1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36368%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b4732e2f860ef943a92616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31886-cwe-22-improper-limitation-of-a-pat-116cb11a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31886%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=critical&amp;id=69b469392f860ef943905692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31882-cwe-306-missing-authentication-for--5fd57a74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31882%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dagu-org%20dagu&amp;severity=high&amp;id=69b469392f860ef94390568c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31814-cwe-190-integer-overflow-or-wraparo-40e288f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31814%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-yamux&amp;severity=high&amp;id=69b465b22f860ef9438da28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14483-cwe-201-insertion-of-sensitive-info-0baf0879</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14483%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b465b22f860ef9438da275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30961-cwe-770-allocation-of-resources-wit-d12c59e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30961%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14504-cwe-79-improper-neutralization-of-i-1f69d1bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b465b22f860ef9438da278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30955-cwe-400-uncontrolled-resource-consu-c9a9ab34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30955%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30943-cwe-863-incorrect-authorization-in--0656b1a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30943%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30915-cwe-22-improper-limitation-of-a-pat-da7d087b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30915%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20drakkan%20sftpgo&amp;severity=medium&amp;id=69b465b22f860ef9438da27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30914-cwe-22-improper-limitation-of-a-pat-bd6cd91e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30914%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20drakkan%20sftpgo&amp;severity=medium&amp;id=69b465b22f860ef9438da27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30853-cwe-22-improper-limitation-of-a-pat-6923c988</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30853%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69b4622a2f860ef9438be2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0835-cwe-79-improper-neutralization-of-in-35334f5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0835%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b4622a2f860ef9438be2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71263-cwe-120-buffer-copy-without-checkin-49ff0d18</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71263%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20AT%26T%20Bell%20Labs%20UNIX&amp;severity=high&amp;id=69b45b242f860ef94386c25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13702-vulnerability-in-ibm-sterling-partn-f430fe6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13702%3A%20Vulnerability%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13718-cwe-319-cleartext-transmission-of-s-470e2432</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13718%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=low&amp;id=69b45b242f860ef94386c254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13723-cwe-324-use-of-a-key-past-its-expir-824e411a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13723%3A%20CWE-324%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12453-cwe-79-improper-neutralization-of-i-d48ad297</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12453%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12454-cwe-79-improper-neutralization-of-i-b626b0fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12454%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12455-cwe-204-observable-response-discrep-bfc71dd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12455%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13726-cwe-209-generation-of-error-message-c3b107e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13726%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wide-scale-opportunistic-sms-pumping-attacks-targe-0c35fd17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wide-scale%2C%20opportunistic%20SMS%20pumping%20attacks%20target%20customer%20sign-up%20pages&amp;severity=medium&amp;id=69b7d9569d4df451834af53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14811-cwe-598-use-of-get-request-method-w-bc6a9c1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14811%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=low&amp;id=69b457cc2f860ef943762155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32746-cwe-120-buffer-copy-without-checkin-0ceead78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32746%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20GNU%20inetutils&amp;severity=critical&amp;id=69b4498e2f860ef94328433b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1668-cwe-20-improper-input-validation-in--944966a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1668%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20SG2008P%203.2x&amp;severity=high&amp;id=69b4440c2f860ef9430eaa02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26954-cwe-94-improper-control-of-generati-35790079</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26954%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69b45b752f860ef943872ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32745-cwe-614-in-jetbrains-datalore-e0b6f632</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32745%3A%20CWE-614%20in%20JetBrains%20Datalore&amp;severity=medium&amp;id=69b45b752f860ef943872ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4092-cwe-22-improper-limitation-of-a-path-4edecfa5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4092%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Clasp&amp;severity=high&amp;id=69b45b752f860ef943872ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60012-cwe-20-improper-input-validation-in-45b604ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60012%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Livy&amp;severity=medium&amp;id=69b42da82f860ef943f7d5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66249-cwe-22-improper-limitation-of-a-pat-cb731667</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66249%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Livy&amp;severity=medium&amp;id=69b42da82f860ef943f7d5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/starbucks-data-breach-impacts-employees-cd090120</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Starbucks%20Data%20Breach%20Impacts%20Employees&amp;severity=medium&amp;id=69b42d392f860ef943f7a2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0956-cwe-125-out-of-bounds-read-in-digile-9c731add</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0956%3A%20CWE-125%20Out-of-bounds%20read%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b42da82f860ef943f7d604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0955-cwe-125-out-of-bounds-read-in-digile-1617a903</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0955%3A%20CWE-125%20Out-of-bounds%20read%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b42da82f860ef943f7d601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0957-cwe-787-out-of-bounds-write-in-digil-a0dbc562</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0957%3A%20CWE-787%20Out-of-bounds%20write%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b422e32f860ef943ee8229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0954-cwe-787-out-of-bounds-write-in-digil-5904e41d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0954%3A%20CWE-787%20Out-of-bounds%20write%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b422e32f860ef943ee8226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-n8n-flaw-exploited-slopoly-malware-i-1257d1a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20N8n%20Flaw%20Exploited%2C%20Slopoly%20Malware%2C%20Interpol%20Cybercrime%20Crackdown&amp;severity=low&amp;id=69b41f282f860ef943ebe1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13779-cwe-306-missing-authentication-for--4936bb9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13779%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=high&amp;id=69b414d22f860ef943e394b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13778-cwe-306-missing-authentication-for--89a37f0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13778%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=medium&amp;id=69b40df72f860ef943ddd9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13777-cwe-294-authentication-bypass-by-ca-4adcb152</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13777%3A%20CWE-294%20Authentication%20bypass%20by%20capture-replay%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=high&amp;id=69b40df72f860ef943ddd9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-take-aim-at-us-and-other-targe-9bcfe572</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Take%20Aim%20at%20US%20and%20Other%20Targets%2C%20Raising%20Risk%20of%20Cyberattacks%20During%20War&amp;severity=medium&amp;id=69b4068c2f860ef943d8f890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4111-loop-with-unreachable-exit-condition-fe816334</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4111%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69b3fc832f860ef943d17f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32543-missing-authorization-in-cyberchimp-8017ca52</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32543%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=medium&amp;id=69b3fc832f860ef943d17f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32487-missing-authorization-in-raratheme--191fac15</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32487%3A%20Missing%20Authorization%20in%20raratheme%20Lawyer%20Landing%20Page&amp;severity=medium&amp;id=69b3fc832f860ef943d17f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32486-missing-authorization-in-wptravelen-38838032</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32486%3A%20Missing%20Authorization%20in%20wptravelengine%20Travel%20Booking&amp;severity=medium&amp;id=69b3fc832f860ef943d17f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32462-improper-neutralization-of-input-du-9c426d46</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b3fc832f860ef943d17f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32461-missing-authorization-in-really-sim-fffa3e1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32461%3A%20Missing%20Authorization%20in%20Really%20Simple%20Plugins%20Really%20Simple%20SSL&amp;severity=medium&amp;id=69b3fc832f860ef943d17f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32460-improper-neutralization-of-input-du-d89a53a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Ultimate%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69b3fc832f860ef943d17f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32459-improper-neutralization-of-special--db7bd114</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32459%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flycart%20UpsellWP&amp;severity=high&amp;id=69b3fc832f860ef943d17f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32458-improper-neutralization-of-special--eb6e8174</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32458%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RealMag777%20WOLF&amp;severity=high&amp;id=69b3fc832f860ef943d17f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32457-missing-authorization-in-wombat-plu-4784041d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32457%3A%20Missing%20Authorization%20in%20Wombat%20Plugins%20Advanced%20Product%20Fields%20(Product%20Addons)%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc832f860ef943d17f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32456-cross-site-request-forgery-csrf-in--9291cbc0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32456%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Janis%20Elsts%20Admin%20Menu%20Editor&amp;severity=medium&amp;id=69b3fc812f860ef943d17f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32455-improper-neutralization-of-input-du-7de85790</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=69b3fc812f860ef943d17f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32454-improper-neutralization-of-input-du-53b4d6ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Avada%20Core&amp;severity=medium&amp;id=69b3fc812f860ef943d17f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32453-missing-authorization-in-themefusio-6f99cd0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32453%3A%20Missing%20Authorization%20in%20ThemeFusion%20Avada%20Core&amp;severity=medium&amp;id=69b3fc812f860ef943d17f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32452-missing-authorization-in-themefusio-896f48b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32452%3A%20Missing%20Authorization%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=69b3fc812f860ef943d17f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32451-missing-authorization-in-themefusio-dde6c7ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32451%3A%20Missing%20Authorization%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=69b3fc812f860ef943d17f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32450-improper-neutralization-of-input-du-a3960304</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20Active%20Products%20Tables%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc812f860ef943d17f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32449-improper-neutralization-of-input-du-d3119f43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Event%20Post&amp;severity=medium&amp;id=69b3fc812f860ef943d17f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32448-improper-neutralization-of-input-du-a2e879f8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eric%20Teubert%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=69b3fc812f860ef943d17f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32447-missing-authorization-in-vito-peleg-dc3d9cb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32447%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=69b3fc812f860ef943d17f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32446-missing-authorization-in-syed-balkh-9e5eebf2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32446%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32445-missing-authorization-in-elementor--89cd866e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32445%3A%20Missing%20Authorization%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=low&amp;id=69b3fc7f2f860ef943d17e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32443-cross-site-request-forgery-csrf-in--31384905</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32443%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Josh%20Kohlbach%20Product%20Feed%20PRO%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32440-missing-authorization-in-ex-themes--35f616df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32440%3A%20Missing%20Authorization%20in%20Ex-Themes%20WP%20Food&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32439-missing-authorization-in-webgeniusl-d0e96da4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32439%3A%20Missing%20Authorization%20in%20WebGeniusLab%20BigHearts&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32438-missing-authorization-in-vowelweb-v-d91f803d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32438%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20School%20Education&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32437-missing-authorization-in-vowelweb-v-ff2fb1ea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32437%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Portfolio&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32436-missing-authorization-in-vowelweb-v-330cef25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32436%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Photography&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32435-missing-authorization-in-vowelweb-v-16582c1d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32435%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Pet%20Shop&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32434-missing-authorization-in-vowelweb-v-a3a8714f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32434%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Fitness&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32433-improper-neutralization-of-special--6e960526</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32433%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20codepeople%20CP%20Contact%20Form%20with%20Paypal&amp;severity=high&amp;id=69b3fc7d2f860ef943d17e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32432-missing-authorization-in-codepeople-bf935de5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32432%3A%20Missing%20Authorization%20in%20codepeople%20WP%20Time%20Slots%20Booking%20Form&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32431-improper-neutralization-of-input-du-fd10a23c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32431%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Astra%20Bulk%20Edit&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32430-improper-neutralization-of-input-du-ca001993</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32430%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IdeaBox%20Creations%20PowerPack%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32429-improper-neutralization-of-input-du-360d0c55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32429%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Magical%20Addons%20For%20Elementor&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32428-missing-authorization-in-ays-pro-po-c5de410e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32428%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Popup%20Like%20box&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32427-missing-authorization-in-vowelweb-v-9d4a6be6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32427%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Education%20Lite&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32426-improper-control-of-filename-for-in-05e0db0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32426%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themelexus%20Medilazar%20Core&amp;severity=high&amp;id=69b3fc7d2f860ef943d17e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32425-missing-authorization-in-linknacion-39cfb0ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32425%3A%20Missing%20Authorization%20in%20linknacional%20Payment%20Gateway%20Pix%20For%20GiveWP&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32424-improper-neutralization-of-input-du-cd3cbd9f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32424%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Sprout%20Clients&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32423-missing-authorization-in-bowo-admin-6ca8630e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32423%3A%20Missing%20Authorization%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32422-improper-neutralization-of-special--ceec3e00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32422%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20levelfourdevelopment%20WP%20EasyCart&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32421-missing-authorization-in-agile-logi-ac7a0873</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32421%3A%20Missing%20Authorization%20in%20Agile%20Logix%20Post%20Timeline&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32420-cross-site-request-forgery-csrf-in--f8e9d754</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32420%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ruben%20Garcia%20GamiPress&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32419-improper-neutralization-of-input-du-d6192675</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32419%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fernando%20Briano%20List%20category%20posts&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32418-improper-neutralization-of-special--406aedf9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32418%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jordy%20Meow%20Meow%20Gallery&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32417-missing-authorization-in-wppochipp--0e63fb08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32417%3A%20Missing%20Authorization%20in%20wppochipp%20Pochipp&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32416-missing-authorization-in-bplugins-p-b8ccda05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32416%3A%20Missing%20Authorization%20in%20bPlugins%20PDF%20Poster&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32415-path-traversal-in-bogdan-bendziukov-7cff31d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32415%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Bogdan%20Bendziukov%20Squeeze&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32414-improper-control-of-generation-of-c-c501db48</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32414%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ILLID%20Advanced%20Woo%20Labels&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32413-missing-authorization-in-maciej-bis-326cf9ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32413%3A%20Missing%20Authorization%20in%20Maciej%20Bis%20Permalink%20Manager%20Lite&amp;severity=medium&amp;id=69b3fc792f860ef943d17d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32412-server-side-request-forgery-ssrf-in-be99818f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32412%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Gift%20Up!%20Gift%20Up%20Gift%20Cards%20for%20WordPress%20and%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32411-improper-neutralization-of-input-du-20534a8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32411%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simpma%20Embed%20Calendly&amp;severity=medium&amp;id=69b3fc792f860ef943d17cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32410-missing-authorization-in-wbw-plugin-7a2cec48</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32410%3A%20Missing%20Authorization%20in%20WBW%20Plugins%20WBW%20Currency%20Switcher%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32409-missing-authorization-in-wpmu-dev-y-fb9f790f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32409%3A%20Missing%20Authorization%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Forminator&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32408-missing-authorization-in-themefusec-54b63062</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32408%3A%20Missing%20Authorization%20in%20themefusecom%20Brizy&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32407-missing-authorization-in-wpclever-w-5b109433</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32407%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Smart%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32406-missing-authorization-in-wpclever-w-4a6bc9a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32406%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Product%20Bundles%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32405-exposure-of-sensitive-system-inform-c9b093e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32405%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20xtemos%20WoodMart&amp;severity=medium&amp;id=69b3fc792f860ef943d17ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32404-missing-authorization-in-studio99-s-0ba83ffa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32404%3A%20Missing%20Authorization%20in%20Studio99%20Studio99%20WP%20Monitor&amp;severity=medium&amp;id=69b3fc792f860ef943d17ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32403-improper-neutralization-of-input-du-fbc598bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32403%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20toocheke%20Toocheke%20Companion&amp;severity=medium&amp;id=69b3fc762f860ef943d17bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32402-missing-authorization-in-ays-pro-im-e86a5a00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32402%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Image%20Slider%20by%20Ays&amp;severity=medium&amp;id=69b3fc762f860ef943d17bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32401-improper-control-of-filename-for-in-714f1e8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32401%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=high&amp;id=69b3fc762f860ef943d17bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32400-improper-control-of-filename-for-in-672cf594</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32400%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemetechMount%20Boldman&amp;severity=high&amp;id=69b3fc762f860ef943d17bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32399-improper-neutralization-of-special--f3f5d513</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32399%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=high&amp;id=69b3fc762f860ef943d17bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32398-concurrent-execution-using-shared-r-1c37c90c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32398%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Subrata%20Mal%20TeraWallet%20%E2%80%93%20For%20WooCommerce&amp;severity=medium&amp;id=69b3fc762f860ef943d17bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32397-missing-authorization-in-ymc-filter-9676781d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32397%3A%20Missing%20Authorization%20in%20YMC%20Filter%20%26%20Grids&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32396-missing-authorization-in-radiusthem-60534463</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32396%3A%20Missing%20Authorization%20in%20RadiusTheme%20Team&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32395-missing-authorization-in-xpro-xpro--39384c2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32395%3A%20Missing%20Authorization%20in%20Xpro%20Xpro%20Addons%20For%20Beaver%20Builder%20%26%238211%3B%20Lite&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32394-missing-authorization-in-publishpre-dfc7113c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32394%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Capabilities&amp;severity=medium&amp;id=69b3fc762f860ef943d17bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32393-improper-control-of-filename-for-in-45e6ac39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32393%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Greenly%20Theme%20Addons&amp;severity=high&amp;id=69b3fc742f860ef943d17af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32392-improper-control-of-filename-for-in-9f269b2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32392%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Greenly&amp;severity=high&amp;id=69b3fc742f860ef943d17af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32391-missing-authorization-in-linethemes-325eafba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32391%3A%20Missing%20Authorization%20in%20linethemes%20SmartFix&amp;severity=medium&amp;id=69b3fc742f860ef943d17af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32390-missing-authorization-in-linethemes-05abb297</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32390%3A%20Missing%20Authorization%20in%20linethemes%20Nanosoft&amp;severity=medium&amp;id=69b3fc742f860ef943d17aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32388-missing-authorization-in-linethemes-09a893de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32388%3A%20Missing%20Authorization%20in%20linethemes%20GLB&amp;severity=medium&amp;id=69b3fc742f860ef943d17aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32387-missing-authorization-in-noor-alam--347bfb66</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32387%3A%20Missing%20Authorization%20in%20Noor%20Alam%20Checkout%20for%20PayPal&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32386-missing-authorization-in-envothemes-724fa76f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32386%3A%20Missing%20Authorization%20in%20EnvoThemes%20Envo%20Extra&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32385-missing-authorization-in-metagauss--5a9cbabb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32385%3A%20Missing%20Authorization%20in%20Metagauss%20RegistrationMagic&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32384-improper-control-of-filename-for-in-18a09511</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32384%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magepeopleteam%20WpBookingly&amp;severity=high&amp;id=69b3fc742f860ef943d17ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32383-missing-authorization-in-raratheme--7af966ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32383%3A%20Missing%20Authorization%20in%20raratheme%20Ridhi&amp;severity=medium&amp;id=69b3fc742f860ef943d17add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32382-missing-authorization-in-raratheme--593105cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32382%3A%20Missing%20Authorization%20in%20raratheme%20Digital%20Download&amp;severity=medium&amp;id=69b3fc712f860ef943d17a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32381-missing-authorization-in-raratheme--287ddad3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32381%3A%20Missing%20Authorization%20in%20raratheme%20App%20Landing%20Page&amp;severity=medium&amp;id=69b3fc712f860ef943d17a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32380-missing-authorization-in-raratheme--18a1b659</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32380%3A%20Missing%20Authorization%20in%20raratheme%20Numinous&amp;severity=medium&amp;id=69b3fc712f860ef943d17a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32379-missing-authorization-in-raratheme--2fab580c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32379%3A%20Missing%20Authorization%20in%20raratheme%20Rara%20Academic&amp;severity=medium&amp;id=69b3fc712f860ef943d17a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32378-missing-authorization-in-raratheme--03ba613b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32378%3A%20Missing%20Authorization%20in%20raratheme%20Book%20Landing%20Page&amp;severity=medium&amp;id=69b3fc712f860ef943d17a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32377-missing-authorization-in-raratheme--14318444</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32377%3A%20Missing%20Authorization%20in%20raratheme%20Pranayama%20Yoga&amp;severity=medium&amp;id=69b3fc712f860ef943d17a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32376-missing-authorization-in-raratheme--817ef71a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32376%3A%20Missing%20Authorization%20in%20raratheme%20Kalon&amp;severity=medium&amp;id=69b3fc712f860ef943d17a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32375-missing-authorization-in-raratheme--153d1a60</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32375%3A%20Missing%20Authorization%20in%20raratheme%20Travel%20Diaries&amp;severity=medium&amp;id=69b3fc712f860ef943d17a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32374-missing-authorization-in-raratheme--311e6467</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32374%3A%20Missing%20Authorization%20in%20raratheme%20The%20Minimal&amp;severity=medium&amp;id=69b3fc712f860ef943d17a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32373-missing-authorization-in-cozy-visio-850a1769</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32373%3A%20Missing%20Authorization%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=medium&amp;id=69b3fc712f860ef943d17a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32372-exposure-of-sensitive-system-inform-cda0de09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32372%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20RadiusTheme%20ShopBuilder%20%E2%80%93%20Elementor%20WooCommerce%20Builder%20Addons&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32371-missing-authorization-in-raratheme--52c9dac8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32371%3A%20Missing%20Authorization%20in%20raratheme%20Elegant%20Pink&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32370-missing-authorization-in-raratheme--6b90ae32</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32370%3A%20Missing%20Authorization%20in%20raratheme%20Influencer&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32369-improper-control-of-filename-for-in-0988553a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Medilink-Core&amp;severity=high&amp;id=69b3fc6f2f860ef943d179cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32368-improper-neutralization-of-special--5cc971cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32368%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20delphiknight%20Geo%20to%20Lat&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32367-improper-control-of-generation-of-c-4c66769d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32367%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Yannick%20Lefebvre%20Modal%20Dialog&amp;severity=critical&amp;id=69b3fc6f2f860ef943d179c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32366-improper-neutralization-of-special--0d1f7e9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robfelty%20Collapsing%20Categories&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32365-improper-neutralization-of-special--243cc45a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32365%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robfelty%20Collapsing%20Archives&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32364-improper-control-of-filename-for-in-be7da41c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20redqteam%20Turbo%20Manager&amp;severity=high&amp;id=69b3fc6f2f860ef943d179bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32363-missing-authorization-in-funlus-oy--5c71d6b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32363%3A%20Missing%20Authorization%20in%20Funlus%20Oy%20WPLifeCycle&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32362-missing-authorization-in-activity-l-d17a4d68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32362%3A%20Missing%20Authorization%20in%20activity-log.com%20WP%20Sessions%20Time%20Monitoring%20Full%20Automatic&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32361-improper-neutralization-of-input-du-dc91a949</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marketing%20Fire%20Editorial%20Calendar&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32360-improper-neutralization-of-input-du-0129744c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richplugins%20Rich%20Showcase%20for%20Google%20Reviews&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32359-improper-neutralization-of-input-du-055fab5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32359%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Icon%20List%20Block&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32358-improper-neutralization-of-special--b6dd4fca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32358%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=high&amp;id=69b3fc6e2f860ef943d1797d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32357-server-side-request-forgery-ssrf-in-f4e13b72</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32357%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Katsushi%20Kawamori%20Simple%20Blog%20Card&amp;severity=medium&amp;id=69b3fc6e2f860ef943d1797a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32356-improper-neutralization-of-input-du-d61982ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32355-deserialization-of-untrusted-data-i-9218efa4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32355%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69b3fc6e2f860ef943d17974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32354-insertion-of-sensitive-information--9e564a09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32354%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32353-server-side-request-forgery-ssrf-in-fe177f7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32353%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MailerPress%20Team%20MailerPress&amp;severity=medium&amp;id=69b3fc6e2f860ef943d1796e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32352-improper-neutralization-of-input-du-df53e92f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32351-improper-neutralization-of-input-du-5bf039b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32350-missing-authorization-in-wpradiant--fae14b80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32350%3A%20Missing%20Authorization%20in%20wpradiant%20Chocolate%20House&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32349-server-side-request-forgery-ssrf-in-d09f4573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32349%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Andy%20Fragen%20Embed%20PDF%20Viewer&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1793e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32348-missing-authorization-in-madrasthem-79cb9bfd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32348%3A%20Missing%20Authorization%20in%20MadrasThemes%20MAS%20Videos&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1793b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32347-missing-authorization-in-raratheme--ddfc26ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32347%3A%20Missing%20Authorization%20in%20raratheme%20Restaurant%20and%20Cafe&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32346-missing-authorization-in-raratheme--be3c9748</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32346%3A%20Missing%20Authorization%20in%20raratheme%20Travel%20Agency&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32345-missing-authorization-in-raratheme--e7f0c170</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32345%3A%20Missing%20Authorization%20in%20raratheme%20Perfect%20Portfolio&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32344-cross-site-request-forgery-csrf-in--f00dd3fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20desertthemes%20Corpiva&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1792f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32343-cross-site-request-forgery-csrf-in--ad2a2626</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Magazine3%20Easy%20Table%20of%20Contents&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1792c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32342-cross-site-request-forgery-csrf-in--4b314ef2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32341-missing-authorization-in-raratheme--98f6a5d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32341%3A%20Missing%20Authorization%20in%20raratheme%20Benevolent&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32340-missing-authorization-in-raratheme--fcdc0dc1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32340%3A%20Missing%20Authorization%20in%20raratheme%20Business%20One%20Page&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32339-missing-authorization-in-raratheme--0b1eb6aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32339%3A%20Missing%20Authorization%20in%20raratheme%20Bakes%20And%20Cakes&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32338-missing-authorization-in-raratheme--78ae7b59</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32338%3A%20Missing%20Authorization%20in%20raratheme%20Construction%20Landing%20Page&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32337-missing-authorization-in-raratheme--ac285de1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32337%3A%20Missing%20Authorization%20in%20raratheme%20Preschool%20and%20Kindergarten&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32336-missing-authorization-in-raratheme--c98d665b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32336%3A%20Missing%20Authorization%20in%20raratheme%20Rara%20Business&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32335-missing-authorization-in-raratheme--287fa8de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32335%3A%20Missing%20Authorization%20in%20raratheme%20The%20Conference&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32334-missing-authorization-in-raratheme--70528cc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32334%3A%20Missing%20Authorization%20in%20raratheme%20JobScout&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32332-missing-authorization-in-ays-pro-ea-decd35d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32332%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Easy%20Form&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32331-missing-authorization-in-israpil-te-d9b6551a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32331%3A%20Missing%20Authorization%20in%20Israpil%20Textmetrics&amp;severity=medium&amp;id=69b3fc682f860ef943d17888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32330-cross-site-request-forgery-csrf-in--46f95374</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32330%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%2010Web%20Photo%20Gallery%20by%2010Web&amp;severity=medium&amp;id=69b3fc682f860ef943d17885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32329-missing-authorization-in-ays-pro-ad-8db73316</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32329%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Advanced%20Related%20Posts&amp;severity=medium&amp;id=69b3fc682f860ef943d17882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32328-cross-site-request-forgery-csrf-in--8416fb00</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32328%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shufflehound%20Lemmony&amp;severity=medium&amp;id=69b3fc682f860ef943d1787f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31922-improper-neutralization-of-special--603cf965</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31922%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ays%20Pro%20Fox%20LMS&amp;severity=high&amp;id=69b3fc682f860ef943d1787c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31919-missing-authorization-in-josh-kohlb-f077f2be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31919%3A%20Missing%20Authorization%20in%20Josh%20Kohlbach%20Advanced%20Coupons%20for%20WooCommerce%20Coupons&amp;severity=medium&amp;id=69b3fc682f860ef943d17879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31918-improper-neutralization-of-input-du-978416ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immonex%20immonex%20Kickstart&amp;severity=medium&amp;id=69b3fc682f860ef943d17876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31917-improper-neutralization-of-special--06e00a70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31917%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20weDevs%20WP%20ERP&amp;severity=high&amp;id=69b3fc682f860ef943d17873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31916-missing-authorization-in-iulia-caza-a7c0b15c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31916%3A%20Missing%20Authorization%20in%20Iulia%20Cazan%20Latest%20Post%20Shortcode&amp;severity=medium&amp;id=69b3fc682f860ef943d17870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31915-missing-authorization-in-ux-themes--986caac9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31915%3A%20Missing%20Authorization%20in%20UX-themes%20Flatsome&amp;severity=medium&amp;id=69b3fc682f860ef943d1786d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-exfiltration-and-threat-actor-infrastructure--59260c61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Exfiltration%20and%20Threat%20Actor%20Infrastructure%20Exposed&amp;severity=medium&amp;id=69b7d5d29d4df4518349438b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-paid-out-17-million-in-bug-bounty-rewards-i-2fdb9a10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Paid%20Out%20%2417%20Million%20in%20Bug%20Bounty%20Rewards%20in%202025&amp;severity=medium&amp;id=69b3f1742f860ef943caf537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hacker-attack-on-stryker-disrupted-man-a7e24b42</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hacker%20Attack%20on%20Stryker%20Disrupted%20Manufacturing%20and%20Shipping&amp;severity=medium&amp;id=69b3ea6c2f860ef943c741ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2859-cwe-204-observable-response-discrepa-8005d70e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2859%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69b3e0242f860ef943bfc08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24097-cwe-204-observable-response-discrep-09daffb8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24097%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69b3e0242f860ef943bfc08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4063-cwe-862-missing-authorization-in-wpz-a1746f82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4063%3A%20CWE-862%20Missing%20Authorization%20in%20wpzoom%20Social%20Icons%20Widget%20%26%20Block%20%E2%80%93%20Social%20Media%20Icons%20%26%20Share%20Buttons&amp;severity=medium&amp;id=69b3dc922f860ef943bc93c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23941-cwe-444-inconsistent-interpretation-11894fdc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23941%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Erlang%20OTP&amp;severity=high&amp;id=69b3d90e2f860ef943bac721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23943-cwe-409-improper-handling-of-highly-e97946a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23943%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69b3d90e2f860ef943bac72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23942-cwe-22-improper-limitation-of-a-pat-08d85e22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23942%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69b3d90e2f860ef943bac728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4105-improper-access-control-in-red-hat-r-78746624</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4105%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b41bd82f860ef943e9123e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3999-cwe-639-authorization-bypass-through-ed4f0cd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3999%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Pointsharp%20ID%20Server&amp;severity=high&amp;id=69b3ceae2f860ef943b31146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/authorities-disrupt-socksescort-proxy-service-powe-66d041d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Authorities%20Disrupt%20SocksEscort%20Proxy%20Service%20Powered%20by%20AVrecon%20Botnet&amp;severity=medium&amp;id=69b3cacb2f860ef943b0650c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3986-cwe-79-improper-neutralization-of-in-06be8be9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=69b3ceae2f860ef943b3113f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2888-cwe-639-authorization-bypass-through-be10e6a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2888%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%20Plugin%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=69b3ceae2f860ef943b31138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2879-cwe-639-authorization-bypass-through-33cd0f40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2879%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=69b3ceae2f860ef943b31132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2257-cwe-639-authorization-bypass-through-450feceb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2257%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=69b3ceae2f860ef943b3112c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3873-cwe-798-use-of-hard-coded-credential-c885523b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3873%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20syslink%20software%20AG%20Avantra&amp;severity=high&amp;id=69b3cb0f2f860ef943b07f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-146-update-patches-two-exploited-zero-days-c3299c74</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20146%20Update%20Patches%20Two%20Exploited%20Zero-Days&amp;severity=medium&amp;id=69b3c3c22f860ef943ab4d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2890-cwe-862-missing-authorization-in-str-3cbd25f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2890%3A%20CWE-862%20Missing%20Authorization%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%20Plugin%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=69b3c0802f860ef943a8ad97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1704-cwe-639-authorization-bypass-through-bf6c8b22</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1704%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=69b3c0802f860ef943a8ad8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3045-cwe-862-missing-authorization-in-cro-a77c0fc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3045%3A%20CWE-862%20Missing%20Authorization%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69b3c0802f860ef943a8ad9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3891-cwe-434-unrestricted-upload-of-file--f5fb3cc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3891%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20linknacional%20Pix%20for%20WooCommerce&amp;severity=critical&amp;id=69b3c0802f860ef943a8ada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-react-based-phishing-page-with-credential-exfilt-61aaf490</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20React-based%20phishing%20page%20with%20credential%20exfiltration%20via%20EmailJS%2C%20(Fri%2C%20Mar%2013th)&amp;severity=low&amp;id=69b3bcba2f860ef943a6b841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15515-cwe-306-missing-authentication-for--11564705</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15515%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20vivo%20Easyshare&amp;severity=medium&amp;id=69b3b5e82f860ef943a0e01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57849-incorrect-default-permissions-in-re-f1df4890</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57849%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Fuse%207&amp;severity=medium&amp;id=69b41f832f860ef943ec0b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8766-incorrect-default-permissions-in-red-f543bdcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8766%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Openshift%20Data%20Foundation%204&amp;severity=medium&amp;id=69b37da62f860ef94357f3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22216-improper-control-of-interaction-fre-b8164faf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22216%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22215-cross-site-request-forgery-csrf-in--343e3edd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22215%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22210-improper-neutralization-of-input-du-1e5ecaf0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22210%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=low&amp;id=69b36fc22f860ef9434ef2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22209-improper-neutralization-of-input-du-b3cac329</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22209%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22204-improper-input-validation-in-gvecto-cc7b6f3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22204%3A%20Improper%20Input%20Validation%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22203-exposure-of-sensitive-information-t-7dc2dafb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22203%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22202-cross-site-request-forgery-csrf-in--0ad91517</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22202%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22201-use-of-less-trusted-source-in-gvect-1dd97214</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22201%3A%20Use%20of%20Less%20Trusted%20Source%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22199-authentication-bypass-by-spoofing-i-6e3b7ac2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22199%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22193-improper-neutralization-of-special--3f166beb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22193%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=critical&amp;id=69b36fc02f860ef9434ef29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22192-improper-neutralization-of-input-du-14954f30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22192%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22191-improper-control-of-generation-of-c-4cebc079</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22191%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22183-improper-neutralization-of-input-du-c2f286a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22183%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22182-missing-authorization-in-gvectors-w-7c03bc66</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22182%3A%20Missing%20Authorization%20in%20gVectors%20wpDiscuz&amp;severity=high&amp;id=69b36fc02f860ef9434ef286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-13-7098392e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-13&amp;severity=medium&amp;id=69b4a8402f860ef943cf25a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-13-00a4f50f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-13&amp;severity=medium&amp;id=69b4424d2f860ef94305fd27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kadnap-botnet-ioc-mainly-asus-router-eedbb221</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KadNap%20botnet%20IOC%20(mainly%20Asus%20router)&amp;severity=low&amp;id=69b4424d2f860ef94305fced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-13-28ac8131</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-13&amp;severity=low&amp;id=69b3b22a2f860ef9439d7e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32612-cwe-79-improper-neutralization-of-i-f3855dcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32612%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69b3375b2f860ef943024599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32597-cwe-345-insufficient-verification-o-0a93b017</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32597%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20jpadilla%20pyjwt&amp;severity=high&amp;id=69b3375b2f860ef943024596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32322-cwe-697-incorrect-comparison-in-ste-733aea35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32322%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20stellar%20rs-soroban-sdk&amp;severity=medium&amp;id=69b3375b2f860ef943024593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32320-cwe-125-out-of-bounds-read-in-ellan-b44add55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32320%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69b3375b2f860ef94302458b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32319-cwe-125-out-of-bounds-read-in-ellan-85cb4aa1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32319%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20ellanetworks%20core&amp;severity=high&amp;id=69b3375b2f860ef943024587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3910-inappropriate-implementation-in-goog-ead606c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3910%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69b333cf2f860ef943fdd755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3909-out-of-bounds-write-in-google-chrome-b07a2ef8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3909%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69b333cf2f860ef943fdd751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32304-cwe-94-improper-control-of-generati-7207fd62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32304%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20locutusjs%20locutus&amp;severity=critical&amp;id=69b333cf2f860ef943fdd74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32301-cwe-918-server-side-request-forgery-6022b45c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32301%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20centrifugal%20centrifugo&amp;severity=critical&amp;id=69b333cf2f860ef943fdd74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25076-sql-injection-in-anchore-anchore-en-d94b4892</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25076%3A%20SQL%20Injection%20in%20Anchore%20Anchore%20Enterprise&amp;severity=high&amp;id=69b3304b2f860ef943fa4693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3611-cwe-306-missing-authentication-for-c-2be1059b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3611%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Honeywell%20IQ4E&amp;severity=critical&amp;id=69b3223b2f860ef943f219ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32274-cwe-22-improper-limitation-of-a-pat-ca949827</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32274%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20psf%20black&amp;severity=high&amp;id=69b31b3a2f860ef943e8fcb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32269-cwe-683-function-call-with-incorrec-d0471610</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32269%3A%20CWE-683%3A%20Function%20Call%20With%20Incorrect%20Order%20of%20Arguments%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b31b3a2f860ef943e8fcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32260-cwe-78-improper-neutralization-of-s-9c1d5a82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32260%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=69b31b3a2f860ef943e8fca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32251-cwe-611-improper-restriction-of-xml-6ee364da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32251%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20tolgee%20tolgee-platform&amp;severity=critical&amp;id=69b317b02f860ef943e64732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32248-cwe-943-improper-neutralization-of--cc26229b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32248%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b317b02f860ef943e6472d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32247-cwe-943-improper-neutralization-of--936b3588</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32247%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20getzep%20graphiti&amp;severity=high&amp;id=69b3294c2f860ef943f62e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2376-url-redirection-to-untrusted-site-op-8ae8f8b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2376%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69b3223b2f860ef943f219b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32246-cwe-287-improper-authentication-in--788ee6c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32246%3A%20CWE-287%3A%20Improper%20Authentication%20in%20steveiliop56%20tinyauth&amp;severity=high&amp;id=69b3294c2f860ef943f62df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32245-cwe-863-incorrect-authorization-in--778356e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32245%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20steveiliop56%20tinyauth&amp;severity=medium&amp;id=69b3294c2f860ef943f62df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32242-cwe-362-concurrent-execution-using--7a67bf5f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32242%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b30d502f860ef943de4428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32237-cwe-200-exposure-of-sensitive-infor-f529e41f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32237%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20%40backstage%20plugin-scaffolder-backend&amp;severity=medium&amp;id=69b30d502f860ef943de4424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32236-cwe-918-server-side-request-forgery-ca31ec08</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32236%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20%40backstage%20plugin-auth-backend&amp;severity=low&amp;id=69dffcc482d89c981f9a5a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32235-cwe-601-url-redirection-to-untruste-8786b7b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32235%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20%40backstage%20plugin-auth-backend&amp;severity=medium&amp;id=69b30d502f860ef943de441e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32138-cwe-284-improper-access-control-in--1d029b4f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32138%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Stalin-143%20website&amp;severity=high&amp;id=69b30d502f860ef943de441a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3497-cwe-908-use-of-uninitialized-resourc-cddab41e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3497%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Ubuntu%20openssh&amp;severity=low&amp;id=69b30a4d2f860ef943dbc47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32232-cwe-22-improper-limitation-of-a-pat-5c2df155</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32232%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20qhkm%20zeptoclaw&amp;severity=high&amp;id=69b30a4d2f860ef943dbc47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32231-cwe-306-missing-authentication-for--ae638150</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32231%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20qhkm%20zeptoclaw&amp;severity=high&amp;id=69b30a4d2f860ef943dbc474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32142-cwe-200-exposure-of-sensitive-infor-6fbc29e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32142%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shopware%20commercial&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13913-cwe-502-in-inductive-automation-ign-01f96f6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13913%3A%20CWE-502%20in%20Inductive%20Automation%20Ignition%20Software&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32230-cwe-862-missing-authorization-in-lo-356bd849</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32230%3A%20CWE-862%3A%20Missing%20Authorization%20in%20louislam%20uptime-kuma&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32100-cwe-200-exposure-of-sensitive-infor-978514b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32100%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20swag%20platform-security&amp;severity=medium&amp;id=69b302c82f860ef943d65df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32141-cwe-674-uncontrolled-recursion-in-w-e8a42dbc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32141%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20WebReflection%20flatted&amp;severity=high&amp;id=69b302c82f860ef943d65df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13462-vulnerability-in-python-software-fo-9c4c971e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13462%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69b302c82f860ef943d65de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32129-cwe-328-use-of-weak-hash-in-stellar-9ed57848</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32129%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20stellar%20rs-soroban-poseidon&amp;severity=high&amp;id=69b2ff142f860ef943d3c349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28256-cwe-547-use-of-hard-coded-security--5f1a8c05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28256%3A%20CWE-547%20Use%20of%20hard-coded%2C%20security-relevant%20constants%20in%20Trane%20Tracer%20SC&amp;severity=medium&amp;id=69b2ff142f860ef943d3c346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28255-cwe-798-use-of-hard-coded-credentia-0910cf57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28255%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Trane%20Tracer%20SC&amp;severity=high&amp;id=69b2ff142f860ef943d3c343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28254-cwe-862-missing-authorization-in-tr-73884a61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28254%3A%20CWE-862%20Missing%20Authorization%20in%20Trane%20Tracer%20SC&amp;severity=medium&amp;id=69b2fb902f860ef943d10b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28253-cwe-789-memory-allocation-with-exce-81851637</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28253%3A%20CWE-789%20Memory%20allocation%20with%20excessive%20size%20value%20in%20Trane%20Tracer%20SC&amp;severity=high&amp;id=69b2fb902f860ef943d10b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3841-cwe-78-improper-neutralization-of-sp-c6a0b1e5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3841%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20TL-MR6400%20v5.3&amp;severity=high&amp;id=69b2fb902f860ef943d10b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28252-cwe-327-use-of-a-broken-or-risky-cr-93113256</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28252%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Trane%20Tracer%20SC&amp;severity=critical&amp;id=69b2fb902f860ef943d10b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handala-hack-unveiling-groups-modus-operandi-5e58407e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CHandala%20Hack%E2%80%9D%20%E2%80%93%20Unveiling%20Group%E2%80%99s%20Modus%20Operandi&amp;severity=medium&amp;id=69b2f83f2f860ef943cde4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31860-cwe-79-improper-neutralization-of-i-7fa3718b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31860%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unjs%20unhead&amp;severity=medium&amp;id=69b2fb902f860ef943d10b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21887-cwe-918-server-side-request-forgery-bfed939e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21887%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenCTI-Platform%20opencti&amp;severity=high&amp;id=69b2ff142f860ef943d3c351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29066-cwe-552-files-or-directories-access-7742946f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29066%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20%40tinacms%20cli&amp;severity=medium&amp;id=69b30a4f2f860ef943dbd356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28793-cwe-22-improper-limitation-of-a-pat-139c4d03</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28793%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20cli&amp;severity=high&amp;id=69b30a4f2f860ef943dbd353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28792-cwe-22-improper-limitation-of-a-pat-b7476262</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28792%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20cli&amp;severity=critical&amp;id=69b30a4d2f860ef943dbc486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28356-cwe-1333-inefficient-regular-expres-ea759df3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28356%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20defnull%20multipart&amp;severity=high&amp;id=69b30a4d2f860ef943dbc483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27940-cwe-122-heap-based-buffer-overflow--417912cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27940%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=69b30a4f2f860ef943dbd359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25529-cwe-79-improper-neutralization-of-i-c5291a63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25529%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20postalserver%20postal&amp;severity=high&amp;id=69b302c82f860ef943d65e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24125-cwe-22-improper-limitation-of-a-pat-167a257b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24125%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20graphql&amp;severity=medium&amp;id=69b302c82f860ef943d65dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21708-vulnerability-in-veeam-backup-and-r-a01c130d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21708%3A%20CWE-89%20SQL%20Injection%20in%20Veeam%20Backup%20and%20Replication&amp;severity=null&amp;id=69b2fb902f860ef943d10b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21672-vulnerability-in-veeam-backup-and-r-a938f0b4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21672%3A%20CWE-538%20File%20and%20Directory%20Information%20Exposure%20in%20Veeam%20Backup%20and%20Replication&amp;severity=null&amp;id=69b2fb902f860ef943d10b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4045-observable-response-discrepancy-in-p-923f1212</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4045%3A%20Observable%20Response%20Discrepancy%20in%20projectsend&amp;severity=medium&amp;id=69b2e9fd2f860ef943be3537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amos-and-amatera-disguised-as-ai-agents-kaspersky--0fed8e97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMOS%20and%20Amatera%20disguised%20as%20AI%20agents%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b329192f860ef943f5f8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4044-path-traversal-in-projectsend-d26863f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4044%3A%20Path%20Traversal%20in%20projectsend&amp;severity=medium&amp;id=69b2df702f860ef943b15ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4043-stack-based-buffer-overflow-in-tenda-40bf116e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4043%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df702f860ef943b15cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21668-vulnerability-in-veeam-backup-and-r-5ceecedd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21668%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=69b2df702f860ef943b15cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21669-vulnerability-in-veeam-backup-and-r-0923d707</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21669%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21671-vulnerability-in-veeam-software-app-8e791f48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21671%3A%20Vulnerability%20in%20Veeam%20Software%20Appliance&amp;severity=critical&amp;id=69b2df702f860ef943b15ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21670-vulnerability-in-veeam-backup-and-r-75713f74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21670%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=69b2df702f860ef943b15ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21666-vulnerability-in-veeam-backup-and-r-d782aaf9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21666%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21667-vulnerability-in-veeam-backup-and-r-7dd414e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21667%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4042-stack-based-buffer-overflow-in-tenda-a49a83d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4042%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df722f860ef943b15d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4041-stack-based-buffer-overflow-in-tenda-433ad76d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4041%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df722f860ef943b15d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28384-cwe-78-improper-neutralization-of-s-d5f2b981</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28384%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69b30a4f2f860ef943dbd36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-updates-legacy-ios-versions-to-patch-coruna--74b61107</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Updates%20Legacy%20iOS%20Versions%20to%20Patch%20Coruna%20Exploits&amp;severity=medium&amp;id=69b2d12d2f860ef943a1d41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3099-reusing-a-nonce-key-pair-in-encrypti-33353641</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3099%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b2ca582f860ef943997cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-launches-new-protection-tools-as-it-helps-dis-4884c999</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20Launches%20New%20Protection%20Tools%20as%20It%20Helps%20Disrupt%20Scam%20Centers&amp;severity=medium&amp;id=69b2bf982f860ef9438df518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0809-cwe-261-weak-encoding-for-password-i-5ddf5427</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0809%3A%20CWE-261%20Weak%20Encoding%20for%20Password%20in%20Streamsoft%20Streamsoft%20Presti%C5%BC&amp;severity=medium&amp;id=69b2ca582f860ef943997cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2514-cwe-79-improper-neutralization-of-in-5051e4f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2514%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=69b2cde02f860ef9439e364c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2513-cwe-79-improper-neutralization-of-in-6c15055f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=69b2cde02f860ef9439e3649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ally-wordpress-plugin-flaw-exposes-over-200000-web-d4e539a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ally%20WordPress%20Plugin%20Flaw%20Exposes%20Over%20200%2C000%20Websites%20to%20Attacks&amp;severity=low&amp;id=69b2b50f2f860ef94380e7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-human-ioc-why-security-professionals-struggle--46b836af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Human%20IOC%3A%20Why%20Security%20Professionals%20Struggle%20with%20Social%20Vetting&amp;severity=medium&amp;id=69b2b50f2f860ef94380e7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2987-cwe-79-improper-neutralization-of-in-5a2918fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Simple%20Ajax%20Chat%20%E2%80%93%20Add%20a%20Fast%2C%20Secure%20Chat%20Box&amp;severity=medium&amp;id=69b30a4f2f860ef943dbd377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/splunk-zoom-patch-severe-vulnerabilities-8e95386b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Splunk%2C%20Zoom%20Patch%20Severe%20Vulnerabilities&amp;severity=critical&amp;id=69b2ae042f860ef943779eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4040-information-exposure-through-discrep-0aaa5cb6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4040%3A%20Information%20Exposure%20Through%20Discrepancy%20in%20OpenClaw&amp;severity=medium&amp;id=69b2ae4a2f860ef94378366e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4039-code-injection-in-openclaw-5c8684db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4039%3A%20Code%20Injection%20in%20OpenClaw&amp;severity=medium&amp;id=69b2ae4a2f860ef943783665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2366-authorization-bypass-through-user-co-8b18f55c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2366%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69b2c3542f860ef94391643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3234-improper-neutralization-of-crlf-sequ-0b41120c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3234%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b2c3542f860ef943916446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-high-severity-ios-xr-vulnerabilities-0b099562</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20High-Severity%20IOS%20XR%20Vulnerabilities&amp;severity=high&amp;id=69b295692f860ef943608336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-vulnerabilities-allowed-server-takeov-0dad78f8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20N8n%20Vulnerabilities%20Allowed%20Server%20Takeover&amp;severity=critical&amp;id=69b28e602f860ef9435aedf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polyfill-supply-chain-attack-impacting-100k-sites--0b7e80a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Polyfill%20Supply%20Chain%20Attack%20Impacting%20100k%20Sites%20Linked%20to%20North%20Korea&amp;severity=medium&amp;id=69b28adc2f860ef9435891b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4016-out-of-bounds-write-in-gpac-eec5a290</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4016%3A%20Out-of-bounds%20Write%20in%20GPAC&amp;severity=medium&amp;id=69b27d022f860ef9434f496c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4015-stack-based-buffer-overflow-in-gpac-e8ec27fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4015%3A%20Stack-based%20Buffer%20Overflow%20in%20GPAC&amp;severity=medium&amp;id=69b27d022f860ef9434f4962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4014-sql-injection-in-itsourcecode-cafe-r-fce405d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4014%3A%20SQL%20Injection%20in%20itsourcecode%20Cafe%20Reservation%20System&amp;severity=medium&amp;id=69b275fa2f860ef94349bd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4013-improper-authorization-in-sourcecode-f6c9bfe1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4013%3A%20Improper%20Authorization%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69b275fa2f860ef94349bd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4012-out-of-bounds-read-in-rxi-fe-16bd524c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4012%3A%20Out-of-Bounds%20Read%20in%20rxi%20fe&amp;severity=medium&amp;id=69b26ef22f860ef94343bee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4010-memory-corruption-in-thakeenathees-p-393ae7ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4010%3A%20Memory%20Corruption%20in%20ThakeeNathees%20pocketlang&amp;severity=medium&amp;id=69b26ef22f860ef94343bee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4009-out-of-bounds-read-in-jarikomppa-sol-d4f76128</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4009%3A%20Out-of-Bounds%20Read%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69b26b6b2f860ef943412a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4008-stack-based-buffer-overflow-in-tenda-40f87be9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4008%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b264662f860ef9433c6315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4007-stack-based-buffer-overflow-in-tenda-fcb0a190</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4007%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b264662f860ef9433c630e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3994-heap-based-buffer-overflow-in-rui314-8b4917fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3994%3A%20Heap-based%20Buffer%20Overflow%20in%20rui314%20mold&amp;severity=medium&amp;id=69b2cde02f860ef9439e364f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3993-cross-site-scripting-in-itsourcecode-24b9c531</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3993%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2687-cwe-79-cross-site-scripting-xss-in-r-e7e711dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2687%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Reading%20progressbar&amp;severity=medium&amp;id=69b2c3542f860ef943916443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15473-cwe-862-missing-authorization-in-ti-8824c4ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15473%3A%20CWE-862%20Missing%20Authorization%20in%20Timetics&amp;severity=medium&amp;id=69b2ca582f860ef943997cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3992-injection-in-codegenieapp-serverless-4bc669e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3992%3A%20Injection%20in%20CodeGenieApp%20serverless-express&amp;severity=medium&amp;id=69b256532f860ef94332313d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3990-cross-site-scripting-in-cesiumgs-ces-3cc6e9c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3990%3A%20Cross%20Site%20Scripting%20in%20CesiumGS%20CesiumJS&amp;severity=medium&amp;id=69b256532f860ef943323137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3984-cross-site-scripting-in-campcodes-di-3bd8c22a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3984%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Division%20Regional%20Athletic%20Meet%20Game%20Result%20Matrix%20System&amp;severity=medium&amp;id=69b252cf2f860ef9432f8fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3983-cross-site-scripting-in-campcodes-di-d143b87a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3983%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Division%20Regional%20Athletic%20Meet%20Game%20Result%20Matrix%20System&amp;severity=medium&amp;id=69b252cf2f860ef9432f8fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3982-cross-site-scripting-in-itsourcecode-6ecf9062</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3982%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b24bc72f860ef94329d5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3981-sql-injection-in-itsourcecode-online-3fe06655</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3981%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69b24bc72f860ef94329d59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3980-sql-injection-in-itsourcecode-online-6b588852</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3980%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69b241412f860ef94318ef80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3979-use-after-free-in-quickjs-ng-quickjs-4da86ea7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3979%3A%20Use%20After%20Free%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=69b236b22f860ef943fc88b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3978-stack-based-buffer-overflow-in-d-lin-18e3807e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3978%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69b236b22f860ef943fc88aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3977-missing-authorization-in-projectsend-aca59aed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3977%3A%20Missing%20Authorization%20in%20projectsend&amp;severity=medium&amp;id=69b236b22f860ef943fc88a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3976-stack-based-buffer-overflow-in-tenda-d46c36c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3976%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3975-stack-based-buffer-overflow-in-tenda-d05d15a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3975%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3226-cwe-862-missing-authorization-in-thi-acd09a45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3226%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69b22c262f860ef943edb6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3657-cwe-89-improper-neutralization-of-sp-9aa62a75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3657%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20premio%20My%20Sticky%20Bar%20%E2%80%93%20Floating%20Notification%20Bar%20%26%20Sticky%20Header%20(formerly%20myStickymenu)&amp;severity=high&amp;id=69b22c262f860ef943edb6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15038-cwe-125-out-of-bounds-read-in-asus--cbe1b081</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15038%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASUS%20ASUS%20Business%20System%20Control%20Interface&amp;severity=medium&amp;id=69b22c262f860ef943edb6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1878-cwe-494-download-of-code-without-int-6c0c8aa1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1878%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ASUS%20Driver(%20Keyboard%20%26%20Mouse%20)&amp;severity=medium&amp;id=69b22c262f860ef943edb6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3974-stack-based-buffer-overflow-in-tenda-3ff86e73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3974%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15037-cwe-732-incorrect-permission-assign-ede452fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15037%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ASUS%20ASUS%20Business%20System%20Control%20Interface&amp;severity=medium&amp;id=69b22c262f860ef943edb6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59388-cwe-259-in-qnap-systems-inc-hyper-d-f9d41b22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59388%3A%20CWE-259%20in%20QNAP%20Systems%20Inc.%20Hyper%20Data%20Protector&amp;severity=medium&amp;id=69b21e172f860ef943e393ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3973-stack-based-buffer-overflow-in-tenda-36404d80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3973%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b21e172f860ef943e393b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3972-stack-based-buffer-overflow-in-tenda-c4bbbc78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3972%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b21e172f860ef943e393b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-iot-device-logs-in-as-admin-itx3fs-too-l-1ee7e685</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20your%20IoT%20Device%20Logs%20in%20as%20Admin%2C%20It%26%23x3f%3Bs%20too%20Late%26%23x21%3B%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Mar%2011th)&amp;severity=medium&amp;id=69b216d82f860ef943ce83a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3971-stack-based-buffer-overflow-in-tenda-6d3a9072</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3971%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69b30a4f2f860ef943dbd363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3970-stack-based-buffer-overflow-in-tenda-efc7e7df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3970%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69b30a4f2f860ef943dbd35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3969-sql-injection-in-feminer-wms-e9e28958</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3969%3A%20SQL%20Injection%20in%20FeMiner%20wms&amp;severity=medium&amp;id=69b2e9fd2f860ef943be353d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3968-code-injection-in-autohomecorp-frost-dc906d39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3968%3A%20Code%20Injection%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69b2c3542f860ef943916465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3967-deserialization-in-alfresco-activiti-ec4438da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3967%3A%20Deserialization%20in%20Alfresco%20Activiti&amp;severity=medium&amp;id=69b205772f860ef9439c94a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3966-server-side-request-forgery-in-64854-7a9f914b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3966%3A%20Server-Side%20Request%20Forgery%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69b205772f860ef9439c949e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-12-12a19288</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-12&amp;severity=medium&amp;id=69b46b7a2f860ef94391c798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-12-d2659d35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-12&amp;severity=medium&amp;id=69b356c02f860ef9431a7669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25823-na-7fa89b66</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25823%3A%20n%2Fa&amp;severity=critical&amp;id=69b333cf2f860ef943fdd746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25819-na-a8d102e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25819%3A%20n%2Fa&amp;severity=high&amp;id=69b333cf2f860ef943fdd742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25818-na-3a1c622a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25818%3A%20n%2Fa&amp;severity=critical&amp;id=69b333cf2f860ef943fdd73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25817-na-cdf8c0ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25817%3A%20n%2Fa&amp;severity=high&amp;id=69b333cf2f860ef943fdd73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70245-na-3e3c2378</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70245%3A%20n%2Fa&amp;severity=high&amp;id=69b3294c2f860ef943f62dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61154-na-7755ec0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61154%3A%20n%2Fa&amp;severity=medium&amp;id=69b3294c2f860ef943f62dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26793-na-885a662b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26793%3A%20n%2Fa&amp;severity=critical&amp;id=69b30d502f860ef943de4417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70873-na-d464299c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70873%3A%20n%2Fa&amp;severity=high&amp;id=69b30d502f860ef943de4412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66955-na-224e8433</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66955%3A%20n%2Fa&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26795-na-e936710e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26795%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26794-na-db8d7433</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26794%3A%20n%2Fa&amp;severity=high&amp;id=69b302c82f860ef943d65ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26792-na-4b0f503b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26792%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26791-na-72598ba6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26791%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-12-2a7a0014</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-12&amp;severity=low&amp;id=69b295652f860ef943607383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3965-protection-mechanism-failure-in-whyo-903268fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3965%3A%20Protection%20Mechanism%20Failure%20in%20whyour%20qinglong&amp;severity=medium&amp;id=69b2c3542f860ef94391645a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2808-cwe-59-improper-link-resolution-befo-54e69108</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2808%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(Link%20Following)%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=69b1faec2f860ef94395a3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3964-os-command-injection-in-openakita-4eebd5f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3964%3A%20OS%20Command%20Injection%20in%20OpenAkita&amp;severity=medium&amp;id=69b1f7682f860ef94392e99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3963-use-of-hard-coded-cryptographic-key--825e5a85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3963%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20perfree%20go-fastdfs-web&amp;severity=medium&amp;id=69b1f7682f860ef94392e996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31988-off-by-one-error-in-thejoshwolfe-ya-91b12b49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31988%3A%20Off-by-one%20Error%20in%20thejoshwolfe%20yauzl&amp;severity=medium&amp;id=69b1f7682f860ef94392e990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3962-cross-site-scripting-in-jcharis-mach-bab8dcf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3962%3A%20Cross%20Site%20Scripting%20in%20Jcharis%20Machine-Learning-Web-Apps&amp;severity=medium&amp;id=69b1f0632f860ef9438d4fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3942-incorrect-security-ui-in-google-chro-809449ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3942%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3941-insufficient-policy-enforcement-in-g-31991683</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3941%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3940-insufficient-policy-enforcement-in-g-7e111baa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3940%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3939-insufficient-policy-enforcement-in-g-db3a4229</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3939%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3938-insufficient-policy-enforcement-in-g-a4258331</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3938%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3937-incorrect-security-ui-in-google-chro-63199e35</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3937%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3936-use-after-free-in-google-chrome-687e409a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3936%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2df702f860ef943b15ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3935-incorrect-security-ui-in-google-chro-752742df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3935%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3934-insufficient-policy-enforcement-in-g-2c861307</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3934%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3932-insufficient-policy-enforcement-in-g-0a35e8cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3932%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3931-heap-buffer-overflow-in-google-chrom-ef223c08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3931%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2df702f860ef943b15ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3930-unsafe-navigation-in-google-chrome-e5c1e63d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3930%3A%20Unsafe%20navigation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62328-cwe-1021-improper-restriction-of-re-45a03379</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62328%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20HCLSoftware%20Nomad%20server%20on%20Domino&amp;severity=low&amp;id=69b2ff142f860ef943d3c34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3929-side-channel-information-leakage-in--267deba1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3929%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=low&amp;id=69b30a4f2f860ef943dbd373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3928-insufficient-policy-enforcement-in-g-8ec6a14c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3928%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3927-incorrect-security-ui-in-google-chro-791f6273</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3927%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3926-out-of-bounds-read-in-google-chrome-e2d2ad3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3926%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3925-incorrect-security-ui-in-google-chro-6b9c2f67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3925%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3924-use-after-free-in-google-chrome-aed7be91</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3924%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef943916456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3923-use-after-free-in-google-chrome-50402a92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3923%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef943916452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3922-use-after-free-in-google-chrome-b0d39043</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3922%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef94391644e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3921-use-after-free-in-google-chrome-62791b9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3921%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef94391644a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3920-out-of-bounds-memory-access-in-googl-31d6b34c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3920%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3919-use-after-free-in-google-chrome-9af16b10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3919%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3918-use-after-free-in-google-chrome-9ef1326e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3918%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3917-use-after-free-in-google-chrome-71a58bd0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3917%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3916-out-of-bounds-read-in-google-chrome-0673a67d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3916%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=critical&amp;id=69b30a512f860ef943dbd42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3915-heap-buffer-overflow-in-google-chrom-e216428c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3915%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3914-integer-overflow-in-google-chrome-950479b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3914%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a4f2f860ef943dbd37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3913-heap-buffer-overflow-in-google-chrom-8cf7ead7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3913%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a4f2f860ef943dbd37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3961-server-side-request-forgery-in-zyddn-d3b2c62a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3961%3A%20Server-Side%20Request%20Forgery%20in%20zyddnys%20manga-image-translator&amp;severity=medium&amp;id=69b30a522f860ef943dbd4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32133-cwe-918-server-side-request-forgery-6d76d5cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32133%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Bubka%202FAuth&amp;severity=high&amp;id=69b1e5dd2f860ef94384a33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32136-cwe-287-improper-authentication-in--91bc9287</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32136%3A%20CWE-287%3A%20Improper%20Authentication%20in%20AdguardTeam%20AdGuardHome&amp;severity=critical&amp;id=69b1e5dd2f860ef94384a33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3959-os-command-injection-in-0xkoda-wirem-1d3e6508</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3959%3A%20OS%20Command%20Injection%20in%200xKoda%20WireMCP&amp;severity=medium&amp;id=69b1e5dd2f860ef94384a348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3958-server-side-request-forgery-in-woaha-1c324814</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3958%3A%20Server-Side%20Request%20Forgery%20in%20Woahai321%20ListSync&amp;severity=medium&amp;id=69b1e5dd2f860ef94384a341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32128-cwe-184-incomplete-list-of-disallow-46446d35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32128%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69b1e24f2f860ef943814c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32117-cwe-79-improper-neutralization-of-i-425bdca8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32117%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ekacnet%20grafanacubism-panel&amp;severity=high&amp;id=69b1e24f2f860ef943814c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27591-cwe-284-improper-access-control-in--eac8002f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27591%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wintercms%20winter&amp;severity=critical&amp;id=69b1e24f2f860ef943814c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3957-sql-injection-in-xierongwkhd-weimai--648696b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3957%3A%20SQL%20Injection%20in%20xierongwkhd%20weimai-wetapp&amp;severity=medium&amp;id=69b1db482f860ef9437ae350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32112-cwe-79-improper-neutralization-of-i-e6caf05a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homeassistant-ai%20ha-mcp&amp;severity=medium&amp;id=69b1d7c72f860ef94378fdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32111-cwe-918-server-side-request-forgery-65cc1f87</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32111%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homeassistant-ai%20ha-mcp&amp;severity=medium&amp;id=69b1d7c72f860ef94378fdcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32110-cwe-918-server-side-request-forgery-60e05017</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32110%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69b1d7c72f860ef94378fdcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3956-sql-injection-in-xierongwkhd-weimai--fcc59d65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3956%3A%20SQL%20Injection%20in%20xierongwkhd%20weimai-wetapp&amp;severity=medium&amp;id=69b1d4422f860ef9437718ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3955-code-injection-in-elecv2p-8cd8ad16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3955%3A%20Code%20Injection%20in%20elecV2P&amp;severity=medium&amp;id=69b1d4422f860ef9437718a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2640-cwe-269-improper-privilege-managemen-e95ab468</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2640%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Lenovo%20PC%20Manager&amp;severity=medium&amp;id=69b1d4422f860ef9437718a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1717-cwe-88-improper-neutralization-of-ar-cb1d4268</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1717%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef94377184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1716-cwe-88-improper-neutralization-of-ar-14e492a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1716%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef943771847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1715-cwe-88-improper-neutralization-of-ar-b8774eec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1715%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef943771843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1653-cwe-369-divide-by-zero-in-lenovo-sma-2246780a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1653%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20Lenovo%20Smart%20Connect&amp;severity=medium&amp;id=69b1d4402f860ef943771840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1652-cwe-122-heap-based-buffer-overflow-i-f6353da2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1652%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Lenovo%20Smart%20Connect&amp;severity=medium&amp;id=69b1d4402f860ef94377183d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0940-cwe-665-improper-initialization-in-l-1e8a6587</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0940%3A%20CWE-665%3A%20Improper%20Initialization%20in%20Lenovo%20ThinkPad%20T14%20Gen%205%20BIOS&amp;severity=high&amp;id=69b1d4402f860ef943771837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2368-cwe-295-improper-certificate-validat-34870dff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2368%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20FileZ&amp;severity=high&amp;id=69b1d4402f860ef94377184f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1068-cwe-295-improper-certificate-validat-9db0aa86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1068%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20FileZ&amp;severity=medium&amp;id=69b1d4402f860ef94377183a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0520-cwe-532-insertion-of-sensitive-infor-ef53dc0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0520%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Lenovo%20FileZ&amp;severity=low&amp;id=69b1d4402f860ef943771834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32109-cwe-79-improper-neutralization-of-i-b3c947c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32109%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=low&amp;id=69b1d0c22f860ef94375752b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32108-cwe-863-incorrect-authorization-in--b3b79436</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32108%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%209001%20copyparty&amp;severity=low&amp;id=69b1d0c22f860ef943757528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32104-cwe-639-authorization-bypass-throug-275920a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32104%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef943757522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32106-cwe-269-improper-privilege-manageme-b98c7a31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32106%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef943757525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32103-cwe-639-authorization-bypass-throug-677e6d72</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32103%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef94375751f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32101-cwe-863-incorrect-authorization-in--952207f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32101%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20%40studiocms%20s3-storage&amp;severity=high&amp;id=69b1d0c22f860ef94375751c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3954-path-traversal-in-openbmb-xagent-fb861de9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3954%3A%20Path%20Traversal%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69b1cd382f860ef943720755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32234-cwe-89-improper-neutralization-of-s-dd3557bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32234%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1cd382f860ef943720750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32098-cwe-200-exposure-of-sensitive-infor-ba6a965b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32098%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1cd382f860ef94372074b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32097-cwe-639-authorization-bypass-throug-8831b524</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32097%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20comppolicylab%20pingpong&amp;severity=high&amp;id=69b1cd382f860ef943720748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32096-cwe-918-server-side-request-forgery-4e688d7e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32096%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20useplunk%20plunk&amp;severity=critical&amp;id=69b1cd382f860ef943720744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32095-cwe-79-improper-neutralization-of-i-683938fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32095%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20useplunk%20plunk&amp;severity=medium&amp;id=69b1cd382f860ef943720741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32094-cwe-200-exposure-of-sensitive-infor-d09e40d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32094%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ericcornelissen%20shescape&amp;severity=medium&amp;id=69b1cd382f860ef94372073d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31979-cwe-59-improper-link-resolution-bef-4ecb1ff2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31979%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20himmelblau-idm%20himmelblau&amp;severity=high&amp;id=69b1c9b82f860ef9436f46ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31976-cwe-506-embedded-malicious-code-in--7bdbb65f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31976%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20xygeni%20xygeni-action&amp;severity=critical&amp;id=69b1c9b82f860ef9436f46e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31974-cwe-918-server-side-request-forgery-e24e73ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31974%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opf%20openproject&amp;severity=low&amp;id=69b1c9b82f860ef9436f46e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27703-cwe-787-out-of-bounds-write-in-riot-9f9f0e2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27703%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20RIOT-OS%20RIOT&amp;severity=high&amp;id=69b1c9b82f860ef9436f46e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31961-cwe-770-allocation-of-resources-wit-7b2d6a47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31961%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3951-cross-site-scripting-in-lockerprojec-e61e3138</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3951%3A%20Cross%20Site%20Scripting%20in%20LockerProject%20Locker&amp;severity=medium&amp;id=69b1c6312f860ef9436c35fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31960-cwe-770-allocation-of-resources-wit-3b284858</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31960%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31959-cwe-918-server-side-request-forgery-ed587800</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31959%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31958-cwe-400-uncontrolled-resource-consu-93042686</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31958%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=69b1c6312f860ef9436c35eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31957-cwe-1188-insecure-default-initializ-e7809765</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31957%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20himmelblau-idm%20himmelblau&amp;severity=critical&amp;id=69b1c6312f860ef9436c35e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31901-cwe-204-observable-response-discrep-218df620</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31901%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1c6312f860ef9436c35e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31900-cwe-20-improper-input-validation-in-edbd8e2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31900%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20psf%20black&amp;severity=high&amp;id=69b1c6312f860ef9436c35dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31896-cwe-89-improper-neutralization-of-s-90bf525e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31896%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69b1c2ac2f860ef943697e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31895-cwe-89-improper-neutralization-of-s-8ec6b871</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31895%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69b1c2ac2f860ef943697e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31894-cwe-59-improper-link-resolution-bef-273e74f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31894%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3950-out-of-bounds-read-in-strukturag-lib-c710b92d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3950%3A%20Out-of-Bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24510-cwe-269-improper-privilege-manageme-c60c1a34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24510%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31889-cwe-290-authentication-bypass-by-sp-9a902af4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31889%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20shopware%20core&amp;severity=high&amp;id=69b1c2ac2f860ef943697e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24508-cwe-295-improper-certificate-valida-35144bc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24508%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=low&amp;id=69b1c2ac2f860ef943697e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31888-cwe-204-observable-response-discrep-3a60d5fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31888%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20shopware%20core&amp;severity=medium&amp;id=69b1bba82f860ef94362bfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24509-cwe-284-improper-access-control-in--f38b1b80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24509%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=low&amp;id=69b1bba82f860ef94362bfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31887-cwe-863-incorrect-authorization-in--092202e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31887%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20shopware%20core&amp;severity=high&amp;id=69b1bba82f860ef94362bfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3949-out-of-bounds-read-in-strukturag-lib-5bf25418</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3949%3A%20Out-of-Bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=69b1b88a2f860ef943602144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31876-cwe-79-improper-neutralization-of-i-82d78847</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31876%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20notesnook&amp;severity=medium&amp;id=69b1b88a2f860ef943602140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31875-cwe-672-operation-on-a-resource-aft-92224a64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31875%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b1b88a2f860ef943602166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0231-cwe-497-exposure-of-sensitive-system-2d07855f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0231%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=69b1b88a2f860ef943602151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31872-cwe-284-improper-access-control-in--6ddaf3fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31872%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b1b88a2f860ef943602161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0230-cwe-754-improper-check-for-unusual-o-1c766041</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0230%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=69b1b88a2f860ef94360214e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31871-cwe-89-improper-neutralization-of-s-b26a259b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31871%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1b88a2f860ef94360215c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31870-cwe-248-uncaught-exception-in-yhiro-528175cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31870%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69b1b88a2f860ef943602159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31868-cwe-79-improper-neutralization-of-i-07f6fa3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31868%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1b88a2f860ef943602154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31867-cwe-639-authorization-bypass-throug-c2789827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31867%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69b1b88b2f860ef9436021cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31866-cwe-770-allocation-of-resources-wit-c8bbc737</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31866%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-feature%20flagd&amp;severity=high&amp;id=69b1b88b2f860ef9436021cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30226-cwe-1321-improperly-controlled-modi-8604fba8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30226%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sveltejs%20devalue&amp;severity=medium&amp;id=69b1b88a2f860ef94360216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31863-cwe-307-improper-restriction-of-exc-8cc9caca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31863%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20anyproto%20anytype-heart&amp;severity=low&amp;id=69b1b88b2f860ef9436021c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31859-cwe-79-improper-neutralization-of-i-e1757a3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31859%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69b1b88b2f860ef9436021c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31858-cwe-89-improper-neutralization-of-s-88a77bb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31858%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b1b88b2f860ef9436021c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31857-cwe-94-improper-control-of-generati-b827dfaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31857%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b1aa112f860ef943525d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31975-cwe-78-improper-neutralization-of-s-a38c6f04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31975%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=high&amp;id=69b1aa112f860ef943525d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31861-cwe-94-improper-control-of-generati-57615f72</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31861%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=high&amp;id=69b1aa112f860ef943525d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31862-cwe-78-improper-neutralization-of-s-27a2b874</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31862%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=critical&amp;id=69b1aa112f860ef943525d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31856-cwe-89-improper-neutralization-of-s-9159e344</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31856%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1aa112f860ef943525d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31852-cwe-269-improper-privilege-manageme-1e9d6b5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31852%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20jellyfin%20code-quality.yml&amp;severity=critical&amp;id=69b1b88b2f860ef9436021d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31840-cwe-89-improper-neutralization-of-s-ae48a02e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31840%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1b88b2f860ef9436021d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31839-cwe-354-improper-validation-of-inte-928c10e1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31839%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20striae-org%20striae&amp;severity=high&amp;id=69b19f882f860ef9434a76cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31813-cwe-290-authentication-bypass-by-sp-c3c5f69f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31813%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20supabase%20auth&amp;severity=medium&amp;id=69b19f882f860ef9434a76cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30868-cwe-352-cross-site-request-forgery--7f200187</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30868%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20opnsense%20core&amp;severity=medium&amp;id=69b19f882f860ef9434a76c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20118-improper-cleanup-on-thrown-exceptio-decbeee1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20118%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=69b19f882f860ef9434a76c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20117-improper-neutralization-of-input-du-1b81cde1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20117%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=69b19f882f860ef9434a76c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20116-improper-neutralization-of-input-du-5d1d53fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20116%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=69b19f882f860ef9434a76c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20046-permissions-privileges-and-access-c-8ac8ec84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20046%3A%20Permissions%2C%20Privileges%2C%20and%20Access%20Control%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20074-improper-validation-of-specified-ty-cb4cdc42</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20074%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20040-improper-neutralization-of-special--28cef64a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20040%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1471-cwe-863-incorrect-authorization-in-n-5b0adb08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1471%3A%20CWE-863%20Incorrect%20Authorization%20in%20Neo4j%20Enterprise%20edition&amp;severity=low&amp;id=69b19f882f860ef9434a76b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30239-cwe-863-incorrect-authorization-in--ed065581</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30239%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30236-cwe-863-incorrect-authorization-in--4fd2e91c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30236%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medtech-giant-stryker-crippled-by-iran-linked-hack-953234d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MedTech%20Giant%20Stryker%20Crippled%20by%20Iran-Linked%20Hacker%20Attack&amp;severity=medium&amp;id=69b198492f860ef9433c9548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20163-the-software-constructs-all-or-part-9c53cba7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20163%3A%20The%20software%20constructs%20all%20or%20part%20of%20a%20command%20using%20externally-influenced%20input%20from%20an%20upstream%20component%2C%20but%20it%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20special%20elements%20that%20could%20modify%20the%20intended%20command%20when%20it%20is%20sent%20to%20a%20downstream%20component.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69b198902f860ef9433d35e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20162-the-software-does-not-neutralize-or-5dd46d0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20162%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20166-the-product-exposes-sensitive-infor-a841b7c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20166%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20164-the-product-exposes-sensitive-infor-98853a72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20164%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20165-information-written-to-log-files-ca-f88941b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20165%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3429-improper-access-control-in-red-hat-r-689d9289</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3429%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69b198902f860ef9433d35fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1524-cwe-863-incorrect-authorization-in-n-a1518306</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1524%3A%20CWE-863%20Incorrect%20Authorization%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69b1988f2f860ef9433d150f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30235-cwe-79-improper-neutralization-of-i-dd14d40c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30235%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30234-cwe-22-improper-limitation-of-a-pat-90813fd6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30234%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20opf%20openproject&amp;severity=medium&amp;id=69b194fa2f860ef943342469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28803-cwe-284-improper-access-control-in--4f7bbe07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28803%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20open-formulieren%20open-forms&amp;severity=medium&amp;id=69b194fa2f860ef943342466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1497-cwe-863-incorrect-authorization-in-n-7ddf9448</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1497%3A%20CWE-863%20Incorrect%20Authorization%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69b194fa2f860ef943342463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31892-cwe-863-incorrect-authorization-in--a88b5d70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31892%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=69b1917d2f860ef9432c8e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28229-cwe-863-incorrect-authorization-in--f1c60bd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28229%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20argoproj%20argo-workflows&amp;severity=critical&amp;id=69b1917d2f860ef9432c8e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12690-cwe-250-execution-with-unnecessary--e81ca7a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12690%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20Forcepoint%20NGFW%20Engine&amp;severity=high&amp;id=69b1917d2f860ef9432c8e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27897-cwe-22-improper-limitation-of-a-pat-e3daa46c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27897%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WanderingAstronomer%20Vociferous&amp;severity=critical&amp;id=69b1917d2f860ef9432c8e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22248-cwe-502-deserialization-of-untruste-1db54bf0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22248%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69b1917d2f860ef9432c8e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-conflict-drives-heightened-espionage-activity-8e0cdf7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20conflict%20drives%20heightened%20espionage%20activity%20against%20Middle%20East%20targets&amp;severity=medium&amp;id=69b7d24e9d4df45183475a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32229-cwe-290-in-jetbrains-hub-d8b40e32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32229%3A%20CWE-290%20in%20JetBrains%20Hub&amp;severity=medium&amp;id=69b186eb2f860ef9431291d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3946-cross-site-scripting-in-phpems-703668cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3946%3A%20Cross%20Site%20Scripting%20in%20PHPEMS&amp;severity=medium&amp;id=69b186eb2f860ef9431291d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30903-cwe-73-external-control-of-file-nam-9bcbc0fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30903%3A%20CWE-73%20External%20control%20of%20file%20name%20or%20path%20in%20Zoom%20Communications%20Zoom%20Workplace&amp;severity=critical&amp;id=69b186eb2f860ef9431291cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30902-cwe-269-improper-privilege-manageme-b4150bc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30902%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=69b186eb2f860ef9431291ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30901-cwe-20-improper-input-validation-in-d71d0f92</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30901%3A%20CWE-20%20Improper%20input%20validation%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=high&amp;id=69b186eb2f860ef9431291c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30900-cwe-754-improper-check-for-unusual--7c59c0ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30900%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=69b183692f860ef9430a87e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/238000-impacted-by-bell-ambulance-data-breach-8a14bb51</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=238%2C000%20Impacted%20by%20Bell%20Ambulance%20Data%20Breach&amp;severity=medium&amp;id=69b1719c2f860ef943cd4ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3496-cwe-89-improper-neutralization-of-sp-f54d6727</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3496%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetBooking&amp;severity=high&amp;id=69b171e72f860ef943cd659c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3904-cwe-366-race-condition-within-a-thre-3c00b05d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3904%3A%20CWE-366%20Race%20condition%20within%20a%20thread%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69b171e72f860ef943cd65a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3944-sql-injection-in-itsourcecode-univer-51d5eea3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3944%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b163bf2f860ef943c23223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3943-command-injection-in-h3c-acg1000-ak2-385a93b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3943%3A%20Command%20Injection%20in%20H3C%20ACG1000-AK230&amp;severity=medium&amp;id=69b163bf2f860ef943c2321d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-ivanti-intel-patch-high-severity-vulnerab-6eed7f7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%2C%20Ivanti%2C%20Intel%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69b15c862f860ef943bdbb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-10x-your-vulnerability-management-program-i-9e653e42</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%2010x%20Your%20Vulnerability%20Management%20Program%20in%20the%20Agentic%20Era&amp;severity=medium&amp;id=69b15c862f860ef943bdbb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/michelin-confirms-data-breach-linked-to-oracle-ebs-6db6f397</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Michelin%20Confirms%20Data%20Breach%20Linked%20to%20Oracle%20EBS%20Attack&amp;severity=medium&amp;id=69b151f92f860ef943b5520d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beatbanker-and-btmob-trojans-infection-techniques--c2f45e9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeatBanker%20and%20BTMOB%20trojans%3A%20infection%20techniques%20and%20how%20to%20stay%20safe%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b1d0172f860ef94375071d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/middle-east-crisis-exploited-by-fraudsters-governm-f86a46d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Middle%20East%20Crisis%20Exploited%20by%20Fraudsters%3A%20Government%20Impersonation%20and%20Evacuation%20Scam%20Infrastructure%20Identified&amp;severity=medium&amp;id=69b933a8771bdb17499de646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castlerat-attack-first-to-abuse-deno-javascript-ru-260b4856</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleRAT%20attack%20first%20to%20abuse%20Deno%20JavaScript%20runtime%20to%20evade%20enterprise%20security&amp;severity=medium&amp;id=69b7c7d69d4df451833e08e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3178-cwe-79-improper-neutralization-of-in-e5f2762b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeroenpeters1986%20Name%20Directory&amp;severity=high&amp;id=69b1523c2f860ef943b572b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kadnap-malware-turning-asus-routers-into-botnets-71871166</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KadNap%20Malware%20Turning%20Asus%20Routers%20Into%20Botnets&amp;severity=medium&amp;id=69b140632f860ef9439004e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-zombie-zip-files-cve-2026-0866-wed-mar-1-4a802635</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20%22Zombie%20Zip%22%20Files%20(CVE-2026-0866)%2C%20(Wed%2C%20Mar%2011th)&amp;severity=medium&amp;id=69b1d0472f860ef943751945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blacksanta-malware-activates-edr-and-av-killer-bef-26cabb98</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98BlackSanta%E2%80%99%20Malware%20Activates%20EDR%20and%20AV%20Killer%20Before%20Detonating%20Payload&amp;severity=medium&amp;id=69b1395c2f860ef94389f066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3231-cwe-79-improper-neutralization-of-in-46fc345a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehigh%20Checkout%20Field%20Editor%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=high&amp;id=69b139a22f860ef9438a0d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3906-cwe-862-missing-authorization-in-wor-9947b784</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3906%3A%20CWE-862%20Missing%20Authorization%20in%20WordPress%20Foundation%20WordPress&amp;severity=medium&amp;id=69b139a22f860ef9438a0d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1992-cwe-639-authorization-bypass-through-abde304f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1992%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69b139a22f860ef9438a0d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1993-cwe-269-improper-privilege-managemen-24b1c442</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1993%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69b139a22f860ef9438a0d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1454-cwe-79-improper-neutralization-of-in-c99aaf23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1454%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehunk%20Lead%20Form%20Builder%20%26%20Contact%20Form&amp;severity=high&amp;id=69b12b822f860ef94376110d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14026-cwe-78-in-qnap-systems-inc-qts-04698809</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14026%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=69b124772f860ef943643f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14025-cwe-89-in-qnap-systems-inc-video-st-dfdabf28</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14025%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Video%20Station&amp;severity=low&amp;id=69b124772f860ef943643f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14024-cwe-295-in-qnap-systems-inc-video-s-51816644</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14024%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20Video%20Station&amp;severity=low&amp;id=69b124772f860ef943643f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-b89a8949</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Fixed%20by%20Siemens%2C%20Schneider%2C%20Moxa%2C%20Mitsubishi%20Electric&amp;severity=medium&amp;id=69b120c12f860ef9435b03c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2917-cwe-639-authorization-bypass-through-c3ec0b8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2917%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b121032f860ef9435ba546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3903-cwe-352-cross-site-request-forgery-c-73f3bf67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3903%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20modulards%20Modular%20DS%3A%20Monitor%2C%20update%2C%20and%20backup%20multiple%20websites&amp;severity=medium&amp;id=69b121032f860ef9435ba556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1708-cwe-89-improper-neutralization-of-sp-91722cf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1708%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69b121032f860ef9435ba53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2918-cwe-639-authorization-bypass-through-17a3f525</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2918%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b121032f860ef9435ba54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3534-cwe-79-improper-neutralization-of-in-83a4f3a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3534%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Astra&amp;severity=medium&amp;id=69b112e52f860ef943422837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3826-cwe-98-improper-control-of-filename--e68c5a28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3826%3A%20CWE-98%20Improper%20control%20of%20filename%20for%20Include%2FRequire%20statement%20in%20PHP%20program%20(&apos;PHP%20remote%20file%20inclusion&apos;)%20in%20WellChoose%20IFTOP&amp;severity=critical&amp;id=69b112e62f860ef943422847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3825-cwe-79-improper-neutralization-of-in-641f3f35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3825%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20WellChoose%20IFTOP&amp;severity=medium&amp;id=69b112e62f860ef943422843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31844-cwe-89-improper-neutralization-of-s-fae24db9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31844%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Koha%20Community%20Koha&amp;severity=high&amp;id=69b112e52f860ef943422834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3824-cwe-601-url-redirection-to-untrusted-e8697e70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3824%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20WellChoose%20IFTOP&amp;severity=medium&amp;id=69b112e62f860ef94342283f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-oauth-device-code-phishing-5c00f553</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20OAuth%20Device%20Code%20Phishing&amp;severity=medium&amp;id=69b143e72f860ef94397fe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2631-cwe-269-improper-privilege-managemen-beccaec0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2631%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Datalogics%20Ecommerce%20Delivery&amp;severity=critical&amp;id=69b108572f860ef94335d440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2626-cwe-502-deserialization-of-untrusted-6caf0aad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2626%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20divi-booster&amp;severity=high&amp;id=69b108572f860ef94335d43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2466-cwe-79-cross-site-scripting-xss-in-d-1e292536</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2466%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20DukaPress&amp;severity=high&amp;id=69b108572f860ef94335d43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1867-cwe-200-information-exposure-in-gues-73b4347e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1867%3A%20CWE-200%20Information%20Exposure%20in%20Guest%20posting%20%2F%20Frontend%20Posting%20%2F%20Front%20Editor&amp;severity=medium&amp;id=69b108572f860ef94335d437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1753-cwe-639-authorization-bypass-through-f27a895c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1753%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Gutena%20Forms&amp;severity=medium&amp;id=69b108572f860ef94335d434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3911-exposure-of-private-personal-informa-7285863b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3911%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69b104d42f860ef943326c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2707-cwe-79-improper-neutralization-of-in-1a1d8fa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2707%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldgrid%20weForms%20%E2%80%93%20Easy%20Drag%20%26%20Drop%20Contact%20Form%20Builder%20For%20WordPress&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3222-cwe-89-improper-neutralization-of-sp-3eef23b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3222%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=69b0fdcf2f860ef9432e28ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2358-cwe-79-improper-neutralization-of-in-aadc0e97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2358%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alimir%20WP%20ULike%20%E2%80%93%20Like%20%26%20Dislike%20Buttons%20for%20Engagement%20and%20Feedback&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27842-authentication-bypass-using-an-alte-4a1f7ba8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27842%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=critical&amp;id=69b0fdcf2f860ef9432e28d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24448-use-of-hard-coded-credentials-in-mi-455b658d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24448%3A%20Use%20of%20hard-coded%20credentials%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=critical&amp;id=69b0fdcf2f860ef9432e28d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20892-code-injection-in-micro-research-lt-9d6b477d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20892%3A%20Code%20injection%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=high&amp;id=69b0fdcf2f860ef9432e28d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3884-cross-site-scripting-xss-in-spinjs-fd57032d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3884%3A%20Cross-site%20Scripting%20(XSS)%20in%20spin.js&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13067-cwe-434-unrestricted-upload-of-file-9f3e7849</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13067%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=high&amp;id=69b0efc52f860ef943185a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2413-cwe-89-improper-neutralization-of-sp-3cc7e9f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2413%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20elemntor%20Ally%20%E2%80%93%20Web%20Accessibility%20%26%20Usability&amp;severity=high&amp;id=69b0efc52f860ef943185a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29515-cwe-303-incorrect-implementation-of-ff84fc0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29515%3A%20CWE-303%20Incorrect%20implementation%20of%20authentication%20algorithm%20in%20MiCode%20FileExplorer&amp;severity=critical&amp;id=69b0e8b62f860ef943102174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23817-vulnerability-in-hewlett-packard-en-5631bf85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23817%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=medium&amp;id=69b0e8b62f860ef943102171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23816-vulnerability-in-hewlett-packard-en-f75f54e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23816%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef94310216e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23815-vulnerability-in-hewlett-packard-en-630530fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23815%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef94310216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23814-vulnerability-in-hewlett-packard-en-e0f88dd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23814%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef943102168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23813-vulnerability-in-hewlett-packard-en-bce16d68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23813%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=critical&amp;id=69b0e8b62f860ef943102165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3453-cwe-639-authorization-bypass-through-41f4f93e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3453%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=high&amp;id=69b0de292f860ef9430a0afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21291-cross-site-scripting-stored-xss-cwe-3d41cde9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21291%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21293-server-side-request-forgery-ssrf-cw-90c28adc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21293%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21282-improper-input-validation-cwe-20-in-a8641567</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21282%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21286-incorrect-authorization-cwe-863-in--83d31496</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21286%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21294-server-side-request-forgery-ssrf-cw-2145ce76</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21294%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21284-cross-site-scripting-stored-xss-cwe-91191b9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21284%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21297-incorrect-authorization-cwe-863-in--5c202651</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21297%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21359-incorrect-authorization-cwe-863-in--f32386b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21359%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21309-incorrect-authorization-cwe-863-in--80c62d9c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21309%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21292-cross-site-scripting-stored-xss-cwe-734da7f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21292%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21310-improper-input-validation-cwe-20-in-7fe81d1f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21310%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21285-incorrect-authorization-cwe-863-in--6bb8f61d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21285%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21290-cross-site-scripting-stored-xss-cwe-2715abb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21290%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21289-incorrect-authorization-cwe-863-in--83fd635f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21289%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21361-cross-site-scripting-stored-xss-cwe-be6d2519</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21361%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21360-improper-limitation-of-a-pathname-t-0f35b82f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21360%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21296-incorrect-authorization-cwe-863-in--71f95566</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21296%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21311-cross-site-scripting-stored-xss-cwe-8238eb6d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21311%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21295-url-redirection-to-untrusted-site-o-16a56e2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21295%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20(CWE-601)%20in%20Adobe%20Adobe%20Commerce&amp;severity=low&amp;id=69b0de292f860ef9430a0ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12473-cwe-79-improper-neutralization-of-i-2a6f769c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12473%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rometheme%20RTMKit&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2324-cwe-352-cross-site-request-forgery-c-13e6dde4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2324%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1781-cwe-862-missing-authorization-in-dva-c640e5a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1781%3A%20CWE-862%20Missing%20Authorization%20in%20dvankooten%20MC4WP%3A%20Mailchimp%20for%20WordPress&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27241-cross-site-scripting-stored-xss-cwe-e3d79025</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27241%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27255-cross-site-scripting-stored-xss-cwe-c7b3c2ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27255%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27244-cross-site-scripting-stored-xss-cwe-e47a6dc5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27244%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27251-cross-site-scripting-stored-xss-cwe-73b1726e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27251%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27223-cross-site-scripting-stored-xss-cwe-bec05048</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27223%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27263-cross-site-scripting-stored-xss-cwe-10cfe83f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27263&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27262-cross-site-scripting-stored-xss-cwe-020c85ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27262%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27261-cross-site-scripting-stored-xss-cwe-57935d09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27261&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27232-cross-site-scripting-stored-xss-cwe-dbe9271e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27232%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27249-cross-site-scripting-stored-xss-cwe-3a157720</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27249%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27247-cross-site-scripting-dom-based-xss--dfb069c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27247%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27242-cross-site-scripting-stored-xss-cwe-eb28f710</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27242%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27252-cross-site-scripting-stored-xss-cwe-27028954</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27252%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27235-cross-site-scripting-stored-xss-cwe-78c18807</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27235%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27225-cross-site-scripting-stored-xss-cwe-4fb82607</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27225%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27256-cross-site-scripting-stored-xss-cwe-c97af280</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27256%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27260-cross-site-scripting-stored-xss-cwe-ca7563dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27260&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27237-cross-site-scripting-stored-xss-cwe-26b46177</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27237%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27265-cross-site-scripting-stored-xss-cwe-17d23e90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27265%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27233-cross-site-scripting-stored-xss-cwe-de63556d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27233%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27236-cross-site-scripting-stored-xss-cwe-48c489ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27236%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27240-cross-site-scripting-stored-xss-cwe-51fff64f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27240%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27239-cross-site-scripting-stored-xss-cwe-eaeb950d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27239%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27234-cross-site-scripting-stored-xss-cwe-d54737c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27234%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27259-cross-site-scripting-stored-xss-cwe-272afcac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27259&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27231-cross-site-scripting-stored-xss-cwe-840d33f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27231%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27264-cross-site-scripting-stored-xss-cwe-4cf95917</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27264&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27230-cross-site-scripting-stored-xss-cwe-2da5dfa8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27230%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27229-cross-site-scripting-stored-xss-cwe-6e8f5926</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27229%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27266-cross-site-scripting-stored-xss-cwe-1b2aa55d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27266%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27254-cross-site-scripting-stored-xss-cwe-ddda00f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27254%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27228-cross-site-scripting-stored-xss-cwe-a86793cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27228%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27248-cross-site-scripting-stored-xss-cwe-1aa0d2cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27248%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27257-cross-site-scripting-stored-xss-cwe-1a20c357</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27257%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27226-cross-site-scripting-stored-xss-cwe-20b5adcd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27226%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27253-cross-site-scripting-stored-xss-cwe-bf27f658</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27253%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27224-cross-site-scripting-stored-xss-cwe-369e2d82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27224%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27250-cross-site-scripting-stored-xss-cwe-47871a60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27250%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-11-38f0e8ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-11&amp;severity=medium&amp;id=69b205402f860ef9439bca45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70041-na-ac29e404</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70041%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d7c72f860ef94378fdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70024-na-0548f027</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70024%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d4402f860ef94377182f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66956-na-361ffc2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66956%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d0c22f860ef943757517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70082-na-40a1d15e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70082%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d150a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68623-na-988346cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68623%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d1505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67041-na-6e95bb25</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67041%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d1500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67039-na-7e165db4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67039%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67038-na-642f82a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67038%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67037-na-ccafdfee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67037%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67036-na-a8c80856</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67036%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67035-na-376cd6ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67035%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67034-na-e3e1ba63</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67034%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30741-na-35d95b25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30741%3A%20n%2Fa&amp;severity=critical&amp;id=69b194fa2f860ef94334246c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67298-na-23778477</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67298%3A%20n%2Fa&amp;severity=high&amp;id=69b186eb2f860ef9431291c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70330-na-4afa6ce5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70330%3A%20n%2Fa&amp;severity=low&amp;id=69b183692f860ef9430a87de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70027-na-b6816533</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70027%3A%20n%2Fa&amp;severity=high&amp;id=69b17c642f860ef943f8b119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-11-3af3869f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-11&amp;severity=medium&amp;id=69b1751d2f860ef943cfc2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-11-66c38b04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-11&amp;severity=low&amp;id=69b0e4f92f860ef9430e38ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2569-cwe-79-improper-neutralization-of-in-d80ea1e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dearhive%20Dear%20Flipbook%20%E2%80%93%20PDF%20Flipbook%2C%203D%20Flipbook%2C%20PDF%20embed%2C%20PDF%20viewer&amp;severity=medium&amp;id=69b0acf02f860ef943e36226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27270-out-of-bounds-read-cwe-125-in-adobe-f1de6725</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27270%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69b0a5e82f860ef943dd6b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27271-heap-based-buffer-overflow-cwe-122--6508905d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27271%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21333-untrusted-search-path-cwe-426-in-ad-6ec6c0d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21333%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27268-out-of-bounds-read-cwe-125-in-adobe-2889ba56</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27268%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69b0a5e82f860ef943dd6b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21362-out-of-bounds-write-cwe-787-in-adob-d9ffb819</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21362%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27272-out-of-bounds-write-cwe-787-in-adob-b2062b24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27272%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27267-stack-based-buffer-overflow-cwe-121-b7b786ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27267%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22850-information-disclosure-in-intelr-re-bf19ed93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22850%3A%20Information%20Disclosure%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20information%20disclosure.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20exposure.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daaa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22444-information-disclosure-in-intelr-re-1a61e87f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22444%3A%20Information%20Disclosure%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20information%20disclosure.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20exposure.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daa9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20105-escalation-of-privilege-in-intelr-r-d3541982</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20105%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20low%20complexity%20attack%20may%20enable%20local%20code%20execution.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20073-information-disclosure-in-intelr-re-8e917e6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20073%3A%20Information%20Disclosure%20in%20Intel(R)%20Reference%20Platforms&amp;severity=low&amp;id=69b0a2672f860ef943daa9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20068-escalation-of-privilege-in-intelr-r-a31dde9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20068%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20064-escalation-of-privilege-in-intelr-r-b72354ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20064%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20local%20code%20execution.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20028-escalation-of-privilege-in-intelr-r-8b5df3e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20028%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20027-escalation-of-privilege-in-intelr-r-ac01f83a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20027%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20005-escalation-of-privilege-in-intelr-r-17136448</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20005%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20manipulation.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(low)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daa9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20096-escalation-of-privilege-in-intel-re-4e321b78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20096%3A%20Escalation%20of%20Privilege%20in%20Intel%20Reference%20Platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20manipulation.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20active%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=medium&amp;id=69b09ee22f860ef943d62fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31834-cwe-269-improper-privilege-manageme-405c91d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31834%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20umbraco%20Umbraco-CMS&amp;severity=high&amp;id=69b094562f860ef943cc190d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31833-cwe-79-improper-neutralization-of-i-bd0cf56c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31833%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69b094562f860ef943cc190a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31832-cwe-639-authorization-bypass-throug-58061dc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31832%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69b094562f860ef943cc1907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31830-cwe-252-unchecked-return-value-in-s-e783b2ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31830%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20sigstore%20sigstore-ruby&amp;severity=high&amp;id=69b094562f860ef943cc1904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31829-cwe-918-server-side-request-forgery-c90afb2e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31829%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69b18a712f860ef9431b626c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31828-cwe-90-improper-neutralization-of-s-a8a27177</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31828%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b194fa2f860ef943342479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27221-improper-certificate-validation-cwe-74d41f50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27221%3A%20Improper%20Certificate%20Validation%20(CWE-295)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69b0efc52f860ef943185a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27278-use-after-free-cwe-416-in-adobe-acr-65cc0110</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27278%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69b178e02f860ef943e659be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27220-use-after-free-cwe-416-in-adobe-acr-1606279c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27220%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69b0efc52f860ef943185a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31827-cwe-362-concurrent-execution-using--6da2171b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31827%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Blue-B%20Alienbin&amp;severity=high&amp;id=69b194fa2f860ef943342476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31826-cwe-770-allocation-of-resources-wit-6bab0c22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31826%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69b194fa2f860ef943342471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28807-cwe-22-improper-limitation-of-a-pat-467caf6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28807%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gleam-wisp%20wisp&amp;severity=high&amp;id=69b17c642f860ef943f8b121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28806-cwe-285-improper-authorization-in-n-d2ddfb8c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28806%3A%20CWE-285%20Improper%20Authorization%20in%20nerves-hub%20nerves_hub_web&amp;severity=critical&amp;id=69b090d12f860ef943c885b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-mois-actors-the-cyber-crime-connection-45c626a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20MOIS%20Actors%20%26%20the%20Cyber%20Crime%20Connection&amp;severity=medium&amp;id=69b140632f860ef9439004ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31815-cwe-284-improper-access-control-in--f8afe07c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31815%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20django-commons%20django-unicorn&amp;severity=medium&amp;id=69b08d502f860ef943c51495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31812-cwe-248-uncaught-exception-in-quinn-8aa79227</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31812%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20quinn-rs%20quinn&amp;severity=high&amp;id=69b08d502f860ef943c51492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31808-cwe-835-loop-with-unreachable-exit--1b765dff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31808%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20sindresorhus%20file-type&amp;severity=medium&amp;id=69b089ca2f860ef943c11e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31809-cwe-79-improper-neutralization-of-i-e8f87427</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31809%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b089ca2f860ef943c11e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31807-cwe-79-improper-neutralization-of-i-70d89aab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31807%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b089ca2f860ef943c11e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31801-cwe-863-incorrect-authorization-in--2ed9c2cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31801%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20project-zot%20zot&amp;severity=high&amp;id=69b089ca2f860ef943c11e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31800-cwe-862-missing-authorization-in-pa-7b9d0f4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31800%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30972-cwe-799-improper-control-of-interac-e73c2d7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30972%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b0864c2f860ef943bbb070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0124-elevation-of-privilege-in-google-and-bf0f89c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0124%3A%20Vulnerability%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0123-elevation-of-privilege-in-google-and-3241f5ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0123%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb9909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0122-remote-code-execution-in-google-andr-6ef00366</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0122%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb9906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0121-information-disclosure-in-google-and-2990bd54</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0121%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=69b0864a2f860ef943bb9903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0120-remote-code-execution-in-google-andr-8a23e39a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0120%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb9900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0119-elevation-of-privilege-in-google-and-8be81354</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0119%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69b0864a2f860ef943bb98fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0118-elevation-of-privilege-in-google-and-7abd765c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0118%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb98fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0117-elevation-of-privilege-in-google-and-157fc49a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0117%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb98f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0116-remote-code-execution-in-google-andr-57041293</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0116%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb98f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0115-information-disclosure-in-google-and-f8bd7d43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0115%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=69b086492f860ef943bb98da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0114-remote-code-execution-in-google-andr-19803325</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0114%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0113-elevation-of-privilege-in-google-and-81569a06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0113%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0112-elevation-of-privilege-in-google-and-c9519c28</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0112%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0111-elevation-of-privilege-in-google-and-aad93a86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0111%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30967-cwe-287-improper-authentication-in--fd3a9bf6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30967%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0110-elevation-of-privilege-in-google-and-40cc8cba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0110%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0109-denial-of-service-in-google-android-797e2891</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0109%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0108-information-disclosure-in-google-and-3a45f672</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0108%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69b086492f860ef943bb98c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0107-elevation-of-privilege-in-google-and-3e492b37</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0107%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36920-elevation-of-privilege-in-google-an-ca1cd87c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36920%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30966-cwe-284-improper-access-control-in--321de92a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30966%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b0864c2f860ef943bbb066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30965-cwe-863-incorrect-authorization-in--02172b99</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30965%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b0864c2f860ef943bbb061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30962-cwe-284-improper-access-control-in--f0f6f512</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30962%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30954-cwe-639-authorization-bypass-throug-dbe3b488</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30954%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69b0864a2f860ef943bb990f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30953-cwe-918-server-side-request-forgery-8de6dba7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30953%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69b082c52f860ef943b7fd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66413-cwe-200-exposure-of-sensitive-infor-7dcd20ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66413%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20git-for-windows%20git&amp;severity=high&amp;id=69b082c52f860ef943b7fd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30952-cwe-22-improper-limitation-of-a-pat-4b891716</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30952%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69b082c52f860ef943b7fd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30949-cwe-287-improper-authentication-in--b219bd57</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30949%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30948-cwe-79-improper-neutralization-of-i-9cf54941</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30948%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30947-cwe-863-incorrect-authorization-in--2701ab0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30947%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13213-cwe-644-improper-neutralization-of--ac5f008e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13213%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=69b07f3e2f860ef943b515a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30946-cwe-770-allocation-of-resources-wit-e2f098e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30946%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30837-cwe-1333-inefficient-regular-expres-f4457447</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30837%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20elysiajs%20elysia&amp;severity=high&amp;id=69b07f3e2f860ef943b515a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29793-cwe-943-improper-neutralization-of--35303311</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29793%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20%40feathersjs%20mongodb&amp;severity=critical&amp;id=69b17c642f860ef943f8b128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13219-cwe-598-use-of-get-request-method-w-dda311a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13219%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=69b17c642f860ef943f8b11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29792-cwe-287-improper-authentication-in--5aa27c8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29792%3A%20CWE-287%3A%20Improper%20Authentication%20in%20feathersjs%20feathers&amp;severity=critical&amp;id=69b17c642f860ef943f8b125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29177-cwe-79-improper-neutralization-of-i-6718bb6e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29177%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=low&amp;id=69b07bba2f860ef943b24cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29176-cwe-79-improper-neutralization-of-i-11bbfb8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29176%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69b07bba2f860ef943b24cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36226-cwe-79-improper-neutralization-of-i-05c56705</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=69b07bba2f860ef943b24cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29175-cwe-79-improper-neutralization-of-i-64f01270</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29175%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36227-cwe-644-improper-neutralization-of--a6241ec7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36227%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=69b07bba2f860ef943b24cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29174-cwe-89-improper-neutralization-of-s-a2c8e194</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29174%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29173-cwe-79-improper-neutralization-of-i-4996e4fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29173%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=low&amp;id=69b07bba2f860ef943b24cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2713-cwe-427-uncontrolled-search-path-ele-2f1ac992</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2713%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20IBM%20Trusteer%20Rapport%20installer&amp;severity=high&amp;id=69b07bba2f860ef943b24cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29172-cwe-89-improper-neutralization-of-s-7609f4db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29172%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29113-cwe-352-cross-site-request-forgery--e48c5eb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29113%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20craftcms%20cms&amp;severity=low&amp;id=69b078412f860ef943afd33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48611-vulnerability-in-google-pixel-609c67e3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48611%3A%20Vulnerability%20in%20Google%20Android&amp;severity=critical&amp;id=69b078412f860ef943afd332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26330-cwe-416-use-after-free-in-envoyprox-ddebfef5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26330%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26311-cwe-416-use-after-free-in-envoyprox-c65b8305</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26311%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-83-vulnerabilities-3d1aa61f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%2083%20Vulnerabilities&amp;severity=critical&amp;id=69b06d742f860ef9439f662e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26310-cwe-20-improper-input-validation-in-c47a1f4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26310%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26309-cwe-193-off-by-one-error-in-envoypr-008d28a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26309%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26123-cwe-939-improper-authorization-in-h-19c71b84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26123%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20Microsoft%20Microsoft%20Authenticator%20for%20Android&amp;severity=medium&amp;id=69b071392f860ef943a5fd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26308-cwe-863-incorrect-authorization-in--f13a384a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26308%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20envoyproxy%20envoy&amp;severity=high&amp;id=69b071392f860ef943a5fd53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3582-cwe-862-missing-authorization-in-git-07d9b944</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3582%3A%20CWE-862%20Missing%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69b0713c2f860ef943a5fdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2266-cwe-79-improper-neutralization-of-in-30e812ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2266%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69b0713c2f860ef943a5fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27825-cwe-22-improper-limitation-of-a-pat-2e969811</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27825%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sooperset%20mcp-atlassian&amp;severity=critical&amp;id=69b0713c2f860ef943a5fde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27218-null-pointer-dereference-cwe-476-in-19a98ba3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27218%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27219-out-of-bounds-read-cwe-125-in-adobe-f5642f0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27219%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2b2f860ef943991ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27214-null-pointer-dereference-cwe-476-in-86773ec4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27214%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21364-null-pointer-dereference-cwe-476-in-bf0c7224</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21364%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21365-out-of-bounds-read-cwe-125-in-adobe-ece1c6c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21365%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27217-null-pointer-dereference-cwe-476-in-425fdf98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27217%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27216-out-of-bounds-read-cwe-125-in-adobe-bab54d2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27216%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21363-null-pointer-dereference-cwe-476-in-925a5a83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21363%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27215-null-pointer-dereference-cwe-476-in-a150e4da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27215%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27826-cwe-918-server-side-request-forgery-590e7915</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27826%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sooperset%20mcp-atlassian&amp;severity=high&amp;id=69b06a2b2f860ef943991eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27274-out-of-bounds-write-cwe-787-in-adob-71522e22</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27274%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27277-use-after-free-cwe-416-in-adobe-sub-c30c0c73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27277%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27273-out-of-bounds-write-cwe-787-in-adob-702a87fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27273%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27275-out-of-bounds-write-cwe-787-in-adob-a30a4fc1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27275%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27276-use-after-free-cwe-416-in-adobe-sub-a6f54503</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27276%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27279-out-of-bounds-write-cwe-787-in-adob-7f3c880f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27279%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28292-cwe-78-improper-neutralization-of-s-9307703c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28292%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20steveukx%20simple-git&amp;severity=critical&amp;id=69b06a2b2f860ef943991f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27269-out-of-bounds-read-cwe-125-in-adobe-ca3c9c57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27269%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Premiere%20Pro&amp;severity=high&amp;id=69b06a2b2f860ef943991ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27281-integer-overflow-or-wraparound-cwe--5911f44a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27281%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=69b063a09972381a98a3a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27280-out-of-bounds-write-cwe-787-in-adob-f9f72bc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27280%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=69b063a09972381a98a3a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-80-vulnerabilities-across-eight-prod-e4e45626</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2080%20Vulnerabilities%20Across%20Eight%20Products&amp;severity=medium&amp;id=69b063599972381a98a2f608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30980-cwe-121-stack-based-buffer-overflow-016aa9e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30980%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31797-cwe-125-out-of-bounds-read-in-inter-11ca7acb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31797%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31796-cwe-122-heap-based-buffer-overflow--7bfcec69</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31796%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31795-cwe-120-buffer-copy-without-checkin-cd8b5822</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31795%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31794-cwe-125-out-of-bounds-read-in-inter-b68a5903</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31794%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31793-cwe-125-out-of-bounds-read-in-inter-aee63f1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31793%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31792-cwe-476-null-pointer-dereference-in-ebb64067</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31792%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30987-cwe-120-buffer-copy-without-checkin-e205f696</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30987%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30986-cwe-125-out-of-bounds-read-in-inter-f7bff699</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30986%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30985-cwe-120-buffer-copy-without-checkin-8671bbf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30985%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30984-cwe-125-out-of-bounds-read-in-inter-a3bc80de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30984%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30983-cwe-120-buffer-copy-without-checkin-f33c4cb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30983%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30982-cwe-122-heap-based-buffer-overflow--69aca4d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30982%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30981-cwe-120-buffer-copy-without-checkin-2e72aca3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30981%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30979-cwe-120-buffer-copy-without-checkin-ecd82a3e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30979%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3306-cwe-639-authorization-bypass-through-20e33556</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3306%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69b060189972381a9898f2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30978-cwe-416-use-after-free-in-internati-63697589</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30978%3A%20CWE-416%3A%20Use%20After%20Free%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30977-cwe-79-improper-neutralization-of-i-ba88b63e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30977%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lihaohong6%20RenderBlocking&amp;severity=low&amp;id=69b059afea502d3aa8817508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3854-cwe-77-improper-neutralization-of-sp-75942f9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3854%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69b059afea502d3aa881750d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30974-cwe-79-improper-neutralization-of-i-793c1d5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=69b059afea502d3aa8817503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-march-2026-tue-mar-10th-b60d64cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20March%202026%2C%20(Tue%2C%20Mar%2010th)&amp;severity=critical&amp;id=69b05966ea502d3aa880ea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30973-cwe-22-improper-limitation-of-a-pat-71bf7da0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30973%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40appium%20support&amp;severity=medium&amp;id=69b059afea502d3aa88174ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30970-cwe-862-missing-authorization-in-co-8a757049</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30970%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b059afea502d3aa88174fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30969-cwe-639-authorization-bypass-throug-371410d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30969%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b059afea502d3aa88174f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30968-cwe-862-missing-authorization-in-co-37b3de3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30968%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b05633ea502d3aa87d6b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2273-cwe-94-improper-control-of-generatio-f2295eba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2273%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Automation%20Expert&amp;severity=high&amp;id=69b05632ea502d3aa87d6b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30964-cwe-346-origin-validation-error-in--c1f14445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30964%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20web-auth%20webauthn-framework&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30960-cwe-94-improper-control-of-generati-c9d430fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30960%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apich-Organization%20rssn&amp;severity=critical&amp;id=69b05633ea502d3aa87d6b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1286-cwe-502-deserialization-of-untrusted-87e64bf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1286%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Foxboro%20DCS&amp;severity=high&amp;id=69b05626ea502d3aa87d6873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13902-cwe-79-improper-neutralization-of-i-03f84a2b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13902%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=medium&amp;id=69b05626ea502d3aa87d6870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26144-cwe-79-improper-neutralization-of-i-0ee52b3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26144%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05632ea502d3aa87d6b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26141-cwe-287-improper-authentication-in--f569f664</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26141%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Azure%20Automation%20Hybrid%20Worker%20Windows%20Extension&amp;severity=high&amp;id=69b05632ea502d3aa87d6b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26130-cwe-770-allocation-of-resources-wit-049f3df0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26130%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Microsoft%20ASP.NET%20Core%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26118-cwe-918-server-side-request-forgery-18ee2132</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26118%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20MCP%20Server%20Tools%201.0.0%20(npm)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26117-cwe-288-authentication-bypass-using-54d513ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26117%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Microsoft%20Arc%20Enabled%20Servers%20-%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=69b05631ea502d3aa87d6b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26110-cwe-843-access-of-resource-using-in-9fa096e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26110%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26109-cwe-125-out-of-bounds-read-in-micro-6ab80f9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26109%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26108-cwe-122-heap-based-buffer-overflow--4da7b8eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26108%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26107-cwe-416-use-after-free-in-microsoft-914827d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26107%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26106-cwe-20-improper-input-validation-in-a3d910ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26106%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b0562fea502d3aa87d6aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23665-cwe-122-heap-based-buffer-overflow--3678cfb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23665%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Azure%20Linux%20Virtual%20Machines%20with%20Azure%20Diagnostics%20extension&amp;severity=high&amp;id=69b05628ea502d3aa87d68b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23662-cwe-306-missing-authentication-for--5df599e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23662%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d6888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23661-cwe-319-cleartext-transmission-of-s-c4879b4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23661%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d6885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23654-cwe-1395-dependency-on-vulnerable-t-07048b44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23654%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Microsoft%20GitHub%20Repo%3A%20Zero%20Shot%20scFoundation&amp;severity=high&amp;id=69b05626ea502d3aa87d687c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26148-cwe-454-external-initialization-of--fe77d030</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26148%3A%20CWE-454%3A%20External%20Initialization%20of%20Trusted%20Variables%20or%20Data%20Stores%20in%20Microsoft%20Microsoft%20Azure%20AD%20SSH%20Login%20extension%20for%20Linux&amp;severity=high&amp;id=69b05632ea502d3aa87d6b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23674-cwe-41-improper-resolution-of-path--d3a08b4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23674%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26127-cwe-125-out-of-bounds-read-in-micro-f1ea3b1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26127%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26134-cwe-190-integer-overflow-or-wraparo-c5e3cb95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26134%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=69b05632ea502d3aa87d6b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26132-cwe-416-use-after-free-in-microsoft-27e62c6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26132%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69b05632ea502d3aa87d6b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26131-cwe-276-incorrect-default-permissio-0d188990</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26131%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26128-cwe-287-improper-authentication-in--762dc85c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26128%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05632ea502d3aa87d6b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26116-cwe-89-improper-neutralization-of-s-9cbccc2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26116%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202025%20(CU%202)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26115-cwe-1287-improper-validation-of-spe-925c4ffb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26115%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26121-cwe-918-server-side-request-forgery-e1a50dda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26121%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05631ea502d3aa87d6b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20967-cwe-20-improper-input-validation-in-1667a03a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20967%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20System%20Center%20Operations%20Manager%202019&amp;severity=high&amp;id=69b05626ea502d3aa87d6876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23656-cwe-345-insufficient-verification-o-ccd8afa7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23656%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Microsoft%20Windows%20App%20Client%20for%20Windows%20Desktop&amp;severity=medium&amp;id=69b05626ea502d3aa87d687f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26114-cwe-502-deserialization-of-untruste-89a579ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26114%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b05631ea502d3aa87d6b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26113-cwe-822-untrusted-pointer-dereferen-7108a4bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26113%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26112-cwe-822-untrusted-pointer-dereferen-dbf4ec68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26112%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26111-cwe-190-integer-overflow-or-wraparo-fdf81b93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26111%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05631ea502d3aa87d6b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26105-cwe-79-improper-neutralization-of-i-067b842a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26105%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b0562fea502d3aa87d6ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25190-cwe-426-untrusted-search-path-in-mi-0a2f7d7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25190%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25189-cwe-416-use-after-free-in-microsoft-ee491495</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562fea502d3aa87d6adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25188-cwe-122-heap-based-buffer-overflow--1a76e429</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25188%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25187-cwe-59-improper-link-resolution-bef-a2a668e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25187%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25186-cwe-200-exposure-of-sensitive-infor-b990dd8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25186%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562fea502d3aa87d6ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25185-cwe-200-exposure-of-sensitive-infor-5e59b27f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25185%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562dea502d3aa87d6a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25181-cwe-125-out-of-bounds-read-in-micro-2f71462d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25181%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25180-cwe-125-out-of-bounds-read-in-micro-aef172d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25180%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=medium&amp;id=69b0562dea502d3aa87d6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25179-cwe-1287-improper-validation-of-spe-dcee60e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25179%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25178-cwe-416-use-after-free-in-microsoft-06ec56b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25178%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25177-cwe-641-improper-restriction-of-nam-3db83fdb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25177%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25176-cwe-284-improper-access-control-in--b0ef8b07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25176%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25175-cwe-125-out-of-bounds-read-in-micro-754cc756</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25175%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25174-cwe-125-out-of-bounds-read-in-micro-381de664</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25174%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25173-cwe-190-integer-overflow-or-wraparo-6750b40e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25173%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25172-cwe-190-integer-overflow-or-wraparo-564389dc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25172%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25171-cwe-416-use-after-free-in-microsoft-1aa3dedd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25171%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25170-cwe-416-use-after-free-in-microsoft-0b7d7ce2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25170%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69b0562cea502d3aa87d69ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25169-cwe-369-divide-by-zero-in-microsoft-97602fdc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25169%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25168-cwe-476-null-pointer-dereference-in-b2e00811</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25168%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25167-cwe-416-use-after-free-in-microsoft-032a21da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25167%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69b0562cea502d3aa87d69e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25166-cwe-502-deserialization-of-untruste-fce8ed91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25166%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Windows%20ADK%20for%20Windows%2010%2C%20version%202004&amp;severity=high&amp;id=69b0562cea502d3aa87d69dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25165-cwe-476-null-pointer-dereference-in-94d9aeef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25165%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24297-cwe-362-concurrent-execution-using--1709c15b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24297%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24296-cwe-362-concurrent-execution-using--501626ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24296%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24295-cwe-362-concurrent-execution-using--d90aca44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24295%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d698d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24294-cwe-287-improper-authentication-in--8b581eb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24294%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d698a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24293-cwe-476-null-pointer-dereference-in-cfb69648</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24293%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69b0562aea502d3aa87d6987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24292-cwe-416-use-after-free-in-microsoft-f8ee5a46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24292%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d6984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24291-cwe-732-incorrect-permission-assign-e1d71316</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24291%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d6981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24290-cwe-284-improper-access-control-in--3d676351</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24290%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d697e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24289-cwe-416-use-after-free-in-microsoft-e4cd306d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24289%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d697b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24288-cwe-122-heap-based-buffer-overflow--dad21d67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24288%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69b0562aea502d3aa87d6978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24287-cwe-73-external-control-of-file-nam-ade8f025</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24287%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d6975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24285-cwe-416-use-after-free-in-microsoft-1dca559e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24285%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=69b0562aea502d3aa87d6972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24283-cwe-122-heap-based-buffer-overflow--da8e4901</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24283%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69b05628ea502d3aa87d68cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24282-cwe-125-out-of-bounds-read-in-micro-4c1a43ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24282%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b05628ea502d3aa87d68ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23673-cwe-125-out-of-bounds-read-in-micro-a63954b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23673%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23672-cwe-125-out-of-bounds-read-in-micro-9d4bbc2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23672%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23671-cwe-362-concurrent-execution-using--6af84697</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23671%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23669-cwe-416-use-after-free-in-microsoft-cee8b9e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23669%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23668-cwe-362-concurrent-execution-using--564d19e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23668%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23667-cwe-416-use-after-free-in-microsoft-2b98106e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23667%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b05628ea502d3aa87d68b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23664-cwe-923-improper-restriction-of-com-8cd21252</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23664%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d688b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23660-cwe-284-improper-access-control-in--b81a763b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23660%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Admin%20Center%20in%20Azure%20Portal&amp;severity=high&amp;id=69b05626ea502d3aa87d6882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21262-cwe-284-improper-access-control-in--4d900db9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21262%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69b05626ea502d3aa87d6879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13901-cwe-404-improper-resource-shutdown--412f4c56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13901%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Schneider%20Electric%20Modicon%20M241%2FM251&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-mois-actors-the-cyber-crime-connection-6b277061</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20MOIS%20Actors%20%26%20the%20Cyber%20Crime%20Connection&amp;severity=medium&amp;id=69b04f42ea502d3aa876704c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30945-cwe-639-authorization-bypass-throug-d61b6bdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30945%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=high&amp;id=69b05635ea502d3aa87d7c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30944-cwe-639-authorization-bypass-throug-139adf1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30944%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=high&amp;id=69b05635ea502d3aa87d7bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66178-execute-unauthorized-code-or-comman-3339db4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66178%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24641-denial-of-service-in-fortinet-forti-2e845127</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24641%3A%20Denial%20of%20service%20in%20Fortinet%20FortiWeb&amp;severity=low&amp;id=69b05635ea502d3aa87d7be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24640-execute-unauthorized-code-or-comman-efcffcfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24640%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05635ea502d3aa87d7be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54659-information-disclosure-in-fortinet--39aea68d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54659%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20Agent%20Communication%20Bridge&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24017-improper-access-control-in-fortinet-216acf1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24017%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=high&amp;id=69b05634ea502d3aa87d6bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25972-execute-unauthorized-code-or-comman-719551c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25972%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22629-improper-access-control-in-fortinet-65b40607</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22629%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=low&amp;id=69b05634ea502d3aa87d6bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68482-information-disclosure-in-fortinet--37d779b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68482%3A%20Information%20disclosure%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48418-escalation-of-privilege-in-fortinet-a483513e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48418%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49784-execute-unauthorized-code-or-comman-5f6c4f4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49784%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiAnalyzer-BigData&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22572-improper-access-control-in-fortinet-73115578</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22572%3A%20Improper%20access%20control%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68648-escalation-of-privilege-in-fortinet-d0f91097</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68648%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25689-execute-unauthorized-code-or-comman-1fe24b86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25689%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiDeceptor&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53608-execute-unauthorized-code-or-comman-8ca13482</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53608%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24018-escalation-of-privilege-in-fortinet-b9a9329c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24018%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientLinux&amp;severity=high&amp;id=69b05634ea502d3aa87d6bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48840-improper-access-control-in-fortinet-0c23b9b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48840%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22627-execute-unauthorized-code-or-comman-691b1205</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22627%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchAXFixed&amp;severity=high&amp;id=69b05634ea502d3aa87d6bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54820-execute-unauthorized-code-or-comman-3da6e695</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54820%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=high&amp;id=69b05633ea502d3aa87d6ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30942-cwe-22-improper-limitation-of-a-pat-efb3b11a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30942%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FlintSH%20Flare&amp;severity=high&amp;id=69b05635ea502d3aa87d7bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55717-information-disclosure-in-fortinet--a4b92c31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55717%3A%20Information%20disclosure%20in%20Fortinet%20FortiVoice&amp;severity=low&amp;id=69b05634ea502d3aa87d6bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25836-execute-unauthorized-code-or-comman-0549df17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25836%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20Cloud&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30897-execute-unauthorized-code-or-comman-50b13368</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30897%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22628-execute-unauthorized-code-or-comman-3b1e4185</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22628%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchAXFixed&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30941-cwe-943-improper-neutralization-of--450ddd4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30941%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b04b8cea502d3aa873ba98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30939-cwe-1321-improperly-controlled-modi-cc76a7f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30939%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b04b8cea502d3aa873ba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30938-cwe-693-protection-mechanism-failur-9d8e25cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30938%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b04b8cea502d3aa873ba8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30930-cwe-89-improper-neutralization-of-s-7240df0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30930%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69b04b8dea502d3aa873bac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30928-cwe-200-exposure-of-sensitive-infor-341c875e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30928%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69b04b8dea502d3aa873bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30934-cwe-79-improper-neutralization-of-i-24a65d33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30934%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=69b04b8dea502d3aa873bad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30933-cwe-200-exposure-of-sensitive-infor-d9a74993</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30933%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=69b04b8dea502d3aa873bacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27661-cwe-1230-exposure-of-sensitive-info-ff4cf300</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27661%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=69b04b8dea502d3aa873babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25605-cwe-73-external-control-of-file-nam-5ee32c1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25605%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8dea502d3aa873babc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25573-cwe-73-external-control-of-file-nam-dafe948f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25573%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25572-cwe-130-improper-handling-of-length-0eb7b1d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25572%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8cea502d3aa873baac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25571-cwe-130-improper-handling-of-length-dc53ba63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25571%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8cea502d3aa873baa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25570-cwe-121-stack-based-buffer-overflow-98c21ede</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25570%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25569-cwe-787-out-of-bounds-write-in-siem-c2c91e7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25569%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40943-cwe-79-improper-neutralization-of-i-9fc302a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40943%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=critical&amp;id=69b04b8cea502d3aa873baa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27769-cwe-923-improper-restriction-of-com-a4450901</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27769%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Siemens%20Heliox%20Flex%20180%20kW%20EV%20Charging%20Station&amp;severity=low&amp;id=69b04b8cea502d3aa873ba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mental-health-apps-are-leaking-your-private-though-f3284dc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mental%20health%20apps%20are%20leaking%20your%20private%20thoughts.%20How%20do%20you%20protect%20yourself%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b05631ea502d3aa87d6b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-securing-fragile-ot-in-an-exposed-wo-3be6e649</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20Securing%20Fragile%20OT%20in%20an%20Exposed%20World&amp;severity=medium&amp;id=69b03641ea502d3aa8673936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3847-vulnerability-in-mozilla-firefox-93e6bf98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3847%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69b03689ea502d3aa867a112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3846-vulnerability-in-mozilla-firefox-104c9947</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3846%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69b03689ea502d3aa867a10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3845-vulnerability-in-mozilla-firefox-81266191</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3845%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69b03689ea502d3aa867a10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3862-vulnerability-in-broadcom-siteminder-6245c414</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3862%3A%20Vulnerability%20in%20Broadcom%20SiteMinder&amp;severity=medium&amp;id=69b03689ea502d3aa867a116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-fs-quo-netweaver-vulnerabilit-a4a029a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20FS-QUO%2C%20NetWeaver%20Vulnerabilities&amp;severity=critical&amp;id=69b02bb5ea502d3aa85f6592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-affected-by-ericsson-data-breach-183bdf0a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20Affected%20by%20Ericsson%20Data%20Breach&amp;severity=medium&amp;id=69b02bb5ea502d3aa85f6595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3483-cwe-749-exposed-dangerous-method-or--62639a97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3483%3A%20CWE-749%20Exposed%20dangerous%20method%20or%20function%20in%20Ivanti%20Desktop%20and%20Server%20Management&amp;severity=high&amp;id=69b02c18ea502d3aa85f8868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-rolls-out-codex-security-vulnerability-scan-222e753a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Rolls%20Out%20Codex%20Security%20Vulnerability%20Scanner&amp;severity=critical&amp;id=69b01da5ea502d3aa8574d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kevin-mandias-armadin-launches-with-190-million-in-5f25333b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kevin%20Mandia%E2%80%99s%20Armadin%20Launches%20With%20%24190%20Million%20in%20Funding&amp;severity=medium&amp;id=69b01da5ea502d3aa8574d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quiz-sites-trick-users-into-enabling-unwanted-brow-23554c48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quiz%20sites%20trick%20users%20into%20enabling%20unwanted%20browser%20notifications&amp;severity=medium&amp;id=69b01a1eea502d3aa8553b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2339-cwe-306-missing-authentication-for-c-bfc86a8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2339%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Liderahenk&amp;severity=high&amp;id=69b0215bea502d3aa859162a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-salesforce-customers-allegedly-targete-d347d683</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20Salesforce%20Customers%20Allegedly%20Targeted%20in%20New%20Data%20Theft%20Campaign&amp;severity=medium&amp;id=69b01318ea502d3aa850c00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beatbanker-both-banker-and-miner-for-android-65d627b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeatBanker%3A%20both%20banker%20and%20miner%20for%20Android&amp;severity=medium&amp;id=69b0169cea502d3aa852b221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11739-cwe-502-deserialization-of-untruste-7716261a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11739%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=69b01357ea502d3aa8512703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13957-cwe-798-use-of-hard-coded-credentia-50d57493</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13957%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert%20(Formerly%20known%20as%20StruxureWare%20Data%20Center%20Expert)&amp;severity=high&amp;id=69b00fcaea502d3aa84f717e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2741-cwe-22-improper-limitation-of-a-path-48a18612</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2741%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vaadin%20flow&amp;severity=low&amp;id=69b00fcaea502d3aa84f7181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-ivanti-endpoint-manager-flaw-exploited-in-a-da7247af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Ivanti%20Endpoint%20Manager%20Flaw%20Exploited%20in%20Attacks&amp;severity=high&amp;id=69b0088eea502d3aa84bf7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3843-cwe-89-improper-neutralization-of-sp-db749180</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3843%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nefteprodukttekhnika%20LLC%20BUK%20TS-G%20Gas%20Station%20Automation%20System&amp;severity=critical&amp;id=69b0215bea502d3aa859162d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sim-swaps-expose-a-critical-flaw-in-identity-secur-b61e9db7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIM%20Swaps%20Expose%20a%20Critical%20Flaw%20in%20Identity%20Security&amp;severity=critical&amp;id=69affa7bea502d3aa840daea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22614-cwe-257-storing-passwords-in-a-reco-75e6ae65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22614%3A%20CWE-257%20Storing%20passwords%20in%20a%20recoverable%20format%20in%20Eaton%20EasySoft&amp;severity=medium&amp;id=69aff72aea502d3aa83f35d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21791-cwe-532-insertion-of-sensitive-info-c766ae5b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21791%3A%20CWE-532%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20HCL%20Sametime&amp;severity=low&amp;id=69aff3a6ea502d3aa83c665c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3228-cwe-79-improper-neutralization-of-in-07e7a8d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3228%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextscripts%20NextScripts%3A%20Social%20Networks%20Auto-Poster&amp;severity=medium&amp;id=69b044ddea502d3aa870234e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2724-cwe-79-improper-neutralization-of-in-6aed2920</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2724%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=high&amp;id=69b044ddea502d3aa8702346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23907-cwe-22-improper-limitation-of-a-pat-f06ac661</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23907%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20PDFBox%20Examples&amp;severity=medium&amp;id=69b0215bea502d3aa8591625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3315-cwe-276-incorrect-default-permission-cadef1a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3315%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20ASSA%20ABLOY%20Visionline&amp;severity=medium&amp;id=69afe91aea502d3aa834a958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1261-cwe-79-improper-neutralization-of-in-3b7ad624</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wpmet%20MetForm%20Pro&amp;severity=high&amp;id=69afe91aea502d3aa834a951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41712-cwe-732-incorrect-permission-assign-d864906a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41712%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41711-cwe-327-use-of-a-broken-or-risky-cr-3f06a07f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41711%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41710-cwe-798-use-of-hard-coded-credentia-86ec016a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41710%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41709-cwe-78-improper-neutralization-of-s-7863621d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41709%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=critical&amp;id=69afd786ea502d3aa827b16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2364-cwe-367-time-of-check-time-of-use-to-5eb858d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2364%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20CODESYS%20CODESYS%20Installer&amp;severity=high&amp;id=69afc976ea502d3aa81f019e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1508-cwe-352-cross-site-request-forgery-c-cd03c8c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1508%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Court%20Reservation&amp;severity=medium&amp;id=69afbb66ea502d3aa81236ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0953-cwe-287-improper-authentication-in-t-965fa126</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0953%3A%20CWE-287%20Improper%20Authentication%20in%20themeum%20Tutor%20LMS%20Pro&amp;severity=critical&amp;id=69afb0daea502d3aa80ce240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2399-cwe-1285-improper-validation-of-spec-1fc878cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2399%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20Mitsubishi%20Electric%20CNC%20M800V%20Series%20M800VW&amp;severity=medium&amp;id=69afa64eea502d3aa8064f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3585-cwe-22-improper-limitation-of-a-path-57fec669</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3585%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=high&amp;id=69af94baea502d3aa8fe3e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1919-cwe-306-missing-authentication-for-c-b7d963b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1919%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20arraytics%20Booktics%20%E2%80%93%20Booking%20Calendar%20for%20Appointments%20and%20Service%20Businesses&amp;severity=medium&amp;id=69af86aaea502d3aa8f4fe7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1920-cwe-306-missing-authentication-for-c-3db6a0a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1920%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20arraytics%20Booktics%20%E2%80%93%20Booking%20Calendar%20for%20Appointments%20and%20Service%20Businesses&amp;severity=medium&amp;id=69af86aaea502d3aa8f4fe84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36173-cwe-79-improper-neutralization-of-i-f97282af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36173%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20InfoSphere%20Data%20Architect&amp;severity=medium&amp;id=69af789aea502d3aa8ed4d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36105-cwe-526-cleartext-storage-of-sensit-e80db9d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36105%3A%20CWE-526%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20IBM%20Planning%20Analytics%20Advanced%20Certified%20Containers&amp;severity=medium&amp;id=69af7192ea502d3aa8ea5c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27689-cwe-606-unchecked-input-for-loop-co-d8b8d892</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27689%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20SAP_SE%20SAP%20Supply%20Chain%20Management&amp;severity=high&amp;id=69af6a8cea502d3aa8e719dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27688-cwe-862-missing-authorization-in-sa-62bd5477</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27688%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8cea502d3aa8e719d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27687-cwe-862-missing-authorization-in-sa-bb7713f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27687%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20HCM%20Portugal%20and%20SAP%20ERP%20HCM%20Portugal&amp;severity=medium&amp;id=69af6a8cea502d3aa8e719d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27686-cwe-862-missing-authorization-in-sa-83adb224</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27686%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Warehouse%20(Service%20API)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27685-cwe-502-deserialization-of-untruste-36704129</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27685%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal%20Administration&amp;severity=critical&amp;id=69af6a8bea502d3aa8e719b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27684-cwe-89-improper-neutralization-of-s-c68052d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27684%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20NetWeaver%20(Feedback%20Notification)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24317-cwe-427-uncontrolled-search-path-el-9d366f48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24317%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20SAP_SE%20SAP%20GUI%20for%20Windows%20with%20active%20GuiXT&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24316-cwe-918-server-side-request-forgery-f88090d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24316%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24313-cwe-862-missing-authorization-in-sa-66d5a26c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24313%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Solution%20Tools%20Plug-In%20(ST-PI)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24311-cwe-312-cleartext-storage-of-sensit-e84d825d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24311%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20SAP_SE%20SAP%20Customer%20Checkout%202.0&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24310-cwe-862-missing-authorization-in-sa-7999f018</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24310%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=low&amp;id=69af6a8bea502d3aa8e719a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24309-cwe-862-missing-authorization-in-sa-f005d646</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24309%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8bea502d3aa8e7199c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0489-cwe-79-improper-neutralization-of-in-cbf68665</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0489%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20One%20(Job%20Service)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e71998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70242-na-c6411a74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70242%3A%20n%2Fa&amp;severity=high&amp;id=69b0864c2f860ef943bbb07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70802-na-3e020311</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70802%3A%20n%2Fa&amp;severity=high&amp;id=69b082c52f860ef943b7fd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70798-na-508a12b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70798%3A%20n%2Fa&amp;severity=high&amp;id=69b082c52f860ef943b7fd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70244-na-e28317c6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70244%3A%20n%2Fa&amp;severity=high&amp;id=69b07f3e2f860ef943b515a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70227-na-cbb81ab6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70227%3A%20n%2Fa&amp;severity=high&amp;id=69b07bba2f860ef943b24cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70251-na-669447d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70251%3A%20n%2Fa&amp;severity=high&amp;id=69b078412f860ef943afd33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70247-na-d44926cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70247%3A%20n%2Fa&amp;severity=high&amp;id=69b078412f860ef943afd335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70249-na-f5902c4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70249%3A%20n%2Fa&amp;severity=high&amp;id=69b071392f860ef943a5fd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70246-na-89dc65ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70246%3A%20n%2Fa&amp;severity=high&amp;id=69b071392f860ef943a5fd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70129-na-ab3fe0cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70129%3A%20n%2Fa&amp;severity=medium&amp;id=69b071392f860ef943a5fd42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70128-na-5b2105a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70128%3A%20n%2Fa&amp;severity=medium&amp;id=69b071392f860ef943a5fd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26742-na-e679e983</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26742%3A%20n%2Fa&amp;severity=high&amp;id=69b06a2a2f860ef943991ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26741-na-af97790d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26741%3A%20n%2Fa&amp;severity=high&amp;id=69b06a2a2f860ef943991eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26801-na-507b5071</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26801%3A%20n%2Fa&amp;severity=high&amp;id=69b063a09972381a98a3a04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56422-na-e0fce763</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56422%3A%20n%2Fa&amp;severity=critical&amp;id=69b060169972381a9898e680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56421-na-d4e6f7b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56421%3A%20n%2Fa&amp;severity=high&amp;id=69b060159972381a9898e67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69615-na-b9f6729e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69615%3A%20n%2Fa&amp;severity=critical&amp;id=69b059afea502d3aa88174f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69614-na-f8e99074</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69614%3A%20n%2Fa&amp;severity=critical&amp;id=69b059afea502d3aa88174ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-10-d294a46c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-10&amp;severity=medium&amp;id=69b05598ea502d3aa87bd071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26738-na-e655b58c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26738%3A%20n%2Fa&amp;severity=high&amp;id=69b040ffea502d3aa86ddc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70025-na-0b47dd0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70025%3A%20n%2Fa&amp;severity=medium&amp;id=69b040ffea502d3aa86ddc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-10-26d06c7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-10&amp;severity=low&amp;id=69afc5bcea502d3aa81b3a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30925-cwe-1333-inefficient-regular-expres-7c8115f9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30925%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69af5576ea502d3aa8d50d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30917-cwe-79-improper-neutralization-of-i-374fc6af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30917%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weirdgloop%20mediawiki-extensions-Bucket&amp;severity=high&amp;id=69af51f2ea502d3aa8d1f2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30916-cwe-200-exposure-of-sensitive-infor-ceee8999</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30916&amp;severity=null&amp;id=69af51f2ea502d3aa8d1f2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30913-cwe-79-improper-neutralization-of-i-61bde380</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30913%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flarum%20nicknames&amp;severity=medium&amp;id=69af51f2ea502d3aa8d1f2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30885-cwe-306-missing-authentication-for--c52692c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30885%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30870-cwe-285-improper-authorization-in-p-1df0986b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30870%3A%20CWE-285%3A%20Improper%20Authorization%20in%20powersync-ja%20powersync-service&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28267-incorrect-default-permissions-in-di-18abd493</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28267%3A%20Incorrect%20default%20permissions%20in%20Digital%20Arts%20Inc.%20i-%E3%83%95%E3%82%A3%E3%83%AB%E3%82%BF%E3%83%BC%2010%20(Windows%20version%20only)&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30869-cwe-22-improper-limitation-of-a-pat-98459c9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30869%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69af4e6aea502d3aa8cf7cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30862-cwe-79-improper-neutralization-of-i-d918c60a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30862%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appsmithorg%20appsmith&amp;severity=critical&amp;id=69af4e6aea502d3aa8cf7cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29773-cwe-863-incorrect-authorization-in--70ff5380</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29773%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20kubewarden%20kubewarden-controller&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28281-cwe-352-cross-site-request-forgery--582e209f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28281%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20instantsoft%20icms2&amp;severity=high&amp;id=69af4ae9ea502d3aa8cd9889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11158-cwe-862-missing-authorization-in-hi-7c52de59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11158%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Hitachi%20Vantara%20Pentaho%20Data%20Integration%20and%20Analytics&amp;severity=critical&amp;id=69af4ae9ea502d3aa8cd9886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28433-cwe-639-authorization-bypass-throug-5743eba7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28433%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20misskey-dev%20misskey&amp;severity=low&amp;id=69af3cdaea502d3aa8c6d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28432-cwe-347-improper-verification-of-cr-d72cfb17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28432%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20misskey-dev%20misskey&amp;severity=high&amp;id=69af3cdaea502d3aa8c6d38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28431-cwe-285-improper-authorization-in-m-e4688f7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28431%3A%20CWE-285%3A%20Improper%20Authorization%20in%20misskey-dev%20misskey&amp;severity=critical&amp;id=69af3cdaea502d3aa8c6d389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26982-cwe-78-improper-neutralization-of-s-dd6a54d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26982%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ghostty-org%20ghostty&amp;severity=medium&amp;id=69af3955ea502d3aa8c59c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31802-cwe-22-improper-limitation-of-a-pat-247231a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31802%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=69af3955ea502d3aa8c59c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1776-cwe-22-improper-limitation-of-a-path-96ab7479</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1776%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20owen2345%20Camaleon%20CMS&amp;severity=medium&amp;id=69af3955ea502d3aa8c59c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30926-cwe-284-improper-access-control-in--1175aec5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30926%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69af3955ea502d3aa8c59c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25960-cwe-918-server-side-request-forgery-c3fc1a91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25960%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=69b03689ea502d3aa867a119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3288-cwe-20-improper-input-validation-in--b7359678</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3288%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69af3955ea502d3aa8c59c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15603-insufficiently-random-values-in-ope-2f25b3d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15603%3A%20Insufficiently%20Random%20Values%20in%20open-webui&amp;severity=medium&amp;id=69b044ddea502d3aa8702354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0846-cwe-36-absolute-path-traversal-in-nl-799595df</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0846%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20nltk%20nltk%2Fnltk&amp;severity=high&amp;id=69af20b9ea502d3aa8b98ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3638-cwe-862-missing-authorization-in-dev-87162fbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69af19aeea502d3aa8b3c468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29023-cwe-798-use-of-hard-coded-credentia-e510eadc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29023%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20KeygraphHQ%20Shannon&amp;severity=medium&amp;id=69af0b9eea502d3aa8af25bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/9th-march-threat-intelligence-report-3ef7c2ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=9th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69aefa3eea502d3aa88a9e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15568-cwe-78-improper-neutralization-of-s-b5d6b74a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15568%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20AXE75%20v1.6%2Fv1.0&amp;severity=high&amp;id=69aef68aea502d3aa8861a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3588-cwe-918-server-side-request-forgery--d3eb8845</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3588%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ikea%20dirigera&amp;severity=high&amp;id=69aef0552904315ca31e4b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25866-cwe-428-unquoted-search-path-or-ele-0dfb2877</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25866%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20Mobatek%20MobaXterm&amp;severity=high&amp;id=69aeeccc2904315ca31bf399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/encrypted-client-hello-ready-for-prime-timex3f-mon-75a90978</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Encrypted%20Client%20Hello%3A%20Ready%20for%20Prime%20Time%26%23x3f%3B%2C%20(Mon%2C%20Mar%209th)&amp;severity=medium&amp;id=69aede872904315ca3143bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3089-cwe-22-improper-limitation-of-a-path-c51e0410</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3089%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Actual%20Actual%20Sync%20Server&amp;severity=medium&amp;id=69aed7b62904315ca3115bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2919-vulnerability-in-mozilla-focus-for-i-08c2d971</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2919%3A%20Vulnerability%20in%20Mozilla%20Focus%20for%20iOS&amp;severity=medium&amp;id=69aed0ab2904315ca30d0a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attack-uses-windows-terminal-to-evade-det-2d22d0e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attack%20Uses%20Windows%20Terminal%20to%20Evade%20Detection&amp;severity=medium&amp;id=69aec2682904315ca3069adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3819-cross-site-scripting-in-sourcecodest-aaa44b39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3819%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69aec2a82904315ca306c3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21736-cwe-280-improper-handling-of-insuff-b649a84a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21736%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=69aebf172904315ca3052918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/internet-infrastructure-tld-arpa-abused-in-phishin-e2d522ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Internet%20Infrastructure%20TLD%20.arpa%20Abused%20in%20Phishing%20Attacks&amp;severity=medium&amp;id=69aeb7db2904315ca3023076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3818-sql-injection-in-tiandy-easy7-cms-wi-a4db1eb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3818%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20CMS%20Windows&amp;severity=medium&amp;id=69aeb8222904315ca3023bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloned-ai-tool-sites-distribute-malware-in-install-a9978540</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloned%20AI%20Tool%20Sites%20Distribute%20Malware%20in%20%E2%80%98InstallFix%E2%80%99%20Campaign&amp;severity=medium&amp;id=69aeb4572904315ca30031af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3817-improper-authorization-in-sourcecode-267ac504</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3817%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69aeb4982904315ca3004502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3816-denial-of-service-in-owasp-defectdoj-a15580d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3816%3A%20Denial%20of%20Service%20in%20OWASP%20DefectDojo&amp;severity=medium&amp;id=69aef497ea502d3aa883cff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25604-cwe-346-origin-validation-error-in--5a7b7808</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25604%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Amazon&amp;severity=medium&amp;id=69aea67e2904315ca3fb12d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3815-buffer-overflow-in-utt-hiper-810g-4cb171a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3815%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aea67e2904315ca3fb12dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69219-cwe-913-improper-control-of-dynamic-c55c74a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69219%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Http&amp;severity=high&amp;id=69aea2f72904315ca3f9c786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-cleanmymac-site-installs-shub-stealer-and-bac-cb0be810</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20CleanMyMac%20site%20installs%20SHub%20Stealer%20and%20backdoors%20crypto%20wallets&amp;severity=medium&amp;id=69aea2c22904315ca3f9aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3814-buffer-overflow-in-utt-hiper-810g-7866271a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3814%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69ae9f732904315ca3f8057d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/installfix-how-attackers-are-weaponizing-malvertiz-3ceb237b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=InstallFix%3A%20How%20attackers%20are%20weaponizing%20malvertized%20install%20guides&amp;severity=medium&amp;id=69ae9bba2904315ca3f470fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3813-injection-in-opencc-jflow-c61de85b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3813%3A%20Injection%20in%20opencc%20JFlow&amp;severity=medium&amp;id=69ae986d2904315ca3f1764a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69279-cwe-20-improper-input-validation-in-fe83ee3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69279%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69278-cwe-20-improper-input-validation-in-b08709bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69278%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61616-cwe-20-improper-input-validation-in-6d0031ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61616%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61615-cwe-20-improper-input-validation-in-e5a517e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61615%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61614-cwe-20-improper-input-validation-in-0a7e31c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61614%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61613-cwe-20-improper-input-validation-in-a7f83b60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61613%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61612-cwe-20-improper-input-validation-in-4f34411f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61612%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9cffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61611-cwe-20-improper-input-validation-in-32e99f23</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61611%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20UDX710&amp;severity=high&amp;id=69ae8de22904315ca3e9cffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3812-cross-site-scripting-in-itsourcecode-7ee28ec9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3812%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69ae8de42904315ca3e9d026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24713-cwe-20-improper-input-validation-in-78e1759b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24713%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=critical&amp;id=69ae8de22904315ca3e9d015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24015-cwe-1327-binding-to-an-unrestricted-99fd9b26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24015%3A%20CWE-1327%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=critical&amp;id=69ae8de22904315ca3e9d012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3811-stack-based-buffer-overflow-in-tenda-076e8a7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3811%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae8a5a2904315ca3e7e074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41772-cwe-598-use-of-get-request-method-w-ba0a22f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41772%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41767-cwe-347-improper-verification-of-cr-d117e184</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41767%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41766-cwe-787-out-of-bounds-write-in-mbs--5533adda</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41766%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41765-cwe-862-missing-authorization-in-mb-57e75f2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41765%3A%20CWE-862%20Missing%20Authorization%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=critical&amp;id=69ae86d82904315ca3e5dc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41764-cwe-862-missing-authorization-in-mb-a3e3d2de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41764%3A%20CWE-862%20Missing%20Authorization%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=critical&amp;id=69ae86d82904315ca3e5dc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41763-cwe-497-exposure-of-sensitive-syste-5ae93f0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41763%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41762-cwe-328-use-of-weak-hash-in-mbs-ubr-f7ff21d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41762%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41761-cwe-88-improper-neutralization-of-a-c2ea65ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41761%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41760-cwe-636-not-failing-securely-failin-96960f60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41760%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41759-cwe-636-not-failing-securely-failin-b5660774</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41759%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41758-cwe-22-improper-limitation-of-a-pat-2e4cf25e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41758%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41757-cwe-22-improper-limitation-of-a-pat-d23dc345</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41757%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41756-cwe-1242-inclusion-of-undocumented--2432140c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41756%3A%20CWE-1242%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41755-cwe-22-improper-limitation-of-a-pat-cd09f553</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41755%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41754-cwe-1242-inclusion-of-undocumented--5310c8c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41754%3A%20CWE-1242%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3810-stack-based-buffer-overflow-in-tenda-96d51f9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3810%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae7fd12904315ca3e0a268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3809-stack-based-buffer-overflow-in-tenda-cd7509e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3809%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae7c4e2904315ca3de0ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3808-stack-based-buffer-overflow-in-tenda-47c2dc78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3808%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae78c72904315ca3dac14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3807-stack-based-buffer-overflow-in-tenda-57a28f57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3807%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae6ab82904315ca3cb955f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3823-cwe-121-stack-based-buffer-overflow--68d582bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3823%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Atop%20Technologies%20EHG2408&amp;severity=critical&amp;id=69ae6ab82904315ca3cb9567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3806-sql-injection-in-sourcecodester-reso-2611b6c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3806%3A%20SQL%20Injection%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69aef497ea502d3aa883d003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3804-stack-based-buffer-overflow-in-tenda-c824133f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3804%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae602a2904315ca3bfed68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3803-stack-based-buffer-overflow-in-tenda-d8d8363c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3803%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae59252904315ca3ba53b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30896-uncontrolled-search-path-element-in-2c04514c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30896%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Qsee%20Qsee%20Client&amp;severity=high&amp;id=69ae59252904315ca3ba53ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3802-stack-based-buffer-overflow-in-tenda-e2e310a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3802%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae521a2904315ca3b4fb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3801-stack-based-buffer-overflow-in-tenda-c8df084e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3801%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae47912904315ca3972de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3822-cwe-295-improper-certificate-validat-93f8590c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3822%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Taipower%20Taipower%20APP&amp;severity=high&amp;id=69ae47912904315ca3972df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3800-unrestricted-upload-in-sourcecodeste-535e7ac6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3800%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69ae47912904315ca3972de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3799-stack-based-buffer-overflow-in-tenda-8e3e46d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3799%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae47912904315ca3972dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3798-command-injection-in-comfast-cf-ac10-eb1c1917</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3798%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69ae3d052904315ca386c4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3631-cwe-125-out-of-bounds-read-in-deltaw-56dcbeb6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3631%3A%20CWE-125%20Out-of-bounds%20Read%20in%20DeltaWW%20COMMGR2&amp;severity=high&amp;id=69ae3d052904315ca386c491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3630-cwe-121-stack-based-buffer-overflow--c00e7f15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3630%3A%20cwe-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20COMMGR2&amp;severity=critical&amp;id=69ae3d052904315ca386c48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3797-unrestricted-upload-in-tiandy-video--748bd466</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3797%3A%20Unrestricted%20Upload%20in%20Tiandy%20Video%20Surveillance%20System%20%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=69ae3d052904315ca386c49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3796-improper-access-controls-in-qi-anxin-5a415393</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3796%3A%20Improper%20Access%20Controls%20in%20Qi-ANXIN%20QAX%20Virus%20Removal&amp;severity=medium&amp;id=69ae3d052904315ca386c494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3795-path-traversal-in-doramart-doracms-2b1ce532</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3795%3A%20Path%20Traversal%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=69ae2ef52904315ca3454d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3794-improper-authentication-in-doramart--485a5a33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3794%3A%20Improper%20Authentication%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=69ae2ef52904315ca3454d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3793-sql-injection-in-sourcecodester-sale-e809dfe3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3793%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae2ef52904315ca3454d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3792-sql-injection-in-sourcecodester-sale-24b11dc7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3792%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae24662904315ca31e22a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3791-sql-injection-in-sourcecodester-sale-ce9829f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3791%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae1d5f2904315ca314c85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3790-sql-injection-in-sourcecodester-sale-5f985483</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3790%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae12d72904315ca30ac9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70030-na-d0975b30</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70030%3A%20n%2Fa&amp;severity=high&amp;id=69b044ddea502d3aa8702362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70973-na-54f51c5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70973%3A%20n%2Fa&amp;severity=medium&amp;id=69b044ddea502d3aa870235f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70028-na-3a07e508</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70028%3A%20n%2Fa&amp;severity=high&amp;id=69b044ddea502d3aa870235a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-09-57701da0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-09&amp;severity=medium&amp;id=69af634bea502d3aa8dad08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-09-79bfea9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-09&amp;severity=medium&amp;id=69af3598ea502d3aa8c0dbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70031-na-8a203d21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70031%3A%20n%2Fa&amp;severity=high&amp;id=69af20b9ea502d3aa8b98ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70032-na-37d1a9c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70032%3A%20n%2Fa&amp;severity=medium&amp;id=69af1d36ea502d3aa8b51a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30140-na-bdcbb2e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30140%3A%20n%2Fa&amp;severity=high&amp;id=69af12acea502d3aa8b1aeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70033-na-99291bb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70033%3A%20n%2Fa&amp;severity=medium&amp;id=69af081bea502d3aa8ad8b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70039-na-d5e0ae2c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70039%3A%20n%2Fa&amp;severity=critical&amp;id=69af0116ea502d3aa8929a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70038-na-403c97f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70038%3A%20n%2Fa&amp;severity=high&amp;id=69af0116ea502d3aa8929a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70034-na-f2a4579f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70034%3A%20n%2Fa&amp;severity=high&amp;id=69af0116ea502d3aa8929a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70037-na-d58dc3af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70037%3A%20n%2Fa&amp;severity=medium&amp;id=69aefd8fea502d3aa88d43ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70060-na-ff9fb2d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70060%3A%20n%2Fa&amp;severity=medium&amp;id=69aef0552904315ca31e4b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70040-na-5b2fc2fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70040%3A%20n%2Fa&amp;severity=medium&amp;id=69aef0552904315ca31e4b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70050-na-e5092a6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70050%3A%20n%2Fa&amp;severity=medium&amp;id=69aeeccc2904315ca31bf394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70046-na-320037a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70046%3A%20n%2Fa&amp;severity=critical&amp;id=69aeeccc2904315ca31bf38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70042-na-712777a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70042%3A%20n%2Fa&amp;severity=critical&amp;id=69aeeccc2904315ca31bf38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70048-na-ea9aa573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70048%3A%20n%2Fa&amp;severity=high&amp;id=69aee5c82904315ca318c679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70047-na-78041731</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70047%3A%20n%2Fa&amp;severity=high&amp;id=69aee5c82904315ca318c666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70238-na-86922b37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70238%3A%20n%2Fa&amp;severity=high&amp;id=69aee2432904315ca316f538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70059-na-d54d5feb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70059%3A%20n%2Fa&amp;severity=high&amp;id=69aee2432904315ca316f533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70250-na-e9579a40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70250%3A%20n%2Fa&amp;severity=high&amp;id=69aedb362904315ca312a949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70243-na-87101f93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70243%3A%20n%2Fa&amp;severity=high&amp;id=69aedb362904315ca312a944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69648-na-ca1b875d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69648%3A%20n%2Fa&amp;severity=medium&amp;id=69aedb362904315ca312a940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69647-na-99770e2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69647%3A%20n%2Fa&amp;severity=medium&amp;id=69aedb362904315ca312a93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-09-dff51750</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-09&amp;severity=low&amp;id=69aea6442904315ca3faf7d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3789-server-side-request-forgery-in-byted-4bd85a81</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3789%3A%20Server-Side%20Request%20Forgery%20in%20Bytedesk&amp;severity=medium&amp;id=69ae0bcb2904315ca302ed63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3788-server-side-request-forgery-in-byted-a581b462</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3788%3A%20Server-Side%20Request%20Forgery%20in%20Bytedesk&amp;severity=medium&amp;id=69ae0bcb2904315ca302ed58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3787-uncontrolled-search-path-in-ultravnc-8f16fda8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3787%3A%20Uncontrolled%20Search%20Path%20in%20UltraVNC&amp;severity=high&amp;id=69ae01432904315ca3febb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3786-sql-injection-in-easycms-316a8934</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3786%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=69ae16ab2904315ca310d422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3785-sql-injection-in-easycms-2d45fde4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3785%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=69ae16ab2904315ca310d41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3771-sql-injection-in-sourcecodester-reso-7816bc70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3771%3A%20SQL%20Injection%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3770-cross-site-request-forgery-in-source-6bf6f3bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3770%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Computer%20Laboratory%20Management%20System&amp;severity=medium&amp;id=69ade5242904315ca3f04df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3769-stack-based-buffer-overflow-in-tenda-7dc11ff5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3769%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ade5242904315ca3f04de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3768-stack-based-buffer-overflow-in-tenda-9b634f69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3768%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ae16ab2904315ca310d435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3767-sql-injection-in-itsourcecode-saniti-52abf55a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3767%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69ae16ab2904315ca310d42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3766-cross-site-scripting-in-sourcecodest-10437615</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3766%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69adda962904315ca3ea0ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3765-sql-injection-in-itsourcecode-univer-6d84a21e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3765%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69adda962904315ca3ea0ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3764-improper-authorization-in-sourcecode-be8ab318</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3764%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3763-cross-site-scripting-in-code-project-57718c26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3763%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69adcc862904315ca3df3a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3762-improper-authorization-in-sourcecode-8f58b49a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3762%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3761-improper-authorization-in-sourcecode-685647db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3761%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3760-sql-injection-in-itsourcecode-univer-96d4785b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3760%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3759-sql-injection-in-projectworlds-onlin-d5105e31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3759%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3758-sql-injection-in-projectworlds-onlin-0a0c709d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3758%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3757-sql-injection-in-projectworlds-onlin-02ba6ae8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3757%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3756-sql-injection-in-sourcecodester-sale-64acb6bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3756%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3755-sql-injection-in-sourcecodester-sale-f37a46a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3755%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3754-sql-injection-in-sourcecodester-sale-ac14f663</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3754%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3753-sql-injection-in-sourcecodester-sale-71e9fdb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3753%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb0662904315ca3cdf014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3752-sql-injection-in-sourcecodester-empl-d7f036bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3752%3A%20SQL%20Injection%20in%20SourceCodester%20Employee%20Task%20Management%20System&amp;severity=medium&amp;id=69adb0662904315ca3cdf00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3751-sql-injection-in-sourcecodester-empl-1af4f1f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3751%3A%20SQL%20Injection%20in%20SourceCodester%20Employee%20Task%20Management%20System&amp;severity=medium&amp;id=69ada5d72904315ca3c7b46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3750-server-side-request-forgery-in-conti-21a73a4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3750%3A%20Server-Side%20Request%20Forgery%20in%20ContiNew%20Admin&amp;severity=medium&amp;id=69ada5d72904315ca3c7b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3749-unrestricted-upload-in-bytedesk-bcf82151</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3749%3A%20Unrestricted%20Upload%20in%20Bytedesk&amp;severity=medium&amp;id=69ada2562904315ca3c51412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3748-unrestricted-upload-in-bytedesk-51fa3d63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3748%3A%20Unrestricted%20Upload%20in%20Bytedesk&amp;severity=medium&amp;id=69ada2562904315ca3c51407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3747-sql-injection-in-itsourcecode-univer-fc6e6a87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3747%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69ada2562904315ca3c51400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3746-sql-injection-in-sourcecodester-simp-eee390ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3746%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=69ad9b4b2904315ca3c0f6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3745-sql-injection-in-code-projects-stude-dcc91ae0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3745%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=69ad9b4b2904315ca3c0f6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3744-sql-injection-in-code-projects-stude-a7dcbf08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3744%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3743-cross-site-scripting-in-yifang-cms-e1484fe7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3743%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3742-cross-site-scripting-in-yifang-cms-a944e116</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3742%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3741-cross-site-scripting-in-yifang-cms-b83d28be</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3741%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad8d3b2904315ca3b727ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3740-sql-injection-in-itsourcecode-univer-6e5ebad9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3740%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69ad8d3b2904315ca3b727a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3739-improper-authentication-in-suitenume-86af1c13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3739%3A%20Improper%20Authentication%20in%20suitenumerique%20messages&amp;severity=medium&amp;id=69ad86362904315ca3b03eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3738-improper-authorization-in-sourcecode-56a01e02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3738%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69ad7f2d2904315ca3ab3a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3737-improper-authorization-in-sourcecode-73c2f948</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3737%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69ad7f2d2904315ca3ab3a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3736-sql-injection-in-code-projects-simpl-6228c35e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3736%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7ddf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3735-sql-injection-in-code-projects-simpl-8c229f7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3735%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3734-improper-authorization-in-sourcecode-cc058dff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3734%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7dde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-cisco-catalyst-sd-wan-vulnerability-now-wid-d8c5b10c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Cisco%20Catalyst%20SD-WAN%20Vulnerability%20Now%20Widely%20Exploited&amp;severity=medium&amp;id=69ad69e02904315ca39f0717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3733-server-side-request-forgery-in-xuxue-10d35591</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3733%3A%20Server-Side%20Request%20Forgery%20in%20xuxueli%20xxl-job&amp;severity=medium&amp;id=69ad58832904315ca3977d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3732-stack-based-buffer-overflow-in-tenda-41443da2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3732%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad58832904315ca3977d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3731-out-of-bounds-read-in-libssh-21070aa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3731%3A%20Out-of-Bounds%20Read%20in%20libssh&amp;severity=medium&amp;id=69ae16ab2904315ca310d453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3730-sql-injection-in-itsourcecode-free-h-8dceb15e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3730%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3729-stack-based-buffer-overflow-in-tenda-c32f2d10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3729%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ae16ab2904315ca310d443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3728-stack-based-buffer-overflow-in-tenda-9cd01aff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3728%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad4df52904315ca3903934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3727-stack-based-buffer-overflow-in-tenda-b75939cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3727%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad4df52904315ca390392d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3726-stack-based-buffer-overflow-in-tenda-6f0be4bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3726%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad3fe72904315ca3895d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3725-improper-neutralization-of-special-e-4c8ec9b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3725%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad3fe72904315ca3895d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3724-improper-authorization-in-sourcecode-be7325e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3724%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69ad38dd2904315ca3862bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3723-sql-injection-in-code-projects-simpl-ef519ae6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3723%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad38dd2904315ca3862bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3721-cross-site-scripting-in-1024-lab-sma-8d474ce7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3721%3A%20Cross%20Site%20Scripting%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad27472904315ca37a8baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3720-cross-site-scripting-in-1024-lab-sma-42f1e756</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3720%3A%20Cross%20Site%20Scripting%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad23c92904315ca3793831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3719-path-traversal-in-tsinghua-unigroup--0b08a3de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3719%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=69ad23c92904315ca379382b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3716-cross-site-scripting-in-wavlink-wl-w-15d23a27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3716%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN579X3-C&amp;severity=medium&amp;id=69ad23c92904315ca3793824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3715-stack-based-buffer-overflow-in-wavli-504a0f36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3715%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-WN579X3-C&amp;severity=high&amp;id=69ad1cbb2904315ca37532d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3714-improper-neutralization-of-special-e-239b3f2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3714%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20OpenCart&amp;severity=medium&amp;id=69ad1cbb2904315ca37532ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3713-heap-based-buffer-overflow-in-pnggro-c90393c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3713%3A%20Heap-based%20Buffer%20Overflow%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69ad12452904315ca36fe687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3711-sql-injection-in-code-projects-simpl-69490cf7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3711%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad12452904315ca36fe67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3710-sql-injection-in-code-projects-simpl-0646e9b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3710%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad0ead2904315ca36e8d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3709-sql-injection-in-code-projects-simpl-f8a1e203</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3709%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad0ead2904315ca36e8d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3708-sql-injection-in-code-projects-simpl-120c2473</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3708%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad04212904315ca3691e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3707-integer-overflow-in-mrnanko-webp4j-0a183bd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3707%3A%20Integer%20Overflow%20in%20MrNanko%20webp4j&amp;severity=medium&amp;id=69ad04212904315ca3691e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3706-improper-verification-of-cryptograph-71eb7d25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3706%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20mkj%20Dropbear&amp;severity=medium&amp;id=69ad04212904315ca3691e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3705-sql-injection-in-code-projects-simpl-e3e4254b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3705%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad009b2904315ca367a3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3703-out-of-bounds-write-in-wavlink-nu516-a93ca55c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3703%3A%20Out-of-bounds%20Write%20in%20Wavlink%20NU516U1&amp;severity=critical&amp;id=69ad009b2904315ca367a3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3702-cross-site-scripting-in-sourcecodest-360d788f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3702%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Loan%20Management%20System&amp;severity=medium&amp;id=69ad009b2904315ca367a3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3701-buffer-overflow-in-h3c-magic-b1-5792aaae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3701%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69ad009b2904315ca367a3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3704-command-injection-in-wavlink-nu516u1-3d720bfc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3704%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=69acf60f2904315ca36302db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3700-buffer-overflow-in-utt-hiper-810g-be0d9392</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3700%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aceb852904315ca3579219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3699-buffer-overflow-in-utt-hiper-810g-3f47767c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3699%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aceb852904315ca3579212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3698-buffer-overflow-in-utt-hiper-810g-dd29f05a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3698%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69acdd752904315ca34c9894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3697-stack-based-buffer-overflow-in-plane-de3b04dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3697%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20ICG-2510&amp;severity=medium&amp;id=69acdd752904315ca34c988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30910-cwe-190-integer-overflow-or-wraparo-164ed431</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30910%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20IAMB%20Crypt%3A%3ASodium%3A%3AXS&amp;severity=high&amp;id=69acd2e62904315ca32e173c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30909-cwe-190-integer-overflow-or-wraparo-d5f24069</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30909%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20TIMLEGGE%20Crypt%3A%3ANaCl%3A%3ASodium&amp;severity=critical&amp;id=69acc85d2904315ca3180bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3696-os-command-injection-in-totolink-n30-86f6a631</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3696%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=medium&amp;id=69acc85d2904315ca3180bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3695-path-traversal-in-sourcecodester-mod-24d0e278</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3695%3A%20Path%20Traversal%20in%20SourceCodester%20Modern%20Image%20Gallery%20App&amp;severity=medium&amp;id=69acc85d2904315ca3180bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3693-improper-control-of-resource-identif-100ce1bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3693%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Shy2593666979%20AgentChat&amp;severity=medium&amp;id=69acc85d2904315ca3180bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-08-0080f7fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-08&amp;severity=medium&amp;id=69ae0f182904315ca3048175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-08-d9635b91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-08&amp;severity=medium&amp;id=69ad89812904315ca3b2115c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-08-224dde41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-08&amp;severity=low&amp;id=69acf95d2904315ca364a157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3683-server-side-request-forgery-in-bufan-eb980839</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3683%3A%20Server-Side%20Request%20Forgery%20in%20bufanyun%20HotGo&amp;severity=medium&amp;id=69acb8bfc48b3f10ffdd173d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3682-argument-injection-in-welovemedia-ff-2290a593</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3682%3A%20Argument%20Injection%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69acb8bfc48b3f10ffdd1737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3681-server-side-request-forgery-in-welov-532d42e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3681%3A%20Server-Side%20Request%20Forgery%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69acb1b4c48b3f10ffd9cf2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3680-command-injection-in-ryuzakishinji-b-5a8fcafe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3680%3A%20Command%20Injection%20in%20RyuzakiShinji%20biome-mcp-server&amp;severity=medium&amp;id=69acb1b4c48b3f10ffd9cf25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3679-stack-based-buffer-overflow-in-tenda-c7db2235</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3679%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69acaaaec48b3f10ffd665e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3678-stack-based-buffer-overflow-in-tenda-bf7fd6b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3678%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69acaaaec48b3f10ffd665e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3677-stack-based-buffer-overflow-in-tenda-8899ba38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3677%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69aca3a8c48b3f10ffd2f1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3675-improper-authorization-in-freedom-fa-54da6cfe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3675%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69aca3a8c48b3f10ffd2f1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3674-improper-authorization-in-freedom-fa-1ab10793</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3674%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3672-sql-injection-in-jeecgboot-020abedc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3672%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3671-improper-authorization-in-freedom-fa-0abbfa01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3671%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3670-improper-authorization-in-freedom-fa-eb9496f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3670%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac726ec48b3f10ffbca736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3669-improper-authorization-in-freedom-fa-a267bda9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3669%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac726ec48b3f10ffbca730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2671-cleartext-transmission-of-sensitive--c642213e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2671%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Mendi%20Neurofeedback%20Headset&amp;severity=low&amp;id=69ac6b6ac48b3f10ffb9ec7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30861%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=69ac564fc48b3f10ffb12c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30860-cwe-89-improper-neutralization-of-s-90c4d0a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30860%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=69ac564fc48b3f10ffb12c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30859-cwe-284-improper-access-control-in--fdab631b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30859%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30858-cwe-918-server-side-request-forgery-e3e1ce15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30858%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30857-cwe-639-authorization-bypass-throug-61a41dfc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30857%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30856-cwe-706-use-of-incorrectly-resolved-a9bc30d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30856%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30855-cwe-284-improper-access-control-in--d6ea3179</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30855%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tencent%20WeKnora&amp;severity=high&amp;id=69ac564fc48b3f10ffb12c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30851-cwe-287-improper-authentication-in--2fdd0c26</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30851%3A%20CWE-287%3A%20Improper%20Authentication%20in%20caddyserver%20caddy&amp;severity=high&amp;id=69ac564fc48b3f10ffb12c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30852-cwe-200-exposure-of-sensitive-infor-f99038f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30852%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30854-cwe-863-incorrect-authorization-in--2544594e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30854%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30850-cwe-862-missing-authorization-in-pa-5dc8b12f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30850%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30848-cwe-22-improper-limitation-of-a-pat-2ee1ac73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30848%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30863-cwe-287-improper-authentication-in--0b463399</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30863%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69ac52cfc48b3f10ffafee99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29196-cwe-863-incorrect-authorization-in--29d97e27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29196%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac52cfc48b3f10ffafee8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29195-cwe-863-incorrect-authorization-in--310d1238</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29195%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29194-cwe-863-incorrect-authorization-in--74a77e13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29194%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac4f4bc48b3f10ffae7abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29076-cwe-674-uncontrolled-recursion-in-y-995a29f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29076%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69ac4f4bc48b3f10ffae7aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28678-cwe-311-missing-encryption-of-sensi-3ca6a072</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28678%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20toxicbishop%20DSA-with-tsx&amp;severity=high&amp;id=69ac4f4bc48b3f10ffae7ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3668-improper-access-controls-in-freedom--df3a8b4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3668%3A%20Improper%20Access%20Controls%20in%20Freedom%20Factory%20dGEN1&amp;severity=low&amp;id=69ac4f4bc48b3f10ffae7ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30838-cwe-79-improper-neutralization-of-i-a2d9b480</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thephpleague%20commonmark&amp;severity=medium&amp;id=69ac4f4bc48b3f10ffae7ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30832-cwe-918-server-side-request-forgery-01aea4d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30832%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20charmbracelet%20soft-serve&amp;severity=critical&amp;id=69ac4f4bc48b3f10ffae7ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29787-cwe-200-exposure-of-sensitive-infor-ef5ed21c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29787%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20doobidoo%20mcp-memory-service&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9ddde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29786-cwe-22-improper-limitation-of-a-pat-81e9e2a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29786%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=69ac4840c48b3f10ffa9ddda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3667-improper-authorization-in-freedom-fa-7c9f8837</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3667%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3665-null-pointer-dereference-in-xlnt-com-e02eb063</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3665%3A%20NULL%20Pointer%20Dereference%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9dde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29784-cwe-352-cross-site-request-forgery--d730ba6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29784%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=69ac4840c48b3f10ffa9ddd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29781-cwe-476-null-pointer-dereference-in-1c68375a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29781%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20BishopFox%20sliver&amp;severity=low&amp;id=69ac44bec48b3f10ffa88859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29780-cwe-22-improper-limitation-of-a-pat-329b8ba7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29780%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GOVCERT-LU%20eml_parser&amp;severity=medium&amp;id=69ac44bec48b3f10ffa88854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29779-cwe-200-exposure-of-sensitive-infor-4843f8bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29779%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lyc8503%20UptimeFlare&amp;severity=high&amp;id=69ac44bec48b3f10ffa8884f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29190-cwe-22-improper-limitation-of-a-pat-2d7fa3a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29190%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Aiven-Open%20karapace&amp;severity=medium&amp;id=69ac44bec48b3f10ffa88848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29771-cwe-404-improper-resource-shutdown--049544f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29771%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac44bec48b3f10ffa8884c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3664-out-of-bounds-read-in-xlnt-community-ddf35f6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3664%3A%20Out-of-Bounds%20Read%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac3a2fc48b3f10ffa2ea03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3663-out-of-bounds-read-in-xlnt-community-f71a6234</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3663%3A%20Out-of-Bounds%20Read%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac3a2fc48b3f10ffa2e9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3662-command-injection-in-wavlink-wl-nu51-4098a232</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3662%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69ac2c1ec48b3f10ff9be98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3661-command-injection-in-wavlink-wl-nu51-5db35d81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3661%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69ac2c1ec48b3f10ff9be988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-github-repositories-distributing-boryptgr-3297ebaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20GitHub%20Repositories%20Distributing%20BoryptGrab%20Stealer&amp;severity=medium&amp;id=69ac1dd9c48b3f10ff94aae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pentagons-chief-tech-officer-says-he-clashed-with--14b6744b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pentagon%E2%80%99s%20Chief%20Tech%20Officer%20Says%20He%20Clashed%20With%20AI%20Company%20Anthropic%20Over%20Autonomous%20Warfare&amp;severity=medium&amp;id=69ac1353c48b3f10ff8eac20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-a0backdoor-linked-to-teams-impersonation-and-q-a3cec5d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20A0Backdoor%20Linked%20to%20Teams%20Impersonation%20and%20Quick%20Assist%20Social%20Engineering&amp;severity=medium&amp;id=69aea6472904315ca3faf832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-an-attack-chain-of-muddywater-37bdf022</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20an%20Attack%20Chain%20of%20MuddyWater&amp;severity=medium&amp;id=69aea6472904315ca3faf837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24308-cwe-532-insertion-of-sensitive-info-090ca1fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24308%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=medium&amp;id=69abe957c48b3f10ff7477fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24281-cwe-350-reliance-on-reverse-dns-res-ea5e3a9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24281%3A%20CWE-350%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=medium&amp;id=69abe957c48b3f10ff7477f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2219-vulnerability-in-debian-dpkg-8c8e482a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2219%3A%20Vulnerability%20in%20Debian%20dpkg&amp;severity=high&amp;id=69abdec8c48b3f10ff6e4439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1087-cwe-352-cross-site-request-forgery-c-e80bb5b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1087%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20openplatform%20The%20Guardian%20News%20Feed&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1086-cwe-352-cross-site-request-forgery-c-73cb4e8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1086%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpsolutions%20Font%20Pairing%20Preview%20For%20Landing%20Pages&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1085-cwe-352-cross-site-request-forgery-c-9eb582a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1085%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20optimizza%20True%20Ranker&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1825-cwe-79-improper-neutralization-of-in-2d3f4daa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1825%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minor%20Show%20YouTube%20video&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1824-cwe-79-improper-neutralization-of-in-99ce8457</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leopoldinfomaniak%20Infomaniak%20Connect%20for%20OpenID&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1823-cwe-79-improper-neutralization-of-in-a33c42c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20consensusintegrations%20Consensus%20Embed&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1074-cwe-79-improper-neutralization-of-in-ed135d09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryscript%20WP%20App%20Bar&amp;severity=high&amp;id=69abd7bec48b3f10ff68539f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1073-cwe-352-cross-site-request-forgery-c-6dff961d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1073%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themepul%20Purchase%20Button%20For%20Affiliate%20Link&amp;severity=medium&amp;id=69abd7bec48b3f10ff68539a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1820-cwe-79-improper-neutralization-of-in-c6432016</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainvireinfo%20Media%20Library%20Alt%20Text%20Editor&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1574-cwe-79-improper-neutralization-of-in-b377fdbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgamoni%20MyQtip%20%E2%80%93%20easy%20qTip2&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1805-cwe-79-improper-neutralization-of-in-290380ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damedialimited%20DA%20Media%20GigList&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1569-cwe-79-improper-neutralization-of-in-4cac7f8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nabeghe%20Wueen&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2433-cwe-79-improper-neutralization-of-in-09b1d445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1071-cwe-79-improper-neutralization-of-in-fd15de10</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1071%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cartaonline%20Carta%20Online&amp;severity=medium&amp;id=69abd7bec48b3f10ff685395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2420-cwe-79-improper-neutralization-of-in-850f4448</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lotekmedia%20LotekMedia%20Popup%20Form&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14675-cwe-22-improper-limitation-of-a-pat-b9e91655</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14675%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20metabox%20Meta%20Box&amp;severity=high&amp;id=69abd7bec48b3f10ff68538e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27796-cwe-200-exposure-of-sensitive-infor-d2299f63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27796%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27797-cwe-918-server-side-request-forgery-33b30167</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27797%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30830-cwe-79-improper-neutralization-of-i-f74109a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30830%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kepano%20defuddle&amp;severity=low&amp;id=69abbf1fc48b3f10ff5c73b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8899-cwe-269-improper-privilege-managemen-76efe6d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8899%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site%20%E2%80%93%20HTML5%20PPV%20Live%20Webcams&amp;severity=high&amp;id=69abbf1fc48b3f10ff5c73a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30829-cwe-200-exposure-of-sensitive-infor-2b9f639a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30829%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bluewave-labs%20Checkmate&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30842-cwe-862-missing-authorization-in-el-a8b951aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30842%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30841-cwe-79-improper-neutralization-of-i-2b6679ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30841%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30840-cwe-918-server-side-request-forgery-b545860c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30840%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69abbb9ec48b3f10ff5a086b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30839-cwe-918-server-side-request-forgery-3e3c4cf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30839%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30828-cwe-29-path-traversal-filename-in-e-986f32fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30828%3A%20CWE-29%3A%20Path%20Traversal%3A%20&apos;..filename&apos;%20in%20ellite%20Wallos&amp;severity=high&amp;id=69abbb9ec48b3f10ff5a0861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30824-cwe-306-missing-authentication-for--a4a97f75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30824%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb819c48b3f10ff5861e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30823-cwe-639-authorization-bypass-throug-0f7787b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30823%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb819c48b3f10ff5861df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30822-cwe-915-improperly-controlled-modif-4eb54742</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30822%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30821-cwe-434-unrestricted-upload-of-file-598fed66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30821%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30820-cwe-863-incorrect-authorization-in--33ff046d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30820%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30247-cwe-918-server-side-request-forgery-7ae2f848</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30247%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69aba2fec48b3f10ff3494bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3352-cwe-94-improper-control-of-generatio-066362fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3352%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20shahadul878%20Easy%20PHP%20Settings&amp;severity=high&amp;id=69ac8b62c48b3f10ffc6f6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2431-cwe-79-improper-neutralization-of-in-d9bab0c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2431%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20Custom%20Reports%20%E2%80%93%20Flexible%20reporting%20to%20track%20what%20matters%20most&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2722-cwe-79-improper-neutralization-of-in-4431a517</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20urkekg%20Stock%20Ticker&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2721-cwe-79-improper-neutralization-of-in-e9cc98a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pierrelannoy%20MailArchiver&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1650-cwe-862-missing-authorization-in-mdj-399bf7dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1650%3A%20CWE-862%20Missing%20Authorization%20in%20mdjm%20MDJM%20Event%20Management&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2429-cwe-89-improper-neutralization-of-sp-70e4bad1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2429%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2020-cwe-502-deserialization-of-untrusted-67fe1cb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2020%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20skatox%20JS%20Archive%20List&amp;severity=high&amp;id=69ac8b60c48b3f10ffc6f673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14353-cwe-89-improper-neutralization-of-s-6ded6a41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14353%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20presstigers%20ZIP%20Code%20Based%20Content%20Protection&amp;severity=high&amp;id=69ac8b60c48b3f10ffc6f661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2494-cwe-352-cross-site-request-forgery-c-58a3a384</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2494%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2488-cwe-862-missing-authorization-in-met-30ced25f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2488%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1902-cwe-79-improper-neutralization-of-in-ac9ae56e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20innovaatik%20Hammas%20Calendar&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-investigating-suspicious-cyber-activity-on-sys-78683f1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Investigating%20%E2%80%98Suspicious%E2%80%99%20Cyber%20Activity%20on%20System%20Holding%20Sensitive%20Surveillance%20Information&amp;severity=medium&amp;id=69ab7c1fc48b3f10ff111f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25073-cwe-79-improper-neutralization-of-i-e9f11af1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=medium&amp;id=69ab78cec48b3f10ff0845b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25072-cwe-330-use-of-insufficiently-rando-9bc8c17a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25072%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=high&amp;id=69ab78cec48b3f10ff0845b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25071-cwe-306-missing-authentication-for--d084643f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25071%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=high&amp;id=69ab78cec48b3f10ff0845b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25070-cwe-78-improper-neutralization-of-s-f0039eef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25070%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=critical&amp;id=69ab78cec48b3f10ff0845ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-07-fcc8041b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-07&amp;severity=medium&amp;id=69ae222d2904315ca3174075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-07-fc5fac0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-07&amp;severity=medium&amp;id=69acbf8cc48b3f10ffe29281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-07-ceef406f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-07&amp;severity=low&amp;id=69abdb09c48b3f10ff6b424e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1981-cwe-862-missing-authorization-in-win-2496c681</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1981%3A%20CWE-862%20Missing%20Authorization%20in%20winstonai%20HUMN-1%20AI%20Website%20Scanner%20%26%20Human%20Certification%20by%20Winston%20AI&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1644-cwe-352-cross-site-request-forgery-c-36f8a669</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1644%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20glowlogix%20WP%20Frontend%20Profile&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2371-cwe-862-missing-authorization-in-wps-7a4b5cc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2371%3A%20CWE-862%20Missing%20Authorization%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27142-cwe-79-improper-neutralization-of-i-c8bbfb70</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27142%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Go%20standard%20library%20html%2Ftemplate&amp;severity=medium&amp;id=69ab4b1fc48b3f10ffddeb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27139-cwe-363-race-condition-enabling-lin-098c68bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27139%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20Go%20standard%20library%20os&amp;severity=low&amp;id=69ab4b1fc48b3f10ffddeb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25679-cwe-1286-improper-validation-of-syn-ebb73155</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25679%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Go%20standard%20library%20net%2Furl&amp;severity=high&amp;id=69ab4b1fc48b3f10ffddeb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27138-cwe-1285-improper-validation-of-spe-62986369</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27138%3A%20CWE-1285%3A%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=medium&amp;id=69ab4b1fc48b3f10ffddeb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27137-cwe-295-improper-certificate-valida-8118560e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27137%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69ab4b1fc48b3f10ffddeb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30242-cwe-918-server-side-request-forgery-c687a2bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30242%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=69ab479ac48b3f10ffdbff8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30244-cwe-284-improper-access-control-in--1105edaa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30244%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20makeplane%20plane&amp;severity=high&amp;id=69ab479ac48b3f10ffdbff93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30241-cwe-863-incorrect-authorization-in--54440e88</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30241%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mercurius-js%20mercurius&amp;severity=low&amp;id=69ab479ac48b3f10ffdbff8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30238-cwe-79-improper-neutralization-of-i-f7d87f56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30238%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=69ab479ac48b3f10ffdbff88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30237-cwe-79-improper-neutralization-of-i-80bb9838</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30237%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=low&amp;id=69ab479ac48b3f10ffdbff85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30231-cwe-639-authorization-bypass-throug-a04ad200</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30231%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlintSH%20Flare&amp;severity=medium&amp;id=69ab4414c48b3f10ffd8fc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30230-cwe-639-authorization-bypass-throug-5dd7aff8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30230%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlintSH%20Flare&amp;severity=high&amp;id=69ab4414c48b3f10ffd8fc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30227-cwe-93-improper-neutralization-of-c-730af536</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30227%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20jstedfast%20MimeKit&amp;severity=medium&amp;id=69ab4414c48b3f10ffd8fc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29795-cwe-770-allocation-of-resources-wit-b46dbb2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29795%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stellar%20rs-stellar-xdr&amp;severity=medium&amp;id=69ab4093c48b3f10ffd6ce0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29790-cwe-22-improper-limitation-of-a-pat-495da025</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29790%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dbt-labs%20dbt-common&amp;severity=low&amp;id=69ab4093c48b3f10ffd6ce06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29789-cwe-862-missing-authorization-in-vi-a7e2f21c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29789%3A%20CWE-862%3A%20Missing%20Authorization%20in%20vitodeploy%20vito&amp;severity=critical&amp;id=69ab4093c48b3f10ffd6ce00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29788-cwe-283-unverified-ownership-in-mir-00a7d89c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29788%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20miraheze%20TSPortal&amp;severity=high&amp;id=69ab4093c48b3f10ffd6cdfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30835-cwe-209-generation-of-error-message-2f619d80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30835%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ab3d0ec48b3f10ffd4f2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30229-cwe-863-incorrect-authorization-in--3025edc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30229%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69ab3d0ec48b3f10ffd4f2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30228-cwe-863-incorrect-authorization-in--6cc83cac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30228%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ab3d0ec48b3f10ffd4f2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29182-cwe-863-incorrect-authorization-in--5263b108</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29182%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69ab3d0ec48b3f10ffd4f2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/middle-east-conflict-fuels-opportunistic-cyber-att-352466d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Middle%20East%20Conflict%20Fuels%20Opportunistic%20Cyber%20Attacks&amp;severity=medium&amp;id=69aea2c22904315ca3f9aaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29178-cwe-918-server-side-request-forgery-7d393c2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29178%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LemmyNet%20lemmy&amp;severity=high&amp;id=69ab19e8c48b3f10ffbbf2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29091-cwe-95-improper-neutralization-of-d-c92d8a83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29091%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20locutusjs%20locutus&amp;severity=high&amp;id=69ab1661c48b3f10ffba181e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30833-cwe-943-improper-neutralization-of--2e34817a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30833%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20RocketChat%20Rocket.Chat&amp;severity=medium&amp;id=69ab1661c48b3f10ffba1825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30831-cwe-287-improper-authentication-in--d6e13010</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30831%3A%20CWE-287%3A%20Improper%20Authentication%20in%20RocketChat%20Rocket.Chat&amp;severity=high&amp;id=69ab1661c48b3f10ffba1822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28514-cwe-287-improper-authentication-in--bf7998c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28514%3A%20CWE-287%3A%20Improper%20Authentication%20in%20RocketChat%20Rocket.Chat&amp;severity=critical&amp;id=69ab1661c48b3f10ffba1819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attacks-on-schools-and-colleges-kaspers-ad8615d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20attacks%20on%20schools%20and%20colleges%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ac9a40c48b3f10ffceb05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29089-cwe-426-untrusted-search-path-in-ti-e44a8f1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29089%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20timescale%20timescaledb&amp;severity=high&amp;id=69ab0f59c48b3f10ffb6232f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29087-cwe-863-incorrect-authorization-in--d805d9f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29087%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20honojs%20node-server&amp;severity=high&amp;id=69ab0f59c48b3f10ffb6232b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29783-cwe-78-improper-neutralization-of-s-97c9fcf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29783%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20github%20copilot-cli&amp;severity=high&amp;id=69ab0852c48b3f10ffb0e5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29082-cwe-79-improper-neutralization-of-i-06108f67</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29082%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kestra-io%20kestra&amp;severity=high&amp;id=69ab04d0c48b3f10ffaee2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15602-cwe-915-improperly-controlled-modif-0fbe3594</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15602%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Grokability%2C%20Inc.%20Snipe-IT&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29064-cwe-22-improper-limitation-of-a-pat-4981ec09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29064%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zarf-dev%20zarf&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-fbi-hacked-us-security-pro-killed-in-337e5e98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20FBI%20Hacked%2C%20US%20Security%20Pro%20Killed%20in%20Iran%20War%2C%20Hijacked%20Cameras%20Used%20in%20Khamenei%20Strike&amp;severity=medium&amp;id=69aaf688c48b3f10ffa45df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-access-delivered-through-fake-zoom-and-goog-47bded52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Access%20Delivered%20Through%20Fake%20Zoom%20and%20Google%20Meet%20Calls&amp;severity=medium&amp;id=69ae9bba2904315ca3f470df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-spyware-campaign-impersonates-israels-red-a-e5ebab35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20spyware%20campaign%20impersonates%20Israel&apos;s%20Red%20Alert%20rocket%20warning%20system&amp;severity=medium&amp;id=69ae9f3e2904315ca3f7e27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27027-cwe-522-in-everon-apieveronio-2ab7f513</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27027%3A%20CWE-522%20in%20Everon%20api.everon.io&amp;severity=medium&amp;id=69aaf339c48b3f10ffa20e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20748-cwe-613-in-everon-apieveronio-677f7800</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20748%3A%20CWE-613%20in%20Everon%20api.everon.io&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24696-cwe-307-in-everon-apieveronio-7062e309</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24696%3A%20CWE-307%20in%20Everon%20api.everon.io&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26288-cwe-306-in-everon-apieveronio-4db274ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26288%3A%20CWE-306%20in%20Everon%20api.everon.io&amp;severity=critical&amp;id=69aaf339c48b3f10ffa20e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27777-cwe-522-in-mobiliti-e-mobihu-e1f11063</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27777%3A%20CWE-522%20in%20Mobiliti%20e-mobi.hu&amp;severity=medium&amp;id=69aaf339c48b3f10ffa20e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27764-cwe-613-in-mobiliti-e-mobihu-3d2562c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27764%3A%20CWE-613%20in%20Mobiliti%20e-mobi.hu&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20882-cwe-307-in-mobiliti-e-mobihu-3abeebf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20882%3A%20CWE-307%20in%20Mobiliti%20e-mobi.hu&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2754-cwe-306-missing-authentication-for-c-7691b6a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2754%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Navtor%20NavBox&amp;severity=high&amp;id=69aaefb7c48b3f10ff9de731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2753-cwe-36-absolute-path-traversal-in-na-977a9330</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2753%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Navtor%20NavBox&amp;severity=high&amp;id=69aaefb7c48b3f10ff9de72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2752-cwe-209-generation-of-error-message--8ebaaf0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2752%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Navtor%20NavBox&amp;severity=medium&amp;id=69aaefb7c48b3f10ff9de72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26051-cwe-306-in-mobiliti-e-mobihu-70ec4ea6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26051%3A%20CWE-306%20in%20Mobiliti%20e-mobi.hu&amp;severity=critical&amp;id=69aaefb7c48b3f10ff9de726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-ios-flaws-from-coruna-exploit-kit-to-kev-c376b915</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20iOS%20Flaws%20From%20Coruna%20Exploit%20Kit%20to%20KEV%20List&amp;severity=medium&amp;id=69aad6e5c48b3f10ff88b243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rockwell-vulnerability-allowing-remote-ics-hacking-56518a14</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rockwell%20Vulnerability%20Allowing%20Remote%20ICS%20Hacking%20Exploited%20in%20Attacks&amp;severity=low&amp;id=69aacc59c48b3f10ff7e39bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28080-cwe-862-missing-authorization-in-ra-08d670cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28080%3A%20CWE-862%20Missing%20Authorization%20in%20Rank%20Math%20Rank%20Math%20SEO%20PRO&amp;severity=medium&amp;id=69aac58dc48b3f10ff75bf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28106-cwe-601-url-redirection-to-untruste-6f7aab75</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28106%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Kings%20Plugins%20B2BKing%20Premium&amp;severity=medium&amp;id=69aac20ac48b3f10ff714a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35644-cwe-79-improper-neutralization-of-i-384a621c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Pascal%20Birchler%20Preferred%20Languages&amp;severity=medium&amp;id=69aac20ac48b3f10ff714a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-hacked-us-airport-bank-software-compan-620d8441</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Hacked%20US%20Airport%2C%20Bank%2C%20Software%20Company&amp;severity=medium&amp;id=69aabe4dc48b3f10ff637826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1468-cwe-352-cross-site-request-forgery-c-3fa2a3bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1468%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=69aab775c48b3f10ff51325c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3589-cwe-352-cross-site-request-forgery-c-929d5a57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3589%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Automattic%20WooCommerce&amp;severity=high&amp;id=69aa9ed9c48b3f10ff40a463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2331-cwe-552-files-or-directories-accessi-5e67b9ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2331%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20SICK%20AG%20SICK%20Lector85x&amp;severity=critical&amp;id=69aa89c1c48b3f10ff2e8a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2330-cwe-552-files-or-directories-accessi-493bd9c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2330%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20SICK%20AG%20SICK%20Lector85x&amp;severity=critical&amp;id=69aa89c1c48b3f10ff2e8a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29074-cwe-776-improper-restriction-of-rec-bc543408</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29074%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20svg%20svgo&amp;severity=high&amp;id=69aa82b7c48b3f10ff296e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2830-cwe-94-improper-control-of-generatio-0bb50253</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2830%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpallimport%20WP%20All%20Import%20%E2%80%93%20Drag%20%26%20Drop%20Import%20for%20CSV%2C%20XML%2C%20Excel%20%26%20Google%20Sheets&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29183-cwe-79-improper-neutralization-of-i-768fb7e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69aa82b7c48b3f10ff296e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29073-cwe-862-missing-authorization-in-si-b68dce41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29073%3A%20CWE-862%3A%20Missing%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29062-cwe-770-allocation-of-resources-wit-840ac63f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29062%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20FasterXML%20jackson-core&amp;severity=high&amp;id=69aa82b7c48b3f10ff296e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29059-cwe-22-improper-limitation-of-a-pat-9b177476</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29059%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20windmill-labs%20windmill&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29058-cwe-78-improper-neutralization-of-s-6e5bf915</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29058%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo-Encoder&amp;severity=critical&amp;id=69aa7f36c48b3f10ff26b932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29049-cwe-400-uncontrolled-resource-consu-caf9817c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29049%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=69aa7f36c48b3f10ff26b92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29065-cwe-22-improper-limitation-of-a-pat-9b12e55d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29065%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69aa7f36c48b3f10ff26b935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29039-cwe-94-improper-control-of-generati-a252bc8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29039%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69aa7f36c48b3f10ff26b92a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29038-cwe-79-improper-neutralization-of-i-56be0ce4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29038%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=69aa7f36c48b3f10ff26b925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28804-cwe-407-inefficient-algorithmic-com-33d7baa9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28804%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff245871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28801-cwe-94-improper-control-of-generati-c0fc0149</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28801%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NatroTeam%20NatroMacro&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff24586e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28800-cwe-22-improper-limitation-of-a-pat-dfca6612</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28800%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NatroTeam%20NatroMacro&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff24586b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28438-cwe-89-improper-neutralization-of-s-5b163019</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28438%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cocoindex-io%20cocoindex&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff245863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28799-cwe-416-use-after-free-in-pjsip-pjp-3427c3c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28799%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69aa7bb0c48b3f10ff245867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29068-cwe-121-stack-based-buffer-overflow-0e1924ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29068%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69aa7bb0c48b3f10ff245877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28795-cwe-22-improper-limitation-of-a-pat-b24598ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28795%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zhongyu09%20openchatbi&amp;severity=high&amp;id=69aa74abc48b3f10ff21035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2446-cwe-862-missing-authorization-in-pow-801544ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2446%3A%20CWE-862%20Missing%20Authorization%20in%20PowerPack%20for%20LearnDash&amp;severity=critical&amp;id=69aa7125c48b3f10ff1eaaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1128-cwe-352-cross-site-request-forgery-c-9d4324d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1128%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20eCommerce&amp;severity=medium&amp;id=69aa7125c48b3f10ff1eaaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28794-cwe-1321-improperly-controlled-modi-427da505</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28794%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20middleapi%20orpc&amp;severity=critical&amp;id=69aa6319c48b3f10ff135409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29084-cwe-352-cross-site-request-forgery--2e66f130</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29084%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29061-cwe-284-improper-access-control-in--f342cb98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29061%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29060-cwe-284-improper-access-control-in--8b2784da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29060%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff13540d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28683-cwe-79-improper-neutralization-of-i-3dead106</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Forceu%20Gokapi&amp;severity=high&amp;id=69aa6319c48b3f10ff135405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28682-cwe-284-improper-access-control-in--00bddf4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28682%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28681-cwe-601-url-redirection-to-untruste-b554b77b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28681%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20irrdnet%20irrd&amp;severity=high&amp;id=69aa5c10c48b3f10ff0d74c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28679-cwe-22-improper-limitation-of-a-pat-2d04a517</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28679%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20xemle%20home-gallery&amp;severity=high&amp;id=69aa5c10c48b3f10ff0d74be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28509-cwe-79-improper-neutralization-of-i-e0679ca6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28509%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langbot-app%20LangBot&amp;severity=medium&amp;id=69aa5c10c48b3f10ff0d74b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29041-cwe-434-unrestricted-upload-of-file-e999d757</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29041%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59544-cwe-862-missing-authorization-in-ch-f37bb7fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59544%3A%20CWE-862%3A%20Missing%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69aa5508c48b3f10fff1d3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59543-cwe-79-improper-neutralization-of-i-0eef53dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59543%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69aa5508c48b3f10fff1d3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59542-cwe-79-improper-neutralization-of-i-47c12102</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59542%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69aa5508c48b3f10fff1d3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59541-cwe-352-cross-site-request-forgery--e2b1d14f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59541%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59540-cwe-80-improper-neutralization-of-s-9a418eac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59540%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69aa5508c48b3f10fff1d3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55289-cwe-79-improper-neutralization-of-i-190f2e91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55289%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28501-cwe-89-improper-neutralization-of-s-36e0dbd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28501%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28502-cwe-434-unrestricted-upload-of-file-779981cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28502%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29093-cwe-287-improper-authentication-in--b06804e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29093%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69aa4a7bc48b3f10ffe32f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29046-cwe-114-process-control-in-maximmas-416b5cf1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29046%3A%20CWE-114%3A%20Process%20Control%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28497-cwe-190-integer-overflow-or-wraparo-aa98a920</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28497%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25962-cwe-409-improper-handling-of-highly-de5d7f5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25962%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=69aa4a7bc48b3f10ffe32f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27807-cwe-776-improper-restriction-of-rec-2352478b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27807%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=69aa4a7bc48b3f10ffe32f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3616-sql-injection-in-defaultfuction-jeso-12cc9586</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3616%3A%20SQL%20Injection%20in%20DefaultFuction%20Jeson%20Customer%20Relationship%20Management%20System&amp;severity=medium&amp;id=69aa3c78c48b3f10ffcfb821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3613-stack-based-buffer-overflow-in-wavli-e7d59b95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3613%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69aa2e5ac48b3f10ffc36e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3612-command-injection-in-wavlink-wl-nu51-a43ad7d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3612%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69aa274ec48b3f10ffabbad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3610-cross-site-scripting-in-hsc-cybersec-5db7259d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3610%3A%20Cross%20Site%20Scripting%20in%20HSC%20Cybersecurity%20Mailinspector&amp;severity=medium&amp;id=69aa274ec48b3f10ffabbacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-06-866cbd09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-06&amp;severity=medium&amp;id=69ab6e0cc48b3f10fff05506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69654-na-44cf2543</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69654%3A%20n%2Fa&amp;severity=high&amp;id=69ab3283c48b3f10ffcc6477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69653-na-661f7105</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69653%3A%20n%2Fa&amp;severity=medium&amp;id=69ab20f4c48b3f10ffc04698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69652-na-89a022c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69652%3A%20n%2Fa&amp;severity=medium&amp;id=69ab20f4c48b3f10ffc04694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69650-na-8107a9f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69650%3A%20n%2Fa&amp;severity=high&amp;id=69ab1d6dc48b3f10ffbeb7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69649-na-a1749c93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69649%3A%20n%2Fa&amp;severity=medium&amp;id=69ab1d6dc48b3f10ffbeb7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69651-na-6ed8e52a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69651%3A%20n%2Fa&amp;severity=medium&amp;id=69ab19e8c48b3f10ffbbf2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69646-na-8ed65ffb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69646%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb62327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69645-na-356b454c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69645%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb62323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69644-na-e8df8165</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69644%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb6231f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70363-na-917512e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70363%3A%20n%2Fa&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-06-394941b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-06&amp;severity=medium&amp;id=69aabac0c48b3f10ff54eb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-06-b3d61573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-06&amp;severity=low&amp;id=69aabac0c48b3f10ff54eade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28726-cwe-863-in-acronis-acronis-cyber-pr-ae9468f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28726%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1cc6c48b3f10ff8f955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28725-cwe-732-in-acronis-acronis-cyber-pr-5efe8500</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28725%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1cc6c48b3f10ff8f9558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30413-cwe-732-in-acronis-acronis-cyber-pr-ecf57f6e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30413%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28724-cwe-863-in-acronis-acronis-cyber-pr-c4198fcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28724%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1965c48b3f10ff8d2b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28723-cwe-863-in-acronis-acronis-cyber-pr-5f3e63ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28723%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1965c48b3f10ff8d2b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28722-cwe-610-in-acronis-acronis-cyber-pr-2402ead0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28722%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28721-cwe-610-in-acronis-acronis-cyber-pr-8b4a5c71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28721%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28720-cwe-863-in-acronis-acronis-cyber-pr-41955de7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28720%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28719-cwe-863-in-acronis-acronis-cyber-pr-6d5e2241</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28719%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28718-cwe-779-in-acronis-acronis-cyber-pr-a9dbceaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28718%3A%20CWE-779%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28717-cwe-276-in-acronis-acronis-cyber-pr-83a858f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28717%3A%20CWE-276%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28716-cwe-863-in-acronis-acronis-cyber-pr-1699ecb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28716%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28715-cwe-863-in-acronis-acronis-cyber-pr-cb280302</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28715%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28714-cwe-522-in-acronis-acronis-cyber-pr-b7b480ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28714%3A%20CWE-522%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28713-cwe-1392-in-acronis-acronis-cyber-p-ae137381</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28713%3A%20CWE-1392%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28712-cwe-427-in-acronis-acronis-cyber-pr-05ca5ab4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28712%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28711-cwe-427-in-acronis-acronis-cyber-pr-9c33e230</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28711%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28710-cwe-1390-in-acronis-acronis-cyber-p-29d27d91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28710%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28709-cwe-863-in-acronis-acronis-cyber-pr-9d9af414</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28709%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11790-cwe-732-in-acronis-acronis-cyber-pr-d26c0fd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11790%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11791-cwe-862-in-acronis-acronis-cyber-pr-95aaee43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11791%3A%20CWE-862%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11792-cwe-427-in-acronis-acronis-cyber-pr-d49c2cc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11792%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28727-cwe-276-in-acronis-acronis-cyber-pr-1f5f5b7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28727%3A%20CWE-276%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1965c48b3f10ff8d2b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27770-cwe-522-in-epower-epowerie-76cf915c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27770%3A%20CWE-522%20in%20ePower%20epower.ie&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24912-cwe-613-in-epower-epowerie-3fcc469f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24912%3A%20CWE-613%20in%20ePower%20epower.ie&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27778-cwe-307-in-epower-epowerie-3015e8f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27778%3A%20CWE-307%20in%20ePower%20epower.ie&amp;severity=high&amp;id=69aa15bec48b3f10ff8a0fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2589-cwe-200-exposure-of-sensitive-inform-2dc93144</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2589%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69aa15bec48b3f10ff8a0fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22552-cwe-306-in-epower-epowerie-1e2e527e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22552%3A%20CWE-306%20in%20ePower%20epower.ie&amp;severity=critical&amp;id=69aa15bec48b3f10ff8a0fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26122-information-disclosure-in-microsoft-09c389e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26122%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26125-cwe-306-missing-authentication-for--ae4455f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26125%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Payment%20Orchestrator%20Service&amp;severity=high&amp;id=69aa042dc48b3f10ff7dd2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26124-cwe-35-path-traversal-in-microsoft--129daa24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26124%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21536-cwe-434-unrestricted-upload-of-file-3dbf1775</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21536%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Microsoft%20Microsoft%20Devices%20Pricing%20Program&amp;severity=critical&amp;id=69aa042dc48b3f10ff7dd29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23651-cwe-625-permissive-regular-expressi-1f6596b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23651%3A%20CWE-625%3A%20Permissive%20Regular%20Expression%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3606-out-of-bounds-read-in-ettercap-c4751691</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3606%3A%20Out-of-Bounds%20Read%20in%20Ettercap&amp;severity=medium&amp;id=69aa00a5c48b3f10ff7ae786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28484-fde8f0db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28484&amp;severity=null&amp;id=69ab0852c48b3f10ffb0e5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28474-incorrect-authorization-in-openclaw-da9baab9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28474%3A%20Incorrect%20Authorization%20in%20OpenClaw%20nextcloud-talk&amp;severity=critical&amp;id=69aa00a5c48b3f10ff7ae781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28465-insufficient-verification-of-data-a-efea20a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28465%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20OpenClaw%20voice-call&amp;severity=high&amp;id=69aa00a5c48b3f10ff7ae77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2593-cwe-79-improper-neutralization-of-in-8c16f488</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2593%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69a9f99ec48b3f10ff5cf16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55208-cwe-79-improper-neutralization-of-i-f54629d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55208%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69a9f294c48b3f10ff5116be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0848-cwe-20-improper-input-validation-in--af71c4ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0848%3A%20CWE-20%20Improper%20Input%20Validation%20in%20nltk%20nltk%2Fnltk&amp;severity=critical&amp;id=69a9ef11c48b3f10ff4d0658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22723-vulnerability-in-cloudfoundry-found-a9411f93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22723%3A%20Vulnerability%20in%20Cloudfoundry%20Foundation%20UAA&amp;severity=medium&amp;id=69a9ef11c48b3f10ff4d065b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28442-cwe-73-external-control-of-file-nam-66c91287</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28442%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a9ef11c48b3f10ff4d065e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28413-cwe-601-url-redirection-to-untruste-64093f53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28413%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20plone%20Products.isurlinportal&amp;severity=medium&amp;id=69a9e67761e8e69ef5f7009c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ai-assistant-extensions-harvest-llm-chat-644bc76e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20AI%20Assistant%20Extensions%20Harvest%20LLM%20Chat%20Histories&amp;severity=medium&amp;id=69aabacfc48b3f10ff5537f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/south-american-telecommunication-providers-targete-e1d2d261</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=South%20American%20telecommunication%20providers%20targeted%20with%20three%20new%20malware%20implants&amp;severity=medium&amp;id=69aabacfc48b3f10ff55379c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28410-cwe-284-improper-access-control-in--77618731</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28410%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20graphprotocol%20contracts&amp;severity=medium&amp;id=69a9e67761e8e69ef5f70098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28405-cwe-79-improper-neutralization-of-i-f136d9aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MarkUsProject%20Markus&amp;severity=high&amp;id=69a9e67761e8e69ef5f70093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28353-cwe-506-embedded-malicious-code-in--facddd89</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28353%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20aquasecurity%20trivy-vscode-extension&amp;severity=critical&amp;id=69a9e2f561e8e69ef5e92416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28350-cwe-116-improper-encoding-or-escapi-f2a1a98e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28350%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20fedora-python%20lxml_html_clean&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e92412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28348-cwe-116-improper-encoding-or-escapi-f0e49774</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28348%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20fedora-python%20lxml_html_clean&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e9240e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28343-cwe-79-improper-neutralization-of-i-9756676b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28343%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ckeditor%20ckeditor5&amp;severity=medium&amp;id=69a9df7061e8e69ef5e51b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28277-cwe-502-deserialization-of-untruste-405e3490</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28277%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e9241d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13350-cwe-416-use-after-free-in-canonical-d0ad2719</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13350%3A%20CWE-416%20Use%20After%20Free%20in%20Canonical%20Ubuntu%20Linux&amp;severity=high&amp;id=69a9e2f561e8e69ef5e92419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3047-authentication-bypass-by-primary-wea-c4898340</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3047%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3009-improper-authorization-in-red-hat-re-a8b6d3ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3009%3A%20Incorrect%20Authorization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28287-cwe-78-improper-neutralization-of-s-f3029c62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28287%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d1248c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3459-cwe-434-unrestricted-upload-of-file--0bb23ab9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3459%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69a9d16b61e8e69ef5d1249b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28284-cwe-89-improper-neutralization-of-s-1d52e754</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28284%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28210-cwe-89-improper-neutralization-of-s-40dd310e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28210%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28209-cwe-78-improper-neutralization-of-s-a0f9d9d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28209%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7375-cwe-20-improper-input-validation-in--8934f0d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7375%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20EAP610%20v3&amp;severity=medium&amp;id=69a9c994460e1c85df139338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13476-cwe-327-use-of-a-broken-or-risky-cr-5cab70df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13476%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Rakuten%20Viber%20Rakuten%20Viber%20Cloak%20-%20Android&amp;severity=critical&amp;id=69a9c994460e1c85df139316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27944-cwe-311-missing-encryption-of-sensi-409464ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27944%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69a9c996460e1c85df139361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24457-cwe-22-improper-limitation-of-a-pat-5ef15632</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24457%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eclipse%20Foundation%20Eclipse%20OpenMQ&amp;severity=critical&amp;id=69a9c994460e1c85df13933d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27723-cwe-284-improper-access-control-in--932e3277</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27723%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opf%20openproject&amp;severity=medium&amp;id=69a9c996460e1c85df13935c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27023-cwe-918-server-side-request-forgery-94391960</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27023%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20twentyhq%20twenty&amp;severity=medium&amp;id=69a9c996460e1c85df139358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30785-cwe-257-in-rustdesk-client-rustdesk-476aaa7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30785%3A%20CWE-257%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9ad6c460e1c85dfe74263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30784-cwe-862-missing-authorization-in-ru-97b16d4b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30784%3A%20CWE-862%20Missing%20Authorization%20in%20rustdesk-server%20RustDesk%20Server&amp;severity=high&amp;id=69a9ad6c460e1c85dfe74260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30783-cwe-602-in-rustdesk-client-rustdesk-6f13408a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30783%3A%20CWE-602%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9ad6c460e1c85dfe7425d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30790-cwe-307-improper-restriction-of-exc-765a4f40</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30790%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30789-cwe-294-authentication-bypass-by-ca-ea65bd02</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30789%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30798-cwe-345-insufficient-verification-o-6936b5e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30798%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30797-cwe-862-missing-authorization-in-ru-9b5e712b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30797%3A%20CWE-862%20Missing%20Authorization%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25048-cwe-674-uncontrolled-recursion-in-m-d4dc88f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25048%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20mlc-ai%20xgrammar&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64166-cwe-352-cross-site-request-forgery--1601b4e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64166%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mercurius-js%20mercurius&amp;severity=medium&amp;id=69a9c05f460e1c85df0c5c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30796-cwe-319-cleartext-transmission-of-s-4a9cfc73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30796%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30795-cwe-319-cleartext-transmission-of-s-73da2f1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30795%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9a2e4460e1c85dfd8771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30794-cwe-295-improper-certificate-valida-d480f40a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30794%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd8771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30793-cwe-285-in-rustdesk-client-rustdesk-991b7094</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30793%3A%20CWE-285%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd87716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30792-cwe-657-in-rustdesk-client-rustdesk-c970abe3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30792%3A%20CWE-657%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd87713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-half-of-2025s-90-exploited-zero-days-aimed--f4c73b61</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%3A%20Half%20of%202025%E2%80%99s%2090%20Exploited%20Zero-Days%20Aimed%20at%20Enterprises&amp;severity=medium&amp;id=69a99b5f224272a26dae95de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30791-cwe-327-use-of-a-broken-or-risky-cr-357ade28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30791%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a99d83d9f976b5b5c65c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27748-cwe-59-improper-link-resolution-bef-b9c573ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27748%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a9529b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27749-cwe-502-deserialization-of-untruste-356af843</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27749%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a952a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27750-cwe-367-time-of-check-time-of-use-t-22539585</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27750%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a952a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3598-cwe-327-use-of-a-broken-or-risky-cry-b5be621d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3598%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=high&amp;id=69a993803bbe47dd19a952ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1720-cwe-862-missing-authorization-in-wpx-95778eab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1720%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20WowOptin%3A%20Next-Gen%20Popup%20Maker%20%E2%80%93%20Create%20Stunning%20Popups%20and%20Optins%20for%20Lead%20Generation&amp;severity=high&amp;id=69a988fd3bbe47dd199708fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-ransomware-operator-pleads-guilty-in-us-e493b9c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Ransomware%20Operator%20Pleads%20Guilty%20in%20US&amp;severity=medium&amp;id=69a97ca30e5bba37cadb2726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-tech-support-delivers-havoc-command-control-59a90ba0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Tech%20Support%20Delivers%20Havoc%20Command%20%26%20Control&amp;severity=medium&amp;id=69a99d4dd9f976b5b5c444b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2599-cwe-502-deserialization-of-untrusted-8a4a84f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2599%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=critical&amp;id=69a97ce30e5bba37cadb5ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-disable-unwanted-ai-assistants-and-features-54c29a8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20disable%20unwanted%20AI%20assistants%20and%20features%20on%20your%20PC%20and%20smartphone%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a9798c0e5bba37cad8d7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-more-catalyst-sd-wan-flaws-exploite-f4918229</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20More%20Catalyst%20SD-WAN%20Flaws%20Exploited%20in%20the%20Wild&amp;severity=medium&amp;id=69a9759b0e5bba37cad5da4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leakbase-cybercrime-forum-shut-down-suspects-arres-184a6f89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeakBase%20Cybercrime%20Forum%20Shut%20Down%2C%20Suspects%20Arrested&amp;severity=medium&amp;id=69a960820e5bba37cabba3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3236-cwe-863-incorrect-authorization-in-o-bc126ace</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3236%3A%20CWE-863%20Incorrect%20Authorization%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=low&amp;id=69a96ed40e5bba37cacf0189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1605-cwe-400-uncontrolled-resource-consum-0a9505ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1605%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69a9562d0e5bba37ca990db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11143-cwe-20-improper-input-validation-in-5b9ca7d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11143%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=low&amp;id=69a952a60e5bba37ca8f75ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21628-cwe-434-unrestricted-upload-of-file-fb005d26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21628%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20astroidframe.work%20Astroid%20Template%20Framework&amp;severity=critical&amp;id=69a952a60e5bba37ca8f75b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-enterpri-60dcf18f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Enterprise%20Networking%20Products&amp;severity=critical&amp;id=69a944620e5bba37ca7a0a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28542-cwe-755-improper-handling-of-except-aeb52e45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28542%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69a9437a0e5bba37ca78f119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28548-cwe-269-improper-privilege-manageme-c0b6d666</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28548%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69a9437a0e5bba37ca78f11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28551-cwe-362-concurrent-execution-using--6580cf78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28551%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a9437a0e5bba37ca78f120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28549-cwe-362-concurrent-execution-using--acd96308</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28549%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28547-cwe-824-access-of-uninitialized-poi-08c4edcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28547%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28546-cwe-122-heap-based-buffer-overflow--31312413</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28546%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28543-cwe-362-concurrent-execution-using--6fe78fe7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28543%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28541-cwe-264-permissions-privileges-and--8d92a643</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28541%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28540-cwe-158-improper-neutralization-of--82bd380c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28540%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28539-cwe-19-data-processing-errors-in-hu-36035c5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28539%3A%20CWE-19%20Data%20Processing%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28538-cwe-24-path-traversal-filedir-in-hu-aedb987e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28538%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66319-cwe-264-permissions-privileges-and--48be1dfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66319%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69a938c5d1a09e29cbf5d4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28552-cwe-19-data-processing-errors-in-hu-1393e410</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28552%3A%20CWE-19%20Data%20Processing%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28550-cwe-840-business-logic-errors-in-hu-428a1b72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28550%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28545-cwe-362-concurrent-execution-using--c73349bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28545%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28544-cwe-362-concurrent-execution-using--e438641a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28544%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1321-cwe-862-missing-authorization-in-ste-01ad73de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1321%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=high&amp;id=69a931c0d1a09e29cbf198c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2893-cwe-89-improper-neutralization-of-sp-0b8faf55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2893%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20carlosfazenda%20Fast%20Page%20%26%20Post%20Duplicator&amp;severity=medium&amp;id=69a931c0d1a09e29cbf198d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21786-cwe-532-insertion-of-sensitive-info-45210306</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21786%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20HCLSoftware%20Sametime%20for%20iOS&amp;severity=low&amp;id=69a931c0d1a09e29cbf198ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28537-cwe-415-double-free-in-huawei-harmo-e37f161c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28537%3A%20CWE-415%20Double%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a931c0d1a09e29cbf198cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28536-cwe-305-authentication-bypass-by-pr-3e5ae728</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28536%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=69a92e3cd1a09e29cbef609e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25702-cwe-284-improper-access-control-in--2f29ac3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25702%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20SUSE%20SUSE%20Linux%20Enterprise%20Server&amp;severity=high&amp;id=69a92e3cd1a09e29cbef609b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1678-out-of-bounds-write-in-zephyrproject-aa51fbaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1678%3A%20Out-of-bounds%20Write%20in%20zephyrproject-rtos%20Zephyr&amp;severity=critical&amp;id=69a92731d1a09e29cbeaae24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2418-cwe-287-improper-authentication-in-l-1b2dce9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2418%3A%20CWE-287%20Improper%20Authentication%20in%20Login%20with%20Salesforce&amp;severity=critical&amp;id=69a9206cd1a09e29cbe6d01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28137-improper-neutralization-of-input-du-c941043d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28137%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20MediCenter%20-%20Health%20Medical%20Clinic&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28135-inclusion-of-functionality-from-unt-81d65bc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28135%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28134-improper-control-of-generation-of-c-67944697</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28134%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28133-unrestricted-upload-of-file-with-da-4d93fbb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28133%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Chill%20Filr&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28130-improper-neutralization-of-input-du-e3bed1ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28130%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AndonDesign%20UDesign&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28129-improper-control-of-filename-for-in-ee00e000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28129%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Little%20Birdies&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28128-improper-control-of-filename-for-in-1923616c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28128%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Verse&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28127-improper-neutralization-of-input-du-b3564c0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28127%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28126-improper-neutralization-of-input-du-65d31539</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28126%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sizam%20RH%20Frontend%20Publishing%20Pro&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28125-improper-control-of-filename-for-in-e2c0f645</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28125%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Midi&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28124-improper-control-of-filename-for-in-00784f3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28124%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Notarius&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28123-improper-control-of-filename-for-in-8adfb831</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28123%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Veil&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28122-improper-neutralization-of-input-du-6f368f41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28122%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28121-improper-control-of-filename-for-in-d1180c26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28121%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Anderson&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28120-improper-control-of-filename-for-in-fc28c46c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28120%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dr.Patterson&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28119-improper-control-of-filename-for-in-aabd1146</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28119%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Nirvana&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28118-improper-control-of-filename-for-in-4860a768</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28118%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Welldone&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28117-improper-control-of-filename-for-in-9a4c50a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28117%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20smart%20SEO&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28115-improper-neutralization-of-special--1eebab36</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28115%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20loopus%20WP%20Attractive%20Donations%20System%20-%20Easy%20Stripe%20%26%20Paypal%20donations&amp;severity=critical&amp;id=69a92069d1a09e29cbe6cf64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28114-unrestricted-upload-of-file-with-da-5f3102b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28114%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20firassaidi%20WooCommerce%20License%20Manager&amp;severity=critical&amp;id=69a92069d1a09e29cbe6cf61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28113-improper-neutralization-of-input-du-21672d39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28113%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azzaroco%20Ultimate%20Learning%20Pro&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28112-improper-neutralization-of-input-du-ded4c6e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20AllInOne%20-%20Banner%20Rotator&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28110-improper-neutralization-of-input-du-d21f4df5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28110%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Playlist&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28109-improper-neutralization-of-input-du-c0f8a99d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28109%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Content%20Slider&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28108-improper-neutralization-of-input-du-82eab159</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28108%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Thumbnails&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28107-improper-control-of-filename-for-in-510fedd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28107%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Muzicon&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28105-deserialization-of-untrusted-data-i-4b189c04</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28105%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Good%20Energy&amp;severity=critical&amp;id=69a92067d1a09e29cbe6cf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28104-missing-authorization-in-aryan-shir-cfa838ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28104%3A%20Missing%20Authorization%20in%20Aryan%20Shirani%20Bid%20Abadi%20Site%20Suggest&amp;severity=medium&amp;id=69a92067d1a09e29cbe6cf3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28103-improper-neutralization-of-input-du-af39aa6e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28103%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LBG%20Zoominoutslider&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28102-improper-neutralization-of-input-du-97c5699a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20Classic&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28101-improper-neutralization-of-input-du-0b6e4bbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28101%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20MouseInteraction&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28100-improper-neutralization-of-input-du-34e884d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28100%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20PerpetuumMobile&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28099-improper-neutralization-of-input-du-19629351</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28099%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20Ultra&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28098-improper-control-of-filename-for-in-0ec6c859</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28098%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Save%20Life&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28097-improper-control-of-filename-for-in-8bdc49fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28097%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Artrium&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28096-improper-control-of-filename-for-in-c8db7c35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28096%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20WealthCo&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28095-improper-control-of-filename-for-in-b03c4d5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28095%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Marcell&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28094-improper-control-of-filename-for-in-955abaa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28094%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20RexCoin&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28093-improper-control-of-filename-for-in-999684bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28093%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Ozisti&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28092-improper-control-of-filename-for-in-bbc94959</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28092%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Sounder&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28091-improper-control-of-filename-for-in-f64daafe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28091%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Coleo&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28090-improper-control-of-filename-for-in-53cfd3ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28090%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gamezone&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28089-improper-control-of-filename-for-in-6b4eda05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28089%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Daiquiri&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28088-improper-control-of-filename-for-in-ec3099b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28088%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Aqualots&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28087-improper-control-of-filename-for-in-87269b7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Filmax&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28086-improper-control-of-filename-for-in-f835154b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28086%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Run%20Gran&amp;severity=high&amp;id=69a92066d1a09e29cbe6ceff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28085-improper-control-of-filename-for-in-765ce10f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28085%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Mahogany&amp;severity=high&amp;id=69a92064d1a09e29cbe6cebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28084-improper-control-of-filename-for-in-75aa4cf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28084%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bazinga&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28081-improper-control-of-filename-for-in-6619b6bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Windsor&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28079-improper-control-of-filename-for-in-e5dd1b45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28079%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Conquerors&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28078-improper-limitation-of-a-pathname-t-8d7dc3a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28078%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Stylemix%20uListing&amp;severity=medium&amp;id=69a92064d1a09e29cbe6ceb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28077-improper-control-of-filename-for-in-7af042b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Vapester&amp;severity=high&amp;id=69a92064d1a09e29cbe6cead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28076-missing-authorization-in-frenify-gu-8487132d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28076%3A%20Missing%20Authorization%20in%20Frenify%20Guff&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28075-improper-neutralization-of-input-du-ca12a7f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20p-themes%20Porto&amp;severity=high&amp;id=69a92064d1a09e29cbe6cea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28074-deserialization-of-untrusted-data-i-0ac23ece</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28074%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Pizza%20House&amp;severity=critical&amp;id=69a92064d1a09e29cbe6cea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28072-improper-neutralization-of-input-du-e920df06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PixFort%20pixfort%20Core&amp;severity=high&amp;id=69a92064d1a09e29cbe6cea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28071-missing-authorization-in-pixfort-pi-5081bcec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28071%3A%20Missing%20Authorization%20in%20PixFort%20pixfort%20Core&amp;severity=medium&amp;id=69a92061d1a09e29cbe6ce57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28069-improper-control-of-filename-for-in-60094f69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28069%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Le%20Truffe&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28068-improper-control-of-filename-for-in-b4e10189</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28068%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Rhythmo&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28067-improper-control-of-filename-for-in-26745f1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bassein&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28066-improper-control-of-filename-for-in-bdb29538</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Legrand&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28065-improper-control-of-filename-for-in-2ad80c72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Eject&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28064-improper-control-of-filename-for-in-b97d1b8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Edge%20Decor&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28063-improper-control-of-filename-for-in-f8decddf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28063%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Asia%20Garden&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28062-improper-control-of-filename-for-in-ff932e87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Happy%20Baby&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28061-improper-control-of-filename-for-in-26df6673</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tiger%20Claw&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28060-improper-control-of-filename-for-in-0c15d442</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20S.King&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28059-improper-control-of-filename-for-in-236499f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28059%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dermatology%20Clinic&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28058-improper-control-of-filename-for-in-cf407b28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28058%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dixon&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28057-improper-control-of-filename-for-in-ec1b273e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28057%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Mandala&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28056-improper-control-of-filename-for-in-373db8c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28056%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20MCKinney&apos;s%20Politics&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28055-improper-control-of-filename-for-in-024d6f86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28055%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20M.Williamson&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28054-improper-control-of-filename-for-in-ade08240</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28054%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Legal%20Stone&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28053-improper-control-of-filename-for-in-ba94b1aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28053%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Miller&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28052-improper-control-of-filename-for-in-5210e6d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Peter%20Mason&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28051-improper-control-of-filename-for-in-26a00534</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28051%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yacht%20Rental&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28050-improper-control-of-filename-for-in-11ea84ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28050%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Beacon&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28049-improper-control-of-filename-for-in-8faec466</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28049%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Police%20Department&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28048-improper-control-of-filename-for-in-ef6a6283</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20FlashMart&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28047-improper-control-of-filename-for-in-826236d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20Victo&amp;severity=high&amp;id=69a9205dd1a09e29cbe69baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28046-improper-control-of-filename-for-in-51cbc58c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28046%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Law%20Office&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28045-improper-control-of-filename-for-in-2fdee9df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28045%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20N7%20%7C%20Golf%20Club%20Sports%20%26%20Events&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28043-improper-control-of-filename-for-in-d9ece99f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28043%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Healer%20-%20Doctor%2C%20Clinic%20%26%20Medical%20WordPress%20Theme&amp;severity=critical&amp;id=69a9205dd1a09e29cbe69ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28042-improper-neutralization-of-input-du-ff3eb323</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20Listify&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28041-improper-control-of-filename-for-in-b50b73c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28041%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Grit&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28038-missing-authorization-in-brainstorm-d0becb86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28038%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69a9205dd1a09e29cbe69b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28037-improper-neutralization-of-input-du-e9083dcf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ashanjay%20EventON&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28036-server-side-request-forgery-ssrf-in-3609b380</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28036%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SkatDesign%20Ratatouille&amp;severity=medium&amp;id=69a9205bd1a09e29cbe69b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28035-improper-control-of-filename-for-in-0b6138fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28035%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Printy&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28034-improper-control-of-filename-for-in-1efa764b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28034%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Progress&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28033-improper-control-of-filename-for-in-6042504f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28033%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Edifice&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28032-improper-control-of-filename-for-in-00e05904</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28032%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tuning&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28031-improper-control-of-filename-for-in-2dd9c45a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28031%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Invetex&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28030-improper-control-of-filename-for-in-2aab436d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28030%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bonbon&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28029-improper-control-of-filename-for-in-59d71a4a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28029%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20EmojiNation&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28028-improper-control-of-filename-for-in-685d0513</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28028%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20MoneyFlow&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28027-improper-control-of-filename-for-in-7d3878a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28027%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Kayon&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28026-improper-control-of-filename-for-in-0e5767c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28026%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Motorix&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28025-improper-control-of-filename-for-in-038c8f04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28025%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Stargaze&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28024-improper-control-of-filename-for-in-35450740</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28024%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Helion&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28023-improper-control-of-filename-for-in-80e0d822</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28023%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Nuts&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28022-improper-control-of-filename-for-in-b838d177</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28022%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Foodie&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28021-improper-control-of-filename-for-in-27adebf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28021%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Craftis&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28020-improper-control-of-filename-for-in-6406328a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28020%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Chroma&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28019-improper-control-of-filename-for-in-e5d0049e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28019%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Manoir&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28018-improper-control-of-filename-for-in-ccd68ec7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28018%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Global%20Logistics&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28017-improper-control-of-filename-for-in-2390eba3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Green%20Thumb&amp;severity=high&amp;id=69a92058d1a09e29cbe69b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28016-improper-control-of-filename-for-in-7a1e7f00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28016%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Luxury%20Wine&amp;severity=high&amp;id=69a92058d1a09e29cbe69b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28015-improper-control-of-filename-for-in-5b68c2a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28015%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ShiftCV&amp;severity=high&amp;id=69a92058d1a09e29cbe69b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28014-improper-control-of-filename-for-in-757c6072</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28014%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Translogic&amp;severity=high&amp;id=69a92058d1a09e29cbe69b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28013-improper-control-of-filename-for-in-a1601827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28013%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Kratz&amp;severity=high&amp;id=69a92058d1a09e29cbe69aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28012-improper-control-of-filename-for-in-aafc03f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28012%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gridiron&amp;severity=high&amp;id=69a92058d1a09e29cbe69afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28011-improper-control-of-filename-for-in-a5fc4a54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28011%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yottis&amp;severity=high&amp;id=69a92058d1a09e29cbe69af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28010-improper-control-of-filename-for-in-a162a3c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28010%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Scientia&amp;severity=high&amp;id=69a92058d1a09e29cbe69af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28009-improper-control-of-filename-for-in-dc66f9f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28009%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20DroneX&amp;severity=high&amp;id=69a92058d1a09e29cbe69af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28007-improper-control-of-filename-for-in-99021ba4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28007%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Coinpress&amp;severity=high&amp;id=69a92058d1a09e29cbe69af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28006-improper-control-of-filename-for-in-a4ecdcbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28006%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yungen&amp;severity=high&amp;id=69a92057d1a09e29cbe69ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27998-improper-control-of-filename-for-in-12ca101c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27998%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Vixus&amp;severity=high&amp;id=69a92057d1a09e29cbe69aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27997-improper-control-of-filename-for-in-77e50207</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27997%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Maxify&amp;severity=high&amp;id=69a92057d1a09e29cbe69aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27996-improper-control-of-filename-for-in-62aafe73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27996%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Lingvico&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27995-improper-control-of-filename-for-in-aa24d396</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27995%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Justitia&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27994-improper-control-of-filename-for-in-a1fd84c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27994%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tediss&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27993-improper-control-of-filename-for-in-041f00ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27993%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Aldo&amp;severity=high&amp;id=69a92057d1a09e29cbe69a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27992-improper-control-of-filename-for-in-da0000f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Meals%20%26%20Wheels&amp;severity=high&amp;id=69a92057d1a09e29cbe69a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27991-improper-control-of-filename-for-in-e256ab83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27991%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Avventure&amp;severity=high&amp;id=69a92057d1a09e29cbe69a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27990-improper-control-of-filename-for-in-a9f96a05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27990%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ConFix&amp;severity=high&amp;id=69a92057d1a09e29cbe69a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27989-improper-control-of-filename-for-in-f028553d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27989%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Quanzo&amp;severity=high&amp;id=69a92055d1a09e29cbe69a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27988-improper-control-of-filename-for-in-7f90503a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27988%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Equadio&amp;severity=high&amp;id=69a92055d1a09e29cbe69a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27987-improper-control-of-filename-for-in-0025b225</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27987%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20The%20Qlean&amp;severity=high&amp;id=69a92055d1a09e29cbe69a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27986-improper-control-of-filename-for-in-f2123586</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27986%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20OsTende&amp;severity=high&amp;id=69a92055d1a09e29cbe69a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27985-improper-control-of-filename-for-in-d33935f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27985%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Humanum&amp;severity=high&amp;id=69a92055d1a09e29cbe69a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27984-improper-control-of-generation-of-c-d48e285a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27984%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Marketing%20Fire%20Widget%20Options&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27983-incorrect-privilege-assignment-in-d-cf32648b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27983%3A%20Incorrect%20Privilege%20Assignment%20in%20designthemes%20LMS%20Elementor%20Pro&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27541-incorrect-privilege-assignment-in-j-9a7e8fac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27541%3A%20Incorrect%20Privilege%20Assignment%20in%20Josh%20Kohlbach%20Wholesale%20Suite&amp;severity=high&amp;id=69a92055d1a09e29cbe69a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27439-deserialization-of-untrusted-data-i-63eba95d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27439%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Dentario&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27438-deserialization-of-untrusted-data-i-b424714d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27438%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Kingler&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27437-deserialization-of-untrusted-data-i-403814d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27437%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Tennis%20Club&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27428-improper-neutralization-of-special--bfd793a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27428%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Eagle-Themes%20Eagle%20Booking&amp;severity=high&amp;id=69a92053d1a09e29cbe69a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27417-deserialization-of-untrusted-data-i-f4ac8888</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27417%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SeventhQueen%20Sweet%20Date&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27411-guessable-captcha-in-jp-secure-site-7081f6e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27411%3A%20Guessable%20CAPTCHA%20in%20jp-secure%20SiteGuard%20WP%20Plugin&amp;severity=medium&amp;id=69a92053d1a09e29cbe69a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27406-insertion-of-sensitive-information--c759245d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27406%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=high&amp;id=69a92053d1a09e29cbe69a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27396-missing-authorization-in-e-plugins--7a7a7e71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27396%3A%20Missing%20Authorization%20in%20e-plugins%20Directory%20Pro&amp;severity=high&amp;id=69a92053d1a09e29cbe69a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27390-authentication-bypass-using-an-alte-41148b94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27390%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20designthemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=high&amp;id=69a92053d1a09e29cbe69a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27389-authentication-bypass-using-an-alte-aec8b6d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27389%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20designthemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27388-missing-authorization-in-designthem-4eb7163c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27388%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20Booking%20Manager&amp;severity=high&amp;id=69a92053d1a09e29cbe69a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27386-missing-authorization-in-designthem-e450ed01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27386%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20Directory%20Addon&amp;severity=high&amp;id=69a92053d1a09e29cbe69a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27385-improper-neutralization-of-input-du-d65b28b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27385%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Portfolio&amp;severity=high&amp;id=69a92052d1a09e29cbe69995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27384-improper-validation-of-specified-qu-541ac9e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27384%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20BoldGrid%20W3%20Total%20Cache&amp;severity=critical&amp;id=69a92052d1a09e29cbe69992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27383-improper-control-of-filename-for-in-a0717a1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Metro&amp;severity=high&amp;id=69a92052d1a09e29cbe6998f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27382-improper-neutralization-of-input-du-af6905cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27382%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RadiusTheme%20Metro&amp;severity=high&amp;id=69a92052d1a09e29cbe6998c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27381-improper-control-of-filename-for-in-d7e4f02a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Aora&amp;severity=high&amp;id=69a92052d1a09e29cbe69989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27376-improper-neutralization-of-input-du-d7b9308c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JanStudio%20Claue%20-%20Clean%2C%20Minimal%20Elementor%20WooCommerce%20Theme&amp;severity=high&amp;id=69a92052d1a09e29cbe69986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27375-improper-neutralization-of-input-du-0a641b64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27375%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JanStudio%20Gecko&amp;severity=high&amp;id=69a92052d1a09e29cbe69983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27374-missing-authorization-in-vanquish-w-68390e32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27374%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Order%20Details&amp;severity=high&amp;id=69a92051d1a09e29cbe69980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27373-improper-neutralization-of-special--971d812f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27373%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Essekia%20Tablesome&amp;severity=high&amp;id=69a92051d1a09e29cbe6997d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27370-insertion-of-sensitive-information--279a6a34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27370%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Premio%20Chaty&amp;severity=high&amp;id=69a92051d1a09e29cbe6997a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27369-deserialization-of-untrusted-data-i-760b76dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27369%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Celeste&amp;severity=high&amp;id=69a92050d1a09e29cbe6996d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27367-improper-neutralization-of-input-du-061da31a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Musico&amp;severity=high&amp;id=69a92050d1a09e29cbe6996a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27363-improper-neutralization-of-input-du-2181ae7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27363%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kamleshyadav%20WP%20Bakery%20Autoresponder%20Addon&amp;severity=high&amp;id=69a92050d1a09e29cbe69967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27362-missing-authorization-in-kamleshyad-456b5eb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27362%3A%20Missing%20Authorization%20in%20kamleshyadav%20WP%20Bakery%20Autoresponder%20Addon&amp;severity=medium&amp;id=69a92050d1a09e29cbe69964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27361-missing-authorization-in-webcodingp-a42d6412</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27361%3A%20Missing%20Authorization%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=high&amp;id=69a92050d1a09e29cbe69961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27359-improper-neutralization-of-input-du-dd7a632d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27359%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Awa%20Plugins&amp;severity=high&amp;id=69a92050d1a09e29cbe6995e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27358-improper-neutralization-of-input-du-9ef29754</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27358%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Architecturer&amp;severity=high&amp;id=69a92050d1a09e29cbe6995b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27354-improper-neutralization-of-input-du-9dc82acf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebCodingPlace%20WooCommerce%20Coming%20Soon%20Product%20with%20Countdown&amp;severity=medium&amp;id=69a92050d1a09e29cbe69958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27353-improper-neutralization-of-input-du-6033291d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20News&amp;severity=high&amp;id=69a92050d1a09e29cbe69955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27352-improper-neutralization-of-input-du-48680ff1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Starto&amp;severity=high&amp;id=69a92050d1a09e29cbe69952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27348-improper-neutralization-of-input-du-916d628b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27348%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=69a9204fd1a09e29cbe6993a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27344-missing-authorization-in-inseriswis-acb5351c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27344%3A%20Missing%20Authorization%20in%20inseriswiss%20inseri%20core&amp;severity=medium&amp;id=69a9204fd1a09e29cbe69937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27342-improper-control-of-filename-for-in-b223740e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27342%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20TopFit%20-%20Fitness%20and%20Gym%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27341-improper-control-of-filename-for-in-07040eac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27341%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20TopScorer%20-%20Sports%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27340-improper-control-of-filename-for-in-649037d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27340%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Apollo%20%7C%20Night%20Club%2C%20DJ%20Event%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6992e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27339-improper-control-of-filename-for-in-0d751dca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27339%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Buzz%20Stone%20%7C%20Magazine%20%26%20Viral%20Blog%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6992b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27338-deserialization-of-untrusted-data-i-c9ca4dcb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27338%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AivahThemes%20Car%20Zone&amp;severity=high&amp;id=69a9204fd1a09e29cbe69928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27337-improper-control-of-filename-for-in-c7e0865a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27337%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Chronicle%20-%20Lifestyle%20Magazine%20%26%20Blog%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27336-improper-control-of-filename-for-in-14ec8c54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27336%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Consultor%20%7C%20Consulting%2C%20Accounting%20%26%20Legal%20Counsel%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27335-improper-control-of-filename-for-in-81980ea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27335%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ekoterra%20-%20NonProfit%2C%20Green%20Energy%20%26%20Ecology%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6991f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27334-improper-control-of-filename-for-in-b3419336</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27334%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dan_fisher%20Alchemists&amp;severity=high&amp;id=69a9204dd1a09e29cbe69912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27332-improper-neutralization-of-input-du-e06e212b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27332%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Agrofood&amp;severity=high&amp;id=69a9204dd1a09e29cbe6990f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27326-improper-control-of-filename-for-in-5f8d2dda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20AC%20Services%20%7C%20HVAC%2C%20Air%20Conditioning%20%26%20Heating%20Company%20WordPress%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe6990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27098-deserialization-of-untrusted-data-i-11591bf0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27098%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Au%20Pair%20Agency%20-%20Babysitting%20%26%20Nanny%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe69909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27097-improper-control-of-filename-for-in-03e1caa9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27097%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20CasaMia%20%7C%20Property%20Rental%20Real%20Estate%20WordPress%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe69906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24963-incorrect-privilege-assignment-in-a-797c6fe9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24963%3A%20Incorrect%20Privilege%20Assignment%20in%20ameliabooking%20Amelia&amp;severity=high&amp;id=69a9204dd1a09e29cbe69903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24960-unrestricted-upload-of-file-with-da-2d924f8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24960%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Charety&amp;severity=critical&amp;id=69a9204dd1a09e29cbe69900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24385-deserialization-of-untrusted-data-i-63919416</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24385%3A%20Deserialization%20of%20Untrusted%20Data%20in%20gerritvanaaken%20Podlove%20Web%20Player&amp;severity=high&amp;id=69a9204dd1a09e29cbe698fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23802-unrestricted-upload-of-file-with-da-19d38ea8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23802%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Jordy%20Meow%20AI%20Engine&amp;severity=critical&amp;id=69a9204dd1a09e29cbe698fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23801-improper-control-of-filename-for-in-4391710d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23801%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20The%20Issue&amp;severity=high&amp;id=69a9204dd1a09e29cbe698f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23799-missing-authorization-in-themeum-tu-99e647be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23799%3A%20Missing%20Authorization%20in%20Themeum%20Tutor%20LMS&amp;severity=medium&amp;id=69a9204cd1a09e29cbe698dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23798-deserialization-of-untrusted-data-i-1df0e723</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23798%3A%20Deserialization%20of%20Untrusted%20Data%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=high&amp;id=69a9204cd1a09e29cbe698d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23546-insertion-of-sensitive-information--e32c6a86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23546%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20RadiusTheme%20Classified%20Listing&amp;severity=medium&amp;id=69a9204cd1a09e29cbe698d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22501-deserialization-of-untrusted-data-i-99d52e1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22501%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Mounthood&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22497-deserialization-of-untrusted-data-i-30f5a2c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22497%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Jardi&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22479-missing-authorization-in-themeruby--966dbed0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22479%3A%20Missing%20Authorization%20in%20ThemeRuby%20Easy%20Post%20Submission&amp;severity=high&amp;id=69a9204cd1a09e29cbe698cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22478-improper-control-of-filename-for-in-85bc5149</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22478%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20FindAll&amp;severity=high&amp;id=69a9204cd1a09e29cbe698ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22477-improper-control-of-filename-for-in-e68163d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22477%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Felizia&amp;severity=high&amp;id=69a9204cd1a09e29cbe698c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22476-improper-control-of-filename-for-in-8b3dac27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22476%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Etchy&amp;severity=high&amp;id=69a9204cd1a09e29cbe698c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22475-deserialization-of-untrusted-data-i-fdb7016e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22475%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Estate&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22474-deserialization-of-untrusted-data-i-3cd33ca2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22474%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Equestrian%20Centre&amp;severity=critical&amp;id=69a9204ad1a09e29cbe698a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22473-deserialization-of-untrusted-data-i-73086e9e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22473%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Dental%20Clinic&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22471-deserialization-of-untrusted-data-i-5a025546</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22471%3A%20Deserialization%20of%20Untrusted%20Data%20in%20maximsecudeal%20Secudeal%20Payments%20for%20Ecommerce&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22467-improper-neutralization-of-input-du-f26411c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mwtemplates%20DeepDigital&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22465-improper-neutralization-of-input-du-bdb628c5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeventhQueen%20BuddyApp&amp;severity=high&amp;id=69a9204ad1a09e29cbe6989d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22460-improper-limitation-of-a-pathname-t-fd2b1f28</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22460%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpWax%20FormGent&amp;severity=high&amp;id=69a9204ad1a09e29cbe6989a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22459-missing-authorization-in-blend-medi-92549eee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22459%3A%20Missing%20Authorization%20in%20Blend%20Media%20WordPress%20CTA&amp;severity=medium&amp;id=69a9204ad1a09e29cbe69897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22457-improper-control-of-filename-for-in-868a0150</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22457%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wanderland&amp;severity=high&amp;id=69a9204ad1a09e29cbe69894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22456-improper-control-of-filename-for-in-ae786313</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22456%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Askka&amp;severity=high&amp;id=69a9204ad1a09e29cbe69891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22455-improper-neutralization-of-input-du-4ccc05ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20Thebe&amp;severity=high&amp;id=69a9204ad1a09e29cbe6988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22454-deserialization-of-untrusted-data-i-877aac02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22454%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Solaris&amp;severity=critical&amp;id=69a92049d1a09e29cbe69841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22453-deserialization-of-untrusted-data-i-d455e2c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22453%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Pets%20Club&amp;severity=critical&amp;id=69a92049d1a09e29cbe6983e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22452-improper-control-of-filename-for-in-300b3ba9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22452%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Hoverex&amp;severity=high&amp;id=69a92049d1a09e29cbe6983b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22451-deserialization-of-untrusted-data-i-bc4a2c4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22451%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Handyman&amp;severity=critical&amp;id=69a92049d1a09e29cbe69838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22449-improper-control-of-filename-for-in-92a5942f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22449%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Don%20Peppe&amp;severity=high&amp;id=69a92049d1a09e29cbe69835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22446-improper-control-of-filename-for-in-d1d7804b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22446%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Prowess&amp;severity=high&amp;id=69a92049d1a09e29cbe69832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22443-improper-control-of-filename-for-in-37f6a4c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22443%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Alliance&amp;severity=high&amp;id=69a92049d1a09e29cbe6982f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22442-improper-control-of-filename-for-in-2b886240</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22442%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LaunchandSell%20Tribe&amp;severity=high&amp;id=69a92049d1a09e29cbe6982c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22441-improper-control-of-filename-for-in-8462f283</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22441%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Zentrum&amp;severity=high&amp;id=69a92049d1a09e29cbe69829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22440-improper-neutralization-of-input-du-6a9ec730</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20Thecs&amp;severity=high&amp;id=69a92049d1a09e29cbe69826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22439-improper-control-of-filename-for-in-92017b3b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22439%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Green%20Planet&amp;severity=high&amp;id=69a92047d1a09e29cbe69805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22438-improper-neutralization-of-input-du-cd3f5d58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20TheBi&amp;severity=high&amp;id=69a92047d1a09e29cbe69802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22437-improper-control-of-filename-for-in-c8697122</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22437%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Playa&amp;severity=high&amp;id=69a92047d1a09e29cbe697ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22436-improper-control-of-filename-for-in-d8253faf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22436%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Helvig&amp;severity=high&amp;id=69a92047d1a09e29cbe697fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22435-improper-control-of-filename-for-in-b7bce220</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22435%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20ElectroServ&amp;severity=high&amp;id=69a92047d1a09e29cbe697f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22434-improper-control-of-filename-for-in-d5cb92d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22434%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Crown%20Art&amp;severity=high&amp;id=69a92047d1a09e29cbe697f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22433-improper-control-of-filename-for-in-fb1443bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22433%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20CloudMe&amp;severity=high&amp;id=69a92047d1a09e29cbe697f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22432-improper-control-of-filename-for-in-13d73b2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22432%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Woopy&amp;severity=high&amp;id=69a92047d1a09e29cbe697f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22431-improper-control-of-filename-for-in-bfe90a6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22431%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wabi-Sabi&amp;severity=high&amp;id=69a92047d1a09e29cbe697ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22429-improper-control-of-filename-for-in-08e3884d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Verdure&amp;severity=high&amp;id=69a92047d1a09e29cbe697ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22428-improper-control-of-filename-for-in-543d64d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22428%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tooth%20Fairy&amp;severity=high&amp;id=69a92045d1a09e29cbe697a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22427-improper-control-of-filename-for-in-14d5f2b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22427%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20GoTravel&amp;severity=high&amp;id=69a92045d1a09e29cbe697a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22425-improper-control-of-filename-for-in-f35c03aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22425%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Sweet%20Jane&amp;severity=high&amp;id=69a92045d1a09e29cbe697a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22424-improper-control-of-filename-for-in-ca180096</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22424%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Shaha&amp;severity=high&amp;id=69a92045d1a09e29cbe6979d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22423-improper-control-of-filename-for-in-ef3a1c6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22423%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20SetSail&amp;severity=high&amp;id=69a92045d1a09e29cbe6979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22421-improper-control-of-filename-for-in-bb63cc46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22421%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Quantum&amp;severity=high&amp;id=69a92045d1a09e29cbe69797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22420-improper-control-of-filename-for-in-503c4017</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22420%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Horizon&amp;severity=high&amp;id=69a92045d1a09e29cbe69794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22419-improper-control-of-filename-for-in-61a3c05c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22419%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Honor&amp;severity=high&amp;id=69a92045d1a09e29cbe69791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22418-improper-control-of-filename-for-in-6486ba9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22418%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Great%20Lotus&amp;severity=high&amp;id=69a92045d1a09e29cbe6978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22417-deserialization-of-untrusted-data-i-623bd60f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22417%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Wedding&amp;severity=high&amp;id=69a92045d1a09e29cbe6978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22416-improper-control-of-filename-for-in-a2d7893e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22416%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20FixTeam&amp;severity=high&amp;id=69a92043d1a09e29cbe6976b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22415-improper-control-of-filename-for-in-5cb350fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22415%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20The%20Mounty&amp;severity=high&amp;id=69a92043d1a09e29cbe69768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22414-improper-control-of-filename-for-in-aa35a28f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22414%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Marra&amp;severity=high&amp;id=69a92043d1a09e29cbe69765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22413-improper-control-of-filename-for-in-ac890de3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22413%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Malgr%C3%A9&amp;severity=high&amp;id=69a92043d1a09e29cbe69762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22412-improper-control-of-filename-for-in-d10b6e07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22412%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Eona&amp;severity=high&amp;id=69a92043d1a09e29cbe6975f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22410-improper-control-of-filename-for-in-0e344228</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22410%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Dolcino&amp;severity=high&amp;id=69a92043d1a09e29cbe6975c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22408-improper-control-of-filename-for-in-2599dfe1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22408%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Justicia&amp;severity=high&amp;id=69a92043d1a09e29cbe69759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22405-improper-control-of-filename-for-in-309c37ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22405%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Overton&amp;severity=high&amp;id=69a92043d1a09e29cbe69756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22403-improper-control-of-filename-for-in-37688ae6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22403%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Innovio&amp;severity=high&amp;id=69a92043d1a09e29cbe69753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22399-improper-control-of-filename-for-in-9c204200</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22399%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Holmes&amp;severity=high&amp;id=69a92043d1a09e29cbe69750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22397-improper-control-of-filename-for-in-a2cedb55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22397%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Fleur&amp;severity=high&amp;id=69a92041d1a09e29cbe696f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22395-improper-control-of-filename-for-in-2eececbe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22395%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Fiorello&amp;severity=high&amp;id=69a92041d1a09e29cbe696f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22394-improper-control-of-filename-for-in-35a399ba</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22394%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Evently&amp;severity=high&amp;id=69a92041d1a09e29cbe696ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22392-improper-control-of-filename-for-in-563f1427</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22392%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Cortex&amp;severity=high&amp;id=69a92041d1a09e29cbe696eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22390-improper-control-of-generation-of-c-c30abc34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22390%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Builderall%20Builderall%20Builder%20for%20WordPress&amp;severity=critical&amp;id=69a92041d1a09e29cbe696e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22389-improper-control-of-filename-for-in-8194ceac</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22389%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Cocco&amp;severity=high&amp;id=69a92041d1a09e29cbe696e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22387-improper-control-of-filename-for-in-142b7be4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Aviana&amp;severity=high&amp;id=69a92041d1a09e29cbe696e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22385-improper-control-of-filename-for-in-02aa55fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22385%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Wolmart&amp;severity=high&amp;id=69a92041d1a09e29cbe696df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69411-improper-limitation-of-a-pathname-t-2cfd9ad8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69411%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Robert%20Seyfriedsberger%20ionCube%20tester%20plus&amp;severity=high&amp;id=69a92041d1a09e29cbe696dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69343-improper-neutralization-of-input-du-0837cb58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=medium&amp;id=69a92041d1a09e29cbe696d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69340-missing-authorization-in-buddhathem-02241919</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69340%3A%20Missing%20Authorization%20in%20BuddhaThemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=high&amp;id=69a9203fd1a09e29cbe696bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69339-improper-control-of-filename-for-in-5f15ca00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69339%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Molla&amp;severity=high&amp;id=69a9203fd1a09e29cbe696ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69338-improper-neutralization-of-special--1af8d4c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69338%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20don-themes%20Riode%20Core&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69090-improper-control-of-filename-for-in-f710c44c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69090%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Remons&amp;severity=high&amp;id=69a9203fd1a09e29cbe696b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68555-unrestricted-upload-of-file-with-da-5ac31c3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68555%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Nutrie&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68554-unrestricted-upload-of-file-with-da-a493cdbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68554%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Keenarch&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68553-unrestricted-upload-of-file-with-da-cd37dfb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68553%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Lendiz&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68515-insertion-of-sensitive-information--62331a0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68515%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Roland%20Murg%20WP%20Booking%20System&amp;severity=medium&amp;id=69a9203fd1a09e29cbe696a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54001-deserialization-of-untrusted-data-i-e9d6138e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54001%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Classter&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53335-improper-control-of-filename-for-in-9d2967e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53335%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Berger&amp;severity=high&amp;id=69a9203fd1a09e29cbe696a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29053-cwe-74-improper-neutralization-of-s-51d11c69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29053%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=69a91cb5d1a09e29cbe4c25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29052-cwe-79-improper-neutralization-of-i-43c74935</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29052%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20humhub%20calendar&amp;severity=medium&amp;id=69a91cb5d1a09e29cbe4c257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23767-missing-authentication-for-critical-37ea4536</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23767%3A%20Missing%20authentication%20for%20critical%20function%20in%20Seiko%20Epson%20Corporation%20ESC%2FPOS&amp;severity=critical&amp;id=69a91cb5d1a09e29cbe4c252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30777-authentication-bypass-using-an-alte-e04cf396</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30777%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20EC-CUBE%20CO.%2CLTD.%20EC-CUBE%204.1%20series&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27982-url-redirection-to-untrusted-site-o-049b9d08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27982%3A%20URL%20redirection%20to%20untrusted%20site%20(&apos;Open%20Redirect&apos;)%20in%20allauth%20django-allauth&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3072-cwe-862-missing-authorization-in-dgl-1e291b23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3072%3A%20CWE-862%20Missing%20Authorization%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29128-cwe-522-insufficiently-protected-cr-67a32621</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29128%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a915a0d1a09e29cbe15aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3523-cwe-89-improper-neutralization-of-sp-c5526c0e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3523%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20blobfolio%20Apocalypse%20Meow&amp;severity=medium&amp;id=69a90b11d1a09e29cbdaab81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-ios-exploit-kit-coruna-found-powering-b64cff88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20iOS%20Exploit%20Kit%20%E2%80%98Coruna%E2%80%99%20Found%20Powering%20Global%20Attacks&amp;severity=medium&amp;id=69a903d6d1a09e29cbbe0e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2899-cwe-862-missing-authorization-in-tec-1e943f40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2899%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=medium&amp;id=69a90085d1a09e29cbba97b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3034-cwe-79-improper-neutralization-of-in-49065add</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sagarpatel124%20OoohBoi%20Steroids%20for%20Elementor&amp;severity=medium&amp;id=69a90085d1a09e29cbba97b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2365-cwe-79-improper-neutralization-of-in-e1b09f37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2365%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=high&amp;id=69a90085d1a09e29cbba97ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29127-cwe-269-improper-privilege-manageme-e5c7745e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29127%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=critical&amp;id=69a8f5fbd1a09e29cbacc596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26034-incorrect-default-permissions-in-de-ce6196d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26034%3A%20Incorrect%20default%20permissions%20in%20Dell%20Inc.%20UPS%20Multi-UPS%20Management%20Console%20(MUMC)&amp;severity=high&amp;id=69a8f5fbd1a09e29cbacc592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26033-unquoted-search-path-or-element-in--dd92d150</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26033%3A%20Unquoted%20search%20path%20or%20element%20in%20Dell%20Inc.%20UPS%20Multi-UPS%20Management%20Console%20(MUMC)&amp;severity=medium&amp;id=69a8f5fbd1a09e29cbacc58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/differentiating-between-a-targeted-intrusion-and-a-40c30509</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Differentiating%20Between%20a%20Targeted%20Intrusion%20and%20an%20Automated%20Opportunistic%20Scanning%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Mar%204th)&amp;severity=medium&amp;id=69a8eb3ad1a09e29cba41920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57854-cwe-338-use-of-cryptographically-we-ad4e767f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57854%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20DOUGDUDE%20Net%3A%3ANSCA%3A%3AClient&amp;severity=critical&amp;id=69a8f5fbd1a09e29cbacc58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29126-cwe-732-incorrect-permission-assign-601890c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29126%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40931-cwe-340-generation-of-predictable-n-2e8b6bd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40931%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20CHORNY%20Apache%3A%3ASession%3A%3AGenerate%3A%3AMD5&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29125-cwe-732-incorrect-permission-assign-edae591f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29125%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3257-cwe-1395-dependency-on-vulnerable-th-51180545</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3257%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20TOKUHIROM%20UnQLite&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3381-cwe-1395-dependency-on-vulnerable-th-477a2de6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3381%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20PMQS%20Compress%3A%3ARaw%3A%3AZlib&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40926-cwe-340-generation-of-predictable-n-bc6c4282</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40926%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20KAZEBURO%20Plack%3A%3AMiddleware%3A%3ASession%3A%3ASimple&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29124-cwe-269-improper-privilege-manageme-bd7d8889</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29124%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29123-cwe-269-improper-privilege-manageme-a521f86f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29123%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8dd5dd1a09e29cb9d46b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29122-cwe-269-improper-privilege-manageme-f4a310aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29122%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8dd5dd1a09e29cb9d46ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29121-cwe-269-improper-privilege-manageme-59cf4f7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29121%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8d655d1a09e29cb94528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-05-ac68c866</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-05&amp;severity=medium&amp;id=69aa1c8cc48b3f10ff8ed5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70995-na-8ec01cad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70995%3A%20n%2Fa&amp;severity=high&amp;id=69a9f294c48b3f10ff5116cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70949-na-4f28d6ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70949%3A%20n%2Fa&amp;severity=high&amp;id=69a9f294c48b3f10ff5116c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70948-na-00703f46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70948%3A%20n%2Fa&amp;severity=critical&amp;id=69a9f294c48b3f10ff5116c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70614-na-ea052519</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70614%3A%20n%2Fa&amp;severity=high&amp;id=69a9e67761e8e69ef5f70090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29165-na-53b6caed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29165%3A%20n%2Fa&amp;severity=critical&amp;id=69a9e2f561e8e69ef5e92409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70616-na-996c656a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70616%3A%20n%2Fa&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26418-na-62db3068</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26418%3A%20n%2Fa&amp;severity=high&amp;id=69a9c996460e1c85df139353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26417-na-8d4849de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26417%3A%20n%2Fa&amp;severity=high&amp;id=69a9c996460e1c85df13934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26416-na-edaf16a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26416%3A%20n%2Fa&amp;severity=high&amp;id=69a9c994460e1c85df139340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70233-na-c8f3916e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70233%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70232-na-2519a946</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70232%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df13932e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70231-na-dfe379a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70231%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70230-na-1652c7b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70230%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70229-na-248a175b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70229%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df13931f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45691-na-928afead</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45691%3A%20n%2Fa&amp;severity=high&amp;id=69a9c994460e1c85df139319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26377-na-1652a603</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26377%3A%20n%2Fa&amp;severity=medium&amp;id=69a9a2e4460e1c85dfd8770e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69534-na-6020ab11</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69534%3A%20n%2Fa&amp;severity=high&amp;id=69a99d83d9f976b5b5c65c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-05-130e5843</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-05&amp;severity=medium&amp;id=69a99b5b224272a26dae5f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-05-3423470b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-05&amp;severity=low&amp;id=69a99b5b224272a26dae5f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2836-vulnerability-in-cloudflare-httpsgit-c71c61fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2836%3A%20Vulnerability%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=high&amp;id=69a8c847d1a09e29cb860502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2835-cwe-444-inconsistent-interpretation--a3f6db67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2835%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=critical&amp;id=69a8c4c1d1a09e29cb83c419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22052-209-in-netapp-ontap-9-6c596002</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22052%3A%20209%20in%20NETAPP%20ONTAP%209&amp;severity=medium&amp;id=69a8c142d1a09e29cb82aab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2833-cwe-444-inconsistent-interpretation--c3ebdcf0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2833%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=critical&amp;id=69a8c142d1a09e29cb82aab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41257-cwe-20-improper-input-validation-in-7d1c9b29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41257%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Suprema%20BioStar%202&amp;severity=medium&amp;id=69a8cbd6d1a09e29cb893ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2297-vulnerability-in-python-software-fou-a603ade6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2297%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29085-cwe-74-improper-neutralization-of-s-f874f2fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29085%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29045-cwe-177-improper-handling-of-url-en-89e68b18</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29045%3A%20CWE-177%3A%20Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20in%20honojs%20hono&amp;severity=high&amp;id=69a8afacd1a09e29cb7ac71d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29086-cwe-1113-inappropriate-comment-styl-b5935525</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29086%3A%20CWE-1113%3A%20Inappropriate%20Comment%20Style%20in%20honojs%20hono&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26002-cwe-74-improper-neutralization-of-s-04c291ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26002%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20OSC%20ondemand&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25750-cwe-74-improper-neutralization-of-s-2b0c1429</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25750%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langchain-ai%20helm&amp;severity=high&amp;id=69a8cbd6d1a09e29cb893bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29000-cwe-347-improper-verification-of-cr-c33a53b1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29000%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20pac4j%20pac4j-jwt&amp;severity=critical&amp;id=69a8ac26d1a09e29cb796104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66024-cwe-79-improper-neutralization-of-i-78d8568e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66024%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20application-blog-ui&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27898-cwe-639-authorization-bypass-throug-bcfc5722</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27898%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=69a8ac26d1a09e29cb796101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27803-cwe-269-improper-privilege-manageme-445e7709</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27803%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dani-garcia%20vaultwarden&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27802-cwe-269-improper-privilege-manageme-b8681d39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27802%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dani-garcia%20vaultwarden&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27801-cwe-307-improper-restriction-of-exc-ca82586a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27801%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=69a8a8a2d1a09e29cb7830cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-tycoon2fa-how-a-leading-aitm-phishing-kit-o-304fb781</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Tycoon2FA%3A%20How%20a%20leading%20AiTM%20phishing%20kit%20operated%20at%20scale&amp;severity=medium&amp;id=69a94eed0e5bba37ca88cea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-infrastructure-in-focus-mapping-state--e1c5a95a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Infrastructure%20in%20Focus%3A%20Mapping%20State-Aligned%20Clusters%20During%20Geopolitical%20Escalation&amp;severity=medium&amp;id=69a94eed0e5bba37ca88ce8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-ssl-certificates-and-graph-theory-to-uncover-fac7451c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20SSL%20Certificates%20and%20Graph%20Theory%20to%20Uncover%20Threat%20Actors&amp;severity=medium&amp;id=69a952710e5bba37ca8f2edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28435-cwe-400-uncontrolled-resource-consu-a7a1b56e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28435%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69a88c81d1a09e29cb6b4cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28434-cwe-200-exposure-of-sensitive-infor-53bb8ea6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28434%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69a88c81d1a09e29cb6b4cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28427-cwe-22-improper-limitation-of-a-pat-1d9c15cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28427%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nekename%20OpenDeck&amp;severity=medium&amp;id=69a88c81d1a09e29cb6b4cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3545-insufficient-data-validation-in-goog-72f3544b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3545%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=critical&amp;id=69a88902d1a09e29cb6a246a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3544-heap-buffer-overflow-in-google-chrom-fc3d6571</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3544%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3543-inappropriate-implementation-in-goog-9824fbf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3543%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3542-inappropriate-implementation-in-goog-a5d2125e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3542%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a245e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3541-inappropriate-implementation-in-goog-eb2f2edf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3541%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a245a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3540-inappropriate-implementation-in-goog-75231b89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3540%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3539-object-lifecycle-issue-in-google-chr-f63ab81a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3539%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3538-integer-overflow-in-google-chrome-0397ca92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3538%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a244e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3537-object-lifecycle-issue-in-google-chr-f7411df0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3537%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a244a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3536-integer-overflow-in-google-chrome-bf0554c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3536%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-phishing-platform-dismantled-in-global--237fbcd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Phishing%20Platform%20Dismantled%20in%20Global%20Takedown&amp;severity=medium&amp;id=69a87e3ed1a09e29cb5e7591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20064-null-pointer-dereference-in-cisco-c-b5c944c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20064%3A%20NULL%20Pointer%20Dereference%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67597f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20025-integer-overflow-or-wraparound-in-c-fc9799cb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20025%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67597c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20024-improper-restriction-of-operations--d2ad4715</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20024%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20023-out-of-bounds-write-in-cisco-cisco--9399b4a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20023%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20022-use-of-out-of-range-pointer-offset--13763524</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20022%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20021-missing-release-of-memory-after-eff-9fbf8fbb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20021%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20020-improper-input-validation-in-cisco--701d124c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20020%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67596d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20016-improper-neutralization-of-argument-f7993022</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20016%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67596a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0847-cwe-22-improper-limitation-of-a-path-c024e0ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0847%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nltk%20nltk%2Fnltk&amp;severity=high&amp;id=69a87af1d1a09e29cb563d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3125-cwe-918-server-side-request-forgery--e34410dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3125%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opennextjs%20%40opennextjs%2Fcloudflare&amp;severity=high&amp;id=69a87af1d1a09e29cb563d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20073-improper-access-control-in-cisco-ci-042a5698</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20073%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20102-improper-neutralization-of-input-du-903da884</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20070-improper-neutralization-of-script-r-ad534a20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20070%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20069-inconsistent-interpretation-of-http-b9c2ece6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20069%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20068-uncaught-exception-in-cisco-cisco-c-e719f1cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20068%3A%20Uncaught%20Exception%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20067-out-of-bounds-write-in-cisco-cisco--054c9a9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20067%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20066-uncontrolled-resource-consumption-i-8c53c7b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20066%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20065-improper-locking-in-cisco-cisco-sec-f70efa5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20065%3A%20Improper%20Locking%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20063-improper-neutralization-of-argument-93cf348b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20063%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20058-access-of-memory-location-before-st-b82bac04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20058%3A%20Access%20of%20Memory%20Location%20Before%20Start%20of%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20057-divide-by-zero-in-cisco-cisco-cyber-ef2d4a2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20057%3A%20Divide%20By%20Zero%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20054-loop-with-unreachable-exit-conditio-15e8c0bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20054%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20053-heap-based-buffer-overflow-in-cisco-9c77fb8d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20053%3A%20Heap-based%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20052-access-of-memory-location-after-end-f524f4da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20052%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20050-improper-resource-shutdown-or-relea-7f79f018</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20050%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lexisnexis-data-breach-confirmed-after-hackers-8edd7e0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20LexisNexis%20Data%20Breach%20Confirmed%20After%20Hackers%20Leak%20Files&amp;severity=medium&amp;id=69a8702ed1a09e29cb5049be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20017-execution-with-unnecessary-privileg-f18e1fea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20017%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20018-path-traversal-dirfilename-in-cisco-e91f7016</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20018%3A%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a87779d1a09e29cb54d2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20007-improper-access-control-in-cisco-ci-6e2cb5b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20007%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87078d1a09e29cb506b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20006-error-handling-in-cisco-cisco-secur-055f6d78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20006%3A%20Error%20Handling%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87078d1a09e29cb506b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20149-improper-neutralization-of-input-du-f3875916</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20149%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=69a87078d1a09e29cb506b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20082-missing-release-of-resource-after-e-84837444</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20082%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a87078d1a09e29cb506b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20062-incorrect-execution-assigned-permis-46e51a53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20062%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20049-incorrect-calculation-of-buffer-siz-37ef86ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20049%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20015-missing-release-of-memory-after-eff-d89d440f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20015%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20014-missing-release-of-memory-after-eff-1c5c9b32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20014%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86cded1a09e29cb4f151d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20013-missing-release-of-memory-after-eff-d21a0470</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20013%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f151a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20106-missing-release-of-memory-after-eff-bbf2d623</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20106%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86ce0d1a09e29cb4f1568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20105-missing-release-of-memory-after-eff-0d6ecaf2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20105%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20103-allocation-of-resources-without-lim-32655776</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20103%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20101-use-of-insufficiently-random-values-b5449b43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20101%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f155f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20100-buffer-copy-without-checking-size-o-1555caf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20100%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f155c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20003-improper-neutralization-of-special--469e2eb9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20003%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20002-improper-neutralization-of-special--ff656b71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20002%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=high&amp;id=69a86cded1a09e29cb4f150e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20131-deserialization-of-untrusted-data-i-460d28f0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20131%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=critical&amp;id=69a86ce0d1a09e29cb4f156b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20039-improper-clearing-of-heap-memory-be-eea5d267</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20039%3A%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86cded1a09e29cb4f1526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20044-improper-privilege-management-in-ci-07510da0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20044%3A%20Improper%20Privilege%20Management%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86ce0d1a09e29cb4f1550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20079-authentication-bypass-using-an-alte-6aa92e25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20079%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=critical&amp;id=69a86ce0d1a09e29cb4f1559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20031-uncaught-exception-in-cisco-cisco-s-63948540</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20031%3A%20Uncaught%20Exception%20in%20Cisco%20Cisco%20Secure%20Endpoint&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20008-improper-neutralization-of-special--36bd7983</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20008%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20009-improper-neutralization-of-special--6d7f9f80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20009%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26949-cwe-863-incorrect-authorization-in--6d18db81</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26949%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=medium&amp;id=69a86ce2d1a09e29cb4f15a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20001-improper-neutralization-of-special--26b5bf7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20001%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86cded1a09e29cb4f150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20005-missing-report-of-error-condition-i-a73a7227</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20005%3A%20Missing%20Report%20of%20Error%20Condition%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8695ad1a09e29cb4e1dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22760-cwe-754-improper-check-for-unusual--d65624cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22760%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=low&amp;id=69a8695ad1a09e29cb4e1dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29069-cwe-639-authorization-bypass-throug-7de34f87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29069%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69a8695ad1a09e29cb4e1dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28784-cwe-1336-improper-neutralization-of-6d4747ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28784%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=high&amp;id=69a8695ad1a09e29cb4e1dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28783-cwe-94-improper-control-of-generati-7ec769f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28783%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28782-cwe-639-authorization-bypass-throug-1f0840cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28782%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69a86252d1a09e29cb4c0647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28781-cwe-639-authorization-bypass-throug-af2be907</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28781%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=69a86252d1a09e29cb4c0642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28697-cwe-1336-improper-neutralization-of-86895bc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28697%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=critical&amp;id=69a86252d1a09e29cb4c063c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28696-cwe-639-authorization-bypass-throug-f6975608</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28696%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=69a85ed1d1a09e29cb4aedf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3520-cwe-674-uncontrolled-recursion-in-ex-e7bd9e89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3520%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20expressjs%20multer&amp;severity=high&amp;id=69a85ed2d1a09e29cb4aee03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28695-cwe-1336-improper-neutralization-of-2d24d5c9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28695%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=high&amp;id=69a85ed1d1a09e29cb4aedf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15558-cwe-427-uncontrolled-search-path-el-4142348f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15558%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Docker%20Docker%20CLI&amp;severity=high&amp;id=69a85ed0d1a09e29cb4aedd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23812-vulnerability-in-hewlett-packard-en-fc1f0311</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23812%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aedee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23811-vulnerability-in-hewlett-packard-en-53c9b810</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23811%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aedeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23810-vulnerability-in-hewlett-packard-en-adecc1e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23810%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23809-vulnerability-in-hewlett-packard-en-471585d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23809%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23808-vulnerability-in-hewlett-packard-en-d30f105d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23808%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23601-vulnerability-in-hewlett-packard-en-1539a793</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23601%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed0d1a09e29cb4aeddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22285-cwe-256-plaintext-storage-of-a-pass-5adf26e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22285%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=medium&amp;id=69a85b4ad1a09e29cb49b9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59787-cwe-703-improper-check-or-handling--6afd3d95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59787%3A%20CWE-703%20%E2%80%93%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a857c5d1a09e29cb48ad3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59786-cwe-613-insufficient-session-expira-e20f0d55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59786%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59785-cwe-1286-improper-validation-of-syn-fc0665bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59785%3A%20CWE-1286%20%E2%80%93%20Improper%20Validation%20of%20Syntactic%20Correctness%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59784-cwe-117-improper-output-neutralizat-b29a7020</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59784%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12801-incorrect-execution-assigned-permis-f3da6224</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12801%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59783-cwe-78-improper-neutralization-of-s-43df8c67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59783%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=high&amp;id=69a850c1d1a09e29cb458b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62879-cwe-532-insertion-of-sensitive-info-83298e10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62879%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SUSE%20Rancher&amp;severity=medium&amp;id=69a84d3dd1a09e29cb445d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-a-browser-in-the-browser-attack-is-and-how-to-37ccdfd0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20a%20browser-in-the-browser%20attack%20is%2C%20and%20how%20to%20spot%20a%20fake%20login%20window%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a83f64d1a09e29cb4001d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40896-cwe-295-improper-certificate-valida-e039e616</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40896%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Nozomi%20Networks%20Arc&amp;severity=medium&amp;id=69a83ba8d1a09e29cb3ef915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40895-cwe-79-improper-neutralization-of-i-9666fc7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20CMC&amp;severity=low&amp;id=69a83ba8d1a09e29cb3ef912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40894-cwe-79-improper-neutralization-of-i-3bb0f271</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=low&amp;id=69a83ba8d1a09e29cb3ef90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3103-cwe-863-incorrect-authorization-in-c-37ac62bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3103%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69a83824d1a09e29cb3d0c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25907-cwe-645-overly-restrictive-account--85d43e55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25907%3A%20CWE-645%3A%20Overly%20Restrictive%20Account%20Lockout%20Mechanism%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21422-cwe-15-external-control-of-system-o-d4521675</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21422%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Dell%20PowerScale%20OneFS&amp;severity=low&amp;id=69a8311cd1a09e29cb391c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21424-cwe-250-execution-with-unnecessary--85c5dbe8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21424%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-pirated-software-turns-helpful-employees-into--e143ab30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Pirated%20Software%20Turns%20Helpful%20Employees%20Into%20Malware%20Delivery%20Agents&amp;severity=medium&amp;id=69a82d61d1a09e29cb385855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21421-cwe-250-execution-with-unnecessary--dc94552d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21421%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21426-cwe-250-execution-with-unnecessary--f2a3a244</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21426%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a82a17d1a09e29cb37418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21423-cwe-276-incorrect-default-permissio-16f56bc8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21423%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a82a17d1a09e29cb374188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22270-cwe-427-uncontrolled-search-path-el-faa8a16a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22270%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20PowerScale%20OneFS%2C&amp;severity=medium&amp;id=69a8268fd1a09e29cb360760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21425-cwe-266-incorrect-privilege-assignm-7c2392aa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21425%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8268fd1a09e29cb36075d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24732-cwe-552-files-or-directories-access-875d70e0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24732%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=69a8268fd1a09e29cb360763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-of-new-phishing-campaign-68f9fe7f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20of%20New%20Phishing%20Campaign&amp;severity=medium&amp;id=69a822ddd1a09e29cb33b6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-plans-two-week-release-schedule-for-chrome-e83c4767</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Plans%20Two-Week%20Release%20Schedule%20for%20Chrome&amp;severity=medium&amp;id=69a81f54d1a09e29cb327b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3058-cwe-200-exposure-of-sensitive-inform-df9403c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3058%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=69a81880d1a09e29cb2f531b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3056-cwe-862-missing-authorization-in-ser-1a9ff84b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3056%3A%20CWE-862%20Missing%20Authorization%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=69a81880d1a09e29cb2f5315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1674-cwe-862-missing-authorization-in-saa-d553536a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1674%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Gutena%20Forms%20%E2%80%93%20Contact%20Form%2C%20Survey%20Form%2C%20Feedback%20Form%2C%20Booking%20Form%2C%20and%20Custom%20Form%20Builder&amp;severity=medium&amp;id=69a81880d1a09e29cb2f5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2355-cwe-79-improper-neutralization-of-in-a026c4a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joedolson%20My%20Calendar%20%E2%80%93%20Accessible%20Event%20Manager&amp;severity=medium&amp;id=69a81880d1a09e29cb2f530d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-coalition-publishes-6g-security-and-resilie-388a8ce5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Coalition%20Publishes%206G%20Security%20and%20Resilience%20Principles&amp;severity=medium&amp;id=69a81142d1a09e29cb2bb85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-packagist-packages-disguised-as-laravel--5cae3aaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Packagist%20Packages%20Disguised%20as%20Laravel%20Utilities%20Deploy%20Encrypted%20RAT&amp;severity=medium&amp;id=69a81150d1a09e29cb2bba0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/want-more-xwormx3f-wed-mar-4th-7c048a3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Want%20More%20XWorm%26%23x3f%3B%2C%20(Wed%2C%20Mar%204th)&amp;severity=medium&amp;id=69a80331d1a09e29cb253e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1706-cwe-79-improper-neutralization-of-in-b105f9ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=69a7ffe4d1a09e29cb23bf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3439-cwe-121-stack-based-buffer-overflow--c2c70c41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3439%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=69a7fc60d1a09e29cb22b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-freescout-vulnerability-leads-to-full-ser-b01b887c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20FreeScout%20Vulnerability%20Leads%20to%20Full%20Server%20Compromise&amp;severity=critical&amp;id=69a7f8a6d1a09e29cb211a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27441-cwe-78-improper-neutralization-of-s-6ebb3f5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27441%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2748-cwe-295-improper-certificate-validat-38d0817d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2748%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e3739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27446-cwe-306-missing-authentication-for--ed42be89</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27446%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Apache%20Software%20Foundation%20Apache%20Artemis&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27442-cwe-22-improper-limitation-of-a-pat-0a99510b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27442%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27445-cwe-347-improper-verification-of-cr-b3b62ae0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27445%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e372d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27444-cwe-436-interpretation-conflict-in--c2527164</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27444%3A%20CWE-436%20Interpretation%20Conflict%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e372a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2747-cwe-200-exposure-of-sensitive-inform-4ebc278d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2747%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e3736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27443-cwe-20-improper-input-validation-in-69377cc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27443%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e3727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66168-cwe-190-integer-overflow-or-wraparo-89bd59bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66168%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e371e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2746-cwe-347-improper-verification-of-cry-abd6ee7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2746%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e3733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3094-cwe-787-out-of-bounds-write-in-delta-cd2be670</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3094%3A%20CWE-787%20Out-of-bounds%20Write%20in%20deltaww%20CNCSoft-G2&amp;severity=high&amp;id=69a7f1d4d1a09e29cb1c93fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1236-cwe-79-improper-neutralization-of-in-f48799b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Envira%20Gallery%20%E2%80%93%20Image%20Photo%20Gallery%2C%20Albums%2C%20Video%20Gallery%2C%20Slideshows%20%26%20More&amp;severity=medium&amp;id=69a7ee50d1a09e29cb1a949b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29120-cwe-798-use-of-hard-coded-credentia-587f7886</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29120%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=critical&amp;id=69a7eacbd1a09e29cb189c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29119-cwe-798-use-of-hard-coded-credentia-f3e1ee95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29119%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Series%20SuperFlex%20SatelliteReceiver&amp;severity=high&amp;id=69a7eacbd1a09e29cb189c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28778-cwe-798-use-of-hard-coded-credentia-1fca65f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28778%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=high&amp;id=69a7e744d1a09e29cb1613f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28777-cwe-798-use-of-hard-coded-credentia-95918f9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28777%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Satellite%20Receiver&amp;severity=critical&amp;id=69a7ee50d1a09e29cb1a94a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28776-cwe-798-use-of-hard-coded-credentia-194a6e0a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28776%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=high&amp;id=69a7ee50d1a09e29cb1a94a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28775-cwe-1188-insecure-default-initializ-ec9ac65b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28775%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Series%20SuperFlex%20SatelliteReceiver&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-aria-operations-vulnerability-exploited-in--b3fcfdae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20Aria%20Operations%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69a7e009d1a09e29cb127e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28774-cwe-78-improper-neutralization-of-s-9d1f2b51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28774%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28773-cwe-78-improper-neutralization-of-s-2d1431d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28773%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28772-cwe-79-improper-neutralization-of-i-28c11935</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28772%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=medium&amp;id=69a7e053d1a09e29cb12bc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28771-cwe-79-improper-neutralization-of-i-de558893</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28771%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20Management%20Interface&amp;severity=medium&amp;id=69a7e053d1a09e29cb12bc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28770-cwe-91-xml-injection-aka-blind-xpat-60625725</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28770%3A%20CWE-91%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20management%20interface&amp;severity=medium&amp;id=69a7dcb8d1a09e29cb1037d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28769-cwe-22-improper-limitation-of-a-pat-0b859350</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28769%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20management%20interface&amp;severity=medium&amp;id=69a7dcb8d1a09e29cb1037d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2732-cwe-862-missing-authorization-in-sho-b873a3d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2732%3A%20CWE-862%20Missing%20Authorization%20in%20shortpixel%20Enable%20Media%20Replace&amp;severity=medium&amp;id=69a7d22fd1a09e29cb0618c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2363-cwe-89-improper-neutralization-of-sp-58ca4161</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2363%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=69a7d22fd1a09e29cb0618c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2025-cwe-200-information-exposure-in-mail-212f0a08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2025%3A%20CWE-200%20Information%20Exposure%20in%20Mail%20Mint&amp;severity=high&amp;id=69a7ceacd1a09e29cb03bd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interplay-between-iranian-targeting-of-ip-cameras--12391dc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interplay%20between%20Iranian%20Targeting%20of%20IP%20Cameras%20and%20Physical%20Warfare%20in%20the%20Middle%20East&amp;severity=high&amp;id=69a8ca74d1a09e29cb878a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1651-cwe-89-improper-neutralization-of-sp-a775ea66</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1651%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20icegram%20Email%20Subscribers%20%26%20Newsletters%20%E2%80%93%20Email%20Marketing%2C%20Post%20Notifications%20%26%20Newsletter%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69a79342d1a09e29cbc204c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2292-cwe-79-improper-neutralization-of-in-f50ba6f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2292%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bandido%20Morkva%20UA%20Shipping&amp;severity=medium&amp;id=69a79342d1a09e29cbc204e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1273-cwe-918-server-side-request-forgery--e1f87754</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1273%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=high&amp;id=69a79342d1a09e29cbc204c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1980-cwe-200-exposure-of-sensitive-inform-b43a0148</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1980%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20iqonicdesign%20WPBookit&amp;severity=medium&amp;id=69a79342d1a09e29cbc204d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2289-cwe-79-improper-neutralization-of-in-b360cfc0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=69a79342d1a09e29cbc204dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1945-cwe-79-improper-neutralization-of-in-6840e229</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1945%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20WPBookit&amp;severity=high&amp;id=69a79342d1a09e29cbc204d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/signed-malware-impersonating-workplace-apps-deploy-d90a7c2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Signed%20malware%20impersonating%20workplace%20apps%20deploys%20RMM%20backdoors&amp;severity=medium&amp;id=69a814c4d1a09e29cb2cff34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-04-f30e740f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-04&amp;severity=medium&amp;id=69a8ca08d1a09e29cb86d4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70222-na-75b37c96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70222%3A%20n%2Fa&amp;severity=critical&amp;id=69a8a51ed1a09e29cb769eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70225-na-bb06acd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70225%3A%20n%2Fa&amp;severity=critical&amp;id=69a89a91d1a09e29cb719abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70221-na-01c26696</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70221%3A%20n%2Fa&amp;severity=critical&amp;id=69a89710d1a09e29cb6fec01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46108-na-f9f47e59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46108%3A%20n%2Fa&amp;severity=critical&amp;id=69a89710d1a09e29cb6febfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70219-na-7e103d52</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70219%3A%20n%2Fa&amp;severity=critical&amp;id=69a89005d1a09e29cb6c63ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70226-na-82054904</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70226%3A%20n%2Fa&amp;severity=critical&amp;id=69a8857dd1a09e29cb68bd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70223-na-9cba1f25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70223%3A%20n%2Fa&amp;severity=critical&amp;id=69a881f6d1a09e29cb675965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-04-89d845b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-04&amp;severity=medium&amp;id=69a87ab7d1a09e29cb55b54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70220-na-363a1ddd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70220%3A%20n%2Fa&amp;severity=critical&amp;id=69a87779d1a09e29cb54d2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70218-na-dce67160</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70218%3A%20n%2Fa&amp;severity=critical&amp;id=69a87078d1a09e29cb506b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66944-na-8319490b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66944%3A%20n%2Fa&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66678-na-dc18e3f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66678%3A%20n%2Fa&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69969-na-e74f3aeb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69969%3A%20n%2Fa&amp;severity=critical&amp;id=69a85ed0d1a09e29cb4aeddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26478-na-4a7e88a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26478%3A%20n%2Fa&amp;severity=critical&amp;id=69a85b4ad1a09e29cb49b9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26673-na-e8c6ae05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26673%3A%20n%2Fa&amp;severity=high&amp;id=69a857c5d1a09e29cb48ad42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26514-na-4630cd19</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26514%3A%20n%2Fa&amp;severity=high&amp;id=69a84d3dd1a09e29cb445d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70342-na-9e196b94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70342%3A%20n%2Fa&amp;severity=medium&amp;id=69a849bdd1a09e29cb42f6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70341-na-aebf9e80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70341%3A%20n%2Fa&amp;severity=high&amp;id=69a849bdd1a09e29cb42f6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-04-2321d5d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-04&amp;severity=low&amp;id=69a7ee16d1a09e29cb1a6587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28289-cwe-434-unrestricted-upload-of-file-e2a6fd58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28289%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69a79342d1a09e29cbc204ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27971-cwe-502-deserialization-of-untruste-b59de789</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27971%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20QwikDev%20qwik&amp;severity=critical&amp;id=69a79342d1a09e29cbc204eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27932-cwe-770-allocation-of-resources-wit-c0c8d6c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27932%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20authlib%20joserfc&amp;severity=high&amp;id=69a768b5d1a09e29cb82cc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27622-cwe-787-out-of-bounds-write-in-acad-a42f61d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27622%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27601-cwe-770-allocation-of-resources-wit-ae5cd70d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27601%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20jashkenas%20underscore&amp;severity=high&amp;id=69a76534d1a09e29cb81f9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3266-cwe-862-missing-authorization-in-ope-7599e051</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3266%3A%20CWE-862%20Missing%20Authorization%20in%20OpenText%E2%84%A2%20Filr&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27981-cwe-307-improper-restriction-of-exc-f8c6fc4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27981%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20sysadminsmedia%20homebox&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27600-cwe-918-server-side-request-forgery-b5ba57bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27600%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sysadminsmedia%20homebox&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26272-cwe-79-improper-neutralization-of-i-52fa5733</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26272%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sysadminsmedia%20homebox&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25590-cwe-79-improper-neutralization-of-i-13ff0ec3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25590%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27012-cwe-306-missing-authentication-for--435d22b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27012%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20devcode-it%20openstamanager&amp;severity=critical&amp;id=69a79342d1a09e29cbc204f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24415-cwe-79-improper-neutralization-of-i-caa3b439</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24415%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devcode-it%20openstamanager&amp;severity=medium&amp;id=69a75aa5d1a09e29cb7e0992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21866-cwe-79-improper-neutralization-of-i-2499aded</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21866%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=medium&amp;id=69a75aa5d1a09e29cb7e098d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3487-sql-injection-in-itsourcecode-colleg-91aac2aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3487%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69a75724d1a09e29cb7c9d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3130-cwe-841-improper-enforcement-of-beha-bdd93806</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3130%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3204-cwe-20-improper-input-validation-in--25dfb824</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3204%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2590-vulnerability-in-devolutions-remote--692ec7bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2590%3A%20Vulnerability%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3224-cwe-287-improper-authentication-cwe--6697497e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3224%3A%20CWE-287%20Improper%20Authentication%2C%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1775-cwe-306-missing-authentication-for-c-0d6416a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1775%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Labkotec%20LID-3300IP&amp;severity=high&amp;id=69a75724d1a09e29cb7c9d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3486-sql-injection-in-itsourcecode-colleg-d8a60b02</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3486%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69a7501dd1a09e29cb7a3ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3485-os-command-injection-in-d-link-dir-8-905d15ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3485%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-868L&amp;severity=critical&amp;id=69a7501dd1a09e29cb7a3feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25906-cwe-59-improper-link-resolution-bef-44e1a0d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25906%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Optimizer&amp;severity=high&amp;id=69a7501dd1a09e29cb7a3fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13686-cwe-78-improper-neutralization-of-s-0ca7a52d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13686%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13687-cwe-78-improper-neutralization-of-s-48c22113</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13687%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13688-cwe-78-improper-neutralization-of-s-1fd1738a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13688%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24502-cwe-427-uncontrolled-search-path-el-f6578229</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24502%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20Dell%20Command%20%7C%20Intel%20vPro%20Out%20of%20Band&amp;severity=high&amp;id=69a74c95d1a09e29cb79af24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14456-cwe-327-use-of-a-broken-or-risky-cr-a1a22bf8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14456%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20MQ%20Appliance&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14480-cwe-327-use-of-a-broken-or-risky-cr-3f20f205</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14480%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Aspera%20faspio%20Gateway&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1567-cwe-611-improper-restriction-of-xml--a1c9e77f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1567%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=69a74916d1a09e29cb78e8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1713-cwe-305-authentication-bypass-by-pri-f8f08c4c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1713%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IBM%20MQ&amp;severity=medium&amp;id=69a74916d1a09e29cb78e8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-dragon-targets-organizations-in-southeast-a-3eb9b653</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Dragon%20Targets%20Organizations%20in%20Southeast%20Asia%20and%20Europe&amp;severity=medium&amp;id=69a814c4d1a09e29cb2cff01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0869-cwe-305-authentication-bypass-by-pri-f26fec73</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0869%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Brocade%20ASCG&amp;severity=high&amp;id=69a7420dd1a09e29cb75a987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13490-vulnerability-in-ibm-app-connect-op-a38ba731</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13490%3A%20Vulnerability%20in%20IBM%20App%20Connect%20Operator&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-strikes-on-amazon-data-centers-highlight-i-daf77fd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Strikes%20on%20Amazon%20Data%20Centers%20Highlight%20Industry%E2%80%99s%20Vulnerability%20to%20Physical%20Disasters&amp;severity=high&amp;id=69a73e52d1a09e29cb7481dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13616-cwe-497-exposure-of-sensitive-syste-f677746c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13616%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13734-cwe-862-missing-authorization-in-ib-55112373</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13734%3A%20CWE-862%20Missing%20Authorization%20in%20IBM%20Engineering%20Requirements%20Management%20DOORS%20Next&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29022-cwe-122-heap-based-buffer-overflow--f0fcfc02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29022%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20mackron%20dr_libs%20dr_wav.h&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14604-cwe-732-incorrect-permission-assign-6b2bd9ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14604%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Storage%20Scale&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14923-cwe-321-use-of-hard-coded-cryptogra-94170a5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14923%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36363-cwe-307-improper-restriction-of-exc-6d356cfa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36363%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20IBM%20DevOps%20Plan&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36364-cwe-525-use-of-web-browser-cache-co-182fb3f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36364%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20IBM%20DevOps%20Plan&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1265-cwe-532-insertion-of-sensitive-infor-f251bfd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1265%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2606-cwe-22-improper-limitation-of-a-path-d0fb6498</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2606%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20webMethods%20API%20Gateway%20(on-prem)&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3484-command-injection-in-phialsbasement--113d49cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3484%3A%20Command%20Injection%20in%20PhialsBasement%20nmap-mcp-server&amp;severity=medium&amp;id=69a73e9cd1a09e29cb748a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2915-hp-system-event-utility-denial-of-se-f0d4d0bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2915%3A%20HP%20System%20Event%20Utility%20%E2%80%93%20Denial%20of%20Service%20in%20HP%20Inc%20HP%20System%20Event%20Utility&amp;severity=medium&amp;id=69a73782d1a09e29cb722154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3494-cwe-778-insufficient-logging-in-mari-263ef839</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3494%3A%20CWE-778%20(Insufficient%20Logging)%20in%20MariaDB%20Foundation%20MariaDB%20Server&amp;severity=medium&amp;id=69a72971d1a09e29cb6b58e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3437-cwe-119-improper-restriction-of-oper-291f400a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3437%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Portwell%20Portwell%20Engineering%20Toolkits&amp;severity=critical&amp;id=69a71f08d1a09e29cb64f6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0540-improper-neutralization-of-input-dur-fcf39a86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69a71bdad1a09e29cb636912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15599-improper-neutralization-of-input-du-fc0586ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69a71bdad1a09e29cb63690d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3136-cwe-863-incorrect-authorization-perm-64a726f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3136%3A%20CWE-863%20Incorrect%20Authorization%20(Permission%20Bypass)%20in%20Google%20Cloud%20Cloud%20Build&amp;severity=high&amp;id=69a70d52d1a09e29cb5a67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-assistant-in-kaspersky-container-security-ab3f1b7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20assistant%20in%20Kaspersky%20Container%20Security&amp;severity=medium&amp;id=69a70a03d1a09e29cb58b507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-dragon-targets-organizations-in-southeast-a-f6a8d11c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Dragon%20Targets%20Organizations%20in%20Southeast%20Asia%20and%20Europe&amp;severity=medium&amp;id=69a7067dd1a09e29cb571fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-ai-powered-bot-actively-exploiting-github-actio-7268fc31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20AI-Powered%20Bot%20Actively%20Exploiting%20GitHub%20Actions%20-%20Microsoft%2C%20DataDog%2C%20and%20CNCF%20Projects%20Hit%20So%20Far&amp;severity=medium&amp;id=69a7109dd1a09e29cb5bd47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/web-based-indirect-prompt-injection-observed-in-th-e7ae89ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Web-Based%20Indirect%20Prompt%20Injection%20Observed%20in%20the%20Wild%3A%20Fooling%20AI%20Agents&amp;severity=medium&amp;id=69a7109dd1a09e29cb5bd468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redalert-trojan-campaign-fake-emergency-alert-app--4ce3c6ee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedAlert%20Trojan%20Campaign%3A%20Fake%20Emergency%20Alert%20App%20Spread%20via%20SMS%20Spoofing%20Israeli%20Home%20Front%20Command&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeywell-researcher-clash-over-impact-of-building-ce2dff31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Honeywell%2C%20Researcher%20Clash%20Over%20Impact%20of%20Building%20Controller%20Vulnerability&amp;severity=medium&amp;id=69a6ff0ad1a09e29cb536182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3465-denial-of-service-in-tuya-app-58df3c71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3465%3A%20Denial%20of%20Service%20in%20Tuya%20App&amp;severity=low&amp;id=69a6fbbdd1a09e29cb5117be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bruteforce-scans-for-crushftp-tue-mar-3rd-cfb37f98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bruteforce%20Scans%20for%20CrushFTP%20%2C%20(Tue%2C%20Mar%203rd)&amp;severity=medium&amp;id=69a79367d1a09e29cbc29e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28518-cwe-22-improper-limitation-of-a-pat-ac4b7555</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Volcengine%20OpenViking&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64736-cwe-125-out-of-bounds-read-in-the-b-2ca06079</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64736%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=medium&amp;id=69a6f4b6d1a09e29cb4db068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22891-cwe-122-heap-based-buffer-overflow--50121360</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22891%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20777-cwe-122-heap-based-buffer-overflow--3231c396</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20777%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25674-cwe-362-concurrent-execution-using--1957efe8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25674%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20djangoproject%20Django&amp;severity=low&amp;id=69a6f4b6d1a09e29cb4db07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25673-cwe-400-uncontrolled-resource-consu-2c418a56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25673%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20djangoproject%20Django&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2637-cwe-732-incorrect-permission-assignm-a25e0e26</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2637%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20iBoysoft%20iBoysoft%20NTFS&amp;severity=high&amp;id=69a6f130d1a09e29cb4be7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quantum-decryption-of-rsa-is-much-closer-than-expe-e9305bca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quantum%20Decryption%20of%20RSA%20is%20Much%20Closer%20than%20Expected&amp;severity=medium&amp;id=69a79331d1a09e29cbc1fa65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-airsnitch-attack-shows-wi-fi-client-isolation--2c13ae0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98AirSnitch%E2%80%99%20Attack%20Shows%20Wi-Fi%20Client%20Isolation%20Could%20Be%20a%20False%20Sense%20of%20Security&amp;severity=low&amp;id=69a6e9f3d1a09e29cb4846fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/12-million-affected-by-university-of-hawaii-cancer-29e7f1e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1.2%20Million%20Affected%20by%20University%20of%20Hawaii%20Cancer%20Center%20Data%20Breach&amp;severity=medium&amp;id=69a6e66ed1a09e29cb45c03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3344-cwe-440-expected-behavior-violation--1a487772</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3344%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=69a6e6b4d1a09e29cb46e4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3343-cwe-79-improper-neutralization-of-in-593abd20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=69a6e6b4d1a09e29cb46e4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3342-cwe-787-out-of-bounds-write-in-watch-9d2fb839</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3342%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69a6e6b4d1a09e29cb46e4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3351-cwe-862-missing-authorization-in-can-6fb176f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3351%3A%20CWE-862%20Missing%20Authorization%20in%20Canonical%20lxd&amp;severity=low&amp;id=69a9c996460e1c85df139364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-update-patches-exploited-qualcomm-zero-day-0500373e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Update%20Patches%20Exploited%20Qualcomm%20Zero-Day&amp;severity=low&amp;id=69a6d85ed1a09e29cb229150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-cyber-front-hacktivist-activity-rises-but-sta-4523c09d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Cyber%20Front%3A%20Hacktivist%20Activity%20Rises%2C%20but%20State-Sponsored%20Attacks%20Stay%20Low&amp;severity=low&amp;id=69a6d4dad1a09e29cb19b432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3463-heap-based-buffer-overflow-in-xlnt-c-54baebc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3463%3A%20Heap-based%20Buffer%20Overflow%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69a6d18cd1a09e29cb1024e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sloppylemming-deploys-burrowshell-and-rust-based-r-fe380f33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SloppyLemming%20Deploys%20BurrowShell%20and%20Rust-Based%20RAT%20to%20Target%20Pakistan%20and%20Bangladesh&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59060-cwe-297-improper-validation-of-cert-9be8c153</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59060%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=medium&amp;id=69a6bff6d1a09e29cbfe3b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59059-cwe-94-improper-control-of-generati-43809e3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59059%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=critical&amp;id=69a6bff6d1a09e29cbfe3b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-ms-agent-ai-framework-can-allow-f-d035faeb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20MS-Agent%20AI%20Framework%20Can%20Allow%20Full%20System%20Compromise&amp;severity=low&amp;id=69a6bc3dd1a09e29cbfca855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-method-to-track-cars-via-tire--dd7b05ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Method%20to%20Track%20Cars%20via%20Tire%20Sensors&amp;severity=low&amp;id=69a6ae2dd1a09e29cbf5c440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15598-improper-verification-of-cryptograp-d643f0bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15598%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Dataease%20SQLBot&amp;severity=medium&amp;id=69a6ae74d1a09e29cbf6065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2568-cwe-79-improper-neutralization-of-in-6840f089</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crmperks%20WP%20Zendesk%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=high&amp;id=69a6ae74d1a09e29cbf60663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22886-cwe-1392-use-of-default-credentials-68ab8e2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22886%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Eclipse%20Foundation%20Eclipse%20OpenMQ&amp;severity=critical&amp;id=69a6aadfd1a09e29cbf4c05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1876-cwe-404-improper-resource-shutdown-o-b1e51223</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1876%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-ENET%2FIP%20Ethernet%20Module%20FX5-ENET%2FIP&amp;severity=high&amp;id=69a6fbbdd1a09e29cb5117c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1875-cwe-404-improper-resource-shutdown-o-290a0193</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1875%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-EIP%20EtherNet%2FIP%20Module%20FX5-EIP&amp;severity=high&amp;id=69a687b5d1a09e29cbe1300a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1874-cwe-670-always-incorrect-control-flo-ab07aefb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1874%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-ENET%2FIP%20Ethernet%20Module%20FX5-ENET%2FIP&amp;severity=high&amp;id=69a687b5d1a09e29cbe13006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-brief-march-2026-escalation-of-cyber-risk-r-965c4d14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Brief%3A%20March%202026%20Escalation%20of%20Cyber%20Risk%20Related%20to%20Iran&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12345-buffer-overflow-in-llm-claw-ea370fec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12345%3A%20Buffer%20Overflow%20in%20LLM-Claw&amp;severity=high&amp;id=69a68433d1a09e29cbdf37a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15595-cwe-1390-weak-authentication-in-mls-f8e093b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15595%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20mlsoft%20Inno%20Setup&amp;severity=medium&amp;id=69a67d2dd1a09e29cbdc2f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3455-cross-site-scripting-xss-in-mailpars-8034f691</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3455%3A%20Cross-site%20Scripting%20(XSS)%20in%20mailparser&amp;severity=medium&amp;id=69a66f1fd1a09e29cbd3d46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3449-incorrect-control-flow-scoping-in-to-763d30d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3449%3A%20Incorrect%20Control%20Flow%20Scoping%20in%20%40tootallnate%2Fonce&amp;severity=medium&amp;id=69a66f1fd1a09e29cbd3d467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1492-cwe-269-improper-privilege-managemen-edd7f3b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1492%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=critical&amp;id=69a66813d1a09e29cbd10aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20801-cwe-319-cleartext-transmission-of-s-9442dc8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20801%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Gallagher%20NxWitness%20VMS%20and%20Hanwha%20VMS%20Integrations&amp;severity=medium&amp;id=69a652fcd1a09e29cba9d61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20757-cwe-667-improper-locking-in-gallagh-92af19ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20757%3A%20CWE-667%20Improper%20Locking%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=low&amp;id=69a652fcd1a09e29cba9d619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47147-cwe-312-cleartext-storage-of-sensit-da3da127</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47147%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Gallagher%20Command%20Centre%20Mobile%20Client&amp;severity=medium&amp;id=69a652fcd1a09e29cba9d616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1487-cwe-89-improper-neutralization-of-sp-8e8ecf27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1487%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69a644edd1a09e29cb9ed2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2448-cwe-22-improper-limitation-of-a-path-365740f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2448%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gpriday%20Page%20Builder%20by%20SiteOrigin&amp;severity=high&amp;id=69a644edd1a09e29cb9ed2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2269-cwe-434-unrestricted-upload-of-file--aa73faba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2269%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=high&amp;id=69a644edd1a09e29cb9ed2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2628-cwe-288-authentication-bypass-using--3ce6682b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2628%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20cyberlord92%20All-in-One%20Microsoft%20365%20%26%20Entra%20ID%20%2F%20Azure%20AD%20SSO%20Login&amp;severity=critical&amp;id=69a644edd1a09e29cb9ed2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0754-cwe-321-in-hp-inc-vvx-cff5c471</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0754%3A%20CWE-321%20in%20HP%20Inc%20VVX&amp;severity=high&amp;id=69a63a5fd1a09e29cb891967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boss-mini-v140-local-file-inclusion-lfi-5031ed92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boss%20Mini%20v1.4.0%20-%20Local%20File%20Inclusion%20(LFI)&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wegia-350-sql-injection-e53976a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WeGIA%203.5.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/easy-file-sharing-web-server-v72-buffer-overflow-0b6ea038</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Easy%20File%20Sharing%20Web%20Server%20v7.2%20-%20Buffer%20Overflow&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mailcow-2025-01a-host-header-password-reset-poison-0f65742b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=mailcow%202025-01a%20-%20Host%20Header%20Password%20Reset%20Poisoning&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-backup-migration-137-remote-command-exec-1e4d134b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Backup%20Migration%201.3.7%20-%20Remote%20Command%20Execution&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-03-c1c93c7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-03&amp;severity=medium&amp;id=69a77a12d1a09e29cb894e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70239-na-bcdf699f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70239%3A%20n%2Fa&amp;severity=high&amp;id=69a7501dd1a09e29cb7a3fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70234-na-e1524ae3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70234%3A%20n%2Fa&amp;severity=high&amp;id=69a74916d1a09e29cb78e8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70240-na-50a4c245</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70240%3A%20n%2Fa&amp;severity=high&amp;id=69a74590d1a09e29cb76d1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70241-na-6c90335a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70241%3A%20n%2Fa&amp;severity=high&amp;id=69a7420dd1a09e29cb75a982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70237-na-d3da279e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70237%3A%20n%2Fa&amp;severity=high&amp;id=69a7420dd1a09e29cb75a97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70236-na-3a6cfb2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70236%3A%20n%2Fa&amp;severity=medium&amp;id=69a733fdd1a09e29cb7091b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55027-na-950573eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55027%3A%20n%2Fa&amp;severity=high&amp;id=69a733fdd1a09e29cb7091b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55026-na-960f708a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55026%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e26ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55025-na-3e6b6400</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55025%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e26a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55024-na-e8f2b8bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55024%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e26a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55023-na-424244fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55023%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e26a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55022-na-988739b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55022%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55021-na-4783609f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55021%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e2699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55020-na-475e8194</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55020%3A%20n%2Fa&amp;severity=critical&amp;id=69a72cf6d1a09e29cb6e2695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55019-na-0e0331e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55019%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e2691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67840-na-9c79dfe6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67840%3A%20n%2Fa&amp;severity=high&amp;id=69a72973d1a09e29cb6b58fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63912-na-c669e470</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63912%3A%20n%2Fa&amp;severity=null&amp;id=69a72973d1a09e29cb6b58fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63911-na-5ae6ed65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63911%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63910-na-af3aa22f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63910%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63909-na-432945e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63909%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26892-na-d839fbc2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26892%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26891-na-06626ce8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26891%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26889-na-5be92f85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26889%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26888-na-39cc2ebd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26888%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26887-na-40a87163</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26887%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66945-na-f1fe5e8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66945%3A%20n%2Fa&amp;severity=critical&amp;id=69a72971d1a09e29cb6b58cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26890-na-be65dbb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26890%3A%20n%2Fa&amp;severity=low&amp;id=69a71f08d1a09e29cb64f6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69765-na-f2b1b26e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69765%3A%20n%2Fa&amp;severity=high&amp;id=69a71f08d1a09e29cb64f6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62817-na-f6cd3503</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62817%3A%20n%2Fa&amp;severity=high&amp;id=69a717ddd1a09e29cb604239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62816-na-a64776a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62816%3A%20n%2Fa&amp;severity=medium&amp;id=69a717ddd1a09e29cb604235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26886-na-455c504f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26886%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26885-na-cd64dccd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26885%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26884-na-b2057dd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26884%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26883-na-2f92fcad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26883%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66363-na-17acbebe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66363%3A%20n%2Fa&amp;severity=high&amp;id=69a709cdd1a09e29cb586e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62815-na-479affcd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62815%3A%20n%2Fa&amp;severity=medium&amp;id=69a709cdd1a09e29cb586e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62814-na-f81aae41</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62814%3A%20n%2Fa&amp;severity=high&amp;id=69a709cdd1a09e29cb586e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66680-na-5c7c12b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66680%3A%20n%2Fa&amp;severity=high&amp;id=69a702c6d1a09e29cb555065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24103-na-193bbf7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24103%3A%20n%2Fa&amp;severity=critical&amp;id=69a6fbbdd1a09e29cb5117ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70821-na-2b04e81e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70821%3A%20n%2Fa&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57622-na-a66bcb69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57622%3A%20n%2Fa&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52365-na-4d2fce57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52365%3A%20n%2Fa&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-03-5919e9d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-03&amp;severity=medium&amp;id=69a6cdd0d1a09e29cb03ee1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-03-e9f917ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-03&amp;severity=low&amp;id=69a6cdcfd1a09e29cb03edd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1566-cwe-269-improper-privilege-managemen-02d5d7d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1566%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=69a61e3fd1a09e29cb5e40e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1336-cwe-862-missing-authorization-in-ays-22761aa4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1336%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=69a61e3fd1a09e29cb5e40e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2583-cwe-79-improper-neutralization-of-in-8a361860</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=medium&amp;id=69a61033d1a09e29cb5548b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oauth-redirection-abuse-enables-phishing-and-malwa-79407cf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OAuth%20redirection%20abuse%20enables%20phishing%20and%20malware%20delivery&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3338-cwe-347-improper-verification-of-cry-5dba1e3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3338%3A%20CWE-347%20(Improper%20Verification%20of%20Cryptographic%20Signature)%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69a605a4d1a09e29cb50c698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3337-cwe-208-observable-timing-discrepanc-002f7127</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3337%3A%20CWE-208%20(Observable%20Timing%20Discrepancy)%20in%20AWS%20AWS-LC&amp;severity=medium&amp;id=69a605a4d1a09e29cb50c694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3336-cwe-295-improper-certificate-validat-82b96840</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3336%3A%20CWE-295%20(Improper%20Certificate%20Validation)%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69a60221d1a09e29cb4eac7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2256-cwe-94-improper-control-of-generatio-97245d82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2256%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ModelScope%20ms-agent&amp;severity=medium&amp;id=69a5f410d1a09e29cb4859d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21882-cwe-273-improper-check-for-dropped--74c9d20e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21882%3A%20CWE-273%3A%20Improper%20Check%20for%20Dropped%20Privileges%20in%20AsfhtgkDavid%20theshit&amp;severity=high&amp;id=69a5e601d1a09e29cb3f7137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25477-cwe-601-url-redirection-to-untruste-6451e338</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25477%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20toeverything%20AFFiNE&amp;severity=medium&amp;id=69a5e601d1a09e29cb3f713b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48636-elevation-of-privilege-in-google-an-b192bfbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48636%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31328-elevation-of-privilege-in-google-an-fe323a94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31328%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21853-cwe-94-improper-control-of-generati-d73fe22a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21853%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20toeverything%20AFFiNE&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0047-elevation-of-privilege-in-google-and-04b2cabf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0047%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0038-elevation-of-privilege-in-google-and-14616300</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0038%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0037-elevation-of-privilege-in-google-and-0e2ff1a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0037%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0035-elevation-of-privilege-in-google-and-f24ee122</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0035%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0034-elevation-of-privilege-in-google-and-69a10312</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0034%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0032-elevation-of-privilege-in-google-and-c7533730</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0032%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0031-elevation-of-privilege-in-google-and-4ddd3481</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0031%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0030-elevation-of-privilege-in-google-and-a9413c8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0030%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0029-elevation-of-privilege-in-google-and-6f20c44d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0029%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0028-elevation-of-privilege-in-google-and-b3d2b6b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0028%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0027-elevation-of-privilege-in-google-and-740034f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0027%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db82d1a09e29cb1cf021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0026-elevation-of-privilege-in-google-and-79b503be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0026%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0025-information-disclosure-in-google-and-3961b952</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0025%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0024-information-disclosure-in-google-and-775cabbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0024%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db82d1a09e29cb1cf018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0023-elevation-of-privilege-in-google-and-d9d12d55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0023%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0021-elevation-of-privilege-in-google-and-9579343b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0021%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0020-elevation-of-privilege-in-google-and-05bc707d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0020%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0017-elevation-of-privilege-in-google-and-18b4b83e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0017%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0015-denial-of-service-in-google-android-16844ccf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0015%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0014-denial-of-service-in-google-android-501e5c3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0014%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0013-elevation-of-privilege-in-google-and-3a77d566</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0013%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0012-information-disclosure-in-google-and-a8d58aff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0012%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0011-elevation-of-privilege-in-google-and-410c9f78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0011%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0010-elevation-of-privilege-in-google-and-7fdb3b3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0010%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0008-elevation-of-privilege-in-google-and-1785e1d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0008%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0007-elevation-of-privilege-in-google-and-58f6e174</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0007%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0006-remote-code-execution-in-google-andr-79236030</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0006%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7ed1a09e29cb1cb97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0005-information-disclosure-in-google-and-ed74d6c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0005%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48654-elevation-of-privilege-in-google-an-568e7f98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48654%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48653-elevation-of-privilege-in-google-an-f693d7f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48653%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48650-elevation-of-privilege-in-google-an-25ed2fac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48650%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48646-elevation-of-privilege-in-google-an-ab9c8f05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48646%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48645-elevation-of-privilege-in-google-an-505c2e59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48645%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7ed1a09e29cb1cb96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48644-denial-of-service-in-google-android-1bb8488f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48644%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48642-information-disclosure-in-google-an-da2f0b4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48642%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48641-elevation-of-privilege-in-google-an-24d420bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48641%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48635-elevation-of-privilege-in-google-an-9a208ff4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48635%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48634-elevation-of-privilege-in-google-an-0d0d6816</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48634%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48630-information-disclosure-in-google-an-fa70f5ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48630%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48619-elevation-of-privilege-in-google-an-ef2f931c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48619%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1caddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48613-unknown-in-google-android-902667f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48613%3A%20Unknown%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48609-denial-of-service-in-google-android-ba7218a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48609%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7cd1a09e29cb1cadd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48605-elevation-of-privilege-in-google-an-583c11dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48605%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48602-elevation-of-privilege-in-google-an-8d7bfe7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48602%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48587-denial-of-service-in-google-android-0feec96e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48587%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7cd1a09e29cb1cadc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48585-denial-of-service-in-google-android-73d035df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48585%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db79d1a09e29cb1c9aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48582-elevation-of-privilege-in-google-an-2b3a2c37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48582%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48579-elevation-of-privilege-in-google-an-9e39edc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48579%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48578-elevation-of-privilege-in-google-an-1a2b535e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48578%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48577-elevation-of-privilege-in-google-an-f2946dae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48577%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48574-elevation-of-privilege-in-google-an-6f67eeda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48574%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48568-elevation-of-privilege-in-google-an-701b0b4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48568%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48567-elevation-of-privilege-in-google-an-ccaedf6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48567%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32313-elevation-of-privilege-in-google-an-c7ea5cd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32313%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43766-information-disclosure-in-google-an-4a2fe7e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43766%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db79d1a09e29cb1c9acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dust-specter-apt-targets-government-officials-in-i-87553f50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dust%20Specter%20APT%20Targets%20Government%20Officials%20in%20Iraq&amp;severity=medium&amp;id=69a717a5d1a09e29cb601ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0654-cwe-78-improper-neutralization-of-sp-6feb9749</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0654%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Deco%20BE25%20v1.0&amp;severity=high&amp;id=69a5d050b6c0d8506fbcb7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/funnull-resurfaces-exposing-ringh23-arsenal-and-ma-172367c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Funnull%20Resurfaces%3A%20Exposing%20RingH23%20Arsenal%20and%20MacCMS%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=69a717a5d1a09e29cb601e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0655-cwe-22-improper-limitation-of-a-path-0f110460</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0655%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TP-Link%20Systems%20Inc.%20Deco%20BE25%20v1.0&amp;severity=medium&amp;id=69a5d050b6c0d8506fbcb7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3180-cwe-89-improper-neutralization-of-sp-98c584af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3180%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=high&amp;id=69a5ccceb6c0d8506fb7921b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3132-cwe-94-improper-control-of-generatio-60f29397</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3132%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jewel%20Theme%20Master%20Addons%20for%20Elementor%20Premium&amp;severity=high&amp;id=69a5ccceb6c0d8506fb79216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/novel-dprk-stager-using-pastebin-and-text-steganog-700c0da3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Novel%20DPRK%20stager%20using%20Pastebin%20and%20text%20steganography&amp;severity=medium&amp;id=69a6056dd1a09e29cb500441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21385-cwe-190-integer-overflow-or-wraparo-b6c506df</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21385%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa297e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59603-cwe-787-out-of-bounds-write-in-qual-4c38cf97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59603%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa297b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59600-cwe-126-buffer-over-read-in-qualcom-c7eb4244</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59600%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47386-cwe-416-use-after-free-in-qualcomm--ce0f17d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47386%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47385-cwe-1262-improper-access-control-fo-d2e4d6d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47385%3A%20CWE-1262%3A%20Improper%20Access%20Control%20for%20Register%20Interface%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47384-cwe-617-reachable-assertion-in-qual-817ade50</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47384%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69a5c5cab6c0d8506faa2cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47383-cwe-325-missing-cryptographic-step--582b986b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47383%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47381-cwe-416-use-after-free-in-qualcomm--a1d53b23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47381%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47379-cwe-416-use-after-free-in-qualcomm--34172ec0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47379%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47378-cwe-497-exposure-of-sensitive-syste-00d19e62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47378%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47377-cwe-416-use-after-free-in-qualcomm--ea0d7bb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47377%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa298d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47376-cwe-416-use-after-free-in-qualcomm--24bbb384</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47376%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa298a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47375-cwe-416-use-after-free-in-qualcomm--f83573a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47375%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47373-cwe-787-out-of-bounds-write-in-qual-dafd73bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47373%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47371-cwe-617-reachable-assertion-in-qual-add108d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47371%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69a5c5c8b6c0d8506faa2981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2nd-march-threat-intelligence-report-b9e4863c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2nd%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69a5bddb32ffcdb8a2768b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64427-cwe-918-server-side-request-forgery-938d592d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64427%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a5bdaa32ffcdb8a2762eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28286-cwe-73-external-control-of-file-nam-7cb314e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28286%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a5bdaa32ffcdb8a2762eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52564-cwe-80-improper-neutralization-of-s-45e6f918</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52564%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52998-cwe-502-deserialization-of-untruste-bdb241bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52998%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a252066e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50199-cwe-918-server-side-request-forgery-087d001b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50199%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52563-cwe-79-improper-neutralization-of-i-5645040f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52475-cwe-79-improper-neutralization-of-i-8242ec9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52475%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a252065a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52476-cwe-79-improper-neutralization-of-i-065db084</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52476%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a252065f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52470-cwe-79-improper-neutralization-of-i-07562d58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52470%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52469-cwe-841-improper-enforcement-of-beh-d8af2236</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52469%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52468-cwe-79-improper-neutralization-of-i-af315191</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52468%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a252064b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28412-cwe-400-uncontrolled-resource-consu-ee59b501</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28412%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20textream&amp;severity=medium&amp;id=69a5b6a132ffcdb8a25206aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50198-cwe-502-deserialization-of-untruste-f2b04235</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50198%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28403-cwe-346-origin-validation-error-in--510c10f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28403%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20textream&amp;severity=high&amp;id=69a5b6a132ffcdb8a25206a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-allowed-hijacking-chromes-gemini-liv-b93c9281</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20Allowed%20Hijacking%20Chrome%E2%80%99s%20Gemini%20Live%20AI%20Assistant&amp;severity=low&amp;id=69a5af6132ffcdb8a2437a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50197-cwe-78-improper-neutralization-of-s-930b378b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50197%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50196-cwe-78-improper-neutralization-of-s-c384cdc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50196%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3102-macos-exiftool-image-processing-vuln-b769fd1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3102%3A%20macOS%20ExifTool%20image-processing%20vulnerability%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a63f7bd1a09e29cb92fd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50195-cwe-78-improper-neutralization-of-s-04fa43e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50195%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0689-cwe-522-insufficiently-protected-cre-f23e5b11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0689%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Extreme%20Networks%20ExtremeCloud%20IQ%20-%20Site%20Engine&amp;severity=medium&amp;id=69a5ac1332ffcdb8a23ff40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50194-cwe-78-improper-neutralization-of-s-98ee3848</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50194%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50193-cwe-78-improper-neutralization-of-s-b5f5a81f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50193%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50192-cwe-89-improper-neutralization-of-s-c4433473</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50192%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50191-cwe-89-improper-neutralization-of-s-962362cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50191%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50190-cwe-89-improper-neutralization-of-s-ba698467</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50190%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0995-cwe-362-concurrent-execution-using-s-15e51ab8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0995%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Arm%20C1%20Pro&amp;severity=low&amp;id=69a5a89032ffcdb8a23d2f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50189-cwe-89-improper-neutralization-of-s-ddcfb698</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50189%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50188-cwe-89-improper-neutralization-of-s-36e03404</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50188%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52482-cwe-79-improper-neutralization-of-i-52a860bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52482%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a50b32ffcdb8a23b6e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50187-cwe-95-improper-neutralization-of-d-2855170f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50187%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50186-cwe-79-improper-neutralization-of-i-6bc2aea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50186%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5a50b32ffcdb8a23b6e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50337-cwe-918-server-side-request-forgery-13c8b2e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50337%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5a50b32ffcdb8a23b6e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-vulnerability-allowed-websites-to-hijack--4d33e471</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Vulnerability%20Allowed%20Websites%20to%20Hijack%20AI%20Agents&amp;severity=low&amp;id=69a5a15132ffcdb8a2372e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47886-cwe-502-deserialization-of-untruste-fc9008b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47886%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5c4fdb6c0d8506fa86d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23600-vulnerability-in-hewlett-packard-en-a5e8a398</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23600%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20AutoPass%20License%20Server%20(APLS)&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/madison-square-garden-data-breach-confirmed-months-e72fb31f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Madison%20Square%20Garden%20Data%20Breach%20Confirmed%20Months%20After%20Hacker%20Attack&amp;severity=medium&amp;id=69a596c532ffcdb8a22d0c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3432-cwe-862-missing-authorization-in-sim-04668d1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3432%3A%20CWE-862%20Missing%20Authorization%20in%20SimStudioAI%20sim&amp;severity=critical&amp;id=69a5937832ffcdb8a228be36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3431-cwe-862-missing-authorization-in-sim-98ba3f10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3431%3A%20CWE-862%20Missing%20Authorization%20in%20SimStudioAI%20sim&amp;severity=critical&amp;id=69a5937832ffcdb8a228be33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14532-cwe-434-unrestricted-upload-of-file-a08baa22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14532%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=69a5937832ffcdb8a228be30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12462-cwe-89-improper-neutralization-of-s-e4bc6af2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12462%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=69a5937832ffcdb8a228be2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-apt-targets-air-gapped-systems-in-rec-01a77ed4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20APT%20Targets%20Air-Gapped%20Systems%20in%20Recent%20Campaign&amp;severity=medium&amp;id=69a57aa532ffcdb8a20f84b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-working-towards-quantum-safe-chrome-https-c-51a02371</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Working%20Towards%20Quantum-Safe%20Chrome%20HTTPS%20Certificates&amp;severity=medium&amp;id=69a5772032ffcdb8a208e196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58406-cwe-693-protection-mechanism-failur-90e01dfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58406%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58405-cwe-1021-improper-restriction-of-re-3693e469</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58405%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58402-cwe-639-authorization-bypass-throug-e811e431</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58402%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=69a573fd32ffcdb8a20705ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30062-cwe-89-improper-neutralization-of-s-406cf469</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30062%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30044-cwe-78-improper-neutralization-of-s-2f406f65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30044%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20CommandInjection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30042-cwe-603-use-of-client-side-authenti-9e79f8b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30042%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30035-cwe-306-missing-authentication-for--80df036f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30035%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-howto-zip-files-inside-rtf-mon-mar-2nd-0c33c52b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20Howto%3A%20ZIP%20Files%20Inside%20RTF%2C%20(Mon%2C%20Mar%202nd)&amp;severity=medium&amp;id=69a5739d32ffcdb8a206dff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-464-released-mon-mar-2nd-1c22c94e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.4%20Released%2C%20(Mon%2C%20Mar%202nd)&amp;severity=medium&amp;id=69a5739d32ffcdb8a206dff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10350-cwe-89-improper-neutralization-of-s-d1330e4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10350%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20NETRAAD&amp;severity=high&amp;id=69a573fd32ffcdb8a20705d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-israel-and-iran-trade-cyberattacks-pro-west-hac-ac7cd7b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US-Israel%20and%20Iran%20Trade%20Cyberattacks%3A%20Pro-West%20Hacks%20Cause%20Disruption%20as%20Tehran%20Retaliates&amp;severity=critical&amp;id=69a5701932ffcdb8a20320c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2584-cwe-89-improper-neutralization-of-sp-3951e11b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2584%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ciser%20System%20SL%20CSIP%20firmware&amp;severity=critical&amp;id=69a5542f32ffcdb8a2ddad39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20416-cwe-787-out-of-bounds-write-in-medi-250df18d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20416%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20445-cwe-367-time-of-check-time-of-use-t-1aacf4d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20445%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550b032ffcdb8a2d8ad3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20429-cwe-125-out-of-bounds-read-in-media-47f3aa2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20429%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20424-cwe-125-out-of-bounds-read-in-media-a029e3f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20424%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20444-cwe-787-out-of-bounds-write-in-medi-7a1940a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20444%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8aceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20443-cwe-416-use-after-free-in-mediatek--5d941cf9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20443%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20442-cwe-416-use-after-free-in-mediatek--fadd9fca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20442%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20441-cwe-787-out-of-bounds-write-in-medi-009447e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20441%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20440-cwe-1285-specified-index-position-o-c6257827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20440%3A%20CWE-1285%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20439-cwe-416-use-after-free-in-mediatek--27fbcc84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20439%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20438-cwe-367-time-of-check-time-of-use-t-14669464</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20438%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20437-cwe-416-use-after-free-in-mediatek--12a7a5b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20437%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20436-cwe-120-classic-buffer-overflow-in--1dd491fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20436%3A%20CWE-120%20Classic%20Buffer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20435-cwe-522-insufficiently-protected-cr-c10cbe25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20435%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20434-cwe-787-out-of-bounds-write-in-medi-48a3728c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20434%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20430-cwe-787-out-of-bounds-write-in-medi-388e7108</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20430%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20428-cwe-787-out-of-bounds-write-in-medi-870c8926</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20428%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20427-cwe-787-out-of-bounds-write-in-medi-d3e944a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20427%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20426-cwe-787-out-of-bounds-write-in-medi-97a580b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20426%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20425-cwe-787-out-of-bounds-write-in-medi-4edb3ff4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20425%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20423-cwe-749-exposed-dangerous-method-or-377e62dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20423%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3422-cwe-502-deserialization-of-untrusted-c53bebca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3422%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20e-Excellence%20U-Office%20Force&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6ad05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15597-improper-access-controls-in-dataeas-ce1dc337</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15597%3A%20Improper%20Access%20Controls%20in%20Dataease%20SQLBot&amp;severity=medium&amp;id=69a52d8232ffcdb8a2a6ace1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3000-cwe-494-download-of-code-without-int-6f96a540</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3000%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Changing%20IDExpert%20Windows%20Logon%20Agent&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6acf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3413-sql-injection-in-itsourcecode-univer-983c6ee5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3413%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a52d8232ffcdb8a2a6acfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2999-cwe-494-download-of-code-without-int-5d28b8bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2999%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Changing%20IDExpert%20Windows%20Logon%20Agent&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6acf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3412-cross-site-scripting-in-itsourcecode-e5baf82a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3412%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a522f732ffcdb8a29725e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3411-sql-injection-in-itsourcecode-univer-e960a20a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3411%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a51bef32ffcdb8a28abb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3410-sql-injection-in-itsourcecode-societ-8229ef18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3410%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=69a5186a32ffcdb8a2864e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3409-code-injection-in-eosphoros-ai-db-gp-fe6781c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3409%3A%20Code%20Injection%20in%20eosphoros-ai%20db-gpt&amp;severity=medium&amp;id=69a5186a32ffcdb8a2864dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3408-null-pointer-dereference-in-open-bab-da0da361</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3408%3A%20NULL%20Pointer%20Dereference%20in%20Open%20Babel&amp;severity=medium&amp;id=69a50ddf32ffcdb8a25b4131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3407-heap-based-buffer-overflow-in-yosysh-dca42c3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3407%3A%20Heap-based%20Buffer%20Overflow%20in%20YosysHQ%20yosys&amp;severity=medium&amp;id=69a5348c32ffcdb8a2af2b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3406-sql-injection-in-projectworlds-onlin-9eac0e99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3406%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69a5348c32ffcdb8a2af2b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3405-path-traversal-in-thinkgem-jeesite-5196bf01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3405%3A%20Path%20Traversal%20in%20thinkgem%20JeeSite&amp;severity=low&amp;id=69a4f1c732ffcdb8a223af3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3404-xml-external-entity-reference-in-thi-51b249e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3404%3A%20XML%20External%20Entity%20Reference%20in%20thinkgem%20JeeSite&amp;severity=low&amp;id=69a4f1c732ffcdb8a223af35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3403-cross-site-scripting-in-phpgurukul-s-17adf644</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3403%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Student%20Record%20Management%20System&amp;severity=medium&amp;id=69a4e73232ffcdb8a20beade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3402-cross-site-scripting-in-phpgurukul-s-3b0afb5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3402%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Student%20Record%20Management%20System&amp;severity=medium&amp;id=69a4e02a32ffcdb8a2fae9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3401-session-expiration-in-sourcecodester-da3b4f23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3401%3A%20Session%20Expiration%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=low&amp;id=69a4e02a32ffcdb8a2fae9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-02-63e7627a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-02&amp;severity=medium&amp;id=69a62892d1a09e29cb62b7a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26713-na-7bedeb27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26713%3A%20n%2Fa&amp;severity=critical&amp;id=69a5e601d1a09e29cb3f7141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26712-na-24d0bc2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26712%3A%20n%2Fa&amp;severity=critical&amp;id=69a5e601d1a09e29cb3f713e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26711-na-6f7b1ca4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26711%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26710-na-b38411d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26710%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26709-na-883f5184</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26709%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26706-na-5cbb336a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26706%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26705-na-a9848195</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26705%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26704-na-28680e8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26704%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26707-na-6e668b1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26707%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ccceb6c0d8506fb79213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26708-na-9d3ae846</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26708%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26700-na-7f4834e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26700%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24105-na-2160bf38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24105%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24115-na-134d08de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24115%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24108-na-e5dd6352</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24108%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24107-na-70a14196</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24107%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65465-na-fdf17c91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65465%3A%20n%2Fa&amp;severity=medium&amp;id=69a5c4fdb6c0d8506fa86d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58107-na-d7a73217</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58107%3A%20n%2Fa&amp;severity=high&amp;id=69a5c4fdb6c0d8506fa86d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70252-na-41578cab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70252%3A%20n%2Fa&amp;severity=high&amp;id=69a5ba2232ffcdb8a272b11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26699-na-e2fc148c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26699%3A%20n%2Fa&amp;severity=high&amp;id=69a5b31c32ffcdb8a247ea24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24110-na-365c0423</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24110%3A%20n%2Fa&amp;severity=critical&amp;id=69a5b31c32ffcdb8a247ea20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24101-na-d4673fac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24101%3A%20n%2Fa&amp;severity=critical&amp;id=69a5b31c32ffcdb8a247ea1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-02-9a2afa6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-02&amp;severity=medium&amp;id=69a5af5e32ffcdb8a243307b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26720-na-2ff82cfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26720%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ac1332ffcdb8a23ff415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26701-na-f7f6a089</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26701%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ac1332ffcdb8a23ff412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24112-na-7748f962</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24112%3A%20n%2Fa&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66880-na-5a19d613</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66880%3A%20n%2Fa&amp;severity=medium&amp;id=69a5ac1332ffcdb8a23ff407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26703-na-12ee013e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26703%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26702-na-04c047b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26702%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26696-na-579f0a76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26696%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26695-na-2c54b368</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26695%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26694-na-9ad189bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26694%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24111-na-6172e3d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24111%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24114-na-ff78d00a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24114%3A%20n%2Fa&amp;severity=high&amp;id=69a5a50b32ffcdb8a23b6e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24113-na-9be2e8f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24113%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24109-na-d78e78dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24109%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26698-na-2e1f1f94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26698%3A%20n%2Fa&amp;severity=medium&amp;id=69a59a7f32ffcdb8a231556f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26697-na-0f327e0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26697%3A%20n%2Fa&amp;severity=medium&amp;id=69a59a7f32ffcdb8a231556c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-02-646a39fa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-02&amp;severity=low&amp;id=69a51f3932ffcdb8a2918c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3400-stack-based-buffer-overflow-in-tenda-c665b93a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3400%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69a4ce9732ffcdb8a239391b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3399-buffer-overflow-in-tenda-f453-2372f90c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3399%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a4c78f32ffcdb8a20b0e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3398-buffer-overflow-in-tenda-f453-735bc013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3398%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a4b98032ffcdb8a289904f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3395-code-injection-in-maxsite-cms-3bfdaf81</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3395%3A%20Code%20Injection%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69a44c8232ffcdb8a22bcf2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3394-memory-corruption-in-jarikomppa-solo-211ba7f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3394%3A%20Memory%20Corruption%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69a4343532ffcdb8a2227d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-claude-code-in-mexican-governmen-ba878574</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20Claude%20Code%20in%20Mexican%20Government%20Cyberattack&amp;severity=medium&amp;id=69a433f132ffcdb8a2227866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3393-heap-based-buffer-overflow-in-jariko-5c5d7c47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3393%3A%20Heap-based%20Buffer%20Overflow%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69a4306332ffcdb8a22142d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3392-null-pointer-dereference-in-fascinat-e8321564</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3392%3A%20NULL%20Pointer%20Dereference%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a425d832ffcdb8a21d5292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3391-out-of-bounds-read-in-fascinatedbox--9a203fbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3391%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a425d832ffcdb8a21d528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3390-out-of-bounds-read-in-fascinatedbox--3e1232d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3390%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a410be32ffcdb8a216f793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3389-null-pointer-dereference-in-squirrel-0cdfbe54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3389%3A%20NULL%20Pointer%20Dereference%20in%20Squirrel&amp;severity=medium&amp;id=69a410be32ffcdb8a216f78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3388-uncontrolled-recursion-in-squirrel-9607a98f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3388%3A%20Uncontrolled%20Recursion%20in%20Squirrel&amp;severity=medium&amp;id=69a40d3b32ffcdb8a215b143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3387-null-pointer-dereference-in-wren-lan-d9c45b90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3387%3A%20NULL%20Pointer%20Dereference%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a40d3b32ffcdb8a215b13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3386-out-of-bounds-read-in-wren-lang-wren-34b2743d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3386%3A%20Out-of-Bounds%20Read%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a3ff2a32ffcdb8a20f9a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3385-uncontrolled-recursion-in-wren-lang--328bcef5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3385%3A%20Uncontrolled%20Recursion%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a3ff2a32ffcdb8a20f9a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3384-uncontrolled-recursion-in-chaiscript-987eeee8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3384%3A%20Uncontrolled%20Recursion%20in%20ChaiScript&amp;severity=medium&amp;id=69a3f82232ffcdb8a20b78ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3383-divide-by-zero-in-chaiscript-a72de4d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3383%3A%20Divide%20By%20Zero%20in%20ChaiScript&amp;severity=medium&amp;id=69a3e31832ffcdb8a2033ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3382-memory-corruption-in-chaiscript-4e28e43c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3382%3A%20Memory%20Corruption%20in%20ChaiScript&amp;severity=medium&amp;id=69a3d17732ffcdb8a2ed6d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-zoom-meeting-update-silently-installs-unautho-4e0297d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Zoom%20meeting%20&apos;update&apos;%20silently%20installs%20unauthorized%20version%20of%20monitoring%20tool%20abused%20by%20cybercriminals%20to%20spy%20on%20victims&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f8734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plugx-meeting-invitation-via-msbuild-and-gdata-6eb1b765</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlugX%20Meeting%20Invitation%20via%20MSBuild%20and%20GDATA&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f871d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-windows-file-explorer-and-webdav-for-malwa-66456dc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20Windows%20File%20Explorer%20and%20WebDAV%20for%20Malware%20Delivery&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f870b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3380-buffer-overflow-in-tenda-f453-54481f34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3380%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3b55632ffcdb8a2b4b44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3379-buffer-overflow-in-tenda-f453-63a79945</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3379%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3a74732ffcdb8a2a0f4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3378-buffer-overflow-in-tenda-f453-0b5023a3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3378%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3a74732ffcdb8a2a0f4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-01-27955616</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-01&amp;severity=medium&amp;id=69a4d56532ffcdb8a278469f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-01-5c769887</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-01&amp;severity=medium&amp;id=69a48f1632ffcdb8a2432fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-01-665b3e85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-01&amp;severity=low&amp;id=69a3fef132ffcdb8a20f79ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3377-buffer-overflow-in-tenda-f453-c140c206</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3377%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a37d1832ffcdb8a2775af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3376-buffer-overflow-in-tenda-f453-d5150655</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3376%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3760f32ffcdb8a2754357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28562-improper-neutralization-of-special--22c35314</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28562%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=high&amp;id=69a3647b32ffcdb8a26ae37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28561-improper-neutralization-of-input-du-2ab57de1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28561%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28560-improper-neutralization-of-input-du-8faa806d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28560%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28559-exposure-of-sensitive-information-t-63f9c324</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28559%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28558-improper-neutralization-of-input-du-ef0d4882</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28557-missing-authorization-in-gvectors-t-52ac189f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28557%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=high&amp;id=69a3647b32ffcdb8a26ae361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28556-missing-authorization-in-gvectors-t-7c48eb32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28556%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28555-missing-authorization-in-gvectors-t-0d98cbfc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28555%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28554-missing-authorization-in-gvectors-t-03297c73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28554%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canadian-tire-data-breach-impacts-38-million-accou-c239d541</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canadian%20Tire%20Data%20Breach%20Impacts%2038%20Million%20Accounts&amp;severity=medium&amp;id=69a2d7a532ffcdb8a23552b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3010-cwe-79-improper-neutralization-of-in-f593f595</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3010%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microchip%20TimePictra&amp;severity=critical&amp;id=69a2d7ea32ffcdb8a2355e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2844-cwe-306-missing-authentication-for-c-aa868998</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2844%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microchip%20TimePictra&amp;severity=critical&amp;id=69a2d7ea32ffcdb8a2355e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13673-cwe-89-improper-neutralization-of-s-d43b2ec0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13673%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=69a29c1732ffcdb8a21a67e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2471-cwe-502-deserialization-of-untrusted-d6318999</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2471%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20smub%20WP%20Mail%20Logging&amp;severity=high&amp;id=69a2918b32ffcdb8a20eaa4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1542-cwe-502-deserialization-of-untrusted-59f81670</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1542%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Super%20Stage%20WP&amp;severity=medium&amp;id=69a2bbbc32ffcdb8a227e261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-28-bf794239</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-28&amp;severity=medium&amp;id=69a383e532ffcdb8a279ce9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-28-cdec1619</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-28&amp;severity=low&amp;id=69a2520932ffcdb8a2a9c846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-28-c6fb4a83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-28&amp;severity=medium&amp;id=69a2520932ffcdb8a2a9c83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28426-cwe-79-improper-neutralization-of-i-60e5cc52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28426%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69a2210832ffcdb8a2802147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28425-cwe-94-improper-control-of-generati-a87384ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28425%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69a21f2232ffcdb8a27f4a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27759-cwe-918-server-side-request-forgery-7b0812f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27759%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Dhrumil%20Kumbhani%20Featured%20Image%20from%20Content&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28424-cwe-862-missing-authorization-in-st-0c75739a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28424%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28423-cwe-918-server-side-request-forgery-eabbe53b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28423%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20statamic%20cms&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28411-cwe-288-authentication-bypass-using-7167a2c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28411%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a2777760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28409-cwe-78-improper-neutralization-of-s-258821fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28409%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a277775c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28408-cwe-862-missing-authorization-in-la-ddacfcff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28408%3A%20CWE-862%3A%20Missing%20Authorization%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a2777758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28416-cwe-918-server-side-request-forgery-7592cbef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28416%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gradio-app%20gradio&amp;severity=high&amp;id=69a212fb32ffcdb8a2777772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28415-cwe-200-exposure-of-sensitive-infor-dbcfee5e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28415%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gradio-app%20gradio&amp;severity=medium&amp;id=69a212fb32ffcdb8a277776d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28414-cwe-36-absolute-path-traversal-in-g-feb1c031</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28414%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20gradio-app%20gradio&amp;severity=high&amp;id=69a212fb32ffcdb8a277777c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27939-cwe-287-improper-authentication-in--447d0594</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27939%3A%20CWE-287%3A%20Improper%20Authentication%20in%20statamic%20cms&amp;severity=high&amp;id=69a212fb32ffcdb8a2777778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-orders-all-federal-agencies-to-phase-out-use-baea88a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Orders%20All%20Federal%20Agencies%20to%20Phase%20Out%20Use%20of%20Anthropic%20Technology&amp;severity=medium&amp;id=69a20f4132ffcdb8a275b2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28407-cwe-703-improper-check-or-handling--2f677404</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28407%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20chainguard-dev%20malcontent&amp;severity=medium&amp;id=69a20f8732ffcdb8a275da20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28406-cwe-22-improper-limitation-of-a-pat-c28b7a73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28406%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-forks%20kaniko&amp;severity=high&amp;id=69a20f8732ffcdb8a275da1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28402-cwe-354-improper-validation-of-inte-be34d944</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28402%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69a20bf332ffcdb8a2748336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28400-cwe-749-exposed-dangerous-method-or-da335de5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28400%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20docker%20model-runner&amp;severity=high&amp;id=69a20bf332ffcdb8a2748332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28355-cwe-79-improper-neutralization-of-i-7d738047</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28355%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkst%20canarytokens&amp;severity=low&amp;id=69a2087132ffcdb8a2724a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28351-cwe-400-uncontrolled-resource-consu-1ca949cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28351%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69a2087132ffcdb8a2724a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28288-cwe-204-observable-response-discrep-609a4992</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28288%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20langgenius%20dify&amp;severity=medium&amp;id=69a2016632ffcdb8a26f324d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28272-cwe-79-improper-neutralization-of-i-47808143</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28272%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiteworks%20security-advisories&amp;severity=high&amp;id=69a2016632ffcdb8a26f324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28271-cwe-350-reliance-on-reverse-dns-res-d5eb1b08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28271%3A%20CWE-350%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a2016632ffcdb8a26f3247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28270-cwe-434-unrestricted-upload-of-file-06e3aca0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28270%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a2016632ffcdb8a26f3244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28268-cwe-459-incomplete-cleanup-in-go-vi-0517b158</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28268%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20go-vikunja%20vikunja&amp;severity=critical&amp;id=69a2016632ffcdb8a26f323f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28231-cwe-125-out-of-bounds-read-in-bigca-c6bc910b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28231%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bigcat88%20pillow_heif&amp;severity=medium&amp;id=69a1fde732ffcdb8a26e412b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3255-cwe-340-generation-of-predictable-nu-990287a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3255%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20HTTP%3A%3ASession2&amp;severity=medium&amp;id=69a1fde732ffcdb8a26e4130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27836-cwe-862-missing-authorization-in-th-18400afc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27836%3A%20CWE-862%3A%20Missing%20Authorization%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=69a1fa6032ffcdb8a26d1c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27947-cwe-88-improper-neutralization-of-a-24402a59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27947%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69a1fa6032ffcdb8a26d1c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27832-cwe-89-improper-neutralization-of-s-6c490a3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27832%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=69a1f6db32ffcdb8a26bc2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27824-cwe-307-improper-restriction-of-exc-39b00782</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27824%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27810-cwe-113-improper-neutralization-of--a1ce14fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27810%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27734-cwe-22-improper-limitation-of-a-pat-4f122212</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27734%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20henrygd%20beszel&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27793-cwe-639-authorization-bypass-throug-84a88cae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27793%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20seerr-team%20seerr&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27792-cwe-862-missing-authorization-in-se-260eb1fa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27792%3A%20CWE-862%3A%20Missing%20Authorization%20in%20seerr-team%20seerr&amp;severity=medium&amp;id=69a1f35732ffcdb8a26a7753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27707-cwe-288-authentication-bypass-using-d68532fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27707%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20seerr-team%20seerr&amp;severity=high&amp;id=69a1f35732ffcdb8a26a774e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28354-cwe-639-authorization-bypass-throug-2e337172</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28354%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=69a1efd532ffcdb8a269c95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26997-cwe-79-improper-neutralization-of-i-1ccfba73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26997%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=low&amp;id=69a1efd332ffcdb8a269c8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22717-cwe-125-out-of-bounds-read-in-vmwar-9dea0b38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22717%3A%20CWE-125%20Out-of-bounds%20Read%20in%20VMware%20Workstation&amp;severity=low&amp;id=69a1efd332ffcdb8a269c8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22716-cwe-125-out-of-bounds-read-in-vmwar-8d78d628</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22716%3A%20CWE-787%20Out-of-bounds%20Write%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27758-cwe-352-cross-site-request-forgery--f8983b9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27758%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a2634783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27757-cwe-620-unverified-password-change--836b6108</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27757%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=high&amp;id=69a1e1c432ffcdb8a263477f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27756-cwe-79-improper-neutralization-of-i-56dffe32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a263477b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27755-cwe-330-use-of-insufficiently-rando-27c7bdab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27755%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=critical&amp;id=69a1e1c432ffcdb8a2634777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27754-cwe-328-use-of-weak-hash-in-shenzhe-a0a4ca86</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27754%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a2634773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27753-cwe-307-improper-restriction-of-exc-f450d076</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27753%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1de4132ffcdb8a26144d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27752-cwe-319-cleartext-transmission-of-s-f729bb7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27752%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=high&amp;id=69a1de4132ffcdb8a26144d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27751-cwe-1392-use-of-default-credentials-706a3fb0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27751%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=critical&amp;id=69a1de4132ffcdb8a26144d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21619-cwe-400-uncontrolled-resource-consu-f28b2248</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21619%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20hexpm%20hex_core&amp;severity=low&amp;id=69a1de4132ffcdb8a26144c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/local-ktae-and-the-ida-pro-plugin-kaspersky-offici-3a13a807</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Local%20KTAE%20and%20the%20IDA%20Pro%20plugin%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a1ccf432ffcdb8a24a1deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3304-cwe-459-in-expressjs-multer-22a5e3c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3304%3A%20CWE-459%20in%20expressjs%20multer&amp;severity=high&amp;id=69a1be9b32ffcdb8a23e705d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2359-cwe-772-in-expressjs-multer-b3f304cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2359%3A%20CWE-772%20in%20expressjs%20multer&amp;severity=high&amp;id=69a1be9b32ffcdb8a23e7057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-attck-advisory-council-russian-cyber-536a6441</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20ATT%26CK%20Advisory%20Council%2C%20Russian%20Cyberattacks%20Aid%20Missile%20Strikes%2C%20Predator%20Bypasses%20iOS%20Indicators&amp;severity=medium&amp;id=69a1b75d32ffcdb8a23cc5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3277-cwe-312-cleartext-storage-of-sensiti-cd3f3fd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3277%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=69a1b7a632ffcdb8a23ccfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2749-e23f9297</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2749&amp;severity=critical&amp;id=69a1b7a632ffcdb8a23ccfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2750-cwe-20-improper-input-validation-in--d73d2c78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2750%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Centreon%20Centreon%20Open%20Tickets%20on%20Central%20Server&amp;severity=critical&amp;id=69a1b7a632ffcdb8a23ccfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3327-cwe-79-improper-neutralization-of-in-970903af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3327%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DatoCMS%20Web%20Previews&amp;severity=medium&amp;id=69a1a98332ffcdb8a2378ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15498-cwe-89-improper-neutralization-of-s-0a597b74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15498%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Pro3W%20Pro3W%20CMS&amp;severity=critical&amp;id=69a1a5fe32ffcdb8a235f6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/38-million-allegedly-impacted-by-manomano-data-bre-81de6c83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=38%20Million%20Allegedly%20Impacted%20by%20ManoMano%20Data%20Breach&amp;severity=medium&amp;id=69a1a24532ffcdb8a2343cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2751-blind-sql-injection-via-unsanitized--3cc96648</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2751%3A%20Blind%20SQL%20Injection%20via%20unsanitized%20array%20keys%20in%20Service%20Dependencies%20deletion.%20in%20Centreon%20Centreon%20Web%20on%20Central%20Server&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10990-inefficient-regular-expression-comp-66f11e14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10990%3A%20Inefficient%20Regular%20Expression%20Complexity&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/900-sangoma-freepbx-instances-infected-with-web-sh-4c7fa87f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=900%20Sangoma%20FreePBX%20Instances%20Infected%20With%20Web%20Shells&amp;severity=medium&amp;id=69a19b3e32ffcdb8a231cb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3223-cwe-22-improper-limitation-of-a-path-65bbd039</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3223%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Web%20Designer&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11950-cwe-79-improper-neutralization-of-i-394c2718</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11950%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20KNOWHY%20Advanced%20Technology%20Trading%20Ltd.%20Co.%20EduAsist&amp;severity=medium&amp;id=69a197f132ffcdb8a2305706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chilean-carding-shop-operator-extradited-to-us-ff61a7f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chilean%20Carding%20Shop%20Operator%20Extradited%20to%20US&amp;severity=medium&amp;id=69a190b232ffcdb8a22da550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-refuses-to-bend-to-pentagon-on-ai-safegu-724d3d36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Refuses%20to%20Bend%20to%20Pentagon%20on%20AI%20Safeguards%20as%20Dispute%20Nears%20Deadline&amp;severity=medium&amp;id=69a190b232ffcdb8a22da553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11252-cwe-89-improper-neutralization-of-s-229dc350</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11252%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Signum%20Technology%20Promotion%20and%20Training%20Inc.%20windesk.fm&amp;severity=critical&amp;id=69a21f2232ffcdb8a27f4aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-fedex-email-delivers-donutsx21-fri-feb-27th-a42d059d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Fedex%20Email%20Delivers%20Donuts%26%23x21%3B%2C%20(Fri%2C%20Feb%2027th)&amp;severity=medium&amp;id=69a18d2c32ffcdb8a22c9d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aeternum-botnet-loader-employs-polygon-blockchain--89cf856e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aeternum%20Botnet%20Loader%20Employs%20Polygon%20Blockchain%20C%26C%20to%20Boost%20Resilience&amp;severity=medium&amp;id=69a189a832ffcdb8a22adfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11251-cwe-89-improper-neutralization-of-s-0669f2cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11251%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dayneks%20Software%20Industry%20and%20Trade%20Inc.%20E-Commerce%20Platform&amp;severity=critical&amp;id=69a189f332ffcdb8a22b00e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24352-cwe-384-session-fixation-in-pluxml--87293653</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24352%3A%20CWE-384%20Session%20Fixation%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a2282727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24351-cwe-79-improper-neutralization-of-i-5535a71d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24351%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a2282723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24350-cwe-79-improper-neutralization-of-i-ca539a49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a228271f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2831-cwe-89-improper-neutralization-of-sp-79154bf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2831%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pierrelannoy%20MailArchiver&amp;severity=medium&amp;id=69a182d732ffcdb8a228272b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-ptx-routers-affected-by-critical--b59873d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20PTX%20Routers%20Affected%20by%20Critical%20Vulnerability&amp;severity=critical&amp;id=69a1749132ffcdb8a21d7bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1434-cwe-79-improper-neutralization-of-in-4ad955e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Politechnika%20Warszawska%20Omega-PSIR&amp;severity=medium&amp;id=69a1784b32ffcdb8a21fae63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dohdoor-malware-campaign-targets-education-and-d356513f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Dohdoor%20malware%20campaign%20targets%20education%20and%20health%20care&amp;severity=medium&amp;id=69a16d8732ffcdb8a2195d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-interview-evolution-of-vs-code-and-curs-6afe0a1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Interview%3A%20Evolution%20of%20VS%20Code%20and%20Cursor%20Tasks%20Infection%20Chains%20-%20Part%201&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/botnet-trojan-delivered-through-clickfix-and-ether-d3b38f2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Botnet%20Trojan%20delivered%20through%20ClickFix%20and%20EtherHiding&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-arpa-the-tld-that-isnt-supposed-to-host-an-36609fd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20.arpa%3A%20The%20TLD%20That%20Isn&apos;t%20Supposed%20to%20Host%20Anything&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1305-cwe-287-improper-authentication-in-s-96cc64c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1305%3A%20CWE-287%20Improper%20Authentication%20in%20shoheitanaka%20Japanized%20for%20WooCommerce&amp;severity=medium&amp;id=69a166b732ffcdb8a2157df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14142-cwe-79-improper-neutralization-of-i-049f904d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20electriccode%20Electric%20Enquiries&amp;severity=medium&amp;id=69a166b732ffcdb8a2157deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10938-cwe-506-embedded-malicious-code-in--4a12daaf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10938%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20moneytigo%20OVRI%20Payment&amp;severity=medium&amp;id=69a166b732ffcdb8a2157de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21660-cwe-256-plaintext-storage-of-a-pass-aad934b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21660%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=medium&amp;id=69a1633532ffcdb8a2131e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malicious-npm-package-ambar-src-targets-develo-1c59a0c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20malicious%20npm%20package%20&apos;ambar-src&apos;%20targets%20developers%20with%20open%20source%20malware&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21659-cwe-22-improper-limitation-of-a-pat-3400c9c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21659%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a1633532ffcdb8a2131e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21658-cwe-94-improper-control-of-generati-f2d5d005</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21658%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a2106787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21657-cwe-94-improper-control-of-generati-ac9104a8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21657%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a2106783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21656-cwe-94-improper-control-of-generati-591cf794</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21656%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a210677f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1627-cwe-327-use-of-a-broken-or-risky-cry-3510b538</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1627%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20SICK%20AG%20SICK%20LMS1000&amp;severity=medium&amp;id=69a15faf32ffcdb8a2106777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1626-cwe-327-use-of-a-broken-or-risky-cry-6e2a50f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1626%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20SICK%20AG%20SICK%20LMS1000&amp;severity=medium&amp;id=69a15faf32ffcdb8a210676f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21654-cwe-78-improper-neutralization-of-s-fee4b2ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21654%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a158a732ffcdb8a20b09cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2362-cwe-79-improper-neutralization-of-in-7f8990ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joedolson%20WP%20Accessibility&amp;severity=medium&amp;id=69a158a732ffcdb8a20b09cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2383-cwe-79-improper-neutralization-of-in-34b3f279</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Download%20Monitor&amp;severity=medium&amp;id=69a158a732ffcdb8a20b09d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2252-cwe-611-improper-restriction-of-xml--6b6b1047</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2252%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Xerox%20FreeFlow%20Core&amp;severity=high&amp;id=69a1552332ffcdb8a208e3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2251-cwe-22-improper-limitation-of-a-path-309f50e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2251%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Xerox%20FreeFlow%20Core&amp;severity=critical&amp;id=69a1552332ffcdb8a208e3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27776-deserialization-of-untrusted-data-i-dbd89a5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27776%3A%20Deserialization%20of%20untrusted%20data%20in%20NTT%20DATA%20INTRAMART%20Corporation%20intra-mart%20Accel%20Platform&amp;severity=high&amp;id=69a1519e32ffcdb8a205ced7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaws-exposed-gardyn-smart-gardens-to-rem-6afe633e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaws%20Exposed%20Gardyn%20Smart%20Gardens%20to%20Remote%20Hacking&amp;severity=critical&amp;id=69a14a6132ffcdb8a2012a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0980-improper-neutralization-of-special-e-8f324e87</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0980%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69a14e1a32ffcdb8a203afe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0871-incorrect-privilege-assignment-in-re-d9362869</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0871%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13327-improper-validation-of-syntactic-co-5f074485</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13327%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20astral-sh%20uv&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9909-use-of-non-canonical-url-paths-for-a-ff141764</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9909%3A%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9908-exposure-of-sensitive-information-to-01a50cc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9908%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9907-exposure-of-sensitive-information-to-cc86b7aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9907%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9572-exposure-of-sensitive-information-to-9f64e32c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9572%3A%20Incorrect%20Authorization%20in%20The%20Foreman%20Foreman&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15567-cwe-306-missing-authentication-for--6aaaa9dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15567%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20vivo%20Health&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15509-cwe-306-missing-authentication-for--e81e4acc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15509%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20vivo%20SmartRemote&amp;severity=high&amp;id=69a1438e32ffcdb8a2fbeb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12981-cwe-269-improper-privilege-manageme-e6893456</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12981%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Listee&amp;severity=critical&amp;id=69a1438e32ffcdb8a2fbeaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14149-cwe-79-improper-neutralization-of-i-23af593b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14149%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14040-cwe-79-improper-neutralization-of-i-7f5c8007</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesuite%20Automotive%20Car%20Dealership%20Business%20WordPress%20Theme&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3302-cross-site-scripting-in-sourcecodest-7e2a663c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3302%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69a1390232ffcdb8a2f493bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27653-incorrect-default-permissions-in-so-72204038</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27653%3A%20Incorrect%20default%20permissions%20in%20Soliton%20Systems%20K.K.%20Soliton%20SecureBrowser%20for%20OneGate&amp;severity=medium&amp;id=69a1357f32ffcdb8a2f19b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3301-os-command-injection-in-totolink-n30-8ab5e0b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3301%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=critical&amp;id=69a12e7632ffcdb8a2ebeaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3293-inefficient-regular-expression-compl-fdcbf38b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3293%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20snowflakedb%20snowflake-jdbc&amp;severity=medium&amp;id=69a12e7632ffcdb8a2ebeaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28372-cwe-829-inclusion-of-functionality--04030f82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28372%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20GNU%20inetutils&amp;severity=high&amp;id=69a12e7632ffcdb8a2ebeaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-go-crypto-module-steals-passwords-and-de-5a9ea1a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Go%20&apos;crypto&apos;%20Module%20Steals%20Passwords%20and%20Deploys%20Rekoobe%20Backdoor&amp;severity=medium&amp;id=69a15f7732ffcdb8a2102f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3292-sql-injection-in-jizhicms-d8105f3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3292%3A%20SQL%20Injection%20in%20jizhiCMS&amp;severity=medium&amp;id=69a1276f32ffcdb8a2e563fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28370-cwe-95-improper-neutralization-of-d-e403f347</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28370%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20OpenStack%20Vitrage&amp;severity=critical&amp;id=69a1276f32ffcdb8a2e563fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1558-cwe-639-authorization-bypass-through-08601960</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1558%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=69a1be9b32ffcdb8a23e7063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3289-path-traversal-in-sanluan-publiccms-7a278269</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3289%3A%20Path%20Traversal%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1442-cwe-321-use-of-hard-coded-cryptograp-3990dc00</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1442%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Unitree%20UPK&amp;severity=high&amp;id=69a1c21f32ffcdb8a23fb748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3287-sql-injection-in-youlaitech-youlai-m-f54637dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3287%3A%20SQL%20Injection%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3286-server-side-request-forgery-in-itwan-92eaf84b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3286%3A%20Server-Side%20Request%20Forgery%20in%20itwanger%20paicoding&amp;severity=medium&amp;id=69a1195f32ffcdb8a2c64269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2428-cwe-345-insufficient-verification-of-33fd59e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2428%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=high&amp;id=69a1195f32ffcdb8a2c64265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3285-out-of-bounds-read-in-berry-lang-ber-d0a248e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3285%3A%20Out-of-Bounds%20Read%20in%20berry-lang%20berry&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3284-integer-overflow-in-libvips-1f40665b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3284%3A%20Integer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3283-out-of-bounds-read-in-libvips-2cba54fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3283%3A%20Out-of-Bounds%20Read%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3282-out-of-bounds-read-in-libvips-63ed8a34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3282%3A%20Out-of-Bounds%20Read%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3281-heap-based-buffer-overflow-in-libvip-f2781821</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3281%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69a100c232ffcdb8a2a64fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24498-cwe-200-exposure-of-sensitive-infor-4726610a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24498%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20EFM-Networks%2C%20Inc.%20ipTIME%20T5008&amp;severity=medium&amp;id=69a100c232ffcdb8a2a64f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24497-cwe-121-stack-based-buffer-overflow-0433973b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24497%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SimTech%20Systems%2C%20Inc.%20ThinkWise&amp;severity=high&amp;id=69a100c232ffcdb8a2a64f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3275-buffer-overflow-in-tenda-f453-d6d6eb24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3275%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a100c232ffcdb8a2a64f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3037-cwe-78-in-copeland-copeland-xweb-300-4ecbd821</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3037%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20797-we-121-in-copeland-copeland-xweb-30-b49b097a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20797%3A%20WE-121%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=medium&amp;id=69a0f2b332ffcdb8a2981608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3274-buffer-overflow-in-tenda-f453-d6a76b12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3274%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0f2b532ffcdb8a2981649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22877-cwe-22-in-copeland-copeland-xweb-30-79b6e451</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22877%3A%20CWE-22%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=low&amp;id=69a0f2b332ffcdb8a298160d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25037-cwe-78-in-copeland-copeland-xweb-30-b7a79975</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25037%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a298161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25196-cwe-78-in-copeland-copeland-xweb-30-2b443476</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25196%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20764-cwe-78-in-copeland-copeland-xweb-30-48ae0445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20764%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25721-cwe-78-in-copeland-copeland-xweb-30-ba83d670</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25721%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a298162b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23702-cwe-78-in-copeland-copeland-xweb-30-ce9fc762</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23702%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24452-cwe-78-in-copeland-copeland-xweb-30-a7dbfe59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24452%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25105-cwe-78-in-copeland-copeland-xweb-30-8d544ce0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25105%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24695-cwe-78-in-copeland-copeland-xweb-30-3fd00bbd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24695%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20902-cwe-78-in-copeland-copeland-xweb-30-17710e48</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20902%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25109-cwe-78-in-copeland-copeland-xweb-30-a3a48ca5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25109%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24689-cwe-78-in-copeland-copeland-xweb-30-b9bf45c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24689%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20910-cwe-78-in-copeland-copeland-xweb-30-0f4f16cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20910%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25195-cwe-78-in-copeland-copeland-xweb-30-5749903d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25195%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24517-cwe-78-in-copeland-copeland-xweb-30-4bcf5b64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24517%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20742-cwe-78-in-copeland-copeland-xweb-30-03607d5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20742%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25111-cwe-78-in-copeland-copeland-xweb-30-30ddd8b7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25111%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21389-cwe-78-in-copeland-copeland-xweb-30-ce8a90ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21389%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24663-cwe-78-in-copeland-copeland-xweb-30-1c773deb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24663%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=critical&amp;id=69a0ebad32ffcdb8a293f2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21718-cwe-327-in-copeland-copeland-xweb-3-124474ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21718%3A%20CWE-327%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=critical&amp;id=69a0ebad32ffcdb8a293f2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25085-cwe-394-in-copeland-copeland-xweb-3-48dec72e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25085%3A%20CWE-394%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3273-buffer-overflow-in-tenda-f453-f5bf905b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3273%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0ebb032ffcdb8a293f38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22878-cwe-522-in-mobility46-mobility46se-77fe6773</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22878%3A%20CWE-522%20in%20Mobility46%20mobility46.se&amp;severity=medium&amp;id=69a0ebad32ffcdb8a293f2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27647-cwe-613-in-mobility46-mobility46se-cccd2724</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27647%3A%20CWE-613%20in%20Mobility46%20mobility46.se&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26305-cwe-307-in-mobility46-mobility46se-6a9fcc57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26305%3A%20CWE-307%20in%20Mobility46%20mobility46.se&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27028-cwe-306-in-mobility46-mobility46se-f694ef80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27028%3A%20CWE-306%20in%20Mobility46%20mobility46.se&amp;severity=critical&amp;id=69a0ebae32ffcdb8a293f331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25774-cwe-522-in-ev-energy-evenergy-ed954fdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25774%3A%20CWE-522%20in%20EV%20Energy%20ev.energy&amp;severity=medium&amp;id=69a0ebae32ffcdb8a293f322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26290-cwe-613-in-ev-energy-evenergy-314e9523</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26290%3A%20CWE-613%20in%20EV%20Energy%20ev.energy&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24445-cwe-307-in-ev-energy-evenergy-00628f02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24445%3A%20CWE-307%20in%20EV%20Energy%20ev.energy&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27772-cwe-306-in-ev-energy-evenergy-c0de6f7c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27772%3A%20CWE-306%20in%20EV%20Energy%20ev.energy&amp;severity=critical&amp;id=69a0e11f32ffcdb8a28c26e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27773-cwe-522-in-switch-ev-swtchenergycom-bfd87103</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27773%3A%20CWE-522%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=medium&amp;id=69a0e11f32ffcdb8a28c26ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25778-cwe-613-insufficient-session-expira-d088f686</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25778%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3272-buffer-overflow-in-tenda-f453-6c03efcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3272%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3271-buffer-overflow-in-tenda-f453-18d7b3b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3271%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-27-1b73d646</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-27&amp;severity=medium&amp;id=69a2326532ffcdb8a287db63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69437-na-b96d7eab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69437%3A%20n%2Fa&amp;severity=high&amp;id=69a1f6db32ffcdb8a26bc2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26862-na-a9be2f89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26862%3A%20n%2Fa&amp;severity=high&amp;id=69a1de4132ffcdb8a26144cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26861-na-9b5ca2ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26861%3A%20n%2Fa&amp;severity=high&amp;id=69a1d3b432ffcdb8a252c3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-27-571218db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-27&amp;severity=medium&amp;id=69a1c1e632ffcdb8a23f4ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-27-8182491f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-27&amp;severity=low&amp;id=69a131c132ffcdb8a2ee864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25113-cwe-307-improper-restriction-of-exc-c7aaebdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25113%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27767-cwe-306-missing-authentication-for--085d946c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27767%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=critical&amp;id=69a0e11f32ffcdb8a28c26e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22890-cwe-522-in-ev2go-ev2goio-f788729f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22890%3A%20CWE-522%20in%20EV2GO%20ev2go.io&amp;severity=medium&amp;id=69a0e11f32ffcdb8a28c2705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20895-cwe-613-in-ev2go-ev2goio-b11f74c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20895%3A%20CWE-613%20in%20EV2GO%20ev2go.io&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c2700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25945-cwe-307-improper-restriction-of-exc-27342830</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25945%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20EV2GO%20ev2go.io&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c270a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24731-cwe-306-in-ev2go-ev2goio-e42cb5b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24731%3A%20CWE-306%20in%20EV2GO%20ev2go.io&amp;severity=critical&amp;id=69a0dd9b32ffcdb8a288c769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1585-cwe-428-unquoted-search-path-or-elem-2e6b8a09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1585%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Canon%20Inc.%20IJ%20Scan%20Utility&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20733-cwe-522-insufficiently-protected-cr-046de446</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20733%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20CloudCharge%20cloudcharge.se&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27652-cwe-613-in-cloudcharge-cloudcharges-a9fdd39d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27652%3A%20CWE-613%20in%20CloudCharge%20cloudcharge.se&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40932-cwe-340-generation-of-predictable-n-34a891cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40932%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20GRICHTER%20Apache%3A%3ASessionX&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3270-server-side-request-forgery-in-psi-p-4de13069</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3270%3A%20Server-Side%20Request%20Forgery%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3269-denial-of-service-in-psi-probe-psi-p-a71eeb31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3269%3A%20Denial%20of%20Service%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2597-cwe-122-heap-based-buffer-overflow-i-3a4a94eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2597%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20LEONT%20Crypt%3A%3ASysRandom%3A%3AXS&amp;severity=high&amp;id=69a0da1732ffcdb8a272349d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25114-cwe-307-in-cloudcharge-cloudcharges-c78f10eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25114%3A%20CWE-307%20in%20CloudCharge%20cloudcharge.se&amp;severity=high&amp;id=69a0da1732ffcdb8a2723497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20781-cwe-306-missing-authentication-for--5f002d44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20781%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CloudCharge%20cloudcharge.se&amp;severity=critical&amp;id=69a0da1732ffcdb8a2723492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20791-cwe-522-insufficiently-protected-cr-a6313152</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20791%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Chargemap%20chargemap.com&amp;severity=medium&amp;id=69a0d69332ffcdb8a26c7035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25711-cwe-613-in-chargemap-chargemapcom-86410309</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25711%3A%20CWE-613%20in%20Chargemap%20chargemap.com&amp;severity=high&amp;id=69a0d69332ffcdb8a26c703f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20792-cwe-307-in-chargemap-chargemapcom-e8eb6a77</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20792%3A%20CWE-307%20in%20Chargemap%20chargemap.com&amp;severity=high&amp;id=69a0d69332ffcdb8a26c703a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25851-cwe-306-in-chargemap-chargemapcom-07488433</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25851%3A%20CWE-306%20in%20Chargemap%20chargemap.com&amp;severity=critical&amp;id=69a0d69332ffcdb8a26c7044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3268-improper-access-controls-in-psi-prob-37c8b51d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3268%3A%20Improper%20Access%20Controls%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28280-cwe-79-improper-neutralization-of-i-a42fca44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28280%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmpsec%20osctrl&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28279-cwe-78-improper-neutralization-of-s-292cda7c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28279%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jmpsec%20osctrl&amp;severity=high&amp;id=69a0d31032ffcdb8a2667dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28276-cwe-200-exposure-of-sensitive-infor-80ecf535</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28276%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28275-cwe-613-insufficient-session-expira-233ae79c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28275%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28274-cwe-79-improper-neutralization-of-i-f245f683</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28274%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28269-cwe-78-improper-neutralization-of-s-9e79a839</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28269%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28230-cwe-284-improper-access-control-in--646c9b77</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28230%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20steve-community%20steve&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28225-cwe-639-authorization-bypass-throug-5e6738cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28225%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20manyfold3d%20manyfold&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3265-improper-authorization-in-go2ismail--e27a9de6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3265%3A%20Improper%20Authorization%20in%20go2ismail%20Free-CRM&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28213-cwe-200-exposure-of-sensitive-infor-f157ccc0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28213%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20evershopcommerce%20evershop&amp;severity=critical&amp;id=69a0cf8b32ffcdb8a25ff5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28211-cwe-943-improper-neutralization-of--f8f2771b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28211%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20CyrilleB79%20NVDA-Dev-Test-Toolbox&amp;severity=high&amp;id=69a0cf8b32ffcdb8a25ff60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28207-cwe-78-improper-neutralization-of-s-41bc76f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28207%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20z-libs%20Zen-C&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27638-cwe-862-missing-authorization-in-ac-cb832dee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20actualbudget%20actual&amp;severity=medium&amp;id=69a0c89232ffcdb8a25244f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27839-cwe-639-authorization-bypass-throug-b27f012f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27839%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=medium&amp;id=69a0c89232ffcdb8a2524560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27838-cwe-639-authorization-bypass-throug-bca4d59d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27838%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=low&amp;id=69a0c89232ffcdb8a2524530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3264-execution-after-redirect-in-go2ismai-6072652e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3264%3A%20Execution%20After%20Redirect%20in%20go2ismail%20Free-CRM&amp;severity=medium&amp;id=69a0c89232ffcdb8a2524567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27835-cwe-639-authorization-bypass-throug-ba34a038</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27835%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=medium&amp;id=69a0c5b685912abc710cd5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27457-cwe-862-missing-authorization-in-we-94c4aebe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27457%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69a0c5b685912abc710cd5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27449-cwe-284-improper-access-control-in--fadf6848</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27449%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20umbraco%20Umbraco.Engage.Forms&amp;severity=high&amp;id=69a0c5b685912abc710cd5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3263-improper-authorization-in-go2ismail--ff0dc732</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3263%3A%20Improper%20Authorization%20in%20go2ismail%20Asp.Net-Core-Inventory-Order-Management-System&amp;severity=medium&amp;id=69a0beae85912abc7105bcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3262-execution-after-redirect-in-go2ismai-85012419</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3262%3A%20Execution%20After%20Redirect%20in%20go2ismail%20Asp.Net-Core-Inventory-Order-Management-System&amp;severity=medium&amp;id=69a0cebb32ffcdb8a25eeab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3261-sql-injection-in-itsourcecode-school-f3a6a27d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3261%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=69a0cebb32ffcdb8a25eeaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22207-cwe-306-missing-authentication-for--eb53d5ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22207%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Volcengine%20OpenViking&amp;severity=critical&amp;id=69a0cebb32ffcdb8a25eeabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1565-cwe-434-unrestricted-upload-of-file--1dad0f30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1565%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wedevs%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=high&amp;id=69a0a61285912abc71d87503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1241-cwe-288-authentication-bypass-using--e922bfa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1241%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Pelco%2C%20Inc.%20Sarix%20Professional%20IMP%203%20Series&amp;severity=high&amp;id=69a0a61285912abc71d87500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27510-cwe-345-insufficient-verification-o-de32c7cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27510%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20UnitreeRobotics%20Unitree%20Go2&amp;severity=medium&amp;id=69a0a43885912abc71d61abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27509-cwe-306-missing-authentication-for--3f85db2e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27509%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20UnitreeRobotics%20Unitree%20Go2&amp;severity=high&amp;id=69a0a43885912abc71d61ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27141-cwe-476-null-pointer-dereference-in-ff058581</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27141%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhttp2&amp;severity=high&amp;id=69a0a43885912abc71d61ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22722-cwe-476-null-pointer-dereference-in-830c2dae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22722%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a0a1b885912abc71d0a0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22715-vulnerability-in-vmware-workstation-760959ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22715%3A%20Vulnerability%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a0a1b885912abc71d0a0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-iphone-and-ipad-cleared-for-classified-nato--f1bb26b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20iPhone%20and%20iPad%20Cleared%20for%20Classified%20NATO%20Use&amp;severity=medium&amp;id=69a08c9eb7ef31ef0b9c5689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26938-cwe-1336-improper-neutralization-of-1437c993</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26938%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69a0a1ca85912abc71d0bb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26937-cwe-400-uncontrolled-resource-consu-7b66a2f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26937%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26227-cwe-307-improper-restriction-of-exc-57ef4910</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26227%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20VideoLAN%20VLC%20for%20Android&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23750-cwe-122-heap-based-buffer-overflow--7501864a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23750%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Golioth%20Pouch&amp;severity=high&amp;id=69a0a1ca85912abc71d0bb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23749-cwe-170-improper-null-termination-i-19f097f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23749%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20Golioth%20Firmware%20SDK&amp;severity=low&amp;id=69a0a1ca85912abc71d0bb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23748-cwe-191-integer-underflow-wrap-or-w-ee9ee329</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23748%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Golioth%20Firmware%20SDK&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23747-cwe-121-stack-based-buffer-overflow-cac35f20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23747%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Golioth%20Firmware%20SDK&amp;severity=medium&amp;id=69a0a1c885912abc71d0baa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-risks-boards-cannot-treat-as-background-noise-939afcf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Risks%20Boards%20Cannot%20Treat%20as%20Background%20Noise&amp;severity=medium&amp;id=69a0861fb7ef31ef0b964ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26936-cwe-1333-inefficient-regular-expres-bf9eee54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26936%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26935-cwe-20-improper-input-validation-in-2ab6f3da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26935%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26934-cwe-1284-improper-validation-of-spe-425cff70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26934%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26932-cwe-129-improper-validation-of-arra-b827d994</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26932%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt37-adds-new-capabilities-for-air-gapped-network-5692440f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT37%20Adds%20New%20Capabilities%20for%20Air-Gapped%20Networks&amp;severity=medium&amp;id=69a0ace185912abc71e473ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28295-server-side-request-forgery-ssrf-in-187eca66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28295%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26228-cwe-22-improper-limitation-of-a-pat-e609e7ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26228%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20VideoLAN%20VLC%20for%20Android&amp;severity=low&amp;id=69a0a1ca85912abc71d0bb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28296-improper-neutralization-of-crlf-seq-7df1d4b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28296%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a06645b7ef31ef0b73ce1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2244-cwe-200-exposure-of-sensitive-inform-77100ce1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2244%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Google%20Cloud%20Vertex%20AI%20Workbench&amp;severity=high&amp;id=69a05b9eb7ef31ef0b68a5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-code-flaws-exposed-developer-devices-to-sil-c98dfc93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Code%20Flaws%20Exposed%20Developer%20Devices%20to%20Silent%20Hacking&amp;severity=medium&amp;id=69a04d56b7ef31ef0b544dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-signal-in-the-noise-lessons-learned-runnin-c4433059</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20Signal%20in%20the%20Noise%3A%20Lessons%20Learned%20Running%20a%20Honeypot%20with%20AI%20Assistance%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Tue%2C%20Feb%2024th)&amp;severity=medium&amp;id=699faf21b7ef31ef0b7fed42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-clair-model-a-synthesized-conceptual-framework-298e7e4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20CLAIR%20Model%3A%20A%20Synthesized%20Conceptual%20Framework%20for%20Mapping%20Critical%20Infrastructure%20Interdependencies%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Feb%2025th)&amp;severity=critical&amp;id=699f6598b7ef31ef0b50ca3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zyxel-patches-critical-vulnerability-in-many-devic-523ddaa3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zyxel%20Patches%20Critical%20Vulnerability%20in%20Many%20Device%20Models&amp;severity=critical&amp;id=69a0383eb7ef31ef0b397aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14343-cwe-79-improper-neutralization-of-i-eef0abf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dokuzsoft%20Technology%20Ltd.%20E-Commerce%20Product&amp;severity=high&amp;id=69a03f7bb7ef31ef0b3f555c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1198-cwe-89-improper-neutralization-of-sp-3b46b959</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1198%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Simple%20SA%20Simple.ERP&amp;severity=high&amp;id=69a0316db7ef31ef0b2da192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disrupting-the-gridtide-global-cyber-espionage-cam-ef6113c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disrupting%20the%20GRIDTIDE%20Global%20Cyber%20Espionage%20Campaign&amp;severity=medium&amp;id=69a042c8b7ef31ef0b424ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-russian-exploit-broker-operation-zero-75531468</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Sanctions%20Russian%20Exploit%20Broker%20Operation%20Zero&amp;severity=medium&amp;id=69a02326b7ef31ef0b082dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64999-cwe-79-improper-neutralization-of-i-ecc6390b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64999%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69a02368b7ef31ef0b08990e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-patches-critical-apex-one-vulnerabilit-6afeacc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Patches%20Critical%20Apex%20One%20Vulnerabilities&amp;severity=critical&amp;id=69a01c1eb7ef31ef0bfb5f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-catalyst-sd-wan-zero-day-exploited-b-c55ec69f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Catalyst%20SD-WAN%20Zero-Day%20Exploited%20by%20Highly%20Sophisticated%20Hackers&amp;severity=high&amp;id=69a01191b7ef31ef0be29255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28138-deserialization-of-untrusted-data-i-23ed4314</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28138%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Stylemix%20uListing&amp;severity=high&amp;id=69a00ac0b7ef31ef0bdd3046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28136-improper-neutralization-of-special--ad5c4742</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28136%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VeronaLabs%20WP%20SMS&amp;severity=high&amp;id=69a00ac0b7ef31ef0bdd3043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28132-improper-neutralization-of-script-r-c4977c49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28132%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20villatheme%20WooCommerce%20Photo%20Reviews&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd3040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28131-insertion-of-sensitive-information--c8914030</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28131%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPVibes%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd303d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28083-improper-neutralization-of-input-du-dac8d5cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28083%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UX-themes%20Flatsome&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd303a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1698-cwe-644-improper-neutralization-of-h-04573e8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1698%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4069e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1697-cwe-614-sensitive-cookie-in-https-se-000f8650</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1697%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4069b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1696-cwe-79-improper-neutralization-of-in-5fb33f1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20arcinfo%20PcVue&amp;severity=low&amp;id=69a00034b7ef31ef0bd40698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1695-cwe-79-improper-neutralization-of-in-7eca6c71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd40695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1694-cwe-201-insertion-of-sensitive-infor-0503a7bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1694%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20into%20Sent%20Data%20in%20arcinfo%20PcVue&amp;severity=low&amp;id=69a00034b7ef31ef0bd40692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1693-cwe-1390-weak-authentication-in-arci-7231b5ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1693%3A%20CWE-1390%20Weak%20Authentication%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4068f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1692-cwe-1385-missing-origin-validation-i-4c16ce65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1692%3A%20CWE-1385%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4068c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25191-uncontrolled-search-path-element-in-34c03d5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25191%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Digital%20Arts%20Inc.%20FinalCode%20Ver.5%20series&amp;severity=high&amp;id=699fe090b7ef31ef0bbb51b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23703-incorrect-default-permissions-in-di-0baa4b8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23703%3A%20Incorrect%20default%20permissions%20in%20Digital%20Arts%20Inc.%20FinalCode%20Ver.5%20series&amp;severity=high&amp;id=699fe090b7ef31ef0bbb51b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1311-cwe-22-improper-limitation-of-a-path-245cd234</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1311%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bearsthemes%20Worry%20Proof%20Backup&amp;severity=high&amp;id=699fd280b7ef31ef0bb488bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27465-cwe-201-insertion-of-sensitive-info-d63e9e3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27465%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25963-cwe-863-incorrect-authorization-in--2d2f916a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25963%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23999-cwe-330-use-of-insufficiently-rando-2363c4fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23999%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a06645b7ef31ef0b73ce20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24004-cwe-862-missing-authorization-in-fl-988a60f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24004%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1779-cwe-288-authentication-bypass-using--c715b4b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1779%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=high&amp;id=69a05b9eb7ef31ef0b68a5fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2356-cwe-284-improper-access-control-in-w-3646e401</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2356%3A%20CWE-284%20Improper%20Access%20Control%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69a062b5b7ef31ef0b701612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27974-cwe-79-improper-neutralization-of-i-489e365f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf-app&amp;severity=medium&amp;id=69a062b5b7ef31ef0b70160e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27963-cwe-79-improper-neutralization-of-i-13a3dc2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27963%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf&amp;severity=medium&amp;id=69a062b5b7ef31ef0b70160a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27973-cwe-79-improper-neutralization-of-i-d42c2cca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27973%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf&amp;severity=medium&amp;id=699fabd8b7ef31ef0b7dea2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27966-cwe-94-improper-control-of-generati-8ac7c0b0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27966%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=699fabd8b7ef31ef0b7dea23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27969-cwe-22-improper-limitation-of-a-pat-4b60f36b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27969%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitessio%20vitess&amp;severity=critical&amp;id=699fabd8b7ef31ef0b7dea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27965-cwe-78-improper-neutralization-of-s-92b79488</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27965%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20vitessio%20vitess&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27959-cwe-20-improper-input-validation-in-ce484d7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27959%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20koajs%20koa&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27961-cwe-1336-improper-neutralization-of-89dbc720</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27961%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Agenta-AI%20agenta&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27952-cwe-94-improper-control-of-generati-de9bd46d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27952%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Agenta-AI%20agenta-api&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27948-cwe-79-improper-neutralization-of-i-af27e043</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27948%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=699fabd8b7ef31ef0b7dea0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2499-cwe-79-improper-neutralization-of-in-c0dc3012</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tgrk%20Custom%20Logo&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2029-cwe-79-improper-neutralization-of-in-066236f2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2029%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Beaver%20Builder&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2489-cwe-79-improper-neutralization-of-in-8979fb6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20readymadeweb%20TP2WP%20Importer&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2498-cwe-79-improper-neutralization-of-in-c6873f44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bulktheme%20WP%20Social%20Meta&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1557-cwe-22-improper-limitation-of-a-path-8855fcee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1557%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20stuartbates%20WP%20Responsive%20Images&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2506-cwe-79-improper-neutralization-of-in-742fe189</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motahar1%20EM%20Cost%20Calculator&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27942-cwe-120-buffer-copy-without-checkin-fb63e4d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27942%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=low&amp;id=699fabd8b7ef31ef0b7dea09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27904-cwe-1333-inefficient-regular-expres-decea18d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27904%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=699fa148b7ef31ef0b7796b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27903-cwe-407-inefficient-algorithmic-com-f3f31176</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27903%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=699fa148b7ef31ef0b7796b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27902-cwe-79-improper-neutralization-of-i-31462c5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27902%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27901-cwe-79-improper-neutralization-of-i-27a56aa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27901%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27887-cwe-770-allocation-of-resources-wit-73cfbd0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27887%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20spinframework%20spin&amp;severity=medium&amp;id=699fa148b7ef31ef0b77969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27900-cwe-532-insertion-of-sensitive-info-4a37c898</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27900%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20linode%20terraform-provider-linode&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22728-cwe-284-in-bitnami-sealed-secrets-5b4a5a73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22728%3A%20CWE-284%20in%20Bitnami%20sealed-secrets&amp;severity=medium&amp;id=699fa148b7ef31ef0b77969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27899-cwe-269-improper-privilege-manageme-f3381704</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27899%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20h44z%20wg-portal&amp;severity=high&amp;id=699fa148b7ef31ef0b7796a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27896-cwe-178-improper-handling-of-case-s-047c4414</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27896%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=699f9a40b7ef31ef0b726109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27830-cwe-502-deserialization-of-untruste-8c764401</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27830%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20swaldman%20c3p0&amp;severity=high&amp;id=699f9a40b7ef31ef0b7260eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27888-cwe-400-uncontrolled-resource-consu-fcc40868</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27888%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=699f9a40b7ef31ef0b726103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27884-cwe-22-improper-limitation-of-a-pat-6a3213c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27884%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Pennyw0rth%20NetExec&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27829-cwe-918-server-side-request-forgery-8b06cfbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27829%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27837-cwe-1321-improperly-controlled-modi-ec3116e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27837%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20mickhansen%20dottie.js&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27831-cwe-125-out-of-bounds-read-in-blued-851df2f0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27831%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bluedragonsecurity%20rldns&amp;severity=high&amp;id=699f9a40b7ef31ef0b7260f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26186-cwe-89-improper-neutralization-of-s-d124966d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26186%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27818-cwe-20-improper-input-validation-in-ff48f4c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27818%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20TerriaJS%20terriajs-server&amp;severity=high&amp;id=699f8fb4b7ef31ef0b6dc8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27812-cwe-116-improper-encoding-or-escapi-0ec87a03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27812%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Wei-Shaw%20sub2api&amp;severity=high&amp;id=699f8fb4b7ef31ef0b6dc8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-26-f35e5c14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-26&amp;severity=medium&amp;id=69a0e0e532ffcdb8a28b810e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50857-na-cde40b1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50857%3A%20n%2Fa&amp;severity=critical&amp;id=69a0a1cf85912abc71d0bf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56605-na-c59c1be3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56605%3A%20n%2Fa&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26682-na-caa850a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26682%3A%20n%2Fa&amp;severity=high&amp;id=69a0826ab7ef31ef0b92a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71057-na-f9840d49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71057%3A%20n%2Fa&amp;severity=high&amp;id=69a06645b7ef31ef0b73ce17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-26-57a0eba7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-26&amp;severity=medium&amp;id=69a01513b7ef31ef0be66b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-26-0c6bbf64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-26&amp;severity=low&amp;id=69a01513b7ef31ef0be66b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27808-cwe-918-server-side-request-forgery-0907ab33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27808%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27804-cwe-327-use-of-a-broken-or-risky-cr-9a87af7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27804%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=699f8fb4b7ef31ef0b6dc8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27735-cwe-22-improper-limitation-of-a-pat-cbe310bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27735%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27711-cwe-125-out-of-bounds-read-in-m2tea-1a6755bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27711%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27710-cwe-191-integer-underflow-wrap-or-w-6d6f93e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27710%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27709-cwe-125-out-of-bounds-read-in-m2tea-36da9c67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27709%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27976-cwe-61-unix-symbolic-link-symlink-f-275886dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27976%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f8c2fb7ef31ef0b6c21d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27967-cwe-59-improper-link-resolution-bef-66fdc1ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27967%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f8c2fb7ef31ef0b6c21ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27800-cwe-22-improper-limitation-of-a-pat-e91aae3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27800%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f88afb7ef31ef0b6add23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27933-cwe-613-insufficient-session-expira-39a8e3c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27933%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20manyfold3d%20manyfold&amp;severity=medium&amp;id=699f8527b7ef31ef0b6936d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27635-cwe-78-improper-neutralization-of-s-ea449436</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27635%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20manyfold3d%20manyfold&amp;severity=high&amp;id=699f8527b7ef31ef0b6936d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27633-cwe-400-uncontrolled-resource-consu-d8ccb557</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27633%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20maximmasiutin%20TinyWeb&amp;severity=high&amp;id=699f8527b7ef31ef0b6936cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27630-cwe-400-uncontrolled-resource-consu-a65a120f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27630%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20maximmasiutin%20TinyWeb&amp;severity=high&amp;id=699f8527b7ef31ef0b6936c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3209-improper-access-controls-in-fosrl-pa-9b724eee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3209%3A%20Improper%20Access%20Controls%20in%20fosrl%20Pangolin&amp;severity=medium&amp;id=699f81a4b7ef31ef0b675cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27613-cwe-78-improper-neutralization-of-s-552b887a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27613%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=699f81a4b7ef31ef0b675cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27498-cwe-94-improper-control-of-generati-673d3ea0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27498%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7e1fb7ef31ef0b65d59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27578-cwe-80-improper-neutralization-of-s-45b6ec8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27578%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=699f7e1fb7ef31ef0b65d5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27577-cwe-94-improper-control-of-generati-fe1b37b0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27577%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7a9cb7ef31ef0b62e4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27497-cwe-94-improper-control-of-generati-7583bd72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27497%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7a9cb7ef31ef0b62e4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27495-cwe-94-improper-control-of-generati-32b06175</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27495%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7718b7ef31ef0b6119ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27494-cwe-497-exposure-of-sensitive-syste-451de5e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27494%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20n8n-io%20n8n&amp;severity=high&amp;id=699f7718b7ef31ef0b6119e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27493-cwe-94-improper-control-of-generati-920a070d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27493%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7718b7ef31ef0b6119dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27148-cwe-74-improper-neutralization-of-s-5a9d6dc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27148%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20storybookjs%20storybook&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27819-cwe-22-improper-limitation-of-a-pat-a38aca2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27819%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27616-cwe-79-improper-neutralization-of-i-6e63a630</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27616%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27575-cwe-521-weak-password-requirements--02691e1b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27575%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20go-vikunja%20vikunja&amp;severity=critical&amp;id=699f7012b7ef31ef0b5b7bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27116-cwe-79-improper-neutralization-of-i-8c728693</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27116%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=699f7012b7ef31ef0b5b7bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26985-cwe-22-improper-limitation-of-a-pat-134e54a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26985%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2694-cwe-285-improper-authorization-in-st-aacdc266</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2694%3A%20CWE-285%20Improper%20Authorization%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=699f7012b7ef31ef0b5b7bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26984-cwe-22-improper-limitation-of-a-pat-189f270a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26984%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=699f6d86b7ef31ef0b587d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3172-integer-underflow-or-wraparound-in-p-4fc97e5b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3172%3A%20Integer%20Underflow%20or%20Wraparound%20in%20pgvector&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0542-cwe-653-improper-isolation-or-compar-5d8d7dac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0542%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=critical&amp;id=699f6203b7ef31ef0b506075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3200-sql-injection-in-z-9527-admin-11a7aee8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3200%3A%20SQL%20Injection%20in%20z-9527%20admin&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-agent-tesla-a-deep-dive-into-a-multi-sta-ba77bd32</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20Agent%20Tesla%3A%20A%20Deep%20Dive%20into%20a%20Multi-Stage%20Campaign&amp;severity=medium&amp;id=699f5e46b7ef31ef0b4e8a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22721-cwe-269-improper-privilege-manageme-49e5e7d1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22721%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22720-cwe-79-improper-neutralization-of-i-fdb8baf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22719-vulnerability-in-vmware-aria-operat-d1a0f7ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22719%3A%20Vulnerability%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=high&amp;id=699f6b2db7ef31ef0b54f05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2636-cwe-159-improper-handling-of-invalid-c9000dfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2636%3A%20CWE-159%20%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20Microsoft%20Windows%20OS&amp;severity=medium&amp;id=699f6b2db7ef31ef0b54f063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3221-cwe-312-cleartext-storage-of-sensiti-b543f909</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3221%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Devolutions%20Server&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27795-cwe-918-server-side-request-forgery-f4816062</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27795%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchainjs&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3194-missing-authentication-in-chia-block-e4dfa1da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3194%3A%20Missing%20Authentication%20in%20Chia%20Blockchain&amp;severity=low&amp;id=699f6c30b7ef31ef0b560f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21902-cwe-732-incorrect-permission-assign-a3c54a93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21902%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=critical&amp;id=699f6b6fb7ef31ef0b5556ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27850-cwe-940-improper-verification-of-so-51bb8bbe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27850%3A%20cwe-940%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Linksys%20MR9600&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27794-cwe-502-deserialization-of-untruste-3cd0df7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27794%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph-checkpoint&amp;severity=medium&amp;id=699f6d86b7ef31ef0b587d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27739-cwe-918-server-side-request-forgery-9cfbc4e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27739%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20angular%20angular-cli&amp;severity=critical&amp;id=699f6e6fb7ef31ef0b5a094a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27738-cwe-601-url-redirection-to-untruste-c2409b1d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27738%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20angular%20angular-cli&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3193-cross-site-request-forgery-in-chia-b-660586ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3193%3A%20Cross-Site%20Request%20Forgery%20in%20Chia%20Blockchain&amp;severity=low&amp;id=699f6e70b7ef31ef0b5a0a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20033-buffer-access-with-incorrect-length-01834230</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20033%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20NX-OS%20System%20Software%20in%20ACI%20Mode&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20048-uncontrolled-memory-allocation-in-c-9630ca06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20048%3A%20Uncontrolled%20Memory%20Allocation%20in%20Cisco%20Cisco%20NX-OS%20System%20Software%20in%20ACI%20Mode&amp;severity=high&amp;id=699f6b6eb7ef31ef0b55563a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20099-improper-neutralization-of-special--2103b41c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20099%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Extensible%20Operating%20System%20(FXOS)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b55569b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20091-improper-neutralization-of-input-du-03ee8a0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Firepower%20Extensible%20Operating%20System%20(FXOS)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b555698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20037-execution-with-unnecessary-privileg-92e47074</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20037%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=699f6b6eb7ef31ef0b555637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27849-cwe-78-improper-neutralization-of-s-ae598b62</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27849%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f6e70b7ef31ef0b5a0a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20010-buffer-access-with-incorrect-length-e06a1787</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20010%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-blast-radius-problem-stolen-credentials-are-we-1d748531</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Blast%20Radius%20Problem%3A%20Stolen%20Credentials%20are%20Weaponizing%20Agentic%20AI&amp;severity=medium&amp;id=699f2282b7ef31ef0b357ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20036-improper-neutralization-of-special--5fab8f84</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20036%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20107-insufficient-granularity-of-access--f4ddc726</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20107%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Cisco%20Cisco%20Application%20Policy%20Infrastructure%20Controller%20(APIC)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b55569e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20051-use-of-uninitialized-variable-in-ci-5f25aa8d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20051%3A%20Use%20of%20Uninitialized%20Variable%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=699f6b6eb7ef31ef0b55563d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20122-incorrect-use-of-privileged-apis-in-90ab3c7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20122%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20127-improper-authentication-in-cisco-ci-2ddcf584</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20127%3A%20Improper%20Authentication%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=critical&amp;id=699f6dd9b7ef31ef0b58f88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20128-storing-passwords-in-a-recoverable--b14fe640</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20128%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20129-improper-authentication-in-cisco-ci-ca713753</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20129%3A%20Improper%20Authentication%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=critical&amp;id=699f6b6fb7ef31ef0b5556a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20126-incorrect-use-of-privileged-apis-in-0b35fe35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20126%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20133-exposure-of-sensitive-information-t-5512c3fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20133%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b5556aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3192-improper-authentication-in-chia-bloc-1561c236</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3192%3A%20Improper%20Authentication%20in%20Chia%20Blockchain&amp;severity=medium&amp;id=699f5e7eb7ef31ef0b4e9b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3189-server-side-request-forgery-in-feiyu-14bb2646</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3189%3A%20Server-Side%20Request%20Forgery%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=low&amp;id=699f5e7eb7ef31ef0b4e9b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disrupts-chinese-cyberespionage-campaign-ta-1b7a1764</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Disrupts%20Chinese%20Cyberespionage%20Campaign%20Targeting%20Telecoms%2C%20Governments&amp;severity=medium&amp;id=699f1efeb7ef31ef0b33341e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27727-cwe-74-improper-neutralization-of-s-8287b1ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27727%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20swaldman%20mchange-commons-java&amp;severity=high&amp;id=699f5e7eb7ef31ef0b4e9b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27706-cwe-918-server-side-request-forgery-f42319c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27706%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=699f5b59b7ef31ef0b4d0f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27705-cwe-639-authorization-bypass-throug-ded9079b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27705%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20makeplane%20plane&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22866-cwe-347-improper-verification-of-cr-1cf14df0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22866%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ensdomains%20ens-contracts&amp;severity=low&amp;id=699f6203b7ef31ef0b506078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27730-cwe-918-server-side-request-forgery-b582d8e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27730%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=699f6203b7ef31ef0b50607d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50180-cwe-918-server-side-request-forgery-1e770482</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50180%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=699f6e70b7ef31ef0b5a0a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3188-path-traversal-in-feiyuchuixue-sz-bo-801a6dfd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3188%3A%20Path%20Traversal%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-patches-four-critical-serv-u-vulnerabil-ecdae751</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Patches%20Four%20Critical%20Serv-U%20Vulnerabilities&amp;severity=critical&amp;id=699f17f7b7ef31ef0b2ea26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1242-cwe-798-use-of-hard-coded-credential-3c49accf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1242%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Gardyn%20Home%20Kit&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27704-cwe-22-improper-limitation-of-a-pat-7ee8fa72</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27704%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dart-lang%20sdk&amp;severity=medium&amp;id=699f183fb7ef31ef0b2eb1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27848-cwe-78-improper-neutralization-of-s-d78302ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27848%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/variations-of-the-clickfix-kaspersky-official-blog-8cce2ef7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Variations%20of%20the%20ClickFix%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=699f14e0b7ef31ef0b2d24ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3206-cwe-404-improper-resource-shutdown-o-0fa6e2e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3206%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20KrakenD%20KrakenD-CE&amp;severity=low&amp;id=699f183fb7ef31ef0b2eb1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27847-cwe-89-improper-neutralization-of-s-a7b0346f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27847%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27701-cwe-94-improper-control-of-generati-c2099fec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27701%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20live-codes%20livecodes&amp;severity=high&amp;id=699f183fb7ef31ef0b2eb1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27846-cwe-306-missing-authentication-for--6692e99e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27846%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Linksys%20MR9600&amp;severity=medium&amp;id=699f183fb7ef31ef0b2eb1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27700-cwe-345-insufficient-verification-o-a50ef423</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27700%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20honojs%20hono&amp;severity=high&amp;id=699f183fb7ef31ef0b2eb1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27699-cwe-22-improper-limitation-of-a-pat-a776ea60</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27699%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickjuchli%20basic-ftp&amp;severity=critical&amp;id=699f1123b7ef31ef0b2a7c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27695-cwe-770-allocation-of-resources-wit-bff82a68</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27695%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20zeroae%20zae-limiter&amp;severity=medium&amp;id=699f1123b7ef31ef0b2a7c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2878-cwe-331-insufficient-entropy-in-prog-d8a9f60b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2878%3A%20CWE-331%20Insufficient%20Entropy%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=medium&amp;id=699f1123b7ef31ef0b2a7c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27692-cwe-125-out-of-bounds-read-in-inter-7b596b3c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27692%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=699f1123b7ef31ef0b2a7c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27691-cwe-190-integer-overflow-or-wraparo-efb0b7d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27691%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3203-cwe-126-buffer-over-read-in-wireshar-77866e88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3203%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3202-cwe-476-null-pointer-dereference-in--91e773e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3202%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3201-cwe-1325-improperly-controlled-seque-eee636bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3201%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3187-unrestricted-upload-in-feiyuchuixue--6e14b61f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3187%3A%20Unrestricted%20Upload%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/caught-in-the-hook-rce-and-api-token-exfiltration--467253d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Caught%20in%20the%20Hook%3A%20RCE%20and%20API%20Token%20Exfiltration%20Through%20Claude%20Code%20Project%20Files%20%7C%20CVE-2025-59536%20%7C%20CVE-2026-21852&amp;severity=critical&amp;id=699f0345b7ef31ef0b20b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medical-device-maker-ufp-technologies-hit-by-cyber-b573b4f1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medical%20Device%20Maker%20UFP%20Technologies%20Hit%20by%20Cyberattack&amp;severity=medium&amp;id=699eff5ab7ef31ef0b1d212e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3186-use-of-default-password-in-feiyuchui-c666b76c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3186%3A%20Use%20of%20Default%20Password%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699effa2b7ef31ef0b1d5ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3185-authorization-bypass-in-feiyuchuixue-2638462c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3185%3A%20Authorization%20Bypass%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699effa2b7ef31ef0b1d5e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-us-defense-contractor-executive-jailed-for-sell-1eace578</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-US%20Defense%20Contractor%20Executive%20Jailed%20for%20Selling%20Exploits%20to%20Russia&amp;severity=medium&amp;id=699ef4ceb7ef31ef0b09b97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28196-cwe-459-in-jetbrains-teamcity-d58b6a40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28196%3A%20CWE-459%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=699ef887b7ef31ef0b0c395d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28195-cwe-862-in-jetbrains-teamcity-83b0a743</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28195%3A%20CWE-862%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=699ef887b7ef31ef0b0c395a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28194-cwe-601-in-jetbrains-teamcity-eefbaf9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28194%3A%20CWE-601%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=699ef887b7ef31ef0b0c3957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28193-cwe-862-in-jetbrains-youtrack-02c83ca9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28193%3A%20CWE-862%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=699ef887b7ef31ef0b0c3954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2624-cwe-306-missing-authentication-for-c-f523ffcf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2624%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ePati%20Cyber%20%E2%80%8B%E2%80%8BSecurity%20Technologies%20Inc.%20Antikor%20Next%20Generation%20Firewall%20(NGFW)&amp;severity=critical&amp;id=699ef17fb7ef31ef0b08499b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-12-million-users-impacted-by-cargurus-data-br-be873cf0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2012%20Million%20Users%20Impacted%20by%20CarGurus%20Data%20Breach&amp;severity=medium&amp;id=699eedc5b7ef31ef0b06ebdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0704-file-modificationdeletion-path-trave-a67d541f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0704%3A%20File%20Modification%2FDeletion%20Path%20Traversal%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=medium&amp;id=699eee0bb7ef31ef0b07114d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-latest-plugx-variant-executed-by-staticplugin-5267edd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Latest%20PlugX%20Variant%20Executed%20by%20STATICPLUGIN&amp;severity=medium&amp;id=699ee338b7ef31ef0b0201e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wynn-resorts-confirms-data-breach-after-hackers-re-66a2b7ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wynn%20Resorts%20Confirms%20Data%20Breach%20After%20Hackers%20Remove%20It%20From%20Leak%20Site&amp;severity=high&amp;id=699edfb6b7ef31ef0b00cd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mercenary-akula-hits-ukraine-supporting-financial-3cdfd2cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mercenary%20Akula%20Hits%20Ukraine-Supporting%20Financial...&amp;severity=medium&amp;id=699ee338b7ef31ef0b0201d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3118-improper-neutralization-of-special-e-de20a68b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3118%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Developer%20Hub&amp;severity=medium&amp;id=699edffab7ef31ef0b00d523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25701-cwe-377-insecure-temporary-file-in--ca7227b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25701%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20openSUSE%20sdbootutil&amp;severity=high&amp;id=699edc67b7ef31ef0bffee91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26104-missing-authorization-in-red-hat-re-e49792af</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26104%3A%20Missing%20Authorization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=699ed8e3b7ef31ef0bfe5906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62878-cwe-23-relative-path-traversal-in-s-e8aa8cda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62878%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20SUSE%20Rancher&amp;severity=critical&amp;id=699ed8e3b7ef31ef0bfe58fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67601-cwe-295-improper-certificate-valida-cd78fd99</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67601%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SUSE%20rancher&amp;severity=high&amp;id=699ed8e3b7ef31ef0bfe5902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67860-cwe-522-insufficiently-protected-cr-b1edb39d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67860%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SUSE%20harvester&amp;severity=low&amp;id=699ed1dfb7ef31ef0bfbbf25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26103-missing-authorization-in-red-hat-re-f6e8c238</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26103%3A%20Missing%20Authorization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=699ed1dfb7ef31ef0bfbbf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reddit-hit-with-20-million-uk-data-privacy-fine-ov-a3954f96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reddit%20Hit%20With%20%2420%20Million%20UK%20Data%20Privacy%20Fine%20Over%20Child%20Safety%20Failings&amp;severity=medium&amp;id=699eca9db7ef31ef0bf8a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claudes-new-ai-vulnerability-scanner-sends-cyberse-3472c897</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%E2%80%99s%20New%20AI%20Vulnerability%20Scanner%20Sends%20Cybersecurity%20Shares%20Plunging&amp;severity=medium&amp;id=699ec71ab7ef31ef0bf720a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2367-cwe-79-improper-neutralization-of-in-8070a879</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2301-cwe-862-missing-authorization-in-met-411cd241</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2301%3A%20CWE-862%20Missing%20Authorization%20in%20metaphorcreations%20Post%20Duplicator&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2410-cwe-352-cross-site-request-forgery-c-d12db616</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeisle%20Disable%20Admin%20Notices%20%E2%80%93%20Hide%20Dashboard%20Notifications&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14742-cwe-639-authorization-bypass-throug-cb27f6e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14742%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3171-cross-site-scripting-in-sourcecodest-da1bd858</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3171%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=699eb93fb7ef31ef0bf05d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1929-cwe-94-improper-control-of-generatio-d104e328</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1929%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mihail-barinov%20Advanced%20Woo%20Labels%20%E2%80%93%20Product%20Labels%20%26%20Badges%20for%20WooCommerce&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2416-cwe-89-improper-neutralization-of-sp-2ddd610e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2416%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1916-cwe-862-missing-authorization-in-jav-8b4073b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1916%3A%20CWE-862%20Missing%20Authorization%20in%20javmah%20WPGSI%3A%20Spreadsheet%20Integration&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2479-cwe-918-server-side-request-forgery--d3147280</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2479%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dfactory%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=699eb5bab7ef31ef0bee126e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ad-tech-company-optimizely-targeted-in-cyberattack-701553b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ad%20Tech%20Company%20Optimizely%20Targeted%20in%20Cyberattack&amp;severity=medium&amp;id=699eb201b7ef31ef0beb30e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3170-cross-site-scripting-in-sourcecodest-7369a4ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3170%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=699eaeb3b7ef31ef0be98664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3169-buffer-overflow-in-tenda-f453-69816231</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3169%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699eab2eb7ef31ef0be89303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3168-buffer-overflow-in-tenda-f453-508dab5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3168%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699ea0a3b7ef31ef0be4a302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3167-buffer-overflow-in-tenda-f453-afffcc0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3167%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699ea0a3b7ef31ef0be4a2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1614-cwe-79-improper-neutralization-of-in-97325495</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eaglethemes%20Rise%20Blocks%20%E2%80%93%20A%20Complete%20Gutenberg%20Page%20Builder&amp;severity=medium&amp;id=699ea0a3b7ef31ef0be4a2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3166-buffer-overflow-in-tenda-f453-624b36c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3166%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699e999bb7ef31ef0be2319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3165-buffer-overflow-in-tenda-f453-c9971778</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3165%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699f6d86b7ef31ef0b587d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3164-sql-injection-in-itsourcecode-news-p-dfd28c6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3164%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699f6d86b7ef31ef0b587d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25785-improper-limitation-of-a-pathname-t-f44e9ddb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25785%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20MOTEX%20Inc.%20Lanscope%20Endpoint%20Manager%20(On-Premises)%20Sub-Manager%20Server&amp;severity=critical&amp;id=699f6d86b7ef31ef0b587d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3179-cwe-22-improper-limitation-of-a-path-180a5bd6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3179%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ASUSTOR%20ADM&amp;severity=critical&amp;id=699e999bb7ef31ef0be231a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3100-cwe-295-improper-certificate-validat-103fbf82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3100%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=699e999bb7ef31ef0be231a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3163-server-side-request-forgery-in-sourc-a598193f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3163%3A%20Server-Side%20Request%20Forgery%20in%20SourceCodester%20Website%20Link%20Extractor&amp;severity=medium&amp;id=699e8f0fb7ef31ef0bdc6155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3153-sql-injection-in-itsourcecode-docume-715dc6d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3153%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699e8f0fb7ef31ef0bdc614e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3152-sql-injection-in-itsourcecode-colleg-aad2116a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3152%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e8808b7ef31ef0bd9ce55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3151-sql-injection-in-itsourcecode-colleg-2aed5ab2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3151%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e8808b7ef31ef0bd9ce4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3150-sql-injection-in-itsourcecode-colleg-d243c4d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3150%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6daa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0976-cwe-532-insertion-of-sensitive-infor-fc9d9bab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0976%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20API%20Configuration%20Manager&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27696-cwe-918-server-side-request-forgery-86f48884</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27696%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=699e80ffb7ef31ef0bd6da90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27645-cwe-79-improper-neutralization-of-i-cd313692</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27645%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3149-sql-injection-in-itsourcecode-colleg-99c7b07a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3149%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3148-sql-injection-in-sourcecodester-simp-ec2a2164</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3148%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20and%20Nice%20Shopping%20Cart%20Script&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27597-cwe-94-improper-control-of-generati-c298fcde</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27597%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20agentfront%20enclave&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27641-cwe-1336-improper-neutralization-of-693604e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27641%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20jugmac00%20flask-reuploaded&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27640-cwe-212-improper-removal-of-sensiti-42d4b470</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27640%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20oocx%20tfplan2md&amp;severity=high&amp;id=699e7673b7ef31ef0bd379bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27627-cwe-79-improper-neutralization-of-i-373ae35f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27627%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karakeep-app%20karakeep&amp;severity=high&amp;id=699e7673b7ef31ef0bd379a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27639-cwe-79-improper-neutralization-of-i-5d8db224</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27639%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dbarzin%20mercator&amp;severity=high&amp;id=699e7673b7ef31ef0bd379b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27636-cwe-434-unrestricted-upload-of-file-b2fdd401</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27636%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=699e7673b7ef31ef0bd379ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27637-cwe-330-use-of-insufficiently-rando-8f97b2e6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27637%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3147-heap-based-buffer-overflow-in-libvip-1354e241</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3147%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=699e7674b7ef31ef0bd379e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27743-cwe-89-improper-neutralization-of-s-0723b396</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SPIP%20referer_spam&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27744-cwe-94-improper-control-of-generati-6654b571</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27744%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20tickets&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27745-cwe-94-improper-control-of-generati-57f4fcf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27745%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20interface_traduction_objets&amp;severity=high&amp;id=699e7673b7ef31ef0bd379cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27746-cwe-79-improper-neutralization-of-i-90ae5a56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SPIP%20jeux&amp;severity=medium&amp;id=699e7674b7ef31ef0bd379de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27747-cwe-89-improper-neutralization-of-s-2659fae3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27747%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SPIP%20interface_traduction_objets&amp;severity=high&amp;id=699e7674b7ef31ef0bd379e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3146-null-pointer-dereference-in-libvips-513efbb0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3146%3A%20NULL%20Pointer%20Dereference%20in%20libvips&amp;severity=medium&amp;id=699e6866b7ef31ef0bae9df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5781-cwe-532-insertion-of-sensitive-infor-aae3b878</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5781%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20API%20Configuration%20Manager&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27628-cwe-835-loop-with-unreachable-exit--62eb22d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27628%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=low&amp;id=699e6864b7ef31ef0bae9d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27612-cwe-79-improper-neutralization-of-i-96b43164</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27612%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20denpiligrim%20repostat&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27621-cwe-79-improper-neutralization-of-i-b8844ad0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27621%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TypiCMS%20Core&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27615-cwe-40-path-traversal-uncsharename--b9cde004</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27615%3A%20CWE-40%3A%20Path%20Traversal%3A%20&apos;UNCsharename&apos;%20(Windows%20UNC%20Share)%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27611-cwe-200-exposure-of-sensitive-infor-a3c67993</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27611%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27595-cwe-306-missing-authentication-for--2da76779</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27595%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20parse-community%20parse-dashboard&amp;severity=critical&amp;id=699e6864b7ef31ef0bae9d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27610-cwe-1289-improper-validation-of-uns-48254a1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27610%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20parse-community%20parse-dashboard&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27609-cwe-352-cross-site-request-forgery--dfc8a5e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27609%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20parse-community%20parse-dashboard&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27608-cwe-862-missing-authorization-in-pa-52557f8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27608%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-dashboard&amp;severity=critical&amp;id=699e6864b7ef31ef0bae9d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3145-memory-corruption-in-libvips-2bae8caa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3145%3A%20Memory%20Corruption%20in%20libvips&amp;severity=medium&amp;id=699e6866b7ef31ef0bae9de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2914-insecure-permissions-in-cyberark-sof-877fa41a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2914%3A%20Insecure%20Permissions%20in%20CyberArk%20Software%2C%20a%20Palo%20Alto%20Networks%20Company%20Endpoint%20Privilege%20Manager%20Agent&amp;severity=high&amp;id=699e5a58b7ef31ef0b9afd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3137-stack-based-buffer-overflow-in-codea-4a89e8a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3137%3A%20Stack-based%20Buffer%20Overflow%20in%20CodeAstro%20Food%20Ordering%20System&amp;severity=medium&amp;id=699e48bfb7ef31ef0b85c3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27598-cwe-22-improper-limitation-of-a-pat-337a2a17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27598%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=high&amp;id=699e48bfb7ef31ef0b85c3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3135-sql-injection-in-itsourcecode-news-p-0a7c6d73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3135%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699e48bfb7ef31ef0b85c3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-25-e6cbb2ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-25&amp;severity=medium&amp;id=699f8f7ab7ef31ef0b6d58b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69771-na-113581c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69771%3A%20n%2Fa&amp;severity=critical&amp;id=699f6e70b7ef31ef0b5a0a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26717-na-808c7875</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26717%3A%20n%2Fa&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-25-9eec935b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-25&amp;severity=medium&amp;id=699ef84fb7ef31ef0b0b64a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-25-b8278a68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-25&amp;severity=low&amp;id=699e682bb7ef31ef0bae3509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3134-sql-injection-in-itsourcecode-news-p-8a5e3d8d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3134%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699e3aafb7ef31ef0b769651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3133-sql-injection-in-itsourcecode-docume-93ea08f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3133%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699e3aafb7ef31ef0b76964a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27117-cwe-22-improper-limitation-of-a-pat-c5a5b2bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27117%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rikyoz%20bit7z&amp;severity=medium&amp;id=699e1e91b7ef31ef0b4dd8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27593-cwe-640-weak-password-recovery-mech-d0c0ac0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27593%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20statamic%20cms&amp;severity=critical&amp;id=699e1e91b7ef31ef0b4dd8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27572-cwe-770-allocation-of-resources-wit-1e2e3060</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27572%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e1b0db7ef31ef0b464b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/developer-targeting-campaign-using-malicious-nextj-0d448287</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Developer-targeting%20campaign%20using%20malicious%20Next.js%20repositories&amp;severity=medium&amp;id=699e1e59b7ef31ef0b4da0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27204-cwe-400-uncontrolled-resource-consu-e113940a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27204%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e1b0db7ef31ef0b464b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27195-cwe-755-improper-handling-of-except-2af78dcd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27195%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e178ab7ef31ef0b4219f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25899-cwe-789-memory-allocation-with-exce-25b0b15f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25899%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20gofiber%20fiber&amp;severity=high&amp;id=699e178ab7ef31ef0b4219f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25891-cwe-22-improper-limitation-of-a-pat-54f51692</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25891%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gofiber%20fiber&amp;severity=high&amp;id=699e178ab7ef31ef0b4219ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25882-cwe-129-improper-validation-of-arra-fc87a38b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25882%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20gofiber%20fiber&amp;severity=medium&amp;id=699e140db7ef31ef0b397342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22553-cwe-78-in-insat-masterscada-buk-ts-da2080e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22553%3A%20CWE-78%20in%20InSAT%20MasterSCADA%20BUK-TS&amp;severity=critical&amp;id=699e140db7ef31ef0b39733e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21410-cwe-89-in-insat-masterscada-buk-ts-10cd43d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21410%3A%20CWE-89%20in%20InSAT%20MasterSCADA%20BUK-TS&amp;severity=critical&amp;id=699e140db7ef31ef0b39733a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-zoom-meeting-update-silently-installs-surveil-2fbb42c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Zoom%20meeting%20&apos;update&apos;%20silently%20installs%20surveillance%20software&amp;severity=medium&amp;id=699e0e19be58cf853b27f354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46320-a-cross-site-scripting-xss-vulnerab-84cf6eee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46320%3A%20A%20cross-site%20scripting%20(XSS)%20vulnerability%20in%20a%20FileMaker%20WebDirect%20custom%20homepage%20could%20lead%20to%20unauthorized%20access%20and%20remote%20code%20execution.%20in%20Claris%20FileMaker%20Server&amp;severity=medium&amp;id=699e0e51be58cf853b283374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24443-cwe-620-unverified-password-change--b7991ec8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24443%3A%20CWE-620%20Unverified%20Password%20Change%20in%20NETIKUS.NET%20ltd%20EventSentry&amp;severity=high&amp;id=699e0acebe58cf853b264b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23859-cwe-602-client-side-enforcement-of--f49cfd91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23859%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=low&amp;id=699e0f3bbe58cf853b2906c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23858-cwe-79-improper-neutralization-of-i-0c121421</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23858%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22766-cwe-434-unrestricted-upload-of-file-cb813835</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22766%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=699e0f3bbe58cf853b2906c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22765-cwe-862-missing-authorization-in-de-bdb3a520</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22765%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=699e0f3bbe58cf853b2906c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3131-cwe-200-exposure-of-sensitive-inform-b9371043</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3131%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=medium&amp;id=699df940be58cf853b1d7ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1768-cwe-863-incorrect-authorization-in-d-757628e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1768%3A%20CWE-863%20Incorrect%20Authorization%20in%20Devolutions%20Devolutions%20Server&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1789-incorrect-default-permissions-in-gen-4aea821b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1789%3A%20Incorrect%20Default%20Permissions%20in%20Genetec%20Inc.%20Genetec%20Update%20Service&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1787-cwe-346-origin-validation-error-in-g-a3f949ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1787%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Genetec%20Inc.%20Genetec%20Update%20Service&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24241-cwe-287-improper-authentication-in--f6ee97c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24241%3A%20CWE-287%20Improper%20Authentication%20in%20NVIDIA%20DLS%20component%20of%20NVIDIA%20License%20System&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33181-cwe-77-improper-neutralization-of-s-a9d11bfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33181%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33180-cwe-77-improper-neutralization-of-s-84bb56a2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33180%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33179-cwe-266-incorrect-privilege-assignm-36a7a0f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33179%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26342-cwe-613-insufficient-session-expira-5e45b75e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26342%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=high&amp;id=699df93ebe58cf853b1d7e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26341-cwe-1392-use-of-default-credentials-b1797eea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26341%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=critical&amp;id=699df93ebe58cf853b1d7e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26340-cwe-306-missing-authentication-for--b67ea307</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26340%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=high&amp;id=699df93ebe58cf853b1d7e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-redirects-a-forgotten-vulnerabilityx3f-tue-fe-264b2774</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20Redirects%3A%20A%20Forgotten%20Vulnerability%26%23x3f%3B%2C%20(Tue%2C%20Feb%2024th)&amp;severity=medium&amp;id=699de770be58cf853b0d95d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26222-cwe-502-deserialization-of-untruste-e414adc9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26222%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Beyond%20Limits%20Inc.%20Altec%20DocLink&amp;severity=critical&amp;id=699e0f3bbe58cf853b2906cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25603-cwe-22-improper-limitation-of-a-pat-a874863b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25603%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Linksys%20MR9600&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14963-cwe-20-improper-input-validation-in-f0e2d925</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14963%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Trellix%20Endpoint%20HX%20Agent%20(xAgent)&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27156-cwe-79-improper-neutralization-of-i-4af1ee20</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27156%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/moonrise-rat-a-new-low-detection-threat-with-high--f024cb0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Moonrise%20RAT%3A%20A%20New%20Low-Detection%20Threat%20with%20High-Cost%20Consequences&amp;severity=medium&amp;id=699e0e19be58cf853b27f359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27590-cwe-20-improper-input-validation-in-7b21592c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27590%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3cbe58cf853b290cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27589-cwe-352-cross-site-request-forgery--489061df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27589%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27588-cwe-178-improper-handling-of-case-s-9da8a007</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27588%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3bbe58cf853b2906de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27587-cwe-178-improper-handling-of-case-s-d8aff9af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27587%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3bbe58cf853b2906da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27586-cwe-755-improper-handling-of-except-26e6760a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27586%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3cbe58cf853b290cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27585-cwe-20-improper-input-validation-in-aa8fd750</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27585%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27571-cwe-409-improper-handling-of-highly-87bdeb7f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27571%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=699e0f3cbe58cf853b290ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13776-cwe-798-use-of-hard-coded-credentia-9501fe87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13776%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20TIK-SOFT%20Finka-FK&amp;severity=high&amp;id=699e0f3cbe58cf853b290ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47904-cwe-494-download-of-code-without-in-e960b4d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47904%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Microchip%20Time%20Provider%204100&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-malware-disappears-shortly-after-d-1a307deb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Arkanix%20Stealer%E2%80%99%20Malware%20Disappears%20Shortly%20After%20Debut&amp;severity=medium&amp;id=699dc448be58cf853bf0ea31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27521-cwe-307-improper-restriction-of-exc-c078447a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27521%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27520-cwe-312-cleartext-storage-of-sensit-09493c83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27520%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3fbe58cf853b290d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27519-cwe-321-use-of-hard-coded-cryptogra-94d78496</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27519%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27518-cwe-352-cross-site-request-forgery--ddf83b1f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27518%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27517-cwe-79-improper-neutralization-of-i-baeb6519</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27517%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27516-cwe-201-insertion-of-sensitive-info-c7219ab3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27516%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27515-cwe-330-use-of-insufficiently-rando-99761ece</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27515%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27507-cwe-798-use-of-hard-coded-credentia-55a024a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27507%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23678-cwe-78-improper-neutralization-of-s-d736646c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23678%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27584-cwe-306-missing-authentication-for--1cea9ea4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27584%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20actualbudget%20actual&amp;severity=critical&amp;id=699e0f3fbe58cf853b290da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0402-cwe-125-out-of-bounds-read-in-sonicw-650941e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0402%3A%20CWE-125%20Out-of-bounds%20Read%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27732-cwe-918-server-side-request-forgery-664ae78b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27732%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=699e0f3fbe58cf853b290da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0401-cwe-476-null-pointer-dereference-in--37b8ba10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0401%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0400-cwe-134-use-of-externally-controlled-8c81d50f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0400%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27568-cwe-79-improper-neutralization-of-i-3872684f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0399-cwe-121-stack-based-buffer-overflow--a0c7be97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0399%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3102-os-command-injection-in-exiftool-3a183022</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3102%3A%20OS%20Command%20Injection%20in%20exiftool&amp;severity=medium&amp;id=699db9f0be58cf853be5ecac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3101-os-command-injection-in-intelbras-ti-e14b0379</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3101%3A%20OS%20Command%20Injection%20in%20Intelbras%20TIP%20635G&amp;severity=medium&amp;id=699db9f0be58cf853be5eca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-aria-operations-vulnerability-could-allow-r-1fe31f0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20Aria%20Operations%20Vulnerability%20Could%20Allow%20Remote%20Code%20Execution&amp;severity=critical&amp;id=699db638be58cf853be39fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27567-cwe-918-server-side-request-forgery-6aff0dba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27567%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=699db9f0be58cf853be5eca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10010-cwe-353-missing-support-for-integri-1ee3965a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10010%3A%20CWE-353%20Missing%20Support%20for%20Integrity%20Check%20in%20CPSD%20IT%20SERVICES%20GMBH%20CryptoPro%20Secure%20Disk%20for%20BitLocker&amp;severity=medium&amp;id=699e0f3fbe58cf853b290da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27208-cwe-78-improper-neutralization-of-s-983562b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20bleon-ethical%20api-gateway-deploy&amp;severity=critical&amp;id=699e0f3fbe58cf853b290dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sandwormmode-supply-chain-attack-hits-npm-0a6fbb0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98Sandworm_Mode%E2%80%99%20Supply%20Chain%20Attack%20Hits%20NPM&amp;severity=medium&amp;id=699dabadbe58cf853bd9ca32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2807-vulnerability-in-mozilla-firefox-7b7fdcd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2807%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2806-vulnerability-in-mozilla-firefox-4330b422</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2806%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2805-vulnerability-in-mozilla-firefox-ad33e68e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2805%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2804-vulnerability-in-mozilla-firefox-12858c36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2804%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf72be58cf853bdde2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2803-vulnerability-in-mozilla-firefox-34cfc56c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2803%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf72be58cf853bdde2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2802-vulnerability-in-mozilla-firefox-c2727259</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2802%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf71be58cf853bdde278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2801-vulnerability-in-mozilla-firefox-c6bc2714</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2801%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2800-vulnerability-in-mozilla-firefox-f1e052df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2800%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2799-vulnerability-in-mozilla-firefox-e1242b75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2799%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2798-vulnerability-in-mozilla-firefox-fc6b6733</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2798%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2797-vulnerability-in-mozilla-firefox-21b1b9fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2797%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2796-vulnerability-in-mozilla-firefox-e6fcc340</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2796%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2795-vulnerability-in-mozilla-firefox-2510859e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2795%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2794-vulnerability-in-mozilla-firefox-dec444fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2794%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf71be58cf853bdde258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2634-vulnerability-in-mozilla-firefox-for-558bf208</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2634%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2793-vulnerability-in-mozilla-firefox-9218e885</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2793%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2792-vulnerability-in-mozilla-firefox-88665c56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2792%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2791-vulnerability-in-mozilla-firefox-129224c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2791%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2790-vulnerability-in-mozilla-firefox-a2cce219</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2790%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2789-vulnerability-in-mozilla-firefox-cd6165cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2789%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2788-vulnerability-in-mozilla-firefox-51148c31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2788%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde21e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2787-vulnerability-in-mozilla-firefox-99349e0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2787%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2786-vulnerability-in-mozilla-firefox-fb95e8e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2786%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2785-vulnerability-in-mozilla-firefox-6fc98356</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2785%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2784-vulnerability-in-mozilla-firefox-b8ed28c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2784%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2783-vulnerability-in-mozilla-firefox-9e492a9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2783%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf70be58cf853bdde204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2782-vulnerability-in-mozilla-firefox-961efa1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2782%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2781-vulnerability-in-mozilla-firefox-e3d3b895</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2781%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2780-vulnerability-in-mozilla-firefox-67fb735b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2780%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2779-vulnerability-in-mozilla-firefox-637601e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2779%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2778-vulnerability-in-mozilla-firefox-a2efee7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2778%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2777-vulnerability-in-mozilla-firefox-23a61c9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2777%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2776-vulnerability-in-mozilla-firefox-aecaf008</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2776%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2775-vulnerability-in-mozilla-firefox-705fae87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2775%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2774-vulnerability-in-mozilla-firefox-7a87e224</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2774%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2773-vulnerability-in-mozilla-firefox-168ce6bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2773%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2772-vulnerability-in-mozilla-firefox-2427429c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2772%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2771-vulnerability-in-mozilla-firefox-b1c396b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2771%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2770-vulnerability-in-mozilla-firefox-cdc3b286</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2770%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2769-vulnerability-in-mozilla-firefox-d07a057c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2769%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2768-vulnerability-in-mozilla-firefox-22e282bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2768%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2767-vulnerability-in-mozilla-firefox-8ddcd7e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2767%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2766-vulnerability-in-mozilla-firefox-cf3992e1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2766%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2765-vulnerability-in-mozilla-firefox-21f8ff58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2765%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2764-vulnerability-in-mozilla-firefox-f42df24a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2764%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2763-vulnerability-in-mozilla-firefox-f8a7d148</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2763%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2762-vulnerability-in-mozilla-firefox-9f81a8d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2762%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2761-vulnerability-in-mozilla-firefox-31b382de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2761%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2760-vulnerability-in-mozilla-firefox-ed19354d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2760%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2759-vulnerability-in-mozilla-firefox-44d5c550</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2759%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2758-vulnerability-in-mozilla-firefox-254a6777</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2758%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2757-vulnerability-in-mozilla-firefox-5913ed24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2757%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2460-cwe-267-privilege-defined-with-unsaf-5f6cf7ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2460%3A%20CWE-267%20Privilege%20Defined%20with%20Unsafe%20Actions%20in%20Hitachi%20Energy%20Relion%20REB500&amp;severity=high&amp;id=699daf6bbe58cf853bdddd65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2459-cwe-267-privilege-defined-with-unsaf-7562341c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2459%3A%20CWE-267%20Privilege%20Defined%20with%20Unsafe%20Actions%20in%20Hitachi%20Energy%20Relion%20REB500&amp;severity=high&amp;id=699daf6bbe58cf853bdddd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14577-cwe-306-missing-authentication-for--6857041d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14577%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Slican%20NCP&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1773-cwe-20-improper-input-validation-in--220535b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1773%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Hitachi%20Energy%20RTU500%20series%20CMU%20firmware&amp;severity=high&amp;id=699da85ebe58cf853bd63632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1772-cwe-287-improper-authentication-in-h-849f1103</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1772%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Hitachi%20Energy%20RTU500%20series%20CMU%20firmware&amp;severity=medium&amp;id=699da85ebe58cf853bd6362f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23969-cwe-89-improper-neutralization-of-s-52e98444</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=699da85ebe58cf853bd63635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23980-cwe-89-improper-neutralization-of-s-641d36bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23980%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=699da85ebe58cf853bd63638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23982-cwe-863-incorrect-authorization-in--16335c07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23982%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=699da85ebe58cf853bd6363b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23983-cwe-200-exposure-of-sensitive-infor-28a635f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23983%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=low&amp;id=699da85ebe58cf853bd6363e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23984-cwe-863-incorrect-authorization-in--27e36bda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23984%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=699da85ebe58cf853bd63641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-lazarus-group-now-working-with-medusa-e96d15e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Lazarus%20Group%20Now%20Working%20With%20Medusa%20Ransomware&amp;severity=medium&amp;id=699e0e19be58cf853b27f362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-issues-abused-in-copilot-attack-leading-to--1f686409</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Issues%20Abused%20in%20Copilot%20Attack%20Leading%20to%20Repository%20Takeover&amp;severity=medium&amp;id=699d9a19be58cf853bcbde28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taiwan-security-firm-confirms-flaw-flagged-by-cisa-09d184a7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taiwan%20Security%20Firm%20Confirms%20Flaw%20Flagged%20by%20CISA%20Likely%20Exploited%20by%20Chinese%20APTs&amp;severity=medium&amp;id=699d9310be58cf853bc6f17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27555-cwe-201-insertion-of-sensitive-info-4a1ea050</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27555%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=699d7ab4be58cf853bad4712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2664-cwe-125-out-of-bounds-read-in-docker-0cedbcfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2664%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Docker%20Docker%20Desktop&amp;severity=medium&amp;id=699d7ab4be58cf853bad4716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56373-cwe-94-improper-control-of-generati-6e419591</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56373%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=699d7ab4be58cf853bad470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anonymous-fnix-members-arrested-in-spain-e869e34a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anonymous%20F%C3%A9nix%20Members%20Arrested%20in%20Spain&amp;severity=medium&amp;id=699d7a75be58cf853bace567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1524-cwe-290-authentication-bypass-by-spo-45d10e8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1524%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=699d6c99be58cf853b9c9dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-malicious-nuget-packages-target-aspnet-develo-3558d828</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Malicious%20NuGet%20Packages%20Target%20ASP.NET%20Developers%20With%20JIT%20Hooking%20and%20Credential%20Exfiltration&amp;severity=medium&amp;id=699d68e0be58cf853b9798dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1229-cwe-682-incorrect-calculation-in-clo-52f8a557</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1229%3A%20CWE-682%20Incorrect%20Calculation%20in%20Cloudflare%20CIRCL&amp;severity=low&amp;id=699e0f3fbe58cf853b290d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40541-cwe-704-incorrect-type-conversion-o-153e8f0e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40541%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699e0f3fbe58cf853b290d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40540-cwe-704-incorrect-type-conversion-o-393839b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40540%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40539-cwe-704-incorrect-type-conversion-o-7631618c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40539%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40538-cwe-269-improper-privilege-manageme-e66e0c99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40538%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15386-cwe-79-cross-site-scripting-xss-in--43bb529b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15386%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=high&amp;id=699d4271be58cf853b689cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15589-path-traversal-in-muyucms-df4dace0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15589%3A%20Path%20Traversal%20in%20MuYuCMS&amp;severity=medium&amp;id=699d4271be58cf853b689cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24314-cwe-497-exposure-of-sensitive-syste-37035500</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24314%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SAP_SE%20S%2F4HANA%20(Manage%20Payment%20Media)&amp;severity=medium&amp;id=699d3b61be58cf853b5fc3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3070-cross-site-scripting-in-sourcecodest-3e0ce52e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3070%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Modern%20Image%20Gallery%20App&amp;severity=medium&amp;id=699d347abe58cf853b589ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3069-sql-injection-in-itsourcecode-docume-630afbd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3069%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699d29efbe58cf853b4f36be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3068-sql-injection-in-itsourcecode-docume-9b86d381</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3068%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699d1f63be58cf853b2dec7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3067-path-traversal-in-hummerrisk-3ded3089</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3067%3A%20Path%20Traversal%20in%20HummerRisk&amp;severity=medium&amp;id=699d1f63be58cf853b2dec75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3066-command-injection-in-hummerrisk-8f2007d1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3066%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d1f63be58cf853b2dec6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1459-cwe-78-improper-neutralization-of-sp-f412c512</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1459%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=high&amp;id=699d14d6be58cf853b182c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27129-cwe-918-server-side-request-forgery-bfb112ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27129%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d8be58cf853b182c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27128-cwe-367-time-of-check-time-of-use-t-c9b0d5dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27128%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d6be58cf853b182c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27127-cwe-367-time-of-check-time-of-use-t-5842a733</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27127%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20craftcms%20cms&amp;severity=high&amp;id=699d14d6be58cf853b182c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13943-cwe-78-improper-neutralization-of-s-420a90c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13943%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20EX3301-T0%20firmware&amp;severity=high&amp;id=699d14d6be58cf853b182c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13942-cwe-78-improper-neutralization-of-s-dbc807d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13942%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20EX3510-B0%20firmware&amp;severity=critical&amp;id=699d14d6be58cf853b182c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3065-command-injection-in-hummerrisk-ca310b2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3065%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d14d8be58cf853b182c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3064-command-injection-in-hummerrisk-b16e562e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3064%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d14d8be58cf853b182c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3091-uncontrolled-search-path-element-in--0806b6af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3091%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Synology%20Synology%20Presto%20Client&amp;severity=medium&amp;id=699d14d8be58cf853b182c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27126-cwe-79-improper-neutralization-of-i-eb6f17da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27126%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d6be58cf853b182c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26981-cwe-195-signed-to-unsigned-conversi-204c3c44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26981%3A%20CWE-195%3A%20Signed%20to%20Unsigned%20Conversion%20Error%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=699d14d6be58cf853b182c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11848-cwe-476-null-pointer-dereference-in-105c946a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11848%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d14d6be58cf853b182c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11847-cwe-476-null-pointer-dereference-in-ff3f069c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11847%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d14d6be58cf853b182c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26198-cwe-89-improper-neutralization-of-s-7460e41f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26198%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20collerek%20ormar&amp;severity=critical&amp;id=699d14d6be58cf853b182c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3057-sql-injection-in-a54552239-pearproje-adecca21</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3057%3A%20SQL%20Injection%20in%20a54552239%20pearProjectApi&amp;severity=medium&amp;id=699d14d8be58cf853b182c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3054-cross-site-scripting-in-alinto-sogo-403be324</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3054%3A%20Cross%20Site%20Scripting%20in%20Alinto%20SOGo&amp;severity=medium&amp;id=699d14d8be58cf853b182c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11846-cwe-476-null-pointer-dereference-in-3381f5d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11846%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d06cabe58cf853b07ca60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3053-missing-authentication-in-datalinkdc-e60a8a1f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3053%3A%20Missing%20Authentication%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699d06cabe58cf853b07ca6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3052-server-side-request-forgery-in-datal-340d6c23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3052%3A%20Server-Side%20Request%20Forgery%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699d06cabe58cf853b07ca63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11845-cwe-476-null-pointer-dereference-in-bbab33dc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11845%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d06cabe58cf853b07ca5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3051-path-traversal-in-datalinkdc-dinky-173f35b8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3051%3A%20Path%20Traversal%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3050-cross-site-scripting-in-horilla-open-fd660903</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3050%3A%20Cross%20Site%20Scripting%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27729-cwe-770-allocation-of-resources-wit-e5a15975</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27729%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20withastro%20astro&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25802-cwe-79-improper-neutralization-of-i-48d25c61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25802%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=699cfc3cbe58cf853bfd2f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25591-cwe-943-improper-neutralization-of--2ce4358a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25591%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=699cfc3cbe58cf853bfd2f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25545-cwe-918-server-side-request-forgery-da1603da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25545%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=699cf533be58cf853bf604dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3049-open-redirect-in-horilla-opensource--27a936b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3049%3A%20Open%20Redirect%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=699cf534be58cf853bf60511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3046-sql-injection-in-itsourcecode-e-logb-a4efe6dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3046%3A%20SQL%20Injection%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=699cf533be58cf853bf604f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21864-cwe-20-improper-input-validation-in-7c8ea75e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21864%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20valkey-io%20valkey-bloom&amp;severity=medium&amp;id=699cf533be58cf853bf604d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27643-cwe-209-generation-of-error-message-2622d2b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27643%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=medium&amp;id=699cf533be58cf853bf604ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27642-cwe-20-improper-input-validation-in-be522119</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27642%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cf533be58cf853bf604e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26025-cwe-476-null-pointer-dereference-in-3b4027a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26025%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26024-cwe-476-null-pointer-dereference-in-e26d8b24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26024%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25501-cwe-476-null-pointer-dereference-in-1f72e97a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25501%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9120-cwe-94-improper-control-of-generatio-9ed3eff4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9120%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenText%E2%84%A2%20Carbonite%20Safe%20Server%20Backup&amp;severity=high&amp;id=699cf533be58cf853bf604d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69253-cwe-209-generation-of-error-message-d29135ec</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69253%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=medium&amp;id=699cf533be58cf853bf604cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-24-e8f8d164</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-24&amp;severity=medium&amp;id=699e3dfab7ef31ef0b77ae66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67445-na-faa393bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67445%3A%20n%2Fa&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69985-na-4f2ec836</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69985%3A%20n%2Fa&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63409-na-7f1dcd5e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63409%3A%20n%2Fa&amp;severity=high&amp;id=699e0f3ebe58cf853b290d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-24-3a80d607</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-24&amp;severity=medium&amp;id=699dd95dbe58cf853b0239a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-24-21d76c33</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-24&amp;severity=low&amp;id=699d4cbebe58cf853b76a245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69252-cwe-476-null-pointer-dereference-in-80fd7d12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69252%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cee30be58cf853bef4e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58041-cwe-338-use-of-cryptographically-we-a78c8e9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58041%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20WONKO%20Smolder&amp;severity=critical&amp;id=699cee30be58cf853bef4e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69251-cwe-20-improper-input-validation-in-196cf2df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69251%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cee30be58cf853bef4e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69250-cwe-754-improper-check-for-unusual--3c39503e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69250%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20free5gc%20udm&amp;severity=medium&amp;id=699ceab4be58cf853bdfbf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3044-stack-based-buffer-overflow-in-tenda-c3428cc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3044%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=699ce723be58cf853bdd38db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3043-cross-site-scripting-in-itsourcecode-9b765d7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3043%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699ce39fbe58cf853bdb3eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3042-sql-injection-in-itsourcecode-event--cdf5b04f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3042%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699ce39fbe58cf853bdb3eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-openclaw-skills-used-to-distribute-atomi-1ab81aed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20OpenClaw%20Skills%20Used%20to%20Distribute%20Atomic%20MacOS%20Stealer&amp;severity=medium&amp;id=699d68e0be58cf853b9798e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21665-vulnerability-in-fiserv-originate-l-7a298a26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21665%3A%20Vulnerability%20in%20Fiserv%20Originate%20Loans%20Peripherals%20(formerly%20Velocity%20Services)%20--%20Print%20Service%20component&amp;severity=high&amp;id=699cd8f4be58cf853bd429b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3063-inappropriate-implementation-in-goog-4f7bfd85</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3063%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3062-out-of-bounds-read-and-write-in-goog-9826ac8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3062%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3061-out-of-bounds-read-in-google-chrome-0054353c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3061%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3041-cross-site-scripting-in-xingfuggz-ba-5f6e055c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3041%3A%20Cross%20Site%20Scripting%20in%20xingfuggz%20BaykeShop&amp;severity=medium&amp;id=699cd1ebbe58cf853bd0c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3040-os-command-injection-in-draytek-vigo-57c5d6ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3040%3A%20OS%20Command%20Injection%20in%20DrayTek%20Vigor%20300B&amp;severity=medium&amp;id=699cd1ebbe58cf853bd0c5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69248-cwe-129-improper-validation-of-arra-5330a8bd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69248%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20free5gc%20amf&amp;severity=medium&amp;id=699ccae3be58cf853bccd9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69247-cwe-122-heap-based-buffer-overflow--08fe6e18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69247%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20free5gc%20go-upf&amp;severity=low&amp;id=699ccae3be58cf853bccd9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3028-cross-site-scripting-in-erzhongxmu-j-8e46de0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3028%3A%20Cross%20Site%20Scripting%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699ccae3be58cf853bccda00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69232-cwe-20-improper-input-validation-in-8b0905ae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69232%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20go-upf&amp;severity=low&amp;id=699ccae3be58cf853bccd9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69208-cwe-209-generation-of-error-message-4967da13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69208%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=low&amp;id=699cc75ebe58cf853bcb5ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3027-cross-site-scripting-in-erzhongxmu-j-0bf04477</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3027%3A%20Cross%20Site%20Scripting%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699cc3dbbe58cf853bc8ee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3075-exposure-of-sensitive-system-informa-6b46d1ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3075%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Jeff%20Starr%20Simple%20Ajax%20Chat&amp;severity=medium&amp;id=699cc3dbbe58cf853bc8ee29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23693-cwe-306-missing-authentication-for--873ad830</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23693%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=critical&amp;id=699cee30be58cf853bef4e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23694-cwe-352-cross-site-request-forgery--43b258cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23694%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aruba.it%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=699cee30be58cf853bef4e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3026-server-side-request-forgery-in-erzho-9622fd01</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3026%3A%20Server-Side%20Request%20Forgery%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3025-unrestricted-upload-in-shuoren-smart-03a84ad2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3025%3A%20Unrestricted%20Upload%20in%20ShuoRen%20Smart%20Heating%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27623-cwe-20-improper-input-validation-in-08357453</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27623%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21863-cwe-125-out-of-bounds-read-in-valke-7a33c1e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21863%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67733-cwe-74-improper-neutralization-of-s-dcc8bdf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67733%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2698-cwe-639-authorization-bypass-through-2795e5b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2698%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tenable%20Security%20Center&amp;severity=medium&amp;id=699c852abe58cf853ba9853b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27514-cwe-201-insertion-of-sensitive-info-a2b48227</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27514%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=high&amp;id=699c852abe58cf853ba98537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27513-cwe-352-cross-site-request-forgery--75243c1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27513%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba98533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27512-cwe-79-improper-neutralization-of-i-a19304cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba9852f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27511-cwe-1021-improper-restriction-of-re-64ef0ade</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27511%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba9852b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22567-cwe-20-improper-input-validation-in-63d0c936</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22567%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zscaler%20ZIA%20Admin%20UI&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22568-cwe-20-improper-input-validation-in-14777d68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22568%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zscaler%20ZIA%20Admin%20UI&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14905-heap-based-buffer-overflow-in-red-h-35910148</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14905%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Directory%20Server%2011.5%20E4S%20for%20RHEL%208&amp;severity=high&amp;id=699c7b9bbe58cf853ba52827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-healthcare-diagnostic-firm-says-140000-affected-8cf2ff6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Healthcare%20Diagnostic%20Firm%20Says%20140%2C000%20Affected%20by%20Data%20Breach&amp;severity=medium&amp;id=699c7451be58cf853ba092b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2025-the-untold-stories-of-check-point-research-ca2e7873</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2025%3A%20The%20Untold%20Stories%20of%20Check%20Point%20Research&amp;severity=high&amp;id=699c74cbbe58cf853ba0e606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2697-cwe-639-authorization-bypass-through-2cdeceab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2697%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tenable%20Security%20Center&amp;severity=medium&amp;id=699cbd8ebe58cf853bc4b505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3016-buffer-overflow-in-utt-hiper-810g-d2bb40c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3016%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c7b9bbe58cf853ba52830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-huorong-security-site-infects-users-with-vall-431a5b9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Huorong%20security%20site%20infects%20users%20with%20ValleyRAT&amp;severity=medium&amp;id=699cdc61be58cf853bd5eac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3015-buffer-overflow-in-utt-hiper-810g-03f10e33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3015%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-day-another-malicious-jpeg-mon-feb-23rd-e56dc9d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20day%2C%20another%20malicious%20JPEG%2C%20(Mon%2C%20Feb%2023rd)&amp;severity=medium&amp;id=699c5811be58cf853b908718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21420-cwe-427-uncontrolled-search-path-el-d39a8b17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21420%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20Repository%20Manager&amp;severity=high&amp;id=699c625dbe58cf853b95454c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-gets-5-years-in-us-prison-for-aiding-nor-3773a458</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Gets%205%20Years%20in%20US%20Prison%20for%20Aiding%20North%20Korean%20IT%20Fraud&amp;severity=low&amp;id=699c5babbe58cf853b9201f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autonomous-ai-agents-provide-new-class-of-supply-c-5fa92ec8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autonomous%20AI%20Agents%20Provide%20New%20Class%20of%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=699c48adbe58cf853b83ceca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romanian-hacker-pleads-guilty-to-selling-access-to-a925b71f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Romanian%20Hacker%20Pleads%20Guilty%20to%20Selling%20Access%20to%20US%20State%20Network&amp;severity=medium&amp;id=699c41d8be58cf853b80437c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-fortigate-firewalls-hacked-in-ai-power-9152681d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20FortiGate%20Firewalls%20Hacked%20in%20AI-Powered%20Attacks%3A%20AWS&amp;severity=medium&amp;id=699c3f2ebe58cf853b7ecfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59873-vulnerability-in-hcl-software-zie-f-4e64c827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59873%3A%20Vulnerability%20in%20HCL%20Software%20ZIE%20for%20Web&amp;severity=medium&amp;id=699c33c0be58cf853b7818c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-roundcube-webmail-vulnerability-exploited-i-f1f3083a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20RoundCube%20Webmail%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=medium&amp;id=699c3380be58cf853b77f148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2985-server-side-request-forgery-in-tiand-d99c179a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2985%3A%20Server-Side%20Request%20Forgery%20in%20Tiandy%20Video%20Surveillance%20System%20%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=699c3035be58cf853b75f0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mississippi-hospital-system-closes-all-clinics-aft-12980cb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mississippi%20Hospital%20System%20Closes%20All%20Clinics%20After%20Ransomware%20Attack&amp;severity=medium&amp;id=699c2c78be58cf853b742b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40701-cwe-79-improper-neutralization-of-i-a0c042b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SOTE%20SOTESHOP&amp;severity=medium&amp;id=699c3035be58cf853b75f0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-olalampo-inside-muddywaters-latest-campa-56d8b12a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Olalampo%3A%20Inside%20MuddyWater&apos;s%20Latest%20Campaign&amp;severity=medium&amp;id=699c28f3be58cf853b724307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandwormmode-shai-hulud-style-npm-worm-hijacks-ci--970e0fb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SANDWORM_MODE%3A%20Shai-Hulud-Style%20npm%20Worm%20Hijacks%20CI%20Workflows%20and%20Poisons%20AI%20Toolchains&amp;severity=medium&amp;id=699c28f3be58cf853b72434e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2984-denial-of-service-in-sourcecodester--85191ae6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2984%3A%20Denial%20of%20Service%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699c2930be58cf853b7275d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chronology-of-muddywater-apt-attacks-targeting-the-33954b79</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chronology%20of%20MuddyWater%20APT%20Attacks%20Targeting%20the%20Middle%20East&amp;severity=medium&amp;id=699c256fbe58cf853b6f4a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2983-improper-access-controls-in-sourceco-8f46df55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2983%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699c25a9be58cf853b6f8c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41002-cwe-89-improper-neutralization-of-s-7d1e6964</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41002%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MANANTIAL%20DE%20IDEAS%20Infoticketing&amp;severity=critical&amp;id=699c25a9be58cf853b6f8c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/paypal-data-breach-led-to-fraudulent-transactions-0fd4c8b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PayPal%20Data%20Breach%20Led%20to%20Fraudulent%20Transactions&amp;severity=medium&amp;id=699c1ae4be58cf853b65d710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2981-buffer-overflow-in-utt-hiper-810g-ebbad869</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2981%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c1b36be58cf853b6616ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/23rd-february-threat-intelligence-report-fb0a35b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=23rd%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=699cec45be58cf853be40e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25747-cwe-502-deserialization-of-untruste-ad77e0d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25747%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20LevelDB&amp;severity=high&amp;id=699c1b36be58cf853b6616a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23552-cwe-346-origin-validation-error-in--099c72c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23552%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=699c1b36be58cf853b6616a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2980-buffer-overflow-in-utt-hiper-810g-30621ae4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2980%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c1416be58cf853b60d4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2979-unrestricted-upload-in-fastapiadmin-06d9cf68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2979%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c1094be58cf853b5f1afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2978-unrestricted-upload-in-fastapiadmin-ddf67fcc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2978%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c0601be58cf853b557229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2977-unrestricted-upload-in-fastapiadmin-d14e9069</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2977%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c027dbe58cf853b5217e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1367-cwe-89-improper-neutralization-of-sp-dbb8032b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1367%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20ADSelfService%20Plus&amp;severity=high&amp;id=699c027dbe58cf853b5217e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2976-information-disclosure-in-fastapiadm-86338872</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2976%3A%20Information%20Disclosure%20in%20FastApiAdmin&amp;severity=medium&amp;id=699bfb74be58cf853b4ca3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2975-information-disclosure-in-fastapiadm-e687242b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2975%3A%20Information%20Disclosure%20in%20FastApiAdmin&amp;severity=medium&amp;id=699bf46dbe58cf853b4576f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2974-exposure-of-backup-file-to-an-unauth-cd87fe58</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2974%3A%20Exposure%20of%20Backup%20File%20to%20an%20Unauthorized%20Control%20Sphere%20in%20AliasVault%20App&amp;severity=low&amp;id=699bed72be58cf853b3d54c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2972-cross-site-scripting-in-a466350665-s-53a6567b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2972%3A%20Cross%20Site%20Scripting%20in%20a466350665%20Smart-SSO&amp;severity=medium&amp;id=699c5bedbe58cf853b920fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2971-cross-site-scripting-in-a466350665-s-22186f60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2971%3A%20Cross%20Site%20Scripting%20in%20a466350665%20Smart-SSO&amp;severity=medium&amp;id=699bdf53be58cf853b335276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2970-deserialization-in-datapizza-labs-da-52f20926</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2970%3A%20Deserialization%20in%20datapizza-labs%20datapizza-ai&amp;severity=low&amp;id=699bd4c9be58cf853b2b9049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2969-improper-neutralization-of-special-e-6d54c976</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2969%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20datapizza-labs%20datapizza-ai&amp;severity=medium&amp;id=699bd4c9be58cf853b2b9042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2968-improper-verification-of-cryptograph-cb146a79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2968%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bca3ebe58cf853b0516da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2998-cwe-426-untrusted-search-path-in-eai-2fea061f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2998%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20eAI%20Technologies%20ERP%20F2&amp;severity=high&amp;id=699bca3ebe58cf853b0516e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2967-improper-verification-of-source-of-a-57b8c69e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2967%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bca3ebe58cf853b0516d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2966-insufficiently-random-values-in-cesa-e29cea84</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2966%3A%20Insufficiently%20Random%20Values%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bbc2cbe58cf853bf32018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2997-cwe-639-authorization-bypass-through-f3504232</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2997%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WisdomGarden%20Tronclass&amp;severity=medium&amp;id=699bbc2cbe58cf853bf3201f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2965-cross-site-scripting-in-07flycms-9d8672b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2965%3A%20Cross%20Site%20Scripting%20in%2007FLYCMS&amp;severity=medium&amp;id=699bbc2cbe58cf853bf32012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24494-cwe-89-improper-neutralization-of-s-fae4075c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24494%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Order%20Up%20Online%20Ordering%20System&amp;severity=critical&amp;id=699bae1dbe58cf853be51a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2964-improperly-controlled-modification-o-1db41d02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2964%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20higuma%20web-audio-recorder-js&amp;severity=low&amp;id=699bae1dbe58cf853be51a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2963-sql-injection-in-jinher-oa-c6-9c9c2ebe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2963%3A%20SQL%20Injection%20in%20Jinher%20OA%20C6&amp;severity=medium&amp;id=699ba713be58cf853bda304f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2962-stack-based-buffer-overflow-in-d-lin-37c3a76b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2962%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba713be58cf853bda3048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2961-stack-based-buffer-overflow-in-d-lin-722e4783</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2961%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba00cbe58cf853bd054b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2960-stack-based-buffer-overflow-in-d-lin-29b3b35d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2960%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba00cbe58cf853bd054ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71056-na-32de5bd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71056%3A%20n%2Fa&amp;severity=high&amp;id=699cee30be58cf853bef4e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-23-1e99d923</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-23&amp;severity=medium&amp;id=699cebebbe58cf853be165c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70045-na-e43003f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70045%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8ebe58cf853bc4b508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70044-na-ecdebec6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70044%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8ebe58cf853bc4b500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70043-na-753ec698</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70043%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61146-na-c537bae5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61146%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61145-na-b8ca930f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61145%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61144-na-a864084d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61144%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61143-na-6d6fd10d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61143%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26464-na-9c4ae060</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26464%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61147-na-7a270c4f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61147%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b45d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63946-na-a5435ae2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63946%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63945-na-2233fd7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63945%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70329-na-e700a716</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70329%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70328-na-5c36c839</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70328%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70327-na-d22f971f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70327%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-23-50f3ad29</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-23&amp;severity=medium&amp;id=699cbc9bbe58cf853bc24344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70058-na-32d6ca8c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70058%3A%20n%2Fa&amp;severity=high&amp;id=699c7b9bbe58cf853ba5282b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69700-na-5de56747</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69700%3A%20n%2Fa&amp;severity=high&amp;id=699c625dbe58cf853b954549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-23-f5ab6aae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-23&amp;severity=low&amp;id=699c2ff9be58cf853b75cfa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26365-cwe-444-inconsistent-interpretation-96fb7f75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26365%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Akamai%20Ghost&amp;severity=medium&amp;id=699c1094be58cf853b5f1af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2959-stack-based-buffer-overflow-in-d-lin-54cc012d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2959%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699b9581be58cf853bc3dfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2958-stack-based-buffer-overflow-in-d-lin-bf6778d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2958%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699b9581be58cf853bc3dfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2588-cwe-190-integer-overflow-or-wraparou-4f2a3d33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2588%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20TIMLEGGE%20Crypt%3A%3ANaCl%3A%3ASodium&amp;severity=critical&amp;id=699b9581be58cf853bc3df9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2957-denial-of-service-in-qinming99-dst-a-0aef73fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2957%3A%20Denial%20of%20Service%20in%20qinming99%20dst-admin&amp;severity=medium&amp;id=699b8e79be58cf853bbd6216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2956-command-injection-in-qinming99-dst-a-1c74e846</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2956%3A%20Command%20Injection%20in%20qinming99%20dst-admin&amp;severity=medium&amp;id=699b8069be58cf853bb3c827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2954-injection-in-dromara-ujcms-b332a795</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2954%3A%20Injection%20in%20Dromara%20UJCMS&amp;severity=medium&amp;id=699b1df9be58cf853b5c408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2953-path-traversal-in-dromara-ujcms-ab2c642f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2953%3A%20Path%20Traversal%20in%20Dromara%20UJCMS&amp;severity=medium&amp;id=699b0fe9be58cf853b4f96d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2952-os-command-injection-in-vaelsys-49bece5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2952%3A%20OS%20Command%20Injection%20in%20Vaelsys&amp;severity=medium&amp;id=699b0fe9be58cf853b4f96d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2947-cross-site-scripting-in-rymcu-forest-64f20955</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2947%3A%20Cross%20Site%20Scripting%20in%20rymcu%20forest&amp;severity=medium&amp;id=699b0c63be58cf853b4cb9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2946-cross-site-scripting-in-rymcu-forest-abcecd89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2946%3A%20Cross%20Site%20Scripting%20in%20rymcu%20forest&amp;severity=medium&amp;id=699b01d9be58cf853b401db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2945-server-side-request-forgery-in-jeecg-da011b53</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2945%3A%20Server-Side%20Request%20Forgery%20in%20JeecgBoot&amp;severity=medium&amp;id=699b01d9be58cf853b401dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2944-os-command-injection-in-tosei-online-56edbc08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2944%3A%20OS%20Command%20Injection%20in%20Tosei%20Online%20Store%20Management%20System%20%E3%83%8D%E3%83%83%E3%83%88%E5%BA%97%E8%88%97%E7%AE%A1%E7%90%86%E3%82%B7%E3%82%B9%E3%83%86%E3%83%A0&amp;severity=medium&amp;id=699ae5b9be58cf853b26a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2943-cross-site-scripting-in-sapneshnaik--0f3a9e14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2943%3A%20Cross%20Site%20Scripting%20in%20SapneshNaik%20Student%20Management%20System&amp;severity=medium&amp;id=699adeb1be58cf853b22022d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2940-out-of-bounds-write-in-zaher1307-tin-2936ffcb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2940%3A%20Out-of-bounds%20Write%20in%20Zaher1307%20tiny_web_server&amp;severity=medium&amp;id=699ad7a9be58cf853b1cfbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2939-cross-site-scripting-in-itsourcecode-0e030c3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2939%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=699ad0a1be58cf853b190e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2938-improper-access-controls-in-sourceco-92db5ba5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2938%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699ac613be58cf853b1434d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2385-cwe-345-insufficient-verification-of-07926427</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2385%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699abf0dbe58cf853b0fc39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2935-buffer-overflow-in-utt-hiper-810g-939f645f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2935%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2934-cross-site-scripting-in-yifang-cms-9b3c2ff3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2934%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699b6bbfbe58cf853b9fec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2933-cross-site-scripting-in-yifang-cms-f18756f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2933%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699ab481be58cf853b04fa68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2932-cross-site-scripting-in-yifang-cms-5172b3a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2932%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699ab481be58cf853b04fa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2930-stack-based-buffer-overflow-in-tenda-1060ec7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2930%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=medium&amp;id=699aa2ecbe58cf853bf5261c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1369-cwe-601-url-redirection-to-untrusted-8bf9bb9d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1369%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Conditional%20CAPTCHA&amp;severity=medium&amp;id=699b6bbfbe58cf853b9fec56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2929-stack-based-buffer-overflow-in-d-lin-63e7a69b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2929%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a9861be58cf853bec2c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2928-stack-based-buffer-overflow-in-d-lin-ba314a06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2928%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a9159be58cf853be4af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2927-stack-based-buffer-overflow-in-d-lin-aa7f83a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2927%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8a51be58cf853bdd6463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2926-stack-based-buffer-overflow-in-d-lin-b63cbef8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2926%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8a51be58cf853bdd645c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2925-stack-based-buffer-overflow-in-d-lin-790f34e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2925%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8349be58cf853bd68ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2913-heap-based-buffer-overflow-in-libvip-d7babcf4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2913%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=low&amp;id=699a8349be58cf853bd68abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2912-sql-injection-in-code-projects-onlin-bf9f085a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2912%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=699a8349be58cf853bd68ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2911-buffer-overflow-in-tenda-fh451-0afdc9cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2911%3A%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-winos-40-campaigns-target-taiwan-61006908</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Winos%204.0%20Campaigns%20Target%20Taiwan&amp;severity=medium&amp;id=699c21ebbe58cf853b6b6adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2910-stack-based-buffer-overflow-in-tenda-db290378</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2910%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2909-stack-based-buffer-overflow-in-tenda-c1902d12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2909%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2908-stack-based-buffer-overflow-in-tenda-8458ae06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2908%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2907-stack-based-buffer-overflow-in-tenda-e9f3e7c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2907%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2906-stack-based-buffer-overflow-in-tenda-4d6e371a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2906%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2905-stack-based-buffer-overflow-in-tenda-1e2cb94f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2905%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a5c9dbe58cf853b91714c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2904-buffer-overflow-in-utt-hiper-810g-b0bb6f4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2904%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699a5593be58cf853b7fcbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2903-null-pointer-dereference-in-skvadrik-a9b7e0e3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2903%3A%20NULL%20Pointer%20Dereference%20in%20skvadrik%20re2c&amp;severity=medium&amp;id=699a5593be58cf853b7fcba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2898-deserialization-in-funadmin-1655bf68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2898%3A%20Deserialization%20in%20funadmin&amp;severity=medium&amp;id=699a5593be58cf853b7fcba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2897-cross-site-scripting-in-funadmin-361272fa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2897%3A%20Cross%20Site%20Scripting%20in%20funadmin&amp;severity=medium&amp;id=699a5593be58cf853b7fcb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-22-ba8f968c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-22&amp;severity=medium&amp;id=699cebc3be58cf853be054cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-22-4d8876f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-22&amp;severity=medium&amp;id=699b9c51be58cf853bc9aa6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-22-c03fd373</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-22&amp;severity=low&amp;id=699a8312be58cf853bd645fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2896-improper-authorization-in-funadmin-8b9a76de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2896%3A%20Improper%20Authorization%20in%20funadmin&amp;severity=medium&amp;id=699a4401be58cf853b61d862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2895-weak-password-recovery-in-funadmin-197487f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2895%3A%20Weak%20Password%20Recovery%20in%20funadmin&amp;severity=medium&amp;id=699a3cfabe58cf853b5c220a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2894-information-disclosure-in-funadmin-e975faf5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2894%3A%20Information%20Disclosure%20in%20funadmin&amp;severity=medium&amp;id=699a3cfabe58cf853b5c2203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2889-use-after-free-in-ccextractor-8a5137dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2889%3A%20Use%20After%20Free%20in%20CCExtractor&amp;severity=medium&amp;id=699a2ee9be58cf853b52baf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2887-uncontrolled-recursion-in-aardappel--a74e0dc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2887%3A%20Uncontrolled%20Recursion%20in%20aardappel%20lobster&amp;severity=medium&amp;id=699a20dabe58cf853b48d564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2886-stack-based-buffer-overflow-in-tenda-a6c0a7e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2886%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=699a20dabe58cf853b48d55d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2885-stack-based-buffer-overflow-in-d-lin-17be11df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2885%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2884-stack-based-buffer-overflow-in-d-lin-b154b949</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2884%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2883-stack-based-buffer-overflow-in-d-lin-5a90424a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2883%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a12cabe58cf853b2525ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2882-stack-based-buffer-overflow-in-d-lin-e735582c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2882%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a12cabe58cf853b2525c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2881-stack-based-buffer-overflow-in-d-lin-f2038f8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2881%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a0bc7be58cf853b06b4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2877-stack-based-buffer-overflow-in-tenda-d45c8c4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2877%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=high&amp;id=699a0133be58cf853bda57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2876-stack-based-buffer-overflow-in-tenda-20fd82b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2876%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=high&amp;id=6999efa1be58cf853bad3f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2874-stack-based-buffer-overflow-in-tenda-d1cd837e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2874%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999efa1be58cf853bad3f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2873-stack-based-buffer-overflow-in-tenda-9e1c5986</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2873%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999e192be58cf853ba5a4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2872-stack-based-buffer-overflow-in-tenda-c3d8c5e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2872%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999da89be58cf853ba20638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2871-stack-based-buffer-overflow-in-tenda-bd337d40</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2871%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999d381be58cf853b9e8de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2870-stack-based-buffer-overflow-in-tenda-01319858</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2870%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999c571be58cf853b997438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2869-out-of-bounds-read-in-janet-lang-jan-d96dcc6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2869%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=6999c571be58cf853b99742e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2867-sql-injection-in-itsourcecode-vehicl-078e6aa4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2867%3A%20SQL%20Injection%20in%20itsourcecode%20Vehicle%20Management%20System&amp;severity=medium&amp;id=6999bae3be58cf853b900a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-grandstream-phone-vulnerability-exposes-c-7d749d0a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Grandstream%20Phone%20Vulnerability%20Exposes%20Calls%20to%20Interception&amp;severity=critical&amp;id=69999e90be58cf853b84f9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1787-cwe-862-missing-authorization-in-thi-cbb97bf6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1787%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20Backup%20%26%20Migration%20Tool&amp;severity=medium&amp;id=69998d30be58cf853b7cb605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27579-cwe-346-origin-validation-error-in--edc4b98e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27579%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20karnop%20realtime-collaboration-platform&amp;severity=high&amp;id=699989acbe58cf853b7b329e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27492-cwe-488-exposure-of-data-element-to-626119f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27492%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20lettermint%20lettermint-node&amp;severity=medium&amp;id=699989acbe58cf853b7b3299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14339-cwe-862-missing-authorization-in-we-9669a54d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14339%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20weMail%3A%20Email%20Marketing%2C%20Email%20Automation%2C%20Newsletters%2C%20Subscribers%20%26%20Email%20Optins%20for%20WooCommerce&amp;severity=medium&amp;id=69997b9dbe58cf853b7530da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27482-cwe-396-declaration-of-catch-for-ge-d7eb6f83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27482%3A%20CWE-396%3A%20Declaration%20of%20Catch%20for%20Generic%20Exception%20in%20ray-project%20ray&amp;severity=medium&amp;id=69997b9dbe58cf853b7530e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27479-cwe-918-server-side-request-forgery-8b1d9bca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27479%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69996d8dbe58cf853b6e3314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2865-sql-injection-in-itsourcecode-agri-t-9413028e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2865%3A%20SQL%20Injection%20in%20itsourcecode%20Agri-Trading%20Online%20Shopping%20System&amp;severity=medium&amp;id=69996301be58cf853b611671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2864-path-traversal-in-fenghaha-ssm-erp-918de2b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2864%3A%20Path%20Traversal%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69996301be58cf853b61166a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27469-cwe-79-improper-neutralization-of-i-6807b486</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27469%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20isso-comments%20isso&amp;severity=medium&amp;id=69996301be58cf853b611665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27206-cwe-502-deserialization-of-untruste-e15a97f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27206%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20zumba%20json-serializer&amp;severity=high&amp;id=69995bf9be58cf853b593127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27458-cwe-80-improper-neutralization-of-s-f57f6777</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27458%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69995bf9be58cf853b59312f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27452-cwe-200-exposure-of-sensitive-infor-d39700d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27452%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20JonathanWilbur%20asn1-ts&amp;severity=critical&amp;id=69995bf9be58cf853b59312c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27471-cwe-862-missing-authorization-in-fr-0d95cb60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27471%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frappe%20erpnext&amp;severity=critical&amp;id=699954f1be58cf853b55f45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/japanese-language-phishing-emails-sat-feb-21st-02b8ce8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Japanese-Language%20Phishing%20Emails%2C%20(Sat%2C%20Feb%2021st)&amp;severity=medium&amp;id=69994db5be58cf853b530115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2863-path-traversal-in-fenghaha-ssm-erp-086ce83e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2863%3A%20Path%20Traversal%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69994df7be58cf853b531474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2861-information-disclosure-in-foswiki-785784dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2861%3A%20Information%20Disclosure%20in%20Foswiki&amp;severity=medium&amp;id=69994df7be58cf853b53146c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27212-cwe-1321-improperly-controlled-modi-35374c82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27212%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nolimits4web%20swiper&amp;severity=critical&amp;id=69994a6fbe58cf853b51dfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26047-uncontrolled-resource-consumption-2faa897d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26047%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=69994a6fbe58cf853b51dfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26046-improper-neutralization-of-special--aded30ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26046%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=69994a6fbe58cf853b51dfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26045-improper-control-of-generation-of-c-ac6ce0f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26045%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=69994a6fbe58cf853b51dfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27210-cwe-79-improper-neutralization-of-i-304bf2ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27210%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mpetroff%20pannellum&amp;severity=medium&amp;id=699946e0be58cf853b4e0107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27205-cwe-524-use-of-cache-containing-sen-0adafbc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27205%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20pallets%20flask&amp;severity=low&amp;id=699946e0be58cf853b4e0102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27199-cwe-67-improper-handling-of-windows-2d486c7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27199%3A%20CWE-67%3A%20Improper%20Handling%20of%20Windows%20Device%20Names%20in%20pallets%20werkzeug&amp;severity=medium&amp;id=699a1a4cbe58cf853b44ca10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27198-cwe-269-improper-privilege-manageme-f67eef78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27198%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20getformwork%20formwork&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27197-cwe-287-improper-authentication-in--f7f67e7c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27197%3A%20CWE-287%3A%20Improper%20Authentication%20in%20getsentry%20sentry&amp;severity=critical&amp;id=69993c53be58cf853b46cc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2860-improper-authorization-in-fenghaha-s-7b872e85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2860%3A%20Improper%20Authorization%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69993c53be58cf853b46cc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27196-cwe-79-improper-neutralization-of-i-471a7dc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27196%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69993c53be58cf853b46cc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27194-cwe-74-improper-neutralization-of-s-60332a35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27194%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20man-group%20dtale&amp;severity=high&amp;id=6999354dbe58cf853b449470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27193-cwe-200-exposure-of-sensitive-infor-8c54f238</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27193%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20feathersjs%20feathers&amp;severity=high&amp;id=6999354dbe58cf853b44946b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27192-cwe-346-origin-validation-error-in--17700ad4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27192%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20feathersjs%20feathers&amp;severity=high&amp;id=69992e44be58cf853b3dccd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27191-cwe-601-url-redirection-to-untruste-5f61f9b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27191%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20feathersjs%20feathers&amp;severity=high&amp;id=69992e44be58cf853b3dcccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65995-cwe-209-generation-of-error-message-fae63ced</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65995%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=699923b9be58cf853b17289f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-21-47397153</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-21&amp;severity=medium&amp;id=699a4ad1be58cf853b672ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-21-314b93fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-21&amp;severity=medium&amp;id=6999f672be58cf853bb0d039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-21-d084b561</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-21&amp;severity=low&amp;id=6999664dbe58cf853b67e1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27168-cwe-122-heap-based-buffer-overflow--338e400d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27168%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HappySeaFox%20sail&amp;severity=high&amp;id=6998f281be58cf853bdfabe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27203-cwe-15-external-control-of-system-o-d4123025</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27203%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20YosefHayim%20ebay-mcp&amp;severity=high&amp;id=6998f281be58cf853bdfabe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27134-cwe-287-improper-authentication-in--be5a44cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27134%3A%20CWE-287%3A%20Improper%20Authentication%20in%20strimzi%20strimzi-kafka-operator&amp;severity=high&amp;id=6998eb7cbe58cf853bdd2aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27133-cwe-295-improper-certificate-valida-e5103e94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27133%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20strimzi%20strimzi-kafka-operator&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27125-cwe-915-improperly-controlled-modif-2f99b788</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27125%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27122-cwe-79-improper-neutralization-of-i-d6a4de72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27122%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27121-cwe-79-improper-neutralization-of-i-f01a2543</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27121%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27119-cwe-79-improper-neutralization-of-i-0a61a055</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27119%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2490-cwe-59-improper-link-resolution-befo-d299ff2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2490%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20RustDesk%20Client%20for%20Windows&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2041-cwe-78-improper-neutralization-of-sp-9112e8cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2041%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd86542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2043-cwe-78-improper-neutralization-of-sp-f93a8c83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2043%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd8654a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2042-cwe-78-improper-neutralization-of-sp-c3d99d64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2042%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd86546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2040-cwe-427-uncontrolled-search-path-ele-0eaf6799</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2040%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=6998e0efbe58cf853bd8653f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2039-cwe-862-missing-authorization-in-gfi-14597c17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2039%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd8653c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2036-cwe-502-deserialization-of-untrusted-d76c5725</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2036%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2038-cwe-862-missing-authorization-in-gfi-f5fda3da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2038%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2037-cwe-502-deserialization-of-untrusted-7d9015ad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2037%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2035-cwe-78-improper-neutralization-of-sp-ffc2acfa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2035%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Deciso%20OPNsense&amp;severity=medium&amp;id=6998e0efbe58cf853bd8652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2034-cwe-120-buffer-copy-without-checking-ee11093c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2034%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Sante%20DICOM%20Viewer%20Pro&amp;severity=high&amp;id=6998e0efbe58cf853bd8652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2858-out-of-bounds-read-in-wren-lang-wren-beaad496</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2858%3A%20Out-of-Bounds%20Read%20in%20wren-lang%20wren&amp;severity=medium&amp;id=6998d662be58cf853bc3fe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27120-cwe-75-failure-to-sanitize-special--5394c06d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27120%3A%20CWE-75%3A%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20vapor%20leaf-kit&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27118-cwe-346-origin-validation-error-in--a2829ba2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27118%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20sveltejs%20kit&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27112-cwe-863-incorrect-authorization-in--0476694e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27112%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20akuity%20kargo&amp;severity=critical&amp;id=6998d2dfbe58cf853bb9b974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27111-cwe-862-missing-authorization-in-ak-4eba098a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27111%3A%20CWE-862%3A%20Missing%20Authorization%20in%20akuity%20kargo&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27026-cwe-770-allocation-of-resources-wit-2c968574</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27026%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27025-cwe-834-excessive-iteration-in-py-p-037c1442</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27025%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27024-cwe-835-loop-with-unreachable-exit--6dceccea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27024%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27022-cwe-74-improper-neutralization-of-s-4e85c924</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27022%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langchain-ai%20langgraphjs&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27020-cwe-79-improper-neutralization-of-i-87028508</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27020%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lukas12000%20photobooth&amp;severity=medium&amp;id=6998cf5abe58cf853bb24fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2857-stack-based-buffer-overflow-in-d-lin-756386cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2857%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998cf5abe58cf853bb24faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25896-cwe-185-incorrect-regular-expressio-a786da3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25896%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=critical&amp;id=6998cf5abe58cf853bb24fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27190-cwe-78-improper-neutralization-of-s-61ca1d2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27190%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=6998e47cbe58cf853bd9f781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2856-stack-based-buffer-overflow-in-d-lin-e5278306</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2856%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e1be58cf853bab6aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2855-stack-based-buffer-overflow-in-d-lin-4a6d59bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2855%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c0ac2c4d84f260ce40a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62326-cwe-79-improper-neutralization-of-i-0249db27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62326%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCLSoftware%20Digital%20Experience&amp;severity=medium&amp;id=6998c0ac2c4d84f260ce40a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2473-cwe-340-generation-of-predictable-nu-62055df8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2473%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20Google%20Cloud%20Vertex%20AI%20Experiments&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2472-cwe-79-improper-neutralization-of-in-08ce0843</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2472%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Google%20Cloud%20Vertex%20AI%20SDK%20for%20Python&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2854-stack-based-buffer-overflow-in-d-lin-0ac6d2fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2854%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e2be58cf853bab6b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2853-stack-based-buffer-overflow-in-d-lin-37fdae85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2853%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e2be58cf853bab6afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2852-improper-access-controls-in-yeqifu-w-d3d7f563</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2852%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6998c9e4be58cf853bab7605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2832-cwe-200-in-hp-inc-samsung-multixpres-5f46e4eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2832%3A%20CWE-200%20in%20HP%20Inc%20Samsung%20MultiXpress%20SL-X7600LXR%2C%20SL-X7500LXR%2C%20SL-X7400LXR&amp;severity=medium&amp;id=69989d822c4d84f260b8d827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27115-cwe-22-improper-limitation-of-a-pat-30707c13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27115%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=699899fe2c4d84f260b6810c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2851-improper-access-controls-in-yeqifu-w-ad7331dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2851%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=699899fe2c4d84f260b68119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2850-improper-access-controls-in-yeqifu-w-53b18e86</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2850%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=699899fe2c4d84f260b68111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26102-cwe-732-incorrect-permission-assign-3e8ec137</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26102%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26101-cwe-732-incorrect-permission-assign-507e105d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26101%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26100-cwe-732-incorrect-permission-assign-13572654</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26100%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=medium&amp;id=6998c9e6be58cf853bab77cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27506-cwe-79-improper-neutralization-of-i-f9e184f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26099-cwe-427-uncontrolled-search-path-el-e9a235da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26099%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26098-cwe-427-uncontrolled-search-path-el-122bfb41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26098%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26097-cwe-427-uncontrolled-search-path-el-a14c6dd5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26097%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab7622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26096-cwe-732-incorrect-permission-assign-d2bc77a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26096%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab761f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26095-cwe-732-incorrect-permission-assign-d597aa2a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26095%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab761c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26093-cwe-77-improper-neutralization-of-s-05064f5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26093%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab7619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27505-cwe-79-improper-neutralization-of-i-d9eb7933</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27504-cwe-79-improper-neutralization-of-i-79d41f19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27503-cwe-79-improper-neutralization-of-i-299cc120</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27503%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2333-cwe-77-improper-neutralization-of-sp-a6e584ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2333%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Owl%20opds&amp;severity=critical&amp;id=6998c9e6be58cf853bab77d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27502-cwe-79-improper-neutralization-of-i-497f1478</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15583-cross-site-scripting-in-detronetdip-f3411607</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15583%3A%20Cross%20Site%20Scripting%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6998c9e6be58cf853bab77e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15582-authorization-bypass-in-detronetdip-decee4fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15582%3A%20Authorization%20Bypass%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6998c9e6be58cf853bab77db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1842-cwe-613-insufficient-session-expirat-81f62f0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1842%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20SoftIron%20HyperCloud&amp;severity=medium&amp;id=6998c9e2be58cf853bab6b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24790-cwe-306-in-welker-odoreyes-ecosyste-ec3e6d58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24790%3A%20CWE-306%20in%20Welker%20OdorEyes%20EcoSystem%20Pulse%20Bypass%20System%20with%20XL4%20Controller&amp;severity=high&amp;id=69988bee2c4d84f260ae23d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26048-cwe-306-in-jinan-usr-iot-technology-9c6d3db0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26048%3A%20CWE-306%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26049-cwe-522-in-jinan-usr-iot-technology-c466334b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26049%3A%20CWE-522%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=medium&amp;id=6998c0ac2c4d84f260ce40b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2818-cwe-23-relative-path-traversal-in-vm-a93f5c94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2818%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20VMware%20Spring%20Data%20Geode&amp;severity=high&amp;id=6998c42f2c4d84f260d040b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2849-improper-access-controls-in-yeqifu-w-a0183a9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2849%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6998c9e7be58cf853bab82aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2848-sql-injection-in-sourcecodester-simp-900bfef3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2848%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=6998c9e7be58cf853bab82a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24455-cwe-319-in-jinan-usr-iot-technology-1aff07c2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24455%3A%20CWE-319%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=high&amp;id=6998c0ac2c4d84f260ce40b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25715-cwe-521-in-jinan-usr-iot-technology-b37d98fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25715%3A%20CWE-521%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=critical&amp;id=6998c0ac2c4d84f260ce40b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nists-quantum-breakthrough-single-photons-produced-1c6551af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NIST%E2%80%99s%20Quantum%20Breakthrough%3A%20Single%20Photons%20Produced%20on%20a%20Chip&amp;severity=medium&amp;id=699884b12c4d84f260a9a399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27072-improper-neutralization-of-input-du-639631d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PixelYourSite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=high&amp;id=6998ca03be58cf853bab938b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24959-improper-neutralization-of-special--8ecab645</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24959%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=high&amp;id=6998c9e4be58cf853bab7616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24956-improper-neutralization-of-special--3235d069</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24956%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjada%20Download%20Manager%20Addons%20for%20Elementor&amp;severity=critical&amp;id=6998ca03be58cf853bab9388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24955-improper-neutralization-of-input-du-9138314c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24955%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Whizz%20Plugins&amp;severity=high&amp;id=6998c9e4be58cf853bab7613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24953-improper-limitation-of-a-pathname-t-a40d9485</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24953%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=medium&amp;id=6998ca03be58cf853bab9385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24950-authorization-bypass-through-user-c-c56e4f1e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24950%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeplugs%20Authorsy&amp;severity=high&amp;id=6998c9e4be58cf853bab7610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24949-improper-neutralization-of-input-du-5bc860f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20PhotoMe&amp;severity=high&amp;id=6998ca03be58cf853bab9382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24948-improper-neutralization-of-input-du-f23c3cea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Reflector&amp;severity=high&amp;id=6998c9e4be58cf853bab760d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24946-missing-authorization-in-tychesoftw-9a5efc38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24946%3A%20Missing%20Authorization%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=medium&amp;id=6998ca02be58cf853bab9356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24944-missing-authorization-in-wedevs-sub-bab27ece</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24944%3A%20Missing%20Authorization%20in%20weDevs%20Subscribe2&amp;severity=medium&amp;id=6998c9e4be58cf853bab7602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24943-improper-neutralization-of-input-du-6c89e4dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Conference&amp;severity=high&amp;id=6998ca02be58cf853bab9353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24941-missing-authorization-in-wpjobporta-9352ccfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24941%3A%20Missing%20Authorization%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=high&amp;id=6998c9e2be58cf853bab6b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22384-deserialization-of-untrusted-data-i-c8cd76a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22384%3A%20Deserialization%20of%20Untrusted%20Data%20in%20leafcolor%20Applay%20-%20Shortcodes&amp;severity=high&amp;id=6998ca02be58cf853bab9350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22383-authorization-bypass-through-user-c-2a198f42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22383%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=medium&amp;id=6998c9e2be58cf853bab6b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22381-improper-control-of-filename-for-in-8b33630f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=high&amp;id=6998ca02be58cf853bab934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22380-improper-control-of-filename-for-in-7673de4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22380%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20UnlimHost&amp;severity=high&amp;id=6998c9e2be58cf853bab6afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22379-improper-control-of-filename-for-in-fd0926aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22379%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Netmix&amp;severity=high&amp;id=6998ca02be58cf853bab934a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22378-improper-control-of-filename-for-in-532e1939</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22378%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Blabber&amp;severity=high&amp;id=6998c9e2be58cf853bab6af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22377-improper-control-of-filename-for-in-54cf682d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22377%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Saveo&amp;severity=high&amp;id=6998ca02be58cf853bab9347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22376-improper-control-of-filename-for-in-47860a6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22376%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Parkivia&amp;severity=high&amp;id=6998c9e2be58cf853bab6af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22375-improper-control-of-filename-for-in-9e4ca84a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22375%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Impacto%20Patronus&amp;severity=high&amp;id=6998ca02be58cf853bab9344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22374-improper-control-of-filename-for-in-ff6f952c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22374%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Zio%20Alberto&amp;severity=high&amp;id=6998c9e2be58cf853bab6af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22373-improper-control-of-filename-for-in-91fdd6af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Fooddy&amp;severity=high&amp;id=6998ca02be58cf853bab9341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22372-improper-control-of-filename-for-in-99586c4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22372%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Isida&amp;severity=high&amp;id=6998c9e2be58cf853bab6aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22371-improper-control-of-filename-for-in-8243fd9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22371%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Gustavo&amp;severity=high&amp;id=6998ca02be58cf853bab933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22370-improper-control-of-filename-for-in-bbcd8a85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22370%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Marveland&amp;severity=high&amp;id=6998c9e1be58cf853bab6ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22369-improper-control-of-filename-for-in-b974319a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ironfit&amp;severity=high&amp;id=6998ca02be58cf853bab933b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22368-improper-control-of-filename-for-in-52f1856f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22368%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Redy&amp;severity=high&amp;id=6998c9e1be58cf853bab6ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22367-improper-control-of-filename-for-in-4478fc38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22367%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Coworking&amp;severity=high&amp;id=6998ca00be58cf853bab9221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22366-improper-control-of-filename-for-in-3cf8c652</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22366%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Jude&amp;severity=high&amp;id=6998c9e1be58cf853bab6abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22365-improper-control-of-filename-for-in-d19f4323</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22365%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Soleng&amp;severity=critical&amp;id=6998ca00be58cf853bab921e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22364-improper-control-of-filename-for-in-70fc26a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20SevenTrees&amp;severity=high&amp;id=6998c9e1be58cf853bab6aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22363-improper-control-of-filename-for-in-2eb32049</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22363%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rhodos&amp;severity=high&amp;id=6998ca00be58cf853bab921b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22362-improper-control-of-filename-for-in-9a7bc312</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22362%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Photolia&amp;severity=high&amp;id=6998c9e1be58cf853bab6aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22361-improper-control-of-filename-for-in-5e350512</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22361%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20A-Mart&amp;severity=high&amp;id=6998ca00be58cf853bab9218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22357-improper-neutralization-of-input-du-32b18cf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=high&amp;id=6998ca00be58cf853bab9215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22356-improper-control-of-filename-for-in-7d50b9f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22356%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Automattic%20Jetpack%20CRM&amp;severity=high&amp;id=6998ca00be58cf853bab9212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22354-deserialization-of-untrusted-data-i-a275f0c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22354%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Dotstore%20Woocommerce%20Category%20Banner%20Management&amp;severity=high&amp;id=6998ca00be58cf853bab920f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22352-improper-neutralization-of-input-du-82c9c764</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PersianScript%20Persian%20Woocommerce%20SMS&amp;severity=high&amp;id=6998ca00be58cf853bab920c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22351-missing-authorization-in-marcus-aka-382d6452</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22351%3A%20Missing%20Authorization%20in%20Marcus%20(aka%20%40msykes)%20WP%20FullCalendar&amp;severity=medium&amp;id=6998ca00be58cf853bab9209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22350-missing-authorization-in-add-onsorg-90039836</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22350%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20Elementor%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=medium&amp;id=6998ca00be58cf853bab9206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22346-deserialization-of-untrusted-data-i-85dcd642</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22346%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Slider%20Responsive%20Slideshow%20%E2%80%93%20Image%20slider%2C%20Gallery%20slideshow&amp;severity=high&amp;id=6998c9ffbe58cf853bab91df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22345-deserialization-of-untrusted-data-i-f1793858</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22345%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Image%20Gallery%20%E2%80%93%20Lightbox%20Gallery%2C%20Responsive%20Photo%20Gallery%2C%20Masonry%20Gallery&amp;severity=high&amp;id=6998c9ffbe58cf853bab91dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22344-improper-control-of-filename-for-in-72fff014</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22344%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20FiveStar&amp;severity=high&amp;id=6998c9ffbe58cf853bab91d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22341-authentication-bypass-using-an-alte-258b6c54</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22341%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Case-Themes%20Booked&amp;severity=medium&amp;id=6998c9ffbe58cf853bab91d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69410-improper-control-of-filename-for-in-4818f79c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69410%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Belletrist&amp;severity=high&amp;id=6998c9ffbe58cf853bab91d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69409-improper-control-of-filename-for-in-8f64e0af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69409%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20PJ%20%7C%20Life%20%26%20Business%20Coaching&amp;severity=high&amp;id=6998c9ffbe58cf853bab91cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69408-improper-control-of-filename-for-in-5ca7bc52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69408%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20HealthFirst&amp;severity=high&amp;id=6998c9ffbe58cf853bab91ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69407-improper-control-of-filename-for-in-b72f7028</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69407%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Struktur&amp;severity=high&amp;id=6998c9ffbe58cf853bab91c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69406-improper-control-of-filename-for-in-8c56f980</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69406%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20FreightCo&amp;severity=high&amp;id=6998c9ffbe58cf853bab91c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69405-deserialization-of-untrusted-data-i-7fb533d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69405%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Lorem%20Ipsum%20%7C%20Books%20%26%20Media%20Store&amp;severity=critical&amp;id=6998c9fdbe58cf853bab917f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69404-deserialization-of-untrusted-data-i-6248805e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69404%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Extreme%20Store&amp;severity=critical&amp;id=6998c9fdbe58cf853bab917c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69403-unrestricted-upload-of-file-with-da-1742b5b6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69403%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Bravis-Themes%20Bravis%20Addons&amp;severity=critical&amp;id=6998c9fdbe58cf853bab9179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69402-improper-control-of-filename-for-in-c155e509</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69402%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20R%26F&amp;severity=high&amp;id=6998c9fdbe58cf853bab9176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69401-authentication-bypass-by-spoofing-i-603d5f42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69401%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20mdalabar%20WooODT%20Lite&amp;severity=high&amp;id=6998c9fdbe58cf853bab9173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69400-improper-control-of-filename-for-in-aa67087f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69400%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yokoo&amp;severity=high&amp;id=6998c9fdbe58cf853bab9170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69399-improper-control-of-filename-for-in-d84915fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69399%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Cobble&amp;severity=high&amp;id=6998c9fdbe58cf853bab916d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69398-improper-control-of-filename-for-in-76bcabef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69398%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Plank&amp;severity=high&amp;id=6998c9fdbe58cf853bab9169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69397-improper-control-of-filename-for-in-2d7f5a1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69397%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tint&amp;severity=high&amp;id=6998c9fdbe58cf853bab9166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69396-improper-control-of-filename-for-in-cd4d231d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69396%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Splendour&amp;severity=high&amp;id=6998c9fdbe58cf853bab915e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69395-improper-control-of-filename-for-in-3d4a5ce4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69395%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gable&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69393-missing-authorization-in-jthemes-ex-5b6e7a1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69393%3A%20Missing%20Authorization%20in%20Jthemes%20Exzo&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69392-improper-neutralization-of-input-du-90e30f56</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itex%20iMoney&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69391-improper-neutralization-of-input-du-33c897e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69391%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20Diamond&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69390-improper-neutralization-of-input-du-59d41ec8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69390%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20Business%20Template%20Blocks%20for%20WPBakery%20(Visual%20Composer)%20Page%20Builder&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69389-improper-neutralization-of-input-du-b9f61373</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hugh%20Mungus%20Visitor%20Maps%20Extended%20Referer%20Field&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69388-missing-authorization-in-cliengo-cl-828a358a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69388%3A%20Missing%20Authorization%20in%20cliengo%20Cliengo%20%E2%80%93%20Chatbot&amp;severity=medium&amp;id=6998c9fbbe58cf853bab8d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69387-improper-control-of-filename-for-in-bd9b7785</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20whatwouldjessedo%20Simple%20Retail%20Menus&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69386-improper-neutralization-of-input-du-559119a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69386%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realvirtualmx%20RVCFDI%20para%20Woocommerce&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69385-missing-authorization-in-agnihd-car-5e178203</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69385%3A%20Missing%20Authorization%20in%20AgniHD%20Cartify%20-%20WooCommerce%20Gutenberg%20WordPress%20Theme&amp;severity=medium&amp;id=6998c9fbbe58cf853bab8d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69384-improper-neutralization-of-input-du-dcf39699</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69384%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Timeline%20Event%20History&amp;severity=high&amp;id=6998c9fabe58cf853bab8d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69383-improper-control-of-filename-for-in-bdded47d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Agence%20web%20Eoxia%20-%20Montpellier%20WP%20shop&amp;severity=high&amp;id=6998c9fabe58cf853bab8d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69382-deserialization-of-untrusted-data-i-d1f8436f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69382%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themesflat%20Themesflat%20Elementor&amp;severity=critical&amp;id=6998c9fabe58cf853bab8d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69381-missing-authorization-in-vanquish-w-22979e9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69381%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Bulk%20Product%20Editor&amp;severity=high&amp;id=6998c9fabe58cf853bab8d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69380-improper-limitation-of-a-pathname-t-0705c153</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69380%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20Upload%20Files%20Anywhere&amp;severity=high&amp;id=6998c9fabe58cf853bab8cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69379-improper-limitation-of-a-pathname-t-7d9b991f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69379%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20Upload%20Files%20Anywhere&amp;severity=high&amp;id=6998c9fabe58cf853bab8cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69378-incorrect-privilege-assignment-in-x-adbe137f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69378%3A%20Incorrect%20Privilege%20Assignment%20in%20XforWooCommerce%20Product%20Filter%20for%20WooCommerce&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69377-improper-limitation-of-a-pathname-t-444ddb21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69377%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69376-improper-limitation-of-a-pathname-t-8d35ed40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69376%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69375-improper-control-of-filename-for-in-aceae499</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69375%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SolverWp%20Portfolio%20Builder&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69374-improper-control-of-filename-for-in-c98b4c6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69374%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SolverWp%20Eleblog%20%E2%80%93%20Elementor%20Blog%20And%20Magazine%20Addons&amp;severity=high&amp;id=6998c9f8be58cf853bab8ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69373-improper-control-of-filename-for-in-8a23076b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20beeteam368%20VidoRev&amp;severity=high&amp;id=6998c9f8be58cf853bab8c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69372-deserialization-of-untrusted-data-i-478c0a38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69372%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20SevenHills&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69371-deserialization-of-untrusted-data-i-9dcd4607</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69371%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20KindlyCare&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69370-deserialization-of-untrusted-data-i-c59240a2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69370%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Capella&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69368-improper-neutralization-of-input-du-b3fb562b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69368%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20SOHO%20-%20Photography%20WordPress%20Theme&amp;severity=high&amp;id=6998c9f8be58cf853bab8c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69367-improper-neutralization-of-input-du-9e3ce157</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20Oyster%20-%20Photography%20WordPress%20Theme&amp;severity=high&amp;id=6998c9f8be58cf853bab8c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69366-improper-neutralization-of-special--9fb40b7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Emerce%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69365-improper-neutralization-of-special--9f132755</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69365%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Uroan%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69337-improper-neutralization-of-special--a25bade3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69337%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20don-themes%20Wolmart%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69330-improper-neutralization-of-input-du-0fc4e224</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69330%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jthemes%20Prestige&amp;severity=high&amp;id=6998c9f7be58cf853bab8c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69329-deserialization-of-untrusted-data-i-5554d9e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69329%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Jthemes%20Prestige&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69328-deserialization-of-untrusted-data-i-1008c2af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69328%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=high&amp;id=6998c9f7be58cf853bab8c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69326-improper-neutralization-of-input-du-066280cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69326%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms&amp;severity=high&amp;id=6998c9f7be58cf853bab8c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69325-path-traversal-in-primersoftware-pr-d91b8f83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69325%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20primersoftware%20Primer%20MyData%20for%20Woocommerce&amp;severity=medium&amp;id=6998c9f7be58cf853bab8c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69324-improper-neutralization-of-input-du-c43fe3a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms&amp;severity=high&amp;id=6998c9f7be58cf853bab8c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69323-improper-neutralization-of-input-du-3d87008f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VeronaLabs%20Slimstat%20Analytics&amp;severity=high&amp;id=6998c9f7be58cf853bab8c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69322-improper-control-of-filename-for-in-30c6fada</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69322%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20PeakShops&amp;severity=high&amp;id=6998c9f7be58cf853bab8c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69310-improper-neutralization-of-special--63c262ad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69310%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Woodly%20Core&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69309-improper-neutralization-of-special--f916c2e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69309%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Saasplate%20Core&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69308-improper-neutralization-of-special--b67a36af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69308%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Nestbyte%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69307-improper-neutralization-of-special--ec1cc96c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69307%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Medinik%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69306-improper-neutralization-of-special--b1330bd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69306%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Electio%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69305-improper-neutralization-of-special--6c729442</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69305%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Crete%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69304-improper-neutralization-of-special--0851bfff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69304%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Allmart&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69303-missing-authorization-in-modeltheme-fd7a5bf7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69303%3A%20CWE-862%20Missing%20Authorization%20in%20ModelTheme%20ModelTheme%20Framework&amp;severity=high&amp;id=6998c9f5be58cf853bab87a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69302-improper-neutralization-of-input-du-9e32252c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69302%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Core%20Features&amp;severity=high&amp;id=6998c9f5be58cf853bab879d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69301-deserialization-of-untrusted-data-i-01b61f2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69301%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20PhotoMe&amp;severity=critical&amp;id=6998c9f5be58cf853bab879a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69299-server-side-request-forgery-ssrf-in-e830acbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69299%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Laborator%20Oxygen&amp;severity=high&amp;id=6998c9f5be58cf853bab8797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69298-missing-authorization-in-ghostpool--dab750db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69298%3A%20Missing%20Authorization%20in%20GhostPool%20Gauge&amp;severity=high&amp;id=6998c9f5be58cf853bab8794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69297-missing-authorization-in-ghostpool--4d32211b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69297%3A%20Missing%20Authorization%20in%20GhostPool%20Aardvark%20Plugin&amp;severity=high&amp;id=6998c9f3be58cf853bab8754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69296-improper-neutralization-of-input-du-3cf6c340</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhostPool%20Aardvark&amp;severity=high&amp;id=6998c9f3be58cf853bab8751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69295-improper-neutralization-of-special--97e31acb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69295%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Coven%20Core&amp;severity=critical&amp;id=6998c9f3be58cf853bab874e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69294-deserialization-of-untrusted-data-i-973f59a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69294%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fuelthemes%20PeakShops&amp;severity=high&amp;id=6998c9f3be58cf853bab874b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69063-missing-authorization-in-saad-iqbal-38006240</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69063%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=high&amp;id=6998c9f3be58cf853bab8748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69011-improper-neutralization-of-input-du-827a8668</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPKube%20Cool%20Tag%20Cloud&amp;severity=medium&amp;id=6998c9f3be58cf853bab8745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68895-authentication-bypass-using-an-alte-e179568e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68895%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ahachat%20AhaChat%20Messenger%20Marketing&amp;severity=medium&amp;id=6998c9f3be58cf853bab8742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68880-improper-neutralization-of-input-du-45b81ed2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peterwsterling%20Simple%20Archive%20Generator&amp;severity=high&amp;id=6998c9f3be58cf853bab873f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68863-improper-neutralization-of-input-du-4674b2bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zack%20Katz%20iContact%20for%20Gravity%20Forms&amp;severity=high&amp;id=6998c9f3be58cf853bab873c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68862-improper-limitation-of-a-pathname-t-47bc47d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68862%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Murtaza%20Bhurgri%20Woo%20File%20Dropzone&amp;severity=high&amp;id=6998c9f3be58cf853bab8739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68856-improper-neutralization-of-input-du-05949549</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68856%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keeswolters%20Mopinion%20Feedback%20Form&amp;severity=high&amp;id=6998c9f2be58cf853bab86e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68855-insertion-of-sensitive-information--0c4f6164</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68855%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20themeglow%20JobBoard%20Job%20listing&amp;severity=medium&amp;id=6998c9f2be58cf853bab86e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68854-improper-neutralization-of-input-du-72219380</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68854%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20harman79%20ID%20Arrays&amp;severity=high&amp;id=6998c9f2be58cf853bab86e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68853-deserialization-of-untrusted-data-i-506d20b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68853%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Kleor%20Contact%20Manager&amp;severity=high&amp;id=6998c9f2be58cf853bab86df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68852-improper-neutralization-of-input-du-2bac6d5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68852%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webmuehle%20Court%20Reservation&amp;severity=high&amp;id=6998c9f2be58cf853bab86dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68848-improper-neutralization-of-input-du-64555e11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68848%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anmari%20amr%20cron%20manager&amp;severity=high&amp;id=6998c9f2be58cf853bab86d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68847-improper-neutralization-of-input-du-0893a46a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itex%20iSape&amp;severity=high&amp;id=6998c9f2be58cf853bab86d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68846-improper-neutralization-of-input-du-59a39808</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68846%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paris%20Holley%20Asynchronous%20Javascript&amp;severity=high&amp;id=6998c9f2be58cf853bab86d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68845-improper-neutralization-of-input-du-c1a8b4ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68845%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aThemeArt%20Translations%20eDS%20Responsive%20Menu&amp;severity=high&amp;id=6998c9f2be58cf853bab86d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68844-improper-neutralization-of-input-du-cb75cd2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68844%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DaleAB%20Membee%20Login&amp;severity=high&amp;id=6998c9f2be58cf853bab86cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68843-improper-neutralization-of-input-du-8f6fcf3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68843%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bas%20Schuiling%20FeedWordPress%20Advanced%20Filters&amp;severity=high&amp;id=6998c9f0be58cf853bab85d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68842-improper-neutralization-of-input-du-7eab223a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68842%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20totalbounty%20Widget%20Logic%20Visual&amp;severity=high&amp;id=6998c9f0be58cf853bab85cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68841-improper-control-of-filename-for-in-dc039b31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68841%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Themepul%20TopperPack%20%E2%80%93%20Complete%20Elementor%20Addons%2C%20Theme%20%26amp%3B%20CPT%20Builder&amp;severity=high&amp;id=6998c9f0be58cf853bab85cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68837-missing-authorization-in-elextensio-def71628</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68837%3A%20Missing%20Authorization%20in%20ELEXtensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=6998c9f0be58cf853bab85c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68834-missing-authorization-in-saiful-isl-51f7d3ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68834%3A%20Missing%20Authorization%20in%20Saiful%20Islam%20Sync%20Master%20Sheet%20%26%238211%3B%20Product%20Sync%20with%20Google%20Sheet%20for%20WooCommerce&amp;severity=null&amp;id=6998c9f0be58cf853bab85c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68552-improper-control-of-filename-for-in-47d1e875</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68552%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebCodingPlace%20WooCommerce%20Coming%20Soon%20Product%20with%20Countdown&amp;severity=medium&amp;id=6998c9f0be58cf853bab85c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68549-unrestricted-upload-of-file-with-da-f300012a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68549%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Wiguard&amp;severity=critical&amp;id=6998c9f0be58cf853bab85c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68545-improper-control-of-filename-for-in-e55abf46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68545%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Nika&amp;severity=critical&amp;id=6998c9f0be58cf853bab85bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68543-improper-control-of-filename-for-in-ec7a0378</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68543%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=high&amp;id=6998c9f0be58cf853bab85ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68542-missing-authorization-in-vgdevsolut-4bad2e8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68542%3A%20Missing%20Authorization%20in%20vgdevsolutions%20Checkout%20Gateway%20for%20IRIS&amp;severity=medium&amp;id=6998c9f0be58cf853bab85b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68541-deserialization-of-untrusted-data-i-129a58cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68541%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Ippsum&amp;severity=critical&amp;id=6998c9efbe58cf853bab857d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68539-improper-control-of-filename-for-in-ce4a1980</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68539%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Fana&amp;severity=high&amp;id=6998c9efbe58cf853bab857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68536-improper-control-of-filename-for-in-c935bbb3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68536%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Zota&amp;severity=high&amp;id=6998c9efbe58cf853bab8577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68534-missing-authorization-in-add-onsorg-81e370f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68534%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=medium&amp;id=6998c9efbe58cf853bab8574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68531-deserialization-of-untrusted-data-i-863bd6f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68531%3A%20Deserialization%20of%20Untrusted%20Data%20in%20modeltheme%20ModelTheme%20Addons%20for%20WPBakery%20and%20Elementor&amp;severity=high&amp;id=6998c9efbe58cf853bab8571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68526-deserialization-of-untrusted-data-i-cbe087a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68526%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Modal%20Popup%20Box&amp;severity=high&amp;id=6998c9efbe58cf853bab856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68514-authorization-bypass-through-user-c-16b1a07c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68514%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=medium&amp;id=6998c9efbe58cf853bab856b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68501-improper-neutralization-of-input-du-bb80394a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68501%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mollie%20Mollie%20Payments%20for%20WooCommerce&amp;severity=high&amp;id=6998c9efbe58cf853bab8568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68495-improper-neutralization-of-input-du-a12344e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68495%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=6998c9efbe58cf853bab8565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68069-missing-authorization-in-wpwax-dire-46097e51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68069%3A%20Missing%20Authorization%20in%20wpWax%20Directorist&amp;severity=high&amp;id=6998c9efbe58cf853bab8562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68048-missing-authorization-in-xlplugins--6cbcdeeb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68048%3A%20Missing%20Authorization%20in%20XLPlugins%20NextMove%20Lite&amp;severity=high&amp;id=6998c9edbe58cf853bab853a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68037-improper-neutralization-of-input-du-72ad97fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atlas%20Gondal%20Export%20Media%20URLs&amp;severity=high&amp;id=6998c9edbe58cf853bab8537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68032-missing-authorization-in-passionate-ce65cf7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68032%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20Advanced%20WC%20Analytics&amp;severity=medium&amp;id=6998c9edbe58cf853bab8534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68031-improper-neutralization-of-input-du-36f5d8bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=high&amp;id=6998c9edbe58cf853bab8531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68028-missing-authorization-in-passionate-0531b7c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68028%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20GA4WP%3A%20Google%20Analytics%20for%20WordPress&amp;severity=medium&amp;id=6998c9edbe58cf853bab852e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68026-missing-authorization-in-niaj-morsh-decb3063</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68026%3A%20Missing%20Authorization%20in%20Niaj%20Morshed%20LC%20Wizard&amp;severity=medium&amp;id=6998c9edbe58cf853bab852b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68025-missing-authorization-in-addonify-a-80dba42c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68025%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20Floating%20Cart%20For%20WooCommerce&amp;severity=medium&amp;id=6998c9edbe58cf853bab8528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68024-missing-authorization-in-addonify-a-946402e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68024%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20%E2%80%93%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=6998c9edbe58cf853bab8525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68023-missing-authorization-in-addonify-a-eac8ceeb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68023%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20%26%238211%3B%20Compare%20Products%20For%20WooCommerce&amp;severity=medium&amp;id=6998c9edbe58cf853bab8522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68022-missing-authorization-in-soporteblu-ee8ea804</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68022%3A%20Missing%20Authorization%20in%20soporteblue%20Plugin%20BlueX%20for%20WooCommerce&amp;severity=medium&amp;id=6998c9edbe58cf853bab851f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68005-missing-authorization-in-themewant--1a4a0af9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68005%3A%20Missing%20Authorization%20in%20themewant%20Easy%20Hotel%20Booking&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68002-improper-limitation-of-a-pathname-t-04dee762</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68002%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20100plugins%20Open%20User%20Map&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68000-missing-authorization-in-pickplugin-6f6543a3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68000%3A%20Missing%20Authorization%20in%20PickPlugins%20Testimonial%20Slider&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67998-authentication-bypass-using-an-alte-c4558126</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67998%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20kamleshyadav%20Miraculous%20Elementor&amp;severity=high&amp;id=6998c9ecbe58cf853bab84d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67997-deserialization-of-untrusted-data-i-ea8428bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67997%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Travelicious&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67996-deserialization-of-untrusted-data-i-0cb61011</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67996%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Nestin&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67995-deserialization-of-untrusted-data-i-acd7a12c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67995%3A%20Deserialization%20of%20Untrusted%20Data%20in%20LoftOcean%20PatioTime&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67994-missing-authorization-in-yaycommerc-c7ea2cf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67994%3A%20Missing%20Authorization%20in%20YayCommerce%20YayCurrency&amp;severity=high&amp;id=6998c9ecbe58cf853bab84c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67993-missing-authorization-in-vito-peleg-3197c6fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67993%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67992-improper-control-of-filename-for-in-679a1900</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20PatioTime&amp;severity=high&amp;id=6998c9ecbe58cf853bab84c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67991-improper-neutralization-of-input-du-776021b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9eabe58cf853bab835c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67990-improper-neutralization-of-input-du-3006f4c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67990%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20GMap%20Targeting&amp;severity=high&amp;id=6998c9eabe58cf853bab8359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67988-improper-control-of-filename-for-in-236db501</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67988%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20CozyStay&amp;severity=high&amp;id=6998c9eabe58cf853bab8356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67987-improper-neutralization-of-special--112bf3eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67987%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=high&amp;id=6998c9eabe58cf853bab8353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67984-improper-neutralization-of-input-du-e2f8e180</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20calliko%20NPS%20computy&amp;severity=high&amp;id=6998c9eabe58cf853bab8350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67982-improper-control-of-filename-for-in-712cbfe8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67982%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Urna&amp;severity=high&amp;id=6998c9eabe58cf853bab834d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67981-improper-control-of-filename-for-in-f1219db4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67981%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Besa&amp;severity=high&amp;id=6998c9eabe58cf853bab834a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67980-improper-control-of-filename-for-in-9a55cb06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67980%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Hara&amp;severity=high&amp;id=6998c9eabe58cf853bab8347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67979-improper-control-of-generation-of-c-bb0bfd2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67979%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WesternDeal%20WPForms%20Google%20Sheet%20Connector&amp;severity=critical&amp;id=6998c9eabe58cf853bab8344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67978-improper-neutralization-of-input-du-9190c74a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FixBD%20Educare&amp;severity=high&amp;id=6998c9eabe58cf853bab8341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67977-missing-authorization-in-villatheme-4000ddd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67977%3A%20Missing%20Authorization%20in%20VillaTheme%20HAPPY&amp;severity=high&amp;id=6998c9e9be58cf853bab830e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67974-missing-authorization-in-wp-legal-p-e9f4f790</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67974%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WPLegalPages&amp;severity=high&amp;id=6998c9e9be58cf853bab830b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67973-missing-authorization-in-sunshineph-1ae5502d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67973%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=6998c9e9be58cf853bab8308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67972-improper-neutralization-of-input-du-b07efd45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67972%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Prague&amp;severity=high&amp;id=6998c9e9be58cf853bab8305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67971-improper-neutralization-of-input-du-41121860</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPManageNinja%20FluentCart&amp;severity=high&amp;id=6998c9e9be58cf853bab8302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67970-missing-authorization-in-vertim-sch-71e7bfbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67970%3A%20Missing%20Authorization%20in%20vertim%20Schedula&amp;severity=medium&amp;id=6998c9e9be58cf853bab82ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67969-missing-authorization-in-knitpay-up-14cf04d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67969%3A%20Missing%20Authorization%20in%20knitpay%20UPI%20QR%20Code%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=6998c9e9be58cf853bab82fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67624-missing-authorization-in-arya-dhira-fa3ec6c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67624%3A%20Missing%20Authorization%20in%20Arya%20Dhiratara%20Optimize%20More!%20%26%238211%3B%20Images&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67547-missing-authorization-in-uixthemes--a2440eab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67547%3A%20Missing%20Authorization%20in%20uixthemes%20Konte&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60183-improper-neutralization-of-input-du-63f9a290</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60183%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silence%20Silencesoft%20RSS%20Reader&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60087-improper-control-of-filename-for-in-3f1b81bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nenad%20Obradovic%20Extensive%20VC%20Addons%20for%20WPBakery%20page%20builder&amp;severity=high&amp;id=6998c9e8be58cf853bab82e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53237-improper-neutralization-of-input-du-1c83c219</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soflyy%20WP%20Wizard%20Cloak&amp;severity=high&amp;id=6998c9e8be58cf853bab82e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53233-improper-neutralization-of-input-du-2e3f291a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RylanH%20Storyform&amp;severity=high&amp;id=6998c9e8be58cf853bab82e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53231-improper-neutralization-of-input-du-8073dcd8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevstudio%20Easy%20Taxonomy%20Images&amp;severity=high&amp;id=6998c9e8be58cf853bab82dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53228-improper-neutralization-of-input-du-f0496251</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jezza101%20bbpress%20Simple%20Advert%20Units&amp;severity=high&amp;id=6998c9e8be58cf853bab82da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53217-missing-authorization-in-staviravn--0ff7bc23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53217%3A%20Missing%20Authorization%20in%20staviravn%20AIO%20WP%20Builder&amp;severity=high&amp;id=6998c9e8be58cf853bab82d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52744-improper-control-of-generation-of-c-a7a31bdc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52744%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20inpersttion%20Inpersttion%20For%20Theme&amp;severity=high&amp;id=6998c9e8be58cf853bab82d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56208-improper-neutralization-of-input-du-1b25fa8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56208%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20desertthemes%20NewsMash&amp;severity=medium&amp;id=6998c9e8be58cf853bab82d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54222-missing-authorization-in-seraphinit-70be42d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54222%3A%20Missing%20Authorization%20in%20Seraphinite%20Solutions%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=6998c9e8be58cf853bab82ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52387-improper-neutralization-of-input-du-a433f62f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52387%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6998c9e8be58cf853bab82cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51915-improper-neutralization-of-input-du-bfa7ecbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51915%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=medium&amp;id=6998c9e7be58cf853bab82be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50555-improper-neutralization-of-input-du-894cf101</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=6998c9e7be58cf853bab82bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50452-improper-neutralization-of-input-du-ad138d1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43228-missing-authorization-in-secupress--cc2fda00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43228%3A%20Missing%20Authorization%20in%20SecuPress%20SecuPress%20Free&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34438-missing-authorization-in-anssi-lait-aeee1e22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34438%3A%20Missing%20Authorization%20in%20Anssi%20Laitila%20Shared%20Files&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22885-cwe-125-in-enocean-edge-inc-smartse-f22a8efc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22885%3A%20CWE-125%20in%20EnOcean%20Edge%20Inc%20SmartServer%20IoT&amp;severity=low&amp;id=6998c0ac2c4d84f260ce40ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20761-cwe-77-in-enocean-edge-inc-smartser-9757ab30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20761%3A%20CWE-77%20in%20EnOcean%20Edge%20Inc%20SmartServer%20IoT&amp;severity=high&amp;id=6998c42f2c4d84f260d0409d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2847-os-command-injection-in-utt-hiper-52-018dc81b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2847%3A%20OS%20Command%20Injection%20in%20UTT%20HiPER%20520&amp;severity=high&amp;id=6998ca03be58cf853bab939f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2846-os-command-injection-in-utt-hiper-52-0e4310ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2846%3A%20OS%20Command%20Injection%20in%20UTT%20HiPER%20520&amp;severity=high&amp;id=6998ca03be58cf853bab9399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-ransomware-shuts-us-clinics-ics-vuln-e4a097e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Ransomware%20Shuts%20US%20Clinics%2C%20ICS%20Vulnerability%20Surge%2C%20European%20Parliament%20Bans%20AI&amp;severity=medium&amp;id=6998812d2c4d84f260a7f175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52603-cwe-213-exposure-of-sensitive-infor-70398438</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52603%3A%20CWE-213%20%20Exposure%20of%20Sensitive%20Information%20Due%20to%20Incompatible%20Schemas%20in%20HCLSoftware%20Connections&amp;severity=low&amp;id=6998c9e1be58cf853bab6aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mimicrat-clickfix-campaign-delivers-custom-rat-via-6562c0b2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MIMICRAT%3A%20ClickFix%20Campaign%20Delivers%20Custom%20RAT%20via%20Compromised%20Legitimate%20Websites&amp;severity=medium&amp;id=6998d62bbe58cf853bbef474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14055-cwe-191-integer-underflow-wrap-or-w-90759bce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14055%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20silabs.com%20Simplicity%20SDK&amp;severity=low&amp;id=69987a5a2c4d84f260a3d5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21627-cwe-284-improper-access-control-in--2cdc7bab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21627%3A%20CWE-284%20Improper%20Access%20Control%20in%20tassos.gr%20Novarain%2FTassos%20Framework%20(plg_system_nrframework)&amp;severity=critical&amp;id=69986fcd2c4d84f2609bdee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14547-cwe-191-integer-underflow-wrap-or-w-929387be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14547%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20silabs.com%20Simplicity%20SDK&amp;severity=low&amp;id=69986fcd2c4d84f2609bdedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-vulnerability-exploited-in-ransomware--5bc2f812</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Vulnerability%20Exploited%20in%20Ransomware%20Attacks&amp;severity=medium&amp;id=699856fd2c4d84f26027f687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10970-cwe-89-improper-neutralization-of-s-93695009</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10970%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kolay%20Software%20Inc.%20Talentics&amp;severity=critical&amp;id=699849242c4d84f260e0c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2486-cwe-79-improper-neutralization-of-in-1483f93c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20For%20Elementor%20%E2%80%93%20Widgets%2C%20Extensions%2C%20Theme%20Builder%2C%20Popup%20Builder%20%26%20Template%20Kits&amp;severity=medium&amp;id=699849242c4d84f260e0c476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-20-million-losses-caused-by-700-atm-jackpottin-96c1ed05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20%2420%20Million%20Losses%20Caused%20by%20700%20ATM%20Jackpotting%20Attacks%20in%202025&amp;severity=medium&amp;id=699841e52c4d84f260dc08ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21620-cwe-23-relative-path-traversal-in-e-c649a935</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21620%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Erlang%20OTP&amp;severity=low&amp;id=699842282c4d84f260dc3158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chip-testing-giant-advantest-hit-by-ransomware-94fb5275</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chip%20Testing%20Giant%20Advantest%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69982ccd2c4d84f260d68ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26050-uncontrolled-search-path-element-in-8a10be9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26050%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Ricoh%20Company%2C%20Ltd.%20%E3%82%B8%E3%83%A7%E3%83%96%E3%83%AD%E3%82%B0%E9%9B%86%E8%A8%88%2F%E5%88%86%E6%9E%90%E3%82%BD%E3%83%95%E3%83%88%E3%82%A6%E3%82%A7%E3%82%A2%20RICOH%E3%82%B8%E3%83%A7%E3%83%96%E3%83%AD%E3%82%B0%E9%9B%86%E8%A8%88%E3%83%84%E3%83%BC%E3%83%AB&amp;severity=high&amp;id=69981b6d2c4d84f260ba1514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59819-vulnerability-in-zenitel-alphacomxe-52bf65ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59819%3A%20Vulnerability%20in%20zenitel%20alphacom_xe_audio_server&amp;severity=medium&amp;id=699817e92c4d84f260b3b7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26370-cross-site-scripting-xss-in-ays-pro-56c43348</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26370%3A%20Cross-site%20scripting%20(XSS)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=medium&amp;id=699814672c4d84f260b0ab28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/promptspy-android-malware-abuses-gemini-ai-at-runt-c11b47db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PromptSpy%20Android%20Malware%20Abuses%20Gemini%20AI%20at%20Runtime%20for%20Persistence&amp;severity=medium&amp;id=69980a3dd7880ec89b828a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2825-cross-site-scripting-in-rachelos-wer-0b8688e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2825%3A%20Cross%20Site%20Scripting%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=6997ffe5d7880ec89b7f6308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2824-command-injection-in-comfast-cf-e7-9473cc19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2824%3A%20Command%20Injection%20in%20Comfast%20CF-E7&amp;severity=medium&amp;id=6997f559d7880ec89b7a587f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2823-command-injection-in-comfast-cf-e7-d06bcd96</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2823%3A%20Command%20Injection%20in%20Comfast%20CF-E7&amp;severity=medium&amp;id=6997ee52d7880ec89b7878ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2739-infinite-loop-in-bnjs-275193c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2739%3A%20Infinite%20loop%20in%20bn.js&amp;severity=medium&amp;id=6997ee52d7880ec89b7878a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2822-sql-injection-in-jeecgboot-80678eca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2822%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=6997e749d7880ec89b76b0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26996-cwe-1333-inefficient-regular-expres-e16ebdd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26996%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=6997d231d7880ec89b52f4e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26994-cwe-693-protection-mechanism-failur-b9c23838</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26994%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20refraction-networking%20utls&amp;severity=medium&amp;id=6997d231d7880ec89b52f4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27017-cwe-1240-use-of-a-cryptographic-pri-4912fee6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27017%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20refraction-networking%20utls&amp;severity=low&amp;id=6997d231d7880ec89b52f4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26993-cwe-79-improper-neutralization-of-i-e0932b1a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26993%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FlintSH%20Flare&amp;severity=medium&amp;id=6997d231d7880ec89b52f4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2821-sql-injection-in-fujian-smart-integr-beb955f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2821%3A%20SQL%20Injection%20in%20Fujian%20Smart%20Integrated%20Management%20Platform%20System&amp;severity=medium&amp;id=6997d231d7880ec89b52f4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2384-cwe-79-improper-neutralization-of-in-9ab065e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=6997d231d7880ec89b52f4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2820-sql-injection-in-fujian-smart-integr-6e17dc32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2820%3A%20SQL%20Injection%20in%20Fujian%20Smart%20Integrated%20Management%20Platform%20System&amp;severity=medium&amp;id=6997c421d7880ec89b4b332d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26065-cwe-22-improper-limitation-of-a-pat-53326093</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26065%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=6997c421d7880ec89b4b3324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26064-cwe-22-improper-limitation-of-a-pat-71d04e0e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26064%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=6997c421d7880ec89b4b3320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2819-missing-authorization-in-dromara-ruo-8f2bcf3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2819%3A%20Missing%20Authorization%20in%20Dromara%20RuoYi-Vue-Plus&amp;severity=medium&amp;id=6997c421d7880ec89b4b3328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26960-cwe-22-improper-limitation-of-a-pat-f4c7978c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26960%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=6997b995d7880ec89b49375c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26980-cwe-89-improper-neutralization-of-s-8eb7ae8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26980%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=critical&amp;id=6997b995d7880ec89b493764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26977-cwe-862-missing-authorization-in-fr-ffbb104f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26977%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frappe%20lms&amp;severity=medium&amp;id=6997b995d7880ec89b493761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26975-cwe-73-external-control-of-file-nam-f0001b29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26975%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20music-assistant%20server&amp;severity=high&amp;id=6997b28bd7880ec89b4763b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26974-cwe-829-inclusion-of-functionality--308fd3d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26974%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Tygo-van-den-Hurk%20Slyde&amp;severity=high&amp;id=6997b28bd7880ec89b4763ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30416-cwe-862-in-acronis-acronis-cyber-pr-18eb4836</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30416%3A%20CWE-862%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b4763a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30410-cwe-306-in-acronis-acronis-cyber-pr-860d526f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30410%3A%20CWE-306%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=critical&amp;id=6997b28bd7880ec89b47639b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30412-cwe-1390-in-acronis-acronis-cyber-p-987c0858</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30412%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b4763a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30411-cwe-1390-in-acronis-acronis-cyber-p-fb33b5b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30411%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b47639e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26967-cwe-122-heap-based-buffer-overflow--08daf09a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26967%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=6997b28bd7880ec89b4763a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-20-83513d60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-20&amp;severity=medium&amp;id=6998f951be58cf853be4de6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67438-na-a723b11f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67438%3A%20n%2Fa&amp;severity=medium&amp;id=6998ca03be58cf853bab9395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70831-na-fa79fcf8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70831%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9ffbe58cf853bab91d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26722-na-4b78286c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26722%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e7be58cf853bab82a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26721-na-eb123149</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26721%3A%20n%2Fa&amp;severity=high&amp;id=6998c9e7be58cf853bab829d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70833-na-f5cb3103</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70833%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e7be58cf853bab829a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26745-na-81cf31d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26745%3A%20n%2Fa&amp;severity=medium&amp;id=6998c9e6be58cf853bab77eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26747-na-b48669ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26747%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e6be58cf853bab77d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26746-na-0aa41fc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26746%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26725-na-693f5a50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26725%3A%20n%2Fa&amp;severity=critical&amp;id=69988bee2c4d84f260ae23db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26724-na-c05ea1f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26724%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26723-na-edc024f1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26723%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-20-dbe5a726</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-20&amp;severity=medium&amp;id=699848ea2c4d84f260df6052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-20-483261dc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-20&amp;severity=low&amp;id=6997bce2d7880ec89b49f57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26964-cwe-200-exposure-of-sensitive-infor-8aa0004f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26964%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20windmill-labs%20windmill&amp;severity=low&amp;id=6997a804d7880ec89b3e50e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26957-cwe-209-generation-of-error-message-7d2335a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26957%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20abhinavxd%20github.com%2Fabhinavxd%2Flibredesk&amp;severity=medium&amp;id=6997a0f9d7880ec89b3c537a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26959-cwe-829-inclusion-of-functionality--f5a9dc71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26959%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=69979d74d7880ec89b3b86a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2350-insertion-of-sensitive-information-i-31b4d7ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2350%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Interact&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1292-insertion-of-sensitive-information-i-909b0d7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1292%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Trends&amp;severity=medium&amp;id=699799f2d7880ec89b3a60be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2605-insertion-of-sensitive-information-i-48b70d08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2605%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20TanOS&amp;severity=medium&amp;id=699799f2d7880ec89b3a60ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2408-use-after-free-in-tanium-cloud-workl-a7d99991</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2408%3A%20Use%20After%20Free%20in%20Tanium%20Cloud%20Workloads&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2435-improper-neutralization-of-special-e-0dedcf2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2435%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tanium%20Asset&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26958-cwe-665-improper-initialization-in--5a8d8b28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26958%3A%20CWE-665%3A%20Improper%20Initialization%20in%20FiloSottile%20filippo.io%2Fedwards25519&amp;severity=low&amp;id=699799f2d7880ec89b3a60d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26953-cwe-20-improper-input-validation-in-8d5e6ff8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26953%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pi-hole%20web&amp;severity=medium&amp;id=699799f2d7880ec89b3a60cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26952-cwe-20-improper-input-validation-in-df9bf6c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26952%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pi-hole%20web&amp;severity=medium&amp;id=6997966bd7880ec89b39b1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1658-cwe-451-user-interface-ui-misreprese-a1f01e7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1658%3A%20CWE-451%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20OpenText%E2%84%A2%20Directory%20Services&amp;severity=medium&amp;id=6997966bd7880ec89b39b1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9208-cwe-79-improper-neutralization-of-in-929ee02c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=high&amp;id=6997966bd7880ec89b39b1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13671-cwe-352-cross-site-request-forgery--32f486e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13671%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=medium&amp;id=6997966bd7880ec89b39b1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13672-cwe-79-improper-neutralization-of-i-90740624</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=high&amp;id=6997966bd7880ec89b39b1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24122-cwe-295-improper-certificate-valida-6ee03aa4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24122%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sigstore%20cosign&amp;severity=low&amp;id=69978f65d7880ec89b384555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8054-cwe-22-improper-limitation-of-a-path-4a1532b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8054%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenText%E2%84%A2%20XM%20Fax&amp;severity=high&amp;id=69978f65d7880ec89b38454f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8055-cwe-918-server-side-request-forgery--f0ad7d95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8055%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenText%E2%84%A2%20XM%20Fax&amp;severity=medium&amp;id=69978f65d7880ec89b384552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21535-cwe-284-improper-access-control-in--009ed0d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21535%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Teams&amp;severity=high&amp;id=699812ae2c4d84f260aeb027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26275-cwe-354-improper-validation-of-inte-950dde7b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26275%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20junkurihara%20httpsig-rs&amp;severity=high&amp;id=699784dbd7880ec89b358466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26315-cwe-203-observable-discrepancy-in-e-62cd0e05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26315%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20ethereum%20go-ethereum&amp;severity=medium&amp;id=69978157d7880ec89b34978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26314-cwe-20-improper-input-validation-in-4cb96009</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26314%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ethereum%20go-ethereum&amp;severity=high&amp;id=69978157d7880ec89b349786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26313-cwe-770-allocation-of-resources-wit-4e11e521</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26313%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ethereum%20go-ethereum&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26312-cwe-770-allocation-of-resources-wit-7acc7255</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26312%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stalwartlabs%20stalwart&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27114-cwe-835-loop-with-unreachable-exit--1b68482c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27114%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27014-cwe-674-uncontrolled-recursion-in-m-f769ac9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27014%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699812af2c4d84f260aeb048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27476-improper-neutralization-of-special--c7ddf948</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27476%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Bixat%20RustFly&amp;severity=critical&amp;id=699812af2c4d84f260aeb05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26282-cwe-126-buffer-over-read-in-m2team--9d414d04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26282%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699812af2c4d84f260aeb044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27440-improper-neutralization-of-input-du-8b27954b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20myCred&amp;severity=medium&amp;id=699812af2c4d84f260aeb05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27387-missing-authorization-in-designinve-9c9522c2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27387%3A%20Missing%20Authorization%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=699812af2c4d84f260aeb057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27368-missing-authorization-in-seedprod-c-d0069c9f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27368%3A%20Missing%20Authorization%20in%20SeedProd%20Coming%20Soon%20Page%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20by%20SeedProd&amp;severity=medium&amp;id=699812af2c4d84f260aeb054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27360-improper-neutralization-of-input-du-2e9761ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010Web%20Photo%20Gallery%20by%2010Web&amp;severity=medium&amp;id=699812af2c4d84f260aeb051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27343-improper-control-of-filename-for-in-8ee1e181</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27343%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20VanKarWai%20Airtifact&amp;severity=high&amp;id=699812af2c4d84f260aeb04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27328-missing-authorization-in-devsblink--83eee8d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27328%3A%20Missing%20Authorization%20in%20DevsBlink%20EduBlink&amp;severity=medium&amp;id=699784dbd7880ec89b35847f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27327-missing-authorization-in-yaycommerc-2d0152ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27327%3A%20Missing%20Authorization%20in%20YayCommerce%20YayMail&amp;severity=medium&amp;id=699812af2c4d84f260aeb04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-threats-using-genai-usher-in-a-new-era-6e840891</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20threats%20using%20GenAI%20usher%20in%20a%20new%20era&amp;severity=medium&amp;id=69985e042c4d84f2604e723d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2738-cwe-131-incorrect-calculation-of-buf-20bc2c53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2738%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20OpenVPN%20ovpn-dco-win&amp;severity=medium&amp;id=699812b02c4d84f260aeb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26318-cwe-78-improper-neutralization-of-s-7d41b3c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26318%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=69978157d7880ec89b3497b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/under-the-hood-of-dynowiper-thu-feb-19th-48c2f7c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Under%20the%20Hood%20of%20DynoWiper%2C%20(Thu%2C%20Feb%2019th)&amp;severity=medium&amp;id=69976885d7880ec89b2d6bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26280-cwe-78-improper-neutralization-of-s-31a2a73c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26280%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=69978157d7880ec89b3497ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26278-cwe-776-improper-restriction-of-rec-355d55b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26278%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=69978157d7880ec89b3497a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27013-cwe-79-improper-neutralization-of-i-2ccb5e6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27013%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fabricjs%20fabric.js&amp;severity=high&amp;id=69978157d7880ec89b3497cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26267-cwe-670-always-incorrect-control-fl-d3fc9f12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26267%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20stellar%20rs-soroban-sdk&amp;severity=high&amp;id=69978157d7880ec89b3497a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26205-cwe-863-incorrect-authorization-in--708376a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26205%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20open-policy-agent%20opa-envoy-plugin&amp;severity=high&amp;id=69978157d7880ec89b34979b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26203-cwe-416-use-after-free-in-pjsip-pjm-a4f01553</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26203%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjmedia-video&amp;severity=medium&amp;id=69978157d7880ec89b349797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26201-cwe-362-concurrent-execution-using--74d92c70</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26201%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20jm33-m0%20emp3r0r&amp;severity=high&amp;id=69978157d7880ec89b349792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26200-cwe-122-heap-based-buffer-overflow--cf8f880a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26200%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HDFGroup%20hdf5&amp;severity=high&amp;id=699784dbd7880ec89b35847c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26189-cwe-78-improper-neutralization-of-s-0d1acbd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26189%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20aquasecurity%20trivy-action&amp;severity=medium&amp;id=699784dbd7880ec89b358477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26063-cwe-20-improper-input-validation-in-f84fe624</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26063%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20xpertforextradeinc%20CediPay&amp;severity=high&amp;id=699784dbd7880ec89b358474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26059-cwe-79-improper-neutralization-of-i-dec12dc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26059%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=low&amp;id=699784dbd7880ec89b358471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26057-cwe-668-exposure-of-resource-to-wro-3cb17f96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26057%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20cisco-ai-defense%20skill-scanner&amp;severity=medium&amp;id=699784dbd7880ec89b35846d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23621-cwe-203-observable-discrepancy-in-g-89bef3ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23621%3A%20CWE-203%20Observable%20Discrepancy%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23620-cwe-203-observable-discrepancy-in-g-00e9e3a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23620%3A%20CWE-203%20Observable%20Discrepancy%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23619-cwe-79-improper-neutralization-of-i-0ba70a1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23618-cwe-79-improper-neutralization-of-i-0f203b95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23617-cwe-79-improper-neutralization-of-i-1f682953</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23616-cwe-79-improper-neutralization-of-i-c76edad5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23616%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23615-cwe-79-improper-neutralization-of-i-836d7073</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23614-cwe-79-improper-neutralization-of-i-3647667c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23613-cwe-79-improper-neutralization-of-i-4d93243b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23612-cwe-79-improper-neutralization-of-i-6a6d684d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23611-cwe-79-improper-neutralization-of-i-7afa1f4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23610-cwe-79-improper-neutralization-of-i-baa9798b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23609-cwe-79-improper-neutralization-of-i-1ae29dc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23608-cwe-79-improper-neutralization-of-i-4186b949</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23607-cwe-79-improper-neutralization-of-i-d3ef599a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23606-cwe-79-improper-neutralization-of-i-ab3a8c9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23606%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2409-cwe-89-improper-neutralization-of-sp-62e3fd17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2409%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Delinea%20Cloud%20Suite&amp;severity=critical&amp;id=69975aafd7880ec89b287cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23605-cwe-79-improper-neutralization-of-i-7eeab11c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23605%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23604-cwe-79-improper-neutralization-of-i-883f38b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2243-out-of-bounds-read-in-red-hat-red-ha-6a33bed9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2243%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=69975aafd7880ec89b287cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2817-cwe-538-insertion-of-sensitive-infor-f124ebf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2817%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20VMware%20Spring%20Data%20Geode&amp;severity=medium&amp;id=69975ab1d7880ec89b287d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26339-cwe-918-server-side-request-forgery-f1de4ab8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26339%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=critical&amp;id=699747f4532dc41ff8925d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26338-cwe-918-server-side-request-forgery-b8fbc0b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26338%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=medium&amp;id=699747f4532dc41ff8925d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26337-cwe-36-absolute-path-traversal-in-h-328c4a75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26337%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=high&amp;id=699747f4532dc41ff8925d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2232-cwe-89-improper-neutralization-of-sp-42d3fb6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2232%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wcproducttable%20Product%20Table%20and%20List%20Builder%20for%20WooCommerce%20Lite&amp;severity=high&amp;id=699740bf3af16a0ef60c5452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1581-cwe-89-improper-neutralization-of-sp-1b58bb62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1581%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=699740bf3af16a0ef60c544c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26030-cwe-94-improper-control-of-generati-8c490551</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26030%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20microsoft%20semantic-kernel&amp;severity=critical&amp;id=69973b6be884a8a4cb409743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26336-cwe-863-incorrect-authorization-in--91415450</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26336%3A%20CWE-863%20Incorrect%20Authorization%20in%20Hyland%20Alfresco%20Enterprise&amp;severity=high&amp;id=69973b6be884a8a4cb409748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26016-cwe-639-authorization-bypass-throug-e8901bb1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26016%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pterodactyl%20panel&amp;severity=critical&amp;id=69973b6be884a8a4cb40973f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25998-cwe-323-reusing-a-nonce-key-pair-in-650a41e8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25998%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20strongswan%20strongMan&amp;severity=high&amp;id=69973b6be884a8a4cb40973c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25766-cwe-22-improper-limitation-of-a-pat-bf9abee8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25766%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20labstack%20echo&amp;severity=medium&amp;id=69973b6be884a8a4cb40974c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25940-cwe-116-improper-encoding-or-escapi-3b5e393d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25940%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69973033732724e9dc4fe1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/banners-bots-and-butchers-the-ai-driven-long-con-i-201d23f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Banners%2C%20Bots%20and%20Butchers%3A%20The%20AI-Driven%20Long%20Con%20in%20Asia&amp;severity=medium&amp;id=69974c64d7880ec89b0185a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns-used-to-hide-fake-investment-platform-schemes-6f0a62ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS%20Used%20to%20Hide%20Fake%20Investment%20Platform%20Schemes&amp;severity=medium&amp;id=69974fe8d7880ec89b065c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-malicious-cryptocurrency-scam-domains-a-3f601d65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Malicious%20Cryptocurrency%20Scam%20Domains%20and%20Hacked%20YouTube%20Channels&amp;severity=medium&amp;id=69974fe8d7880ec89b065c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-in-action-how-fake-captcha-can-encrypt-an-cb7d2d98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20in%20action%3A%20how%20fake%20captcha%20can%20encrypt%20an%20entire%20company&amp;severity=medium&amp;id=69974fe8d7880ec89b065be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-homebrew-pages-deliver-cuckoo-stealer-via-cli-06fd4ca1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Homebrew%20Pages%20Deliver%20Cuckoo%20Stealer%20via%20ClickFix%20%7C%20macOS%20Threat%20Hunting%20Analysis&amp;severity=medium&amp;id=69974fe8d7880ec89b065bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-curious-case-of-the-triton-malware-fork-7ad7ab52</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Curious%20Case%20of%20the%20Triton%20Malware%20Fork&amp;severity=medium&amp;id=69974fe8d7880ec89b065bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invitation-to-trouble-the-rise-of-calendar-phishin-a8d550c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invitation%20to%20Trouble%3A%20The%20Rise%20of%20Calendar%20Phishing%20Attacks&amp;severity=medium&amp;id=69974fe8d7880ec89b065bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2274-cwe-918-server-side-request-forgery--9b739968</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2274%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20AppSheet%20AppSheet%20Web%20(Main%20Server)&amp;severity=high&amp;id=69973033732724e9dc4fe1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-government-says-12-million-bank-accounts-ex-c8159355</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Government%20Says%201.2%20Million%20Bank%20Accounts%20Exposed%20in%20Breach&amp;severity=medium&amp;id=699727c07e7f1adb9b09d85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71250-37952455</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71250&amp;severity=null&amp;id=699812b02c4d84f260aeb08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71249-9c5c2bd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71249&amp;severity=null&amp;id=699812b02c4d84f260aeb08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71248-06ef444d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71248&amp;severity=null&amp;id=699812b02c4d84f260aeb08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71247-6402c740</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71247&amp;severity=null&amp;id=699812b02c4d84f260aeb088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71246-69173469</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71246&amp;severity=null&amp;id=69973033732724e9dc4fe1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71245-8ab54884</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71245&amp;severity=null&amp;id=69973033732724e9dc4fe1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71243-improper-control-of-generation-of-c-2638c8dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71243%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20Saisies%20pour%20formulaire&amp;severity=critical&amp;id=69972933732724e9dc4156ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25755-cwe-94-improper-control-of-generati-50f78405</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25755%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20parallax%20jsPDF&amp;severity=high&amp;id=6997264f5215391843713250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25535-cwe-400-uncontrolled-resource-consu-f7e35d0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25535%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20parallax%20jsPDF&amp;severity=high&amp;id=6997264f521539184371324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25527-cwe-22-improper-limitation-of-a-pat-fbd70c8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25527%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=6997227c0018ac3e97d29273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2744-a-blind-time-based-sql-injection-exi-c9474617</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2744&amp;severity=null&amp;id=699718e0b557332a80facb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nearly-1-million-user-records-compromised-in-figur-3dddb4f0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nearly%201%20Million%20User%20Records%20Compromised%20in%20Figure%20Data%20Breach&amp;severity=medium&amp;id=69970e21b557332a80f47921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-exploitation-surges-as-zero-day-attacks-tra-6b929eb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Exploitation%20Surges%20as%20Zero-Day%20Attacks%20Traced%20Back%20to%20July%202025&amp;severity=medium&amp;id=6996fcc88fb9188dea8dc9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9953-cwe-566-authorization-bypass-through-d2732060</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9953%3A%20CWE-566%20Authorization%20Bypass%20Through%20User-Controlled%20SQL%20Primary%20Key%20in%20DATABASE%20Software%20Training%20Consulting%20Ltd.%20Databank%20Accreditation%20Software&amp;severity=critical&amp;id=6996fd118fb9188dea8e12c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-exposure-to-exploitation-how-ai-collapses-you-4f26d7b1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Exposure%20to%20Exploitation%3A%20How%20AI%20Collapses%20Your%20Response%20Window&amp;severity=low&amp;id=6996fcb68fb9188dea8dba1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8350-cwe-698-execution-after-redirect-ear-309eb7b7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8350%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20Inrove%20Software%20and%20Internet%20Services%20BiEticaret%20CMS&amp;severity=critical&amp;id=6996f9728fb9188dea8891b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-targets-a-variety-of-data-offers-a-3dad42b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arkanix%20Stealer%20targets%20a%20variety%20of%20data%2C%20offers%20a%20MaaS%20referral%20program&amp;severity=medium&amp;id=69970717b557332a80d468e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dont-trustconnect-its-a-rat-in-an-rmm-hat-b510e7bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=(Don&apos;t)%20TrustConnect%3A%20It&apos;s%20a%20RAT%20in%20an%20RMM%20hat&amp;severity=medium&amp;id=69970717b557332a80d468cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-malicious-oauth-campaigns-in-entra-id-98390171</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Malicious%20OAuth%20Campaigns%20in%20Entra%20ID&amp;severity=medium&amp;id=69970717b557332a80d4689b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-iptv-app-terminates-your-savings-9a8666f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20your%20IPTV%20app%20terminates%20your%20savings&amp;severity=medium&amp;id=69970717b557332a80d468c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15563-cwe-862-missing-authorization-in-ne-95441c78</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15563%3A%20CWE-862%20Missing%20Authorization%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=medium&amp;id=6996efe46aea4a407a546d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-security-issues-continue-as-secureclaw-op-ca5db0ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Security%20Issues%20Continue%20as%20SecureClaw%20Open%20Source%20Tool%20Debuts&amp;severity=medium&amp;id=6996ef9e6aea4a407a546318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9062-cwe-639-authorization-bypass-through-3859c6ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9062%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MeCODE%20Informatics%20and%20Engineering%20Services%20Ltd.%20Envanty&amp;severity=high&amp;id=6996efe46aea4a407a546d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15562-cwe-79-improper-neutralization-of-i-8a71ee5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15562%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=medium&amp;id=6996efe46aea4a407a546d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15561-cwe-269-improper-privilege-manageme-7dcf7ca4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15561%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=high&amp;id=6996efe46aea4a407a546d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15560-cwe-89-improper-neutralization-of-s-f69ba2aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15560%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=high&amp;id=6996efe46aea4a407a546d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15559-cwe-78-improper-neutralization-of-s-b731eacc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15559%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=critical&amp;id=6996efe46aea4a407a546d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13590-vulnerability-in-wso2-wso2-api-mana-b8162e66</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13590%3A%20Vulnerability%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=6996e1c36aea4a407a50ab8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12107-cwe-1336-improper-neutralization-of-29bfd138</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12107%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=high&amp;id=6996e1c36aea4a407a50ab8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1219-cwe-639-authorization-bypass-through-443dcd1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1219%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2718-cwe-79-improper-neutralization-of-in-6113053f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2718%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dealia%20Dealia%20%E2%80%93%20Request%20a%20quote&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2716-cwe-79-improper-neutralization-of-in-872e7bb2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2716%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amu02aftab%20Client%20Testimonial%20Slider&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1461-cwe-230-improper-handling-of-missing-fe7cd9e2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1461%3A%20CWE-230%20Improper%20Handling%20of%20Missing%20Values%20in%20wpinsider-1%20Simple%20Membership&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22267-cwe-266-incorrect-privilege-assignm-254d0ded</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22267%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=6996fb458fb9188dea8c0109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/german-rail-giant-deutsche-bahn-hit-by-large-scale-ea70538e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=German%20Rail%20Giant%20Deutsche%20Bahn%20Hit%20by%20Large-Scale%20DDoS%20Attack&amp;severity=medium&amp;id=6996d7026aea4a407a4de64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22268-cwe-266-incorrect-privilege-assignm-7bfe1e59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22268%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996fb458fb9188dea8c010c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22266-cwe-146-improper-neutralization-of--6efabe7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22266%3A%20CWE-146%3A%20Improper%20Neutralization%20of%20Expression%2FCommand%20Delimiters%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996fb458fb9188dea8c0105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22269-cwe-940-improper-verification-of-so-b7ee7e18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22269%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41023-cwe-287-improper-authentication-in--2613c504</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41023%3A%20CWE-287%20Improper%20Authentication%20in%20Thesamur%20AutoGPT&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26358-cwe-862-missing-authorization-in-de-3cb4a373</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26358%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d42f6aea4a407a4d2c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40697-cwe-79-improper-neutralization-of-i-be69e57f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lewe%20WebMeasure&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26360-cwe-73-external-control-of-file-nam-58de98ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26360%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d0406aea4a407a4bdbf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2736-cwe-79-improper-neutralization-of-in-36538f08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alkacon%20OpenCms&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-via-google-tasks-kaspersky-official-blog-67986fba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20via%20Google%20Tasks%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6996cce46aea4a407a4aeea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2735-cwe-79-improper-neutralization-of-in-2caebd8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alkacon%20OpenCms&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26359-cwe-73-external-control-of-file-nam-3c2b5529</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26359%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d0406aea4a407a4bdbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27094-improper-neutralization-of-input-du-3a6ce8ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoDaddy%20CoBlocks&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27092-missing-authorization-in-greg-winia-42c235cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27092%3A%20Missing%20Authorization%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27090-cross-site-request-forgery-csrf-in--21629815</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27090%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Moose%20Kenta%20Companion&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27074-improper-neutralization-of-input-du-ec830fd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27074%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vaakash%20Shortcoder&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27069-improper-neutralization-of-input-du-d5ac6a7b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27069%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Soledad&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27066-missing-authorization-in-pi-web-sol-a04d8bc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27066%3A%20Missing%20Authorization%20in%20PI%20Web%20Solution%20Live%20sales%20notification%20for%20WooCommerce&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27059-improper-neutralization-of-input-du-800fcc52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Recipe&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27058-improper-neutralization-of-input-du-3546c209</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Podcast&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27057-improper-neutralization-of-input-du-558cfaf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Filter%20Everything&amp;severity=medium&amp;id=6996d0406aea4a407a4bdc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27055-missing-authorization-in-pencidesig-c4c69316</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27055%3A%20Missing%20Authorization%20in%20PenciDesign%20Penci%20AI%20SmartContent%20Creator&amp;severity=medium&amp;id=6996d0406aea4a407a4bdc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27052-improper-control-of-filename-for-in-edeeece4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20villatheme%20Sales%20Countdown%20Timer%20for%20WooCommerce%20and%20WordPress&amp;severity=high&amp;id=6996d0406aea4a407a4bdc00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27050-cross-site-request-forgery-csrf-in--8fabd6ee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27050%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20RealPress&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27042-missing-authorization-in-wpdevelope-0b951907</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27042%3A%20Missing%20Authorization%20in%20WPDeveloper%20NotificationX&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25473-missing-authorization-in-aa-team-wz-2422b9e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25473%3A%20Missing%20Authorization%20in%20AA-Team%20WZone&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25472-improper-neutralization-of-input-du-bcf2c1a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25463-improper-neutralization-of-input-du-be7e3ad9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WpEstate%20Wpresidence%20Core&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25459-missing-authorization-in-uixthemes--73feec42</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25459%3A%20Missing%20Authorization%20in%20uixthemes%20Sober&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25453-improper-neutralization-of-input-du-b9e30016</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25453%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25451-improper-neutralization-of-input-du-15b76c39</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25432-improper-neutralization-of-input-du-72dd3094</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25432%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25428-server-side-request-forgery-ssrf-in-7cc51cd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25428%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20totalsoft%20TS%20Poll&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25423-missing-authorization-in-creativein-e1c95667</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25423%3A%20Missing%20Authorization%20in%20creativeinteractivemedia%20Real%203D%20FlipBook&amp;severity=low&amp;id=6996d03e6aea4a407a4bdbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25422-cross-site-request-forgery-csrf-in--259d5f65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25422%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themes4WP%20Popularis%20Extra&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25419-missing-authorization-in-flycart-up-adad61a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25419%3A%20Missing%20Authorization%20in%20flycart%20UpsellWP&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25418-improper-neutralization-of-special--7990e464</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25418%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bit%20Apps%20Bit%20Form&amp;severity=high&amp;id=6996d03e6aea4a407a4bdbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25416-missing-authorization-in-blazetheme-79a5f340</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25416%3A%20Missing%20Authorization%20in%20blazethemes%20News%20Kit%20Elementor%20Addons&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25415-missing-authorization-in-iqonicdesi-646705f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25415%3A%20Missing%20Authorization%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25412-missing-authorization-in-mdempfle-a-ec684b57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25412&amp;severity=null&amp;id=6996d03d6aea4a407a4bdb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25411-cross-site-request-forgery-csrf-in--180d3fa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25411%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themastercut%20Revision%20Manager%20TMC&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25410-missing-authorization-in-tstephenso-4b7b85ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25410%3A%20Missing%20Authorization%20in%20tstephenson%20WP-CORS&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25409-missing-authorization-in-crgeary-ja-dfc92e7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25409%3A%20Missing%20Authorization%20in%20crgeary%20JAMstack%20Deployments&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25408-missing-authorization-in-pluginrx-b-dba145e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25408%3A%20Missing%20Authorization%20in%20PluginRx%20Broken%20Link%20Notifier&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25404-missing-authorization-in-automattic-4e8ade6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25404%3A%20Missing%20Authorization%20in%20Automattic%20WP%20Job%20Manager&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25402-missing-authorization-in-echoplugin-d048715d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25402%3A%20Missing%20Authorization%20in%20echoplugins%20Knowledge%20Base%20for%20Documentation%2C%20FAQs%20with%20AI%20Assistance&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25399-missing-authorization-in-cryoutcrea-06781103</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25399%3A%20Missing%20Authorization%20in%20CryoutCreations%20Serious%20Slider&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25395-missing-authorization-in-ikreatethe-1b5ad1e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25395%3A%20Missing%20Authorization%20in%20ikreatethemes%20Business%20Roy&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25394-missing-authorization-in-sparklewpt-6fa71379</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25394%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Fitness%20FSE&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25393-missing-authorization-in-sparklewpt-e54b2b2e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25393%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Hello%20FSE&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25392-url-redirection-to-untrusted-site-o-073f2a0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25392%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20KaizenCoders%20Update%20URLs%20%26%238211%3B%20Quick%20and%20Easy%20way%20to%20search%20old%20links%20and%20replace%20them%20with%20new%20links%20in%20WordPress&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25391-missing-authorization-in-wp-grids-w-7ee36a35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25391%3A%20Missing%20Authorization%20in%20WP%20Grids%20WP%20Wand&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25389-exposure-of-sensitive-system-inform-28856952</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25389%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25388-missing-authorization-in-scripteo-a-1c6db8df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25388%3A%20Missing%20Authorization%20in%20scripteo%20Ads%20Pro&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25387-missing-authorization-in-elementor--19a8b174</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25387%3A%20Missing%20Authorization%20in%20Elementor%20Image%20Optimizer%20by%20Elementor&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25386-missing-authorization-in-elementor--08435fd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25386%3A%20Missing%20Authorization%20in%20Elementor%20Ally&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25385-server-side-request-forgery-ssrf-in-61b3efa0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25385%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20KaizenCoders%20URL%20Shortify&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25384-missing-authorization-in-wp-lab-wp--d641c9ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25384%3A%20Missing%20Authorization%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25378-improper-neutralization-of-special--1061033a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25378%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=high&amp;id=6996d03b6aea4a407a4bdb4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25375-missing-authorization-in-wp-chill-i-b047d8e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25375%3A%20Missing%20Authorization%20in%20WP%20Chill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25374-missing-authorization-in-raratheme--ff689366</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25374%3A%20Missing%20Authorization%20in%20raratheme%20Spa%20and%20Salon&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25372-missing-authorization-in-kodezen-ll-d79d483e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25372%3A%20Missing%20Authorization%20in%20Kodezen%20LLC%20Academy%20LMS&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25370-missing-authorization-in-aresit-wp--e21e150e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25370%3A%20Missing%20Authorization%20in%20AresIT%20WP%20Compress&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25368-missing-authorization-in-codepeople-22306e55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25368%3A%20Missing%20Authorization%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25367-missing-authorization-in-nootheme-c-d914e208</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25367%3A%20Missing%20Authorization%20in%20NooTheme%20CitiLights&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25364-missing-authorization-in-boldgrid-c-f7a39e1e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25364%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25363-missing-authorization-in-fooplugins-d6a0900a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25363%3A%20Missing%20Authorization%20in%20FooPlugins%20FooGallery&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25362-improper-neutralization-of-input-du-64f8da8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FooPlugins%20FooGallery&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25348-missing-authorization-in-alttextai--401d8de9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25348%3A%20Missing%20Authorization%20in%20alttextai%20Download%20Alt%20Text%20AI&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25343-improper-neutralization-of-input-du-ac41061b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VeronaLabs%20WP%20SMS&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25338-missing-authorization-in-ays-pro-ai-66c38245</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25338%3A%20Missing%20Authorization%20in%20Ays%20Pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25337-cross-site-request-forgery-csrf-in--8313170b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25337%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcoachify%20Coachify&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25336-missing-authorization-in-wpcoachify-998f5918</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25336%3A%20Missing%20Authorization%20in%20wpcoachify%20Coachify&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25335-missing-authorization-in-ays-pro-se-2ea44f1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25335%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25333-missing-authorization-in-peregrinet-3c853645</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25333%3A%20Missing%20Authorization%20in%20peregrinethemes%20Shopwell&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25332-missing-authorization-in-fahad-mahm-6ec6ce9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25332%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20Endless%20Posts%20Navigation&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25331-improper-neutralization-of-input-du-aa7a8b7f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25331%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Melapress%20WP%20Activity%20Log&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25330-missing-authorization-in-publishpre-b3ec89fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25330%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Authors&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25329-missing-authorization-in-expresstec-12fd90b8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25329%3A%20Missing%20Authorization%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=6996d0396aea4a407a4bdabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25326-improper-control-of-filename-for-in-65619dcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=high&amp;id=6996d0396aea4a407a4bdabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25325-exposure-of-sensitive-system-inform-6f27c875</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25325%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20rtCamp%20rtMedia%20for%20WordPress%2C%20BuddyPress%20and%20bbPress&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25324-authorization-bypass-through-user-c-e4d41ddb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25324%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25323-missing-authorization-in-mika-osm-a88b9dab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25323%3A%20Missing%20Authorization%20in%20MiKa%20OSM&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25322-cross-site-request-forgery-csrf-in--04f4991e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25322%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PublishPress%20PublishPress%20Revisions&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25321-missing-authorization-in-psm-plugin-d65c99a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25321%3A%20Missing%20Authorization%20in%20PSM%20Plugins%20SupportCandy&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25320-missing-authorization-in-cool-plugi-2a32e607</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25320%3A%20Missing%20Authorization%20in%20Cool%20Plugins%20Elementor%20Contact%20Form%20DB&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25319-cross-site-request-forgery-csrf-in--3b15fc23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25319%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpzita%20Zita%20Elementor%20Site%20Library&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25318-missing-authorization-in-wisernotif-3f7bb303</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25318%3A%20Missing%20Authorization%20in%20Wisernotify%20team%20WiserReview%20Product%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25316-deserialization-of-untrusted-data-i-59087cd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25316%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Brainstorm%20Force%20CartFlows&amp;severity=high&amp;id=6996d0386aea4a407a4bda8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25315-missing-authorization-in-hcaptcha-h-07a34daf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25315%3A%20Missing%20Authorization%20in%20hcaptcha%20hCaptcha%20for%20WP&amp;severity=medium&amp;id=6996d0386aea4a407a4bda8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25314-missing-authorization-in-wp-messiah-0418239d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25314%3A%20Missing%20Authorization%20in%20WP%20Messiah%20TOP%20Table%20Of%20Contents&amp;severity=medium&amp;id=6996d0386aea4a407a4bda89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25313-missing-authorization-in-shahjahan--0f6ad9ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25313%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20FluentForm&amp;severity=medium&amp;id=6996d0386aea4a407a4bda86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25311-missing-authorization-in-10up-autos-33062f6f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25311%3A%20Missing%20Authorization%20in%2010up%20Autoshare%20for%20Twitter&amp;severity=medium&amp;id=6996d0386aea4a407a4bda83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25310-server-side-request-forgery-ssrf-in-6d72ac77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25310%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Alobaidi%20Extend%20Link&amp;severity=medium&amp;id=6996d0386aea4a407a4bda80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25308-missing-authorization-in-wpinsider--0b8f7c9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25308%3A%20Missing%20Authorization%20in%20wp.insider%20Simple%20Membership&amp;severity=medium&amp;id=6996d0386aea4a407a4bda7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25307-improper-neutralization-of-input-du-6dbcd956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=medium&amp;id=6996d0386aea4a407a4bda7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25305-improper-neutralization-of-input-du-f5beaf43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore&amp;severity=medium&amp;id=6996d0386aea4a407a4bda77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25008-insertion-of-sensitive-information--0dd2307c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25008%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shahjahan%20Jewel%20Ninja%20Tables&amp;severity=medium&amp;id=6996d0386aea4a407a4bda74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25006-improper-neutralization-of-script-r-5b622005</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25006%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%208theme%20XStore&amp;severity=medium&amp;id=6996d0376aea4a407a4bda51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25005-authorization-bypass-through-user-c-6404975d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25005%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=medium&amp;id=6996d0376aea4a407a4bda4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25004-improper-neutralization-of-input-du-60d5840d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Business%20Directory&amp;severity=medium&amp;id=6996d0376aea4a407a4bda4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25003-missing-authorization-in-madalinung-0b9b2d3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25003%3A%20Missing%20Authorization%20in%20madalin.ungureanu%20Client%20Portal&amp;severity=medium&amp;id=6996d0376aea4a407a4bda48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25000-missing-authorization-in-kraft-plug-cd5f9376</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25000%3A%20Missing%20Authorization%20in%20Kraft%20Plugins%20Wheel%20of%20Life&amp;severity=medium&amp;id=6996d0376aea4a407a4bda45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24392-improper-neutralization-of-input-du-94e77840</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nabil%20Lemsieh%20HurryTimer&amp;severity=medium&amp;id=6996d0376aea4a407a4bda42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24375-missing-authorization-in-wp-swings--9db90c65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24375%3A%20Missing%20Authorization%20in%20WP%20Swings%20Ultimate%20Gift%20Cards%20For%20WooCommerce&amp;severity=medium&amp;id=6996d0376aea4a407a4bda3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23805-improper-neutralization-of-special--a345d836</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23805%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yoren%20Chang%20Media%20Search%20Enhanced&amp;severity=high&amp;id=6996d0376aea4a407a4bda3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23804-missing-authorization-in-bbr-plugin-8011aa53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23804%3A%20Missing%20Authorization%20in%20BBR%20Plugins%20Better%20Business%20Reviews&amp;severity=medium&amp;id=6996d0376aea4a407a4bda39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23803-server-side-request-forgery-ssrf-in-8ac5dfee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23803%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Burhan%20Nasir%20Smart%20Auto%20Upload%20Images&amp;severity=medium&amp;id=6996d0376aea4a407a4bda36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23549-deserialization-of-untrusted-data-i-f6de6946</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23549%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=critical&amp;id=6996d0366aea4a407a4bd9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23548-missing-authorization-in-designinve-984efe83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23548%3A%20Missing%20Authorization%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23547-missing-authorization-in-cmsmasters-b7a3c615</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23547%3A%20Missing%20Authorization%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=high&amp;id=6996d0366aea4a407a4bd9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23545-missing-authorization-in-arubait-de-8215f625</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23545%3A%20Missing%20Authorization%20in%20Aruba.it%20Dev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23544-deserialization-of-untrusted-data-i-d501051b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23544%3A%20Deserialization%20of%20Untrusted%20Data%20in%20codetipi%20Valenti&amp;severity=high&amp;id=6996d0366aea4a407a4bd9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23543-missing-authorization-in-wpdevelope-5a26a14b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23543%3A%20Missing%20Authorization%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23542-deserialization-of-untrusted-data-i-3e8b78cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23542%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=critical&amp;id=6996d0366aea4a407a4bd9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23541-missing-authorization-in-wpfunnels--ff68d94b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23541%3A%20Missing%20Authorization%20in%20WPFunnels%20Mail%20Mint&amp;severity=null&amp;id=6996d0366aea4a407a4bd9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22422-improper-neutralization-of-script-r-4517dc58</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22422%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpeverest%20Everest%20Forms&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22333-deserialization-of-untrusted-data-i-bb2e8d62</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22333%3A%20Deserialization%20of%20Untrusted%20Data%20in%20YITHEMES%20YITH%20WooCommerce%20Compare&amp;severity=high&amp;id=6996d0366aea4a407a4bd9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26362-cwe-23-relative-path-traversal-in-d-60ca4fba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26362%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996c9266aea4a407a4971ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27056-missing-authorization-in-stellarwp--ebd4b79e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27056%3A%20Missing%20Authorization%20in%20StellarWP%20iThemes%20Sync&amp;severity=medium&amp;id=6996c9266aea4a407a4971f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26361-cwe-73-external-control-of-file-nam-1088a3e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26361%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=medium&amp;id=6996c9266aea4a407a4971eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2733-improper-authorization-in-red-hat-re-a42563f2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2733%3A%20Improper%20Authorization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=6996c21f6aea4a407a46d597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2711-server-side-request-forgery-in-zhuto-56075871</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2711%3A%20Server-Side%20Request%20Forgery%20in%20zhutoutoutousan%20worldquant-miner&amp;severity=medium&amp;id=6996be9a6aea4a407a45caee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2681-out-of-bounds-write-2d36b40a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2681%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=6996b7926aea4a407a43b2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1994-cwe-269-improper-privilege-managemen-8fe39267</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1994%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=critical&amp;id=6996b7926aea4a407a43b2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2731-cwe-22-improper-limitation-of-a-path-c618341d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2731%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DynamicWeb%20DynamicWeb%209&amp;severity=critical&amp;id=6996b7926aea4a407a43b2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2709-open-redirect-in-busy-b1beee0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2709%3A%20Open%20Redirect%20in%20busy&amp;severity=medium&amp;id=6996b08a6aea4a407a42042b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2706-sql-injection-in-code-projects-patie-e3cc38fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2706%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6996fb458fb9188dea8c0110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2705-out-of-bounds-read-in-open-babel-27ebd2a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2705%3A%20Out-of-Bounds%20Read%20in%20Open%20Babel&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0722-cwe-89-improper-neutralization-of-sp-6a47f717</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0722%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f56aea4a407a3be0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13851-cwe-269-improper-privilege-manageme-f596f457</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13851%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20scriptsbundle%20Buyent&amp;severity=critical&amp;id=699697f36aea4a407a3be048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1373-cwe-79-improper-neutralization-of-in-539fb955</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1373%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lawsonry%20Easy%20Author%20Image&amp;severity=medium&amp;id=699697f56aea4a407a3be103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2284-cwe-862-missing-authorization-in-web-0ddb2ff6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2284%3A%20CWE-862%20Missing%20Authorization%20in%20webangon%20News%20Element%20Elementor%20Blog%20Magazine&amp;severity=medium&amp;id=699697f66aea4a407a3be124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1455-cwe-352-cross-site-request-forgery-c-03feb7a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1455%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20whatsiplus%20Whatsiplus%20Scheduled%20Notification%20for%20Woocommerce&amp;severity=medium&amp;id=699697f66aea4a407a3be115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14445-cwe-79-improper-neutralization-of-i-3ef243b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20levantoan%20Image%20Hotspot%20by%20DevVN&amp;severity=medium&amp;id=699697f46aea4a407a3be08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0926-cwe-98-improper-control-of-filename--2995b72c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0926%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20prodigycommerce%20Prodigy%20Commerce&amp;severity=critical&amp;id=699697f56aea4a407a3be0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14357-cwe-862-missing-authorization-in-mi-278742bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14357%3A%20CWE-862%20Missing%20Authorization%20in%20misbahwp%20Mega%20Store%20Woocommerce&amp;severity=medium&amp;id=699697f46aea4a407a3be082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0561-cwe-79-improper-neutralization-of-in-0930a715</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0561%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f56aea4a407a3be0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2504-cwe-862-missing-authorization-in-dea-a89224cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2504%3A%20CWE-862%20Missing%20Authorization%20in%20dealia%20Dealia%20%E2%80%93%20Request%20a%20quote&amp;severity=medium&amp;id=699697f66aea4a407a3be130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14452-cwe-79-improper-neutralization-of-i-7f77f351</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bompus%20WP%20Customer%20Reviews&amp;severity=high&amp;id=699697f46aea4a407a3be090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14983-cwe-79-improper-neutralization-of-i-a51c85ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mattkeys%20Advanced%20Custom%20Fields%3A%20Font%20Awesome%20Field&amp;severity=medium&amp;id=699697f46aea4a407a3be0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14167-cwe-352-cross-site-request-forgery--c7484d26</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14167%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20akshayshah5189%20Remove%20Post%20Type%20Slug&amp;severity=medium&amp;id=699697f36aea4a407a3be05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0974-cwe-862-missing-authorization-in-ord-71118a8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0974%3A%20CWE-862%20Missing%20Authorization%20in%20orderable%20Orderable%20%E2%80%93%20WordPress%20Restaurant%20Online%20Ordering%20System%20and%20Food%20Ordering%20Plugin&amp;severity=high&amp;id=699697f56aea4a407a3be0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14270-cwe-862-missing-authorization-in-wa-38c78435</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14270%3A%20CWE-862%20Missing%20Authorization%20in%20walterpinem%20OneClick%20Chat%20to%20Order&amp;severity=low&amp;id=699697f36aea4a407a3be063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13563-cwe-269-improper-privilege-manageme-f316666c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13563%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20BuddhaThemes%20Lizza%20LMS%20Pro&amp;severity=critical&amp;id=699697f26aea4a407a3bdfcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14851-cwe-79-improper-neutralization-of-i-e9a8e67b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yhunter%20YaMaps%20for%20WordPress%20Plugin&amp;severity=medium&amp;id=699697f46aea4a407a3be099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1044-cwe-79-improper-neutralization-of-in-690d4bbf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20renoiriii%20Tennis%20Court%20Bookings&amp;severity=medium&amp;id=699697f56aea4a407a3be0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14427-cwe-862-missing-authorization-in-pa-7cdb0948</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14427%3A%20CWE-862%20Missing%20Authorization%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f46aea4a407a3be087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14864-cwe-862-missing-authorization-in-vi-94f7408f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14864%3A%20CWE-862%20Missing%20Authorization%20in%20virusdie%20Virusdie%20%E2%80%93%20One-click%20website%20security&amp;severity=medium&amp;id=699697f46aea4a407a3be09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13091-cwe-15-external-control-of-system-o-14fb2f77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13091%3A%20CWE-15%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20wpfable%20Shopire&amp;severity=medium&amp;id=699697f26aea4a407a3bdfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13603-cwe-862-missing-authorization-in-hu-8ad3cb73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13603%3A%20CWE-862%20Missing%20Authorization%20in%20husainali52%20WP%20AUDIO%20GALLERY&amp;severity=high&amp;id=699697f26aea4a407a3bdfd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1043-cwe-79-improper-neutralization-of-in-b68931d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gagan0123%20PostmarkApp%20Email%20Integrator&amp;severity=medium&amp;id=699697f56aea4a407a3be0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14076-cwe-79-improper-neutralization-of-i-805923c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icount%20iXML%20%E2%80%93%20Google%20XML%20sitemap%20generator&amp;severity=medium&amp;id=699697f36aea4a407a3be059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14342-cwe-862-missing-authorization-in-ci-3aae7fa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14342%3A%20CWE-862%20Missing%20Authorization%20in%20cifi%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=medium&amp;id=699697f36aea4a407a3be073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0549-cwe-79-improper-neutralization-of-in-d3b6a94d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0549%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itthinx%20Groups&amp;severity=medium&amp;id=699697f46aea4a407a3be0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13738-cwe-79-improper-neutralization-of-i-3e3a57ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13738%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Easy%20Table%20of%20Contents&amp;severity=medium&amp;id=699697f36aea4a407a3be03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13438-cwe-352-cross-site-request-forgery--f9da7b26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13438%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dienodigital%20Page%20Title%2C%20Description%20%26%20Open%20Graph%20Updater&amp;severity=medium&amp;id=699697f26aea4a407a3bdfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0556-cwe-79-improper-neutralization-of-in-77332a23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0556%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ishitaka%20XO%20Event%20Calendar&amp;severity=medium&amp;id=699697f56aea4a407a3be0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1047-cwe-79-improper-neutralization-of-in-0644c054</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1047%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goback2%20salavat%20counter%20Plugin&amp;severity=medium&amp;id=699697f56aea4a407a3be0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13842-cwe-639-authorization-bypass-throug-14905ddc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13842%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mtekk%20Breadcrumb%20NavXT&amp;severity=medium&amp;id=699697f36aea4a407a3be043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13864-cwe-862-missing-authorization-in-cl-6b00292c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13864%3A%20CWE-862%20Missing%20Authorization%20in%20cloudways%20Breeze%20Cache&amp;severity=medium&amp;id=699697f36aea4a407a3be04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13617-cwe-79-improper-neutralization-of-i-ef5a0727</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apollo13themes%20Apollo13%20Framework%20Extensions&amp;severity=medium&amp;id=699697f26aea4a407a3bdfe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4521-cwe-285-improper-authorization-in-th-365d2771</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4521%3A%20CWE-285%20Improper%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=high&amp;id=699697f46aea4a407a3be0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2282-cwe-79-improper-neutralization-of-in-6abaa2ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2282%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hollandben%20Slidorion&amp;severity=medium&amp;id=699697f66aea4a407a3be11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12975-cwe-862-missing-authorization-in-wa-022d7735</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12975%3A%20CWE-862%20Missing%20Authorization%20in%20wahid0003%20Product%20Feed%20Manager%20for%20WooCommerce%20%E2%80%93%20CTX%20Feed%20%E2%80%93%20Support%20220%2B%20Shopping%20%26%20Social%20Channels&amp;severity=high&amp;id=699697f26aea4a407a3bdfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0912-cwe-269-improper-privilege-managemen-d24351a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0912%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20toret%20Toret%20Manager&amp;severity=high&amp;id=699697f56aea4a407a3be0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13612-cwe-79-improper-neutralization-of-i-dce9e05b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20essentialplugin%20Album%20and%20Image%20Gallery%20Plus%20Lightbox&amp;severity=medium&amp;id=699697f26aea4a407a3bdfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1405-cwe-434-unrestricted-upload-of-file--bdda35a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1405%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20franchidesign%20Slider%20Future&amp;severity=critical&amp;id=699697f66aea4a407a3be111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13930-cwe-862-missing-authorization-in-qu-74a5a47a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13930%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Checkout%20Field%20Manager%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=medium&amp;id=699697f36aea4a407a3be053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1646-cwe-79-improper-neutralization-of-in-e044dc38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iamjaydip%20Advance%20Block%20Extend&amp;severity=medium&amp;id=699697f66aea4a407a3be11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15041-cwe-862-missing-authorization-in-wp-57795334</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15041%3A%20CWE-862%20Missing%20Authorization%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=high&amp;id=699697f46aea4a407a3be0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14294-cwe-306-missing-authentication-for--b729fef3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14294%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20razorpay%20Razorpay%20for%20WooCommerce&amp;severity=medium&amp;id=699697f36aea4a407a3be06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13413-cwe-352-cross-site-request-forgery--08917483</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13413%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20soyrodriguez%20Country%20Blocker%20for%20AdSense&amp;severity=medium&amp;id=699697f26aea4a407a3bdfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13732-cwe-79-improper-neutralization-of-i-9d94ce94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=medium&amp;id=699697f26aea4a407a3bdfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13587-cwe-20-improper-input-validation-in-299586cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13587%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ss88_uk%20Two%20Factor%20(2FA)%20Authentication%20via%20Email&amp;severity=medium&amp;id=699697f26aea4a407a3bdfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2502-cwe-79-improper-neutralization-of-in-b4ccae91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yehudah%20xmlrpc%20attacks%20blocker&amp;severity=medium&amp;id=699697f66aea4a407a3be129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2704-out-of-bounds-read-in-open-babel-8733ccdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2704%3A%20Out-of-Bounds%20Read%20in%20Open%20Babel&amp;severity=medium&amp;id=699697f66aea4a407a3be139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2703-off-by-one-in-xlnt-community-xlnt-0e483827</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2703%3A%20Off-by-One%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69968d666aea4a407a390167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15586-cwe-287-improper-authentication-in--000235d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15586%3A%20CWE-287%20Improper%20Authentication%20in%20OpenGamePanel%20OGP-Website&amp;severity=critical&amp;id=69968d666aea4a407a39015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2702-hard-coded-credentials-in-beetel-777-0a5e4ed2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2702%3A%20Hard-coded%20Credentials%20in%20Beetel%20777VR1&amp;severity=low&amp;id=69968d666aea4a407a390160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12500-cwe-434-unrestricted-upload-of-file-09de847c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12500%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20quadlayers%20Checkout%20Field%20Manager%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=medium&amp;id=69968d656aea4a407a39011c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12081-cwe-862-missing-authorization-in-na-99e39864</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12081%3A%20CWE-862%20Missing%20Authorization%20in%20navzme%20ACF%20Photo%20Gallery%20Field&amp;severity=medium&amp;id=69968d636aea4a407a3900c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13048-cwe-79-improper-neutralization-of-i-80bcab79</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statcounter%20StatCounter%20%E2%80%93%20Free%20Real%20Time%20Visitor%20Stats&amp;severity=medium&amp;id=69968d656aea4a407a390139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12117-cwe-79-improper-neutralization-of-i-37d0aa8f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Renden&amp;severity=medium&amp;id=69968d636aea4a407a3900d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13113-cwe-200-exposure-of-sensitive-infor-ef9e08ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13113%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20accessibewp%20Web%20Accessibility%20by%20accessiBe&amp;severity=medium&amp;id=69968d656aea4a407a390144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12845-cwe-862-missing-authorization-in-es-fca10b3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12845%3A%20CWE-862%20Missing%20Authorization%20in%20essekia%20Tablesome%20Table%20%E2%80%93%20Contact%20Form%20DB%20%E2%80%93%20WPForms%2C%20CF7%2C%20Gravity%2C%20Forminator%2C%20Fluent&amp;severity=high&amp;id=69968d656aea4a407a39012c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12884-cwe-284-improper-access-control-in--528c8d73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12884%3A%20CWE-284%20Improper%20Access%20Control%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=medium&amp;id=69968d656aea4a407a390134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12821-cwe-352-cross-site-request-forgery--919c4720</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12821%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20NewsBlogger&amp;severity=high&amp;id=69968d656aea4a407a390128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12116-cwe-79-improper-neutralization-of-i-7a6487d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Drift&amp;severity=medium&amp;id=69968d636aea4a407a3900cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12882-cwe-269-improper-privilege-manageme-16cf93ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12882%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SmartDataSoft%20Clasifico%20Listing&amp;severity=critical&amp;id=69968d656aea4a407a390130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12707-cwe-89-improper-neutralization-of-s-d2c19dbe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12707%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20owthub%20Library%20Management%20System&amp;severity=high&amp;id=69968d656aea4a407a390123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13079-cwe-1241-use-of-predictable-algorit-50fba982</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13079%3A%20CWE-1241%20Use%20of%20Predictable%20Algorithm%20in%20Random%20Number%20Generator%20in%20popupbuilder%20Popup%20Builder%20%E2%80%93%20Create%20highly%20converting%2C%20mobile%20friendly%20marketing%20popups.&amp;severity=medium&amp;id=69968d656aea4a407a39013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12375-cwe-918-server-side-request-forgery-409790b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12375%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20printful%20Printful%20Integration%20for%20WooCommerce&amp;severity=medium&amp;id=69968d636aea4a407a3900d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12451-cwe-79-improper-neutralization-of-i-7d20ae4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20benjamin_zekavica%20Easy%20SVG%20Support&amp;severity=medium&amp;id=69968d656aea4a407a390117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11754-cwe-862-missing-authorization-in-wp-e1b287bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11754%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Cookie%20Banner%20for%20GDPR%20%2F%20CCPA%20%E2%80%93%20WPLP%20Cookie%20Consent&amp;severity=high&amp;id=69968d636aea4a407a3900bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12172-cwe-352-cross-site-request-forgery--33daff6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12172%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mailchimp%20Mailchimp%20List%20Subscribe%20Form&amp;severity=medium&amp;id=69968d636aea4a407a3900d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11706-cwe-79-improper-neutralization-of-i-332bc478</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69968d636aea4a407a3900b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12448-cwe-79-improper-neutralization-of-i-82d22b78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartsupp%20Smartsupp%20%E2%80%93%20live%20chat%2C%20AI%20shopping%20assistant%20and%20chatbots&amp;severity=medium&amp;id=69968d636aea4a407a3900e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11725-cwe-862-missing-authorization-in-ar-5f34b89c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11725%3A%20CWE-862%20Missing%20Authorization%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69968d636aea4a407a3900b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12027-cwe-862-missing-authorization-in-ho-2323287a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12027%3A%20CWE-862%20Missing%20Authorization%20in%20horearadu%20Mesmerize%20Companion&amp;severity=medium&amp;id=69968d636aea4a407a3900c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2693-improper-authorization-in-cocoteanet-cec810f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2693%3A%20Improper%20Authorization%20in%20CoCoTeaNet%20CyreneAdmin&amp;severity=medium&amp;id=699682d66aea4a407a1958b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2692-path-traversal-in-cocoteanet-cyrenea-1b8f731f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2692%3A%20Path%20Traversal%20in%20CoCoTeaNet%20CyreneAdmin&amp;severity=medium&amp;id=699674c56aea4a407a102a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4960-cwe-863-incorrect-authorization-in-e-60a4c497</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4960%3A%20CWE-863%20Incorrect%20Authorization%20in%20EPSON%20EPSON%20Printer%20Controller%20Installer&amp;severity=high&amp;id=699674c56aea4a407a1029fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2691-sql-injection-in-itsourcecode-event--a1045ded</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2691%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699674c56aea4a407a102a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2690-sql-injection-in-itsourcecode-event--a819ead6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2690%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699666b66aea4a407a031a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2689-sql-injection-in-itsourcecode-event--cc09d79e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2689%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=69965fae6aea4a407afcc69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2686-os-command-injection-in-seccn-dingch-6d02b310</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2686%3A%20OS%20Command%20Injection%20in%20SECCN%20Dingcheng%20G10&amp;severity=critical&amp;id=699655226aea4a407af3e26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67304-na-25725329</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67304%3A%20n%2Fa&amp;severity=critical&amp;id=699812b02c4d84f260aeb084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67305-na-1d23333f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67305%3A%20n%2Fa&amp;severity=critical&amp;id=699812af2c4d84f260aeb061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-19-7204c9d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-19&amp;severity=medium&amp;id=6997a7c9d7880ec89b3e18d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26744-na-888b51ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26744%3A%20n%2Fa&amp;severity=medium&amp;id=69978157d7880ec89b34978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69725-na-1bd8ed05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69725%3A%20n%2Fa&amp;severity=medium&amp;id=69973b6be884a8a4cb409738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69674-na-89b2ee83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69674%3A%20n%2Fa&amp;severity=medium&amp;id=69973b6be884a8a4cb409734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-19-04c57537</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-19&amp;severity=medium&amp;id=69972c74732724e9dc48b620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55853-na-10f5b826</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55853%3A%20n%2Fa&amp;severity=critical&amp;id=6997227c0018ac3e97d2926f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-19-9b55a4bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-19&amp;severity=low&amp;id=69969ebf6aea4a407a3d8b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2684-unrestricted-upload-in-tsinghua-unig-ecd78fea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2684%3A%20Unrestricted%20Upload%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996519e6aea4a407af2b707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24126-cwe-88-improper-neutralization-of-a-85b85bf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24126%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69964a966aea4a407af16032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2683-path-traversal-in-tsinghua-unigroup--fa982e7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2683%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=699647126aea4a407af0a2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15581-cwe-287-improper-authentication-in--eb504042</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15581%3A%20CWE-287%20Improper%20Authentication%20in%20orthanc-server%20orthanc&amp;severity=medium&amp;id=699647126aea4a407af0a2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2682-sql-injection-in-tsinghua-unigroup-e-980aa67f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2682%3A%20SQL%20Injection%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996438e6aea4a407aefe487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12812-cwe-89-improper-neutralization-of-s-40d68e92</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12812%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Delinea%20Inc.%20Cloud%20Suite%20and%20Privileged%20Access%20Service&amp;severity=medium&amp;id=69963c866aea4a407aee80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12811-cwe-444-inconsistent-interpretation-52fa5661</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12811%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Delinea%20Inc.%20Cloud%20Suite%20and%20Privileged%20Access%20Service&amp;severity=medium&amp;id=69963c866aea4a407aee80dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2676-improper-authorization-in-googtech-s-cf4660a0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2676%3A%20Improper%20Authorization%20in%20GoogTech%20sms-ssm&amp;severity=medium&amp;id=69963c866aea4a407aee80e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2650-heap-buffer-overflow-in-google-chrom-0bc72c99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2650%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec4451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2649-integer-overflow-in-google-chrome-1776d2df</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2649%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec444d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2648-heap-buffer-overflow-in-google-chrom-8ba8b4eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2648%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec4449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2672-path-traversal-in-tsinghua-unigroup--f5bf5b6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2672%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996357e6aea4a407aec4455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27181-missing-authorization-in-sergejey-m-847720a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27181%3A%20Missing%20Authorization%20in%20sergejey%20MajorDoMo&amp;severity=high&amp;id=69962e786aea4a407ae9220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27180-download-of-code-without-integrity--99709b79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27180%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae92208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27179-improper-neutralization-of-special--08ebabbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27179%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=high&amp;id=69962e786aea4a407ae92203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27178-improper-neutralization-of-input-du-92230b61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27178%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27177-improper-neutralization-of-input-du-8fe6a9fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27177%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27176-improper-neutralization-of-input-du-e69a01b9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27176%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27175-improper-neutralization-of-special--9a0f14bf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27175%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae921ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27174-improper-control-of-generation-of-c-e7d5bad6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27174%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae921ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2670-os-command-injection-in-advantech-wi-d366eba0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2670%3A%20OS%20Command%20Injection%20in%20Advantech%20WISE-6610&amp;severity=high&amp;id=69962e796aea4a407ae92231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2669-improper-access-controls-in-rongzhit-fabb5c97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2669%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=69962e786aea4a407ae92217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27182-missing-authentication-for-critical-1fc2462d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27182%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20saturnremote%20Saturn%20Remote%20Mouse%20Server&amp;severity=high&amp;id=69962e786aea4a407ae92212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0665-out-of-bounds-write-2671d8e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0665%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=69962af36aea4a407ae847e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8860-improper-removal-of-sensitive-inform-32c0e355</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8860%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer&amp;severity=low&amp;id=69962af36aea4a407ae847df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14876-allocation-of-resources-without-lim-2e422163</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14876%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=69962af36aea4a407ae847db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1999-cwe-863-incorrect-authorization-in-g-962c7a88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1999%3A%20CWE-863%20Incorrect%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69962af36aea4a407ae847ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1355-cwe-862-missing-authorization-in-git-91bfc7af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1355%3A%20CWE-862%20Missing%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69962af36aea4a407ae847e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0573-cwe-601-url-redirection-to-untrusted-fb40cff6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0573%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=699631fa6aea4a407aeb5692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2668-improper-access-controls-in-rongzhit-55d063a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2668%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=699631fa6aea4a407aeb569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2667-improper-access-controls-in-rongzhit-48cfbb24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2667%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=6996fb458fb9188dea8c0126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1272-vulnerability-in-fedora-project-fedo-30f9c46b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1272%3A%20Vulnerability%20in%20Fedora%20Project%20Fedora%20Linux&amp;severity=high&amp;id=69962af36aea4a407ae847fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12343-double-free-dde3ee36</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12343%3A%20Double%20Free&amp;severity=low&amp;id=6996fb458fb9188dea8c0122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10256-null-pointer-dereference-58bc4ddc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10256%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=6996fb458fb9188dea8c011c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0577-insufficient-entropy-df53ccfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0577%3A%20Insufficient%20Entropy&amp;severity=medium&amp;id=6996fb458fb9188dea8c0118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1200-access-of-uninitialized-pointer-in-h-16b69636</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1200%3A%20Access%20of%20Uninitialized%20Pointer%20in%20https%3A%2F%2Fgithub.com%2Frgaufman%2Flive555%20rgaufman%2Flive555&amp;severity=medium&amp;id=699620676aea4a407add8670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2666-unrestricted-upload-in-mingsoft-mcms-c239d51e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2666%3A%20Unrestricted%20Upload%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=6996fb458fb9188dea8c013a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2665-unrestricted-upload-in-huanzi-qch-ba-223f0da8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2665%3A%20Unrestricted%20Upload%20in%20huanzi-qch%20base-admin&amp;severity=medium&amp;id=6996fb458fb9188dea8c0132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0875-cwe-787-out-of-bounds-write-in-autod-a34a9a01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0875%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=699620676aea4a407add8679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0874-cwe-787-out-of-bounds-write-in-autod-190be7a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0874%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=699620676aea4a407add8675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2663-sql-injection-in-alixhan-xh-admin-ba-882bff48</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2663%3A%20SQL%20Injection%20in%20Alixhan%20xh-admin-backend&amp;severity=medium&amp;id=6996fb478fb9188dea8c030c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2662-out-of-bounds-read-in-fascinatedbox--0b95d4f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2662%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=6996fb478fb9188dea8c0304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2661-heap-based-buffer-overflow-in-squirr-3af36c3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2661%3A%20Heap-based%20Buffer%20Overflow%20in%20Squirrel&amp;severity=medium&amp;id=6996fb478fb9188dea8c0319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69287-cwe-573-improper-following-of-speci-c693b5d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69287%3A%20CWE-573%3A%20Improper%20Following%20of%20Specification%20by%20Caller%20in%20bsv-blockchain%20ts-sdk&amp;severity=medium&amp;id=6996fb478fb9188dea8c0320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2660-use-after-free-in-fascinatedbox-lily-056100ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2660%3A%20Use%20After%20Free%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=6996fb498fb9188dea8c09a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14009-cwe-94-improper-control-of-generati-6b025b75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14009%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20nltk%20nltk%2Fnltk&amp;severity=critical&amp;id=69969ef76aea4a407a3d9a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2659-out-of-bounds-read-in-squirrel-abffbf8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2659%3A%20Out-of-Bounds%20Read%20in%20Squirrel&amp;severity=medium&amp;id=6996fb498fb9188dea8c09d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2658-cross-site-request-forgery-in-newbee-e3d0b3db</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2658%3A%20Cross-Site%20Request%20Forgery%20in%20newbee-ltd%20newbee-mall&amp;severity=medium&amp;id=6996fb498fb9188dea8c09c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remcos-revisited-inside-the-rats-evolving-command--00631ee6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remcos%20Revisited%3A%20Inside%20the%20RAT&apos;s%20Evolving%20Command-and-Control%20Techniques&amp;severity=medium&amp;id=699612556aea4a407acc7412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20142-information-written-to-log-files-ca-f0d31475</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20142%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20138-information-written-to-log-files-ca-f3c5c5c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20138%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20139-the-software-does-not-properly-cont-7f5310ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20139%3A%20The%20software%20does%20not%20properly%20control%20the%20allocation%20and%20maintenance%20of%20a%20limited%20resource%20thereby%20enabling%20an%20actor%20to%20influence%20the%20amount%20of%20resources%20consumed%2C%20eventually%20leading%20to%20the%20exhaustion%20of%20available%20resources.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=6996fb4b8fb9188dea8c0dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20144-information-written-to-log-files-ca-00300c2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20144%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20141-the-product-exposes-sensitive-infor-3b6f8480</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20141%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=6996fb498fb9188dea8c09bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20137-the-product-exposes-sensitive-infor-4bd9248d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20137%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=6996fb498fb9188dea8c09b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2657-stack-based-buffer-overflow-in-wren--da471de2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2657%3A%20Stack-based%20Buffer%20Overflow%20in%20wren-lang%20wren&amp;severity=medium&amp;id=6996fb498fb9188dea8c09bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2230-cwe-639-authorization-bypass-through-2fdc86b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2230%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6996fb478fb9188dea8c0328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/law-firm-sites-hijacked-in-suspected-supply-chain--44484675</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Law%20Firm%20Sites%20Hijacked%20in%20Suspected%20Supply-Chain%20Attack&amp;severity=medium&amp;id=699612556aea4a407acc7417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2507-cwe-476-null-pointer-dereference-in--04591590</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2507%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-keenadu-android-malware-found-on-thousands-of--aeb3c090</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Keenadu%20Android%20Malware%20Found%20on%20Thousands%20of%20Devices&amp;severity=medium&amp;id=6995e0ea6aea4a407ac10f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15579-cwe-502-deserialization-of-untruste-8ab4ff09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15579%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20OpenText%E2%84%A2%20Directory%20Services&amp;severity=critical&amp;id=6995da1e6aea4a407abec468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61982-cwe-94-improper-control-of-generati-7ed7f412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61982%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenCFD%20OpenFOAM&amp;severity=high&amp;id=6995d3146aea4a407abc1a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2656-use-after-free-in-chaiscript-f70f7207</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2656%3A%20Use%20After%20Free%20in%20ChaiScript&amp;severity=low&amp;id=6995d3146aea4a407abc1a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1404-cwe-79-improper-neutralization-of-in-d8b84df7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1404%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=6995cf916aea4a407abb58be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1426-cwe-502-deserialization-of-untrusted-d5d3ff22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1426%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20berocket%20Advanced%20AJAX%20Product%20Filters&amp;severity=high&amp;id=6995cf916aea4a407abb58c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71228-5c740b16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71228&amp;severity=null&amp;id=69a0d69332ffcdb8a26c704b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71226-e967f3fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71226&amp;severity=null&amp;id=69a0d69332ffcdb8a26c7049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27100-vulnerability-in-jenkins-project-je-a7ca03e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27100%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6995cf916aea4a407abb58cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27099-vulnerability-in-jenkins-project-je-f2bd90c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27099%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=6995cf916aea4a407abb58cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2329-cwe-121-stack-based-buffer-overflow--e34cb0a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2329%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Grandstream%20GXP1610&amp;severity=critical&amp;id=6995cf916aea4a407abb58d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60038-cwe-502-deserialization-of-untruste-df25c0a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60038%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60037-cwe-502-deserialization-of-untruste-3b11b4fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60037%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60036-cwe-502-deserialization-of-untruste-01ac078c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60036%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2655-use-after-free-in-chaiscript-4469a246</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2655%3A%20Use%20After%20Free%20in%20ChaiScript&amp;severity=low&amp;id=6995c8856aea4a407a9d0d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60035-cwe-502-deserialization-of-untruste-4ac47a15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60035%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33240-cwe-94-improper-control-of-generati-7295b46a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33240%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-Bridge&amp;severity=high&amp;id=6995c8836aea4a407a9d0caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33239-cwe-94-improper-control-of-generati-ce2d736d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33239%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-Bridge&amp;severity=high&amp;id=6995c8836aea4a407a9d0caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33253-cwe-502-deserialization-of-untruste-87fed69d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33253%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8856aea4a407a9d0cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33252-cwe-502-deserialization-of-untruste-05b53bca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33252%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8856aea4a407a9d0cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33251-cwe-94-improper-control-of-generati-cf832903</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33251%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33250-cwe-94-improper-control-of-generati-c81e2e61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33250%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33249-cwe-77-improper-neutralization-of-s-fbdebcf6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33249%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33246-cwe-77-improper-neutralization-of-s-665c462e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33246%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33245-cwe-502-deserialization-of-untruste-52801645</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33245%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33243-cwe-502-deserialization-of-untruste-6f19f5cb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33243%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33241-cwe-502-deserialization-of-untruste-f2752c91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33241%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33236-cwe-94-improper-control-of-generati-bab7e094</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33236%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2464-cwe-22-improper-limitation-of-a-path-49dc2395</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2464%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AMR%20AMR%20Printer%20Management%20Beta%20web%20service&amp;severity=high&amp;id=6995c8856aea4a407a9d0d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59920-cwe-89-improper-neutralization-of-s-2feb09f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59920%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20systems%20at%20work%20time%20at%20work&amp;severity=high&amp;id=6995c8856aea4a407a9d0d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8308-cwe-79-improper-neutralization-of-in-80089374</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Key%20Software%20Solutions%20Inc.%20INFOREX-%20General%20Information%20Management%20System&amp;severity=medium&amp;id=6995cf916aea4a407abb58db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14340-cwe-79-improper-neutralization-of-i-71ccb838</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Payara%20Platform%20Payara%20Server&amp;severity=high&amp;id=6995cf916aea4a407abb58d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2654-server-side-request-forgery-in-huggi-4f6f3e57</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2654%3A%20Server-Side%20Request%20Forgery%20in%20huggingface%20smolagents&amp;severity=medium&amp;id=6995cf936aea4a407abb58fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-in-popular-pdf-platforms-allowed-a-944486e7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20in%20Popular%20PDF%20Platforms%20Allowed%20Account%20Takeover%2C%20Data%20Exfiltration&amp;severity=low&amp;id=6995bed580d747be206eb309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaws-found-in-four-vs-code-extensions-wi-563d9726</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaws%20Found%20in%20Four%20VS%20Code%20Extensions%20with%20Over%20125%20Million%20Installs&amp;severity=critical&amp;id=6995bec280d747be206eaf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1441-cwe-79-improper-neutralization-of-in-a4fd3745</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1441%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1440-cwe-79-improper-neutralization-of-in-659e2c74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1439-cwe-79-improper-neutralization-of-in-d1082814</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1438-cwe-79-improper-neutralization-of-in-7aa14847</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf916aea4a407abb58e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1437-cwe-79-improper-neutralization-of-in-cb0fed4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf916aea4a407abb58e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1436-cwe-639-authorization-bypass-through-46e35fb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1436%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=high&amp;id=6995cf916aea4a407abb58de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1435-cwe-613-insufficient-session-expirat-34761982</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1435%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=critical&amp;id=6995da1e6aea4a407abec46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1317-cwe-89-improper-neutralization-of-sp-6541c750</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1317%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=medium&amp;id=6995b46b80d747be206b6168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1582-cwe-200-exposure-of-sensitive-inform-e684b84f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1582%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20soflyy%20WP%20All%20Export%20%E2%80%93%20Drag%20%26%20Drop%20Export%20to%20Any%20Custom%20CSV%2C%20XML%20%26%20Excel&amp;severity=low&amp;id=6995b46b80d747be206b616e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2386-cwe-863-incorrect-authorization-in-p-ce591677</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2386%3A%20CWE-863%20Incorrect%20Authorization%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=6995b46b80d747be206b6173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8781-cwe-89-improper-neutralization-of-sp-54f84aa7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8781%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bookster%20Bookster%20%E2%80%93%20WordPress%20Appointment%20Booking%20Plugin&amp;severity=medium&amp;id=6995b46b80d747be206b6163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-campaign-abuses-atlassian-jira-targets-govern-d550c7cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%20Campaign%20Abuses%20Atlassian%20Jira%2C%20Targets%20Government%20and%20Corporate%20Entities&amp;severity=medium&amp;id=6995e8256aea4a407ac323e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7630-cwe-307-improper-restriction-of-exce-e9a6662f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7630%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Doruk%20Communication%20and%20Automation%20Industry%20and%20Trade%20Inc.%20Wispotter&amp;severity=medium&amp;id=6995b0e780d747be206a5422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-tech-predictions-for-2026-operating--d75f27b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20Tech%20Predictions%20for%202026%3A%20Operating%20in%20a%20World%20of%20Permanent%20Instability&amp;severity=medium&amp;id=6995da846aea4a407abee716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14799-cwe-843-access-of-resource-using-in-c4359a93</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14799%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20neeraj_slit%20Brevo%20%E2%80%93%20Email%2C%20SMS%2C%20Web%20Push%2C%20Chat%2C%20and%20more.&amp;severity=medium&amp;id=6995a2d880d747be206547e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2653-heap-based-buffer-overflow-in-admesh-c73931a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2653%3A%20Heap-based%20Buffer%20Overflow%20in%20admesh&amp;severity=medium&amp;id=69959f5480d747be2063f039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dell-recoverpoint-for-vms-zero-day-cve-2026-22769--1a732439</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dell%20RecoverPoint%20for%20VMs%20Zero-Day%20CVE-2026-22769%20Exploited%20Since%20Mid-2024&amp;severity=medium&amp;id=6995da846aea4a407abee719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-hackers-exploiting-vulnerability-in-product-o-a099b96b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%3A%20Hackers%20Exploiting%20Vulnerability%20in%20Product%20of%20Taiwan%20Security%20Firm%20TeamT5&amp;severity=medium&amp;id=6995949480d747be205f87ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2426-cwe-22-improper-limitation-of-a-path-3d51e834</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2426%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gamerz%20WP-DownloadManager&amp;severity=medium&amp;id=699594d680d747be205fb508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1942-cwe-862-missing-authorization-in-pr--c306e9aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1942%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=699594d680d747be205fb502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14444-cwe-345-insufficient-verification-o-ccfaa86b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14444%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=699594d680d747be205fb4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11185-cwe-79-improper-neutralization-of-i-3a4690bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=699586ba80d747be2059d036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13727-cwe-79-improper-neutralization-of-i-a926559b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Video%20Share%20VOD%20%E2%80%93%20Turnkey%20Video%20Site%20Builder%20Script&amp;severity=medium&amp;id=699586ba80d747be2059d03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2126-cwe-863-incorrect-authorization-in-s-2ba6c938</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2126%3A%20CWE-863%20Incorrect%20Authorization%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=medium&amp;id=699586ba80d747be2059d043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1656-cwe-862-missing-authorization-in-str-a682e6d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1656%3A%20CWE-862%20Missing%20Authorization%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=medium&amp;id=699578ab80d747be205539d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1649-cwe-79-improper-neutralization-of-in-45919fab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=699578ab80d747be205539cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2127-cwe-862-missing-authorization-in-gpr-82301c35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2127%3A%20CWE-862%20Missing%20Authorization%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699578ab80d747be205539e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2495-cwe-89-improper-neutralization-of-sp-08e20fbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20qdonow%20WPNakama%20%E2%80%93%20Team%20and%20multi-Client%20Collaboration%2C%20Editorial%20and%20Project%20Management&amp;severity=high&amp;id=699578ab80d747be205539ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1941-cwe-79-improper-neutralization-of-in-e87c4116</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1941%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xylus%20WP%20Event%20Aggregator%3A%20Import%20Eventbrite%20events%2C%20Meetup%20events%2C%20social%20events%20and%20any%20iCal%20Events%20into%20Event%20Calendar&amp;severity=medium&amp;id=699578ab80d747be205539da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-malware-campaigns-with-reused-material-we-f81192c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20Malware%20Campaigns%20With%20Reused%20Material%2C%20(Wed%2C%20Feb%2018th)&amp;severity=medium&amp;id=6995787680d747be205506ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-fixes-hijacked-update-mechanism-used-to-de-7dc05b1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Fixes%20Hijacked%20Update%20Mechanism%20Used%20to%20Deliver%20Targeted%20Malware&amp;severity=medium&amp;id=6995909980d747be205dea22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25421-1dcf4a9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25421&amp;severity=null&amp;id=6995719e80d747be205195d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2112-cwe-352-cross-site-request-forgery-c-a2c12543</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2112%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webguyio%20Dam%20Spam&amp;severity=medium&amp;id=69956e1c80d747be20503e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1831-cwe-862-missing-authorization-in-yay-f8b220fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1831%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=low&amp;id=69956e1c80d747be20503e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1860-cwe-862-missing-authorization-in-wpc-d30e477c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1860%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Kali%20Forms%20%E2%80%94%20Contact%20Form%20%26%20Drag-and-Drop%20Builder&amp;severity=medium&amp;id=69956e1c80d747be20503e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1943-cwe-79-improper-neutralization-of-in-45cd9e0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1943%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=medium&amp;id=69956e1c80d747be20503e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1938-cwe-862-missing-authorization-in-yay-7ae76c05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1938%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=medium&amp;id=69956e1c80d747be20503e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1655-cwe-862-missing-authorization-in-met-24a3e3cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1655%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=69956e1c80d747be20503e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2419-cwe-22-improper-limitation-of-a-path-275cb74b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2419%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gamerz%20WP-DownloadManager&amp;severity=low&amp;id=69956e1c80d747be20503e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dell-recoverpoint-zero-day-exploited-by-chinese-cy-148649a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dell%20RecoverPoint%20Zero-Day%20Exploited%20by%20Chinese%20Cyberespionage%20Group&amp;severity=medium&amp;id=699566e580d747be204cca72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2644-out-of-bounds-read-in-niklasso-minis-3863f627</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2644%3A%20Out-of-Bounds%20Read%20in%20niklasso%20minisat&amp;severity=medium&amp;id=6995672780d747be204d295f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-four-security-flaws-under-active-exploi-14954e9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Four%20Security%20Flaws%20Under%20Active%20Exploitation%20in%20Latest%20KEV%20Update&amp;severity=low&amp;id=6995909980d747be205dea25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2296-cwe-94-improper-control-of-generatio-5b1b1df0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2296%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20acowebs%20Product%20Addons%20for%20Woocommerce%20%E2%80%93%20Product%20Options%20with%20Custom%20Fields&amp;severity=high&amp;id=6995672780d747be204d2951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2633-cwe-862-missing-authorization-in-ste-269f9374</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2633%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6995672780d747be204d2959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2281-cwe-79-improper-neutralization-of-in-518f2262</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2281%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edersonpeka%20Private%20Comment&amp;severity=medium&amp;id=6995672780d747be204d294b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1640-cwe-862-missing-authorization-in-tas-e9acd827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1640%3A%20CWE-862%20Missing%20Authorization%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=6995672780d747be204d2927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1807-cwe-79-improper-neutralization-of-in-229ebdad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20interactivecalculator%20InteractiveCalculator%20for%20WordPress&amp;severity=medium&amp;id=6995672780d747be204d2933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1937-cwe-862-missing-authorization-in-yay-12c0a139</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1937%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=high&amp;id=6995672780d747be204d293f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1666-cwe-79-improper-neutralization-of-in-3f7d4556</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=6995672780d747be204d292c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1857-cwe-918-server-side-request-forgery--805c3795</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1857%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6995672780d747be204d2939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2019-cwe-74-improper-neutralization-of-sp-628198fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2019%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20villatheme%20Cart%20All%20In%20One%20For%20WooCommerce&amp;severity=high&amp;id=6995672780d747be204d2945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2642-null-pointer-dereference-in-ggreer-t-3ad53a2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2642%3A%20NULL%20Pointer%20Dereference%20in%20ggreer%20the_silver_searcher&amp;severity=medium&amp;id=6995600b80d747be204893b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1368-cwe-287-improper-authentication-in-v-252c05b5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1368%3A%20CWE-287%20Improper%20Authentication%20in%20Video%20Conferencing%20with%20Zoom&amp;severity=high&amp;id=6995590380d747be20465104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2641-uncontrolled-recursion-in-universal--0b937f98</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2641%3A%20Uncontrolled%20Recursion%20in%20universal-ctags%20ctags&amp;severity=medium&amp;id=6995557f80d747be2043e625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12356-cwe-862-missing-authorization-in-ti-2b7bb65c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12356%3A%20CWE-862%20Missing%20Authorization%20in%20tickera%20Tickera%20%E2%80%93%20Sell%20Tickets%20%26%20Manage%20Events&amp;severity=medium&amp;id=6995557f80d747be2043e5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1304-cwe-79-improper-neutralization-of-in-84444595</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=6995557f80d747be2043e604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12122-cwe-78-improper-neutralization-of-s-95a10c0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12122%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20wpcalc%20Popup%20Box%20%E2%80%93%20Easily%20Create%20WordPress%20Popups&amp;severity=medium&amp;id=6995557f80d747be2043e5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1072-cwe-352-cross-site-request-forgery-c-9c430d35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1072%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jamesits%20Keybase.io%20Verification&amp;severity=medium&amp;id=6995557f80d747be2043e5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1906-cwe-862-missing-authorization-in-wpo-2766b763</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1906%3A%20CWE-862%20Missing%20Authorization%20in%20wpovernight%20PDF%20Invoices%20%26%20Packing%20Slips%20for%20WooCommerce&amp;severity=medium&amp;id=6995557f80d747be2043e618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1639-cwe-89-improper-neutralization-of-sp-f7f4ef30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1639%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=6995557f80d747be2043e612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11737-cwe-79-improper-neutralization-of-i-22f7971a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=6995557f80d747be2043e5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2023-cwe-352-cross-site-request-forgery-c-ec86f230</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2023%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brikou%20WP%20Plugin%20Info%20Card&amp;severity=medium&amp;id=6995557f80d747be2043e61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1925-cwe-862-missing-authorization-in-rox-64475f95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1925%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=6995477080d747be203eb807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2576-cwe-89-improper-neutralization-of-sp-ac9124c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2576%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=high&amp;id=6995477180d747be203eb81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1714-cwe-93-improper-neutralization-of-cr-f05f49aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1714%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=high&amp;id=6995477080d747be203eb7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1277-cwe-601-url-redirection-to-untrusted-f948f014</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1277%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20kaizencoders%20URL%20Shortify%20%E2%80%93%20Simple%20and%20Easy%20URL%20Shortener&amp;severity=medium&amp;id=6995477080d747be203eb7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12037-cwe-79-improper-neutralization-of-i-6a60de39</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12037%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hwk-fr%20WP%20404%20Auto%20Redirect%20to%20Similar%20Post&amp;severity=medium&amp;id=6995477080d747be203eb7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6460-cwe-79-improper-neutralization-of-in-28148615</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gserafini%20Display%20During%20Conditional%20Shortcode&amp;severity=medium&amp;id=6995477080d747be203eb7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1296-cwe-601-url-redirection-to-untrusted-0f085222</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1296%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=6995477080d747be203eb7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12075-cwe-862-missing-authorization-in-fa-23ec4d5e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12075%3A%20CWE-862%20Missing%20Authorization%20in%20fahadmahmood%20Order%20Splitter%20for%20WooCommerce&amp;severity=medium&amp;id=6995477080d747be203eb7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1931-cwe-79-improper-neutralization-of-in-fa3944d4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1931%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonschr%20Rent%20Fetch&amp;severity=high&amp;id=6995477180d747be203eb817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12071-cwe-639-authorization-bypass-throug-052ab4dc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12071%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20absikandar%20Frontend%20User%20Notes&amp;severity=medium&amp;id=6995477080d747be203eb7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13959-cwe-79-improper-neutralization-of-i-1d68a836</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13959%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanaver%20Filestack&amp;severity=medium&amp;id=6995477080d747be203eb7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12074-cwe-200-exposure-of-sensitive-infor-e6ca8f6b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12074%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20postmagthemes%20Context%20Blog&amp;severity=medium&amp;id=6995477080d747be203eb7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-18-116ea64e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-18&amp;severity=medium&amp;id=69971b5eb557332a80fbff32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65791-na-c5be6e2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65791%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb4b8fb9188dea8c0df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65519-na-864da093</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65519%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb4b8fb9188dea8c0df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24708-cwe-669-incorrect-resource-transfer-b65710b0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24708%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20OpenStack%20Nova&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70148-na-8c970d6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70148%3A%20n%2Fa&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70150-na-831b2e9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70150%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb4b8fb9188dea8c0ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70152-na-7fcec29d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70152%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70151-na-132a0884</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70151%3A%20n%2Fa&amp;severity=high&amp;id=6996fb498fb9188dea8c09b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70149-na-25fc9c21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70149%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70141-na-7495087b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70141%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70147-na-713f71ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70147%3A%20n%2Fa&amp;severity=high&amp;id=6996fb478fb9188dea8c0331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70146-na-f560c7ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70146%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb478fb9188dea8c032d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70064-na-0097a5a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70064%3A%20n%2Fa&amp;severity=high&amp;id=6996fb478fb9188dea8c0324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70063-na-e6c89975</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70063%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb478fb9188dea8c0315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70062-na-a4275ec3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70062%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb478fb9188dea8c0311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-18-d351e167</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-18&amp;severity=medium&amp;id=699654eb6aea4a407af39030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70998-na-77dc81ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70998%3A%20n%2Fa&amp;severity=critical&amp;id=6995da1e6aea4a407abec46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-18-9670f798</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-18&amp;severity=low&amp;id=699582fd80d747be20583fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1344-incorrect-permission-assignment-for--4cd8ccfc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1344%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Tanium%20Enforce%20Recovery%20Key%20Portal&amp;severity=medium&amp;id=6995011f80d747be20e100cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23599-vulnerability-in-hewlett-packard-en-fdc96349</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23599%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=6994f69980d747be20df435a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22048-918-in-netapp-storagegrid-formerly--5c913f90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22048%3A%20918%20in%20NETAPP%20StorageGRID%20(formerly%20StorageGRID%20Webscale)&amp;severity=high&amp;id=6994f69980d747be20df4357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26119-cwe-287-improper-authentication-in--f09bdabb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26119%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=high&amp;id=6994f69980d747be20df4365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1670-cwe-306-missing-authentication-for-c-7263f78b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1670%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Honeywell%20I-HIB2PI-UL%202MP%20IP&amp;severity=critical&amp;id=6994f69980d747be20df4360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62183-cwe-79-improper-neutralization-of-i-fb957050</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=6994f69980d747be20df435d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13333-cwe-358-improperly-implemented-secu-e16039f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13333%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=6994f31080d747be20de97a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13689-cwe-434-unrestricted-upload-of-file-eecd60ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13689%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20DataStage%20on%20Cloud%20Pak&amp;severity=high&amp;id=699575b980d747be2053752c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2629-os-command-injection-in-jishi-node-s-35f7c933</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2629%3A%20OS%20Command%20Injection%20in%20jishi%20node-sonos-http-api&amp;severity=medium&amp;id=6994e88380d747be20dc67c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33135-cwe-79-improper-neutralization-of-i-f6fbdd1f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Financial%20Transaction%20Manager%20for%20ACH%20Services%20and%20Check%20Services%20for%20Multi-Platform&amp;severity=medium&amp;id=6994e1f780d747be20dad4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33088-cwe-732-incorrect-permission-assign-9dbe55da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33088%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Concert&amp;severity=high&amp;id=6994e1f780d747be20dad49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36183-cwe-434-unrestricted-upload-of-file-4e55895a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36183%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20watsonx.data&amp;severity=low&amp;id=6994e1f780d747be20dad4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2627-link-following-in-softland-fbackup-21db41d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2627%3A%20Link%20Following%20in%20Softland%20FBackup&amp;severity=high&amp;id=6994e1f780d747be20dad4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36348-cwe-209-generation-of-error-message-2e5a614e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36348%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6994e1f780d747be20dad4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2623-path-traversal-in-blossom-e8f3b710</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2623%3A%20Path%20Traversal%20in%20Blossom&amp;severity=medium&amp;id=6994e1f780d747be20dad4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23598-vulnerability-in-hewlett-packard-en-c78a381d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23598%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=6994e1f780d747be20dad4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23597-vulnerability-in-hewlett-packard-en-97c8adfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23597%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=699575b980d747be2053755e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23596-vulnerability-in-hewlett-packard-en-5a0b28fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23596%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=699575b980d747be20537554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23595-vulnerability-in-hewlett-packard-en-aaebd4dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23595%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=high&amp;id=699575b980d747be2053754a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36376-cwe-613-insufficient-session-expira-27f04f89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36376%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be20537568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2622-cross-site-scripting-in-blossom-a97e2f4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2622%3A%20Cross%20Site%20Scripting%20in%20Blossom&amp;severity=medium&amp;id=699575b980d747be20537628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36377-cwe-613-insufficient-session-expira-47b9f738</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36377%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be20537572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36379-cwe-326-inadequate-encryption-stren-e8c56bdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36379%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be2053757a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13691-cwe-497-exposure-of-sensitive-syste-e4d4e018</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13691%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=high&amp;id=699575b980d747be20537634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14289-cwe-80-improper-neutralization-of-s-15994d02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14289%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20webMethods%20Integration%20Server&amp;severity=medium&amp;id=699575b980d747be20537533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2621-sql-injection-in-sciyon-koyuan-therm-c2c7056e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2621%3A%20SQL%20Injection%20in%20Sciyon%20Koyuan%20Thermoelectricity%20Heat%20Network%20Management%20System&amp;severity=medium&amp;id=699575b980d747be2053753f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22762-cwe-22-improper-limitation-of-a-pat-fb7162fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22762%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Server&amp;severity=medium&amp;id=699575bb80d747be205376a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27898-cwe-613-insufficient-session-expira-1fb50650</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27898%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27899-cwe-526-cleartext-storage-of-sensit-79a8cd73</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27899%3A%20CWE-526%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27900-cwe-601-url-redirection-to-untruste-44a62879</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27900%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22284-cwe-77-improper-neutralization-of-s-5569d01c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22284%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=69954e7880d747be2041357b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26357-cwe-79-improper-neutralization-of-i-851a7e59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26357%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax%209.2.4.18&amp;severity=medium&amp;id=699575bb80d747be205376a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27901-cwe-644-improper-neutralization-of--a8ea6de3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27901%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be2053763a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27903-cwe-319-cleartext-transmission-of-s-e4976127</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27903%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be2053762e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27904-cwe-352-cross-site-request-forgery--7dfc647d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27904%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36598-cwe-22-improper-limitation-of-a-pat-c71d019c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36598%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Virtual%20Edition&amp;severity=medium&amp;id=699575b980d747be20537539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22769-cwe-798-use-of-hard-coded-credentia-cad7841a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22769%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Dell%20RecoverPoint%20for%20Virtual%20Machines&amp;severity=critical&amp;id=69954e7880d747be2041357f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33130-cwe-120-buffer-copy-without-checkin-6003e44e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33130%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0102-cwe-359-exposure-of-private-personal-0ea43207</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0102%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=low&amp;id=6994f69980d747be20df436a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33124-cwe-131-incorrect-calculation-of-bu-b76dcfb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33124%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13108-vulnerability-in-ibm-db2-merge-back-fc73d8f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13108%3A%20Vulnerability%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-how-modern-soc-teams-use-ai-and-context-to-72344316</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20How%20Modern%20SOC%20Teams%20Use%20AI%20and%20Context%20to%20Investigate%20Cloud%20Breaches%20Faster&amp;severity=medium&amp;id=6995909980d747be205dea28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36597-cwe-22-improper-limitation-of-a-pat-5ff59b14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36597%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Server&amp;severity=medium&amp;id=699575bb80d747be2053771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33101-cwe-244-improper-clearing-of-heap-m-bfe34f61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33101%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be20537717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2620-sql-injection-in-huace-monitoring-an-0c8cd687</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2620%3A%20SQL%20Injection%20in%20Huace%20Monitoring%20and%20Early%20Warning%20System&amp;severity=medium&amp;id=699575bb80d747be20537720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33089-cwe-798-use-of-hard-coded-credentia-ebf5d876</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33089%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be20537714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36243-cwe-918-server-side-request-forgery-a8c35159</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36243%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be2053771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43178-cwe-327-use-of-a-broken-or-risky-cr-5e3b81b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43178%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be2053772a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36018-cwe-352-cross-site-request-forgery--b52c9328</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36018%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=6994e50080d747be20db79f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24734-cwe-20-improper-input-validation-in-7e1027c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24734%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat%20Native&amp;severity=high&amp;id=699575bd80d747be205377f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36019-cwe-79-improper-neutralization-of-i-2052d908</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575b980d747be2053763d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24733-cwe-20-improper-input-validation-in-12b56c6f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24733%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=699575bd80d747be205377ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12755-cwe-117-improper-output-neutralizat-4a26a9ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12755%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=699575b980d747be20537637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66614-cwe-20-improper-input-validation-in-bcf18b8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66614%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=699575bd80d747be205377ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2630-cwe-78-improper-neutralization-of-sp-3ee12498</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2630%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tenable%20Security%20Center&amp;severity=high&amp;id=6994b74c80d747be20cdd662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-show-copilot-and-grok-can-be-abused-as-64561493</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Show%20Copilot%20and%20Grok%20Can%20Be%20Abused%20as%20Malware%20C2%20Proxies&amp;severity=low&amp;id=6995909980d747be205dea2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badiis-to-the-bone-new-insights-to-a-global-seo-po-f94b5abc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BADIIS%20to%20the%20Bone%3A%20New%20Insights%20to%20a%20Global%20SEO%20Poisoning%20Campaign&amp;severity=medium&amp;id=6994b74a80d747be20cdd527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-clickfix-opens-the-door-to-stealthy-stealc-inf-765d6586</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20ClickFix%20Opens%20the%20Door%20to%20Stealthy%20StealC%20Information%20Stealer&amp;severity=medium&amp;id=6994b74a80d747be20cdd577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36247-cwe-611-improper-restriction-of-xml-6af3c952</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36247%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=699575bb80d747be20537709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36425-cwe-256-in-ibm-db2-for-linux-unix-a-ed5229e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36425%3A%20CWE-256%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be2053770c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13867-cwe-1284-improper-validation-of-spe-49ea700b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13867%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14689-cwe-1284-improper-validation-of-spe-6a88675e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14689%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bd80d747be20537800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/keenadu-firmware-backdoor-infects-android-tablets--f07d8f19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Keenadu%20Firmware%20Backdoor%20Infects%20Android%20Tablets%20via%20Signed%20OTA%20Updates&amp;severity=medium&amp;id=6995909980d747be205dea2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2618-risky-cryptographic-algorithm-in-bee-16b2753e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2618%3A%20Risky%20Cryptographic%20Algorithm%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=699575bd80d747be20537849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23648-cwe-732-incorrect-permission-assign-3c011f22</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23648%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Glory%20Global%20Solutions%20RBG-100&amp;severity=high&amp;id=699575bb80d747be205376b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23647-cwe-798-use-of-hard-coded-credentia-6b5abde7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23647%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Glory%20Global%20Solutions%20RBG-100&amp;severity=critical&amp;id=699575bb80d747be205376b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2617-insecure-default-initialization-of-r-3378e449</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2617%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=69948d1c80d747be20bdf6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-offer-to-sell-millions-of-eurail-user-reco-ee3e48d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Offer%20to%20Sell%20Millions%20of%20Eurail%20User%20Records&amp;severity=medium&amp;id=6994896480d747be20bc82aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31118-cwe-862-missing-authorization-in-sm-0efd5cdb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31118%3A%20CWE-862%20Missing%20Authorization%20in%20Smartypants%20SP%20Project%20%26%20Document%20Manager&amp;severity=medium&amp;id=6994861680d747be20bbcc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2616-hard-coded-credentials-in-beetel-777-5f01c821</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2616%3A%20Hard-coded%20Credentials%20in%20Beetel%20777VR1&amp;severity=high&amp;id=6994861680d747be20bbcc54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22208-cwe-749-exposed-dangerous-method-or-4594ea65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22208%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20OpenS100%20Project%20OpenS100&amp;severity=critical&amp;id=69947f0d80d747be20b9dc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-in-the-middle-turning-web-based-ai-services-int-ec8326ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20in%20the%20Middle%3A%20Turning%20Web-Based%20AI%20Services%20into%20C2%20Proxies%20%26%20The%20Future%20Of%20AI%20Driven%20Attacks&amp;severity=low&amp;id=6995917280d747be205e4203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-the-ongoing-fight-to-secure-in-7c6a9e61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20The%20Ongoing%20Fight%20to%20Secure%20Industrial%20Control%20Systems&amp;severity=critical&amp;id=699477d280d747be20b76d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/api-threats-grow-in-scale-as-ai-expands-the-blast--2e69a229</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=API%20Threats%20Grow%20in%20Scale%20as%20AI%20Expands%20the%20Blast%20Radius&amp;severity=medium&amp;id=699477d280d747be20b76d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23861-cwe-79-improper-neutralization-of-i-0569a841</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23861%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax%20vApp%2C&amp;severity=medium&amp;id=6994782680d747be20b7ac3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7706-cwe-306-missing-authentication-for-c-b448fb38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7706%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Liderahenk&amp;severity=medium&amp;id=699470fb80d747be20b50362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25087-cwe-416-use-after-free-in-apache-so-03b761d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25087%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20Arrow&amp;severity=high&amp;id=699470fb80d747be20b50365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2615-command-injection-in-wavlink-wl-nu51-f6063523</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2615%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=699469f380d747be20b30312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/man-linked-to-phobos-ransomware-arrested-in-poland-3b18f07a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Man%20Linked%20to%20Phobos%20Ransomware%20Arrested%20in%20Poland&amp;severity=medium&amp;id=6994663c80d747be20b1b382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartloader-attack-uses-trojanized-oura-mcp-server-98cb6579</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartLoader%20Attack%20Uses%20Trojanized%20Oura%20MCP%20Server%20to%20Deploy%20StealC%20Infostealer&amp;severity=medium&amp;id=6995909980d747be205dea31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-tablet-conqueror-and-the-links-between-major-a-456f5297</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20tablet%20conqueror%20and%20the%20links%20between%20major%20Android%20botnets&amp;severity=medium&amp;id=6994909f80d747be20bf9d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8303-cwe-79-improper-neutralization-of-in-44be8a63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20EKA%20Software%20Computer%20Information%20Advertising%20Services%20Ltd.%20Real%20Estate%20Script%20V5%20(With%20Doping%20Module%20%E2%80%93%20Store%20Module%20%E2%80%93%20New%20Language%20System)&amp;severity=medium&amp;id=69945be380d747be20af629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7631-cwe-89-improper-neutralization-of-sp-5ca07faf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7631%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tumeva%20Internet%20Technologies%20Software%20Information%20Advertising%20and%20Consulting%20Services%20Trade%20Ltd.%20Co.%20Tumeva%20Prime%20News%20Software&amp;severity=high&amp;id=6994585e80d747be20ae418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2247-cwe-89-improper-neutralization-of-sp-b8f5f03e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2247%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Clickedu%20SaaS%20platform&amp;severity=high&amp;id=6994585e80d747be20ae4192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2608-cwe-862-missing-authorization-in-ste-f8e195f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2608%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6994515780d747be20ac24ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3-threat-groups-started-targeting-icsot-in-2025-dr-67494e06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%20Threat%20Groups%20Started%20Targeting%20ICS%2FOT%20in%202025%3A%20Dragos&amp;severity=medium&amp;id=69944da080d747be20aa71bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25903-cwe-862-missing-authorization-in-ap-96d68c81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25903%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20NiFi&amp;severity=high&amp;id=69943fc480d747be20a60510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-finds-summarize-with-ai-prompts-manipula-f515017d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Finds%20%E2%80%9CSummarize%20with%20AI%E2%80%9D%20Prompts%20Manipulating%20Chatbot%20Recommendations&amp;severity=medium&amp;id=69943af180d747be20a42712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/password-managers-vulnerable-to-vault-compromise-u-4a6c986f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Password%20Managers%20Vulnerable%20to%20Vault%20Compromise%20Under%20Malicious%20Server&amp;severity=medium&amp;id=6994388980d747be20a2d08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1216-cwe-79-improper-neutralization-of-in-1a4c00e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1216%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=high&amp;id=699438cd80d747be20a32bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-incident-report-used-in-phishing-campaign-tue-566cec83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Incident%20Report%20Used%20in%20Phishing%20Campaign%2C%20(Tue%2C%20Feb%2017th)&amp;severity=medium&amp;id=69943c3e80d747be20a4e763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-tests-end-to-end-encrypted-rcs-messaging-in--81f691ce</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Tests%20End-to-End%20Encrypted%20RCS%20Messaging%20in%20iOS%2026.4%20Developer%20Beta&amp;severity=medium&amp;id=69943af180d747be20a42715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0829-cwe-862-missing-authorization-in-fro-323c4855</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0829%3A%20CWE-862%20Missing%20Authorization%20in%20Frontend%20File%20Manager%20Plugin&amp;severity=medium&amp;id=69940acad1735ca73126f76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1657-cwe-862-missing-authorization-in-met-a2523868</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1657%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=6994003ed1735ca7311ee332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2592-cwe-284-improper-access-control-in-z-22959dc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2592%3A%20CWE-284%20Improper%20Access%20Control%20in%20zarinpal%20Zarinpal%20Gateway&amp;severity=high&amp;id=6993f937d1735ca7311a09bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2002-cwe-79-improper-neutralization-of-in-2ec61ced</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=6993f937d1735ca7311a09bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26220-cwe-502-deserialization-of-untruste-3d57a118</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26220%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ModelTC%20LightLLM&amp;severity=critical&amp;id=6994257080d747be207b7270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70397-na-47a1cc8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70397%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be20537850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55270-na-03bef1f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55270%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26736-na-558b5db5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26736%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26732-na-96df64c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26732%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26731-na-626ee67c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26731%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59793-na-8a24ed08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59793%3A%20n%2Fa&amp;severity=critical&amp;id=699575bd80d747be205377e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67905-na-fa4970fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67905%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be20537726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32355-na-085b6720</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32355%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be2053770f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70846-na-5e0ec656</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70846%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be205376c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67102-na-4a2a6626</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67102%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be2053769e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-17-43270302</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-17&amp;severity=medium&amp;id=6995046d80d747be20e1792b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65753-na-a83a2ef3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65753%3A%20n%2Fa&amp;severity=high&amp;id=6994a23480d747be20c6db0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55271-na-4ed4070f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55271%3A%20n%2Fa&amp;severity=low&amp;id=6994a23480d747be20c6db09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70830-na-05399173</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70830%3A%20n%2Fa&amp;severity=critical&amp;id=69948d1c80d747be20bdf6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70828-na-795b8689</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70828%3A%20n%2Fa&amp;severity=high&amp;id=69948d1c80d747be20bdf6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70829-na-8558d9cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70829%3A%20n%2Fa&amp;severity=medium&amp;id=6994861680d747be20bbcc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-17-96a06716</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-17&amp;severity=low&amp;id=6993d5d8d1735ca731db4256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12062-cwe-22-improper-limitation-of-a-pat-191a7218</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12062%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=6993abded1735ca731bdefea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2439-cwe-340-generation-of-predictable-nu-8847b5d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2439%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BVA%20Concierge%3A%3ASessions&amp;severity=critical&amp;id=69938fbfd1735ca731b5ffa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15578-cwe-338-use-of-cryptographically-we-572f6a23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15578%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20TEEJAY%20Maypole&amp;severity=critical&amp;id=69938c3ad1735ca731b45482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2474-cwe-122-heap-based-buffer-overflow-i-3d94ea2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2474%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20DDICK%20Crypt%3A%3AURandom&amp;severity=high&amp;id=6994257080d747be207b7278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2001-cwe-862-missing-authorization-in-wpx-dd0b0e65</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2001%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20WowRevenue%20%E2%80%93%20Product%20Bundles%20%26%20Bulk%20Discounts&amp;severity=high&amp;id=6993739ed1735ca731a8ba4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-steals-openclaw-ai-agent-configuration-8bbd2b7c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20Steals%20OpenClaw%20AI%20Agent%20Configuration%20Files%20and%20Gateway%20Tokens&amp;severity=medium&amp;id=69943af180d747be20a42718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/study-uncovers-25-password-recovery-attacks-in-maj-6f2cde85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Study%20Uncovers%2025%20Password%20Recovery%20Attacks%20in%20Major%20Cloud%20Password%20Managers&amp;severity=medium&amp;id=69943af180d747be20a4271b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16th-february-threat-intelligence-report-aa8bfcdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16th%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69943ba880d747be20a474a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2567-stack-based-buffer-overflow-in-wavli-0c1e9353</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2567%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=6993577fd1735ca7319ea144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2566-stack-based-buffer-overflow-in-wavli-f35978e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2566%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=699353fad1735ca7319d6c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2565-stack-based-buffer-overflow-in-wavli-6deb4b90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2565%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=6994257080d747be207b7280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26930-cwe-79-improper-neutralization-of-i-8e58780b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26930%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SmarterTools%20SmarterMail&amp;severity=high&amp;id=6994257080d747be207b727c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2101-cwe-79-improper-neutralization-of-in-15efa45d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2101%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIAvpm%20Web%20Access&amp;severity=high&amp;id=6994257080d747be207b7286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2564-weak-password-recovery-in-intelbras--15b4ad92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2564%3A%20Weak%20Password%20Recovery%20in%20Intelbras%20VIP%203260%20Z%20IA&amp;severity=critical&amp;id=6994257080d747be207b7289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2563-privilege-escalation-in-jingdong-jd--d2760a62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2563%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=6994257080d747be207b728e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dior-louis-vuitton-tiffany-fined-25-million-in-sou-2f72e32c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dior%2C%20Louis%20Vuitton%2C%20Tiffany%20Fined%20%2425%20Million%20in%20South%20Korea%20After%20Data%20Breaches&amp;severity=medium&amp;id=69933423d1735ca731935dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2562-privilege-escalation-in-jingdong-jd--f3eb266d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2562%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=69933465d1735ca73193848d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2561-privilege-escalation-in-jingdong-jd--0fdfd21b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2561%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=699330d2d1735ca731922b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-ai-assistant-extensions-targeting-260000-chro-971e4e95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20AI%20Assistant%20Extensions%20Targeting%20260%2C000%20Chrome%20Users%20via%20injected%20iframes&amp;severity=medium&amp;id=6994942680d747be20c100a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-macromaze-new-apt28-campaign-using-basic-8c994355</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20MacroMaze%3A%20New%20APT28%20Campaign%20Using%20Basic%20Tooling%20and%20Legitimate%20Infrastructure&amp;severity=medium&amp;id=6994942680d747be20c10099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2032-vulnerability-in-mozilla-firefox-for-3fb5eb69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2032%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=6994257180d747be207b740f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2447-vulnerability-in-mozilla-firefox-ef99469f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2447%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6994257180d747be207b740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2560-os-command-injection-in-kalcaddle-ko-1fd95a3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2560%3A%20OS%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69932648d1735ca7318be8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-17-beta-strengthens-secure-by-default-desi-e8c0e0a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%2017%20Beta%20Strengthens%20Secure-by-Default%20Design%20for%20Privacy%20and%20App%20Security&amp;severity=medium&amp;id=69932290d1735ca731892ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-navigates-dhs-shutdown-with-reduced-staff-3f2ba258</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Navigates%20DHS%20Shutdown%20With%20Reduced%20Staff&amp;severity=medium&amp;id=69932290d1735ca731892ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1335-cwe-787-out-of-bounds-write-in-dassa-22d5a00c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1335%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1334-cwe-125-out-of-bounds-read-in-dassau-5f48827a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1334%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1333-cwe-457-use-of-uninitialized-variabl-1f2a1adb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1333%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2558-server-side-request-forgery-in-geeka-7a60bbf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2558%3A%20Server-Side%20Request%20Forgery%20in%20GeekAI&amp;severity=medium&amp;id=699322e0d1735ca7318966eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/key-openclaw-risks-clawdbot-moltbot-kaspersky-offi-a732c8e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Key%20OpenClaw%20risks%2C%20Clawdbot%2C%20Moltbot%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69931bf6d1735ca731864664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2557-cross-site-scripting-in-cskefu-a32390c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2557%3A%20Cross%20Site%20Scripting%20in%20cskefu&amp;severity=medium&amp;id=69931bbad1735ca731861d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-outlook-add-ins-hijack-0-day-patches--0d4cc800</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weekly%20Recap%3A%20Outlook%20Add-Ins%20Hijack%2C%200-Day%20Patches%2C%20Wormable%20Botnet%20%26%20AI%20Malware&amp;severity=low&amp;id=69943af180d747be20a4271e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2556-server-side-request-forgery-in-cskef-9b320b42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2556%3A%20Server-Side%20Request%20Forgery%20in%20cskefu&amp;severity=medium&amp;id=699314b2d1735ca73181d582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2555-deserialization-in-jeecgboot-47ee4cd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2555%3A%20Deserialization%20in%20JeecgBoot&amp;severity=low&amp;id=69931f3ed1735ca73187d04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-clickfix-attack-abusing-dns-loo-0fffbe0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20ClickFix%20Attack%20Abusing%20DNS%20Lookups&amp;severity=medium&amp;id=69930679d1735ca7315980e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safe-and-inclusive-esociety-how-lithuania-is-braci-dbbd7465</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Safe%20and%20Inclusive%20E%E2%80%91Society%3A%20How%20Lithuania%20Is%20Bracing%20for%20AI%E2%80%91Driven%20Cyber%20Fraud&amp;severity=medium&amp;id=69931da4d1735ca731873d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2418-cwe-601-url-redirection-to-untrusted-fc5517c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2418%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20TR7%20Cyber%20%E2%80%8B%E2%80%8BDefense%20Inc.%20Web%20Application%20Firewall&amp;severity=medium&amp;id=699306bfd1735ca7315a65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2553-sql-injection-in-tushar-2223-hotel-m-f8823bdb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2553%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel-Management-System&amp;severity=medium&amp;id=699306bfd1735ca7315a65f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2552-path-traversal-in-zentao-5658ef66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2552%3A%20Path%20Traversal%20in%20ZenTao&amp;severity=medium&amp;id=6992fd2fbda29fb02f6aa184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-and-ninja-browser-malware-campaign-a-3606198a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20and%20Ninja%20Browser%20malware%20campaign%20abusing%20Google%20Groups&amp;severity=medium&amp;id=6992f9abbda29fb02f68dd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2551-path-traversal-in-zentao-868a3066</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2551%3A%20Path%20Traversal%20in%20ZenTao&amp;severity=medium&amp;id=6992f627bda29fb02f6786e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-zerodayrat-mobile-spyware-enables-real-time-su-d5c92f82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ZeroDayRAT%20Mobile%20Spyware%20Enables%20Real-Time%20Surveillance%20and%20Data%20Theft&amp;severity=medium&amp;id=69931da4d1735ca731873d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2452-cwe-627-dynamic-variable-evaluation--1e0b8836</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2452%3A%20CWE-627%20Dynamic%20Variable%20Evaluation%20in%20pretix%20pretix-newsletter&amp;severity=high&amp;id=6992f627bda29fb02f6786dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2451-cwe-627-dynamic-variable-evaluation--3e2879f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2451%3A%20CWE-627%20Dynamic%20Variable%20Evaluation%20in%20pretix%20pretix-doistep&amp;severity=high&amp;id=6992f627bda29fb02f6786da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2550-unrestricted-upload-in-efm-iptime-a6-a8baac0d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2550%3A%20Unrestricted%20Upload%20in%20EFM%20iptime%20A6004MX&amp;severity=critical&amp;id=6992ef1fbda29fb02f643b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2577-cwe-306-missing-authentication-for-c-d0d526e7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2577%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HKUDS%20nanobot&amp;severity=critical&amp;id=6992ef1fbda29fb02f643b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2549-improper-access-controls-in-zhanghua-d9a74f1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2549%3A%20Improper%20Access%20Controls%20in%20zhanghuanhao%20LibrarySystem%20%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=6992eb9bbda29fb02f62aae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2548-command-injection-in-wayos-fbm-220g-21493729</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2548%3A%20Command%20Injection%20in%20WAYOS%20FBM-220G&amp;severity=medium&amp;id=69930886d1735ca7315e7f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2547-cross-site-scripting-in-ligerosmart-10ccf03b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2547%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992da08bda29fb02f5c0246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2546-cross-site-scripting-in-ligerosmart-e8ff2733</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2546%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992d684bda29fb02f5a9bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-first-actively-exploited-chrome-zer-9fc21206</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20First%20Actively%20Exploited%20Chrome%20Zero-Day%20of%202026&amp;severity=medium&amp;id=6992cf48bda29fb02f56ff7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2026-64-bits-malware-trend-mon-feb-16th-76ab2197</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2026%2064-Bits%20Malware%20Trend%2C%20(Mon%2C%20Feb%2016th)&amp;severity=low&amp;id=69931e47d1735ca7318782d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2545-cross-site-scripting-in-ligerosmart-43aa65d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2545%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992cbf7bda29fb02f561cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2544-os-command-injection-in-yued-fe-lulu-aec8889b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2544%3A%20OS%20Command%20Injection%20in%20yued-fe%20LuLu%20UI&amp;severity=medium&amp;id=6992cbf7bda29fb02f561cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2543-unverified-password-change-in-vichan-bedef274</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2543%3A%20Unverified%20Password%20Change%20in%20vichan-devel%20vichan&amp;severity=medium&amp;id=6992c4f0bda29fb02f53b417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chrome-zero-day-cve-2026-2441-under-active-att-ba9a1f06</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Chrome%20Zero-Day%20(CVE-2026-2441)%20Under%20Active%20Attack%20%E2%80%94%20Patch%20Released&amp;severity=high&amp;id=69931da4d1735ca731873d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2542-unquoted-search-path-in-total-vpn-86fa0d9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2542%3A%20Unquoted%20Search%20Path%20in%20Total%20VPN&amp;severity=high&amp;id=6992bde8bda29fb02f5127ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2538-uncontrolled-search-path-in-flos-fre-d9540b5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2538%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=6992b6dfbda29fb02f4dd9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0929-cwe-862-missing-authorization-in-reg-a36cfddd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0929%3A%20CWE-862%20Missing%20Authorization%20in%20RegistrationMagic&amp;severity=medium&amp;id=69930886d1735ca7315e7f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2537-command-injection-in-comfast-cf-e4-d2596177</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2537%3A%20Command%20Injection%20in%20Comfast%20CF-E4&amp;severity=medium&amp;id=6992b36bbda29fb02f4bb440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2536-xml-external-entity-reference-in-ope-cff9a8a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2536%3A%20XML%20External%20Entity%20Reference%20in%20opencc%20JFlow&amp;severity=medium&amp;id=6992ac53bda29fb02f486070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2535-command-injection-in-comfast-cf-n1-v-8437b00c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2535%3A%20Command%20Injection%20in%20Comfast%20CF-N1%20V2&amp;severity=medium&amp;id=6992a54bbda29fb02f457206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2534-command-injection-in-comfast-cf-n1-v-8ba549f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2534%3A%20Command%20Injection%20in%20Comfast%20CF-N1%20V2&amp;severity=medium&amp;id=69929abfbda29fb02f425d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2533-command-injection-in-tosei-self-serv-3617be85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2533%3A%20Command%20Injection%20in%20Tosei%20Self-service%20Washing%20Machine&amp;severity=medium&amp;id=69929abfbda29fb02f425d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2532-server-side-request-forgery-in-lints-c44236a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2532%3A%20Server-Side%20Request%20Forgery%20in%20lintsinghua%20DeepAudit&amp;severity=medium&amp;id=69928cafbda29fb02f1ec50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2531-server-side-request-forgery-in-minds-fd7157b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2531%3A%20Server-Side%20Request%20Forgery%20in%20MindsDB&amp;severity=medium&amp;id=69928cafbda29fb02f1ec505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2530-command-injection-in-wavlink-wl-wn57-daec65f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2530%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69928cafbda29fb02f1ec4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2529-command-injection-in-wavlink-wl-wn57-744d9dbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2529%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f12609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2528-command-injection-in-wavlink-wl-wn57-1a573700</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2528%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f126094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2527-command-injection-in-wavlink-wl-wn57-afb46441</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2527%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f12608e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2526-command-injection-in-wavlink-wl-wn57-d05d2dfa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2526%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927413bda29fb02f0e1194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2525-denial-of-service-in-free5gc-897c96c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2525%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69927413bda29fb02f0e118c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2524-denial-of-service-in-open5gs-6effde78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2524%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69926d0abda29fb02f03f172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2523-reachable-assertion-in-open5gs-c69cfefb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2523%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=69926d0abda29fb02f03f16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65717-na-1fa0a602</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65717%3A%20n%2Fa&amp;severity=medium&amp;id=6994257180d747be207b7406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65716-na-7ce38e2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65716%3A%20n%2Fa&amp;severity=high&amp;id=6994257080d747be207b729c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65715-na-fdb8ef7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65715%3A%20n%2Fa&amp;severity=high&amp;id=6994257080d747be207b7298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-16-388c1363</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-16&amp;severity=medium&amp;id=6993b2afd1735ca731bf33b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-16-309da41c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-16&amp;severity=low&amp;id=6992ba2ebda29fb02f4f9c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2522-memory-corruption-in-open5gs-7f05b583</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2522%3A%20Memory%20Corruption%20in%20Open5GS&amp;severity=medium&amp;id=69925b77bda29fb02fd9898a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2521-memory-corruption-in-open5gs-c3391632</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2521%3A%20Memory%20Corruption%20in%20Open5GS&amp;severity=medium&amp;id=699253b94b0e3abdf99ab24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26369-improper-privilege-management-in-ju-f86570ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26369%3A%20Improper%20Privilege%20Management%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=critical&amp;id=6991ea414b0e3abdf972b019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26368-missing-authorization-in-jung-enet--3a6df6c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26368%3A%20Missing%20Authorization%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=high&amp;id=6991ea414b0e3abdf972b015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26367-missing-authorization-in-jung-enet--173718f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26367%3A%20Missing%20Authorization%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=high&amp;id=6991ea414b0e3abdf972b010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26366-use-of-default-credentials-in-jung--23983d02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26366%3A%20Use%20of%20Default%20Credentials%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=critical&amp;id=6991ea414b0e3abdf972b00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-discloses-dns-based-clickfix-attack-usin-fbef1593</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Discloses%20DNS-Based%20ClickFix%20Attack%20Using%20Nslookup%20for%20Malware%20Staging&amp;severity=medium&amp;id=6992699ebda29fb02fff2c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2517-denial-of-service-in-open5gs-08313086</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2517%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=6991c0114b0e3abdf95dbbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2516-uncontrolled-search-path-in-unidocs--c9898b25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2516%3A%20Uncontrolled%20Search%20Path%20in%20Unidocs%20ezPDF%20DRM%20Reader&amp;severity=high&amp;id=6991bc8d4b0e3abdf95c3022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2541-cwe-331-insufficient-entropy-in-micc-57e2a0ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2541%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=medium&amp;id=6991aaf94b0e3abdf953ce6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2540-cwe-288-authentication-bypass-using--06adb1fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2540%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=high&amp;id=6991aaf94b0e3abdf953ce6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2539-cwe-319-cleartext-transmission-of-se-fff717fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2539%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=medium&amp;id=69925668bda29fb02fd3ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32063-cwe-306-missing-authentication-for--681dee89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32063%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=6991a7744b0e3abdf9520b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32062-cwe-121-stack-based-buffer-overflow-2fc9767c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32062%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32061-cwe-121-stack-based-buffer-overflow-92f71bd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32061%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32060-cwe-347-improper-verification-of-cr-41ae0f8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32060%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=6991a7744b0e3abdf9520b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32059-cwe-121-stack-based-buffer-overflow-162b7b2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32059%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32058-cwe-121-stack-based-buffer-overflow-68f844de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32058%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=critical&amp;id=6991a7744b0e3abdf9520b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1793-cwe-22-improper-limitation-of-a-path-4752164f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1793%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699151874b0e3abdf9d7dee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1750-cwe-269-improper-privilege-managemen-02c6a8ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1750%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ecwid%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart&amp;severity=high&amp;id=699151874b0e3abdf9d7dedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1490-cwe-350-reliance-on-reverse-dns-reso-0fc3066a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1490%3A%20CWE-350%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20cleantalk%20Spam%20protection%2C%20Honeypot%2C%20Anti-Spam%20by%20CleanTalk&amp;severity=critical&amp;id=69913eb4c9e1ff5ad8fbefbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-15-2c822212</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-15&amp;severity=medium&amp;id=69926249bda29fb02ff8a81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-15-3a1244b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-15&amp;severity=low&amp;id=69919cb34b0e3abdf946b1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-300-malicious-chrome-extensions-caught-leakin-5e10fd10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20300%20Malicious%20Chrome%20Extensions%20Caught%20Leaking%20or%20Stealing%20User%20Data&amp;severity=medium&amp;id=69906489c9e1ff5ad887c2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2312-cwe-862-missing-authorization-in-max-a02e1ede</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2312%3A%20CWE-862%20Missing%20Authorization%20in%20maxfoundry%20Media%20Library%20Folders&amp;severity=medium&amp;id=69906138c9e1ff5ad886470f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1512-cwe-79-improper-neutralization-of-in-96d8989a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=6990489cc9e1ff5ad87d7ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1258-cwe-89-improper-neutralization-of-sp-f39be00a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1258%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20getwpfunnels%20Mail%20Mint%20%E2%80%93%20Email%20Marketing%2C%20Newsletter%2C%20Email%20Automation%20%26%20WooCommerce%20Emails&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0550-cwe-79-improper-neutralization-of-in-c7aab6e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0550%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Points%20Management%20System%20For%20Gamification%2C%20Ranks%2C%20Badges%2C%20and%20Loyalty%20Rewards%20Program%20%E2%80%93%20myCred&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8572-cwe-269-improper-privilege-managemen-357fd27c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8572%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Truelysell%20Core&amp;severity=critical&amp;id=69903384c9e1ff5ad8746a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1843-cwe-79-improper-neutralization-of-in-da8cc8a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1843%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Super%20Page%20Cache&amp;severity=high&amp;id=69903384c9e1ff5ad8746a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1254-cwe-862-missing-authorization-in-wpc-c0fbfd3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1254%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1249-cwe-918-server-side-request-forgery--1a4e68ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1249%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1988-cwe-98-improper-control-of-filename--9af2696b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1988%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpdecent%20Flexi%20Product%20Slider%20and%20Grid%20for%20WooCommerce&amp;severity=high&amp;id=69901aeec9e1ff5ad868940c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1987-cwe-639-authorization-bypass-through-b74bd663</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1987%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20morelmathieuj%20Scheduler%20Widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0736-cwe-79-improper-neutralization-of-in-b1ef6454</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collectchat%20Chatbot%20for%20WordPress%20by%20Collect.chat%20%E2%9A%A1%EF%B8%8F&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1187-cwe-79-improper-neutralization-of-in-7770e71d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1187%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20terrazoom%20ZoomifyWP%20Free&amp;severity=medium&amp;id=69901aecc9e1ff5ad868938e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1915-cwe-79-improper-neutralization-of-in-a7b5b569</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1915%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestony%20Simple%20Plyr&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1985-cwe-79-improper-neutralization-of-in-aac7a77d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arieslab%20Press3D&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0753-cwe-79-improper-neutralization-of-in-6158470c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitacre%20Super%20Simple%20Contact%20Form&amp;severity=high&amp;id=69901aecc9e1ff5ad8689381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1306-cwe-434-unrestricted-upload-of-file--95798a0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1306%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20adminkov%20midi-Synth&amp;severity=critical&amp;id=69901aecc9e1ff5ad8689399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0735-cwe-79-improper-neutralization-of-in-90791c84</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webilop%20User%20Language%20Switch&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15483-cwe-79-improper-neutralization-of-i-7adcdaf1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15483%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajferg%20Link%20Hopper&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1303-cwe-862-missing-authorization-in-mat-619170e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1303%3A%20CWE-862%20Missing%20Authorization%20in%20matthieuscarset%20MailChimp%20Campaigns&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1910-cwe-79-improper-neutralization-of-in-eb230e1c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20upmenu%20UpMenu%20%E2%80%93%20Online%20ordering%20for%20restaurants&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0693-cwe-79-improper-neutralization-of-in-24714602</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arnoesterhuizen%20Allow%20HTML%20in%20Category%20Descriptions&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1096-cwe-79-improper-neutralization-of-in-1ba42204</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1096%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20raju_ahmed%20Best-wp-google-map&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0559-cwe-79-improper-neutralization-of-in-3ffb3a17</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1394-cwe-352-cross-site-request-forgery-c-bd95f994</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1394%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dmitritechs%20WP%20Quick%20Contact%20Us&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1905-cwe-79-improper-neutralization-of-in-0538bb4b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1905%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devmw%20Sphere%20Manager&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14852-cwe-352-cross-site-request-forgery--9b67a2c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14852%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20antevenio%20MDirector%20Newsletter%20WordPress%20Plugin&amp;severity=medium&amp;id=69901aebc9e1ff5ad86892ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1944-cwe-862-missing-authorization-in-kre-7484832f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1944%3A%20CWE-862%20Missing%20Authorization%20in%20krellbat%20CallbackKiller%20service%20widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0557-cwe-79-improper-neutralization-of-in-477d19e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0557%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peterschulznl%20WP%20Data%20Access%20%E2%80%93%20App%20Builder%20for%20Tables%2C%20Forms%2C%20Charts%2C%20Maps%20%26%20Dashboards&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2024-cwe-89-improper-neutralization-of-sp-e9679b86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2024%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20savitasoni%20PhotoStack%20Gallery&amp;severity=high&amp;id=69901aeec9e1ff5ad8689418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1939-cwe-79-improper-neutralization-of-in-2797da7b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1939%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cutesalah%20Percent%20to%20Infograph&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1795-cwe-79-improper-neutralization-of-in-f021e9a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1795%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sivenso%20Address%20Bar%20Ads&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1903-cwe-79-improper-neutralization-of-in-ad4b822d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1903%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shellbot%20Ravelry%20Designs%20Widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1792-cwe-79-improper-neutralization-of-in-5d191d6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1792%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20owencutajar%20Geo%20Widget&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0745-cwe-918-server-side-request-forgery--d2649c34</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0745%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20webilop%20User%20Language%20Switch&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2022-cwe-862-missing-authorization-in-edg-f55545e6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2022%3A%20CWE-862%20Missing%20Authorization%20in%20edgarrojas%20Smart%20Forms%20%E2%80%93%20when%20you%20need%20more%20than%20just%20a%20contact%20form&amp;severity=medium&amp;id=69901aeec9e1ff5ad8689413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1901-cwe-79-improper-neutralization-of-in-1eecf619</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20questionpro%20QuestionPro%20Surveys&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14873-cwe-352-cross-site-request-forgery--070bf878</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14873%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0727-cwe-862-missing-authorization-in-ess-2f6c0588</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0727%3A%20CWE-862%20Missing%20Authorization%20in%20essentialplugin%20Accordion%20and%20Accordion%20Slider&amp;severity=medium&amp;id=69901aebc9e1ff5ad868931d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0751-cwe-79-improper-neutralization-of-in-c61be848</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandonfire%20Payment%20Page%20%7C%20Payment%20Form%20for%20Stripe&amp;severity=medium&amp;id=69901aecc9e1ff5ad868937c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6792-cwe-306-missing-authentication-for-c-1e53c2e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6792%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20amentotechpvtltd%20One%20to%20one%20user%20Chat%20by%20WPGuppy&amp;severity=medium&amp;id=69901aebc9e1ff5ad868930c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1796-cwe-79-improper-neutralization-of-in-c8d86ecc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20indextwo%20StyleBidet&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1932-cwe-862-missing-authorization-in-bss-73d0e9c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1932%3A%20CWE-862%20Missing%20Authorization%20in%20bssoftware%20Appointment%20Booking%20Calendar%20Plugin%20%E2%80%93%20Bookr&amp;severity=medium&amp;id=699010d0c9e1ff5ad864b5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2469-improper-neutralization-of-special-e-90b4e04e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2469%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20directorytree%2Fimapengine&amp;severity=high&amp;id=69901846c9e1ff5ad867f1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0692-cwe-862-missing-authorization-in-blu-69b2b913</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0692%3A%20CWE-862%20Missing%20Authorization%20in%20bluesnap%20BlueSnap%20Payment%20Gateway%20for%20WooCommerce&amp;severity=high&amp;id=698ffec8c9e1ff5ad85c71ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1912-cwe-79-improper-neutralization-of-in-35e454d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1912%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ulaulaman%20Citations%20tools&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c7202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1983-cwe-352-cross-site-request-forgery-c-ced2e775</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1983%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sourcez%20SEATT%3A%20Simple%20Event%20Attendance&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c7206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1164-cwe-79-improper-neutralization-of-in-d439c77f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1164%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phoenixstudiodz%20Easy%20Voice%20Mail&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1904-cwe-79-improper-neutralization-of-in-f585d933</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nayon46%20Simple%20Wp%20colorfull%20Accordion&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1754-cwe-79-improper-neutralization-of-in-d238dc53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexeyknyazev%20personal-authors-category&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2144-cwe-269-improper-privilege-managemen-86e5e526</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2144%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20katsushi-kawamori%20Magic%20Login%20Mail%20or%20QR%20Code&amp;severity=high&amp;id=698ffec8c9e1ff5ad85c7211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2027-cwe-79-improper-neutralization-of-in-ab34f6ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2027%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ampenhancer%20AMP%20Enhancer%20%E2%80%93%20Compatibility%20Layer%20for%20Official%20AMP%20Plugin&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c720b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-on-the-edge-of-the-web-and-mobile-using-q-9c0e2dc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20on%20the%20Edge%20of%20the%20Web%20and%20Mobile%20Using%20QR%20Codes&amp;severity=medium&amp;id=6992f627bda29fb02f678619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14608-cwe-862-missing-authorization-in-in-75b65e8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14608%3A%20CWE-862%20Missing%20Authorization%20in%20infosatech%20WP%20Last%20Modified%20Info&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14067-cwe-862-missing-authorization-in-ha-9b0973c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14067%3A%20CWE-862%20Missing%20Authorization%20in%20hassantafreshi%20Easy%20Form%20Builder%20by%20WhiteStudio%20%E2%80%94%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13973-cwe-200-exposure-of-sensitive-infor-87f72582</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13973%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kasuga16%20StickEasy%20Protected%20Contact%20Form&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13681-cwe-22-improper-limitation-of-a-pat-bc28d7b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13681%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thebaldfatguy%20BFG%20Tools%20%E2%80%93%20Extension%20Zipper&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-14-c654b42a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-14&amp;severity=medium&amp;id=699110cac9e1ff5ad8c8365f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-14-389c6444</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-14&amp;severity=low&amp;id=698ff083c9e1ff5ad817a9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26273-cwe-200-exposure-of-sensitive-infor-d59f1dbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26273%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20idno%20known&amp;severity=critical&amp;id=698f9fdcc9e1ff5ad86c396f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1841-cwe-79-improper-neutralization-of-in-da2dead1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelyoursite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20%26%20API%20Manager&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1844-cwe-79-improper-neutralization-of-in-13a5fcdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1844%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelyoursite%20PixelYourSite%20Pro%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15157-cwe-862-missing-authorization-in-st-7fd1e561</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15157%3A%20CWE-862%20Missing%20Authorization%20in%20starfishwp%20Starfish%20Review%20Generation%20%26%20Marketing%20for%20WordPress&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26334-cwe-798-use-of-hard-coded-credentia-74ab6645</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26334%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Calero%20VeraSMART&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26333-cwe-306-missing-authentication-for--bbf1e7d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26333%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Calero%20VeraSMART&amp;severity=critical&amp;id=698f9c59c9e1ff5ad86a8edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26335-cwe-321-use-of-hard-coded-cryptogra-07023d75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26335%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Calero%20VeraSMART&amp;severity=critical&amp;id=698f9c59c9e1ff5ad86a8ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26208-cwe-502-deserialization-of-untruste-4dc06e3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26208%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=698f793ac9e1ff5ad85a8a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26190-cwe-306-missing-authentication-for--6b5551d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26190%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20milvus-io%20milvus&amp;severity=critical&amp;id=698f793ac9e1ff5ad85a8a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26187-cwe-22-improper-limitation-of-a-pat-b61d1b8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26187%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20treeverse%20lakeFS&amp;severity=high&amp;id=698f723cc9e1ff5ad857abde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25991-cwe-918-server-side-request-forgery-fb24aa80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25991%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=698f723cc9e1ff5ad857abd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2441-use-after-free-in-google-chrome-1b1b8c59</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2441%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=698f723cc9e1ff5ad857abe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25964-cwe-22-improper-limitation-of-a-pat-9ddfb3f3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25964%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=698f723cc9e1ff5ad857abd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-ties-suspected-russian-actor-to-canfail-mal-4b808088</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Ties%20Suspected%20Russian%20Actor%20to%20CANFAIL%20Malware%20Attacks%20on%20Ukrainian%20Orgs&amp;severity=medium&amp;id=698f605fc9e1ff5ad84f914a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1790-execution-with-unnecessary-privilege-abe9bcfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1790%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Genetec%20Inc.%20Genetec%20Sipelia&amp;severity=medium&amp;id=698f5d11c9e1ff5ad84e392b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26226-cwe-79-improper-neutralization-of-i-47603533</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20lukilabs%20beautiful-mermaid&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-links-china-iran-russia-north-korea-to-coor-be696efd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Links%20China%2C%20Iran%2C%20Russia%2C%20North%20Korea%20to%20Coordinated%20Defense%20Sector%20Cyber%20Operations&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2026-cwe-276-incorrect-default-permission-871e516d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2026%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Tenable%20Agent&amp;severity=medium&amp;id=698f5286c9e1ff5ad84a5d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-9921-deploys-voidlink-malware-to-target-techno-ff44eb2e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-9921%20Deploys%20VoidLink%20Malware%20to%20Target%20Technology%20and%20Financial%20Sectors&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26221-cwe-502-deserialization-of-untruste-9949df79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26221%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hyland%20OnBase%20Workflow%20Timer%20Service&amp;severity=critical&amp;id=698f4474c9e1ff5ad8426b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-google-looks-at-ai-abuse-trump-pause-beabdaf4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Google%20Looks%20at%20AI%20Abuse%2C%20Trump%20Pauses%20China%20Bans%2C%20Disney%E2%80%99s%20%242.7M%20Fine&amp;severity=medium&amp;id=698f3d39c9e1ff5ad83e90c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1578-cwe-79-in-hp-inc-hp-app-fbc79362</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1578%3A%20CWE-79%20in%20HP%20Inc%20HP%20App&amp;severity=medium&amp;id=698f40f0c9e1ff5ad8409b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1619-cwe-639-authorization-bypass-through-f50fd75b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1619%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1618-cwe-288-authentication-bypass-using--4e2f8f4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1618%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14349-cwe-267-privilege-defined-with-unsa-4d64021b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14349%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-carrier-odido-discloses-data-breach-impactin-e3d3a0d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Carrier%20Odido%20Discloses%20Data%20Breach%20Impacting%206%20Million&amp;severity=medium&amp;id=698f1309c9e1ff5ad826ee2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2443-out-of-bounds-read-in-red-hat-red-ha-7926b12b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2443%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=698f214cc9e1ff5ad82dd77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33042-cwe-94-improper-control-of-generati-afe678c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33042%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Avro%20Java%20SDK&amp;severity=high&amp;id=698f16c1c9e1ff5ad828f5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-extensions-caught-stealing-busine-8d267a5e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20Extensions%20Caught%20Stealing%20Business%20Data%2C%20Emails%2C%20and%20Browsing%20History&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-vulnerability-targeted-by-hackers-with-450e3726</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Vulnerability%20Targeted%20by%20Hackers%20Within%2024%20Hours%20of%20PoC%20Release&amp;severity=critical&amp;id=698f04f9c9e1ff5ad81fd15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npms-update-to-harden-their-supply-chain-and-point-a4628ed5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%E2%80%99s%20Update%20to%20Harden%20Their%20Supply%20Chain%2C%20and%20Points%20to%20Consider&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-solarwinds-notepad-microso-e99c0319</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20SolarWinds%2C%20Notepad%2B%2B%2C%20Microsoft%20Vulnerabilities&amp;severity=medium&amp;id=698f0175c9e1ff5ad81defee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-weaponize-rmm-tools-via-zoom-meet-teams--bedec14e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Weaponize%20RMM%20Tools%20via%20Zoom%2C%20Meet%2C%20%26%20Teams%20Lures&amp;severity=medium&amp;id=698f1dccc9e1ff5ad82c8dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0872-cwe-295-improper-certificate-validat-05369c91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0872%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Thales%20SafeNet%20Agent%20for%20Windows%20Logon&amp;severity=low&amp;id=698f214cc9e1ff5ad82dd777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-observe-in-the-wild-exploitation-of-be-7ab8e8f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Observe%20In-the-Wild%20Exploitation%20of%20BeyondTrust%20CVSS%209.9%20Vulnerability&amp;severity=critical&amp;id=699067a1c9e1ff5ad8890c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-145-patches-11-vulnerabilities-910eb94d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20145%20Patches%2011%20Vulnerabilities&amp;severity=high&amp;id=698ee1d1c9e1ff5ad80c75e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-revives-tianfu-cup-hacking-contest-under-inc-4cdc4a0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Revives%20Tianfu%20Cup%20Hacking%20Contest%20Under%20Increased%20Secrecy&amp;severity=medium&amp;id=698eccb9c9e1ff5ad8fd6962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15520-cwe-200-information-exposure-in-reg-6e404135</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15520%3A%20CWE-200%20Information%20Exposure%20in%20RegistrationMagic&amp;severity=medium&amp;id=698ec262c9e1ff5ad8f5317e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48023-cwe-617-reachable-assertion-in-yoko-bac58b67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48023%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48022-cwe-130-in-yokogawa-electric-corpor-44c6e289</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48022%3A%20CWE-130%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48021-cwe-191-integer-underflow-wrap-or-w-f12d0e3a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48021%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48020-cwe-617-reachable-assertion-in-yoko-6e599e6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48020%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48019-cwe-617-reachable-assertion-in-yoko-0e0071b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48019%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1924-cwe-191-integer-underflow-wrap-or-wr-fdbea02f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1924%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25108-improper-neutralization-of-special--8909b9f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25108%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Soliton%20Systems%20K.K.%20FileZen&amp;severity=high&amp;id=698ea641c9e1ff5ad8e3f0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1721-feae9b4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1721&amp;severity=medium&amp;id=698e8a20c9e1ff5ad87f7e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9293-cwe-295-improper-certificate-validat-d1d8ef32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9293%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20App&amp;severity=high&amp;id=698e788cc9e1ff5ad8549279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9292-cwe-942-permissive-cross-domain-secu-dbb25b94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9292%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20TP-Link%20Systems%20Inc.%20Omada%20Cloud%20Controller&amp;severity=low&amp;id=698e788cc9e1ff5ad8549276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-13-672978b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-13&amp;severity=medium&amp;id=698fbf4ac9e1ff5ad878e2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70957-na-7bf46715</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70957%3A%20n%2Fa&amp;severity=high&amp;id=698f9fdcc9e1ff5ad86c396a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69633-na-14384712</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69633%3A%20n%2Fa&amp;severity=critical&amp;id=698f9fdcc9e1ff5ad86c3966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70955-na-2052c071</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70955%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70954-na-50a83a06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70954%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70866-na-5a7b6f22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70866%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70093-na-f5f88d30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70093%3A%20n%2Fa&amp;severity=high&amp;id=698f98d5c9e1ff5ad868bfbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70956-na-f3a79383</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70956%3A%20n%2Fa&amp;severity=high&amp;id=698f98d5c9e1ff5ad868bfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69770-na-4c2996be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69770%3A%20n%2Fa&amp;severity=critical&amp;id=698f6419c9e1ff5ad8512193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66676-na-9476df4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66676%3A%20n%2Fa&amp;severity=medium&amp;id=698f60acc9e1ff5ad84fbaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70095-na-a36d5605</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70095%3A%20n%2Fa&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70091-na-1767a000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70091%3A%20n%2Fa&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70123-na-82db7ba4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70123%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70122-na-2037c377</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70122%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70121-na-deced414</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70121%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70094-na-132ab04f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70094%3A%20n%2Fa&amp;severity=medium&amp;id=698f4474c9e1ff5ad8426b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-13-fc9bcc6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-13&amp;severity=low&amp;id=698ed3bfc9e1ff5ad804300a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21961-cwe-119-improper-restriction-of-ope-a0bfc363</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21961%3A%20CWE-119%20%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20AMD%20AMD%20EPYC%E2%84%A2%207002%20Series%20Processors&amp;severity=medium&amp;id=698e6a7bc9e1ff5ad82ff4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40905-cwe-338-use-of-cryptographically-we-1325ff2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40905%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20DBOOK%20WWW%3A%3AOAuth&amp;severity=high&amp;id=698e66f8c9e1ff5ad82e611b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26188-cwe-79-improper-neutralization-of-i-73929d2c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26188%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20solspace%20craft-freeform&amp;severity=medium&amp;id=698ec65ac9e1ff5ad8f7fbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26068-cwe-77-improper-neutralization-of-s-58777eec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26068%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20jm33-m0%20emp3r0r&amp;severity=critical&amp;id=698ec65ac9e1ff5ad8f7fbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26224-cwe-367-time-of-check-time-of-use-t-b30068a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26224%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Intego%20Log%20Reporter&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26225-cwe-59-improper-link-resolution-bef-505203a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26225%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Intego%20Personal%20Backup&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26076-cwe-770-allocation-of-resources-wit-ed01ebe8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26076%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20pendulum-project%20ntpd-rs&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26075-cwe-352-cross-site-request-forgery--6c6a6891</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26075%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14282-incorrect-privilege-assignment-in-h-693927bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14282%3A%20Incorrect%20Privilege%20Assignment%20in%20https%3A%2F%2Fgithub.com%2Fmkj%2Fdropbear%2F%20dropbear&amp;severity=medium&amp;id=69962af36aea4a407ae847f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26069-cwe-200-exposure-of-sensitive-infor-4d72e5e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26069%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thecfu%20scraparr&amp;severity=critical&amp;id=698e4ad9c9e1ff5ad81db30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1358-cwe-434-in-airleader-gmbh-airleader--2b35e562</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1358%3A%20CWE-434%20in%20Airleader%20GmbH%20Airleader%20Master&amp;severity=critical&amp;id=698e4ad9c9e1ff5ad81db306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26056-cwe-94-improper-control-of-generati-da134cd8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26056%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20yokecd%20yoke&amp;severity=high&amp;id=698e4ad9c9e1ff5ad81db314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26055-cwe-306-missing-authentication-for--d8f9a9d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26055%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20yokecd%20yoke&amp;severity=high&amp;id=698e4e5cc9e1ff5ad8206a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26020-cwe-285-improper-authorization-in-s-31ca744c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26020%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Significant-Gravitas%20AutoGPT&amp;severity=critical&amp;id=698e404cc9e1ff5ad81500e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26011-cwe-787-out-of-bounds-write-in-ros--a5e729c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26011%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20ros-navigation%20navigation2&amp;severity=critical&amp;id=698e404cc9e1ff5ad81500de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26005-cwe-918-server-side-request-forgery-c84eb98a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26005%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=698e3cc8c9e1ff5ad81239fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26000-cwe-1021-improper-restriction-of-re-a50b6a03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26000%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=698e3cc8c9e1ff5ad81239f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0619-cwe-190-integer-overflow-or-wraparou-ada214b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0619%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20silabs.com%20Silicon%20Labs%20Matter&amp;severity=medium&amp;id=698e3944c9e1ff5ad80febe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25933-cwe-78-improper-neutralization-of-s-9b77262f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25933%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20arduino%20arduino-app-lab&amp;severity=medium&amp;id=698e35c0c9e1ff5ad80da744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25768-cwe-862-missing-authorization-in-cl-4dd72b51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25768%3A%20CWE-862%3A%20Missing%20Authorization%20in%20cloudamqp%20lavinmq&amp;severity=high&amp;id=698e323cc9e1ff5ad80b581e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25767-cwe-863-incorrect-authorization-in--8f387b94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25767%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20cloudamqp%20lavinmq&amp;severity=high&amp;id=698e323cc9e1ff5ad80b5817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25922-cwe-287-improper-authentication-in--b40b4560</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25922%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25748-cwe-287-improper-authentication-in--711f143d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25748%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25227-cwe-94-improper-control-of-generati-cc39f642</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25227%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20goauthentik%20authentik&amp;severity=critical&amp;id=698e2eb9c9e1ff5ad808ac29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24895-cwe-180-incorrect-behavior-order-va-e6909ced</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24895%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20php%20frankenphp&amp;severity=high&amp;id=698e2b39c9e1ff5ad806e180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24894-cwe-269-improper-privilege-manageme-ae84e94f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24894%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20php%20frankenphp&amp;severity=high&amp;id=698e2b39c9e1ff5ad806e17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24044-cwe-336-same-seed-in-pseudo-random--1eb14671</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24044%3A%20CWE-336%3A%20Same%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20element-hq%20ess-helm&amp;severity=critical&amp;id=698e2b39c9e1ff5ad806e176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22821-cwe-89-improper-neutralization-of-s-db2cc7da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22821%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pluginsGLPI%20mreporting&amp;severity=medium&amp;id=698e242ec9e1ff5ad802d084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26219-cwe-327-use-of-a-broken-or-risky-cr-46123275</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26219%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20newbee-ltd%20newbee-mall&amp;severity=critical&amp;id=698e242ec9e1ff5ad802d08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26218-cwe-798-use-of-hard-coded-credentia-92b3e8bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26218%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20newbee-ltd%20newbee-mall&amp;severity=critical&amp;id=698e242ec9e1ff5ad802d088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21438-cwe-401-missing-release-of-memory-a-d1018b14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21438%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21435-cwe-400-uncontrolled-resource-consu-839c7a05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21435%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21434-cwe-770-allocation-of-resources-wit-bab64128</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21434%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-reports-state-backed-hackers-using-gemini-a-87649c99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Reports%20State-Backed%20Hackers%20Using%20Gemini%20AI%20for%20Recon%20and%20Attack%20Support&amp;severity=medium&amp;id=698e15e7c9e1ff5ad8fa95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54519-cwe-427-uncontrolled-search-path-el-82dd3c9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54519%3A%20CWE-427%20%20Uncontrolled%20Search%20Path%20Element%20in%20AMD%20Vivado%E2%84%A2%20Documentation%20Navigator%20Installation%20(Windows)&amp;severity=high&amp;id=698e19a6c9e1ff5ad8fc8114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36319-cwe-1191-on-chip-debug-and-test-int-3f5c29d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36319%3A%20CWE-1191%20%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%3B%0D%0AAMD%20Ryzen%E2%84%A2%208040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698e1298c9e1ff5ad8f85870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52533-cwe-1191-on-chip-debug-and-test-int-189588d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52533%3A%20CWE-1191%20%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-campaign-plants-malicious-packages-in-npm--94a891a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Campaign%20Plants%20Malicious%20Packages%20in%20npm%20and%20PyPI%20Ecosystems&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54756-cwe-1392-in-brightsign-brightsign-o-789cc207</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54756%3A%20CWE-1392%20in%20BrightSign%20BrightSign%20OS%20series%204%20players&amp;severity=high&amp;id=698e080ec9e1ff5ad8f198c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55210-cwe-270-privilege-context-switching-ded8b804</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55210%3A%20CWE-270%3A%20Privilege%20Context%20Switching%20Error%20in%20FreePBX%20api&amp;severity=low&amp;id=698e0109c9e1ff5ad8eda2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-eliminate-the-technical-debt-of-insecure-ai-9fa385dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Eliminate%20the%20Technical%20Debt%20of%20Insecure%20AI-Assisted%20Software%20Development&amp;severity=medium&amp;id=698dfd4dc9e1ff5ad8ebf73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26217-cwe-22-improper-limitation-of-a-pat-0f89b04d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26217%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20unclecode%20Crawl4AI&amp;severity=critical&amp;id=698df67cc9e1ff5ad8e8871a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26216-cwe-94-improper-control-of-generati-09f71e54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26216%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20unclecode%20Crawl4AI&amp;severity=critical&amp;id=698df67cc9e1ff5ad8e88716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-bought-i-saw-i-attended-a-quick-guide-to-staying-415d6e4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20bought%2C%20I%20saw%2C%20I%20attended%3A%20a%20quick%20guide%20to%20staying%20scam-free%20at%20the%20Olympics%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=698df332c9e1ff5ad8e63992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-strikes-with-new-50-version-targeting-wind-9390e947</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%20strikes%20with%20new%205.0%20version%2C%20targeting%20Windows%2C%20Linux%20and%20ESXI%20systems&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad82069be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26214-cwe-297-improper-validation-of-cert-d70804ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26214%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Xiaomi%20Technology%20Co.%2C%20Ltd.%20Galaxy%20FDS%20Android%20SDK&amp;severity=critical&amp;id=698df2f6c9e1ff5ad8e60c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1104-cwe-862-missing-authorization-in-nin-28323d66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1104%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20FastDup%20%E2%80%93%20Fastest%20WordPress%20Migration%20%26%20Duplicator&amp;severity=high&amp;id=698de86ac9e1ff5ad8e08f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14014-cwe-434-unrestricted-upload-of-file-0c2cae09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14014%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20NTN%20Information%20Processing%20Services%20Computer%20Software%20Hardware%20Industry%20and%20Trade%20Ltd.%20Co.%20Smart%20Panel&amp;severity=critical&amp;id=698de160c9e1ff5ad8dd2345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1320-cwe-79-improper-neutralization-of-in-70548f61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=high&amp;id=698de160c9e1ff5ad8dd2348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13004-cwe-639-authorization-bypass-throug-c7870814</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13004%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=medium&amp;id=698dd351c9e1ff5ad8d5dee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2007-heap-based-buffer-overflow-in-postgr-364c6713</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2007%3A%20Heap-based%20Buffer%20Overflow%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2006-improper-validation-of-array-index-i-3ae45a05</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2006%3A%20Improper%20Validation%20of%20Array%20Index%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2005-heap-based-buffer-overflow-in-postgr-f6887628</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2005%3A%20Heap-based%20Buffer%20Overflow%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2004-improper-validation-of-specified-typ-7cc20198</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2004%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5deef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2003-improper-validation-of-specified-typ-fa5f154d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2003%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20PostgreSQL&amp;severity=medium&amp;id=698dd351c9e1ff5ad8d5deec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13002-cwe-79-improper-neutralization-of-i-98ae0343</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5dee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10969-cwe-89-improper-neutralization-of-s-5a43f9f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=critical&amp;id=698dd351c9e1ff5ad8d5dee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1316-cwe-79-improper-neutralization-of-in-d9728873</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1671-cwe-862-missing-authorization-in-swi-985d22a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1671%3A%20CWE-862%20Missing%20Authorization%20in%20switcorp%20Activity%20Log%20for%20WordPress&amp;severity=medium&amp;id=698de86ac9e1ff5ad8e08f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apollomd-data-breach-impacts-626000-individuals-828dc9bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ApolloMD%20Data%20Breach%20Impacts%20626%2C000%20Individuals&amp;severity=medium&amp;id=698dc891c9e1ff5ad8cfc96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-prompt-rce-claude-0-click-r-6b5df16d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Prompt%20RCE%2C%20Claude%200-Click%2C%20RenEngine%20Loader%2C%20Auto%200-Days%20%26%2025%2B%20Stories&amp;severity=low&amp;id=698ed2ddc9e1ff5ad8037a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-enable-windows-baseline-security-with-ead898ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Enable%20%E2%80%98Windows%20Baseline%20Security%E2%80%99%20With%20New%20Runtime%20Integrity%20Safeguards&amp;severity=medium&amp;id=698dba81c9e1ff5ad8c59be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacktivists-state-actors-cybercriminals-target-glo-7203090f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacktivists%2C%20State%20Actors%2C%20Cybercriminals%20Target%20Global%20Defense%20Industry%2C%20Google%20Warns&amp;severity=medium&amp;id=698db6fdc9e1ff5ad8c36760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15574-cwe-330-use-of-insufficiently-rando-a169357c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15574%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=medium&amp;id=698db73dc9e1ff5ad8c38f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15575-cwe-494-download-of-code-without-in-51eadc64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15575%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=medium&amp;id=698db73dc9e1ff5ad8c38fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15573-cwe-295-improper-certificate-valida-cc47b78d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15573%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=critical&amp;id=698db3acc9e1ff5ad8c09726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/screenconnect-attack-smartscreen-bypass-and-rmm-ab-e1ad15db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ScreenConnect%20Attack%3A%20SmartScreen%20Bypass%20and%20RMM%20Abuse&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad82069ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/employee-monitoring-and-simplehelp-software-abused-52f33a69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Employee%20Monitoring%20and%20SimpleHelp%20Software%20Abused%20in%20Ransomware%20Operations&amp;severity=medium&amp;id=698e4ad8c9e1ff5ad81db232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ctem-divide-why-84-of-security-programs-are-fa-5f888951</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20CTEM%20Divide%3A%20Why%2084%25%20of%20Security%20Programs%20Are%20Falling%20Behind&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2276-cwe-79-improper-neutralization-of-in-f88855d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wix%20web%20application&amp;severity=medium&amp;id=698daca4c9e1ff5ad8b9e267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-7-zip-downloads-are-turning-home-pcs-into-pro-81a7a0ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%207-Zip%20downloads%20are%20turning%20home%20PCs%20into%20proxy%20nodes&amp;severity=medium&amp;id=698d9e94c9e1ff5ad8b3631e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1356-cwe-918-server-side-request-forgery--e75ae6a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1356%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mateuszgbiorczyk%20Converter%20for%20Media%20%E2%80%93%20Optimize%20images%20%7C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=698d9e94c9e1ff5ad8b36380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41117-vulnerability-in-grafana-grafanagra-1c68adff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41117%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana&amp;severity=medium&amp;id=698d9b14c9e1ff5ad8b1f9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21722-vulnerability-in-grafana-grafanagra-88a5f29c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21722%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana&amp;severity=medium&amp;id=698d9b14c9e1ff5ad8b1f9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-ios-zero-day-exploited-in-extremely--ce2c8fe7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20iOS%20Zero-Day%20Exploited%20in%20%E2%80%98Extremely%20Sophisticated%20Attack%E2%80%99&amp;severity=medium&amp;id=698d8949c9e1ff5ad8a72548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/83-of-ivanti-epmm-exploits-linked-to-single-ip-on--5545c443</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=83%25%20of%20Ivanti%20EPMM%20Exploits%20Linked%20to%20Single%20IP%20on%20Bulletproof%20Hosting%20Infrastructure&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15577-cwe-22-improper-limitation-of-a-pat-e8c264c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15577%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Valmet%20Valmet%20DNA%20Web%20Tools&amp;severity=high&amp;id=698d860cc9e1ff5ad8a5a414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14892-cwe-269-improper-privilege-manageme-ca17fc3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14892%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Prime%20Listing%20Manager&amp;severity=critical&amp;id=698d70304b57a58fa1de47f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-fixes-exploited-zero-day-affecting-ios-macos-b32e0167</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Fixes%20Exploited%20Zero-Day%20Affecting%20iOS%2C%20macOS%2C%20and%20Other%20Devices&amp;severity=low&amp;id=698d852bc9e1ff5ad8a52186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2327-regular-expression-denial-of-service-61f28507</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2327%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20markdown-it&amp;severity=medium&amp;id=698d69274b57a58fa1db4942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2391-cwe-20-improper-input-validation-d67d2f2e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2391%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=medium&amp;id=698d7606c9e1ff5ad87e3c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25676-uncontrolled-search-path-element-in-108bd32e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25676%3A%20Uncontrolled%20Search%20Path%20Element%20in%20M-Audio%20M-Track%20Duo%20HD&amp;severity=high&amp;id=698d7606c9e1ff5ad87e3c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26235-missing-authentication-for-critical-64624540</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26235%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ALBRECHT%20JUNG%20GMBH%20%26%20CO.%20KG%20JUNG%20Smart%20Visu%20Server&amp;severity=high&amp;id=698d49854b57a58fa1aa88fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26234-improper-neutralization-of-http-hea-13dc0f5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26234%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20ALBRECHT%20JUNG%20GMBH%20%26%20CO.%20KG%20JUNG%20Smart%20Visu%20Server&amp;severity=high&amp;id=698d49854b57a58fa1aa88fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1537-cwe-862-missing-authorization-in-lat-a278a9f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1537%3A%20CWE-862%20Missing%20Authorization%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=698d49854b57a58fa1aa88f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23857-cwe-280-improper-handling-of-insuff-a6a15377</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23857%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Dell%20Update%20Package&amp;severity=high&amp;id=698d3b734b57a58fa19a91ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-seconds-to-botnet-analyzing-a-self-propagatin-71b48b77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Seconds%20to%20Botnet%20-%20Analyzing%20a%20Self%20Propagating%20SSH%20Worm%20with%20Cryptographically%20Signed%20C2%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Feb%2011th)&amp;severity=medium&amp;id=698d343e4b57a58fa1678c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23856-cwe-284-improper-access-control-in--82f0d51e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23856%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20iDRAC%20Service%20Module&amp;severity=high&amp;id=698d3b734b57a58fa19a91eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0969-cwe-94-improper-control-of-generatio-4c82d751</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0969%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(Code%20Injection)%20in%20HashiCorp%20Shared%20library&amp;severity=high&amp;id=698d3b734b57a58fa19a91e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1729-cwe-306-missing-authentication-for-c-1533b53f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1729%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=698d2d644b57a58fa132a7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-actors-exploit-notepad-supply-chain-9ebed71a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20Actors%20Exploit%20Notepad%2B%2B%20Supply%20Chain&amp;severity=medium&amp;id=698d9e94c9e1ff5ad8b362f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-12-acafb6eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-12&amp;severity=medium&amp;id=698e6dcac9e1ff5ad833f58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70092-na-509b535f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70092%3A%20n%2Fa&amp;severity=medium&amp;id=698e5564c9e1ff5ad8242570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70845-na-dec3a6fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70845%3A%20n%2Fa&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25828-na-1d8b46e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25828%3A%20n%2Fa&amp;severity=medium&amp;id=698e4ad9c9e1ff5ad81db30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70314-na-2e4868d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70314%3A%20n%2Fa&amp;severity=critical&amp;id=698e2eb9c9e1ff5ad808ac25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67433-na-c2b1a37a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67433%3A%20n%2Fa&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67432-na-a7592b45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67432%3A%20n%2Fa&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70981-na-0c201623</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70981%3A%20n%2Fa&amp;severity=critical&amp;id=698e0b91c9e1ff5ad8f3a8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69807-na-1ef94850</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69807%3A%20n%2Fa&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69806-na-b84e89b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69806%3A%20n%2Fa&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63421-na-d51ca972</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63421%3A%20n%2Fa&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61879-na-4f30b3e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61879%3A%20n%2Fa&amp;severity=high&amp;id=698e080ec9e1ff5ad8f198c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61880-na-79c5be27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61880%3A%20n%2Fa&amp;severity=high&amp;id=698e0109c9e1ff5ad8eda2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69752-na-7a1a3dbf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69752%3A%20n%2Fa&amp;severity=medium&amp;id=698dfd94c9e1ff5ad8ec1801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56647-na-27437016</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56647%3A%20n%2Fa&amp;severity=medium&amp;id=698dfd94c9e1ff5ad8ec17fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70886-na-ad94ba80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70886%3A%20n%2Fa&amp;severity=high&amp;id=698df67cc9e1ff5ad8e88711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69634-na-e6863074</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69634%3A%20n%2Fa&amp;severity=critical&amp;id=698df2f6c9e1ff5ad8e60c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-12-d64c971f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-12&amp;severity=low&amp;id=698d29aa4b57a58fa1059bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20629-an-app-may-be-able-to-access-user-s-faffa851</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20629%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20644-processing-maliciously-crafted-web--df631de1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20644%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20652-a-remote-attacker-may-be-able-to-ca-62ddf32d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20652%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=high&amp;id=698d0dcc4b57a58fa1d960a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20605-an-app-may-be-able-to-crash-a-syste-09879c7d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20605%3A%20An%20app%20may%20be%20able%20to%20crash%20a%20system%20process%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20625-an-app-may-be-able-to-access-sensit-15e4e561</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20625%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20648-a-malicious-app-may-be-able-to-acce-aff95690</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20648%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20notifications%20from%20other%20iCloud%20devices%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d9607e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20609-processing-a-maliciously-crafted-fi-fbf812b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20609%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20a%20denial-of-service%20or%20potentially%20disclose%20memory%20contents%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20608-processing-maliciously-crafted-web--dcc1a5d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20608%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dc64b57a58fa1d9512e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20649-a-user-may-be-able-to-view-sensitiv-7238f714</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20649%3A%20A%20user%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20624-an-app-may-be-able-to-access-sensit-298c8882</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20624%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20673-turning-off-load-remote-content-in--ce3e0a93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20673%3A%20Turning%20off%20%22Load%20remote%20content%20in%20messages%E2%80%9D%20may%20not%20apply%20to%20all%20mail%20previews%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d960fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46310-an-attacker-with-root-privileges-ma-bd0f5f9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46310%3A%20An%20attacker%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20653-an-app-may-be-able-to-access-sensit-4a2d56b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20653%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20700-an-attacker-with-memory-write-capab-30065920</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20700%3A%20An%20attacker%20with%20memory%20write%20capability%20may%20be%20able%20to%20execute%20arbitrary%20code.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20versions%20of%20iOS%20before%20iOS%2026.%20CVE-2025-14174%20and%20CVE-2025-43529%20were%20also%20issued%20in%20response%20to%20this%20report.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcf4b57a58fa1d961e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20645-an-attacker-with-physical-access-to-7f4554ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20645%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20612-an-app-may-be-able-to-access-sensit-9f0328e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20612%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20669-an-app-may-be-able-to-access-sensit-66a11fec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20669%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d960f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20628-an-app-may-be-able-to-break-out-of--e55ceda5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20628%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dca4b57a58fa1d95b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20674-an-attacker-with-physical-access-to-5d574b03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20674%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d96104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20623-an-app-may-be-able-to-access-protec-45ebaffc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20623%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20635-processing-maliciously-crafted-web--7aa6b401</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20635%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20662-an-attacker-with-physical-access-to-846a9d15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20662%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46301-a-malicious-hid-device-may-cause-an-1d9df697</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46301%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20619-an-app-may-be-able-to-access-sensit-e1b682f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20619%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20658-an-app-may-be-able-to-gain-root-pri-6893f21b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20658%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dcc4b57a58fa1d960c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20678-an-app-may-be-able-to-access-sensit-dce1ffb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20678%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcf4b57a58fa1d961d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20681-an-app-may-be-able-to-access-inform-89c87213</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20681%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20macOS&amp;severity=low&amp;id=698d0dcf4b57a58fa1d961db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20615-an-app-may-be-able-to-gain-root-pri-22cab454</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20615%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20642-a-person-with-physical-access-to-an-cb48007d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20642%3A%20A%20person%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20access%20photos%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dcb4b57a58fa1d96065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20654-an-app-may-be-able-to-cause-unexpec-7bab56e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20654%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20603-an-app-with-root-privileges-may-be--adf00fa5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20603%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d9511e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20602-an-app-may-be-able-to-cause-a-denia-c8cb0c3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20602%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20655-an-attacker-with-physical-access-to-18420a98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20655%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20614-an-app-may-be-able-to-gain-root-pri-30d49a81</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20614%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20680-a-sandboxed-app-may-be-able-to-acce-4caa5527</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20680%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcf4b57a58fa1d961d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20638-a-user-with-live-caller-id-app-exte-fbe0ce7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20638%3A%20A%20user%20with%20Live%20Caller%20ID%20app%20extensions%20turned%20off%20could%20have%20identifying%20information%20leaked%20to%20the%20extensions%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46290-a-remote-attacker-may-be-able-to-ca-a846a6ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46290%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc44b57a58fa1d9508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20618-an-app-may-be-able-to-access-user-s-e48313d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20618%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20663-an-app-may-be-able-to-enumerate-a-u-2cb1651a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20663%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dcd4b57a58fa1d960e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43417-an-app-may-be-able-to-access-user-s-f3a9d708</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43417%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46300-a-malicious-hid-device-may-cause-an-ae7632c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46300%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20634-processing-a-maliciously-crafted-im-f96ee51f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20634%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20675-processing-a-maliciously-crafted-im-be9478fe</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20675%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcd4b57a58fa1d96107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46303-a-malicious-hid-device-may-cause-an-862ea382</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46303%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d950a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20660-a-remote-user-may-be-able-to-write--547636dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20660%3A%20A%20remote%20user%20may%20be%20able%20to%20write%20arbitrary%20files%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20621-an-app-may-be-able-to-cause-unexpec-5108d033</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20621%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20676-a-website-may-be-able-to-track-user-791b9425</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20676%3A%20A%20website%20may%20be%20able%20to%20track%20users%20through%20Safari%20web%20extensions%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d96111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20601-an-app-may-be-able-to-monitor-keyst-f7acbbd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20601%3A%20An%20app%20may%20be%20able%20to%20monitor%20keystrokes%20without%20user%20permission%20in%20Apple%20macOS&amp;severity=low&amp;id=698d0dc64b57a58fa1d95116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20656-an-app-may-be-able-to-access-a-user-7c5d3cac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20656%3A%20An%20app%20may%20be%20able%20to%20access%20a%20user&apos;s%20Safari%20history%20in%20Apple%20Safari&amp;severity=low&amp;id=698d0dcc4b57a58fa1d960c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20640-an-attacker-with-physical-access-to-513c36d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20640%3A%20An%20attacker%20with%20physical%20access%20to%20iPhone%20may%20be%20able%20to%20take%20and%20view%20screenshots%20of%20sensitive%20data%20from%20the%20iPhone%20during%20iPhone%20Mirroring%20with%20Mac%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20617-an-app-may-be-able-to-gain-root-pri-42394d40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20617%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20682-an-attacker-may-be-able-to-discover-9f496858</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20682%3A%20An%20attacker%20may%20be%20able%20to%20discover%20a%20user%E2%80%99s%20deleted%20notes%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcf4b57a58fa1d961de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20616-processing-a-maliciously-crafted-us-07f8ea38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20616%3A%20Processing%20a%20maliciously%20crafted%20USD%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20641-an-app-may-be-able-to-identify-what-c3836ff2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20641%3A%20An%20app%20may%20be%20able%20to%20identify%20what%20other%20apps%20a%20user%20has%20installed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcb4b57a58fa1d9605a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20677-a-shortcut-may-be-able-to-bypass-sa-87455190</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20677%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20sandbox%20restrictions%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=698d0dcd4b57a58fa1d96117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43403-an-app-may-be-able-to-access-sensit-b57a9fe5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43403%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20620-an-attacker-may-be-able-to-cause-un-9406e86e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20620%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20636-processing-maliciously-crafted-web--87198eec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20636%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46302-a-malicious-hid-device-may-cause-an-f3110bb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46302%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d9509d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20661-an-attacker-with-physical-access-to-0330a824</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20661%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20650-an-attacker-in-a-privileged-network-e8fc6a4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20650%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20perform%20denial-of-service%20attack%20using%20crafted%20Bluetooth%20packets%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcc4b57a58fa1d960a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20646-a-malicious-app-may-be-able-to-read-75642868</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20646%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=low&amp;id=698d0dcb4b57a58fa1d96076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20611-processing-a-maliciously-crafted-me-b7037f10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20611%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc64b57a58fa1d95142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46305-a-malicious-hid-device-may-cause-an-f84aceb4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46305%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d950ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20666-an-app-may-be-able-to-access-sensit-c43263b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20666%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d960e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20627-an-app-may-be-able-to-access-sensit-26aa6429</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20627%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20671-an-attacker-in-a-privileged-network-c882a997</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20671%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20intercept%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dcd4b57a58fa1d960f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20626-a-malicious-app-may-be-able-to-gain-f84e5a47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20626%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dca4b57a58fa1d95b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20630-an-app-may-be-able-to-access-protec-c2e3d770</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20630%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46304-a-malicious-hid-device-may-cause-an-bb9d8bd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46304%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d950a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20667-an-app-may-be-able-to-break-out-of--b974edf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20667%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcd4b57a58fa1d960ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20610-an-app-may-be-able-to-gain-root-pri-8d29f0c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20610%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dc64b57a58fa1d9513f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20647-an-app-may-be-able-to-access-sensit-a7a341d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20647%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d9607a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20606-an-app-may-be-able-to-bypass-certai-23444a98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20606%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc64b57a58fa1d95127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43537-restoring-a-maliciously-crafted-bac-28d5660f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43537%3A%20Restoring%20a%20maliciously%20crafted%20backup%20file%20may%20lead%20to%20modification%20of%20protected%20system%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dc44b57a58fa1d9508c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26215-cwe-502-deserialization-of-untruste-e3572f04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26215%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20zyddnys%20manga-image-translator&amp;severity=critical&amp;id=698d06be4b57a58fa1d7cd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1669-cwe-73-external-control-of-file-name-d4d0c160</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1669%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Google%20Keras&amp;severity=high&amp;id=698d03334b57a58fa1d6e844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26031-cwe-863-incorrect-authorization-in--87201beb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26031%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20frappe%20lms&amp;severity=low&amp;id=698cf8a94b57a58fa1cef24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-digest-of-kasperskys-report-spam-and-phishin-dea83211</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20digest%20of%20Kaspersky%E2%80%99s%20report%20%E2%80%9CSpam%20and%20Phishing%20in%202025%E2%80%9D%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6990684ec9e1ff5ad8894f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26029-cwe-78-improper-neutralization-of-s-8fbb95dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26029%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20akutishevsky%20sf-mcp-server&amp;severity=high&amp;id=698cf8a94b57a58fa1cef249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26023-cwe-79-improper-neutralization-of-i-7a463a46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26023%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=medium&amp;id=698cf5244b57a58fa1cd8256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26021-cwe-1321-improperly-controlled-modi-92e0938f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26021%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20ahdinosaur%20set-in&amp;severity=critical&amp;id=698cf5244b57a58fa1cd8252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26012-cwe-863-incorrect-authorization-in--026fa0b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26012%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=698cf5244b57a58fa1cd8248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26019-cwe-918-server-side-request-forgery-c99b8be3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26019%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchainjs&amp;severity=medium&amp;id=698cf5244b57a58fa1cd824c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26014-cwe-200-exposure-of-sensitive-infor-48b49b39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26014%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pion%20dtls&amp;severity=medium&amp;id=698cf19f4b57a58fa1cc1ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26010-cwe-269-improper-privilege-manageme-5200ec47</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26010%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20open-metadata%20OpenMetadata&amp;severity=high&amp;id=698cf19f4b57a58fa1cc1c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25999-cwe-285-improper-authorization-in-a-91362206</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25999%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Aiven-Open%20klaw&amp;severity=high&amp;id=698cf19f4b57a58fa1cc1c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25994-cwe-120-buffer-copy-without-checkin-aa3b3738</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25994%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=high&amp;id=698cf19f4b57a58fa1cc1c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25990-cwe-787-out-of-bounds-write-in-pyth-f41c8f1d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25990%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20python-pillow%20Pillow&amp;severity=high&amp;id=698cee1b4b57a58fa1cb0648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25935-cwe-80-improper-neutralization-of-s-4d6fb46e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25935%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=698cee1b4b57a58fa1cb0642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25759-cwe-79-improper-neutralization-of-i-4af33bb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25759%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=698cee1b4b57a58fa1cb063d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25633-cwe-862-missing-authorization-in-st-84d4a800</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25633%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=698cea984b57a58fa1c97f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26158-external-control-of-file-name-or-pa-26ab3275</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26158%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=698cea984b57a58fa1c97f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26157-external-control-of-file-name-or-pa-b3a1be35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26157%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=698cea984b57a58fa1c97f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nevada-unveils-new-statewide-data-classification-p-46a4dc4d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nevada%20Unveils%20New%20Statewide%20Data%20Classification%20Policy%20Months%20After%20Cyberattack&amp;severity=medium&amp;id=698cdfd94b57a58fa1c07796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-everything-february-2026-wed-feb-11t-f0160db9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Everything%3A%20February%202026%2C%20(Wed%2C%20Feb%2011th)&amp;severity=medium&amp;id=698cdc554b57a58fa1bcb07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2323-inappropriate-implementation-in-goog-01052476</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2323%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce7b4b57a58fa1b3e33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2322-inappropriate-implementation-in-goog-620d75ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2322%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce7b4b57a58fa1b3e338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2321-use-after-free-in-google-chrome-12d5ff1f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2321%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce7b4b57a58fa1b3e334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2320-inappropriate-implementation-in-goog-376ab5ed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2320%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce7b4b57a58fa1b3e330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2319-race-in-google-chrome-6dd4299b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2319%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce7b4b57a58fa1b3e32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2318-inappropriate-implementation-in-goog-fcfe2ea8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2318%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce794b57a58fa1b3e2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2317-inappropriate-implementation-in-goog-fa12e170</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2317%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce794b57a58fa1b3e2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2316-insufficient-policy-enforcement-in-g-04cf54f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2316%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce794b57a58fa1b3e2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2315-inappropriate-implementation-in-goog-670294ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2315%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce794b57a58fa1b3e2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2314-heap-buffer-overflow-in-google-chrom-a0a9ef60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2314%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce794b57a58fa1b3e2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2313-use-after-free-in-google-chrome-38c51714</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2313%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce794b57a58fa1b3e2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0229-cwe-754-improper-check-for-unusual-o-3f546358</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0229%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=698cc7724b57a58fa1b0b31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0228-cwe-295-improper-certificate-validat-6fdf6a10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0228%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=low&amp;id=698cc7724b57a58fa1b0b31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2361-uncontrolled-search-path-element-in--017f4448</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2361%3A%20Uncontrolled%20Search%20Path%20Element%20in%20DALIBO%20PostgreSQL%20Anonymizer&amp;severity=high&amp;id=698cc7724b57a58fa1b0b326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2360-uncontrolled-search-path-element-in--62a2cecb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2360%3A%20Uncontrolled%20Search%20Path%20Element%20in%20DALIBO%20PostgreSQL%20Anonymizer&amp;severity=high&amp;id=698cc7724b57a58fa1b0b321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-malicious-outlook-add-in-found-stealing-4000-1d56e446</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20Malicious%20Outlook%20Add-In%20Found%20Stealing%204%2C000%2B%20Microsoft%20Credentials&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a52189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-game-is-over-when-free-comes-at-too-high-a-pri-58c2adc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20game%20is%20over%3A%20when%20%E2%80%9Cfree%E2%80%9D%20comes%20at%20too%20high%20a%20price.%20What%20we%20know%20about%20RenEngine&amp;severity=medium&amp;id=698cfc2b4b57a58fa1d1eaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13391-cwe-862-missing-authorization-in-mo-f77adfb0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13391%3A%20CWE-862%20Missing%20Authorization%20in%20MooMoo%20Product%20Options%20and%20Price%20Calculation%20Formulas%20for%20WooCommerce%20%E2%80%93%20Uni%20CPO%20(Premium)&amp;severity=medium&amp;id=698cb25d4b57a58fa1a74845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24789-cwe-306-in-zlan-information-technol-50342d88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24789%3A%20CWE-306%20in%20ZLAN%20Information%20Technology%20Co.%20ZLAN5143D&amp;severity=critical&amp;id=698cb25d4b57a58fa1a74849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25084-cwe-306-missing-authentication-for--35519066</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25084%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ZLAN%20Information%20Technology%20Co.%20ZLAN5143D&amp;severity=critical&amp;id=698cb25d4b57a58fa1a7484e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25869-cwe-22-improper-limitation-of-a-pat-0151200d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25869%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MiniGal%20MiniGal%20Nano&amp;severity=medium&amp;id=698cab544b57a58fa1a4b9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25868-cwe-79-improper-neutralization-of-i-541ac945</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20MiniGal%20MiniGal%20Nano&amp;severity=medium&amp;id=698ca44a4b57a58fa1a27f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12474-cwe-908-use-of-uninitialized-resour-44b2e038</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12474%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Google%20libjxl&amp;severity=low&amp;id=698ca44a4b57a58fa1a27f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1837-cwe-805-in-google-libjxl-b9d74d66</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1837%3A%20CWE-805%20in%20Google%20libjxl&amp;severity=high&amp;id=698ca44a4b57a58fa1a27f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2344-cwe-79-xss-in-plunet-plunet-business-9974f8f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2344%3A%20CWE-79%20-%20XSS%20in%20Plunet%20Plunet%20BusinessManager&amp;severity=high&amp;id=698c9d454b57a58fa19f3844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-and-sidecopy-launch-cross-platform-rat-campa-8c4fd7c5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36%20and%20SideCopy%20Launch%20Cross-Platform%20RAT%20Campaigns%20Against%20Indian%20Entities&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a5218c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2345-cwe-346-origin-validation-error-in-p-d45d2f19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2345%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Proctorio%20Secure%20Exam%20Proctor%20Extension&amp;severity=low&amp;id=698c9d454b57a58fa19f3847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61969-cwe-732-incorrect-permission-assign-acd56dd5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61969%3A%20CWE-732%20%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20AMD%20AMD%20%C2%B5Prof&amp;severity=high&amp;id=698c99bc4b57a58fa19e33d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52541-cwe-427-uncontrolled-search-path-el-5c9796c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52541%3A%20CWE-427%20%20Uncontrolled%20Search%20Path%20Element%20in%20AMD%20Vivado%E2%84%A2%20Installation%20(Windows)&amp;severity=high&amp;id=698c99bc4b57a58fa19e33d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48518-cwe-787-out-of-bounds-write-in-amd--257c4ddf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48518%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698c99bc4b57a58fa19e33ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36320-cwe-190-integer-overflow-or-wraparo-82cb0530</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36320%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=698c99bc4b57a58fa19e33c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36324-cwe-787-out-of-bounds-write-in-amd--f1c2dd95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36324%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Ryzen%E2%84%A2%206000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics%3B%0D%0AAMD%20Ryzen%E2%84%A2%207035%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=698c99bc4b57a58fa19e33c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48508-cwe-1245-improper-finite-state-mach-120dee71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48508%3A%20CWE-1245%20%20Improper%20Finite%20State%20Machines%20(FSMs)%20in%20Hardware%20Logic%20in%20AMD%20AMD%20Radeon%E2%84%A2%20PRO%20V710&amp;severity=medium&amp;id=698c99bc4b57a58fa19e33cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36316-cwe-190-integer-overflow-or-wraparo-bb68436c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36316%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20AMD%20Ryzen%E2%84%A2%206000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics%3B%0D%0AAMD%20Ryzen%E2%84%A2%207035%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698c99bc4b57a58fa19e33c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48503-cwe-427-uncontrolled-search-path-el-5ef6871a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48503%3A%20CWE-427%20%20Uncontrolled%20Search%20Path%20Element%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20(formerly%20codenamed%20%22Renoir%22)&amp;severity=high&amp;id=698c92b44b57a58fa19c0281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2249-cwe-306-missing-authentication-for-c-fba1c920</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2249%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20METIS%20Cyberspace%20Technology%20SA%20METIS%20DFS&amp;severity=critical&amp;id=698c92b44b57a58fa19c0287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2248-cwe-306-missing-authentication-for-c-139cd139</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2248%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20METIS%20Cyberspace%20Technology%20SA%20METIS%20WIC&amp;severity=critical&amp;id=698c92b44b57a58fa19c0284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2250-cwe-284-improper-access-control-in-m-a5b4fa4c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2250%3A%20CWE-284%20Improper%20Access%20Control%20in%20METIS%20Cyberspace%20Technology%20SA%20METIS%20WIC&amp;severity=high&amp;id=698c92b44b57a58fa19c028a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12059-cwe-538-insertion-of-sensitive-info-9d772f79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12059%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Logo%20Software%20Industry%20and%20Trade%20Inc.%20Logo%20j-Platform&amp;severity=critical&amp;id=698c92b44b57a58fa19c027e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1226-cwe-94-improper-control-of-generatio-d91ba611</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1226%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%20Building%20Operation%20Workstation&amp;severity=high&amp;id=698c8bab4b57a58fa19a50d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1227-cwe-611-improper-restriction-of-xml--9a12b573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1227%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Schneider%20Electric%20EcoStruxure%20Building%20Operation%20Workstation&amp;severity=high&amp;id=698c8bab4b57a58fa19a50d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/conduent-breach-hits-volvo-group-nearly-17000-empl-df4b5269</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Conduent%20Breach%20Hits%20Volvo%20Group%3A%20Nearly%2017%2C000%20Employees%E2%80%99%20Data%20Exposed&amp;severity=medium&amp;id=698c87f54b57a58fa1997c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8668-cwe-79-improper-neutralization-of-in-f0c655b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20E-Kalite%20Software%20Hardware%20Engineering%20Design%20and%20Internet%20Services%20Industry%20and%20Trade%20Ltd.%20Co.%20Turboard&amp;severity=critical&amp;id=698c8bab4b57a58fa19a50ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2337-cwe-79-xss-in-plunet-plunet-business-3f4da7c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2337%3A%20CWE-79%20-%20XSS%20in%20Plunet%20Plunet%20BusinessManager&amp;severity=high&amp;id=698c8bab4b57a58fa19a50d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wsl-in-the-malware-ecosystem-wed-feb-11th-dd92db7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WSL%20in%20the%20Malware%20Ecosystem%2C%20(Wed%2C%20Feb%2011th)&amp;severity=low&amp;id=698c84844b57a58fa1983b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-60-software-vendors-issue-security-fixes-acro-8605239b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2060%20Software%20Vendors%20Issue%20Security%20Fixes%20Across%20OS%2C%20Cloud%2C%20and%20Network%20Platforms&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a5218f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0910-cwe-502-deserialization-of-untrusted-2b761df5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0910%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=698c84b74b57a58fa19857dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-in-the-dark-recognizing-the-signs-of-hidd-cafb76a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20in%20the%20Dark%3A%20Recognizing%20the%20Signs%20of%20Hidden%20Information&amp;severity=medium&amp;id=698c84724b57a58fa1983683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-refresh-windows-secure-boot-certifica-969efd65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Refresh%20Windows%20Secure%20Boot%20Certificates%20in%20June%202026&amp;severity=medium&amp;id=698c7d694b57a58fa196879f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56807-cwe-125-in-qnap-systems-inc-media-s-de26f974</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56807%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20Media%20Streaming%20add-on&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56808-cwe-78-in-qnap-systems-inc-media-st-5e40d552</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56808%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20Media%20Streaming%20add-on&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30266-cwe-476-in-qnap-systems-inc-qsync-c-75986e82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30266%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30269-cwe-134-in-qnap-systems-inc-qsync-c-e7427f4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30269%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30276-cwe-787-in-qnap-systems-inc-qsync-c-ba937a78</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30276%3A%20CWE-787%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1a4b57a58fa195cfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47205-cwe-476-in-qnap-systems-inc-qts-202fb48d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47205%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=698c7a1a4b57a58fa195cfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47209-cwe-476-in-qnap-systems-inc-qsync-c-9a669f31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47209%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48722-cwe-476-in-qnap-systems-inc-qsync-c-4ea7ca57</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48722%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48723-cwe-120-in-qnap-systems-inc-qsync-c-0480ddf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48723%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48724-cwe-120-in-qnap-systems-inc-qsync-c-c98f3fb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48724%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48725-cwe-120-in-qnap-systems-inc-quts-he-ea84bc1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48725%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QuTS%20hero&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52868-cwe-120-in-qnap-systems-inc-qsync-c-21cf9b81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52868%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8025-cwe-306-missing-authentication-for-c-7202156f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8025%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Dinosoft%20Business%20Solutions%20Dinosoft%20ERP&amp;severity=critical&amp;id=698c7a214b57a58fa195d100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52869-cwe-120-in-qnap-systems-inc-qsync-c-78993c96</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52869%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52870-cwe-120-in-qnap-systems-inc-qsync-c-640834e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52870%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53598-cwe-476-in-qnap-systems-inc-qsync-c-7d5b3147</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53598%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54146-cwe-476-in-qnap-systems-inc-qsync-c-b16383be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54146%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54147-cwe-476-in-qnap-systems-inc-qsync-c-4086e77f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54147%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54148-cwe-476-in-qnap-systems-inc-qsync-c-3a896cd7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54148%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54149-cwe-400-in-qnap-systems-inc-qsync-c-36893fe5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54149%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1c4b57a58fa195cff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54150-cwe-400-in-qnap-systems-inc-qsync-c-eb90d82f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54150%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1c4b57a58fa195cffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54151-cwe-400-in-qnap-systems-inc-qsync-c-6f24fbac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54151%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54152-cwe-823-in-qnap-systems-inc-qsync-c-504be840</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54152%3A%20CWE-823%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1d4b57a58fa195d024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54155-cwe-770-in-qnap-systems-inc-file-st-99e78981</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54155%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54161-cwe-770-in-qnap-systems-inc-file-st-8216060f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54161%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d02a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54162-cwe-22-in-qnap-systems-inc-file-sta-9c2d275e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54162%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54163-cwe-476-in-qnap-systems-inc-file-st-6f8bbc87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54163%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54169-cwe-125-in-qnap-systems-inc-file-st-5ff14bce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54169%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54170-cwe-125-in-qnap-systems-inc-qsync-c-9697d6f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54170%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57707-cwe-96-in-qnap-systems-inc-file-sta-d4576711</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57707%3A%20CWE-96%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57708-cwe-770-in-qnap-systems-inc-qsync-c-7d3223a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57708%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1d4b57a58fa195d03c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57709-cwe-122-in-qnap-systems-inc-qsync-c-7e9c4812</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57709%3A%20CWE-122%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57710-cwe-770-in-qnap-systems-inc-qsync-c-28aac456</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57710%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57711-cwe-770-in-qnap-systems-inc-qsync-c-01c433be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57711%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57713-cwe-1390-in-qnap-systems-inc-file-s-374227ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57713%3A%20CWE-1390%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1f4b57a58fa195d09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58466-cwe-457-in-qnap-systems-inc-qts-aeeead1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58466%3A%20CWE-457%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=698c7a1f4b57a58fa195d09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58467-cwe-23-in-qnap-systems-inc-qsync-ce-5da4e57c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58467%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58470-cwe-22-in-qnap-systems-inc-qsync-ce-0012caf3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58470%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58471-cwe-770-in-qnap-systems-inc-qsync-c-4edc7487</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58471%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58472-cwe-476-in-qnap-systems-inc-qsync-c-78b4c11b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58472%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59386-cwe-476-in-qnap-systems-inc-quts-he-7b41d4c8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59386%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QuTS%20hero&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62853-cwe-22-in-qnap-systems-inc-file-sta-91623754</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62853%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=698c7a214b57a58fa195d0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62854-cwe-400-in-qnap-systems-inc-file-st-4173441a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62854%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62855-cwe-22-in-qnap-systems-inc-file-sta-06721278</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62855%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62856-cwe-22-in-qnap-systems-inc-file-sta-2f07461b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62856%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66274-cwe-476-in-qnap-systems-inc-quts-he-f5b39bcf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66274%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QuTS%20hero&amp;severity=low&amp;id=698c7a214b57a58fa195d0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66277-cwe-59-in-qnap-systems-inc-qts-27355280</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66277%3A%20CWE-59%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=critical&amp;id=698c7a214b57a58fa195d0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66278-cwe-22-in-qnap-systems-inc-file-sta-aebdcfcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66278%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68406-cwe-22-in-qnap-systems-inc-qsync-ce-27ea0a37</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68406%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a214b57a58fa195d0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22894-cwe-22-in-qnap-systems-inc-file-sta-aaf2e280</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22894%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-patches-endpoint-manager-vulnerabilities-di-d644884a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Patches%20Endpoint%20Manager%20Vulnerabilities%20Disclosed%20in%20October%202025&amp;severity=high&amp;id=698c733e4b57a58fa19402e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10174-cwe-319-cleartext-transmission-of-s-ec217346</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10174%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Pan%20Software%20%26%20Information%20Technologies%20Ltd.%20PanCafe%20Pro&amp;severity=high&amp;id=698c6f8b4b57a58fa1932160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-training-open-the-door-for-crypto-mining-i-d1e06ea2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20Training%20Open%20the%20Door%20for%20Crypto-Mining%20in%20Fortune%20500%20Cloud%20Environments&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a52192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chipmaker-patch-tuesday-over-80-vulnerabilities-ad-681c0f45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chipmaker%20Patch%20Tuesday%3A%20Over%2080%20Vulnerabilities%20Addressed%20by%20Intel%20and%20AMD&amp;severity=medium&amp;id=698c61484b57a58fa18f2846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-59-vulnerabilities-including-six-b4833f04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%2059%20Vulnerabilities%20Including%20Six%20Actively%20Exploited%20Zero-Days&amp;severity=critical&amp;id=698c726b4b57a58fa193ba98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sshstalker-botnet-uses-irc-c2-to-control-linux-sys-0e698cd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SSHStalker%20Botnet%20Uses%20IRC%20C2%20to%20Control%20Linux%20Systems%20via%20Legacy%20Kernel%20Exploits&amp;severity=medium&amp;id=698c726b4b57a58fa193ba9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15096-cwe-639-authorization-bypass-throug-7d3939ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15096%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kamleshyadav%20Videospirecore%20Theme%20Plugin&amp;severity=high&amp;id=698c536b4b57a58fa18a16a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-high-severity-vulnerabilities-07bf4c77</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=698c4fb44b57a58fa188c1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2295-cwe-200-exposure-of-sensitive-inform-32b439e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2295%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpzoom%20WPZOOM%20Addons%20for%20Elementor%20%E2%80%93%20Starter%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=698c4ff54b57a58fa188e032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13651-cwe-497-exposure-of-sensitive-syste-b0f956be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13651%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13650-cwe-79-improper-neutralization-of-i-26065390</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13649-cwe-79-improper-neutralization-of-i-59c7ab0a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13648-cwe-79-improper-neutralization-of-i-e506375a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13648%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-intel-security-audit-reveals-severe-tdx-vul-687e4135</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google-Intel%20Security%20Audit%20Reveals%20Severe%20TDX%20Vulnerability%20Allowing%20Full%20Compromise&amp;severity=low&amp;id=698c41a44b57a58fa1847dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9986-cwe-497-exposure-of-sensitive-system-8e89085f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9986%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Vadi%20Corporate%20Information%20Systems%20Ltd.%20Co.%20DIGIKENT&amp;severity=high&amp;id=698c455b4b57a58fa185634b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1827-cwe-79-improper-neutralization-of-in-212859a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luke-alford%20IDE%20Micro%20code-editor&amp;severity=medium&amp;id=698c3e564b57a58fa1832d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0815-cwe-79-improper-neutralization-of-in-fbd40c5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pankajanupam%20Category%20Image&amp;severity=medium&amp;id=698c3e544b57a58fa1832d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1833-cwe-862-missing-authorization-in-smr-093d51f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1833%3A%20CWE-862%20Missing%20Authorization%20in%20sm_rasmy%20WaMate%20Confirm%20%E2%80%93%20Order%20Confirmation&amp;severity=medium&amp;id=698c3e564b57a58fa1832d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1826-cwe-79-improper-neutralization-of-in-ebbfc998</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openpos%20OpenPOS%20Lite%20%E2%80%93%20Point%20of%20Sale%20for%20WooCommerce&amp;severity=medium&amp;id=698c3e544b57a58fa1832d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1560-cwe-94-improper-control-of-generatio-655d2091</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1560%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nko%20Custom%20Block%20Builder%20%E2%80%93%20Lazy%20Blocks&amp;severity=high&amp;id=698c3e544b57a58fa1832d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1786-cwe-862-missing-authorization-in-bad-0ad4d948</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1786%3A%20CWE-862%20Missing%20Authorization%20in%20badbreze%20Twitter%20posts%20to%20Blog&amp;severity=medium&amp;id=698c3e544b57a58fa1832d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1809-cwe-79-improper-neutralization-of-in-a8498af0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jhoylman%20HTML%20Shortcodes&amp;severity=medium&amp;id=698c3e544b57a58fa1832d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0724-cwe-79-improper-neutralization-of-in-44d5af48</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0724%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wecodify%20WPlyr%20Media%20Block&amp;severity=medium&amp;id=698c3e544b57a58fa1832d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1748-cwe-862-missing-authorization-in-kir-06306df0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1748%3A%20CWE-862%20Missing%20Authorization%20in%20kirilkirkov%20Invoct%20%E2%80%93%20PDF%20Invoices%20%26%20Billing%20for%20WooCommerce&amp;severity=medium&amp;id=698c3e544b57a58fa1832d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1215-cwe-352-cross-site-request-forgery-c-e191d329</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1215%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20messagemetric%20MMA%20Call%20Tracking&amp;severity=medium&amp;id=698c3e544b57a58fa1832d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1853-cwe-79-improper-neutralization-of-in-dae2cdfd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digiblogger%20BuddyHolis%20ListSearch&amp;severity=medium&amp;id=698c3e564b57a58fa1832d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1804-cwe-79-improper-neutralization-of-in-9a2b3c75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20master-buldog%20WDES%20Responsive%20Popup&amp;severity=medium&amp;id=698c3e544b57a58fa1832d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1885-cwe-79-improper-neutralization-of-in-da70e811</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aumsrini%20Slideshow%20Wp&amp;severity=medium&amp;id=698c3e564b57a58fa1832da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15440-cwe-79-improper-neutralization-of-i-0e59bc16</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ione360%20iONE360%20%20configurator&amp;severity=high&amp;id=698c3e544b57a58fa1832d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10913-cwe-79-improper-neutralization-of-i-fb5e53f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Saastech%20Cleaning%20and%20Internet%20Services%20Inc.%20TemizlikYolda&amp;severity=high&amp;id=698c3acf4b57a58fa181a0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10912-cwe-639-authorization-bypass-throug-3834804e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10912%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Saastech%20Cleaning%20and%20Internet%20Services%20Inc.%20TemizlikYolda&amp;severity=medium&amp;id=698c374b4b57a58fa17fe935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-addressed-by-sie-e2bcd2c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Addressed%20by%20Siemens%2C%20Schneider%2C%20Aveva%2C%20Phoenix%20Contact&amp;severity=medium&amp;id=698c33944b57a58fa17edb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-unc1069-uses-ai-lures-to-attack-babdf923</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Linked%20UNC1069%20Uses%20AI%20Lures%20to%20Attack%20Cryptocurrency%20Organizations&amp;severity=medium&amp;id=698c726b4b57a58fa193ba9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1235-cwe-502-deserialization-of-untrusted-67de3834</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1235%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WP%20eCommerce&amp;severity=medium&amp;id=698c1eb04b57a58fa179b72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15400-cwe-862-missing-authorization-in-pi-db24c504</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15400%3A%20CWE-862%20Missing%20Authorization%20in%20OpenPix%20for%20WooCommerce&amp;severity=medium&amp;id=698c1eb04b57a58fa179b72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1357-cwe-434-unrestricted-upload-of-file--8f35918d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1357%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpvividplugins%20WPvivid%20%E2%80%94%20Backup%2C%20Migration%20%26%20Staging&amp;severity=critical&amp;id=698c17a84b57a58fa177280b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1893-cwe-79-improper-neutralization-of-in-b4bf78e9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lordspace%20Orbisius%20Random%20Name%20Generator&amp;severity=medium&amp;id=698c10a64b57a58fa174e105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26079-cwe-829-inclusion-of-functionality--f5812b77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26079%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=698c10a64b57a58fa174e10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-peek-into-muddled-libras-operational-playbook-f9bc0191</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Peek%20Into%20Muddled%20Libra&apos;s%20Operational%20Playbook&amp;severity=medium&amp;id=698c618d4b57a58fa18f34d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14541-cwe-94-improper-control-of-generati-b4b6841f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14541%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20villatheme%20Lucky%20Wheel%20Giveaway&amp;severity=high&amp;id=698bdf6c4b57a58fa14457fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13431-cwe-89-improper-neutralization-of-s-c5a38105</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13431%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=medium&amp;id=698bdf6c4b57a58fa14457f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1231-cwe-79-improper-neutralization-of-in-952da465</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=698bdf6c4b57a58fa1445802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15524-cwe-862-missing-authorization-in-fo-2667d56f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15524%3A%20CWE-862%20Missing%20Authorization%20in%20fooplugins%20Gallery%20by%20FooGallery&amp;severity=medium&amp;id=698bdf6c4b57a58fa14457fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1571-cwe-79-improper-neutralization-of-in-6884d102</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1571%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20C60%20v3&amp;severity=medium&amp;id=698bd4e04b57a58fa13e5766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26480-na-ffe73103</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26480%3A%20n%2Fa&amp;severity=high&amp;id=698d7607c9e1ff5ad87e3ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26479-na-aa875916</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26479%3A%20n%2Fa&amp;severity=medium&amp;id=698d7607c9e1ff5ad87e3ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26478-na-e8485225</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26478%3A%20n%2Fa&amp;severity=medium&amp;id=698d7607c9e1ff5ad87e3c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26477-na-21213ca4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26477%3A%20n%2Fa&amp;severity=high&amp;id=698d7607c9e1ff5ad87e3c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-11-92ce0ce0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-11&amp;severity=medium&amp;id=698d1b994b57a58fa1df33b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67135-na-57ed4fd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67135%3A%20n%2Fa&amp;severity=critical&amp;id=698d0a3b4b57a58fa1d8b228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64074-na-cc84b61f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64074%3A%20n%2Fa&amp;severity=medium&amp;id=698d0a3b4b57a58fa1d8b224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50619-na-36cc4424</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50619%3A%20n%2Fa&amp;severity=high&amp;id=698cfc2b4b57a58fa1d1eb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50617-na-d20ee4c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50617%3A%20n%2Fa&amp;severity=high&amp;id=698cf8a94b57a58fa1cef246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50620-na-a1921cab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50620%3A%20n%2Fa&amp;severity=high&amp;id=698ce7144b57a58fa1c6a88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50618-na-5f1d54a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50618%3A%20n%2Fa&amp;severity=medium&amp;id=698cd9034b57a58fa1b9879a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70297-na-67da88aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70297%3A%20n%2Fa&amp;severity=medium&amp;id=698cd1fb4b57a58fa1b55bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70296-na-8c0a8a2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70296%3A%20n%2Fa&amp;severity=medium&amp;id=698cce794b57a58fa1b3e29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69873-na-bb81f42f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69873%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20ajv.js%20ajv&amp;severity=low&amp;id=698cce794b57a58fa1b3e299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69872-na-f86d03c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69872%3A%20n%2Fa&amp;severity=critical&amp;id=698cce794b57a58fa1b3e295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69871-na-9d3ef4e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69871%3A%20n%2Fa&amp;severity=high&amp;id=698cce794b57a58fa1b3e290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70085-na-ff8a629e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70085%3A%20n%2Fa&amp;severity=critical&amp;id=698cc7724b57a58fa1b0b315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70084-na-756b4b9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70084%3A%20n%2Fa&amp;severity=high&amp;id=698cc7724b57a58fa1b0b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70083-na-661c019f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70083%3A%20n%2Fa&amp;severity=high&amp;id=698cc7724b57a58fa1b0b308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70029-na-7c64998b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70029%3A%20n%2Fa&amp;severity=high&amp;id=698cc7724b57a58fa1b0b303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69874-na-4588cf43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69874%3A%20n%2Fa&amp;severity=critical&amp;id=698cc7724b57a58fa1b0b2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65480-na-25d9ca59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65480%3A%20n%2Fa&amp;severity=high&amp;id=698cc0684b57a58fa1ac24b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65128-na-b4c76562</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65128%3A%20n%2Fa&amp;severity=high&amp;id=698cbce54b57a58fa1aace42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65127-na-de5a23b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65127%3A%20n%2Fa&amp;severity=medium&amp;id=698cb5dc4b57a58fa1a8441e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64075-na-3573219f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64075%3A%20n%2Fa&amp;severity=critical&amp;id=698cab544b57a58fa1a4b9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glibc-238-buffer-overflow-d3afe87a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=glibc%202.38%20-%20Buffer%20Overflow&amp;severity=medium&amp;id=698c72394b57a58fa193b5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-100177637009-spoofing-vulnerability-6d81f54a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2010.0.17763.7009%20-%20spoofing%20vulnerability&amp;severity=medium&amp;id=698c72394b57a58fa193b5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/motioneye-0431b4-rce-f554aa8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=motionEye%200.43.1b4%20-%20RCE&amp;severity=critical&amp;id=698c72394b57a58fa193b5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-11-8b4066d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-11&amp;severity=low&amp;id=698c0ce64b57a58fa173106d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25872-cwe-22-improper-limitation-of-a-pat-9ffd5c98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25872%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ALBRECHT%20JUNG%20GMBH%20%26%20CO.%20KG%20JUNG%20Smart%20Panel%205.1%20KNX&amp;severity=medium&amp;id=698bb5374b57a58fa12f9f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25870-cwe-918-server-side-request-forgery-fe29ed6f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25870%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=698bb1b44b57a58fa12ed728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26013-cwe-918-server-side-request-forgery-e899b39d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26013%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain&amp;severity=low&amp;id=698bae314b57a58fa12e3ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26007-cwe-345-insufficient-verification-o-aa58d03c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26007%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20pyca%20cryptography&amp;severity=high&amp;id=698ba7284b57a58fa12c897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26006-cwe-1333-inefficient-regular-expres-7697f33c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26006%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Significant-Gravitas%20AutoGPT&amp;severity=medium&amp;id=698ba3a54b57a58fa12bb851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12699-cwe-538-insertion-of-sensitive-info-a289ec92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12699%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20ZOLL%20ZOLL%20ePCR%20IOS%20Mobile%20Application&amp;severity=medium&amp;id=698b9ca04b57a58fa12a793d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1507-cwe-248-uncaught-exception-in-aveva--0f034206</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1507%3A%20CWE-248%20Uncaught%20Exception%20in%20AVEVA%20PI%20Data%20Archive%20PI%20Server&amp;severity=high&amp;id=698b95984b57a58fa128a7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1495-cwe-532-insertion-of-sensitive-infor-fb016140</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1495%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20AVEVA%20PI%20to%20CONNECT%20Agent&amp;severity=medium&amp;id=698b95984b57a58fa128a7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1763-vulnerability-in-ge-vernova-enervist-a5f799b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1763%3A%20Vulnerability%20in%20GE%20Vernova%20Enervista&amp;severity=medium&amp;id=698b92154b57a58fa127f942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1762-cwe-23-in-ge-vernova-enervista-94d6f3cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1762%3A%20CWE-23%20in%20GE%20Vernova%20Enervista&amp;severity=low&amp;id=698b92154b57a58fa127f93f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29951-cwe-121-stack-based-buffer-overflow-0c50bbc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29951%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20AMD%20AMD%20Athlon%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=698b8e904b57a58fa1272708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36311-cwe-367-time-of-check-time-of-use-t-fe1ed3d6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36311%3A%20CWE-367%20%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207045%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698b8e904b57a58fa1272702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48515-cwe-190-integer-overflow-or-wraparo-b6cea696</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48515%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698b8e904b57a58fa127270b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29949-cwe-787-out-of-bounds-write-in-amd--9eb7bd3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29949%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698b8e904b57a58fa1272705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21349-out-of-bounds-write-cwe-787-in-adob-416fb734</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21349%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Lightroom%20Desktop&amp;severity=high&amp;id=698b8e904b57a58fa1272711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21348-out-of-bounds-read-cwe-125-in-adobe-fc7b7935</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21348%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=698b8e904b57a58fa127270e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/6-actively-exploited-zero-days-patched-by-microsof-0f09ad88</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=6%20Actively%20Exploited%20Zero-Days%20Patched%20by%20Microsoft%20With%20February%202026%20Updates&amp;severity=medium&amp;id=698b87504b57a58fa125b7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36355-cwe-787-out-of-bounds-write-in-amd--2429e3e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36355%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=high&amp;id=698b8b0b4b57a58fa1266760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36310-cwe-124-buffer-underwrite-buffer-un-6a0e7ccf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36310%3A%20CWE-124%20%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa126675b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29946-cwe-1301-insufficient-or-incomplete-3dcdfadc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29946%3A%20CWE-1301%20%20Insufficient%20or%20Incomplete%20Data%20Removal%20within%20Hardware%20Component%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0029-cwe-390-detection-of-error-condition-67b69e6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0029%3A%20CWE-390%20%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=low&amp;id=698b8b0b4b57a58fa1266769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0031-cwe-416-use-after-free-in-amd-amd-ep-c4a4ee9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0031%3A%20CWE-416%20%20Use%20After%20Free%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa126676c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48514-cwe-1220-insufficient-granularity-o-126f67a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48514%3A%20CWE-1220%20%20Insufficient%20Granularity%20of%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54514-cwe-1189-improper-isolation-of-shar-a13ef11f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54514%3A%20CWE-1189%20%20Improper%20Isolation%20of%20Shared%20Resources%20on%20System-on-a-Chip%20(SoC)%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48509-cwe-665-improper-initialization-in--13cdb17f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48509%3A%20CWE-665%20%20Improper%20Initialization%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=low&amp;id=698b8b0c4b57a58fa12667bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52534-cwe-1284-improper-validation-of-spe-57274411</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52534%3A%20CWE-1284%20%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0012-cwe-1260-improper-handling-of-overla-f76c15f2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0012%3A%20CWE-1260%20%20Improper%20Handling%20of%20Overlap%20Between%20Protected%20Memory%20Ranges%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29939-cwe-284-improper-access-control-in--59c3c267</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29939%3A%20CWE-284%20%20Improper%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa126676f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21953-cwe-1284-improper-validation-of-spe-eca65f76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21953%3A%20CWE-1284%20%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29950-cwe-1274-improper-access-control-fo-25abe6c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29950%3A%20CWE-1274%20%20Improper%20Access%20Control%20for%20Volatile%20Memory%20Containing%20Boot%20Code%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=high&amp;id=698b8b0b4b57a58fa1266778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29952-cwe-457-use-of-uninitialized-variab-fe3609da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29952%3A%20CWE-457%20%20Use%20of%20Uninitialized%20Variable%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52536-cwe-1231-improper-prevention-of-loc-358a355e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52536%3A%20CWE-1231%20%20Improper%20Prevention%20of%20Lock%20Bit%20Modification%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48517-cwe-1220-insufficient-granularity-o-7bb161fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48517%3A%20CWE-1220%20%20Insufficient%20Granularity%20of%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29948-cwe-1260-improper-handling-of-overl-2b0a3d52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29948%3A%20CWE-1260%20%20Improper%20Handling%20of%20Overlap%20Between%20Protected%20Memory%20Ranges%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-january-2026-tue-feb-10th-86635a1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20-%20February%202026%2C%20(Tue%2C%20Feb%2010th)&amp;severity=critical&amp;id=698b79404b57a58fa1219c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2303-cwe-183-permissive-list-of-allowed-i-e24fff4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2303%3A%20CWE-183%20Permissive%20List%20of%20Allowed%20Inputs%20in%20MongoDB%20Inc%20MongoDB%20Go%20Driver&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2302-183-in-mongodb-inc-mongodb-ruby-driv-24518ade</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2302%3A%20183%20in%20MongoDB%20Inc%20MongoDB%20Ruby%20Driver&amp;severity=medium&amp;id=698b8b0e4b57a58fa1266823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26009-cwe-78-improper-neutralization-of-s-ff7845bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26009%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20karutoil%20catalyst&amp;severity=critical&amp;id=698b8b0e4b57a58fa126681f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25506-cwe-787-out-of-bounds-write-in-dun--f36c0150</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25506%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20dun%20munge&amp;severity=high&amp;id=698b8b0e4b57a58fa1266817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25613-cwe-704-incorrect-type-conversion-o-ed12d22d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25613%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b8b0e4b57a58fa126681c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1849-cwe-674-uncontrolled-recursion-in-mo-6564e772</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1849%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b8b0c4b57a58fa12667d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1850-cwe-770-allocation-of-resources-with-3294391e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1850%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b8b0c4b57a58fa12667d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25609-cwe-862-missing-authorization-in-mo-e71d857e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25609%3A%20CWE-862%20Missing%20Authorization%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=698b8e904b57a58fa1272714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21352-out-of-bounds-write-cwe-787-in-adob-09e05894</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21352%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=698b7cf94b57a58fa12364ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21354-integer-overflow-or-wraparound-cwe--2ca7577c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21354%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=698b7cfb4b57a58fa1236d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21353-integer-overflow-or-wraparound-cwe--b32757ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21353%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=698b7cfb4b57a58fa1236d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21355-out-of-bounds-read-cwe-125-in-adobe-f5bdc89e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21355%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=698b7cfb4b57a58fa1236d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25610-cwe-617-reachable-assertion-in-mong-a911ba01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25610%3A%20CWE-617%20Reachable%20Assertion%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b7cfb4b57a58fa1236d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21346-out-of-bounds-write-cwe-787-in-adob-00924c74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21346%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=698b7cf94b57a58fa12364e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21347-integer-overflow-or-wraparound-cwe--213c12c9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21347%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=698b7cf94b57a58fa12364e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1848-cwe-770-allocation-of-resources-with-1398a448</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1848%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b7cf94b57a58fa12364c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21344-out-of-bounds-read-cwe-125-in-adobe-ead62b7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21344%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21343-out-of-bounds-read-cwe-125-in-adobe-1882fd40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21343%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21341-out-of-bounds-write-cwe-787-in-adob-54edf7b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21341%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21345-out-of-bounds-read-cwe-125-in-adobe-7448682f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21345%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21342-out-of-bounds-write-cwe-787-in-adob-4304a6e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21342%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1847-cwe-770-allocation-of-resources-with-0e0a3fb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1847%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b7cf94b57a58fa12364c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21337-out-of-bounds-read-cwe-125-in-adobe-3fd61a7b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21337%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76034b57a58fa120a0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21335-out-of-bounds-write-cwe-787-in-adob-729b2edf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21335%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=698b76034b57a58fa120a0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21339-out-of-bounds-read-cwe-125-in-adobe-94a153b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21339%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76054b57a58fa120a661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21334-out-of-bounds-write-cwe-787-in-adob-ea179140</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21334%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=698b76034b57a58fa120a0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21338-null-pointer-dereference-cwe-476-in-aecc2842</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21338%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76054b57a58fa120a65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21340-out-of-bounds-read-cwe-125-in-adobe-27a8904a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21340%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76054b57a58fa120a664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21336-null-pointer-dereference-cwe-476-in-838ebf90</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21336%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76034b57a58fa120a0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25612-cwe-412-unrestricted-externally-acc-d88a4026</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25612%3A%20CWE-412%20Unrestricted%20Externally%20Accessible%20Lock%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b76074b57a58fa120a6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21358-heap-based-buffer-overflow-cwe-122--7c3039ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21358%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=698b76054b57a58fa120a670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21332-out-of-bounds-read-cwe-125-in-adobe-8fbe4a55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21332%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=698b76034b57a58fa120a0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21357-heap-based-buffer-overflow-cwe-122--77a0fac6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21357%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=698b76054b57a58fa120a66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1997-cwe-346-in-hp-inc-hp-officejet-pro-8-83ab6145</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1997%3A%20CWE-346%20in%20HP%20Inc%20HP%20OfficeJet%20Pro%208730%20All-in-One%20Printer&amp;severity=medium&amp;id=698b75fd4b57a58fa1209f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21329-use-after-free-cwe-416-in-adobe-aft-b64310f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21329%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21323-use-after-free-cwe-416-in-adobe-aft-6fbcc82d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21323%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21324-out-of-bounds-read-cwe-125-in-adobe-bd7a5d57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21324%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21326-use-after-free-cwe-416-in-adobe-aft-7c4379da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21326%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21322-out-of-bounds-read-cwe-125-in-adobe-4ca2f89a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21322%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21318-out-of-bounds-write-cwe-787-in-adob-67f952e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21318%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21328-out-of-bounds-write-cwe-787-in-adob-97a21ada</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21328%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21319-out-of-bounds-read-cwe-125-in-adobe-2d8062bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21319%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=698b76024b57a58fa120a07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21350-null-pointer-dereference-cwe-476-in-ee534c5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21350%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=698b76054b57a58fa120a667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21330-access-of-resource-using-incompatib-c0b7956b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21330%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20(CWE-843)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21325-out-of-bounds-read-cwe-125-in-adobe-c9fd0607</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21325%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21327-out-of-bounds-write-cwe-787-in-adob-2556375a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21327%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21320-use-after-free-cwe-416-in-adobe-aft-64c2ca36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21320%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21321-integer-overflow-or-wraparound-cwe--8f1e2ba8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21321%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21351-use-after-free-cwe-416-in-adobe-aft-57a85fff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21351%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76054b57a58fa120a66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25611-cwe-405-asymmetric-resource-consump-a2fae2d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25611%3A%20CWE-405%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b76074b57a58fa120a6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26003-cwe-601-url-redirection-to-untruste-b1b1f630</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26003%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=698b76084b57a58fa120a6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20841-cwe-77-improper-neutralization-of-s-ec3b97e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20841%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%20Notepad&amp;severity=high&amp;id=698b75fd4b57a58fa1209f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20846-cwe-126-buffer-over-read-in-microso-f2951141</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20846%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=698b75fd4b57a58fa1209f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21222-cwe-532-insertion-of-sensitive-info-d463c6dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21222%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=698b75fd4b57a58fa1209fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21228-cwe-295-improper-certificate-valida-42307d9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21228%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Microsoft%20Azure%20Local&amp;severity=high&amp;id=698b75fd4b57a58fa1209fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21231-cwe-362-concurrent-execution-using--b653a6f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21231%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75fd4b57a58fa1209fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21232-cwe-822-untrusted-pointer-dereferen-29f52b17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21232%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=698b75fd4b57a58fa1209faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21237-cwe-362-concurrent-execution-using--c67d91bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21237%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=698b75ff4b57a58fa1209fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21238-cwe-284-improper-access-control-in--9d2f4553</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21238%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21239-cwe-122-heap-based-buffer-overflow--2b1ff487</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21239%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21241-cwe-416-use-after-free-in-microsoft-31a63962</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21241%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=698b75ff4b57a58fa1209fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21240-cwe-367-time-of-check-time-of-use-t-912190b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21240%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=698b75ff4b57a58fa1209fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21243-cwe-476-null-pointer-dereference-in-95b1bfcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21243%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=698b75ff4b57a58fa1209ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21244-cwe-122-heap-based-buffer-overflow--12cc8274</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21244%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21245-cwe-122-heap-based-buffer-overflow--be095a8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21245%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=698b76004b57a58fa120a015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21249-cwe-73-external-control-of-file-nam-495288bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21249%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=low&amp;id=698b76004b57a58fa120a029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21250-cwe-822-untrusted-pointer-dereferen-d6029a12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21250%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=698b76004b57a58fa120a02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21251-cwe-416-use-after-free-in-microsoft-2a8f2aee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21251%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=698b76004b57a58fa120a031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21253-cwe-416-use-after-free-in-microsoft-9583f378</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21253%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21255-cwe-284-improper-access-control-in--4a3cbcd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21255%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21256-cwe-77-improper-neutralization-of-s-bd386709</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21256%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=high&amp;id=698b76014b57a58fa120a04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21257-cwe-77-improper-neutralization-of-s-eef2bf37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21257%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=high&amp;id=698b76014b57a58fa120a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21261-cwe-125-out-of-bounds-read-in-micro-d42832b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21261%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=698b76014b57a58fa120a05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21508-cwe-287-improper-authentication-in--39516ca7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21508%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76054b57a58fa120a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21511-cwe-502-deserialization-of-untruste-c7e00f0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21511%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76054b57a58fa120a679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21516-cwe-77-improper-neutralization-of-s-7c142c32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21516%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20GitHub%20Copilot%20Plugin%20for%20JetBrains%20IDEs&amp;severity=high&amp;id=698b76064b57a58fa120a68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21525-cwe-476-null-pointer-dereference-in-924c36f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21525%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=698b76064b57a58fa120a6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21514-cwe-807-reliance-on-untrusted-input-48133edc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21514%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76064b57a58fa120a68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21529-cwe-79-improper-neutralization-of-i-86f49936</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21529%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20HDInsight&amp;severity=medium&amp;id=698b76074b57a58fa120a6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21537-cwe-94-improper-control-of-generati-a6d4f39d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21537%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Linux&amp;severity=high&amp;id=698b76074b57a58fa120a6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21510-cwe-693-protection-mechanism-failur-d50ef400</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21510%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76054b57a58fa120a676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21531-cwe-502-deserialization-of-untruste-4a5578f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21531%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20AI%20Language%20Authoring&amp;severity=critical&amp;id=698b76074b57a58fa120a6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21528-cwe-1327-binding-to-an-unrestricted-33112f9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21528%3A%20CWE-1327%3A%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=medium&amp;id=698b76074b57a58fa120a6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21527-cwe-451-user-interface-ui-misrepres-8ff3c3ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21527%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=698b76074b57a58fa120a6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21522-cwe-77-improper-neutralization-of-s-ccf54b9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21522%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=698b76064b57a58fa120a69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21513-cwe-693-protection-mechanism-failur-25c7912e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21513%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76064b57a58fa120a689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21533-cwe-269-improper-privilege-manageme-65b76e18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21533%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76074b57a58fa120a6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21229-cwe-20-improper-input-validation-in-3f06c1ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21229%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Power%20BI%20Report%20Server&amp;severity=high&amp;id=698b75fd4b57a58fa1209fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21523-cwe-367-time-of-check-time-of-use-t-5b40cf76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21523%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=698b76064b57a58fa120a69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23655-cwe-312-cleartext-storage-of-sensit-97250209</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23655%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=698b76074b57a58fa120a6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21218-cwe-166-improper-handling-of-missin-03931b56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21218%3A%20CWE-166%3A%20Improper%20Handling%20of%20Missing%20Special%20Element%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=698b75fd4b57a58fa1209fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21236-cwe-122-heap-based-buffer-overflow--a186cc7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21236%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21234-cwe-362-concurrent-execution-using--8598588f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21234%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=698b75ff4b57a58fa1209fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21235-cwe-416-use-after-free-in-microsoft-104050b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21235%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21242-cwe-416-use-after-free-in-microsoft-64c0667f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21242%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=698b75ff4b57a58fa1209ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21246-cwe-122-heap-based-buffer-overflow--31ad794b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21246%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21247-cwe-20-improper-input-validation-in-f96e7b2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21247%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21248-cwe-122-heap-based-buffer-overflow--3bd56463</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21248%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21260-cwe-200-exposure-of-sensitive-infor-f7507e93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21260%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76014b57a58fa120a059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21258-cwe-20-improper-input-validation-in-46ce14ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21258%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=698b76014b57a58fa120a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21259-cwe-122-heap-based-buffer-overflow--95804ee6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21259%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76014b57a58fa120a056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21512-cwe-918-server-side-request-forgery-cc85b290</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21512%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20DevOps%20Server%202022&amp;severity=medium&amp;id=698b76064b57a58fa120a686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21517-cwe-59-improper-link-resolution-bef-9e8195aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21517%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%20App%20for%20Mac&amp;severity=medium&amp;id=698b76064b57a58fa120a692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21518-cwe-77-improper-neutralization-of-s-865ead57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21518%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=698b76064b57a58fa120a695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21519-cwe-843-access-of-resource-using-in-3238adbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21519%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76064b57a58fa120a698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25992-cwe-22-improper-limitation-of-a-pat-3ff8a161</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25992%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=698b76074b57a58fa120a6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-dissecting-an-ai-generated-c2-implant-d0d44f0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%3A%20Dissecting%20an%20AI-Generated%20C2%20Implant&amp;severity=medium&amp;id=698c4ff54b57a58fa188e028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21316-access-of-memory-location-after-end-2a08e8da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21316%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76024b57a58fa120a075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21312-out-of-bounds-write-cwe-787-in-adob-415a7d98</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21312%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Audition&amp;severity=high&amp;id=698b76014b57a58fa120a05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21315-out-of-bounds-read-cwe-125-in-adobe-8b73d190</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21315%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76014b57a58fa120a068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21313-out-of-bounds-read-cwe-125-in-adobe-4d37b63b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21313%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76014b57a58fa120a062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21317-out-of-bounds-read-cwe-125-in-adobe-94a6cd01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21317%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76024b57a58fa120a078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21314-out-of-bounds-read-cwe-125-in-adobe-3f3f4719</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21314%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76014b57a58fa120a065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-operatives-impersonate-professionals-on-linke-66307456</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK%20Operatives%20Impersonate%20Professionals%20on%20LinkedIn%20to%20Infiltrate%20Companies&amp;severity=medium&amp;id=698c726b4b57a58fa193baa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25993-cwe-89-improper-neutralization-of-s-6994a1ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25993%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20evershopcommerce%20evershop&amp;severity=critical&amp;id=698b76084b57a58fa120a6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-tuesday-adobe-fixes-44-vulnerabilities-in-cr-7d6cb550</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%20Tuesday%3A%20Adobe%20Fixes%2044%20Vulnerabilities%20in%20Creative%20Apps&amp;severity=critical&amp;id=698b6eb44b57a58fa11cf919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1996-cwe-703-in-hp-inc-hp-officejet-pro-8-f3d8e306</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1996%3A%20CWE-703%20in%20HP%20Inc%20HP%20OfficeJet%20Pro%208710%20All-in-One%20Printer%20series&amp;severity=medium&amp;id=698b6f014b57a58fa11d3750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0651-cwe-22-improper-limitation-of-a-path-aef40ad6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0651%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C260%20v1&amp;severity=medium&amp;id=698b6f014b57a58fa11d3741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25805-cwe-356-product-ui-does-not-warn-us-a2e7b65f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25805%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20zed-industries%20zed&amp;severity=medium&amp;id=698b6f014b57a58fa11d3753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0652-cwe-78-improper-neutralization-of-sp-b7dc0c67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0652%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C260%20v1&amp;severity=high&amp;id=698b6f014b57a58fa11d3746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0653-cwe-284-improper-access-control-in-t-92cb4120</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0653%3A%20CWE-284%20Improper%20Access%20Control%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C260%20v1&amp;severity=high&amp;id=698b6f014b57a58fa11d374b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25728-cwe-367-time-of-check-time-of-use-t-e51843d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25728%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MacWarrior%20clipbucket-v5&amp;severity=critical&amp;id=698b6b654b57a58fa11c68af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25646-cwe-122-heap-based-buffer-overflow--d5d2a3eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25646%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pnggroup%20libpng&amp;severity=high&amp;id=698b6b654b57a58fa11c68ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25577-cwe-248-uncaught-exception-in-emmet-9048927c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25577%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20emmett-framework%20core&amp;severity=high&amp;id=698b6b654b57a58fa11c68a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36522-escalation-of-privilege-in-intelr-c-b7487ad3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36522%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Chipset%20Software&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36511-escalation-of-privilege-in-intelr-m-948f9e8c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36511%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Memory%20and%20Storage%20Tool&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35999-escalation-of-privilege-in-system-f-008bd0c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35999%3A%20Escalation%20of%20Privilege%20in%20System%20Firmware%20Update%20Utility%20(SysFwUpdt)%20for%20Intel(R)%20Server%20Boards%20and%20Intel(R)%20Server%20Systems%20Based&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35998-escalation-of-privilege-in-intelr-p-9148e8d6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35998%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Platforms&amp;severity=high&amp;id=698b5d5f4b57a58fa119cfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35992-denial-of-service-in-intelr-npu-dri-d8073a39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35992%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33030-escalation-of-privilege-in-intelr-n-d5223770</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33030%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20NPU%20Drivers&amp;severity=low&amp;id=698b5d5e4b57a58fa119cf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32739-denial-of-service-in-intelr-graphic-82e325da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32739%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers%20and%20Intel%20LTS%20kernels&amp;severity=low&amp;id=698b5d5e4b57a58fa119cf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32735-denial-of-service-in-intelr-npu-dri-424292a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32735%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32467-information-disclosure-in-tdx-modul-7524f617</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32467%3A%20Information%20Disclosure%20in%20TDX%20Module&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32453-escalation-of-privilege-in-intelr-g-e147acbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32453%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32452-escalation-of-privilege-in-ai-playg-3ebcad13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32452%3A%20Escalation%20of%20Privilege%20in%20AI%20Playground&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32092-escalation-of-privilege-in-intelr-g-c299a9c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32092%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Software&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32008-denial-of-service-in-intelr-amt-and-de4fe5f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32008%3A%20Denial%20of%20Service%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=high&amp;id=698b5d5e4b57a58fa119cf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32007-information-disclosure-in-tdx-deca45cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32007%3A%20Information%20Disclosure%20in%20TDX&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32003-denial-of-service-in-100gbe-intelr--16d7908c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32003%3A%20Denial%20of%20Service%20in%20100GbE%20Intel(R)%20Ethernet%20Network%20Adapter%20E810&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31944-denial-of-service-in-tdx-module-5e872e46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31944%3A%20Denial%20of%20Service%20in%20TDX%20Module&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31655-escalation-of-privilege-in-intelr-b-d7fa739c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31655%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Battery%20Life%20Diagnostic%20Tool&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31648-escalation-of-privilege-in-intelr-p-857c9fde</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31648%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Family%20may%20allow%20an%20escalation%20of%20privilege.%20Startup%20code%20and%20smm%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20with%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(low)%2C%20integrity%20(low)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(low)%2C%20integrity%20(low)%20and%20availability%20(none)%20impacts.&amp;severity=low&amp;id=698b5d5d4b57a58fa119cf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30513-escalation-of-privilege-in-tdx-modu-eda181f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30513%3A%20Escalation%20of%20Privilege%20in%20TDX%20Module&amp;severity=high&amp;id=698b5d5d4b57a58fa119cf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30508-denial-of-service-in-intelr-platfor-18adcc71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30508%3A%20Denial%20of%20Service%20in%20Intel(R)%20Platforms&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27940-information-disclosure-in-tdx-modul-cf81ef2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27940%3A%20Information%20Disclosure%20in%20TDX%20Module&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27708-information-disclosure-in-intelr-co-cdfb820d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27708%3A%20Information%20Disclosure%20in%20Intel(R)%20Converged%20Security%20and%20Management%20Engine%20(CSME)%20Firmware%20(FW)&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27572-information-disclosure-in-tdx-ae07f705</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27572%3A%20Information%20Disclosure%20in%20TDX&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27560-denial-of-service-in-intelr-platfor-6d7aa8bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27560%3A%20Denial%20of%20Service%20in%20Intel(R)%20Platform&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27535-denial-of-service-in-intelr-etherne-06c3edd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27535%3A%20Denial%20of%20Service%20in%20Intel(R)%20Ethernet%20Connection%20E825-C.&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27243-denial-of-service-in-intelr-etherne-f8203407</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27243%3A%20Denial%20of%20Service%20in%20Intel(R)%20Ethernet%20Controller%20E810&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25210-escalation-of-privilege-in-server-f-5e1830d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25210%3A%20Escalation%20of%20Privilege%20in%20Server%20Firmware%20Update%20Utility(SysFwUpdt)&amp;severity=high&amp;id=698b5d5c4b57a58fa119cf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25058-information-disclosure-in-intelr-et-b57b7854</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25058%3A%20Information%20Disclosure%20in%20Intel(R)%20Ethernet%20800-Series&amp;severity=low&amp;id=698b5d5c4b57a58fa119cf13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24851-denial-of-service-in-100gbe-intelr--830c5430</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24851%3A%20Denial%20of%20Service%20in%20100GbE%20Intel(R)%20Ethernet%20Controller%20E810&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22885-escalation-of-privilege-in-tdx-modu-198b7450</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22885%3A%20Escalation%20of%20Privilege%20in%20TDX%20Module%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(low)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22849-escalation-of-privilege-in-intelr-o-2e9bef72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22849%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Optane(TM)%20PMem%20management%20software&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22453-escalation-of-privilege-in-server-f-e97973f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22453%3A%20Escalation%20of%20Privilege%20in%20Server%20Firmware%20Update%20Utility(SysFwUpdt)&amp;severity=high&amp;id=698b5d5c4b57a58fa119cf07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20106-escalation-of-privilege-in-vtunetm--e2f201ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20106%3A%20Escalation%20of%20Privilege%20in%20VTune(TM)%20Profiler%20software%20and%20Intel(R)%20oneAPI%20Base%20Toolkits&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20080-denial-of-service-in-intelr-amt-and-20221750</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20080%3A%20Denial%20of%20Service%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=high&amp;id=698b5d5c4b57a58fa119cf01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20070-escalation-of-privilege-in-intelr-o-69ec1adf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20070%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Optane(TM)%20PMem%20management%20software&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62439-improper-access-control-in-fortinet-420d0f3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62439%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=698c57814b57a58fa18c033c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62676-escalation-of-privilege-in-fortinet-abf0bc48</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62676%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=698b645c4b57a58fa11b308f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68686-information-disclosure-in-fortinet--c42d11a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68686%3A%20Information%20disclosure%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=698c57814b57a58fa18c0343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64157-execute-unauthorized-code-or-comman-7e15788e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64157%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55018-execute-unauthorized-code-or-comman-c15fa17d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55018%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=698c57814b57a58fa18c0335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22153-improper-access-control-in-fortinet-f6881411</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22153%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=698c10a64b57a58fa174e118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21743-improper-access-control-in-fortinet-d471391c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21743%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAuthenticator&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52436-execute-unauthorized-code-or-comman-a9cbd23a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52436%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=698c10a64b57a58fa174e115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15572-memory-leak-in-wasm3-4095fc40</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15572%3A%20Memory%20Leak%20in%20wasm3&amp;severity=medium&amp;id=698b52ca4b57a58fa117f4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11004-cwe-79-improper-neutralization-of-i-6648915e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11004%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20silabs.com%20Simplicity%20Device%20Manager&amp;severity=high&amp;id=698b52ca4b57a58fa117f4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1603-cwe-288-authentication-bypass-using--5ffa4ac6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1603%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=698b52ca4b57a58fa117f4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1602-cwe-89-improper-neutralization-of-sp-5dd70a84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1602%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=698b52ca4b57a58fa117f4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-crm-s4hana-netweaver-vulnerab-a693d3a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20CRM%2C%20S%2F4HANA%2C%20NetWeaver%20Vulnerabilities&amp;severity=critical&amp;id=698b48094b57a58fa115bebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-openclaw-ai-agent-found-unsafe-for-use-kaspers-49b2d742</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20OpenClaw%20AI%20agent%20found%20unsafe%20for%20use%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=698b48884b57a58fa115db38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reynolds-ransomware-embeds-byovd-driver-to-disable-556e596f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reynolds%20Ransomware%20Embeds%20BYOVD%20Driver%20to%20Disable%20EDR%20Security%20Tools&amp;severity=medium&amp;id=698c726b4b57a58fa193baa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15571-null-pointer-dereference-in-ckoliva-45a327b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15571%3A%20NULL%20Pointer%20Dereference%20in%20ckolivas%20lrzip&amp;severity=medium&amp;id=698b44b84b57a58fa114e1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7636-cwe-89-improper-neutralization-of-sp-1c4a1248</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7636%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ergosis%20Security%20Systems%20Computer%20Industry%20and%20Trade%20Inc.%20ZEUS%20PDKS&amp;severity=high&amp;id=698b44b84b57a58fa114e1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7347-cwe-639-authorization-bypass-through-1a11bc39</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7347%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dinibh%20Puzzle%20Software%20Solutions%20Dinibh%20Patrol%20Tracking%20System&amp;severity=high&amp;id=698b44b84b57a58fa114e1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-ransomware-to-residency-inside-the-rise-of-th-d5ff902f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Ransomware%20to%20Residency%3A%20Inside%20the%20Rise%20of%20the%20Digital%20Parasite&amp;severity=medium&amp;id=698c726b4b57a58fa193baa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6967-cwe-698-execution-after-redirect-ear-b7408bcf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6967%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20Sarman%20Soft%20Software%20and%20Technology%20Services%20Industry%20and%20Trade%20Ltd.%20Co.%20CMS&amp;severity=high&amp;id=698b3db44b57a58fa112edc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-sqli-flaw-enabling-unaut-7ad21464</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20SQLi%20Flaw%20Enabling%20Unauthenticated%20Code%20Execution&amp;severity=critical&amp;id=698b13994b57a58fa1ff12fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15570-use-after-free-in-ckolivas-lrzip-acde4ab8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15570%3A%20Use%20After%20Free%20in%20ckolivas%20lrzip&amp;severity=medium&amp;id=698b36a84b57a58fa10fe57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sshstalker-linux-botnet-uses-old-techniques-de133a8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98SSHStalker%E2%80%99%20Linux%20Botnet%20Uses%20Old%20Techniques&amp;severity=medium&amp;id=698b2be94b57a58fa1054174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zastai-raises-6m-pre-a-to-scale-zero-false-positiv-8cb789bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZAST.AI%20Raises%20%246M%20Pre-A%20to%20Scale%20%22Zero%20False%20Positive%22%20AI-Powered%20Code%20Security&amp;severity=high&amp;id=698c726b4b57a58fa193baaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-patches-critical-rce-vulnerability-ce25850e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Patches%20Critical%20RCE%20Vulnerability&amp;severity=critical&amp;id=698b16d34b57a58fa1ffe8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11537-improper-output-neutralization-for--d502f72e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11537%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=698b13804b57a58fa1ff0ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warlock-ransomware-breaches-smartertools-through-u-d0491041</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warlock%20Ransomware%20Breaches%20SmarterTools%20Through%20Unpatched%20SmarterMail%20Server&amp;severity=medium&amp;id=698c726b4b57a58fa193baad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/singapore-rootkits-zero-day-used-in-chinese-attack-bf1bac90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Singapore%3A%20Rootkits%2C%20Zero-Day%20Used%20in%20Chinese%20Attack%20on%20Major%20Telecom%20Firms&amp;severity=medium&amp;id=698b053d4b57a58fa1fad507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15569-uncontrolled-search-path-in-artifex-c7cba49b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15569%3A%20Uncontrolled%20Search%20Path%20in%20Artifex%20MuPDF&amp;severity=high&amp;id=698b08f34b57a58fa1fbed10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25656-cwe-427-uncontrolled-search-path-el-5f7fcb0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25656%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=698b05e84b57a58fa1fb4535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25655-cwe-427-uncontrolled-search-path-el-d8eecefc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25655%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=698b05e84b57a58fa1fb450d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23720-cwe-125-out-of-bounds-read-in-sieme-110c9539</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23720%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb4507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23719-cwe-122-heap-based-buffer-overflow--8707b5c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23719%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb4501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23718-cwe-125-out-of-bounds-read-in-sieme-03ca3b75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23718%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23717-cwe-125-out-of-bounds-read-in-sieme-e4ef4a55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23717%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23716-cwe-125-out-of-bounds-read-in-sieme-0be2115c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23716%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23715-cwe-787-out-of-bounds-write-in-siem-bde2d93a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23715%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22923-cwe-121-stack-based-buffer-overflow-02a96a6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22923%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20NX&amp;severity=high&amp;id=698b05e84b57a58fa1fb44e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40587-cwe-79-improper-neutralization-of-i-64fada5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40587%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20Polarion%20V2404&amp;severity=high&amp;id=698b05e84b57a58fa1fb44dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52334-cwe-261-weak-encoding-for-password--c5d97ffa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52334%3A%20CWE-261%3A%20Weak%20Encoding%20for%20Password%20in%20Siemens%20syngo.plaza%20VB30E&amp;severity=medium&amp;id=698b05e84b57a58fa1fb44d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24343-cwe-643-improper-neutralization-of--6c783d29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24343%3A%20CWE-643%20Improper%20Neutralization%20of%20Data%20within%20XPath%20Expressions%20(&apos;XPath%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20HertzBeat&amp;severity=high&amp;id=698afe6e4b57a58fa1f90111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23906-cwe-287-improper-authentication-in--42f1177b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23906%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20Druid&amp;severity=critical&amp;id=698afe6e4b57a58fa1f9010e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14895-cwe-862-missing-authorization-in-ro-64edcef3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14895%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=medium&amp;id=698afe6e4b57a58fa1f900f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1922-cwe-79-improper-neutralization-of-in-90ceb130</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brianhogg%20The%20Events%20Calendar%20Shortcode%20%26%20Block&amp;severity=medium&amp;id=698afe6e4b57a58fa1f90105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1866-cwe-79-improper-neutralization-of-in-d7a88772</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeroenpeters1986%20Name%20Directory&amp;severity=high&amp;id=698afe6e4b57a58fa1f900fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2268-cwe-200-exposure-of-sensitive-inform-aa32ef04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2268%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=high&amp;id=698afe6e4b57a58fa1f90114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23901-cwe-208-observable-timing-discrepan-19a39b16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23901%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Apache%20Software%20Foundation%20Apache%20Shiro&amp;severity=low&amp;id=698afe6e4b57a58fa1f9010b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-push-traffic-origin-data-combined-with-resi-28c53a89</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Push%20Traffic%20Origin%20Data%20Combined%20with%20Residential%20Proxy%20Data%20Uncovers%20Suspicious%20Chinese%20VPN&amp;severity=medium&amp;id=698b053e4b57a58fa1fad57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11242-cwe-918-server-side-request-forgery-31b927d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11242%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Teknolist%20Computer%20Systems%20Software%20Publishing%20Industry%20and%20Trade%20Inc.%20Okulistik&amp;severity=critical&amp;id=698af7604b57a58fa1f6ec18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-authorities-confirm-ivanti-zero-day-exploit--8334b47d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Authorities%20Confirm%20Ivanti%20Zero-Day%20Exploit%20Exposed%20Employee%20Contact%20Data&amp;severity=medium&amp;id=698b13994b57a58fa1ff12f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rsac-releases-quantickle-open-source-threat-intell-30291b77</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RSAC%20Releases%20Quantickle%20Open%20Source%20Threat%20Intelligence%20Visualization%20Tool&amp;severity=medium&amp;id=698ade914b57a58fa1edc53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1722-cwe-862-missing-authorization-in-wcl-7f2fe052</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1722%3A%20CWE-862%20Missing%20Authorization%20in%20wclovers%20WCFM%20Marketplace%20%E2%80%93%20Multivendor%20Marketplace%20for%20WooCommerce&amp;severity=medium&amp;id=698ae2484b57a58fa1eeadc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2099-cwe-79-improper-neutralization-of-in-96253298</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2099%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flowring%20AgentFlow&amp;severity=medium&amp;id=698adb404b57a58fa1eccffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2098-cwe-79-improper-neutralization-of-in-6f123170</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flowring%20AgentFlow&amp;severity=medium&amp;id=698adb404b57a58fa1eccff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2097-cwe-434-unrestricted-upload-of-file--ba0b3f5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2097%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Flowring%20Agentflow&amp;severity=high&amp;id=698adb404b57a58fa1eccff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2096-cwe-288-authentication-bypass-using--10f90ea1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2096%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Flowring%20Agentflow&amp;severity=critical&amp;id=698adb404b57a58fa1eccfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2095-cwe-288-authentication-bypass-using--1f37d3de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2095%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Flowring%20Agentflow&amp;severity=critical&amp;id=698adb404b57a58fa1eccfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2094-cwe-89-improper-neutralization-of-sp-15f4d34d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2094%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Flowring%20Docpedia&amp;severity=high&amp;id=698adb404b57a58fa1eccfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2093-cwe-89-improper-neutralization-of-sp-a4a4780d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2093%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Flowring%20Docpedia&amp;severity=high&amp;id=698adb404b57a58fa1eccfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12063-cwe-639-authorization-bypass-throug-604c5572</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12063%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=698ad0b34b57a58fa1e8b07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12757-cwe-22-improper-limitation-of-a-pat-14965a52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12757%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=698ac9b04b57a58fa1e63de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13064-cwe-248-uncaught-exception-in-axis--32530aec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13064%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=698ac9b04b57a58fa1e63dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11547-cwe-532-insertion-of-sensitive-info-252f9fc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11547%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=high&amp;id=698ac9b04b57a58fa1e63de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11142-cwe-78-improper-neutralization-of-s-8652aae4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11142%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=high&amp;id=698ac9b04b57a58fa1e63de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0996-cwe-79-improper-neutralization-of-in-2dac7514</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=698ac9b04b57a58fa1e63df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24328-cwe-601-url-redirection-to-untruste-5304d931</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24328%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20Business%20Server%20Pages%20Application%20(TAF_APPLAUNCHER)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24327-cwe-862-missing-authorization-in-sa-e7483346</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24327%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Strategic%20Enterprise%20Management%20(Balanced%20Scorecard%20in%20BSP%20Application)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24326-cwe-862-missing-authorization-in-sa-5ec24ceb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24326%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Defense%20%26%20Security%20(Disconnected%20Operations)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24325-cwe-79-improper-neutralization-of-i-4ade4e67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24325%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20BusinessObjects%20Enterprise%20(Central%20Management%20Console)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24324-cwe-405-asymmetric-resource-consump-ac448fa8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24324%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(AdminTools)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24323-cwe-601-url-redirection-to-untruste-bc9f77e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24323%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Document%20Management%20System&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24322-cwe-862-missing-authorization-in-sa-73737ee7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24322%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Solution%20Tools%20Plug-In%20(ST-PI)&amp;severity=high&amp;id=698aaa0b4b57a58fa1c64d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24321-cwe-359-exposure-of-private-persona-4c72729a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24321%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20SAP_SE%20SAP%20Commerce%20Cloud&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24320-cwe-113-improper-neutralization-of--cd28a221</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24320%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20in%20SAP_SE%20SAP%20NetWeaver%20and%20ABAP%20Platform%20(Application%20Server%20ABAP)&amp;severity=low&amp;id=698aaa0b4b57a58fa1c64d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24319-cwe-316-cleartext-storage-of-sensit-d9d71bc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24319%3A%20CWE-316%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20SAP_SE%20SAP%20Business%20One%20(B1%20Client%20Memory%20Dump%20Files)&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24312-cwe-862-missing-authorization-in-sa-d8c48f91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24312%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Workflow&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23689-cwe-606-unchecked-input-for-loop-co-fcc10474</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23689%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20SAP_SE%20SAP%20Supply%20Chain%20Management&amp;severity=high&amp;id=698aaa0b4b57a58fa1c64d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23688-cwe-862-missing-authorization-in-sa-008ebf09</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23688%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Fiori%20App%20(Manage%20Service%20Entry%20Sheets%20-%20Lean%20Services)&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23687-cwe-347-improper-verification-of-cr-3a7c3b5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23687%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20ABAP%20and%20ABAP%20Platform&amp;severity=high&amp;id=698aaa0b4b57a58fa1c64d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23686-cwe-113-improper-neutralization-of--8850b399</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23686%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java&amp;severity=low&amp;id=698aaa0b4b57a58fa1c64d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23685-cwe-502-deserialization-of-untruste-7cb9f0ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23685%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20(JMS%20service)&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23684-cwe-366-race-condition-within-a-thr-7e7b6ae6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23684%3A%20CWE-366%3A%20Race%20Condition%20within%20a%20Thread%20in%20SAP_SE%20SAP%20Commerce%20Cloud&amp;severity=medium&amp;id=698aaa094b57a58fa1c64cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2260-os-command-injection-in-d-link-dcs-9-9a67af74</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2260%3A%20OS%20Command%20Injection%20in%20D-Link%20DCS-931L&amp;severity=high&amp;id=698aaa0c4b57a58fa1c64d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23681-cwe-862-missing-authorization-in-sa-3f5d65c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23681%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Support%20Tools%20Plug-In&amp;severity=medium&amp;id=698aaa094b57a58fa1c64cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0509-cwe-862-missing-authorization-in-sap-3bdb181d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0509%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=critical&amp;id=698aaa094b57a58fa1c64cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0508-cwe-601-url-redirection-to-untrusted-0338bc06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0508%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=high&amp;id=698aaa094b57a58fa1c64cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0505-cwe-79-improper-neutralization-of-in-540ed851</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0505%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Document%20Management%20System&amp;severity=medium&amp;id=698aaa094b57a58fa1c64ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0490-cwe-862-missing-authorization-in-sap-459ce6f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0490%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20BusinessObjects%20BI%20Platform&amp;severity=high&amp;id=698aaa094b57a58fa1c64ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0488-cwe-862-missing-authorization-in-sap-cae5a650</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0488%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20CRM%20and%20SAP%20S%2F4HANA%20(Scripting%20Editor)&amp;severity=critical&amp;id=698aaa094b57a58fa1c64ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0486-cwe-862-missing-authorization-in-sap-2d43e29e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0486%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20ABAP%20based%20SAP%20systems&amp;severity=medium&amp;id=698aaa094b57a58fa1c64c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0485-cwe-405-asymmetric-resource-consumpt-1576c846</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0485%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20BusinessObjects%20BI%20Platform&amp;severity=high&amp;id=698aaa094b57a58fa1c64c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0484-cwe-601-url-redirection-to-untrusted-44a6b1e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0484%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20SAP%20S%2F4HANA&amp;severity=medium&amp;id=698aaa094b57a58fa1c64c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2259-memory-corruption-in-aardappel-lobst-79ad5913</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2259%3A%20Memory%20Corruption%20in%20aardappel%20lobster&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2258-memory-corruption-in-aardappel-lobst-b00f3d42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2258%3A%20Memory%20Corruption%20in%20aardappel%20lobster&amp;severity=medium&amp;id=698a78d04b57a58fa17ae5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-10-1709a628</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-10&amp;severity=medium&amp;id=698bca194b57a58fa1348b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70347-na-77c1cb2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70347%3A%20n%2Fa&amp;severity=medium&amp;id=698b92154b57a58fa127f949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54192-na-3759a40f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54192%3A%20n%2Fa&amp;severity=medium&amp;id=698b92154b57a58fa127f945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-10-261f06d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-10&amp;severity=low&amp;id=698af0234b57a58fa1f32c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15147-cwe-639-authorization-bypass-throug-fff7384a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15147%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wclovers%20WCFM%20Membership%20%E2%80%93%20WooCommerce%20Memberships%20for%20Multivendor%20Marketplace&amp;severity=medium&amp;id=698a6e434b57a58fa1785551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0845-cwe-862-missing-authorization-in-wcl-018676c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0845%3A%20CWE-862%20Missing%20Authorization%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=high&amp;id=698a6e434b57a58fa1785556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15314-improper-link-resolution-before-fil-c0454d22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15314%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20end-user-cx&amp;severity=medium&amp;id=698a6abf4b57a58fa177cfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15313-improper-link-resolution-before-fil-d5322d91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15313%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Tanium%20EUSS&amp;severity=medium&amp;id=698a6abf4b57a58fa177cfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15310-improper-link-resolution-before-fil-253a4c0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15310%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Patch%20Endpoint%20Tools&amp;severity=high&amp;id=698a6abf4b57a58fa177cfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15318-improper-link-resolution-before-fil-3173e891</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15318%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20End-User%20Notifications%20Endpoint%20Tools&amp;severity=medium&amp;id=698a673b4b57a58fa1774ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15319-improper-link-resolution-before-fil-6d3cb710</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15319%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Patch%20Endpoint%20Tools&amp;severity=high&amp;id=698a673b4b57a58fa1774cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25958-cwe-807-reliance-on-untrusted-input-6bd12c4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25958%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20cube-js%20cube&amp;severity=high&amp;id=698a673b4b57a58fa1774cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25957-cwe-755-improper-handling-of-except-a42524a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25957%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20cube-js%20cube&amp;severity=medium&amp;id=698a673b4b57a58fa1774cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25895-cwe-22-improper-limitation-of-a-pat-61293111</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25895%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a63b84b57a58fa17688da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25894-cwe-321-use-of-hard-coded-cryptogra-a10e5fe5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25894%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a63b84b57a58fa17688d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25893-cwe-285-improper-authorization-in-f-a5914f35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25893%3A%20CWE-285%3A%20Improper%20Authorization%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a63b84b57a58fa17688d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25951-cwe-22-improper-limitation-of-a-pat-343cbba3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25951%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20frangoteam%20FUXA&amp;severity=high&amp;id=698a63b84b57a58fa17688df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25939-cwe-862-missing-authorization-in-fr-75e34d8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25939%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a60344b57a58fa175ce08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25938-cwe-290-authentication-bypass-by-sp-543651d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25938%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a60344b57a58fa175ce03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25931-cwe-276-incorrect-default-permissio-91eb9b5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25931%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20streetsidesoftware%20vscode-spell-checker&amp;severity=high&amp;id=698a60344b57a58fa175cdfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25925-cwe-502-deserialization-of-untruste-9527a485</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25925%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20modery%20PowerDocu&amp;severity=high&amp;id=698a5caf4b57a58fa174d53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25923-cwe-434-unrestricted-upload-of-file-c3e3a82e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25923%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20My-Little-Forum%20mylittleforum&amp;severity=high&amp;id=698a5caf4b57a58fa174d539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25808-cwe-862-missing-authorization-in-fe-66888cd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25808%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fedify-dev%20hollo&amp;severity=high&amp;id=698a592c4b57a58fa173fd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15315-improper-neutralization-of-argument-c4bc1745</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15315%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Tanium%20Tanium%20Module%20Server&amp;severity=medium&amp;id=698a592c4b57a58fa173fd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15316-improper-neutralization-of-argument-76cc03f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15316%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Tanium%20Tanium%20Server&amp;severity=medium&amp;id=698a592c4b57a58fa173fd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25807-cwe-94-improper-control-of-generati-87c44d84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25807%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20TaklaXBR%20zai-shell&amp;severity=high&amp;id=698a592c4b57a58fa173fd9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15317-allocation-of-resources-without-lim-a7a03743</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15317%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Tanium%20Tanium%20Server&amp;severity=medium&amp;id=698a592c4b57a58fa173fd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25961-cwe-295-improper-certificate-valida-57d25293</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25961%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=high&amp;id=698a55a74b57a58fa1734045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25920-cwe-125-out-of-bounds-read-in-sumat-3b2bbce2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25920%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=medium&amp;id=698a55a74b57a58fa1734040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25918-cwe-532-insertion-of-sensitive-info-39d8e9fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25918%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20RageAgainstThePixel%20unity-cli&amp;severity=medium&amp;id=698a55a74b57a58fa173403a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25892-cwe-20-improper-input-validation-in-580634c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25892%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vrana%20adminer&amp;severity=high&amp;id=698a55a74b57a58fa1734034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25885-cwe-285-improper-authorization-in-p-5fce425d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25885%3A%20CWE-285%3A%20Improper%20Authorization%20in%20polarnl%20PolarLearn&amp;severity=critical&amp;id=698a52254b57a58fa1728466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25881-cwe-1321-improperly-controlled-modi-02093bcc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25881%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=698a52254b57a58fa1728462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25880-cwe-426-untrusted-search-path-in-su-ccd09e57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25880%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=high&amp;id=698a52254b57a58fa172845f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25875-cwe-863-incorrect-authorization-in--a76e9c2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25875%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=698a52254b57a58fa172845c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25814-cwe-74-improper-neutralization-of-s-12194afe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25814%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=698a52254b57a58fa1728459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25813-cwe-532-insertion-of-sensitive-info-26701139</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25813%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Praskla-Technology%20assessment-placipy&amp;severity=high&amp;id=698a52254b57a58fa1728456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25812-cwe-352-cross-site-request-forgery--3e79817d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25812%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=698a52254b57a58fa1728453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25811-cwe-863-incorrect-authorization-in--82293d19</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25811%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698a52254b57a58fa1728450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25809-cwe-285-improper-authorization-in-p-3c443f62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25809%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb453b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25878-cwe-306-missing-authentication-for--8494af2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25878%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FriendsOfShopware%20FroshPlatformAdminer&amp;severity=medium&amp;id=698b05e84b57a58fa1fb4544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25806-cwe-862-missing-authorization-in-pr-dd558da3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25806%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb4538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25810-cwe-862-missing-authorization-in-pr-4371736f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25810%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb453e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25876-cwe-862-missing-authorization-in-pr-92ab8419</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25876%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb4541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25791-cwe-306-missing-authentication-for--d6be490b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25791%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20BishopFox%20sliver&amp;severity=high&amp;id=698a47984b57a58fa1702e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25765-cwe-918-server-side-request-forgery-aa34ec38</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25765%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lostisland%20faraday&amp;severity=medium&amp;id=698a47984b57a58fa1702e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25740-cwe-250-execution-with-unnecessary--c037db11</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25740%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20NixOS%20nixpkgs&amp;severity=medium&amp;id=698a44144b57a58fa16f3275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25528-cwe-918-server-side-request-forgery-df952e2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25528%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langsmith-sdk&amp;severity=medium&amp;id=698a44144b57a58fa16f3272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25498-cwe-470-use-of-externally-controlle-bb4bbc61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25498%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=698a408f4b57a58fa16e1631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25497-cwe-639-authorization-bypass-throug-027976b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25497%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=698a3d0c4b57a58fa16d39e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25496-cwe-79-improper-neutralization-of-i-395ed0bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25496%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25495-cwe-89-improper-neutralization-of-s-654416fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25495%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=698a3d0c4b57a58fa16d39dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25494-cwe-918-server-side-request-forgery-0ab124c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25494%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25493-cwe-918-server-side-request-forgery-a0e46f28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25493%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25492-cwe-918-server-side-request-forgery-4dbb90e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25492%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2246-memory-corruption-in-aprilrobotics-a-970766f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2246%3A%20Memory%20Corruption%20in%20AprilRobotics%20apriltag&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptocurrency-sector-targeted-with-new-tooling-an-c14e047c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC1069%20Targets%20Cryptocurrency%20Sector%20with%20New%20Tooling%20and%20AI-Enabled%20Social%20Engineering&amp;severity=medium&amp;id=698a44134b57a58fa16f31b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25491-cwe-79-improper-neutralization-of-i-3459c577</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25491%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=low&amp;id=698a36084b57a58fa16ab205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25057-cwe-23-relative-path-traversal-in-m-5548e007</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25057%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20MarkUsProject%20Markus&amp;severity=critical&amp;id=698a36074b57a58fa16ab1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-guloader-obfuscation-techniq-53e14a11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20GuLoader%20Obfuscation%20Techniques&amp;severity=medium&amp;id=698a44134b57a58fa16f31df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2245-out-of-bounds-read-in-ccextractor-33eb7398</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2245%3A%20Out-of-Bounds%20Read%20in%20CCExtractor&amp;severity=medium&amp;id=698a36084b57a58fa16ab20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25598-cwe-778-insufficient-logging-in-ste-2804f268</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25598%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=698a36084b57a58fa16ab20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14778-incorrect-privilege-assignment-in-r-19fc6c86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14778%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=698a36074b57a58fa16ab1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25480-cwe-176-improper-handling-of-unicod-2f593a42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25480%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20litestar-org%20litestar&amp;severity=medium&amp;id=698a36074b57a58fa16ab1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25479-cwe-185-incorrect-regular-expressio-bc68cd37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25479%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20litestar-org%20litestar&amp;severity=medium&amp;id=698a36074b57a58fa16ab1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25478-cwe-942-permissive-cross-domain-pol-f5faed08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25478%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20litestar-org%20litestar&amp;severity=high&amp;id=698a36074b57a58fa16ab1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24900-cwe-639-authorization-bypass-throug-2ecae0e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24900%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=698a36074b57a58fa16ab1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1529-improper-verification-of-cryptograph-4c2c244f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1529%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=698a36074b57a58fa16ab1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1486-improperly-implemented-security-chec-7c4b399b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1486%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=high&amp;id=698a36074b57a58fa16ab1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25231-cwe-284-improper-access-control-in--66a1eb8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25231%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20error311%20FileRise&amp;severity=high&amp;id=698a36074b57a58fa16ab1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25230-cwe-79-improper-neutralization-of-i-0eaa64a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25230%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20error311%20FileRise&amp;severity=medium&amp;id=698a36074b57a58fa16ab1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24777-cwe-862-missing-authorization-in-op-6009884e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24777%3A%20CWE-862%3A%20Missing%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=698a2b784b57a58fa167fcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66630-cwe-338-use-of-cryptographically-we-73e9741e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66630%3A%20CWE-338%3A%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20gofiber%20fiber&amp;severity=critical&amp;id=698a24714b57a58fa1662675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2242-out-of-bounds-read-in-janet-lang-jan-d199ab8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2242%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=698a19e84b57a58fa162a84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21419-cwe-59-improper-link-resolution-bef-74c953b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21419%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Display%20and%20Peripheral%20Manager%20(Windows)&amp;severity=medium&amp;id=698a19e84b57a58fa162a84b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-unc3886-targets-singapore-telecom-sec-897fc327</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20UNC3886%20Targets%20Singapore%20Telecom%20Sector%20in%20Cyber%20Espionage%20Campaign&amp;severity=medium&amp;id=698b13994b57a58fa1ff12fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7432-cwe-331-insufficient-entropy-in-sila-747141dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7432%3A%20CWE-331%20Insufficient%20Entropy%20in%20silabs.com%20Simplicity%20SDK&amp;severity=low&amp;id=698a0bd54b57a58fa15e776c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2241-out-of-bounds-read-in-janet-lang-jan-d51ea6cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2241%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=698a0bd54b57a58fa15e776f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2240-out-of-bounds-read-in-janet-lang-jan-2be03f13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2240%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=698a04d04b57a58fa15c44d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24095-cwe-862-missing-authorization-in-ch-88cb5ac1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24095%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=698a04d04b57a58fa15c44e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigation-on-the-emeditor-supply-chain-cyberat-ab1804a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigation%20on%20the%20EmEditor%20Supply%20Chain%20Cyberattack&amp;severity=medium&amp;id=698a44134b57a58fa16f31e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14831-inefficient-algorithmic-complexity--ca1ed9c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14831%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6989fa464b57a58fa15923dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59024-insufficient-verification-of-data-a-91d349d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59024%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6989fa464b57a58fa15923e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59023-insufficient-verification-of-data-a-e1c2d96a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59023%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20PowerDNS%20Recursor&amp;severity=high&amp;id=6989fa464b57a58fa15923e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-web-help-desk-exploited-for-rce-in-mult-e75d2ab7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Web%20Help%20Desk%20Exploited%20for%20RCE%20in%20Multi-Stage%20Attacks%20on%20Exposed%20Servers&amp;severity=high&amp;id=698b13994b57a58fa1ff1300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-groups-may-pivot-back-to-encryption-as--63c17323</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Groups%20May%20Pivot%20Back%20to%20Encryption%20as%20Data%20Theft%20Tactics%20Falter&amp;severity=medium&amp;id=6989f3054b57a58fa1569104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24027-insufficient-control-of-network-mes-77e6ac15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24027%3A%20Insufficient%20Control%20of%20Network%20Message%20Volume%20(Network%20Amplification)%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6989f3484b57a58fa156b619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0398-allocation-of-resources-without-limi-3e960007</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0398%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6989efb44b57a58fa1554a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-ai-skill-malware-31tbps-ddos-notepad--9762e0ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20AI%20Skill%20Malware%2C%2031Tbps%20DDoS%2C%20Notepad%2B%2B%20Hack%2C%20LLM%20Backdoors%20and%20More&amp;severity=low&amp;id=698b13994b57a58fa1ff1303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10465-cwe-434-unrestricted-upload-of-file-94c4de0a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10465%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Birtech%20Information%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20Sensaway&amp;severity=high&amp;id=6989e1a74b57a58fa150c5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/9th-february-threat-intelligence-report-caf6f41f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=9th%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6989da9c4b57a58fa14eff48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10464-cwe-922-insecure-storage-of-sensiti-beb9bf87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10464%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Birtech%20Information%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20Senseway&amp;severity=medium&amp;id=6989da9b4b57a58fa14eff3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-solarwinds-flaws-potentially-exploited-as-z-fc2f5064</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20SolarWinds%20Flaws%20Potentially%20Exploited%20as%20Zero-Days&amp;severity=medium&amp;id=6989d6e54b57a58fa14dea2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10463-cwe-287-improper-authentication-in--ca3897ad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10463%3A%20CWE-287%20Improper%20Authentication%20in%20Birtech%20Information%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20Senseway&amp;severity=high&amp;id=6989d0204b57a58fa14b2a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartertools-hit-by-ransomware-via-vulnerability-i-0f5ab2d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmarterTools%20Hit%20by%20Ransomware%20via%20Vulnerability%20in%20Its%20Own%20Product&amp;severity=medium&amp;id=6989cfdd4b57a58fa14b21ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7708-cwe-201-insertion-of-sensitive-infor-65d7317b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7708%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Atlas%20Educational%20Software%20Industry%20Ltd.%20Co.%20k12net&amp;severity=medium&amp;id=6989cc8b4b57a58fa14a189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-howto-extract-urls-from-rtf-files-mon-feb-9t-6cacc95b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20Howto%3A%20Extract%20URLs%20from%20RTF%20files%2C%20(Mon%2C%20Feb%209th)&amp;severity=medium&amp;id=6989c8d84b57a58fa148ec42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0632-cwe-918-server-side-request-forgery--732105b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0632%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=medium&amp;id=6989c9094b57a58fa148f1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6830-cwe-89-improper-neutralization-of-sp-5ed972bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6830%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Xpoda%20T%C3%BCrkiye%20Information%20Technology%20Inc.%20Password%20Module&amp;severity=critical&amp;id=6989c9094b57a58fa148f1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bloody-wolf-targets-uzbekistan-russia-using-netsup-3ff6525c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bloody%20Wolf%20Targets%20Uzbekistan%2C%20Russia%20Using%20NetSupport%20RAT%20in%20Spear-Phishing%20Campaign&amp;severity=medium&amp;id=6989bfb04b57a58fa1460075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25848-cwe-306-in-jetbrains-hub-516ea109</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25848%3A%20CWE-306%20in%20JetBrains%20Hub&amp;severity=critical&amp;id=6989be7b4b57a58fa145bd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25847-cwe-79-in-jetbrains-pycharm-78c95cdc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25847%3A%20CWE-79%20in%20JetBrains%20PyCharm&amp;severity=high&amp;id=6989be7b4b57a58fa145bd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25846-cwe-532-in-jetbrains-youtrack-3ac80398</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25846%3A%20CWE-532%20in%20JetBrains%20YouTrack&amp;severity=medium&amp;id=6989be7b4b57a58fa145bd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22922-cwe-648-incorrect-use-of-privileged-9ee633eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22922%3A%20CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=6989be7b4b57a58fa145bd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24098-cwe-200-exposure-of-sensitive-infor-186a34d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24098%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=6989be7b4b57a58fa145bd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-security-alert-regarding-apt-c-28-scarcruft-usin-773bbda4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20security%20alert%20regarding%20APT-C-28%20(ScarCruft)%20using%20MiradorShell%20to%20launch%20a%20cyberattack.&amp;severity=medium&amp;id=6989baf74b57a58fa144434a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2227-command-injection-in-d-link-dcs-931l-c3756b7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2227%3A%20Command%20Injection%20in%20D-Link%20DCS-931L&amp;severity=medium&amp;id=6989b3ef4b57a58fa1421850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2226-unrestricted-upload-in-douphp-463363d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2226%3A%20Unrestricted%20Upload%20in%20DouPHP&amp;severity=medium&amp;id=6989ace74b57a58fa13edb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23903-cwe-289-authentication-bypass-by-al-8c206734</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23903%3A%20CWE-289%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Apache%20Software%20Foundation%20Apache%20Shiro&amp;severity=medium&amp;id=6989ace74b57a58fa13edb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-paper-and-tool-help-security-teams-move-beyond-efca9381</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Paper%20and%20Tool%20Help%20Security%20Teams%20Move%20Beyond%20Blind%20Reliance%20on%20CISA%E2%80%99s%20KEV%20Catalog&amp;severity=medium&amp;id=6989a5ac4b57a58fa13b9702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2225-sql-injection-in-itsourcecode-news-p-9e323cdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2225%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=6989a5ef4b57a58fa13baa26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25905-cwe-653-improper-isolation-or-compa-51b8b4d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25905%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization&amp;severity=medium&amp;id=6989a5ef4b57a58fa13baa23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25904-cwe-918-server-side-request-forgery-fbd95310</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25904%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=6989a2774b57a58fa13a5753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-worm-exploits-cloud-infrastructure-to-buil-27364f5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Worm%20Exploits%20Cloud%20Infrastructure%20to%20Build%20Criminal%20Infrastructure&amp;severity=low&amp;id=6989bfb04b57a58fa1460078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2224-cross-site-scripting-in-code-project-0ed5a829</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2224%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=6989a2774b57a58fa13a5756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25916-cwe-420-unprotected-alternate-chann-1d2e3763</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25916%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69899b534b57a58fa1382738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7799-cwe-79-improper-neutralization-of-in-0c259e86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zirve%20Information%20Technologies%20Inc.%20e-Taxpayer%20Accounting%20Website&amp;severity=high&amp;id=69899b534b57a58fa1382735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-commission-investigating-cyberattack-69fc77ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Commission%20Investigating%20Cyberattack&amp;severity=medium&amp;id=6989979c4b57a58fa1362e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-fixes-critical-pre-auth-rce-vulnerabil-0ae0cb0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Fixes%20Critical%20Pre-Auth%20RCE%20Vulnerability%20in%20Remote%20Support%20and%20PRA&amp;severity=critical&amp;id=6989bfb04b57a58fa146007b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2223-sql-injection-in-code-projects-onlin-37e26188</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2223%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698997e24b57a58fa1363d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22906-cwe-321-use-of-hard-coded-cryptogra-e9045210</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22906%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20WAGO%200852-1322&amp;severity=critical&amp;id=6989944b4b57a58fa134d4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22905-cwe-22-improper-limitation-of-a-pat-e3a62789</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22905%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WAGO%200852-1322&amp;severity=high&amp;id=6989944b4b57a58fa134d4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22904-cwe-121-stack-based-buffer-overflow-f7b2d93e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22904%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%200852-1322&amp;severity=critical&amp;id=6989944b4b57a58fa134d4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22903-cwe-121-stack-based-buffer-overflow-53b0bab5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22903%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%200852-1322&amp;severity=critical&amp;id=6989944b4b57a58fa134d4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2222-cross-site-scripting-in-code-project-1faba2de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2222%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698990c74b57a58fa133ba92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2236-cwe-89-improper-neutralization-of-sp-cff86a22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2236%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HGiga%20C%26Cm%40il%20package%20olln-base&amp;severity=high&amp;id=698990c74b57a58fa133baa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2235-cwe-89-improper-neutralization-of-sp-1bfc1044</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2235%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HGiga%20C%26Cm%40il%20package%20olln-base&amp;severity=high&amp;id=698990c74b57a58fa133ba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2234-cwe-306-missing-authentication-for-c-d21fa761</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2234%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HGiga%20C%26Cm%40il%20%20package%20olln-base&amp;severity=critical&amp;id=698990c74b57a58fa133ba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2221-sql-injection-in-code-projects-onlin-a04655ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2221%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698989bf4b57a58fa13168bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24466-unquoted-search-path-or-element-in--cbb2d1f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24466%3A%20Unquoted%20search%20path%20or%20element%20in%20Oki%20Electric%20Industry%20Co.%2C%20Ltd.%20See%20%22References%22%20section&amp;severity=medium&amp;id=698989bf4b57a58fa13168b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1868-cwe-1336-improper-neutralization-of--f5bf4abe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1868%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20GitLab%20GitLab%20AI%20Gateway&amp;severity=critical&amp;id=698982b74b57a58fa12ef2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2220-sql-injection-in-code-projects-onlin-98adb77f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2220%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698982b74b57a58fa12ef2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0870-cwe-250-execution-with-unnecessary-p-ded42670</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0870%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20GIGABYTE%20MacroHub&amp;severity=high&amp;id=698982b74b57a58fa12ef2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2218-command-injection-in-d-link-dcs-933l-acb9f68a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2218%3A%20Command%20Injection%20in%20D-Link%20DCS-933L&amp;severity=medium&amp;id=69897baf4b57a58fa12c1f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22613-cwe-295-improper-certificate-valida-325d563b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22613%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Eaton%20Network%20M3&amp;severity=medium&amp;id=69897baf4b57a58fa12c1f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2217-sql-injection-in-itsourcecode-event--c38204db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2217%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=698974a74b57a58fa1284a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2216-path-traversal-in-rachelos-werss-we--a945c412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2216%3A%20Path%20Traversal%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=698974a74b57a58fa1284a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1615-arbitrary-code-injection-in-jsonpath-a64ac077</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1615%3A%20Arbitrary%20Code%20Injection%20in%20jsonpath&amp;severity=critical&amp;id=69896dc24b57a58fa125bde1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2215-use-of-default-cryptographic-key-in--c7f269e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2215%3A%20Use%20of%20Default%20Cryptographic%20Key%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=69896dc24b57a58fa125bde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2214-cross-site-scripting-in-code-project-a5d3b284</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2214%3A%20Cross%20Site%20Scripting%20in%20code-projects%20for%20Plugin&amp;severity=medium&amp;id=698963134b57a58fa121384c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66594-cwe-209-generation-of-error-message-31950b35</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66594%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698963134b57a58fa1213836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66595-cwe-352-cross-site-request-forgery--ae40aa6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66595%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698963134b57a58fa1213839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66596-cwe-601-url-redirection-to-untruste-2d3d37c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66596%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698963134b57a58fa121383c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2213-unrestricted-upload-in-code-projects-33365f29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2213%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=698963134b57a58fa1213845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66597-cwe-327-use-of-a-broken-or-risky-cr-01f86823</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66597%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698963134b57a58fa121383f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66598-cwe-327-use-of-a-broken-or-risky-cr-396922de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66598%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698963134b57a58fa1213842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66599-cwe-497-in-yokogawa-electric-corpor-67812000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66599%3A%20CWE-497%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66600-cwe-358-in-yokogawa-electric-corpor-22d483ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66600%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698955034b57a58fa1ffc956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66601-cwe-358-in-yokogawa-electric-corpor-af4e632e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66601%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66602-cwe-291-in-yokogawa-electric-corpor-5ed93e73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66602%3A%20CWE-291%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66603-cwe-358-in-yokogawa-electric-corpor-1fdc73b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66603%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66604-cwe-319-cleartext-transmission-of-s-faac7ee5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66604%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66605-cwe-359-in-yokogawa-electric-corpor-1d5f1c27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66605%3A%20CWE-359%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66608-cwe-29-in-yokogawa-electric-corpora-c44d1dab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66608%3A%20CWE-29%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698955034b57a58fa1ffc96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66607-cwe-358-in-yokogawa-electric-corpor-8ee1b437</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66607%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66606-cwe-86-in-yokogawa-electric-corpora-c5b47c11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66606%3A%20CWE-86%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2212-sql-injection-in-code-projects-onlin-7f86cd97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2212%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=698955054b57a58fa1ffc98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2211-sql-injection-in-code-projects-onlin-ce4e0f75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2211%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=698955054b57a58fa1ffc985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2210-os-command-injection-in-d-link-dir-8-a510703e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2210%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=698946f34b57a58fa1f4d9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2203-buffer-overflow-in-tenda-ac8-23b5fa92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2203%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=698946f34b57a58fa1f4d9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2202-buffer-overflow-in-tenda-ac8-e8c278de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2202%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=698946f34b57a58fa1f4d9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2201-cross-site-scripting-in-zerowdd-stud-9895ddc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2201%3A%20Cross%20Site%20Scripting%20in%20ZeroWdd%20studentmanager&amp;severity=medium&amp;id=69893c684b57a58fa1f0defe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2200-cross-site-scripting-in-heyewei-jfin-25699fc3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2200%3A%20Cross%20Site%20Scripting%20in%20heyewei%20JFinalCMS&amp;severity=medium&amp;id=69893c684b57a58fa1f0def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2199-sql-injection-in-code-projects-onlin-221a3256</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2199%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698931db4b57a58fa1e6f5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2198-sql-injection-in-code-projects-onlin-84785075</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2198%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698931db4b57a58fa1e6f5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2197-sql-injection-in-code-projects-onlin-5a7ff2a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2197%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=69892ad34b57a58fa1e0cc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2196-sql-injection-in-code-projects-onlin-521b2058</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2196%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=69892ad34b57a58fa1e0cc8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-09-7838bdc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-09&amp;severity=medium&amp;id=698a78994b57a58fa17a85c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63354-na-1368ce6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63354%3A%20n%2Fa&amp;severity=medium&amp;id=6989fa464b57a58fa15923e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-09-5af1a3c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-09&amp;severity=low&amp;id=6989d35e4b57a58fa14c3f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2195-sql-injection-in-code-projects-onlin-a1957e30</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2195%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698923cd4b57a58fa1dc4da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2194-command-injection-in-d-link-di-7100g-aad9a2bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2194%3A%20Command%20Injection%20in%20D-Link%20DI-7100G%20C1&amp;severity=medium&amp;id=698923cd4b57a58fa1dc4da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2193-command-injection-in-d-link-di-7100g-d80401b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2193%3A%20Command%20Injection%20in%20D-Link%20DI-7100G%20C1&amp;severity=medium&amp;id=6989193f4b57a58fa1d8c2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2192-stack-based-buffer-overflow-in-tenda-017bd58d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2192%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=6989193f4b57a58fa1d8c2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2191-stack-based-buffer-overflow-in-tenda-65760e1b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2191%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=698912394b57a58fa1d5d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2190-sql-injection-in-itsourcecode-school-e4e0476a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2190%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=698912394b57a58fa1d5d424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2189-sql-injection-in-itsourcecode-school-16a78f0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2189%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=69890b2f4b57a58fa1d35e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2188-os-command-injection-in-utt-521g-2dda2a09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2188%3A%20OS%20Command%20Injection%20in%20UTT%20%E8%BF%9B%E5%8F%96%20521G&amp;severity=high&amp;id=698904274b57a58fa1d0a686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2187-stack-based-buffer-overflow-in-tenda-a2f52fd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2187%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988fd204b57a58fa1ce2187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2186-stack-based-buffer-overflow-in-tenda-02d1b976</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2186%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988fd204b57a58fa1ce2180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2185-stack-based-buffer-overflow-in-tenda-5922d2b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2185%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988f6174b57a58fa1cbbd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2184-os-command-injection-in-great-develo-c68f08e6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2184%3A%20OS%20Command%20Injection%20in%20Great%20Developers%20Certificate%20Generation%20System&amp;severity=medium&amp;id=6988f6174b57a58fa1cbbd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2183-unrestricted-upload-in-great-develop-b27ad893</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2183%3A%20Unrestricted%20Upload%20in%20Great%20Developers%20Certificate%20Generation%20System&amp;severity=medium&amp;id=6988ef104b57a58fa1c9fb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2182-command-injection-in-utt-521g-ccd9a731</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2182%3A%20Command%20Injection%20in%20UTT%20%E8%BF%9B%E5%8F%96%20521G&amp;severity=high&amp;id=6988ef104b57a58fa1c9fb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2181-stack-based-buffer-overflow-in-tenda-ba1c013f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2181%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988e8074b57a58fa1c5ca8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2180-stack-based-buffer-overflow-in-tenda-26cba744</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2180%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988e8074b57a58fa1c5ca88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2179-sql-injection-in-phpgurukul-hospital-63fc3206</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2179%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=6988e8074b57a58fa1c5ca80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2178-command-injection-in-r-huijts-xcode--e3b31376</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2178%3A%20Command%20Injection%20in%20r-huijts%20xcode-mcp-server&amp;severity=medium&amp;id=6988e0ff4b57a58fa1c2c109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2177-session-fixiation-in-sourcecodester--c798eb6e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2177%3A%20Session%20Fixiation%20in%20SourceCodester%20Prison%20Management%20System&amp;severity=medium&amp;id=6988e0ff4b57a58fa1c2c102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2176-sql-injection-in-code-projects-conta-96625a3a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2176%3A%20SQL%20Injection%20in%20code-projects%20Contact%20Management%20System&amp;severity=medium&amp;id=6988e0ff4b57a58fa1c2c0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2175-os-command-injection-in-d-link-dir-8-2593454d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2175%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6988dd7b4b57a58fa1c1b04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2174-improper-authentication-in-code-proj-2e24bba5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2174%3A%20Improper%20Authentication%20in%20code-projects%20Contact%20Management%20System&amp;severity=medium&amp;id=6988dd7b4b57a58fa1c1b046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2173-sql-injection-in-code-projects-onlin-4c8a3584</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2173%3A%20SQL%20Injection%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=6988dd7b4b57a58fa1c1b040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2172-sql-injection-in-code-projects-onlin-2fae6bd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2172%3A%20SQL%20Injection%20in%20code-projects%20Online%20Application%20System%20for%20Admission&amp;severity=medium&amp;id=6988d6734b57a58fa1bfa5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2171-sql-injection-in-code-projects-onlin-8ac324e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2171%3A%20SQL%20Injection%20in%20code-projects%20Online%20Student%20Management%20System&amp;severity=medium&amp;id=6988d6734b57a58fa1bfa5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2169-command-injection-in-d-link-dwr-m921-36bfe2c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2169%3A%20Command%20Injection%20in%20D-Link%20DWR-M921&amp;severity=medium&amp;id=6988cbe84b57a58fa1bb3c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2168-command-injection-in-d-link-dwr-m921-f87dbd6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2168%3A%20Command%20Injection%20in%20D-Link%20DWR-M921&amp;severity=medium&amp;id=6988cbe84b57a58fa1bb3c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2167-os-command-injection-in-totolink-wa3-c6030528</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2167%3A%20OS%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=6988c4df4b57a58fa1b81884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2166-sql-injection-in-code-projects-onlin-1bb815b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2166%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=6988c4df4b57a58fa1b8187c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2165-missing-authentication-in-detronetdi-8229ecf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2165%3A%20Missing%20Authentication%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6988c15b4b57a58fa1b5b3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2164-unrestricted-upload-in-detronetdip-e-eac221b0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2164%3A%20Unrestricted%20Upload%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6988c15b4b57a58fa1b5b39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2163-command-injection-in-d-link-dir-600-3f3c8faa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2163%3A%20Command%20Injection%20in%20D-Link%20DIR-600&amp;severity=medium&amp;id=6988c15b4b57a58fa1b5b391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2162-sql-injection-in-itsourcecode-news-p-33809204</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2162%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=6988b6cf4b57a58fa1b0bc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2161-sql-injection-in-itsourcecode-direct-dd379f76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2161%3A%20SQL%20Injection%20in%20itsourcecode%20Directory%20Management%20System&amp;severity=medium&amp;id=6988b6cf4b57a58fa1b0bc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2160-cross-site-scripting-in-sourcecodest-8c400c19</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2160%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=6988afc74b57a58fa1ab2017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2159-cross-site-scripting-in-sourcecodest-4c3ce75a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2159%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=6988afc74b57a58fa1ab2010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2158-sql-injection-in-code-projects-stude-90e5a284</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2158%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=6988a8bf4b57a58fa1a60a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2157-os-command-injection-in-d-link-dir-8-f7732c6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2157%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6988a8bf4b57a58fa1a60a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2156-cross-site-scripting-in-code-project-13afde6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2156%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Student%20Management%20System&amp;severity=medium&amp;id=6988a53b4b57a58fa1a3d491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2155-os-command-injection-in-d-link-dir-8-3a93a385</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2155%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=69889aaf4b57a58fa19cfd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2154-cross-site-scripting-in-sourcecodest-62e64ca2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2154%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=6988972b4b57a58fa19a8271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2153-open-redirect-in-mwielgoszewski-door-11ffaf40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2153%3A%20Open%20Redirect%20in%20mwielgoszewski%20doorman&amp;severity=medium&amp;id=69888c9f4b57a58fa1909435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2152-os-command-injection-in-d-link-dir-6-1ad93e00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2152%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=698885974b57a58fa18a8291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2151-os-command-injection-in-d-link-dir-6-3276f328</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2151%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=69887e8f4b57a58fa183ef77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2150-cross-site-scripting-in-sourcecodest-37415e92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2150%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=698877874b57a58fa17decd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2149-cross-site-scripting-in-sourcecodest-5edcbd7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2149%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=6988707f4b57a58fa1799fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2148-information-disclosure-in-tenda-ac21-24a72697</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2148%3A%20Information%20Disclosure%20in%20Tenda%20AC21&amp;severity=medium&amp;id=69886cfc4b57a58fa161c44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2147-information-disclosure-in-tenda-ac21-fe01c565</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2147%3A%20Information%20Disclosure%20in%20Tenda%20AC21&amp;severity=medium&amp;id=698862794b57a58fa14f79d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2146-unrestricted-upload-in-guchengwuyue--a465a2fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2146%3A%20Unrestricted%20Upload%20in%20guchengwuyue%20yshopmall&amp;severity=medium&amp;id=69885b28f9fa50a62fa1ee37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2145-cross-site-scripting-in-cym1102-ngin-3fa41c03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2145%3A%20Cross%20Site%20Scripting%20in%20cym1102%20nginxWebUI&amp;severity=medium&amp;id=69885421f9fa50a62f9cba74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2143-os-command-injection-in-d-link-dir-8-43a9e1df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2143%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=69884d18f9fa50a62f96e2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2142-os-command-injection-in-d-link-dir-8-a1ababaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2142%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=69884610f9fa50a62f93b8fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2141-improper-authorization-in-wukongopen-2bac3656</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2141%3A%20Improper%20Authorization%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=69884451f9fa50a62f927d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-integrates-virustotal-scanning-to-detect--2871641f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Integrates%20VirusTotal%20Scanning%20to%20Detect%20Malicious%20ClawHub%20Skills&amp;severity=medium&amp;id=69884ba0f9fa50a62f95d60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2140-buffer-overflow-in-tenda-tx9-09ab607e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2140%3A%20Buffer%20Overflow%20in%20Tenda%20TX9&amp;severity=high&amp;id=69883800f9fa50a62f7bac16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2139-buffer-overflow-in-tenda-tx9-9b5ff729</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2139%3A%20Buffer%20Overflow%20in%20Tenda%20TX9&amp;severity=high&amp;id=6988347bf9fa50a62f780bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2138-buffer-overflow-in-tenda-tx9-32011e56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2138%3A%20Buffer%20Overflow%20in%20Tenda%20TX9&amp;severity=high&amp;id=698829f0f9fa50a62f667bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2137-buffer-overflow-in-tenda-tx3-7163aefa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2137%3A%20Buffer%20Overflow%20in%20Tenda%20TX3&amp;severity=high&amp;id=6988266bf9fa50a62f64201d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2136-sql-injection-in-projectworlds-onlin-1e2048a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2136%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69881f64f9fa50a62f5cc98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2135-command-injection-in-utt-hiper-810-605fbaac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2135%3A%20Command%20Injection%20in%20UTT%20HiPER%20810&amp;severity=medium&amp;id=698814dbf9fa50a62f3465a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2134-sql-injection-in-phpgurukul-hospital-5501caae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2134%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=698814dbf9fa50a62f34659c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2133-unrestricted-upload-in-code-projects-09f955a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2133%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69880a4bf9fa50a62f2aa4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2132-sql-injection-in-code-projects-onlin-1e8dc808</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2132%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69880a4bf9fa50a62f2aa4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2131-os-command-injection-in-xixianliang--0930d004</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2131%3A%20OS%20Command%20Injection%20in%20XixianLiang%20HarmonyOS-mcp-server&amp;severity=medium&amp;id=6987fc3cf9fa50a62f1fd1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2130-command-injection-in-burtthecoder-mc-b01622ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2130%3A%20Command%20Injection%20in%20BurtTheCoder%20mcp-maigret&amp;severity=medium&amp;id=6987fc3cf9fa50a62f1fd1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2129-os-command-injection-in-d-link-dir-8-54513fc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2129%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6987ee2cf9fa50a62f16ff9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15100-cwe-269-improper-privilege-manageme-b92c305c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15100%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jayarsiech%20JAY%20Login%20%26%20Register&amp;severity=high&amp;id=6987ee2cf9fa50a62f16ff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15027-cwe-269-improper-privilege-manageme-d7a40bd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15027%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jayarsiech%20JAY%20Login%20%26%20Register&amp;severity=critical&amp;id=6987ee2cf9fa50a62f16ff95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2209-improper-authorization-in-wekan-2009476e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2209%3A%20Improper%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2208-missing-authorization-in-wekan-9d5fea75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2208%3A%20Missing%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2207-information-disclosure-in-wekan-88993d85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2207%3A%20Information%20Disclosure%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2206-improper-access-controls-in-wekan-b5810efa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2206%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2205-information-disclosure-in-wekan-4a689cb7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2205%3A%20Information%20Disclosure%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2122-sql-injection-in-xiaopi-panel-d0d38438</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2122%3A%20SQL%20Injection%20in%20Xiaopi%20Panel&amp;severity=medium&amp;id=6987e3a0f9fa50a62f01e2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2120-os-command-injection-in-d-link-dir-8-eb87b902</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2120%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6987e3a0f9fa50a62f01e2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2118-command-injection-in-utt-hiper-810-667d5923</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2118%3A%20Command%20Injection%20in%20UTT%20HiPER%20810&amp;severity=high&amp;id=69884451f9fa50a62f927d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-08-c1b2c1f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-08&amp;severity=medium&amp;id=698927194b57a58fa1dddc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-08-dd47ba85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-08&amp;severity=low&amp;id=69882636f9fa50a62f63e239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2117-sql-injection-in-itsourcecode-societ-33057233</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2117%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=69884451f9fa50a62f927dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2116-sql-injection-in-itsourcecode-societ-06a6e772</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2116%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=69884451f9fa50a62f927dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2115-sql-injection-in-itsourcecode-societ-16a1058e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2115%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=6987c078f9fa50a62fe1e268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2114-sql-injection-in-itsourcecode-societ-eb8b7956</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2114%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=6987b98bf9fa50a62fdbd7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25858-cwe-640-weak-password-recovery-mech-3ff06a38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25858%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20macrozheng%20mall&amp;severity=critical&amp;id=6987b5ecf9fa50a62fd2db09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25857-cwe-78-improper-neutralization-of-s-97d5f696</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25857%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Tenda%20G300-F&amp;severity=high&amp;id=6987b5ecf9fa50a62fd2db04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15564-divide-by-zero-in-mapnik-aacffcb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15564%3A%20Divide%20By%20Zero%20in%20Mapnik&amp;severity=medium&amp;id=6987b268f9fa50a62fcfb4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2113-deserialization-in-yuan1994-tpadmin-4e1abf95</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2113%3A%20Deserialization%20in%20yuan1994%20tpadmin&amp;severity=medium&amp;id=6987ab60f9fa50a62fbec76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2111-path-traversal-in-jeecgboot-bc98413a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2111%3A%20Path%20Traversal%20in%20JeecgBoot&amp;severity=medium&amp;id=6987a478f9fa50a62fad9688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2110-improper-restriction-of-excessive-au-b5bc8c2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2110%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Tasin1025%20SwiftBuy&amp;severity=medium&amp;id=69879d53f9fa50a62f9cb19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2109-improper-authorization-in-jsbroks-co-99c0d3fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2109%3A%20Improper%20Authorization%20in%20jsbroks%20COCO%20Annotator&amp;severity=medium&amp;id=69879649f9fa50a62f8fd9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2108-denial-of-service-in-jsbroks-coco-an-a3e76d97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2108%3A%20Denial%20of%20Service%20in%20jsbroks%20COCO%20Annotator&amp;severity=medium&amp;id=69878f40f9fa50a62f7c5181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2107-improper-authorization-in-yeqifu-war-66dc9ff5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2107%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=69878bc3f9fa50a62f720652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2106-improper-authorization-in-yeqifu-war-de67b0b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2106%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=69877a28f9fa50a62f44035c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2105-improper-authorization-in-yeqifu-war-65dc7481</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2105%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6987732cf9fa50a62f350edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2090-sql-injection-in-sourcecodester-onli-b2f3d215</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2090%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Class%20Record%20System&amp;severity=medium&amp;id=69875e09f9fa50a62f002962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2089-sql-injection-in-sourcecodester-onli-b9831b34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2089%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Class%20Record%20System&amp;severity=medium&amp;id=69875704f9fa50a62fe92680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2088-sql-injection-in-phpgurukul-beauty-p-a061ef90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2088%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=69874ff5f9fa50a62fd81230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2087-sql-injection-in-sourcecodester-onli-c23f40fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2087%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Class%20Record%20System&amp;severity=medium&amp;id=698748edf9fa50a62fcc96f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2086-buffer-overflow-in-utt-hiper-810g-43cb38da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2086%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=6987456bf9fa50a62fc698ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-urged-to-replace-discontinued-edge-d-94e482f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Urged%20to%20Replace%20Discontinued%20Edge%20Devices&amp;severity=medium&amp;id=69873aaaf9fa50a62fa478cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2085-command-injection-in-d-link-dwr-m921-034526b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2085%3A%20Command%20Injection%20in%20D-Link%20DWR-M921&amp;severity=high&amp;id=69872ccdf9fa50a62f8287cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2084-os-command-injection-in-d-link-dir-8-560ed943</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2084%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=698725c5f9fa50a62f79ed58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/german-agencies-warn-of-signal-phishing-targeting--ecb729e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=German%20Agencies%20Warn%20of%20Signal%20Phishing%20Targeting%20Politicians%2C%20Military%2C%20Journalists&amp;severity=high&amp;id=69884ba0f9fa50a62f95d611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2083-sql-injection-in-code-projects-socia-c32b6297</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2083%3A%20SQL%20Injection%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=698717b8f9fa50a62f57d826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2082-os-command-injection-in-d-link-dir-8-f5d76b84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2082%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=698710adf9fa50a62f4418a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2081-os-command-injection-in-d-link-dir-8-8c7532c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2081%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=69884451f9fa50a62f927de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2080-command-injection-in-utt-hiper-810-4880f054</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2080%3A%20Command%20Injection%20in%20UTT%20HiPER%20810&amp;severity=high&amp;id=6987029df9fa50a62f2ac5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2079-improper-authorization-in-yeqifu-war-a0d27384</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2079%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986fba7f9fa50a62f1d38e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15476-cwe-862-missing-authorization-in-si-3325d96d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15476%3A%20CWE-862%20Missing%20Authorization%20in%20simonfairbairn%20The%20Bucketlister&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15477-cwe-89-improper-neutralization-of-s-504a0a25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20simonfairbairn%20The%20Bucketlister&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1573-cwe-79-improper-neutralization-of-in-e20b42a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1573%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omi-mexico%20OMIGO&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1613-cwe-79-improper-neutralization-of-in-ed9446e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrlister1%20Wonka%20Slide&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1611-cwe-79-improper-neutralization-of-in-e9163cba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmrukkers%20Wikiloops%20Track%20Player&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1082-cwe-352-cross-site-request-forgery-c-1f5478bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1082%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arkapravamajumder%20TITLE%20ANIMATOR&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1608-cwe-79-improper-neutralization-of-in-0c54e4f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tigor4eg%20Video%20Onclick&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1634-cwe-79-improper-neutralization-of-in-6148d308</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1634%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexdtn%20Subitem%20AL%20Slider&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1675-cwe-1188-initialization-of-a-resourc-7aea86a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1675%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20brstefanovic%20Advanced%20Country%20Blocker&amp;severity=medium&amp;id=6986fba7f9fa50a62f1d38df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1643-cwe-79-improper-neutralization-of-in-0989d4a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ariagle%20MP-Ukagaka&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1570-cwe-79-improper-neutralization-of-in-7a811be0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1570%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dannycarlton%20Simple%20Bible%20Verse%20via%20Shortcode&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2078-improper-authorization-in-yeqifu-war-e88310cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2078%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986f48df9fa50a62f1325cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2077-improper-authorization-in-yeqifu-war-bf20ebb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2077%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986ed85f9fa50a62f0d9a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2076-improper-authorization-in-yeqifu-war-586b676f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2076%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986df75f9fa50a62ff9d900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15491-cwe-22-improper-limitation-of-a-pat-12c4fc96</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15491%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Post%20Slides&amp;severity=medium&amp;id=6986d86df9fa50a62ff27dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12159-cwe-79-improper-neutralization-of-i-4a178663</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12159%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13463-cwe-79-improper-neutralization-of-i-19c83847</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13463%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12803-cwe-80-improper-neutralization-of-s-f0081867</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12803%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15267-cwe-79-improper-neutralization-of-i-cbea20b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2075-improper-access-controls-in-yeqifu-w-62e8168e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2075%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986cde0f9fa50a62fe7f048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2074-xml-external-entity-reference-in-o2o-1cb33d44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2074%3A%20XML%20External%20Entity%20Reference%20in%20O2OA&amp;severity=medium&amp;id=6986f13ef9fa50a62f11d4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2073-sql-injection-in-itsourcecode-school-69180f85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2073%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=6986b8cbf9fa50a62fc21ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31990-cwe-770-allocation-of-resources-wit-e646bfe0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31990%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HCLSoftware%20HCL%20DevOps%20Velocity&amp;severity=medium&amp;id=6986b8c9f9fa50a62fc1f7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2071-buffer-overflow-in-utt-520w-3febf7b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2071%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69868e99f9fa50a62f47a432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-07-4537ec57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-07&amp;severity=medium&amp;id=6987d55af9fa50a62fea2824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-07-c4fc9685</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-07&amp;severity=low&amp;id=69870cf3f9fa50a62f3b7843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25804-cwe-287-improper-authentication-in--ae440bf0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25804%3A%20CWE-287%3A%20Improper%20Authentication%20in%20antrea-io%20antrea&amp;severity=high&amp;id=69867278f9fa50a62f39d4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25793-cwe-347-improper-verification-of-cr-74cda0bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25793%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20slackhq%20nebula&amp;severity=high&amp;id=69867278f9fa50a62f39d4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25803-cwe-798-use-of-hard-coded-credentia-52e7d009</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25803%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20denpiligrim%203dp-manager&amp;severity=critical&amp;id=69867278f9fa50a62f39d4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25762-cwe-400-uncontrolled-resource-consu-3125f3ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25762%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20adonisjs%20core&amp;severity=high&amp;id=69867278f9fa50a62f39d4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25754-cwe-1321-improperly-controlled-modi-c71bc36b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25754%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20adonisjs%20core&amp;severity=high&amp;id=69867278f9fa50a62f39d4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25644-cwe-295-improper-certificate-valida-a24dce7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25644%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20datahub-project%20datahub&amp;severity=high&amp;id=69867278f9fa50a62f39d4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2070-buffer-overflow-in-utt-520w-294d40cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2070%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69866ef5f9fa50a62f393798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25763-cwe-78-improper-neutralization-of-s-f2d1f8d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25763%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=698667edf9fa50a62f37ce33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25764-cwe-80-improper-neutralization-of-s-485b1a84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25764%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20opf%20openproject&amp;severity=low&amp;id=698667edf9fa50a62f37ce38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2069-stack-based-buffer-overflow-in-ggml--8180fc5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2069%3A%20Stack-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=medium&amp;id=698667edf9fa50a62f37ce3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1731-cwe-78-improper-neutralization-of-sp-066ed5de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1731%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BeyondTrust%20Remote%20Support(RS)%20%26%20Privileged%20Remote%20Access(PRA)&amp;severity=critical&amp;id=69866468f9fa50a62f36cd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1727-cwe-200-exposure-of-sensitive-inform-c82534e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1727%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Google%20Cloud%20Gemini%20Enterprise%20(formerly%20Agentspace)&amp;severity=critical&amp;id=69866468f9fa50a62f36cd1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25760-cwe-22-improper-limitation-of-a-pat-683be2f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25760%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69866468f9fa50a62f36cd1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2068-buffer-overflow-in-utt-520w-b92250f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2068%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69866468f9fa50a62f36cd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68621-cwe-208-observable-timing-discrepan-4a8d1703</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68621%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20TriliumNext%20Trilium&amp;severity=high&amp;id=6986f13ef9fa50a62f11d4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25123-cwe-918-server-side-request-forgery-de1289dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25123%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=6986f13ef9fa50a62f11d4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25533-cwe-835-loop-with-unreachable-exit--a378a04d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25533%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20agentfront%20enclave&amp;severity=medium&amp;id=6986f13ef9fa50a62f11d4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25516-cwe-79-improper-neutralization-of-i-42af5635</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25516%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69865d61f9fa50a62f35a6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25732-cwe-22-improper-limitation-of-a-pat-324d0834</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25732%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zauberzeug%20nicegui&amp;severity=high&amp;id=69865d61f9fa50a62f35a6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25544-cwe-89-improper-neutralization-of-s-972c134b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25544%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20payloadcms%20payload&amp;severity=critical&amp;id=69865d61f9fa50a62f35a6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25574-cwe-639-authorization-bypass-throug-7a20b4b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25574%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69865d61f9fa50a62f35a6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2067-buffer-overflow-in-utt-520w-0003a5fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2067%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=698659ddf9fa50a62f342a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25580-cwe-918-server-side-request-forgery-f5772752</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25580%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pydantic%20pydantic-ai&amp;severity=high&amp;id=698659ddf9fa50a62f342a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25581-cwe-79-improper-neutralization-of-i-0ce012fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25581%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samclarke%20SCEditor&amp;severity=medium&amp;id=698659ddf9fa50a62f342a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25592-cwe-22-improper-limitation-of-a-pat-e2f967bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25592%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20microsoft%20semantic-kernel&amp;severity=critical&amp;id=69865658f9fa50a62f32f7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25631-cwe-20-improper-input-validation-in-6b3e6e3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25631%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69865658f9fa50a62f32f7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2066-buffer-overflow-in-utt-520w-62586b70</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2066%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=698652d6f9fa50a62f31f1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25729-cwe-863-incorrect-authorization-in--cfcb0bb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25729%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20lintsinghua%20DeepAudit&amp;severity=low&amp;id=698652d6f9fa50a62f31f19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25632-cwe-502-deserialization-of-untruste-d8f5be65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25632%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20WaterFutures%20EPyT-Flow&amp;severity=critical&amp;id=698652d6f9fa50a62f31f193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25634-cwe-119-improper-restriction-of-ope-9d9256c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25634%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=698652d6f9fa50a62f31f198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25731-cwe-1336-improper-neutralization-of-7ae283af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25731%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69864f52f9fa50a62f30f2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25635-cwe-22-improper-limitation-of-a-pat-59dcea01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25635%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69864f52f9fa50a62f30f2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25636-cwe-22-improper-limitation-of-a-pat-e3fddcc9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25636%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69864f52f9fa50a62f30f2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2065-missing-authentication-in-flycatcher-167e45e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2065%3A%20Missing%20Authentication%20in%20Flycatcher%20Toys%20smART%20Pixelator&amp;severity=medium&amp;id=69864bcdf9fa50a62f2f48aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25640-cwe-22-improper-limitation-of-a-pat-d35b43b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25640%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pydantic%20pydantic-ai&amp;severity=high&amp;id=69864bcdf9fa50a62f2f48a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25586-cwe-74-improper-neutralization-of-s-3231fe20</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25586%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e0357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25520-cwe-74-improper-neutralization-of-s-02efb643</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25520%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e0353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25587-cwe-94-improper-control-of-generati-62d69156</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25587%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25641-cwe-367-time-of-check-time-of-use-t-bbaa079a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25641%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e035f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2064-cross-site-scripting-in-portabilis-i-c65cf604</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2064%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=698644c6f9fa50a62f2bebfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25727-cwe-121-stack-based-buffer-overflow-3730143c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25727%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20time-rs%20time&amp;severity=medium&amp;id=69864142f9fa50a62f2a749a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15320-multiple-binds-to-the-same-port-in--556db5fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15320%3A%20Multiple%20Binds%20to%20the%20Same%20Port%20in%20Tanium%20Tanium%20Client&amp;severity=low&amp;id=69864142f9fa50a62f2a748b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25643-cwe-78-improper-neutralization-of-s-d503d67d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25643%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20blakeblackshear%20frigate&amp;severity=critical&amp;id=69864142f9fa50a62f2a7496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1709-key-exchange-without-entity-authenti-a891ad25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1709%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=critical&amp;id=69864142f9fa50a62f2a748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25751-cwe-306-missing-authentication-for--0cffd6e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25751%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=69863dc0f9fa50a62f29294f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25752-cwe-862-missing-authorization-in-fr-8a87669a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25752%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=69863dc0f9fa50a62f292953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25647-cwe-79-improper-neutralization-of-i-e4e851f1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25647%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69863dc0f9fa50a62f292942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2063-os-command-injection-in-d-link-dir-8-a774c187</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2063%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=69863dc0f9fa50a62f29295a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25753-cwe-259-use-of-hard-coded-password--a874149c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25753%3A%20CWE-259%3A%20Use%20of%20Hard-coded%20Password%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=69863dc0f9fa50a62f292957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25650-cwe-200-exposure-of-sensitive-infor-ff59f3f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25650%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20smn2gnt%20MCP-Salesforce&amp;severity=medium&amp;id=69863dc0f9fa50a62f292946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25651-cwe-601-url-redirection-to-untruste-9fd151ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25651%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20tgies%20client-certificate-auth&amp;severity=medium&amp;id=69863dc0f9fa50a62f29294b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2062-null-pointer-dereference-in-open5gs-d8fae311</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2062%3A%20NULL%20Pointer%20Dereference%20in%20Open5GS&amp;severity=medium&amp;id=69863a39f9fa50a62f278f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23989-cwe-863-incorrect-authorization-in--a5bf8855</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23989%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opencloud-eu%20reva&amp;severity=high&amp;id=69863a39f9fa50a62f278f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69212-cwe-78-improper-neutralization-of-s-157548d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69212%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=critical&amp;id=69863332f9fa50a62f26379e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69214-cwe-89-improper-neutralization-of-s-8f7e3535</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69214%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69216-cwe-89-improper-neutralization-of-s-8ea4f4d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69216%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24416-cwe-89-improper-neutralization-of-s-67aa0e3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24416%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24417-cwe-89-improper-neutralization-of-s-241acae0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24417%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24418-cwe-89-improper-neutralization-of-s-c07ba405</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24418%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24419-cwe-89-improper-neutralization-of-s-7399c992</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24419%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69862fadf9fa50a62f2569ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2061-os-command-injection-in-d-link-dir-8-6024a112</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2061%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=69862fadf9fa50a62f2569be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24776-cwe-639-authorization-bypass-throug-2b34271e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24776%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20opf%20openproject&amp;severity=medium&amp;id=69862fadf9fa50a62f2569ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25725-cwe-501-trust-boundary-violation-in-2fdc4d3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25725%3A%20CWE-501%3A%20Trust%20Boundary%20Violation%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69862fadf9fa50a62f2569bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25724-cwe-61-unix-symbolic-link-symlink-f-23f60526</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25724%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20anthropics%20claude-code&amp;severity=low&amp;id=69862fadf9fa50a62f2569b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25723-cwe-20-improper-input-validation-in-9f234855</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25723%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69862fadf9fa50a62f2569b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25722-cwe-20-improper-input-validation-in-cc4c5e6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25722%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69862fadf9fa50a62f2569b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24903-cwe-79-improper-neutralization-of-i-4bd86924</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24903%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AlgoNetLab%20OrcaStatLLM-Researcher&amp;severity=medium&amp;id=69862c29f9fa50a62f24b16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2060-sql-injection-in-code-projects-simpl-e2b121ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2060%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Blood%20Donor%20Management%20System&amp;severity=medium&amp;id=69862c29f9fa50a62f24b172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1769-cwe-79-improper-neutralization-of-in-28d7e798</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xerox%20CentreWare&amp;severity=medium&amp;id=698628a5f9fa50a62f2311af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2059-sql-injection-in-sourcecodester-medi-b6c6ea64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2059%3A%20SQL%20Injection%20in%20SourceCodester%20Medical%20Center%20Portal%20Management%20System&amp;severity=medium&amp;id=6986219df9fa50a62f204ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2058-sql-injection-in-mathurvishal-cloudc-cd0c1b86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2058%3A%20SQL%20Injection%20in%20mathurvishal%20CloudClassroom-PHP-Project&amp;severity=medium&amp;id=69861a9bf9fa50a62f1c9098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2103-cwe-321-in-infor-syteline-erp-b46bd226</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2103%3A%20CWE-321%20in%20Infor%20SyteLine%20ERP&amp;severity=high&amp;id=69861a9bf9fa50a62f1c909f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25556-cwe-415-double-free-in-artifex-soft-dcf4f997</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25556%3A%20CWE-415%20Double%20Free%20in%20Artifex%20Software%20MuPDF&amp;severity=medium&amp;id=69861711f9fa50a62f1b4d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13523-cwe-79-improper-neutralization-of-i-f8a6390e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13523%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=69861a9bf9fa50a62f1c90a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2057-sql-injection-in-sourcecodester-medi-4c938f79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2057%3A%20SQL%20Injection%20in%20SourceCodester%20Medical%20Center%20Portal%20Management%20System&amp;severity=medium&amp;id=69860c85f9fa50a62f179c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-dknife-aitm-framework-targets-routers-d9cd4734</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20DKnife%20AitM%20Framework%20Targets%20Routers%20for%20Traffic%20Hijacking%2C%20Malware%20Delivery&amp;severity=medium&amp;id=6986fa66f9fa50a62f1ad180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2056-information-disclosure-in-d-link-dir-00e936e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2056%3A%20Information%20Disclosure%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=6985f76df9fa50a62f0e885b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-orders-removal-of-unsupported-edge-devices-to-2a1f9a00</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Orders%20Removal%20of%20Unsupported%20Edge%20Devices%20to%20Reduce%20Federal%20Network%20Risk&amp;severity=medium&amp;id=6986fa66f9fa50a62f1ad183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13818-cwe-367-time-of-check-time-of-use-t-6c7110b9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13818%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ESET%20spol%20s.r.o.%20ESET%20Management%20Agent&amp;severity=high&amp;id=6985f065f9fa50a62f0bfdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1337-cwe-117-improper-output-neutralizati-6f7d504c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1337%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=6985f065f9fa50a62f0bfdca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2055-information-disclosure-in-d-link-dir-28ce1991</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2055%3A%20Information%20Disclosure%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=6985e95cf9fa50a62f09632e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2054-information-disclosure-in-d-link-dir-88a5a513</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2054%3A%20Information%20Disclosure%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=6985e254f9fa50a62f069c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asian-state-backed-group-tgr-sta-1030-breaches-70--3a49f48b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asian%20State-Backed%20Group%20TGR-STA-1030%20Breaches%2070%20Government%2C%20Infrastructure%20Entities&amp;severity=critical&amp;id=6986fa66f9fa50a62f1ad186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2018-sql-injection-in-itsourcecode-school-8f784e6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2018%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=6985ded1f9fa50a62f04f209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flickr-security-incident-tied-to-third-party-email-c41dc4c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flickr%20Security%20Incident%20Tied%20to%20Third-Party%20Email%20System&amp;severity=medium&amp;id=6985db1df9fa50a62f039236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/living-off-the-ai-the-next-evolution-of-attacker-t-8c48b37d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Living%20off%20the%20AI%3A%20The%20Next%20Evolution%20of%20Attacker%20Tradecraft&amp;severity=medium&amp;id=6985db1df9fa50a62f039239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-record-ddos-epsteins-hacker-eset-pro-e53f8d51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Record%20DDoS%2C%20Epstein%E2%80%99s%20Hacker%2C%20ESET%20Product%20Vulnerabilities&amp;severity=medium&amp;id=6985c986f9fa50a62ffbec3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-yourself-from-deepfake-scammers-and-0d63323e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20yourself%20from%20deepfake%20scammers%20and%20save%20your%20money%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6985d481f9fa50a62f005b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2017-stack-based-buffer-overflow-in-ip-co-6f3eb53a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2017%3A%20Stack-based%20Buffer%20Overflow%20in%20IP-COM%20W30AP&amp;severity=critical&amp;id=6985d445f9fa50a62f00465c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1293-cwe-79-improper-neutralization-of-in-ca10b6b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1293%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoast%20Yoast%20SEO%20%E2%80%93%20Advanced%20SEO%20with%20real-time%20guidance%20and%20built-in%20AI&amp;severity=medium&amp;id=6985d445f9fa50a62f004656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2016-stack-based-buffer-overflow-in-happy-f72e311c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2016%3A%20Stack-based%20Buffer%20Overflow%20in%20happyfish100%20libfastcommon&amp;severity=medium&amp;id=6985d0c1f9fa50a62ffef782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2015-improper-authorization-in-portabilis-61cc936b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2015%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=6985c646f9fa50a62ffa8bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-samsung-knox-helps-stop-your-network-security--916665d3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Samsung%20Knox%20Helps%20Stop%20Your%20Network%20Security%20Breach&amp;severity=medium&amp;id=6985c600f9fa50a62ffa4773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2014-sql-injection-in-itsourcecode-studen-b8b04a23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2014%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985bf2df9fa50a62ff79b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2013-sql-injection-in-itsourcecode-studen-96f5b5b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2013%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985b828f9fa50a62ff43b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24928-cwe-680-integer-overflow-to-buffer--cedc569c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24928%3A%20CWE-680%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24927-cwe-416-use-after-free-in-huawei-ha-d41614a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24927%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24924-cwe-264-permissions-privileges-and--d7ebb004</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24924%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24920-cwe-264-permissions-privileges-and--95c935c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24920%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2012-sql-injection-in-itsourcecode-studen-85504d22</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2012%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24919-cwe-787-out-of-bounds-write-in-huaw-c1f5ecf7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24919%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24917-cwe-416-use-after-free-in-huawei-ha-c6b3a27c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24917%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dknife-implant-used-by-chinese-threat-actor-for-ad-85eb9b68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98DKnife%E2%80%99%20Implant%20Used%20by%20Chinese%20Threat%20Actor%20for%20Adversary-in-the-Middle%20Attacks&amp;severity=medium&amp;id=6985ac17f9fa50a62feef9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24916-cwe-200-exposure-of-sensitive-infor-5d1aff9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24916%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24931-cwe-264-permissions-privileges-and--51f9960f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24931%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24930-cwe-362-concurrent-execution-using--1df2f85f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24930%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6985aa18f9fa50a62fee14da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24929-cwe-476-null-pointer-dereference-in-b2f28f2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24929%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee14a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-dydx-npm-and-pypi-packages-deliver-wal-b48b6b06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20dYdX%20npm%20and%20PyPI%20Packages%20Deliver%20Wallet%20Stealers%20and%20RAT%20Malware&amp;severity=critical&amp;id=6986fa66f9fa50a62f1ad189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24923-cwe-264-permissions-privileges-and--bd9abb0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24923%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee14a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24922-cwe-122-heap-based-buffer-overflow--81258aa2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24922%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee149e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2011-sql-injection-in-itsourcecode-studen-12ce78e4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2011%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985aa18f9fa50a62fee14de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24921-cwe-125-out-of-bounds-read-in-huawe-35a79110</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24921%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24918-cwe-476-null-pointer-dereference-in-e8be9952</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24918%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24915-cwe-125-out-of-bounds-read-in-huawe-944f6a8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24915%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee148d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24914-cwe-416-use-after-free-in-huawei-ha-f2761965</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24914%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1252-cwe-79-improper-neutralization-of-in-58f0ff5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1252%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Events%20Listing%20Widget&amp;severity=medium&amp;id=6985aa16f9fa50a62fee146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1785-cwe-352-cross-site-request-forgery-c-8f414448</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1785%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codesnippetspro%20Code%20Snippets&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1499-cwe-862-missing-authorization-in-rev-14b5cd1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1499%3A%20CWE-862%20Missing%20Authorization%20in%20revmakx%20WP%20Duplicate%20%E2%80%93%20WordPress%20Migration%20Plugin&amp;severity=high&amp;id=6985aa16f9fa50a62fee1475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21643-execute-unauthorized-code-or-comman-8dd9adbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21643%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=critical&amp;id=6985a694f9fa50a62fec94b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24926-cwe-787-out-of-bounds-write-in-huaw-9b1e0a43</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24926%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6985a694f9fa50a62fec94b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24925-cwe-122-heap-based-buffer-overflow--c04eedde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24925%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6985a694f9fa50a62fec94b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2010-improper-authorization-in-sanluan-pu-cb9ffd81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2010%3A%20Improper%20Authorization%20in%20Sanluan%20PublicCMS&amp;severity=low&amp;id=6985a30df9fa50a62feb0263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-smartermail-vulnerability-exploited-in-ra-79702390</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20SmarterMail%20Vulnerability%20Exploited%20in%20Ransomware%20Attacks&amp;severity=critical&amp;id=69859f56f9fa50a62fe96c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21626-cwe-200-exposure-of-sensitive-infor-9420fb85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21626%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=critical&amp;id=69859f99f9fa50a62fe9b84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2009-improper-access-controls-in-sourceco-e91a29fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2009%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Gas%20Agency%20Management%20System&amp;severity=medium&amp;id=69859c04f9fa50a62fe7fff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1279-cwe-79-improper-neutralization-of-in-63248df4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1279%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberlord92%20Employee%20Directory%20%E2%80%93%20Staff%20Directory%20and%20Listing&amp;severity=medium&amp;id=69859c04f9fa50a62fe7fff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2008-code-injection-in-abhiphile-fermat-m-bc737cbc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2008%3A%20Code%20Injection%20in%20abhiphile%20fermat-mcp&amp;severity=medium&amp;id=698594fdf9fa50a62fe4ff60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1401-cwe-79-improper-neutralization-of-in-0602bdf2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1401%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Tune%20Library&amp;severity=medium&amp;id=69859179f9fa50a62fe3ac95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1909-cwe-79-improper-neutralization-of-in-60807293</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1909%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20x-raym%20WaveSurfer-WP&amp;severity=medium&amp;id=69859179f9fa50a62fe3aca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10753-cwe-862-missing-authorization-in-cy-1fb1bc43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10753%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20OAuth%20Single%20Sign%20On%20%E2%80%93%20SSO%20(OAuth%20Client)&amp;severity=medium&amp;id=69859179f9fa50a62fe3ac90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1808-cwe-79-improper-neutralization-of-in-4758efaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ravanh%20Orange%20Comfort%2B%20accessibility%20toolbar%20for%20WordPress&amp;severity=medium&amp;id=69859179f9fa50a62fe3ac9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1888-cwe-79-improper-neutralization-of-in-c37efb99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20Docus%20%E2%80%93%20YouTube%20Video%20Playlist&amp;severity=medium&amp;id=69859179f9fa50a62fe3aca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2000-command-injection-in-dcn-dcme-320-dd565023</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2000%3A%20Command%20Injection%20in%20DCN%20DCME-320&amp;severity=medium&amp;id=69859179f9fa50a62fe3acae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0521-cwe-79-improper-neutralization-of-in-78e4886a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TYDAC%20AG%20MAP%2B&amp;severity=medium&amp;id=69858a71f9fa50a62fe12635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1998-memory-corruption-in-micropython-de7944de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1998%3A%20Memory%20Corruption%20in%20micropython&amp;severity=medium&amp;id=69858a71f9fa50a62fe12639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-opus-46-finds-500-high-severity-flaws-acros-a52ee154</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Opus%204.6%20Finds%20500%2B%20High-Severity%20Flaws%20Across%20Major%20Open-Source%20Libraries&amp;severity=high&amp;id=6985ab7ef9fa50a62feebb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0598-unverified-ownership-in-red-hat-red--f43d1151</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0598%3A%20Unverified%20Ownership%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=698586ecf9fa50a62fdfc3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1991-null-pointer-dereference-in-libuvc-69eef9e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1991%3A%20NULL%20Pointer%20Dereference%20in%20libuvc&amp;severity=medium&amp;id=69857fe4f9fa50a62fdb49fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/questions-raised-over-cisas-silent-ransomware-upda-58d91f96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Concerns%20Raised%20Over%20CISA%E2%80%99s%20Silent%20Ransomware%20Updates%20in%20KEV%20Catalog&amp;severity=medium&amp;id=69857c2ef9fa50a62fd7fa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1990-null-pointer-dereference-in-oatpp-d9a99a9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1990%3A%20NULL%20Pointer%20Dereference%20in%20oatpp&amp;severity=medium&amp;id=698578ddf9fa50a62fd6124f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1979-use-after-free-in-mruby-8dcbc7ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1979%3A%20Use%20After%20Free%20in%20mruby&amp;severity=medium&amp;id=698571d4f9fa50a62fd2f1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1978-direct-request-in-kalyan02-nanocms-1f2f6f1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1978%3A%20Direct%20Request%20in%20kalyan02%20NanoCMS&amp;severity=medium&amp;id=698571d4f9fa50a62fd2f1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1977-code-injection-in-isaacwasserman-mcp-e165d2f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1977%3A%20Code%20Injection%20in%20isaacwasserman%20mcp-vegalite-server&amp;severity=medium&amp;id=69856acdf9fa50a62fd0a378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15566-cwe-20-improper-input-validation-in-13d5f4d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15566%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69856acdf9fa50a62fd0a375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1976-null-pointer-dereference-in-free5gc-f38e3daa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1976%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC&amp;severity=medium&amp;id=69855cbcf9fa50a62fab62bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1975-null-pointer-dereference-in-free5gc-55cfdd29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1975%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC&amp;severity=medium&amp;id=69855cbcf9fa50a62fab62b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1228-cwe-639-authorization-bypass-through-8f359c4d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1228%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bplugins%20Timeline%20Block%20%E2%80%93%20Beautiful%20Timeline%20Builder%20for%20WordPress%20(Vertical%20%26%20Horizontal%20Timelines)&amp;severity=medium&amp;id=69855cbcf9fa50a62fab62af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1974-denial-of-service-in-free5gc-b15fdc8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1974%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69854eadf9fa50a62f861452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1973-null-pointer-dereference-in-free5gc-f3729069</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1973%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC&amp;severity=medium&amp;id=69854eadf9fa50a62f861449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1972-use-of-default-credentials-in-edimax-9d49fcd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1972%3A%20Use%20of%20Default%20Credentials%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=69854420f9fa50a62f6d5e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1971-cross-site-scripting-in-edimax-br-62-8f3ccaeb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1971%3A%20Cross%20Site%20Scripting%20in%20Edimax%20BR-6288ACL&amp;severity=medium&amp;id=69853611f9fa50a62f554b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-06-662f18a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-06&amp;severity=medium&amp;id=698683d6f9fa50a62f3de56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70963-na-736a7259</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70963%3A%20n%2Fa&amp;severity=high&amp;id=69862c29f9fa50a62f24b16c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-06-c30c479b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-06&amp;severity=low&amp;id=6985f02ff9fa50a62f0bc28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23623-cwe-285-improper-authorization-in-c-6b31744d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23623%3A%20CWE-285%3A%20Improper%20Authorization%20in%20CollaboraOnline%20online&amp;severity=medium&amp;id=69852b85f9fa50a62f4b244c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32393-cwe-770-allocation-of-resources-wit-1d72a91f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32393%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=6985247ef9fa50a62f494945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0391-cwe-451-user-interface-ui-misreprese-94d23b62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0391%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=698519f1f9fa50a62f46352c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24300-cwe-284-improper-access-control-in--cef48617</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24300%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Front%20Door&amp;severity=critical&amp;id=698519f1f9fa50a62f463532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21532-cwe-200-exposure-of-sensitive-infor-3d224926</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21532%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Functions&amp;severity=high&amp;id=698519f1f9fa50a62f46352f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24302-cwe-284-improper-access-control-in--330d1a07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24302%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20ARC&amp;severity=high&amp;id=698519f1f9fa50a62f463535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1970-open-redirect-in-edimax-br-6258n-0817e1aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1970%3A%20Open%20Redirect%20in%20Edimax%20BR-6258n&amp;severity=medium&amp;id=6985166df9fa50a62f44dae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1964-improper-access-controls-in-wekan-2d192d3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1964%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=69850f65f9fa50a62f416c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25815-cwe-1394-use-of-default-cryptograph-6fea7ca2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25815%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=69850be1f9fa50a62f3fbedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1963-improper-access-controls-in-wekan-fe2f298c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1963%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6985085df9fa50a62f3df52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1962-improper-access-controls-in-wekan-c2fef78b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1962%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=69850155f9fa50a62f38ceec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0106-elevation-of-privilege-in-google-and-6d6e3412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0106%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=6984fdd1f9fa50a62f37f349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/knife-cutting-the-edge-disclosing-a-china-nexus-ga-66cd80c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Knife%20Cutting%20the%20Edge%3A%20Disclosing%20a%20China-nexus%20gateway-monitoring%20AitM%20framework&amp;severity=medium&amp;id=69850155f9fa50a62f38cca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-marco-stealer-93f02107</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20Marco%20Stealer&amp;severity=medium&amp;id=698504d9f9fa50a62f3b1692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12131-cwe-20-improper-input-validation-in-0987bcd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12131%3A%20CWE-20%20Improper%20Input%20Validation%20in%20silabs.com%20Simplicity%20SDK&amp;severity=medium&amp;id=6984fa4df9fa50a62f36955a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-clickfix-variant-crashfix-deploying-python-rem-f058ad59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Clickfix%20variant%20&apos;CrashFix&apos;%20deploying%20Python%20Remote%20Access%20Trojan&amp;severity=medium&amp;id=698504d9f9fa50a62f3b1681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1301-cwe-787-out-of-bounds-write-in-o6-au-879560eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1301%3A%20CWE-787%20Out-of-bounds%20Write%20in%20o6%20Automation%20GmbH%20Open62541&amp;severity=medium&amp;id=6984ec3ef9fa50a62f33cd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15311-improper-neutralization-of-escape-m-edc8b66a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15311%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Tanium%20Tanium%20Appliance&amp;severity=high&amp;id=69859ff5f9fa50a62fe9e7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15312-improper-encoding-or-escaping-of-ou-51c043ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15312%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Tanium%20Tanium%20Appliance&amp;severity=medium&amp;id=69859ff5f9fa50a62fe9e7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15324-improper-link-resolution-before-fil-8f546f57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15324%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Engage&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15325-improper-neutralization-of-special--d3b59607</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15325%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tanium%20Discover&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15326-missing-authorization-in-tanium-pat-414d9d45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15326%3A%20Missing%20Authorization%20in%20Tanium%20Patch&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15327-missing-authorization-in-tanium-dep-e25b6408</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15327%3A%20Missing%20Authorization%20in%20Tanium%20Deploy&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15328-improper-link-resolution-before-fil-fed71ada</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15328%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Enforce&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15330-missing-authorization-in-tanium-dep-f1311ee9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15330%3A%20Missing%20Authorization%20in%20Tanium%20Deploy&amp;severity=high&amp;id=69859ff7f9fa50a62fe9e81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15331-incomplete-cleanup-in-tanium-connec-a0456176</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15331%3A%20Incomplete%20Cleanup%20in%20Tanium%20Connect&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15329-insertion-of-sensitive-information--a9ee4527</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15329%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15332-insertion-of-sensitive-information--9ebb3c07</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15332%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15321-untrusted-search-path-in-tanium-tan-778dfdad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15321%3A%20Untrusted%20Search%20Path%20in%20Tanium%20Tanium%20Appliance&amp;severity=low&amp;id=69859ff5f9fa50a62fe9e7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15333-incorrect-default-permissions-in-ta-8213b994</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15333%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15334-incorrect-default-permissions-in-ta-8e0ea7cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15334%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15335-incorrect-default-permissions-in-ta-55fe72a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15335%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15341-incorrect-default-permissions-in-ta-c307931a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15341%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Benchmark&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15339-incorrect-default-permissions-in-ta-ed061b0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15339%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Discover&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15340-incorrect-default-permissions-in-ta-53caca46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15340%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Comply&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15338-incorrect-default-permissions-in-ta-35644461</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15338%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Partner%20Integration&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15336-incorrect-default-permissions-in-ta-f7cef522</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15336%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Performance&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15337-incorrect-default-permissions-in-ta-7727e3bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15337%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Patch&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15342-incorrect-authorization-in-tanium-r-0a706410</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15342%3A%20Incorrect%20Authorization%20in%20Tanium%20Reputation&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15323-improper-certificate-validation-in--7af141c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15323%3A%20Improper%20Certificate%20Validation%20in%20Tanium%20Tanium%20Appliance&amp;severity=low&amp;id=69859ff5f9fa50a62fe9e7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15343-incorrect-default-permissions-in-ta-7bf47121</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15343%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Enforce&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15289-missing-authorization-in-tanium-int-9de1c362</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15289%3A%20Missing%20Authorization%20in%20Tanium%20Interact&amp;severity=low&amp;id=69859ff5f9fa50a62fe9e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58190-cwe-835-loop-with-unreachable-exit--10f3d197</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58190%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhtml&amp;severity=medium&amp;id=6984daa9f9fa50a62f30a64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47911-cwe-400-uncontrolled-resource-consu-5f96479a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47911%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhtml&amp;severity=medium&amp;id=6984daa9f9fa50a62f30a649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68121-cwe-295-improper-certificate-valida-798631b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68121%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=high&amp;id=6984daa9f9fa50a62f30a655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15557-cwe-295-improper-certificate-valida-281f9df0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15557%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20H100%20v1&amp;severity=high&amp;id=6984daa9f9fa50a62f30a642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1707-vulnerability-in-pgadminorg-pgadmin--2ba0871a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1707%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=6984daa9f9fa50a62f30a65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisurukimwolf-botnet-launches-record-setting-314-t-1f31ee95</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AISURU%2FKimwolf%20Botnet%20Launches%20Record-Setting%2031.4%20Tbps%20DDoS%20Attack&amp;severity=medium&amp;id=6985ab7ef9fa50a62feebb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15551-cwe-95-improper-neutralization-of-d-7e26fcea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15551%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20MR200%20v5.2&amp;severity=medium&amp;id=69850155f9fa50a62f38cef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0715-cwe-522-insufficiently-protected-cre-a4864c39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0715%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Moxa%20UC-1200A%20Series&amp;severity=high&amp;id=6984d01df9fa50a62f2f1648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0714-cwe-319-cleartext-transmission-of-se-2a690fab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0714%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Moxa%20UC-1200A%20Series&amp;severity=high&amp;id=6984d01df9fa50a62f2f1645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/siem-rules-for-detecting-exploitation-of-vulnerabi-6ead71e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIEM%20Rules%20for%20detecting%20exploitation%20of%20vulnerabilities%20in%20FortiCloud%20SSO&amp;severity=medium&amp;id=6984bec7f9fa50a62f2b18a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/substack-discloses-security-incident-after-hacker--8fa2c08d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Substack%20Discloses%20Security%20Incident%20After%20Hacker%20Leaks%20Data&amp;severity=medium&amp;id=6984b3caf9fa50a62f28d1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14150-cwe-497-exposure-of-sensitive-syste-e1ebc8d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14150%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20webMethods%20Integration%20(on%20prem)%20-%20Integration%20Server&amp;severity=medium&amp;id=6984a5fef9fa50a62f25cb61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-network-of-150-cloned-law-firm--46ad764a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20Network%20of%20150%20Cloned%20Law%20Firm%20Websites%20in%20AI-Powered%20Scam%20Campaign&amp;severity=medium&amp;id=6984a5baf9fa50a62f25b16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13491-cwe-426-untrusted-search-path-in-ib-3dfcb3be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13491%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20IBM%20App%20Connect%20Enterprise%20Certified%20Container&amp;severity=medium&amp;id=6984a5fef9fa50a62f25cb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vs-code-configs-expose-github-codespaces-to-attack-1a4b3777</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VS%20Code%20Configs%20Expose%20GitHub%20Codespaces%20to%20Attacks&amp;severity=medium&amp;id=69849eb2f9fa50a62f23904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13379-cwe-89-improper-neutralization-of-s-12712165</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13379%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Aspera%20Console&amp;severity=high&amp;id=69849ef7f9fa50a62f23a791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1927-cwe-862-missing-authorization-in-wps-78170b4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1927%3A%20CWE-862%20Missing%20Authorization%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69849ef7f9fa50a62f23a797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1523-cwe-22-improper-limitation-of-a-path-7d7ad643</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1523%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PRIMION%20DIGITEK%20Digitek%20ADT1100&amp;severity=high&amp;id=69849ef7f9fa50a62f23a794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-codespaces-rce-asyncrat-c2-byo-685fa61c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Codespaces%20RCE%2C%20AsyncRAT%20C2%2C%20BYOVD%20Abuse%2C%20AI%20Cloud%20Intrusions%20%26%2015%2B%20Stories&amp;severity=low&amp;id=6985ab7ef9fa50a62feebb45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italy-averted-russian-linked-cyberattacks-targetin-10aca99a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italy%20Averted%20Russian-Linked%20Cyberattacks%20Targeting%20Winter%20Olympics%20Websites%2C%20Foreign%20Minister%20Says&amp;severity=medium&amp;id=698490a2f9fa50a62f2021f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/systembc-infects-10000-devices-after-defying-law-e-c29c0853</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SystemBC%20Infects%2010%2C000%20Devices%20After%20Defying%20Law%20Enforcement%20Takedown&amp;severity=medium&amp;id=69848d1ef9fa50a62f1f7106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1517-sql-injection-in-iomad-e7db11b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1517%3A%20SQL%20Injection%20in%20iomad&amp;severity=medium&amp;id=698489cef9fa50a62f1eaebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23572-cwe-863-incorrect-authorization-in--f5067c5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23572%3A%20CWE-863%20Incorrect%20Authorization%20in%20TeamViewer%20Remote&amp;severity=high&amp;id=69848649f9fa50a62f1d4e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1966-cwe-522-insufficiently-protected-cre-7d986d08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1966%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20YugabyteDB%20Inc%20YugabyteDB%20Anywhere&amp;severity=low&amp;id=69848649f9fa50a62f1d4e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-buyers-guide-to-ai-usage-control-76920303</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Buyer%E2%80%99s%20Guide%20to%20AI%20Usage%20Control&amp;severity=low&amp;id=6984828ff9fa50a62f1c6281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-sandbox-escape-could-lead-to-server-c-739fc28e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20N8n%20Sandbox%20Escape%20Could%20Lead%20to%20Server%20Compromise&amp;severity=critical&amp;id=69847f0ef9fa50a62f1b982d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23796-cwe-384-session-fixation-in-opensol-5a040fac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23796%3A%20CWE-384%20Session%20Fixation%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=69847f53f9fa50a62f1bc7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23797-cwe-256-plaintext-storage-of-a-pass-797f620f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23797%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=69847f53f9fa50a62f1bc7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberspy-group-hacked-governments-and-critical-inf-ddda7236</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberspy%20Group%20Hacked%20Governments%20and%20Critical%20Infrastructure%20in%2037%20Countries&amp;severity=critical&amp;id=69847b8af9fa50a62f1a5253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infy-hackers-resume-operations-with-new-c2-servers-f9e8ec27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infy%20Hackers%20Resume%20Operations%20with%20New%20C2%20Servers%20After%20Iran%20Internet%20Blackout%20Ends&amp;severity=medium&amp;id=6985ab7ef9fa50a62feebb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-f5-patch-high-severity-vulnerabilities-fcc1c1e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%2C%20F5%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=698469f7f9fa50a62f161065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1654-cwe-79-improper-neutralization-of-in-8981f875</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1654%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pkthree%20Peter%E2%80%99s%20Date%20Countdown&amp;severity=medium&amp;id=69846323f9fa50a62f145d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1294-cwe-918-server-side-request-forgery--60483ee7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1294%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20All%20In%20One%20Image%20Viewer%20Block%20%E2%80%93%20Gutenberg%20block%20to%20create%20image%20viewer%20with%20hyperlink&amp;severity=high&amp;id=69846323f9fa50a62f145d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1271-cwe-639-authorization-bypass-through-4771f187</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1271%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69846323f9fa50a62f145d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14079-cwe-862-missing-authorization-in-el-9c52dc68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14079%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=69846323f9fa50a62f145d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broken-phishing-urls-thu-feb-5th-91a9e90a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broken%20Phishing%20URLs%2C%20(Thu%2C%20Feb%205th)&amp;severity=medium&amp;id=69845f80f9fa50a62f1386ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13416-cwe-862-missing-authorization-in-me-210f4d44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13416%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69845894f9fa50a62f0ebbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1319-cwe-79-improper-neutralization-of-in-fa48ce32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Robin%20Image%20Optimizer%20%E2%80%93%20Unlimited%20Image%20Optimization%20%26%20WebP%20Converter&amp;severity=medium&amp;id=69845894f9fa50a62f0ebbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-script-delivering-more-maliciousness-wed-c446b82d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Script%20Delivering%20More%20Maliciousness%2C%20(Wed%2C%20Feb%204th)&amp;severity=medium&amp;id=69831349f9fa50a62f7d42ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10258-vulnerability-in-nokia-infinera-dna-360ae349</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10258%3A%20Vulnerability%20in%20Nokia%20Infinera%20DNA&amp;severity=medium&amp;id=69844701f9fa50a62f0a303c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1268-cwe-79-improper-neutralization-of-in-5304465d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20Dynamic%20Widget%20Content&amp;severity=medium&amp;id=69843ff8f9fa50a62f08b1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0867-cwe-79-improper-neutralization-of-in-840f2989</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchthemes%20Essential%20Widgets&amp;severity=medium&amp;id=69843ff8f9fa50a62f08b1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1246-cwe-22-improper-limitation-of-a-path-526d43a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1246%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20shortpixel%20ShortPixel%20Image%20Optimizer%20%E2%80%93%20Optimize%20Images%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=69843ff8f9fa50a62f08b1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-flaw-cve-2026-25049-enables-system-co-cf711cd3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Flaw%20CVE-2026-25049%20Enables%20System%20Command%20Execution%20via%20Malicious%20Workflows&amp;severity=critical&amp;id=698438bcf9fa50a62f070048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15080-cwe-1284-improper-validation-of-spe-9add849f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15080%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-R%20Series%20R08PCPU&amp;severity=high&amp;id=69842e66f9fa50a62f04ce53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-nginx-configurations-enable-large-scale--da34b7ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NGINX%20Configurations%20Enable%20Large-Scale%20Web%20Traffic%20Hijacking%20Campaign&amp;severity=medium&amp;id=69845e9ff9fa50a62f0ff3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61732-cwe-94-improper-control-of-generati-4ad2de62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61732%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Go%20toolchain%20cmd%2Fcgo&amp;severity=high&amp;id=6984194cf9fa50a62fffe422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10314-cwe-276-incorrect-default-permissio-cfc47e0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10314%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Mitsubishi%20Electric%20Corporation%20FREQSHIP-mini%20for%20Windows&amp;severity=high&amp;id=69840b3cf9fa50a62fd8cac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11730-cwe-78-improper-neutralization-of-s-b9faa684</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11730%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=high&amp;id=6983fd2df9fa50a62fcc4d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1898-improper-access-controls-in-wekan-b728455b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1898%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6983eb98f9fa50a62fbfb9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1897-missing-authorization-in-wekan-ec8a41f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1897%3A%20Missing%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6983eb98f9fa50a62fbfb9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69619-na-78246a2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69619%3A%20n%2Fa&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70073-na-3ff827a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70073%3A%20n%2Fa&amp;severity=high&amp;id=69859ff8f9fa50a62fe9e87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-05-a9f0df41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-05&amp;severity=medium&amp;id=69853256f9fa50a62f4cfaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70792-na-c3cfa596</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70792%3A%20n%2Fa&amp;severity=medium&amp;id=6984d01df9fa50a62f2f1641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70791-na-0ebc3c51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70791%3A%20n%2Fa&amp;severity=medium&amp;id=6984d01df9fa50a62f2f163d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69906-na-a2be4139</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69906%3A%20n%2Fa&amp;severity=high&amp;id=6984c591f9fa50a62f2cfd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68723-na-6404ef74</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68723%3A%20n%2Fa&amp;severity=critical&amp;id=6984c591f9fa50a62f2cfd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68643-na-8681c687</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68643%3A%20n%2Fa&amp;severity=medium&amp;id=6984c591f9fa50a62f2cfd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68722-na-8485241c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68722%3A%20n%2Fa&amp;severity=high&amp;id=6984c20ef9fa50a62f2c40b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68721-na-c787cafc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68721%3A%20n%2Fa&amp;severity=high&amp;id=6984c20ef9fa50a62f2c40b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-05-941c64b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-05&amp;severity=low&amp;id=69844347f9fa50a62f09474c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1896-improper-access-controls-in-wekan-f79ae18a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1896%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6983da05f9fa50a62fb4deb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13192-cwe-89-improper-neutralization-of-s-c321160a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13192%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=high&amp;id=6983d681f9fa50a62fb4242b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22873-cwe-23-relative-path-traversal-in-g-9adb9cb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22873%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Go%20standard%20library%20os&amp;severity=low&amp;id=6983d2fdf9fa50a62fb3480c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1895-improper-access-controls-in-wekan-cd94eaae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1895%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6983d2fdf9fa50a62fb34813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1894-improper-authorization-in-wekan-9480052e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1894%3A%20Improper%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6983cbf5f9fa50a62fb21043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62616-cwe-918-server-side-request-forgery-1eb6646c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62616%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Significant-Gravitas%20AutoGPT&amp;severity=critical&amp;id=6983cbf5f9fa50a62fb21040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62615-cwe-918-server-side-request-forgery-8957beac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62615%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Significant-Gravitas%20AutoGPT&amp;severity=critical&amp;id=6983cbf5f9fa50a62fb2103d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22038-cwe-532-insertion-of-sensitive-info-0f9ba13b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22038%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=6983cbf5f9fa50a62fb2104b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25585-cwe-119-improper-restriction-of-ope-44587225</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25585%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c871f9fa50a62fb141d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25584-cwe-119-improper-restriction-of-ope-1b3a9c09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25584%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c4edf9fa50a62fb05c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25583-cwe-119-improper-restriction-of-ope-469bbf3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25583%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c4edf9fa50a62fb05c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25582-cwe-122-heap-based-buffer-overflow--03f3cc92</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25582%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c4edf9fa50a62fb05c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25541-cwe-680-integer-overflow-to-buffer--6663e742</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25541%3A%20CWE-680%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20tokio-rs%20bytes&amp;severity=medium&amp;id=6983c4edf9fa50a62fb05c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1892-improper-authorization-in-wekan-3f983994</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1892%3A%20Improper%20Authorization%20in%20WeKan&amp;severity=low&amp;id=6983c4edf9fa50a62fb05c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25575-cwe-23-relative-path-traversal-in-t-324d75da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25575%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20TUM-Dev%20NavigaTUM&amp;severity=high&amp;id=69844e6bf9fa50a62f0c7c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25547-cwe-1333-inefficient-regular-expres-7c6a0894</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25547%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20brace-expansion&amp;severity=critical&amp;id=6983c169f9fa50a62faf7b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25546-cwe-78-improper-neutralization-of-s-053c9612</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25546%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Coding-Solo%20godot-mcp&amp;severity=high&amp;id=6983c169f9fa50a62faf7b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25543-cwe-116-improper-encoding-or-escapi-f7cedb9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25543%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20mganss%20HtmlSanitizer&amp;severity=medium&amp;id=6983c169f9fa50a62faf7afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25539-cwe-22-improper-limitation-of-a-pat-e66d7a68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25539%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=6983c169f9fa50a62faf7af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25538-cwe-862-missing-authorization-in-de-5e832b37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25538%3A%20CWE-862%3A%20Missing%20Authorization%20in%20devtron-labs%20devtron&amp;severity=high&amp;id=6983bde5f9fa50a62fae8c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1884-server-side-request-forgery-in-zenta-c814586e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1884%3A%20Server-Side%20Request%20Forgery%20in%20ZenTao&amp;severity=medium&amp;id=6983bde5f9fa50a62fae8c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25537-cwe-843-access-of-resource-using-in-8491fb8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25537%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Keats%20jsonwebtoken&amp;severity=medium&amp;id=6983bde5f9fa50a62fae8c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25536-cwe-362-concurrent-execution-using--bd6c4c0a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25536%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20modelcontextprotocol%20typescript-sdk&amp;severity=high&amp;id=6983bde5f9fa50a62fae8c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25526-cwe-1336-improper-neutralization-of-c4a73d18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25526%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20HubSpot%20jinjava&amp;severity=critical&amp;id=6983bde5f9fa50a62fae8c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25523-cwe-200-exposure-of-sensitive-infor-e8d82368</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25523%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51451-cwe-644-improper-neutralization-of--1ba86212</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51451%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Concert&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25521-cwe-1321-improperly-controlled-modi-dba4704a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25521%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=critical&amp;id=6983ba62f9fa50a62fae1db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43181-cwe-613-insufficient-session-expira-5718473a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43181%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Concert&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40685-cwe-352-cross-site-request-forgery--0f2bbc2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Operations%20Analytics%20-%20Log%20Analysis&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2134-cwe-410-in-ibm-jazz-reporting-servic-2546c7b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2134%3A%20CWE-410%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=low&amp;id=6983b6ddf9fa50a62fad2903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27550-cwe-497-in-ibm-jazz-reporting-servi-3ce4912c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27550%3A%20CWE-497%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=low&amp;id=6983b6ddf9fa50a62fad2900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1823-cwe-770-allocation-of-resources-with-2af56f7f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1823%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=low&amp;id=6983b6ddf9fa50a62fad28fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39724-cwe-770-allocation-of-resources-wit-145a8136</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39724%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20Big%20SQL%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=6983b359f9fa50a62fac7189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25511-cwe-918-server-side-request-forgery-0d29fa11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25511%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=6983afd6f9fa50a62fabdb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25512-cwe-78-improper-neutralization-of-s-02b8f466</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25512%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=6983afd7f9fa50a62fabdb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15555-stack-based-buffer-overflow-in-open-9dbf52dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15555%3A%20Stack-based%20Buffer%20Overflow%20in%20Open5GS&amp;severity=medium&amp;id=6983afd5f9fa50a62fabdb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25499-cwe-1188-insecure-default-initializ-781502b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25499%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20bpg%20terraform-provider-proxmox&amp;severity=high&amp;id=6983afd6f9fa50a62fabdb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13375-cwe-250-in-ibm-common-cryptographic-53b57f31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13375%3A%20CWE-250%20in%20IBM%20Common%20Cryptographic%20Architecture&amp;severity=critical&amp;id=6983afd5f9fa50a62fabdb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1554-cwe-91-xml-injection-aka-blind-xpath-e4a16966</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1554%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20Drupal%20Central%20Authentication%20System%20(CAS)%20Server&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1553-cwe-863-incorrect-authorization-in-d-5b55da28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1553%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Drupal%20Canvas&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0948-cwe-288-authentication-bypass-using--9cc423e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0948%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Microsoft%20Entra%20ID%20SSO%20Login&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0947-cwe-79-improper-neutralization-of-in-c4082b1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0947%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20AT%20Internet%20Piano%20Analytics&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0946-cwe-79-improper-neutralization-of-in-fc20a16b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0946%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20AT%20Internet%20SmartTag&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0945-cwe-267-privilege-defined-with-unsaf-13a0d9ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0945%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Drupal%20Role%20Delegation&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0944-cwe-754-improper-check-for-unusual-o-604f67c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0944%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Drupal%20Group%20invite&amp;severity=medium&amp;id=6983ac51f9fa50a62faacb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/they-got-in-through-sonicwall-then-they-tried-to-k-d2ba1a4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=They%20Got%20In%20Through%20SonicWall.%20Then%20They%20Tried%20to%20Kill%20Every%20Security%20Tool&amp;severity=medium&amp;id=69847bd0f9fa50a62f1a71f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25505-cwe-306-missing-authentication-for--d2caa7ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25505%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20maziggy%20bambuddy&amp;severity=critical&amp;id=6983a8cef9fa50a62fa9fe88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25513-cwe-89-improper-neutralization-of-s-b2b7666b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25513%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=high&amp;id=6983a8cef9fa50a62fa9fe8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25514-cwe-20-improper-input-validation-in-d581a1b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25514%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20NeoRazorX%20facturascripts&amp;severity=high&amp;id=6983a8cef9fa50a62fa9fe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25161-cwe-22-improper-limitation-of-a-pat-7235ac0e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25161%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AlistGo%20alist&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25160-cwe-295-improper-certificate-valida-d1ead323</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25160%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20AlistGo%20alist&amp;severity=critical&amp;id=6983a549f9fa50a62fa8d0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24884-cwe-59-improper-link-resolution-bef-fb097a83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24884%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20node-modules%20compressing&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25145-cwe-22-improper-limitation-of-a-pat-2199e198</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25145%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=6983a549f9fa50a62fa8d0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25143-cwe-78-improper-neutralization-of-s-4f8716d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25143%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chainguard-dev%20melange&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24844-cwe-78-improper-neutralization-of-s-1f9ed088</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24844%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chainguard-dev%20melange&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24843-cwe-22-improper-limitation-of-a-pat-9bfd519a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24843%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23897-cwe-1333-inefficient-regular-expres-a642da5c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23897%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20apollographql%20apollo-server&amp;severity=high&amp;id=69839e42f9fa50a62fa72d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25140-cwe-400-uncontrolled-resource-consu-960ed904</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25140%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20chainguard-dev%20apko&amp;severity=high&amp;id=69839abdf9fa50a62fa5f777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25121-cwe-23-relative-path-traversal-in-c-c53a6503</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25121%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20chainguard-dev%20apko&amp;severity=high&amp;id=69839abdf9fa50a62fa5f76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25122-cwe-400-uncontrolled-resource-consu-2aca803e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25122%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20chainguard-dev%20apko&amp;severity=medium&amp;id=69839abdf9fa50a62fa5f773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0536-cwe-787-out-of-bounds-write-in-autod-89def5dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0536%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69839031f9fa50a62fa26932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25508-cwe-125-out-of-bounds-read-in-espre-1863452a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25508%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=69838cacf9fa50a62fa09397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25507-cwe-416-use-after-free-in-espressif-c761e816</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25507%3A%20CWE-416%3A%20Use%20After%20Free%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=69838cacf9fa50a62fa0938d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25532-cwe-191-integer-underflow-wrap-or-w-0c7438cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25532%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=69838cacf9fa50a62fa093a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-develops-scanner-to-detect-backdoors-in--63166ba0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Develops%20Scanner%20to%20Detect%20Backdoors%20in%20Open-Weight%20Large%20Language%20Models&amp;severity=low&amp;id=69845e9ff9fa50a62f0ff3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25139-cwe-125-out-of-bounds-read-in-riot--c8e77efd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25139%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20RIOT-OS%20RIOT&amp;severity=high&amp;id=6983892af9fa50a62fa00a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69215-cwe-89-improper-neutralization-of-s-8b59e75a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69215%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=6983892af9fa50a62fa00a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69213-cwe-89-improper-neutralization-of-s-274b91ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69213%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=6983892af9fa50a62fa00a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21893-cwe-78-improper-neutralization-of-s-384e4de1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21893%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=6983892af9fa50a62fa00a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64712-cwe-22-improper-limitation-of-a-pat-2ced3a68</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64712%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unstructured-IO%20unstructured&amp;severity=critical&amp;id=6983892af9fa50a62fa00a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deadvax-malware-campaign-deploys-asyncrat-via-ipfs-11135850</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DEAD%23VAX%20Malware%20Campaign%20Deploys%20AsyncRAT%20via%20IPFS-Hosted%20VHD%20Phishing%20Files&amp;severity=medium&amp;id=69845e9ff9fa50a62f0ff3af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22044-cwe-89-improper-neutralization-of-s-10a87eb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22044%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69838221f9fa50a62f9dc5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23624-cwe-384-session-fixation-in-glpi-pr-c85ebecb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23624%3A%20CWE-384%3A%20Session%20Fixation%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69838221f9fa50a62f9dc5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22247-cwe-918-server-side-request-forgery-ef065731</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22247%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69838221f9fa50a62f9dc5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25115-cwe-693-protection-mechanism-failur-a8a0d342</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25115%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25056-cwe-434-unrestricted-upload-of-file-ac0e62a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25056%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25055-cwe-22-improper-limitation-of-a-pat-ef87be5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25055%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d191e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25054-cwe-80-improper-neutralization-of-s-f40600b6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25054%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25053-cwe-78-improper-neutralization-of-s-73c200fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25053%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25052-cwe-367-time-of-check-time-of-use-t-93438876</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25052%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25051-cwe-79-improper-neutralization-of-i-cbd425cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25051%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d190d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61917-cwe-668-exposure-of-resource-to-wro-3f5a5af1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61917%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d1904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25049-cwe-913-improper-control-of-dynamic-698b739a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25049%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0662-cwe-426-untrusted-search-path-in-aut-fb3049c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0662%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0660-cwe-121-stack-based-buffer-overflow--8b0875ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0660%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0661-cwe-787-out-of-bounds-write-in-autod-f988f150</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0661%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0537-cwe-787-out-of-bounds-write-in-autod-4f4f57fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0537%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0538-cwe-787-out-of-bounds-write-in-autod-b77e745b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0538%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837419f9fa50a62f9ac078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20119-improper-validation-of-specified-ty-ebb4ee15</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20119%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20RoomOS%20Software&amp;severity=high&amp;id=69837419f9fa50a62f9ac08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20111-use-of-hard-coded-credentials-in-ci-bf72ccb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20111%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Cisco%20Cisco%20Prime%20Infrastructure&amp;severity=medium&amp;id=69837419f9fa50a62f9ac087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20123-url-redirection-to-untrusted-site-o-8629cd8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20123%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=69837419f9fa50a62f9ac08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20098-unrestricted-upload-of-file-with-da-eec3aa8d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20098%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Meeting%20Management&amp;severity=high&amp;id=69837419f9fa50a62f9ac084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20056-download-of-code-without-integrity--69833cde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20056%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Cisco%20Cisco%20Secure%20Web%20Appliance&amp;severity=medium&amp;id=69837419f9fa50a62f9ac081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0659-cwe-787-out-of-bounds-write-in-autod-f330298c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0659%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20USD%20for%20Arnold&amp;severity=high&amp;id=69837419f9fa50a62f9ac07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-assisted-cloud-intrusion-achieves-admin-access--7ee8ed65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-assisted%20cloud%20intrusion%20achieves%20admin%20access%20in%208%20minutes&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-year-new-sector-targeting-indias-startup-ecosy-7d880cb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20year%2C%20new%20sector%3A%20Targeting%20India&apos;s%20startup%20ecosystem&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-routers-dns-and-a-tds-hidden-in-aeza-n-5ef12f72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20Routers%2C%20DNS%2C%20and%20a%20TDS%20Hidden%20in%20Aeza%20Networks&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/punishing-owl-attacks-russia-a-new-owl-in-the-hack-307ce4bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Punishing%20Owl%20Attacks%20Russia%3A%20A%20New%20Owl%20in%20the%20Hacktivists&apos;%20Forest&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anatomy-of-a-russian-crypto-drainer-operation-4ca9a827</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anatomy%20of%20a%20Russian%20Crypto%20Drainer%20Operation&amp;severity=medium&amp;id=6983b6ddf9fa50a62fad288d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22549-cwe-250-execution-with-unnecessary--e87d8941</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22549%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20F5%20F5%20BIG-IP%20Container%20Ingress%20Services&amp;severity=medium&amp;id=69836601f9fa50a62f96098c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1642-cwe-349-acceptance-of-extraneous-unt-1423ae64</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1642%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20F5%20NGINX%20Open%20Source&amp;severity=medium&amp;id=6983627ef9fa50a62f94fb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22548-cwe-362-concurrent-execution-using--12bbf082</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22548%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=6983627ef9fa50a62f94fb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20732-cwe-451-user-interface-ui-misrepres-a9763fbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20732%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20F5%20BIG-IP&amp;severity=low&amp;id=6983627ef9fa50a62f94fb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20730-cwe-200-exposure-of-sensitive-infor-1e73f43f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20730%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20F5%20BIG-IP%20Edge%20Client&amp;severity=low&amp;id=6983627ef9fa50a62f94fb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-amaranth-dragon-exploits-winrar-flaw--bb02afa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Amaranth-Dragon%20Exploits%20WinRAR%20Flaw%20in%20Espionage%20Campaigns&amp;severity=medium&amp;id=69845e9ff9fa50a62f0ff3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amaranth-dragon-weaponizing-cve-2025-8088-for-targ-7dfc4b87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amaranth-Dragon%3A%20Weaponizing%20CVE-2025-8088%20for%20Targeted%20Espionage%20in%20the%20Southeast%20Asia&amp;severity=medium&amp;id=698350eef9fa50a62f8f0b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14740-cwe-732-incorrect-permission-assign-d39e0e46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14740%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Docker%20Inc.%20Docker%20Desktop&amp;severity=medium&amp;id=6983546df9fa50a62f8ff386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-allowed-full-compromise-of-google--9a65807f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Allowed%20Full%20Compromise%20of%20Google%20Looker%20Instances&amp;severity=critical&amp;id=69834d32f9fa50a62f8e1d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5329-cwe-89-improper-neutralization-of-sp-4df4d90a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5329%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Martcode%20Software%20Inc.%20Delta%20Course%20Automation&amp;severity=critical&amp;id=69834d77f9fa50a62f8e393b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15368-cwe-98-improper-control-of-filename-65383c43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15368%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themeboy%20SportsPress%20%E2%80%93%20Sports%20Club%20%26%20League%20Manager&amp;severity=high&amp;id=69834d77f9fa50a62f8e3935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-cyberwar-and-rising-nation-sta-896fac48</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Cyberwar%20and%20Rising%20Nation%20State%20Threats&amp;severity=medium&amp;id=6983462af9fa50a62f8bffb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/341-malicious-clawed-skills-found-by-the-bot-they--cac03cca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=341%20Malicious%20Clawed%20Skills%20Found%20by%20the%20Bot%20They%20Were%20Targeting&amp;severity=medium&amp;id=6983546df9fa50a62f8fec2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dockerdash-flaw-in-docker-ai-assistant-leads-to-rc-8c2ee893</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DockerDash%20Flaw%20in%20Docker%20AI%20Assistant%20Leads%20to%20RCE%2C%20Data%20Theft&amp;severity=critical&amp;id=69833112f9fa50a62f86384c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-godfather-of-ransomware-inside-cartel-ambition-6c4d8a5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Godfather%20of%20Ransomware%3F%20Inside%20Cartel%20Ambitions&amp;severity=medium&amp;id=6983b6ddf9fa50a62fad2884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-malicious-crypto-trading-add-ons-found-7f6e64cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20Malicious%20Crypto%20Trading%20Add-Ons%20Found%20in%20Moltbot%2FOpenClaw&amp;severity=medium&amp;id=69847bd0f9fa50a62f1a71f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0873-cwe-79-improper-neutralization-of-in-3db399cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ercom%20Cryptobox&amp;severity=medium&amp;id=6983627ef9fa50a62f94fb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24735-cwe-359-exposure-of-private-persona-76777b11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24735%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Answer&amp;severity=high&amp;id=6983708ef9fa50a62f98de78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59818-vulnerability-in-zenitel-tcis-3-e1f94afc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59818%3A%20Vulnerability%20in%20Zenitel%20TCIS-3%2B&amp;severity=critical&amp;id=69832335f9fa50a62f825756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptominers-reverse-shells-dropped-in-recent-reac-4b650cda</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cryptominers%2C%20Reverse%20Shells%20Dropped%20in%20Recent%20React2Shell%20Attacks&amp;severity=medium&amp;id=69831bfaf9fa50a62f7ff2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-first-90-seconds-how-early-decisions-shape-inc-cdb9dba8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20First%2090%20Seconds%3A%20How%20Early%20Decisions%20Shape%20Incident%20Response%20Investigations&amp;severity=high&amp;id=69845e9ff9fa50a62f0ff3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41085-cwe-79-improper-neutralization-of-i-f5d26662</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41085%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Apidog%20Apidog%20Web%20Platform&amp;severity=medium&amp;id=69831c3bf9fa50a62f80155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-solarwinds-vulnerability-exploited-in-attack-bf32f06e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20SolarWinds%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=69831876f9fa50a62f7f28f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1622-cwe-532-insertion-of-sensitive-infor-88036ec4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1622%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20neo4j%20Enterprise%20Edition&amp;severity=medium&amp;id=698311a1f9fa50a62f7d02dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-analysis-of-moltbook-agent-network-bot-to-75107f17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Analysis%20of%20Moltbook%20Agent%20Network%3A%20Bot-to-Bot%20Prompt%20Injection%20and%20Data%20Leaks&amp;severity=medium&amp;id=698306e2f9fa50a62f79d87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0816-cwe-89-improper-neutralization-of-sp-9a170231</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0816%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gtlwpdev%20All%20push%20notification%20for%20WP&amp;severity=medium&amp;id=6983072af9fa50a62f79eb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15487-cwe-22-improper-limitation-of-a-pat-0dded556</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15487%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20qriouslad%20Code%20Explorer&amp;severity=medium&amp;id=69830729f9fa50a62f79eb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1370-cwe-89-improper-neutralization-of-sp-44db5f3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1370%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20comprassibs%20SIBS%20woocommerce%20payment%20gateway&amp;severity=medium&amp;id=6983072af9fa50a62f79eba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0743-cwe-79-improper-neutralization-of-in-d908999a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0743%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20orenhav%20WP%20Content%20Permission&amp;severity=medium&amp;id=6983072af9fa50a62f79eb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0742-cwe-79-improper-neutralization-of-in-49053c10</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zealopensource%20Smart%20Appointment%20%26%20Booking&amp;severity=medium&amp;id=6983072af9fa50a62f79eb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0679-cwe-862-missing-authorization-in-for-4ef3a96e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0679%3A%20CWE-862%20Missing%20Authorization%20in%20fortispay%20Fortis%20for%20WooCommerce&amp;severity=medium&amp;id=69830729f9fa50a62f79eb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15508-cwe-200-exposure-of-sensitive-infor-6177add6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15508%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20magicimport%20Magic%20Import%20Document%20Extractor&amp;severity=medium&amp;id=69830729f9fa50a62f79eb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0572-cwe-862-missing-authorization-in-web-e7277085</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0572%3A%20CWE-862%20Missing%20Authorization%20in%20webpurify%20WebPurify%20Profanity%20Filter&amp;severity=medium&amp;id=69830729f9fa50a62f79eb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15507-cwe-862-missing-authorization-in-ma-a6cf4e03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15507%3A%20CWE-862%20Missing%20Authorization%20in%20magicimport%20Magic%20Import%20Document%20Extractor&amp;severity=medium&amp;id=69830729f9fa50a62f79eb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15268-cwe-89-improper-neutralization-of-s-e8f793d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15268%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20infility%20Infility%20Global&amp;severity=high&amp;id=69830729f9fa50a62f79eb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0681-cwe-79-improper-neutralization-of-in-42e82463</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rtddev%20Extended%20Random%20Number%20Generator&amp;severity=medium&amp;id=6983072af9fa50a62f79eb8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15285-cwe-862-missing-authorization-in-lu-cfc3b5c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15285%3A%20CWE-862%20Missing%20Authorization%20in%20lupsonline%20SEO%20Flow%20by%20LupsOnline&amp;severity=high&amp;id=69830729f9fa50a62f79eb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14461-cwe-862-missing-authorization-in-tp-560241f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14461%3A%20CWE-862%20Missing%20Authorization%20in%20tpixendit%20Xendit%20Payment&amp;severity=medium&amp;id=69830729f9fa50a62f79eb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15260-cwe-862-missing-authorization-in-lw-fba313d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15260%3A%20CWE-862%20Missing%20Authorization%20in%20lwsdevelopers%20MyRewards&amp;severity=medium&amp;id=69830729f9fa50a62f79eb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15482-cwe-200-exposure-of-sensitive-infor-e0e06d24</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15482%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20chapaet%20Chapa%20Payment%20Gateway%20Plugin%20for%20WooCommerce&amp;severity=medium&amp;id=69830729f9fa50a62f79eb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1819-cwe-79-improper-neutralization-of-in-91abdc20</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Karel%20Electronics%20Industry%20and%20Trade%20Inc.%20ViPort&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-python-infostealers-target-macos-v-f89b34d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20Python%20Infostealers%20Target%20macOS%20via%20Fake%20Ads%20and%20Installers&amp;severity=medium&amp;id=6983125df9fa50a62f7d2a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24447-improper-neutralization-of-formula--ff6f4904</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24447%3A%20Improper%20neutralization%20of%20formula%20elements%20in%20a%20CSV%20file%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f736054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23704-unrestricted-upload-of-file-with-da-857cff0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23704%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f73604f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22875-cross-site-scripting-xss-in-six-apa-08808dab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22875%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f73604a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21393-cross-site-scripting-xss-in-six-apa-d034a7f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21393%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f736045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1756-cwe-434-unrestricted-upload-of-file--7ad77ef4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1756%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20seezee%20WP%20FOFT%20Loader&amp;severity=high&amp;id=6982ee78f9fa50a62f7260f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eclipse-foundation-mandates-pre-publish-security-c-e7238876</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eclipse%20Foundation%20Mandates%20Pre-Publish%20Security%20Checks%20for%20Open%20VSX%20Extensions&amp;severity=medium&amp;id=6983125df9fa50a62f7d2a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20987-cwe-284-improper-access-control-in--4dcabacd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20987%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20GalaxyDiagnostics&amp;severity=high&amp;id=6982fcd1f9fa50a62f765da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20986-cwe-22-improper-limitation-of-a-pat-6f48f0c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20986%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(%26%2339%3BPath%20Traversal%26%2339%3B)%20in%20Samsung%20Mobile%20Chinese%20Samsung%20Members&amp;severity=medium&amp;id=6982fcd1f9fa50a62f765da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20985-cwe-20-improper-input-validation-in-8a62bf1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20985%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Members&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20984-cwe-280-improper-handling-of-insuff-1c49c69a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20984%3A%20CWE-280%3A%20Improper%20handling%20of%20insufficient%20permission%20in%20Samsung%20Mobile%20Galaxy%20Wearable&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20983-cwe-926-improper-export-of-android--06309a5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20983%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20982-cwe-35-path-traversal-in-samsung-mo-6ab58797</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20982%3A%20CWE-35%3A%20Path%20Traversal%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20981-cwe-20-improper-input-validation-in-8c5e889c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20981%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20980-cwe-20-improper-input-validation-in-3e641da2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20980%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20979-cwe-269-impoper-privilege-managemen-106bd045</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20979%3A%20CWE-269%20Impoper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20978-cwe-269-impoper-privilege-managemen-b57983f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20978%3A%20CWE-269%20Impoper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20977-cwe-284-improper-access-control-in--df7d1cd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20977%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-solarwinds-web-help-d-5202fe85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20SolarWinds%20Web%20Help%20Desk%20RCE%20to%20KEV%20Catalog&amp;severity=critical&amp;id=6983125df9fa50a62f7d2a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29867-cwe-843-access-of-resource-using-in-e17a9b74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29867%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Hancom%20Inc.%20Hancom%20Office%202018&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1791-cwe-434-unrestricted-upload-of-file--fb6094c0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1791%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Hillstone%20Networks%20Operation%20and%20Maintenance%20Security%20Gateway&amp;severity=low&amp;id=6982c448f9fa50a62f51f8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1835-cross-site-request-forgery-in-lcg012-ae5e0431</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1835%3A%20Cross-Site%20Request%20Forgery%20in%20lcg0124%20BootDo&amp;severity=medium&amp;id=69829a18f9fa50a62ff8dfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-desktop-4443-unauthenticated-api-exposure-f37ba59f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Desktop%204.44.3%20-%20Unauthenticated%20%20API%20Exposure&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortiweb-fabric-connector-76x-sql-injection-to-rem-db046e74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FortiWeb%20Fabric%20Connector%207.6.x%20-%20SQL%20Injection%20to%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69845ddcf9fa50a62f0fd4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aiohttp-391-directory-traversal-poc-06c6f577</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=aiohttp%203.9.1%20-%20directory%20traversal%20PoC&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ingress-nginx-admission-controller-v1111-fd-inject-5be78404</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ingress-NGINX%20Admission%20Controller%20v1.11.1%20-%20FD%20Injection%20to%20RCE&amp;severity=critical&amp;id=69845ddcf9fa50a62f0fd4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/octoprint-1112-file-upload-63465292</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OctoPrint%201.11.2%20-%20File%20Upload&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redis-802-rce-58f92bee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Redis%208.0.2%20-%20RCE&amp;severity=critical&amp;id=69845ddcf9fa50a62f0fd497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-1011-ntlm-hash-disclosure-spoofing-9b39ea95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=windows%2010%2F11%20-%20NTLM%20Hash%20Disclosure%20Spoofing&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-04-ab1fd846</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-04&amp;severity=medium&amp;id=6983e0d6f9fa50a62fb69fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71031-na-1ecbeaac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71031%3A%20n%2Fa&amp;severity=high&amp;id=6983a8cef9fa50a62fa9fe84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70545-na-20c02591</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70545%3A%20n%2Fa&amp;severity=medium&amp;id=69836601f9fa50a62f960988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70997-na-24272539</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70997%3A%20n%2Fa&amp;severity=high&amp;id=6983627ef9fa50a62f94fb81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69618-na-7e17525d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69618%3A%20n%2Fa&amp;severity=high&amp;id=69835b75f9fa50a62f92b4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-04-7395cf17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-04&amp;severity=low&amp;id=69832683f9fa50a62f838bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69621-na-6c7cbd12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69621%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd1f9fa50a62f765daf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69620-na-4c7a89dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69620%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd1f9fa50a62f765da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1813-unrestricted-upload-in-bolo-blog-bol-b4844d55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1813%3A%20Unrestricted%20Upload%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69828885f9fa50a62fe9cc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1633-cwe-306-missing-authentication-for-c-358e9305</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1633%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Synectix%20LAN%20232%20TRIO&amp;severity=critical&amp;id=6982fcd1f9fa50a62f765db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1632-cwe-306-missing-authentication-for-c-69ba200a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1632%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20RISS%20SRL%20MOMA%20Seismic%20Station&amp;severity=critical&amp;id=6982817df9fa50a62fe78b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1812-path-traversal-in-bolo-blog-bolo-sol-741f75b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1812%3A%20Path%20Traversal%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69827df8f9fa50a62fe64081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1755-cwe-79-improper-neutralization-of-in-6a922468</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1755%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Menu%20Icons%20by%20ThemeIsle&amp;severity=medium&amp;id=69827a75f9fa50a62fe57fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24514-cwe-770-allocation-of-resources-wit-fe0a4b00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24514%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Kubernetes%20ingress-nginx&amp;severity=medium&amp;id=69827a75f9fa50a62fe57fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24513-cwe-754-improper-check-for-unusual--15bf96ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24513%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Kubernetes%20ingress-nginx&amp;severity=low&amp;id=69827a75f9fa50a62fe57fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24512-cwe-20-improper-input-validation-in-994b9fe2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24512%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69827a75f9fa50a62fe57fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1580-cwe-20-improper-input-validation-in--c604c8c2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1580%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69827a75f9fa50a62fe57fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33081-cwe-312-cleartext-storage-of-sensit-14cffe63</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33081%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20IBM%20Concert&amp;severity=low&amp;id=698276f1f9fa50a62fe4b3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36033-cwe-79-improper-neutralization-of-i-3c6e0ea9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36033%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Engineering%20Lifecycle%20Management%20-%20Global%20Configuration%20Management&amp;severity=medium&amp;id=698276f1f9fa50a62fe4b3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36094-cwe-1284-improper-validation-of-spe-64bc533b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36094%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=698276f1f9fa50a62fe4b3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1811-path-traversal-in-bolo-blog-bolo-sol-24469a6c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1811%3A%20Path%20Traversal%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69826c65f9fa50a62fe2a068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1341-cwe-306-missing-authentication-for-c-a1d18d0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1341%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Avation%20Avation%20Light%20Engine%20Pro&amp;severity=critical&amp;id=69826c65f9fa50a62fe2a065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25510-cwe-434-unrestricted-upload-of-file-4e04b8c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25510%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=698268e3f9fa50a62fe1ecce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25509-cwe-204-observable-response-discrep-a743822b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25509%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25150-cwe-1321-improperly-controlled-modi-c356c655</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25150%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20QwikDev%20qwik&amp;severity=critical&amp;id=698268e3f9fa50a62fe1ecbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25148-cwe-79-improper-neutralization-of-i-b527805d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25148%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QwikDev%20qwik&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25151-cwe-352-cross-site-request-forgery--54a7f0af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25151%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QwikDev%20qwik&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25155-cwe-352-cross-site-request-forgery--fc29b370</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25155%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QwikDev%20qwik&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25149-cwe-601-url-redirection-to-untruste-221b295d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25149%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20QwikDev%20qwik&amp;severity=low&amp;id=698268e3f9fa50a62fe1ecba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1862-type-confusion-in-google-chrome-74752399</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1862%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=6982655ef9fa50a62fe085f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1861-heap-buffer-overflow-in-google-chrom-00b60d91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1861%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6982655ef9fa50a62fe085f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65078-cwe-426-untrusted-search-path-in-le-d88b2302</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65078%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=critical&amp;id=698261daf9fa50a62fdf39d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24887-cwe-78-improper-neutralization-of-s-2e48c07a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24887%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=698261daf9fa50a62fdf39e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24053-cwe-22-improper-limitation-of-a-pat-19af0cd1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24053%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=698261daf9fa50a62fdf39e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24052-cwe-601-url-redirection-to-untruste-7dabc228</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24052%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=698261daf9fa50a62fdf39df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65077-cwe-22-improper-limitation-of-a-pat-1ed37367</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65077%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=high&amp;id=698261daf9fa50a62fdf39d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65081-cwe-125-out-of-bounds-read-in-lexma-2674a469</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65081%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=medium&amp;id=698261daf9fa50a62fdf39dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65080-cwe-843-access-of-resource-using-in-7bdf51d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65080%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=medium&amp;id=698261daf9fa50a62fdf39d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1810-path-traversal-in-bolo-blog-bolo-sol-f4bf9946</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1810%3A%20Path%20Traversal%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69825e55f9fa50a62fde8b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65079-cwe-122-heap-based-buffer-overflow--7090318c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65079%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=medium&amp;id=69825e55f9fa50a62fde8b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1801-inconsistent-interpretation-of-http--410806b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1801%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69825ad5f9fa50a62fdde084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1803-use-of-default-credentials-in-ziroom-eff2e206</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1803%3A%20Use%20of%20Default%20Credentials%20in%20Ziroom%20ZHOME%20A0101&amp;severity=critical&amp;id=6982574ef9fa50a62fdd1d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24149-cwe-94-improper-control-of-generati-2d4eb83d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24149%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=6982574ef9fa50a62fdd1d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64438-cwe-835-loop-with-unreachable-exit--0a2c29a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64438%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc199e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64098-cwe-125-out-of-bounds-read-in-epros-1889535f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64098%3A%20CWE-125%20Out-of-bounds%20Read%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc1998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62799-cwe-122-heap-based-buffer-overflow--ed63869c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62799%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20eProsima%20Fast-DDS&amp;severity=high&amp;id=69825048f9fa50a62fdc1992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62603-cwe-125-out-of-bounds-read-in-epros-328d3edd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62603%3A%20CWE-125%20Out-of-bounds%20Read%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc198c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62602-cwe-122-heap-based-buffer-overflow--b712494b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62602%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc1986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62601-cwe-122-heap-based-buffer-overflow--ae3ec93e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62601%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc1980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24441-cwe-319-cleartext-transmission-of-s-f6d6bcba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24441%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=high&amp;id=69825048f9fa50a62fdc19aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24434-cwe-352-cross-site-request-forgery--eb99fff6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24434%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=medium&amp;id=69825048f9fa50a62fdc19a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24427-cwe-201-insertion-of-sensitive-info-2518bc19</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24427%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=medium&amp;id=6982493ef9fa50a62fdabb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62600-cwe-190-integer-overflow-or-wraparo-ebce4785</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62600%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20eProsima%20Fast-DDS&amp;severity=high&amp;id=6982493ef9fa50a62fdabaff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24426-cwe-79-improper-neutralization-of-i-6027d436</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24426%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=medium&amp;id=6982493ef9fa50a62fdabb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1802-command-injection-in-ziroom-zhome-a0-4f2a0123</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1802%3A%20Command%20Injection%20in%20Ziroom%20ZHOME%20A0101&amp;severity=medium&amp;id=6982493ef9fa50a62fdabb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62673-cwe-122-heap-based-buffer-overflow--c706b0f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62673%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62501-cwe-322-key-exchange-without-entity-5ed7f272</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62501%3A%20CWE-322%20Key%20Exchange%20without%20Entity%20Authentication%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62405-cwe-122-heap-based-buffer-overflow--88225e85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62405%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62404-cwe-122-heap-based-buffer-overflow--003e1e3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62404%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabaed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61983-cwe-122-heap-based-buffer-overflow--e46fba2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61983%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61944-cwe-122-heap-based-buffer-overflow--815cf30e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61944%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59487-cwe-122-heap-based-buffer-overflow--c6ddbb8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59487%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59482-cwe-122-heap-based-buffer-overflow--45d8dec5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59482%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58455-cwe-122-heap-based-buffer-overflow--e71fcffc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58455%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58077-cwe-122-heap-based-buffer-overflow--bdbbf656</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58077%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25502-cwe-121-stack-based-buffer-overflow-80bd3249</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25502%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=698245bcf9fa50a62fda1234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25503-cwe-704-incorrect-type-conversion-o-4799c60b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25503%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=698245bcf9fa50a62fda123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25241-cwe-89-improper-neutralization-of-s-0b72583b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25241%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=critical&amp;id=698245bcf9fa50a62fda1231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25240-cwe-89-improper-neutralization-of-s-1ab86a4a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25240%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=medium&amp;id=698245bcf9fa50a62fda122e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25239-cwe-89-improper-neutralization-of-s-b8b1fc95</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25239%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=high&amp;id=698245bcf9fa50a62fda122b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25238-cwe-89-improper-neutralization-of-s-256012a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25238%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=critical&amp;id=698245baf9fa50a62fda11ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25237-cwe-624-executable-regular-expressi-3bed76f9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25237%3A%20CWE-624%3A%20Executable%20Regular%20Expression%20Error%20in%20pear%20pearweb&amp;severity=critical&amp;id=698245baf9fa50a62fda11e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25236-cwe-89-improper-neutralization-of-s-16a75fbd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25236%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=medium&amp;id=698245baf9fa50a62fda11e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25235-cwe-337-predictable-seed-in-pseudo--62642ee1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25235%3A%20CWE-337%3A%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20pear%20pearweb&amp;severity=high&amp;id=698245baf9fa50a62fda11e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25234-cwe-89-improper-neutralization-of-s-2aba1fe0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25234%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=medium&amp;id=698245baf9fa50a62fda11de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25233-cwe-783-operator-precedence-logic-e-98d15dee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25233%3A%20CWE-783%3A%20Operator%20Precedence%20Logic%20Error%20in%20pear%20pearweb&amp;severity=high&amp;id=698245baf9fa50a62fda11db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52631-cwe-200-in-hcl-aion-19e7abe9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52631%3A%20CWE-200%20in%20HCL%20AION&amp;severity=low&amp;id=69823eb3f9fa50a62fd8ce63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52623-cwe-522-in-hcl-aion-e4370358</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52623%3A%20CWE-522%20in%20HCL%20AION&amp;severity=low&amp;id=69823eb3f9fa50a62fd8ce5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25522-cwe-79-improper-neutralization-of-i-5f82c5bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25522%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8cebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25490-cwe-79-improper-neutralization-of-i-fa34bd3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25490%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8ceb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25489-cwe-79-improper-neutralization-of-i-6e83cee9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25489%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8ceaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25488-cwe-79-improper-neutralization-of-i-5d98ec6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25488%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8cea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25487-cwe-79-improper-neutralization-of-i-4b55417c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25487%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8cea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25486-cwe-79-improper-neutralization-of-i-240f94bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25486%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25485-cwe-79-improper-neutralization-of-i-8105c312</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25485%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52628-cwe-1275-in-hcl-aion-df4675a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52628%3A%20CWE-1275%20in%20HCL%20AION&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25484-cwe-79-improper-neutralization-of-i-b210ab58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25484%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25483-cwe-79-improper-neutralization-of-i-81489a10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0620-cwe-693-protection-mechanism-failure-c1563062</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0620%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20TP-Link%20Systems%20Inc.%20AXE75&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25482-cwe-79-improper-neutralization-of-i-73649cae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25482%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52633-cwe-539-in-hcl-aion-af9f9cab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52633%3A%20CWE-539%20in%20HCL%20AION&amp;severity=low&amp;id=69823eb3f9fa50a62fd8ce66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62599-cwe-190-integer-overflow-or-wraparo-1c1e982d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62599%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20eProsima%20Fast-DDS&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52629-cwe-1032-in-hcl-aion-994fd821</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52629%3A%20CWE-1032%20in%20HCL%20AION&amp;severity=low&amp;id=6982493ff9fa50a62fdabb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52626-cwe-78-in-hcl-aion-f4156f00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52626%3A%20CWE-78%20in%20HCL%20AION&amp;severity=medium&amp;id=698253c8f9fa50a62fdcb702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52627-cwe-732-in-hcl-aion-98a54cce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52627%3A%20CWE-732%20in%20HCL%20AION&amp;severity=medium&amp;id=6982493ff9fa50a62fdabb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22228-cwe-400-uncontrolled-resource-consu-b8859d18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22228%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=medium&amp;id=69823426f9fa50a62fd6b72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22220-cwe-20-improper-input-validation-in-3259f418</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22220%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=medium&amp;id=69823426f9fa50a62fd6b728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24669-cwe-613-insufficient-session-expira-f8c1b8f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24669%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd8f9fa50a62f766497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24668-cwe-284-improper-access-control-in--80d3ed64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24668%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f766493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24667-cwe-613-insufficient-session-expira-683c6237</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24667%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f76648f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24666-cwe-352-cross-site-request-forgery--5852c27a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24666%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f76648b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24665-cwe-79-improper-neutralization-of-i-c873464b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24665%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd8f9fa50a62f766488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24774-cwe-841-improper-enforcement-of-beh-1a435a61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24774%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd9f9fa50a62f767686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24773-cwe-639-authorization-bypass-throug-c3909f60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24773%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd9f9fa50a62f767679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24674-cwe-79-improper-neutralization-of-i-d9b0eb15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24674%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f7664ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24673-cwe-434-unrestricted-upload-of-file-59e52bf4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24673%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f7664a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24672-cwe-79-improper-neutralization-of-i-c7b1d13a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24672%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd8f9fa50a62f7664a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24671-cwe-79-improper-neutralization-of-i-c3d6a6da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24671%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f7664a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24670-cwe-284-improper-access-control-in--40136907</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24670%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f76649d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24664-cwe-204-observable-response-discrep-832f3070</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24664%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd6f9fa50a62f76638d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1568-cwe-347-improper-verification-of-cry-723aa830</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1568%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Rapid7%20Vulnerability%20Management&amp;severity=critical&amp;id=69822999f9fa50a62fd3ce12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-fixes-critical-ask-gordon-ai-flaw-allowing--a13814cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Fixes%20Critical%20Ask%20Gordon%20AI%20Flaw%20Allowing%20Code%20Execution%20via%20Image%20Metadata&amp;severity=critical&amp;id=6983125df9fa50a62f7d2aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23794-cwe-79-improper-neutralization-of-i-0843fb34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=medium&amp;id=69821482f9fa50a62fceb336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23795-cwe-611-improper-restriction-of-xml-0af39dea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23795%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=medium&amp;id=69821482f9fa50a62fceb33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1814-cwe-331-insufficient-entropy-in-rapi-2e82bb61</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1814%3A%20CWE-331%20Insufficient%20Entropy%20in%20Rapid7%20InsightVM%2FNexpose&amp;severity=medium&amp;id=698210fef9fa50a62fce298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14550-cwe-407-inefficient-algorithmic-com-c6ea672a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14550%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=69820d79f9fa50a62fcd6037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1312-cwe-89-improper-neutralization-of-sp-c1fc6281</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1312%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd604f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1287-cwe-89-improper-neutralization-of-sp-15ffb705</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1287%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd604a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1285-cwe-407-inefficient-algorithmic-comp-78e15559</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1285%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=69820d79f9fa50a62fcd6045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1207-cwe-89-improper-neutralization-of-sp-15490eb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1207%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd6040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13473-cwe-208-observable-timing-discrepan-e5c863de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13473%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd6032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5319-cwe-89-improper-neutralization-of-sp-0c35b7ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5319%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Emit%20Informatics%20and%20Communication%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20DIGITA%20Efficiency%20Management%20System&amp;severity=critical&amp;id=69820d79f9fa50a62fcd603d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25036-missing-authorization-in-wp-chill-p-512b99ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25036%3A%20Missing%20Authorization%20in%20WP%20Chill%20Passster&amp;severity=medium&amp;id=6982067bf9fa50a62fcb3e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25028-missing-authorization-in-element-in-fd98d27d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25028%3A%20Missing%20Authorization%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6982067bf9fa50a62fcb3e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25027-improper-control-of-filename-for-in-a2342b8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25027%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Unicamp&amp;severity=high&amp;id=6982067bf9fa50a62fcb3e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25024-cross-site-request-forgery-csrf-in--662ab1b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25024%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Blair%20Williams%20ThirstyAffiliates&amp;severity=medium&amp;id=6982067bf9fa50a62fcb3e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25023-exposure-of-sensitive-system-inform-b59e83cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25023%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20mdedev%20Run%20Contests%2C%20Raffles%2C%20and%20Giveaways%20with%20ContestsWP&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25022-improper-neutralization-of-special--995c316d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25022%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Iqonic%20Design%20KiviCare&amp;severity=high&amp;id=6982067af9fa50a62fcb3e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25021-missing-authorization-in-mizan-them-c1fd0679</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25021%3A%20Missing%20Authorization%20in%20Mizan%20Themes%20Mizan%20Demo%20Importer&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25020-missing-authorization-in-wp-connect-c410c418</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25020%3A%20Missing%20Authorization%20in%20WP%20connect%20WP%20Sync%20for%20Notion&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25019-missing-authorization-in-vito-peleg-ce990a25</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25019%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25016-missing-authorization-in-nelio-soft-0ffdca0e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25016%3A%20Missing%20Authorization%20in%20Nelio%20Software%20Nelio%20Popups&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25015-cross-site-request-forgery-csrf-in--3d88aeb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25015%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stiofan%20UsersWP&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25014-cross-site-request-forgery-csrf-in--f77d18d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25014%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themelooks%20Enter%20Addons&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25012-missing-authorization-in-gfazioli-w-0f8cb5ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25012%3A%20Missing%20Authorization%20in%20gfazioli%20WP%20Bannerize%20Pro&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25011-missing-authorization-in-northern-b-1511f03a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25011%3A%20Missing%20Authorization%20in%20Northern%20Beaches%20Websites%20WP%20Custom%20Admin%20Interface&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25010-missing-authorization-in-illid-shar-d200709f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25010%3A%20Missing%20Authorization%20in%20ILLID%20Share%20This%20Image&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24998-exposure-of-sensitive-system-inform-46d6c32d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24998%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Hustle&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24997-missing-authorization-in-wired-impa-3e744f48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24997%3A%20Missing%20Authorization%20in%20Wired%20Impact%20Wired%20Impact%20Volunteer%20Management&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24996-missing-authorization-in-wpelemento-f93a2d5b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24996%3A%20Missing%20Authorization%20in%20wpelemento%20WPElemento%20Importer&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24995-missing-authorization-in-iulia-caza-92683b75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24995%3A%20Missing%20Authorization%20in%20Iulia%20Cazan%20Latest%20Post%20Shortcode&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24994-missing-authorization-in-sunshineph-e2ea7299</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24994%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24992-insertion-of-sensitive-information--d82a0356</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24992%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPFactory%20Advanced%20WooCommerce%20Product%20Sales%20Reporting&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24991-authorization-bypass-through-user-c-9d633bbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24991%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20HT%20Plugins%20Extensions%20For%20CF7&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24990-missing-authorization-in-fahad-mahm-8cfb29bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24990%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20WP%20Docs&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24988-improper-neutralization-of-input-du-e8fa762f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brian%20Hogg%20The%20Events%20Calendar%20Shortcode%20%26amp%3B%20Block&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24986-cross-site-request-forgery-csrf-in--84152fb5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24986%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp.insider%20Simple%20Membership%20WP%20user%20Import&amp;severity=medium&amp;id=69820676f9fa50a62fcb3da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24985-missing-authorization-in-approveme--8aba0016</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24985%3A%20Missing%20Authorization%20in%20approveme%20WP%20Forms%20Signature%20Contract%20Add-On&amp;severity=medium&amp;id=69820676f9fa50a62fcb3da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24984-missing-authorization-in-brecht-vis-382f1ebe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24984%3A%20Missing%20Authorization%20in%20Brecht%20Visual%20Link%20Preview&amp;severity=medium&amp;id=69820676f9fa50a62fcb3da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24982-missing-authorization-in-brainstorm-42864172</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24982%3A%20Missing%20Authorization%20in%20Brainstorm%20Force%20Spectra&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24967-missing-authorization-in-ameliabook-5a1ef234</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24967%3A%20Missing%20Authorization%20in%20ameliabooking%20Amelia&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24966-cross-site-request-forgery-csrf-in--39ade7d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24966%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Copyscape%20Copyscape%20Premium&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24965-missing-authorization-in-wasiliy-st-6a139262</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24965%3A%20Missing%20Authorization%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24962-cross-site-request-forgery-csrf-in--9d30c429</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24962%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Brainstorm%20Force%20Sigmize&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24961-server-side-request-forgery-ssrf-in-ae5b2f1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24961%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemeGoods%20Grand%20Blog&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24958-improper-neutralization-of-input-du-1ac57776</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24958%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24957-missing-authorization-in-wp-chill-s-42a6953e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24957%3A%20Missing%20Authorization%20in%20WP%20Chill%20Strong%20Testimonials&amp;severity=medium&amp;id=69820673f9fa50a62fcb3ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24954-deserialization-of-untrusted-data-i-95f5726a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24954%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=high&amp;id=69820673f9fa50a62fcb3ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24952-improper-neutralization-of-input-du-06452c9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69820673f9fa50a62fcb3ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24951-missing-authorization-in-saad-iqbal-fabde56a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24951%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20myCred&amp;severity=medium&amp;id=69820673f9fa50a62fcb3ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24947-missing-authorization-in-la-studio--1a892bc5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24947%3A%20Missing%20Authorization%20in%20LA-Studio%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24945-missing-authorization-in-themefic-u-6adb953d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24945%3A%20Missing%20Authorization%20in%20Themefic%20Ultimate%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24942-cross-site-request-forgery-csrf-in--cb2e92f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24942%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24940-missing-authorization-in-themefic-t-67568d6e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24940%3A%20Missing%20Authorization%20in%20Themefic%20Travelfic%20Toolkit&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24939-missing-authorization-in-wp-chill-m-2d51a39c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24939%3A%20Missing%20Authorization%20in%20WP%20Chill%20Modula%20Image%20Gallery&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24938-improper-neutralization-of-input-du-b2113b3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Better%20Search&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-metro4shell-rce-flaw-in-react-nati-583d977e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Metro4Shell%20RCE%20Flaw%20in%20React%20Native%20CLI%20npm%20Package&amp;severity=critical&amp;id=6983125df9fa50a62f7d2aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react-native-vulnerability-exploited-in-t-c5f4341d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React%20Native%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=698202baf9fa50a62fca56c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-allows-hackers-to-hijack-openclaw-ai-20ce9799</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20Allows%20Hackers%20to%20Hijack%20OpenClaw%20AI%20Assistant&amp;severity=critical&amp;id=6981ff36f9fa50a62fc98e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-and-monitoring-openclaw-clawdbot-moltbot-0a61ac8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20and%20Monitoring%20OpenClaw%20(clawdbot%2C%20moltbot)%2C%20(Tue%2C%20Feb%203rd)&amp;severity=medium&amp;id=69831349f9fa50a62f7d42bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7760-cwe-79-improper-neutralization-of-in-a9105f8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ofisimo%20Web-Based%20Software%20Technologies%20Association%20Web%20Package%20Flora&amp;severity=high&amp;id=6981edd5f9fa50a62fc5ae12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leak-51-million-panera-bread-records-da8bcba7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Leak%205.1%20Million%20Panera%20Bread%20Records&amp;severity=medium&amp;id=6981ea1ef9fa50a62fc4166e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6397-cwe-79-improper-neutralization-of-in-2087d065</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ankara%20Hosting%20Website%20Design%20Website%20Software&amp;severity=high&amp;id=6981ea60f9fa50a62fc43b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-supply-chain-attack-breakdown-c81f1b9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20supply%20chain%20attack%20breakdown&amp;severity=medium&amp;id=69821f0cf9fa50a62fd06c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1664-cwe-639-authorization-bypass-through-8a0cc424</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1664%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key&amp;severity=medium&amp;id=6981e349f9fa50a62fc25650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11598-cwe-359-exposure-of-private-persona-dfd2833c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11598%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Centralny%20O%C5%9Brodek%20Informatyki%20mObywatel&amp;severity=low&amp;id=6981dfc7f9fa50a62fc15520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russias-apt28-rapidly-weaponizes-newly-patched-off-9d7af1f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%E2%80%99s%20APT28%20Rapidly%20Weaponizes%20Newly%20Patched%20Office%20Vulnerability&amp;severity=medium&amp;id=6981dc0ef9fa50a62fc009a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1432-cwe-89-improper-neutralization-of-sp-cf0635ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1432%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20T-Systems%20Buroweb&amp;severity=critical&amp;id=6981dc51f9fa50a62fc0247c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-cloud-outages-ripple-across-the-internet-e209c4c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Cloud%20Outages%20Ripple%20Across%20the%20Internet&amp;severity=high&amp;id=6983125df9fa50a62f7d2aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67857-insertion-of-sensitive-information--6a15e9ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67857%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data&amp;severity=medium&amp;id=69821b8cf9fa50a62fcf9c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67856-179fb517</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67856&amp;severity=medium&amp;id=69821b8cf9fa50a62fcf9c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67855-improper-neutralization-of-input-du-e3a836cf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=69821b8cf9fa50a62fcf9c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67853-improper-restriction-of-excessive-a-53304999</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67853%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&amp;severity=high&amp;id=69821b8cf9fa50a62fcf9c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67852-url-redirection-to-untrusted-site-o-bace6e1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67852%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)&amp;severity=low&amp;id=69821b8cf9fa50a62fcf9c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67851-improper-neutralization-of-formula--d13a40ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67851%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File&amp;severity=medium&amp;id=6982fcd9f9fa50a62f767693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67850-improper-neutralization-of-input-du-8bb2e59b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67849-improper-neutralization-of-input-du-f0e4d716</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67849%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67848-improper-handling-of-insufficient-p-11d090d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67848%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59902-cwe-79-improper-neutralization-of-i-cb794028</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NICE%20NICE%20Chat&amp;severity=high&amp;id=69823426f9fa50a62fd6b737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41065-cwe-79-improper-neutralization-of-i-1f0804d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41065%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Luna%20Imaging%20LUNA&amp;severity=medium&amp;id=69823426f9fa50a62fd6b734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt28-uses-microsoft-office-cve-2026-21509-in-espi-a350f095</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT28%20Uses%20Microsoft%20Office%20CVE-2026-21509%20in%20Espionage-Focused%20Malware%20Attacks&amp;severity=medium&amp;id=6983125df9fa50a62f7d2aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8461-cwe-79-improper-neutralization-of-in-91f90918</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Seres%20Software%20syWEB&amp;severity=high&amp;id=6981b919f9fa50a62fb2b79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8456-cwe-79-improper-neutralization-of-in-882d06a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8456%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kod8%20Software%20Technologies%20Trade%20Ltd.%20Co.%20Kod8%20Individual%20and%20SME%20Website&amp;severity=high&amp;id=6981b595f9fa50a62fb1f690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-chrysalis-backdoor-a-deep-dive-into-lotus-blos-7bbdc6d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Chrysalis%20Backdoor%3A%20A%20Deep%20Dive%20into%20Lotus%20Blossom&apos;s%20toolkit&amp;severity=medium&amp;id=6981b210f9fa50a62fafd65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1592-cwe-79-improper-neutralization-of-in-a6128ea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1592%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=6981ae8df9fa50a62faf0c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1591-cwe-79-improper-neutralization-of-in-b893cd0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=6981ae8df9fa50a62faf0c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1730-cwe-434-unrestricted-upload-of-file--cbb4a663</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1730%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20skirridsystems%20OS%20DataHub%20Maps&amp;severity=high&amp;id=6981ab4df9fa50a62fae40d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1371-cwe-200-exposure-of-sensitive-inform-a38ab61b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1371%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6981ab4df9fa50a62fae40c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1375-cwe-639-authorization-bypass-through-29a9cae7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1375%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=6981ab4df9fa50a62fae40ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8590-cwe-200-exposure-of-sensitive-inform-5729c7a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8590%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AKCE%20Software%20Technology%20R%26D%20Industry%20and%20Trade%20Inc.%20SKSPro&amp;severity=high&amp;id=6981a400f9fa50a62facb80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8589-cwe-79-improper-neutralization-of-in-2493d852</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AKCE%20Software%20Technology%20R%26D%20Industry%20and%20Trade%20Inc.%20SKSPro&amp;severity=high&amp;id=6981a400f9fa50a62facb80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24465-stack-based-buffer-overflow-in-elec-35d69429</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24465%3A%20Stack-based%20buffer%20overflow%20in%20ELECOM%20CO.%2CLTD.%20WAB-S733IW2-PD&amp;severity=critical&amp;id=6981a07df9fa50a62fabfc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24449-use-of-weak-credentials-in-elecom-c-6195e038</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24449%3A%20Use%20of%20weak%20credentials%20in%20ELECOM%20CO.%2CLTD.%20WRC-X1500GS-B&amp;severity=medium&amp;id=6981a07df9fa50a62fabfc5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22550-improper-neutralization-of-special--77e831ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22550%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRC-X1500GS-B&amp;severity=high&amp;id=6981a07df9fa50a62fabfc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20704-cross-site-request-forgery-csrf-in--688ce2f1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20704%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20ELECOM%20CO.%2CLTD.%20WRC-X1500GS-B&amp;severity=medium&amp;id=6981a07df9fa50a62fabfc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1447-cwe-352-cross-site-request-forgery-c-d6ed4597</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1447%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20getwpfunnels%20Mail%20Mint%20%E2%80%93%20Email%20Marketing%2C%20Newsletter%2C%20Email%20Automation%20%26%20WooCommerce%20Emails&amp;severity=medium&amp;id=69819975f9fa50a62faa53cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1058-cwe-79-improper-neutralization-of-in-f5ac77e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69819975f9fa50a62faa53b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1210-cwe-79-improper-neutralization-of-in-9ebaaad9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1210%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69819975f9fa50a62faa53c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1065-cwe-434-unrestricted-upload-of-file--c9fe553b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1065%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69819975f9fa50a62faa53bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0617-cwe-79-improper-neutralization-of-in-d5e79671</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=69819975f9fa50a62faa53af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58381-cwe-35-path-traversal-in-brocade-fa-ff5304b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58381%3A%20CWE-35%3A%20Path%20Traversal%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=69818ee8f9fa50a62fa7da8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mozilla-adds-one-click-option-to-disable-generativ-e233d72a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mozilla%20Adds%20One-Click%20Option%20to%20Disable%20Generative%20AI%20Features%20in%20Firefox&amp;severity=low&amp;id=6981b662f9fa50a62fb2320f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0950-cwe-200-exposure-of-sensitive-inform-f3102e6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0950%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20brainstormforce%20Spectra%20Gutenberg%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=medium&amp;id=69818b64f9fa50a62fa73b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14274-cwe-79-improper-neutralization-of-i-cddbffa3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14274%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=69818b64f9fa50a62fa73b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24694-uncontrolled-search-path-element-in-bab4bf19</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24694%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Roland%20Corporation%20Roland%20Cloud%20Manager&amp;severity=high&amp;id=69818b64f9fa50a62fa73b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9711-cwe-272-least-privilege-violation-in-26a33153</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9711%3A%20CWE-272%3A%20Least%20Privilege%20Violation%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=69818b64f9fa50a62fa73b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58380-cwe-35-path-traversal-in-brocade-fa-1d7784fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58380%3A%20CWE-35%3A%20Path%20Traversal%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=69818461f9fa50a62fa607ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-hosting-breach-attributed-to-china-linked--30b9c561</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Hosting%20Breach%20Attributed%20to%20China-Linked%20Lotus%20Blossom%20Hacking%20Group&amp;severity=medium&amp;id=698180a3f9fa50a62fa53d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0383-cwe-78-improper-neutralization-of-sp-58f3f0d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0383%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=6981764df9fa50a62fa17c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24936-cwe-20-improper-input-validation-in-17d71855</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24936%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ASUSTOR%20ADM&amp;severity=critical&amp;id=6981764df9fa50a62fa17c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0909-cwe-639-authorization-bypass-through-55ffa7bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0909%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20alimir%20WP%20ULike%20%E2%80%93%20Like%20%26%20Dislike%20Buttons%20for%20Engagement%20and%20Feedback&amp;severity=medium&amp;id=6981764df9fa50a62fa17c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1788-cwe-787-out-of-bounds-write-in-xquic-eb13681d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1788%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Xquic%20Project%20Xquic%20Server&amp;severity=medium&amp;id=6981764df9fa50a62fa17c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24935-cwe-295-improper-certificate-valida-8db5c61e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24935%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=6981ab4df9fa50a62fae40e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24934-cwe-295-improper-certificate-valida-c90c42dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24934%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=6981ab4df9fa50a62fae40e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24933-cwe-295-improper-certificate-valida-0f223701</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24933%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=6981ab4df9fa50a62fae40df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24932-cwe-295-improper-certificate-valida-51c30f9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24932%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=6981ab4df9fa50a62fae40dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58379-cwe-250-execution-with-unnecessary--4d6c9aa7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58379%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=69815a2df9fa50a62f75462f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58383-cwe-250-execution-with-unnecessary--28045ad1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58383%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=69815a2df9fa50a62f754635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58382-cwe-305-authentication-bypass-by-pr-2712b1cf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58382%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=69815a2df9fa50a62f754632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67482-vulnerability-in-wikimedia-foundati-3ab1abb1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67482%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20Scribunto&amp;severity=low&amp;id=69815a2df9fa50a62f75463a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12774-cwe-312-cleartext-storage-of-sensit-dc98f0cb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12774%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=medium&amp;id=69815a2df9fa50a62f75462c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67476-vulnerability-in-wikimedia-foundati-af667c78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67476%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69814fa1f9fa50a62f7207f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61658-vulnerability-in-wikimedia-foundati-893022c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61658%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69814fa1f9fa50a62f7207ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61653-vulnerability-in-wikimedia-foundati-bd66ea7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61653%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20TextExtracts&amp;severity=low&amp;id=69814fa1f9fa50a62f7207e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61652-vulnerability-in-wikimedia-foundati-c77e99b6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61652%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20DiscussionTools&amp;severity=low&amp;id=69814fa1f9fa50a62f7207e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12773-cwe-209-generation-of-error-message-9a8c085f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12773%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=high&amp;id=69814899f9fa50a62f6fcd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61649-vulnerability-in-wikimedia-foundati-6556cb0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61649%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69814899f9fa50a62f6fcda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61650-cwe-79-improper-neutralization-of-i-c1f4561b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69814899f9fa50a62f6fcda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61646-vulnerability-in-wikimedia-foundati-d6a53ef1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61646%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69814899f9fa50a62f6fcd9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61647-vulnerability-in-wikimedia-foundati-1352debf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61647%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69813e0cf9fa50a62f67cdfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71179-na-4f02fb85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71179%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70849-na-14adde7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70849%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70841-na-87527d63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70841%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd6f9fa50a62f766381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70758-na-edce0892</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70758%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f76637d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70560-na-a1557cbc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70560%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f766379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70559-na-fa1d2f69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70559%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70311-na-719ec484</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70311%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69983-na-b240ae98</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69983%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f76636f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69981-na-ed422e9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69981%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f76636c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69971-na-d9d772c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69971%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f766340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69970-na-40e3c75d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69970%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f76633d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69875-na-cdb5ae5f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69875%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd4f9fa50a62f766339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69848-na-f57d1d43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69848%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f766336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69431-na-b784a65c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69431%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f766332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69430-na-bb7b39df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69430%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f76632f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69429-na-f07f1dd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69429%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f76632c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67189-na-07340f67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67189%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f766329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67188-na-9a3a25b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67188%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f766326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67187-na-ebbbc6cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67187%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f766323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67186-na-edcd0909</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67186%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd3f9fa50a62f766303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65924-na-299b6040</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65924%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd3f9fa50a62f766300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65923-na-b3f5ff7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65923%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd3f9fa50a62f7662fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65875-na-e9002ae9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65875%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63624-na-b2497d1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63624%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd3f9fa50a62f7662f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63372-na-a133bbc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63372%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd3f9fa50a62f7662f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61506-na-3f2c3321</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61506%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd3f9fa50a62f7662e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60865-na-98359347</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60865%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59439-na-7a5713e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59439%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58348-na-cbaee5db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58348%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58347-na-41b153f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58347%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58346-na-72d688ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58346%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58345-na-9fef52b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58345%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58344-na-4d2bb961</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58344%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58343-na-5ad7c576</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58343%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f76629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58342-na-807e1435</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58342%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f76629a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58341-na-a2a814f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58341%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f766296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58340-na-889d6323</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58340%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f766292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57529-na-01c7915e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57529%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd2f9fa50a62f76628e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46651-na-f768328f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46651%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd1f9fa50a62f76625d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-03-a3d53514</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-03&amp;severity=medium&amp;id=69828f56f9fa50a62fec0b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10878-cwe-89-improper-neutralization-of-s-0326dd4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10878%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Insaat%20Fikir%20Odalari%20AdminPando&amp;severity=critical&amp;id=698253c8f9fa50a62fdcb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66374-na-bedcdb2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66374%3A%20n%2Fa&amp;severity=high&amp;id=69823426f9fa50a62fd6b723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-03-8e5385fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-03&amp;severity=low&amp;id=69817d1ff9fa50a62fa3e532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61639-cwe-200-exposure-of-sensitive-infor-31a81168</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61639%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813a88f9fa50a62f66a5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61641-vulnerability-in-wikimedia-foundati-cf54e7c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61641%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813705f9fa50a62f65ad9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61643-vulnerability-in-wikimedia-foundati-b0afc499</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61643%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813705f9fa50a62f65ada3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6589-vulnerability-in-wikimedia-foundatio-28598a3f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6589%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813004f9fa50a62f63a36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6590-cwe-200-exposure-of-sensitive-inform-0472138d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6590%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=medium&amp;id=69813004f9fa50a62f63a36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25228-cwe-22-improper-limitation-of-a-pat-4868ed53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25228%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69813006f9fa50a62f63a41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6592-vulnerability-in-wikimedia-foundatio-2087539a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6592%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20AbuseFilter&amp;severity=low&amp;id=69813004f9fa50a62f63a373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6593-vulnerability-in-wikimedia-foundatio-552c2908</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6593%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813004f9fa50a62f63a376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25222-cwe-200-exposure-of-sensitive-infor-acec093e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25222%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20polarnl%20PolarLearn&amp;severity=medium&amp;id=69813006f9fa50a62f63a418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25221-cwe-352-cross-site-request-forgery--8ef58480</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25221%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20polarnl%20PolarLearn&amp;severity=low&amp;id=69813006f9fa50a62f63a414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6927-vulnerability-in-wikimedia-foundatio-b66a1f9f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6927%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813004f9fa50a62f63a381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25142-cwe-94-improper-control-of-generati-8791321b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25142%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69813006f9fa50a62f63a40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25137-cwe-552-files-or-directories-access-cb236fdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25137%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20NixOS%20nixpkgs&amp;severity=critical&amp;id=69813006f9fa50a62f63a40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealers-without-borders-macos-python-stealers-07ae7015</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealers%20without%20borders%3A%20macOS%2C%20Python%20stealers%2C%20and%20platform%20abuse&amp;severity=medium&amp;id=6981d1b4f9fa50a62fb9d98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12772-cwe-312-cleartext-storage-of-sensit-a95ac02c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12772%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=high&amp;id=69813002f9fa50a62f63a03c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25134-cwe-88-improper-neutralization-of-a-90955f28</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25134%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69813005f9fa50a62f63a3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25060-cwe-599-missing-validation-of-opens-937f34e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25060%3A%20CWE-599%3A%20Missing%20Validation%20of%20OpenSSL%20Certificate%20in%20OpenListTeam%20OpenList&amp;severity=high&amp;id=69813005f9fa50a62f63a3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25059-cwe-22-improper-limitation-of-a-pat-745d502d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25059%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenListTeam%20OpenList&amp;severity=high&amp;id=69813005f9fa50a62f63a3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36194-cwe-1262-improper-access-control-fo-96d3a201</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36194%3A%20CWE-1262%20Improper%20Access%20Control%20for%20Register%20Interface%20in%20IBM%20PowerVM%20Hypervisor&amp;severity=low&amp;id=69813002f9fa50a62f63a042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36238-cwe-497-exposure-of-sensitive-syste-79eaf296</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36238%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20PowerVM%20Hypervisor&amp;severity=medium&amp;id=69813002f9fa50a62f63a045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36253-cwe-759-use-of-a-one-way-hash-witho-8e816f27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36253%3A%20CWE-759%20Use%20of%20a%20One-Way%20Hash%20without%20a%20Salt%20in%20IBM%20Concert&amp;severity=medium&amp;id=69813002f9fa50a62f63a048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36436-cwe-79-improper-neutralization-of-i-fb05570e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=69813002f9fa50a62f63a04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12679-cwe-312-cleartext-storage-of-sensit-b2708941</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12679%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=high&amp;id=69813002f9fa50a62f63a035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66480-cwe-22-improper-limitation-of-a-pat-f9b78ea6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66480%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wildfirechat%20im-server&amp;severity=critical&amp;id=69813002f9fa50a62f63a04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69207-cwe-639-authorization-bypass-throug-43fcd7bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69207%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20khoj-ai%20khoj&amp;severity=medium&amp;id=69813002f9fa50a62f63a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22778-cwe-532-insertion-of-sensitive-info-0fbec5f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22778%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20vllm-project%20vllm&amp;severity=critical&amp;id=69813004f9fa50a62f63a39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13096-cwe-918-server-side-request-forgery-8fe02f54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13096%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=high&amp;id=69813002f9fa50a62f63a03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22780-cwe-770-allocation-of-resources-wit-d9804ba4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22780%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20rizinorg%20rizin&amp;severity=medium&amp;id=69813004f9fa50a62f63a3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12680-cwe-256-plaintext-storage-of-a-pass-b8f3474b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12680%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Brocade%20SANnav&amp;severity=medium&amp;id=69813002f9fa50a62f63a039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23476-cwe-79-improper-neutralization-of-i-7acc7f94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23476%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=medium&amp;id=69813004f9fa50a62f63a3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23515-cwe-78-improper-neutralization-of-s-832cd743</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23515%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=69813004f9fa50a62f63a3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24040-cwe-362-concurrent-execution-using--4721980a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24040%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parallax%20jsPDF&amp;severity=medium&amp;id=69813005f9fa50a62f63a3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24043-cwe-74-improper-neutralization-of-s-86f1965d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24043%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20parallax%20jsPDF&amp;severity=medium&amp;id=69813005f9fa50a62f63a3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24133-cwe-770-allocation-of-resources-wit-9a7fcc49</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24133%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69813005f9fa50a62f63a3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24737-cwe-116-improper-encoding-or-escapi-a9824d9e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24737%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69813005f9fa50a62f63a3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23997-cwe-79-improper-neutralization-of-i-c1ff4e64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23997%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=high&amp;id=69813005f9fa50a62f63a3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0924-cwe-362-concurrent-execution-using-s-a2653c7f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0924%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Dr.Buho%20BuhoCleaner&amp;severity=high&amp;id=69813004f9fa50a62f63a392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1778-cwe-295-improper-certificate-validat-8c1863c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1778%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20AWS%20SageMaker%20Python%20SDK&amp;severity=medium&amp;id=69813004f9fa50a62f63a39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1777-cwe-319-cleartext-transmission-of-se-6c7a47ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1777%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20AWS%20SageMaker%20Python%20SDK&amp;severity=high&amp;id=69813004f9fa50a62f63a397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24007-cwe-352-cross-site-request-forgery--e9478fd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24007%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69813005f9fa50a62f63a3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24051-cwe-426-untrusted-search-path-in-op-0b813398</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24051%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20open-telemetry%20opentelemetry-go&amp;severity=high&amp;id=69813005f9fa50a62f63a3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-dropbox-phishing-campaign-via-pdf-and-cloud-s-ae7e8863</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Dropbox%20Phishing%20Campaign%20via%20PDF%20and%20Cloud%20Storage&amp;severity=medium&amp;id=698105ccf9fa50a62f55d511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22229-cwe-78-improper-neutralization-of-s-4fa10250</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22229%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22227-cwe-78-improper-neutralization-of-s-69860cb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22227%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22226-cwe-78-improper-neutralization-of-s-104e12d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22226%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22225-cwe-78-improper-neutralization-of-s-29b4cdf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22225%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22224-cwe-78-improper-neutralization-of-s-bac7f152</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22224%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22223-cwe-78-improper-neutralization-of-s-dc5d7404</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22223%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20System%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22222-cwe-78-improper-neutralization-of-s-176a439f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22222%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-341-malicious-clawhub-skills-stea-1b7d1ac6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20341%20Malicious%20ClawHub%20Skills%20Stealing%20Data%20from%20OpenClaw%20Users&amp;severity=medium&amp;id=6981b662f9fa50a62fb23212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0631-cwe-78-improper-neutralization-of-sp-495e182f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0631%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0630-cwe-78-improper-neutralization-of-sp-9fdbb9a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0630%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22221-cwe-78-improper-neutralization-of-s-d9128518</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22221%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-does-cyberthreat-attribution-help-in-practice-108625a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20does%20cyberthreat%20attribution%20help%20in%20practice%3F&amp;severity=medium&amp;id=6980e37ff9fa50a62f4d7d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-bug-enables-one-click-remote-code-executi-f29b9ca2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Bug%20Enables%20One-Click%20Remote%20Code%20Execution%20via%20Malicious%20Link&amp;severity=critical&amp;id=6981b662f9fa50a62fb23215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1232-cwe-693-in-beyondtrust-privilege-man-412ace57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1232%3A%20CWE-693%20in%20BeyondTrust%20Privilege%20management%20for%20Windows&amp;severity=medium&amp;id=6980d112f9fa50a62f4a9b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-begins-ntlm-phase-out-with-three-stage-p-db4e373f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Begins%20NTLM%20Phase-Out%20With%20Three-Stage%20Plan%20to%20Move%20Windows%20to%20Kerberos&amp;severity=low&amp;id=6981b662f9fa50a62fb23218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-branded-extortion-activity-expands-es-ad2675a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters-Branded%20Extortion%20Activity%20Expands%2C%20Escalates&amp;severity=medium&amp;id=6980c2cef9fa50a62f489931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47402-cwe-126-buffer-over-read-in-qualcom-3ec9d46f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47402%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6980c31af9fa50a62f48b600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47399-cwe-120-buffer-copy-without-checkin-eb928ffb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47399%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47398-cwe-416-use-after-free-in-qualcomm--b317978c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47398%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47397-cwe-401-improper-release-of-memory--6e3d77ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47397%3A%20CWE-401%20Improper%20Release%20of%20Memory%20Before%20Removing%20Last%20Reference%20(&apos;Memory%20Leak&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47366-cwe-749-exposed-dangerous-method-or-e6e6d67e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47366%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47364-cwe-190-integer-overflow-or-wraparo-00adc77f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47364%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6980c319f9fa50a62f48b5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47363-cwe-190-integer-overflow-or-wraparo-d90611a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47363%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6980c319f9fa50a62f48b5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47359-cwe-416-use-after-free-in-qualcomm--247902eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47359%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47358-cwe-416-use-after-free-in-qualcomm--1f021da9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47358%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14914-cwe-22-in-ibm-websphere-application-8b17a92a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14914%3A%20CWE-22%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=high&amp;id=6980c319f9fa50a62f48b5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-for-exposed-anthropic-models-mon-feb-2nd-311eb122</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20for%20exposed%20Anthropic%20Models%2C%20(Mon%2C%20Feb%202nd)&amp;severity=medium&amp;id=6980c2e6f9fa50a62f48a1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15395-cwe-863-incorrect-authorization-in--00702f39</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15395%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Jazz%20Foundation&amp;severity=medium&amp;id=6980c319f9fa50a62f48b5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1703-cwe-22-improper-limitation-of-a-path-cec10edf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1703%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Packaging%20Authority%20pip&amp;severity=low&amp;id=6980bf7df9fa50a62f481764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-publisher-account-hijacked-in-fresh-glass-4095a4bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20Publisher%20Account%20Hijacked%20in%20Fresh%20GlassWorm%20Attack&amp;severity=medium&amp;id=6980b13af9fa50a62f450ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1760-inconsistent-interpretation-of-http--e8c3b5d3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1760%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6980b180f9fa50a62f4545f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1761-stack-based-buffer-overflow-in-red-h-5ed2e51a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1761%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=6980b180f9fa50a62f4545f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1186-cwe-22-improper-limitation-of-a-path-f73661f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1186%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ABC%20PRO%20SP.%20Z%20O.O.%20EAP%20Legislator&amp;severity=high&amp;id=6980b180f9fa50a62f4545f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/default-ics-credentials-exploited-in-destructive-a-7fb05b57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Default%20ICS%20Credentials%20Exploited%20in%20Destructive%20Attack%20on%20Polish%20Energy%20Facilities&amp;severity=medium&amp;id=6980adb6f9fa50a62f443467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2nd-february-threat-intelligence-report-bd9882a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2nd%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6980aa66f9fa50a62f4395c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24071-cwe-367-time-of-check-time-of-use-t-0e091344</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24071%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Native%20Instruments%20Native%20Access&amp;severity=high&amp;id=6980aa65f9fa50a62f439594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24070-cwe-426-untrusted-search-path-in-na-d3bf89df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24070%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Native%20Instruments%20Native%20Access&amp;severity=high&amp;id=6980aa65f9fa50a62f439591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8587-cwe-89-improper-neutralization-of-sp-f35da5ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8587%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AKCE%20Software%20Technology%20R%26D%20Industry%20and%20Trade%20Inc.%20SKSPro&amp;severity=high&amp;id=6980a35df9fa50a62f42094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1757-missing-release-of-memory-after-effe-a0b6fc76</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1757%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69809c55f9fa50a62f409541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-malware-and-cyberattacks-in-th-6a9c8fc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Malware%20and%20Cyberattacks%20in%20the%20Age%20of%20AI&amp;severity=medium&amp;id=6980951af9fa50a62f3e2ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-proxy-botnet-office-zero-day-mongodb--1079d903</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Proxy%20Botnet%2C%20Office%20Zero-Day%2C%20MongoDB%20Ransoms%2C%20AI%20Hijacks%20%26%20New%20Threats&amp;severity=medium&amp;id=6981b662f9fa50a62fb2321b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-1400-mongodb-databases-ransacked-by-threat-ac-fefda5fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%201%2C400%20MongoDB%20Databases%20Ransacked%20by%20Threat%20Actor&amp;severity=medium&amp;id=69809196f9fa50a62f3c3e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-moves-closer-to-disabling-ntlm-52adee71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Moves%20Closer%20to%20Disabling%20NTLM&amp;severity=medium&amp;id=69808e12f9fa50a62f3b0342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-you-need-assistance-8f4fd974</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%2C%20You%20Need%20Assistance!&amp;severity=medium&amp;id=698083b8f9fa50a62f37054c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0599-cwe-400-uncontrolled-resource-consum-d7b2482e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0599%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20huggingface%20huggingface%2Ftext-generation-inference&amp;severity=high&amp;id=698083b8f9fa50a62f37059e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5986-cwe-73-external-control-of-file-name-d80fe82d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5986%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=critical&amp;id=698083b8f9fa50a62f37058f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7105-cwe-400-uncontrolled-resource-consum-c2e5f2b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7105%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=698083b8f9fa50a62f37059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2356-cwe-29-path-traversal-filename-in-pa-ce230c5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2356%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=critical&amp;id=698083b8f9fa50a62f370582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5386-cwe-1125-excessive-attack-surface-in-58c2e960</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5386%3A%20CWE-1125%20Excessive%20Attack%20Surface%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=698083b8f9fa50a62f37058b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6208-cwe-400-uncontrolled-resource-consum-4339b4ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6208%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=698083b8f9fa50a62f370596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10279-cwe-379-creation-of-temporary-file--5f6c9a35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10279%3A%20CWE-379%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=698083b8f9fa50a62f370592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4147-cwe-1220-insufficient-granularity-of-fcdfdfa3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4147%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=698083b8f9fa50a62f370586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1117-cwe-284-improper-access-control-in-p-16cd6feb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1117%3A%20CWE-284%20Improper%20Access%20Control%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=6980792cf9fa50a62f31f217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-supply-chain-hack-conducted-by-china-via-h-df9cd168</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Supply%20Chain%20Hack%20Conducted%20by%20China%20via%20Hosting%20Provider&amp;severity=medium&amp;id=69806e6ef9fa50a62f2d9060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54263-cwe-98-improper-control-of-filename-73d2c584</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54263%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Talemy%20Spirit%20Framework&amp;severity=high&amp;id=69806eb0f9fa50a62f2dba76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9974-vulnerability-in-nokia-nokia-ont-c7bc3643</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9974%3A%20Vulnerability%20in%20Nokia%20Nokia%20ONT&amp;severity=high&amp;id=69806b1df9fa50a62f2c3c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-official-update-mechanism-hijacked-to-deli-9a7db83a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Official%20Update%20Mechanism%20Hijacked%20to%20Deliver%20Malware%20to%20Select%20Users&amp;severity=low&amp;id=6981b662f9fa50a62fb23221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20419-cwe-754-improper-check-for-unusual--c4e4a49c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20419%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20418-cwe-787-out-of-bounds-write-in-medi-dcb95681</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20418%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=critical&amp;id=69806094f9fa50a62f0b3fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20417-cwe-787-out-of-bounds-write-in-medi-0b0410a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20417%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20415-cwe-415-double-free-in-mediatek-inc-f332af50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20415%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20414-cwe-416-use-after-free-in-mediatek--55737f91</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20414%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20413-cwe-1285-specified-index-position-o-cfb947da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20413%3A%20CWE-1285%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20412-cwe-787-out-of-bounds-write-in-medi-45313a05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20412%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806094f9fa50a62f0b3fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20411-cwe-416-use-after-free-in-mediatek--fb6d4f1a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20411%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806094f9fa50a62f0b3fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20410-cwe-787-out-of-bounds-write-in-medi-260a2dbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20410%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20409-cwe-787-out-of-bounds-write-in-medi-59af0c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20409%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806092f9fa50a62f0b3f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20408-cwe-122-heap-overflow-in-mediatek-i-46f3fc29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20408%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806092f9fa50a62f0b3f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20407-cwe-787-out-of-bounds-write-in-medi-9d5cd63b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20407%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=critical&amp;id=69806092f9fa50a62f0b3f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20406-cwe-770-allocation-of-resources-wit-23191c9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20406%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20405-cwe-617-reachable-assertion-in-medi-3e6421fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20405%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20404-cwe-787-out-of-bounds-write-in-medi-3283e24e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20404%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20403-cwe-787-out-of-bounds-write-in-medi-44e96189</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20403%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20422-cwe-617-reachable-assertion-in-medi-aed96d0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20422%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806096f9fa50a62f0b42d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20421-cwe-125-out-of-bounds-read-in-media-218fedd3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20421%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20402-cwe-787-out-of-bounds-write-in-medi-94eb6596</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20402%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20401-cwe-617-reachable-assertion-in-medi-04e3483c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20401%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20420-cwe-125-out-of-bounds-read-in-media-9dd5d463</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20420%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1518-server-side-request-forgery-ssrf-in--5120fbd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1518%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69805578ac06320222d0c0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22888-improper-handling-of-extra-values-i-9941aaa0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22888%3A%20Improper%20handling%20of%20extra%20values%20in%20Cybozu%2C%20Inc.%20Cybozu%20Garoon&amp;severity=medium&amp;id=69804768ac06320222c3bb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22881-cross-site-scripting-xss-in-cybozu--95b0b9a3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22881%3A%20Cross-site%20scripting%20(XSS)%20in%20Cybozu%2C%20Inc.%20Cybozu%20Garoon&amp;severity=medium&amp;id=69804768ac06320222c3bb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20711-cross-site-scripting-xss-in-cybozu--34a74228</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20711%3A%20Cross-site%20scripting%20(XSS)%20in%20Cybozu%2C%20Inc.%20Cybozu%20Garoon&amp;severity=medium&amp;id=69804768ac06320222c3bb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0658-cwe-352-cross-site-request-forgery-c-29eae45b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0658%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Five%20Star%20Restaurant%20Reservations&amp;severity=medium&amp;id=698043e3ac06320222c1dd0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15396-cwe-79-cross-site-scripting-xss-in--e274366b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15396%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Library%20Viewer&amp;severity=high&amp;id=698043e3ac06320222c1dd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15030-cwe-269-improper-privilege-manageme-7c2c4cdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15030%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20User%20Profile%20Builder&amp;severity=critical&amp;id=698043e3ac06320222c1dd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1530-improper-certificate-validation-in-r-a5c41860</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1530%3A%20Improper%20Certificate%20Validation%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69803cdcac06320222bdf0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1531-improper-certificate-validation-in-r-c5c10b19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1531%3A%20Improper%20Certificate%20Validation%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69803cdcac06320222bdf0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/escan-antivirus-update-servers-compromised-to-deli-01e8d7c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=eScan%20Antivirus%20Update%20Servers%20Compromised%20to%20Deliver%20Multi-Stage%20Malware&amp;severity=medium&amp;id=69806471f9fa50a62f14456f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13881-incorrect-privilege-assignment-in-r-46708347</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13881%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69803cdcac06320222bdf09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1746-sql-injection-in-jeecgboot-a5a79fe7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1746%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=69803cdcac06320222bdf0ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-supply-chain-attack-used-compromised-dev--b944767e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20Supply%20Chain%20Attack%20Used%20Compromised%20Dev%20Account%20to%20Spread%20GlassWorm&amp;severity=medium&amp;id=6980321bac06320222b73f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1745-cross-site-request-forgery-in-source-6d717d8e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1745%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Medical%20Certificate%20Generator%20App&amp;severity=medium&amp;id=698035d4ac06320222b923c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25202-cwe-798-use-of-hard-coded-credentia-9417c5c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25202%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=69802ecbac06320222b5653c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25201-cwe-434-unrestricted-upload-of-file-57fca6fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25201%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=69802ecbac06320222b56539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25200-cwe-434-unrestricted-upload-of-file-fb70b7e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25200%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=69802ecbac06320222b56536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24788-improper-neutralization-of-special--fdeb122d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24788%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RaspAP%20raspap-webgui&amp;severity=high&amp;id=69802ecbac06320222b56532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1744-cross-site-scripting-in-d-link-dsl-6-42a46ae0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1744%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DSL-6641K&amp;severity=medium&amp;id=69802ecbac06320222b5652b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1743-authentication-bypass-by-capture-rep-a2f8a11f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1743%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20DJI%20Mavic%20Mini&amp;severity=low&amp;id=69802440ac06320222ae2d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1742-unrestricted-upload-in-efm-iptime-a8-6d1c4e7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1742%3A%20Unrestricted%20Upload%20in%20EFM%20ipTIME%20A8004T&amp;severity=medium&amp;id=69802440ac06320222ae2d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1741-backdoor-in-efm-iptime-a8004t-a6ce7be2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1741%3A%20Backdoor%20in%20EFM%20ipTIME%20A8004T&amp;severity=high&amp;id=698019b4ac063202228a700f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1740-improper-authentication-in-efm-iptim-0c8f5671</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1740%3A%20Improper%20Authentication%20in%20EFM%20ipTIME%20A8004T&amp;severity=medium&amp;id=698019b4ac063202228a7009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1739-null-pointer-dereference-in-free5gc--ad89dabf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1739%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC%20pcf&amp;severity=medium&amp;id=69800820ac063202227a882f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13348-cwe-862-missing-authorization-in-as-a40e758c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13348%3A%20CWE-862%20Missing%20Authorization%20in%20ASUS%20ASUS%20Business%20Manager&amp;severity=high&amp;id=69800820ac063202227a8823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1738-reachable-assertion-in-open5gs-86c2590e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1738%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=69800820ac063202227a8826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1737-reachable-assertion-in-open5gs-19af8589</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1737%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=697ffd93ac0632022270663c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1736-reachable-assertion-in-open5gs-341c287c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1736%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=697ff68cac06320222673ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1735-command-injection-in-yealink-meeting-8f7075f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1735%3A%20Command%20Injection%20in%20Yealink%20MeetingBar%20A30&amp;severity=low&amp;id=697ff68cac06320222673aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/d-link-dir-825-revb-210-stack-buffer-overflow-dos-247968d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=D-Link%20DIR-825%20Rev.B%202.10%20-%20Stack%20Buffer%20Overflow%20(DoS)&amp;severity=medium&amp;id=6981b62cf9fa50a62fb22405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rpi-jukebox-rfid-280-stored-cross-site-scripting-x-778770e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RPi-Jukebox-RFID%202.8.0%20-%20Stored%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6981b62cf9fa50a62fb22400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/piranha-cms-120-stored-xss-in-text-block-88916144</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Piranha%20CMS%2012.0%20-%20Stored%20XSS%20in%20Text%20Block&amp;severity=medium&amp;id=6981b62cf9fa50a62fb223fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-02-6afab789</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-02&amp;severity=medium&amp;id=69813dd7f9fa50a62f677cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70960-na-2fa73ca9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70960%3A%20n%2Fa&amp;severity=medium&amp;id=69813004f9fa50a62f63a38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70959-na-28dbfa81</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70959%3A%20n%2Fa&amp;severity=medium&amp;id=69813004f9fa50a62f63a38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70958-na-79956a6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70958%3A%20n%2Fa&amp;severity=medium&amp;id=69813004f9fa50a62f63a389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-02-3a16fae5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-02&amp;severity=low&amp;id=6980605bf9fa50a62f0ad30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1734-missing-authorization-in-zhong-bang--4a1d3155</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1734%3A%20Missing%20Authorization%20in%20Zhong%20Bang%20CRMEB&amp;severity=medium&amp;id=697fe4f8ac0632022254f721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1733-improper-authorization-in-zhong-bang-685c81aa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1733%3A%20Improper%20Authorization%20in%20Zhong%20Bang%20CRMEB&amp;severity=medium&amp;id=697fddf0ac06320222500779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-01-f1820db8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-01&amp;severity=medium&amp;id=697febc9ac063202225bd9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-01-8f5478b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-01&amp;severity=low&amp;id=697f430aac06320222f64068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25069-cwe-22-improper-limitation-of-a-pat-afb23a8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25069%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SunFounder%20Pironman%20Dashboard%20(pm_dashboard)&amp;severity=critical&amp;id=697e96fbac063202225694f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/escan-antivirus-delivers-malware-in-supply-chain-a-6bb6e275</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=eScan%20Antivirus%20Delivers%20Malware%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=697e1bbdac063202223b0095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1165-cwe-352-cross-site-request-forgery-c-ca610645</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1165%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Popup%20Box%20%E2%80%93%20Create%20Countdown%2C%20Coupon%2C%20Video%2C%20Contact%20Form%20Popups&amp;severity=medium&amp;id=697e1164ac0632022238f8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14554-cwe-79-improper-neutralization-of-i-b079b282</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hayyatapps%20Sell%20BTC%20%E2%80%93%20Cryptocurrency%20Selling%20%20Calculator&amp;severity=high&amp;id=697e06d8ac0632022235a598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-redkitten-cyber-campaign-targets-human-f0c3bff7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20RedKitten%20Cyber%20Campaign%20Targets%20Human%20Rights%20NGOs%20and%20Activists&amp;severity=medium&amp;id=697f10f7ac06320222d31afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kaspersky-siem-42-update-whats-new-kaspersky-offic-0f27f3c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kaspersky%20SIEM%204.2%20update%20%E2%80%94%20what%E2%80%99s%20new%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=697dd95fac06320222238741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-the-expansion-of-shinyhunters-branded-saa-7c8fee00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20the%20Expansion%20of%20ShinyHunters-Branded%20SaaS%20Data%20Theft&amp;severity=medium&amp;id=6980803af9fa50a62f356ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mandiant-finds-shinyhunters-style-vishing-attacks--65a0fc7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mandiant%20Finds%20ShinyHunters-Style%20Vishing%20Attacks%20Stealing%20MFA%20to%20Breach%20SaaS%20Platforms&amp;severity=medium&amp;id=697dc6a3ac063202221e55f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-polska-details-coordinated-cyber-attacks-on-3-c244f712</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT%20Polska%20Details%20Coordinated%20Cyber%20Attacks%20on%2030%2B%20Wind%20and%20Solar%20Farms&amp;severity=medium&amp;id=697dc6a3ac063202221e55f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1251-cwe-639-authorization-bypass-through-0dcb57e4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1251%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20psmplugins%20SupportCandy%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=medium&amp;id=697da7ecac06320222134c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0683-cwe-89-improper-neutralization-of-sp-4338147b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0683%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20psmplugins%20SupportCandy%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=medium&amp;id=697d9d60ac06320222110317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15525-cwe-863-incorrect-authorization-in--2dc020d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15525%3A%20CWE-863%20Incorrect%20Authorization%20in%20dcooney%20Ajax%20Load%20More%20%E2%80%93%20Infinite%20Scroll%2C%20Load%20More%2C%20%26%20Lazy%20Load&amp;severity=medium&amp;id=697d8bcbac06320222f8a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1431-cwe-862-missing-authorization-in-wpd-11205345</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1431%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=697d8bcbac06320222f8a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15510-cwe-862-missing-authorization-in-we-8fab338d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15510%3A%20CWE-862%20Missing%20Authorization%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=697d6520ac06320222aa2326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-31-45ad8107</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-31&amp;severity=medium&amp;id=697e9a49ac0632022257398d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-31-20d0a565</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-31&amp;severity=low&amp;id=697d9622ac0632022204bcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25156-cwe-79-improper-neutralization-of-i-a714bd99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25156%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kohler%20hotcrp&amp;severity=high&amp;id=697d3064ac06320222828d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1705-cross-site-scripting-in-d-link-dsl-6-4909cbf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1705%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DSL-6641K&amp;severity=medium&amp;id=697d25daac063202227d3694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2668-cwe-789-in-ibm-db2-for-linux-unix-an-c8921221</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2668%3A%20CWE-789%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36001-cwe-674-uncontrolled-recursion-in-i-7ddb6515</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36001%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d363d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36009-cwe-1108-in-ibm-db2-for-linux-unix--d1a2d36c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36009%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36070-cwe-770-allocation-of-resources-wit-d3601657</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36070%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36098-cwe-770-allocation-of-resources-wit-275ba750</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36098%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36123-cwe-770-allocation-of-resources-wit-ebc3dce8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36123%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36184-cwe-250-in-ibm-db2-for-linux-unix-a-befe28b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36184%3A%20CWE-250%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=697d25d9ac063202227d364c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36353-cwe-943-in-ibm-db2-for-linux-unix-a-f0aa8dc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36353%3A%20CWE-943%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d364f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36365-cwe-639-authorization-bypass-throug-2d42b29c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36365%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36366-cwe-943-in-ibm-db2-for-linux-unix-a-dbc5a3b9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36366%3A%20CWE-943%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36384-cwe-428-unquoted-search-path-or-ele-6af37e68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36384%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=697d25daac063202227d367f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36387-cwe-770-allocation-of-resources-wit-3f17f5c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36387%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36407-cwe-1284-improper-validation-of-spe-f7c89e3e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36407%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36423-cwe-1284-improper-validation-of-spe-e52ba2f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36423%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36424-cwe-1284-improper-validation-of-spe-1333e0ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36424%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d368b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36427-cwe-1284-improper-validation-of-spe-0f0a6c97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36427%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d368e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36428-cwe-1284-improper-validation-of-spe-45e0fe3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36428%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36442-cwe-943-in-ibm-db2-for-linux-unix-a-965a2472</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36442%3A%20CWE-943%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d2254ac063202227c9fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1723-cwe-78-improper-neutralization-of-sp-9c7384c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1723%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOTOLINK%20X6000R&amp;severity=critical&amp;id=697d1ed0ac063202227bbb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25141-cwe-94-improper-control-of-generati-0a817c27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25141%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=critical&amp;id=697d1444ac0632022278962a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25130-cwe-78-improper-neutralization-of-s-ca371bc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25130%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20aliasrobotics%20cai&amp;severity=critical&amp;id=697d1444ac06320222789625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25129-cwe-427-uncontrolled-search-path-el-fcd943ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25129%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20bobthecow%20psysh&amp;severity=medium&amp;id=697d1444ac06320222789620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24293-vulnerability-in-rails-activestorag-36ee0cdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24293%3A%20Vulnerability%20in%20Rails%20activestorage&amp;severity=critical&amp;id=697d1444ac0632022278961a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23835-cwe-73-external-control-of-file-nam-e94ac8c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23835%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20lobehub%20lobe-chat&amp;severity=medium&amp;id=697d10c0ac0632022277c27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11175-cwe-917-improper-neutralization-of--002c9475</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11175%3A%20CWE-917%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20DiscussionTools%20Extension&amp;severity=high&amp;id=697d0634ac06320222741993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62349-cwe-287-improper-authentication-in--d6768a4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62349%3A%20CWE-287%20Improper%20Authentication%20in%20Salt%20Project%20Salt&amp;severity=medium&amp;id=697d02b1ac06320222725d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62348-cwe-94-improper-control-of-generati-51d30aa3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62348%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Salt%20Project%20Salt&amp;severity=high&amp;id=697d02b1ac06320222725d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dynowiper-update-technical-analysis-2476835f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DynoWiper%20update%3A%20Technical%20analysis&amp;severity=medium&amp;id=698083b8f9fa50a62f370564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9432-cwe-312-cleartext-storage-of-sensiti-9e16fdbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9432%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=697cfba8ac063202226ddd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-presentations-abused-for-phishing-fri-jan-3-7cfca707</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Presentations%20Abused%20for%20Phishing%2C%20(Fri%2C%20Jan%2030th)&amp;severity=medium&amp;id=697cf0f5ac063202226b8f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-paid-for-being-jailed-googles-68m-se-d0cc372a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Paid%20for%20Being%20Jailed%2C%20Google%E2%80%99s%20%2468M%20Settlement%2C%20CISA%20Chief%E2%80%99s%20ChatGPT%20Leak&amp;severity=medium&amp;id=697cf0e9ac063202226b8b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1702-improper-authorization-in-sourcecode-116a5d0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1702%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=697d09b8ac06320222751064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1701-sql-injection-in-itsourcecode-studen-121bdbc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1701%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697d09b8ac0632022275105d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1700-cross-site-scripting-in-projectworld-0be90a39</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1700%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20House%20Rental%20and%20Property%20Listing&amp;severity=medium&amp;id=697ce690ac0632022267af13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1691-deserialization-in-bolo-solo-6c2c9678</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1691%3A%20Deserialization%20in%20bolo-solo&amp;severity=medium&amp;id=697ce690ac0632022267af0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1690-command-injection-in-tenda-hg10-5ca5522d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1690%3A%20Command%20Injection%20in%20Tenda%20HG10&amp;severity=medium&amp;id=697cdf88ac063202226562a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1689-command-injection-in-tenda-hg10-04c9932c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1689%3A%20Command%20Injection%20in%20Tenda%20HG10&amp;severity=medium&amp;id=697cdf88ac0632022265629a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1688-sql-injection-in-itsourcecode-direct-dfed63ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1688%3A%20SQL%20Injection%20in%20itsourcecode%20Directory%20Management%20System&amp;severity=medium&amp;id=697cd880ac06320222633559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1687-command-injection-in-tenda-hg10-3cd4f732</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1687%3A%20Command%20Injection%20in%20Tenda%20HG10&amp;severity=medium&amp;id=697cd880ac06320222633551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4686-cwe-89-improper-neutralization-of-sp-05c599ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4686%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kodmatic%20Computer%20Software%20Tourism%20Construction%20Industry%20and%20Trade%20Ltd.%20Co.%20Online%20Exam%20and%20Assessment&amp;severity=high&amp;id=697cd880ac0632022263354e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25128-cwe-20-improper-input-validation-in-13ab9ba7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25128%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=697ccdf4ac06320222611087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25050-cwe-202-exposure-of-sensitive-infor-c0c2d2a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25050%3A%20CWE-202%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20vendurehq%20vendure&amp;severity=low&amp;id=697ccdf4ac06320222611083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24855-cwe-79-improper-neutralization-of-i-0f522e38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24855%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=697ccdf4ac0632022261107e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24854-cwe-89-improper-neutralization-of-s-82a5753b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24854%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=697ccdf4ac0632022261107a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7964-cwe-229-improper-handling-of-values--2d7ee87b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7964%3A%20CWE-229%3A%20Improper%20Handling%20of%20Values%20in%20silabs.com%20Silicon%20Labs%20Zigbee%20Stack&amp;severity=critical&amp;id=697ccdf4ac0632022261106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1686-buffer-overflow-in-totolink-a3600r-6b75badd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1686%3A%20Buffer%20Overflow%20in%20Totolink%20A3600R&amp;severity=high&amp;id=697ccdf4ac06320222611072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/175000-exposed-ollama-hosts-could-enable-llm-abuse-aa9f77fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=175%2C000%20Exposed%20Ollama%20Hosts%20Could%20Enable%20LLM%20Abuse&amp;severity=medium&amp;id=697cc335ac063202225d72b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1685-improper-restriction-of-excessive-au-2801b5e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1685%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=697cc6ebac063202225ecfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1684-denial-of-service-in-free5gc-smf-07a599ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1684%3A%20Denial%20of%20Service%20in%20Free5GC%20SMF&amp;severity=medium&amp;id=697cc6ebac063202225ecfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4027-improper-input-validation-in-red-hat-9404e900</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4027%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20OpenShift%20Serverless&amp;severity=high&amp;id=697cbfe4ac063202225ceb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6723-cwe-269-improper-privilege-managemen-d45e9479</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6723%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Progress%20Software%20Chef%20Inspec&amp;severity=medium&amp;id=697cca73ac0632022260359c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1683-denial-of-service-in-free5gc-smf-82eef032</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1683%3A%20Denial%20of%20Service%20in%20Free5GC%20SMF&amp;severity=medium&amp;id=697cca73ac063202226035a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1682-null-pointer-dereference-in-free5gc--80a0232e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1682%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC%20SMF&amp;severity=medium&amp;id=697cca73ac0632022260359f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9226-cwe-79-improper-neutralization-of-in-fa582aa6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20OpManager&amp;severity=medium&amp;id=697db656ac06320222187bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-chrome-extensions-abusing-affi-4215055b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Chrome%20Extensions%20Abusing%20Affiliate%20Links%20and%20Stealing%20ChatGPT%20Access&amp;severity=medium&amp;id=697dc6a3ac063202221e55f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1498-cwe-90-improper-neutralization-of-sp-8f4f0959</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1498%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=697cae50ac0632022258677c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-house-scraps-burdensome-software-security-ru-0e500003</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20House%20Scraps%20%E2%80%98Burdensome%E2%80%99%20Software%20Security%20Rules&amp;severity=medium&amp;id=697ca715ac063202225692a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13176-cwe-269-improper-privilege-manageme-c0837eb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13176%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20Inspect%20Connector&amp;severity=high&amp;id=697ca3c3ac0632022255cb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-uat-8099-targets-iis-servers-in-asia--ef044fe7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20UAT-8099%20Targets%20IIS%20Servers%20in%20Asia%20with%20BadIIS%20SEO%20Malware&amp;severity=medium&amp;id=697dc6a3ac063202221e55fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badges-bytes-and-blackmail-23acc84e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Badges%2C%20Bytes%20and%20Blackmail&amp;severity=medium&amp;id=697dc6a3ac063202221e55fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26385-cwe-77-improper-neutralization-of-s-9f4d77f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26385%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Johnson%20Controls%20Metasys&amp;severity=critical&amp;id=697c9243ac063202224f3c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22626-vulnerability-in-hiksemi-hs-afs-s1h-47590381</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22626%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=medium&amp;id=697c9243ac063202224f3c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22625-vulnerability-in-hiksemi-hs-afs-s1h-e12a6df2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22625%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=medium&amp;id=697c9243ac063202224f3c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22624-vulnerability-in-hiksemi-hs-afs-s1h-5699d8a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22624%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=medium&amp;id=697c9243ac063202224f3c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22623-vulnerability-in-hiksemi-hs-afs-s1h-b5fb56f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22623%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=high&amp;id=697c9243ac063202224f3c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0709-vulnerability-in-hikvision-ds-3wap52-877503e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0709%3A%20Vulnerability%20in%20Hikvision%20DS-3WAP521-SI&amp;severity=high&amp;id=697c9243ac063202224f3c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hugging-face-abused-to-deploy-android-rat-76fcf33e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hugging%20Face%20Abused%20to%20Deploy%20Android%20RAT&amp;severity=medium&amp;id=697c91fdac063202224f2357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1699-cwe-829-inclusion-of-functionality-f-246dea02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1699%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Eclipse%20Foundation%20Eclipse%20Theia%20-%20Website&amp;severity=critical&amp;id=697c8420ac0632022249df80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-malware-talks-back-3dc8f95d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Malware%20Talks%20Back&amp;severity=medium&amp;id=697ced97ac063202226a8793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-devices-bricked-following-russia-linked-intrus-0fae875c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Devices%20Bricked%20Following%20Russia-Linked%20Intrusion%20Into%20Polish%20Power%20Grid&amp;severity=low&amp;id=697c7ce5ac0632022246955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/labyrinth-chollima-evolves-into-three-adversaries-2399fbec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LABYRINTH%20CHOLLIMA%20Evolves%20into%20Three%20Adversaries&amp;severity=medium&amp;id=697c728bac06320222401ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-intelligence-dossier-toxicsnake-53941704</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Intelligence%20Dossier%3A%20TOXICSNAKE&amp;severity=medium&amp;id=697c728bac06320222401f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21418-cwe-78-improper-neutralization-of-s-2211bd2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21418%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=697c728bac06320222401f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-patches-exploited-epmm-zero-days-efe15326</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Patches%20Exploited%20EPMM%20Zero-Days&amp;severity=critical&amp;id=697c6ed5ac063202223d125e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1395-cwe-209-generation-of-error-message--468f2ac7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1395%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Codriapp%20Innovation%20and%20Software%20Technologies%20Inc.%20HeyGarson&amp;severity=high&amp;id=697c728bac06320222401f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22277-cwe-78-improper-neutralization-of-s-ff14e5a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22277%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20UnityVSA&amp;severity=high&amp;id=697c6f18ac063202223d45cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meet-iclickfix-a-widespread-framework-using-the-cl-e275cbd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meet%20IClickFix%3A%20a%20widespread%20framework%20using%20the%20ClickFix%20tactic&amp;severity=medium&amp;id=697c6f1cac063202223d4635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attack-on-stan-your-malware-my-c2-77f84c64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attack%20on%20*stan%3A%20Your%20malware%2C%20my%20C2&amp;severity=medium&amp;id=697c6f1cac063202223d45fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nfcshare-android-trojan-nfc-card-data-theft-via-ma-6441cd2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NFCShare%20Android%20Trojan%3A%20NFC%20card%20data%20theft%20via%20malicious%20APK&amp;severity=medium&amp;id=697c6f1cac063202223d45f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-google-engineer-convicted-for-stealing-2000-ai--970db7ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-Google%20Engineer%20Convicted%20for%20Stealing%20AI%20Secrets%20for%20China%20Startup&amp;severity=medium&amp;id=697c85b0ac063202224aa3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25211-cwe-532-insertion-of-sensitive-info-150c55db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25211%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20llamastack%20Llama%20Stack&amp;severity=low&amp;id=697c5d74ac0632022237b59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartermail-fixes-critical-unauthenticated-rce-fla-63bd7cac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmarterMail%20Fixes%20Critical%20Unauthenticated%20RCE%20Flaw%20with%20CVSS%209.3%20Score&amp;severity=critical&amp;id=697c85b0ac063202224aa3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25210-cwe-190-integer-overflow-or-wraparo-f81ed376</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25210%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=697c59efac0632022236acf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0805-cwe-22-improper-limitation-of-a-path-6789e9fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0805%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=high&amp;id=697c4f63ac06320222326298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0963-cwe-22-improper-limitation-of-a-path-9ed6ccb6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0963%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=critical&amp;id=697c4f63ac0632022232629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1680-cwe-250-execution-with-unnecessary-p-e9896a9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1680%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Edgemo%20(Danoffice%20IT)%20Local%20Admin%20Service&amp;severity=high&amp;id=697c4f63ac0632022232629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12899-access-of-resource-using-incompatib-1d2d3635</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12899%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=697c44d7ac063202222d2c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-ivanti-epmm-zero-day-rce-flaws-actively-exploi-16adf6db</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Ivanti%20EPMM%20Zero-Day%20RCE%20Flaws%20Actively%20Exploited%2C%20Security%20Updates%20Released&amp;severity=critical&amp;id=697c3a16ac0632022228de5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24714-inclusion-of-undocumented-features--b6d65bd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24714%3A%20Inclusion%20of%20undocumented%20features%20or%20chicken%20bits%20in%20NETGEAR%20NETGEAR%20products&amp;severity=high&amp;id=697c334dac0632022226c7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24729-cwe-434-unrestricted-upload-of-file-b0f77a6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24729%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Internet%20Information%20Co.%2C%20Ltd%20DreamMaker&amp;severity=critical&amp;id=697c334dac0632022226c800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24728-cwe-306-missing-authentication-for--1a7f3b9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24728%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Internet%20Information%20Co.%2C%20Ltd%20DreamMaker&amp;severity=critical&amp;id=697c334dac0632022226c7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15322-incorrect-authorization-in-tanium-t-019634aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15322%3A%20Incorrect%20Authorization%20in%20Tanium%20Tanium%20Server&amp;severity=medium&amp;id=697bfe87ac06320222d12b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-30-11257a61</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-30&amp;severity=medium&amp;id=697d48c9ac0632022288f1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69662-na-8d33d632</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69662%3A%20n%2Fa&amp;severity=high&amp;id=697d02b1ac06320222725d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51958-na-dd246dd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51958%3A%20n%2Fa&amp;severity=critical&amp;id=697cfba8ac063202226ddd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-30-15a00164</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-30&amp;severity=low&amp;id=697c795eac06320222451188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1638-command-injection-in-tenda-ac21-9f7b3e79</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1638%3A%20Command%20Injection%20in%20Tenda%20AC21&amp;severity=medium&amp;id=697bf078ac06320222c697bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1665-cwe-78-improper-neutralization-of-sp-c9578cde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1665%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nvm-sh%20nvm&amp;severity=medium&amp;id=697becf3ac06320222c55bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1637-stack-based-buffer-overflow-in-tenda-507f0cdd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1637%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=697be268ac06320222c19d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25126-cwe-20-improper-input-validation-in-ba555a42</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25126%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20polarnl%20PolarLearn&amp;severity=high&amp;id=697bdb5fac06320222be5e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1625-command-injection-in-d-link-dwr-m961-b510ef37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1625%3A%20Command%20Injection%20in%20D-Link%20DWR-M961&amp;severity=medium&amp;id=697bdb5fac06320222be5e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1624-command-injection-in-d-link-dwr-m961-80502f4b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1624%3A%20Command%20Injection%20in%20D-Link%20DWR-M961&amp;severity=medium&amp;id=697bdb5fac06320222be5e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25117-cwe-20-improper-input-validation-in-4c2f2c60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25117%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pwncollege%20dojo&amp;severity=high&amp;id=697bdb5fac06320222be5e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25063-cwe-78-improper-neutralization-of-s-1ebe5dfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25063%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20gradle%20gradle-completion&amp;severity=high&amp;id=697bd7ddac06320222bd31b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-accelerated-campaign-targeting-iranian-protests-90b6a87f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-accelerated%20campaign%20targeting%20Iranian%20protests&amp;severity=medium&amp;id=697c67ffac063202223ad898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25061-cwe-787-out-of-bounds-write-in-sims-fbc0942c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25061%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20simsong%20tcpflow&amp;severity=medium&amp;id=697bd7ddac06320222bd31b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25047-cwe-1321-improperly-controlled-modi-c68dda6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25047%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sharpred%20deepHas&amp;severity=critical&amp;id=697bd7ddac06320222bd31af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25046-cwe-77-improper-neutralization-of-s-e10f5e1e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25046%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20MoonshotAI%20kimi-agent-sdk&amp;severity=low&amp;id=697bd7ddac06320222bd31ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1340-cwe-94-improper-control-of-generatio-d6bbfd70</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1340%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=critical&amp;id=697bd7ddac06320222bd31a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1281-cwe-94-improper-control-of-generatio-91dc6445</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1281%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=critical&amp;id=697bd7ddac06320222bd31a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24846-cwe-22-improper-limitation-of-a-pat-ea3770a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24846%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20malcontent&amp;severity=medium&amp;id=697bd0d5ac06320222ba1d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24845-cwe-522-insufficiently-protected-cr-f3ac7216</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24845%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20chainguard-dev%20malcontent&amp;severity=medium&amp;id=697bd0d5ac06320222ba1d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/escan-confirms-update-server-breached-to-push-mali-385c9705</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=eScan%20confirms%20update%20server%20breached%20to%20push%20malicious%20update&amp;severity=medium&amp;id=697bcd4fac06320222b8f01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1623-command-injection-in-totolink-a7000r-6c60c5f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1623%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697bc648ac06320222b6137b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15288-incorrect-authorization-in-tanium-i-9103c701</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15288%3A%20Incorrect%20Authorization%20in%20Tanium%20Interact&amp;severity=low&amp;id=697bc2c4ac06320222b51cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24687-cwe-22-improper-limitation-of-a-pat-59fe3665</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24687%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20umbraco%20Umbraco.Forms.Issues&amp;severity=medium&amp;id=697bbf42ac06320222b3ea9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22806-cwe-863-incorrect-authorization-in--c3cae920</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22806%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20loft-sh%20loft&amp;severity=critical&amp;id=697bbf40ac06320222b3ea60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15550-cross-site-request-forgery-csrf-in--c6e29524</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15550%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20birkir%20prime&amp;severity=medium&amp;id=697bbbbbac06320222b23d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25068-cwe-129-improper-validation-of-arra-73514c18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25068%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20ALSA%20Project%20alsa-lib&amp;severity=medium&amp;id=697bb4b4ac06320222af609b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1453-cwe-306-missing-authentication-for-c-752dbedd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1453%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20KiloView%20Encoder%20Series%20E1%20hardware%20Version%201.4&amp;severity=critical&amp;id=697bb130ac06320222ae6e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1610-hard-coded-credentials-in-tenda-ax12-87309e3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1610%3A%20Hard-coded%20Credentials%20in%20Tenda%20AX12%20Pro%20V2&amp;severity=critical&amp;id=697bb130ac06320222ae6e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1457-cwe-121-stack-based-buffer-overflow--4f098f83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1457%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20VIGI%20C485%20V1&amp;severity=high&amp;id=697bb130ac06320222ae6e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-175000-publicly-exposed-ollama-ai-b3130f16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20175%2C000%20Publicly%20Exposed%20Ollama%20AI%20Servers%20Across%20130%20Countries&amp;severity=medium&amp;id=697c85b0ac063202224aa3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1601-command-injection-in-totolink-a7000r-c97d1fb3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1601%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697baa29ac06320222ac22ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15548-cwe-311-missing-encryption-of-sensi-a1c071fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15548%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aacef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15543-cwe-59-improper-link-resolution-bef-151b5ed0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15543%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aaceec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15542-cwe-754-improper-check-for-unusual--328c43d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15542%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aacee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15541-cwe-59-improper-link-resolution-bef-b7ae23c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15541%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aacee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13399-cwe-331-insufficient-entropy-in-tp--7865447e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13399%3A%20CWE-331%20Insufficient%20Entropy%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=high&amp;id=697ba6a4ac06320222aacee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1600-business-logic-errors-in-bdtask-bhoj-35f197f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1600%3A%20Business%20Logic%20Errors%20in%20Bdtask%20Bhojon%20All-In-One%20Restaurant%20Management%20System&amp;severity=medium&amp;id=697ba321ac06320222a9c4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24780-cwe-863-incorrect-authorization-in--67a6b7b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24780%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=697b9f9cac06320222a8a3d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24414-cwe-276-incorrect-default-permissio-1f7f6c0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24414%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Icinga%20icinga-powershell-framework&amp;severity=medium&amp;id=697b9f9cac06320222a8a3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1599-business-logic-errors-in-bdtask-bhoj-ea10cc82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1599%3A%20Business%20Logic%20Errors%20in%20Bdtask%20Bhojon%20All-In-One%20Restaurant%20Management%20System&amp;severity=medium&amp;id=697b9f9cac06320222a8a3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15545-cwe-20-improper-input-validation-in-4307789c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15545%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Archer%20RE605X&amp;severity=high&amp;id=697b9c18ac06320222a73330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24413-cwe-276-incorrect-default-permissio-dc8e15f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24413%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Icinga%20icinga2&amp;severity=medium&amp;id=697b9c18ac06320222a73335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-what-you-should-know-56f9e2c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20chain%20attack%3A%20what%20you%20should%20know&amp;severity=medium&amp;id=697c67ffac063202223ad88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23896-cwe-269-improper-privilege-manageme-897a8f60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23896%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20immich-app%20immich&amp;severity=high&amp;id=697b9895ac06320222a54d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1598-cross-site-scripting-in-bdtask-bhojo-286e36a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1598%3A%20Cross%20Site%20Scripting%20in%20Bdtask%20Bhojon%20All-In-One%20Restaurant%20Management%20System&amp;severity=medium&amp;id=697b9895ac06320222a54d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1597-improper-authorization-in-bdtask-sal-052f19c2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1597%3A%20Improper%20Authorization%20in%20Bdtask%20SalesERP&amp;severity=medium&amp;id=697b8e08ac063202229e04a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62514-cwe-327-use-of-a-broken-or-risky-cr-5cae969a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62514%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Scille%20parsec-cloud&amp;severity=high&amp;id=697b837eac063202229a57ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1596-command-injection-in-d-link-dwr-m961-f7f775e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1596%3A%20Command%20Injection%20in%20D-Link%20DWR-M961&amp;severity=medium&amp;id=697b837eac063202229a580f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1595-sql-injection-in-itsourcecode-societ-61a27535</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1595%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=697b837eac063202229a57f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0936-cwe-532-insertion-of-sensitive-infor-1738d88d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0936%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20in%20B%26R%20Industrial%20Automation%20GmbH%20Process%20Visualization%20Interface%20(PVI)&amp;severity=medium&amp;id=697b837eac063202229a57f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13905-cwe-276-incorrect-default-permissio-708b23d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13905%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Process%20Expert&amp;severity=high&amp;id=697b7ff8ac06320222994737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llms-hijacked-monetized-in-operation-bizarre-bazaa-c5956bca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLMs%20Hijacked%2C%20Monetized%20in%20%E2%80%98Operation%20Bizarre%20Bazaar%E2%80%99&amp;severity=medium&amp;id=697b78bdac06320222955e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n8n-vulnerabilities-could-lead-to-remote-code-exec-586624fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=N8n%20Vulnerabilities%20Could%20Lead%20to%20Remote%20Code%20Execution&amp;severity=critical&amp;id=697b7539ac063202229444f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-ai-toys-can-actually-discuss-with-your-child--819790a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20AI%20toys%20can%20actually%20discuss%20with%20your%20child%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=697b75b8ac063202229475d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7714-cwe-89-improper-neutralization-of-sp-b785585b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7714%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Global%20Interactive%20Design%20Media%20Software%20Inc.%20Content%20Management%20System%20(CMS)&amp;severity=high&amp;id=697b7905ac06320222957a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7713-cwe-79-improper-neutralization-of-in-72be5bbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7713%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Global%20Interactive%20Design%20Media%20Software%20Inc.%20Content%20Management%20System%20(CMS)&amp;severity=high&amp;id=697b71e7ac06320222933482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1594-sql-injection-in-itsourcecode-societ-c3b483c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1594%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=697b71e7ac0632022293348c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1593-sql-injection-in-itsourcecode-societ-7eadb9ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1593%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=697b71e7ac06320222933485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1590-sql-injection-in-itsourcecode-school-cb5d8e52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1590%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697b6e64ac06320222920567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1589-sql-injection-in-itsourcecode-school-50b312a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1589%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697b6e64ac06320222920560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7014-cwe-384-session-fixation-in-qr-menu--340f58dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7014%3A%20CWE-384%20Session%20Fixation%20in%20QR%20Menu%20Pro%20Smart%20Menu%20Systems%20Menu%20Panel&amp;severity=medium&amp;id=697b6ae0ac0632022290510d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7013-cwe-639-authorization-bypass-through-8eaa239c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7013%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20QR%20Menu%20Pro%20Smart%20Menu%20Systems%20Menu%20Panel&amp;severity=medium&amp;id=697b6ae0ac0632022290510a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1616-cwe-22-improper-limitation-of-a-path-dae9ff9d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1616%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20osim&amp;severity=high&amp;id=697b6ae0ac06320222905110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1588-path-traversal-in-jishenghua-jsherp-cfb05d2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1588%3A%20Path%20Traversal%20in%20jishenghua%20jshERP&amp;severity=medium&amp;id=697b63d8ac063202228d5104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-patches-critical-web-help-desk-vulnerab-0e70963f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Patches%20Critical%20Web%20Help%20Desk%20Vulnerabilities&amp;severity=critical&amp;id=697b6021ac063202228c37e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-new-rces-darknet-busts-kernel--b4c9bec2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20New%20RCEs%2C%20Darknet%20Busts%2C%20Kernel%20Bugs%20%26%2025%2B%20More%20Stories&amp;severity=medium&amp;id=697c85b0ac063202224aa3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-byob-c2-infrastructure-reveals-a-multi-sta-063c0ec2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20BYOB%20C2%20Infrastructure%20Reveals%20a%20Multi-Stage%20Malware%20Deployment&amp;severity=medium&amp;id=697b8a84ac063202229c76ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-uat-8099-new-persistence-mechanisms-and-9cd0fce3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20UAT-8099%3A%20New%20persistence%20mechanisms%20and%20regional%20focus&amp;severity=medium&amp;id=697b8a84ac063202229c76fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1587-denial-of-service-in-open5gs-0ae120df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1587%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697b7905ac06320222957a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1586-denial-of-service-in-open5gs-1697a513</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1586%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697b7c74ac0632022298179e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/survey-of-100-energy-systems-reveals-critical-ot-c-508ad055</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Survey%20of%20100%2B%20Energy%20Systems%20Reveals%20Critical%20OT%20Cybersecurity%20Gaps&amp;severity=critical&amp;id=697c85b0ac063202224aa3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7016-cwe-284-improper-access-control-in-a-fd171379</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7016%3A%20CWE-284%20Improper%20Access%20Control%20in%20Ak%C4%B1n%20Software%20Computer%20Import%20Export%20Industry%20and%20Trade%20Ltd.%20QR%20Menu&amp;severity=high&amp;id=697b4b3bac06320222857268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7015-cwe-384-session-fixation-in-akn-soft-9200086c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7015%3A%20CWE-384%20Session%20Fixation%20in%20Ak%C4%B1n%20Software%20Computer%20Import%20Export%20Industry%20and%20Trade%20Ltd.%20QR%20Menu&amp;severity=medium&amp;id=697b4b3bac0632022285726b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1469-cwe-79-improper-neutralization-of-in-3c9882ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1469%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20RLE%20NOVA%20PlanManager&amp;severity=medium&amp;id=697b4b3bac0632022285726e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disrupts-ipidea-proxy-network-7bf945c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Disrupts%20IPIDEA%20Proxy%20Network&amp;severity=medium&amp;id=697b4401ac06320222821fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22764-cwe-287-improper-authentication-in--5bb23bd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22764%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20OpenManage%20Network%20Integration&amp;severity=medium&amp;id=697b40b1ac06320222813294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-fixes-four-critical-web-help-desk-flaws-f265e12e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Fixes%20Four%20Critical%20Web%20Help%20Desk%20Flaws%20With%20Unauthenticated%20RCE%20and%20Auth%20Bypass&amp;severity=critical&amp;id=697c85b0ac063202224aa3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23570-cwe-20-improper-input-validation-in-693c1180</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23570%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23569-cwe-125-out-of-bounds-read-in-teamv-be6eba33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23569%3A%20CWE-125%20Out-of-bounds%20Read%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b78b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23568-cwe-125-out-of-bounds-read-in-teamv-ed71544d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23568%3A%20CWE-125%20Out-of-bounds%20Read%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23567-cwe-122-heap-based-buffer-overflow--0d9eadca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23567%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23566-cwe-20-improper-input-validation-in-bb138666</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23566%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23565-cwe-476-null-pointer-dereference-in-10bd67de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23565%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23564-cwe-319-cleartext-transmission-of-s-cf89a13b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23564%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23571-cwe-20-improper-input-validation-in-357bc4a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23571%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23563-cwe-59-improper-link-resolution-bef-2c959c66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23563%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1188-cwe-131-incorrect-calculation-of-buf-a32db7fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1188%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Eclipse%20Foundation%20Eclipse%20OMR&amp;severity=medium&amp;id=697b1d87ac063202225ccb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/approaching-cyclone-vortex-werewolf-attacks-russia-5a696a5b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Approaching%20Cyclone%3A%20Vortex%20Werewolf%20Attacks%20Russia&amp;severity=medium&amp;id=697b11634623b1157c786762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disrupts-ipidea-one-of-the-worlds-largest-r-d7810cdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Disrupts%20IPIDEA%20%E2%80%94%20One%20of%20the%20World%E2%80%99s%20Largest%20Residential%20Proxy%20Networks&amp;severity=medium&amp;id=697b2159ac063202227641f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14975-cwe-269-improper-privilege-manageme-8ffdf05d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14975%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Custom%20Login%20Page%20Customizer&amp;severity=high&amp;id=697afc494623b1157c712eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25067-cwe-706-use-of-incorrectly-resolved-28664543</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25067%3A%20CWE-706%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20SmarterTools%20SmarterMail&amp;severity=medium&amp;id=697ae0284623b1157c685561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55704-hidden-functionality-in-brother-ind-c9945be2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55704%3A%20Hidden%20functionality%20in%20Brother%20Industries%2C%20Ltd.%20Multiple%20MFPs&amp;severity=medium&amp;id=697ad59c4623b1157c4a2d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53869-improper-certificate-validation-in--e8696625</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53869%3A%20Improper%20certificate%20validation%20in%20Brother%20Industries%2C%20Ltd.%20Multiple%20MFPs&amp;severity=low&amp;id=697ad59c4623b1157c4a2d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1552-sql-injection-in-semcms-a2e1db25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1552%3A%20SQL%20Injection%20in%20SEMCMS&amp;severity=medium&amp;id=697aab6e4623b1157c0ab0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-29-d5d28356</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-29&amp;severity=medium&amp;id=697bf749ac06320222ca82b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63658-na-b482fdc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63658%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63657-na-ed92a875</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63657%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63656-na-6a64da22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63656%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63655-na-acc11400</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63655%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63653-na-48a644e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63653%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63652-na-0702c782</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63652%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63651-na-8211c044</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63651%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63650-na-df986b68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63650%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69604-na-1b7bb371</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69604%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69929-na-96016b4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69929%3A%20n%2Fa&amp;severity=critical&amp;id=697bbbbbac06320222b23da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69516-na-f009c423</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69516%3A%20n%2Fa&amp;severity=high&amp;id=697bbbbbac06320222b23da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63649-na-ab41c60c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63649%3A%20n%2Fa&amp;severity=high&amp;id=697bbbbbac06320222b23d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69749-na-be0d3637</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69749%3A%20n%2Fa&amp;severity=medium&amp;id=697ba6a4ac06320222aacef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45160-na-fa9630c9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45160%3A%20n%2Fa&amp;severity=medium&amp;id=697b9895ac06320222a54d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71011-na-ad816e7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71011%3A%20n%2Fa&amp;severity=medium&amp;id=697b7c74ac0632022298179a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71009-na-80adfc9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71009%3A%20n%2Fa&amp;severity=medium&amp;id=697b7905ac06320222957a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71008-na-f0d09f23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71008%3A%20n%2Fa&amp;severity=medium&amp;id=697b7905ac06320222957a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-29-8945747f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-29&amp;severity=low&amp;id=697ace5f4623b1157c3a4d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15344-improper-neutralization-of-special--1f69625b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15344%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tanium%20Asset&amp;severity=medium&amp;id=697aa4644623b1157cff7f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1551-sql-injection-in-itsourcecode-school-9de4a5e2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1551%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697aa0e04623b1157cfcbe4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1550-improper-authorization-in-phpgurukul-f47217ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1550%3A%20Improper%20Authorization%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=697a96554623b1157cf77812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1549-path-traversal-in-jishenghua-jsherp-ae219776</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1549%3A%20Path%20Traversal%20in%20jishenghua%20jshERP&amp;severity=medium&amp;id=697a96554623b1157cf7780a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1548-command-injection-in-totolink-a7000r-1e6db936</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1548%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697a92d04623b1157cf6c70b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24897-cwe-22-improper-limitation-of-a-pat-fd98c0bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24897%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ErugoOSS%20Erugo&amp;severity=critical&amp;id=697a8f4c4623b1157cf569af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1547-command-injection-in-totolink-a7000r-d8463cd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1547%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697a889e4623b1157cf358f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1546-sql-injection-in-jishenghua-jsherp-1d61f7fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1546%3A%20SQL%20Injection%20in%20jishenghua%20jshERP&amp;severity=medium&amp;id=697a889e4623b1157cf358ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24889-cwe-190-integer-overflow-or-wraparo-d5fa101f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24889%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20stellar%20rs-soroban-sdk&amp;severity=medium&amp;id=697a889e4623b1157cf358fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24888-cwe-1321-improperly-controlled-modi-dfb0b84f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24888%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20microsoft%20maker.js&amp;severity=medium&amp;id=697a84c24623b1157cf1f0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1545-sql-injection-in-itsourcecode-school-68c5fba1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1545%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697a84c24623b1157cf1f0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1544-os-command-injection-in-d-link-dir-8-323bb0b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1544%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=697a84c24623b1157cf1f0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24857-cwe-122-heap-based-buffer-overflow--c87d825c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24857%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20simsong%20bulk_extractor&amp;severity=medium&amp;id=697a84c24623b1157cf1f0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24856-cwe-20-improper-input-validation-in-5ecbf86c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24856%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697a7db94623b1157cef795b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1535-sql-injection-in-code-projects-onlin-e78824be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1535%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=697a7db94623b1157cef7954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1534-sql-injection-in-code-projects-onlin-32e9c123</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1534%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=697a7db94623b1157cef794d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1533-sql-injection-in-code-projects-onlin-3bb6d75d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1533%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=697a76b14623b1157cee2be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1532-path-traversal-in-d-link-dcs-700l-0d55b15e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1532%3A%20Path%20Traversal%20in%20D-Link%20DCS-700L&amp;severity=medium&amp;id=697a76b14623b1157cee2bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14840-cwe-754-improper-check-for-unusual--8644af37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14840%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Drupal%20HTTP%20Client%20Manager&amp;severity=high&amp;id=697a6c254623b1157cec1717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14472-cwe-352-cross-site-request-forgery--4da66927</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14472%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Acquia%20Content%20Hub&amp;severity=high&amp;id=697a6c254623b1157cec1714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13986-cwe-288-authentication-bypass-using-7492dbc9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13986%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Disable%20Login%20Page&amp;severity=medium&amp;id=697a6c254623b1157cec1711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13985-cwe-863-incorrect-authorization-in--7b644f2d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13985%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Entity%20Share&amp;severity=medium&amp;id=697a6c254623b1157cec170e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13984-cwe-942-permissive-cross-domain-sec-a4e51af9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13984%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20Drupal%20Next.js&amp;severity=medium&amp;id=697a6c254623b1157cec170b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13983-cwe-79-improper-neutralization-of-i-385bb760</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Tagify&amp;severity=medium&amp;id=697a6c254623b1157cec1708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13982-cwe-352-cross-site-request-forgery--b4e38f1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13982%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Login%20Time%20Restriction&amp;severity=high&amp;id=697a6c254623b1157cec1705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13981-cwe-79-improper-neutralization-of-i-bbccedf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=medium&amp;id=697a6c254623b1157cec1702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13980-cwe-288-authentication-bypass-using-fe270382</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13980%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20CKEditor%205%20Premium%20Features&amp;severity=medium&amp;id=697a6c254623b1157cec16ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13979-cwe-267-privilege-defined-with-unsa-58cfa0ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13979%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Drupal%20Mini%20site&amp;severity=medium&amp;id=697a6c254623b1157cec16fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46691-cwe-284-improper-access-control-in--ab84e367</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46691%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20PremierColor&amp;severity=high&amp;id=697a68a44623b1157ceb14dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61728-cwe-407-inefficient-algorithmic-com-4fc7cb51</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61728%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20archive%2Fzip&amp;severity=medium&amp;id=697a653b4623b1157cea4eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61726-cwe-400-uncontrolled-resource-consu-8c02c13f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61726%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20net%2Furl&amp;severity=high&amp;id=697a653b4623b1157cea4ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61730-cwe-940-improper-verification-of-so-76478fe8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61730%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=medium&amp;id=697a653b4623b1157cea4ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61731-cwe-78-improper-neutralization-of-s-ea428bb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61731%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=697a653b4623b1157cea4ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68119-cwe-78-improper-neutralization-of-s-28a28e3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68119%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=697a653b4623b1157cea4eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0750-cwe-347-improper-verification-of-cry-79d8acb9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0750%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Drupal%20Drupal%20Commerce%20Paybox&amp;severity=high&amp;id=697a5e9e4623b1157ce6c328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cant-stop-wont-stop-ta584-innovates-initial-access-ec2c0e48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can&apos;t%20stop%2C%20won&apos;t%20stop%3A%20TA584%20innovates%20initial%20access&amp;severity=medium&amp;id=697a7db84623b1157cef78f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24775-cwe-345-insufficient-verification-o-f4613c19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24775%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20opf%20openproject&amp;severity=medium&amp;id=697a538a4623b1157ce16565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24772-cwe-345-insufficient-verification-o-71f8ba4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24772%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20opf%20openproject&amp;severity=high&amp;id=697a538a4623b1157ce16562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33237-cwe-476-null-pointer-dereference-in-81893456</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33237%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20GeForce&amp;severity=medium&amp;id=697a50074623b1157cdfcf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33220-cwe-416-use-after-free-in-nvidia-ge-0f018ead</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33220%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33219-cwe-190-integer-overflow-or-wraparo-527d0560</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33219%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57796-cwe-257storing-passwords-in-a-recov-d01accbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57796%3A%20CWE-257%3AStoring%20Passwords%20in%20a%20Recoverable%20Format%20in%20Explorance%20Blue&amp;severity=medium&amp;id=697a50074623b1157cdfcf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33218-cwe-190-integer-overflow-or-wraparo-0c7d2b02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33218%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33217-cwe-416-use-after-free-in-nvidia-ge-2236de6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33217%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-moltbot-ai-coding-assistant-on-vs-code-market-900aeb84</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Moltbot%20AI%20Coding%20Assistant%20on%20VS%20Code%20Marketplace%20Drops%20Malware&amp;severity=medium&amp;id=697a711c4623b1157ced2a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57795-cwe-434-unrestricted-upload-of-file-e007868c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57795%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Explorance%20Blue&amp;severity=critical&amp;id=697a50074623b1157cdfcf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57794-cwe-434-unrestricted-upload-of-file-b5057a24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57794%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Explorance%20Blue&amp;severity=critical&amp;id=697a4c814623b1157cded9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57792-cwe-89-improper-neutralization-of-s-4004c8b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57792%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Explorance%20Blue&amp;severity=critical&amp;id=697a4c814623b1157cded9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46306-processing-a-maliciously-crafted-ke-9fb00563</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46306%3A%20Processing%20a%20maliciously%20crafted%20Keynote%20file%20may%20disclose%20memory%20contents%20in%20Apple%20Keynote&amp;severity=medium&amp;id=697a4c814623b1157cded9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46316-processing-a-maliciously-crafted-pa-75d1e1d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46316%3A%20Processing%20a%20maliciously%20crafted%20Pages%20document%20may%20result%20in%20unexpected%20termination%20or%20disclosure%20of%20process%20memory%20in%20Apple%20Pages&amp;severity=medium&amp;id=697a4c814623b1157cded9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/purerat-attacker-now-using-ai-to-build-toolset-2af757b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PureRAT%3A%20Attacker%20Now%20Using%20AI%20to%20Build%20Toolset&amp;severity=medium&amp;id=697a5a904623b1157ce3616d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57793-cwe-89-improper-neutralization-of-s-29361549</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57793%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Explorance%20Blue&amp;severity=high&amp;id=697a48fd4623b1157cdca040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-attacks-target-indian-government-using-sheetcr-100bc94d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Attacks%20Target%20Indian%20Government%20Using%20SHEETCREEP%2C%20FIREPOWER%2C%20and%20MAILCREEP&amp;severity=medium&amp;id=697a5de14623b1157ce5e519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24685-cwe-77-improper-neutralization-of-s-6f10201c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24685%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=697a41f64623b1157cda80d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13919-cwe-427-uncontrolled-search-path-el-c00ea7e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13919%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Broadcom%20Symantec%20Endpoint%20Protection%20Windows%20Client&amp;severity=medium&amp;id=697a41f64623b1157cda80d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13918-cwe-269-improper-privilege-manageme-a03a536b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13918%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Broadcom%20Symantec%20Endpoint%20Protection%20Windows%20Client&amp;severity=medium&amp;id=697a41f64623b1157cda80d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1522-denial-of-service-in-open5gs-30d7b5a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1522%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697a3aee4623b1157cd881cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13917-cwe-269-improper-privilege-manageme-a27c792c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13917%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Broadcom%20Symantec%20Web%20Security%20Services%20Agent&amp;severity=high&amp;id=697a3aee4623b1157cd881be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-electrum-tied-to-december-2025-cyber-attac-0499845a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Aligned%20ELECTRUM%20Tied%20to%20December%202025%20Cyber%20Attack%20on%20Polish%20Power%20Grid&amp;severity=medium&amp;id=697a711c4623b1157ced2a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/odd-weblogic-request-possible-cve-2026-21962-explo-a209ffae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Odd%20WebLogic%20Request.%20Possible%20CVE-2026-21962%20Exploit%20Attempt%20or%20AI%20Slop%26%23x3f%3B%2C%20(Wed%2C%20Jan%2028th)&amp;severity=low&amp;id=697a33b14623b1157cd612e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1539-insertion-of-sensitive-information-i-46f2f66f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1539%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=697a295b4623b1157cd23357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1536-improper-neutralization-of-crlf-sequ-c6e4953a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1536%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=697a295b4623b1157cd23353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1237-cwe-672-operation-on-a-resource-afte-35d95eae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1237%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20Canonical%20juju&amp;severity=low&amp;id=697a25d84623b1157ccf7646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1521-denial-of-service-in-open5gs-17317464</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1521%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697a37694623b1157cd7577e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1520-cross-site-scripting-in-rethinkdb-925878bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1520%3A%20Cross%20Site%20Scripting%20in%20rethinkdb&amp;severity=medium&amp;id=697a3aee4623b1157cd881d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1060-cwe-200-exposure-of-sensitive-inform-d6fb7916</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1060%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20litonice13%20WP%20Adminify%20%E2%80%93%20White%20Label%20WordPress%2C%20Admin%20Menu%20Editor%2C%20Login%20Customizer&amp;severity=medium&amp;id=697a1ed44623b1157cc754bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-we-cant-let-ai-take-the-wheel-of-cyber-defense-18cbaba2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20We%20Can%E2%80%99t%20Let%20AI%20Take%20the%20Wheel%20of%20Cyber%20Defense&amp;severity=medium&amp;id=697a17914623b1157cc3cd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14795-cwe-352-cross-site-request-forgery--dc5464ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14795%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webguyio%20Stop%20Spammers%20Classic&amp;severity=medium&amp;id=697a10bc4623b1157cc06b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-high-severity-n8n-flaws-allow-authenticated-re-04eb96b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20High-Severity%20n8n%20Flaws%20Allow%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=697a711c4623b1157ced2a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14865-cwe-79-improper-neutralization-of-i-d417b336</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Passster%20%E2%80%93%20Password%20Protect%20Pages%20and%20Content&amp;severity=medium&amp;id=697a06304623b1157cbbccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1056-cwe-22-improper-limitation-of-a-path-76433a03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1056%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20Snow%20Monkey%20Forms&amp;severity=critical&amp;id=697a06304623b1157cbbcce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59901-cwe-352-cross-site-request-forgery--5415921e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59901%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59900-cwe-79-improper-neutralization-of-i-f2c65362</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59899-cwe-79-improper-neutralization-of-i-0aeadfaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59898-cwe-79-improper-neutralization-of-i-c76427bb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59897-cwe-79-improper-neutralization-of-i-6d38f5f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59896-cwe-79-improper-neutralization-of-i-fb73c322</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59895-cwe-20-improper-input-validation-in-472be37e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59895%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59894-cwe-352-cross-site-request-forgery--55c4fc53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59894%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba64623b1157cb5f7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59893-cwe-352-cross-site-request-forgery--6491e6fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59893%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59892-cwe-352-cross-site-request-forgery--d423eee7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59892%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59891-cwe-352-cross-site-request-forgery--6aa76c29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59891%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vm2-nodejs-flaw-allows-sandbox-escape-and-3cc420a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20vm2%20Node.js%20Flaw%20Allows%20Sandbox%20Escape%20and%20Arbitrary%20Code%20Execution&amp;severity=critical&amp;id=697a711c4623b1157ced2a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-deploys-updated-coolclient-backdoor--192b2556</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Deploys%20Updated%20COOLCLIENT%20Backdoor%20in%20Government%20Cyber%20Attacks&amp;severity=medium&amp;id=697a711c4623b1157ced2a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26386-cwe-121-stack-based-buffer-overflow-8524005e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26386%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Johnson%20Controls%20iSTAR%20Configuration%20Utility%20(ICU)&amp;severity=high&amp;id=6979f49d4623b1157cb36511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1398-cwe-352-cross-site-request-forgery-c-b8b22e77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1398%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chrisnowak%20Change%20WP%20URL&amp;severity=medium&amp;id=6979f49e4623b1157cb36555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1399-cwe-79-improper-neutralization-of-in-81723c42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miles99%20WP%20Google%20Ad%20Manager%20Plugin&amp;severity=medium&amp;id=6979f49e4623b1157cb3655c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14616-cwe-352-cross-site-request-forgery--1bc6a122</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14616%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20recooty%20Recooty%20%E2%80%93%20Job%20Widget%20(Old%20Dashboard)&amp;severity=medium&amp;id=6979f49d4623b1157cb3650a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1280-cwe-862-missing-authorization-in-nme-b59b0a88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1280%3A%20CWE-862%20Missing%20Authorization%20in%20nmedia%20Frontend%20File%20Manager%20Plugin&amp;severity=high&amp;id=6979f49d4623b1157cb3651a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14283-cwe-79-improper-neutralization-of-i-856e0c19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14283%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20BlockArt%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20Blocks%20%2CWordPress%20Block%20Plugin%2C%20Sections%20%26%20Template%20Library&amp;severity=medium&amp;id=6979f49d4623b1157cb36500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14063-cwe-79-improper-neutralization-of-i-7e17c6bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seomantis%20SEO%20Links%20Interlinking&amp;severity=medium&amp;id=6979f49d4623b1157cb364f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0844-cwe-284-improper-access-control-in-n-aa2a6daa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0844%3A%20CWE-284%20Improper%20Access%20Control%20in%20nmedia%20Simple%20User%20Registration&amp;severity=high&amp;id=6979f49d4623b1157cb36515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14386-cwe-862-missing-authorization-in-sh-3192e753</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14386%3A%20CWE-862%20Missing%20Authorization%20in%20shahrukhlinkgraph%20Search%20Atlas%20SEO%20%E2%80%93%20Premier%20SEO%20Plugin%20for%20One-Click%20WP%20Publishing%20%26%20Integrated%20AI%20Optimization&amp;severity=high&amp;id=6979f49d4623b1157cb36504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1380-cwe-352-cross-site-request-forgery-c-14e7b5f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1380%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lxicon%20Bitcoin%20Donate%20Button&amp;severity=medium&amp;id=6979f49d4623b1157cb36524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1391-cwe-79-improper-neutralization-of-in-51b44b00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mamunreza%20Vzaar%20Media%20Management&amp;severity=medium&amp;id=6979f49d4623b1157cb36529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1377-cwe-352-cross-site-request-forgery-c-bce7e9f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1377%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hu_chao%20imwptip&amp;severity=medium&amp;id=6979f49d4623b1157cb3651f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41351-cwe-649-reliance-on-obfuscation-or--1369b5e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41351%3A%20CWE-649%3A%20Reliance%20on%20Obfuscation%20or%20Encryption%20of%20Security-Relevant%20Inputs%20without%20Integrity%20Checking%20in%20Funambol%20Cloud%20Server&amp;severity=medium&amp;id=6979ea104623b1157caf530c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/password-reuse-in-disguise-an-often-missed-risky-w-ed799261</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Password%20Reuse%20in%20Disguise%3A%20An%20Often-Missed%20Risky%20Workaround&amp;severity=medium&amp;id=697a711c4623b1157ced2a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-boosts-account-security-for-at-risk-indiv-6d563928</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Boosts%20Account%20Security%20for%20At-Risk%20Individuals&amp;severity=low&amp;id=6979e2d64623b1157cad53af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-warns-of-active-exploitation-of-winrar-vuln-f6581a5a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Warns%20of%20Active%20Exploitation%20of%20WinRAR%20Vulnerability%20CVE-2025-8088&amp;severity=critical&amp;id=697a711c4623b1157ced2a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-python-spellchecker-packages-on-pypi-delivere-538aff52</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Python%20Spellchecker%20Packages%20on%20PyPI%20Delivered%20Hidden%20Remote%20Access%20Trojan&amp;severity=medium&amp;id=697a711c4623b1157ced2a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-31-more-defendants-in-massive-atm-hacki-44b4b376</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Charges%2031%20More%20Defendants%20in%20Massive%20ATM%20Hacking%20Probe&amp;severity=medium&amp;id=6979d8494623b1157ca8ecb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apts-cybercriminals-widely-exploiting-winrar-vulne-20a116ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APTs%2C%20Cybercriminals%20Widely%20Exploiting%20WinRAR%20Vulnerability&amp;severity=medium&amp;id=6979d4c64623b1157ca7b116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7740-cwe-1392-use-of-default-credentials--fa8357e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7740%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Hitachi%20Energy%20SuprOS&amp;severity=high&amp;id=697a3aee4623b1157cd881d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1400-cwe-434-unrestricted-upload-of-file--efe63ebf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1400%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=high&amp;id=6979cdf04623b1157ca477fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1053-cwe-79-improper-neutralization-of-in-55a02526</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vinod-dalvi%20Ivory%20Search%20%E2%80%93%20WordPress%20Search%20Plugin&amp;severity=medium&amp;id=6979cdf04623b1157ca477ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0702-cwe-89-improper-neutralization-of-sp-1e75cd74</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0702%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpcreatix%20VidShop%20%E2%80%93%20Shoppable%20Videos%20for%20WooCommerce&amp;severity=high&amp;id=6979cdf04623b1157ca477e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1381-cwe-79-improper-neutralization-of-in-710963ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1381%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodefactory%20Order%20Minimum%2FMaximum%20Amount%20Limits%20for%20WooCommerce&amp;severity=medium&amp;id=6979cdf04623b1157ca477f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-exploited-forticloud-sso-authenti-2f826feb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Exploited%20FortiCloud%20SSO%20Authentication%20Bypass&amp;severity=low&amp;id=6979c6b54623b1157ca2192c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0818-vulnerability-in-mozilla-thunderbird-c0309850</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0818%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=6979bfee4623b1157c9f66d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40554-cwe-1390-weak-authentication-in-sol-4a053463</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40554%3A%20CWE-1390%20Weak%20Authentication%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-severity-remote-code-execution-vulnerability--76b8cc58</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High-Severity%20Remote%20Code%20Execution%20Vulnerability%20Patched%20in%20OpenSSL&amp;severity=critical&amp;id=6979bfad4623b1157c9f4f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40553-cwe-502-deserialization-of-untruste-e3390f42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40553%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40552-cwe-1390-weak-authentication-in-sol-becd1309</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40552%3A%20CWE-1390%20Weak%20Authentication%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40551-cwe-502-deserialization-of-untruste-fe5db3df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40551%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40537-cwe-798-use-of-hard-coded-credentia-df12b498</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40537%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=high&amp;id=6979bfee4623b1157c9f66bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40536-cwe-693-protection-mechanism-failur-5fa97301</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40536%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=high&amp;id=6979bc5c4623b1157c9e0bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1054-cwe-862-missing-authorization-in-met-83252a16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1054%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=6979bc5c4623b1157c9e0bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1389-cwe-639-authorization-bypass-through-ef6bd941</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1389%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bplugins%20Document%20Embedder%20%E2%80%93%20Embed%20PDFs%2C%20Word%2C%20Excel%2C%20and%20Other%20Files&amp;severity=medium&amp;id=6979bc5c4623b1157c9e0bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0832-cwe-862-missing-authorization-in-saa-54c8d588</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0832%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20New%20User%20Approve&amp;severity=high&amp;id=6979b5554623b1157c9a94ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1310-cwe-862-missing-authorization-in-mig-e736befa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1310%3A%20CWE-862%20Missing%20Authorization%20in%20migaweb%20Simple%20calendar%20for%20Elementor&amp;severity=medium&amp;id=6979b5554623b1157c9a94e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14039-cwe-79-improper-neutralization-of-i-41238a84</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20presstigers%20Simple%20Folio&amp;severity=medium&amp;id=6979b5554623b1157c9a94b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12709-cwe-79-improper-neutralization-of-i-2f408848</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12709%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bfintal%20Interactions%20%E2%80%93%20Create%20Interactive%20Experiences%20in%20the%20Block%20Editor&amp;severity=medium&amp;id=6979b5554623b1157c9a94b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9082-cwe-79-improper-neutralization-of-in-555402c1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=6979b5554623b1157c9a94bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1295-cwe-79-improper-neutralization-of-in-34f959f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supercleanse%20Buy%20Now%20Plus%20%E2%80%94%20Payments%20with%20Stripe&amp;severity=medium&amp;id=6979b5554623b1157c9a94dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0825-cwe-862-missing-authorization-in-crm-0634d7b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0825%3A%20CWE-862%20Missing%20Authorization%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=medium&amp;id=6979b5554623b1157c9a94c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1244-cwe-79-improper-neutralization-of-in-e57bf048</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1244%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeccoop%20Forms%20Bridge%20%E2%80%93%20Infinite%20integrations&amp;severity=medium&amp;id=6979b5554623b1157c9a94d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1466-cwe-79-improper-neutralization-of-in-c2af209e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1466%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jirafeau%20project%20Jirafeau&amp;severity=medium&amp;id=6979b1d04623b1157c989124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13471-cwe-639-authorization-bypass-throug-65cffba6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13471%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20User%20Activity%20Log&amp;severity=medium&amp;id=6979aac84623b1157c94fc41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14610-cwe-918-server-side-request-forgery-6be5fa9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14610%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bloompixel%20TableMaster%20for%20Elementor%20%E2%80%93%20Advanced%20Responsive%20Tables%20for%20Elementor&amp;severity=high&amp;id=6979a3c14623b1157c91fb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1083-cwe-79-improper-neutralization-of-in-7d10b706</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Appointment%20Hour%20Booking%20%E2%80%93%20Booking%20Calendar&amp;severity=medium&amp;id=6979a3c14623b1157c91fb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1298-cwe-862-missing-authorization-in-iul-8dd77780</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1298%3A%20CWE-862%20Missing%20Authorization%20in%20iulia-cazan%20Easy%20Replace%20Image&amp;severity=medium&amp;id=6979a3c14623b1157c91fb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8072-cwe-79-improper-neutralization-of-in-582d698e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nebojsadabic%20Target%20Video%20Easy%20Publish&amp;severity=medium&amp;id=6979a3c14623b1157c91fb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-cve-2026-24858-after-active-forti-a16b9dd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20CVE-2026-24858%20After%20Active%20FortiOS%20SSO%20Exploitation%20Detected&amp;severity=critical&amp;id=697a711c4623b1157ced2a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1514-cwe-863-incorrect-authorization-in-2-7ba44a60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1514%3A%20CWE-863%20Incorrect%20Authorization%20in%202100%20Technology%20Official%20Document%20Management%20System&amp;severity=high&amp;id=69798b254623b1157c8997f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1506-os-command-injection-in-d-link-dir-6-55cc86e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1506%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=697979914623b1157c5f512a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1505-os-command-injection-in-d-link-dir-6-bca8f308</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1505%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=69796f044623b1157c5b85f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1513-cwe-79-improper-neutralization-of-in-fccdf7dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NAVER%20billboard.js&amp;severity=medium&amp;id=69796f044623b1157c5b85f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21569-xxe-xml-external-entity-injection-i-8f906fa2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21569%3A%20XXE%20(XML%20External%20Entity%20Injection)%20in%20Atlassian%20Crowd%20Data%20Center&amp;severity=high&amp;id=69795d714623b1157c56bc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24852-cwe-122-heap-based-buffer-overflow--1bf8b510</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24852%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69795d714623b1157c56bc19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24850-cwe-347-improper-verification-of-cr-76dbd910</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24850%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20RustCrypto%20signatures&amp;severity=medium&amp;id=69795d714623b1157c56bc0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24842-cwe-22-improper-limitation-of-a-pat-1ca97d57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24842%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=697959ec4623b1157c540f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-28-9c334e10</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-28&amp;severity=medium&amp;id=697aa42e4623b1157cfee9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71007-na-17a1c6b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71007%3A%20n%2Fa&amp;severity=high&amp;id=697a7db94623b1157cef7949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71006-na-260bba14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71006%3A%20n%2Fa&amp;severity=medium&amp;id=697a76b14623b1157cee2bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71005-na-015f040b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71005%3A%20n%2Fa&amp;severity=medium&amp;id=697a73324623b1157ceda5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71003-na-906f7142</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71003%3A%20n%2Fa&amp;severity=high&amp;id=697a73324623b1157ceda5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71004-na-f5f5621c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71004%3A%20n%2Fa&amp;severity=medium&amp;id=697a6fa94623b1157cecc63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71002-na-71abaf31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71002%3A%20n%2Fa&amp;severity=medium&amp;id=697a653b4623b1157cea4ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69602-na-a9e747b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69602%3A%20n%2Fa&amp;severity=critical&amp;id=697a5e9e4623b1157ce6c337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69601-na-70c7cb89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69601%3A%20n%2Fa&amp;severity=medium&amp;id=697a5e9e4623b1157ce6c331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71001-na-3b9ae8e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71001%3A%20n%2Fa&amp;severity=medium&amp;id=697a538a4623b1157ce1655d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71000-na-1ed2b827</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71000%3A%20n%2Fa&amp;severity=high&amp;id=697a50074623b1157cdfcf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70999-na-afcc4a15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70999%3A%20n%2Fa&amp;severity=high&amp;id=697a48fd4623b1157cdca04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65891-na-69b501d8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65891%3A%20n%2Fa&amp;severity=high&amp;id=697a48fd4623b1157cdca046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65890-na-0c7b96ae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65890%3A%20n%2Fa&amp;severity=high&amp;id=697a457a4623b1157cdb1920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65889-na-33df1a10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65889%3A%20n%2Fa&amp;severity=high&amp;id=697a457a4623b1157cdb191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65888-na-1b6aece5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65888%3A%20n%2Fa&amp;severity=high&amp;id=697a3aee4623b1157cd881c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65887-na-fb692bab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65887%3A%20n%2Fa&amp;severity=medium&amp;id=697a3aee4623b1157cd881c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65886-na-75479913</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65886%3A%20n%2Fa&amp;severity=high&amp;id=697a37694623b1157cd75778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61140-na-f61e153f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61140%3A%20n%2Fa&amp;severity=critical&amp;id=697a33e64623b1157cd61d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69517-na-778e3abf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69517%3A%20n%2Fa&amp;severity=high&amp;id=697a30624623b1157cd4fb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57283-na-a6ffd88e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57283%3A%20n%2Fa&amp;severity=high&amp;id=697a30624623b1157cd4fb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70336-na-a812106d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70336%3A%20n%2Fa&amp;severity=medium&amp;id=697a2cdd4623b1157cd3c0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-28-b0a89e81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-28&amp;severity=low&amp;id=6979b19b4623b1157c988123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24838-cwe-79-improper-neutralization-of-i-86dbcfdd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=critical&amp;id=697959ec4623b1157c540f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24837-cwe-79-improper-neutralization-of-i-4c2712b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24837%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=697952e34623b1157c50b1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24836-cwe-79-improper-neutralization-of-i-a758299f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24836%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=697952e34623b1157c50b1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24833-cwe-79-improper-neutralization-of-i-e692c3ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24833%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=697952e34623b1157c50b1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24784-cwe-79-improper-neutralization-of-i-18400fd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24784%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=697952e34623b1157c50b1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24785-cwe-327-use-of-a-broken-or-risky-cr-c461cae6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24785%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20jmlepisto%20clatter&amp;severity=high&amp;id=69794f604623b1157c50222d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24134-cwe-639-authorization-bypass-throug-69f23a39</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24134%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69794f604623b1157c502228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23830-cwe-94-improper-control-of-generati-c9f465fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23830%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=697a295b4623b1157cd2335e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55292-cwe-348-use-of-less-trusted-source--9d293b2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55292%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20meshtastic%20firmware&amp;severity=high&amp;id=697a295b4623b1157cd2335a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24783-cwe-682-incorrect-calculation-in-sc-0f5aaacd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24783%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20script3%20soroban-fixed-point-math&amp;severity=high&amp;id=69793a494623b1157c4b1c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24779-cwe-918-server-side-request-forgery-384b4cb6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24779%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=697936c84623b1157c4a64f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24778-cwe-79-improper-neutralization-of-i-5100454f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24778%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=697936c84623b1157c4a64ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24770-cwe-22-improper-limitation-of-a-pat-70884c4e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24770%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20infiniflow%20ragflow&amp;severity=critical&amp;id=697936c84623b1157c4a64fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24765-cwe-502-deserialization-of-untruste-079f9476</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24765%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sebastianbergmann%20phpunit&amp;severity=high&amp;id=697933434623b1157c49959a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24748-cwe-863-incorrect-authorization-in--433c70ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24748%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20akuity%20kargo&amp;severity=medium&amp;id=69792fbd4623b1157c48ea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24741-cwe-22-improper-limitation-of-a-pat-7fd7b575</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24741%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20C4illin%20ConvertX&amp;severity=high&amp;id=69792fbd4623b1157c48ea56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24740-cwe-284-improper-access-control-in--b480a569</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24740%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20amir20%20dozzle&amp;severity=high&amp;id=697928b74623b1157c47a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1504-inappropriate-implementation-in-goog-452349d0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1504%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=697928b74623b1157c47a0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21589-cwe-288-authentication-bypass-using-54eb0b0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21589%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Juniper%20Networks%20Session%20Smart%20Router&amp;severity=critical&amp;id=697925324623b1157c47013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14988-cwe-732-incorrect-permission-assign-b0ebb5d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14988%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20iba%20Systems%20ibaPDA&amp;severity=critical&amp;id=69791e294623b1157c4599a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12810-cwe-287-improper-authentication-in--2d0dafcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12810%3A%20CWE-287%20Improper%20Authentication%20in%20Delinea%20Inc.%20Secret%20Server%20On-Prem&amp;severity=medium&amp;id=69791aa44623b1157c447322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24688-cwe-835-loop-with-unreachable-exit--a6e7123b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24688%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=697917214623b1157c43bf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24771-cwe-79-improper-neutralization-of-i-7f5c5c69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24771%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=697917214623b1157c43bfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24473-cwe-200-exposure-of-sensitive-infor-79ff5adf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24473%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20honojs%20hono&amp;severity=medium&amp;id=697917214623b1157c43bf95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24472-cwe-524-use-of-cache-containing-sen-4196de9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24472%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20honojs%20hono&amp;severity=medium&amp;id=697917214623b1157c43bf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24858-improper-access-control-in-fortinet-214153b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24858%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=critical&amp;id=6979139d4623b1157c42d523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24398-cwe-185-incorrect-regular-expressio-638cd874</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24398%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20honojs%20hono&amp;severity=medium&amp;id=697910194623b1157c40e7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24116-cwe-125-out-of-bounds-read-in-bytec-a6b8f243</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24116%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=697910194623b1157c40e7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22264-cwe-416-use-after-free-in-oisf-suri-3e92570b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22264%3A%20CWE-416%3A%20Use%20After%20Free%20in%20OISF%20suricata&amp;severity=high&amp;id=6979058d4623b1157c3e0403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0746-cwe-918-server-side-request-forgery--1bdef5bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0746%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=medium&amp;id=6979058d4623b1157c3e03ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22263-cwe-1050-excessive-platform-resourc-b06997bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22263%3A%20CWE-1050%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20OISF%20suricata&amp;severity=medium&amp;id=6979058d4623b1157c3e03fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22262-cwe-121-stack-based-buffer-overflow-06f08f07</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22262%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=medium&amp;id=6979058d4623b1157c3e03f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22261-cwe-1050-excessive-platform-resourc-743223e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22261%3A%20CWE-1050%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20OISF%20suricata&amp;severity=low&amp;id=697902094623b1157c3d233f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23593-vulnerability-in-hewlett-packard-en-7dcdb00b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23593%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Fabric%20Composer&amp;severity=high&amp;id=6978fe854623b1157c3c22de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33234-cwe-78-improper-neutralization-of-s-6a9f47b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33234%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20runx&amp;severity=high&amp;id=6978fe854623b1157c3c22d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23592-vulnerability-in-hewlett-packard-en-7e9f731c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23592%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Fabric%20Composer&amp;severity=high&amp;id=6978fe854623b1157c3c22db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1315-cwe-20-improper-input-validation-in--42ad57fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1315%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C220%20v1&amp;severity=high&amp;id=6978fe854623b1157c3c22ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0919-cwe-20-improper-input-validation-in--0ede4dec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0919%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C220%20v1&amp;severity=high&amp;id=6978fe854623b1157c3c22e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0918-cwe-476-null-pointer-dereference-in--27d378ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0918%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C220%20v1&amp;severity=high&amp;id=6978fe854623b1157c3c22e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22260-cwe-674-uncontrolled-recursion-in-o-05cf0dac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22260%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20OISF%20suricata&amp;severity=high&amp;id=6978fb014623b1157c3a8c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14911-vulnerability-in-mongodb-mongo-c-dr-d085cc8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14911%3A%20Vulnerability%20in%20MongoDB%20Mongo-c-driver&amp;severity=high&amp;id=6978fb014623b1157c3a8c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22259-cwe-400-uncontrolled-resource-consu-86b4ae49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22259%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=6978f3f94623b1157c39790c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-rolls-out-lockdown-style-security-mode-to-9fdae6f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Rolls%20Out%20Lockdown-Style%20Security%20Mode%20to%20Protect%20Targeted%20Users%20From%20Spyware&amp;severity=medium&amp;id=69791f8b4623b1157c45d419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-detect-pakistan-linked-cyber-campaigns-aim-69233911</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Detect%20Pakistan-Linked%20Cyber%20Campaigns%20Aimed%20at%20Indian%20Government%20Entities&amp;severity=medium&amp;id=69791f8b4623b1157c45d41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0705-cwe-276-in-acronis-acronis-cloud-man-7dec6718</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0705%3A%20CWE-276%20in%20Acronis%20Acronis%20Cloud%20Manager&amp;severity=medium&amp;id=6978ecf04623b1157c3739d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-apps-nfc-skimming-attacks-and-other-android-i-964f4e8f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20apps%2C%20NFC%20skimming%20attacks%2C%20and%20other%20Android%20issues%20in%202026%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=697920694623b1157c45f3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1483-cwe-89-improper-neutralization-of-sp-a2843041</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1483%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1482-cwe-89-improper-neutralization-of-sp-613e5093</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1482%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1481-cwe-89-improper-neutralization-of-sp-cb323b62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1481%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1480-cwe-89-improper-neutralization-of-sp-7ed5fc20</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1480%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1479-cwe-89-improper-neutralization-of-sp-020896bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1479%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1478-cwe-89-improper-neutralization-of-sp-11571c96</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1478%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1477-cwe-89-improper-neutralization-of-sp-90f0182a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1476-cwe-89-improper-neutralization-of-sp-2a7a74b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1476%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c36696c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1475-cwe-89-improper-neutralization-of-sp-76ede8e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1475%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1474-cwe-89-improper-neutralization-of-sp-9edb4b40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1474%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1473-cwe-89-improper-neutralization-of-sp-8752fa95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1473%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1472-cwe-89-improper-neutralization-of-sp-408b0a59</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1472%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22258-cwe-400-uncontrolled-resource-consu-6660cb73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22258%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=6978e96c4623b1157c36696f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24869-vulnerability-in-mozilla-firefox-b0872c4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24869%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6978e2684623b1157c350b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24868-vulnerability-in-mozilla-firefox-3ae61c11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24868%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6978e2684623b1157c350b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24875-cwe-190-integer-overflow-or-wraparo-66631d11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24875%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20yoyofr%20modizer&amp;severity=high&amp;id=6978e26a4623b1157c350bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24874-cwe-843-access-of-resource-using-in-cb8a3098</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24874%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20themrdemonized%20xray-monolith&amp;severity=critical&amp;id=6978e2684623b1157c350b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24873-cwe-125-out-of-bounds-read-in-rinne-942a2b67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24873%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Rinnegatamante%20lpp-vita&amp;severity=high&amp;id=6978e2684623b1157c350b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68670-cwe-121-stack-based-buffer-overflow-a6365ecc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68670%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=critical&amp;id=6978e2684623b1157c350b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24872-vulnerability-in-projectskyfire-sky-f5dffb02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24872%3A%20Vulnerability%20in%20ProjectSkyfire%20SkyFire_548&amp;severity=critical&amp;id=6978e2684623b1157c350b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24871-cwe-94-improper-control-of-generati-6e3cc839</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24871%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20pilgrimage233%20Minecraft-Rcon-Manage&amp;severity=critical&amp;id=6978e2684623b1157c350b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24870-cwe-200-exposure-of-sensitive-infor-203d0690</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24870%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=low&amp;id=6978e2684623b1157c350b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24832-cwe-787-out-of-bounds-write-in-ixra-dedc5197</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24832%3A%20CWE-787%20Out-of-bounds%20Write%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=critical&amp;id=6978dee54623b1157c340bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24831-cwe-835-loop-with-unreachable-exit--0a4371f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24831%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=high&amp;id=6978dee54623b1157c340bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0648-cwe-253-incorrect-check-of-function--bffea3a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0648%3A%20CWE-253%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Eclipse%20Foundation%20Eclipse%20ThreadX&amp;severity=high&amp;id=6978dee54623b1157c340bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55095-cwe-121-stack-based-buffer-overflow-c455961a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55095%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20Eclipse%20Foundation%20Eclipse%20ThreadX%20-%20USBX&amp;severity=medium&amp;id=6978dee54623b1157c340bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55102-cwe-400-uncontrolled-resource-consu-b1a75b72</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55102%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Eclipse%20ThreadX%20-%20NetX%20Duo&amp;severity=high&amp;id=6978db5e4623b1157c33187c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-organizations-targeted-in-shinyhunters-ph-f0a71441</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20Organizations%20Targeted%20in%20ShinyHunters%20Phishing%20Campaign&amp;severity=medium&amp;id=6978d4214623b1157c312357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attacks-expand-using-fake-captchas-micros-a74c1b32</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attacks%20Expand%20Using%20Fake%20CAPTCHAs%2C%20Microsoft%20Scripts%2C%20and%20Trusted%20Web%20Services&amp;severity=medium&amp;id=69791f8b4623b1157c45d41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1489-out-of-bounds-write-in-red-hat-red-h-0b1d383e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1489%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6978d0d04623b1157c302b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1470-cwe-95-improper-neutralization-of-di-90ad0231</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1470%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)&amp;severity=critical&amp;id=6978cd4c4623b1157c2e02f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/packagegate-flaws-open-javascript-ecosystem-to-sup-63993445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98PackageGate%E2%80%99%20Flaws%20Open%20JavaScript%20Ecosystem%20to%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=6978c28d4623b1157c2b24f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1485-out-of-bounds-read-in-red-hat-red-ha-1021c9d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1485%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6978c6444623b1157c2c3089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1484-out-of-bounds-write-in-red-hat-red-h-1a38e534</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1484%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6978c6444623b1157c2c3085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivoting-from-paytool-tracking-various-frauds-and--4fbe3952</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pivoting%20From%20PayTool%3A%20Tracking%20Various%20Frauds%20and%20E-Crime%20Targeting%20Canada&amp;severity=medium&amp;id=6978f3f84623b1157c39786c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-quantum-computing-and-the-pote-f67c4472</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Quantum%20Computing%20and%20the%20Potential%20Synergy%20With%20Advanced%20AI&amp;severity=medium&amp;id=6978b0fd4623b1157c258c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-edge-extensions-caught-stealing-chatgpt-ses-2228617f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%2C%20Edge%20Extensions%20Caught%20Stealing%20ChatGPT%20Sessions&amp;severity=low&amp;id=6978b0fd4623b1157c258c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12387-cwe-754-improper-check-for-unusual--cf7e98e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12387%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Pix-Link%20LV-WR21Q&amp;severity=medium&amp;id=6978aa244623b1157c209818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12386-cwe-306-missing-authentication-for--e386709e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12386%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pix-Link%20LV-WR21Q&amp;severity=medium&amp;id=6978aa244623b1157c209813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctem-in-practice-prioritization-validation-and-out-000549fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTEM%20in%20Practice%3A%20Prioritization%2C%20Validation%2C%20and%20Outcomes%20That%20Matter&amp;severity=medium&amp;id=69791f8b4623b1157c45d422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coolclient-backdoor-updated-new-data-stealing-tool-402aab41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoolClient%20backdoor%20updated%2C%20new%20data%20stealing%20tools%20used&amp;severity=medium&amp;id=6978e5e84623b1157c359a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41728-cwe-125-out-of-bounds-read-in-beckh-8fd0b144</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41728%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Beckhoff%20Automation%20Beckhoff.Device.Manager.XAR&amp;severity=medium&amp;id=6978a6a04623b1157c1f3433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41727-cwe-420-unprotected-alternate-chann-c5405b93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41727%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Beckhoff%20Automation%20Beckhoff.Device.Manager.XAR&amp;severity=high&amp;id=6978a6a04623b1157c1f3439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41726-cwe-190-integer-overflow-or-wraparo-b2917777</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41726%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Beckhoff%20Automation%20Beckhoff.Device.Manager.XAR&amp;severity=high&amp;id=6978a6a04623b1157c1f3436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-linux-vulnerabil-427b51e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Linux%20Vulnerabilities&amp;severity=low&amp;id=6978985d4623b1157c1a3531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-office-zero-day-cve-2026-21509-emergency-44da08bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Office%20Zero-Day%20(CVE-2026-21509)%20-%20Emergency%20Patch%20Issued%20for%20Active%20Exploitation&amp;severity=high&amp;id=69791f8b4623b1157c45d425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-grist-core-vulnerability-allows-rce-attac-ecac8c52</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Grist-Core%20Vulnerability%20Allows%20RCE%20Attacks%20via%20Spreadsheet%20Formulas&amp;severity=critical&amp;id=69791f8b4623b1157c45d428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24348-cwe-20-improper-input-validation-in-fd43884c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24348%3A%20CWE-20%20Improper%20Input%20Validation%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=high&amp;id=69788a804623b1157c156bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24830-cwe-190-integer-overflow-or-wraparo-6873dccf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24830%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Ralim%20IronOS&amp;severity=critical&amp;id=69788a804623b1157c156bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21417-cwe-256-plaintext-storage-of-a-pass-d642e959</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21417%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20CloudBoost%20Virtual%20Appliance&amp;severity=high&amp;id=69788a804623b1157c156bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24347-cwe-20-improper-input-validation-in-89d3b05d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24347%3A%20CWE-20%20Improper%20Input%20Validation%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=medium&amp;id=69788a804623b1157c156bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24346-cwe-798-use-of-hard-coded-credentia-5ce39fc1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24346%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=high&amp;id=6978db5e4623b1157c331882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1467-improper-neutralization-of-crlf-sequ-c16f3390</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1467%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6978f0754623b1157c38c52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24829-cwe-787-out-of-bounds-write-in-is-d-caaaa648</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24829%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Is-Daouda%20is-Engine&amp;severity=medium&amp;id=6978f0754623b1157c38c536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24828-cwe-401-missing-release-of-memory-a-670bf0ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24828%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Is-Daouda%20is-Engine&amp;severity=high&amp;id=6978f0754623b1157c38c533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24345-cwe-20-improper-input-validation-in-dc94d8d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24345%3A%20CWE-20%20Improper%20Input%20Validation%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=medium&amp;id=6978db5e4623b1157c33187f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24827-cwe-787-out-of-bounds-write-in-gers-1945ebca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24827%3A%20CWE-787%20Out-of-bounds%20Write%20in%20gerstrong%20Commander-Genius&amp;severity=high&amp;id=6978d7da4623b1157c322a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24826-cwe-787-out-of-bounds-write-in-cada-bb3cea2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24826%3A%20CWE-787%20Out-of-bounds%20Write%20in%20cadaver%20turso3d&amp;severity=critical&amp;id=69790cec4623b1157c400490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21721-vulnerability-in-grafana-grafanagra-3613c954</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21721%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana&amp;severity=high&amp;id=697883784623b1157c131411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21720-vulnerability-in-grafana-grafanagra-3c0383a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21720%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana-enterprise&amp;severity=high&amp;id=697883784623b1157c13140e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24344-cwe-120-buffer-copy-without-checkin-554e2e6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24344%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=high&amp;id=697883784623b1157c131414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24825-cwe-401-missing-release-of-memory-a-eec619d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24825%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20ydb-platform%20ydb&amp;severity=medium&amp;id=697883784623b1157c131423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24824-cwe-79-improper-neutralization-of-i-90b11954</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20yacy%20yacy_search_server&amp;severity=medium&amp;id=697883784623b1157c131420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-have-used-the-peckbirdy-javas-984bb4b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Have%20Used%20the%20PeckBirdy%20JavaScript%20C2%20Framework%20Since%202023&amp;severity=medium&amp;id=69791f8b4623b1157c45d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24823-cwe-787-out-of-bounds-write-in-fast-b0665349</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24823%3A%20CWE-787%20Out-of-bounds%20Write%20in%20FASTSHIFT%20X-TRACK&amp;severity=critical&amp;id=697883784623b1157c13141d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24822-cwe-787-out-of-bounds-write-in-tttt-aac842f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24822%3A%20CWE-787%20Out-of-bounds%20Write%20in%20ttttupup%20wxhelper&amp;severity=critical&amp;id=697883784623b1157c13141a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24821-cwe-125-out-of-bounds-read-in-turan-b1b6443e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24821%3A%20CWE-125%20Out-of-bounds%20Read%20in%20turanszkij%20WickedEngine&amp;severity=critical&amp;id=697883784623b1157c131417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24820-cwe-125-out-of-bounds-read-in-turan-77d68267</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24820%3A%20CWE-125%20Out-of-bounds%20Read%20in%20turanszkij%20WickedEngine&amp;severity=medium&amp;id=69787ff64623b1157c11b8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24819-cwe-1325-improperly-controlled-sequ-5ae68213</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24819%3A%20CWE-1325%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20foxinmy%20weixin4j&amp;severity=medium&amp;id=69787ff64623b1157c11b8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24818-cwe-125-out-of-bounds-read-in-prayd-493f9901</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24818%3A%20CWE-125%20Out-of-bounds%20Read%20in%20praydog%20UEVR&amp;severity=medium&amp;id=69787ff54623b1157c11b68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24817-cwe-787-out-of-bounds-write-in-pray-18d5f82d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24817%3A%20CWE-787%20Out-of-bounds%20Write%20in%20praydog%20UEVR&amp;severity=high&amp;id=69787ff54623b1157c11b689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24816-cwe-835-loop-with-unreachable-exit--15b8d095</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24816%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20datavane%20tis&amp;severity=critical&amp;id=69787ff54623b1157c11b686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24815-cwe-434-unrestricted-upload-of-file-d3686da3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24815%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20datavane%20tis&amp;severity=critical&amp;id=69787ff54623b1157c11b683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24814-cwe-190-integer-overflow-or-wraparo-c2e362a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24814%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20swoole%20swoole-src&amp;severity=critical&amp;id=69787ff54623b1157c11b680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24813-cwe-476-null-pointer-dereference-in-2da74693</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24813%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20abcz316%20SKRoot-linuxKernelRoot&amp;severity=high&amp;id=69787ff54623b1157c11b67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24812-vulnerability-in-root-project-root-64665872</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24812%3A%20Vulnerability%20in%20root-project%20root&amp;severity=critical&amp;id=69787ff54623b1157c11b67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24811-vulnerability-in-root-project-root-7b965294</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24811%3A%20Vulnerability%20in%20root-project%20root&amp;severity=critical&amp;id=69787ff54623b1157c11b677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24809-cwe-787-out-of-bounds-write-in-pray-826db66e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24809%3A%20CWE-787%20Out-of-bounds%20Write%20in%20praydog%20REFramework&amp;severity=medium&amp;id=69787ff54623b1157c11b674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24807-cwe-347-improper-verification-of-cr-3eccaada</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24807%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20liuyueyi%20quick-media&amp;severity=medium&amp;id=69787ff54623b1157c11b671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24806-cwe-94-improper-control-of-generati-b6861ea8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24806%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20liuyueyi%20quick-media&amp;severity=medium&amp;id=69787c804623b1157c108be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24805-cwe-476-null-pointer-dereference-in-3b3d3d04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24805%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20visualfc%20liteide&amp;severity=medium&amp;id=69787c804623b1157c108bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-office-zero-day-likely-exploited-a885b7b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Office%20Zero-Day%20Likely%20Exploited%20in%20Targeted%20Attacks&amp;severity=medium&amp;id=69787c3d4623b1157c10804e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24804-cwe-835-loop-with-unreachable-exit--0ebdcdb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24804%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20coolsnowwolf%20lede&amp;severity=critical&amp;id=69787c804623b1157c108bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24803-cwe-835-loop-with-unreachable-exit--ce2b24a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24803%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20coolsnowwolf%20lede&amp;severity=critical&amp;id=69787c804623b1157c108bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24802-cwe-835-loop-with-unreachable-exit--36694367</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24802%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20briandilley%20jsonrpc4j&amp;severity=medium&amp;id=69787c804623b1157c108bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24801-vulnerability-in-ralim-ironos-e3c2d198</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24801%3A%20Vulnerability%20in%20Ralim%20IronOS&amp;severity=medium&amp;id=69787c804623b1157c108bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24800-cwe-787-out-of-bounds-write-in-tild-2d89ca37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24800%3A%20CWE-787%20Out-of-bounds%20Write%20in%20tildearrow%20furnace&amp;severity=critical&amp;id=69787c804623b1157c108bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24799-cwe-787-out-of-bounds-write-in-davi-86c6f764</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24799%3A%20CWE-787%20Out-of-bounds%20Write%20in%20davisking%20dlib&amp;severity=medium&amp;id=69787c804623b1157c108bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24798-cwe-119-improper-restriction-of-ope-1fb91011</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24798%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20GaijinEntertainment%20DagorEngine&amp;severity=critical&amp;id=69787c804623b1157c108bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24797-cwe-787-out-of-bounds-write-in-neka-dabe41fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24797%3A%20CWE-787%20Out-of-bounds%20Write%20in%20neka-nat%20cupoch&amp;severity=medium&amp;id=697878ed4623b1157c0fa6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24795-cwe-787-out-of-bounds-write-in-clov-be5d62bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24795%3A%20CWE-787%20Out-of-bounds%20Write%20in%20CloverHackyColor%20CloverBootloader&amp;severity=medium&amp;id=697878ed4623b1157c0fa6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24796-cwe-125-out-of-bounds-read-in-clove-89b633ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24796%3A%20CWE-125%20Out-of-bounds%20Read%20in%20CloverHackyColor%20CloverBootloader&amp;severity=medium&amp;id=697878ed4623b1157c0fa6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24794-cwe-119-improper-restriction-of-ope-ee39e994</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24794%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20CardboardPowered%20cardboard&amp;severity=critical&amp;id=697878ed4623b1157c0fa69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24793-cwe-787-out-of-bounds-write-in-azer-1ec9b576</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24793%3A%20CWE-787%20Out-of-bounds%20Write%20in%20azerothcore%20azerothcore-wotlk&amp;severity=critical&amp;id=697878ed4623b1157c0fa69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1464-cwe-190-integer-overflow-or-wraparou-e3c1db4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1464%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20MuntashirAkon%20AppManager&amp;severity=medium&amp;id=697878ed4623b1157c0fa694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1465-cwe-119-improper-restriction-of-oper-dd88a3aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1465%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20anyrtcIO-Community%20anyRTC-RTMP-OpenSource&amp;severity=high&amp;id=697878ed4623b1157c0fa697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14971-cwe-862-missing-authorization-in-li-47d68db7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14971%3A%20CWE-862%20Missing%20Authorization%20in%20linknacional%20Link%20Invoice%20Payment%20for%20WooCommerce&amp;severity=medium&amp;id=697863d44623b1157c081536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21408-uncontrolled-search-path-element-in-1a82a11f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21408%3A%20Uncontrolled%20Search%20Path%20Element%20in%20FUJIFILM%20Business%20Innovation%20Corp.%20beat-access%20for%20Windows&amp;severity=high&amp;id=69784b384623b1157cfa2612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1361-cwe-121-stack-based-buffer-overflow--2a765591</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1361%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ASDA-Soft&amp;severity=high&amp;id=6978329c4623b1157cd9c78d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/initial-stages-of-romance-scams-x5bguest-diaryx5d--30aa95fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Initial%20Stages%20of%20Romance%20Scams%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Tue%2C%20Jan%2027th)&amp;severity=medium&amp;id=697820db4623b1157ccbe03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24686-cwe-22-improper-limitation-of-a-pat-a82658c8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24686%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20theupdateframework%20go-tuf&amp;severity=medium&amp;id=69780bf04623b1157cc7aad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24479-cwe-22-improper-limitation-of-a-pat-37e6225f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24479%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zhblue%20hustoj&amp;severity=critical&amp;id=69780bf04623b1157cc7aabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24490-cwe-79-improper-neutralization-of-i-8427805e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24490%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=high&amp;id=69780bf04623b1157cc7aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24489-cwe-93-improper-neutralization-of-c-684b5c93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24489%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20HappyHackingSpace%20gakido&amp;severity=medium&amp;id=69780bf04623b1157cc7aac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24486-cwe-22-improper-limitation-of-a-pat-b129ef62</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24486%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Kludex%20python-multipart&amp;severity=high&amp;id=69780bf04623b1157cc7aac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23683-cwe-862-missing-authorization-in-sa-0f5da0d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23683%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6978086c4623b1157cc5f11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-27-2880f4ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-27&amp;severity=medium&amp;id=697956324623b1157c51968a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65264-na-1aa1d5f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65264%3A%20n%2Fa&amp;severity=medium&amp;id=6978f0754623b1157c38c52b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69564-na-1d8455d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69564%3A%20n%2Fa&amp;severity=critical&amp;id=6978e96c4623b1157c36695c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69562-na-db202841</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69562%3A%20n%2Fa&amp;severity=critical&amp;id=6978e96c4623b1157c366958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69559-na-01951af2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69559%3A%20n%2Fa&amp;severity=critical&amp;id=6978e96c4623b1157c366954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69563-na-87b4b46f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69563%3A%20n%2Fa&amp;severity=critical&amp;id=6978e5e94623b1157c359a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28162-na-c7e6a9dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28162%3A%20n%2Fa&amp;severity=medium&amp;id=6978e2684623b1157c350b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69565-na-8780e99d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69565%3A%20n%2Fa&amp;severity=critical&amp;id=6978e2684623b1157c350b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28164-na-aff48337</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28164%3A%20n%2Fa&amp;severity=medium&amp;id=6978db5e4623b1157c331878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-27-46946cc2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-27&amp;severity=low&amp;id=697894d64623b1157c193d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1449-sql-injection-in-hisense-transtech-s-4d92f699</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1449%3A%20SQL%20Injection%20in%20Hisense%20TransTech%20Smart%20Bus%20Management%20System&amp;severity=medium&amp;id=69790cec4623b1157c40049a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1448-os-command-injection-in-d-link-dir-6-1061472a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1448%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=69790cec4623b1157c400493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24478-cwe-22-improper-limitation-of-a-pat-7cc58696</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24478%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69790cec4623b1157c4004a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24477-cwe-201-insertion-of-sensitive-info-0135526e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24477%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=6977fa5c4623b1157cc21c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30248-cwe-427-in-western-digital-wd-disco-dfdda4a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30248%3A%20CWE-427%20in%20Western%20Digital%20WD%20Discovery&amp;severity=high&amp;id=6977f35d4623b1157cc0c83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24470-cwe-441-unintended-proxy-or-interme-b639318b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24470%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20zalando%20skipper&amp;severity=high&amp;id=6977efd04623b1157cc026ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24003-cwe-287-improper-authentication-in--eeb0d1a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24003%3A%20CWE-287%3A%20Improper%20Authentication%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=6977e8c84623b1157cbefcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1445-unrestricted-upload-in-ijason-liu-bo-1de5fa1b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1445%3A%20Unrestricted%20Upload%20in%20iJason-Liu%20Books_Manager&amp;severity=medium&amp;id=6977e8c84623b1157cbefcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59472-vulnerability-in-vercel-next-83d3bf12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59472%3A%20Vulnerability%20in%20vercel%20next&amp;severity=medium&amp;id=6977e1c04623b1157cbdb6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59471-vulnerability-in-vercel-next-17d14f61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59471%3A%20Vulnerability%20in%20vercel%20next&amp;severity=medium&amp;id=6977e1c04623b1157cbdb69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1444-cross-site-scripting-in-ijason-liu-b-f13b545f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1444%3A%20Cross%20Site%20Scripting%20in%20iJason-Liu%20Books_Manager&amp;severity=medium&amp;id=69790cec4623b1157c4004a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22709-cwe-94-improper-control-of-generati-1636b6af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22709%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20patriksimek%20vm2&amp;severity=critical&amp;id=69790cec4623b1157c4004b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22696-cwe-347-improper-verification-of-cr-b87887a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22696%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Phala-Network%20dcap-qvl&amp;severity=critical&amp;id=69790cec4623b1157c4004ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-attacks-target-indian-government-using-gogitte-beb16e30</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Attacks%20Target%20Indian%20Government%20Using%20GOGITTER%2C%20GITSHELLPAD%2C%20and%20GOSHELL%20%7C%20Part%201&amp;severity=medium&amp;id=69786adc4623b1157c0a63cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1443-sql-injection-in-code-projects-onlin-0655515f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1443%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=6977ccaa4623b1157cb9dc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9820-stack-based-buffer-overflow-in-red-h-f66f7bc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9820%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6977c9254623b1157cb7b5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9615-improper-preservation-of-permissions-3fd3b178</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9615%3A%20Improper%20Preservation%20of%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6977c9254623b1157cb7b5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1190-missing-xml-validation-in-red-hat-re-cee86e03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1190%3A%20Missing%20XML%20Validation%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=6977c5a14623b1157cb6ffab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0810-incorrect-calculation-of-multi-byte--af498b2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0810%3A%20Incorrect%20Calculation%20of%20Multi-Byte%20String%20Length%20in%20GitoxideLabs%20gitoxide&amp;severity=high&amp;id=6977c5a14623b1157cb6ffa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14525-allocation-of-resources-without-lim-f4a700f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14525%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Virtualization%204&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14969-missing-release-of-resource-after-e-6be880ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14969%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Quarkus%203.27.2&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14459-authorization-bypass-through-user-c-38c24cd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14459%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20RHEL-9-CNV-4.19&amp;severity=high&amp;id=6977c5a14623b1157cb6ff8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11687-improper-neutralization-of-input-du-8a400365</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11687%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11065-generation-of-error-message-contain-49b83784</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11065%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9522-cwe-918-server-side-request-forgery--fc627c84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9522%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TP-Link%20Systems%20Inc.%20Omada%20Controller&amp;severity=medium&amp;id=6977c5a14623b1157cb6ffa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9521-cwe-522-insufficiently-protected-cre-7f02f470</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9521%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20TP-Link%20Systems%20Inc.%20Omada%20Controller&amp;severity=low&amp;id=6977c5a14623b1157cb6ff9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9520-cwe-639-authorization-bypass-through-e6d09812</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9520%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TP-Link%20Systems%20Inc.%20Omada%20Controller&amp;severity=high&amp;id=6977c5a14623b1157cb6ff98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23864-cwe-502-deserialization-of-untruste-c66bc996</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23864%3A%20(CWE-502)%3A%20Deserialization%20of%20Untrusted%20Data.%20(CWE-400)%3A%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-webpack&amp;severity=high&amp;id=6977c21c4623b1157cb61420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14756-cwe-77-improper-neutralization-of-s-4556bd0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14756%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20MR600%20v5.0&amp;severity=high&amp;id=6977b0924623b1157cb2aa67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71178-cwe-427-uncontrolled-search-path-el-577cf8f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71178%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Micron%20Technology%2C%20Inc.%20Crucial%20Storage%20Executive&amp;severity=high&amp;id=6977ad0e4623b1157cb13175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0925-improper-validation-of-specified-qua-53d9897a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0925%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Tanium%20Discover&amp;severity=low&amp;id=6977ad0e4623b1157cb13179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24435-cwe-942-permissive-cross-domain-sec-71857ed3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24435%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977ad0e4623b1157cb13180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24439-cwe-116-improper-encoding-or-escapi-bdf35b88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24439%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=low&amp;id=6977ad0e4623b1157cb13184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57784-cwe-208-observable-timing-discrepan-e92bf02d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57784%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Hiawatha%20Hiawatha%20Web%20server&amp;severity=medium&amp;id=6977ad0e4623b1157cb1316f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24432-cwe-352-cross-site-request-forgery--f00e195e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24432%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=medium&amp;id=6977ad0e4623b1157cb1317c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57785-cwe-415-double-free-in-hiawatha-hia-29a8d525</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57785%3A%20CWE-415%20Double%20Free%20in%20Hiawatha%20Hiawatha%20Web%20server&amp;severity=medium&amp;id=6977ad0e4623b1157cb13172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57783-cwe-444-inconsistent-interpretation-e25faf48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57783%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Hiawatha%20Hiawatha%20Web%20server&amp;severity=medium&amp;id=6977a98b4623b1157caf781f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24433-cwe-79-improper-neutralization-of-i-45669f67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=medium&amp;id=6977a98b4623b1157caf7835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24431-cwe-317-cleartext-storage-of-sensit-ab9006d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24431%3A%20CWE-317%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20GUI%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf7831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24437-cwe-525-use-of-web-browser-cache-co-72fdfb6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24437%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=medium&amp;id=6977a98b4623b1157caf783d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24436-cwe-307-improper-restriction-of-exc-6aed44b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24436%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=critical&amp;id=6977a98b4623b1157caf7839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24428-cwe-863-incorrect-authorization-in--44cb5ee5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24428%3A%20CWE-863%20Incorrect%20Authorization%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf7825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24430-cwe-201-insertion-of-sensitive-info-04c7a288</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24430%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf782d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24429-cwe-1393-use-of-default-password-in-8ff3cec7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24429%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=critical&amp;id=6977a98b4623b1157caf7829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24440-cwe-620-unverified-password-change--1c4abfce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24440%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf7841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1224-allocation-of-resources-without-limi-d7ece23d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1224%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Tanium%20Discover&amp;severity=medium&amp;id=6977a98b4623b1157caf7822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1446-cwe-79-improper-neutralization-of-in-73578bdc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1446%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Pro&amp;severity=medium&amp;id=6977a6094623b1157cae90c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21509-cwe-807-reliance-on-untrusted-input-a681ae8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21509%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=6977a2884623b1157cab31e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indian-users-targeted-in-tax-phishing-campaign-del-8506907c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indian%20Users%20Targeted%20in%20Tax%20Phishing%20Campaign%20Delivering%20Blackmoon%20Malware&amp;severity=medium&amp;id=6977d37c4623b1157cbb6736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/access-system-flaws-enabled-hackers-to-unlock-door-15d14345</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Access%20System%20Flaws%20Enabled%20Hackers%20to%20Unlock%20Doors%20at%20Major%20European%20Firms&amp;severity=medium&amp;id=697794364623b1157ca384e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vs-code-ai-extensions-with-15-million-in-61603c0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VS%20Code%20AI%20Extensions%20with%201.5%20Million%20Installs%20Steal%20Developer%20Source%20Code&amp;severity=medium&amp;id=6977d37c4623b1157cbb6739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gentic-ai-security-measures-based-on-the-owasp-asi-366d5139</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%D0%90gentic%20AI%20security%20measures%20based%20on%20the%20OWASP%20ASI%20Top%2010&amp;severity=medium&amp;id=69778a194623b1157c9f3ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-moonpeak-executed-via-lnk-files-8203f9e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20MoonPeak%20Executed%20via%20LNK%20Files&amp;severity=medium&amp;id=6977a9814623b1157caf7565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/26th-january-threat-intelligence-report-5ae286fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=26th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69776dbd4623b1157c9313f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1284-cwe-787-out-of-bounds-write-in-dassa-a10795f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1284%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=697771404623b1157c944d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1283-cwe-122-heap-based-buffer-overflow-i-189e83d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1283%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=697771404623b1157c944d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crunchbase-confirms-data-breach-after-hacking-clai-2677bfd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crunchbase%20Confirms%20Data%20Breach%20After%20Hacking%20Claims&amp;severity=medium&amp;id=69775f794623b1157c8e6c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-firewall-flaws-ai-built-malware-brows-83313ca1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Firewall%20Flaws%2C%20AI-Built%20Malware%2C%20Browser%20Traps%2C%20Critical%20CVEs%20%26%20More&amp;severity=critical&amp;id=6977d37c4623b1157cbb673c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stanley-malware-toolkit-enables-phishing-via-websi-7c6649d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Stanley%E2%80%99%20Malware%20Toolkit%20Enables%20Phishing%20via%20Website%20Spoofing&amp;severity=medium&amp;id=697754ed4623b1157c89cf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/winning-against-ai-based-attacks-requires-a-combin-b2304b8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Winning%20Against%20AI-Based%20Attacks%20Requires%20a%20Combined%20Defensive%20Approach&amp;severity=medium&amp;id=6977d37c4623b1157cbb673f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59109-cwe-1295-debug-messages-revealing-u-4fa85a06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59109%3A%20CWE-1295%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20dormakaba%20dormakaba%20registration%20unit%209002&amp;severity=medium&amp;id=6977400b4623b1157c815ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59108-cwe-1392-use-of-default-credentials-70a71ad4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59108%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=critical&amp;id=6977400b4623b1157c815ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59107-cwe-798-use-of-hard-coded-credentia-b94476b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59107%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400b4623b1157c815edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59106-cwe-272-least-privilege-violation-i-b1342125</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59106%3A%20CWE-272%3A%20Least%20Privilege%20Violation%20in%20dormakaba%20Access%20Manager%2092xx-k7&amp;severity=high&amp;id=6977400b4623b1157c815ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59105-cwe-312-cleartext-storage-of-sensit-0c88dcf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59105%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400b4623b1157c815ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59104-cwe-1234-hardware-internal-or-debug-f630324d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59104%3A%20CWE-1234%3A%20Hardware%20Internal%20or%20Debug%20Modes%20Allow%20Override%20of%20Locks%20in%20dormakaba%20Access%20Manager%2092xx-k7&amp;severity=high&amp;id=6977400b4623b1157c815ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59103-cwe-1391-use-of-weak-credentials-in-431460c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59103%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=critical&amp;id=6977400b4623b1157c815ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59102-cwe-312-cleartext-storage-of-sensit-aa17446d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59102%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=medium&amp;id=6977400b4623b1157c815ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59101-cwe-291-reliance-on-ip-address-for--51142fc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59101%3A%20CWE-291%3A%20Reliance%20on%20IP%20Address%20for%20Authentication%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400b4623b1157c815ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59100-cwe-285-improper-authorization-in-d-0466289c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59100%3A%20CWE-285%3A%20Improper%20Authorization%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=medium&amp;id=6977400b4623b1157c815eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59099-cwe-35-path-traversal-in-dormakaba--dac7a66d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59099%3A%20CWE-35%3A%20Path%20Traversal%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400a4623b1157c815ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59098-cwe-497-exposure-of-sensitive-syste-bc41aa77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59098%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400a4623b1157c815e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59097-cwe-306-missing-authentication-for--acb2ae90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59097%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=critical&amp;id=6977400a4623b1157c815e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59096-cwe-798-use-of-hard-coded-credentia-4dde671c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59096%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=medium&amp;id=6977400a4623b1157c815e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59095-cwe-798-use-of-hard-coded-credentia-71cd56bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59095%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=medium&amp;id=6977400a4623b1157c815e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59094-cwe-269-improper-privilege-manageme-77fa67b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59094%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=high&amp;id=6977400a4623b1157c815e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59093-cwe-656-reliance-on-security-throug-d255abf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59093%3A%20CWE-656%3A%20Reliance%20on%20Security%20Through%20Obscurity%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=high&amp;id=6977400a4623b1157c815e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59092-cwe-798-use-of-hard-coded-credentia-2cb59293</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59092%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=high&amp;id=6977400a4623b1157c815e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59091-cwe-798-use-of-hard-coded-credentia-84df14c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59091%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=critical&amp;id=6977400a4623b1157c815e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59090-cwe-306-missing-authentication-for--88a4dc03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59090%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=critical&amp;id=6977400a4623b1157c815e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27821-cwe-787-out-of-bounds-write-in-apac-2665aad5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27821%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Apache%20Software%20Foundation%20HDFS%20native%20client&amp;severity=high&amp;id=697739004623b1157c7df51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41083-cwe-74-improper-neutralization-of-s-95e69c45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41083%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Altitude%20Altitude%20Communication%20Server&amp;severity=medium&amp;id=697739004623b1157c7df521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24656-cwe-502-deserialization-of-untruste-dadf3c2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24656%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Karaf&amp;severity=low&amp;id=697739004623b1157c7df524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41082-cwe-444-inconsistent-interpretation-08d9a62c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41082%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Altitude%20Altitude%20Communication%20Server&amp;severity=medium&amp;id=6977357c4623b1157c7c290d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-sandworm-hackers-blamed-for-cyberattack-on-96300613</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Sandworm%20Hackers%20Blamed%20for%20Cyberattack%20on%20Polish%20Power%20Grid&amp;severity=medium&amp;id=69772e414623b1157c783c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macsync-stealer-returns-seo-poisoning-and-fake-git-6295929d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacSync%20Stealer%20Returns%3A%20SEO%20Poisoning%20and%20Fake%20GitHub%20Repositories%20Target%20macOS%20Users&amp;severity=medium&amp;id=697731f84623b1157c79b499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-hackers-deploy-ai-generated-powershell-backd-f6a39cdb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Konni%20Hackers%20Deploy%20AI-Generated%20PowerShell%20Backdoor%20Against%20Blockchain%20Developers&amp;severity=high&amp;id=6977d37c4623b1157cbb6742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1429-cwe-79-improper-neutralization-of-in-3558d8ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WellChoose%20Single%20Sign-On%20Portal%20System&amp;severity=medium&amp;id=6977276d4623b1157c74e4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-depth-analysis-of-vietnamese-stealer-python-bas-eb75b788</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-Depth%20Analysis%20of%20Vietnamese%20Stealer%3A%20Python-Based%20Info%20Stealer%20Using%20Telegram%20C2%20and%20DLL%20Sideloading&amp;severity=high&amp;id=6977235f4623b1157c732d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1428-cwe-78-improper-neutralization-of-sp-3e22c0ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1428%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WellChoose%20Single%20Sign-On%20Portal%20System&amp;severity=high&amp;id=6977276d4623b1157c74e4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1427-cwe-78-improper-neutralization-of-sp-65c40dce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1427%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WellChoose%20Single%20Sign-On%20Portal%20System&amp;severity=high&amp;id=697724144623b1157c737332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1425-stack-based-buffer-overflow-in-pymum-f80d7835</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1425%3A%20Stack-based%20Buffer%20Overflow%20in%20pymumu%20SmartDNS&amp;severity=medium&amp;id=69771ce04623b1157c70533a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1424-unrestricted-upload-in-phpgurukul-ne-5bc5b437</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1424%3A%20Unrestricted%20Upload%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=697712544623b1157c6c4eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1423-unrestricted-upload-in-code-projects-cc67b584</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1423%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=69777bcc4623b1157c990fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1422-sql-injection-in-code-projects-onlin-28382f5c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1422%3A%20SQL%20Injection%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=697707c94623b1157c67230d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14973-cwe-89-sql-injection-in-recipe-card-f2600f17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14973%3A%20CWE-89%20SQL%20Injection%20in%20Recipe%20Card%20Blocks%20Lite&amp;severity=medium&amp;id=697707c94623b1157c67230a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14316-cwe-79-cross-site-scripting-xss-in--dffe6429</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14316%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20AhaChat%20Messenger%20Marketing&amp;severity=high&amp;id=697707c94623b1157c672307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1421-cross-site-scripting-in-code-project-046be19b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1421%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=6976fd4a4623b1157c61191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2024-vmware-flaw-now-in-attackers-crosshairs-b1464dff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2024%20VMware%20Flaw%20Now%20in%20Attackers%E2%80%99%20Crosshairs&amp;severity=critical&amp;id=6976fd0a4623b1157c6110a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1420-buffer-overflow-in-tenda-ac23-efd98bbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1420%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=6977a2884623b1157cab31e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1419-command-injection-in-d-link-dcs700l-47f8b11c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1419%3A%20Command%20Injection%20in%20D-Link%20DCS700l&amp;severity=medium&amp;id=6976f2b04623b1157c5da02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1418-out-of-bounds-write-in-gpac-90738829</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1418%3A%20Out-of-bounds%20Write%20in%20GPAC&amp;severity=medium&amp;id=6976eba84623b1157c5a7de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1417-null-pointer-dereference-in-gpac-b6af9ad7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1417%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=6976e11c4623b1157c3c0df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1416-null-pointer-dereference-in-gpac-c0697bcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1416%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=6976e11c4623b1157c3c0dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1415-null-pointer-dereference-in-gpac-dbe50936</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1415%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=6976d6914623b1157c2ea348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1414-command-injection-in-sangfor-operati-0c2293e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1414%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=6976d6914623b1157c2ea342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1413-command-injection-in-sangfor-operati-7e9a2394</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1413%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=6976cc044623b1157c29d717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1412-command-injection-in-sangfor-operati-db60d9a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1412%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=6976c1784623b1157c18b140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-webserver-with-x24pwd-as-a-starting-path--e2d59043</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20Webserver%20with%20%2F%26%23x24%3B(pwd)%2F%20as%20a%20Starting%20Path%2C%20(Sun%2C%20Jan%2025th)&amp;severity=medium&amp;id=6976bdc14623b1157c134d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1411-improper-access-controls-in-beetel-7-dbb2cd28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1411%3A%20Improper%20Access%20Controls%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=6976ba704623b1157c0e5ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1410-missing-authentication-in-beetel-777-3433ed1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1410%3A%20Missing%20Authentication%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=6976ba704623b1157c0e5adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-26-52609b0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-26&amp;severity=low&amp;id=69791f4c4623b1157c45b7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-26-7634b3de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-26&amp;severity=medium&amp;id=697804b24623b1157cc3b376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70368-na-fc9fb059</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70368%3A%20n%2Fa&amp;severity=medium&amp;id=6977bbea4623b1157cb50af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67274-na-675b0cd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67274%3A%20n%2Fa&amp;severity=high&amp;id=69779ef44623b1157ca6f10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70982-na-6d9036c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70982%3A%20n%2Fa&amp;severity=critical&amp;id=69779ef44623b1157ca6f106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50537-na-4d81dee7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50537%3A%20n%2Fa&amp;severity=medium&amp;id=69778d624623b1157ca089f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-26-e00f0889</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-26&amp;severity=low&amp;id=6976eb734623b1157c5a4481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1409-improper-restriction-of-excessive-au-ce85d87d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1409%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Beetel%20777VR1&amp;severity=low&amp;id=6976a8dc4623b1157cff7319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1408-weak-password-requirements-in-beetel-b1b1330b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1408%3A%20Weak%20Password%20Requirements%20in%20Beetel%20777VR1&amp;severity=low&amp;id=6976a5594623b1157cfebce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1407-information-disclosure-in-beetel-777-1bc56a3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1407%3A%20Information%20Disclosure%20in%20Beetel%20777VR1&amp;severity=low&amp;id=697697484623b1157cf22641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1406-open-redirect-in-lcg0124-bootdo-8924e3de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1406%3A%20Open%20Redirect%20in%20lcg0124%20BootDo&amp;severity=medium&amp;id=697607244623b1157c802958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6461-cwe-200-exposure-of-sensitive-inform-6c1da386</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6461%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cubewp1211%20CubeWP%20Framework&amp;severity=medium&amp;id=697588954623b1157c01bbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-25-fdf20aef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-25&amp;severity=medium&amp;id=6976b3324623b1157c047f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-25-fa2973a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-25&amp;severity=low&amp;id=6975ceb04623b1157c599c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0593-cwe-862-missing-authorization-in-wpg-6cec36e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0593%3A%20CWE-862%20Missing%20Authorization%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=6974f8714623b1157cc25a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0862-cwe-79-improper-neutralization-of-in-0c02f79a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pdfcrowd%20Save%20as%20PDF%20Plugin%20by%20PDFCrowd&amp;severity=medium&amp;id=6974ea624623b1157cbe8a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13920-cwe-200-exposure-of-sensitive-infor-7da736bd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13920%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=medium&amp;id=6974c0304623b1157cb57048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0911-cwe-434-unrestricted-upload-of-file--7bd667a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0911%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpmudev%20Hustle%20%E2%80%93%20Email%20Marketing%2C%20Lead%20Generation%2C%20Optins%2C%20Popups&amp;severity=high&amp;id=6974c0304623b1157cb5704c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multi-stage-phishing-campaign-targets-russia-with--0cd263eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multi-Stage%20Phishing%20Campaign%20Targets%20Russia%20with%20Amnesia%20RAT%20and%20Ransomware&amp;severity=medium&amp;id=69752d084623b1157ccddeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13205-cwe-352-cross-site-request-forgery--5759c8f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13205%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69748ef84623b1157cac2e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1127-cwe-79-improper-neutralization-of-in-71eb27eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Timeline%20Event%20History&amp;severity=medium&amp;id=69748ef84623b1157cac2e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13194-cwe-352-cross-site-request-forgery--70ed80ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13194%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69748ef84623b1157cac2e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1191-cwe-79-improper-neutralization-of-in-45545a99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1191%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freemp%20JavaScript%20Notifier&amp;severity=medium&amp;id=69748ef84623b1157cac2e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1208-cwe-352-cross-site-request-forgery-c-8ce06f0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1208%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mainichiweb%20Friendly%20Functions%20for%20Welcart&amp;severity=medium&amp;id=69748ef84623b1157cac2e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1189-cwe-79-improper-neutralization-of-in-f6a677db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leadbi%20LeadBI%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69748ef84623b1157cac2e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1300-cwe-79-improper-neutralization-of-in-02ef204c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mehtevas%20Responsive%20Header%20Plugin&amp;severity=medium&amp;id=69748ef84623b1157cac2e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13139-cwe-352-cross-site-request-forgery--9b96c820</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13139%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69748ef84623b1157cac2e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nike-probing-potential-security-incident-as-hacker-78d65ffd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nike%20Probing%20Potential%20Security%20Incident%20as%20Hackers%20Threaten%20to%20Leak%20Data&amp;severity=medium&amp;id=697487bd4623b1157caa41c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1098-cwe-79-improper-neutralization-of-in-a7605f1a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codemacher%20CM%20CSS%20Columns&amp;severity=medium&amp;id=6974846c4623b1157ca99ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0633-cwe-287-improper-authentication-in-r-90d7cd89</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0633%3A%20CWE-287%20Improper%20Authentication%20in%20roxnor%20MetForm%20%E2%80%93%20Contact%20Form%2C%20Survey%2C%20Quiz%2C%20%26%20Custom%20Form%20Builder%20for%20Elementor&amp;severity=low&amp;id=6974846c4623b1157ca99ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1302-cwe-79-improper-neutralization-of-in-e2def23c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shahinurislam%20Meta-box%20GalleryMeta&amp;severity=medium&amp;id=6974846c4623b1157ca99ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14630-cwe-352-cross-site-request-forgery--fd43bd15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14630%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rtowebsites%20AdminQuickbar&amp;severity=medium&amp;id=6974846c4623b1157ca99ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0687-cwe-862-missing-authorization-in-sha-2768dd95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0687%3A%20CWE-862%20Missing%20Authorization%20in%20shahinurislam%20Meta-box%20GalleryMeta&amp;severity=medium&amp;id=6974846c4623b1157ca99ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1266-cwe-79-improper-neutralization-of-in-b43efe42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neop%20Postalicious&amp;severity=medium&amp;id=6974846c4623b1157ca99ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14907-cwe-352-cross-site-request-forgery--6add1cc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14907%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hallsofmontezuma%20Moderate%20Selected%20Posts&amp;severity=medium&amp;id=6974846c4623b1157ca99ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15516-cwe-862-missing-authorization-in-pl-5fb8bc44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15516%3A%20CWE-862%20Missing%20Authorization%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=6974846c4623b1157ca99ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0800-cwe-79-improper-neutralization-of-in-d9bf7dc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=high&amp;id=6974846c4623b1157ca99ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dynowiper-malware-used-in-attempted-sandworm-a-301f8258</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DynoWiper%20Malware%20Used%20in%20Attempted%20Sandworm%20Attack%20on%20Polish%20Power%20Sector&amp;severity=medium&amp;id=69752d084623b1157ccddeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/who-approved-this-agent-rethinking-access-accounta-641b74f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Who%20Approved%20This%20Agent%3F%20Rethinking%20Access%2C%20Accountability%2C%20and%20Risk%20in%20the%20Age%20of%20AI%20Agents&amp;severity=low&amp;id=69752d084623b1157ccddeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-vmware-vcenter-flaw-c-6b83f1fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20VMware%20vCenter%20Flaw%20CVE-2024-37079%20to%20KEV%20Catalog&amp;severity=critical&amp;id=69752d084623b1157ccddeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1088-cwe-352-cross-site-request-forgery-c-1f994a39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1088%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zero1zerouk%20Login%20Page%20Editor&amp;severity=medium&amp;id=6974765f4623b1157ca739c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13676-cwe-79-improper-neutralization-of-i-ffb5d910</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13676%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ostin654%20JustClick%20registration%20plugin&amp;severity=medium&amp;id=6974765d4623b1157ca738d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1099-cwe-79-improper-neutralization-of-in-faff8b5d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1099%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shazdeh%20Administrative%20Shortcodes&amp;severity=medium&amp;id=697476614623b1157ca73a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14609-cwe-862-missing-authorization-in-ma-8f6614c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14609%3A%20CWE-862%20Missing%20Authorization%20in%20marcinlawrowski%20Wise%20Analytics&amp;severity=medium&amp;id=6974765d4623b1157ca738de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1097-cwe-79-improper-neutralization-of-in-da69674f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1097%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeruby%20ThemeRuby%20Multi%20Authors%20%E2%80%93%20Assign%20Multiple%20Writers%20to%20Posts&amp;severity=medium&amp;id=697476614623b1157ca73a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14941-cwe-79-improper-neutralization-of-i-bbccb57c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14941%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aminhashemy%20GZSEO&amp;severity=medium&amp;id=6974765d4623b1157ca738fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1084-cwe-79-improper-neutralization-of-in-00bf3db8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lovor%20Cookie%20consent%20for%20developers&amp;severity=medium&amp;id=6974765f4623b1157ca739bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14843-cwe-862-missing-authorization-in-wi-73b7f14d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14843%3A%20CWE-862%20Missing%20Authorization%20in%20wizit%20Wizit%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=6974765d4623b1157ca738f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1075-cwe-352-cross-site-request-forgery-c-1425f457</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1075%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20teamzt%20ZT%20Captcha&amp;severity=medium&amp;id=6974765f4623b1157ca739ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1081-cwe-352-cross-site-request-forgery-c-3041ea61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1081%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sauravrox%20Set%20Bulk%20Post%20Categories&amp;severity=medium&amp;id=6974765f4623b1157ca739b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14629-cwe-862-missing-authorization-in-ta-62cef717</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14629%3A%20CWE-862%20Missing%20Authorization%20in%20tandubhai%20Alchemist%20Ajax%20Upload&amp;severity=medium&amp;id=6974765d4623b1157ca738e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14985-cwe-79-improper-neutralization-of-i-361cb023</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robiulawal40%20Alpha%20Blocks&amp;severity=medium&amp;id=6974765f4623b1157ca73998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14797-cwe-79-improper-neutralization-of-i-b3b472b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14797%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kometschuh%20Same%20Category%20Posts&amp;severity=medium&amp;id=6974765d4623b1157ca738e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1095-cwe-79-improper-neutralization-of-in-72d847a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1095%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cantothemes%20Canto%20Testimonials&amp;severity=medium&amp;id=6974765f4623b1157ca739c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0806-cwe-89-improper-neutralization-of-sp-eccc3b64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0806%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20andddd%20WP-ClanWars&amp;severity=medium&amp;id=6974765f4623b1157ca7399c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13374-cwe-434-unrestricted-upload-of-file-1e1b18e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13374%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20irisideatechsolutions%20Kalrav%20AI%20Agent&amp;severity=critical&amp;id=6974765d4623b1157ca738d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1076-cwe-352-cross-site-request-forgery-c-fde3f105</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1076%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bramdnl%20Star%20Review%20Manager&amp;severity=medium&amp;id=6974765f4623b1157ca739b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14906-cwe-352-cross-site-request-forgery--ea6107fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14906%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20waqasvickey0071%20WP%20Youtube%20Video%20Gallery&amp;severity=medium&amp;id=6974765d4623b1157ca738f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12836-cwe-79-improper-neutralization-of-i-f9fdd795</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12836%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vektor-inc%20VK%20Google%20Job%20Posting%20Manager&amp;severity=medium&amp;id=6974765d4623b1157ca738cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0807-cwe-918-server-side-request-forgery--5f2404fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0807%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpmessiah%20Frontis%20Blocks%20%E2%80%94%20Block%20Library%20for%20the%20Block%20Editor&amp;severity=high&amp;id=6974765f4623b1157ca739a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1070-cwe-352-cross-site-request-forgery-c-b502509d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1070%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20adzbierajewski%20Alex%20User%20Counter&amp;severity=medium&amp;id=6974765f4623b1157ca739a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14903-cwe-352-cross-site-request-forgery--bc4661f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14903%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stefanristic%20Simple%20Crypto%20Shortcodes&amp;severity=medium&amp;id=6974765d4623b1157ca738f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1257-cwe-98-improper-control-of-filename--dc21fe66</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1257%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20shazdeh%20Administrative%20Shortcodes&amp;severity=high&amp;id=697476614623b1157ca73aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13952-cwe-cwe-416-use-after-free-418-in-i-b52c6841</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13952%3A%20CWE%20-%20CWE-416%3A%20Use%20After%20Free%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=6974300c4623b1157c7863fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24422-cwe-200-exposure-of-sensitive-infor-acf3cbca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24422%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=6974300c4623b1157c786400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24420-cwe-284-improper-access-control-in--b0a1dc5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24420%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=6974300c4623b1157c7863fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24469-cwe-22-improper-limitation-of-a-pat-e3953dca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24469%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20frustratedProton%20http-server&amp;severity=high&amp;id=6974300c4623b1157c786403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24421-cwe-862-missing-authorization-in-th-5b1dfbc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24421%3A%20CWE-862%3A%20Missing%20Authorization%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=697425804623b1157c76ac63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24412-cwe-20-improper-input-validation-in-51455e14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24412%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24411-cwe-20-improper-input-validation-in-4aee028d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24411%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24410-cwe-20-improper-input-validation-in-98f9ec0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24410%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24409-cwe-20-improper-input-validation-in-01d23c78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24409%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24407-cwe-20-improper-input-validation-in-281869ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24407%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c75171f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24406-cwe-20-improper-input-validation-in-71863bb7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24406%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c75171a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24405-cwe-20-improper-input-validation-in-848b1bd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24405%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c751715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24404-cwe-20-improper-input-validation-in-acba84f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24404%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c751710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24403-cwe-20-improper-input-validation-in-db406130</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24403%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c75170b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22583-cwe-88-improper-neutralization-of-a-0166cd7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22583%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c721592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22582-cwe-88-improper-neutralization-of-a-66ae174e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22582%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c72158f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22586-cwe-321-hard-coded-cryptographic-ke-c2d9c280</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22586%3A%20CWE-321%20Hard-coded%20Cryptographic%20Key%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c721598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22585-cwe-327-use-of-a-broken-or-risky-cr-13b354f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22585%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c721595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24399-cwe-79-improper-neutralization-of-i-62f1bff2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24399%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chattermate%20chattermate.chat&amp;severity=critical&amp;id=697417714623b1157c72159b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-24-5f146b44</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-24&amp;severity=medium&amp;id=697561b24623b1157cd82845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-24-6f7f1d5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-24&amp;severity=low&amp;id=69753e8a4623b1157cd1b5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24140-cwe-915-improperly-controlled-modif-32322b1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24140%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20franklioxygen%20MyTube&amp;severity=low&amp;id=69740ce44623b1157c6b18a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24139-cwe-862-missing-authorization-in-fr-71264e43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24139%3A%20CWE-862%3A%20Missing%20Authorization%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69740ce44623b1157c6b18a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24474-cwe-95-improper-neutralization-of-d-3b3999e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24474%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20DioxusLabs%20components&amp;severity=medium&amp;id=69740ce44623b1157c6b18ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24128-cwe-79-improper-neutralization-of-i-7a9e0f4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24128%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=697405dd4623b1157c69e7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandworm-behind-cyberattack-on-polands-power-grid--cc7bd571</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sandworm%20behind%20cyberattack%20on%20Poland&apos;s%20power%20grid%20in%20late%202025&amp;severity=medium&amp;id=6973fed44623b1157c688627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1386-cwe-61-unix-symbolic-link-symlink-fo-74d39d5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1386%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20AWS%20Firecracker&amp;severity=medium&amp;id=6973dbae4623b1157c62ac34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14947-cwe-862-missing-authorization-in-pl-4ef1f336</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14947%3A%20CWE-862%20Missing%20Authorization%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=6973b17e4623b1157c537c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24423-cwe-306-missing-authentication-for--ca9947c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24423%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SmarterTools%20SmarterMail&amp;severity=critical&amp;id=6973aa764623b1157c50089a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71177-cwe-79-improper-neutralization-of-i-bb86400d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20LavaLite%20LavaLite%20CMS&amp;severity=medium&amp;id=6973a6f24623b1157c4f2e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1299-cwe-93-in-python-software-foundation-d09db2f5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1299%3A%20CWE-93%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=6973a6f24623b1157c4f2e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-updates-kev-catalog-with-four-actively-exploi-76ea0673</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Updates%20KEV%20Catalog%20with%20Four%20Actively%20Exploited%20Software%20Vulnerabilities&amp;severity=low&amp;id=697395284623b1157c4bbbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0994-cwe-674-uncontrolled-recursion-in-py-57587e7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0994%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Python%20Protobuf&amp;severity=high&amp;id=69738e544623b1157c4a43aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24636-missing-authorization-in-syed-balkh-90312e20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24636%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Sugar%20Calendar%20(Lite)&amp;severity=medium&amp;id=69738ae44623b1157c48be2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24635-improper-control-of-filename-for-in-95559a7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24635%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20DevsBlink%20EduBlink%20Core&amp;severity=high&amp;id=69738ae44623b1157c48be28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24634-authorization-bypass-through-user-c-56f3c604</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24634%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Rustaurius%20Ultimate%20Reviews&amp;severity=medium&amp;id=69738ae44623b1157c48be25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24633-missing-authorization-in-passionate-c0f5644c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24633%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20Add%20Expires%20Headers%20%26%20Optimized%20Minify&amp;severity=medium&amp;id=69738ae24623b1157c48bd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24632-improper-neutralization-of-input-du-04975acf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jagdish1o1%20Delay%20Redirects&amp;severity=medium&amp;id=69738ae24623b1157c48bd16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24631-authorization-bypass-through-user-c-27c93a86</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24631%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Rosebud&amp;severity=medium&amp;id=69738ae24623b1157c48bd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24630-improper-neutralization-of-input-du-79a10227</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Design%20Stylish%20Cost%20Calculator&amp;severity=medium&amp;id=69738ae24623b1157c48bd10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24629-improper-neutralization-of-input-du-a6e92fc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ability%2C%20Inc%20Web%20Accessibility%20with%20Max%20Access&amp;severity=medium&amp;id=69738ae24623b1157c48bd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24627-missing-authorization-in-trusona-tr-f54d15b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24627%3A%20Missing%20Authorization%20in%20Trusona%20Trusona%20for%20WordPress&amp;severity=medium&amp;id=69738ae24623b1157c48bd0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24626-improper-neutralization-of-input-du-b42c4923</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LogicHunt%20Logo%20Slider&amp;severity=medium&amp;id=69738ae24623b1157c48bd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24625-missing-authorization-in-imaginate--4adbbf43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24625%3A%20Missing%20Authorization%20in%20Imaginate%20Solutions%20File%20Uploads%20Addon%20for%20WooCommerce&amp;severity=medium&amp;id=69738ae24623b1157c48bd04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24624-improper-neutralization-of-special--8fb4c855</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24624%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20saeros1984%20Neoforum&amp;severity=high&amp;id=69738ae24623b1157c48bd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24623-improper-neutralization-of-input-du-80e9f0cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saeros1984%20Neoforum&amp;severity=medium&amp;id=69738ae24623b1157c48bcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24622-missing-authorization-in-sergiy-dzy-ff94e238</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24622%3A%20Missing%20Authorization%20in%20Sergiy%20Dzysyak%20Suggestion%20Toolkit&amp;severity=medium&amp;id=69738ae14623b1157c48bcda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24621-improper-neutralization-of-input-du-0a7ca6a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladimir%20Statsenko%20Terms%20descriptions&amp;severity=medium&amp;id=69738ae14623b1157c48bcd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24620-improper-neutralization-of-input-du-8bf5f163</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginOps%20Landing%20Page%20Builder&amp;severity=medium&amp;id=69738ae14623b1157c48bcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24619-missing-authorization-in-popcash-po-ef6eb75f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24619%3A%20Missing%20Authorization%20in%20PopCash%20PopCash.Net%20Code%20Integration%20Tool&amp;severity=medium&amp;id=69738ae14623b1157c48bcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24617-improper-neutralization-of-input-du-54c61973</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24617%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Iser%20Easy%20Modal&amp;severity=medium&amp;id=69738ae14623b1157c48bcce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24616-missing-authorization-in-damian-wp--d1eb6ccc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24616%3A%20Missing%20Authorization%20in%20Damian%20WP%20Popups&amp;severity=medium&amp;id=69738ae14623b1157c48bccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24615-missing-authorization-in-themebeez--266457b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24615%3A%20Missing%20Authorization%20in%20themebeez%20Cream%20Magazine&amp;severity=medium&amp;id=69738ae14623b1157c48bcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24614-improper-neutralization-of-input-du-6a32600a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Devsbrain%20Flex%20QR%20Code%20Generator&amp;severity=medium&amp;id=69738ae14623b1157c48bcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24613-missing-authorization-in-ecwid-by-l-950e77ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24613%3A%20Missing%20Authorization%20in%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart%20Ecwid%20Shopping%20Cart&amp;severity=medium&amp;id=69738ae14623b1157c48bcc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24612-missing-authorization-in-themebeez--a5e5a476</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24612%3A%20Missing%20Authorization%20in%20themebeez%20Orchid%20Store&amp;severity=medium&amp;id=69738ae14623b1157c48bcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24609-improper-control-of-filename-for-in-58da0be6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24609%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Laurent&amp;severity=high&amp;id=69738adf4623b1157c48bc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24608-improper-control-of-filename-for-in-6091aaec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24608%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Laurent%20Core&amp;severity=high&amp;id=69738adf4623b1157c48bc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24607-missing-authorization-in-wptravelen-9729b4f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24607%3A%20Missing%20Authorization%20in%20wptravelengine%20Travel%20Monster&amp;severity=medium&amp;id=69738adf4623b1157c48bc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24606-missing-authorization-in-web-impian-ae007fd0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24606%3A%20Missing%20Authorization%20in%20Web%20Impian%20Bayarcash%20WooCommerce&amp;severity=medium&amp;id=69738adf4623b1157c48bc31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24605-missing-authorization-in-pencilwp-x-c38467c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24605%3A%20Missing%20Authorization%20in%20pencilwp%20X%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69738adf4623b1157c48bc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24604-missing-authorization-in-themebeez--30922a3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24604%3A%20Missing%20Authorization%20in%20themebeez%20Simple%20GDPR%20Cookie%20Compliance&amp;severity=medium&amp;id=69738adf4623b1157c48bc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24603-missing-authorization-in-themebeez--ba8bb196</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24603%3A%20Missing%20Authorization%20in%20themebeez%20Universal%20Google%20Adsense%20and%20Ads%20manager&amp;severity=medium&amp;id=69738adf4623b1157c48bc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24602-missing-authorization-in-raptive-ra-9e27e86e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24602&amp;severity=null&amp;id=69738adf4623b1157c48bc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24601-improper-neutralization-of-input-du-710442a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24601%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Pay%20Writer&amp;severity=medium&amp;id=69738adf4623b1157c48bc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24600-improper-neutralization-of-input-du-6de255a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24600%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Review&amp;severity=medium&amp;id=69738adf4623b1157c48bc1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24599-authorization-bypass-through-user-c-66b06521</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24599%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20XLPlugins%20NextMove%20Lite&amp;severity=medium&amp;id=69738ade4623b1157c48bbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24598-missing-authorization-in-bestwebsof-aa9dc619</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24598%3A%20Missing%20Authorization%20in%20bestwebsoft%20Multilanguage%20by%20BestWebSoft&amp;severity=medium&amp;id=69738ade4623b1157c48bbf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24596-cross-site-request-forgery-csrf-in--ff3b2e0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24596%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marynixie%20Related%20Posts%20Thumbnails%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69738ade4623b1157c48bbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24595-missing-authorization-in-zohocrm-zo-194af72e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24595%3A%20Missing%20Authorization%20in%20zohocrm%20Zoho%20CRM%20Lead%20Magnet&amp;severity=medium&amp;id=69738ade4623b1157c48bbf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24594-improper-neutralization-of-input-du-c8532c8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69738ade4623b1157c48bbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24593-exposure-of-sensitive-system-inform-37772e7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24593%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Strategy11%20Team%20AWP%20Classifieds&amp;severity=medium&amp;id=69738ade4623b1157c48bbed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24591-improper-neutralization-of-input-du-af2203d8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24591%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yasir129%20Turn%20Yoast%20SEO%20FAQ%20Block%20to%20Accordion&amp;severity=medium&amp;id=69738ade4623b1157c48bbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24589-insertion-of-sensitive-information--a73bfe64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24589%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Cargus%20eCommerce%20Cargus&amp;severity=medium&amp;id=69738ade4623b1157c48bbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24588-missing-authorization-in-topdevs-sm-9615a9b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24588%3A%20Missing%20Authorization%20in%20topdevs%20Smart%20Product%20Viewer&amp;severity=medium&amp;id=69738ade4623b1157c48bbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24587-missing-authorization-in-kutsy-ajax-73179f9f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24587%3A%20Missing%20Authorization%20in%20kutsy%20AJAX%20Hits%20Counter%20%2B%20Popular%20Posts%20Widget&amp;severity=medium&amp;id=69738ade4623b1157c48bbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24585-missing-authorization-in-hyyan-abo--78acc02e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24585%3A%20Missing%20Authorization%20in%20Hyyan%20Abo%20Fakher%20Hyyan%20WooCommerce%20Polylang%20Integration&amp;severity=medium&amp;id=69738adc4623b1157c48bba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24584-improper-neutralization-of-input-du-ec5f6ef0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Tutor%20LMS%20BunnyNet%20Integration&amp;severity=medium&amp;id=69738adc4623b1157c48bba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24583-missing-authorization-in-sumup-sumu-0943be14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24583%3A%20Missing%20Authorization%20in%20sumup%20SumUp%20Payment%20Gateway%20For%20WooCommerce&amp;severity=medium&amp;id=69738adc4623b1157c48bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24581-missing-authorization-in-wp-swings--9bef3430</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24581%3A%20Missing%20Authorization%20in%20WP%20Swings%20Points%20and%20Rewards%20for%20WooCommerce&amp;severity=medium&amp;id=69738adc4623b1157c48bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24580-missing-authorization-in-ecwid-by-l-603dfe49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24580%3A%20Missing%20Authorization%20in%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart%20Ecwid%20Shopping%20Cart&amp;severity=medium&amp;id=69738adc4623b1157c48bb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24579-missing-authorization-in-wp-messiah-122fb5ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24579%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=medium&amp;id=69738adc4623b1157c48bb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24578-missing-authorization-in-jahid-hasa-b4a7ce44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24578%3A%20Missing%20Authorization%20in%20Jahid%20Hasan%20Admin%20login%20URL%20Change&amp;severity=medium&amp;id=69738adc4623b1157c48bb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24577-missing-authorization-in-genetech-p-e7993b4a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24577%3A%20Missing%20Authorization%20in%20Genetech%20Products%20Pie%20Register&amp;severity=medium&amp;id=69738adc4623b1157c48bb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24576-improper-neutralization-of-input-du-9d9d3333</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20COP%20UX%20Flat&amp;severity=medium&amp;id=69738adc4623b1157c48bb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24572-improper-neutralization-of-special--65c0f257</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24572%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20Content&amp;severity=high&amp;id=69738adc4623b1157c48bb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24571-missing-authorization-in-boxnow-box-d4a2aee9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24571%3A%20Missing%20Authorization%20in%20boxnow%20BOX%20NOW%20Delivery&amp;severity=medium&amp;id=69738adb4623b1157c48baab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24570-missing-authorization-in-wisdmlabs--eaf7e375</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24570%3A%20Missing%20Authorization%20in%20WisdmLabs%20Edwiser%20Bridge&amp;severity=medium&amp;id=69738adb4623b1157c48baa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24569-missing-authorization-in-sully-medi-7d996894</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24569%3A%20Missing%20Authorization%20in%20Sully%20Media%20Library%20File%20Size&amp;severity=medium&amp;id=69738adb4623b1157c48baa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24567-missing-authorization-in-briarinc-a-340f843a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24567%3A%20Missing%20Authorization%20in%20briarinc%20Anything%20Order%20by%20Terms&amp;severity=medium&amp;id=69738adb4623b1157c48baa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24566-missing-authorization-in-inet-inet--5af1f865</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24566%3A%20Missing%20Authorization%20in%20iNET%20iNET%20Webkit&amp;severity=medium&amp;id=69738adb4623b1157c48ba9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24565-insertion-of-sensitive-information--5598e7cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24565%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20bPlugins%20B%20Accordion&amp;severity=medium&amp;id=69738adb4623b1157c48ba9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24564-improper-neutralization-of-script-r-765f2f6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24564%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Israpil%20Textmetrics&amp;severity=medium&amp;id=69738adb4623b1157c48ba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24563-missing-authorization-in-ashan-pere-431f5cbe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24563%3A%20Missing%20Authorization%20in%20Ashan%20Perera%20LifePress&amp;severity=medium&amp;id=69738adb4623b1157c48ba96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24562-missing-authorization-in-ryviu-ryvi-3dfaa5e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24562%3A%20Missing%20Authorization%20in%20Ryviu%20Ryviu%20%26%238211%3B%20Product%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69738adb4623b1157c48ba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24561-missing-authorization-in-mahmudul-h-fb60dcf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24561%3A%20Missing%20Authorization%20in%20Mahmudul%20Hasan%20Arif%20FluentBoards&amp;severity=medium&amp;id=69738adb4623b1157c48ba90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24559-insertion-of-sensitive-information--8ec50cc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24559%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20CRM%20Perks%20Integration%20for%20Contact%20Form%207%20HubSpot&amp;severity=medium&amp;id=69738ada4623b1157c48ba7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24558-improper-neutralization-of-input-du-5028d6bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antoniobg%20ABG%20Rich%20Pins&amp;severity=medium&amp;id=69738ada4623b1157c48ba7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24557-insertion-of-sensitive-information--af8c4bd7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24557%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WEN%20Solutions%20Contact%20Form%207%20GetResponse%20Extension&amp;severity=medium&amp;id=69738ada4623b1157c48ba79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24556-missing-authorization-in-wpdive-ele-cf372713</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24556%3A%20Missing%20Authorization%20in%20wpdive%20ElementCamp&amp;severity=medium&amp;id=69738ada4623b1157c48ba76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24555-improper-neutralization-of-input-du-0565a140</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artplacer%20ArtPlacer%20Widget&amp;severity=medium&amp;id=69738ada4623b1157c48ba73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24553-exposure-of-sensitive-system-inform-69daedde</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24553%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Dotstore%20Fraud%20Prevention%20For%20Woocommerce&amp;severity=medium&amp;id=69738ada4623b1157c48ba70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24551-missing-authorization-in-monetagwp--76cd26cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24551%3A%20Missing%20Authorization%20in%20monetagwp%20Monetag%20Official%20Plugin&amp;severity=medium&amp;id=69738ada4623b1157c48ba6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24550-improper-neutralization-of-input-du-a7368c50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kaira%20Blockons&amp;severity=medium&amp;id=69738ada4623b1157c48ba6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24549-cross-site-request-forgery-csrf-in--7e41016f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24549%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Paolo%20GeoDirectory&amp;severity=medium&amp;id=69738ada4623b1157c48ba67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24548-server-side-request-forgery-ssrf-in-20243811</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24548%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20princeahmed%20Radio%20Player&amp;severity=medium&amp;id=69738ada4623b1157c48ba64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24544-missing-authorization-in-harmonic-d-75ce92fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24544%3A%20Missing%20Authorization%20in%20Harmonic%20Design%20HD%20Quiz&amp;severity=medium&amp;id=69738ad94623b1157c48ba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24543-missing-authorization-in-horea-radu-32690cb1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24543%3A%20Missing%20Authorization%20in%20Horea%20Radu%20Materialis%20Companion&amp;severity=medium&amp;id=69738ad94623b1157c48ba3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24542-cross-site-request-forgery-csrf-in--dc2d7fc7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24542%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20John%20James%20Jacoby%20WP%20Term%20Order&amp;severity=medium&amp;id=69738ad94623b1157c48ba3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24541-missing-authorization-in-mkscripts--d796b840</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24541%3A%20Missing%20Authorization%20in%20mkscripts%20Download%20After%20Email&amp;severity=medium&amp;id=69738ad94623b1157c48ba38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24540-missing-authorization-in-prince-int-eb42e5d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24540%3A%20Missing%20Authorization%20in%20princeahmed%20Integrate%20Google%20Drive&amp;severity=medium&amp;id=69738ad94623b1157c48ba35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24539-missing-authorization-in-abcdatos-p-1558be26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24539%3A%20Missing%20Authorization%20in%20ABCdatos%20Protecci%C3%B3n%20de%20datos%20%26%238211%3B%20RGPD&amp;severity=medium&amp;id=69738ad94623b1157c48ba32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24538-improper-control-of-filename-for-in-b3ce93bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24538%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=high&amp;id=69738ad94623b1157c48ba2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24535-missing-authorization-in-webdevstud-08f028cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24535%3A%20Missing%20Authorization%20in%20webdevstudios%20Automatic%20Featured%20Images%20from%20Videos&amp;severity=medium&amp;id=69738ad94623b1157c48ba2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24534-missing-authorization-in-upress-boo-8d170298</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24534%3A%20Missing%20Authorization%20in%20uPress%20Booter&amp;severity=high&amp;id=69738ad94623b1157c48ba29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24532-missing-authorization-in-sitelock-s-e609cf5e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24532%3A%20Missing%20Authorization%20in%20SiteLock%20SiteLock%20Security%20%E2%80%93%20WP%20Hardening%2C%20Login%20Security%20%26%20Malware%20Scans&amp;severity=high&amp;id=69738ad94623b1157c48ba25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24531-improper-control-of-filename-for-in-a81762ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Prowess&amp;severity=critical&amp;id=69738ad74623b1157c48b9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24530-missing-authorization-in-sheepfish--1f28bc89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24530%3A%20Missing%20Authorization%20in%20sheepfish%20WebP%20Conversion&amp;severity=medium&amp;id=69738ad74623b1157c48b9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24529-missing-authorization-in-alejandro--a569df45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24529%3A%20Missing%20Authorization%20in%20Alejandro%20Quick%20Restaurant%20Reservations&amp;severity=medium&amp;id=69738ad74623b1157c48b9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24528-improper-neutralization-of-input-du-3f977a7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Nova%20Blocks&amp;severity=medium&amp;id=69738ad74623b1157c48b9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24526-improper-neutralization-of-input-du-ddb20594</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Steve%20Truman%20Email%20Inquiry%20%26amp%3B%20Cart%20Options%20for%20WooCommerce&amp;severity=medium&amp;id=69738ad74623b1157c48b9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24525-missing-authorization-in-cloudpanel-f4eecdbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24525%3A%20Missing%20Authorization%20in%20CloudPanel%20CLP%20Varnish%20Cache&amp;severity=medium&amp;id=69738ad74623b1157c48b9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24524-missing-authorization-in-essekia-ta-9dc80486</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24524%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome&amp;severity=high&amp;id=69738ad74623b1157c48b9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24523-exposure-of-sensitive-system-inform-ffc70139</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24523%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Marcus%20(aka%20%40msykes)%20WP%20FullCalendar&amp;severity=high&amp;id=69738ad74623b1157c48b9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24522-missing-authorization-in-mythemesho-f09c71cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24522%3A%20Missing%20Authorization%20in%20MyThemeShop%20WP%20Subscribe&amp;severity=medium&amp;id=69738ad74623b1157c48b9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24521-cross-site-request-forgery-csrf-in--91d2ebfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24521%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Timur%20Kamaev%20Kama%20Thumbnail&amp;severity=medium&amp;id=69738ad74623b1157c48b9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-confirms-forticloud-sso-exploitation-agai-9c3231c4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Confirms%20FortiCloud%20SSO%20Exploitation%20Against%20Patched%20Devices&amp;severity=medium&amp;id=697380134623b1157c454d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-12b-gdpr-fines-net-ntlmv1-rainbow-ta-caf92026</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20%E2%82%AC1.2B%20GDPR%20Fines%2C%20Net-NTLMv1%20Rainbow%20Tables%2C%20Rockwell%20Security%20Notice&amp;severity=medium&amp;id=697380134623b1157c454d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13921-cwe-862-missing-authorization-in-we-a2c34bf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13921%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20weDocs%3A%20AI%20Powered%20Knowledge%20Base%2C%20Docs%2C%20Documentation%2C%20Wiki%20%26%20AI%20Chatbot&amp;severity=medium&amp;id=69737cc14623b1157c442f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishers-abuse-sharepoint-in-new-campaign-targetin-2e360e7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishers%20Abuse%20SharePoint%20in%20New%20Campaign%20Targeting%20Energy%20Sector&amp;severity=medium&amp;id=697375894623b1157c425251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-confirms-active-forticloud-sso-bypass-on--b01c7571</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Confirms%20Active%20FortiCloud%20SSO%20Bypass%20on%20Fully%20Patched%20FortiGate%20Firewalls&amp;severity=low&amp;id=6973dcc84623b1157c62f844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0914-cwe-79-improper-neutralization-of-in-f2472eb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20legalweb%20WP%20DSGVO%20Tools%20(GDPR)&amp;severity=medium&amp;id=69736eb04623b1157c3e7c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14866-cwe-863-incorrect-authorization-in--c314b303</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14866%3A%20CWE-863%20Incorrect%20Authorization%20in%20melapress%20Melapress%20Role%20Editor&amp;severity=high&amp;id=69736eb04623b1157c3e7c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4320-cwe-305-authentication-bypass-by-pri-e6a7f97a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4320%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Birebirsoft%20Software%20and%20Technology%20Solutions%20Sufirmam&amp;severity=critical&amp;id=69736eb04623b1157c3e7c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4319-cwe-307-improper-restriction-of-exce-193cd2e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4319%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Birebirsoft%20Software%20and%20Technology%20Solutions%20Sufirmam&amp;severity=critical&amp;id=69736eb04623b1157c3e7c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/under-armour-looking-into-data-breach-affecting-cu-296429ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Under%20Armour%20Looking%20Into%20Data%20Breach%20Affecting%20Customers%E2%80%99%20Email%20Addresses&amp;severity=medium&amp;id=697363f14623b1157c3ba487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-jailbreaking-via-poetry-bypassing-chatbot-defen-1b200656</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20jailbreaking%20via%20poetry%3A%20bypassing%20chatbot%20defenses%20with%20rhyme%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6973646d4623b1157c3bc72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2204-cwe-79-improper-neutralization-of-in-874e6d94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2204%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tapandsign%20Technologies%20Software%20Inc.%20Tap%26Sign&amp;severity=medium&amp;id=697364324623b1157c3bbd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watering-hole-attack-targets-emeditor-users-with-i-395c198c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Watering%20Hole%20Attack%20Targets%20EmEditor%20Users%20With%20Information-Stealing%20Malware&amp;severity=medium&amp;id=6973fed44623b1157c68862a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-zimbra-collabora-9417db17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Zimbra%20Collaboration%20Vulnerability&amp;severity=medium&amp;id=6973606d4623b1157c3a53b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infotainment-ev-charger-exploits-earn-hackers-1m-a-a8400194</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infotainment%2C%20EV%20Charger%20Exploits%20Earn%20Hackers%20%241M%20at%20Pwn2Own%20Automotive%202026&amp;severity=medium&amp;id=69735ce94623b1157c392ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiktok-forms-us-joint-venture-to-continue-operatio-76f3330a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TikTok%20Forms%20U.S.%20Joint%20Venture%20to%20Continue%20Operations%20Under%202025%20Executive%20Order&amp;severity=low&amp;id=6973dcc84623b1157c62f847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-attack-uses-stolen-credentials-to-install-e6fb05ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Attack%20Uses%20Stolen%20Credentials%20to%20Install%20LogMeIn%20RMM%20for%20Persistent%20Access&amp;severity=medium&amp;id=6973dcc84623b1157c62f84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-smartermail-flaw-exploited-for-admin-access-74135f93</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20SmarterMail%20Flaw%20Exploited%20for%20Admin%20Access&amp;severity=medium&amp;id=69734ed94623b1157c2ee660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-the-vs-code-tasks-infection-vector-8b864c0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20the%20VS%20Code%20Tasks%20Infection%20Vector&amp;severity=medium&amp;id=697352904623b1157c3211dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/restless-spirit-new-attacks-on-russian-companies-8c7dee55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Restless%20Spirit%3A%20New%20Attacks%20on%20Russian%20Companies&amp;severity=medium&amp;id=697352904623b1157c321206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osiris-new-ransomware-experienced-attackers-1074fa06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Osiris%3A%20New%20Ransomware%2C%20Experienced%20Attackers%3F&amp;severity=medium&amp;id=69734b8c4623b1157c2daa7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46699-cwe-1336-improper-neutralization-of-b242477c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46699%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Dell%20Data%20Protection%20Advisor&amp;severity=medium&amp;id=697348084623b1157c2c602d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22276-cwe-312-cleartext-storage-of-sensit-fd4bfe9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22276%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Dell%20ObjectScale&amp;severity=medium&amp;id=697344814623b1157c299738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22275-cwe-540-inclusion-of-sensitive-info-c9207016</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22275%3A%20CWE-540%3A%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20Dell%20ObjectScale&amp;severity=medium&amp;id=697395744623b1157c4bc736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22274-cwe-319-cleartext-transmission-of-s-eea32901</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22274%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Dell%20ObjectScale&amp;severity=medium&amp;id=697395744623b1157c4bc733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22273-cwe-1392-use-of-default-credentials-92dba187</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22273%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Dell%20ObjectScale&amp;severity=high&amp;id=69733d904623b1157c262fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2-venezuelans-convicted-in-us-for-using-malware-to-6fc657df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2%20Venezuelans%20Convicted%20in%20US%20for%20Using%20Malware%20to%20Hack%20ATMs&amp;severity=medium&amp;id=69733d4a4623b1157c260fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22271-cwe-319-cleartext-transmission-of-s-58afcc64</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22271%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Dell%20ObjectScale&amp;severity=high&amp;id=697339f44623b1157c229e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1364-cwe-306-missing-authentication-for-c-1e047c96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1364%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20JNC%20IAQS&amp;severity=critical&amp;id=697336714623b1157c2123f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1363-cwe-603-use-of-client-side-authentic-0ca429aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1363%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20JNC%20IAQS&amp;severity=critical&amp;id=697336714623b1157c2123f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-flags-multi-stage-aitm-phishing-and-bec--98e1168a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Flags%20Multi-Stage%20AitM%20Phishing%20and%20BEC%20Attacks%20Targeting%20Energy%20Firms&amp;severity=medium&amp;id=697332b74623b1157c1fcdcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24515-cwe-476-null-pointer-dereference-in-b8ec9798</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24515%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=697328604623b1157c1b2149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0603-improper-neutralization-of-special-e-a3609d42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0603%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)&amp;severity=high&amp;id=69731dd54623b1157c143c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14745-cwe-79-improper-neutralization-of-i-bf3204bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14745%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=697308bc4623b1157c072633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14069-cwe-79-improper-neutralization-of-i-74650657</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14069%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=697308bc4623b1157c07262c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0927-cwe-862-missing-authorization-in-iqo-d88ff5fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0927%3A%20CWE-862%20Missing%20Authorization%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=medium&amp;id=697308bc4623b1157c072638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67847-improper-control-of-generation-of-c-cb248159</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67847%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=697301b44623b1157c02f7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15522-cwe-79-improper-neutralization-of-i-0d0a9356</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15522%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=medium&amp;id=697301b44623b1157c02f7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3839-product-ui-does-not-warn-user-of-uns-6fd6c1dd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3839%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions&amp;severity=high&amp;id=6972f7294623b1157c000a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0710-null-pointer-dereference-e6c9efc6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0710%3A%20NULL%20Pointer%20Dereference&amp;severity=high&amp;id=6972f3a54623b1157cfeb6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15351-cwe-502-deserialization-of-untruste-4064d94f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15351%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20VectorStar&amp;severity=high&amp;id=6972f3a54623b1157cfeb6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15350-cwe-502-deserialization-of-untruste-789dbba9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15350%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20VectorStar&amp;severity=high&amp;id=6972f3a54623b1157cfeb6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15349-cwe-362-concurrent-execution-using--33e0b786</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15349%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Anritsu%20ShockLine&amp;severity=high&amp;id=6972f3a54623b1157cfeb6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15348-cwe-502-deserialization-of-untruste-09b2c70a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15348%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20ShockLine&amp;severity=high&amp;id=6972f3a54623b1157cfeb6e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0778-cwe-306-missing-authentication-for-c-5789b63e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0778%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Enel%20X%20JuiceBox%2040&amp;severity=high&amp;id=6972f3a64623b1157cfeb73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0776-cwe-427-uncontrolled-search-path-ele-2b7de517</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0776%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Discord%20Client&amp;severity=high&amp;id=6972f3a64623b1157cfeb73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0775-cwe-732-incorrect-permission-assignm-8c16c2d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0775%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20npm%20cli&amp;severity=high&amp;id=6972f3a64623b1157cfeb738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0761-cwe-94-improper-control-of-generatio-b5c5cee9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0761%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Foundation%20Agents%20MetaGPT&amp;severity=critical&amp;id=6972f3a64623b1157cfeb735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0760-cwe-502-deserialization-of-untrusted-515e434f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0760%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Foundation%20Agents%20MetaGPT&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0759-cwe-78-improper-neutralization-of-sp-b8238697</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0759%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Katana%20Network%20Development%20Starter%20Kit&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0755-cwe-78-improper-neutralization-of-sp-26f401d5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0755%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Gemini%20MCP%20Tool%20gemini-mcp-tool&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15061-cwe-78-improper-neutralization-of-s-db540980</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15061%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Framelink%20Figma%20MCP%20Server&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15062-cwe-416-use-after-free-in-trimble-s-29f16b40</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15062%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp&amp;severity=high&amp;id=6972f3a54623b1157cfeb6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0795-cwe-78-improper-neutralization-of-sp-b053339a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0795%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde335c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0794-cwe-416-use-after-free-in-algo-8180--3809cb62</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0794%3A%20CWE-416%3A%20Use%20After%20Free%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0793-cwe-122-heap-based-buffer-overflow-i-9cc4df30</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0793%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0792-cwe-121-stack-based-buffer-overflow--dbb59b62</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0792%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0791-cwe-121-stack-based-buffer-overflow--a601b9d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0791%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0790-cwe-425-direct-request-forced-browsi-5a753de2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0790%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=medium&amp;id=6972e91b4623b1157cde334d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0789-cwe-200-exposure-of-sensitive-inform-027b9713</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0789%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=medium&amp;id=6972e91b4623b1157cde334a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0788-cwe-79-improper-neutralization-of-in-9ba223db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0788%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=medium&amp;id=6972e91a4623b1157cde2eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0787-cwe-78-improper-neutralization-of-sp-23f6af26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0787%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0786-cwe-78-improper-neutralization-of-sp-e4b3d7db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0786%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0785-cwe-78-improper-neutralization-of-sp-b9cd0258</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0785%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0784-cwe-78-improper-neutralization-of-sp-55e85409</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0784%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0783-cwe-78-improper-neutralization-of-sp-18839d80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0783%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0782-cwe-78-improper-neutralization-of-sp-24290a57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0782%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0781-cwe-78-improper-neutralization-of-sp-805caa8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0781%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0780-cwe-78-improper-neutralization-of-sp-8ac60f0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0780%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0779-cwe-78-improper-neutralization-of-sp-3ed1666d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0779%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0796-cwe-78-improper-neutralization-of-sp-136f06d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0796%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde335f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24304-cwe-284-improper-access-control-in--14ecfe54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24304%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Resource%20Manager&amp;severity=critical&amp;id=6972d78d4623b1157cbba819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-scan-you-scan-we-all-scan-for-knowledge-2e7a450b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20scan%2C%20you%20scan%2C%20we%20all%20scan%20for...%20%20knowledge%3F&amp;severity=medium&amp;id=697344804623b1157c2996f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-23-3b49b2d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-23&amp;severity=medium&amp;id=697410324623b1157c6bb3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70458-na-661089ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70458%3A%20n%2Fa&amp;severity=medium&amp;id=6973ed494623b1157c65c467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70457-na-91bb990f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70457%3A%20n%2Fa&amp;severity=critical&amp;id=6973e9bc4623b1157c653479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52026-na-3b0b91c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52026%3A%20n%2Fa&amp;severity=high&amp;id=6973df424623b1157c63574b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52025-na-f20ec138</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52025%3A%20n%2Fa&amp;severity=critical&amp;id=6973df424623b1157c635745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52024-na-2947f353</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52024%3A%20n%2Fa&amp;severity=critical&amp;id=6973df424623b1157c635724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52023-na-c942b319</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52023%3A%20n%2Fa&amp;severity=medium&amp;id=6973df424623b1157c63571e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52022-na-edb52e96</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52022%3A%20n%2Fa&amp;severity=medium&amp;id=6973df424623b1157c635719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67264-na-19e062e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67264%3A%20n%2Fa&amp;severity=high&amp;id=6973d8294623b1157c61e916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70986-na-d27ddcd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70986%3A%20n%2Fa&amp;severity=high&amp;id=6973c7784623b1157c5d5f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70985-na-8685ccb7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70985%3A%20n%2Fa&amp;severity=critical&amp;id=6973c7784623b1157c5d5f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70983-na-4c0f9baf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70983%3A%20n%2Fa&amp;severity=critical&amp;id=6973c7784623b1157c5d5f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67231-na-c282a4c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67231%3A%20n%2Fa&amp;severity=medium&amp;id=6973a6f24623b1157c4f2e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67230-na-fe053529</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67230%3A%20n%2Fa&amp;severity=high&amp;id=6973a36c4623b1157c4e4f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67229-na-c3418b4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67229%3A%20n%2Fa&amp;severity=critical&amp;id=6973a36c4623b1157c4e4f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67125-na-a855620d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67125%3A%20n%2Fa&amp;severity=medium&amp;id=697398e14623b1157c4c5d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67124-na-ca750136</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67124%3A%20n%2Fa&amp;severity=medium&amp;id=697398e14623b1157c4c5d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66720-na-139a4d58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66720%3A%20n%2Fa&amp;severity=high&amp;id=697398e14623b1157c4c5d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66719-na-b82acee0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66719%3A%20n%2Fa&amp;severity=critical&amp;id=697398e14623b1157c4c5d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69908-na-60ef07ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69908%3A%20n%2Fa&amp;severity=high&amp;id=697395744623b1157c4bc719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69907-na-6f934627</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69907%3A%20n%2Fa&amp;severity=high&amp;id=69738e544623b1157c4a43a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-23-af1d534a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-23&amp;severity=low&amp;id=697305034623b1157c062155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20613-the-archivereaderextractcontents-fu-01297bbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20613%3A%20The%20ArchiveReader.extractContents()%20function%20used%20by%20cctl%20image%20load%20and%20container%20image%20load%20performs%20no%20pathname%20validation%20before%20extracting%20an%20archive%20member.%20This%20means%20that%20a%20carelessly%20or%20maliciously%20constructed%20archive%20can%20extract%20a%20file%20into%20any%20user-writable%20location%20on%20the%20system%20using%20relative%20pathnames.%20in%20Apple%20Container&amp;severity=high&amp;id=6972bee84623b1157c9abe11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24132-cwe-77-improper-neutralization-of-s-bbb57000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24132%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=high&amp;id=6973c7784623b1157c5d5f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9290-cwe-760-use-of-a-one-way-hash-with-a-d3a39afd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9290%3A%20CWE-760%20Use%20of%20a%20One-Way%20Hash%20with%20a%20Predictable%20Salt%20in%20TP-Link%20Systems%20Inc.%20Omada%20Software%20Controller&amp;severity=medium&amp;id=6972b45c4623b1157c9773aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24130-cwe-90-improper-neutralization-of-s-c452a8c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24130%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20Arksine%20moonraker&amp;severity=low&amp;id=6972ad5b4623b1157c962ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21264-cwe-79-improper-neutralization-of-i-3a8a0d1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21264%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Account&amp;severity=critical&amp;id=6972ad5b4623b1157c962b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21521-cwe-150-improper-neutralization-of--d51ff96e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21521%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Microsoft%20Microsoft%20365%20Word%20Copilot&amp;severity=high&amp;id=6972ad5b4623b1157c962ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21227-cwe-22-improper-limitation-of-a-pat-77139522</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21227%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20Azure%20Logic%20Apps&amp;severity=high&amp;id=6972ad5b4623b1157c962b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24307-cwe-1287-improper-validation-of-spe-2aa8248d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24307%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=critical&amp;id=6972ad5b4623b1157c962bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24305-cwe-285-improper-authorization-in-m-d2b88af4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24305%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=6972ad5b4623b1157c962bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21524-cwe-200-exposure-of-sensitive-infor-60a2a02c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21524%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Data%20Explorer&amp;severity=high&amp;id=6972ad5b4623b1157c962ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24306-cwe-284-improper-access-control-in--9fb678ed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24306%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Front%20Door&amp;severity=critical&amp;id=6972ad5b4623b1157c962bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21520-cwe-77-improper-neutralization-of-s-77ca71f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21520%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Copilot%20Studio&amp;severity=high&amp;id=6972ad5b4623b1157c962ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25051-cwe-256-in-automationdirect-click-p-0829e4f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25051%3A%20CWE-256%20in%20AutomationDirect%20CLICK%20Programmable%20Logic%20Controller&amp;severity=medium&amp;id=6972a64c4623b1157c93e393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24124-cwe-306-missing-authentication-for--40ffe6ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24124%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dragonflyoss%20dragonfly&amp;severity=high&amp;id=6972a64c4623b1157c93e39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67652-cwe-261-in-automationdirect-click-p-7f6bbb91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67652%3A%20CWE-261%20in%20AutomationDirect%20CLICK%20Programmable%20Logic%20Controller&amp;severity=medium&amp;id=6972a64c4623b1157c93e397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24117-cwe-918-server-side-request-forgery-6b2fc737</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24117%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sigstore%20rekor&amp;severity=medium&amp;id=6972a2ca4623b1157c932a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20912-cwe-284-improper-access-control-in--c7861e51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20912%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=critical&amp;id=6972a2c84623b1157c932842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20904-cwe-284-improper-access-control-in--2e778f4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20904%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c93283b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20897-cwe-284-improper-access-control-in--95afbe78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20897%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=critical&amp;id=6972a2c84623b1157c932834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20888-cwe-284-improper-access-control-in--da14ea46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20888%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c93282d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20883-cwe-284-improper-access-control-in--07110b27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20883%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c932826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20800-cwe-200-exposure-of-sensitive-infor-66459a78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20800%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c932820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20750-cwe-284-improper-access-control-in--d3838295</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20750%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=critical&amp;id=6972a2c84623b1157c932819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20736-cwe-284-improper-access-control-in--dbe267b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20736%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=high&amp;id=6972a2c84623b1157c932813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0798-cwe-284-improper-access-control-in-g-9f7e4564</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0798%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=low&amp;id=6972a2c84623b1157c93280d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24058-cwe-289-authentication-bypass-by-al-1716d926</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24058%3A%20CWE-289%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20charmbracelet%20soft-serve&amp;severity=high&amp;id=6972a2c84623b1157c932849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23988-cwe-367-time-of-check-time-of-use-t-d8faaf97</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23988%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20pbatard%20rufus&amp;severity=high&amp;id=69729f444623b1157c9270dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1201-cwe-639-authorization-bypass-through-834fd42e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1201%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Hubitat%20Elevation%20C3&amp;severity=critical&amp;id=69729f444623b1157c9270d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9289-cwe-79-improper-neutralization-of-in-19cd4d9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20Software%20Controller&amp;severity=medium&amp;id=69729f444623b1157c9270ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23954-cwe-22-improper-limitation-of-a-pat-19fa0791</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23954%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20lxc%20incus&amp;severity=high&amp;id=69729f444623b1157c9270d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14751-cwe-620-unverified-password-change--937f26e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14751%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Weintek%20cMT3072XH&amp;severity=high&amp;id=69729bc34623b1157c91e03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14750-cwe-472-external-control-of-assumed-8529627d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14750%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20Weintek%20cMT3072XH&amp;severity=high&amp;id=69729bc34623b1157c91e037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23953-cwe-93-improper-neutralization-of-c-c46ca4a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23953%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20lxc%20incus&amp;severity=high&amp;id=69729bc34623b1157c91e03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23831-cwe-476-null-pointer-dereference-in-5f5dc905</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23831%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20sigstore%20rekor&amp;severity=medium&amp;id=6972983c4623b1157c90d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22234-cwe-208-timing-descrepency-in-sprin-90328a7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22234%3A%20CWE-208%20Timing%20Descrepency%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=697294b84623b1157c8fbb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22281-cwe-367-time-of-check-time-of-use-t-e329b852</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22281%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Dell%20PowerScale%20OneFS&amp;severity=low&amp;id=697278984623b1157c86bd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68609-the-authentication-algorithm-is-sou-1ae1ca03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68609%3A%20The%20authentication%20algorithm%20is%20sound%2C%20but%20the%20implemented%20mechanism%20can%20be%20bypassed%20as%20the%20result%20of%20a%20separate%20weakness%20that%20is%20primary%20to%20the%20authentication%20error.%20in%20Palantir%20com.palantir.aries%3Aaries&amp;severity=medium&amp;id=697278984623b1157c86bd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22280-cwe-732-incorrect-permission-assign-6cecdb7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22280%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=697278984623b1157c86bd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22279-cwe-778-insufficient-logging-in-del-798655e4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22279%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=697275ff4623b1157c865178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-adopts-ai-to-generate-powershell-backdoors-8ad75d8c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KONNI%20Adopts%20AI%20to%20Generate%20PowerShell%20Backdoors&amp;severity=medium&amp;id=69728a2c4623b1157c8ba841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-osiris-ransomware-emerges-as-new-strain-using--a1641a3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Osiris%20Ransomware%20Emerges%20as%20New%20Strain%20Using%20POORTRY%20Driver%20in%20BYOVD%20Attack&amp;severity=medium&amp;id=69729a4b4623b1157c918192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1260-cwe-119-improper-restriction-of-oper-100766b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1260%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Google%20Sentencepiece&amp;severity=high&amp;id=69725c7b4623b1157c8074a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0535-cwe-79-cross-site-scripting-xss-stor-762a37b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0535%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69725c7b4623b1157c8074a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0534-cwe-79-cross-site-scripting-xss-stor-196fd083</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0534%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69725c7b4623b1157c80749f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0533-cwe-79-cross-site-scripting-xss-stor-3467f94f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0533%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69725c7b4623b1157c80749a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22359-cross-site-request-forgery-csrf-in--07b46d41</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22359%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AA-Team%20Wordpress%20Movies%20Bulk%20Importer&amp;severity=medium&amp;id=69725c7b4623b1157c8074ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24390-improper-control-of-filename-for-in-7f62e2f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24390%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20QantumThemes%20Kentha%20Elementor%20Widgets&amp;severity=high&amp;id=697259354623b1157c7fb5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24389-improper-neutralization-of-input-du-09de9a97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Gallery%20PhotoBlocks&amp;severity=medium&amp;id=697259354623b1157c7fb5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24388-missing-authorization-in-ludwig-you-23aa5517</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24388%3A%20Missing%20Authorization%20in%20Ludwig%20You%20WPMasterToolKit&amp;severity=medium&amp;id=697259344623b1157c7fb5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24387-missing-authorization-in-arul-prasa-257560ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24387%3A%20Missing%20Authorization%20in%20Arul%20Prasad%20J%20WP%20Quick%20Post%20Duplicator&amp;severity=medium&amp;id=697259344623b1157c7fb5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24386-missing-authorization-in-element-in-1f4e2eee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24386%3A%20Missing%20Authorization%20in%20Element%20Invader%20Element%20Invader%20%26%238211%3B%20Template%20Kits%20for%20Elementor&amp;severity=medium&amp;id=697259344623b1157c7fb5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24384-cross-site-request-forgery-csrf-in--f8a68dc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24384%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20launchinteractive%20Merge%20%2B%20Minify%20%2B%20Refresh&amp;severity=medium&amp;id=697259344623b1157c7fb5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24383-improper-neutralization-of-input-du-1eee0743</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20B%20Slider&amp;severity=medium&amp;id=697259344623b1157c7fb59f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24381-server-side-request-forgery-ssrf-in-89ad9d0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24381%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemeGoods%20PhotoMe&amp;severity=medium&amp;id=697259344623b1157c7fb59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24380-missing-authorization-in-metagauss--46332224</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24380%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=high&amp;id=697259344623b1157c7fb599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24379-authorization-bypass-through-user-c-4cd78a6a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24379%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=critical&amp;id=697259344623b1157c7fb596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24377-exposure-of-sensitive-system-inform-f70ffb79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24377%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=high&amp;id=697259344623b1157c7fb593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24374-cross-site-request-forgery-csrf-in--45f51f13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24374%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Metagauss%20RegistrationMagic&amp;severity=medium&amp;id=697259344623b1157c7fb590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24371-missing-authorization-in-bookingalg-a800e289</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24371%3A%20Missing%20Authorization%20in%20bookingalgorithms%20BA%20Book%20Everything&amp;severity=critical&amp;id=697259324623b1157c7fb4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24368-missing-authorization-in-theme-one--d7fe8ecb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24368%3A%20Missing%20Authorization%20in%20Theme-one%20The%20Grid&amp;severity=high&amp;id=697259324623b1157c7fb4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24367-improper-neutralization-of-special--e34d4d03</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24367%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=697259324623b1157c7fb4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24366-missing-authorization-in-yithemes-y-53476d99</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24366%3A%20Missing%20Authorization%20in%20YITHEMES%20YITH%20WooCommerce%20Request%20A%20Quote&amp;severity=medium&amp;id=697259324623b1157c7fb4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24365-cross-site-request-forgery-csrf-in--3677c20e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24365%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20storeapps%20Stock%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=697259324623b1157c7fb4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24361-improper-neutralization-of-input-du-e5f68885</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20LearnPress%20%26%238211%3B%20Course%20Review&amp;severity=medium&amp;id=697259324623b1157c7fb4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24360-server-side-request-forgery-ssrf-in-0816eff8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24360%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=697259324623b1157c7fb4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24358-missing-authorization-in-expresstec-3b896dce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24358%3A%20Missing%20Authorization%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=high&amp;id=697259324623b1157c7fb4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24357-missing-authorization-in-brecht-wp--bf8e0b30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24357%3A%20Missing%20Authorization%20in%20Brecht%20WP%20Recipe%20Maker&amp;severity=high&amp;id=697259324623b1157c7fb4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24356-missing-authorization-in-roxnor-get-aceab1a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24356%3A%20Missing%20Authorization%20in%20Roxnor%20GetGenie&amp;severity=high&amp;id=697259324623b1157c7fb4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24355-improper-neutralization-of-input-du-11f35b9b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=medium&amp;id=697259304623b1157c7fb4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24354-improper-neutralization-of-input-du-161355a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Shortcodes%20%26%20Performance&amp;severity=medium&amp;id=697259304623b1157c7fb49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24353-missing-authorization-in-wpeverest--ac78bf46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24353%3A%20Missing%20Authorization%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=697259304623b1157c7fb49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23978-improper-control-of-filename-for-in-8d851faa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23978%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Softwebmedia%20Gyan%20Elements&amp;severity=critical&amp;id=697259304623b1157c7fb498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23976-improper-neutralization-of-input-du-6ac41a6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23976%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Modula%20Image%20Gallery&amp;severity=high&amp;id=697259304623b1157c7fb495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23975-improper-control-of-filename-for-in-ee2a36af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23975%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20uxper%20Golo&amp;severity=critical&amp;id=697259304623b1157c7fb492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23974-missing-authorization-in-uxper-golo-7810e477</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23974%3A%20Missing%20Authorization%20in%20uxper%20Golo&amp;severity=high&amp;id=697259304623b1157c7fb48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22483-cross-site-request-forgery-csrf-in--8ffc1a42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22483%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20winkm89%20teachPress&amp;severity=medium&amp;id=697259304623b1157c7fb48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22482-server-side-request-forgery-ssrf-in-33290a0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22482%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wbolt.com%20IMGspider&amp;severity=critical&amp;id=697259304623b1157c7fb489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22481-missing-authorization-in-rasedul-ha-8fa04e3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22481%3A%20Missing%20Authorization%20in%20Rasedul%20Haque%20Rumi%20BD%20Courier%20Order%20Ratio%20Checker&amp;severity=high&amp;id=697259304623b1157c7fb486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22472-missing-authorization-in-hassantafr-071552a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22472%3A%20Missing%20Authorization%20in%20hassantafreshi%20Easy%20Form%20Builder&amp;severity=high&amp;id=6972592f4623b1157c7fb45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22470-improper-neutralization-of-special--54dc9382</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22470%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FireStorm%20Plugins%20FireStorm%20Professional%20Real%20Estate&amp;severity=high&amp;id=6972592f4623b1157c7fb45c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22469-improper-neutralization-of-script-r-c45c909d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22469%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mwtemplates%20DeepDigital&amp;severity=medium&amp;id=6972592f4623b1157c7fb459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22468-missing-authorization-in-absolutepl-a3ce3083</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22468%3A%20Missing%20Authorization%20in%20AbsolutePlugins%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=6972592f4623b1157c7fb456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22466-missing-authorization-in-chandni-pa-218f879e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22466%3A%20Missing%20Authorization%20in%20Chandni%20Patel%20WP%20MapIt&amp;severity=medium&amp;id=6972592f4623b1157c7fb453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22464-improper-control-of-filename-for-in-8346f902</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22464%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=6972592f4623b1157c7fb450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22463-improper-neutralization-of-input-du-2a8c2d80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Micro.company%20Form%20to%20Chat%20App&amp;severity=medium&amp;id=6972592f4623b1157c7fb44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22462-cross-site-request-forgery-csrf-in--8cb8bf5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22462%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20richardevcom%20Add%20Polylang%20support%20for%20Customizer&amp;severity=medium&amp;id=6972592f4623b1157c7fb44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22461-missing-authorization-in-webappick--853908b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22461%3A%20Missing%20Authorization%20in%20WebAppick%20CTX%20Feed&amp;severity=medium&amp;id=6972592f4623b1157c7fb447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22458-missing-authorization-in-mikado-the-c57e9d29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22458%3A%20Missing%20Authorization%20in%20Mikado-Themes%20Wanderland&amp;severity=medium&amp;id=6972592f4623b1157c7fb444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22450-missing-authorization-in-select-the-933c36f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22450%3A%20Missing%20Authorization%20in%20Select-Themes%20Don%20Peppe&amp;severity=medium&amp;id=6972592e4623b1157c7fb41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22447-missing-authorization-in-select-the-9024751c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22447%3A%20Missing%20Authorization%20in%20Select-Themes%20Prowess&amp;severity=medium&amp;id=6972592e4623b1157c7fb418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22445-missing-authorization-in-proptech-p-2bdbf7a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22445%3A%20Missing%20Authorization%20in%20Proptech%20Plugin%20Apimo%20Connector&amp;severity=medium&amp;id=6972592e4623b1157c7fb415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22430-authorization-bypass-through-user-c-e00bb923</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22430%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Verdure&amp;severity=medium&amp;id=6972592e4623b1157c7fb412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22426-authorization-bypass-through-user-c-729af269</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22426%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Elated-Themes%20Sweet%20Jane&amp;severity=medium&amp;id=6972592e4623b1157c7fb40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22411-authorization-bypass-through-user-c-644870b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22411%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Dolcino&amp;severity=medium&amp;id=6972592e4623b1157c7fb40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22409-authorization-bypass-through-user-c-f17156d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22409%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Justicia&amp;severity=medium&amp;id=6972592e4623b1157c7fb409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22407-authorization-bypass-through-user-c-4f83e280</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22407%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Roam&amp;severity=medium&amp;id=6972592e4623b1157c7fb406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22406-authorization-bypass-through-user-c-ca0974fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22406%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Overton&amp;severity=medium&amp;id=6972592e4623b1157c7fb403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22404-authorization-bypass-through-user-c-a75619ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22404%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Innovio&amp;severity=medium&amp;id=6972592e4623b1157c7fb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22402-improper-control-of-filename-for-in-754c2471</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22402%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pavothemes%20Triply&amp;severity=high&amp;id=6972592d4623b1157c7fb3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22401-improper-control-of-filename-for-in-76a3f9b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22401%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pavothemes%20Freshio&amp;severity=high&amp;id=6972592c4623b1157c7fb3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22400-authorization-bypass-through-user-c-c9bc89e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22400%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Holmes&amp;severity=medium&amp;id=6972592c4623b1157c7fb3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22398-authorization-bypass-through-user-c-c481578b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22398%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Fleur&amp;severity=medium&amp;id=6972592c4623b1157c7fb3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22396-authorization-bypass-through-user-c-691048d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22396%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Fiorello&amp;severity=medium&amp;id=6972592c4623b1157c7fb3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22393-authorization-bypass-through-user-c-04b4faa9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22393%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Curly&amp;severity=medium&amp;id=6972592c4623b1157c7fb3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22391-authorization-bypass-through-user-c-fc417f40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22391%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Cocco&amp;severity=medium&amp;id=6972592c4623b1157c7fb3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22388-improper-neutralization-of-input-du-a9b4737b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22388%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Emu%20Owl%20Carousel%20WP&amp;severity=medium&amp;id=6972592c4623b1157c7fb3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22382-cross-site-request-forgery-csrf-in--13191fb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22382%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=medium&amp;id=6972592c4623b1157c7fb3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22360-cross-site-request-forgery-csrf-in--6ae3ccf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22360%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AA-Team%20SearchAzon&amp;severity=medium&amp;id=6972592c4623b1157c7fb3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22358-server-side-request-forgery-ssrf-in-1b0045c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22358%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SmartDataSoft%20Electrician%20-%20Electrical%20Service%20WordPress&amp;severity=medium&amp;id=6972592b4623b1157c7fb3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22355-cross-site-request-forgery-csrf-in--826c9a2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22355%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gregmolnar%20Simple%20XML%20Sitemap&amp;severity=high&amp;id=6972592b4623b1157c7fb3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22353-improper-neutralization-of-input-du-93d3dab9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20winkm89%20teachPress&amp;severity=medium&amp;id=6972592b4623b1157c7fb3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22349-improper-neutralization-of-input-du-235d7551</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linux4me2%20Menu%20In%20Post&amp;severity=medium&amp;id=6972592b4623b1157c7fb3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22348-missing-authorization-in-tasos-fel--4a634023</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22348%3A%20Missing%20Authorization%20in%20Tasos%20Fel%20Civic%20Cookie%20Control&amp;severity=medium&amp;id=6972592b4623b1157c7fb3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22347-improper-neutralization-of-input-du-3a8aafff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20subhansanjaya%20Carousel%20Horizontal%20Posts%20Content%20Slider&amp;severity=medium&amp;id=6972592b4623b1157c7fb3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69321-improper-neutralization-of-input-du-f9444f41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69321%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Spa&amp;severity=high&amp;id=6972592b4623b1157c7fb3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69320-improper-neutralization-of-input-du-73ba0b60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69320%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Magazine&amp;severity=high&amp;id=6972592b4623b1157c7fb3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69318-improper-neutralization-of-input-du-a9785071</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69318%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hossni%20Mubarak%20JobWP&amp;severity=high&amp;id=6972592b4623b1157c7fb3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69317-improper-neutralization-of-input-du-04556d88</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69317%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scriptsbundle%20CarSpot&amp;severity=medium&amp;id=6972592b4623b1157c7fb3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69316-improper-neutralization-of-input-du-99167229</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20TableOn&amp;severity=medium&amp;id=697259294623b1157c7fb2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69315-missing-authorization-in-nsquared-s-d79b69dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69315%3A%20Missing%20Authorization%20in%20NSquared%20Simply%20Schedule%20Appointments&amp;severity=medium&amp;id=697259294623b1157c7fb2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69314-improper-control-of-filename-for-in-dc5aee48</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69314%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20Werkstatt&amp;severity=high&amp;id=697259294623b1157c7fb2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69313-missing-authorization-in-wpxpo-post-39d23d47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69313%3A%20Missing%20Authorization%20in%20WPXPO%20PostX&amp;severity=high&amp;id=697259294623b1157c7fb2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69312-unrestricted-upload-of-file-with-da-1962b44b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69312%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=critical&amp;id=697259294623b1157c7fb2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69311-missing-authorization-in-broadstree-ad485980</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69311%3A%20Missing%20Authorization%20in%20Broadstreet%20Broadstreet%20Ads&amp;severity=high&amp;id=697259294623b1157c7fb2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69300-missing-authorization-in-leap13-pre-c6282d69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69300%3A%20Missing%20Authorization%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=697259294623b1157c7fb2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69293-incorrect-privilege-assignment-in-e-a75b5c5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69293%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Final%20User&amp;severity=high&amp;id=697259294623b1157c7fb2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69292-incorrect-privilege-assignment-in-e-dee04ece</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69292%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20WP%20Membership&amp;severity=high&amp;id=697259294623b1157c7fb2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69193-missing-authorization-in-e-plugins--cc2fa49c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69193%3A%20Missing%20Authorization%20in%20e-plugins%20WP%20Membership&amp;severity=high&amp;id=697259294623b1157c7fb2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69192-missing-authorization-in-e-plugins--0ec334fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69192%3A%20Missing%20Authorization%20in%20e-plugins%20Real%20Estate%20Pro&amp;severity=high&amp;id=697259284623b1157c7fb29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69191-missing-authorization-in-e-plugins--df02ee49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69191%3A%20Missing%20Authorization%20in%20e-plugins%20ListingHub&amp;severity=high&amp;id=697259284623b1157c7fb299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69190-missing-authorization-in-e-plugins--20c44783</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69190%3A%20Missing%20Authorization%20in%20e-plugins%20Listihub&amp;severity=high&amp;id=697259284623b1157c7fb296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69188-missing-authorization-in-e-plugins--953bca88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69188%3A%20Missing%20Authorization%20in%20e-plugins%20fitness-trainer&amp;severity=high&amp;id=697259284623b1157c7fb293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69187-missing-authorization-in-e-plugins--38901f51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69187%3A%20Missing%20Authorization%20in%20e-plugins%20Final%20User&amp;severity=high&amp;id=697259284623b1157c7fb290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69186-missing-authorization-in-e-plugins--373ceb9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69186%3A%20Missing%20Authorization%20in%20e-plugins%20Hospital%20Doctor%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69185-missing-authorization-in-e-plugins--a22c5886</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69185%3A%20Missing%20Authorization%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=697259284623b1157c7fb28a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69184-missing-authorization-in-e-plugins--1c735838</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69184%3A%20Missing%20Authorization%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69183-incorrect-privilege-assignment-in-e-d09b5863</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69183%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Hospital%20Doctor%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69182-incorrect-privilege-assignment-in-e-52836f79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69182%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69181-missing-authorization-in-e-plugins--20b23f39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69181%3A%20Missing%20Authorization%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=697259274623b1157c7fb240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69180-improper-neutralization-of-special--c6ea928d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69180%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themepassion%20Ultra%20Portfolio&amp;severity=high&amp;id=697259274623b1157c7fb23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69102-improper-neutralization-of-input-du-a3768e18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boopathi%20Rajan%20WP%20Test%20Email&amp;severity=high&amp;id=697259274623b1157c7fb23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69101-authentication-bypass-using-an-alte-2d65891d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69101%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20AmentoTech%20Workreap%20Core&amp;severity=critical&amp;id=697259274623b1157c7fb237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69100-improper-control-of-filename-for-in-10caffa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69100%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20North&amp;severity=high&amp;id=697259274623b1157c7fb234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69099-deserialization-of-untrusted-data-i-1885d6ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69099%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fuelthemes%20North&amp;severity=high&amp;id=697259274623b1157c7fb231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69098-improper-neutralization-of-input-du-0d6ef6ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpWave%20Hide%20My%20WP&amp;severity=medium&amp;id=697259274623b1157c7fb22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69097-improper-limitation-of-a-pathname-t-bec48a3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69097%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=high&amp;id=697259274623b1157c7fb22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69095-missing-authorization-in-designthem-5a534652</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69095%3A%20Missing%20Authorization%20in%20designthemes%20Reservation%20Plugin&amp;severity=medium&amp;id=697259274623b1157c7fb228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69079-deserialization-of-untrusted-data-i-e3d04117</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69079%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Sound%20%7C%20Musical%20Instruments%20Online%20Store&amp;severity=critical&amp;id=697259274623b1157c7fb225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69078-improper-control-of-filename-for-in-1e28ec28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69078%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Malta&amp;severity=high&amp;id=697259264623b1157c7fb213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69077-improper-control-of-filename-for-in-6e04414f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Hobo&amp;severity=high&amp;id=697259254623b1157c7fb210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69076-improper-control-of-filename-for-in-44999491</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Modern%20Housewife&amp;severity=high&amp;id=697259254623b1157c7fb20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69075-improper-control-of-filename-for-in-6e77f5a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69075%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Yolox&amp;severity=high&amp;id=697259254623b1157c7fb20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69074-improper-control-of-filename-for-in-15f6344d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69074%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Pearson%20Specter&amp;severity=high&amp;id=697259254623b1157c7fb207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69073-improper-control-of-filename-for-in-de805f38</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69073%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Piqes&amp;severity=high&amp;id=697259254623b1157c7fb204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69072-improper-control-of-filename-for-in-accd6e7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69072%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Prider&amp;severity=high&amp;id=697259254623b1157c7fb201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69071-improper-control-of-filename-for-in-c5cbc3dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69071%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20TanTum&amp;severity=high&amp;id=697259254623b1157c7fb1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69070-improper-control-of-filename-for-in-c7e05fa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69070%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tornados&amp;severity=high&amp;id=697259254623b1157c7fb1fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69068-improper-control-of-filename-for-in-5bc3d201</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69068%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Muji&amp;severity=high&amp;id=697259254623b1157c7fb1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69067-improper-control-of-filename-for-in-1c5e241d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tails&amp;severity=high&amp;id=697259244623b1157c7fb199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69066-improper-control-of-filename-for-in-fbf1c2fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Indoor%20Plants&amp;severity=high&amp;id=697259244623b1157c7fb196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69065-improper-control-of-filename-for-in-0125eca1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Snow%20Mountain&amp;severity=high&amp;id=697259244623b1157c7fb193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69064-improper-control-of-filename-for-in-e5e3b94f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Pets%20Land&amp;severity=high&amp;id=697259244623b1157c7fb190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69062-improper-control-of-filename-for-in-026b611d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Weedles&amp;severity=high&amp;id=697259244623b1157c7fb18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69061-improper-control-of-filename-for-in-af46349f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20MoveMe&amp;severity=high&amp;id=697259244623b1157c7fb18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69060-improper-control-of-filename-for-in-ece79b00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20uReach&amp;severity=high&amp;id=697259244623b1157c7fb187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69059-improper-control-of-filename-for-in-e7e2fae9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69059%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20DiveIt&amp;severity=high&amp;id=697259244623b1157c7fb184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69058-improper-control-of-filename-for-in-0af349c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69058%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20PartyMaker&amp;severity=high&amp;id=697259244623b1157c7fb181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69057-improper-control-of-filename-for-in-e7112801</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69057%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Eldon&amp;severity=high&amp;id=697259244623b1157c7fb17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69056-improper-neutralization-of-input-du-2753daef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69056%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=697259234623b1157c7fb15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69055-improper-limitation-of-a-pathname-t-4dc23822</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69055%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SeaTheme%20BM%20Content%20Builder&amp;severity=medium&amp;id=697259234623b1157c7fb15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69054-improper-neutralization-of-input-du-2d9b6017</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20highwarden%20Super%20Logos%20Showcase&amp;severity=high&amp;id=697259234623b1157c7fb158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69053-improper-neutralization-of-input-du-fc3939a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player&amp;severity=high&amp;id=697259234623b1157c7fb155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69052-missing-authorization-in-fmeaddons--529d7963</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69052%3A%20Missing%20Authorization%20in%20FmeAddons%20Registration%20%26%20Login%20with%20Mobile%20Phone%20Number%20for%20WooCommerce&amp;severity=critical&amp;id=697259234623b1157c7fb152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69051-improper-neutralization-of-input-du-1d159fb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro%20Reviews&amp;severity=high&amp;id=697259234623b1157c7fb14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69050-improper-control-of-filename-for-in-e568c597</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69050%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Overworld&amp;severity=high&amp;id=697259234623b1157c7fb14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69049-improper-control-of-filename-for-in-3447a9f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69049%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20T%C3%B6bel&amp;severity=high&amp;id=697259234623b1157c7fb149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69048-improper-neutralization-of-input-du-70ab11b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69048%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player&amp;severity=high&amp;id=697259234623b1157c7fb146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69047-improper-control-of-filename-for-in-a48d622c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20MaxShop&amp;severity=high&amp;id=697259234623b1157c7fb143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69046-improper-control-of-filename-for-in-c2cfd85b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69046%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebGeniusLab%20iRecco%20Core&amp;severity=high&amp;id=697259214623b1157c7fb0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69045-improper-neutralization-of-special--a883d199</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69045%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FooEvents%20FooEvents%20for%20WooCommerce&amp;severity=high&amp;id=697259214623b1157c7fb0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69044-improper-control-of-filename-for-in-c0000d97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69044%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Vango&amp;severity=high&amp;id=697259214623b1157c7fb0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69043-improper-control-of-filename-for-in-2586d312</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69043%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Rashy&amp;severity=high&amp;id=697259214623b1157c7fb0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69042-improper-control-of-filename-for-in-720e31ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69042%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Lindo&amp;severity=high&amp;id=697259214623b1157c7fb0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69041-improper-control-of-filename-for-in-4af62cdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69041%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Dekoro&amp;severity=high&amp;id=697259214623b1157c7fb0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69040-improper-control-of-filename-for-in-240c0198</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69040%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Bfres&amp;severity=high&amp;id=697259214623b1157c7fb0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69039-improper-control-of-filename-for-in-048f92a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69039%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Bailly&amp;severity=high&amp;id=697259214623b1157c7fb0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69038-improper-control-of-filename-for-in-c598b21c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69038%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Hyori&amp;severity=high&amp;id=697259214623b1157c7fb0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69037-improper-control-of-filename-for-in-880c502b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69037%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Pippo&amp;severity=high&amp;id=697259214623b1157c7fb0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69036-deserialization-of-untrusted-data-i-9f2a316e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69036%3A%20Deserialization%20of%20Untrusted%20Data%20in%20strongholdthemes%20Tech%20Life%20CPT&amp;severity=high&amp;id=6972591f4623b1157c7fb093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69035-deserialization-of-untrusted-data-i-765fa325</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69035%3A%20Deserialization%20of%20Untrusted%20Data%20in%20strongholdthemes%20Dental%20Care%20CPT&amp;severity=high&amp;id=6972591f4623b1157c7fb090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69005-improper-control-of-filename-for-in-602266e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69005%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Search%20%26%20Go&amp;severity=high&amp;id=6972591f4623b1157c7fb08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69004-improper-control-of-filename-for-in-e44db283</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69004%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20XpeedStudio%20Bajaar%20-%20Highly%20Customizable%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=6972591f4623b1157c7fb08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69003-improper-neutralization-of-input-du-2ee1bb27</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69003%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QantumThemes%20KenthaRadio&amp;severity=high&amp;id=6972591f4623b1157c7fb087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69002-deserialization-of-untrusted-data-i-f2e22d09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69002%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20OneLife&amp;severity=high&amp;id=6972591f4623b1157c7fb084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69001-improper-control-of-generation-of-c-3f9d1472</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69001%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Shahjahan%20Jewel%20FluentForm&amp;severity=medium&amp;id=6972591f4623b1157c7fb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68999-improper-neutralization-of-special--aebf6951</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68999%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=high&amp;id=6972591f4623b1157c7fb07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68986-unrestricted-upload-of-file-with-da-9a2c70a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68986%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Miion&amp;severity=critical&amp;id=6972591f4623b1157c7fb07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68913-improper-control-of-filename-for-in-4c8969fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68913%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zozothemes%20Miion&amp;severity=high&amp;id=6972591f4623b1157c7fb078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68912-improper-limitation-of-a-pathname-t-88457da1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68912%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Harmonic%20Design%20HDForms&amp;severity=high&amp;id=6972591e4623b1157c7fb037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68911-missing-authorization-in-solacewp-s-3da9a145</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68911%3A%20Missing%20Authorization%20in%20solacewp%20Solace&amp;severity=medium&amp;id=6972591e4623b1157c7fb034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68910-unrestricted-upload-of-file-with-da-26187745</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68910%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20Blogzee&amp;severity=critical&amp;id=6972591e4623b1157c7fb031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68909-unrestricted-upload-of-file-with-da-cc6e01ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68909%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20Blogistic&amp;severity=critical&amp;id=6972591e4623b1157c7fb02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68908-improper-control-of-filename-for-in-a6cabbd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68908%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20temash%20Barberry&amp;severity=high&amp;id=6972591e4623b1157c7fb02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68907-improper-limitation-of-a-pathname-t-eb2a8a96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68907%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AivahThemes%20Hostme%20v2&amp;severity=high&amp;id=6972591e4623b1157c7fb028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68906-improper-neutralization-of-input-du-1c57cff4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20JNews%20-%20Video&amp;severity=high&amp;id=6972591e4623b1157c7fb025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68905-improper-control-of-filename-for-in-ff1e9f14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68905%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jegtheme%20JNews%20-%20Pay%20Writer&amp;severity=high&amp;id=6972591e4623b1157c7fb022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68904-improper-neutralization-of-input-du-ced207c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20JNews%20-%20Frontend%20Submit&amp;severity=high&amp;id=6972591e4623b1157c7fb01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68903-deserialization-of-untrusted-data-i-5b3f44b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68903%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AivahThemes%20Anona&amp;severity=high&amp;id=6972591e4623b1157c7fb01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68902-improper-limitation-of-a-pathname-t-c538a106</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68902%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AivahThemes%20Anona&amp;severity=high&amp;id=6972591d4623b1157c7fb006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68901-improper-limitation-of-a-pathname-t-db9c136c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68901%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AivahThemes%20Anona&amp;severity=high&amp;id=6972591d4623b1157c7fb003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68900-improper-neutralization-of-input-du-bdddb953</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68900%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kriesi%20Enfold&amp;severity=medium&amp;id=6972591d4623b1157c7fb000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68899-deserialization-of-untrusted-data-i-96b08e62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68899%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Vivagh&amp;severity=high&amp;id=6972591d4623b1157c7faffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68898-improper-neutralization-of-input-du-e8867837</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cjjparadoxmax%20Synergy%20Project%20Manager&amp;severity=medium&amp;id=6972591d4623b1157c7faffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68896-missing-authorization-in-vrpr-wdv-o-6ae5876d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68896%3A%20Missing%20Authorization%20in%20vrpr%20WDV%20One%20Page%20Docs&amp;severity=medium&amp;id=6972591d4623b1157c7faff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68894-improper-neutralization-of-input-du-ce857be1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shoutoutglobal%20ShoutOut&amp;severity=high&amp;id=6972591d4623b1157c7faff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68884-improper-neutralization-of-input-du-6fffc42e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arevico%20WP%20Simple%20Redirect&amp;severity=high&amp;id=6972591d4623b1157c7faff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68883-improper-neutralization-of-input-du-e02bcec3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68883%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extremeidea%20bidorbuy%20Store%20Integrator&amp;severity=high&amp;id=6972591d4623b1157c7fafee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68881-improper-neutralization-of-special--14a35230</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68881%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Saad%20Iqbal%20AppExperts&amp;severity=high&amp;id=6972591d4623b1157c7fafeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68871-improper-neutralization-of-input-du-729a4405</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20noCreativity%20Dooodl&amp;severity=high&amp;id=6972591b4623b1157c7fafb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68869-incorrect-privilege-assignment-in-l-4eda534f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68869%3A%20Incorrect%20Privilege%20Assignment%20in%20LazyCoders%20LLC%20LazyTasks&amp;severity=critical&amp;id=6972591b4623b1157c7fafae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68866-improper-neutralization-of-input-du-2b2c9d00</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68866%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woofer696%20Dinatur&amp;severity=high&amp;id=6972591b4623b1157c7fafab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68864-improper-neutralization-of-input-du-75a71c1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68864%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infility%20Infility%20Global&amp;severity=high&amp;id=6972591b4623b1157c7fafa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68859-improper-neutralization-of-input-du-fc6a1396</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68859%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20agmorpheus%20Syntax%20Highlighter%20Compress&amp;severity=high&amp;id=6972591b4623b1157c7fafa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68858-improper-neutralization-of-input-du-a4ecdeab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Casey%20Bisson%20wpCAS&amp;severity=high&amp;id=6972591b4623b1157c7fafa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68857-improper-neutralization-of-special--6c1018a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68857%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ichurakov%20Paid%20Downloads&amp;severity=critical&amp;id=6972591b4623b1157c7faf9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68849-improper-neutralization-of-input-du-34789717</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68849%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Frank%20Corso%20Quote%20Master&amp;severity=high&amp;id=6972591b4623b1157c7faf9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68839-improper-neutralization-of-input-du-9948d05a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68839%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Remi%20Corson%20Easy%20Theme%20Options&amp;severity=high&amp;id=6972591b4623b1157c7faf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68838-improper-neutralization-of-input-du-8d7400fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20expresstechsoftware%20MemberPress%20Discord%20Addon&amp;severity=high&amp;id=6972591b4623b1157c7faf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68835-improper-neutralization-of-input-du-c756e8de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matiskiba%20Ravpage&amp;severity=high&amp;id=6972591a4623b1157c7faf89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68558-missing-authorization-in-averta-dep-828d605f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68558%3A%20Missing%20Authorization%20in%20averta%20Depicter%20Slider&amp;severity=medium&amp;id=6972591a4623b1157c7faf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68538-improper-neutralization-of-input-du-c4004e1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Craft&amp;severity=high&amp;id=6972591a4623b1157c7faf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68520-improper-neutralization-of-input-du-2e74c0b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20DotLife&amp;severity=high&amp;id=6972591a4623b1157c7faf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68518-improper-neutralization-of-input-du-a8703c1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Hoteller&amp;severity=high&amp;id=6972591a4623b1157c7faf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68510-improper-control-of-filename-for-in-5dd548ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68510%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=6972591a4623b1157c7faf7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68073-missing-authorization-in-ninja-team-07902cf1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68073%3A%20Missing%20Authorization%20in%20Ninja%20Team%20GDPR%20CCPA%20Compliance%20Support&amp;severity=medium&amp;id=6972591a4623b1157c7faf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68072-missing-authorization-in-merv-barre-cc985565</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68072%3A%20Missing%20Authorization%20in%20Merv%20Barrett%20Easy%20Property%20Listings&amp;severity=medium&amp;id=6972591a4623b1157c7faf74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68059-missing-authorization-in-e-plugins--77d62311</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68059%3A%20Missing%20Authorization%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=6972591a4623b1157c7faf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68058-missing-authorization-in-e-plugins--ab67652f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68058%3A%20Missing%20Authorization%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=6972591a4623b1157c7faf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68057-missing-authorization-in-e-plugins--2d9c4b66</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68057%3A%20Missing%20Authorization%20in%20e-plugins%20Hospital%20Doctor%20Directory&amp;severity=high&amp;id=697259194623b1157c7faf58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68047-deserialization-of-untrusted-data-i-c49bf780</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68047%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Arraytics%20Eventin&amp;severity=high&amp;id=697259194623b1157c7faf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68046-exposure-of-sensitive-system-inform-ba4c0977</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68046%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThemeHunk%20Contact%20Form%20%26%20Lead%20Form%20Elementor%20Builder&amp;severity=medium&amp;id=697259194623b1157c7faf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68041-improper-neutralization-of-input-du-0df36845</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68041%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codisto%20Omnichannel%20for%20WooCommerce&amp;severity=high&amp;id=697259194623b1157c7faf4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68039-missing-authorization-in-chris-simm-a82594ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68039%3A%20Missing%20Authorization%20in%20Chris%20Simmons%20WP%20BackItUp&amp;severity=medium&amp;id=697259194623b1157c7faf4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68035-insertion-of-sensitive-information--fbcffc5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68035%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20tabbyai%20Tabby%20Checkout&amp;severity=high&amp;id=697259194623b1157c7faf49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68034-improper-neutralization-of-special--55f4b309</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68034%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CleverReach%C2%AE%20CleverReach%C2%AE%20WP&amp;severity=critical&amp;id=697259194623b1157c7faf46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68030-server-side-request-forgery-ssrf-in-a21d7013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68030%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WP%20Messiah%20Frontis%20Blocks&amp;severity=high&amp;id=697259194623b1157c7faf43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68027-incorrect-privilege-assignment-in-t-a14f0fe1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68027%3A%20Incorrect%20Privilege%20Assignment%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=697259194623b1157c7faf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68020-missing-authorization-in-wanotifier-407a07fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68020%3A%20Missing%20Authorization%20in%20WANotifier%20Notifier&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68019-missing-authorization-in-cleverplug-dd70e525</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68019%3A%20Missing%20Authorization%20in%20cleverplugins%20SEO%20Booster&amp;severity=medium&amp;id=697259194623b1157c7faf3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68018-missing-authorization-in-ilmosys-or-c5c178d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68018%3A%20Missing%20Authorization%20in%20StackWC%20Order%20Listener%20for%20WooCommerce&amp;severity=critical&amp;id=697259184623b1157c7faf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68017-improper-neutralization-of-special--6206eb7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68017%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Antideo%20Antideo%20Email%20Validator&amp;severity=high&amp;id=697259184623b1157c7faf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68016-missing-authorization-in-onepay-sri-a47aed27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68016%3A%20Missing%20Authorization%20in%20Onepay%20Sri%20Lanka%20onepay%20Payment%20Gateway%20For%20WooCommerce&amp;severity=medium&amp;id=697259184623b1157c7faf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68015-improper-control-of-generation-of-c-7c3f3dc9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68015%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Vollstart%20Event%20Tickets%20with%20Ticket%20Scanner&amp;severity=critical&amp;id=697259184623b1157c7faf0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68013-missing-authorization-in-cardpaysol-a6e7175f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68013%3A%20Missing%20Authorization%20in%20cardpaysolutions%20Payment%20Gateway%20Authorize.Net%20CIM%20for%20WooCommerce&amp;severity=medium&amp;id=697259184623b1157c7faf0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68012-improper-neutralization-of-input-du-3220ddc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68012%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dmytro%20Shteflyuk%20CodeColorer&amp;severity=high&amp;id=697259184623b1157c7faf09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68011-improper-neutralization-of-input-du-cf88fe4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GLS%20GLS%20Shipping%20for%20WooCommerce&amp;severity=high&amp;id=697259184623b1157c7faf06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68009-missing-authorization-in-codeless-s-5fcdc7a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68009%3A%20Missing%20Authorization%20in%20Codeless%20Slider%20Templates&amp;severity=medium&amp;id=697259184623b1157c7faf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68008-improper-neutralization-of-input-du-69815023</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mndpsingh287%20WP%20Mail&amp;severity=high&amp;id=697259184623b1157c7faf00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68007-missing-authorization-in-event-espr-82b8dec6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68007%3A%20Missing%20Authorization%20in%20Event%20Espresso%20Event%20Espresso%204%20Decaf&amp;severity=medium&amp;id=697259184623b1157c7faefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68006-insertion-of-sensitive-information--ed1feff1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68006%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Deetronix%20Booking%20Ultra%20Pro&amp;severity=medium&amp;id=697259174623b1157c7faedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68004-improper-neutralization-of-input-du-206a2d26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kapil%20Chugh%20My%20Post%20Order&amp;severity=high&amp;id=697259174623b1157c7faed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68003-missing-authorization-in-renatoatsh-fd0be448</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68003%3A%20Missing%20Authorization%20in%20renatoatshown%20Shown%20Connector&amp;severity=medium&amp;id=697259174623b1157c7faed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68001-unrestricted-upload-of-file-with-da-16d7d75d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68001%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20garidium%20g-FFL%20Checkout&amp;severity=critical&amp;id=697259174623b1157c7faed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67968-unrestricted-upload-of-file-with-da-18899948</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67968%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20InspiryThemes%20Real%20Homes%20CRM&amp;severity=critical&amp;id=697259174623b1157c7faed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67967-missing-authorization-in-e-plugins--149fa327</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67967%3A%20Missing%20Authorization%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=697259174623b1157c7faecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67966-incorrect-privilege-assignment-in-e-8c144b61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67966%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=697259174623b1157c7faeca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67964-improper-neutralization-of-input-du-82f02692</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67964%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Homey%20Core&amp;severity=high&amp;id=697259174623b1157c7faec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67963-improper-limitation-of-a-pathname-t-9f6b932a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67963%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ovatheme%20Movie%20Booking&amp;severity=high&amp;id=697259174623b1157c7faec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67961-server-side-request-forgery-ssrf-in-9205865a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67961%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Marco%20van%20Wieren%20WPO365&amp;severity=medium&amp;id=697259174623b1157c7faec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67960-improper-neutralization-of-input-du-05758a63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20WorkScout-Core&amp;severity=high&amp;id=697259154623b1157c7fae98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67959-improper-neutralization-of-input-du-8f93f3d8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20WorkScout&amp;severity=high&amp;id=697259154623b1157c7fae95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67958-missing-authorization-in-taxcloud-t-cbf96692</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67958%3A%20Missing%20Authorization%20in%20Taxcloud%20TaxCloud%20for%20WooCommerce&amp;severity=medium&amp;id=697259154623b1157c7fae92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67957-improper-control-of-filename-for-in-4f9141ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67957%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TangibleWP%20Listivo%20Core&amp;severity=high&amp;id=697259154623b1157c7fae8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67956-missing-authorization-in-wpeverest--696615a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67956%3A%20Missing%20Authorization%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=697259154623b1157c7fae8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67955-improper-control-of-filename-for-in-35869ba7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67955%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TangibleWP%20MyHome%20Core&amp;severity=high&amp;id=697259154623b1157c7fae89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67954-exposure-of-sensitive-system-inform-9becc56d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67954%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=medium&amp;id=697259154623b1157c7fae86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67953-incorrect-privilege-assignment-in-b-40b90b35</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67953%3A%20Incorrect%20Privilege%20Assignment%20in%20Booking%20Activities%20Team%20Booking%20Activities&amp;severity=high&amp;id=697259154623b1157c7fae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67952-improper-neutralization-of-input-du-f1c53f92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Tour&amp;severity=high&amp;id=697259154623b1157c7fae80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67949-improper-neutralization-of-input-du-f6293952</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designingmedia%20Hostiko&amp;severity=high&amp;id=697259154623b1157c7fae7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67947-improper-neutralization-of-input-du-b6ce2862</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scriptsbundle%20AdForest%20Elementor&amp;severity=high&amp;id=697259144623b1157c7fae70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67946-improper-control-of-filename-for-in-1f2c95b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67946%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20scriptsbundle%20AdForest&amp;severity=high&amp;id=697259144623b1157c7fae6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67945-improper-neutralization-of-special--449b0da3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67945%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MailerLite%20MailerLite%20%E2%80%93%20WooCommerce%20integration&amp;severity=critical&amp;id=697259144623b1157c7fae6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67944-improper-control-of-generation-of-c-ce4f4ae0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67944%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=critical&amp;id=697259144623b1157c7fae67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67943-improper-neutralization-of-input-du-17b92856</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=697259144623b1157c7fae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67942-missing-authorization-in-peachpayme-4aeb6f3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67942%3A%20Missing%20Authorization%20in%20peachpayments%20Peach%20Payments%20Gateway&amp;severity=medium&amp;id=697259144623b1157c7fae61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67941-improper-control-of-filename-for-in-f9123d65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67941%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20The%20Aisle&amp;severity=high&amp;id=697259144623b1157c7fae5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67940-improper-control-of-filename-for-in-f98f49f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67940%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Powerlift&amp;severity=high&amp;id=697259144623b1157c7fae5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67938-improper-control-of-filename-for-in-26398e46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67938%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Biagiotti&amp;severity=high&amp;id=697259144623b1157c7fae58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67923-improper-neutralization-of-input-du-d9f31cfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=697259144623b1157c7fae55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67626-cross-site-request-forgery-csrf-in--99cfe8ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67626%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Angel%20Costa%20WP%20SEO%20Search&amp;severity=medium&amp;id=697259134623b1157c7fae30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67620-improper-neutralization-of-input-du-9343df07</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CleverSoft%20Anon&amp;severity=high&amp;id=697259134623b1157c7fae2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67619-deserialization-of-untrusted-data-i-b01a6210</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67619%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Kids%20Heaven&amp;severity=high&amp;id=697259134623b1157c7fae2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67617-deserialization-of-untrusted-data-i-ec276769</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67617%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20Consult%20Aid&amp;severity=critical&amp;id=697259134623b1157c7fae27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67616-improper-control-of-filename-for-in-b42999dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67616%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Mella&amp;severity=high&amp;id=697259134623b1157c7fae24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67615-improper-control-of-filename-for-in-1d5be9e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67615%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20bslthemes%20Myour&amp;severity=high&amp;id=697259134623b1157c7fae21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67614-improper-neutralization-of-input-du-d31edf7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20TheNa&amp;severity=high&amp;id=697259134623b1157c7fae1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66143-missing-authorization-in-merkulove--b040ea63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66143%3A%20Missing%20Authorization%20in%20merkulove%20Crumber&amp;severity=medium&amp;id=697259134623b1157c7fae1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66142-missing-authorization-in-merkulove--1b81cea7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66142%3A%20Missing%20Authorization%20in%20merkulove%20Comparimager%20for%20Elementor&amp;severity=medium&amp;id=697259134623b1157c7fae18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66141-missing-authorization-in-merkulove--dda7b57b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66141%3A%20Missing%20Authorization%20in%20merkulove%20Scroller&amp;severity=medium&amp;id=697259134623b1157c7fae15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66140-missing-authorization-in-merkulove--36c3a702</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66140%3A%20Missing%20Authorization%20in%20merkulove%20Uper%20for%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66139-missing-authorization-in-merkulove--9b6a4521</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66139%3A%20Missing%20Authorization%20in%20merkulove%20Audier%20For%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66138-missing-authorization-in-merkulove--5a8fd2dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66138%3A%20Missing%20Authorization%20in%20merkulove%20Motionger%20for%20Elementor&amp;severity=high&amp;id=697259114623b1157c7fab5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66137-missing-authorization-in-merkulove--ea8c0169</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66137%3A%20Missing%20Authorization%20in%20merkulove%20Searcher%20for%20Elementor&amp;severity=high&amp;id=697259114623b1157c7fab58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66136-missing-authorization-in-merkulove--c05e35f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66136%3A%20Missing%20Authorization%20in%20merkulove%20Carter%20for%20Elementor&amp;severity=high&amp;id=697259114623b1157c7fab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66135-missing-authorization-in-merkulove--9fdd0379</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66135%3A%20Missing%20Authorization%20in%20merkulove%20Imager%20for%20Elementor&amp;severity=high&amp;id=697259114623b1157c7fab52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64252-server-side-request-forgery-ssrf-in-640fda99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64252%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Marco%20Milesi%20ANAC%20XML%20Viewer&amp;severity=medium&amp;id=697259114623b1157c7fab4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63051-exposure-of-sensitive-system-inform-806a3162</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63051%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20sizam%20REHub%20Framework&amp;severity=medium&amp;id=697259114623b1157c7fab4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63026-improper-neutralization-of-input-du-6171ca83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Restaurant%20Theme%20Elements%20for%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63019-insertion-of-sensitive-information--b974c03d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63019%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Johan%20Jonk%20Stenstr%C3%B6m%20Cookies%20and%20Content%20Security%20Policy&amp;severity=high&amp;id=697259114623b1157c7fab46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63018-missing-authorization-in-wproyal-ba-287c1c57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63018%3A%20Missing%20Authorization%20in%20wproyal%20Bard&amp;severity=high&amp;id=697259104623b1157c7fab39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63017-improper-control-of-filename-for-in-95b29fce</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20WerkStatt%20Plugin&amp;severity=high&amp;id=697259104623b1157c7fab36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62754-missing-authorization-in-kapil-paul-700b8d31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62754%3A%20Missing%20Authorization%20in%20Kapil%20Paul%20Payment%20Gateway%20bKash%20for%20WC&amp;severity=critical&amp;id=697259104623b1157c7fab33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62741-server-side-request-forgery-ssrf-in-ff1e7115</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62741%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SmartDataSoft%20Pool%20Services&amp;severity=critical&amp;id=697259104623b1157c7fab30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62106-missing-authorization-in-mario-pesh-02fbceda</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62106%3A%20Missing%20Authorization%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=high&amp;id=697259104623b1157c7fab2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62077-improper-neutralization-of-input-du-be80ae75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62077%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SEOSEON%20EUROPE%20S.L%20Affiliate%20Link%20Tracker&amp;severity=medium&amp;id=697259104623b1157c7fab2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62056-unrestricted-upload-of-file-with-da-e7a7dcf0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62056%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20News%20Event&amp;severity=critical&amp;id=697259104623b1157c7fab27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62050-unrestricted-upload-of-file-with-da-a37648b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62050%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20Blogmatic&amp;severity=critical&amp;id=697259104623b1157c7fab24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5805-missing-authorization-in-ninetheme-e-58fb9aaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5805%3A%20Missing%20Authorization%20in%20Ninetheme%20Electron&amp;severity=high&amp;id=697259104623b1157c7fab21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54003-improper-control-of-filename-for-in-943115b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54003%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Depot&amp;severity=critical&amp;id=697259104623b1157c7fab1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54002-missing-authorization-in-jthemes-xs-85c2024b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54002%3A%20Missing%20Authorization%20in%20Jthemes%20xSmart&amp;severity=high&amp;id=6972590f4623b1157c7faae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53240-improper-neutralization-of-input-du-83e43970</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adamlabs%20WordPress%20Photo%20Gallery&amp;severity=medium&amp;id=6972590f4623b1157c7faadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52762-improper-neutralization-of-input-du-438a830f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexostudio%20flexo-posts-manager&amp;severity=medium&amp;id=6972590f4623b1157c7faada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52746-improper-neutralization-of-input-du-1924e741</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ayecode%20Restaurante&amp;severity=medium&amp;id=6972590f4623b1157c7faad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50007-incorrect-privilege-assignment-in-j-0580525c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50007%3A%20Incorrect%20Privilege%20Assignment%20in%20Jthemes%20xSmart&amp;severity=high&amp;id=6972590f4623b1157c7faad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50006-improper-neutralization-of-input-du-6fadda2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jthemes%20xSmart&amp;severity=medium&amp;id=6972590f4623b1157c7faad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50005-improper-neutralization-of-input-du-987382b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50005%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=6972590f4623b1157c7faace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50004-deserialization-of-untrusted-data-i-eeb6d952</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50004%3A%20Deserialization%20of%20Untrusted%20Data%20in%20artbees%20JupiterX%20Core&amp;severity=high&amp;id=6972590f4623b1157c7faacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50003-improper-control-of-filename-for-in-781a9983</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50003%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Amuli&amp;severity=critical&amp;id=6972590f4623b1157c7faac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50002-unrestricted-upload-of-file-with-da-de6744ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50002%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Farost%20Energia&amp;severity=critical&amp;id=6972590f4623b1157c7faac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49994-improper-control-of-filename-for-in-2047345c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49994%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Athens&amp;severity=critical&amp;id=6972590d4623b1157c7faa9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49375-missing-authorization-in-cozythemes-9aa14118</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49375%3A%20Missing%20Authorization%20in%20cozythemes%20HomeLancer&amp;severity=high&amp;id=6972590d4623b1157c7faa9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49336-improper-neutralization-of-input-du-29b8cad1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49336%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pondol%20Pondol%20BBS&amp;severity=medium&amp;id=6972590d4623b1157c7faa99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49249-improper-neutralization-of-input-du-8e63c1f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49249%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ApusTheme%20Drone&amp;severity=medium&amp;id=6972590d4623b1157c7faa96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49066-improper-neutralization-of-input-du-85247c1d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49066%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Accordion%20Slider%20PRO&amp;severity=medium&amp;id=6972590d4623b1157c7faa93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49055-improper-neutralization-of-special--bf4f12a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49055%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20WP%20Lead%20Capturing%20Pages&amp;severity=critical&amp;id=6972590d4623b1157c7faa90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49050-improper-neutralization-of-special--ceb451f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49050%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20WP%20Lead%20Capturing%20Pages&amp;severity=high&amp;id=6972590d4623b1157c7faa8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49049-improper-neutralization-of-special--32136600</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49049%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ZoomIt%20DZS%20Video%20Gallery&amp;severity=high&amp;id=6972590d4623b1157c7faa8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49046-improper-neutralization-of-input-du-a523b06f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20xPromoter&amp;severity=medium&amp;id=6972590d4623b1157c7faa87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49045-improper-neutralization-of-input-du-d56a5c70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49045%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20highwarden%20Super%20Interactive%20Maps&amp;severity=medium&amp;id=6972590d4623b1157c7faa84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49043-improper-neutralization-of-input-du-7ad9532b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49043%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Magic%20Responsive%20Slider%20and%20Carousel%20WordPress&amp;severity=medium&amp;id=6972590c4623b1157c7faa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48094-improper-neutralization-of-input-du-1f367045</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Magic%20Slider&amp;severity=medium&amp;id=6972590c4623b1157c7faa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47666-improper-neutralization-of-input-du-3e28c688</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Image%26Video%20FullScreen%20Background&amp;severity=medium&amp;id=6972590c4623b1157c7faa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47600-improper-neutralization-of-script-r-dc90d48a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47600%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xtemos%20WoodMart&amp;severity=medium&amp;id=6972590c4623b1157c7faa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47555-authorization-bypass-through-user-c-538ad53a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47555%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Themeum%20Tutor%20LMS&amp;severity=high&amp;id=6972590c4623b1157c7faa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47500-improper-neutralization-of-input-du-85e0ae4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benjamin%20Intal%20Stackable&amp;severity=medium&amp;id=6972590c4623b1157c7faa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47474-improper-control-of-filename-for-in-f88fd651</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47474%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ninetheme%20Anarkali&amp;severity=critical&amp;id=6972590c4623b1157c7faa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32123-improper-neutralization-of-input-du-7d36493b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32123%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20HTML5%20Video%20Player%20with%20Playlist%20%26%20Multiple%20Skins&amp;severity=medium&amp;id=6972590c4623b1157c7faa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31413-cross-site-request-forgery-csrf-in--4a4d1467</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31413%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons&amp;severity=high&amp;id=6972590c4623b1157c7faa5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27005-improper-neutralization-of-input-du-a9f96efe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27005%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20HTML5%20Video%20Player&amp;severity=medium&amp;id=6972590c4623b1157c7faa5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-gnu-inetutils-telnetd-flaw-lets-attackers-0f5bd676</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20GNU%20InetUtils%20telnetd%20Flaw%20Lets%20Attackers%20Bypass%20Login%20and%20Gain%20Root%20Access&amp;severity=critical&amp;id=69729a4b4623b1157c918195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23761-cwe-824-access-of-uninitialized-poi-e22cfc65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23761%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20VB-Audio%20Software%20Voicemeeter%20(Standard)&amp;severity=medium&amp;id=697251f54623b1157c7bcf88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23762-cwe-755-improper-handling-of-except-58a810d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23762%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20VB-Audio%20Software%20Voicemeeter%20(Standard)&amp;severity=medium&amp;id=697251f54623b1157c7bcf8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23763-cwe-668-exposure-of-resource-to-wro-c5e3de8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23763%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20VB-Audio%20Software%20Matrix&amp;severity=high&amp;id=697251f54623b1157c7bcf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23764-cwe-823-use-of-out-of-range-pointer-0ecbb011</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23764%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20VB-Audio%20Software%20Voicemeeter%20(Standard)&amp;severity=medium&amp;id=697251f54623b1157c7bcf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22278-cwe-307-improper-restriction-of-exc-63d6d9d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22278%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20PowerScale%20OneFS&amp;severity=high&amp;id=697251f54623b1157c7bcf85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36588-cwe-89-improper-neutralization-of-s-26748496</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36588%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=69724ae54623b1157c7a6893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32057-cwe-295-improper-certificate-valida-577d1175</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32057%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=697243dd4623b1157c78dedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32056-cwe-1241-use-of-predictable-algorit-21f21815</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32056%3A%20CWE-1241%3A%20Use%20of%20Predictable%20Algorithm%20in%20Random%20Number%20Generator%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=697243dd4623b1157c78ded8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/old-attack-new-speed-researchers-optimize-page-cac-2f714afd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Old%20Attack%2C%20New%20Speed%3A%20Researchers%20Optimize%20Page%20Cache%20Exploits&amp;severity=medium&amp;id=697240254623b1157c78210a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24009-cwe-502-deserialization-of-untruste-fbb20fca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24009%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20docling-project%20docling-core&amp;severity=high&amp;id=6972406b4623b1157c78272c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65098-cwe-79-improper-neutralization-of-i-f71e6496</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65098%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baptisteArno%20typebot.io&amp;severity=high&amp;id=69723cd54623b1157c77843e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64097-cwe-330-use-of-insufficiently-rando-532e6a2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64097%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20nerves-hub%20nerves_hub_web&amp;severity=critical&amp;id=69723cd54623b1157c778439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23760-cwe-288-authentication-bypass-using-307c60bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23760%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SmarterTools%20SmarterMail&amp;severity=critical&amp;id=69723cd54623b1157c778445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1329-stack-based-buffer-overflow-in-tenda-8a33d034</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1329%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AX1803&amp;severity=high&amp;id=6972406b4623b1157c782733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1328-buffer-overflow-in-totolink-nr1800x-a1d00173</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1328%3A%20Buffer%20Overflow%20in%20Totolink%20NR1800X&amp;severity=high&amp;id=697251f54623b1157c7bcfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-pixel-zero-click-redis-rce-chi-6c8f578f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Pixel%20Zero-Click%2C%20Redis%20RCE%2C%20China%20C2s%2C%20RAT%20Ads%2C%20Crypto%20Scams%20%26%2015%2B%20Stories&amp;severity=low&amp;id=69729a4b4623b1157c918198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1327-command-injection-in-totolink-nr1800-636c9eb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1327%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=medium&amp;id=697232484623b1157c748474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-adopts-ai-to-generate-powershell-backdoors-9b308855</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KONNI%20Adopts%20AI%20to%20Generate%20PowerShell%20Backdoors&amp;severity=medium&amp;id=69722ec54623b1157c73cce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1326-command-injection-in-totolink-nr1800-ea6910ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1326%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=medium&amp;id=69722b404623b1157c72bdd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12738-cwe-200-exposure-of-sensitive-infor-837a963d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12738%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69722b404623b1157c72bdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/december-2025-security-issues-in-korean-global-fin-604f9181</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=December%202025%20Security%20Issues%20in%20Korean%20%26%20Global%20Financial%20Sector&amp;severity=medium&amp;id=69728a2c4623b1157c8ba833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1325-weak-password-recovery-in-sangfor-op-224f4d41</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1325%3A%20Weak%20Password%20Recovery%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=697224384623b1157c711e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1324-os-command-injection-in-sangfor-oper-bcaf02a0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1324%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=high&amp;id=697224384623b1157c711e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14295-cwe-257-storing-passwords-in-a-reco-b2860b25</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14295%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Automated%20Logic%20WebCTRL&amp;severity=high&amp;id=697220b84623b1157c6ff4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10856-cwe-434-unrestricted-upload-of-file-f1f9d43b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10856%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Solvera%20Software%20Services%20Trade%20Inc.%20Teknoera&amp;severity=high&amp;id=697219ac4623b1157c6e8dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10855-cwe-639-authorization-bypass-throug-a1a1bb5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10855%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Solvera%20Software%20Services%20Trade%20Inc.%20Teknoera&amp;severity=high&amp;id=6972163c4623b1157c6df3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wave-of-attacks-targeting-fortigate-firewalls-6d647d9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Wave%20of%20Attacks%20Targeting%20FortiGate%20Firewalls&amp;severity=medium&amp;id=697215f54623b1157c6de53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67684-cwe-22-improper-limitation-of-a-pat-bc0a1d9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67684%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenSolution%20Quick.Cart&amp;severity=critical&amp;id=697212a84623b1157c6d1f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67683-cwe-79-improper-neutralization-of-i-ae4cfec0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67683%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=697212a84623b1157c6d1f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10024-cwe-639-authorization-bypass-throug-7ff78f82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10024%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20EXERT%20Computer%20Technologies%20Software%20Ltd.%20Co.%20Education%20Management%20System&amp;severity=high&amp;id=69720f224623b1157c6c54e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/filling-the-most-common-gaps-in-google-workspace-s-f386f7af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Filling%20the%20Most%20Common%20Gaps%20in%20Google%20Workspace%20Security&amp;severity=low&amp;id=69729a4b4623b1157c91819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-package-impersonates-sympy-deploys--b22eefbf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Package%20Impersonates%20SymPy%2C%20Deploys%20XMRig%20Miner%20on%20Linux%20Hosts&amp;severity=medium&amp;id=69729a4b4623b1157c91819e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartermail-auth-bypass-exploited-in-the-wild-two--107b4488</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmarterMail%20Auth%20Bypass%20Exploited%20in%20the%20Wild%20Two%20Days%20After%20Patch%20Release&amp;severity=low&amp;id=69729a4b4623b1157c9181a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atlassian-gitlab-zoom-release-security-patches-baa70442</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atlassian%2C%20GitLab%2C%20Zoom%20Release%20Security%20Patches&amp;severity=critical&amp;id=6971f2cd4623b1157c649e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1225-cwe-20-improper-input-validation-in--931c988d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1225%3A%20CWE-20%20Improper%20Input%20Validation%20in%20QOS.CH%20Sarl%20Logback-core&amp;severity=low&amp;id=6972163c4623b1157c6df3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1332-cwe-306-missing-authentication-for-c-b236b23b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1332%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HAMASTAR%20Technology%20MeetingHub&amp;severity=medium&amp;id=697275ff4623b1157c8651ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4764-cwe-89-improper-neutralization-of-sp-7304c9c6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4764%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aida%20Computer%20Information%20Technology%20Inc.%20Hotel%20Guest%20Hotspot&amp;severity=high&amp;id=697212a84623b1157c6d1f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4763-cwe-79-improper-neutralization-of-in-9e52a134</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4763%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Aida%20Computer%20Information%20Technology%20Inc.%20Hotel%20Guest%20Hotspot&amp;severity=medium&amp;id=697212a84623b1157c6d1f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1331-cwe-434-unrestricted-upload-of-file--764369fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1331%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AMASTAR%20Technology%20MeetingHub&amp;severity=critical&amp;id=69723cd54623b1157c778441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-targeting-cisco-unified-cm-zero-day-72adec99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Targeting%20Cisco%20Unified%20CM%20Zero-Day&amp;severity=critical&amp;id=6971e8414623b1157c610b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-ai-generated-code-securex3f-thu-jan-22nd-9c248672</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20AI-Generated%20Code%20Secure%26%23x3f%3B%2C%20(Thu%2C%20Jan%2022nd)&amp;severity=medium&amp;id=6971e13c4623b1157c546e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1330-cwe-36-absolute-path-traversal-in-ha-8ec72c7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1330%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20HAMASTAR%20Technology%20MeetingHub&amp;severity=high&amp;id=6971e4f04623b1157c560bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24332-cwe-204-observable-response-discrep-8f1ed967</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24332%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Discord%20WebSocket%20API%20service&amp;severity=medium&amp;id=6971dde84623b1157c521593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0920-cwe-269-improper-privilege-managemen-5d2a4b0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0920%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=critical&amp;id=6971cc544623b1157c4acff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automated-fortigate-attacks-exploit-forticloud-sso-01b5fbea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automated%20FortiGate%20Attacks%20Exploit%20FortiCloud%20SSO%20to%20Alter%20Firewall%20Configurations&amp;severity=medium&amp;id=69729a4b4623b1157c9181a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fixes-actively-exploited-zero-day-cve-2026-2-4c50f3ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Fixes%20Actively%20Exploited%20Zero-Day%20CVE-2026-20045%20in%20Unified%20CM%20and%20Webex&amp;severity=critical&amp;id=69729a4b4623b1157c9181a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24049-cwe-22-improper-limitation-of-a-pat-2e330dd1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24049%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pypa%20wheel&amp;severity=high&amp;id=6971a92c4623b1157c3a86c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24042-cwe-862-missing-authorization-in-ap-acba14bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24042%3A%20CWE-862%3A%20Missing%20Authorization%20in%20appsmithorg%20appsmith&amp;severity=critical&amp;id=6971a2234623b1157c33647c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24039-cwe-284-improper-access-control-in--7aa7861a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24039%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=6971a2234623b1157c336478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24038-cwe-287-improper-authentication-in--71130ede</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24038%3A%20CWE-287%3A%20Improper%20Authentication%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=6971a2234623b1157c336474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24037-cwe-79-improper-neutralization-of-i-f5563376</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24037%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=6971a2234623b1157c336470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24036-cwe-284-improper-access-control-in--93914593</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24036%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=6971a2234623b1157c33646b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24035-cwe-284-improper-access-control-in--9329fb36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24035%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=697197984623b1157c136a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24034-cwe-434-unrestricted-upload-of-file-d7b7a95a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24034%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=697197984623b1157c136a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24010-cwe-74-improper-neutralization-of-s-8f68027a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24010%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=697190914623b1157c0cb806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24006-cwe-770-allocation-of-resources-wit-1150131c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24006%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=697190914623b1157c0cb802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24002-cwe-74-improper-neutralization-of-s-5cd70cb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24002%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20gristlabs%20grist-core&amp;severity=critical&amp;id=697190914623b1157c0cb7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24001-cwe-400-uncontrolled-resource-consu-10138374</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24001%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kpdecker%20jsdiff&amp;severity=low&amp;id=697190914623b1157c0cb7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23992-cwe-347-improper-verification-of-cr-356035ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23992%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20theupdateframework%20go-tuf&amp;severity=medium&amp;id=697190914623b1157c0cb7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23991-cwe-617-reachable-assertion-in-theu-bcca6105</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23991%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20theupdateframework%20go-tuf&amp;severity=medium&amp;id=697190914623b1157c0cb7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23966-cwe-345-insufficient-verification-o-3fba88f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23966%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20JuneAndGreen%20sm-crypto&amp;severity=critical&amp;id=697190914623b1157c0cb7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23965-cwe-347-improper-verification-of-cr-30d24726</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23965%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20JuneAndGreen%20sm-crypto&amp;severity=high&amp;id=697190914623b1157c0cb7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23967-cwe-347-improper-verification-of-cr-632a7977</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23967%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20JuneAndGreen%20sm-crypto&amp;severity=high&amp;id=697190914623b1157c0cb7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23699-improper-neutralization-of-special--88b06796</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23699%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20AP180(JA)%20V1.xx&amp;severity=high&amp;id=697186044623b1157c0a2c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27380-cwe-79-improper-neutralization-of-i-c245392d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27380%3A%20CWE-79%20%E2%80%93%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-Site%20Scripting)%20in%20Altium%20AES&amp;severity=high&amp;id=697186044623b1157c0a2c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23957-cwe-770-allocation-of-resources-wit-088bb44b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23957%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=697186044623b1157c0a2c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23956-cwe-1333-inefficient-regular-expres-81048165</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23956%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=697186044623b1157c0a2c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27379-cwe-79-cross-site-scripting-xss-in--ce8bb266</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27379%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Altium%20AES&amp;severity=medium&amp;id=697186044623b1157c0a2c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27378-cwe-89-sql-injection-in-altium-aes-497db969</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27378%3A%20CWE-89%20SQL%20Injection%20in%20Altium%20AES&amp;severity=high&amp;id=69717b774623b1157c01dc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-heurremoteadmingotoresolvegen-df139cc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20HEURRemoteAdmin.GoToResolve.gen&amp;severity=medium&amp;id=6972081c4623b1157c6a98e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23951-cwe-125-out-of-bounds-read-in-sumat-f9c52a12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23951%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=medium&amp;id=697174714623b1157cfcd293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27377-cwe-295-improper-certificate-valida-9684e506</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27377%3A%20CWE-295%20%E2%80%93%20Improper%20Certificate%20Validation%20in%20Altium%20Altium%20Designer&amp;severity=medium&amp;id=697174714623b1157cfcd28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-22-a28ebfbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-22&amp;severity=medium&amp;id=6972beb24623b1157c9a7c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66428-na-e49c75a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66428%3A%20n%2Fa&amp;severity=high&amp;id=697271914623b1157c8544ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70899-na-47c41fad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70899%3A%20n%2Fa&amp;severity=medium&amp;id=69725c7b4623b1157c807496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56589-na-6f58c484</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56589%3A%20n%2Fa&amp;severity=high&amp;id=69725c7b4623b1157c807492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56590-na-a788daad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56590%3A%20n%2Fa&amp;severity=critical&amp;id=69725c7b4623b1157c80748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69828-na-58cb5585</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69828%3A%20n%2Fa&amp;severity=critical&amp;id=697255704623b1157c7cc364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67221-na-b55c10a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67221%3A%20n%2Fa&amp;severity=high&amp;id=697255704623b1157c7cc360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69820-na-74a7fc7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69820%3A%20n%2Fa&amp;severity=medium&amp;id=69724ae54623b1157c7a6896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69612-na-9524f76d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69612%3A%20n%2Fa&amp;severity=medium&amp;id=697247604623b1157c79904a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69821-na-2e81d34c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69821%3A%20n%2Fa&amp;severity=high&amp;id=697243dd4623b1157c78dee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69822-na-d100a79b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69822%3A%20n%2Fa&amp;severity=high&amp;id=6972406b4623b1157c782728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69764-na-4b4e344f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69764%3A%20n%2Fa&amp;severity=critical&amp;id=6972406b4623b1157c782724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-22-ce618865</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-22&amp;severity=low&amp;id=6971e83e4623b1157c610aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23887-cwe-79-improper-neutralization-of-i-c1cb9e0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23887%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=697166604623b1157cf4ef71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23873-cwe-1236-improper-neutralization-of-bfdca59a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23873%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20zhblue%20hustoj&amp;severity=medium&amp;id=697162dc4623b1157cf42cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1036-cwe-862-missing-authorization-in-10w-194bf8a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1036%3A%20CWE-862%20Missing%20Authorization%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=medium&amp;id=697162dc4623b1157cf42cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23737-cwe-502-deserialization-of-untruste-824b5dc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23737%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=69715f584623b1157cf35e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23736-cwe-1321-improperly-controlled-modi-57a8acae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23736%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=69715f584623b1157cf35e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23996-cwe-208-observable-timing-discrepan-ff484f4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23996%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20Athroniaeth%20fastapi-api-key&amp;severity=low&amp;id=697158504623b1157cf11dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/purplebravos-targeting-of-the-it-software-supply-c-29f1b8e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PurpleBravo%E2%80%99s%20Targeting%20of%20the%20IT%20Software%20Supply%20Chain&amp;severity=medium&amp;id=69715bd34623b1157cf1b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23990-cwe-269-improper-privilege-manageme-fc32d928</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23990%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20controlplaneio-fluxcd%20flux-operator&amp;severity=medium&amp;id=697158504623b1157cf11db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23986-cwe-61-unix-symbolic-link-symlink-f-633913a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23986%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20copier-org%20copier&amp;severity=medium&amp;id=697154cc4623b1157cf0b385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23968-cwe-61-unix-symbolic-link-symlink-f-fc072e5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23968%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20copier-org%20copier&amp;severity=medium&amp;id=697154cc4623b1157cf0b381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23524-cwe-502-deserialization-of-untruste-6ac31d76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23524%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20laravel%20reverb&amp;severity=critical&amp;id=697151484623b1157cf00eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23960-cwe-79-improper-neutralization-of-i-3e3c263a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23960%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=697151484623b1157cf00ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23518-cwe-347-improper-verification-of-cr-2b7da1d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23518%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20fleetdm%20fleet&amp;severity=critical&amp;id=69714dc34623b1157cef80f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23517-cwe-862-missing-authorization-in-fl-5296eba5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23517%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69714dc34623b1157cef80ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23526-cwe-267-privilege-defined-with-unsa-757d7df5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23526%3A%20CWE-267%3A%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20cvat-ai%20cvat&amp;severity=high&amp;id=69714dc34623b1157cef80f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23516-cwe-83-improper-neutralization-of-s-e9036b5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23516%3A%20CWE-83%3A%20Improper%20Neutralization%20of%20Script%20in%20Attributes%20in%20a%20Web%20Page%20in%20cvat-ai%20cvat&amp;severity=high&amp;id=69714a404623b1157ceef883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22808-cwe-79-improper-neutralization-of-i-4d4028d8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22808%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=697146bc4623b1157ced22dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22807-cwe-94-improper-control-of-generati-9811f67e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22807%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=697146bc4623b1157ced22d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22793-cwe-94-improper-control-of-generati-a207a9e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22793%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=697143384623b1157ceca8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22792-cwe-116-improper-encoding-or-escapi-6dc25d7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22792%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=69713fb64623b1157cec0b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21852-cwe-522-insufficiently-protected-cr-d3f2b60d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21852%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20anthropics%20claude-code&amp;severity=medium&amp;id=69713c964623b1157cebad0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69285-cwe-306-missing-authentication-for--f21c7742</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69285%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dataease%20SQLBot&amp;severity=high&amp;id=697135284623b1157cea327d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69209-cwe-120-buffer-copy-without-checkin-6a26ff4f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69209%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20arduino%20ArduinoCore-avr&amp;severity=medium&amp;id=697131a44623b1157ce981d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68141-cwe-476-null-pointer-dereference-in-69aad5d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68141%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20EVerest%20everest-core&amp;severity=high&amp;id=697131a44623b1157ce981d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68140-cwe-863-incorrect-authorization-in--45ad28eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68140%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=697131a44623b1157ce981e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68139-cwe-384-session-fixation-in-everest-f93d3f38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68139%3A%20CWE-384%3A%20Session%20Fixation%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69712e204623b1157ce8e0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12781-vulnerability-in-python-software-fo-5238a0da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12781%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69712e204623b1157ce8e0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68138-cwe-770-allocation-of-resources-wit-9cb3e41c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68138%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69712e204623b1157ce8e0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23955-cwe-1046-creation-of-immutable-text-edb954b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23955%3A%20CWE-1046%3A%20Creation%20of%20Immutable%20Text%20Using%20String%20Concatenation%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69712a9c4623b1157ce7dac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68137-cwe-120-buffer-copy-without-checkin-e8ca4119</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68137%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69712a9c4623b1157ce7dac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68136-cwe-770-allocation-of-resources-wit-39822731</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68136%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69712a9c4623b1157ce7dac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68135-cwe-703-improper-check-or-handling--4e9fc309</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68135%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=697124574623b1157ce6527d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-macsyncs-script-driven-stealer-and-hardware-7ca77c35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20MacSync&apos;s%20Script-Driven%20Stealer%20and%20Hardware%20Wallet%20App%20Trojanization&amp;severity=medium&amp;id=69715bd34623b1157cf1b923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68134-cwe-20-improper-input-validation-in-f353a3e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68134%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20EVerest%20everest-core&amp;severity=high&amp;id=697120104623b1157ce4b45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68132-cwe-125-out-of-bounds-read-in-evere-082a9036</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68132%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20EVerest%20everest-core&amp;severity=low&amp;id=697120104623b1157ce4b457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23754-cwe-639-authorization-bypass-throug-5138dd2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23754%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20D-Link%20D-View%208&amp;severity=high&amp;id=697119084623b1157ce32428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23755-cwe-427-uncontrolled-search-path-el-93bd221c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23755%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20D-Link%20D-View%208&amp;severity=high&amp;id=697119084623b1157ce3242c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-purplebravo-campaign-targeted-3136-ip-74f44dc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20PurpleBravo%20Campaign%20Targeted%203%2C136%20IP%20Addresses%20via%20Fake%20Job%20Interviews&amp;severity=medium&amp;id=69713bc44623b1157ceb898e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0834-cwe-290-authentication-bypass-by-spo-8e62023d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0834%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20TP-Link%20Systems%20Inc.%20Archer%20C20%20v6.0%2C%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=697119084623b1157ce32430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20045-improper-control-of-generation-of-c-188d667d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20045%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager&amp;severity=high&amp;id=6971006e4623b1157cd9ee59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20109-improper-neutralization-of-input-du-a6b3791b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20109%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Packaged%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=6971006e4623b1157cd9ee65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20080-uncontrolled-resource-consumption-i-d423f81b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20080%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20Ultra-Reliable%20Wireless%20Backhaul&amp;severity=medium&amp;id=6971006e4623b1157cd9ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20055-improper-neutralization-of-input-du-b3818533</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20055%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Packaged%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=6971006e4623b1157cd9ee5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20092-incorrect-permission-assignment-for-1af3c810</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20092%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Cisco%20Cisco%20Intersight%20Virtual%20Appliance&amp;severity=medium&amp;id=6971006e4623b1157cd9ee62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zoom-and-gitlab-release-security-updates-fixing-rc-e398edac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zoom%20and%20GitLab%20Release%20Security%20Updates%20Fixing%20RCE%2C%20DoS%2C%20and%202FA%20Bypass%20Flaws&amp;severity=critical&amp;id=69713bc44623b1157ceb8991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1290-cwe-305-authentication-bypass-by-pri-89863ae5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1290%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Jamf%20Jamf%20Pro&amp;severity=medium&amp;id=6970f25d4623b1157cd5d8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13878-cwe-617-reachable-assertion-in-isc--1c216a54</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13878%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20BIND%209&amp;severity=high&amp;id=6970eb554623b1157cd44ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-users-targeted-with-backup-themed-phishin-67db1cb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Users%20Targeted%20With%20Backup-Themed%20Phishing%20Emails&amp;severity=medium&amp;id=6970d98e4623b1157cd042b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22022-cwe-285-improper-authorization-in-a-60a1e182</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22022%3A%20CWE-285%20Improper%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Solr&amp;severity=high&amp;id=6970dd444623b1157cd11f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22444-cwe-20-improper-input-validation-in-bf4c21cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22444%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Solr&amp;severity=high&amp;id=6970dd444623b1157cd11f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-target-macos-developers-via-m-77d77ca3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Target%20macOS%20Developers%20via%20Malicious%20VS%20Code%20Projects&amp;severity=medium&amp;id=6970d6094623b1157cce8f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-expand-abuse-of-microsoft-visual-stu-0a2ba8d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Expand%20Abuse%20of%20Microsoft%20Visual%20Studio%20Code&amp;severity=medium&amp;id=69715f574623b1157cf35e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-identity-security-must-move-beyond-mfa-0e4b66e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Identity%20Security%20Must%20Move%20Beyond%20MFA&amp;severity=medium&amp;id=6970c7f94623b1157ccac874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14083-improper-access-control-in-red-hat--394da9aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14083%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=6970c4ab4623b1157cca1f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-api-security-harder-to-secure--41f747f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20API%20Security%20%E2%80%93%20Harder%20to%20Secure%2C%20Impossible%20to%20Ignore&amp;severity=medium&amp;id=6970c0f14623b1157cc96abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-mcp-server-flaws-lead-to-code-execution--584d6180</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20MCP%20Server%20Flaws%20Lead%20to%20Code%20Execution%2C%20Data%20Exposure&amp;severity=medium&amp;id=6970bd6d4623b1157cc85ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-yourself-from-bluetooth-headset-tra-de46510a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20yourself%20from%20Bluetooth-headset%20tracking%20and%20the%20WhisperPair%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6970bdf44623b1157cc8e22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0988-integer-overflow-or-wraparound-in-re-0a00057a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0988%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6970bdb04623b1157cc86604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracles-first-2026-cpu-delivers-337-new-security-p-354152cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%E2%80%99s%20First%202026%20CPU%20Delivers%20337%20New%20Security%20Patches&amp;severity=medium&amp;id=6970af5d4623b1157cc435b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposure-assessment-platforms-signal-a-shift-in-fo-d5dc7dfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposure%20Assessment%20Platforms%20Signal%20a%20Shift%20in%20Focus&amp;severity=medium&amp;id=69713bc44623b1157ceb8997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0663-cwe-1286-improper-validation-of-synt-12c4aa85</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0663%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=6970ac0c4623b1157cc37dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detailed-analysis-of-lockbit-50-6cffb81d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detailed%20Analysis%20of%20LockBit%205.0&amp;severity=medium&amp;id=69715bd34623b1157cf1b95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automatic-script-execution-in-visual-studio-code-w-21b59ec5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automatic%20Script%20Execution%20In%20Visual%20Studio%20Code%2C%20(Wed%2C%20Jan%2021st)&amp;severity=medium&amp;id=6970a4d14623b1157cc128af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-6-billion-passwords-shows-stagnant-use-f7446f58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%206%20Billion%20Passwords%20Shows%20Stagnant%20User%20Behavior&amp;severity=medium&amp;id=69709a454623b1157cbe4d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chainlit-ai-framework-flaws-enable-data-theft-via--d29fe6c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chainlit%20AI%20Framework%20Flaws%20Enable%20Data%20Theft%20via%20File%20Read%20and%20SSRF%20Bugs&amp;severity=high&amp;id=69713bc44623b1157ceb899a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-linux-malware-framework-built-with-ai-ass-35e6d54a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%20Linux%20Malware%20Framework%20Built%20with%20AI%20Assistance%20Reaches%2088%2C000%20Lines%20of%20Code&amp;severity=medium&amp;id=69713bc44623b1157ceb899d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24016-uncontrolled-search-path-element-in-22cbc1e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24016%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Fsas%20Technologies%20Inc.%20ServerView%20Agents%20for%20Windows&amp;severity=high&amp;id=697081db4623b1157cb612d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24061-cwe-88-improper-neutralization-of-a-b71077e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24061%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20GNU%20Inetutils&amp;severity=critical&amp;id=69707ad34623b1157cb426fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-of-fake-maintenance-messages-target-094a80b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20of%20Fake%20Maintenance%20Messages%20Targeting%20Users%E2%80%99%20Master%20Passwords&amp;severity=medium&amp;id=69713bc44623b1157ceb89a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14559-cwe-840-in-red-hat-red-hat-build-of-f99bd5f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14559%3A%20CWE-840%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=697070494623b1157cabd775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/certcc-warns-binary-parser-bug-allows-nodejs-privi-75fd5a70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT%2FCC%20Warns%20binary-parser%20Bug%20Allows%20Node.js%20Privilege-Level%20Code%20Execution&amp;severity=low&amp;id=69713bc44623b1157ceb89a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1035-time-of-check-time-of-use-toctou-rac-efd74a5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1035%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69706cf44623b1157caadc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68133-cwe-770-allocation-of-resources-wit-438f1390</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68133%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69703f0f4623b1157c7a66a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15521-cwe-639-authorization-bypass-throug-3e14deb7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15521%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kodezen%20Academy%20LMS%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Complete%20eLearning%20Solution&amp;severity=critical&amp;id=697034844623b1157c6ef998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-21-b5fc2622</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-21&amp;severity=medium&amp;id=69716d324623b1157cf762b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66960-na-3112dbf8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66960%3A%20n%2Fa&amp;severity=high&amp;id=697124574623b1157ce65285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69766-na-9df1087a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69766%3A%20n%2Fa&amp;severity=critical&amp;id=697112004623b1157ce0cb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69763-na-85537788</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69763%3A%20n%2Fa&amp;severity=critical&amp;id=697112004623b1157ce0cb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69762-na-c4c5b90b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69762%3A%20n%2Fa&amp;severity=critical&amp;id=697112004623b1157ce0cb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66959-na-a4479d1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66959%3A%20n%2Fa&amp;severity=high&amp;id=697112004623b1157ce0cb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70648-na-335c59fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70648%3A%20n%2Fa&amp;severity=high&amp;id=6971006e4623b1157cd9ee56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70646-na-41918022</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70646%3A%20n%2Fa&amp;severity=high&amp;id=6971006e4623b1157cd9ee53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70644-na-799a175d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70644%3A%20n%2Fa&amp;severity=high&amp;id=6971006e4623b1157cd9ee50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57681-na-c648da61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57681%3A%20n%2Fa&amp;severity=medium&amp;id=6970fced4623b1157cd8d88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70645-na-300b9da7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70645%3A%20n%2Fa&amp;severity=high&amp;id=6970f5e14623b1157cd6df2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70651-na-b5bef8ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70651%3A%20n%2Fa&amp;severity=high&amp;id=6970eedc4623b1157cd51a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70650-na-e01576e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70650%3A%20n%2Fa&amp;severity=high&amp;id=6970eedc4623b1157cd51a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-21-30f656d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-21&amp;severity=low&amp;id=6970cb7a4623b1157ccb77d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0933-cwe-20-improper-input-validation-in--e11883af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0933%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Cloudflare%20Wrangler&amp;severity=high&amp;id=69700a534623b1157c5370e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21990-easily-exploitable-vulnerability-al-286a413f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21990%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21989-easily-exploitable-vulnerability-al-cfc663e3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21989%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20VM%20VirtualBox%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21988-easily-exploitable-vulnerability-al-ec6ca141</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21988%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21987-easily-exploitable-vulnerability-al-eb2c9c41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21987%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21986-easily-exploitable-vulnerability-al-3bd5b1d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21986%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21985-easily-exploitable-vulnerability-al-5ef01372</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21985%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=696ffc4f4623b1157c51a09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21984-difficult-to-exploit-vulnerability--fe7a613a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21984%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4d4623b1157c51a085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21983-difficult-to-exploit-vulnerability--b085c980</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21983%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4d4623b1157c51a082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21982-difficult-to-exploit-vulnerability--90063dc0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21982%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20access%20to%20the%20physical%20communication%20segment%20attached%20to%20the%20hardware%20where%20the%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4d4623b1157c51a07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21981-easily-exploitable-vulnerability-al-20a5cc5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21981%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=696ffc4d4623b1157c51a07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21980-easily-exploitable-vulnerability-al-cc1de427</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21980%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Coding.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20Central%20Coding%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Central%20Coding%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Coding&amp;severity=medium&amp;id=696ffc4d4623b1157c51a079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21979-easily-exploitable-vulnerability-al-f3da128b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21979%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20executes%20to%20compromise%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service&amp;severity=medium&amp;id=696ffc4d4623b1157c51a076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21978-easily-exploitable-vulnerability-al-7b80eadc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21978%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20FLEXCUBE%20Universal%20Banking.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20FLEXCUBE%20Universal%20Banking%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20FLEXCUBE%20Universal%20Banking&amp;severity=medium&amp;id=696ffc4d4623b1157c51a073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21977-difficult-to-exploit-vulnerability--22d07212</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21977%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Zero%20Data%20Loss%20Recovery%20Appliance%20Software.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Zero%20Data%20Loss%20Recovery%20Appliance%20Software%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Zero%20Data%20Loss%20Recovery%20Appliance%20Software&amp;severity=low&amp;id=696ffc4d4623b1157c51a070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21976-easily-exploitable-vulnerability-al-8b9d1d4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21976%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Business%20Intelligence%20Enterprise%20Edition&amp;severity=high&amp;id=696ffc4d4623b1157c51a06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21975-easily-exploitable-vulnerability-al-ed4d81df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21975%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20Authenticated%20User%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Java%20VM.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=696ffc4d4623b1157c51a06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21974-easily-exploitable-vulnerability-al-3981a982</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21974%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Designer.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Designer&amp;severity=medium&amp;id=696ffc4c4623b1157c519ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21973-easily-exploitable-vulnerability-al-c1c5c53b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21973%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20FLEXCUBE%20Investor%20Servicing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20FLEXCUBE%20Investor%20Servicing%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20FLEXCUBE%20Investor%20Servicing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20FLEXCUBE%20Investor%20Servicing&amp;severity=high&amp;id=696ffc4c4623b1157c519ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21972-easily-exploitable-vulnerability-al-cae52fe2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21972%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Configurator.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Configurator%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Configurator&amp;severity=medium&amp;id=696ffc4c4623b1157c519fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21971-easily-exploitable-vulnerability-al-b2d0c287</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21971%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20SCM%20Purchasing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20SCM%20Purchasing%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20SCM%20Purchasing%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20SCM%20Purchasing&amp;severity=medium&amp;id=696ffc4c4623b1157c519feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21970-easily-exploitable-vulnerability-al-786618a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21970%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Designer.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Designer&amp;severity=medium&amp;id=696ffc4c4623b1157c519fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21969-easily-exploitable-vulnerability-al-f836f94b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21969%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20in%20Oracle%20Corporation%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process&amp;severity=critical&amp;id=696ffc4c4623b1157c519fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21968-easily-exploitable-vulnerability-al-34ab7cdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21968%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4c4623b1157c519fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21967-easily-exploitable-vulnerability-al-d0405106</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21967%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hospitality%20OPERA%205.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Hospitality%20OPERA%205%20accessible%20data%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Hospitality%20OPERA%205%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Hospitality%20OPERA%205.%20in%20Oracle%20Corporation%20Oracle%20Hospitality%20OPERA%205&amp;severity=high&amp;id=696ffc4c4623b1157c519fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21966-easily-exploitable-vulnerability-al-3baff4ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21966%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hospitality%20OPERA%205%20Property%20Services.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Hospitality%20OPERA%205%20Property%20Services%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Hospitality%20OPERA%205%20Property%20Services%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Hospitality%20OPERA%205%20Property%20Services%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Hospitality%20OPERA%205%20Property%20Services&amp;severity=medium&amp;id=696ffc4c4623b1157c519fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21965-easily-exploitable-vulnerability-al-5dc370b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21965%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=696ffc4c4623b1157c519fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21964-easily-exploitable-vulnerability-al-ab1f98c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21964%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4b4623b1157c519fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21963-easily-exploitable-vulnerability-al-23f0f479</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21963%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=696ffc4b4623b1157c519fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21962-easily-exploitable-vulnerability-al-87e0e7b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21962%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in&amp;severity=critical&amp;id=696ffc4b4623b1157c519fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21961-easily-exploitable-vulnerability-al-c4d94fc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21961%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources&amp;severity=medium&amp;id=696ffc4b4623b1157c519fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21960-easily-exploitable-vulnerability-al-8e5d871b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21960%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20DBA.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Applications%20DBA%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Applications%20DBA%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20DBA&amp;severity=medium&amp;id=696ffc4b4623b1157c519fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21959-easily-exploitable-vulnerability-al-c3eda9fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21959%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Workflow.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Workflow%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Workflow&amp;severity=medium&amp;id=696ffc4b4623b1157c519fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21957-difficult-to-exploit-vulnerability--b0ec6a45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21957%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4b4623b1157c519fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21956-easily-exploitable-vulnerability-al-d46e3980</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21956%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4b4623b1157c519fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21955-easily-exploitable-vulnerability-al-6d6f1151</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21955%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4b4623b1157c519fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21952-easily-exploitable-vulnerability-al-b8d00778</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21952%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4b4623b1157c519fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21951-easily-exploitable-vulnerability-al-9c73b57a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21951%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=696ffc4a4623b1157c519f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21950-easily-exploitable-vulnerability-al-998ddc55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21950%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4a4623b1157c519f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21949-easily-exploitable-vulnerability-al-b4e8290c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21949%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4a4623b1157c519f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21948-easily-exploitable-vulnerability-al-17cd5ac9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21948%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4a4623b1157c519f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21947-difficult-to-exploit-vulnerability--51063da3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21947%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=696ffc4a4623b1157c519f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21946-easily-exploitable-vulnerability-al-f91d44d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21946%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JD%20Edwards%20EnterpriseOne%20Tools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=696ffc4a4623b1157c519f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21945-easily-exploitable-vulnerability-al-3aefbf11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21945%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=696ffc4a4623b1157c519f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21944-easily-exploitable-vulnerability-al-427f26da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21944%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process&amp;severity=medium&amp;id=696ffc4a4623b1157c519f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21943-easily-exploitable-vulnerability-al-e2645c5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21943%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Scripting.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Scripting%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Scripting%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Scripting%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Scripting&amp;severity=medium&amp;id=696ffc4a4623b1157c519f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21942-easily-exploitable-vulnerability-al-522a29a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21942%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc4a4623b1157c519f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21941-easily-exploitable-vulnerability-al-3c3d825b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21941%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc494623b1157c519f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21940-easily-exploitable-vulnerability-al-7135a85d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21940%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20PLM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Agile%20PLM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Agile%20PLM&amp;severity=high&amp;id=696ffc494623b1157c519f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21939-difficult-to-exploit-vulnerability--10be1e95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21939%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20SQLcl%20executes%20to%20compromise%20SQLcl.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20SQLcl.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=696ffc494623b1157c519f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21938-easily-exploitable-vulnerability-al-d62e44cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21938%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=696ffc494623b1157c519f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21937-easily-exploitable-vulnerability-al-4ea13844</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21937%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc494623b1157c519f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21936-easily-exploitable-vulnerability-al-db4bee02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21936%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=696ffc494623b1157c519f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21935-easily-exploitable-vulnerability-al-b9eae403</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21935%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Solaris%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Solaris%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc494623b1157c519f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21934-easily-exploitable-vulnerability-al-c9ca5c3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21934%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=696ffc494623b1157c519f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21933-easily-exploitable-vulnerability-al-09eb3f5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21933%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=696ffc494623b1157c519f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21932-easily-exploitable-vulnerability-al-84389f17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21932%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=696ffc494623b1157c519f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21931-easily-exploitable-vulnerability-al-5ed98fbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21931%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20APEX%20Sample%20Applications.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20APEX%20Sample%20Applications%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20APEX%20Sample%20Applications%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20APEX%20Sample%20Applications%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20APEX%20Sample%20Applications&amp;severity=medium&amp;id=696ffc484623b1157c519f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21930-easily-exploitable-vulnerability-al-5f87bd1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21930%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20ZFS%20Storage%20Appliance%20Kit%20executes%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=low&amp;id=696ffc484623b1157c519f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21929-difficult-to-exploit-vulnerability--e538a1ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21929%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc484623b1157c519f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21928-easily-exploitable-vulnerability-al-e5fdbde0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21928%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TCP%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Solaris%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc484623b1157c519f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21927-easily-exploitable-vulnerability-al-186325f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21927%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Solaris%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Solaris%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc484623b1157c519f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21926-easily-exploitable-vulnerability-al-99676c7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21926%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TLS%20to%20compromise%20Siebel%20CRM%20Deployment.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Siebel%20CRM%20Deployment.%20in%20Oracle%20Corporation%20Siebel%20CRM%20Deployment&amp;severity=high&amp;id=696ffc484623b1157c519f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21925-difficult-to-exploit-vulnerability--7c5f6502</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21925%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=696ffc484623b1157c519f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21924-easily-exploitable-vulnerability-al-085bfeae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21924%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Utilities%20Application%20Framework.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Utilities%20Application%20Framework%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Utilities%20Application%20Framework%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Utilities%20Application%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Utilities%20Application%20Framework&amp;severity=medium&amp;id=696ffc484623b1157c519f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21923-easily-exploitable-vulnerability-al-7a0c01f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21923%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Designer.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Designer&amp;severity=medium&amp;id=696ffc484623b1157c519f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21922-easily-exploitable-vulnerability-al-778abe53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21922%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20executes%20to%20compromise%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service&amp;severity=medium&amp;id=696ffc484623b1157c519f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0672-cwe-93-in-python-software-foundation-cb778f2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0672%3A%20CWE-93%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ffc4f4623b1157c51a0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15367-cwe-77-improper-neutralization-of-s-e14cec26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15367%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff8c24623b1157c513cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15366-cwe-77-improper-neutralization-of-s-c3bc02df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15366%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff8c24623b1157c513cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58744-cwe-1392-use-of-default-credentials-e4ae3bf3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58744%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Milner%20ImageDirector%20Capture&amp;severity=medium&amp;id=696ff8c24623b1157c513d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58743-cwe-327-use-of-a-broken-or-risky-cr-287c36b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58743%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58742-cwe-522-insufficiently-protected-cr-a9461b24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58742%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58741-cwe-522-insufficiently-protected-cr-90b50c7b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58741%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58740-cwe-321-use-of-hard-coded-cryptogra-5bd55c1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58740%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15282-cwe-93-in-python-software-foundatio-2d93208e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15282%3A%20CWE-93%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff8c24623b1157c513cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0865-cwe-74-improper-neutralization-of-sp-9ee85127</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0865%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff53d4623b1157c50c98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11468-vulnerability-in-python-software-fo-fdd11c16</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11468%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff1b84623b1157c50674b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21642-vulnerability-in-revive-revive-adse-240357fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21642%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=696fee344623b1157c4ffe99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21664-vulnerability-in-revive-revive-adse-087d7668</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21664%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=696fee344623b1157c4ffe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21663-vulnerability-in-revive-revive-adse-33a353f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21663%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=696fee344623b1157c4ffe9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21640-vulnerability-in-revive-revive-adse-c0751329</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21640%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=696fee344623b1157c4ffe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21641-vulnerability-in-revive-revive-adse-21c80503</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21641%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=696fee344623b1157c4ffe96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21636-vulnerability-in-nodejs-node-744e621d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21636%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59466-vulnerability-in-nodejs-node-871b635d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59466%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55132-vulnerability-in-nodejs-node-10f44743</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55132%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=696feab04623b1157c4e3b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59464-vulnerability-in-nodejs-node-b2db4c87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59464%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55131-vulnerability-in-nodejs-node-816d9968</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55131%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=696feab04623b1157c4e3b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55130-vulnerability-in-nodejs-node-92974a3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55130%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=696feab04623b1157c4e3b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21637-vulnerability-in-nodejs-node-015df57b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21637%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59465-vulnerability-in-nodejs-node-7a6d1e9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59465%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=696feab04623b1157c4e3b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0622-cwe-798-use-of-hard-coded-credential-98c12f6e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0622%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20NewPlane%20open5GS&amp;severity=medium&amp;id=696fe03c4623b1157c4c7680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eu-plans-phase-out-of-high-risk-telecom-suppliers--7a3bbb82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EU%20Plans%20Phase%20Out%20of%20High%20Risk%20Telecom%20Suppliers%2C%20in%20Proposals%20Seen%20as%20Targeting%20China&amp;severity=high&amp;id=696fdff14623b1157c4c655a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-hackers-target-developers-via-m-823eb1ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Linked%20Hackers%20Target%20Developers%20via%20Malicious%20VS%20Code%20Projects&amp;severity=medium&amp;id=697042a44623b1157c81b943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33231-cwe-427-uncontrolled-search-path-el-831f1a30</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33231%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=696fc4054623b1157c437288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33230-cwe-78-improper-neutralization-of-s-4a0c844f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33230%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=high&amp;id=696fc4054623b1157c437283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-multi-stage-windows-malware-campaign-f45533e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20Multi-Stage%20Windows%20Malware%20Campaign&amp;severity=medium&amp;id=696fc78c4623b1157c44328d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33229-cwe-427-uncontrolled-search-path-el-abeb2425</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33229%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=high&amp;id=696fc0884623b1157c42b9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33228-cwe-78-improper-neutralization-of-s-bca140b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33228%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=high&amp;id=696fc0884623b1157c42b9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33233-cwe-94-improper-control-of-generati-8007c869</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33233%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Merlin%20Transformers4Rec&amp;severity=high&amp;id=696fc0884623b1157c42b9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36419-cwe-550-server-generated-error-mess-68da459e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36419%3A%20CWE-550%20Server-generated%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20ApplinX&amp;severity=medium&amp;id=696fa7e44623b1157c3d36b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36418-cwe-347-improper-verification-of-cr-4bfcf813</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36418%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20IBM%20ApplinX&amp;severity=high&amp;id=696fa7e44623b1157c3d36b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36411-cwe-352-cross-site-request-forgery--09ab87fc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36411%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20ApplinX&amp;severity=low&amp;id=696fa4614623b1157c3ca9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36410-cwe-602-client-side-enforcement-of--3daf47d0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36410%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20ApplinX&amp;severity=low&amp;id=696fa4614623b1157c3ca99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36409-cwe-79-improper-neutralization-of-i-1104e2ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36409%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20ApplinX&amp;severity=medium&amp;id=696fa4614623b1157c3ca99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36408-cwe-79-improper-neutralization-of-i-47614318</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36408%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20ApplinX&amp;severity=medium&amp;id=696fa4614623b1157c3ca998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36397-cwe-80-improper-neutralization-of-s-1ea05f87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36397%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Application%20Gateway&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36396-cwe-79-improper-neutralization-of-i-a1375ab9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Application%20Gateway&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36115-cwe-384-session-fixation-in-ibm-ste-6e3effef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36115%3A%20CWE-384%20Session%20Fixation%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36113-cwe-79-improper-neutralization-of-i-b37e645e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36113%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b500c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36066-cwe-79-improper-neutralization-of-i-61acc7dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36066%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b5008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36065-cwe-613-insufficient-session-expira-84eab96e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36065%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b5004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36063-cwe-613-insufficient-session-expira-8b06691f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36063%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b5000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36058-cwe-538-insertion-of-sensitive-info-621430b0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36058%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=medium&amp;id=696f9d594623b1157c3b4ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36059-cwe-250-execution-with-unnecessary--cb28676c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36059%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=medium&amp;id=696f9d594623b1157c3b4ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33015-cwe-434-unrestricted-upload-of-file-ab0f1575</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33015%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20Concert&amp;severity=high&amp;id=696f9d594623b1157c3b4ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1722-cwe-244-improper-clearing-of-heap-me-64a1026e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1722%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=696fab6a4623b1157c3dc078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1719-cwe-244-improper-clearing-of-heap-me-59acc0a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1719%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=696fab6a4623b1157c3dc075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14115-cwe-798-use-of-hard-coded-credentia-54544291</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14115%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Sterling%20Connect%3ADirect%20for%20UNIX%20Container&amp;severity=high&amp;id=696fa7e44623b1157c3d36ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13925-cwe-532-insertion-of-sensitive-info-671f1d95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13925%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=696fa4614623b1157c3ca9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12985-cwe-732-incorrect-permission-assign-33cf65e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12985%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20IBM%20Licensing%20Operator&amp;severity=high&amp;id=696f99d64623b1157c3aa443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54817-cwe-79-improper-neutralization-of-i-ad569384</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54817%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53516-cwe-79-improper-neutralization-of-i-c83bec1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53516%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54495-cwe-79-improper-neutralization-of-i-f08a9420</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54495%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54157-cwe-79-improper-neutralization-of-i-a10ac56a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54157%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54778-cwe-79-improper-neutralization-of-i-9b9b1f5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54778%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46270-cwe-79-improper-neutralization-of-i-5dc7a4f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46270%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55071-cwe-79-improper-neutralization-of-i-3b53f97d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55071%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54852-cwe-79-improper-neutralization-of-i-efc4e67a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54852%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54814-cwe-79-improper-neutralization-of-i-15e94dee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54814%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54861-cwe-79-improper-neutralization-of-i-c9e24a0a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54861%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57881-cwe-79-improper-neutralization-of-i-ce23c5b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57881%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58080-cwe-79-improper-neutralization-of-i-85f3cea8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58080%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53854-cwe-79-improper-neutralization-of-i-857489eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53854%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57787-cwe-79-improper-neutralization-of-i-43b16ee1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57787%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53707-cwe-79-improper-neutralization-of-i-e5a2da59</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53707%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54853-cwe-79-improper-neutralization-of-i-38cf8451</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54853%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57786-cwe-79-improper-neutralization-of-i-d2916df0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57786%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44000-cwe-79-improper-neutralization-of-i-15b3c7f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44000%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58095-cwe-79-improper-neutralization-of-i-515298bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58095%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58094-cwe-79-improper-neutralization-of-i-57115763</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58094%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58093-cwe-79-improper-neutralization-of-i-b90c1369</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58093%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58092-cwe-79-improper-neutralization-of-i-36aa0151</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58092%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58091-cwe-79-improper-neutralization-of-i-bf91f2ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58091%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58090-cwe-79-improper-neutralization-of-i-c335cb63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58090%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58089-cwe-79-improper-neutralization-of-i-a2507d1a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58089%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58088-cwe-79-improper-neutralization-of-i-ea4cde92</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58088%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58087-cwe-79-improper-neutralization-of-i-3912417d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58087%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36556-cwe-79-improper-neutralization-of-i-b810fcbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36556%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53912-cwe-73-external-control-of-file-nam-360f8c62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53912%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=critical&amp;id=696f99d64623b1157c3aa458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0554-cwe-862-missing-authorization-in-wpd-e2a85e55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0554%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20NotificationX%20%E2%80%93%20FOMO%2C%20Live%20Sales%20Notification%2C%20WooCommerce%20Sales%20Popup%2C%20GDPR%2C%20Social%20Proof%2C%20Announcement%20Banner%20%26%20Floating%20Notification%20Bar&amp;severity=medium&amp;id=696f99da4623b1157c3aa4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15380-cwe-79-improper-neutralization-of-i-eece158f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15380%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20NotificationX%20%E2%80%93%20FOMO%2C%20Live%20Sales%20Notification%2C%20WooCommerce%20Sales%20Popup%2C%20GDPR%2C%20Social%20Proof%2C%20Announcement%20Banner%20%26%20Floating%20Notification%20Bar&amp;severity=high&amp;id=696f99da4623b1157c3aa4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0608-cwe-79-improper-neutralization-of-in-caf468e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Head%20Meta%20Data&amp;severity=medium&amp;id=696f99da4623b1157c3aa4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15347-cwe-862-missing-authorization-in-ge-101457d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15347%3A%20CWE-862%20Missing%20Authorization%20in%20getwpfunnels%20Creator%20LMS%20%E2%80%93%20Online%20Courses%20and%20eLearning%20Plugin&amp;severity=high&amp;id=696f99da4623b1157c3aa4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15043-cwe-862-missing-authorization-in-st-39a4c2fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15043%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=696f99da4623b1157c3aa4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0690-cwe-79-improper-neutralization-of-in-87ab9f23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flatboy%20FlatPM%20%E2%80%93%20Ad%20Manager%2C%20AdSense%20and%20Custom%20Code&amp;severity=medium&amp;id=696fd2e84623b1157c48f85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0548-cwe-862-missing-authorization-in-the-f215f582</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0548%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=696fd2e84623b1157c48f856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0726-cwe-502-deserialization-of-untrusted-1ef0db0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0726%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20posimyththemes%20Nexter%20Extension%20%E2%80%93%20Security%2C%20Performance%2C%20Code%20Snippets%20%26%20Site%20Toolkit&amp;severity=high&amp;id=696fd2e84623b1157c48f867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chainlit-vulnerabilities-may-leak-sensitive-inform-766fd2bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chainlit%20Vulnerabilities%20May%20Leak%20Sensitive%20Information&amp;severity=medium&amp;id=696f8f154623b1157c388ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9283-cwe-400-uncontrolled-resource-consum-6bc05e45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9283%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c38995d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9282-cwe-400-uncontrolled-resource-consum-84b369f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9282%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c38995a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9281-cwe-400-uncontrolled-resource-consum-227ba6ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9281%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c389957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22844-cwe-78-improper-neutralization-of-s-f111d1cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22844%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Node&amp;severity=critical&amp;id=696f8f574623b1157c389960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9280-cwe-400-uncontrolled-resource-consum-d9de11aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9280%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c389954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14027-cwe-401-missing-release-of-memory-a-248db821</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14027%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Rockwell%20Automation%20ControlLogix%C2%AE%20Redundancy%20Enhanced%20Module&amp;severity=high&amp;id=696f8f574623b1157c38994b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9279-cwe-400-uncontrolled-resource-consum-f70cf7ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9279%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c389951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9278-cwe-400-uncontrolled-resource-consum-796b063b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9278%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c38994e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-flaws-in-anthropic-mcp-git-server-enable-fil-7e6f95b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20Flaws%20in%20Anthropic%20MCP%20Git%20Server%20Enable%20File%20Access%20and%20Code%20Execution&amp;severity=medium&amp;id=697042a44623b1157c81b946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9466-cwe-400-uncontrolled-resource-consum-6df0d75b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9466%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8bc44623b1157c380871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11743-cwe-1284-improper-validation-of-spe-9dedfa1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11743%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Rockwell%20Automation%20CompactLogix%C2%AE%205370&amp;severity=high&amp;id=696f8bc44623b1157c380868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9465-cwe-400-uncontrolled-resource-consum-44efe858</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9465%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8bc44623b1157c38086e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9464-cwe-400-uncontrolled-resource-consum-0917fda7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9464%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8bc44623b1157c38086b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-linkedin-messages-to-spread-rat-malwar-306504ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20LinkedIn%20Messages%20to%20Spread%20RAT%20Malware%20Through%20DLL%20Sideloading&amp;severity=medium&amp;id=697042a44623b1157c81b949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15281-cwe-908-use-of-uninitialized-resour-e8ed20c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15281%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=696f88404623b1157c375430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14377-cwe-312-cleartext-storage-of-sensit-e65ecda4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14377%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Rockwell%20Automation%20Verve%20Asset%20Manager&amp;severity=high&amp;id=696f88404623b1157c37542d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14376-cwe-922-insecure-storage-of-sensiti-d3acf0e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14376%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Rockwell%20Automation%20Verve%20Asset%20Manager&amp;severity=high&amp;id=696f88404623b1157c37542a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1180-server-side-request-forgery-ssrf-in--ef903439</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1180%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=696f7db44623b1157c343c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41081-79-in-zuinq-studio-ismygym-b2bdda51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41081%3A%2079%20in%20Zuinq%20Studio%20IsMyGym&amp;severity=medium&amp;id=696f733b4623b1157c323b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-grade-pdfsider-malware-used-by-ransomware-grou-0bab322b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT-Grade%20PDFSider%20Malware%20Used%20by%20Ransomware%20Groups&amp;severity=critical&amp;id=696f72f54623b1157c323102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1183-cwe-79-improper-neutralization-of-in-40b6fe9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Botble%20TransP&amp;severity=medium&amp;id=696f733b4623b1157c323b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-risk-of-orphan-accounts-ee7b1657</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20Risk%20of%20Orphan%20Accounts&amp;severity=medium&amp;id=697042a44623b1157c81b94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40679-cwe-79-improper-neutralization-of-i-07d15956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40679%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bdtask%20Isshue&amp;severity=medium&amp;id=696f6fa34623b1157c31ae77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14369-cwe-190-integer-overflow-or-wraparo-204ea851</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14369%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20mackron%20dr_flac&amp;severity=medium&amp;id=696f6fa34623b1157c31ae7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evelyn-stealer-malware-abuses-vs-code-extensions-t-ff049e88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evelyn%20Stealer%20Malware%20Abuses%20VS%20Code%20Extensions%20to%20Steal%20Developer%20Credentials%20and%20Crypto&amp;severity=medium&amp;id=697042a44623b1157c81b94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40644-cwe-79-improper-neutralization-of-i-75d28e09</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Riftzilla%20QRGen&amp;severity=medium&amp;id=696f6c204623b1157c2f9b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-fixes-acme-validation-bug-allowing-waf--2d0bd150</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Fixes%20ACME%20Validation%20Bug%20Allowing%20WAF%20Bypass%20to%20Origin%20Servers&amp;severity=low&amp;id=697042a44623b1157c81b952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weaponized-invite-enabled-calendar-data-theft-via--7f6db054</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weaponized%20Invite%20Enabled%20Calendar%20Data%20Theft%20via%20Google%20Gemini&amp;severity=low&amp;id=696f61614623b1157c2d8570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-secrets-in-javascript-bundles-are-still-being--933f5cc0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Secrets%20in%20JavaScript%20Bundles%20are%20Still%20Being%20Missed&amp;severity=low&amp;id=697042a44623b1157c81b955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/add-punycode-to-your-threat-hunting-routine-tue-ja-4049a96c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Add%20Punycode%20to%20your%20Threat%20Hunting%20Routine%2C%20(Tue%2C%20Jan%2020th)&amp;severity=medium&amp;id=696f53534623b1157c2a1bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-evidence-that-the-era-of-advanced-ai-gene-2663b4cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%3A%20Evidence%20That%20the%20Era%20of%20Advanced%20AI-Generated%20Malware%20Has%20Begun&amp;severity=high&amp;id=696f4c7d4623b1157c2840d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14533-cwe-269-improper-privilege-manageme-27146680</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14533%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20hwk-fr%20Advanced%20Custom%20Fields%3A%20Extended&amp;severity=critical&amp;id=696f4c7c4623b1157c28405e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41084-cwe-79-improper-neutralization-of-i-78137fbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SESAME%20LABS%20S.L%20Sesame&amp;severity=medium&amp;id=696f48f94623b1157c2703fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-nomad-leopard-targeted-spear-phishing-ca-67a5880d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Nomad%20Leopard%3A%20Targeted%20Spear-Phishing%20Campaign%20Against%20Government%20Entities%20in%20Afghanistan&amp;severity=medium&amp;id=696f45734623b1157c251817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-covert-access-weaponized-lnk-based-spear-9fbfc26b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Covert%20Access%3A%20Weaponized%20LNK-Based%20Spear-Phishing%20Targeting%20Argentina&apos;s%20Judicial%20Sector%20to%20Deploy%20a%20Covert%20RAT&amp;severity=medium&amp;id=696f41ef4623b1157c23df6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-extension-to-infection-an-in-depth-analysis-o-9add08a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Extension%20to%20Infection%3A%20An%20In-Depth%20Analysis%20of%20the%20Evelyn%20Stealer%20Campaign%20Targeting%20Software%20Developers&amp;severity=medium&amp;id=696f41ef4623b1157c23df7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41768-cwe-79-improper-neutralization-of-i-bde1a0cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41768%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Beckhoff%20Automation%20TwinCAT.HMI.Server&amp;severity=medium&amp;id=696f3ae84623b1157c221ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tudou-guarantee-marketplace-halts-telegram-transac-88a0abce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tudou%20Guarantee%20Marketplace%20Halts%20Telegram%20Transactions%20After%20Processing%20Over%20%2412%20Billion&amp;severity=low&amp;id=697042a44623b1157c81b958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0895-cwe-502-deserialization-of-untrusted-eeaff6f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0895%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20Extension%20%22Mailqueue%22&amp;severity=medium&amp;id=696f305c4623b1157c1fe251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66523-cwe-79-improper-neutralization-of-i-8abb25b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66523%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20na1.foxitesign.foxit.com&amp;severity=medium&amp;id=696f29544623b1157c1d8b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1223-cwe-522-insufficiently-protected-cre-7fa74124</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1223%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20BROWAN%20COMMUNICATIONS%20PrismX%20MX100%20AP%20controller&amp;severity=medium&amp;id=696f25d04623b1157c1cfd10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1222-cwe-434-unrestricted-upload-of-file--6c68ee5e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1222%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20BROWAN%20COMMUNICATIONS%20PrismX%20MX100%20AP%20controller&amp;severity=high&amp;id=696f25d04623b1157c1cfd0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1221-cwe-798-use-of-hard-coded-credential-3c079632</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1221%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20BROWAN%20COMMUNICATIONS%20PrismX%20MX100%20AP%20controller&amp;severity=critical&amp;id=696f25d04623b1157c1cfd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12573-cwe-862-missing-authorization-in-bo-7eb7f990</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12573%3A%20CWE-862%20Missing%20Authorization%20in%20Bookingor&amp;severity=medium&amp;id=696f1ec84623b1157c1b768d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1218-xml-external-entity-reference-in-bjs-fce5ca1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1218%3A%20XML%20External%20Entity%20Reference%20in%20Bjskzy%20Zhiyou%20ERP&amp;severity=medium&amp;id=696f143c4623b1157c18a4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1042-cwe-79-improper-neutralization-of-in-e82bc02a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1042%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20norcross%20WP%20Hello%20Bar&amp;severity=medium&amp;id=696f143c4623b1157c18a4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1045-cwe-79-improper-neutralization-of-in-dbd41b33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nhomcaodem%20Viet%20contact&amp;severity=medium&amp;id=696f143c4623b1157c18a4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14348-cwe-285-improper-authorization-in-w-bd6da9de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14348%3A%20CWE-285%20Improper%20Authorization%20in%20wedevs%20weMail%3A%20Email%20Marketing%2C%20Email%20Automation%2C%20Newsletters%2C%20Subscribers%20%26%20Email%20Optins%20for%20WooCommerce&amp;severity=medium&amp;id=696f09b14623b1157c16d2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14977-cwe-284-improper-access-control-in--1cc76d8d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14977%3A%20CWE-284%20Improper%20Access%20Control%20in%20dokaninc%20Dokan%3A%20AI%20Powered%20WooCommerce%20Multivendor%20Marketplace%20Solution%20%E2%80%93%20Build%20Your%20Own%20Amazon%2C%20eBay%2C%20Etsy&amp;severity=high&amp;id=696f09b14623b1157c16d2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0908-use-after-free-in-google-chrome-efb532a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0908%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0907-incorrect-security-ui-in-google-chro-bf30fd0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0907%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=critical&amp;id=696f02a94623b1157c1371db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0906-incorrect-security-ui-in-google-chro-8a76b9b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0906%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=critical&amp;id=696f02a94623b1157c1371d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0905-insufficient-policy-enforcement-in-g-39f68743</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0905%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=critical&amp;id=696f02a94623b1157c1371d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0904-incorrect-security-ui-in-google-chro-69280570</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0904%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=696f02a94623b1157c1371cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0903-insufficient-validation-of-untrusted-54774e87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0903%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=696f02a94623b1157c1371cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0902-inappropriate-implementation-in-goog-859e95f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0902%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0901-inappropriate-implementation-in-goog-61e02cfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0901%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=696f02a94623b1157c1371c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0900-inappropriate-implementation-in-goog-861f579a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0900%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0899-out-of-bounds-memory-access-in-googl-da67c015</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0899%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14798-cwe-862-missing-authorization-in-th-8a10d4f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14798%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=696eff234623b1157c12c80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14351-cwe-862-missing-authorization-in-br-323247da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14351%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20Custom%20Fonts%20%E2%80%93%20Host%20Your%20Fonts%20Locally&amp;severity=medium&amp;id=696eff234623b1157c12c80a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1051-cwe-352-cross-site-request-forgery-c-df41460c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1051%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20satollo%20Newsletter%20%E2%80%93%20Send%20awesome%20emails%20from%20WordPress&amp;severity=medium&amp;id=696edf804623b1157ce5dbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14978-cwe-862-missing-authorization-in-pe-a5b54227</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14978%3A%20CWE-862%20Missing%20Authorization%20in%20peachpay%20PeachPay%20%E2%80%94%20Payments%20%26%20Express%20Checkout%20for%20WooCommerce%20(supports%20Stripe%2C%20PayPal%2C%20Square%2C%20Authorize.net%2C%20NMI)&amp;severity=medium&amp;id=696edf804623b1157ce5dbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1203-improper-authentication-in-crmeb-720d3e24</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1203%3A%20Improper%20Authentication%20in%20CRMEB&amp;severity=medium&amp;id=696ed8794623b1157ce40baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1202-improper-authentication-in-crmeb-3ada72fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1202%3A%20Improper%20Authentication%20in%20CRMEB&amp;severity=medium&amp;id=696ed8794623b1157ce40ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23950-cwe-176-improper-handling-of-unicod-6c92c833</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23950%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20isaacs%20node-tar&amp;severity=high&amp;id=696ed8794623b1157ce40bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23949-cwe-22-improper-limitation-of-a-pat-bf009faf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23949%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jaraco%20jaraco.context&amp;severity=high&amp;id=696ed1704623b1157cdcb267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1197-information-disclosure-in-mineadmin-1dfdacd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1197%3A%20Information%20Disclosure%20in%20MineAdmin&amp;severity=low&amp;id=696ed1704623b1157cdcb25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1196-information-disclosure-in-mineadmin-ab931eb7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1196%3A%20Information%20Disclosure%20in%20MineAdmin&amp;severity=low&amp;id=696ed1704623b1157cdcb257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23947-cwe-77-improper-neutralization-of-s-06e21c4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23947%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=critical&amp;id=696ed1704623b1157cdcb263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1195-insufficient-verification-of-data-au-9dcf731e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1195%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20MineAdmin&amp;severity=low&amp;id=696ed1704623b1157cdcb251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-20-53ae9522</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-20&amp;severity=medium&amp;id=69701bb24623b1157c582d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63648-na-1a1c0bc4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63648%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c50675d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63647-na-96cf075e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63647%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c506758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57156-na-abe6d93a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57156%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c506753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57155-na-40748d36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57155%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c50674f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66902-na-63e61a49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66902%3A%20n%2Fa&amp;severity=high&amp;id=696fe72e4623b1157c4db15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66692-na-84b035d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66692%3A%20n%2Fa&amp;severity=high&amp;id=696fe72e4623b1157c4db157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66803-na-c06459c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66803%3A%20n%2Fa&amp;severity=medium&amp;id=696fce914623b1157c4804ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56005-na-86fb57c6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56005%3A%20n%2Fa&amp;severity=critical&amp;id=696fcb0c4623b1157c474bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67263-na-6f842cbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67263%3A%20n%2Fa&amp;severity=medium&amp;id=696fc4054623b1157c43728d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67261-na-4adc5829</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67261%3A%20n%2Fa&amp;severity=medium&amp;id=696fc0884623b1157c42b9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55423-na-531d2084</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55423%3A%20n%2Fa&amp;severity=critical&amp;id=696fc0884623b1157c42b9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56353-na-32df9eef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56353%3A%20n%2Fa&amp;severity=high&amp;id=696fa4614623b1157c3ca9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67824-na-9538daad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67824%3A%20n%2Fa&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65482-na-7f36f5b8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65482%3A%20n%2Fa&amp;severity=critical&amp;id=696fa0dc4623b1157c3be2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64087-na-310a1f67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64087%3A%20n%2Fa&amp;severity=critical&amp;id=696f9d594623b1157c3b500f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-20-ef3981cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-20&amp;severity=low&amp;id=696f22164623b1157c1c2079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1194-information-disclosure-in-mineadmin-3c889f08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1194%3A%20Information%20Disclosure%20in%20MineAdmin&amp;severity=medium&amp;id=696ebfdb4623b1157cd409c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15466-cwe-862-missing-authorization-in-wp-8b192c5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15466%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=696ebfdb4623b1157cd409c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1193-improper-authorization-in-mineadmin-60bd2aaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1193%3A%20Improper%20Authorization%20in%20MineAdmin&amp;severity=medium&amp;id=696ebc584623b1157cd378e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1192-command-injection-in-tosei-online-st-b3422b82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1192%3A%20Command%20Injection%20in%20Tosei%20Online%20Store%20Management%20System%20%E3%83%8D%E3%83%83%E3%83%88%E5%BA%97%E8%88%97%E7%AE%A1%E7%90%86%E3%82%B7%E3%82%B9%E3%83%86%E3%83%A0&amp;severity=medium&amp;id=696ebc584623b1157cd378dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1179-sql-injection-in-yonyou-ksoa-d554ad49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1179%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696eb5504623b1157cd294c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1178-sql-injection-in-yonyou-ksoa-39f660ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1178%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696fd2e84623b1157c48f86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1177-sql-injection-in-yonyou-ksoa-a7307cbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1177%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696ea73f4623b1157cd0166e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23944-cwe-306-missing-authentication-for--73956320</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23944%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20getarcaneapp%20arcane&amp;severity=high&amp;id=696ea3bc4623b1157ccf9456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23885-cwe-95-improper-neutralization-of-d-81bfe90b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23885%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20AlchemyCMS%20alchemy_cms&amp;severity=medium&amp;id=696ea0384623b1157ccf2ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1176-sql-injection-in-itsourcecode-school-20708627</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1176%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=696fd2e84623b1157c48f87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23886-cwe-20-improper-input-validation-in-52adf544</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23886%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20swift-otel%20swift-w3c-trace-context&amp;severity=medium&amp;id=696fd2e84623b1157c48f889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23880-cwe-20-improper-input-validation-in-adf94f5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23880%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20HackUCF%20OnboardLite&amp;severity=high&amp;id=696e9cb34623b1157cce9c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23877-cwe-25-path-traversal-filedir-in-sw-f0672a80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23877%3A%20CWE-25%3A%20Path%20Traversal%3A%20&apos;%2F..%2Ffiledir&apos;%20in%20swingmx%20swingmusic&amp;severity=medium&amp;id=696e9cb34623b1157cce9c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23848-cwe-807-reliance-on-untrusted-input-454b8437</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23848%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20franklioxygen%20MyTube&amp;severity=medium&amp;id=696e99304623b1157cce4b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1175-information-exposure-through-error-m-6bd679ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1175%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20birkir%20prime&amp;severity=medium&amp;id=696e99304623b1157cce4b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23837-cwe-863-incorrect-authorization-in--0478ceb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23837%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20franklioxygen%20MyTube&amp;severity=critical&amp;id=696e92284623b1157ccc1f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1174-resource-consumption-in-birkir-prime-e9d8867d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1174%3A%20Resource%20Consumption%20in%20birkir%20prime&amp;severity=medium&amp;id=696e92284623b1157ccc1f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23852-cwe-94-improper-control-of-generati-314581fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23852%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=696e92284623b1157ccc1f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23851-cwe-22-improper-limitation-of-a-pat-1945b84c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23851%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=696e8ea44623b1157ccb6c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23850-cwe-22-improper-limitation-of-a-pat-2366c511</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23850%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=696e8ea44623b1157ccb6c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23847-cwe-79-improper-neutralization-of-i-f1f72ba5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23847%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=low&amp;id=696e8b204623b1157cb6228a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23846-cwe-598-use-of-get-request-method-w-99a5a2f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23846%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Quenary%20tugtainer&amp;severity=high&amp;id=696e8b204623b1157cb62286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1173-denial-of-service-in-birkir-prime-e9ed6038</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1173%3A%20Denial%20of%20Service%20in%20birkir%20prime&amp;severity=medium&amp;id=696e8b204623b1157cb6228f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21696-cwe-400-uncontrolled-resource-consu-24dfb9fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21696%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20pterodactyl%20wings&amp;severity=high&amp;id=696e879b4623b1157cadb4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69199-cwe-400-uncontrolled-resource-consu-e5728fc0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69199%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20pterodactyl%20panel&amp;severity=high&amp;id=696e879b4623b1157cadb4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69198-cwe-400-uncontrolled-resource-consu-8f4121c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69198%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20pterodactyl%20panel&amp;severity=medium&amp;id=696e84184623b1157caa879f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1172-denial-of-service-in-birkir-prime-2ae77b03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1172%3A%20Denial%20of%20Service%20in%20birkir%20prime&amp;severity=medium&amp;id=696e84184623b1157caa87a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23845-cwe-918-server-side-request-forgery-78006982</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23845%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=696e84184623b1157caa87a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23843-cwe-639-authorization-bypass-throug-c677224f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23843%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20sibercii6-crypto%20teklifolustur_app&amp;severity=high&amp;id=696e7e76a027839b3dbe5ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23842-cwe-400-uncontrolled-resource-consu-ecacd388</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23842%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20gunthercox%20ChatterBot&amp;severity=high&amp;id=696e7e76a027839b3dbe5eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23841-cwe-20-improper-input-validation-in-0318b06b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23841%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20leepeuker%20movary&amp;severity=critical&amp;id=696e7e76a027839b3dbe5eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23840-cwe-20-improper-input-validation-in-ef9517e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23840%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20leepeuker%20movary&amp;severity=critical&amp;id=696e7e76a027839b3dbe5eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1171-denial-of-service-in-birkir-prime-8b4c44b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1171%3A%20Denial%20of%20Service%20in%20birkir%20prime&amp;severity=medium&amp;id=696e7ae9d302b072d9d1c2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23839-cwe-20-improper-input-validation-in-bf755fab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23839%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20leepeuker%20movary&amp;severity=critical&amp;id=696e7ae9d302b072d9d1c2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23838-cwe-538-insertion-of-sensitive-info-2b71c14a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23838%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20NixOS%20nixpkgs&amp;severity=high&amp;id=696e7765d302b072d9d13d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55252-cwe-521-weak-password-requirements--28509510</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55252%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e7765d302b072d9d13d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55250-cwe-209-generation-of-error-message-008cc225</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55250%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e7765d302b072d9d13d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23878-cwe-201-insertion-of-sensitive-info-339bab7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23878%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20kohler%20hotcrp&amp;severity=medium&amp;id=696e7765d302b072d9d13d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23836-cwe-20-improper-input-validation-in-bf76f28c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23836%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20kohler%20hotcrp&amp;severity=critical&amp;id=696e73e1d302b072d9cff0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52661-cwe-613-insufficient-session-expira-8433459b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52661%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e73e1d302b072d9cff099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1170-information-disclosure-in-birkir-pri-7f5edbe1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1170%3A%20Information%20Disclosure%20in%20birkir%20prime&amp;severity=medium&amp;id=696e73e1d302b072d9cff09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55249-cwe-693-protection-mechanism-failur-94b327ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55249%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e73e1d302b072d9cff09c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52659-cwe-525-use-of-web-browser-cache-co-07d973a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52659%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e73e1d302b072d9cff0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23721-cwe-862-missing-authorization-in-op-00770019</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23721%3A%20CWE-862%3A%20Missing%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=696e73e1d302b072d9cff0ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52660-cwe-644-improper-neutralization-of--de9cf97d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52660%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e705dd302b072d9cf653c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23646-cwe-488-exposure-of-data-element-to-666177d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23646%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20opf%20openproject&amp;severity=medium&amp;id=696e705dd302b072d9cf6544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23625-cwe-79-improper-neutralization-of-i-34bbb971</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23625%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=high&amp;id=696e705dd302b072d9cf653f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55251-cwe-434-unrestricted-upload-of-file-80885ae2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55251%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e6cd9d302b072d9ceaf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1169-cross-site-request-forgery-in-birkir-9f1103c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1169%3A%20Cross-Site%20Request%20Forgery%20in%20birkir%20prime&amp;severity=medium&amp;id=696e6cd9d302b072d9ceaf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-the-year-2038-problem-and-how-can-business-b520128c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20the%20%E2%80%9Cyear%202038%20problem%E2%80%9D%2C%20and%20how%20can%20businesses%20fix%20it%3F&amp;severity=low&amp;id=696e6990d302b072d9ce40a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-gemini-prompt-injection-flaw-exposed-privat-b5ca02b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Gemini%20Prompt%20Injection%20Flaw%20Exposed%20Private%20Calendar%20Data%20via%20Malicious%20Invites&amp;severity=medium&amp;id=696e89194623b1157cb26455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23522-cwe-284-improper-access-control-in--dd10c165</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23522%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20lobehub%20lobe-chat&amp;severity=low&amp;id=696e7feca027839b3dc01196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22850-cwe-89-improper-neutralization-of-s-c794663e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22850%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ibericode%20koko-analytics&amp;severity=high&amp;id=696e7feca027839b3dc01191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22037-cwe-177-improper-handling-of-url-en-91a97286</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22037%3A%20CWE-177%3A%20Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20in%20fastify%20fastify-express&amp;severity=high&amp;id=696e7feca027839b3dc0118d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1162-buffer-overflow-in-utt-hiper-810-de9f9da2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1162%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810&amp;severity=critical&amp;id=696e624dd302b072d9cd3359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1161-cross-site-scripting-in-pbrong-hrms-d5aefaa8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1161%3A%20Cross%20Site%20Scripting%20in%20pbrong%20hrms&amp;severity=medium&amp;id=696e5b45d302b072d9cc4a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11044-cwe-770-allocation-of-resources-wit-eae70be5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11044%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20B%26R%20Industrial%20Automation%20GmbH%20Automation%20Runtime&amp;severity=high&amp;id=696e57c1d302b072d9cbb9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11043-cwe-295-improper-certificate-valida-72f34ad2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11043%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20B%26R%20Industrial%20Automation%20GmbH%20B%26R%20Automation%20Studio&amp;severity=critical&amp;id=696e543dd302b072d9cb38b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1160-sql-injection-in-phpgurukul-director-144b8000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1160%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=696e543dd302b072d9cb38bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22031-cwe-177-improper-handling-of-url-en-7d9b0cd7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22031%3A%20CWE-177%3A%20Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20in%20fastify%20middie&amp;severity=high&amp;id=696e50b9d302b072d9ca67b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68616-cwe-601-url-redirection-to-untruste-f9f184dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68616%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Kozea%20WeasyPrint&amp;severity=high&amp;id=696e50b9d302b072d9ca67ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61684-cwe-20-improper-input-validation-in-2519e307</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61684%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20h2o%20quicly&amp;severity=high&amp;id=696e50b9d302b072d9ca67a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1159-sql-injection-in-itsourcecode-online-d55f312a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1159%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=696e49b1d302b072d9c92239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-vulnerability-exposing-vigi-camera-4ceba506</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20Vulnerability%20Exposing%20VIGI%20Cameras%20to%20Remote%20Hacking&amp;severity=medium&amp;id=696e4276d302b072d9c77a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1158-buffer-overflow-in-totolink-lr350-26d2f0de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1158%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e462dd302b072d9c86a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1007-cwe-863-incorrect-authorization-in-d-a5f97450</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1007%3A%20CWE-863%20Incorrect%20Authorization%20in%20Devolutions%20Server&amp;severity=high&amp;id=696e462dd302b072d9c86a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0610-cwe-89-improper-neutralization-of-sp-c6273948</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0610%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Devolutions%20Server&amp;severity=critical&amp;id=696e462dd302b072d9c86a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1157-buffer-overflow-in-totolink-lr350-cfd05245</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1157%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e3ba2d302b072d9c4ca7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jordanian-admits-in-us-court-to-selling-access-to--c9452baa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jordanian%20Admits%20in%20US%20Court%20to%20Selling%20Access%20to%2050%20Enterprise%20Networks&amp;severity=medium&amp;id=696e37ead302b072d9c38b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solyximmortal-information-stealer-emerges-1b3c5829</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98SolyxImmortal%E2%80%99%20Information%20Stealer%20Emerges&amp;severity=medium&amp;id=696e3468d302b072d9c21d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1156-buffer-overflow-in-totolink-lr350-496be870</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1156%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e34b4d302b072d9c24fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-fortinet-exploits-redline-clipjack-nt-69321376</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Fortinet%20Exploits%2C%20RedLine%20Clipjack%2C%20NTLM%20Crack%2C%20Copilot%20Attack%20%26%20More&amp;severity=medium&amp;id=696e89194623b1157cb26458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1155-buffer-overflow-in-totolink-lr350-67260ea7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1155%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e3115d302b072d9c0bd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1154-basic-cross-site-scripting-in-source-2677ba61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1154%3A%20Basic%20Cross%20Site%20Scripting%20in%20SourceCodester%20E-Learning%20System&amp;severity=medium&amp;id=696e2a0dd302b072d9befabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-reports-reinforce-cyberattacks-role-in-maduro--ed4d0592</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Reports%20Reinforce%20Cyberattack%E2%80%99s%20Role%20in%20Maduro%20Capture%20Blackout&amp;severity=medium&amp;id=696e2656d302b072d9bd897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1153-cross-site-request-forgery-in-techni-00d4cb6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1153%3A%20Cross-Site%20Request%20Forgery%20in%20technical-laohu%20mpay&amp;severity=medium&amp;id=696e2305d302b072d9bca30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1181-cwe-79-improper-neutralization-of-in-8bf35ca0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1181%3A%20CWE-942%20%E2%80%93%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Altium%20Altium%20365&amp;severity=critical&amp;id=696e2305d302b072d9bca312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/devops-saas-downtime-the-high-and-hidden-costs-for-52a7b973</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DevOps%20%26%20SaaS%20Downtime%3A%20The%20High%20(and%20Hidden)%20Costs%20for%20Cloud-First%20Businesses&amp;severity=high&amp;id=696e89194623b1157cb2645b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1152-unrestricted-upload-in-technical-lao-aef95de8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1152%3A%20Unrestricted%20Upload%20in%20technical-laohu%20mpay&amp;severity=medium&amp;id=696e1879d302b072d9b45f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stackwarp-hardware-flaw-breaks-amd-sev-snp-pro-651a803c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20StackWarp%20Hardware%20Flaw%20Breaks%20AMD%20SEV-SNP%20Protections%20on%20Zen%201%E2%80%935%20CPUs&amp;severity=low&amp;id=696e89194623b1157cb2645e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-extension-crashes-browser-in-clic-293e1cf1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20Extension%20Crashes%20Browser%20in%20ClickFix%20Variant%20%E2%80%98CrashFix%E2%80%99&amp;severity=medium&amp;id=696e113ed302b072d9b2509a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1151-cross-site-scripting-in-technical-la-e85a5d23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1151%3A%20Cross%20Site%20Scripting%20in%20technical-laohu%20mpay&amp;severity=medium&amp;id=696e1183d302b072d9b263f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/42000-impacted-by-ingram-micro-ransomware-attack-930a7a38</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=42%2C000%20Impacted%20by%20Ingram%20Micro%20Ransomware%20Attack&amp;severity=medium&amp;id=696e0dbad302b072d9b1633d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1150-command-injection-in-totolink-lr350-efe38033</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1150%3A%20Command%20Injection%20in%20Totolink%20LR350&amp;severity=medium&amp;id=696e0e02d302b072d9b17754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1149-command-injection-in-totolink-lr350-50896775</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1149%3A%20Command%20Injection%20in%20Totolink%20LR350&amp;severity=medium&amp;id=696e06e5d302b072d9adddaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-threat-analysis-c2-compiled-kernel-rootki-0e6f44ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%20threat%20analysis%3A%20C2-compiled%20kernel%20rootkits%20discovered&amp;severity=medium&amp;id=696dffddd302b072d99f3a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1148-cross-site-request-forgery-in-source-4840f573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1148%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=696dfc59d302b072d996adb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crashfix-chrome-extension-delivers-modelorat-using-79f33478</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrashFix%20Chrome%20Extension%20Delivers%20ModeloRAT%20Using%20ClickFix-Style%20Browser%20Crash%20Lures&amp;severity=medium&amp;id=696e89194623b1157cb26461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1147-cross-site-scripting-in-sourcecodest-29609f78</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1147%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=696df8d5d302b072d99485f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/19th-january-threat-intelligence-report-0634a84e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=19th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=696df1cfd302b072d99017d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59355-cwe-532-insertion-of-sensitive-info-7e49b741</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59355%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Linkis&amp;severity=medium&amp;id=696df1ced302b072d99017b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29847-cwe-20-improper-input-validation-in-395bb59d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29847%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Linkis&amp;severity=high&amp;id=696df1ced302b072d99017b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1146-cross-site-scripting-in-sourcecodest-44567d54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1146%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=696df1ced302b072d99017b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1145-heap-based-buffer-overflow-in-quickj-98b95235</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1145%3A%20Heap-based%20Buffer%20Overflow%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=696deac5d302b072d98c4bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1144-use-after-free-in-quickjs-ng-quickjs-0cd87907</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1144%3A%20Use%20After%20Free%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=696de039d302b072d97ad5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1143-buffer-overflow-in-totolink-a3700r-95001bfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1143%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3700R&amp;severity=high&amp;id=696dd96ad302b072d9756c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-bug-in-stealc-malware-panel-let-researche-d2bf6694</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Bug%20in%20StealC%20Malware%20Panel%20Let%20Researchers%20Spy%20on%20Threat%20Actor%20Operations&amp;severity=low&amp;id=696de206d302b072d97cda09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1142-cross-site-request-forgery-in-phpgur-29272b30</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1142%3A%20Cross-Site%20Request%20Forgery%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=696dd229d302b072d97088d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1141-improper-authorization-in-phpgurukul-1cf5a46a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1141%3A%20Improper%20Authorization%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=696dcea5d302b072d96ebb61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1140-buffer-overflow-in-utt-520w-858eb2b8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1140%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696dc419d302b072d967f4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1139-buffer-overflow-in-utt-520w-5b385d26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1139%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696dbd11d302b072d963bfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1138-buffer-overflow-in-utt-520w-a01790f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1138%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696db98dd302b072d96213ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1137-buffer-overflow-in-utt-520w-8eaa2ff8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1137%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696db609d302b072d96094e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1136-cross-site-scripting-in-lcg0124-boot-35d880f8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1136%3A%20Cross%20Site%20Scripting%20in%20lcg0124%20BootDo&amp;severity=medium&amp;id=696daf01d302b072d95cfc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1135-cross-site-scripting-in-itsourcecode-a07b806f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1135%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696da475d302b072d93ab117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0943-cwe-1395-dependency-on-vulnerable-th-92420570</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0943%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20JV%20HarfBuzz%3A%3AShaper&amp;severity=high&amp;id=696da475d302b072d93ab10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1134-cross-site-scripting-in-itsourcecode-ae87bb25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1134%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696da475d302b072d93ab110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1133-sql-injection-in-yonyou-ksoa-321aaef2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1133%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d99ead302b072d92fe5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1132-sql-injection-in-yonyou-ksoa-2d2461f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1132%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d8bd9d302b072d91e235b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1131-sql-injection-in-yonyou-ksoa-a9365c0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1131%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d8bd9d302b072d91e2355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1130-sql-injection-in-yonyou-ksoa-f8606018</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1130%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d7dc9d302b072d910517a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1129-sql-injection-in-yonyou-ksoa-ee78d5c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1129%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d7dc9d302b072d9105174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-19-55db824f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-19&amp;severity=medium&amp;id=696eca324623b1157cd58ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-19-64771da3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-19&amp;severity=low&amp;id=696e91f24623b1157ccc069c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22797-cwe-290-authentication-bypass-by-sp-f03c6f4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22797%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20OpenStack%20keystonemiddleware&amp;severity=critical&amp;id=696e6cd9d302b072d9ceaf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15539-denial-of-service-in-open5gs-5c4023b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15539%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=696d6fb9d302b072d906e96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23829-cwe-93-improper-neutralization-of-c-0f5c2e2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23829%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=696d6fb9d302b072d906e976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15538-use-after-free-in-open-asset-import-af2c01e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15538%3A%20Use%20After%20Free%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=696d68b1d302b072d904d55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23733-cwe-94-improper-control-of-generati-47bf2030</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23733%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20lobehub%20lobe-chat&amp;severity=medium&amp;id=696d68b1d302b072d904d564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23644-cwe-22-improper-limitation-of-a-pat-5343f367</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23644%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=696d652dd302b072d904091e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23525-cwe-79-improper-neutralization-of-i-1a269f0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23525%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%201Panel&amp;severity=medium&amp;id=696d5e25d302b072d901c778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pdfsider-malware-exploitation-of-dll-side-loading--dbdaaaca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PDFSIDER%20Malware%20-%20Exploitation%20of%20DLL%20Side-Loading%20for%20AV%20and%20EDR%20Evasion&amp;severity=medium&amp;id=696df8d5d302b072d994859a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-poseidon-spear-phishing-attacks-abusing--19c91f8b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Poseidon%3A%20Spear-Phishing%20Attacks%20Abusing%20Google%20Ads%20Redirection%20Mechanisms&amp;severity=medium&amp;id=696df8d5d302b072d99485ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1126-unrestricted-upload-in-lwj-flow-b2609e5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1126%3A%20Unrestricted%20Upload%20in%20lwj%20flow&amp;severity=medium&amp;id=696d0d49d302b072d9e29e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1125-command-injection-in-d-link-dir-823x-ee237734</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1125%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=696d0641d302b072d9df180c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0863-cwe-95-improper-neutralization-of-di-cc02e93e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0863%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)&amp;severity=high&amp;id=696cff39d302b072d9dc4a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1124-sql-injection-in-yonyou-ksoa-b958e1da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1124%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cff39d302b072d9dc4a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1123-sql-injection-in-yonyou-ksoa-a99d2889</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1123%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cf831d302b072d9d9a04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1122-sql-injection-in-yonyou-ksoa-495f0987</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1122%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cea21d302b072d9d213f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1121-sql-injection-in-yonyou-ksoa-525a4367</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1121%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696ce69dd302b072d9cf67dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1120-sql-injection-in-yonyou-ksoa-84b74f7f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1120%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cdf95d302b072d9cc70e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1119-sql-injection-in-itsourcecode-societ-b0dcd35f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1119%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696cc6f9d302b072d9c20926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1118-sql-injection-in-itsourcecode-societ-073109c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1118%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696cb8e9d302b072d9bcd5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15537-heap-based-buffer-overflow-in-mapni-c667c348</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15537%3A%20Heap-based%20Buffer%20Overflow%20in%20Mapnik&amp;severity=medium&amp;id=696cb1e1d302b072d9ba4f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15536-heap-based-buffer-overflow-in-byvoi-9e5bdd2d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15536%3A%20Heap-based%20Buffer%20Overflow%20in%20BYVoid%20OpenCC&amp;severity=medium&amp;id=696ca3d1d302b072d9b4cb87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-many-states-are-there-in-the-united-statesx3f--164ad160</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22How%20many%20states%20are%20there%20in%20the%20United%20States%26%23x3f%3B%22%2C%20(Sun%2C%20Jan%2018th)&amp;severity=medium&amp;id=696c90d0d302b072d9add233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15535-null-pointer-dereference-in-nicbark-decd3d67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15535%3A%20NULL%20Pointer%20Dereference%20in%20nicbarker%20clay&amp;severity=medium&amp;id=696c8eb9d302b072d9ab8a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15534-integer-overflow-in-raysan5-raylib-7e50daf2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15534%3A%20Integer%20Overflow%20in%20raysan5%20raylib&amp;severity=medium&amp;id=696c842dd302b072d9a6f20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1112-improper-authorization-in-sanluan-pu-c8c1dd44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1112%3A%20Improper%20Authorization%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=696c7d25d302b072d9a388f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1111-path-traversal-in-sanluan-publiccms-16fc67d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1111%3A%20Path%20Traversal%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=696c7299d302b072d99c1488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15533-heap-based-buffer-overflow-in-raysa-1fbd1e6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15533%3A%20Heap-based%20Buffer%20Overflow%20in%20raysan5%20raylib&amp;severity=medium&amp;id=696c6b91d302b072d998d84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1110-buffer-overflow-in-cijliu-librtsp-1f126549</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1110%3A%20Buffer%20Overflow%20in%20cijliu%20librtsp&amp;severity=medium&amp;id=696c6489d302b072d993616c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1109-buffer-overflow-in-cijliu-librtsp-3f693a13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1109%3A%20Buffer%20Overflow%20in%20cijliu%20librtsp&amp;severity=medium&amp;id=696c52f7d302b072d965579e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1108-buffer-overflow-in-cijliu-librtsp-9b066441</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1108%3A%20Buffer%20Overflow%20in%20cijliu%20librtsp&amp;severity=medium&amp;id=696c87f2d302b072d9a7fc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1107-unrestricted-upload-in-eyoucms-557dee46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1107%3A%20Unrestricted%20Upload%20in%20EyouCMS&amp;severity=medium&amp;id=696c2fcdd302b072d943efc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1106-improper-authorization-in-chamilo-lm-35c659ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1106%3A%20Improper%20Authorization%20in%20Chamilo%20LMS&amp;severity=medium&amp;id=696c2fcdd302b072d943efbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-18-0b9a0e70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-18&amp;severity=low&amp;id=696de197d302b072d97b9b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-18-09ef788a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-18&amp;severity=medium&amp;id=696d768bd302b072d90acd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1105-sql-injection-in-easycms-bc0bb837</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1105%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=696c1e39d302b072d936e490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1066-command-injection-in-kalcaddle-kodbo-02d02574</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1066%3A%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=696bfb11d302b072d92a0937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1064-command-injection-in-bastillion-io-b-aecfd7ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1064%3A%20Command%20Injection%20in%20bastillion-io%20Bastillion&amp;severity=medium&amp;id=696bf409d302b072d9283c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1063-command-injection-in-bastillion-io-b-c2e322de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1063%3A%20Command%20Injection%20in%20bastillion-io%20Bastillion&amp;severity=medium&amp;id=696bed01d302b072d925799f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1062-server-side-request-forgery-in-xiwei-2bc1384d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1062%3A%20Server-Side%20Request%20Forgery%20in%20xiweicheng%20TMS&amp;severity=medium&amp;id=696be5f9d302b072d920ccc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1061-unrestricted-upload-in-xiweicheng-tm-7e56bc3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1061%3A%20Unrestricted%20Upload%20in%20xiweicheng%20TMS&amp;severity=medium&amp;id=696bdef1d302b072d91db3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1059-sql-injection-in-feminer-wms-3269ddf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1059%3A%20SQL%20Injection%20in%20FeMiner%20wms&amp;severity=medium&amp;id=696c87f2d302b072d9a7fc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1050-sql-injection-in-risesoft-y9-digital-670158f9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1050%3A%20SQL%20Injection%20in%20risesoft-y9%20Digital-Infrastructure&amp;severity=medium&amp;id=696bd466d302b072d9195c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1049-cross-site-scripting-in-ligerosmart-8956a4c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1049%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=696bc9d9d302b072d913c1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1048-cross-site-scripting-in-ligerosmart-a407efdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1048%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=696bc2d1d302b072d90f8557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15532-resource-consumption-in-open5gs-8f2df7c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15532%3A%20Resource%20Consumption%20in%20Open5GS&amp;severity=medium&amp;id=696bbf4dd302b072d90ebe7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15531-reachable-assertion-in-open5gs-d158390f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15531%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=696bb4c1d302b072d90bbe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-crashfix-a-new-toy-b036240c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20CrashFix%3A%20KongTuke&apos;s%20New%20Toy&amp;severity=medium&amp;id=696df8d5d302b072d9948582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15530-reachable-assertion-in-open5gs-ec8c11fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15530%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=696b6e71d302b072d9eca41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tennessee-man-pleads-guilty-to-repeatedly-hacking--a1a98251</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tennessee%20Man%20Pleads%20Guilty%20to%20Repeatedly%20Hacking%20Supreme%20Court%E2%80%99s%20Filing%20System&amp;severity=medium&amp;id=696c909dd302b072d9ada35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-463-released-sat-jan-17th-f896022a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.3%20Released%2C%20(Sat%2C%20Jan%2017th)&amp;severity=medium&amp;id=696c90d0d302b072d9add236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8615-cwe-79-improper-neutralization-of-in-f1c8b8d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cubewp1211%20CubeWP%20Framework&amp;severity=medium&amp;id=696b47c6d302b072d9dc16f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14078-cwe-862-missing-authorization-in-sh-b41caf50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14078%3A%20CWE-862%20Missing%20Authorization%20in%20shoheitanaka%20PAYGENT%20for%20WooCommerce&amp;severity=medium&amp;id=696b47c6d302b072d9dc16e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0725-cwe-79-improper-neutralization-of-in-9f16db15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberlord92%20Integrate%20Dynamics%20365%20CRM&amp;severity=medium&amp;id=696b47c6d302b072d9dc16f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10484-cwe-288-authentication-bypass-using-34c05e32</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10484%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20FmeAddons%20Registration%20%26%20Login%20with%20Mobile%20Phone%20Number%20for%20WooCommerce&amp;severity=critical&amp;id=696b47c6d302b072d9dc16e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14478-cwe-611-improper-restriction-of-xml-012de3a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14478%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20kraftplugins%20Demo%20Importer%20Plus&amp;severity=high&amp;id=696b3d39d302b072d9bbd705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12129-cwe-200-exposure-of-sensitive-infor-882077dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12129%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cubewp1211%20CubeWP%20Framework&amp;severity=medium&amp;id=696b3d39d302b072d9bbd701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0808-cwe-602-client-side-enforcement-of-s-c67a8d95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0808%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20bdthemes%20Spin%20Wheel%20%E2%80%93%20Interactive%20spinning%20wheel%20that%20offers%20coupons&amp;severity=medium&amp;id=696b3178b22c7ad86896536b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0691-cwe-79-improper-neutralization-of-in-63f3efac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20E-Mail%20Blacklist%20%E2%80%93%20Simple%20email%20filtering%20for%20safer%20registration&amp;severity=medium&amp;id=696b3178b22c7ad868965365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12984-cwe-89-improper-neutralization-of-s-f06a6d8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12984%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=medium&amp;id=696b3178b22c7ad868965360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0833-cwe-79-improper-neutralization-of-in-ca53308c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0833%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Team%20Section%20Block%20%E2%80%93%20Showcase%20Team%20Members%20with%20Layout%20Options&amp;severity=medium&amp;id=696b3178b22c7ad868965371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12825-cwe-862-missing-authorization-in-ze-47e9feff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12825%3A%20CWE-862%20Missing%20Authorization%20in%20zealopensource%20User%20Registration%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=696b1558b22c7ad86881e276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12168-cwe-862-missing-authorization-in-me-2e0a6334</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12168%3A%20CWE-862%20Missing%20Authorization%20in%20memsource%20Phrase%20TMS%20Integration%20for%20WordPress&amp;severity=medium&amp;id=696b1558b22c7ad86881e272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14029-cwe-862-missing-authorization-in-ja-1e342df2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14029%3A%20CWE-862%20Missing%20Authorization%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=696b1558b22c7ad86881e27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14463-cwe-862-missing-authorization-in-na-fd9f46bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14463%3A%20CWE-862%20Missing%20Authorization%20in%20naa986%20Payment%20Button%20for%20PayPal&amp;severity=medium&amp;id=696b0749b22c7ad868788fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13725-cwe-22-improper-limitation-of-a-pat-2d78fca4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13725%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thimpress%20Thim%20Blocks&amp;severity=medium&amp;id=696b0749b22c7ad868788fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0682-cwe-918-server-side-request-forgery--930ba4bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0682%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20andy_moyle%20Church%20Admin&amp;severity=low&amp;id=696b0749b22c7ad868788fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0820-cwe-862-missing-authorization-in-swe-31cb7adc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0820%3A%20CWE-862%20Missing%20Authorization%20in%20sweetdaisy86%20RepairBuddy%20%E2%80%93%20Repair%20Shop%20CRM%20%26%20Booking%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=696b0749b22c7ad868788fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12002-cwe-22-improper-limitation-of-a-pat-bb6f54dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12002%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Awesome%20Motive%20YouTube%20Feed%20Pro&amp;severity=medium&amp;id=696af5b4b22c7ad86850279d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12718-cwe-20-improper-input-validation-in-38ef34ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12718%3A%20CWE-20%20Improper%20Input%20Validation%20in%20saadiqbal%20Quick%20Contact%20Form&amp;severity=medium&amp;id=696af5b4b22c7ad8685027a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14632-cwe-434-unrestricted-upload-of-file-0ff81a95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14632%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpchill%20Filr%20%E2%80%93%20Secure%20document%20library&amp;severity=medium&amp;id=696af5b4b22c7ad8685027b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15403-cwe-269-improper-privilege-manageme-87b5283a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15403%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=critical&amp;id=696af5b4b22c7ad8685027bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14450-cwe-862-missing-authorization-in-wp-851d4a21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14450%3A%20CWE-862%20Missing%20Authorization%20in%20wpswings%20Wallet%20System%20for%20WooCommerce%20%E2%80%93%20Digital%20Wallet%2C%20Buy%20Now%20Pay%20Later%20(BNPL)%2C%20Instant%20Cashback%2C%20Referral%20program%2C%20Partial%20%26%20Subscription%20Payments&amp;severity=medium&amp;id=696af5b4b22c7ad8685027b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14075-cwe-200-exposure-of-sensitive-infor-befc1c4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14075%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thimpress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=696af5b4b22c7ad8685027aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0519-vulnerability-in-absolute-security-s-9306082e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0519%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=696aeb28b22c7ad8683b8232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0518-vulnerability-in-absolute-security-s-df7d9f27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0518%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=696aeb28b22c7ad8683b822f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0517-vulnerability-in-absolute-security-s-2c33b004</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0517%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=696b37a7d302b072d9b4c42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/siklu-etherhaul-series-eh-8010-remote-command-exec-48e9e28c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Siklu%20EtherHaul%20Series%20EH-8010%20-%20Remote%20Command%20Execution&amp;severity=medium&amp;id=696c9008d302b072d9ad2abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/siklu-etherhaul-series-eh-8010-arbitrary-file-uplo-ee37f024</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Siklu%20EtherHaul%20Series%20EH-8010%20-%20Arbitrary%20File%20Upload&amp;severity=medium&amp;id=696c9008d302b072d9ad2ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rpi-jukebox-rfid-280-remote-command-execution-438f2ff1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RPi-Jukebox-RFID%202.8.0%20-%20Remote%20Command%20Execution&amp;severity=medium&amp;id=696c9008d302b072d9ad2ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-17-8f6db1a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-17&amp;severity=medium&amp;id=696c250bd302b072d93b5acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15529-denial-of-service-in-open5gs-223f10b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15529%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=696ab9f0b22c7ad868fb1a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15528-denial-of-service-in-open5gs-c9708e24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15528%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=696ab9f0b22c7ad868fb1a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23745-cwe-22-improper-limitation-of-a-pat-efba1e80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23745%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=696ab9f0b22c7ad868fb1aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21223-cwe-269-improper-privilege-manageme-812815e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21223%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=696ab2f1b22c7ad868f75ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20960-cwe-285-improper-authorization-in-m-29f6cc2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20960%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Power%20Apps%20Desktop%20Client&amp;severity=high&amp;id=696ab2f1b22c7ad868f75dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23800-cwe-266-incorrect-privilege-assignm-c0405f66</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23800%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Modular%20DS&amp;severity=critical&amp;id=696aa4d9b22c7ad868ee9e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/december-2025-infostealer-trend-report-f997717b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=December%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=696df8d5d302b072d99485c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23744-cwe-306-missing-authentication-for--e4efbddd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23744%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MCPJam%20inspector&amp;severity=critical&amp;id=696a9dd0b22c7ad868e95256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23742-cwe-94-improper-control-of-generati-f487f23e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23742%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20zalando%20skipper&amp;severity=high&amp;id=696a9dd0b22c7ad868e95251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23735-cwe-362-concurrent-execution-using--6cc6fd42</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23735%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20graphql-hive%20graphql-modules&amp;severity=high&amp;id=696a9dd0b22c7ad868e9524b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23731-cwe-1021-improper-restriction-of-re-11bda56f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23731%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a9a4cb22c7ad868e6ff27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23730-cwe-601-url-redirection-to-untruste-aba9d8b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23730%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23729-cwe-601-url-redirection-to-untruste-f73d8863</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23729%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23728-cwe-601-url-redirection-to-untruste-e0169b5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23728%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23727-cwe-601-url-redirection-to-untruste-2ca4d83b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23727%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23726-cwe-601-url-redirection-to-untruste-32fb4400</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23726%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23725-cwe-79-improper-neutralization-of-i-8225a3ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23725%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23724-cwe-79-improper-neutralization-of-i-ab9e5f84</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23724%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23722-cwe-79-improper-neutralization-of-i-e6cd8bcb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=696a9344b22c7ad868dc8352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23723-cwe-89-improper-neutralization-of-s-0b58a728</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23723%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=696a9344b22c7ad868dc8355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23645-cwe-79-improper-neutralization-of-i-05b2cd3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23645%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=696a8fc2b22c7ad868d78294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23535-cwe-22-improper-limitation-of-a-pat-55cce8b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23535%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20wlc&amp;severity=high&amp;id=696a8fc2b22c7ad868d78299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48647-vulnerability-in-google-google-devi-e266be15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48647%3A%20Vulnerability%20in%20Google%20Google%20Devices&amp;severity=high&amp;id=696a8534b22c7ad868cd4e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15032-cwe-1021-improper-restriction-of-re-9e94c4fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15032%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20Dia&amp;severity=high&amp;id=696a81b1b22c7ad868cae2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-malware-uses-5001000-concatenated-zip-a-680f3c5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GootLoader%20Malware%20Uses%20500%E2%80%931%2C000%20Concatenated%20ZIP%20Archives%20to%20Evade%20Detection&amp;severity=medium&amp;id=696b427ed302b072d9d1fe25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0629-cwe-287-improper-authentication-in-t-6479c158</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0629%3A%20CWE-287%20Improper%20Authentication%20in%20TP-Link%20Systems%20Inc.%20VIGI%20InSight%20Sx45%20Series%20(S245%2FS345%2FS445)&amp;severity=high&amp;id=696a7724b22c7ad868c4289e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31186-an-app-may-be-able-to-bypass-privac-bc9d706d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31186%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20Xcode&amp;severity=low&amp;id=696a73a1b22c7ad868c2e46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24090-an-app-may-be-able-to-enumerate-a-u-dc1877c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24090%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=696a73a1b22c7ad868c2e46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43508-an-app-may-be-able-to-access-sensit-2875b2fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43508%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=696a73a1b22c7ad868c2e472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44210-an-app-may-be-able-to-access-user-s-72932ec2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44210%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=696a73a1b22c7ad868c2e460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24089-an-app-may-be-able-to-enumerate-a-u-dfb76829</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24089%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=696a73a1b22c7ad868c2e469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54556-a-user-may-be-able-to-view-restrict-166ac3b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54556%3A%20A%20user%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=696a73a1b22c7ad868c2e466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44238-an-app-may-be-able-to-corrupt-copro-1c471c8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44238%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=696a73a1b22c7ad868c2e463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23529-cwe-73-external-control-of-file-nam-ad7e4019</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23529%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Aiven-Open%20bigquery-connector-for-apache-kafka&amp;severity=high&amp;id=696a701db22c7ad868c0d111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/key-attack-scenarios-involving-brand-impersonation-96cc02f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Key%20attack%20scenarios%20involving%20brand%20impersonation&amp;severity=medium&amp;id=696a6cd4b22c7ad868bf68c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23528-cwe-80-improper-neutralization-of-s-0c949789</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23528%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20dask%20distributed&amp;severity=medium&amp;id=696a701db22c7ad868c0d10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23523-cwe-94-improper-control-of-generati-76d45acb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23523%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenAgentPlatform%20Dive&amp;severity=critical&amp;id=696a6c98b22c7ad868bf5936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0949-improper-neutralization-of-input-dur-bd621056</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EnterpriseDB%20Postgres%20Enterprise%20Manager%20(PEM)&amp;severity=medium&amp;id=696a6c98b22c7ad868bf5933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-fortisiem-flaw-exploited-sean-planke-6edc2350</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20FortiSIEM%20Flaw%20Exploited%2C%20Sean%20Plankey%20Renominated%2C%20Russia%E2%80%99s%20Polish%20Grid%20Attack&amp;severity=medium&amp;id=696a655db22c7ad868bc2bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29943-cwe-123-write-what-where-condition--de625fa5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29943%3A%20CWE-123%20%20Write-what-where%20Condition%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=696a5e8ab22c7ad868b8032c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21625-cwe-434-unrestricted-upload-of-file-d3e5782e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21625%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=medium&amp;id=696a5780b22c7ad868b44185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21624-cwe-79-improper-neutralization-of-i-bc4c653a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=critical&amp;id=696a5780b22c7ad868b44182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21623-cwe-79-improper-neutralization-of-i-e6f5f1d8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=critical&amp;id=696a5780b22c7ad868b4417f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-malicious-chrome-extensions-impersonate-workd-28054f94</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20Malicious%20Chrome%20Extensions%20Impersonate%20Workday%20and%20NetSuite%20to%20Hijack%20Accounts&amp;severity=medium&amp;id=696b427ed302b072d9d1fe28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0696-cwe-1004-sensitive-cookie-without-ht-db579a0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0696%3A%20CWE-1004%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20ConnectWise%20PSA&amp;severity=medium&amp;id=696a4268b22c7ad868a8d100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0695-cwe-79-improper-neutralization-of-in-3b545ad4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ConnectWise%20PSA&amp;severity=high&amp;id=696a4268b22c7ad868a8d0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14510-cwe-303-incorrect-implementation-of-047752f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14510%3A%20CWE-303%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20ABB%20ABB%20Ability%20OPTIMAX&amp;severity=high&amp;id=696a3b60b22c7ad868a461fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0615-cwe-497-exposure-of-sensitive-system-271e46e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0615%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0616-cwe-497-exposure-of-sensitive-system-d0f5d01f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0616%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0613-cwe-497-exposure-of-sensitive-system-046ddc2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0613%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0612-cwe-497-exposure-of-sensitive-system-6bc20f0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0612%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14894-cwe-434-unrestricted-upload-of-file-67dc654f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14894%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bee%20interactive%20Livewire%20Filemanager&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/750000-impacted-by-data-breach-at-canadian-investm-119347f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=750%2C000%20Impacted%20by%20Data%20Breach%20at%20Canadian%20Investment%20Watchdog&amp;severity=medium&amp;id=696a30a3b22c7ad8689f3fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-social-engineering-aaa35ce5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Social%20Engineering&amp;severity=high&amp;id=696a30a3b22c7ad8689f3fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whisperpair-attack-leaves-millions-of-bluetooth-ac-3959fbce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhisperPair%20Attack%20Leaves%20Millions%20of%20Audio%20Accessories%20Open%20to%20Hijacking&amp;severity=critical&amp;id=696a2615b22c7ad86898d8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-firms-react-to-chinas-reported-softw-89e2ae3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20Firms%20React%20to%20China%E2%80%99s%20Reported%20Software%20Ban&amp;severity=medium&amp;id=696a2291b22c7ad868981805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-digital-footprint-can-lead-right-to-your-fron-df1404ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Digital%20Footprint%20Can%20Lead%20Right%20to%20Your%20Front%20Door&amp;severity=medium&amp;id=696a1803b22c7ad8688eb76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lotuslite-backdoor-targets-us-policy-entities-usin-13384cc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LOTUSLITE%20Backdoor%20Targets%20U.S.%20Policy%20Entities%20Using%20Venezuela-Themed%20Spear%20Phishing&amp;severity=medium&amp;id=696b427ed302b072d9d1fe2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68675-cwe-532-insertion-of-sensitive-info-09ada261</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68675%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=696a14b5b22c7ad8688c7da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59870-vulnerability-in-hcl-software-myxal-d9275429</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59870%3A%20Vulnerability%20in%20HCL%20Software%20MyXalytics&amp;severity=high&amp;id=696a1130b22c7ad8688a3518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68438-cwe-200-exposure-of-sensitive-infor-7325dea7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68438%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=696a1130b22c7ad8688a351b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-vulnerability-exploited-by-chinese-h-93286da1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Vulnerability%20Exploited%20by%20Chinese%20Hackers&amp;severity=medium&amp;id=696a09f6b22c7ad86863a064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14844-cwe-639-authorization-bypass-throug-db5a2ea6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14844%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=high&amp;id=696a06a5b22c7ad8685c6d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12007-cwe-347-improper-verification-of-cr-07b92303</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12007%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SMCI%20X13SEM-F&amp;severity=high&amp;id=6969fa2a7c726673b6148cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60021-cwe-77-improper-neutralization-of-s-829a2013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60021%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20bRPC&amp;severity=critical&amp;id=6969fa2a7c726673b6148cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14757-cwe-862-missing-authorization-in-st-6258ed63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14757%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=medium&amp;id=6969fa2a7c726673b6148ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12006-cwe-347-improper-verification-of-cr-cadba4f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12006%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SMCI%20X12STW-F&amp;severity=high&amp;id=6969fa2a7c726673b6148cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0913-cwe-79-improper-neutralization-of-in-38a53d62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=medium&amp;id=6969f6a67c726673b6129c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1004-cwe-862-missing-authorization-in-wpd-b081ce7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1004%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=6969f6a67c726673b6129c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22876-improper-limitation-of-a-pathname-t-1389f4a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22876%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20TOA%20Corporation%20Multiple%20Network%20Cameras%20TRIFORA%203%20series&amp;severity=medium&amp;id=6969f6a67c726673b6129c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20894-cross-site-scripting-xss-in-toa-cor-69babe07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20894%3A%20Cross-site%20scripting%20(XSS)%20in%20TOA%20Corporation%20Multiple%20Network%20Cameras%20TRIFORA%203%20series&amp;severity=medium&amp;id=6969f6a67c726673b6129c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20759-improper-neutralization-of-special--69ac3303</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20759%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOA%20Corporation%20Multiple%20Network%20Cameras%20TRIFORA%203%20series&amp;severity=high&amp;id=6969f6a67c726673b6129c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14375-cwe-79-improper-neutralization-of-i-e277c6ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14375%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=6969e8957c726673b6094b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1003-cwe-862-missing-authorization-in-rox-cf1776ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1003%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=6969e8957c726673b6094b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-exploits-sitecore-zero-day-in-att-cf9a6aa8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT%20Exploited%20Sitecore%20Zero-Day%20in%20Critical%20Infrastructure%20Intrusion&amp;severity=critical&amp;id=696a0eecb22c7ad8687e4515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14793-cwe-918-server-side-request-forgery-fad94df4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14793%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20torstenbulk%20DK%20PDF%20%E2%80%93%20WordPress%20PDF%20Generator&amp;severity=medium&amp;id=6969e18d7c726673b6064126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14853-cwe-352-cross-site-request-forgery--2fc831cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14853%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smings%20LEAV%20Last%20Email%20Address%20Validator&amp;severity=medium&amp;id=6969e18d7c726673b606412d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0939-cwe-345-insufficient-verification-of-516891f2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0939%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20linknacional%20Rede%20Ita%C3%BA%20for%20WooCommerce%20%E2%80%94%20Payment%20PIX%2C%20Credit%20Card%20and%20Debit&amp;severity=medium&amp;id=6969e18d7c726673b6064137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0942-cwe-306-missing-authentication-for-c-a7be5941</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0942%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20linknacional%20Rede%20Ita%C3%BA%20for%20WooCommerce%20%E2%80%94%20Payment%20PIX%2C%20Credit%20Card%20and%20Debit&amp;severity=medium&amp;id=6969e18d7c726673b606413d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0916-cwe-79-improper-neutralization-of-in-f08982e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0916%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keesiemeijer%20Related%20Posts%20by%20Taxonomy&amp;severity=medium&amp;id=6969e18d7c726673b6064133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0975-cwe-77-improper-neutralization-of-sp-238d7ef3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0975%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Delta%20Electronics%20DIAView&amp;severity=high&amp;id=6969d7017c726673b6feabd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-zero-day-rce-exploited-by-china-link-9a3a7456</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Zero-Day%20RCE%20Exploited%20by%20China-Linked%20APT%20in%20Secure%20Email%20Gateways&amp;severity=medium&amp;id=696a0eecb22c7ad8687e4518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23769-cwe-79-improper-neutralization-of-i-0e86a5ab</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NAVER%20lucy-xss-filter&amp;severity=medium&amp;id=6969cc767c726673b6f69cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23768-cwe-918-server-side-request-forgery-c92d77e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23768%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NAVER%20lucy-xss-filter&amp;severity=medium&amp;id=6969cc767c726673b6f69cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0858-stored-xss-in-netsourceforgeplantuml-fd195677</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0858%3A%20Stored%20XSS%20in%20net.sourceforge.plantuml%3Aplantuml&amp;severity=medium&amp;id=6969c8f27c726673b6f36687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14384-cwe-862-missing-authorization-in-sm-d7b57653</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14384%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20All%20in%20One%20SEO%20%E2%80%93%20Powerful%20SEO%20Plugin%20to%20Boost%20SEO%20Rankings%20%26%20Increase%20Traffic&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1000-cwe-862-missing-authorization-in-mai-8c02be30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1000%3A%20CWE-862%20Missing%20Authorization%20in%20mailerlite%20MailerLite%20%E2%80%93%20WooCommerce%20integration&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15370-cwe-639-authorization-bypass-throug-ef7ad2b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15370%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12957-cwe-434-unrestricted-upload-of-file-a1ed58c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12957%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=high&amp;id=6969c56d7c726673b6f0ba61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12641-cwe-862-missing-authorization-in-aw-c733352b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12641%3A%20CWE-862%20Missing%20Authorization%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15526-cwe-209-generation-of-error-message-4394609b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15526%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15527-cwe-200-exposure-of-sensitive-infor-bbaff840</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15527%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14982-cwe-862-missing-authorization-in-wp-c6c3f78b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14982%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1023-cwe-306-missing-authentication-for-c-90d98653</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1023%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Gotac%20Statistics%20Database%20System&amp;severity=high&amp;id=6969b75e7c726673b6e69b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1022-cwe-23-relative-path-traversal-in-go-152a9f2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1022%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Gotac%20Statistics%20Database%20System&amp;severity=high&amp;id=6969b75e7c726673b6e69b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1021-cwe-434-unrestricted-upload-of-file--c0c2c5ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1021%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=critical&amp;id=6969b0567c726673b6c490b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1020-cwe-36-absolute-path-traversal-in-go-dbe01ed1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1020%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=medium&amp;id=6969b0567c726673b6c490b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1019-cwe-306-missing-authentication-for-c-041a882b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1019%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=critical&amp;id=6969b0567c726673b6c490ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1018-cwe-36-absolute-path-traversal-in-go-74dae460</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1018%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=high&amp;id=6969a5c97c726673b6b924fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62581-cwe-321-use-of-hard-coded-cryptogra-18c1d511</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62581%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Delta%20Electronics%20DIAView&amp;severity=critical&amp;id=6969a5c97c726673b6b924f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62582-cwe-306-missing-authentication-for--d3b61dc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62582%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Delta%20Electronics%20DIAView&amp;severity=critical&amp;id=6969a5c97c726673b6b924f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64769-cwe-319-in-aveva-process-optimizati-e10ec928</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64769%3A%20CWE-319%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65117-cwe-676-in-aveva-process-optimizati-5836ab29</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65117%3A%20CWE-676%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64729-cwe-862-in-aveva-process-optimizati-48fb5bf2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64729%3A%20CWE-862%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65118-cwe-427-in-aveva-process-optimizati-5718ed1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65118%3A%20CWE-427%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61943-cwe-89-in-aveva-process-optimizatio-60e63e2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61943%3A%20CWE-89%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64691-cwe-94-in-aveva-process-optimizatio-91c6aca2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64691%3A%20CWE-94%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61937-cwe-94-in-aveva-process-optimizatio-3b3044cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61937%3A%20CWE-94%20in%20AVEVA%20Process%20Optimization&amp;severity=critical&amp;id=696989a97c726673b69cdac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-16-432be40f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-16&amp;severity=medium&amp;id=696ad256b22c7ad868047d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56451-na-1b45e936</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56451%3A%20n%2Fa&amp;severity=medium&amp;id=696aaf65b22c7ad868f5fee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69581-na-cd6c2092</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69581%3A%20n%2Fa&amp;severity=medium&amp;id=696a9344b22c7ad868dc834e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68924-cwe-829-inclusion-of-functionality--0050f6aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68924%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Umbraco%20Forms&amp;severity=high&amp;id=696a88b8b22c7ad868ce94a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61873-na-d817035a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61873%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20bestpractical%20Request%20Tracker&amp;severity=low&amp;id=696a81b1b22c7ad868cae2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43904-cwe-863-incorrect-authorization-in--8c27b2c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43904%3A%20CWE-863%20Incorrect%20Authorization%20in%20SchedMD%20Slurm&amp;severity=medium&amp;id=696a7e2cb22c7ad868c7aa07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51602-na-dfdedc72</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51602%3A%20CWE-125%20Out-of-bounds%20Read%20in%20VideoLAN%20VLC%20media%20player&amp;severity=medium&amp;id=696a7e2cb22c7ad868c7aa03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24531-cwe-393-return-of-wrong-status-code-e5a061cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24531%3A%20CWE-393%20Return%20of%20Wrong%20Status%20Code%20in%20OpenSC%20project%20pam_pkcs11&amp;severity=medium&amp;id=696a7aa9b22c7ad868c5764a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31510-cwe-79-improper-neutralization-of-i-5e295fcf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20lemonldap-ng%20LemonLDAP%3A%3ANG&amp;severity=high&amp;id=696a7aa9b22c7ad868c57647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24528-cwe-190-integer-overflow-or-wraparo-ed44f9a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24528%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20MIT%20Kerberos%205&amp;severity=high&amp;id=696a7724b22c7ad868c4289a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70746-na-deaef130</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70746%3A%20n%2Fa&amp;severity=high&amp;id=696a620db22c7ad868babe09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71020-na-6800fcaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71020%3A%20n%2Fa&amp;severity=high&amp;id=696a5b05b22c7ad868b74e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68921-na-2a1c9855</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68921%3A%20n%2Fa&amp;severity=high&amp;id=696a5078b22c7ad868b11dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14237-cwe-787-out-of-bounds-write-in-cano-abf0cbe0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14237%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697f1e7c726673b68c4162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14236-cwe-787-out-of-bounds-write-in-cano-e90be9e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14236%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14235-cwe-787-out-of-bounds-write-in-cano-86d77d6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14235%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14234-cwe-787-out-of-bounds-write-in-cano-d160e8dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14234%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14233-cwe-763-release-of-invalid-pointer--26aac043</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14233%3A%20CWE-763%3A%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14232-cwe-787-out-of-bounds-write-in-cano-73d64ac5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14232%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14231-cwe-787-out-of-bounds-write-in-cano-064e172c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14231%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1011-cwe-79-improper-neutralization-of-in-3c3d4f6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Live&amp;severity=medium&amp;id=696978157c726673b6895f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1010-cwe-79-improper-neutralization-of-in-37663ca5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1010%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Enterprise%20Server&amp;severity=high&amp;id=696974917c726673b6855148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22864-cwe-77-improper-neutralization-of-s-6edc20a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22864%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=696974917c726673b685514b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22863-cwe-325-missing-cryptographic-step--3361159c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22863%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20denoland%20deno&amp;severity=critical&amp;id=696974917c726673b6855151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1009-cwe-79-improper-neutralization-of-in-0988a46f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1009%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Live&amp;severity=critical&amp;id=6969710d7c726673b6836a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68671-cwe-294-authentication-bypass-by-ca-fae84d96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68671%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20treeverse%20lakeFS&amp;severity=medium&amp;id=6969710d7c726673b6836a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1008-cwe-79-improper-neutralization-of-in-bd59933a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1008%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Live&amp;severity=high&amp;id=69696d897c726673b67e92cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0915-cwe-908-use-of-uninitialized-resourc-945e6348</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0915%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=696966817c726673b661c89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21921-cwe-416-use-after-free-in-juniper-n-a76791a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21921%3A%20CWE-416%20Use%20After%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=696951f81ab3796b10539d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21920-cwe-252-unchecked-return-value-in-j-78aeb347</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21920%3A%20CWE-252%20Unchecked%20Return%20Value%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=696951f81ab3796b10539cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21918-cwe-415-double-free-in-juniper-netw-7963ee06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21918%3A%20CWE-415%20Double%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=696951f81ab3796b10539cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21917-cwe-1286-improper-validation-of-syn-b1f662ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21917%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=696951f81ab3796b10539cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21914-cwe-667-improper-locking-in-juniper-6bbb1d2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21914%3A%20CWE-667%20Improper%20Locking%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e771ab3796b1050015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21913-cwe-1419-incorrect-initialization-o-6d6acb31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21913%3A%20CWE-1419%20Incorrect%20Initialization%20of%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e771ab3796b10500157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21912-cwe-367-time-of-check-time-of-use-t-48ab73a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21912%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e771ab3796b10500153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21911-cwe-682-incorrect-calculation-in-ju-f9e2c67c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21911%3A%20CWE-682%20Incorrect%20Calculation%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69694e771ab3796b1050014f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21910-cwe-754-improper-check-for-unusual--565e570b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21910%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e771ab3796b1050014b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21909-cwe-401-missing-release-of-memory-a-f10fdd96</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21909%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e771ab3796b10500147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21908-cwe-416-use-after-free-in-juniper-n-f96611ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21908%3A%20CWE-416%20Use%20After%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e771ab3796b10500143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21907-cwe-327-use-of-a-broken-or-risky-cr-e0f690bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21907%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=69694e771ab3796b1050013f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21906-cwe-755-improper-handling-of-except-02d5cac0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21906%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b1050010e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21905-cwe-835-loop-with-unreachable-exit--0e61f2b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21905%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b1050010a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21903-cwe-121-stack-based-buffer-overflow-c722cbf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21903%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b10500106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0203-cwe-755-improper-handling-of-excepti-980f4f2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0203%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b10500102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60011-cwe-754-improper-check-for-unusual--6c07a66e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60011%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b105000fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60007-cwe-476-null-pointer-dereference-in-511d4875</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60007%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b105000f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60003-cwe-126-buffer-over-read-in-juniper-d2abf351</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60003%3A%20CWE-126%20Buffer%20Over-read%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b105000f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59961-cwe-732-incorrect-permission-assign-00405344</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59961%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b105000ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59960-cwe-754-improper-check-for-unusual--f0b21a74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59960%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b105000ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59959-cwe-822-untrusted-pointer-dereferen-de77e745</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59959%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69695d667c726673b645f26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52987-cwe-1021-improper-restriction-of-re-896bfca5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52987%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Juniper%20Networks%20Paragon%20Automation%20(Pathfinder%2C%20Planner%2C%20Insights)&amp;severity=medium&amp;id=69695d667c726673b645f26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23746-cwe-306-missing-authentication-for--3ee3d0fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23746%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Entrust%20Corporation%20Instant%20Financial%20Issuance%20(IF)&amp;severity=critical&amp;id=6969476c1ab3796b1034af87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-codebuild-misconfiguration-exposed-github-repo-8d88a99d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%20CodeBuild%20Misconfiguration%20Exposed%20GitHub%20Repos%20to%20Potential%20Supply%20Chain%20Attacks&amp;severity=critical&amp;id=696964ea7c726673b65bc225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23622-cwe-352-cross-site-request-forgery--29cd7f09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23622%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alextselegidis%20easyappointments&amp;severity=high&amp;id=6969476c1ab3796b1034af96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23527-cwe-444-inconsistent-interpretation-8672415e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23527%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20h3js%20h3&amp;severity=high&amp;id=6969476c1ab3796b1034af92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23520-cwe-78-improper-neutralization-of-s-a885c742</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23520%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20getarcaneapp%20arcane&amp;severity=critical&amp;id=6969476c1ab3796b1034af8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23766-b3f40f23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23766&amp;severity=null&amp;id=6990b91cc9e1ff5ad8a36ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23519-cwe-208-observable-timing-discrepan-0c871956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23519%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20RustCrypto%20utils&amp;severity=high&amp;id=6969476c1ab3796b1034af9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22775-cwe-405-asymmetric-resource-consump-a140cbfe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22775%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sveltejs%20devalue&amp;severity=high&amp;id=69693b3453752d4047d52868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22774-cwe-405-asymmetric-resource-consump-350cc646</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22774%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sveltejs%20devalue&amp;severity=high&amp;id=69693b3453752d4047d5286d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0227-cwe-754-improper-check-for-unusual-o-59ec22cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0227%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=69693e4b1ab3796b101b8835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22803-cwe-789-memory-allocation-with-exce-39b2be76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22803%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20sveltejs%20kit&amp;severity=high&amp;id=69693e4b1ab3796b101b8838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67647-cwe-248-uncaught-exception-in-svelt-82550457</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67647%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20sveltejs%20kit&amp;severity=high&amp;id=6969342c53752d4047cfdaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13845-cwe-416-use-after-free-in-schneider-0cd394f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13845%3A%20CWE-416%20Use%20After%20Free%20in%20Schneider%20Electric%20EcoStruxure%20Power%20Build%20Rapsody&amp;severity=high&amp;id=6969342c53752d4047cfdaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13844-cwe-415-double-free-in-schneider-el-8351af62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13844%3A%20CWE-415%20Double%20Free%20in%20Schneider%20Electric%20EcoStruxure%20Power%20Build%20Rapsody&amp;severity=high&amp;id=6969342c53752d4047cfdadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stackwarp-attack-threatens-confidential-vms-on-005abf70</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98StackWarp%E2%80%99%20Attack%20Threatens%20Confidential%20VMs%20on%20AMD%20Processors&amp;severity=critical&amp;id=69692cf153752d4047c83ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36911-information-disclosure-in-google-an-ff46e1a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36911%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=696929a053752d4047c61cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9014-cwe-20-improper-input-validation-in--61beb757</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9014%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20TL-WR841N%20v14&amp;severity=medium&amp;id=696929a053752d4047c61cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-coding-tested-ai-agents-nail-sqli-but-fail-mi-3d1039bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe%20Coding%20Tested%3A%20AI%20Agents%20Nail%20SQLi%20but%20Fail%20Miserably%20on%20Security%20Controls&amp;severity=medium&amp;id=696921fb53752d4047a62dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/humint-operations-uncover-cryptojacking-campaign-d-3649a378</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HUMINT%20Operations%20Uncover%20Cryptojacking%20Campaign%3A%20Discord-Based%20Distribution%20of%20Clipboard%20Hijacking%20Malware%20Targeting%20Cryptocurrency%20Communities&amp;severity=medium&amp;id=696a3ee4b22c7ad868a7522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62193-cwe-78-improper-neutralization-of-s-5ff62ee0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62193%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20National%20Oceanic%20and%20Atmospheric%20Administration%20(NOAA)%20Live%20Access%20Server%20(LAS)&amp;severity=critical&amp;id=69691b9253752d4047972530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20075-improper-neutralization-of-input-du-954de297</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=69691b9253752d404797253f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20047-improper-neutralization-of-script-r-997c95f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20047%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69691b9253752d404797253c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20076-improper-neutralization-of-input-du-2c2b760e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69691b9253752d4047972542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22867-cwe-79-improper-neutralization-of-i-03fd4933</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22867%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20suitenumerique%20docs&amp;severity=high&amp;id=696916c94c611209ad420daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66417-cwe-89-improper-neutralization-of-s-6a1ea466</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66417%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=696916c94c611209ad420d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66292-cwe-22-improper-limitation-of-a-pat-88df64f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66292%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20donknap%20dpanel&amp;severity=high&amp;id=696916c94c611209ad420d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64516-cwe-284-improper-access-control-in--98125ae4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64516%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20glpi-project%20glpi&amp;severity=high&amp;id=696913454c611209ad3d9faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-malware-analysis-full-execution-break-57f30e94</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Malware%20Analysis%3A%20Full%20Execution%20Breakdown&amp;severity=medium&amp;id=69690c3d4c611209ad343769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-wordpress-modular-ds-plugin-flaw-actively-25b680c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20WordPress%20Modular%20DS%20Plugin%20Flaw%20Actively%20Exploited%20to%20Gain%20Admin%20Access&amp;severity=critical&amp;id=6969216753752d4047a49a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hunting-lazarus-inside-the-contagious-interview-c2-ba092a78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hunting%20Lazarus%3A%20Inside%20the%20Contagious%20Interview%20C2%20Infrastructure&amp;severity=medium&amp;id=69690c3d4c611209ad343777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-desktop-window-manager-zero-day-vulnerab-46f9d36a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Desktop%20Window%20Manager%20Zero-Day%20Vulnerability%20(CVE-2026-20805)%20Actively%20Exploited%3B%20Urgent%20Patch%20Released&amp;severity=high&amp;id=6969064c4c611209ad2d78bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/command-evade-turlas-kazuar-v3-loader-5ae953d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Command%20%26%20Evade%3A%20Turla&apos;s%20Kazuar%20v3%20Loader&amp;severity=medium&amp;id=696908b84c611209ad2ef0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61973-cwe-284-improper-access-control-in--aefac3ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61973%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Epic%20Games%20Epic%20Games%20Store&amp;severity=high&amp;id=696908b94c611209ad2ef133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-powered-sextortion-a-new-threat-to-privacy-kasp-12b568bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-powered%20sextortion%3A%20a%20new%20threat%20to%20privacy%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=696905724c611209ad2b6595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-reveal-reprompt-attack-allowing-single-d2213d98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Reveal%20Reprompt%20Attack%20Allowing%20Single-Click%20Data%20Exfiltration%20From%20Microsoft%20Copilot&amp;severity=low&amp;id=6969216753752d4047a49a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0992-uncontrolled-resource-consumption-in-62b16cbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0992%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6968faa94c611209ad23897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0989-uncontrolled-recursion-in-red-hat-re-f874fb4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0989%3A%20Uncontrolled%20Recursion%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6968faa94c611209ad238972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0990-uncontrolled-recursion-in-red-hat-re-4f0050ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0990%3A%20Uncontrolled%20Recursion%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6968faa94c611209ad238976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0897-cwe-770-allocation-of-resources-with-da1bfc54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0897%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Google%20Keras&amp;severity=high&amp;id=6968f7254c611209ad1c4a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-voice-cloning-exploit-wi-fi-9921f37b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Voice%20Cloning%20Exploit%2C%20Wi-Fi%20Kill%20Switch%2C%20PLC%20Vulns%2C%20and%2014%20More%20Stories&amp;severity=medium&amp;id=6969216753752d4047a49a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13859-cwe-862-missing-authorization-in-wp-d4f33893</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13859%3A%20CWE-862%20Missing%20Authorization%20in%20wpcenter%20AffiliateX%20%E2%80%93%20Amazon%20Affiliate%20Plugin&amp;severity=medium&amp;id=6968ec9a4c611209ad10ace4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13062-cwe-434-unrestricted-upload-of-file-75b879c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13062%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20divisupreme%20Supreme%20Modules%20Lite%20%E2%80%93%20Divi%20Theme%2C%20Extra%20Theme%20and%20Divi%20Builder&amp;severity=high&amp;id=6968ec9a4c611209ad10ace0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12895-cwe-862-missing-authorization-in-la-2326194c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12895%3A%20CWE-862%20Missing%20Authorization%20in%20Laborator%20Kalium%203%20%7C%20Creative%20WordPress%20%26%20WooCommerce%20Theme&amp;severity=medium&amp;id=6968ec9a4c611209ad10acdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22646-cwe-209-generation-of-error-message-42b8f4f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22646%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20SICK%20AG%20Incoming%20Goods%20Suite&amp;severity=medium&amp;id=6968ec9b4c611209ad10ad41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22645-cwe-200-exposure-of-sensitive-infor-8a1b00cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22645%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20Incoming%20Goods%20Suite&amp;severity=medium&amp;id=6968ec9b4c611209ad10ad39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22644-cwe-598-use-of-get-request-method-w-f9cade54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22644%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20SICK%20AG%20Incoming%20Goods%20Suite&amp;severity=medium&amp;id=6968ec9a4c611209ad10ad19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22643-cwe-20-improper-input-validation-in-371b592c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22643&amp;severity=null&amp;id=6968ec9a4c611209ad10ad11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22642-cwe-601-url-redirection-to-untruste-3c957cb1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22642&amp;severity=null&amp;id=6968ec9a4c611209ad10ad09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22641-cwe-285-improper-authorization-in-s-fdb80616</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22641&amp;severity=null&amp;id=6968ec9a4c611209ad10ad01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22640-cwe-284-improper-access-control-in--1338975e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22640&amp;severity=null&amp;id=6968ec9a4c611209ad10acf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22639-cwe-200-exposure-of-sensitive-infor-81002f0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22639&amp;severity=null&amp;id=6968ec9a4c611209ad10acf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22638-cwe-601-url-redirection-to-untruste-9b73a328</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22638&amp;severity=null&amp;id=6968ec9a4c611209ad10ace9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22637-cwe-79-improper-neutralization-of-i-6e859694</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22637&amp;severity=null&amp;id=6968e9244c611209ad0e7136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0713-cwe-863-incorrect-authorization-in-s-380c37bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0713&amp;severity=null&amp;id=6968e9244c611209ad0e712e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0712-cwe-601-url-redirection-to-untrusted-0ab8d3d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0712&amp;severity=null&amp;id=6968e9244c611209ad0e7126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22920-cwe-1391-use-of-weak-credentials-in-0cee6b9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22920%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20SICK%20AG%20TDC-X401GL&amp;severity=low&amp;id=6968e9254c611209ad0e71b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22919-cwe-79-improper-neutralization-of-i-7652367f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SICK%20AG%20TDC-X401GL&amp;severity=low&amp;id=6968e9254c611209ad0e71a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22918-cwe-1021-improper-restriction-of-re-b14062af</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22918%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e71a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22917-cwe-770-allocation-of-resources-wit-aaaced2b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22917%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22916-cwe-266-incorrect-privilege-assignm-d6f06f95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22916%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22915-cwe-497-exposure-of-sensitive-syste-bee82d8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22915%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22914-cwe-266-incorrect-privilege-assignm-4e1a484c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22914%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22913-cwe-79-improper-neutralization-of-i-7e7b681e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9244c611209ad0e716e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isverified-emerges-from-stealth-with-voice-deepfak-5a56747b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=isVerified%20Emerges%20From%20Stealth%20With%20Voice%20Deepfake%20Detection%20Apps&amp;severity=medium&amp;id=6968e8e24c611209ad0d75b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22912-cwe-601-url-redirection-to-untruste-0836dc15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22912%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9244c611209ad0e7166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22911-cwe-798-use-of-hard-coded-credentia-f9297156</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22911%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9244c611209ad0e715e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22910-cwe-1391-use-of-weak-credentials-in-c48b460f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22910%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20SICK%20AG%20TDC-X401GL&amp;severity=high&amp;id=6968e9244c611209ad0e7156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22909-cwe-284-improper-access-control-in--38bfe6ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22909%3A%20CWE-284%20Improper%20Access%20Control%20in%20SICK%20AG%20TDC-X401GL&amp;severity=high&amp;id=6968e9244c611209ad0e714e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22908-cwe-266-incorrect-privilege-assignm-12035fba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22908%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=critical&amp;id=6968e9244c611209ad0e7146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22907-cwe-266-incorrect-privilege-assignm-26174fb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22907%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=critical&amp;id=6968e9244c611209ad0e713e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-reprompt-attack-silently-siphons-microsoft-cop-70050aef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98Reprompt%E2%80%99%20Attack%20Silently%20Siphons%20Microsoft%20Copilot%20Data&amp;severity=low&amp;id=6968dad24c611209addfcef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0976-improper-input-validation-in-red-hat-6af7e9f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0976%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=6968db144c611209ade073ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeted-espionage-leveraging-geopolitical-themes-1b4a1cae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeted%20espionage%20leveraging%20geopolitical%20themes&amp;severity=medium&amp;id=696dfc59d302b072d996ad70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-chinas-hosting-ecosystem-18000-malware-c2-s-85e5f7b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20China&apos;s%20Hosting%20Ecosystem%3A%2018%2C000%2B%20Malware%20C2%20Servers%20Mapped%20Across%20Major%20ISPs&amp;severity=medium&amp;id=696df551d302b072d9926058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/model-security-is-the-wrong-frame-the-real-risk-is-f4112a00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Model%20Security%20Is%20the%20Wrong%20Frame%20%E2%80%93%20The%20Real%20Risk%20Is%20Workflow%20Security&amp;severity=low&amp;id=6969216753752d4047a49a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/battling-cryptojacking-botnets-and-iabs-x5bguest-d-2930c78d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Battling%20Cryptojacking%2C%20Botnets%2C%20and%20IABs%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Thu%2C%20Jan%2015th)&amp;severity=medium&amp;id=6968c8f10b074b1fa504091f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/central-maine-healthcare-data-breach-impacts-14500-be42e222</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Central%20Maine%20Healthcare%20Data%20Breach%20Impacts%20145%2C000%20Individuals&amp;severity=medium&amp;id=6968c5de0b074b1fa50040a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-legal-action-disrupts-redvds-cybercrime--d893183d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Legal%20Action%20Disrupts%20RedVDS%20Cybercrime%20Infrastructure%20Used%20for%20Online%20Fraud&amp;severity=low&amp;id=6968b75b0b074b1fa5e95ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-linux-malware-framework-targets-cloud-env-9d3bab6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%20Linux%20Malware%20Framework%20Targets%20Cloud%20Environments&amp;severity=medium&amp;id=6968b76f0b074b1fa5e9ef87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-601393fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Fixed%20by%20Siemens%2C%20Schneider%2C%20Aveva%2C%20Phoenix%20Contact&amp;severity=medium&amp;id=6968b0550b074b1fa5d7b269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/traveler-information-stolen-in-eurail-data-breach-28d4714f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Traveler%20Information%20Stolen%20in%20Eurail%20Data%20Breach&amp;severity=medium&amp;id=6968a5c90b074b1fa5b3e28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-fixes-globalprotect-dos-flaw-that-can-cr-7a63a1ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Fixes%20GlobalProtect%20DoS%20Flaw%20That%20Can%20Crash%20Firewalls%20Without%20Login&amp;severity=high&amp;id=6968e1514c611209ad042ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14457-cwe-862-missing-authorization-in-gl-9efade58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14457%3A%20CWE-862%20Missing%20Authorization%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=low&amp;id=696891250b074b1fa58c19b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14448-cwe-79-improper-neutralization-of-i-9b530d45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=69687bcc0b074b1fa56e40e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67823-na-d453dfa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67823%3A%20n%2Fa&amp;severity=high&amp;id=696a048eb22c7ad86858d3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-15-747be9e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-15&amp;severity=medium&amp;id=6969826b7c726673b691eb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67822-na-0432bac0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67822%3A%20n%2Fa&amp;severity=critical&amp;id=69695f797c726673b6518731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65368-na-d3cc52d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65368%3A%20n%2Fa&amp;severity=medium&amp;id=696958ff1ab3796b105ce50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67025-na-8103763e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67025%3A%20n%2Fa&amp;severity=medium&amp;id=6969557c1ab3796b1059780a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70893-na-2592c988</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70893%3A%20n%2Fa&amp;severity=high&amp;id=696951f81ab3796b10539cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70892-na-68687072</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70892%3A%20n%2Fa&amp;severity=critical&amp;id=696951f81ab3796b10539ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70891-na-8a5af78d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70891%3A%20n%2Fa&amp;severity=medium&amp;id=696951f81ab3796b10539ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70890-na-118b9885</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70890%3A%20n%2Fa&amp;severity=medium&amp;id=69694e761ab3796b105000fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65349-na-a0c6bc03</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65349%3A%20n%2Fa&amp;severity=medium&amp;id=69694af11ab3796b104b1134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48077-na-7a20d12f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48077%3A%20n%2Fa&amp;severity=high&amp;id=6969476c1ab3796b1034af99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70303-na-9b8b01e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70303%3A%20n%2Fa&amp;severity=medium&amp;id=6969342c53752d4047cfdaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70302-na-d18ea1ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70302%3A%20n%2Fa&amp;severity=medium&amp;id=696930ac53752d4047cbfe72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70299-na-7c51b7c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70299%3A%20n%2Fa&amp;severity=medium&amp;id=69692d3453752d4047c938cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70307-na-eadaa7a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70307%3A%20n%2Fa&amp;severity=high&amp;id=6969261c53752d4047c39ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70305-na-d3f062d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70305%3A%20n%2Fa&amp;severity=medium&amp;id=69691f1453752d40479e43e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70656-na-31371b51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70656%3A%20n%2Fa&amp;severity=high&amp;id=69691b9253752d4047972539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70298-na-841e237f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70298%3A%20n%2Fa&amp;severity=high&amp;id=69691b9253752d4047972536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70310-na-80f722d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70310%3A%20n%2Fa&amp;severity=medium&amp;id=696916c94c611209ad420da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70308-na-a598fbf7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70308%3A%20n%2Fa&amp;severity=high&amp;id=696916c94c611209ad420da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70304-na-f4ac57cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70304%3A%20n%2Fa&amp;severity=high&amp;id=696916c94c611209ad420da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70309-na-3a33ddb9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70309%3A%20n%2Fa&amp;severity=medium&amp;id=696913454c611209ad3d9fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67246-na-c14e6dd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67246%3A%20n%2Fa&amp;severity=high&amp;id=69690fc14c611209ad3adf0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67079-na-ee86966e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67079%3A%20n%2Fa&amp;severity=critical&amp;id=696908b94c611209ad2ef142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67078-na-40adadd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67078%3A%20n%2Fa&amp;severity=medium&amp;id=696908b94c611209ad2ef13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67077-na-fd090e1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67077%3A%20n%2Fa&amp;severity=high&amp;id=696908b94c611209ad2ef13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67076-na-7a0522c6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67076%3A%20n%2Fa&amp;severity=high&amp;id=696908b94c611209ad2ef136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67084-na-fb5e13bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67084%3A%20n%2Fa&amp;severity=critical&amp;id=696905364c611209ad2b4f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67083-na-be4e7ab4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67083%3A%20n%2Fa&amp;severity=medium&amp;id=696905364c611209ad2b4f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67082-na-d4d11422</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67082%3A%20n%2Fa&amp;severity=medium&amp;id=696905364c611209ad2b4f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67081-na-38911281</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67081%3A%20n%2Fa&amp;severity=medium&amp;id=696905364c611209ad2b4f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71019-na-3b79885b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71019%3A%20n%2Fa&amp;severity=high&amp;id=6968fe2e4c611209ad26113d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70744-na-02d37615</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70744%3A%20n%2Fa&amp;severity=high&amp;id=6968fe2e4c611209ad26113a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-15-17cfb709</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-15&amp;severity=low&amp;id=6968748e0b074b1fa5681360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0600-cwe-918-server-side-request-forgery--86bb8623</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0600%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=69681d11f809b25a98e646e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12166-cwe-89-improper-neutralization-of-s-c0bbbf6f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12166%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69681d11f809b25a98e646db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14058-cwe-306-missing-authentication-for--f0f32602</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14058%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Lenovo%20Tab%20M11%20TB330FU%20TB330XU&amp;severity=low&amp;id=69681d11f809b25a98e646e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0421-cwe-252-unchecked-return-value-in-le-969dbc15</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0421%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20Lenovo%20ThinkPad%20L13%20Gen%206%20BIOS&amp;severity=high&amp;id=6968198df809b25a98d552a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13455-cwe-290-authentication-bypass-by-sp-80e9a103</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13455%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Lenovo%20ThinkPlus%20FU100&amp;severity=high&amp;id=6968198df809b25a98d5529d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13454-cwe-319-cleartext-transmission-of-s-72e52ef0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13454%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Lenovo%20ThinkPlus%20FU100&amp;severity=medium&amp;id=6968198df809b25a98d5529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13453-cwe-311-missing-encryption-of-sensi-42865113</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13453%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Lenovo%20ThinkPlus%20FU100&amp;severity=medium&amp;id=6968198df809b25a98d55297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13154-cwe-59-improper-link-resolution-bef-c3602914</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13154%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=6968198df809b25a98d55294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0601-cwe-79-improper-neutralization-of-in-b5543384</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0601%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=69681608f809b25a98cc777c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0861-cwe-190-integer-overflow-or-wraparou-82abbb78</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0861%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=696807fbf809b25a9881d78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23512-cwe-426-untrusted-search-path-in-su-529632de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23512%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=high&amp;id=696800f0f809b25a9857d26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0961-cwe-787-out-of-bounds-write-in-wires-cba205f9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0961%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a98440574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0962-cwe-787-out-of-bounds-write-in-wires-1e32079b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0962%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a98440578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0960-cwe-835-loop-with-unreachable-exit-c-11784e4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0960%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a98440570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0959-cwe-787-out-of-bounds-write-in-wires-6093b375</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0959%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a9844056c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-redvds-how-a-single-virtual-desktop-provide-81604c60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20RedVDS%3A%20How%20a%20single%20virtual%20desktop%20provider%20fueled%20worldwide%20cybercriminal%20operations&amp;severity=medium&amp;id=6968d02b0b074b1fa510bc12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22036-cwe-770-allocation-of-resources-wit-1655d009</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22036%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nodejs%20undici&amp;severity=medium&amp;id=6967ebd9f809b25a98d9ca09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-null-route-over-550-kimwolf-and-aisuru-e976d1a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Null-Route%20Over%20550%20Kimwolf%20and%20Aisuru%20Botnet%20Command%20Servers&amp;severity=medium&amp;id=69682be609a9118869f2d64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14557-cwe-79-improper-neutralization-of-i-ed1922b4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14557%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Facebook%20Pixel&amp;severity=medium&amp;id=6967e85ff809b25a98c7765e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14556-cwe-79-improper-neutralization-of-i-44c620b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14556%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Flag&amp;severity=medium&amp;id=6967e85ff809b25a98c77656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33206-cwe-78-improper-neutralization-of-s-28460223</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33206%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20NSIGHT%20Graphics&amp;severity=high&amp;id=6967e189d0ff220b953a1231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23497-cwe-79-improper-neutralization-of-i-f0c46ca1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23497%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=low&amp;id=6967e189d0ff220b953a1236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infection-repeatedly-adds-scheduled-tasks-and-incr-69db298f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infection%20repeatedly%20adds%20scheduled%20tasks%20and%20increases%20traffic%20to%20the%20same%20C2%20domain%2C%20(Wed%2C%20Jan%2014th)&amp;severity=medium&amp;id=6967f375f809b25a98068854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23477-cwe-269-improper-privilege-manageme-39fd5320</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23477%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20RocketChat%20Rocket.Chat&amp;severity=high&amp;id=6967de03d0ff220b953260fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22819-cwe-366-race-condition-within-a-thr-2b5443e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22819%3A%20CWE-366%3A%20Race%20Condition%20within%20a%20Thread%20in%20akinloluwami%20outray&amp;severity=medium&amp;id=6967de03d0ff220b953260fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22787-cwe-79-improper-neutralization-of-i-9574b0d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22787%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eKoopmans%20html2pdf.js&amp;severity=high&amp;id=6967e9c5f809b25a98cd9f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22779-cwe-113-improper-neutralization-of--173940b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22779%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20Neoteroi%20BlackSheep&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21889-cwe-284-improper-access-control-in--1c6049c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21889%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=6967c8edd0ff220b95d99078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37181-vulnerability-in-hewlett-packard-en-fae182dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37181%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=high&amp;id=6967c568d0ff220b95b357e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37185-vulnerability-in-hewlett-packard-en-ecdfaf9e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37185%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=medium&amp;id=6967c568d0ff220b95b357ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37184-vulnerability-in-hewlett-packard-en-f41d52da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37184%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=critical&amp;id=6967c568d0ff220b95b357ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37183-vulnerability-in-hewlett-packard-en-29fa7cd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37183%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=high&amp;id=6967c568d0ff220b95b357e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37182-vulnerability-in-hewlett-packard-en-45744db8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37182%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=high&amp;id=6967c568d0ff220b95b357e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14242-integer-overflow-or-wraparound-in-r-c62b4962</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14242%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6967b759d0ff220b956d62cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-agents-are-becoming-privilege-escalation-paths-13828f5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Agents%20Are%20Becoming%20Authorization%20Bypass%20Paths&amp;severity=medium&amp;id=6967bf72d0ff220b959531d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22820-cwe-367-time-of-check-time-of-use-t-8ccdd136</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22820%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20akinloluwami%20outray&amp;severity=medium&amp;id=6967b3d8d0ff220b954bfaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redvds-cybercrime-service-disrupted-by-microsoft-a-c57ccfa2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedVDS%20Cybercrime%20Service%20Disrupted%20by%20Microsoft%20and%20Law%20Enforcement&amp;severity=medium&amp;id=6967b01cd0ff220b952e52dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22240-cwe-312-cleartext-storage-of-sensit-5905588f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22240%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967b065d0ff220b95304c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22239-cwe-400-uncontrolled-resource-consu-fbd10b94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22239%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22238-cwe-306-missing-authentication-for--9047ed73</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22238%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22237-cwe-200-exposure-of-sensitive-infor-f5ddd129</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22237%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22236-cwe-287-improper-authentication-in--2b9aa917</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22236%3A%20CWE-287%20Improper%20Authentication%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9142-cwe-22-improper-limitation-of-a-path-8bdd81d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9142%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;).%20in%20checkpoint%20Hramony%20SASE&amp;severity=high&amp;id=6967accdd0ff220b9518529e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sicarii-ransomware-truth-vs-myth-235251a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sicarii%20Ransomware%3A%20Truth%20vs%20Myth&amp;severity=medium&amp;id=6967a966d0ff220b9507e8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-c-ares-dll-side-loading-to-bypass--52eff2b0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20c-ares%20DLL%20Side-Loading%20to%20Bypass%20Security%20and%20Deploy%20Malware&amp;severity=medium&amp;id=6967a91cd0ff220b9503dcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/predator-spyware-turns-failed-attacks-into-intelli-48a342df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Predator%20Spyware%20Turns%20Failed%20Attacks%20Into%20Intelligence%20for%20Future%20Exploits&amp;severity=medium&amp;id=6967a1d08330e067166c873f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14317-cwe-359-exposure-of-private-persona-8d49fc92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14317%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Emaintenance%20Crazy%20Bubble%20Tea&amp;severity=high&amp;id=69679e808330e0671667a5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13175-cwe-549-missing-password-field-mask-102e56e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13175%3A%20CWE-549%20Missing%20Password%20Field%20Masking%20in%20YSoft%20SafeQ%206&amp;severity=medium&amp;id=696790718330e067162c1a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14338-cwe-284-improper-access-control-in--b3e41c5b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14338%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20https%3A%2F%2Fgithub.com%2FShadowBlip%20inputplumber&amp;severity=high&amp;id=696785e78330e06716fcefd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66005-cwe-863-improper-authorization-in-h-069d8bbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66005%3A%20CWE-863%3A%20Improper%20Authorization%20in%20https%3A%2F%2Fgithub.com%2FShadowBlip%20inputplumber&amp;severity=high&amp;id=696785e78330e06716fcefd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fixes-critical-fortisiem-flaw-allowing-un-978a6498</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Fixes%20Critical%20FortiSIEM%20Flaw%20Allowing%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=6967bf72d0ff220b959531d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66169-cypher-injection-in-apache-software-7709fb01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66169%3A%20Cypher%20Injection%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20Neo4j&amp;severity=medium&amp;id=696785e78330e06716fcefdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67859-cwe-287-improper-authentication-in--cbf2ed7a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67859%3A%20CWE-287%3A%20Improper%20Authentication%20in%20https%3A%2F%2Fgithub.com%2Flinrunner%20TLP&amp;severity=medium&amp;id=696782608330e06716f2b246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-64-of-3rd-party-applications-access-s-12ef4635</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Research%3A%2064%25%20of%203rd-Party%20Applications%20Access%20Sensitive%20Data%20Without%20Justification&amp;severity=medium&amp;id=6967bf72d0ff220b959531d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0647-cwe-226-sensitive-information-in-res-be4654e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0647%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20Arm%20Neoverse-N2&amp;severity=high&amp;id=6967aad3d0ff220b950c94e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/robo-advisor-betterment-discloses-data-breach-d4f5764f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Robo-Advisor%20Betterment%20Discloses%20Data%20Breach&amp;severity=medium&amp;id=696777a08330e06716d4231f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0532-cwe-918-server-side-request-forgery--12583095</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0532%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=696770cc8330e06716a7ebca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0529-cwe-129-improper-validation-of-array-7a873c8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0529%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69676d488330e0671697f6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-vulnerabilities-in-forti-ed3747fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20Vulnerabilities%20in%20FortiFone%2C%20FortiSIEM&amp;severity=critical&amp;id=696769928330e067167f6c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-144-firefox-147-patch-high-severity-vulnera-87319021</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20144%2C%20Firefox%20147%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=696769928330e067167f6c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixes-114-windows-flaws-in-january-2026--f28a2b16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Fixes%20114%20Windows%20Flaws%20in%20January%202026%20Patch%2C%20One%20Actively%20Exploited&amp;severity=critical&amp;id=6967bf72d0ff220b959531d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-nodejs-vulnerability-can-cause-server-cra-6450e38b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Node.js%20Vulnerability%20Can%20Cause%20Server%20Crashes%20via%20async_hooks%20Stack%20Overflow&amp;severity=critical&amp;id=6967bf72d0ff220b959531dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15475-cwe-862-missing-authorization-in-pa-598bd777</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15475%3A%20CWE-862%20Missing%20Authorization%20in%20payhere%20PayHere%20Payment%20Gateway&amp;severity=medium&amp;id=69673f948330e06716b84f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15376-cwe-352-cross-site-request-forgery--7e0ceddc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15376%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rndsand81%20Stopwords%20for%20comments&amp;severity=medium&amp;id=69673f948330e06716b84f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14173-cwe-862-missing-authorization-in-pe-02506ee5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14173%3A%20CWE-862%20Missing%20Authorization%20in%20perfitdev%20Perfit%20WooCommerce&amp;severity=medium&amp;id=69673f948330e06716b84f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14846-cwe-352-cross-site-request-forgery--57a0ae63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14846%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20socialchampio%20Auto%20Post%20to%20Social%20Media%20from%20Social%20Champ&amp;severity=medium&amp;id=69673f948330e06716b84f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15513-cwe-863-incorrect-authorization-in--da9ac488</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15513%3A%20CWE-863%20Incorrect%20Authorization%20in%20floattechnologies%20Float%20Payment%20Gateway&amp;severity=medium&amp;id=69673f948330e06716b84f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0741-cwe-79-improper-neutralization-of-in-dba929c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0741%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20electric-studio%20Electric%20Studio%20Download%20Counter&amp;severity=medium&amp;id=69673f948330e06716b84fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15512-cwe-862-missing-authorization-in-ap-2489c516</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15512%3A%20CWE-862%20Missing%20Authorization%20in%20aplazopayment%20Aplazo%20Payment%20Gateway&amp;severity=medium&amp;id=69673f948330e06716b84f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0813-cwe-79-improper-neutralization-of-in-4d411496</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasannasp%20Short%20Link&amp;severity=medium&amp;id=69673f958330e06716b84fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0734-cwe-79-improper-neutralization-of-in-dba6a60d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0734%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dfieldfl%20WP%20Allowed%20Hosts&amp;severity=medium&amp;id=69673f948330e06716b84f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0812-cwe-79-improper-neutralization-of-in-b6ee1ce6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0812%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20guillaumev%20LinkedIn%20SC&amp;severity=medium&amp;id=69673f958330e06716b84fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14770-cwe-89-improper-neutralization-of-s-d50da540</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14770%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tridenttechnolabs%20Shipping%20Rate%20By%20Cities&amp;severity=high&amp;id=69673f948330e06716b84f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0739-cwe-79-improper-neutralization-of-in-520ad265</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webbu%20WMF%20Mobile%20Redirector&amp;severity=medium&amp;id=69673f948330e06716b84fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pluggyape-malware-uses-signal-and-whatsapp-to-targ-c63e8573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PLUGGYAPE%20Malware%20Uses%20Signal%20and%20WhatsApp%20to%20Target%20Ukrainian%20Defense%20Forces&amp;severity=medium&amp;id=6967bf72d0ff220b959531df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15486-cwe-79-improper-neutralization-of-i-3bc01800</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kunzemarketing%20Kunze%20Law&amp;severity=medium&amp;id=69672e018330e067168f4031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14502-cwe-22-improper-limitation-of-a-pat-fd560aec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14502%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20vaghasia3%20News%20and%20Blog%20Designer%20Bundle&amp;severity=critical&amp;id=69672e008330e067168f3fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14854-cwe-862-missing-authorization-in-no-eccb7f97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14854%3A%20CWE-862%20Missing%20Authorization%20in%20nofearinc%20WP-CRM%20System%20%E2%80%93%20Manage%20Clients%20and%20Projects&amp;severity=medium&amp;id=69672e018330e067168f400f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12178-cwe-79-improper-neutralization-of-i-f1518670</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aankit%20SpiceForms%20Form%20Builder&amp;severity=medium&amp;id=69672e008330e067168f3fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14613-cwe-918-server-side-request-forgery-7dc03cb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14613%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20daschmi%20GetContentFromURL&amp;severity=high&amp;id=69672e008330e067168f3fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15021-cwe-79-improper-neutralization-of-i-38ba238a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15021%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gothamdev%20Gotham%20Block%20Extra%20Light&amp;severity=medium&amp;id=69672e018330e067168f401c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15266-cwe-79-improper-neutralization-of-i-d3581586</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ahmadgb%20GeekyBot%20%E2%80%94%20Generate%20AI%20Content%20Without%20Prompt%2C%20Chatbot%20and%20Lead%20Generation&amp;severity=high&amp;id=69672e018330e067168f4020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15020-cwe-22-improper-limitation-of-a-pat-e8336307</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15020%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gothamdev%20Gotham%20Block%20Extra%20Light&amp;severity=medium&amp;id=69672e018330e067168f4018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14464-cwe-200-exposure-of-sensitive-infor-2135fa14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14464%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kiwicommerce%20PDF%20Resume%20Parser&amp;severity=medium&amp;id=69672e008330e067168f3fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14880-cwe-862-missing-authorization-in-ne-57f16c66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14880%3A%20CWE-862%20Missing%20Authorization%20in%20netcashpaynow%20Netcash%20WooCommerce%20Payment%20Gateway&amp;severity=medium&amp;id=69672e018330e067168f4014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14482-cwe-862-missing-authorization-in-cr-8f4a578b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14482%3A%20CWE-862%20Missing%20Authorization%20in%20crushpics%20Crush.pics%20Image%20Optimizer%20%E2%80%93%20Image%20Compression%20and%20Optimization&amp;severity=medium&amp;id=69672e008330e067168f3fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0635-cwe-862-missing-authorization-in-tec-7cefa81a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0635%3A%20CWE-862%20Missing%20Authorization%20in%20techknowprime%20Responsive%20Accordion%20Slider&amp;severity=medium&amp;id=69672e028330e067168f4045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15378-cwe-79-improper-neutralization-of-i-ba2c79e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajseidl%20AJS%20Footnotes&amp;severity=high&amp;id=69672e018330e067168f402d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0678-cwe-89-improper-neutralization-of-sp-4acf0e73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0678%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20logiceverest%20Shipping%20Rates%20by%20City%20for%20WooCommerce&amp;severity=medium&amp;id=69672e028330e067168f4049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15283-cwe-79-improper-neutralization-of-i-8dbfdf0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15283%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeroenpeters1986%20Name%20Directory&amp;severity=high&amp;id=69672e018330e067168f4024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14379-cwe-79-improper-neutralization-of-i-585950f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adoncreatives%20Testimonials%20Creator&amp;severity=medium&amp;id=69672e008330e067168f3fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15377-cwe-352-cross-site-request-forgery--141ac85c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15377%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20abage%20Sosh%20Share%20Buttons&amp;severity=medium&amp;id=69672e018330e067168f4029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14301-cwe-22-improper-limitation-of-a-pat-07697570</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14301%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20woosaai%20Integration%20Opvius%20AI%20for%20WooCommerce&amp;severity=critical&amp;id=69672e008330e067168f3fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0680-cwe-79-improper-neutralization-of-in-74800aee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0680%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vk011%20Real%20Post%20Slider%20Lite&amp;severity=medium&amp;id=69672e028330e067168f404e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14725-cwe-79-improper-neutralization-of-i-c566dc8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sablab%20Internal%20Link%20Builder&amp;severity=medium&amp;id=69672e008330e067168f3fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0717-cwe-200-exposure-of-sensitive-inform-07f89079</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0717%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lottiefile%20LottieFiles&amp;severity=medium&amp;id=69672e028330e067168f4053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14389-cwe-352-cross-site-request-forgery--33d20633</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14389%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20obridgeacademy%20WPBlogSyn&amp;severity=medium&amp;id=69672e008330e067168f3fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14615-cwe-352-cross-site-request-forgery--8be6ea33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14615%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dashboardbuilder%20DASHBOARD%20BUILDER%20%E2%80%93%20WordPress%20plugin%20for%20Charts%20and%20Graphs&amp;severity=high&amp;id=69672e008330e067168f3fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0594-cwe-79-improper-neutralization-of-in-52c6a368</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0594%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mallsop%20List%20Site%20Contributors&amp;severity=medium&amp;id=69672e018330e067168f4036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22718-cwe-78-improper-neutralization-of-s-645c1589</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22718%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Spring%20CLI%20VSCode%20Extension&amp;severity=medium&amp;id=696726f68330e067167ea630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68959-cwe-200-exposure-of-sensitive-infor-f3b7fdc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68959%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68970-cwe-20-improper-input-validation-in-1bf861b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68970%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703d08330e06716e6ab01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68963-cwe-521-weak-password-requirements--931fa1d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68963%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68967-cwe-264-permissions-privileges-and--b0d80b56</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68967%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703d08330e06716e6aaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68966-cwe-200-exposure-of-sensitive-infor-5d3172db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68966%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68965-cwe-200-exposure-of-sensitive-infor-63635eaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68965%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68964-cwe-20-improper-input-validation-in-3736734f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68964%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68969-cwe-362-concurrent-execution-using--e9d3a639</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68969%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703d08330e06716e6aafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68968-cwe-6-j2ee-misconfiguration-insuffi-0c867b76</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68968%3A%20CWE-6%20J2EE%20Misconfiguration%3A%20Insufficient%20Session-ID%20Length%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703d08330e06716e6aaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68962-cwe-362-concurrent-execution-using--28159f71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68962%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68961-cwe-362-concurrent-execution-using--e1ba188a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68961%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68960-cwe-362-concurrent-execution-using--a25faefa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68960%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703cf8330e06716e6aac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68958-cwe-362-concurrent-execution-using--21022c2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68958%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703cf8330e06716e6aab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68957-cwe-362-concurrent-execution-using--a12d414e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68957%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703cf8330e06716e6aab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68956-cwe-362-concurrent-execution-using--b5b1cfa8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68956%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6966f9438330e06716ca9adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68955-cwe-362-concurrent-execution-using--bc6a8cd6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68955%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6966f9438330e06716ca9ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12053-cwe-787-out-of-bounds-write-in-insy-7102c50c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12053%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966f9438330e06716ca9ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12052-cwe-787-out-of-bounds-write-in-insy-83483d0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12052%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966f9438330e06716ca9ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12051-cwe-787-out-of-bounds-write-in-insy-75e654b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12051%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966f9438330e06716ca9ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12050-cwe-787-out-of-bounds-write-in-insy-fd31fbc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12050%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966eeb78330e067167d7c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-14-0f81328d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-14&amp;severity=medium&amp;id=69682fce09a911886913344a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67835-na-8c02ea3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67835%3A%20n%2Fa&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67834-na-25eaab25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67834%3A%20n%2Fa&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67833-na-0aadd67f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67833%3A%20n%2Fa&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70747-na-6eceb0b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70747%3A%20n%2Fa&amp;severity=high&amp;id=6967d6fcd0ff220b9516d4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63644-na-aa49f809</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63644%3A%20n%2Fa&amp;severity=medium&amp;id=6967d6fcd0ff220b9516d49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71021-na-70779c9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71021%3A%20n%2Fa&amp;severity=high&amp;id=6967d378d0ff220b95084e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65397-na-bf9b57ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65397%3A%20n%2Fa&amp;severity=medium&amp;id=6967d378d0ff220b95084e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65396-na-f02ae953</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65396%3A%20n%2Fa&amp;severity=medium&amp;id=6967d002d0ff220b95fb6486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67399-na-e9d40e90</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67399%3A%20n%2Fa&amp;severity=medium&amp;id=6967c1ebd0ff220b95a1807b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70968-na-945bbebb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70968%3A%20n%2Fa&amp;severity=critical&amp;id=6967c1ebd0ff220b95a18078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56226-na-a4085a93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56226%3A%20n%2Fa&amp;severity=medium&amp;id=6967accdd0ff220b9518529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-14-ed203902</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-14&amp;severity=low&amp;id=696757fa8330e0671614d4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22686-cwe-693-protection-mechanism-failur-1e5297be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22686%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20agentfront%20enclave&amp;severity=critical&amp;id=6966d4a6a60475309fc2e5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0716-buffer-access-with-incorrect-length--6cbd3f80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0716%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6966d122a60475309fc20b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23478-cwe-602-client-side-enforcement-of--103cf445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23478%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20calcom%20cal.com&amp;severity=critical&amp;id=6966bf90a60475309fb963d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68947-cwe-862-missing-authorization-in-ns-af41b690</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68947%3A%20CWE-862%20Missing%20Authorization%20in%20NSecsoft%20NSecKrnl&amp;severity=medium&amp;id=6966b887a60475309fb6f589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0543-cwe-20-improper-input-validation-in--f0bbf8e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0543%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=6966b887a60475309fb6f593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0531-cwe-770-allocation-of-resources-with-c6d54bb3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0531%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=6966b887a60475309fb6f590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0530-cwe-770-allocation-of-resources-with-639320fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0530%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=6966b503a60475309fb63c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0528-cwe-129-improper-validation-of-array-9efcc787</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0528%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Metricbeat&amp;severity=medium&amp;id=6966b503a60475309fb63c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-exploited-windows-zero-day-111-o-50da8e88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Exploited%20Windows%20Zero-Day%2C%20111%20Other%20Vulnerabilities&amp;severity=medium&amp;id=6966a33da60475309fab3bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22871-cwe-22-improper-limitation-of-a-pat-7c90d0ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22871%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DataDog%20guarddog&amp;severity=high&amp;id=6966b182a60475309fb4b276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22870-cwe-409-improper-handling-of-highly-2e700db7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22870%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20DataDog%20guarddog&amp;severity=high&amp;id=6966b182a60475309fb4b272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15056-cwe-74-improper-neutralization-of-s-63bac5ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15056%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Slab%20Quill&amp;severity=medium&amp;id=6966b182a60475309fb4b26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22869-cwe-94-improper-control-of-generati-ef740212</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22869%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20eigent-ai%20eigent&amp;severity=high&amp;id=6966adfba60475309fb28999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22868-cwe-20-improper-input-validation-in-8854a076</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22868%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ethereum%20go-ethereum&amp;severity=high&amp;id=6966adfba60475309fb28995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22862-cwe-20-improper-input-validation-in-81bb4629</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22862%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ethereum%20go-ethereum&amp;severity=high&amp;id=6966adfba60475309fb28991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22861-cwe-252-unchecked-return-value-in-i-cb241259</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22861%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6966bf90a60475309fb963cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21301-null-pointer-dereference-cwe-476-in-31260b18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21301%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966bf90a60475309fb963e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21299-out-of-bounds-write-cwe-787-in-adob-dab34463</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21299%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=6966bf90a60475309fb963e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21298-out-of-bounds-write-cwe-787-in-adob-d04f0a45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21298%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=6966bc0ba60475309fb87b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21300-null-pointer-dereference-cwe-476-in-b283b402</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21300%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966e30ba60475309f63f224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21303-out-of-bounds-read-cwe-125-in-adobe-3f2489e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21303%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966e30ba60475309f63f22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21302-out-of-bounds-read-cwe-125-in-adobe-aac579fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21302%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966e30ba60475309f63f227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37186-vulnerability-in-hewlett-packard-en-ffaa4463</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37186%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Virtual%20Intranet%20Access%20(VIA)&amp;severity=high&amp;id=6966e30ba60475309f63f221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37179-vulnerability-in-hewlett-packard-en-57d0742d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37179%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb0883d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37178-vulnerability-in-hewlett-packard-en-2fe753cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37178%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb0883a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37177-vulnerability-in-hewlett-packard-en-b5cd1b64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37177%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb08837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37176-vulnerability-in-hewlett-packard-en-ac7edbf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37176%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb08834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37175-vulnerability-in-hewlett-packard-en-c6d1e731</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37175%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21308-out-of-bounds-read-cwe-125-in-adobe-bd88ab9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21308%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=6966aa79a60475309fb08853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21307-out-of-bounds-write-cwe-787-in-adob-8d50c26a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21307%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=6966aa79a60475309fb08850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/direct-and-reverse-nfc-relay-attacks-being-used-to-2de4fe54</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Direct%20and%20reverse%20NFC%20relay%20attacks%20being%20used%20to%20steal%20money%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6966a72ea60475309faf515d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37174-vulnerability-in-hewlett-packard-en-7b5a2eb2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37174%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb0882e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37173-vulnerability-in-hewlett-packard-en-17519006</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37173%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb0882b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37172-vulnerability-in-hewlett-packard-en-3026c02b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37172%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37171-vulnerability-in-hewlett-packard-en-03bd6576</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37171%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37170-vulnerability-in-hewlett-packard-en-d82bf12b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37170%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37169-vulnerability-in-hewlett-packard-en-6bff60b2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37169%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966a6f3a60475309faf46db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37168-vulnerability-in-hewlett-packard-en-2c275581</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37168%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966a6f3a60475309faf46d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21306-out-of-bounds-write-cwe-787-in-adob-eac442d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21306%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=high&amp;id=6966e30ba60475309f63f22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-critical-apache-tika-bug-in-coldfusi-0df4d5be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Critical%20Apache%20Tika%20Bug%20in%20ColdFusion&amp;severity=critical&amp;id=6966a33da60475309fab3baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22817-cwe-347-improper-verification-of-cr-d41263e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22817%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20honojs%20hono&amp;severity=high&amp;id=6966a38da60475309fabea79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22818-cwe-347-improper-verification-of-cr-8537c4c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22818%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20honojs%20hono&amp;severity=high&amp;id=6966a38da60475309fabea7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21287-use-after-free-cwe-416-in-adobe-sub-3bd7fe33</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21287%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6966a38da60475309fabea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22814-cwe-915-improperly-controlled-modif-4d391c99</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22814%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20adonisjs%20lucid&amp;severity=high&amp;id=6966a38da60475309fabea81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-magecart-network-uncovered-disrupting-online-s-4ec647ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Magecart%20Network%20Uncovered%3A%20Disrupting%20Online%20Shoppers%20Worldwide&amp;severity=medium&amp;id=696777e78330e06716d549fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22809-cwe-1333-inefficient-regular-expres-f95190c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22809%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20AmauriC%20tarteaucitron.js&amp;severity=medium&amp;id=69669feba60475309fa994da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21305-out-of-bounds-write-cwe-787-in-adob-64ad7065</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21305%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=69669feba60475309fa994d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68925-cwe-347-improper-verification-of-cr-5efac3a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68925%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20samrocketman%20jervis&amp;severity=medium&amp;id=69669feba60475309fa994ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68704-cwe-330-use-of-insufficiently-rando-e98de218</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68704%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68703-cwe-326-inadequate-encryption-stren-990b39e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68703%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68702-cwe-327-use-of-a-broken-or-risky-cr-f132ccf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68702%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68701-cwe-327-use-of-a-broken-or-risky-cr-4c22d348</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68701%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68931-cwe-287-improper-authentication-in--2b2fc86c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68931%3A%20CWE-287%3A%20Improper%20Authentication%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669c68a60475309fa82b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68698-cwe-327-use-of-a-broken-or-risky-cr-b21acaf5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68698%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669c68a60475309fa82b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/january-2026-microsoft-patch-tuesday-summary-tue-j-0a0405a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=January%202026%20Microsoft%20Patch%20Tuesday%20Summary%2C%20(Tue%2C%20Jan%2013th)&amp;severity=medium&amp;id=696698b5a60475309fa620ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21283-heap-based-buffer-overflow-cwe-122--ef8206b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21283%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=696698e5a60475309fa629b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21281-heap-based-buffer-overflow-cwe-122--54422115</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21281%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69669561a60475309fa56558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68949-cwe-134-use-of-externally-controlle-38c1a8e5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68949%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69669561a60475309fa56543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21280-untrusted-search-path-cwe-426-in-ad-c0a78b01</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21280%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69669561a60475309fa56555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21288-null-pointer-dereference-cwe-476-in-24b1dbbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21288%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69669561a60475309fa5655b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21277-heap-based-buffer-overflow-cwe-122--099a2ea6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21277%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa5654f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21304-heap-based-buffer-overflow-cwe-122--1e19d0a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21304%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa5655e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21275-access-of-uninitialized-pointer-cwe-66ab4305</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21275%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa56549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21278-out-of-bounds-read-cwe-125-in-adobe-7916f80b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21278%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69669561a60475309fa56552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21276-access-of-uninitialized-pointer-cwe-d7c4dc57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21276%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa5654c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68271-cwe-95-improper-neutralization-of-d-1211a650</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68271%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20OpenC3%20cosmos&amp;severity=critical&amp;id=69669561a60475309fa56540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21267-improper-neutralization-of-special--6f519a3b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21267%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21271-improper-input-validation-cwe-20-in-85aaadc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21271%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21274-incorrect-authorization-cwe-863-in--714788af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21274%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21272-improper-input-validation-cwe-20-in-c05090a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21272%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21268-improper-input-validation-cwe-20-in-ef4cc6cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21268%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21226-cwe-502-deserialization-of-untruste-4efdfff3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21226%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20Core%20shared%20client%20library%20for%20Python&amp;severity=high&amp;id=69668e5fa60475309fa0810b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20941-cwe-59-improper-link-resolution-bef-c8d2e5a9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20941%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae4a60475309f9ae208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20958-cwe-918-server-side-request-forgery-a336cafb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20958%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69668ae6a60475309f9ae265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20957-cwe-191-integer-underflow-wrap-or-w-beace7a9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20957%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae6a60475309f9ae262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20952-cwe-416-use-after-free-in-microsoft-148a371b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20952%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20950-cwe-416-use-after-free-in-microsoft-49c6cffa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20950%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20949-cwe-284-improper-access-control-in--f5d5f45b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20949%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20948-cwe-822-untrusted-pointer-dereferen-af2d5ad6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20948%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20939-cwe-200-exposure-of-sensitive-infor-f6b76fca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20939%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20937-cwe-200-exposure-of-sensitive-infor-7471f287</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20937%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20936-cwe-125-out-of-bounds-read-in-micro-fe2e6d31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20936%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20935-cwe-822-untrusted-pointer-dereferen-727d597e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20935%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668ae4a60475309f9ae1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20931-cwe-73-external-control-of-file-nam-d54e259d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20931%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20929-cwe-284-improper-access-control-in--e2a17c27</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20929%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20874-cwe-362-concurrent-execution-using--37162a65</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20874%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20873-cwe-362-concurrent-execution-using--ba55325a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20873%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae16c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20872-cwe-73-external-control-of-file-nam-11a37ee2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20872%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae1a60475309f9ae169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20871-cwe-416-use-after-free-in-microsoft-bfbec2c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20871%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69668ae1a60475309f9ae166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20870-cwe-416-use-after-free-in-microsoft-2d7ed236</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20870%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae1a60475309f9ae163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20868-cwe-122-heap-based-buffer-overflow--bc12b543</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20868%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20867-cwe-362-concurrent-execution-using--2fb4c3f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20867%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20866-cwe-362-concurrent-execution-using--06e586bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20866%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20863-cwe-415-double-free-in-microsoft-wi-29a97616</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20863%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668ae0a60475309f9ae12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20862-cwe-200-exposure-of-sensitive-infor-f29a4bfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20862%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668ae0a60475309f9ae12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20861-cwe-362-concurrent-execution-using--6d97d24b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20861%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21219-cwe-416-use-after-free-in-microsoft-32eb6c70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21219%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20SDK&amp;severity=high&amp;id=69668ae6a60475309f9ae274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20854-cwe-416-use-after-free-in-microsoft-6a50b1f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20854%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae0a60475309f9ae0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20853-cwe-362-concurrent-execution-using--5ea47f9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20853%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20849-cwe-807-reliance-on-untrusted-input-9e4224ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20849%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20848-cwe-362-concurrent-execution-using--ca362173</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20848%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20843-cwe-284-improper-access-control-in--64bb6f45</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20843%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20947-cwe-89-improper-neutralization-of-s-0db09315</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20947%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69668ae5a60475309f9ae22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21224-cwe-121-stack-based-buffer-overflow-61104c02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21224%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=69668ae6a60475309f9ae27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21221-cwe-362-concurrent-execution-using--975da00a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21221%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae6a60475309f9ae277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20830-cwe-362-concurrent-execution-using--95441eb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20830%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%20Server%202025&amp;severity=high&amp;id=69668adda60475309f9adfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20963-cwe-502-deserialization-of-untruste-a7ea6daa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20963%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=critical&amp;id=69668ae6a60475309f9ae26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20959-cwe-79-improper-neutralization-of-i-fd5c91f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20959%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69668ae6a60475309f9ae268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20956-cwe-822-untrusted-pointer-dereferen-ab8c056c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20956%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae6a60475309f9ae25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20955-cwe-822-untrusted-pointer-dereferen-7f81c789</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20955%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20953-cwe-416-use-after-free-in-microsoft-f245d44e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20953%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20951-cwe-20-improper-input-validation-in-ba0ca05b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20951%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69668ae5a60475309f9ae23b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20946-cwe-125-out-of-bounds-read-in-micro-902c6400</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20946%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20944-cwe-125-out-of-bounds-read-in-micro-c19f96ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20944%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20943-cwe-426-untrusted-search-path-in-mi-2b8c5ec3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20943%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20Office%202016&amp;severity=high&amp;id=69668ae4a60475309f9ae20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20940-cwe-822-untrusted-pointer-dereferen-95beac17</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20940%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae4a60475309f9ae205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20938-cwe-822-untrusted-pointer-dereferen-78e0153f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20938%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668ae4a60475309f9ae1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20934-cwe-362-concurrent-execution-using--ef76d3ad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20934%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae4a60475309f9ae1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20932-cwe-200-exposure-of-sensitive-infor-cb74b003</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20932%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20927-cwe-362-concurrent-execution-using--66aed030</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20927%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae3a60475309f9ae1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20926-cwe-362-concurrent-execution-using--645ca07f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20926%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20925-cwe-73-external-control-of-file-nam-36e34a31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20925%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae3a60475309f9ae1cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20924-cwe-416-use-after-free-in-microsoft-8d0061e1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20924%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae3a60475309f9ae1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20923-cwe-416-use-after-free-in-microsoft-2035408f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20923%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae3a60475309f9ae1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20922-cwe-122-heap-based-buffer-overflow--dbc11d35</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20922%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20921-cwe-362-concurrent-execution-using--88a80120</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20921%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20920-cwe-416-use-after-free-in-microsoft-a1bff524</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20920%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668ae3a60475309f9ae1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20919-cwe-362-concurrent-execution-using--d977d261</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20919%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae1a60475309f9ae17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20918-cwe-362-concurrent-execution-using--8643b6f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20918%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20877-cwe-416-use-after-free-in-microsoft-f6917a76</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20877%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20876-cwe-122-heap-based-buffer-overflow--52744e00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20876%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668ae1a60475309f9ae175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20875-cwe-476-null-pointer-dereference-in-4a071c7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20875%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae1a60475309f9ae172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20869-cwe-362-concurrent-execution-using--e8bd4abd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20869%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20865-cwe-416-use-after-free-in-microsoft-c0ec4798</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20865%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20864-cwe-122-heap-based-buffer-overflow--344e47f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20864%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20860-cwe-843-access-of-resource-using-in-cd4b05aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20860%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20859-cwe-416-use-after-free-in-microsoft-6ca956c9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20859%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae0a60475309f9ae10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20858-cwe-416-use-after-free-in-microsoft-0d710ae0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20858%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20857-cwe-822-untrusted-pointer-dereferen-358eda2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20857%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20856-cwe-20-improper-input-validation-in-2ac6a21a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20856%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20852-cwe-266-incorrect-privilege-assignm-a2ac47df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20852%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20851-cwe-125-out-of-bounds-read-in-micro-8ff7b70d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20851%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69668ae0a60475309f9ae0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20847-cwe-200-exposure-of-sensitive-infor-f86fc0ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20847%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adea60475309f9ae0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20844-cwe-416-use-after-free-in-microsoft-30bd69d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20844%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20842-cwe-416-use-after-free-in-microsoft-6b3ebf07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20842%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69668adea60475309f9ae09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20840-cwe-122-heap-based-buffer-overflow--82f0ae34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20840%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20839-cwe-284-improper-access-control-in--901aa39c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20839%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adea60475309f9ae097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20838-cwe-209-generation-of-error-message-b965f687</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20838%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668adea60475309f9ae094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20837-cwe-122-heap-based-buffer-overflow--7fb07bde</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20837%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668adea60475309f9ae091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20836-cwe-362-concurrent-execution-using--af7fa2bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20836%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20835-cwe-125-out-of-bounds-read-in-micro-e51ca40b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20835%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69668adea60475309f9ae08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20834-cwe-36-absolute-path-traversal-in-m-286b7b9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20834%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adda60475309f9adff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20833-cwe-327-use-of-a-broken-or-risky-cr-02f04bb4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20833%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=69668adda60475309f9adff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20832-cwe-415-double-free-in-microsoft-wi-7f9e3ab4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20832%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adda60475309f9adfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20831-cwe-367-time-of-check-time-of-use-t-cb44d8e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20831%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adda60475309f9adfea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20829-cwe-125-out-of-bounds-read-in-micro-39bfeac9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20829%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668adda60475309f9adfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20828-cwe-125-out-of-bounds-read-in-micro-20d87af8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20828%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adda60475309f9adfe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20827-cwe-200-exposure-of-sensitive-infor-0d63ab39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20827%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adda60475309f9adfde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20826-cwe-362-concurrent-execution-using--6a9445aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20826%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adda60475309f9adfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20825-cwe-284-improper-access-control-in--703830df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20825%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668adda60475309f9adfd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20824-cwe-693-protection-mechanism-failur-f69f8ff3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20824%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adba60475309f9adfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20823-cwe-200-exposure-of-sensitive-infor-067b7234</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20823%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adba60475309f9adfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20822-cwe-416-use-after-free-in-microsoft-0fcc9563</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20822%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adba60475309f9adfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20821-cwe-200-exposure-of-sensitive-infor-738c00a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20821%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adba60475309f9adf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20820-cwe-122-heap-based-buffer-overflow--dbea749a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20820%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adba60475309f9adf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20819-cwe-822-untrusted-pointer-dereferen-e80e9055</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20819%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668adba60475309f9adf97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20818-cwe-532-insertion-of-sensitive-info-f651f2b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20818%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=69668adba60475309f9adf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20817-cwe-280-improper-handling-of-insuff-db913280</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20817%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69668adba60475309f9adf91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20816-cwe-367-time-of-check-time-of-use-t-07436142</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20816%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adba60475309f9adf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20815-cwe-362-concurrent-execution-using--bf377b09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20815%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668adba60475309f9adf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20814-cwe-362-concurrent-execution-using--0592d606</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20814%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adaa60475309f9adf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20812-cwe-20-improper-input-validation-in-fcd02ec4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20812%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adaa60475309f9adf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20811-cwe-843-access-of-resource-using-in-11467ead</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20811%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668adaa60475309f9adf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20810-cwe-590-free-of-memory-not-on-the-h-606ebe1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20810%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668adaa60475309f9adf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20809-cwe-367-time-of-check-time-of-use-t-2ee5fd97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20809%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adaa60475309f9adf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20808-cwe-362-concurrent-execution-using--d5b3c16c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20808%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668adaa60475309f9adf3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20805-cwe-200-exposure-of-sensitive-infor-5ffd2065</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20805%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adaa60475309f9adf3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20804-cwe-266-incorrect-privilege-assignm-e0828e3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20804%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adaa60475309f9adf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20965-cwe-347-improper-verification-of-cr-c652ba2c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20965%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Windows%20Admin%20Center%20in%20Azure%20Portal&amp;severity=high&amp;id=69668ae6a60475309f9ae271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20803-cwe-306-missing-authentication-for--5085f96c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20803%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20(GDR)&amp;severity=high&amp;id=69668adaa60475309f9adf34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0386-cwe-284-improper-access-control-in-m-c9a25aee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0386%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=69668adaa60475309f9adf31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21265-cwe-1329-reliance-on-component-that-4c5b2422</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21265%3A%20CWE-1329%20-%20Reliance%20on%20Component%20That%20is%20Not%20Updateable%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae7a60475309f9ae299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20962-cwe-908-use-of-uninitialized-resour-df000b33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20962%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668ae6a60475309f9ae26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37166-vulnerability-in-hewlett-packard-en-6f8b03b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37166%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Instant%20On&amp;severity=high&amp;id=69668750a60475309f98298f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37165-vulnerability-in-hewlett-packard-en-4b4e9567</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37165%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Instant%20On&amp;severity=high&amp;id=69668750a60475309f98298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/long-running-web-skimming-campaign-steals-credit-c-759ec50f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Long-Running%20Web%20Skimming%20Campaign%20Steals%20Credit%20Cards%20From%20Online%20Checkout%20Pages&amp;severity=medium&amp;id=6966f7db8330e06716c60389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10865-cwe-416-use-after-free-in-imaginati-6a65b1a6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10865%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=696683cba60475309f96bab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-extension-steals-mexc-api-keys-by-c3a58eea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20Extension%20Steals%20MEXC%20API%20Keys%20by%20Masquerading%20as%20Trading%20Tool&amp;severity=medium&amp;id=69668011a60475309f936e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gobruteforcer-botnet-targeting-crypto-blockchain-p-47c3e17d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoBruteforcer%20Botnet%20Targeting%20Crypto%2C%20Blockchain%20Projects&amp;severity=medium&amp;id=69668026a60475309f9370f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/after-goldman-jpmorgan-discloses-law-firm-data-bre-6ccb5b67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=After%20Goldman%2C%20JPMorgan%20Discloses%20Law%20Firm%20Data%20Breach&amp;severity=high&amp;id=69667c91a60475309f91e05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-external-attack-surface-manage-d414178f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20External%20Attack%20Surface%20Management&amp;severity=medium&amp;id=69667c91a60475309f91e061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58411-cwe-416-use-after-free-in-imaginati-ec4e5c38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58411%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69667940a60475309f8fa685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58409-cwe-cwe-119-improper-restriction-of-54854673</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58409%3A%20CWE%20-%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=low&amp;id=69667940a60475309f8fa694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62182-cwe-434-unrestricted-upload-of-file-6a1e4239</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62182%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69667940a60475309f8fa69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46685-cwe-378-creation-of-temporary-file--bc94129f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46685%3A%20CWE-378%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Dell%20SupportAssist%20OS%20Recovery&amp;severity=high&amp;id=69667940a60475309f8fa68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8090-cwe-476-null-pointer-dereference-in--6bfd7f9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8090%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20BlackBerry%20Ltd%20QNX%20Software%20Development%20Platform&amp;severity=medium&amp;id=69667941a60475309f8fa6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25249-execute-unauthorized-code-or-comman-3d27fe27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25249%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchManager&amp;severity=high&amp;id=69667940a60475309f8fa68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47855-improper-access-control-in-fortinet-68522f01</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47855%3A%20Improper%20access%20control%20in%20Fortinet%20FortiFone&amp;severity=critical&amp;id=69667940a60475309f8fa691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67685-improper-access-control-in-fortinet-90f881f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67685%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSandbox&amp;severity=low&amp;id=69667941a60475309f8fa6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58693-execute-unauthorized-code-or-comman-1e3177e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58693%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=medium&amp;id=69667940a60475309f8fa697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59922-execute-unauthorized-code-or-comman-792f3b01</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59922%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69667940a60475309f8fa69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64155-execute-unauthorized-code-or-comman-f410151b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64155%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=critical&amp;id=69667941a60475309f8fa6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25176-cwe-668-exposure-of-resource-to-wro-61b7925a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25176%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=69667940a60475309f8fa688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46684-cwe-378-creation-of-temporary-file--80177220</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46684%3A%20CWE-378%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Dell%20SupportAssist%20OS%20Recovery%2C&amp;severity=medium&amp;id=69667237a60475309f879e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowreactor-text-only-staging-net-reactor-and-in-251b7c29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SHADOW%23REACTOR%20%E2%80%93%20Text-Only%20Staging%2C%20.NET%20Reactor%2C%20and%20In-Memory%20Remcos%20RAT%20Deployments&amp;severity=medium&amp;id=69667238a60475309f879f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0404-cwe-20-improper-input-validation-in--bddf293f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0404%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20RBRE960&amp;severity=medium&amp;id=69667237a60475309f879e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0408-cwe-287-improper-authentication-in-n-beccef9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0408%3A%20CWE-287%20Improper%20Authentication%20in%20NETGEAR%20EX5000&amp;severity=medium&amp;id=69667237a60475309f879ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0407-cwe-287-improper-authentication-in-n-f2489e2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0407%3A%20CWE-287%20Improper%20Authentication%20in%20NETGEAR%20EX5000&amp;severity=medium&amp;id=69667237a60475309f879ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0406-cwe-20-improper-input-validation-in--29284271</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0406%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20XR1000v2&amp;severity=medium&amp;id=69667237a60475309f879eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0405-cwe-287-improper-authentication-in-n-30e6359b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0405%3A%20CWE-287%20Improper%20Authentication%20in%20NETGEAR%20RBE970&amp;severity=medium&amp;id=69667237a60475309f879e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0403-cwe-20-improper-input-validation-in--470465b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0403%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20RBR750&amp;severity=low&amp;id=69667237a60475309f879e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12548-missing-authentication-for-critical-ed788dc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12548%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Dev%20Spaces%20(RHOSDS)%203.22&amp;severity=critical&amp;id=696667b3a60475309f7ab4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68812-dd52420d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68812&amp;severity=null&amp;id=69cfe09b0a160ebd923e33d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68789-a37e1fae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68789&amp;severity=null&amp;id=698b1e0c4b57a58fa101b8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22755-cwe-77-improper-neutralization-of-s-1e56c0a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22755%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Vivotek%20Affected%20device%20model%20numbers%20are%20FD8365%2C%20FD8365v2%2C%20FD9165%2C%20FD9171%2C%20FD9187%2C%20FD9189%2C%20FD9365%2C%20FD9371%2C%20FD9381%2C%20FD9387%2C%20FD9389%2C%20FD9391%2CFE9180%2CFE9181%2C%20FE9191%2C%20FE9381%2C%20FE9382%2C%20FE9391%2C%20FE9582%2C%20IB9365%2C%20IB93587LPR%2C%20IB9371%2CIB9381%2C%20IB9387%2C%20IB9389%2C%20IB939%2CIP9165%2CIP9171%2C%20IP9172%2C%20IP9181%2C%20IP9191%2C%20IT9389%2C%20MA9321%2C%20MA9322%2C%20MS9321%2C%20MS9390%2C%20TB9330&amp;severity=critical&amp;id=69666427a60475309f6cdbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36640-cwe-269-improper-privilege-manageme-af9418e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36640%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tenable%20Nessus%20Agent&amp;severity=high&amp;id=69666427a60475309f6cdbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13447-improper-neutralization-of-special--5a4b73a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13447%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(%E2%80%98OS%20Command%20Injection%E2%80%99)%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=6966bf90a60475309fb963dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13444-improper-neutralization-of-special--77de4d98</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13444%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(%E2%80%98OS%20Command%20Injection%E2%80%99)%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=6966bf90a60475309fb963d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11669-cwe-862-missing-authorization-in-zo-724214ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11669%3A%20CWE-862%20Missing%20Authorization%20in%20Zohocorp%20ManageEngine%20PAM360&amp;severity=high&amp;id=6966562fa60475309f43a465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broadcom-wi-fi-chipset-flaw-allows-hackers-to-disr-0206332a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broadcom%20Wi-Fi%20Chipset%20Flaw%20Allows%20Hackers%20to%20Disrupt%20Networks&amp;severity=low&amp;id=696655e4a60475309f434006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-cloud-native-malware-framework-ecbed222</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Cloud-Native%20Malware%20Framework&amp;severity=medium&amp;id=69666b30a60475309f804a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14507-cwe-200-exposure-of-sensitive-infor-9112b77d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14507%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=69664f10a60475309f2ea2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0684-cwe-863-incorrect-authorization-in-c-5b13dd45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0684%3A%20CWE-863%20Incorrect%20Authorization%20in%20codepeople%20CP%20Image%20Store%20with%20Slideshow&amp;severity=medium&amp;id=69664f10a60475309f2ea2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-agentic-ai-from-mcps-and-tool-access-to-s-dd229501</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20Agentic%20AI%3A%20From%20MCPs%20and%20Tool%20Access%20to%20Shadow%20API%20Key%20Sprawl&amp;severity=low&amp;id=6966f7db8330e06716c6038c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9427-cwe-79-improper-neutralization-of-in-3ad08fb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lemonsoft%20WordPress%20add-on&amp;severity=high&amp;id=69664f10a60475309f2ea2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11250-cwe-290-authentication-bypass-by-sp-31d0f606</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11250%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Zohocorp%20ManageEngine%20ADSelfService%20Plus&amp;severity=critical&amp;id=69664f10a60475309f2ea2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0892-vulnerability-in-mozilla-firefox-1157939b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0892%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f11a60475309f2ea33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0891-vulnerability-in-mozilla-firefox-c08e04a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0891%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f11a60475309f2ea335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0890-vulnerability-in-mozilla-firefox-d91c4f97</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0890%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0889-vulnerability-in-mozilla-firefox-c19e8484</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0889%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f11a60475309f2ea32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0888-vulnerability-in-mozilla-firefox-a799450f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0888%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0887-vulnerability-in-mozilla-firefox-b5bf8224</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0887%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0886-vulnerability-in-mozilla-firefox-455bedfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0886%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0885-vulnerability-in-mozilla-firefox-147b2e6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0885%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0884-vulnerability-in-mozilla-firefox-f8f10b5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0884%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f11a60475309f2ea313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0883-vulnerability-in-mozilla-firefox-48090893</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0883%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0882-vulnerability-in-mozilla-firefox-86ba16c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0882%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0881-vulnerability-in-mozilla-firefox-ebe6a0d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0881%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f10a60475309f2ea2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0880-vulnerability-in-mozilla-firefox-f691ebc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0880%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0879-vulnerability-in-mozilla-firefox-70135ce7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0879%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f10a60475309f2ea2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0878-vulnerability-in-mozilla-firefox-f20e910c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0878%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0877-vulnerability-in-mozilla-firefox-52c9d00a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0877%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9435-cwe-22-improper-limitation-of-a-path-8ebb819b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9435%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zohocorp%20ManageEngine%20ADManager%20Plus&amp;severity=medium&amp;id=69664b8ba60475309f2116b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13774-cwe-89-improper-neutralization-of-s-316c0137</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13774%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=6966562fa60475309f43a468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/saps-january-2026-security-updates-patch-critical--f6b732fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%E2%80%99s%20January%202026%20Security%20Updates%20Patch%20Critical%20Vulnerabilities&amp;severity=critical&amp;id=696639c3a60475309febac2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-advanced-linux-voidlink-malware-targets-cloud--d0914fd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Advanced%20Linux%20VoidLink%20Malware%20Targets%20Cloud%20and%20container%20Environments&amp;severity=medium&amp;id=6966f7db8330e06716c6038f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-should-we-learn-from-how-attackers-leveraged--45d98537</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20Should%20We%20Learn%20From%20How%20Attackers%20Leveraged%20AI%20in%202025%3F&amp;severity=medium&amp;id=696632baa60475309fdb65a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0859-cwe-502-deserialization-of-untrusted-05d55b62</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0859%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=69663672a60475309fe49827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59022-cwe-862-missing-authorization-in-ty-c6fc6833</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59022%3A%20CWE-862%20Missing%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=high&amp;id=69663672a60475309fe49821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59021-cwe-862-missing-authorization-in-ty-d2447066</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59021%3A%20CWE-862%20Missing%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=69663672a60475309fe4981b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59020-cwe-863-incorrect-authorization-in--f531f3c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59020%3A%20CWE-863%20Incorrect%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=69663672a60475309fe49815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-port-hacker-sentenced-to-prison-701774d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Port%20Hacker%20Sentenced%20to%20Prison&amp;severity=medium&amp;id=696632d8a60475309fdc8ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/servicenow-patches-critical-ai-platform-flaw-allow-e4021d47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ServiceNow%20Patches%20Critical%20AI%20Platform%20Flaw%20Allowing%20Unauthenticated%20User%20Impersonation&amp;severity=critical&amp;id=696632baa60475309fdb65a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14001-cwe-862-missing-authorization-in-ni-8efab0e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14001%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20WP%20Duplicate%20Page&amp;severity=medium&amp;id=69662f6ba60475309fd33d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spanish-energy-company-endesa-hacked-521d8746</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spanish%20Energy%20Company%20Endesa%20Hacked&amp;severity=medium&amp;id=696624aca60475309fc1fee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40944-cwe-400-uncontrolled-resource-consu-ae6588f9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40944%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20SIMATIC%20ET%20200AL%20IM%20157-1%20PN&amp;severity=high&amp;id=696616cfa60475309f9ce613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40942-cwe-250-execution-with-unnecessary--c991f78f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40942%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Siemens%20TeleControl%20Server%20Basic&amp;severity=high&amp;id=696616cfa60475309f9ce60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40805-cwe-639-authorization-bypass-throug-65406d33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40805%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Siemens%20Industrial%20Edge%20Cloud%20Device%20(IECD)&amp;severity=critical&amp;id=696616cfa60475309f9ce608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-campaign-delivers-remcos-rat-through-m-9fb43d9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Campaign%20Delivers%20Remcos%20RAT%20Through%20Multi-Stage%20Windows%20Attack&amp;severity=low&amp;id=6966f7db8330e06716c60392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-fraud-overtakes-ransomware-as-top-ceo-concer-1e5b19e9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Fraud%20Overtakes%20Ransomware%20as%20Top%20CEO%20Concern%3A%20WEF&amp;severity=medium&amp;id=69660184a60475309f5f3bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41717-cwe-94-improper-control-of-generati-8b7f95c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41717%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Phoenix%20Contact%20TC%20ROUTER%203002T-3G&amp;severity=high&amp;id=6965faafa60475309f41c759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-exploitation-of-gogs-vulnerab-9dfef5b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Exploitation%20of%20Gogs%20Vulnerability%20Enabling%20Code%20Execution&amp;severity=high&amp;id=6966f7db8330e06716c60395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unveiling-voidlink-a-stealthy-cloud-native-linux-m-b6da384d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unveiling%20VoidLink%20%E2%80%93%20A%20Stealthy%2C%20Cloud-Native%20Linux%20Malware%20Framework&amp;severity=medium&amp;id=6965e91ba60475309ffb8736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14829-cwe-862-missing-authorization-in-e--73c33d17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14829%3A%20CWE-862%20Missing%20Authorization%20in%20E-xact%20%7C%20Hosted%20Payment%20%7C&amp;severity=critical&amp;id=6965e214a60475309fe0da9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10915-cwe-862-missing-authorization-in-dr-ef19f079</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10915%3A%20CWE-862%20Missing%20Authorization%20in%20Dreamer%20Blog&amp;severity=critical&amp;id=6965e214a60475309fe0da99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66177-vulnerability-in-hikvision-ds-96xxx-8679cdd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66177%3A%20Vulnerability%20in%20Hikvision%20DS-96xxxNI-Hx&amp;severity=high&amp;id=6965b0daa60475309ff8e4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66176-vulnerability-in-hikvision-ds-k1t33-eda72d38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66176%3A%20Vulnerability%20in%20Hikvision%20DS-K1T331&amp;severity=high&amp;id=6965b0daa60475309ff8e4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0514-cwe-79-improper-neutralization-of-in-209301b8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0514%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6965a2cda60475309fcd6857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0513-cwe-601-url-redirection-to-untrusted-6bfbb03e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0513%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(SICF%20Handler%20in%20SRM%20Catalog)&amp;severity=medium&amp;id=6965a2cda60475309fcd6853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0511-cwe-862-missing-authorization-in-sap-dcd1fde6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0511%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=high&amp;id=6965a2cda60475309fcd684f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0510-cwe-326-inadequate-encryption-streng-cbf3ae75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0510%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20SAP_SE%20NW%20AS%20Java%20UME%20User%20Mapping&amp;severity=low&amp;id=6965a2cda60475309fcd684b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0507-cwe-78-improper-neutralization-of-sp-64c6f1f5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0507%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20SAP_SE%20SAP%20Application%20Server%20for%20ABAP%20and%20SAP%20NetWeaver%20RFCSDK&amp;severity=high&amp;id=6965a2cda60475309fcd6847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0506-cwe-862-missing-authorization-in-sap-c60cc951</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0506%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=high&amp;id=6965a2cda60475309fcd6843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0504-cwe-943-improper-neutralization-of-s-d54d7599</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0504%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20SAP_SE%20SAP%20Identity%20Management&amp;severity=low&amp;id=6965a2cda60475309fcd683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0503-cwe-862-missing-authorization-in-sap-da5f56c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0503%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20ERP%20Central%20Component%20and%20SAP%20S%2F4HANA%20(SAP%20EHS%20Management)&amp;severity=medium&amp;id=6965a2cda60475309fcd683b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0501-cwe-89-improper-neutralization-of-sp-98703910</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0501%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20S%2F4HANA%20Private%20Cloud%20and%20On-Premise%20(Financials%20%EF%BF%BD%20General%20Ledger)&amp;severity=critical&amp;id=6965a2cda60475309fcd6837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0500-cwe-94-improper-control-of-generatio-03cfe97c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0500%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Wily%20Introscope%20Enterprise%20Manager%20(WorkStation)&amp;severity=critical&amp;id=6965a2cca60475309fcd6829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0499-cwe-79-improper-neutralization-of-in-1626a96a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal&amp;severity=medium&amp;id=6965a2cca60475309fcd6825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0498-cwe-94-improper-control-of-generatio-20b85674</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0498%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=critical&amp;id=6965a2cca60475309fcd6821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0497-cwe-862-missing-authorization-in-sap-9c6a1d92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0497%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20Business%20Server%20Pages%20Application%20(Product%20Designer%20Web%20UI)&amp;severity=medium&amp;id=6965a2cca60475309fcd681d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0496-cwe-434-unrestricted-upload-of-file--720a373e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0496%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd6819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0495-cwe-15-external-control-of-system-or-57bf771a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0495%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd6815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0494-cwe-497-exposure-of-sensitive-system-e3bdc7b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0494%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd6811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0493-cwe-352-cross-site-request-forgery-i-9296ebe0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0493%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd680d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0492-cwe-306-missing-authentication-for-c-97a1a64f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0492%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20HANA%20database&amp;severity=high&amp;id=6965a2cca60475309fcd6809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0491-cwe-94-improper-control-of-generatio-6c6ef53c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0491%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Landscape%20Transformation&amp;severity=critical&amp;id=6965a2cca60475309fcd6805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-13-36782745</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-13&amp;severity=medium&amp;id=6966defda60475309fc8a4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68707-na-8a0b7acb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68707%3A%20n%2Fa&amp;severity=high&amp;id=69667941a60475309f8fa6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25652-na-0ab4d48e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25652%3A%20n%2Fa&amp;severity=high&amp;id=69667940a60475309f8fa681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65783-na-2391eadf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65783%3A%20n%2Fa&amp;severity=critical&amp;id=69667237a60475309f879ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65784-na-e4c3fa10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65784%3A%20n%2Fa&amp;severity=medium&amp;id=69667237a60475309f879e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70753-na-9f172076</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70753%3A%20n%2Fa&amp;severity=high&amp;id=69666eb2a60475309f84037f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69992-na-ab29e6dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69992%3A%20n%2Fa&amp;severity=critical&amp;id=69666eb2a60475309f84037c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69991-na-4982ee1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69991%3A%20n%2Fa&amp;severity=critical&amp;id=69666eb2a60475309f840379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69990-na-8c6037d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69990%3A%20n%2Fa&amp;severity=critical&amp;id=69666eb2a60475309f840376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71027-na-1ea15405</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71027%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71026-na-e1a62762</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71026%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71025-na-74f0b9b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71025%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71024-na-6618dd02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71024%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71023-na-07aee9e6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71023%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66698-na-6c1d3bbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66698%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54855-na-d6cd7b88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54855%3A%20n%2Fa&amp;severity=medium&amp;id=696667b3a60475309f7ab4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55462-na-627451d4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55462%3A%20n%2Fa&amp;severity=medium&amp;id=69665d1fa60475309f5854cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58340-cwe-1333-inefficient-regular-expres-d42d439b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58340%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20LangChain%20AI%20LangChain&amp;severity=high&amp;id=69658281da2266e838450d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14021-cwe-502-deserialization-of-untruste-ffe8f337</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14021%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20run-llama%20llama_index&amp;severity=high&amp;id=69658281da2266e838450d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58339-cwe-770-allocation-of-resources-wit-c49016b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58339%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20run-llama%20llama_index&amp;severity=high&amp;id=69658281da2266e838450d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22214-cwe-121-stack-based-buffer-overflow-50ccce35</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22214%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20RIOT%20RIOT%20OS&amp;severity=medium&amp;id=69658281da2266e838450d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22213-cwe-121-stack-based-buffer-overflow-484218fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22213%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20RIOT%20RIOT%20OS&amp;severity=low&amp;id=69658281da2266e838450d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22801-cwe-125-out-of-bounds-read-in-pnggr-4a6fb606</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22801%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69657efdda2266e83842302f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22695-cwe-125-out-of-bounds-read-in-pnggr-931ee5d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22695%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69657efdda2266e838423029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22813-cwe-79-improper-neutralization-of-i-b67efd3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22813%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anomalyco%20opencode&amp;severity=critical&amp;id=69657efdda2266e838423035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22812-cwe-306-missing-authentication-for--06adb808</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22812%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20anomalyco%20opencode&amp;severity=high&amp;id=69657efdda2266e838423032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22804-cwe-269-improper-privilege-manageme-aa2b68a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22804%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Termix-SSH%20Termix&amp;severity=high&amp;id=69657471da2266e83834ab9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22800-cwe-352-cross-site-request-forgery--c92cb401</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22800%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20THM-Health%20PILOS&amp;severity=low&amp;id=69657471da2266e83834ab9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22798-cwe-532-insertion-of-sensitive-info-ceca105a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22798%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20softwarepub%20hermes&amp;severity=medium&amp;id=696570edda2266e83831189d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22794-cwe-346-origin-validation-error-in--7f185239</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22794%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20appsmithorg%20appsmith&amp;severity=critical&amp;id=696570edda2266e8383118a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22789-cwe-434-unrestricted-upload-of-file-ec23b47c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22789%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SMEWebify%20WebErpMesv2&amp;severity=medium&amp;id=69656d69da2266e8382e9812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22788-cwe-306-missing-authentication-for--7ba39fa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22788%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SMEWebify%20WebErpMesv2&amp;severity=high&amp;id=69656d69da2266e8382e9816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12420-vulnerability-in-servicenow-now-ass-62928d94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12420%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20ServiceNow%20Now%20Assist%20AI%20Agents&amp;severity=critical&amp;id=696569e5da2266e8382bb6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22786-cwe-434-unrestricted-upload-of-file-838371a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22786%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20flipped-aurora%20gin-vue-admin&amp;severity=high&amp;id=69656661da2266e838286f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22772-cwe-918-server-side-request-forgery-dad33e76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22772%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sigstore%20fulcio&amp;severity=medium&amp;id=696562ddda2266e83825fa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-a-multi-stage-asyncrat-campaign-via-mana-cc911a22</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20a%20Multi-Stage%20AsyncRAT%20Campaign%20via%20Managed%20Detection%20and%20Response&amp;severity=medium&amp;id=69666eb2a60475309f84032c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reflecting-on-ai-in-2025-faster-attacks-same-old-t-59e7b24a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reflecting%20on%20AI%20in%202025%3A%20Faster%20Attacks%2C%20Same%20Old%20Tradecraft&amp;severity=medium&amp;id=69666eb2a60475309f840324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/activity-masking-infostealer-dropper-kaspersky-off-099213ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Activity-masking%20infostealer%20dropper%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69655508da2266e83813d37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22785-cwe-77-improper-neutralization-of-s-2adc68dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22785%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=critical&amp;id=6965433ada2266e838fe6b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22784-cwe-863-incorrect-authorization-in--cc21530a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22784%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=6965433ada2266e838fe6b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22200-cwe-74-improper-neutralization-of-s-86015e71</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22200%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Enhancesoft%20osTicket&amp;severity=high&amp;id=6965433ada2266e838fe6b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22783-cwe-434-unrestricted-upload-of-file-39504cea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22783%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dfir-iris%20iris-web&amp;severity=critical&amp;id=69653fb6da2266e838f91b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22781-cwe-78-improper-neutralization-of-s-9e75e136</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22781%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69653fb6da2266e838f91b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22776-cwe-409-improper-handling-of-highly-b276e0d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22776%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69653fb6da2266e838f91b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22771-cwe-94-improper-control-of-generati-23e3aa96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22771%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20envoyproxy%20gateway&amp;severity=high&amp;id=69653c31da2266e838f5b98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22252-cwe-285-improper-authorization-in-d-2b686608</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22252%3A%20CWE-285%3A%20Improper%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=critical&amp;id=69653c31da2266e838f5b98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22251-cwe-200-exposure-of-sensitive-infor-747cdcb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22251%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WeblateOrg%20wlc&amp;severity=medium&amp;id=696538adda2266e838f1b6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22250-cwe-295-improper-certificate-valida-b7bb3e6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22250%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20WeblateOrg%20wlc&amp;severity=low&amp;id=696538adda2266e838f1b6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22033-cwe-79-improper-neutralization-of-i-c388acd1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22033%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HumanSignal%20label-studio&amp;severity=high&amp;id=696538adda2266e838f1b6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68657-cwe-415-double-free-in-espressif-es-c3ddf34d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68657%3A%20CWE-415%3A%20Double%20Free%20in%20espressif%20esp-usb&amp;severity=medium&amp;id=6965433ada2266e838fe6b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68656-cwe-416-use-after-free-in-espressif-26c23c45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68656%3A%20CWE-416%3A%20Use%20After%20Free%20in%20espressif%20esp-usb&amp;severity=medium&amp;id=696531a5da2266e838e9c377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22050-639-in-netapp-ontap-9-37cbb899</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22050%3A%20639%20in%20NETAPP%20ONTAP%209&amp;severity=medium&amp;id=696531a5da2266e838e9c37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68622-cwe-121-stack-based-buffer-overflow-365b9324</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68622%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20espressif%20esp-usb&amp;severity=medium&amp;id=69652e21da2266e838e2547e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n8n-supply-chain-attack-abuses-community-nodes-to--2cbbd375</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=n8n%20Supply%20Chain%20Attack%20Abuses%20Community%20Nodes%20to%20Steal%20OAuth%20Tokens&amp;severity=low&amp;id=69656ba9da2266e8382d8192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71063-cwe-295-improper-certificate-valida-bed4a106</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71063%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20mrvladus%20Errands&amp;severity=high&amp;id=69651c8dda2266e838cf6d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41078-cwe-863-incorrect-authorization-in--26f58e79</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41078%3A%20CWE-863%20Incorrect%20Authorization%20in%20Viafirma%20Viafirma%20Documents&amp;severity=high&amp;id=69650e81da2266e838bdb80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41077-cwe-639-authorization-bypass-throug-3aee7e91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41077%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Viafirma%20Inbox&amp;severity=high&amp;id=69650e81da2266e838bdb809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41006-cwe-89-improper-neutralization-of-s-07740c69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41006%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Imaster%20MEMS%20Events%20CRM&amp;severity=critical&amp;id=69650af9da2266e838b9ce85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41005-cwe-89-improper-neutralization-of-s-63afbb7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41005%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Imaster%20MEMS%20Events%20CRM&amp;severity=high&amp;id=69650af9da2266e838b9ce82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/instagram-fixes-password-reset-vulnerability-amid--60be51ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Instagram%20Fixes%20Password%20Reset%20Vulnerability%20Amid%20User%20Data%20Leak&amp;severity=low&amp;id=696503beda2266e838b232fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41004-cwe-89-improper-neutralization-of-s-c1bc818a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41004%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Imaster%20Patient%20Record%20Management%20System&amp;severity=high&amp;id=6965006dda2266e838af18b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41003-cwe-79-improper-neutralization-of-i-a7cb6fab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41003%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Imaster%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6964fcfbda2266e838a66dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-ai-automation-exploits-telecom-espion-8d716900</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20AI%20Automation%20Exploits%2C%20Telecom%20Espionage%2C%20Prompt%20Poaching%20%26%20More&amp;severity=medium&amp;id=6964fcb5da2266e838a5f536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russias-apt28-targeting-energy-research-defense-co-d821d563</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%E2%80%99s%20APT28%20Targeting%20Energy%20Research%2C%20Defense%20Collaboration%20Entities&amp;severity=medium&amp;id=6964eb22da2266e8388fbedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llms-in-attacker-crosshairs-warns-threat-intel-fir-fbde6ae6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLMs%20in%20Attacker%20Crosshairs%2C%20Warns%20Threat%20Intel%20Firm&amp;severity=medium&amp;id=6964e41ada2266e83885b4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40978-cwe-79-improper-neutralization-of-i-6d195fc5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40978%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20eCommerceGo%20SaaS&amp;severity=medium&amp;id=6964dd45da2266e83875f342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40977-cwe-79-improper-neutralization-of-i-9df5a55c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20eCommerceGo%20SaaS&amp;severity=medium&amp;id=6964dd45da2266e83875f33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40976-cwe-79-improper-neutralization-of-i-6141dc21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40976%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20TicketGo&amp;severity=medium&amp;id=6964dd45da2266e83875f33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40975-cwe-79-improper-neutralization-of-i-7c82a7b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40975%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20HRMGo&amp;severity=medium&amp;id=6964dd45da2266e83875f339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gobruteforcer-botnet-targets-crypto-project-databa-d9999070</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoBruteforcer%20Botnet%20Targets%20Crypto%20Project%20Databases%20by%20Exploiting%20Weak%20Credentials&amp;severity=medium&amp;id=69656baada2266e8382d8195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/12th-january-threat-intelligence-report-9a9c5f3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=12th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6964c82eda2266e83846a841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-launches-claude-ai-for-healthcare-with-s-9beed601</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Launches%20Claude%20AI%20for%20Healthcare%20with%20Secure%20Health%20Record%20Access&amp;severity=low&amp;id=69656baada2266e8382d8198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14279-cwe-346-origin-validation-error-in--b6200423</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14279%3A%20CWE-346%20Origin%20Validation%20Error%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=6964af91da2266e83826df6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-service-providers-fueling-indu-b97a9f02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Service%20Providers%20Fueling%20Industrial-Scale%20Pig%20Butchering%20Fraud&amp;severity=medium&amp;id=69656baada2266e8382d819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0855-cwe-78-improper-neutralization-of-sp-1ab86f60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0855%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Merit%20LILIN%20P2&amp;severity=high&amp;id=69649dfdda2266e838104fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14579-cwe-79-cross-site-scripting-xss-in--95b08dfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14579%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Quiz%20Maker&amp;severity=medium&amp;id=69648fedda2266e838f9f65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0854-cwe-78-improper-neutralization-of-sp-923c0f9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0854%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Merit%20LILIN%20DH032&amp;severity=high&amp;id=69648fedda2266e838f9f662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69276-cwe-502-deserialization-of-untruste-a9d1ef15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69276%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=696481ddda2266e838e784ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69275-cwe-1395-dependency-on-vulnerable-t-7aa11158</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69275%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=696481ddda2266e838e784e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69274-cwe-639-authorization-bypass-throug-ecfb37cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69274%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=696481ddda2266e838e784e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69273-cwe-287-improper-authentication-in--85d3d68e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69273%3A%20CWE-287%20Improper%20Authentication%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=69647e59da2266e838e3846b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69272-cwe-319-cleartext-transmission-of-s-53ff48e9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69272%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=medium&amp;id=69647e59da2266e838e38468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69271-cwe-522-insufficiently-protected-cr-4a67b129</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69271%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=69647e59da2266e838e38465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69270-cwe-598-information-exposure-throug-07a13a77</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69270%3A%20CWE-598%20Information%20Exposure%20Through%20Query%20Strings%20in%20GET%20Request%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=69647e59da2266e838e38462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69269-cwe-78-improper-neutralization-of-s-87aeac8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69269%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=69647751da2266e838db8762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69268-cwe-79-improper-neutralization-of-i-d78046a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=medium&amp;id=69647750da2266e838db875f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69267-cwe-22-improper-limitation-of-a-pat-67b8db09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69267%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=69647750da2266e838db875c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0853-cwe-497-exposure-of-sensitive-system-14983d1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0853%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20A-Plus%20Video%20Technologies%20AP-RM864P&amp;severity=medium&amp;id=69647049da2266e838bbbd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52694-vulnerability-in-advantech-iotsuite-9175176d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52694%3A%20Vulnerability%20in%20Advantech%20IoTSuite%20and%20IoT%20Edge%20Products&amp;severity=critical&amp;id=69646941da2266e8387b4dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-accessed-university-of-hawaii-cancer-cente-ebdb8a71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Accessed%20University%20of%20Hawaii%20Cancer%20Center%20Patient%20Data%3B%20They%20Weren%E2%80%99t%20Immediately%20Notified&amp;severity=medium&amp;id=69645afeda2266e83834c747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-january-12th-2026-httpsis-16180210</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20January%2012th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9762%2C%20(Mon%2C%20Jan%2012th)&amp;severity=medium&amp;id=6964577ada2266e8381ec7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0852-sql-injection-in-code-projects-onlin-2d32b4d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0852%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69644295da2266e838c90f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-12-06bcd262</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-12&amp;severity=medium&amp;id=69658cd7da2266e838514171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29329-na-b59d45bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29329%3A%20n%2Fa&amp;severity=critical&amp;id=69656d69da2266e8382e981a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67146-na-5093ee06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67146%3A%20n%2Fa&amp;severity=critical&amp;id=69656661da2266e838286f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67147-na-e401f39b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67147%3A%20n%2Fa&amp;severity=critical&amp;id=696562ddda2266e83825f9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51567-na-6c53af1c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51567%3A%20n%2Fa&amp;severity=critical&amp;id=69654dc5da2266e8380b35d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66802-na-a933d092</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66802%3A%20n%2Fa&amp;severity=critical&amp;id=69654a41da2266e83806dde7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66689-na-fcb70365</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66689%3A%20n%2Fa&amp;severity=medium&amp;id=6965433ada2266e838fe6b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63314-na-ebfc7bb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63314%3A%20n%2Fa&amp;severity=critical&amp;id=69652e21da2266e838e25479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46070-na-3478a295</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46070%3A%20n%2Fa&amp;severity=critical&amp;id=69652719da2266e838dbf0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46068-na-8358d1d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46068%3A%20n%2Fa&amp;severity=high&amp;id=69652719da2266e838dbf0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46067-na-38da9646</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46067%3A%20n%2Fa&amp;severity=high&amp;id=69652396da2266e838d748ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46066-na-1779a1b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46066%3A%20n%2Fa&amp;severity=critical&amp;id=69652396da2266e838d748a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66939-na-c920ad5a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66939%3A%20n%2Fa&amp;severity=medium&amp;id=69651c8dda2266e838cf6d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67813-na-7eb13817</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67813%3A%20n%2Fa&amp;severity=medium&amp;id=69651909da2266e838cc4bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65553-na-5687711a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65553%3A%20n%2Fa&amp;severity=medium&amp;id=69650e81da2266e838bdb813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65552-na-07be22b0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65552%3A%20n%2Fa&amp;severity=critical&amp;id=69650e81da2266e838bdb80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0851-sql-injection-in-code-projects-onlin-571698dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0851%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69643809da2266e8389ee33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0850-sql-injection-in-code-projects-inter-a7d01122</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0850%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=69643101da2266e83885d1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-depth-analysis-of-trojanized-winrar-installer-d-cd0c688f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-depth%20Analysis%20of%20Trojanized%20WinRAR%20Installer%20Distributing%20Winzipper%20Malware&amp;severity=high&amp;id=6963ca3eda2266e838fd16ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/greynoise-labs-weekly-oast-report-mcp-server-comma-250aa7f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GreyNoise%20Labs%20Weekly%20OAST%20Report%3A%20MCP%20Server%20Command%20Injection%20and%20React2Shell%20Exploitation%20Campaigns%20%E2%80%93%20Week%20Ending%202026-01-09&amp;severity=high&amp;id=6963c58cda2266e838e6b48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detailed-analysis-and-poc-for-cve-2026-21440-criti-b09b0b41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detailed%20Analysis%20and%20PoC%20for%20CVE-2026-21440%3A%20Critical%20Path%20Traversal%20in%20AdonisJS%20Multipart%20Upload&amp;severity=high&amp;id=6963b421da2266e8389e4129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-hack-exposes-complete-user-database-o-10b1fe43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Hack%20Exposes%20Complete%20User%20Database%20of%20Major%20Dark%20Web%20Forum&amp;severity=high&amp;id=6963b286da2266e83896b62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68493-cwe-112-missing-xml-validation-in-a-4c72d466</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68493%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Struts&amp;severity=high&amp;id=696406d1da2266e838e19a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yara-x-1110-release-hash-function-warnings-sun-jan-2c39521a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YARA-X%201.11.0%20Release%3A%20Hash%20Function%20Warnings%2C%20(Sun%2C%20Jan%2011th)&amp;severity=medium&amp;id=6963880dda2266e838ea0556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15506-out-of-bounds-read-in-academysoftwa-fd492ba7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15506%3A%20Out-of-Bounds%20Read%20in%20AcademySoftwareFoundation%20OpenColorIO&amp;severity=medium&amp;id=69638841da2266e838eaba6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0843-sql-injection-in-jiujiujia-jjjfood-363d4f88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0843%3A%20SQL%20Injection%20in%20jiujiujia%20jjjfood&amp;severity=medium&amp;id=6963689dda2266e8386cdffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0842-missing-authentication-in-flycatcher-655b5122</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0842%3A%20Missing%20Authentication%20in%20Flycatcher%20Toys%20smART%20Sketcher&amp;severity=medium&amp;id=69635e11da2266e83844dcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0841-buffer-overflow-in-utt-520w-c35591d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0841%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69635385da2266e8381701f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0840-buffer-overflow-in-utt-520w-8dcd4355</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0840%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69634575da2266e838e49e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0839-buffer-overflow-in-utt-520w-5eb5141d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0839%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696341f1da2266e838d6cea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0838-buffer-overflow-in-utt-520w-184f8330</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0838%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69633ae9da2266e838b6f459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0837-buffer-overflow-in-utt-520w-94dfca02</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0837%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=6963305cda2266e838a3d63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0836-buffer-overflow-in-utt-520w-ee5a5350</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0836%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69632cd8da2266e8389b679b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15505-cross-site-scripting-in-luxul-xwr-6-31807ed8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15505%3A%20Cross%20Site%20Scripting%20in%20Luxul%20XWR-600&amp;severity=medium&amp;id=6963062cda2266e8382ec9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-11-a4613dfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-11&amp;severity=medium&amp;id=69643b57da2266e838ab12c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0824-cross-site-scripting-in-questdb-ui-50677978</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0824%3A%20Cross%20Site%20Scripting%20in%20questdb%20ui&amp;severity=medium&amp;id=69626638f2400df44e63e552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13393-cwe-918-server-side-request-forgery-c5f37460</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13393%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=69625bacf2400df44e52a8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12379-cwe-79-improper-neutralization-of-i-ed9d3dab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=69625bacf2400df44e52a8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0822-heap-based-buffer-overflow-in-quickj-5c9cd8a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0822%3A%20Heap-based%20Buffer%20Overflow%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=69625828f2400df44e4e54f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yet-another-leak-of-chinas-contractor-driven-cyber-9e20e930</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yet%20Another%20Leak%20of%20China&apos;s%20Contractor-Driven%20Cyber-Espionage%20Ecosystem&amp;severity=medium&amp;id=6964e460da2266e838862f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0821-heap-based-buffer-overflow-in-quickj-492bea30</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0821%3A%20Heap-based%20Buffer%20Overflow%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=69625120f2400df44e458d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14555-cwe-79-improper-neutralization-of-i-3ef8c944</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14555%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Countdown%20Timer%20%E2%80%93%20Widget%20Countdown&amp;severity=medium&amp;id=69624d9bf2400df44e29ca76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15504-null-pointer-dereference-in-lief-pr-8f4a2417</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15504%3A%20NULL%20Pointer%20Dereference%20in%20lief-project%20LIEF&amp;severity=medium&amp;id=69623af0545d6fe9686cca16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14506-cwe-79-improper-neutralization-of-i-3e133689</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imtiazrayhan%20ConvertForce%20Popup%20Builder&amp;severity=medium&amp;id=69623af0545d6fe9686cca20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-launches-rustywater-rat-via-spear-phish-e42d1e2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Launches%20RustyWater%20RAT%20via%20Spear-Phishing%20Across%20Middle%20East%20Sectors&amp;severity=medium&amp;id=69624c67f2400df44e25edb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52435-cwe-5-j2ee-misconfiguration-data-tr-031c323e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52435%3A%20CWE-5%20J2EE%20Misconfiguration%3A%20Data%20Transmission%20Without%20Encryption%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=high&amp;id=69622254545d6fe9682dfba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53470-cwe-125-out-of-bounds-read-in-apach-105deab2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53470%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=low&amp;id=69622254545d6fe9682dfba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53477-cwe-476-null-pointer-dereference-in-15f9a1ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53477%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=high&amp;id=69622254545d6fe9682dfbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62235-cwe-290-authentication-bypass-by-sp-3aad4363</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62235%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=high&amp;id=69622254545d6fe9682dfbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0831-cwe-863-incorrect-authorization-in-w-98686f30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0831%3A%20CWE-863%20Incorrect%20Authorization%20in%20wpdevteam%20Templately%20%E2%80%93%20Elementor%20%26%20Gutenberg%20Template%20Library%3A%206500%2B%20Free%20%26%20Pro%20Ready%20Templates%20And%20Cloud!&amp;severity=medium&amp;id=69621eda545d6fe96820a5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15503-unrestricted-upload-in-sangfor-oper-a37d1a7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15503%3A%20Unrestricted%20Upload%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=medium&amp;id=69621ae8c540fa4b549251c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-arrests-34-black-axe-members-in-spain-over-49e78d7c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europol%20Arrests%2034%20Black%20Axe%20Members%20in%20Spain%20Over%20%E2%82%AC5.9M%20Fraud%20and%20Organized%20Crime&amp;severity=medium&amp;id=69622835545d6fe9683f8f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14976-cwe-352-cross-site-request-forgery--0f853673</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14976%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69621061c540fa4b547cca6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15502-os-command-injection-in-sangfor-ope-a8fe9b82</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15502%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=medium&amp;id=69620954c540fa4b54731a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14948-cwe-862-missing-authorization-in-cy-18261d16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14948%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20miniOrange%20OTP%20Verification%20and%20SMS%20Notification%20for%20WooCommerce&amp;severity=medium&amp;id=6961fec8c540fa4b54639bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22777-cwe-93-improper-neutralization-of-c-6225e01b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22777%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Comfy-Org%20ComfyUI-Manager&amp;severity=high&amp;id=6961f7c0c540fa4b54565841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22773-cwe-770-allocation-of-resources-wit-d959c300</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22773%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6961f7c0c540fa4b5456583e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14943-cwe-863-incorrect-authorization-in--19f73930</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14943%3A%20CWE-863%20Incorrect%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=6961f7c0c540fa4b54565839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22704-cwe-79-improper-neutralization-of-i-ef07962f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22704%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20haxtheweb%20issues&amp;severity=high&amp;id=6961f43cc540fa4b54400bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22705-cwe-1240-use-of-a-cryptographic-pri-c008e8a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22705%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20RustCrypto%20signatures&amp;severity=medium&amp;id=6961f0b8c540fa4b5432ba01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22703-cwe-345-insufficient-verification-o-c63a5814</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22703%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20sigstore%20cosign&amp;severity=medium&amp;id=6961f0b8c540fa4b5432b9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22702-cwe-59-improper-link-resolution-bef-e945b11f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22702%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20pypa%20virtualenv&amp;severity=medium&amp;id=6961f0b8c540fa4b5432b9f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22701-cwe-59-improper-link-resolution-bef-b81aed94</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22701%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20tox-dev%20filelock&amp;severity=medium&amp;id=6961ed34c540fa4b542a0971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22689-cwe-1385-missing-origin-validation--13d8cc60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22689%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20axllent%20mailpit&amp;severity=medium&amp;id=6961e9bac540fa4b541edd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22685-cwe-22-improper-limitation-of-a-pat-b1b9695d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22685%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DevToys-app%20DevToys&amp;severity=high&amp;id=6961e9bac540fa4b541edcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22611-cwe-20-improper-input-validation-in-348733b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22611%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20aws%20aws-sdk-net&amp;severity=low&amp;id=6961e73719784dcf52f13f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22700-cwe-20-improper-input-validation-in-f32d064d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22700%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20RustCrypto%20elliptic-curves&amp;severity=high&amp;id=6961e3b319784dcf52ed6559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22699-cwe-20-improper-input-validation-in-8bd765fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22699%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20RustCrypto%20elliptic-curves&amp;severity=high&amp;id=6961e3b319784dcf52ed6554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22698-cwe-331-insufficient-entropy-in-rus-fea75a65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22698%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20RustCrypto%20elliptic-curves&amp;severity=high&amp;id=6961e3b319784dcf52ed654c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22691-cwe-1333-inefficient-regular-expres-e399fa40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22691%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20py-pdf%20pypdf&amp;severity=low&amp;id=6961dcab19784dcf52e61fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22690-cwe-400-uncontrolled-resource-consu-26e94a29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22690%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=low&amp;id=6961dcab19784dcf52e61fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22688-cwe-77-improper-neutralization-of-s-404bc99e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22688%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=6961d21f19784dcf52da7b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22687-cwe-89-improper-neutralization-of-s-df06a02b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22687%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=6961d21f19784dcf52da7b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13457-cwe-639-authorization-bypass-throug-6de3db01</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13457%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20woocommerce%20WooCommerce%20Square&amp;severity=high&amp;id=6961cb1719784dcf52be20ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61674-cwe-79-improper-neutralization-of-i-4519ffe2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61674%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=6961cb1719784dcf52be20d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61676-cwe-79-improper-neutralization-of-i-74991bdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61676%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=6961cb1719784dcf52be20d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65091-cwe-89-improper-neutralization-of-s-5017f49b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65091%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki-contrib%20macro-fullcalendar&amp;severity=critical&amp;id=6961cb1719784dcf52be20dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65090-cwe-200-exposure-of-sensitive-infor-33219640</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65090%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki-contrib%20macro-fullcalendar&amp;severity=medium&amp;id=6961cb1719784dcf52be20d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22597-cwe-918-server-side-request-forgery-3b835494</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22597%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TryGhost%20Ghost&amp;severity=medium&amp;id=6961c40f19784dcf52acebdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22596-cwe-89-improper-neutralization-of-s-666f06d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22596%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=medium&amp;id=6961c40f19784dcf52ace87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22595-cwe-863-incorrect-authorization-in--3f0ce617</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22595%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=6961c40f19784dcf52ace878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22594-cwe-287-improper-authentication-in--fe262f90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22594%3A%20CWE-287%3A%20Improper%20Authentication%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=6961c40f19784dcf52ace873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22030-cwe-346-origin-validation-error-in--0f93f67d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22030%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20remix-run%20react-router&amp;severity=medium&amp;id=6961c40f19784dcf52ace870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22029-cwe-79-improper-neutralization-of-i-1944a18c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22029%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remix-run%20react-router&amp;severity=high&amp;id=6961c40f19784dcf52ace86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21884-cwe-79-improper-neutralization-of-i-0def8d25</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21884%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remix-run%20react-router&amp;severity=high&amp;id=6961c40f19784dcf52ace86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61686-cwe-22-improper-limitation-of-a-pat-74207ab3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61686%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20remix-run%20react-router&amp;severity=critical&amp;id=6961c40f19784dcf52ace864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59057-cwe-79-improper-neutralization-of-i-eaa6ce70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59057%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remix-run%20react-router&amp;severity=high&amp;id=6961c40f19784dcf52ace861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68470-cwe-601-url-redirection-to-untruste-022f4f9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68470%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20remix-run%20react-router&amp;severity=medium&amp;id=6961c40f19784dcf52ace867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22612-cwe-502-deserialization-of-untruste-85e6c743</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22612%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b007ed32c7f018eb901e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22609-cwe-184-incomplete-list-of-disallow-e3282f46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22609%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb9002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22608-cwe-184-incomplete-list-of-disallow-6db587b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22608%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb8ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22607-cwe-184-incomplete-list-of-disallow-99461a0f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22607%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb8ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22606-cwe-184-incomplete-list-of-disallow-9e29139b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22606%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb8ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22605-cwe-284-improper-access-control-in--d1ab303d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22605%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opf%20openproject&amp;severity=medium&amp;id=6961b006ed32c7f018eb8fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22604-cwe-200-exposure-of-sensitive-infor-b70f4bda</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22604%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20opf%20openproject&amp;severity=medium&amp;id=6961b006ed32c7f018eb8fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22603-cwe-307-improper-restriction-of-exc-22d84d42</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22603%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20opf%20openproject&amp;severity=medium&amp;id=6961b006ed32c7f018eb8fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22602-cwe-200-exposure-of-sensitive-infor-30882214</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22602%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20opf%20openproject&amp;severity=low&amp;id=6961b006ed32c7f018eb8fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22601-cwe-77-improper-neutralization-of-s-a36f0711</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22601%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20opf%20openproject&amp;severity=high&amp;id=6961b006ed32c7f018eb8fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22600-cwe-200-exposure-of-sensitive-infor-3257d9bd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22600%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20opf%20openproject&amp;severity=critical&amp;id=6961b006ed32c7f018eb8fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22697-cwe-122-heap-based-buffer-overflow--fda69094</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22697%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f6ed32c7f018d59bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22027-cwe-122-heap-based-buffer-overflow--6ef01b9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22027%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f6ed32c7f018d59bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22026-cwe-789-memory-allocation-with-exce-8c44eca2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22026%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f6ed32c7f018d59bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22025-cwe-401-missing-release-of-memory-a-8f886709</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22025%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f6ed32c7f018d59bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22024-cwe-401-missing-release-of-memory-a-ea3f7a46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22024%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f6ed32c7f018d59be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22023-cwe-125-out-of-bounds-read-in-nasa--168120da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22023%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21900-cwe-125-out-of-bounds-read-in-nasa--90270853</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21900%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21899-cwe-125-out-of-bounds-read-in-nasa--aa6f3635</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21899%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f5ed32c7f018d59bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21898-cwe-125-out-of-bounds-read-in-nasa--3cc029c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21898%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21897-cwe-787-out-of-bounds-write-in-nasa-2dbd3726</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21897%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-10-6a196e6f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-10&amp;severity=medium&amp;id=6962e9d6da2266e838fdfbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15501-os-command-injection-in-sangfor-ope-69faae4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15501%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=critical&amp;id=696183e045ea0302aa99be03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22584-cwe-94-improper-control-of-generati-639176ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22584%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Salesforce%20Uni2TS&amp;severity=critical&amp;id=6961805b45ea0302aa992bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15500-os-command-injection-in-sangfor-ope-5c54cb5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15500%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=critical&amp;id=696175d145ea0302aa963f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15499-os-command-injection-in-sangfor-ope-adcd5c2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15499%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=high&amp;id=696175d145ea0302aa963f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46297-an-app-may-be-able-to-access-protec-6b9b8ddd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46297%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20files%20within%20an%20App%20Sandbox%20container%20in%20Apple%20macOS&amp;severity=medium&amp;id=696175d145ea0302aa963f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62487-the-product-performs-an-authorizati-c1ea0f19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62487%3A%20The%20product%20performs%20an%20authorization%20check%20when%20an%20actor%20attempts%20to%20access%20a%20resource%20or%20perform%20an%20action%2C%20but%20it%20does%20not%20correctly%20perform%20the%20check.%20This%20allows%20attackers%20to%20bypass%20intended%20access%20restrictions.%20in%20Palantir%20com.palantir.acme%3Agotham-default-apps-bundle&amp;severity=low&amp;id=696175d145ea0302aa963f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46298-processing-maliciously-crafted-web--09009782</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46298%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=696175d145ea0302aa963f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46299-processing-maliciously-crafted-web--71789247</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46299%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20internal%20states%20of%20the%20app%20in%20Apple%20Safari&amp;severity=medium&amp;id=696175d145ea0302aa963f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46286-restoring-from-a-backup-may-prevent-584becb7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46286%3A%20Restoring%20from%20a%20backup%20may%20prevent%20passcode%20from%20being%20required%20immediately%20after%20Face%20ID%20enrollment%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=696175d145ea0302aa963f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0830-cwe-78-improper-neutralization-of-sp-da0f7abf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0830%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=6961724c45ea0302aa817a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-exploit-vmware-esxi-zero-days-8db6607d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Exploit%20VMware%20ESXi%20Zero-Days%20to%20Escape%20Virtual%20Machines&amp;severity=medium&amp;id=696159b2047de42cfc9a6d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15035-cwe-20-improper-input-validation-in-cf8edbfb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15035%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Archer%20AXE75%20v1.6&amp;severity=medium&amp;id=69613a016c9099d823001a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15496-sql-injection-in-guchengwuyue-yshop-726abf2a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15496%3A%20SQL%20Injection%20in%20guchengwuyue%20yshopmall&amp;severity=medium&amp;id=6961367d6c9099d823eb7eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15495-unrestricted-upload-in-biggidroid-s-34e15769</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15495%3A%20Unrestricted%20Upload%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=6961367d6c9099d823eb7ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15494-sql-injection-in-rainygao-docsys-b9ed3d2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15494%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=696132fa6c9099d823e5607c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15493-sql-injection-in-rainygao-docsys-95bd2619</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15493%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=696132fa6c9099d823e56075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69426-cwe-732-incorrect-permission-assign-df9b59f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69426%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20RUCKUS%20Networks%20vRIoT%20IOT%20Controller&amp;severity=critical&amp;id=69614e21047de42cfc77cc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46645-cwe-78-improper-neutralization-of-s-34ef8268</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46645%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=medium&amp;id=69614e21047de42cfc77cc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69425-cwe-306-missing-authentication-for--7c60bcd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69425%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20RUCKUS%20Networks%20vRIoT%20IoT%20Controller&amp;severity=critical&amp;id=69614e21047de42cfc77cc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46643-cwe-122-heap-based-buffer-overflow--75a6fbb5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46643%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=low&amp;id=69612bfb6c9099d823dc1098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15492-sql-injection-in-rainygao-docsys-163271c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15492%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=69612bfb6c9099d823dc1091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-8000-ransomware-attacks-china-hacked-a4cdf4f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%208%2C000%20Ransomware%20Attacks%2C%20China%20Hacked%20US%20Gov%20Emails%2C%20IDHS%20Breach%20Impacts%20700k&amp;severity=medium&amp;id=69612822f9fa58d972817532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0817-cwe-862-missing-authorization-in-wik-ef87ed37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0817%3A%20CWE-862%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20CampaignEvents%20extension&amp;severity=medium&amp;id=69612866f9fa58d97281823c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46676-cwe-200-exposure-of-sensitive-infor-cb1c8441</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46676%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=low&amp;id=69612866f9fa58d972818239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0803-sql-injection-in-phpgurukul-online-c-0b1019d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0803%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration%20System&amp;severity=medium&amp;id=6961214ef9fa58d9727fd834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46644-cwe-78-improper-neutralization-of-s-691fbffa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46644%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=medium&amp;id=6961214ef9fa58d9727fd82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt28-runs-credential-stealing-campaign-ta-61b75677</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT28%20Runs%20Credential-Stealing%20Campaign%20Targeting%20Energy%20and%20Policy%20Organizations&amp;severity=medium&amp;id=69613e3b6c9099d823010d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-north-korean-spear-phishing-attacks-use-malici-b8cc8ce1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20North%20Korean%20Spear-Phishing%20Attacks%20Use%20Malicious%20QR%20Codes&amp;severity=medium&amp;id=69611a12f9fa58d97269d5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-patches-critical-code-execution-flaw-i-38b01ac0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Patches%20Critical%20Code%20Execution%20Flaw%20in%20Apex%20Central&amp;severity=critical&amp;id=69610d0e7a8fb5c58f6edc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-closes-10-emergency-directives-as-vulnerabili-3ee49b64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Closes%2010%20Emergency%20Directives%20as%20Vulnerability%20Catalog%20Takes%20Over&amp;severity=medium&amp;id=696106067a8fb5c58f6d4760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zombieagent-attack-let-researchers-take-over-chatg-13543cd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98ZombieAgent%E2%80%99%20Attack%20Let%20Researchers%20Take%20Over%20ChatGPT&amp;severity=medium&amp;id=6960f7f67a8fb5c58f55e0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14598-cwe-89-improper-neutralization-of-s-7e759583</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14598%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BeeS%20Software%20Solutions%20BET%20ePortal&amp;severity=critical&amp;id=6960f4a57a8fb5c58f4f0361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/377000-impacted-by-data-breach-at-texas-gas-statio-8254c4b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=377%2C000%20Impacted%20by%20Data%20Breach%20at%20Texas%20Gas%20Station%20Firm&amp;severity=medium&amp;id=6960f0ee7a8fb5c58f4aff74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66052-cwe-78-improper-neutralization-of-s-1b7d1539</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66052%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Vivotek%20IP7137&amp;severity=high&amp;id=6960fbad7a8fb5c58f6b1a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66051-cwe-22-improper-limitation-of-a-pat-a0c98502</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66051%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Vivotek%20IP7137&amp;severity=medium&amp;id=6960eda77a8fb5c58f471d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66050-cwe-1393-use-of-default-password-in-cc64c4e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66050%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20Vivotek%20IP7137&amp;severity=critical&amp;id=6960eda77a8fb5c58f471d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66049-cwe-306-missing-authentication-for--bc9f6576</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66049%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vivotek%20IP7137&amp;severity=high&amp;id=6960eda77a8fb5c58f471d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploit-for-vmware-zero-day-flaws-likely-built-a-y-3c6cf8ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploit%20for%20VMware%20Zero-Day%20Flaws%20Likely%20Built%20a%20Year%20Before%20Public%20Disclosure&amp;severity=medium&amp;id=6960e884a48af7d8cea17a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7072-cwe-798-use-of-hard-coded-credential-c76f9088</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7072%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20KAON%20CG3000T&amp;severity=critical&amp;id=6960e8e3a48af7d8cea1877c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22082-cwe-384-session-fixation-in-tenda-3-7271f053</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22082%3A%20CWE-384%20Session%20Fixation%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e8e3a48af7d8cea1877f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22081-cwe-1004-sensitive-cookie-without-h-6c2e9b06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22081%3A%20CWE-1004%20-%20Sensitive%20Cookie%20Without%20HttpOnly%20Flag%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e8e4a48af7d8cea187dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11453-cwe-79-improper-neutralization-of-i-10cfd606</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anand_kumar%20Header%20and%20Footer%20Scripts&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13908-cwe-79-improper-neutralization-of-i-1a13649d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13908%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alobaidi%20The%20Tooltip&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13862-cwe-79-improper-neutralization-of-i-61acbe5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20furqan-khanzada%20Menu%20Card&amp;severity=medium&amp;id=6960e8e3a48af7d8cea187a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14172-cwe-862-missing-authorization-in-in-89d22ceb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14172%3A%20CWE-862%20Missing%20Authorization%20in%20infosatech%20WP%20Page%20Permalink%20Extension&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13717-cwe-862-missing-authorization-in-as-1231bd29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13717%3A%20CWE-862%20Missing%20Authorization%20in%20ashishajani%20Contact%20Form%20vCard%20Generator&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13704-cwe-79-improper-neutralization-of-i-e986f136</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amirshk%20Autogen%20Headers%20Menu&amp;severity=medium&amp;id=6960e8e3a48af7d8cea1878b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13892-cwe-79-improper-neutralization-of-i-c01b2e51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mountaingrafix%20MG%20AdvancedOptions&amp;severity=medium&amp;id=6960e8e3a48af7d8cea187a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13897-cwe-79-improper-neutralization-of-i-4b8014ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amu02aftab%20Client%20Testimonial%20Slider&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13854-cwe-79-improper-neutralization-of-i-0cf2cef3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20soniz%20Curved%20Text&amp;severity=medium&amp;id=6960e8e3a48af7d8cea1879e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13701-cwe-79-improper-neutralization-of-i-b624a523</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beshkin%20Shabat%20Keeper&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13967-cwe-79-improper-neutralization-of-i-2f50c770</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13967%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woodpeckerleadform%20Woodpecker%20for%20WordPress&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13852-cwe-79-improper-neutralization-of-i-53c97df4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debtcom%20Debt.com%20Business%20in%20a%20Box&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13893-cwe-79-improper-neutralization-of-i-eb1710ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20burtrw%20Lesson%20Plan%20Book&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13903-cwe-79-improper-neutralization-of-i-664fb296</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13903%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ctietze%20PullQuote&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22080-cwe-319-cleartext-transmission-of-s-88d2d6d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22080%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e55ba48af7d8cea09102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22079-cwe-319-cleartext-transmission-of-s-d5dc5aa5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22079%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e1d7a48af7d8ce8b5d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cncert-risk-warning-regarding-the-black-cat-gangs--1c7bab1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CNCERT%3A%20Risk%20Warning%20Regarding%20the%20%22Black%20Cat%22%20Gang&apos;s%20Use%20of%20Search%20Engines%20to%20Spread%20Counterfeit%20Notepad%2B%2B%20Download%20Remote%20Control%20Backdoors&amp;severity=medium&amp;id=6960d845a48af7d8ce7d3bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64093-vulnerability-in-zenitel-icx500-a507f0a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64093%3A%20Vulnerability%20in%20Zenitel%20ICX500&amp;severity=critical&amp;id=6960d929a48af7d8ce7ea268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64092-vulnerability-in-zenitel-icx500-df6fe1d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64092%3A%20Vulnerability%20in%20Zenitel%20ICX500&amp;severity=high&amp;id=6960d929a48af7d8ce7ea264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-apex-central-rce-flaw-scores-98-cvss-i-a9c5b236</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Apex%20Central%20RCE%20Flaw%20Scores%209.8%20CVSS%20in%20On-Prem%20Windows%20Versions&amp;severity=critical&amp;id=6960d422ecefc3cd7c1cf7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64091-vulnerability-in-zenitel-tcis-3-c7bac969</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64091%3A%20Vulnerability%20in%20Zenitel%20TCIS-3%2B&amp;severity=high&amp;id=6960d46aecefc3cd7c1d0dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64090-vulnerability-in-zenitel-tcis-3-397975fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64090%3A%20Vulnerability%20in%20Zenitel%20TCIS-3%2B&amp;severity=critical&amp;id=6960d46aecefc3cd7c1d0df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-research-phaltblyx-fake-bsods-and-trusted-b-7ff05388</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Research%3A%20PHALT%23BLYX%3A%20Fake%20BSODs%20and%20Trusted%20Build%20Tools&amp;severity=medium&amp;id=6960d469ecefc3cd7c1d0dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13895-cwe-79-improper-neutralization-of-i-be77849d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20top-position%20Top%20Position%20Google%20Finance&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13900-cwe-79-improper-neutralization-of-i-bb55912f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelocation%20WP%20Popup%20Magic&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13853-cwe-79-improper-neutralization-of-i-c9969000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lnbadmin1%20Nearby%20Now%20Reviews&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13729-cwe-79-improper-neutralization-of-i-3375d11e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13729%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20greenshady%20Entry%20Views&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-retires-10-emergency-cybersecurity-directives-7fe43828</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Retires%2010%20Emergency%20Cybersecurity%20Directives%20Issued%20Between%202019%20and%202024&amp;severity=low&amp;id=6960e804a48af7d8cea16b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0627-cwe-79-improper-neutralization-of-in-7bd42955</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0627%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=6960bf3fecefc3cd7c1371c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-process-environment-block-manipulation-f-b9392057</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Process%20Environment%20Block%20Manipulation%2C%20(Fri%2C%20Jan%209th)&amp;severity=medium&amp;id=6960bb88ecefc3cd7c1243fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69195-stack-based-buffer-overflow-60838973</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69195%3A%20Stack-based%20Buffer%20Overflow&amp;severity=high&amp;id=6960b846ecefc3cd7c11645f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69194-improper-limitation-of-a-pathname-t-698382b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69194%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=6960b4b3ecefc3cd7c10677e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14657-cwe-862-missing-authorization-in-ar-02c706f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14657%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=high&amp;id=6960b130ecefc3cd7c0f7d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13753-cwe-863-incorrect-authorization-in--54e16daf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13753%3A%20CWE-863%20Incorrect%20Authorization%20in%20wptb%20WP%20Table%20Builder%20%E2%80%93%20Drag%20%26%20Drop%20Table%20Builder&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13935-cwe-862-missing-authorization-in-th-35a53dbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13935%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13934-cwe-862-missing-authorization-in-th-dd05fa9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13934%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14741-cwe-862-missing-authorization-in-sh-14527b14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14741%3A%20CWE-862%20Missing%20Authorization%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=critical&amp;id=6960b130ecefc3cd7c0f7d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13628-cwe-862-missing-authorization-in-th-ec8db5ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13628%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14937-cwe-79-improper-neutralization-of-i-2cfd494a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=6960b130ecefc3cd7c0f7d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14146-cwe-862-missing-authorization-in-wp-a7fbbfd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14146%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21409-authorization-bypass-through-user-c-a279d64e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21409%3A%20Authorization%20bypass%20through%20user-controlled%20key%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70974-cwe-829-inclusion-of-functionality--fe198d2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70974%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Alibaba%20Fastjson&amp;severity=critical&amp;id=6960a6a3ecefc3cd7c0ce3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14574-cwe-200-exposure-of-sensitive-infor-f92e2b26</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14574%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wedevs%20weDocs%3A%20AI%20Powered%20Knowledge%20Base%2C%20Docs%2C%20Documentation%2C%20Wiki%20%26%20AI%20Chatbot&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15055-cwe-79-improper-neutralization-of-i-34da0141</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=6960a320ecefc3cd7c0b983f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15057-cwe-79-improper-neutralization-of-i-77ce3fde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=6960a320ecefc3cd7c0b9843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14718-cwe-862-missing-authorization-in-pu-59fa6d63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14718%3A%20CWE-862%20Missing%20Authorization%20in%20publishpress%20Schedule%20Post%20Changes%20With%20PublishPress%20Future%3A%20Unpublish%2C%20Delete%2C%20Change%20Status%2C%20Trash%2C%20Change%20Categories&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14720-cwe-862-missing-authorization-in-am-e419d6f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14720%3A%20CWE-862%20Missing%20Authorization%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b982a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0563-cwe-79-improper-neutralization-of-in-068f9f2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0563%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pagup%20WP%20Google%20Street%20View%20(with%20360%C2%B0%20virtual%20tour)%20%26%20Google%20maps%20%2B%20Local%20SEO&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14782-cwe-862-missing-authorization-in-wp-9c0238fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14782%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14980-cwe-200-exposure-of-sensitive-infor-603c451f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14980%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Docs%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15019-cwe-79-improper-neutralization-of-i-43842cb2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pagup%20Bulk%20Auto%20Image%20Alt%20Text%20(Alt%20tag%2C%20Alt%20attribute)%20optimizer%20(image%20SEO)&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b983b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14736-cwe-269-improper-privilege-manageme-92ffb5c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14736%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=critical&amp;id=6960a320ecefc3cd7c0b982e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20976-cwe-20-improper-input-validation-in-b3ca800c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20976%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20975-cwe-280-improper-handling-of-insuff-5f046621</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20975%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Cloud&amp;severity=low&amp;id=69609f9becefc3cd7c0ad50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20974-cwe-20-improper-input-validation-in-ba1bf244</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20974%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20973-cwe-125-out-of-bounds-read-in-samsu-534c343e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20973%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20972-cwe-926-improper-export-of-android--1fa5dbea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20972%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20971-cwe-416-use-after-free-in-samsung-m-f3fa5fc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20971%3A%20CWE-416%20Use%20After%20Free%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69609f9becefc3cd7c0ad501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20970-cwe-284-improper-access-control-in--33a90e25</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20970%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20969-cwe-20-improper-input-validation-in-b581d4b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20969%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=low&amp;id=69609f9becefc3cd7c0ad4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20968-cwe-416-use-after-free-in-samsung-m-28492dd4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20968%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14803-cwe-79-cross-site-scripting-xss-in--cf1816b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14803%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20NEX-Forms&amp;severity=medium&amp;id=69609c17ecefc3cd7c0a38d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-north-korean-hackers-using-malicious-qr--2bcf0954</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20North%20Korean%20Hackers%20Using%20Malicious%20QR%20Codes%20in%20Spear-Phishing&amp;severity=medium&amp;id=6960e804a48af7d8cea16b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13749-cwe-352-cross-site-request-forgery--d21b8837</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13749%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativemotion%20Clearfy%20Cache%20%E2%80%93%20WordPress%20optimization%20plugin%2C%20Minify%20HTML%2C%20CSS%20%26%20JS%2C%20Defer&amp;severity=medium&amp;id=69609510ecefc3cd7c07ebe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14886-cwe-862-missing-authorization-in-sh-cc2d8640</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14886%3A%20CWE-862%20Missing%20Authorization%20in%20shoheitanaka%20Japanized%20for%20WooCommerce&amp;severity=medium&amp;id=69608a83ecefc3cd7c041599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66315-cwe-269-improper-privilege-manageme-a0a2659f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66315%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ZTE%20MF258K&amp;severity=medium&amp;id=69606ae0ecefc3cd7ca6fe33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22712-cwe-116-improper-encoding-or-escapi-9829c07f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22712%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20ApprovedRevs%20Extension&amp;severity=low&amp;id=6960d929a48af7d8ce7ea26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22713-cwe-79-improper-neutralization-of-i-147e5abf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22713%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=low&amp;id=6960d929a48af7d8ce7ea270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-09-4176f191</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-09&amp;severity=medium&amp;id=69619ab7ed32c7f01844536f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51626-na-36e5ff99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51626%3A%20n%2Fa&amp;severity=medium&amp;id=69616ec845ea0302aa7aa328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60538-na-bca78eef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60538%3A%20n%2Fa&amp;severity=medium&amp;id=69616b4445ea0302aa763b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66715-na-c08c1da4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66715%3A%20n%2Fa&amp;severity=medium&amp;id=6961693845ea0302aa73d9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67811-na-e528b345</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67811%3A%20n%2Fa&amp;severity=medium&amp;id=696158a2047de42cfc869267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67810-na-9be9a4f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67810%3A%20n%2Fa&amp;severity=medium&amp;id=696158a2047de42cfc869263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70161-na-6b8ba75d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70161%3A%20n%2Fa&amp;severity=critical&amp;id=69614fa0047de42cfc79a3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67070-na-b36c12eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67070%3A%20n%2Fa&amp;severity=high&amp;id=69614b956c9099d8230406a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66744-na-b30d2a00</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66744%3A%20n%2Fa&amp;severity=high&amp;id=69613a016c9099d823001aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69542-na-faa12c97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69542%3A%20n%2Fa&amp;severity=critical&amp;id=696132fa6c9099d823e56083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67004-na-6171f99b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67004%3A%20n%2Fa&amp;severity=medium&amp;id=696132fa6c9099d823e56070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56225-na-8c05ec57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56225%3A%20n%2Fa&amp;severity=high&amp;id=69612bfb6c9099d823dc109b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67282-na-614da349</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67282%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67281-na-6196c6e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67281%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67280-na-f8428dcb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67280%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67279-na-d6d53ef7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67279%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67278-na-244bbf53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67278%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67133-na-0409a09e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67133%3A%20n%2Fa&amp;severity=high&amp;id=6961214ef9fa58d9727fd82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22714-cwe-79-improper-neutralization-of-i-35c83ce7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22714%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Monaco%20Skin&amp;severity=low&amp;id=696047b7ecefc3cd7c756a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22710-cwe-79-improper-neutralization-of-i-9fa0ef59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikibase%20Extension&amp;severity=low&amp;id=69604433ecefc3cd7c741f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0733-sql-injection-in-phpgurukul-online-c-47e6a0d5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0733%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration%20System&amp;severity=medium&amp;id=696040afecefc3cd7c736701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0732-command-injection-in-d-link-di-8200g-65e04b49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0732%3A%20Command%20Injection%20in%20D-Link%20DI-8200G&amp;severity=medium&amp;id=696040afecefc3cd7c7366f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0731-null-pointer-dereference-in-totolink-587777cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0731%3A%20NULL%20Pointer%20Dereference%20in%20TOTOLINK%20WA1200&amp;severity=medium&amp;id=696039a7ecefc3cd7c720a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0730-cross-site-scripting-in-phpgurukul-s-d99fea42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0730%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Staff%20Leave%20Management%20System&amp;severity=medium&amp;id=6960329fecefc3cd7c7029a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0729-sql-injection-in-code-projects-inter-c0e5e154</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0729%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=6960248fecefc3cd7c4fa16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14436-cwe-79-improper-neutralization-of-i-ffe6b89c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neeraj_slit%20Brevo%20for%20WooCommerce&amp;severity=high&amp;id=6960248fecefc3cd7c4fa165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14505-cwe-1240-use-of-a-cryptographic-pri-da8a0e79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14505%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Elliptic&amp;severity=medium&amp;id=69602115ecefc3cd7c4b694d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15464-cwe-926-improper-export-of-android--7aa6f84d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15464%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20yintibao%20Fun%20Print%20Mobile&amp;severity=high&amp;id=69602115ecefc3cd7c4b6952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0728-sql-injection-in-code-projects-inter-99e684ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0728%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=696015f101d35e5d0ca3affb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0747-cwe-200-exposure-of-sensitive-inform-698ec942</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0747%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=low&amp;id=69600ee901d35e5d0ca2a7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22253-cwe-863-incorrect-authorization-in--da7b9039</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22253%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20charmbracelet%20soft-serve&amp;severity=medium&amp;id=695ffd5601d35e5d0c85d737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21860-cwe-67-improper-handling-of-windows-8e57b3f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21860%3A%20CWE-67%3A%20Improper%20Handling%20of%20Windows%20Device%20Names%20in%20pallets%20werkzeug&amp;severity=medium&amp;id=695ffd5601d35e5d0c85d733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22257-cwe-79-improper-neutralization-of-i-b7cea917</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22257%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=695ffd5601d35e5d0c85d73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22256-cwe-79-improper-neutralization-of-i-068fdb7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22256%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=695ffd5601d35e5d0c85d73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guloader-malware-being-disguised-as-employee-perfo-f9600c34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guloader%20Malware%20Being%20Disguised%20as%20Employee%20Performance%20Reports&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boto-cor-de-rosa-campaign-reveals-astaroth-whatsap-2257bd3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boto-Cor-de-Rosa%20campaign%20reveals%20Astaroth%20WhatsApp-based%20worm%20activity%20in%20Brazil&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reborn-in-rust-muddywater-evolves-tooling-with-rus-f2c886d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reborn%20in%20Rust%3A%20MuddyWater%20Evolves%20Tooling%20with%20RustyWater%20Implant&amp;severity=medium&amp;id=6960cd4fecefc3cd7c180bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21896-cwe-863-incorrect-authorization-in--4f04eaa7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21896%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20getkirby%20kirby&amp;severity=medium&amp;id=695ff65701d35e5d0c7d3f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22235-cwe-639-authorization-bypass-throug-cdd7f537</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22235%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20OPEXUS%20eComplaint&amp;severity=high&amp;id=695fe7de2717593a336ad51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22234-cwe-639-authorization-bypass-throug-cdf5684d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22234%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20OPEXUS%20eCase%20Portal&amp;severity=critical&amp;id=695fe7de2717593a336ad517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22233-cwe-79-improper-neutralization-of-i-f384c61e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22233%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE%20Audit&amp;severity=medium&amp;id=695fe7de2717593a336ad512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22232-cwe-79-improper-neutralization-of-i-a378ed30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22232%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE%20Audit&amp;severity=medium&amp;id=695fe7de2717593a336ad50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22231-cwe-79-improper-neutralization-of-i-5e71d6a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE%20Audit&amp;severity=medium&amp;id=695fe7de2717593a336ad508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22230-cwe-863-incorrect-authorization-in--e01a693b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22230%3A%20CWE-863%20Incorrect%20Authorization%20in%20OPEXUS%20eCASE%20Audit&amp;severity=high&amp;id=695fe7de2717593a336ad503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-worm-spreads-astaroth-banking-trojan-acro-8ed6135a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Worm%20Spreads%20Astaroth%20Banking%20Trojan%20Across%20Brazil%20via%20Contact%20Auto-Messaging&amp;severity=medium&amp;id=6960058501d35e5d0ca0a539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22587-cwe-79-improper-neutralization-of-i-6a2f2889</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ideagen%20DevonWay&amp;severity=medium&amp;id=695fe7de2717593a336ad51f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22486-cwe-862-missing-authorization-in-ha-2bfe4ed4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22486%3A%20CWE-862%20Missing%20Authorization%20in%20Re%20Gallery&amp;severity=medium&amp;id=695fe4612717593a336a2000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22487-cwe-862-missing-authorization-in-ba-639bdea8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22487%3A%20Missing%20Authorization%20in%20baqend%20Speed%20Kit&amp;severity=null&amp;id=695fe4612717593a336a2003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22488-cwe-862-missing-authorization-in-id-e2898ba4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22488%3A%20Missing%20Authorization%20in%20IdeaBox%20Creations%20Dashboard%20Welcome%20for%20Beaver%20Builder&amp;severity=null&amp;id=695fe4612717593a336a1fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22489-cwe-639-authorization-bypass-throug-b0f9ee3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22489%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Wptexture%20Image%20Slider%20Slideshow&amp;severity=null&amp;id=695fe4612717593a336a1fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targets-high-value-telecommunications-infrastructu-12021b8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targets%20high%20value%20telecommunications%20infrastructure%20in%20South%20Asia&amp;severity=medium&amp;id=695fe4592717593a336a123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22490-cwe-862-missing-authorization-in-ni-76cdc5bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22490%3A%20Missing%20Authorization%20in%20niklaslindemann%20Bulk%20Landing%20Page%20Creator%20for%20WordPress%20LPagery&amp;severity=null&amp;id=695fe4612717593a336a1fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22492-cwe-862-missing-authorization-in-na-98391b73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22492%3A%20Missing%20Authorization%20in%20Nawawi%20Jamili%20Docket%20Cache&amp;severity=null&amp;id=695fe4612717593a336a1ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22517-cwe-862-missing-authorization-in-pa-6bf9aae4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22517%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20GA4WP%3A%20Google%20Analytics%20for%20WordPress&amp;severity=null&amp;id=695fe4612717593a336a1ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0671-cwe-79-improper-neutralization-of-in-6be47e30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20UploadWizard%20extension&amp;severity=medium&amp;id=695fd9d02717593a334c2bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22518-cwe-79-improper-neutralization-of-i-b8832fda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pencilwp%20X%20Addons%20for%20Elementor&amp;severity=null&amp;id=695fd9d02717593a334c2be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22519-cwe-79-improper-neutralization-of-i-3ebf74ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22519%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20MediaPress&amp;severity=null&amp;id=695fd9d02717593a334c2be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22521-cwe-98-improper-control-of-filename-9b7efea9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22521%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20G5Theme%20Handmade%20Framework&amp;severity=null&amp;id=695fd9d02717593a334c2beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59468-vulnerability-in-veeam-backup-and-r-83f9e674</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59468%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=695fd9d02717593a334c2bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55125-vulnerability-in-veeam-backup-and-r-9da41fad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55125%3A%20Vulnerability%20in%20Veeam%20Backup%20And%20Recovery&amp;severity=high&amp;id=695fd9d02717593a334c2bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59469-vulnerability-in-veeam-backup-and-r-110221a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59469%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=695fd9d02717593a334c2bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59470-vulnerability-in-veeam-backup-and-r-84fa8bde</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59470%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=695fd9d02717593a334c2bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22522-cwe-862-missing-authorization-in-mu-89d8f119</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22522%3A%20Missing%20Authorization%20in%20Munir%20Kamal%20Block%20Slider&amp;severity=null&amp;id=695fd9d12717593a334c2c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21639-vulnerability-in-ubiquiti-inc-airma-3788a8cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21639%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20airMAX%20AC&amp;severity=medium&amp;id=695fd9d02717593a334c2be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21638-vulnerability-in-ubiquiti-inc-ubb-x-be288a3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21638%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UBB-XG&amp;severity=high&amp;id=695fd9d02717593a334c2bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22255-cwe-20-improper-input-validation-in-8e0abdcb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22255%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695fd2d12717593a3341ed67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67858-cwe-88-improper-neutralization-of-a-e58bba60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67858%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20https%3A%2F%2Fgithub.com%2FFoobarOy%2F%20Foomuuri&amp;severity=high&amp;id=695fceb6c901b06321fdd524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22244-cwe-1336-improper-neutralization-of-c40ee942</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22244%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20open-metadata%20OpenMetadata&amp;severity=high&amp;id=695fceb6c901b06321fdd528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22241-cwe-434-unrestricted-upload-of-file-2a85b330</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22241%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gunet%20openeclass&amp;severity=high&amp;id=695fcb32c901b06321fa8309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67603-cwe-285-improper-authorization-in-h-a946f8ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67603%3A%20CWE-285%3A%20Improper%20Authorization%20in%20https%3A%2F%2Fgithub.com%2FFoobarOy%2F%20Foomuuri&amp;severity=medium&amp;id=695fcb32c901b06321fa8305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66003-cwe-73-external-control-of-file-nam-dc355c22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66003%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20https%3A%2F%2Fgithub.com%2FKDE%2F%20smb4k&amp;severity=high&amp;id=695fc7afc901b06321f9519d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4596-cwe-639-authorization-bypass-through-db2bb68a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4596%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Asseco%20AMDX&amp;severity=medium&amp;id=695fc7afc901b06321f9519a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-uat-7290-targets-telecoms-with-linux--dedf79ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20UAT-7290%20Targets%20Telecoms%20with%20Linux%20Malware%20and%20ORB%20Nodes&amp;severity=medium&amp;id=695fe16f2717593a3368db6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22041-cwe-704-incorrect-type-conversion-o-dde80bb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22041%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20armurox%20loggingredactor&amp;severity=low&amp;id=695fc7afc901b06321f951a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22034-cwe-636-not-failing-securely-failin-e9d94fcf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22034%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20jvoisin%20snuffleupagus&amp;severity=critical&amp;id=695fc7afc901b06321f951a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66002-cwe-88-improper-neutralization-of-a-0f312f8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66002%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20https%3A%2F%2Fgithub.com%2FKDE%2F%20smb4k&amp;severity=medium&amp;id=695fc426c901b06321f8223e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deep-malware-and-phishing-analysis-breaking-down-a-8618ad40</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deep%20Malware%20and%20Phishing%20Analysis%20-%20Breaking%20Down%20an%20Access-Code-Gated%20Malware%20Delivery%20Chain&amp;severity=medium&amp;id=695fc0a3c901b06321f657cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22028-cwe-843-access-of-resource-using-in-424e4a3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22028%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20preactjs%20preact&amp;severity=high&amp;id=695fc0a3c901b06321f657fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21895-cwe-703-improper-check-or-handling--6a8429b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21895%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20RustCrypto%20RSA&amp;severity=low&amp;id=695fbd1fc901b06321f46f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21891-cwe-287-improper-authentication-in--5685fcec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21891%3A%20CWE-287%3A%20Improper%20Authentication%20in%20IceWhaleTech%20ZimaOS&amp;severity=critical&amp;id=695fb9abc901b06321f2a5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rethinking-security-for-agentic-ai-ed96c8db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rethinking%20Security%20for%20Agentic%20AI&amp;severity=medium&amp;id=695fb968c901b06321f28355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21885-cwe-918-server-side-request-forgery-0aafb775</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21885%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20miniflux%20v2&amp;severity=medium&amp;id=695fb9abc901b06321f2a5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14025-incorrect-execution-assigned-permis-ec02e850</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14025%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=high&amp;id=695fb9abc901b06321f2a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8307-cwe-257-storing-passwords-in-a-recov-d90d2cb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8307%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Asseco%20InfoMedica%20Plus&amp;severity=medium&amp;id=695fb9abc901b06321f2a5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8306-cwe-1220-insufficient-granularity-of-dbab0da2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8306%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Asseco%20InfoMedica%20Plus&amp;severity=medium&amp;id=695fb9abc901b06321f2a5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-patched-in-jspdf-f547f89e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20Patched%20in%20jsPDF&amp;severity=critical&amp;id=695faeddc901b06321ecc624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-exposes-n8n-instances-to-ta-7d28c0ae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20Exposes%20n8n%20Instances%20to%20Takeover%20Attacks&amp;severity=critical&amp;id=695faeddc901b06321ecc628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69260-cwe-346-origin-validation-error-in--e0b42137</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69260%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=695fab8ac901b06321eb9687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69259-cwe-346-origin-validation-error-in--b364d952</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69259%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=695fab8ac901b06321eb9682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69258-cwe-290-authentication-bypass-by-sp-4c2c3579</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69258%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=critical&amp;id=695fab8ac901b06321eb967d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-rustfs-flaw-iranian-ops-webui--51511695</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20RustFS%20Flaw%2C%20Iranian%20Ops%2C%20WebUI%20RCE%2C%20Cloud%20Leaks%2C%20and%2012%20More%20Stories&amp;severity=medium&amp;id=695fe16f2717593a3368db6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-whill-wheelchair-safety-risks-v-6669d0f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20WHILL%20Wheelchair%20Safety%20Risks%20via%20Remote%20Hacking&amp;severity=low&amp;id=695fa7dec901b06321ea46d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0719-stack-based-buffer-overflow-in-red-h-79d4cd86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0719%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=695fab8ac901b06321eb968c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62877-cwe-1188-initialization-of-a-resour-55c4d7c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62877%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20SUSE%20harvester&amp;severity=critical&amp;id=695fa483c901b06321e778f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-state-of-trusted-open-source-74a77711</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20State%20of%20Trusted%20Open%20Source&amp;severity=medium&amp;id=695f9d45c901b06321e3fba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-deliver-nodecordrat-57b5d428</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NPM%20Packages%20Deliver%20NodeCordRAT&amp;severity=medium&amp;id=695fa482c901b06321e77866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluedelta-evolves-credential-harvesting-f2bf1165</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlueDelta%20Evolves%20Credential%20Harvesting&amp;severity=medium&amp;id=695fa482c901b06321e7786b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-browser-updates-targeting-wordpress-administr-6d53f235</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Browser%20Updates%20Targeting%20WordPress%20Administrators%20via%20Malicious%20Plugin&amp;severity=medium&amp;id=695fa482c901b06321e77875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-hpe-oneview-vulnerability-exploited-in-at-236d5b77</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20HPE%20OneView%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=695f92bcc901b06321dddc0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-ise-security-vulnerability-after-pub-7c9b7842</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20ISE%20Security%20Vulnerability%20After%20Public%20PoC%20Exploit%20Release&amp;severity=low&amp;id=695fe16f2717593a3368db70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-nodecordrat-hidden-in-npm-bitc-55f3fadd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20NodeCordRAT%20Hidden%20in%20npm%20Bitcoin-Themed%20Packages&amp;severity=low&amp;id=695fe16f2717593a3368db73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66001-cwe-295-improper-certificate-valida-1cc9c04d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66001%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SUSE%20neuvector&amp;severity=high&amp;id=695f8862c901b06321d89e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21894-cwe-290-authentication-bypass-by-sp-abdc7b71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21894%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=695f815bc901b06321d3faf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coolify-discloses-11-critical-flaws-enabling-full--817621ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coolify%20Discloses%2011%20Critical%20Flaws%20Enabling%20Full%20Server%20Compromise%20on%20Self-Hosted%20Instances&amp;severity=critical&amp;id=695fe16f2717593a3368db76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21874-cwe-772-missing-release-of-resource-267725cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21874%3A%20CWE-772%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=695f815bc901b06321d3fb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21873-cwe-79-improper-neutralization-of-i-e5235d5b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21873%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=high&amp;id=695f815bc901b06321d3fb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21872-cwe-79-improper-neutralization-of-i-33e479c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21872%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=695f815bc901b06321d3fb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21871-cwe-79-improper-neutralization-of-i-75a4b0d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21871%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=695f815bc901b06321d3fafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14984-cwe-79-improper-neutralization-of-i-0cc71297</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14984%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20Form%20%E2%80%93%20Contact%20Form%20Builder%2C%20Booking%2C%20Reservation%2C%20Subscribe%20for%20Block%20Editor&amp;severity=medium&amp;id=695f7a58c901b06321d0bb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0676-missing-authorization-in-g5theme-zor-49fcece6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0676%3A%20Missing%20Authorization%20in%20G5Theme%20Zorka&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0675-exposure-of-sensitive-system-informa-eba9da76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0675&amp;severity=null&amp;id=695f7a5cc901b06321d0bc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0674-missing-authorization-in-campaign-mo-9d15d4cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0674%3A%20Missing%20Authorization%20in%20Campaign%20Monitor%20Campaign%20Monitor%20for%20WordPress&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69169-improper-neutralization-of-script-r-002a22c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69169%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Noor%20Alam%20Easy%20Media%20Download&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68892-improper-neutralization-of-input-du-f98ab1d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68892%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%40hotmail.com%20Scroll%20rss%20excerpt&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68891-improper-neutralization-of-input-du-f4133803</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Sutana%20WP%20App%20Bar&amp;severity=high&amp;id=695f7a5cc901b06321d0bc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68890-improper-neutralization-of-input-du-8d192e59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hands01%20e-shops&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68887-improper-neutralization-of-input-du-4e9ba80b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CMSJunkie%20-%20WordPress%20Business%20Directory%20Plugins%20WP-BusinessDirectory&amp;severity=high&amp;id=695f7a5cc901b06321d0bc59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68875-improper-neutralization-of-input-du-08f5807d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jcaruso001%20Flaming%20Password%20Reset&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68874-improper-neutralization-of-input-du-560bb713</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68874%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shahjada%20Visitor%20Stats%20Widget&amp;severity=high&amp;id=695f7a5bc901b06321d0bc2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68873-improper-neutralization-of-input-du-5671c8e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chlo%C3%A9digital%20PRIMER%20by%20chlo%C3%A9digital&amp;severity=high&amp;id=695f7a5bc901b06321d0bc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68867-improper-neutralization-of-input-du-3d8da08e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68867%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anibalwainstein%20Effect%20Maker&amp;severity=medium&amp;id=695f7a5bc901b06321d0bc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67937-improper-control-of-filename-for-in-35b85a68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67937%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Hendon&amp;severity=high&amp;id=695f7a5bc901b06321d0bc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67936-improper-control-of-filename-for-in-16578b3d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67936%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Curly&amp;severity=high&amp;id=695f7a5bc901b06321d0bc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67935-improper-control-of-filename-for-in-47653ee3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67935%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Optimize&amp;severity=high&amp;id=695f7a5bc901b06321d0bc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67934-improper-control-of-filename-for-in-ea2bd869</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67934%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wellspring&amp;severity=high&amp;id=695f7a5bc901b06321d0bc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67932-improper-neutralization-of-input-du-22c8f156</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20Listeo%20Core&amp;severity=medium&amp;id=695f7a5bc901b06321d0bc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67931-insertion-of-sensitive-information--805d24f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67931%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20AITpro%20BulletProof%20Security&amp;severity=high&amp;id=695f7a5bc901b06321d0bc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67930-improper-neutralization-of-input-du-77488d71</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vernon%20Systems%20Limited%20eHive%20Search&amp;severity=medium&amp;id=695f7a5bc901b06321d0bc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67928-improper-neutralization-of-special--625fe5f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67928%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themesuite%20Automotive%20Listings&amp;severity=critical&amp;id=695f7a5ac901b06321d0bbf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67927-improper-neutralization-of-input-du-e1912707</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=medium&amp;id=695f7a5ac901b06321d0bbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67926-missing-authorization-in-shahjahan--bd1e512f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67926%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20Fluent%20Support&amp;severity=high&amp;id=695f7a5ac901b06321d0bbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67925-improper-control-of-filename-for-in-9899a226</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67925%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zozothemes%20Corpkit&amp;severity=high&amp;id=695f7a5ac901b06321d0bbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67924-unrestricted-upload-of-file-with-da-3e2ed3af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67924%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Corpkit&amp;severity=critical&amp;id=695f7a5ac901b06321d0bbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67922-improper-neutralization-of-input-du-fc31c3e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67922%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=medium&amp;id=695f7a5ac901b06321d0bbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67921-improper-neutralization-of-special--86d74aed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67921%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VanKarWai%20Lobo&amp;severity=critical&amp;id=695f7a5ac901b06321d0bbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67920-improper-control-of-filename-for-in-2662c706</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67920%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Neo%20Ocular&amp;severity=critical&amp;id=695f7a5ac901b06321d0bbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67919-authorization-bypass-through-user-c-b1bd716b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67919%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WofficeIO%20Woffice%20Core&amp;severity=high&amp;id=695f7a5ac901b06321d0bbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67918-improper-neutralization-of-input-du-741baa31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WofficeIO%20Woffice&amp;severity=medium&amp;id=695f7a5ac901b06321d0bbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67917-missing-authorization-in-shinetheme-4feea974</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67917%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=695f7a59c901b06321d0bbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67916-improper-neutralization-of-input-du-455113d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67916%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20Jobify&amp;severity=medium&amp;id=695f7a59c901b06321d0bbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67915-authentication-bypass-using-an-alte-31496ea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67915%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Arraytics%20Timetics&amp;severity=critical&amp;id=695f7a59c901b06321d0bbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67914-path-traversal-in-beeteam368-vidmov-8d0e5cfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67914%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20beeteam368%20VidMov&amp;severity=high&amp;id=695f7a59c901b06321d0bbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67913-missing-authorization-in-arubait-de-ae13f281</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67913%3A%20Missing%20Authorization%20in%20Aruba.it%20Dev%20Aruba%20HiSpeed%20Cache&amp;severity=critical&amp;id=695f7a59c901b06321d0bba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67911-deserialization-of-untrusted-data-i-1611c32e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67911%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tribulant%20Software%20Newsletters&amp;severity=critical&amp;id=695f7a59c901b06321d0bba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27004-improper-neutralization-of-input-du-901001d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Famous%20-%20Responsive%20Image%20And%20Video%20Grid%20Gallery%20WordPress%20Plugin&amp;severity=medium&amp;id=695f7a59c901b06321d0bba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27002-improper-neutralization-of-input-du-cf552652</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27002%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20CountDown%20With%20Image%20or%20Video%20Background&amp;severity=medium&amp;id=695f7a59c901b06321d0bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23993-improper-neutralization-of-special--807b5bf9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23993%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RiceTheme%20Felan%20Framework&amp;severity=critical&amp;id=695f7a59c901b06321d0bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23504-authentication-bypass-using-an-alte-338b8f53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23504%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20RiceTheme%20Felan%20Framework&amp;severity=critical&amp;id=695f7a59c901b06321d0bb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22728-improper-neutralization-of-special--a1d3c18d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22728%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AmentoTech%20Workreap%20(theme&apos;s%20plugin)&amp;severity=critical&amp;id=695f7a58c901b06321d0bb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22726-server-side-request-forgery-ssrf-in-d25250ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22726%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20_nK%20nK%20Themes%20Helper&amp;severity=critical&amp;id=695f7a58c901b06321d0bb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22725-improper-neutralization-of-input-du-22129f92</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22725%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20loopus%20WP%20Virtual%20Assistant&amp;severity=medium&amp;id=695f7a58c901b06321d0bb4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22715-missing-authorization-in-loopus-wp--bb20f474</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22715%3A%20Missing%20Authorization%20in%20loopus%20WP%20Attractive%20Donations%20System%20-%20Easy%20Stripe%20%26%20Paypal%20donations&amp;severity=high&amp;id=695f7a58c901b06321d0bb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22713-improper-neutralization-of-special--f789e7b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22713%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vanquish%20WooCommerce%20Orders%20%26%20Customers%20Exporter&amp;severity=critical&amp;id=695f7a58c901b06321d0bb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22712-improper-control-of-filename-for-in-f3c03723</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22712%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20QantumThemes%20Typify&amp;severity=critical&amp;id=695f7a58c901b06321d0bb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22708-improper-control-of-filename-for-in-c75952d4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22708%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Mitech&amp;severity=critical&amp;id=695f7a58c901b06321d0bb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22707-improper-control-of-filename-for-in-9459765a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22707%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Moody&amp;severity=critical&amp;id=695f7a58c901b06321d0bb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22509-improper-control-of-filename-for-in-ee6f4eee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22509%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TMRW-studio%20Atlas&amp;severity=critical&amp;id=695f7a58c901b06321d0bb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14431-improper-control-of-filename-for-in-19773b5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14431%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20THEMELOGI%20Navian&amp;severity=critical&amp;id=695f7a56c901b06321d0bb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14430-improper-control-of-filename-for-in-799c0ebc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14430%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Brook&amp;severity=critical&amp;id=695f7a56c901b06321d0bb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14429-improper-control-of-filename-for-in-3357f4f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20AeroLand&amp;severity=critical&amp;id=695f7a56c901b06321d0bb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14360-missing-authorization-in-kaira-bloc-3771edfd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14360%3A%20Missing%20Authorization%20in%20Kaira%20Blockons&amp;severity=critical&amp;id=695f7a56c901b06321d0bb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14359-improper-control-of-filename-for-in-397f90b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14359%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20brandexponents%20Oshine&amp;severity=critical&amp;id=695f7a56c901b06321d0baff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14358-missing-authorization-in-sizam-rehu-4f69b90e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14358%3A%20Missing%20Authorization%20in%20sizam%20REHub%20Framework&amp;severity=critical&amp;id=695f7a56c901b06321d0bafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13504-improper-neutralization-of-input-du-a40e55b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13504%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Real%20Estate%20Pro&amp;severity=medium&amp;id=695f7a56c901b06321d0baf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12551-improper-neutralization-of-input-du-9ef8f551</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20ListingHub&amp;severity=medium&amp;id=695f7a56c901b06321d0baf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12550-improper-control-of-filename-for-in-5b07e167</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12550%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20OchaHouse&amp;severity=critical&amp;id=695f7a56c901b06321d0baf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12549-improper-control-of-filename-for-in-b8432961</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12549%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20Rozy%20-%20Flower%20Shop&amp;severity=critical&amp;id=695f7a56c901b06321d0baf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0701-sql-injection-in-code-projects-inter-2e172073</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0701%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f68bec901b06321bec204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13679-cwe-862-missing-authorization-in-th-ad4d3464</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13679%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=695f5aaec901b06321b263ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0700-sql-injection-in-code-projects-inter-686078d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0700%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f5aaec901b06321b263b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-launches-chatgpt-health-with-isolated-encry-7f957863</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Launches%20ChatGPT%20Health%20with%20Isolated%2C%20Encrypted%20Health%20Data%20Controls&amp;severity=low&amp;id=695fe16f2717593a3368db79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0699-sql-injection-in-code-projects-inter-b85136f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0699%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f5022c901b06321a78445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0698-sql-injection-in-code-projects-inter-76fded15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0698%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f4596c901b06321a377e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-microsoft-office-and-hpe-oneview-bugs-a-85288de4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Microsoft%20Office%20and%20HPE%20OneView%20Bugs%20as%20Actively%20Exploited&amp;severity=low&amp;id=695fe16f2717593a3368db7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0697-sql-injection-in-code-projects-inter-219dd5f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0697%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f3786c901b063217f0239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21427-uncontrolled-search-path-element-in-aad0c32f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20PIONEER%20CORPORATION%20USB%20DAC%20Amplifier%20APS-DA101JS&amp;severity=high&amp;id=695f3089c901b0632175e2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0707-incorrect-behavior-order-authorizati-e87902c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0707%3A%20Incorrect%20Behavior%20Order%3A%20Authorization%20Before%20Parsing%20and%20Canonicalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=695f2d53e471bcf0302d1c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12640-cwe-862-missing-authorization-in-ga-44a422b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12640%3A%20CWE-862%20Missing%20Authorization%20in%20premio%20Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&amp;severity=medium&amp;id=695f1f43e471bcf0300999b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14275-cwe-79-improper-neutralization-of-i-01fc7803</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Kit%20for%20Elementor%20%E2%80%93%20Powerful%20Addons%20for%20Elementor%2C%20Widgets%20%26%20Templates%20for%20WordPress&amp;severity=medium&amp;id=695f1f43e471bcf0300999b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21877-cwe-94-improper-control-of-generati-ab77daef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21877%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=695f0dafe471bcf030f5212d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21868-cwe-1333-inefficient-regular-expres-5e63e72a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21868%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=695efc26e471bcf030c50479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-using-gephi-with-dshield-sensor-data-wed--245fe4bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data%2C%20(Wed%2C%20Jan%207th)&amp;severity=medium&amp;id=695ef93a07b8a419a776ec28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-08-6ebd0adb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-08&amp;severity=medium&amp;id=69604781ecefc3cd7c74f1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68718-na-173f2be3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68718%3A%20n%2Fa&amp;severity=medium&amp;id=69602115ecefc3cd7c4b6955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68719-na-e1c0f72f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68719%3A%20n%2Fa&amp;severity=high&amp;id=6960197501d35e5d0ca49c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68716-na-0ad23b88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68716%3A%20n%2Fa&amp;severity=high&amp;id=696015f101d35e5d0ca3aff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68717-na-21140e62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68717%3A%20n%2Fa&amp;severity=critical&amp;id=6960126e01d35e5d0ca32a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65731-na-c6d28df0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65731%3A%20n%2Fa&amp;severity=medium&amp;id=696007e501d35e5d0ca11112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68715-na-e2ecb9a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68715%3A%20n%2Fa&amp;severity=critical&amp;id=696007e501d35e5d0ca1110e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66916-na-e51fb6f6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66916%3A%20n%2Fa&amp;severity=critical&amp;id=696007e501d35e5d0ca11109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66913-na-091de65a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66913%3A%20n%2Fa&amp;severity=critical&amp;id=696007e501d35e5d0ca11105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67325-na-ab4cd6cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67325%3A%20n%2Fa&amp;severity=critical&amp;id=695ffd5601d35e5d0c85d72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65518-na-4a47a9ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65518%3A%20n%2Fa&amp;severity=high&amp;id=695ffd5601d35e5d0c85d72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67825-na-4635c23b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67825%3A%20n%2Fa&amp;severity=medium&amp;id=695fe7de2717593a336ad4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61550-na-1073f50c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61550%3A%20n%2Fa&amp;severity=medium&amp;id=695fe4622717593a336a202c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61549-na-a8ca8bbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61549%3A%20n%2Fa&amp;severity=medium&amp;id=695fe4622717593a336a2029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61548-na-d7c9e0d8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61548%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4622717593a336a2026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61547-na-ee49a114</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61547%3A%20n%2Fa&amp;severity=medium&amp;id=695fe4622717593a336a2023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61546-na-f0011f4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61546%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4622717593a336a2020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50334-na-9d3e8590</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50334%3A%20n%2Fa&amp;severity=high&amp;id=695fe4622717593a336a2019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56425-na-4205a5a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56425%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4612717593a336a1ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56424-na-35b7b549</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56424%3A%20n%2Fa&amp;severity=high&amp;id=695fe4612717593a336a1ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61246-na-22648793</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61246%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4612717593a336a1fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67091-na-672ab351</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67091%3A%20n%2Fa&amp;severity=medium&amp;id=695fd2d12717593a3341ed63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67090-na-904d4e45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67090%3A%20n%2Fa&amp;severity=medium&amp;id=695fd2d12717593a3341ed5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67089-na-8b9c997f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67089%3A%20n%2Fa&amp;severity=high&amp;id=695fd2d12717593a3341ed5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63611-na-223c28fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63611%3A%20n%2Fa&amp;severity=high&amp;id=695fd2d12717593a3341ed56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21858-cwe-20-improper-input-validation-in-722f9002</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21858%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=695ef5ea07b8a419a7738b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21875-cwe-89-improper-neutralization-of-s-b0c482ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21875%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=critical&amp;id=695ef26a07b8a419a77247a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21869-cwe-787-out-of-bounds-write-in-ggml-e267ba1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21869%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=695eeee107b8a419a7712f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15346-cwe-306-missing-authentication-for--99034569</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15346%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20wolfSSL%20wolfSSL-py&amp;severity=critical&amp;id=695eeee107b8a419a7712f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21859-cwe-918-server-side-request-forgery-cc5f877d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21859%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=695eeee107b8a419a7712f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21695-cwe-915-improperly-controlled-modif-d4ca135e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21695%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20kromitgmbh%20titra&amp;severity=medium&amp;id=695eeee107b8a419a7712f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21694-cwe-284-improper-access-control-in--29f24380</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21694%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20kromitgmbh%20titra&amp;severity=medium&amp;id=695eeb5d07b8a419a75c0a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62224-cwe-451-user-interface-ui-misrepres-3f2120c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62224%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=695ee7de07b8a419a7566a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21697-cwe-362-concurrent-execution-using--3b069392</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21697%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20rezmoss%20axios4go&amp;severity=high&amp;id=695ee0db07b8a419a74d164c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21851-cwe-22-improper-limitation-of-a-pat-afbd0b53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21851%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Project-MONAI%20MONAI&amp;severity=medium&amp;id=695ee0db07b8a419a74d1653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22047-cwe-20-improper-input-validation-in-22fbe620</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22047%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695edb802efadb62cf875e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12776-cwe-79-improper-neutralization-of-i-a457465f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Commvault%20WebConsole&amp;severity=low&amp;id=695edb802efadb62cf875e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22046-cwe-20-improper-input-validation-in-0728d445</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22046%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695edb802efadb62cf875e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21693-cwe-20-improper-input-validation-in-b2a76a3a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21693%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ee29307b8a419a74fbfe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21692-cwe-20-improper-input-validation-in-e2089966</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21692%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ee29307b8a419a74fbfe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21691-cwe-20-improper-input-validation-in-3f0702c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21691%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695ed7fb2efadb62cf86c40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21690-cwe-20-improper-input-validation-in-54e7f8fe</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21690%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695ed7fb2efadb62cf86c406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21689-cwe-20-improper-input-validation-in-d3f14076</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21689%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695ed7fb2efadb62cf86c415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21688-cwe-20-improper-input-validation-in-b11fd34e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21688%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed7fb2efadb62cf86c410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21687-cwe-20-improper-input-validation-in-05a2397a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21687%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed4782efadb62cf85dbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21686-cwe-20-improper-input-validation-in-3e125ec9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21686%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed4782efadb62cf85dbf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21685-cwe-20-improper-input-validation-in-dd5e1027</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21685%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed4782efadb62cf85dbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21684-cwe-20-improper-input-validation-in-4696263e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21684%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed0f72efadb62cf845619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69222-cwe-918-server-side-request-forgery-6b2634c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69222%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=critical&amp;id=695ed0f72efadb62cf84560f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13151-cwe-120-buffer-copy-without-checkin-c9bb9538</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13151%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20GnuTLS%20libtasn1&amp;severity=high&amp;id=695ed0f72efadb62cf84560b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21683-cwe-20-improper-input-validation-in-49152906</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21683%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed0f72efadb62cf845614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69221-cwe-862-missing-authorization-in-da-f1390c60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69221%3A%20CWE-862%3A%20Missing%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=695ecd702efadb62cf830358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21682-cwe-20-improper-input-validation-in-2596520c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21682%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed0f72efadb62cf84561e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69220-cwe-862-missing-authorization-in-da-78b98c56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69220%3A%20CWE-862%3A%20Missing%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=695ec9ec2efadb62cf81f4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21681-cwe-20-improper-input-validation-in-efe8ad98</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21681%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ec9ec2efadb62cf81f4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22187-cwe-502-deserialization-of-untruste-761986c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22187%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Open%20Microscopy%20Environment%20Bio-Formats&amp;severity=medium&amp;id=695ec6692efadb62cf814038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22186-cwe-611-improper-restriction-of-xml-9cf3ffb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22186%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Open%20Microscopy%20Environment%20Bio-Formats&amp;severity=medium&amp;id=695ec6692efadb62cf814033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22185-cwe-125-out-of-bounds-read-in-openl-149c6b1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22185%3A%20CWE-125%20Out-of-bounds%20Read%20in%20OpenLDAP%20Foundation%20OpenLDAP&amp;severity=medium&amp;id=695ec6692efadb62cf81402d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22184-cwe-120-buffer-copy-without-checkin-2d99f8c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22184%3A%20CWE-787%20Out-of-bounds%20Write%20in%20zlib%20software%20zlib&amp;severity=medium&amp;id=695ec6692efadb62cf814027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66620-cwe-553-command-shell-in-externally-ff6ed5ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66620%3A%20CWE-553%20Command%20Shell%20in%20Externally%20Accessible%20Directory%20in%20Columbia%20Weather%20Systems%20MicroServer&amp;severity=high&amp;id=695ebf602efadb62cf7fc350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64305-cwe-313-cleartext-storage-in-a-file-29a0875f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64305%3A%20CWE-313%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20Columbia%20Weather%20Systems%20MicroServer&amp;severity=high&amp;id=695ebf602efadb62cf7fc34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61939-cwe-923-improper-restriction-of-com-04b70488</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61939%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Columbia%20Weather%20Systems%20MicroServer&amp;severity=high&amp;id=695ebbdb2efadb62cf6b2ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0670-cwe-79-improper-neutralization-of-in-ad1ac8dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20ProofreadPage%20Extension&amp;severity=medium&amp;id=695eb01e7349d0379dbd7dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21856-cwe-89-improper-neutralization-of-s-8cdebb6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21856%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20the-hideout%20tarkov-data-manager&amp;severity=high&amp;id=695ea9147349d0379dba5700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21855-cwe-79-improper-neutralization-of-i-ad553004</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21855%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20the-hideout%20tarkov-data-manager&amp;severity=critical&amp;id=695ea9147349d0379dba56fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21854-cwe-287-improper-authentication-in--7cc8c676</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21854%3A%20CWE-287%3A%20Improper%20Authentication%20in%20the-hideout%20tarkov-data-manager&amp;severity=critical&amp;id=695ea9147349d0379dba56f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21680-cwe-476-null-pointer-dereference-in-047e320f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21680%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e9e877349d0379db58c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0669-cwe-22-improper-limitation-of-a-path-051a3740</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0669%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20CSS%20extension&amp;severity=high&amp;id=695e9e877349d0379db58c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0668-cwe-1333-inefficient-regular-express-21491780</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0668%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20VisualData%20Extension&amp;severity=medium&amp;id=695e9e877349d0379db58c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66560-cwe-770-allocation-of-resources-wit-b1c6da4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66560%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20quarkusio%20quarkus&amp;severity=medium&amp;id=695e9b047349d0379db428c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61782-cwe-601-url-redirection-to-untruste-13f1c6b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61782%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=695e9b047349d0379db428c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58441-cwe-918-server-side-request-forgery-3b26c3ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58441%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20KnowageLabs%20Knowage-Server&amp;severity=medium&amp;id=695e97857349d0379db35c0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22539-cwe-201-insertion-of-sensitive-info-0d68abb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22539%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=medium&amp;id=695e97867349d0379db35c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21679-cwe-20-improper-input-validation-in-2c518fac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21679%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695e97867349d0379db35c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21678-cwe-20-improper-input-validation-in-0c47d3b9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21678%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695e97867349d0379db35c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21506-cwe-20-improper-input-validation-in-31f187d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21506%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21505-cwe-20-improper-input-validation-in-712baf89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21505%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21503-cwe-20-improper-input-validation-in-1c4e70a0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21503%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21504-cwe-122-heap-based-buffer-overflow--e39a2a83</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21504%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21501-cwe-20-improper-input-validation-in-eead7bde</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21501%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21502-cwe-20-improper-input-validation-in-8e09d8ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21502%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21500-cwe-20-improper-input-validation-in-61e61046</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21500%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21499-cwe-20-improper-input-validation-in-13cb06df</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21499%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21498-cwe-20-improper-input-validation-in-e0e991fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21498%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21496-cwe-20-improper-input-validation-in-19443145</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21496%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4677-cwe-613-insufficient-session-expirat-37530d49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4677%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20ABB%20WebPro%20SNMP%20Card%20PowerValue&amp;severity=medium&amp;id=695e97857349d0379db35c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/black-cat-behind-seo-poisoning-malware-campaign-ta-e273b63e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Black%20Cat%20Behind%20SEO%20Poisoning%20Malware%20Campaign%20Targeting%20Popular%20Software%20Searches&amp;severity=medium&amp;id=695ec4a92efadb62cf80eb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21497-cwe-20-improper-input-validation-in-5f20b0a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21497%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21495-cwe-20-improper-input-validation-in-cf10371c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21495%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22537-cwe-497-exposure-of-sensitive-syste-d934be58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22537%3A%20CWE-497%3A%20Exposure%20of%20sensitive%20system%20information%20to%20an%20unauthorized%20control%20sphere%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=medium&amp;id=695e93fd7349d0379db27899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4676-cwe-303-incorrect-implementation-of--73ca6166</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4676%3A%20CWE-303%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20ABB%20WebPro%20SNMP%20Card%20PowerValue&amp;severity=high&amp;id=695e93fd7349d0379db27893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0618-cwe-79-improper-neutralization-of-in-b2d96a0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=695e93fd7349d0379db27896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4675-cwe-754-improper-check-for-unusual-o-57c617f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4675%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20ABB%20WebPro%20SNMP%20Card%20PowerValue&amp;severity=medium&amp;id=695e93fd7349d0379db278a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22536-cwe-269-improper-privilege-manageme-73d1af88</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22536%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e93fd7349d0379db278ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22535-cwe-1366-frail-security-in-protocol-7dc80036</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22535%3A%20CWE-1366%3A%20Frail%20Security%20in%20Protocols%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e90787349d0379db110ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20029-improper-restriction-of-xml-externa-18fc28d6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20029%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=695e8cf77349d0379db03209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20027-exposure-of-sensitive-information-t-3a7e9bbe</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20027%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=695e8cf77349d0379db03206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20026-double-free-in-cisco-cisco-secure-f-811fd0ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20026%3A%20Double%20Free%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=695e8cf77349d0379db03203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22544-cwe-319-cleartext-transmission-of-s-944ed6fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22544%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e8cf77349d0379db0320c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22543-cwe-261-week-encoding-for-passwords-53f4a645</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22543%3A%20CWE-261%3A%20Week%20encoding%20for%20passwords%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=medium&amp;id=695e89727349d0379daecb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12543-improper-input-validation-in-red-ha-a7633912</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12543%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%204.14.4%20for%20Spring%20Boot%203.5.11&amp;severity=critical&amp;id=695e89727349d0379daecb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22542-cwe-400-uncontrolled-resource-consu-ef7dbc79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22542%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=critical&amp;id=695e7ee47349d0379daa4383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62327-cwe-522-insufficiently-protected-cr-876f1fc0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62327%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20HCLSoftware%20DevOps%20Deploy&amp;severity=medium&amp;id=695e7b617349d0379da9360d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22541-cwe-400-uncontrolled-resource-consu-e55d8252</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22541%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e7b617349d0379da93610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-extensions-with-900000-downloads-caught-ste-bc653709</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Extensions%20With%20900%2C000%20Downloads%20Caught%20Stealing%20AI%20Chats&amp;severity=medium&amp;id=695e77a97349d0379da82ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22540-cwe-400-uncontrolled-resource-consu-2abb1104</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22540%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20EFACEC%20QC60%2F90%2F120&amp;severity=critical&amp;id=695e6d507349d0379da4e26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49335-cwe-918-server-side-request-forgery-ecdae545</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49335%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20minnur%20External%20Media&amp;severity=null&amp;id=695e6d507349d0379da4e26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-totolink-range-extender-allows-de-5ce887e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20Totolink%20Range%20Extender%20Allows%20Device%20Takeover&amp;severity=low&amp;id=695e66157349d0379da2f167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-vulnerability-cvss-100-allows-unauthe-5ad0cf4d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Vulnerability%20(CVSS%2010.0)%20Allows%20Unauthenticated%20Attackers%20to%20Take%20Full%20Control&amp;severity=critical&amp;id=695ec4a92efadb62cf80eb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/several-code-execution-flaws-patched-in-veeam-back-d3fbbb64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Several%20Code%20Execution%20Flaws%20Patched%20in%20Veeam%20Backup%20%26%20Replication&amp;severity=medium&amp;id=695e62917349d0379da25619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15479-ngsurvey-enterprise-364-stored-xss--f860fbd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15479%3A%20NGSurvey%20Enterprise%203.6.4%20stored%20XSS%20via%20survey%20content%20enables%20arbitrary%20JavaScript%20execution%20in%20Data%20Illusion%20%20Zumbrunn%20NGSurvey&amp;severity=medium&amp;id=695e62d67349d0379da25d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-gobruteforcer-ai-generated-server-defaults--fb78f184</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20GoBruteforcer%3A%20AI-Generated%20Server%20Defaults%2C%20Weak%20Passwords%2C%20and%20Crypto-Focused%20Campaigns&amp;severity=medium&amp;id=695e5bc17349d0379da06cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6225-cwe-78-improper-neutralization-of-sp-9604023e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6225%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kieback%26Peter%20Neutrino-GLT&amp;severity=medium&amp;id=695e5f407349d0379da193fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47552-cwe-502-deserialization-of-untruste-379cd3b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47552%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Digital%20zoom%20studio%20DZS%20Video%20Gallery&amp;severity=critical&amp;id=695e5bc07349d0379da06c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46494-cwe-79-improper-neutralization-of-i-e942f792</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46494%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themesgrove%20WidgetKit%20Pro&amp;severity=high&amp;id=695e5bc07349d0379da06c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46434-cwe-862-missing-authorization-in-po-352c9581</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46434%3A%20CWE-862%20Missing%20Authorization%20in%20POSIMYTH%20Innovation%20The%20Plus%20Addons%20for%20Elementor%20Pro&amp;severity=medium&amp;id=695e54ca7349d0379d8a6f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46256-cwe-35-path-traversal-in-sigmaplugi-a9b59d9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46256%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20SigmaPlugin%20Advanced%20Database%20Cleaner%20PRO&amp;severity=medium&amp;id=695e54ca7349d0379d8a6f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-zero-day-in-discontinued-d-link-de-18bfc2bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Zero-Day%20in%20Discontinued%20D-Link%20Devices&amp;severity=critical&amp;id=695e54817349d0379d8a4f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32303-cwe-89-improper-neutralization-of-s-e8e6b759</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32303%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mojoomla%20WPCHURCH&amp;severity=critical&amp;id=695e54ca7349d0379d8a6f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32300-cwe-79-improper-neutralization-of-i-d9ebbb0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Digital%20zoom%20studio%20DZS%20Video%20Gallery&amp;severity=high&amp;id=695e4dab7349d0379d7f2b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31643-cwe-266-incorrect-privilege-assignm-54b5b8f5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31643%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Dasinfomedia%20WPCHURCH&amp;severity=high&amp;id=695e4dab7349d0379d7f2b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69080-cwe-98-improper-control-of-filename-5d7b6f22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69080%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JanStudio%20Gecko&amp;severity=null&amp;id=695e4dab7349d0379d7f2b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69081-cwe-98-improper-control-of-filename-68382000</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Hope&amp;severity=null&amp;id=695e4c107349d0379d7d5646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69082-cwe-79-improper-neutralization-of-i-7cb8008a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69082%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Frenify%20Arlo&amp;severity=null&amp;id=695e4c107349d0379d7d5649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69333-cwe-862-missing-authorization-in-cr-8715fc87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69333%3A%20Missing%20Authorization%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=695e4c107349d0379d7d564c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69344-cwe-862-missing-authorization-in-th-7166ad74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69344%3A%20Missing%20Authorization%20in%20themehunk%20Oneline%20Lite&amp;severity=null&amp;id=695e4c107349d0379d7d564f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-actors-exploiting-complex-routing-scenari-85a18e07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20actors%20exploiting%20complex%20routing%20scenarios%20and%20misconfigured%20spoof%20protections&amp;severity=medium&amp;id=695e48e2a55ed4ed99a6732f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/complex-routing-misconfigurations-exploited-for-do-a7e27402</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Complex%20Routing%2C%20Misconfigurations%20Exploited%20for%20Domain%20Spoofing%20in%20Phishing%20Attacks&amp;severity=medium&amp;id=695e452ca55ed4ed99a529de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n8n-warns-of-cvss-100-rce-vulnerability-affecting--56ace4da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=n8n%20Warns%20of%20CVSS%2010.0%20RCE%20Vulnerability%20Affecting%20Self-Hosted%20and%20Cloud%20Versions&amp;severity=critical&amp;id=695e5b897349d0379da03fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-future-of-cybersecurity-includes-non-human-emp-e322fd74</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Future%20of%20Cybersecurity%20Includes%20Non-Human%20Employees&amp;severity=medium&amp;id=695e5b897349d0379da03fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/veeam-patches-critical-rce-vulnerability-with-cvss-e6b200e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Veeam%20Patches%20Critical%20RCE%20Vulnerability%20with%20CVSS%209.0%20in%20Backup%20%26%20Replication&amp;severity=critical&amp;id=695e5b897349d0379da03faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-misconfigured-email-routing-can-en-234c9c8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20Misconfigured%20Email%20Routing%20Can%20Enable%20Internal%20Domain%20Phishing&amp;severity=medium&amp;id=695e5b897349d0379da03fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68637-cwe-297-improper-validation-of-cert-54595ab4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68637%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Uniffle&amp;severity=critical&amp;id=695e2cc2a55ed4ed999bf8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-phishing-campaign-with-qr-codes-rendered-using-a-712d9617</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table%2C%20(Wed%2C%20Jan%207th)&amp;severity=medium&amp;id=695e290ca55ed4ed999b4180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13722-cwe-862-missing-authorization-in-te-4e0569ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13722%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=695e4c107349d0379d7d5664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14057-cwe-79-improper-neutralization-of-i-e0cbca8e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tugbucket%20Multi-column%20Tag%20Map&amp;severity=medium&amp;id=695e4c117349d0379d7d56b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14077-cwe-352-cross-site-request-forgery--993e8e7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14077%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20openchamp%20Simcast&amp;severity=medium&amp;id=695e4c137349d0379d7d5789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15058-cwe-80-improper-neutralization-of-s-684b5e13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15058%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20spwebguy%20Responsive%20Pricing%20Table&amp;severity=medium&amp;id=695e4c147349d0379d7d581e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14114-cwe-79-improper-neutralization-of-i-03ca8042</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14114%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chrisblackwell%201180px%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d57a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14460-cwe-862-missing-authorization-in-en-1f2470ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14460%3A%20CWE-862%20Missing%20Authorization%20in%20enartia%20Piraeus%20Bank%20WooCommerce%20Payment%20Gateway&amp;severity=medium&amp;id=695e4c147349d0379d7d5801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14122-cwe-79-improper-neutralization-of-i-b24e104e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14122%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anybodesign%20AD%20Sliding%20FAQ&amp;severity=medium&amp;id=695e4c137349d0379d7d57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13974-cwe-79-improper-neutralization-of-i-e3145fcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13974%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehigh%20Email%20Customizer%20for%20WooCommerce%20%7C%20Drag%20and%20Drop%20Email%20Templates%20Builder&amp;severity=medium&amp;id=695e4c117349d0379d7d5696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14121-cwe-79-improper-neutralization-of-i-f07bdc99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14121%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samikeijonen%20EDD%20Download%20Info&amp;severity=medium&amp;id=695e4c137349d0379d7d57ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14147-cwe-79-improper-neutralization-of-i-14e5718c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14147%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20corsonr%20Easy%20GitHub%20Gist%20Shortcodes&amp;severity=medium&amp;id=695e4c147349d0379d7d57f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13841-cwe-79-improper-neutralization-of-i-6a08a83f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clevelandwebdeveloper%20Smart%20App%20Banners&amp;severity=medium&amp;id=695e4c117349d0379d7d567d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13801-cwe-22-improper-limitation-of-a-pat-0c4d1947</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13801%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20yocoadmin%20Yoco%20Payments&amp;severity=high&amp;id=695e4c107349d0379d7d5668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14070-cwe-862-missing-authorization-in-xf-6996e1d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14070%3A%20CWE-862%20Missing%20Authorization%20in%20xfinitysoft%20Reviewify%20%E2%80%94%20Review%20Discounts%20%26%20Photo%2FVideo%20Reviews%20for%20WooCommerce&amp;severity=high&amp;id=695e4c137349d0379d7d5780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13990-cwe-352-cross-site-request-forgery--f7c6b6b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13990%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mamurjor%20Mamurjor%20Employee%20Info&amp;severity=medium&amp;id=695e4c117349d0379d7d569b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13419-cwe-862-missing-authorization-in-ah-6529d8c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13419%3A%20CWE-862%20Missing%20Authorization%20in%20aharonyan%20Guest%20posting%20%2F%20Frontend%20Posting%20%2F%20Front%20Editor%20%E2%80%93%20WP%20Front%20User%20Submit&amp;severity=medium&amp;id=695e4c107349d0379d7d5656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14465-cwe-352-cross-site-request-forgery--85ee642c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14465%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20praveentamil%20Sticky%20Action%20Buttons&amp;severity=medium&amp;id=695e4c147349d0379d7d5810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14144-cwe-79-improper-neutralization-of-i-6420e3c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14144%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mstoic%20Mstoic%20Shortcodes&amp;severity=medium&amp;id=695e4c147349d0379d7d57e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14131-cwe-79-improper-neutralization-of-i-8e3976b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damienoh%20WP%20Widget%20Changer&amp;severity=medium&amp;id=695e4c147349d0379d7d57e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14453-cwe-79-improper-neutralization-of-i-8bec3ccc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ruhul080%20My%20Album%20Gallery&amp;severity=medium&amp;id=695e4c147349d0379d7d57fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14113-cwe-79-improper-neutralization-of-i-588286bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14113%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viitorcloudvc%20Viitor%20Button%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d579f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14112-cwe-79-improper-neutralization-of-i-24efc4e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mattiaspkallio%20Snillrik%20Restaurant%20Menu&amp;severity=medium&amp;id=695e4c137349d0379d7d579a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13418-cwe-79-improper-neutralization-of-i-e82a2746</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13418%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spwebguy%20Responsive%20Pricing%20Table&amp;severity=medium&amp;id=695e4c107349d0379d7d5652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14626-cwe-79-improper-neutralization-of-i-a822f052</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20www15to%20QR%20Code%20for%20WooCommerce%20order%20emails%2C%20PDF%20invoices%2C%20packing%20slips&amp;severity=medium&amp;id=695e4c147349d0379d7d5814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14130-cwe-79-improper-neutralization-of-i-eb7c6dd9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14130%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cuvixsystem%20Post%20Like%20Dislike&amp;severity=medium&amp;id=695e4c147349d0379d7d57dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13849-cwe-79-improper-neutralization-of-i-24ef5430</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13849%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matiasanca%20Cool%20YT%20Player&amp;severity=medium&amp;id=695e4c117349d0379d7d568c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13887-cwe-79-improper-neutralization-of-i-92be4de5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wisdmlabs%20AI%20ChatBot%20for%20WordPress%20by%20AI%20BotKit%20%E2%80%93%20Live%20in%202%20Minutes%2C%20No%20Code&amp;severity=medium&amp;id=695e4c117349d0379d7d5691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14145-cwe-79-improper-neutralization-of-i-87c77c4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14145%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20djrowling%20Niche%20Hero%20%7C%20Beautifully-designed%20blocks%20in%20seconds&amp;severity=medium&amp;id=695e4c147349d0379d7d57ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14352-cwe-863-incorrect-authorization-in--be940e26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14352%3A%20CWE-863%20Incorrect%20Authorization%20in%20nahian91%20Awesome%20Hotel%20Booking&amp;severity=medium&amp;id=695e4c147349d0379d7d57f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14110-cwe-79-improper-neutralization-of-i-f7464f82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14110%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pichel%20WP%20Js%20List%20Pages%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d5793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13848-cwe-79-improper-neutralization-of-i-91b471de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13848%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergiotoca%20STM%20Gallery%201.9&amp;severity=medium&amp;id=695e4c117349d0379d7d5687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14118-cwe-79-improper-neutralization-of-i-2f923a99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20callumalden%20Starred%20Review&amp;severity=medium&amp;id=695e4c137349d0379d7d57a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14028-cwe-79-improper-neutralization-of-i-354cf620</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14028%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bruterdregz%20Contact%20Us%20Simple%20Form&amp;severity=medium&amp;id=695e4c117349d0379d7d56a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14796-cwe-79-improper-neutralization-of-i-3cadd7e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ruhul080%20My%20Album%20Gallery&amp;severity=medium&amp;id=695e4c147349d0379d7d5819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14128-cwe-79-improper-neutralization-of-i-bd3a2d49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14128%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mitchoyoshitaka%20Stumble!%20for%20WordPress&amp;severity=medium&amp;id=695e4c147349d0379d7d57d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14127-cwe-79-improper-neutralization-of-i-867a4f66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fpcorso%20Testimonial%20Master&amp;severity=medium&amp;id=695e4c147349d0379d7d57d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13667-cwe-79-improper-neutralization-of-i-2a626003</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tomiup%20WP%20Recipe%20Manager&amp;severity=medium&amp;id=695e4c107349d0379d7d565a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14109-cwe-79-improper-neutralization-of-i-ba86c581</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14109%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ahecht%20AH%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d578e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13694-cwe-348-use-of-less-trusted-source--48900554</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13694%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20aaextensions%20AA%20Block%20country&amp;severity=medium&amp;id=695e4c107349d0379d7d565f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14053-cwe-79-improper-neutralization-of-i-d31b2fa2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jseto%20Travel%20Bucket%20List%20%E2%80%93%20Wish%20To%20Go&amp;severity=medium&amp;id=695e4c117349d0379d7d56ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13847-cwe-79-improper-neutralization-of-i-924ce35c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13847%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidangel%20PhotoFade&amp;severity=medium&amp;id=695e4c117349d0379d7d5682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15018-cwe-639-authorization-bypass-throug-608b91ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15018%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20djanym%20Optional%20Email&amp;severity=critical&amp;id=695e1b30a55ed4ed998cb6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13521-cwe-352-cross-site-request-forgery--c10ab985</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13521%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fulippo%20WP%20Status%20Notifier&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15158-cwe-434-unrestricted-upload-of-file-09cb5665</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15158%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20eastsidecode%20WP%20Enable%20WebP&amp;severity=high&amp;id=695e1b30a55ed4ed998cb6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13497-cwe-79-improper-neutralization-of-i-444d08b3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13497%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zanderz%20Recras&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13496-cwe-862-missing-authorization-in-mo-d5f2da90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13496%3A%20CWE-862%20Missing%20Authorization%20in%20moosend%20Moosend%20Landing%20Pages&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13520-cwe-352-cross-site-request-forgery--c72d1d69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13520%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mtcaptcha%20MTCaptcha%20WordPress%20Plugin&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13493-cwe-862-missing-authorization-in-we-8d11fb91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13493%3A%20CWE-862%20Missing%20Authorization%20in%20webrndexperts%20Latest%20Registered%20Users&amp;severity=high&amp;id=695e1b2fa55ed4ed998cb638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13527-cwe-352-cross-site-request-forgery--3518c67f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13527%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anwerashif%20xShare&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12958-cwe-285-improper-authorization-in-r-d4c90f9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12958%3A%20CWE-285%20Improper%20Authorization%20in%20rankology%20Rankology%20SEO%20and%20Analytics%20Tool&amp;severity=low&amp;id=695e1b2fa55ed4ed998cb634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13529-cwe-862-missing-authorization-in-co-72df2e41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13529%3A%20CWE-862%20Missing%20Authorization%20in%20codeclouds%20Unify&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14999-cwe-352-cross-site-request-forgery--366d1c1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14999%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kentothemes%20Latest%20Tabs&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12540-cwe-200-exposure-of-sensitive-infor-71dc33f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12540%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sharethis%20ShareThis%20Dashboard%20for%20Google%20Analytics&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12030-cwe-639-authorization-bypass-throug-d6bdac07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12030%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20airesvsg%20ACF%20to%20REST%20API&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13519-cwe-352-cross-site-request-forgery--85353855</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13519%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smjrifle%20SVG%20Map%20by%20Smjrifle&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13531-cwe-79-improper-neutralization-of-i-964fbc77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13531%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hayyatapps%20Stylish%20Order%20Form%20Builder&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15000-cwe-79-improper-neutralization-of-i-0d095431</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tfrommen%20Page%20Keys&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11877-cwe-862-missing-authorization-in-so-268e505f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11877%3A%20CWE-862%20Missing%20Authorization%20in%20solwininfotech%20User%20Activity%20Log&amp;severity=high&amp;id=695e1b2fa55ed4ed998cb627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0980-vulnerability-in-nokia-sr-linux-ed11aff0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0980%3A%20Vulnerability%20in%20Nokia%20SR%20Linux&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31964-cwe-200-exposure-of-sensitive-infor-34926e9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31964%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCLSoftware%20BigFix%20IVR&amp;severity=low&amp;id=695e0d1ea55ed4ed99880feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14792-cwe-80-improper-neutralization-of-s-ae411024</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14792%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20audrasjb%20Key%20Figures&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12449-cwe-862-missing-authorization-in-ko-902abd76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12449%3A%20CWE-862%20Missing%20Authorization%20in%20kodezen%20aBlocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20User%20Dashboard%20Builder%2C%20Popup%20Builder%2C%20Form%20Builder%20%26%20Animation%20Builder&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13369-cwe-79-improper-neutralization-of-i-e09e33c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20premmerce%20Premmerce%20WooCommerce%20Customers%20Manager&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14802-cwe-639-authorization-bypass-throug-506830ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14802%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31963-cwe-306-missing-authentication-for--11fde0e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31963%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HCLSoftware%20BigFix%20IVR&amp;severity=low&amp;id=695e099ba55ed4ed9987094e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31962-cwe-613-insufficient-session-expira-dd8cbfbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31962%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCLSoftware%20BigFix%20IVR&amp;severity=low&amp;id=695e0617a55ed4ed9985b33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14867-cwe-22-improper-limitation-of-a-pat-8013b993</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14867%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20liangshao%20Flashcard%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=695e0293a55ed4ed9984d542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14842-cwe-434-unrestricted-upload-of-file-5ab02e7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14842%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=medium&amp;id=695e0293a55ed4ed9984d532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0656-cwe-862-missing-authorization-in-ipa-8561cb90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0656%3A%20CWE-862%20Missing%20Authorization%20in%20ipaymu%20iPaymu%20Payment%20Gateway%20for%20WooCommerce&amp;severity=high&amp;id=695e0294a55ed4ed9984d573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13371-cwe-200-exposure-of-sensitive-infor-887a551f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13371%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20moneyspace%20Money%20Space&amp;severity=high&amp;id=695e0293a55ed4ed9984d522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14845-cwe-352-cross-site-request-forgery--47a4521d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14845%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nsthemes%20NS%20Ie%20Compatibility%20Fixer&amp;severity=medium&amp;id=695e0293a55ed4ed9984d539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14888-cwe-79-improper-neutralization-of-i-851eb1b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anjan011%20Simple%20User%20Meta%20Editor&amp;severity=medium&amp;id=695e0293a55ed4ed9984d553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13657-cwe-352-cross-site-request-forgery--67c6a973</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13657%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20helpdeskcom%20HelpDesk%20Contact%20Form&amp;severity=medium&amp;id=695e0293a55ed4ed9984d529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14887-cwe-79-improper-neutralization-of-i-3ce685be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcommerz%20twinklesmtp%20%E2%80%93%20Email%20Service%20Provider%20For%20WordPress&amp;severity=medium&amp;id=695e0293a55ed4ed9984d54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14370-cwe-862-missing-authorization-in-me-37f2f4c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14370%3A%20CWE-862%20Missing%20Authorization%20in%20metodiew%20Quote%20Comments&amp;severity=medium&amp;id=695e0293a55ed4ed9984d52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14875-cwe-79-improper-neutralization-of-i-e20c283d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hblpay%20HBLPAY%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=695e0293a55ed4ed9984d546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14901-cwe-862-missing-authorization-in-bi-5ae1d686</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14901%3A%20CWE-862%20Missing%20Authorization%20in%20bitpressadmin%20Bit%20Form%20%E2%80%93%20Custom%20Contact%20Form%2C%20Multi%20Step%2C%20Conversational%20Form%20%26%20Payment%20Form%20builder&amp;severity=medium&amp;id=695e0293a55ed4ed9984d557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14904-cwe-352-cross-site-request-forgery--5e97b248</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14904%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anilankola%20Newsletter%20Email%20Subscribe&amp;severity=medium&amp;id=695e0294a55ed4ed9984d56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14804-cwe-73-external-control-of-file-nam-ac2e2a67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14804%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Frontend%20File%20Manager%20Plugin&amp;severity=high&amp;id=695dfb8aa55ed4ed9983420a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14719-cwe-89-sql-injection-in-relevanssi-9a223d0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14719%3A%20CWE-89%20SQL%20Injection%20in%20Relevanssi&amp;severity=medium&amp;id=695dfb8aa55ed4ed99834207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14835-cwe-80-improper-neutralization-of-s-524211cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14835%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20opajaap%20WP%20Photo%20Album%20Plus&amp;severity=high&amp;id=695df0fea55ed4ed9968749d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15474-cwe-770-allocation-of-resources-wit-3cd7a6ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15474%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20AuntyFey%20AuntyFey%20Smart%20Combination%20Lock&amp;severity=medium&amp;id=695de67da55ed4ed995516f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14468-cwe-352-cross-site-request-forgery--b6163dc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14468%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=695de67ca55ed4ed995516f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ongoing-attacks-exploiting-critical-rce-vulnerabil-cfdd79da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ongoing%20Attacks%20Exploiting%20Critical%20RCE%20Vulnerability%20in%20Legacy%20D-Link%20DSL%20Routers&amp;severity=critical&amp;id=695df29ca55ed4ed997953c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0650-cwe-306-missing-authentication-for-c-19273490</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0650%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20OpenFlagr%20Flagr&amp;severity=critical&amp;id=695de67da55ed4ed995516fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9611-cwe-749-exposed-dangerous-method-or--345ee18d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9611%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Microsoft%20Playwright&amp;severity=high&amp;id=695de3cb873865b86365f414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14059-cwe-73-external-control-of-file-nam-7f23642d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14059%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=695dd93f873865b8635a453f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14891-cwe-79-improper-neutralization-of-i-327f1b29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=695dd93f873865b8635a4544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20893-origin-validation-error-in-fujitsu--bc6bdb8a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20893%3A%20Origin%20validation%20error%20in%20Fujitsu%20Client%20Computing%20Limited%20Fujitsu%20Security%20Solution%20AuthConductor%20Client%20Basic%20V2&amp;severity=high&amp;id=695dd93f873865b8635a454a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12648-cwe-552-files-or-directories-access-cb7dd16f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12648%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=695dc7b5873865b863116d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14631-cwe-476-null-pointer-dereference-in-f282dd7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14631%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE400&amp;severity=high&amp;id=695db4a0ee4c93a4aad5f9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0649-server-side-request-forgery-in-invoi-9ad906ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0649%3A%20Server-Side%20Request%20Forgery%20in%20invoiceninja&amp;severity=medium&amp;id=695dad98ee4c93a4aacc6451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14020-improperly-controlled-modification--f735b51d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14020%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20carboneio%20carbone&amp;severity=low&amp;id=695da690ee4c93a4aaaf9618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-07-ddc7a0e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-07&amp;severity=medium&amp;id=695ef5b307b8a419a7735a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61492-na-50a9abe2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61492%3A%20n%2Fa&amp;severity=critical&amp;id=695ea20c7349d0379db7dc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67366-na-b149ee6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67366%3A%20n%2Fa&amp;severity=high&amp;id=695e93fd7349d0379db278a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66686-na-6458d2b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66686%3A%20n%2Fa&amp;severity=medium&amp;id=695e93fd7349d0379db278a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61489-na-41ab4a6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61489%3A%20n%2Fa&amp;severity=medium&amp;id=695e93fd7349d0379db2789c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67364-na-9ea7ab90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67364%3A%20n%2Fa&amp;severity=high&amp;id=695e90787349d0379db110a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66786-na-f9fe9fa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66786%3A%20n%2Fa&amp;severity=high&amp;id=695e8cf77349d0379db03200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65805-na-671e9204</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65805%3A%20n%2Fa&amp;severity=high&amp;id=695e8cf77349d0379db031fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66837-na-42137d50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66837%3A%20n%2Fa&amp;severity=medium&amp;id=695e89727349d0379daecb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66838-na-93995104</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66838%3A%20n%2Fa&amp;severity=medium&amp;id=695e85eb7349d0379dadb731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0628-insufficient-policy-enforcement-in-g-6d67a575</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0628%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=high&amp;id=695da30cee4c93a4aaa68c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0643-unrestricted-upload-in-projectworlds-08c9d342</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0643%3A%20Unrestricted%20Upload%20in%20projectworlds%20House%20Rental%20and%20Property%20Listing&amp;severity=medium&amp;id=695d9de7ee4c93a4aa9fb410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47396-cwe-415-double-free-in-qualcomm-inc-579002be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47396%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93ce65deeab1b95d81d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47395-cwe-126-buffer-over-read-in-qualcom-4cd348e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47395%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93ce65deeab1b95d81ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47394-cwe-120-buffer-copy-without-checkin-242ed732</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47394%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47393-cwe-129-improper-validation-of-arra-9db5fa8f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47393%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47388-cwe-120-buffer-copy-without-checkin-aec82a55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47388%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47380-cwe-822-untrusted-pointer-dereferen-ec05184d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47380%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47369-cwe-200-information-exposure-in-qua-6cd0b00e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47369%3A%20CWE-200%20Information%20Exposure%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cd65deeab1b95d81b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47356-cwe-415-double-free-in-qualcomm-inc-3f7209f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47356%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47348-cwe-457-use-of-uninitialized-variab-74ffcb5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47348%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47346-cwe-787-out-of-bounds-write-in-qual-2ddbe3f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47346%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47345-cwe-323-reusing-a-nonce-key-pair-in-441b2f5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47345%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47344-cwe-367-time-of-check-time-of-use-t-c9eb249f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47344%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cd65deeab1b95d81a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47343-cwe-822-untrusted-pointer-dereferen-c381ff30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47343%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cc65deeab1b95d816f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47339-cwe-416-use-after-free-in-qualcomm--abf87fb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47339%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cc65deeab1b95d816c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47337-cwe-416-use-after-free-in-qualcomm--3e476817</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47337%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47336-cwe-416-use-after-free-in-qualcomm--38bba7b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47336%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47335-cwe-120-buffer-copy-without-checkin-babe18dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47335%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47334-cwe-120-buffer-copy-without-checkin-3898b314</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47334%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47333-cwe-416-use-after-free-in-qualcomm--f5108cab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47333%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d815d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47332-cwe-367-time-of-check-time-of-use-t-89bf8d55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47332%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d815a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47331-cwe-126-buffer-over-read-in-qualcom-5c35ae39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47331%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47330-cwe-126-buffer-over-read-in-qualcom-1f7487a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47330%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0642-cross-site-scripting-in-projectworld-5c338b69</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0642%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20House%20Rental%20and%20Property%20Listing&amp;severity=medium&amp;id=695d904765deeab1b948281c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11235-cwe-620-unverified-password-change--9232b481</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11235%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Progress%20MOVEit%20Transfer&amp;severity=low&amp;id=695d8cc265deeab1b941f6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15472-os-command-injection-in-trendnet-te-33c003d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15472%3A%20OS%20Command%20Injection%20in%20TRENDnet%20TEW-811DRU&amp;severity=high&amp;id=695d893f65deeab1b93cbef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14625-cwe-427-uncontrolled-search-path-el-a32ce309</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14625%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=695d85c665deeab1b937e24c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14614-cwe-377-insecure-temporary-file-in--582fdc90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14614%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=695d85c665deeab1b937e249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15471-os-command-injection-in-trendnet-te-ae0e5fc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15471%3A%20OS%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=critical&amp;id=695d818706d60d7483a4bf75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14599-cwe-427-uncontrolled-search-path-el-e207da72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14599%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=695d818706d60d7483a4bf72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14612-cwe-377-insecure-temporary-file-in--7e142a3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14612%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=695d818706d60d7483a4bf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14605-cwe-427-uncontrolled-search-path-el-43df8804</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14605%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=695d818706d60d7483a4bf7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31642-cwe-79-improper-neutralization-of-i-e1a634d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31642%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dasinfomedia%20WPCHURCH&amp;severity=high&amp;id=695d7e0406d60d7483a3d746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31051-cwe-497-exposure-of-sensitive-syste-f5818644</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31051%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20EngoTheme%20Plant%20-%20Gardening%20%26%20Houseplants%20WordPress%20Theme&amp;severity=medium&amp;id=695d7e0406d60d7483a3d743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14596-cwe-427-uncontrolled-search-path-el-b831b1dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14596%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=695d7e0406d60d7483a3d740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30996-cwe-434-unrestricted-upload-of-file-87255422</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30996%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themify%20Themify%20Sidepane%20WordPress%20Theme&amp;severity=critical&amp;id=695d7a7f06d60d7483a3454a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13744-cwe-79-improper-neutralization-of-i-0ec36f22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13744%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=695d76fb06d60d7483a21fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30631-cwe-79-improper-neutralization-of-i-4e8a749d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AA-Team%20Woocommerce%20Sales%20Funnel%20Builder&amp;severity=high&amp;id=695d737806d60d7483a10a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29004-cwe-266-incorrect-privilege-assignm-c7e68fc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29004%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20AA-Team%20Premium%20Age%20Verification%20%2F%20Restriction%20for%20WordPress&amp;severity=high&amp;id=695d737806d60d7483a10a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21492-cwe-252-unchecked-return-value-in-i-7e39f554</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21492%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d737806d60d7483a10a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7048-cwe-805-in-arista-networks-eos-fbb1d89d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7048%3A%20CWE-805%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=695d63fda7c70f178f8fbb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21491-cwe-122-heap-based-buffer-overflow--8b0a3ce7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21491%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d6079a7c70f178f8eabee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21490-cwe-122-heap-based-buffer-overflow--a486e590</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21490%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d6079a7c70f178f8eabe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0641-command-injection-in-totolink-wa300-4c595f84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0641%3A%20Command%20Injection%20in%20TOTOLINK%20WA300&amp;severity=medium&amp;id=695d63fda7c70f178f8fbb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21494-cwe-122-heap-based-buffer-overflow--8ca155ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21494%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d63fda7c70f178f8fbb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15382-cwe-125-out-of-bounds-read-in-wolfs-7c756e7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15382%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20wolfSSL%20wolfSSH&amp;severity=medium&amp;id=695d4b63a7c70f178f7611fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32304-cwe-98-improper-control-of-filename-977da061</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32304%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mojoomla%20WPCHURCH&amp;severity=high&amp;id=695d4b63a7c70f178f761203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14942-cwe-287-improper-authentication-in--ede5eb61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14942%3A%20CWE-287%20Improper%20Authentication%20in%20wolfSSL%20wolfSSH&amp;severity=critical&amp;id=695d4b63a7c70f178f761200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-chrome-extensions-caught-stealing-chatgpt-and--4521f6c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Chrome%20Extensions%20Caught%20Stealing%20ChatGPT%20and%20DeepSeek%20Chats%20from%20900%2C000%20Users&amp;severity=low&amp;id=695d4d51a7c70f178f8acfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39477-cwe-862-missing-authorization-in-sf-a67962a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39477%3A%20CWE-862%20Missing%20Authorization%20in%20Sfwebservice%20InWave%20Jobs&amp;severity=critical&amp;id=695d40dfa7c70f178f66a0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31088-cwe-79-improper-neutralization-of-i-8bd58e51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WPShop.ru%20AdsPlace&apos;r%20%E2%80%93%20Ad%20Manager%2C%20Inserter%2C%20AdSense%20Ads&amp;severity=medium&amp;id=695d4299a7c70f178f68ea96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30547-cwe-79-improper-neutralization-of-i-529bdb61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30547%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shazdeh%20Header%20Image%20Slider&amp;severity=high&amp;id=695d4299a7c70f178f68ea93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47553-cwe-502-deserialization-of-untruste-d51e5f94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47553%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Digital%20zoom%20studio%20DZS%20Video%20Gallery&amp;severity=high&amp;id=695d4299a7c70f178f68ea99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69083-cwe-98-improper-control-of-filename-0dd666fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69083%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Frapp%C3%A9&amp;severity=null&amp;id=695d4299a7c70f178f68ea9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69364-missing-authorization-in-cloudways--98b6513a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69364%3A%20Missing%20Authorization%20in%20Cloudways%20Breeze&amp;severity=medium&amp;id=695d3e3a326bcb029a44a09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69363-missing-authorization-in-cyberchimp-5d2dc9c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69363%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=695d3e3a326bcb029a44a09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69362-improper-neutralization-of-input-du-bc5ff078</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20UiChemy&amp;severity=medium&amp;id=695d3e3a326bcb029a44a097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69361-missing-authorization-in-publishpre-2bbbf451</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69361%3A%20Missing%20Authorization%20in%20PublishPress%20Post%20Expirator&amp;severity=medium&amp;id=695d3e3a326bcb029a44a094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69360-improper-neutralization-of-input-du-668f3930</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20WPBakery)&amp;severity=medium&amp;id=695d3e3a326bcb029a44a091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69359-missing-authorization-in-wpfunnels--49f7f64c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69359%3A%20Missing%20Authorization%20in%20WPFunnels%20Creator%20LMS&amp;severity=medium&amp;id=695d3e3a326bcb029a44a08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69357-improper-neutralization-of-input-du-c62e4e0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=medium&amp;id=695d3e39326bcb029a44a069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69356-improper-control-of-filename-for-in-d72f23c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69356%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=high&amp;id=695d3e39326bcb029a44a066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69354-missing-authorization-in-bbr-plugin-809f608c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69354%3A%20Missing%20Authorization%20in%20BBR%20Plugins%20Better%20Business%20Reviews&amp;severity=medium&amp;id=695d3e39326bcb029a44a063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69352-missing-authorization-in-stellarwp--55ee216b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69352%3A%20Missing%20Authorization%20in%20StellarWP%20The%20Events%20Calendar&amp;severity=medium&amp;id=695d3e39326bcb029a44a060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69351-improper-neutralization-of-special--8ba1081c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69351%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjahan%20Jewel%20Ninja%20Tables&amp;severity=medium&amp;id=695d3e39326bcb029a44a05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69350-improper-neutralization-of-input-du-a07201da</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Accordion&amp;severity=medium&amp;id=695d3e39326bcb029a44a05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69349-missing-authorization-in-fahad-mahm-8a97ce50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69349%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20RSS%20Feed%20Widget&amp;severity=medium&amp;id=695d3e39326bcb029a44a057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69348-missing-authorization-in-coolhappy--5da3f66a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69348%3A%20Missing%20Authorization%20in%20CoolHappy%20The%20Events%20Calendar%20Countdown%20Addon&amp;severity=medium&amp;id=695d3e39326bcb029a44a054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69346-missing-authorization-in-wpcenter-a-e1eb4fd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69346%3A%20Missing%20Authorization%20in%20WPCenter%20AffiliateX&amp;severity=medium&amp;id=695d3e39326bcb029a44a051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69345-missing-authorization-in-boldgrid-p-f8421357</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69345%3A%20Missing%20Authorization%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=medium&amp;id=695d3e39326bcb029a44a04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69342-improper-control-of-filename-for-in-c625ad3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69342%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20VanKarWai%20Calafate&amp;severity=high&amp;id=695d3e39326bcb029a44a03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69341-missing-authorization-in-buddhathem-92fe0030</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69341%3A%20Missing%20Authorization%20in%20BuddhaThemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=medium&amp;id=695d3e39326bcb029a44a03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69336-missing-authorization-in-bdthemes-u-ccfe8362</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69336%3A%20Missing%20Authorization%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=medium&amp;id=695d3e39326bcb029a44a037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69335-improper-neutralization-of-input-du-4b510941</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69335%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Team%20Showcase&amp;severity=medium&amp;id=695d3e39326bcb029a44a034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69334-improper-neutralization-of-input-du-88efc39c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69334%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=695d3e39326bcb029a44a031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69331-missing-authorization-in-jeroen-sch-c66ba793</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69331%3A%20Missing%20Authorization%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=medium&amp;id=695d3e39326bcb029a44a02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69327-missing-authorization-in-magepeople-f1e72b5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69327%3A%20Missing%20Authorization%20in%20magepeopleteam%20Car%20Rental%20Manager&amp;severity=medium&amp;id=695d3e39326bcb029a44a02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69084-cwe-79-improper-neutralization-of-i-dd60f056</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69084%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gt3themes%20Photo%20Gallery&amp;severity=null&amp;id=695d3e39326bcb029a44a022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69085-cwe-79-improper-neutralization-of-i-315a15b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20JobBank&amp;severity=null&amp;id=695d3e39326bcb029a44a025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69086-cwe-98-improper-control-of-filename-069ab445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69086%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20Issabella&amp;severity=null&amp;id=695d3e39326bcb029a44a028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36589-cwe-611-improper-restriction-of-xml-dac542b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36589%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=695d3ab2326bcb029a439109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63082-cwe-79-improper-neutralization-of-i-0f43ea4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=695d3ab2326bcb029a439110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63083-cwe-79-improper-neutralization-of-i-3e72fd6a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=695d3ab2326bcb029a439113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-firmware-flaw-exposes-totolink-ex200-to--76f46dab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Firmware%20Flaw%20Exposes%20TOTOLINK%20EX200%20to%20Full%20Remote%20Device%20Takeover&amp;severity=low&amp;id=695d4d51a7c70f178f8acfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0640-buffer-overflow-in-tenda-ac23-5438cf9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0640%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=695d2ca3326bcb029a2b303d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14979-cwe-732-incorrect-permission-assign-c5b90371</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14979%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20AirVPN%20Eddie&amp;severity=high&amp;id=695d3027326bcb029a4049de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46696-cwe-250-execution-with-unnecessary--eac32f54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46696%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Secure%20Connect%20Gateway%20(SCG)%20Appliance&amp;severity=medium&amp;id=695d291f326bcb029a24f10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14026-cwe-1104-use-of-unmaintained-third--c8a0f57b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14026%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third-Party%20Components%20in%20Forcepoint%20Forcepoint%20One%20Endpoint%20(F1E)&amp;severity=high&amp;id=695d222d326bcb029a1be3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21493-cwe-188-reliance-on-datamemory-layo-991c7c73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21493%3A%20CWE-188%3A%20Reliance%20on%20Data%2FMemory%20Layout%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d1b6b769e869ac5e3160b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-trap-scattered-lapsus-hunters-in-honey-c862e0a7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Trap%20Scattered%20Lapsus%24%20Hunters%20in%20Honeypot&amp;severity=medium&amp;id=695d17b4769e869ac5da7742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21489-cwe-125-out-of-bounds-read-in-inter-6e33c750</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21489%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d17f6769e869ac5db8e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21488-cwe-122-heap-based-buffer-overflow--56374fc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21488%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d17f6769e869ac5db8e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-dolby-vulnerability-patched-in-android-c7b4bf7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Dolby%20Vulnerability%20Patched%20in%20Android&amp;severity=critical&amp;id=695d1430769e869ac5d57dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-clickfix-campaign-targeting-hospital-3206c22c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20ClickFix%20Campaign%20Targeting%20Hospitality%20Sector&amp;severity=medium&amp;id=695d0ffb3839e441751b973e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dozens-of-major-data-breaches-linked-to-single-thr-14f7ef26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dozens%20of%20Major%20Data%20Breaches%20Linked%20to%20Single%20Threat%20Actor&amp;severity=medium&amp;id=695d01eb3839e44175171c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-booking-emails-redirect-hotel-staff-to-fake-b-695fcbff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Booking%20Emails%20Redirect%20Hotel%20Staff%20to%20Fake%20BSoD%20Pages%20Delivering%20DCRat&amp;severity=medium&amp;id=695d1e21769e869ac5f7ef42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-identity-dark-matter-d6425cdf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20Identity%20Dark%20Matter%3F&amp;severity=low&amp;id=695d1e21769e869ac5f7ef45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vs-code-forks-recommend-missing-extensions-creatin-8f09575d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VS%20Code%20Forks%20Recommend%20Missing%20Extensions%2C%20Creating%20Supply%20Chain%20Risk%20in%20Open%20VSX&amp;severity=medium&amp;id=695d1e21769e869ac5f7ef48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nordvpn-denies-breach-after-hacker-leaks-data-e492eb55</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NordVPN%20Denies%20Breach%20After%20Hacker%20Leaks%20Data&amp;severity=medium&amp;id=695cf3db3839e4417511a33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9318-cwe-89-improper-neutralization-of-sp-06a5609d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9318%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=695cd7ee3839e4417504db30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9637-cwe-862-missing-authorization-in-exp-acee29b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9637%3A%20CWE-862%20Missing%20Authorization%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=695cd7ee3839e4417504db34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14552-cwe-79-improper-neutralization-of-i-ac928f33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20buddydev%20MediaPress&amp;severity=medium&amp;id=695cd7ee3839e4417504db2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5919-cwe-862-missing-authorization-in-arr-a46843a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5919%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Timetics%20%E2%80%93%20Appointment%20Booking%20%26%20Scheduling&amp;severity=medium&amp;id=695cc9de3839e44175ff5dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13964-cwe-862-missing-authorization-in-th-f315da6d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13964%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=695cc9de3839e44175ff5dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9294-cwe-285-improper-authorization-in-ex-36eaa5a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9294%3A%20CWE-285%20Improper%20Authorization%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=695cc9de3839e44175ff5dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13766-cwe-862-missing-authorization-in-st-11a20e42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13766%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=695cc9de3839e44175ff5dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13812-cwe-862-missing-authorization-in-ru-a72e00aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13812%3A%20CWE-862%20Missing%20Authorization%20in%20rubengc%20GamiPress%20%E2%80%93%20Gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=medium&amp;id=695cbbce3839e44175f9f00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12067-cwe-79-improper-neutralization-of-i-241d7a4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonua%20Table%20Field%20Add-on%20for%20ACF%20and%20SCF&amp;severity=medium&amp;id=695cbbce3839e44175f9f00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14371-cwe-862-missing-authorization-in-st-6cde3bb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14371%3A%20CWE-862%20Missing%20Authorization%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=695cbbce3839e44175f9f012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4776-cwe-79-improper-neutralization-of-in-ee2f4cf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Phlox&amp;severity=medium&amp;id=695cb1423839e44175f61ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13215-cwe-200-exposure-of-sensitive-infor-802342ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13215%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=695cb1423839e44175f61ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21411-authentication-bypass-using-an-alte-e5985135</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21411%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Plat&apos;Home%20Co.%2CLtd.%20OpenBlocks%20IoT%20DX1%20(FW5.0.x)&amp;severity=high&amp;id=695cb1423839e44175f61fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-n8n-vulnerability-99-cvss-lets-authenticated-u-86301403</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20n8n%20Vulnerability%20(9.9%20CVSS)%20Lets%20Authenticated%20Users%20Execute%20System%20Commands&amp;severity=critical&amp;id=695c9bf53839e44175edad18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14997-cwe-22-improper-limitation-of-a-pat-7765da9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14997%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20buddydev%20BuddyPress%20Xprofile%20Custom%20Field%20Types&amp;severity=high&amp;id=695c95223839e44175ebc5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14120-cwe-79-improper-neutralization-of-i-90a28dc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bww%20URL%20Image%20Importer&amp;severity=medium&amp;id=695c95223839e44175ebc598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14438-cwe-918-server-side-request-forgery-61e10ce7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14438%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20xagio%20Xagio%20SEO%20%E2%80%93%20AI%20Powered%20SEO&amp;severity=medium&amp;id=695c95223839e44175ebc59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14441-cwe-862-missing-authorization-in-ro-e2155daf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14441%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=medium&amp;id=695c95223839e44175ebc5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15001-cwe-639-authorization-bypass-throug-f4017150</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15001%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20fsylum%20FS%20Registration%20Password&amp;severity=critical&amp;id=695c95223839e44175ebc5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14996-cwe-639-authorization-bypass-throug-bc6c558f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14996%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aksharsoftsolutions%20AS%20Password%20Field%20In%20Default%20Registration%20Form&amp;severity=critical&amp;id=695c95223839e44175ebc5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21486-cwe-122-heap-based-buffer-overflow--d070eb08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21486%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c8a973839e44175e8471a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-adonisjs-bodyparser-flaw-cvss-92-enables--8bc97d84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20AdonisJS%20Bodyparser%20Flaw%20(CVSS%209.2)%20Enables%20Arbitrary%20File%20Write%20on%20Servers&amp;severity=critical&amp;id=695d1e21769e869ac5f7ef4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21487-cwe-20-improper-input-validation-in-efa8cc59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21487%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695c8a973839e44175e8471e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13746-cwe-79-improper-neutralization-of-i-579b0ada</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20ForumWP%20%E2%80%93%20Forum%20%26%20Discussion%20Board&amp;severity=medium&amp;id=695c838f3839e44175cef8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14034-cwe-862-missing-authorization-in-gh-2d65674f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14034%3A%20CWE-862%20Missing%20Authorization%20in%20ghera74%20ilGhera%20Support%20System%20for%20WooCommerce&amp;severity=medium&amp;id=695c838f3839e44175cef8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11370-cwe-862-missing-authorization-in-av-267d8a55</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11370%3A%20CWE-862%20Missing%20Authorization%20in%20averta%20Depicter%20%E2%80%94%20Popup%20%26%20Slider%20Builder&amp;severity=medium&amp;id=695c838f3839e44175cef8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14153-cwe-89-improper-neutralization-of-s-5d2fb565</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14153%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vikasratudi%20Page%20Expire%20Popup%2FRedirection%20for%20WordPress&amp;severity=medium&amp;id=695c838f3839e44175cef8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0604-cwe-22-improper-limitation-of-a-path-8f1083b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0604%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ninjateam%20FastDup%20%E2%80%93%20Fastest%20WordPress%20Migration%20%26%20Duplicator&amp;severity=medium&amp;id=695c838f3839e44175cef8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13652-cwe-89-improper-neutralization-of-s-17a12da1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13652%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20manchumahara%20CBX%20Bookmark%20%26%20Favorite&amp;severity=medium&amp;id=695c838f3839e44175cef8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11723-cwe-330-use-of-insufficiently-rando-d1220129</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11723%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=695c838f3839e44175cef8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13409-cwe-89-improper-neutralization-of-s-e7abbb04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13409%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpvibes%20Form%20Vibes%20%E2%80%93%20Database%20Manager%20for%20Forms&amp;severity=medium&amp;id=695c838f3839e44175cef8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21485-cwe-20-improper-input-validation-in-a42a5703</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21485%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c838f3839e44175cef903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21677-cwe-758-reliance-on-undefined-unspe-1020703d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21677%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c83903839e44175cef95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21676-cwe-122-heap-based-buffer-overflow--c38a7384</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21676%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c838f3839e44175cef908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12793-cwe-426-untrusted-search-path-in-as-e2a12dd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12793%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20ASUS%20ASCI&amp;severity=high&amp;id=695c79023839e44175c0fa44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15364-cwe-353-missing-support-for-integri-b06e524c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15364%3A%20CWE-353%20Missing%20Support%20for%20Integrity%20Check%20in%20codename065%20Download%20Manager&amp;severity=high&amp;id=695c6e793839e44175bdd387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20807-cwe-190-integer-overflow-in-mediate-5ead14e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20807%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20806-cwe-416-use-after-free-in-mediatek--7dac359c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20806%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20805-cwe-416-use-after-free-in-mediatek--1d1093f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20805%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20804-cwe-416-use-after-free-in-mediatek--f0d1048b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20804%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20803-cwe-190-integer-overflow-in-mediate-45033e8c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20803%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20787-cwe-416-use-after-free-in-mediatek--7966b391</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20787%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20786-cwe-415-double-free-in-mediatek-inc-156546ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20786%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20785-cwe-416-use-after-free-in-mediatek--01d4f91c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20785%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20784-cwe-457-use-of-uninitialized-variab-4287ec2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20784%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20783-cwe-787-out-of-bounds-write-in-medi-07d2144f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20783%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20782-cwe-787-out-of-bounds-write-in-medi-c437775b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20782%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd3a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20781-cwe-415-double-free-in-mediatek-inc-ba9fe5e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20781%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20780-cwe-416-use-after-free-in-mediatek--9b15d9e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20780%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20779-cwe-416-use-after-free-in-mediatek--aec567ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20779%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20778-cwe-787-out-of-bounds-write-in-medi-e3e220f0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20778%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20802-cwe-416-use-after-free-in-mediatek--9280135a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20802%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20801-cwe-415-double-free-in-mediatek-inc-b697c26c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20801%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20800-cwe-787-out-of-bounds-write-in-medi-5022f732</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20800%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20799-cwe-416-use-after-free-in-mediatek--d7e5ea8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20799%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20798-cwe-787-out-of-bounds-write-in-medi-cf229274</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20798%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20797-cwe-121-stack-overflow-in-mediatek--90788ce6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20797%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20796-cwe-1285-specified-index-position-o-2a4ef148</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20796%3A%20CWE-1285%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20760-cwe-617-reachable-assertion-in-medi-a9db1c6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20760%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20761-cwe-754-improper-check-for-unusual--504655a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20761%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20762-cwe-617-reachable-assertion-in-medi-7f1f3bff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20762%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20793-cwe-476-null-pointer-dereference-in-95cfb7b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20793%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20794-cwe-121-stack-overflow-in-mediatek--9aff97c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20794%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20795-cwe-787-out-of-bounds-write-in-medi-2bb4d8fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20795%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21675-cwe-416-use-after-free-in-internati-4bcae5b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21675%3A%20CWE-416%3A%20Use%20After%20Free%20in%20InternationalColorConsortium%20iccDEV&amp;severity=critical&amp;id=695c6e7b3839e44175bdd443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15385-cwe-345-insufficient-verification-o-6c64a8b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15385%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20TECNO%20Mobile%20com.afmobi.boomplayer&amp;severity=critical&amp;id=695c6e793839e44175bdd38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21674-cwe-401-missing-release-of-memory-a-a5c54c14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21674%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20InternationalColorConsortium%20iccDEV&amp;severity=low&amp;id=695c6e7b3839e44175bdd43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21673-cwe-190-integer-overflow-or-wraparo-b7e989c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21673%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c6e7b3839e44175bdd439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69197-cwe-287-improper-authentication-in--f8e3986d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69197%3A%20CWE-287%3A%20Improper%20Authentication%20in%20pterodactyl%20panel&amp;severity=medium&amp;id=695c5ce23839e44175a692c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68954-cwe-613-insufficient-session-expira-eff6b377</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68954%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20pterodactyl%20panel&amp;severity=high&amp;id=695c5ce23839e44175a692bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15444-cwe-1395-dependency-on-vulnerable-t-86571d52</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15444%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20IAMB%20Crypt%3A%3ASodium%3A%3AXS&amp;severity=critical&amp;id=695c595e3839e44175a2e0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21507-cwe-835-loop-with-unreachable-exit--9b0ec589</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21507%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c595e3839e44175a2e0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-06-18ab5f7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-06&amp;severity=medium&amp;id=695da2d6ee4c93a4aaa5488b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60534-na-d17acec7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60534%3A%20n%2Fa&amp;severity=critical&amp;id=695d3ab2326bcb029a43910c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59379-na-f52e9a28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59379%3A%20n%2Fa&amp;severity=high&amp;id=695d33aa326bcb029a411f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60262-na-4fa768b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60262%3A%20n%2Fa&amp;severity=critical&amp;id=695d3027326bcb029a4049e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65212-na-412bd942</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65212%3A%20n%2Fa&amp;severity=critical&amp;id=695d2ca3326bcb029a2b3039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69230-cwe-779-logging-of-excessive-data-i-d313c817</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69230%3A%20CWE-779%3A%20Logging%20of%20Excessive%20Data%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=695d12c1769e869ac5d3c5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69229-cwe-770-allocation-of-resources-wit-a514f81d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69229%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c4ed43839e4417599068d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0607-sql-injection-in-code-projects-onlin-4f334ca8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0607%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695c4ed43839e44175990692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69228-cwe-770-allocation-of-resources-wit-4454955f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69228%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c4ed43839e44175990689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69227-cwe-835-loop-with-unreachable-exit--6f6435a9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69227%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c4b4e3839e44175984995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69225-cwe-444-inconsistent-interpretation-7a9bf39b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69225%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=695c47ca3839e4417597a3bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0606-sql-injection-in-code-projects-onlin-8f75354e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0606%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695d12c1769e869ac5d3c5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69226-cwe-22-improper-limitation-of-a-pat-a447a2c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69226%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c44473839e44175970366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69224-cwe-444-inconsistent-interpretation-ff126449</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69224%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c40c23839e4417595ee5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68456-cwe-770-allocation-of-resources-wit-f9cb2c6c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68456%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20craftcms%20cms&amp;severity=high&amp;id=695c39ba3839e4417594b416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69223-cwe-409-improper-handling-of-highly-5fefff3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69223%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20aio-libs%20aiohttp&amp;severity=high&amp;id=695c36383839e44175942eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68455-cwe-470-use-of-externally-controlle-2b7374e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68455%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=695c36383839e44175942eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68454-cwe-1336-improper-neutralization-of-5dc1f666</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68454%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=medium&amp;id=695c36383839e44175942eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68437-cwe-918-server-side-request-forgery-fe43cee0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68437%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=695c36383839e44175942ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68436-cwe-200-exposure-of-sensitive-infor-54ac44b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68436%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20cms&amp;severity=medium&amp;id=695c32b23839e44175939730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68428-cwe-35-path-traversal-in-parallax-j-1307335d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68428%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20parallax%20jsPDF&amp;severity=critical&amp;id=695c32b23839e4417593972b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67732-cwe-200-exposure-of-sensitive-infor-ad487420</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67732%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20langgenius%20dify&amp;severity=high&amp;id=695c32b23839e44175939728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0625-cwe-78-improper-neutralization-of-sp-229a7d9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0625%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20D-Link%20DSL-2640B&amp;severity=critical&amp;id=695c2bac3839e441759217e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0621-cwe-1333-inefficient-regular-express-a9d9d749</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0621%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Anthropic%20MCP%20TypeScript%20SDK&amp;severity=high&amp;id=695c28263839e441759152d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64425-cwe-644-improper-neutralization-of--0190a779</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64425%3A%20CWE-644%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20coollabsio%20coolify&amp;severity=high&amp;id=695c24a73839e441759038ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64424-cwe-77-improper-neutralization-of-s-1b0a13a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64424%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695c24a73839e441759038e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64423-cwe-287-improper-authentication-in--7dbc9d50</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64423%3A%20CWE-287%3A%20Improper%20Authentication%20in%20coollabsio%20coolify&amp;severity=high&amp;id=695c24a73839e441759038f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0605-sql-injection-in-code-projects-onlin-8c51d4cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0605%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695c24a73839e441759038f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64422-cwe-770-allocation-of-resources-wit-b34c9f4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64422%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20coollabsio%20coolify&amp;severity=medium&amp;id=695c211f3839e441758f3419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64421-cwe-863-incorrect-authorization-in--e8147a1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64421%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20coollabsio%20coolify&amp;severity=high&amp;id=695c16933839e441758db0b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64420-cwe-522-insufficiently-protected-cr-4ed45eac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64420%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695c0f8a3839e441758c3636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64419-cwe-77-improper-neutralization-of-s-667382e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64419%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695c0f8a3839e441758c3632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-aligned-hackers-abuse-viber-to-target-ukrai-3642f161</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Aligned%20Hackers%20Abuse%20Viber%20to%20Target%20Ukrainian%20Military%20and%20Government&amp;severity=high&amp;id=695bff543839e4417589374f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61781-cwe-285-improper-authorization-in-o-07523d2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61781%3A%20CWE-285%3A%20Improper%20Authorization%20in%20OpenCTI-Platform%20opencti&amp;severity=high&amp;id=695bfdf63839e4417574ec20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-unlikely-in-communications-failure-tha-8cd79eae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20Unlikely%20in%20Communications%20Failure%20That%20Grounded%20Flights%20in%20Greece&amp;severity=medium&amp;id=695bfa413839e441756f45f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59955-cwe-201-insertion-of-sensitive-info-12aefdd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59955%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20coollabsio%20coolify&amp;severity=medium&amp;id=695bfa903839e441756fd45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59158-cwe-116-improper-encoding-or-escapi-c7a9e49a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59158%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695bfa903839e441756fd45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brightspeed-investigating-cyberattack-ecdd199a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brightspeed%20Investigating%20Cyberattack&amp;severity=medium&amp;id=695bfa413839e441756f45fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59157-cwe-78-improper-neutralization-of-s-bff58062</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59157%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695bfa903839e441756fd458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59156-cwe-78-improper-neutralization-of-s-c47641a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59156%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695bfa903839e441756fd455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55204-cwe-94-improper-control-of-generati-3cecd5f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55204%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20staniel359%20muffon&amp;severity=high&amp;id=695c017b3839e4417589846f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/risks-of-oob-access-via-ip-kvm-devices-mon-jan-5th-31f382af</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices%2C%20(Mon%2C%20Jan%205th)&amp;severity=low&amp;id=695bf6ca3839e441756a5aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sedgwick-confirms-cyberattack-on-government-subsid-cf91fd40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sedgwick%20Confirms%20Cyberattack%20on%20Government%20Subsidiary&amp;severity=medium&amp;id=695bf6bb3839e441756a4e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10933-cwe-125-out-of-bounds-read-in-silab-5ca2b1de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10933%3A%20CWE-125%20Out-of-bounds%20Read%20in%20silabs.com%20Z-Wave%20Protocol%20Controller&amp;severity=medium&amp;id=695bf3783839e44175668256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39484-cwe-89-improper-neutralization-of-s-9f0af156</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39484%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Waituk%20Entrada&amp;severity=critical&amp;id=695bf018b7d6203139564fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39497-cwe-79-improper-neutralization-of-i-3c51e357</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39497%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dokan%20Dokan%20Pro&amp;severity=medium&amp;id=695bec94b7d62031395509b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39561-cwe-862-missing-authorization-in-ma-d7b7b22e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39561%3A%20CWE-862%20Missing%20Authorization%20in%20Marketing%20Fire%2C%20LLC%20LoginWP%20-%20Pro&amp;severity=medium&amp;id=695bec94b7d62031395509b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21635-vulnerability-in-ubiquiti-inc-unifi-c725f60b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21635%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20EV%20Station%20Lite&amp;severity=medium&amp;id=695bec94b7d62031395509e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21634-vulnerability-in-ubiquiti-inc-unifi-4f6b923c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21634%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Protect%20Application&amp;severity=medium&amp;id=695bec94b7d62031395509de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59467-vulnerability-in-ubiquiti-inc-ucrm--c7fadd3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59467%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UCRM%20Argentina%20AFIP%20invoices%20Plugin&amp;severity=high&amp;id=695bec94b7d62031395509d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21633-vulnerability-in-ubiquiti-inc-unifi-4ed99ac9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21633%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Protect%20Application&amp;severity=high&amp;id=695bec94b7d62031395509db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46255-cwe-862-missing-authorization-in-ma-73af8421</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46255%3A%20CWE-862%20Missing%20Authorization%20in%20Marketing%20Fire%20LLC%20LoginWP%20-%20Pro&amp;severity=high&amp;id=695bec94b7d62031395509bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53344-cwe-352-cross-site-request-forgery--04120430</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53344%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20Thim%20Core&amp;severity=medium&amp;id=695bec94b7d62031395509c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53735-cwe-79-improper-neutralization-of-i-5c842eaf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20corourke%20iPhone%20Webclip%20Manager&amp;severity=null&amp;id=695bec94b7d62031395509b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-android-botnet-infects-over-2-million-devi-3c5ccac1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Android%20Botnet%20Infects%20Over%202%20Million%20Devices%20via%20Exposed%20ADB%20and%20Proxy%20Networks&amp;severity=medium&amp;id=695bff543839e44175893752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30516-cwe-1284-improper-validation-of-spe-cbc86df8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30516%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20SaasProject%20Booking%20Package&amp;severity=high&amp;id=695bec99b7d6203139550ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30461-cwe-79-improper-neutralization-of-i-6a667fd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tumult%20Inc%20Tumult%20Hype%20Animations&amp;severity=high&amp;id=695bec94b7d62031395509e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14346-cwe-306-missing-authentication-for--166dc7e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14346%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WHILL%20Model%20C2%20Electric%20Wheelchair&amp;severity=critical&amp;id=695bde83b7d620313938fa7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-kev-catalog-expanded-20-in-2025-topping-1480--c65316d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20KEV%20Catalog%20Expanded%2020%25%20in%202025%2C%20Topping%201%2C480%20Entries&amp;severity=medium&amp;id=695bd5ff3dc84013b27dde6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15029-cwe-89-improper-neutralization-of-s-1cd247a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15029%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=critical&amp;id=695bcf2a3dc84013b27be7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0597-sql-injection-in-campcodes-supplier--6aa0c95b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0597%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=695bcf2a3dc84013b27be7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15026-cwe-306-missing-authentication-for--442b2314</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15026%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Centreon%20Infra%20Monitoring&amp;severity=critical&amp;id=695bcf2a3dc84013b27be7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12511-cwe-79-improper-neutralization-of-i-34aaad16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12511%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695bc8233dc84013b278cf70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68280-cwe-611-improper-restriction-of-xml-06cbf5fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68280%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20SIS&amp;severity=medium&amp;id=695bc49d3dc84013b27640fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12513-cwe-79-improper-neutralization-of-i-09abe926</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695bc49d3dc84013b27640fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23511-cwe-79-improper-neutralization-of-i-92f21458</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23511%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=medium&amp;id=695bc49d3dc84013b27640f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0592-sql-injection-in-code-projects-onlin-0eb0fa02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0592%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bd93cb7d6203139313f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0591-sql-injection-in-code-projects-onlin-430f5a28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0591%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bba123dc84013b271744a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-iot-exploits-wallet-breaches-rogue-ex-9abc1faf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20IoT%20Exploits%2C%20Wallet%20Breaches%2C%20Rogue%20Extensions%2C%20AI%20Abuse%20%26%20More&amp;severity=medium&amp;id=695be3b2b7d62031395311c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-android-botnet-grows-through-residential-p-28019fcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Android%20Botnet%20Grows%20Through%20Residential%20Proxy%20Networks&amp;severity=low&amp;id=695bb65b3dc84013b2709633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5th-january-threat-intelligence-report-163db2f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=695bb30c3dc84013b26f70bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0590-sql-injection-in-code-projects-onlin-cdb3bf77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0590%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bb30a3dc84013b26f706f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0589-improper-authentication-in-code-proj-93adb195</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0589%3A%20Improper%20Authentication%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bd93cb7d6203139313f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-spotlights-whatsapp-metadata-leak-as-me-c3200f03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Spotlights%20WhatsApp%20Metadata%20Leak%20as%20Meta%20Begins%20Rolling%20Out%20Fixes&amp;severity=medium&amp;id=695ba84b3dc84013b256f8ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0588-cross-site-scripting-in-xinhu-rainro-643f6b43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0588%3A%20Cross%20Site%20Scripting%20in%20Xinhu%20Rainrock%20RockOA&amp;severity=medium&amp;id=695ba4fa3dc84013b24fee12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0587-cross-site-scripting-in-xinhu-rainro-b93a727c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0587%3A%20Cross%20Site%20Scripting%20in%20Xinhu%20Rainrock%20RockOA&amp;severity=medium&amp;id=695b9cd2d0cafea50bf0271e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68865-cwe-89-improper-neutralization-of-s-47ae013b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68865%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Infility%20Infility%20Global&amp;severity=null&amp;id=695b99acdb813ff03e48b58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68850-cwe-862-missing-authorization-in-co-6b3e8c7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68850%3A%20Missing%20Authorization%20in%20codepeople%20Sell%20Downloads&amp;severity=null&amp;id=695b99acdb813ff03e48b589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68547-cwe-862-missing-authorization-in-wp-86fa8eb7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68547%3A%20Missing%20Authorization%20in%20wpweb%20Follow%20My%20Blog%20Post&amp;severity=null&amp;id=695b99acdb813ff03e48b586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68044-cwe-639-authorization-bypass-throug-1601dac6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68044%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=null&amp;id=695b99acdb813ff03e48b583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68033-cwe-201-insertion-of-sensitive-info-8e39e2bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68033%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Brecht%20Custom%20Related%20Posts&amp;severity=null&amp;id=695b99acdb813ff03e48b580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68029-cwe-201-insertion-of-sensitive-info-f1872075</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68029%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Swings%20Wallet%20System%20for%20WooCommerce&amp;severity=null&amp;id=695b99acdb813ff03e48b57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68014-cwe-201-insertion-of-sensitive-info-378ff15b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68014%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20awethemes%20AweBooking&amp;severity=null&amp;id=695b99acdb813ff03e48b57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0586-cross-site-scripting-in-code-project-11184c2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0586%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b9617db813ff03e47ed9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31048-cwe-434-unrestricted-upload-of-file-3977fc78</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31048%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themify%20Shopo&amp;severity=critical&amp;id=695b9617db813ff03e47ed97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31047-cwe-502-deserialization-of-untruste-ea5db360</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31047%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themify%20Themify%20Edmin&amp;severity=high&amp;id=695b9617db813ff03e47ed94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31046-cwe-862-missing-authorization-in-wp-695ca694</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31046%3A%20CWE-862%20Missing%20Authorization%20in%20WPvibes%20AnyWhere%20Elementor%20Pro&amp;severity=medium&amp;id=695b9617db813ff03e47ed91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31044-cwe-89-improper-neutralization-of-s-a42ed9b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31044%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20Premium%20SEO%20Pack&amp;severity=high&amp;id=695b9617db813ff03e47ed8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30633-cwe-89-improper-neutralization-of-s-13bbada5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30633%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20Amazon%20Native%20Shopping%20Recommendations&amp;severity=critical&amp;id=695b9617db813ff03e47ed8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69087-cwe-98-improper-control-of-filename-61037791</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20FreeAgent&amp;severity=null&amp;id=695b9291db813ff03e4708a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12519-cwe-862-missing-authorization-in-ce-a154a52b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12519%3A%20CWE-862%20Missing%20Authorization%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695b9291db813ff03e4708a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13056-cwe-79-improper-neutralization-of-i-97f39e09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695b9291db813ff03e4708a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5965-cwe-78-improper-neutralization-of-sp-5decf22f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5965%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=695b8f06db813ff03e463837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0585-sql-injection-in-code-projects-onlin-c0ec63e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0585%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b8f06db813ff03e46383a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitfinex-hack-convict-ilya-lichtenstein-released-e-ff2631ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitfinex%20Hack%20Convict%20Ilya%20Lichtenstein%20Released%20Early%20Under%20U.S.%20First%20Step%20Act&amp;severity=medium&amp;id=695baa623dc84013b26b95e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0584-sql-injection-in-code-projects-onlin-d60ce6e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0584%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b8b83db813ff03e454d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0583-sql-injection-in-code-projects-onlin-70e1b231</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0583%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b847bdb813ff03e438308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66518-cwe-27-path-traversal-dirfilename-i-1922cceb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66518%3A%20CWE-27%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Apache%20Software%20Foundation%20Apache%20Kyuubi&amp;severity=high&amp;id=695b7d73db813ff03e41d61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0582-sql-injection-in-itsourcecode-societ-54fc004d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0582%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=695b7d73db813ff03e41d61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15240-cwe-434-unrestricted-upload-of-file-7cc36ef1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15240%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b79eedb813ff03e40d8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15239-cwe-89-improper-neutralization-of-s-e92bd6e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15239%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b766adb813ff03e3fec89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0581-command-injection-in-tenda-ac1206-10bd5beb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0581%3A%20Command%20Injection%20in%20Tenda%20AC1206&amp;severity=medium&amp;id=695b766adb813ff03e3fec8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15238-cwe-89-improper-neutralization-of-s-bcd3d8b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15238%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b72e7db813ff03e3f5bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-vvs-stealer-malware-targets-discord-accounts-v-1de74c79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20VVS%20Stealer%20Malware%20Targets%20Discord%20Accounts%20via%20Obfuscated%20Python%20Code&amp;severity=medium&amp;id=695baa623dc84013b26b95eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15237-cwe-36-absolute-path-traversal-in-q-cfdfbb54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15237%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=medium&amp;id=695b6f63db813ff03e3e8880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15236-cwe-36-absolute-path-traversal-in-q-f58b2236</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15236%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=medium&amp;id=695b6f63db813ff03e3e887c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0580-cross-site-scripting-in-sourcecodest-1896cf87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0580%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20API%20Key%20Manager%20App&amp;severity=medium&amp;id=695b6bdfdb813ff03e3dbaa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15235-cwe-862-missing-authorization-in-qu-4a3ee6ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15235%3A%20CWE-862%20Missing%20Authorization%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b6bdfdb813ff03e3dbaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15462-buffer-overflow-in-utt-520w-b83561ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15462%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b64d6db813ff03e3bf10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15461-buffer-overflow-in-utt-520w-8bd73dbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15461%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b5dcfdb813ff03e3996cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15460-buffer-overflow-in-utt-520w-54ddef69</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15460%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b56c7db813ff03e37ad07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9543-cwe-79-cross-site-scripting-xss-in-f-f1e9d907</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9543%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20FlexTable&amp;severity=low&amp;id=695b56c7db813ff03e37ad0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14124-cwe-89-sql-injection-in-team-e0aaae6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14124%3A%20CWE-89%20SQL%20Injection%20in%20Team&amp;severity=high&amp;id=695b56c7db813ff03e37ad04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15459-buffer-overflow-in-utt-520w-35aa842a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15459%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b4fbfdb813ff03e35d1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15458-improper-authentication-in-bg5sbk-m-864ac174</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15458%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b48b6db813ff03e33445a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15457-improper-authentication-in-bg5sbk-m-6a343c28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15457%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b41aedb813ff03e31b0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15456-improper-authentication-in-bg5sbk-m-70de1b54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15456%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b3e2bdb813ff03e30af0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15455-improper-authentication-in-bg5sbk-m-fd5fb37e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15455%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b3722db813ff03e2e334c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15454-cross-site-scripting-in-zhanglun-le-64f53889</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15454%3A%20Cross%20Site%20Scripting%20in%20zhanglun%20lettura&amp;severity=low&amp;id=695b2c97db813ff03e0dbd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15453-deserialization-in-milvus-b1a9e644</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15453%3A%20Deserialization%20in%20milvus&amp;severity=medium&amp;id=695b2c97db813ff03e0dbd54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15452-cross-site-scripting-in-xnx3-wangma-5a15d8fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15452%3A%20Cross%20Site%20Scripting%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=695b220adb813ff03e08439e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15451-cross-site-scripting-in-xnx3-wangma-02fd0ca0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15451%3A%20Cross%20Site%20Scripting%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=695b220adb813ff03e084398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15450-sql-injection-in-sfturing-hosporder-1683e20d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15450%3A%20SQL%20Injection%20in%20sfturing%20hosp_order&amp;severity=medium&amp;id=695b13fadb813ff03efd5859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15449-path-traversal-in-cld378632668-java-c79a73e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15449%3A%20Path%20Traversal%20in%20cld378632668%20JavaMall&amp;severity=medium&amp;id=695b0cf2db813ff03ef897b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5591-cwe-79-improper-neutralization-of-in-f992aea2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Kentico%20Xperience&amp;severity=high&amp;id=695b096fdb813ff03ef6b20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15448-unrestricted-upload-in-cld378632668-eb9aff55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15448%3A%20Unrestricted%20Upload%20in%20cld378632668%20JavaMall&amp;severity=medium&amp;id=695b096fdb813ff03ef6b204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-05-15c584a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-05&amp;severity=medium&amp;id=695c52203839e44175999659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67419-na-c36685b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67419%3A%20n%2Fa&amp;severity=high&amp;id=695c1d9a3839e441758ea7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67427-na-04528a16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67427%3A%20n%2Fa&amp;severity=medium&amp;id=695c16933839e441758db0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52516-na-6253e4f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52516%3A%20n%2Fa&amp;severity=medium&amp;id=695c08823839e441758ae8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43706-na-4ddd2c38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43706%3A%20n%2Fa&amp;severity=high&amp;id=695c08823839e441758ae8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27807-na-960c7051</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27807%3A%20n%2Fa&amp;severity=critical&amp;id=695c08823839e441758ae8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67397-na-d23f3940</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67397%3A%20n%2Fa&amp;severity=critical&amp;id=695c05013839e441758a3892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53966-na-be553183</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53966%3A%20n%2Fa&amp;severity=high&amp;id=695c05013839e441758a388e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49495-na-b30b793a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49495%3A%20n%2Fa&amp;severity=high&amp;id=695c05013839e441758a388a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65922-na-17d6f126</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65922%3A%20n%2Fa&amp;severity=medium&amp;id=695c017b3839e44175898474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52517-na-ab2f5576</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52517%3A%20n%2Fa&amp;severity=medium&amp;id=695c017b3839e4417589846b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52515-na-802bdb41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52515%3A%20n%2Fa&amp;severity=medium&amp;id=695c017b3839e44175898467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52519-na-07c52c7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52519%3A%20n%2Fa&amp;severity=high&amp;id=695bf3783839e44175668259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57836-na-7a4447cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57836%3A%20n%2Fa&amp;severity=high&amp;id=695bec99b7d6203139550ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67316-na-ff1ad204</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67316%3A%20n%2Fa&amp;severity=medium&amp;id=695be90fb7d6203139541a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65328-na-2ccfef04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65328%3A%20n%2Fa&amp;severity=medium&amp;id=695be58cb7d6203139538ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67303-na-2236ed72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67303%3A%20n%2Fa&amp;severity=high&amp;id=695be207b7d62031393eafe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67315-na-c4f59cdc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67315&amp;severity=null&amp;id=695be207b7d62031393eae0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66376-cwe-79-improper-neutralization-of-i-163928a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zimbra%20Collaboration&amp;severity=high&amp;id=695bd2af3dc84013b27cfcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15447-sql-injection-in-seeyon-zhiyuan-oa--6ddb354b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15447&amp;severity=null&amp;id=695afb5fdb813ff03ef1439b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15446-sql-injection-in-seeyon-zhiyuan-oa--dda8c3f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15446&amp;severity=null&amp;id=695af456db813ff03ef034af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0579-sql-injection-in-code-projects-onlin-5af30a32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0579%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a60afdb813ff03ed02ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0578-sql-injection-in-code-projects-onlin-b40a0b17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0578%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a59a7db813ff03eceb68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15443-sql-injection-in-crmeb-d04c5dae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15443%3A%20SQL%20Injection%20in%20CRMEB&amp;severity=medium&amp;id=695a52a0db813ff03ecd5ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15442-sql-injection-in-crmeb-70a9a933</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15442%3A%20SQL%20Injection%20in%20CRMEB&amp;severity=medium&amp;id=695a4b97db813ff03ecbba64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0577-unrestricted-upload-in-code-projects-d1ce7073</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0577%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a367fdb813ff03ec78a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14830-cwe-79-improper-neutralization-of-i-362d4b4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JFrog%20Artifactory%20(Workers)&amp;severity=medium&amp;id=695a32fadb813ff03ec70731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0576-sql-injection-in-code-projects-onlin-5004ce46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0576%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a2f77db813ff03ec525e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0575-sql-injection-in-code-projects-onlin-4e9b35f8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0575%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a0547db813ff03eb47238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptocurrency-scam-emails-and-web-pages-as-we-ent-45f003f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026%2C%20(Sun%2C%20Jan%204th)&amp;severity=medium&amp;id=6959effcdb813ff03eac9305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0574-improper-authorization-in-yeqifu-war-abcf8498</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0574%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6959cd06db813ff03e7f215f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-04-4b8cf66f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-04&amp;severity=medium&amp;id=695b0231db813ff03ef2c705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3660-improper-authorization-of-index-cont-3e60d3bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3660%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3654-improper-authorization-of-index-cont-b47f1f02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3654%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3653-improper-authorization-of-index-cont-2d7465bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3653%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3652-authentication-bypass-using-an-alter-7e33ab53</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3652%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3646-missing-authentication-for-critical--eed88241</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3646%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15115-missing-authorization-in-petlibrio--7ec5e489</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15115%3A%20Missing%20Authorization%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34171-361be593</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34171%3A%20CWE-862%20Missing%20Authorization%20in%20IceWhale%20Tech%20CasaOS&amp;severity=medium&amp;id=6957f5dddb813ff03ef50c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/just-in-shinyhunters-claim-breach-of-us-cybersecur-83930754</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Just%20In%3A%20ShinyHunters%20Claim%20Breach%20of%20US%20Cybersecurity%20Firm%20Resecurity%2C%20Screenshots%20Show%20Internal%20Access&amp;severity=high&amp;id=69594ac4db813ff03e5f8456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-is-using-react2shell-to-hijack-tho-65dbbe4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20is%20Using%20React2Shell%20to%20Hijack%20Thousands%20of%20Unpatched%20Devices&amp;severity=medium&amp;id=69593228db813ff03e5a2c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-coldfusion-exploit-attempts-spotted-d-eb527f74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20ColdFusion%20exploit%20attempts%20spotted%20during%20Christmas%20holiday&amp;severity=high&amp;id=69592093db813ff03e5684c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-snakes-by-the-riverbank-ab557ee1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%3A%20Snakes%20by%20the%20riverbank&amp;severity=medium&amp;id=695b9dfc3dc84013b246d8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/longnosedgoblin-tries-to-sniff-out-governmental-af-95ee9be0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LongNosedGoblin%20tries%20to%20sniff%20out%20governmental%20affairs%20in%20Southeast%20Asia%20and%20Japan&amp;severity=medium&amp;id=695b9dfc3dc84013b246d8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/president-trump-orders-divestment-in-29-million-ch-bbc4edb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=President%20Trump%20Orders%20Divestment%20in%20%242.9%20Million%20Chips%20Deal%20to%20Protect%20US%20Security%20Interests&amp;severity=medium&amp;id=6958f660db813ff03e4f426e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kermit-exploit-defeats-police-ai-podcast-your-righ-9068c77e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kermit%20Exploit%20Defeats%20Police%20AI%3A%20Podcast%20Your%20Rights%20to%20Challenge%20the%20Record%20Integrity&amp;severity=high&amp;id=6958ebd7db813ff03e4dd288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21484-cwe-203-observable-discrepancy-in-m-feea7b0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21484%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20Mintplex-Labs%20anything-llm&amp;severity=medium&amp;id=69587451db813ff03e162b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64124-cwe-78-improper-neutralization-of-s-8fd8727d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64124%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=high&amp;id=69586640db813ff03e0db0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64125-cwe-441-unintended-proxy-or-interme-b38ae03f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64125%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20in%20Nuvation%20Energy%20nCloud%20VPN%20Service&amp;severity=critical&amp;id=69586640db813ff03e0db0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-03-c5d81326</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-03&amp;severity=medium&amp;id=6959b0b1db813ff03e7417d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64123-cwe-78-improper-neutralization-of-s-ade8ddce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64123%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=high&amp;id=69583c10db813ff03e02aa68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64122-cwe-522-insufficiently-protected-cr-7b6e64e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64122%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=high&amp;id=69583c10db813ff03e02aa65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64121-cwe-288-authentication-bypass-using-e870bc00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64121%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=critical&amp;id=69583c10db813ff03e02aa62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64120-cwe-78-improper-neutralization-of-s-dfeaa13c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64120%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=critical&amp;id=69583c10db813ff03e02aa6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64119-cwe-603-in-nuvation-energy-battery--a46ce8db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64119%3A%20CWE-603%20in%20Nuvation%20Energy%20Battery%20Management%20System&amp;severity=critical&amp;id=6958388ddb813ff03e020325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21483-cwe-79-improper-neutralization-of-i-8206b461</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20knadh%20listmonk&amp;severity=medium&amp;id=69583509db813ff03e019c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21452-cwe-400-uncontrolled-resource-consu-f1c49e53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21452%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20msgpack%20msgpack-java&amp;severity=high&amp;id=69583184db813ff03e011ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0571-path-traversal-in-yeqifu-warehouse-94df3301</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0571%3A%20Path%20Traversal%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=695826f8db813ff03efea567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21445-cwe-306-missing-authentication-for--38cd4a1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21445%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69581c6edb813ff03efc8412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21444-cwe-327-use-of-a-broken-or-risky-cr-e643cca6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21444%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20stefanberger%20libtpms&amp;severity=medium&amp;id=69581901db813ff03efbfeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21440-cwe-22-improper-limitation-of-a-pat-1ab6f0b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21440%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20adonisjs%20core&amp;severity=critical&amp;id=69581901db813ff03efbfead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covenant-health-data-breach-after-ransomware-attac-a2a805de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Covenant%20Health%20data%20breach%20after%20ransomware%20attack%20impacted%20over%20478%2C000%20people&amp;severity=high&amp;id=695818e7db813ff03efbfbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0570-sql-injection-in-code-projects-onlin-1e0574c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0570%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69581901db813ff03efbfea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-10k-fortinet-firewalls-exposed-to-actively-ex-ab9c98b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2010K%20Fortinet%20firewalls%20exposed%20to%20actively%20exploited%202FA%20bypass&amp;severity=high&amp;id=695818e7db813ff03efbfbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tokyo-fm-data-breach-hacker-claims-over-3-million--03a7ef62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tokyo%20FM%20Data%20Breach%3A%20Hacker%20Claims%20Over%203%20Million%20Records%20Stolen&amp;severity=high&amp;id=695811dedb813ff03efad351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0569-sql-injection-in-code-projects-onlin-b84c43d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0569%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695811f1db813ff03efad660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0568-sql-injection-in-code-projects-onlin-45aee655</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0568%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69580ad8db813ff03ef98cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0567-sql-injection-in-code-projects-conte-5b243309</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0567%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=695803d0db813ff03ef8206e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15439-sql-injection-in-daptin-79e40f73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15439%3A%20SQL%20Injection%20in%20Daptin&amp;severity=medium&amp;id=6957fcc6db813ff03ef64afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69417-cwe-863-incorrect-authorization-in--ccf52c26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69417%3A%20CWE-863%20Incorrect%20Authorization%20in%20Plex%20plex.tv%20backend&amp;severity=medium&amp;id=6957fcc6db813ff03ef64b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69416-cwe-863-incorrect-authorization-in--97acdffa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69416%3A%20CWE-863%20Incorrect%20Authorization%20in%20Plex%20plex.tv%20backend&amp;severity=medium&amp;id=6957f952db813ff03ef5aecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69415-cwe-672-operation-on-a-resource-aft-2ac0c1e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69415%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20Plex%20Media%20Server&amp;severity=high&amp;id=6957f952db813ff03ef5aecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69414-cwe-863-incorrect-authorization-in--7df6bff5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69414%3A%20CWE-863%20Incorrect%20Authorization%20in%20Plex%20Media%20Server&amp;severity=high&amp;id=6957f965db813ff03ef5b265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0566-unrestricted-upload-in-code-projects-ec4488f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0566%3A%20Unrestricted%20Upload%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=6957f965db813ff03ef5b268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59389-cwe-89-in-qnap-systems-inc-hyper-da-e848d35c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59389%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Hyper%20Data%20Protector&amp;severity=high&amp;id=6957eb35db813ff03ef35595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62842-cwe-73-in-qnap-systems-inc-hbs-3-hy-fad20694</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62842%3A%20CWE-73%20in%20QNAP%20Systems%20Inc.%20HBS%203%20Hybrid%20Backup%20Sync&amp;severity=high&amp;id=6957eb35db813ff03ef3559b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62840-cwe-209-in-qnap-systems-inc-hbs-3-h-5dc54d76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62840%3A%20CWE-209%20in%20QNAP%20Systems%20Inc.%20HBS%203%20Hybrid%20Backup%20Sync&amp;severity=high&amp;id=6957eb35db813ff03ef35598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11837-cwe-94-in-qnap-systems-inc-malware--01b67e6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11837%3A%20CWE-94%20in%20QNAP%20Systems%20Inc.%20Malware%20Remover&amp;severity=high&amp;id=6957eb35db813ff03ef35592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69284-cwe-284-improper-access-control-in--b5b979e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69284%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20makeplane%20plane&amp;severity=medium&amp;id=6957eb35db813ff03ef355a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62852-cwe-121-in-qnap-systems-inc-qts-640e89f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62852%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957e42ddb813ff03ef241da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59387-cwe-89-in-qnap-systems-inc-mars-mul-365f7996</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59387%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20MARS%20(Multi-Application%20Recovery%20Service)&amp;severity=high&amp;id=6957e42ddb813ff03ef241d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59384-cwe-22-in-qnap-systems-inc-qfiling-283cc204</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59384%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qfiling&amp;severity=high&amp;id=6957e42ddb813ff03ef241d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59381-cwe-22-in-qnap-systems-inc-qts-3fa3e827</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59381%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e42ddb813ff03ef241d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59380-cwe-22-in-qnap-systems-inc-qts-91aa99af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59380%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e42ddb813ff03ef241ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53597-cwe-121-in-qnap-systems-inc-license-aaa1e91c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53597%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20License%20Center&amp;severity=low&amp;id=6957e42ddb813ff03ef241cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53594-cwe-22-in-qnap-systems-inc-qfinder--9c2c2ec3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53594%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qfinder%20Pro%20Mac&amp;severity=medium&amp;id=6957e42ddb813ff03ef241c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52871-cwe-125-in-qnap-systems-inc-license-2728acf0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52871%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20License%20Center&amp;severity=low&amp;id=6957e42ddb813ff03ef241c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48721-cwe-120-in-qnap-systems-inc-qts-78ba2fc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48721%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957e42ddb813ff03ef241c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9110-cwe-497-in-qnap-systems-inc-qts-8028bbe6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9110%3A%20CWE-497%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957e42ddb813ff03ef241dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57705-cwe-770-in-qnap-systems-inc-qts-cc71e0c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57705%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e0a8db813ff03ef1420b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54166-cwe-125-in-qnap-systems-inc-qts-5e64de99</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54166%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e0a8db813ff03ef14208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54165-cwe-125-in-qnap-systems-inc-qts-6d7a0d62</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54165%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e0a8db813ff03ef14205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54164-cwe-125-in-qnap-systems-inc-qts-8dca5c6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54164%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957dd47db813ff03ef066bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53596-cwe-476-in-qnap-systems-inc-qts-9f8afab4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53596%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53593-cwe-121-in-qnap-systems-inc-qts-fa47faa3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53593%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53592-cwe-476-in-qnap-systems-inc-qts-95fe50f4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53592%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53591-cwe-134-in-qnap-systems-inc-qts-ca58fadd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53591%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53590-cwe-476-in-qnap-systems-inc-qts-fe2f829b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53590%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53589-cwe-476-in-qnap-systems-inc-qts-8a57f6ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53589%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53414-cwe-476-in-qnap-systems-inc-qts-5cde872f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53414%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53405-cwe-476-in-qnap-systems-inc-qts-5d774bc8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53405%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0667e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52872-cwe-120-in-qnap-systems-inc-qts-0bb94e21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52872%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0667b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52864-cwe-120-in-qnap-systems-inc-qts-ffcf2f22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52864%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52863-cwe-120-in-qnap-systems-inc-qts-1b6925f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52863%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52431-cwe-476-in-qnap-systems-inc-qts-dc45854a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52431%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52430-cwe-476-in-qnap-systems-inc-qts-d36776bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52430%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0666f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52426-cwe-476-in-qnap-systems-inc-qts-f2963f27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52426%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47208-cwe-770-in-qnap-systems-inc-qts-a829ed17</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47208%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957dd46db813ff03ef06669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44013-cwe-476-in-qnap-systems-inc-qts-ee5f2b21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44013%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparent-tribe-launches-new-rat-attacks-against-7e20b52e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transparent%20Tribe%20Launches%20New%20RAT%20Attacks%20Against%20Indian%20Government%20and%20Academia&amp;severity=high&amp;id=6957dd24db813ff03ef06173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62857-cwe-79-in-qnap-systems-inc-qumagie-e4cb0c7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62857%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=low&amp;id=6957dd47db813ff03ef066c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-kimwolf-botnet-is-stalking-your-local-network-8b22c4a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Kimwolf%20Botnet%20is%20Stalking%20Your%20Local%20Network&amp;severity=high&amp;id=6957dd24db813ff03ef0616f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15438-deserialization-in-pluxml-5717081c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15438%3A%20Deserialization%20in%20PluXml&amp;severity=medium&amp;id=6957d9a2db813ff03eef48ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0565-sql-injection-in-code-projects-conte-7aa41759</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0565%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=6957d298db813ff03eed8b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparent-tribe-launches-new-rat-attacks-against-8ba4828c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transparent%20Tribe%20Launches%20New%20RAT%20Attacks%20Against%20Indian%20Government%20and%20Academia&amp;severity=medium&amp;id=6957cf0ddb813ff03eec907e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vvs-discord-stealer-using-pyarmor-for-obfuscation--a634aa2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VVS%20Discord%20Stealer%20Using%20Pyarmor%20for%20Obfuscation%20and%20Detection%20Evasion&amp;severity=medium&amp;id=6957cf29db813ff03eec98a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flock-exposes-its-ai-enabled-surveillance-cameras-70340cff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flock%20Exposes%20Its%20AI-Enabled%20Surveillance%20Cameras&amp;severity=medium&amp;id=6957cf29db813ff03eec98a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-campaign-abuses-google-cloud-application--5d341205</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20campaign%20abuses%20Google%20Cloud%20Application%20to%20impersonate%20legitimate%20Google%20emails&amp;severity=medium&amp;id=6957cf29db813ff03eec989f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vvs-discord-stealer-using-pyarmor-for-obfuscation--c429a73c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VVS%20Discord%20Stealer%20Using%20Pyarmor%20for%20Obfuscation%20and%20Detection%20Evasion&amp;severity=medium&amp;id=6957f23cdb813ff03ef4a1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-registry-persistence-techniques-without-re-e0554d78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Registry%20Persistence%20Techniques%20without%20Registry%20Callbacks&amp;severity=medium&amp;id=6957c80cdb813ff03eeaffbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-us-cybersecurity-pros-plead-guilty-over-ransom-02a06284</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20US%20Cybersecurity%20Pros%20Plead%20Guilty%20Over%20Ransomware%20Attacks&amp;severity=medium&amp;id=6957b674db813ff03ee6876a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-roi-problem-in-attack-surface-management-9967b931</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20ROI%20Problem%20in%20Attack%20Surface%20Management&amp;severity=low&amp;id=6958603ddb813ff03e0a0a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploiting-react2shell-vulnerabili-bbaded6f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Exploiting%20React2Shell%20Vulnerability&amp;severity=medium&amp;id=6957a863db813ff03ee2bb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covenant-health-data-breach-impacts-478000-individ-0c946c66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Covenant%20Health%20Data%20Breach%20Impacts%20478%2C000%20Individuals&amp;severity=medium&amp;id=69579dd8db813ff03edf84fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-coldfusion-servers-targeted-in-coordinated-c-c049fe53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20ColdFusion%20Servers%20Targeted%20in%20Coordinated%20Campaign&amp;severity=medium&amp;id=69579a53db813ff03ede64e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0547-unrestricted-upload-in-phpgurukul-on-0b0384d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0547%3A%20Unrestricted%20Upload%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69579353db813ff03edc3e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abuse-google-cloud-email-feature-in-b0852113</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abuse%20Google%20Cloud%20Email%20Feature%20in%20Multi-Stage%20Phishing%20Campaign&amp;severity=medium&amp;id=6958603ddb813ff03e0a0a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0546-sql-injection-in-code-projects-conte-37323882</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0546%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=69578c4bdb813ff03edaa617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15437-cross-site-scripting-in-ligerosmart-24338344</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15437%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=69578543db813ff03ed9340b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15436-sql-injection-in-yonyou-ksoa-884c8d59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15436%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=69577e3bdb813ff03ed8028d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15435-sql-injection-in-yonyou-ksoa-eb01c9b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15435%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=69577733db813ff03ed646cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15434-sql-injection-in-yonyou-ksoa-d865a8da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15434%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=6957702ddb813ff03ed46cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15432-path-traversal-in-yeqifu-carrental-59c46a94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15432%3A%20Path%20Traversal%20in%20yeqifu%20carRental&amp;severity=medium&amp;id=69576923db813ff03ed2f10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15431-buffer-overflow-in-utt-512w-986c5285</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15431%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=6957621bdb813ff03ed0f787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14072-cwe-287-improper-authentication-in--fcdd338c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14072%3A%20CWE-287%20Improper%20Authentication%20in%20Ninja%20Forms&amp;severity=medium&amp;id=6957621bdb813ff03ed0f784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13456-cwe-79-cross-site-scripting-xss-in--2ad540af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13456%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20ShopBuilder&amp;severity=medium&amp;id=6957621bdb813ff03ed0f781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13153-cwe-79-cross-site-scripting-xss-in--8bd50900</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13153%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Logo%20Slider&amp;severity=medium&amp;id=6957621bdb813ff03ed0f77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12685-cwe-352-cross-site-request-forgery--052e8f12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPBookit&amp;severity=medium&amp;id=6957621bdb813ff03ed0f77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15430-buffer-overflow-in-utt-512w-b701d7fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15430%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=69575b13db813ff03ece591e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15429-buffer-overflow-in-utt-512w-1edbb386</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15429%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=6957578fdb813ff03ecd2435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15428-buffer-overflow-in-utt-512w-0eacf5ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15428%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=69575087db813ff03ecb9937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15427-sql-injection-in-seeyon-zhiyuan-oa--6893a432</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15427&amp;severity=null&amp;id=695745fadb813ff03ec87323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15426-unrestricted-upload-in-jackying-h-u-20044b21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15426%3A%20Unrestricted%20Upload%20in%20jackying%20H-ui.admin&amp;severity=medium&amp;id=69574277db813ff03ec73231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15425-sql-injection-in-yonyou-ksoa-0317e057</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15425%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=695737ecdb813ff03ea62d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15424-sql-injection-in-yonyou-ksoa-35d7090b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15424%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=695737ecdb813ff03ea62d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15423-unrestricted-upload-in-empiresoft-e-e21ca2bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15423%3A%20Unrestricted%20Upload%20in%20EmpireSoft%20EmpireCMS&amp;severity=medium&amp;id=695843a1db813ff03e04a595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14998-cwe-639-authorization-bypass-throug-6c57fe02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14998%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpmudev%20Branda%20%E2%80%93%20White%20Label%20%26%20Branding%2C%20Free%20Login%20Page%20Customizer&amp;severity=critical&amp;id=695843a1db813ff03e04a584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14047-cwe-862-missing-authorization-in-ta-a3aa4d0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14047%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=medium&amp;id=695843a1db813ff03e04a577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15422-protection-mechanism-failure-in-emp-f6526326</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15422%3A%20Protection%20Mechanism%20Failure%20in%20EmpireSoft%20EmpireCMS&amp;severity=medium&amp;id=695722d3db813ff03e9b27ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/built-an-automated-red-team-tool-to-find-llm-vulne-c6daf098</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Built%20an%20automated%20red-team%20tool%20to%20find%20LLM%20vulnerabilities.%20Most%20AI%20apps%20are%20frighteningly%20easy%20to%20break.&amp;severity=critical&amp;id=69571f50db813ff03e988f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15421-sql-injection-in-yonyou-ksoa-15b66d8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15421%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=69571bcbdb813ff03e966c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15420-sql-injection-in-yonyou-ksoa-8ff00d8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15420%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=695714c3db813ff03e90983a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15419-denial-of-service-in-open5gs-a191d9a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15419%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=695714c3db813ff03e909831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-02-6e26c7bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-02&amp;severity=medium&amp;id=69585f31db813ff03e094b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65125-na-2d5f29b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65125%3A%20n%2Fa&amp;severity=critical&amp;id=695843a1db813ff03e04a572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45286-na-e23b921a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45286%3A%20n%2Fa&amp;severity=medium&amp;id=695843a1db813ff03e04a56c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67158-na-b31284cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67158%3A%20n%2Fa&amp;severity=high&amp;id=6957f965db813ff03ef5b260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67159-na-3d467c17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67159%3A%20n%2Fa&amp;severity=high&amp;id=6957f602db813ff03ef51678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67160-na-7d2c9953</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67160%3A%20n%2Fa&amp;severity=high&amp;id=6957f23ddb813ff03ef4a1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67268-na-1196050b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67268%3A%20n%2Fa&amp;severity=critical&amp;id=6957eeb8db813ff03ef3fe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67269-na-a3b7ad16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67269%3A%20n%2Fa&amp;severity=high&amp;id=6957eb35db813ff03ef3559e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55374-na-942b2e66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55374%3A%20n%2Fa&amp;severity=medium&amp;id=6957e0a8db813ff03ef14201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15418-denial-of-service-in-open5gs-c29fc1bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15418%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=695706b3db813ff03e8adb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15417-denial-of-service-in-open5gs-d3430b44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15417%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=6956ffabdb813ff03e890340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15416-cross-site-scripting-in-xnx3-wangma-9067db30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15416%3A%20Cross%20Site%20Scripting%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=6956f8a3db813ff03e8725ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15415-unrestricted-upload-in-xnx3-wangmar-23fa7946</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15415%3A%20Unrestricted%20Upload%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=6956f1e1db813ff03e8571d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15414-server-side-request-forgery-in-go-s-014a07a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15414%3A%20Server-Side%20Request%20Forgery%20in%20go-sonic%20sonic&amp;severity=medium&amp;id=6956ea94db813ff03e836007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15413-memory-corruption-in-wasm3-ae72b50d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15413%3A%20Memory%20Corruption%20in%20wasm3&amp;severity=medium&amp;id=6956e38cdb813ff03e814b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15412-out-of-bounds-read-in-webassembly-w-cbc26af0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15412%3A%20Out-of-Bounds%20Read%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=6956dc84db813ff03e7ed0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15411-memory-corruption-in-webassembly-wa-c86fe015</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15411%3A%20Memory%20Corruption%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=6956ce74db813ff03e7b35a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15410-sql-injection-in-code-projects-onli-512f39ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15410%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956c76cdb813ff03e78cd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69203-cwe-290-authentication-bypass-by-sp-a082b007</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69203%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=6956c3e8db813ff03e77f10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68619-cwe-94-improper-control-of-generati-6e946495</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68619%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SignalK%20signalk-server&amp;severity=high&amp;id=6956c3e8db813ff03e77f102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15409-sql-injection-in-code-projects-onli-d88f38b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15409%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956f1e1db813ff03e8571dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55065-cwe-89-improper-neutralization-of-s-db8f01f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55065%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kopek%20Reem%20ReKord%20client&amp;severity=high&amp;id=6956f1e1db813ff03e8571e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68620-cwe-288-authentication-bypass-using-28a1205e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68620%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=6956c3e8db813ff03e77f106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68273-cwe-200-exposure-of-sensitive-infor-4aa8ca46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68273%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=6956bce0db813ff03e75fde5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68272-cwe-400-uncontrolled-resource-consu-b8c7fa57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68272%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SignalK%20signalk-server&amp;severity=high&amp;id=6956bce0db813ff03e75fdef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21437-cwe-353-missing-support-for-integri-b87ca50f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21437%3A%20CWE-353%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20getsolus%20eopkg&amp;severity=low&amp;id=6956bce0db813ff03e75fdf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21436-cwe-24-path-traversal-filedir-in-ge-e0e1ea95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21436%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20getsolus%20eopkg&amp;severity=medium&amp;id=6956bce0db813ff03e75fdf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15408-sql-injection-in-code-projects-onli-b47ded96</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15408%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956bce0db813ff03e75fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66398-cwe-78-improper-neutralization-of-s-ff983985</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66398%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=6956b95edb813ff03e75250c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21428-cwe-93-improper-neutralization-of-c-0e9b9e91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21428%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=6956b5dbdb813ff03e73e079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15407-sql-injection-in-code-projects-onli-f357110b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15407%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956b256db813ff03e730128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15406-missing-authorization-in-phpgurukul-900eb7ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15406%3A%20Missing%20Authorization%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=6956ab4edb813ff03e6ffc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47411-cwe-269-improper-privilege-manageme-3f471c13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47411%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20StreamPipes&amp;severity=high&amp;id=6956a7c9db813ff03e6f0ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14627-cwe-918-server-side-request-forgery-09da3e9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14627%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=medium&amp;id=6956a0c2db813ff03e6d157a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14428-cwe-862-missing-authorization-in-ga-62d49b42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14428%3A%20CWE-862%20Missing%20Authorization%20in%20premio%20All-in-one%20Sticky%20Floating%20Contact%20Form%2C%20Call%2C%20Click%20to%20Chat%2C%20and%2050%2B%20Social%20Icon%20Tabs%20%20%E2%80%93%20My%20Sticky%20Elements&amp;severity=medium&amp;id=6956a0c2db813ff03e6d1573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48769-cwe-416-use-after-free-in-apache-so-56a89349</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48769%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS&amp;severity=medium&amp;id=6956a0c2db813ff03e6d1584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48768-cwe-763-release-of-invalid-pointer--be0d46ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48768%3A%20CWE-763%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS&amp;severity=medium&amp;id=6956a0c2db813ff03e6d1580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ghostad-drain-macos-attacks-pr-55121ae2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20GhostAd%20Drain%2C%20macOS%20Attacks%2C%20Proxy%20Botnets%2C%20Cloud%20Exploits%2C%20and%2012%2B%20Stories&amp;severity=medium&amp;id=6956f86fdb813ff03e871356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15405-cross-site-request-forgery-in-phpem-2015e739</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15405%3A%20Cross-Site%20Request%20Forgery%20in%20PHPEMS&amp;severity=medium&amp;id=69568f2edb813ff03e66b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-story-of-a-perfect-exploit-chain-six-bugs-that-01b02b69</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Story%20of%20a%20Perfect%20Exploit%20Chain%3A%20Six%20Bugs%20That%20Looked%20Harmless%20Until%20They%20Became%20Pre-Auth%20RCE%20in%20a%20Security%20Appliance&amp;severity=high&amp;id=69568bacdb813ff03e65d78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15404-unrestricted-upload-in-campcodes-sc-cbf79a7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15404%3A%20Unrestricted%20Upload%20in%20campcodes%20School%20File%20Management%20System&amp;severity=medium&amp;id=69567a16db813ff03e61fb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploits-critical-react2shell-flaw-53322b34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Exploits%20Critical%20React2Shell%20Flaw%20to%20Hijack%20IoT%20Devices%20and%20Web%20Servers&amp;severity=critical&amp;id=6956617adb813ff03e5b1417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploits-critical-react2shell-flaw-82c88218</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Exploits%20Critical%20React2Shell%20Flaw%20to%20Hijack%20IoT%20Devices%20and%20Web%20Servers&amp;severity=critical&amp;id=6956f86fdb813ff03e871359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0544-sql-injection-in-itsourcecode-school-7b433049</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0544%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=69563ad1db813ff03e5276ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11157-cwe-502-deserialization-of-untruste-512c4e8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11157%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20feast-dev%20feast-dev%2Ffeast&amp;severity=high&amp;id=6956f1e1db813ff03e8571ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13820-cwe-269-improper-privilege-manageme-eb286025</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13820%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Comments&amp;severity=medium&amp;id=695610a1db813ff03e43b0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-01-1e8a00ee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-01&amp;severity=medium&amp;id=69570db0db813ff03e8cf12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69412-cwe-295-improper-certificate-valida-871316b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69412%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20KDE%20messagelib&amp;severity=low&amp;id=6955b1b6db813ff03e0732d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deedrat-unpacking-a-modern-backdoors-playbook-c3e3b2a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeedRAT%3A%20Unpacking%20a%20Modern%20Backdoor&apos;s%20Playbook&amp;severity=medium&amp;id=6957a4e6db813ff03ee16357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-european-space-agency-breach-selling-e82f758b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Claims%20European%20Space%20Agency%20Breach%2C%20Selling%20200GB%20of%20Data&amp;severity=high&amp;id=6955aaaadb813ff03e06314c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67711-cwe-79-improper-neutralization-of-i-9cda60ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a72adb813ff03e05b24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67710-cwe-79-improper-neutralization-of-i-589cf50c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67709-cwe-79-improper-neutralization-of-i-072e1f66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67709%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67708-cwe-79-improper-neutralization-of-i-16ecd8a4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67708%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67707-cwe-434-unrestricted-upload-of-file-c14974c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67707%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67706-cwe-434-unrestricted-upload-of-file-9ed6311b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67706%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67705-cwe-79-improper-neutralization-of-i-c34ddd48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67704-cwe-79-improper-neutralization-of-i-0187848a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67703-cwe-79-improper-neutralization-of-i-aae6d110</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15398-weak-password-recovery-in-uasoft-ba-c23e7162</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15398%3A%20Weak%20Password%20Recovery%20in%20Uasoft%20badaso&amp;severity=medium&amp;id=6955a05adb813ff03e045d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69288-cwe-20-improper-input-validation-in-e6c8be90</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69288%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20kromitgmbh%20titra&amp;severity=critical&amp;id=6955a05adb813ff03e045d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69286-cwe-340-generation-of-predictable-n-5834d285</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69286%3A%20CWE-340%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20infiniflow%20ragflow&amp;severity=high&amp;id=69559c9ddb813ff03e037d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7332-cwe-1284-improper-validation-of-spec-06c42df5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7332%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20pmmp%20PocketMine-MP&amp;severity=high&amp;id=69559919db813ff03e029ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68700-cwe-78-improper-neutralization-of-s-50efb60e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68700%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20infiniflow%20ragflow&amp;severity=high&amp;id=69559595db813ff03e01bb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7331-sql-injection-in-pkrystian-full-stac-9be4e667</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7331%3A%20SQL%20Injection%20in%20PKrystian%20Full-Stack-Bank&amp;severity=medium&amp;id=69559212db813ff03e014811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53235-cwe-79-improper-neutralization-of-i-7a64fbad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osuthorpe%20Easy%20Social&amp;severity=null&amp;id=69558786db813ff03eff62bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52739-cwe-79-improper-neutralization-of-i-00167716</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Sala&amp;severity=high&amp;id=69558402db813ff03efee310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50053-cwe-79-improper-neutralization-of-i-78586778</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nebelhorn%20Blappsta%20Mobile%20App%20Plugin%20%26%238211%3B%20Your%20native%2C%20mobile%20iPhone%20App%20and%20Android%20App&amp;severity=null&amp;id=69558402db813ff03efee30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31054-cwe-352-cross-site-request-forgery--9885f2f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31054%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themefy%20Bloggie&amp;severity=high&amp;id=69558402db813ff03efee30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30628-cwe-89-improper-neutralization-of-s-6b4c5419</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30628%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20Amazon%20Affiliates%20Addon%20for%20WPBakery%20Page%20Builder%20(formerly%20Visual%20Composer)&amp;severity=high&amp;id=69558402db813ff03efee307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28973-cwe-35-path-traversal-in-aa-team-pr-3a591040</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28973%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20AA-Team%20Pro%20Bulk%20Watermark%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69558402db813ff03efee304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28949-cwe-89-improper-neutralization-of-s-1677eae3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28949%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Codedraft%20Mediabay%20-%20WordPress%20Media%20Library%20Folders&amp;severity=high&amp;id=69558402db813ff03efee301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23757-cwe-79-improper-neutralization-of-i-87e49272</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23757%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Proloy%20Chakroborty%20ZD%20Scribd%20iPaper&amp;severity=null&amp;id=69558403db813ff03efee336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23719-cwe-79-improper-neutralization-of-i-5ebea873</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23719%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zckevin%20ZhinaTwitterWidget&amp;severity=null&amp;id=69558402db813ff03efee31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23707-cwe-79-improper-neutralization-of-i-03b9c366</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23707%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matamko%20En%20Masse&amp;severity=null&amp;id=69558402db813ff03efee319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23705-cwe-79-improper-neutralization-of-i-3f486cf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23705%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Terry%20Zielke%20Zielke%20Design%20Project%20Gallery&amp;severity=null&amp;id=69558402db813ff03efee316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23667-cwe-79-improper-neutralization-of-i-6c7afbb3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23667%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Christopher%20Churchill%20custom-post-edit&amp;severity=null&amp;id=69558402db813ff03efee313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66144-cwe-862-missing-authorization-in-me-6a8938c1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66144%3A%20Missing%20Authorization%20in%20merkulove%20Worker%20for%20Elementor&amp;severity=null&amp;id=6955807ddb813ff03efdb3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66145-cwe-862-missing-authorization-in-me-913f8fee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66145%3A%20Missing%20Authorization%20in%20merkulove%20Worker%20for%20WPBakery&amp;severity=null&amp;id=6955807ddb813ff03efdb3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66146-cwe-862-missing-authorization-in-me-ee6451ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66146%3A%20Missing%20Authorization%20in%20merkulove%20Logger%20for%20Elementor&amp;severity=null&amp;id=6955807ddb813ff03efdb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66148-cwe-862-missing-authorization-in-me-204d435b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66148%3A%20Missing%20Authorization%20in%20merkulove%20Conformer%20for%20Elementor&amp;severity=null&amp;id=6955807ddb813ff03efdb3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15394-code-injection-in-icms-6bc32797</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15394%3A%20Code%20Injection%20in%20iCMS&amp;severity=medium&amp;id=695575f2db813ff03efb6cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34467-cwe-667-improper-locking-in-fredtem-85d211dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34467%3A%20CWE-667%20Improper%20Locking%20in%20fredtempez%20ZwiiCMS&amp;severity=medium&amp;id=6955a05adb813ff03e045d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66149-cwe-862-missing-authorization-in-me-b17fe228</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66149%3A%20Missing%20Authorization%20in%20merkulove%20UnGrabber&amp;severity=null&amp;id=6955a05adb813ff03e045d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66150-cwe-862-missing-authorization-in-me-78c0fb6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66150%3A%20Missing%20Authorization%20in%20merkulove%20Appender&amp;severity=null&amp;id=6955a05adb813ff03e045d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66151-cwe-862-missing-authorization-in-me-b3b692d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66151%3A%20Missing%20Authorization%20in%20merkulove%20Countdowner%20for%20Elementor&amp;severity=null&amp;id=6955a05adb813ff03e045d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66152-cwe-862-missing-authorization-in-me-4ccaa334</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66152%3A%20Missing%20Authorization%20in%20merkulove%20Criptopayer%20for%20Elementor&amp;severity=null&amp;id=6955a05adb813ff03e045d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15393-code-injection-in-kohana-kodicms-e1c4a3c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15393%3A%20Code%20Injection%20in%20Kohana%20KodiCMS&amp;severity=medium&amp;id=6955a05adb813ff03e045d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66153-cwe-862-missing-authorization-in-me-8fe23e2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66153%3A%20Missing%20Authorization%20in%20merkulove%20Headinger%20for%20Elementor&amp;severity=null&amp;id=6955a05adb813ff03e045d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rogue-screenconnect-common-social-engineering-tact-98835fc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rogue%20ScreenConnect%3A%20Common%20Social%20Engineering%20Tactics%20Seen%20in%202025&amp;severity=medium&amp;id=6957a4e6db813ff03ee16364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15392-sql-injection-in-kohana-kodicms-40b92352</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15392%3A%20SQL%20Injection%20in%20Kohana%20KodiCMS&amp;severity=medium&amp;id=69556b65db813ff03ef8e00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15391-command-injection-in-d-link-dir-806-a1fb2a5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15391%3A%20Command%20Injection%20in%20D-Link%20DIR-806A&amp;severity=medium&amp;id=695560d9db813ff03ef63216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49355-cwe-79-improper-neutralization-of-i-8f87f78c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ikaes%20Accessibility%20Press&amp;severity=null&amp;id=69555d55db813ff03ef562a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49337-cwe-79-improper-neutralization-of-i-3d4d9778</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49337%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20janhenckens%20Dashboard%20Beacon&amp;severity=null&amp;id=69555d55db813ff03ef562a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59135-cwe-79-improper-neutralization-of-i-1e2cf793</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=null&amp;id=69555d55db813ff03ef562ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62989-cwe-79-improper-neutralization-of-i-2b34650c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gora%20Tech%20Cooked&amp;severity=null&amp;id=69555d55db813ff03ef562af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkspectre-browser-extension-campaigns-exposed-af-0d2585b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkSpectre%20Browser%20Extension%20Campaigns%20Exposed%20After%20Impacting%208.8%20Million%20Users%20Worldwide&amp;severity=high&amp;id=695559cedb813ff03ef4d8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-drain-39m-from-unleash-protocol-after-mult-085bde42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20drain%20%243.9M%20from%20Unleash%20Protocol%20after%20multisig%20hijack&amp;severity=high&amp;id=695559cedb813ff03ef4d8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploits-react2shell-flaw-to-breac-47841fbd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20botnet%20exploits%20React2Shell%20flaw%20to%20breach%20Next.js%20servers&amp;severity=high&amp;id=695559cedb813ff03ef4d8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23608-cwe-79-improper-neutralization-of-i-b2476142</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23608%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Omar%20Mohamed%20Mohamoud%20LIVE%20TV&amp;severity=null&amp;id=69555d55db813ff03ef562b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62088-cwe-918-server-side-request-forgery-eb9235e6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62088%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20extendons%20WordPress%20%26%20WooCommerce%20Scraper%20Plugin%2C%20Import%20Data%20from%20Any%20Site&amp;severity=null&amp;id=69555a03db813ff03ef4dd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59138-cwe-918-server-side-request-forgery-367c4873</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59138%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Jthemes%20Genemy&amp;severity=null&amp;id=69555a03db813ff03ef4dd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66154-cwe-862-missing-authorization-in-me-274a30f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66154%3A%20Missing%20Authorization%20in%20merkulove%20Couponer%20for%20Elementor&amp;severity=null&amp;id=69555a03db813ff03ef4dd8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66155-cwe-862-missing-authorization-in-me-7a082f6e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66155%3A%20Missing%20Authorization%20in%20merkulove%20Questionar%20for%20Elementor&amp;severity=null&amp;id=69555a03db813ff03ef4dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66156-cwe-862-missing-authorization-in-me-2c35169b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66156%3A%20Missing%20Authorization%20in%20merkulove%20Watcher%20for%20Elementor&amp;severity=null&amp;id=69555a03db813ff03ef4dd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66157-cwe-862-missing-authorization-in-me-fa3c0c97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66157%3A%20Missing%20Authorization%20in%20merkulove%20Sliper%20for%20Elementor&amp;severity=null&amp;id=69555a03db813ff03ef4dd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66158-cwe-862-missing-authorization-in-me-1ff036e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66158%3A%20Missing%20Authorization%20in%20merkulove%20Gmaper%20for%20Elementor&amp;severity=null&amp;id=69555650db813ff03ef42843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66159-cwe-862-missing-authorization-in-me-869c3d02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66159%3A%20Missing%20Authorization%20in%20merkulove%20Walker%20for%20Elementor&amp;severity=null&amp;id=69555650db813ff03ef42846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66160-cwe-862-missing-authorization-in-me-3ef29876</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66160%3A%20Missing%20Authorization%20in%20merkulove%20Select%20Graphist%20for%20Elementor%09%20Graphist%20for%20Elementor&amp;severity=null&amp;id=69555650db813ff03ef42849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63021-cwe-79-improper-neutralization-of-i-07278eea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codetipi%20Valenti%20Engine&amp;severity=null&amp;id=69555650db813ff03ef42852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62874-cwe-862-missing-authorization-in-al-58848d62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62874%3A%20Missing%20Authorization%20in%20Alexander%20AnyComment&amp;severity=null&amp;id=69555650db813ff03ef4284f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62099-cwe-862-missing-authorization-in-ap-a05285fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62099%3A%20Missing%20Authorization%20in%20approveme%20Signature%20Add-On%20for%20Gravity%20Forms&amp;severity=null&amp;id=69555650db813ff03ef4284c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-leaks-1tb-of-stolen-asus-data-cbeaeca1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Leaks%201TB%20of%20Stolen%20ASUS%20Data&amp;severity=medium&amp;id=695552c7db813ff03ef38ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62101-cwe-352-cross-site-request-forgery--e283b53e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62101%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Omid%20Shamloo%20Pardakht%20Delkhah&amp;severity=null&amp;id=695552dadb813ff03ef39011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63038-cwe-862-missing-authorization-in-no-03b772c7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63038%3A%20Missing%20Authorization%20in%20Northern%20Beaches%20Websites%20WP%20Custom%20Admin%20Interface&amp;severity=null&amp;id=695552dadb813ff03ef3901d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62078-cwe-862-missing-authorization-in-fa-d0cb0aa8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62078%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20Easy%20Upload%20Files%20During%20Checkout&amp;severity=null&amp;id=695552dadb813ff03ef3900b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49339-cwe-862-missing-authorization-in-di-67b9bb89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49339%3A%20Missing%20Authorization%20in%20Digages%20Direct%20Payments%20WP&amp;severity=null&amp;id=695552dadb813ff03ef39002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49340-cwe-497-exposure-of-sensitive-syste-4c7bbb15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49340%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Digages%20Direct%20Payments%20WP&amp;severity=null&amp;id=695552dadb813ff03ef39005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62083-cwe-497-exposure-of-sensitive-syste-0a947bc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62083%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WP%20Messiah%20BoomDevs%20WordPress%20Coming%20Soon&amp;severity=null&amp;id=695552dadb813ff03ef3900e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-chrome-extension-hack-drains-85m-via--cb4c99ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20Chrome%20Extension%20Hack%20Drains%20%248.5M%20via%20Shai-Hulud%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=6955a5badb813ff03e056249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62113-cwe-352-cross-site-request-forgery--cc4c72e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62113%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20emendo_seb%20Co-marquage%20service-public.fr&amp;severity=null&amp;id=695552dadb813ff03ef39014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62115-cwe-862-missing-authorization-in-th-741dfd42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62115%3A%20Missing%20Authorization%20in%20ThemeBoy%20Hide%20Plugins&amp;severity=null&amp;id=695552dadb813ff03ef39017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62123-cwe-352-cross-site-request-forgery--a4c29170</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62123%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20inkthemes%20WP%20Gmail%20SMTP&amp;severity=null&amp;id=695552dadb813ff03ef3901a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49352-cwe-639-authorization-bypass-throug-f24271a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49352%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20YoOhw%20Studio%20Order%20Cancellation%20%26amp%3B%20Returns%20for%20WooCommerce&amp;severity=null&amp;id=695552dadb813ff03ef39008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkspectre-browser-extension-campaigns-exposed-af-7a9aa111</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkSpectre%20Browser%20Extension%20Campaigns%20Exposed%20After%20Impacting%208.8%20Million%20Users%20Worldwide&amp;severity=medium&amp;id=69554f35db813ff03ef2ee0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62087-cwe-862-missing-authorization-in-we-47519fde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62087%3A%20Missing%20Authorization%20in%20Web%20Builder%20143%20Sticky%20Notes%20for%20WP%20Dashboard&amp;severity=null&amp;id=69554bc2db813ff03ef247f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63040-cwe-352-cross-site-request-forgery--cf7eb4f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63040%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saad%20Iqbal%20Post%20Snippets&amp;severity=null&amp;id=69554bc2db813ff03ef2480b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49356-cwe-862-missing-authorization-in-my-f9f3b74e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49356%3A%20Missing%20Authorization%20in%20Mykola%20Lukin%20Orders%20Chat%20for%20WooCommerce&amp;severity=null&amp;id=69554bc2db813ff03ef247f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63004-cwe-862-missing-authorization-in-sk-79f15563</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63004%3A%20Missing%20Authorization%20in%20Skynet%20Technologies%20USA%20LLC%20All%20in%20One%20Accessibility&amp;severity=null&amp;id=69554bc2db813ff03ef24808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62130-cwe-862-missing-authorization-in-wp-6fca1b7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62130%3A%20Missing%20Authorization%20in%20wpdiscover%20Accordion%20Slider%20Gallery&amp;severity=null&amp;id=69554bc2db813ff03ef247f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62131-cwe-862-missing-authorization-in-st-fd5cae27</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62131%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Tasty%20Recipes%20Lite&amp;severity=null&amp;id=69554bc2db813ff03ef247fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62132-cwe-862-missing-authorization-in-st-e1d606ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62132%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Tasty%20Recipes%20Lite&amp;severity=null&amp;id=69554bc2db813ff03ef247ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62751-cwe-862-missing-authorization-in-ex-26e727a8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62751%3A%20Missing%20Authorization%20in%20extendthemes%20Vireo&amp;severity=null&amp;id=69554bc2db813ff03ef24805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62133-cwe-352-cross-site-request-forgery--b7b8092c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62133%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20manidoraisamy%20FormFacade&amp;severity=null&amp;id=69554bc2db813ff03ef24802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63014-cwe-352-cross-site-request-forgery--20991e06</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63014%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Serhii%20Pasyuk%20Gmedia%20Photo%20Gallery&amp;severity=null&amp;id=6955483edb813ff03ef16423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62089-cwe-352-cross-site-request-forgery--9ef0262b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62089%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MERGADO%20Mergado%20Pack&amp;severity=null&amp;id=6955483edb813ff03ef16420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62084-cwe-352-cross-site-request-forgery--f1f1889f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62084%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Imdad%20Next%20Web%20iNext%20Woo%20Pincode%20Checker&amp;severity=null&amp;id=6955483edb813ff03ef1641d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62143-cwe-497-exposure-of-sensitive-syste-7525ddcf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62143%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20nicashmu%20Post%20Video%20Players&amp;severity=null&amp;id=6955483edb813ff03ef1642c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62148-cwe-352-cross-site-request-forgery--fa6ccc15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62148%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eugen%20Bobrowski%20Robots.txt%20rewrite&amp;severity=null&amp;id=6955483edb813ff03ef1642f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62080-cwe-352-cross-site-request-forgery--d39198ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62080%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Channelize.io%20Team%20Live%20Shopping%20%26amp%3B%20Shoppable%20Videos%20For%20WooCommerce&amp;severity=null&amp;id=6955483edb813ff03ef16429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62150-cwe-862-missing-authorization-in-th-f41b7dae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62150%3A%20Missing%20Authorization%20in%20themesawesome%20History%20Timeline&amp;severity=null&amp;id=6955483edb813ff03ef16432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62154-cwe-862-missing-authorization-in-re-b500927e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62154%3A%20Missing%20Authorization%20in%20recorp%20AI%20Content%20Writing%20Assistant%20(Content%20Writer%2C%20ChatGPT%2C%20Image%20Generator)%20All%20in%20One&amp;severity=null&amp;id=695544badb813ff03ef0a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62114-cwe-497-exposure-of-sensitive-syste-cbd7ccf1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62114%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20marcelotorres%20Download%20Media%20Library&amp;severity=null&amp;id=695544badb813ff03ef0a09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62116-cwe-862-missing-authorization-in-qu-6fe2f561</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62116%3A%20Missing%20Authorization%20in%20quadlayers%20AI%20Copilot&amp;severity=null&amp;id=695544badb813ff03ef0a0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62122-cwe-862-missing-authorization-in-so-bc691faa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62122%3A%20Missing%20Authorization%20in%20solwininfotech%20Trash%20Duplicate%20and%20301%20Redirect&amp;severity=null&amp;id=695544badb813ff03ef0a0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62079-cwe-862-missing-authorization-in-da-aac35ccb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62079%3A%20Missing%20Authorization%20in%20Damian%20WP%20Export%20Categories%20%26amp%3B%20Taxonomies&amp;severity=null&amp;id=695544badb813ff03ef0a09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62126-cwe-201-insertion-of-sensitive-info-97ec1fe4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62126%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Razvan%20Stanga%20Varnish%2FNginx%20Proxy%20Caching&amp;severity=null&amp;id=695544badb813ff03ef0a0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62747-cwe-862-missing-authorization-in-au-fb6d9152</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62747%3A%20Missing%20Authorization%20in%20Aum%20Watcharapon%20Featured%20Image%20Generator&amp;severity=null&amp;id=695544badb813ff03ef0a0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15390-missing-authorization-in-phpgurukul-3f22c3e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15390%3A%20Missing%20Authorization%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=695544badb813ff03ef0a0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49334-cwe-639-authorization-bypass-throug-7ba91f31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49334%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Eduardo%20Vill%C3%A3o%20MyD%20Delivery&amp;severity=null&amp;id=695544badb813ff03ef0a0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59136-cwe-201-insertion-of-sensitive-info-302417cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59136%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ef%C3%AD%20Bank%20Gerencianet%20Oficial&amp;severity=null&amp;id=695544bbdb813ff03ef0a0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62129-cwe-862-missing-authorization-in-ma-e5a443c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62129%3A%20Missing%20Authorization%20in%20Magnigenie%20RestroPress&amp;severity=null&amp;id=695544bbdb813ff03ef0a0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62755-cwe-862-missing-authorization-in-gs-35d1ef43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62755%3A%20Missing%20Authorization%20in%20GS%20Plugins%20GS%20Portfolio%20for%20Envato&amp;severity=null&amp;id=695544bbdb813ff03ef0a0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63031-cwe-862-missing-authorization-in-wp-d471de04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63031%3A%20Missing%20Authorization%20in%20WP%20Grids%20EasyTest&amp;severity=null&amp;id=69553db2db813ff03eef57de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62139-cwe-201-insertion-of-sensitive-info-8f4af0c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62139%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vladimir%20Statsenko%20Terms%20descriptions&amp;severity=null&amp;id=69553db2db813ff03eef57cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62141-cwe-862-missing-authorization-in-10-5817ecab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62141%3A%20Missing%20Authorization%20in%20Information%20Technology%20Wawp&amp;severity=null&amp;id=69553db2db813ff03eef57cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63022-cwe-862-missing-authorization-in-il-175a2223</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63022%3A%20Missing%20Authorization%20in%20topdevs.net%20Simple%20Like%20Page&amp;severity=null&amp;id=69553db2db813ff03eef57db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63016-cwe-862-missing-authorization-in-qu-27876358</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63016%3A%20Missing%20Authorization%20in%20quadlayers%20QuadLayers%20TikTok%20Feed&amp;severity=null&amp;id=69553db2db813ff03eef57d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62145-cwe-862-missing-authorization-in-ne-64ee547d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62145%3A%20Missing%20Authorization%20in%20NewClarity%20DMCA%20Protection%20Badge&amp;severity=null&amp;id=69553db2db813ff03eef57d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62147-cwe-862-missing-authorization-in-ni-505c3e00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62147%3A%20Missing%20Authorization%20in%20nikmelnik%20Realbig&amp;severity=null&amp;id=69553db2db813ff03eef57d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62081-cwe-862-missing-authorization-in-ch-9e700cb1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62081%3A%20Missing%20Authorization%20in%20Channelize.io%20Team%20Live%20Shopping%20%26amp%3B%20Shoppable%20Videos%20For%20WooCommerce&amp;severity=null&amp;id=69553db2db813ff03eef57c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63053-cwe-639-authorization-bypass-throug-a6842a92</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63053%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=null&amp;id=69553db2db813ff03eef57e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63001-cwe-862-missing-authorization-in-ni-aea155ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63001%3A%20Missing%20Authorization%20in%20nicdark%20Hotel%20Booking&amp;severity=null&amp;id=69553db2db813ff03eef57e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49349-cwe-862-missing-authorization-in-re-a8c7f477</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49349%3A%20Missing%20Authorization%20in%20Reuters%20News%20Agency%20Reuters%20Direct&amp;severity=null&amp;id=69553a2edb813ff03eee80f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62098-cwe-862-missing-authorization-in-to-bde5c667</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62098%3A%20Missing%20Authorization%20in%20totalsoft%20Portfolio%20Gallery&amp;severity=null&amp;id=69553a2edb813ff03eee80fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spot-modified-shai-hulud-worm-testing--ce676bbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Spot%20Modified%20Shai-Hulud%20Worm%20Testing%20Payload%20on%20npm%20Registry&amp;severity=high&amp;id=695536a7db813ff03eedc9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62091-cwe-862-missing-authorization-in-vo-d1af9184</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62091%3A%20Missing%20Authorization%20in%20Vollstart%20Serial%20Codes%20Generator%20and%20Validator%20with%20WooCommerce%20Support&amp;severity=null&amp;id=69553327db813ff03eed15ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62108-cwe-862-missing-authorization-in-sa-a1859227</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62108%3A%20Missing%20Authorization%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=null&amp;id=69553327db813ff03eed15d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62888-cwe-862-missing-authorization-in-ma-98cb41ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62888%3A%20Missing%20Authorization%20in%20Marco%20Milesi%20WP%20Attachments&amp;severity=null&amp;id=69553327db813ff03eed15d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62117-cwe-352-cross-site-request-forgery--8e4b073b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62117%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jayce53%20EasyIndex&amp;severity=null&amp;id=69552c1edb813ff03eeb80d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62120-cwe-352-cross-site-request-forgery--f607646d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62120%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rick%20Beckman%20OpenHook&amp;severity=null&amp;id=69552c1edb813ff03eeb80d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62134-cwe-352-cross-site-request-forgery--290dcac6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62134%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20A%20WP%20Life%20Contact%20Form%20Widget&amp;severity=null&amp;id=69552c1edb813ff03eeb80da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62138-cwe-862-missing-authorization-in-ce-3bc81f11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62138%3A%20Missing%20Authorization%20in%20cedcommerce%20WP%20Advanced%20PDF&amp;severity=null&amp;id=69552c1edb813ff03eeb80dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62144-cwe-862-missing-authorization-in-mo-0e19e9aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62144%3A%20Missing%20Authorization%20in%20Mohammed%20Kaludi%20Core%20Web%20Vitals%20%26%20PageSpeed%20Booster&amp;severity=null&amp;id=69552c1edb813ff03eeb80e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59003-cwe-201-insertion-of-sensitive-info-7bd636ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59003%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20inkthemescom%20ColorWay&amp;severity=null&amp;id=69552c1edb813ff03eeb80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62119-cwe-79-improper-neutralization-of-i-86b5ce16</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62119%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ViitorCloud%20Technologies%20Pvt%20Ltd%20Add%20Featured%20Image%20Custom%20Link&amp;severity=null&amp;id=69552c1edb813ff03eeb80e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62121-cwe-79-improper-neutralization-of-i-c53868b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62121%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Emu%20Logo%20Slider%20%2C%20Logo%20Carousel%20%2C%20Logo%20showcase%20%2C%20Client%20Logo&amp;severity=null&amp;id=69552c1edb813ff03eeb80e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62124-cwe-79-improper-neutralization-of-i-98b9c41e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62124%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soli%20WP%20Post%20Signature&amp;severity=null&amp;id=6955289adb813ff03eeaf248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ibm-warns-of-critical-api-connect-bug-allowing-rem-bb565a8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20CVSS%209.8%20Flaw%20Found%20in%20IBM%20API%20Connect%20Authentication%20System&amp;severity=critical&amp;id=6955a5badb813ff03e05624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62750-cwe-79-improper-neutralization-of-i-650996f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Filipe%20Seabra%20WooCommerce%20Parcelas&amp;severity=null&amp;id=6955289adb813ff03eeaf24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spot-modified-shai-hulud-worm-testing--421fc379</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Spot%20Modified%20Shai-Hulud%20Worm%20Testing%20Payload%20on%20npm%20Registry&amp;severity=medium&amp;id=6955a5badb813ff03e05624f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62140-cwe-79-improper-neutralization-of-i-9bc58405</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62140%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plainware%20Locatoraid%20Store%20Locator&amp;severity=null&amp;id=6955289adb813ff03eeaf24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62142-cwe-79-improper-neutralization-of-i-b83b606e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62142%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicashmu%20Post%20Video%20Players&amp;severity=null&amp;id=69552525db813ff03eea3684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62149-cwe-79-improper-neutralization-of-i-0aa0931e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62149%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=null&amp;id=69552525db813ff03eea3687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62095-cwe-79-improper-neutralization-of-i-620c571b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62095%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neilgee%20Bootstrap%20Modals&amp;severity=null&amp;id=69552525db813ff03eea367b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2-us-cybersecurity-experts-guilty-of-extortion-sch-fcbe7d20</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2%20US%20Cybersecurity%20Experts%20Guilty%20of%20Extortion%20Scheme%20for%20ALPHV%20Ransomware&amp;severity=medium&amp;id=69552512db813ff03eea350e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62096-cwe-79-improper-neutralization-of-i-2c423dda</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Maximum%20Products%20per%20User%20for%20WooCommerce&amp;severity=null&amp;id=69552525db813ff03eea367e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62097-cwe-79-improper-neutralization-of-i-e7a7ac0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62097%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seothemes%20SEO%20Slider&amp;severity=null&amp;id=69552525db813ff03eea3681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63020-cwe-79-improper-neutralization-of-i-b03d3db9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wayne%20Allen%20Postie&amp;severity=null&amp;id=69552526db813ff03eea368a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62111-cwe-79-improper-neutralization-of-i-b0a35392</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62111%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Extra%20Shortcodes&amp;severity=null&amp;id=69552191db813ff03ee950df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62118-cwe-79-improper-neutralization-of-i-5b4ec2dd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62118%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kcseopro%20AdWords%20Conversion%20Tracking%20Code&amp;severity=null&amp;id=69552191db813ff03ee950e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62990-cwe-79-improper-neutralization-of-i-e77fb9e5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62990%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Beaver%20Builder&amp;severity=null&amp;id=69552191db813ff03ee950ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62125-cwe-79-improper-neutralization-of-i-b57c70dc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62125%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anshul%20Gangrade%20Custom%20Background%20Changer&amp;severity=null&amp;id=69552191db813ff03ee950e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62743-cwe-79-improper-neutralization-of-i-4b12da5a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookTable%20Bookstore&amp;severity=null&amp;id=69552191db813ff03ee950e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62744-cwe-79-improper-neutralization-of-i-d9f25b5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Steman%20Page%20Title%20Splitter&amp;severity=null&amp;id=69552191db813ff03ee950eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62748-cwe-79-improper-neutralization-of-i-9317f75a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Genetech%20Products%20Web%20and%20WooCommerce%20Addons%20for%20WPBakery%20Builder&amp;severity=null&amp;id=69554136db813ff03eefd38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49358-cwe-79-improper-neutralization-of-i-abb87ade</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ruhul%20Amin%20Content%20Fetcher&amp;severity=null&amp;id=69554136db813ff03eefd38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62749-cwe-79-improper-neutralization-of-i-a3888bd5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bainternet%20User%20Specific%20Content&amp;severity=null&amp;id=69554136db813ff03eefd392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-supply-chain-attack-led-to-85-million-t-99716b1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20Supply%20Chain%20Attack%20Led%20to%20%248.5%20Million%20Trust%20Wallet%20Heist&amp;severity=low&amp;id=69551373db813ff03ee619cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62752-cwe-79-improper-neutralization-of-i-827f401c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kalender.digital%20Calendar.online%20%2F%20Kalender.digital&amp;severity=medium&amp;id=69551396db813ff03ee6224b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62135-cwe-79-improper-neutralization-of-i-00d7c0bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20landwire%20Responsive%20Block%20Control&amp;severity=null&amp;id=69551396db813ff03ee62248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62756-cwe-79-improper-neutralization-of-i-cfa6a678</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62756%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lvaudore%20The%20Moneytizer&amp;severity=null&amp;id=69551396db813ff03ee6224e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62757-cwe-79-improper-neutralization-of-i-347986b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62757%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebMan%20Design%20%7C%20Oliver%20Juhas%20WebMan%20Amplifier&amp;severity=null&amp;id=69551023db813ff03ee548e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62991-cwe-79-improper-neutralization-of-i-4f8e3893</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Minamaze&amp;severity=null&amp;id=69551023db813ff03ee548e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63032-cwe-79-improper-neutralization-of-i-54998eb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Consulting&amp;severity=null&amp;id=69551023db813ff03ee548ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disney-will-pay-10-million-to-settle-childrens-dat-837290e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disney%20will%20pay%20%2410%20million%20to%20settle%20children&apos;s%20data%20privacy%20lawsuit&amp;severity=high&amp;id=69550ffbdb813ff03ee545c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ibm-warns-of-critical-api-connect-auth-bypass-vuln-46286c5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IBM%20warns%20of%20critical%20API%20Connect%20auth%20bypass%20vulnerability&amp;severity=critical&amp;id=69550ffbdb813ff03ee545bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/30000-korean-air-employee-records-stolen-as-cl0p-l-6a12adba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=30%2C000%20Korean%20Air%20Employee%20Records%20Stolen%20as%20Cl0p%20Leaks%20450gb%20of%20Data%20Online&amp;severity=medium&amp;id=69550c77db813ff03ee3e18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-space-agency-confirms-breach-after-hacker-0604158e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Space%20Agency%20Confirms%20Breach%20After%20Hacker%20Offers%20to%20Sell%20Data&amp;severity=medium&amp;id=6954f04bdb813ff03edbd02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15389-cwe-78-improper-neutralization-of-s-06a6e83f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15389%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20QNO%20Technology%20VPN%20Firewall&amp;severity=high&amp;id=6954ecd6db813ff03edabf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-treasury-lifts-sanctions-on-three-individuals-l-b477d519</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Treasury%20Lifts%20Sanctions%20on%20Three%20Individuals%20Linked%20to%20Intellexa%20and%20Predator%20Spyware&amp;severity=high&amp;id=6954e94edb813ff03ed9a5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49028-cwe-352-cross-site-request-forgery--3021ae32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49028%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Zoho%20Mail%20Zoho%20ZeptoMail&amp;severity=null&amp;id=6954e963db813ff03ed9a74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15388-cwe-78-improper-neutralization-of-s-1b98deb7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15388%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20QNO%20Technology%20VPN%20Firewall&amp;severity=high&amp;id=6954e963db813ff03ed9a746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62136-cwe-79-improper-neutralization-of-i-0e16f771</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62136%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Melos&amp;severity=null&amp;id=6954e963db813ff03ed9a74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62992-cwe-352-cross-site-request-forgery--a39e955a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62992%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20everestthemes%20Everest%20Backup&amp;severity=null&amp;id=6954e963db813ff03ed9a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62137-cwe-79-improper-neutralization-of-i-569165d0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62137%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shuttlethemes%20Shuttle&amp;severity=null&amp;id=6955a05adb813ff03e045d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62758-cwe-79-improper-neutralization-of-i-103b1b40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62758%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Funnelforms%20Funnelforms%20Free&amp;severity=null&amp;id=6955a05adb813ff03e045dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62759-cwe-79-improper-neutralization-of-i-a4b646d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Justin%20Tadlock%20Series&amp;severity=null&amp;id=6955a05adb813ff03e045dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62760-cwe-79-improper-neutralization-of-i-cffb444d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20BuddyPress%20Activity%20Shortcode&amp;severity=null&amp;id=6955a05adb813ff03e045dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63000-cwe-79-improper-neutralization-of-i-e984071f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63000%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpforchurch%20Sermon%20Manager&amp;severity=null&amp;id=6955a05adb813ff03e045dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62146-cwe-79-improper-neutralization-of-i-72b6b7a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62146%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maksym%20Marko%20MX%20Time%20Zone%20Clocks&amp;severity=null&amp;id=6954e5cedb813ff03ed8c526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63005-cwe-79-improper-neutralization-of-i-a40c43d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63005%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tomas%20WordPress%20Tooltips&amp;severity=null&amp;id=6954e5cfdb813ff03ed8c52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62761-cwe-79-improper-neutralization-of-i-89d84afb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62761%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BasePress%20Knowledge%20Base%20documentation%20%26%20wiki%20plugin%20%E2%80%93%20BasePress&amp;severity=null&amp;id=6954e5cfdb813ff03ed8c529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15387-cwe-331-insufficient-entropy-in-qno-d5d780dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15387%3A%20CWE-331%20Insufficient%20Entropy%20in%20QNO%20Technology%20VPN%20Firewall&amp;severity=high&amp;id=6954e24adb813ff03ed79303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15017-cwe-489-active-debug-code-in-moxa-n-8edd86b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15017%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Moxa%20NPort%205000AI-M12%20Series&amp;severity=high&amp;id=6954d7bedb813ff03ed404d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2026-cwe-170-improper-null-termination-in-2185ebc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2026%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20Moxa%20NPort%206100-G2%2F6200-G2%20Series&amp;severity=high&amp;id=6954d43bdb813ff03ed2b252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1977-cwe-250-execution-with-unnecessary-p-8abad923</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1977%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20NPort%206100-G2%2F6200-G2%20Series&amp;severity=high&amp;id=6954d0b7db813ff03ed1d613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14783-cwe-640-weak-password-recovery-mech-3c628701</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14783%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=6954c62bdb813ff03ece1113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14434-cwe-862-missing-authorization-in-ul-57a94541</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14434%3A%20CWE-862%20Missing%20Authorization%20in%20Ultimate%20Post%20Kit%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6954bf22db813ff03ecb3d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13029-cwe-862-missing-authorization-in-kn-d68d7e05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13029%3A%20CWE-862%20Missing%20Authorization%20in%20Knowband%20Mobile%20App%20Builder&amp;severity=high&amp;id=6954bf22db813ff03ecb3d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49342-cwe-352-cross-site-request-forgery--98f229ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20merzedes%20Custom%20Style&amp;severity=null&amp;id=6954bb9edb813ff03eca28b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49353-cwe-352-cross-site-request-forgery--ca82064b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49353%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marcin%20Kijak%20Noindex%20by%20Path&amp;severity=null&amp;id=6954b81adb813ff03ec990bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68885-cwe-352-cross-site-request-forgery--a88909d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68885%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20page-carbajal%20Custom%20Post%20Status&amp;severity=null&amp;id=6954b81adb813ff03ec990c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49354-cwe-352-cross-site-request-forgery--6349a428</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49354%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mindstien%20Technologies%20Recent%20Posts%20From%20Each%20Category&amp;severity=null&amp;id=6954b81adb813ff03ec990c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49343-cwe-352-cross-site-request-forgery--3a693984</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20socialprofilr%20Social%20Profilr&amp;severity=null&amp;id=6954b81adb813ff03ec990c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49344-cwe-352-cross-site-request-forgery--7d3723af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20reneade%20SensitiveTagCloud&amp;severity=null&amp;id=6954b81adb813ff03ec990c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49345-cwe-352-cross-site-request-forgery--512892cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49345%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mg12%20WP-EasyArchives&amp;severity=null&amp;id=6954b496db813ff03ec88a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-treasury-lifts-sanctions-on-three-individuals-l-1386f087</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Treasury%20Lifts%20Sanctions%20on%20Three%20Individuals%20Linked%20to%20Intellexa%20and%20Predator%20Spyware&amp;severity=low&amp;id=6955a5badb813ff03e056252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15375-deserialization-in-eyoucms-252aafab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15375%3A%20Deserialization%20in%20EyouCMS&amp;severity=medium&amp;id=6954b113db813ff03ec76317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49346-cwe-352-cross-site-request-forgery--3e5e70f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49346%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20peterwsterling%20Simple%20Archive%20Generator&amp;severity=null&amp;id=69556460db813ff03ef78082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59137-cwe-352-cross-site-request-forgery--b5d86e7c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59137%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=null&amp;id=69556460db813ff03ef78085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15374-cross-site-scripting-in-eyoucms-25a6e41b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15374%3A%20Cross%20Site%20Scripting%20in%20EyouCMS&amp;severity=medium&amp;id=6955a05adb813ff03e045dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15373-server-side-request-forgery-in-eyou-f3bf806f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15373%3A%20Server-Side%20Request%20Forgery%20in%20EyouCMS&amp;severity=medium&amp;id=6954a302db813ff03ec15f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15223-cross-site-scripting-in-philipinho--e4573780</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15223%3A%20Cross%20Site%20Scripting%20in%20Philipinho%20Simple-PHP-Blog&amp;severity=medium&amp;id=69548debdb813ff03e97609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15372-cross-site-scripting-in-youlaitech--27a6541b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15372%3A%20Cross%20Site%20Scripting%20in%20youlaitech%20vue3-element-admin&amp;severity=medium&amp;id=69548debdb813ff03e9760a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68131-cwe-212-improper-removal-of-sensiti-44fcde2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68131%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20agronholm%20cbor2&amp;severity=medium&amp;id=6954835edb813ff03e856042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15371-hard-coded-credentials-in-tenda-i24-b8cfa17a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15371%3A%20Hard-coded%20Credentials%20in%20Tenda%20i24&amp;severity=high&amp;id=69547c56db813ff03e760a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11964-cwe-787-out-of-bounds-write-in-the--73861582</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11964%3A%20CWE-787%20Out-of-bounds%20Write%20in%20The%20Tcpdump%20Group%20libpcap&amp;severity=low&amp;id=69547c56db813ff03e760a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11961-cwe-126-buffer-over-read-in-the-tcp-6c702504</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11961%3A%20CWE-126%20Buffer%20Over-read%20in%20The%20Tcpdump%20Group%20libpcap&amp;severity=low&amp;id=69547c56db813ff03e760a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-31-9c886a19</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-31&amp;severity=medium&amp;id=6955bc30db813ff03e0aca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64699-na-f1e1679d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64699%3A%20n%2Fa&amp;severity=high&amp;id=6955483edb813ff03ef16426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61037-na-aa254d3a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61037%3A%20n%2Fa&amp;severity=high&amp;id=695544badb813ff03ef0a097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-errtraffic-service-enables-clickfix-attacks-vi-eb9c3eff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ErrTraffic%20service%20enables%20ClickFix%20attacks%20via%20fake%20browser%20glitches&amp;severity=high&amp;id=69546032db813ff03e4e3dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59131-cwe-352-cross-site-request-forgery--25075ae0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59131%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hoernerfranz%20WP-CalDav2ICS&amp;severity=null&amp;id=69545cb1db813ff03e4d2622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15114-exposure-of-file-descriptor-to-unin-a925b5ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15114%3A%20CWE-403%20Exposure%20of%20file%20descriptor%20to%20unintended%20control%20sphere%20(&apos;file%20descriptor%20leak&apos;)%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=critical&amp;id=6954592fdb813ff03e385603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15113-plaintext-storage-of-a-password-in--a52c6363</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15113%3A%20CWE-256%20Plaintext%20storage%20of%20a%20password%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=critical&amp;id=6954592edb813ff03e38559a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15112-url-redirection-to-untrusted-site-o-ef02bf18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15112%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=medium&amp;id=6954592edb813ff03e385594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15111-use-of-hard-coded-credentials-in-ks-0c8678d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15111%3A%20CWE-259%20Use%20of%20hard-coded%20password%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=critical&amp;id=6954592edb813ff03e38558e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58338-incorrect-privilege-assignment-in-a-f7694504</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58338%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ateme%20Flamingo%20XL&amp;severity=high&amp;id=6954592edb813ff03e385588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58337-missing-authorization-in-the-akuvox-a564647c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58337%3A%20Missing%20Authorization%20in%20The%20Akuvox%20Company%20Akuvox%20Smart%20Doorphone&amp;severity=high&amp;id=6954592edb813ff03e385582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58336-missing-authentication-for-critical-bebc812d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58336%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20The%20Akuvox%20Company%20Akuvox%20Smart%20Doorphone&amp;severity=high&amp;id=6954592edb813ff03e38557d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58315-unquoted-search-path-or-element-in--1de85834</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58315%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Tosibox%20Oy%20Tosibox%20Key%20Service&amp;severity=high&amp;id=6954592edb813ff03e385577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54327-missing-authorization-in-tinycontro-2d7878f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54327%3A%20Missing%20Authorization%20in%20Tinycontrol%20LAN%20Controller&amp;severity=critical&amp;id=6954592edb813ff03e385571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54163-improper-neutralization-of-special--5582e714</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54163%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NLB%20Banka%20AD%20Skopje%20NLB%20mKlik%20Makedonija&amp;severity=high&amp;id=6954592edb813ff03e38556a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53983-use-of-hard-coded-credentials-in-at-6648bf40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53983%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Ateme%20Anevia%20Flamingo%20XL%2FXS&amp;severity=critical&amp;id=6954592edb813ff03e385562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62753-cwe-98-improper-control-of-filename-8e384849</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62753%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20MadrasThemes%20MAS%20Videos&amp;severity=null&amp;id=695455a9db813ff03e324076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/csa-issues-alert-on-critical-smartermail-bug-allow-cc967373</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CSA%20Issues%20Alert%20on%20Critical%20SmarterMail%20Bug%20Allowing%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69545221db813ff03e2d7848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15360-unrestricted-upload-in-newbee-mall--699c458f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15360%3A%20Unrestricted%20Upload%20in%20newbee-mall-plus&amp;severity=medium&amp;id=695450a0db813ff03e2bda58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rmm-abuse-in-a-crypto-wallet-distribution-campaign-d22731d1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RMM%20Abuse%20in%20a%20Crypto%20Wallet%20Distribution%20Campaign&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61594-cwe-212-improper-removal-of-sensiti-3dd18d0c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61594%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ruby%20uri&amp;severity=low&amp;id=695450a0db813ff03e2bda74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15357-command-injection-in-d-link-di-7400-64a89479</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15357%3A%20Command%20Injection%20in%20D-Link%20DI-7400G%2B&amp;severity=medium&amp;id=695450a0db813ff03e2bda6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15356-buffer-overflow-in-tenda-ac20-636a2f51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15356%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=695450a0db813ff03e2bda65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15354-sql-injection-in-itsourcecode-socie-340a17be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15354%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=695450a0db813ff03e2bda5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15353-sql-injection-in-itsourcecode-socie-7dfac788</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15353%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=695450a1db813ff03e2be01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69210-cwe-79-improper-neutralization-of-i-1a9d8f07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69210%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=low&amp;id=695450a1db813ff03e2be029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69257-cwe-269-improper-privilege-manageme-c5fbd534</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69257%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20AsfhtgkDavid%20theshit&amp;severity=medium&amp;id=695450a2db813ff03e2be05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15264-server-side-request-forgery-in-feeh-0a3813c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15264%3A%20Server-Side%20Request%20Forgery%20in%20FeehiCMS&amp;severity=medium&amp;id=695450a2db813ff03e2be06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15263-sql-injection-in-biggidroid-simple--9e020cc4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15263%3A%20SQL%20Injection%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=695450a2db813ff03e2be067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cybersecurity-experts-plead-guilty-to-blackcat--106a8c26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20cybersecurity%20experts%20plead%20guilty%20to%20BlackCat%20ransomware%20attacks&amp;severity=high&amp;id=69544fcedb813ff03e2aff49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zoom-stealer-browser-extensions-harvest-corporate--24a26564</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zoom%20Stealer%20browser%20extensions%20harvest%20corporate%20meeting%20intelligence&amp;severity=high&amp;id=69544fcedb813ff03e2aff59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-space-agency-confirms-breach-of-external--64ace173</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Space%20Agency%20confirms%20breach%20of%20%22external%20servers%22&amp;severity=high&amp;id=69544fcedb813ff03e2aff3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15262-unrestricted-upload-in-biggidroid-s-197472c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15262%3A%20Unrestricted%20Upload%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=695450a2db813ff03e2be061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15258-open-redirect-in-edimax-br-6208ac-0c363eb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15258%3A%20Open%20Redirect%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=695450a4db813ff03e2be13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15257-command-injection-in-edimax-br-6208-05538cbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15257%3A%20Command%20Injection%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=695450a4db813ff03e2be150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emeditor-homepage-download-button-served-malware-f-8bb957e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EmEditor%20Homepage%20Download%20Button%20Served%20Malware%20for%204%20Days&amp;severity=medium&amp;id=69544fc0db813ff03e2ae6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52835-cwe-352-cross-site-request-forgery--2b72c46b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52835%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ConoHa%20by%20GMO%20WING%20WordPress%20Migrator&amp;severity=null&amp;id=695450a2db813ff03e2be072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66103-cwe-79-improper-neutralization-of-i-4b1cbf27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66103%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revmakx%20WPCal.io&amp;severity=null&amp;id=695450a2db813ff03e2be078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15256-command-injection-in-edimax-br-6208-5b03bee1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15256%3A%20Command%20Injection%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=695450a4db813ff03e2be132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/csa-issues-alert-on-critical-smartermail-bug-allow-6a5b9593</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CSA%20Issues%20Alert%20on%20Critical%20SmarterMail%20Bug%20Allowing%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69544e28b932a5a22ffaf4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62128-cwe-862-missing-authorization-in-si-428acc57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62128%3A%20Missing%20Authorization%20in%20SiteLock%20SiteLock%20Security%20%E2%80%93%20WP%20Hardening%2C%20Login%20Security%20%26%20Malware%20Scans&amp;severity=null&amp;id=695450a2db813ff03e2be075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62112-cwe-352-cross-site-request-forgery--0fc85d30</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62112%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Merv%20Barrett%20Import%20into%20Easy%20Property%20Listings&amp;severity=null&amp;id=695450a1db813ff03e2be038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66094-cwe-79-improper-neutralization-of-i-46c1141e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dmccan%20Yada%20Wiki&amp;severity=null&amp;id=695450a1db813ff03e2be03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62746-cwe-79-improper-neutralization-of-i-67d31b3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeFlavors%20Featured%20Video%20for%20WordPress%20%26%238211%3B%20VideographyWP&amp;severity=null&amp;id=695450a4db813ff03e2be15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66080-cwe-862-missing-authorization-in-wp-862fff27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66080%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=null&amp;id=695450a1db813ff03e2be03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63027-cwe-79-improper-neutralization-of-i-a7054129</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webcreations907%20WBC907%20Core&amp;severity=null&amp;id=695450a1db813ff03e2be032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15255-stack-based-buffer-overflow-in-tend-1583de47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15255%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W6-S&amp;severity=critical&amp;id=695450a4db813ff03e2be12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64190-cwe-79-improper-neutralization-of-i-81420c60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64190%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=null&amp;id=695450a1db813ff03e2be035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15254-os-command-injection-in-tenda-w6-s-41775fb0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15254%3A%20OS%20Command%20Injection%20in%20Tenda%20W6-S&amp;severity=medium&amp;id=695450aadb813ff03e2be6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeymyte-aka-mustang-panda-deploys-toneshell-back-964db2ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HoneyMyte%20(aka%20Mustang%20Panda)%20Deploys%20ToneShell%20Backdoor%20in%20New%20Attacks%20in%20South%20and%20East%20Asia&amp;severity=medium&amp;id=69544fcedb813ff03e2aff9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15253-stack-based-buffer-overflow-in-tend-640eb944</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15253%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450a8db813ff03e2be5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15252-stack-based-buffer-overflow-in-tend-4997a533</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15252%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450acdb813ff03e2bebb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15251-xml-external-entity-reference-in-be-6f953def</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15251%3A%20XML%20External%20Entity%20Reference%20in%20beecue%20FastBee&amp;severity=medium&amp;id=695450acdb813ff03e2bebc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15250-code-injection-in-08cms-novel-syste-a3583dc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15250%3A%20Code%20Injection%20in%2008CMS%20Novel%20System&amp;severity=medium&amp;id=695450acdb813ff03e2bebe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lithuanian-suspect-arrested-over-kmsauto-malware-t-cf50bf54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lithuanian%20suspect%20arrested%20over%20KMSAuto%20malware%20that%20infected%202.8M%20systems&amp;severity=medium&amp;id=69544fcedb813ff03e2affba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-ai-generated-images-to-get-refunds-schneier--5d3434fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20AI-Generated%20Images%20to%20Get%20Refunds%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=69544fcedb813ff03e2affbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15249-cross-site-scripting-in-zhujunliang-2e8fa958</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15249%3A%20Cross%20Site%20Scripting%20in%20zhujunliang3%20work_platform&amp;severity=medium&amp;id=695450acdb813ff03e2bebde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15248-cross-site-scripting-in-sunhailin12-c69da681</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15248%3A%20Cross%20Site%20Scripting%20in%20sunhailin12315%20product-review%20%E5%95%86%E5%93%81%E8%AF%84%E4%BB%B7%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=695450aedb813ff03e2bec41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54290-b533dfb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54290&amp;severity=null&amp;id=695450acdb813ff03e2bebf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14426-cwe-862-missing-authorization-in-wp-5b787ec7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14426%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=695450aedb813ff03e2bec24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54256-52aaefa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54256&amp;severity=null&amp;id=695450acdb813ff03e2bebf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54212-97d75d3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54212&amp;severity=null&amp;id=695450addb813ff03e2bec03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15247-heap-based-buffer-overflow-in-gmg13-4120c6a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15247%3A%20Heap-based%20Buffer%20Overflow%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=695450aedb813ff03e2bec3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emeditor-homepage-download-button-served-malware-f-c0e21a85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EmEditor%20Homepage%20Download%20Button%20Served%20Malware%20for%204%20Days&amp;severity=medium&amp;id=69544fcedb813ff03e2aff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15246-deserialization-in-aizuda-snail-job-fa75406e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15246%3A%20Deserialization%20in%20aizuda%20snail-job&amp;severity=medium&amp;id=695450aedb813ff03e2bec37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14509-cwe-94-improper-control-of-generati-132e9f08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20villatheme%20Lucky%20Wheel%20for%20WooCommerce%20%E2%80%93%20Spin%20a%20Sale&amp;severity=high&amp;id=695450aedb813ff03e2bec2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15245-path-traversal-in-d-link-dcs-850l-3cefefd3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15245%3A%20Path%20Traversal%20in%20D-Link%20DCS-850L&amp;severity=medium&amp;id=695450aedb813ff03e2bec30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69093-missing-authorization-in-wpdesk-sho-245812d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69093%3A%20Missing%20Authorization%20in%20wpdesk%20ShopMagic&amp;severity=medium&amp;id=695450b1db813ff03e2bedf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69092-improper-neutralization-of-input-du-bb113c2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=medium&amp;id=695450b1db813ff03e2bedf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69091-missing-authorization-in-kraft-plug-9ffa6e69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69091%3A%20Missing%20Authorization%20in%20Kraft%20Plugins%20Demo%20Importer%20Plus&amp;severity=medium&amp;id=695450b1db813ff03e2bedf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69089-improper-neutralization-of-input-du-d5f69fa3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69089%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20autolistings%20Auto%20Listings&amp;severity=medium&amp;id=695450b1db813ff03e2beded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69088-improper-neutralization-of-input-du-0e83a9a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vidish%20Combo%20Offers%20WooCommerce&amp;severity=medium&amp;id=695450b1db813ff03e2bedea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69034-improper-control-of-filename-for-in-8e0f4c1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69034%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Lekker&amp;severity=high&amp;id=695450b1db813ff03e2bede7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69033-improper-neutralization-of-input-du-ef201e11</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20A%20WP%20Life%20Blog%20Filter&amp;severity=medium&amp;id=695450b1db813ff03e2bede4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69032-authorization-bypass-through-user-c-2717c1c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69032%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20FiveStar&amp;severity=medium&amp;id=695450b0db813ff03e2bedd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69031-missing-authorization-in-skywarrior-dd6f718f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69031%3A%20Missing%20Authorization%20in%20Skywarrior%20Arcane&amp;severity=medium&amp;id=695450b0db813ff03e2bedcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69030-authorization-bypass-through-user-c-962b0239</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69030%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Backpack%20Traveler&amp;severity=medium&amp;id=695450b0db813ff03e2bedca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69029-authorization-bypass-through-user-c-6e658217</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69029%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Select-Themes%20Struktur&amp;severity=medium&amp;id=695450b0db813ff03e2bedc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69028-missing-authorization-in-boldgrid-w-28551582</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69028%3A%20Missing%20Authorization%20in%20BoldGrid%20weForms&amp;severity=medium&amp;id=695450b0db813ff03e2bedc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69027-missing-authorization-in-tychesoftw-6a6d812e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69027%3A%20Missing%20Authorization%20in%20tychesoftwares%20Product%20Delivery%20Date%20for%20WooCommerce%20%E2%80%93%20Lite&amp;severity=medium&amp;id=695450b0db813ff03e2bedc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69026-exposure-of-sensitive-system-inform-02a01682</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69026%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Roxnor%20PopupKit&amp;severity=medium&amp;id=695450b0db813ff03e2bedbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69025-exposure-of-sensitive-system-inform-c5da4af7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69025%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Aethonic%20Poptics&amp;severity=medium&amp;id=695450b0db813ff03e2bedbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69024-missing-authorization-in-bizswoop-b-ced31511</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69024%3A%20Missing%20Authorization%20in%20bizswoop%20BizPrint&amp;severity=medium&amp;id=695450b0db813ff03e2bedb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69023-missing-authorization-in-marketing--0592e86d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69023%3A%20Missing%20Authorization%20in%20Marketing%20Fire%20Discussion%20Board&amp;severity=medium&amp;id=695450b0db813ff03e2bedb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69022-missing-authorization-in-weblizar-w-f91a4c03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69022%3A%20Missing%20Authorization%20in%20Weblizar%20-%20WordPress%20Themes%20%26amp%3B%20Plugin%20HR%20Management%20Lite&amp;severity=medium&amp;id=695450afdb813ff03e2bec74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69021-cross-site-request-forgery-csrf-in--4c2a67c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69021%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Popup%20box&amp;severity=medium&amp;id=695450afdb813ff03e2bec71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69020-improper-neutralization-of-input-du-d3a1bf4f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tribulant%20Software%20Newsletters&amp;severity=medium&amp;id=695450acdb813ff03e2bebeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69018-improper-neutralization-of-input-du-e90cd5b4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shamalli%20Web%20Directory%20Free&amp;severity=medium&amp;id=695450acdb813ff03e2bebc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69017-improper-neutralization-of-input-du-6a8f1e84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69017%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Magnigenie%20RestroPress&amp;severity=medium&amp;id=695450acdb813ff03e2bebdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69016-missing-authorization-in-averta-sho-b64e0b83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69016%3A%20Missing%20Authorization%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=695450acdb813ff03e2bebd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69015-missing-authorization-in-automattic-1f78b122</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69015%3A%20Missing%20Authorization%20in%20Automattic%20Crowdsignal%20Forms&amp;severity=low&amp;id=695450acdb813ff03e2bebcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69013-missing-authorization-in-jetmonster-cb458efb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69013%3A%20Missing%20Authorization%20in%20jetmonsters%20Stratum&amp;severity=medium&amp;id=695450addb813ff03e2bec0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69012-missing-authorization-in-stephen-ha-16dff902</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69012%3A%20Missing%20Authorization%20in%20Stephen%20Harris%20Event%20Organiser&amp;severity=medium&amp;id=695450acdb813ff03e2bebe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69010-missing-authorization-in-themebeez--a3c01909</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69010%3A%20Missing%20Authorization%20in%20themebeez%20Themebeez%20Toolkit&amp;severity=medium&amp;id=695450addb813ff03e2bec00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69009-missing-authorization-in-kamleshyad-69c0c703</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69009%3A%20Missing%20Authorization%20in%20kamleshyadav%20Medicalequipment&amp;severity=medium&amp;id=695450addb813ff03e2bec08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69008-improper-neutralization-of-input-du-143372f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Inboxify%20Inboxify%20Sign%20Up%20Form&amp;severity=medium&amp;id=695450addb813ff03e2bec05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69007-improper-neutralization-of-input-du-ffab4867</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69007%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Popping%20Sidebars%20and%20Widgets%20Light&amp;severity=medium&amp;id=695450acdb813ff03e2beba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69006-improper-neutralization-of-input-du-b6aa829a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atte%20Moisio%20AM%20Events&amp;severity=medium&amp;id=695450acdb813ff03e2bebbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68998-cross-site-request-forgery-csrf-in--452db036</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68998%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Heateor%20Support%20Heateor%20Social%20Login&amp;severity=medium&amp;id=695450acdb813ff03e2beb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68997-authorization-bypass-through-user-c-30f73078</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68997%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20AdvancedCoding%20wpDiscuz&amp;severity=medium&amp;id=695450abdb813ff03e2beb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68996-improper-control-of-filename-for-in-e0f709c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68996%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=high&amp;id=695450abdb813ff03e2beb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68995-missing-authorization-in-gal-dubins-ae0190c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68995%3A%20Missing%20Authorization%20in%20Premio%20My%20Sticky%20Elements&amp;severity=medium&amp;id=695450aadb813ff03e2be6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68994-missing-authorization-in-xforwoocom-c40b8f2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68994%3A%20Missing%20Authorization%20in%20XforWooCommerce%20Product%20Loops%20for%20WooCommerce&amp;severity=medium&amp;id=695450a9db813ff03e2be64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68993-missing-authorization-in-xforwoocom-e57b2278</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68993%3A%20Missing%20Authorization%20in%20XforWooCommerce%20Share%2C%20Print%20and%20PDF%20Products%20for%20WooCommerce&amp;severity=medium&amp;id=695450a9db813ff03e2be641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68992-improper-neutralization-of-input-du-6b4cfd8c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xenioushk%20BWL%20Knowledge%20Base%20Manager&amp;severity=medium&amp;id=695450a9db813ff03e2be63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68991-improper-neutralization-of-input-du-44839d6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xenioushk%20BWL%20Pro%20Voting%20Manager&amp;severity=medium&amp;id=695450a1db813ff03e2be026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68990-improper-neutralization-of-special--b3c6bf13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68990%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xenioushk%20BWL%20Pro%20Voting%20Manager&amp;severity=critical&amp;id=695450a0db813ff03e2bda55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68989-insertion-of-sensitive-information--8d7b877b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68989%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Renzo%20Johnson%20contact-form-7-mailchimp-extension&amp;severity=high&amp;id=695450a0db813ff03e2bda52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68988-exposure-of-sensitive-system-inform-432d43b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68988%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20o2oe%20E-Invoice%20App%20Malaysia&amp;severity=high&amp;id=695450a0db813ff03e2bda4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68987-improper-control-of-filename-for-in-07595cba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68987%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Cinerama&amp;severity=critical&amp;id=695450a0db813ff03e2bda4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68985-improper-control-of-filename-for-in-34ad655a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68985%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Aora&amp;severity=critical&amp;id=695450afdb813ff03e2bec6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68984-improper-control-of-filename-for-in-e7167b64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68984%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Puca&amp;severity=critical&amp;id=695450afdb813ff03e2bec6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68983-improper-control-of-filename-for-in-08a0e879</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68983%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Greenmart&amp;severity=critical&amp;id=695450afdb813ff03e2bec68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68982-missing-authorization-in-designthem-6304d88c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68982%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20LMS%20Addon&amp;severity=high&amp;id=695450afdb813ff03e2bec65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68981-missing-authorization-in-designthem-ed8824ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68981%3A%20Missing%20Authorization%20in%20designthemes%20HomeFix%20Elementor%20Portfolio&amp;severity=high&amp;id=695450afdb813ff03e2bec62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68980-missing-authorization-in-designthem-3030acad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68980%3A%20Missing%20Authorization%20in%20designthemes%20WeDesignTech%20Portfolio&amp;severity=high&amp;id=695450afdb813ff03e2bec5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68979-authorization-bypass-through-user-c-84e8b0f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68979%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SimpleCalendar%20Google%20Calendar%20Events&amp;severity=high&amp;id=695450afdb813ff03e2bec5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68978-improper-neutralization-of-input-du-f51a4c5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Core&amp;severity=medium&amp;id=695450a8db813ff03e2be601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68977-improper-neutralization-of-input-du-d2b76d73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68977%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Portfolio%20Addon&amp;severity=medium&amp;id=695450a8db813ff03e2be5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68976-missing-authorization-in-eagle-them-fc580b29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68976%3A%20Missing%20Authorization%20in%20Eagle-Themes%20Eagle%20Booking&amp;severity=high&amp;id=695450afdb813ff03e2bec59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68975-authorization-bypass-through-user-c-aa7835f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68975%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Eagle-Themes%20Eagle%20Booking&amp;severity=high&amp;id=695450aedb813ff03e2bec4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68974-improper-control-of-filename-for-in-f15e34c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68974%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20miniOrange%20WordPress%20Social%20Login%20and%20Register&amp;severity=critical&amp;id=695450aedb813ff03e2bec49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-targets-indian-users-with-tax-themed-em-52559c67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Targets%20Indian%20Users%20With%20Tax-Themed%20Emails%20Delivering%20ValleyRAT%20Malware&amp;severity=medium&amp;id=69544e28b932a5a22ffaf4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15244-race-condition-in-phpems-0f365c23</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15244%3A%20Race%20Condition%20in%20PHPEMS&amp;severity=medium&amp;id=695450a6db813ff03e2be31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-mustang-panda-caught-using-kernel-mode-09a5fa0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Mustang%20Panda%20Caught%20Using%20Kernel-Mode%20Rootkit&amp;severity=medium&amp;id=69544f40db813ff03e2a1839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-to-split-117-billion-among-337-million-dat-549885c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20to%20split%20%241.17%20billion%20among%2033.7%20million%20data%20breach%20victims&amp;severity=high&amp;id=69544fcedb813ff03e2aff39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-uses-signed-kernel-mode-rootkit-to-l-795f651d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Uses%20Signed%20Kernel-Mode%20Rootkit%20to%20Load%20TONESHELL%20Backdoor&amp;severity=high&amp;id=69544fcedb813ff03e2aff45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15243-sql-injection-in-code-projects-simp-c1a47f83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15243%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15242-race-condition-in-phpems-c450a593</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15242%3A%20Race%20Condition%20in%20PHPEMS&amp;severity=low&amp;id=695450a6db813ff03e2be310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15359-cwe-787-out-of-bounds-write-in-delt-fb40b2a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15359%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=critical&amp;id=695450a8db813ff03e2be60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15358-cwe-20-improper-input-validation-in-35bfe4f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15358%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=high&amp;id=695450a8db813ff03e2be60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15241-open-redirect-in-cloudpanel-communi-ce6222c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15241%3A%20Open%20Redirect%20in%20CloudPanel%20Community%20Edition&amp;severity=medium&amp;id=695450acdb813ff03e2bebac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15103-cwe-200-exposure-of-sensitive-infor-f235f3c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15103%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=high&amp;id=695450a5db813ff03e2be182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/korean-air-data-compromised-in-oracle-ebs-hack-b93ec7b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Korean%20Air%20Data%20Compromised%20in%20Oracle%20EBS%20Hack&amp;severity=medium&amp;id=69544f40db813ff03e2a183c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15102-cwe-288-authentication-bypass-using-8ef45d07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15102%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=critical&amp;id=695450a5db813ff03e2be17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-uses-signed-kernel-mode-rootkit-to-l-32bee55b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Uses%20Signed%20Kernel-Mode%20Rootkit%20to%20Load%20TONESHELL%20Backdoor&amp;severity=medium&amp;id=69544e28b932a5a22ffaf4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15234-heap-based-buffer-overflow-in-tenda-5ac9b0ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15234%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450acdb813ff03e2beba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15233-heap-based-buffer-overflow-in-tenda-ae002c8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15233%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15355-cwe-79-improper-neutralization-of-i-418490c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NetVision%20Information%20ISOinsight&amp;severity=medium&amp;id=695450a8db813ff03e2be5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15232-stack-based-buffer-overflow-in-tend-b36a6e32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15232%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15231-stack-based-buffer-overflow-in-tend-c0b871dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15231%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15230-heap-based-buffer-overflow-in-tenda-5c1e8035</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15230%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15229-denial-of-service-in-tenda-ch22-0b25f925</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15229%3A%20Denial%20of%20Service%20in%20Tenda%20CH22&amp;severity=medium&amp;id=695450abdb813ff03e2beb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14313-cwe-79-cross-site-scripting-xss-in--9f819fdc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14313%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Advance%20WP%20Query%20Search%20Filter&amp;severity=medium&amp;id=695450a5db813ff03e2be17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14312-cwe-79-cross-site-scripting-xss-in--6c65ee47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14312%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Advance%20WP%20Query%20Search%20Filter&amp;severity=medium&amp;id=695450a5db813ff03e2be179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15222-deserialization-in-dromara-sa-token-a440b332</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15222%3A%20Deserialization%20in%20Dromara%20Sa-Token&amp;severity=low&amp;id=695450abdb813ff03e2beb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15221-cross-site-scripting-in-sohutv-cach-13804611</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15221%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450abdb813ff03e2beb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15220-cross-site-scripting-in-sohutv-cach-a48f490c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15220%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450aadb813ff03e2be6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15219-cross-site-scripting-in-sohutv-cach-14e7d34c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15219%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450aadb813ff03e2be68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15218-buffer-overflow-in-tenda-ac10u-87b4a6f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15218%3A%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=high&amp;id=695450aadb813ff03e2be686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15217-buffer-overflow-in-tenda-ac23-50b71d11</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15217%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=695450a3db813ff03e2be0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15216-stack-based-buffer-overflow-in-tend-395bed09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15216%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=695450a3db813ff03e2be0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15215-buffer-overflow-in-tenda-ac10u-d075e045</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15215%3A%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=high&amp;id=695450a3db813ff03e2be0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15214-cross-site-scripting-in-campcodes-p-4bd60176</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15214%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Park%20Ticketing%20System&amp;severity=medium&amp;id=695450a3db813ff03e2be0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69235-cwe-346-origin-validation-error-in--00523337</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69235%3A%20CWE-346%20Origin%20Validation%20Error%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=695450b1db813ff03e2bee02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69234-cwe-358-improperly-implemented-secu-2cc1a01e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69234%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=critical&amp;id=695450b1db813ff03e2bedff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15213-improper-authorization-in-code-proj-8d33b8d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15213%3A%20Improper%20Authorization%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=695450a3db813ff03e2be0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15212-sql-injection-in-code-projects-refu-3df67c64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15212%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a2db813ff03e2be086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15211-sql-injection-in-code-projects-refu-a7f2d1b7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15211%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a2db813ff03e2be07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-30-542a9515</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-30&amp;severity=medium&amp;id=69546ab0db813ff03e51b650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61557-na-94a333ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61557%3A%20n%2Fa&amp;severity=high&amp;id=695450a5db813ff03e2be16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65925-na-700ef966</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65925%3A%20n%2Fa&amp;severity=medium&amp;id=695450a4db813ff03e2be15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66848-na-ba4b5e0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66848%3A%20n%2Fa&amp;severity=critical&amp;id=695450a4db813ff03e2be156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65411-na-0940d80d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65411%3A%20n%2Fa&amp;severity=high&amp;id=695450a4db813ff03e2be149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65409-na-b108bdfd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65409%3A%20n%2Fa&amp;severity=high&amp;id=695450a4db813ff03e2be143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56332-na-94ea4996</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56332%3A%20n%2Fa&amp;severity=critical&amp;id=695450a4db813ff03e2be139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66835-na-146f76ea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66835%3A%20n%2Fa&amp;severity=high&amp;id=695450a3db813ff03e2be0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66834-na-a05c6e52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66834%3A%20n%2Fa&amp;severity=high&amp;id=695450a3db813ff03e2be0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66824-na-df333349</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66824%3A%20n%2Fa&amp;severity=high&amp;id=695450a2db813ff03e2be07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66823-na-d62a6660</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66823%3A%20n%2Fa&amp;severity=low&amp;id=695450a1db813ff03e2be02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50343-na-f7003477</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50343%3A%20n%2Fa&amp;severity=critical&amp;id=695450a1db813ff03e2be01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66723-na-222b3b68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66723%3A%20n%2Fa&amp;severity=high&amp;id=695450a0db813ff03e2bda7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23554-cwe-79-improper-neutralization-of-i-7ab66fc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jakub%20Glos%20Off%20Page%20SEO&amp;severity=null&amp;id=695450a3db813ff03e2be0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23550-cwe-79-improper-neutralization-of-i-4a910a83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kemal%20YAZICI%20Product%20Puller&amp;severity=null&amp;id=695450a8db813ff03e2be5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23458-cwe-79-improper-neutralization-of-i-9a61ff8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23458%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rakessh%20Ads24%20Lite&amp;severity=null&amp;id=695450a9db813ff03e2be632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15210-sql-injection-in-code-projects-refu-c5c1893c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15210%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68036-cwe-862-missing-authorization-in-em-42123364</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68036%3A%20Missing%20Authorization%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=null&amp;id=695450a9db813ff03e2be635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68040-cwe-201-insertion-of-sensitive-info-3b015c56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68040%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20weDevs%20WP%20Project%20Manager&amp;severity=null&amp;id=695450a9db813ff03e2be638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41656-cwe-862-missing-authorization-in-wp-cb9f755d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41656%3A%20CWE-862%20Missing%20Authorization%20in%20wpdive%20Better%20Elementor%20Addons&amp;severity=medium&amp;id=695450a8db813ff03e2be607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32238-vulnerability-in-codexthemes-thegem-0dfe05ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32238%3A%20Vulnerability%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=medium&amp;id=695450a8db813ff03e2be604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68498-cwe-862-missing-authorization-in-cr-923ab839</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68498%3A%20Missing%20Authorization%20in%20Crocoblock%20JetTabs&amp;severity=null&amp;id=695450a3db813ff03e2be0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68499-cwe-79-improper-neutralization-of-i-466523d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68499%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTabs&amp;severity=null&amp;id=695450a3db813ff03e2be0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15209-sql-injection-in-code-projects-refu-598967f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15209%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15284-cwe-20-improper-input-validation-4da53598</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15284%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=medium&amp;id=695450a8db813ff03e2be5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15208-sql-injection-in-code-projects-refu-6af596e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15208%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15207-sql-injection-in-campcodes-supplier-faa2b8d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15207%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-arrested-for-kmsauto-malware-campaign-with--c732ded7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20arrested%20for%20KMSAuto%20malware%20campaign%20with%202.8%20million%20downloads&amp;severity=high&amp;id=69544fcedb813ff03e2aff4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15206-sql-injection-in-campcodes-supplier-1ca0c63d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15206%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68502-cwe-639-authorization-bypass-throug-9d688c8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68502%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Crocoblock%20JetPopup&amp;severity=null&amp;id=695450b1db813ff03e2bee29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68503-cwe-862-missing-authorization-in-cr-f178da74</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68503%3A%20Missing%20Authorization%20in%20Crocoblock%20JetBlog&amp;severity=null&amp;id=695450b1db813ff03e2bee2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68504-cwe-79-improper-neutralization-of-i-502470b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68504%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=null&amp;id=695450a9db813ff03e2be63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68562-cwe-434-unrestricted-upload-of-file-d9646de3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68562%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RomanCode%20MapSVG&amp;severity=critical&amp;id=695450a9db813ff03e2be648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68607-cwe-79-improper-neutralization-of-i-6391990a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hiroaki%20Miyashita%20Custom%20Field%20Template&amp;severity=null&amp;id=695450a9db813ff03e2be64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15205-sql-injection-in-code-projects-stud-12baf67d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15205%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69205-cwe-20-improper-input-validation-in-ab71e66d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69205%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20olell%20uURU&amp;severity=medium&amp;id=695450a9db813ff03e2be682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-google-themed-phishing-wave-hits-over-3000-glo-ffcbfdd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Google-Themed%20Phishing%20Wave%20Hits%20Over%203%2C000%20Global%20Organisations&amp;severity=medium&amp;id=69544fcedb813ff03e2affc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15204-cross-site-scripting-in-sohutv-cach-9638f1e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15204%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450a6db813ff03e2be2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-coinbase-support-agent-arrested-for-helping-8ff81d84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20Coinbase%20support%20agent%20arrested%20for%20helping%20hackers&amp;severity=high&amp;id=69544fcedb813ff03e2aff85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romanian-energy-provider-hit-by-gentlemen-ransomwa-c2363cda</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Romanian%20energy%20provider%20hit%20by%20Gentlemen%20ransomware%20attack&amp;severity=high&amp;id=69544fcedb813ff03e2aff79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-real-world-attacks-behind-owasp-agentic-ai-top-35869202</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Real-World%20Attacks%20Behind%20OWASP%20Agentic%20AI%20Top%2010&amp;severity=high&amp;id=69544fcedb813ff03e2aff7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-says-2596-wallets-drained-in-7-millio-ce38881d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20says%202%2C596%20wallets%20drained%20in%20%247%20million%20crypto%20theft%20attack&amp;severity=high&amp;id=69544fcedb813ff03e2aff89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15203-cross-site-scripting-in-sohutv-cach-ad9b3972</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15203%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450a5db813ff03e2be191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-weaponizes-react2shell-c9839964</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDoX%20Botnet%20Weaponizes%20React2Shell&amp;severity=medium&amp;id=69544fc0db813ff03e2ae6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15202-cross-site-scripting-in-sohutv-cach-760b5f7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15202%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450a5db813ff03e2be18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14175-cwe-327-use-of-a-broken-or-risky-cr-3e822f3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14175%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20TP-Link%20Systems%20Inc.%20TL-WR820N%20v2.8&amp;severity=medium&amp;id=695450b2db813ff03e2bee67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69202-cwe-524-use-of-cache-containing-sen-cb7532b9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69202%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20arthurfiorette%20axios-cache-interceptor&amp;severity=medium&amp;id=695450b2db813ff03e2bee73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ubisoft-shuts-down-rainbow-six-siege-after-mongodb-a2d6874d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ubisoft%20Shuts%20Down%20Rainbow%20Six%20Siege%20After%20MongoDB%20Exploit%20Hits%20Players&amp;severity=high&amp;id=69544fcedb813ff03e2aff91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68431-cwe-125-out-of-bounds-read-in-struk-83ef3f16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68431%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=695450b3db813ff03e2beea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14728-cwe-22-improper-limitation-of-a-pat-4ee27fb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14728%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Rapid7%20Velociraptor&amp;severity=medium&amp;id=695450b2db813ff03e2bee77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15201-cross-site-scripting-in-sohutv-cach-4944a10c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15201%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b3db813ff03e2beea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15200-cross-site-scripting-in-sohutv-cach-2269a032</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15200%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b3db813ff03e2beec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/39c3-multiple-vulnerabilities-in-gnupg-and-other-c-540768d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=39C3%3A%20Multiple%20vulnerabilities%20in%20GnuPG%20and%20other%20cryptographic%20tools&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13592-cwe-94-improper-control-of-generati-e6077c8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13592%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=high&amp;id=695450b3db813ff03e2beed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14280-cwe-200-exposure-of-sensitive-infor-1f1fb677</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14280%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pixelyoursite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20%26%20API%20Manager&amp;severity=medium&amp;id=695450b3db813ff03e2beed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15199-unrestricted-upload-in-code-project-d4553a3d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15199%3A%20Unrestricted%20Upload%20in%20code-projects%20College%20Notes%20Uploading%20System&amp;severity=medium&amp;id=695450b4db813ff03e2beeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15198-sql-injection-in-code-projects-coll-58efda3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15198%3A%20SQL%20Injection%20in%20code-projects%20College%20Notes%20Uploading%20System&amp;severity=medium&amp;id=695450b4db813ff03e2bef01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55064-cwe-79-improper-neutralization-of-i-08596a2b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b3db813ff03e2beec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68861-missing-authorization-in-pluginopti-bf994e6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68861%3A%20Missing%20Authorization%20in%20pluginoptimizer%20Plugin%20Optimizer&amp;severity=null&amp;id=69cd7410e6bfc5ba1def5041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55063-cwe-79-improper-neutralization-of-i-93a6281a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b5db813ff03e2bf26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55062-cwe-79-improper-neutralization-of-i-30f4a759</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b5db813ff03e2bf267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55061-cwe-434-unrestricted-upload-of-file-dd277146</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55061%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Priority%20Web&amp;severity=high&amp;id=695450b4db813ff03e2bef0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55060-cwe-601-url-redirection-to-untruste-e503720d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55060%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b4db813ff03e2bef08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15197-unrestricted-upload-in-code-project-119f10f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15197%3A%20Unrestricted%20Upload%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=695450a5db813ff03e2be185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15196-sql-injection-in-code-projects-asse-b75c9933</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15196%3A%20SQL%20Injection%20in%20code-projects%20Assessment%20Management&amp;severity=medium&amp;id=695450b6db813ff03e2bf328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53627-cwe-1287-improper-validation-of-spe-ec2a415c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53627%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20meshtastic%20firmware&amp;severity=medium&amp;id=695450b7db813ff03e2bf33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68868-cwe-79-improper-neutralization-of-i-414a7aac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68868%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeaffairs%20Wp%20Text%20Slider%20Widget&amp;severity=null&amp;id=695450b7db813ff03e2bf354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68870-cwe-98-improper-control-of-filename-578ac616</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68870%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20reDim%20GmbH%20CookieHint%20WP&amp;severity=null&amp;id=695450b7db813ff03e2bf357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68876-cwe-79-improper-neutralization-of-i-f269bdcb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68876%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20INVELITY%20Invelity%20SPS%20connect&amp;severity=null&amp;id=695450b7db813ff03e2bf35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68877-cwe-98-improper-control-of-filename-9550df20</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68877%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cedcommerce%20CedCommerce%20Integration%20for%20Good%20Market&amp;severity=null&amp;id=695450b7db813ff03e2bf35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15195-sql-injection-in-code-projects-asse-121e9194</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15195%3A%20SQL%20Injection%20in%20code-projects%20Assessment%20Management&amp;severity=medium&amp;id=695450b6db813ff03e2bf321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69211-cwe-367-time-of-check-time-of-use-t-f2c6d84c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69211%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20nestjs%20nest&amp;severity=medium&amp;id=695450b7db813ff03e2bf37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68878-cwe-79-improper-neutralization-of-i-bda943d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasadkirpekar%20Advanced%20Custom%20CSS&amp;severity=null&amp;id=695450b7db813ff03e2bf369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68879-cwe-79-improper-neutralization-of-i-2ecc13fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68879%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20councilsoft%20Content%20Grid%20Slider&amp;severity=null&amp;id=695450b7db813ff03e2bf36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68893-cwe-918-server-side-request-forgery-8b0da527</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68893%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HETWORKS%20WordPress%20Image%20shrinker&amp;severity=null&amp;id=695450b7db813ff03e2bf36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68897-cwe-94-improper-control-of-generati-6ce7a238</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68897%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Mohammad%20I.%20Okfie%20IF%20AS%20Shortcode&amp;severity=null&amp;id=695450b7db813ff03e2bf372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69206-cwe-918-server-side-request-forgery-a8c5bb90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69206%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HemmeligOrg%20Hemmelig.app&amp;severity=medium&amp;id=695450b7db813ff03e2bf37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69201-cwe-77-improper-neutralization-of-s-d081ac76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69201%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Quenary%20tugtainer&amp;severity=high&amp;id=695450b7db813ff03e2bf375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/top-us-accounting-firm-sax-discloses-2024-data-bre-dd3e692a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Top%20US%20Accounting%20Firm%20Sax%20Discloses%202024%20Data%20Breach%20Impacting%20220%2C000&amp;severity=medium&amp;id=69544f40db813ff03e2a183f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15194-stack-based-buffer-overflow-in-d-li-10140e0b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15194%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-600&amp;severity=critical&amp;id=695450badb813ff03e2bf7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69200-cwe-202-exposure-of-sensitive-infor-b5056c34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69200%3A%20CWE-202%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=695450badb813ff03e2bf7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68951-cwe-79-improper-neutralization-of-i-a89c9033</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68951%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=695450badb813ff03e2bf7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/korean-air-data-breach-exposes-data-of-thousands-o-d5f4c954</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Korean%20Air%20data%20breach%20exposes%20data%20of%20thousands%20of%20employees&amp;severity=high&amp;id=69544fcedb813ff03e2aff41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68928-cwe-79-improper-neutralization-of-i-be3c3552</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68928%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20crm&amp;severity=medium&amp;id=695450badb813ff03e2bf7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15193-buffer-overflow-in-d-link-dwr-m920-6e780a45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15193%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=695450badb813ff03e2bf7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15192-command-injection-in-d-link-dwr-m92-a595c141</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15192%3A%20Command%20Injection%20in%20D-Link%20DWR-M920&amp;severity=medium&amp;id=695450badb813ff03e2bf7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15191-command-injection-in-d-link-dwr-m92-ee55654f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15191%3A%20Command%20Injection%20in%20D-Link%20DWR-M920&amp;severity=medium&amp;id=695450bddb813ff03e2bf8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-mongodb-attacks-wallet-breaches-andro-2db72cca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20MongoDB%20Attacks%2C%20Wallet%20Breaches%2C%20Android%20Spyware%2C%20Insider%20Crime%20%26%20More&amp;severity=medium&amp;id=69544e28b932a5a22ffaf4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15190-stack-based-buffer-overflow-in-d-li-da06f287</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15190%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=695450bddb813ff03e2bf8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-honeymyte-apt-now-protects-malware-with-a-kern-5ec6fd5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20HoneyMyte%20APT%20now%20protects%20malware%20with%20a%20kernel-mode%20rootkit&amp;severity=medium&amp;id=69544fc0db813ff03e2ae70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15189-buffer-overflow-in-d-link-dwr-m920-7a378f33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15189%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=695450bfdb813ff03e2bfc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-new-attacks-exploiting-old-vulne-d488c40a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20New%20Attacks%20Exploiting%20Old%20Vulnerability&amp;severity=low&amp;id=69544f40db813ff03e2a1842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-0day-flaw-exposes-70000-xspeeder-devices--01b167b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%200day%20flaw%20Exposes%2070%2C000%20XSpeeder%20Devices%20as%20Vendor%20Ignores%20Alert&amp;severity=critical&amp;id=69544fcedb813ff03e2aff95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15188-cross-site-scripting-in-campcodes-c-570b8b1a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15188%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=695450bfdb813ff03e2bfc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-to-issue-117-billion-in-vouchers-over-data-c5fbfb04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20to%20Issue%20%241.17%20Billion%20in%20Vouchers%20Over%20Data%20Breach&amp;severity=medium&amp;id=69544f40db813ff03e2a1845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15187-path-traversal-in-greencms-9e09e525</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15187%3A%20Path%20Traversal%20in%20GreenCMS&amp;severity=medium&amp;id=695450bfdb813ff03e2bfc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/22-million-affected-by-aflac-data-breach-55789947</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=22%20Million%20Affected%20by%20Aflac%20Data%20Breach&amp;severity=medium&amp;id=69544f40db813ff03e2a1848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/29th-december-threat-intelligence-report-8cbd6ec9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=29th%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69545139db813ff03e2c9ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15186-sql-injection-in-code-projects-refu-142c5dc1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15186%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bfdb813ff03e2bfc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-malware-delivered-in-emeditor-supply-c-5c095a8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20Malware%20Delivered%20in%20EmEditor%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69544f40db813ff03e2a184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15185-sql-injection-in-code-projects-refu-4eb02a05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15185%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bedb813ff03e2bf91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15184-sql-injection-in-code-projects-refu-ede4d722</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15184%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bedb813ff03e2bf915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15183-sql-injection-in-code-projects-refu-c9938682</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15183%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bedb813ff03e2bf90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-mongodb-vulnerability-exploited-in-attacks-a0ef0da8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20MongoDB%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=high&amp;id=69544f40db813ff03e2a184e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-panda-cyberespionage-campaign-uses-dns-poi-ec875179</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Panda%20cyberespionage%20campaign%20uses%20DNS%20poisoning%20to%20install%20MgBot%20backdoor&amp;severity=medium&amp;id=69544fcedb813ff03e2affb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mongodb-vulnerability-cve-2025-14847-under-active--8b9d09d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MongoDB%20Vulnerability%20CVE-2025-14847%20Under%20Active%20Exploitation%20Worldwide&amp;severity=low&amp;id=69544e28b932a5a22ffaf4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/27-malicious-npm-packages-used-as-phishing-infrast-76290b65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=27%20Malicious%20npm%20Packages%20Used%20as%20Phishing%20Infrastructure%20to%20Steal%20Login%20Credentials&amp;severity=critical&amp;id=69544e28b932a5a22ffaf4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15182-sql-injection-in-code-projects-refu-cc3dcc9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15182%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450b9db813ff03e2bf6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-theft-of-40-million-cond-nast-record-ae43a788</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Claims%20Theft%20of%2040%20Million%20Cond%C3%A9%20Nast%20Records%20After%20Wired%20Data%20Leak&amp;severity=medium&amp;id=69544f40db813ff03e2a1851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15181-sql-injection-in-code-projects-refu-97e56528</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15181%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450b8db813ff03e2bf3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15180-stack-based-buffer-overflow-in-tend-d6da6130</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15180%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b8db813ff03e2bf3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15179-stack-based-buffer-overflow-in-tend-68f9f5c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15179%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b8db813ff03e2bf3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15178-stack-based-buffer-overflow-in-tend-7a395b86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15178%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b8db813ff03e2bf3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15228-cwe-434-unrestricted-upload-of-file-86c9ba3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15228%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WELLTEND%20TECHNOLOGY%20BPMFlowWebkit&amp;severity=critical&amp;id=695450b9db813ff03e2bf6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15227-cwe-36-absolute-path-traversal-in-w-e51ca937</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15227%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20WELLTEND%20TECHNOLOGY%20BPMFlowWebkit&amp;severity=high&amp;id=695450bedb813ff03e2bf8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15177-stack-based-buffer-overflow-in-tend-44e19e2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15177%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450bddb813ff03e2bf8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15226-cwe-434-unrestricted-upload-of-file-b4fdff47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15226%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Sunnet%20WMPro&amp;severity=critical&amp;id=695450bedb813ff03e2bf8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/traditional-security-frameworks-leave-organization-388f8038</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Traditional%20Security%20Frameworks%20Leave%20Organizations%20Exposed%20to%20AI-Specific%20Attack%20Vectors&amp;severity=low&amp;id=69544e28b932a5a22ffaf4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15176-reachable-assertion-in-open5gs-09c73495</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15176%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=695450bddb813ff03e2bf8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15225-cwe-23-relative-path-traversal-in-s-df677faf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15225%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Sunnet%20WMPro&amp;severity=high&amp;id=695450b9db813ff03e2bf6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15175-cross-site-scripting-in-sohutv-cach-9986c342</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15175%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b6db813ff03e2bf319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13958-cwe-79-cross-site-scripting-xss-in--3a358256</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13958%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20YaMaps%20for%20WordPress%20Plugin&amp;severity=medium&amp;id=695450b2db813ff03e2bee60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13417-cwe-89-sql-injection-in-plugin-orga-ddec5dbd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13417%3A%20CWE-89%20SQL%20Injection%20in%20Plugin%20Organizer&amp;severity=high&amp;id=695450b2db813ff03e2bee5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15174-cross-site-scripting-in-sohutv-cach-9edc1770</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15174%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b6db813ff03e2bf312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15070-cwe-200-exposure-of-sensitive-infor-4dbfe805</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15070%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Gmission%20Web%20Fax&amp;severity=medium&amp;id=695450b6db813ff03e2bf2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15069-cwe-287-improper-authentication-in--e58ad2d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15069%3A%20CWE-287%20Improper%20Authentication%20in%20Gmission%20Web%20Fax&amp;severity=high&amp;id=695450b6db813ff03e2bf2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15068-cwe-862-missing-authorization-in-gm-840e10de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15068%3A%20CWE-862%20Missing%20Authorization%20in%20Gmission%20Web%20Fax&amp;severity=high&amp;id=695450b5db813ff03e2bf27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15173-cross-site-scripting-in-sohutv-cach-f9c3ced9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15173%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b5db813ff03e2bf274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15172-cross-site-scripting-in-sohutv-cach-dd0c8538</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15172%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b5db813ff03e2bf26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15171-cross-site-scripting-in-sohutv-cach-7f0fe415</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15171%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450bddb813ff03e2bf8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15170-cross-site-scripting-in-advaya-soft-834d3c9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15170%3A%20Cross%20Site%20Scripting%20in%20Advaya%20Softech%20GEMS%20ERP%20Portal&amp;severity=medium&amp;id=695450bddb813ff03e2bf8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15169-sql-injection-in-biggidroid-simple--21795ad5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15169%3A%20SQL%20Injection%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=695450badb813ff03e2bf7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15168-sql-injection-in-itsourcecode-stude-a8c4bc97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15168%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=695450b6db813ff03e2bf30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52691-vulnerability-in-smartertools-smart-0974873e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52691%3A%20Vulnerability%20in%20SmarterTools%20SmarterMail&amp;severity=critical&amp;id=695450b7db813ff03e2bf339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15167-sql-injection-in-itsourcecode-onlin-b6a9b8dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15167%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=695450b5db813ff03e2bf260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15166-sql-injection-in-itsourcecode-onlin-1a56a211</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15166%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=695450b3db813ff03e2beeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15165-sql-injection-in-itsourcecode-onlin-51a81c78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15165%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=695450b2db813ff03e2bee6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15067-cwe-434-unrestricted-upload-of-file-7670a9d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15067%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Innorix%20Innorix%20WP&amp;severity=high&amp;id=695450b5db813ff03e2bf282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15066-cwe-22-improper-limitation-of-a-pat-8b2e2d0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15066%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Innorix%20Innorix%20WP&amp;severity=medium&amp;id=695450b5db813ff03e2bf27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15164-stack-based-buffer-overflow-in-tend-386733c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15164%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450bfdb813ff03e2bfc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15065-cwe-200-exposure-of-sensitive-infor-0df4a5ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15065%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kings%20Information%20%26%20Network%20Co.%20KESS%20Enterprise&amp;severity=high&amp;id=695450b1db813ff03e2bee3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15163-stack-based-buffer-overflow-in-tend-2e45f503</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15163%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b2db813ff03e2bee50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57460-na-0b914ec7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57460%3A%20n%2Fa&amp;severity=critical&amp;id=695450bedb813ff03e2bf907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65570-na-0a4121e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65570%3A%20n%2Fa&amp;severity=critical&amp;id=695450bddb813ff03e2bf898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56333-na-b5c46c27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56333%3A%20n%2Fa&amp;severity=critical&amp;id=695450badb813ff03e2bf7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66861-na-09879b85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66861%3A%20n%2Fa&amp;severity=low&amp;id=695450b9db813ff03e2bf6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66866-na-811d85af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66866%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66864-na-8c485912</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66864%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65442-na-6b81495f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65442%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60458-na-b06c4858</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60458%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67255-na-6dd7edef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67255%3A%20n%2Fa&amp;severity=high&amp;id=695450b4db813ff03e2beef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67254-na-76844ed4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67254%3A%20n%2Fa&amp;severity=high&amp;id=695450b4db813ff03e2beef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68706-na-f2f55eee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68706%3A%20n%2Fa&amp;severity=critical&amp;id=695450b3db813ff03e2beecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30855-na-a94e39d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30855%3A%20n%2Fa&amp;severity=high&amp;id=695450b2db813ff03e2bee63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27480-na-3dd42f0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27480%3A%20n%2Fa&amp;severity=critical&amp;id=695450b2db813ff03e2bee5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25182-na-bea3e943</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25182%3A%20n%2Fa&amp;severity=critical&amp;id=695450b2db813ff03e2bee57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57462-na-478261e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57462%3A%20n%2Fa&amp;severity=medium&amp;id=695450acdb813ff03e2bebbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66877-na-1b96073c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66877%3A%20n%2Fa&amp;severity=high&amp;id=695450abdb813ff03e2beb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66869-na-eb17fa38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66869%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66865-na-f643d785</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66865%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66863-na-f0cc1d4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66863%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66862-na-21d83737</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66862%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25183-na-41f93c72</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25183%3A%20n%2Fa&amp;severity=high&amp;id=695450a5db813ff03e2be176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25181-na-e8b0bdcd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25181%3A%20n%2Fa&amp;severity=critical&amp;id=695450a5db813ff03e2be173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-29-cb7a6ab2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-29&amp;severity=medium&amp;id=69544e27b932a5a22ffaf0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15162-stack-based-buffer-overflow-in-tend-0eebf42b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15162%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b1db813ff03e2bee3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15161-stack-based-buffer-overflow-in-tend-cdcbd525</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15161%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b1db813ff03e2bee35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15160-stack-based-buffer-overflow-in-tend-fa75d401</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15160%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b9db813ff03e2bf71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-mongobleed-flaw-leaks-mongodb-secrets-87-8caf568a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20MongoBleed%20flaw%20leaks%20MongoDB%20secrets%2C%2087K%20servers%20exposed&amp;severity=high&amp;id=69544fcedb813ff03e2aff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15156-null-pointer-dereference-in-omec-pr-726c8043</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15156%3A%20NULL%20Pointer%20Dereference%20in%20omec-project%20UPF&amp;severity=medium&amp;id=695450b9db813ff03e2bf716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stolen-lastpass-backups-enable-crypto-theft-throug-339d0526</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stolen%20LastPass%20backups%20enable%20crypto%20theft%20through%202025&amp;severity=medium&amp;id=69544fcedb813ff03e2affc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-to-leak-wired-database-with-23-milli-fc0be0bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20claims%20to%20leak%20WIRED%20database%20with%202.3%20million%20records&amp;severity=high&amp;id=69544fcedb813ff03e2aff81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15155-stack-based-buffer-overflow-in-floo-000c8b90</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15155%3A%20Stack-based%20Buffer%20Overflow%20in%20floooh%20sokol&amp;severity=medium&amp;id=695450bddb813ff03e2bf8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15154-use-of-less-trusted-source-in-pboot-d66f9650</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15154%3A%20Use%20of%20Less%20Trusted%20Source%20in%20PbootCMS&amp;severity=medium&amp;id=695450bddb813ff03e2bf89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15153-files-or-directories-accessible-in--6ca46105</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15153%3A%20Files%20or%20Directories%20Accessible%20in%20PbootCMS&amp;severity=medium&amp;id=695450bddb813ff03e2bf892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15152-unrestricted-upload-in-h-moses-moga-7081a4b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15152%3A%20Unrestricted%20Upload%20in%20h-moses%20moga-mall&amp;severity=medium&amp;id=695450bcdb813ff03e2bf878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15151-password-in-configuration-file-in-t-d0b6d407</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15151%3A%20Password%20in%20Configuration%20File%20in%20TaleLin%20Lin-CMS&amp;severity=medium&amp;id=695450bcdb813ff03e2bf872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15150-stack-based-buffer-overflow-in-px4--8346c34b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15150%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=695450b9db813ff03e2bf70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15149-cross-site-scripting-in-rawchen-ecm-9eccac06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15149%3A%20Cross%20Site%20Scripting%20in%20rawchen%20ecms&amp;severity=medium&amp;id=695450b1db813ff03e2bee2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15148-code-injection-in-cmseasy-4649066c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15148%3A%20Code%20Injection%20in%20CmsEasy&amp;severity=medium&amp;id=695450b1db813ff03e2bee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15146-cross-site-scripting-in-sohutv-cach-7a503536</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15146%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b1db813ff03e2bee1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15145-cross-site-scripting-in-sohutv-cach-a6b0ebd7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15145%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b1db813ff03e2bee15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15144-cross-site-scripting-in-dayrui-xunr-2d5ac17d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15144%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=695450b1db813ff03e2bee0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15143-sql-injection-in-eyoucms-ce492585</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15143%3A%20SQL%20Injection%20in%20EyouCMS&amp;severity=medium&amp;id=695450b9db813ff03e2bf708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15142-sql-injection-in-9786-phpok3w-9e27a8b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15142%3A%20SQL%20Injection%20in%209786%20phpok3w&amp;severity=medium&amp;id=695450b9db813ff03e2bf702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15141-information-disclosure-in-halo-c37fbf3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15141%3A%20Information%20Disclosure%20in%20Halo&amp;severity=low&amp;id=695450b9db813ff03e2bf6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15140-sql-injection-in-saiftheboss7-onlin-d76f5f9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15140%3A%20SQL%20Injection%20in%20saiftheboss7%20onlinemcqexam&amp;severity=medium&amp;id=695450bbdb813ff03e2bf84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15139-command-injection-in-trendnet-tew-8-6748e06f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15139%3A%20Command%20Injection%20in%20TRENDnet%20TEW-822DRE&amp;severity=medium&amp;id=695450bbdb813ff03e2bf848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15138-path-traversal-in-prasathmani-tinyf-4fe74e7a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15138%3A%20Path%20Traversal%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=695450b8db813ff03e2bf3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15137-command-injection-in-trendnet-tew-8-8f166541</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15137%3A%20Command%20Injection%20in%20TRENDnet%20TEW-800MB&amp;severity=high&amp;id=695450b6db813ff03e2bf2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15136-command-injection-in-trendnet-tew-8-5f1a00e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15136%3A%20Command%20Injection%20in%20TRENDnet%20TEW-800MB&amp;severity=high&amp;id=695450b6db813ff03e2bf2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15135-improper-authentication-in-joey-zho-b3c4bcfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15135%3A%20Improper%20Authentication%20in%20joey-zhou%20xiaozhi-esp32-server-java&amp;severity=medium&amp;id=695450b5db813ff03e2bf257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15134-cross-site-scripting-in-yourmaileye-f4b184e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15134%3A%20Cross%20Site%20Scripting%20in%20yourmaileyes%20MOOC&amp;severity=medium&amp;id=695450b5db813ff03e2bf250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15133-command-injection-in-zspace-z4pro-c83a4404</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15133%3A%20Command%20Injection%20in%20ZSPACE%20Z4Pro%2B&amp;severity=medium&amp;id=695450b4db813ff03e2bef1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15132-command-injection-in-zspace-z4pro-c1cefaa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15132%3A%20Command%20Injection%20in%20ZSPACE%20Z4Pro%2B&amp;severity=medium&amp;id=695450b4db813ff03e2bef14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15131-command-injection-in-zspace-z4pro-e1fb44b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15131%3A%20Command%20Injection%20in%20ZSPACE%20Z4Pro%2B&amp;severity=medium&amp;id=695450b4db813ff03e2bef0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15130-code-injection-in-shanyu-sycms-1951a355</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15130%3A%20Code%20Injection%20in%20shanyu%20SyCms&amp;severity=medium&amp;id=695450b4db813ff03e2beefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15129-code-injection-in-chenjinchuang-lin-2816b5ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15129%3A%20Code%20Injection%20in%20ChenJinchuang%20Lin-CMS-TP5&amp;severity=medium&amp;id=695450b3db813ff03e2beebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15128-unprotected-storage-of-credentials--0cd8d136</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15128%3A%20Unprotected%20Storage%20of%20Credentials%20in%20ZKTeco%20BioTime&amp;severity=medium&amp;id=695450bbdb813ff03e2bf842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15127-sql-injection-in-fantasticlbp-hotel-9b248b3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15127%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels_Server&amp;severity=medium&amp;id=695450bbdb813ff03e2bf83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15126-improper-authorization-in-jeecgboot-dbc4f2ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15126%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15125-improper-authorization-in-jeecgboot-3d625a7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15125%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15124-improper-authorization-in-jeecgboot-71a33653</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15124%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15123-improper-authorization-in-jeecgboot-bc164e5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15123%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15122-improper-authorization-in-jeecgboot-fed35077</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15122%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450b8db813ff03e2bf3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15121-information-disclosure-in-jeecgboot-532c1d86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15121%3A%20Information%20Disclosure%20in%20JeecgBoot&amp;severity=medium&amp;id=695450b8db813ff03e2bf3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15120-improper-authorization-in-jeecgboot-9e4faed7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15120%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450b8db813ff03e2bf3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15119-improper-authorization-in-jeecgboot-baf53065</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15119%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450b3db813ff03e2beeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15118-improper-authorization-in-macrozhen-77683775</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15118%3A%20Improper%20Authorization%20in%20macrozheng%20mall&amp;severity=medium&amp;id=695450b8db813ff03e2bf3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15117-deserialization-in-dromara-sa-token-1d569065</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15117%3A%20Deserialization%20in%20Dromara%20Sa-Token&amp;severity=low&amp;id=695450b8db813ff03e2bf39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15116-race-condition-in-opencart-62e59fd9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15116%3A%20Race%20Condition%20in%20OpenCart&amp;severity=medium&amp;id=695450b7db813ff03e2bf389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-28-99c7d7df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-28&amp;severity=medium&amp;id=69544e26b932a5a22ffaeea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/petlibro-your-pet-feeder-is-feeding-data-to-anyone-c72b1a5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Petlibro%3A%20Your%20Pet%20Feeder%20Is%20Feeding%20Data%20To%20Anyone%20Who%20Asks&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15110-unrestricted-upload-in-jackq-xcms-e9275597</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15110%3A%20Unrestricted%20Upload%20in%20jackq%20XCMS&amp;severity=medium&amp;id=695450b6db813ff03e2bf305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14177-cwe-125-out-of-bounds-read-in-php-g-17d890ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14177%3A%20CWE-125%20Out-of-bounds%20Read%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=695450badb813ff03e2bf7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14178-cwe-787-out-of-bounds-write-in-php--bed270d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14178%3A%20CWE-787%20Out-of-bounds%20Write%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=695450badb813ff03e2bf7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14180-cwe-476-null-pointer-dereference-in-8221dc6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14180%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20PHP%20Group%20PHP&amp;severity=high&amp;id=695450bbdb813ff03e2bf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15109-unrestricted-upload-in-jackq-xcms-4e9e56c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15109%3A%20Unrestricted%20Upload%20in%20jackq%20XCMS&amp;severity=medium&amp;id=695450bbdb813ff03e2bf81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/implicit-execution-authority-is-the-real-failure-m-c4845665</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Implicit%20execution%20authority%20is%20the%20real%20failure%20mode%20behind%20prompt%20injection&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15108-use-of-hard-coded-cryptographic-key-5c0526fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15108%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PandaXGO%20PandaX&amp;severity=medium&amp;id=695450bcdb813ff03e2bf86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15107-use-of-hard-coded-cryptographic-key-961c2436</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15107%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20actiontech%20sqle&amp;severity=medium&amp;id=695450bcdb813ff03e2bf865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15106-improper-authorization-in-getmaxun--dda24507</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15106%3A%20Improper%20Authorization%20in%20getmaxun%20maxun&amp;severity=medium&amp;id=695450bcdb813ff03e2bf85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mongodb-flaw-lets-unauthenticated-attackers-re-024cec06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MongoDB%20Flaw%20Lets%20Unauthenticated%20Attackers%20Read%20Uninitialized%20Memory&amp;severity=high&amp;id=694fb495613270c7b7ffb853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openais-chatgpt-ads-will-allegedly-prioritize-spon-6838c740</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI&apos;s%20ChatGPT%20ads%20will%20allegedly%20prioritize%20sponsored%20content%20in%20answers&amp;severity=high&amp;id=694fb495613270c7b7ffb857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-runtime-attacks-stay-quiet-for-so-long-61468bb1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20runtime%20attacks%20stay%20quiet%20for%20so%20long&amp;severity=medium&amp;id=694fadebd43a27076d86e1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15105-use-of-hard-coded-cryptographic-key-9a892d06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15105%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20getmaxun%20maxun&amp;severity=medium&amp;id=694fa35cd43a27076d7b384f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mongodb-flaw-lets-unauthenticated-attackers-re-701f4a01</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MongoDB%20Flaw%20Lets%20Unauthenticated%20Attackers%20Read%20Uninitialized%20Memory&amp;severity=high&amp;id=694f983f46aa44436a57c516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-verified-sha-256-second-preimage-collision-s-99c70243</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20verified%20SHA-256%20second-preimage%20collision%3A%20Structural%20analysis%20of%20the%20W-schedule%20vulnerability&amp;severity=high&amp;id=694f3fd333784cecd4bb6a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68952-cwe-94-improper-control-of-generati-d00ad68e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68952%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20eigent-ai%20eigent&amp;severity=critical&amp;id=694f5b38b11716a1460d26a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68948-cwe-321-use-of-hard-coded-cryptogra-cbac227e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68948%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=694f5b38b11716a1460d26a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68927-cwe-79-improper-neutralization-of-i-3c80206e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68927%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20abhinavxd%20libredesk&amp;severity=high&amp;id=694f5b38b11716a1460d26a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54322-cwe-95-improper-neutralization-of-d-0b1e7694</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54322%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Xspeeder%20SXZOS&amp;severity=critical&amp;id=695450b7db813ff03e2bf33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-27-278341d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-27&amp;severity=medium&amp;id=69544e27b932a5a22ffaf2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68474-cwe-787-out-of-bounds-write-in-espr-9754a97b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68474%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=694f23b933784cecd4a2ce7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66203-cwe-78-improper-neutralization-of-s-bc8f18e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66203%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20lemon8866%20StreamVault&amp;severity=critical&amp;id=694f202f33784cecd4a18a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-group-claims-theft-of-over-1tb--0d277026</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Group%20Claims%20Theft%20of%20Over%201TB%20of%20Chrysler%20Data&amp;severity=high&amp;id=694f0e9833784cecd49bbf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67729-cwe-502-deserialization-of-untruste-d7495667</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67729%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20InternLM%20lmdeploy&amp;severity=high&amp;id=694f079233784cecd499b7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68697-cwe-269-improper-privilege-manageme-eb98d913</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68697%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20n8n-io%20n8n&amp;severity=high&amp;id=694f079233784cecd499b7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68668-cwe-693-protection-mechanism-failur-bcbb4231</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68668%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=694f040e33784cecd498bd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61914-cwe-79-improper-neutralization-of-i-3caedd8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61914%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=694f040e33784cecd498bd15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-group-noname057-claims-cyberattack-on--27e7ead6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20group%20Noname057%20claims%20cyberattack%20on%20La%20Poste%20services&amp;severity=medium&amp;id=694ef98033784cecd495b6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-grubhub-emails-promise-tenfold-return-on-sent-716cb93f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20GrubHub%20emails%20promise%20tenfold%20return%20on%20sent%20cryptocurrency&amp;severity=high&amp;id=694ef98033784cecd495b6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13158-cwe-1321-improperly-controlled-modi-61fce7bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13158%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20apiDoc%20apidoc-core&amp;severity=critical&amp;id=694eb33b33784cecd475b0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-chrome-extension-breach-caused-7-mill-4908a715</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20Chrome%20Extension%20Breach%20Caused%20%247%20Million%20Crypto%20Loss%20via%20Malicious%20Code&amp;severity=low&amp;id=694ebaa733784cecd47d1e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-evasive-panda-ran-dns-poisoning-campa-de4fd13f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Evasive%20Panda%20Ran%20DNS%20Poisoning%20Campaign%20to%20Deliver%20MgBot%20Malware&amp;severity=high&amp;id=694ea99af5f69c8dc2a0d494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64645-cwe-367-time-of-check-time-of-use-t-3886589b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64645%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20IBM%20Concert&amp;severity=high&amp;id=694e9f3b2bc1afab4ba470b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36230-cwe-80-improper-neutralization-of-s-74e5d956</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36230%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=694e9f3b2bc1afab4ba470b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36229-cwe-497-exposure-of-sensitive-syste-ee8c7117</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36229%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20Aspera%20Faspex%205&amp;severity=low&amp;id=694e9bb32bc1afab4ba051ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36228-cwe-279-incorrect-execution-assigne-c83eb68f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36228%3A%20CWE-279%20Incorrect%20Execution-Assigned%20Permissions%20in%20IBM%20Aspera%20Faspex%205&amp;severity=low&amp;id=694e9bb32bc1afab4ba051ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36192-cwe-862-missing-authorization-in-ib-ee403eab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36192%3A%20CWE-862%20Missing%20Authorization%20in%20IBM%20DS8A00(%20R10.1)&amp;severity=medium&amp;id=694e98cd2bc1afab4b9c3a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14687-cwe-602-client-side-enforcement-of--e85a1f20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14687%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Db2%20Intelligence%20Center&amp;severity=medium&amp;id=694e8dcb1cd79ac615c4b7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13915-cwe-305-authentication-bypass-by-pr-11cca0f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13915%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IBM%20API%20Connect&amp;severity=critical&amp;id=694e8dcb1cd79ac615c4b7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ferry-iot-hack-5b55cfb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ferry%20IoT%20Hack&amp;severity=medium&amp;id=694e8a471cd79ac615c0f045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12771-cwe-119-improper-restriction-of-ope-e7d7d9d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12771%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20IBM%20Concert&amp;severity=high&amp;id=694e8a571cd79ac615c0ff4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1721-cwe-244-improper-clearing-of-heap-me-3f8bca1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1721%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=694e8a571cd79ac615c0ff4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-langchain-core-vulnerability-exposes-secr-ecd8d0fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20LangChain%20Core%20Vulnerability%20Exposes%20Secrets%20via%20Serialization%20Injection&amp;severity=critical&amp;id=694e7c9ccb0c2e4fdeb3e18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-chrome-extension-hack-tied-to-million-df7f6f76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20Chrome%20extension%20hack%20tied%20to%20millions%20in%20losses&amp;severity=high&amp;id=694e7c9ccb0c2e4fdeb3e18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spotify-cracks-down-on-unlawful-scraping-of-86-mil-a2457526</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spotify%20cracks%20down%20on%20unlawful%20scraping%20of%2086%20million%20songs&amp;severity=high&amp;id=694e7c9ccb0c2e4fdeb3e193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-year-old-fortinet-fortios-ssl-vpn-flaw-active-3a11fdb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five-year-old%20Fortinet%20FortiOS%20SSL%20VPN%20flaw%20actively%20exploited&amp;severity=medium&amp;id=694e64d1ddaad31618addf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-langchain-core-vulnerability-exposes-secr-24b8ea8d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20LangChain%20Core%20Vulnerability%20Exposes%20Secrets%20via%20Serialization%20Injection&amp;severity=critical&amp;id=694e64e4ddaad31618adf431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67450-cwe-427-uncontrolled-search-path-el-730bb734</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67450%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Eaton%20UPS%20Companion%20software&amp;severity=high&amp;id=694e3453f3b146189c0afb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59888-cwe-428-unquoted-search-path-or-ele-bcb5c8a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59888%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Eaton%20UPS%20Companion%20software&amp;severity=medium&amp;id=694e3453f3b146189c0afb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59887-cwe-427-uncontrolled-search-path-el-b954d403</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59887%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Eaton%20Eaton%20UPS%20Companion%20Software&amp;severity=high&amp;id=694e3453f3b146189c0afb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62578-cwe-319-cleartext-transmission-of-s-5af203d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62578%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Delta%20Electronics%20DVP-12SE&amp;severity=high&amp;id=694e29d4f3b146189c00bac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8075-cwe-20-improper-input-validation-in--d394635e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8075%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e12d9f3548aedd14cdc88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52601-cwe-321-use-of-hard-coded-cryptogra-706197e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52601%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20Device%20Manager&amp;severity=medium&amp;id=694e12d9f3548aedd14cdc85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52600-cwe-20-improper-input-validation-in-b14ca427</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52600%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e0f54f3548aedd1483f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52599-cwe-269-improper-privilege-manageme-fe306a0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52599%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e0f54f3548aedd1483f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52598-cwe-295-improper-certificate-valida-7c93afa3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52598%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e0f54f3548aedd1483f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15099-improper-authentication-in-simstudi-24cea6ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15099%3A%20Improper%20Authentication%20in%20simstudioai%20sim&amp;severity=medium&amp;id=694e0bd1f3548aedd14620a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15098-server-side-request-forgery-in-yuna-7f3bb429</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15098%3A%20Server-Side%20Request%20Forgery%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=694dfdd590f5ab8d8496eb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15097-improper-authentication-in-alteryx--ff12d8a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15097%3A%20Improper%20Authentication%20in%20Alteryx%20Server&amp;severity=medium&amp;id=694df6cb90f5ab8d8495363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15095-cross-site-scripting-in-postmanlabs-ce50d497</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15095%3A%20Cross%20Site%20Scripting%20in%20postmanlabs%20httpbin&amp;severity=medium&amp;id=694df6cb90f5ab8d84953634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15094-cross-site-scripting-in-sunkaifei-f-590ca55e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15094%3A%20Cross%20Site%20Scripting%20in%20sunkaifei%20FlyCMS&amp;severity=medium&amp;id=694dec4090f5ab8d848ddc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15093-cross-site-scripting-in-sunkaifei-f-2e22a3c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15093%3A%20Cross%20Site%20Scripting%20in%20sunkaifei%20FlyCMS&amp;severity=medium&amp;id=694de1be90f5ab8d8485b016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15092-buffer-overflow-in-utt-512w-4ff41af4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15092%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dd5fa8e70994989d5204f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-26-66477bd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-26&amp;severity=medium&amp;id=694f23a733784cecd4a2ba30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66738-na-f81b2c51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66738%3A%20n%2Fa&amp;severity=high&amp;id=694ebaca33784cecd47d2b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44065-na-ea0be00f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44065%3A%20n%2Fa&amp;severity=critical&amp;id=694ebaca33784cecd47d2b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66737-na-e956d76b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66737%3A%20n%2Fa&amp;severity=medium&amp;id=694eb6b333784cecd47a79ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42718-na-2dd731cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42718%3A%20n%2Fa&amp;severity=medium&amp;id=694eb6b333784cecd47a79aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29720-na-d262a0ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29720%3A%20n%2Fa&amp;severity=medium&amp;id=694eb33b33784cecd475b0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57403-na-b89d59b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57403%3A%20n%2Fa&amp;severity=high&amp;id=694eb33b33784cecd475b0ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67014-na-41ddc1ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67014%3A%20n%2Fa&amp;severity=high&amp;id=694eac67f5f69c8dc2a51203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66947-na-fffce203</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66947%3A%20n%2Fa&amp;severity=medium&amp;id=694ea97cf5f69c8dc2a0b964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67015-na-35bedd05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67015%3A%20n%2Fa&amp;severity=high&amp;id=694ea97cf5f69c8dc2a0b960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67013-na-9ad5da5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67013%3A%20n%2Fa&amp;severity=medium&amp;id=694ea97cf5f69c8dc2a0b95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25341-na-52f6fdc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25341%3A%20n%2Fa&amp;severity=high&amp;id=694ea55ef5f69c8dc29d5015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67349-na-dabe5216</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67349%3A%20n%2Fa&amp;severity=medium&amp;id=694ea1e7f5f69c8dc2984abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65885-na-128e8357</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65885%3A%20n%2Fa&amp;severity=medium&amp;id=694e9f3b2bc1afab4ba470b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15091-buffer-overflow-in-utt-512w-a4ed831e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15091%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dcb6d8e70994989c8c85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14913-cwe-862-missing-authorization-in-wp-254f1c52</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14913%3A%20CWE-862%20Missing%20Authorization%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=694dc7eb8e70994989c72dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15090-buffer-overflow-in-utt-512w-48838686</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15090%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dd8a490f5ab8d848037d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15089-buffer-overflow-in-utt-512w-d90fd5fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15089%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dc5dd8e70994989c5c8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15088-sql-injection-in-ketr-jepaas-37627fd2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15088%3A%20SQL%20Injection%20in%20ketr%20JEPaaS&amp;severity=medium&amp;id=694db6612ae90972ac5c78a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15087-improper-authorization-in-youlaitec-6bc441ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15087%3A%20Improper%20Authorization%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=694da8ba9e3e753cc31e3817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15086-improper-access-controls-in-youlait-d3f42cf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15086%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=694da1bc9e3e753cc3176e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68936-cwe-79-improper-neutralization-of-i-8929366f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68936%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ONLYOFFICE%20Document%20Server&amp;severity=medium&amp;id=694d9b76ac739891066893e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68935-cwe-79-improper-neutralization-of-i-a1d33b23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68935%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ONLYOFFICE%20Document%20Server&amp;severity=medium&amp;id=694d9b76ac739891066893e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15085-improper-authorization-in-youlaitec-88700874</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15085%3A%20Improper%20Authorization%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=694d9b76ac739891066893e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15084-improper-access-controls-in-youlait-95491511</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15084%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=low&amp;id=694d87052ffa995e0cff37ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15083-on-chip-debug-and-test-interface-wi-3e4729a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15083%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20TOZED%20ZLT%20M30s&amp;severity=low&amp;id=694d7662f4aff2fc081e1f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15082-information-disclosure-in-tozed-zlt-81a0e5d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15082%3A%20Information%20Disclosure%20in%20TOZED%20ZLT%20M30s&amp;severity=medium&amp;id=694d6f65f4aff2fc0818851c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15081-command-injection-in-jd-cloud-be650-1008c4b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15081%3A%20Command%20Injection%20in%20JD%20Cloud%20BE6500&amp;severity=medium&amp;id=694d55421baa80570922cc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-stealth-loaders-ai-chatbot-fla-99e7b5e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Stealth%20Loaders%2C%20AI%20Chatbot%20Flaws%20AI%20Exploits%2C%20Docker%20Hack%2C%20and%2015%20More%20Stories&amp;severity=medium&amp;id=694d59541baa805709281622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2307-cwe-79-improper-neutralization-of-in-29d3bb3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2307%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Verisay%20Communication%20and%20Information%20Technology%20Industry%20and%20Trade%20Ltd.%20Co.%20Aidango&amp;severity=high&amp;id=694d3ac1a66482ded1ed29ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2406-cwe-79-improper-neutralization-of-in-f29ffd48</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2406%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Verisay%20Communication%20and%20Information%20Technology%20Industry%20and%20Trade%20Ltd.%20Co.%20Trizbi&amp;severity=high&amp;id=694d3ac1a66482ded1ed2a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2405-cwe-79-improper-neutralization-of-in-22548e54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Verisay%20Communication%20and%20Information%20Technology%20Industry%20and%20Trade%20Ltd.%20Co.%20Titarus&amp;severity=high&amp;id=694d3ac1a66482ded1ed2a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-mas-windows-activation-domain-used-to-spread--c59c8530</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20MAS%20Windows%20activation%20domain%20used%20to%20spread%20PowerShell%20malware&amp;severity=high&amp;id=694d373ea66482ded1ea090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-actively-exploited-digiever-nvr-vulnera-4793cc5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Actively%20Exploited%20Digiever%20NVR%20Vulnerability%20Allowing%20Remote%20Code%20Execution&amp;severity=high&amp;id=694d373ea66482ded1ea08f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-active-exploitation-of-fortios-s-7588133f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20Active%20Exploitation%20of%20FortiOS%20SSL%20VPN%202FA%20Bypass%20Vulnerability&amp;severity=high&amp;id=694d373ea66482ded1ea08fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-2022-breach-led-to-years-long-cryptocurre-2c8e1d63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%202022%20Breach%20Led%20to%20Years-Long%20Cryptocurrency%20Thefts%2C%20TRM%20Labs%20Finds&amp;severity=medium&amp;id=694d373ea66482ded1ea092c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/csrf-protection-without-tokens-or-hidden-form-fiel-a9bc5643</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CSRF%20Protection%20without%20Tokens%20or%20Hidden%20Form%20Fields&amp;severity=medium&amp;id=694d1965e0af5c9a9a86af7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-active-exploitation-of-fortios-s-5e3d59b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20Active%20Exploitation%20of%20FortiOS%20SSL%20VPN%202FA%20Bypass%20Vulnerability&amp;severity=low&amp;id=694cf78a3d2785a864bf3f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-actively-exploited-digiever-nvr-vulnera-5de96a0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Actively%20Exploited%20Digiever%20NVR%20Vulnerability%20Allowing%20Remote%20Code%20Execution&amp;severity=critical&amp;id=694d0abe9393940d4873d875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15078-sql-injection-in-itsourcecode-stude-dbef1ba7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15078%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694cc81abddd8c7d7f664829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15077-sql-injection-in-itsourcecode-stude-a57572a4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15077%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694cba530921a92379b92d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15076-path-traversal-in-tenda-ch22-e4cfe51b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15076%3A%20Path%20Traversal%20in%20Tenda%20CH22&amp;severity=medium&amp;id=694cb5998e23ad4a677a863f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15075-sql-injection-in-itsourcecode-stude-adeb5c49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15075%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694cab0d8e23ad4a67740162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15074-sql-injection-in-itsourcecode-onlin-711b6435</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15074%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=694cab0d8e23ad4a6774015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-25-be54d0ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-25&amp;severity=medium&amp;id=694dd26a8e70994989cf121e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freebsd-rtsold-15x-remote-code-execution-via-dnssl-4131792e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FreeBSD%20rtsold%2015.x%20-%20Remote%20Code%20Execution%20via%20DNSSL&amp;severity=critical&amp;id=694d89022ffa995e0c012b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chained-quiz-135-unauthenticated-insecure-direct-o-4650e5dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chained%20Quiz%20%201.3.5%20-%20Unauthenticated%20Insecure%20Direct%20Object%20Reference%20via%20Cookie&amp;severity=medium&amp;id=694d89022ffa995e0c012b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-quiz-maker-67056-sql-injection-b1412d1e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Quiz%20Maker%206.7.0.56%20-%20SQL%20Injection&amp;severity=medium&amp;id=694d89022ffa995e0c012b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66378-cwe-863-incorrect-authorization-in--84f7457e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66378%3A%20CWE-863%20Incorrect%20Authorization%20in%20Pexip%20Infinity&amp;severity=medium&amp;id=694cc81abddd8c7d7f664839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66377-cwe-306-missing-authentication-for--49ad67de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66377%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc81abddd8c7d7f664836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59683-cwe-863-incorrect-authorization-in--67144ea5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59683%3A%20CWE-863%20Incorrect%20Authorization%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc81abddd8c7d7f664833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48704-cwe-617-reachable-assertion-in-pexi-da833cc7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48704%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc81abddd8c7d7f664830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66443-cwe-617-reachable-assertion-in-pexi-cc25f33f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66443%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66379-cwe-617-reachable-assertion-in-pexi-7de5280c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66379%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49088-cwe-617-reachable-assertion-in-pexi-892678d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49088%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=medium&amp;id=694cc4e20921a92379c39d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32096-cwe-617-reachable-assertion-in-pexi-0e88440b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32096%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32095-cwe-617-reachable-assertion-in-pexi-2da95b82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32095%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/websocket-rce-in-the-curseforge-launcher-6c8dbc1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WebSocket%20RCE%20in%20the%20CurseForge%20Launcher&amp;severity=medium&amp;id=694c81885f4e95c0c378ae3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15073-sql-injection-in-itsourcecode-onlin-836a4e29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15073%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=694c7418585daa086f41f356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68920-cwe-862-missing-authorization-in-ke-f2f7c763</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68920%3A%20CWE-862%20Missing%20Authorization%20in%20kermitproject%20C-Kermit&amp;severity=high&amp;id=694c648a9a174f390b50ac19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-targeting-india-using-tax-themed-phishi-778f2deb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Targeting%20India%20Using%20Tax%20Themed%20Phishing%20Lures&amp;severity=medium&amp;id=694e5d4fddaad31618a6af91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68919-cwe-532-insertion-of-sensitive-info-22835cca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68919%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Fujitsu%20%2F%20Fsas%20Technologies%20ETERNUS%20SF%20ACM%2FSC%2FExpress&amp;severity=medium&amp;id=694c5c919a174f390b469df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68917-cwe-79-improper-neutralization-of-i-01fd401c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68917%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ONLYOFFICE%20Document%20Server&amp;severity=medium&amp;id=694c4f8fd9ecbeec2ac2a95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8769-cwe-20-in-megasys-computer-technolog-34cd1760</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8769%3A%20CWE-20%20in%20MegaSys%20Computer%20Technologies%20Telenium%20Online%20Web%20Application&amp;severity=critical&amp;id=694c4c0ad9ecbeec2abe38b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3232-cwe-306-in-mitsubishi-electric-europ-d9ab6730</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3232%3A%20CWE-306%20in%20Mitsubishi%20Electric%20Europe%20smartRTU&amp;severity=high&amp;id=694c4887d9ecbeec2abc776c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68916-cwe-25-path-traversal-filedir-in-ri-5d011025</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68916%3A%20CWE-25%20Path%20Traversal%3A%20&apos;%2F..%2Ffiledir&apos;%20in%20Riello%20NetMan&amp;severity=critical&amp;id=694c450ed9ecbeec2ab862a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68915-cwe-79-improper-neutralization-of-i-691de484</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68915%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Riello%20NetMan&amp;severity=medium&amp;id=694c450ed9ecbeec2ab8629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68914-cwe-89-improper-neutralization-of-s-f429854c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68914%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Riello%20NetMan&amp;severity=medium&amp;id=694c450ed9ecbeec2ab8629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36154-cwe-313-cleartext-storage-in-a-file-67d69f76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36154%3A%20CWE-313%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20IBM%20Concert&amp;severity=medium&amp;id=694c3aaadf08e956cf26e4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-macos-stealer-uses-signed-app-to-bypas-3139da34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20macOS%20Stealer%20Uses%20Signed%20App%20to%20Bypass%20Apple%20Gatekeeper&amp;severity=high&amp;id=694c303a484fa739dbdc500e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-macos-stealer-uses-signed-app-to-bypas-d4ac26f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20macOS%20Stealer%20Uses%20Signed%20App%20to%20Bypass%20Apple%20Gatekeeper&amp;severity=medium&amp;id=694c2f82484fa739dbdb4e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2515-incorrect-authorization-in-eclipse-f-10af996d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2515%3A%20Incorrect%20Authorization%20in%20Eclipse%20Foundation%20BlueChi&amp;severity=high&amp;id=694c14c8c1b1db9e83c081da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seizes-domain-storing-bank-credentials-stolen--ed46e74d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20seizes%20domain%20storing%20bank%20credentials%20stolen%20from%20U.S.%20victims&amp;severity=high&amp;id=694c114cc1b1db9e83bc86ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mongodb-warns-admins-to-patch-severe-rce-flaw-imme-69c4c61c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MongoDB%20warns%20admins%20to%20patch%20severe%20RCE%20flaw%20immediately&amp;severity=critical&amp;id=694c114cc1b1db9e83bc86a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43876-cwe-78-improper-neutralization-of-s-ef95807e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43876%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%20iSTAR%20Ultra%2C%20iSTAR%20Ultra%20SE&amp;severity=high&amp;id=694c098b550a31ae84b9ba46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43875-cwe-78-improper-neutralization-of-s-97654d86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43875%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%20iSTAR%20Ultra%2C%20iSTAR%20Ultra%20SE&amp;severity=high&amp;id=694c0608550a31ae84b6c530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-hackers-claim-cyberattack-on-french-po-b945c549</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20Hackers%20Claim%20Cyberattack%20on%20French%20Postal%20Service&amp;severity=medium&amp;id=694bfbad5a2eea8446bf8390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2155-cwe-434-unrestricted-upload-of-file--729e743a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2155%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Echo%20Call%20Center%20Services%20Trade%20and%20Industry%20Inc.%20Specto%20CM&amp;severity=high&amp;id=694bfbca5a2eea8446bfa2a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2154-cwe-79-improper-neutralization-of-in-8026720a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2154%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Echo%20Call%20Center%20Services%20Trade%20and%20Industry%20Inc.%20Specto%20CM&amp;severity=medium&amp;id=694bfbca5a2eea8446bfa2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-panda-apt-poisons-dns-requests-to-deliver--2df365db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Panda%20APT%20poisons%20DNS%20requests%20to%20deliver%20MgBot&amp;severity=medium&amp;id=694c0607550a31ae84b6c4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68606-exposure-of-sensitive-system-inform-45d0e715</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68606%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPXPO%20PostX&amp;severity=high&amp;id=694bea27279c98bf57f75488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68605-improper-neutralization-of-input-du-57892407</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=medium&amp;id=694bea27279c98bf57f75485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68603-missing-authorization-in-marketing--1fa6060f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68603%3A%20Missing%20Authorization%20in%20Marketing%20Fire%20Editorial%20Calendar&amp;severity=high&amp;id=694bea25279c98bf57f75472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68602-url-redirection-to-untrusted-site-o-3eb82e75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68602%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Scott%20Paterson%20Accept%20Donations%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=694bea25279c98bf57f7546f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68601-cross-site-request-forgery-csrf-in--5507ce57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68601%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=high&amp;id=694bea25279c98bf57f7546c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68600-server-side-request-forgery-ssrf-in-c3cb034b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68600%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Yannick%20Lefebvre%20Link%20Library&amp;severity=critical&amp;id=694bea25279c98bf57f75469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68599-improper-neutralization-of-input-du-676d4414</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Embeds%20For%20YouTube%20Plugin%20Support%20YouTube%20Embed&amp;severity=medium&amp;id=694bea25279c98bf57f75466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68598-improper-neutralization-of-input-du-3ce8a961</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LiveComposer%20Page%20Builder%3A%20Live%20Composer&amp;severity=medium&amp;id=694bea25279c98bf57f75463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68597-improper-neutralization-of-input-du-1552e644</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68597%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BlueGlass%20Interactive%20AG%20Jobs%20for%20WordPress&amp;severity=medium&amp;id=694bea25279c98bf57f75460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68596-missing-authorization-in-bit-apps-b-ab595958</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68596%3A%20Missing%20Authorization%20in%20Bit%20Apps%20Bit%20Assist&amp;severity=high&amp;id=694bea25279c98bf57f7545d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68595-missing-authorization-in-trustindex-c6c34d56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68595%3A%20Missing%20Authorization%20in%20Trustindex%20Widgets%20for%20Social%20Photo%20Feed&amp;severity=high&amp;id=694bea25279c98bf57f7545a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68594-missing-authorization-in-assaf-para-994714a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68594%3A%20Missing%20Authorization%20in%20Opinion%20Stage%20Poll%2C%20Survey%20%26%20Quiz%20Maker%20Plugin%20by%20Opinion%20Stage&amp;severity=high&amp;id=694bea25279c98bf57f75457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68593-missing-authorization-in-liton-aref-607a8db7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68593%3A%20Missing%20Authorization%20in%20Liton%20Arefin%20WP%20Adminify&amp;severity=high&amp;id=694bea23279c98bf57f752cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68592-missing-authorization-in-liton-aref-7dee314a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68592%3A%20Missing%20Authorization%20in%20Liton%20Arefin%20WP%20Adminify&amp;severity=high&amp;id=694bea23279c98bf57f752ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68591-missing-authorization-in-mitchell-b-270364fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68591%3A%20Missing%20Authorization%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=high&amp;id=694bea23279c98bf57f752c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68590-improper-neutralization-of-special--5849784a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68590%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CRM%20Perks%20Integration%20for%20Contact%20Form%207%20HubSpot&amp;severity=critical&amp;id=694bea23279c98bf57f752c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68589-missing-authorization-in-wp-socio-w-34e87768</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68589%3A%20Missing%20Authorization%20in%20WP%20Socio%20WP%20Telegram%20Widget%20and%20Join%20Link&amp;severity=high&amp;id=694bea23279c98bf57f752c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68588-missing-authorization-in-totalsoft--3a4b17d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68588%3A%20Missing%20Authorization%20in%20totalsoft%20TS%20Poll&amp;severity=high&amp;id=694bea23279c98bf57f752be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68587-missing-authorization-in-bob-watu-q-b2d3b854</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68587%3A%20Missing%20Authorization%20in%20Bob%20Watu%20Quiz&amp;severity=high&amp;id=694bea23279c98bf57f752bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68586-missing-authorization-in-gora-tech--e11fcfc2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68586%3A%20Missing%20Authorization%20in%20Gora%20Tech%20Cooked&amp;severity=high&amp;id=694bea23279c98bf57f752b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68585-missing-authorization-in-ben-balter-19e9ceaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68585%3A%20Missing%20Authorization%20in%20Ben%20Balter%20WP%20Document%20Revisions&amp;severity=high&amp;id=694bea23279c98bf57f752b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68584-cross-site-request-forgery-csrf-in--fbd9bc8d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68584%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Constantin%20Boiangiu%20Vimeotheque&amp;severity=high&amp;id=694bea23279c98bf57f752b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68583-cross-site-request-forgery-csrf-in--02da362c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68583%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tikweb%20Management%20Fast%20User%20Switching&amp;severity=high&amp;id=694bea21279c98bf57f7529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68582-missing-authorization-in-funnelform-baba8937</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68582%3A%20Missing%20Authorization%20in%20Funnelforms%20Funnelforms%20Free&amp;severity=high&amp;id=694bea21279c98bf57f75297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68581-missing-authorization-in-yithemes-y-6a15eea2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68581%3A%20Missing%20Authorization%20in%20YITHEMES%20YITH%20Slider%20for%20page%20builders&amp;severity=high&amp;id=694bea21279c98bf57f75294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68580-cross-site-request-forgery-csrf-in--8e5e1458</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68580%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pluginsware%20Advanced%20Classifieds%20%26%20Directory%20Pro&amp;severity=high&amp;id=694bea21279c98bf57f75291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68579-missing-authorization-in-foliovisio-b6436965</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68579%3A%20Missing%20Authorization%20in%20FolioVision%20FV%20Simpler%20SEO&amp;severity=high&amp;id=694bea21279c98bf57f7528e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68575-missing-authorization-in-wappointme-9d2aca1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68575%3A%20Missing%20Authorization%20in%20Wappointment%20team%20Wappointment&amp;severity=high&amp;id=694bea21279c98bf57f7528b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68574-improper-neutralization-of-input-du-ebee53be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20voidcoders%20WPBakery%20Visual%20Composer%20WHMCS%20Elements&amp;severity=medium&amp;id=694bea21279c98bf57f75288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68573-cross-site-request-forgery-csrf-in--7d187062</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68573%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alessandro%20Piconi%20Simple%20Keyword%20to%20Link&amp;severity=high&amp;id=694bea21279c98bf57f75285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68572-missing-authorization-in-spider-the-bc813c8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68572%3A%20Missing%20Authorization%20in%20Spider%20Themes%20BBP%20Core&amp;severity=high&amp;id=694bea21279c98bf57f75282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68571-missing-authorization-in-salesmanag-a18de078</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68571%3A%20Missing%20Authorization%20in%20SALESmanago%20SALESmanago%20%26%20Leadoo&amp;severity=high&amp;id=69cd7651e6bfc5ba1df0b2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68570-improper-neutralization-of-special--dfb7803e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68570%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20captivateaudio%20Captivate%20Sync&amp;severity=critical&amp;id=694bea21279c98bf57f7527f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68569-missing-authorization-in-codepeople-17c47c6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68569%3A%20Missing%20Authorization%20in%20codepeople%20WP%20Time%20Slots%20Booking%20Form&amp;severity=high&amp;id=694bea1e279c98bf57f75256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68568-missing-authorization-in-integratio-eedddb58</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68568%3A%20Missing%20Authorization%20in%20Claspo%20Popup%20Builders%20Claspo%20%E2%80%93%20Popups%2C%20Spin%20the%20Wheel%20%26%20Email%20Capture&amp;severity=high&amp;id=694bea1e279c98bf57f75253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68567-cross-site-request-forgery-csrf-in--001ee464</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68567%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=694bea1e279c98bf57f75250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68566-improper-neutralization-of-input-du-04d80a8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=medium&amp;id=694bea1e279c98bf57f7524d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68565-missing-authorization-in-jaybee-twi-49be1953</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68565%3A%20Missing%20Authorization%20in%20JayBee%20Twitch%20Player&amp;severity=critical&amp;id=694bea1e279c98bf57f7524a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68506-improper-control-of-filename-for-in-60e27d39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68506%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nawawi%20Jamili%20Docket%20Cache&amp;severity=critical&amp;id=694bea1e279c98bf57f75247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68038-deserialization-of-untrusted-data-i-36a7f7b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68038%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Icegram%20Icegram%20Express%20Pro&amp;severity=critical&amp;id=694bea1e279c98bf57f75244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67909-authorization-bypass-through-user-c-e45d875b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67909%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20Swings%20Membership%20For%20WooCommerce&amp;severity=high&amp;id=694bea1e279c98bf57f75241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67633-improper-neutralization-of-input-du-d52e2331</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67633%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brownbagmarketing%20Greenhouse%20Job%20Board&amp;severity=medium&amp;id=694bea1e279c98bf57f7523e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67632-improper-neutralization-of-input-du-acfaf597</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Plugin%20Factory%20Google%20AdSense%20for%20Responsive%20Design%20%26%238211%3B%20GARD&amp;severity=medium&amp;id=694bea1e279c98bf57f7523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67631-improper-neutralization-of-input-du-289ad904</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ecommerce%20Platforms%20Gift%20Hunt&amp;severity=medium&amp;id=694bea1c279c98bf57f751fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67630-improper-neutralization-of-input-du-5050b5d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webheadcoder%20WH%20Tweaks&amp;severity=medium&amp;id=694bea1c279c98bf57f751fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67629-improper-neutralization-of-input-du-c9760941</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basticom%20Basticom%20Framework&amp;severity=medium&amp;id=694bea1c279c98bf57f751f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67628-improper-neutralization-of-input-du-1dea10f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AMP-MODE%20Review%20Disclaimer&amp;severity=medium&amp;id=694bea1c279c98bf57f751f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67627-improper-neutralization-of-input-du-b5fad6a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TouchOfTech%20Draft%20Notify&amp;severity=medium&amp;id=694bea1c279c98bf57f751f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67625-cross-site-request-forgery-csrf-in--a85bb7c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67625%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tmtraderunner%20Trade%20Runner&amp;severity=high&amp;id=694bea1c279c98bf57f751ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67623-server-side-request-forgery-ssrf-in-19dd6f91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67623%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%206Storage%206Storage%20Rentals&amp;severity=critical&amp;id=694bea1c279c98bf57f751eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67622-cross-site-request-forgery-csrf-in--c3aba9d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67622%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20titopandub%20Evergreen%20Post%20Tweeter&amp;severity=high&amp;id=694bea1c279c98bf57f751e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67621-exposure-of-sensitive-system-inform-300cbe53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67621%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%2010up%20Eight%20Day%20Week%20Print%20Workflow&amp;severity=high&amp;id=694bea1c279c98bf57f751e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nomani-investment-scam-surges-62-using-ai-deepfake-df8f7f6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nomani%20Investment%20Scam%20Surges%2062%25%20Using%20AI%20Deepfake%20Ads%20on%20Social%20Media&amp;severity=medium&amp;id=694bfc755a2eea8446c1242a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54161-e7b46d71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54161&amp;severity=null&amp;id=695450bcdb813ff03e2bf882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54103-4d022dec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54103&amp;severity=null&amp;id=695450acdb813ff03e2bebf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54082-e3880816</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54082&amp;severity=null&amp;id=695450bcdb813ff03e2bf880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40679-cwe-862-missing-authorization-in-je-21216bf2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40679%3A%20CWE-862%20Missing%20Authorization%20in%20Jewel%20Theme%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=694be306279c98bf57efd5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32120-cwe-79-improper-neutralization-of-i-d07786cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Hostel&amp;severity=medium&amp;id=694be306279c98bf57efd5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28619-cwe-862-missing-authorization-in-bn-281a81ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28619%3A%20CWE-862%20Missing%20Authorization%20in%20bnayawpguy%20Resoto&amp;severity=medium&amp;id=694be306279c98bf57efd5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68608-missing-authorization-in-deluxethem-afcdec58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68608%3A%20Missing%20Authorization%20in%20DeluxeThemes%20Userpro&amp;severity=high&amp;id=694bdf8b279c98bf57ee5aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68563-improper-control-of-filename-for-in-88bf04c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68563%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20Subscribe%20to%20Unlock%20Lite&amp;severity=critical&amp;id=694bdf8b279c98bf57ee5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68540-improper-control-of-filename-for-in-5bc65fc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68540%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Fana&amp;severity=critical&amp;id=694bdf8b279c98bf57ee5ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68537-improper-control-of-filename-for-in-57d681ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68537%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Zota&amp;severity=critical&amp;id=694bdf8b279c98bf57ee5ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68535-missing-authorization-in-sunshineph-80ac8ddc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68535%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=critical&amp;id=694bdf8b279c98bf57ee5ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68533-improper-neutralization-of-input-du-20c724a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HasThemes%20WC%20Builder&amp;severity=medium&amp;id=694bdf88279c98bf57ee5779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68532-improper-neutralization-of-input-du-ca683309</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20modeltheme%20ModelTheme%20Addons%20for%20WPBakery%20and%20Elementor&amp;severity=medium&amp;id=694bdf88279c98bf57ee5776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68530-improper-control-of-filename-for-in-310b31ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68530%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pavothemes%20Bookory&amp;severity=critical&amp;id=694bdf88279c98bf57ee5773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68529-cross-site-request-forgery-csrf-in--bbd0073a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68529%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rhys%20Wynne%20WP%20Email%20Capture&amp;severity=high&amp;id=694bdf88279c98bf57ee5770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68528-improper-neutralization-of-input-du-dd800929</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Free%20Shipping%20Bar%3A%20Amount%20Left%20for%20Free%20Shipping%20for%20WooCommerce&amp;severity=medium&amp;id=694bdf88279c98bf57ee576d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68527-improper-neutralization-of-input-du-b6e1ad0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68527%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kodezen%20LLC%20Academy%20LMS&amp;severity=medium&amp;id=694bdf88279c98bf57ee576a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68525-improper-neutralization-of-input-du-49c67a1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Category%20Icon&amp;severity=medium&amp;id=694bdf88279c98bf57ee5767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68523-missing-authorization-in-spiffy-plu-fe61153d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68523%3A%20Missing%20Authorization%20in%20Spiffy%20Plugins%20Spiffy%20Calendar&amp;severity=high&amp;id=694bdf88279c98bf57ee5764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68519-improper-neutralization-of-special--89d8abea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68519%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BeRocket%20Brands%20for%20WooCommerce&amp;severity=critical&amp;id=694bdf88279c98bf57ee5761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68517-missing-authorization-in-essekia-ta-1adda1d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68517%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome&amp;severity=high&amp;id=694bdf88279c98bf57ee575e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68516-insertion-of-sensitive-information--5f260c3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68516%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Essekia%20Tablesome&amp;severity=high&amp;id=694bdf86279c98bf57ee5739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68513-improper-neutralization-of-input-du-f18e7e1c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68513%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Timeline%20Lite&amp;severity=medium&amp;id=694bdf86279c98bf57ee5736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68512-improper-neutralization-of-input-du-e518f476</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68512%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativeinteractivemedia%20Real%203D%20FlipBook&amp;severity=medium&amp;id=694bdf86279c98bf57ee5733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68511-missing-authorization-in-jegstudio--7b211a48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68511%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse%20Form&amp;severity=critical&amp;id=694bdf86279c98bf57ee5730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68509-url-redirection-to-untrusted-site-o-11879abd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68509%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Jeff%20Starr%20User%20Submitted%20Posts&amp;severity=medium&amp;id=694bdf86279c98bf57ee572d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68505-missing-authorization-in-icc0rz-h5p-eb4c9926</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68505%3A%20Missing%20Authorization%20in%20icc0rz%20H5P&amp;severity=high&amp;id=694bdf86279c98bf57ee572a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68500-server-side-request-forgery-ssrf-in-ddcb1747</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68500%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor&amp;severity=critical&amp;id=694bdf86279c98bf57ee5727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68497-improper-neutralization-of-input-du-74e13614</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68497%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Astra%20Widgets&amp;severity=medium&amp;id=694bdf86279c98bf57ee5724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68496-improper-neutralization-of-special--129f996e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68496%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Syed%20Balkhi%20User%20Feedback&amp;severity=critical&amp;id=694bdf86279c98bf57ee5721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68494-exposure-of-sensitive-system-inform-f13a9e04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68494%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=high&amp;id=694bdf86279c98bf57ee571e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54061-260db88a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54061&amp;severity=null&amp;id=695450bcdb813ff03e2bf886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54054-7169bde6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54054&amp;severity=null&amp;id=695450acdb813ff03e2bebee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-deep-dive-how-early-boot-dma-attacks-are-ba0ecb99</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Deep%20Dive%3A%20How%20Early-Boot%20DMA%20Attacks%20are%20bypassing%20IOMMU%20on%20modern%20UEFI%20systems&amp;severity=critical&amp;id=694bd1cbd92b37ea4884053d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attacks-are-evolving-3-ways-to-protect-your-busine-70c77822</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attacks%20are%20Evolving%3A%203%20Ways%20to%20Protect%20Your%20Business%20in%202026&amp;severity=medium&amp;id=694bd7b3d92b37ea488ac8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eurostar-accused-researchers-of-blackmail-for-repo-f0a44ae3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eurostar%20Accused%20Researchers%20of%20Blackmail%20for%20Reporting%20Serious%20AI%20Chatbot%20Vulnerabilities&amp;severity=high&amp;id=694bce40d92b37ea48822362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54029-f060d5c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54029&amp;severity=low&amp;id=695b99acdb813ff03e48b591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sec-files-charges-over-14-million-crypto-scam-usin-1112e1ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEC%20Files%20Charges%20Over%20%2414%20Million%20Crypto%20Scam%20Using%20Fake%20AI-Themed%20Investment%20Tips&amp;severity=medium&amp;id=694bc6d99aa9cfad4fc54f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57840-cwe-269-improper-privilege-manageme-db7f2da9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57840%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Honor%20Magic%20OS&amp;severity=low&amp;id=694b9152c9988d5885b407ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italy-fines-apple-986-million-over-att-rules-limit-19b0a03f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italy%20Fines%20Apple%20%E2%82%AC98.6%20Million%20Over%20ATT%20Rules%20Limiting%20App%20Store%20Competition&amp;severity=low&amp;id=694ba4ad8a0fdcaea830efc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13407-cwe-434-unrestricted-upload-of-file-51add803</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13407%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Gravity%20Forms&amp;severity=medium&amp;id=694b843854de1641bdb80e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linearizing-sha-256-via-fractional-modular-analysi-7cd38114</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linearizing%20SHA-256%20via%20fractional%20modular%20analysis%20(Kaoru%20Method)&amp;severity=medium&amp;id=694b7d3554de1641bdadf303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66444-cwe-79-improper-neutralization-of-i-600eea9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66444%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=high&amp;id=694b763354de1641bda79407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66445-cwe-306-missing-authentication-for--a6a62849</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66445%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=high&amp;id=694b736bce42f4d6d98ab670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13773-cwe-94-improper-control-of-generati-9e9b2019</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13773%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=critical&amp;id=694b6fe5ce42f4d6d986e053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15053-sql-injection-in-code-projects-stud-f5d42ed6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15053%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=694b66f1ce42f4d6d97d5045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15052-cross-site-scripting-in-code-projec-d3edc2df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15052%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=694b66f1ce42f4d6d97d503e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15050-unrestricted-upload-in-code-project-a4f6811e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15050%3A%20Unrestricted%20Upload%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=694b38e9b05e549e5d30882e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/availability-of-old-crypto-exchange-user-email-add-c2595c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Availability%20of%20old%20crypto%20exchange%20user%20email%20addresses%3F%20-%20Help%20to%20notify%20victims%20of%20the%20Bitfinex%20Hack%20-%20Now%20the%20largest%20forfeiture%20(113000%20Bitcoins)&amp;severity=medium&amp;id=694b2ef10a0f3cdd674eb766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-24-12cf5821</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-24&amp;severity=medium&amp;id=694c81775f4e95c0c3788b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60935-na-b350b626</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60935%3A%20n%2Fa&amp;severity=medium&amp;id=694c0d10550a31ae84bde24f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40317-na-f8358d37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40317%3A%20n%2Fa&amp;severity=medium&amp;id=694c098b550a31ae84b9ba42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39037-na-1ee7f50e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39037%3A%20n%2Fa&amp;severity=medium&amp;id=694c0608550a31ae84b6c52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35322-na-0ed41982</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35322%3A%20n%2Fa&amp;severity=medium&amp;id=694c0608550a31ae84b6c528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58335-cwe-611-improper-restriction-of-xml-955c09dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58335%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20jcthiele%20OpenXRechnungToolbox&amp;severity=medium&amp;id=694b7d3054de1641bdaded10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15049-sql-injection-in-code-projects-onli-e29fbcf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15049%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=694b21afd0b9012ffd6d18db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68696-cwe-918-server-side-request-forgery-bdfea579</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68696%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jnunemaker%20httparty&amp;severity=high&amp;id=694b21b0d0b9012ffd6d18e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68665-cwe-502-deserialization-of-untruste-ca398625</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68665%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langchainjs&amp;severity=high&amp;id=694b21afd0b9012ffd6d18e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-a-multi-stage-macos-infostealer-0b0922e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20a%20Multi-Stage%20macOS%20Infostealer&amp;severity=medium&amp;id=694b1e37d0b9012ffd6895af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68669-cwe-79-improper-neutralization-of-i-63086d96</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68669%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=694b1e31d0b9012ffd688bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68664-cwe-502-deserialization-of-untruste-afc7ade4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68664%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langchain&amp;severity=critical&amp;id=694b1e31d0b9012ffd688bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15048-command-injection-in-tenda-wh450-92b1c857</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15048%3A%20Command%20Injection%20in%20Tenda%20WH450&amp;severity=medium&amp;id=694b2534d0b9012ffd70d6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66213-cwe-78-improper-neutralization-of-s-1966d389</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66213%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b149ad69af40f3136cc82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66212-cwe-78-improper-neutralization-of-s-88cd29aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66212%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b149ad69af40f3136cc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guide-to-preventing-the-most-common-enterprise-soc-56f05de7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guide%20to%20preventing%20the%20most%20common%20enterprise%20social%20engineering%20attacks&amp;severity=medium&amp;id=694b149fd69af40f3136cce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15047-stack-based-buffer-overflow-in-tend-201507ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15047%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694b149ad69af40f3136cc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66211-cwe-78-improper-neutralization-of-s-d8597e5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66211%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b149ad69af40f3136cc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-gitlab-breach-exposes-data-of-21000-nissan-3cd215ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20GitLab%20breach%20exposes%20data%20of%2021%2C000%20Nissan%20customers&amp;severity=high&amp;id=694b1115d69af40f31320638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66210-cwe-78-improper-neutralization-of-s-38cb6bef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66210%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b1125d69af40f3132312c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12491-cwe-200-exposure-of-sensitive-infor-a302c821</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12491%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Senstar%20Symphony&amp;severity=high&amp;id=694b1125d69af40f31323131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66209-cwe-78-improper-neutralization-of-s-31b72d66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66209%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b1125d69af40f31323140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12840-cwe-122-heap-based-buffer-overflow--4ad434c2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12840%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Academy%20Software%20Foundation%20OpenEXR&amp;severity=high&amp;id=694b1125d69af40f3132313d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12839-cwe-122-heap-based-buffer-overflow--aed6601a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12839%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Academy%20Software%20Foundation%20OpenEXR&amp;severity=high&amp;id=694b1125d69af40f3132313a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12495-cwe-122-heap-based-buffer-overflow--24bbd9a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12495%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Academy%20Software%20Foundation%20OpenEXR&amp;severity=high&amp;id=694b1125d69af40f31323134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12838-cwe-59-improper-link-resolution-bef-4a4f503d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12838%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20MSP360%20Free%20Backup&amp;severity=high&amp;id=694b1125d69af40f31323137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13698-cwe-22-improper-limitation-of-a-pat-7d1fce6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13698%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Deciso%20OPNsense&amp;severity=medium&amp;id=694b0d93d69af40f312d385a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13715-cwe-502-deserialization-of-untruste-4b7a6668</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13715%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20FaceDetection-DSFD&amp;severity=high&amp;id=694b0d93d69af40f312d387e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13709-cwe-502-deserialization-of-untruste-f9c89a0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13709%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20TFace&amp;severity=high&amp;id=694b0d93d69af40f312d386a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13711-cwe-502-deserialization-of-untruste-ffa36311</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13711%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20TFace&amp;severity=high&amp;id=694b0d93d69af40f312d3872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13706-cwe-502-deserialization-of-untruste-d380745b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13706%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20PatrickStar&amp;severity=high&amp;id=694b0d93d69af40f312d385e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13708-cwe-502-deserialization-of-untruste-741519b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13708%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20NeuralNLP-NeuralClassifier&amp;severity=high&amp;id=694b0d93d69af40f312d3866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13716-cwe-502-deserialization-of-untruste-3f94be8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13716%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20MimicMotion&amp;severity=high&amp;id=694b0d95d69af40f312d389a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13714-cwe-502-deserialization-of-untruste-6024b824</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13714%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20MedicalNet&amp;severity=high&amp;id=694b0d93d69af40f312d387a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13710-cwe-502-deserialization-of-untruste-f6f65021</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13710%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20HunyuanVideo&amp;severity=high&amp;id=694b0d93d69af40f312d386e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13707-cwe-502-deserialization-of-untruste-4aaf9e74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13707%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20HunyuanDiT&amp;severity=high&amp;id=694b0d93d69af40f312d3862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13712-cwe-502-deserialization-of-untruste-0dffb87c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13712%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20HunyuanDiT&amp;severity=high&amp;id=694b0d93d69af40f312d3876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13713-cwe-502-deserialization-of-untruste-9d594f99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13713%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20Hunyuan3D-1&amp;severity=high&amp;id=694b0d95d69af40f312d38a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15046-stack-based-buffer-overflow-in-tend-bb8b390f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15046%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694b0d95d69af40f312d38a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13703-cwe-732-incorrect-permission-assign-54400d17</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13703%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20VIPRE%20Advanced%20Security&amp;severity=high&amp;id=694b0d95d69af40f312d389e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14414-cwe-356-product-ui-does-not-warn-us-bd621d58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14414%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0d95d69af40f312d38a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14415-cwe-356-product-ui-does-not-warn-us-d05e72cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14415%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a14d69af40f312b7df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14413-cwe-22-improper-limitation-of-a-pat-9750c4ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14413%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a14d69af40f312b7df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14412-cwe-356-product-ui-does-not-warn-us-e149b9c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14412%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a14d69af40f312b7df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14411-cwe-125-out-of-bounds-read-in-soda--16ad1dca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14411%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a14d69af40f312b7ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14410-cwe-125-out-of-bounds-read-in-soda--422d79ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14410%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a12d69af40f312b7db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14409-cwe-787-out-of-bounds-write-in-soda-aaf40247</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14409%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a12d69af40f312b7db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14408-cwe-125-out-of-bounds-read-in-soda--4d00ae35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14408%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a12d69af40f312b7dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14407-cwe-119-improper-restriction-of-ope-9a6bf049</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14407%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a12d69af40f312b7dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14406-cwe-427-uncontrolled-search-path-el-6b0ce000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14406%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a12d69af40f312b7da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14421-cwe-125-out-of-bounds-read-in-pdffo-45771e42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14421%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pdfforge%20PDF%20Architect&amp;severity=low&amp;id=694b0a14d69af40f312b7e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14420-cwe-22-improper-limitation-of-a-pat-cbe44120</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14420%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14419-cwe-119-improper-restriction-of-ope-8e33a1be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14419%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14418-cwe-356-product-ui-does-not-warn-us-1d40233a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14418%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14417-cwe-356-product-ui-does-not-warn-us-1f4cc08d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14417%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14416-cwe-356-product-ui-does-not-warn-us-b1fc5776</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14416%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14405-cwe-427-uncontrolled-search-path-el-9c217a53</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14405%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20PDFsam%20Enhanced&amp;severity=medium&amp;id=694b0a12d69af40f312b7da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14404-cwe-356-product-ui-does-not-warn-us-43ea9253</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14404%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14403-cwe-356-product-ui-does-not-warn-us-10cd75a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14403%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14402-cwe-356-product-ui-does-not-warn-us-b0d1ac32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14402%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14401-cwe-125-out-of-bounds-read-in-pdfsa-740f307e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14401%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14501-cwe-476-null-pointer-dereference-in-d2278806</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14501%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Sante%20PACS%20Server&amp;severity=high&amp;id=694b0a18d69af40f312b7e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14498-cwe-427-uncontrolled-search-path-el-a8aa08f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14498%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20TradingView%20Desktop&amp;severity=high&amp;id=694b0a18d69af40f312b7e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14494-cwe-749-exposed-dangerous-method-or-51ecad4e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14494%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14491-cwe-749-exposed-dangerous-method-or-e3145f40</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14491%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14489-cwe-749-exposed-dangerous-method-or-10cc5dbe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14489%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14490-cwe-749-exposed-dangerous-method-or-31ba8435</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14490%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14488-cwe-749-exposed-dangerous-method-or-10f24e49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14488%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14497-cwe-749-exposed-dangerous-method-or-c22ee38f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14497%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14495-cwe-749-exposed-dangerous-method-or-a4ac5c4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14495%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14493-cwe-749-exposed-dangerous-method-or-cd4a49c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14493%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14496-cwe-749-exposed-dangerous-method-or-cf9a401c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14496%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14492-cwe-749-exposed-dangerous-method-or-f2885f23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14492%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14932-cwe-121-stack-based-buffer-overflow-435a0656</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14932%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14933-cwe-190-integer-overflow-or-wraparo-47049827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14933%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14934-cwe-121-stack-based-buffer-overflow-b99bc4be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14934%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14935-cwe-122-heap-based-buffer-overflow--7b5e3188</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14935%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14936-cwe-121-stack-based-buffer-overflow-3de4cb37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14936%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14925-cwe-502-deserialization-of-untruste-330be640</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14925%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Accelerate&amp;severity=high&amp;id=694b064e4eddf7475afca179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14922-cwe-502-deserialization-of-untruste-903b28bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14922%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Diffusers&amp;severity=high&amp;id=694b064e4eddf7475afca173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14931-cwe-502-deserialization-of-untruste-f426cae4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14931%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20smolagents&amp;severity=critical&amp;id=694b06504eddf7475afca195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14930-cwe-502-deserialization-of-untruste-99c41a0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14930%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14928-cwe-94-improper-control-of-generati-c1738c78</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14928%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14924-cwe-502-deserialization-of-untruste-050f3747</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14924%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14920-cwe-502-deserialization-of-untruste-a0d964d8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14920%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14926-cwe-94-improper-control-of-generati-c5732c31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14926%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14927-cwe-94-improper-control-of-generati-4d47d1eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14927%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14921-cwe-502-deserialization-of-untruste-cacb5701</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14921%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14929-cwe-502-deserialization-of-untruste-73e34153</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14929%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15045-stack-based-buffer-overflow-in-tend-0cd0200a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15045%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694b06504eddf7475afca1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11419-allocation-of-resources-without-lim-bd726837</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11419%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=694aff404eddf7475af4bf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15044-stack-based-buffer-overflow-in-tend-3c7e80e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15044%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694aff404eddf7475af4bf93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53982-improper-neutralization-of-special--2e3e8b04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53982%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sigb%20PMB&amp;severity=critical&amp;id=694af0d43b03476441e1a525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-knocks-offline-frances-postal-banking--a5e5f306</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20knocks%20offline%20France&apos;s%20postal%2C%20banking%20services&amp;severity=high&amp;id=694ae2c73b03476441d427fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-chrome-extensions-caught-secretly-stealing-cre-30cc9d50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Chrome%20Extensions%20Caught%20Secretly%20Stealing%20Credentials%20from%20Over%20170%20Sites&amp;severity=high&amp;id=694ae2c73b03476441d427fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-stealer-disguised-as-trusted-mac-app-h-4133f791</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20Stealer%20Disguised%20as%20Trusted%20Mac%20App%20Hunts%20Your%20Saved%20Passwords&amp;severity=medium&amp;id=694ad8d52a62208f8b330ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33222-cwe-798-use-of-hard-coded-credentia-89cf704b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33222%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20NVIDIA%20Isaac%20Launchable&amp;severity=critical&amp;id=694acf18a81ab5ceedee7e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33223-cwe-250-execution-with-unnecessary--627533aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33223%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20NVIDIA%20Isaac%20Launchable&amp;severity=critical&amp;id=694acf18a81ab5ceedee7e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33224-cwe-250-execution-with-unnecessary--af7b58e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33224%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20NVIDIA%20Isaac%20Launchable&amp;severity=critical&amp;id=694acf18a81ab5ceedee7e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2025-holiday-scams-docusign-phishing-meets-loan-sp-af1eedb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2025%20Holiday%20Scams%3A%20Docusign%20Phishing%20Meets%20Loan%20Spam&amp;severity=medium&amp;id=694ad1d72a62208f8b2cf541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-chrome-extensions-caught-secretly-stealing-cre-cbf3b7bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Chrome%20Extensions%20Caught%20Secretly%20Stealing%20Credentials%20from%20Over%20170%20Sites&amp;severity=medium&amp;id=694abd65e971240e2a7b89a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9684-cwe-119-improper-restriction-of-oper-c53b4ea4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9684%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20FreyrSCADA%20IEC-60870-5-104&amp;severity=high&amp;id=694aac52a6db0d9209ededd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-hits-romanian-water-authority-1000-syst-d08e6bf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Hits%20Romanian%20Water%20Authority%2C%201000%20Systems%20Knocked%20Offline&amp;severity=medium&amp;id=694a9e45a6db0d9209e0a479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13183-cwe-79-improper-neutralization-of-i-b694b461</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Hotech%20Software%20Inc.%20Otello&amp;severity=high&amp;id=694a96bf8594d4628a6218f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nissan-confirms-impact-from-red-hat-data-breach-b6230865</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nissan%20Confirms%20Impact%20From%20Red%20Hat%20Data%20Breach&amp;severity=medium&amp;id=694a8c348594d4628a576146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feds-seize-password-database-used-in-massive-bank--207ad22c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feds%20Seize%20Password%20Database%20Used%20in%20Massive%20Bank%20Account%20Takeover%20Scheme&amp;severity=medium&amp;id=694a88b570354fdeefe463bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24844-cwe-862-missing-authorization-in-id-0a5f922a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24844%3A%20CWE-862%20Missing%20Authorization%20in%20IdeaBox%20Creations%20PowerPack%20Pro%20for%20Elementor&amp;severity=high&amp;id=694a88f670354fdeefe4c6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52210-vulnerability-in-tyche-softwares-pr-a2c1afa9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52210%3A%20Vulnerability%20in%20Tyche%20softwares%20Product%20Delivery%20Date%20for%20WooCommerce%20%E2%80%93%20Lite&amp;severity=medium&amp;id=694a88f670354fdeefe4c6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68546-cwe-98-improper-control-of-filename-4fc99eea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68546%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Nika&amp;severity=null&amp;id=694a88f670354fdeefe4c6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68544-cwe-98-improper-control-of-filename-ba5e03d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68544%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=null&amp;id=694a855570354fdeefe116a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68548-cwe-79-improper-neutralization-of-i-a7e1cdbe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=null&amp;id=694a855570354fdeefe116ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68550-cwe-89-improper-neutralization-of-s-d09e4513</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68550%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VillaTheme%20WPBulky&amp;severity=null&amp;id=694a855570354fdeefe116ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68551-cwe-497-exposure-of-sensitive-syste-893513b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68551%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=694a81d070354fdeefdcefb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68556-cwe-862-missing-authorization-in-vi-dc415fa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68556%3A%20Missing%20Authorization%20in%20VillaTheme%20HAPPY&amp;severity=null&amp;id=694a81d070354fdeefdcefb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68557-cwe-862-missing-authorization-in-vi-5dcfeed1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68557%3A%20Missing%20Authorization%20in%20Vikas%20Ratudi%20Chakra%20test&amp;severity=null&amp;id=694a81d070354fdeefdcefbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68559-cwe-79-improper-neutralization-of-i-1eb5b8e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=null&amp;id=694a81d070354fdeefdcefc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68560-cwe-98-improper-control-of-filename-59c77b4d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68560%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=null&amp;id=694a81d070354fdeefdcefc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interpol-arrests-574-in-africa-ukrainian-ransomwar-81ec7e57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=INTERPOL%20Arrests%20574%20in%20Africa%3B%20Ukrainian%20Ransomware%20Affiliate%20Pleads%20Guilty&amp;severity=medium&amp;id=694a882670354fdeefe3b3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68561-cwe-89-improper-neutralization-of-s-59c2fc04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68561%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ruben%20Garcia%20AutomatorWP&amp;severity=null&amp;id=694a81d070354fdeefdcefc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59886-cwe-20-improper-input-validation-in-2d4c1c69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59886%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Eaton%20Eaton%20xComfort%20ECI&amp;severity=high&amp;id=694a81d070354fdeefdcefbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/passwd-a-walkthrough-of-the-google-workspace-passw-1f9ca260</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Passwd%3A%20A%20walkthrough%20of%20the%20Google%20Workspace%20Password%20Manager&amp;severity=medium&amp;id=694a882670354fdeefe3b3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14635-cwe-79-improper-neutralization-of-i-722f1448</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14635%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=694a88f670354fdeefe4c6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14000-cwe-79-improper-neutralization-of-i-b54c07cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=694a88f670354fdeefe4c6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pirate-group-annas-archive-copies-256-million-spot-722bf333</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pirate%20Group%20Anna%E2%80%99s%20Archive%20Copies%20256%20Million%20Spotify%20Songs%20in%20Data%20Scrape&amp;severity=medium&amp;id=694a7ace70354fdeefd70248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-flaw-cvss-99-enables-arbitrary-code-e-dac31bf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Flaw%20(CVSS%209.9)%20Enables%20Arbitrary%20Code%20Execution%20Across%20Thousands%20of%20Instances&amp;severity=critical&amp;id=694a77833c0d0694898a009b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-doj-seizes-fraud-domain-behind-146-million-bank-7bb19014</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20DoJ%20Seizes%20Fraud%20Domain%20Behind%20%2414.6%20Million%20Bank%20Account%20Takeover%20Scheme&amp;severity=high&amp;id=694a77833c0d0694898a009f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/baker-university-says-2024-data-breach-impacts-530-6582b7cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Baker%20University%20says%202024%20data%20breach%20impacts%2053%2C000%20people&amp;severity=high&amp;id=694a77833c0d0694898a0093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-with-56000-downloads-steals-whatsapp-c-7a751ca4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Package%20With%2056%2C000%20Downloads%20Steals%20WhatsApp%20Credentials%2C%20Data&amp;severity=medium&amp;id=694a77573c0d06948989e89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/turning-list-unsubscribe-into-an-ssrfxss-gadget-e71ff148</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Turning%20List-Unsubscribe%20into%20an%20SSRF%2FXSS%20Gadget&amp;severity=medium&amp;id=694a6cf23c0d0694897f6e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italy-antitrust-agency-fines-apple-116-million-ove-1faa2894</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italy%20Antitrust%20Agency%20Fines%20Apple%20%24116%20Million%20Over%20Privacy%20Feature%3B%20Apple%20Announces%20Appeal&amp;severity=medium&amp;id=694a6cd03c0d0694897f57e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-bans-foreign-made-drones-and-key-parts-over-us-251b166f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Bans%20Foreign-Made%20Drones%20and%20Key%20Parts%20Over%20U.S.%20National%20Security%20Risks&amp;severity=high&amp;id=694a69643c0d0694897b184c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-a-flaw-in-digiever-ds-2105-pro-to-its-550b672f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20a%20flaw%20in%20Digiever%20DS-2105%20Pro%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=694a69643c0d0694897b1850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/574-arrested-3-million-seized-in-crackdown-on-afri-2aecf863</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=574%20Arrested%2C%20%243%20Million%20Seized%20in%20Crackdown%20on%20African%20Cybercrime%20Rings&amp;severity=medium&amp;id=694a62a1033f6f66d7774d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14388-cwe-158-improper-neutralization-of--469918d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14388%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20kiboit%20PhastPress&amp;severity=critical&amp;id=694a62c0033f6f66d77784e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12934-cwe-862-missing-authorization-in-be-58e0e17f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12934%3A%20CWE-862%20Missing%20Authorization%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=high&amp;id=694a62c0033f6f66d77784cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14163-cwe-352-cross-site-request-forgery--eb1639ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14163%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20leap13%20Premium%20Addons%20for%20Elementor%20%E2%80%93%20Powerful%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=694a62c0033f6f66d77784db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14548-cwe-79-improper-neutralization-of-i-b8f90af3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14548%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kieranoshea%20Calendar&amp;severity=medium&amp;id=694a62c0033f6f66d77784e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14155-cwe-862-missing-authorization-in-le-fcfd4c9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14155%3A%20CWE-862%20Missing%20Authorization%20in%20leap13%20Premium%20Addons%20for%20Elementor%20%E2%80%93%20Powerful%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=694a62c0033f6f66d77784d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-doj-seizes-fraud-domain-behind-146-million-bank-d3911225</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20DoJ%20Seizes%20Fraud%20Domain%20Behind%20%2414.6%20Million%20Bank%20Account%20Takeover%20Scheme&amp;severity=medium&amp;id=694a76ef3c0d0694898962fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-flaw-cvss-99-enables-arbitrary-code-e-e75bd99b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Flaw%20(CVSS%209.9)%20Enables%20Arbitrary%20Code%20Execution%20Across%20Thousands%20of%20Instances&amp;severity=critical&amp;id=694a54f9ef649361abadc9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/35-million-affected-by-university-of-phoenix-data--73c7ea66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3.5%20Million%20Affected%20by%20University%20of%20Phoenix%20Data%20Breach&amp;severity=medium&amp;id=694a4707ef649361ab9ffec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-bans-foreign-made-drones-and-key-parts-over-us-4fba9572</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Bans%20Foreign-Made%20Drones%20and%20Key%20Parts%20Over%20U.S.%20National%20Security%20Risks&amp;severity=critical&amp;id=694a4007576fb14eec735518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-disrupts-frances-postal-service-and-ba-f2ab1950</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20Disrupts%20France%E2%80%99s%20Postal%20Service%20and%20Banking%20During%20Christmas%20Rush&amp;severity=medium&amp;id=694a2f701ebffca81fee60cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macsync-stealer-evolves-from-clickfix-to-code-sign-22a6d93c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacSync%20Stealer%20Evolves%3A%20From%20ClickFix%20to%20Code-Signed%20Swift%20Malware&amp;severity=medium&amp;id=694a5f2d033f6f66d772eb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trial-error-and-typos-why-some-malware-attacks-are-8fea923a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trial%2C%20Error%2C%20and%20Typos%3A%20Why%20Some%20Malware%20Attacks%20Aren&apos;t%20as%20&apos;Sophisticated&apos;%20as%20You%20Think&amp;severity=medium&amp;id=694a5f2d033f6f66d772eb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-malware-dropper-evades-macos-gatekeepe-3ecdfa66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20malware%20dropper%20evades%20macOS%20Gatekeeper%20checks&amp;severity=high&amp;id=6949f6592404c2324fd731d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nissan-says-thousands-of-customers-exposed-in-red--fc220f6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nissan%20says%20thousands%20of%20customers%20exposed%20in%20Red%20Hat%20breach&amp;severity=high&amp;id=6949f6592404c2324fd731c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15034-sql-injection-in-itsourcecode-stude-a1536eb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15034%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694a15813b5cae87d6da8425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67743-cwe-918-server-side-request-forgery-7319c56c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67743%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LearningCircuit%20local-deep-research&amp;severity=medium&amp;id=694a15813b5cae87d6da842c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-23-bf1bb18f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-23&amp;severity=medium&amp;id=694b2edc0a0f3cdd674e7536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65354-na-20a3c195</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65354%3A%20n%2Fa&amp;severity=critical&amp;id=694af4523b03476441e587e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25364-na-b2a1931e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25364%3A%20n%2Fa&amp;severity=high&amp;id=694adfdf2a62208f8b3adbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51511-na-3ce435fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51511%3A%20n%2Fa&amp;severity=critical&amp;id=694ad8e82a62208f8b331179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65410-na-f1c896cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65410%3A%20n%2Fa&amp;severity=medium&amp;id=694acb94a81ab5ceedeb10c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65713-na-c0df9882</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65713%3A%20n%2Fa&amp;severity=medium&amp;id=694ac811a81ab5ceede6bf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57521-na-37e5a65a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57521%3A%20n%2Fa&amp;severity=critical&amp;id=694ac811a81ab5ceede6bf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29228-na-4201ef46</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29228%3A%20n%2Fa&amp;severity=critical&amp;id=694ac48ca81ab5ceede4f327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67111-na-bd2b6c90</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67111%3A%20n%2Fa&amp;severity=high&amp;id=694ac115a81ab5ceede10cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50526-na-2157bbff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50526%3A%20n%2Fa&amp;severity=critical&amp;id=694ac115a81ab5ceede10ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45493-na-65f2c3b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45493%3A%20n%2Fa&amp;severity=medium&amp;id=694ac115a81ab5ceede10cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29229-na-2b83df69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29229%3A%20n%2Fa&amp;severity=critical&amp;id=694ac115a81ab5ceede10cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65865-na-83c35a2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65865%3A%20n%2Fa&amp;severity=high&amp;id=694abdbbe971240e2a7c28e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67109-na-443d973e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67109%3A%20n%2Fa&amp;severity=critical&amp;id=694ab6b2e971240e2a747f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67108-na-09aab092</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67108%3A%20n%2Fa&amp;severity=critical&amp;id=694ab6b2e971240e2a747eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66845-na-97607a2a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66845%3A%20n%2Fa&amp;severity=medium&amp;id=694aa1c2a6db0d9209e4958a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-supabase-is-public-33d270ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Supabase%20Is%20Public&amp;severity=medium&amp;id=6949c93566e722bb4ceafa62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53964-missing-authentication-for-critical-736117f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53964%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=high&amp;id=6949bf36edc45005c15e342d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53963-improper-neutralization-of-special--558d1744</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53963%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=critical&amp;id=6949bf36edc45005c15e3427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53962-improper-limitation-of-a-pathname-t-dd85bb58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53962%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=high&amp;id=6949bf36edc45005c15e3421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53961-cross-site-request-forgery-csrf-in--847bb2d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53961%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=medium&amp;id=6949bf36edc45005c15e341b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53960-improper-neutralization-of-special--30f07277</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53960%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=critical&amp;id=6949bf36edc45005c15e3415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53955-authorization-bypass-through-user-c-31e53ed8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53955%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=critical&amp;id=6949bf35edc45005c15e340f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53981-improper-neutralization-of-special--e3263d1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53981%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20thibaud-rohmer%20PhotoShow&amp;severity=high&amp;id=6949bf39edc45005c15e34ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53978-improper-neutralization-of-input-du-2793ae8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mybb%20myBB%20forums&amp;severity=medium&amp;id=6949bf37edc45005c15e348a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53977-improper-neutralization-of-input-du-db59c6e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53977%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mybb%20myBB%20forums&amp;severity=medium&amp;id=6949bf37edc45005c15e3485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53976-improper-neutralization-of-input-du-852834e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53976%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mybb%20myBB%20forums&amp;severity=medium&amp;id=6949bf37edc45005c15e3480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53975-improper-neutralization-of-special--2a4e2592</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53975%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thedigicraft%20Atom%20CMS&amp;severity=critical&amp;id=6949bf37edc45005c15e347b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53974-missing-authentication-for-critical-e2a4778b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53974%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20D-Link%20DSL-124%20Wireless%20N300%20ADSL2%2B&amp;severity=high&amp;id=6949bf37edc45005c15e3475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53973-incorrect-privilege-assignment-in-z-606a5e3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53973%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Zillya%20Zillya%20Total%20Security&amp;severity=high&amp;id=6949bf37edc45005c15e3470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53972-improper-neutralization-of-special--85c7b79d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53972%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20luiswang%20WebTareas&amp;severity=critical&amp;id=6949bf37edc45005c15e346b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53971-unrestricted-upload-of-file-with-da-4270a38c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53971%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20luiswang%20WebTareas&amp;severity=high&amp;id=6949bf37edc45005c15e3466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53970-missing-authentication-for-critical-c3b85a4c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53970%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=high&amp;id=6949bf37edc45005c15e345f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53969-missing-authentication-for-critical-9e6961c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53969%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=critical&amp;id=6949bf37edc45005c15e3458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53968-missing-authentication-for-critical-a38eefbf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53968%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=critical&amp;id=6949bf36edc45005c15e3446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53967-missing-authentication-for-critical-6938aa98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53967%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=critical&amp;id=6949bf36edc45005c15e343f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53966-use-of-externally-controlled-format-cd173db7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53966%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20SOUND4%20Ltd.%20SOUND4%20LinkAndShare%20Transmitter&amp;severity=critical&amp;id=6949bf36edc45005c15e3439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53965-unquoted-search-path-or-element-in--7cdd93c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53965%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20SOUND4%20Ltd.%20SOUND4%20Server%20Service&amp;severity=high&amp;id=6949bf36edc45005c15e3433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68476-cwe-22-improper-limitation-of-a-pat-ba1a9014</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68476%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kedacore%20keda&amp;severity=high&amp;id=6949bf39edc45005c15e34dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68475-cwe-1333-inefficient-regular-expres-65a715a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68475%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20fedify-dev%20fedify&amp;severity=high&amp;id=6949bb2eedc45005c15a5728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34457-cwe-121-stack-based-buffer-overflow-f17fe992</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34457%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20wb2osz%20Dire%20Wolf&amp;severity=high&amp;id=6949bb2eedc45005c15a571c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34458-cwe-617-reachable-assertion-in-wb2o-7d8e8cd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34458%3A%20CWE-617%20Reachable%20Assertion%20in%20wb2osz%20Dire%20Wolf&amp;severity=high&amp;id=6949bb2eedc45005c15a5722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68480-cwe-405-asymmetric-resource-consump-86b8f8d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68480%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20marshmallow-code%20marshmallow&amp;severity=medium&amp;id=6949bf39edc45005c15e34e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interpol-led-action-decrypts-6-ransomware-strains--0779daf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interpol-led%20action%20decrypts%206%20ransomware%20strains%2C%20arrests%20hundreds&amp;severity=high&amp;id=69499cf3c525bff625e6a22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romanian-water-authority-hit-by-ransomware-attack--e161185b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Romanian%20water%20authority%20hit%20by%20ransomware%20attack%20over%20weekend&amp;severity=high&amp;id=69499cf3c525bff625e6a231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-package-steals-whatsapp-accounts-and-aabdb973</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20package%20steals%20WhatsApp%20accounts%20and%20messages&amp;severity=high&amp;id=69499cf3c525bff625e6a235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urban-vpn-proxy-spies-on-ai-chatbot-conversations-6bc24134</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Urban%20VPN%20Proxy%20Spies%20on%20AI%20Chatbot%20Conversations&amp;severity=medium&amp;id=69499cf3c525bff625e6a239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thank-you-reddit-ubroadexample-updated-version-of--c1a8a589</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thank%20you%20reddit%20(u%2Fbroadexample)%20-%20updated%20version%20of%20my%20STIX%20feed&amp;severity=medium&amp;id=69499d45c525bff625e767b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-websites-can-detection-vision-based-ai-agents--d3672297</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Websites%20can%20detection%20Vision-Based%20AI%20Agents%20like%20Claude%20Computer%20Use%20and%20OpenAI%20Operator&amp;severity=medium&amp;id=694995f2c525bff625de514f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15033-cwe-639-authorization-bypass-throug-4f0a7ed6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15033%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Automattic%20WooCommerce&amp;severity=medium&amp;id=69499d40c525bff625e76670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/19-vulnerabilities-pocs-for-the-mediatek-mt7622-wi-2bb67e74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=19%2B%20Vulnerabilities%20%2B%20PoCs%20for%20the%20MediaTek%20MT7622%20Wifi%20Driver&amp;severity=medium&amp;id=69499281c525bff625dc98a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jetpack-image-sitemap-enumerates-historical-wp-med-bb4ffab6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jetpack%20image%20sitemap%20enumerates%20historical%20WP%20media%20content%20even%20when%20not%20present%20in%20published%20HTML%20(timeleak%20pattern)&amp;severity=medium&amp;id=69499265c525bff625dc87fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-breach-affecting-337-million-users-raises--b92d76a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20breach%20affecting%2033.7%20million%20users%20raises%20data%20protection%20questions&amp;severity=high&amp;id=694981a35b5b68b8f5d32598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-phoenix-data-breach-impacts-nearly-3-1c3f7338</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Phoenix%20data%20breach%20impacts%20nearly%203.5%20million%20individuals&amp;severity=high&amp;id=694981a35b5b68b8f5d3258c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-national-pleads-guilty-in-nefilim-ransom-898ad26c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20National%20Pleads%20Guilty%20in%20Nefilim%20Ransomware%20Conspiracy&amp;severity=medium&amp;id=69497e2c5b5b68b8f5cf2c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indian-income-tax-themed-phishing-campaign-targets-396dda1d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indian%20Income%20Tax-Themed%20Phishing%20Campaign%20Targets%20Local%20Businesses&amp;severity=medium&amp;id=694a5f2d033f6f66d772eb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ung0801-tracking-threat-clusters-obsessed-with-av--2217646d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNG0801%3A%20Tracking%20Threat%20Clusters%20obsessed%20with%20AV%20Icon%20Spoofing%20targeting%20Israel&amp;severity=medium&amp;id=694a5f2d033f6f66d772eafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-whatsapp-api-package-on-npm-steals-messages-c-b35e8a61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20WhatsApp%20API%20Package%20on%20npm%20Steals%20Messages%2C%20Contacts%2C%20and%20Login%20Tokens&amp;severity=medium&amp;id=69498cbc5b5b68b8f5deea6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frogblight-malware-targets-android-users-with-fake-860ebbec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frogblight%20Malware%20Targets%20Android%20Users%20With%20Fake%20Court%20and%20Aid%20Apps&amp;severity=medium&amp;id=694970f3d6cb72e86e3c39ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10021-cwe-457-use-of-uninitialized-variab-892ca771</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10021%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Open%20Design%20Alliance%20ODA%20Drawings%20SDK%20-%20All%20Versions%20%3C%202026.12&amp;severity=high&amp;id=69496a9ea3c8169c9ce67026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-caught-a-rust-ddos-botnet-on-my-honeypot-reverse-281667c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20caught%20a%20Rust%20DDoS%20botnet%20on%20my%20honeypot%2C%20reverse%20engineered%20it%2C%20and%20now%20I&apos;m%20monitoring%20its%20targets%20in%20real-time&amp;severity=medium&amp;id=69496aa1a3c8169c9ce67036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61740-cwe-346-origin-validation-error-in--32ecdd5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61740%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Johnson%20Controls%20IQ%20Panels2%2C%202%2B%2C%20IQHub%2C%20IQPanel%204%2C%20PowerG&amp;severity=high&amp;id=694959ea89a9ac879c469573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26379-cwe-338-use-of-cryptographically-we-dd645ed4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26379%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Johnson%20Controls%20IQ%20Panels2%2C%202%2B%2C%20IQHub%2C%20IQPanel%204%2C%20PowerG&amp;severity=high&amp;id=694955df89a9ac879c424572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/54-charged-in-us-over-atm-attacks-involving-ploutu-2cc855e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ATM%20Hackers%20Using%20%E2%80%98Ploutus%E2%80%99%20Malware%20Charged%20in%20US&amp;severity=medium&amp;id=69494ec789a9ac879c3b6f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14018-cwe-428-unquoted-search-path-or-ele-d1a2df04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14018%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20NetBT%20Consulting%20Services%20Inc.%20e-Fatura&amp;severity=high&amp;id=69494ee289a9ac879c3b8d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macsync-macos-malware-distributed-via-signed-swift-d5c63753</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacSync%20macOS%20Malware%20Distributed%20via%20Signed%20Swift%20Application&amp;severity=medium&amp;id=69494186120b5bbb4ee44c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-popular-monitoring-tool-nezha-as-a-s-4fde7c18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20Popular%20Monitoring%20Tool%20Nezha%20as%20a%20Stealth%20Trojan&amp;severity=medium&amp;id=6949419d120b5bbb4ee45867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/22nd-december-threat-intelligence-report-94c45600</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=22nd%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69493e10120b5bbb4ee25d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-firewall-exploits-ai-data-theft-andro-770aa404</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Firewall%20Exploits%2C%20AI%20Data%20Theft%2C%20Android%20Hacks%2C%20APT%20Attacks%2C%20Insider%20Leaks%20%26%20More&amp;severity=medium&amp;id=694937e70a7f5b66fcfa78e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/insider-threat-hackers-offering-cash-for-company-i-f174e3ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Insider%20Threat%3A%20Hackers%20Offering%20Cash%20for%20Company%20Insiders%20to%20Bypass%20Security&amp;severity=medium&amp;id=694933e20a7f5b66fcf615ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54890-cwe-79-improper-neutralization-of-i-070f5001</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=694929690a7f5b66fcebbfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12514-cwe-89-improper-neutralization-of-s-b03e453a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12514%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring%20-%20Open-tickets&amp;severity=high&amp;id=694926ef9679ab05af621755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-nefilim-ransomware-affiliate-pleads-guil-376563e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Nefilim%20Ransomware%20Affiliate%20Pleads%20Guilty%20in%20US&amp;severity=medium&amp;id=694926d69679ab05af620d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8460-cwe-79-improper-neutralization-of-in-4bf5a4a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=694926ef9679ab05af621758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/waymo-suspends-service-after-power-outage-hit-san--3d6fd441</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Waymo%20suspends%20service%20after%20power%20outage%20hit%20San%20Francisco&amp;severity=medium&amp;id=69491f509679ab05af5852d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-sydney-discloses-a-data-breach-impac-db43eafe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Sydney%20discloses%20a%20data%20breach%20impacting%2027%2C000%20people&amp;severity=high&amp;id=69491f509679ab05af5852d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-hacker-admits-affiliate-role-in-nefilim--60cd7b60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20hacker%20admits%20affiliate%20role%20in%20Nefilim%20ransomware%20gang&amp;severity=high&amp;id=69491f509679ab05af5852d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61739-cwe-323-reusing-a-nonce-key-pair-in-b4f9f167</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61739%3A%20CWE-323%20Reusing%20a%20Nonce%2C%20Key%20pair%20in%20encryption%20in%20Johnson%20Controls%20IQ%20Panels2%2C%202%2B%2C%20IQHub%2C%20IQPanel%204%2C%20PowerG&amp;severity=high&amp;id=69491f829679ab05af587010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61738-cwe-319-cleartext-transmission-of-s-226a1fc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61738%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Johnson%20Controls%20IQPanel2%2C%09IQHub%2CIQPanel2%2B%2CIQPanel%204%2CPowerG&amp;severity=low&amp;id=69491bd19679ab05af567f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62094-cwe-79-improper-neutralization-of-i-361917d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20voidthemes%20Void%20Elementor%20WHMCS%20Elements%20For%20Elementor%20Page%20Builder&amp;severity=null&amp;id=694915f817ee8e546cf7ec93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watchguard-patches-firebox-zero-day-exploited-in-t-8e6753b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WatchGuard%20Patches%20Firebox%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=694915d517ee8e546cf7bcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62107-cwe-352-cross-site-request-forgery--eac51b26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62107%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PluginOps%20Feather%20Login%20Page&amp;severity=null&amp;id=694915f817ee8e546cf7ec96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62880-cwe-352-cross-site-request-forgery--ece79c6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62880%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kunal%20Custom%20404%20Pro&amp;severity=null&amp;id=694915f817ee8e546cf7ec99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-government-acknowledges-it-is-investigating-cyb-618545e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Government%20Acknowledges%20It%20Is%20Investigating%20Cyber%20Incident%20After%20Media%20Reports&amp;severity=low&amp;id=69490aac17ee8e546cec44ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8305-cwe-200-exposure-of-sensitive-inform-0faa840c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8305%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor.%20in%20checkpoint%20Identity%20Awareness&amp;severity=medium&amp;id=6948fd2e2cf13c7ddd47406e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8304-cwe-200-exposure-of-sensitive-inform-698100f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8304%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor.%20in%20checkpoint%20Identity%20Agent&amp;severity=medium&amp;id=6948fd2e2cf13c7ddd474071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-operations-merge-droppers-sms-thef-28c10803</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20Operations%20Merge%20Droppers%2C%20SMS%20Theft%2C%20and%20RAT%20Capabilities%20at%20Scale&amp;severity=medium&amp;id=6948f3514c0b8833c8a1e25e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11545-cwe-497-exposure-of-sensitive-syste-092c5862</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11545%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-PA1705UL-W%2C%20NP-PA1705UL-W%2B%2C%20NP-PA1705UL-B%2C%20NP-PA1705UL-B%2B%2C%20NP-PA1505UL-W%2C%20NP-PA1505UL-W%2B%2C%20NP-PA1505UL-B%2C%20NP-PA1505UL-B%2B%2C%20NP-PA1505UL-BJL%20NP-PV800UL-W%2C%20NP-PV800UL-W%2B%2C%20NP-PV800UL-B%2C%20NP-PV800UL-B%2B%2C%20NP-PV710UL-W%2C%20NP-PV710UL-W%2B%2C%20NP-PV710UL-B%2C%20NP-PV710UL-B%2B%2C%20NP-PV800UL-W1%2C%20NP-PV800UL-B1%2C%20NP-PV710UL-W1%2C%20NP-PV710UL-B1%2C%20NP-PV800UL-B1G%2C%20NP-PV710UL-B1G%2C%20NP-PV800UL-WH%2C%20NP-PV710UL-WH%2C%20NP-P627UL%2C%20NP-P627ULG%2C%20NP-P627UL%2B%2C%20NP-P547UL%2C%20NP-P547ULG%2C%20NP-P607UL%2B%2C%20NP-CG6600UL%2C%20NP-H6271UL%2C%20NP-H5471UL%2C%20NP-P627ULH%2C%20NP-P547ULH%20NP-PV710UL%2B%20NP-PA1004UL-W%2C%20NP-PA1004UL-WG%2C%20NP-PA1004UL-W%2B%2C%20NP-PA1004UL-WH%2C%20NP-PA1004UL-B%2C%20NP-PA1004UL-BG%2C%20NP-PA1004UL-B%2B%2C%20NP-PA804UL-W%2C%20NP-PA804UL-WG%2C%20NP-PA804UL-W%2B%2C%20NP-PA804UL-WH%2C%20NP-PA804UL-B%2C%20NP-PA804UL-BG%2C%20NP-PA804UL-B%2B%2C%20NP-PA1004UL-BH%2C%20NP-PA804UL-BH%2C%20NP-PE455UL%2C%20NP-PE455ULG%2C%20NP-PE455WL%2C%20NP-PE455WLG%2C%20NP-PE505XLG%2C%20NP-CG6500XL%2C%20NP-CG6400UL%2C%20NP-CG6400WL%2C%20NP-CB4500XL%2C%20NP-CA4120X%2C%20NP-CA4160W%2C%20NP-CA4160X%2C%20NP-CA4200U%2C%20NP-CA4200W%2C%20NP-CA4202W%2C%20NP-CA4260X%2C%20NP-CA4300X%2C%20NP-CA4355X%2C%20NP-CD2100U%2C%20NP-CD2120X%2C%20NP-CD2300X%2C%20NP-CR2100X%2C%20NP-CR2170W%2C%20NP-CR2170X%2C%20NP-CR2200U%2C%20NP-CR2200W%2C%20NP-CR2280X%2C%20NP-CR2310X%2C%20NP-CR2350X%2C%20NP-MC302XG%2C%20NP-MC332WG%2C%20NP-MC342XG%2C%20NP-MC372X%2C%20NP-MC372XG%2C%20NP-MC382W%2C%20NP-MC382WG%2C%20NP-MC422XG%2C%20NP-ME342UG%2C%20NP-ME372W%2C%20NP-ME372WG%2C%20NP-ME382U%2C%20NP-ME382UG%2C%20NP-ME402X%2C%20NP-ME402XG%20NP-CU4300XD%2C%20NP-CU4200XD%2C%20NP-CU4200WD%2C%20NP-UM383WL%2C%20NP-UM383WLG%2C%20NP-CJ2200WD%2C%20NP-PH3501QL%2C%20NP-PH3501QL%2B%2C%20NP-PH2601QL%2C%20NP-PH2601QL%2B%2C%20NP-PH350Q40L%2C%20NP-PH260Q30L%2C%20NP-PX1005QL-W%2C%20NP-PX1005QL-B%2C%20NP-PX1005QL-B%2B%2C%20NP-P525UL%2C%20NP-P525ULG%2C%20NP-P525UL%2B%2C%20NP-P525WL%2C%20NP-P525WLG%2C%20NP-P525WL%2B%2C%20NP-P605UL%2C%20NP-P605ULG%2C%20NP-P605UL%2B&amp;severity=critical&amp;id=6948d6e9f380eec6876e960d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11544-cwe-912-hidden-functionality-in-sha-156315c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11544%3A%20CWE-912%3A%20Hidden%20Functionality%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P627UL%2C%20NP-P627ULG%2C%20NP-P627UL%2B%2C%20NP-P547UL%2C%20NP-P547ULG%2C%20NP-P607UL%2B%2C%20NP-CG6600UL%2C%20NP-H6271UL%2C%20NP-H5471UL%2C%20NP-P627ULH%2C%20NP-P547ULH%2C%20NP-PE455UL%2C%20NP-PE455ULG%2C%20NP-PE455WL%2C%20NP-PE455WLG%2C%20NP-PE505XLG%2C%20NP-CG6500XL%2C%20NP-CG6400UL%2C%20NP-CG6400WL%2C%20NP-CB4500XL%2C%20NP-CA4120X%2C%20NP-CA4160W%2C%20NP-CA4160X%2C%20NP-CA4200U%2C%20NP-CA4200W%2C%20NP-CA4202W%2C%20NP-CA4260X%2C%20NP-CA4300X%2C%20NP-CA4355X%2C%20NP-CD2100U%2C%20NP-CD2120X%2C%20NP-CD2300X%2C%20NP-CR2100X%2C%20NP-CR2170W%2C%20NP-CR2170X%2C%20NP-CR2200U%2C%20NP-CR2200W%2C%20NP-CR2280X%2C%20NP-CR2310X%2C%20NP-CR2350X%2C%20NP-MC302XG%2C%20NP-MC332WG%2C%20NP-MC342XG%2C%20NP-MC372X%2C%20NP-MC372XG%2C%20NP-MC382W%2C%20NP-MC382WG%2C%20NP-MC422XG%2C%20NP-ME342UG%2C%20NP-ME372W%2C%20NP-ME372WG%2C%20NP-ME382U%2C%20NP-ME382UG%2C%20NP-ME402X%2C%20NP-ME402XG%2C%20NP-P525UL%2C%20NP-P525ULG%2C%20NP-P525UL%2B%2C%20NP-P525WL%2C%20NP-P525WLG%2C%20NP-P525WL%2B%2C%20NP-P605UL%2C%20NP-P605ULG%2C%20NP-P605UL%2B%2C%20NP-CG6500UL%2C%20NP-CG6500WL%2C%20NP-CB4500UL%2C%20NP-CB4500WL%2C%20NP-P525ULH%2C%20NP-P525WLH%2C%20NP-P605ULH%2C%20NP-P554U%2C%20NP-P554UG%2C%20NP-P554U%2B%2C%20NP-P554W%2C%20NP-P554WG%2C%20NP-P554W%2B%2C%20NP-P474U%2C%20NP-P474UG%2C%20NP-P474W%2C%20NP-P474WG%2C%20NP-P604XG%2C%20NP-P604X%2B%2C%20NP-P603XG%2C%20NP-P523X%2B%2C%20NP-PE523XG%2C%20NP-PE523X%2B%2C%20NP-CF6600U%2C%20NP-CF6600W%2C%20NP-CF6700X%2C%20NP-CF6500X%2C%20NP-CB4600U%2C%20NP-P554UH%2C%20NP-P554WH%2C%20NP-P474UH%2C%20NP-P474WH%2C%20NP-P604XH%2C%20NP-P603XH%2C%20NP-PE523XH%2C%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%20%2CNP-ME401W%2C%20NP-ME361W%2C%20NP-ME331W%2C%20NP-ME301W%2C%20NP-ME401X%2C%20NP-ME361X%2C%20NP-ME331X%2C%20NP-ME301X%2C%20NP-ME401WG%2C%20NP-ME361WG%2C%20NP-ME331WG%2C%20NP-ME301WG%2C%20NP-ME401XG%2C%20NP-ME361XG%2C%20NP-ME331XG%2C%20NP-ME301XG%2C%20NP-CA4155W%2C%20NP-CA4350X%2C%20NP-CA4255X%2C%20NP-CA4155X%2C%20NP-CA4115X%2C%20NP-MC331WG%2C%20NP-MC421XG%2C%20NP-MC401XG%2C%20NP-MC371XG%2C%20NP-MC331XG%2C%20NP-MC301XG%2C%20NP-CK4155W%2C%20NP-CK4255X%2C%20NP-CK4155X%2C%20NP-CK4055X%2C%20NP-CM4150X%2C%20NP-CM4050X%2C%20NP-CK4155WG%2C%20NP-CK4255XG%2C%20NP-CK4155XG%2C%20NP-CR2165W%2C%20NP-CR2305X%2C%20NP-CR2275X%2C%20NP-CR2165X%2C%20NP-CR2155X%2C%20NP-CD2115X%2C%20NP-CD2105X%2C%20NP-CM4151X%2C%20NP-CR2276X%2C%20NP-CD2116X%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W&amp;severity=critical&amp;id=6948d6e9f380eec6876e960a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11543-cwe-354-improper-validation-of-inte-576d4b82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11543%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=critical&amp;id=6948e1f1f380eec6877c45d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11542-cwe-121-stack-based-buffer-overflow-0c9f51ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11542%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=high&amp;id=6948e1f1f380eec6877c45d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11541-cwe-121-stack-based-buffer-overflow-423506bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11541%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=critical&amp;id=6948e1f1f380eec6877c45ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11540-cwe-22-improper-limitation-of-a-pat-93647b69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11540%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=critical&amp;id=6948e1f1f380eec6877c45cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12049-cwe-306-missing-authentication-for--3a29601c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12049%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20Media%20Player%20MP-01&amp;severity=critical&amp;id=6948e1f1f380eec6877c45d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15014-sql-injection-in-loganhong-php-loga-d4c3c0db</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15014%3A%20SQL%20Injection%20in%20loganhong%20php%20loganSite&amp;severity=medium&amp;id=6948e1f1f380eec6877c45da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15013-stack-based-buffer-overflow-in-floo-e7e5488a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15013%3A%20Stack-based%20Buffer%20Overflow%20in%20floooh%20sokol&amp;severity=medium&amp;id=6948d0ddf3d40542c74aa483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15012-sql-injection-in-code-projects-refu-86a7903c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15012%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=6948d0ddf3d40542c74aa48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-artemis-analysis-of-hwp-based-dll-side-l-03d8a559</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Artemis%3A%20Analysis%20of%20HWP-Based%20DLL%20Side%20Loading%20Attacks&amp;severity=medium&amp;id=69491f829679ab05af586fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15011-sql-injection-in-code-projects-simp-c332fcf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15011%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=6948c1179b5fbca4f51854f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15016-cwe-321-use-of-hard-coded-cryptogra-828a99de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15016%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Ragic%20Enterprise%20Cloud%20Database&amp;severity=critical&amp;id=6948c1179b5fbca4f51854fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15015-cwe-23-relative-path-traversal-in-r-9dd6db79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15015%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Ragic%20Enterprise%20Cloud%20Database&amp;severity=high&amp;id=6948c1179b5fbca4f51854f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15010-stack-based-buffer-overflow-in-tend-05e7daf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15010%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=6948ba199b5fbca4f5110ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59301-cwe-20-improper-input-validation-in-d559bd68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59301%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Delta%20Electronics%20DVP15MC11T&amp;severity=medium&amp;id=6948ba199b5fbca4f5110eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15009-unrestricted-upload-in-liweiyi-ches-38c9a37a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15009%3A%20Unrestricted%20Upload%20in%20liweiyi%20ChestnutCMS&amp;severity=medium&amp;id=6948b19135589e6cb165ba56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15008-stack-based-buffer-overflow-in-tend-c840f55c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15008%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=medium&amp;id=6948b19135589e6cb165ba4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15007-stack-based-buffer-overflow-in-tend-32e684d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15007%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=6948a94d0a1294c2fe493cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15006-stack-based-buffer-overflow-in-tend-8430c353</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15006%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=69489e000a1294c2fe3241ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15005-use-of-hard-coded-cryptographic-key-849c0d51</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15005%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20CouchCMS&amp;severity=medium&amp;id=694897e7a595d307a79322bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15004-sql-injection-in-dedecms-b9181687</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15004%3A%20SQL%20Injection%20in%20DedeCMS&amp;severity=medium&amp;id=69489057a595d307a785c50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-22-55f63229</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-22&amp;severity=medium&amp;id=6949dd7eefa849cc1322059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66735-na-2c8d719a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66735%3A%20n%2Fa&amp;severity=high&amp;id=6949bf39edc45005c15e34e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67436-na-b2cf1dd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67436%3A%20n%2Fa&amp;severity=medium&amp;id=6949bf39edc45005c15e34d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65857-na-3b607dbc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65857%3A%20n%2Fa&amp;severity=high&amp;id=6949bf39edc45005c15e34d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66736-na-44e0a840</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66736%3A%20n%2Fa&amp;severity=high&amp;id=6949b7a0edc45005c155e0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65856-na-11fd2d6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65856%3A%20n%2Fa&amp;severity=critical&amp;id=6949b7a0edc45005c155e0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65817-na-db490a51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65817%3A%20n%2Fa&amp;severity=high&amp;id=6949aa669d3de339c6b17817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67291-na-02aa6d96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67291%3A%20n%2Fa&amp;severity=medium&amp;id=6949a6e09d3de339c6ad0f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67290-na-96e8ea15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67290%3A%20n%2Fa&amp;severity=medium&amp;id=6949a6e09d3de339c6ad0f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27708-na-5d50372c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27708%3A%20n%2Fa&amp;severity=critical&amp;id=6949a6e09d3de339c6ad0f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65790-na-8f1aa0ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65790%3A%20n%2Fa&amp;severity=medium&amp;id=6949a35b9d3de339c6aad188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65837-na-aec8491e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65837%3A%20n%2Fa&amp;severity=medium&amp;id=6949a35b9d3de339c6aad184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67418-na-722b7814</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67418%3A%20n%2Fa&amp;severity=critical&amp;id=69499fe29d3de339c6a6aefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25812-na-f1ac14ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25812%3A%20n%2Fa&amp;severity=medium&amp;id=69499d40c525bff625e7666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35321-na-fd2fcd6f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35321%3A%20n%2Fa&amp;severity=medium&amp;id=6949997dc525bff625e31dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25814-na-93ead183</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25814%3A%20n%2Fa&amp;severity=medium&amp;id=6949997dc525bff625e31dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67288-na-ea93a173</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67288%3A%20n%2Fa&amp;severity=critical&amp;id=69498ef9c525bff625d87afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63664-na-1a474005</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63664%3A%20n%2Fa&amp;severity=high&amp;id=69498ef9c525bff625d87af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63663-na-887291a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63663%3A%20n%2Fa&amp;severity=high&amp;id=69498ef9c525bff625d87af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63662-na-fa8c276e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63662%3A%20n%2Fa&amp;severity=high&amp;id=69498ef9c525bff625d87af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26787-na-567c5e45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26787%3A%20n%2Fa&amp;severity=medium&amp;id=69498ef9c525bff625d87aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68645-na-fe921bf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68645%3A%20n%2Fa&amp;severity=high&amp;id=69498cb05b5b68b8f5dee2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67289-na-46d41f94</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67289%3A%20n%2Fa&amp;severity=critical&amp;id=69498cb05b5b68b8f5dee2a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65270-na-5c19a053</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65270%3A%20n%2Fa&amp;severity=medium&amp;id=69498cb05b5b68b8f5dee2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67443-na-09f871d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67443%3A%20n%2Fa&amp;severity=medium&amp;id=69497803d6cb72e86e42a14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67826-na-b2fb3279</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67826%3A%20n%2Fa&amp;severity=high&amp;id=6949600fa3c8169c9cdce196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15003-sql-injection-in-seacms-53188bdc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15003%3A%20SQL%20Injection%20in%20SeaCMS&amp;severity=medium&amp;id=694886b83ccd96b7b746ed2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15002-sql-injection-in-seacms-8c466e46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15002%3A%20SQL%20Injection%20in%20SeaCMS&amp;severity=medium&amp;id=69487f303ccd96b7b73da3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62901-cwe-79-improper-neutralization-of-i-f009e1e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62901%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tormorten%20WP%20Microdata&amp;severity=null&amp;id=69486686250e8b2ef81b7a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62926-cwe-79-improper-neutralization-of-i-d06592db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62926%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HappyDevs%20TempTool%20%20%5BShow%20Current%20Template%20Info%5D&amp;severity=null&amp;id=69486686250e8b2ef81b7a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62955-cwe-497-exposure-of-sensitive-syste-6ce72f1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62955%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20HappyDevs%20TempTool%20%20%5BShow%20Current%20Template%20Info%5D&amp;severity=null&amp;id=69486301250e8b2ef817cae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-android-botnet-kimwolf-infects-millions-st-37ffb723</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Android%20botnet%20Kimwolf%20infects%20millions%2C%20strikes%20with%20DDoS&amp;severity=medium&amp;id=6947f4d2e026439f1e12e4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnhalla-picking-the-true-vulnerabilities-from-th-89208606</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnhalla%3A%20Picking%20the%20true%20vulnerabilities%20from%20the%20CodeQL%20haystack&amp;severity=medium&amp;id=6947d39b26a902801d433cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14995-stack-based-buffer-overflow-in-tend-4ac05581</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14995%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=6947b3aa3cbe12b6f35cac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14994-stack-based-buffer-overflow-in-tend-84473859</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14994%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=6947a34f3cbe12b6f34a58d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14800-cwe-434-unrestricted-upload-of-file-d6002914</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14800%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=high&amp;id=6947a34f3cbe12b6f34a58cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14855-cwe-79-improper-neutralization-of-i-e9088a96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14855%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=high&amp;id=6947a34f3cbe12b6f34a58d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14993-stack-based-buffer-overflow-in-tend-b5631f8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14993%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=69477b5ddaa649f723885181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-infy-apt-resurfaces-with-new-malware-activ-bdecb56e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Infy%20APT%20Resurfaces%20with%20New%20Malware%20Activity%20After%20Years%20of%20Silence&amp;severity=medium&amp;id=69478fcd598cfcf336c8656d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14992-stack-based-buffer-overflow-in-tend-a3382e6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14992%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=69477456daa649f7237d58f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14991-cross-site-scripting-in-campcodes-c-1ab969a4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14991%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=694770dcdaa649f7237704d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13361-cwe-352-cross-site-request-forgery--5ea9dfef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13361%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dipesh_patel%20Web%20to%20SugarCRM%20Lead&amp;severity=medium&amp;id=694770dcdaa649f7237704cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13220-cwe-79-improper-neutralization-of-i-65adb83f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13220%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=694770dcdaa649f7237704c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12654-cwe-73-external-control-of-file-nam-d7dbb5ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12654%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpvividplugins%20WPvivid%20%E2%80%94%20Backup%2C%20Migration%20%26%20Staging&amp;severity=low&amp;id=694770dcdaa649f7237704bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13693-cwe-79-improper-neutralization-of-i-3bea09b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=694770dcdaa649f7237704d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12398-cwe-79-improper-neutralization-of-i-dac3cafe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codersaiful%20Product%20Table%20for%20WooCommerce&amp;severity=medium&amp;id=694770dcdaa649f7237704b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9343-cwe-79-improper-neutralization-of-in-be5fc715</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=high&amp;id=694770dcdaa649f7237704e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14990-sql-injection-in-campcodes-complete-f74d16ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14990%3A%20SQL%20Injection%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=694766ae8da8a612761646df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68644-cwe-290-authentication-bypass-by-sp-a28dec5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68644%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Yealink%20RPS&amp;severity=high&amp;id=694766ae8da8a612761646e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12980-cwe-862-missing-authorization-in-wp-d70fd0d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12980%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=high&amp;id=69475fa78da8a612760a1abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14054-cwe-79-improper-neutralization-of-i-fb60ab26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hasthemes%20WC%20Builder%20%E2%80%93%20WooCommerce%20Page%20Builder%20for%20WPBakery&amp;severity=medium&amp;id=69475fa78da8a612760a1ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13838-cwe-79-improper-neutralization-of-i-eeab8c23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20WishSuite%20%E2%80%93%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=69475fa78da8a612760a1ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14071-cwe-502-deserialization-of-untruste-b346b7cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14071%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20livecomposer%20Live%20Composer%20%E2%80%93%20Free%20WordPress%20Website%20Builder&amp;severity=high&amp;id=69475fa78da8a612760a1acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14080-cwe-862-missing-authorization-in-wp-cb10bc18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14080%3A%20CWE-862%20Missing%20Authorization%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=69475fa78da8a612760a1ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11496-cwe-79-improper-neutralization-of-i-d40d9863</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Five%20Star%20Restaurant%20Reservations%20%E2%80%93%20WordPress%20Booking%20Plugin&amp;severity=medium&amp;id=69475fa78da8a612760a1ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47232-vulnerability-in-mojofywp-wp-affili-809ae75c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47232%3A%20Vulnerability%20in%20mojofywp%20WP%20Affiliate%20Disclosure&amp;severity=medium&amp;id=69474498db1f51f880c173f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25446-cwe-862-missing-authorization-in-ha-ffaa9462</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25446%3A%20CWE-862%20Missing%20Authorization%20in%20HappyFiles%20HappyFiles%20Pro&amp;severity=high&amp;id=69474498db1f51f880c173f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25445-cwe-862-missing-authorization-in-ha-4ae6e79b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25445%3A%20CWE-862%20Missing%20Authorization%20in%20HappyFiles%20HappyFiles%20Pro&amp;severity=medium&amp;id=69474498db1f51f880c173ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-21-c515f019</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-21&amp;severity=medium&amp;id=69488cc7a595d307a781fae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25068-cwe-862-missing-authorization-in-ma-21a979e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25068%3A%20CWE-862%20Missing%20Authorization%20in%20Mapro%20Collins%20Magazine%20Edge&amp;severity=medium&amp;id=694739fbdb1f51f880b2a275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14989-sql-injection-in-campcodes-complete-69d7be57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14989%3A%20SQL%20Injection%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=694733b5c9c6df9f5ceaa1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomhouse-upgrades-encryption-with-multi-layered-c84bab0f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RansomHouse%20upgrades%20encryption%20with%20multi-layered%20data%20processing&amp;severity=high&amp;id=6947184f6364f0d3b54121f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34290-cwe-250-execution-with-unnecessary--3537b5e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34290%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Versa%20Networks%20SASE%20Client%20for%20Windows&amp;severity=high&amp;id=6947030ab06cf8342301ae4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seizes-fake-id-template-domains-operating-from-e395c62e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Seizes%20Fake%20ID%20Template%20Domains%20Operating%20from%20Bangladesh&amp;severity=medium&amp;id=6946ec0edf378ae201258978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-sidewinder-apt-campaign-detected-33d72334</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20SideWinder%20APT%20Campaign%20Detected&amp;severity=medium&amp;id=69491f829679ab05af586fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-doj-charges-54-in-atm-jackpotting-scheme-using--4703ff40</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20DOJ%20Charges%2054%20in%20ATM%20Jackpotting%20Scheme%20Using%20Ploutus%20Malware&amp;severity=medium&amp;id=6946b15e987e301cd64ae78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7782-cwe-862-missing-authorization-in-wp--38b9bbfb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7782%3A%20CWE-862%20Missing%20Authorization%20in%20WP%20JobHunt&amp;severity=high&amp;id=6946aa3f987e301cd6415949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7733-cwe-639-authorization-bypass-through-96dce83b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7733%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20JobHunt&amp;severity=medium&amp;id=6946aa3f987e301cd6415945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wk-51-north-korean-infiltrator-caught-working-in-a-5fbbbaf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%F0%9F%9A%A8WK%2051%3A%20North%20Korean%20Infiltrator%20Caught%20Working%20in%20Amazon%20IT%20Department%2C%20EU%20Fines%20X%20%E2%82%AC140%20Million%2C%20Cisco%20Customers%20Hit%20by%20China-Linked%20APT...&amp;severity=medium&amp;id=6946981a3f10de0b706b5d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-a-flaw-in-watchguard-fireware-os-to-i-22620824</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20a%20flaw%20in%20WatchGuard%20Fireware%20OS%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=694691cd73e2535dfefe0060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14298-cwe-79-improper-neutralization-of-i-a2db8710</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14298%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damian-gora%20FiboSearch%20%E2%80%93%20Ajax%20Search%20for%20WooCommerce&amp;severity=medium&amp;id=69465e70aa65b5798e1d3c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12492-cwe-200-exposure-of-sensitive-infor-d492d455</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12492%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=69465e70aa65b5798e1d3c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13619-cwe-269-improper-privilege-manageme-48700e01</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13619%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20CMSSuperHeroes%20Flex%20Store%20Users&amp;severity=critical&amp;id=694651418d921bbd6b8e5b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12820-cwe-862-missing-authorization-in-pu-ae3ab761</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12820%3A%20CWE-862%20Missing%20Authorization%20in%20Pure%20WC%20Variation%20Swatches&amp;severity=medium&amp;id=6946402959945ce0dd08adc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13365-cwe-352-cross-site-request-forgery--9818f34d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13365%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tikolan%20WP%20Hallo%20Welt&amp;severity=medium&amp;id=694619d2c376abdb7ecb86a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12581-cwe-79-improper-neutralization-of-i-4da1c0de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12581%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaizencoders%20Attachments%20Handler&amp;severity=medium&amp;id=694619d1c376abdb7ecb869c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13329-cwe-434-unrestricted-upload-of-file-e47819d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13329%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20snowray%20File%20Uploader%20for%20WooCommerce&amp;severity=critical&amp;id=694619d2c376abdb7ecb86a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14168-cwe-352-cross-site-request-forgery--b872e166</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14168%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmaniax%20WP%20DB%20Booster&amp;severity=medium&amp;id=694619d2c376abdb7ecb86bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13624-cwe-79-improper-neutralization-of-i-af28a405</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20travishoki%20Overstock%20Affiliate%20Links&amp;severity=medium&amp;id=694619d2c376abdb7ecb86b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14633-cwe-862-missing-authorization-in-ni-871d843a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14633%3A%20CWE-862%20Missing%20Authorization%20in%20niao70%20F70%20Lead%20Document%20Download&amp;severity=medium&amp;id=694619d2c376abdb7ecb86c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14721-cwe-79-improper-neutralization-of-i-920861e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mansoormunib%20RESPONSIVE%20AND%20SWIPE%20SLIDER!&amp;severity=medium&amp;id=694619d2c376abdb7ecb86cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12898-cwe-862-missing-authorization-in-lb-6401d6d6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12898%3A%20CWE-862%20Missing%20Authorization%20in%20lbell%20Pretty%20Google%20Calendar&amp;severity=medium&amp;id=694619d2c376abdb7ecb86a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14734-cwe-352-cross-site-request-forgery--45adb2e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14734%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nestornoe%20Amazon%20affiliate%20lite%20Plugin&amp;severity=medium&amp;id=694619d3c376abdb7ecb8faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14164-cwe-352-cross-site-request-forgery--d309b53c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14164%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edckwt%20Quran%20Gateway&amp;severity=medium&amp;id=694619d2c376abdb7ecb86b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14735-cwe-80-improper-neutralization-of-s-e544b8ee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14735%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20nestornoe%20Amazon%20affiliate%20lite%20Plugin&amp;severity=medium&amp;id=694619d3c376abdb7ecb8fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14591-vulnerability-in-perforce-delphix-c-e7634947</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14591%3A%20Vulnerability%20in%20Perforce%20Delphix%20Continuous%20Compliance&amp;severity=medium&amp;id=694619d2c376abdb7ecb86c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14300-cwe-306-missing-authentication-for--8b24a75f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14300%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C200%20V3&amp;severity=high&amp;id=6945fa2fc376abdb7e67a375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14299-cwe-770-allocation-of-resources-wit-cc3e31a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14299%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C200%20V3&amp;severity=high&amp;id=6945fa2fc376abdb7e67a371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8065-cwe-400-uncontrolled-resource-consum-b3fbab90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8065%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C200%20V3&amp;severity=high&amp;id=6945fa2fc376abdb7e67a379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-20-10c92024</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-20&amp;severity=medium&amp;id=694739e9db1f51f880b29b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68613-cwe-913-improper-control-of-dynamic-ff9feacf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68613%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=6945d4648954746f284878c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53950-unrestricted-upload-of-file-with-da-c7bcfb0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53950%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20innovastudio%20WYSIWYG%20Editor&amp;severity=critical&amp;id=6945c32cf5c5e8dffe81cafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53959-uncontrolled-search-path-element-in-44f19486</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53959%3A%20Uncontrolled%20Search%20Path%20Element%20in%20filezilla-project%20FileZilla%20Client&amp;severity=high&amp;id=6945c32cf5c5e8dffe81cb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53958-weak-password-recovery-mechanism-fo-a24bdc5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53958%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20ltb-project%20LDAP%20Tool%20Box%20Self%20Service%20Password&amp;severity=high&amp;id=6945c32cf5c5e8dffe81cb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53956-unrestricted-upload-of-file-with-da-473b2792</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53956%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20altervista%20flatnux&amp;severity=high&amp;id=6945c32cf5c5e8dffe81cb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53951-improper-verification-of-cryptograp-8f12262e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53951%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Gauzy%20ever%20gauzy&amp;severity=critical&amp;id=6945c32cf5c5e8dffe81cb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53948-improper-neutralization-of-special--8fc96bc8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53948%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20cat03%20Lilac-Reloaded&amp;severity=critical&amp;id=6945c32cf5c5e8dffe81caf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53947-unquoted-search-path-or-element-in--80258714</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53947%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20oscinventory%20OCS%20Inventory%20NG&amp;severity=high&amp;id=6945c32cf5c5e8dffe81caf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53946-unquoted-search-path-or-element-in--2ada9fcf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53946%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Arcsoft%20PhotoStudio&amp;severity=high&amp;id=6945c32cf5c5e8dffe81caec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-tapo-c200-hardcoded-keys-buffer-overflows--31590741</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Tapo%20C200%3A%20Hardcoded%20Keys%2C%20Buffer%20Overflows%20and%20Privacy%20in%20the%20Era%20of%20AI%20Assisted%20Reverse%20Engineering&amp;severity=medium&amp;id=6945ec33c376abdb7e50f357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67712-cwe-79-improper-neutralization-of-i-bb130446</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Web%20AppBuilder%20%7BDeveloper%20Edition)&amp;severity=medium&amp;id=6945b49d94037f6b535f8834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14968-sql-injection-in-code-projects-simp-f2719609</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14968%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=6945b49d94037f6b535f882d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12874-cwe-444-inconsistent-interpretation-dc5ece68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12874%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Quest%20Coexistence%20Manager%20for%20Notes&amp;severity=medium&amp;id=6945ad9494037f6b5356f5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14967-sql-injection-in-itsourcecode-stude-f05ca633</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14967%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6945aa0f94037f6b535451d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14966-sql-injection-in-fastadmin-169a822e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14966%3A%20SQL%20Injection%20in%20FastAdmin&amp;severity=medium&amp;id=6945aa0f94037f6b535451d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thailand-conference-launches-international-initiat-eea5de12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thailand%20Conference%20Launches%20International%20Initiative%20to%20Fight%20Online%20Scams&amp;severity=medium&amp;id=6945a43e0919c128849dab14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14965-path-traversal-in-1541492390c-yougo-b8e99b86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14965%3A%20Path%20Traversal%20in%201541492390c%20yougou-mall&amp;severity=medium&amp;id=6945a4610919c128849db32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14964-stack-based-buffer-overflow-in-toto-be6aedc5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14964%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=critical&amp;id=6945a4610919c128849db330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14962-cross-site-scripting-in-code-projec-d50cb772</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14962%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=69459d520919c12884942cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14961-sql-injection-in-code-projects-simp-ae37d208</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14961%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Blood%20Donor%20Management%20System&amp;severity=medium&amp;id=69459d520919c12884942cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-series-of-unfortunate-rmm-events-a2f17747</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Series%20of%20Unfortunate%20(RMM)%20Events&amp;severity=medium&amp;id=69459d520919c12884942c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-advertising-company-hacked-72a3b5d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Advertising%20Company%20Hacked&amp;severity=medium&amp;id=694596380919c128848e2644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denmark-blames-russia-for-destructive-cyberattack--d866fce5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denmark%20blames%20Russia%20for%20destructive%20cyberattack%20on%20water%20utility&amp;severity=high&amp;id=694596380919c128848e2638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-25000-forticloud-sso-devices-exposed-to-remot-e6deeb43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2025%2C000%20FortiCloud%20SSO%20devices%20exposed%20to%20remote%20attacks&amp;severity=high&amp;id=694596380919c128848e263c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14960-sql-injection-in-code-projects-simp-025af685</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14960%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Blood%20Donor%20Management%20System&amp;severity=medium&amp;id=694596660919c128848e41e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14959-sql-injection-in-code-projects-simp-f747c480</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14959%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=694596660919c128848e41d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-hackers-use-microsoft-365-device-cod-8c2c93b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Linked%20Hackers%20Use%20Microsoft%20365%20Device%20Code%20Phishing%20for%20Account%20Takeovers&amp;severity=low&amp;id=6945b57794037f6b53608bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14958-heap-based-buffer-overflow-in-flooo-b7c70023</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14958%3A%20Heap-based%20Buffer%20Overflow%20in%20floooh%20sokol&amp;severity=medium&amp;id=69458e67f063e4fadf084613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68430-cwe-24-path-traversal-filedir-in-cv-211a2800</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68430%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=69458ae3f063e4fadf03d176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68478-cwe-73-external-control-of-file-nam-228a882f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68478%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69458ae3f063e4fadf03d17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14957-null-pointer-dereference-in-webasse-4f1cda29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14957%3A%20NULL%20Pointer%20Dereference%20in%20WebAssembly%20Binaryen&amp;severity=medium&amp;id=6945875ff063e4fadffe4627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68477-cwe-918-server-side-request-forgery-92aa0069</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68477%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=694583dbf063e4fadffb129e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68457-cwe-79-improper-neutralization-of-i-b924277b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68457%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boscop-fr%20orejime&amp;severity=low&amp;id=694583dbf063e4fadffb1299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14809-cwe-1021-improper-restriction-of-re-c46befdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14809%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20ArcSearch&amp;severity=high&amp;id=694583dbf063e4fadffb1296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14812-cwe-1021-improper-restriction-of-re-501eeae3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14812%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20ArcSearch&amp;severity=high&amp;id=69458084f063e4fadff5e82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66580-cwe-94-improper-control-of-generati-8d6c3eb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66580%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenAgentPlatform%20Dive&amp;severity=critical&amp;id=69458084f063e4fadff5e847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65035-cwe-502-deserialization-of-untruste-bddb3352</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65035%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pluginsGLPI%20databaseinventory&amp;severity=medium&amp;id=69458084f063e4fadff5e842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30971-this-weakness-has-been-deprecated-b-88e2315d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30971%3A%20This%20weakness%20has%20been%20deprecated%20because%20it%20covered%20redundant%20concepts%20already%20described%20in%20CWE-287.%20in%20Palantir%20com.palantir.acme.gaia%3Agaia&amp;severity=medium&amp;id=69458083f063e4fadff5e827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49587-the-authentication-algorithm-is-sou-b53b34e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49587%3A%20The%20authentication%20algorithm%20is%20sound%2C%20but%20the%20implemented%20mechanism%20can%20be%20bypassed%20as%20the%20result%20of%20a%20separate%20weakness%20that%20is%20primary%20to%20the%20authentication%20error.%20in%20Palantir%20com.palantir.gotham%3Aglutton&amp;severity=critical&amp;id=69458084f063e4fadff5e82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14956-heap-based-buffer-overflow-in-webas-de7ae511</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14956%3A%20Heap-based%20Buffer%20Overflow%20in%20WebAssembly%20Binaryen&amp;severity=medium&amp;id=69458084f063e4fadff5e839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14955-improper-initialization-in-open5gs-cf773d19</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14955%3A%20Improper%20Initialization%20in%20Open5GS&amp;severity=medium&amp;id=69458084f063e4fadff5e830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempts-to-sniff-out-governmental-affairs-in-sout-9f45d5a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempts%20to%20sniff%20out%20governmental%20affairs%20in%20Southeast%20Asia%20and%20Japan&amp;severity=medium&amp;id=69459d520919c12884942c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-busted-north-korean-worker-posing-as-us-sta-ea41aac8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Busted%20North%20Korean%20Worker%20Posing%20as%20US%20Staff%20After%20Keyboard%20Lag&amp;severity=medium&amp;id=69457d16133fda1465c6ad06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-docker-ai-attack-google-sues-chinese-d3819014</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Docker%20AI%20Attack%2C%20Google%20Sues%20Chinese%20Cybercriminals%2C%20Coupang%20Hacked%20by%20Employee&amp;severity=medium&amp;id=69457988133fda1465c25886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14954-reachable-assertion-in-open5gs-06d109a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14954%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=694579a3133fda1465c274d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14953-null-pointer-dereference-in-open5gs-f0ac8021</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14953%3A%20NULL%20Pointer%20Dereference%20in%20Open5GS&amp;severity=low&amp;id=694579a3133fda1465c274c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34433-cwe-94-improper-control-of-generati-6b212350</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34433%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=critical&amp;id=694572a4133fda1465b9f67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cracked-software-and-youtube-videos-spread-countlo-44ebd0cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cracked%20Software%20and%20YouTube%20Videos%20Spread%20CountLoader%20and%20GachiLoader%20Malware&amp;severity=medium&amp;id=6945727d133fda1465b9bd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denmark-blames-russia-for-cyberattacks-ahead-of-el-3c4afed4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denmark%20Blames%20Russia%20for%20Cyberattacks%20Ahead%20of%20Elections%20and%20on%20Water%20Utility&amp;severity=medium&amp;id=69456746a90e3c9a1540af74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-longnosedgoblin-targeting-asian-govern-b265ce62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20%E2%80%98LongNosedGoblin%E2%80%99%20Targeting%20Asian%20Governments&amp;severity=medium&amp;id=694563a2a90e3c9a153ea496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14952-sql-injection-in-campcodes-supplier-d4710ed1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14952%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=69456762a90e3c9a1540c4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14951-sql-injection-in-code-projects-scho-7ee18e07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14951%3A%20SQL%20Injection%20in%20code-projects%20Scholars%20Tracking%20System&amp;severity=medium&amp;id=694563c4a90e3c9a153eb8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breaking-sapcar-four-local-privilege-escalation-bu-3e2ea23e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breaking%20SAPCAR%3A%20Four%20Local%20Privilege%20Escalation%20Bugs%20in%20SAR%20Archive%20Parsing&amp;severity=medium&amp;id=6945602ea90e3c9a153ccdab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14950-sql-injection-in-code-projects-scho-e65c5a36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14950%3A%20SQL%20Injection%20in%20code-projects%20Scholars%20Tracking%20System&amp;severity=medium&amp;id=69455922a90e3c9a153a0e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-uat-9686-is-targeting-cisco-secur-923e338c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20APT%20UAT-9686%20is%20targeting%20Cisco%20Secure%20Email%20Gateway%20and%20Secure%20Email%20and%20Web%20Manager&amp;severity=medium&amp;id=69455218a90e3c9a1536c246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-critical-watchguard-firebox-firewall-flaw-expl-7c584dfe</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20critical%20WatchGuard%20Firebox%20firewall%20flaw%20exploited%20in%20attacks&amp;severity=critical&amp;id=69455218a90e3c9a1536c23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asrock-asus-gigabyte-msi-boards-vulnerable-to-pre--7cdf1ecc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASRock%2C%20ASUS%2C%20GIGABYTE%2C%20MSI%20Boards%20vulnerable%20to%20pre-boot%20memory%20attacks&amp;severity=medium&amp;id=69455218a90e3c9a1536c24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-shuts-down-crypto-exchange-e-note-charges-russi-49b32b14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Shuts%20Down%20Crypto%20Exchange%20E-Note%2C%20Charges%20Russian%20Administrator&amp;severity=medium&amp;id=69454e8aa90e3c9a1534b73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14946-improper-neutralization-of-argument-7f78966a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14946%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Red%20Hat%20libnbd&amp;severity=medium&amp;id=69455253a90e3c9a1536f3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-fixes-ask-gordon-ai-flaw-that-enabled-metad-bdb3bdb1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Fixes%20%E2%80%98Ask%20Gordon%E2%80%99%20AI%20Flaw%20That%20Enabled%20Metadata-Based%20Attacks&amp;severity=medium&amp;id=69454b11a90e3c9a1532a008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14882-cwe-639-authorization-bypass-throug-e0d1d418</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14882%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pretix%20pretix-offlinesales&amp;severity=low&amp;id=6945478da90e3c9a1530ec0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1928-cwe-307-improper-restriction-of-exce-093697df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1928%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Restajet%20Information%20Technologies%20Inc.%20Online%20Food%20Delivery%20System&amp;severity=critical&amp;id=6945440aa90e3c9a152fb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1927-cwe-352-cross-site-request-forgery-c-76034cc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1927%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Restajet%20Information%20Technologies%20Inc.%20Online%20Food%20Delivery%20System&amp;severity=high&amp;id=69454096a90e3c9a152ce8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-sydney-data-breach-affects-27000-ind-cf62c273</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Sydney%20Data%20Breach%20Affects%2027%2C000%20Individuals&amp;severity=medium&amp;id=6945407aa90e3c9a152cdb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-android-botnet-ensnares-18-million-devices-153a1bc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Kimwolf%E2%80%99%20Android%20Botnet%20Ensnares%201.8%20Million%20Devices&amp;severity=medium&amp;id=69453cf6a90e3c9a152a261a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1885-cwe-601-url-redirection-to-untrusted-2e698a7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1885%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Restajet%20Information%20Technologies%20Inc.%20Online%20Food%20Delivery%20System&amp;severity=medium&amp;id=69453d1ba90e3c9a152a49e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watchguard-warns-of-active-exploitation-of-critica-7a91ba7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WatchGuard%20Warns%20of%20Active%20Exploitation%20of%20Critical%20Fireware%20OS%20VPN%20Vulnerability&amp;severity=critical&amp;id=69454869a90e3c9a1531997c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14847-cwe-130-improper-handling-of-length-dd0a4a45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14847%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=high&amp;id=6945326bd11fe727795f9186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dlls-x26-tls-callbacks-fri-dec-19th-03e4850e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x26%3B%23xa%3BDLLs%20%26%23x26%3B%20TLS%20Callbacks%2C%20(Fri%2C%20Dec%2019th)&amp;severity=medium&amp;id=69453259d11fe727795f70ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nigeria-arrests-raccoono365-phishing-developer-lin-8976cecd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nigeria%20Arrests%20RaccoonO365%20Phishing%20Developer%20Linked%20to%20Microsoft%20365%20Attacks&amp;severity=high&amp;id=69452b4ed11fe7277955fdff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-digital-surge-2b-stolen-in-crypto-as--6251bbc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%E2%80%99s%20Digital%20Surge%3A%20%242B%20Stolen%20in%20Crypto%20as%20Amazon%20Blocks%201%2C800%20Fake%20IT%20Workers&amp;severity=medium&amp;id=6945243eac896f72532c0166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14455-cwe-862-missing-authorization-in-wp-f85c4ba5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14455%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=69451dcdc326d36e537b0ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12361-cwe-862-missing-authorization-in-sa-acd99d13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12361%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Points%20Management%20System%20For%20Gamification%2C%20Ranks%2C%20Badges%2C%20and%20Loyalty%20Rewards%20Program%20%E2%80%93%20myCred&amp;severity=medium&amp;id=69451dcdc326d36e537b0eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66524-cwe-502-deserialization-of-untruste-b2316260</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66524%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20NiFi&amp;severity=high&amp;id=69451a4cc326d36e53765d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-uefi-flaw-enables-early-boot-dma-attacks-on-as-403cd23b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20UEFI%20Flaw%20Enables%20Early-Boot%20DMA%20Attacks%20on%20ASRock%2C%20ASUS%2C%20GIGABYTE%2C%20MSI%20Motherboards&amp;severity=medium&amp;id=69450f474227c5364db3e81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11747-cwe-79-improper-neutralization-of-i-d0aabd5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=69450d534227c5364db27c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14151-cwe-79-improper-neutralization-of-i-3ab9f1a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14151%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=69450d534227c5364db27c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-pwned-x-twitter-vercel-cursor-discord-and-h-9860143b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20we%20pwned%20X%20(Twitter)%2C%20Vercel%2C%20Cursor%2C%20Discord%2C%20and%20hundreds%20of%20companies%20through%20a%20supply-chain%20attack&amp;severity=medium&amp;id=69451342c326d36e536dff83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66522-cwe-79-improper-neutralization-of-i-360d1aab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66522%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66521-cwe-79-improper-neutralization-of-i-e5651c4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66520-cwe-79-improper-neutralization-of-i-b0667f4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66520%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66519-cwe-79-improper-neutralization-of-i-e4e18a78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66519%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66502-cwe-79-improper-neutralization-of-i-d4893b5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66501-cwe-79-improper-neutralization-of-i-561c3445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=6944ff0c19341fe1888b869e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66500-cwe-79-improper-neutralization-of-i-b8d63d9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20webplugins.foxit.com&amp;severity=medium&amp;id=6944ff0c19341fe1888b869b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66499-cwe-190-integer-overflow-or-wraparo-9cd261f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66499%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944fb8919341fe1888ac966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66498-cwe-125-out-of-bounds-read-in-foxit-229caee9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66498%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=6944fb8919341fe1888ac963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66497-cwe-125-out-of-bounds-read-in-foxit-523c74ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66497%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=6944fb8919341fe1888ac960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66496-cwe-125-out-of-bounds-read-in-foxit-f8ef853b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66496%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=6944fb8919341fe1888ac95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66495-cwe-416-use-after-free-in-foxit-sof-e36af769</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66495%3A%20CWE-416%20Use%20After%20Free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944fb8919341fe1888ac95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66494-cwe-416-use-after-free-in-foxit-sof-dea8f968</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66494%3A%20CWE-416%20Use%20After%20Free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944fb8919341fe1888ac957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66493-cwe-416-use-after-free-in-foxit-sof-0528ceff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66493%3A%20CWE-416%20Use%20After%20Free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=6944fb8919341fe1888ac954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13008-cwe-359-exposure-of-private-persona-6ed57175</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13008%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=high&amp;id=6944fb8919341fe1888ac951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13999-cwe-918-server-side-request-forgery-5d7ec843</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13999%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20HTML5%20Audio%20Player%20%E2%80%93%20The%20Ultimate%20No-Code%20Podcast%2C%20MP3%20%26%20Audio%20Player&amp;severity=high&amp;id=6944f80919341fe18889df14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14449-cwe-79-improper-neutralization-of-i-44a54a37</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bookingalgorithms%20BA%20Book%20Everything&amp;severity=medium&amp;id=6944f80919341fe18889df18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13754-cwe-862-missing-authorization-in-cr-437e9840</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13754%3A%20CWE-862%20Missing%20Authorization%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=6944f80919341fe18889df10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66174-vulnerability-in-hikvision-ds-7104h-2d4bb1ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66174%3A%20Vulnerability%20in%20Hikvision%20DS-7104HGHI-F1&amp;severity=medium&amp;id=6944f80919341fe18889df1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66173-vulnerability-in-hikvision-ds-7104h-46a488ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66173%3A%20Vulnerability%20in%20Hikvision%20DS-7104HGHI-F1&amp;severity=medium&amp;id=6944f80919341fe18889df1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14267-cwe-212-improper-removal-of-sensiti-9044f6c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14267%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=6944f0fd19341fe188885b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13307-cwe-94-improper-control-of-generati-4568600d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13307%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ocean%20Modal%20Window&amp;severity=high&amp;id=6944ed7819341fe18887d792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14546-cross-site-request-forgery-csrf-in--0167bf96</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14546%3A%20Cross-site%20Request%20Forgery%20(CSRF)%20in%20fastapi-sso&amp;severity=medium&amp;id=6944df6e19341fe18884f730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14940-sql-injection-in-code-projects-scho-08664755</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14940%3A%20SQL%20Injection%20in%20code-projects%20Scholars%20Tracking%20System&amp;severity=medium&amp;id=6944d15919341fe188822336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14939-sql-injection-in-code-projects-onli-7bf2961b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14939%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=6944d15919341fe188822319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/research-geometric-analysis-of-sha-256-finding-68--d4c16e12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BResearch%5D%20Geometric%20analysis%20of%20SHA-256%3A%20Finding%2068%25%20bit-match%20pairs%20through%20dimensional%20transformation&amp;severity=medium&amp;id=6944b4524eb3efac36c3350b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13941-cwe-732-incorrect-permission-assign-0aef8af7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13941%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944b7d24eb3efac36c40a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52692-vulnerability-in-linksys-linksys-e9-4ceaf0da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52692%3A%20Vulnerability%20in%20Linksys%20Linksys%20E9450-SG&amp;severity=high&amp;id=6944b7d24eb3efac36c40a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14910-path-traversal-in-edimax-br-6208ac-2c60754f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14910%3A%20Path%20Traversal%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14909-manage-user-sessions-in-jeecgboot-807bf1b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14909%3A%20Manage%20User%20Sessions%20in%20JeecgBoot&amp;severity=medium&amp;id=6944a9c54eb3efac36c013f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14908-improper-authentication-in-jeecgboo-5a05bcaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14908%3A%20Improper%20Authentication%20in%20JeecgBoot&amp;severity=medium&amp;id=6944a2ba4eb3efac36beeb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11774-cwe-78-improper-neutralization-of-s-cf4c89d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11774%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=high&amp;id=69449f434eb3efac36bb56a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14900-sql-injection-in-codeastro-real-est-3937182a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14900%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=69449f434eb3efac36bb56b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14899-sql-injection-in-codeastro-real-est-5f54f327</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14899%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=69449f434eb3efac36bb56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14733-cwe-787-out-of-bounds-write-in-watc-6a8ed88f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14733%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=critical&amp;id=69449f434eb3efac36bb56a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-19-936b8ab9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-19&amp;severity=medium&amp;id=6945e89ad64a69f72fb550f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63665-na-3788a013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63665%3A%20n%2Fa&amp;severity=critical&amp;id=6945875ff063e4fadffe4631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67442-na-fb96278b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67442%3A%20n%2Fa&amp;severity=high&amp;id=69457615133fda1465bcd188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66905-na-dac37d1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66905%3A%20n%2Fa&amp;severity=high&amp;id=694570c4133fda1465b7b150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66906-na-574df72b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66906%3A%20n%2Fa&amp;severity=medium&amp;id=69456e3ba90e3c9a15456616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66908-na-170811fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66908%3A%20n%2Fa&amp;severity=medium&amp;id=69456762a90e3c9a1540c4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66910-na-b1f4754d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66910%3A%20n%2Fa&amp;severity=medium&amp;id=69456762a90e3c9a1540c4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50681-na-6dd0a897</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50681%3A%20n%2Fa&amp;severity=high&amp;id=69456762a90e3c9a1540c4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66909-na-368d6d13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66909%3A%20n%2Fa&amp;severity=high&amp;id=694563c4a90e3c9a153eb8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66911-na-9d398eb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66911%3A%20n%2Fa&amp;severity=medium&amp;id=69456029a90e3c9a153cc466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67846-cwe-472-external-control-of-assumed-9813c718</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67846%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67845-cwe-24-path-traversal-filedir-in-mi-ac7a313c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67845%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67844-cwe-425-direct-request-forced-brows-4d47529d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67844%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67843-cwe-1336-improper-neutralization-of-73b33a02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67843%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Mintlify%20Mintlify%20Platform&amp;severity=high&amp;id=6944b7d24eb3efac36c40a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67842-cwe-829-inclusion-of-functionality--cf753aa3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67842%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14898-sql-injection-in-codeastro-real-est-5142238d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14898%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=694491254eb3efac36b3b60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14897-sql-injection-in-codeastro-real-est-3a585ee7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14897%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=694491254eb3efac36b3b608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64675-cwe-79-improper-neutralization-of-i-197cbe83</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64675%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20Cosmos%20DB&amp;severity=high&amp;id=69448da64eb3efac36b2e5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68398-cwe-20-improper-input-validation-in-186802ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68398%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20WeblateOrg%20weblate&amp;severity=critical&amp;id=69448a1d4eb3efac36b25ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68279-cwe-22-improper-limitation-of-a-pat-32cc7cef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68279%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69448a1d4eb3efac36b25ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68422-cwe-863-incorrect-authorization-in--fa007da8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68422%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=694483164eb3efac36b0f27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68386-cwe-863-incorrect-authorization-in--acad51ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68386%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=694483164eb3efac36b0f280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68390-cwe-770-allocation-of-resources-wit-4f6b919c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68390%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=69447f924eb3efac36af9a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68389-cwe-770-allocation-of-resources-wit-e3a8c1ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68389%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69447f924eb3efac36af9a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68387-cwe-79-improper-neutralization-of-i-60505a08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69447f924eb3efac36af9a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68385-cwe-79-improper-neutralization-of-i-ec595932</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69447f924eb3efac36af9a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68384-cwe-770-allocation-of-resources-wit-0091fbad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68384%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=69447c134eb3efac36aec21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64677-cwe-79-improper-neutralization-of-i-f84c1f6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64677%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Office%20Out-of-Box%20Experience&amp;severity=high&amp;id=69447c134eb3efac36aec210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64676-cwe-94-improper-control-of-generati-e958604e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64676%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69447c134eb3efac36aec20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65037-cwe-94-improper-control-of-generati-ddd87b56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65037%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Azure%20Container%20Apps&amp;severity=critical&amp;id=69447c134eb3efac36aec213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65041-cwe-285-improper-authorization-in-m-738f9e8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65041%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Partner%20Center&amp;severity=critical&amp;id=69447c134eb3efac36aec216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64663-cwe-918-server-side-request-forgery-4a0523d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64663%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Cognitive%20Service%20for%20Language&amp;severity=critical&amp;id=69447c134eb3efac36aec20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65046-spoofing-in-microsoft-microsoft-edg-c7e523a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65046%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=low&amp;id=69447c134eb3efac36aec219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68383-cwe-1284-improper-validation-of-spe-5a5d7031</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68383%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Filebeat&amp;severity=medium&amp;id=69447c134eb3efac36aec21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13427-cwe-287-improper-authentication-in--4490b313</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13427%3A%20CWE-287%20Improper%20Authentication%20in%20Google%20Cloud%20Dialogflow%20CX%20Messenger&amp;severity=medium&amp;id=69447c134eb3efac36aec222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68382-cwe-125-out-of-bounds-read-in-elast-65a4ffd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68382%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69447c134eb3efac36aec225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68381-cwe-787-out-of-bounds-write-in-elas-67fe2acd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68381%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=6944788a4eb3efac36ae0ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68388-cwe-770-allocation-of-resources-wit-dcae1706</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68388%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=694475234eb3efac36ad1c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-targets-gladinet-centrestack-in-da-c35cedf6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20ransomware%20targets%20Gladinet%20CentreStack%20in%20data%20theft%20attacks&amp;severity=high&amp;id=694475034eb3efac36ad185d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-sydney-suffers-data-breach-exposing--2bf13239</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Sydney%20suffers%20data%20breach%20exposing%20student%20and%20staff%20info&amp;severity=high&amp;id=694475034eb3efac36ad1859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34451-cwe-121-stack-based-buffer-overflow-b557dacc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34451%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20rofl0r%20proxychains-ng&amp;severity=medium&amp;id=694471834eb3efac36abad29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34450-cwe-121-stack-based-buffer-overflow-73a71696</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34450%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20merbanan%20rtl_433&amp;severity=medium&amp;id=694471834eb3efac36abad23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34449-cwe-119-improper-restriction-of-ope-b8f14c0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34449%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Genymobile%20scrcpy&amp;severity=medium&amp;id=694471834eb3efac36abad1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53710-the-product-does-not-properly-compa-237abb75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53710%3A%20The%20product%20does%20not%20properly%20compartmentalize%20or%20isolate%20functionality%2C%20processes%2C%20or%20resources%20that%20require%20different%20privilege%20levels%2C%20rights%2C%20or%20permissions.%20in%20Palantir%20com.palantir.compute%3Acompute-service&amp;severity=high&amp;id=694471834eb3efac36abad33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68161-cwe-297-improper-validation-of-cert-e05a34ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68161%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69446a7c4eb3efac36a96175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67653-cwe-22-in-advantech-webaccessscada-6eeebc62</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67653%3A%20CWE-22%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=medium&amp;id=69446a7c4eb3efac36a96197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62004-cwe-367-time-of-check-time-of-use-t-c33b54ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62004%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20BullWall%20Server%20Intrusion%20Protection&amp;severity=high&amp;id=69446a7c4eb3efac36a96193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62003-cwe-367-time-of-check-time-of-use-t-93d17383</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62003%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20BullWall%20Server%20Intrusion%20Protection&amp;severity=high&amp;id=69446a7c4eb3efac36a9618f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46268-cwe-89-in-advantech-webaccessscada-8758bd00</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46268%3A%20CWE-89%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=medium&amp;id=69446a7c4eb3efac36a9618a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14848-cwe-36-in-advantech-webaccessscada-1dd8a4cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14848%3A%20CWE-36%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=medium&amp;id=694466f94eb3efac36a822ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62002-cwe-358-improperly-implemented-secu-2dd2851a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62002%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20BullWall%20Ransomware%20Containment&amp;severity=medium&amp;id=694466f94eb3efac36a822c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14849-cwe-434-in-advantech-webaccessscada-fb4363c0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14849%3A%20CWE-434%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=high&amp;id=694466f94eb3efac36a822b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62001-cwe-420-unprotected-alternate-chann-c08209ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62001%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20BullWall%20Ransomware%20Containment&amp;severity=high&amp;id=694466f94eb3efac36a822c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62000-cwe-1023-incomplete-comparison-with-6b3774ce</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62000%3A%20CWE-1023%20Incomplete%20Comparison%20with%20Missing%20Factors%20in%20BullWall%20Ransomware%20Containment&amp;severity=high&amp;id=694466f94eb3efac36a822bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14850-cwe-22-in-advantech-webaccessscada-a5857d11</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14850%3A%20CWE-22%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=high&amp;id=694466f94eb3efac36a822b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13911-cwe-250-in-inductive-automation-ign-4659c19c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13911%3A%20CWE-250%20in%20Inductive%20Automation%20Ignition&amp;severity=medium&amp;id=69446a7c4eb3efac36a9617d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14889-improper-authorization-in-campcodes-768d03ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14889%3A%20Improper%20Authorization%20in%20Campcodes%20Advanced%20Voting%20Management%20System&amp;severity=medium&amp;id=69445ff04eb3efac36a51161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53940-improper-control-of-generation-of-c-41124e09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53940%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Alfonzm%20Codigo%20Markdown%20Editor&amp;severity=high&amp;id=69445ff04eb3efac36a5115c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58323-improper-neutralization-of-input-du-e04b8df2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58322-improper-neutralization-of-input-du-ae016e7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a5145c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58321-improper-neutralization-of-input-du-93d3908c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58321%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58320-exposure-of-sensitive-system-inform-55a8ee17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58320%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58319-improper-neutralization-of-input-du-d4bcaecf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58319%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58318-improper-neutralization-of-input-du-7dce5008</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58318%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a5144c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58317-sensitive-cookie-in-https-session-w-f022bc87</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58317%3A%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53944-improper-limitation-of-a-pathname-t-e72a8f55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53944%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Easyphp%20EasyPHP%20Webserver&amp;severity=high&amp;id=69445ff24eb3efac36a51443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53943-observable-discrepancy-in-glpi-proj-1ed08ea6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53943%3A%20Observable%20Discrepancy%20in%20Glpi-Project%20GLPI&amp;severity=medium&amp;id=69445ff24eb3efac36a5143e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53942-unrestricted-upload-of-file-with-da-33ff8834</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53942%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20leefish%20File%20Thingie&amp;severity=critical&amp;id=69445ff24eb3efac36a51439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53941-improper-neutralization-of-special--e06a1807</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53941%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Easyphp%20EasyPHP%20Webserver&amp;severity=critical&amp;id=69445ff04eb3efac36a51187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53938-improper-neutralization-of-input-du-704d5343</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iwind%20RockMongo&amp;severity=medium&amp;id=69445ff04eb3efac36a51182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53936-improper-neutralization-of-input-du-b7cb8c17</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tuzitio%20Cameleon%20CMS&amp;severity=medium&amp;id=69445ff04eb3efac36a5117d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53935-improper-neutralization-of-special--70960e6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53935%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Codester%20WBiz%20Desk&amp;severity=medium&amp;id=69445ff04eb3efac36a51178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53934-improper-neutralization-of-server-s-45238502</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53934%3A%20Improper%20Neutralization%20of%20Server-Side%20Includes%20(SSI)%20Within%20a%20Web%20Page%20in%20Kentico%20Xperience&amp;severity=high&amp;id=69445ff04eb3efac36a51174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53738-improper-neutralization-of-input-du-bd88573c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff04eb3efac36a51170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53737-improper-neutralization-of-input-du-d4695a57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff04eb3efac36a5116c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53736-improper-neutralization-of-input-du-32d50676</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53736%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff04eb3efac36a51168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64400-the-product-does-not-restrict-or-in-1e9733f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64400%3A%20The%20product%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Palantir%20com.palantir.controlpanel%3Acontrol-panel&amp;severity=medium&amp;id=694459184eb3efac36a3bd24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-password-spraying-attacks-target-cisco-pan-vpn-253ff13e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20password%20spraying%20attacks%20target%20Cisco%2C%20PAN%20VPN%20gateways&amp;severity=high&amp;id=694458e34eb3efac36a3a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-aligned-threat-group-uses-windows-group-poli-ccd395e3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Aligned%20Threat%20Group%20Uses%20Windows%20Group%20Policy%20to%20Deploy%20Espionage%20Malware&amp;severity=high&amp;id=694458e34eb3efac36a3a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dig-ai-uncensored-darknet-ai-assistant-at-the-serv-44b25b6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DIG%20AI%3A%20Uncensored%20Darknet%20AI%20Assistant%20at%20the%20Service%20of%20Criminals%20and%20Terrorists&amp;severity=medium&amp;id=694458e34eb3efac36a3a0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-beavertail-malware-variant-linked-to-lazarus-g-9523fb47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20BeaverTail%20Malware%20Variant%20Linked%20to%20Lazarus%20Group&amp;severity=high&amp;id=694455604eb3efac36a30571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-steals-over-2bn-in-crypto-in-2025-50c7260d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%20Steals%20Over%20%242bn%20in%20Crypto%20in%202025&amp;severity=high&amp;id=694455604eb3efac36a30575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-oneview-flaw-rated-cvss-100-allows-unauthentic-6d3538dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20OneView%20Flaw%20Rated%20CVSS%2010.0%20Allows%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=high&amp;id=694455604eb3efac36a30579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pathfindingcloud-a-library-of-aws-iam-privilege-es-31582a04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=pathfinding.cloud%20-%20A%20library%20of%20AWS%20IAM%20privilege%20escalation%20paths&amp;severity=medium&amp;id=69444e634eb3efac36a13f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-embed-new-beavertail-variant-in-deve-c44bf866</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20Embed%20New%20BeaverTail%20Variant%20in%20Developer%20Tools&amp;severity=medium&amp;id=69444ad84eb3efac36a081f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67745-cwe-402-transmission-of-private-res-0147fce4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67745%3A%20CWE-402%3A%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20Aiven-Open%20myhoard&amp;severity=high&amp;id=69444e5e4eb3efac36a13dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14885-unrestricted-upload-in-sourcecodest-6b02eee6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14885%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69444e5e4eb3efac36a13dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14739-cwe-824-access-of-uninitialized-poi-ee6d5fa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14739%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20TP-Link%20Systems%20Inc.%20WR940N%20and%20WR941ND&amp;severity=medium&amp;id=694447544eb3efac369fb3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14738-cwe-287-improper-authentication-in--f3738763</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14738%3A%20CWE-287%20Improper%20Authentication%20in%20TP-Link%20Systems%20Inc.%20WA850RE&amp;severity=medium&amp;id=694443d04eb3efac369ef739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14737-cwe-78-improper-neutralization-of-s-52edd935</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14737%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20WA850RE&amp;severity=high&amp;id=694443d04eb3efac369ef733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-prince-of-persia-resurfaces-with-new-t-69092c6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20%E2%80%98Prince%20of%20Persia%E2%80%99%20Resurfaces%20With%20New%20Tools%20and%20Global%20Targets&amp;severity=medium&amp;id=694435bc4eb3efac369bc19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14884-command-injection-in-d-link-dir-605-f27fb0bf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14884%3A%20Command%20Injection%20in%20D-Link%20DIR-605&amp;severity=high&amp;id=694435d24eb3efac369bca07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14879-stack-based-buffer-overflow-in-tend-980d32bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14879%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694435d24eb3efac369bca00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62960-cwe-862-missing-authorization-in-sp-07ee6c5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62960%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Construction%20Light&amp;severity=null&amp;id=6944323d4eb3efac369b379a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62961-cwe-862-missing-authorization-in-sp-96a77111</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62961%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Sparkle%20FSE&amp;severity=null&amp;id=6944323d4eb3efac369b379d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62998-cwe-201-insertion-of-sensitive-info-4b85d3fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62998%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Messiah%20WP%20AI%20CoPilot&amp;severity=null&amp;id=6944323d4eb3efac369b37a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63002-cwe-862-missing-authorization-in-wp-5aedb54f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63002%3A%20Missing%20Authorization%20in%20wpforchurch%20Sermon%20Manager&amp;severity=null&amp;id=6944323d4eb3efac369b37a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63043-cwe-639-authorization-bypass-throug-156d0aca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63043%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=null&amp;id=6944323d4eb3efac369b37a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64235-cwe-22-improper-limitation-of-a-pat-c4795854</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64235%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AmentoTech%20Tuturn&amp;severity=medium&amp;id=6944323d4eb3efac369b37a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64236-cwe-288-authentication-bypass-using-414f4af6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64236%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20AmentoTech%20Tuturn&amp;severity=critical&amp;id=6944323d4eb3efac369b37af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14896-files-or-directories-accessible-to--f96436ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14896%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20yuzutech%20kroki&amp;severity=high&amp;id=6944323d4eb3efac369b37ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64282-cwe-639-authorization-bypass-throug-3c6dd366</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64282%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20RadiusTheme%20Radius%20Blocks&amp;severity=null&amp;id=69443cc84eb3efac369d2e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64355-cwe-79-improper-neutralization-of-i-94e56e13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=6944323d4eb3efac369b37b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66058-cwe-862-missing-authorization-in-pi-5620b7ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66058%3A%20Missing%20Authorization%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=null&amp;id=6944323d4eb3efac369b37b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14878-stack-based-buffer-overflow-in-tend-832aeece</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14878%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=69442b344eb3efac36990c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14877-sql-injection-in-campcodes-supplier-9e879e33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14877%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=69442b344eb3efac36990c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14823-cwe-201-insertion-of-sensitive-info-a7d3f81a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14823%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ConnectWise%20ScreenConnect&amp;severity=medium&amp;id=6944242d4eb3efac36964740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uefi-vulnerability-in-major-motherboards-enables-e-f792c7c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UEFI%20Vulnerability%20in%20Major%20Motherboards%20Enables%20Early-Boot%20Attacks&amp;severity=medium&amp;id=6944209a4eb3efac369568a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64724-cwe-276-incorrect-default-permissio-363ef435</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64724%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20arduino%20arduino-ide&amp;severity=medium&amp;id=69441d2a4eb3efac369420af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64723-cwe-276-incorrect-default-permissio-c22765a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64723%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20arduino%20arduino-ide&amp;severity=medium&amp;id=69441d2a4eb3efac369420a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65011-cwe-425-direct-request-forced-brows-4322ca1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65011%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65010-cwe-306-missing-authentication-for--4e3e22c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65010%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65009-cwe-256-plaintext-storage-of-a-pass-0ec48ee3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65009%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65008-cwe-78-improper-neutralization-of-s-d341792b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65008%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WODESYS%20WD-R608U&amp;severity=critical&amp;id=69441d2f4eb3efac369421ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65007-cwe-306-missing-authentication-for--727ac4e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65007%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-patches-critical-flaw-in-it-infrastructure-man-912fda4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20Patches%20Critical%20Flaw%20in%20IT%20Infrastructure%20Management%20Software&amp;severity=critical&amp;id=694419924eb3efac3690e8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64469-cwe-121-stack-based-buffer-overflow-1b1ce284</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64469%3A%20CWE-121%20-%20Stack-based%20Buffer%20Overflow%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64468-cwe-416-use-after-free-in-ni-labvie-40c52f4a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64468%3A%20CWE-416%20Use%20After%20Free%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7358-cwe-798-use-of-hard-coded-credential-d9b40039</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7358%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=694416204eb3efac368e65d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7047-cwe-862-missing-authorization-in-uta-85b0834d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7047%3A%20CWE-862%20Missing%20Authorization%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=medium&amp;id=694416204eb3efac368e65e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64467-cwe-125-out-of-bounds-read-in-ni-la-4b37ff21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64467%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-oneview-flaw-rated-cvss-100-allows-unauthentic-92e1896b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20OneView%20Flaw%20Rated%20CVSS%2010.0%20Allows%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=6944e77519341fe1888671e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64466-cwe-125-out-of-bounds-read-in-ni-la-ade9688b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64466%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64465-cwe-125-out-of-bounds-read-in-ni-la-03680b5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64465%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64464-cwe-125-out-of-bounds-read-in-ni-la-c761ae48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64464%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64463-cwe-125-out-of-bounds-read-in-ni-la-727099c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64463%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1031-cwe-639-authorization-bypass-through-52f38987</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1031%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=694412994eb3efac368d95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64462-cwe-125-out-of-bounds-read-in-ni-la-2b265abe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64462%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1030-cwe-359-exposure-of-private-personal-fe8e64a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1030%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=69440f154eb3efac368cd70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64461-cwe-787-out-of-bounds-write-in-ni-l-3c49877a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64461%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69440f154eb3efac368cd710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14861-vulnerability-in-mozilla-firefox-9685657f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14861%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69440f154eb3efac368cd706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14860-vulnerability-in-mozilla-firefox-82f60082</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14860%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69440f154eb3efac368cd702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14744-vulnerability-in-mozilla-firefox-fo-bde4dbc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14744%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=69440f154eb3efac368cd6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1029-cwe-798-use-of-hard-coded-credential-6b7120c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1029%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Utarit%20Information%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=69440f154eb3efac368cd70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9787-cwe-79-improper-neutralization-of-in-52164820</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Applications%20Manager&amp;severity=medium&amp;id=69440f154eb3efac368cd713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65000-cwe-212-improper-removal-of-sensiti-4c4606b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65000%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=low&amp;id=69440bfa4eb3efac368bf684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-hubspot-phishing-campaign-9c5426b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20HubSpot%20Phishing%20Campaign&amp;severity=medium&amp;id=694408114eb3efac368aaf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-stealka-stealer-hijacks-accounts-and-steals-cr-5c6750cb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Stealka%20stealer%20hijacks%20accounts%20and%20steals%20crypto%20while%20masquerading%20as%20pirated%20software%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6944054f4eb3efac3689efa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/access-granted-phishing-with-device-code-authoriza-75df8ed8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Access%20granted%3A%20phishing%20with%20device%20code%20authorization%20for%20account%20takeover&amp;severity=medium&amp;id=6944242b4eb3efac36964678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-flaw-in-asus-update-tool-252cfa27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20Flaw%20in%20Asus%20Update%20Tool&amp;severity=medium&amp;id=6944051a4eb3efac3689cb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40898-cwe-22-improper-limitation-of-a-pat-9b5d57c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40898%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=694401044eb3efac3688609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40893-cwe-79-improper-neutralization-of-i-099af892</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=694401044eb3efac36886097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40892-cwe-79-improper-neutralization-of-i-acbcde93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=694401044eb3efac36886094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40891-cwe-79-improper-neutralization-of-i-6aec0b9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=low&amp;id=694401044eb3efac36886091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-whatsapp-hijacks-mcp-leaks-ai--0207a7b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20WhatsApp%20Hijacks%2C%20MCP%20Leaks%2C%20AI%20Recon%2C%20React2Shell%20Exploit%20and%2015%20More%20Stories&amp;severity=medium&amp;id=6944e77519341fe1888671ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-hackers-steal-202-billion-in-20-e0770956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Linked%20Hackers%20Steal%20%242.02%20Billion%20in%202025%2C%20Leading%20Global%20Crypto%20Theft&amp;severity=medium&amp;id=6944e77519341fe1888671ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13110-cwe-639-authorization-bypass-throug-e2175abb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13110%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=6943f2f44eb3efac36830805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14437-cwe-532-insertion-of-sensitive-info-132acec1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14437%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20wpmudev%20Hummingbird%20Performance%20%E2%80%93%20Cache%20%26%20Page%20Speed%20Optimization%20for%20Core%20Web%20Vitals%20%7C%20Critical%20CSS%20%7C%20Minify%20CSS%20%7C%20Defer%20CSS%20Javascript%20%7C%20CDN&amp;severity=high&amp;id=6943f2f44eb3efac3683080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14618-cwe-862-missing-authorization-in-li-b0bcebfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14618%3A%20CWE-862%20Missing%20Authorization%20in%20wpdirectorykit%20Sweet%20Energy%20Efficiency&amp;severity=medium&amp;id=6943f2f44eb3efac36830812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14277-cwe-918-server-side-request-forgery-c4d54bf2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14277%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6943f2f44eb3efac3683080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-case-for-dynamic-ai-saas-security-as-copilots--814f4403</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Case%20for%20Dynamic%20AI-SaaS%20Security%20as%20Copilots%20Scale&amp;severity=medium&amp;id=6944e77519341fe1888671f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10910-cwe-639-authorization-bypass-throug-3488e573</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10910%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Govee%20H6056&amp;severity=critical&amp;id=6943e86c4eb3efac367ff766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/113000-impacted-by-data-breach-at-virginia-mental--28f003f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=113%2C000%20Impacted%20by%20Data%20Breach%20at%20Virginia%20Mental%20Health%20Authority&amp;severity=medium&amp;id=6943e1514eb3efac367e3aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zeroday-cloud-hacking-event-awards-3200000-for-11--58d27060</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zeroday%20Cloud%20hacking%20event%20awards%20%24320%2C0000%20for%2011%20zero%20days&amp;severity=critical&amp;id=6943da584eb3efac367cd1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-asus-live-update-flaw-after-ev-95e8b5d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20ASUS%20Live%20Update%20Flaw%20After%20Evidence%20of%20Active%20Exploitation&amp;severity=critical&amp;id=6943da584eb3efac367cd1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-spreads-docswap-android-malware-via-qr-phi-8f1eaaf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Spreads%20DocSwap%20Android%20Malware%20via%20QR%20Phishing%20Posing%20as%20Delivery%20App&amp;severity=high&amp;id=6943da584eb3efac367cd1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/france-probes-foreign-interference-after-remote-co-aea49651</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=France%20Probes%20%E2%80%98Foreign%20Interference%E2%80%99%20After%20Remote%20Control%20Malware%20Found%20on%20Passenger%20Ferry&amp;severity=medium&amp;id=6943d3424eb3efac367b3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orm-leaking-more-than-you-joined-for-part-33-on-or-59b12903</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ORM%20Leaking%20More%20Than%20You%20Joined%20For%20-%20Part%203%2F3%20on%20ORM%20Leak%20Vulnerabilities&amp;severity=medium&amp;id=6943cc4d4eb3efac36794bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14364-cwe-862-missing-authorization-in-kr-d026b68d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14364%3A%20CWE-862%20Missing%20Authorization%20in%20kraftplugins%20Demo%20Importer%20Plus&amp;severity=high&amp;id=6943cc484eb3efac36794b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13730-cwe-79-improper-neutralization-of-i-0ed3a838</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20daggerhart%20OpenID%20Connect%20Generic%20Client&amp;severity=medium&amp;id=6943cc484eb3efac36794b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13641-cwe-22-improper-limitation-of-a-pat-737604d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13641%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20smub%20Photo%20Gallery%2C%20Sliders%2C%20Proofing%20and%20Themes%20%E2%80%93%20NextGEN%20Gallery&amp;severity=high&amp;id=6943cc484eb3efac36794b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64997-cwe-280-improper-handling-of-insuff-32f1c412</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64997%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=6943c8c34eb3efac3678171c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-patches-exploited-sma-1000-zero-day-0b1eed74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Patches%20Exploited%20SMA%201000%20Zero-Day&amp;severity=critical&amp;id=6943c5314eb3efac3676c54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14874-improper-check-or-handling-of-excep-67b511f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14874%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20Red%20Hat%20Red%20Hat%20Advanced%20Cluster%20Management%20for%20Kubernetes%202&amp;severity=medium&amp;id=6943c1bb4eb3efac3675c967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14318-cwe-863-incorrect-authorization-in--dc1411c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14318%3A%20CWE-863%20Incorrect%20Authorization%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=6943b3ab4eb3efac3671aa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67546-exposure-of-sensitive-system-inform-ae67d079</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67546%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20weDevs%20WP%20ERP&amp;severity=medium&amp;id=6943b0574eb3efac36700b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66119-improper-neutralization-of-input-du-29b87daa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66119%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Hostel&amp;severity=high&amp;id=6943b0574eb3efac36700b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66118-improper-neutralization-of-input-du-706be7f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66118%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Sprout%20Clients&amp;severity=high&amp;id=6943b0574eb3efac36700b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66117-missing-authorization-in-ays-pro-ea-5d57de8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66117%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Easy%20Form&amp;severity=high&amp;id=6943b0574eb3efac36700b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66116-insertion-of-sensitive-information--44febdc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66116%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20UserElements%20Ultimate%20Member%20Widgets%20for%20Elementor&amp;severity=high&amp;id=6943b0574eb3efac36700b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66104-missing-authorization-in-anton-vany-cd195efc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66104%3A%20Missing%20Authorization%20in%20Anton%20Vanyukov%20Offload%2C%20AI%20%26amp%3B%20Optimize%20with%20Cloudflare%20Images&amp;severity=medium&amp;id=6943b0574eb3efac36700b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66102-improper-neutralization-of-input-du-beae84bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FolioVision%20FV%20Antispam&amp;severity=high&amp;id=6943b0574eb3efac36700b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66100-missing-authorization-in-magnigenie-e1c75802</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66100%3A%20Missing%20Authorization%20in%20Magnigenie%20RestroPress&amp;severity=medium&amp;id=6943b0574eb3efac36700b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66088-missing-authorization-in-property-h-1ca157f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66088%3A%20Missing%20Authorization%20in%20Property%20Hive%20PropertyHive&amp;severity=high&amp;id=6943b0564eb3efac36700b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66078-improper-control-of-generation-of-c-3efabb23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66078%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20jetmonsters%20Hotel%20Booking%20Lite&amp;severity=critical&amp;id=6943b0564eb3efac36700b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66074-unrestricted-upload-of-file-with-da-496ef0ea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66074%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cozmoslabs%20WP%20Webhooks&amp;severity=critical&amp;id=6943b0564eb3efac36700b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66070-missing-authorization-in-tomdever-w-10b207cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66070%3A%20Missing%20Authorization%20in%20Tomdever%20wpForo%20Forum&amp;severity=high&amp;id=6943b0564eb3efac36700b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66068-missing-authorization-in-instawp-in-8ccc0e9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66068%3A%20Missing%20Authorization%20in%20InstaWP%20InstaWP%20Connect&amp;severity=medium&amp;id=6943b0564eb3efac36700b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66054-missing-authorization-in-thimpress--ef86ffb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66054%3A%20Missing%20Authorization%20in%20ThimPress%20LearnPress&amp;severity=high&amp;id=6943b0564eb3efac36700b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64378-missing-authorization-in-cridiostud-06d3196a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64378%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=6943b0564eb3efac36700b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64377-improper-control-of-filename-for-in-ad79603f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64377%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=6943b0564eb3efac36700b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64376-improper-neutralization-of-input-du-0b7551cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=6943b0564eb3efac36700b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64375-missing-authorization-in-mahmudul-h-01257310</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64375%3A%20Missing%20Authorization%20in%20Mahmudul%20Hasan%20Arif%20WP%20Social%20Ninja&amp;severity=medium&amp;id=6943b0564eb3efac36700b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64374-unrestricted-upload-of-file-with-da-157631bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64374%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StylemixThemes%20Motors&amp;severity=critical&amp;id=6943b0544eb3efac36700ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64373-improper-control-of-filename-for-in-77102f0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=6943b0544eb3efac36700adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64372-improper-neutralization-of-input-du-1dcb7b31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64372%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=6943b0544eb3efac36700adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64371-improper-neutralization-of-special--d8f288ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64371%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=6943b0544eb3efac36700ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64295-insertion-of-sensitive-information--cba8bb88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64295%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Syed%20Balkhi%20All%20In%20One%20SEO%20Pack&amp;severity=medium&amp;id=6943b0544eb3efac36700ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64273-missing-authorization-in-getrespons-15884e0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64273%3A%20Missing%20Authorization%20in%20GetResponse%20Email%20marketing%20for%20WordPress%20by%20GetResponse%20Official&amp;severity=high&amp;id=6943b0544eb3efac36700ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64272-exposure-of-sensitive-system-inform-440d7d4a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64272%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20GetResponse%20Email%20marketing%20for%20WordPress%20by%20GetResponse%20Official&amp;severity=medium&amp;id=6943b0544eb3efac36700ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64270-exposure-of-sensitive-system-inform-df4da6e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64270%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=medium&amp;id=6943b0544eb3efac36700acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64268-missing-authorization-in-arraytics--f8238140</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64268%3A%20Missing%20Authorization%20in%20Arraytics%20Timetics&amp;severity=high&amp;id=6943b0544eb3efac36700aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64266-deserialization-of-untrusted-data-i-aa9cfce6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64266%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=high&amp;id=6943b0544eb3efac36700ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64260-improper-neutralization-of-input-du-4508b2aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64260%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marco%20Milesi%20ANAC%20XML%20Bandi%20di%20Gara&amp;severity=high&amp;id=6943b0534eb3efac36700aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64258-exposure-of-sensitive-system-inform-8beff33b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64258%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20wpweb%20Follow%20My%20Blog%20Post&amp;severity=high&amp;id=6943b0534eb3efac36700ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64233-deserialization-of-untrusted-data-i-eb415402</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64233%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Codiqa&amp;severity=critical&amp;id=6943b0534eb3efac36700ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64231-unrestricted-upload-of-file-with-da-0100cecd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64231%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RedefiningTheWeb%20WordPress%20Contact%20Form%207%20PDF%2C%20Google%20Sheet%20%26%20Database&amp;severity=critical&amp;id=6943b0534eb3efac36700ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64230-improper-limitation-of-a-pathname-t-1226ec74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64230%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WP%20Chill%20Filr&amp;severity=high&amp;id=6943b0534eb3efac36700aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64227-deserialization-of-untrusted-data-i-d0b8dbab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64227%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=critical&amp;id=6943b0534eb3efac36700aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64225-improper-neutralization-of-script-r-72de1e5b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64225%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20colabrio%20Stockie%20Extra&amp;severity=medium&amp;id=6943b0534eb3efac36700aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64223-improper-control-of-filename-for-in-8647e9ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64223%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PenciDesign%20PenNews&amp;severity=high&amp;id=6943b0534eb3efac36700aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64222-missing-authorization-in-fantasticp-55de75f0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64222%3A%20Missing%20Authorization%20in%20FantasticPlugins%20WooCommerce%20Recover%20Abandoned%20Cart&amp;severity=high&amp;id=6943b0534eb3efac36700aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64221-improper-neutralization-of-input-du-eba2349f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64221%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20Reservation%20Plugin&amp;severity=high&amp;id=6943b0534eb3efac36700a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64218-insertion-of-sensitive-information--7186db2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64218%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Chill%20Passster&amp;severity=high&amp;id=6943b0514eb3efac36700a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64217-improper-neutralization-of-input-du-ad04acc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64217%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=6943b0514eb3efac36700a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64214-missing-authorization-in-stylemixth-cbd3d425</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64214%3A%20Missing%20Authorization%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=high&amp;id=6943b0514eb3efac36700a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64213-insertion-of-sensitive-information--b49195e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64213%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=high&amp;id=6943b0514eb3efac36700a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64209-missing-authorization-in-stylemixth-c6e023c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64209%3A%20Missing%20Authorization%20in%20StylemixThemes%20Masterstudy&amp;severity=high&amp;id=6943b0514eb3efac36700a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64207-improper-neutralization-of-input-du-a07a09be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64207%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TieLabs%20Jannah&amp;severity=high&amp;id=6943b0514eb3efac36700a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64206-deserialization-of-untrusted-data-i-54558714</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64206%3A%20Deserialization%20of%20Untrusted%20Data%20in%20TieLabs%20Jannah&amp;severity=critical&amp;id=6943b0514eb3efac36700a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64205-improper-control-of-filename-for-in-898693ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64205%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TieLabs%20Jannah&amp;severity=high&amp;id=6943b0514eb3efac36700a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64203-improper-neutralization-of-input-du-0bd9616a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64203%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EverPress%20Mailster&amp;severity=high&amp;id=6943b0514eb3efac36700a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64193-improper-control-of-filename-for-in-7a872eb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64193%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%208theme%20XStore&amp;severity=high&amp;id=6943b0514eb3efac36700a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64192-missing-authorization-in-8theme-xst-5f9866e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64192%3A%20Missing%20Authorization%20in%208theme%20XStore&amp;severity=medium&amp;id=6943b04f4eb3efac36700888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64191-improper-neutralization-of-input-du-046b5834</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64191%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore&amp;severity=high&amp;id=6943b04f4eb3efac36700885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64189-improper-neutralization-of-input-du-b34d095a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64189%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=high&amp;id=6943b04f4eb3efac36700882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64188-incorrect-privilege-assignment-in-p-5d0acbf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64188%3A%20Incorrect%20Privilege%20Assignment%20in%20PenciDesign%20Soledad&amp;severity=critical&amp;id=6943b04f4eb3efac3670087f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6326-improper-control-of-filename-for-inc-310fbee6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Inset&amp;severity=high&amp;id=6943b0574eb3efac36700b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6324-improper-neutralization-of-input-dur-fa24820e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MatrixAddons%20Easy%20Invoice&amp;severity=high&amp;id=6943b0574eb3efac36700b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63039-missing-authorization-in-cridiostud-2f0ce5bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63039%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=medium&amp;id=6943b04f4eb3efac3670087c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60182-improper-neutralization-of-input-du-9e5993e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60182%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=high&amp;id=6943b04f4eb3efac36700879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60180-deserialization-of-untrusted-data-i-c6d73945</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60180%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Salesforce&amp;severity=critical&amp;id=6943b04f4eb3efac36700876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60178-deserialization-of-untrusted-data-i-7c1c4a50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60178%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20HubSpot&amp;severity=critical&amp;id=6943b04f4eb3efac36700873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60174-deserialization-of-untrusted-data-i-2c012f73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60174%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Constant%20Contact%20Plugin&amp;severity=critical&amp;id=6943b04f4eb3efac36700870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60091-deserialization-of-untrusted-data-i-bcc97e76</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60091%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Zoho%20CRM%20and%20Bigin&amp;severity=critical&amp;id=6943b04f4eb3efac3670086d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60090-deserialization-of-untrusted-data-i-8078a441</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60090%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Insightly&amp;severity=critical&amp;id=6943b04e4eb3efac36700394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60089-deserialization-of-untrusted-data-i-2935f42a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60089%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20FreshDesk%20Plugin&amp;severity=critical&amp;id=6943b04e4eb3efac36700391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60088-missing-authorization-in-saleswonde-0d01330e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60088%3A%20Missing%20Authorization%20in%20Saleswonder%20Team%3A%20Tobias%20WebinarIgnition&amp;severity=medium&amp;id=6943b04e4eb3efac3670038e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60086-missing-authorization-in-matt-wp-vo-d20e9f75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60086%3A%20Missing%20Authorization%20in%20Matt%20WP%20Voting%20Contest&amp;severity=high&amp;id=6943b04e4eb3efac3670038b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60084-deserialization-of-untrusted-data-i-cce7d12f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60084%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20Elementor%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=high&amp;id=6943b04e4eb3efac36700388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60083-deserialization-of-untrusted-data-i-8c8b0a51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60083%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20Invoice%20Builder%20for%20WooCommerce&amp;severity=high&amp;id=6943b04e4eb3efac36700385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60082-deserialization-of-untrusted-data-i-a3acb28d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60082%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=high&amp;id=6943b04e4eb3efac36700382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60081-deserialization-of-untrusted-data-i-70f10eec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60081%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20Contact%20Form%207&amp;severity=high&amp;id=6943b04e4eb3efac3670037f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60080-deserialization-of-untrusted-data-i-9b656e2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60080%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20Gravity%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=high&amp;id=6943b04e4eb3efac3670037c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60079-missing-authorization-in-bplugins-p-3a661dbb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60079%3A%20Missing%20Authorization%20in%20bPlugins%20Parallax%20Section%20block&amp;severity=high&amp;id=6943b04e4eb3efac36700379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60078-improper-control-of-filename-for-in-9a39ec2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60078%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Agence%20web%20Eoxia%20%26%238211%3B%20Montpellier%20Task%20Manager&amp;severity=high&amp;id=6943b04c4eb3efac36700367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60077-missing-authorization-in-yaycommerc-bae79feb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60077%3A%20Missing%20Authorization%20in%20YayCommerce%20YayPricing&amp;severity=high&amp;id=6943b04c4eb3efac36700364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60076-improper-control-of-filename-for-in-29481198</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Jiro%20Sasamoto%20Ray%20Enterprise%20Translation&amp;severity=high&amp;id=6943b04c4eb3efac36700361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60072-improper-control-of-filename-for-in-0af44a05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60072%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Processby%20Anchor%20smooth%20scroll&amp;severity=high&amp;id=6943b04c4eb3efac3670035e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60071-improper-control-of-filename-for-in-1d495539</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60071%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Riode&amp;severity=high&amp;id=6943b04c4eb3efac3670035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60070-improper-control-of-generation-of-c-23d08543</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60070%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20The4%20Molla&amp;severity=medium&amp;id=6943b04c4eb3efac36700358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60069-improper-control-of-filename-for-in-23fdf38a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60069%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20MinimogWP&amp;severity=high&amp;id=6943b04c4eb3efac36700355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60068-improper-control-of-generation-of-c-31d72f12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60068%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20javothemes%20Javo%20Core&amp;severity=medium&amp;id=6943b04c4eb3efac36700352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60067-improper-control-of-filename-for-in-dbb9b1fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Giardino&amp;severity=high&amp;id=6943b04c4eb3efac3670034f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60066-improper-control-of-filename-for-in-9458d725</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Katelyn&amp;severity=high&amp;id=6943b04c4eb3efac3670034c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60065-improper-control-of-filename-for-in-c16eddc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Pinevale&amp;severity=high&amp;id=6943b04b4eb3efac366ffb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60064-improper-control-of-filename-for-in-70a85ac2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Renewal&amp;severity=high&amp;id=6943b04b4eb3efac366ffb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60063-improper-control-of-filename-for-in-33de8f2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60063%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rosalinda&amp;severity=high&amp;id=6943b04b4eb3efac366ffb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60062-improper-neutralization-of-special--eae2adb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60062%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mmetrodw%20tPlayer&amp;severity=critical&amp;id=6943b04b4eb3efac366ffb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60061-improper-control-of-filename-for-in-3df43892</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Kicker&amp;severity=high&amp;id=6943b04b4eb3efac366ffb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60060-improper-control-of-filename-for-in-fb3c8f34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Pubzinne&amp;severity=high&amp;id=6943b04b4eb3efac366ffb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60059-improper-control-of-filename-for-in-77acb870</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60059%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20smart%20SEO&amp;severity=high&amp;id=6943b04b4eb3efac366ffb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60058-improper-control-of-filename-for-in-91e7a02c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60058%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20DetailX&amp;severity=high&amp;id=6943b04b4eb3efac366ffb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60057-improper-control-of-filename-for-in-60442586</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60057%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20DJ%20Rainflow&amp;severity=high&amp;id=6943b04b4eb3efac366ffb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60056-improper-control-of-filename-for-in-d38acf97</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60056%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Winger&amp;severity=high&amp;id=6943b04b4eb3efac366ffb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60055-improper-control-of-filename-for-in-2e231458</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60055%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Fabrica&amp;severity=high&amp;id=6943b0494eb3efac366ffa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60054-improper-control-of-filename-for-in-e52ea841</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60054%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20OnLeash&amp;severity=high&amp;id=6943b0494eb3efac366ffa91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60053-improper-control-of-filename-for-in-0d697375</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60053%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20MaxCube&amp;severity=high&amp;id=6943b0494eb3efac366ffa8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60052-improper-control-of-filename-for-in-e89862a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20W%26D&amp;severity=high&amp;id=6943b0494eb3efac366ffa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60051-improper-control-of-filename-for-in-e31bdccd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60051%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Rare%20Radio&amp;severity=high&amp;id=6943b0494eb3efac366ffa84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60050-improper-control-of-filename-for-in-e3a122e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60050%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Panda&amp;severity=high&amp;id=6943b0494eb3efac366ffa81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60049-improper-control-of-filename-for-in-348d1db2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60049%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Soleil&amp;severity=high&amp;id=6943b0494eb3efac366ffa7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60048-improper-control-of-filename-for-in-10365e4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Tripster&amp;severity=high&amp;id=6943b0494eb3efac366ffa7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60047-improper-control-of-filename-for-in-66f15b0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20IPharm&amp;severity=high&amp;id=6943b0494eb3efac366ffa78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60046-improper-control-of-filename-for-in-5a5d1cc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60046%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20HeartStar&amp;severity=high&amp;id=6943b0494eb3efac366ffa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60045-missing-authorization-in-themeateli-91a26c30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60045%3A%20Missing%20Authorization%20in%20ThemeAtelier%20IDonatePro&amp;severity=high&amp;id=6943b0474eb3efac366ff9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60044-improper-control-of-filename-for-in-3f2a9741</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60044%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Fribbo&amp;severity=high&amp;id=6943b0474eb3efac366ff9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60043-improper-control-of-filename-for-in-729a73c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60043%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wanderic&amp;severity=high&amp;id=6943b0474eb3efac366ff9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60042-improper-control-of-filename-for-in-2a45b4a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60042%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Chinchilla&amp;severity=high&amp;id=6943b0474eb3efac366ff9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59134-incorrect-privilege-assignment-in-j-3e4eaf3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59134%3A%20Incorrect%20Privilege%20Assignment%20in%20Jthemes%20Sale!%20Immigration%20law%2C%20Visa%20services%20support%2C%20Migration%20Agent%20Consulting&amp;severity=high&amp;id=6943b0474eb3efac366ff9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58951-improper-neutralization-of-special--fd987dfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58951%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartcms%20Advance%20Seat%20Reservation%20Management%20for%20WooCommerce&amp;severity=critical&amp;id=6943b0474eb3efac366ff9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58950-improper-control-of-filename-for-in-3b05f9fc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58950%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Lione&amp;severity=high&amp;id=6943b0474eb3efac366ff9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58949-improper-control-of-filename-for-in-57145155</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58949%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Spock&amp;severity=high&amp;id=6943b0474eb3efac366ff99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58948-improper-control-of-filename-for-in-47bf2b58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58948%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Aromatica&amp;severity=high&amp;id=6943b0474eb3efac366ff99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58947-improper-control-of-filename-for-in-37a32cce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58947%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Athos&amp;severity=high&amp;id=6943b0474eb3efac366ff997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58946-improper-control-of-filename-for-in-1397df49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58946%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Vocal&amp;severity=high&amp;id=6943b0454eb3efac366ff8fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58945-improper-control-of-filename-for-in-1e6aa6da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58945%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20EcoGrow&amp;severity=high&amp;id=6943b0454eb3efac366ff8f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58944-improper-control-of-filename-for-in-26b08cbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58944%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Manufactory&amp;severity=high&amp;id=6943b0454eb3efac366ff8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58943-improper-control-of-filename-for-in-9edbdc25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58943%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Agricola&amp;severity=high&amp;id=6943b0454eb3efac366ff8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58942-improper-control-of-filename-for-in-5d9ef633</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58942%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Dwell&amp;severity=high&amp;id=6943b0454eb3efac366ff8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58941-improper-control-of-filename-for-in-cd91f554</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58941%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Fabric&amp;severity=high&amp;id=6943b0454eb3efac366ff8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58940-improper-control-of-filename-for-in-e53941f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58940%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Basil&amp;severity=high&amp;id=6943b0454eb3efac366ff8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58938-missing-authorization-in-themeateli-dd754428</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58938%3A%20Missing%20Authorization%20in%20ThemeAtelier%20IDonatePro&amp;severity=high&amp;id=6943b0454eb3efac366ff8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58937-improper-control-of-filename-for-in-df193e72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58937%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Tacticool&amp;severity=high&amp;id=6943b0454eb3efac366ff8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58936-improper-control-of-filename-for-in-c10bd1e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58936%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Catamaran&amp;severity=high&amp;id=6943b0454eb3efac366ff8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58935-improper-control-of-filename-for-in-5573f75e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58935%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Lunna&amp;severity=high&amp;id=6943b0434eb3efac366ff646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58934-improper-control-of-filename-for-in-dbf57e0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58934%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20The%20Gig&amp;severity=high&amp;id=6943b0434eb3efac366ff643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58933-improper-control-of-filename-for-in-c2bd8165</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58933%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Anubis&amp;severity=high&amp;id=6943b0434eb3efac366ff640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58932-improper-control-of-filename-for-in-261168fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58932%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Prisma&amp;severity=high&amp;id=6943b0434eb3efac366ff63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58931-improper-control-of-filename-for-in-c5fabb91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58931%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Palatio&amp;severity=high&amp;id=6943b0434eb3efac366ff63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58930-improper-control-of-filename-for-in-4fae6fc2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58930%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20FitFlex&amp;severity=high&amp;id=6943b0434eb3efac366ff637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58929-improper-control-of-filename-for-in-28dc98b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58929%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Pantry&amp;severity=high&amp;id=6943b0434eb3efac366ff634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58928-improper-control-of-filename-for-in-dd890eb1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58928%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Heart&amp;severity=high&amp;id=6943b0434eb3efac366ff631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58927-improper-control-of-filename-for-in-c9d1da75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58927%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Stallion&amp;severity=high&amp;id=6943b0434eb3efac366ff62e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58926-improper-control-of-filename-for-in-a57389f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58926%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Cerebrum&amp;severity=high&amp;id=6943b0434eb3efac366ff62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58925-improper-control-of-filename-for-in-bd40899b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58925%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Neptunus&amp;severity=high&amp;id=6943b0414eb3efac366ff3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58923-improper-control-of-filename-for-in-58b8a01e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58923%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Critique&amp;severity=high&amp;id=6943b0414eb3efac366ff3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58901-improper-control-of-filename-for-in-afaf1f0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58901%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Takeout&amp;severity=high&amp;id=6943b0414eb3efac366ff3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58900-improper-control-of-filename-for-in-3ce6cd5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58900%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20UniTravel&amp;severity=high&amp;id=6943b0414eb3efac366ff3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58899-improper-control-of-filename-for-in-40a20cfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58899%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Frame&amp;severity=high&amp;id=6943b0414eb3efac366ff3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58898-improper-control-of-filename-for-in-790c3d65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58898%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20HealthHub&amp;severity=high&amp;id=6943b0414eb3efac366ff3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58896-improper-control-of-filename-for-in-f91a931d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58896%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Otaku&amp;severity=high&amp;id=6943b0414eb3efac366ff3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58895-improper-control-of-filename-for-in-088847ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58895%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Integro&amp;severity=high&amp;id=6943b0414eb3efac366ff3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58894-improper-control-of-filename-for-in-a257ac96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58894%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Good%20Mood&amp;severity=high&amp;id=6943b0414eb3efac366ff3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58893-improper-control-of-filename-for-in-353da234</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58893%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Alright&amp;severity=high&amp;id=6943b0414eb3efac366ff3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58892-improper-control-of-filename-for-in-b4c42cb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58892%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tourimo&amp;severity=high&amp;id=6943b03f4eb3efac366ff385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58891-improper-control-of-filename-for-in-3d774b71</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58891%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Sanger&amp;severity=high&amp;id=6943b03f4eb3efac366ff381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58890-improper-control-of-filename-for-in-fceb0925</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58890%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Playful&amp;severity=high&amp;id=6943b03f4eb3efac366ff379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58889-improper-control-of-filename-for-in-785cb2b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58889%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Towny&amp;severity=high&amp;id=6943b03f4eb3efac366ff374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58888-improper-control-of-filename-for-in-85e53538</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58888%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20The%20Flash&amp;severity=high&amp;id=6943b03f4eb3efac366ff370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58885-improper-control-of-filename-for-in-6b2630d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58885%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Pathfinder&amp;severity=high&amp;id=6943b03f4eb3efac366ff36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58879-improper-control-of-filename-for-in-0b739edd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58879%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Festy&amp;severity=high&amp;id=6943b03f4eb3efac366ff365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58877-missing-authorization-in-javothemes-f0edaeb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58877%3A%20Missing%20Authorization%20in%20javothemes%20Javo%20Core&amp;severity=high&amp;id=6943b03f4eb3efac366ff361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58803-improper-control-of-filename-for-in-59cab053</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58803%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Algenix&amp;severity=high&amp;id=6943b03f4eb3efac366ff35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58710-incorrect-privilege-assignment-in-e-f6108903</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58710%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=6943b03f4eb3efac366ff35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58709-improper-control-of-filename-for-in-025dbbf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58709%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Legacy&amp;severity=high&amp;id=6943b03e4eb3efac366ff31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58708-improper-control-of-filename-for-in-faaf2138</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58708%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20777&amp;severity=high&amp;id=6943b03e4eb3efac366ff319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58706-improper-control-of-filename-for-in-7299fb46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58706%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Woo%20Hoo&amp;severity=high&amp;id=6943b03e4eb3efac366ff316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58225-improper-control-of-filename-for-in-89f942b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58225%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Paragon&amp;severity=high&amp;id=6943b03e4eb3efac366ff313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57897-improper-neutralization-of-input-du-5b72dbd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57897%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20venusweb%20Logtik&amp;severity=high&amp;id=6943b03e4eb3efac366ff310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55707-incorrect-privilege-assignment-in-w-dcd3c231</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55707%3A%20Incorrect%20Privilege%20Assignment%20in%20WPXPO%20PostX&amp;severity=high&amp;id=6943b03e4eb3efac366ff30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54751-missing-authorization-in-wpxpo-post-7eb00c6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54751%3A%20Missing%20Authorization%20in%20WPXPO%20PostX&amp;severity=high&amp;id=6943b03e4eb3efac366ff30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54748-improper-limitation-of-a-pathname-t-190aa8a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54748%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RomanCode%20MapSVG&amp;severity=medium&amp;id=6943b03e4eb3efac366ff307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54745-missing-authorization-in-miniorange-1e238856</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54745%3A%20Missing%20Authorization%20in%20miniOrange%20miniOrange&apos;s%20Google%20Authenticator&amp;severity=medium&amp;id=6943b03e4eb3efac366ff304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54743-missing-authorization-in-mkscripts--46b67fb9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54743%3A%20Missing%20Authorization%20in%20mkscripts%20Download%20After%20Email&amp;severity=medium&amp;id=6943b03e4eb3efac366ff301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54741-missing-authorization-in-tyler-moor-5e00d0a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54741%3A%20Missing%20Authorization%20in%20Tyler%20Moore%20Super%20Blank&amp;severity=high&amp;id=6943b03c4eb3efac366ff2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54723-deserialization-of-untrusted-data-i-945f8145</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54723%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20DentiCare&amp;severity=critical&amp;id=6943b03c4eb3efac366ff2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53453-improper-control-of-filename-for-in-0feab8c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53453%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Hygia&amp;severity=high&amp;id=6943b03c4eb3efac366ff2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53449-improper-control-of-filename-for-in-a23709c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53449%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Convex&amp;severity=high&amp;id=6943b03c4eb3efac366ff2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53448-improper-control-of-filename-for-in-02dea056</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53448%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rally&amp;severity=high&amp;id=6943b03c4eb3efac366ff2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53447-improper-control-of-filename-for-in-e1791361</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53447%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Assembly&amp;severity=high&amp;id=6943b03c4eb3efac366ff2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53446-improper-control-of-filename-for-in-864d7d0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53446%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Beautique&amp;severity=high&amp;id=6943b03c4eb3efac366ff2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53445-improper-control-of-filename-for-in-3dc12dc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53445%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Catwalk&amp;severity=high&amp;id=6943b03c4eb3efac366ff2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53443-improper-control-of-filename-for-in-75687fb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53443%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Smash&amp;severity=high&amp;id=6943b03c4eb3efac366ff2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53442-improper-control-of-filename-for-in-69bb9ac1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53442%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rentic&amp;severity=high&amp;id=6943b03c4eb3efac366ff2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53441-improper-control-of-filename-for-in-4ec54b9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53441%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Greeny&amp;severity=high&amp;id=6943b03a4eb3efac366ff24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53439-improper-control-of-filename-for-in-6410179c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53439%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Harper&amp;severity=high&amp;id=6943b03a4eb3efac366ff24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53438-improper-control-of-filename-for-in-4594ac0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53438%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20FitLine&amp;severity=high&amp;id=6943b03a4eb3efac366ff247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53437-improper-control-of-filename-for-in-46ace214</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53437%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Greenorganic&amp;severity=high&amp;id=6943b03a4eb3efac366ff244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53436-improper-control-of-filename-for-in-e596625d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53436%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Monki&amp;severity=high&amp;id=6943b03a4eb3efac366ff241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53435-improper-control-of-filename-for-in-aac62298</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53435%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Plan%20My%20Day&amp;severity=high&amp;id=6943b03a4eb3efac366ff23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53434-improper-control-of-filename-for-in-1aa7b023</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53434%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20ChildHope&amp;severity=high&amp;id=6943b03a4eb3efac366ff23b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53433-improper-control-of-filename-for-in-8e74ca6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53433%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20EasyEat&amp;severity=critical&amp;id=6943b03a4eb3efac366ff238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53432-improper-control-of-filename-for-in-e3632a49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53432%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Echo&amp;severity=high&amp;id=6943b03a4eb3efac366ff235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53431-improper-control-of-filename-for-in-c67f9230</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53431%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Emberlyn&amp;severity=high&amp;id=6943b03a4eb3efac366ff232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53430-improper-control-of-filename-for-in-4679fc9b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53430%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Etta&amp;severity=high&amp;id=6943b0394eb3efac366ff21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53429-improper-control-of-filename-for-in-da038cf2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Exit%20Game&amp;severity=high&amp;id=6943b0394eb3efac366ff217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52768-improper-control-of-filename-for-in-9be21078</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52768%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Faith%20%26%20Hope&amp;severity=high&amp;id=6943b0394eb3efac366ff214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52745-improper-control-of-filename-for-in-3c36c44a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52745%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Farm%20Agrico&amp;severity=high&amp;id=6943b0394eb3efac366ff211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49943-improper-control-of-filename-for-in-66b22dac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49943%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Femme&amp;severity=high&amp;id=6943b0394eb3efac366ff20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49942-improper-control-of-filename-for-in-db48eb4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49942%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Gardis&amp;severity=high&amp;id=6943b0394eb3efac366ff20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49941-improper-control-of-filename-for-in-62a5ffa0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49941%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20GlamChic&amp;severity=high&amp;id=6943b0394eb3efac366ff208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49919-insertion-of-sensitive-information--16c712b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49919%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20DigitalME%20eRoom&amp;severity=medium&amp;id=6943b0394eb3efac366ff205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49918-insertion-of-sensitive-information--da68a59a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49918%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20e4jvikwp%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=medium&amp;id=6943b0394eb3efac366ff202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49914-exposure-of-sensitive-system-inform-491b1455</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49914%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20jetmonsters%20Restaurant%20Menu%20by%20MotoPress&amp;severity=medium&amp;id=6943b0394eb3efac366ff1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49902-missing-authorization-in-a-wp-life--741e5c92</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49902%3A%20Missing%20Authorization%20in%20A%20WP%20Life%20Login%20Page%20Customizer%20%26%238211%3B%20Customizer%20Login%20Page%2C%20Admin%20Page%2C%20Custom%20Design&amp;severity=medium&amp;id=6943b0374eb3efac366ff1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49379-incorrect-privilege-assignment-in-s-f3bde4bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49379%3A%20Incorrect%20Privilege%20Assignment%20in%20silverplugins217%20Custom%20Fields%20Account%20Registration%20For%20Woocommerce&amp;severity=high&amp;id=6943b0374eb3efac366ff1cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49371-improper-control-of-filename-for-in-7fadea29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49371%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Strux&amp;severity=high&amp;id=6943b0374eb3efac366ff1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49370-improper-control-of-filename-for-in-8db2ddee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49370%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Lymcoin&amp;severity=high&amp;id=6943b0374eb3efac366ff1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49369-improper-control-of-filename-for-in-503a2486</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Lettuce&amp;severity=high&amp;id=6943b0374eb3efac366ff1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49368-improper-control-of-filename-for-in-86eadbe4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49368%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Palladio&amp;severity=high&amp;id=6943b0374eb3efac366ff1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49367-improper-control-of-filename-for-in-5385a03c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49367%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Monyxi&amp;severity=high&amp;id=6943b0374eb3efac366ff1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49366-improper-control-of-filename-for-in-bf62c6f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49366%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Hanani&amp;severity=high&amp;id=6943b0374eb3efac366ff1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49365-improper-control-of-filename-for-in-040f2626</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49365%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Jack%20Well&amp;severity=high&amp;id=6943b0374eb3efac366ff1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49364-improper-control-of-filename-for-in-f1c2024f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ludos%20Paradise&amp;severity=high&amp;id=6943b0374eb3efac366ff1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49363-improper-control-of-filename-for-in-67fd9c40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49363%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Kings%20%26%20Queens&amp;severity=high&amp;id=6943b0354eb3efac366fee44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49362-improper-control-of-filename-for-in-61b15c7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49362%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Gracioza&amp;severity=high&amp;id=6943b0354eb3efac366fee41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49361-improper-control-of-filename-for-in-dd85cf09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49361%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Mamita&amp;severity=high&amp;id=6943b0354eb3efac366fee3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49360-improper-control-of-filename-for-in-e1ac84ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49360%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Militarology&amp;severity=high&amp;id=6943b0354eb3efac366fee3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49359-improper-control-of-filename-for-in-b4e01207</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49359%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20ShieldGroup&amp;severity=high&amp;id=6943b0354eb3efac366fee38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49041-missing-authorization-in-the-africa-bbe2ce0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49041%3A%20Missing%20Authorization%20in%20The%20African%20Boss%20Get%20Cash&amp;severity=medium&amp;id=6943b0354eb3efac366fee35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14314-improper-neutralization-of-special--04230435</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14314%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Roxnor%20PopupKit&amp;severity=high&amp;id=6943b0354eb3efac366fee32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10019-authorization-bypass-through-user-c-a2a1c206</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10019%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codepeople%20Contact%20Form%20Email&amp;severity=medium&amp;id=6943b0354eb3efac366fee20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13498-cwe-862-missing-authorization-in-co-67ba6149</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13498%3A%20CWE-862%20Missing%20Authorization%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=6943b0354eb3efac366fee2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12976-cwe-79-improper-neutralization-of-i-92338fbb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12976%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=6943b0354eb3efac366fee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-exploiting-zero-day-in-cisco--a6ad105e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Exploiting%20Zero-Day%20in%20Cisco%20Security%20Gear&amp;severity=critical&amp;id=6943ac954eb3efac366e6b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68459-improper-neutralization-of-special--4b835e83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68459%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20AP180-PE%20V3.xx&amp;severity=high&amp;id=694399e758cc240f07af7a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47387-cwe-822-untrusted-pointer-dereferen-965c2dc1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47387%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963a58cc240f07ac2f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47382-cwe-863-incorrect-authorization-in--722d39f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47382%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47372-cwe-120-buffer-copy-without-checkin-1257e58a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47372%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=6943963858cc240f07ac2f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47350-cwe-416-use-after-free-in-qualcomm--ec7a2b22</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47350%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47325-cwe-822-untrusted-pointer-dereferen-70eeda71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47325%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6943963858cc240f07ac2f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47323-cwe-190-integer-overflow-or-wraparo-3b822062</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47323%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47322-cwe-416-use-after-free-in-qualcomm--e6ada09c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47322%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47321-cwe-120-buffer-copy-without-checkin-32100740</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47321%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47320-cwe-787-out-of-bounds-write-in-qual-e40aee57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47320%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47319-cwe-497-exposure-of-sensitive-syste-59bdb4c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47319%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6943963858cc240f07ac2f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27063-cwe-416-use-after-free-in-qualcomm--3e9f347f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27063%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68462-cwe-732-incorrect-permission-assign-19f4d074</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68462%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Debian%20FreedomBox&amp;severity=low&amp;id=694392b458cc240f07a98528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-asus-live-update-flaw-after-ev-7604611d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20ASUS%20Live%20Update%20Flaw%20After%20Evidence%20of%20Active%20Exploitation&amp;severity=critical&amp;id=69439e2358cc240f07b4a6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68461-cwe-79-improper-neutralization-of-i-1c741b3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Roundcube%20Webmail&amp;severity=high&amp;id=69438dec4dbf28c5ead2005c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68460-cwe-116-improper-encoding-or-escapi-b07cfa5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68460%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Roundcube%20Webmail&amp;severity=high&amp;id=69438a6a4dbf28c5eacdbe29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-active-attacks-exploiting-unpatched-61fa3aaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20Active%20Attacks%20Exploiting%20Unpatched%200-Day%20in%20AsyncOS%20Email%20Security%20Appliances&amp;severity=medium&amp;id=69438be94dbf28c5eacfb0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12885-cwe-79-improper-neutralization-of-i-20218e28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awsmin%20Embed%20Any%20Document%20%E2%80%93%20Embed%20PDF%2C%20Word%2C%20PowerPoint%20and%20Excel%20Files&amp;severity=medium&amp;id=69437e144dbf28c5eab53ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14856-code-injection-in-yproject-ruoyi-86a8b163</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14856%3A%20Code%20Injection%20in%20y_project%20RuoYi&amp;severity=medium&amp;id=69435e96f4a1ba78f2daa41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/france-arrests-22-year-old-after-hack-of-interior--86218121</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=France%20Arrests%2022%20Year%20Old%20After%20Hack%20of%20Interior%20Ministry%20Systems&amp;severity=medium&amp;id=69434cfdf4a1ba78f2c11aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14841-null-pointer-dereference-in-offis-d-074f920e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14841%3A%20NULL%20Pointer%20Dereference%20in%20OFFIS%20DCMTK&amp;severity=medium&amp;id=69434d1ff4a1ba78f2c14a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xctdh-crypto-heist-part-4-nick-smart-and-andrii-so-0577ad05</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCTDH%20Crypto%20Heist%20Part%204%20-%20Nick%20Smart%20and%20Andrii%20Sovershennyi&amp;severity=medium&amp;id=69457da2133fda1465c8178d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-18-0edeec95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-18&amp;severity=medium&amp;id=6944981c4eb3efac36b4fea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63950-na-bd510531</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63950%3A%20n%2Fa&amp;severity=high&amp;id=694471834eb3efac36abad2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63948-na-788e7230</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63948%3A%20n%2Fa&amp;severity=medium&amp;id=69446a7c4eb3efac36a96186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63947-na-ecfddcfc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63947%3A%20n%2Fa&amp;severity=medium&amp;id=69446a7c4eb3efac36a96182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63951-na-76406042</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63951%3A%20n%2Fa&amp;severity=high&amp;id=694466f94eb3efac36a822cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63949-na-53dc807c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63949%3A%20n%2Fa&amp;severity=medium&amp;id=694466f94eb3efac36a822c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67163-na-13618c01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67163%3A%20n%2Fa&amp;severity=medium&amp;id=694463734eb3efac36a5c4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65566-na-69b4dde7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65566%3A%20n%2Fa&amp;severity=high&amp;id=694455994eb3efac36a31642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65565-na-5771b4f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65565%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65564-na-69bb4fc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65564%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65563-na-047b5841</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65563%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65562-na-b5533be2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65562%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65568-na-160c9cb8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65568%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65567-na-87bbdd63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65567%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65561-na-56a55538</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65561%3A%20n%2Fa&amp;severity=high&amp;id=69444e5e4eb3efac36a13dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65559-na-4be14d82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65559%3A%20n%2Fa&amp;severity=high&amp;id=69444e5e4eb3efac36a13dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63387-na-56c624b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63387%3A%20n%2Fa&amp;severity=high&amp;id=69444aef4eb3efac36a086c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56157-na-16b6ceb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56157%3A%20n%2Fa&amp;severity=critical&amp;id=69444aef4eb3efac36a086bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63386-na-29524515</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63386%3A%20n%2Fa&amp;severity=critical&amp;id=694427b04eb3efac36978401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63390-na-262242df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63390%3A%20n%2Fa&amp;severity=medium&amp;id=6944242d4eb3efac36964743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63388-na-d8cfafee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63388%3A%20n%2Fa&amp;severity=critical&amp;id=694420bc4eb3efac36956eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63391-na-cfa36b98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63391%3A%20n%2Fa&amp;severity=high&amp;id=69441d2a4eb3efac369420a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63389-na-64dbd776</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63389%3A%20n%2Fa&amp;severity=critical&amp;id=69441d2a4eb3efac369420a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63757-na-a459094a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63757%3A%20n%2Fa&amp;severity=high&amp;id=694416204eb3efac368e65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14837-code-injection-in-zzcms-89492e18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14837%3A%20Code%20Injection%20in%20ZZCMS&amp;severity=medium&amp;id=69433ef3f4a1ba78f2b59656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68435-cwe-305-authentication-bypass-by-pr-6cbd93fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68435%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20nicotsx%20zerobyte&amp;severity=critical&amp;id=69433981058703ef3fd47411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14836-cleartext-storage-in-a-file-or-on-d-fc9a3d86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14836%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20ZZCMS&amp;severity=medium&amp;id=69433981058703ef3fd4741d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14834-sql-injection-in-code-projects-simp-8b1d8255</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14834%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=69433981058703ef3fd47416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68433-cwe-77-improper-neutralization-of-s-bd9efb5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68433%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=69433603058703ef3fd02122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53917-improper-neutralization-of-special--77f28945</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53917%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20powerstonegh%20Affiliate%20Me&amp;severity=high&amp;id=69433601058703ef3fd020bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68432-cwe-77-improper-neutralization-of-s-7c4486fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68432%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=69433603058703ef3fd0211d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53933-unrestricted-upload-of-file-with-da-ff8ad256</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53933%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20s9y%20Serendipity&amp;severity=high&amp;id=69433603058703ef3fd02117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53932-improper-neutralization-of-input-du-28b84f9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20s9y%20Serendipity&amp;severity=medium&amp;id=69433603058703ef3fd02112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53928-improper-neutralization-of-input-du-f27244da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Php-fusion%20PHPFusion&amp;severity=medium&amp;id=69433603058703ef3fd0210d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53927-improper-neutralization-of-input-du-0ab51043</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PHPJabbers%20Simple%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53926-improper-neutralization-of-special--e45b6b00</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53926%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPJabbers%20Simple%20CMS&amp;severity=high&amp;id=69433601058703ef3fd020c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53921-unrestricted-upload-of-file-with-da-ecfc0aaf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53921%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Sitemagic%20SitemagicCMS&amp;severity=high&amp;id=69433601058703ef3fd020c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53912-unquoted-search-path-or-element-in--f54ffd1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53912%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20BiniSoft%20USB%20Flash%20Drives%20Control&amp;severity=high&amp;id=69433601058703ef3fd020b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53911-improper-neutralization-of-input-du-d82893ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tmrswrr%20Textpattern%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53910-improper-neutralization-of-input-du-e65c9d38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53910%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wbce-cms%20WBCE%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53909-improper-neutralization-of-input-du-75493285</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53909%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wbce-cms%20WBCE%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53908-improper-privilege-management-in-be-f53944b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53908%3A%20Improper%20Privilege%20Management%20in%20Belden%20HiSecOS&amp;severity=high&amp;id=69433601058703ef3fd020a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53907-improper-limitation-of-a-pathname-t-6ee61da8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53907%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Bludit%20Backup%20Plugin&amp;severity=high&amp;id=69433601058703ef3fd0209f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66029-cwe-522-insufficiently-protected-cr-b9fc3983</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66029%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20OSC%20ondemand&amp;severity=high&amp;id=6943327a058703ef3fcb5ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14833-sql-injection-in-code-projects-onli-35555b34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14833%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=6943327a058703ef3fcb5ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68429-cwe-200-exposure-of-sensitive-infor-5d66d7b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68429%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20storybookjs%20storybook&amp;severity=high&amp;id=6943327a058703ef3fcb5caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-confirms-what-we-suspected-every-llm--528c867c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20research%20confirms%20what%20we%20suspected%3A%20every%20LLM%20tested%20can%20be%20exploited&amp;severity=medium&amp;id=69432f0b058703ef3fc98973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68145-cwe-22-improper-limitation-of-a-pat-bc581cde</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68145%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=69432efa058703ef3fc97f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68144-cwe-88-improper-neutralization-of-a-2aa85bd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68144%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=69432efa058703ef3fc97f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68143-cwe-22-improper-limitation-of-a-pat-9cdc3058</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68143%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=69432efa058703ef3fc97f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68129-cwe-863-incorrect-authorization-in--be75163a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68129%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20auth0%20auth0-PHP&amp;severity=medium&amp;id=69432b79058703ef3fc51862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14832-sql-injection-in-itsourcecode-onlin-9f6ed03c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14832%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=69432b79058703ef3fc5185b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68275-cwe-79-improper-neutralization-of-i-e859cc68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68275%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69432992fab815a9fc299edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68401-cwe-79-improper-neutralization-of-i-934dcf70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68401%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69432992fab815a9fc299ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68400-cwe-89-improper-neutralization-of-s-e8f3a7a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68400%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943260ffab815a9fc251847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68399-cwe-79-improper-neutralization-of-i-7b48662c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68399%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=low&amp;id=6943260ffab815a9fc251853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68112-cwe-89-improper-neutralization-of-s-533a5f5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68112%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943260ffab815a9fc251850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68111-cwe-89-improper-neutralization-of-s-ecf0e2bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68111%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=6943260ffab815a9fc25184d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68110-cwe-200-exposure-of-sensitive-infor-dac7d6cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68110%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943260ffab815a9fc25184a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68109-cwe-78-improper-neutralization-of-s-8c67d683</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68109%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943229bfab815a9fc1fb3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67877-cwe-89-improper-neutralization-of-s-9b7049b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67877%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=6943229bfab815a9fc1fb3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gachiloader-defeating-nodejs-malware-with-api-trac-5816058f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GachiLoader%3A%20Defeating%20Node.js%20Malware%20with%20API%20Tracing&amp;severity=medium&amp;id=69433981058703ef3fd47271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nuget-malware-targets-crypto-wallets-oauth-tokens-0d0b398e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NuGet%20malware%20targets%20crypto%20wallets%2C%20OAuth%20tokens&amp;severity=medium&amp;id=69433981058703ef3fd4727f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-botnet-hijacks-18-million-android-tvs-laun-ddb21d6c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Botnet%20Hijacks%201.8%20Million%20Android%20TVs%2C%20Launches%20Large-Scale%20DDoS%20Attacks&amp;severity=high&amp;id=69432285fab815a9fc1faebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-fixes-actively-exploited-cve-2025-40602--cb24fce8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Fixes%20Actively%20Exploited%20CVE-2025-40602%20in%20SMA%20100%20Appliances&amp;severity=high&amp;id=69431f01fab815a9fc1ddbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-unpatched-asyncos-zero-day-exploite-0ffcf769</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20of%20unpatched%20AsyncOS%20zero-day%20exploited%20in%20attacks&amp;severity=critical&amp;id=69431f01fab815a9fc1ddbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67876-cwe-79-improper-neutralization-of-i-625b81b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67876%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69431f35fab815a9fc1ded24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67875-cwe-79-improper-neutralization-of-i-0de84221</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67875%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69431f35fab815a9fc1ded21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68114-cwe-124-buffer-underwrite-buffer-un-421cf5a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68114%3A%20CWE-124%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20capstone-engine%20capstone&amp;severity=medium&amp;id=69431f35fab815a9fc1ded27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67873-cwe-122-heap-based-buffer-overflow--18ff7f1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67873%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20capstone-engine%20capstone&amp;severity=medium&amp;id=69431f35fab815a9fc1ded1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67493-cwe-20-improper-input-validation-in-56691d24</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67493%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20homarr-labs%20homarr&amp;severity=high&amp;id=69432d1e058703ef3fc81e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43514-an-app-may-be-able-to-access-protec-afae3e0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43514%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431980c9138a40d2f661ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46281-an-app-may-be-able-to-break-out-of--f3b7b019</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46281%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69431982c9138a40d2f6625a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46278-an-app-may-be-able-to-access-protec-e6c0ac50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46278%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431982c9138a40d2f6624d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46279-an-app-may-be-able-to-identify-what-6a7e3d7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46279%3A%20An%20app%20may%20be%20able%20to%20identify%20what%20other%20apps%20a%20user%20has%20installed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69431982c9138a40d2f66251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43535-processing-maliciously-crafted-web--1d399922</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43535%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431980c9138a40d2f661cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46291-an-app-may-bypass-gatekeeper-checks-7e2cb154</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46291%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431982c9138a40d2f6626b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43533-a-malicious-hid-device-may-cause-an-50931694</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43533%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431980c9138a40d2f661c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43529-processing-maliciously-crafted-web--ded99654</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43529%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20versions%20of%20iOS%20before%20iOS%2026.%20CVE-2025-14174%20was%20also%20issued%20in%20response%20to%20this%20report.%20in%20Apple%20Safari&amp;severity=high&amp;id=69431980c9138a40d2f661b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43475-an-app-may-be-able-to-access-user-s-890d6416</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43475%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431980c9138a40d2f661a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43526-on-a-mac-with-lockdown-mode-enabled-2ee671ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43526%3A%20On%20a%20Mac%20with%20Lockdown%20Mode%20enabled%2C%20web%20content%20opened%20via%20a%20file%20URL%20may%20be%20able%20to%20use%20Web%20APIs%20that%20should%20be%20restricted%20in%20Apple%20Safari&amp;severity=critical&amp;id=69431980c9138a40d2f661af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46288-an-app-may-be-able-to-access-sensit-efb6bcf5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46288%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20payment%20tokens%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431982c9138a40d2f66264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43531-processing-maliciously-crafted-web--10ac1aad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43531%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=low&amp;id=69431980c9138a40d2f661bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55254-cwe-601-url-redirection-to-untruste-ad8c3d9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55254%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20HCL%20Software%20BigFix%20Remote%20Control&amp;severity=low&amp;id=69431987c9138a40d2f6643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46292-an-app-may-be-able-to-access-user-s-d9561db9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46292%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431982c9138a40d2f6626f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43536-processing-maliciously-crafted-web--be8b4b7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43536%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431980c9138a40d2f661d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43428-photos-in-the-hidden-photos-album-m-8cbc28f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43428%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69431980c9138a40d2f6619d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46283-an-app-may-be-able-to-access-sensit-9a414a86</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46283%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431982c9138a40d2f66261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43541-processing-maliciously-crafted-web--be5d1ce6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43541%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431982c9138a40d2f66241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43501-processing-maliciously-crafted-web--e94ec6d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43501%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431980c9138a40d2f661a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46282-an-app-may-be-able-to-access-sensit-8b20591e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46282%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431982c9138a40d2f6625d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46277-an-app-may-be-able-to-access-a-user-a69d4439</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46277%3A%20An%20app%20may%20be%20able%20to%20access%20a%20user%E2%80%99s%20Safari%20history%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431982c9138a40d2f66248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59849-cwe-1021-improper-restriction-of-re-43370891</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59849%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20HCL%20Software%20BigFix%20Remote%20Control&amp;severity=medium&amp;id=694315f3c9138a40d2f24a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53000-cwe-427-uncontrolled-search-path-el-0ad4c221</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53000%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20jupyter%20nbconvert&amp;severity=high&amp;id=694315f3c9138a40d2f24a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66647-cwe-120-buffer-copy-without-checkin-ab17f2b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66647%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20RIOT-OS%20RIOT&amp;severity=low&amp;id=6943126ec9138a40d2ed3260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14764-cwe-327-use-of-a-broken-or-risky-cr-14eab340</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14764%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20S3%20Encryption%20Client%20for%20Go&amp;severity=medium&amp;id=6943126ec9138a40d2ed325d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14763-cwe-327-use-of-a-broken-or-risky-cr-ffeb3020</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14763%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20S3%20Encryption%20Client%20for%20Java&amp;severity=medium&amp;id=6943126ec9138a40d2ed325a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14762-cwe-327-use-of-a-broken-or-risky-cr-287a2707</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14762%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20AWS%20SDK%20for%20Ruby&amp;severity=medium&amp;id=6943126ec9138a40d2ed3257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14761-cwe-327-use-of-a-broken-or-risky-cr-1c1e0bbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14761%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20AWS%20SDK%20for%20PHP&amp;severity=medium&amp;id=6943126ec9138a40d2ed3254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14760-cwe-327-use-of-a-broken-or-risky-cr-33ee7551</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14760%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20AWS%20SDK%20for%20C%2B%2B&amp;severity=medium&amp;id=69430eeac9138a40d2eb2e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14759-cwe-327-use-of-a-broken-or-risky-cr-f701ab62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14759%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20S3%20Encryption%20Client%20for%20.NET&amp;severity=medium&amp;id=69430eeac9138a40d2eb2e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluedeltas-persistent-campaign-against-ukrnet-bb35bec9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlueDelta%E2%80%99s%20Persistent%20Campaign%20Against%20UKR.NET&amp;severity=medium&amp;id=69433981058703ef3fd4738a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-9686-actively-targets-cisco-secure-email-gatew-6ecdf845</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-9686%20actively%20targets%20Cisco%20Secure%20Email%20Gateway%20and%20Secure%20Email%20and%20Web%20Manager&amp;severity=medium&amp;id=69433981058703ef3fd473c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34438-cwe-639-authorization-bypass-throug-a7b67404</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34438%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=69430b71c9138a40d2e72f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34437-cwe-639-authorization-bypass-throug-9c60e9ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34437%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=high&amp;id=69430b71c9138a40d2e72f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34435-cwe-639-authorization-bypass-throug-430ab558</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34435%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=high&amp;id=69430b71c9138a40d2e72f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34436-cwe-639-authorization-bypass-throug-1949ebbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34436%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=high&amp;id=69430b71c9138a40d2e72f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34434-cwe-306-missing-authentication-for--c3cb7a3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34434%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=critical&amp;id=69430b71c9138a40d2e72f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34439-cwe-601-url-redirection-to-untruste-d54b1aaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34439%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34440-cwe-601-url-redirection-to-untruste-9c00d425</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34440%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34442-cwe-497-exposure-of-sensitive-syste-f89422c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34442%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34441-cwe-359-exposure-of-private-persona-75140e38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34441%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-could-take-control-of-car-dashboard-by-hac-7c0ab88c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Could%20Take%20Control%20of%20Car%20Dashboard%20by%20Hacking%20Its%20Modem&amp;severity=high&amp;id=6943098c0b6f32e62bf64877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-warns-of-new-sma1000-zero-day-exploited--feac9fe2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sonicwall%20warns%20of%20new%20SMA1000%20zero-day%20exploited%20in%20attacks&amp;severity=critical&amp;id=6943098c0b6f32e62bf64866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66646-cwe-476-null-pointer-dereference-in-73c988e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66646%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20RIOT-OS%20RIOT&amp;severity=low&amp;id=6943060a0b6f32e62bf23024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66397-cwe-284-improper-access-control-in--0f8cb49e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66397%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=694302860b6f32e62bed0eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66396-cwe-89-improper-neutralization-of-s-7c40182b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66396%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=694302860b6f32e62bed0eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66395-cwe-89-improper-neutralization-of-s-ef22abc1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66395%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=694302860b6f32e62bed0ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62521-cwe-94-improper-control-of-generati-99532462</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62521%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=694302860b6f32e62bed0ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-posthog-how-ssrf-a-clickhouse-sql-escaping--63450a5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20PostHog%3A%20How%20SSRF%2C%20a%20ClickHouse%20SQL%20Escaping%200day%2C%20and%20Default%20PostgreSQL%20Credentials%20Formed%20an%20RCE%20Chain%20(ZDI-25-099%2C%20ZDI-25-097%2C%20ZDI-25-096)&amp;severity=medium&amp;id=6942ff090b6f32e62beb38c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14081-cwe-863-incorrect-authorization-in--df9dfbc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14081%3A%20CWE-863%20Incorrect%20Authorization%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=6942f8e8847f7e98df04b54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13537-cwe-79-improper-neutralization-of-i-3cd560a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livecomposer%20Live%20Composer%20%E2%80%93%20Free%20WordPress%20Website%20Builder&amp;severity=medium&amp;id=6942f8e8847f7e98df04b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13217-cwe-79-improper-neutralization-of-i-ec65218d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=6942f8e7847f7e98df04b541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-fixes-actively-exploited-cve-2025-40602--0c4c7b57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Fixes%20Actively%20Exploited%20CVE-2025-40602%20in%20SMA%20100%20Appliances&amp;severity=high&amp;id=69433af3058703ef3fd57b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/14-malicious-nuget-packages-found-stealing-crypto--c88979cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=14%20Malicious%20NuGet%20Packages%20Found%20Stealing%20Crypto%20Wallets%20and%20Ad%20Data&amp;severity=medium&amp;id=6942f55f847f7e98df00b7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-botnet-hijacks-18-million-android-tvs-laun-f8bcd5cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Botnet%20Hijacks%201.8%20Million%20Android%20TVs%2C%20Launches%20Large-Scale%20DDoS%20Attacks&amp;severity=medium&amp;id=69433af3058703ef3fd57b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maybe-a-little-bit-more-interesting-react2shell-ex-8f7e1deb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maybe%20a%20Little%20Bit%20More%20Interesting%20React2Shell%20Exploit%2C%20(Wed%2C%20Dec%2017th)&amp;severity=medium&amp;id=6942e5571c1ff0913684af70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20393-improper-input-validation-in-cisco--c638b419</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20393%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Secure%20Email&amp;severity=critical&amp;id=6942e1e21c1ff091367fecea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russias-quiet-pivot-how-misconfigured-network-devi-6dbe5073</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%E2%80%99s%20Quiet%20Pivot%3A%20How%20Misconfigured%20Network%20Devices%20Became%20the%20New%20Front%20Line%20in%20Critical%20Infrastructure%20Cyber%20Risk%20-%20hack3d.news&amp;severity=critical&amp;id=6942d8b4b2cbfb3efaad1eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26381-cwe-425-direct-request-forced-brows-298e491e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26381%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Johnson%20Controls%20OpenBlue%20Workplace%20(formerly%20FM%20Systems)&amp;severity=medium&amp;id=6942d8c9b2cbfb3efaad4192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43873-cwe-78-improper-neutralization-of-s-9a500d1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43873%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Control%20iSTAR%20Ultra%2C%20iSTAR%20Ultra%20SE%2C%20iSTAR%20Ultra%20G2%2C%20iSTAR%20Ultra%20G2%20SE%2C%20iSTAR%20Edge%20G2&amp;severity=high&amp;id=6942d536b2cbfb3efaa86de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14727-cwe-22-improper-limitation-of-a-pat-b3541a68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14727%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20F5%20NGINX%20Ingress%20Controller&amp;severity=high&amp;id=6942d1adb2cbfb3efaa33d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt28-targets-ukrainian-ukr-net-users-in-long-runn-09216ce3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT28%20Targets%20Ukrainian%20UKR-net%20Users%20in%20Long-Running%20Credential%20Phishing%20Campaign&amp;severity=medium&amp;id=6942d853b2cbfb3efaac9c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44005-cwe-287-improper-authentication-in--a1fcdb6f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44005%3A%20CWE-287%3A%20Improper%20Authentication%20in%20smallstep%20Step-CA&amp;severity=critical&amp;id=6942ce29b2cbfb3efaa16b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-clickfix-attack-uses-fake-browser-fix-to-insta-7aa340eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ClickFix%20Attack%20Uses%20Fake%20Browser%20Fix%20to%20Install%20DarkGate%20Malware%20on%20Your%20Device&amp;severity=medium&amp;id=6942c8c3f1f5b73852a8e1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-forumtroll-phishing-attacks-target-russian-sch-abdd1962</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ForumTroll%20Phishing%20Attacks%20Target%20Russian%20Scholars%20Using%20Fake%20eLibrary%20Emails&amp;severity=medium&amp;id=6942d853b2cbfb3efaac9c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/parked-domains-become-weapons-with-direct-search-a-6bc2d55d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Parked%20Domains%20Become%20Weapons%20with%20Direct%20Search%20Advertising&amp;severity=medium&amp;id=69433981058703ef3fd473ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-linear-to-complex-an-upgrade-in-ransomhouse-e-073aacd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Linear%20to%20Complex%3A%20An%20Upgrade%20in%20RansomHouse%20Encryption&amp;severity=medium&amp;id=69432ef1058703ef3fc97a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gachiloader-defeating-nodejs-malware-with-api-trac-ac2d957f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GachiLoader%3A%20Defeating%20Node.js%20Malware%20with%20API%20Tracing&amp;severity=medium&amp;id=6942bac1f1f5b73852995944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nmfta-warns-of-surge-and-sophistication-of-cyber-e-44536358</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NMFTA%20Warns%20of%20Surge%20and%20Sophistication%20of%20Cyber-Enabled%20Cargo%20Theft&amp;severity=medium&amp;id=6942b5654a800b14e7fca561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14266-cwe-352-cross-site-request-forgery--db410f69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14266%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ercom%20Cryptobox&amp;severity=low&amp;id=6942b5b04a800b14e7fcbd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deliberate-internet-shutdowns-schneier-on-security-96bde887</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deliberate%20Internet%20Shutdowns%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6942b58d4a800b14e7fcb5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/askul-data-breach-exposed-over-700000-records-afte-edbc1b49</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Askul%20data%20breach%20exposed%20over%20700%2C000%20records%20after%20ransomware%20attack&amp;severity=high&amp;id=6942b58d4a800b14e7fcb5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-campaign-by-the-forumtroll-apt-group-e016dc15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20campaign%20by%20the%20ForumTroll%20APT%20group&amp;severity=medium&amp;id=69432b79058703ef3fc51713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-150-cellik-rat-grants-android-control-trojaniz-8f91973d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%24150%20Cellik%20RAT%20Grants%20Android%20Control%2C%20Trojanizes%20Google%20Play%20Apps&amp;severity=medium&amp;id=6942a8fbd5dc0d5a04f881ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61736-cwe-298-improper-validation-of-cert-8c275ac9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61736%3A%20CWE-298-Improper%20Validation%20of%20certificate%20expiration%20in%20Johnson%20Controls%20iSTAReX%2C%20iSTAR%20Edge%2C%20iSTAR%20Ultra%20LT%2C%20iSTAR%20Ultra%20%2C%20iSTAR%20Ultra%20SE&amp;severity=high&amp;id=6942a932d5dc0d5a04f89566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14097-cwe-287-improper-authentication-in--97f20f54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14097%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Radiometer%20Medical%20Aps%20ABL90%20FLEX%20and%20ABL90%20FLEX%20PLUS%20Analyzers&amp;severity=high&amp;id=6942a932d5dc0d5a04f89563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14096-cwe-798-use-of-hard-coded-credentia-97a254f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14096%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Radiometer%20Medical%20Aps%20ABL90%20FLEX%20and%20ABL90%20FLEX%20PLUS%20Analyzers&amp;severity=high&amp;id=6942a591d5dc0d5a04f3ed84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-claim-stealing-94gb-of-pornhub-premium-use-d7adf0bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Claim%20Stealing%2094GB%20of%20Pornhub%20Premium%20User%20Watch%20Histories&amp;severity=medium&amp;id=6942a209d5dc0d5a04edbc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67895-cwe-669-incorrect-resource-transfer-8e97ed9d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67895%3A%20CWE-669%3A%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Edge3&amp;severity=critical&amp;id=6942998e034dcf4950468cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14095-cwe-284-improper-access-control-in--9c122bac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14095%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Radiometer%20Medical%20Aps%20ABL90%20FLEX%20and%20ABL90%20FLEX%20PLUS%20Analyzers&amp;severity=medium&amp;id=6942998e034dcf4950468ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-a-flaw-in-multiple-fortinet-products--43ca79cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20a%20flaw%20in%20multiple%20Fortinet%20products%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=69429960034dcf4950467d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-ink-dragon-group-hides-in-european-governm-d10be6f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Ink%20Dragon%20Group%20Hides%20in%20European%20Government%20Networks&amp;severity=high&amp;id=69429960034dcf4950467d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-ink-dragon-hacks-governments-using-sh-11eaecee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Ink%20Dragon%20Hacks%20Governments%20Using%20ShadowPad%20and%20FINALDRAFT%20Malware&amp;severity=medium&amp;id=6942a888d5dc0d5a04f7d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/forumtroll-targets-political-scientists-kaspersky--b1f95c92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ForumTroll%20targets%20political%20scientists%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69428ec8034dcf49503b045e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostposter-firefox-extensions-hide-malware-in-ico-e0151e7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostPoster%20Firefox%20Extensions%20Hide%20Malware%20in%20Icons&amp;severity=medium&amp;id=6942890c76794366d0b4baa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14101-cwe-639-authorization-bypass-throug-28919e82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14101%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GG%20Soft%20Software%20Services%20Inc.%20PaperWork&amp;severity=high&amp;id=694278ef2a34f2e402b2a883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auto-parts-giant-lkq-confirms-oracle-ebs-breach-3240b6ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auto%20Parts%20Giant%20LKQ%20Confirms%20Oracle%20EBS%20Breach&amp;severity=medium&amp;id=6942755c2a34f2e402ada2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostposter-malware-found-in-17-firefox-add-ons-wi-d600a4bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostPoster%20Malware%20Found%20in%2017%20Firefox%20Add-ons%20with%2050%2C000%2B%20Downloads&amp;severity=medium&amp;id=6942894276794366d0b4e39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14347-cwe-79-improper-neutralization-of-i-50d26826</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proliz%20Software%20Ltd.%20OBS%20(Student%20Affairs%20Information%20System)0&amp;severity=medium&amp;id=6942697da68039dadb6d7560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14399-cwe-352-cross-site-request-forgery--edd51fc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14399%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcodefactory%20Download%20Plugins%20and%20Themes%20in%20ZIP%20from%20Dashboard&amp;severity=medium&amp;id=6942697da68039dadb6d7568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12496-cwe-22-improper-limitation-of-a-pat-1777d542</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12496%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dylanjkotze%20Zephyr%20Project%20Manager&amp;severity=medium&amp;id=6942697da68039dadb6d7563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11924-cwe-639-authorization-bypass-throug-69810fa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11924%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=high&amp;id=694254ebbd21432f8e5297b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13750-cwe-862-missing-authorization-in-ma-0ba43c10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13750%3A%20CWE-862%20Missing%20Authorization%20in%20mateuszgbiorczyk%20Converter%20for%20Media%20%E2%80%93%20Optimize%20images%20%7C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=694254ebbd21432f8e5297bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14061-cwe-862-missing-authorization-in-wp-267a805a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14061%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Cookie%20Banner%20for%20GDPR%20%2F%20CCPA%20%E2%80%93%20WPLP%20Cookie%20Consent&amp;severity=medium&amp;id=694254ebbd21432f8e5297c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14817-cwe-269-improper-privilege-manageme-e299a65f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14817%3A%20CWE-862%20Missing%20Authorization%20in%20TECNO%20Tecno%20Pova6%20Pro%205G&amp;severity=medium&amp;id=69425167bd21432f8e4d5fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14154-cwe-79-improper-neutralization-of-i-9b862588</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14154%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordplus%20Better%20Messages%20%E2%80%93%20Live%20Chat%2C%20Chat%20Rooms%2C%20Real-Time%20Messaging%20%26%20Private%20Messages&amp;severity=medium&amp;id=694241cd1f9b086b9ae6dd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14385-cwe-79-improper-neutralization-of-i-56c392d3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=69423560364d4dab9cc00c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13880-cwe-862-missing-authorization-in-ad-8cc3f6de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13880%3A%20CWE-862%20Missing%20Authorization%20in%20adreastrian%20WP%20Social%20Ninja%20%E2%80%93%20Embed%20Social%20Feeds%2C%20User%20Reviews%20%26%20Chat%20Widgets&amp;severity=medium&amp;id=69423560364d4dab9cc00c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13861-cwe-79-improper-neutralization-of-i-eb021f23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13861%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linksoftware%20HTML%20Forms%20%E2%80%93%20Simple%20WordPress%20Forms%20Plugin&amp;severity=medium&amp;id=69423560364d4dab9cc00c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59374-cwe-506-embedded-malicious-code-in--b20044d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59374%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20ASUS%20live%20update&amp;severity=critical&amp;id=69423560364d4dab9cc00c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11775-cwe-125-out-of-bounds-read-in-asus--3d78c2b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11775%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASUS%20Armoury%20Crate&amp;severity=medium&amp;id=69423560364d4dab9cc00c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11901-cwe-284-improper-access-control-in--8373da85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11901%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ASUS%20B460%20series&amp;severity=high&amp;id=69423560364d4dab9cc00c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64700-cross-site-request-forgery-csrf-in--e2bde16a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64700%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=694231dc364d4dab9cbab4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14305-cwe-863-incorrect-authorization-in--73e0d293</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14305%3A%20CWE-863%20Incorrect%20Authorization%20in%20Acer%20ListCheck.exe&amp;severity=high&amp;id=69422931473cb759e1edea2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14304-cwe-693-protection-mechanism-failur-0bffe3fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14304%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20ASRock%20Intel%20500%20chipset%20motherboard&amp;severity=high&amp;id=69422931473cb759e1edea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13977-cwe-79-improper-neutralization-of-i-66b837ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=69422931473cb759e1edea20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14303-cwe-693-protection-mechanism-failur-b62925ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14303%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20MSI%20Intel%20600%20chipset%20motherboard&amp;severity=high&amp;id=6942222a473cb759e1eb9cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14302-cwe-693-protection-mechanism-failur-5ba842ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14302%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20GIGABYTE%20intel%20600%20chipset%20Motherboard&amp;severity=high&amp;id=6942222a473cb759e1eb9cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blindeagle-targets-colombian-government-agency-wit-f335be46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlindEagle%20Targets%20Colombian%20Government%20Agency%20with%20Caminho%20and%20DCRAT&amp;severity=medium&amp;id=694295c3034dcf495041dbd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14801-cross-site-scripting-in-xiweicheng--4de27927</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14801%3A%20Cross%20Site%20Scripting%20in%20xiweicheng%20TMS&amp;severity=medium&amp;id=69421096473cb759e1e64c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11369-cwe-862-missing-authorization-in-wp-49665f9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11369%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69421096473cb759e1e64bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11009-cwe-312-cleartext-storage-of-sensit-3bc7992a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11009%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GT%20Designer3%20Version1%20(GOT2000)&amp;severity=medium&amp;id=6942060f473cb759e1e34e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trufflehog-now-detects-jwts-with-public-key-signat-bfa88e5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TruffleHog%20now%20detects%20JWTs%20with%20public-key%20signatures%20and%20verifies%20them%20for%20liveness&amp;severity=medium&amp;id=6941ff06473cb759e1d48eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53524-cwe-787-in-fuji-electric-monitouch--1218f3bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53524%3A%20CWE-787%20in%20Fuji%20Electric%20Monitouch%20V-SFT-6&amp;severity=high&amp;id=6941f9b7d2cd6f6c37c00b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14700-cwe-1336-improper-neutralization-of-bf9964e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14700%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=critical&amp;id=6941f9b7d2cd6f6c37c0072f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14701-cwe-79-improper-neutralization-of-i-805e78d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14701%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=high&amp;id=6941f9b7d2cd6f6c37c00b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-17-bdf56445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-17&amp;severity=medium&amp;id=694345e7f4a1ba78f2b7cc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67794-na-5c197ce5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67794%3A%20n%2Fa&amp;severity=high&amp;id=6943260ffab815a9fc251844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-residentbat-a-new-spyware-family-used-by-bel-618fcae5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ResidentBat%3A%20A%20new%20spyware%20family%20used%20by%20Belarusian%20KGB&amp;severity=medium&amp;id=694325fbfab815a9fc24fb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67791-na-ba4cf99b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67791%3A%20n%2Fa&amp;severity=critical&amp;id=6943229bfab815a9fc1fb3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67790-na-d232425c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67790%3A%20n%2Fa&amp;severity=critical&amp;id=69431b97fab815a9fc199cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67793-na-39d42ae5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67793%3A%20n%2Fa&amp;severity=critical&amp;id=69431987c9138a40d2f66457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67792-na-81d0c909</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67792%3A%20n%2Fa&amp;severity=high&amp;id=69431987c9138a40d2f66453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67789-na-09242368</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67789%3A%20n%2Fa&amp;severity=medium&amp;id=694315f3c9138a40d2f24a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67787-na-a043d065</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67787%3A%20n%2Fa&amp;severity=critical&amp;id=69430eeac9138a40d2eb2e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67781-na-25540013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67781%3A%20n%2Fa&amp;severity=critical&amp;id=69430eeac9138a40d2eb2e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65233-na-fbeecb8d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65233%3A%20n%2Fa&amp;severity=medium&amp;id=694309ba0b6f32e62bf653df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67074-na-ad90f45c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67074%3A%20n%2Fa&amp;severity=medium&amp;id=6943060a0b6f32e62bf23030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67073-na-6e304afe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67073%3A%20n%2Fa&amp;severity=critical&amp;id=694302860b6f32e62bed0ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46062-na-466b53e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46062%3A%20n%2Fa&amp;severity=high&amp;id=6942ff050b6f32e62beb35ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67174-na-dccb63ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67174%3A%20n%2Fa&amp;severity=medium&amp;id=6942fb890b6f32e62be62d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66953-na-b7f870d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66953%3A%20n%2Fa&amp;severity=high&amp;id=6942fb890b6f32e62be62d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46060-na-2043728a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46060%3A%20n%2Fa&amp;severity=high&amp;id=6942fb890b6f32e62be62d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67171-na-ccf7bf28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67171%3A%20n%2Fa&amp;severity=high&amp;id=6942f8e8847f7e98df04b557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67168-na-3ed5abab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67168%3A%20n%2Fa&amp;severity=medium&amp;id=6942f8e8847f7e98df04b552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67173-na-a8065ceb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67173%3A%20n%2Fa&amp;severity=medium&amp;id=6942f571847f7e98df00bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67170-na-653cb1ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67170%3A%20n%2Fa&amp;severity=medium&amp;id=6942f571847f7e98df00bfcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53919-na-2f169e9b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53919%3A%20n%2Fa&amp;severity=high&amp;id=6942ec89847f7e98dff8667b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53398-na-2d775721</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53398%3A%20n%2Fa&amp;severity=high&amp;id=6942ec89847f7e98dff86677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67172-na-ecf46117</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67172%3A%20n%2Fa&amp;severity=high&amp;id=6942eae7847f7e98dff54f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65203-na-96907401</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65203%3A%20n%2Fa&amp;severity=high&amp;id=6942eae7847f7e98dff54efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66924-na-a49f6c6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66924%3A%20n%2Fa&amp;severity=medium&amp;id=6942e8e71c1ff0913689279c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66923-na-a73893e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66923%3A%20n%2Fa&amp;severity=high&amp;id=6942e8e71c1ff09136892798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67165-na-afd66dd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67165%3A%20n%2Fa&amp;severity=critical&amp;id=6942e1e21c1ff091367fecf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67164-na-8aab4327</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67164%3A%20n%2Fa&amp;severity=critical&amp;id=6942e1e21c1ff091367feced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66921-na-42c238c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66921%3A%20n%2Fa&amp;severity=high&amp;id=6942e1e21c1ff091367fece6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67285-na-3e81af47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67285%3A%20n%2Fa&amp;severity=high&amp;id=6942d8c9b2cbfb3efaad419f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65855-na-2aa7fbb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65855%3A%20n%2Fa&amp;severity=medium&amp;id=6942d8c9b2cbfb3efaad419b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65185-na-d8c19bf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65185%3A%20n%2Fa&amp;severity=low&amp;id=6942d8c9b2cbfb3efaad4196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29371-na-a9b2daea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29371%3A%20n%2Fa&amp;severity=high&amp;id=6942d536b2cbfb3efaa86de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29370-na-766c87a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29370%3A%20n%2Fa&amp;severity=medium&amp;id=6942d1adb2cbfb3efaa33d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14766-out-of-bounds-read-and-write-in-goo-22c194bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14766%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=6941e6798258306a9da22878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14765-use-after-free-in-google-chrome-60af4a1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14765%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6941e6798258306a9da22874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soundcloud-hit-by-cyberattack-breach-affects-20-of-902e6d94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SoundCloud%20Hit%20by%20Cyberattack%2C%20Breach%20Affects%2020%25%20of%20its%20Users&amp;severity=high&amp;id=6941e2f38258306a9d9d1852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34288-cwe-732-incorrect-permission-assign-c4519e9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34288%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20Enterprises%20Nagios%20XI&amp;severity=high&amp;id=6941dbf98258306a9d96c3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68274-cwe-476-null-pointer-dereference-in-080bd02e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68274%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20emiago%20sipgo&amp;severity=high&amp;id=6941da4bb8ff87d8f94579f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64520-cwe-862-missing-authorization-in-gl-9990351a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64520%3A%20CWE-862%3A%20Missing%20Authorization%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=6941d6c9b8ff87d8f9416195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14466-cwe-770-allocation-of-resources-wit-f0fec304</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14466%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20G%C3%BCralp%20Systems%20Fortimus%20Series&amp;severity=medium&amp;id=6941d344b8ff87d8f93c7337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13532-cwe-916-use-of-password-hash-with-i-c52cab23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13532%3A%20CWE-916%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Fortra%20Core%20Privileged%20Access%20Manager%20(BoKS)&amp;severity=medium&amp;id=6941bc63535cdcbc0ad63cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-risk-in-virtualization-why-hypervisors--615dd39d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20Risk%20in%20Virtualization%3A%20Why%20Hypervisors%20are%20a%20Ransomware%20Magnet&amp;severity=high&amp;id=6941b7290d5f6f4391b94106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rogue-nuget-package-poses-as-tracerfody-steals-cry-d9a9ce0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rogue%20NuGet%20Package%20Poses%20as%20Tracer.Fody%2C%20Steals%20Cryptocurrency%20Wallet%20Data&amp;severity=high&amp;id=6941b7290d5f6f4391b9410e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-iam-credentials-power-a-large-aws-cryp-c05e4887</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20IAM%20Credentials%20Power%20a%20Large%20AWS%20Crypto%20Mining%20Campaign&amp;severity=high&amp;id=6941b7290d5f6f4391b94102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/texas-sues-tv-makers-for-taking-screenshots-of-wha-8bcbf088</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Texas%20sues%20TV%20makers%20for%20taking%20screenshots%20of%20what%20people%20watch&amp;severity=high&amp;id=6941b7290d5f6f4391b94112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8872-cwe-400-uncontrolled-resource-consum-0eeca28e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8872%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Arista%20Networks%20EOS&amp;severity=high&amp;id=6941b76a0d5f6f4391b96408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14553-cwe-200-exposure-of-sensitive-infor-d14cd0b9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14553%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TP-Link%20Systems%20Inc.%20TP-Link%20Tapo%20App&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68270-cwe-862-missing-authorization-in-op-c7d17376</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68270%3A%20CWE-862%3A%20Missing%20Authorization%20in%20openedx%20edx-platform&amp;severity=critical&amp;id=6941ae5b0d5f6f4391b0c398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68156-cwe-770-allocation-of-resources-wit-2b56119d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68156%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20expr-lang%20expr&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68155-cwe-22-improper-limitation-of-a-pat-16ba5c53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68155%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite-plugin-react&amp;severity=high&amp;id=6941a4041a61eff6269a9351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68154-cwe-78-improper-neutralization-of-s-41f82666</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68154%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=6941a4041a61eff6269a934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68150-cwe-918-server-side-request-forgery-f5f91259</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=6941a4041a61eff6269a9348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68146-cwe-367-time-of-check-time-of-use-t-d4005e0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68146%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20tox-dev%20filelock&amp;severity=medium&amp;id=6941a4041a61eff6269a9342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46296-an-authorization-bypass-vulnerabili-72992d35</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46296%3A%20An%20authorization%20bypass%20vulnerability%20in%20FileMaker%20Server%20Admin%20Console%20allowed%20administrator%20roles%20with%20minimal%20privileges%20to%20access%20administrative%20features%20such%20as%20viewing%20license%20details%20and%20downloading%20application%20logs.%20in%20Claris%20FileMaker%20Server&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46295-apache-commons-text-versions-prior--b0b7aaed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46295%3A%20Apache%20Commons%20Text%20versions%20prior%20to%201.10.0%20included%20interpolation%20features%20that%20could%20be%20abused%20when%20applications%20passed%20untrusted%20input%20into%20the%20text-substitution%20API.%20Because%20some%20interpolators%20could%20trigger%20actions%20like%20executing%20commands%20or%20accessing%20external%20resources%2C%20an%20attacker%20could%20potentially%20achieve%20remote%20code%20execution.%20in%20Claris%20FileMaker%20Server&amp;severity=critical&amp;id=6941ae5b0d5f6f4391b0c3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46294-the-iis-shortname-vulnerability-exp-e89c4e3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46294%3A%20The%20IIS%20Shortname%20Vulnerability%20exploits%20how%20Microsoft%20IIS%20handles%20legacy%208.3%20short%20filenames%2C%20allowing%20attackers%20to%20infer%20the%20existence%20of%20files%20or%20directories%20by%20crafting%20requests%20with%20the%20tilde%20(~)%20character.%20in%20Claris%20FileMaker%20Server&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68142-cwe-1333-inefficient-regular-expres-1cfe4711</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68142%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20facelessuser%20pymdown-extensions&amp;severity=low&amp;id=6941ae5c0d5f6f4391b0c3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-open-source-to-openai-the-evolution-of-third--40358618</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Open%20Source%20to%20OpenAI%3A%20The%20Evolution%20of%20Third-Party%20Risk&amp;severity=medium&amp;id=6941a06f1a61eff626985458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-threat-intelligence-warns-russian-gru-hacke-369fb50c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Threat%20Intelligence%20Warns%20Russian%20GRU%20Hackers%20Now%20Favor%20Misconfigured%20Devices%20Over%20Vulnerabilities&amp;severity=medium&amp;id=6941a0851a61eff6269860f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwning-santa-before-the-bad-guys-do-a-hybrid-bug-b-65d57e1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwning%20Santa%20before%20the%20bad%20guys%20do%3A%20A%20hybrid%20bug%20bounty%20%2F%20CTF%20for%20container%20isolation&amp;severity=medium&amp;id=69419d9a1a61eff62695ce95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33235-cwe-362-concurrent-execution-using--bae3f820</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33235%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Resiliency%20Extension&amp;severity=high&amp;id=69419b7d9050fe85080f3cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33225-cwe-61-unix-symbolic-link-symlink-f-eb6bc1d0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33225%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20NVIDIA%20Resiliency%20Extension&amp;severity=high&amp;id=69419b7d9050fe85080f3cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33210-cwe-502-deserialization-of-untruste-c0f2ea24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33210%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Isaac%20Lab&amp;severity=critical&amp;id=694197f79050fe85080b12af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33226-cwe-502-deserialization-of-untruste-9614cc99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33226%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=694197f79050fe85080b12b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33212-cwe-502-deserialization-of-untruste-121f7f0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33212%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=694197f79050fe85080b12b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53896-missing-authentication-for-critical-e7811ddf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53896%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20D-Link%20DAP-1325&amp;severity=high&amp;id=694194749050fe8508060875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53901-url-redirection-to-untrusted-site-o-216e992b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53901%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WBCE%20CMS&amp;severity=high&amp;id=69446e034eb3efac36aa8f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53899-server-side-request-forgery-ssrf-0486edd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53899%3A%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=69446e034eb3efac36aa8f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53894-weak-authentication-in-dulldusk-php-19de8a9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53894%3A%20Weak%20Authentication%20in%20Dulldusk%20phpfm&amp;severity=critical&amp;id=694194749050fe8508060882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geminijack-a-prompt-injection-challenge-demonstrat-d2bfdfdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeminiJack%3A%20A%20prompt-injection%20challenge%20demonstrating%20real-world%20LLM%20abuse&amp;severity=medium&amp;id=694190f09050fe85080407ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempting-cross-translation-unit-taint-analysis-f-05d871c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempting%20Cross%20Translation%20Unit%20Taint%20Analysis%20for%20Firefox%20with%20Clang%20Static%20Analyzer&amp;severity=high&amp;id=69418d819050fe8508ffd529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68116-cwe-79-improper-neutralization-of-i-f4cb6712</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68116%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20error311%20FileRise&amp;severity=high&amp;id=69418d769050fe8508ffb304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-iam-credentials-power-a-large-aws-cryp-c27ba8dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20IAM%20Credentials%20Power%20a%20Large%20AWS%20Crypto%20Mining%20Campaign&amp;severity=medium&amp;id=694209ae473cb759e1e46806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59935-cwe-79-improper-neutralization-of-i-51c11d03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59935%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69418d769050fe8508ffb301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-in-telegram-mini-apps-how-to-avoid-taking-712ebf7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20in%20Telegram%20Mini%20Apps%3A%20how%20to%20avoid%20taking%20the%20bait%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69418bb53e7fd18214c3d792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37164-vulnerability-in-hewlett-packard-en-2672bb21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37164%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20OneView&amp;severity=critical&amp;id=69418d769050fe8508ffb2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10450-cwe-359-exposure-of-private-persona-f18307df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10450%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=694188253e7fd18214bf80c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rogue-nuget-package-poses-as-tracerfody-steals-cry-02754561</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rogue%20NuGet%20Package%20Poses%20as%20Tracer.Fody%2C%20Steals%20Cryptocurrency%20Wallet%20Data&amp;severity=medium&amp;id=694209ae473cb759e1e46809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68269-cwe-349-in-jetbrains-intellij-idea-b8f5905e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68269%3A%20CWE-349%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=69417c3609f61faec595078c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68268-cwe-79-in-jetbrains-teamcity-8fd63ffa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68268%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68267-cwe-272-in-jetbrains-teamcity-88645205</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68267%3A%20CWE-272%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68166-cwe-79-in-jetbrains-teamcity-d30f76a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68166%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68165-cwe-79-in-jetbrains-teamcity-e3e4b445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68165%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68164-cwe-203-in-jetbrains-teamcity-6459069c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68164%3A%20CWE-203%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=69417c3609f61faec595077d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68163-cwe-79-in-jetbrains-teamcity-d4e67bb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68163%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=69417c3609f61faec595077a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68162-cwe-829-in-jetbrains-teamcity-129a0fe2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68162%3A%20CWE-829%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=69417c3609f61faec5950777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14432-cwe-532-insertion-of-sensitive-info-fb159eae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14432%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20HP%20Inc%20Poly%20G7500&amp;severity=high&amp;id=694178b209f61faec5907335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62329-cwe-613-insufficient-session-expira-21d57530</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62329%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20DevOps%20Deploy%20%2F%20Launch&amp;severity=medium&amp;id=694178b209f61faec5907338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ink-dragons-relay-network-and-stealthy-offensive-o-92ff5e3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ink%20Dragon&apos;s%20Relay%20Network%20and%20Stealthy%20Offensive%20Operation&amp;severity=medium&amp;id=6941acaa0d5f6f4391ada9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-distributing-malicious-mobile-app-via-qr-c-f3dcf26a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Distributing%20Malicious%20Mobile%20App%20via%20QR%20Code&amp;severity=medium&amp;id=6941b0230d5f6f4391b1e56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urban-vpn-browser-extension-caught-harvesting-ai-c-8d006c0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Urban%20VPN%20Browser%20Extension%20Caught%20Harvesting%20AI%20Chat%20Conversations%20from%20Millions%20of%20Users&amp;severity=high&amp;id=6941753609f61faec58b50f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700000-records-compromised-in-askul-ransomware-att-df249994</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700%2C000%20Records%20Compromised%20in%20Askul%20Ransomware%20Attack&amp;severity=medium&amp;id=69416c5f77659b3df3503eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68224-1f020b8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68224&amp;severity=null&amp;id=6957eb35db813ff03ef355aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68203-ed505aa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68203&amp;severity=null&amp;id=6957eb35db813ff03ef355a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jumpcloud-remote-assist-flaw-lets-users-gain-full--0016f86e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JumpCloud%20Remote%20Assist%20Flaw%20Lets%20Users%20Gain%20Full%20Control%20of%20Company%20Devices&amp;severity=medium&amp;id=6941656377659b3df346365d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tldr-hide-your-headless-bot-by-mimicking-a-webview-09b66c34</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TL%3BDR%3A%20Hide%20your%20headless%20bot%20by%20mimicking%20a%20WebView%20(Sec-Fetch%20and%20Client%20Hints%20inconsistencies)&amp;severity=medium&amp;id=694165b177659b3df34666be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fortigate-under-active-attack-through-sam-54bab342</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20FortiGate%20Under%20Active%20Attack%20Through%20SAML%20SSO%20Authentication%20Bypass&amp;severity=high&amp;id=6941656377659b3df3463655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-authorities-dismantle-call-center-fraud-r-0ae902c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20authorities%20dismantle%20call%20center%20fraud%20ring%20in%20Ukraine&amp;severity=high&amp;id=6941656377659b3df3463659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40361-60165bf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40361&amp;severity=null&amp;id=6960dacfa48af7d8ce806bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-russian-hackers-now-favor-misconfigurations-de396171</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%3A%20Russian%20Hackers%20Now%20Favor%20Misconfigurations%20in%20Critical%20Infrastructure%20Attacks&amp;severity=critical&amp;id=69415d7d83e5b48efc059ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14780-sql-injection-in-xiongwei-smart-cat-cd25a57d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14780%3A%20SQL%20Injection%20in%20Xiongwei%20Smart%20Catering%20Cloud%20Platform&amp;severity=medium&amp;id=69415d9883e5b48efc05b0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-ink-dragon-revealing-the-relay-network-and--b1a1626f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Ink%20Dragon%3A%20Revealing%20the%20Relay%20Network%20and%20Inner%20Workings%20of%20a%20Stealthy%20Offensive%20Operation&amp;severity=high&amp;id=69415a0a83e5b48efc0390b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-exposes-years-long-gru-cyber-campaign-targe-a5b9d6fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Exposes%20Years-Long%20GRU%20Cyber%20Campaign%20Targeting%20Energy%20and%20Cloud%20Infrastructure&amp;severity=critical&amp;id=694209ae473cb759e1e4680c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65076-cwe-22-improper-limitation-of-a-pat-978950f8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65076%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WaveStore%20WaveStore%20Server&amp;severity=high&amp;id=694154d05e006677ae0dd914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65075-cwe-22-improper-limitation-of-a-pat-0dcb4cf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65075%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WaveStore%20WaveStore%20Server&amp;severity=medium&amp;id=694154d05e006677ae0dd90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65074-cwe-22-improper-limitation-of-a-pat-3ae30a8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65074%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WaveStore%20WaveStore%20Server&amp;severity=high&amp;id=694154d05e006677ae0dd860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14443-server-side-request-forgery-ssrf-in-9c5f2d2b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14443%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204&amp;severity=medium&amp;id=694151495e006677ae09a90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jumpcloud-remote-assist-vulnerability-can-expose-s-9a59f443</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JumpCloud%20Remote%20Assist%20Vulnerability%20Can%20Expose%20Systems%20to%20Takeover&amp;severity=low&amp;id=694146bc5e006677aefdeda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-data-security-and-privacy-need-to-start-in-cod-dd915236</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Data%20Security%20and%20Privacy%20Need%20to%20Start%20in%20Code&amp;severity=medium&amp;id=694155985e006677ae0eaf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13474-cwe-639-authorization-bypass-throug-873cadd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13474%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Menulux%20Software%20Inc.%20Mobile%20App&amp;severity=high&amp;id=694144fdb7167ed5be7864c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13741-cwe-862-missing-authorization-in-pu-e73cee3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13741%3A%20CWE-862%20Missing%20Authorization%20in%20publishpress%20Schedule%20Post%20Changes%20With%20PublishPress%20Future%3A%20Unpublish%2C%20Delete%2C%20Change%20Status%2C%20Trash%2C%20Change%20Categories&amp;severity=medium&amp;id=694144fdb7167ed5be7864d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11220-cwe-79-improper-neutralization-of-i-ed2ebb13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11220%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=694144fdb7167ed5be7864cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0836-cwe-862-missing-authorization-in-mil-79aed365</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0836%3A%20CWE-862%20Missing%20Authorization%20in%20Milestone%20Systems%20XProtect%20VMS&amp;severity=medium&amp;id=69413e06b7167ed5be6e7a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fortigate-under-active-attack-through-sam-fbe8c785</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20FortiGate%20Under%20Active%20Attack%20Through%20SAML%20SSO%20Authentication%20Bypass&amp;severity=critical&amp;id=69413de7b7167ed5be6e5c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/user-data-compromised-in-soundcloud-hack-0a10a0db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=User%20Data%20Compromised%20in%20SoundCloud%20Hack&amp;severity=medium&amp;id=69413a65b7167ed5be6bc09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-santastealer-malware-steals-data-from-browsers-4c097a70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SantaStealer%20malware%20steals%20data%20from%20browsers%2C%20crypto%20wallets&amp;severity=high&amp;id=69413a7bb7167ed5be6bd723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/askul-confirms-theft-of-740k-customer-records-in-r-3594939a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Askul%20confirms%20theft%20of%20740k%20customer%20records%20in%20ransomware%20attack&amp;severity=high&amp;id=69413a7bb7167ed5be6bd727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-to-shut-down-dark-web-monitoring-tool-in-fe-3b686551</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20to%20Shut%20Down%20Dark%20Web%20Monitoring%20Tool%20in%20February%202026&amp;severity=high&amp;id=69413a7bb7167ed5be6bd72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-interior-minister-says-hackers-breached-its-d4e47474</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Interior%20Minister%20says%20hackers%20breached%20its%20email%20servers&amp;severity=medium&amp;id=69413a7bb7167ed5be6bd733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700credit-data-breach-exposed-details-of-56-millio-94b89fcc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700Credit%20Data%20Breach%20Exposed%20Details%20of%205.6%20Million%20Consumers%20Including%20SSNs.&amp;severity=high&amp;id=694135161c9332043ad4c808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-the-infrastructure-behind-ddosias-at-87296225</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20the%20Infrastructure%20Behind%20DDoSia&apos;s%20Attacks&amp;severity=medium&amp;id=694154d05e006677ae0dd866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-actor-phishes-the-baltics-and-the-balk-6fae1177</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20actor%20phishes%20the%20Baltics%20and%20the%20Balkans&amp;severity=medium&amp;id=694154d05e006677ae0dd919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-the-wild-exploitation-of-fresh-fortinet-flaws-b-cb36df54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-the-Wild%20Exploitation%20of%20Fresh%20Fortinet%20Flaws%20Begins&amp;severity=critical&amp;id=6941270b1c9332043ac20a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14002-cwe-287-improper-authentication-in--2dce4fae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14002%3A%20CWE-287%20Improper%20Authentication%20in%20whyun%20WPCOM%20Member&amp;severity=high&amp;id=69412552594e45819d817425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-vulnerability-actively-exploited-to-de-d91b3da6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Vulnerability%20Actively%20Exploited%20to%20Deploy%20Linux%20Backdoors&amp;severity=medium&amp;id=694155985e006677ae0eaf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13231-cwe-362-concurrent-execution-using--a9a3b571</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13231%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=medium&amp;id=69411abe594e45819d7515df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68088-missing-authorization-in-merkulove--0e7f26c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68088%3A%20Missing%20Authorization%20in%20merkulove%20Huger%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68087-missing-authorization-in-merkulove--d7abe184</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68087%3A%20Missing%20Authorization%20in%20merkulove%20Modalier%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68086-missing-authorization-in-merkulove--fedb16e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68086%3A%20Missing%20Authorization%20in%20merkulove%20Reformer%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68085-missing-authorization-in-merkulove--af053296</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68085%3A%20Missing%20Authorization%20in%20merkulove%20Buttoner%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68084-missing-authorization-in-nitesh-ult-32182db0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68084%3A%20Missing%20Authorization%20in%20Nitesh%20Ultimate%20Auction&amp;severity=medium&amp;id=69411758594e45819d70dc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68083-cross-site-request-forgery-csrf-in--5d4907a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68083%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Meks%20Meks%20Quick%20Plugin%20Disabler&amp;severity=medium&amp;id=69411758594e45819d70dc5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68082-cross-site-request-forgery-csrf-in--5257ee55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68082%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SEMrush%20CY%20LTD%20Semrush%20Content%20Toolkit&amp;severity=medium&amp;id=69411758594e45819d70dc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68080-improper-neutralization-of-input-du-8c240ec7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68080%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20User%20Avatar%20-%20Reloaded&amp;severity=medium&amp;id=69411758594e45819d70dc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68079-improper-neutralization-of-input-du-4d5b6c56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68079%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeNectar%20Salient%20Shortcodes&amp;severity=medium&amp;id=69411756594e45819d70d850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68078-improper-neutralization-of-input-du-8e9f15b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68078%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeNectar%20Salient%20Portfolio&amp;severity=medium&amp;id=69411756594e45819d70d84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68077-improper-neutralization-of-input-du-3f8a5ca0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68077%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Select-Themes%20Stockholm&amp;severity=medium&amp;id=69411756594e45819d70d84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68076-improper-neutralization-of-input-du-1661e62e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Select-Themes%20Stockholm%20Core&amp;severity=medium&amp;id=69411756594e45819d70d847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68071-authorization-bypass-through-user-c-b5fec355</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68071%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=medium&amp;id=69411756594e45819d70d844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68070-improper-neutralization-of-input-du-5ced6c6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68070%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vektor%2CInc.%20VK%20Google%20Job%20Posting%20Manager&amp;severity=medium&amp;id=69411756594e45819d70d841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68068-improper-control-of-filename-for-in-75f2f7ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68068%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Stockholm&amp;severity=high&amp;id=69411756594e45819d70d83e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68067-improper-control-of-filename-for-in-a0e7d80f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Stockholm%20Core&amp;severity=high&amp;id=69411756594e45819d70d83b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68066-improper-control-of-filename-for-in-0b1d59d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PenciDesign%20Soledad&amp;severity=high&amp;id=69411756594e45819d70d838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68065-improper-control-of-filename-for-in-0c87a061</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LiquidThemes%20Hub%20Core&amp;severity=high&amp;id=69411756594e45819d70d835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68062-improper-control-of-filename-for-in-bada404d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20MinimogWP&amp;severity=high&amp;id=69411755594e45819d70d69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68061-improper-control-of-filename-for-in-bb1da9c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20EduMall&amp;severity=high&amp;id=69411755594e45819d70d69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68056-improper-neutralization-of-special--aab25123</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68056%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20LBG%20Zoominoutslider&amp;severity=high&amp;id=69411755594e45819d70d698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68055-improper-neutralization-of-special--5a43a174</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68055%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=69411755594e45819d70d695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68054-improper-neutralization-of-special--ce61930b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68054%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20CountDown%20With%20Image%20or%20Video%20Background&amp;severity=high&amp;id=69411755594e45819d70d692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68053-improper-neutralization-of-special--97057880</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68053%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20xPromoter&amp;severity=high&amp;id=69411755594e45819d70d68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67999-improper-neutralization-of-special--82006b4a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67999%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stefano%20Lissa%20Newsletter&amp;severity=high&amp;id=69411755594e45819d70d68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67989-server-side-request-forgery-ssrf-in-2572ab30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67989%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LMPixels%20Kerge&amp;severity=medium&amp;id=69411755594e45819d70d689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67986-improper-neutralization-of-input-du-a9cfe3d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67986%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Barn2%20Plugins%20Document%20Library%20Lite&amp;severity=medium&amp;id=69411755594e45819d70d686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67985-authorization-bypass-through-user-c-32398551</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67985%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Barn2%20Plugins%20Document%20Library%20Lite&amp;severity=medium&amp;id=69411755594e45819d70d683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67983-improper-neutralization-of-input-du-c7befc6e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=medium&amp;id=69411753594e45819d70ccd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67976-missing-authorization-in-bob-watu-q-e82aef9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67976%3A%20Missing%20Authorization%20in%20Bob%20Watu%20Quiz&amp;severity=medium&amp;id=69411753594e45819d70ccd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67965-missing-authorization-in-favethemes-f31e3a32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67965%3A%20Missing%20Authorization%20in%20favethemes%20Homey%20Core&amp;severity=medium&amp;id=69411753594e45819d70cccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67962-improper-neutralization-of-special--05616468</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67962%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AIOSEO%20Plugin%20Team%20Broken%20Link%20Checker&amp;severity=high&amp;id=69411753594e45819d70ccca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67951-improper-neutralization-of-input-du-882cebfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPZOOM%20WPZOOM%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69411753594e45819d70ccc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67950-improper-neutralization-of-special--a95dd924</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67950%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Syed%20Balkhi%20All%20In%20One%20SEO%20Pack&amp;severity=high&amp;id=69411753594e45819d70ccc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67948-exposure-of-sensitive-system-inform-6d54b8b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67948%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SendPulse%20SendPulse%20Email%20Marketing%20Newsletter&amp;severity=medium&amp;id=69411753594e45819d70ccc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67929-missing-authorization-in-templatein-271d97c2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67929%3A%20Missing%20Authorization%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=69411753594e45819d70ccbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67912-improper-neutralization-of-input-du-2e08586c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premio%20Stars%20Testimonials&amp;severity=medium&amp;id=69411753594e45819d70ccbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66167-missing-authorization-in-merkulove--01ae56bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66167%3A%20Missing%20Authorization%20in%20merkulove%20Lottier&amp;severity=medium&amp;id=69411753594e45819d70ccb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66166-missing-authorization-in-merkulove--99a465e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66166%3A%20Missing%20Authorization%20in%20merkulove%20Lottier%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66165-missing-authorization-in-merkulove--05ca9d4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66165%3A%20Missing%20Authorization%20in%20merkulove%20Lottier%20for%20WPBakery&amp;severity=medium&amp;id=69411752594e45819d70cb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66164-missing-authorization-in-merkulove--da23dbb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66164%3A%20Missing%20Authorization%20in%20merkulove%20Laser&amp;severity=medium&amp;id=69411752594e45819d70cb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66163-missing-authorization-in-merkulove--7c649501</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66163%3A%20Missing%20Authorization%20in%20merkulove%20Masker%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66162-missing-authorization-in-merkulove--eb8f0428</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66162%3A%20Missing%20Authorization%20in%20merkulove%20Spoter%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66161-missing-authorization-in-merkulove--5b555682</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66161%3A%20Missing%20Authorization%20in%20merkulove%20Grider%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66147-missing-authorization-in-merkulove--d9735ec2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66147%3A%20Missing%20Authorization%20in%20merkulove%20Coder%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66134-missing-authorization-in-ninjateam--254917e1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66134%3A%20Missing%20Authorization%20in%20NinjaTeam%20FileBird%20Pro&amp;severity=medium&amp;id=69411752594e45819d70cb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66133-missing-authorization-in-wp-legal-p-f89bfdc3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66133%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=medium&amp;id=69411752594e45819d70cb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66132-authorization-bypass-through-user-c-30f0ab1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66132%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FAPI%20Business%20s.r.o.%20FAPI%20Member&amp;severity=medium&amp;id=69411752594e45819d70cb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66131-missing-authorization-in-yaadsarig--bacbc562</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66131%3A%20Missing%20Authorization%20in%20yaadsarig%20Yaad%20Sarig%20Payment%20Gateway%20For%20WC&amp;severity=critical&amp;id=69411750594e45819d70c756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66130-missing-authorization-in-etruel-wp--39feb8ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66130%3A%20Missing%20Authorization%20in%20etruel%20WP%20Views%20Counter&amp;severity=medium&amp;id=69411750594e45819d70c753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66129-missing-authorization-in-wppochipp--be62de5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66129%3A%20Missing%20Authorization%20in%20wppochipp%20Pochipp&amp;severity=medium&amp;id=69411750594e45819d70c750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66128-missing-authorization-in-brevo-send-499c3b54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66128%3A%20Missing%20Authorization%20in%20Brevo%20Sendinblue%20for%20WooCommerce&amp;severity=medium&amp;id=69411750594e45819d70c74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66127-missing-authorization-in-g5theme-es-85993736</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66127%3A%20Missing%20Authorization%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=medium&amp;id=69411750594e45819d70c74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66126-insertion-of-sensitive-information--07e14078</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66126%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20wowpress.host%20Fix%20Media%20Library&amp;severity=medium&amp;id=69411750594e45819d70c747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66125-insertion-of-sensitive-information--4bab3433</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66125%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Nitesh%20Ultimate%20Auction&amp;severity=medium&amp;id=69411750594e45819d70c744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66124-missing-authorization-in-zeen101-le-7a3eed6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66124%3A%20Missing%20Authorization%20in%20ZEEN101%20Leaky%20Paywall&amp;severity=medium&amp;id=69411750594e45819d70c741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66122-missing-authorization-in-design-sty-8fbbfed3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66122%3A%20Missing%20Authorization%20in%20Design%20Stylish%20Price%20List&amp;severity=medium&amp;id=69411750594e45819d70c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66121-missing-authorization-in-siteground-84f6210c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66121%3A%20Missing%20Authorization%20in%20SiteGround%20SiteGround%20Security&amp;severity=medium&amp;id=69411750594e45819d70c73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64639-missing-authorization-in-wp-compres-ba710c44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64639%3A%20Missing%20Authorization%20in%20WP%20Compress%20WP%20Compress%20for%20MainWP&amp;severity=medium&amp;id=6941174f594e45819d70c5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64638-missing-authorization-in-onpayio-on-64d9c883</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64638%3A%20Missing%20Authorization%20in%20OnPay.io%20OnPay.io%20for%20WooCommerce&amp;severity=medium&amp;id=6941174f594e45819d70c5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64635-missing-authorization-in-syed-balkh-7cb25363</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64635%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Feeds%20for%20YouTube&amp;severity=medium&amp;id=6941174f594e45819d70c5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64634-missing-authorization-in-themefusio-ea300690</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64634%3A%20Missing%20Authorization%20in%20ThemeFusion%20Avada&amp;severity=high&amp;id=6941174f594e45819d70c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64633-improper-neutralization-of-script-r-b164d6e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64633%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20colabrio%20Norebro%20Extra&amp;severity=medium&amp;id=6941174f594e45819d70c5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64632-missing-authorization-in-auctollo-g-e66cf382</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64632%3A%20Missing%20Authorization%20in%20Auctollo%20Google%20XML%20Sitemaps&amp;severity=medium&amp;id=6941174f594e45819d70c5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64631-missing-authorization-in-wc-lovers--aeff6e54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64631%3A%20Missing%20Authorization%20in%20WC%20Lovers%20WCFM%20Marketplace&amp;severity=medium&amp;id=6941174f594e45819d70c59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64630-missing-authorization-in-strategy11-925240a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64630%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Business%20Directory&amp;severity=medium&amp;id=6941174f594e45819d70c59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64253-path-traversal-in-wordpressorg-heal-38180214</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64253%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20WordPress.org%20Health%20Check%20%26%20Troubleshooting&amp;severity=medium&amp;id=6941174f594e45819d70c598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64251-missing-authorization-in-azzaroco-u-96b8140d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64251%3A%20Missing%20Authorization%20in%20azzaroco%20Ultimate%20Learning%20Pro&amp;severity=medium&amp;id=6941174f594e45819d70c595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64250-url-redirection-to-untrusted-site-o-03e3b33e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64250%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpWax%20Directorist&amp;severity=medium&amp;id=6941174d594e45819d70c405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64249-missing-authorization-in-wp-experts-e0069cfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64249%3A%20Missing%20Authorization%20in%20WP-EXPERTS.IN%20Protect%20WP%20Admin&amp;severity=medium&amp;id=6941174d594e45819d70c402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64248-missing-authorization-in-emarket-de-397e329e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64248%3A%20Missing%20Authorization%20in%20emarket-design%20Request%20a%20Quote&amp;severity=medium&amp;id=6941174d594e45819d70c3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64247-missing-authorization-in-edmonparke-15689752</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64247%3A%20Missing%20Authorization%20in%20edmon.parker%20Read%20More%20%26%20Accordion&amp;severity=medium&amp;id=6941174d594e45819d70c3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64246-missing-authorization-in-netopsae-a-12e0626d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64246%3A%20Missing%20Authorization%20in%20netopsae%20Accessibility%20by%20AudioEye&amp;severity=medium&amp;id=6941174d594e45819d70c3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64245-missing-authorization-in-ryanpcmcqu-e0320036</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64245%3A%20Missing%20Authorization%20in%20ryanpcmcquen%20Import%20external%20attachments&amp;severity=medium&amp;id=6941174d594e45819d70c3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64244-missing-authorization-in-codexpert--f5da3b19</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64244%3A%20Missing%20Authorization%20in%20Codexpert%2C%20Inc%20Restrict%20Elementor%20Widgets%2C%20Columns%20and%20Sections&amp;severity=medium&amp;id=6941174d594e45819d70c3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64243-missing-authorization-in-e-plugins--4ef6d695</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64243%3A%20Missing%20Authorization%20in%20e-plugins%20Directory%20Pro&amp;severity=medium&amp;id=6941174d594e45819d70c3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64242-missing-authorization-in-merv-barre-46bb16f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64242%3A%20Missing%20Authorization%20in%20Merv%20Barrett%20Easy%20Property%20Listings&amp;severity=medium&amp;id=6941174d594e45819d70c3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64241-missing-authorization-in-imtiaz-ray-be5648b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64241%3A%20Missing%20Authorization%20in%20Imtiaz%20Rayhan%20WP%20Coupons%20and%20Deals&amp;severity=medium&amp;id=6941174d594e45819d70c3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64239-cross-site-request-forgery-csrf-in--3d465108</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64239%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yoav%20Farhi%20RTL%20Tester&amp;severity=medium&amp;id=6941174b594e45819d70bb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64238-missing-authorization-in-nicolaskul-d988c882</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64238%3A%20Missing%20Authorization%20in%20NicolasKulka%20WPS%20Bidouille&amp;severity=medium&amp;id=6941174b594e45819d70bb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64237-cross-site-request-forgery-csrf-in--67abc086</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64237%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Graham%20Quick%20Interest%20Slider&amp;severity=medium&amp;id=6941174b594e45819d70bb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59009-cross-site-request-forgery-csrf-in--0b7ef99e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59009%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Astoundify%20Listify&amp;severity=medium&amp;id=6941174b594e45819d70bb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59001-missing-authorization-in-themenecta-45e0f75d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59001%3A%20Missing%20Authorization%20in%20ThemeNectar%20Salient%20Core&amp;severity=medium&amp;id=6941174b594e45819d70bb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58999-cross-site-request-forgery-csrf-in--e3fae455</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58999%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20loopus%20WP%20Attractive%20Donations%20System%20-%20Easy%20Stripe%20%26%20Paypal%20donations&amp;severity=medium&amp;id=6941174b594e45819d70bb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54045-missing-authorization-in-creativemi-3640d361</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54045%3A%20Missing%20Authorization%20in%20CreativeMindsSolutions%20CM%20On%20Demand%20Search%20And%20Replace&amp;severity=medium&amp;id=6941174b594e45819d70bb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54005-missing-authorization-in-sonalsinha-eef15f90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54005%3A%20Missing%20Authorization%20in%20sonalsinha21%20SKT%20Page%20Builder&amp;severity=medium&amp;id=6941174b594e45819d70bb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54004-missing-authorization-in-wc-lovers--9f665bc4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54004%3A%20Missing%20Authorization%20in%20WC%20Lovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=low&amp;id=6941174b594e45819d70bb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49300-insertion-of-sensitive-information--4e57656b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49300%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20shinetheme%20Traveler%20Option%20Tree&amp;severity=low&amp;id=6941174b594e45819d70bb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autonomous-appsec-via-chrome-devtools-mcp-600-min--5d3be28a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autonomous%20AppSec%20via%20Chrome%20DevTools%20(MCP)%3A%20600%20min%20%E2%86%92%203.5%20min%20on%20OWASP%20Juice%20Shop&amp;severity=medium&amp;id=6941175d594e45819d70df7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11991-cwe-862-missing-authorization-in-je-7ec62977</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11991%3A%20CWE-862%20Missing%20Authorization%20in%20jetmonsters%20JetFormBuilder%20%E2%80%94%20Dynamic%20Blocks%20Form%20Builder&amp;severity=medium&amp;id=69410b259bfd1ab9ba9ec080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13439-cwe-200-exposure-of-sensitive-infor-d8447c75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13439%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=medium&amp;id=69410b259bfd1ab9ba9ec084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66635-stack-based-buffer-overflow-in-seik-b3221617</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66635%3A%20Stack-based%20buffer%20overflow%20in%20SEIKO%20EPSON%20CORPORATION%20Web%20Config&amp;severity=high&amp;id=6941063f15f8de78ec7f942a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62330-cwe-319-cleartext-transmission-of-s-b362ac9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62330%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20HCL%20Software%20DevOps%20Deploy&amp;severity=medium&amp;id=6940feba15f8de78ec72ee2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-to-shut-down-dark-web-monitoring-tool-in-fe-1841de7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20to%20Shut%20Down%20Dark%20Web%20Monitoring%20Tool%20in%20February%202026&amp;severity=medium&amp;id=6941068815f8de78ec7fc211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12809-cwe-862-missing-authorization-in-we-445ee50e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12809%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20Dokan%20Pro&amp;severity=medium&amp;id=6940f308a4f72ecfca032936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13794-cwe-862-missing-authorization-in-th-33143b06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13794%3A%20CWE-862%20Missing%20Authorization%20in%20themeisle%20Auto%20Featured%20Image%20(Auto%20Post%20Thumbnail)&amp;severity=medium&amp;id=6940f308a4f72ecfca03293a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14252-vulnerability-in-advantech-susi-cdc40913</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14252%3A%20Vulnerability%20in%20Advantech%20SUSI&amp;severity=high&amp;id=6940ef85a4f72ecfcafdd982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14777-authentication-bypass-by-alternate--765a6a72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14777%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=6940ec04a4f72ecfcafbad2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66357-improper-check-for-unusual-or-excep-dd525d25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66357%3A%20Improper%20check%20for%20unusual%20or%20exceptional%20conditions%20in%20Inaba%20Denki%20Sangyo%20Co.%2C%20Ltd.%20CHOCO%20TEI%20WATCHER%20mini%20(IB-MCT001)&amp;severity=medium&amp;id=6940e76154c229a9f5d8d5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59479-improper-restriction-of-rendered-ui-5231958d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59479%3A%20Improper%20restriction%20of%20rendered%20UI%20layers%20or%20frames%20in%20Inaba%20Denki%20Sangyo%20Co.%2C%20Ltd.%20CHOCO%20TEI%20WATCHER%20mini%20(IB-MCT001)&amp;severity=medium&amp;id=6940e76154c229a9f5d8d5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61976-improper-check-for-unusual-or-excep-3cc7b8f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61976%3A%20Improper%20check%20for%20unusual%20or%20exceptional%20conditions%20in%20Inaba%20Denki%20Sangyo%20Co.%2C%20Ltd.%20CHOCO%20TEI%20WATCHER%20mini%20(IB-MCT001)&amp;severity=high&amp;id=6940e76154c229a9f5d8d5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13956-cwe-862-missing-authorization-in-th-cbf34457</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13956%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=6940e3e754c229a9f5d4c70f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14749-improper-access-controls-in-ningyua-bb8b7fba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14749%3A%20Improper%20Access%20Controls%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940cec5d9bcdf3f3d1f60d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14748-improper-access-controls-in-ningyua-f6ae90c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14748%3A%20Improper%20Access%20Controls%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940cec5d9bcdf3f3d1f60d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59385-cwe-290-in-qnap-systems-inc-qts-976483fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59385%3A%20CWE-290%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=6940c7c9d9bcdf3f3d1a9816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62847-cwe-88-in-qnap-systems-inc-qts-9cc1e515</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62847%3A%20CWE-88%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a981a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62848-cwe-476-in-qnap-systems-inc-qts-26997ee9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62848%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=6940c7c9d9bcdf3f3d1a981d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62849-cwe-89-in-qnap-systems-inc-qts-e243fee5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62849%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a9820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14747-denial-of-service-in-ningyuanda-tc1-7c16042f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14747%3A%20Denial%20of%20Service%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a9810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14746-improper-authentication-in-ningyuan-1fd9c740</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14746%3A%20Improper%20Authentication%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a980a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autonomous-code-analyzer-beats-all-human-teams-at--1c48a073</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autonomous%20code%20analyzer%20beats%20all%20human%20teams%20at%20OSS%20zero-day%20competition&amp;severity=critical&amp;id=6940af32d9bcdf3f3d14f703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68115-cwe-79-improper-neutralization-of-i-91559319</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68115%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=6940b2a5d9bcdf3f3d15a315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68113-cwe-115-misinterpretation-of-input--2c2eb7f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68113%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20altcha-org%20altcha-lib&amp;severity=medium&amp;id=6940b2a5d9bcdf3f3d15a308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67751-cwe-89-improper-neutralization-of-s-2b97b28f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67751%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=6940b2a5d9bcdf3f3d15a2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67874-cwe-204-observable-response-discrep-cfea1afd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67874%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=6940b2a5d9bcdf3f3d15a302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67744-cwe-94-improper-control-of-generati-e699b3d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67744%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=6940b2a5d9bcdf3f3d15a2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67748-cwe-184-incomplete-list-of-disallow-1dc75921</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67748%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6940abb2d9bcdf3f3d14315e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14758-cwe-1188-initialization-of-a-resour-9ca98302</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14758%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20ALASCA%20YAOOK&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d143140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67747-cwe-184-incomplete-list-of-disallow-5eb97c09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67747%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6940abb2d9bcdf3f3d143158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67736-cwe-89-improper-neutralization-of-s-4283d66c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67736%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20tts&amp;severity=high&amp;id=6940abb2d9bcdf3f3d143154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67722-cwe-426-untrusted-search-path-in-fr-6d28d12e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67722%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20FreePBX%20framework&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d143150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66449-cwe-22-improper-limitation-of-a-pat-b798008f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66449%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20C4illin%20ConvertX&amp;severity=high&amp;id=6940abb2d9bcdf3f3d143143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67715-cwe-284-improper-access-control-in--771eb11e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67715%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d14314c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67492-cwe-1286-improper-validation-of-syn-b7f84d26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67492%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d143148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-16-3c6b020b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-16&amp;severity=medium&amp;id=6941f612d2cd6f6c37b6aef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65834-na-00e2b8df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65834%3A%20n%2Fa&amp;severity=critical&amp;id=6941bc63535cdcbc0ad63cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65589-na-057d12ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65589%3A%20n%2Fa&amp;severity=medium&amp;id=6941ae5c0d5f6f4391b0c3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65581-na-3b8c31da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65581%3A%20n%2Fa&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52196-na-f0e6466e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52196%3A%20n%2Fa&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65593-na-486a36aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65593%3A%20n%2Fa&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65592-na-4856c6da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65592%3A%20n%2Fa&amp;severity=medium&amp;id=6941a4041a61eff6269a933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65591-na-faa69fe0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65591%3A%20n%2Fa&amp;severity=medium&amp;id=6941a4041a61eff6269a933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65590-na-3683ac85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65590%3A%20n%2Fa&amp;severity=medium&amp;id=6941a4041a61eff6269a9336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62862-na-9f706d9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62862%3A%20n%2Fa&amp;severity=medium&amp;id=694194749050fe8508060890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62864-na-91fd75e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62864%3A%20n%2Fa&amp;severity=critical&amp;id=694194749050fe850806087e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62863-na-4905d9e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62863%3A%20n%2Fa&amp;severity=critical&amp;id=694194749050fe850806087a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50401-na-29c7c5f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50401%3A%20n%2Fa&amp;severity=critical&amp;id=694190eb9050fe8508040787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50398-na-8481b724</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50398%3A%20n%2Fa&amp;severity=critical&amp;id=694190eb9050fe8508040784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29231-na-f12e61c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29231%3A%20n%2Fa&amp;severity=medium&amp;id=69418d769050fe8508ffb2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63414-na-f12b194c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63414%3A%20n%2Fa&amp;severity=critical&amp;id=69418ba93e7fd18214c3d71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65427-na-74e6ad8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65427%3A%20n%2Fa&amp;severity=medium&amp;id=694188253e7fd18214bf80c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65319-na-f7e35328</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65319%3A%20n%2Fa&amp;severity=critical&amp;id=694184a13e7fd18214ba0e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65318-na-e986605a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65318%3A%20n%2Fa&amp;severity=critical&amp;id=694184a13e7fd18214ba0e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64012-na-0ff9f27b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64012%3A%20n%2Fa&amp;severity=medium&amp;id=694178b209f61faec590733b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/esm-dev-136-path-traversal-7009fd5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=esm-dev%20136%20-%20Path%20Traversal&amp;severity=medium&amp;id=6941062315f8de78ec7f738b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/summar-employee-portal-3980-authenticated-sql-inje-1a5894c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Summar%20Employee%20Portal%20%203.98.0%20-%20Authenticated%20SQL%20Injection&amp;severity=medium&amp;id=6941062315f8de78ec7f7386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10900-cwe-787-out-of-bounds-write-in-auto-0f23ab01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10900%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10899-cwe-787-out-of-bounds-write-in-auto-b3f70d7c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10899%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10898-cwe-787-out-of-bounds-write-in-auto-1220e63c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10898%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pornhub-extorted-after-hackers-steal-premium-membe-35c054a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PornHub%20extorted%20after%20hackers%20steal%20Premium%20member%20activity%20data&amp;severity=high&amp;id=69409d8ad9bcdf3f3d09c512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10889-cwe-120-buffer-copy-without-checkin-aadcd24c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10889%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10888-cwe-787-out-of-bounds-write-in-auto-a477ebcd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10888%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10887-cwe-120-buffer-copy-without-checkin-eb07023e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10887%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10886-cwe-120-buffer-copy-without-checkin-1ecf1926</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10886%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10884-cwe-787-out-of-bounds-write-in-auto-e66a526d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10884%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10883-cwe-125-out-of-bounds-read-in-autod-d51543c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10883%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10882-cwe-787-out-of-bounds-write-in-auto-08fa27e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10882%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10881-cwe-122-heap-based-buffer-overflow--c1e428e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10881%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9460-cwe-125-out-of-bounds-read-in-autode-98e778e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9460%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9459-cwe-125-out-of-bounds-read-in-autode-a4610cfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9459%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9457-cwe-120-buffer-copy-without-checking-a078e733</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9457%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9456-cwe-120-buffer-copy-without-checking-96381e35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9456%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66407-cwe-352-cross-site-request-forgery--bfb6621f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66407%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69409d9cd9bcdf3f3d09c710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9455-cwe-125-out-of-bounds-read-in-autode-66f2c235</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9455%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9454-cwe-125-out-of-bounds-read-in-autode-58273f8a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9454%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9453-cwe-125-out-of-bounds-read-in-autode-1cbab4b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9453%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9452-cwe-120-buffer-copy-without-checking-403f5cb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9452%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14731-improper-neutralization-of-special--8752e394</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14731%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=69409d9ed9bcdf3f3d09c741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14593-cwe-125-out-of-bounds-read-in-autod-fa228c31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14593%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66482-cwe-307-improper-restriction-of-exc-9f26c8c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66482%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20misskey-dev%20misskey&amp;severity=medium&amp;id=69409a3bd9bcdf3f3d093948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66402-cwe-862-missing-authorization-in-mi-47451996</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66402%3A%20CWE-862%3A%20Missing%20Authorization%20in%20misskey-dev%20misskey&amp;severity=high&amp;id=6940db0754c229a9f5cc423e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14730-code-injection-in-ctcms-content-man-25b007c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14730%3A%20Code%20Injection%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=69409685d9bcdf3f3d08b5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14729-code-injection-in-ctcms-content-man-ad7fee5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14729%3A%20Code%20Injection%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=69409685d9bcdf3f3d08b5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64338-2856e089</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64338%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=690d7e3a3ea13e495ec6402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9121-cwe-502-deserialization-of-untrusted-8844fc9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9121%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hitachi%20Vantara%20Pentaho%20Data%20Integration%20and%20Analytics&amp;severity=high&amp;id=69409306d9bcdf3f3d07fefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9122-cwe-209-generation-of-error-message--93abb040</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9122%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Hitachi%20Vantara%20Pentaho%20Data%20Integration%20and%20Analytics&amp;severity=medium&amp;id=69409306d9bcdf3f3d07feff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/featured-chrome-browser-extension-caught-intercept-08650a51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Featured%20Chrome%20Browser%20Extension%20Caught%20Intercepting%20Millions%20of%20Users&apos;%20AI%20Chats&amp;severity=high&amp;id=694084f1d9bcdf3f3d0519a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defending-against-the-cve-2025-55182-react2shell-v-2ba359a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Defending%20against%20the%20CVE-2025-55182%20(React2Shell)%20vulnerability%20in%20React%20Server%20Components&amp;severity=medium&amp;id=694121d1594e45819d7c8716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/makop-ransomware-guloader-and-privilege-escalation-dd31bfb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Makop%20ransomware%3A%20GuLoader%20and%20privilege%20escalation%20in%20attacks%20against%20Indian%20businesses&amp;severity=medium&amp;id=69407a67d9bcdf3f3d02bafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-discover-and-secure-ownerless-corporate-it--580d01a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20discover%20and%20secure%20ownerless%20corporate%20IT%20assets&amp;severity=medium&amp;id=6940736ed9bcdf3f3d00c64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53879-stack-based-buffer-overflow-in-neon-8bd783f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53879%3A%20Stack-based%20Buffer%20Overflow%20in%20neonguvenlik%20NVClient&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14722-cross-site-scripting-in-vion707-dma-24aeaf84</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14722%3A%20Cross%20Site%20Scripting%20in%20vion707%20DMadmin&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53893-server-side-request-forgery-ssrf-in-b776626d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53893%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ateme%20TITAN&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53892-unrestricted-upload-of-file-with-da-0ac5cfc6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53892%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blackcat-cms%20Blackcat%20CMS&amp;severity=high&amp;id=69407362d9bcdf3f3d00c437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53891-improper-neutralization-of-input-du-fe4191a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blackcat-cms%20Blackcat%20CMS&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53886-stack-based-buffer-overflow-in-xlig-cd288835</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53886%3A%20Stack-based%20Buffer%20Overflow%20in%20Xlightftpd%20Xlight%20FTP%20Server&amp;severity=medium&amp;id=69407361d9bcdf3f3d00c42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53884-improper-neutralization-of-input-du-8c695424</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webedition%20Webedition%20CMS&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53883-improper-control-of-generation-of-c-7c105846</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53883%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Webedition%20Webedition%20CMS&amp;severity=high&amp;id=69407360d9bcdf3f3d00c3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53882-improper-neutralization-of-input-du-ef822bfa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jlexart%20JLex%20GuestBook&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53881-cleartext-transmission-of-sensitive-a67e9315</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53881%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Ruijie%20ReyeeOS&amp;severity=critical&amp;id=69407360d9bcdf3f3d00c3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53878-inconsistent-interpretation-of-http-8a2502f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53878%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Phpjabbers%20Member%20Login%20Script&amp;severity=high&amp;id=69407360d9bcdf3f3d00c3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53877-improper-neutralization-of-special--9cb2dff2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53877%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Phpjabbers%20Bus%20Reservation%20System&amp;severity=critical&amp;id=69407360d9bcdf3f3d00c3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53876-unrestricted-upload-of-file-with-da-ca3dfcfc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53876%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Creativeitem%20Academy%20LMS&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53875-cleartext-transmission-of-sensitive-4affd249</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53875%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Gomlab%20GOM%20Player&amp;severity=high&amp;id=69407360d9bcdf3f3d00c3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53874-buffer-copy-without-checking-size-o-266a59c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53874%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Gomlab%20GOM%20Player&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53868-unrestricted-upload-of-file-with-da-d8d59762</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53868%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Coppermine%20coppermine-gallery&amp;severity=high&amp;id=69406fd9d9bcdf3f3d0056a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64725-cwe-286-incorrect-user-management-i-649a9abe</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64725%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=69406fd9d9bcdf3f3d0056ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13489-cwe-319-cleartext-transmission-of-s-061fede2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13489%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20UCD%20-%20IBM%20DevOps%20Deploy&amp;severity=medium&amp;id=694068d4d9bcdf3f3dfeb53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14503-cwe-266-incorrect-privilege-assignm-951716a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14503%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20AWS%20Harmonix%20on%20AWS&amp;severity=high&amp;id=694068d4d9bcdf3f3dfeb539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14148-cwe-522-insufficiently-protected-cr-1bb94094</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14148%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20UCD%20-%20IBM%20DevOps%20Deploy&amp;severity=medium&amp;id=694068d4d9bcdf3f3dfeb545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12035-integer-overflow-or-wraparound-in-z-93bfce85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12035%3A%20Integer%20Overflow%20or%20Wraparound%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36360-cwe-613-insufficient-session-expira-5a6f2530</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36360%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20UCD%20-%20IBM%20UrbanCode%20Deploy&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14038-cwe-862-missing-authorization-in-en-fc7c4832</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14038%3A%20CWE-862%20Missing%20Authorization%20in%20EnterpriseDB%20Hybrid%20Manager%20-%20LTS&amp;severity=high&amp;id=69405034d9bcdf3f3df776ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/featured-chrome-browser-extension-caught-intercept-c07f5bad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Featured%20Chrome%20Browser%20Extension%20Caught%20Intercepting%20Millions%20of%20Users&apos;%20AI%20Chats&amp;severity=medium&amp;id=6941068815f8de78ec7fc214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-links-more-chinese-hacking-groups-to-react2-b12ff58f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20links%20more%20Chinese%20hacking%20groups%20to%20React2Shell%20attacks&amp;severity=high&amp;id=69404cb0d9bcdf3f3df63af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freepbx-patches-critical-sqli-file-upload-and-auth-2fb17efb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FreePBX%20Patches%20Critical%20SQLi%2C%20File-Upload%2C%20and%20AUTHTYPE%20Bypass%20Flaws%20Enabling%20RCE&amp;severity=critical&amp;id=69404cb0d9bcdf3f3df63aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700credit-data-breach-impacts-58-million-vehicle-d-43fd0225</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700Credit%20data%20breach%20impacts%205.8%20million%20vehicle%20dealership%20customers&amp;severity=high&amp;id=69404927d9bcdf3f3df49985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/militant-groups-are-experimenting-with-ai-and-the--88181817</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Militant%20Groups%20Are%20Experimenting%20With%20AI%2C%20and%20the%20Risks%20Are%20Expected%20to%20Grow&amp;severity=medium&amp;id=6940459fd9bcdf3f3df2aa9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11393-unintended-proxy-or-intermediary-co-620255c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11393%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20Red%20Hat%20Red%20Hat%20Lightspeed%20(formerly%20Insights)%20for%20Runtimes%201&amp;severity=high&amp;id=69404222d9bcdf3f3df0a13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-fragile-lock-novel-bypasses-for-saml-authentic-6519dcb1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Fragile%20Lock%3A%20Novel%20Bypasses%20For%20SAML%20Authentication&amp;severity=medium&amp;id=69403093d9bcdf3f3de86a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13888-incorrect-privilege-assignment-in-r-34919c9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13888%3A%20Incorrect%20Privilege%20Assignment%20in%20redhat-developer%20gitops-operator&amp;severity=critical&amp;id=69402d09d9bcdf3f3de5a0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14387-cwe-79-improper-neutralization-of-i-8d8eea0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69402d09d9bcdf3f3de5a0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13824-cwe-763-release-of-invalid-pointer--c8fe8d72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13824%3A%20CWE-763%3A%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Rockwell%20Automation%20Micro820%C2%AE%2C%20Micro850%C2%AE%2C%20%20Micro870%C2%AE&amp;severity=high&amp;id=69402985d9bcdf3f3de49055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13823-cwe-1395-dependency-on-vulnerable-t-e3b87deb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13823%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Rockwell%20Automation%20Micro820%C2%AE%2C%20Micro850%C2%AE%2C%20%20Micro870%C2%AE&amp;severity=high&amp;id=69402985d9bcdf3f3de49052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34412-cwe-693-protection-mechanism-failur-ec5556ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34412&amp;severity=medium&amp;id=6940227fd9bcdf3f3de2753d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34411-cwe-862-missing-authorization-in-eq-39897481</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34411&amp;severity=high&amp;id=6940227fd9bcdf3f3de27537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34181-cwe-22-improper-limitation-of-a-pat-86c1f77a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34181%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NetSupport%20Software%20Manager&amp;severity=high&amp;id=6940227fd9bcdf3f3de27533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34180-cwe-257-storing-passwords-in-a-reco-8310c550</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34180%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20NetSupport%20Software%20Manager&amp;severity=high&amp;id=6940227fd9bcdf3f3de2752f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34179-cwe-89-improper-neutralization-of-s-aea9afd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34179%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NetSupport%20Software%20Manager&amp;severity=high&amp;id=6940227fd9bcdf3f3de2752b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14156-cwe-20-improper-input-validation-in-c485fe9f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14156%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ays-pro%20Fox%20LMS%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=critical&amp;id=69401ef9d9bcdf3f3de12798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13950-cwe-862-missing-authorization-in-on-85c14803</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13950%3A%20CWE-862%20Missing%20Authorization%20in%20onesignal%20OneSignal%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13728-cwe-79-improper-neutralization-of-i-ec83f04d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13728%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20FluentAuth%20%E2%80%93%20The%20Ultimate%20Authorization%20%26%20Security%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de1278c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14383-cwe-89-improper-neutralization-of-s-ac94675e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14383%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=high&amp;id=69401ef9d9bcdf3f3de1279c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12900-cwe-862-missing-authorization-in-ni-108bcb0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12900%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de1277a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13610-cwe-79-improper-neutralization-of-i-a361d5ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14003-cwe-862-missing-authorization-in-wp-70ed37ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14003%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13367-cwe-79-improper-neutralization-of-i-e471635d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de1277e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13608-cwe-79-improper-neutralization-of-i-0695e3c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20caterhamcomputing%20CC%20Child%20Pages&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sees-5-chinese-groups-exploiting-react2shel-775d2d47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sees%205%20Chinese%20Groups%20Exploiting%20React2Shell%20for%20Malware%20Delivery&amp;severity=medium&amp;id=6940146ad9bcdf3f3dddfa16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16tb-of-mongodb-database-exposes-43-billion-lead-g-ce6f65ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16TB%20of%20MongoDB%20Database%20Exposes%204.3%20Billion%20Lead%20Gen%20Records&amp;severity=medium&amp;id=694010e7d9bcdf3f3ddd33d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-react2shell-exploits-cve-2025-55182-mon-dec-1-e2ae8110</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20React2Shell%20Exploits%20CVE-2025-55182%2C%20(Mon%2C%20Dec%2015th)&amp;severity=medium&amp;id=69400d5fd9bcdf3f3ddc5ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/15th-december-threat-intelligence-report-a6fd60cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=15th%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=694009e2d9bcdf3f3ddb9e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frogblight-banking-trojan-targets-android-users-in-28fb5a82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frogblight%20banking%20Trojan%20targets%20Android%20users%20in%20Turkey&amp;severity=medium&amp;id=69404937d9bcdf3f3df4a5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hamas-linked-hackers-using-ashtag-malware-against--60dd9bd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hamas%20Linked%20Hackers%20Using%20AshTag%20Malware%20Against%20Diplomatic%20Offices&amp;severity=medium&amp;id=6940065cd9bcdf3f3ddab940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-apple-0-days-winrar-exploit-lastpass--18ea88b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Apple%200-Days%2C%20WinRAR%20Exploit%2C%20LastPass%20Fines%2C%20.NET%20RCE%2C%20OAuth%20Scams%20%26%20More&amp;severity=critical&amp;id=6941068815f8de78ec7fc21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nextjs-59k-servers-compromised-in-48h-i-breached-t-7082090a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Next.js%3A%2059k%20servers%20compromised%20in%2048h%20-%20I%20breached%20the%20attackers&apos;%20C2%20and%20here&apos;s%20what%20I%20found&amp;severity=medium&amp;id=693ffbd1d9bcdf3f3dd7fb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-browser-extension-risk-guide-after-the-shadypand-11eea072</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Browser%20Extension%20Risk%20Guide%20After%20the%20ShadyPanda%20Campaign&amp;severity=medium&amp;id=6941068815f8de78ec7fc21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66388-cwe-201-insertion-of-sensitive-info-baac17da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66388%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=693ff4c7d9bcdf3f3dd5a059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-ceo-steps-down-after-data-breach-hits-337--c2fc7f86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20CEO%20Steps%20Down%20After%20Data%20Breach%20Hits%2033.7%20Million%20Users&amp;severity=high&amp;id=693ff143d9bcdf3f3dd4f67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-fr-recommends-completely-deactivate-wi-fi-whe-0eecae5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT-FR%20recommends%20completely%20deactivate%20Wi-Fi%20whenever%20it%E2%80%99s%20not%20in%20use&amp;severity=medium&amp;id=693ff143d9bcdf3f3dd4f67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11670-cwe-200-exposure-of-sensitive-infor-57e69760</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11670%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Zohocorp%20ManageEngine%20ADManager%20Plus&amp;severity=medium&amp;id=693fedd0d9bcdf3f3dd41433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atlassian-patches-critical-apache-tika-flaw-47955dff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atlassian%20Patches%20Critical%20Apache%20Tika%20Flaw&amp;severity=critical&amp;id=693fedbcd9bcdf3f3dd41015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37731-cwe-287-improper-authentication-in--c4df8dd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37731%3A%20CWE-287%20Improper%20Authentication%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=693fea3cd9bcdf3f3dd304fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/third-draftkings-hacker-pleads-guilty-c799614c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Third%20DraftKings%20Hacker%20Pleads%20Guilty&amp;severity=medium&amp;id=693fe6b3d9bcdf3f3dce5191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14714-cwe-288-authentication-bypass-using-cd727fa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14714%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=low&amp;id=693fea3cd9bcdf3f3dd304f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volklocker-ransomware-exposed-by-hard-coded-master-6c991677</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VolkLocker%20Ransomware%20Exposed%20by%20Hard-Coded%20Master%20Key%20Allowing%20Free%20Decryption&amp;severity=high&amp;id=693fe331d9bcdf3f3dcd632a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37732-cwe-79-improper-neutralization-of-i-33a3e897</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=693fe6dbd9bcdf3f3dce5d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-stealer-spread-by-iso-phishing-emails-hitt-db941019</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Stealer%20Spread%20by%20ISO%20Phishing%20Emails%20Hitting%20Russian%20Finance%20Sector&amp;severity=medium&amp;id=6941068815f8de78ec7fc220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700credit-data-breach-impacts-58-million-individua-db8ea5b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700Credit%20Data%20Breach%20Impacts%205.8%20Million%20Individuals&amp;severity=medium&amp;id=693fd51fd9bcdf3f3dc8a7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snakes-in-the-castle-inside-the-walls-of-python-dr-c0d471ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snakes%20in%20the%20Castle%3A%20Inside%20the%20Walls%20of%20Python-Driven%20CastleLoader%20Delivery&amp;severity=medium&amp;id=693fd19fd9bcdf3f3dc76eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-two-zero-days-tied-to-mysterious-exp-9383fbc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Two%20Zero-Days%20Tied%20to%20Mysterious%20Exploited%20Chrome%20Flaw&amp;severity=medium&amp;id=693fce1ad9bcdf3f3dc61c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14711-sql-injection-in-fantasticlbp-hotel-df384f6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14711%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels%20Server&amp;severity=medium&amp;id=693fc3c1d9bcdf3f3dc24d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14710-sql-injection-in-fantasticlbp-hotel-0343299c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14710%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels%20Server&amp;severity=medium&amp;id=693fbc87d9bcdf3f3dbffad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14709-buffer-overflow-in-shiguangwu-sgwbo-9e06ff4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14709%3A%20Buffer%20Overflow%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fb590d9bcdf3f3dbe2eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14023-na-in-line-corporation-line-client--ff86cd7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14023%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=low&amp;id=693fb1fed9bcdf3f3dbd0788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14022-na-in-line-corporation-line-client--dfe05da8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14022%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=high&amp;id=693fb1fed9bcdf3f3dbd0785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14021-na-in-line-corporation-line-client--29071296</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14021%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=medium&amp;id=693fb1fed9bcdf3f3dbd0782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14020-na-in-line-corporation-line-client--7769a125</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14020%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20Android&amp;severity=medium&amp;id=693fb1fed9bcdf3f3dbd077f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14019-na-in-line-corporation-line-client--3c6bbad5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14019%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20Android&amp;severity=low&amp;id=693fb1fed9bcdf3f3dbd077c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14708-buffer-overflow-in-shiguangwu-sgwbo-53f42704</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14708%3A%20Buffer%20Overflow%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fae77d9bcdf3f3dbb3e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14707-command-injection-in-shiguangwu-sgw-931e2bae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14707%3A%20Command%20Injection%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fa76fd9bcdf3f3db90012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13355-cwe-79-cross-site-scripting-xss-in--df9ac663</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13355%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20URL%20Shortify&amp;severity=high&amp;id=693fa76fd9bcdf3f3db9000f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12684-cwe-79-cross-site-scripting-xss-in--7093858e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12684%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20URL%20Shortify&amp;severity=high&amp;id=693fa76fd9bcdf3f3db9000b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11363-cwe-434-unrestricted-upload-of-file-af6f3d14</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11363%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Royal%20Addons%20for%20Elementor&amp;severity=medium&amp;id=693fa76fd9bcdf3f3db90008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14712-cwe-497-exposure-of-sensitive-syste-cc121420</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14712%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20JHENG%20GAO%20Student%20Learning%20Assessment%20and%20Support%20System&amp;severity=high&amp;id=693fa079d9bcdf3f3db5fb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volklocker-ransomware-exposed-by-hard-coded-master-dc2792a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VolkLocker%20Ransomware%20Exposed%20by%20Hard-Coded%20Master%20Key%20Allowing%20Free%20Decryption&amp;severity=low&amp;id=6941068815f8de78ec7fc223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14706-command-injection-in-shiguangwu-sgw-4786a150</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14706%3A%20Command%20Injection%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fa079d9bcdf3f3db5fb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14705-command-injection-in-shiguangwu-sgw-5b1fe27c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14705%3A%20Command%20Injection%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693f9960d9bcdf3f3db32099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14704-path-traversal-in-shiguangwu-sgwbox-f43657a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14704%3A%20Path%20Traversal%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=medium&amp;id=693f95ffd9bcdf3f3db20cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14703-improper-authentication-in-shiguang-2b16c39b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14703%3A%20Improper%20Authentication%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=medium&amp;id=693f8b50d9bcdf3f3da77ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67907-706df7bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67907&amp;severity=null&amp;id=693f87d9d9bcdf3f3da2a96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14702-path-traversal-in-smartbit-commv-sm-e90913a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14702%3A%20Path%20Traversal%20in%20Smartbit%20CommV%20Smartschool%20App&amp;severity=medium&amp;id=693f87d9d9bcdf3f3da2a967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13740-cwe-79-improper-neutralization-of-i-d404172e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13740%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20someguy9%20Lightweight%20Accordion&amp;severity=medium&amp;id=693f87d9d9bcdf3f3da2a963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14699-path-traversal-in-municorn-fax-app-7fc9a4fa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14699%3A%20Path%20Traversal%20in%20Municorn%20FAX%20App&amp;severity=medium&amp;id=693f7e6cb0f1e1d5304c6a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14698-path-traversal-in-atlaszz-ai-photo--7466cca7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14698%3A%20Path%20Traversal%20in%20atlaszz%20AI%20Photo%20Team%20Galleryit%20App&amp;severity=medium&amp;id=693f898ad9bcdf3f3da64752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14697-files-or-directories-accessible-in--f7a7303d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14697%3A%20Files%20or%20Directories%20Accessible%20in%20Shenzhen%20Sixun%20Software%20Sixun%20Shanghui%20Group%20Business%20Management%20System&amp;severity=medium&amp;id=693f898ad9bcdf3f3da6474b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14696-weak-password-recovery-in-shenzhen--53664c48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14696%3A%20Weak%20Password%20Recovery%20in%20Shenzhen%20Sixun%20Software%20Sixun%20Shanghui%20Group%20Business%20Management%20System&amp;severity=medium&amp;id=693f6ccdb0f1e1d5304319ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14695-dynamically-managed-code-resources--d30fa4cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14695%3A%20Dynamically-Managed%20Code%20Resources%20in%20SamuNatsu%20HaloBot&amp;severity=medium&amp;id=693f6265b0f1e1d5303925e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14694-sql-injection-in-ketr-jepaas-5d7f7428</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14694%3A%20SQL%20Injection%20in%20ketr%20JEPaaS&amp;severity=medium&amp;id=693f5b33b0f1e1d53033ca22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14693-symlink-following-in-ugreen-dh2100-cbc10b10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14693%3A%20Symlink%20Following%20in%20Ugreen%20DH2100%2B&amp;severity=high&amp;id=693f5b33b0f1e1d53033ca1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-15-5179208d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-15&amp;severity=medium&amp;id=6940a486d9bcdf3f3d0c54db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55895-na-027eb7e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55895%3A%20n%2Fa&amp;severity=critical&amp;id=694076f2d9bcdf3f3d023769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38913-na-9407046e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38913%3A%20n%2Fa&amp;severity=medium&amp;id=694076f2d9bcdf3f3d023765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36338-na-ec042ebb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36338%3A%20n%2Fa&amp;severity=medium&amp;id=694076f2d9bcdf3f3d023761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55703-na-77aee29e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55703%3A%20n%2Fa&amp;severity=low&amp;id=694068d4d9bcdf3f3dfeb541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67809-na-e0da105a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67809%3A%20n%2Fa&amp;severity=medium&amp;id=6940654ed9bcdf3f3dfde263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65213-na-4ff21a86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65213%3A%20n%2Fa&amp;severity=critical&amp;id=69405ac4d9bcdf3f3dfb23d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51962-na-ce7addc8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51962%3A%20n%2Fa&amp;severity=medium&amp;id=69405ac4d9bcdf3f3dfb23ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36337-na-f317b36b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36337%3A%20n%2Fa&amp;severity=medium&amp;id=69405ac4d9bcdf3f3dfb23c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65835-na-81efe64d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65835%3A%20n%2Fa&amp;severity=medium&amp;id=69405ac4d9bcdf3f3dfb23c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65176-na-fac74852</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65176%3A%20n%2Fa&amp;severity=high&amp;id=69405ac4d9bcdf3f3dfb23bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kunai-analysis-report-malware-sample-abusing-open--aba43cac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kunai%20Analysis%20Report%20-%20Malware%20Sample%20Abusing%20Open%20Recursive%20DNS%20for%20Exfiltration&amp;severity=medium&amp;id=69405ab7d9bcdf3f3dfb1be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66438-na-e5f56ca0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66438%3A%20n%2Fa&amp;severity=critical&amp;id=69404938d9bcdf3f3df4a610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66440-na-521cb8e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66440%3A%20n%2Fa&amp;severity=critical&amp;id=694045bfd9bcdf3f3df2bea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66439-na-1a777ee7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66439%3A%20n%2Fa&amp;severity=critical&amp;id=694045bfd9bcdf3f3df2be9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66437-na-5300a490</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66437%3A%20n%2Fa&amp;severity=high&amp;id=694045bfd9bcdf3f3df2be9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66436-na-589804a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66436%3A%20n%2Fa&amp;severity=medium&amp;id=694045bfd9bcdf3f3df2be97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55901-na-11eafa79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55901%3A%20n%2Fa&amp;severity=medium&amp;id=69404222d9bcdf3f3df0a143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55893-na-29151203</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55893%3A%20n%2Fa&amp;severity=medium&amp;id=69404222d9bcdf3f3df0a13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66435-na-9669dd17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66435%3A%20n%2Fa&amp;severity=medium&amp;id=69403ea1d9bcdf3f3deea90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66434-na-34073bfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66434%3A%20n%2Fa&amp;severity=high&amp;id=69403ea1d9bcdf3f3deea906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65742-na-dcdf4357</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65742%3A%20n%2Fa&amp;severity=high&amp;id=69403ea1d9bcdf3f3deea902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60786-na-b147fe3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60786%3A%20n%2Fa&amp;severity=high&amp;id=69403410d9bcdf3f3de9937e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44599-na-41f8cf07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44599%3A%20n%2Fa&amp;severity=high&amp;id=69403410d9bcdf3f3de9937a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44598-na-6e5e7c3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44598%3A%20n%2Fa&amp;severity=high&amp;id=69403410d9bcdf3f3de99376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66963-na-dea6632a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66963%3A%20n%2Fa&amp;severity=medium&amp;id=69403091d9bcdf3f3de86a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66843-na-99552eba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66843%3A%20n%2Fa&amp;severity=medium&amp;id=69403091d9bcdf3f3de86a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66844-na-3fcfcd51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66844%3A%20n%2Fa&amp;severity=critical&amp;id=69403091d9bcdf3f3de86a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65782-na-3ca73d4e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65782%3A%20n%2Fa&amp;severity=medium&amp;id=694017f1d9bcdf3f3ddec59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65781-na-21d62d3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65781%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65780-na-e3dbf689</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65780%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65779-na-b5420b02</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65779%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65778-na-9af62770</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65778%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65431-na-40b8f153</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65431%3A%20n%2Fa&amp;severity=medium&amp;id=694017f1d9bcdf3f3ddec580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65430-na-fa2935d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65430%3A%20n%2Fa&amp;severity=medium&amp;id=694017f1d9bcdf3f3ddec57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67901-cwe-1284-improper-validation-of-spe-52d7049e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67901%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20kristapsdz%20openrsync&amp;severity=medium&amp;id=693f50a7b0f1e1d5302d6805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14692-open-redirect-in-mayan-edms-1827b2b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14692%3A%20Open%20Redirect%20in%20Mayan%20EDMS&amp;severity=medium&amp;id=693f4d23b0f1e1d5302caa57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14691-cross-site-scripting-in-mayan-edms-f917a4a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14691%3A%20Cross%20Site%20Scripting%20in%20Mayan%20EDMS&amp;severity=medium&amp;id=693f461cb0f1e1d5302a462d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67900-cwe-829-inclusion-of-functionality--155a752c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67900%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20NXLog%20NXLog%20Agent&amp;severity=high&amp;id=693f42a8b0f1e1d53029ac6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67899-cwe-674-uncontrolled-recursion-in-u-26411a0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67899%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20uriparser%20project%20uriparser&amp;severity=low&amp;id=693f3b90b0f1e1d530275ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/capabilities-are-the-only-way-to-secure-agent-dele-18321400</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Capabilities%20Are%20the%20Only%20Way%20to%20Secure%20Agent%20Delegation&amp;severity=medium&amp;id=693f380eb0f1e1d530263cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beware-paypal-subscriptions-abused-to-send-fake-pu-fc28d827</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beware%3A%20PayPal%20subscriptions%20abused%20to%20send%20fake%20purchase%20emails&amp;severity=high&amp;id=693f2d7db0f1e1d5302341e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14674-injection-in-aizuda-snail-job-6d238b41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14674%3A%20Injection%20in%20aizuda%20snail-job&amp;severity=medium&amp;id=693effcdb0f1e1d53011dae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14673-heap-based-buffer-overflow-in-gmg13-211600e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14673%3A%20Heap-based%20Buffer%20Overflow%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=693ef8c5b0f1e1d5300e83c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14672-heap-based-buffer-overflow-in-gmg13-0335456d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14672%3A%20Heap-based%20Buffer%20Overflow%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=693effcdb0f1e1d53011daec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14668-sql-injection-in-campcodes-advanced-136e252d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14668%3A%20SQL%20Injection%20in%20campcodes%20Advanced%20Online%20Examination%20System&amp;severity=medium&amp;id=693ee8f15a3f956d14b1f862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-462-released-sun-dec-14th-8d0ac67a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.2%20Released%2C%20(Sun%2C%20Dec%2014th)&amp;severity=medium&amp;id=693ee1e95a3f956d14aa014a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14667-sql-injection-in-itsourcecode-covid-234f0a01</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14667%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693ee1f85a3f956d14aa0f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14666-sql-injection-in-itsourcecode-covid-02dbd20a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14666%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693edcf93c5c518da22e3b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14665-stack-based-buffer-overflow-in-tend-27bfc3c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14665%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=693ed5ec3c5c518da224526c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14664-sql-injection-in-campcodes-supplier-d2ff4a37</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14664%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=693ecdcc5f8758ba47d4695a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14663-cross-site-scripting-in-code-projec-c2f0e7d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14663%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693ec6c15f8758ba47c9dbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14662-cross-site-scripting-in-code-projec-95dd2efe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14662%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693ebffd5f8758ba47c2e121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14661-sql-injection-in-itsourcecode-stude-b38cfc67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14661%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Managemen%20System&amp;severity=medium&amp;id=693ebaa4cd21bcc771e2fc31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14660-improper-access-controls-in-decocms-44e20bbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14660%3A%20Improper%20Access%20Controls%20in%20DecoCMS%20Mesh&amp;severity=medium&amp;id=693ebe20cd21bcc771e7ab9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-found-an-unsecured-16tb-database-containin-f1eb7b4b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20found%20an%20unsecured%2016TB%20database%20containing%204.3B%20professional%20records&amp;severity=high&amp;id=693ea79451e054acf32ab656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14659-command-injection-in-d-link-dir-860-f54db216</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14659%3A%20Command%20Injection%20in%20D-Link%20DIR-860LB1&amp;severity=high&amp;id=693eaea151e054acf3354728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14656-buffer-overflow-in-tenda-ac20-26c310a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14656%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=693e9ba865369625b09f1b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14655-stack-based-buffer-overflow-in-tend-e9864b69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14655%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=693e949f65369625b096c0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14654-stack-based-buffer-overflow-in-tend-a5f2ddfb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14654%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=693e9015f795bf52904ccd6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14653-sql-injection-in-itsourcecode-stude-b19caa17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14653%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693e84eaf795bf52903ec977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14652-sql-injection-in-itsourcecode-onlin-5ce71ab1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14652%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=693e7fbd6ded7774d2f4ad11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14651-use-of-hard-coded-cryptographic-key-b47d6645</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14651%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20MartialBE%20one-hub&amp;severity=medium&amp;id=693e78bf6ded7774d2ea03fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14650-sql-injection-in-itsourcecode-onlin-47026e3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14650%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=693e71bf6ded7774d2e18b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14649-sql-injection-in-itsourcecode-onlin-c9589dbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14649%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=693e69fde4d3911676ba2e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14648-command-injection-in-dedebiz-49cc483b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14648%3A%20Command%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=693e6316e4d3911676b3275d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14647-sql-injection-in-code-projects-comp-07a7d828</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14647%3A%20SQL%20Injection%20in%20code-projects%20Computer%20Book%20Store&amp;severity=medium&amp;id=693e5e61b7454206b45b08df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14646-sql-injection-in-code-projects-stud-24edb2dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14646%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693e53edb7454206b44f10e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12696-cwe-862-missing-authorization-in-he-491a2493</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12696%3A%20CWE-862%20Missing%20Authorization%20in%20HelloLeads%20CRM%20Form%20Shortcode&amp;severity=medium&amp;id=693e53edb7454206b44f10df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14645-sql-injection-in-code-projects-stud-a4a92679</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14645%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693e4f9cc223240c4b621aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12537-cwe-79-improper-neutralization-of-i-e159bef2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpvibes%20Addon%20Elements%20for%20Elementor%20(formerly%20Elementor%20Addon%20Elements)&amp;severity=medium&amp;id=693e4c24c223240c4b5cf0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67897-cwe-195-signed-to-unsigned-conversi-9c7a013f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67897%3A%20CWE-195%20Signed%20to%20Unsigned%20Conversion%20Error%20in%20sequoia-pgp%20sequoia&amp;severity=medium&amp;id=693e40e9230e04755d15db8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13126-cwe-89-improper-neutralization-of-s-ffb42f94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13126%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=693e3d5a230e04755d107f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14644-sql-injection-in-itsourcecode-stude-37855f68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14644%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693e35e094fb796273326d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14643-sql-injection-in-code-projects-simp-df9097a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14643%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Attendance%20Record%20System&amp;severity=medium&amp;id=693e2ed894fb7962733072cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14642-unrestricted-upload-in-code-project-207e6f9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14642%3A%20Unrestricted%20Upload%20in%20code-projects%20Computer%20Laboratory%20System&amp;severity=medium&amp;id=693e27da94fb7962732e5068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14641-unrestricted-upload-in-code-project-0a55ce91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14641%3A%20Unrestricted%20Upload%20in%20code-projects%20Computer%20Laboratory%20System&amp;severity=medium&amp;id=693e27da94fb7962732e5061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14640-sql-injection-in-code-projects-stud-698edd21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14640%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693e1d4594fb7962731e0cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/germany-calls-in-russian-ambassador-over-air-traff-33638060</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Germany%20calls%20in%20Russian%20Ambassador%20over%20air%20traffic%20control%20hack%20claims&amp;severity=medium&amp;id=693e136e94fb7962731203ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14639-sql-injection-in-itsourcecode-stude-7b68f121</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14639%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693e138194fb7962731227f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14638-sql-injection-in-itsourcecode-onlin-13472fa1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14638%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Pet%20Shop%20Management%20System&amp;severity=medium&amp;id=693e0bb194fb796273058a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-14-4d892203</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-14&amp;severity=medium&amp;id=693f5421b0f1e1d5302e7a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attacks-still-using-the-finger-sat-dec-13-a56ccd28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attacks%20Still%20Using%20the%20Finger%2C%20(Sat%2C%20Dec%2013th)&amp;severity=medium&amp;id=693dc1e296904561db586efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14637-sql-injection-in-itsourcecode-onlin-35753e1b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14637%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Pet%20Shop%20Management%20System&amp;severity=medium&amp;id=693dc1f196904561db587985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14636-use-of-weak-hash-in-tenda-ax9-53457b65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14636%3A%20Use%20of%20Weak%20Hash%20in%20Tenda%20AX9&amp;severity=medium&amp;id=693dbe2f5e445230437e2446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14623-sql-injection-in-code-projects-stud-02390b1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14623%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693db0395e445230436e3a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14622-sql-injection-in-code-projects-stud-5647dab3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14622%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693db0395e445230436e3a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-sierra-wireless-route-cd87c321</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20Sierra%20Wireless%20Router%20Flaw%20Enabling%20RCE%20Attacks&amp;severity=high&amp;id=693da3ef241bd09a9280dfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14621-sql-injection-in-code-projects-stud-5007c55f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14621%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693d9a7ada1dfeffd84e3e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14620-sql-injection-in-code-projects-stud-c7eb4f56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14620%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693d92a3da1dfeffd840fc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/offline-decryption-messenger-concept-proposal-and--2fe27b4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Offline%20Decryption%20Messenger%3A%20Concept%20Proposal%20and%20Request%20for%20Constructive%20Feedback&amp;severity=medium&amp;id=693d8f20da1dfeffd83d88f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uks-ico-fine-lastpass-12-million-over-2022-securit-d610bc22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%E2%80%99s%20ICO%20Fine%20LastPass%20%C2%A31.2%20Million%20Over%202022%20Security%20Breach&amp;severity=high&amp;id=693d88810ce66cbce37cbabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14619-sql-injection-in-code-projects-stud-d42ce29c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14619%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693d88960ce66cbce37d0915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14617-path-traversal-in-jehovahs-witnesse-98452149</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14617%3A%20Path%20Traversal%20in%20Jehovahs%20Witnesses%20JW%20Library%20App&amp;severity=medium&amp;id=693d75402c268cf8855cb26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14607-memory-corruption-in-offis-dcmtk-8717237e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14607%3A%20Memory%20Corruption%20in%20OFFIS%20DCMTK&amp;severity=medium&amp;id=693d666c38f0070a6570c1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-sierra-wireless-route-7362fe33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20Sierra%20Wireless%20Router%20Flaw%20Enabling%20RCE%20Attacks&amp;severity=high&amp;id=693d796a2c268cf8856201af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14606-deserialization-in-tiny-rdm-tiny-rd-78dae41c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14606%3A%20Deserialization%20in%20tiny-rdm%20Tiny%20RDM&amp;severity=low&amp;id=693d630838f0070a656ba6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14590-sql-injection-in-code-projects-pris-c1f2133c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14590%3A%20SQL%20Injection%20in%20code-projects%20Prison%20Management%20System&amp;severity=medium&amp;id=693d5cc238f0070a6566cb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14589-sql-injection-in-code-projects-pris-34679355</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14589%3A%20SQL%20Injection%20in%20code-projects%20Prison%20Management%20System&amp;severity=medium&amp;id=693d41eacfba580c44f20e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14588-sql-injection-in-itsourcecode-stude-c7295743</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14588%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693d3aaccf86d060b98c8baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14542-cwe-501-trust-boundary-violation-15837d61</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14542%3A%20CWE-501%20Trust%20Boundary%20Violation&amp;severity=high&amp;id=693d3aaccf86d060b98c8ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-issues-security-updates-after-two-webkit-fla-f7cb6e1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Issues%20Security%20Updates%20After%20Two%20WebKit%20Flaws%20Found%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=693d3a72cf86d060b98c5eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14587-sql-injection-in-itsourcecode-onlin-1551ef15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14587%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Pet%20Shop%20Management%20System&amp;severity=medium&amp;id=693d36fbcf86d060b987576b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8780-cwe-79-improper-neutralization-of-in-7b0d5872</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20SiteOrigin%20Widgets&amp;severity=medium&amp;id=693d2749f35c2264d84723aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9856-cwe-79-improper-neutralization-of-in-ac2e0cce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9856%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20popupbuilder%20Popup%20Builder%20%E2%80%93%20Create%20highly%20converting%2C%20mobile%20friendly%20marketing%20popups.&amp;severity=medium&amp;id=693d2749f35c2264d84723b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8687-cwe-79-improper-neutralization-of-in-aa917f6f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelooks%20Enter%20Addons%20%E2%80%93%20Ultimate%20Template%20Builder%20for%20Elementor&amp;severity=medium&amp;id=693d2749f35c2264d84723a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8199-cwe-79-improper-neutralization-of-in-f220f592</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8199%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debuggersstudio%20Marquee%20Addons%20for%20Elementor%20%E2%80%93%20Essential%20Motion%20Widgets%20%26%20Templates&amp;severity=medium&amp;id=693d2749f35c2264d84723a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8195-cwe-79-improper-neutralization-of-in-7dfbef45</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8195%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20JetWidgets%20For%20Elementor&amp;severity=medium&amp;id=693d2747f35c2264d8472304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0969-cwe-359-exposure-of-private-personal-52597f6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0969%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=693d2747f35c2264d84722e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7960-cwe-79-improper-neutralization-of-in-3b2a27de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%2080%2B%20Elementor%20Widgets%2C%204%20000%2B%20Elementor%20Templates%2C%20WooCommerce%2C%20Mega%20Menu%2C%20Popup%20Builder&amp;severity=medium&amp;id=693d2747f35c2264d8472300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36747-cwe-798-use-of-hard-coded-credentia-55cb0be8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36747%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36752-cwe-798-use-of-hard-coded-credentia-6ed12f6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36752%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36754-cwe-290-authentication-bypass-by-sp-a4d6b30d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36754%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36748-cwe-79-improper-neutralization-of-i-8e97e071</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Growatt%20ShineLan-X&amp;severity=high&amp;id=693d2747f35c2264d84722ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36750-cwe-79-improper-neutralization-of-i-0ce8ddc5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Growatt%20ShineLan-X&amp;severity=high&amp;id=693d2747f35c2264d84722f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36753-cwe-290-authentication-bypass-by-sp-4f3c0251</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36753%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Growatt%20ShineLan-X&amp;severity=high&amp;id=693d2747f35c2264d84722f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36751-cwe-311-missing-encryption-of-sensi-f552bd97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36751%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/building-an-open-source-ai-powered-auto-exploiter--9194f102</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Building%20an%20Open-Source%20AI-Powered%20Auto-Exploiter%20with%20a%201.7B%20Parameter%20Model&amp;severity=high&amp;id=693d1dc5dd056aa40b78a293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10289-cwe-89-improper-neutralization-of-s-c5987c83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10289%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wssoffice21%20YMC%20Filter&amp;severity=medium&amp;id=693d169bdd056aa40b71808d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8779-cwe-79-improper-neutralization-of-in-040eeb06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8779%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shamsbd71%20All-in-One%20Addons%20for%20Elementor%20%E2%80%93%20WidgetKit&amp;severity=medium&amp;id=693d169bdd056aa40b718091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9207-cwe-20-improper-input-validation-in--47a9b844</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9207%3A%20CWE-20%20Improper%20Input%20Validation%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=693d169bdd056aa40b718096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10738-cwe-89-improper-neutralization-of-s-08eed048</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10738%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rupok98%20URL%20Shortener%20Plugin%20For%20WordPress&amp;severity=critical&amp;id=693d0b25fa0068b267d3239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14586-os-command-injection-in-totolink-x5-c2536654</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14586%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20X5000R&amp;severity=medium&amp;id=693d0b25fa0068b267d323a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9116-cwe-79-cross-site-scripting-xss-in-w-c44cc957</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9116%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WPS%20Visitor%20Counter&amp;severity=medium&amp;id=693d05d0fa0068b267cfe0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12362-cwe-862-missing-authorization-in-sa-686288c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12362%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Points%20Management%20System%20For%20Gamification%2C%20Ranks%2C%20Badges%2C%20and%20Loyalty%20Rewards%20Program%20%E2%80%93%20myCred&amp;severity=medium&amp;id=693cff4ed69a8ed577177bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-issues-security-updates-after-two-webkit-fla-ad401b82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Issues%20Security%20Updates%20After%20Two%20WebKit%20Flaws%20Found%20Exploited%20in%20the%20Wild&amp;severity=low&amp;id=693d796a2c268cf8856201b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14446-cwe-862-missing-authorization-in-gh-37afa328</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14446%3A%20CWE-862%20Missing%20Authorization%20in%20ghozylab%20Easy%20Notify%20Lite&amp;severity=medium&amp;id=693cef65d977419e584a508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11693-cwe-200-exposure-of-sensitive-infor-d010e42a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11693%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20recorp%20Export%20WordPress%20Pages%20to%20Static%20HTML%20%26%20PDF%20%E2%80%94%20Static%20Site%20Export&amp;severity=critical&amp;id=693cef62d977419e584a4fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9488-cwe-79-improper-neutralization-of-in-21b8e657</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidanderson%20Redux%20Framework&amp;severity=medium&amp;id=693cef67d977419e584a527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12109-cwe-79-improper-neutralization-of-i-172775d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12109%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mahethekiller%20Header%20Footer%20Script%20Adder%20%E2%80%93%20Insert%20Code%20in%20Header%2C%20Body%20%26%20Footer&amp;severity=medium&amp;id=693cef62d977419e584a4fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13092-cwe-862-missing-authorization-in-aj-31fad52d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13092%3A%20CWE-862%20Missing%20Authorization%20in%20ajitdas%20Devs%20CRM%20%E2%80%93%20Manage%20tasks%2C%20attendance%20and%20teams%20all%20together&amp;severity=medium&amp;id=693cef62d977419e584a4fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14394-cwe-352-cross-site-request-forgery--b0984d25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14394%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20melodicmedia%20Popover%20Windows&amp;severity=medium&amp;id=693cef64d977419e584a5039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14365-cwe-862-missing-authorization-in-du-93846379</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14365%3A%20CWE-862%20Missing%20Authorization%20in%20dugudlabs%20Eyewear%20prescription%20form&amp;severity=medium&amp;id=693cef64d977419e584a5026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12077-cwe-79-improper-neutralization-of-i-90c8a3a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20WP%20to%20LinkedIn%20Auto%20Publish&amp;severity=medium&amp;id=693cef62d977419e584a4fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11164-cwe-862-missing-authorization-in-cr-d234eee8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11164%3A%20CWE-862%20Missing%20Authorization%20in%20creativthemes%20Mavix%20Education&amp;severity=medium&amp;id=693cef62d977419e584a4fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11707-cwe-330-use-of-insufficiently-rando-c34fa2c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11707%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20webfactory%20Login%20Lockdown%20%26%20Protection&amp;severity=medium&amp;id=693cef62d977419e584a4fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14440-cwe-565-reliance-on-cookies-without-51904fb2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14440%3A%20CWE-565%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20jayarsiech%20JAY%20Login%20%26%20Register&amp;severity=critical&amp;id=693cef65d977419e584a508b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14508-cwe-862-missing-authorization-in-ya-055ddbcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14508%3A%20CWE-862%20Missing%20Authorization%20in%20yalogica%20MediaCommander%20%E2%80%93%20Bring%20Folders%20to%20Media%2C%20Posts%2C%20and%20Pages&amp;severity=medium&amp;id=693cef65d977419e584a50b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14539-cwe-94-improper-control-of-generati-78707cd6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14539%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rang501%20Shortcode%20Ajax&amp;severity=medium&amp;id=693cef65d977419e584a50b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8617-cwe-79-improper-neutralization-of-in-c82c23f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yithemes%20YITH%20WooCommerce%20Quick%20View&amp;severity=medium&amp;id=693cef67d977419e584a5273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14367-cwe-862-missing-authorization-in-co-5c81d537</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14367%3A%20CWE-862%20Missing%20Authorization%20in%20corsonr%20Easy%20Theme%20Options&amp;severity=medium&amp;id=693cef64d977419e584a5030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7058-cwe-79-improper-neutralization-of-in-47b06241</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Kingcabs&amp;severity=medium&amp;id=693cef67d977419e584a526e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12076-cwe-79-improper-neutralization-of-i-d77b7073</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20Social%20Media%20Auto%20Publish&amp;severity=medium&amp;id=693cef62d977419e584a4fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13093-cwe-862-missing-authorization-in-aj-d92aa8b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13093%3A%20CWE-862%20Missing%20Authorization%20in%20ajitdas%20Devs%20CRM%20%E2%80%93%20Manage%20tasks%2C%20attendance%20and%20teams%20all%20together&amp;severity=medium&amp;id=693cef64d977419e584a5014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13077-cwe-89-improper-neutralization-of-s-80e91189</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13077%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20payamito%20%D8%A7%D9%81%D8%B2%D9%88%D9%86%D9%87%20%D9%BE%DB%8C%D8%A7%D9%85%DA%A9%20%D9%88%D9%88%DA%A9%D8%A7%D9%85%D8%B1%D8%B3%20%D9%81%D9%88%D9%82%20%D8%AD%D8%B1%D9%81%D9%87%20%D8%A7%DB%8C%20(%D8%AC%D8%AF%DB%8C%D8%AF)%20payamito%20sms%20woocommerce&amp;severity=high&amp;id=693cef62d977419e584a4fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14451-cwe-601-url-redirection-to-untruste-3141468e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14451%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20solutionsbysteve%20Solutions%20Ad%20Manager&amp;severity=medium&amp;id=693cef65d977419e584a5099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9218-cwe-862-missing-authorization-in-rtc-0bf41431</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9218%3A%20CWE-862%20Missing%20Authorization%20in%20rtcamp%20rtMedia%20for%20WordPress%2C%20BuddyPress%20and%20bbPress&amp;severity=low&amp;id=693cef67d977419e584a5279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14288-cwe-862-missing-authorization-in-ga-b8cb4c68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14288%3A%20CWE-862%20Missing%20Authorization%20in%20gallerycreator%20Mixed%20Media%20Gallery%20Blocks&amp;severity=medium&amp;id=693cef64d977419e584a5021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13705-cwe-79-improper-neutralization-of-i-b90c4c4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blakelong%20Custom%20Frames&amp;severity=medium&amp;id=693cef64d977419e584a501c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14476-cwe-502-deserialization-of-untruste-dfa78ab0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14476%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20unitecms%20Doubly%20%E2%80%93%20Cross%20Domain%20Copy%20Paste%20for%20WordPress&amp;severity=high&amp;id=693cef65d977419e584a50ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14475-cwe-98-improper-control-of-filename-a5e88b36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14475%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nenad-obradovic%20Extensive%20VC%20Addons%20for%20WPBakery%20page%20builder&amp;severity=high&amp;id=693cef65d977419e584a50a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14462-cwe-352-cross-site-request-forgery--a80032df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14462%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20owais4377%20Lucky%20Draw%20Contests&amp;severity=medium&amp;id=693cef65d977419e584a509e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11376-cwe-79-improper-neutralization-of-i-6269575a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=693cef62d977419e584a4fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13094-cwe-434-unrestricted-upload-of-file-7b235ab5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13094%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wp3d%20WP3D%20Model%20Import%20Viewer&amp;severity=high&amp;id=693cef64d977419e584a5018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14447-cwe-862-missing-authorization-in-pc-67d8d364</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14447%3A%20CWE-862%20Missing%20Authorization%20in%20pcantoni%20AnnunciFunebri&amp;severity=medium&amp;id=693cef65d977419e584a5094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14397-cwe-862-missing-authorization-in-fr-88bbb22e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14397%3A%20CWE-862%20Missing%20Authorization%20in%20franciscopalacios%20Postem%20Ipsum&amp;severity=high&amp;id=693cef65d977419e584a5087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14378-cwe-79-improper-neutralization-of-i-15c9df4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeregion%20Quick%20Testimonials&amp;severity=medium&amp;id=693cef64d977419e584a5035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14366-cwe-862-missing-authorization-in-du-1c33d54d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14366%3A%20CWE-862%20Missing%20Authorization%20in%20dugudlabs%20Eyewear%20prescription%20form&amp;severity=medium&amp;id=693cef64d977419e584a502b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9873-cwe-79-improper-neutralization-of-in-22f15364</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20a3rev%20a3%20Lazy%20Load&amp;severity=medium&amp;id=693cef67d977419e584a5284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14395-cwe-862-missing-authorization-in-me-a0edaadc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14395%3A%20CWE-862%20Missing%20Authorization%20in%20melodicmedia%20Popover%20Windows&amp;severity=medium&amp;id=693cef64d977419e584a503d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11970-cwe-918-server-side-request-forgery-7913ba3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11970%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20emplibot%20Emplibot%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%2C%20Infographics%2C%20and%20Linking%20%7C%20SEO%20Optimized%20%7C%20Fully%20Automated&amp;severity=medium&amp;id=693cef62d977419e584a4fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14454-cwe-352-cross-site-request-forgery--82bb628a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14454%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Image%20Slider%20by%20Ays-%20Responsive%20Slider%20and%20Carousel&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14050-cwe-89-improper-neutralization-of-s-02d0e604</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14050%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20uxl%20Design%20Import%2FExport%20%E2%80%93%20Styles%2C%20Templates%2C%20Template%20Parts%20and%20Patterns&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13089-cwe-89-improper-neutralization-of-s-39a10248</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13089%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=high&amp;id=693ce0d37c4acd10e84d925b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14278-cwe-79-improper-neutralization-of-i-bd6716ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20HT%20Slider%20For%20Elementor&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14056-cwe-79-improper-neutralization-of-i-b168ccba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webdevstudios%20Custom%20Post%20Type%20UI&amp;severity=medium&amp;id=693ce0d37c4acd10e84d926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12512-cwe-200-exposure-of-sensitive-infor-d96935a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12512%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20edge22%20GenerateBlocks&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14581-cwe-862-missing-authorization-in-vi-a15f8241</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14581%3A%20CWE-862%20Missing%20Authorization%20in%20villatheme%20HAPPY%20%E2%80%93%20Helpdesk%20Support%20Ticket%20System&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14477-cwe-89-improper-neutralization-of-s-8ee7385d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aaron13100%20404%20Solution&amp;severity=medium&amp;id=693ce0d37c4acd10e84d927e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13403-cwe-862-missing-authorization-in-em-c55ad222</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13403%3A%20CWE-862%20Missing%20Authorization%20in%20emarket-design%20Employee%20Spotlight%20%E2%80%93%20Team%20Member%20Showcase%20%26%20Meet%20the%20Team%20Plugin&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-microsoft-teams-and-google-meet-downloads-spr-8cacf627</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Microsoft%20Teams%20and%20Google%20Meet%20Downloads%20Spread%20Oyster%20Backdoor&amp;severity=medium&amp;id=693cb109b3e344112f52a0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-13-1948210f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-13&amp;severity=medium&amp;id=693e00181ee4c1247d8579ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brickstorm-backdoor-mar-251165c1v1-e9af8144</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BRICKSTORM%20Backdoor%20%20-%20MAR-251165.c1.v1&amp;severity=medium&amp;id=693d8f0cda1dfeffd83d742d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14585-sql-injection-in-itsourcecode-covid-8fc482c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14585%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693c99885292e65bc6167f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14584-sql-injection-in-itsourcecode-covid-3581ea2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14584%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693c99885292e65bc6167f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67721-cwe-201-insertion-of-sensitive-info-9e76d5da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67721%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20airlift%20aircompressor&amp;severity=medium&amp;id=693c99885292e65bc6167f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14583-unrestricted-upload-in-campcodes-on-61c8170c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14583%3A%20Unrestricted%20Upload%20in%20campcodes%20Online%20Student%20Enrollment%20System&amp;severity=medium&amp;id=693c958a5292e65bc6123153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14582-unrestricted-upload-in-campcodes-on-49946dba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14582%3A%20Unrestricted%20Upload%20in%20campcodes%20Online%20Student%20Enrollment%20System&amp;severity=medium&amp;id=693c958a5292e65bc612314c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14611-vulnerability-in-gladinet-centresta-e4cb3dcd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14611%3A%20Vulnerability%20in%20Gladinet%20CentreStack%20and%20TrioFox&amp;severity=high&amp;id=693c8579f55ccbd2c799d2b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43518-an-app-may-be-able-to-inappropriate-07489bb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43518%3A%20An%20app%20may%20be%20able%20to%20inappropriately%20access%20files%20through%20the%20spellcheck%20API%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43522-an-app-may-be-able-to-access-user-s-76060859</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43522%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43467-an-app-may-be-able-to-gain-root-pri-aa5ce0fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43467%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857bf55ccbd2c799d327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43471-an-app-may-be-able-to-access-sensit-baf40b9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43471%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d32d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43406-an-app-may-be-able-to-access-sensit-42ecb5ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43406%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43410-an-attacker-with-physical-access-ma-7a4c5b43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43410%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20view%20deleted%20notes%20in%20Apple%20macOS&amp;severity=low&amp;id=693c8579f55ccbd2c799d2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43538-an-app-may-be-able-to-access-sensit-82249638</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43538%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c8581f55ccbd2c799d97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43539-processing-a-file-may-lead-to-memor-3167418b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43539%3A%20Processing%20a%20file%20may%20lead%20to%20memory%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c8581f55ccbd2c799d97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43542-password-fields-may-be-unintentiona-f3880dc9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43542%3A%20Password%20fields%20may%20be%20unintentionally%20revealed%20when%20remotely%20controlling%20a%20device%20over%20FaceTime%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c8581f55ccbd2c799d982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43470-a-standard-user-may-be-able-to-view-25e5cebd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43470%3A%20A%20standard%20user%20may%20be%20able%20to%20view%20files%20made%20from%20a%20disk%20image%20belonging%20to%20an%20administrator%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43523-an-app-may-be-able-to-access-sensit-d3d5352c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43523%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43466-an-app-may-be-able-to-access-sensit-d3f98a04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43466%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43519-an-app-may-be-able-to-access-sensit-282ddde6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43519%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857ff55ccbd2c799d3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43512-an-app-may-be-able-to-elevate-privi-db51bec9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43512%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c857df55ccbd2c799d383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43416-an-app-may-be-able-to-access-protec-b51956c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43416%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=693c857bf55ccbd2c799d30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43482-an-app-may-be-able-to-cause-a-denia-b790be61</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43482%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46287-an-attacker-may-be-able-to-spoof-th-d3989ce5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46287%3A%20An%20attacker%20may%20be%20able%20to%20spoof%20their%20FaceTime%20caller%20ID%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=693c8581f55ccbd2c799d98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43494-an-attacker-may-be-able-to-cause-a--b39d8ca2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43494%3A%20An%20attacker%20may%20be%20able%20to%20cause%20a%20persistent%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c857df55ccbd2c799d363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43461-an-app-may-be-able-to-access-protec-c971b4cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43461%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43532-processing-malicious-data-may-lead--33a20304</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43532%3A%20Processing%20malicious%20data%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c8581f55ccbd2c799d977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43437-an-app-may-be-able-to-fingerprint-t-2df07c4a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43437%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c857bf55ccbd2c799d313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43509-an-app-may-be-able-to-access-sensit-d388ee1f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43509%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43381-a-malicious-app-may-be-able-to-dele-c823cfa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43381%3A%20A%20malicious%20app%20may%20be%20able%20to%20delete%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43513-an-app-may-be-able-to-read-sensitiv-39e79f0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43513%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46285-an-app-may-be-able-to-gain-root-pri-a88a0e43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46285%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c8581f55ccbd2c799d989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43506-icloud-private-relay-may-not-activa-48e060af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43506%3A%20iCloud%20Private%20Relay%20may%20not%20activate%20when%20more%20than%20one%20user%20is%20logged%20in%20at%20the%20same%20time%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857df55ccbd2c799d36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43510-a-malicious-application-may-cause-u-bad5be46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43510%3A%20A%20malicious%20application%20may%20cause%20unexpected%20changes%20in%20memory%20shared%20between%20processes%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c857df55ccbd2c799d376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43402-an-app-may-be-able-to-cause-unexpec-9ddec6d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43402%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=693c8579f55ccbd2c799d2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43530-an-app-may-be-able-to-access-sensit-087d9b6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43530%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46289-an-app-may-be-able-to-access-protec-48947548</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46289%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8581f55ccbd2c799d991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43463-an-app-may-be-able-to-access-sensit-5be9bf76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43463%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43320-an-app-may-be-able-to-bypass-launch-e0fcbed2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43320%3A%20An%20app%20may%20be%20able%20to%20bypass%20launch%20constraint%20protections%20and%20execute%20malicious%20code%20with%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=693c8579f55ccbd2c799d2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43527-an-app-may-be-able-to-gain-root-pri-5d4f8a40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43527%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857ff55ccbd2c799d3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43511-processing-maliciously-crafted-web--866beccc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43511%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=693c857df55ccbd2c799d380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43497-an-app-may-be-able-to-break-out-of--abb90150</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43497%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43473-an-app-may-be-able-to-access-sensit-99d654fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43473%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46276-an-app-may-be-able-to-access-sensit-f9ee6c74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46276%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c8581f55ccbd2c799d985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43465-an-app-may-be-able-to-access-sensit-10171174</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43465%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857bf55ccbd2c799d321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43520-a-malicious-application-may-be-able-9c96a0e0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43520%3A%20A%20malicious%20application%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43388-an-app-may-be-able-to-access-sensit-3a7dd7fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43388%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c8579f55ccbd2c799d2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43351-an-app-may-be-able-to-access-protec-655c9795</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43351%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43516-a-user-with-voice-control-enabled-m-29f8339a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43516%3A%20A%20user%20with%20Voice%20Control%20enabled%20may%20be%20able%20to%20transcribe%20another%20user&apos;s%20activity%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43404-an-app-may-be-able-to-access-sensit-ecdaa94e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43404%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c8579f55ccbd2c799d2cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43393-an-app-may-be-able-to-break-out-of--4c1b39dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43393%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43517-an-app-may-be-able-to-access-protec-edd90752</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43517%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43464-visiting-a-website-may-lead-to-an-a-c1bce520</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43464%3A%20Visiting%20a%20website%20may%20lead%20to%20an%20app%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43521-an-app-may-be-able-to-access-sensit-6943692b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43521%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11266-cwe-787-out-of-bounds-write-in-gras-98e3097f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11266%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Grassroots%20DICOM%20(GDCM)&amp;severity=medium&amp;id=693c821af55ccbd2c7950af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67634-cwe-79-improper-neutralization-of-i-3368d246</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67634%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CISA%20Software%20Acquisition%20Guide%20Tool&amp;severity=medium&amp;id=693c7e77f55ccbd2c792b9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14580-cross-site-scripting-in-qualitor-86c5b4e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14580%3A%20Cross%20Site%20Scripting%20in%20Qualitor&amp;severity=medium&amp;id=693c7e77f55ccbd2c792b9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58316-cwe-89-improper-neutralization-of-s-75b8a88f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58316%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PuneethReddyHC%20online-shopping-system-advanced&amp;severity=high&amp;id=693c7a77b31a4aba68228b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67750-cwe-94-improper-control-of-generati-d91bc995</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67750%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Flow-Scanner%20lightning-flow-scanner&amp;severity=high&amp;id=693c7a77b31a4aba68228b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14578-sql-injection-in-itsourcecode-stude-5f624a28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14578%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693c7642a3f11564d0d3b87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58314-cwe-78-improper-neutralization-of-s-7a6e1d4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58314%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ATCOM%20Technology%20co.%2C%20LTD.%20100M%20IP%20Phones&amp;severity=high&amp;id=693c7642a3f11564d0d3b893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58311-cwe-1245-improper-finite-state-mach-32a65046</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58311%3A%20CWE-1245%3A%20Improper%20Finite%20State%20Machines%20(FSMs)%20in%20Hardware%20Logic%20in%20dormakaba%20Dormakaba%20Saflok%20System%206000&amp;severity=high&amp;id=693c7642a3f11564d0d3b88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58299-cwe-121-stack-based-buffer-overflow-7ee849d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58299%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=critical&amp;id=693c7642a3f11564d0d3b889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14010-cwe-78-improper-neutralization-of-s-7831f1ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14010%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Typora&amp;severity=high&amp;id=693c7642a3f11564d0d3b884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67734-cwe-79-improper-neutralization-of-i-dfd406fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67734%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=693c72e1a3f11564d0cebd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-one-battle-after-another-torrent-hides-malwar-f0f7ea32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20%E2%80%98One%20Battle%20After%20Another%E2%80%99%20torrent%20hides%20malware%20in%20subtitles&amp;severity=high&amp;id=693c72b9a3f11564d0cea0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-data-breach-traced-to-ex-employee-who-reta-107f9445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20data%20breach%20traced%20to%20ex-employee%20who%20retained%20system%20access&amp;severity=high&amp;id=693c72b9a3f11564d0cea0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14572-memory-corruption-in-utt-512w-2fa95b9d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14572%3A%20Memory%20Corruption%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=693c72e1a3f11564d0cebd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8083-cwe-1321-improperly-controlled-modif-c5e30987</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8083%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20Vuetify&amp;severity=high&amp;id=693c6f38a3f11564d0ccbef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14373-inappropriate-implementation-in-goo-aedcf9d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14373%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=693c6bdfa3f11564d0c8e407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14372-use-after-free-in-google-chrome-f5bfb1f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14372%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=693c6bdfa3f11564d0c8e403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14174-out-of-bounds-memory-access-in-goog-689e7b53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14174%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=693c6bdfa3f11564d0c8e3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-osint-and-gpt-utility-github-repos-spread-pys-a03b1168</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20OSINT%20and%20GPT%20Utility%20GitHub%20Repos%20Spread%20PyStoreRAT%20Malware%20Payloads&amp;severity=medium&amp;id=693c6b3f53767fe238bb232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8082-cwe-79-improper-neutralization-of-in-1fc08562</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vuetify&amp;severity=medium&amp;id=693c630553767fe238afb27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14571-sql-injection-in-projectworlds-adva-bd7d9afd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14571%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=693c630553767fe238afb276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14570-sql-injection-in-projectworlds-adva-fff9f021</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14570%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=693c630553767fe238afb270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pystorerat-malware-targets-osint-researchers-t-b46e50dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20PyStoreRAT%20Malware%20Targets%20OSINT%20Researchers%20Through%20GitHub%20Repos&amp;severity=medium&amp;id=693c592876ef5759461a92bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14569-use-after-free-in-ggml-org-whisperc-f57ef2ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14569%3A%20Use%20After%20Free%20in%20ggml-org%20whisper.cpp&amp;severity=medium&amp;id=693c5c0653767fe238a8342f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14568-sql-injection-in-haxxorsid-stock-ma-598e5b10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14568%3A%20SQL%20Injection%20in%20haxxorsid%20Stock-Management-System&amp;severity=medium&amp;id=693c5c0653767fe238a83428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14567-missing-authentication-in-haxxorsid-a179e138</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14567%3A%20Missing%20Authentication%20in%20haxxorsid%20Stock-Management-System&amp;severity=medium&amp;id=693c404ddc37602712b89673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13733-cwe-732-incorrect-permission-assign-b1c014be</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13733%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dr.Buho%20BuhoNTFS&amp;severity=high&amp;id=693c3cd3dc37602712b2e436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-promptpwnd-attack-small-macos-bounti-2b649030</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20PromptPwnd%20Attack%2C%20macOS%20Bounty%20Complaints%2C%20Chinese%20Hackers%20Trained%20in%20Cisco%20Academy&amp;severity=medium&amp;id=693c393adc37602712b0a19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14566-sql-injection-in-kidaze-courseselec-e5357e67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14566%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=693c45b972d8eb03a613ec58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14565-sql-injection-in-kidaze-courseselec-21484611</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14565%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=693c45b972d8eb03a613ec52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53960-cwe-1240-use-of-a-cryptographic-pri-48981d7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53960%3A%20CWE-1240%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=medium&amp;id=693c347d2e981ee9614b5b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54947-cwe-321-use-of-hard-coded-cryptogra-9ac5d2b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54947%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=medium&amp;id=693c347f2e981ee9614b5c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54981-cwe-327-use-of-a-broken-or-risky-cr-f8d9d0af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54981%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=high&amp;id=693c347f2e981ee9614b5c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36746-cwe-79-improper-neutralization-of-i-99a76f94</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SolarEdge%20SolarEdge%20Monitoring%20platform%20(SaaS)&amp;severity=medium&amp;id=693c347d2e981ee9614b5bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36743-cwe1191-onchip-debug-and-test-inter-fda56fb3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36743%3A%20CWE%E2%80%911191%20%E2%80%94%20On%E2%80%91Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20SolarEdge%20SE3680H&amp;severity=high&amp;id=693c347d2e981ee9614b5bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36744-cwe-1295-debug-messages-revealing-u-66f4b80e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36744%3A%20CWE-1295%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20SolarEdge%20SE3680H&amp;severity=low&amp;id=693c347d2e981ee9614b5bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36745-cwe-1104-use-of-unmaintained-third--0f29a977</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36745%3A%20CWE-1104%20%E2%80%94%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20SolarEdge%20SE3680H&amp;severity=high&amp;id=693c347d2e981ee9614b5bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58770-cwe-280-improper-handling-of-insuff-43ffced4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58770%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20AMI%20AptioV&amp;severity=high&amp;id=693c302e2e981ee96144cd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36755-cwe-1244-internal-asset-exposed-to--74976005</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36755%3A%20CWE-1244%3A%20Internal%20Asset%20Exposed%20to%20Unsafe%20Debug%20Access%20Level%20or%20State%20in%20CleverDisplay%20B.V.%20BlueOne%20(CleverDisplay%20Hardware%20Player)&amp;severity=low&amp;id=693c302e2e981ee96144cd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-advanced-phishing-kits-use-ai-and-mfa-bypass-t-294d398c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Advanced%20Phishing%20Kits%20Use%20AI%20and%20MFA%20Bypass%20Tactics%20to%20Steal%20Credentials%20at%20Scale&amp;severity=medium&amp;id=693c23bffd2a1aad42520e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gladinet-centrestack-flaw-exploited-to-hack-organi-73ae464e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gladinet%20CentreStack%20Flaw%20Exploited%20to%20Hack%20Organizations&amp;severity=medium&amp;id=693c203ffd2a1aad424d3905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fieldtex-data-breach-impacts-238000-7640327b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fieldtex%20Data%20Breach%20Impacts%20238%2C000&amp;severity=medium&amp;id=693c1506b9e9371f90075e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/where-does-the-data-stolen-in-a-phishing-attack-go-f57e008a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Where%20does%20the%20data%20stolen%20in%20a%20phishing%20attack%20go%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=693c14b1b9e9371f9007430e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-windows-rasman-zero-day-flaw-gets-free-unoffic-9792c89b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Windows%20RasMan%20zero-day%20flaw%20gets%20free%2C%20unofficial%20patches&amp;severity=critical&amp;id=693c148fb9e9371f90071098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13506-cwe-250-execution-with-unnecessary--4054c5c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13506%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Nebim%20Neyir%20Computer%20Industry%20and%20Services%20Inc.%20Nebim%20V3%20ERP&amp;severity=high&amp;id=693c0957b9e9371f90f9bcb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-geoserver-vulnerability-exploited-in-attack-25287504</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20GeoServer%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=medium&amp;id=693c093cb9e9371f90f9a4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-releases-2025-list-of-top-25-most-dangerous--d14b241d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Releases%202025%20List%20of%20Top%2025%20Most%20Dangerous%20Software%20Vulnerabilities&amp;severity=low&amp;id=693c05102d1261d38d8c737b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploitation-escalates-into-large-scal-f0372734</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploitation%20Escalates%20into%20Large-Scale%20Global%20Attacks%2C%20Forcing%20Emergency%20Mitigation&amp;severity=critical&amp;id=693c03992d1261d38d8b6064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-shares-2025s-top-25-most-dangerous-software--954768c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20shares%202025&apos;s%20top%2025%20most%20dangerous%20software%20weaknesses&amp;severity=high&amp;id=693c03992d1261d38d8b606c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-react-rsc-vulnerabilities-enable-dos-and-sourc-437727c0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20React%20RSC%20Vulnerabilities%20Enable%20DoS%20and%20Source%20Code%20Exposure&amp;severity=high&amp;id=693c03992d1261d38d8b6068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-orders-feds-to-patch-actively-exploited-geose-093e92e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20orders%20feds%20to%20patch%20actively%20exploited%20Geoserver%20flaw&amp;severity=high&amp;id=693c03992d1261d38d8b6060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14030-cwe-79-improper-neutralization-of-i-be5b344c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14030%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20soportecibeles%20AI%20Feeds&amp;severity=medium&amp;id=693bfc942d1261d38d80bda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12407-cwe-352-cross-site-request-forgery--aef49e26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12407%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=693bfc942d1261d38d80bd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12408-cwe-200-exposure-of-sensitive-infor-6551acb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12408%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=693bfc942d1261d38d80bd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12965-cwe-79-improper-neutralization-of-i-ea6b2227</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12965%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nalam-1%20Magical%20Posts%20Display%20%E2%80%93%20Elementor%20Advanced%20Posts%20widgets&amp;severity=medium&amp;id=693bfc942d1261d38d80bd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14159-cwe-352-cross-site-request-forgery--8174a78b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14159%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=693bfc942d1261d38d80bdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14442-cwe-552-files-or-directories-access-c509e64d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14442%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=693bfc942d1261d38d80bdb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14065-cwe-862-missing-authorization-in-ro-637ebb6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14065%3A%20CWE-862%20Missing%20Authorization%20in%20rodolforizzo76%20Simple%20Bike%20Rental&amp;severity=medium&amp;id=693bfc942d1261d38d80bda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-bug-bounty-program-expanded-to-third-par-e131d1b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Bug%20Bounty%20Program%20Expanded%20to%20Third-Party%20Code&amp;severity=critical&amp;id=693bf9052d1261d38d7e8caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-patches-updater-flaw-after-reports-of-traf-c29f0eef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Patches%20Updater%20Flaw%20After%20Reports%20of%20Traffic%20Hijacking&amp;severity=medium&amp;id=693bf53ee96055a68ba4f468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12835-cwe-22-improper-limitation-of-a-pat-476f2329</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12835%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WooMulti&amp;severity=high&amp;id=693beffae96055a68b9f7a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-genai-in-the-browser-policy-isolation-and-9a646a75</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20GenAI%20in%20the%20Browser%3A%20Policy%2C%20Isolation%2C%20and%20Data%20Controls%20That%20Actually%20Work&amp;severity=medium&amp;id=693bf4c0e96055a68ba4d1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12841-cwe-862-missing-authorization-in-bo-8c1282c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12841%3A%20CWE-862%20Missing%20Authorization%20in%20Bookit&amp;severity=medium&amp;id=693beffae96055a68b9f7a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rto-challan-fraud-a-technical-report-on-apk-based--b19c1d20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RTO%20Challan%20Fraud%3A%20A%20Technical%20Report%20on%20APK-Based%20Financial%20and%20Identity%20Theft&amp;severity=medium&amp;id=693c104eb9e9371f90018228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26866-cwe-502-deserialization-of-untruste-6c3628b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26866%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20HugeGraph-Server&amp;severity=high&amp;id=693be422406b3dd4e02223e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58137-cwe-639-authorization-bypass-throug-4c06f0de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58137%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Apache%20Software%20Foundation%20Apache%20Fineract&amp;severity=high&amp;id=693be422406b3dd4e02223e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12348-cwe-306-missing-authentication-for--76fba38b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12348%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20icegram%20Email%20Subscribers%20%26%20Newsletters%20%E2%80%93%20Email%20Marketing%2C%20Post%20Notifications%20%26%20Newsletter%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=693be422406b3dd4e02223ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13993-cwe-79-improper-neutralization-of-i-7de801d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailerlite%20MailerLite%20%E2%80%93%20Signup%20forms%20(official)&amp;severity=medium&amp;id=693be422406b3dd4e02223d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14074-cwe-862-missing-authorization-in-ad-126b6e61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14074%3A%20CWE-862%20Missing%20Authorization%20in%20addonsorg%20PDF%20for%20Contact%20Form%207%20%2B%20Drag%20and%20Drop%20Template%20Builder&amp;severity=medium&amp;id=693be422406b3dd4e02223d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58130-cwe-522-insufficiently-protected-cr-6279900a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58130%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Apache%20Software%20Foundation%20Apache%20Fineract&amp;severity=critical&amp;id=693be422406b3dd4e02223e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23408-cwe-521-weak-password-requirements--0eac94fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23408%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Apache%20Software%20Foundation%20Apache%20Fineract&amp;severity=high&amp;id=693be422406b3dd4e02223de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-react-rsc-vulnerabilities-enable-dos-and-sourc-5809e665</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20React%20RSC%20Vulnerabilities%20Enable%20DoS%20and%20Source%20Code%20Exposure&amp;severity=critical&amp;id=693be412406b3dd4e0220011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-the-blackforce-phishing-kit-a95b6a4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20the%20BlackForce%20Phishing%20Kit&amp;severity=medium&amp;id=693c14a1b9e9371f90071a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-moneymount-iso-deploying-phantom-stealer-3ba40aea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20MoneyMount%2C%20ISO%20Deploying%20Phantom%20Stealer&amp;severity=medium&amp;id=693c14a1b9e9371f900719fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploitation-escalates-into-large-scal-824b0580</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploitation%20Escalates%20into%20Large-Scale%20Global%20Attacks%2C%20Forcing%20Emergency%20Mitigation&amp;severity=critical&amp;id=693be412406b3dd4e0220014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40829-cwe-908-use-of-uninitialized-resour-f06185d8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40829%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=693be422406b3dd4e02223eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12960-cwe-22-improper-limitation-of-a-pat-ba77376c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12960%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iworks%20Simple%20CSV%20Table&amp;severity=medium&amp;id=693bd715406b3dd4e013825b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/320000-paid-out-at-zerodaycloud-for-open-source-so-f457dce5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%24320%2C000%20Paid%20Out%20at%20Zeroday.Cloud%20for%20Open%20Source%20Software%20Exploits&amp;severity=medium&amp;id=693bc7515f3fdafda4341007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67731-cwe-400-uncontrolled-resource-consu-02a51622</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67731%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Aarondoran%20servify-express&amp;severity=high&amp;id=693bcae15f3fdafda43757dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67730-cwe-79-improper-neutralization-of-i-1496ff0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67730%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14169-cwe-89-improper-neutralization-of-s-4a2d287b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14169%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20amans2k%20FunnelKit%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20Checkout&amp;severity=high&amp;id=693bc3e35f3fdafda42e6cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10583-cwe-862-missing-authorization-in-em-c0f4b2af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10583%3A%20CWE-862%20Missing%20Authorization%20in%20emrevona%20WP%20Fastest%20Cache%20Premium&amp;severity=low&amp;id=693bc3e35f3fdafda42e6cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13891-cwe-22-improper-limitation-of-a-pat-d8ebe694</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13891%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14049-cwe-79-improper-neutralization-of-i-761c3487</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14049%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRentItems%20Flexible%20Rental%20Management%20System&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4970-cwe-79-improper-neutralization-of-in-cb5bb5ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4970%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bannersky%20BSK%20PDF%20Manager&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11876-cwe-79-improper-neutralization-of-i-2bd7342f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jbrinley%20Mailgun%20Subscriptions&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67728-cwe-77-improper-neutralization-of-s-a1dfe2f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67728%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=critical&amp;id=693bc168e6d9263eb359d8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67727-cwe-94-improper-control-of-generati-b7d52253</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67727%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=693bbde4e6d9263eb3549393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12655-cwe-862-missing-authorization-in-hi-d4865ad5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12655%3A%20CWE-862%20Missing%20Authorization%20in%20hippooo%20Hippoo%20Mobile%20App%20for%20WooCommerce&amp;severity=medium&amp;id=693bbde4e6d9263eb3549376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14068-cwe-89-improper-neutralization-of-s-c3380dc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14068%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20qdonow%20WPNakama%20%E2%80%93%20Team%20and%20multi-Client%20Collaboration%2C%20Editorial%20and%20Project%20Management&amp;severity=high&amp;id=693bbde4e6d9263eb3549382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14356-cwe-639-authorization-bypass-throug-79d0807a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14356%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themefic%20Ultra%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=693bbde4e6d9263eb354938b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12570-cwe-79-improper-neutralization-of-i-692aab01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12570%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=high&amp;id=693bbde4e6d9263eb3549372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13660-cwe-200-exposure-of-sensitive-infor-64ba535c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13660%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20rcatheme%20Guest%20Support&amp;severity=medium&amp;id=693bbde4e6d9263eb354937c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67726-cwe-834-excessive-iteration-in-torn-d8384ca3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67726%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=693bc3e35f3fdafda42e6cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10684-cwe-287-improper-authentication-in--a6a3ae6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10684%3A%20CWE-287%20Improper%20Authentication%20in%20Construction%20Light&amp;severity=medium&amp;id=693bb1545785fd87b5fd1ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67725-cwe-400-uncontrolled-resource-consu-0eec4b4c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67725%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=693badd05785fd87b5f80b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67724-cwe-79-improper-neutralization-of-i-fa04bcb6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67724%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tornadoweb%20tornado&amp;severity=medium&amp;id=693badd05785fd87b5f80b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67508-cwe-77-improper-neutralization-of-s-1176e27d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67508%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20gardener%20gardenctl-v2&amp;severity=high&amp;id=693baa4c5785fd87b5e9ed61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-dlls-entrypoint-for-the-fun-fri-dec-12th-b3d5725a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20DLLs%20EntryPoint%20for%20the%20Fun%2C%20(Fri%2C%20Dec%2012th)&amp;severity=medium&amp;id=693ba6bb5785fd87b5e7d019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64781-initialization-of-a-resource-with-a-d249a40d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64781%3A%20Initialization%20of%20a%20resource%20with%20an%20insecure%20default%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62192-improper-neutralization-of-special--c1c210ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62192%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58576-cross-site-request-forgery-csrf-in--7d19f4be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58576%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61987-missing-origin-validation-in-websoc-0b285ee6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61987%3A%20Missing%20origin%20validation%20in%20WebSockets%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347333f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61950-authorization-bypass-through-user-c-8967ae86</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61950%3A%20Authorization%20bypass%20through%20user-controlled%20key%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347333b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65120-cross-site-scripting-xss-in-japan-t-76d34d29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65120%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347334b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57883-cross-site-scripting-xss-in-japan-t-75770a32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57883%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66284-cross-site-scripting-xss-in-japan-t-2b2ce0a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66284%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53523-cross-site-scripting-xss-in-japan-t-595b3b46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53523%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347332a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54407-cross-site-scripting-xss-in-japan-t-143ab61e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54407%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347332e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-actively-exploited-geoserver-xxe-flaw-i-68ecd68d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Actively%20Exploited%20GeoServer%20XXE%20Flaw%20in%20Updated%20KEV%20Catalog&amp;severity=high&amp;id=693bb2fb5785fd87b5fe5343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-fines-lastpass-over-2022-data-breach-impacting--f8babf64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20fines%20LastPass%20over%202022%20data%20breach%20impacting%201.6%20million%20users&amp;severity=high&amp;id=693b96d58624ffdf9f6d3250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-fixes-flaw-that-let-attackers-push-malicio-05e5b9b8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20fixes%20flaw%20that%20let%20attackers%20push%20malicious%20update%20files&amp;severity=high&amp;id=693b96d58624ffdf9f6d3258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-gladinet-centrestack-cryptographic-0ee91230</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%20Gladinet%20CentreStack%20cryptographic%20flaw%20in%20RCE%20attacks&amp;severity=high&amp;id=693b96d58624ffdf9f6d3254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14138-cwe-79-improper-neutralization-of-i-ec61bd66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14138%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpletsgo%20WPLG%20Default%20Mail%20From&amp;severity=medium&amp;id=693b9189650da22753edbda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13975-cwe-79-improper-neutralization-of-i-c693a115</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13975%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20izuchy%20Contact%20Form%207%20with%20ChatWork&amp;severity=medium&amp;id=693b9187650da22753edbd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13843-cwe-79-improper-neutralization-of-i-2686031f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13843%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20susantabeura%20VigLink%20SpotLight%20By%20ShortCode&amp;severity=medium&amp;id=693b9183650da22753edbb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14391-cwe-352-cross-site-request-forgery--651d09b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14391%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20darendev%20Simple%20Theme%20Changer&amp;severity=medium&amp;id=693b918d650da22753edbee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13366-cwe-352-cross-site-request-forgery--c5410d2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13366%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frapesce%20Rabbit%20Hole&amp;severity=medium&amp;id=693b9183650da22753edbb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13747-cwe-79-improper-neutralization-of-i-725044a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ice00%20NewStatPress&amp;severity=medium&amp;id=693b9183650da22753edbb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13850-cwe-79-improper-neutralization-of-i-ccef74de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13850%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ladislavsoukupgmailcom%20LS%20Google%20Map%20Router&amp;severity=medium&amp;id=693b9183650da22753edbb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14137-cwe-79-improper-neutralization-of-i-1fde2ba6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14137%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexdtn%20Simple%20AL%20Slider&amp;severity=medium&amp;id=693b9189650da22753edbda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12650-cwe-79-improper-neutralization-of-i-02f38bac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sgcoskey%20Simple%20post%20listing&amp;severity=medium&amp;id=693b9182650da22753edbad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12834-cwe-79-improper-neutralization-of-i-563a19f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zealopensource%20Accept%20Stripe%20Payments%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=693b9182650da22753edbae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13334-cwe-862-missing-authorization-in-bl-990573e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13334%3A%20CWE-862%20Missing%20Authorization%20in%20blazethemes%20Blaze%20Demo%20Importer&amp;severity=high&amp;id=693b9183650da22753edbb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12830-cwe-79-improper-neutralization-of-i-c9b89ad5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdive%20Better%20Addons%20for%20Elementor&amp;severity=medium&amp;id=693b9182650da22753edbae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14160-cwe-352-cross-site-request-forgery--bf35eba0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14160%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20justdave%20Upcoming%20for%20Calendly&amp;severity=medium&amp;id=693b918b650da22753edbe28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13963-cwe-79-improper-neutralization-of-i-d94e1fd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falselight%20FX%20Currency%20Converter&amp;severity=medium&amp;id=693b9185650da22753edbcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13962-cwe-79-improper-neutralization-of-i-087bee1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13962%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20klemmkeil%20Divelogs%20Widget&amp;severity=medium&amp;id=693b9185650da22753edbcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13987-cwe-352-cross-site-request-forgery--da60f628</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13987%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codnloc%20Purchase%20and%20Expense%20Manager&amp;severity=medium&amp;id=693b9187650da22753edbd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13314-cwe-862-missing-authorization-in-ma-7fa9ef25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13314%3A%20CWE-862%20Missing%20Authorization%20in%20markutos987%20Filter%20Plus%20%E2%80%93%20Product%20Filter%20%26%20WordPress%20Filter&amp;severity=medium&amp;id=693b9182650da22753edbaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13885-cwe-79-improper-neutralization-of-i-b73e4df9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imran3229%20Zenost%20Shortcodes&amp;severity=medium&amp;id=693b9185650da22753edbcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14062-cwe-352-cross-site-request-forgery--063ebd73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14062%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tekafran%20Animated%20Pixel%20Marquee%20Creator&amp;severity=medium&amp;id=693b9189650da22753edbd7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12963-cwe-862-missing-authorization-in-la-b7f1f84a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12963%3A%20CWE-862%20Missing%20Authorization%20in%20lazycoders%20LazyTasks%20%E2%80%93%20Project%20%26%20Task%20Management%20with%20Collaboration%2C%20Kanban%20and%20Gantt%20Chart&amp;severity=critical&amp;id=693b9182650da22753edbaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14132-cwe-79-improper-neutralization-of-i-ab50fa19</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pandikamal03%20Category%20Dropdown%20List&amp;severity=medium&amp;id=693b9189650da22753edbd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13971-cwe-79-improper-neutralization-of-i-af82166b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13971%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thewellnessway%20TWW%20Protein%20Calculator&amp;severity=medium&amp;id=693b9187650da22753edbd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13906-cwe-79-improper-neutralization-of-i-6be4ffdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13906%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ysh%20WP%20Flot&amp;severity=medium&amp;id=693b9185650da22753edbce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13988-cwe-79-improper-neutralization-of-i-ce7dc585</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=693b9187650da22753edbd48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13966-cwe-79-improper-neutralization-of-i-4ca0107e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonlamtn200%20Paypal%20Payment%20Shortcode&amp;severity=medium&amp;id=693b9187650da22753edbd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13961-cwe-79-improper-neutralization-of-i-efc0c043</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13961%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20subhransu-sekhar%20Data%20Visualizer&amp;severity=medium&amp;id=693b9185650da22753edbced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13884-cwe-79-improper-neutralization-of-i-9564ef9c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20buntegiraffe%20Hide%20Email%20Address&amp;severity=medium&amp;id=693b9185650da22753edbccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14035-cwe-79-improper-neutralization-of-i-af4e7124</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14035%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremybmerrill%20DebateMaster&amp;severity=medium&amp;id=693b9187650da22753edbd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13840-cwe-79-improper-neutralization-of-i-b6e4c93f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13840%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobvanoorschot%20Bukazu%20Search%20Widget&amp;severity=medium&amp;id=693b9183650da22753edbb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13960-cwe-79-improper-neutralization-of-i-4d19a4d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidkeen%20GPXpress&amp;severity=medium&amp;id=693b9185650da22753edbce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13320-cwe-73-external-control-of-file-nam-d9d80c6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13320%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpusermanager%20WP%20User%20Manager%20%E2%80%93%20User%20Profile%20Builder%20%26%20Membership&amp;severity=medium&amp;id=693b9182650da22753edbafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13440-cwe-862-missing-authorization-in-pr-ed7a5975</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13440%3A%20CWE-862%20Missing%20Authorization%20in%20premmerce%20Premmerce%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=693b9183650da22753edbb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14392-cwe-862-missing-authorization-in-da-4b669c19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14392%3A%20CWE-862%20Missing%20Authorization%20in%20darendev%20Simple%20Theme%20Changer&amp;severity=medium&amp;id=693b918d650da22753edbeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14032-cwe-79-improper-neutralization-of-i-6f3f032a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Timeline%20Lite&amp;severity=medium&amp;id=693b9187650da22753edbd54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13969-cwe-79-improper-neutralization-of-i-1ce0c56d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13969%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eurisko%20Reviews%20Sorted&amp;severity=medium&amp;id=693b9187650da22753edbd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14161-cwe-352-cross-site-request-forgery--ec9f279b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14161%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20truefy%20Truefy%20Embed&amp;severity=medium&amp;id=693b918b650da22753edbe2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14354-cwe-352-cross-site-request-forgery--d3eb44f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14354%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20doubledome%20Resource%20Library%20for%20Logged%20In%20Users&amp;severity=medium&amp;id=693b918b650da22753edbe51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14165-cwe-352-cross-site-request-forgery--aaa6f8dc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14165%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20developerke%20Kirim.Email%20WooCommerce%20Integration&amp;severity=medium&amp;id=693b918b650da22753edbe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13846-cwe-79-improper-neutralization-of-i-2f30df6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13846%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qrevo%20Easy%20Map%20Creator&amp;severity=medium&amp;id=693b9183650da22753edbb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13363-cwe-352-cross-site-request-forgery--9374c5ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13363%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imaqpress%20IMAQ%20CORE&amp;severity=medium&amp;id=693b9183650da22753edbb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12783-cwe-862-missing-authorization-in-pr-0d7b5bff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12783%3A%20CWE-862%20Missing%20Authorization%20in%20premmerce%20Premmerce%20Brands%20for%20WooCommerce&amp;severity=medium&amp;id=693b9182650da22753edbad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14044-cwe-502-deserialization-of-untruste-5184c6b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14044%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20rodgerholl%20Visitor%20Logic%20Lite&amp;severity=high&amp;id=693b9187650da22753edbd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14166-cwe-94-improper-control-of-generati-b0b6b56e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14166%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ludwigyou%20WPMasterToolKit%20(WPMTK)%20%E2%80%93%20All%20in%20one%20plugin&amp;severity=medium&amp;id=693b918b650da22753edbe40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14119-cwe-79-improper-neutralization-of-i-f373f1de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14119%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20App%20Landing%20Template%20Blocks%20for%20WPBakery%20(Visual%20Composer)%20Page%20Builder&amp;severity=medium&amp;id=693b9189650da22753edbd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14158-cwe-352-cross-site-request-forgery--b0e715e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14158%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20octagonsimon%20Coding%20Blocks&amp;severity=medium&amp;id=693b918b650da22753edbe22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13904-cwe-79-improper-neutralization-of-i-b58215a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lesion%20WPGancio&amp;severity=medium&amp;id=693b9185650da22753edbcde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14045-cwe-862-missing-authorization-in-ap-c9c0c6fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14045%3A%20CWE-862%20Missing%20Authorization%20in%20apprhyme%20URL%20Media%20Uploader&amp;severity=medium&amp;id=693b9189650da22753edbd71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12968-cwe-434-unrestricted-upload-of-file-a1f600ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12968%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20infility%20Infility%20Global&amp;severity=high&amp;id=693b9182650da22753edbaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12824-cwe-22-improper-limitation-of-a-pat-d1a5ce73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12824%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tharkun69%20Player%20Leaderboard&amp;severity=high&amp;id=693b9182650da22753edbadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13408-cwe-352-cross-site-request-forgery--5a6e4aa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13408%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20foxtheme%20Foxtool%20All-in-One%3A%20Contact%20chat%20button%2C%20Custom%20login%2C%20Media%20optimize%20images&amp;severity=medium&amp;id=693b9183650da22753edbb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14344-cwe-22-improper-limitation-of-a-pat-561e2c4d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14344%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sh1zen%20Multi%20Uploader%20for%20Gravity%20Forms&amp;severity=critical&amp;id=693b918b650da22753edbe4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12883-cwe-639-authorization-bypass-throug-7300795b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12883%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20campay%20Campay%20Woocommerce%20Payment%20Gateway&amp;severity=medium&amp;id=693b9182650da22753edbaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14048-cwe-79-improper-neutralization-of-i-e4e016a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonahsc%20SimplyConvert&amp;severity=medium&amp;id=693b9189650da22753edbd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14129-cwe-79-improper-neutralization-of-i-5eb2072a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wasiul99%20Like%20DisLike%20Voting&amp;severity=medium&amp;id=693b9189650da22753edbd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13989-cwe-79-improper-neutralization-of-i-9c97668b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nazsabuz%20WP%20Dropzone&amp;severity=medium&amp;id=693b9187650da22753edbd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14125-cwe-79-improper-neutralization-of-i-b4fcf910</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andru1%20Complag&amp;severity=medium&amp;id=693b9189650da22753edbd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14393-cwe-79-improper-neutralization-of-i-ca4b5e1f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14393%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awanhrp%20Wpik%20WordPress%20Basic%20Ajax%20Form&amp;severity=medium&amp;id=693b918d650da22753edbef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14143-cwe-79-improper-neutralization-of-i-95fcf899</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14143%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ayothemes%20Ayo%20Shortcodes&amp;severity=medium&amp;id=693b918b650da22753edbe1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14064-cwe-862-missing-authorization-in-cy-67eb0895</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14064%3A%20CWE-862%20Missing%20Authorization%20in%20cytechltd%20BuddyTask&amp;severity=medium&amp;id=693b9189650da22753edbd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14467-cwe-79-improper-neutralization-of-i-c75495a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=693b918d650da22753edbef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13889-cwe-79-improper-neutralization-of-i-f9a88be9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tmus%20Simple%20Nivo%20Slider&amp;severity=medium&amp;id=693b9185650da22753edbcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14170-cwe-862-missing-authorization-in-st-5f350ba2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14170%3A%20CWE-862%20Missing%20Authorization%20in%20stiand%20Vimeo%20SimpleGallery&amp;severity=medium&amp;id=693b918b650da22753edbe48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13866-cwe-862-missing-authorization-in-lo-175b6c3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13866%3A%20CWE-862%20Missing%20Authorization%20in%20looks_awesome%20Flow-Flow%20Social%20Feed%20Stream&amp;severity=medium&amp;id=693b9185650da22753edbcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14162-cwe-352-cross-site-request-forgery--6d7a069b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14162%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20magblogapi%20BMLT%20WordPress%20Satellite&amp;severity=medium&amp;id=693b918b650da22753edbe34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13053-cwe-311-missing-encryption-of-sensi-5eb16f58</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13053%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=693b86d8650da22753ea479b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13670-cwe-427-uncontrolled-search-path-el-b7281b97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13670%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20High%20Level%20Synthesis%20Compiler&amp;severity=medium&amp;id=693b86d8650da22753ea47a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13052-cwe-295-improper-certificate-valida-9228cdf2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13052%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=693b86d8650da22753ea4798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13669-cwe-427-uncontrolled-search-path-el-0e7845a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13669%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20High%20Level%20Synthesis%20Compiler&amp;severity=medium&amp;id=693b86d8650da22753ea479e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13886-cwe-98-improper-control-of-filename-3aaef83c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13886%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cvedovini%20LT%20Unleashed&amp;severity=high&amp;id=693b7fd3650da22753e7b18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13839-cwe-79-improper-neutralization-of-i-7045e665</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13839%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jenyay%20LJUsers&amp;severity=medium&amp;id=693b7fd3650da22753e7b189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13665-cwe-427-uncontrolled-search-path-el-175d60d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13665%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=693b7fd3650da22753e7b186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10451-cwe-787-out-of-bounds-write-in-insy-dffa50ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10451%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=693b63bf650da2275388ef61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/require-google-to-remove-one-click-full-logout-url-659cdc63</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Require%20Google%20to%20Remove%20One-Click%20Full%20Logout%20URLs&amp;severity=medium&amp;id=693b605e650da227537cb9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-12-5ba91531</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-12&amp;severity=medium&amp;id=693cad76b3e344112f4b8ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64011-na-970a9fd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64011%3A%20n%2Fa&amp;severity=medium&amp;id=693c4cbf72d8eb03a61c7d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67819-na-d8ffe073</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67819%3A%20n%2Fa&amp;severity=medium&amp;id=693c45b972d8eb03a613ec4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67818-na-405845cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67818%3A%20n%2Fa&amp;severity=high&amp;id=693c45b972d8eb03a613ec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29144-na-80357863</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29144%3A%20n%2Fa&amp;severity=low&amp;id=693c45b972d8eb03a613ec46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67342-na-a591b460</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67342%3A%20n%2Fa&amp;severity=medium&amp;id=693c43d3dc37602712bdbc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67341-na-a14f45aa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67341%3A%20n%2Fa&amp;severity=medium&amp;id=693c404ddc37602712b89679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65854-na-a27cd0ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65854%3A%20n%2Fa&amp;severity=critical&amp;id=693c3cd3dc37602712b2e43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67344-na-934a5a82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67344%3A%20n%2Fa&amp;severity=medium&amp;id=693c3cd3dc37602712b2e43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66430-na-91279388</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66430%3A%20n%2Fa&amp;severity=critical&amp;id=693c3957dc37602712b0d798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65530-na-acaaa52f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65530%3A%20n%2Fa&amp;severity=high&amp;id=693c3957dc37602712b0d793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67779-cwe-502-deserialization-of-untruste-32dce7b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67779%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data%2C%20(CWE-400)%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-parcel&amp;severity=high&amp;id=693b579d8a7c12acf2c1d539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67780-cwe-306-missing-authentication-for--aec69acd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67780%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SpaceX%20Starlink%20Dish&amp;severity=medium&amp;id=693b524b8a7c12acf2bed11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66452-cwe-79-improper-neutralization-of-i-eed0b410</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66452%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=693b4f8722246175c6a88f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66451-cwe-20-improper-input-validation-in-cbc28275</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66451%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=693b487c22246175c6a6ed55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66450-cwe-80-improper-neutralization-of-s-52aec781</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66450%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=693b450222246175c6a639de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13668-cwe-427-uncontrolled-search-path-el-732e7a77</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13668%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=693b450222246175c6a639db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66446-cwe-362-concurrent-execution-using--b298b86e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66446%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=high&amp;id=693b3df122246175c6a4709d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34506-cwe-434-unrestricted-upload-of-file-2ee0c03e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34506%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WBCE%20WBCE%20CMS&amp;severity=high&amp;id=693b3df122246175c6a47094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34504-cwe-601-url-redirection-to-untruste-8398e97b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34504%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=693b3df122246175c6a4708e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58310-cwe-22-improper-limitation-of-a-pat-2db30a42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58310%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apc%20Network%20Management%20Card%204&amp;severity=high&amp;id=693b3df122246175c6a47089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58308-cwe-89-improper-neutralization-of-s-b853f96e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58308%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opensolution%20Quick.CMS&amp;severity=critical&amp;id=693b3df122246175c6a47083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58304-cwe-79-improper-neutralization-of-i-362a7411</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SPA-Cart%20SPA-CART%20CMS&amp;severity=medium&amp;id=693b3df322246175c6a4713b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58303-cwe-1336-improper-neutralization-of-8aa5302d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58303%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20(SSTI)%20in%20Flarum%20FriendsofFlarum%20Pretty%20Mail&amp;severity=high&amp;id=693b3df322246175c6a47135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58302-cwe-98-improper-control-of-filename-a20d2e84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58302%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Flarum%20FriendsofFlarum%20Pretty%20Mail&amp;severity=medium&amp;id=693b3df322246175c6a4712f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58301-cwe-89-improper-neutralization-of-s-e423d703</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58301%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20purei%20Purei%20CMS&amp;severity=critical&amp;id=693b3df322246175c6a4712a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58300-cwe-306-missing-authentication-for--d60ba640</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58300%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siklu%20MultiHaul%20TG%20series&amp;severity=high&amp;id=693b3df322246175c6a47125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66419-cwe-362-concurrent-execution-using--8f2b565c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66419%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=high&amp;id=693b3df322246175c6a47140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58298-cwe-434-unrestricted-upload-of-file-dd284420</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58298%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20BMC%20Software%20Compuware%20iStrobe%20Web&amp;severity=critical&amp;id=693b3df122246175c6a470c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58296-cwe-79-improper-neutralization-of-i-b507e6f1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58296%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PhoenixCart%20CE%20Phoenix&amp;severity=medium&amp;id=693b3df122246175c6a470b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58295-cwe-434-unrestricted-upload-of-file-8939f84b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58295%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20elkarte%20ElkArte%20Forum&amp;severity=high&amp;id=693b3df122246175c6a470b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58292-cwe-79-improper-neutralization-of-i-5da1f4f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58292%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xmbforum2%20XMB%20Forum&amp;severity=medium&amp;id=693b3df122246175c6a470ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58290-cwe-89-improper-neutralization-of-s-193455b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58290%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Elements%20Xhibiter%20NFT%20Marketplace&amp;severity=critical&amp;id=693b3df122246175c6a470a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58288-cwe-428-unquoted-search-path-or-ele-348aada4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58288%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Genexus%20Genexus%20Protection%20Server&amp;severity=high&amp;id=693b3a6c22246175c6a3cf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58286-cwe-78-improper-neutralization-of-s-e573a495</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58286%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20vexorian%20dizqueTV&amp;severity=critical&amp;id=693b3a6c22246175c6a3cf17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64721-cwe-190-integer-overflow-or-wraparo-1c3827ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64721%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20sandboxie-plus%20Sandboxie&amp;severity=critical&amp;id=693b36e922246175c6a34f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14538-cross-site-scripting-in-yangshare-w-6d48ab27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14538%3A%20Cross%20Site%20Scripting%20in%20yangshare%20warehouseManager%20%E4%BB%93%E5%BA%93%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=693b450222246175c6a639e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66584-cwe-121-stack-based-buffer-overflow-d53558a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66584&amp;severity=null&amp;id=693b336622246175c6a2b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66585-cwe-416-use-after-free-in-azeotech--779a7eac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66585%3A%20CWE-416%20Use%20After%20Free%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b336622246175c6a2b866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13664-cwe-427-uncontrolled-search-path-el-6dd1c9c4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13664%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=693b450222246175c6a639e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66586-cwe-843-access-of-resource-using-in-af0dc2d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66586%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b450222246175c6a639eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66587-cwe-122-heap-based-buffer-overflow--ca48a191</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66587&amp;severity=null&amp;id=693b450222246175c6a639ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66588-cwe-824-access-of-uninitialized-poi-3480f610</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66588%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b450222246175c6a639f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66589-cwe-125-out-of-bounds-read-in-azeot-531f080c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66589%3A%20CWE-125%20Out-of-bounds%20Read%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b2fe222246175c69eaa80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66590-cwe-787-out-of-bounds-write-in-azeo-f7b7355d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66590%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b2fe222246175c69eaa83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13663-cwe-279-incorrect-execution-assigne-fbc00d91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13663%3A%20CWE-279%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=693b2fe222246175c69eaa86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14537-sql-injection-in-code-projects-clas-e978ac52</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14537%3A%20SQL%20Injection%20in%20code-projects%20Class%20and%20Exam%20Timetable%20Management&amp;severity=medium&amp;id=693b2c5f22246175c6996d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14293-cwe-22-improper-limitation-of-a-pat-50edf3c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14293%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=693b2c5f22246175c6996d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55184-cwe-502-deserialization-of-untruste-59984423</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55184%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data.%20(CWE-400)%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-webpack&amp;severity=high&amp;id=693b270d22246175c6965c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55183-cwe-502-deserialization-of-untruste-7a101b26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55183%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data.%20(CWE-497)%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Actor%20in%20Meta%20react-server-dom-webpack&amp;severity=medium&amp;id=693b270d22246175c6965c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14536-sql-injection-in-code-projects-clas-d5947bee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14536%3A%20SQL%20Injection%20in%20code-projects%20Class%20and%20Exam%20Timetable%20Management&amp;severity=medium&amp;id=693b270d22246175c6965c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13214-cwe-89-improper-neutralization-of-s-1e0fba3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13214%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Aspera%20Orchestrator&amp;severity=high&amp;id=693b24d97d4c6f31f7c3ec33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13148-cwe-620-unverified-password-change--b0f8539e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13148%3A%20CWE-620%20Unverified%20Password%20Change%20in%20IBM%20Aspera%20Orchestrator&amp;severity=high&amp;id=693b270d22246175c6965c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13481-cwe-78-improper-neutralization-of-s-284019e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13481%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Aspera%20Orchestrator&amp;severity=high&amp;id=693b21637d4c6f31f7c352f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13211-cwe-799-improper-control-of-interac-29c34e7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13211%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=693b21637d4c6f31f7c352ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42197-cwe-256-plaintext-storage-of-a-pass-9912afb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42197%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20HCL%20Software%20Workload%20Scheduler&amp;severity=medium&amp;id=693b21637d4c6f31f7c352f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36938-elevation-of-privilege-in-google-an-a07add33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36938%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=693b21667d4c6f31f7c3537b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36937-remote-code-execution-in-google-and-45492619</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36937%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=693b21667d4c6f31f7c35378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36936-elevation-of-privilege-in-google-an-d7686d50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36936%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c35375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36935-elevation-of-privilege-in-google-an-11970228</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36935%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c35372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36934-elevation-of-privilege-in-google-an-7b7613ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36934%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c3536f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36932-elevation-of-privilege-in-google-an-433d6ce1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36932%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c3536c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36931-elevation-of-privilege-in-google-an-d573d50f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36931%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c35369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36930-elevation-of-privilege-in-google-an-49fa2dd8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36930%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36929-information-disclosure-in-google-an-ccd89043</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36929%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=693b21657d4c6f31f7c35334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36928-elevation-of-privilege-in-google-an-3001b801</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36928%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36927-elevation-of-privilege-in-google-an-847468e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36927%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c3532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36925-elevation-of-privilege-in-google-an-993858bc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36925%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c3532b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36924-elevation-of-privilege-in-google-an-2c80c1b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36924%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36923-elevation-of-privilege-in-google-an-cbebcde4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36923%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36922-elevation-of-privilege-in-google-an-cacc31d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36922%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=693b21657d4c6f31f7c35322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36921-information-disclosure-in-google-an-8a1b88ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36921%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=693b21657d4c6f31f7c3531f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36919-elevation-of-privilege-in-google-an-68939231</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36919%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c3531c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36918-elevation-of-privilege-in-google-an-1da2394b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36918%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21637d4c6f31f7c3530f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36917-denial-of-service-in-google-android-15428c78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36917%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=693b21637d4c6f31f7c3530c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36916-elevation-of-privilege-in-google-an-c8270119</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36916%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21637d4c6f31f7c35309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36912-denial-of-service-in-google-android-6ac1f15b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36912%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=693b21637d4c6f31f7c35306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36889-information-disclosure-in-google-an-76128643</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36889%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=693b21637d4c6f31f7c35302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14535-buffer-overflow-in-utt-512w-d00ee28b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14535%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=critical&amp;id=693b21637d4c6f31f7c352fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14534-buffer-overflow-in-utt-512w-46bf1244</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14534%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=critical&amp;id=693b1a517d4c6f31f7c1d601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14531-crlf-injection-in-code-projects-ren-41420a31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14531%3A%20CRLF%20Injection%20in%20code-projects%20Rental%20Management%20System&amp;severity=medium&amp;id=693b0fc17d4c6f31f7bf9f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13780-vulnerability-in-pgadminorg-pgadmin-21431ea8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13780%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=critical&amp;id=693b0fc17d4c6f31f7bf9f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ais-exploiting-smart-contracts-schneier-on-securit-e8fa41f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AIs%20Exploiting%20Smart%20Contracts%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=693b0c397d4c6f31f7befa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-modern-tale-of-blinkenlights-560ab5f8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20modern%20tale%20of%20blinkenlights&amp;severity=medium&amp;id=693b0c547d4c6f31f7beff53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64669-cwe-284-improper-access-control-in--6452b96e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64669%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14046-cwe-79-improper-neutralization-of-i-ff6a5891</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14046%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=693b08b87d4c6f31f7be3ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14530-unrestricted-upload-in-sourcecodest-789dbf63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14530%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Real%20Estate%20Property%20Listing%20App&amp;severity=medium&amp;id=693b01b07d4c6f31f7bc5fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14529-sql-injection-in-campcodes-retro-ba-7e4aa8dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14529%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=693b01b07d4c6f31f7bc5fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-visual-studio-code-extensions-hide-troja-9d61238d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Visual%20Studio%20Code%20Extensions%20Hide%20Trojan%20in%20Fake%20PNG%20Files&amp;severity=medium&amp;id=693afe2a7d4c6f31f7bb5d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/empirical-analysis-non-linear-token-consumption-in-88c3bbce</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Empirical%20Analysis%3A%20Non-Linear%20Token%20Consumption%20in%20AI%20Security%20Agents&amp;severity=medium&amp;id=693afe3d7d4c6f31f7bb62e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14528-information-disclosure-in-d-link-di-44183a7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14528%3A%20Information%20Disclosure%20in%20D-Link%20DIR-803&amp;severity=medium&amp;id=693b21667d4c6f31f7c35384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14527-sql-injection-in-projectworlds-adva-848d3888</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14527%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=693b21667d4c6f31f7c3537e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66048-cwe-121-stack-based-buffer-overflow-63acfcba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66048%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66047-cwe-121-stack-based-buffer-overflow-558eb0a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66047%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66046-cwe-121-stack-based-buffer-overflow-488eccfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66046%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66045-cwe-121-stack-based-buffer-overflow-39fd2846</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66045%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66044-cwe-121-stack-based-buffer-overflow-9bbd1d59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66044%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66043-cwe-121-stack-based-buffer-overflow-e5b994bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66043%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14526-buffer-overflow-in-tenda-ch22-4c5a0970</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14526%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=693af7247d4c6f31f7ba56eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8273-cwe-290-authentication-bypass-by-spo-f2b13a60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8273%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20HYPR%20Server&amp;severity=high&amp;id=693af7247d4c6f31f7ba56e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14522-unrestricted-upload-in-baowzh-hfly-5b21e5fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14522%3A%20Unrestricted%20Upload%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693af01c7d4c6f31f7b8523c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14521-path-traversal-in-baowzh-hfly-a9b21e5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14521%3A%20Path%20Traversal%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693af01c7d4c6f31f7b85236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14520-path-traversal-in-baowzh-hfly-69820617</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14520%3A%20Path%20Traversal%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693ae5917d4c6f31f7b66fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67742-cwe-22-in-jetbrains-teamcity-806e6fe1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67742%3A%20CWE-22%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=693ae5917d4c6f31f7b66ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67741-cwe-79-in-jetbrains-teamcity-f3b1e374</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67741%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=693ae5917d4c6f31f7b66ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67740-cwe-863-in-jetbrains-teamcity-3a7f0d29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67740%3A%20CWE-863%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=693ae5917d4c6f31f7b66ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67739-cwe-939-in-jetbrains-teamcity-7d768ed3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67739%3A%20CWE-939%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=693ae5917d4c6f31f7b66ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breach-of-120-000-ip-cameras-in-south-korea-securi-83a7314b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breach%20of%20120%20000%20IP%20cameras%20in%20South%20Korea%3A%20security%20tips%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=693ae21c7d4c6f31f7b56f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14519-cross-site-scripting-in-baowzh-hfly-ecaea1f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14519%3A%20Cross%20Site%20Scripting%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693ade897d4c6f31f7b4ab93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14518-server-side-request-forgery-in-powe-a9e81fba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14518%3A%20Server-Side%20Request%20Forgery%20in%20PowerJob&amp;severity=medium&amp;id=693ade897d4c6f31f7b4ab8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-droidlock-android-malware-locks-users-out-and--f5b691a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98DroidLock%E2%80%99%20Android%20Malware%20Locks%20Users%20Out%20and%20Spies%20via%20Front%20Camera&amp;severity=medium&amp;id=693adb047d4c6f31f7b42ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nanoremote-malware-uses-google-drive-api-for-hidde-327d2869</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NANOREMOTE%20Malware%20Uses%20Google%20Drive%20API%20for%20Hidden%20Control%20on%20Windows%20Systems&amp;severity=high&amp;id=693adb047d4c6f31f7b42acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13124-cwe-639-authorization-bypass-throug-3b0ad761</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13124%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Netiket%20Information%20Technologies%20Ltd.%20Co.%20ApplyLogic&amp;severity=high&amp;id=693ad7807d4c6f31f7b3bc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14265-cwe-494-download-of-code-without-in-33bc719b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14265%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ConnectWise%20ScreenConnect&amp;severity=critical&amp;id=693ad7807d4c6f31f7b3bc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40593-improper-access-control-in-fortinet-050250af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40593%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=693ad4127d4c6f31f7b2bf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-accenture-employee-charged-over-cybersecuri-35e7011a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20Accenture%20Employee%20Charged%20Over%20Cybersecurity%20Fraud&amp;severity=medium&amp;id=693ad3f17d4c6f31f7b2badc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14517-improper-export-of-android-applicat-55724918</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14517%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Yalantis%20uCrop&amp;severity=medium&amp;id=693ad0797d4c6f31f7b1f560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14516-server-side-request-forgery-in-yala-fb47778b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14516%3A%20Server-Side%20Request%20Forgery%20in%20Yalantis%20uCrop&amp;severity=medium&amp;id=693ad0797d4c6f31f7b1f559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-posts-results-of-2025-attck-enterprise-evalu-0eb3a600</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Posts%20Results%20of%202025%20ATT%26CK%20Enterprise%20Evaluations&amp;severity=medium&amp;id=693accfb7d4c6f31f7b0b9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-targeted-by-active-in-the-wild-exploit-tied-116bbe5d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Targeted%20by%20Active%20In-the-Wild%20Exploit%20Tied%20to%20Undisclosed%20High-Severity%20Flaw&amp;severity=high&amp;id=693acd187d4c6f31f7b0c101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-spyware-alerts-mirai-strikes-d-730faa97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Spyware%20Alerts%2C%20Mirai%20Strikes%2C%20Docker%20Leaks%2C%20ValleyRAT%20Rootkit%20%E2%80%94%20and%2020%20More%20Stories&amp;severity=medium&amp;id=693acce57d4c6f31f7b0b4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-gogs-zero-day-exploited-across-700-insta-b391b33d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Gogs%20Zero-Day%20Exploited%20Across%20700%2B%20Instances%20Amid%20Active%20Attacks&amp;severity=critical&amp;id=693acd187d4c6f31f7b0c0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wirte-leverages-ashenloader-sideloading-to-install-3b1a361f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WIRTE%20Leverages%20AshenLoader%20Sideloading%20to%20Install%20the%20AshTag%20Espionage%20Backdoor&amp;severity=high&amp;id=693acd187d4c6f31f7b0c105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pierce-county-library-data-breach-impacts-340000-457ba017</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pierce%20County%20Library%20Data%20Breach%20Impacts%20340%2C000&amp;severity=medium&amp;id=693ac25c7d4c6f31f7ae2375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-sent-40000-e-signature-phishing-emails-sh-b78c2148</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Sent%2040%2C000%20E-Signature%20Phishing%20Emails%20(SharePoint%20and%20DocuSign)%20to%206%2C000%20Firms%20in%20Just%202%20Weeks&amp;severity=medium&amp;id=693abee27d4c6f31f7ad98f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14523-inconsistent-interpretation-of-http-4cbaaaee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14523%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=693abef77d4c6f31f7ada077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wide-range-of-malware-delivered-in-react2shell-att-e4cc449e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wide%20Range%20of%20Malware%20Delivered%20in%20React2Shell%20Attacks&amp;severity=medium&amp;id=693ab7d17d4c6f31f7aaecf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13003-cwe-639-authorization-bypass-throug-4b1cef45</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13003%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Aksis%20Computer%20Services%20and%20Consulting%20Inc.%20AxOnboard&amp;severity=high&amp;id=693ab7f17d4c6f31f7aaff14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hamas-affiliated-ashen-lepus-targets-middle-easter-89ba00b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hamas-Affiliated%20Ashen%20Lepus%20Targets%20Middle%20Eastern%20Diplomatic%20Entities%20With%20New%20AshTag%20Malware%20Suite&amp;severity=medium&amp;id=693ae20b7d4c6f31f7b56950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gold-salem-tradecraft-for-deploying-warlock-ransom-79ef8b24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GOLD%20SALEM%20tradecraft%20for%20deploying%20Warlock%20ransomware&amp;severity=medium&amp;id=693ae20b7d4c6f31f7b56928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vs-code-extensions-contain-trojan-laden-fake-image-389d08f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VS%20Code%20extensions%20contain%20trojan-laden%20fake%20image&amp;severity=medium&amp;id=693adb2d7d4c6f31f7b42f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14515-sql-injection-in-campcodes-supplier-7c827075</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14515%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=693ab7f17d4c6f31f7aaff17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-gogs-zero-day-exploited-for-months-2cec6881</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Gogs%20Zero-Day%20Exploited%20for%20Months&amp;severity=critical&amp;id=693ab44c7d4c6f31f7a8e69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14514-sql-injection-in-campcodes-supplier-fd2e52e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14514%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=693ab0d47d4c6f31f7a6d986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-impact-of-robotic-process-automation-rpa-on-id-cd999196</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Impact%20of%20Robotic%20Process%20Automation%20(RPA)%20on%20Identity%20and%20Access%20Management&amp;severity=medium&amp;id=693b444622246175c6a5d1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64995-cwe-427-uncontrolled-search-path-el-2664f923</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64995%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad537d4c6f31f7a5046b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64994-cwe-427-uncontrolled-search-path-el-58b16924</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64994%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad537d4c6f31f7a50468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64993-cwe-20-improper-input-validation-in-76053925</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64993%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad537d4c6f31f7a50465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64992-cwe-20-improper-input-validation-in-3ae08afb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64992%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64991-cwe-20-improper-input-validation-in-142d08d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64991%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64990-cwe-20-improper-input-validation-in-93368dbe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64990%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64989-cwe-20-improper-input-validation-in-4486ee6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64989%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64988-cwe-20-improper-input-validation-in-d94761f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64988%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64987-cwe-20-improper-input-validation-in-ba36c12c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64987%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64986-cwe-20-improper-input-validation-in-2309631f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64986%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46266-cwe-20-improper-input-validation-in-de06bcfa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46266%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44016-cwe-20-improper-input-validation-in-2ebc4e53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44016%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12687-cwe-20-improper-input-validation-in-653d9b1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12687%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-gogs-zero-day-exploited-across-700-insta-0bd31457</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Gogs%20Zero-Day%20Exploited%20Across%20700%2B%20Instances%20Amid%20Active%20Attacks&amp;severity=high&amp;id=693a9f317d4c6f31f79c024c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-attacks-exploit-gladinets-hard-coded-keys-f-4b87d4b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Attacks%20Exploit%20Gladinet&apos;s%20Hard-Coded%20Keys%20for%20Unauthorized%20Access%20and%20Code%20Execution&amp;severity=high&amp;id=693a9f527d4c6f31f79c062a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-fixes-eighth-chrome-zero-day-exploited-in-a-e1392167</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20fixes%20eighth%20Chrome%20zero-day%20exploited%20in%20attacks%20in%202025&amp;severity=critical&amp;id=693a9f527d4c6f31f79c062e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ibm-patches-over-100-vulnerabilities-06bb5c85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IBM%20Patches%20Over%20100%20Vulnerabilities&amp;severity=critical&amp;id=693a9bb37d4c6f31f79b1658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-malware-now-uses-python-loader-to-byp-e67c2569</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Malware%20Now%20Uses%20Python%20Loader%20to%20Bypass%20Security&amp;severity=medium&amp;id=693a912e7d4c6f31f7964e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64701-privilege-chaining-in-qualitysoft-c-9f7cc552</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64701%3A%20Privilege%20chaining%20in%20QualitySoft%20Corporation%20QND%20Premium%2FAdvance%2FStandard&amp;severity=high&amp;id=693a7fa47d4c6f31f78f4e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-mysterious-chrome-zero-day-exploite-907589a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20Mysterious%20Chrome%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=medium&amp;id=693a788e7d4c6f31f78cf3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14512-integer-overflow-or-wraparound-in-r-bbc3ea86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14512%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GNOME%20glib&amp;severity=medium&amp;id=693a726596da2fc9d6ded0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-targeted-by-active-in-the-wild-exploit-tied-838c9e82</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Targeted%20by%20Active%20In-the-Wild%20Exploit%20Tied%20to%20Undisclosed%20High-Severity%20Flaw&amp;severity=high&amp;id=693b444622246175c6a5d1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-attacks-exploit-gladinets-hard-coded-keys-f-43cb43d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Attacks%20Exploit%20Gladinet&apos;s%20Hard-Coded%20Keys%20for%20Unauthorized%20Access%20and%20Code%20Execution&amp;severity=critical&amp;id=693a718296da2fc9d6dd0936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9436-cwe-79-improper-neutralization-of-in-e72015b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Google%20Reviews&amp;severity=medium&amp;id=693a3ebcbbbecd30a6fa3302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10163-cwe-89-improper-neutralization-of-s-c79701db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10163%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=693a3ebcbbbecd30a6fa32fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14485-command-injection-in-efm-iptime-a30-ddc1c3db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14485%3A%20Command%20Injection%20in%20EFM%20ipTIME%20A3004T&amp;severity=low&amp;id=693a37b4bbbecd30a6f5d200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-ai-gemma-3-locally-with-a-single-cpu-wed-dec-ae410137</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20%2C%20(Wed%2C%20Dec%2010th)&amp;severity=medium&amp;id=693a309cbbbecd30a6f44004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13764-cwe-269-improper-privilege-manageme-e97de041</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13764%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ApusTheme%20WP%20CarDealer&amp;severity=critical&amp;id=693a30aebbbecd30a6f44761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11467-cwe-918-server-side-request-forgery-0e91ec94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11467%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20themeisle%20RSS%20Aggregator%20by%20Feedzy%20%E2%80%93%20Feed%20to%20Post%2C%20Autoblogging%2C%20News%20%26%20YouTube%20Video%20Feeds%20Aggregator&amp;severity=medium&amp;id=693a30aebbbecd30a6f4475d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67720-cwe-22-improper-limitation-of-a-pat-98a8df5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67720%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mayuri-Chan%20pyrofork&amp;severity=medium&amp;id=693a262ebbbecd30a6f23cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67719-cwe-620-unverified-password-change--b84becb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67719%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20ibexa%20user&amp;severity=high&amp;id=693a262ebbbecd30a6f23ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67716-cwe-184-incomplete-list-of-disallow-9665847a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67716%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=693a149dbbbecd30a6dedd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67713-cwe-601-url-redirection-to-untruste-47c2726a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67713%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20miniflux%20v2&amp;severity=medium&amp;id=693a0f09e425ca5072e7e482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-11-7ee2fc62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-11&amp;severity=medium&amp;id=693b5e948a7c12acf2ca9aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66429-na-d7c48408</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66429%3A%20n%2Fa&amp;severity=high&amp;id=693b2c5f22246175c6996d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55816-na-5130dac0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55816%3A%20n%2Fa&amp;severity=medium&amp;id=693b28e322246175c6977630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56130-na-00db804b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56130%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56129-na-90d1c0b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56129%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56127-na-09de8e5c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56127%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56124-na-32e7efad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56124%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56123-na-198b52d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56123%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56122-na-1114a23d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56122%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56120-na-1f7a7a7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56120%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56118-na-13c7ce23</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56118%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56117-na-fd038fb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56117%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56114-na-73fffd18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56114%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56113-na-0eef2fd9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56113%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56111-na-9c6c9a52</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56111%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56110-na-ba168e6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56110%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56109-na-320a31a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56109%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56108-na-f319f1b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56108%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56107-na-3895fa32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56107%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56106-na-78a308ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56106%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56102-na-4e1cc633</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56102%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56101-na-e04406b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56101%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56099-na-af426c88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56099%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56091-na-93b6fc72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56091%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56090-na-a70936d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56090%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56089-na-2e7a5644</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56089%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56088-na-6bd8c186</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56088%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56087-na-6cb764c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56087%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56086-na-e64eb0b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56086%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56085-na-93c616a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56085%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56084-na-69eaba9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56084%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56083-na-8e0df2a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56083%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56082-na-cffd4927</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56082%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56079-na-42d0e74d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56079%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56077-na-a2b35e43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56077%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56098-na-45b83694</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56098%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56097-na-e262ebb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56097%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56096-na-b69f14ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56096%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56095-na-cd23e6ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56095%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56094-na-53ee51f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56094%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56093-na-535a78b4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56093%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56092-na-cb46fcdf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56092%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66918-na-a5f1de48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66918%3A%20n%2Fa&amp;severity=high&amp;id=693b01b07d4c6f31f7bc5fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65474-na-267bce03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65474%3A%20n%2Fa&amp;severity=high&amp;id=693af7247d4c6f31f7ba56f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65471-na-3a47ebd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65471%3A%20n%2Fa&amp;severity=high&amp;id=693af7247d4c6f31f7ba56f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65473-na-acaf427e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65473%3A%20n%2Fa&amp;severity=critical&amp;id=693af3a07d4c6f31f7b8f5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65472-na-a783b09a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65472%3A%20n%2Fa&amp;severity=high&amp;id=693af3a07d4c6f31f7b8f5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55314-na-402053f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55314%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b7120f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55313-na-0f55f7b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55313%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b7120c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55312-na-50996030</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55312%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b71209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55311-na-04eda2b5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55311%3A%20n%2Fa&amp;severity=medium&amp;id=693ae91d7d4c6f31f7b71206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55310-na-2f7ab0fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55310%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b71203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55309-na-43679c77</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55309%3A%20n%2Fa&amp;severity=medium&amp;id=693ae91d7d4c6f31f7b71200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55308-na-3169c443</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55308%3A%20n%2Fa&amp;severity=medium&amp;id=693ae91d7d4c6f31f7b711fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59803-na-a3093274</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59803%3A%20n%2Fa&amp;severity=medium&amp;id=693ae5917d4c6f31f7b66ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59802-na-6b412f40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59802%3A%20n%2Fa&amp;severity=high&amp;id=693ae5917d4c6f31f7b66fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55307-na-e9ea8c0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55307%3A%20n%2Fa&amp;severity=low&amp;id=693ae5917d4c6f31f7b66feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67646-cwe-352-cross-site-request-forgery--bd97fdf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67646%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Telepedia%20TableProgressTracking&amp;severity=low&amp;id=693a0800e425ca5072db0c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67644-cwe-89-improper-neutralization-of-s-753ef587</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67644%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20langchain-ai%20langgraph&amp;severity=high&amp;id=693a0800e425ca5072db0c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-droidlock-malware-locks-android-devices-and-de-0810409b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DroidLock%20malware%20locks%20Android%20devices%20and%20demands%20a%20ransom&amp;severity=high&amp;id=693a047be425ca5072d903d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67511-cwe-77-improper-neutralization-of-s-63820d7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67511%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20aliasrobotics%20cai&amp;severity=critical&amp;id=693a12a7bbbecd30a6dd4e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67509-cwe-94-improper-control-of-generati-ff5dc9b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67509%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20neuron-core%20neuron-ai&amp;severity=high&amp;id=6939ff557cb4621ebe9f6bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67510-cwe-250-execution-with-unnecessary--4cf6ea08</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67510%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20neuron-core%20neuron-ai&amp;severity=critical&amp;id=6939fbd37cb4621ebe9b284d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67513-cwe-521-weak-password-requirements--883ee506</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67513%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20FreePBX%20endpoint&amp;severity=medium&amp;id=6939f84c7cb4621ebe960e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67505-cwe-362-concurrent-execution-using--8547fbfa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67505%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20okta%20okta-sdk-java&amp;severity=high&amp;id=6939f4c87cb4621ebe93c168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67490-cwe-863-incorrect-authorization-in--805f2ce7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67490%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=6939f4c87cb4621ebe93c164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66474-cwe-95-improper-neutralization-of-d-8b993f01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66474%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki%20xwiki-rendering&amp;severity=high&amp;id=6939efe25ab76fdc5f31bfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66473-cwe-770-allocation-of-resources-wit-74624010</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66473%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=6939efe25ab76fdc5f31bfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66033-cwe-401-missing-release-of-memory-a-867c1ec9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66033%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20okta%20okta-sdk-java&amp;severity=medium&amp;id=6939ec5a5ab76fdc5f2d8880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66472-cwe-79-improper-neutralization-of-i-5defd6b7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66472%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=6939ec5a5ab76fdc5f2d8884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58283-cwe-434-unrestricted-upload-of-file-897086fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58283%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wbce%20WBCE%20CMS&amp;severity=high&amp;id=6939e5605ab76fdc5f2656e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58279-cwe-434-unrestricted-upload-of-file-6de1e447</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58279%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20apprain%20appRain%20CMF&amp;severity=high&amp;id=6939e5605ab76fdc5f2656e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53776-cwe-384-session-fixation-in-db-elet-5166dbc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53776%3A%20CWE-384%3A%20Session%20Fixation%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=high&amp;id=6939e5605ab76fdc5f2656db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-10000-docker-hub-images-found-leaking-credent-8ebfb8b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2010%2C000%20Docker%20Hub%20images%20found%20leaking%20credentials%2C%20auth%20keys&amp;severity=high&amp;id=6939e54f5ab76fdc5f264c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53775-cwe-384-session-fixation-in-db-elet-ccb422bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53775%3A%20CWE-384%3A%20Session%20Fixation%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=high&amp;id=6939e5605ab76fdc5f2656d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53741-cwe-384-session-fixation-in-db-elet-0c9487fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53741%3A%20CWE-384%3A%20Session%20Fixation%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=medium&amp;id=6939e1d75ab76fdc5f21095a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53740-cwe-862-missing-authorization-in-db-cf46e30d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53740%3A%20CWE-862%3A%20Missing%20Authorization%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=high&amp;id=6939e1d75ab76fdc5f210952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62181-cwe-204-observable-response-discrep-d58506b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62181%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=6939dce9a97935729e774028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65950-cwe-89-improper-neutralization-of-s-dae8c159</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65950%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WBCE%20WBCE_CMS&amp;severity=critical&amp;id=6939dceba97935729e77408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67460-cwe-693-protection-mechanism-failur-6af4b16b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67460%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=high&amp;id=6939dceba97935729e774094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67461-cwe-73-external-control-of-file-nam-8861551b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67461%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=medium&amp;id=6939dceba97935729e774097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/torrent-for-dicaprios-one-battle-after-another-mov-167c803a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Torrent%20for%20DiCaprio%E2%80%99s%20%E2%80%9COne%20Battle%20After%20Another%E2%80%9D%20Movie%20Drops%20Agent%20Tesla&amp;severity=medium&amp;id=6939d960a97935729e728209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploitation-delivers-crypto-miners-an-21a1bb4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploitation%20Delivers%20Crypto%20Miners%20and%20New%20Malware%20Across%20Multiple%20Sectors&amp;severity=medium&amp;id=6939dea8a97935729e794a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/browser-hijacking-techniques-some-education-requir-9af8a4ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Browser%20Hijacking%20Techniques%3A%20Some%20education%20required&amp;severity=medium&amp;id=693a8a287d4c6f31f792ee34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/net-soapwn-flaw-opens-door-for-file-writes-and-rem-394da945</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=.NET%20SOAPwn%20Flaw%20Opens%20Door%20for%20File%20Writes%20and%20Remote%20Code%20Execution%20via%20Rogue%20WSDL&amp;severity=critical&amp;id=6939dea8a97935729e794a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-an-adversary-in-the-middle-phishing--13d77b93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20an%20adversary-in-the-middle%20phishing%20campaign%20targeting%20Microsoft%20365%20and%20Okta%20users&amp;severity=medium&amp;id=693a8a287d4c6f31f792ee0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures-16ab5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gogs%20Zero-Day%20RCE%20(CVE-2025-8110)%20Actively%20Exploited&amp;severity=medium&amp;id=682c992c7960f6956616ab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nanoremote-cousin-of-finaldraft-bfb18425</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NANOREMOTE%2C%20cousin%20of%20FINALDRAFT&amp;severity=medium&amp;id=693a8a287d4c6f31f792edfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covert-red-team-phishing-343db125</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Covert%20red%20team%20phishing&amp;severity=medium&amp;id=6939bdc1fe7b3954b690bfdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64622-cross-site-scripting-stored-xss-cwe-d5c989da</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64622%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64582-cross-site-scripting-stored-xss-cwe-0ab4605c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64582%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64547-cross-site-scripting-stored-xss-cwe-0355764f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64547%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64833-cross-site-scripting-stored-xss-cwe-f514a9ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64833%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64613-cross-site-scripting-stored-xss-cwe-c1fac439</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64613%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64829-cross-site-scripting-stored-xss-cwe-ff0c1d1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64829%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64553-cross-site-scripting-stored-xss-cwe-ff291706</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64553%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64545-cross-site-scripting-dom-based-xss--9c6cf7ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64545%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64546-cross-site-scripting-stored-xss-cwe-6b7ad79c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64546%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64537-cross-site-scripting-dom-based-xss--ea0e3922</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64537%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=6939bda4fe7b3954b690addf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64574-cross-site-scripting-stored-xss-cwe-949d77fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64574%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64550-cross-site-scripting-dom-based-xss--8decbdfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64550%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64827-cross-site-scripting-stored-xss-cwe-e4b0761f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64827%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64602-cross-site-scripting-stored-xss-cwe-01fd320a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64602%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64593-cross-site-scripting-stored-xss-cwe-5dfbfb82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64593%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64539-cross-site-scripting-dom-based-xss--a31615bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64539%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=6939bda4fe7b3954b690ade5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64887-cross-site-scripting-dom-based-xss--9165240e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64887%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64548-cross-site-scripting-stored-xss-cwe-9c2a0040</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64548%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64563-cross-site-scripting-dom-based-xss--f8f6a49d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64563%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64800-cross-site-scripting-stored-xss-cwe-5840d6fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64800%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64559-cross-site-scripting-stored-xss-cwe-c4f076fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64559%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64817-cross-site-scripting-stored-xss-cwe-3dab139f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64817%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64888-cross-site-scripting-dom-based-xss--84efb933</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64888%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64600-cross-site-scripting-stored-xss-cwe-eb45f841</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64600%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64583-cross-site-scripting-dom-based-xss--0f144197</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64583%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64826-cross-site-scripting-stored-xss-cwe-0ee70e86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64826%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64538-cross-site-scripting-dom-based-xss--a462f6dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64538%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=6939bda4fe7b3954b690ade2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64605-cross-site-scripting-stored-xss-cwe-b48df603</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64605%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64875-cross-site-scripting-stored-xss-cwe-e02846b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64875%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64598-cross-site-scripting-stored-xss-cwe-6df1eda5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64598%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64558-cross-site-scripting-stored-xss-cwe-787b9263</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64558%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64616-cross-site-scripting-stored-xss-cwe-a4c649c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64616%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64820-cross-site-scripting-stored-xss-cwe-e40127dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64820%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64861-cross-site-scripting-stored-xss-cwe-900f0c1f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64861%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64801-cross-site-scripting-stored-xss-cwe-50e02b46</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64801%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64620-cross-site-scripting-stored-xss-cwe-18993c03</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64620%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64601-cross-site-scripting-stored-xss-cwe-43929457</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64601%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64560-cross-site-scripting-dom-based-xss--48d58b86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64560%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64556-cross-site-scripting-stored-xss-cwe-e3dd1b42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64556%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64565-cross-site-scripting-dom-based-xss--28650235</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64565%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64606-cross-site-scripting-stored-xss-cwe-abd6c6b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64606%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64823-cross-site-scripting-stored-xss-cwe-92bd1b51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64823%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64596-cross-site-scripting-stored-xss-cwe-501a521b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64596%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64572-cross-site-scripting-stored-xss-cwe-f72dcda4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64572%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64541-cross-site-scripting-stored-xss-cwe-993e417d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64541%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690ade8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64609-cross-site-scripting-stored-xss-cwe-39d027a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64609%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64822-cross-site-scripting-stored-xss-cwe-47fdc99e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64822%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64789-cross-site-scripting-stored-xss-cwe-4f685868</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64789%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64881-cross-site-scripting-stored-xss-cwe-7fad6cea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64881%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64825-cross-site-scripting-stored-xss-cwe-45644575</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64825%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64845-cross-site-scripting-stored-xss-cwe-b433f035</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64845%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64626-cross-site-scripting-stored-xss-cwe-b9a34e65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64626%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64544-cross-site-scripting-dom-based-xss--ffff894d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64544%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64597-cross-site-scripting-stored-xss-cwe-609d6ed5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64597%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64611-cross-site-scripting-stored-xss-cwe-96c8dbc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64611%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64821-cross-site-scripting-stored-xss-cwe-652105dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64821%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64580-cross-site-scripting-stored-xss-cwe-62250efd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64580%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64586-cross-site-scripting-stored-xss-cwe-329887b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64586%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64627-cross-site-scripting-stored-xss-cwe-3e24f0a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64627%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64566-cross-site-scripting-dom-based-xss--aae7d734</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64566%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64604-cross-site-scripting-stored-xss-cwe-bb5ebe7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64604%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64599-cross-site-scripting-stored-xss-cwe-203e2085</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64599%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64804-cross-site-scripting-stored-xss-cwe-f9af0c28</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64804%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64623-cross-site-scripting-stored-xss-cwe-5737cd57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64623%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64858-cross-site-scripting-stored-xss-cwe-4f77fa3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64858%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64847-cross-site-scripting-stored-xss-cwe-06581d7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64847%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64607-cross-site-scripting-stored-xss-cwe-9f9a71ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64607%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64803-cross-site-scripting-stored-xss-cwe-d92d291a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64803%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34429-cwe-352-cross-site-request-forgery--cdc26e79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34429%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LXware%201Panel&amp;severity=high&amp;id=6939bda4fe7b3954b690add5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64577-cross-site-scripting-stored-xss-cwe-c620d46f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64577%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64863-cross-site-scripting-stored-xss-cwe-fcd0ec3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64863%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64853-cross-site-scripting-stored-xss-cwe-0dbbd564</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64853%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64814-cross-site-scripting-stored-xss-cwe-c999e1f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64814%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64612-cross-site-scripting-stored-xss-cwe-9064e575</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64612%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64857-cross-site-scripting-stored-xss-cwe-abeb7e82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64857%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64794-cross-site-scripting-stored-xss-cwe-6baa027a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64794%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64591-cross-site-scripting-stored-xss-cwe-cc44b1b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64591%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64555-cross-site-scripting-stored-xss-cwe-c6eb5c56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64555%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64549-cross-site-scripting-stored-xss-cwe-cbb97323</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64549%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64808-cross-site-scripting-stored-xss-cwe-db0c87a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64808%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64840-cross-site-scripting-stored-xss-cwe-c8da1c70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64840%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690bea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64564-cross-site-scripting-dom-based-xss--ca078768</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64564%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64551-cross-site-scripting-dom-based-xss--47dfa67f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64551%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64569-cross-site-scripting-dom-based-xss--7b2d3a31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64569%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64850-cross-site-scripting-stored-xss-cwe-d9c57326</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64850%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64592-cross-site-scripting-stored-xss-cwe-dcc86619</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64592%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64543-cross-site-scripting-dom-based-xss--33f4d9b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64543%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64578-cross-site-scripting-stored-xss-cwe-7b36503f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64578%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64839-cross-site-scripting-stored-xss-cwe-1ac36baa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64839%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34430-cwe-352-cross-site-request-forgery--bc04049c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34430%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LXware%201Panel&amp;severity=medium&amp;id=6939bda4fe7b3954b690adda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64554-cross-site-scripting-stored-xss-cwe-96dfce29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64554%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64791-cross-site-scripting-stored-xss-cwe-44682a38</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64791%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64841-cross-site-scripting-stored-xss-cwe-a7d263d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64841%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64619-cross-site-scripting-stored-xss-cwe-dc5f7c0b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64619%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64799-cross-site-scripting-stored-xss-cwe-606de0e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64799%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64581-cross-site-scripting-stored-xss-cwe-90cab848</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64581%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64852-cross-site-scripting-stored-xss-cwe-2d46487f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64852%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64576-cross-site-scripting-stored-xss-cwe-40028bc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64576%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64615-cross-site-scripting-stored-xss-cwe-5b9ac2d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64615%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64873-cross-site-scripting-stored-xss-cwe-da9ce92e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64873%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64590-cross-site-scripting-stored-xss-cwe-d7725f89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64590%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64557-cross-site-scripting-stored-xss-cwe-1c49cb63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64557%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64790-cross-site-scripting-stored-xss-cwe-07d86705</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64790%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64585-cross-site-scripting-stored-xss-cwe-4ff1c024</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64585%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64797-cross-site-scripting-stored-xss-cwe-14e06d79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64797%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64579-cross-site-scripting-stored-xss-cwe-a9daae9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64579%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64869-cross-site-scripting-stored-xss-cwe-47ed696a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64869%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64796-cross-site-scripting-stored-xss-cwe-83437c29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64796%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64603-cross-site-scripting-stored-xss-cwe-b4b1b0ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64603%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64792-cross-site-scripting-stored-xss-cwe-909e434d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64792%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64575-cross-site-scripting-stored-xss-cwe-c2717fed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64575%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64802-cross-site-scripting-stored-xss-cwe-f966ae2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64802%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64793-cross-site-scripting-stored-xss-cwe-c3079333</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64793%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64594-cross-site-scripting-stored-xss-cwe-f85a0e88</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64594%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64614-cross-site-scripting-stored-xss-cwe-ab85b942</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64614%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64872-cross-site-scripting-stored-xss-cwe-21ead94f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64872%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690beda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64562-cross-site-scripting-dom-based-xss--88bcc4f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64562%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65199-cwe-78-improper-neutralization-of-s-275a32aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65199%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Windscribe%20Windscribe%20for%20Linux%20Desktop%20App&amp;severity=high&amp;id=6939ba1ffe7b3954b68b96e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5467-cwe-708-incorrect-ownership-assignme-3a4651f5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5467%3A%20CWE-708%3A%20Incorrect%20Ownership%20Assignment%20in%20Canonical%20apport&amp;severity=low&amp;id=6939b696fe7b3954b689178f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-stealer-hiding-in-blender-3d-models-kaspersky-of-14ce5b74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20stealer%20hiding%20in%20Blender%203D%20models%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6939b6a0fe7b3954b6891b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-ruse-valleyrat-hits-china-via-fake-microso-b28fbd5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Ruse%3A%20ValleyRAT%20Hits%20China%20via%20Fake%20Microsoft%20Teams%20Attack&amp;severity=medium&amp;id=693a8a287d4c6f31f792edc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13607-cwe-306-missing-authentication-for--49c1ceb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13607%3A%20CWE-306%20in%20D-Link%20DCS-F5614-L1&amp;severity=critical&amp;id=6939ae2d62aa6c8a0e4448a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soapwn-pwning-net-framework-applications-through-h-d0196e41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SOAPwn%3A%20Pwning%20.NET%20Framework%20Applications%20Through%20HTTP%20Client%20Proxies%20And%20WSDL%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=6939ae3162aa6c8a0e444984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-has-entered-the-chat-3ff6e63a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20has%20entered%20the%20chat&amp;severity=high&amp;id=6939a67462aa6c8a0e3c6b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67643-vulnerability-in-jenkins-project-je-61431caa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67643%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Redpen%20-%20Pipeline%20Reporter%20for%20Jira%20Plugin&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67642-vulnerability-in-jenkins-project-je-81600b0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67642%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20HashiCorp%20Vault%20Plugin&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67641-vulnerability-in-jenkins-project-je-b7f4f1d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67641%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Coverage%20Plugin&amp;severity=high&amp;id=6939a66f62aa6c8a0e3c6b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67640-vulnerability-in-jenkins-project-je-07d868d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67640%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Git%20client%20Plugin&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67639-vulnerability-in-jenkins-project-je-324e19b5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67639%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=low&amp;id=6939a66f62aa6c8a0e3c6b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67638-vulnerability-in-jenkins-project-je-617b3e61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67638%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67637-vulnerability-in-jenkins-project-je-d015ddf2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67637%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67636-vulnerability-in-jenkins-project-je-26a550b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67636%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67635-vulnerability-in-jenkins-project-je-e676f964</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67635%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=6939a66f62aa6c8a0e3c6b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-deploy-etherrat-malware-in-re-b48ea74c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Deploy%20EtherRAT%20Malware%20in%20React2Shell%20Exploits&amp;severity=medium&amp;id=6939a2f762aa6c8a0e36f854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-pcie-encryption-weaknesses-expose-pcie-50-sy-9aadf782</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20PCIe%20Encryption%20Weaknesses%20Expose%20PCIe%205.0%2B%20Systems%20to%20Faulty%20Data%20Handling&amp;severity=high&amp;id=6939a1a8b45ef26b31b81e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34410-cwe-352-cross-site-request-forgery--ff5d8ced</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LXware%201Panel&amp;severity=high&amp;id=69399ca286adcdec9b1a61f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-fake-video-scams-schneier-on-security-322efc99</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Fake%20Video%20Scams%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6939991e86adcdec9b16478c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-hacker-charged-with-helping-russian-hack-1fc3c034</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20hacker%20charged%20with%20helping%20Russian%20hacktivist%20groups&amp;severity=high&amp;id=6939991e86adcdec9b164788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34395-cwe-22-improper-limitation-of-a-pat-d21fd03a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34395%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Barracuda%20Networks%20RMM&amp;severity=high&amp;id=6939994886adcdec9b166036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34394-cwe-502-deserialization-of-untruste-9032e7c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34394%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Barracuda%20Networks%20RMM&amp;severity=critical&amp;id=6939994886adcdec9b166031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34393-cwe-470-use-of-externally-controlle-f9b8725c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34393%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Barracuda%20Networks%20RMM&amp;severity=critical&amp;id=6939994886adcdec9b16602c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34392-cwe-36-absolute-path-traversal-in-b-1926d191</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34392%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Barracuda%20Networks%20RMM&amp;severity=critical&amp;id=6939994886adcdec9b166027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/possible-exploit-variant-for-cve-2024-9042-kuberne-e93b1ef6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Possible%20exploit%20variant%20for%20CVE-2024-9042%20(Kubernetes%20OS%20Command%20Injection)%2C%20(Wed%2C%20Dec%2010th)&amp;severity=medium&amp;id=6939920a86adcdec9b0f4365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cracking-valleyrat-from-builder-secrets-to-kernel--5cc63cce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cracking%20ValleyRAT%3A%20From%20Builder%20Secrets%20to%20Kernel%20Rootkits&amp;severity=high&amp;id=693989485f410c6b20afc44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild-16aa45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PeerBlight%20Linux%20Backdoor%20Exploits%20React2Shell%20CVE-2025-55182&amp;severity=medium&amp;id=682c992c7960f6956616aa45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13125-cwe-639-authorization-bypass-throug-b2e7c443</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13125%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Im%20Park%20Information%20Technology%2C%20Electronics%2C%20Press%2C%20Publishing%20and%20Advertising%2C%20Education%20Ltd.%20Co.%20DijiDemi&amp;severity=medium&amp;id=6939823e5f410c6b20a8995d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13155-cwe-276-incorrect-default-permissio-b276ee43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13155%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20Baiying%20Client&amp;severity=high&amp;id=6939823e5f410c6b20a89964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13152-cwe-427-uncontrolled-search-path-el-f35f2b7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13152%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20One%20Client&amp;severity=high&amp;id=6939823e5f410c6b20a89960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12046-cwe-427-uncontrolled-search-path-el-0210ef82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12046%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20App%20Store&amp;severity=high&amp;id=6939823e5f410c6b20a8995a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-indicts-extradited-ukrainian-on-charges-of-aidi-908fa38b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Indicts%20Extradited%20Ukrainian%20on%20Charges%20of%20Aiding%20Russian%20Hacking%20Groups&amp;severity=medium&amp;id=69397b3b471be09b6e3bf760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-pcie-encryption-weaknesses-expose-pcie-50-sy-205ba99f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20PCIe%20Encryption%20Weaknesses%20Expose%20PCIe%205.0%2B%20Systems%20to%20Faulty%20Data%20Handling&amp;severity=medium&amp;id=69398a745f410c6b20b073ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13127-cwe-79-improper-neutralization-of-i-abd031cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TAC%20Information%20Services%20Internal%20and%20External%20Trade%20Inc.%20GoldenHorn&amp;severity=low&amp;id=69397d1d471be09b6e3e8e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2105-cwe-1287-improper-validation-of-spec-bcb25c66</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2105%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20JBL%20Flip%205&amp;severity=medium&amp;id=69397292471be09b6e332fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2104-cwe-306-missing-authentication-for-c-3d0772bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2104%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20JBL%20LIVE%20PRO%202%20TWS&amp;severity=high&amp;id=69397292471be09b6e332ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-gemini-enterprise-vulnerability-exp-0971881f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20Gemini%20Enterprise%20Vulnerability%20Exposing%20Corporate%20Data&amp;severity=medium&amp;id=69396f0a471be09b6e2de08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-authentication-bypass-vu-38652f63</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20Authentication%20Bypass%20Vulnerabilities&amp;severity=critical&amp;id=69396a548e5e216c62f539e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-security-fixes-for-56-flaws-inclu-22efa0f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Issues%20Security%20Fixes%20for%2056%20Flaws%2C%20Including%20Active%20Exploit%20and%20Two%20Zero-Days&amp;severity=high&amp;id=69396a6f8e5e216c62f54396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-microsoft-windows-and-winrar-flaws-to-485c8f26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Microsoft%20Windows%20and%20WinRAR%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=69396a6f8e5e216c62f5439a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13184-cwe-306-missing-authentication-for--6aa8fc80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13184%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Toto%20Link%20X5000R&apos;s%20(AX1800%20router)&amp;severity=critical&amp;id=69396f2b471be09b6e2e184c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-poisoning-amos-stealer-how-trust-became-the-big-96e2d626</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Poisoning%20%26%20AMOS%20Stealer%3A%20How%20Trust%20Became%20the%20Biggest%20Mac%20Threat&amp;severity=medium&amp;id=693985c05f410c6b20aa8a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warning-winrar-vulnerability-cve-2025-6218-under-a-3751b2b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warning%3A%20WinRAR%20Vulnerability%20CVE-2025-6218%20Under%20Active%20Attack%20by%20Multiple%20Threat%20Groups&amp;severity=medium&amp;id=693962928e5e216c62ed6a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-how-attackers-exploit-cloud-misconfigurati-7c23d909</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20How%20Attackers%20Exploit%20Cloud%20Misconfigurations%20Across%20AWS%2C%20AI%20Models%2C%20and%20Kubernetes&amp;severity=medium&amp;id=693962928e5e216c62ed6a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-epm-update-patches-critical-remote-code-exe-3e64c730</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20EPM%20Update%20Patches%20Critical%20Remote%20Code%20Execution%20Flaw&amp;severity=critical&amp;id=693962ba8e5e216c62ed8d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13953-cwe-290-authentication-bypass-by-sp-ba953c19</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13953%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20GTT%20Sistema%20de%20Informaci%C3%B3n%20Tributario&amp;severity=critical&amp;id=69395cf9e27bef3ae4bfd886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41358-cwe-639-authorization-bypass-throug-31721b4e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41358%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CronosWeb%20i2A%20CronosWeb&amp;severity=high&amp;id=69395a3ce27bef3ae4bc14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-vulnerabilities-with-december-b8b2aaaf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20Vulnerabilities%20With%20December%202025%20Security%20Updates&amp;severity=critical&amp;id=693955e7e27bef3ae4b677e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41732-cwe-121-stack-based-buffer-overflow-83be94cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41732%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%20Indsutrial-Managed-Switches&amp;severity=critical&amp;id=69395606e27bef3ae4b69151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41730-cwe-121-stack-based-buffer-overflow-997ca2ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41730%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%20Indsutrial-Managed-Switches&amp;severity=critical&amp;id=69395606e27bef3ae4b6914e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-woman-in-us-custody-for-aiding-russian-n-b69c49c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Woman%20in%20US%20Custody%20for%20Aiding%20Russian%20NoName057%20and%20CyberArmyofRussia_Reborn%20(CARR)%20Hacker%20Groups&amp;severity=medium&amp;id=69394a29681246c13df8636c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7073-cwe-59-improper-link-resolution-befo-55aefd0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7073%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Bitdefender%20Total%20Security&amp;severity=high&amp;id=693945e9681246c13df087ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-c81b34b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Fixed%20by%20Siemens%2C%20Rockwell%2C%20Schneider&amp;severity=medium&amp;id=69394257681246c13decfdd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/udpgangster-campaigns-target-multiple-countries-36af0845</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UDPGangster%20Campaigns%20Target%20Multiple%20Countries&amp;severity=medium&amp;id=693945e8681246c13df08639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-byovd-loader-behind-deadlock-ransomware-attack-21e84d6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20BYOVD%20loader%20behind%20DeadLock%20ransomware%20attack&amp;severity=medium&amp;id=693945e8681246c13df0864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-chimerawire-trojan-boosts-website-popularity-b-8e4db2c1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20ChimeraWire%20trojan%20boosts%20website%20popularity%20by%20skillfully%20pretending%20to%20be%20human&amp;severity=medium&amp;id=693945e8681246c13df08656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66675-cwe-459-incomplete-cleanup-in-apach-61559a01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66675%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Struts&amp;severity=high&amp;id=693945e9681246c13df087fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14390-cwe-434-unrestricted-upload-of-file-147fbd1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14390%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20videomerchant%20Video%20Merchant&amp;severity=high&amp;id=69393d10fd479f45ea600bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-spotlight-storm-0249-moves-from-mass-phishi-472482eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Spotlight%3A%20Storm-0249%20Moves%20from%20Mass%20Phishing%20to%20Precision%20EDR%20Exploitation&amp;severity=medium&amp;id=69393d10fd479f45ea600b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66004-cwe-35-path-traversal-in-libimobile-a616342a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66004%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20libimobiledevice%20usbmuxd&amp;severity=medium&amp;id=69393d10fd479f45ea600bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14082-improper-access-control-in-red-hat--8439bcda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14082%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69393d10fd479f45ea600bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1161-cwe-648-incorrect-use-of-privileged--9a69feca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1161%3A%20CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20NomySoft%20Information%20Technology%20Training%20and%20Consulting%20Inc.%20Nomysem&amp;severity=high&amp;id=69393d10fd479f45ea600bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14087-integer-overflow-or-wraparound-in-r-f2a8850d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14087%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GNOME%20glib&amp;severity=medium&amp;id=6939398dfd479f45ea5b2e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-security-fixes-for-56-flaws-inclu-72859fb1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Issues%20Security%20Fixes%20for%2056%20Flaws%2C%20Including%20Active%20Exploit%20and%20Two%20Zero-Days&amp;severity=critical&amp;id=69394a9c681246c13df8f911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9315-cwe-915-improperly-controlled-modifi-42e07a3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9315%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Moxa%20MXsecurity%20Series&amp;severity=medium&amp;id=69393610fd479f45ea552451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13955-cwe-330-use-of-insufficiently-rando-ef4a57fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13955%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=critical&amp;id=69393610fd479f45ea55244e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13954-cwe-798-use-of-hard-coded-credentia-75c8e886</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13954%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=critical&amp;id=69393610fd479f45ea55244b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intel-amd-processors-affected-by-pcie-vulnerabilit-ed071ff5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intel%2C%20AMD%20Processors%20Affected%20by%20PCIe%20Vulnerabilities&amp;severity=low&amp;id=69392a434db6a6ddfda90a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/free-honey-tokens-for-breach-detection-no-signup-0150b93e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Free%20Honey%20Tokens%20for%20Breach%20Detection%20-%20No%20Signup&amp;severity=high&amp;id=6939261a4db6a6ddfda2455a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12952-cwe-269-improper-privilege-manageme-e43c89ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12952%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Google%20Cloud%20Dialogflow%20CX&amp;severity=high&amp;id=69392a654db6a6ddfda93e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9571-cwe-502-deserialization-of-untrusted-57d07aa3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9571%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Google%20Cloud%20Cloud%20Data%20Fusion&amp;severity=high&amp;id=69391d0bed5c5e39c813c142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13073-cwe-79-cross-site-scripting-xss-in--eacde70e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13073%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20HandL%20UTM%20Grabber%20%2F%20Tracker&amp;severity=high&amp;id=69390de80d2afef9e5da1fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13072-cwe-79-cross-site-scripting-xss-in--a7caa04c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13072%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20HandL%20UTM%20Grabber%20%2F%20Tracker&amp;severity=high&amp;id=69390de80d2afef9e5da1fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-ivanti-and-sap-issue-urgent-patches-for-a-9a0f9a74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%2C%20Ivanti%2C%20and%20SAP%20Issue%20Urgent%20Patches%20for%20Authentication%20and%20Code%20Execution%20Flaws&amp;severity=critical&amp;id=6938fe57422a156f1941a383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13339-cwe-22-improper-limitation-of-a-pat-8a3e757b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13339%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20hippooo%20Hippoo%20Mobile%20App%20for%20WooCommerce&amp;severity=high&amp;id=6938fae1422a156f193ca26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9056-cwe-863-incorrect-authorization-in-t-3cc06726</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9056%3A%20CWE-863%20Incorrect%20Authorization%20in%20TECNO%20com.transsion.audiosmartconnect&amp;severity=medium&amp;id=6938ec92bc985c89a3e00f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13677-cwe-22-improper-limitation-of-a-pat-d2914fa3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13677%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20specialk%20Simple%20Download%20Counter&amp;severity=medium&amp;id=6938ec92bc985c89a3e00f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-sanctions-russian-and-chinese-firms-suspected-o-f6ec3f82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Sanctions%20Russian%20and%20Chinese%20Firms%20Suspected%20of%20Being%20%E2%80%98Malign%20Actors%E2%80%99%20in%20Information%20Warfare&amp;severity=critical&amp;id=6938de74bc985c89a3db811d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13613-cwe-289-authentication-bypass-by-al-337c03b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13613%3A%20CWE-289%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Elated%20Themes%20Elated%20Membership&amp;severity=critical&amp;id=6938de9abc985c89a3dc30ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67507-cwe-287-improper-authentication-in--ba9bcc7b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67507%3A%20CWE-287%3A%20Improper%20Authentication%20in%20filamentphp%20filament&amp;severity=high&amp;id=6938c96abc985c89a39766e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67485-cwe-693-protection-mechanism-failur-ecaac0e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67485%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20machphy%20mad-proxy&amp;severity=medium&amp;id=6938c4f57205ca471f2ee9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-10-15c6d22a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-10&amp;severity=medium&amp;id=693a0b73e425ca5072e02556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65297-na-48f48ec7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65297%3A%20n%2Fa&amp;severity=high&amp;id=6939efe25ab76fdc5f31bfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65296-na-d9c9fce4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65296%3A%20n%2Fa&amp;severity=medium&amp;id=6939efe25ab76fdc5f31bfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65295-na-a3ec530c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65295%3A%20n%2Fa&amp;severity=high&amp;id=6939ec5a5ab76fdc5f2d887d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65294-na-59ea7988</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65294%3A%20n%2Fa&amp;severity=critical&amp;id=6939e8d65ab76fdc5f28af17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65293-na-71da3245</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65293%3A%20n%2Fa&amp;severity=medium&amp;id=6939e8d65ab76fdc5f28af14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65292-na-efd74866</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65292%3A%20n%2Fa&amp;severity=high&amp;id=6939e8d65ab76fdc5f28af11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65291-na-ac461b5c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65291%3A%20n%2Fa&amp;severity=high&amp;id=6939e5605ab76fdc5f2656f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65290-na-bac4e138</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65290%3A%20n%2Fa&amp;severity=high&amp;id=6939e5605ab76fdc5f2656ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65832-na-e570b36f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65832%3A%20n%2Fa&amp;severity=medium&amp;id=6939e076a97935729e7b806d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65831-na-f69ea1c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65831%3A%20n%2Fa&amp;severity=high&amp;id=6939e076a97935729e7b8069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65830-na-3199f22e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65830%3A%20n%2Fa&amp;severity=critical&amp;id=6939e076a97935729e7b8065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65829-na-d61fbce7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65829%3A%20n%2Fa&amp;severity=medium&amp;id=6939e076a97935729e7b8061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65828-na-00871c42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65828%3A%20n%2Fa&amp;severity=medium&amp;id=6939dceba97935729e77408b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65827-na-cd303f74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65827%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e774048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65826-na-72c16726</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65826%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e774044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65825-na-8d5e22e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65825%3A%20n%2Fa&amp;severity=medium&amp;id=6939dce9a97935729e774040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65824-na-dd523ced</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65824%3A%20n%2Fa&amp;severity=high&amp;id=6939dce9a97935729e77403c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65823-na-20e0c8a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65823%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e774038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65822-na-406ca77e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65822%3A%20n%2Fa&amp;severity=medium&amp;id=6939dce9a97935729e774034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65821-na-a422c937</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65821%3A%20n%2Fa&amp;severity=high&amp;id=6939dce9a97935729e774030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65820-na-1aa1e722</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65820%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e77402b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24857-na-ec5847ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24857%3A%20n%2Fa&amp;severity=high&amp;id=6939dce9a97935729e774025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65512-na-694d07ed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65512%3A%20n%2Fa&amp;severity=high&amp;id=6939d96fa97935729e728440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65602-na-ebac8a04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65602%3A%20n%2Fa&amp;severity=critical&amp;id=6939d0b8c9771d4f43425bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63895-na-3154bb99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63895%3A%20n%2Fa&amp;severity=high&amp;id=6939cd32c9771d4f433dddb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56431-na-b38ca49e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56431%3A%20n%2Fa&amp;severity=high&amp;id=6939c62bc9771d4f4336c991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56430-na-6587a6ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56430%3A%20n%2Fa&amp;severity=high&amp;id=6939c2b1c9771d4f43317e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56429-na-21e193fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56429%3A%20n%2Fa&amp;severity=medium&amp;id=6939c2b1c9771d4f43317e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65754-na-81bd12d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65754%3A%20n%2Fa&amp;severity=medium&amp;id=6939b31dfe7b3954b6837bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63094-na-af680748</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63094%3A%20n%2Fa&amp;severity=high&amp;id=6939b0fa62aa6c8a0e4897a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52493-na-cbaaee07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52493%3A%20n%2Fa&amp;severity=medium&amp;id=6939a9f462aa6c8a0e3e35f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65815-na-f22a9cc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65815%3A%20n%2Fa&amp;severity=medium&amp;id=6939a47a62aa6c8a0e3b194b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65814-na-d80f8477</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65814%3A%20n%2Fa&amp;severity=medium&amp;id=6939a47a62aa6c8a0e3b1947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65792-na-271a8ac3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65792%3A%20n%2Fa&amp;severity=critical&amp;id=6939a30c62aa6c8a0e375594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65807-na-3d03cacc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65807%3A%20n%2Fa&amp;severity=high&amp;id=6939921d86adcdec9b0f4b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65803-na-b44e725c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65803%3A%20n%2Fa&amp;severity=medium&amp;id=6939921d86adcdec9b0f4b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67502-cwe-601-url-redirection-to-untruste-9ad65c05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67502%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20remram44%20taguette&amp;severity=medium&amp;id=6938b8747205ca471f053ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67501-cwe-89-improper-neutralization-of-s-14e94ab2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67501%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=6938b6b4b56b439e93ee886a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61808-unrestricted-upload-of-file-with-da-35155246</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61808%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20(CWE-434)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=6938b6b4b56b439e93ee886f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61813-improper-restriction-of-xml-externa-3444802a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61813%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=6938b6b4b56b439e93ee887e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61812-improper-input-validation-cwe-20-in-2d638faf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61812%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=6938b6b4b56b439e93ee887b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61821-improper-restriction-of-xml-externa-ff48f269</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61821%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b4b56b439e93ee8881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64898-insufficiently-protected-credential-73fed4fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64898%3A%20Insufficiently%20Protected%20Credentials%20(CWE-522)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b6b56b439e93ee88a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61810-deserialization-of-untrusted-data-c-f27bc1e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61810%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=6938b6b4b56b439e93ee8875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61809-improper-input-validation-cwe-20-in-f5a3ca2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61809%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=6938b6b4b56b439e93ee8872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61822-improper-input-validation-cwe-20-in-916a397f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61822%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b4b56b439e93ee8884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64897-improper-access-control-cwe-284-in--c3b971b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64897%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b6b56b439e93ee88a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61823-improper-restriction-of-xml-externa-da5215ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61823%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b4b56b439e93ee8887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61811-improper-access-control-cwe-284-in--df9b3e90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61811%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=6938b6b4b56b439e93ee8878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67499-cwe-200-exposure-of-sensitive-infor-eb778acf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67499%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20containernetworking%20plugins&amp;severity=medium&amp;id=6938aedab56b439e93e4e8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67496-cwe-79-improper-neutralization-of-i-9b629976</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67496%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6938a95ab56b439e93e1dcc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-spiderman-phishing-kit-targets-european-banks--092c0b4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Spiderman%20Phishing%20Kit%20Targets%20European%20Banks%20with%20Real-Time%20Credential%20Theft&amp;severity=medium&amp;id=6938a337d4eb7e5ad78128f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36437-cwe-209-generation-of-error-message-b9195b06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36437%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69389fb7d4eb7e5ad77c2812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66645-cwe-22-improper-limitation-of-a-pat-4abc9d25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66645%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zauberzeug%20nicegui&amp;severity=high&amp;id=69389a31d4eb7e5ad778aab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66039-cwe-287-improper-authentication-in--caeaff94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66039%3A%20CWE-287%3A%20Improper%20Authentication%20in%20FreePBX%20framework&amp;severity=critical&amp;id=693897e052fe50f9a4957ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53774-cwe-306-missing-authentication-for--706e5168</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53774%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MiniDVBLinux%20Simple%20VideoDiskRecorder%20Protocol%20SVDRP%20(svdrpsend.sh)%20Exploit&amp;severity=medium&amp;id=693890dd52fe50f9a48c9bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53771-cwe-306-missing-authentication-for--5900f5a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53771%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MiniDVBLinux%20MiniDVBLinux%20Change%20Root%20Password%20PoC&amp;severity=critical&amp;id=693890dd52fe50f9a48c9bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67489-cwe-94-improper-control-of-generati-dafe53aa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67489%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vitejs%20vite-plugin-react&amp;severity=critical&amp;id=693890dd52fe50f9a48c9bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53770-cwe-260-password-in-configuration-f-2e22b9e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53770%3A%20CWE-260%3A%20Password%20in%20Configuration%20File%20in%20MiniDVBLinux%20MiniDVBLinux(TM)%20Distribution%20(MLD)&amp;severity=high&amp;id=693890dd52fe50f9a48c9bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53739-cwe-260-password-in-configuration-f-bd0ef598</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53739%3A%20CWE-260%3A%20Password%20in%20Configuration%20File%20in%20Tinycontrol%20Tinycontrol%20LAN%20Controller%20v&amp;severity=critical&amp;id=69388d5552fe50f9a48acd12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13743-cwe-532-insertion-of-sensitive-info-5471929f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13743%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Docker%20Docker%20Desktop&amp;severity=low&amp;id=693889e152fe50f9a4851f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64896-creation-of-temporary-file-in-direc-d8c28ae3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64896%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Incorrect%20Permissions%20(CWE-379)%20in%20Adobe%20Creative%20Cloud%20Desktop&amp;severity=medium&amp;id=693889e152fe50f9a4851f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-nearly-140-vulnerabilities-b7196b0e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Nearly%20140%20Vulnerabilities&amp;severity=medium&amp;id=6938887ef4a79be77cce0cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67488-cwe-22-improper-limitation-of-a-pat-b778b9f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67488%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=693888a8f4a79be77cce2017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-57-vulnerabilities-three-zero-da-c36bdb2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%2057%20Vulnerabilities%2C%20Three%20Zero-Days&amp;severity=low&amp;id=6938887ef4a79be77cce0cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64899-out-of-bounds-read-cwe-125-in-adobe-c55f424b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64899%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69388b5252fe50f9a48983c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64785-untrusted-search-path-cwe-426-in-ad-9c2ad417</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64785%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69388b5252fe50f9a48983b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64786-improper-verification-of-cryptograp-fad1612e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64786%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20(CWE-347)%20in%20Adobe%20Acrobat%20Reader&amp;severity=low&amp;id=69388b5252fe50f9a48983b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64787-improper-verification-of-cryptograp-0b8443f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64787%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20(CWE-347)%20in%20Adobe%20Acrobat%20Reader&amp;severity=low&amp;id=69388b5252fe50f9a48983bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-december-2025-tue-dec-9th-44777e0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20December%202025%2C%20(Tue%2C%20Dec%209th)&amp;severity=critical&amp;id=6938954452fe50f9a4927f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66626-cwe-23-relative-path-traversal-in-a-aa6110fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66626%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=69388b5252fe50f9a48983c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-critical-forticloud-sso-login-au-00e63c42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20warns%20of%20critical%20FortiCloud%20SSO%20login%20auth%20bypass%20flaws&amp;severity=critical&amp;id=69388506f4a79be77cca2917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66625-cwe-200-exposure-of-sensitive-infor-e91dd722</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66625%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69388517f4a79be77cca2bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66457-cwe-94-improper-control-of-generati-0be57f6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66457%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20elysiajs%20elysia&amp;severity=high&amp;id=69388517f4a79be77cca2bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66456-cwe-1321-improperly-controlled-modi-88a4b2e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66456%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20elysiajs%20elysia&amp;severity=critical&amp;id=69387e02f4a79be77cc30993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66214-cwe-502-deserialization-of-untruste-ad9b4fc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66214%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wearefrank%20ladybug&amp;severity=high&amp;id=69388517f4a79be77cca2bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14337-sql-injection-in-itsourcecode-stude-581de7c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14337%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69388517f4a79be77cca2bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broadside-botnet-hits-tbk-dvrs-raising-alarms-for--3174ec3c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broadside%20botnet%20hits%20TBK%20DVRs%2C%20raising%20alarms%20for%20maritime%20logistics&amp;severity=medium&amp;id=693878cbef540ebbadc60712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-iab-abuses-edr-for-stealthy-malware-exe-1349a142</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20IAB%20abuses%20EDR%20for%20stealthy%20malware%20execution&amp;severity=high&amp;id=693878cbef540ebbadc6070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spain-arrests-teen-who-stole-64-million-personal-d-b546dba8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spain%20arrests%20teen%20who%20stole%2064%20million%20personal%20data%20records&amp;severity=high&amp;id=693878cbef540ebbadc6070e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-warns-of-critical-endpoint-manager-code-exe-ea7b1d32</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20warns%20of%20critical%20Endpoint%20Manager%20code%20execution%20flaw&amp;severity=critical&amp;id=693878cbef540ebbadc606fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64113-cwe-640-weak-password-recovery-mech-c6550325</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64113%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20EmbySupport%20security&amp;severity=critical&amp;id=6938790eef540ebbadc6252b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14336-sql-injection-in-itsourcecode-stude-70660a6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14336%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69387706ef540ebbadc35cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14335-sql-injection-in-itsourcecode-stude-a0e990a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14335%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69387706ef540ebbadc35ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9613-cwe-459-incomplete-cleanup-in-pci-si-fc6fc5a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9613%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20PCI-SIG%20PCI%20Express%20Integrity%20and%20Data%20Encryption%20(PCIe%20IDE)%20Specification&amp;severity=medium&amp;id=693871e8ef540ebbadbcf674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9614-cwe-354-improper-validation-of-integ-f867a994</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9614%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20PCI-SIG%20PCI%20Express%20Integrity%20and%20Data%20Encryption%20(PCIe%20IDE)%20Specification&amp;severity=medium&amp;id=693871e8ef540ebbadbcf677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9612-cwe-404-improper-resource-shutdown-o-5eff9416</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9612%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20PCI-SIG%20PCI%20Express%20Integrity%20and%20Data%20Encryption%20(PCIe%20IDE)%20Specification&amp;severity=medium&amp;id=693871e8ef540ebbadbcf671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14334-sql-injection-in-itsourcecode-stude-a3a1f160</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14334%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69386e50ef540ebbadbb02e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11531-cwe-22-improper-limitation-of-a-pat-9f005c87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11531%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20HP%20Inc%20HP%20System%20Event%20Utility&amp;severity=medium&amp;id=69386e50ef540ebbadbb02dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-actors-exploit-react2shell-to-d-9b86b0ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-linked%20Actors%20Exploit%20React2Shell%20to%20Deploy%20New%20EtherRAT%20Malware&amp;severity=critical&amp;id=69387729ef540ebbadc365b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34414-cwe-502-deserialization-of-untruste-f62487a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34414%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Entrust%20Corporation%20Instant%20Financial%20Issuance%20(IF)&amp;severity=critical&amp;id=693867e174ebaa3babaf6f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34413-cwe-693-protection-mechanism-failur-88097e70</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34413%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20DigitalPA%20S.r.l.%20Legality%20WHISTLEBLOWING&amp;severity=high&amp;id=693867e174ebaa3babaf6f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62221-cwe-416-use-after-free-in-microsoft-4c0e0d1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62221%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54100-cwe-77-improper-neutralization-of-s-56e11712</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54100%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e174ebaa3babaf6f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64680-cwe-122-heap-based-buffer-overflow--0204fd83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64680%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=693867eb74ebaa3babafb7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64679-cwe-122-heap-based-buffer-overflow--0674a726</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64679%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=693867eb74ebaa3babafb7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64678-cwe-122-heap-based-buffer-overflow--c0a7ae6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64678%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867eb74ebaa3babafb7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64672-cwe-79-improper-neutralization-of-i-90ca043f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64672%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Server%20Subscription%20Edition&amp;severity=high&amp;id=693867eb74ebaa3babafb7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64671-cwe-77-improper-neutralization-of-s-1a452cf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64671%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20GitHub%20Copilot%20Plugin%20for%20JetBrains%20IDEs&amp;severity=high&amp;id=693867eb74ebaa3babafb7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64661-cwe-362-concurrent-execution-using--e1d6745a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64661%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62565-cwe-416-use-after-free-in-microsoft-412c450f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62565%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62570-cwe-284-improper-access-control-in--fea7ccb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62570%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e974ebaa3babafb6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62569-cwe-416-use-after-free-in-microsoft-bb3caabf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62569%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e974ebaa3babafb6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62567-cwe-191-integer-underflow-wrap-or-w-f8d0da72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62567%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=693867e974ebaa3babafb6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62560-cwe-822-untrusted-pointer-dereferen-df9ce3a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62560%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62559-cwe-416-use-after-free-in-microsoft-c9c241a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62559%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62558-cwe-416-use-after-free-in-microsoft-d7817460</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62558%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62557-cwe-416-use-after-free-in-microsoft-ad420750</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62557%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62556-cwe-822-untrusted-pointer-dereferen-a769aee8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62556%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62555-cwe-416-use-after-free-in-microsoft-246f5577</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62555%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62554-cwe-843-access-of-resource-using-in-106f4f2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62554%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62553-cwe-416-use-after-free-in-microsoft-85669f53</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62553%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e574ebaa3babafb3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62552-cwe-23-relative-path-traversal-in-m-185ee976</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62552%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e574ebaa3babafb3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62550-cwe-787-out-of-bounds-write-in-micr-389e1f59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62550%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=693867e574ebaa3babafb3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62474-cwe-284-improper-access-control-in--e8c6f36f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62474%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62468-cwe-125-out-of-bounds-read-in-micro-1041844b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62468%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=693867e574ebaa3babafb38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62467-cwe-190-integer-overflow-or-wraparo-3470a249</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62467%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55233-cwe-125-out-of-bounds-read-in-micro-50ee2fc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55233%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62465-cwe-476-null-pointer-dereference-in-5653b24e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62465%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=693867e374ebaa3babaf6ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62464-cwe-126-buffer-over-read-in-microso-154b74f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62464%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62463-cwe-476-null-pointer-dereference-in-ba9af8f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62463%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=693867e374ebaa3babaf6fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62462-cwe-126-buffer-over-read-in-microso-a7af1c74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62462%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62461-cwe-126-buffer-over-read-in-microso-7e852e52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62461%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62455-cwe-20-improper-input-validation-in-c7819a26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62455%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e174ebaa3babaf6f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59517-cwe-284-improper-access-control-in--2fb8cc37</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59517%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e174ebaa3babaf6f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59516-cwe-306-missing-authentication-for--3f64e08b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59516%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64673-cwe-284-improper-access-control-in--1e4b2440</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64673%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867eb74ebaa3babafb7f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64670-cwe-200-exposure-of-sensitive-infor-23fd6f99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64670%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=693867eb74ebaa3babafb7e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64666-cwe-20-improper-input-validation-in-6a3a2311</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64666%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=693867eb74ebaa3babafb7e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64667-cwe-451-user-interface-ui-misrepres-b79402df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64667%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=693867eb74ebaa3babafb7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64658-cwe-362-concurrent-execution-using--33d73186</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64658%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e974ebaa3babafb701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62573-cwe-416-use-after-free-in-microsoft-4b105914</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62573%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62572-cwe-125-out-of-bounds-read-in-micro-7d92b211</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62572%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e974ebaa3babafb6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62571-cwe-20-improper-input-validation-in-e5298d66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62571%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62564-cwe-125-out-of-bounds-read-in-micro-4bd1b933</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62564%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e974ebaa3babafb6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62563-cwe-416-use-after-free-in-microsoft-dc52c52d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62563%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62562-cwe-416-use-after-free-in-microsoft-f45ea8b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62562%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62561-cwe-822-untrusted-pointer-dereferen-883e48d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62561%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62549-cwe-822-untrusted-pointer-dereferen-7b61d989</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62549%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62473-cwe-126-buffer-over-read-in-microso-c65b8fab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62473%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=693867e574ebaa3babafb397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62472-cwe-908-use-of-uninitialized-resour-8fc74d8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62472%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62470-cwe-122-heap-based-buffer-overflow--bf8c4644</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62470%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62469-cwe-362-concurrent-execution-using--d16bbf63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62469%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e574ebaa3babafb38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62466-cwe-476-null-pointer-dereference-in-a8524255</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62466%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e374ebaa3babaf6ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62458-cwe-122-heap-based-buffer-overflow--7d64282b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62458%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e374ebaa3babaf6fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62457-cwe-125-out-of-bounds-read-in-micro-908d948e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62457%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62456-cwe-122-heap-based-buffer-overflow--967b8009</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62456%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=693867e374ebaa3babaf6fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62454-cwe-122-heap-based-buffer-overflow--f81300dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62454%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33214-cwe-502-deserialization-of-untruste-30b025c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33214%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NVTabular&amp;severity=high&amp;id=693867eb74ebaa3babafb7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33213-cwe-502-deserialization-of-untruste-d59c5935</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33213%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Merlin%20Transformers4Rec&amp;severity=high&amp;id=693867ed74ebaa3babafb8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-dismantle-eur-700-million-crypto-scam-that--e184d41d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20Dismantle%20EUR%20700%20Million%20Crypto%20Scam%20That%20Used%20Deepfakes&amp;severity=medium&amp;id=6938611874ebaa3baba454b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64784-heap-based-buffer-overflow-cwe-122--8a02c151</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64784%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=693867ed74ebaa3babafb8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64894-integer-overflow-or-wraparound-cwe--842e6216</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64894%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=693867ed74ebaa3babafb8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64893-out-of-bounds-read-cwe-125-in-adobe-e4ecb79d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64893%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=693867ed74ebaa3babafb8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64783-integer-overflow-or-wraparound-cwe--22b0cfca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64783%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=693867ed74ebaa3babafb8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46636-cwe-59-improper-link-resolution-bef-4942ae5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46636%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%20Encryption&amp;severity=medium&amp;id=6938612b74ebaa3baba47aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46637-cwe-59-improper-link-resolution-bef-b894dd04</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46637%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%20Encryption&amp;severity=high&amp;id=6938612b74ebaa3baba47aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13924-cwe-352-cross-site-request-forgery--fc7fc2e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20maartenbelmans%20Advanced%20Product%20Fields%20(Product%20Addons)%20for%20WooCommerce&amp;severity=medium&amp;id=69385e4c74ebaa3baba14004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47570-escalation-of-privilege-in-fortinet-81742f65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47570%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSASE&amp;severity=medium&amp;id=69385e4c74ebaa3baba14001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59718-improper-access-control-in-fortinet-0f876669</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59718%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSwitchManager&amp;severity=critical&amp;id=69385e4c74ebaa3baba14018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59719-improper-access-control-in-fortinet-0920e1a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59719%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=critical&amp;id=69385e4c74ebaa3baba1401b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53679-execute-unauthorized-code-or-comman-fa38c6e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53679%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69385e4c74ebaa3baba14009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54353-execute-unauthorized-code-or-comman-b58aab62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54353%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69385e4c74ebaa3baba1400f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53949-execute-unauthorized-code-or-comman-db263690</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53949%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=69385e4c74ebaa3baba1400c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59810-information-disclosure-in-fortinet--b96c4fc1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59810%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69385e4e74ebaa3baba142a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59808-improper-access-control-in-fortinet-d7f8a0a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59808%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69385e4c74ebaa3baba1401e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54838-denial-of-service-in-fortinet-forti-e8d0a8dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54838%3A%20Denial%20of%20service%20in%20Fortinet%20FortiPortal&amp;severity=medium&amp;id=69385e4c74ebaa3baba14012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62631-improper-access-control-in-fortinet-62f1b11c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62631%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69385e4e74ebaa3baba142af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57823-information-disclosure-in-fortinet--8a6cd450</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57823%3A%20Information%20disclosure%20in%20Fortinet%20FortiAuthenticator&amp;severity=low&amp;id=69385e4c74ebaa3baba14015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64153-execute-unauthorized-code-or-comman-e30e4830</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64153%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiExtender&amp;severity=medium&amp;id=69385e4e74ebaa3baba142b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59923-escalation-of-privilege-in-fortinet-6fbcb894</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59923%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAuthenticator&amp;severity=low&amp;id=69385e4e74ebaa3baba142a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64156-execute-unauthorized-code-or-comman-af1c03a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64156%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=medium&amp;id=69385e4e74ebaa3baba142b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64471-escalation-of-privilege-in-fortinet-8c5b7680</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64471%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69385e4e74ebaa3baba142bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60024-escalation-of-privilege-in-fortinet-f779c471</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60024%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiVoice&amp;severity=high&amp;id=69385e4e74ebaa3baba142ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64447-escalation-of-privilege-in-fortinet-c796bd90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64447%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=high&amp;id=69385e4e74ebaa3baba142b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deceptive-layoff-themed-hr-email-distributes-remco-3d46f4ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deceptive%20Layoff-Themed%20HR%20Email%20Distributes%20Remcos%20RAT%20Malware&amp;severity=medium&amp;id=69393d10fd479f45ea600b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-deep-dive-cve-2025-55182-exploit-mecha-e59529aa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Deep%20Dive%3A%20CVE-2025-55182%20Exploit%20Mechanics&amp;severity=medium&amp;id=69385e4a74ebaa3baba13e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12946-cwe-20-improper-input-validation-in-32c2e1ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12946%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20RS700&amp;severity=medium&amp;id=693859487515e08d31691a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12945-cwe-20-improper-input-validation-in-da55affa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12945%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20R7000P&amp;severity=low&amp;id=693859487515e08d31691a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12941-cwe-306-missing-authentication-for--35b134a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12941%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NETGEAR%20C6220&amp;severity=medium&amp;id=693859487515e08d31691a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22675-cwe-352-cross-site-request-forgery--2d9848f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22675%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Taylor%20Hawkes%20WP%20Fast%20Cache&amp;severity=medium&amp;id=693856d07515e08d316631d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23729-cwe-862-missing-authorization-in-br-7808f784</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23729%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20Spectra&amp;severity=medium&amp;id=693856d07515e08d316631d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13662-cwe-347-improper-verification-of-cr-f05b8f97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13662%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69384a3e795dcaf6c511e715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13661-cwe-22-improper-limitation-of-a-pat-70c8d3fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13661%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69384a3e795dcaf6c511e712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-threat-clusters-using-castleloader-as-graybra-6ffca990</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Threat%20Clusters%20Using%20CastleLoader%20as%20GrayBravo%20Expands%20Its%20Malware%20Service%20Infrastructure&amp;severity=medium&amp;id=693856987515e08d31661ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13659-cwe-913-improper-control-of-dynamic-a0dcaef6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13659%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69384a3e795dcaf6c511e70f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9638-cwe-79-improper-neutralization-of-in-fcf4868d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9638%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=69384a3e795dcaf6c511e718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5469-cwe-427-uncontrolled-search-path-ele-8e154ec9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5469%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Yandex%20Messenger&amp;severity=high&amp;id=69384a3e795dcaf6c511e71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10573-cwe-79-improper-neutralization-of-i-6f6b03b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10573%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=69384a3e795dcaf6c511e71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5471-cwe-427-uncontrolled-search-path-ele-ba521245</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5471%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Yandex%20Telemost&amp;severity=high&amp;id=69384a3e795dcaf6c511e722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5470-cwe-427-uncontrolled-search-path-ele-6ba69e90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5470%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Yandex%20Disk&amp;severity=high&amp;id=693846bf795dcaf6c50de093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13642-cwe-94-improper-control-of-generati-c7ae8165</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13642%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=69383fbf795dcaf6c50728aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-attacks-linked-to-north-korean-hackers-7b3221f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Attacks%20Linked%20to%20North%20Korean%20Hackers&amp;severity=medium&amp;id=69383fa3795dcaf6c506fbbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67467-cross-site-request-forgery-csrf-in--9a0b18d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67467%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20GiveWP&amp;severity=medium&amp;id=69383cf4795dcaf6c5045d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66533-improper-control-of-generation-of-c-6530de79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66533%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20StellarWP%20GiveWP&amp;severity=high&amp;id=69383cf4795dcaf6c5045d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-geminijack-0-click-flaw-in-gemini-ai-exposed-u-7d49ff8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20GeminiJack%200-Click%20Flaw%20in%20Gemini%20AI%20Exposed%20Users%20to%20Data%20Leaks&amp;severity=medium&amp;id=69383a9b29cea75c35b75806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2296-cwe-20-improper-input-validation-in--66719f1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2296%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TianoCore%20EDK2&amp;severity=high&amp;id=69383abe29cea75c35b76e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14345-cwe-667-improper-locking-in-mongodb-0773889f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14345%3A%20CWE-667%20Improper%20Locking%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=69383abe29cea75c35b76e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38798-cwe-200-exposure-of-sensitive-infor-d77915c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38798%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TianoCore%20EDK2&amp;severity=medium&amp;id=69383abe29cea75c35b76e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63077-missing-authorization-in-happymonst-785e6147</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63077%3A%20Missing%20Authorization%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69383acf29cea75c35b7703e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63076-improper-control-of-filename-for-in-96a02240</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Dream-Theme%20The7%20Elements&amp;severity=high&amp;id=69383acf29cea75c35b7703b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63075-improper-neutralization-of-input-du-d215a044</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20muffingroup%20Betheme&amp;severity=medium&amp;id=69383acf29cea75c35b77038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63074-improper-control-of-filename-for-in-ac7d45e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63074%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Dream-Theme%20The7&amp;severity=high&amp;id=69383acf29cea75c35b77035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63073-improper-neutralization-of-input-du-d0d5b764</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63073%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dream-Theme%20The7&amp;severity=medium&amp;id=69383acf29cea75c35b77032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63072-improper-neutralization-of-input-du-e44b6168</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20THEMECO%20Cornerstone&amp;severity=medium&amp;id=69383acd29cea75c35b77013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63071-insertion-of-sensitive-information--88c7db5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63071%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=69383acd29cea75c35b77010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63070-exposure-of-sensitive-system-inform-70e8417d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63070%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Shahjada%20Download%20Manager&amp;severity=medium&amp;id=69383acd29cea75c35b7700d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63069-missing-authorization-in-vinod-dalv-8299237e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63069%3A%20Missing%20Authorization%20in%20Vinod%20Dalvi%20Ivory%20Search&amp;severity=medium&amp;id=69383acd29cea75c35b7700a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63068-improper-neutralization-of-script-r-4fe6f810</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63068%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20sevenspark%20Contact%20Form%207%20%E2%80%93%20Dynamic%20Text%20Extension&amp;severity=medium&amp;id=69383acd29cea75c35b77007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63067-missing-authorization-in-p-themes-p-66a25afc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63067%3A%20Missing%20Authorization%20in%20p-themes%20Porto%20Theme%20-%20Functionality&amp;severity=medium&amp;id=69383acd29cea75c35b77004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63066-improper-neutralization-of-input-du-11dc8daa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63066%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20p-themes%20Porto%20Theme%20-%20Functionality&amp;severity=medium&amp;id=69383acd29cea75c35b77001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63065-authorization-bypass-through-user-c-aefb1ca5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63065%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=medium&amp;id=69383acd29cea75c35b76ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63064-improper-neutralization-of-input-du-46273717</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63064%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ashanjay%20EventON&amp;severity=medium&amp;id=69383acd29cea75c35b76ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63063-missing-authorization-in-yandex-met-5efa5a8c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63063%3A%20Missing%20Authorization%20in%20Yandex%20Metrika%20Yandex.Metrica&amp;severity=medium&amp;id=69383acd29cea75c35b76ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63062-improper-control-of-filename-for-in-e964683c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AndonDesign%20UDesign%20Core&amp;severity=high&amp;id=69383acb29cea75c35b76fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63061-improper-neutralization-of-input-du-430ac3c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63061%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=69383acb29cea75c35b76fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63060-cross-site-request-forgery-csrf-in--b203696b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63060%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=69383acb29cea75c35b76fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63059-improper-neutralization-of-input-du-7eb35267</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arscode%20Ninja%20Popups&amp;severity=medium&amp;id=69383acb29cea75c35b76fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63058-exposure-of-sensitive-system-inform-1a819795</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63058%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Hiroaki%20Miyashita%20Custom%20Field%20Template&amp;severity=medium&amp;id=69383acb29cea75c35b76fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63057-improper-neutralization-of-input-du-bb038a8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Roxnor%20Wp%20Ultimate%20Review&amp;severity=high&amp;id=69383acb29cea75c35b76fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63056-missing-authorization-in-bestwebsof-ad070b73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63056%3A%20Missing%20Authorization%20in%20bestwebsoft%20Contact%20Form%20by%20BestWebSoft&amp;severity=medium&amp;id=69383acb29cea75c35b76fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63055-improper-neutralization-of-input-du-231e3c9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63055%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69383acb29cea75c35b76fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63054-missing-authorization-in-expresstec-b23a1914</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63054%3A%20Missing%20Authorization%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=69383acb29cea75c35b76fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63052-improper-neutralization-of-input-du-7cbb11a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63052%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GalleryCreator%20SimpLy%20Gallery&amp;severity=medium&amp;id=69383acb29cea75c35b76fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63050-improper-neutralization-of-input-du-86f99dcf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63050%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sizam%20REHub%20Framework&amp;severity=medium&amp;id=69383ac929cea75c35b76f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63049-missing-authorization-in-cridiostud-5896101b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63049%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro%20Lead%20Form&amp;severity=medium&amp;id=69383ac929cea75c35b76f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63048-improper-neutralization-of-input-du-5386c11e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63048%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro%20Lead%20Form&amp;severity=medium&amp;id=69383ac929cea75c35b76f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63047-missing-authorization-in-cridiostud-cc0e655a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63047%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=medium&amp;id=69383ac929cea75c35b76f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63046-improper-neutralization-of-input-du-bacbd573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=medium&amp;id=69383ac929cea75c35b76f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63045-improper-neutralization-of-input-du-9e7aa94f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63045%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20Pro&amp;severity=medium&amp;id=69383ac929cea75c35b76f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63044-improper-neutralization-of-input-du-64a85726</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=medium&amp;id=69383ac929cea75c35b76f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63042-improper-neutralization-of-input-du-c4b3100a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Tutor%20LMS%20Elementor%20Addons&amp;severity=medium&amp;id=69383ac929cea75c35b76f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63037-improper-neutralization-of-input-du-c9f9cedb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DFDevelopment%20Ronneby%20Theme%20Core&amp;severity=medium&amp;id=69383ac929cea75c35b76f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63036-improper-control-of-filename-for-in-69cfb5e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63036%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20DFDevelopment%20Ronneby%20Theme%20Core&amp;severity=high&amp;id=69383ac929cea75c35b76f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63035-improper-neutralization-of-input-du-8d5bcbcf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=medium&amp;id=69383ac729cea75c35b76f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63034-missing-authorization-in-steve-trum-11a1c383</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63034%3A%20Missing%20Authorization%20in%20Steve%20Truman%20Page%20View%20Count&amp;severity=medium&amp;id=69383ac729cea75c35b76f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63033-improper-neutralization-of-input-du-6a96a2d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Riyadh%20Ahmed%20Make%20Section%20%26amp%3B%20Column%20Clickable%20For%20Elementor&amp;severity=medium&amp;id=69383ac729cea75c35b76f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63030-cross-site-request-forgery-csrf-in--bfb022de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63030%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=high&amp;id=69383ac729cea75c35b76f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63028-missing-authorization-in-shinetheme-6a80dce8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63028%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=medium&amp;id=69383ac729cea75c35b76f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63024-missing-authorization-in-tychesoftw-1fd23310</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63024%3A%20Missing%20Authorization%20in%20tychesoftwares%20Order%20Delivery%20Date%20for%20WooCommerce&amp;severity=medium&amp;id=69383ac729cea75c35b76f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63023-missing-authorization-in-easy-payme-c33060bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63023%3A%20Missing%20Authorization%20in%20Easy%20Payment%20Payment%20Gateway%20for%20PayPal%20on%20WooCommerce&amp;severity=medium&amp;id=69383ac729cea75c35b76f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63015-missing-authorization-in-paysera-wo-764d677f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63015%3A%20Missing%20Authorization%20in%20paysera%20WooCommerce%20Payment%20Gateway%20-%20Paysera&amp;severity=medium&amp;id=69383ac729cea75c35b76f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63013-exposure-of-sensitive-system-inform-879cfbe4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63013%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=69383ac729cea75c35b76f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63012-cross-site-request-forgery-csrf-in--e32dac84</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63012%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=69383ac729cea75c35b76f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63011-improper-neutralization-of-input-du-8e77617a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=69383ac529cea75c35b76f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63010-server-side-request-forgery-ssrf-in-5bd4188b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63010%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemesInflow%20Hercules%20Core&amp;severity=medium&amp;id=69383ac529cea75c35b76f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63009-exposure-of-sensitive-system-inform-e29bc895</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63009%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20yuvalo%20WP%20Google%20Analytics%20Events&amp;severity=medium&amp;id=69383ac529cea75c35b76f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63008-missing-authorization-in-wedevs-wp--e2f0fb76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63008%3A%20Missing%20Authorization%20in%20weDevs%20WP%20ERP&amp;severity=medium&amp;id=69383ac529cea75c35b76f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63007-insertion-of-sensitive-information--14143a49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63007%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=69383ac529cea75c35b76f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63006-missing-authorization-in-metagauss--67cb0e84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63006%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=69383ac529cea75c35b76f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63003-improper-control-of-filename-for-in-1404e90d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63003%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20North%20-%20Required%20Plugin&amp;severity=high&amp;id=69383ac529cea75c35b76f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62999-missing-authorization-in-themezaa-l-c625092a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62999%3A%20Missing%20Authorization%20in%20themezaa%20Litho%20Addons&amp;severity=medium&amp;id=69383ac529cea75c35b76f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62997-insertion-of-sensitive-information--b76045cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62997%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20levelfourdevelopment%20WP%20EasyCart&amp;severity=medium&amp;id=69383ac529cea75c35b76f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62996-missing-authorization-in-code-amp-c-32eb9273</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62996%3A%20Missing%20Authorization%20in%20Code%20Amp%20Custom%20Layouts%20%E2%80%93%20Post%20%2B%20Product%20grids%20made%20easy&amp;severity=medium&amp;id=69383ac529cea75c35b76f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62995-missing-authorization-in-multiparce-ce24186a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62995%3A%20Missing%20Authorization%20in%20multiparcels%20MultiParcels%20Shipping%20For%20WooCommerce&amp;severity=medium&amp;id=69383ac329cea75c35b76f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62994-insertion-of-sensitive-information--078c693b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62994%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Messiah%20WP%20AI%20CoPilot&amp;severity=medium&amp;id=69383ac329cea75c35b76f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62993-missing-authorization-in-rainafarai-d17511ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62993%3A%20Missing%20Authorization%20in%20rainafarai%20Notification%20for%20Telegram&amp;severity=medium&amp;id=69383ac329cea75c35b76f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62873-cross-site-request-forgery-csrf-in--a45528b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62873%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flashyapp%20WP%20Flashy%20Marketing%20Automation&amp;severity=medium&amp;id=69383ac329cea75c35b76f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62872-cross-site-request-forgery-csrf-in--eb3469b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62872%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JK%20Social%20Photo%20Fetcher&amp;severity=medium&amp;id=69383ac329cea75c35b76f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62871-cross-site-request-forgery-csrf-in--497b6be8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62871%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alex%20Prokopenko%20%2F%20JustCoded%20Just%20TinyMCE%20Custom%20Styles&amp;severity=medium&amp;id=69383ac329cea75c35b76f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62870-missing-authorization-in-eupago-eup-a35029c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62870%3A%20Missing%20Authorization%20in%20Eupago%20Eupago%20Gateway%20For%20Woocommerce&amp;severity=medium&amp;id=69383ac329cea75c35b76f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62869-missing-authorization-in-gravitecne-0e2bb350</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62869%3A%20Missing%20Authorization%20in%20Gravitec.net%20-%20Web%20Push%20Notifications%20Gravitec.net%20%26%238211%3B%20Web%20Push%20Notifications&amp;severity=medium&amp;id=69383ac329cea75c35b76f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62867-missing-authorization-in-ergonet-er-a17844a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62867%3A%20Missing%20Authorization%20in%20ergonet%20Ergonet%20Cache&amp;severity=medium&amp;id=69383ac329cea75c35b76f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62866-cross-site-request-forgery-csrf-in--6f328beb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62866%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Valerio%20Monti%20Auto%20Alt%20Text&amp;severity=medium&amp;id=69383ac329cea75c35b76f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62865-missing-authorization-in-evan-herma-ec74df0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62865%3A%20Missing%20Authorization%20in%20Evan%20Herman%20Post%20Cloner&amp;severity=medium&amp;id=69383ac129cea75c35b76eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62762-cross-site-request-forgery-csrf-in--aea9bc4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62762%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20photoboxone%20SMTP%20Mail&amp;severity=medium&amp;id=69383ac129cea75c35b76ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62740-missing-authorization-in-mario-pesh-d8b55eba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62740%3A%20Missing%20Authorization%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=medium&amp;id=69383ac129cea75c35b76ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62739-cross-site-request-forgery-csrf-in--ae737b66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62739%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=high&amp;id=69383ac129cea75c35b76ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62738-missing-authorization-in-mmattax-fo-2ed827ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62738%3A%20Missing%20Authorization%20in%20mmattax%20Formstack%20Online%20Forms&amp;severity=medium&amp;id=69383ac129cea75c35b76ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62737-exposure-of-sensitive-system-inform-9616ecea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62737%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20opicron%20Image%20Cleanup&amp;severity=medium&amp;id=69383ac129cea75c35b76edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62736-missing-authorization-in-opicron-im-9b627ff4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62736%3A%20Missing%20Authorization%20in%20opicron%20Image%20Cleanup&amp;severity=medium&amp;id=69383ac129cea75c35b76ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62735-exposure-of-sensitive-system-inform-7955f5a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62735%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Joel%20User%20Spam%20Remover&amp;severity=medium&amp;id=69383ac129cea75c35b76ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62734-cross-site-request-forgery-csrf-in--568b1d08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62734%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20M.Code%20Media%20Library%20Downloader&amp;severity=medium&amp;id=69383ac129cea75c35b76ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62733-cross-site-request-forgery-csrf-in--8d31b1cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62733%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ProteusThemes%20Custom%20Sidebars%20by%20ProteusThemes&amp;severity=medium&amp;id=69383ac129cea75c35b76ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62153-missing-authorization-in-graham-qui-f17eeeb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62153%3A%20Missing%20Authorization%20in%20Graham%20Quick%20Interest%20Slider&amp;severity=high&amp;id=69383abf29cea75c35b76eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62151-missing-authorization-in-virtuaria--57b64cca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62151%3A%20Missing%20Authorization%20in%20Virtuaria%20Virtuaria%20PagBank%20%2F%20PagSeguro%20para%20Woocommerce&amp;severity=high&amp;id=69383abf29cea75c35b76ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62109-insertion-of-sensitive-information--cfacd158</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62109%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20INFINITUM%20FORM%20Geo%20Controller&amp;severity=high&amp;id=69383abf29cea75c35b76ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62103-cross-site-request-forgery-csrf-in--6bd47f17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62103%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmediadownload%20Media%20Library%20File%20Download&amp;severity=medium&amp;id=69383abf29cea75c35b76ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62102-cross-site-request-forgery-csrf-in--2793e6dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62102%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20apasionados%20DoFollow%20Case%20by%20Case&amp;severity=medium&amp;id=69383abf29cea75c35b76e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62100-missing-authorization-in-themerain--fbab56d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62100%3A%20Missing%20Authorization%20in%20themerain%20ThemeRain%20Core&amp;severity=medium&amp;id=69383abf29cea75c35b76e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62093-improper-neutralization-of-special--20834e1c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62093%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Image%26Video%20FullScreen%20Background&amp;severity=high&amp;id=69383abf29cea75c35b76e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62090-missing-authorization-in-jegstudio--fd1cae60</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62090%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse%20News%20%E2%80%93%20Advanced%20News%20Magazine%20Blog%20Gutenberg%20Blocks%20Addons&amp;severity=medium&amp;id=69383abf29cea75c35b76e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62086-missing-authorization-in-akazanstev-28a7de5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62086%3A%20Missing%20Authorization%20in%20akazanstev%20%D0%AF%D0%BD%D0%B4%D0%B5%D0%BA%D1%81%20%D0%94%D0%BE%D1%81%D1%82%D0%B0%D0%B2%D0%BA%D0%B0%20(Boxberry)&amp;severity=medium&amp;id=69383abf29cea75c35b76e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62085-missing-authorization-in-berthaai-b-f1d24aff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62085%3A%20Missing%20Authorization%20in%20Bertha%20AI%20%26%238211%3B%20Andrew%20Palmer%20BERTHA%20AI&amp;severity=medium&amp;id=69383abf29cea75c35b76e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62082-improper-neutralization-of-input-du-6ac34db4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62082%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nasir%20Uddin%20Generic%20Elements&amp;severity=medium&amp;id=69383abe29cea75c35b76e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59132-cross-site-request-forgery-csrf-in--c571cccc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59132%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Badi%20Jones%20Duplicate%20Content%20Cure&amp;severity=medium&amp;id=69383abe29cea75c35b76e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49351-cross-site-request-forgery-csrf-in--2eb8ee63</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49351%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Valentin%20Agachi%20Create%20Posts%20%26amp%3B%20Terms&amp;severity=high&amp;id=69383abe29cea75c35b76e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49350-missing-authorization-in-marcoingra-a530dcf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49350%3A%20Missing%20Authorization%20in%20marcoingraiti%20Actionwear%20products%20sync&amp;severity=medium&amp;id=69383abe29cea75c35b76e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49347-cross-site-request-forgery-csrf-in--f7ce8d0b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49347%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jupitercow%20WP%20sIFR&amp;severity=high&amp;id=69383abe29cea75c35b76e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49341-cross-site-request-forgery-csrf-in--6503febd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49341%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alex%20Furr%20PDF%20Creator%20Lite&amp;severity=high&amp;id=69383abe29cea75c35b76e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10655-cwe-89-improper-neutralization-of-s-208859b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10655%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Frappe%20Frappe%20HelpDesk&amp;severity=high&amp;id=69383abe29cea75c35b76e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12504-cwe-89-improper-neutralization-of-s-68b62eb6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12504%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Talent%20Software%20UNIS&amp;severity=critical&amp;id=6938372729cea75c35b3810a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6923-cwe-79-improper-neutralization-of-in-effdb21e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Talent%20Software%20UNIS&amp;severity=medium&amp;id=693833b029cea75c35ae5795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67599-missing-authorization-in-webtoffee--c35558b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67599%3A%20Missing%20Authorization%20in%20WebToffee%20WebToffee%20eCommerce%20Marketing%20Automation&amp;severity=medium&amp;id=693833b029cea75c35ae5792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67598-cross-site-request-forgery-csrf-in--b67e0650</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67598%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PSM%20Plugins%20SupportCandy&amp;severity=medium&amp;id=693833b029cea75c35ae578f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67597-missing-authorization-in-shahjahan--25738481</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67597%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20Fluent%20Booking&amp;severity=medium&amp;id=693833b029cea75c35ae578c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67596-cross-site-request-forgery-csrf-in--173af554</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67596%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Strategy11%20Team%20Business%20Directory&amp;severity=medium&amp;id=693833ae29cea75c35ae5779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67595-cross-site-request-forgery-csrf-in--ebd40c1e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67595%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=medium&amp;id=693833ae29cea75c35ae5776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67594-authorization-bypass-through-user-c-3361b4dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67594%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ThimPress%20Thim%20Elementor%20Kit&amp;severity=medium&amp;id=693833ae29cea75c35ae5773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67593-cross-site-request-forgery-csrf-in--630227aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67593%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stiofan%20UsersWP&amp;severity=medium&amp;id=693833ae29cea75c35ae5770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67592-missing-authorization-in-joe-dolson-cf0837cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67592%3A%20Missing%20Authorization%20in%20Joe%20Dolson%20My%20Calendar&amp;severity=medium&amp;id=693833ae29cea75c35ae576d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67591-cross-site-request-forgery-csrf-in--596b00b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67591%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jegtheme%20JNews%20Paywall&amp;severity=medium&amp;id=693833ae29cea75c35ae576a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67590-cross-site-request-forgery-csrf-in--5d9bc0e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67590%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rustaurius%20Ultimate%20FAQ&amp;severity=medium&amp;id=693833ae29cea75c35ae5767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67589-missing-authorization-in-wp-overnig-13cca67e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67589%3A%20Missing%20Authorization%20in%20WP%20Overnight%20WooCommerce%20PDF%20Invoices%20%26%20Packing%20Slips&amp;severity=medium&amp;id=693833ae29cea75c35ae5764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67588-missing-authorization-in-elementor--ab56bbcd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67588%3A%20Missing%20Authorization%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=693833ae29cea75c35ae5761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67587-url-redirection-to-untrusted-site-o-9bb99b66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67587%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20FreshDesk%20Plugin&amp;severity=medium&amp;id=693833ae29cea75c35ae575e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67586-missing-authorization-in-ronald-hue-95f96fa2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67586%3A%20Missing%20Authorization%20in%20Ronald%20Huereca%20Highlight%20and%20Share&amp;severity=medium&amp;id=693833ad29cea75c35ae571d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67585-url-redirection-to-untrusted-site-o-b688a46f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67585%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX&amp;severity=medium&amp;id=693833ad29cea75c35ae571a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67584-missing-authorization-in-rtcamp-god-1f3e88a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67584%3A%20Missing%20Authorization%20in%20rtCamp%20GoDAM&amp;severity=medium&amp;id=693833ad29cea75c35ae5717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67583-missing-authorization-in-themeateli-4ff15b64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67583%3A%20Missing%20Authorization%20in%20Foysal%20Imran%20IDonate&amp;severity=medium&amp;id=693833ad29cea75c35ae5714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67582-missing-authorization-in-wbcomdesig-4b6b752c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67582%3A%20Missing%20Authorization%20in%20wbcomdesigns%20Wbcom%20Designs&amp;severity=medium&amp;id=693833ad29cea75c35ae5711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67581-missing-authorization-in-themetechm-00e4a9a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67581%3A%20Missing%20Authorization%20in%20themetechmount%20TrueBooker&amp;severity=medium&amp;id=693833ad29cea75c35ae570e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67580-missing-authorization-in-constant-c-d339a2c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67580%3A%20Missing%20Authorization%20in%20Constant%20Contact%20Constant%20Contact%20%2B%20WooCommerce&amp;severity=medium&amp;id=693833ad29cea75c35ae570b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67579-missing-authorization-in-vanquish-u-2d6a3a8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67579%3A%20Missing%20Authorization%20in%20vanquish%20User%20Extra%20Fields&amp;severity=medium&amp;id=693833ad29cea75c35ae5708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67578-missing-authorization-in-rhys-wynne-0ad3314a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67578%3A%20Missing%20Authorization%20in%20Rhys%20Wynne%20WP%20Email%20Capture&amp;severity=medium&amp;id=693833ad29cea75c35ae5705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67577-missing-authorization-in-hassantafr-e71a04c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67577%3A%20Missing%20Authorization%20in%20hassantafreshi%20Easy%20Form%20Builder&amp;severity=medium&amp;id=693833ad29cea75c35ae5702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67576-missing-authorization-in-quantumclo-6a55b341</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67576%3A%20Missing%20Authorization%20in%20QuantumCloud%20Simple%20Link%20Directory&amp;severity=medium&amp;id=693833ab29cea75c35ae56ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67575-missing-authorization-in-andrew-lim-c9f95871</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67575%3A%20Missing%20Authorization%20in%20Andrew%20Lima%20Sitewide%20Notice%20WP&amp;severity=medium&amp;id=693833ab29cea75c35ae56e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67574-missing-authorization-in-wpdevart-b-2be34c23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67574%3A%20Missing%20Authorization%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=medium&amp;id=693833ab29cea75c35ae56e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67573-missing-authorization-in-thimpress--af14614a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67573%3A%20Missing%20Authorization%20in%20ThimPress%20Sailing&amp;severity=medium&amp;id=693833ab29cea75c35ae56e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67572-missing-authorization-in-pencidesig-572e2687</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67572%3A%20Missing%20Authorization%20in%20PenciDesign%20PenNews&amp;severity=medium&amp;id=693833ab29cea75c35ae56e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67570-missing-authorization-in-gsheetconn-e5c06848</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67570%3A%20Missing%20Authorization%20in%20WesternDeal%20WPForms%20Google%20Sheet%20Connector&amp;severity=medium&amp;id=693833ab29cea75c35ae56dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67569-missing-authorization-in-scriptsbun-5654b18b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67569%3A%20Missing%20Authorization%20in%20scriptsbundle%20AdForest&amp;severity=medium&amp;id=693833ab29cea75c35ae56da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67568-missing-authorization-in-xtemos-bas-81a72714</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67568%3A%20Missing%20Authorization%20in%20xtemos%20Basel&amp;severity=medium&amp;id=693833ab29cea75c35ae56d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67567-exposure-of-sensitive-system-inform-4ef39e2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67567%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20uixthemes%20Sober&amp;severity=medium&amp;id=693833ab29cea75c35ae56d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67566-missing-authorization-in-wofficeio--f4c32b89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67566%3A%20Missing%20Authorization%20in%20WofficeIO%20Woffice%20Core&amp;severity=medium&amp;id=693833ab29cea75c35ae56d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67565-exposure-of-sensitive-system-inform-823bd606</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67565%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20sizam%20Rehub&amp;severity=medium&amp;id=693833a929cea75c35ae56b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67564-exposure-of-sensitive-system-inform-5708047f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67564%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20alekv%20Pixel%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=693833a929cea75c35ae56b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67563-missing-authorization-in-saad-iqbal-4b60609c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67563%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20Post%20SMTP&amp;severity=medium&amp;id=693833a929cea75c35ae56af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67562-missing-authorization-in-webcodingp-3e1f68bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67562%3A%20Missing%20Authorization%20in%20WebCodingPlace%20Image%20Caption%20Hover%20Pro&amp;severity=medium&amp;id=693833a929cea75c35ae56ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67561-missing-authorization-in-oleksandr--c4e44fe9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67561%3A%20Missing%20Authorization%20in%20Oleksandr%20Lysyi%20Debug%20Log%20Viewer&amp;severity=medium&amp;id=693833a929cea75c35ae56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67560-missing-authorization-in-webilia-in-31c6cbaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67560%3A%20Missing%20Authorization%20in%20Webilia%20Inc.%20Listdom&amp;severity=medium&amp;id=693833a929cea75c35ae56a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67559-missing-authorization-in-vcita-onli-38afffd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67559%3A%20Missing%20Authorization%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=medium&amp;id=693833a929cea75c35ae56a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67558-improper-neutralization-of-input-du-a6fcfee4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jacques%20Malgrange%20Rencontre&amp;severity=medium&amp;id=693833a929cea75c35ae56a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67557-improper-neutralization-of-input-du-f68e3c0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rhys%20Wynne%20WP%20eBay%20Product%20Feeds&amp;severity=medium&amp;id=693833a929cea75c35ae569d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67556-improper-neutralization-of-input-du-f525e7ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHigh%20Advanced%20FAQ%20Manager&amp;severity=medium&amp;id=693833a929cea75c35ae569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67555-improper-neutralization-of-input-du-df68242c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20useStrict%20UseStrict%26%23039%3Bs%20Calendly%20Embedder&amp;severity=medium&amp;id=693833a729cea75c35ae534e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67554-improper-neutralization-of-input-du-5acad7ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Humanityco%20Cookie%20Notice%20%26%20Compliance%20for%20GDPR%20%2F%20CCPA&amp;severity=medium&amp;id=693833a729cea75c35ae534b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67553-improper-neutralization-of-input-du-7c578907</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHigh%20Advanced%20FAQ%20Manager&amp;severity=medium&amp;id=693833a729cea75c35ae5348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67552-improper-neutralization-of-input-du-8921e8d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WalkerWP%20Walker%20Core&amp;severity=medium&amp;id=693833a729cea75c35ae5345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67551-improper-neutralization-of-input-du-41b2bc27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wappointment%20team%20Wappointment&amp;severity=medium&amp;id=693833a729cea75c35ae5342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67550-improper-neutralization-of-input-du-a3322e64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rhewlif%20Donation%20Thermometer&amp;severity=medium&amp;id=693833a729cea75c35ae533f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67549-improper-neutralization-of-input-du-40b567a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20oik&amp;severity=medium&amp;id=693833a729cea75c35ae533c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67545-improper-neutralization-of-input-du-6518bc15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FirePlugins%20FireBox&amp;severity=medium&amp;id=693833a729cea75c35ae5339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67544-improper-neutralization-of-input-du-5cd294d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Get%20Bowtied%20Shopkeeper%20Extender&amp;severity=medium&amp;id=693833a729cea75c35ae5336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67543-improper-neutralization-of-input-du-8b7a965c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Catch%20Themes%20Essential%20Widgets&amp;severity=medium&amp;id=693833a729cea75c35ae5333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67542-improper-neutralization-of-input-du-5340c43d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SilkyPress%20Multi-Step%20Checkout%20for%20WooCommerce&amp;severity=medium&amp;id=693833a629cea75c35ae52fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67541-improper-neutralization-of-input-du-8d13c3bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lester%20Chan%20WP-ShowHide&amp;severity=high&amp;id=693833a629cea75c35ae52fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67540-missing-authorization-in-wealcoder--aa599489</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67540%3A%20Missing%20Authorization%20in%20Wealcoder%20Animation%20Addons%20for%20Elementor&amp;severity=medium&amp;id=693833a629cea75c35ae52f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67539-improper-neutralization-of-input-du-adf6bc3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Select-Themes%20Select%20Core&amp;severity=medium&amp;id=693833a629cea75c35ae52f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67538-improper-neutralization-of-input-du-99313a42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20JNews%20Gallery&amp;severity=medium&amp;id=693833a629cea75c35ae52f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67537-improper-neutralization-of-input-du-ce35981c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blair%20Williams%20ThirstyAffiliates&amp;severity=medium&amp;id=693833a529cea75c35ae52ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67536-improper-neutralization-of-input-du-85a929de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20LearnPress&amp;severity=medium&amp;id=693833a529cea75c35ae52ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67535-deserialization-of-untrusted-data-i-56be1f60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67535%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Flipper%20Code%20-%20WordPress%20Development%20Company%20WP%20Maps&amp;severity=medium&amp;id=693833a529cea75c35ae52e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67534-cross-site-request-forgery-csrf-in--e617f5a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67534%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jacques%20Malgrange%20Rencontre&amp;severity=high&amp;id=693833a529cea75c35ae52e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67533-improper-neutralization-of-input-du-5331b767</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Portfolio%20Post&amp;severity=medium&amp;id=693833a529cea75c35ae52e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67532-improper-control-of-filename-for-in-146f7fdf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67532%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Hara&amp;severity=critical&amp;id=693833a329cea75c35ae52af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67531-improper-control-of-filename-for-in-c1d5d142</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20trippleS%20Turitor&amp;severity=critical&amp;id=693833a329cea75c35ae52ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67530-improper-control-of-filename-for-in-370cb7d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67530%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Besa&amp;severity=critical&amp;id=693833a329cea75c35ae52a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67529-improper-control-of-filename-for-in-c6112063</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67529%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Opal_WP%20Fashion&amp;severity=critical&amp;id=693833a329cea75c35ae52a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67528-improper-control-of-filename-for-in-6d24602e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67528%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Urna&amp;severity=medium&amp;id=693833a329cea75c35ae52a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67527-improper-control-of-filename-for-in-0575eb75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67527%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20trippleS%20Digiqole&amp;severity=critical&amp;id=693833a329cea75c35ae52a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67526-improper-control-of-filename-for-in-ee00b5fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67526%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20Sailing&amp;severity=critical&amp;id=693833a329cea75c35ae529d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67525-improper-control-of-filename-for-in-4d090bb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67525%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Opal_WP%20ekommart&amp;severity=critical&amp;id=693833a329cea75c35ae529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67524-improper-control-of-filename-for-in-500122e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67524%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NooTheme%20Jobmonster%20Elementor%20Addon&amp;severity=critical&amp;id=693833a329cea75c35ae5297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67523-improper-control-of-filename-for-in-dd897ff0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67523%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20trippleS%20Exhibz&amp;severity=critical&amp;id=693833a329cea75c35ae5294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67522-improper-control-of-filename-for-in-52b6c00f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67522%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=critical&amp;id=693833a229cea75c35ae5248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67521-improper-control-of-filename-for-in-a5e6f293</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67521%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Select%20Core&amp;severity=critical&amp;id=693833a229cea75c35ae5245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67520-improper-neutralization-of-special--86b58465</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67520%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tiny%20Solutions%20Media%20Library%20Tools&amp;severity=critical&amp;id=693833a229cea75c35ae5242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67519-improper-neutralization-of-special--e8cf7b3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67519%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjahan%20Jewel%20Ninja%20Tables&amp;severity=critical&amp;id=693833a129cea75c35ae523e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67518-improper-neutralization-of-special--762ace43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67518%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Accordion%20Slider%20PRO&amp;severity=critical&amp;id=693833a129cea75c35ae523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67517-improper-neutralization-of-special--54a116cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67517%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20artplacer%20ArtPlacer%20Widget&amp;severity=critical&amp;id=693833a129cea75c35ae5238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67516-improper-neutralization-of-special--0dae50fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67516%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Agile%20Logix%20Store%20Locator%20WordPress&amp;severity=critical&amp;id=693833a129cea75c35ae5235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67515-improper-control-of-filename-for-in-c5ce483f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67515%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wilm%C3%ABr&amp;severity=critical&amp;id=693833a129cea75c35ae5232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67474-missing-authorization-in-ultimate-m-8201ffb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67474%3A%20Missing%20Authorization%20in%20Ultimate%20Member%20ForumWP&amp;severity=medium&amp;id=693833a129cea75c35ae522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67473-cross-site-request-forgery-csrf-in--986a518e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67473%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codeworkweb%20CWW%20Companion&amp;severity=high&amp;id=693833a129cea75c35ae522c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67472-cross-site-request-forgery-csrf-in--860719ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67472%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=high&amp;id=693833a029cea75c35ae51f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67471-cross-site-request-forgery-csrf-in--ce1fd08c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67471%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saad%20Iqbal%20Quick%20Contact%20Form&amp;severity=high&amp;id=693833a029cea75c35ae51f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67470-exposure-of-sensitive-system-inform-f678fb99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67470%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Essential%20Plugin%20Portfolio%20and%20Projects&amp;severity=medium&amp;id=693833a029cea75c35ae51f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67469-cross-site-request-forgery-csrf-in--3a1db176</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67469%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kubiq%20PDF%20Thumbnail%20Generator&amp;severity=high&amp;id=693833a029cea75c35ae51ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67468-missing-authorization-in-crm-perks--04a5b423</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67468%3A%20Missing%20Authorization%20in%20CRM%20Perks%20Integration%20for%20Salesforce%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%2C%20Ninja%20Forms&amp;severity=medium&amp;id=693833a029cea75c35ae51eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67466-missing-authorization-in-sergiotrin-9dc6fdf4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67466%3A%20Missing%20Authorization%20in%20sergiotrinity%20Trinity%20Audio&amp;severity=high&amp;id=693833a029cea75c35ae51e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67465-cross-site-request-forgery-csrf-in--c5bf03ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67465%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QuantumCloud%20Simple%20Link%20Directory&amp;severity=high&amp;id=693833a029cea75c35ae51e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66534-missing-authorization-in-elated-the-547c0344</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66534%3A%20Missing%20Authorization%20in%20Elated-Themes%20The%20Aisle&amp;severity=high&amp;id=693833a029cea75c35ae51e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66532-missing-authorization-in-mikado-the-e11e371c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66532%3A%20Missing%20Authorization%20in%20Mikado-Themes%20Powerlift&amp;severity=high&amp;id=693833a029cea75c35ae51df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66531-cross-site-request-forgery-csrf-in--56483f6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66531%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=high&amp;id=693833a029cea75c35ae51dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66530-missing-authorization-in-webba-appo-4968db25</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66530%3A%20Missing%20Authorization%20in%20Webba%20Appointment%20Booking%20Webba%20Booking&amp;severity=high&amp;id=6938339e29cea75c35ae4c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66529-cross-site-request-forgery-csrf-in--7d6d14f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66529%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Chartify&amp;severity=high&amp;id=6938339e29cea75c35ae4c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66528-missing-authorization-in-villatheme-358cbc5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66528%3A%20Missing%20Authorization%20in%20VillaTheme%20Thank%20You%20Page%20Customizer%20for%20WooCommerce&amp;severity=high&amp;id=6938339e29cea75c35ae4c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66527-missing-authorization-in-vankarwai--51e99026</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66527%3A%20Missing%20Authorization%20in%20VanKarWai%20Lobo&amp;severity=medium&amp;id=6938339e29cea75c35ae4c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66526-missing-authorization-in-essekia-ta-19147bb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66526%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome&amp;severity=medium&amp;id=6938339e29cea75c35ae4c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66525-missing-authorization-in-elastic-em-1e36780c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66525%3A%20Missing%20Authorization%20in%20Elastic%20Email%20Elastic%20Email%20Sender&amp;severity=medium&amp;id=6938339e29cea75c35ae4c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64257-missing-authorization-in-joe-dolson-37698cfa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64257%3A%20Missing%20Authorization%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=medium&amp;id=6938339e29cea75c35ae4c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64256-cross-site-request-forgery-csrf-in--2f42f9f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64256%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PressTigers%20Simple%20Folio&amp;severity=high&amp;id=6938339e29cea75c35ae4c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64255-missing-authorization-in-bowo-admin-7ca4ddbb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64255%3A%20Missing%20Authorization%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=high&amp;id=6938339e29cea75c35ae4c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64254-missing-authorization-in-ronald-hue-b5959794</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64254%3A%20Missing%20Authorization%20in%20Ronald%20Huereca%20Photo%20Block&amp;severity=high&amp;id=6938339e29cea75c35ae4c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9368-cwe-770-allocation-of-resources-with-37c19149</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9368%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Rockwell%20Automation%20432ES-IG3%20Series%20A&amp;severity=high&amp;id=6938301129cea75c35ac7daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12807-cwe-89-improper-neutralization-of-s-87565862</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12807%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20DataMosaix%E2%84%A2%20Private%20Cloud&amp;severity=high&amp;id=69382bbdabbdc4595cd8b6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12558-cwe-200-exposure-of-sensitive-infor-d9e6dad6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12558%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=69382bbdabbdc4595cd8b6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12705-cwe-79-improper-neutralization-of-i-267f3118</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20widgetpack%20Reviews%20Widgets%20for%20Google%2C%20Yelp%20%26%20TripAdvisor&amp;severity=high&amp;id=69382bbdabbdc4595cd8b6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10876-cwe-79-improper-neutralization-of-i-536c4b49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Talent%20Software%20e-BAP%20Automation&amp;severity=medium&amp;id=69382bbdabbdc4595cd8b6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12381-cwe-269-improper-privilege-manageme-b5ea9b7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12381%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20AlgoSec%20Firewall%20Analyzer&amp;severity=medium&amp;id=69382bbdabbdc4595cd8b6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6924-cwe-79-improper-neutralization-of-in-81334038</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Talent%20Software%20e-BAP%20Automation&amp;severity=medium&amp;id=69382835abbdc4595cd48505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14333-vulnerability-in-mozilla-firefox-338be044</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14333%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382835abbdc4595cd48500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14332-vulnerability-in-mozilla-firefox-a8b9cae5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14332%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382835abbdc4595cd484fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14331-vulnerability-in-mozilla-firefox-f5731ea9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14331%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69382835abbdc4595cd484f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14330-vulnerability-in-mozilla-firefox-d3f25089</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14330%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382835abbdc4595cd484f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14329-vulnerability-in-mozilla-firefox-41afe31c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14329%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd484b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14328-vulnerability-in-mozilla-firefox-64edfbb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14328%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd484ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14327-vulnerability-in-mozilla-firefox-1f64f716</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14327%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd484a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14326-vulnerability-in-mozilla-firefox-47304e2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14326%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382833abbdc4595cd484a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14325-vulnerability-in-mozilla-firefox-339f7358</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14325%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd4849f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14324-vulnerability-in-mozilla-firefox-23edcca8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14324%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382833abbdc4595cd48499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14323-vulnerability-in-mozilla-firefox-7f450cf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14323%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd48493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14322-vulnerability-in-mozilla-firefox-2a656996</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14322%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd4848d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14321-vulnerability-in-mozilla-firefox-d6dd328a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14321%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382833abbdc4595cd48488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-0249-escalates-ransomware-attacks-with-click-b1c0ccc9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-0249%20Escalates%20Ransomware%20Attacks%20with%20ClickFix%2C%20Fileless%20PowerShell%2C%20and%20DLL%20Sideloading&amp;severity=low&amp;id=693835f429cea75c35b236f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stac6565-targets-canada-in-80-of-attacks-as-gold-b-064d51de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=STAC6565%20Targets%20Canada%20in%2080%25%20of%20Attacks%20as%20Gold%20Blade%20Deploys%20QWCrypt%20Ransomware&amp;severity=high&amp;id=693824acabbdc4595cceb6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56464-cwe-548-in-ibm-ibm-qradar-siem-4947e234</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56464%3A%20CWE-548%20in%20IBM%20IBM%20QRadar%20SIEM&amp;severity=low&amp;id=69382833abbdc4595cd48485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simplex-chat-x-account-hacked-fake-site-promotes-c-5fac797c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SimpleX%20Chat%20X%20Account%20Hacked%2C%20Fake%20Site%20Promotes%20Crypto%20Wallet%20Scam&amp;severity=medium&amp;id=693824acabbdc4595cceb6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneeit-wordpress-rce-exploited-in-the-wild-while-i-211edcb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneeit%20WordPress%20RCE%20Exploited%20in%20the%20Wild%20While%20ICTBroadcast%20Bug%20Fuels%20Frost%20Botnet%20Attacks&amp;severity=medium&amp;id=69381cd61b76610347c61f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-lazaruss-it-workers-scheme-was-caught-live-on--00a199ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Lazarus&apos;s%20IT%20Workers%20Scheme%20Was%20Caught%20Live%20on%20Camera&amp;severity=medium&amp;id=69381cd61b76610347c61f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11022-cwe-352-cross-site-request-forgery--17082a46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11022%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Personal%20Project%20Panilux&amp;severity=critical&amp;id=69381cd71b76610347c61fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-posts-10-million-bounty-for-iranian-hackers-73d9ee27</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Posts%20%2410%20Million%20Bounty%20for%20Iranian%20Hackers&amp;severity=medium&amp;id=693817c81b76610347be18df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-broadside-botnet-poses-risk-to-shipping-compan-766cd5e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98Broadside%E2%80%99%20Botnet%20Poses%20Risk%20to%20Shipping%20Companies&amp;severity=medium&amp;id=69380ec81b76610347b0f87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-streamline-zero-trust-using-the-shared-sign-834f41d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Streamline%20Zero%20Trust%20Using%20the%20Shared%20Signals%20Framework&amp;severity=medium&amp;id=6938173f1b76610347bd8cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-adds-layered-defenses-to-chrome-to-block-in-5e8cf916</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Adds%20Layered%20Defenses%20to%20Chrome%20to%20Block%20Indirect%20Prompt%20Injection%20Threats&amp;severity=low&amp;id=6938173f1b76610347bd8cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40941-cwe-200-exposure-of-sensitive-infor-4b7cba68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40941%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=6938009429016b16de45ff5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40940-cwe-200-exposure-of-sensitive-infor-c879c455</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40940%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=6938009229016b16de45fef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40939-cwe-284-improper-access-control-in--a833a871</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40939%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=6938009229016b16de45fef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40938-cwe-798-use-of-hard-coded-credentia-2d01bae9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40938%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=high&amp;id=6938009229016b16de45fef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40937-cwe-77-improper-neutralization-of-s-11d658c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40937%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=high&amp;id=6938009229016b16de45feed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40935-cwe-20-improper-input-validation-in-a1cf7e89</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40935%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20RUGGEDCOM%20RMC8388%20V5.X&amp;severity=medium&amp;id=6938009229016b16de45feea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40831-cwe-20-improper-input-validation-in-f6c49cb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40831%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=6938009229016b16de45fee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40830-cwe-285-improper-authorization-in-s-a35e877d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40830%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=6938009229016b16de45fee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40820-cwe-940-improper-verification-of-so-205975b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40820%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Siemens%20SIDOOR%20ATD430W&amp;severity=high&amp;id=6938009229016b16de45fee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40819-cwe-863-incorrect-authorization-in--28af2c58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40819%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=6938009229016b16de45fede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40818-cwe-732-incorrect-permission-assign-0d67538c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40818%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=low&amp;id=6938009229016b16de45fedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40807-cwe-294-authentication-bypass-by-ca-a2c79d8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40807%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Siemens%20Gridscale%20X%20Prepay&amp;severity=medium&amp;id=6938009029016b16de45feae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40806-cwe-204-observable-response-discrep-022bcb0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40806%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Siemens%20Gridscale%20X%20Prepay&amp;severity=medium&amp;id=6938009029016b16de45feab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40801-cwe-295-improper-certificate-valida-a9403f7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40801%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20COMOS%20V10.6&amp;severity=high&amp;id=6938009029016b16de45fea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40800-cwe-295-improper-certificate-valida-524ee832</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40800%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20COMOS%20V10.6&amp;severity=high&amp;id=6938009029016b16de45fea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56840-cwe-74-improper-neutralization-of-s-bbdbcc10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56840%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56839-cwe-74-improper-neutralization-of-s-4ce939fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56839%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56838-cwe-74-improper-neutralization-of-s-06f53dd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56838%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56837-cwe-77-improper-neutralization-of-s-7849a436</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56837%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56836-cwe-77-improper-neutralization-of-s-578b6f12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56836%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56835-cwe-74-improper-neutralization-of-s-509c330a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56835%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-gangs-turn-to-shanya-exe-packer-to-hide-0b4fe55b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20gangs%20turn%20to%20Shanya%20EXE%20packer%20to%20hide%20EDR%20killers&amp;severity=high&amp;id=6938006b29016b16de45e52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-malicious-vs-code-go-npm-and-rust-3a2ba24e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Malicious%20VS%20Code%2C%20Go%2C%20npm%2C%20and%20Rust%20Packages%20Stealing%20Developer%20Data&amp;severity=high&amp;id=6938006b29016b16de45e535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-300000-individuals-impacted-by-vitas-hospice--afd2e027</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20300%2C000%20Individuals%20Impacted%20by%20Vitas%20Hospice%20Data%20Breach&amp;severity=medium&amp;id=6937f19127e9f45fce65528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stac6565-targets-canada-in-80-of-attacks-as-gold-b-4e1065a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=STAC6565%20Targets%20Canada%20in%2080%25%20of%20Attacks%20as%20Gold%20Blade%20Deploys%20QWCrypt%20Ransomware&amp;severity=high&amp;id=6938069e29016b16de4f9968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-amos-infostealer-is-piggybacking-chatgpts-chat-49a39f2d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AMOS%20infostealer%20is%20piggybacking%20ChatGPT%E2%80%99s%20chat-sharing%20feature%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6937ee2327e9f45fce633bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59029-cwe-617-reachable-assertion-in-powe-52b30495</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59029%3A%20CWE-617%20Reachable%20Assertion%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6937f1ad27e9f45fce65730b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59030-cwe-276-incorrect-default-permissio-0c33e98f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59030%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20PowerDNS%20Recursor&amp;severity=high&amp;id=6937f1ad27e9f45fce65730e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66271-unquoted-search-path-or-element-in--88268e8a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66271%3A%20Unquoted%20search%20path%20or%20element%20in%20ELECOM%20CO.%2CLTD.%20Clone%20for%20Windows&amp;severity=medium&amp;id=6937e2ceca0f3871ecb6363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64696-use-of-cache-containing-sensitive-i-d2a72885</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64696%3A%20Use%20of%20cache%20containing%20sensitive%20information%20in%20Brother%20Industries%2C%20Ltd.%20Android%20App%20%22Brother%20iPrint%26Scan%22&amp;severity=low&amp;id=6937def0ca0f3871ecb2c5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41693-cwe-770-allocation-of-resources-wit-a73993fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41693%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41696-cwe-798-use-of-hard-coded-credentia-11a96c38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41696%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41694-cwe-770-allocation-of-resources-wit-9e794692</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41694%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41692-cwe-916-use-of-password-hash-with-i-476e0764</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41692%3A%20CWE-916%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41697-cwe-1299-missing-protection-mechani-0fdb4d6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41697%3A%20CWE-1299%20Missing%20Protection%20Mechanism%20for%20Alternate%20Hardware%20Interface%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41695-cwe-79-improper-neutralization-of-i-cca55d68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41745-cwe-79-improper-neutralization-of-i-d9a0a9f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41745%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41746-cwe-79-improper-neutralization-of-i-39f72e90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41747-cwe-79-improper-neutralization-of-i-ae45e959</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41748-cwe-79-improper-neutralization-of-i-6e52ee35</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41749-cwe-79-improper-neutralization-of-i-a32d191e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a4048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41750-cwe-79-improper-neutralization-of-i-7c678f4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a404b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41751-cwe-79-improper-neutralization-of-i-c5f7c48b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a404e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41752-cwe-79-improper-neutralization-of-i-11daa6b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a4051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-malicious-vs-code-go-npm-and-rust-d7223e55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Malicious%20VS%20Code%2C%20Go%2C%20npm%2C%20and%20Rust%20Packages%20Stealing%20Developer%20Data&amp;severity=medium&amp;id=6937ea6bca0f3871ecc0fe59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14309-cwe-476-null-pointer-dereference-in-d0ed9382</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14309%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20ravynsoft%20ravynos&amp;severity=high&amp;id=6937d709964788758a861be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14308-cwe-190-integer-overflow-or-wraparo-15413a22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14308%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Robocode%20Project%20Robocode&amp;severity=critical&amp;id=6937d709964788758a861be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14307-cwe-377-in-robocode-project-robocod-28898719</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14307%3A%20CWE-377%20in%20Robocode%20Project%20Robocode&amp;severity=critical&amp;id=6937d385964788758a7fe753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14306-cwe-22-improper-limitation-of-a-pat-c54e87ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14306%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Robocode%20Project%20Robocode&amp;severity=critical&amp;id=6937d709964788758a861be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13428-cwe-20-improper-input-validation-in-257aa804</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13428%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Cloud%20Google%20Cloud%20SecOps%20SOAR&amp;severity=high&amp;id=6937c4a55092139813fc0f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13071-cwe-79-cross-site-scripting-xss-in--48937ecc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13071%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Custom%20Admin%20Menu&amp;severity=high&amp;id=6937bd663ce8502056bafcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13070-cwe-22-improper-limitation-of-a-pat-9c609082</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13070%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CSV%20to%20SortTable&amp;severity=medium&amp;id=6937bd663ce8502056bafcc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13031-cwe-79-cross-site-scripting-xss-in--2d39b083</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13031%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=6937bd663ce8502056bafcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-activity-clusters-target-multiple-ind-43d97952</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Activity%20Clusters%20Target%20Multiple%20Industries&amp;severity=medium&amp;id=693819561b76610347bfb3b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14284-cross-site-scripting-xss-in-tiptape-17ed7e90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14284%3A%20Cross-site%20Scripting%20(XSS)%20in%20%40tiptap%2Fextension-link&amp;severity=medium&amp;id=6937aed7c0f7ae2eacecdbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13604-cwe-79-improper-neutralization-of-i-adbf2583</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cleantalk%20Login%20Security%2C%20FireWall%2C%20Malware%20removal%20by%20CleanTalk&amp;severity=high&amp;id=6937aa2bf0d475f65e959edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67504-cwe-331-insufficient-entropy-in-wbc-5bf971f6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67504%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20WBCE%20WBCE_CMS&amp;severity=critical&amp;id=69379c1c0af42da4c573d331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66631-cwe-502-deserialization-of-untruste-6f9015f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66631%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MarimerLLC%20csla&amp;severity=high&amp;id=69379c1c0af42da4c573d32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66627-cwe-416-use-after-free-in-wasmi-lab-12994177</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66627%3A%20CWE-416%3A%20Use%20After%20Free%20in%20wasmi-labs%20wasmi&amp;severity=high&amp;id=6937a044f0d475f65e8bac86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66578-cwe-248-uncaught-exception-in-robri-9f49337f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66578%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20robrichards%20xmlseclibs&amp;severity=medium&amp;id=6937a044f0d475f65e8bac81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42928-cwe-502-deserialization-of-untruste-9ab39dbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42928%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20jConnect%20-%20SDK%20for%20ASE&amp;severity=critical&amp;id=69378a8b0af42da4c56f97c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42904-cwe-549-missing-password-field-mask-b1d71738</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42904%3A%20CWE-549%3A%20Missing%20Password%20Field%20Masking%20in%20SAP_SE%20Application%20Server%20ABAP&amp;severity=medium&amp;id=69378a8b0af42da4c56f97c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42896-cwe-116-improper-encoding-or-escapi-31d1342b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42896%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69378a890af42da4c56f96d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42891-cwe-862-missing-authorization-in-sa-631c1b08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42891%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Enterprise%20Search%20for%20ABAP&amp;severity=medium&amp;id=69378a890af42da4c56f96d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42880-cwe-94-improper-control-of-generati-51f11621</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42880%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Solution%20Manager&amp;severity=critical&amp;id=69378a890af42da4c56f96d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42878-cwe-1244-internal-asset-exposed-to--d50ed2de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42878%3A%20CWE-1244%3A%20Internal%20Asset%20Exposed%20to%20Unsafe%20Debug%20Access%20Level%20or%20State%20in%20SAP_SE%20SAP%20Web%20Dispatcher%20and%20Internet%20Communication%20Manager%20(ICM)&amp;severity=high&amp;id=69378a890af42da4c56f96cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42877-cwe-787-out-of-bounds-write-in-saps-4e99348d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42877%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20SAP_SE%20SAP%20Web%20Dispatcher%2C%20Internet%20Communication%20Manager%20and%20SAP%20Content%20Server&amp;severity=high&amp;id=69378a890af42da4c56f96c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42876-cwe-405-asymmetric-resource-consump-c168cc00</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42876%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20S%2F4%20HANA%20Private%20Cloud%20(Financials%20General%20Ledger)&amp;severity=high&amp;id=69378a890af42da4c56f96c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42875-cwe-306-missing-authentication-for--47f7742c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42875%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20NetWeaver%20Internet%20Communication%20Framework&amp;severity=medium&amp;id=69378a890af42da4c56f96c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42874-cwe-405-asymmetric-resource-consump-4ce1bcd3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42874%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20NetWeaver%20(remote%20service%20for%20Xcelsius)&amp;severity=high&amp;id=69378a890af42da4c56f96bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42873-cwe-405-asymmetric-resource-consump-002faf62</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42873%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAPUI5%20framework%20(Markdown-it%20component)&amp;severity=medium&amp;id=69378a890af42da4c56f96b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42872-cwe-489-active-debug-code-in-sapse--7d460c4b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42872%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal&amp;severity=medium&amp;id=69378a890af42da4c56f96b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66622-cwe-755-improper-handling-of-except-969a34b3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66622%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20matrix-org%20matrix-rust-sdk&amp;severity=low&amp;id=69378a8b0af42da4c56f97d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66568-cwe-347-improper-verification-of-cr-3227f29f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66568%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAML-Toolkits%20ruby-saml&amp;severity=critical&amp;id=69378a8b0af42da4c56f97cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66567-cwe-347-improper-verification-of-cr-c4aef5a9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66567%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAML-Toolkits%20ruby-saml&amp;severity=critical&amp;id=69378a8b0af42da4c56f97ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66565-cwe-252-unchecked-return-value-in-g-89b510f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66565%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20gofiber%20utils&amp;severity=critical&amp;id=693783830af42da4c56cfe7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66508-cwe-290-authentication-bypass-by-sp-ea0053f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66508%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%201Panel-dev%201Panel&amp;severity=medium&amp;id=693783830af42da4c56cfe76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14286-information-disclosure-in-tenda-ac9-b6d0c498</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14286%3A%20Information%20Disclosure%20in%20Tenda%20AC9&amp;severity=medium&amp;id=693783830af42da4c56cfe6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53835-9236f4e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53835&amp;severity=null&amp;id=6937d709964788758a861bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66507-cwe-602-client-side-enforcement-of--e0e5b8e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66507%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%201Panel-dev%201Panel&amp;severity=high&amp;id=693783830af42da4c56cfe71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14285-sql-injection-in-code-projects-empl-8baecf01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14285%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=693779c10af42da4c555dffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66481-cwe-80-improper-neutralization-of-s-13a5bdaf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66481%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=693771bc9bbcd7dc91e5c88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66470-cwe-79-improper-neutralization-of-i-ed065f81</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66470%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69376b769bbcd7dc91d243c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53805-985112e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53805&amp;severity=null&amp;id=6937dce3ca0f3871ecb1621e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53779-f67384b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53779&amp;severity=low&amp;id=695b8f06db813ff03e463842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-09-dc261da7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-09&amp;severity=medium&amp;id=6938ba537205ca471f065815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65513-na-22176379</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65513%3A%20n%2Fa&amp;severity=high&amp;id=6938956652fe50f9a492979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65882-na-7d1d5ed6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65882%3A%20n%2Fa&amp;severity=critical&amp;id=69387706ef540ebbadc35cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65741-na-4d681e7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65741%3A%20n%2Fa&amp;severity=critical&amp;id=69387706ef540ebbadc35ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65572-na-006ced74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65572%3A%20n%2Fa&amp;severity=medium&amp;id=693871e8ef540ebbadbcf66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65300-na-de53d473</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65300%3A%20n%2Fa&amp;severity=medium&amp;id=693871e8ef540ebbadbcf667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65573-na-f55e4ea1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65573%3A%20n%2Fa&amp;severity=high&amp;id=69386e50ef540ebbadbb02e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61258-na-a34410c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61258%3A%20n%2Fa&amp;severity=high&amp;id=693867ed74ebaa3babafb8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61078-na-d19b7157</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61078%3A%20n%2Fa&amp;severity=medium&amp;id=693867ed74ebaa3babafb8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65594-na-3c6098e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65594%3A%20n%2Fa&amp;severity=high&amp;id=693867e174ebaa3babaf6f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64085-na-c623bbcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64085%3A%20n%2Fa&amp;severity=medium&amp;id=6938612b74ebaa3baba47ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64086-na-7fbb2559</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64086%3A%20n%2Fa&amp;severity=medium&amp;id=69385b9074ebaa3bab9ecced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63742-na-4fa27747</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63742%3A%20n%2Fa&amp;severity=critical&amp;id=693856d07515e08d316631e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63740-na-fd775487</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63740%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63739-na-f4063b4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63739%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63738-na-d84bc5ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63738%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63737-na-737624fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63737%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56704-na-1ebe633b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56704%3A%20n%2Fa&amp;severity=high&amp;id=693856d07515e08d316631d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65289-na-e29a5368</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65289%3A%20n%2Fa&amp;severity=medium&amp;id=693852147515e08d31601b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65288-na-da37b364</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65288%3A%20n%2Fa&amp;severity=medium&amp;id=693852147515e08d31601b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65287-na-b43a1068</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65287%3A%20n%2Fa&amp;severity=high&amp;id=693843e8795dcaf6c50a72c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61075-na-4fe468ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61075%3A%20n%2Fa&amp;severity=high&amp;id=69383fbf795dcaf6c50728b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61074-na-357642de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61074%3A%20n%2Fa&amp;severity=medium&amp;id=69383fbf795dcaf6c50728b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66469-cwe-79-improper-neutralization-of-i-fdd6e9a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66469%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=6937671f9bbcd7dc91cb4c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66204-cwe-307-improper-restriction-of-exc-5e29a722</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66204%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20WBCE%20WBCE_CMS&amp;severity=medium&amp;id=693765059bbcd7dc91c9e948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66202-cwe-647-use-of-non-canonical-url-pa-8f58c5f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66202%3A%20CWE-647%3A%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20withastro%20astro&amp;severity=medium&amp;id=693763792bceb4b25b4513aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65964-cwe-829-inclusion-of-functionality--14b531c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65964%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=693763792bceb4b25b4513af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65962-cwe-352-cross-site-request-forgery--80114d16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65962%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69375ffc2bceb4b25b402a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64760-cwe-352-cross-site-request-forgery--4bf27619</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64760%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69375c702bceb4b25b3c00be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64499-cwe-352-cross-site-request-forgery--164979cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64499%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=693756d12bceb4b25b3829eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64498-cwe-352-cross-site-request-forgery--0550d940</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64498%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=693755498d836cc4e0fc05cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64497-cwe-639-authorization-bypass-throug-1c2837ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64497%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=693755498d836cc4e0fc05d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36140-cwe-770-allocation-of-resources-wit-95180fbd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36140%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=693751c58d836cc4e0f76ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12635-cwe-79-improper-neutralization-of-i-7d6e371b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12635%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=69374abd8d836cc4e0f08cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64650-cwe-532-insertion-of-sensitive-info-a31ea1e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64650%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Storage%20Defender%20-%20Resiliency%20Service&amp;severity=medium&amp;id=69374abd8d836cc4e0f08cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12832-cwe-918-server-side-request-forgery-b954c793</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12832%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=693748a28d836cc4e0ef5ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36017-cwe-526-in-ibm-controller-209cce35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36017%3A%20CWE-526%20in%20IBM%20Controller&amp;severity=medium&amp;id=693746f956e18237059c6663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14276-command-injection-in-ilevia-eve-x1--6e7a3738</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14276%3A%20Command%20Injection%20in%20Ilevia%20EVE%20X1%20Server&amp;severity=medium&amp;id=693746f956e18237059c6666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36102-cwe-602-client-side-enforcement-of--5cf9a494</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36102%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Controller&amp;severity=low&amp;id=693746f956e18237059c666f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33111-cwe-379-creation-of-temporary-file--8b08ffae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33111%3A%20CWE-379%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20IBM%20Controller&amp;severity=medium&amp;id=693746f956e18237059c666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36015-cwe-1284-improper-validation-of-spe-c39f93cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36015%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Controller&amp;severity=medium&amp;id=6937437656e1823705989915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrimerawire-trojan-targets-windows-fakes-chrome-a-a936c1d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChrimeraWire%20Trojan%20Targets%20Windows%2C%20Fakes%20Chrome%20Activity%20to%20Manipulate%20Search%20Rankings&amp;severity=medium&amp;id=69373866d081e9e7fd351a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-confirm-jssmuggler-uses-compromised-sites--e0097b19</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Confirm%20JS%23SMUGGLER%20Uses%20Compromised%20Sites%20to%20Deploy%20NetSupport%20RAT&amp;severity=high&amp;id=69372a5ed081e9e7fd22dc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-crooks-manipulate-online-photos-to-fuel-virtua-98398763</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20Crooks%20manipulate%20online%20photos%20to%20fuel%20virtual%20kidnapping%20ransoms&amp;severity=medium&amp;id=69372a5ed081e9e7fd22dc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poland-arrests-ukrainians-utilizing-advanced-hacki-d125e355</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Poland%20arrests%20Ukrainians%20utilizing%20&apos;advanced&apos;%20hacking%20equipment&amp;severity=high&amp;id=69372a5ed081e9e7fd22dc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-users-watch-out-new-jssmuggler-campaign-dr-a750fc34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Users%20Watch%20Out%3A%20New%20JS%23SMUGGLER%20Campaign%20Drops%20NetSupport%20RAT%20Through%20Infected%20Sites&amp;severity=medium&amp;id=693717a306c06374c7fc8c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14261-cwe-331-insufficient-entropy-in-lit-bb85e4c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14261%3A%20CWE-331%20Insufficient%20Entropy%20in%20Litmuschaos%20litmus&amp;severity=high&amp;id=693717ba06c06374c7fca710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14259-sql-injection-in-jihai-jshop-minipr-19e45c64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14259%3A%20SQL%20Injection%20in%20Jihai%20Jshop%20MiniProgram%20Mall%20System&amp;severity=medium&amp;id=6937143506c06374c7f73fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-fortifies-chrome-agentic-ai-against-indirec-d4380cb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Fortifies%20Chrome%20Agentic%20AI%20Against%20Indirect%20Prompt%20Injection%20Attacks&amp;severity=medium&amp;id=6937141b06c06374c7f7189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-not-so-hidden-dangers-of-age-verification-a818daf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20(Not%20So)%20Hidden%20Dangers%20of%20Age%20Verification&amp;severity=medium&amp;id=6937109b06c06374c7f4e2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/campaign-uses-clickfix-page-to-push-netsupport-rat-a45f131d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Campaign%20uses%20ClickFix%20page%20to%20push%20NetSupport%20RAT&amp;severity=medium&amp;id=693819561b76610347bfb3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-confirm-jssmuggler-uses-compromised-sites--c2faf5b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Confirm%20JS%23SMUGGLER%20Uses%20Compromised%20Sites%20to%20Deploy%20NetSupport%20RAT&amp;severity=medium&amp;id=6937244c7c9ad9ea57bd6eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14258-sql-injection-in-itsourcecode-stude-88d71820</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14258%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69370e8e06c06374c7f392fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48625-elevation-of-privilege-in-google-an-28202f83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48625%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69370e8e06c06374c7f3930c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48608-information-disclosure-in-google-an-92b970a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48608%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69370e8e06c06374c7f39309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48606-elevation-of-privilege-in-google-an-d4f639b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48606%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69370e8e06c06374c7f39306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48569-denial-of-service-in-google-android-b3ffd32e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48569%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69370e8e06c06374c7f39303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lummastealer-dropped-via-fake-updates-from-itchio--c868d435</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LummaStealer%20dropped%20via%20fake%20updates%20from%20itch.io%20and%20Patreon&amp;severity=medium&amp;id=693819561b76610347bfb39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14257-sql-injection-in-itsourcecode-stude-7df91217</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14257%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6937057e52c2eb5957f2e56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-critical-vulnerability-in-react-290a3101</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2shell%3A%20Critical%20vulnerability%20in%20react&amp;severity=critical&amp;id=6937058c52c2eb5957f3550c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48639-elevation-of-privilege-in-google-an-daf63e16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48639%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48638-elevation-of-privilege-in-google-an-489b6fec</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48638%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48637-elevation-of-privilege-in-google-an-0e76eb7f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48637%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48633-information-disclosure-in-google-an-e5379ff0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48633%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058652c2eb5957f2f179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48632-elevation-of-privilege-in-google-an-40461887</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48632%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48631-denial-of-service-in-google-android-512e0f76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48631%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058552c2eb5957f2f12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48629-elevation-of-privilege-in-google-an-2bae4244</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48629%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48628-information-disclosure-in-google-an-17e3c9e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48628%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48627-elevation-of-privilege-in-google-an-b751909a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48627%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48626-elevation-of-privilege-in-google-an-8e0be547</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48626%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48624-elevation-of-privilege-in-google-an-5702f9df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48624%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48623-elevation-of-privilege-in-google-an-9d6a36df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48623%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48622-information-disclosure-in-google-an-fb77859e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48622%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058552c2eb5957f2f10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48621-elevation-of-privilege-in-google-an-af90a51b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48621%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48620-elevation-of-privilege-in-google-an-63495e7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48620%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48618-elevation-of-privilege-in-google-an-67fe9929</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48618%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48615-elevation-of-privilege-in-google-an-5187df21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48615%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058352c2eb5957f2f0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48614-denial-of-service-in-google-android-c19955ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48614%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48612-elevation-of-privilege-in-google-an-4c540405</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48612%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058352c2eb5957f2f0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48610-information-disclosure-in-google-an-d4c57874</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48610%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48607-denial-of-service-in-google-android-3032c148</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48607%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48604-information-disclosure-in-google-an-0815471d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48604%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48603-denial-of-service-in-google-android-12d0a9a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48603%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48601-elevation-of-privilege-in-google-an-d417be9d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48601%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48600-information-disclosure-in-google-an-60be2def</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48600%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48599-elevation-of-privilege-in-google-an-fdf1c792</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48599%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48598-elevation-of-privilege-in-google-an-6c6a9f3e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48598%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48597-elevation-of-privilege-in-google-an-7b795845</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48597%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48596-elevation-of-privilege-in-google-an-7ea14d68</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48596%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48594-elevation-of-privilege-in-google-an-ae9ef588</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48594%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48592-information-disclosure-in-google-an-67223ba5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48592%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48591-information-disclosure-in-google-an-2c72e8b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48591%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48590-denial-of-service-in-google-android-4ca6dfe4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48590%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48589-elevation-of-privilege-in-google-an-a5c08000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48589%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48588-elevation-of-privilege-in-google-an-9b5d5df6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48588%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48586-elevation-of-privilege-in-google-an-3f0a5c62</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48586%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48584-denial-of-service-in-google-android-a87802f9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48584%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937057f52c2eb5957f2e5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48583-elevation-of-privilege-in-google-an-78dcd99f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48583%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48580-elevation-of-privilege-in-google-an-32d568ff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48580%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48576-denial-of-service-in-google-android-b9b3c429</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48576%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937057f52c2eb5957f2e5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48575-elevation-of-privilege-in-google-an-9444c0c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48575%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48573-elevation-of-privilege-in-google-an-0ea2933f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48573%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48572-elevation-of-privilege-in-google-an-9ca789a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48572%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48566-elevation-of-privilege-in-google-an-436aed13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48566%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48565-elevation-of-privilege-in-google-an-0e329f99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48565%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48564-elevation-of-privilege-in-google-an-af230c2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48564%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48555-information-disclosure-in-google-an-9b3aa07a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48555%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48536-elevation-of-privilege-in-google-an-c886a5fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48536%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48525-elevation-of-privilege-in-google-an-2c155039</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48525%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32329-elevation-of-privilege-in-google-an-f9fdd96f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32329%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32328-elevation-of-privilege-in-google-an-03e61eaa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32328%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32319-elevation-of-privilege-in-google-an-6db421ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32319%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937057e52c2eb5957f2e57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22432-elevation-of-privilege-in-google-an-957a188d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22432%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937057e52c2eb5957f2e579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22420-elevation-of-privilege-in-google-an-8704b66e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22420%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-automated-threat-hunting-brings-ghostpenguin-ou-22b1db0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Automated%20Threat%20Hunting%20Brings%20GhostPenguin%20Out%20of%20the%20Shadows&amp;severity=medium&amp;id=693819561b76610347bfb394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14256-sql-injection-in-itsourcecode-stude-af143abb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14256%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693701f752c2eb5957f05743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14251-sql-injection-in-code-projects-onli-fee5fe78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14251%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6936fa8b3bff8e510987a749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14250-sql-injection-in-code-projects-onli-27dd2930</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14250%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6936f16d3bff8e51097ebcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14271-625b0c4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14271&amp;severity=null&amp;id=6936f16d3bff8e51097ebd00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-china-linked-threat-actors-weaponized-react2sh-7bee9779</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%3A%20China-linked%20threat%20actors%20weaponized%20React2Shell%20hours%20after%20disclosure&amp;severity=medium&amp;id=6936ebcf04c1ddb1a4e1f16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14249-sql-injection-in-code-projects-onli-50d28fa0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14249%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6936ebea04c1ddb1a4e2085a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14248-sql-injection-in-code-projects-simp-9c63831c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14248%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6936e4d104c1ddb1a4d9d98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14247-sql-injection-in-code-projects-simp-7ac88ecb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14247%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6936dd48dc63120ed94d35de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14246-sql-injection-in-code-projects-simp-0a6b705d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14246%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6936d63fdc63120ed944e4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/substitution-cipher-based-on-the-voynich-manuscrip-2fc98498</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Substitution%20Cipher%20Based%20on%20The%20Voynich%20Manuscript%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6936d2c1dc63120ed93d5df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/space-bears-ransomware-claims-comcast-data-theft-t-9e39c14a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Space%20Bears%20Ransomware%20Claims%20Comcast%20Data%20Theft%20Through%20Quasar%20Breach&amp;severity=high&amp;id=6936d210e64c706dbb206f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/8th-december-threat-intelligence-report-62e2aaf6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=8th%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6936ce90e64c706dbb1c6278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tri-century-eye-care-data-breach-impacts-200000-in-199c9ff7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tri-Century%20Eye%20Care%20Data%20Breach%20Impacts%20200%2C000%20Individuals&amp;severity=medium&amp;id=6936cb04e64c706dbb17160c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-usb-malware-react2shell-whatsapp-worm-21762801</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20USB%20Malware%2C%20React2Shell%2C%20WhatsApp%20Worms%2C%20AI%20IDE%20Bugs%20%26%20More&amp;severity=medium&amp;id=6936db3cdc63120ed94b30fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14245-sql-injection-in-ideacms-4ff3b032</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14245%3A%20SQL%20Injection%20in%20IdeaCMS&amp;severity=medium&amp;id=6936c788e64c706dbb14c805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-payments-surpassed-45-billion-us-treasu-745c68d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Payments%20Surpassed%20%244.5%20Billion%3A%20US%20Treasury&amp;severity=high&amp;id=6936c3085f72f49d1523d830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42620-cwe-79-improper-neutralization-of-i-436bc029</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42620%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20CIRCL%20Vulnerability-Lookup&amp;severity=high&amp;id=6936c3245f72f49d1523dfdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42616-cwe-352-cross-site-request-forgery--d8f2c7ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42616%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CIRCL%20Vulnerability-Lookup&amp;severity=high&amp;id=6936c3245f72f49d1523dfda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14244-cross-site-scripting-in-greencms-1c58531f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14244%3A%20Cross%20Site%20Scripting%20in%20GreenCMS&amp;severity=medium&amp;id=6936c3245f72f49d1523dfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42615-cwe-307-improper-restriction-of-exc-4574821b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42615%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20CIRCL%20Vulnerability-Lookup&amp;severity=high&amp;id=6936c3245f72f49d1523dfe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-can-retailers-cyber-prepare-for-the-most-vulne-f9f19d1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Can%20Retailers%20Cyber-Prepare%20for%20the%20Most%20Vulnerable%20Time%20of%20the%20Year%3F&amp;severity=high&amp;id=6936db3cdc63120ed94b3101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-70-domains-used-in-months-long-phishing-spree-e27c96d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2070%20Domains%20Used%20in%20Months-Long%20Phishing%20Spree%20Against%20US%20Universities&amp;severity=medium&amp;id=6936bc035f72f49d1519692f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14230-sql-injection-in-code-projects-dail-c92f6367</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14230%3A%20SQL%20Injection%20in%20code-projects%20Daily%20Time%20Recording%20System&amp;severity=medium&amp;id=6936bc165f72f49d1519946d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14229-csv-injection-in-sourcecodester-inv-4c6c3adf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14229%3A%20CSV%20Injection%20in%20SourceCodester%20Inventory%20Management%20System&amp;severity=medium&amp;id=6936b3f681782ca67e5acd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-fvncbot-seedsnatcher-and-clayrat-g-32b3fd39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20FvncBot%2C%20SeedSnatcher%2C%20and%20ClayRat%20Gain%20Stronger%20Data%20Theft%20Features&amp;severity=medium&amp;id=6936bda25f72f49d151d2502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-apache-tika-vulnerability-leads-to-xxe-in-0a72bacd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Apache%20Tika%20Vulnerability%20Leads%20to%20XXE%20Injection&amp;severity=critical&amp;id=6936ace781782ca67e50ab4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14228-cross-site-scripting-in-yealink-sip-248d48cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14228%3A%20Cross%20Site%20Scripting%20in%20Yealink%20SIP-T21P%20E2&amp;severity=medium&amp;id=6936b07281782ca67e564521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneeit-wordpress-rce-exploited-in-the-wild-while-i-36d737ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneeit%20WordPress%20RCE%20Exploited%20in%20the%20Wild%20While%20ICTBroadcast%20Bug%20Fuels%20Frost%20Botnet%20Attacks&amp;severity=high&amp;id=6936a96681782ca67e4dd963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14227-sql-injection-in-philipinho-simple--8c570b89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14227%3A%20SQL%20Injection%20in%20Philipinho%20Simple-PHP-Blog&amp;severity=medium&amp;id=6936a54eb488c525a1e13b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-react2shell-surges-d6677c2e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20React2Shell%20Surges&amp;severity=medium&amp;id=69369e41b488c525a1d6f755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14262-cwe-708-in-knime-knime-business-hub-3cb6320c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14262%3A%20CWE-708%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=medium&amp;id=69369e58b488c525a1d75c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14226-sql-injection-in-itsourcecode-stude-4f7b60af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14226%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69369e58b488c525a1d75c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66461-unquoted-search-path-or-element-in--7d3873c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66461%3A%20Unquoted%20search%20path%20or%20element%20in%20GS%20Yuasa%20International%20Ltd.%20FULLBACK%20Manager%20Pro%20(for%20Windows)&amp;severity=medium&amp;id=69369e58b488c525a1d75c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27020-cwe-306-missing-authentication-for--156b66fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27020%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Infinera%20MTC-9&amp;severity=critical&amp;id=69369ac1b488c525a1d4258d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27019-cwe-306-missing-authentication-for--a0e783ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27019%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Infinera%20MTC-9&amp;severity=critical&amp;id=69369ac1b488c525a1d4258a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneeit-wordpress-rce-exploited-in-the-wild-while-i-a61dcbf5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneeit%20WordPress%20RCE%20Exploited%20in%20the%20Wild%20While%20ICTBroadcast%20Bug%20Fuels%20Frost%20Botnet%20Attacks&amp;severity=critical&amp;id=6936ae6081782ca67e53c78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14225-command-injection-in-d-link-dcs-930-5a0af0d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14225%3A%20Command%20Injection%20in%20D-Link%20DCS-930L&amp;severity=medium&amp;id=693698b3b488c525a1d24590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26489-cwe-20-improper-input-validation-in-3d027e23</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26489%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Infinera%20MTC-9&amp;severity=medium&amp;id=693696a4ddfbd9e35f9789a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26488-cwe-20-improper-input-validation-in-c6c4479b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26488%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Infinera%20MTC-9&amp;severity=high&amp;id=693696a4ddfbd9e35f97899e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26487-cwe-918-server-side-request-forgery-2e6cf9cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26487%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Infinera%20MTC-9&amp;severity=high&amp;id=69369326ddfbd9e35f933089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12956-cwe-79-improper-neutralization-of-i-7c179921</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12956%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=69369326ddfbd9e35f933086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66330-cwe-200-exposure-of-sensitive-infor-3284f659</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66330%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66329-cwe-264-permissions-privileges-and--e1f97561</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66329%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14224-path-traversal-in-yottamaster-dm2-9267bdc2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14224%3A%20Path%20Traversal%20in%20Yottamaster%20DM2&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66325-cwe-264-permissions-privileges-and--0504e50a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66325%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58279-cwe-200-exposure-of-sensitive-infor-e033fe1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58279%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66334-cwe-494-download-of-code-without-in-0e54d12b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66334%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368f9cddfbd9e35f8dc88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66333-cwe-494-download-of-code-without-in-944d5e6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66333%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368c28ddfbd9e35f8b2791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66332-cwe-494-download-of-code-without-in-3ec9848b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66332%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368c28ddfbd9e35f8b278e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66331-cwe-494-download-of-code-without-in-583f79a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66331%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368c28ddfbd9e35f8b278b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66328-cwe-362-concurrent-execution-using--cc58afbc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66328%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69368c28ddfbd9e35f8b2788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66327-cwe-362-concurrent-execution-using--a5ee53a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66327%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69368c28ddfbd9e35f8b2785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66326-cwe-416-use-after-free-in-huawei-ha-ac3c914a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66326%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66324-cwe-269-improper-privilege-manageme-d7215e4c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66324%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69368a07ddfbd9e35f898b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66323-cwe-358-improperly-implemented-secu-8ff1cb71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66323%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14223-sql-injection-in-code-projects-simp-61984c4e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14223%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Leave%20Manager&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66322-cwe-362-concurrent-execution-using--2e27a1ce</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66322%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66321-cwe-362-concurrent-execution-using--3b37d24c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66321%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6936848645c01810695adba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66320-cwe-362-concurrent-execution-using--fdf61234</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66320%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6936848645c01810695adba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14255-cwe-89-improper-neutralization-of-s-ff6c5314</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14255%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=6936848645c01810695adbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14254-cwe-89-improper-neutralization-of-s-3df14a20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14254%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=6936848645c01810695adbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14253-cwe-36-absolute-path-traversal-in-g-fbc31473</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14253%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=medium&amp;id=6936848645c01810695adba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14222-sql-injection-in-code-projects-empl-647a88c6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14222%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=6936810245c0181069558092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14221-cross-site-scripting-in-sourcecodes-9cb71bb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14221%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Banking%20System&amp;severity=medium&amp;id=693678a9232db2b373874e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-deploys-udpgangster-backdoor-in-targete-29053629</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Deploys%20UDPGangster%20Backdoor%20in%20Targeted%20Turkey-Israel-Azerbaijan%20Campaign&amp;severity=low&amp;id=6936824d45c0181069588df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14220-path-traversal-in-orico-cd3510-7d4148fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14220%3A%20Path%20Traversal%20in%20ORICO%20CD3510&amp;severity=medium&amp;id=69367514232db2b37382295c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14219-unrestricted-upload-in-campcodes-re-c28386d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14219%3A%20Unrestricted%20Upload%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=69367514232db2b373822965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/publishing-malicious-vs-code-extensions-bypassing--7319308e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Publishing%20Malicious%20VS%20Code%20Extensions%3A%20Bypassing%20VS%20Code%20Marketplace%20Analysis%20and%20the%20Insecurity%20of%20OpenVSX%20(Cursor%20AI%2FWindsurf)&amp;severity=medium&amp;id=69366aa7232db2b3737222ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14218-sql-injection-in-code-projects-curr-1aeb0557</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14218%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=6936668b6c0bb4b65b3ec243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14217-sql-injection-in-code-projects-curr-5f5339a2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14217%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=69365f946c0bb4b65b365d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14216-sql-injection-in-code-projects-curr-89649ece</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14216%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=693657e9b529634ccd8059f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14215-sql-injection-in-code-projects-curr-a1011fae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14215%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=69365457b529634ccd7a72eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14214-sql-injection-in-itsourcecode-stude-5c53fb03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14214%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=69364a1f28b66c5f4ed25052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14212-sql-injection-in-projectworlds-adva-a82932ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14212%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=6936430628b66c5f4ed00063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14211-sql-injection-in-projectworlds-adva-29e9f6f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14211%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=6936430628b66c5f4ed0005d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14210-sql-injection-in-projectworlds-adva-2e0f00f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14210%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=69364ecab529634ccd756ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14209-sql-injection-in-campcodes-school-f-89a5b979</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14209%3A%20SQL%20Injection%20in%20Campcodes%20School%20File%20Management%20System&amp;severity=medium&amp;id=6936317e28b66c5f4ec304b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53749-9149de2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53749&amp;severity=null&amp;id=695450bcdb813ff03e2bf884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14208-command-injection-in-d-link-dir-823-7504327e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14208%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=693626f928b66c5f4ebbe7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14207-sql-injection-in-tushar-2223-hotel--19a9ca9c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14207%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel-Management-System&amp;severity=medium&amp;id=69361ff428b66c5f4eb47eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14206-improper-authorization-in-sourcecod-9b34dba6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14206%3A%20Improper%20Authorization%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=69361c2c4a07f71cf650fcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-08-4165bff2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-08&amp;severity=medium&amp;id=69376a7f9bbcd7dc91cd7d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65228-na-35081934</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65228%3A%20n%2Fa&amp;severity=low&amp;id=6937387cd081e9e7fd35434b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65229-na-bb737467</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65229%3A%20n%2Fa&amp;severity=medium&amp;id=693734e9d081e9e7fd30bf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65230-na-7891b0f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65230%3A%20n%2Fa&amp;severity=medium&amp;id=69372dddd081e9e7fd297ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65231-na-61f295cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65231%3A%20n%2Fa&amp;severity=medium&amp;id=693722bf7c9ad9ea57ba3097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65849-na-92cbcf05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65849%3A%20n%2Fa&amp;severity=critical&amp;id=69371f3a7c9ad9ea57b7cd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65548-na-9771dc99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65548%3A%20n%2Fa&amp;severity=critical&amp;id=693717ba06c06374c7fca71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65271-na-f866e554</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65271%3A%20n%2Fa&amp;severity=high&amp;id=693717ba06c06374c7fca714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64081-na-681a6197</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64081%3A%20n%2Fa&amp;severity=critical&amp;id=6937143506c06374c7f73fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65804-na-a92d6b98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65804%3A%20n%2Fa&amp;severity=medium&amp;id=69370e8e06c06374c7f3930f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pluck-477-dev2-php-code-execution-d4449686</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pluck%204.7.7-dev2%20-%20%20PHP%20Code%20Execution&amp;severity=medium&amp;id=693708ee52c2eb5957f7d791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59391-na-c7eddd49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59391%3A%20n%2Fa&amp;severity=medium&amp;id=6937058652c2eb5957f2f18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63721-na-b46b935d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63721%3A%20n%2Fa&amp;severity=critical&amp;id=693701f752c2eb5957f0574b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65799-na-0462fce9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65799%3A%20n%2Fa&amp;severity=medium&amp;id=6936fe0c3bff8e51098be2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65363-na-c47dbb22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65363%3A%20n%2Fa&amp;severity=high&amp;id=6936fe0c3bff8e51098be2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65796-na-f0a5aa8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65796%3A%20n%2Fa&amp;severity=medium&amp;id=6936fa8b3bff8e510987a750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65797-na-9a9e22f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65797%3A%20n%2Fa&amp;severity=medium&amp;id=6936fa8b3bff8e510987a743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65795-na-e7b7aa51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65795%3A%20n%2Fa&amp;severity=high&amp;id=6936fa8b3bff8e510987a73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65798-na-4de357d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65798%3A%20n%2Fa&amp;severity=medium&amp;id=6936f7043bff8e5109832fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61318-na-7df04a53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61318%3A%20n%2Fa&amp;severity=medium&amp;id=6936f16d3bff8e51097ebd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60912-na-553e54c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60912%3A%20n%2Fa&amp;severity=low&amp;id=6936ebea04c1ddb1a4e20861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telegram-phishing-and-related-activities-88211766</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telegram%20phishing%20and%20related%20activities&amp;severity=medium&amp;id=6936d9b6dc63120ed947a35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14205-cross-site-scripting-in-code-projec-8a342957</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14205%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Chamber%20of%20Commerce%20Membership%20Management%20System&amp;severity=medium&amp;id=69360f7d4a07f71cf640fdce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14204-os-command-injection-in-tykodev-che-126a4b21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14204%3A%20OS%20Command%20Injection%20in%20TykoDev%20cherry-studio-TykoFork&amp;severity=medium&amp;id=69360a2e96e8d1719bc52541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14203-sql-injection-in-code-projects-ques-01b21e25</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14203%3A%20SQL%20Injection%20in%20code-projects%20Question%20Paper%20Generator&amp;severity=medium&amp;id=6935f4ac4dfbcbe9ef77b262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/portugal-updates-cybercrime-law-to-exempt-security-e1a7abd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Portugal%20updates%20cybercrime%20law%20to%20exempt%20security%20researchers&amp;severity=high&amp;id=6935f0e6a6cc62dd6e3b64fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14201-cross-site-scripting-in-alokjaiswal-29327f6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14201%3A%20Cross%20Site%20Scripting%20in%20alokjaiswal%20Hotel-Management-services-using-MYSQL-and-php&amp;severity=medium&amp;id=6935c6fc81c8736e4c1ad8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14200-cross-site-scripting-in-alokjaiswal-07fbf7b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14200%3A%20Cross%20Site%20Scripting%20in%20alokjaiswal%20Hotel-Management-services-using-MYSQL-and-php&amp;severity=medium&amp;id=6935bc191ce29f222165335e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14199-unrestricted-upload-6c4e9aaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14199%3A%20Unrestricted%20Upload&amp;severity=medium&amp;id=6935b5201ce29f22215bf218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-almost-any-phone-number-can-be-tracked-via-wha-c1960e0a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20(almost)%20any%20phone%20number%20can%20be%20tracked%20via%20WhatsApp%20%26%20Signal%20%E2%80%93%20open-source%20PoC&amp;severity=high&amp;id=6935adb3551a24bb8cca3466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14198-information-disclosure-9a5872ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14198%3A%20Information%20Disclosure&amp;severity=medium&amp;id=6935adb1551a24bb8cca33db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patching-pulse-oximeter-firmware-388a4fb5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patching%20Pulse%20Oximeter%20Firmware&amp;severity=medium&amp;id=6935adb3551a24bb8cca346a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14197-information-disclosure-c6ab3803</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14197%3A%20Information%20Disclosure&amp;severity=medium&amp;id=6935aa3c551a24bb8cc60a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14196-buffer-overflow-in-h3c-magic-b1-e84401a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14196%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69359f44ced1bbd5af6778cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14195-unrestricted-upload-in-code-project-da55b800</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14195%3A%20Unrestricted%20Upload%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=6935a119551a24bb8cbbdc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14194-cross-site-scripting-in-code-projec-5828086a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14194%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=693590d756f2fcb39f350249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14193-sql-injection-in-code-projects-empl-3fe72876</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14193%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=69358a9756f2fcb39f2bcb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14192-sql-injection-in-rashmindungrani-on-ff18faf2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14192%3A%20SQL%20Injection%20in%20RashminDungrani%20online-banking&amp;severity=medium&amp;id=69358a9756f2fcb39f2bcb36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14191-buffer-overflow-in-utt-512w-f886a277</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14191%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=69357a6c705c380fd9783155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14190-sql-injection-in-chanjet-tplus-d641a022</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14190%3A%20SQL%20Injection%20in%20Chanjet%20TPlus&amp;severity=medium&amp;id=693572f137e7cb8c9bebccb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14189-sql-injection-in-chanjet-crm-716e2149</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14189%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=6935691437e7cb8c9be15eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14188-command-injection-in-ugreen-dh2100-7ececf1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14188%3A%20Command%20Injection%20in%20UGREEN%20DH2100%2B&amp;severity=high&amp;id=693560d76d1d87ed0c725dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-50-infrastructure-exposed-in-new-server-ip-fb382e24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%205.0%20Infrastructure%20Exposed%20in%20New%20Server%2C%20IP%2C%20and%20Domain%20Leak&amp;severity=high&amp;id=693556416d1d87ed0c65a0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-wsus-remote-code-execution-cve-2025-5928-9781ebf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20WSUS%20Remote%20Code%20Execution%20(CVE-2025-59287)%20Actively%20Exploited%20in%20the%20Wild%20(Updated%20November%203)&amp;severity=medium&amp;id=693717b806c06374c7fca668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14187-buffer-overflow-in-ugreen-dh2100-bd7ea556</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14187%3A%20Buffer%20Overflow%20in%20UGREEN%20DH2100%2B&amp;severity=high&amp;id=69353dcaffe3c58b9f071ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stillepost-or-how-to-proxy-your-c2s-http-traffic-t-c0561b51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stillepost%20-%20Or%3A%20How%20to%20Proxy%20your%20C2s%20HTTP-Traffic%20through%20Chromium%20%7C%20mischief&amp;severity=medium&amp;id=69352f35be54460d664f2525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14186-basic-cross-site-scripting-in-grand-cf5b2d9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14186%3A%20Basic%20Cross%20Site%20Scripting%20in%20Grandstream%20GXP1625&amp;severity=medium&amp;id=69352f32be54460d664f24ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14185-sql-injection-in-yonyou-u8-cloud-eef10b29</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14185%3A%20SQL%20Injection%20in%20Yonyou%20U8%20Cloud&amp;severity=medium&amp;id=69350bd6d5925d6ea2ce785f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14184-command-injection-in-sgai-space1-na-2c7efab5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14184%3A%20Command%20Injection%20in%20SGAI%20Space1%20NAS%20N1211DS&amp;severity=medium&amp;id=6935065f5cd7c00bf6e3233d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14183-unprotected-storage-of-credentials--837342c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14183%3A%20Unprotected%20Storage%20of%20Credentials%20in%20SGAI%20Space1%20NAS%20N1211DS&amp;severity=medium&amp;id=6934fd445cd7c00bf6d1c497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14182-path-traversal-in-sobey-media-conve-d7bd707f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14182%3A%20Path%20Traversal%20in%20Sobey%20Media%20Convergence%20System&amp;severity=medium&amp;id=6934e7470265b8b2b61784c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-launch-dual-campaign-on-globalprotect-po-09fd80bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20launch%20dual%20campaign%20on%20GlobalProtect%20portals%20and%20SonicWall%20APIs&amp;severity=medium&amp;id=6934d9340265b8b2b60965a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-07-9a43a65f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-07&amp;severity=medium&amp;id=693618854a07f71cf64a70c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/barts-health-nhs-confirms-oracle-ebs-linked-data-b-9ae7682b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Barts%20Health%20NHS%20Confirms%20Oracle%20EBS%20Linked%20Data%20Breach%20from%20Cl0p%20Ransomware&amp;severity=high&amp;id=69345f416c01a8c605b4dc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14141-buffer-overflow-in-utt-520w-c6cc8954</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14141%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=693456cca98e58ac8622ed62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14140-buffer-overflow-in-utt-520w-c180e378</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14140%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=6934506ea98e58ac861acdba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-30-flaws-in-ai-coding-tools-en-5c971663</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%2030%2B%20Flaws%20in%20AI%20Coding%20Tools%20Enabling%20Data%20Theft%20and%20RCE%20Attacks&amp;severity=critical&amp;id=69345f5b6c01a8c605b56f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/drones-to-diplomas-how-russias-largest-private-uni-847a2067</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Drones%20to%20Diplomas%3A%20How%20Russia%E2%80%99s%20Largest%20Private%20University%20is%20Linked%20to%20a%20%2425M%20Essay%20Mill&amp;severity=medium&amp;id=69344c37a98e58ac86167832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14139-buffer-overflow-in-utt-520w-53617f4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14139%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=medium&amp;id=6934487c0f17eabd84814c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react2shell-flaw-added-to-cisa-kev-after--e293bc02</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React2Shell%20Flaw%20Added%20to%20CISA%20KEV%20After%20Confirmed%20Active%20Exploitation&amp;severity=critical&amp;id=693436d8e435a964bf0ac7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-state-hackers-use-new-brickstorm-malware-a-0556d5d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20State%20Hackers%20Use%20New%20BRICKSTORM%20Malware%20Against%20VMware%20Systems&amp;severity=medium&amp;id=69342be88daff6a4f6fb7cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14136-stack-based-buffer-overflow-in-link-e0ef136b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14136%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=69342bf48daff6a4f6fb8165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react2shell-flaw-added-to-cisa-kev-after--ea2329c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React2Shell%20Flaw%20Added%20to%20CISA%20KEV%20After%20Confirmed%20Active%20Exploitation&amp;severity=critical&amp;id=6934174311364f3ab440a492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14135-stack-based-buffer-overflow-in-link-fc3b66c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14135%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=6934172811364f3ab4401e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-prompt-injection-attack-vectors-through-mcp-sa-e3a2ecb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Prompt%20Injection%20Attack%20Vectors%20Through%20MCP%20Sampling&amp;severity=medium&amp;id=69340f26092893b302a3c94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14134-stack-based-buffer-overflow-in-link-f77fe5c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14134%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=69340f40092893b302a4ad60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14133-stack-based-buffer-overflow-in-link-0787550c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14133%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=693408d1092893b3029c1957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14126-hard-coded-credentials-in-tozed-zlt-3f98c3ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14126%3A%20Hard-coded%20Credentials%20in%20TOZED%20ZLT%20M30S&amp;severity=high&amp;id=6934009fb96ba7cdea90c2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13065-cwe-434-unrestricted-upload-of-file-171779c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13065%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20brainstormforce%20Starter%20Templates%20%E2%80%93%20AI-Powered%20Templates%20for%20Elementor%20%26%20Gutenberg&amp;severity=high&amp;id=6933f997b96ba7cdea885820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12966-cwe-434-unrestricted-upload-of-file-e5c2245d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12966%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=high&amp;id=6933f997b96ba7cdea88581c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sharpening-the-knife-strategic-evolution-of-gold-b-c02e52b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sharpening%20the%20knife%3A%20strategic%20evolution%20of%20GOLD%20BLADE&amp;severity=medium&amp;id=69381cd61b76610347c61f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12499-cwe-79-improper-neutralization-of-i-f24346c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20widgetpack%20Rich%20Showcase%20for%20Google%20Reviews&amp;severity=high&amp;id=6933dd63c1b0382f6aac62a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13377-cwe-22-improper-limitation-of-a-pat-7c7aa1e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13377%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%2010web%2010Web%20Booster%20%E2%80%93%20Website%20speed%20optimization%2C%20Cache%20%26%20Page%20Speed%20optimizer&amp;severity=critical&amp;id=6933d18711163305effc5a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13748-cwe-639-authorization-bypass-throug-41ae3d2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13748%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=6933d18711163305effc5a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13358-cwe-862-missing-authorization-in-co-6fce8efb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13358%3A%20CWE-862%20Missing%20Authorization%20in%20codeconfig%20Accessiy%20by%20CodeConfig%20%E2%80%93%20Accessibility%20Widgets%20for%20ADA%2C%20EAA%20%26%20WCAG%20Compliance&amp;severity=medium&amp;id=6933c71e11163305efef3dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13309-cwe-862-missing-authorization-in-co-8684df95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13309%3A%20CWE-862%20Missing%20Authorization%20in%20codeconfig%20Accessiy%20by%20CodeConfig%20%E2%80%93%20Accessibility%20Widgets%20for%20ADA%2C%20EAA%20%26%20WCAG%20Compliance&amp;severity=medium&amp;id=6933c71e11163305efef3dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13894-cwe-79-improper-neutralization-of-i-7399ce59</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sumotto%20CSV%20Sumotto&amp;severity=medium&amp;id=6933c71e11163305efef3df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12091-cwe-862-missing-authorization-in-in-3df67056</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12091%3A%20CWE-862%20Missing%20Authorization%20in%20instantsearchplus%20Search%2C%20Filters%20%26%20Merchandising%20for%20WooCommerce&amp;severity=medium&amp;id=6933c71c11163305efef3527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13857-cwe-79-improper-neutralization-of-i-bfcc147f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13857%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ksakai%20Yet%20Another%20WebClap%20for%20WordPress&amp;severity=medium&amp;id=6933c71e11163305efef3deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13856-cwe-79-improper-neutralization-of-i-0e8648f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13856%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michaelcole1991%20Extra%20Post%20Images&amp;severity=medium&amp;id=6933c71e11163305efef3de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13863-cwe-79-improper-neutralization-of-i-272b89fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20krupenik%20RevInsite&amp;severity=medium&amp;id=6933c71e11163305efef3df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13907-cwe-79-improper-neutralization-of-i-3ef7d435</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13907%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tunilame%20CSS3%20Buttons&amp;severity=medium&amp;id=6933c72011163305efef4283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12717-cwe-79-improper-neutralization-of-i-b89f6ee3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12717%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cgrymala%20List%20Attachments%20Shortcode&amp;severity=medium&amp;id=6933c71c11163305efef353e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12577-cwe-862-missing-authorization-in-pa-c454a4fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12577%3A%20CWE-862%20Missing%20Authorization%20in%20passionui%20Listar%20%E2%80%93%20Directory%20Listing%20%26%20Classifieds%20WordPress%20Plugin&amp;severity=medium&amp;id=6933c71c11163305efef3530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12715-cwe-79-improper-neutralization-of-i-ec4113a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12715%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emaude%20Canadian%20Nutrition%20Facts%20Label&amp;severity=medium&amp;id=6933c71c11163305efef353a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13656-cwe-79-improper-neutralization-of-i-d0e11230</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arnabkumar%20Cute%20News%20Ticker&amp;severity=medium&amp;id=6933c71e11163305efef3dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13899-cwe-79-improper-neutralization-of-i-8d9d8271</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pntrinh%20TR%20Timthumb&amp;severity=medium&amp;id=6933c72011163305efef427d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13308-cwe-79-improper-neutralization-of-i-446187ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20georgestephanis%20Application%20Passwords&amp;severity=medium&amp;id=6933c71c11163305efef3553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13666-cwe-862-missing-authorization-in-he-f4f6e251</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13666%3A%20CWE-862%20Missing%20Authorization%20in%20helloprint%20Plug%20your%20WooCommerce%20into%20the%20largest%20catalog%20of%20customized%20print%20products%20from%20Helloprint&amp;severity=medium&amp;id=6933c71e11163305efef3de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13629-cwe-352-cross-site-request-forgery--33e5be1e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13629%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xbenx%20WP%20Landing%20Page&amp;severity=medium&amp;id=6933c71e11163305efef3dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12673-cwe-434-unrestricted-upload-of-file-74b9ba78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12673%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ajitdas%20Flex%20QR%20Code%20Generator&amp;severity=critical&amp;id=6933c71c11163305efef3534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12720-cwe-285-improper-authorization-in-g-429b15e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12720%3A%20CWE-285%20Improper%20Authorization%20in%20garidium%20g-FFL%20Cockpit&amp;severity=medium&amp;id=6933c71c11163305efef3543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12574-cwe-862-missing-authorization-in-pa-5912c10b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12574%3A%20CWE-862%20Missing%20Authorization%20in%20passionui%20Listar%20%E2%80%93%20Directory%20Listing%20%26%20Classifieds%20WordPress%20Plugin&amp;severity=medium&amp;id=6933c71c11163305efef352c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12721-cwe-862-missing-authorization-in-ga-f65f2aea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12721%3A%20CWE-862%20Missing%20Authorization%20in%20garidium%20g-FFL%20Cockpit&amp;severity=medium&amp;id=6933c71c11163305efef3549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13896-cwe-79-improper-neutralization-of-i-ee7ce8d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Social%20Feed%20Gallery%20Portfolio&amp;severity=medium&amp;id=6933c72011163305efef426f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13898-cwe-79-improper-neutralization-of-i-b11b79c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sozan45%20Ultra%20Skype%20Button&amp;severity=medium&amp;id=6933c72011163305efef4276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13137-cwe-79-improper-neutralization-of-i-b4d137a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13137%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20delabon%20Live%20Sales%20Notification%20for%20Woocommerce%20%E2%80%93%20Woomotiv&amp;severity=medium&amp;id=6933c71c11163305efef354f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13626-cwe-79-improper-neutralization-of-i-5041cab0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realloc%20myLCO&amp;severity=medium&amp;id=6933c71e11163305efef3dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14117-cross-site-request-forgery-in-fit2c-f4c93b17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14117%3A%20Cross-Site%20Request%20Forgery%20in%20fit2cloud%20Halo&amp;severity=medium&amp;id=6933c088c86a12d0de69d1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13292-cwe-269-improper-privilege-manageme-ce6b9bde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13292%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Google%20Cloud%20Apigee-X&amp;severity=high&amp;id=6933bc4bc86a12d0de63b6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13922-cwe-89-improper-neutralization-of-s-2d287121</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13922%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=6933b4e62271496a0fa6c3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12505-cwe-285-improper-authorization-in-w-ce3225cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12505%3A%20CWE-285%20Improper%20Authorization%20in%20wedevs%20weDocs%3A%20AI%20Powered%20Knowledge%20Base%2C%20Docs%2C%20Documentation%2C%20Wiki%20%26%20AI%20Chatbot&amp;severity=medium&amp;id=6933b4e62271496a0fa6c3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11263-cwe-79-improper-neutralization-of-i-d46d2833</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linkwhspr%20Link%20Whisper%20Free&amp;severity=medium&amp;id=6933a6d1f88dbe026c8d8254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12510-cwe-79-improper-neutralization-of-i-f1941bb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Google%20Reviews&amp;severity=high&amp;id=6933a6d1f88dbe026c8d8258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-06-8f68157b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-06&amp;severity=medium&amp;id=6934c75dcc1a9ed479e7a1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14116-server-side-request-forgery-in-xerr-9af87fe9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14116%3A%20Server-Side%20Request%20Forgery%20in%20xerrors%20Yuxi-Know&amp;severity=medium&amp;id=6933607ff88dbe026c285293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14111-path-traversal-in-rarlab-rar-app-fc126145</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14111%3A%20Path%20Traversal%20in%20Rarlab%20RAR%20App&amp;severity=low&amp;id=6933607ff88dbe026c28528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14108-command-injection-in-zspace-q2c-nas-00eaf7f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14108%3A%20Command%20Injection%20in%20ZSPACE%20Q2C%20NAS&amp;severity=high&amp;id=69335977f88dbe026c240f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14107-command-injection-in-zspace-q2c-nas-3fb9b479</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14107%3A%20Command%20Injection%20in%20ZSPACE%20Q2C%20NAS&amp;severity=high&amp;id=6933526ff88dbe026c2031d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14106-command-injection-in-zspace-q2c-nas-49414b8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14106%3A%20Command%20Injection%20in%20ZSPACE%20Q2C%20NAS&amp;severity=high&amp;id=6933526ff88dbe026c2031cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13426-cwe-913-improper-control-of-dynamic-826cfac1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13426%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Google%20Cloud%20Apigee%20hybrid%20Javacallout%20policy&amp;severity=high&amp;id=69334eebf88dbe026c1f61de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14105-denial-of-service-in-tozed-zlt-m30s-7c2d21fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14105%3A%20Denial%20of%20Service%20in%20TOZED%20ZLT%20M30S&amp;severity=medium&amp;id=69334b6ff88dbe026c1e4442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8148-cwe-732-incorrect-permission-assignm-2ecba3c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8148%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=693347f3f88dbe026c1c0562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/barts-health-nhs-discloses-data-breach-after-oracl-51d2560a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Barts%20Health%20NHS%20discloses%20data%20breach%20after%20Oracle%20zero-day%20hack&amp;severity=critical&amp;id=693347e2f88dbe026c1c039f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46603-cwe-307-improper-restriction-of-exc-142d8db3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46603%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20CloudBoost%20Virtual%20Appliance&amp;severity=high&amp;id=69332f7ef88dbe026c0dd0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-virtual-kidnapping-scams-using-altere-41363ed9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20warns%20of%20virtual%20kidnapping%20scams%20using%20altered%20social%20media%20photos&amp;severity=high&amp;id=6933283df88dbe026c0463ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66623-cwe-200-exposure-of-sensitive-infor-2d0b4eb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66623%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20strimzi%20strimzi-kafka-operator&amp;severity=high&amp;id=69332850f88dbe026c04683b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66581-cwe-863-incorrect-authorization-in--38b7daba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66581%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20frappe%20lms&amp;severity=low&amp;id=69332850f88dbe026c046838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66577-cwe-117-improper-output-neutralizat-a1be9753</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66577%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=693324bbf88dbe026c02bd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66570-cwe-290-authentication-bypass-by-sp-dc26efd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66570%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20yhirose%20cpp-httplib&amp;severity=critical&amp;id=693324bbf88dbe026c02bd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66566-cwe-201-insertion-of-sensitive-info-f71df300</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66566%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20yawkat%20lz4-java&amp;severity=high&amp;id=69332135f88dbe026c014958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66562-cwe-79-improper-neutralization-of-i-431fd684</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66562%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AI-QL%20tuui&amp;severity=high&amp;id=69332135f88dbe026c014953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66558-cwe-639-authorization-bypass-throug-f4d1b6bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66558%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69332135f88dbe026c01494d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-cyber-threat-groups-rapidly-exploit-re-2ebc0255</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-nexus%20cyber%20threat%20groups%20rapidly%20exploit%20React2Shell%20vulnerability%20(CVE-2025-55182)&amp;severity=medium&amp;id=69331db4f88dbe026c0066bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66556-cwe-639-authorization-bypass-throug-5f362a08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66556%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69332135f88dbe026c01495c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-click-agentic-browser-attack-can-delete-entir-6ca9b1af</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero-Click%20Agentic%20Browser%20Attack%20Can%20Delete%20Entire%20Google%20Drive%20Using%20Crafted%20Emails&amp;severity=medium&amp;id=6933b3cf2271496a0fa5db10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66554-cwe-79-improper-neutralization-of-i-f37d0ba1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66554%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331db5f88dbe026c00670f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66549-cwe-209-generation-of-error-message-b2f541f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66549%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331db5f88dbe026c00671b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66545-cwe-707-improper-neutralization-in--73fa08a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66545%3A%20CWE-707%3A%20Improper%20Neutralization%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331db5f88dbe026c006715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66515-cwe-287-improper-authentication-in--f26ad275</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66515%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331a32f88dbe026cff02a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66514-cwe-79-improper-neutralization-of-i-2b2ec064</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66514%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331a32f88dbe026cff02aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66557-cwe-284-improper-access-control-in--430a0d0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66557%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69331a32f88dbe026cff02b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66548-cwe-116-improper-encoding-or-escapi-12e3ac9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66548%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331a32f88dbe026cff02b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34256-cwe-321-use-of-hard-coded-cryptogra-3c681503</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34256%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=critical&amp;id=693316aef88dbe026cfdbdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34265-cwe-79-improper-neutralization-of-i-90adca90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34265%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66553-cwe-639-authorization-bypass-throug-fbf5a7b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66553%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34263-cwe-79-improper-neutralization-of-i-d05244cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34266-cwe-79-improper-neutralization-of-i-5d8e9790</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34264-cwe-79-improper-neutralization-of-i-ebe74830</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34264%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34262-cwe-79-improper-neutralization-of-i-e4e29f91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34262%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34258-cwe-79-improper-neutralization-of-i-0ecef541</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34259-cwe-79-improper-neutralization-of-i-a8c88718</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34261-cwe-79-improper-neutralization-of-i-fa86d9f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34260-cwe-79-improper-neutralization-of-i-5f1a2e84</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34260%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34257-cwe-79-improper-neutralization-of-i-5a1eb3a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34257%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66551-cwe-639-authorization-bypass-throug-f3ce54dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66551%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66513-cwe-639-authorization-bypass-throug-99516d1e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66513%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14094-os-command-injection-in-edimax-br-6-f064d969</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14094%3A%20OS%20Command%20Injection%20in%20Edimax%20BR-6478AC%20V3&amp;severity=medium&amp;id=69331326f88dbe026cfc76d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66550-cwe-241-improper-handling-of-unexpe-35a0b1e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66550%3A%20CWE-241%3A%20Improper%20Handling%20of%20Unexpected%20Data%20Type%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69331326f88dbe026cfc76d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66546-cwe-639-authorization-bypass-throug-b63bfb9c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66546%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69330fa6f88dbe026cfb407e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66511-cwe-330-use-of-insufficiently-rando-5d56da14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66511%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69330c20f88dbe026cf88dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66552-cwe-778-insufficient-logging-in-nex-1fc88742</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66552%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69330c20f88dbe026cf88df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66547-cwe-639-authorization-bypass-throug-17681735</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66547%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69330c20f88dbe026cf88df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14093-os-command-injection-in-edimax-br-6-c5b06834</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14093%3A%20OS%20Command%20Injection%20in%20Edimax%20BR-6478AC%20V3&amp;severity=medium&amp;id=69330c20f88dbe026cf88de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intellexa-leaks-reveal-zero-days-and-ads-based-vec-7f25cade</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intellexa%20Leaks%20Reveal%20Zero-Days%20and%20Ads-Based%20Vector%20for%20Predator%20Spyware%20Delivery&amp;severity=high&amp;id=6933089af88dbe026cf7736b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pharma-firm-inotiv-discloses-data-breach-after-ran-1670e3d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pharma%20firm%20Inotiv%20discloses%20data%20breach%20after%20ransomware%20attack&amp;severity=high&amp;id=6933089af88dbe026cf77363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blames-todays-outage-on-emergency-react-8fa199de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20blames%20today&apos;s%20outage%20on%20emergency%20React2Shell%20patch&amp;severity=critical&amp;id=6933089af88dbe026cf77373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-have-started-exploiting-the-newly--4109413c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Have%20Started%20Exploiting%20the%20Newly%20Disclosed%20React2Shell%20Vulnerability&amp;severity=high&amp;id=6933089af88dbe026cf7736f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-xxe-bug-cve-2025-66516-cvss-100-hits-apac-d08561e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20XXE%20Bug%20CVE-2025-66516%20(CVSS%2010.0)%20Hits%20Apache%20Tika%2C%20Requires%20Urgent%20Patch&amp;severity=critical&amp;id=6933b3cf2271496a0fa5db13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66512-cwe-80-improper-neutralization-of-s-48973679</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66512%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693308e8f88dbe026cf7915a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14104-out-of-bounds-read-in-red-hat-red-h-31ec701d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14104%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=693308e8f88dbe026cf7914e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66510-cwe-359-exposure-of-private-persona-5f77ad95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66510%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693308e8f88dbe026cf79155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65036-cwe-862-missing-authorization-in-xw-9f6355a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65036%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwikisas%20xwiki-pro-macros&amp;severity=high&amp;id=693308e8f88dbe026cf79160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14092-os-command-injection-in-edimax-br-6-4142d319</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14092%3A%20OS%20Command%20Injection%20in%20Edimax%20BR-6478AC%20V3&amp;severity=medium&amp;id=69330517f88dbe026cf63b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14091-sql-injection-in-trippwastaken-php--581f8838</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14091%3A%20SQL%20Injection%20in%20TrippWasTaken%20PHP-Guitar-Shop&amp;severity=medium&amp;id=69330517f88dbe026cf63b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-x-fined-120-million-array-flaw-explo-2fcbc0f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20X%20Fined%20%E2%82%AC120%20Million%2C%20Array%20Flaw%20Exploited%2C%20New%20Iranian%20Backdoor&amp;severity=medium&amp;id=6933b4822271496a0fa66583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14090-sql-injection-in-amtt-hotel-broadba-1cf0bd3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14090%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=6932fe10f88dbe026cf26f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14089-improper-authorization-in-himool-er-bf99091b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14089%3A%20Improper%20Authorization%20in%20Himool%20ERP&amp;severity=medium&amp;id=6932fe10f88dbe026cf26f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-variant-of-clayrat-android-spyware-seizes-full-032ec3e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Variant%20of%20ClayRat%20Android%20Spyware%20Seizes%20Full%20Device%20Control&amp;severity=medium&amp;id=6932fa88f88dbe026cf03906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-outage-caused-by-react2shell-mitigation-c6e3c984</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Outage%20Caused%20by%20React2Shell%20Mitigations&amp;severity=critical&amp;id=6932f6fbf88dbe026cee6893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14088-improper-authorization-in-ketr-jepa-78a1e9b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14088%3A%20Improper%20Authorization%20in%20ketr%20JEPaaS&amp;severity=medium&amp;id=6932f006f88dbe026ce9d2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-organizations-warned-of-chinese-malware-used-fo-7c023c5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Organizations%20Warned%20of%20Chinese%20Malware%20Used%20for%20Long-Term%20Persistence&amp;severity=medium&amp;id=6932ec71f88dbe026ce620bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-have-started-exploiting-the-newly--36f9fb99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Have%20Started%20Exploiting%20the%20Newly%20Disclosed%20React2Shell%20Vulnerability&amp;severity=critical&amp;id=6933b3cf2271496a0fa5db16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14086-improper-access-controls-in-youlait-4c87bed6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14086%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=6932e8f6f88dbe026ce496ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14085-improper-control-of-dynamically-ide-01696bc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14085%3A%20Improper%20Control%20of%20Dynamically-Identified%20Variables%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=6932e8f6f88dbe026ce496a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58098-cwe-201-insertion-of-sensitive-info-8bc5a1d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58098%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6932e1eef88dbe026cde8eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ssrf-payload-generator-for-fuzzing-pdf-generators--80dbefb6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SSRF%20Payload%20Generator%20for%20fuzzing%20PDF%20Generators%20etc...&amp;severity=medium&amp;id=6932de75f88dbe026cdbbc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6966-cwe-476-null-pointer-dereference-in--592f235b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6966%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Canonical%20python-apt&amp;severity=medium&amp;id=6932dae7f88dbe026cd171b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whitebox-simulation-vs-blackbox-red-team-phishing-c25d50a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Whitebox%20(simulation)%20vs.%20blackbox%20(red%20team)%20phishing&amp;severity=medium&amp;id=6932c95df88dbe026c9e697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intellexa-leaks-reveal-zero-days-and-ads-based-vec-ac3734d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intellexa%20Leaks%20Reveal%20Zero-Days%20and%20Ads-Based%20Vector%20for%20Predator%20Spyware%20Delivery&amp;severity=medium&amp;id=6933b3cf2271496a0fa5db19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-reports-prc-hackers-using-brickstorm-for-long-0c744b00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Reports%20PRC%20Hackers%20Using%20BRICKSTORM%20for%20Long-Term%20Access%20in%20U.S.%20Systems&amp;severity=high&amp;id=6932c5d0f88dbe026c9d1935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66200-moduserdirsuexec-bypass-via-allowov-1b3179fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66200%3A%20mod_userdir%2Bsuexec%20bypass%20via%20AllowOverride%20FileInfo%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=6932beccf88dbe026c9a1a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13620-cwe-862-missing-authorization-in-ro-95a9c114</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13620%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20Wp%20Social%20Login%20and%20Register%20Social%20Counter&amp;severity=medium&amp;id=6932d3dff88dbe026cbce002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65082-cwe-150-improper-neutralization-of--e4ae2047</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65082%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=6932bb45f88dbe026c9804e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-botnet-powers-record-ddos-attack-peaking-at-72c320b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20Botnet%20Powers%20Record%20DDoS%20Attack%20Peaking%20at%2029%20Tbps&amp;severity=medium&amp;id=6932b7b3f88dbe026c96858a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59775-cwe-918-server-side-request-forgery-bfa90704</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59775%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6932b486f88dbe026c950fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55753-cwe-190-integer-overflow-or-wraparo-f05daf4d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55753%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6932b486f88dbe026c950fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jpcert-confirms-active-command-injection-attacks-o-96e65e96</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JPCERT%20Confirms%20Active%20Command%20Injection%20Attacks%20on%20Array%20AG%20Gateways&amp;severity=high&amp;id=6932b0b5f88dbe026c931d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cacti-command-injection-vulnerability-let-attacker-4238439c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cacti%20Command%20Injection%20Vulnerability%20Let%20Attackers%20Execute%20Malicious%20Code%20Remotely&amp;severity=high&amp;id=6932b0b5f88dbe026c931d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13682-cwe-79-improper-neutralization-of-i-b85ee274</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phegman%20Trail%20Manager&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13614-cwe-79-improper-neutralization-of-i-7f71da3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkube%20Cool%20Tag%20Cloud&amp;severity=high&amp;id=6932a9b1f88dbe026c8e9fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13678-cwe-79-improper-neutralization-of-i-2308cf35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13678%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siamlottery%20Thai%20Lottery%20Widget&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12876-cwe-862-missing-authorization-in-pr-4e1b6675</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12876%3A%20CWE-862%20Missing%20Authorization%20in%20projectopia%20Projectopia%20%E2%80%93%20Project%20Management%20Tool&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12879-cwe-352-cross-site-request-forgery--b91fd5c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12879%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vinoth06%20User%20Generator%20and%20Importer&amp;severity=high&amp;id=6932a9b1f88dbe026c8e9fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13739-cwe-79-improper-neutralization-of-i-e35bcfcd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20d3395%20CryptX&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12851-cwe-98-improper-control-of-filename-6253ed97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12851%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=6932a9b1f88dbe026c8e9fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-reports-prc-hackers-using-brickstorm-for-long-cab26aff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Reports%20PRC%20Hackers%20Using%20BRICKSTORM%20for%20Long-Term%20Access%20in%20U.S.%20Systems&amp;severity=medium&amp;id=6933b3cf2271496a0fa5db1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-exploiting-react2shell-vulnerabili-acb8d966</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Exploiting%20React2Shell%20Vulnerability&amp;severity=medium&amp;id=69328d83f88dbe026c81bed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12130-cwe-352-cross-site-request-forgery--7de8683f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12130%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wcvendors%20WC%20Vendors%20%E2%80%93%20WooCommerce%20Multivendor%2C%20WooCommerce%20Marketplace%2C%20Product%20Vendors&amp;severity=medium&amp;id=69328da7f88dbe026c81c65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13684-cwe-352-cross-site-request-forgery--0f41760d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13684%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alexkar%20ARK%20Related%20Posts&amp;severity=medium&amp;id=69328da7f88dbe026c81c65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autoit3-compiled-scripts-dropping-shellcodes-fri-d-a9496d28</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes%2C%20(Fri%2C%20Dec%205th)&amp;severity=medium&amp;id=6933b4eb2271496a0fa6c8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12850-cwe-89-improper-neutralization-of-s-a9c55820</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12850%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=69328306f88dbe026c7e31d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13515-cwe-79-improper-neutralization-of-i-2f20c4e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13515%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danrajkumar%20Nouri.sh%20Newsletter&amp;severity=medium&amp;id=69327c01f88dbe026c7c159f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12093-cwe-862-missing-authorization-in-vo-899ffa1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12093%3A%20CWE-862%20Missing%20Authorization%20in%20voidek%20Voidek%20Employee%20Portal&amp;severity=medium&amp;id=69327c01f88dbe026c7c1587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12355-cwe-862-missing-authorization-in-bi-e14b24b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12355%3A%20CWE-862%20Missing%20Authorization%20in%20bigmaster%20Payaza&amp;severity=medium&amp;id=69327c01f88dbe026c7c1593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12374-cwe-287-improper-authentication-in--8c3c4127</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12374%3A%20CWE-287%20Improper%20Authentication%20in%20pickplugins%20User%20Verification%20by%20PickPlugins&amp;severity=critical&amp;id=69327c01f88dbe026c7c159b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12354-cwe-862-missing-authorization-in-do-b4c1c152</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12354%3A%20CWE-862%20Missing%20Authorization%20in%20dojodigital%20Live%20CSS%20Preview&amp;severity=medium&amp;id=69327c01f88dbe026c7c158f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12373-cwe-352-cross-site-request-forgery--e3abab3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12373%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20torod%20Torod%20%E2%80%93%20The%20smart%20shipping%20and%20delivery%20portal%20for%20e-shops%20and%20retailers&amp;severity=medium&amp;id=69327c01f88dbe026c7c1597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12186-cwe-79-improper-neutralization-of-i-886b5389</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12186%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michael_j_reid%20Weekly%20Planner&amp;severity=medium&amp;id=69327c01f88dbe026c7c158b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jpcert-confirms-active-command-injection-attacks-o-cb7c9a43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JPCERT%20Confirms%20Active%20Command%20Injection%20Attacks%20on%20Array%20AG%20Gateways&amp;severity=low&amp;id=6933b3cf2271496a0fa5db22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13528-cwe-862-missing-authorization-in-ne-fd1c163c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13528%3A%20CWE-862%20Missing%20Authorization%20in%20nedwp%20Feedback%20Modal%20for%20Website&amp;severity=medium&amp;id=69327173f88dbe026c7799bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13860-cwe-79-improper-neutralization-of-i-2d970f9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webradykal%20Easy%20Jump%20Links%20Menus&amp;severity=medium&amp;id=69327173f88dbe026c7799da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12154-cwe-434-unrestricted-upload-of-file-d5a5f06b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12154%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20moderntribe%20Auto%20Thumbnailer&amp;severity=high&amp;id=69327172f88dbe026c779911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12190-cwe-352-cross-site-request-forgery--ef6ea5d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12190%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20duddi%20Image%20Optimizer%20by%20wps.sk&amp;severity=medium&amp;id=69327172f88dbe026c779928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12191-cwe-79-improper-neutralization-of-i-c45b901e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12191%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ovologics%20PDF%20Catalog%20for%20WooCommerce&amp;severity=medium&amp;id=69327173f88dbe026c779992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12189-cwe-352-cross-site-request-forgery--c4477421</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12189%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20breadbutter%20Bread%20%26%20Butter%3A%20AI-Powered%20Lead%20Intelligence&amp;severity=medium&amp;id=69327172f88dbe026c779922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12128-cwe-352-cross-site-request-forgery--b66ed757</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12128%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kaushikankrani%20Hide%20Categories%20Or%20Products%20On%20Shop%20Page&amp;severity=medium&amp;id=69327172f88dbe026c779905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12133-cwe-862-missing-authorization-in-pa-4e091bfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12133%3A%20CWE-862%20Missing%20Authorization%20in%20paulepro2019%20EPROLO-Dropshipping&amp;severity=medium&amp;id=69327172f88dbe026c779909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12153-cwe-434-unrestricted-upload-of-file-57d99cfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12153%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tsaiid%20Featured%20Image%20via%20URL&amp;severity=high&amp;id=69327172f88dbe026c77990d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13623-cwe-79-improper-neutralization-of-i-76a162e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20natambu%20Twitscription&amp;severity=medium&amp;id=69327173f88dbe026c7799ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13622-cwe-79-improper-neutralization-of-i-c94fd007</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13622%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20missi%20Jabbernotification&amp;severity=medium&amp;id=69327173f88dbe026c7799c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10055-cwe-352-cross-site-request-forgery--146338ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10055%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mrdenny%20Time%20Sheets&amp;severity=medium&amp;id=69327172f88dbe026c7798fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13625-cwe-79-improper-neutralization-of-i-eba63968</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13625%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20switch2mac%20WP-SOS-Donate%20Donation%20Sidebar%20Plugin&amp;severity=medium&amp;id=69327173f88dbe026c7799d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13360-cwe-352-cross-site-request-forgery--7dda349c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13360%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20monkeyboz%20Quantic%20Social%20Image%20Hover&amp;severity=medium&amp;id=69327173f88dbe026c7799af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12368-cwe-79-improper-neutralization-of-i-13ec37a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpforchurch%20Sermon%20Manager&amp;severity=medium&amp;id=69327173f88dbe026c779997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13621-cwe-352-cross-site-request-forgery--1e5390c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13621%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20teamdream%20dream%20gallery&amp;severity=medium&amp;id=69327173f88dbe026c7799c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12165-cwe-862-missing-authorization-in-hu-225d6602</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12165%3A%20CWE-862%20Missing%20Authorization%20in%20huyme%20Webcake%20%E2%80%93%20Landing%20Page%20Builder&amp;severity=medium&amp;id=69327172f88dbe026c77991e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12163-cwe-434-unrestricted-upload-of-file-968edd0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12163%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=medium&amp;id=69327172f88dbe026c779915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13512-cwe-79-improper-neutralization-of-i-981b6d36</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jiangxin%20CoSign%20Single%20Signon&amp;severity=medium&amp;id=69327173f88dbe026c7799b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12124-cwe-79-improper-neutralization-of-i-658cdaa3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12124%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevindees%20FitVids%20for%20WordPress&amp;severity=medium&amp;id=69327172f88dbe026c779901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13312-cwe-862-missing-authorization-in-dr-e751d33c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13312%3A%20CWE-862%20Missing%20Authorization%20in%20dripadmin%20CRM%20Memberships&amp;severity=medium&amp;id=69326360f88dbe026c71794b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13006-cwe-200-exposure-of-sensitive-infor-cb23fe12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13006%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpeka-club%20SurveyFunnel%20%E2%80%93%20Survey%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69326360f88dbe026c717946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13313-cwe-862-missing-authorization-in-dr-61158105</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13313%3A%20CWE-862%20Missing%20Authorization%20in%20dripadmin%20CRM%20Memberships&amp;severity=critical&amp;id=69326360f88dbe026c717950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13362-cwe-352-cross-site-request-forgery--ae3731db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13362%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jevgenisultanov%20Norby%20AI&amp;severity=medium&amp;id=69326360f88dbe026c717958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13494-cwe-200-exposure-of-sensitive-infor-d7998fb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13494%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20jimmyredline80%20SSP%20Debug&amp;severity=medium&amp;id=69326360f88dbe026c71795d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12417-cwe-79-improper-neutralization-of-i-d9f9a221</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12417%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeka-club%20SurveyFunnel%20%E2%80%93%20Survey%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69326360f88dbe026c717941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privilege-escalation-with-sagemaker-and-theres-mor-22ea5223</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privilege%20escalation%20with%20SageMaker%20and%20there&apos;s%20more%20hiding%20in%20execution%20roles&amp;severity=medium&amp;id=69325fe5f88dbe026c6cfa4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13066-cwe-434-unrestricted-upload-of-file-299ff291</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13066%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kraftplugins%20Demo%20Importer%20Plus&amp;severity=high&amp;id=693255a910edf2688fec311d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12804-cwe-79-improper-neutralization-of-i-5cfb9f06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6932441b10edf2688fd42d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11759-cwe-352-cross-site-request-forgery--69653492</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11759%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20watchful%20Backup%2C%20Restore%20and%20Migrate%20your%20sites%20with%20XCloner&amp;severity=medium&amp;id=6932441b10edf2688fd42d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/predator-spyware-uses-new-infection-vector-for-zer-5b9e3101</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Predator%20spyware%20uses%20new%20infection%20vector%20for%20zero-click%20attacks&amp;severity=high&amp;id=6932280a10edf2688fa50fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62223-cwe-451-user-interface-ui-misrepres-4bfccf35</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62223%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69322b9410edf2688fa9d45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scam-telegram-uncovering-a-network-of-groups-sprea-5d74cf32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scam%20Telegram%3A%20Uncovering%20a%20network%20of%20groups%20spreading%20crypto%20drainers&amp;severity=medium&amp;id=6932250aca35b6b64b3de0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14052-improper-access-controls-in-youlait-d7f43c1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14052%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=69322501ca35b6b64b3d997e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-05-19fb5a30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-05&amp;severity=medium&amp;id=69337586f88dbe026c314958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66644-cwe-78-improper-neutralization-of-s-b695b96a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66644%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Array%20Networks%20ArrayOS%20AG&amp;severity=high&amp;id=69332bc4f88dbe026c09c124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65879-na-9c30855d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65879%3A%20n%2Fa&amp;severity=high&amp;id=693308e8f88dbe026cf79163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65878-na-570405b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65878%3A%20n%2Fa&amp;severity=high&amp;id=693308e8f88dbe026cf79152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65897-na-be1f93c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65897%3A%20n%2Fa&amp;severity=high&amp;id=69330517f88dbe026cf63b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64052-na-d41f7f2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64052%3A%20n%2Fa&amp;severity=medium&amp;id=6932fe10f88dbe026cf26f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64054-na-c414aa7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64054%3A%20n%2Fa&amp;severity=critical&amp;id=6932fe10f88dbe026cf26f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64053-na-7d072d57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64053%3A%20n%2Fa&amp;severity=high&amp;id=6932fe10f88dbe026cf26f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65730-na-d39e0484</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65730%3A%20n%2Fa&amp;severity=high&amp;id=6932faa1f88dbe026cf03a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64056-na-40738bac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64056%3A%20n%2Fa&amp;severity=medium&amp;id=6932faa1f88dbe026cf03a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64057-na-55640d3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64057%3A%20n%2Fa&amp;severity=high&amp;id=6932f385f88dbe026cec3912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66270-cwe-290-authentication-bypass-by-sp-b75d63e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66270%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20KDE%20KDE%20Connect%20protocol&amp;severity=medium&amp;id=69327175f88dbe026c7799fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32900-cwe-348-use-of-less-trusted-source--9a75dd13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32900%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20KDE%20KDE%20Connect%20information-exchange%20protocol&amp;severity=medium&amp;id=69327175f88dbe026c7799f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32901-na-a07e35c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32901%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20KDE%20KDEConnect&amp;severity=medium&amp;id=69326a69f88dbe026c743adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32899-cwe-1250-improper-preservation-of-c-9341e416</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32899%3A%20CWE-1250%20Improper%20Preservation%20of%20Consistency%20Between%20Independent%20Representations%20of%20Shared%20State%20in%20KDE%20KDEConnect&amp;severity=medium&amp;id=693266fdf88dbe026c734aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32898-cwe-331-insufficient-entropy-in-kde-617ab461</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32898%3A%20CWE-331%20Insufficient%20Entropy%20in%20KDE%20KDE%20Connect%20verification-code%20protocol&amp;severity=medium&amp;id=69326360f88dbe026c717962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13373-cwe-89-improper-neutralization-of-s-a2ccfc80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13373%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20iView&amp;severity=high&amp;id=69321472c0111c56163e71de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66564-cwe-405-asymmetric-resource-consump-58f6633f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66564%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sigstore%20timestamp-authority&amp;severity=high&amp;id=69321040c0111c56163950c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66563-cwe-79-improper-neutralization-of-i-34304f8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20monkeytypegame%20monkeytype&amp;severity=high&amp;id=69320cc6c0111c561635040d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14051-improper-control-of-dynamically-ide-fe6d3923</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14051%3A%20Improper%20Control%20of%20Dynamically-Identified%20Variables%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=69320cc6c0111c5616350401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66561-cwe-79-improper-neutralization-of-i-892367d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66561%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syslifters%20sysreptor&amp;severity=high&amp;id=69320cc6c0111c561635040a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66559-cwe-129-improper-validation-of-arra-c9ff8982</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66559%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20taikoxyz%20taiko-mono&amp;severity=high&amp;id=69320cc6c0111c5616350411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-claims-data-theft-from-church-of--f7a427f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Claims%20Data%20Theft%20from%20Church%20of%20Scientology&amp;severity=medium&amp;id=6932099a2bd9ee5f78fe6188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1547-cwe-121-stack-based-buffer-overflow--d3aa260d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1547%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693209ac2bd9ee5f78fe683b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66506-cwe-405-asymmetric-resource-consump-1804d010</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66506%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sigstore%20fulcio&amp;severity=high&amp;id=693209ac2bd9ee5f78fe683e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1910-cwe-77-improper-neutralization-of-sp-9cebf594</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1910%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20WatchGuard%20Mobile%20VPN%20with%20SSL%20Client&amp;severity=medium&amp;id=693206ca2bd9ee5f78fbc0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12986-cwe-410-insufficient-resource-pool--14c293a3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12986%3A%20CWE-410%20Insufficient%20Resource%20Pool%20in%20silabs.com%20Gecko%20SDK&amp;severity=medium&amp;id=693206ca2bd9ee5f78fbc0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6946-cwe-79-improper-neutralization-of-in-7f651186</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6946%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1545-cwe-91-xml-injection-aka-blind-xpath-44b78644</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1545%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6ba10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11838-cwe-763-release-of-invalid-pointer--927400d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11838%3A%20CWE-763%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6b9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13940-cwe-440-expected-behavior-violation-384f17b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13940%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13939-cwe-79-improper-neutralization-of-i-c7532d91</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13939%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13938-cwe-79-improper-neutralization-of-i-5a4c1d51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13938%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13937-cwe-79-improper-neutralization-of-i-5dc448e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13936-cwe-79-improper-neutralization-of-i-ee08a34b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13936%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12196-cwe-787-out-of-bounds-write-in-watc-920de881</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12196%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202972bd9ee5f78f6ba26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53704-cwe-640-in-maxhub-pivot-client-appl-76df85fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53704%3A%20CWE-640%20in%20MAXHUB%20Pivot%20client%20application&amp;severity=high&amp;id=693202972bd9ee5f78f6ba29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12195-cwe-787-out-of-bounds-write-in-watc-9bcbbe25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12195%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6ba19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12026-cwe-787-out-of-bounds-write-in-watc-fcb543e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12026%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6ba16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10285-cwe-200-exposure-of-sensitive-infor-0a366a3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10285%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20silabs.com%20Simplicity%20Studio%20V6&amp;severity=high&amp;id=693206ca2bd9ee5f78fbc0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13932-cwe-639-authorization-bypass-throug-aa31b8e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13932%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SolisCloud%20Monitoring%20Platform%20(Cloud%20API%20%26%20Device%20Control%20API)&amp;severity=high&amp;id=6931fbea0459f550ec00bb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66238-cwe-288-authentication-bypass-using-f951a49f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66238%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Sunbird%20DCIM%20dcTrack&amp;severity=high&amp;id=6931fbea0459f550ec00bb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66237-cwe-798-use-of-hard-coded-credentia-00b7a013</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66237%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sunbird%20DCIM%20dcTrack&amp;severity=high&amp;id=6931f91e0459f550ecfdf6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66479-cwe-693-protection-mechanism-failur-d411fa32</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66479%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20anthropic-experimental%20sandbox-runtime&amp;severity=low&amp;id=6931f91e0459f550ecfdf6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66576-cwe-78-improper-neutralization-of-s-60d48901</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66576%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Remotecontrolio%20Remote%20Keyboard%20Desktop&amp;severity=high&amp;id=6931f4df0459f550ecf89e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66575-cwe-428-unquoted-search-path-or-ele-0c73d453</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66575%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20VeePN%20VeeVPN&amp;severity=high&amp;id=6931f4df0459f550ecf89e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66574-cwe-79-improper-neutralization-of-i-e3d906be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66574%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Compass%20Plustechologies%20TranzAxis&amp;severity=medium&amp;id=6931f4df0459f550ecf89e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66573-cwe-319-cleartext-transmission-of-s-e57ea8a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66573%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20mersive%20Solstice%20Pod%20API%20Session%20Key%20Extraction%20via%20API%20Endpoint&amp;severity=medium&amp;id=6931f4e10459f550ecf89e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66572-cwe-78-improper-neutralization-of-s-4e4cc644</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66572%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20loadedcommerce%20Loaded%20Commerce&amp;severity=medium&amp;id=6931f4e10459f550ecf89e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66571-cwe-502-deserialization-of-untruste-c276a0d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66571%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20UNA%20CMS&amp;severity=critical&amp;id=6931f4e10459f550ecf89e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66555-cwe-306-missing-authentication-for--4e34efa3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66555%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20airkeyboardapp%20AirKeyboard%20iOS%20App&amp;severity=high&amp;id=6931f4e10459f550ecf89e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58278-cwe-78-improper-neutralization-of-s-1f5c991d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58278%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IndigoSTAR%20Software%20perl2exe&amp;severity=high&amp;id=6931f4df0459f550ecf89e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58277-cwe-312-cleartext-storage-of-sensit-b570aa70</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58277%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20R%20Radio%20Network%20Radio%20Network%20FM%20Transmitter&amp;severity=high&amp;id=6931f4df0459f550ecf89e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58275-cwe-88-improper-neutralization-of-a-f7a91610</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58275%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20jpylypiw%20Easywall&amp;severity=high&amp;id=6931f4df0459f550ecf89e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53734-cwe-89-improper-neutralization-of-s-7c3938e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53734%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mayurik%20dawa-pharma&amp;severity=high&amp;id=6931f4df0459f550ecf89e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27935-cwe-306-missing-authentication-for--f577cd8d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27935%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Ping%20Identity%20One-Time%20Passcode%20Integration%20Kit%20for%20PingFederate&amp;severity=high&amp;id=6931f4df0459f550ecf89e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13543-cwe-434-unrestricted-upload-of-file-8332a041</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13543%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rtowebsites%20PostGallery&amp;severity=high&amp;id=6931f1640459f550ecf415b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12997-cwe-639-authorization-bypass-throug-cdb1f64b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12997%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Medtronic%20CareLink%20Network&amp;severity=low&amp;id=6931eb9b6255310dc4c890ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12996-cwe-532-insertion-of-sensitive-info-c219bffc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12996%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Medtronic%20CareLink%20Network&amp;severity=medium&amp;id=6931eb9b6255310dc4c890aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12995-cwe-307-improper-restriction-of-exc-f9390566</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12995%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Medtronic%20CareLink%20Network&amp;severity=high&amp;id=6931eb9b6255310dc4c890a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-state-hackers-device-infected-with-lu-a5340a31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20State%20Hacker&apos;s%20Device%20Infected%20with%20LummaC2%20Infostealer%20Shows%20Links%20to%20%241.4B%20ByBit%20Breach%2C%20Tools%2C%20Specs%20and%20More&amp;severity=high&amp;id=6931eb876255310dc4c888db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12994-cwe-204-observable-response-discrep-9aba6b96</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12994%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Medtronic%20CareLink%20Network&amp;severity=medium&amp;id=6931eb9b6255310dc4c890a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prompt-injection-inside-github-actions-01092a5b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prompt%20Injection%20Inside%20GitHub%20Actions&amp;severity=medium&amp;id=6931dffae9ea82452668a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55182-vulnerability-in-react-and-nextjs-k-612a8fd0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55182%20vulnerability%20in%20React%20and%20Next.js%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6931dd90e9ea82452666b3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-rolls-back-order-to-preinstall-cybersecurity-b168cdbc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India%20Rolls%20Back%20Order%20to%20Preinstall%20Cybersecurity%20App%20on%20Smartphones&amp;severity=medium&amp;id=6931dd27e9ea824526660c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12097-cwe-23-relative-path-traversal-in-n-de70215d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12097%3A%20CWE-23-%20Relative%20Path%20Traversal%20in%20NI%20LabVIEW&amp;severity=high&amp;id=6931dff2e9ea82452668a407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65945-cwe-347-improper-verification-of-cr-7797bebd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65945%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20auth0%20node-jws&amp;severity=high&amp;id=6931d8e6e9ea82452660f546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14016-improper-authorization-in-macrozhen-7a5443ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14016%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6931d8e6e9ea82452660f53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14015-buffer-overflow-in-h3c-magic-b0-6f43cdeb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14015%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B0&amp;severity=high&amp;id=6931d8e6e9ea82452660f535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13488-cwe-79-improper-neutralization-of-i-d2dab45d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=6931d56de9ea8245265c6741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14013-cross-site-scripting-in-jizhicms-824721d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14013%3A%20Cross%20Site%20Scripting%20in%20JIZHICMS&amp;severity=medium&amp;id=6931d6d1e9ea8245265fa5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9127-cwe-116-improper-encoding-or-escapin-13b5596b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9127%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Pure%20Storage%20PX%20Enterprise&amp;severity=high&amp;id=6931cf8f911f2f20c4b83bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/second-order-prompt-injection-attacks-on-serviceno-c993cd29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Second%20order%20prompt%20injection%20attacks%20on%20ServiceNow%20Now%20Assist&amp;severity=medium&amp;id=6931cb4f911f2f20c4b34d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contractors-with-hacking-records-accused-of-wiping-bdff6e3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contractors%20with%20hacking%20records%20accused%20of%20wiping%2096%20govt%20databases&amp;severity=high&amp;id=6931cb30911f2f20c4b341af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14012-sql-injection-in-jizhicms-233ea526</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14012%3A%20SQL%20Injection%20in%20JIZHICMS&amp;severity=medium&amp;id=6931c7b5911f2f20c4ae9818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14011-sql-injection-in-jizhicms-404bfb1f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14011%3A%20SQL%20Injection%20in%20JIZHICMS&amp;severity=medium&amp;id=6931c7b5911f2f20c4ae9811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-uses-fake-microsoft-teams-installer-to--b14de7ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Uses%20Fake%20Microsoft%20Teams%20Installer%20to%20Spread%20ValleyRAT%20Malware%20in%20China&amp;severity=medium&amp;id=6931cf03911f2f20c4b70883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66287-buffer-copy-without-checking-size-o-ad825aa7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66287%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20The%20WebKitGTK%20Team%20WebKitGTK&amp;severity=high&amp;id=6931bd5b6ade94f1c7900e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blocks-aisuru-botnet-powered-largest-ev-bc6f6a69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Blocks%20Aisuru%20Botnet%20Powered%20Largest%20Ever%2029.7%20Tbps%20DDoS%20Attack&amp;severity=medium&amp;id=6931b6c3739651d5d52f702a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66516-cwe-611-improper-restriction-of-xml-fa601313</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66516%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Tika%20core&amp;severity=high&amp;id=6931b6d8739651d5d52faf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8074-origin-validation-error-in-synology--c113a79c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8074%3A%20Origin%20Validation%20Error%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=medium&amp;id=6931a8e704d931fa5b427e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54160-improper-limitation-of-a-pathname-t-82534a15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54160%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=high&amp;id=6931a8e704d931fa5b427e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/svg-clickjacking-a-novel-and-powerful-twist-on-an--b121f58a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SVG%20Clickjacking%3A%20A%20novel%20and%20powerful%20twist%20on%20an%20old%20classic&amp;severity=medium&amp;id=6931a58e04d931fa5b3e2722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54159-missing-authorization-in-synology-b-355a1b0c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54159%3A%20Missing%20Authorization%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=high&amp;id=6931a8e704d931fa5b427e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54158-missing-authentication-for-critical-ad30c5f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54158%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=high&amp;id=6931a8e704d931fa5b427e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2848-missing-authorization-in-synology-sy-c316b554</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2848%3A%20Missing%20Authorization%20in%20Synology%20Synology%20Mail%20Server&amp;severity=medium&amp;id=6931a58504d931fa5b3e25d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inotiv-says-personal-information-stolen-in-ransomw-a96dc2b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inotiv%20Says%20Personal%20Information%20Stolen%20in%20Ransomware%20Attack&amp;severity=medium&amp;id=6931a56404d931fa5b3df6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14008-server-side-request-forgery-in-dayr-50f3b6b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14008%3A%20Server-Side%20Request%20Forgery%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=6931a58504d931fa5b3e25c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29846-improper-limitation-of-a-pathname-t-4ea0b4cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29846%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=high&amp;id=6931a58504d931fa5b3e25ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29845-improper-limitation-of-a-pathname-t-98d02142</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29845%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=medium&amp;id=6931a58504d931fa5b3e25cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29844-improper-limitation-of-a-pathname-t-e6579483</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29844%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=medium&amp;id=6931a58504d931fa5b3e25c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29843-improper-limitation-of-a-pathname-t-015a41e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29843%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=medium&amp;id=6931a58504d931fa5b3e25dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14007-cross-site-scripting-in-dayrui-xunr-d0f78d5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14007%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=low&amp;id=69319e6104d931fa5b36215c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14006-cross-site-scripting-in-dayrui-xunr-6b756ac1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14006%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=69319e6104d931fa5b36214c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5401-improper-control-of-dynamically-mana-78e4ecce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5401%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=medium&amp;id=69319adf5cc187f88da3627b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45539-out-of-bounds-write-in-synology-dis-c3a17529</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45539%3A%20Out-of-bounds%20Write%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=high&amp;id=69319adf5cc187f88da36278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45538-cross-site-request-forgery-csrf-in--0fd197e9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45538%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=critical&amp;id=69319adf5cc187f88da36275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reporters-without-borders-targeted-by-russian-hack-c491730c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reporters%20Without%20Borders%20Targeted%20by%20Russian%20Hackers&amp;severity=medium&amp;id=693197f05cc187f88da02929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14005-cross-site-scripting-in-dayrui-xunr-4ce13c38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14005%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=693190595cc187f88d96ed39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14004-server-side-request-forgery-in-dayr-6224eecc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14004%3A%20Server-Side%20Request%20Forgery%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=693190595cc187f88d96ed33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webxr-flaw-hits-4-billion-chromium-users-update-yo-bbd19cbe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WebXR%20Flaw%20Hits%204%20Billion%20Chromium%20Users%2C%20Update%20Your%20Browser%20Now&amp;severity=medium&amp;id=69318d4ba63052f0b8f415a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-cyber-agencies-issue-ai-security-guidance-f-c90bd730</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Cyber%20Agencies%20Issue%20AI%20Security%20Guidance%20for%20Critical%20Infrastructure%20OT&amp;severity=critical&amp;id=69318d2ca63052f0b8f3da9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-sold-albiriox-android-malware-targets-banks--3361558e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Sold%20Albiriox%20Android%20Malware%20Targets%20Banks%20and%20Crypto%20Holders&amp;severity=medium&amp;id=6931862ea63052f0b8ebf220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11222-na-in-line-corporation-central-dogm-d33e4199</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11222%3A%20na%20in%20LINE%20Corporation%20Central%20Dogma&amp;severity=medium&amp;id=69317f86e2bf61707fe31262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/personal-information-compromised-in-freedom-mobile-793d79b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Personal%20Information%20Compromised%20in%20Freedom%20Mobile%20Data%20Breach&amp;severity=medium&amp;id=69317870e2bf61707fdabe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-wi-fi-hack-npm-worm-defi-theft-48af21c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Wi-Fi%20Hack%2C%20npm%20Worm%2C%20DeFi%20Theft%2C%20Phishing%20Blasts%E2%80%94%20and%2015%20More%20Stories&amp;severity=critical&amp;id=693189bea63052f0b8ef5911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5-threats-that-reshaped-web-security-this-year-202-48692fa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5%20Threats%20That%20Reshaped%20Web%20Security%20This%20Year%20%5B2025%5D&amp;severity=medium&amp;id=69317c20e2bf61707fde762b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marquis-data-breach-impacts-over-780000-people-da17734a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marquis%20Data%20Breach%20Impacts%20Over%20780%2C000%20People&amp;severity=medium&amp;id=69316ef003f8574ee0f5a787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/protecting-llm-chats-from-the-eavesdropping-whispe-df64ff5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Protecting%20LLM%20chats%20from%20the%20eavesdropping%20Whisper%20Leak%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6931677103f8574ee0ebfa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vscode-extension-launches-multi-stage-at-5a020cbc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VSCode%20Extension%20Launches%20Multi-Stage%20Attack%20Chain%20with%20Anivia%20Loader%20and%20OctoRAT&amp;severity=medium&amp;id=69316adc03f8574ee0f04a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marquis-data-breach-impacts-over-74-us-banks-credi-b690f9f2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marquis%20data%20breach%20impacts%20over%2074%20US%20banks%2C%20credit%20unions&amp;severity=high&amp;id=693160f8475c06cd943e1bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kohlers-encrypted-smart-toilet-camera-is-not-actua-1483ebf2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kohler&apos;s%20Encrypted%20Smart%20Toilet%20Camera%20is%20not%20Actually%20end-to-end%20Encrypted&amp;severity=high&amp;id=693160f8475c06cd943e1bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/goldfactory-hits-southeast-asia-with-modified-bank-c713d794</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoldFactory%20Hits%20Southeast%20Asia%20with%20Modified%20Banking%20Apps%20Driving%2011%2C000%2B%20Infections&amp;severity=high&amp;id=693160f8475c06cd943e1bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-in-the-wild-exploitation-expected-for--b4d27fa6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%3A%20In-the-Wild%20Exploitation%20Expected%20for%20Critical%20React%20Vulnerability&amp;severity=critical&amp;id=693160ab475c06cd943d3d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14010-vulnerability-in-red-hat-red-hat-ce-29da00cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14010%3A%20Vulnerability%20in%20ansible-collections%20Ansible%20Community%20General%20Collection&amp;severity=medium&amp;id=69315a47475c06cd943687bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/goldfactory-hits-southeast-asia-with-modified-bank-02d60138</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoldFactory%20Hits%20Southeast%20Asia%20with%20Modified%20Banking%20Apps%20Driving%2011%2C000%2B%20Infections&amp;severity=medium&amp;id=693156a8744de630efd7f37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-corporate-web-26104f3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Corporate%20Web&amp;severity=medium&amp;id=69316f2803f8574ee0f61229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/record-297-tbps-ddos-attack-linked-to-aisuru-botne-78e9ca71</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Record%2029.7%20Tbps%20DDoS%20Attack%20Linked%20to%20AISURU%20Botnet%20with%20up%20to%204%20Million%20Infected%20Hosts&amp;severity=medium&amp;id=693138a3a5c331a7096817c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12826-cwe-862-missing-authorization-in-we-0d0be3e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12826%3A%20CWE-862%20Missing%20Authorization%20in%20webdevstudios%20Custom%20Post%20Type%20UI&amp;severity=medium&amp;id=69313190a5c331a7095e7764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12782-cwe-862-missing-authorization-in-be-5f0ae18e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12782%3A%20CWE-862%20Missing%20Authorization%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=69313190a5c331a7095e7760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13513-cwe-79-improper-neutralization-of-i-7de1723e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codejunkie%20Clik%20stats&amp;severity=medium&amp;id=69312035c33ce07f96ee3309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11727-cwe-79-improper-neutralization-of-i-5973f017</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codisto%20Omnichannel%20for%20WooCommerce%3A%20Google%2C%20Amazon%2C%20eBay%20%26%20Walmart%20Integration%20%E2%80%93%20Powered%20by%20Codisto&amp;severity=high&amp;id=693111e8654141e59c21c0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11379-cwe-200-exposure-of-sensitive-infor-39e3c0ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11379%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20roselldk%20WebP%20Express&amp;severity=medium&amp;id=693111e8654141e59c21c0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-reverse-engineered-a-billion-dollar-legal-ai-cad2ef16</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20I%20Reverse%20Engineered%20a%20Billion-Dollar%20Legal%20AI%20Tool%20and%20Found%20100k%2B%20Confidential%20Files&amp;severity=medium&amp;id=69310764654141e59c0584b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-attack-or-compromised-governmentx3f-x-807f38b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20Attack%20or%20Compromised%20Government%26%23x3f%3B%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Thu%2C%20Dec%204th)&amp;severity=medium&amp;id=6930f0a7899a68ecde2f4009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-04-1cd4a56e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-04&amp;severity=medium&amp;id=693224eeca35b6b64b3d6b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65900-na-4c728d8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65900%3A%20n%2Fa&amp;severity=medium&amp;id=6931fbea0459f550ec00bb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65899-na-bad1d1a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65899%3A%20n%2Fa&amp;severity=medium&amp;id=6931fbea0459f550ec00bb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63896-na-99a39207</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63896%3A%20n%2Fa&amp;severity=high&amp;id=6931f4df0459f550ecf89e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55948-na-fedd745d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55948%3A%20n%2Fa&amp;severity=high&amp;id=6931f4df0459f550ecf89e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63499-na-18bfdaf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63499%3A%20n%2Fa&amp;severity=medium&amp;id=6931e72c6255310dc4c3572f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29269-na-16ef8899</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29269%3A%20n%2Fa&amp;severity=critical&amp;id=6931e372e9ea8245266ca5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29268-na-94efe30c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29268%3A%20n%2Fa&amp;severity=critical&amp;id=6931e372e9ea8245266ca5ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65883-na-e0c8b88e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65883%3A%20n%2Fa&amp;severity=high&amp;id=6931e372e9ea8245266ca5b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65806-na-829274a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65806%3A%20n%2Fa&amp;severity=medium&amp;id=6931dff2e9ea82452668a427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59788-na-4fd54974</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59788%3A%20n%2Fa&amp;severity=high&amp;id=6931d8e6e9ea82452660f541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63362-na-15a72bb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63362%3A%20n%2Fa&amp;severity=critical&amp;id=6931d6d1e9ea8245265fa5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63361-na-72a87078</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63361%3A%20n%2Fa&amp;severity=medium&amp;id=6931d6d1e9ea8245265fa5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65637-na-c50d04ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65637%3A%20n%2Fa&amp;severity=high&amp;id=6931d56de9ea8245265c6745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63363-na-d6577472</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63363%3A%20n%2Fa&amp;severity=high&amp;id=6931cb48911f2f20c4b34cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66373-na-409527d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66373%3A%20n%2Fa&amp;severity=medium&amp;id=6931bd5b6ade94f1c7900e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63364-na-dc02eac0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63364%3A%20n%2Fa&amp;severity=high&amp;id=6931bd5b6ade94f1c7900e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65516-na-0bd91c4c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65516%3A%20n%2Fa&amp;severity=medium&amp;id=6931b411739651d5d52cf9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61148-na-0a686bdf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61148%3A%20n%2Fa&amp;severity=medium&amp;id=6931afbe739651d5d527e7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57213-na-2afcd05a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57213%3A%20n%2Fa&amp;severity=high&amp;id=6931ac46739651d5d523c1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57212-na-efe85f5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57212%3A%20n%2Fa&amp;severity=high&amp;id=6931ac46739651d5d523c1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57210-na-bc7ede44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57210%3A%20n%2Fa&amp;severity=high&amp;id=6931ac46739651d5d523c1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63681-na-134feafc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63681%3A%20n%2Fa&amp;severity=medium&amp;id=6931a8e704d931fa5b427e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56427-na-6de141a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56427%3A%20n%2Fa&amp;severity=high&amp;id=6931a8e704d931fa5b427e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54306-na-0a159f36</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54306%3A%20n%2Fa&amp;severity=high&amp;id=6931a58604d931fa5b3e2611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54305-na-45043029</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54305%3A%20n%2Fa&amp;severity=high&amp;id=6931a58604d931fa5b3e260c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54304-na-dc4117e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54304%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58604d931fa5b3e2607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54303-na-52a0db41</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54303%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58504d931fa5b3e25e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53963-na-97d350e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53963%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58504d931fa5b3e25e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65346-na-16d9c416</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65346%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58504d931fa5b3e25d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54307-na-e6ebcca8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54307%3A%20n%2Fa&amp;severity=high&amp;id=6931a58504d931fa5b3e25d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freedom-mobile-discloses-data-breach-exposing-cust-55c3e46d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Freedom%20Mobile%20discloses%20data%20breach%20exposing%20customer%20data&amp;severity=high&amp;id=6930ce18cd38a5251eb53e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-diy-retail-giant-leroy-merlin-discloses-a-d-7c36c903</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20DIY%20retail%20giant%20Leroy%20Merlin%20discloses%20a%20data%20breach&amp;severity=high&amp;id=6930ce18cd38a5251eb53e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62173-cwe-89-improper-neutralization-of-s-d682e58e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62173%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20restapps&amp;severity=high&amp;id=6930c7c5cd38a5251eae5a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66404-cwe-77-improper-neutralization-of-s-3a2d92df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66404%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Flux159%20mcp-server-kubernetes&amp;severity=medium&amp;id=6930a178e580ff243da31211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66293-cwe-125-out-of-bounds-read-in-pnggr-15674502</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66293%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=high&amp;id=6930a178e580ff243da3120b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/43-million-browsers-infected-inside-shadypandas-7--0f872fac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=4.3%20Million%20Browsers%20Infected%3A%20Inside%20ShadyPanda&apos;s%207-Year%20Malware%20Campaign&amp;severity=medium&amp;id=69316f2803f8574ee0f6121f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/albiriox-exposed-a-new-rat-mobile-malware-targetin-749c2dc4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Albiriox%20Exposed%3A%20A%20New%20RAT%20Mobile%20Malware%20Targeting%20Global%20Finance%20and%20Crypto%20Wallets&amp;severity=medium&amp;id=69316f2803f8574ee0f61206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-malware-lets-criminals-control-your-ph-8277a9f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20malware%20lets%20criminals%20control%20your%20phone%20and%20drain%20your%20bank%20account&amp;severity=medium&amp;id=69319e6204d931fa5b362195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/build-script-exposes-pypi-to-domain-takeover-attac-2890f8be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bootstrap%20script%20exposes%20PyPI%20to%20domain%20takeover%20attacks&amp;severity=medium&amp;id=69256fb97e8c0fda07b5dbc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-king-addons-flaw-under-active-attack-let-42f01a83</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20King%20Addons%20Flaw%20Under%20Active%20Attack%20Lets%20Hackers%20Make%20Admin%20Accounts&amp;severity=high&amp;id=693096ae728fb3f62eb63b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-blocks-roblox-over-distribution-of-lgbt-pro-7c3b8041</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20blocks%20Roblox%20over%20distribution%20of%20LGBT%20%22propaganda%22&amp;severity=high&amp;id=693096ae728fb3f62eb63b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-silently-patches-windows-lnk-flaw-after--c3b97aa6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Silently%20Patches%20Windows%20LNK%20Flaw%20After%20Years%20of%20Active%20Exploitation&amp;severity=high&amp;id=693096ae728fb3f62eb63b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-rsc-bugs-in-react-and-nextjs-allow-unauth-3bcb230e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20RSC%20Bugs%20in%20React%20and%20Next.js%20Allow%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=693096ae728fb3f62eb63b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66489-cwe-303-incorrect-implementation-of-10655bf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66489%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20calcom%20cal.com&amp;severity=critical&amp;id=693096f5728fb3f62eb70505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65097-cwe-284-improper-access-control-in--7bc73d15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65097%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20rommapp%20romm&amp;severity=high&amp;id=693096f5728fb3f62eb70502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65096-cwe-284-improper-access-control-in--ca4c2490</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65096%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20rommapp%20romm&amp;severity=medium&amp;id=693096f5728fb3f62eb704ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12385-cwe-770-allocation-of-resources-wit-3651cb1e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12385%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20The%20Qt%20Company%20Qt&amp;severity=high&amp;id=6930935d728fb3f62eb0af7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61727-cwe-295-improper-certificate-valida-3e76eb3f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61727%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=medium&amp;id=6930935d728fb3f62eb0af83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65027-cwe-79-improper-neutralization-of-i-5b6b216f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65027%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rommapp%20romm&amp;severity=high&amp;id=6930935d728fb3f62eb0af89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66453-cwe-400-uncontrolled-resource-consu-5df87036</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66453%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20mozilla%20rhino&amp;severity=medium&amp;id=693096f5728fb3f62eb70508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempts-to-bypass-cdns-wed-dec-3rd-4d50d6cd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempts%20to%20Bypass%20CDNs%2C%20(Wed%2C%20Dec%203rd)&amp;severity=medium&amp;id=6930934a728fb3f62eb089e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66406-cwe-863-incorrect-authorization-in--bb8ea01e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66406%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20smallstep%20certificates&amp;severity=medium&amp;id=69308fb4728fb3f62ea9b175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13992-side-channel-information-leakage-in-32bb09d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13992%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=69308c0f7d648701e00af4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-clickhouse-for-real-time-l7-ddos-bot-traffic-148695cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20ClickHouse%20for%20Real-Time%20L7%20DDoS%20%26%20Bot%20Traffic%20Analytics%20with%20Tempesta%20FW&amp;severity=high&amp;id=69308c147d648701e00af5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12819-untrusted-search-path-in-pgbouncer-04ecd573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12819%3A%20Untrusted%20Search%20Path%20in%20PgBouncer&amp;severity=high&amp;id=69308c0f7d648701e00af4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12084-vulnerability-in-python-software-fo-8434a7e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12084%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=693088877d648701e003bbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/68-of-phishing-websites-are-protected-by-cloudflar-0c03102a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=68%25%20Of%20Phishing%20Websites%20Are%20Protected%20by%20CloudFlare&amp;severity=medium&amp;id=6930888d7d648701e00402d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3884-improper-input-validation-in-red-hat-c30c3e30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3884%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20JBoss%20Enterprise%20Application%20Platform%207.1%20EUS%20for%20RHEL%207&amp;severity=high&amp;id=693088877d648701e003bbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66222-cwe-94-improper-control-of-generati-ddf80d66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66222%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=693088877d648701e003bbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66220-cwe-170-improper-null-termination-i-b431f4cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66220%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=693088877d648701e003bbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66208-cwe-78-improper-neutralization-of-s-44b853d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CollaboraOnline%20online&amp;severity=high&amp;id=693081947d648701e0f8358f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33208-cwe-427-uncontrolled-search-path-el-1d33caee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33208%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20TAO&amp;severity=high&amp;id=693081947d648701e0f83582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-rsc-bugs-in-react-and-nextjs-allow-unauth-4e911b0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20RSC%20Bugs%20in%20React%20and%20Next.js%20Allow%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=693089977d648701e00701bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66032-cwe-77-improper-neutralization-of-s-4aa2eec3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66032%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=693081947d648701e0f8358c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33211-cwe-1284-improper-validation-of-spe-d6579ed9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33211%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=693081947d648701e0f83587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33201-cwe-754-improper-check-for-unusual--34aa7337</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33201%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=693081947d648701e0f8357d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64763-cwe-693-protection-mechanism-failur-7a66d914</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64763%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20envoyproxy%20envoy&amp;severity=low&amp;id=693081947d648701e0f83595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64527-cwe-476-null-pointer-dereference-in-659d438a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64527%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=693081947d648701e0f83592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns-uncovers-infrastructure-used-in-sso-attacks-09f47a6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS%20Uncovers%20Infrastructure%20Used%20in%20SSO%20Attacks&amp;severity=medium&amp;id=69307b18b129615efa19324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discover-the-ai-tools-fueling-the-next-cybercrime--d9e05e7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discover%20the%20AI%20Tools%20Fueling%20the%20Next%20Cybercrime%20Wave%20%E2%80%94%20Watch%20the%20Webinar&amp;severity=low&amp;id=6930324c720cedca79479e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-silently-patches-windows-lnk-flaw-after--32cf48e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Silently%20Patches%20Windows%20LNK%20Flaw%20After%20Years%20of%20Active%20Exploitation&amp;severity=medium&amp;id=69307a4cb129615efa16ecf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64443-cwe-749-exposed-dangerous-method-or-67ded4cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64443%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20docker%20mcp-gateway&amp;severity=high&amp;id=69307b19b129615efa193349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-chatgpt-atlas-browser-used-in-clickfix-attack-a77a8755</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20ChatGPT%20Atlas%20Browser%20Used%20in%20ClickFix%20Attack%20to%20Steal%20Passwords&amp;severity=medium&amp;id=693076d4b129615efa105af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-king-addons-flaw-under-active-attack-let-7dd87bc3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20King%20Addons%20Flaw%20Under%20Active%20Attack%20Lets%20Hackers%20Make%20Admin%20Accounts&amp;severity=critical&amp;id=69307ac6b129615efa180f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deep-dive-into-dragonforce-ransomware-and-its-scat-6bb1bae3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deep%20dive%20into%20DragonForce%20ransomware%20and%20its%20Scattered%20Spider%20connection&amp;severity=high&amp;id=69306f9387f844e860798c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54065-cwe-913-improper-control-of-dynamic-0af04d93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54065%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20ZDoom%20gzdoom&amp;severity=high&amp;id=69306fa787f844e8607995d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20388-the-web-server-receives-a-url-or-si-c31f0719</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20388%3A%20The%20web%20server%20receives%20a%20URL%20or%20similar%20request%20from%20an%20upstream%20component%20and%20retrieves%20the%20contents%20of%20this%20URL%2C%20but%20it%20does%20not%20sufficiently%20ensure%20that%20the%20request%20is%20being%20sent%20to%20the%20expected%20destination.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=69306fa787f844e8607995f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20389-the-product-does-not-validate-or-in-395c6662</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20389%3A%20The%20product%20does%20not%20validate%20or%20incorrectly%20validates%20input%20that%20can%20affect%20the%20control%20flow%20or%20data%20flow%20of%20a%20program.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69306fa787f844e8607995f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20387-the-product-specifies-permissions-f-fc097e52</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20387%3A%20The%20product%20specifies%20permissions%20for%20a%20security-critical%20resource%20in%20a%20way%20that%20allows%20that%20resource%20to%20be%20read%20or%20modified%20by%20unintended%20actors.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69306fa787f844e8607995ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20383-the-product-exposes-sensitive-infor-3e262b85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20383%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69306fa787f844e8607995e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20384-the-software-does-not-neutralize-or-4d803748</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20384%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20output%20that%20is%20written%20to%20logs.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69306fa787f844e8607995e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20386-the-product-specifies-permissions-f-7022fb3a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20386%3A%20The%20product%20specifies%20permissions%20for%20a%20security-critical%20resource%20in%20a%20way%20that%20allows%20that%20resource%20to%20be%20read%20or%20modified%20by%20unintended%20actors.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69306fa787f844e8607995eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20385-the-software-does-not-neutralize-or-41b2ffe3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20385%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=69306fa787f844e8607995e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20381-the-software-performs-an-authorizat-864f96c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20381%3A%20The%20software%20performs%20an%20authorization%20check%20when%20an%20actor%20attempts%20to%20access%20a%20resource%20or%20perform%20an%20action%2C%20but%20it%20does%20not%20correctly%20perform%20the%20check.%20This%20allows%20attackers%20to%20bypass%20intended%20access%20restrictions.%20in%20Splunk%20Splunk%20MCP%20Server&amp;severity=medium&amp;id=69306fa787f844e8607995dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20382-a-web-application-accepts-a-user-co-fc7491e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20382%3A%20A%20web%20application%20accepts%20a%20user-controlled%20input%20that%20specifies%20a%20link%20to%20an%20external%20site%2C%20and%20uses%20that%20link%20in%20a%20Redirect.%20This%20simplifies%20phishing%20attacks.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=69306fa787f844e8607995df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34319-cwe-78-improper-neutralization-of-s-9672dc71</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34319%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOTOLINK%20N300RT&amp;severity=critical&amp;id=69306fa987f844e860799605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13492-cwe-363-race-condition-enabling-lin-e2f4b223</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13492%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20HP%20Inc%20HP%20Image%20Assistant&amp;severity=medium&amp;id=69306cb887f844e860730073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-security-vulnerability-in-react-server-co-5b266d01</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Security%20Vulnerability%20in%20React%20Server%20Components%20%E2%80%93%20React&amp;severity=critical&amp;id=6930642dca1782a906c02ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7044-cwe-269-improper-privilege-managemen-83b8e25f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7044%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Ubuntu%20MAAS&amp;severity=high&amp;id=69305d3dca1782a906b23327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55182-deserialization-of-untrusted-data-c-103df002</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55182%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Meta%20react-server-dom-webpack&amp;severity=critical&amp;id=69305d3dca1782a906b2331e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brazil-hit-by-banking-trojan-spread-via-whatsapp-w-0ea2e022</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brazil%20Hit%20by%20Banking%20Trojan%20Spread%20via%20WhatsApp%20Worm%20and%20RelayNFC%20NFC%20Relay%20Fraud&amp;severity=high&amp;id=69306c7187f844e86071d6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13949-unrestricted-upload-in-proudmubai-g-89572ba0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13949%3A%20Unrestricted%20Upload%20in%20ProudMuBai%20GoFilm&amp;severity=medium&amp;id=69304b991f9e797ee289a5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13948-use-of-hard-coded-cryptographic-key-1935dcd0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13948%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20opsre%20go-ldap-admin&amp;severity=medium&amp;id=69304b991f9e797ee289a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spotted-lazaruss-remote-it-workers-in--136485a8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20spotted%20Lazarus%E2%80%99s%20remote%20IT%20workers%20in%20action&amp;severity=medium&amp;id=69304b691f9e797ee28988f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-phoenix-discloses-data-breach-after--6b4a089a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Phoenix%20discloses%20data%20breach%20after%20Oracle%20hack&amp;severity=high&amp;id=69304b691f9e797ee28988ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dupehike-targeting-russian-employees-wit-4fe48642</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20DupeHike%3A%20Targeting%20Russian%20employees%20with%20DUPERUNNER%20and%20AdaptixC2&amp;severity=medium&amp;id=693076e4b129615efa107004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-botnet-behind-new-record-breaking-297-tbps--5b06cbe3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20botnet%20behind%20new%20record-breaking%2029.7%20Tbps%20DDoS%20attack&amp;severity=high&amp;id=69304b691f9e797ee28988e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-zero-to-system-building-printspoofer-from-scr-448e4637</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Zero%20to%20SYSTEM%3A%20Building%20PrintSpoofer%20from%20Scratch&amp;severity=medium&amp;id=693047c951392e1c8b1ec81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13359-cwe-89-improper-neutralization-of-s-158518fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13359%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=6930444551392e1c8b19b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13756-cwe-862-missing-authorization-in-te-9095e370</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13756%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Fluent%20Booking%20%E2%80%93%20The%20Ultimate%20Appointments%20Scheduling%2C%20Events%20Booking%2C%20Events%20Calendar%20Solution&amp;severity=medium&amp;id=6930444551392e1c8b19b547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13401-cwe-79-improper-neutralization-of-i-a1a02eb5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13401%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=6930444551392e1c8b19b543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13390-cwe-303-incorrect-implementation-of-72fdb94c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13390%3A%20CWE-303%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20listingthemes%20WP%20Directory%20Kit&amp;severity=critical&amp;id=6930444551392e1c8b19b53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13354-cwe-862-missing-authorization-in-st-a39935ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13354%3A%20CWE-862%20Missing%20Authorization%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=6930444551392e1c8b19b537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-king-addons-vulnerability-exploited-to-ha-ded30ec3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20King%20Addons%20Vulnerability%20Exploited%20to%20Hack%20WordPress%20Sites&amp;severity=critical&amp;id=69303d2e51392e1c8b10e82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/picklescan-bugs-allow-malicious-pytorch-models-to--44c7f561</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Picklescan%20Bugs%20Allow%20Malicious%20PyTorch%20Models%20to%20Evade%20Scans%20and%20Execute%20Code&amp;severity=high&amp;id=69303d4551392e1c8b10f034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13109-cwe-639-authorization-bypass-throug-dbf7c3b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13109%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=69302ef1720cedca79452381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12358-cwe-352-cross-site-request-forgery--afcb5b3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12358%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20roxnor%20ShopEngine%20Elementor%20WooCommerce%20Builder%20Addon%20%E2%80%93%20All%20in%20One%20WooCommerce%20Solution&amp;severity=medium&amp;id=69302ef1720cedca79452379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13342-cwe-862-missing-authorization-in-sh-326b132b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13342%3A%20CWE-862%20Missing%20Authorization%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=critical&amp;id=69302ef1720cedca79452385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12887-cwe-862-missing-authorization-in-sa-2584c293</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12887%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=medium&amp;id=69302ef1720cedca7945237d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arizona-attorney-general-sues-chinese-online-retai-5d7ee877</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arizona%20Attorney%20General%20Sues%20Chinese%20Online%20Retailer%20Temu%20Over%20Data%20Theft%20Claims&amp;severity=medium&amp;id=69302ed9720cedca7945161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/penn-and-phoenix-universities-disclose-data-breach-1eb1293a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Penn%20and%20Phoenix%20Universities%20Disclose%20Data%20Breach%20After%20Oracle%20Hack&amp;severity=medium&amp;id=693020471e6d1f9abb0c6704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-silently-mitigated-exploited-lnk-vulnera-aa5a20a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Silently%20Mitigated%20Exploited%20LNK%20Vulnerability&amp;severity=critical&amp;id=6930184de1f6412a905e92d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/7-year-long-shadypanda-attack-spied-on-43m-chrome--7f0ebe7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=7%20Year%20Long%20ShadyPanda%20Attack%20Spied%20on%204.3M%20Chrome%20and%20Edge%20Users&amp;severity=medium&amp;id=69301873e1f6412a905e9aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pytorch-users-at-risk-unveiling-3-zero-day-pickles-5a0b81ea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PyTorch%20Users%20at%20Risk%3A%20Unveiling%203%20Zero-Day%20PickleScan%20Vulnerabilities&amp;severity=critical&amp;id=69300af87fb5593475cc5f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/korea-arrests-suspects-selling-intimate-videos-fro-ab5b059b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Korea%20arrests%20suspects%20selling%20intimate%20videos%20from%20hacked%20IP%20cameras&amp;severity=high&amp;id=69300ad57fb5593475cc523a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chopping-ai-down-to-size-turning-disruptive-techno-e6994fa9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chopping%20AI%20Down%20to%20Size%3A%20Turning%20Disruptive%20Technology%20into%20a%20Strategic%20Advantage&amp;severity=medium&amp;id=69301494e1f6412a90591c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lets-encrypt-to-reduce-certificate-validity-from-9-7fc8a1d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Let%E2%80%99s%20Encrypt%20to%20Reduce%20Certificate%20Validity%20from%2090%20Days%20to%2045%20Days&amp;severity=high&amp;id=69300ad57fb5593475cc5242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13947-vulnerability-in-red-hat-red-hat-en-a6fdd8f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13947%3A%20Vulnerability%20in%20The%20WebKitGTK%20Team%20webkitgtk&amp;severity=high&amp;id=69300af47fb5593475cc5a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/picklescan-bugs-allow-malicious-pytorch-models-to--366a8dd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Picklescan%20Bugs%20Allow%20Malicious%20PyTorch%20Models%20to%20Evade%20Scans%20and%20Execute%20Code&amp;severity=critical&amp;id=69301494e1f6412a90591c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teams-social-engineering-attack-threat-actors-impe-f930ae76</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Teams%20Social%20Engineering%20Attack%3A%20Threat%20Actors%20Impersonate%20IT%20to%20Steal%20Credentials%20via%20Quick%20Assist&amp;severity=medium&amp;id=69301885e1f6412a905ea62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/valleyrat-campaign-targets-job-seekers-abuses-foxi-6be9d4fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ValleyRAT%20Campaign%20Targets%20Job%20Seekers%2C%20Abuses%20Foxit%20PDF%20Reader%20for%20DLL%20Side-loading&amp;severity=medium&amp;id=693014f4e1f6412a905955b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-143-patches-high-severity-vulnerabilities-6db3884c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20143%20Patches%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=692ffc9010a87570525e15d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-matanbuchus-30-258ccfbb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20Matanbuchus%203.0&amp;severity=medium&amp;id=69301885e1f6412a905ea620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-v2-poses-risk-to-npm-supply-chain-fbfc969b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20V2%20Poses%20Risk%20to%20NPM%20Supply%20Chain&amp;severity=medium&amp;id=69301885e1f6412a905ea615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13472-cwe-862-missing-authorization-in-pe-f514d38a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13472%3A%20CWE-862%20Missing%20Authorization%20in%20Perforce%20BlazeMeter&amp;severity=medium&amp;id=692ffe297fb5593475bc861f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-rust-crate-delivers-os-specific-malware--5beded43</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Rust%20Crate%20Delivers%20OS-Specific%20Malware%20to%20Web3%20Developer%20Systems&amp;severity=medium&amp;id=69301494e1f6412a90591c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12744-improper-neutralization-of-special--86861de4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12744%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=692ff91810a8757052587e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29864-cwe-693-protection-mechanism-failur-67cfa2c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29864%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20ESTsoft%20ALZip&amp;severity=medium&amp;id=692ff59510a8757052538201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13946-cwe-835-loop-with-unreachable-exit--b76a7a1c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13946%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=692ff21010a87570524f4ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13945-cwe-1325-improperly-controlled-sequ-d601fd2b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13945%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=692ff21010a87570524f4ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13486-cwe-94-improper-control-of-generati-abf63164</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13486%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20hwk-fr%20Advanced%20Custom%20Fields%3A%20Extended&amp;severity=critical&amp;id=692fdfe670961fbaa28b6194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12954-cwe-639-authorization-bypass-throug-e64fd5d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12954%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Timetable%20and%20Event%20Schedule%20by%20MotoPress&amp;severity=low&amp;id=692fd8dd70961fbaa2808df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10304-cwe-862-missing-authorization-in-ev-477128dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10304%3A%20CWE-862%20Missing%20Authorization%20in%20everestthemes%20Everest%20Backup%20%E2%80%93%20WordPress%20Cloud%20Backup%2C%20Migration%2C%20Restore%20%26%20Cloning%20Plugin&amp;severity=medium&amp;id=692fb1c7619fec35b4585800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12585-cwe-200-exposure-of-sensitive-infor-ef91f6c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12585%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mxchat%20MxChat%20%E2%80%93%20AI%20Chatbot%20%26%20Content%20Generation%20for%20WordPress&amp;severity=medium&amp;id=692fb1c7619fec35b4585804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13495-cwe-89-improper-neutralization-of-s-ed673efb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpmanageninja%20FluentCart%20A%20New%20Era%20of%20eCommerce%20%E2%80%93%20Faster%2C%20Lighter%2C%20and%20Simpler&amp;severity=medium&amp;id=692fb1c7619fec35b4585809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13646-cwe-434-unrestricted-upload-of-file-7a8848e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13646%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpchill%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=high&amp;id=692fa033619fec35b4509f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13448-cwe-79-improper-neutralization-of-i-1194198c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anastis%20CSSIgniter%20Shortcodes&amp;severity=medium&amp;id=692fa033619fec35b4509f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13645-cwe-22-improper-limitation-of-a-pat-1c73e0b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13645%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpchill%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=high&amp;id=692fa033619fec35b4509f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-allocated-cves-on-an-ics-5g-modem-47813f69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20allocated%20CVEs%20on%20an%20ICS%205G%20modem&amp;severity=critical&amp;id=692fa037619fec35b450a37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-the-meatmeet-bbq-probe-ble-bbq-botnet-0d2d2058</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20the%20Meatmeet%20BBQ%20Probe%20%E2%80%94%20BLE%20BBQ%20Botnet&amp;severity=medium&amp;id=692f8824619fec35b4355c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-03-68658295</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-03&amp;severity=medium&amp;id=6930d0dbcd38a5251eb82279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64055-na-ca092a11</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64055%3A%20n%2Fa&amp;severity=critical&amp;id=6930a5c0e580ff243daab7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65868-na-f646e312</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65868%3A%20n%2Fa&amp;severity=critical&amp;id=69309f55e580ff243da01908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65345-na-784b00b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65345%3A%20n%2Fa&amp;severity=medium&amp;id=69309a36728fb3f62ec00aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50361-na-bc646533</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50361%3A%20n%2Fa&amp;severity=medium&amp;id=693096f5728fb3f62eb704fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63402-na-576ee601</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63402%3A%20n%2Fa&amp;severity=medium&amp;id=693088877d648701e003bbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63401-na-7d5265e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63401%3A%20n%2Fa&amp;severity=medium&amp;id=693088877d648701e003bbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50360-na-488fd0cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50360%3A%20n%2Fa&amp;severity=high&amp;id=693088877d648701e003bbcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/django-5113-sql-injection-c417d485</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Django%205.1.13%20-%20SQL%20Injection&amp;severity=medium&amp;id=69307a4db129615efa16edc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mangoswebv4-406-reflected-xss-3c807e92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MaNGOSWebV4%20%204.0.6%20-%20Reflected%20XSS&amp;severity=medium&amp;id=69307a4db129615efa16edbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-298-cross-site-request-forgery-csrf-fdea48ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%20%202.9.8%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=69307a4db129615efa16edba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-298-cross-site-request-forgerycsrf-b7584494</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%202.9.8%20-%20Cross-Site%20Request%20Forgery(CSRF)&amp;severity=medium&amp;id=69307a4db129615efa16edb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54326-na-82dc8755</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54326%3A%20n%2Fa&amp;severity=high&amp;id=6930731787f844e860805d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53965-na-481ff2f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53965%3A%20n%2Fa&amp;severity=medium&amp;id=6930731787f844e860805d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65842-na-26019e80</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65842%3A%20n%2Fa&amp;severity=medium&amp;id=69306fa987f844e86079960f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65841-na-bc0143ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65841%3A%20n%2Fa&amp;severity=medium&amp;id=69306fa987f844e86079960a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65843-na-d65ec0bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65843%3A%20n%2Fa&amp;severity=high&amp;id=69306cb887f844e860730076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-298-cross-site-request-forgery-csrf-478a313a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFaq%202.9.8%20-%20Cross%20Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=69306c2987f844e860718477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62686-na-d5629c2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62686%3A%20n%2Fa&amp;severity=medium&amp;id=6930666887f844e8606805b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55076-na-e4a5c80a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55076%3A%20n%2Fa&amp;severity=medium&amp;id=6930666887f844e8606805b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65320-na-a5da9e94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65320%3A%20n%2Fa&amp;severity=high&amp;id=69306429ca1782a906c01f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57202-na-d2573b7e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57202%3A%20n%2Fa&amp;severity=medium&amp;id=693060a5ca1782a906b8901c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57199-na-4d6145c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57199%3A%20n%2Fa&amp;severity=high&amp;id=69305d3dca1782a906b23322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57201-na-1bffe90d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57201%3A%20n%2Fa&amp;severity=high&amp;id=6930599dca1782a906ae61c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57198-na-050b7acc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57198%3A%20n%2Fa&amp;severity=high&amp;id=6930599dca1782a906ae61bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57200-na-5b7e84ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57200%3A%20n%2Fa&amp;severity=medium&amp;id=693055f81f9e797ee2973435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65267-na-abf373e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65267%3A%20n%2Fa&amp;severity=critical&amp;id=693052741f9e797ee291ba0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53841-cwe-829-inclusion-of-functionality--f3f84827</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53841%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Akamai%20Guardicore%20Platform%20Agent&amp;severity=high&amp;id=69304fa91f9e797ee28efe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/opensis-community-edition-80-sql-injection-24a9359d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=openSIS%20Community%20Edition%208.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pluckcms-4710-unrestricted-file-upload-3a229877</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PluckCMS%204.7.10%20-%20Unrestricted%20File%20Upload&amp;severity=medium&amp;id=6930038e7fb5593475c25d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rosariosis-672-cross-site-scripting-xss-f92c0fe8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RosarioSIS%206.7.2%20-%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6930038e7fb5593475c25d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rosariosis-672-cross-site-scripting-xss-4d3614cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RosarioSIS%206.7.2%20-%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6930038e7fb5593475c25d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyadmin-500-sql-injection-85bbe257</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyAdmin%205.0.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openrepeater-21-os-command-injection-a7ec780c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenRepeater%202.1%20-%20OS%20Command%20Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-14-sql-injection-cc8fc93d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.4%20-%20SQL-Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobiledetect-2831-cross-site-scripting-xss-f5d2c590</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MobileDetect%202.8.31%20-%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6930038e7fb5593475c25ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65955-4f13c19e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65955&amp;severity=null&amp;id=6933721cf88dbe026c2f889d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55181-excessive-iteration-cwe-834-in-face-8b81852c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55181%3A%20Excessive%20Iteration%20(CWE-834)%20in%20Facebook%20proxygen&amp;severity=medium&amp;id=692f6512ecdd9d4651b6b4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-npm-malware-attack-exposed-up-to-400-6efb9a71</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%202.0%20NPM%20malware%20attack%20exposed%20up%20to%20400%2C000%20dev%20secrets&amp;severity=high&amp;id=692f5aa33b1ed793e3777f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-investment-platform-reputation-laundering-fel-2408de50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Investment%20Platform%20Reputation%20Laundering%3A%20Felix%20Markets&amp;severity=medium&amp;id=69301885e1f6412a905ea612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ipcola-a-tangled-mess-ade1e94f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IPCola%3A%20A%20Tangled%20Mess&amp;severity=medium&amp;id=69301885e1f6412a905ea5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salty2fa-tycoon2fa-hybrid-phishing-threat-59c5c85a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salty2FA%20%26%20Tycoon2FA%3A%20Hybrid%20Phishing%20Threat&amp;severity=medium&amp;id=69301bdbe1f6412a9062f6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62575-cwe-732-incorrect-permission-assign-f42fee2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62575%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e7584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64778-cwe-798-use-of-hard-coded-credentia-aabd284f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64778%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e758d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-autonomously-finds-7-ffmpeg-vulnerabilities-e4767235</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Autonomously%20Finds%207%20FFmpeg%20Vulnerabilities&amp;severity=medium&amp;id=692f572f3b1ed793e36e769e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61940-cwe-603-in-mirion-medical-ec2-softw-5039d0fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61940%3A%20CWE-603%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e7581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64298-cwe-732-incorrect-permission-assign-cfb58323</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64298%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e7587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64642-cwe-732-incorrect-permission-assign-634111cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64642%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e758a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13658-cwe-94-improper-control-of-generati-128a847f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13658%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Industrial%20Video%20%26%20Control%20Longwatch&amp;severity=critical&amp;id=692f4367afa3b8e14e1402ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13510-cwe-306-missing-authentication-for--5529c5ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13510%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Iskra%20iHUB%20and%20iHUB%20Lite&amp;severity=critical&amp;id=692f3fe3afa3b8e14e0f8b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13542-cwe-269-improper-privilege-manageme-f7f7617b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13542%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20DesignThemes%20DesignThemes%20LMS&amp;severity=critical&amp;id=692f3fe3afa3b8e14e0f8b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13633-use-after-free-in-google-chrome-62a8e7d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13633%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3c0ae0601f8fcd7fd7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13721-race-in-google-chrome-b3d1a5a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13721%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=692f388ae0601f8fcd7a94f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13720-bad-cast-in-google-chrome-51116d11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13720%3A%20Bad%20cast%20in%20Google%20Chrome&amp;severity=high&amp;id=692f388ae0601f8fcd7a94f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13640-inappropriate-implementation-in-goo-aec0d8fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13640%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=low&amp;id=692f3888e0601f8fcd7a94e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13639-inappropriate-implementation-in-goo-05006092</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13639%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13638-use-after-free-in-google-chrome-be4f96c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13638%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13637-inappropriate-implementation-in-goo-506cdd51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13637%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13636-inappropriate-implementation-in-goo-b9e1ebbd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13636%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13635-inappropriate-implementation-in-goo-2f08d906</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13635%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13634-inappropriate-implementation-in-goo-44eb0ccb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13634%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13632-inappropriate-implementation-in-goo-f4c332ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13632%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13631-inappropriate-implementation-in-goo-6b35b0c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13631%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13630-type-confusion-in-google-chrome-6ca63907</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13630%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61729-cwe-400-uncontrolled-resource-consu-cab160cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61729%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=692f388ae0601f8fcd7a9500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57850-incorrect-default-permissions-in-re-73698159</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57850%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Dev%20Spaces&amp;severity=medium&amp;id=692f388ae0601f8fcd7a94fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66468-cwe-79-improper-neutralization-of-i-c3881662</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66468%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aimeos%20ai-cms-grapesjs&amp;severity=high&amp;id=692f388ae0601f8fcd7a9506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34352-cwe-378-creation-of-temporary-file--0593710e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34352%3A%20CWE-378%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20JumpCloud%20Inc.%20Remote%20Assist&amp;severity=high&amp;id=692f3503e0601f8fcd752d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66454-cwe-321-use-of-hard-coded-cryptogra-a6049b44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66454%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ArcadeAI%20arcade-mcp&amp;severity=medium&amp;id=692f3503e0601f8fcd752d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-asus-breach-and-1tb-data-de1c2b86</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Claims%20ASUS%20Breach%20and%201TB%20Data%20Theft%20and%20Camera%20Source%20Code&amp;severity=high&amp;id=692f2e02e0601f8fcd6c881a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66416-cwe-1188-insecure-default-initializ-5b3049bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66416%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20modelcontextprotocol%20python-sdk&amp;severity=high&amp;id=692f388ae0601f8fcd7a9517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66414-cwe-1188-insecure-default-initializ-6f8d5c09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66414%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20modelcontextprotocol%20typescript-sdk&amp;severity=high&amp;id=692f388ae0601f8fcd7a9513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66409-cwe-125-out-of-bounds-read-in-espre-ad11dd44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66409%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20espressif%20esp-idf&amp;severity=low&amp;id=692f388ae0601f8fcd7a950a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52622-cwe-1188-initialization-of-a-resour-5281ccea</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52622%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=692f2e1ae0601f8fcd6cf191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-orders-messaging-apps-to-work-only-with-acti-b8ec7336</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India%20Orders%20Messaging%20Apps%20to%20Work%20Only%20With%20Active%20SIM%20Cards%20to%20Prevent%20Fraud%20and%20Misuse&amp;severity=medium&amp;id=692f364ce0601f8fcd788da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-calendly-invites-spoof-top-brands-to-hijack-a-f73337a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Calendly%20invites%20spoof%20top%20brands%20to%20hijack%20ad%20manager%20accounts&amp;severity=high&amp;id=692f23a13286267b25e22b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-capture-lazarus-apts-remote-worker-sch-57700cf7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Capture%20Lazarus%20APT&apos;s%20Remote-Worker%20Scheme%20Live%20on%20Camera&amp;severity=high&amp;id=692f23a13286267b25e22b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-strikes-israel-with-advanced-muddyviper-2334153d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20strikes%20Israel%20with%20advanced%20MuddyViper%20malware&amp;severity=medium&amp;id=692f23a13286267b25e22b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64750-cwe-61-unix-symbolic-link-symlink-f-68f3491c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64750%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20sylabs%20singularity&amp;severity=medium&amp;id=692f23d63286267b25e270f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cheaters-use-rigged-deckmate-2-shuffling-machi-c7c59261</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20cheaters%20use%20rigged%20DeckMate%202%20shuffling%20machines%20in%20poker%20games%20%7C%20Kaspersky%20official%20blog&amp;severity=low&amp;id=692f1cc417aa519cfe209dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nk-hackers-push-200-malicious-npm-packages-with-ot-9aa70280</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NK%20Hackers%20Push%20200%20Malicious%20npm%20Packages%20with%20OtterCookie%20Malware&amp;severity=medium&amp;id=692f15ad17aa519cfe1668c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13877-use-of-hard-coded-cryptographic-key-7c398c0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13877%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20nocobase&amp;severity=medium&amp;id=692f0ffa16d939a309ce6a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12630-cwe-862-missing-authorization-in-up-c197e569</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12630%3A%20CWE-862%20Missing%20Authorization%20in%20Upload.am&amp;severity=medium&amp;id=692f0ffa16d939a309ce6a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58113-cwe-125-out-of-bounds-read-in-pdf-x-fa9855c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58113%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20Co.%20Ltd%20PDF-XChange%20Editor&amp;severity=medium&amp;id=692f093f16d939a309c3098d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64460-cwe-407-inefficient-algorithmic-com-67ad7ade</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64460%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=692f093f16d939a309c309a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13372-cwe-89-improper-neutralization-of-s-aebb4096</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13372%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=692f093f16d939a309c3099b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13876-path-traversal-in-rareprob-hd-video-66867314</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13876%3A%20Path%20Traversal%20in%20Rareprob%20HD%20Video%20Player%20All%20Formats%20App&amp;severity=medium&amp;id=692f01f216d939a309b5f1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13875-path-traversal-in-yohann0617-oci-he-9fb91636</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13875%3A%20Path%20Traversal%20in%20Yohann0617%20oci-helper&amp;severity=medium&amp;id=692f01f216d939a309b5f1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-capture-lazarus-apts-remote-worker-sch-089210a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Capture%20Lazarus%20APT&apos;s%20Remote-Worker%20Scheme%20Live%20on%20Camera&amp;severity=medium&amp;id=692f090716d939a309c2cf91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-returns-with-24-malicious-extensions-imp-4df0adc2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Returns%20with%2024%20Malicious%20Extensions%20Impersonating%20Popular%20Developer%20Tools&amp;severity=medium&amp;id=692f090716d939a309c2cf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-pennsylvania-confirms-new-data-breac-e921d302</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Pennsylvania%20confirms%20new%20data%20breach%20after%20Oracle%20hack&amp;severity=high&amp;id=692efea13a1612a93738ba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snakes-by-the-riverbank-cfe5c4a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snakes%20by%20the%20riverbank&amp;severity=medium&amp;id=69307ddeb129615efa1d7bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unraveling-water-sacis-new-multi-format-ai-enhance-47fb0232</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unraveling%20Water%20Saci&apos;s%20New%20Multi-Format%2C%20AI-Enhanced%20Attacks%20Propagated%20via%20WhatsApp&amp;severity=medium&amp;id=693076e4b129615efa107016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13505-cwe-79-improper-neutralization-of-i-08d63ef8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Datateam%20Information%20Technologies%20Inc.%20Datactive&amp;severity=medium&amp;id=692ef7463a1612a9372eef3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-package-uses-hidden-prompt-and-scrip-401387e2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20Package%20Uses%20Hidden%20Prompt%20and%20Script%20to%20Evade%20AI%20Security%20Tools&amp;severity=medium&amp;id=692f090716d939a309c2cf97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41066-cwe-200-exposure-of-sensitive-infor-d3761bb1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41066%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Horde%20Groupware&amp;severity=medium&amp;id=692ef3cb3a1612a937294c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13731-cwe-79-improper-neutralization-of-i-10f26bf0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20Nexter%20Extension%20%E2%80%93%20Security%2C%20Performance%2C%20Code%20Snippets%20%26%20Site%20Toolkit&amp;severity=medium&amp;id=692ef09b5ae7112264d5b08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cops-are-using-flock-safetys-alpr-network-to-s-d43435cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Cops%20Are%20Using%20Flock%20Safety&apos;s%20ALPR%20Network%20to%20Surveil%20Protesters%20and%20Activists&amp;severity=medium&amp;id=692ef0865ae7112264d5af97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-edge-extensions-caught-tracking-users-creat-e20163e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%2C%20Edge%20Extensions%20Caught%20Tracking%20Users%2C%20Creating%20Backdoors&amp;severity=medium&amp;id=692ef06f5ae7112264d5ae48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13295-cwe-201-insertion-of-sensitive-info-0aead834</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13295%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Argus%20Technology%20Inc.%20BILGER&amp;severity=high&amp;id=692ef09b5ae7112264d5b09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-9m-yeth-exploit-how-16-wei-became-infinite-tok-7c241be6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20%249M%20yETH%20Exploit%3A%20How%2016%20Wei%20Became%20Infinite%20Tokens&amp;severity=critical&amp;id=692eecf55ae7112264d1dd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-hits-israeli-sectors-with-new--fea2a300</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Hit%20Israeli%20Sectors%20with%20New%20MuddyViper%20Backdoor%20in%20Targeted%20Attacks&amp;severity=medium&amp;id=692efe6f3a1612a93738610c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41086-cwe-639-authorization-bypass-throug-8f9fad01</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41086%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20AMS%20Development%20Corp.%20GAMS&amp;severity=medium&amp;id=692eecf35ae7112264d1dd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41015-cwe-200-exposure-of-sensitive-infor-f4771ec2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41015%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TCMAN%20GIM&amp;severity=medium&amp;id=692eecf35ae7112264d1dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41014-cwe-200-exposure-of-sensitive-infor-aa49defe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41014%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TCMAN%20GIM&amp;severity=medium&amp;id=692eecf35ae7112264d1dd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41013-cwe-89-improper-neutralization-of-s-f1aeff9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41013%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=high&amp;id=692eecf35ae7112264d1dd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41012-cwe-862-missing-authorization-in-tc-44d90a3f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41012%3A%20CWE-862%20Missing%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=692ee9715ae7112264cd39c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40700-cwe-79-improper-neutralization-of-i-134adbb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IDI%20Eikon%20Governalia&amp;severity=medium&amp;id=692ee9715ae7112264cd39c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11789-cwe-125-out-of-bounds-read-in-sge-p-f354691c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11789%3A%20CWE-125%20Out-of-bounds%20Read%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9715ae7112264cd39c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11788-cwe-122-heap-based-buffer-overflow--dc42eba6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11788%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9715ae7112264cd39bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11787-cwe-78-improper-neutralization-of-s-d52179af</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11787%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd398e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11786-cwe-121-stack-based-buffer-overflow-5755912b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11786%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd398b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11785-cwe-121-stack-based-buffer-overflow-a0b7f11a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11785%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11784-cwe-121-stack-based-buffer-overflow-5033d87c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11784%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11783-cwe-121-stack-based-buffer-overflow-db329ef2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11783%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11782-cwe-121-stack-based-buffer-overflow-185fca02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11782%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd397f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11781-cwe-321-use-of-hard-coded-cryptogra-35fce0bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11781%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd397c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11780-cwe-120-buffer-copy-without-checkin-92bbfbf9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11780%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11779-cwe-121-stack-based-buffer-overflow-d7539e65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11779%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=critical&amp;id=692ee9705ae7112264cd3976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11778-cwe-122-heap-based-buffer-overflow--acbe803a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11778%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=critical&amp;id=692ee9705ae7112264cd3973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13879-cwe-22-improper-limitation-of-a-pat-848a5ff8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13879%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SOLIDserver%20SOLIDserver%20IPAM&amp;severity=medium&amp;id=692edee35ae7112264c4ce02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12465-cwe-89-improper-neutralization-of-s-0c9c5a83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12465%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=high&amp;id=692edb645ae7112264c240c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-openai-coding-agent-could-facilit-00a6797b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20OpenAI%20Coding%20Agent%20Could%20Facilitate%20Attacks%20on%20Developers&amp;severity=medium&amp;id=692ed7d35ae7112264c0ae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proxyearth-tool-lets-anyone-trace-location-of-user-b0216d58</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Proxyearth%20Tool%20Lets%20Anyone%20Trace%20Location%20of%20Users%20in%20India%20with%20Just%20a%20Mobile%20Number&amp;severity=medium&amp;id=692ed4555ae7112264bed510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13090-cwe-89-improper-neutralization-of-s-1fee9c78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13090%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=medium&amp;id=692ed0d35ae7112264bc9d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-107-android-flaws-including-two-fra-75ab0a8c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20107%20Android%20Flaws%2C%20Including%20Two%20Framework%20Bugs%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=692ec9c95ae7112264b9022a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13353-cwe-330-use-of-insufficiently-rando-d49b9655</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13353%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Cloudflare%20gokey&amp;severity=high&amp;id=692ec9d25ae7112264b9032e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41742-cwe-1394-use-of-default-cryptograph-af68d0ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41742%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20Sprecher%20Automation%20SPRECON-E-C&amp;severity=critical&amp;id=692ef5303a1612a9372cbab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/personal-information-of-337-million-stolen-from-co-1c313a96</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Personal%20Information%20of%2033.7%20Million%20Stolen%20From%20Coupang&amp;severity=medium&amp;id=692ec2bb5ae7112264afaae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41743-cwe-326-inadequate-encryption-stren-0959ce89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41743%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Sprecher%20Automation%20SPRECON-E-C&amp;severity=medium&amp;id=692ef5303a1612a9372cbab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41744-cwe-1394-use-of-default-cryptograph-b679cc53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41744%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20Sprecher%20Automation%20SPRECON-E-C&amp;severity=critical&amp;id=692ef5303a1612a9372cbab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/situsamc-cyberattack-exposes-client-data-third-par-fd1c6535</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22SitusAMC%20Cyberattack%20Exposes%20Client%20Data%3A%20Third-Party%20Risks%20%26%20AI%20Threats%20in%20Focus%22&amp;severity=medium&amp;id=692ebbb95ae7112264a68f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-hackers-use-npmscancom-to-hack-web-apps-nextjs-f3c31266</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Hackers%20Use%20NPMSCan.com%20to%20Hack%20Web%20Apps%20(Next.js%2C%20Nuxt.js%2C%20React%2C%20Bun)&amp;severity=high&amp;id=692ebbce5ae7112264a691db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13873-cwe-79-improper-neutralization-of-i-ad3a0937</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ObjectPlanet%20Opinio&amp;severity=medium&amp;id=692ebbcb5ae7112264a69121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13872-cwe-918-server-side-request-forgery-e9d4de2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13872%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ObjectPlanet%20Opinio&amp;severity=low&amp;id=692ebbcb5ae7112264a6911e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13871-cwe-352-cross-site-request-forgery--4adbe25f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13871%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ObjectPlanet%20Opinio&amp;severity=low&amp;id=692eb8375ae7112264a43086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/androids-december-2025-updates-patch-two-zero-days-78243fb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Zero-Days%20Patched%20in%20December%202025%20Security%20Update&amp;severity=medium&amp;id=692eb4ab5ae7112264a2108b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13516-cwe-434-unrestricted-upload-of-file-a39e78b7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13516%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20brainstormforce%20SureMail%20%E2%80%93%20SMTP%20and%20Email%20Logs%20Plugin%20with%20Amazon%20SES%2C%20Postmark%2C%20and%20Other%20Providers&amp;severity=high&amp;id=692ef5303a1612a9372cbaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13724-cwe-89-improper-neutralization-of-s-af5f6c3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13724%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20e4jvikwp%20VikRentCar%20Car%20Rental%20Management%20System&amp;severity=high&amp;id=692ef5303a1612a9372cbac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13534-cwe-269-improper-privilege-manageme-a9dce4b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13534%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=692ef5303a1612a9372cbac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10543-cwe-681-incorrect-conversion-betwee-902262b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10543%3A%20CWE-681%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Eclipse%20Foundation%20paho.mqtt.golang%20(Go%20MQTT%20v3.1%20library)&amp;severity=medium&amp;id=692ef09b5ae7112264d5b098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10971-cwe-922-insecure-storage-of-sensiti-7613a2bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10971%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20FERMAX%20ELECTR%C3%93NICA%20S.A.U%20MeetMe&amp;severity=high&amp;id=692e9c175ae7112264944d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11726-cwe-862-missing-authorization-in-be-0f3b40f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11726%3A%20CWE-862%20Missing%20Authorization%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=692e98935ae71122648fbfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13696-cwe-200-exposure-of-sensitive-infor-8cce1899</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13696%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20softdiscover%20Zigaform%20%E2%80%93%20Price%20Calculator%20%26%20Cost%20Estimation%20Form%20Builder%20Lite&amp;severity=medium&amp;id=692e98935ae71122648fbfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-107-android-flaws-including-two-fra-69b5356f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20107%20Android%20Flaws%2C%20Including%20Two%20Framework%20Bugs%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=692efe6f3a1612a937386112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12483-cwe-89-improper-neutralization-of-s-434bf61e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12483%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeisle%20Visualizer%3A%20Tables%20and%20Charts%20Manager%20for%20WordPress&amp;severity=medium&amp;id=692e8e125ae71122647f9683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13140-cwe-352-cross-site-request-forgery--64a8b2f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13140%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=692e8e125ae71122647f9691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13685-cwe-352-cross-site-request-forgery--7fd5717c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Photo%20Gallery%20by%20Ays%20%E2%80%93%20Responsive%20Image%20Gallery&amp;severity=medium&amp;id=692e8e125ae71122647f9696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13007-cwe-79-improper-neutralization-of-i-eeed28e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13007%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adreastrian%20WP%20Social%20Ninja%20%E2%80%93%20Embed%20Social%20Feeds%2C%20User%20Reviews%20%26%20Chat%20Widgets&amp;severity=medium&amp;id=692e8e125ae71122647f9689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13001-cwe-89-sql-injection-in-donation-bc21badc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13001%3A%20CWE-89%20SQL%20Injection%20in%20donation&amp;severity=medium&amp;id=692e8375fdda6c2fef754182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13000-cwe-89-sql-injection-in-db-access-bbe27b8d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13000%3A%20CWE-89%20SQL%20Injection%20in%20db-access&amp;severity=high&amp;id=692e8375fdda6c2fef75417e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13606-cwe-352-cross-site-request-forgery--3b3b15bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13606%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smackcoders%20Export%20All%20Posts%2C%20Products%2C%20Orders%2C%20Refunds%20%26%20Users&amp;severity=medium&amp;id=692e6edbf8429d84f3bf2bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13387-cwe-79-improper-neutralization-of-i-26c42757</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Kadence%20WooCommerce%20Email%20Designer&amp;severity=high&amp;id=692e6edbf8429d84f3bf2bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20789-cwe-201-information-exposure-throug-ae3c1cd0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20789%3A%20CWE-201%20Information%20Exposure%20Through%20Sent%20Data%20in%20MediaTek%2C%20Inc.%20MT6781%2C%20MT6833%2C%20MT6853%2C%20MT6877%2C%20MT6893%2C%20MT8196&amp;severity=medium&amp;id=692e57b3f2f793a7de7f602c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20788-cwe-1262-improper-access-control-fo-1c04acbc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20788%3A%20CWE-1262%20Improper%20Access%20Control%20for%20Register%20Interface%20in%20MediaTek%2C%20Inc.%20MT6991%2C%20MT8196&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20777-cwe-787-out-of-bounds-write-in-medi-6bd6db28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20777%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20776-cwe-125-out-of-bounds-read-in-media-eafc648d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20776%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20775-cwe-415-double-free-in-mediatek-inc-5c572c82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20775%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20774-cwe-122-heap-overflow-in-mediatek-i-80054830</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20774%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b3f2f793a7de7f601d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20773-cwe-415-double-free-in-mediatek-inc-5da0d224</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20773%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b3f2f793a7de7f601a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20772-cwe-415-double-free-in-mediatek-inc-f6e6f2a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20772%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20771-cwe-457-use-of-uninitialized-variab-fd9ecaec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20771%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20770-cwe-416-use-after-free-in-mediatek--dfa1302a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20770%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20769-cwe-121-stack-overflow-in-mediatek--366ff4de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20769%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=low&amp;id=692e57b1f2f793a7de7f5f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20768-cwe-125-out-of-bounds-read-in-media-6973298f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20768%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20767-cwe-787-out-of-bounds-write-in-medi-f40a52d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20767%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20766-cwe-457-use-of-uninitialized-variab-4d6ad914</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20766%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20765-cwe-415-double-free-in-mediatek-inc-fc58df29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20765%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6980D%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8113%2C%20MT8115%2C%20MT8139%2C%20MT8163%2C%20MT8168%2C%20MT8169%2C%20MT8183%2C%20MT8186%2C%20MT8188%2C%20MT8512%2C%20MT8516%2C%20MT8518%2C%20MT8519%2C%20MT8532%2C%20MT8676%2C%20MT8678%2C%20MT8695%2C%20MT8696%2C%20MT8698&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20764-cwe-787-out-of-bounds-write-in-medi-5213981f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20764%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793%2C%20MT8796%2C%20MT8873%2C%20MT8893&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20763-cwe-787-out-of-bounds-write-in-medi-0073e8ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20763%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793%2C%20MT8796%2C%20MT8873%2C%20MT8893&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20750-cwe-476-null-pointer-dereference-in-111d2e82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20750%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20751-cwe-787-out-of-bounds-write-in-medi-77ba213f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20751%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20791-cwe-617-reachable-assertion-in-medi-4554b767</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20791%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20752-cwe-617-reachable-assertion-in-medi-6a79c733</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20752%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8791T&amp;severity=medium&amp;id=692e57aff2f793a7de7f5efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20756-cwe-1287-specified-type-in-mediatek-e71a999f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20756%3A%20CWE-1287%20Specified%20Type%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20757-cwe-617-reachable-assertion-in-medi-520122b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20757%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20758-cwe-248-uncaught-exception-in-media-1425e72a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20758%3A%20CWE-248%20Uncaught%20Exception%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20759-cwe-125-out-of-bounds-read-in-media-504bed14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20759%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8673%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20790-cwe-476-null-pointer-dereference-in-a133528c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20790%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57b3f2f793a7de7f602f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20755-cwe-476-null-pointer-dereference-in-6fd41c4a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20755%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20754-cwe-248-uncaught-exception-in-media-09981611</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20754%3A%20CWE-248%20Uncaught%20Exception%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20753-cwe-248-uncaught-exception-in-media-4f0f0048</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20753%3A%20CWE-248%20Uncaught%20Exception%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20792-cwe-617-reachable-assertion-in-medi-4f615484</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20792%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8791T&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/need-guidance-where-to-take-report-on-15-potential-2c128138</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Need%20Guidance%3A%20Where%20to%20take%20report%20on%2015%20potential%20Linux%20Kernel%20%2F%20VFS%20Vulnerabilities%20(including%20LPE%20Race%20Condition%20fix)&amp;severity=critical&amp;id=692e50a8f2f793a7de7cda65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45675-cwe-309-use-of-password-system-for--17a54da6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45675%3A%20CWE-309%20Use%20of%20Password%20System%20for%20Primary%20Authentication%20in%20IBM%20Informix%20Dynamic%20Server&amp;severity=high&amp;id=692e50a4f2f793a7de7cda09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13697-cwe-79-improper-neutralization-of-i-a015aa89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20BlockArt%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20Blocks%20%2CWordPress%20Block%20Plugin%2C%20Sections%20%26%20Template%20Library&amp;severity=medium&amp;id=692e50a4f2f793a7de7cda11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12529-cwe-73-external-control-of-file-nam-e14e9285</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12529%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=high&amp;id=692e50a4f2f793a7de7cda0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55129-vulnerability-in-revive-revive-adse-6a3ffc38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55129%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=692e499df2f793a7de78511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58488-cwe-940-improper-verification-of-so-b739ed9c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58488%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Samsung%20Mobile%20SmartTouchCall&amp;severity=medium&amp;id=692e499ef2f793a7de785153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58487-cwe-285-improper-authorization-in-s-16ba15ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58487%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=medium&amp;id=692e499ef2f793a7de785150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58486-cwe-20-improper-input-validation-in-b2d5ff3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58486%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=medium&amp;id=692e499ef2f793a7de78514d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58485-cwe-20-improper-input-validation-in-abf348ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58485%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Internet&amp;severity=medium&amp;id=692e499ef2f793a7de78514a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58484-cwe-276-incorrect-default-permissio-a2cf9060</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58484%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Cloud%20Assistant&amp;severity=medium&amp;id=692e499ef2f793a7de785147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58483-cwe-926-improper-export-of-android--77735cea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58483%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Galaxy%20Store%20for%20Galaxy%20Watch&amp;severity=medium&amp;id=692e499ef2f793a7de785144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58482-cwe-284-improper-access-control-in--fdb0f591</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58482%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20MotionPhoto&amp;severity=high&amp;id=692e499ef2f793a7de785141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58481-cwe-284-improper-access-control-in--99bb086b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58481%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20MotionPhoto&amp;severity=high&amp;id=692e499df2f793a7de785134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58480-cwe-122-heap-based-buffer-overflow--cd04d6b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58480%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58479-cwe-125-out-of-bounds-read-in-samsu-4d5d215c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58479%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de78512e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58478-cwe-787-out-of-bounds-write-in-sams-3c904326</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58478%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de78512b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58477-cwe-787-out-of-bounds-write-in-sams-39144dd8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58477%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58476-cwe-125-out-of-bounds-read-in-samsu-145f9b6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58476%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58475-cwe-20-improper-input-validation-in-6e0122f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58475%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21080-cwe-926-improper-export-of-android--144c456a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21080%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de78511c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21072-cwe-787-out-of-bounds-write-in-sams-6b26598c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21072%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-returns-in-third-wave-of-malicio-1726810a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Glassworm%20malware%20returns%20in%20third%20wave%20of%20malicious%20VS%20Code%20packages&amp;severity=high&amp;id=692e3805f2f793a7de175e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-02-f9395fb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-02&amp;severity=medium&amp;id=692f8089619fec35b42a60bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65657-na-8a528a6c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65657%3A%20n%2Fa&amp;severity=medium&amp;id=692f54d5c92f9eed9394b385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65380-na-68be8bb4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65380%3A%20n%2Fa&amp;severity=medium&amp;id=692f54d5c92f9eed9394b381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65379-na-fe06e323</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65379%3A%20n%2Fa&amp;severity=medium&amp;id=692f4a55c92f9eed9384ceea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65877-na-9d14b7ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65877%3A%20n%2Fa&amp;severity=high&amp;id=692f4367afa3b8e14e1402b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60736-na-e7416105</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60736%3A%20n%2Fa&amp;severity=critical&amp;id=692f3dc6afa3b8e14e0c8d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65896-na-118d4658</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65896%3A%20n%2Fa&amp;severity=critical&amp;id=692f3503e0601f8fcd752d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58386-na-d356c279</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58386%3A%20n%2Fa&amp;severity=critical&amp;id=692f2e1ae0601f8fcd6cf194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65844-na-b6ac5ae3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65844%3A%20n%2Fa&amp;severity=high&amp;id=692f2aab3286267b25ed5c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65215-na-13df7342</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65215%3A%20n%2Fa&amp;severity=medium&amp;id=692f279a3286267b25e84bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65881-na-a05acd27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65881%3A%20n%2Fa&amp;severity=medium&amp;id=692f279a3286267b25e84bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60854-na-5e201724</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60854%3A%20n%2Fa&amp;severity=critical&amp;id=692f279a3286267b25e84bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-16-reflected-cross-site-scripting-xss-d11c911e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.6%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=692f27653286267b25e74000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-16-reflected-cross-site-scripting-xss-d6e123a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.6%20-%20Reflected-Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=692f27653286267b25e73ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/piwigo-1360-sql-injection-98ccb474</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Piwigo%2013.6.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=692f27653286267b25e73ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-151-sql-injection-0fa2586a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.5.1%20-%20SQL%20Injection&amp;severity=medium&amp;id=692f27653286267b25e73ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-317-reflected-cross-site-scripting-xss-301a3518</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%20%203.1.7%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=692f27653286267b25e73fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yourls-182-cross-site-request-forgery-csrf-6a2d795f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YOURLS%201.8.2%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=692f27653286267b25e73fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64070-na-579bf546</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64070%3A%20n%2Fa&amp;severity=medium&amp;id=692f1cb917aa519cfe209c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65656-na-b5067d2e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65656%3A%20n%2Fa&amp;severity=critical&amp;id=692f193817aa519cfe1ae18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65358-na-5f9ee883</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65358%3A%20n%2Fa&amp;severity=critical&amp;id=692f15bf17aa519cfe1691ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65186-na-26103630</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65186%3A%20n%2Fa&amp;severity=medium&amp;id=692f11fa0eb63243a5f7cdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65187-na-412c2a0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65187%3A%20n%2Fa&amp;severity=medium&amp;id=692f0ffa16d939a309ce6a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63872-na-9944c6df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63872%3A%20n%2Fa&amp;severity=medium&amp;id=692f093f16d939a309c30998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59704-na-a43f8136</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59704%3A%20n%2Fa&amp;severity=high&amp;id=692f093f16d939a309c30994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59703-na-b58b08e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59703%3A%20n%2Fa&amp;severity=critical&amp;id=692f093f16d939a309c30990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59698-na-bcdf4ccc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59698%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59697-na-c5de3a1b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59697%3A%20n%2Fa&amp;severity=high&amp;id=692efeb83a1612a93738c05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59696-na-b428a79d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59696%3A%20n%2Fa&amp;severity=low&amp;id=692efeb83a1612a93738c057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59702-na-f2b622de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59702%3A%20n%2Fa&amp;severity=high&amp;id=692efeb83a1612a93738c053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59701-na-130cae0a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59701%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c04f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59700-na-0d816107</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59700%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59699-na-1adaa270</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59699%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59705-na-50a8aa71</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59705%3A%20n%2Fa&amp;severity=medium&amp;id=692eface3a1612a93732ddee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59695-na-21b8a579</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59695%3A%20n%2Fa&amp;severity=critical&amp;id=692eface3a1612a93732ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59694-na-90898d44</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59694%3A%20n%2Fa&amp;severity=medium&amp;id=692eface3a1612a93732dde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59693-na-02d041fd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59693%3A%20n%2Fa&amp;severity=critical&amp;id=692eface3a1612a93732dde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65858-na-96a43481</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65858%3A%20n%2Fa&amp;severity=low&amp;id=692ef09b5ae7112264d5b095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-hunting-for-sharepoint-in-memory-f8d88bbf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads%2C%20(Tue%2C%20Dec%202nd)&amp;severity=medium&amp;id=692e26e43bec74f1ee0bf6ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66448-cwe-94-improper-control-of-generati-02908ecd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66448%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=692e1c816dbd3477d752f01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66401-cwe-78-improper-neutralization-of-s-6ace6b6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66401%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kapilduraphe%20mcp-watch&amp;severity=critical&amp;id=692e1c816dbd3477d752f017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66415-cwe-441-unintended-proxy-or-interme-7fa1f179</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66415%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20fastify%20fastify-reply-from&amp;severity=medium&amp;id=692e1c816dbd3477d752f020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66410-cwe-22-improper-limitation-of-a-pat-667bc08e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66410%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flipped-aurora%20gin-vue-admin&amp;severity=high&amp;id=692e19186dbd3477d74d63d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66405-cwe-918-server-side-request-forgery-f0bcd980</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66405%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Portkey-AI%20gateway&amp;severity=medium&amp;id=692e19186dbd3477d74d63cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66403-cwe-79-improper-neutralization-of-i-474b9419</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66403%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20error311%20FileRise&amp;severity=medium&amp;id=692e15786dbd3477d748216e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66400-cwe-20-improper-input-validation-in-d862827f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66400%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20syntax-tree%20mdast-util-to-hast&amp;severity=medium&amp;id=692e15786dbd3477d7482169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66313-cwe-89-improper-neutralization-of-s-99cc37fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66313%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=692e15786dbd3477d7482165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66312-cwe-79-improper-neutralization-of-i-52d6d84c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66312%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66311-cwe-79-improper-neutralization-of-i-d58403cc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66311%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66310-cwe-79-improper-neutralization-of-i-6ec75368</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66310%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66309-cwe-79-improper-neutralization-of-i-d347b8ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66309%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66308-cwe-79-improper-neutralization-of-i-c716202d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66308%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e11fe6dbd3477d7432f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66307-cwe-204-observable-response-discrep-df950e09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66307%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e11fe6dbd3477d7432f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66306-cwe-639-authorization-bypass-throug-ecfb8a43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66306%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0ef03937fa579fe46181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66305-cwe-248-uncaught-exception-in-getgr-63ff439d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66305%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0ef03937fa579fe4618a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66304-cwe-200-exposure-of-sensitive-infor-be139073</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66304%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0ef03937fa579fe46185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66303-cwe-400-uncontrolled-resource-consu-1165153b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66303%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0bb43937fa579fdf7d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66302-cwe-22-improper-limitation-of-a-pat-ad183ec0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66302%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0bb43937fa579fdf7d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66301-cwe-285-improper-authorization-in-g-76821d69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66301%3A%20CWE-285%3A%20Improper%20Authorization%20in%20getgrav%20grav&amp;severity=high&amp;id=692e0bb43937fa579fdf7d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66300-cwe-22-improper-limitation-of-a-pat-3b3b1e15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66300%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e07e33937fa579fd7fc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66299-cwe-94-improper-control-of-generati-cff7c66d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66299%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e07e33937fa579fd7fc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66298-cwe-1336-improper-neutralization-of-b5584524</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66298%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20getgrav%20grav&amp;severity=high&amp;id=692e0bb43937fa579fdf7d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66297-cwe-1336-improper-neutralization-of-ca26f562</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66297%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20getgrav%20grav&amp;severity=high&amp;id=692e048c3937fa579fd2924c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66296-cwe-266-incorrect-privilege-assignm-c7ee3281</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66296%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20getgrav%20grav&amp;severity=high&amp;id=692e048c3937fa579fd29248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/retail-giant-coupang-data-breach-impacts-337-milli-757a5e1f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Retail%20giant%20Coupang%20data%20breach%20impacts%2033.7%20million%20customers&amp;severity=high&amp;id=692e04673937fa579fd1ccd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadypanda-turns-popular-browser-extensions-with-4-ab37b14b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadyPanda%20Turns%20Popular%20Browser%20Extensions%20with%204.3%20Million%20Installs%20Into%20Spyware&amp;severity=high&amp;id=692e04673937fa579fd1ccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66294-cwe-94-improper-control-of-generati-47fe02a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66294%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e048c3937fa579fd29254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66295-cwe-22-improper-limitation-of-a-pat-5e7aa583</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66295%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e0147821c4e4a8f8d8923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51999-cwe-915-improperly-controlled-modif-de89690f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51999&amp;severity=null&amp;id=692dfa38821c4e4a8f7fb95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55749-cwe-284-improper-access-control-in--b07fde79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55749%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=692dfa38821c4e4a8f7fb963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-newly-discovered-short-term-profit-57314659</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arkanix%20Stealer%3A%20Newly%20discovered%20short%20term%20profit%20malware&amp;severity=medium&amp;id=692e048b3937fa579fd280c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11772-cwe-427-uncontrolled-search-path-el-55e3b0b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11772%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Synaptics%20Synaptics%20Fingerprint%20Driver&amp;severity=medium&amp;id=692de5b91fcc71981e9338bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-data-breach-affects-all-337-million-south--a5486ab4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20Data%20Breach%20Affects%20All%2033.7%20Million%20South%20Korean%20Accounts&amp;severity=high&amp;id=692de2311fcc71981e8d6763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13837-vulnerability-in-python-software-fo-1d6cc1b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13837%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=692ddb371fcc71981e81acf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13836-vulnerability-in-python-software-fo-68751bab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13836%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=692ddb371fcc71981e81acee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13653-cwe-200-exposure-of-sensitive-infor-3e318179</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13653%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=692ddb371fcc71981e81acea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13835-cwe-79-improper-neutralization-of-i-c7e0abf6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=null&amp;id=692dd814d2272025770082fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-orders-phone-makers-to-pre-install-sanchar-s-baaa0fbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India%20Orders%20Phone%20Makers%20to%20Pre-Install%20Government%20App%20to%20Tackle%20Telecom%20Fraud&amp;severity=low&amp;id=692de2321fcc71981e8d67c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadypanda-turns-popular-browser-extensions-with-4-c399d778</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadyPanda%20Turns%20Popular%20Browser%20Extensions%20with%204.3%20Million%20Installs%20Into%20Spyware&amp;severity=medium&amp;id=692de2321fcc71981e8d67c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-analysis-and-community-resources-0345aab9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai%20Hulud%202.0%3A%20Analysis%20and%20Community%20Resources&amp;severity=medium&amp;id=692dd10bd227202577f65ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kaspersky-embedded-systems-security-whats-new-a01c11ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kaspersky%20Embedded%20Systems%20Security%3A%20what%E2%80%99s%20new%3F&amp;severity=medium&amp;id=692dcd99d227202577f153ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7007-cwe-476-null-pointer-dereference-in--a49d01a3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7007%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Avast%20Antivirus&amp;severity=high&amp;id=692dc6d195b0bac45943a6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-seize-cryptomixer-domains-infrastructure-an-0bfa42e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20Seize%20Cryptomixer%20Domains%2C%20Infrastructure%20and%2028%20Million%20Dollars%20in%20Bitcoin&amp;severity=medium&amp;id=692dc34695b0bac4593f5e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3500-cwe-190-integer-overflow-or-wraparou-15cc1095</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3500%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Avast%20Antivirus&amp;severity=critical&amp;id=692dbfd095b0bac45939d90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64775-cwe-459-incomplete-cleanup-in-apach-b1583f8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64775%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Struts&amp;severity=high&amp;id=692dbfd095b0bac45939d90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/facial-recognitions-trust-problem-4e753531</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Facial%20Recognition%E2%80%99s%20Trust%20Problem&amp;severity=medium&amp;id=692dbc8df910530b0eb7ec68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8351-cwe-122-heap-based-buffer-overflow-i-5f121e14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8351%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Avast%20Antivirus&amp;severity=critical&amp;id=692dbca6f910530b0eb80df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13829-cwe-863-incorrect-authorization-in--d808720b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13829%3A%20CWE-863%20Incorrect%20Authorization%20in%20Data%20Illusion%20Zumbrunn%20NGSurvey&amp;severity=high&amp;id=692dbca6f910530b0eb80dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-audit-of-openexr-luma-39bc6d64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Audit%20of%20OpenEXR%20%C2%B7%20Luma&amp;severity=medium&amp;id=692db92bf910530b0eb07489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/29-million-worth-of-bitcoin-seized-in-cryptomixer--f2d13741</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2429%20Million%20Worth%20of%20Bitcoin%20Seized%20in%20Cryptomixer%20Takedown&amp;severity=medium&amp;id=692db909f910530b0eb041f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10101-cwe-122-heap-based-buffer-overflow--b6644347</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10101%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Avast%20Antivirus&amp;severity=high&amp;id=692db924f910530b0eb071f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48894-cwe-319-cleartext-transmission-of-s-acb6698c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48894%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=medium&amp;id=692db924f910530b0eb071ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53684-cwe-352-cross-site-request-forgery--5fa517fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53684%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45370-cwe-302-authentication-bypass-by-as-cfcb00b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45370%3A%20CWE-302%3A%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Socomec%20Easy%20Config%20System&amp;severity=high&amp;id=692db924f910530b0eb071e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49572-cwe-306-missing-authentication-for--b9b4b470</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49572%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48882-cwe-306-missing-authentication-for--762d1d21</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48882%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20085-cwe-306-missing-authentication-for--fdda7e86</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20085%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23417-cwe-306-missing-authentication-for--d7fcc15a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23417%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db926f910530b0eb07232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26858-cwe-20-improper-input-validation-in-6b75cc84</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26858%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db926f910530b0eb07236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54851-cwe-306-missing-authentication-for--c55748de</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54851%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54850-cwe-306-missing-authentication-for--0067071b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54850%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54849-cwe-306-missing-authentication-for--5f7458e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54849%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb0723d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54848-cwe-306-missing-authentication-for--e730799d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54848%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb0723a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55222-cwe-306-missing-authentication-for--a587d2b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55222%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55221-cwe-306-missing-authentication-for--2e378d65</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55221%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11699-cwe-613-insufficient-session-expira-8507906b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11699%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20nopSolutions%20nopCommerce&amp;severity=high&amp;id=692dbca6f910530b0eb80e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13129-cwe-841-improper-enforcement-of-beh-c1e3fbde</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13129%3A%20CWE-841%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Seneka%20Software%20Hardware%20Information%20Technology%20Trade%20Contracting%20and%20Industry%20Ltd.%20Co.%20Onaylar%C4%B1m&amp;severity=medium&amp;id=692da9695a8d386a3dbfed8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-albiriox-android-malware-developed-by-russian--de62543a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Albiriox%20Android%20Malware%20Developed%20by%20Russian%20Cybercriminals&amp;severity=medium&amp;id=692da9415a8d386a3dbf6d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gitlab-surpasses-bitbucket-in-leaked-secrets-micro-a2eab245</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitLab%20Surpasses%20Bitbucket%20in%20Leaked%20Secrets%2C%20Microsoft%20Introduces%20Copilot%20Studio%20Security%2C%20Amazon%20Enhances%20Global%20DNS&amp;severity=medium&amp;id=692da9585a8d386a3dbf9dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-deletes-x-post-after-getting-caught-using-a-0e585ce6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20deletes%20X%20post%20after%20getting%20caught%20using%20a%20%E2%80%98stolen%E2%80%99%20AI%20recipe%20infographic&amp;severity=high&amp;id=692da0ff17445d7f7a5a7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-found-a-europaeu-compromise-6f3ee22f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20i%20found%20a%20europa.eu%20compromise&amp;severity=medium&amp;id=692da11017445d7f7a5a888b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evil-twin-wifi-hacker-jailed-for-7-years-after-ste-ea8242dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evil%20Twin%20Wi%E2%80%91Fi%20Hacker%20Jailed%20for%207%20Years%20After%20Stealing%20Data%20Mid%E2%80%91Flight&amp;severity=medium&amp;id=692d9a06038b4a5c0ddaa39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61260-openai-codex-cli-command-injection--ad7df2f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61260%20%E2%80%94%20OpenAI%20Codex%20CLI%3A%20Command%20Injection%20via%20Project-Local%20Configuration&amp;severity=low&amp;id=692d9685038b4a5c0dd28ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-hot-cves-npm-worm-returns-firefox-rce-db11a4e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Hot%20CVEs%2C%20npm%20Worm%20Returns%2C%20Firefox%20RCE%2C%20M365%20Email%20Raid%20%26%20More&amp;severity=medium&amp;id=692d965a038b4a5c0dd2435c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bind-link-edr-tampering-18e69f87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bind%20Link%20%E2%80%93%20EDR%20Tampering&amp;severity=medium&amp;id=692d8f86038b4a5c0dc8f34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-the-agentic-trojan-horse-why-the-new-ai-br-06d8bd6a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20The%20%22Agentic%22%20Trojan%20Horse%3A%20Why%20the%20New%20AI%20Browsers%20War%20is%20a%20Nightmare%20for%20Security%20Teams&amp;severity=medium&amp;id=692d8554110e7c684f803955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13296-cwe-352-cross-site-request-forgery--16c6c40c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13296%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tekrom%20Technology%20Inc.%20T-Soft%20E-Commerce&amp;severity=medium&amp;id=692d821d110e7c684f7933a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-an-openplc-scadabr-flaw-to-its-known--10a9bb2f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20an%20OpenPLC%20ScadaBR%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=692d81e0110e7c684f77d0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-takes-down-cryptomixer-cryptocurrency-mixin-312e3713</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20takes%20down%20Cryptomixer%20cryptocurrency%20mixing%20service&amp;severity=high&amp;id=692d81e0110e7c684f77d0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/royal-borough-of-kensington-and-chelsea-reveals-da-2fa26a5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Royal%20Borough%20of%20Kensington%20and%20Chelsea%20Reveals%20Data%20Breach&amp;severity=high&amp;id=692d81e0110e7c684f77d0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australian-man-gets-seven-years-for-running-evil-t-eddb5f05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australian%20Man%20Gets%20Seven%20Years%20for%20Running%20%E2%80%9CEvil%20Twin%E2%80%9D%20Wi-Fi&amp;severity=high&amp;id=692d81e0110e7c684f77d0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58408-cwe-cwe-416-use-after-free-418-in-i-bac39c4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58408%3A%20CWE%20-%20CWE-416%3A%20Use%20After%20Free%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=692d7afd8a708c3c5e993c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-scadabr-vulnerability-after-hacktivi-45b8de12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20ScadaBR%20Vulnerability%20After%20Hacktivist%20ICS%20Attack&amp;severity=medium&amp;id=692d775b8a708c3c5e9240b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41070-cwe-79-in-sanoma-clickedu-afaaec6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41070%3A%20CWE-79%20in%20Sanoma%20Clickedu&amp;severity=medium&amp;id=692d73e38a708c3c5e8abc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6349-cwe-416-use-after-free-in-arm-ltd-va-89c57b6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6349%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=692d70a066fdaac170278280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8045-cwe-416-use-after-free-in-arm-ltd-va-21d9991b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8045%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=692d70a066fdaac170278283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2879-cwe-200-exposure-of-sensitive-inform-8f0e2f6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2879%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=692d70a066fdaac17027827a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59789-cwe-674-uncontrolled-recursion-in-a-fc911356</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59789%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20bRPC&amp;severity=high&amp;id=692d70a066fdaac17027827d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tomiris-shifts-to-public-service-implants-for-stea-c648eac8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tomiris%20Shifts%20to%20Public-Service%20Implants%20for%20Stealthier%20C2%20in%20Attacks%20on%20Government%20Targets&amp;severity=high&amp;id=692d6d1a66fdaac1701f1e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41700-cwe-502-deserialization-of-untruste-712ed6fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41700%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20CODESYS%20CODESYS%20Development%20System&amp;severity=high&amp;id=692d6d2e66fdaac1701f50ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41738-cwe-843-access-of-resource-using-in-469b4e19</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41738%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=692d6d2e66fdaac1701f50ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41739-cwe-125-out-of-bounds-read-in-codes-9f22099f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41739%3A%20CWE-125%20Out-of-bounds%20Read%20in%20CODESYS%20CODESYS%20PLCHandler&amp;severity=medium&amp;id=692d6d2e66fdaac1701f50f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13819-cwe-601-url-redirection-to-untruste-10088214</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13819%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20MiR%20Robot&amp;severity=medium&amp;id=692d652686d7d117cd35a8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1st-december-threat-intelligence-report-2784e45b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1st%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=692d5ab286d7d117cd190a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australian-man-sentenced-to-prison-for-wi-fi-attac-b633146f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australian%20Man%20Sentenced%20to%20Prison%20for%20Wi-Fi%20Attacks%20at%20Airports%20and%20on%20Flights&amp;severity=medium&amp;id=692d5a9986d7d117cd189a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-albiriox-maas-malware-targets-400-apps-for-on--26330253</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Albiriox%20MaaS%20Malware%20Targets%20400%2B%20Apps%20for%20On-Device%20Fraud%20and%20Screen%20Control&amp;severity=medium&amp;id=692d6cd466fdaac1701e59ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13816-path-traversal-in-moxi159753-mogu-b-dd3b4f1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13816%3A%20Path%20Traversal%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d572086d7d117cd0ea3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13815-unrestricted-upload-in-moxi159753-m-f8926766</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13815%3A%20Unrestricted%20Upload%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d5052e7f98a81a70becdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61610-cwe-20-improper-input-validation-in-8e20d7e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61610%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa788c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61609-cwe-20-improper-input-validation-in-c12fa7ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61609%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61608-cwe-20-improper-input-validation-in-0e8e7d77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61608%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61607-cwe-20-improper-input-validation-in-0441335e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61607%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61619-cwe-20-improper-input-validation-in-6fb7ec77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61619%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4909e7f98a81a7fa78f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61618-cwe-20-improper-input-validation-in-3dcb0cac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61618%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61617-cwe-20-improper-input-validation-in-2bf264db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61617%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa788f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3012-cwe-125-out-of-bounds-read-in-unisoc-5f15ed7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3012%3A%20cwe-125%20Out-of-bounds%20Read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11133-cwe-20-improper-input-validation-in-45c6154d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11133%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa787d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11132-cwe-20-improper-input-validation-in-ac87b460</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11132%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa787a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11131-cwe-20-improper-input-validation-in-0fc8fd71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11131%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13814-server-side-request-forgery-in-moxi-835230a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13814%3A%20Server-Side%20Request%20Forgery%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d458c0729cca2074a0c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13813-missing-authorization-in-moxi159753-c6fb9b2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13813%3A%20Missing%20Authorization%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d42240729cca207418fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13811-sql-injection-in-jsnjfz-webstack-gu-89bb44a1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13811%3A%20SQL%20Injection%20in%20jsnjfz%20WebStack-Guns&amp;severity=medium&amp;id=692d3b0e0729cca2073502d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13810-path-traversal-in-jsnjfz-webstack-g-afb11172</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13810%3A%20Path%20Traversal%20in%20jsnjfz%20WebStack-Guns&amp;severity=medium&amp;id=692d3498a9f72c8cb92b0ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13809-server-side-request-forgery-in-orio-708d56f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13809%3A%20Server-Side%20Request%20Forgery%20in%20orionsec%20orion-ops&amp;severity=medium&amp;id=692d2adeda1a649aa335076c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tomiris-shifts-to-public-service-implants-for-stea-b3901418</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tomiris%20Shifts%20to%20Public-Service%20Implants%20for%20Stealthier%20C2%20in%20Attacks%20on%20Government%20Targets&amp;severity=high&amp;id=692d3462a9f72c8cb92a5ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13808-improper-authorization-in-orionsec--8c4c4e01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13808%3A%20Improper%20Authorization%20in%20orionsec%20orion-ops&amp;severity=medium&amp;id=692d23d5da1a649aa3258a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13807-improper-authorization-in-orionsec--d343a0c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13807%3A%20Improper%20Authorization%20in%20orionsec%20orion-ops&amp;severity=medium&amp;id=692d205cda1a649aa31ec292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13806-improper-authorization-in-nutzam-nu-37d1e542</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13806%3A%20Improper%20Authorization%20in%20nutzam%20NutzBoot&amp;severity=medium&amp;id=692d19cffcc4df0b65192240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13805-deserialization-in-nutzam-nutzboot-34c3a164</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13805%3A%20Deserialization%20in%20nutzam%20NutzBoot&amp;severity=medium&amp;id=692d142cfcc4df0b650cf5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13804-information-disclosure-in-nutzam-nu-499ce105</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13804%3A%20Information%20Disclosure%20in%20nutzam%20NutzBoot&amp;severity=medium&amp;id=692d0b4da0d303b752f438e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13803-improper-neutralization-of-http-hea-0a82351b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13803%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20MediaCrush&amp;severity=medium&amp;id=692d00c1a0d303b752e79ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13802-cross-site-scripting-in-jairiidriss-e4c1d826</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13802%3A%20Cross%20Site%20Scripting%20in%20jairiidriss%20RestaurantWebsite&amp;severity=medium&amp;id=692d00c1a0d303b752e79abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13800-command-injection-in-adslr-nbr1005g-f8520544</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13800%3A%20Command%20Injection%20in%20ADSLR%20NBR1005GPEV2&amp;severity=medium&amp;id=692d142cfcc4df0b650cf5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13799-command-injection-in-adslr-nbr1005g-24c665f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13799%3A%20Command%20Injection%20in%20ADSLR%20NBR1005GPEV2&amp;severity=medium&amp;id=692cebc9a0d303b752b9851e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13798-command-injection-in-adslr-nbr1005g-14264e60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13798%3A%20Command%20Injection%20in%20ADSLR%20NBR1005GPEV2&amp;severity=medium&amp;id=692ce4c3a0d303b752af5f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64772-uncontrolled-search-path-element-in-9a6721ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64772%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Sony%20Corporation%20INZONE%20Hub&amp;severity=high&amp;id=692ce4c3a0d303b752af5f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13797-command-injection-in-adslr-b-qe2w40-0cd980a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13797%3A%20Command%20Injection%20in%20ADSLR%20B-QE2W401&amp;severity=medium&amp;id=692ce4c3a0d303b752af5f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-01-863ff896</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-01&amp;severity=medium&amp;id=692e30f3f2f793a7dee80360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65622-na-684f92f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65622%3A%20n%2Fa&amp;severity=medium&amp;id=692e0bb43937fa579fdf7d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65621-na-64722c3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65621%3A%20n%2Fa&amp;severity=medium&amp;id=692e048c3937fa579fd29250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65840-na-668e8e4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65840%3A%20n%2Fa&amp;severity=high&amp;id=692e0147821c4e4a8f8d8927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65838-na-18568c3e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65838%3A%20n%2Fa&amp;severity=high&amp;id=692df6be821c4e4a8f796b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65836-na-a3462f91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65836%3A%20n%2Fa&amp;severity=critical&amp;id=692df37565b70a5c71304505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63317-na-ba1b179c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63317%3A%20n%2Fa&amp;severity=medium&amp;id=692df37565b70a5c71304502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51683-na-99da478d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51683%3A%20n%2Fa&amp;severity=critical&amp;id=692deff365b70a5c712a42a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51682-na-08f33e0d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51682%3A%20n%2Fa&amp;severity=critical&amp;id=692deff365b70a5c712a429f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65407-na-15f7f6a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65407%3A%20n%2Fa&amp;severity=medium&amp;id=692ddeb01fcc71981e87429d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63365-na-11087d68</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63365%3A%20n%2Fa&amp;severity=high&amp;id=692ddeb01fcc71981e874299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65406-na-a2e7eb18</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65406%3A%20n%2Fa&amp;severity=medium&amp;id=692dca5195b0bac459490639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65408-na-e0724807</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65408%3A%20n%2Fa&amp;severity=medium&amp;id=692dca5195b0bac459490635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65405-na-62d6fe71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65405%3A%20n%2Fa&amp;severity=medium&amp;id=692dbfd095b0bac45939d919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65404-na-a010ce37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65404%3A%20n%2Fa&amp;severity=medium&amp;id=692dbfd095b0bac45939d915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65403-na-e30f7141</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65403%3A%20n%2Fa&amp;severity=medium&amp;id=692dbfd095b0bac45939d911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63535-na-115cdd1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63535%3A%20n%2Fa&amp;severity=critical&amp;id=692dbca6f910530b0eb80e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63534-na-d0d3eae8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63534%3A%20n%2Fa&amp;severity=high&amp;id=692dbca6f910530b0eb80e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63533-na-18802aa8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63533%3A%20n%2Fa&amp;severity=high&amp;id=692dbca6f910530b0eb80e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63532-na-53d7bd51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63532%3A%20n%2Fa&amp;severity=critical&amp;id=692dbca6f910530b0eb80e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63095-na-cc5dd34c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63095%3A%20n%2Fa&amp;severity=medium&amp;id=692dbca6f910530b0eb80e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61229-na-bb15ef03</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61229%3A%20n%2Fa&amp;severity=high&amp;id=692dbca6f910530b0eb80dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61228-na-0a743fe0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61228%3A%20n%2Fa&amp;severity=high&amp;id=692db927f910530b0eb07251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57489-na-b2d88c7e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57489%3A%20n%2Fa&amp;severity=high&amp;id=692db927f910530b0eb0724c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32388-na-530730b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32388%3A%20n%2Fa&amp;severity=medium&amp;id=692db924f910530b0eb071de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39148-na-3ecdbd4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39148%3A%20n%2Fa&amp;severity=high&amp;id=692db924f910530b0eb071da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32384-na-ab0e8f0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32384%3A%20n%2Fa&amp;severity=medium&amp;id=692db924f910530b0eb071d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63531-na-e9583c69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63531%3A%20n%2Fa&amp;severity=critical&amp;id=692db372f910530b0ea42beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63529-na-3b40de4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63529%3A%20n%2Fa&amp;severity=medium&amp;id=692db372f910530b0ea42be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63528-na-747148c1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63528%3A%20n%2Fa&amp;severity=high&amp;id=692db372f910530b0ea42be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63527-na-a50bb73c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63527%3A%20n%2Fa&amp;severity=high&amp;id=692db372f910530b0ea42bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63526-na-add4c57d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63526%3A%20n%2Fa&amp;severity=high&amp;id=692db372f910530b0ea42bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63525-na-9c0dc096</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63525%3A%20n%2Fa&amp;severity=critical&amp;id=692db372f910530b0ea42bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63523-na-ef962f1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63523%3A%20n%2Fa&amp;severity=medium&amp;id=692db01b5d7189e19832fc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63522-na-cc86a529</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63522%3A%20n%2Fa&amp;severity=medium&amp;id=692db01b5d7189e19832fc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63520-na-ffcdb15a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63520%3A%20n%2Fa&amp;severity=medium&amp;id=692db01b5d7189e19832fc05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64030-na-bfb364a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64030%3A%20n%2Fa&amp;severity=medium&amp;id=692dacd15a8d386a3dc7783e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56089-na-1e567b84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56089%3A%20n%2Fa&amp;severity=high&amp;id=692da9695a8d386a3dbfed88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13796-server-side-request-forgery-in-deco-846e4819</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13796%3A%20Server-Side%20Request%20Forgery%20in%20deco-cx%20apps&amp;severity=medium&amp;id=692cd729c368b5914d210412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13795-cross-site-scripting-in-codingwithe-18d89f69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13795%3A%20Cross%20Site%20Scripting%20in%20codingWithElias%20School%20Management%20System&amp;severity=medium&amp;id=692cd072a283b5b3e9fecc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-2000-fake-shopping-sites-spotted-before-cyber-9abcac02</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%202%2C000%20Fake%20Shopping%20Sites%20Spotted%20Before%20Cyber%20Monday&amp;severity=medium&amp;id=692cc966a283b5b3e9f242d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35028-cwe-78-improper-neutralization-of-s-2af51158</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35028%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%200x4m4%20HexStrike%20AI&amp;severity=critical&amp;id=692cba459b44bc92c28db476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13793-cross-site-scripting-in-winston-dso-7dc87a72</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13793%3A%20Cross%20Site%20Scripting%20in%20winston-dsouza%20Ecommerce-Website&amp;severity=medium&amp;id=692c7b0378578326fc873245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13792-code-injection-in-qualitor-4749467e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13792%3A%20Code%20Injection%20in%20Qualitor&amp;severity=medium&amp;id=692c6db6979ac8a99b76f716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13791-path-traversal-in-scada-lts-5e427368</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13791%3A%20Path%20Traversal%20in%20Scada-LTS&amp;severity=medium&amp;id=692c6a32979ac8a99b70b707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13790-cross-site-request-forgery-in-scada-f87d91dd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13790%3A%20Cross-Site%20Request%20Forgery%20in%20Scada-LTS&amp;severity=medium&amp;id=692c5d1e0c99497f3fe5ed70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13789-server-side-request-forgery-in-zent-13a43243</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13789%3A%20Server-Side%20Request%20Forgery%20in%20ZenTao&amp;severity=medium&amp;id=692c516b90ddf300dc641733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13788-sql-injection-in-chanjet-crm-a9ca18f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13788%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=692c3f82c10e5a11c9bde77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13787-improper-privilege-management-in-ze-0d39d9cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13787%3A%20Improper%20Privilege%20Management%20in%20ZenTao&amp;severity=medium&amp;id=692c1e20395d5becff8a1cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13786-code-injection-in-taosir-wtcms-ce32bc49</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13786%3A%20Code%20Injection%20in%20taosir%20WTCMS&amp;severity=medium&amp;id=692c0aa1a4ca46306ac5b99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13785-information-disclosure-in-yungifez--1730f27a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13785%3A%20Information%20Disclosure%20in%20yungifez%20Skuul%20School%20Management%20System&amp;severity=medium&amp;id=692bf7b982f933c5fe612651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13784-cross-site-scripting-in-yungifez-sk-076b65a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13784%3A%20Cross%20Site%20Scripting%20in%20yungifez%20Skuul%20School%20Management%20System&amp;severity=medium&amp;id=692befdd450a33c8c67db72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13783-sql-injection-in-taosir-wtcms-905c531c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13783%3A%20SQL%20Injection%20in%20taosir%20WTCMS&amp;severity=medium&amp;id=692be26fb017dbc398eab769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13782-sql-injection-in-taosir-wtcms-d24634f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13782%3A%20SQL%20Injection%20in%20taosir%20WTCMS&amp;severity=medium&amp;id=692bb8adb00568eef0ca8d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13615-cwe-639-authorization-bypass-throug-06fc0649</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13615%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20phpface%20StreamTube%20Core&amp;severity=critical&amp;id=692ba718b00568eef09a0bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-30-e65b8263</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-30&amp;severity=medium&amp;id=692cdd3bc368b5914d2dc59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66433-na-b8b3153e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66433%3A%20CWE-863%20Incorrect%20Authorization%20in%20wisc%20HTCondor&amp;severity=medium&amp;id=692bcbdbd16937600915085f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66432-cwe-420-unprotected-alternate-chann-f1b4f789</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66432%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Oxide%20Omicron&amp;severity=medium&amp;id=692bcbdad169376009150859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66424-cwe-863-incorrect-authorization-in--40b2985b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66424%3A%20CWE-863%20Incorrect%20Authorization%20in%20Tryton%20trytond&amp;severity=medium&amp;id=692bb1a5b00568eef0c40044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66423-cwe-863-incorrect-authorization-in--5b710efe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66423%3A%20CWE-863%20Incorrect%20Authorization%20in%20Tryton%20trytond&amp;severity=high&amp;id=692bb1a5b00568eef0c40040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66422-cwe-402-transmission-of-private-res-a7619db8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66422%3A%20CWE-402%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20Tryton%20trytond&amp;severity=medium&amp;id=692bb1a5b00568eef0c4003c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66421-cwe-79-improper-neutralization-of-i-2fab24a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66421%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tryton%20sao&amp;severity=medium&amp;id=692bb1a5b00568eef0c40038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66420-cwe-79-improper-neutralization-of-i-645204a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tryton%20sao&amp;severity=medium&amp;id=692bb1a5b00568eef0c40034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/japanese-beer-giant-asahi-says-data-breach-hit-15--dd1187eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Japanese%20beer%20giant%20Asahi%20says%20data%20breach%20hit%201.5%20million%20people&amp;severity=high&amp;id=692b680900da60bff9a0c902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simulating-a-water-control-system-in-my-home-offic-f5abb7bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Simulating%20a%20Water%20Control%20System%20in%20my%20Home%20Office&amp;severity=medium&amp;id=692b29d7c0587105f6e364d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hashjack-attack-uses-url-to-control-ai-browser-beh-4c459c5b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HashJack%20Attack%20Uses%20URL%20%E2%80%98%23%E2%80%99%20to%20Control%20AI%20Browser%20Behavior&amp;severity=medium&amp;id=692b020992c70cc0395cf6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-8-foundational-cache-poisoning-attacks-840e396a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%208%20Foundational%20Cache%20Poisoning%20Attacks%20(HackerOne%2C%20GitHub%2C%20Shopify)%20-%20Part%201&amp;severity=medium&amp;id=692af12898abb602783e1f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6666-use-of-hard-coded-cryptographic-key--bb4a6dc1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6666%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20motogadget%20mo.lock%20Ignition%20Lock&amp;severity=low&amp;id=692aba9af06c0845ceb4025c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66221-cwe-67-improper-handling-of-windows-867d4fea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66221%3A%20CWE-67%3A%20Improper%20Handling%20of%20Windows%20Device%20Names%20in%20pallets%20werkzeug&amp;severity=medium&amp;id=692a637a2a13ea799fe08f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53939-cwe-20-improper-input-validation-in-01cf8267</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53939%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=692a637a2a13ea799fe08f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53900-cwe-267-privilege-defined-with-unsa-5e7c7ac6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53900%3A%20CWE-267%3A%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=692a637a2a13ea799fe08f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53899-cwe-941-incorrectly-specified-desti-f31f732d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53899%3A%20CWE-941%3A%20Incorrectly%20Specified%20Destination%20in%20a%20Communication%20Channel%20in%20kiteworks%20security-advisories&amp;severity=high&amp;id=692a637a2a13ea799fe08f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53897-cwe-352-cross-site-request-forgery--5e69dbc3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53897%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=692a5c732a13ea799fd8c851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53896-cwe-613-insufficient-session-expira-eda8e740</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53896%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20kiteworks%20security-advisories&amp;severity=high&amp;id=692a5c732a13ea799fd8c84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58436-cwe-400-uncontrolled-resource-consu-98ee79b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58436%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=692a5c732a13ea799fd8c854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61915-cwe-129-improper-validation-of-arra-80ae1c75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61915%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=692a5c732a13ea799fd8c859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66216-cwe-131-incorrect-calculation-of-bu-3c4fa0e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66216%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20jvde-github%20AIS-catcher&amp;severity=critical&amp;id=692a5c732a13ea799fd8c85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66217-cwe-122-heap-based-buffer-overflow--af131106</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66217%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20jvde-github%20AIS-catcher&amp;severity=high&amp;id=692a5c732a13ea799fd8c862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66219-cwe-77-improper-neutralization-of-s-0fbda680</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66219%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20shama%20willitmerge&amp;severity=medium&amp;id=692a51f32a13ea799fcc56d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66201-cwe-20-improper-input-validation-in-a3d24953</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66201%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=692a51f32a13ea799fcc56d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66036-cwe-79-improper-neutralization-of-i-6cf236f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66036%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anjaliavv51%20Retro&amp;severity=medium&amp;id=692a51f32a13ea799fcc56d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66027-cwe-200-exposure-of-sensitive-infor-1a05c92c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66027%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lukevella%20rallly&amp;severity=high&amp;id=692a4ade2a13ea799f617d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65112-cwe-862-missing-authorization-in-ri-9362452e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65112%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ricardoboss%20PubNet&amp;severity=critical&amp;id=692a43d62a13ea799f1dc479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65113-cwe-770-allocation-of-resources-wit-71649b63</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65113%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=692a43d62a13ea799f1dc47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-29-01219cc0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-29&amp;severity=medium&amp;id=692b8ba76c75fe45dc732858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65892-na-0e21071f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65892%3A%20n%2Fa&amp;severity=medium&amp;id=692a6e062a13ea799fea6fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65540-na-95fcfa46</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65540%3A%20n%2Fa&amp;severity=medium&amp;id=692a6e062a13ea799fea6fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctf-challenge-malware-busters-c75ff592</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTF%20challenge%20Malware%20Busters&amp;severity=medium&amp;id=692a19f54121026312cc0fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-sensitive-secrets-published-on-jsonfo-e653ed90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20sensitive%20secrets%20published%20on%20JSONFormatter%20and%20CodeBeautify&amp;severity=medium&amp;id=692a12e74121026312ca6fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-football-federation-discloses-data-breach-a-88a35f0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Football%20Federation%20discloses%20data%20breach%20after%20cyberattack&amp;severity=high&amp;id=692a12e74121026312ca6fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-deploy-197-npm-packages-to-sp-0425e4ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Deploy%20197%20npm%20Packages%20to%20Spread%20Updated%20OtterCookie%20Malware&amp;severity=high&amp;id=692a12e74121026312ca6fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legacy-python-bootstrap-scripts-create-domain-take-958f5068</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Legacy%20Python%20Bootstrap%20Scripts%20Create%20Domain-Takeover%20Risk%20in%20Multiple%20PyPI%20Packages&amp;severity=high&amp;id=692a12e74121026312ca6fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/public-gitlab-repositories-exposed-more-than-17000-96480a7d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Public%20GitLab%20repositories%20exposed%20more%20than%2017%2C000%20secrets&amp;severity=high&amp;id=692a12e74121026312ca6fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-856be041</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Man%20behind%20in-flight%20Evil%20Twin%20WiFi%20attacks%20gets%207%20years%20in%20prison&amp;severity=high&amp;id=692a0f614121026312c91890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13683-cwe-200-exposure-of-sensitive-infor-2906ec91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13683%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=medium&amp;id=6929d7244121026312b92a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legacy-python-bootstrap-scripts-create-domain-take-631a88f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Legacy%20Python%20Bootstrap%20Scripts%20Create%20Domain-Takeover%20Risk%20in%20Multiple%20PyPI%20Packages&amp;severity=medium&amp;id=692a29aa4c03a75d3ff23714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12183-cwe-125-out-of-bounds-read-b6983615</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12183%3A%20CWE-125%20Out-of-bounds%20Read&amp;severity=high&amp;id=6929c9154121026312b544be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58360-geoserver-xxe-vulnerability-analysi-5d5a526d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58360%3A%20GeoServer%20XXE%20Vulnerability%20Analysis&amp;severity=high&amp;id=6929b7954121026312ae528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-soccer-federation-hit-by-cyberattack-member-1ce3eda9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Soccer%20Federation%20Hit%20by%20Cyberattack%2C%20Member%20Data%20Stolen&amp;severity=medium&amp;id=6929b7784121026312ae222e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11156-cwe-476-null-pointer-dereference-in-4bb6501e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11156%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Netskope%20Netskope%20Client&amp;severity=medium&amp;id=6929b3fd4121026312a8f975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59792-reveals-plaintext-credentials-in-th-e4903382</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59792%3A%20Reveals%20plaintext%20credentials%20in%20the%20MONITOR%20command%20in%20Apache%20Software%20Foundation%20Apache%20Kvrocks&amp;severity=medium&amp;id=6929b3fd4121026312a8f981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59790-cwe-269-improper-privilege-manageme-945d166a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59790%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20Kvrocks&amp;severity=medium&amp;id=6929b3fd4121026312a8f97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anonymized-case-study-autonomous-security-assessme-7f63d24c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anonymized%20case%20study%3A%20autonomous%20security%20assessment%20of%20a%20500-AMR%20fleet%20using%20AI%20%2B%20MCP&amp;severity=medium&amp;id=6929b07c4121026312a55e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-the-supply-chain-attack-that-learned-5c852516</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%202.0%3A%20the%20supply%20chain%20attack%20that%20learned&amp;severity=medium&amp;id=6929acf84121026312a3e051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-hanoi-thief-vietnam-apt-96bfacaf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Hanoi%20Thief%3A%20Vietnam%20APT&amp;severity=medium&amp;id=6929efc34121026312bf9b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12638-cwe-22-improper-limitation-of-a-pat-1648d2c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12638%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20keras-team%20keras-team%2Fkeras&amp;severity=high&amp;id=6929b0784121026312a55d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12143-cwe-121-stack-based-buffer-overflow-c1f654ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12143%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ABB%20Terra%20AC%20wallbox&amp;severity=medium&amp;id=6929945b41210263129c4da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-organizations-are-turning-to-rpam-d4109f95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Organizations%20Are%20Turning%20to%20RPAM&amp;severity=critical&amp;id=692a29aa4c03a75d3ff2371a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-block-unauthorized-scripts-in-entra-i-ac077420</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Block%20Unauthorized%20Scripts%20in%20Entra%20ID%20Logins%20with%202026%20CSP%20Update&amp;severity=high&amp;id=692982c7412102631296bd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-warns-of-hackers-hijacking-radio-equipment-for-734ac78b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Warns%20of%20Hackers%20Hijacking%20Radio%20Equipment%20For%20False%20Alerts&amp;severity=high&amp;id=692982c7412102631296be39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bloody-wolf-expands-java-based-netsupport-rat-atta-d8545856</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bloody%20Wolf%20Expands%20Java-based%20NetSupport%20RAT%20Attacks%20in%20Kyrgyzstan%20and%20Uzbekistan&amp;severity=high&amp;id=692982c7412102631296be3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asahi-says-crooks-stole-data-of-approximately-2m-c-25e265e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asahi%20says%20crooks%20stole%20data%20of%20approximately%202M%20customers%20and%20employees&amp;severity=high&amp;id=692982c7412102631296be45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ms-teams-guest-access-can-remove-defender-protecti-b06f384b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MS%20Teams%20Guest%20Access%20Can%20Remove%20Defender%20Protection%20When%20Users%20Join%20External%20Tenants&amp;severity=high&amp;id=692982c7412102631296be41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-hashjack-ai-browser-attack-charming--d3146348</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20HashJack%20AI%20Browser%20Attack%2C%20Charming%20Kitten%20Leak%2C%20Hacker%20Unmasked&amp;severity=medium&amp;id=69297bb7412102631289558a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-anatomy-of-a-bulletproof-hoster-a-data-driven--93279e44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Anatomy%20of%20a%20Bulletproof%20Hoster%3A%20A%20Data-Driven%20Reconstruction%20of%20Media%20Land&amp;severity=medium&amp;id=692969ab5ab17d2ce149f3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ms-teams-guest-access-can-remove-defender-protecti-70143e9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MS%20Teams%20Guest%20Access%20Can%20Remove%20Defender%20Protection%20When%20Users%20Join%20External%20Tenants&amp;severity=low&amp;id=69296fac5ab17d2ce1532843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tomiris-tools-and-techniques-multiple-reverse--0bea187c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Tomiris%20tools%20and%20techniques%3A%20multiple%20reverse%20shells%2C%20Havoc%2C%20AdaptixC2&amp;severity=medium&amp;id=6929601cbc8dfaadef995ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13771-cwe-23-relative-path-traversal-in-u-c33e17b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13771%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=692956f0c500e1d7cafe8eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13770-cwe-89-improper-neutralization-of-s-946f39a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13770%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Uniong%20WebITR&amp;severity=high&amp;id=69295336c500e1d7caf90db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13769-cwe-89-improper-neutralization-of-s-01a3e986</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13769%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Uniong%20WebITR&amp;severity=high&amp;id=69295336c500e1d7caf90db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13768-cwe-639-authorization-bypass-throug-0fb8386f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13768%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Uniong%20WebITR&amp;severity=high&amp;id=69295336c500e1d7caf90dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13737-cwe-352-cross-site-request-forgery--29da6bbc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13737%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nextendweb%20Nextend%20Social%20Login%20and%20Register&amp;severity=medium&amp;id=692919d1a7cba954100dd851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64312-cwe-200-exposure-of-sensitive-infor-c44f7481</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64312%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58311-cwe-416-use-after-free-in-huawei-ha-34cfef14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58311%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58308-cwe-358-improperly-implemented-secu-281d6016</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58308%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692917bace4290e3e3b61b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58305-cwe-200-exposure-of-sensitive-infor-4a6a6ccc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58305%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58304-cwe-199-information-management-erro-bc2c6c1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58304%3A%20CWE-199%20Information%20Management%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58302-cwe-264-permissions-privileges-and--7634fe98</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58302%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692917bace4290e3e3b61b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58294-cwe-264-permissions-privileges-and--1db5e7eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58294%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64313-cwe-362-concurrent-execution-using--64d05fa1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64313%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b5ce4290e3e3b49073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64311-cwe-200-exposure-of-sensitive-infor-fb01ff46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64311%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b4904b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58315-cwe-264-permissions-privileges-and--fa1f7fd4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58315%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58314-cwe-125-out-of-bounds-read-in-huawe-272b5cd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58314%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58312-cwe-264-permissions-privileges-and--515b1b0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58312%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b4903f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58310-cwe-843-access-of-resource-using-in-fb95d159</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58310%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692910b4ce4290e3e3b4903c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58309-cwe-264-permissions-privileges-and--f6e7ff22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58309%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58307-cwe-416-use-after-free-in-huawei-ha-a02a4269</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58307%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58316-cwe-362-concurrent-execution-using--fe7c0559</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58316%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692910b4ce4290e3e3b49048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58303-cwe-362-concurrent-execution-using--5d178b7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58303%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692910b4ce4290e3e3b49033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64315-cwe-264-permissions-privileges-and--304046a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64315%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b5ce4290e3e3b49079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64314-cwe-843-access-of-resource-using-in-e6e520d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64314%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=692910b5ce4290e3e3b49076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/write-path-traversal-to-a-rce-art-department-f881e664</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Write%20Path%20Traversal%20to%20a%20RCE%20Art%20Department&amp;severity=medium&amp;id=6928f819ce4290e3e38bcce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-28-f11bce42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-28&amp;severity=medium&amp;id=692a3a7eb7a5e2eddeb4ce26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51734-na-0332e4f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51734%3A%20n%2Fa&amp;severity=medium&amp;id=6929b3fd4121026312a8f97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51733-na-765d452b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51733%3A%20n%2Fa&amp;severity=medium&amp;id=6929b3fd4121026312a8f978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51736-na-da2d10de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51736%3A%20n%2Fa&amp;severity=medium&amp;id=6929b3fd4121026312a8f972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51735-na-dbd30761</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51735%3A%20n%2Fa&amp;severity=high&amp;id=6929b3fd4121026312a8f96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66386-na-6a2f7f6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66386%3A%20n%2Fa&amp;severity=medium&amp;id=69294930842b163e002c8eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66385-cwe-472-external-control-of-assumed-6cd61d91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66385%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20cerebrate-project%20Cerebrate&amp;severity=critical&amp;id=69294930842b163e002c8ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66382-cwe-407-inefficient-algorithmic-com-2b279580</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66382%3A%20CWE-407%20Inefficient%20Algorithmic%20Complexity%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69293eaf842b163e001fac42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66372-cwe-611-improper-restriction-of-xml-cc19678d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66372%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20mustangproject%20Mustang&amp;severity=low&amp;id=692919d1a7cba954100dd85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66371-cwe-611-improper-restriction-of-xml-d8b13d5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66371%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Iteras%20Peppol-py&amp;severity=medium&amp;id=692919d1a7cba954100dd856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-2000-holiday-themed-fake-stores-detected-expl-a853a732</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%202%2C000%20Holiday-Themed%20Fake%20Stores%20Detected%20Exploiting%20Black%20Friday%20and%20Festive%20Sales&amp;severity=medium&amp;id=692963a0bc8dfaadef9e1242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-lumma-infostealer-e5da70e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20Lumma%20infostealer&amp;severity=medium&amp;id=6928a076fbb391e68ec3ea65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/striking-panda-attacks-apt31-today-f48fd7d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Striking%20Panda%20Attacks%3A%20APT31%20Today&amp;severity=medium&amp;id=6928a076fbb391e68ec3ea74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-minefield-between-syntaxes-exploiting-syntax-c-30e96f3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20minefield%20between%20syntaxes%3A%20exploiting%20syntax%20confusions%20in%20the%20wild&amp;severity=medium&amp;id=69289ac3b57256b0ceacb0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-google-play-adware-drains-devices-and-disru-32f3ee1e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20Google%20Play%20Adware%20Drains%20Devices%20and%20Disrupts%20Millions%20of%20Users&amp;severity=medium&amp;id=6928a076fbb391e68ec3ea85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bloody-wolf-expands-java-based-netsupport-rat-atta-abc9a98f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bloody%20Wolf%20Expands%20Java-based%20NetSupport%20RAT%20Attacks%20in%20Kyrgyzstan%20and%20Uzbekistan&amp;severity=medium&amp;id=6928a707fbb391e68ecd6349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3261-d09052f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3261&amp;severity=null&amp;id=69413e06b7167ed5be6e7a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/report-names-teen-leader-in-scattered-lapsus-hunte-623e9256</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Report%20Names%20Teen%20Leader%20in%20Scattered%20LAPSUS%24%20Hunters%2C%20Group%20Denies&amp;severity=medium&amp;id=692889c8d91ec0679dc7afb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-your-dashcam-can-be-hacked-and-how-to-protect--1b4bd895</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20your%20dashcam%20can%20be%20hacked%2C%20and%20how%20to%20protect%20yourself%20from%20the%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69288043d78caf05d336200b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asahi-data-breach-impacts-2-million-individuals-a7c325a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asahi%20Data%20Breach%20Impacts%202%20Million%20Individuals&amp;severity=medium&amp;id=6928742ba95a569c55df0a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-block-unauthorized-scripts-in-entra-i-f0c0afec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Block%20Unauthorized%20Scripts%20in%20Entra%20ID%20Logins%20with%202026%20CSP%20Update&amp;severity=medium&amp;id=69287307a95a569c55dd0617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13758-cwe-200-exposure-of-sensitive-infor-e714e54c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13758%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=low&amp;id=69287327a95a569c55dd13ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13757-cwe-89-improper-neutralization-of-s-8330a6fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13757%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Devolutions%20Server&amp;severity=high&amp;id=69287327a95a569c55dd13ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13765-cwe-200-exposure-of-sensitive-infor-cc4237c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13765%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69287327a95a569c55dd13f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-learn-to-spot-risks-and-patch-safely-with--2fee78ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20Learn%20to%20Spot%20Risks%20and%20Patch%20Safely%20with%20Community-Maintained%20Tools&amp;severity=medium&amp;id=6926ecac61dc91128fa49d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-campaign-targets-cloud-and-developer-5f484eef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-hulud%202.0%20Campaign%20Targets%20Cloud%20and%20Developer%20Ecosystems&amp;severity=medium&amp;id=692896ecb57256b0cea75afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defending-against-sha1-hulud-the-second-coming-138ea839</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Defending%20Against%20Sha1-Hulud%3A%20The%20Second%20Coming&amp;severity=medium&amp;id=69289abfb57256b0ceacaf2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-lapsus-hunters-take-aim-at-zendesk-users-4b334816</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Lapsus%24%20Hunters%20Take%20Aim%20At%20Zendesk%20Users&amp;severity=medium&amp;id=69289abfb57256b0ceacaf2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12140-cwe-95-improper-neutralization-of-d-9f4885f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12140%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Simple%20SA%20Wirtualna%20Uczelnia&amp;severity=critical&amp;id=69285b2504903f3285f53283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13692-cwe-79-improper-neutralization-of-i-3aee33f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13692%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20for%20Elementor%20(Premium)&amp;severity=high&amp;id=69285b2504903f3285f53286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8890-cwe-78-improper-neutralization-of-sp-8ed5a589</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8890%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SDMC%20NE6037&amp;severity=critical&amp;id=6928580d8c27b4da49ad4164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12971-cwe-863-incorrect-authorization-in--8159a52a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12971%3A%20CWE-863%20Incorrect%20Authorization%20in%20premio%20Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&amp;severity=medium&amp;id=692846e93362f74ea5ac7bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-api-user-data-exposed-in-mixpanel-breach-ch-be101941</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20API%20User%20Data%20Exposed%20in%20Mixpanel%20Breach%2C%20ChatGPT%20Unaffected&amp;severity=high&amp;id=6928435b3362f74ea5a84fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-user-data-exposed-in-mixpanel-hack-9500f574</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20User%20Data%20Exposed%20in%20Mixpanel%20Hack&amp;severity=medium&amp;id=69283fd73362f74ea5a3c3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54057-cwe-80-improper-neutralization-of-s-4c986984</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54057%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking&amp;severity=medium&amp;id=69283d66e4a84287b53ab814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59302-cwe-94-improper-control-of-generati-e3d69fd6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59302%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=medium&amp;id=69283d66e4a84287b53ab817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59454-cwe-200-exposure-of-sensitive-infor-ca53fcba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59454%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=medium&amp;id=69283990e4a84287b535af7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10476-cwe-862-missing-authorization-in-em-4d5a9e25</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10476%3A%20CWE-862%20Missing%20Authorization%20in%20emrevona%20WP%20Fastest%20Cache%20%E2%80%93%20WordPress%20Cache%20Plugin&amp;severity=medium&amp;id=692830538da2ca36c17c097d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shadowv2-botnet-malware-used-aws-outage-as-a-t-23d42e6f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ShadowV2%20botnet%20malware%20used%20AWS%20outage%20as%20a%20test%20opportunity&amp;severity=high&amp;id=692830138da2ca36c17ac485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gainsight-expands-impacted-customer-list-following-e2e01d8b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gainsight%20Expands%20Impacted%20Customer%20List%20Following%20Salesforce%20Security%20Alert&amp;severity=high&amp;id=692830138da2ca36c17ac47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-asus-firmware-patches-critical-aicloud-vulnera-cb199cbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ASUS%20firmware%20patches%20critical%20AiCloud%20vulnerability&amp;severity=critical&amp;id=692830138da2ca36c17ac495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59890-cwe-22-improper-limitation-of-a-pat-88960ab6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59890%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eaton%20Eaton%20Galileo%20Software&amp;severity=high&amp;id=692830538da2ca36c17c0982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-malware-voice-bot-flaws-cry-3d473ab6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Malware%2C%20Voice%20Bot%20Flaws%2C%20Crypto%20Laundering%2C%20IoT%20Attacks%20%E2%80%94%20and%2020%20More%20Stories&amp;severity=medium&amp;id=69282ff98da2ca36c17aa522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13381-cwe-862-missing-authorization-in-ay-b9d40858</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13381%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=6928251f23c3d7b26904cfc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12584-cwe-200-exposure-of-sensitive-infor-601896ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12584%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shapedplugin%20Quick%20View%20for%20WooCommerce&amp;severity=medium&amp;id=6928251f23c3d7b26904cfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13378-cwe-918-server-side-request-forgery-a74da752</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13378%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ays-pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=6928251f23c3d7b26904cfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59026-improper-neutralization-of-input-du-c10b944c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59025-improper-neutralization-of-input-du-4ac474c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30190-improper-neutralization-of-input-du-aa9e66c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30190%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30186-improper-neutralization-of-input-du-7a642821</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30186%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13536-cwe-434-unrestricted-upload-of-file-7c738957</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13536%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blubrry%20PowerPress%20Podcasting%20plugin%20by%20Blubrry&amp;severity=high&amp;id=69280bc90a6cf06979bbe46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gainsight-expands-impacted-customer-list-following-dd52ef0c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gainsight%20Expands%20Impacted%20Customer%20List%20Following%20Salesforce%20Security%20Alert&amp;severity=low&amp;id=6928158e0a6cf06979c7df35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13157-cwe-639-authorization-bypass-throug-6a374371</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13157%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20qodeinteractive%20QODE%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=6927f676e2794b4b765ba39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13441-cwe-862-missing-authorization-in-th-5792aedb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13441%3A%20CWE-862%20Missing%20Authorization%20in%20themesupport%20Hide%20Category%20by%20User%20Role%20for%20WooCommerce&amp;severity=medium&amp;id=6927f676e2794b4b765ba3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13143-cwe-352-cross-site-request-forgery--69e8fcd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13143%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20assafp%20Quiz%2C%20Poll%20%26%20Survey%20Maker%20by%20Opinion%20Stage&amp;severity=medium&amp;id=6927e4dfbdf69728cfe5941f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13525-cwe-79-improper-neutralization-of-i-0faf5d90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13525%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=medium&amp;id=6927e4dfbdf69728cfe59424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12123-cwe-79-improper-neutralization-of-i-73b7032f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12123%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Customer%20Reviews%20Collector%20for%20WooCommerce&amp;severity=medium&amp;id=6927e15abdf69728cfdf7dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12185-cwe-79-improper-neutralization-of-i-e9613167</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20era404%20StaffList&amp;severity=medium&amp;id=6927e15abdf69728cfdf7df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12758-incomplete-filtering-of-one-or-more-f9d94ef8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12758%3A%20Incomplete%20Filtering%20of%20One%20or%20More%20Instances%20of%20Special%20Elements%20in%20validator&amp;severity=high&amp;id=6927e863bdf69728cfecb8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13539-cwe-288-authentication-bypass-using-44fd7030</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13539%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated%20Themes%20FindAll%20Membership&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13540-cwe-269-improper-privilege-manageme-f3141125</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13540%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Qode%20Interactive%20Tiare%20Membership&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13680-cwe-269-improper-privilege-manageme-0f199875</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13680%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20DirectoryThemes%20Tiger&amp;severity=high&amp;id=6927d764d4a4bdffcb26cfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12151-cwe-79-improper-neutralization-of-i-ee87367f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12151%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20presstigers%20Simple%20Folio&amp;severity=medium&amp;id=6927d764d4a4bdffcb26cfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13675-cwe-269-improper-privilege-manageme-85b1b12c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13675%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20DirectoryThemes%20Tiger&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7820-cwe-602-client-side-enforcement-of-s-0b0e758f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7820%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20sonalsinha21%20SKT%20PayPal%20for%20WooCommerce&amp;severity=high&amp;id=6927d764d4a4bdffcb26cfef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13538-cwe-269-improper-privilege-manageme-2da30aa5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13538%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Elated%20Themes%20FindAll%20Listing&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3784-cwe-312-cleartext-storage-of-sensiti-7fd774ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3784%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works2&amp;severity=medium&amp;id=6927d764d4a4bdffcb26cfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-aggressive-automated-one-of-fastest--07e41a5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%202.0%3A%20Aggressive%20%26%20Automated%2C%20One%20Of%20Fastest%20Spreading%20NPM%20Supply%20Chain%20Attacks%20Ever%20Observed&amp;severity=medium&amp;id=692811bf0a6cf06979c24620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13762-cwe-20-improper-input-validation-in-ce05c470</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13762%3A%20CWE-20%20Improper%20Input%20Validation%20in%20CyberArk%20CyberArk%20Secure%20Web%20Sessions%20Extension&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34351-cwe-1188-insecure-default-initializ-f281119f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34351&amp;severity=null&amp;id=6927bf816cbf1e727e3d95b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12713-cwe-79-improper-neutralization-of-i-1718eaa9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12713%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpoets%20Soundslides&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12670-cwe-79-improper-neutralization-of-i-de942f80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realin%20wp-twitpic&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12649-cwe-79-improper-neutralization-of-i-43125712</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sscovil%20SortTable%20Post&amp;severity=medium&amp;id=6927bf816cbf1e727e3d9599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12579-cwe-862-missing-authorization-in-rn-c5d3a5b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12579%3A%20CWE-862%20Missing%20Authorization%20in%20rnags%20Reuters%20Direct&amp;severity=medium&amp;id=6927bf816cbf1e727e3d9595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12712-cwe-79-improper-neutralization-of-i-49f652f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gungorbudak%20Shouty&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12666-cwe-79-improper-neutralization-of-i-6459155c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oscaruh%20Google%20Drive%20upload%20and%20download%20link&amp;severity=medium&amp;id=6927bf816cbf1e727e3d959d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12578-cwe-352-cross-site-request-forgery--f2ee19d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12578%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rnags%20Reuters%20Direct&amp;severity=medium&amp;id=6927bf816cbf1e727e3d9591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66314-cwe-269-improper-privilege-manageme-beee8dfb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66314%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ZTE%20ElasticNet%20UME%20R32&amp;severity=high&amp;id=6927c23b485554d54fc0aeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5540-cwe-79-improper-neutralization-of-in-0faf2177</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Automated%20Logic%20WebCTRL&amp;severity=medium&amp;id=6927a51dd322a87b22026c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5539-cwe-863-incorrect-authorization-in-a-7bbf2753</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5539%3A%20CWE-863%20Incorrect%20Authorization%20in%20Automated%20Logic%20WebCTRL&amp;severity=critical&amp;id=6927a51dd322a87b22026c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0657-cwe-129-improper-validation-of-array-7ab615cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0657%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Automated%20Logic%20WebCtrl&amp;severity=high&amp;id=6927a51dd322a87b22026c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0658-cwe-20-improper-input-validation-in--8332e6f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0658%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Automated%20Logic%20Zone%20Controllers&amp;severity=high&amp;id=6927a51dd322a87b22026c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taking-down-nextjs-servers-for-00001-cents-a-pop-db11161b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taking%20down%20Next.js%20servers%20for%200.0001%20cents%20a%20pop&amp;severity=medium&amp;id=6927a526d322a87b22027793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-27-3147ae7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-27&amp;severity=medium&amp;id=6928e9f7ce4290e3e3801337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66359-cwe-79-improper-neutralization-of-i-bce74ed4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66359%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Logpoint%20SIEM&amp;severity=high&amp;id=6928e52bb0d67dda9e89c4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66361-cwe-1336-improper-neutralization-of-b4988fc5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66361%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Logpoint%20SIEM&amp;severity=medium&amp;id=6928e1a8b0d67dda9e866c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66360-na-f39aee65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66360%3A%20CWE-863%20Incorrect%20Authorization%20in%20Logpoint%20SIEM&amp;severity=medium&amp;id=6928e1a8b0d67dda9e866c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66040-cwe-79-improper-neutralization-of-i-feae1efd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66040%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spotipy-dev%20spotipy&amp;severity=low&amp;id=69278c4fd322a87b22e753d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64344-cwe-121-stack-based-buffer-overflow-7b45fa15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64344%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64330-cwe-122-heap-based-buffer-overflow--03ddec2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64330%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64331-cwe-121-stack-based-buffer-overflow-cc09d2c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64331%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64332-cwe-121-stack-based-buffer-overflow-008e619e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64332%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64333-cwe-121-stack-based-buffer-overflow-f4c8e327</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64333%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64335-cwe-476-null-pointer-dereference-in-7e4440db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64335%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=69278547d322a87b22e58f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64334-cwe-770-allocation-of-resources-wit-1573ef25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64334%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20OISF%20suricata&amp;severity=high&amp;id=69278547d322a87b22e58f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40934-cwe-347-improper-verification-of-cr-41470759</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40934%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20TIMLEGGE%20XML%3A%3ASig&amp;severity=critical&amp;id=69278547d322a87b22e58f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62593-cwe-94-improper-control-of-generati-15eefc0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62593%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ray-project%20ray&amp;severity=critical&amp;id=692781c3d322a87b22e508d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66030-cwe-190-integer-overflow-or-wraparo-3fa7f465</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66030%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20digitalbazaar%20forge&amp;severity=medium&amp;id=692781c3d322a87b22e508d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66031-cwe-674-uncontrolled-recursion-in-d-86f64623</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66031%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=692781c3d322a87b22e508d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prepared-statements-prepared-to-be-vulnerable-c5843ca0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prepared%20Statements%3F%20Prepared%20to%20Be%20Vulnerable.&amp;severity=medium&amp;id=6927773bd322a87b22e1900c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-v2-campaign-spreads-from-npm-to-maven-e-e43b1915</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20v2%20Campaign%20Spreads%20From%20npm%20to%20Maven%2C%20Exposing%20Thousands%20of%20Secrets&amp;severity=high&amp;id=69277031d322a87b22d93289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/comcast-to-pay-15m-fine-for-vendor-breach-affectin-15e2b2fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Comcast%20to%20pay%20%241.5M%20fine%20for%20vendor%20breach%20affecting%20270K%20customers&amp;severity=high&amp;id=69277031d322a87b22d93275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-exchange-on-premises-hardening-recommend-05d003bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Exchange%20on-premises%20hardening%20recommendations&amp;severity=medium&amp;id=692761520192bc7fb417f8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-v2-campaign-spreads-from-npm-to-maven-e-fa4ca7d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20v2%20Spreads%20From%20npm%20to%20Maven%2C%20as%20Campaign%20Exposes%20Thousands%20of%20Secrets&amp;severity=medium&amp;id=692742820de433ec09574d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-london-councils-it-systems-disrupted-by-c-1d0bc672</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20London%20councils&apos;%20IT%20systems%20disrupted%20by%20cyberattack&amp;severity=high&amp;id=692740b70de433ec0954ddaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20373-information-written-to-log-files-ca-9bcabc97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20373%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Add-on%20for%20Palo%20Alto%20Networks&amp;severity=low&amp;id=692740e20de433ec09559d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meet-rey-the-admin-of-scattered-lapsus-hunters-2cbca93a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meet%20Rey%2C%20the%20Admin%20of%20%E2%80%98Scattered%20Lapsus%24%20Hunters%E2%80%99&amp;severity=high&amp;id=692740b70de433ec0954ddae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64130-cwe-79-in-zenitel-tciv-3-929b32fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64130%3A%20CWE-79%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=692740e20de433ec09559d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64129-cwe-787-in-zenitel-tciv-3-0105844f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64129%3A%20CWE-787%20in%20Zenitel%20TCIV-3%2B&amp;severity=high&amp;id=692740e20de433ec09559d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64128-cwe-78-in-zenitel-tciv-3-0d3761ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64128%3A%20CWE-78%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=692740e20de433ec09559d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64127-cwe-78-in-zenitel-tciv-3-84453c4a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64127%3A%20CWE-78%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=692740e20de433ec09559d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64126-cwe-78-in-zenitel-tciv-3-b8427054</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64126%3A%20CWE-78%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=69273d3b0de433ec0950b8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11461-cwe-89-improper-neutralization-of-s-54232b2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11461%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Frappe%20Frappe%20CRM&amp;severity=high&amp;id=69273d3b0de433ec0950b8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13084-cwe-1230-in-opto-22-groov-view-serv-2f8b3269</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13084%3A%20CWE-1230%20in%20Opto%2022%20groov%20View%20Server&amp;severity=high&amp;id=69273d3b0de433ec0950b8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2486-cwe-489-active-debug-code-in-ubuntu--23368ecd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2486%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Ubuntu%20edk2&amp;severity=low&amp;id=69273d3b0de433ec0950b8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-flaw-in-guest-chat-exposes-users-t-3aef71f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20Flaw%20in%20Guest%20Chat%20Exposes%20Users%20to%20Malware%20Attacks&amp;severity=medium&amp;id=6927292a6d0980878b38f69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13601-integer-overflow-or-wraparound-in-r-d06b12db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13601%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=high&amp;id=6927165b55a49d3da8582be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-turns-south-korean-msp-breach-int-f8b9a17d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Turns%20South%20Korean%20MSP%20Breach%20Into%2028-Victim%20&apos;Korean%20Leaks&apos;%20Data%20Heist&amp;severity=medium&amp;id=69272577b6bca73b242a39a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/account-takeover-fraud-caused-262-million-in-losse-14aa653e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Account%20Takeover%20Fraud%20Caused%20%24262%20Million%20in%20Losses%20in%202025%3A%20FBI&amp;severity=medium&amp;id=69270231b9c2c409f8ba71ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-extension-caught-injecting-hidden-solana-tr-d47d585b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Extension%20Caught%20Injecting%20Hidden%20Solana%20Transfer%20Fees%20Into%20Raydium%20Swaps&amp;severity=high&amp;id=6926fec1b9c2c409f8b5f62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emergency-alerts-go-dark-after-cyberattack-on-onso-c32fe61f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emergency%20alerts%20go%20dark%20after%20cyberattack%20on%20OnSolve%20CodeRED&amp;severity=critical&amp;id=6926fec1b9c2c409f8b5f62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asus-warns-of-new-critical-auth-bypass-flaw-in-aic-fad848af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASUS%20warns%20of%20new%20critical%20auth%20bypass%20flaw%20in%20AiCloud%20routers&amp;severity=critical&amp;id=6926fec1b9c2c409f8b5f617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/huawei-and-chinese-surveillance-schneier-on-securi-cfffc460</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Huawei%20and%20Chinese%20Surveillance%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6926fec1b9c2c409f8b5f637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samourai-wallet-founders-jailed-in-237m-crypto-lau-e7b2dd89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Samourai%20Wallet%20Founders%20Jailed%20in%20%24237M%20Crypto%20Laundering%20Case&amp;severity=medium&amp;id=6926fec1b9c2c409f8b5f633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-secrets-leaked-on-code-formatting-pla-8e6126c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Secrets%20Leaked%20on%20Code%20Formatting%20Platforms&amp;severity=medium&amp;id=6926fbd76359f79d717e3c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9163-cwe-79-improper-neutralization-of-in-f51dd7cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9163%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=6926f4dc6359f79d7175be7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9191-cwe-502-deserialization-of-untrusted-b006c9a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9191%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=6926f4dc6359f79d7175be81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-2m-security-detection-fails-can-your-soc-3811423b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Your%20%242M%20Security%20Detection%20Fails%3A%20Can%20your%20SOC%20Save%20You%3F&amp;severity=medium&amp;id=6926fd0d6359f79d7180ab34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attack-disrupts-local-emergency-alert-s-b751d60a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Attack%20Disrupts%20Local%20Emergency%20Alert%20System%20Across%20US&amp;severity=medium&amp;id=6926e7de61dc91128fa26c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13674-cwe-824-access-of-uninitialized-poi-b421819d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13674%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6926e80361dc91128fa27e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-battlefield-6-downloads-are-spreading-malware-8d167e86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Battlefield%206%20Downloads%20Are%20Spreading%20Malware%2C%20Stealing%20Player%20Data&amp;severity=medium&amp;id=6926e46361dc91128f9eb0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-extension-caught-injecting-hidden-solana-tr-8ad50597</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Extension%20Caught%20Injecting%20Hidden%20Solana%20Transfer%20Fees%20Into%20Raydium%20Swaps&amp;severity=medium&amp;id=6926ecac61dc91128fa49d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-dprks-fake-job-platform-targeting-us-ai-tal-2a631b5d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20DPRK&apos;s%20Fake%20Job%20Platform%20Targeting%20U.S.%20AI%20Talent&amp;severity=medium&amp;id=6926d42e63e47a62eb4f31d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-bear-attacks-what-we-learned-about-the-phishin-38596e7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20&apos;Bear&apos;%20attacks%3A%20what%20we%20learned%20about%20the%20phishing%20campaign%20targeting%20Russian%20organizations&amp;severity=medium&amp;id=6926ceff91609981b6f87aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59390-cwe-338-use-of-cryptographically-we-fab80e5b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59390%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Apache%20Software%20Foundation%20Apache%20Druid&amp;severity=critical&amp;id=6926c34b1118926627ff927f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62728-cwe-89-improper-neutralization-of-s-63531780</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62728%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Hive&amp;severity=medium&amp;id=6926bfc71118926627fad662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romcom-uses-socgholish-fake-update-attacks-to-deli-3b7e2b90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RomCom%20Uses%20SocGholish%20Fake%20Update%20Attacks%20to%20Deliver%20Mythic%20Agent%20Malware&amp;severity=high&amp;id=6926d02d91609981b6fb17d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dartmouth-college-confirms-data-theft-in-oracle-ha-7d4b6406</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dartmouth%20College%20Confirms%20Data%20Theft%20in%20Oracle%20Hack&amp;severity=medium&amp;id=6926b9bda99853a7c84011a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-malware-deploys-in-fake-job-scams-02afef83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20Malware%20Deploys%20in%20Fake%20Job%20Scams&amp;severity=medium&amp;id=6926d198986a99cf1699507a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13735-cwe-125-out-of-bounds-read-in-asr-l-b8cf832b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13735%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASR%20Lapwing_Linux&amp;severity=high&amp;id=69269d33e3ad539e3a6f9c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12061-cwe-862-missing-authorization-in-ta-a0548111</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12061%3A%20CWE-862%20Missing%20Authorization%20in%20TAX%20SERVICE%20Electronic%20HDM&amp;severity=high&amp;id=692699b0e3ad539e3a6b2fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9557-buffer-copy-without-checking-size-of-89d49424</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9557%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=6926a089ecc6d4a57428146b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9558-buffer-copy-without-checking-size-of-92e9b220</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9558%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=6926a089ecc6d4a57428146e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64983-active-debug-code-in-switchbot-smar-354c7303</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64983%3A%20Active%20debug%20code%20in%20SwitchBot%20Smart%20Video%20Doorbell&amp;severity=high&amp;id=692685df1243ed466a4a3826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-reports-262m-in-ato-fraud-as-researchers-cite--76989253</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Reports%20%24262M%20in%20ATO%20Fraud%20as%20Researchers%20Cite%20Growing%20AI%20Phishing%20and%20Holiday%20Scams&amp;severity=medium&amp;id=692687361243ed466a4d4606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66022-cwe-829-inclusion-of-functionality--623a9be1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66022%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20factionsecurity%20faction&amp;severity=critical&amp;id=692669caca41832e1e64f236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66021-cwe-79-improper-neutralization-of-i-7d7cb5f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66021%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OWASP%20java-html-sanitizer&amp;severity=high&amp;id=69265f3eca41832e1e61653e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66020-cwe-1333-inefficient-regular-expres-926f4261</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66020%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20open-circle%20valibot&amp;severity=high&amp;id=69265f3eca41832e1e61653a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66269-cwe-428-unquoted-search-path-or-ele-5703f7c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66269%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20MegaTec%20Taiwan%20UPSilon2000V6.0&amp;severity=high&amp;id=69265f3eca41832e1e616544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66266-cwe-269-improper-privilege-manageme-76992282</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66266%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20MegaTec%20Taiwan%20UPSilon2000V6.0&amp;severity=critical&amp;id=69265f3eca41832e1e616541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66265-cwe-269-improper-privilege-manageme-b38de6bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66265%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20MegaTec%20Taiwan%20ClientMate&amp;severity=medium&amp;id=692654b3ca41832e1e5d9fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66264-cwe-428-unquoted-search-path-or-ele-074b793e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66264%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20MegaTec%20Taiwan%20ClientMate&amp;severity=high&amp;id=692654b3ca41832e1e5d9fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66263-cwe-158-unauthenticated-arbitrary-f-a58d8583</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66263%3A%20CWE-158%20Unauthenticated%20Arbitrary%20File%20Read%20via%20Null%20Byte%20Injection%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=692654b3ca41832e1e5d9fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66262-cwe-22-arbitrary-file-overwrite-via-a79c9cf2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66262%3A%20CWE-22%20Arbitrary%20File%20Overwrite%20via%20Tar%20Extraction%20Path%20Traversal%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=692654b3ca41832e1e5d9fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66261-cwe-78-unauthenticated-os-command-i-e3fa977a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66261%3A%20CWE-78%20Unauthenticated%20OS%20Command%20Injection%20(restore_settings.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=692654b3ca41832e1e5d9fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66260-cwe-89-postgresql-sql-injection-sta-d7104582</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66260%3A%20CWE-89%20PostgreSQL%20SQL%20Injection%20(status_sql.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=692654b3ca41832e1e5d9fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66259-cwe-20-improper-input-validation-in-9a138e69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66259%3A%20CWE-20%20Improper%20Input%20Validation%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=692654b3ca41832e1e5d9fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66258-cwe-79-stored-cross-site-scripting--3eccfa79</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66258%3A%20CWE-79%20Stored%20Cross-Site%20Scripting%20via%20XML%20Injection%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=692654b3ca41832e1e5d9faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66257-cwe-73-unauthenticated-arbitrary-fi-71769393</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66257%3A%20CWE-73%20Unauthenticated%20Arbitrary%20File%20Deletion%20(patch_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66256-cwe-434-unauthenticated-arbitrary-f-2dcb4ccf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66256%3A%20CWE-434%20Unauthenticated%20Arbitrary%20File%20Upload%20(patch_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66255-cwe-345-unauthenticated-arbitrary-f-93802dee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66255%3A%20CWE-345%20Unauthenticated%20Arbitrary%20File%20Upload%20(upgrade_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66254-cwe-73-unauthenticated-arbitrary-fi-f3c91cb8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66254%3A%20CWE-73%20Unauthenticated%20Arbitrary%20File%20Deletion%20(upgrade_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=69265837ca41832e1e5f38f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66253-cwe-78-unauthenticated-os-command-i-fb13e787</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66253%3A%20CWE-78%20Unauthenticated%20OS%20Command%20Injection%20(start_upgrade.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66252-cwe-835-infinite-loop-denial-of-ser-fec7f0b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66252%3A%20CWE-835%20Infinite%20Loop%20Denial%20of%20Service%20via%20Failed%20File%20Deletion%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=69265837ca41832e1e5f38f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66251-cwe-22-unauthenticated-path-travers-5efd3afd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66251%3A%20CWE-22%20Unauthenticated%20Path%20Traversal%20with%20Arbitrary%20File%20Deletion%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=69265837ca41832e1e5f38ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66250-cwe-434-unauthenticated-arbitrary-f-5729bc0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66250%3A%20CWE-434%20Unauthenticated%20Arbitrary%20File%20Upload%20(status_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-target-us-engineering-firm-because-46b2dde5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Target%20US%20Engineering%20Firm%20Because%20of%20Work%20Done%20for%20Ukrainian%20Sister%20City&amp;severity=medium&amp;id=69264a35ca41832e1e4a7332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64657-cwe-121-stack-based-buffer-overflow-b2c66871</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64657%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Microsoft%20Azure%20App%20Gateway&amp;severity=critical&amp;id=69264a57ca41832e1e4ac27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64656-cwe-125-out-of-bounds-read-in-micro-1400505a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64656%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Azure%20App%20Gateway&amp;severity=critical&amp;id=69264a57ca41832e1e4ac279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sha1-hulud-november-2025-ef47d469</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sha1-Hulud%20-%20November%202025&amp;severity=medium&amp;id=692aac9afd873eca28420b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-gainsight-security-advisory-nov-2025-a3c77be3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Gainsight%20Security%20Advisory%20-%20Nov%202025&amp;severity=medium&amp;id=692aac9afd873eca28420b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-26-7e304bfd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-26&amp;severity=medium&amp;id=692796c5d322a87b22e9fdb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65202-na-fd92ebc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65202%3A%20n%2Fa&amp;severity=high&amp;id=69276a3ac7c0a5a0bac75a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65670-na-2d1ed691</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65670%3A%20n%2Fa&amp;severity=medium&amp;id=69275cdeea1ddeeb60e50d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50433-na-afb79f46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50433%3A%20n%2Fa&amp;severity=critical&amp;id=69275cdeea1ddeeb60e50d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65278-na-a2e04951</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65278%3A%20n%2Fa&amp;severity=high&amp;id=6927595aea1ddeeb60e12f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65276-na-2020b873</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65276%3A%20n%2Fa&amp;severity=critical&amp;id=6927595aea1ddeeb60e12f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65669-na-a0b4ef9b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65669%3A%20n%2Fa&amp;severity=critical&amp;id=6927505dbd9e0dd06440c115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65676-na-e5efbf4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65676%3A%20n%2Fa&amp;severity=medium&amp;id=69274dc48e37a182565e4564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65681-na-6c4d9912</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65681%3A%20n%2Fa&amp;severity=low&amp;id=69274dc48e37a182565e455f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65675-na-3b152de7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65675%3A%20n%2Fa&amp;severity=medium&amp;id=69274a408e37a182565a4464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65672-na-bb986b43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65672%3A%20n%2Fa&amp;severity=high&amp;id=69274a408e37a182565a445f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26155-na-be652fc3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26155%3A%20n%2Fa&amp;severity=critical&amp;id=692746bc8e37a182565603e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55471-na-a54153ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55471%3A%20n%2Fa&amp;severity=high&amp;id=692743458e37a1825651967d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55469-na-bcd4665a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55469%3A%20n%2Fa&amp;severity=critical&amp;id=692740e20de433ec09559d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65237-na-d15c28a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65237%3A%20n%2Fa&amp;severity=medium&amp;id=692733b56d0980878b469f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65235-na-98e99aa1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65235%3A%20n%2Fa&amp;severity=critical&amp;id=692733b56d0980878b469f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65236-na-13518308</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65236%3A%20n%2Fa&amp;severity=critical&amp;id=692733b56d0980878b469f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65238-na-dc948eb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65238%3A%20n%2Fa&amp;severity=medium&amp;id=69272cad6d0980878b3dd34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65239-na-834ea9f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65239%3A%20n%2Fa&amp;severity=medium&amp;id=6927289df2ee3b97400f2f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63938-na-8fc327f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63938%3A%20n%2Fa&amp;severity=medium&amp;id=6927289df2ee3b97400f2f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46175-na-95c4841f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46175%3A%20n%2Fa&amp;severity=high&amp;id=6927289df2ee3b97400f2f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46174-na-3144f751</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46174%3A%20n%2Fa&amp;severity=high&amp;id=692726ab522797cb4ab1a601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50399-na-abe5ecbe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50399%3A%20n%2Fa&amp;severity=critical&amp;id=692723bab6bca73b24276606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45311-na-f8479b24</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45311%3A%20n%2Fa&amp;severity=high&amp;id=692723bab6bca73b24276602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50402-na-44c40abd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50402%3A%20n%2Fa&amp;severity=critical&amp;id=692723bab6bca73b242765fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56396-na-0c5d1b49</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56396%3A%20n%2Fa&amp;severity=high&amp;id=692723bab6bca73b242765f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59820-cwe-1284-improper-validation-of-spe-846057d9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59820%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20KDE%20Krita&amp;severity=medium&amp;id=692699b0e3ad539e3a6b2fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55174-cwe-684-incorrect-provision-of-spec-64441b28</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55174%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20KDE%20Skanpage&amp;severity=low&amp;id=692692b1e3ad539e3a636d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65963-cwe-284-improper-access-control-in--e8879ef2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65963%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20humhub%20cfiles&amp;severity=medium&amp;id=69263fd05765e822eef9c741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66019-cwe-400-uncontrolled-resource-consu-a37fade8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66019%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69263fd05765e822eef9c745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65957-cwe-200-exposure-of-sensitive-infor-a7002cff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65957%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Intercore-Productions%20Core-Bot&amp;severity=high&amp;id=69264a57ca41832e1e4ac27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65956-cwe-79-improper-neutralization-of-i-3135a111</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65956%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getformwork%20formwork&amp;severity=medium&amp;id=69263c525765e822eef59465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65952-cwe-22-improper-limitation-of-a-pat-3ffa6097</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65952%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iiDk-the-actual%20Console&amp;severity=high&amp;id=69263566acb2eea424e18f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13597-cwe-434-unrestricted-upload-of-file-188b0f58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13597%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20soportecibeles%20AI%20Feeds&amp;severity=critical&amp;id=692631dfacb2eea424dd30df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13595-cwe-434-unrestricted-upload-of-file-82ab0c8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13595%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20soportecibeles%20CIBELES%20AI&amp;severity=critical&amp;id=692631dfacb2eea424dd30d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64713-cwe-119-improper-restriction-of-ope-b512b911</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64713%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=medium&amp;id=69262ac94ed5c2dbbb0fc281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64704-cwe-754-improper-check-for-unusual--cc35e8b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64704%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=medium&amp;id=69262ac94ed5c2dbbb0fc27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62703-cwe-502-deserialization-of-untruste-cb47f5a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62703%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fugue-project%20fugue&amp;severity=high&amp;id=692621d54ed5c2dbbb064b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66017-cwe-327-use-of-a-broken-or-risky-cr-5a8408ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66017%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20LFDT-Lockness%20cggmp21&amp;severity=high&amp;id=69260c0cffc41f183f7e2ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66016-cwe-345-insufficient-verification-o-5b8661a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66016%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20LFDT-Lockness%20cggmp21&amp;severity=critical&amp;id=69260c0cffc41f183f7e2cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65965-cwe-212-improper-removal-of-sensiti-56118a5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65965%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20anchore%20grype&amp;severity=high&amp;id=69260888ffc41f183f790649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12816-cwe-436-interpretation-conflict-in--05c57b02</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12816%3A%20CWE-436%20Interpretation%20Conflict%20in%20Digital%20Bazaar%20node-forge&amp;severity=high&amp;id=692601e4ffc41f183f725864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34350-cwe-22-improper-limitation-of-a-pat-eb9ec087</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34350%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synergetic%20Data%20Systems%2C%20Inc.%20UnForm%20Server&amp;severity=high&amp;id=692601e4ffc41f183f725869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-spyware-targeting-messaging-app-user-565179a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Spyware%20Targeting%20Messaging%20App%20Users&amp;severity=high&amp;id=6925f3c2ea01c5f8b82fc012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33203-cwe-918-server-side-request-forgery-9bd8bb1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33203%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NVIDIA%20NeMo%20Agent%20ToolKit&amp;severity=high&amp;id=6925f3dfea01c5f8b8301208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33205-cwe-829-inclusion-of-functionality--bd2e791e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33205%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6925f3dfea01c5f8b8301212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33204-cwe-94-improper-control-of-generati-30e73709</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33204%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6925f3dfea01c5f8b830120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33200-cwe-226-sensitive-information-in-re-1a0b095e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33200%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20NVIDIA%20DGX%20Spark&amp;severity=low&amp;id=6925f3dfea01c5f8b8301203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33199-cwe-670-always-incorrect-control-fl-2646cf85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33199%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20NVIDIA%20DGX%20Spark&amp;severity=low&amp;id=6925f3dfea01c5f8b83011fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33198-cwe-226-sensitive-information-in-re-310c4117</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33198%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20NVIDIA%20DGX%20Spark&amp;severity=low&amp;id=6925f3dfea01c5f8b83011f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33197-cwe-476-null-pointer-dereference-in-282c354f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33197%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f3dfea01c5f8b83011f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33196-cwe-226-sensitive-information-in-re-a432024d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33196%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33195-cwe-119-improper-restriction-of-ope-f16f3515</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33195%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33194-cwe-180-incorrect-behavior-order-va-34fc6673</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33194%3A%20CWE-180%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33193-cwe-354-improper-validation-of-inte-bcacddd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33193%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33192-cwe-690-unchecked-return-value-to-n-4a43c480</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33192%3A%20CWE-690%20Unchecked%20Return%20Value%20to%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33191-cwe-20-improper-input-validation-in-fbda1b94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33191%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33190-cwe-787-out-of-bounds-write-in-nvid-6b5512fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33190%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33189-cwe-787-out-of-bounds-write-in-nvid-5d6ef151</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33189%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20DGX%20Spark&amp;severity=high&amp;id=6925f0bc94b153c6e1167e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33188-cwe-269-improper-privilege-manageme-f3a612ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33188%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NVIDIA%20DGX%20Spark&amp;severity=high&amp;id=6925f0bc94b153c6e1167e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33187-cwe-269-improper-privilege-manageme-7ed57606</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33187%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NVIDIA%20DGX%20Spark&amp;severity=critical&amp;id=6925f0bc94b153c6e1167e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65085-cwe-122-heap-based-buffer-overflow--854f1342</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65085%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=6925f0be94b153c6e11684f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65084-cwe-787-out-of-bounds-write-in-ashl-89b31184</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65084%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=6925f0be94b153c6e11684f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13483-cwe-306-missing-authentication-for--4e67c2d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13483%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SiRcom%20SMART%20Alert%20(SiSA&amp;severity=high&amp;id=6925ed1794b153c6e111ebeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-breach-at-spains-nationa-52d01432</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20ransomware%20claims%20breach%20at%20Spain%E2%80%99s%20national%20airline%20Iberia%20with%20596%20GB%20data%20theft&amp;severity=high&amp;id=6925e61794b153c6e10ae0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/years-of-jsonformatter-and-codebeautify-leaks-expo-93607956</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Years%20of%20JSONFormatter%20and%20CodeBeautify%20Leaks%20Expose%20Thousands%20of%20Passwords%20and%20API%20Keys&amp;severity=critical&amp;id=6925e565174e41d3fb49883b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13467-deserialization-of-untrusted-data-i-33bdd2d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13467%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=6925d6df159f97fbc0f9aed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toddycats-new-hacking-tools-steal-outlook-emails-a-05acb965</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ToddyCat&apos;s%20New%20Hacking%20Tools%20Steal%20Outlook%20Emails%20and%20Microsoft%20365%20Access%20Tokens&amp;severity=high&amp;id=6925d349159f97fbc0f5138c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-beautifiers-expose-credentials-from-banks-gov-050af2c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20beautifiers%20expose%20credentials%20from%20banks%2C%20govt%2C%20tech%20orgs&amp;severity=high&amp;id=6925d34a159f97fbc0f51390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40890-cwe-79-improper-neutralization-of-i-3fd36a23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=6925cfc8159f97fbc0f17f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0248-cwe-20-improper-input-validation-in--8289b1d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0248%3A%20CWE-20%20Improper%20Input%20Validation%20in%20HCL%20Software%20iNotes&amp;severity=high&amp;id=6925cc51159f97fbc0ed83f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36134-cwe-1275-in-ibm-sterling-b2b-integr-551a678b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36134%3A%20CWE-1275%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=low&amp;id=6925c2045b1d823317eed0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jackfix-uses-fake-windows-update-pop-ups-on-adult--3785608d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JackFix%20Uses%20Fake%20Windows%20Update%20Pop-Ups%20on%20Adult%20Sites%20to%20Deliver%20Multiple%20Stealers&amp;severity=critical&amp;id=6925cb495b1d823317fa685d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alumni-student-and-staff-information-stolen-from-h-0a78d7e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alumni%2C%20Student%2C%20and%20Staff%20Information%20Stolen%20From%20Harvard%20University&amp;severity=medium&amp;id=6925bb0e6dc31f06e917db71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scam-phone-numbers-how-to-spot-them-avoid-fraud-an-05dc5cab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scam%20Phone%20Numbers%3A%20How%20to%20Spot%20Them%2C%20Avoid%20Fraud%2C%20and%20Protect%20Yourself&amp;severity=medium&amp;id=6925bb286dc31f06e917e35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fluent-bit-vulnerabilities-expose-cloud-services-t-ff848435</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fluent%20Bit%20Vulnerabilities%20Expose%20Cloud%20Services%20to%20Takeover&amp;severity=critical&amp;id=6925b4096dc31f06e90fa535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jack-of-all-trades-shaihulud-malware-steals-secret-0c76b81a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jack%20of%20all%20trades%3A%20Shai%E2%80%91Hulud%20malware%20steals%20secrets%2C%20AIPAC%20data%20breach%20uncovered&amp;severity=high&amp;id=6925b42f6dc31f06e90fb859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wormgpt-4-and-kawaiigpt-new-dark-llms-boost-cyberc-5fa51279</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WormGPT%204%20and%20KawaiiGPT%3A%20New%20Dark%20LLMs%20Boost%20Cybercrime%20Automation&amp;severity=medium&amp;id=6925b4096dc31f06e90fa539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hide-the-threat-gpo-lateral-movement-f9b4425f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hide%20the%20threat%20-%20GPO%20lateral%20movement&amp;severity=medium&amp;id=6925b0996dc31f06e90b300e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-us-banks-impacted-by-situsamc-hack-172600ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20US%20Banks%20Impacted%20by%20SitusAMC%20Hack&amp;severity=medium&amp;id=69259e98a8d212b82783c007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dartmouth-college-confirms-data-breach-after-clop--ac1fae10</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dartmouth%20College%20confirms%20data%20breach%20after%20Clop%20extortion%20attack&amp;severity=high&amp;id=692598bfa8d212b8277bf437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-spyware-campaigns-hijacking-h-d353fdb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Spyware%20Campaigns%20Hijacking%20High-Value%20Signal%20and%20WhatsApp%20Users&amp;severity=high&amp;id=692598bfa8d212b8277bf43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/situsamc-confirms-data-breach-affecting-customer-i-d262e57c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SitusAMC%20confirms%20data%20breach%20affecting%20customer%20information&amp;severity=high&amp;id=692598bfa8d212b8277bf440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toddycats-new-hacking-tools-steal-outlook-emails-a-567fbe39</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ToddyCat%E2%80%99s%20New%20Hacking%20Tools%20Steal%20Outlook%20Emails%20and%20Microsoft%20365%20Access%20Tokens&amp;severity=low&amp;id=6925ac106d2b27733e2f3516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-hijack-blender-3d-assets-to-deploy-stealc--37734e13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Hijack%20Blender%203D%20Assets%20to%20Deploy%20StealC%20V2%20Data-Stealing%20Malware&amp;severity=medium&amp;id=69259532a8d212b827789180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/640-npm-packages-infected-in-new-shai-hulud-supply-e7405928</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=640%20NPM%20Packages%20Infected%20in%20New%20%E2%80%98Shai-Hulud%E2%80%99%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69258aa57fd7dcae45bdde11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13502-integer-overflow-or-wraparound-in-r-0f720288</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13502%3A%20Out-of-bounds%20Read%20in%20The%20WebKitGTK%20Team%20webkitgtk&amp;severity=high&amp;id=69256893690aeb35a2ca49fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59372-cwe-22-improper-limitation-of-a-pat-a6cd8f62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59372%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be0660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59371-cwe-330-use-of-insufficiently-rando-7f7b84a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59371%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20ASUS%20Router&amp;severity=high&amp;id=69255e2a292ce6fc00be065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59370-cwe-78-improper-neutralization-of-s-c25430c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59370%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ASUS%20Router&amp;severity=high&amp;id=69255e2a292ce6fc00be065a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59369-cwe-89-improper-neutralization-of-s-7e846994</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59369%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQLCommand%20(&apos;SQL%20Injection&apos;)%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be0657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59368-cwe-191-integer-underflow-in-asus-r-cda50801</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59368%3A%20CWE-191%3A%20Integer%20Underflow%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be0654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12003-cwe-306-missing-authentication-for--acd4d286</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12003%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ASUS%20Router&amp;severity=high&amp;id=69255e27292ce6fc00be05bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12587-cwe-352-cross-site-request-forgery--049a0147</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12587%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webgarh%20Peer%20Publish&amp;severity=medium&amp;id=69255e27292ce6fc00be05d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13385-cwe-89-improper-neutralization-of-s-02a6d761</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13385%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bylancer%20Bookme%20%E2%80%93%20Free%20Online%20Appointment%20Booking%20and%20Scheduling%20Plugin&amp;severity=medium&amp;id=69255e28292ce6fc00be0616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12634-cwe-862-missing-authorization-in-su-c51157ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12634%3A%20CWE-862%20Missing%20Authorization%20in%20sunarc%20Refund%20Request%20for%20WooCommerce&amp;severity=medium&amp;id=69255e27292ce6fc00be05de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13370-cwe-89-improper-neutralization-of-s-6f487c24</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13370%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ov3rkll%20ProjectList&amp;severity=medium&amp;id=69255e28292ce6fc00be05f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13311-cwe-79-improper-neutralization-of-i-98da3bd8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13311%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sigalitam%20Just%20Highlight&amp;severity=medium&amp;id=69255e28292ce6fc00be05f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12645-cwe-79-improper-neutralization-of-i-12636017</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12645%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karthiksg%20Inline%20frame%20%E2%80%93%20Iframe&amp;severity=medium&amp;id=69255e27292ce6fc00be05e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13405-cwe-862-missing-authorization-in-bu-eddace4a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13405%3A%20CWE-862%20Missing%20Authorization%20in%20buywptemplates%20Ace%20Post%20Type%20Builder&amp;severity=medium&amp;id=69255e2a292ce6fc00be063d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13380-cwe-73-external-control-of-file-nam-d175a848</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13380%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20liquidthemes%20AI%20Engine%20for%20WordPress%3A%20ChatGPT%2C%20GPT%20Content%20Generator&amp;severity=medium&amp;id=69255e28292ce6fc00be0603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13382-cwe-639-authorization-bypass-throug-7f50fbd0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13382%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nmedia%20Frontend%20File%20Manager%20Plugin&amp;severity=medium&amp;id=69255e28292ce6fc00be060b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13404-cwe-862-missing-authorization-in-do-86d5286a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13404%3A%20CWE-862%20Missing%20Authorization%20in%20docjojo%20atec%20Duplicate%20Page%20%26%20Post&amp;severity=medium&amp;id=69255e28292ce6fc00be0625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12025-cwe-79-improper-neutralization-of-i-be8c2bc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12025%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mahabubs%20YouTube%20Subscribe&amp;severity=medium&amp;id=69255e27292ce6fc00be05bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13386-cwe-862-missing-authorization-in-ly-52791f46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13386%3A%20CWE-862%20Missing%20Authorization%20in%20lyrathemes%20Social%20Images%20Widget&amp;severity=medium&amp;id=69255e28292ce6fc00be061b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12525-cwe-200-exposure-of-sensitive-infor-a713e520</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12525%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20appglut%20Locker%20Content&amp;severity=medium&amp;id=69255e27292ce6fc00be05d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13389-cwe-639-authorization-bypass-throug-7263e877</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13389%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nmedia%20Admin%20and%20Customer%20Messages%20After%20Order%20for%20WooCommerce%3A%20OrderConvo&amp;severity=medium&amp;id=69255e28292ce6fc00be0620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13376-cwe-434-unrestricted-upload-of-file-d330b753</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13376%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ov3rkll%20ProjectList&amp;severity=high&amp;id=69255e28292ce6fc00be05fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12040-cwe-639-authorization-bypass-throug-a8fe76e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12040%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themehunk%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=69255e27292ce6fc00be05c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12586-cwe-352-cross-site-request-forgery--9f1d1728</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12586%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20evolurise%20Conditionnal%20Maintenance%20Mode%20for%20WordPress&amp;severity=medium&amp;id=69255e27292ce6fc00be05d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13452-cwe-639-authorization-bypass-throug-3e0abe10</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13452%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nmedia%20Admin%20and%20Customer%20Messages%20After%20Order%20for%20WooCommerce%3A%20OrderConvo&amp;severity=medium&amp;id=69255e2a292ce6fc00be0647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12032-cwe-79-improper-neutralization-of-i-2483c388</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vithanhlam%20Zweb%20Social%20Mobile%20%E2%80%93%20%E1%BB%A8ng%20D%E1%BB%A5ng%20N%C3%BAt%20G%E1%BB%8Di%20Mobile&amp;severity=medium&amp;id=69255e27292ce6fc00be05c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13383-cwe-79-improper-neutralization-of-i-7315652b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestweblayout%20Job%20Board%20by%20BestWebSoft&amp;severity=medium&amp;id=69255e28292ce6fc00be0610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13414-cwe-862-missing-authorization-in-gw-4c6e772c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13414%3A%20CWE-862%20Missing%20Authorization%20in%20gwendydd%20Chamber%20Dashboard%20Business%20Directory&amp;severity=medium&amp;id=69255e2a292ce6fc00be0642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12043-cwe-862-missing-authorization-in-au-ca88d6b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12043%3A%20CWE-862%20Missing%20Authorization%20in%20autochat%20Autochat%20Automatic%20Conversation&amp;severity=medium&amp;id=69255e27292ce6fc00be05cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59365-cwe-121-stack-based-buffer-overflow-68efcc7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59365%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be064e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59366-cwe-22-path-traversal-in-asus-route-0b36589e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59366%3A%20CWE-22%3A%20Path%20Traversal%20in%20ASUS%20Router&amp;severity=critical&amp;id=69255e2a292ce6fc00be0651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canon-says-subsidiary-impacted-by-oracle-ebs-hack-96f930c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canon%20Says%20Subsidiary%20Impacted%20by%20Oracle%20EBS%20Hack&amp;severity=medium&amp;id=69255a9b292ce6fc00b9519c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64693-heap-based-buffer-overflow-in-inter-ce979d27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64693%3A%20Heap-based%20buffer%20overflow%20in%20Intercom%2C%20Inc.%20Security%20Point%20(Windows)%20of%20MaLion&amp;severity=critical&amp;id=69255ab1292ce6fc00b965af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62691-stack-based-buffer-overflow-in-inte-93f6b262</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62691%3A%20Stack-based%20buffer%20overflow%20in%20Intercom%2C%20Inc.%20Security%20Point%20(Windows)%20of%20MaLion&amp;severity=critical&amp;id=69255ab1292ce6fc00b965ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59485-incorrect-default-permissions-in-in-f1a03053</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59485%3A%20Incorrect%20default%20permissions%20in%20Intercom%2C%20Inc.%20Security%20Point%20(Windows)%20of%20MaLion&amp;severity=low&amp;id=69255ab1292ce6fc00b965a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-spyware-campaigns-hijacking-h-4ec962b3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Spyware%20Campaigns%20Hijacking%20High-Value%20Signal%20and%20WhatsApp%20Users&amp;severity=high&amp;id=692553225d11bc51878e9805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12742-cwe-78-improper-neutralization-of-s-ec748b90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12742%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=6925421a441560fe7ee98db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13644-cwe-617-reachable-assertion-in-mong-7ed62f1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13644%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=6925421a441560fe7ee98db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13643-cwe-862-missing-authorization-in-mo-c81940c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13643%3A%20CWE-862%3A%20Missing%20Authorization%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=low&amp;id=69253e96441560fe7ee5716c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12893-cwe-295-improper-certificate-valida-da0f54ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12893%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=69253b14441560fe7ee1e752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13507-cwe-1284-improper-validation-of-spe-921c93f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13507%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=high&amp;id=6925392a441560fe7ee067dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13068-cwe-79-improper-neutralization-of-i-c380ee1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13068%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milmor%20Telegram%20Bot%20%26%20Channel&amp;severity=high&amp;id=6925392a441560fe7ee067df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13559-cwe-269-improper-privilege-manageme-9ab9ee47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13559%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20venusweb%20EduKart%20Pro&amp;severity=critical&amp;id=6925392a441560fe7ee067e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13558-cwe-862-missing-authorization-in-pr-b4c47034</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13558%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=6925392a441560fe7ee067e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64730-cross-site-scripting-xss-in-sony-co-a4302e20</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64730%3A%20Cross-site%20scripting%20(XSS)%20in%20Sony%20Corporation%20SNC-CX600W&amp;severity=medium&amp;id=6925392a441560fe7ee067f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62497-cross-site-request-forgery-csrf-in--371b7d7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62497%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20Sony%20Corporation%20SNC-CX600W&amp;severity=low&amp;id=6925392a441560fe7ee067ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64304-use-of-hard-coded-cryptographic-key-55b49f41</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64304%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20Fuji%20Television%20Network%2C%20Inc.%20%22FOD%22%20App%20for%20Android&amp;severity=medium&amp;id=692534a1f17e04acaf6c88e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10646-cwe-862-missing-authorization-in-qu-89108b3d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10646%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Search%20Exclude&amp;severity=medium&amp;id=692527c82a08b12b0e80cc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6389-cwe-94-improper-control-of-generatio-740e50f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6389%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Sneeit%20Sneeit%20Framework&amp;severity=critical&amp;id=692519cd2a08b12b0e7e45f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59373-cwe-732-incorrect-permission-assign-a59b9646</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59373%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ASUS%20MyASUS&amp;severity=high&amp;id=692512aa2a08b12b0e7cf688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65951-cwe-200-exposure-of-sensitive-infor-42a10bc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65951%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mescuwa%20entropy-derby&amp;severity=high&amp;id=6924fa182a08b12b0e784280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65944-cwe-201-insertion-of-sensitive-info-ba27e5db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65944%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20getsentry%20sentry-javascript&amp;severity=medium&amp;id=6924fa182a08b12b0e78427a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9803-cwe-287-improper-authentication-in-l-b3eaaf9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9803%3A%20CWE-287%20Improper%20Authentication%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=6924fa182a08b12b0e784284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-25-3f99b78d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-25&amp;severity=medium&amp;id=692646c25765e822ee01c625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63735-na-78b6b7c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63735%3A%20n%2Fa&amp;severity=medium&amp;id=692621d54ed5c2dbbb064b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51746-na-5ea9b0cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51746%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51745-na-1c52bc21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51745%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51744-na-de3d72e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51744%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51743-na-324a7de8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51743%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51741-na-9fbfea92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51741%3A%20n%2Fa&amp;severity=high&amp;id=69261d1814e694ef3cf57caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51742-na-02a07797</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51742%3A%20n%2Fa&amp;severity=critical&amp;id=69260c0cffc41f183f7e2ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65647-na-c0e92f18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65647%3A%20n%2Fa&amp;severity=medium&amp;id=69260888ffc41f183f790645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64067-na-95375f19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64067%3A%20n%2Fa&amp;severity=medium&amp;id=6925faccea01c5f8b8382a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61168-na-19f86d63</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61168%3A%20n%2Fa&amp;severity=critical&amp;id=6925faccea01c5f8b8382a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61167-na-7a610355</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61167%3A%20n%2Fa&amp;severity=medium&amp;id=6925faccea01c5f8b8382a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64065-na-e65ecfee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64065%3A%20n%2Fa&amp;severity=high&amp;id=6925f747ea01c5f8b834af02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64064-na-ecb52644</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64064%3A%20n%2Fa&amp;severity=high&amp;id=6925f747ea01c5f8b834aefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64063-na-e7b0f7ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64063%3A%20n%2Fa&amp;severity=critical&amp;id=6925f747ea01c5f8b834aefa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64062-na-f25178cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64062%3A%20n%2Fa&amp;severity=high&amp;id=6925f3dfea01c5f8b8301218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64066-na-f625abf4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64066%3A%20n%2Fa&amp;severity=high&amp;id=6925f0be94b153c6e11684f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64061-na-d00e0823</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64061%3A%20n%2Fa&amp;severity=medium&amp;id=6925e2cb174e41d3fb46673b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63729-na-89f1140c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63729%3A%20n%2Fa&amp;severity=critical&amp;id=6925dbc3174e41d3fb3e2416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60739-na-1e4371c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60739%3A%20n%2Fa&amp;severity=critical&amp;id=6925d6df159f97fbc0f9aed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64050-na-40aaec94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64050%3A%20n%2Fa&amp;severity=high&amp;id=6925d374159f97fbc0f524dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64049-na-324f5566</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64049%3A%20n%2Fa&amp;severity=medium&amp;id=6925d374159f97fbc0f524d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62155-cwe-918-server-side-request-forgery-16942ca8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62155%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=6924f361c5f5f1e21b6201dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65018-cwe-787-out-of-bounds-write-in-pngg-00219fbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65018%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20pnggroup%20libpng&amp;severity=high&amp;id=6924f361c5f5f1e21b6201df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64720-cwe-125-out-of-bounds-read-in-pnggr-8ffd8af9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64720%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=high&amp;id=6924efddc5f5f1e21b5dde43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64506-cwe-125-out-of-bounds-read-in-pnggr-c548bb38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64506%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=6924efddc5f5f1e21b5dde4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64505-cwe-125-out-of-bounds-read-in-pnggr-cc20cedc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64505%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=6924efddc5f5f1e21b5dde49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/split-second-side-doors-how-bot-delegated-toctou-b-185f1568</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Split-Second%20Side%20Doors%3A%20How%20Bot-Delegated%20TOCTOU%20Breaks%20The%20CI%2FCD%20Threat%20Model&amp;severity=medium&amp;id=6924e5dc8d8147e8943bc1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10144-cwe-89-improper-neutralization-of-s-ca69e924</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10144%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quadlayers%20Perfect%20Brands%20for%20WooCommerce&amp;severity=medium&amp;id=6924dcee8d8147e89432b4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stories-from-the-soc-mystery-of-the-postponed-prox-ff0ee2de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stories%20from%20the%20SOC%3A%20Mystery%20of%20the%20postponed%20proxyware%20install&amp;severity=medium&amp;id=6925732e7e8c0fda07ba767b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-gets-creative-malware-buried-in-images-d646caab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Gets%20Creative%3A%20Malware%20Buried%20in%20Images&amp;severity=medium&amp;id=6925732e7e8c0fda07ba7658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29933-cwe-787-out-of-bounds-write-in-amd--285cbf25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29933%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=6924ccc0338d19296f824bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48511-cwe-1285-improper-validation-of-spe-1c7ed30b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48511%3A%20CWE-1285%20%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=6924c9b1e1f3fb2621007d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48510-cwe-394-unexpected-status-code-or-r-a158c006</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48510%3A%20CWE-394%20%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=high&amp;id=6924c9b1e1f3fb2621007d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52538-cwe-190-integer-overflow-or-wraparo-233f7a71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52538%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924c62de1f3fb2621fbb452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0003-cwe-413-improper-resource-locking-in-00499a06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0003%3A%20CWE-413%20%20Improper%20Resource%20Locking%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924c2e2e1f3fb2621f8d20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0007-cwe-710-improper-adherence-to-coding-869874f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0007%3A%20CWE-710%20%20Improper%20Adherence%20to%20Coding%20Standards%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=medium&amp;id=6924c2e2e1f3fb2621f8d211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7330-cwe-434-unrestricted-upload-of-file--ff7a18c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7330%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Beijing%20Star-Net%20Ruijie%20Network%20Technology%20Co.%2C%20Ltd.%20NBR%20Series%20Routers&amp;severity=critical&amp;id=6924c2e2e1f3fb2621f8d201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14007-cwe-306-missing-authentication-for--5b150429</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14007%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Shenzhen%20TVT%20Digital%20Technology%20Co.%2C%20Ltd.%20NVMS-9000&amp;severity=high&amp;id=6924c2e2e1f3fb2621f8d208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36150-cwe-327-use-of-a-broken-or-risky-cr-6e8abf6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36150%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert&amp;severity=medium&amp;id=6924c2e2e1f3fb2621f8d214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-systemic-flaw-in-binances-ip-whitelisting-model--7be62523</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20systemic%20flaw%20in%20Binance%E2%80%99s%20IP%20Whitelisting%20model%3A%20listenKeys%20bypass%20the%20protection%20entirely&amp;severity=medium&amp;id=6924ba58228e5e387419b415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0005-cwe-190-integer-overflow-or-wraparou-e45ff811</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0005%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924ba55228e5e387419b3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52539-cwe-121-stack-based-buffer-overflow-4c6a03dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52539%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924b6d1228e5e38741697d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/real-estate-finance-services-giant-situsamc-breach-f74a100d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Real-estate%20finance%20services%20giant%20SitusAMC%20breach%20exposes%20client%20data&amp;severity=high&amp;id=6924a5b565c0297328aa8965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36112-cwe-497-in-ibm-sterling-b2b-integra-d8aeffcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36112%3A%20CWE-497%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6924acb465c0297328b2f7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13609-use-of-multiple-resources-with-dupl-dda2b4b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13609%3A%20Use%20of%20Multiple%20Resources%20with%20Duplicate%20Identifier%20in%20Keylime%20Project%20keylime&amp;severity=high&amp;id=6924a2b20ea9183d5bf9f772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-linked-malware-campaign-hides-in-blender-3-4d76750e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian-linked%20Malware%20Campaign%20Hides%20in%20Blender%203D%20Files&amp;severity=high&amp;id=69249ba70ea9183d5bf293cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-university-discloses-data-breach-affecting-062bc1e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20University%20discloses%20data%20breach%20affecting%20alumni%2C%20donors&amp;severity=high&amp;id=69249ba70ea9183d5bf293cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/delta-dental-of-virginia-data-breach-impacts-14591-54f810ac</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Delta%20Dental%20of%20Virginia%20data%20breach%20impacts%20145%2C918%20customers&amp;severity=high&amp;id=69249ba70ea9183d5bf293d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fluent-bit-flaws-expose-cloud-to-rce-and-steal-2225d104</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fluent%20Bit%20Flaws%20Expose%20Cloud%20to%20RCE%20and%20Stealthy%20Infrastructure%20Intrusions&amp;severity=high&amp;id=69249ba70ea9183d5bf293d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/conflicts-between-url-mapping-and-url-based-access-588cec79</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control.%2C%20(Mon%2C%20Nov%2024th)&amp;severity=high&amp;id=69248e03ac857ca3cacf22fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-npm-worm-impacts-26000-repos-in-supply--63b4f678</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai%20Hulud%20npm%20Worm%20Impacts%2026%2C000%2B%20Repos%20in%20Supply%20Chain%20Attack%20Including%20Zapier%2C%20ENS%20and%20Postman&amp;severity=medium&amp;id=692483fbd5a1e53350b382d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-confirms-exploitation-of-recent-oracle-identi-41db2283</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Confirms%20Exploitation%20of%20Recent%20Oracle%20Identity%20Manager%20Vulnerability&amp;severity=medium&amp;id=69247c8eefc7406fa6689474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-npm-worm-infects-19000-packages-in-majo-344c0cf9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai%20Hulud%20npm%20Worm%20Infects%2019%2C000%20Packages%20in%20Major%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69247ca7efc7406fa6689bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10555-cwe-79-improper-neutralization-of-i-c2af2f74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10555%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Service%20Process%20Engineer&amp;severity=high&amp;id=69247cb8efc7406fa668b295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10554-cwe-79-improper-neutralization-of-i-f7c27a88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Product%20Manager&amp;severity=high&amp;id=69247cb8efc7406fa668b292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crowdstrike-insider-helped-hackers-falsely-claim-s-d3990b33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrowdStrike%20Insider%20Helped%20Hackers%20Falsely%20Claim%20System%20Breach&amp;severity=medium&amp;id=69247919efc7406fa6647da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44018-cwe-295-improper-certificate-valida-526e2dab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44018%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20GL-Inet%20GL-AXT1800&amp;severity=high&amp;id=6924792eefc7406fa6649b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12978-cwe-187-partial-string-comparison-i-c36d99b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12978%3A%20CWE-187%3A%20Partial%20String%20Comparison%20in%20FluentBit%20Fluent%20Bit&amp;severity=medium&amp;id=6929e1b04121026312bb42fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12969-cwe-306-missing-authentication-for--c628dba8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12969%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FluentBit%20Fluent%20Bit&amp;severity=medium&amp;id=6929e1b04121026312bb42f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12972-cwe-35-path-traversal-in-fluentbit--62953ec5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12972%3A%20CWE-35%3A%20Path%20Traversal%20in%20FluentBit%20Fluent%20Bit&amp;severity=medium&amp;id=6929e1b04121026312bb4304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12977-cwe-187-partial-string-comparison-i-afafdf0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12977%3A%20CWE-187%3A%20Partial%20String%20Comparison%20in%20FluentBit%20Fluent%20Bit&amp;severity=critical&amp;id=6929e1b04121026312bb4308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12970-cwe-121-stack-based-buffer-overflow-a82b41c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12970%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20FluentBit%20Fluent%20Bit&amp;severity=high&amp;id=6929e1b04121026312bb4300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11921-cwe-732-incorrect-permission-assign-588b2598</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11921%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Bjango%20iStats&amp;severity=high&amp;id=69246d8d7150efb62b9155c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-deepseek-r1-ai-generates-insecure-code-whe-9109e2ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20DeepSeek-R1%20AI%20Generates%20Insecure%20Code%20When%20Prompts%20Mention%20Tibet%20or%20Uyghurs&amp;severity=high&amp;id=692467c7ff33e781bff0cd6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/second-sha1-hulud-wave-affects-25000-repositories--f517574d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Second%20Sha1-Hulud%20Wave%20Affects%2025%2C000%2B%20Repositories%20via%20npm%20Preinstall%20Credential%20Theft&amp;severity=high&amp;id=692467c7ff33e781bff0cd73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65998-cwe-321-use-of-hard-coded-cryptogra-147361a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65998%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=high&amp;id=69246443ff33e781bfec6d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-highlights-security-risks-introduced-by--4103237d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Highlights%20Security%20Risks%20Introduced%20by%20New%20Agentic%20AI%20Feature&amp;severity=high&amp;id=692460bcff33e781bfe93e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/second-sha1-hulud-wave-affects-25000-repositories--e120fa20</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Second%20Sha1-Hulud%20Wave%20Affects%2025%2C000%2B%20Repositories%20via%20npm%20Preinstall%20Credential%20Theft&amp;severity=medium&amp;id=69246a5eff33e781bff46df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12628-cwe-331-insufficient-entropyy-in-wp-ac8173b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12628%3A%20CWE-331%20Insufficient%20Entropyy%20in%20WP%202FA&amp;severity=medium&amp;id=69245c1900c839aeb21861fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/live-updates-shai1-hulud-the-second-coming-hundred-6cc04660</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Live%20Updates%3A%20Shai1-Hulud%2C%20The%20Second%20Coming%20-%20Hundreds%20of%20NPM%20Packages%20Compromised&amp;severity=medium&amp;id=6924554600c839aeb20fcf6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-prettier-extension-on-vscode-marketplace-drop-d7b5d185</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Prettier%20Extension%20on%20VSCode%20Marketplace%20Dropped%20Anivia%20Stealer&amp;severity=medium&amp;id=6924552400c839aeb20f9bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mazda-says-no-data-leakage-or-operational-impact-f-29da8d3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mazda%20Says%20No%20Data%20Leakage%20or%20Operational%20Impact%20From%20Oracle%20Hack&amp;severity=medium&amp;id=6924550e00c839aeb20f2584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-hidden-threats-protect-your-online-store-ecomme-f8523cc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20Hidden%20Threats%20Protect%20Your%20Online%20Store%3A%20Ecommerce%20Cybsersecurity&amp;severity=medium&amp;id=6924552400c839aeb20f9bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-fortinet-exploit-chrome-0-day-badiis--f0daf758</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Fortinet%20Exploit%2C%20Chrome%200-Day%2C%20BadIIS%20Malware%2C%20Record%20DDoS%2C%20SaaS%20Breach%20%26%20More&amp;severity=medium&amp;id=69246a5eff33e781bff46dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41017-cwe-862-missing-authorization-in-da-a946c1ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41017%3A%20CWE-862%20Missing%20Authorization%20in%20Davantis%20DFUSION&amp;severity=medium&amp;id=6924518b00c839aeb20c718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41016-cwe-862-missing-authorization-in-da-0564a689</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41016%3A%20CWE-862%20Missing%20Authorization%20in%20Davantis%20DFUSION&amp;severity=high&amp;id=6924518b00c839aeb20c718a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spanish-airline-iberia-notifies-customers-of-data--a567c4a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spanish%20Airline%20Iberia%20Notifies%20Customers%20of%20Data%20Breach&amp;severity=medium&amp;id=69244d6d911d225366050680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brazilian-campaign-spreading-the-malware-via-whats-1922fc4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brazilian%20Campaign%3A%20Spreading%20the%20Malware%20via%20WhatsApp&amp;severity=medium&amp;id=69244dd3911d225366056a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsukys-ongoing-evolution-of-kimjongrat-and-expan-f6206769</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky&apos;s%20Ongoing%20Evolution%20of%20KimJongRAT%20and%20Expanding%20Threats&amp;severity=medium&amp;id=69244e1100c839aeb2084876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-radzarat-spyware-poses-as-file-manager-to-hija-2fab30d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20RadzaRat%20Spyware%20Poses%20as%20File%20Manager%20to%20Hijack%20Android%20Devices%2C%20Evades%20All%2066%20Antivirus%20on%20VirusTotal&amp;severity=medium&amp;id=692446d8911d225366fbe14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/146000-impacted-by-delta-dental-of-virginia-data-b-4a9c49c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=146%2C000%20Impacted%20by%20Delta%20Dental%20of%20Virginia%20Data%20Breach&amp;severity=medium&amp;id=692446c5911d225366fbd883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12741-cwe-20-improper-input-validation-in-c20badd7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12741%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=69244dd2911d225366056a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12740-cwe-20-improper-input-validation-in-fdb6d825</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12740%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=69244dd2911d225366056a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41087-cwe-79-improper-neutralization-of-i-242cbdfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Taclia%20Taclia&apos;s%20web%20application&amp;severity=medium&amp;id=69244343911d225366f85a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41729-cwe-1287-improper-validation-of-spe-060e9a1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41729%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Janitza%20UMG%2096-PA&amp;severity=high&amp;id=69244343911d225366f85a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-deepseek-r1-ai-generates-insecure-code-whe-93576b9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20DeepSeek-R1%20AI%20Generates%20Insecure%20Code%20When%20Prompts%20Mention%20Tibet%20or%20Uyghurs&amp;severity=medium&amp;id=69244d03911d22536604edf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cox-confirms-oracle-ebs-hack-as-cybercriminals-nam-c5bb7076</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cox%20Confirms%20Oracle%20EBS%20Hack%20as%20Cybercriminals%20Name%20100%20Alleged%20Victims&amp;severity=medium&amp;id=6924390e296ff79352ebf870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/24th-november-threat-intelligence-report-d9ab7894</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=24th%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69243921296ff79352ebfa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowpad-malware-actively-exploits-wsus-vulnerabi-669b068b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowPad%20Malware%20Actively%20Exploits%20WSUS%20Vulnerability%20for%20Full%20System%20Access&amp;severity=high&amp;id=69243211296ff79352e3abc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-returns-over-300-npm-packages-and-21k-g-470c136c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20Returns%3A%20Over%20300%20NPM%20Packages%20and%2021K%20Github%20Repos%20infected%20via%20Fake%20Bun%20Runtime%20Within%20Hours&amp;severity=medium&amp;id=69242f333dd5bbb718bbeab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12739-cwe-79-improper-neutralization-of-i-b025b75c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=69242f303dd5bbb718bbea47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13596-cwe-209-generation-of-error-message-0b27d9e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13596%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20ATISoluciones%20CIGES&amp;severity=low&amp;id=69240ce6272f5312cdbb624a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowpad-malware-actively-exploits-wsus-vulnerabi-9be01087</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowPad%20Malware%20Actively%20Exploits%20WSUS%20Vulnerability%20for%20Full%20System%20Access&amp;severity=medium&amp;id=692420aa3a0ff800317c82bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13588-server-side-request-forgery-in-lkin-7be263b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13588%3A%20Server-Side%20Request%20Forgery%20in%20lKinderBueno%20Streamity%20Xtream%20IPTV%20Player&amp;severity=medium&amp;id=69240640272f5312cdb48a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13586-sql-injection-in-sourcecodester-onl-445082c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13586%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=6923f9c2011871acbdf06d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12629-cwe-79-cross-site-scripting-xss-in--f82a86b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12629%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Broken%20Link%20Manager&amp;severity=high&amp;id=6923f52e8313f4d201985fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12569-cwe-601-url-redirection-to-untruste-c21e20ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12569%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Guest%20posting%20%2F%20Frontend%20Posting%20%2F%20Front%20Editor&amp;severity=medium&amp;id=6923f52e8313f4d201985f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12394-cwe-200-information-exposure-in-bac-ee2a85e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12394%3A%20CWE-200%20Information%20Exposure%20in%20Backup%20Migration&amp;severity=medium&amp;id=6923f52e8313f4d201985f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14015-cwe-79-cross-site-scripting-xss-in--c5238676</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14015%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WordPress%20eCommerce%20Plugin&amp;severity=high&amp;id=6923f52e8313f4d201985f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13585-sql-injection-in-code-projects-covi-4b465460</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13585%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=6923f820011871acbdece00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13584-cross-site-scripting-in-eigenfocus-d268de6f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13584%3A%20Cross%20Site%20Scripting%20in%20Eigenfocus&amp;severity=medium&amp;id=6923e9501e6a877a1a5be181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7402-cwe-89-improper-neutralization-of-sp-c1c197c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7402%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6923e5eb1e6a877a1a57700d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13583-sql-injection-in-code-projects-ques-3a58c829</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13583%3A%20SQL%20Injection%20in%20code-projects%20Question%20Paper%20Generator&amp;severity=medium&amp;id=6923e2d64350076d0de522b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13582-sql-injection-in-code-projects-jonn-8c647ee0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13582%3A%20SQL%20Injection%20in%20code-projects%20Jonnys%20Liquor&amp;severity=medium&amp;id=6923e5eb1e6a877a1a577011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13581-sql-injection-in-itsourcecode-stude-6893678e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13581%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=6923d671a532ea377e9087ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13589-cwe-79-improper-neutralization-of-i-0d2e1dde</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Otsuka%20Information%20Technology%20FMS&amp;severity=medium&amp;id=6923d671a532ea377e9087f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13580-sql-injection-in-code-projects-libr-2fb4d90e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13580%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6923cf69a532ea377e8d8efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13579-sql-injection-in-code-projects-libr-86b8f488</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13579%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6923cf69a532ea377e8d8ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13578-sql-injection-in-code-projects-libr-e79a5b93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13578%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6923c4dda532ea377e83711d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13577-cross-site-scripting-in-phpgurukul--53fcf512</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13577%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Hostel%20Management%20System&amp;severity=medium&amp;id=6923ba52a532ea377e78c9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13576-improper-authorization-in-code-proj-da2c9881</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13576%3A%20Improper%20Authorization%20in%20code-projects%20Blog%20Site&amp;severity=medium&amp;id=6923d9fd4350076d0dda999c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13575-sql-injection-in-code-projects-blog-3724ca20</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13575%3A%20SQL%20Injection%20in%20code-projects%20Blog%20Site&amp;severity=medium&amp;id=6923ac41a532ea377e68fa0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13574-unrestricted-upload-in-code-project-a361421c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13574%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6923a272a532ea377e5f0ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-24-fd6f33e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-24&amp;severity=medium&amp;id=6924f356c5f5f1e21b61f348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47856-na-301a6340</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47856%3A%20n%2Fa&amp;severity=critical&amp;id=6924d3bc338d19296f897f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54347-na-477a6049</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54347%3A%20n%2Fa&amp;severity=critical&amp;id=6924d037338d19296f865e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63674-na-21bd9cbe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63674%3A%20n%2Fa&amp;severity=medium&amp;id=6924d037338d19296f865e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54563-na-a560e07c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54563%3A%20n%2Fa&amp;severity=high&amp;id=6924d037338d19296f865e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54341-na-3f00375f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54341%3A%20n%2Fa&amp;severity=medium&amp;id=6924d037338d19296f865e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54338-na-27c07b09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54338%3A%20n%2Fa&amp;severity=high&amp;id=6924d037338d19296f865e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63498-na-ae437c3d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63498%3A%20n%2Fa&amp;severity=medium&amp;id=6924c2e2e1f3fb2621f8d217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56400-na-2286e4eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56400%3A%20n%2Fa&amp;severity=high&amp;id=6924bdd9228e5e38741e15f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64048-na-1b11167f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64048%3A%20n%2Fa&amp;severity=medium&amp;id=6924ba55228e5e387419b3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64047-na-accc8e20</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64047%3A%20n%2Fa&amp;severity=medium&amp;id=6924b35c228e5e3874124c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63914-na-58084588</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63914%3A%20n%2Fa&amp;severity=medium&amp;id=6924b03965c0297328b78395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63435-na-ec78ca0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63435%3A%20n%2Fa&amp;severity=medium&amp;id=6924918bac857ca3cad235c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63434-na-f1fdf6ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63434%3A%20n%2Fa&amp;severity=high&amp;id=6924918bac857ca3cad235c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63433-na-a9d56e95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63433%3A%20n%2Fa&amp;severity=medium&amp;id=69248e18ac857ca3cacf2914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63432-na-548a2853</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63432%3A%20n%2Fa&amp;severity=medium&amp;id=69248e18ac857ca3cacf2910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63958-na-f46fb463</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63958%3A%20n%2Fa&amp;severity=critical&amp;id=69248c2fac857ca3cacc8733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63953-na-abb21f5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63953%3A%20n%2Fa&amp;severity=medium&amp;id=69248a62ea0759ac8b7c828f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63952-na-2523f49c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63952%3A%20n%2Fa&amp;severity=medium&amp;id=69248a62ea0759ac8b7c828b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60638-na-50e3a94b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60638%3A%20n%2Fa&amp;severity=high&amp;id=6924840cd5a1e53350b3a58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60917-na-1b0a537f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60917%3A%20n%2Fa&amp;severity=medium&amp;id=69248078d5a1e53350b077a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60633-na-4bc761c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60633%3A%20n%2Fa&amp;severity=medium&amp;id=69248078d5a1e53350b0779c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60632-na-0f70d6ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60632%3A%20n%2Fa&amp;severity=medium&amp;id=69248078d5a1e53350b07798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60916-na-3db96d69</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60916%3A%20n%2Fa&amp;severity=medium&amp;id=69247cb8efc7406fa668b29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60915-na-00d03424</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60915%3A%20n%2Fa&amp;severity=high&amp;id=69247cb8efc7406fa668b298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60914-na-dbfc256f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60914%3A%20n%2Fa&amp;severity=medium&amp;id=6924792eefc7406fa6649b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56423-na-fffd75a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56423%3A%20n%2Fa&amp;severity=medium&amp;id=6924792eefc7406fa6649b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56401-na-0054ae22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56401%3A%20n%2Fa&amp;severity=high&amp;id=6924792eefc7406fa6649b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65503-na-8747f859</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65503%3A%20n%2Fa&amp;severity=high&amp;id=692467edff33e781bff0ea6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65502-na-90f2fb34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65502%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65501-na-ceedd044</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65501%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65500-na-2eab75bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65500%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65499-na-97c0a8e5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65499%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65498-na-61bed763</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65498%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65497-na-43a5fa5a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65497%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65496-na-ca961f86</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65496%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65495-na-13986d9f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65495%3A%20n%2Fa&amp;severity=high&amp;id=692467ebff33e781bff0e366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65494-na-e3232ed5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65494%3A%20n%2Fa&amp;severity=high&amp;id=692467ebff33e781bff0e362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65493-na-ee53f652</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65493%3A%20n%2Fa&amp;severity=high&amp;id=692467ebff33e781bff0e35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13573-unrestricted-upload-in-projectworld-9c4347ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13573%3A%20Unrestricted%20Upload%20in%20projectworlds%20can%20pass%20malicious%20payloads&amp;severity=medium&amp;id=69239b6adfa0c74de8802fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13572-sql-injection-in-projectworlds-adva-6e1fc13f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13572%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=69239609dfa0c74de87abf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12800-cwe-918-server-side-request-forgery-d9c2a2ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12800%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69238d0dec5d308f09cb6a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13571-sql-injection-in-code-projects-simp-3f0692a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13571%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=692388afec5d308f09c843f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13570-sql-injection-in-itsourcecode-covid-a4464fb3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13570%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=69238059f1913078bbfcf627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13569-sql-injection-in-itsourcecode-covid-a101d4a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13569%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=69237977f1913078bbf586a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13568-sql-injection-in-itsourcecode-covid-e742d0a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13568%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=692372e6962646bb5af86ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13567-sql-injection-in-itsourcecode-covid-30fe99eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13567%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=69236ac46d4acfe6c0ac2364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13566-double-free-in-jarun-nnn-3660b685</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13566%3A%20Double%20Free%20in%20jarun%20nnn&amp;severity=medium&amp;id=6923643de9cdbb117d0d9be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13565-weak-password-recovery-in-sourcecod-76c59514</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13565%3A%20Weak%20Password%20Recovery%20in%20SourceCodester%20Inventory%20Management%20System&amp;severity=medium&amp;id=69235d40e9cdbb117d05e3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13564-denial-of-service-in-sourcecodester-71b01ff8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13564%3A%20Denial%20of%20Service%20in%20SourceCodester%20Pre-School%20Management%20System&amp;severity=medium&amp;id=69235870aa55e2112d7fa2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13562-command-injection-in-d-link-dir-852-d81b2b6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13562%3A%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=69234d6ea8cb427b79f42970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13561-sql-injection-in-sourcecodester-com-16a52f71</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13561%3A%20SQL%20Injection%20in%20SourceCodester%20Company%20Website%20CMS&amp;severity=medium&amp;id=692349eba8cb427b79efb919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54515-cwe-1284-improper-validation-of-spe-aa977176</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54515%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20Versal%E2%84%A2%20Adaptive%20SoC%20Devices&amp;severity=low&amp;id=69234496a8cb427b79e9d239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48507-cwe-1284-improper-validation-of-spe-d9783ee6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48507%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20Kria%E2%84%A2%20SOM&amp;severity=high&amp;id=692342efa8cb427b79e69085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13560-sql-injection-in-sourcecodester-com-7660d362</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13560%3A%20SQL%20Injection%20in%20SourceCodester%20Company%20Website%20CMS&amp;severity=medium&amp;id=69233fd377ebf6e86e532d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13557-sql-injection-in-campcodes-online-p-debde1a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13557%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Polling%20System&amp;severity=medium&amp;id=692338cc77ebf6e86e4a9392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21923-cwe-426-untrusted-search-path-in-am-7f12f0a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21923%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20AMD%20AMD%20StoreMI%E2%84%A2&amp;severity=high&amp;id=692338cc77ebf6e86e4a938f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21922-cwe-426-untrusted-search-path-in-am-33b665c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21922%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20AMD%20AMD%20StoreMI%E2%84%A2&amp;severity=high&amp;id=692338cc77ebf6e86e4a938c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13556-sql-injection-in-campcodes-online-p-d425454f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13556%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Polling%20System&amp;severity=medium&amp;id=692336f877ebf6e86e4931d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13555-sql-injection-in-campcodes-school-f-3e1650f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13555%3A%20SQL%20Injection%20in%20Campcodes%20School%20File%20Management%20System&amp;severity=medium&amp;id=69232a874f4cb01c4da9aee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13554-sql-injection-in-campcodes-supplier-6cf20fdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13554%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=692330ff650f1bc966f5721e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13553-buffer-overflow-in-d-link-dwr-m920-19b8e301</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13553%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=69231653c2ed1a32d9e8f9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-first-autonomous-ai-cyberattack-why-saas-secur-c5bf2f7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20First%20Autonomous%20AI%20Cyberattack%3A%20Why%20SaaS%20Security%20Must%20Change&amp;severity=medium&amp;id=69230fc9237b8255a0386f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13552-buffer-overflow-in-d-link-dir-822k-4ad6c40a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13552%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=69230fc6237b8255a0386f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13551-buffer-overflow-in-d-link-dir-822k-fa75096a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13551%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=69230a5f237b8255a033933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-7-zip-vulnerability-with-public-exploit-r-52105bbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%207%20Zip%20Vulnerability%20With%20Public%20Exploit%20Requires%20Manual%20Update&amp;severity=critical&amp;id=6923053df051329c1a1f466f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13550-buffer-overflow-in-d-link-dir-822k-bf09d948</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13550%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6923054af051329c1a1f7d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13549-buffer-overflow-in-d-link-dir-822k-63c160aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13549%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6922fabcf051329c1a12556a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13548-buffer-overflow-in-d-link-dir-822k-a1baf005</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13548%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6922f42ae2031d6840968b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13547-memory-corruption-in-d-link-dir-822-525229cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13547%3A%20Memory%20Corruption%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6922eec9e2031d684090bbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yara-x-1100-release-fix-warnings-sun-nov-23rd-b06c4153</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YARA-X%201.10.0%20Release%3A%20Fix%20Warnings%2C%20(Sun%2C%20Nov%2023rd)&amp;severity=medium&amp;id=6922e728bbe41230bc1301a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-441-released-sun-nov-23rd-e2aebe1d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.4.1%20Released%2C%20(Sun%2C%20Nov%2023rd)&amp;severity=medium&amp;id=6922e728bbe41230bc1301a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13546-sql-injection-in-ashraf-kabir-trave-c023f406</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13546%3A%20SQL%20Injection%20in%20ashraf-kabir%20travel-agency&amp;severity=medium&amp;id=6922e3a8bbe41230bc0bab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-analysed-over-3-million-exposed-databases-using--0d31ed0c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20Analysed%20Over%203%20Million%20Exposed%20Databases%20Using%20Netlas&amp;severity=medium&amp;id=6922e029bbe41230bc056cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13545-sql-injection-in-ashraf-kabir-trave-e5099c7a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13545%3A%20SQL%20Injection%20in%20ashraf-kabir%20travel-agency&amp;severity=medium&amp;id=6922dcc7bbe41230bcffa4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13544-unrestricted-upload-in-ashraf-kabir-9cfb676e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13544%3A%20Unrestricted%20Upload%20in%20ashraf-kabir%20travel-agency&amp;severity=medium&amp;id=6922d024ff9e296518d8d20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-23-0f27826d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-23&amp;severity=medium&amp;id=6923a0dadfa0c74de886e41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/piecing-together-the-puzzle-a-qilin-ransomware-inv-a53b5462</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Piecing%20Together%20the%20Puzzle%3A%20A%20Qilin%20Ransomware%20Investigation&amp;severity=high&amp;id=6922409cc6e51a12697d89bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cox-enterprises-discloses-oracle-e-business-suite--bf811ba0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cox%20Enterprises%20discloses%20Oracle%20E-Business%20Suite%20data%20breach&amp;severity=high&amp;id=6922409cc6e51a12697d89b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt31-launches-stealthy-cyberattacks--77e7ae00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT31%20Launches%20Stealthy%20Cyberattacks%20on%20Russian%20IT%20Using%20Cloud%20Services&amp;severity=high&amp;id=6922409cc6e51a12697d89b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crowdstrike-fires-worker-over-insider-leak-to-scat-e93f5eb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrowdStrike%20Fires%20Worker%20Over%20Insider%20Leak%20to%20Scattered%20Lapsus%20Hunters&amp;severity=medium&amp;id=6921e21f6499b98ae6c2e321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt31-launches-stealthy-cyberattacks--744c9ac0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT31%20Launches%20Stealthy%20Cyberattacks%20on%20Russian%20IT%20Using%20Cloud%20Services&amp;severity=medium&amp;id=6921f3b332b9fb10dcdbb5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13526-cwe-200-exposure-of-sensitive-infor-c69efaff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13526%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20walterpinem%20OneClick%20Chat%20to%20Order&amp;severity=high&amp;id=69219bd9de5ac9d38c932d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nvidia-confirms-october-windows-updates-cause-gami-1f3b9082</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nvidia%20confirms%20October%20Windows%20updates%20cause%20gaming%20issues&amp;severity=high&amp;id=69218aa02d0b68805e12c79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-actively-exploited-critical-oracle-i-0e583bed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Actively%20Exploited%20Critical%20Oracle%20Identity%20Manager%20Zero-Day%20Vulnerability&amp;severity=critical&amp;id=69218aa02d0b68805e12c797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/matrix-push-c2-uses-browser-notifications-for-file-af10dc24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Matrix%20Push%20C2%20Uses%20Browser%20Notifications%20for%20Fileless%2C%20Cross-Platform%20Phishing%20Attacks&amp;severity=high&amp;id=69218aa02d0b68805e12c79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13318-cwe-862-missing-authorization-in-co-b89f94b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13318%3A%20CWE-862%20Missing%20Authorization%20in%20codepeople%20Booking%20Calendar%20Contact%20Form&amp;severity=medium&amp;id=692176e04ffda11ec247b4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13136-cwe-862-missing-authorization-in-we-c2151b1c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13136%3A%20CWE-862%20Missing%20Authorization%20in%20westerndeal%20GSheetConnector%20For%20Ninja%20Forms&amp;severity=medium&amp;id=692176e04ffda11ec247b4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12877-cwe-862-missing-authorization-in-th-b5113971</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12877%3A%20CWE-862%20Missing%20Authorization%20in%20faysal61%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=medium&amp;id=69216996633f6b6b24ab4788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12752-cwe-345-insufficient-verification-o-f97548b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12752%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20scottpaterson%20Subscriptions%20%26%20Memberships%20for%20PayPal&amp;severity=medium&amp;id=69216996633f6b6b24ab4783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13384-cwe-862-missing-authorization-in-co-a8aeb71d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13384%3A%20CWE-862%20Missing%20Authorization%20in%20codepeople%20CP%20Contact%20Form%20with%20PayPal&amp;severity=high&amp;id=69216996633f6b6b24ab4794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13317-cwe-862-missing-authorization-in-co-feb88ec8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13317%3A%20CWE-862%20Missing%20Authorization%20in%20codepeople%20Appointment%20Booking%20Calendar&amp;severity=medium&amp;id=69216996633f6b6b24ab478d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-actively-exploited-critical-oracle-i-f247f1c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Actively%20Exploited%20Critical%20Oracle%20Identity%20Manager%20Zero-Day%20Vulnerability&amp;severity=critical&amp;id=692197f8f26e99e45525990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11186-cwe-79-improper-neutralization-of-i-3017599a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11186%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20humanityco%20Cookie%20Notice%20%26%20Compliance%20for%20GDPR%20%2F%20CCPA&amp;severity=medium&amp;id=692146e5c842cd8eff6ede85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-22-8690a755</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-22&amp;severity=medium&amp;id=692251b6e19ebcc2d2e1e346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11933-cwe-20-improper-input-validation-in-3e97d985</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11933%3A%20CWE-20%20Improper%20Input%20Validation%20in%20wofSSL%20wolfSSL&amp;severity=low&amp;id=6920e83b27835fd566e7934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65947-cwe-400-uncontrolled-resource-consu-202f86ad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65947%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20jzeuzs%20thread-amount&amp;severity=high&amp;id=6920e83b27835fd566e7935a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-apt-c-26-lazarus-groups-attack-campaig-6e35fbec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20APT-C-26%20(Lazarus)%20Group&apos;s%20Attack%20Campaign%20Using%20Remote%20IT%20Disguise%20to%20Deploy%20Monitoring%20Software&amp;severity=medium&amp;id=6920e4b627835fd566e3a2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65946-cwe-77-improper-neutralization-of-s-2fc11be1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65946%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=6920e83b27835fd566e79355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65111-cwe-277-insecure-inherited-permissi-f28bfb4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65111%3A%20CWE-277%3A%20Insecure%20Inherited%20Permissions%20in%20authzed%20spicedb&amp;severity=low&amp;id=6920e4b727835fd566e3a362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65109-cwe-830-inclusion-of-web-functional-19ee3a38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65109%3A%20CWE-830%3A%20Inclusion%20of%20Web%20Functionality%20from%20an%20Untrusted%20Source%20in%20mindersec%20minder&amp;severity=high&amp;id=6920e16727835fd566e05955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65108-cwe-94-improper-control-of-generati-dced66f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65108%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20simonhaenisch%20md-to-pdf&amp;severity=critical&amp;id=6920e16727835fd566e0595a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65106-cwe-1336-improper-neutralization-of-60d52be5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65106%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20langchain-ai%20langchain&amp;severity=high&amp;id=6920de31ac1487f7bb25177e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65102-cwe-120-buffer-copy-without-checkin-d902ded3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65102%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=high&amp;id=6920de31ac1487f7bb251783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65092-cwe-125-out-of-bounds-read-in-espre-d1916e34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65092%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=6920de31ac1487f7bb25178a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0504-cwe-266-incorrect-privilege-assignme-514293b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0504%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Black%20Duck%20Black%20Duck%20SCA&amp;severity=medium&amp;id=6920de31ac1487f7bb251787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31216-an-attacker-with-physical-access-to-4be80ab9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31216%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20override%20managed%20Wi-Fi%20profiles%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=6920daacac1487f7bb20ab51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31266-a-website-may-be-able-to-spoof-the--b1d348fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31266%3A%20A%20website%20may%20be%20able%20to%20spoof%20the%20domain%20name%20in%20the%20title%20of%20a%20pop-up%20window%20in%20Apple%20Safari&amp;severity=medium&amp;id=6920daacac1487f7bb20ab5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43374-an-attacker-in-physical-proximity-m-cc0b4834</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43374%3A%20An%20attacker%20in%20physical%20proximity%20may%20be%20able%20to%20cause%20an%20out-of-bounds%20read%20in%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6920daacac1487f7bb20ab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31248-an-app-may-be-able-to-access-sensit-a6c285d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31248%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=6920daacac1487f7bb20ab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11087-cwe-352-cross-site-request-forgery--a2745dcc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11087%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zozothemes%20Zegen%20Core&amp;severity=high&amp;id=6920cd59d9b84775478ce89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13524-cwe-404-improper-resource-shutdown--f8c020d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13524%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20AWS%20Wickr&amp;severity=medium&amp;id=6920c6d9d9b8477547869881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36149-cwe-1021-improper-restriction-of-re-46ffb35f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36149%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20IBM%20IBM%20Concert%20Software&amp;severity=medium&amp;id=6920c3c04429ea99a572eb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48502-cwe-1285-improper-validation-of-spe-7eb8426f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48502%3A%20CWE-1285%20%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=6920b9ca4429ea99a5688864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62609-cwe-476-null-pointer-dereference-in-f877e22b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62609%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ml-explore%20mlx&amp;severity=medium&amp;id=6920b9ca4429ea99a5688867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62608-cwe-122-heap-based-buffer-overflow--01465f49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62608%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ml-explore%20mlx&amp;severity=medium&amp;id=6920b9ca4429ea99a568886a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62626-cwe-333-improper-handling-of-insuff-2503f37c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62626%3A%20CWE-333%20%20Improper%20Handling%20of%20Insufficient%20Entropy%20in%20TRNG%20in%20AMD%20AMD%20Ryzen%E2%84%A2%209000HX%20Series%20Processors&amp;severity=high&amp;id=6920b65f6ec873750a9f2a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64767-cwe-323-reusing-a-nonce-key-pair-in-186c6bb0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64767%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20dajiaji%20hpke-js&amp;severity=critical&amp;id=6920b65f6ec873750a9f2a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29934-cwe-459-incomplete-cleanup-in-amd-a-dd91a08d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29934%3A%20CWE-459%20%20Incomplete%20Cleanup%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=6920b65f6ec873750a9f2a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grafana-patches-cvss-100-scim-flaw-enabling-impers-8f83a03b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grafana%20Patches%20CVSS%2010.0%20SCIM%20Flaw%20Enabling%20Impersonation%20and%20Privilege%20Escalation&amp;severity=high&amp;id=6920a91de2e82c33851a87fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-rolls-back-cybersecurity-rules-for-telcos-desp-fc26eddd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20rolls%20back%20cybersecurity%20rules%20for%20telcos%2C%20despite%20state-hacking%20risks&amp;severity=medium&amp;id=6920a91ee2e82c33851a8802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crowdstrike-catches-insider-feeding-information-to-97861b31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrowdStrike%20catches%20insider%20feeding%20information%20to%20hackers&amp;severity=high&amp;id=6920a91de2e82c33851a87fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13132-cwe-1021-improper-restriction-of-re-36428c02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13132%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20Dia&amp;severity=high&amp;id=6920a952e2e82c33851aa18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64483-cwe-284-improper-access-control-in--c348a962</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64483%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wazuh%20wazuh-dashboard-plugins&amp;severity=medium&amp;id=6920a952e2e82c33851aa18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13470-cwe-330-use-of-insufficiently-rando-68969447</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13470%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Ribose%20RNP&amp;severity=high&amp;id=6920a035e2e82c338511ca88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/syncro-lovable-rat-delivery-via-ai-generated-websi-5440c7b8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Syncro%20%2B%20Lovable%3A%20RAT%20delivery%20via%20AI-generated%20websites%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69209d99d229a3709c4237c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sturnus-android-malware-reads-whatsapp-telegra-1240df11</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sturnus%20Android%20Malware%20Reads%20WhatsApp%2C%20Telegram%2C%20Signal%20Chats%20via%20Accessibility%20Abuse&amp;severity=medium&amp;id=69209a19d229a3709c3e2b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12973-cwe-434-unrestricted-upload-of-file-da6451f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12973%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20oc3dots%20S2B%20AI%20Assistant%20%E2%80%93%20ChatBot%2C%20AI%20Agents%2C%20ChatGPT%20API%2C%20Image%20Generator&amp;severity=high&amp;id=6920a035e2e82c338511ca92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-atm-jackpotting-whatsapp-nso-lawsuit-51951431</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20ATM%20Jackpotting%2C%20WhatsApp-NSO%20Lawsuit%20Continues%2C%20CISA%20Hiring&amp;severity=medium&amp;id=692088af0f995c4f64f0f590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-breach-gainsight-apps-on-salesforce-c-6f24af47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20Breach%20Gainsight%20Apps%20on%20Salesforce%2C%20Claim%20Data%20from%20Top%201000%20Firms&amp;severity=high&amp;id=692085360f995c4f64ece0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13357-cwe-1188-initialization-of-a-resour-82aa5381</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13357%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20HashiCorp%20Tooling&amp;severity=high&amp;id=6920823c0f995c4f64ea2855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tools-and-techniques-of-toddycat-apt-7ccd3269</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Tools%20and%20Techniques%20of%20ToddyCat%20APT&amp;severity=medium&amp;id=6920e4b627835fd566e3a2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41115-vulnerability-in-grafana-grafana-en-a6c59db4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41115%3A%20Vulnerability%20in%20Grafana%20Grafana%20Enterprise&amp;severity=critical&amp;id=6920778b69daa88a9a1ad75d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13432-cwe-863-incorrect-authorization-in--9497e98e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13432%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20HashiCorp%20Terraform%20Enterprise&amp;severity=medium&amp;id=6920778b69daa88a9a1ad75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-oracle-identity-manager-flaw-possibly-exp-230f24ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Oracle%20Identity%20Manager%20Flaw%20Possibly%20Exploited%20as%20Zero-Day&amp;severity=critical&amp;id=69206eca40c35a606131d6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11127-cwe-639-authorization-bypass-throug-fc25013c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11127%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mstoreapp%20Mobile%20App&amp;severity=critical&amp;id=69206ee440c35a606131e66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sliver-c2-vulnerability-enables-attack-on-c2-opera-a2756876</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sliver%20C2%20vulnerability%20enables%20attack%20on%20C2%20operators%20through%20insecure%20Wireguard%20network&amp;severity=medium&amp;id=692067d040c35a60612a111d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-brings-airdrop-compatibility-to-androids-qu-34cc82be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Brings%20AirDrop%20Compatibility%20to%20Android%E2%80%99s%20Quick%20Share%20Using%20Rust-Hardened%20Security&amp;severity=low&amp;id=6920e0aaac1487f7bb280f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66115-improper-control-of-filename-for-in-8db6ce53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66115%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20MatrixAddons%20Easy%20Invoice&amp;severity=medium&amp;id=69205c34c36be036e6ff2a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66114-missing-authorization-in-theme-fund-83ea93dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66114%3A%20Missing%20Authorization%20in%20theme%20funda%20Show%20Variations%20as%20Single%20Products%20Woocommerce&amp;severity=medium&amp;id=69205c33c36be036e6ff27c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66113-missing-authorization-in-themeateli-9ed7407e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66113%3A%20Missing%20Authorization%20in%20ThemeAtelier%20Better%20Chat%20Support%20for%20Messenger&amp;severity=medium&amp;id=69205c33c36be036e6ff27c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66112-missing-authorization-in-webtoffee--8fdac7a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66112%3A%20Missing%20Authorization%20in%20WebToffee%20Accessibility%20Toolkit%20by%20WebYes&amp;severity=medium&amp;id=69205c33c36be036e6ff27c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66111-improper-neutralization-of-input-du-dc8d328e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66111%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nelio%20Software%20Nelio%20Popups&amp;severity=medium&amp;id=69205c33c36be036e6ff27bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66110-missing-authorization-in-bplugins-t-bc59da05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66110%3A%20Missing%20Authorization%20in%20bPlugins%20Tiktok%20Feed&amp;severity=medium&amp;id=69205c33c36be036e6ff27ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66109-missing-authorization-in-octolize-c-bd300288</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66109%3A%20Missing%20Authorization%20in%20Octolize%20Shipping%20Plugins%20Cart%20Weight%20for%20WooCommerce&amp;severity=medium&amp;id=69205c33c36be036e6ff27b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66108-missing-authorization-in-merlot-dig-6d78b761</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66108%3A%20Missing%20Authorization%20in%20Merlot%20Digital%20(by%20TNC)%20TNC%20Toolbox%3A%20Web%20Performance&amp;severity=medium&amp;id=69205c33c36be036e6ff27b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66107-missing-authorization-in-scott-pate-990b8a9a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66107%3A%20Missing%20Authorization%20in%20Scott%20Paterson%20Subscriptions%20%26%20Memberships%20for%20PayPal&amp;severity=medium&amp;id=69205c33c36be036e6ff27b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66106-missing-authorization-in-essential--46a7d63f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66106%3A%20Missing%20Authorization%20in%20Essential%20Plugin%20Featured%20Post%20Creative&amp;severity=medium&amp;id=69205c33c36be036e6ff27ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66101-missing-authorization-in-sabuj-kund-2e9fe0ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66101%3A%20Missing%20Authorization%20in%20Sabuj%20Kundu%20CBX%20Bookmark%20%26%20Favorite&amp;severity=medium&amp;id=69205c33c36be036e6ff27ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66099-missing-authorization-in-themeateli-0357207f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66099%3A%20Missing%20Authorization%20in%20ThemeAtelier%20Chat%20Help&amp;severity=medium&amp;id=69205c31c36be036e6ff2770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66098-improper-neutralization-of-input-du-254f8772</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Camille%20V%20Travelers&apos;%20Map&amp;severity=medium&amp;id=69205c31c36be036e6ff276d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66097-cross-site-request-forgery-csrf-in--f3d2fb93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66097%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Igor%20Jerosimi%C4%87%20I%20Order%20Terms&amp;severity=medium&amp;id=69205c31c36be036e6ff276a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66096-missing-authorization-in-imtiaz-ray-3d1e4901</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66096%3A%20Missing%20Authorization%20in%20Imtiaz%20Rayhan%20Table%20Block%20by%20Tableberg&amp;severity=medium&amp;id=69205c31c36be036e6ff2767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66095-improper-neutralization-of-special--3bc15538</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66095%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Iqonic%20Design%20KiviCare&amp;severity=medium&amp;id=69205c31c36be036e6ff2764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66093-improper-neutralization-of-input-du-0b9e6f44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66093%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20Extensions%20for%20Leaflet%20Map&amp;severity=medium&amp;id=69205c31c36be036e6ff2761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66092-improper-neutralization-of-input-du-4e40bb13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bqworks%20Accordion%20Slider&amp;severity=medium&amp;id=69205c31c36be036e6ff275e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66091-improper-neutralization-of-input-du-a7736fcf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Design%20Stylish%20Cost%20Calculator&amp;severity=medium&amp;id=69205c31c36be036e6ff275b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66090-improper-neutralization-of-input-du-9d4c6df5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Skill%20Bar&amp;severity=medium&amp;id=69205c31c36be036e6ff2758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66089-missing-authorization-in-webtoffee--d8a32048</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66089%3A%20Missing%20Authorization%20in%20WebToffee%20Product%20Feed%20for%20WooCommerce&amp;severity=medium&amp;id=69205c31c36be036e6ff2755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66087-missing-authorization-in-property-h-de64c116</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66087%3A%20Missing%20Authorization%20in%20Property%20Hive%20PropertyHive&amp;severity=medium&amp;id=69205c30c36be036e6ff273f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66086-missing-authorization-in-cozy-visio-c54fe459</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66086%3A%20Missing%20Authorization%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=medium&amp;id=69205c30c36be036e6ff273c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66085-missing-authorization-in-tychesoftw-51770505</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66085%3A%20Missing%20Authorization%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=medium&amp;id=69205c30c36be036e6ff2739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66084-missing-authorization-in-shahjahan--7c1015fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66084%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20FluentCommunity&amp;severity=medium&amp;id=69205c30c36be036e6ff2736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66083-missing-authorization-in-magepeople-c91a254d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66083%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69205c30c36be036e6ff2733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66082-missing-authorization-in-magepeople-5b92adfa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66082%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69205c30c36be036e6ff2730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66081-improper-neutralization-of-input-du-a12af44c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66081%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeff%20Starr%20Head%20Meta%20Data&amp;severity=medium&amp;id=69205c30c36be036e6ff272d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66079-missing-authorization-in-jegstudio--a0dba2dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66079%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse%20Form&amp;severity=medium&amp;id=69205c30c36be036e6ff272a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66077-missing-authorization-in-wpwax-lega-820db950</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66077%3A%20Missing%20Authorization%20in%20wpWax%20Legal%20Pages&amp;severity=medium&amp;id=69205c30c36be036e6ff2727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66075-missing-authorization-in-wp-legal-p-561babd1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66075%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=medium&amp;id=69205c30c36be036e6ff2724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66073-deserialization-of-untrusted-data-i-43a58f67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66073%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cozmoslabs%20WP%20Webhooks&amp;severity=medium&amp;id=69205c2fc36be036e6ff270e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66072-missing-authorization-in-stiofan-us-eae83e9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66072%3A%20Missing%20Authorization%20in%20Stiofan%20UsersWP&amp;severity=critical&amp;id=69205c2fc36be036e6ff270b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66071-missing-authorization-in-tychesoftw-4fc0ab35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66071%3A%20Missing%20Authorization%20in%20tychesoftwares%20Custom%20Order%20Numbers%20for%20WooCommerce&amp;severity=medium&amp;id=69205c2fc36be036e6ff2708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66069-missing-authorization-in-themeisle--ce99c8fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66069%3A%20Missing%20Authorization%20in%20Themeisle%20PPOM%20for%20WooCommerce&amp;severity=medium&amp;id=69205c2ec36be036e6ff2705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66067-improper-neutralization-of-input-du-215807dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66067%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aman%20Funnel%20Builder%20by%20FunnelKit&amp;severity=medium&amp;id=69205c2ec36be036e6ff2702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66066-improper-neutralization-of-input-du-66cbe8a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66066%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EnvoThemes%20Envo%20Extra&amp;severity=medium&amp;id=69205c2ec36be036e6ff26ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66065-missing-authorization-in-jegstudio--6cfef704</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66065%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse&amp;severity=medium&amp;id=69205c2ec36be036e6ff26fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66064-cross-site-request-forgery-csrf-in--a229181d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66064%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Giveaways%20and%20Contests%20by%20RafflePress&amp;severity=medium&amp;id=69205c2ec36be036e6ff26f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66063-missing-authorization-in-jgwhite33--0d43e325</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66063%3A%20Missing%20Authorization%20in%20jgwhite33%20WP%20Google%20Review%20Slider&amp;severity=medium&amp;id=69205c2ec36be036e6ff26f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66062-url-redirection-to-untrusted-site-o-a1f1394e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66062%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Frank%20Goossens%20WP%20YouTube%20Lyte&amp;severity=low&amp;id=69205c2ec36be036e6ff26f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66061-cross-site-request-forgery-csrf-in--452dd78d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66061%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69205c2dc36be036e6ff26dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66060-missing-authorization-in-craig-hewi-d67dd67f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66060%3A%20Missing%20Authorization%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69205c2dc36be036e6ff26da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66059-exposure-of-sensitive-system-inform-6395ecac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66059%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69205c2dc36be036e6ff26d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66057-improper-neutralization-of-input-du-7d6057af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=69205c2dc36be036e6ff26d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66056-exposure-of-sensitive-system-inform-2fb45be5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66056%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Uncanny%20Owl%20Uncanny%20Automator&amp;severity=medium&amp;id=69205c2dc36be036e6ff26d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66055-deserialization-of-untrusted-data-i-59d5ebe4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66055%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Icegram%20Email%20Subscribers%20%26%20Newsletters&amp;severity=high&amp;id=69205c2dc36be036e6ff26ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66053-improper-neutralization-of-input-du-4c15e8bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kriesi%20Enfold&amp;severity=medium&amp;id=69205c2dc36be036e6ff26cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10039-cwe-639-authorization-bypass-throug-84c10025</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10039%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=69205c2dc36be036e6ff26bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12935-cwe-79-improper-neutralization-of-i-847bccf5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12935%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20FluentCRM%20%E2%80%93%20Email%20Newsletter%2C%20Automation%2C%20Email%20Marketing%2C%20Email%20Campaigns%2C%20Optins%2C%20Leads%2C%20and%20CRM%20Solution&amp;severity=medium&amp;id=69205c2dc36be036e6ff26c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10054-cwe-862-missing-authorization-in-el-b3f23475</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10054%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=69205c2dc36be036e6ff26c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-patches-high-severity-flaws-in-firewalls-aeda4c7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Patches%20High-Severity%20Flaws%20in%20Firewalls%2C%20Email%20Security%20Appliance&amp;severity=high&amp;id=69205c10c36be036e6ff0e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-cyberspies-deploy-badaudio-malware-via-sup-4f8a0874</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Cyberspies%20Deploy%20%E2%80%98BadAudio%E2%80%99%20Malware%20via%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=692051051a6f98a3eddd2992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/squarex-and-perplexity-quarrel-over-alleged-comet--87b376dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SquareX%20and%20Perplexity%20Quarrel%20Over%20Alleged%20Comet%20Browser%20Vulnerability&amp;severity=medium&amp;id=69204a061a6f98a3edd419e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt24-deploys-badaudio-in-years-long-espionage-hit-e8f1feb7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT24%20Deploys%20BADAUDIO%20in%20Years-Long%20Espionage%20Hitting%20Taiwan%20and%201%2C000%2B%20Domains&amp;severity=medium&amp;id=6920e0aaac1487f7bb280f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/use-of-css-stuffing-as-an-obfuscation-techniquex3f-ee608ee6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%26%23x3f%3B%2C%20(Fri%2C%20Nov%2021st)&amp;severity=medium&amp;id=69203653b6fc887540a4b876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-instances-hacked-via-gainsight-integrat-e4ef3f90</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Instances%20Hacked%20via%20Gainsight%20Integrations&amp;severity=medium&amp;id=69203643b6fc887540a4a8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12750-cwe-89-improper-neutralization-of-s-f4dd2363</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12750%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20trainingbusinesspros%20Groundhogg%20%E2%80%94%20CRM%2C%20Newsletters%2C%20and%20Marketing%20Automation&amp;severity=medium&amp;id=692032ceb6fc887540a02d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12160-cwe-79-improper-neutralization-of-i-d593386d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12160%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nmedia%20Simple%20User%20Registration&amp;severity=high&amp;id=692032ceb6fc887540a02d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12066-cwe-79-improper-neutralization-of-i-084c93a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12066%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20etruel%20WP%20Delete%20Post%20Copies&amp;severity=medium&amp;id=692032ceb6fc887540a02d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12964-cwe-79-improper-neutralization-of-i-7e9b5e87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12964%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nalam-1%20Magical%20Shop%20Builder%20%E2%80%93%20WooCommerce%20Template%20Builder%20for%20Elementor%20%7C%20Shop%2C%20Cart%2C%20Checkout%20%26%20Product%20Page%20Builder&amp;severity=medium&amp;id=692032ceb6fc887540a02d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13138-cwe-89-improper-neutralization-of-s-1166d4c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13138%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=high&amp;id=692032ceb6fc887540a02d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13156-cwe-434-unrestricted-upload-of-file-9f39b926</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13156%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20appsbd%20Vitepos%20%E2%80%93%20Point%20of%20Sale%20(POS)%20for%20WooCommerce&amp;severity=high&amp;id=69202539cf2d47c3899a7b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11808-cwe-79-improper-neutralization-of-i-c839f951</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antiochinteractive%20Shortcode%20for%20Google%20Street%20View&amp;severity=medium&amp;id=69202539cf2d47c3899a7b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13141-cwe-79-improper-neutralization-of-i-33e6250d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13141%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%20%26%20Template%20Builder&amp;severity=medium&amp;id=69202539cf2d47c3899a7b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13149-cwe-862-missing-authorization-in-pu-36d21510</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13149%3A%20CWE-862%20Missing%20Authorization%20in%20publishpress%20Schedule%20Post%20Changes%20With%20PublishPress%20Future%3A%20Unpublish%2C%20Delete%2C%20Change%20Status%2C%20Trash%2C%20Change%20Categories&amp;severity=medium&amp;id=69202539cf2d47c3899a7b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11826-cwe-79-improper-neutralization-of-i-30c4f59f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdeleasa%20WP%20Company%20Info&amp;severity=medium&amp;id=69202539cf2d47c3899a7b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11973-cwe-73-external-control-of-file-nam-4f7c3166</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11973%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path&amp;severity=medium&amp;id=69202539cf2d47c3899a7b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12039-cwe-200-exposure-of-sensitive-infor-0c5b085f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12039%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20devsmip%20BigBuy%20Dropshipping%20Connector%20for%20WooCommerce&amp;severity=medium&amp;id=69202539cf2d47c3899a7b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11803-cwe-79-improper-neutralization-of-i-e1ddfab2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpfanyi%20WPSite%20Shortcode&amp;severity=medium&amp;id=69202539cf2d47c3899a7b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sec-drops-solarwinds-case-after-years-of-high-stak-d3107cc7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEC%20Drops%20SolarWinds%20Case%20After%20Years%20of%20High-Stakes%20Cybersecurity%20Scrutiny&amp;severity=high&amp;id=69201f0fdd76cb6d6068c37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11800-cwe-79-improper-neutralization-of-i-c58ea578</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20MiniCRM%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11985-cwe-862-missing-authorization-in-no-920ac29d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11985%3A%20CWE-862%20Missing%20Authorization%20in%20nootheme%20Realty%20Portal&amp;severity=high&amp;id=69202359cf2d47c38997b49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11802-cwe-79-improper-neutralization-of-i-c1c6185e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bartboy011%20Bulma%20Shortcodes&amp;severity=medium&amp;id=69202359cf2d47c38997b48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11773-cwe-862-missing-authorization-in-be-9b3a3559</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11773%3A%20CWE-862%20Missing%20Authorization%20in%20beycanpress%20Cryptocurrency%20(Token)%2C%20Launchpad%20(Presale)%2C%20ICO%20%26%20IDO%2C%20Airdrop%20by%20TokenICO&amp;severity=medium&amp;id=69202359cf2d47c38997b47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11763-cwe-79-improper-neutralization-of-i-54900776</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11763%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustybadrobot%20Display%20Pages%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13135-cwe-79-improper-neutralization-of-i-0ddcdf2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20integrationshotelrunner%20HotelRunner%20Booking%20Widget&amp;severity=medium&amp;id=6920235bcf2d47c38997b54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11764-cwe-79-improper-neutralization-of-i-bcba4791</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11764%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fastmover%20Shortcodes%20Bootstrap&amp;severity=medium&amp;id=69202359cf2d47c38997b3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10938-cwe-862-missing-authorization-in-ad-8a296093</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10938%3A%20CWE-862%20Missing%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69202359cf2d47c38997b37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11771-cwe-306-missing-authentication-for--d1b76c82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11771%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20beycanpress%20Cryptocurrency%20(Token)%2C%20Launchpad%20(Presale)%2C%20ICO%20%26%20IDO%2C%20Airdrop%20by%20TokenICO&amp;severity=medium&amp;id=69202359cf2d47c38997b415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11003-cwe-862-missing-authorization-in-ad-7ef4beb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11003%3A%20CWE-862%20Missing%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69202359cf2d47c38997b394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11799-cwe-79-improper-neutralization-of-i-19d2ff0d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Affiliate%20AI%20Lite&amp;severity=medium&amp;id=69202359cf2d47c38997b482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11456-cwe-434-unrestricted-upload-of-file-923ed709</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11456%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=critical&amp;id=69202359cf2d47c38997b3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12881-cwe-639-authorization-bypass-throug-9d9ee48c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12881%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpswings%20Return%20Refund%20and%20Exchange%20For%20WooCommerce&amp;severity=medium&amp;id=6920235bcf2d47c38997b542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11815-cwe-285-improper-authorization-in-a-9e096e51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11815%3A%20CWE-285%20Improper%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69202359cf2d47c38997b493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13159-cwe-79-improper-neutralization-of-i-5ba765cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13159%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flothemesplugins%20Flo%20Forms%20%E2%80%93%20Easy%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=6920235bcf2d47c38997b556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13134-cwe-352-cross-site-request-forgery--11ecc19e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13134%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20powerblogservice%20AuthorSure&amp;severity=medium&amp;id=6920235bcf2d47c38997b54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12135-cwe-79-improper-neutralization-of-i-6092e1b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20WPBookit&amp;severity=high&amp;id=69202359cf2d47c38997b4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11885-cwe-79-improper-neutralization-of-i-7a152037</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itvn9online%20EchBay%20Admin%20Security&amp;severity=medium&amp;id=69202359cf2d47c38997b498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13142-cwe-352-cross-site-request-forgery--521d21e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13142%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20farvehandleren%20Custom%20Post%20Type&amp;severity=medium&amp;id=6920235bcf2d47c38997b552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11768-cwe-79-improper-neutralization-of-i-442d6787</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11768%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20darto%20Islamic%20Phrases&amp;severity=medium&amp;id=69202359cf2d47c38997b3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11770-cwe-79-improper-neutralization-of-i-c3cf1952</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20billybigpotatoes%20BrightTALK%20WordPress%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11767-cwe-79-improper-neutralization-of-i-53a51c1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fpcorso%20Tips%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12894-cwe-552-files-or-directories-access-407703ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12894%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20jcollings%20Import%20WP%20%E2%80%93%20Export%20and%20Import%20CSV%20and%20XML%20files%20to%20WordPress&amp;severity=medium&amp;id=6920235bcf2d47c38997b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11801-cwe-79-improper-neutralization-of-i-d3a7ab57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidangel%20AudioTube&amp;severity=medium&amp;id=69202359cf2d47c38997b48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12138-cwe-434-unrestricted-upload-of-file-e6be311b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12138%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bww%20URL%20Image%20Importer&amp;severity=high&amp;id=6920235bcf2d47c38997b52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11765-cwe-79-improper-neutralization-of-i-bbab4592</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20developdaly%20Stock%20Tools&amp;severity=medium&amp;id=69202359cf2d47c38997b3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12170-cwe-862-missing-authorization-in-ba-650de3bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12170%3A%20CWE-862%20Missing%20Authorization%20in%20bandido%20Checkbox&amp;severity=medium&amp;id=6920235bcf2d47c38997b534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12086-cwe-639-authorization-bypass-throug-dc0de6dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12086%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpswings%20Return%20Refund%20and%20Exchange%20For%20WooCommerce&amp;severity=medium&amp;id=69202359cf2d47c38997b4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12661-cwe-79-improper-neutralization-of-i-4a6b7d30</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12661%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qzzr%20Pollcaster%20Shortcode%20Plugin&amp;severity=medium&amp;id=6920235bcf2d47c38997b53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13322-cwe-73-external-control-of-file-nam-7fd7d276</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13322%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20husainali52%20WP%20AUDIO%20GALLERY&amp;severity=high&amp;id=6920235bcf2d47c38997b878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12660-cwe-79-improper-neutralization-of-i-270ea890</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12660%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coffeebite%20Padlet%20Shortcode&amp;severity=medium&amp;id=6920235bcf2d47c38997b538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64695-uncontrolled-search-path-element-in-70cf3f5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64695%3A%20Uncontrolled%20Search%20Path%20Element%20in%20LogStare%20Inc.%20Installer%20of%20LogStare%20Collector%20(for%20Windows)&amp;severity=high&amp;id=6920092a04dd2c5f9994c018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64299-insertion-of-sensitive-information--87b3d590</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64299%3A%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62687-cross-site-request-forgery-csrf-in--30ce278f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62687%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62189-incorrect-authorization-in-logstare-250232df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62189%3A%20Incorrect%20authorization%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61949-cross-site-scripting-xss-in-logstar-a04b6441</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61949%3A%20Cross-site%20scripting%20(XSS)%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58097-incorrect-default-permissions-in-lo-cad12027</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58097%3A%20Incorrect%20default%20permissions%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13499-cwe-824-access-of-uninitialized-poi-dde9f5a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13499%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=692005a604dd2c5f9990df0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12169-cwe-862-missing-authorization-in-el-034b949f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12169%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12022-cwe-862-missing-authorization-in-el-342a8da7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12022%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12085-cwe-862-missing-authorization-in-el-ee14e70f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12085%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12023-cwe-862-missing-authorization-in-el-d20d54a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12023%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11368-cwe-200-exposure-of-sensitive-infor-313b2bf8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11368%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=691ffc17a535ade79490ffb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-flags-unauthorized-data-access-via-gain-38c13911</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Flags%20Unauthorized%20Data%20Access%20via%20Gainsight-Linked%20OAuth%20Activity&amp;severity=medium&amp;id=69200b7904dd2c5f999794b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reoccurring-use-of-highly-suspicious-pdf-editors-t-c6459ebc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reoccurring%20Use%20of%20Highly%20Suspicious%20PDF%20Editors%20to%20Infiltrate%20Environments&amp;severity=medium&amp;id=692032cfb6fc887540a02d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64310-improper-restriction-of-excessive-a-919b7551</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64310%3A%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20SEIKO%20EPSON%20CORPORATION%20EPSON%20WebConfig%20for%20SEIKO%20EPSON%20Projector%20Products&amp;severity=critical&amp;id=691fd59470da09562fab65e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/its-not-personal-its-just-business-fa23a3e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=It&apos;s%20not%20personal%2C%20it&apos;s%20just%20business&amp;severity=medium&amp;id=692032cfb6fc887540a02d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64762-cwe-524-use-of-cache-containing-sen-e4c820e8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64762%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20workos%20authkit-nextjs&amp;severity=high&amp;id=691fc3ff70da09562fa7fca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62372-cwe-129-improper-validation-of-arra-e03484d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62372%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20vllm-project%20vllm&amp;severity=high&amp;id=691fc3ff70da09562fa7fc94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62426-cwe-770-allocation-of-resources-wit-efc9cb1e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62426%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=691fc3ff70da09562fa7fc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62164-cwe-20-improper-input-validation-in-b2b9032c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62164%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vllm-project%20vllm&amp;severity=high&amp;id=691fc3ff70da09562fa7fc8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64755-cwe-78-improper-neutralization-of-s-ff3ccb17</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64755%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=691fc3ff70da09562fa7fca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/4-people-indicted-in-alleged-conspiracy-to-smuggle-cc35ec9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=4%20People%20Indicted%20in%20Alleged%20Conspiracy%20to%20Smuggle%20Supercomputers%20and%20Nvidia%20Chips%20to%20China&amp;severity=high&amp;id=691fb5f870da09562f99df09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/esbuild-xss-bug-that-survived-5b-downloads-and-byp-7278ec6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Esbuild%20XSS%20Bug%20That%20Survived%205B%20Downloads%20and%20Bypassed%20HTML%20Sanitization&amp;severity=medium&amp;id=691fac729bfed6bde22cd559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13485-sql-injection-in-itsourcecode-onlin-7a44a97d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13485%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20File%20Management%20System&amp;severity=medium&amp;id=691fac6e9bfed6bde22c976d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-21-9c6abe4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-21&amp;severity=medium&amp;id=6920fe842cd4adea235208d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13484-cross-site-scripting-in-campcodes-c-9da2aea1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13484%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=691f98772b54a79d3490b338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62459-cwe-79-improper-neutralization-of-i-206ca234</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62459%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20365%20Defender%20Portal&amp;severity=high&amp;id=691f98772b54a79d3490b348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64660-cwe-284-improper-access-control-in--7ee6959a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64660%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=691f98772b54a79d3490b34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62207-cwe-918-server-side-request-forgery-eddd1b15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62207%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Monitor%20Control%20Service&amp;severity=high&amp;id=691f98772b54a79d3490b345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49752-cwe-294-authentication-bypass-by-ca-8a434aea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49752%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Microsoft%20Azure%20Bastion%20Developer&amp;severity=critical&amp;id=691f98772b54a79d3490b33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59245-cwe-502-deserialization-of-untruste-ba16b807</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59245%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Online&amp;severity=critical&amp;id=691f98772b54a79d3490b342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64655-cwe-285-improper-authorization-in-m-10e45e90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64655%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Dynamics%20OmniChannel%20SDK%20Storage%20Containers&amp;severity=high&amp;id=691f98772b54a79d3490b34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hacking-suspect-wanted-by-the-fbi-arrested-4c63be64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hacking%20Suspect%20Wanted%20by%20the%20FBI%20Arrested%20on%20Thai%20Resort%20Island&amp;severity=medium&amp;id=691f94ed2b54a79d348a2980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-tsundere-botnet-uses-the-ethereum-blockchain-t-aff761df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Tsundere%20botnet%20uses%20the%20Ethereum%20blockchain%20to%20infect%20its%20targets&amp;severity=medium&amp;id=692032cfb6fc887540a02d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36072-cwe-502-deserialization-of-untruste-75722675</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36072%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20webMethods%20Integration&amp;severity=high&amp;id=691f95052b54a79d348a4b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-to-steal-23tb-data-from-italian-rail-dd707b7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20claims%20to%20steal%202.3TB%20data%20from%20Italian%20rail%20group%2C%20Almavia&amp;severity=high&amp;id=691f8f07b342c1dca41c2e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13087-cwe-78-improper-neutralization-of-s-1349e98f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13087%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Opto22%20GRV-EPIC-PR1&amp;severity=high&amp;id=691f8b86b342c1dca4180130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36153-cwe-79-improper-neutralization-of-i-bfa12b3a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36153%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f880cb342c1dca413b0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36158-cwe-674-uncontrolled-recursion-in-i-9f563568</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36158%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f880cb342c1dca413b0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36159-cwe-117-improper-output-neutralizat-cae66a92</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36159%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f880cb342c1dca413b0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36160-cwe-497-exposure-of-sensitive-syste-c6a0b0b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36160%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f85874f1c50aa2eb92647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62674-cwe-306-in-icam365-p201-9230f076</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62674%3A%20CWE-306%20in%20iCam365%20P201&amp;severity=high&amp;id=691f7e7c4f1c50aa2eb161a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-investigates-customer-data-theft-via-ga-e918966a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20investigates%20customer%20data%20theft%20via%20Gainsight%20breach&amp;severity=high&amp;id=691f7b004f1c50aa2eacb308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tsundere-botnet-expands-using-game-lures-and-ether-418d1a6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tsundere%20Botnet%20Expands%20Using%20Game%20Lures%20and%20Ethereum-Based%20C2%20on%20Windows&amp;severity=high&amp;id=691f7b004f1c50aa2eacb30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-exploits-unpatched-ray-flaw-to-build--c863b3a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%20Exploits%20Unpatched%20Ray%20Flaw%20to%20Build%20Self-Spreading%20GPU%20Cryptomining%20Botnet&amp;severity=high&amp;id=691f7a1328b41f27b440ffba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64770-cwe-306-in-icam365-p201-290be593</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64770%3A%20CWE-306%20in%20iCam365%20P201&amp;severity=high&amp;id=691f7c954f1c50aa2eb03748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unquoted-paths-the-decades-old-windows-flaw-still--cac45693</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unquoted%20Paths%3A%20The%20Decades-Old%20Windows%20Flaw%20Still%20Enabling%20Hidden%20Code%20Execution&amp;severity=medium&amp;id=691f731228b41f27b438ba43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivot-to-multi-vector-attacks-d8f8f213</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT24%20%20Pivot%20to%20Multi-Vector%20Attacks&amp;severity=medium&amp;id=691f8f1ab342c1dca41c3372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-banking-malware-bypassing-whatsapp-telegram-26d7c0ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20Banking%20Malware%20bypassing%20WhatsApp%2C%20Telegram%20and%20Signal%20Encryption&amp;severity=medium&amp;id=691f8f1ab342c1dca41c339a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-compromise-leads-to-astaroth-deployment-c169a524</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20compromise%20leads%20to%20Astaroth%20deployment&amp;severity=medium&amp;id=691f9295b342c1dca420b6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35029-cwe-79-improper-neutralization-of-i-f94da58c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35029%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=low&amp;id=691f6f9228b41f27b434758d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52668-vulnerability-in-revive-revive-adse-9f5231f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52668%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=691f6d0640b920e270875290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48986-vulnerability-in-revive-revive-adse-4091652c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48986%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=691f6d0640b920e270875284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48987-vulnerability-in-revive-revive-adse-4dcfc783</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48987%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0640b920e270875287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55123-vulnerability-in-revive-revive-adse-567d7ded</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55123%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=691f6d0640b920e27087529c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52671-vulnerability-in-revive-revive-adse-b47f1c79</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52671%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0640b920e270875299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52666-vulnerability-in-revive-revive-adse-730a1f46</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52666%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=691f6d0640b920e27087528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52669-vulnerability-in-revive-revive-adse-0a553568</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52669%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0640b920e270875293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55124-vulnerability-in-revive-revive-adse-af3710ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55124%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0840b920e2708759af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52670-vulnerability-in-revive-revive-adse-40057dbb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52670%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=691f6d0640b920e270875296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52667-vulnerability-in-revive-revive-adse-191b55af</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52667%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=691f6d0640b920e27087528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55126-vulnerability-in-revive-revive-adse-ba3497a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55126%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f698540b920e2708380dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55127-vulnerability-in-revive-revive-adse-b99c2e3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55127%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f698540b920e2708380e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55128-vulnerability-in-revive-revive-adse-53c4fddf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55128%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f698540b920e2708380e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10571-cwe-288-authentication-bypass-using-44a6782d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10571%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ABB%20ABB%20Ability%20Edgenius&amp;severity=critical&amp;id=691f5c4ce672cd9080e8d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64524-cwe-122-heap-based-buffer-overflow--fbfe4378</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64524%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OpenPrinting%20cups-filters&amp;severity=low&amp;id=691f58cde672cd9080e446f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-says-it-breached-brazilian-ener-ae22f401</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Says%20It%20Breached%20Brazilian%20Energy%20Giant%20Petrobras&amp;severity=high&amp;id=691f58bee672cd9080e41a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tv-streaming-piracy-service-with-26m-yearly-visits-fe8c606f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TV%20streaming%20piracy%20service%20with%2026M%20yearly%20visits%20shut%20down&amp;severity=high&amp;id=691f515438b88f02b51b9979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-the-watering-hole-apt24s-pivot-to-multi-vec-43e857b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20the%20Watering%20Hole%3A%20APT24&apos;s%20Pivot%20to%20Multi-Vector%20Attacks&amp;severity=medium&amp;id=691f515438b88f02b51b9981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/d-link-warns-of-new-rce-flaws-in-end-of-life-dir-8-62328988</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=D-Link%20warns%20of%20new%20RCE%20flaws%20in%20end-of-life%20DIR-878%20routers&amp;severity=high&amp;id=691f515438b88f02b51b9975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-exploits-unpatched-ray-flaw-to-build--0d0ab054</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%20Exploits%20Unpatched%20Ray%20Flaw%20to%20Build%20Self-Spreading%20GPU%20Cryptomining%20Botnet&amp;severity=medium&amp;id=691fbbd770da09562fa00949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-bc3b45df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SonicWall%20SonicOS%20flaw%20allows%20hackers%20to%20crash%20firewalls&amp;severity=high&amp;id=691f515438b88f02b51b997d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64185-cwe-277-insecure-inherited-permissi-14dc3335</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64185%3A%20CWE-277%3A%20Insecure%20Inherited%20Permissions%20in%20OSC%20ondemand&amp;severity=medium&amp;id=691f4b4ed2e902043d281088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tsundere-botnet-expands-using-game-lures-and-ether-79375339</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tsundere%20Botnet%20Expands%20Using%20Game%20Lures%20and%20Ethereum-Based%20C2%20on%20Windows&amp;severity=medium&amp;id=691fbbd770da09562fa0094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62724-cwe-61-unix-symbolic-link-symlink-f-b6e40ee0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62724%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20OSC%20ondemand&amp;severity=medium&amp;id=691f4e5838b88f02b5191673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-identity-manager-exploit-observation-from-s-9db45a40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Identity%20Manager%20Exploit%20Observation%20from%20September%20(CVE-2025-61757)%2C%20(Thu%2C%20Nov%2020th)&amp;severity=critical&amp;id=691fbca370da09562fa0bb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62709-cwe-640-weak-password-recovery-mech-2d2a4583</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62709%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=691f4e5838b88f02b519166f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13437-cwe-706-use-of-incorrectly-resolved-26af9fe3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13437%3A%20CWE-706%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Google%20zx&amp;severity=medium&amp;id=691f4446d2e902043d1f9194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62875-cwe-754-improper-check-for-unusual--80a44513</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62875%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20SUSE%20openSUSE%20Tumbleweed&amp;severity=medium&amp;id=691f3e06b661599aeb29272e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sturnus-banking-trojan-targets-whatsapp-telegr-6eb390b8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sturnus%20Banking%20Trojan%20Targets%20WhatsApp%2C%20Telegram%2C%20Signal%20Messages&amp;severity=medium&amp;id=691f36f1b661599aeb20cba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34320-cwe-22-improper-limitation-of-a-pat-c6ebdee7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34320%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BASIS%20International%20Ltd.%20BASIS%20BBj&amp;severity=critical&amp;id=691f3714b661599aeb20f31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13425-cwe-476-null-pointer-dereference-in-331e34da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13425%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Google%20OSV-SCALIBR&amp;severity=low&amp;id=691f3714b661599aeb20f317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36161-cwe-327-use-of-a-broken-or-risky-cr-dd3da164</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36161%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f3714b661599aeb20f31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nknshell-malware-distributed-via-vpn-website-d695fc0f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NKNShell%20Malware%20Distributed%20via%20VPN%20Website&amp;severity=medium&amp;id=691f9295b342c1dca420b6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/october-2025-infostealer-trend-report-4ba60ee9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=October%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=691f9295b342c1dca420b68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/october-2025-trends-report-on-phishing-emails-40cb846e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=October%202025%20Trends%20Report%20on%20Phishing%20Emails&amp;severity=medium&amp;id=691f9295b342c1dca420b6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-eternidade-stealer-spreads-via-whatsapp-to-ste-01415930</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Eternidade%20Stealer%20Spreads%20Via%20WhatsApp%20to%20Steal%20Banking%20and%20Crypto%20Data&amp;severity=medium&amp;id=691f1dd53e6177767e7f4ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0645-cwe-434-unrestricted-upload-of-file--48528534</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0645%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Narkom%20Communication%20and%20Software%20Technologies%20Trade%20Ltd.%20Co.%20Pyxis%20Signage&amp;severity=high&amp;id=691f1de63e6177767e7f6c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13469-cross-site-scripting-in-public-know-6dca8e08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13469%3A%20Cross%20Site%20Scripting%20in%20Public%20Knowledge%20Project%20omp&amp;severity=medium&amp;id=691f1de63e6177767e7f6c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13468-missing-authorization-in-sourcecode-93a30d17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13468%3A%20Missing%20Authorization%20in%20SourceCodester%20Alumni%20Management%20System&amp;severity=medium&amp;id=691f1a653e6177767e7adff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-50000-asus-routers-hacked-in-operation-wrthug-06ea9abd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2050%2C000%20Asus%20Routers%20Hacked%20in%20%E2%80%98Operation%20WrtHug%E2%80%99&amp;severity=medium&amp;id=691f1a473e6177767e7ac56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0643-cwe-79-improper-neutralization-of-in-05f21db9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Narkom%20Communication%20and%20Software%20Technologies%20Trade%20Ltd.%20Co.%20Pyxis%20Signage&amp;severity=high&amp;id=691f1a653e6177767e7adfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-and-allies-sanction-russian-bulletproof-hosting-02a9a3a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20and%20Allies%20Sanction%20Russian%20Bulletproof%20Hosting%20Service%20Providers&amp;severity=medium&amp;id=691f0ff063b28c178c82ff31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/comet-browser-flaw-lets-hidden-api-run-commands-on-6917801c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Comet%20Browser%20Flaw%20Lets%20Hidden%20API%20Run%20Commands%20on%20Users%E2%80%99%20Devices&amp;severity=medium&amp;id=691f0c7663b28c178c7eba58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-0-days-linkedin-spies-crypto-c-dea83a3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%200-Days%2C%20LinkedIn%20Spies%2C%20Crypto%20Crimes%2C%20IoT%20Flaws%20and%20New%20Malware%20Waves&amp;severity=medium&amp;id=691f158663b28c178c8a2615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40601-cwe-121-stack-based-buffer-overflow-6e3b704d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40601%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=691f0c8663b28c178c7ec081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40605-cwe-23-relative-path-traversal-in-s-8c5366d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40605%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20SonicWall%20Email%20Security&amp;severity=medium&amp;id=691f097d63b28c178c7c152c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40604-cwe-494-download-of-code-without-in-08dc3a3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40604%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20SonicWall%20Email%20Security&amp;severity=medium&amp;id=691f097d63b28c178c7c1528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eternidade-stealer-whatsapp-hijacking-for-banking--06dbe44a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eternidade%20Stealer%3A%20WhatsApp%20Hijacking%20for%20Banking%20Fraud&amp;severity=medium&amp;id=691f04a4d820e5151fbc3c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-allowed-scraping-of-35-billion-whats-58b86501</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20Allowed%20Scraping%20of%203.5%20Billion%20WhatsApp%20Accounts&amp;severity=low&amp;id=691f0488d820e5151fbc22be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctm360-exposes-a-global-whatsapp-hijacking-campaig-8ef1b943</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTM360%20Exposes%20a%20Global%20WhatsApp%20Hijacking%20Campaign%3A%20HackOnChat&amp;severity=medium&amp;id=691f158663b28c178c8a2618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sturnus-android-trojan-quietly-captures-encryp-4fcb76b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sturnus%20Android%20Trojan%20Quietly%20Captures%20Encrypted%20Chats%20and%20Hijacks%20Devices&amp;severity=medium&amp;id=691f158663b28c178c8a261b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-7-zip-vulnerability-exploited-in-attacks-0c66f025</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%207-Zip%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=691ef3b4961e3d19a6b1a017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12414-cwe-290-authentication-bypass-by-sp-bce1904b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12414%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Google%20Cloud%20Looker&amp;severity=critical&amp;id=691ef03b961e3d19a6aa6309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tamperedchef-malware-spreads-via-fake-software-ins-70f04923</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TamperedChef%20Malware%20Spreads%20via%20Fake%20Software%20Installers%20in%20Ongoing%20Global%20Campaign&amp;severity=high&amp;id=691eea8e6e8172836e888023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-mapped-ship-ais-data-days-befo-da81040c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Mapped%20Ship%20AIS%20Data%20Days%20Before%20Real-World%20Missile%20Strike%20Attempt&amp;severity=high&amp;id=691eea8e6e8172836e888027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cooking-up-trouble-how-tamperedchef-uses-signed-ap-137b3209</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cooking%20up%20trouble%3A%20How%20TamperedChef%20uses%20signed%20apps%20to%20deliver%20stealthy%20payloads&amp;severity=medium&amp;id=691ee3886e8172836e79b641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11676-cwe-20-improper-input-validation-in-3eefe3e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11676%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20System%20Inc.%20TL-WR940N%20V6&amp;severity=high&amp;id=691ed086337afffbc004aae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62346-cwe-352-cross-site-request-forgery--37fa3373</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62346%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HCL%20Software%20Glovius%20Cloud&amp;severity=medium&amp;id=691ed086337afffbc004aae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/third-party-failures-are-becoming-the-real-threat--64d0a3c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Third-party%20failures%20are%20becoming%20the%20real%20threat%20to%20your%20security&amp;severity=medium&amp;id=691ec98e337afffbc0fb8c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-mapped-ship-ais-data-days-befo-963436b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Mapped%20Ship%20AIS%20Data%20Days%20Before%20Real-World%20Missile%20Strike%20Attempt&amp;severity=medium&amp;id=691f158663b28c178c8a261e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-patches-three-critical-serv-u-vulnerabi-bf5bd40d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Patches%20Three%20Critical%20Serv-U%20Vulnerabilities&amp;severity=critical&amp;id=691ec34f9f5a9374a9d0e191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-updates-backfire-rce-in-windows-update-health-7faa95b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Updates%20Backfire%3A%20RCE%20in%20Windows%20Update%20Health%20Tools&amp;severity=medium&amp;id=691ec3799f5a9374a9d1171f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64984-cwe-79-improper-neutralization-of-i-6905466f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64984%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kaspersky%20Kaspersky%20Endpoint%20Security&amp;severity=medium&amp;id=691ebfd49f5a9374a9cb4412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5092-cwe-79-improper-neutralization-of-in-2442521d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5092%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lightgalleryteam%20LightGallery%20WP&amp;severity=medium&amp;id=691eb8d39f5a9374a9bdd7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12502-cwe-89-sql-injection-in-attention-b-60a07d7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12502%3A%20CWE-89%20SQL%20Injection%20in%20attention-bar&amp;severity=medium&amp;id=691eaf76c29bdb682bd1c59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12778-cwe-862-missing-authorization-in-us-a8812238</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12778%3A%20CWE-862%20Missing%20Authorization%20in%20userelements%20Ultimate%20Member%20Widgets%20for%20Elementor%20%E2%80%93%20WordPress%20User%20Directory&amp;severity=medium&amp;id=691e9cde6a37eb355c413d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/helixguard-uncovers-malicious-spellchecker-package-f6c98000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HelixGuard%20uncovers%20malicious%20%22spellchecker%22%20packages%20on%20PyPI%20using%20multi-layer%20encryption%20to%20steal%20crypto%20wallets.&amp;severity=medium&amp;id=691e901a1af65083e688d8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13451-sql-injection-in-sourcecodester-onl-44a74aad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13451%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Shop%20Project&amp;severity=medium&amp;id=691e890f1af65083e684c093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13450-cross-site-scripting-in-sourcecodes-b420f123</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13450%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Shop%20Project&amp;severity=medium&amp;id=691e890f1af65083e684c08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13449-sql-injection-in-code-projects-onli-2241845a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13449%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shop%20Project&amp;severity=medium&amp;id=691e858b1af65083e68334ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13446-stack-based-buffer-overflow-in-tend-955c8679</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13446%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=691e858b1af65083e68334a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13445-stack-based-buffer-overflow-in-tend-2d090035</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13445%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=691e7b7b1af65083e67f4584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13443-improper-access-controls-in-macrozh-b53a5c6f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13443%3A%20Improper%20Access%20Controls%20in%20macrozheng%20mall&amp;severity=medium&amp;id=691e7b7b1af65083e67f457e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13442-command-injection-in-utt-750w-0d3f1567</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13442%3A%20Command%20Injection%20in%20UTT%20%E8%BF%9B%E5%8F%96%20750W&amp;severity=medium&amp;id=691e73fd1af65083e67a8485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13435-path-traversal-in-dreampie-resty-c53579e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13435%3A%20Path%20Traversal%20in%20Dreampie%20Resty&amp;severity=medium&amp;id=691e73fd1af65083e67a847f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13434-improper-neutralization-of-http-hea-f7d7045b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13434%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20jameschz%20Hush%20Framework&amp;severity=medium&amp;id=691e696b1af65083e66d8f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13433-unquoted-search-path-in-muse-group--3c22ea80</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13433%3A%20Unquoted%20Search%20Path%20in%20Muse%20Group%20MuseHub&amp;severity=high&amp;id=691e65e61af65083e66926d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13424-sql-injection-in-campcodes-supplier-583dc519</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13424%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691e5c8df78d7eef03ef72ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-20-554a5ed3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-20&amp;severity=medium&amp;id=691fae469bfed6bde22f2b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61138-na-975e9156</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61138%3A%20n%2Fa&amp;severity=high&amp;id=691f880cb342c1dca413b0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25613-na-10b73eeb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25613%3A%20n%2Fa&amp;severity=high&amp;id=691f82044f1c50aa2eb5aeea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63685-na-1dbcd6cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63685%3A%20n%2Fa&amp;severity=critical&amp;id=691f82024f1c50aa2eb5ae8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63807-na-82b5b42b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63807%3A%20n%2Fa&amp;severity=critical&amp;id=691f7e7c4f1c50aa2eb161ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63700-na-4cbc8dfc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63700&amp;severity=null&amp;id=691f628a40b920e2707a8c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63888-na-25ec4281</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63888%3A%20n%2Fa&amp;severity=critical&amp;id=691f58cde672cd9080e446fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63889-na-b9ed9834</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63889%3A%20n%2Fa&amp;severity=high&amp;id=691f553ce672cd9080df8ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63848-na-e685503a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63848%3A%20n%2Fa&amp;severity=medium&amp;id=691f4b4ed2e902043d281084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64027-na-03759e74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64027%3A%20n%2Fa&amp;severity=medium&amp;id=691f47cad2e902043d2402e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52410-na-99640c1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52410%3A%20n%2Fa&amp;severity=critical&amp;id=691f4446d2e902043d1f9197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60737-na-8b9924af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60737%3A%20n%2Fa&amp;severity=medium&amp;id=691f3714b661599aeb20f321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60738-na-c0d732ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60738%3A%20n%2Fa&amp;severity=critical&amp;id=691f3400b661599aeb1e39a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65226-na-9b94106a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65226%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac4562527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60794-na-0dda3562</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60794%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac4562522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65220-na-313874e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65220%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac456251f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60799-na-ed47d199</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60799%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac456251b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60798-na-54f57fa2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60798%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac4562516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65223-na-399d4943</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65223%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65222-na-7486c305</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65222%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65221-na-44f29dce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65221%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60797-na-3421a26f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60797%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60796-na-959bd500</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60796%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13423-unrestricted-upload-in-campcodes-re-8fdd6dc8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13423%3A%20Unrestricted%20Upload%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e5586f78d7eef03e60e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13422-sql-injection-in-freeprojectscodes--cb3a4430</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13422%3A%20SQL%20Injection%20in%20freeprojectscodes%20Sports%20Club%20Management%20System&amp;severity=medium&amp;id=691e5586f78d7eef03e60e2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13421-sql-injection-in-itsourcecode-human-6949e510</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13421%3A%20SQL%20Injection%20in%20itsourcecode%20Human%20Resource%20Management%20System&amp;severity=medium&amp;id=691e51178e880a653f859b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lite-xl-rce-cve-2025-12121-656c948a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LITE%20XL%20RCE%20(CVE-2025-12121)&amp;severity=medium&amp;id=691e49ef8e880a653f7b7f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13420-sql-injection-in-itsourcecode-human-a7fb6624</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13420%3A%20SQL%20Injection%20in%20itsourcecode%20Human%20Resource%20Management%20System&amp;severity=medium&amp;id=691e46748e880a653f7616ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky2fa-phaas-kit-now-uses-redteamers-browser-in-dbe41d96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneaky2FA%20PhaaS%20kit%20now%20uses%20redteamers&apos;%20Browser-in-the-Browser%20attack&amp;severity=high&amp;id=691e450d7eddc5e77790088b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13415-cross-site-scripting-in-icret-easyi-2e913485</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13415%3A%20Cross%20Site%20Scripting%20in%20icret%20EasyImages&amp;severity=medium&amp;id=691e3faf6a7f50ea54b7fb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11884-cwe-79-improper-neutralization-of-i-c8a5a8e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20uCMDB&amp;severity=low&amp;id=691e365f4e81ab18fb53789d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/network-devices-compromised-for-adversary-in-the-m-0ac252b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlushDaemon%20compromises%20network%20devices%20for%20adversary-in-the-middle%20attacks&amp;severity=medium&amp;id=691ee3886e8172836e79b611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13412-cross-site-scripting-in-campcodes-r-2721a28f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13412%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e32d34e81ab18fb4e5e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13147-cwe-918-server-side-request-forgery-babcce70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13147%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Progress%20MOVEit%20Transfer&amp;severity=medium&amp;id=691e2f504e81ab18fb499ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47914-cwe-237-in-golangorgxcrypto-golango-f5a02464</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47914%3A%20CWE-237%20in%20golang.org%2Fx%2Fcrypto%20golang.org%2Fx%2Fcrypto%2Fssh%2Fagent&amp;severity=medium&amp;id=691e2bd54e81ab18fb452bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58181-cwe-1284-in-golangorgxcrypto-golang-3473129b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58181%3A%20CWE-1284%20in%20golang.org%2Fx%2Fcrypto%20golang.org%2Fx%2Fcrypto%2Fssh&amp;severity=medium&amp;id=691e2bd54e81ab18fb452bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13411-unrestricted-upload-in-campcodes-re-fce26ed0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13411%3A%20Unrestricted%20Upload%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e29f04d0ffcb40bb6a60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13410-sql-injection-in-campcodes-retro-ba-715291c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13410%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e29f04d0ffcb40bb6a604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-via-a-malicious-svg-in-mpdf-73bd7b2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20via%20a%20malicious%20SVG%20in%20mPDF&amp;severity=medium&amp;id=691e92636a37eb355c323aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36371-cwe-598-use-of-get-request-method-w-450ad9eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36371%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings&amp;severity=medium&amp;id=691e248d4d0ffcb40bb0867b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65103-cwe-89-improper-neutralization-of-s-6fd11025</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65103%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=691e18af49ba98bd8186a296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65094-cwe-266-incorrect-privilege-assignm-62848762</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65094%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20WBCE%20WBCE_CMS&amp;severity=high&amp;id=691e248d4d0ffcb40bb0868e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-exposes-bulletproof-hosting-operator-linked-to--796ce78b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Exposes%20Bulletproof%20Hosting%20Operator%20Linked%20to%20BlackBasta%2C%20Evil%20Corp%20and%20LockBit%20Ransomware&amp;severity=medium&amp;id=691e153049ba98bd8181cfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/python-based-whatsapp-worm-spreads-eternidade-stea-64313459</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Python-Based%20WhatsApp%20Worm%20Spreads%20Eternidade%20Stealer%20Across%20Brazilian%20Devices&amp;severity=high&amp;id=691e12c2e0559f5704617ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65100-cwe-693-protection-mechanism-failur-c62ed801</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65100%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20ilbers%20isar&amp;severity=medium&amp;id=691e12eee0559f5704623244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-actively-exploiting-7-zip-symbolic-linkbas-a3ed7028</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Actively%20Exploiting%207-Zip%20Symbolic%20Link%E2%80%93Based%20RCE%20Vulnerability%20(CVE-2025-11001)&amp;severity=high&amp;id=691e12c2e0559f5704617ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64759-cwe-20-improper-input-validation-in-dcc518e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64759%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20homarr-labs%20homarr&amp;severity=high&amp;id=691e12eee0559f5704623249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-details-irans-cyber-enabled-kinetic-attacks-0eef9793</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Details%20Iran%E2%80%99s%20Cyber-Enabled%20Kinetic%20Attacks%20Linking%20Digital%20Spying%20to%20Physical%20Strikes&amp;severity=medium&amp;id=691e0bb0e0559f570458859d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13316-cwe-321-use-of-hard-coded-cryptogra-12776ddb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13316%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Lynxtechnology%20Twonky%20Server&amp;severity=high&amp;id=691e09e0e0559f57045745b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13315-cwe-420-unprotected-alternate-chann-f279de98</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13315%3A%20CWE-420%3A%20Unprotected%20Alternate%20Channel%20in%20Lynxtechnology%20Twonky%20Server&amp;severity=critical&amp;id=691e09e0e0559f57045745ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65089-cwe-862-missing-authorization-in-xw-df21fcec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65089%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwikisas%20xwiki-pro-macros&amp;severity=medium&amp;id=691e09e0e0559f57045745bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65099-cwe-94-improper-control-of-generati-47f2c548</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65099%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=691e026693c808727dc91d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65026-cwe-94-improper-control-of-generati-935434d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65026%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20esm-dev%20esm.sh&amp;severity=medium&amp;id=691e026693c808727dc91d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65025-cwe-22-improper-limitation-of-a-pat-ddafd98a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65025%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=691e026693c808727dc91d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65034-cwe-639-authorization-bypass-throug-7d192086</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65034%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65033-cwe-285-improper-authorization-in-l-60e747fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65033%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65032-cwe-639-authorization-bypass-throug-d19dbfa3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65032%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026793c808727dc91d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65031-cwe-285-improper-authorization-in-l-1d97cd52</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65031%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026793c808727dc91d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65030-cwe-285-improper-authorization-in-l-7320d1dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65030%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65029-cwe-285-improper-authorization-in-l-3e4af100</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65029%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65021-cwe-285-improper-authorization-in-l-d9b86aa6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65021%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=critical&amp;id=691e026693c808727dc91d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65020-cwe-285-improper-authorization-in-l-a5ca4882</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65020%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026693c808727dc91d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65028-cwe-285-improper-authorization-in-l-54713461</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65028%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026693c808727dc91d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-whatsapp-flaw-leaks-phone-numbers-for-over-cc5f8049</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20WhatsApp%20flaw%20leaks%20phone%20numbers%20for%20over%203.5B%20users.&amp;severity=high&amp;id=691dfb6593c808727dbff02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64708-cwe-613-insufficient-session-expira-ec5ea700</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64708%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20goauthentik%20authentik&amp;severity=medium&amp;id=691dfb7693c808727dc04388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64521-cwe-289-authentication-bypass-by-al-2b5b0b85</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64521%3A%20CWE-289%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20goauthentik%20authentik&amp;severity=medium&amp;id=691dfb7693c808727dc04384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13400-buffer-overflow-in-tenda-ch22-098b1390</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13400%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=691dfb7693c808727dc0437d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-selling-alleged-samsung-medison-healthcare--583b48bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Selling%20Alleged%20Samsung%20Medison%20Healthcare%20Data%20Stolen%20In%203rd%20Party%20Breach&amp;severity=high&amp;id=691df93ccb9b476b7d5bec2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12743-cwe-89-improper-neutralization-of-s-6af430ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=medium&amp;id=691df5b8cb9b476b7d56e485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64765-cwe-22-improper-limitation-of-a-pat-e99d26ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64765%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=691df5b8cb9b476b7d56e491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64764-cwe-80-improper-neutralization-of-s-afdf0627</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64764%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20withastro%20astro&amp;severity=high&amp;id=691df5b8cb9b476b7d56e48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65019-cwe-79-improper-neutralization-of-i-c93269f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65019%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=691df5b8cb9b476b7d56e495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64757-cwe-22-improper-limitation-of-a-pat-04b40712</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64757%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20withastro%20astro&amp;severity=low&amp;id=691df5b8cb9b476b7d56e489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-actively-exploiting-7-zip-symbolic-linkbas-fef89429</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NHS%20Warns%20of%20PoC%20Exploit%20for%207-Zip%20Symbolic%20Link%E2%80%93Based%20RCE%20Vulnerability&amp;severity=low&amp;id=691df220cb9b476b7d51d960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34335-cwe-78-improper-neutralization-of-s-2ccf7582</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34335%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34334-cwe-78-improper-neutralization-of-s-5b18a611</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34334%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34332-cwe-276-incorrect-default-permissio-8f40942f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34332%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34329-cwe-434-unrestricted-upload-of-file-6805136f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34329%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=critical&amp;id=691df24bcb9b476b7d51eaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34331-cwe-306-missing-authentication-for--5219f7db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34331%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34328-cwe-434-unrestricted-upload-of-file-a923c7e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34328%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=critical&amp;id=691df24bcb9b476b7d51eae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34330-cwe-434-unrestricted-upload-of-file-4be33253</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34330%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=medium&amp;id=691df24bcb9b476b7d51eaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34333-cwe-276-incorrect-default-permissio-3f3a598d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34333%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12766-cwe-639-authorization-bypass-throug-dadccd45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12766%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20BlackBerry%20BlackBerry%C2%AE%20AtHoc%C2%AE%20(OnPrem)&amp;severity=medium&amp;id=691deebacb9b476b7d4d1fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65022-cwe-89-improper-neutralization-of-s-e58ebe1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65022%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20portabilis%20i-educar&amp;severity=high&amp;id=691dec83964c14ffeeaeeaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65023-cwe-89-improper-neutralization-of-s-462dd1e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65023%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20portabilis%20i-educar&amp;severity=high&amp;id=691dec83964c14ffeeaeeaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65024-cwe-89-improper-neutralization-of-s-e866ec3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65024%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20portabilis%20i-educar&amp;severity=high&amp;id=691dec83964c14ffeeaeeafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unicode-it-is-more-than-funny-domain-names-wed-nov-7eccdf33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names.%2C%20(Wed%2C%20Nov%2012th)&amp;severity=high&amp;id=691dec62964c14ffeeae536b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10703-cwe-94-improper-control-of-generati-1cca29eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10703%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Progress%20DataDirect%20Connect%20for%20JDBC%20for%20Amazon%20Redshift&amp;severity=high&amp;id=691de8ff964c14ffeea99620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10702-cwe-94-improper-control-of-generati-cfbe7bd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10702%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Progress%20DataDirect%20Connect%20for%20JDBC%20for%20Amazon%20Redshift&amp;severity=high&amp;id=691de8ff964c14ffeea9961d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blames-outage-on-internal-configuration-c4a25b7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Blames%20Outage%20on%20Internal%20Configuration%20Error&amp;severity=medium&amp;id=691de8dd964c14ffeea97bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/california-man-admits-to-laundering-crypto-stolen--26f23f22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=California%20man%20admits%20to%20laundering%20crypto%20stolen%20in%20%24230M%20heist&amp;severity=high&amp;id=691de568964c14ffeea48423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13397-null-pointer-dereference-in-mrubyc-ca0aea54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13397%3A%20NULL%20Pointer%20Dereference%20in%20mrubyc&amp;severity=medium&amp;id=691de57d964c14ffeea48e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13396-sql-injection-in-code-projects-cour-1ceb2f09</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13396%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=691de57d964c14ffeea48e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fixed-2-critical-zero-day-vulnerabilities-fd0f239a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Fixed%202%20Critical%20Zero-Day%20Vulnerabilities%20in%20FortiWeb&amp;severity=critical&amp;id=691dd2c8338171324080af84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11963-cwe-79-improper-neutralization-of-i-7b41c278</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Saysis%20Computer%20Systems%20Trade%20Ltd.%20Co.%20StarCities&amp;severity=medium&amp;id=691dd2e93381713240811e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-railway-braking-systems-open-to-tampering-35fd7d1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Railway%20Braking%20Systems%20Open%20to%20Tampering&amp;severity=critical&amp;id=691dcf3833817132407c1066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0421-cwe-1021-improper-restriction-of-ren-90bf7f61</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0421%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Shopside%20Software%20Technologies%20Inc.%20Shopside&amp;severity=medium&amp;id=691dc9e6338171324075e919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-year-old-ray-ai-framework-flaw-exploited-in-on-18133971</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two-Year-Old%20Ray%20AI%20Framework%20Flaw%20Exploited%20in%20Ongoing%20Campaign&amp;severity=medium&amp;id=691dc7ce0d9a5150f8cf793c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8528-cwe-79-improper-neutralization-of-in-4593920c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Automated%20Logic%20WebCtrl&amp;severity=medium&amp;id=691dc7eb0d9a5150f8cfb1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8527-cwe-601-url-redirection-to-untrusted-fd0dfc1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8527%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Automated%20Logic%20WebCtrl&amp;severity=high&amp;id=691dc7eb0d9a5150f8cfb1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-black-friday-using-llms-to-save-on-the-sal-b2eddb90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Black%20Friday%3A%20using%20LLMs%20to%20save%20on%20the%20%E2%80%9Csale%20of%20the%20year%E2%80%9D%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=691dc0e50d9a5150f8c7142d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wrthug-exploits-six-asus-wrt-flaws-to-hijack-tens--a19440f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WrtHug%20Exploits%20Six%20ASUS%20WRT%20Flaws%20to%20Hijack%20Tens%20of%20Thousands%20of%20EoL%20Routers%20Worldwide&amp;severity=medium&amp;id=691e7bc51af65083e67f6131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12592-cwe-1392-cwe-1392-use-of-default-cr-f7eb4745</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12592%3A%20CWE-1392%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Vivotek%20Affected%20device%20model%20numbers%20are%20FD7131-VVTK%2CFD7131-VVTK%2CFD7131-VVTK%2CFD7141-VVTK%2CIP7131-VVTK%2CIP7133-VVTK%2CIP7133-VVTK%2CIP7133-VVTK%2CIP7134-VVTK%2CIP7135-VVTK%2CIP7135-VVTK%2CIP7135-VVTK%2CIP7135-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7138-VVTK%2CIP7142-VVTK%2CIP7142-VVTK%2CIP7151-VVTK%2CIP7152-VVTK%2CIP7153-VVTK%2CIP7153-VVTK%2CIP7154-VVTK%2CIP7330-VVTK%2CIP7330-VVTK%2CIP7330-VVTK%2CIP8131-VVTK%2CIP8131-VVTK%2CIP8131-VVTK%2CIP8131W-VVTK%2CPT7135-VVTK%2CPT7137-TCON%2CPT7137-VVTK%2CPT7137-VVTK%2CPT7137-VVTK%2CPT7137-VVTK%2CPZ7131-VVTK%2CPZ7131-VVTK%2CPZ71X1-VVTK%2CPZ71X1-VVTK%2CPZ71X2-VVTK%2CSD73X3-VVTK%2CSD73X3-VVTK%2CSD73X3-VVTK%2CTC5330-VVTK%2CTC5332-TCVV%2CTC5333-TCVV%2CTC5633-TCVV%2CTC5633-VVTK%2CVS7100-VVTK%2CVS7100-VVTK%2CVS7100-VVTK&amp;severity=critical&amp;id=691dbe8df37b5c9bf1714e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cline-bot-ai-agent-for-coding-vulnerable-to-data-t-23c82fef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cline%20Bot%20AI%20Agent%20for%20Coding%20Vulnerable%20to%20Data%20Theft%20and%20Code%20Execution&amp;severity=medium&amp;id=691db403f37b5c9bf1636867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-is-supercharging-phishing-heres-how-to-fight-ba-c7716430</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Is%20Supercharging%20Phishing%3A%20Here%E2%80%99s%20How%20to%20Fight%20Back&amp;severity=medium&amp;id=691e7c6d1af65083e67fe617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/application-containment-how-to-use-ringfencing-to--1f653049</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Application%20Containment%3A%20How%20to%20Use%20Ringfencing%20to%20Prevent%20the%20Weaponization%20of%20Trusted%20Software&amp;severity=medium&amp;id=691e7bc51af65083e67f6134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10437-cwe-89-improper-neutralization-of-s-a1c76425</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10437%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Eksagate%20Electronic%20Engineering%20and%20Computer%20Industry%20Trade%20Inc.%20Webpack%20Management%20System&amp;severity=critical&amp;id=691dae1b258ca46eb4871df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/largest-azure-ddos-attack-powered-by-aisuru-botnet-b97c6ed7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Largest%20Azure%20DDoS%20Attack%20Powered%20by%20Aisuru%20Botnet&amp;severity=medium&amp;id=691da712258ca46eb47db42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eurofiber-confirms-november-13-hack-data-theft-and-d7aa2ebe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eurofiber%20confirms%20November%2013%20hack%2C%20data%20theft%2C%20and%20extortion%20attempt&amp;severity=high&amp;id=691da72c258ca46eb47e1524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edgestepper-implant-reroutes-dns-queries-to-deploy-59c3c03e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EdgeStepper%20Implant%20Reroutes%20DNS%20Queries%20to%20Deploy%20Malware%20via%20Hijacked%20Software%20Updates&amp;severity=high&amp;id=691da48da788429a71e88406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plushdaemon-hackers-hijack-software-updates-in-sup-c375edd0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98PlushDaemon%E2%80%99%20hackers%20hijack%20software%20updates%20in%20supply-chain%20attacks&amp;severity=high&amp;id=691da48da788429a71e8840a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-operation-wrthug-hijacks-thousands-of-7c3af5f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Operation%20%E2%80%9CWrtHug%E2%80%9D%20Hijacks%20Thousands%20of%20ASUS%20Routers&amp;severity=high&amp;id=691da48da788429a71e8840e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13395-sql-injection-in-codehub666-94list-2f5b1313</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13395%3A%20SQL%20Injection%20in%20codehub666%2094list&amp;severity=medium&amp;id=691da73c258ca46eb47e777a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64408-cwe-502-deserialization-of-untruste-2c84b4b6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64408%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Causeway&amp;severity=medium&amp;id=691da109a788429a71e487c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12472-cwe-362-concurrent-execution-using--2d410649</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12472%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=691da109a788429a71e487c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/servicenow-ai-agents-can-be-tricked-into-acting-ag-7a7b8e8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ServiceNow%20AI%20Agents%20Can%20Be%20Tricked%20Into%20Acting%20Against%20Each%20Other%20via%20Second-Order%20Prompts&amp;severity=medium&amp;id=691e7bc51af65083e67f613a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58412-execute-unauthorized-code-or-comman-00f3c2a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58412%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=691d946612537358e42c14bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-discloses-second-exploited-fortiweb-zero--2cc1aab1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Discloses%20Second%20Exploited%20FortiWeb%20Zero-Day%20in%20a%20Week&amp;severity=low&amp;id=691d944712537358e42be659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11230-cwe-407-inefficient-algorithmic-com-994b4ebb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11230%3A%20CWE-407%20Inefficient%20Algorithmic%20Complexity%20in%20HAProxy%20Technologies%20HAProxy%20Community%20Edition&amp;severity=high&amp;id=691d90cc12537358e424faf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webjack-evolving-iis-hijacking-campaign-abuses-seo-ab34b9b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WEBJACK%3A%20Evolving%20IIS%20Hijacking%20Campaign%20Abuses%20SEO%20for%20Fraud%20and%20Monetization&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gpt-trade-fake-google-play-store-drops-btmob-spywa-ca6fb560</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GPT%20Trade%3A%20Fake%20Google%20Play%20Store%20drops%20BTMob%20Spyware%20and%20UASecurity%20Miner%20on%20Android%20Devices&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/roningloader-dragonbreaths-new-path-to-ppl-abuse-14b37752</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RONINGLOADER%3A%20DragonBreath&apos;s%20New%20Path%20to%20PPL%20Abuse&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11446-cwe-532-insertion-of-sensitive-info-34cb8f44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11446%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20upKeeper%20Solutions%20upKeeper%20Manager&amp;severity=high&amp;id=691d8797ce29a4e4be976738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-tuoni-c2-attack-on-us-real-estate-fi-85ae45b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20Tuoni%20C2%20Attack%20on%20U.S.%20Real%20Estate%20Firm%20Thwarted&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/license-to-encrypt-make-their-move-35fc53e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=License%20to%20Encrypt%3A%20Make%20Their%20Move&amp;severity=medium&amp;id=691d90c112537358e424f598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13035-cwe-94-improper-control-of-generati-5296eda6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13035%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20codesnippetspro%20Code%20Snippets&amp;severity=high&amp;id=691d774cfcf6450804cbcaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13206-cwe-79-improper-neutralization-of-i-8a48be31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13206%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=high&amp;id=691d774cfcf6450804cbcaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12484-cwe-79-improper-neutralization-of-i-d6f326dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Giveaways%20and%20Contests%20by%20RafflePress%20%E2%80%93%20Get%20More%20Website%20Traffic%2C%20Email%20Subscribers%2C%20and%20Social%20Followers&amp;severity=high&amp;id=691d774bfcf6450804cbcae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11243-cwe-770-allocation-of-resources-wit-07445dd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11243%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Shelly%20Pro%204PM&amp;severity=high&amp;id=691d6a73a27e6d5e91bd838d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12056-cwe-125-out-of-bounds-read-in-shell-1e6ca5a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12056%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Shelly%20Pro%203EM&amp;severity=high&amp;id=691d6a73a27e6d5e91bd8391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12535-cwe-352-cross-site-request-forgery--8fcf301f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12535%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=medium&amp;id=691d6a73a27e6d5e91bd8394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13085-cwe-285-improper-authorization-in-s-121b85ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13085%3A%20CWE-285%20Improper%20Authorization%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=691d6a73a27e6d5e91bd839a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12057-cwe-434-unrestricted-upload-of-file-32d029b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12057%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WavePlayer&amp;severity=critical&amp;id=691d5dd0b5b376a4835ad660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12814-cwe-285-improper-authorization-in-s-7477a3ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12814%3A%20CWE-285%20Improper%20Authorization%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12822-cwe-862-missing-authorization-in-cy-8533f080</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12822%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20WP%20Login%20and%20Register%20using%20JWT&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12359-cwe-918-server-side-request-forgery-fbf6ec04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12359%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dfactory%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12174-cwe-862-missing-authorization-in-wp-22290457</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12174%3A%20CWE-862%20Missing%20Authorization%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%2C%20Listings%20%26%20Classified%20Ads&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12878-cwe-79-improper-neutralization-of-i-08b81964</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amans2k%20FunnelKit%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20Checkout&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13145-cwe-502-deserialization-of-untruste-08158add</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13145%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=high&amp;id=691d6898a27e6d5e91bc24d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12646-cwe-89-improper-neutralization-of-s-fc01026e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12646%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=high&amp;id=691d6897a27e6d5e91bc16c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13054-cwe-79-improper-neutralization-of-i-89fcb2cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12710-cwe-79-improper-neutralization-of-i-d8d8342f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kwmanagement%20Pet-Manager%20%E2%80%93%20Petfinder&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12751-cwe-862-missing-authorization-in-el-9e5026bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12751%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20WSChat%20%E2%80%93%20WordPress%20Live%20Chat&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12842-cwe-20-improper-input-validation-in-6817e8c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12842%3A%20CWE-20%20Improper%20Input%20Validation%20in%20timeslotplugins%20Time%20Slot%20%E2%80%93%20Booking%20and%20Appointment%20System&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12426-cwe-200-exposure-of-sensitive-infor-86f1392c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12426%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=691d4b629140b486bbdab6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12349-cwe-306-missing-authentication-for--ad0d6d83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12349%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20icegram%20Email%20Subscribers%20%26%20Newsletters%20%E2%80%93%20Email%20Marketing%2C%20Post%20Notifications%20%26%20Newsletter%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=691d4b629140b486bbdab6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-active-global-campaign-hijacks-ray-ai-c7b6a9bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%3A%20Active%20Global%20Campaign%20Hijacks%20Ray%20AI%20Infrastructure%20Into%20Self-Propagating%20Botnet&amp;severity=medium&amp;id=691d8407ce29a4e4be9214c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-new-fortiweb-cve-2025-58034-vuln-3e41771d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20New%20FortiWeb%20CVE-2025-58034%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=low&amp;id=691e7bc51af65083e67f613d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12427-cwe-639-authorization-bypass-throug-0aad03ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12427%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20yithemes%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6251-cwe-79-improper-neutralization-of-in-6f4fb4ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6251%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12770-cwe-200-exposure-of-sensitive-infor-b03b1919</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12770%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20saadiqbal%20New%20User%20Approve&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12777-cwe-285-improper-authorization-in-y-117c42fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12777%3A%20CWE-285%20Improper%20Authorization%20in%20yithemes%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13051-cwe-427-uncontrolled-search-path-el-9b7b1033</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13051%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20ASUSTOR%20ABP%20and%20AES&amp;severity=critical&amp;id=691d3937c00dea8b9c9a69ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supapwn-hacking-our-way-into-lovables-office-and-h-cf201feb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SupaPwn%3A%20Hacking%20Our%20Way%20into%20Lovable&apos;s%20Office%20and%20Helping%20Secure%20Supabase&amp;severity=medium&amp;id=691d3233c00dea8b9c96f862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13225-vulnerability-in-tanium-tanos-25a8217c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13225%3A%20Vulnerability%20in%20Tanium%20TanOS&amp;severity=medium&amp;id=691d3230c00dea8b9c96f7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/request-suggestions-to-detect-bgp-hijack-events-29043d82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=request%20suggestions%20to%20detect%20bgp%20hijack%20events&amp;severity=medium&amp;id=691d2eafc00dea8b9c958bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shadowray-attacks-convert-ray-clusters-into-cr-e655a4b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ShadowRay%20attacks%20convert%20Ray%20clusters%20into%20crypto%20miners&amp;severity=high&amp;id=691d241dc00dea8b9c90b742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anatomy-of-an-akira-ransomware-attack-when-a-fake--1b9b949c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anatomy%20of%20an%20Akira%20Ransomware%20Attack%3A%20When%20a%20Fake%20CAPTCHA%20Led%20to%2042%20Days%20of%20Compromise&amp;severity=medium&amp;id=691d2099c00dea8b9c8fb1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12852-cwe-427-uncontrolled-search-path-el-4d3fe5a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12852%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20NEC%20Corporation%20RakurakuMusen%20Start%20EX&amp;severity=high&amp;id=691d1e32c00dea8b9c8d38b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-analyzed-python-packages-that-can-be-abused-to-b-d744a144</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20analyzed%20Python%20packages%20that%20can%20be%20abused%20to%20build%20surveillance%20tools%20%E2%80%94%20here%E2%80%99s%20what%20I%20found&amp;severity=medium&amp;id=691d0f29c00dea8b9c7c7245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-19-606c9bd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-19&amp;severity=medium&amp;id=691e5c7df78d7eef03ef1825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63719-na-9bd2d219</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63719%3A%20n%2Fa&amp;severity=high&amp;id=691e32d34e81ab18fb4e5e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63371-na-08da67ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63371%3A%20n%2Fa&amp;severity=high&amp;id=691e2f504e81ab18fb499ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63932-na-77fbdbb5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63932%3A%20n%2Fa&amp;severity=high&amp;id=691e266e4d0ffcb40bb1dd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63214-na-2c86b8ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63214%3A%20n%2Fa&amp;severity=medium&amp;id=691e248d4d0ffcb40bb0868a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51663-na-9bc8d406</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51663%3A%20n%2Fa&amp;severity=high&amp;id=691e248d4d0ffcb40bb08686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51662-na-ba93e796</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51662%3A%20n%2Fa&amp;severity=medium&amp;id=691e248d4d0ffcb40bb08682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51661-na-1ea646be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51661%3A%20n%2Fa&amp;severity=high&amp;id=691e248d4d0ffcb40bb0867e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63213-na-8d5dcc4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63213%3A%20n%2Fa&amp;severity=critical&amp;id=691e1fb449ba98bd818e9a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63212-na-e1760616</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63212%3A%20n%2Fa&amp;severity=medium&amp;id=691e1fb449ba98bd818e9a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63211-na-8334dcef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63211%3A%20n%2Fa&amp;severity=medium&amp;id=691e0bcde0559f5704589585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63209-na-2883e050</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63209%3A%20n%2Fa&amp;severity=high&amp;id=691e026693c808727dc91d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63208-na-26d15f3a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63208%3A%20n%2Fa&amp;severity=high&amp;id=691e026693c808727dc91d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63207-na-9a83d4eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63207%3A%20n%2Fa&amp;severity=critical&amp;id=691e026693c808727dc91d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63210-na-54eda0ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63210%3A%20n%2Fa&amp;severity=critical&amp;id=691e026693c808727dc91d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63206-na-4d497d2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63206%3A%20n%2Fa&amp;severity=critical&amp;id=691dfee093c808727dc4717e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63205-na-6f49544f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63205%3A%20n%2Fa&amp;severity=high&amp;id=691dfee093c808727dc4717a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63879-na-143d2ffa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63879%3A%20n%2Fa&amp;severity=medium&amp;id=691df058cb9b476b7d50830c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63224-na-707ca38a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63224%3A%20n%2Fa&amp;severity=critical&amp;id=691dec83964c14ffeeaeeaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63223-na-0940d10a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63223%3A%20n%2Fa&amp;severity=critical&amp;id=691dec83964c14ffeeaeeaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63220-na-9afbd3b3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63220%3A%20n%2Fa&amp;severity=high&amp;id=691de8ff964c14ffeea99627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63221-na-2229629d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63221%3A%20n%2Fa&amp;severity=critical&amp;id=691de8ff964c14ffeea99623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63878-na-b2cd9384</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63878%3A%20n%2Fa&amp;severity=medium&amp;id=691de57d964c14ffeea48e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63219-na-55ff3193</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63219%3A%20n%2Fa&amp;severity=high&amp;id=691ddf9152987e43f7248323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63218-na-730a36e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63218%3A%20n%2Fa&amp;severity=critical&amp;id=691ddc1352987e43f71fbd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63243-na-3cd6a8a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63243%3A%20n%2Fa&amp;severity=medium&amp;id=691dd2e93381713240811e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65015-cwe-770-allocation-of-resources-wit-940d1ee8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65015%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20authlib%20joserfc&amp;severity=critical&amp;id=691d040cb61595322dd84bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65012-cwe-79-improper-neutralization-of-i-cdb26557</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65012%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=691cf9367ccfba78bc94ec8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64515-cwe-20-improper-input-validation-in-b28efedf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64515%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20open-formulieren%20open-forms&amp;severity=medium&amp;id=691d040cb61595322dd84bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64325-cwe-79-improper-neutralization-of-i-b9dba396</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64325%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EmbySupport%20Emby.Security&amp;severity=high&amp;id=691cf5c07ccfba78bc8d7b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54990-cwe-276-incorrect-default-permissio-4e3c38a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54990%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20xwikisas%20application-admintools&amp;severity=medium&amp;id=691cf3d4be2811888e545747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detail-tuoni-c2s-role-in-an-attempted--eb0e3cc4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Detail%20Tuoni%20C2&apos;s%20Role%20in%20an%20Attempted%202025%20Real-Estate%20Cyber%20Intrusion&amp;severity=high&amp;id=691cecc9be2811888e450e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-new-fortiweb-zero-day-exploited--19828267</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20warns%20of%20new%20FortiWeb%20zero-day%20exploited%20in%20attacks&amp;severity=critical&amp;id=691cecc9be2811888e450e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/330-custom-email-domains-and-what-this-tells-us-ab-d8379c87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=330%20custom%20email%20domains%2C%20and%20what%20this%20tells%20us%20about%20how%20attackers%20build%20infrastructure%20for%20fake%20account%20creation&amp;severity=medium&amp;id=691cecc0be2811888e44fead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloud-break-iot-devices-open-to-silent-takeover-vi-04020f80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloud%20Break%3A%20IoT%20Devices%20Open%20to%20Silent%20Takeover%20Via%20Firewalls&amp;severity=medium&amp;id=691d1dbec00dea8b9c8c94cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-a-global-decentralized-system-save-cve-data-9680efeb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20a%20Global%2C%20Decentralized%20System%20Save%20CVE%20Data%3F&amp;severity=medium&amp;id=691cdf8890fff14d7013a216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-nexus-threat-actor-unc1549-takes-aim-at-aeros-ddebf1d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Nexus%20Threat%20Actor%20UNC1549%20Takes%20Aim%20at%20Aerospace&amp;severity=medium&amp;id=691d1dbec00dea8b9c8c94ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12119-cwe-825-expired-pointer-dereference-18cc6e5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12119%3A%20CWE-825%20Expired%20Pointer%20Dereference%20in%20MongoDB%20C%20Driver&amp;severity=medium&amp;id=691ceaedbe2811888e43645d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37162-vulnerability-in-hewlett-packard-en-a7b64784</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37162%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20100%20Series%20Cellular%20Bridge&amp;severity=medium&amp;id=691ccaa45990fe54bdf5a3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37161-vulnerability-in-hewlett-packard-en-750c00fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37161%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20100%20Series%20Cellular%20Bridge&amp;severity=high&amp;id=691ccaa45990fe54bdf5a3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37163-vulnerability-in-hewlett-packard-en-b2309533</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37163%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Management%20Software%20(Airwave)&amp;severity=high&amp;id=691cd1d3b044fc99aa3c771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52639-cwe-201-insertion-of-sensitive-info-90a24080</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52639%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20HCL%20Software%20Connections&amp;severity=low&amp;id=691cc3a85990fe54bdeb5a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37160-vulnerability-in-hewlett-packard-en-8cb835ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37160%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc3a85990fe54bdeb5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37159-vulnerability-in-hewlett-packard-en-9a5fdd48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37159%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37158-vulnerability-in-hewlett-packard-en-3997fe9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37158%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37157-vulnerability-in-hewlett-packard-en-cd06eca5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37157%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networkign%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37156-vulnerability-in-hewlett-packard-en-b0bc9d81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37156%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37155-vulnerability-in-hewlett-packard-en-4b91167e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37155%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=high&amp;id=691cc1a4fcab56a016e27ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky-2fa-phishing-kit-adds-bitb-pop-ups-designed-de3bced3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneaky%202FA%20Phishing%20Kit%20Adds%20BitB%20Pop-ups%20Designed%20to%20Mimic%20the%20Browser%20Address%20Bar&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54770-expired-pointer-dereference-in-red--301b7a95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54770%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cc1a4fcab56a016e27ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61664-expired-pointer-dereference-in-red--b909d86d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61664%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f80d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61663-expired-pointer-dereference-in-red--3349e2bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61663%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61662-vulnerability-in-red-hat-red-hat-en-a3cf946a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61662%3A%20Vulnerability%20in%20GNU%20grub2&amp;severity=high&amp;id=691cbabbfcab56a016d7f805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61661-incorrect-calculation-of-buffer-siz-5e5161a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61661%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54771-expired-pointer-dereference-in-red--f830c704</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54771%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-hit-by-outage-affecting-global-network--b25c06d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20hit%20by%20outage%20affecting%20global%20network%20services&amp;severity=high&amp;id=691cba99fcab56a016d7e1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-tycoon-2fa-phishing-platform-and-the-collapse--47b6e8c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Tycoon%202FA%20Phishing%20Platform%20and%20the%20Collapse%20of%20Legacy%20MFA&amp;severity=high&amp;id=691cba99fcab56a016d7e1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-says-highly-disruptive-outage-not-cause-9708af39</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Outage%20Not%20Caused%20by%20Cyberattack&amp;severity=high&amp;id=691cb71bfcab56a016d30b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lsass-dump-windows-error-reporting-50208113</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LSASS%20Dump%20%E2%80%93%20Windows%20Error%20Reporting&amp;severity=medium&amp;id=691caa8431331b1c39300c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-888-claims-lg-electronics-data-breach-93a33f72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20%22888%22%20Claims%20LG%20Electronics%20Data%20Breach%20-%20Source%20Code%20and%20Hardcoded%20Credentials%20Allegedly%20Leaked%20%5BUnconfirmed%5D&amp;severity=high&amp;id=691caa8431331b1c39300c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53843-execute-unauthorized-code-or-comman-2a4dc3ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53843%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=691ca897209f2030fa016955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48839-execute-unauthorized-code-or-comman-cb1dc19d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48839%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=691ca897209f2030fa016952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54821-escalation-of-privilege-in-fortinet-994a3842</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54821%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiProxy&amp;severity=low&amp;id=691ca897209f2030fa01695b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58413-execute-unauthorized-code-or-comman-14642e2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58413%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=691ca897209f2030fa016967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46215-execute-unauthorized-code-or-comman-165afa16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46215%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=691ca896209f2030fa0168ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59669-improper-access-control-in-fortinet-4e883c21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59669%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=691ca899209f2030fa016985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54660-information-disclosure-in-fortinet--f5ea3114</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54660%3A%20Information%20disclosure%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=691ca897209f2030fa016958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61713-information-disclosure-in-fortinet--57bf6412</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61713%3A%20Information%20disclosure%20in%20Fortinet%20FortiPAM&amp;severity=low&amp;id=691ca899209f2030fa016988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46776-escalation-of-privilege-in-fortinet-9c4f3ec0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46776%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiExtender&amp;severity=medium&amp;id=691ca896209f2030fa0168f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46775-information-disclosure-in-fortinet--82d9c3f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46775%3A%20Information%20disclosure%20in%20Fortinet%20FortiExtender&amp;severity=medium&amp;id=691ca896209f2030fa0168f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54971-information-disclosure-in-fortinet--071776c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54971%3A%20Information%20disclosure%20in%20Fortinet%20FortiADC&amp;severity=low&amp;id=691ca897209f2030fa01695e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54972-information-disclosure-in-fortinet--53df4449</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54972%3A%20Information%20disclosure%20in%20Fortinet%20FortiMail&amp;severity=low&amp;id=691ca897209f2030fa016961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46373-execute-unauthorized-code-or-comman-ac3a622a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46373%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientWindows&amp;severity=high&amp;id=691ca896209f2030fa0168ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58692-execute-unauthorized-code-or-comman-057086a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58692%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=high&amp;id=691ca897209f2030fa01696a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58034-execute-unauthorized-code-or-comman-b8a9c4f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58034%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=691ca897209f2030fa016964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47761-execute-unauthorized-code-or-comman-72d786c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47761%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientWindows&amp;severity=high&amp;id=691ca897209f2030fa01694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-securely-vet-browser-extensions-across-your-0e156888</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20securely%20vet%20browser%20extensions%20across%20your%20organization&amp;severity=medium&amp;id=691ca8a0209f2030fa016a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33184-cwe-94-improper-control-of-generati-fdf76b5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33184%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Isaac-GR00T%20N1.5&amp;severity=high&amp;id=691ca896209f2030fa0168e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33183-cwe-94-improper-control-of-generati-4681f9cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33183%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Isaac-GR00T%20N1.5&amp;severity=high&amp;id=691ca896209f2030fa0168e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12761-cwe-79-improper-neutralization-of-i-3545fa16</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Simple%20multi%20step%20form&amp;severity=low&amp;id=691ca896209f2030fa0168d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12760-cwe-288-authentication-bypass-using-c443eed1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12760%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Email%20TFA&amp;severity=medium&amp;id=691ca896209f2030fa0168d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13083-cwe-525-use-of-web-browser-cache-co-47eb802f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13083%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Drupal%20Drupal%20core&amp;severity=low&amp;id=691ca896209f2030fa0168df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13082-cwe-451-user-interface-ui-misrepres-4eba2431</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13082%3A%20CWE-451%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=691ca896209f2030fa0168dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13081-cwe-915-improperly-controlled-modif-6963c670</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13081%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=691ca514209f2030fafbb901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13080-cwe-754-improper-check-for-unusual--68a40648</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13080%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=691ca514209f2030fafbb8fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-abuse-adspect-cloaking-in-c-d565d946</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Npm%20Packages%20Abuse%20Adspect%20Cloaking%20in%20Crypto%20Scam&amp;severity=medium&amp;id=691cdf8890fff14d7013a219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bug-bounty-programs-rise-as-key-strategic-security-4197ef43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bug%20Bounty%20Programs%20Rise%20as%20Key%20Strategic%20Security%20Solutions&amp;severity=medium&amp;id=691cdf8890fff14d7013a21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34324-cwe-347-improper-verification-of-cr-579620c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34324%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Tinexta%20InfoCert%20S.p.A.%20GoSign%20Desktop&amp;severity=high&amp;id=691ca514209f2030fafbb90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mi5-warns-lawmakers-that-chinese-spies-are-trying--93ad46a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MI5%20Warns%20Lawmakers%20That%20Chinese%20Spies%20Are%20Trying%20to%20Reach%20Them%20via%20LinkedIn&amp;severity=medium&amp;id=691c9e0f209f2030faf12e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53360-cwe-284-improper-access-control-in--fb3b122c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53360%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20pluginsGLPI%20databaseinventory&amp;severity=medium&amp;id=691c9c349b9483ee9a797597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-expands-whatsapp-security-research-with-new-p-7b4ea7a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20Expands%20WhatsApp%20Security%20Research%20with%20New%20Proxy%20Tool%20and%20%244M%20in%20Bounties%20This%20Year&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9977-cwe-89-improper-neutralization-of-sp-342d88a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9977%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Times%20Software%20E-Payroll&amp;severity=medium&amp;id=691c98b19b9483ee9a7411a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-active-global-campaign-hijacks-ray-ai-a9a97f49</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%3A%20Active%20Global%20Campaign%20Hijacks%20Ray%20AI%20Infrastructure%20Into%20Self-Propagating%20Botnet%20%7C%20Oligo%20Security&amp;severity=medium&amp;id=691c91b99b9483ee9a696167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12383-cwe-362-concurrent-execution-using--237b881a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12383%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Eclipse%20Foundation%20Jersey&amp;severity=critical&amp;id=691c901eb718280d68a97e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58121-cwe-280-improper-handling-of-insuff-de021ad1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58121%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=691c901eb718280d68a97e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58122-cwe-280-improper-handling-of-insuff-1c3831be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58122%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=691c901eb718280d68a97e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64996-cwe-732-incorrect-permission-assign-db7a37f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64996%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=691c901eb718280d68a97e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13349-cross-site-scripting-in-sourcecodes-7c14eddb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13349%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Grades%20Management%20System&amp;severity=medium&amp;id=691c7ff93fd37bbc395da093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detail-tuoni-c2s-role-in-an-attempted--72ee2b25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Detail%20Tuoni%20C2&apos;s%20Role%20in%20an%20Attempted%202025%20Real-Estate%20Cyber%20Intrusion&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55179-incorrect-authorization-cwe-863-in--77d597b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55179%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Facebook%20WhatsApp%20Business%20for%20iOS&amp;severity=medium&amp;id=691c7c583fd37bbc3957664a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12545-cwe-200-exposure-of-sensitive-infor-c2c5cd40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12545%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20alekv%20Pixel%20Manager%20for%20WooCommerce%20%E2%80%93%20Conversion%20Tracking%2C%20Google%20Ads%2C%20GA4%2C%20TikTok%2C%20Dynamic%20Remarketing&amp;severity=medium&amp;id=691c7c583fd37bbc39576645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12376-cwe-918-server-side-request-forgery-c19876e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12376%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20Icon%20List%20Block%20%E2%80%93%20Add%20Icon-Based%20Lists%20with%20Custom%20Styles&amp;severity=medium&amp;id=691c7c583fd37bbc39576641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59116-cwe-204-observable-response-discrep-4375b645</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59116%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59111-cwe-863-incorrect-authorization-in--2b38eb75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59111%3A%20CWE-863%20Incorrect%20Authorization%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59117-cwe-79-improper-neutralization-of-i-00016b2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59115-cwe-79-improper-neutralization-of-i-1ac64c1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59115%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59114-cwe-352-cross-site-request-forgery--92a2c942</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59114%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59113-cwe-307-improper-restriction-of-exc-8e5c76cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59113%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59112-cwe-352-cross-site-request-forgery--05e1e30f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59112%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59110-cwe-352-cross-site-request-forgery--c8c5192f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59110%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pennsylvania-attorney-general-confirms-data-breach-678947eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pennsylvania%20Attorney%20General%20Confirms%20Data%20Breach%20After%20Ransomware%20Attack&amp;severity=medium&amp;id=691c834c3fd37bbc3964247a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13347-sql-injection-in-sourcecodester-tra-66e07fc5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13347%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c7a583fd37bbc3955e44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/princeton-university-data-breach-impacts-alumni-st-4cd0892c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Princeton%20University%20Data%20Breach%20Impacts%20Alumni%2C%20Students%2C%20Employees&amp;severity=medium&amp;id=691c834c3fd37bbc3964247d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-use-deeproot-and-twostroke-malware-d9f488f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Use%20DEEPROOT%20and%20TWOSTROKE%20Malware%20in%20Aerospace%20and%20Defense%20Attacks&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13346-sql-injection-in-sourcecodester-tra-7c598414</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13346%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c6c69c50334694ab71ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8084-cwe-918-server-side-request-forgery--f88329cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8084%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=medium&amp;id=691c6dffc50334694aba91b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-stolen-in-eurofiber-france-hack-054dd329</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Stolen%20in%20Eurofiber%20France%20Hack&amp;severity=medium&amp;id=691c673ae9a43f0a37c3800a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9312-cwe-306-missing-authentication-for-c-96f55cb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9312%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=691c6c69c50334694ab71cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13345-sql-injection-in-sourcecodester-tra-609081c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13345%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c6dffc50334694aba91c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13344-sql-injection-in-sourcecodester-tra-fc9bfea8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13344%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c6dffc50334694aba91bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13343-cross-site-scripting-in-sourcecodes-16bde475</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13343%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Interview%20Management%20System&amp;severity=medium&amp;id=691c5b0103ddb54749becbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6670-cwe-352-cross-site-request-forgery-c-69f552ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6670%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WSO2%20WSO2%20Open%20Banking%20AM&amp;severity=high&amp;id=691c5b0103ddb54749becbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41350-cwe-79-improper-neutralization-of-i-d9392634</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=medium&amp;id=691c5b0103ddb54749becbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41349-cwe-79-improper-neutralization-of-i-b57b43c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=medium&amp;id=691c5b0103ddb54749becbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41348-cwe-89-improper-neutralization-of-s-f6696c80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41348%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=high&amp;id=691c5b0103ddb54749becbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41347-cwe-434-unrestricted-upload-of-file-3899941b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41347%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=high&amp;id=691c544503ddb54749b63b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11427-cwe-918-server-side-request-forgery-3853f00f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11427%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpengine%20WP%20Migrate%20Lite%20%E2%80%93%20Migration%20Made%20Easy&amp;severity=medium&amp;id=691c544503ddb54749b63b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-iam-silos-why-the-identity-security-fabric--84aad751</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20IAM%20Silos%3A%20Why%20the%20Identity%20Security%20Fabric%20is%20Essential%20for%20Securing%20AI%20and%20Non-Human%20Identities&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seven-npm-packages-use-adspect-cloaking-to-trick-v-c22cdb1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Seven%20npm%20Packages%20Use%20Adspect%20Cloaking%20to%20Trick%20Victims%20Into%20Crypto%20Scam%20Pages&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41737-cwe-284-improper-access-control-in--058e1afd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41737%3A%20CWE-284%20Improper%20Access%20Control%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=high&amp;id=691c4a8a8ab8e3b581406714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41736-cwe-35-path-traversal-in-metz-conne-557cac52</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41736%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=high&amp;id=691c4a8a8ab8e3b581406711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41735-cwe-434-unrestricted-upload-of-file-29f17bfd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41735%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=high&amp;id=691c4a8a8ab8e3b58140670e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41734-cwe-98-improper-control-of-filename-025d6355</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41734%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=critical&amp;id=691c4a8a8ab8e3b58140670b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41733-cwe-305-authentication-bypass-by-pr-ec381b17</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41733%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=critical&amp;id=691c4a8a8ab8e3b581406708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gotchas-in-email-parsing-lessons-from-jakarta-mail-3dab4f31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gotchas%20in%20Email%20Parsing%20-%20Lessons%20from%20Jakarta%20Mail&amp;severity=medium&amp;id=691c453aa312a743bb5b935e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41346-cwe-863-incorrect-authorization-in--3f733ec7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41346%3A%20CWE-863%20Incorrect%20Authorization%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=critical&amp;id=691c47108ab8e3b5813b58ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12391-cwe-862-missing-authorization-in-se-8ba827c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12391%3A%20CWE-862%20Missing%20Authorization%20in%20seventhqueen%20Restrictions%20for%20BuddyPress&amp;severity=medium&amp;id=691c3e32a312a743bb510b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12457-cwe-79-improper-neutralization-of-i-4463363d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideastocode%20Enable%20SVG%2C%20WebP%2C%20and%20ICO%20Upload&amp;severity=medium&amp;id=691c3e32a312a743bb510b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12691-cwe-79-improper-neutralization-of-i-16de36de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sayontan%20Photonic%20Gallery%20%26%20Lightbox%20for%20Flickr%2C%20SmugMug%20%26%20Others&amp;severity=medium&amp;id=691c3e32a312a743bb510b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12639-cwe-862-missing-authorization-in-su-9bc93b58</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12639%3A%20CWE-862%20Missing%20Authorization%20in%20sundayfanz%20wModes%20%E2%80%93%20Catalog%20Mode%2C%20Product%20Pricing%2C%20Enquiry%20Forms%20%26%20Promotions%20%7C%20for%20WooCommerce&amp;severity=medium&amp;id=691c3e32a312a743bb510b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12392-cwe-862-missing-authorization-in-tr-3c10d0b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12392%3A%20CWE-862%20Missing%20Authorization%20in%20tripleatechnology%20Cryptocurrency%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=691c3e32a312a743bb510b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12088-cwe-79-improper-neutralization-of-i-045c8891</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bhargavbhandari90%20Meta%20Display%20Block&amp;severity=medium&amp;id=691c3e32a312a743bb510b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12481-cwe-862-missing-authorization-in-ni-3a509485</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12481%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20WP%20Duplicate%20Page&amp;severity=medium&amp;id=691c3e32a312a743bb510b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13069-cwe-434-unrestricted-upload-of-file-26d6e7dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13069%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ideastocode%20Enable%20SVG%2C%20WebP%2C%20and%20ICO%20Upload&amp;severity=high&amp;id=691c3e34a312a743bb510bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12079-cwe-79-improper-neutralization-of-i-ea21a2a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12079%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20WP%20Twitter%20Auto%20Publish&amp;severity=medium&amp;id=691c3e32a312a743bb510b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13133-cwe-1236-improper-neutralization-of-1c8cfc8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13133%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20vaniivan%20Simple%20User%20Import%20Export&amp;severity=medium&amp;id=691c3e34a312a743bb510bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12955-cwe-862-missing-authorization-in-ra-31d848a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12955%3A%20CWE-862%20Missing%20Authorization%20in%20rajeshsingh520%20PiWeb%20Live%20sales%20notification%20for%20WooCommerce&amp;severity=high&amp;id=691c3e32a312a743bb510ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13196-cwe-79-improper-neutralization-of-i-ae77b586</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13196%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=691c3e34a312a743bb510bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4212-cwe-79-improper-neutralization-of-in-0d5aebb6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwham%20Checkout%20Files%20Upload%20for%20WooCommerce&amp;severity=high&amp;id=691c3e34a312a743bb510bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11734-cwe-862-missing-authorization-in-ai-d8f24edf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11734%3A%20CWE-862%20Missing%20Authorization%20in%20aioseo%20Broken%20Link%20Checker%20by%20AIOSEO%20%E2%80%93%20Easily%20Fix%2FMonitor%20Internal%20and%20External%20links&amp;severity=medium&amp;id=691c3e32a312a743bb510b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-issues-security-fix-for-actively-exploited--d9373f77</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Issues%20Security%20Fix%20for%20Actively%20Exploited%20Chrome%20V8%20Zero-Day%20Vulnerability&amp;severity=critical&amp;id=691c3b3ea312a743bb4e5eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-azure-blocks-massive-1572-tbps-of-ddos-a-ddbae2b5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Azure%20Blocks%20Massive%2015.72%20Tbps%20of%20DDoS%20Attack%20Powered%20by%20Aisuru%20Botnet&amp;severity=medium&amp;id=691c375e35a0ab0a562ec2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40545-cwe-601-url-redirection-to-untruste-20b70efb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40545%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=691c376d35a0ab0a562ec558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26391-cwe-79-improper-neutralization-of-i-97db1cc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=691c376d35a0ab0a562ec55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40549-cwe-22-improper-limitation-of-a-pat-162a86bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40549%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=691c33dd35a0ab0a5629b608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40548-cwe-269-improper-privilege-manageme-667468e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40548%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=691c33dd35a0ab0a5629b604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40547-cwe-116-improper-encoding-or-escapi-2ab7750f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40547%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=691c33dd35a0ab0a5629b600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11868-cwe-79-improper-neutralization-of-i-aef13502</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20everviz%20everviz%20%E2%80%93%20Charts%2C%20Maps%20and%20Tables%20%E2%80%93%20Interactive%20and%20responsive&amp;severity=medium&amp;id=691c305835a0ab0a56270fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12078-cwe-79-improper-neutralization-of-i-8dcc648d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12078%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artibot%20ArtiBot%20Free%20Chat%20Bot%20for%20WebSites&amp;severity=medium&amp;id=691c305835a0ab0a56270fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12406-cwe-352-cross-site-request-forgery--5d46eccc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12406%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20awensley%20Project%20Honey%20Pot%20Spam%20Trap&amp;severity=medium&amp;id=691c305835a0ab0a56270fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12961-cwe-862-missing-authorization-in-ar-2ff6009c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12961%3A%20CWE-862%20Missing%20Authorization%20in%20arkadiykilesso%20Download%20Panel%20(Biggiko%20Team)&amp;severity=medium&amp;id=691c305a35a0ab0a56271071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13088-cwe-98-improper-control-of-filename-cc2aec51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13088%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ikhodal%20Category%20and%20Product%20Woocommerce%20Tabs&amp;severity=high&amp;id=691c305b35a0ab0a5627107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12372-cwe-862-missing-authorization-in-lu-5f94947c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12372%3A%20CWE-862%20Missing%20Authorization%20in%20_luigi%20The%20Permalinks%20Cascade&amp;severity=medium&amp;id=691c305835a0ab0a56270ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12775-cwe-434-unrestricted-upload-of-file-eb28307e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12775%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20nazsabuz%20WP%20Dropzone&amp;severity=high&amp;id=691c305935a0ab0a56271010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8609-cwe-79-improper-neutralization-of-in-85c4bb7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rometheme%20RTMKit&amp;severity=medium&amp;id=691c305b35a0ab0a56271083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12173-cwe-352-cross-site-request-forgery--7e2d8b6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12173%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20winkm89%20WP%20Admin%20Microblog&amp;severity=medium&amp;id=691c305835a0ab0a56270ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12937-cwe-862-missing-authorization-in-va-18ae7e0d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12937%3A%20CWE-862%20Missing%20Authorization%20in%20valentinpellegrin%20ACF%20Flexible%20Layouts%20Manager&amp;severity=medium&amp;id=691c305a35a0ab0a5627106d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8605-cwe-79-improper-neutralization-of-in-d7d2323d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8605%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeyatri%20Gutenify%20%E2%80%93%20Visual%20Site%20Builder%20Blocks%20%26%20Site%20Templates.&amp;severity=medium&amp;id=691c305b35a0ab0a5627107f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12827-cwe-352-cross-site-request-forgery--18ac1df3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12827%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20denishua%20Top%20Friends&amp;severity=medium&amp;id=691c305a35a0ab0a56271069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12962-cwe-918-server-side-request-forgery-4a630d20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12962%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20willbontrager%20Local%20Syndication&amp;severity=medium&amp;id=691c305a35a0ab0a56271076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12404-cwe-352-cross-site-request-forgery--c417926d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12404%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nikolayyordanov%20Like-it&amp;severity=medium&amp;id=691c305835a0ab0a56270ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12823-cwe-79-improper-neutralization-of-i-ffc6b076</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sscovil%20CSV%20to%20SortTable&amp;severity=medium&amp;id=691c305a35a0ab0a56271065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9625-cwe-352-cross-site-request-forgery-c-4aa09df1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9625%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20interledger%20Coil%20Web%20Monetization&amp;severity=medium&amp;id=691c305b35a0ab0a56271088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12528-cwe-434-unrestricted-upload-of-file-f7196f0e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12528%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20genetechproducts%20Pie%20Forms%20%E2%80%94%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=691c305935a0ab0a5627100a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11620-cwe-862-missing-authorization-in-je-f10fda1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11620%3A%20CWE-862%20Missing%20Authorization%20in%20jemoreto%20Multiple%20Roles%20per%20User&amp;severity=high&amp;id=691c305835a0ab0a56270fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12411-cwe-89-improper-neutralization-of-s-7a2902ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12411%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20premmerce%20Premmerce%20Wholesale%20Pricing%20for%20WooCommerce&amp;severity=high&amp;id=691c305835a0ab0a56271005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-mitigates-record-572-tbps-ddos-attack-dr-43f827b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Mitigates%20Record%2015.72%20Tbps%20DDoS%20Attack%20Driven%20by%20AISURU%20Botnet&amp;severity=medium&amp;id=691c3a1b35a0ab0a56323a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8727-cwe-121-stack-based-buffer-overflow--04a7fbdb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8727%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20X13SEDW-F&amp;severity=high&amp;id=691c27b723be15589aef5883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8404-cwe-121-stack-based-buffer-overflow--e59980a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8404%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20MBD-X13SEDW-F&amp;severity=medium&amp;id=691c2e7635a0ab0a5625e9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10089-cwe-427-uncontrolled-search-path-el-6c060c4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10089%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Mitsubishi%20Electric%20Corporation%20MILCO.S%20Setting%20Application&amp;severity=high&amp;id=691c2e7635a0ab0a5625e9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11265-cwe-80-improper-neutralization-of-s-42af464f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11265%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=691c2e7635a0ab0a5625e9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11267-cwe-80-improper-neutralization-of-s-e8a232cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11267%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=691c2e7635a0ab0a5625e9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-142-update-patches-exploited-zero-day-0c3916ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20142%20Update%20Patches%20Exploited%20Zero-Day&amp;severity=medium&amp;id=691c1ef891aee3c1015f016e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8076-cwe-121-stack-based-buffer-overflow--3b3fb5c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8076%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20MBD-X13SEDW-F&amp;severity=high&amp;id=691c1f0d91aee3c1015f038e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kongtuke-activity-tue-nov-18th-2127cdf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KongTuke%20activity%2C%20(Tue%2C%20Nov%2018th)&amp;severity=medium&amp;id=691c1ef791aee3c1015f015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7623-cwe-121-stack-based-buffer-overflow--c2265807</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7623%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20MBD-X13SEDW-F&amp;severity=medium&amp;id=691c1f0d91aee3c1015f0391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12524-cwe-639-authorization-bypass-throug-67dd1610</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12524%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20johnjamesjacoby%20Post%20Type%20Switcher&amp;severity=medium&amp;id=691c17f491aee3c10155a86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48593-remote-code-execution-in-google-and-3ca254ab</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48593%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=691c09b712fe1630eb814e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-issues-security-fix-for-actively-exploited--5cac9701</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Issues%20Security%20Fix%20for%20Actively%20Exploited%20Chrome%20V8%20Zero-Day%20Vulnerability&amp;severity=medium&amp;id=691c3a1b35a0ab0a56323a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64734-cwe-772-missing-release-of-resource-555248bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64734%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Gallagher%20T21%20Reader&amp;severity=low&amp;id=691bed9bd4c3ef3c7a628533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52578-cwe-335-incorrect-usage-of-seeds-in-0a270115</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52578%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Gallagher%20High%20Sec%20End%20of%20Line%20Module&amp;severity=medium&amp;id=691bed9bd4c3ef3c7a62852e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52457-cwe-208-observable-timing-discrepan-f85f0568</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52457%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Gallagher%20HBUS%20Devices&amp;severity=medium&amp;id=691bed9bd4c3ef3c7a628529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frontline-intelligence-analysis-of-unc1549-ttps-cu-39f95a39</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frontline%20Intelligence%3A%20Analysis%20of%20UNC1549%20TTPs%2C%20Custom%20Tools%2C%20and%20Malware%20Targeting%20the%20Aerospace%20and%20Defense%20Ecosystem&amp;severity=medium&amp;id=691bd87cd4c3ef3c7a5e99bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8693-cwe-78-improper-neutralization-of-sp-9e514a8a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8693%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20DX3300-T0%20firmware&amp;severity=high&amp;id=691bd17ad4c3ef3c7a5d6d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6599-cwe-400-uncontrolled-resource-consum-cdfea7ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6599%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Zyxel%20DX3301-T0%20firmware&amp;severity=medium&amp;id=691bd17ad4c3ef3c7a5d6d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13325-sql-injection-in-itsourcecode-stude-74fb4f8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13325%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=691bb966d4c3ef3c7a51160c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13323-sql-injection-in-code-projects-simp-e2a18356</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13323%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=691bb966d4c3ef3c7a511605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-18-9c04fbd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-18&amp;severity=medium&amp;id=691d0cedb61595322de4c34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63229-na-501f48ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63229%3A%20n%2Fa&amp;severity=medium&amp;id=691ceaeebe2811888e436478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63217-na-a766bede</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63217%3A%20n%2Fa&amp;severity=critical&amp;id=691ceaeebe2811888e436474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63216-na-1be25468</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63216%3A%20n%2Fa&amp;severity=critical&amp;id=691ceaedbe2811888e43646f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63215-na-eeb49ca4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63215%3A%20n%2Fa&amp;severity=high&amp;id=691ceaedbe2811888e436468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63228-na-100e34e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63228%3A%20n%2Fa&amp;severity=critical&amp;id=691cd3b5b044fc99aa3e1008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63225-na-2b318b8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63225%3A%20n%2Fa&amp;severity=critical&amp;id=691cd1d3b044fc99aa3c771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63227-na-dc4d6627</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63227%3A%20n%2Fa&amp;severity=high&amp;id=691ccaa45990fe54bdf5a3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63226-na-a392e3b7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63226%3A%20n%2Fa&amp;severity=medium&amp;id=691cc7215990fe54bdf056a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63994-na-bc7f8126</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63994%3A%20n%2Fa&amp;severity=critical&amp;id=691cc5445990fe54bdeeceda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63695-na-55b6320d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63695%3A%20n%2Fa&amp;severity=critical&amp;id=691cc5445990fe54bdeeced6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63955-na-29b549c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63955%3A%20n%2Fa&amp;severity=high&amp;id=691cc1a5fcab56a016e2a048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63749-na-61333b1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63749%3A%20n%2Fa&amp;severity=medium&amp;id=691cc1a5fcab56a016e2a045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60455-na-e975b468</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60455%3A%20n%2Fa&amp;severity=high&amp;id=691cc1a4fcab56a016e27ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54321-na-0086e060</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54321%3A%20n%2Fa&amp;severity=critical&amp;id=691cc1a4fcab56a016e27ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56499-na-01ab51de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56499%3A%20n%2Fa&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54320-na-9511da1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54320%3A%20n%2Fa&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63693-na-b311c0cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63693%3A%20n%2Fa&amp;severity=medium&amp;id=691cbabbfcab56a016d7f811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63828-na-242fa359</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63828%3A%20n%2Fa&amp;severity=medium&amp;id=691cb8bafcab56a016d65d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63514-na-e473f872</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63514%3A%20n%2Fa&amp;severity=medium&amp;id=691cb8bafcab56a016d65d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56643-na-b06a6f14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56643%3A%20n%2Fa&amp;severity=critical&amp;id=691cb50331331b1c393fbbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64076-na-bc19dbc4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64076%3A%20n%2Fa&amp;severity=high&amp;id=691cb50331331b1c393fbbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63694-na-ab81bdaf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63694%3A%20n%2Fa&amp;severity=critical&amp;id=691cb50331331b1c393fbbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63829-na-b9a83567</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63829%3A%20n%2Fa&amp;severity=medium&amp;id=691cac1d31331b1c39338b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55796-na-dc886065</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55796%3A%20n%2Fa&amp;severity=high&amp;id=691cac1d31331b1c39338b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63513-na-283103e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63513%3A%20n%2Fa&amp;severity=medium&amp;id=691ca514209f2030fafbb909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63258-na-2297ba71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63258%3A%20n%2Fa&amp;severity=medium&amp;id=691ca514209f2030fafbb904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63800-na-5deddf99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63800%3A%20n%2Fa&amp;severity=high&amp;id=691c9c359b9483ee9a7975ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63512-na-be7bfb92</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63512%3A%20n%2Fa&amp;severity=medium&amp;id=691c9c359b9483ee9a7975aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56527-na-72934aa4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56527%3A%20n%2Fa&amp;severity=high&amp;id=691c9c359b9483ee9a7975a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56526-na-19a56d47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56526%3A%20n%2Fa&amp;severity=medium&amp;id=691c9c359b9483ee9a79759e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63604-na-7268a54e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63604%3A%20n%2Fa&amp;severity=medium&amp;id=691c98b19b9483ee9a7411a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63603-na-88b7067e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63603%3A%20n%2Fa&amp;severity=medium&amp;id=691c98b19b9483ee9a7411a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63602-na-60fdeb21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63602%3A%20n%2Fa&amp;severity=high&amp;id=691c93529b9483ee9a6cccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63408-na-bd4f5fa2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63408%3A%20n%2Fa&amp;severity=medium&amp;id=691c901eb718280d68a97e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63892-na-376ed066</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63892%3A%20n%2Fa&amp;severity=medium&amp;id=691c88f8b718280d689a277a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63883-na-2dc6dc67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63883%3A%20n%2Fa&amp;severity=medium&amp;id=691c88f8b718280d689a2777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xctdh-crypto-heist-part-3-yashraj-solanki-9f5f02bf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCTDH%20Crypto%20Heist%20Part%203%20-%20Yashraj%20Solanki&amp;severity=medium&amp;id=691c8529b718280d689345ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-mitigated-the-largest-cloud-ddos-ever-re-307996c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20mitigated%20the%20largest%20cloud%20DDoS%20ever%20recorded%2C%2015.7%20Tbps&amp;severity=medium&amp;id=691bb70ca75c6bac5fb98316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-police-seizes-250-servers-used-by-bulletproo-8b0b4916</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20police%20seizes%20250%20servers%20used%20by%20%E2%80%9Cbulletproof%20hosting%E2%80%9D%20service&amp;severity=high&amp;id=691bb70ca75c6bac5fb98312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/princeton-university-discloses-data-breach-affecti-74e682ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Princeton%20University%20discloses%20data%20breach%20affecting%20donors%2C%20alumni&amp;severity=high&amp;id=691bb70ca75c6bac5fb9830e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eurofiber-france-warns-of-breach-after-hacker-trie-6c3849bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eurofiber%20France%20warns%20of%20breach%20after%20hacker%20tries%20to%20sell%20customer%20data&amp;severity=high&amp;id=691bb70ca75c6bac5fb9830a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13306-command-injection-in-d-link-dwr-m92-684b81c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13306%3A%20Command%20Injection%20in%20D-Link%20DWR-M920&amp;severity=medium&amp;id=691bb389a75c6bac5fb415b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13230-type-confusion-in-google-chrome-6bb46a80</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13230%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13229-type-confusion-in-google-chrome-4bf79d83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13229%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13228-type-confusion-in-google-chrome-b865d10a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13228%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13227-type-confusion-in-google-chrome-210ef1ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13227%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13226-type-confusion-in-google-chrome-c8165382</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13226%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13224-type-confusion-in-google-chrome-775058da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13224%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bac8aa75c6bac5fab647d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13223-type-confusion-in-google-chrome-06120bf1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13223%3A%20Vulnerability%20in%20Google%20Chrome&amp;severity=high&amp;id=691bac8aa75c6bac5fab6479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13305-buffer-overflow-in-d-link-dwr-m920-37aeaa2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13305%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=691bac8aa75c6bac5fab6481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31649-cwe-908-use-of-uninitialized-resour-cd9e5c59</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31649%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c9502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31361-cwe-908-use-of-uninitialized-resour-bae09bb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31361%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c94fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36463-cwe-805-buffer-access-with-incorrec-e2354285</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36463%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c950e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36462-cwe-805-buffer-access-with-incorrec-507cd900</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36462%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c950a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36461-cwe-805-buffer-access-with-incorrec-95e6b3f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36461%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c9506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36460-cwe-805-buffer-access-with-incorrec-e65b38e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36460%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691ba72ebb922d226277cd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32089-cwe-120-buffer-copy-without-checkin-4b61881c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32089%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691ba3aabb922d226272e03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13304-buffer-overflow-in-d-link-dwr-m920-28cafbb3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13304%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=691ba3aabb922d226272e02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7711-cwe-94-improper-control-of-generatio-991747f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7711%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20AI-Powered%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=691ba3aabb922d226272e042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36553-cwe-120-buffer-copy-without-checkin-29f1dbf6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36553%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691ba3aabb922d226272e03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13303-sql-injection-in-code-projects-cour-e88dba4c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13303%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=691ba1c4bb922d22627154ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64766-cwe-798-use-of-hard-coded-credentia-19e41cf6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64766%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20NixOS%20nixpkgs&amp;severity=medium&amp;id=691b98f601a6b16707f49d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13302-sql-injection-in-code-projects-cour-9755ab2d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13302%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=691b98f601a6b16707f49d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-fortinet-fortiweb-waf-bug-exploited-in-th-0d45240c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Fortinet%20FortiWeb%20WAF%20Bug%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=691bc6a3d4c3ef3c7a5bc8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13301-sql-injection-in-itsourcecode-web-b-995d91be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13301%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b957101a6b16707efdd0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-citizens-plead-guilty-to-aiding-north-korean-it-7f6562fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Citizens%20Plead%20Guilty%20to%20Aiding%20North%20Korean%20IT%20Worker%20Campaigns&amp;severity=medium&amp;id=691bc6a3d4c3ef3c7a5bc8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36118-cwe-244-improper-clearing-of-heap-m-b1a08026</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36118%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Storage%20Virtualize&amp;severity=high&amp;id=691b8c9b26779d9a5eb718c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13300-sql-injection-in-itsourcecode-web-b-e5cd5982</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13300%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b891926779d9a5eb241ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36299-cwe-540-in-ibm-ibm-planning-analyti-e452ad68</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36299%3A%20CWE-540%20in%20IBM%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=691b821c26779d9a5ea959fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36357-cwe-36-in-ibm-ibm-planning-analytic-2b1c2efd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36357%3A%20CWE-36%20in%20IBM%20IBM%20Planning%20Analytics%20Local&amp;severity=high&amp;id=691b821c26779d9a5ea959fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13299-sql-injection-in-itsourcecode-web-b-f1c6d198</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13299%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b800b6e6bf6953cd4fd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13298-sql-injection-in-itsourcecode-web-b-ea95dff2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13298%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b7c896e6bf6953cd06d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n-able-n-central-from-n-days-to-0-days-36e1fdd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=N-able%20N-central%3A%20From%20N-days%20to%200-days&amp;severity=medium&amp;id=691b6ff3f84694138de3dbd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cats-got-your-files-lynx-ransomware-45d707bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cat&apos;s%20Got%20Your%20Files%3A%20Lynx%20Ransomware&amp;severity=medium&amp;id=691bd87cd4c3ef3c7a5e99cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13297-sql-injection-in-itsourcecode-web-b-3717c6aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13297%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b66e9c08982598afd8f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dragon-breath-uses-roningloader-to-disable-securit-a50c2143</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dragon%20Breath%20Uses%20RONINGLOADER%20to%20Disable%20Security%20Tools%20and%20Deploy%20Gh0st%20RAT&amp;severity=high&amp;id=691b6369c08982598af82f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-confirms-major-disruption-and-19-6bdd0287</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20confirms%20major%20disruption%20and%20%C2%A3196M%20cost%20from%20September%20cyberattack&amp;severity=medium&amp;id=691b6369c08982598af82f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pennsylvania-ag-confirms-data-breach-after-inc-ran-9cb2fe24</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pennsylvania%20AG%20confirms%20data%20breach%20after%20INC%20Ransom%20attack&amp;severity=high&amp;id=691b6369c08982598af82f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34323-cwe-732-incorrect-permission-assign-1cc70422</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34323%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=691b639ec08982598af882b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34322-cwe-78-improper-neutralization-of-s-3c5dcdcc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34322%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=691b68f8f84694138ddb8361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55059-cwe-79-improper-neutralization-of-i-63fc8af8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5fe0c08982598af311d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55058-cwe-20-improper-input-validation-in-ef23a1a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55058%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5fe0c08982598af311cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55057-multiple-cwe-352-cross-site-request-733d1102</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55057%3A%20Multiple%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5ce0c08982598af07849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64756-cwe-78-improper-neutralization-of-s-19997de1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64756%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20isaacs%20node-glob&amp;severity=high&amp;id=691b5ce0c08982598af07855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55056-multiple-cwe-79-improper-neutraliza-7d5336a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55056%3A%20Multiple%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5ce0c08982598af07846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55055-cwe-78-improper-neutralization-of-s-41c872e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55055%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5ce0c08982598af07843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64758-cwe-79-improper-neutralization-of-i-9d748d18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64758%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DependencyTrack%20frontend&amp;severity=medium&amp;id=691b5ce0c08982598af07859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64342-cwe-754-improper-check-for-unusual--a47d3085</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64342%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=691b5ce0c08982598af0784c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58407-cwe-cwe-367-time-of-check-time-of-u-df862441</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58407%3A%20CWE%20-%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=691b5a78903b8a3ddb6f53a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13193-incorrect-default-permissions-in-re-3cbaa734</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13193%3A%20Incorrect%20Default%20Permissions&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13291-sql-injection-in-campcodes-supplier-183047f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13291%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58410-cwe-cwe-280-improper-handling-of-in-4dc99d04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58410%3A%20CWE%20-%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=691b56f4903b8a3ddb69fcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-evalusion-clickfix-campaign-delivers-amatera-s-b7fae61f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20EVALUSION%20ClickFix%20Campaign%20Delivers%20Amatera%20Stealer%20and%20NetSupport%20RAT&amp;severity=medium&amp;id=691bc610d4c3ef3c7a5b4586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62519-cwe-89-improper-neutralization-of-s-2c1edf22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62519%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=691b5380903b8a3ddb64b9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-says-it-stole-data-of-millions--ba294bbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Says%20It%20Stole%20Data%20of%20Millions%20of%20Under%20Armour%20Customers%20and%20345GB%20of%20Internal%20Records&amp;severity=medium&amp;id=691b536d903b8a3ddb64b2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13319-cwe-20-improper-input-validation-in-6a8b1d67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13319%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Nettec%20AS%20Digi%20On-Prem%20Manager&amp;severity=high&amp;id=691b5188903b8a3ddb62ff68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13290-sql-injection-in-code-projects-simp-45c18c8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13290%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13289-sql-injection-in-1000projects-desig-c7ba0f94</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13289%3A%20SQL%20Injection%20in%201000projects%20Design%20%26%20Development%20of%20Student%20Database%20Management%20System&amp;severity=medium&amp;id=691b4a4dbf18c64a4b316bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cracker-barrel-vulnerability-5947abfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Cracker%20Barrel%20vulnerability&amp;severity=medium&amp;id=691b4344bf18c64a4b25e07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-issue-paves-way-for-credential-stealing-att-0217f173</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%20Issue%20Paves%20Way%20for%20Credential-Stealing%20Attacks&amp;severity=low&amp;id=691bc6a3d4c3ef3c7a5bc8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13288-buffer-overflow-in-tenda-ch22-258d55c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13288%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=691b46c7bf18c64a4b2b8198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4321-cwe-240-improper-handling-of-inconsi-cf418d26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4321%3A%20CWE-240%20Improper%20Handling%20of%20Inconsistent%20Structural%20Elements%20in%20silabs.com%20RS9116W&amp;severity=high&amp;id=691b3a49c14a66f6d6c9eb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13287-sql-injection-in-itsourcecode-onlin-6ca6ee03</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13287%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=691b33e6c14a66f6d6c06a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-target-defense-and-government-offi-ec571e6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Target%20Defense%20and%20Government%20Officials%20in%20Ongoing%20Campaign&amp;severity=medium&amp;id=691b33cac14a66f6d6c02cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13286-sql-injection-in-itsourcecode-onlin-8c10d189</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13286%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=691b2dc5884abd7c70dc0f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13285-sql-injection-in-itsourcecode-onlin-58493ec7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13285%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=691b26c7884abd7c70d2416e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/echogram-flaw-bypasses-guardrails-in-major-llms-705e0e83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EchoGram%20Flaw%20Bypasses%20Guardrails%20in%20Major%20LLMs&amp;severity=medium&amp;id=691b24c1e3df22298b284cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13280-sql-injection-in-codeastro-simple-i-9afbf9bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13280%3A%20SQL%20Injection%20in%20CodeAstro%20Simple%20Inventory%20System&amp;severity=medium&amp;id=691b2143e3df22298b219e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doordash-says-personal-information-stolen-in-data--f50b034d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoorDash%20Says%20Personal%20Information%20Stolen%20in%20Data%20Breach&amp;severity=medium&amp;id=691b1db9e3df22298b1bd5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5-plead-guilty-in-us-to-helping-north-korean-it-wo-90f53e55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5%20Plead%20Guilty%20in%20US%20to%20Helping%20North%20Korean%20IT%20Workers&amp;severity=medium&amp;id=691b1a9fe3df22298b18666d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-fortinet-exploited-chinas-ai-hacks-ph-c4f4d2e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Fortinet%20Exploited%2C%20China&apos;s%20AI%20Hacks%2C%20PhaaS%20Empire%20Falls%20%26%20More&amp;severity=medium&amp;id=691b2660e3df22298b29a4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13279-sql-injection-in-code-projects-nero-ac54ed4c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13279%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=691b1ab3e3df22298b18a286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13278-sql-injection-in-projectworlds-adva-4f807721</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13278%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691b14b667e4f3aad62a0225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5-reasons-why-attackers-are-phishing-over-linkedin-2eeafac1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5%20Reasons%20Why%20Attackers%20Are%20Phishing%20Over%20LinkedIn&amp;severity=medium&amp;id=691b2660e3df22298b29a4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40936-cwe-125-out-of-bounds-read-in-sieme-241e804e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40936%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20PS%2FIGES%20Parasolid%20Translator%20Component&amp;severity=high&amp;id=691b0bd1502dbbeec6e1cf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40834-cwe-79-improper-neutralization-of-i-0f2ab76b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40834%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20Mendix%20RichText&amp;severity=medium&amp;id=691b0bd1502dbbeec6e1cf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13277-sql-injection-in-code-projects-nero-a150bb07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13277%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=691b0bd1502dbbeec6e1cf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11681-cwe-400-uncontrolled-resource-consu-b54a5fa7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11681%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=high&amp;id=691b0bd1502dbbeec6e1cf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dragon-breath-uses-roningloader-to-disable-securit-294e54ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dragon%20Breath%20Uses%20RONINGLOADER%20to%20Disable%20Security%20Tools%20and%20Deploy%20Gh0st%20RAT&amp;severity=medium&amp;id=691b0d52502dbbeec6e296f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/logitech-confirms-data-breach-following-designatio-e264d6f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Logitech%20Confirms%20Data%20Breach%20Following%20Designation%20as%20Oracle%20Hack%20Victim&amp;severity=low&amp;id=691b04c5502dbbeec6d6a1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/widespread-exploitation-of-xwiki-vulnerability-obs-f10fb388</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Widespread%20Exploitation%20of%20XWiki%20Vulnerability%20Observed&amp;severity=medium&amp;id=691b04c5502dbbeec6d6a1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/17th-november-threat-intelligence-report-6d2aa196</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=17th%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=691b01b1502dbbeec6d34efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13276-sql-injection-in-g33kyrash-online-b-0c89b930</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13276%3A%20SQL%20Injection%20in%20g33kyrash%20Online-Banking-System&amp;severity=medium&amp;id=691b0db867e4f3aad6206f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13275-unrestricted-upload-in-iqbolshoh-ph-448444ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13275%3A%20Unrestricted%20Upload%20in%20Iqbolshoh%20php-business-website&amp;severity=medium&amp;id=691afbcd631894e18a64dcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rust-adoption-drives-android-memory-safety-bugs-be-c5fa767e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rust%20Adoption%20Drives%20Android%20Memory%20Safety%20Bugs%20Below%2020%25%20for%20First%20Time&amp;severity=high&amp;id=691af824631894e18a5ef98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13274-sql-injection-in-campcodes-school-f-268c6857</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13274%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691b01b0502dbbeec6d34d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13273-sql-injection-in-campcodes-school-f-0467b1ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13273%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691aef39a2e1787363359ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13272-sql-injection-in-campcodes-school-f-99bfccbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13272%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691ae642a21117b502ed9957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13271-sql-injection-in-campcodes-school-f-6ef7343d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13271%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691adf3aa21117b502e22de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13270-sql-injection-in-campcodes-school-f-216add20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13270%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691ad9de77ef4e346a52dea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13269-sql-injection-in-campcodes-school-f-a85d80e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13269%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691ad0ec77ef4e346a4686cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/decoding-binary-numeric-expressions-mon-nov-17th-fe2233e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Decoding%20Binary%20Numeric%20Expressions%2C%20(Mon%2C%20Nov%2017th)&amp;severity=low&amp;id=691acd5a848ad39aa20de2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13268-injection-in-dromara-datacompare-0e9e163f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13268%3A%20Injection%20in%20Dromara%20dataCompare&amp;severity=medium&amp;id=691acd6f848ad39aa20e3f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13165-cwe-770-allocation-of-resources-wit-944a9dc8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13165%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Digiwin%20EasyFlow%20GP&amp;severity=high&amp;id=691ac658848ad39aa203c516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13267-sql-injection-in-sourcecodester-den-21f44f6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13267%3A%20SQL%20Injection%20in%20SourceCodester%20Dental%20Clinic%20Appointment%20Reservation%20System&amp;severity=medium&amp;id=691ac658848ad39aa203c51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13164-cwe-522-insufficiently-protected-cr-33d570e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13164%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Digiwin%20EasyFlow%20GP&amp;severity=medium&amp;id=691ac33f848ad39aa20115d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13163-cwe-522-insufficiently-protected-cr-965e214e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13163%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Digiwin%20EasyFlow%20GP&amp;severity=medium&amp;id=691ac33f848ad39aa20115d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13266-path-traversal-in-wwwlike-vlife-7e1577fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13266%3A%20Path%20Traversal%20in%20wwwlike%20vlife&amp;severity=medium&amp;id=691abd7c1ba1a3acd855a6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rust-adoption-drives-android-memory-safety-bugs-be-d85bd9a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rust%20Adoption%20Drives%20Android%20Memory%20Safety%20Bugs%20Below%2020%25%20for%20First%20Time&amp;severity=low&amp;id=691ae7b2a21117b502eef093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9501-cwe-78-os-command-injection-in-w3-to-58cc2bce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9501%3A%20CWE-78%20OS%20Command%20Injection%20in%20W3%20Total%20Cache&amp;severity=critical&amp;id=691abd7c1ba1a3acd855a6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60022-improper-certificate-validation-in--1e5631cd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60022%3A%20Improper%20certificate%20validation%20in%20KDDI%20CORPORATION%20&apos;%E3%83%87%E3%82%B8%E3%83%A9%E3%82%A2%E3%83%97%E3%83%AA&apos;%20App%20for%20iOS&amp;severity=medium&amp;id=691ab9fc1ba1a3acd84ff7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13265-path-traversal-in-lsfusion-platform-06acf530</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13265%3A%20Path%20Traversal%20in%20lsfusion%20platform&amp;severity=medium&amp;id=691ab4bd8eaa519f4313878d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13264-sql-injection-in-sourcecodester-onl-2ed07e64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13264%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Magazine%20Management%20System&amp;severity=medium&amp;id=691aadb58eaa519f4308c9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13263-sql-injection-in-sourcecodester-onl-9b0763a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13263%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Magazine%20Management%20System&amp;severity=medium&amp;id=691aa8617644a7cc141f22d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13262-path-traversal-in-lsfusion-platform-e4d614d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13262%3A%20Path%20Traversal%20in%20lsfusion%20platform&amp;severity=medium&amp;id=691aaaae8eaa519f4305faf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13261-path-traversal-in-lsfusion-platform-0bd80ffb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13261%3A%20Path%20Traversal%20in%20lsfusion%20platform&amp;severity=medium&amp;id=691a9d62c118c0da2e5d7e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13283-cwe-352-cross-site-request-forgery--0bcb621a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13283%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chunghwa%20Telecom%20TenderDocTransfer&amp;severity=high&amp;id=691a9d62c118c0da2e5d7ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13282-cwe-352-cross-site-request-forgery--6b3e8d3f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13282%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chunghwa%20Telecom%20TenderDocTransfer&amp;severity=high&amp;id=691a967cc118c0da2e5a3ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13260-sql-injection-in-campcodes-supplier-27b3f684</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13260%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691a967cc118c0da2e5a3b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10460-cwe-20-improper-input-validation-in-45eca59b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10460%3A%20CWE-20%20Improper%20Input%20Validation%20in%20BEIMS%20Contractor%20Web&amp;severity=critical&amp;id=691a8f51c118c0da2e582c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13259-sql-injection-in-campcodes-supplier-21b0de01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13259%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691a8f51c118c0da2e582c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13258-buffer-overflow-in-tenda-ac20-f036b48b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13258%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=691a8851c118c0da2e55dfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13257-sql-injection-in-itsourcecode-inven-9b2345a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13257%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691a8142c118c0da2e53955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aipac-says-hundreds-affected-in-data-breach-30582189</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AIPAC%20Says%20Hundreds%20Affected%20in%20Data%20Breach&amp;severity=high&amp;id=691a7dbac118c0da2e4bc9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13256-sql-injection-in-projectworlds-adva-e93f7815</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13256%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a76b5c118c0da2e3dce34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13255-sql-injection-in-projectworlds-adva-fd882eac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13255%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a6fd3c118c0da2e30eb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13254-sql-injection-in-projectworlds-adva-0c6bbd91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13254%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a6fd3c118c0da2e30eb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-17-7c533ee4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-17&amp;severity=medium&amp;id=691bb86aa75c6bac5fb9fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44664-na-41c1fd24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44664%3A%20n%2Fa&amp;severity=medium&amp;id=691b800b6e6bf6953cd4fd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44659-na-1e26051b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44659%3A%20n%2Fa&amp;severity=critical&amp;id=691b800b6e6bf6953cd4fd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44661-na-fe2a0902</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44661%3A%20n%2Fa&amp;severity=medium&amp;id=691b7c896e6bf6953cd06d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44662-na-f65a277d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44662%3A%20n%2Fa&amp;severity=medium&amp;id=691b7378f84694138de869a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44660-na-053b8e33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44660%3A%20n%2Fa&amp;severity=medium&amp;id=691b7378f84694138de869a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44663-na-02be901c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44663%3A%20n%2Fa&amp;severity=medium&amp;id=691b6ff3f84694138de3dbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44658-na-3c5d3bcc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44658%3A%20n%2Fa&amp;severity=medium&amp;id=691b6ff3f84694138de3dbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46335-na-dffb3a48</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46335%3A%20n%2Fa&amp;severity=medium&amp;id=691b6c6ff84694138ddf7098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44651-na-9a6019d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44651%3A%20n%2Fa&amp;severity=medium&amp;id=691b68f8f84694138ddb835d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63292-na-fa91762f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63292%3A%20n%2Fa&amp;severity=low&amp;id=691b68f8f84694138ddb8359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44655-na-012e74d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44655%3A%20n%2Fa&amp;severity=medium&amp;id=691b68f8f84694138ddb8355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44654-na-89398cf3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44654%3A%20n%2Fa&amp;severity=medium&amp;id=691b68f8f84694138ddb8351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44657-na-f598d25a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44657%3A%20n%2Fa&amp;severity=medium&amp;id=691b66e9c08982598afd8f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44653-na-102b5c3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44653%3A%20n%2Fa&amp;severity=medium&amp;id=691b639ec08982598af882ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46336-na-105acde7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46336%3A%20n%2Fa&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44652-na-6cc58d69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44652%3A%20n%2Fa&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46334-na-7f89b4e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46334%3A%20n%2Fa&amp;severity=medium&amp;id=691b5380903b8a3ddb64b9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44648-na-3b64b4ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44648%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44647-na-767b1429</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44647%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44644-na-3edff7d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44644%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44641-na-82751bf0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44641%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63918-na-a9f9ac2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63918%3A%20n%2Fa&amp;severity=medium&amp;id=691b4e50b1dcb1316b016571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63917-na-ba45e176</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63917%3A%20n%2Fa&amp;severity=high&amp;id=691b4e4fb1dcb1316b01656b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63916-na-60e5aa6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63916%3A%20n%2Fa&amp;severity=high&amp;id=691b4a4dbf18c64a4b316bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63748-na-3aed058c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63748%3A%20n%2Fa&amp;severity=high&amp;id=691b4a4dbf18c64a4b316bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63747-na-080ae277</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63747%3A%20n%2Fa&amp;severity=critical&amp;id=691b4a4dbf18c64a4b316be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64046-na-73f2af6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64046%3A%20n%2Fa&amp;severity=medium&amp;id=691b46c6bf18c64a4b2b8194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65083-cwe-295-improper-certificate-valida-4e03f5db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65083%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Tinexta%20Infocert%20GoSign%20Desktop&amp;severity=low&amp;id=691b46c6bf18c64a4b2b8190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63708-na-898dc99f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63708%3A%20n%2Fa&amp;severity=medium&amp;id=691b46c6bf18c64a4b2b818c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65073-na-3fc701d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65073%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenStack%20Keystone&amp;severity=high&amp;id=691ad1de77ef4e346a475a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13253-sql-injection-in-projectworlds-adva-45b36b4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13253%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a6057bc1ae26b3e2e5df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13252-hard-coded-credentials-in-shsuishan-64031bd6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13252%3A%20Hard-coded%20Credentials%20in%20shsuishang%20ShopSuite%20ModulithShop&amp;severity=medium&amp;id=691a5aab40bd38dff3126b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reposecu-free-3-in-1-sast-scanner-for-github-semgr-18b8b86a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reposecu%3A%20Free%203-in-1%20SAST%20Scanner%20for%20GitHub%20(Semgrep%20%2B%20Trivy%20%2B%20Detect-Secrets)%20%E2%80%93%20Beta%20Feedback%20Welcome&amp;severity=medium&amp;id=691a21218a2260cc8e952608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13251-sql-injection-in-weiye-jing-datax-w-109f851e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13251%3A%20SQL%20Injection%20in%20WeiYe-Jing%20datax-web&amp;severity=medium&amp;id=6919ceee66db7136d9af53ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13250-improper-access-controls-in-weiye-j-95b6bf21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13250%3A%20Improper%20Access%20Controls%20in%20WeiYe-Jing%20datax-web&amp;severity=medium&amp;id=6919c1b3f176205dc4fad9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13249-unrestricted-upload-in-jiusi-oa-f3d4e085</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13249%3A%20Unrestricted%20Upload%20in%20Jiusi%20OA&amp;severity=medium&amp;id=6919b890ea52702b1491872e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13248-sql-injection-in-sourcecodester-pat-153faa2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13248%3A%20SQL%20Injection%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=6919b363cd4374a700c8728d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-ai-ran-autonomous-espionage-operations-0f7ef30c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20AI%20ran%20autonomous%20espionage%20operations&amp;severity=medium&amp;id=6919afe3cd4374a700c3a5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13247-sql-injection-in-phpgurukul-tourism-7500ee86</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13247%3A%20SQL%20Injection%20in%20PHPGurukul%20Tourism%20Management%20System&amp;severity=medium&amp;id=6919ac5acd4374a700bea47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13246-path-traversal-in-shsuishang-shopsu-46b60442</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13246%3A%20Path%20Traversal%20in%20shsuishang%20ShopSuite%20ModulithShop&amp;severity=medium&amp;id=6919aa6fcd4374a700bd6ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13245-cross-site-scripting-in-code-projec-7daf8f03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13245%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69199619be70e745c858593a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13244-cross-site-scripting-in-code-projec-011444cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13244%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69198d7a1be9ed16ddc78a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13243-sql-injection-in-code-projects-stud-e5f136cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13243%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=691987a9349a492776909535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13242-sql-injection-in-code-projects-stud-53b30022</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13242%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=691980a1349a492776852116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fingerexe-x26-clickfix-sun-nov-16th-df340bd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x26%3B%23xa%3BFinger.exe%20%26%23x26%3B%20ClickFix%2C%20(Sun%2C%20Nov%2016th)&amp;severity=medium&amp;id=69197d8c349a492776829d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13241-sql-injection-in-code-projects-stud-742f4732</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13241%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69197b67f90981bc0ff20957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13240-sql-injection-in-code-projects-stud-04f4cbcf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13240%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69197159f90981bc0fe630f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13239-enforcement-of-behavioral-workflow--a40ec0c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13239%3A%20Enforcement%20of%20Behavioral%20Workflow%20in%20Bdtask%20Isshue%20Multi%20Store%20eCommerce%20Shopping%20Cart%20Solution&amp;severity=medium&amp;id=69196bbd3a8d0e8ca2f8dfda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13238-unrestricted-upload-in-bdtask-fligh-2972affc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13238%3A%20Unrestricted%20Upload%20in%20Bdtask%20Flight%20Booking%20Software&amp;severity=medium&amp;id=69196324d6c6237fbda66dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13237-sql-injection-in-itsourcecode-inven-fd0d1eee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13237%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=69195fa0d6c6237fbda1960e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12482-cwe-89-improper-neutralization-of-s-530517f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12482%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=high&amp;id=6919535f826a51df38f44767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13236-sql-injection-in-itsourcecode-inven-372cae7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13236%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=69195912d6c6237fbd9a14d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13235-sql-injection-in-itsourcecode-inven-a95719f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13235%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691948fab279ec117793ceeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13234-sql-injection-in-itsourcecode-inven-230a0b88</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13234%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691941f1b279ec117792a9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13233-sql-injection-in-itsourcecode-inven-cf1d5c47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13233%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691941f1b279ec117792a9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13232-cross-site-scripting-in-projectsend-abd607e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13232%3A%20Cross%20Site%20Scripting%20in%20projectsend&amp;severity=medium&amp;id=691925d1b279ec11778c28a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-16-026ecbe8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-16&amp;severity=medium&amp;id=691a6a54bc1ae26b3e3b67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-exploits-unpatched-xwiki-servers-to-pull--f6506c38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Exploits%20Unpatched%20XWiki%20Servers%20to%20Pull%20More%20Devices%20Into%20Its%20Botnet&amp;severity=high&amp;id=6919166609545414a9be6972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/decades-old-finger-protocol-abused-in-clickfix-mal-6e4a26f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Decades-old%20%E2%80%98Finger%E2%80%99%20protocol%20abused%20in%20ClickFix%20malware%20attacks&amp;severity=high&amp;id=6919166609545414a9be6977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-vulnerabilities-in-gosign-desktop-lead-to-5f5b6dab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20Vulnerabilities%20in%20GoSign%20Desktop%20lead%20to%20Remote%20Code%20Execution&amp;severity=medium&amp;id=6919166609545414a9be697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13221-unprotected-storage-of-credentials--1d294bd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13221%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Intelbras%20UnniTI&amp;severity=medium&amp;id=6918d703cdb3e870ee55d48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13210-sql-injection-in-itsourcecode-inven-2ceb90c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13210%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=6918d21a583c8b7d37900dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doordash-hit-by-new-data-breach-after-an-employee--116ee313</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoorDash%20hit%20by%20new%20data%20breach%20after%20an%20employee%20falls%20for%20social%20engineering%20scam&amp;severity=high&amp;id=6918cb0e583c8b7d3786ce3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13209-xml-external-entity-reference-in-be-372dc688</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13209%3A%20XML%20External%20Entity%20Reference%20in%20bestfeng%20oa_git_free&amp;severity=medium&amp;id=6918d42bcdb3e870ee534ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13208-sql-injection-in-fantasticlbp-hotel-eab451f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13208%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels%20Server&amp;severity=medium&amp;id=6918c2a66c45b14c393afde5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13203-sql-injection-in-code-projects-simp-036d531f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13203%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=6918bc476c45b14c39340630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13202-cross-site-scripting-in-code-projec-19e4a0a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13202%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=6918b301838c73fda942a5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-exploits-unpatched-xwiki-servers-to-pull--2bf18a2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Exploits%20Unpatched%20XWiki%20Servers%20to%20Pull%20More%20Devices%20Into%20Its%20Botnet&amp;severity=critical&amp;id=6918adf344c00f9fdd5f0721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberrecon-project-baddb41f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CyberRecon%20project&amp;severity=medium&amp;id=6918aa8544c00f9fdd5ab1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13201-sql-injection-in-code-projects-simp-efeafebd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13201%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=6918b028838c73fda94019c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13200-exposure-of-information-through-dir-323502f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13200%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=6918a1f63494992e767dd3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/att-data-breach-settlement-deadline-nears-for-clai-c7e13e08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AT%26T%20Data%20Breach%20Settlement%20Deadline%20Nears%20for%20Claims%20Up%20to%20%247%2C500&amp;severity=high&amp;id=6918866ebddd42d2a8c78f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/logitech-confirms-data-breach-after-clop-extortion-f2a8999d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Logitech%20confirms%20data%20breach%20after%20Clop%20extortion%20attack&amp;severity=high&amp;id=691882e5bddd42d2a8c27d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digital-doppelgangers-anatomy-of-evolving-imperson-46bd85e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Digital%20Doppelgangers%3A%20Anatomy%20of%20Evolving%20Impersonation%20Campaigns%20Distributing%20Gh0st%20RAT&amp;severity=medium&amp;id=691882e5bddd42d2a8c27d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-plead-guilty-in-us-for-helping-north-korean-i-fe02968e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20Plead%20Guilty%20in%20U.S.%20for%20Helping%20North%20Korean%20IT%20Workers%20Infiltrate%20136%20Companies&amp;severity=high&amp;id=691882e5bddd42d2a8c27d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/face-scrapper-ai-like-faceseek-netsec-analysis-32081dd8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Face%20Scrapper%20Ai%20like%20faceSeek%20-netsec%20analysis&amp;severity=medium&amp;id=69187deee1cec89a0573d3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13199-path-traversal-filedir-in-code-proj-a9437a15</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13199%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20code-projects%20Email%20Logging%20Interface&amp;severity=medium&amp;id=69185a1a429a1e97bc072ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-plead-guilty-in-us-for-helping-north-korean-i-f91beefe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20Plead%20Guilty%20in%20U.S.%20for%20Helping%20North%20Korean%20IT%20Workers%20Infiltrate%20136%20Companies&amp;severity=low&amp;id=6919279ab279ec11778d97e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeypot-fortiweb-cve-2025-64446-exploits-sat-nov--4c79cbeb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Honeypot%3A%20FortiWeb%20CVE-2025-64446%20Exploits%2C%20(Sat%2C%20Nov%2015th)&amp;severity=medium&amp;id=69184e1c5aa1a593e1cc40bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13198-unrestricted-upload-in-douphp-14075958</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13198%3A%20Unrestricted%20Upload%20in%20DouPHP&amp;severity=medium&amp;id=691844485aa1a593e1c111b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13191-stack-based-buffer-overflow-in-d-li-be124aec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13191%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=high&amp;id=69182a67b7cdcddb4cb0121f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12849-cwe-862-missing-authorization-in-co-0ac7e244</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12849%3A%20CWE-862%20Missing%20Authorization%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=69182360b7cdcddb4ca68f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13190-stack-based-buffer-overflow-in-d-li-386fd159</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13190%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=high&amp;id=69181fe6b7cdcddb4ca2270b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13189-stack-based-buffer-overflow-in-d-li-31fd3f4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13189%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=high&amp;id=69181a9193cc35e7aa416d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digital-doppelgangers-anatomy-of-evolving-imperson-6d47f8ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Digital%20Doppelgangers%3A%20Anatomy%20of%20Evolving%20Impersonation%20Campaigns%20Distributing%20Gh0st%20RAT&amp;severity=medium&amp;id=691aebada2e17873632ea95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12494-cwe-285-improper-authorization-in-w-7eb45f23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12494%3A%20CWE-285%20Improper%20Authorization%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=6918143b93cc35e7aa3af0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8994-cwe-89-improper-neutralization-of-sp-01e256ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8994%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20Project%20Manager%20%E2%80%93%20AI%20Powered%20Project%20Management%2C%20Task%20Management%2C%20Kanban%20Board%20%26%20Time%20Tracker&amp;severity=medium&amp;id=6918143b93cc35e7aa3af0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12847-cwe-862-missing-authorization-in-sm-ab2c82a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12847%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20All%20in%20One%20SEO%20%E2%80%93%20Powerful%20SEO%20Plugin%20to%20Boost%20SEO%20Rankings%20%26%20Increase%20Traffic&amp;severity=medium&amp;id=6918143b93cc35e7aa3af0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-closer-look-at-outlook-macros-and-more-09057529</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Closer%20Look%20at%20Outlook%20Macros%20and%20More&amp;severity=medium&amp;id=691aebada2e17873632ea951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-ai-is-fueling-a-new-wave-of-black-friday-scams-93c85b2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20AI%20Is%20Fueling%20a%20New%20Wave%20of%20Black%20Friday%20Scams&amp;severity=medium&amp;id=691aef31a2e178736335862b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12182-cwe-284-improper-access-control-in--8dc59ec4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12182%3A%20CWE-284%20Improper%20Access%20Control%20in%20qodeinteractive%20Qi%20Blocks&amp;severity=medium&amp;id=6917f71bb6d0b801e4d2e75f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-15-c5648ff5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-15&amp;severity=medium&amp;id=6919165309545414a9be561f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8386-cwe-80-in-aveva-application-server-a9f86cae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8386%3A%20CWE-80%20in%20AVEVA%20Application%20Server&amp;severity=medium&amp;id=6917c40aed594783724e114b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9317-cwe-327-in-aveva-edge-e409a7a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9317%3A%20CWE-327%20in%20AVEVA%20Edge&amp;severity=high&amp;id=6917c40aed594783724e1150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64309-cwe-523-in-brightpick-ai-brightpick-d41753a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64309%3A%20CWE-523%20in%20Brightpick%20AI%20Brightpick%20Mission%20Control%20%2F%20Internal%20Logic%20Control&amp;severity=high&amp;id=6917c086ed59478372495959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64308-cwe-523-in-brightpick-ai-brightpick-65756869</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64308%3A%20CWE-523%20in%20Brightpick%20AI%20Brightpick%20Mission%20Control%20%2F%20Internal%20Logic%20Control&amp;severity=high&amp;id=6917c086ed59478372495954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64307-cwe-306-in-brightpick-ai-brightpick-ae8adcf8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64307%3A%20CWE-306%20in%20Brightpick%20AI%20Brightpick%20Mission%20Control%20%2F%20Internal%20Logic%20Control&amp;severity=medium&amp;id=6917bd92ed59478372471172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62765-cwe-319-in-general-industrial-contr-068de6a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62765%3A%20CWE-319%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=high&amp;id=6917bd92ed59478372471183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59780-cwe-306-in-general-industrial-contr-57ea6207</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59780%3A%20CWE-306%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=high&amp;id=6917bd92ed5947837247117f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58083-cwe-306-in-general-industrial-contr-be7e139e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58083%3A%20CWE-306%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=critical&amp;id=6917bd92ed5947837247117b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55034-cwe-521-in-general-industrial-contr-fbd7ca64</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55034%3A%20CWE-521%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=high&amp;id=6917bd92ed59478372471177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7328-cwe-306-missing-authentication-for-c-1c8b50d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7328%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=medium&amp;id=6917b3f1290dbf2fa84d9aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13188-stack-based-buffer-overflow-in-d-li-0c93ff6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13188%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=critical&amp;id=6917ae6b6c3a21c7a18a418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13187-unprotected-storage-of-credentials--12815829</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13187%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Intelbras%20ICIP&amp;severity=medium&amp;id=6917aae76c3a21c7a1852eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-raas-targets-nutanix-vms-threatens-critical--dcc4d0a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20RaaS%20Targets%20Nutanix%20VMs%2C%20Threatens%20Critical%20Orgs&amp;severity=critical&amp;id=6917d672b6d0b801e4cd1d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13186-cross-site-scripting-in-bdtask-issh-6a4bc9bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13186%3A%20Cross%20Site%20Scripting%20in%20Bdtask%20Isshue%20Multi%20Store%20eCommerce%20Shopping%20Cart%20Solution&amp;severity=medium&amp;id=6917a20470bcf5e35c56472e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13185-unrestricted-upload-in-bdtask-news3-563af386</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13185%3A%20Unrestricted%20Upload%20in%20Bdtask%20News365&amp;severity=medium&amp;id=69179afc70bcf5e35c4ca9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-security-tools-target-growing-macos-threats-871e7dc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Security%20Tools%20Target%20Growing%20macOS%20Threats&amp;severity=medium&amp;id=6917d672b6d0b801e4cd1d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13182-cross-site-scripting-in-pojoin-h3bl-b8f2eb23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13182%3A%20Cross%20Site%20Scripting%20in%20pojoin%20h3blog&amp;severity=medium&amp;id=6917959ad767b187e9434e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hardened-containers-look-to-eliminate-common-sourc-bb50198a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hardened%20Containers%20Look%20to%20Eliminate%20Common%20Source%20of%20Vulnerabilities&amp;severity=medium&amp;id=69179208d767b187e93e2249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/150000-packages-flood-npm-registry-in-token-farmin-93d1007a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=150%2C000%20Packages%20Flood%20NPM%20Registry%20in%20Token%20Farming%20Campaign&amp;severity=medium&amp;id=6917d672b6d0b801e4cd1d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-confirms-active-exploitation-of-critical--b24a27c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Confirms%20Active%20Exploitation%20of%20Critical%20FortiWeb%20Vulnerability&amp;severity=critical&amp;id=69178e87d767b187e9397d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13181-cross-site-scripting-in-pojoin-h3bl-70b94899</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13181%3A%20Cross%20Site%20Scripting%20in%20pojoin%20h3blog&amp;severity=medium&amp;id=69178ea9d767b187e9398dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13033-interpretation-conflict-in-red-hat--57f98143</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13033%3A%20Interpretation%20Conflict%20in%20Red%20Hat%20Red%20Hat%20Advanced%20Cluster%20Management%20for%20Kubernetes%202&amp;severity=high&amp;id=691785a2901ba91f32301aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13180-basic-cross-site-scripting-in-bdtas-45f5fedf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13180%3A%20Basic%20Cross%20Site%20Scripting%20in%20Bdtask%20Wholesale%20Inventory%20Control%20and%20Inventory%20Management%20System&amp;severity=medium&amp;id=691785a2901ba91f32301afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13179-cross-site-request-forgery-in-bdtas-a0806b5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13179%3A%20Cross-Site%20Request%20Forgery%20in%20Bdtask%20Wholesale%20Inventory%20Control%20and%20Inventory%20Management%20System&amp;severity=medium&amp;id=691785a2901ba91f32301af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13178-basic-cross-site-scripting-in-bdtas-c86b933a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13178%3A%20Basic%20Cross%20Site%20Scripting%20in%20Bdtask%20SalesERP&amp;severity=medium&amp;id=69177ea4901ba91f3226fd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13177-cross-site-request-forgery-in-bdtas-66db0f7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13177%3A%20Cross-Site%20Request%20Forgery%20in%20Bdtask%20SalesERP&amp;severity=medium&amp;id=69177ea4901ba91f3226fd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13174-server-side-request-forgery-in-rach-68148516</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13174%3A%20Server-Side%20Request%20Forgery%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=691779316b210bb35bbae6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-turn-json-services-into-cover-02ea040b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Turn%20JSON%20Services%20into%20Covert%20Malware%20Delivery%20Channels&amp;severity=medium&amp;id=6917bcfbed594783724528cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13172-sql-injection-in-codeastro-gym-mana-8e2e2dee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13172%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=691772da6b210bb35bb4509b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4618-cwe-316-cleartext-storage-of-sensiti-a37766ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4618%3A%20CWE-316%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20Palo%20Alto%20Networks%20Prisma%20Browser&amp;severity=medium&amp;id=691772da6b210bb35bb450a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-attacks-on-cisco-asa-and-fire-1ebad68b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Attacks%20on%20Cisco%20ASA%20and%20Firepower%20Flaws&amp;severity=medium&amp;id=69176cb9db1bcd4e0c8a13c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4617-cwe-424-improper-protection-of-alter-7c47c766</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4617%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20Palo%20Alto%20Networks%20Prisma%20Browser&amp;severity=low&amp;id=691772da6b210bb35bb450a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-launch-spearspecter-spy-operation--30c837e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Launch%20%E2%80%98SpearSpecter%E2%80%99%20Spy%20Operation%20on%20Defense%20%26%20Government%20Targets&amp;severity=high&amp;id=69176cb9db1bcd4e0c8a13bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/millions-of-sites-at-risk-from-imunify360-critical-7df6edc7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Millions%20of%20sites%20at%20risk%20from%20Imunify360%20critical%20flaw%20exploit&amp;severity=critical&amp;id=69176cb9db1bcd4e0c8a13c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/checkoutcom-snubs-hackers-after-data-breach-to-don-eaa141e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Checkout.com%20snubs%20hackers%20after%20data%20breach%2C%20to%20donate%20ransom%20instead&amp;severity=high&amp;id=69176cb9db1bcd4e0c8a13b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4616-cwe-354-improper-validation-of-integ-28294681</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4616%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Palo%20Alto%20Networks%20Prisma%20Browser&amp;severity=low&amp;id=69176937db1bcd4e0c85680b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13171-sql-injection-in-zzcms-26348ba4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13171%3A%20SQL%20Injection%20in%20ZZCMS&amp;severity=medium&amp;id=69176937db1bcd4e0c856804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13204-cwe-1321-improperly-controlled-modi-4f17de25</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13204%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20silentmatt%20expr-eval&amp;severity=high&amp;id=691763c61dec7bb205e65289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/identity-governance-and-administration-app-prolife-6e985ead</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Identity%20Governance%20and%20Administration%2C%20App%20Proliferation%2C%20and%20the%20App%20Integration%20Chasm&amp;severity=medium&amp;id=6917d672b6d0b801e4cd1d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-state-hackers-jailbroke-claude-ai-code-for-65ac7b9a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20State%20Hackers%20Jailbroke%20Claude%20AI%20Code%20for%20Automated%20Breaches&amp;severity=medium&amp;id=691757407ba9501c4c9bf36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13170-sql-injection-in-code-projects-simp-89762270</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13170%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=691753bf7ba9501c4c978717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8870-cwe-248-in-arista-networks-eos-58a7bbba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8870%3A%20CWE-248%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=691753bf7ba9501c4c97871e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64446-escalation-of-privilege-in-fortinet-4a5fe3c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64446%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=critical&amp;id=691753bf7ba9501c4c978725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13169-sql-injection-in-code-projects-simp-ff58b66a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13169%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69174cd17ba9501c4c8e3c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-deepwatch-layoffs-macos-vulnerabilit-6a5fdc62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Deepwatch%20Layoffs%2C%20macOS%20Vulnerability%2C%20Amazon%20AI%20Bug%20Bounty&amp;severity=medium&amp;id=69174cb67ba9501c4c8df1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-serious-ai-bugs-exposing-meta-nvi-0b2014b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Serious%20AI%20Bugs%20Exposing%20Meta%2C%20Nvidia%2C%20and%20Microsoft%20Inference%20Frameworks&amp;severity=critical&amp;id=6917bcfbed594783724528cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13168-sql-injection-in-ury-erp-ury-2315c711</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13168%3A%20SQL%20Injection%20in%20ury-erp%20ury&amp;severity=medium&amp;id=69174732ec553ac0a0d74e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-tech-firm-leak-reportedly-exposes-state-li-9d049120</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Tech%20Firm%20Leak%20Reportedly%20Exposes%20State%20Linked%20Hacking%20Operations&amp;severity=medium&amp;id=691743acec553ac0a0d1e30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-launch-spearspecter-spy-operation--206abe6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Launch%20%E2%80%98SpearSpecter%E2%80%99%20Spy%20Operation%20on%20Defense%20%26%20Government%20Targets&amp;severity=medium&amp;id=6917bcfbed594783724528d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bsi-issues-guidelines-to-counter-evasion-attacks-t-97e5944b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BSI%20issues%20guidelines%20to%20counter%20evasion%20attacks%20targeting%20LLMs&amp;severity=medium&amp;id=691740d2ec553ac0a0ce3eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asus-warns-of-critical-auth-bypass-flaw-in-dsl-ser-54ca9afe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASUS%20warns%20of%20critical%20auth%20bypass%20flaw%20in%20DSL%20series%20routers&amp;severity=critical&amp;id=691740d2ec553ac0a0ce3ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-use-anthropics-ai-to-launch-automa-1718b9f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Use%20Anthropic&apos;s%20AI%20to%20Launch%20Automated%20Cyber%20Espionage%20Campaign&amp;severity=high&amp;id=691740d2ec553ac0a0ce3eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomwares-fragmentation-reaches-a-breaking-point-c863a7ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware&apos;s%20Fragmentation%20Reaches%20a%20Breaking%20Point%20While%20LockBit%20Returns&amp;severity=high&amp;id=691740d2ec553ac0a0ce3ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-the-impersonation-function-gets-used-to-imper-5795925d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20The%20Impersonation%20Function%20Gets%20Used%20To%20Impersonate%20Users%20(Fortinet%20FortiWeb%20(%3F%3F)%20Auth.%20Bypass)%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=69173e2b3d7715a824cb7e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21635-cwe-287-improper-authentication-in--3a61e067</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21635%3A%20CWE-287%3A%20Improper%20Authentication%20in%20usememos%20memos&amp;severity=high&amp;id=69173aa53d7715a824c558f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12149-cwe-200-exposure-of-sensitive-infor-8877c0ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12149%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=691737213d7715a824c0d570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-office-russian-dolls-fri-nov-14th-e1045b9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Office%20Russian%20Dolls%2C%20(Fri%2C%20Nov%2014th)&amp;severity=medium&amp;id=6917339f3d7715a824bc0f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11918-cwe-121-stack-based-buffer-overflow-a424016a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11918%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Rockwell%20Automation%20Arena%C2%AE%20Simulation&amp;severity=high&amp;id=69173170355db8f6997c8029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10018-cwe-79-improper-neutralization-of-i-0e75c6ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10018%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=69172e00355db8f699772cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9982-cwe-256-plaintext-storage-of-a-passw-56cd1fb3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9982%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=69172e00355db8f699772cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/checkoutcom-discloses-data-breach-after-extortion--836d4a63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Checkout.com%20Discloses%20Data%20Breach%20After%20Extortion%20Attempt&amp;severity=medium&amp;id=69172de3355db8f69977184d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/washington-post-says-nearly-10000-employees-impact-20f0b925</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Washington%20Post%20Says%20Nearly%2010%2C000%20Employees%20Impacted%20by%20Oracle%20Hack&amp;severity=medium&amp;id=6917249fdd0733879bf84c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8855-cwe-639-authorization-bypass-through-6426f978</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8855%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Optimus%20Software%20Brokerage%20Automation&amp;severity=high&amp;id=69172781355db8f6996ec1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-interview-actors-now-utilize-json-stora-34a54520</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Interview%20Actors%20Now%20Utilize%20JSON%20Storage%20Services%20for%20Malware%20Delivery&amp;severity=medium&amp;id=69172119dd0733879bf23f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-encryption-structure-of-yurei-ransomwa-e113e511</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Encryption%20Structure%20of%20Yurei%20Ransomware%20Go-based%20Builder&amp;severity=medium&amp;id=69172119dd0733879bf23f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkcomet-rat-malware-hidden-inside-fake-bitcoin-t-6bb87cf7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkComet%20RAT%20Malware%20Hidden%20Inside%20Fake%20Bitcoin%20Tool&amp;severity=medium&amp;id=69172119dd0733879bf23f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/novastealer-apple-intelligence-is-leaving-a-plist--18ee82e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NovaStealer%20-%20Apple%20Intelligence%20is%20leaving%20a%20plist..%20it%20is%20legit%2C%20right%3F&amp;severity=medium&amp;id=69172119dd0733879bf23f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-group-made-244-million-in-ransom--e2870eeb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20Ransomware%20Group%20Made%20%24244%20Million%20in%20Ransom%20Proceeds&amp;severity=medium&amp;id=69171ac1dd0733879be8ef43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11981-cwe-89-improper-neutralization-of-s-39218ca2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11981%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=691714694632ec4a625824d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-detects-150000-npm-packages-in-worm-powered-d3402ad3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Detects%20150%2C000%20NPM%20Packages%20in%20Worm-Powered%20Campaign&amp;severity=medium&amp;id=69170798b0f7ea9b98308ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomwares-fragmentation-reaches-a-breaking-point-8b766e3f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware&apos;s%20Fragmentation%20Reaches%20a%20Breaking%20Point%20While%20LockBit%20Returns&amp;severity=high&amp;id=6917bcfbed594783724528d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kraken-ransomware-benchmarks-systems-for-optimal-e-1833d32f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kraken%20ransomware%20benchmarks%20systems%20for%20optimal%20encryption%20choice&amp;severity=high&amp;id=6916fe7f9283ad5d6da7510a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doordash-hit-by-new-data-breach-in-october-exposin-d222738a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoorDash%20hit%20by%20new%20data%20breach%20in%20October%20exposing%20user%20information&amp;severity=high&amp;id=6916fe7f9283ad5d6da750fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-use-anthropics-ai-to-launch-automa-47bf4626</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Use%20Anthropic&apos;s%20AI%20to%20Launch%20Automated%20Cyber%20Espionage%20Campaign&amp;severity=high&amp;id=6917bcfbed594783724528d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/now-patched-fortinet-fortiweb-flaw-exploited-in-at-69bf889f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Now-Patched%20Fortinet%20FortiWeb%20Flaw%20Exploited%20in%20Attacks%20to%20Create%20Admin%20Accounts&amp;severity=high&amp;id=6916fe7f9283ad5d6da75102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/imunify360-vulnerability-could-expose-millions-of--b93736ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Imunify360%20Vulnerability%20Could%20Expose%20Millions%20of%20Sites%20to%20Hacking&amp;severity=medium&amp;id=6916faec9283ad5d6da1b866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/now-patched-fortinet-fortiweb-flaw-exploited-in-at-f98d4794</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Now-Patched%20Fortinet%20FortiWeb%20Flaw%20Exploited%20in%20Attacks%20to%20Create%20Admin%20Accounts&amp;severity=low&amp;id=6917bcfbed594783724528db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-says-claude-ai-powered-90-of-chinese-esp-6201508b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Says%20Claude%20AI%20Powered%2090%25%20of%20Chinese%20Espionage%20Campaign&amp;severity=medium&amp;id=6916e72382a5a4c8fc237df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-ai-ecommerce-website-builder-works-073bf2cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20AI%20Ecommerce%20Website%20Builder%20Works%3F&amp;severity=medium&amp;id=6916e4f9a17a058cf58eb513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-public-evidence-redtail-cryptominer-targets--1a0dfaae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%F0%9F%9A%A8%20FIRST%20PUBLIC%20EVIDENCE%3A%20RedTail%20Cryptominer%20Targets%20Docker%20APIs&amp;severity=medium&amp;id=6916e17aa17a058cf5884ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-says-chinese-lighthouse-phishing-kit-disrup-90b2896e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Says%20Chinese%20%E2%80%98Lighthouse%E2%80%99%20Phishing%20Kit%20Disrupted%20Following%20Lawsuit&amp;severity=low&amp;id=6916dde7a17a058cf5828861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10686-cwe-22-improper-limitation-of-a-pat-ee083f18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10686%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Creta%20Testimonial%20Showcase&amp;severity=high&amp;id=6916cb5051947119364339be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64444-improper-neutralization-of-special--595d7110</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64444%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sony%20Network%20Communications%20Inc.%20NCP-HG100%2FCellular%20model&amp;severity=high&amp;id=6916bcd463774206fb66ba21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13161-cwe-23-relative-path-traversal-in-i-52498e53</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13161%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20IQ%20Service%20International%20IQ-Support&amp;severity=high&amp;id=6916a1fb6e2bdc534ef61d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13160-cwe-497-exposure-of-sensitive-syste-77a7b35c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13160%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IQ%20Service%20International%20IQ-Support&amp;severity=medium&amp;id=6916a1fb6e2bdc534ef61d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hurricane-melissa-relief-scams-how-criminals-explo-f9a72fbc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hurricane%20Melissa%20Relief%20Scams%3A%20How%20Criminals%20Exploit%20Disaster&amp;severity=medium&amp;id=6917145e4632ec4a62582224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/increase-in-lumma-stealer-activity-coincides-with--2a4ed981</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Increase%20in%20Lumma%20Stealer%20Activity%20Coincides%20with%20Use%20of%20Adaptive%20Browser%20Fingerprinting%20Tactics&amp;severity=medium&amp;id=691717e24632ec4a625e2df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13107-inappropriate-implementation-in-goo-e7ddbcf3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13107%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169be0b9f11918f9cf7257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7021-inappropriate-implementation-in-goog-9b95cdb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7021%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf612f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13178-inappropriate-implementation-in-goo-9443559a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13178%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf6123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7017-inappropriate-implementation-in-goog-89356ed1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7017%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69169bdeb9f11918f9cf612b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9126-use-after-free-in-google-chrome-d926e0f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9126%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69169bdeb9f11918f9cf6133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13102-inappropriate-implementation-in-goo-4e8e6b28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13102%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf613f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11919-inappropriate-implementation-in-goo-e8a7fa0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11919%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf611b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11920-inappropriate-implementation-in-goo-cfebc9ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11920%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf611f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13983-inappropriate-implementation-in-goo-f17c1306</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13983%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf6127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9479-out-of-bounds-read-in-google-chrome-3ad5425c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9479%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169be0b9f11918f9cf725e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13097-inappropriate-implementation-in-goo-cf06fea1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13097%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf613b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12904-cwe-79-improper-neutralization-of-i-6488aea7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20otacke%20SNORDIAN&apos;s%20H5PxAPIkatchu&amp;severity=high&amp;id=69169bdeb9f11918f9cf6137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-november-14th-2025-httpsi-f36ce8e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20November%2014th%2C%202025%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9700%2C%20(Fri%2C%20Nov%2014th)&amp;severity=medium&amp;id=691683dd65beb25638350b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/washington-post-data-breach-impacts-nearly-10k-emp-e891caef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Washington%20Post%20data%20breach%20impacts%20nearly%2010K%20employees%2C%20contractors&amp;severity=high&amp;id=691673f17c4d52e6fb3dfc38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-14-bd1860ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-14&amp;severity=medium&amp;id=6917c3f5ed594783724dd8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63745-na-837b18b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63745%3A%20n%2Fa&amp;severity=medium&amp;id=6917984270bcf5e35c4ad930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64084-na-35b49a20</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64084%3A%20n%2Fa&amp;severity=medium&amp;id=6917959ad767b187e9434ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63744-na-003892d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63744%3A%20n%2Fa&amp;severity=medium&amp;id=6917959ad767b187e9434ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63891-na-09ad56f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63891%3A%20n%2Fa&amp;severity=high&amp;id=69179229d767b187e93e4612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63701-na-ac6ef506</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63701%3A%20n%2Fa&amp;severity=medium&amp;id=69178bbdd767b187e9376a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63291-na-c5daa1a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63291%3A%20n%2Fa&amp;severity=medium&amp;id=69177ea4901ba91f3226fd5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63680-na-04a6fca8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63680%3A%20n%2Fa&amp;severity=high&amp;id=691779316b210bb35bbae6f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54560-na-b742bf7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54560%3A%20n%2Fa&amp;severity=low&amp;id=691772da6b210bb35bb450af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54345-na-2325ec3d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54345%3A%20n%2Fa&amp;severity=high&amp;id=691772da6b210bb35bb450ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63724-na-25278036</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63724%3A%20n%2Fa&amp;severity=medium&amp;id=691772da6b210bb35bb450a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54562-na-fac47a04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54562%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54561-na-fe77c7c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54561%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54348-na-43e5506c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54348%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63725-na-b0756138</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63725%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54559-na-62a69509</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54559%3A%20n%2Fa&amp;severity=low&amp;id=69176d03db1bcd4e0c8a81cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54342-na-c0d11c67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54342%3A%20n%2Fa&amp;severity=low&amp;id=69176d03db1bcd4e0c8a81c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54346-na-e96175ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54346%3A%20n%2Fa&amp;severity=high&amp;id=69176937db1bcd4e0c856816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54343-na-d10cd226</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54343%3A%20n%2Fa&amp;severity=critical&amp;id=69176937db1bcd4e0c856812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54340-na-b9d6a5a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54340%3A%20n%2Fa&amp;severity=medium&amp;id=69176937db1bcd4e0c85680e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63830-na-3d3bb314</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63830%3A%20n%2Fa&amp;severity=medium&amp;id=6917665fdb1bcd4e0c837836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54339-na-dcbbadcf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54339%3A%20n%2Fa&amp;severity=critical&amp;id=6917665fdb1bcd4e0c837832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44640-na-349443a2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44640%3A%20n%2Fa&amp;severity=medium&amp;id=6917574f7ba9501c4c9c2491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44639-na-27a6a514</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44639%3A%20n%2Fa&amp;severity=medium&amp;id=6917574f7ba9501c4c9c248d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44630-na-9b346bc6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44630%3A%20n%2Fa&amp;severity=medium&amp;id=691753bf7ba9501c4c978721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55016-na-860df5af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55016%3A%20n%2Fa&amp;severity=medium&amp;id=691753bf7ba9501c4c978713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44635-na-7cd390ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44635%3A%20n%2Fa&amp;severity=medium&amp;id=6917503b7ba9501c4c92bc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44632-na-d442ca8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44632%3A%20n%2Fa&amp;severity=medium&amp;id=6917503b7ba9501c4c92bc04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44636-na-bf373124</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44636%3A%20n%2Fa&amp;severity=medium&amp;id=6917503b7ba9501c4c92bc01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44633-na-d25e8e68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44633%3A%20n%2Fa&amp;severity=medium&amp;id=69174cd17ba9501c4c8e3c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42749-na-5839200c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42749%3A%20n%2Fa&amp;severity=medium&amp;id=69174cd17ba9501c4c8e3c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-flaw-in-imunifyav-puts-millions-of-linux-hoste-3e003ebe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20flaw%20in%20ImunifyAV%20puts%20millions%20of%20Linux-hosted%20sites%20at%20risk&amp;severity=high&amp;id=691673f17c4d52e6fb3dfc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-create-4300-fake-travel-sites-to-s-ba699a55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Create%204%2C300%20Fake%20Travel%20Sites%20to%20Steal%20Hotel%20Guests&apos;%20Payment%20Data&amp;severity=high&amp;id=691673f17c4d52e6fb3dfc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-terrible-horrible-no-good-very-bad-day-8561d29a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20terrible%2C%20horrible%2C%20no%20good%2C%20very%20bad%20day&amp;severity=medium&amp;id=6917145e4632ec4a62582236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64530-cwe-288-authentication-bypass-using-87832440</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64530%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20apollographql%20federation&amp;severity=high&amp;id=691672127c4d52e6fb3b2e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13131-incorrect-default-permissions-in-so-dbaaf0bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13131%3A%20Incorrect%20Default%20Permissions%20in%20Sonarr&amp;severity=high&amp;id=69165800ef0b598b9f6fad7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13130-incorrect-default-permissions-in-ra-28b4edc6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13130%3A%20Incorrect%20Default%20Permissions%20in%20Radarr&amp;severity=high&amp;id=69165800ef0b598b9f6fad75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36236-cwe-22-improper-limitation-of-a-pat-697fd261</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36236%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20AIX&amp;severity=high&amp;id=69165800ef0b598b9f6fad84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36250-cwe-114-process-control-in-ibm-aix-0e598a57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36250%3A%20CWE-114%20Process%20Control%20in%20IBM%20AIX&amp;severity=critical&amp;id=69165800ef0b598b9f6fad87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36096-cwe-522-insufficiently-protected-cr-b2685315</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36096%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20AIX&amp;severity=critical&amp;id=69165800ef0b598b9f6fad81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36251-cwe-114-process-control-in-ibm-aix-9533e607</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36251%3A%20CWE-114%20Process%20Control%20in%20IBM%20AIX&amp;severity=critical&amp;id=69165800ef0b598b9f6fad8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64754-cwe-601-url-redirection-to-untruste-b15ad9d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64754%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20jitsi%20jitsi-meet&amp;severity=low&amp;id=6916529405b975ba75927702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64753-cwe-863-incorrect-authorization-in--e02c1711</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64753%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gristlabs%20grist-core&amp;severity=medium&amp;id=6916529405b975ba759276fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64752-cwe-918-server-side-request-forgery-254cc206</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64752%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gristlabs%20grist-core&amp;severity=medium&amp;id=6916529405b975ba759276fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47913-cwe-703-improper-handling-of-except-65eac4c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47913%3A%20CWE-703%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20golang.org%2Fx%2Fcrypto%20golang.org%2Fx%2Fcrypto%2Fssh%2Fagent&amp;severity=high&amp;id=69164f1005b975ba758cef31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64745-cwe-79-improper-neutralization-of-i-31c0a50c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64745%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=low&amp;id=691642cf819e592e58c8d6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4619-cwe-754-improper-check-for-unusual-o-667a4034</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4619%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=691642cf819e592e58c8d6ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64726-cwe-15-external-control-of-system-o-fde71248</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64726%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20SocketDev%20firewall-release&amp;severity=high&amp;id=69163a0b6c6480bc321d2e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64709-cwe-918-server-side-request-forgery-59006f73</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64709%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20baptisteArno%20typebot.io&amp;severity=critical&amp;id=691636876c6480bc3217c441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46369-cwe-377-insecure-temporary-file-in--9757af05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46369%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=high&amp;id=691636876c6480bc3217c43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46370-cwe-114-process-control-in-dell-ali-79d42362</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46370%3A%20CWE-114%3A%20Process%20Control%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=low&amp;id=691636876c6480bc3217c43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46362-cwe-284-improper-access-control-in--07c6187e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46362%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=medium&amp;id=691634ab6c6480bc32165eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46368-cwe-377-insecure-temporary-file-in--6e793cfc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46368%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=medium&amp;id=6916330e6c6480bc3212e0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46367-cwe-390-detection-of-error-conditio-09c026b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46367%3A%20CWE-390%3A%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20Dell%20Alienware%20Command%20Center&amp;severity=high&amp;id=691634ab6c6480bc32165ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43515-an-unauthenticated-user-on-the-same-ab07fd38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43515%3A%20An%20unauthenticated%20user%20on%20the%20same%20network%20as%20a%20Compressor%20server%20may%20be%20able%20to%20execute%20arbitrary%20code%20in%20Apple%20Compressor&amp;severity=high&amp;id=69162e9f19431ce75c5ca197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13123-sql-injection-in-amtt-hotel-broadba-50b33b05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13123%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=69162e9f19431ce75c5ca191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unleashing-the-kraken-ransomware-group-6417305b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unleashing%20the%20Kraken%20ransomware%20group&amp;severity=medium&amp;id=691639fd6c6480bc321d297a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13122-sql-injection-in-sourcecodester-pat-17ce1220</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13122%3A%20SQL%20Injection%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69162015cdc01d126425d790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-fake-ai-sidebar-can-steal-your-data-kaspersk-5a22f5e4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20fake%20AI%20sidebar%20can%20steal%20your%20data%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69161cb1cdc01d1264200490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-are-abusing-whatsapp-screen-sharing-to-st-ce01814a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20are%20Abusing%20WhatsApp%20Screen%20Sharing%20to%20Steal%20OTPs%20and%20Funds&amp;severity=medium&amp;id=69161c96cdc01d12641fe35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64706-cwe-639-authorization-bypass-throug-e77b565a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64706%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20baptisteArno%20typebot.io&amp;severity=medium&amp;id=69161ca8cdc01d12641febbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12785-cwe-200-exposure-of-sensitive-infor-b2650aa2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12785%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc%20HP%20Color%20LaserJet%20MFP%20M478-M479%20series&amp;severity=medium&amp;id=69161915cdc01d12641ad2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12784-cwe-200-exposure-of-sensitive-infor-b7bd0c32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12784%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc%20HP%20Color%20LaserJet%20MFP%20M478-M479%20series&amp;severity=medium&amp;id=69161915cdc01d12641ad2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/homeland-security-brief-november-2025-a2f73a3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Homeland%20Security%20Brief%20-%20November%202025&amp;severity=medium&amp;id=691613a173934fe85f09e999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11538-binding-to-an-unrestricted-ip-addre-8ef7dacb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11538%3A%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69160ca773934fe85fff682b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13121-sql-injection-in-cameasy-liketea-0f8251f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13121%3A%20SQL%20Injection%20in%20cameasy%20Liketea&amp;severity=medium&amp;id=69160aa2eb29b6dceb121465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20346-improper-privilege-management-in-ci-5a9f150a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20346%3A%20Improper%20Privilege%20Management%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=69160aa2eb29b6dceb12146c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20355-url-redirection-to-untrusted-site-o-437bcec1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20355%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20353-improper-neutralization-of-input-du-78c7c6b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20349-improper-neutralization-of-special--831cb1cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20349%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20341-improper-access-control-in-cisco-ci-8b0f6412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20341%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=high&amp;id=6916072eeb29b6dceb0d3f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orgs-move-to-sso-passkeys-to-solve-bad-password-ha-34360c9c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Orgs%20Move%20to%20SSO%2C%20Passkeys%20to%20Solve%20Bad%20Password%20Habits&amp;severity=medium&amp;id=6916070feb29b6dceb0d2532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-takes-down-rhadamanthys-infostea-073e4386</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Endgame%20Takes%20Down%20Rhadamanthys%20Infostealer%2C%20VenomRAT%20and%20Elysium%20Botnet%2C%20Seize%201025%20servers%20and%20Arrest%201&amp;severity=medium&amp;id=69160395eb29b6dceb07d9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64525-cwe-918-server-side-request-forgery-a0e0219b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64525%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64703-cwe-200-exposure-of-sensitive-infor-89fb686b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64703%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=6916001feb29b6dceb02d4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64511-cwe-918-server-side-request-forgery-d374dba5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64511%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%201Panel-dev%20MaxKB&amp;severity=high&amp;id=6916001feb29b6dceb02d4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-vulnerability-exposed-underlying-cloud-inf-158ef921</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20Vulnerability%20Exposed%20Underlying%20Cloud%20Infrastructure&amp;severity=medium&amp;id=6915fe3977eaf5a849601df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64718-cwe-1321-improperly-controlled-modi-3d12c916</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64718%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nodeca%20js-yaml&amp;severity=medium&amp;id=6915fe5477eaf5a849603956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13120-use-after-free-in-mruby-d35bb9d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13120%3A%20Use%20After%20Free%20in%20mruby&amp;severity=medium&amp;id=6915fe5477eaf5a84960393e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1000-servers-hit-in-law-enforcement-takedown-of-rh-7a8587be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1%2C000%2B%20Servers%20Hit%20in%20Law%20Enforcement%20Takedown%20of%20Rhadamanthys%2C%20VenomRAT%2C%20Elysium&amp;severity=medium&amp;id=6915f73177eaf5a84954dbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62484-cwe-1333-inefficient-regular-expres-f71949ff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62484%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=6915f74f77eaf5a84954f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-updates-guidance-on-patching-cisco-devices-ta-a2a308ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Updates%20Guidance%20on%20Patching%20Cisco%20Devices%20Targeted%20in%20China-Linked%20Attacks&amp;severity=medium&amp;id=6915f3b777eaf5a849502757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62483-cwe-212-improper-removal-of-sensiti-7f4529d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62483%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients&amp;severity=medium&amp;id=6915f74f77eaf5a84954f4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13119-cross-site-request-forgery-in-fabia-5f70faa7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13119%3A%20Cross-Site%20Request%20Forgery%20in%20Fabian%20Ros%20Simple%20E-Banking%20System&amp;severity=medium&amp;id=6915fe5477eaf5a849603960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13118-improper-authorization-in-macrozhen-284bd7a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13118%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915fe5477eaf5a84960395a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62482-cwe-79-improper-neutralization-of-i-8b9fa58a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62482%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=medium&amp;id=6915fe5577eaf5a84960398c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30662-cwe-646-reliance-on-file-name-or-ex-b8f60925</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30662%3A%20CWE-646%3A%20Reliance%20on%20File%20Name%20or%20Extension%20of%20Externally-Supplied%20File%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20VDI%20Plugin%20macOS%20Universal%20installer&amp;severity=medium&amp;id=6915fe5577eaf5a849603989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30669-cwe-295-improper-certificate-valida-e5acdbb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30669%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20Clients&amp;severity=medium&amp;id=6915fac277eaf5a8495aabde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64741-cwe-74-improper-neutralization-of-s-767691eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64741%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20for%20Android&amp;severity=high&amp;id=6915fe5577eaf5a84960398f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64740-cwe-347-improper-verification-of-cr-86cdaa62</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64740%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20VDI%20Client&amp;severity=high&amp;id=6915ee5ff690f81e3c76b56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-state-of-ransomware-q3-2025-8062ee4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20State%20of%20Ransomware%20%E2%80%93%20Q3%202025&amp;severity=high&amp;id=6915ee61f690f81e3c76b650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13117-improper-authorization-in-macrozhen-a51caec2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13117%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915ee5ff690f81e3c76b569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64739-cwe-73-external-control-of-file-nam-674c2ad1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64739%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients&amp;severity=medium&amp;id=6915ee5ff690f81e3c76b575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64738-cwe-73-external-control-of-file-nam-4a1808bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64738%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20for%20macOS&amp;severity=medium&amp;id=6915ee5ff690f81e3c76b572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13116-improper-authorization-in-macrozhen-ddd4f292</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13116%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915e75af690f81e3c6bfb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-maverick-banking-trojans-run-rampant-in-bra-439b7b1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%2C%20Maverick%20Banking%20Trojans%20Run%20Rampant%20in%20Brazil&amp;severity=medium&amp;id=6915e559b9a712c4986ecd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13115-improper-authorization-in-macrozhen-b2c266a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13115%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915e1e1b9a712c498695705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13114-improper-authorization-in-macrozhen-49006b49</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13114%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915e1e1b9a712c4986956ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41069-cwe-639-authorization-bypass-throug-6d688542</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41069%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20T-Innova%20DeporSite%20DSuite%202025&amp;severity=medium&amp;id=6915de5db9a712c4986429d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tens-of-thousands-of-malicious-npm-packages-distri-5e602bad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tens%20of%20Thousands%20of%20Malicious%20NPM%20Packages%20Distribute%20Self-Replicating%20Worm&amp;severity=medium&amp;id=6915d902f0c8e942cdf27149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-chrome-extension-safery-steals-ethereum-walle-6e547bb8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Chrome%20Extension%20%E2%80%9CSafery%E2%80%9D%20Steals%20Ethereum%20Wallet%20Seed%20Phrases%20Using%20Sui%20Blockchain&amp;severity=medium&amp;id=6917bcfbed594783724528e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12818-integer-overflow-or-wraparound-in-p-b40a45fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12818%3A%20Integer%20Overflow%20or%20Wraparound%20in%20PostgreSQL&amp;severity=medium&amp;id=6915d923f0c8e942cdf27495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12817-missing-authorization-in-postgresql-52bb5a53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12817%3A%20Missing%20Authorization%20in%20PostgreSQL&amp;severity=low&amp;id=6915d923f0c8e942cdf27492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12765-vulnerability-in-pgadminorg-pgadmin-00c51997</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12765%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=6915d923f0c8e942cdf2748f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12764-vulnerability-in-pgadminorg-pgadmin-a24dcb53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12764%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=6915d923f0c8e942cdf2748c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12763-vulnerability-in-pgadminorg-pgadmin-ba91ddad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12763%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=medium&amp;id=6915d923f0c8e942cdf27489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12762-vulnerability-in-pgadminorg-pgadmin-c79bed57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12762%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=critical&amp;id=6915d923f0c8e942cdf27486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40681-cwe-79-improper-neutralization-of-i-a0393514</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20xCally%20Omnichannel&amp;severity=medium&amp;id=6915d923f0c8e942cdf27498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nhs-investigating-oracle-ebs-hack-claims-as-hacker-de1dbb5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NHS%20Investigating%20Oracle%20EBS%20Hack%20Claims%20as%20Hackers%20Name%20Over%2040%20Alleged%20Victims&amp;severity=medium&amp;id=6915d57ef0c8e942cded1836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-watchguard-firebox-vulnerability-exploite-9e8148c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20WatchGuard%20Firebox%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=6915d1faf0c8e942cde6f92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-attacks-come-faster-than-patches-why-2026-wil-61c21427</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Attacks%20Come%20Faster%20Than%20Patches%3A%20Why%202026%20Will%20be%20the%20Year%20of%20Machine-Speed%20Security&amp;severity=medium&amp;id=6917bcfbed594783724528e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12377-cwe-862-missing-authorization-in-sm-f50a5a9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12377%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20Envira%20Gallery%20%E2%80%93%20Image%20Photo%20Gallery%2C%20Albums%2C%20Video%20Gallery%2C%20Slideshows%20%26%20More&amp;severity=medium&amp;id=6915c26127981db3b432b94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/synnovis-confirms-patient-information-stolen-in-di-db242213</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Synnovis%20Confirms%20Patient%20Information%20Stolen%20in%20Disruptive%20Ransomware%20Attack&amp;severity=medium&amp;id=6915becf27981db3b42d0d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-dismantles-rhadamanthys-venom-ra-8d4d3091</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Endgame%20Dismantles%20Rhadamanthys%2C%20Venom%20RAT%2C%20and%20Elysium%20Botnet%20in%20Global%20Crackdown&amp;severity=medium&amp;id=6917bcfbed594783724528e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-67000-fake-npm-packages-flood-registry-in-wor-4b00f9b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2067%2C000%20Fake%20npm%20Packages%20Flood%20Registry%20in%20Worm-Like%20Spam%20Attack&amp;severity=high&amp;id=6915b5da6afadf441850216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-watchguard-fireware-flaw-expos-ea334abc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20WatchGuard%20Fireware%20Flaw%20Exposing%2054%2C000%20Fireboxes%20to%20No-Login%20Attacks&amp;severity=critical&amp;id=6915b5da6afadf441850215f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dehashed-alternative-for-pentestersred-teamers-fe3a05ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dehashed%20alternative%20for%20pentesters%2Fred%20teamers&amp;severity=medium&amp;id=6915b6026afadf4418506925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-cisco-0-days-ai-bug-bounties-c-41e7970c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Cisco%200-Days%2C%20AI%20Bug%20Bounties%2C%20Crypto%20Heists%2C%20State-Linked%20Leaks%20and%2020%20More%20Stories&amp;severity=medium&amp;id=6915b6e86afadf4418514a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-ise-citrixbleed-2-vulnerabilities-exploited--7c26f5e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20ISE%2C%20CitrixBleed%202%20Vulnerabilities%20Exploited%20as%20Zero-Days%3A%20Amazon&amp;severity=critical&amp;id=6915aa13dac9b42fc37a402f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64384-missing-authorization-in-jetmonster-89e4da7f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64384%3A%20Missing%20Authorization%20in%20jetmonsters%20JetFormBuilder&amp;severity=medium&amp;id=6915aa35dac9b42fc37a5aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64383-improper-neutralization-of-input-du-ffcede09</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Qode%20Qi%20Blocks&amp;severity=medium&amp;id=6915aa35dac9b42fc37a5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64382-missing-authorization-in-webtoffee--0496d5d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64382%3A%20Missing%20Authorization%20in%20WebToffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64381-improper-neutralization-of-input-du-01fa1860</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64381%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64380-improper-neutralization-of-input-du-3911b3c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64380%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64379-missing-authorization-in-pluggabl-b-8c7ef4a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64379%3A%20Missing%20Authorization%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64370-missing-authorization-in-yop-yop-po-1e4ace09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64370%3A%20Missing%20Authorization%20in%20YOP%20YOP%20Poll&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64369-missing-authorization-in-codepeople-5789f6de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64369%3A%20Missing%20Authorization%20in%20codepeople%20Contact%20Form%20Email&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64292-improper-neutralization-of-input-du-397c1bed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PascalBajorat%20Analytics%20Germanized%20for%20Google%20Analytics&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64277-missing-authorization-in-quantumclo-7e18c364</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64277%3A%20Missing%20Authorization%20in%20QuantumCloud%20ChatBot&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64276-missing-authorization-in-ays-pro-su-4a42a3fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64276%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64275-improper-neutralization-of-input-du-4ef839f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64275%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Manager&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64274-missing-authorization-in-wpkoitheme-39572292</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64274%3A%20Missing%20Authorization%20in%20wpkoithemes%20WPKoi%20Templates%20for%20Elementor&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64271-cross-site-request-forgery-csrf-in--a8bccbed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64271%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HasThemes%20WP%20Plugin%20Manager&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64269-missing-authorization-in-edgarrojas-41a41385</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64269%3A%20Missing%20Authorization%20in%20EDGARROJAS%20WooCommerce%20PDF%20Invoice%20Builder&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64267-exposure-of-sensitive-system-inform-0c0a607d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64267%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPSwings%20WooCommerce%20Ultimate%20Points%20And%20Rewards&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64265-missing-authorization-in-n-media-fr-1529ea5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64265%3A%20Missing%20Authorization%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64264-improper-neutralization-of-input-du-f3eec651</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64264%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aman%20Popup%20addon%20for%20Ninja%20Forms&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64263-missing-authorization-in-pluginever-696af5bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64263%3A%20Missing%20Authorization%20in%20PluginEver%20WP%20Content%20Pilot&amp;severity=medium&amp;id=6915aa33dac9b42fc37a589e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64262-cross-site-request-forgery-csrf-in--030f728d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64262%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ramon%20fincken%20Auto%20Prune%20Posts&amp;severity=medium&amp;id=6915aa33dac9b42fc37a589b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64261-missing-authorization-in-codepeople-004f3de6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64261%3A%20Missing%20Authorization%20in%20codepeople%20Appointment%20Booking%20Calendar&amp;severity=medium&amp;id=6915aa33dac9b42fc37a5898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64259-missing-authorization-in-jeroen-sch-53c32c71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64259%3A%20Missing%20Authorization%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=medium&amp;id=6915aa33dac9b42fc37a5895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7704-cwe-121-stack-based-buffer-overflow--ba55be8c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7704%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20SYS-111C-NR&amp;severity=medium&amp;id=6915a604dac9b42fc374b8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/formbook-delivered-through-multiple-scripts-thu-no-488dbf6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Formbook%20Delivered%20Through%20Multiple%20Scripts%2C%20(Thu%2C%20Nov%2013th)&amp;severity=medium&amp;id=69159dbff47b1f1c8b576bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11769-cwe-79-improper-neutralization-of-i-0f22f952</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aumsrini%20WordPress%20Content%20Flipper&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11260-cwe-693-protection-mechanism-failur-9875e2e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11260%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20benmoody%20WP%20Headless%20CMS%20Framework&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10295-cwe-79-improper-neutralization-of-i-585702ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kayapati%20Angel%20%E2%80%93%20Fashion%20Model%20Agency%20WordPress%20CMS%20Theme&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8397-cwe-79-improper-neutralization-of-in-6ddcfcce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20restpack%20Save%20as%20PDF%20Button&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12015-cwe-862-missing-authorization-in-sa-e6e0beaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12015%3A%20CWE-862%20Missing%20Authorization%20in%20sanderkah%20Convert%20WebP%20%26%20AVIF%20%7C%20Quicq%20%7C%20Best%20image%20optimizer%20and%20compression%20plugin%20%7C%20Improve%20your%20Google%20Pagespeed&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12844-cwe-502-deserialization-of-untruste-df085492</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12844%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=high&amp;id=691590f26cb36fb34fdfdf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12681-cwe-200-exposure-of-sensitive-infor-d1081c97</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12681%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ronalfy%20Comment%20Edit%20Core%20%E2%80%93%20Simple%20Comment%20Editing&amp;severity=medium&amp;id=691590f26cb36fb34fdfdf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-watchguard-fireware-flaw-expos-bcc7dca7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20WatchGuard%20Fireware%20Flaw%20Exposing%2054%2C000%20Fireboxes%20to%20No-Login%20Attacks&amp;severity=critical&amp;id=691591c46cb36fb34fe04ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12620-cwe-89-improper-neutralization-of-s-ca82dd6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12620%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Versus%20Polls%2C%20Anonymous%20Polls%2C%20Image%20Polls&amp;severity=medium&amp;id=691579339e485ce1c4d841f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/firefox-145-and-chrome-142-patch-high-severity-fla-bab22c38</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Firefox%20145%20and%20Chrome%20142%20Patch%20High-Severity%20Flaws%20in%20Latest%20Releases&amp;severity=high&amp;id=69156c738f1a6240445ac526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-46000-fake-npm-packages-flood-registry-in-wor-4c2f0da1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2067%2C000%20Fake%20npm%20Packages%20Flood%20Registry%20in%20Worm-Like%20Spam%20Attack&amp;severity=medium&amp;id=691579379e485ce1c4d84262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12891-cwe-862-missing-authorization-in-ay-977c1f25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12891%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Survey%20Maker&amp;severity=medium&amp;id=691562068f1a6240444c43e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11923-cwe-269-improper-privilege-manageme-7cdf09f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11923%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=high&amp;id=691553e024a15f0eafbbc090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12536-cwe-359-exposure-of-private-persona-54ca21a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12536%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=medium&amp;id=691553e024a15f0eafbbc0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12733-cwe-94-improper-control-of-generati-c6e4037a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12733%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpallimport%20WP%20All%20Import%20%E2%80%93%20Drag%20%26%20Drop%20Import%20for%20CSV%2C%20XML%2C%20Excel%20%26%20Google%20Sheets&amp;severity=high&amp;id=691553e024a15f0eafbbc0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12892-cwe-862-missing-authorization-in-ay-388ec258</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12892%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Survey%20Maker&amp;severity=medium&amp;id=691553e024a15f0eafbbc0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12979-cwe-862-missing-authorization-in-us-7fdbf067</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12979%3A%20CWE-862%20Missing%20Authorization%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=medium&amp;id=691553e024a15f0eafbbc0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12366-cwe-639-authorization-bypass-throug-f1a60945</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12366%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=691553e024a15f0eafbbc09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12089-cwe-22-improper-limitation-of-a-pat-e4abebb2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12089%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20supsysticcom%20Data%20Tables%20Generator%20by%20Supsystic&amp;severity=medium&amp;id=691553e024a15f0eafbbc097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59367-cwe-288-authentication-bypass-by-al-142847a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59367%3A%20CWE-288%3A%20Authentication%20Bypass%20by%20Alternate%20Path%20or%20Channel%20in%20ASUS%20DSL-AC51&amp;severity=critical&amp;id=691543c7edb89fd9702216e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64716-cwe-79-improper-neutralization-of-i-ffa5944e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64716%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TecharoHQ%20anubis&amp;severity=medium&amp;id=691543c7edb89fd9702216ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64710-cwe-79-improper-neutralization-of-i-547b76bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64710%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitfoundation%20bitplatform&amp;severity=medium&amp;id=691543c7edb89fd9702216e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-13-4241e92f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-13&amp;severity=medium&amp;id=691673de7c4d52e6fb3d2c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47222-na-3971523e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47222%3A%20n%2Fa&amp;severity=medium&amp;id=691649d9819e592e58d3e48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47221-na-6acab099</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47221%3A%20n%2Fa&amp;severity=medium&amp;id=691649d9819e592e58d3e489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47220-na-cbfdf08e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47220%3A%20n%2Fa&amp;severity=medium&amp;id=69164657819e592e58ce3a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60679-na-952ebf8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60679%3A%20n%2Fa&amp;severity=high&amp;id=691634ab6c6480bc32165ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60702-na-1b186ba6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60702%3A%20n%2Fa&amp;severity=medium&amp;id=691634ab6c6480bc32165ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60699-na-559ebb15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60699%3A%20n%2Fa&amp;severity=medium&amp;id=691634ab6c6480bc32165eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63406-na-3e6ebacd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63406%3A%20n%2Fa&amp;severity=high&amp;id=69162e9f19431ce75c5ca19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55810-na-60392777</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55810%3A%20n%2Fa&amp;severity=medium&amp;id=69162e9f19431ce75c5ca18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60676-na-e79a1e58</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60676%3A%20n%2Fa&amp;severity=medium&amp;id=69162b1819431ce75c569446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60674-na-22166f30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60674%3A%20n%2Fa&amp;severity=medium&amp;id=69162b1819431ce75c569440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60673-na-d59a08c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60673%3A%20n%2Fa&amp;severity=medium&amp;id=69162b1819431ce75c56943a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60675-na-e5398e38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60675%3A%20n%2Fa&amp;severity=medium&amp;id=6916279419431ce75c50bd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60672-na-b6d4f89d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60672%3A%20n%2Fa&amp;severity=medium&amp;id=6916279419431ce75c50bd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60698-na-7630704f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60698%3A%20n%2Fa&amp;severity=high&amp;id=69162015cdc01d126425d79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60697-na-2106c3cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60697%3A%20n%2Fa&amp;severity=high&amp;id=69162015cdc01d126425d796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60701-na-736eafec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60701%3A%20n%2Fa&amp;severity=medium&amp;id=69162015cdc01d126425d78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60700-na-0c00e123</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60700%3A%20n%2Fa&amp;severity=medium&amp;id=69162015cdc01d126425d784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60671-na-1f67e596</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60671%3A%20n%2Fa&amp;severity=medium&amp;id=69162015cdc01d126425d77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60693-na-bc595625</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60693%3A%20n%2Fa&amp;severity=medium&amp;id=69161ca8cdc01d12641febb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60695-na-1b507137</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60695%3A%20n%2Fa&amp;severity=medium&amp;id=6916102073934fe85f046f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60694-na-a3c3b9d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60694%3A%20n%2Fa&amp;severity=high&amp;id=6916102073934fe85f046f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60689-na-354cdf1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60689%3A%20n%2Fa&amp;severity=medium&amp;id=69160e4773934fe85f031b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60696-na-b428add8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60696%3A%20n%2Fa&amp;severity=high&amp;id=69160aa2eb29b6dceb121479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60692-na-3fff8020</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60692%3A%20n%2Fa&amp;severity=high&amp;id=69160aa2eb29b6dceb121474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60691-na-61ad5377</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60691%3A%20n%2Fa&amp;severity=high&amp;id=69160aa2eb29b6dceb12146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60690-na-f5da5270</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60690%3A%20n%2Fa&amp;severity=high&amp;id=6916072eeb29b6dceb0d3f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60686-na-da6465f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60686%3A%20n%2Fa&amp;severity=medium&amp;id=6916001feb29b6dceb02d49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60685-na-a1c9c731</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60685%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60683-na-8fbc777d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60683%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a84960394c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60682-na-e7cc3df4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60682%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60688-na-4bb4c91d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60688%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60687-na-2c99f993</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60687%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60684-na-a540ae9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60684%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a84960392f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52186-na-5a2610a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52186%3A%20n%2Fa&amp;severity=medium&amp;id=6915fac277eaf5a8495aabda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breaking-mpdf-with-regex-and-logic-9f99b913</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breaking%20mPDF%20with%20regex%20and%20logic&amp;severity=medium&amp;id=69151a4aa47dcaa1fc2ad29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13076-sql-injection-in-code-projects-resp-4ce91d89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13076%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=6915154012715e9af4610fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13075-sql-injection-in-code-projects-resp-218ac7ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13075%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=69150e3812715e9af456ea49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrixbleed-2-wreaks-havoc-as-zero-day-bug-d3cc0456</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;CitrixBleed%202&apos;%20Wreaks%20Havoc%20as%20Zero-Day%20Bug&amp;severity=critical&amp;id=6915168512715e9af461a29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64707-cwe-863-incorrect-authorization-in--6049d360</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64707%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20frappe%20lms&amp;severity=low&amp;id=69150c3912715e9af455a30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64705-cwe-200-exposure-of-sensitive-infor-4d904d7f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64705%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20frappe%20lms&amp;severity=low&amp;id=69150c3912715e9af455a309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7326-cwe-400-uncontrolled-resource-consum-0790d07e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7326%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Seiko%20Epson%20Epson%20Stylus%20SX510W&amp;severity=high&amp;id=691509abe6b3e50d509f11ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64517-cwe-287-improper-authentication-in--83cfa17d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64517%3A%20CWE-287%3A%20Improper%20Authentication%20in%20trifectatechfoundation%20sudo-rs&amp;severity=medium&amp;id=691509abe6b3e50d509f11d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7327-cwe-22-improper-limitation-of-a-path-ba3b1530</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7327%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ozeki%20Ltd.%20Ozeki%20SMS%20Gateway&amp;severity=high&amp;id=691509abe6b3e50d509f11bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7329-cwe-306-missing-authentication-for-c-dab427df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7329%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20tinycontrol%20Lan%20Controller&amp;severity=high&amp;id=691509abe6b3e50d509f11c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64503-cwe-787-out-of-bounds-write-in-open-a071cb62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64503%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20OpenPrinting%20cups-filters&amp;severity=medium&amp;id=691509abe6b3e50d509f11cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/making-net-serialization-gadgets-by-hand-c34129fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Making%20.NET%20Serialization%20Gadgets%20by%20Hand&amp;severity=medium&amp;id=69150587e6b3e50d5099d1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-looks-to-dim-lighthouse-phishing-as-a-servi-7336eac2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Looks%20to%20Dim%20&apos;Lighthouse&apos;%20Phishing-as-a-Service%20Op&amp;severity=medium&amp;id=6915168512715e9af461a29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-uses-clickfix-page-to-push-net-2df7d469</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20uses%20ClickFix%20page%20to%20push%20NetSupport%20RAT%2C%20(Wed%2C%20Nov%2012th)&amp;severity=medium&amp;id=691501f3e6b3e50d5094b0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64482-cwe-352-cross-site-request-forgery--3c809db6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64482%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69150002e6b3e50d50936baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64345-cwe-362-concurrent-execution-using--0561429f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64345%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=6914fdef6c8e220c428f7f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mindgard-finds-sora-2-vulnerability-leaking-hidden-8d351166</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mindgard%20Finds%20Sora%202%20Vulnerability%20Leaking%20Hidden%20System%20Prompt%20via%20Audio&amp;severity=medium&amp;id=6914fdd96c8e220c428f7c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33119-cwe-260-password-in-configuration-f-1fc87cf9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33119%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20QRadar%20Security%20Information%20and%20Event%20Management&amp;severity=medium&amp;id=6914fdef6c8e220c428f7f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36223-cwe-644-improper-neutralization-of--c6ee5299</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36223%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=6914f9cc6c8e220c428a4836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13063-missing-authorization-in-dinukanava-718b8562</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13063%3A%20Missing%20Authorization%20in%20DinukaNavaratna%20Dee%20Store&amp;severity=medium&amp;id=6914f9cc6c8e220c428a4830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64186-cwe-347-improper-verification-of-cr-39ffc2a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64186%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20evervault%20evervault-go&amp;severity=high&amp;id=6914f08607da5f027f55f1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13061-unrestricted-upload-in-itsourcecode-ee410065</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13061%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=6914f08607da5f027f55f1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64170-cwe-549-missing-password-field-mask-f10b3a6d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64170%3A%20CWE-549%3A%20Missing%20Password%20Field%20Masking%20in%20trifectatechfoundation%20sudo-rs&amp;severity=low&amp;id=6914f08607da5f027f55f1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46608-cwe-284-improper-access-control-in--8232e27c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46608%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Data%20Lakehouse&amp;severity=critical&amp;id=6914ed2507da5f027f521f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13060-sql-injection-in-sourcecodester-sur-29d5585e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13060%3A%20SQL%20Injection%20in%20SourceCodester%20Survey%20Application%20System&amp;severity=medium&amp;id=6914eb7ff3584f3d8b259f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13059-sql-injection-in-sourcecodester-alu-4890cf58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13059%3A%20SQL%20Injection%20in%20SourceCodester%20Alumni%20Management%20System&amp;severity=medium&amp;id=6914eb7ff3584f3d8b259f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46427-cwe-77-improper-neutralization-of-s-2d6dcee6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46427%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=6914eb7ff3584f3d8b259f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46428-cwe-77-improper-neutralization-of-s-7ce1c2ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46428%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=6914e7f6f3584f3d8b21226f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48829-cwe-94-improper-control-of-generati-0daf5554</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48829%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=6914e7f6f3584f3d8b212272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13058-cross-site-scripting-in-soerennb-ex-6031653d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13058%3A%20Cross%20Site%20Scripting%20in%20soerennb%20eXtplorer&amp;severity=medium&amp;id=6914e278f3584f3d8b1a26ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12048-cwe-434-unrestricted-upload-of-file-463b8834</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12048%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Lenovo%20Scanner%20Pro&amp;severity=high&amp;id=6914e033789e20b800798cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12047-cwe-295-improper-certificate-valida-3e86fa86</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12047%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20Scanner%20Pro&amp;severity=medium&amp;id=6914e033789e20b800798cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10495-cwe-295-improper-certificate-valida-be9c50ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10495%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20App%20Store&amp;severity=high&amp;id=6914e033789e20b800798cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8485-cwe-276-incorrect-default-permission-7f087b8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8485%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20App%20Store&amp;severity=high&amp;id=6914e033789e20b800798ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8421-cwe-276-incorrect-default-permission-8ff71c21</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8421%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20Dock%20Manager&amp;severity=medium&amp;id=6914e033789e20b800798cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64117-cwe-352-cross-site-request-forgery--434e3e46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64117%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=6914e033789e20b800798ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27368-cwe-497-exposure-of-sensitive-syste-9e22d28e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27368%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=6914e033789e20b800798ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64099-cwe-74-improper-neutralization-of-s-357dce7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64099%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20OpenIdentityPlatform%20OpenAM&amp;severity=high&amp;id=6914d9d9789e20b800721473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61667-cwe-276-incorrect-default-permissio-bfd3e499</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61667%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20DataDog%20datadog-agent&amp;severity=high&amp;id=6914d9d9789e20b800721476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57812-cwe-125-out-of-bounds-read-in-openp-058083b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OpenPrinting%20libcupsfilters&amp;severity=low&amp;id=6914d7b9e9dc40953bf857d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sues-china-based-hackers-behind-1-billion-l-6537319e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sues%20China-Based%20Hackers%20Behind%20%241%20Billion%20Lighthouse%20Phishing%20Platform&amp;severity=high&amp;id=6914d432e9dc40953bf2f673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13057-sql-injection-in-campcodes-school-f-6d5a00c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13057%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=6914d470e9dc40953bf3791a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkcomet-rat-resurfaces-disguised-as-bitcoin-wall-dc6222bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkComet%20RAT%20Resurfaces%20Disguised%20as%20Bitcoin%20Wallet&amp;severity=medium&amp;id=6914d432e9dc40953bf2f677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25236-cwe-204-observable-discrepancy-resp-c66f1bec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25236%3A%20CWE-204%20Observable%20Discrepancy%20Response%20in%20Omnissa%20Omnissa%20Workspace%20ONE%20UEM&amp;severity=medium&amp;id=6914cdd8e9dc40953be8734e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-exchange-under-imminent-threat-act-now-a5b8937c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Exchange%20&apos;Under%20Imminent%20Threat%2C&apos;%20Act%20Now&amp;severity=medium&amp;id=6914c49cf490e7dc3cca23ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20379-the-product-exposes-sensitive-infor-5e4e2ec7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20379%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=6914cdd8e9dc40953be87359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20378-a-web-application-accepts-a-user-co-8b2c7716</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20378%3A%20A%20web%20application%20accepts%20a%20user-controlled%20input%20that%20specifies%20a%20link%20to%20an%20external%20site%2C%20and%20uses%20that%20link%20in%20a%20Redirect.%20This%20simplifies%20phishing%20attacks.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=6914cdd8e9dc40953be87356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12649-vulnerability-in-the-canon-ttf-inte-500d6b6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12649%3A%20vulnerability%20in%20the%20Canon%20TTF%20interpreter&amp;severity=medium&amp;id=6914bf85be619665a24c28be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13042-inappropriate-implementation-in-goo-d8b09865</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13042%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6914bbf8be619665a2474cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59089-allocation-of-resources-without-lim-7b726020</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59089%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20latchset%20kdcproxy&amp;severity=medium&amp;id=6914bbf8be619665a2474cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2843-incorrect-privilege-assignment-in-re-e0804672</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2843%3A%20Incorrect%20Privilege%20Assignment%20in%20rhobs%20observability-operator&amp;severity=high&amp;id=6914c133f490e7dc3cc5b766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59088-server-side-request-forgery-ssrf-in-bac330b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59088%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20latchset%20kdcproxy&amp;severity=high&amp;id=6914c133f490e7dc3cc5b76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinas-cyber-silence-is-more-worrying-than-russias-01abac19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%E2%80%99s%20Cyber%20Silence%20Is%20More%20Worrying%20Than%20Russia%E2%80%99s%20Noise%2C%20Chief%20Cybersecurity%20Strategist%20Says&amp;severity=medium&amp;id=6914b867be619665a241f6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11797-cwe-416-use-after-free-in-autodesk--8ec171c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11797%3A%20CWE-416%20Use%20After%20Free%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=6914b570be619665a23e09e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11795-cwe-787-out-of-bounds-write-in-auto-c921b4c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11795%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=6914b570be619665a23e09dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64293-cwe-89-improper-neutralization-of-s-f52b3fe7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64293%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Golemiq%200%20Day%20Analytics&amp;severity=null&amp;id=6914afd8224357dd22f5a671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-tool-uses-smart-redirects-to-bypass-detec-6d2b39b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Tool%20Uses%20Smart%20Redirects%20to%20Bypass%20Detection&amp;severity=medium&amp;id=6914b537be619665a23d4a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-ttp-based-defenses-outperform-traditional-ioc--2685c3fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20TTP-based%20Defenses%20Outperform%20Traditional%20IoC%20Hunting&amp;severity=high&amp;id=6914ac47224357dd22f05d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11367-cwe-502-deserialization-of-untruste-64bc34ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11367%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20N-able%20N-central&amp;severity=critical&amp;id=6914ac61224357dd22f06447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11366-cwe-22-improper-limitation-of-a-pat-07866850</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11366%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20N-able%20N-central&amp;severity=critical&amp;id=6914ac61224357dd22f06444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11700-cwe-611-improper-restriction-of-xml-e6e5c2c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11700%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20N-able%20N-central&amp;severity=high&amp;id=6914ac61224357dd22f0644a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9316-cwe-1284-improper-validation-of-spec-71e572e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9316%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20N-able%20N-central&amp;severity=medium&amp;id=6914a8db224357dd22ebe356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-uncovers-attacks-exploited-cisco-ise-and-ci-34fe2991</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Uncovers%20Attacks%20Exploited%20Cisco%20ISE%20and%20Citrix%20NetScaler%20as%20Zero-Day%20Flaws&amp;severity=critical&amp;id=6914a720917942a77a06bc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australias-spy-chief-warns-of-china-linked-threats-974228ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australia%E2%80%99s%20spy%20chief%20warns%20of%20China-linked%20threats%20to%20critical%20infrastructure&amp;severity=critical&amp;id=6914a720917942a77a06bc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-kakaotalk-and-google-find-2e027671</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20KakaoTalk%20and%20Google%20Find%20Hub%20in%20Android%20Spyware%20Attack&amp;severity=medium&amp;id=69149acae0dfecc86585b18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-uncovers-attacks-exploited-cisco-ise-and-ci-defa187e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Uncovers%20Attacks%20Exploited%20Cisco%20ISE%20and%20Citrix%20NetScaler%20as%20Zero-Day%20Flaws&amp;severity=critical&amp;id=69149bc7e0dfecc865864127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11567-cwe-276-incorrect-default-permissio-f8739d42</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11567%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=high&amp;id=691491c4e0dfecc865795596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11566-cwe-307-improper-restriction-of-exc-5193587d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11566%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=691491c4e0dfecc865795593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11565-cwe-22-improper-limitation-of-a-pat-7ea4cccf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11565%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=high&amp;id=69148b1edc194680d69bd95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sues-chinese-cybercriminals-behind-lighthou-98477771</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sues%20Chinese%20Cybercriminals%20Behind%20%E2%80%98Lighthouse%E2%80%99%20Phishing%20Kit&amp;severity=medium&amp;id=6914878edc194680d69590be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62876-cwe-250-execution-with-unnecessary--ed4ac18e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62876%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20SUSE%20openSUSE&amp;severity=medium&amp;id=691487b6dc194680d695990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-severity-vulnerabilities-patched-by-ivanti-an-92daa945</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High-Severity%20Vulnerabilities%20Patched%20by%20Ivanti%20and%20Zoom&amp;severity=high&amp;id=69147b3c73eb0cdb45ee5003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-paid-out-458000-at-live-hacking-event-98d639fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Paid%20Out%20%24458%2C000%20at%20Live%20Hacking%20Event&amp;severity=medium&amp;id=6914728b7ef2915d491408e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12998-cwe-287-improper-authentication-in--d28b293e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12998%3A%20CWE-287%20Improper%20Authentication%20in%20TYPO3%20Extension%20%22Modules%22&amp;severity=high&amp;id=69146f167ef2915d490f0559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-directory-under-siege-why-critical-infrastr-87160f7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Directory%20Under%20Siege%3A%20Why%20Critical%20Infrastructure%20Needs%20Stronger%20Security&amp;severity=critical&amp;id=6914773f7ef2915d491ab343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11994-cwe-79-improper-neutralization-of-i-40e30a4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yudiz%20Easy%20Email%20Subscription&amp;severity=high&amp;id=69146d167ef2915d490dc38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11454-cwe-89-improper-neutralization-of-s-3cdc0cd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11454%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20giuse%20Specific%20Content%20For%20Mobile%20%E2%80%93%20Customize%20the%20mobile%20version%20without%20redirections&amp;severity=medium&amp;id=69146d167ef2915d490dc387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/facebookmailcom-invites-exploited-to-phish-faceboo-833d457b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%40facebookmail.com%20Invites%20Exploited%20to%20Phish%20Facebook%20Business%20Users%20in%20Global%20Campaign&amp;severity=medium&amp;id=69146b987ef2915d490a7d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chipmaker-patch-tuesday-over-60-vulnerabilities-pa-4480d100</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chipmaker%20Patch%20Tuesday%3A%20Over%2060%20Vulnerabilities%20Patched%20by%20Intel&amp;severity=medium&amp;id=6914642aeaee7c6cd8a1da05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitcoin-queen-gets-11-years-in-prison-for-73-billi-9dca68cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CBitcoin%20Queen%E2%80%9D%20gets%2011%20years%20in%20prison%20for%20%247.3%20billion%20Bitcoin%20scam&amp;severity=high&amp;id=69146443eaee7c6cd8a1df7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-triofox-antivirus-feature-to-deploy--064fec21</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20abuse%20Triofox%20antivirus%20feature%20to%20deploy%20remote%20access%20tools&amp;severity=high&amp;id=69146443eaee7c6cd8a1df80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-fixed-a-maximum-severity-flaw-in-sql-anywhere--404d4e00</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20fixed%20a%20maximum%20severity%20flaw%20in%20SQL%20Anywhere%20Monitor&amp;severity=medium&amp;id=69146443eaee7c6cd8a1df84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/synology-fixes-beestation-zero-days-demoed-at-pwn2-e3bf5817</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Synology%20fixes%20BeeStation%20zero-days%20demoed%20at%20Pwn2Own%20Ireland&amp;severity=high&amp;id=691460b1eaee7c6cd89c5415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40144-4f986a14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40144&amp;severity=null&amp;id=69201f2edd76cb6d6068db26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40128-42733db7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40128&amp;severity=null&amp;id=69161915cdc01d12641ad2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-infostealer-disrupted-as-cybercrimina-6a6155e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%20infostealer%20disrupted%20as%20cybercriminals%20lose%20server%20access&amp;severity=high&amp;id=691460b1eaee7c6cd89c5419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixes-63-security-flaws-including-a-wind-296e00fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Fixes%2063%20Security%20Flaws%2C%20Including%20a%20Windows%20Kernel%20Zero-Day%20Under%20Active%20Attack&amp;severity=critical&amp;id=6914773f7ef2915d491ab346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37734-cwe-346-origin-validation-error-in--111ba0d1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37734%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69145d30eaee7c6cd896f657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-the-link-between-two-evolving-brazilian--60c96394</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20the%20Link%20Between%20Two%20Evolving%20Brazilian%20Banking%20Trojans&amp;severity=medium&amp;id=691457ec32a6693f6a217616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12382-cwe-22-improper-limitation-of-a-pat-4e00646e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12382%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AlgoSec%20Firewall%20Analyzer&amp;severity=high&amp;id=691457fb32a6693f6a219e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-infection-vector-using-applescripts-to-bypas-5a929635</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacOS%20Infection%20Vector%3A%20Using%20AppleScripts%20to%20bypass%20Gatekeeper&amp;severity=medium&amp;id=6914547632a6693f6a1c8ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61623-cwe-79-improper-neutralization-of-i-a8d862cd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=medium&amp;id=6914547632a6693f6a1c8ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59118-cwe-434-unrestricted-upload-of-file-1421ffd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59118%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=high&amp;id=6914547632a6693f6a1c8aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11962-cwe-79-improper-neutralization-of-i-233f188e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11962%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DivvyDrive%20Information%20Technologies%20Inc.%20Digital%20Corporate%20Warehouse&amp;severity=high&amp;id=6914547632a6693f6a1c8ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64407-cwe-862-missing-authorization-in-ap-364fe2cd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64407%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=medium&amp;id=6914547632a6693f6a1c8ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64406-cwe-787-out-of-bounds-write-in-apac-e25fbb6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64406%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=medium&amp;id=691450f332a6693f6a1683f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64405-cwe-862-missing-authorization-in-ap-8c73f704</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64405%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=691450f332a6693f6a1683ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64404-cwe-862-missing-authorization-in-ap-6bbd619d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64404%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=691450f332a6693f6a1683eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64403-cwe-862-missing-authorization-in-ap-0a2cddc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64403%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=691450f332a6693f6a1683e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64402-cwe-862-missing-authorization-in-ap-dfd30df6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64402%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=medium&amp;id=691450f332a6693f6a1683e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64401-cwe-862-missing-authorization-in-ap-e28401a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64401%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=69144e2332a6693f6a14571c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-launches-private-ai-compute-secure-ai-proce-dbebb724</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Launches%20&apos;Private%20AI%20Compute&apos;%20%E2%80%94%20Secure%20AI%20Processing%20with%20On-Device-Level%20Privacy&amp;severity=medium&amp;id=691458e032a6693f6a225981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12903-cwe-639-authorization-bypass-throug-f2db291a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12903%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20paymentplugins%20Payment%20Plugins%20Braintree%20For%20WooCommerce&amp;severity=high&amp;id=6914483ad823118ac8c87d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12732-cwe-200-exposure-of-sensitive-infor-dc8d38f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12732%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=medium&amp;id=6914483ad823118ac8c87d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-addressed-by-sie-fae2a683</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Addressed%20by%20Siemens%2C%20Rockwell%2C%20Aveva%2C%20Schneider&amp;severity=medium&amp;id=69144422d823118ac8c2feb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13047-cwe-89-improper-neutralization-of-s-c96c5d17</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13047&amp;severity=null&amp;id=691442b3d823118ac8c20f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13046-cwe-89-improper-neutralization-of-s-92a0314c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13046&amp;severity=null&amp;id=69143f7a41f31825271e58d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12872-cwe-79-improper-neutralization-of-i-a2eb0040</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12872%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20aEnrich%20a%2BHRD&amp;severity=medium&amp;id=69143f7a41f31825271e58da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12871-cwe-1390-weak-authentication-in-aen-ea6bb62a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12871%3A%20CWE-1390%20Weak%20Authentication%20in%20aEnrich%20a%2BHRD&amp;severity=critical&amp;id=69143bf741f3182527191a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12870-cwe-1390-weak-authentication-in-aen-ba4648c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12870%3A%20CWE-1390%20Weak%20Authentication%20in%20aEnrich%20a%2BHRD&amp;severity=critical&amp;id=69143bf741f3182527191a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12869-cwe-79-improper-neutralization-of-i-c20f7fba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20aEnrich%20a%2BHRD&amp;severity=medium&amp;id=6914387341f318252713cf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12018-cwe-79-improper-neutralization-of-i-755afbb2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12018%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sourcefound%20MembershipWorks%20%E2%80%93%20Membership%2C%20Events%20%26%20Directory&amp;severity=medium&amp;id=6914387341f318252713cf45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12113-cwe-862-missing-authorization-in-we-f835ba61</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12113%3A%20CWE-862%20Missing%20Authorization%20in%20webtoffee%20Alt%20Text%20Generator%20AI%20%E2%80%93%20Auto%20Generate%20%26%20Bulk%20Update%20Alt%20Texts%20For%20Images&amp;severity=medium&amp;id=6914387341f318252713cf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12633-cwe-862-missing-authorization-in-st-96b3459f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12633%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Bookit%20%E2%80%94%20Booking%20%26%20Appointment%20Calendar&amp;severity=high&amp;id=6914387341f318252713cf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/no-leak-no-problem-bypassing-aslr-with-a-rop-chain-7255e599</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=No%20Leak%2C%20No%20Problem%20-%20Bypassing%20ASLR%20with%20a%20ROP%20Chain%20to%20Gain%20RCE&amp;severity=medium&amp;id=6914387341f318252713cf31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11560-cwe-79-cross-site-scripting-xss-in--6bb1e9bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11560%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Team%20Members%20Showcase&amp;severity=high&amp;id=691423e692108619e6de5f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12901-cwe-352-cross-site-request-forgery--d1cca107</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12901%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20asgaros%20Asgaros%20Forum&amp;severity=medium&amp;id=691410463f7e91646d5ffa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12833-cwe-639-authorization-bypass-throug-ce618d2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12833%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20paoltaia%20GeoDirectory%20%E2%80%93%20WP%20Business%20Directory%20Plugin%20and%20Classified%20Listings%20Directory&amp;severity=medium&amp;id=691410463f7e91646d5ffa2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12087-cwe-639-authorization-bypass-throug-7a161748</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12087%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20acowebs%20Wishlist%20and%20Save%20for%20later%20for%20Woocommerce&amp;severity=medium&amp;id=691410463f7e91646d5ffa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54983-cwe-772-missing-release-of-resource-4fd2fbab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54983%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Zscaler%20Zscaler%20Client%20Connector&amp;severity=medium&amp;id=6913fe4faf9b993b90ac5582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43205-an-app-may-be-able-to-bypass-aslr-i-e8289a95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43205%3A%20An%20app%20may%20be%20able%20to%20bypass%20ASLR%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6913d87f385fb4be458c9b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-12-ed7d1e08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-12&amp;severity=medium&amp;id=6915213aa47dcaa1fc35ec0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63645-na-80d499e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63645%3A%20n%2Fa&amp;severity=medium&amp;id=6914fdef6c8e220c428f7f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63396-na-e796c969</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63396%3A%20n%2Fa&amp;severity=low&amp;id=6914f6446c8e220c4284c5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57310-na-07f36aab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57310%3A%20n%2Fa&amp;severity=high&amp;id=6914dcae789e20b800748ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56385-na-a308a841</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56385%3A%20n%2Fa&amp;severity=critical&amp;id=6914dcae789e20b800748adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63929-na-0913a1c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63929%3A%20n%2Fa&amp;severity=high&amp;id=6914d9d9789e20b800721479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63679-na-7907f420</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63679%3A%20n%2Fa&amp;severity=critical&amp;id=6914d9d9789e20b80072146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63927-na-40eb4cfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63927%3A%20n%2Fa&amp;severity=medium&amp;id=6914d7b9e9dc40953bf857e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60646-na-dcb90289</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60646%3A%20n%2Fa&amp;severity=medium&amp;id=6914d470e9dc40953bf37921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63811-na-c3a5e037</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63811%3A%20n%2Fa&amp;severity=high&amp;id=6914cdd8e9dc40953be8735c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65001-cwe-787-out-of-bounds-write-in-fuji-97cfedd6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65001%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Fujitsu%20fbiosdrv.sys&amp;severity=high&amp;id=6914cdd8e9dc40953be87352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60645-na-7f73a914</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60645%3A%20n%2Fa&amp;severity=medium&amp;id=6914cdd8e9dc40953be8734a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65002-cwe-863-incorrect-authorization-in--95cbd85a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65002%3A%20CWE-863%20Incorrect%20Authorization%20in%20Fujitsu%20%2F%20Fsas%20Technologies%20iRMC&amp;severity=high&amp;id=6914cbb4f490e7dc3cd418cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52331-na-441e461c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52331%3A%20n%2Fa&amp;severity=medium&amp;id=6914c133f490e7dc3cc5b761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63419-na-bf10203e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63419%3A%20n%2Fa&amp;severity=medium&amp;id=6914bf7cbe619665a24c2606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59491-na-253f7347</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59491%3A%20n%2Fa&amp;severity=medium&amp;id=6914b570be619665a23e09e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64281-na-f0518d84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64281%3A%20n%2Fa&amp;severity=critical&amp;id=6914b35c224357dd22fa7e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64280-na-36a9403c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64280%3A%20n%2Fa&amp;severity=critical&amp;id=6914b35c224357dd22fa7e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63353-na-0a4b09fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63353%3A%20n%2Fa&amp;severity=critical&amp;id=6914b35c224357dd22fa7e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63289-na-2259ad26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63289%3A%20n%2Fa&amp;severity=critical&amp;id=6914afd8224357dd22f5a66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63666-na-e05fd733</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63666%3A%20n%2Fa&amp;severity=critical&amp;id=6914a3a0917942a77a010ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63667-na-8345481e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63667%3A%20n%2Fa&amp;severity=high&amp;id=69149adfe0dfecc86585ba9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-29-vulnerabilities-1ba101c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2029%20Vulnerabilities&amp;severity=medium&amp;id=6913a8b3768d655a7be2ad49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-actively-exploited-windows-kerne-a7d7d5c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Actively%20Exploited%20Windows%20Kernel%20Zero-Day&amp;severity=medium&amp;id=6913a538768d655a7bdc570b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61835-integer-underflow-wrap-or-wraparoun-4bce971a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61835%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61833-out-of-bounds-read-cwe-125-in-adobe-0c3f2afd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61833%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64531-use-after-free-cwe-416-in-adobe-sub-e8ed0aae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64531%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61834-use-after-free-cwe-416-in-adobe-sub-43e653f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61834%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-now-microsoft-flags-zero-day-amp-critical-ze-fee5fd63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%20Now%3A%20Microsoft%20Flags%20Zero-Day%20%26amp%3B%20Critical%20Zero-Click%20Bugs&amp;severity=critical&amp;id=6913dd72385fb4be4590de3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40827-cwe-427-uncontrolled-search-path-el-5d011f68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40827%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20Siemens%20Software%20Center&amp;severity=high&amp;id=6913a08cf4d5bbdab5b1c76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40817-cwe-306-missing-authentication-for--2559547b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40817%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20LOGO!%2012%2F24RCE&amp;severity=medium&amp;id=6913a08cf4d5bbdab5b1c76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40816-cwe-306-missing-authentication-for--4b35fe39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40816%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20LOGO!%2012%2F24RCE&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40815-cwe-120-buffer-copy-without-checkin-cef0120a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40815%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Siemens%20LOGO!%2012%2F24RCE&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40763-cwe-427-uncontrolled-search-path-el-b781678a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40763%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20Altair%20Grid%20Engine&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40760-cwe-209-generation-of-error-message-f1bb3cc6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40760%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Siemens%20Altair%20Grid%20Engine&amp;severity=medium&amp;id=6913a08bf4d5bbdab5b1c73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40744-cwe-295-improper-certificate-valida-c42cb791</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40744%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20Solid%20Edge%20SE2025&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32014-cwe-732-incorrect-permission-assign-1f4b4046</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32014%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20Spectrum%20Power%204&amp;severity=medium&amp;id=6913a08bf4d5bbdab5b1c734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32011-cwe-829-inclusion-of-functionality--9532e1cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32011%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32010-cwe-732-incorrect-permission-assign-04b2acf1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32010%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32009-cwe-266-incorrect-privilege-assignm-ca1262db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32009%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32008-cwe-648-incorrect-use-of-privileged-4ec5bdd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32008%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41116-cwe-653-in-grafana-labs-grafana-dat-8cc4fcf0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41116%3A%20CWE-653%20in%20Grafana%20Labs%20Grafana%20Databricks%20Datasource%20Plugin&amp;severity=low&amp;id=6913a6d6768d655a7be0441c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3717-cwe-653-in-grafana-labs-grafana-snow-c766e893</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3717%3A%20CWE-653%20in%20Grafana%20Labs%20Grafana%20Snowflake%20Datasource%20Plugin&amp;severity=low&amp;id=6913a6d6768d655a7be04419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12748-allocation-of-resources-without-lim-09c56e7a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12748%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=6913946b553a74ed95f8eddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cl0p-ransomware-lists-nhs-uk-as-victim-days-after--a7fe826e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cl0p%20Ransomware%20Lists%20NHS%20UK%20as%20Victim%2C%20Days%20After%20Washington%20Post%20Breach&amp;severity=high&amp;id=69139457553a74ed95f8cf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-for-november-2025-tue-nov--3fb8b7ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20for%20November%202025%2C%20(Tue%2C%20Nov%2011th)&amp;severity=critical&amp;id=691390c8553a74ed95f3a54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61843-out-of-bounds-read-cwe-125-in-adobe-03f74a3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61843%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61839-out-of-bounds-read-cwe-125-in-adobe-eaa4dd99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61839%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=high&amp;id=691388803abd2cedbf57e43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61845-out-of-bounds-read-cwe-125-in-adobe-50dacef5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61845%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61840-out-of-bounds-read-cwe-125-in-adobe-d72212a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61840%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61837-heap-based-buffer-overflow-cwe-122--8f979584</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61837%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Format%20Plugins&amp;severity=high&amp;id=691388803abd2cedbf57e435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61838-heap-based-buffer-overflow-cwe-122--e6457f48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61838%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Format%20Plugins&amp;severity=high&amp;id=691388803abd2cedbf57e438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61841-out-of-bounds-read-cwe-125-in-adobe-b5d14a08</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61841%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61842-use-after-free-cwe-416-in-adobe-for-e86f2f68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61842%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61844-out-of-bounds-read-cwe-125-in-adobe-9df87e2c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61844%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-malware-maverick-hijacks-browser-sessions-c711f61c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Malware%20&apos;Maverick&apos;%20Hijacks%20Browser%20Sessions%20to%20Target%20Brazil&apos;s%20Biggest%20Banks&amp;severity=medium&amp;id=6913dcc3385fb4be45906327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61830-incorrect-authorization-cwe-863-in--e211b755</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61830%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Pass&amp;severity=high&amp;id=69138f06553a74ed95f238b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-fake-hotel-domains-used-in-massive-ph-e00a9ed9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Fake%20Hotel%20Domains%20Used%20in%20Massive%20Phishing%20Campaign&amp;severity=medium&amp;id=69138101c532f1ef717691b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30398-cwe-862-missing-authorization-in-mi-8525b819</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30398%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Nuance%20PowerScribe%20360%20version%204.0.1&amp;severity=high&amp;id=69137c4747ab3590319da053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62453-cwe-1426-improper-validation-of-gen-c5c18320</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62453%3A%20CWE-1426%3A%20Improper%20Validation%20of%20Generative%20AI%20Output%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=medium&amp;id=69137c4d47ab3590319dbf81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60721-cwe-270-privilege-context-switching-2ca92e32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60721%3A%20CWE-270%3A%20Privilege%20Context%20Switching%20Error%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69137c4a47ab3590319da0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62449-cwe-22-improper-limitation-of-a-pat-b9158742</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62449%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=medium&amp;id=69137c4d47ab3590319dbf73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62222-cwe-77-improper-neutralization-of-s-4f6c6b06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62222%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=69137c4c47ab3590319dbefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62213-cwe-416-use-after-free-in-microsoft-15624c49</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62213%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62215-cwe-362-concurrent-execution-using--7521150c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62215%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4c47ab3590319dbeea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62214-cwe-77-improper-neutralization-of-s-451fb3bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62214%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=medium&amp;id=69137c4c47ab3590319dbee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62211-cwe-79-improper-neutralization-of-i-a2d38082</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62211%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Dynamics%20365%20Field%20Service%20(online)&amp;severity=high&amp;id=69137c4c47ab3590319dbee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59499-cwe-89-improper-neutralization-of-s-75128a85</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59499%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69137c4747ab3590319da05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62209-cwe-532-insertion-of-sensitive-info-a7be5b0f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62209%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69137c4b47ab3590319dbec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62208-cwe-532-insertion-of-sensitive-info-253717a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62208%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69137c4b47ab3590319dbec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62205-cwe-416-use-after-free-in-microsoft-e7ece5c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62205%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62204-cwe-502-deserialization-of-untruste-3c39ca12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62204%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69137c4b47ab3590319dbeb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62203-cwe-416-use-after-free-in-microsoft-ba882bb6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62203%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62202-cwe-125-out-of-bounds-read-in-micro-4c651779</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62202%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62201-cwe-122-heap-based-buffer-overflow--f185cded</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62201%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62200-cwe-822-untrusted-pointer-dereferen-f58e1ae8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62200%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60724-cwe-122-heap-based-buffer-overflow--8ba2b170</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60724%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=critical&amp;id=69137c4a47ab3590319da106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60723-cwe-362-concurrent-execution-using--d608174f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60723%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69137c4a47ab3590319da103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60720-cwe-126-buffer-over-read-in-microso-b5cb5d56</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60720%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4a47ab3590319da0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60718-cwe-426-untrusted-search-path-in-mi-d3103e9e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60718%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69137c4947ab3590319da0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60717-cwe-416-use-after-free-in-microsoft-5c22b32d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60717%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4947ab3590319da0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60716-cwe-416-use-after-free-in-microsoft-09a4fcf1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60716%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4947ab3590319da0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60715-cwe-122-heap-based-buffer-overflow--fce55c24</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60715%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4947ab3590319da0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60714-cwe-122-heap-based-buffer-overflow--eec556c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60714%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4947ab3590319da0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60713-cwe-822-untrusted-pointer-dereferen-706dbdb7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60713%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69137c4947ab3590319da0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59515-cwe-416-use-after-free-in-microsoft-70863b22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59515%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4847ab3590319da094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59514-cwe-269-improper-privilege-manageme-2f9942ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59514%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47179-cwe-284-improper-access-control-in--e51584e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47179%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=medium&amp;id=69137c4747ab3590319da056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59240-cwe-200-exposure-of-sensitive-infor-b10b8291</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59240%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=69137c4747ab3590319da059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62452-cwe-122-heap-based-buffer-overflow--5bb3b416</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62452%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4d47ab3590319dbf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62220-cwe-122-heap-based-buffer-overflow--d16614f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62220%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Subsystem%20for%20Linux%20GUI&amp;severity=high&amp;id=69137c4c47ab3590319dbef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62219-cwe-415-double-free-in-microsoft-wi-61854063</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62219%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62218-cwe-362-concurrent-execution-using--2046682f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62218%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62217-cwe-362-concurrent-execution-using--d5272c53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62217%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60722-cwe-22-improper-limitation-of-a-pat-0c579c8a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60722%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20OneDrive%20for%20Android&amp;severity=medium&amp;id=69137c4a47ab3590319da100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60719-cwe-822-untrusted-pointer-dereferen-1ca968ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60719%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4a47ab3590319da0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62216-cwe-416-use-after-free-in-microsoft-72cd18bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62216%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4c47ab3590319dbeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62210-cwe-79-improper-neutralization-of-i-35018d6f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62210%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Dynamics%20365%20Field%20Service%20(online)&amp;severity=high&amp;id=69137c4b47ab3590319dbec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62206-cwe-200-exposure-of-sensitive-infor-08dd1692</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62206%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=medium&amp;id=69137c4b47ab3590319dbebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62199-cwe-416-use-after-free-in-microsoft-562e5d11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62199%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4a47ab3590319da112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60728-cwe-822-untrusted-pointer-dereferen-9cdfe06a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60728%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=69137c4a47ab3590319da10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60727-cwe-125-out-of-bounds-read-in-micro-b5bf22ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60727%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4a47ab3590319da10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60726-cwe-125-out-of-bounds-read-in-micro-883f7fd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60726%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4a47ab3590319da109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60710-cwe-59-improper-link-resolution-bef-960ec2ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60710%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69137c4947ab3590319da0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60709-cwe-125-out-of-bounds-read-in-micro-e44aac41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60709%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4947ab3590319da0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60708-cwe-822-untrusted-pointer-dereferen-c673c25b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60708%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4947ab3590319da0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60707-cwe-416-use-after-free-in-microsoft-ec18a66e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60707%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4947ab3590319da0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60706-cwe-125-out-of-bounds-read-in-micro-61b4092d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60706%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4847ab3590319da0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60705-cwe-284-improper-access-control-in--49429161</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60705%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60704-cwe-325-missing-cryptographic-step--7deb0de7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60704%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60703-cwe-822-untrusted-pointer-dereferen-8d7f0efb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60703%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59513-cwe-125-out-of-bounds-read-in-micro-ad738bd3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59513%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4847ab3590319da08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59512-cwe-284-improper-access-control-in--978ed218</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59512%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59511-cwe-73-external-control-of-file-nam-f7bae898</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59511%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4847ab3590319da088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59510-cwe-59-improper-link-resolution-bef-cdae5dd5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59510%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4847ab3590319da085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59509-cwe-201-insertion-of-sensitive-info-c39115d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59509%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69137c4747ab3590319da06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59508-cwe-362-concurrent-execution-using--cf0c4445</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59508%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59507-cwe-362-concurrent-execution-using--2d6ff914</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59507%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59506-cwe-362-concurrent-execution-using--ff15ce0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59506%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59505-cwe-415-double-free-in-microsoft-wi-b513b0fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59505%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59504-cwe-122-heap-based-buffer-overflow--8277f06c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59504%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69137c4747ab3590319da05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-cpu-spike-led-to-uncovering-a-ransomhub-rans-5e444c90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20CPU%20spike%20led%20to%20uncovering%20a%20RansomHub%20ransomware%20attack&amp;severity=high&amp;id=691378bc47ab359031985a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fantasy-hub-russian-sold-android-rat-boasts-full-d-d86dfbe8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fantasy%20Hub%3A%20Russian-sold%20Android%20RAT%20boasts%20full%20device%20espionage%20as%20MaaS&amp;severity=medium&amp;id=691378bc47ab359031985a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/globallogic-warns-10000-employees-of-data-theft-af-9afa4caf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlobalLogic%20warns%2010%2C000%20employees%20of%20data%20theft%20after%20Oracle%20breach&amp;severity=high&amp;id=691378bc47ab359031985a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-fixes-hardcoded-credentials-flaw-in-sql-anywhe-870f228c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20fixes%20hardcoded%20credentials%20flaw%20in%20SQL%20Anywhere%20Monitor&amp;severity=high&amp;id=691378bc47ab359031985a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61828-out-of-bounds-write-cwe-787-in-adob-0a1b3006</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61828%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab35903198925f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61827-heap-based-buffer-overflow-cwe-122--1f2b3e62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61827%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab35903198925c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61826-integer-underflow-wrap-or-wraparoun-1fda6622</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61826%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab359031989259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61829-heap-based-buffer-overflow-cwe-122--a60a22ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61829%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab359031989262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61836-integer-underflow-wrap-or-wraparoun-ce469a8d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61836%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab359031989265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61831-out-of-bounds-write-cwe-787-in-adob-39b629ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61831%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=6913708312d2ca32afd4839d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61820-heap-based-buffer-overflow-cwe-122--2f685b7f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61820%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=6913708312d2ca32afd4839a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61819-heap-based-buffer-overflow-cwe-122--a81afdd0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61819%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=6913708312d2ca32afd48397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61818-use-after-free-cwe-416-in-adobe-inc-9a125929</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61818%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=6913708312d2ca32afd483b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61816-heap-based-buffer-overflow-cwe-122--3ae891ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61816%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=6913708312d2ca32afd483b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61817-use-after-free-cwe-416-in-adobe-inc-f2746b1c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61817%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=6913708312d2ca32afd483b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61815-use-after-free-cwe-416-in-adobe-ind-64faab50</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61815%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708312d2ca32afd483ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61814-use-after-free-cwe-416-in-adobe-ind-4fc45bc9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61814%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708312d2ca32afd483aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61824-heap-based-buffer-overflow-cwe-122--febaaebc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61824%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708412d2ca32afd483f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61832-heap-based-buffer-overflow-cwe-122--63497d09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61832%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708412d2ca32afd483f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35972-escalation-of-privilege-in-intel-mp-acf53ddd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35972%3A%20Escalation%20of%20Privilege%20in%20Intel%20MPI%20Library&amp;severity=medium&amp;id=69136b7412d2ca32afccdbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35971-denial-of-service-in-intelr-prosetw-7875367c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35971%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7412d2ca32afccdbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35968-escalation-of-privilege-in-slim-boo-9651f763</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35968%3A%20Escalation%20of%20Privilege%20in%20Slim%20Bootloader&amp;severity=high&amp;id=69136b7412d2ca32afccdbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35967-denial-of-service-in-intelr-prosetw-e50f67d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35967%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7312d2ca32afccdbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35963-denial-of-service-in-intelr-prosetw-d0026c7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35963%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7312d2ca32afccdbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33029-denial-of-service-in-intelr-prosetw-b49d631f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33029%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7312d2ca32afccdba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33000-escalation-of-privilege-in-intel-qu-c3f7f00f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33000%3A%20Escalation%20of%20Privilege%20in%20Intel%20QuickAssist%20Technology&amp;severity=high&amp;id=69136b7312d2ca32afccdba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32732-denial-of-service-in-intelr-qat-win-32ff3334</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32732%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32449-escalation-of-privilege-in-pri-driv-cf66d30d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32449%3A%20Escalation%20of%20Privilege%20in%20PRI%20Driver%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32446-escalation-of-privilege-in-intel-qu-1fdc9a05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32446%3A%20Escalation%20of%20Privilege%20in%20Intel%20QuickAssist%20Technology%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32091-escalation-of-privilege-in-intelr-a-38abb795</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32091%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Arc(TM)%20B-series%20GPUs&amp;severity=high&amp;id=69136b7312d2ca32afccdb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32088-denial-of-service-in-intelr-qat-win-08e42ed0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32088%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32038-escalation-of-privilege-in-intel-on-60fbd012</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32038%3A%20Escalation%20of%20Privilege%20in%20Intel%20oneAPI%20DPC%2B%2BC%2B%2B%20Compiler%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32037-denial-of-service-in-intelr-present-b87c2c07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32037%3A%20Denial%20of%20Service%20in%20Intel(R)%20PresentMon&amp;severity=low&amp;id=69136b7212d2ca32afccdb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32001-escalation-of-privilege-in-intelr-p-2194e05c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32001%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Identification%20Utility&amp;severity=medium&amp;id=69136b7212d2ca32afccdb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31948-denial-of-service-in-intelr-oneapi--822c6ab0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31948%3A%20Denial%20of%20Service%20in%20Intel(R)%20oneAPI%20Math%20Kernel%20Library&amp;severity=medium&amp;id=69136b7212d2ca32afccdb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31940-escalation-of-privilege-in-intelr-t-14e4ce0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31940%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Thread%20Director%20Visualizer%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31937-denial-of-service-in-intelr-qat-win-04c54dd1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31937%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31931-escalation-of-privilege-in-instrume-3f52a2f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31931%3A%20Escalation%20of%20Privilege%20in%20Instrumentation%20and%20Tracing%20Technology%20API%20(ITT%20API)%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31647-escalation-of-privilege-in-intelr-g-3b5ecd31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31647%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31645-escalation-of-privilege-in-system-e-f675cca3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31645%3A%20Escalation%20of%20Privilege%20in%20System%20Event%20Log%20Viewer%20Utility%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31146-denial-of-service-in-intel-ethernet-b5c6db02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31146%3A%20Denial%20of%20Service%20in%20Intel%20Ethernet%20Adapter%20Complete%20Driver%20Pack%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30518-escalation-of-privilege-in-intelr-p-b54ab4da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30518%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20PresentMon&amp;severity=medium&amp;id=69136b7212d2ca32afccdb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30509-escalation-of-privilege-in-intel-qu-bd0a2da1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30509%3A%20Escalation%20of%20Privilege%20in%20Intel%20QuickAssist%20Technology%20software&amp;severity=medium&amp;id=69136b7112d2ca32afccdb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30506-escalation-of-privilege-in-intel-dr-7d6cb8b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30506%3A%20Escalation%20of%20Privilege%20in%20Intel%20Driver%20and%20Support%20Assistant&amp;severity=medium&amp;id=69136b7112d2ca32afccdb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30255-denial-of-service-in-intelr-prosetw-cc867c50</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30255%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7112d2ca32afccdb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30185-escalation-of-privilege-denial-of-s-b3a276e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30185%3A%20Escalation%20of%20Privilege%2C%20Denial%20of%20Service%20in%20Intel%20UEFI%20reference%20platforms&amp;severity=high&amp;id=69136b7112d2ca32afccdb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30182-escalation-of-privilege-in-intelr-d-a260cdaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30182%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Distribution%20for%20Python%20software%20installers&amp;severity=medium&amp;id=69136b7112d2ca32afccdb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27725-denial-of-service-in-acat-00c9bfdc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27725%3A%20Denial%20of%20Service%20in%20ACAT&amp;severity=medium&amp;id=69136b7112d2ca32afccdb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27713-escalation-of-privilege-in-intelr-q-82aef77d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27713%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=high&amp;id=69136b7112d2ca32afccdb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27712-escalation-of-privilege-in-intelr-n-1ad547b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27712%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Neural%20Compressor%20software&amp;severity=low&amp;id=69136b7112d2ca32afccdb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27711-escalation-of-privilege-in-intelr-o-82feefe9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27711%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20One%20Boot%20Flash%20Update%20(Intel(R)%20OFU)%20software&amp;severity=medium&amp;id=69136b7112d2ca32afccdb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27710-information-disclosure-in-intelr-qa-6549795c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27710%3A%20Information%20Disclosure%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7112d2ca32afccdb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27249-denial-of-service-in-gaudi-software-d11bd282</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27249%3A%20Denial%20of%20Service%20in%20Gaudi%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27246-escalation-of-privilege-in-intelr-p-0c902e99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27246%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Identification%20Utility&amp;severity=medium&amp;id=69136b7012d2ca32afccdb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26694-denial-of-service-in-intelr-qat-win-81832c6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26694%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26405-denial-of-service-in-intelr-npu-dri-98e2aefe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26405%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=69136b7012d2ca32afccdb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26402-denial-of-service-in-intelr-npu-dri-b1326d94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26402%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=69136b7012d2ca32afccdb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25216-denial-of-service-in-intelr-graphic-ac4c5817</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25216%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers%20and%20Intel%20LTS%20kernels&amp;severity=low&amp;id=69136b7012d2ca32afccdb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25059-escalation-of-privilege-in-intelr-o-187efdc3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25059%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20One%20Boot%20Flash%20Update%20(Intel(R)%20OFU)%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24918-escalation-of-privilege-in-intelr-s-f51758fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24918%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Server%20Configuration%20Utility%20software%20and%20Intel(R)%20Server%20Firmware%20Update%20Utility%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24863-information-disclosure-in-intelr-ci-d65844a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24863%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24862-escalation-of-privilege-in-intelr-c-06fd24ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24862%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=low&amp;id=69136b7012d2ca32afccdb09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24848-escalation-of-privilege-in-intelr-c-c354dfb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24848%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24847-information-disclosure-in-intelr-ci-c9aaed07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24847%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24842-escalation-of-privilege-in-intelr-s-67f94b52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24842%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20System%20Support%20Utility&amp;severity=medium&amp;id=69136b6f12d2ca32afccda45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24838-escalation-of-privilege-in-intelr-c-dba81dfd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24838%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=high&amp;id=69136b6f12d2ca32afccda42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24834-information-disclosure-in-intelr-ci-17d21ff2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24834%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24519-escalation-of-privilege-in-intelr-q-35ef233f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24519%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24516-information-disclosure-in-intelr-ci-63f9097b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24516%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24512-denial-of-service-in-intelr-prosetw-e1e0284f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24512%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=medium&amp;id=69136b6f12d2ca32afccda36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24491-escalation-of-privilege-in-intelr-k-d0738585</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24491%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Killer(TM)%20Performance%20Suite%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24327-escalation-of-privilege-in-intelr-r-0c3503a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24327%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Rapid%20Storage%20Technology%20Application&amp;severity=medium&amp;id=69136b6f12d2ca32afccda30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24314-information-disclosure-in-intelr-ci-fed80f06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24314%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=low&amp;id=69136b6e12d2ca32afccda17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24307-escalation-of-privilege-in-intelr-c-ef5c664d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24307%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=low&amp;id=69136b6e12d2ca32afccda14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24299-escalation-of-privilege-in-intelr-c-0c4793b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24299%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=high&amp;id=69136b6e12d2ca32afccda11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22391-escalation-of-privilege-in-sigtest-27512e47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22391%3A%20Escalation%20of%20Privilege%20in%20SigTest&amp;severity=medium&amp;id=69136b6e12d2ca32afccda0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20622-information-disclosure-in-intelr-np-2bd612de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20622%3A%20Information%20Disclosure%20in%20Intel(R)%20NPU%20Drivers%20for%20Windows&amp;severity=low&amp;id=69136b6e12d2ca32afccda0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20614-escalation-of-privilege-in-intelr-c-fdeaefb5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20614%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6e12d2ca32afccda08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20065-escalation-of-privilege-in-display--264465b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20065%3A%20Escalation%20of%20Privilege%20in%20Display%20Virtualization%20for%20Windows%20OS%20software&amp;severity=medium&amp;id=69136b6e12d2ca32afccda05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20056-escalation-of-privilege-in-intel-vt-f4012e36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20056%3A%20Escalation%20of%20Privilege%20in%20Intel%20VTune%20Profiler&amp;severity=medium&amp;id=69136b6e12d2ca32afccda02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20050-escalation-of-privilege-in-intelr-c-8e0ae3af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20050%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6e12d2ca32afccd9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20010-escalation-of-privilege-in-intelr-p-5e178b63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20010%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Identification%20Utility&amp;severity=high&amp;id=69136b6e12d2ca32afccd9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-the-pixnapping-vulnerability-and-how-to-pr-f86fdfc6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20the%20Pixnapping%20vulnerability%2C%20and%20how%20to%20protect%20your%20Android%20smartphone%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69136631f922b639ab601387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33186-cwe-798-use-of-hard-coded-credentia-acf2a764</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33186%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20NVIDIA%20AuthN%20component%20of%20NVIDIA%20AIStore&amp;severity=high&amp;id=69136629f922b639ab60127a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33185-cwe-862-missing-authorization-in-nv-0993ca5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33185%3A%20CWE-862%20Missing%20Authorization%20in%20NVIDIA%20AuthN%20component%20of%20NVIDIA%20AIStore&amp;severity=medium&amp;id=69136629f922b639ab601275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33202-cwe-121-stack-based-buffer-overflow-bb587535</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33202%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=69136629f922b639ab60127f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33178-cwe-94-improper-control-of-generati-31cf333e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33178%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69136629f922b639ab601270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23361-cwe-94-improper-control-of-generati-b574a985</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23361%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69136629f922b639ab60126b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12944-cwe-20-improper-input-validation-in-3dd765ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12944%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20DGN2200v4&amp;severity=medium&amp;id=69136629f922b639ab601267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12943-cwe-295-improper-certificate-valida-ab25bf56</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12943%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20NETGEAR%20RAX30&amp;severity=medium&amp;id=69136629f922b639ab601262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12942-cwe-20-improper-input-validation-in-712ef338</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12942%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20R6260&amp;severity=medium&amp;id=69136629f922b639ab60125d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12940-cwe-532-insertion-of-sensitive-info-0c2878b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12940%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20NETGEAR%20WAX610&amp;severity=low&amp;id=691362a4f922b639ab5baf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23357-cwe-94-improper-control-of-generati-028ccdb8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23357%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=691362a4f922b639ab5baf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13032-cwe-367-time-of-check-time-of-use-t-193bf47e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13032%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Avast%20(Free%2FPremiium%2FUltimeat)%20Antivirus&amp;severity=critical&amp;id=691362a4f922b639ab5baf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10905-cwe-693-protection-mechanism-failur-c43ff941</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10905%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20Avast%20Free%20Antivirus&amp;severity=medium&amp;id=69135f1ef922b639ab566fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13027-vulnerability-in-mozilla-firefox-993e9be1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13027%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d98f922b639ab555fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13020-vulnerability-in-mozilla-firefox-9ceb3403</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13020%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13019-vulnerability-in-mozilla-firefox-50a90c9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13019%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13018-vulnerability-in-mozilla-firefox-246cf439</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13018%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13017-vulnerability-in-mozilla-firefox-25d14d7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13017%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13026-vulnerability-in-mozilla-firefox-81f48656</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13026%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13025-vulnerability-in-mozilla-firefox-086538a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13025%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d98f922b639ab555fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13024-vulnerability-in-mozilla-firefox-be9a6062</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13024%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13016-vulnerability-in-mozilla-firefox-467f579b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13016%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13023-vulnerability-in-mozilla-firefox-4fe99db0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13023%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13022-vulnerability-in-mozilla-firefox-301dd4e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13022%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13021-vulnerability-in-mozilla-firefox-29039dd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13021%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d97f922b639ab555f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13015-vulnerability-in-mozilla-firefox-17595576</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13015%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=low&amp;id=69135d97f922b639ab555f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13014-vulnerability-in-mozilla-firefox-8ec798d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13014%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13013-vulnerability-in-mozilla-firefox-fbf5119f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13013%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69135d97f922b639ab555f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13012-vulnerability-in-mozilla-firefox-e3142bab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13012%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-is-back-using-a-new-font-trick-to-hide--237ab899</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GootLoader%20Is%20Back%2C%20Using%20a%20New%20Font%20Trick%20to%20Hide%20Malware%20on%20WordPress%20Sites&amp;severity=medium&amp;id=69135a23b36faa5b6c0e4fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9408-privilege-context-switching-error-in-42aa32aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9408%3A%20Privilege%20Context%20Switching%20Error%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=69135a44b36faa5b6c0e5fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10918-cwe-276-incorrect-default-permissio-0e26dc9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10918%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69135a44b36faa5b6c0e5fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grandparents-to-c-suite-elder-fraud-reveals-gaps-i-33c8c305</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grandparents%20to%20C-Suite%3A%20Elder%20Fraud%20Reveals%20Gaps%20in%20Human-Centered%20Cybersecurity&amp;severity=medium&amp;id=6913dd72385fb4be4590de3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-triofox-vulnerability-exploited-in-the-wi-aed46803</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Triofox%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=691356a3b36faa5b6c099ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64773-cwe-362-in-jetbrains-youtrack-b7904d44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64773%3A%20CWE-362%20in%20JetBrains%20YouTrack&amp;severity=low&amp;id=691356bfb36faa5b6c09d257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11959-cwe-552-files-or-directories-access-7e61ecfb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11959%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Premierturk%20Information%20Technologies%20Inc.%20Excavation%20Management%20Information%20System&amp;severity=high&amp;id=6913479c9f8eafcddaf75f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-firefox-protections-halve-the-number-of-tracka-3b363dbd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Firefox%20Protections%20Halve%20the%20Number%20of%20Trackable%20Users&amp;severity=medium&amp;id=691342d1e55e7c79b8cee282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prompt-injection-in-ai-browsers-6d354b57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prompt%20Injection%20in%20AI%20Browsers&amp;severity=medium&amp;id=691342e6e55e7c79b8cee9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11697-cwe-200-exposure-of-sensitive-infor-7a27a34a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11697%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Rockwell%20Automation%20Studio%205000%20%C2%AE%20Simulation%20Interface&amp;severity=high&amp;id=691342f4e55e7c79b8cef9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11696-cwe-22-improper-limitation-of-a-pat-ab878ddb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11696%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Rockwell%20Automation%20Studio%205000%C2%AE%20Simulation%20Interface%E2%84%A2&amp;severity=high&amp;id=69133f64e55e7c79b8ca8fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12101-cwe-79-improper-neutralization-of-i-8a911c53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12101%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NetScaler%20ADC&amp;severity=medium&amp;id=69133f64e55e7c79b8ca8feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11862-cwe-863-incorrect-authorization-in--920d5051</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11862%3A%20CWE-863%20Incorrect%20Authorization%20in%20Rockwell%20Automation%20Verve%20Asset%20Manager&amp;severity=high&amp;id=69133f64e55e7c79b8ca8fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-flaws-in-sql-anywhere-monitor-c1bc148e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20Flaws%20in%20SQL%20Anywhere%20Monitor%2C%20Solution%20Manager&amp;severity=critical&amp;id=69133f49e55e7c79b8ca7d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11085-cwe-116-improper-encoding-or-escapi-3bbd7e67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11085%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20DataMosaix%E2%84%A2%20Private%20Cloud&amp;severity=high&amp;id=69133f64e55e7c79b8ca8ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9227-cwe-79-improper-neutralization-of-in-30e1308c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9227%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20OpManager&amp;severity=medium&amp;id=69133f64e55e7c79b8ca8ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11084-cwe-1390-weak-authentication-in-roc-7958b431</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11084%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20DataMosaix%E2%84%A2%20Private%20Cloud&amp;severity=high&amp;id=69133f64e55e7c79b8ca8fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cmmc-live-pentagon-demands-verified-cybersecurity--51d5d936</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CMMC%20Live%3A%20Pentagon%20Demands%20Verified%20Cybersecurity%20From%20Contractors&amp;severity=medium&amp;id=69133bc5e55e7c79b8c58d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9223-cwe-77-improper-neutralization-of-sp-90963a3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9223%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20Applications%20Manager&amp;severity=high&amp;id=691346259f8eafcddaf6083f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8324-cwe-89-improper-neutralization-of-sp-aebfbfd1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8324%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20Analytics%20Plus&amp;severity=critical&amp;id=6913371a85a5d1234f7f3b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10161-cwe-307-improper-restriction-of-exc-e303164f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10161%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Turkguven%20Software%20Technologies%20Inc.%20Perfektive&amp;severity=high&amp;id=6913339a85a5d1234f7ad4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/have-i-been-pwned-adds-196b-accounts-from-synthien-2c7c029f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Have%20I%20Been%20Pwned%20Adds%201.96B%20Accounts%20From%20Synthient%20Credential%20Data&amp;severity=medium&amp;id=6913301085a5d1234f759295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41106-cwe-79-improper-neutralization-of-i-05c121be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41106%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41105-cwe-79-improper-neutralization-of-i-2d5c267a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41105%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41104-cwe-79-improper-neutralization-of-i-0d495bae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41104%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41103-cwe-79-improper-neutralization-of-i-119f1929</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41103%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whisper-leak-llm-side-channel-attack-infers-user-p-b2ba1dbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Whisper%20Leak%E2%80%99%20LLM%20Side-Channel%20Attack%20Infers%20User%20Prompt%20Topics&amp;severity=medium&amp;id=69132b29f1a0d9a2f13727d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisos-expert-guide-to-ai-supply-chain-attacks-66b9ca98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISO&apos;s%20Expert%20Guide%20To%20AI%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=691327a3f1a0d9a2f132acff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41102-cwe-79-improper-neutralization-of-i-5f5ee28c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41102%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=691327c1f1a0d9a2f132ccc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detect-malicious-npm-package-targeting-d00e275b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Npm%20Package%20Targeting%20GitHub-Owned%20Repositories%20Flagged%20as%20Red%20Team%20Exercise&amp;severity=medium&amp;id=6913dcc3385fb4be4590632a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-npm-package-with-206k-downloads-targeted-gith-6efb88cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20NPM%20Package%20With%20206K%20Downloads%20Targeted%20GitHub%20for%20Credentials&amp;severity=medium&amp;id=69132428f1a0d9a2f12d61c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41101-cwe-79-improper-neutralization-of-i-35f70b4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41101%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132437f1a0d9a2f12d675d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11960-cwe-79-improper-neutralization-of-i-75833a6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Aryom%20Software%20High%20Technology%20Systems%20Inc.%20KVKNET&amp;severity=medium&amp;id=69132437f1a0d9a2f12d675a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-trojan-fantasy-hub-malware-service-turns-t-63bbcc00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Trojan%20&apos;Fantasy%20Hub&apos;%20Malware%20Service%20Turns%20Telegram%20Into%20a%20Hub%20for%20Hackers&amp;severity=low&amp;id=6913dcc3385fb4be4590632d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-apt-takes-over-south-korean-androids-abuse-b4ac8db2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20APT%20Takes%20Over%20South%20Korean%20Androids%2C%20Abuses%20KakaoTalk&amp;severity=medium&amp;id=6913dd72385fb4be4590de41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12846-cwe-434-unrestricted-upload-of-file-4ecae2aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12846%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20creativethemeshq%20Blocksy%20Companion&amp;severity=high&amp;id=69131c131c700d145d0c4ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12788-cwe-602-client-side-enforcement-of--228956de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12788%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20themefic%20Hydra%20Booking%20%E2%80%94%20Appointment%20Scheduling%20%26%20Booking%20Calendar&amp;severity=medium&amp;id=69131c131c700d145d0c4ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12953-cwe-862-missing-authorization-in-te-4f88e0b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12953%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20AI-Powered%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=69131c131c700d145d0c4cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12787-cwe-330-use-of-insufficiently-rando-76cf99be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12787%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20themefic%20Hydra%20Booking%20%E2%80%94%20Appointment%20Scheduling%20%26%20Booking%20Calendar&amp;severity=medium&amp;id=69131c131c700d145d0c4ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12539-cwe-922-insecure-storage-of-sensiti-c9e639ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12539%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20leopardhost%20TNC%20Toolbox%3A%20Web%20Performance&amp;severity=critical&amp;id=69131c131c700d145d0c4ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quantum-route-redirect-phaas-targets-microsoft-365-1432e29e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quantum%20Route%20Redirect%20PhaaS%20targets%20Microsoft%20365%20users%20worldwide&amp;severity=high&amp;id=691318691c700d145d067ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt37-hackers-abuse-google-find-hub-in-android-dat-da1c45da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT37%20hackers%20abuse%20Google%20Find%20Hub%20in%20Android%20data-wiping%20attacks&amp;severity=high&amp;id=691318691c700d145d067ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-triofox-bug-exploited-to-run-malicious-pa-7c49b93a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Triofox%20bug%20exploited%20to%20run%20malicious%20payloads%20via%20AV%20configuration&amp;severity=critical&amp;id=691318691c700d145d067de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-finds-open-weight-ai-models-easy-to-exploit--ae411e66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Finds%20Open-Weight%20AI%20Models%20Easy%20to%20Exploit%20in%20Long%20Conversations&amp;severity=high&amp;id=691313ce4e59013eb31f4e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7633-cwe-79-improper-neutralization-of-in-4e693893</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7633%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=691313db4e59013eb31f4ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7632-cwe-79-improper-neutralization-of-in-1579055e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=691313db4e59013eb31f4ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7430-cwe-79-improper-neutralization-of-in-f7897222</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7430%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=691313db4e59013eb31f4ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5317-cwe-862-missing-authorization-in-bit-6a10435c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5317%3A%20CWE-862%20Missing%20Authorization%20in%20Bitdefender%20Endpoint%20Security%20Tools%20for%20Mac&amp;severity=medium&amp;id=6912f0f7b7bc43ed74712fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7429-cwe-79-improper-neutralization-of-in-795f5f1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=6912f40ef9e2bb16257bdc8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9055-cwe-250-execution-with-unnecessary-p-a09c255e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9055%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e86ab7bc43ed74661873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8998-cwe-73-external-control-of-file-name-9e7e8b3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8998%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=low&amp;id=6912e86ab7bc43ed74661870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9524-cwe-1287-improper-validation-of-spec-b708b828</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9524%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e86ab7bc43ed74661876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10714-cwe-428-unquoted-search-path-or-ele-7a627b50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10714%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Axis%20Communications%20AB%20AXIS%20Optimizer&amp;severity=high&amp;id=6912e555a26e42951ce84f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8108-cwe-1287-improper-validation-of-spec-d89921ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8108%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6779-cwe-732-incorrect-permission-assignm-34380ef3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6779%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6571-cwe-522-insufficiently-protected-cre-bda7216c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6571%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5452-cwe-214-invocation-of-process-using--968933e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5452%3A%20CWE-214%3A%20Invocation%20of%20Process%20Using%20Visible%20Sensitive%20Information%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6298-cwe-1287-improper-validation-of-spec-2576a712</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6298%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5718-cwe-59-improper-link-resolution-befo-176fe35a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5718%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912de4da26e42951cdeabd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5454-cwe-35-path-traversal-in-axis-commun-a248cae8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5454%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912de4da26e42951cdeabcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4645-cwe-1287-improper-validation-of-spec-954220fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4645%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912de4da26e42951cdeabcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11855-cwe-269-improper-privilege-manageme-0beac750</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11855%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20age-restriction&amp;severity=high&amp;id=6912d40cdcb51f5ee464bb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11307-cwe-79-cross-site-scripting-xss-in--c7b3f6ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11307%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=high&amp;id=6912d40cdcb51f5ee464bb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11237-cwe-862-missing-authorization-in-ma-f06be6cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11237%3A%20CWE-862%20Missing%20Authorization%20in%20Make%20Email%20Customizer%20for%20WooCommerce&amp;severity=medium&amp;id=6912d40cdcb51f5ee464bb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12667-cwe-79-improper-neutralization-of-i-a14445da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paul1999%20GitHub%20Gist%20Shortcode%20Plugin&amp;severity=medium&amp;id=6912b13314bc3e00ba783db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12651-cwe-79-improper-neutralization-of-i-e10f4d38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12651%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eggemplo%20Live%20Photos%20on%20WordPress&amp;severity=medium&amp;id=6912b13314bc3e00ba783d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12019-cwe-79-improper-neutralization-of-i-2553830f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mervinpraison%20Featured%20Image&amp;severity=medium&amp;id=6912b13014bc3e00ba783d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11521-cwe-285-improper-authorization-in-a-4d7ee02e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11521%3A%20CWE-285%20Improper%20Authorization%20in%20astrasecuritysuite%20Astra%20Security%20Suite%20%E2%80%93%20Firewall%20%26%20Malware%20Scan&amp;severity=high&amp;id=6912b12e14bc3e00ba783ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11999-cwe-862-missing-authorization-in-kr-0955a644</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11999%3A%20CWE-862%20Missing%20Authorization%20in%20krishaweb%20Multi%20Location%20Marker&amp;severity=medium&amp;id=6912b13014bc3e00ba783d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12662-cwe-79-improper-neutralization-of-i-7422d699</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andrico%20Coon%20Google%20Maps&amp;severity=medium&amp;id=6912b13314bc3e00ba783da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11129-cwe-79-improper-neutralization-of-i-796a5764</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mheob%20Include%20Fussball.de%20Widgets&amp;severity=medium&amp;id=6912b12e14bc3e00ba783c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11986-cwe-306-missing-authentication-for--70b08077</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11986%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20odude%20Crypto%20Tool&amp;severity=medium&amp;id=6912b13014bc3e00ba783d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12126-cwe-639-authorization-bypass-throug-29a2a5b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12126%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ryanmoyer%20The%20Total%20Book%20Project&amp;severity=medium&amp;id=6912b13114bc3e00ba783d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12637-cwe-94-improper-control-of-generati-788a5052</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12637%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20koopersmith%20Elastic%20Theme%20Editor&amp;severity=high&amp;id=6912b13314bc3e00ba783d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11882-cwe-79-improper-neutralization-of-i-2928c118</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11882%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ethoseo%20Simple%20Donate&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12663-cwe-79-improper-neutralization-of-i-9fd0cbdc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jahed%20Jeba%20Cute%20forkit&amp;severity=medium&amp;id=6912b13314bc3e00ba783dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11860-cwe-79-improper-neutralization-of-i-cb5aa992</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20caselock%20Twitter%20Feed&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11821-cwe-79-improper-neutralization-of-i-2ef4243d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11821%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elvismdev%20Woocommerce%20%E2%80%93%20Products%20By%20Custom%20Tax&amp;severity=medium&amp;id=6912b12e14bc3e00ba783cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12668-cwe-79-improper-neutralization-of-i-f35def4a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sitedin%20WP%20Count%20Down%20Timer&amp;severity=medium&amp;id=6912b13414bc3e00ba783dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12658-cwe-79-improper-neutralization-of-i-9c5bd4f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12658%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mmdeveloper%20Preload%20Current%20Images&amp;severity=medium&amp;id=6912b13314bc3e00ba783da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11859-cwe-79-improper-neutralization-of-i-553df0ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11859%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coenjacobs%20Paypal%20Donation%20Shortcode&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11532-cwe-639-authorization-bypass-throug-8d09d9bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11532%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20softivus%20Wisly&amp;severity=medium&amp;id=6912b12e14bc3e00ba783cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12631-cwe-79-improper-neutralization-of-i-73426b32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spokanetony%20Squirrels%20Auto%20Inventory&amp;severity=medium&amp;id=6912b13114bc3e00ba783d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12665-cwe-862-missing-authorization-in-lo-af41e0ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12665%3A%20CWE-862%20Missing%20Authorization%20in%20lovelightplugins%20Ninja%20Countdown%20%7C%20Fastest%20Countdown%20Builder&amp;severity=medium&amp;id=6912b13314bc3e00ba783db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12671-cwe-79-improper-neutralization-of-i-6b8cb69f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrx3k1%20WP-Iconics&amp;severity=medium&amp;id=6912b13414bc3e00ba783dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11869-cwe-79-improper-neutralization-of-i-dff98443</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simonpedge%20Precise%20Columns&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12526-cwe-862-missing-authorization-in-mi-5a0f36ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12526%3A%20CWE-862%20Missing%20Authorization%20in%20michielve%20Private%20Google%20Calendars&amp;severity=medium&amp;id=6912b13114bc3e00ba783d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11828-cwe-79-improper-neutralization-of-i-ab1206c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11828%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pubudu-malalasekara%20Post%20Blocks%20%26%20Tools&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12753-cwe-80-improper-neutralization-of-s-20c15c5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12753%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20sagortouch%20Chart%20Expert&amp;severity=medium&amp;id=6912b13414bc3e00ba783dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11170-cwe-434-unrestricted-upload-of-file-3da2ad24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11170%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kddiwebcommunications%20WP%E7%A7%BB%E8%A1%8C%E5%B0%82%E7%94%A8%E3%83%97%E3%83%A9%E3%82%B0%E3%82%A4%E3%83%B3%20for%20CPI&amp;severity=critical&amp;id=6912b12e14bc3e00ba783c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12711-cwe-79-improper-neutralization-of-i-7497e289</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pritenhshah%20Share%20to%20Google%20Classroom&amp;severity=medium&amp;id=6912b13414bc3e00ba783dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12813-cwe-94-improper-control-of-generati-e892d4a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12813%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20strix-bubol5%20Holiday%20class%20post%20calendar&amp;severity=critical&amp;id=6912b13414bc3e00ba783de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11457-cwe-269-improper-privilege-manageme-ee3667f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11457%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20easycommerce%20EasyCommerce%20%E2%80%93%20AI-Powered%20WordPress%20Ecommerce%20Plugin%20to%20Sell%20Digital%20Products%2C%20Subscriptions%20%26%20Physical%20Goods&amp;severity=critical&amp;id=6912b12e14bc3e00ba783ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11856-cwe-79-improper-neutralization-of-i-a0ea12e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11856%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eventbee%20Eventbee%20Ticketing%20Widget&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12590-cwe-352-cross-site-request-forgery--ee90bfa8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12590%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andreaferracani%20YSlider&amp;severity=medium&amp;id=6912b13114bc3e00ba783d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12021-cwe-79-improper-neutralization-of-i-c0cdd41e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12021%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hectavex%20WP-OAuth&amp;severity=medium&amp;id=6912b13114bc3e00ba783d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12588-cwe-352-cross-site-request-forgery--e7b305c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12588%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20behzadrohizadeh%20USB%20Qr%20Code%20Scanner%20For%20Woocommerce&amp;severity=medium&amp;id=6912b13114bc3e00ba783d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12020-cwe-79-improper-neutralization-of-i-eec81234</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12020%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kanwei_doublethedonation%20Double%20the%20Donation%20%E2%80%93%20A%20workplace%20giving%20tool&amp;severity=medium&amp;id=6912b13114bc3e00ba783d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12132-cwe-352-cross-site-request-forgery--234920f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12132%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20larsactionhero%20WP%20Custom%20Admin%20Login%20Page%20Logo&amp;severity=medium&amp;id=6912b13114bc3e00ba783d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12589-cwe-352-cross-site-request-forgery--11392215</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12589%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20baronen%20WP-Walla&amp;severity=medium&amp;id=6912b13114bc3e00ba783d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12672-cwe-79-improper-neutralization-of-i-0d8ed3ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nuvuscripts%20Flickr%20Show&amp;severity=medium&amp;id=6912b13414bc3e00ba783dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11997-cwe-200-exposure-of-sensitive-infor-96fa7b4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11997%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ngothoai%20Document%20Pro%20Elementor%20%E2%80%93%20Documentation%20%26%20Knowledge%20Base&amp;severity=medium&amp;id=6912b13014bc3e00ba783d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11451-cwe-73-external-control-of-file-nam-2bb0b851</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11451%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20miunosoft%20Auto%20Amazon%20Links%20%E2%80%93%20Amazon%20Associates%20Affiliate%20Plugin&amp;severity=high&amp;id=6912b12e14bc3e00ba783c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12010-cwe-200-exposure-of-sensitive-infor-dc49f3b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12010%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpkube%20Authors%20List&amp;severity=medium&amp;id=6912b13014bc3e00ba783d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12754-cwe-79-improper-neutralization-of-i-27a5648d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rampantlogic%20Geopost&amp;severity=medium&amp;id=6912b13414bc3e00ba783ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11805-cwe-79-improper-neutralization-of-i-e344ea1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20doytch%20Skip%20to%20Timestamp&amp;severity=medium&amp;id=6912b12e14bc3e00ba783caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12644-cwe-79-improper-neutralization-of-i-85a0557c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcox%20Nonaki%20%E2%80%93%20Drag%20and%20Drop%20Email%20Template%20builder%20and%20Newsletter%20plugin%20for%20WordPress&amp;severity=medium&amp;id=6912b13314bc3e00ba783d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11886-cwe-352-cross-site-request-forgery--d558d203</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11886%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codethislab%20CTL%20Arcade%20Lite&amp;severity=medium&amp;id=6912b13014bc3e00ba783d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12632-cwe-79-improper-neutralization-of-i-c7743531</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20loveless%20RandomQuotr&amp;severity=medium&amp;id=6912b13314bc3e00ba783d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12538-cwe-79-improper-neutralization-of-i-0ff1ff8b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12538%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iworks%20Fleet%20Manager&amp;severity=medium&amp;id=6912b13114bc3e00ba783d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12880-cwe-79-improper-neutralization-of-i-e805a5a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12880%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jobayer534%20Progress%20Bar%20Blocks%20for%20Gutenberg&amp;severity=medium&amp;id=6912b13414bc3e00ba783de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11996-cwe-862-missing-authorization-in-to-3a4eeacc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11996%3A%20CWE-862%20Missing%20Authorization%20in%20toastwebsites%20Find%20Unused%20Images&amp;severity=medium&amp;id=6912b13014bc3e00ba783d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11863-cwe-79-improper-neutralization-of-i-903b961a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mindstien%20My%20Geo%20Posts%20Free&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11988-cwe-862-missing-authorization-in-od-78285aee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11988%3A%20CWE-862%20Missing%20Authorization%20in%20odude%20Crypto%20Tool&amp;severity=medium&amp;id=6912b13014bc3e00ba783d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11829-cwe-79-improper-neutralization-of-i-881075f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11829%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20five9%20Five9%20Live%20Chat&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12652-cwe-79-improper-neutralization-of-i-e31ba7f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oscaruribe%20Ungapped%20Widgets&amp;severity=medium&amp;id=6912b13314bc3e00ba783d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11168-cwe-269-improper-privilege-manageme-2ed49b3b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11168%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20mvirik%20Mementor%20Core&amp;severity=high&amp;id=6912b12e14bc3e00ba783c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11873-cwe-79-improper-neutralization-of-i-84d036eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eflyjason%20WP%20BBCode&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11874-cwe-80-improper-neutralization-of-s-790b7b8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11874%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mitegvg%20Slippy%20Slider%20%E2%80%93%20Responsive%20Touch%20Navigation%20Slider&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11891-cwe-538-insertion-of-sensitive-info-86169ece</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11891%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20shelfplanner%20Shelf%20Planner%20Inventory%20Management%20for%20WooCommerce&amp;severity=medium&amp;id=6912b13014bc3e00ba783d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11822-cwe-79-improper-neutralization-of-i-613c3be8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20virtus-designs%20WP%20Bootstrap%20Tabs&amp;severity=medium&amp;id=6912b12e14bc3e00ba783cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11894-cwe-862-missing-authorization-in-sh-b3a4ca1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11894%3A%20CWE-862%20Missing%20Authorization%20in%20shelfplanner%20Shelf%20Planner%20Inventory%20Management%20for%20WooCommerce&amp;severity=medium&amp;id=6912b13014bc3e00ba783d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31719-cwe-665-improper-initialization-in--1b9f65f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31719%3A%20cwe-665%20Improper%20Initialization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42940-cwe-787-out-of-bounds-write-in-saps-cfdc8073</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42940%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20SAP_SE%20SAP%20CommonCryptoLib&amp;severity=high&amp;id=6912870814bc3e00ba6f3c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42924-cwe-601-url-redirection-to-untruste-96990b2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42924%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20S%2F4HANA%20landscape%20(SAP%20E-Recruiting%20BSP)&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42919-cwe-22-improper-limitation-of-a-pat-1892d8de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42919%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42899-cwe-862-missing-authorization-in-sa-2212ff5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42899%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S4CORE%20(Manage%20Journal%20Entries)&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42897-cwe-522-insufficiently-protected-cr-f30abd12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42897%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SAP_SE%20SAP%20Business%20One%20(SLD)&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42895-cwe-94-improper-control-of-generati-a4993b7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42895%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20HANA%20JDBC%20Client&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42894-cwe-22-improper-limitation-of-a-pat-dfc27f7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42894%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42893-cwe-601-url-redirection-to-untruste-55e7bd9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42893%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42892-cwe-78-improper-neutralization-of-s-9e315964</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42892%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42890-cwe-798-use-of-hard-coded-credentia-91b98cfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42890%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20SAP_SE%20SQL%20Anywhere%20Monitor%20(Non-Gui)&amp;severity=critical&amp;id=6912870714bc3e00ba6f3be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42889-cwe-89-improper-neutralization-of-s-5fbdc362</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42889%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20Starter%20Solution%20(PL%20SAFT)&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42888-cwe-316-cleartext-storage-of-sensit-99b28eb6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42888%3A%20CWE-316%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20SAP_SE%20SAP%20GUI%20for%20Windows&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42887-cwe-94-improper-control-of-generati-7ff873ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42887%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Solution%20Manager&amp;severity=critical&amp;id=6912870714bc3e00ba6f3bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42886-cwe-79-improper-neutralization-of-i-668a6ab8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42886%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42885-cwe-306-missing-authentication-for--573a4d6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42885%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20HANA%202.0%20(hdbrss)&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42884-cwe-943-improper-neutralization-of--82aff810</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42884%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42883-cwe-434-unrestricted-upload-of-file-32bf205b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42883%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP%20(Migration%20Workbench)&amp;severity=low&amp;id=6912870714bc3e00ba6f3bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42882-cwe-862-missing-authorization-in-sa-8488bf51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42882%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-11-2a6f9ec9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-11&amp;severity=medium&amp;id=6913cffa74e5e09a14beac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57695-na-322268d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57695%3A%20n%2Fa&amp;severity=high&amp;id=69134ea49f8eafcdda031b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11578-cwe-59-improper-link-resolution-bef-95a6bf97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11578%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69126c0c6b3b7718db092a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11892-cwe-79-improper-neutralization-of-i-d2aac8ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69126c0c6b3b7718db092a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64529-cwe-770-allocation-of-resources-wit-cd6fa7bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64529%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20authzed%20spicedb&amp;severity=low&amp;id=691268886b3b7718db04cf00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/owasp-highlights-supply-chain-risks-in-new-top-10--3deccfb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OWASP%20Highlights%20Supply%20Chain%20Risks%20in%20New%20Top%2010%20List&amp;severity=high&amp;id=69129bc014bc3e00ba7424fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64522-cwe-918-server-side-request-forgery-b1a9435c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64522%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20charmbracelet%20soft-serve&amp;severity=critical&amp;id=6912671f6b3b7718db03f35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64518-cwe-611-improper-restriction-of-xml-bf744b65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64518%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20CycloneDX%20cyclonedx-core-java&amp;severity=high&amp;id=691264812d2520af5f327675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64513-cwe-287-improper-authentication-in--2cbfc97a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64513%3A%20CWE-287%3A%20Improper%20Authentication%20in%20milvus-io%20milvus&amp;severity=critical&amp;id=691264812d2520af5f32766f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unauthenticated-remote-access-via-triofox-vulnerab-afc6b1ec</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unauthenticated%20Remote%20Access%20via%20Triofox%20Vulnerability%20CVE-2025-12480&amp;severity=medium&amp;id=691308308240c40e4c090aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64512-cwe-502-deserialization-of-untruste-8aacc917</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64512%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pdfminer%20pdfminer.six&amp;severity=high&amp;id=6912626244f28dbfe990a14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64507-cwe-269-improper-privilege-manageme-aa82c817</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64507%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20lxc%20incus&amp;severity=high&amp;id=6912626244f28dbfe990a148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-returns-slices-back-into-vs-code-extensi-f7c0b614</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Returns%2C%20Slices%20Back%20into%20VS%20Code%20Extensions&amp;severity=medium&amp;id=69129bc014bc3e00ba742501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64502-cwe-201-insertion-of-sensitive-info-f884f232</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64502%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69125dcc44f28dbfe98bf100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64501-cwe-79-improper-neutralization-of-i-99a44780</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64501%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20etaminstudio%20prosemirror_to_html&amp;severity=high&amp;id=69125dcc44f28dbfe98bf0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64183-cwe-416-use-after-free-in-academyso-19fcca57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64183%3A%20CWE-416%3A%20Use%20After%20Free%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69125dcc44f28dbfe98bf109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64182-cwe-120-buffer-copy-without-checkin-00dc5500</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64182%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69125dcc44f28dbfe98bf105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64181-cwe-457-use-of-uninitialized-variab-2ce8d603</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64181%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20AcademySoftwareFoundation%20openexr&amp;severity=low&amp;id=69125a3d26655404d5684626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62780-cwe-79-improper-neutralization-of-i-431bee76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62780%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=low&amp;id=69125a3d26655404d5684623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64167-cwe-79-improper-neutralization-of-i-dcffaec6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64167%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=6912576658b9e66d50002ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49145-cwe-863-incorrect-authorization-in--fbc2710a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49145%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Combodo%20iTop&amp;severity=high&amp;id=6912576658b9e66d50002ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/popular-javascript-library-expr-eval-vulnerable-to-418367c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Popular%20JavaScript%20library%20expr-eval%20vulnerable%20to%20RCE%20flaw&amp;severity=high&amp;id=691253de58b9e66d50fc5b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploiting-triofox-flaw-to-install-remote--094f0056</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploiting%20Triofox%20Flaw%20to%20Install%20Remote%20Access%20Tools%20via%20Antivirus%20Feature&amp;severity=critical&amp;id=69129af814bc3e00ba7407a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48878-cwe-862-missing-authorization-in-co-e1ae13b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48878%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Combodo%20iTop&amp;severity=medium&amp;id=6912505b58b9e66d50f7c9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48065-cwe-79-improper-neutralization-of-i-3e730e71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48065%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=6912505b58b9e66d50f7c9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48055-cwe-79-improper-neutralization-of-i-6ec27387</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48055%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69124ce358b9e66d50f34b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-hackers-turn-googles-find-hub-into-a-remote--ca6d826f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Konni%20Hackers%20Turn%20Google%E2%80%99s%20Find%20Hub%20into%20a%20Remote%20Data-Wiping%20Weapon&amp;severity=medium&amp;id=69129af814bc3e00ba7407a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12729-inappropriate-implementation-in-goo-6f34e228</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12729%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465f941466772c506b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12728-inappropriate-implementation-in-goo-c8dece2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12728%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465f941466772c506b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12727-inappropriate-implementation-in-goo-135af20f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12727%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465f941466772c506b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12726-inappropriate-implementation-in-goo-a9617a0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12726%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465f941466772c506b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12725-out-of-bounds-read-in-google-chrome-d3bba38d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12725%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465d941466772c506b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12447-incorrect-security-ui-in-google-chr-1ae2195b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12447%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12446-incorrect-security-ui-in-google-chr-93668527</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12446%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12445-policy-bypass-in-google-chrome-12fe166e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12445%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12444-incorrect-security-ui-in-google-chr-28d1886a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12444%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12443-out-of-bounds-read-in-google-chrome-14beda5f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12443%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12441-out-of-bounds-read-in-google-chrome-25f18816</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12441%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12440-inappropriate-implementation-in-goo-d34a4674</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12440%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12439-inappropriate-implementation-in-goo-4c7ff807</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12439%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12438-use-after-free-in-google-chrome-f7fb85bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12438%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465d941466772c506b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12437-use-after-free-in-google-chrome-830726c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12437%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12436-policy-bypass-in-google-chrome-f58fcd24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12436%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12435-incorrect-security-ui-in-google-chr-e6a35931</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12435%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12434-race-in-google-chrome-fd9b95d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12434%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12433-inappropriate-implementation-in-goo-60e5797f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12433%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12432-race-in-google-chrome-02526513</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12432%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12431-inappropriate-implementation-in-goo-c665dcf6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12431%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12430-object-lifecycle-issue-in-google-ch-d9d48b68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12430%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12429-inappropriate-implementation-in-goo-9394d491</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12429%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12428-type-confusion-in-google-chrome-4d8840dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12428%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33150-cwe-552-files-or-directories-access-01ca809c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33150%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20IBM%20Cognos%20Analytics%20Certified%20Containers&amp;severity=medium&amp;id=69124159941466772c4b1f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47932-cwe-79-improper-neutralization-of-i-96ba7cee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47932%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69123dd5819dd34e6850aab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47773-cwe-79-improper-neutralization-of-i-e39c2755</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47773%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69123a5b819dd34e684c5420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43723-cwe-327-use-of-a-broken-or-risky-cr-a4d8617d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43723%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69123a5b819dd34e684c541d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47286-cwe-74-improper-neutralization-of-s-9880d5ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47286%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69123410a4f3f087830c43ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intel-sues-ex-engineer-for-stealing-18000-top-secr-6c8706b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intel%20Sues%20Ex-Engineer%20for%20Stealing%2018%2C000%20%E2%80%98Top%20Secret%E2%80%99%20Files%20Before%20Layoff&amp;severity=medium&amp;id=69122d12a4f3f0878303b2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12967-cwe-470-use-of-externally-controlle-ef63eb58</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12967%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20AWS%20JDBC%20Wrapper&amp;severity=high&amp;id=69122d25a4f3f0878303d256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-attacks-against-secure-enclaves-schneier-on-se-356ef94d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Attacks%20Against%20Secure%20Enclaves%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=69122642eeb17d72b8d02558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denmark-and-norway-investigate-yutong-bus-security-c677db9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denmark%20and%20Norway%20investigate%20Yutong%20bus%20security%20flaw%20amid%20rising%20tech%20fears&amp;severity=medium&amp;id=69122642eeb17d72b8d0255c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-aligned-uta0388-uses-ai-tools-in-global-phis-3c891616</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Aligned%20UTA0388%20Uses%20AI%20Tools%20in%20Global%20Phishing%20Campaigns&amp;severity=high&amp;id=69122642eeb17d72b8d02550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43079-cwe-732-incorrect-permission-assign-262928b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43079%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Qualys%20Inc%20Qualys%20Agent&amp;severity=medium&amp;id=69121fbbc86173478b6e1457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/landfall-spyware-targeted-samsung-galaxy-phones-vi-ab02cf53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LANDFALL%20Spyware%20Targeted%20Samsung%20Galaxy%20Phones%20via%20Malicious%20WhatsApp%20Images&amp;severity=medium&amp;id=69121650cab732a2636e5bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disclosure-doordash-enabled-5-year-xsshtml-injecti-b33109e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BDISCLOSURE%5D%20DoorDash%20Enabled%205-Year%20XSS%2FHTML%20Injection%20Flaw%20via%20Official%20Email%3B%20VDP%20Misclassified%20Report%20for%2015%20Months&amp;severity=critical&amp;id=69121361d84bdc1ba6926f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-filefix-a-clickfix-variation-kaspersky-off-6b722fec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20FileFix%20%E2%80%94%20a%20ClickFix%20variation%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69121380d84bdc1ba692821c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/many-forbes-ai-50-companies-leak-secrets-on-github-9a25a636</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Many%20Forbes%20AI%2050%20Companies%20Leak%20Secrets%20on%20GitHub&amp;severity=medium&amp;id=69120fe0d84bdc1ba68e943b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46430-cwe-250-execution-with-unnecessary--9b87c3a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46430%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Display%20and%20Peripheral%20Manager&amp;severity=high&amp;id=69121a68c86173478b6866f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/http-request-smuggling-in-kestrel-via-chunk-extens-5622aaed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTTP%20Request%20Smuggling%20in%20Kestrel%20via%20chunk%20extensions%20(CVE-2025-55315)&amp;severity=medium&amp;id=69120c59d84bdc1ba68a05eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/it-isnt-always-defaults-scans-for-3cx-usernames-mo-a7867b47</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=It%20isn&apos;t%20always%20defaults%3A%20Scans%20for%203CX%20usernames%2C%20(Mon%2C%20Nov%2010th)&amp;severity=medium&amp;id=69120474b8ffd8a38b9d8f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-campaign-targets-hotels-spurs-secondary-c-c2180c38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Campaign%20Targets%20Hotels%2C%20Spurs%20Secondary%20Customer%20Attacks&amp;severity=medium&amp;id=69129bc014bc3e00ba742504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/runc-vulnerabilities-can-be-exploited-to-escape-co-f850a904</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Runc%20Vulnerabilities%20Can%20Be%20Exploited%20to%20Escape%20Containers&amp;severity=medium&amp;id=6911f71c500a810dcc094fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10th-november-threat-intelligence-report-2c72c1ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10th%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6911eb4bbb27cbde2e79d800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64457-cwe-367-in-jetbrains-dottrace-11881476</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64457%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20JetBrains%20ReSharper%2C%20Rider%20and%20dotTrace&amp;severity=medium&amp;id=6911ecfbbb27cbde2e7c666b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64456-cwe-347-in-jetbrains-resharper-1d8f1964</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64456%3A%20CWE-347%20in%20JetBrains%20ReSharper&amp;severity=high&amp;id=6911ecfbbb27cbde2e7c6668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64690-cwe-862-in-jetbrains-youtrack-9a6a7a0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64690&amp;severity=null&amp;id=6911ecfcbb27cbde2e7c6695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64689-cwe-522-in-jetbrains-youtrack-7be8105f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64689&amp;severity=null&amp;id=6911ecfcbb27cbde2e7c6692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64688-cwe-639-in-jetbrains-youtrack-baca4cba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64688&amp;severity=null&amp;id=6911ecfbbb27cbde2e7c6683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64687-cwe-862-in-jetbrains-youtrack-88d99abe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64687&amp;severity=null&amp;id=6911ecfbbb27cbde2e7c6680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64686-cwe-672-in-jetbrains-youtrack-9847f1e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64686&amp;severity=null&amp;id=6911ecfbbb27cbde2e7c667d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64685-cwe-295-in-jetbrains-youtrack-a06c4620</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64685%3A%20CWE-295%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=6911ecfbbb27cbde2e7c667a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64684-cwe-862-in-jetbrains-youtrack-5a221939</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64684%3A%20CWE-862%20in%20JetBrains%20YouTrack&amp;severity=medium&amp;id=6911ecfbbb27cbde2e7c6677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64683-cwe-362-in-jetbrains-hub-d4493de4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64683%3A%20CWE-362%20in%20JetBrains%20Hub&amp;severity=medium&amp;id=6911ecfbbb27cbde2e7c6674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64682-cwe-362-in-jetbrains-hub-6b0be68f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64682%3A%20CWE-362%20in%20JetBrains%20Hub&amp;severity=low&amp;id=6911ecfbbb27cbde2e7c6671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64681-cwe-862-in-jetbrains-hub-b5b40db1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64681%3A%20CWE-862%20in%20JetBrains%20Hub&amp;severity=low&amp;id=6911ecfbbb27cbde2e7c666e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-new-web-application-risk-categories-added-to-o-bd3073f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20New%20Web%20Application%20Risk%20Categories%20Added%20to%20OWASP%20Top%2010&amp;severity=critical&amp;id=6911e8bf6161266dcb98ea0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-discovered-in-three-vs-code-exte-68d14ab5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Malware%20Discovered%20in%20Three%20VS%20Code%20Extensions%20with%20Thousands%20of%20Installs&amp;severity=high&amp;id=6911e8d86161266dcb99127d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/large-scale-clickfix-phishing-attacks-target-hotel-3ce395d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Large-Scale%20ClickFix%20Phishing%20Attacks%20Target%20Hotel%20Systems%20with%20PureRAT%20Malware&amp;severity=high&amp;id=6911e8d86161266dcb991279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nine-nuget-packages-disrupt-dbs-and-industrial-sys-07536777</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nine%20NuGet%20packages%20disrupt%20DBs%20and%20industrial%20systems%20with%20time-delayed%20payloads&amp;severity=medium&amp;id=6911e8d86161266dcb991281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/louvre-museums-camera-network-password-was-reporte-9b17fb8d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Louvre%20Museum%E2%80%99s%20Camera%20Network%20Password%20Was%20Reportedly%20Just%20%E2%80%9CLouvre%E2%80%9D&amp;severity=medium&amp;id=6911e66be2a2408170ade3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12939-sql-injection-in-sourcecodester-int-362217c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12939%3A%20SQL%20Injection%20in%20SourceCodester%20Interview%20Management%20System&amp;severity=medium&amp;id=6911e67fe2a2408170ae1f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-hyper-v-malware-malicious-ai-bots-rdp-98d90e6e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Hyper-V%20Malware%2C%20Malicious%20AI%20Bots%2C%20RDP%20Exploits%2C%20WhatsApp%20Lockdown%20and%20More&amp;severity=high&amp;id=69129af814bc3e00ba7407a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-returns-to-open-vsx-emerges-on-g-3a8a8daf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Malware%20Returns%20to%20Open%20VSX%2C%20Emerges%20on%20GitHub&amp;severity=medium&amp;id=6911e022c3394bcf0da644ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12938-sql-injection-in-projectworlds-onli-d8ca496e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12938%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=6911dc1bc3394bcf0da063c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-browser-security-report-reveals-emerging-threa-1b377d57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Browser%20Security%20Report%20Reveals%20Emerging%20Threats%20for%20Enterprises&amp;severity=low&amp;id=69129af814bc3e00ba7407ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nearly-30-alleged-victims-of-oracle-ebs-hack-named-ffb9fd70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nearly%2030%20Alleged%20Victims%20of%20Oracle%20EBS%20Hack%20Named%20on%20Cl0p%20Ransomware%20Site&amp;severity=medium&amp;id=6911d18053b42a4b74ce76e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fantasy-hub-another-russian-based-rat-as-malware-a-90c83e7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fantasy%20Hub%3A%20Another%20Russian%20Based%20RAT%20as%20Malware-as-a-Service&amp;severity=medium&amp;id=6911d19153b42a4b74ce7a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/state-sponsored-remote-wipe-tactics-targeting-andr-08e8da9a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=State-Sponsored%20Remote%20Wipe%20Tactics%20Targeting%20Android%20Devices&amp;severity=medium&amp;id=6911ca57c9af41ae0ebf1d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-targets-aerospace-and-defense-with-n-e1ff8123</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20targets%20Aerospace%20and%20Defense%20with%20new%20Comebacker%20variant&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-patches-vulnerabilities-exploited-at-pwn2own--6b66551d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20Patches%20Vulnerabilities%20Exploited%20at%20Pwn2Own%20Ireland&amp;severity=critical&amp;id=6911c6d6c9af41ae0ebb903c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-monsta-ftp-vulnerability-exposed-thousand-b6e12da0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Monsta%20FTP%20Vulnerability%20Exposed%20Thousands%20of%20Servers%20to%20Full%20Takeover&amp;severity=critical&amp;id=6911c6e9c9af41ae0ebba311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australia-sanctions-hackers-supporting-north-korea-2b91902e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australia%20Sanctions%20Hackers%20Supporting%20North%20Korea%E2%80%99s%20Weapons%20Program&amp;severity=medium&amp;id=6911c353c9af41ae0eb6aa0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12405-cwe-269-improper-privilege-manageme-bf184c0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12405%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Google%20Cloud%20Looker%20Studio&amp;severity=high&amp;id=6911b458512c1b862c8e34fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41107-cwe-79-improper-neutralization-of-i-1aad2daa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41107%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20QDOCS%20Smart%20Schoo&amp;severity=medium&amp;id=6911ad57512c1b862c84c0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12409-cwe-89-improper-neutralization-of-s-3c372f02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12409%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Google%20Cloud%20Looker%20Studio&amp;severity=high&amp;id=6911aa71983053a663d21209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12397-cwe-89-improper-neutralization-of-s-d31b84d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12397%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Google%20Cloud%20Looker%20Studio&amp;severity=high&amp;id=6911aa71983053a663d21205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12155-cwe-77-improper-neutralization-of-s-e2c239be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12155%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=6911aa71983053a663d2120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41731-cwe-338-use-of-cryptographically-we-7cc12fcf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41731%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Jumo%20variTRON300&amp;severity=high&amp;id=6911a2ea983053a663c8b2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12933-sql-injection-in-sourcecodester-bab-8f0f2f0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12933%3A%20SQL%20Injection%20in%20SourceCodester%20Baby%20Care%20System&amp;severity=medium&amp;id=69117a853d94f7819bac325f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12932-sql-injection-in-sourcecodester-bab-81f71413</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12932%3A%20SQL%20Injection%20in%20SourceCodester%20Baby%20Care%20System&amp;severity=medium&amp;id=691175e6d0f5adfa3d85f74f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12613-arbitrary-argument-injection-in-clo-d3c7d951</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12613%3A%20Arbitrary%20Argument%20Injection%20in%20cloudinary&amp;severity=high&amp;id=691175e6d0f5adfa3d85f74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12931-sql-injection-in-sourcecodester-foo-35c7c00f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12931%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20System&amp;severity=medium&amp;id=69116eded0f5adfa3d7d797f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62689-heap-based-buffer-overflow-in-gnu-p-dfdc73e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62689%3A%20Heap-based%20buffer%20overflow%20in%20GNU%20Project%20GNU%20libbmicrohttpd&amp;severity=high&amp;id=69116a20b0eb67653eb0f0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59777-null-pointer-dereference-in-gnu-pro-47f9438d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59777%3A%20NULL%20pointer%20dereference%20in%20GNU%20Project%20GNU%20libbmicrohttpd&amp;severity=high&amp;id=69116a20b0eb67653eb0f0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12930-sql-injection-in-sourcecodester-foo-2af1c10d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12930%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20System&amp;severity=medium&amp;id=691166511e0afa394a9d233b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12929-sql-injection-in-sourcecodester-sur-aa4a821f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12929%3A%20SQL%20Injection%20in%20SourceCodester%20Survey%20Application%20System&amp;severity=medium&amp;id=69116258b9239aa390814bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12868-cwe-603-use-of-client-side-authenti-63bfb658</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12868%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20CyberTutor%20New%20Site%20Server&amp;severity=critical&amp;id=69115ed4b9239aa3908085aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12867-cwe-434-unrestricted-upload-of-file-8460192f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12867%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Hundred%20Plus%20EIP%20Plus&amp;severity=high&amp;id=69115ed4b9239aa3908085a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12928-sql-injection-in-code-projects-onli-36045207</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12928%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=69115ed4b9239aa3908085ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12866-cwe-640-weak-password-recovery-mech-3284230c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12866%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Hundred%20Plus%20EIP%20Plus&amp;severity=critical&amp;id=691157ccb9239aa3907e6b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12927-sql-injection-in-dedebiz-9db5dc76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12927%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=691157ccb9239aa3907e6b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12865-cwe-89-improper-neutralization-of-s-8e7a12b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12865%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20e-Excellence%20U-Office%20Force&amp;severity=high&amp;id=69114d40b9239aa3907ac87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12864-cwe-89-improper-neutralization-of-s-2bc67a3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12864%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20e-Excellence%20U-Office%20Force&amp;severity=high&amp;id=69114d40b9239aa3907ac87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12926-sql-injection-in-sourcecodester-far-d9458103</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12926%3A%20SQL%20Injection%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=69114d40b9239aa3907ac882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12925-missing-authorization-in-rymcu-fore-58a3f75d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12925%3A%20Missing%20Authorization%20in%20rymcu%20forest&amp;severity=medium&amp;id=691142b4b9239aa39070f832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12924-missing-authorization-in-rymcu-fore-ac058fb1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12924%3A%20Missing%20Authorization%20in%20rymcu%20forest&amp;severity=medium&amp;id=691142b4b9239aa39070f82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12923-path-traversal-in-liweiyi-chestnutc-4dc173cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12923%3A%20Path%20Traversal%20in%20liweiyi%20ChestnutCMS&amp;severity=medium&amp;id=691134b9b9239aa39064e0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12922-path-traversal-in-openclinica-commu-667c3259</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12922%3A%20Path%20Traversal%20in%20OpenClinica%20Community%20Edition&amp;severity=medium&amp;id=691134b9b9239aa39064e0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-10-ab85e832</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-10&amp;severity=medium&amp;id=69127ff014bc3e00ba67453c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63678-na-42ef7c3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63678%3A%20n%2Fa&amp;severity=low&amp;id=69126fa46b3b7718db0c7bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-phantomcaptcha-multi-stage-websocket-rat-tar-ea72d1dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PhantomCaptcha%20%7C%20Multi-Stage%20WebSocket%20RAT%20Targets%20Ukraine%20in%20Single-Day%20Spearphishing%20Operation&amp;severity=medium&amp;id=69126f856b3b7718db0c6ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63397-na-d10b10c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63397%3A%20n%2Fa&amp;severity=medium&amp;id=6912576658b9e66d50002eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63296-na-7fa46e64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63296%3A%20n%2Fa&amp;severity=medium&amp;id=691253f258b9e66d50fc71d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63384-na-b28d115d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63384%3A%20n%2Fa&amp;severity=medium&amp;id=691249dd941466772c5416cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63617-na-4dfed4ff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63617%3A%20n%2Fa&amp;severity=medium&amp;id=691249dd941466772c5416c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60876-na-6ecd776b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60876%3A%20n%2Fa&amp;severity=medium&amp;id=6912465f941466772c506b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56503-na-83f770ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56503%3A%20n%2Fa&amp;severity=medium&amp;id=6912465f941466772c506b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63149-na-05bf7092</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63149%3A%20n%2Fa&amp;severity=high&amp;id=69124159941466772c4b1f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63288-na-fe48e93b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63288%3A%20n%2Fa&amp;severity=high&amp;id=69123a5b819dd34e684c5423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63497-na-d519aa46</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63497%3A%20n%2Fa&amp;severity=high&amp;id=69121c24c86173478b6a098f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63834-na-7588b1e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63834%3A%20n%2Fa&amp;severity=medium&amp;id=69121b9bc86173478b69b3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63456-na-8685dfab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63456%3A%20n%2Fa&amp;severity=medium&amp;id=69121b9bc86173478b69b3a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63455-na-f78d82bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63455%3A%20n%2Fa&amp;severity=high&amp;id=69121b9bc86173478b69b3a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63835-na-b2b6762b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63835%3A%20n%2Fa&amp;severity=medium&amp;id=6912165ecab732a2636e714b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63147-na-952031df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63147%3A%20n%2Fa&amp;severity=medium&amp;id=6912165ecab732a2636e7148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63457-na-9a9fd077</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63457%3A%20n%2Fa&amp;severity=medium&amp;id=69121361d84bdc1ba6926f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63154-na-8f4aa309</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63154%3A%20n%2Fa&amp;severity=high&amp;id=69120ff3d84bdc1ba68e99cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63153-na-f76e6836</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63153%3A%20n%2Fa&amp;severity=high&amp;id=69120ff3d84bdc1ba68e99cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63152-na-6a65654e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63152%3A%20n%2Fa&amp;severity=high&amp;id=69120ff3d84bdc1ba68e99c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63712-na-00ab6d24</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63712%3A%20n%2Fa&amp;severity=medium&amp;id=69120774b8ffd8a38ba23792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63710-na-69a80133</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63710%3A%20n%2Fa&amp;severity=medium&amp;id=69120774b8ffd8a38ba2378e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63709-na-c95eee49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63709%3A%20n%2Fa&amp;severity=medium&amp;id=6911fe20500a810dcc12633d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63711-na-3f5fadbc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63711%3A%20n%2Fa&amp;severity=high&amp;id=6911fa9b500a810dcc0e18aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12921-xml-injection-in-openclinica-commun-5f24dcac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12921%3A%20XML%20Injection%20in%20OpenClinica%20Community%20Edition&amp;severity=medium&amp;id=69112787a0a00dcacbece57c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12920-cross-site-scripting-in-qianfox-fox-b6fa4694</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12920%3A%20Cross%20Site%20Scripting%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=69112046b991753c98029761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12919-improper-control-of-resource-identi-73b478b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12919%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20EverShop&amp;severity=medium&amp;id=691102ed4abca22cf3180d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dangerous-runc-flaws-could-allow-hackers-to-escape-bf6584fa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dangerous%20runC%20flaws%20could%20allow%20hackers%20to%20escape%20Docker%20containers&amp;severity=high&amp;id=6910e4d3e28c534f9cea922f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-returns-on-openvsx-with-3-new-vs-196168aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20malware%20returns%20on%20OpenVSX%20with%203%20new%20VSCode%20extensions&amp;severity=high&amp;id=69106e5ccf04d12accf04540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-target-us-non-profit-in-long--b9bfaf78</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20hackers%20target%20U.S.%20non-profit%20in%20long-term%20espionage%20campaign&amp;severity=medium&amp;id=69106e5ccf04d12accf04544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12918-improper-control-of-resource-identi-c22bdf02</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12918%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20yungifez%20Skuul%20School%20Management%20System&amp;severity=low&amp;id=69104ccfc7861954111d1f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12917-denial-of-service-in-tozed-zlt-t10-10ff89d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12917%3A%20Denial%20of%20Service%20in%20TOZED%20ZLT%20T10&amp;severity=medium&amp;id=6910457ac786195411069ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watch-out-for-svg-files-booby-trapped-with-malware-5579952d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Watch%20out%20for%20SVG%20files%20booby-trapped%20with%20malware&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-primitive-crypto-theft-to-sophisticated-ai-ba-69c16e53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20primitive%20crypto%20theft%20to%20sophisticated%20AI-based%20deception&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gotta-fly-targeting-the-uav-sector-f211c012</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gotta%20fly%3A%20Targeting%20the%20UAV%20sector&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-09-7b9b5b14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-09&amp;severity=medium&amp;id=69112f0da0a00dcacbf6b766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12916-command-injection-in-sangfor-operat-72fe5375</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12916%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=690fd5651fa9d93f266108d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12915-file-inclusion-in-70mai-x200-a0652ef7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12915%3A%20File%20Inclusion%20in%2070mai%20X200&amp;severity=high&amp;id=690fcfd8932891ff16e907d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12914-sql-injection-in-aapanel-baota-438049e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12914%3A%20SQL%20Injection%20in%20aaPanel%20BaoTa&amp;severity=medium&amp;id=690fb8cd7021794900e353c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12913-sql-injection-in-code-projects-resp-d4e0c815</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12913%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690fa36310a10cc633780a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-uncovers-whisper-leak-attack-that-identi-f9fe2002</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Uncovers%20&apos;Whisper%20Leak&apos;%20Attack%20That%20Identifies%20AI%20Chat%20Topics%20in%20Encrypted%20Traffic&amp;severity=high&amp;id=690f8fe62cf59ec1f17535a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-italian-citizen-was-targeted-with-paragons-g-ad5f9684</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Italian%20citizen%20was%20targeted%20with%20Paragon%E2%80%99s%20Graphite%20spyware.%20We%20have%20a%20serious%20problem&amp;severity=high&amp;id=690f8fe62cf59ec1f17535a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-uncovers-whisper-leak-attack-that-identi-eaeb40fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Uncovers%20&apos;Whisper%20Leak&apos;%20Attack%20That%20Identifies%20AI%20Chat%20Topics%20in%20Encrypted%20Traffic&amp;severity=medium&amp;id=6911531fb9239aa3907cc387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/free-open-source-file-scanner-bf7939a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=free%2C%20open-source%20file%20scanner&amp;severity=high&amp;id=690f56578fc7843e3d462bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arbitrary-app-installation-on-intune-managed-andro-96f1ea7f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arbitrary%20App%20Installation%20on%20Intune%20Managed%20Android%20Enterprise%20BYOD%20in%20Work%20Profile&amp;severity=medium&amp;id=690f4f0fa9ae4c51c61b25ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-actively-exploited-firewall-flaws-now-abused-032b82c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%3A%20Actively%20exploited%20firewall%20flaws%20now%20abused%20for%20DoS%20attacks&amp;severity=high&amp;id=690f2536d127c1b08b96ff5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-log4j-to-iis-chinas-hackers-turn-legacy-bugs--dd6b8851</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Log4j%20to%20IIS%2C%20China%E2%80%99s%20Hackers%20Turn%20Legacy%20Bugs%20into%20Global%20Espionage%20Tools&amp;severity=high&amp;id=690f21bad127c1b08b91d688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-fixes-seven-nas-zero-day-flaws-exploited-at-p-7f2caaca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20fixes%20seven%20NAS%20zero-day%20flaws%20exploited%20at%20Pwn2Own&amp;severity=critical&amp;id=690f21bad127c1b08b91d67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-nuget-packages-drop-disruptive-time-bomb-2b1c3e4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NuGet%20packages%20drop%20disruptive%20&apos;time%20bombs&apos;&amp;severity=high&amp;id=690f21bad127c1b08b91d68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12399-cwe-434-unrestricted-upload-of-file-2d963d08</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12399%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20alexreservations%20Alex%20Reservations%3A%20Smart%20Restaurant%20Booking&amp;severity=high&amp;id=690f0e9f15ddfe7d54073e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11967-cwe-434-unrestricted-upload-of-file-277b2bf0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11967%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20getwpfunnels%20Mail%20Mint%20%E2%80%93%20Email%20Marketing%2C%20Newsletter%2C%20Email%20Automation%20%26%20WooCommerce%20Emails&amp;severity=high&amp;id=690f0e9f15ddfe7d54073e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11448-cwe-862-missing-authorization-in-sm-00b93c9f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11448%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20Envira%20Gallery%20%E2%80%93%20Image%20Photo%20Gallery%2C%20Albums%2C%20Video%20Gallery%2C%20Slideshows%20%26%20More&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12837-cwe-79-improper-neutralization-of-i-05dbe6ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20aThemes%20Addons%20for%20Elementor&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12643-cwe-79-improper-neutralization-of-i-cc4f70fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saphali%20Saphali%20LiqPay%20for%20donate&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11980-cwe-89-improper-neutralization-of-s-b7d7d4b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11980%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kybernetikservices%20Quick%20Featured%20Images&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12092-cwe-22-improper-limitation-of-a-pat-da06969a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12092%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gregross%20CYAN%20Backup&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12098-cwe-200-exposure-of-sensitive-infor-0626340b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12098%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20academylms%20Academy%20LMS%20Pro&amp;severity=medium&amp;id=690f02ef224224608af9754f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12099-cwe-502-deserialization-of-untruste-4f0a42e9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12099%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20kodezen%20Academy%20LMS%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Complete%20eLearning%20Solution&amp;severity=high&amp;id=690f02ef224224608af97553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12621-cwe-863-incorrect-authorization-in--239f4ae6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12621%3A%20CWE-863%20Incorrect%20Authorization%20in%20wpdesk%20Flexible%20Refund%20and%20Return%20Order%20for%20WooCommerce&amp;severity=medium&amp;id=690ef21a097c6a910ad5e3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12498-cwe-862-missing-authorization-in-me-1c2e239b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12498%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=690ee8d444af18c375220269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeypot-requests-for-code-repositories-sat-nov-8t-8abd15aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Honeypot%3A%20Requests%20for%20(Code)%20Repositories%2C%20(Sat%2C%20Nov%208th)&amp;severity=medium&amp;id=690ee0222137a290ee061dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9334-cwe-94-improper-control-of-generatio-828c3590</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9334%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20codesolz%20Better%20Find%20and%20Replace%20%E2%80%93%20AI-Powered%20Suggestions&amp;severity=high&amp;id=690edcb42137a290ee0198e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12125-cwe-79-improper-neutralization-of-i-b42d44e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linksoftware%20HTML%20Forms%20%E2%80%93%20Simple%20WordPress%20Forms%20Plugin&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12112-cwe-79-improper-neutralization-of-i-fdb4fc65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20Insert%20Headers%20and%20Footers%20Code%20%E2%80%93%20HT%20Script&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12000-cwe-22-improper-limitation-of-a-pat-84002efc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12000%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getwpfunnels%20WPFunnels%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20with%20Checkout%20%26%20One%20Click%20Upsell&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11748-cwe-639-authorization-bypass-throug-43924098</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11748%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20itthinx%20Groups&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6420c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12161-cwe-434-unrestricted-upload-of-file-7dd7582a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12161%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20burhandodhy%20Smart%20Auto%20Upload%20Images%20%E2%80%93%20Import%20External%20Images&amp;severity=high&amp;id=690ebeaf3a8fd010ecf6422b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12193-cwe-79-improper-neutralization-of-i-94b2f4fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12193%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kitae-park%20Mang%20Board%20WP&amp;severity=medium&amp;id=690ebeb03a8fd010ecf64252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11972-cwe-89-improper-neutralization-of-s-3824ae02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11972%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7663-cwe-862-missing-authorization-in-ova-de40624e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7663%3A%20CWE-862%20Missing%20Authorization%20in%20ovatheme%20Ovatheme%20Events%20Manager&amp;severity=medium&amp;id=690ebeb03a8fd010ecf6425b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12353-cwe-639-authorization-bypass-throug-eb442bcc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12353%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getwpfunnels%20WPFunnels%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20with%20Checkout%20%26%20One%20Click%20Upsell&amp;severity=medium&amp;id=690ebeb03a8fd010ecf64256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12042-cwe-862-missing-authorization-in-we-d9b39f8f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12042%3A%20CWE-862%20Missing%20Authorization%20in%20werbeagenturcommotion%20Course%20Booking%20System&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6421b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12064-cwe-79-improper-neutralization-of-i-e654ccac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20WP2Social%20Auto%20Publish&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6421f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12177-cwe-321-use-of-hard-coded-cryptogra-e1fb6848</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12177%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12167-cwe-862-missing-authorization-in-rn-2d3c8ed4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12167%3A%20CWE-862%20Missing%20Authorization%20in%20rnzo%20Connect%20Contact%20Form%207%20and%20AWeber&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6422f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12583-cwe-862-missing-authorization-in-ne-33b2fc78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12583%3A%20CWE-862%20Missing%20Authorization%20in%20neofix%20Simple%20Downloads%20List&amp;severity=medium&amp;id=690eb0d73a8fd010ecf282da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11452-cwe-89-improper-neutralization-of-s-30f144b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11452%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20asgaros%20Asgaros%20Forum&amp;severity=high&amp;id=690eb0d73a8fd010ecf282d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64494-cwe-150-improper-neutralization-of--af0ffe90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64494%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20charmbracelet%20soft-serve&amp;severity=medium&amp;id=690e9f0a3a8fd010ecd0f4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64493-cwe-89-improper-neutralization-of-s-266fcbe1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64493%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=690e9f0a3a8fd010ecd0f4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64492-cwe-89-improper-neutralization-of-s-6bbff9d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64492%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=high&amp;id=690e9f0a3a8fd010ecd0f4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-08-53832820</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-08&amp;severity=medium&amp;id=690fdc521fa9d93f266a607c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64486-cwe-73-external-control-of-file-nam-d894c775</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64486%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=690e812b0e7acb8066fb4466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12911-inappropriate-implementation-in-goo-b46e6c13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12911%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb445e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12910-inappropriate-implementation-in-goo-b50be9dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12910%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb445a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12909-insufficient-policy-enforcement-in--25baa46d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12909%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb4456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12908-insufficient-validation-of-untruste-71cd81ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12908%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb4452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12907-insufficient-validation-of-untruste-88e4df1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12907%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=690e812b0e7acb8066fb444e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12906-inappropriate-implementation-in-goo-96437911</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12906%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb444a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12905-inappropriate-implementation-in-goo-5147d9e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12905%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb4446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64485-cwe-22-improper-limitation-of-a-pat-aef7038b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=690e812b0e7acb8066fb4462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-rise-of-online-casino-spam-29af03bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Rise%20of%20Online%20Casino%20Spam&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37736-cwe-863-incorrect-authorization-in--679fb322</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37736%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Elastic%20Cloud%20Enterprise%20(ECE)&amp;severity=high&amp;id=690e71563a5f68e27f2ed920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12418-cwe-59-improper-link-resolution-bef-58225bcd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12418%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Revenera%20InstallShield&amp;severity=medium&amp;id=690e653fde4eb1b9f756d678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/landfall-malware-targeted-samsung-galaxy-users-daa9203c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Landfall&apos;%20Malware%20Targets%20Samsung%20Galaxy%20Users&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12863-use-after-free-in-red-hat-red-hat-e-6f448282</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12863&amp;severity=null&amp;id=690e5f49323c4112fbad3517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomvibing-infests-visual-studio-extension-marke-ba369b63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Ransomvibing&apos;%20Infests%20Visual%20Studio%20Extension%20Market&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64481-cwe-601-url-redirection-to-untruste-b90ff5a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64481%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20simonw%20datasette&amp;severity=low&amp;id=694f079233784cecd499b7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12875-out-of-bounds-write-in-mruby-a5920cd3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12875%3A%20Out-of-bounds%20Write%20in%20mruby&amp;severity=medium&amp;id=690e59e81aa5a3f4ee1fc7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12896-cwe-307-improper-restriction-of-exc-32187ba3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12896%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Solidigm%E2%84%A2%20D5-P5316%2C%20D7-P5510%2C%20D7-P5520%2FD7-P5620%2C%20D5-P5430%2C%20D5-P5336&amp;severity=medium&amp;id=690e5d6d1aa5a3f4ee24f357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12902-cwe-665-improper-initialization-in--94915407</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12902%3A%20CWE-665%20Improper%20Initialization%20in%20Solidigm%E2%84%A2%20D5-P5316%2C%20D5-P5430%2C%20D7-P5520%2FD7-P5620%2C%20D5-P5336&amp;severity=medium&amp;id=690e5d6d1aa5a3f4ee24f35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64439-cwe-502-deserialization-of-untruste-12c0bc65</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64439%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph&amp;severity=high&amp;id=690e623c323c4112fbb14727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-backs-massive-ai-push-in-uae-raising-sec-9e75cb73</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Backs%20Massive%20AI%20Push%20in%20UAE%2C%20Raising%20Security%20Concerns&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10230-improper-neutralization-of-special--4e28a7fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10230%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=690e4d7dc4445bd1e6c78d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36006-cwe-404-improper-resource-shutdown--b248aa76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36006%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e449cdc0204d2f6657991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7700-null-pointer-dereference-4f448a73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7700%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=690e449cdc0204d2f6657997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36008-cwe-770-allocation-of-resources-wit-f4f71011</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36008%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e449cdc0204d2f6657994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36131-cwe-359-exposure-of-private-persona-675fbfa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36131%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e411fdc0204d2f6606153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36136-cwe-770-allocation-of-resources-wit-73a37965</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36136%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e411fdc0204d2f6606156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36185-cwe-943-improper-neutralization-of--9a425597</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36185%3A%20CWE-943%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e411fdc0204d2f6606159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12890-improper-check-or-handling-of-excep-1694b706</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12890%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=690e411fdc0204d2f660615c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36186-cwe-250-execution-with-unnecessary--202d6663</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36186%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Db2&amp;severity=high&amp;id=690e3d99dc0204d2f65bf867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33012-cwe-324-use-of-a-key-past-its-expir-2d834222</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33012%3A%20CWE-324%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e3d99dc0204d2f65bf864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2534-cwe-789-memory-allocation-with-exces-8b0f1c70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2534%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e3d99dc0204d2f65bf861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36135-cwe-79-improper-neutralization-of-i-83b55546</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47118-cwe-121-stack-based-buffer-overflow-e1b6b891</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47118%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12829-cwe-125-out-of-bounds-read-in-amazo-16a00e5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12829%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Amazon%20Ion-C&amp;severity=medium&amp;id=690e35acf29beb96f88f84a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12873-sql-injection-in-campcodes-school-f-e9d77667</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12873%3A%20SQL%20Injection%20in%20Campcodes%20School%20File%20Management&amp;severity=medium&amp;id=690e35acf29beb96f88f84a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9458-cwe-120-buffer-copy-without-checking-71ea4f13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9458%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=690e35acf29beb96f88f84b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samsung-zero-click-flaw-exploited-to-deploy-landfa-eebc5c61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Samsung%20Mobile%20Flaw%20Exploited%20as%20Zero-Day%20to%20Deploy%20LANDFALL%20Android%20Spyware&amp;severity=low&amp;id=690eb03c3a8fd010ecf20020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64430-cwe-918-server-side-request-forgery-c86441a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64430%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=690e3d06dc0204d2f65bb8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64347-cwe-284-improper-access-control-in--c126b0b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64347%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20apollographql%20router&amp;severity=high&amp;id=690e3201f29beb96f88aff9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12862-unrestricted-upload-in-projectworld-fc491cf2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12862%3A%20Unrestricted%20Upload%20in%20projectworlds%20Online%20Notes%20Sharing%20Platform&amp;severity=medium&amp;id=690e23aa5ed2b3c9882b343b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3222-cwe-287-improper-authentication-in-g-a21e94c5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3222%3A%20CWE-287%20Improper%20Authentication%20in%20GE%20Vernova%20Smallworld&amp;severity=critical&amp;id=690e23aa5ed2b3c9882b3441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7719-cwe-22-improper-limitation-of-a-path-aad7bef7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7719%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GE%20Vernova%20Smallworld&amp;severity=medium&amp;id=690e23aa5ed2b3c9882b3448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-controversial-ransomware-report-goot-5c934bae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Controversial%20Ransomware%20Report%2C%20Gootloader%20Returns%2C%20More%20AN0M%20Arrests&amp;severity=medium&amp;id=690e1c965ed2b3c98821386a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-log4j-to-iis-chinas-hackers-turn-legacy-bugs--50b0e8fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Log4j%20to%20IIS%2C%20China%E2%80%99s%20Hackers%20Turn%20Legacy%20Bugs%20into%20Global%20Espionage%20Tools&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12861-sql-injection-in-dedebiz-d5e521c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12861%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e19295ed2b3c9881d11e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-paid-twice-scam-infects-bookingcom-and-other-boo-b082842f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CI%20Paid%20Twice%E2%80%9D%20Scam%20Infects%20Booking.com%20and%20Other%20Booking%20Sites&apos;%20Users%20with%20PureRAT%20via%20ClickFix&amp;severity=medium&amp;id=690e17380d6e36ffa27aa06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/landfall-android-spyware-targeted-samsung-phones-v-8f3d9a2f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Landfall%20Android%20Spyware%20Targeted%20Samsung%20Phones%20via%20Zero-Day&amp;severity=medium&amp;id=690e13ab0d6e36ffa27582b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47207-cwe-476-in-qnap-systems-inc-file-st-327e6d86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47207%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e10330d6e36ffa2711b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52425-cwe-89-in-qnap-systems-inc-qumagie-f7ca937e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52425%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=critical&amp;id=690e10330d6e36ffa2711b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52865-cwe-476-in-qnap-systems-inc-file-st-5bc39ea2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52865%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e10330d6e36ffa2711b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53408-cwe-476-in-qnap-systems-inc-file-st-c750caec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53408%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e10330d6e36ffa2711b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53409-cwe-770-in-qnap-systems-inc-file-st-cb75bff7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53409%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53410-cwe-770-in-qnap-systems-inc-file-st-9451c2e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53410%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53411-cwe-770-in-qnap-systems-inc-file-st-9205e18b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53411%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53412-cwe-476-in-qnap-systems-inc-file-st-cdb4220f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53412%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53413-cwe-770-in-qnap-systems-inc-file-st-1add67a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53413%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54167-cwe-79-in-qnap-systems-inc-notifica-dd3a8c48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54167%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20Notification%20Center&amp;severity=high&amp;id=690e0fbd0d6e36ffa270ef38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54168-cwe-79-in-qnap-systems-inc-qulog-ce-699cf2f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54168%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuLog%20Center&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57706-cwe-79-in-qnap-systems-inc-file-sta-cbc99d41</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57706%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57712-cwe-22-in-qnap-systems-inc-qsync-ce-d48d964d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57712%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58463-cwe-23-in-qnap-systems-inc-download-827e9f0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58463%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20Download%20Station&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58464-cwe-23-in-qnap-systems-inc-qumagie-7ae37603</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58464%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=high&amp;id=690e0fbe0d6e36ffa270ef7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58465-cwe-79-in-qnap-systems-inc-download-e971514b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58465%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20Download%20Station&amp;severity=low&amp;id=690e0fbe0d6e36ffa270ef82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58469-cwe-352-in-qnap-systems-inc-qulog-c-9c8484d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58469%3A%20CWE-352%20in%20QNAP%20Systems%20Inc.%20QuLog%20Center&amp;severity=low&amp;id=690e0fbe0d6e36ffa270ef86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12860-sql-injection-in-dedebiz-db8a5451</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12860%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e0b59623ee59e95d5a1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12859-sql-injection-in-dedebiz-34a1039f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12859%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e0b59623ee59e95d5a1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-agents-are-going-rogue-heres-how-to-rein-them-i-49b68ab1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Agents%20Are%20Going%20Rogue%3A%20Here&apos;s%20How%20to%20Rein%20Them%20In&amp;severity=medium&amp;id=690e0b3d623ee59e95d58d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-security-agents-get-personas-to-make-them-more--9ef30911</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Security%20Agents%20Get%20Persona%20Makeovers&amp;severity=medium&amp;id=690e0438623ee59e95cbb95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-scammers-use-email-for-blackmail-and-extortion-e62b0cff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20scammers%20use%20email%20for%20blackmail%20and%20extortion%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=690e005768fa31be9219230f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12857-sql-injection-in-code-projects-resp-4424d6a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12857%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690e03b5623ee59e95cb7e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ollama-nvidia-flaws-put-ai-infrastructure-at-risk-259bba8c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ollama%2C%20Nvidia%20Flaws%20Put%20AI%20Infrastructure%20at%20Risk&amp;severity=critical&amp;id=690dfcad68fa31be9214e019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-exposure-vulnerability-found-in-deep-learning-d297c5ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Exposure%20Vulnerability%20Found%20in%20Deep%20Learning%20Tool%20Keras&amp;severity=medium&amp;id=690df93668fa31be921001b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whats-that-coming-over-the-hill-monsta-ftp-remote--1589dff1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%E2%80%99s%20That%20Coming%20Over%20The%20Hill%3F%20(Monsta%20FTP%20Remote%20Code%20Execution%20CVE-2025-34299)%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=690df95668fa31be92103442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12856-sql-injection-in-code-projects-resp-90c37754</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12856%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690e03b5623ee59e95cb7e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12855-sql-injection-in-code-projects-resp-8dd72fa8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12855%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690e03b5623ee59e95cb7e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attacks-against-macos-users-evolving-fbb50b58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attacks%20Against%20macOS%20Users%20Evolving&amp;severity=medium&amp;id=690df5a868fa31be920d2a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10968-cwe-89-improper-neutralization-of-s-c2e3cd70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10968%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20GG%20Soft%20Software%20Services%20Inc.%20PaperWork&amp;severity=high&amp;id=690defa9f9c655f2f6a01ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-0-day-exploit-emails-trick-crypto-users-into--1cd97376</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%200-Day%20Exploit%20Emails%20Trick%20Crypto%20Users%20Into%20Running%20Malicious%20Code&amp;severity=high&amp;id=690deceefb039e6a56848667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12854-authorization-bypass-in-newbee-mall-681e755c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12854%3A%20Authorization%20Bypass%20in%20newbee-mall-plus&amp;severity=medium&amp;id=690de966fb039e6a5680e60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12853-sql-injection-in-sourcecodester-bes-f9f31f02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12853%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=690de966fb039e6a5680e604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/free-test-for-post-quantum-cryptography-tls-abf9df69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Free%20test%20for%20Post-Quantum%20Cryptography%20TLS&amp;severity=medium&amp;id=690de267fb039e6a5677f1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-logic-bombs-in-malware-laced-nuget-packages-3f82666f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20Logic%20Bombs%20in%20Malware-Laced%20NuGet%20Packages%20Set%20to%20Detonate%20Years%20After%20Installation&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-congressional-budget-office-was-hacked-it-says-0301f508</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Congressional%20Budget%20Office%20Was%20Hacked.%20It%20Says%20It%20Has%20Implemented%20New%20Security%20Measures&amp;severity=medium&amp;id=690dd321c2e5047ad7450707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dragonforce-cartel-scattered-spider-at-the-gat-a983b8ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20DragonForce%20Cartel%3A%20Scattered%20Spider%20at%20the%20gate&amp;severity=medium&amp;id=690dcfa5c2e5047ad74185f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-142-update-patches-high-severity-flaws-8e16e61a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20142%20Update%20Patches%20High-Severity%20Flaws&amp;severity=critical&amp;id=690dcc1ec2e5047ad73cd2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/enterprise-credentials-at-risk-same-old-same-old-ddb62a45</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Enterprise%20Credentials%20at%20Risk%20%E2%80%93%20Same%20Old%2C%20Same%20Old%3F&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-became-aware-of-a-new-attack-variant-against-ee5c768a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20became%20aware%20of%20a%20new%20attack%20variant%20against%20Secure%20Firewall%20ASA%20and%20FTD%20devices&amp;severity=medium&amp;id=690dcb8e03ca312466af6ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-group-claims-the-breach-of-the-was-c837e62c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20Ransomware%20group%20claims%20the%20breach%20of%20The%20Washington%20Post&amp;severity=high&amp;id=690dc80903ca312466ab6c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-congressional-budget-office-hit-by-suspected-fo-6563847b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Congressional%20Budget%20Office%20hit%20by%20suspected%20foreign%20cyberattack&amp;severity=high&amp;id=690dc80903ca312466ab6c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-coded-malicious-vs-code-extension-found-with--7b05f476</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe-Coded%20Malicious%20VS%20Code%20Extension%20Found%20with%20Built-In%20Ransomware%20Capabilities&amp;severity=high&amp;id=690dc80903ca312466ab6c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-apt-inedibleochotense-impersonates-e-3a260e85</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-linked%20APT%20InedibleOchotense%20impersonates%20ESET%20to%20deploy%20backdoor%20on%20Ukrainian%20systems&amp;severity=medium&amp;id=690dc80903ca312466ab6c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/destructive-russian-cyberattacks-on-ukraine-expand-c82cecbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Destructive%20Russian%20Cyberattacks%20on%20Ukraine%20Expand%20to%20Grain%20Sector&amp;severity=medium&amp;id=690dbd7d03ca3124669e0a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10870-cwe-89-improper-neutralization-of-s-676f18de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10870%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20DIAL%20CentrosNet&amp;severity=critical&amp;id=690dbd9f03ca3124669e5516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookingcom-phishing-campaign-targeting-hotels-and--3b7ab6b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Booking.com%20Phishing%20Campaign%20Targeting%20Hotels%20and%20Customers&amp;severity=medium&amp;id=690dbd8a03ca3124669e0ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-launches-new-maps-feature-to-help-businesse-8e34ffff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Launches%20New%20Maps%20Feature%20to%20Help%20Businesses%20Report%20Review-Based%20Extortion%20Attempts&amp;severity=low&amp;id=690eb03c3a8fd010ecf2002c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/18-arrested-in-crackdown-on-credit-card-fraud-ring-1632cce5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=18%20Arrested%20in%20Crackdown%20on%20Credit%20Card%20Fraud%20Rings&amp;severity=medium&amp;id=690dba571280f279b842fc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-kimsuky-malware-endclient-rat-technical-report-d4b6f50b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Kimsuky%20Malware%20%22EndClient%20RAT%22%3A%20Technical%20Report%20and%20IOCs&amp;severity=medium&amp;id=690dba651280f279b842fd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cavalry-werewolf-hacker-group-attacks-russian-stat-f193b8d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cavalry%20Werewolf%20hacker%20group%20attacks%20Russian%20state%20institutions&amp;severity=medium&amp;id=690dba651280f279b842fd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leakyinjector-and-leakystealer-duo-hunts-for-crypt-f5059bf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeakyInjector%20and%20LeakyStealer%20Duo%20Hunts%20For%20Crypto%20and%20Browser%20History&amp;severity=medium&amp;id=690dba651280f279b842fd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46413-use-of-password-hash-with-insuffici-7559e5b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46413%3A%20Use%20of%20password%20hash%20with%20insufficient%20computational%20effort%20in%20BUFFALO%20INC.%20WSR-1800AX4&amp;severity=medium&amp;id=690db7deafb341dfebb2fe72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-coded-malicious-vs-code-extension-found-with--7826867f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe-Coded%20Malicious%20VS%20Code%20Extension%20Found%20with%20Built-In%20Ransomware%20Capabilities&amp;severity=medium&amp;id=690eb03c3a8fd010ecf2002f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64346-cwe-22-improper-limitation-of-a-pat-700a9e87</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64346%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jaredallard%20archives&amp;severity=medium&amp;id=690d86fc82f4da9bb2f8a059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12527-cwe-862-missing-authorization-in-yy-b535c46f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12527%3A%20CWE-862%20Missing%20Authorization%20in%20yydevelopment%20Page%20%26%20Post%20Notes&amp;severity=medium&amp;id=690d86fc82f4da9bb2f8a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12520-cwe-79-improper-neutralization-of-i-b9c3f8fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12520%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20Airbnb%20Review%20Slider&amp;severity=medium&amp;id=690d86fc82f4da9bb2f8a04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64343-cwe-289-authentication-bypass-by-al-98c81eba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64343%3A%20CWE-289%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20conda%20constructor&amp;severity=high&amp;id=690d838682f4da9bb2f4364e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64339-cwe-79-improper-neutralization-of-i-52c5b86b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64339%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=690d81c33ea13e495ecb0972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64336-cwe-79-improper-neutralization-of-i-e31649a8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64336%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=690d79bf3ea13e495ec0cafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4522-cwe-862-missing-authorization-in-the-a4eba6c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4522%3A%20CWE-862%20Missing%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=medium&amp;id=690d79bf3ea13e495ec0caf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4519-cwe-285-improper-authorization-in-th-b0fe8baa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4519%3A%20CWE-285%20Improper%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=high&amp;id=690d79bf3ea13e495ec0caee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64328-cwe-78-improper-neutralization-of-s-7b278c42</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64328%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20filestore&amp;severity=high&amp;id=690d71c16e13fd093e3db3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5483-cwe-862-missing-authorization-in-nia-1149b667</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5483%3A%20CWE-862%20Missing%20Authorization%20in%20niaj%20Connector%20Wizard%20(formerly%20LC%20Wizard)&amp;severity=high&amp;id=690d71c16e13fd093e3db3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64323-cwe-862-missing-authorization-in-kg-4d199189</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64323%3A%20CWE-862%3A%20Missing%20Authorization%20in%20kgateway-dev%20kgateway&amp;severity=medium&amp;id=690d65e75b03e68548857302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64184-cwe-22-improper-limitation-of-a-pat-c9922cf3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64184%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webcomics%20dosage&amp;severity=high&amp;id=690d65e75b03e685488572fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64180-cwe-367-time-of-check-time-of-use-t-ee12b800</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64180%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Manager-io%20Manager&amp;severity=critical&amp;id=690d65e75b03e685488572fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11546-cwe-78-improper-neutralization-of-s-d690b3a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11546%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Corporation%20CLUSTERPRO%20X%20for%20Linux%20(EXPRESSCLUSTER%20X%20for%20Linux)&amp;severity=critical&amp;id=690d500c6b26dbd672d3921f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48985-vulnerability-in-vercel-ai-sdk-ff15e5e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48985%3A%20Vulnerability%20in%20Vercel%20AI%20SDK&amp;severity=low&amp;id=690d4641dd7ca828ab196197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52662-vulnerability-in-vercel-nuxt-devtoo-ddb38cea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52662%3A%20Vulnerability%20in%20Vercel%20Nuxt%20Devtools&amp;severity=medium&amp;id=690d4641dd7ca828ab19619b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remember-remember-the-fifth-of-november-e10a6632</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remember%2C%20remember%20the%20fifth%20of%20November&amp;severity=medium&amp;id=690dba651280f279b842fda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-07-23182676</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-07&amp;severity=medium&amp;id=690e8b920e7acb80660960cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63420-na-2c0c3583</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63420%3A%20n%2Fa&amp;severity=medium&amp;id=690e653fde4eb1b9f756d67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60574-na-f1f4e398</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60574%3A%20n%2Fa&amp;severity=high&amp;id=690e653fde4eb1b9f756d67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63543-na-d3cdf1ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63543%3A%20n%2Fa&amp;severity=medium&amp;id=690e623c323c4112fbb14724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63544-na-af771253</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63544%3A%20n%2Fa&amp;severity=medium&amp;id=690e59e81aa5a3f4ee1fc7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63640-na-2a62ff83</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63640%3A%20n%2Fa&amp;severity=medium&amp;id=690e52ee1aa5a3f4ee16c74c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63639-na-1f2d55a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63639%3A%20n%2Fa&amp;severity=medium&amp;id=690e52ee1aa5a3f4ee16c748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63638-na-6e7e145a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63638%3A%20n%2Fa&amp;severity=medium&amp;id=690e5100c4445bd1e6cc8eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63718-na-b29569fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63718%3A%20n%2Fa&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63713-na-947e9d57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63713%3A%20n%2Fa&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61261-na-ab63001f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61261%3A%20n%2Fa&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63717-na-27268ed0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63717%3A%20n%2Fa&amp;severity=medium&amp;id=690e3861a7fbadd0a6bb15c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63716-na-70168f70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63716%3A%20n%2Fa&amp;severity=medium&amp;id=690e35acf29beb96f88f84af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63714-na-a8ff97a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63714%3A%20n%2Fa&amp;severity=medium&amp;id=690e3201f29beb96f88aff98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57697-na-437e2ee0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57697%3A%20n%2Fa&amp;severity=medium&amp;id=690e3201f29beb96f88aff95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63785-na-f449aacf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63785%3A%20n%2Fa&amp;severity=medium&amp;id=690e23aa5ed2b3c9882b3444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57698-na-e0631ef5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57698%3A%20n%2Fa&amp;severity=high&amp;id=690e23aa5ed2b3c9882b3438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63784-na-a05f8789</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63784%3A%20n%2Fa&amp;severity=medium&amp;id=690e20275ed2b3c988264701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63687-na-04697aee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63687%3A%20n%2Fa&amp;severity=medium&amp;id=690e1c1a5ed2b3c988210d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63783-na-8f83404a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63783%3A%20n%2Fa&amp;severity=high&amp;id=690e19295ed2b3c9881d11ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63686-na-b9514941</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63686%3A%20n%2Fa&amp;severity=medium&amp;id=690e17530d6e36ffa27ab8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63689-na-4ab30e8d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63689%3A%20n%2Fa&amp;severity=critical&amp;id=690e13c80d6e36ffa2758cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63691-na-6df29cbd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63691%3A%20n%2Fa&amp;severity=critical&amp;id=690e10330d6e36ffa2711b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63690-na-24d195a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63690%3A%20n%2Fa&amp;severity=critical&amp;id=690e10330d6e36ffa2711b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12789-url-redirection-to-untrusted-site-o-f128c0fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12789%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20Red%20Hat%20Single%20Sign-On%207&amp;severity=medium&amp;id=690d31bfc99da72cbe178d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58423-cwe-22-in-advantech-deviceoniedge-8a469319</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58423%3A%20CWE-22%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=high&amp;id=690d258e790724a13ccd5543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59171-cwe-22-in-advantech-deviceoniedge-46b94232</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59171%3A%20CWE-22%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=high&amp;id=690d258e790724a13ccd5548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62630-cwe-22-in-advantech-deviceoniedge-42bf251b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62630%3A%20CWE-22%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=high&amp;id=690d258e790724a13ccd554d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11460-use-after-free-in-google-chrome-705b7beb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11460%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258d790724a13ccd5537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11458-heap-buffer-overflow-in-google-chro-5d3e6bd9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11458%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258d790724a13ccd5533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11756-use-after-free-in-google-chrome-311a7470</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11756%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258e790724a13ccd553b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12036-inappropriate-implementation-in-goo-da7c430d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12036%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258e790724a13ccd553f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64302-cwe-79-in-advantech-deviceoniedge-52d9eb42</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64302%3A%20CWE-79%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=medium&amp;id=690d258e790724a13ccd5552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12636-cwe-522-in-ubia-ubox-0ca6d3c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12636%3A%20CWE-522%20in%20Ubia%20Ubox%20Android&amp;severity=medium&amp;id=690d258e790724a13ccd5557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11219-use-after-free-in-google-chrome-6d401465</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11219%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=low&amp;id=690d1f62a155e591f58b6604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11216-inappropriate-implementation-in-goo-baf1c387</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11216%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f62a155e591f58b6600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11215-off-by-one-error-in-google-chrome-542fb659</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11215%3A%20Off%20by%20one%20error%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b65a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11213-inappropriate-implementation-in-goo-a985cc0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11213%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b659e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11212-inappropriate-implementation-in-goo-18d5d3a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11212%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b6597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11211-out-of-bounds-read-in-google-chrome-d935f395</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11211%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b6593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11210-side-channel-information-leakage-in-9b28a315</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11210%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b658e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11209-inappropriate-implementation-in-goo-4bcef65a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11209%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b658a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11208-inappropriate-implementation-in-goo-ab276424</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11208%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b6586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11207-side-channel-information-leakage-in-14e24c42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11207%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b6582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11206-heap-buffer-overflow-in-google-chro-7ca107d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11206%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b657e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11205-heap-buffer-overflow-in-google-chro-b21b8f53</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11205%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b657a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64179-cwe-862-missing-authorization-in-tr-b5542c2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64179%3A%20CWE-862%3A%20Missing%20Authorization%20in%20treeverse%20lakeFS&amp;severity=medium&amp;id=690d1bd3a155e591f5870723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12125-improper-preservation-of-permission-e97f8f95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12125%3A%20Improper%20Preservation%20of%20Permissions%20in%203scale%20porta&amp;severity=high&amp;id=690d1bd3a155e591f5870727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64178-cwe-918-server-side-request-forgery-fe16c62e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64178%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jon4hz%20jellysweep&amp;severity=high&amp;id=690d1871a155e591f583f3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sora-2-makes-videos-so-believable-reality-checks-a-5788fef9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sora%202%20Makes%20Videos%20So%20Believable%2C%20Reality%20Checks%20Are%20Required&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64177-cwe-79-improper-neutralization-of-i-0e3f9198</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64177%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MatiasDesuu%20ThinkDashboard&amp;severity=medium&amp;id=690d1871a155e591f583f3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64176-cwe-20-improper-input-validation-in-7616768a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64176%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20MatiasDesuu%20ThinkDashboard&amp;severity=medium&amp;id=690d131508e329e0f8f68c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12790-path-traversal-filename-in-red-hat--a0e4bac3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12790%3A%20Path%20Traversal%3A%20&apos;..filename&apos;%20in%20Nicholas%20J%20Humfrey%20ruby-mqtt&amp;severity=high&amp;id=690d0f9108e329e0f8f19b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64327-cwe-918-server-side-request-forgery-4f7cf67c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64327%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MatiasDesuu%20ThinkDashboard&amp;severity=medium&amp;id=690d0f9108e329e0f8f19b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64326-cwe-212-improper-removal-of-sensiti-7ae919f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64326%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=690d0c0d08e329e0f8ef65ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-firewall-backups-stolen-by-nation-state--edd437ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Firewall%20Backups%20Stolen%20by%20Nation-State%20Actor&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64174-cwe-79-improper-neutralization-of-i-889a5a08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64174%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=690d0c0d08e329e0f8ef65d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33110-cwe-80-improper-neutralization-of-s-0d93e084</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33110%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=690d0c0d08e329e0f8ef65c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64173-cwe-288-authentication-bypass-using-25a47fbb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64173%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20apollographql%20router&amp;severity=high&amp;id=690d0c0d08e329e0f8ef65cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52881-cwe-61-unix-symbolic-link-symlink-f-22d5c489</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52881%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20opencontainers%20runc&amp;severity=high&amp;id=690d06aae0be3996723e47c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12486-cwe-79-improper-neutralization-of-i-6bbf6296</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12486%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Heimdall%20Data%20Database%20Proxy&amp;severity=high&amp;id=690d06aae0be3996723e47da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12487-cwe-807-reliance-on-untrusted-input-ffa604f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12487%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20oobabooga%20text-generation-webui&amp;severity=critical&amp;id=690d06aae0be3996723e47dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12488-cwe-807-reliance-on-untrusted-input-03a30621</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12488%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20oobabooga%20text-generation-webui&amp;severity=critical&amp;id=690d06aae0be3996723e47e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12490-cwe-22-improper-limitation-of-a-pat-d25efcdd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12490%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Netgate%20pfSense&amp;severity=high&amp;id=690d0327e0be3996723a126b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52565-cwe-61-unix-symbolic-link-symlink-f-11414537</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52565%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20opencontainers%20runc&amp;severity=high&amp;id=690d0327e0be3996723a126f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34247-cwe-89-improper-neutralization-of-s-219bab26</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34247%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cffa2e0be399672357164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34246-cwe-89-improper-neutralization-of-s-2520184f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34246%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a129c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34245-cwe-89-improper-neutralization-of-s-5424843e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34245%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a1297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34244-cwe-89-improper-neutralization-of-s-4aaee6a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34244%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a1292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34243-cwe-89-improper-neutralization-of-s-7ca826be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34243%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a128d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34242-cwe-89-improper-neutralization-of-s-03deb6ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34242%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=high&amp;id=690d0327e0be3996723a1288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34241-cwe-89-improper-neutralization-of-s-ec01adf4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34241%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a1283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34240-cwe-89-improper-neutralization-of-s-201ea04b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34240%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=high&amp;id=690d0b9008e329e0f8ef0d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34239-cwe-78-improper-neutralization-of-s-c0e954c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34239%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=high&amp;id=690d0b9008e329e0f8ef0d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34238-cwe-22-improper-limitation-of-a-pat-e568d0e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34238%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cfc1ee0be39967232fe30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34237-cwe-79-improper-neutralization-of-i-863e0efa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34237%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cfc1ee0be39967232fe2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34236-cwe-79-improper-neutralization-of-i-e07ba982</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cfc1ee0be39967232fe26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-infrastructure-finds-stability-with-auro-0ed63b44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Infrastructure%20Finds%20Stability%20with%20aurologic%20GmbH&amp;severity=medium&amp;id=690d0318e0be3996723a0747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31133-cwe-61-unix-symbolic-link-symlink-f-fb315234</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31133%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20opencontainers%20runc&amp;severity=high&amp;id=690cf8a6e0be3996722ed9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22397-cwe-22-improper-limitation-of-a-pat-2acfe304</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22397%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller%209%2014G%20Versions&amp;severity=medium&amp;id=690cf8a6e0be3996722ed99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12815-cwe-283-unverified-ownership-in-aws-decaad33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12815%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=medium&amp;id=690cd9af1c9f718888294807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10885-cwe-250-execution-with-unnecessary--e1fc50b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10885%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Autodesk%20Installer&amp;severity=high&amp;id=690cd7dc70ae18879c793e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12485-cwe-269-improper-privilege-manageme-21312e47</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12485%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Devolutions%20Server&amp;severity=high&amp;id=690cd45870ae18879c759e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12808-cwe-284-improper-access-control-in--a86a6461</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12808%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=690cd0d370ae18879c72e598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/7-new-chatgpt-vulnerabilities-let-hackers-steal-da-dd3d7205</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=7%20New%20ChatGPT%20Vulnerabilities%20Let%20Hackers%20Steal%20Data%20and%20Hijack%20Memory&amp;severity=medium&amp;id=690ccd4d70ae18879c71a563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64287-improper-control-of-filename-for-in-c9143514</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64287%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Alloggio%20-%20Hotel%20Booking&amp;severity=high&amp;id=690cc81eca26fb4dd2f59cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64232-improper-neutralization-of-input-du-b6010889</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64232%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20Import%20from%20YML&amp;severity=high&amp;id=690cc81eca26fb4dd2f59cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64224-improper-neutralization-of-input-du-ab1bd953</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64224%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Conference%20Theme%20Custom%20Post%20Type&amp;severity=high&amp;id=690cc81eca26fb4dd2f59cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64198-improper-neutralization-of-input-du-0c8bc194</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64198%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appscreo%20Easy%20Social%20Share%20Buttons&amp;severity=high&amp;id=690cc81eca26fb4dd2f59ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64196-improper-neutralization-of-input-du-97a4dd87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64196%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=high&amp;id=690cc81eca26fb4dd2f59ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6327-unrestricted-upload-of-file-with-dan-ac142e1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6327%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=critical&amp;id=690cc81eca26fb4dd2f59cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6325-incorrect-privilege-assignment-in-ki-ac0fa496</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6325%3A%20Incorrect%20Privilege%20Assignment%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=critical&amp;id=690cc81eca26fb4dd2f59cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62950-cross-site-request-forgery-csrf-in--725d6875</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62950%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=medium&amp;id=690cc81eca26fb4dd2f59ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62914-missing-authorization-in-anibalwain-14b82191</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62914%3A%20Missing%20Authorization%20in%20anibalwainstein%20Effect%20Maker&amp;severity=medium&amp;id=690cc81aca26fb4dd2f59c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62076-improper-neutralization-of-input-du-41787187</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ido%20Kobelkowsky%20Simple%20Payment&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62075-improper-control-of-filename-for-in-2f7be238</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62075%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ido%20Kobelkowsky%20Simple%20Payment&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62074-improper-neutralization-of-input-du-e16e8cc6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62074%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amauri%20WPMobile.App&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62067-improper-control-of-filename-for-in-ab0bf6d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Savory&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62066-improper-control-of-filename-for-in-bd8c37a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20Revolution&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62065-unrestricted-upload-of-file-with-da-f700e695</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62065%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Rometheme%20RTMKit&amp;severity=critical&amp;id=690cc81aca26fb4dd2f59c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62064-authentication-bypass-using-an-alte-67539e0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62064%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated-Themes%20Search%20%26%20Go&amp;severity=critical&amp;id=690cc81aca26fb4dd2f59c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62059-improper-neutralization-of-input-du-001f8598</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20SureRank&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62057-improper-neutralization-of-input-du-ebe11a9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62055-improper-control-of-filename-for-in-f5be0d76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62055%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Academist&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62053-improper-control-of-filename-for-in-0ac312de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62053%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20favethemes%20Houzez&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62051-improper-neutralization-of-input-du-40cb62a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AndonDesign%20UDesign%20Core&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62049-missing-authorization-in-stylemix-c-810a77fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62049%3A%20Missing%20Authorization%20in%20Stylemix%20Cost%20Calculator%20Builder&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62047-unrestricted-upload-of-file-with-da-91d8cb9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62047%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Case-Themes%20Case%20Addons&amp;severity=critical&amp;id=690cc816ca26fb4dd2f59b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62046-missing-authorization-in-codextheme-e2c697cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62046%3A%20Missing%20Authorization%20in%20CodexThemes%20TheGem%20Demo%20Import%20(for%20WPBakery)&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62045-improper-control-of-filename-for-in-89499e84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62045%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20WPBakery)&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62044-improper-neutralization-of-input-du-2c42e2fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20WPBakery)&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62041-improper-neutralization-of-input-du-66464271</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62041%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62040-improper-neutralization-of-input-du-a30fb70b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62040%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YOP%20YOP%20Poll&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62039-insertion-of-sensitive-information--6d353a5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62039%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ays%20Pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62038-insertion-of-sensitive-information--bbd419f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62038%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Sovlix%20MeetingHub&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62037-missing-authorization-in-uxper-togo-9977a3a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62037%3A%20Missing%20Authorization%20in%20uxper%20Togo&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62036-improper-neutralization-of-input-du-4677544d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62036%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Togo&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62035-deserialization-of-untrusted-data-i-f824e158</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62035%3A%20Deserialization%20of%20Untrusted%20Data%20in%20uxper%20Togo&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62034-incorrect-privilege-assignment-in-u-3f16263a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62034%3A%20Incorrect%20Privilege%20Assignment%20in%20uxper%20Togo&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62033-missing-authorization-in-uxper-togo-2bc7f19c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62033%3A%20Missing%20Authorization%20in%20uxper%20Togo&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62032-improper-neutralization-of-input-du-adefbc7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Cloud%20Library&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62031-improper-neutralization-of-input-du-febed961</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=high&amp;id=690cc814ca26fb4dd2f59afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62030-improper-neutralization-of-input-du-edc07529</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62030%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62028-missing-authorization-in-themenecta-3430ee51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62028%3A%20Missing%20Authorization%20in%20ThemeNectar%20Salient&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62018-missing-authorization-in-hogash-kal-afb9b8d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62018%3A%20Missing%20Authorization%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62017-missing-authorization-in-hogash-kal-5ca74e98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62017%3A%20Missing%20Authorization%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62016-unrestricted-upload-of-file-with-da-aebc8057</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62016%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20hogash%20KALLYAS&amp;severity=critical&amp;id=690cc810ca26fb4dd2f596ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62014-improper-control-of-filename-for-in-12fe845b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62014%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20ITok&amp;severity=high&amp;id=690cc810ca26fb4dd2f596a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62012-improper-neutralization-of-input-du-05ebc36f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62012%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62011-improper-neutralization-of-input-du-a26f242e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62010-improper-control-of-filename-for-in-0b033482</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62010%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Famita&amp;severity=high&amp;id=690cc810ca26fb4dd2f5969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60248-improper-control-of-filename-for-in-7e98aa9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60248%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WPClever%20WPC%20Product%20Options%20for%20WooCommerce&amp;severity=high&amp;id=690cc810ca26fb4dd2f5969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60247-missing-authorization-in-bux-bux-wo-1a7533cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60247%3A%20Missing%20Authorization%20in%20Bux%20Bux%20Woocommerce&amp;severity=medium&amp;id=690cc810ca26fb4dd2f59697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60244-improper-neutralization-of-script-r-8ffeaee2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60244%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20RealMag777%20TableOn&amp;severity=high&amp;id=690cc80cca26fb4dd2f595e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60243-incorrect-privilege-assignment-in-h-b129cfb8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60243%3A%20Incorrect%20Privilege%20Assignment%20in%20Holest%20Engineering%20Selling%20Commander%20for%20WooCommerce&amp;severity=critical&amp;id=690cc80cca26fb4dd2f595e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60242-improper-limitation-of-a-pathname-t-f6facc5b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60242%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Anatoly%20Download%20Counter&amp;severity=high&amp;id=690cc80cca26fb4dd2f595e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60240-improper-control-of-filename-for-in-dc15f2ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60240%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Alexander%20AnyComment&amp;severity=high&amp;id=690cc80cca26fb4dd2f595df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60239-improper-neutralization-of-special--f66272de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60239%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Codexpert%2C%20Inc%20CoSchool%20LMS&amp;severity=high&amp;id=690cc80cca26fb4dd2f595dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60235-unrestricted-upload-of-file-with-da-9bb9a303</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60235%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Plugify%20Support%20Ticket%20System%20for%20WooCommerce%20(Premium)&amp;severity=critical&amp;id=690cc80cca26fb4dd2f595d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60207-unrestricted-upload-of-file-with-da-d80d98f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60207%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Addify%20Custom%20User%20Registration%20Fields%20for%20WooCommerce&amp;severity=critical&amp;id=690cc80cca26fb4dd2f595d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60204-improper-control-of-filename-for-in-70b6ee9a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60204%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Josh%20Kohlbach%20WooCommerce%20Store%20Toolkit&amp;severity=high&amp;id=690cc80cca26fb4dd2f595d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60203-improper-control-of-filename-for-in-de31576a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60203%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Josh%20Kohlbach%20Store%20Exporter&amp;severity=high&amp;id=690cc80cca26fb4dd2f595d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60202-improper-control-of-filename-for-in-0c533443</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60202%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Kyle%20Phillips%20Favorites&amp;severity=high&amp;id=690cc80cca26fb4dd2f595cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60201-improper-control-of-filename-for-in-4db0e833</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60201%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20aguilatechnologies%20WP%20Customer%20Area&amp;severity=high&amp;id=690cc809ca26fb4dd2f594e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60200-improper-control-of-filename-for-in-f60d3d30</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60200%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20LearnPress%20Export%20Import&amp;severity=high&amp;id=690cc809ca26fb4dd2f594e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60199-improper-control-of-filename-for-in-32038179</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60199%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dedalx%20InHype%20-%20Blog%20%26%20Magazine%20WordPress%20Theme&amp;severity=high&amp;id=690cc809ca26fb4dd2f594de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60198-improper-control-of-filename-for-in-d7902855</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60198%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dedalx%20Saxon%20-%20Viral%20Content%20Blog%20%26%20Magazine%20Marketing%20WordPress%20Theme&amp;severity=high&amp;id=690cc809ca26fb4dd2f594db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60197-improper-control-of-filename-for-in-68df6462</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60197%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20owenr88%20Simple%20Contact%20Forms&amp;severity=high&amp;id=690cc809ca26fb4dd2f594d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60196-improper-control-of-filename-for-in-c8629ef1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60196%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Clearblue%20Clearblue%C2%AE%20Ovulation%20Calculator&amp;severity=high&amp;id=690cc809ca26fb4dd2f594d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60195-incorrect-privilege-assignment-in-v-ae37057d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60195%3A%20Incorrect%20Privilege%20Assignment%20in%20Vito%20Peleg%20Atarim&amp;severity=critical&amp;id=690cc809ca26fb4dd2f594d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60194-improper-control-of-filename-for-in-233bcd35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60194%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20Product%20Search%20for%20WooCommerce&amp;severity=high&amp;id=690cc809ca26fb4dd2f594cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60193-improper-control-of-filename-for-in-d69e0ec6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60193%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20User%20Roles&amp;severity=high&amp;id=690cc809ca26fb4dd2f594cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60192-improper-control-of-filename-for-in-96eee885</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60192%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20Wholesale%20Pricing%20for%20WooCommerce&amp;severity=high&amp;id=690cc809ca26fb4dd2f594c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60191-improper-control-of-filename-for-in-0e13e8f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60191%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20Wishlist%20for%20WooCommerce&amp;severity=high&amp;id=690cc801ca26fb4dd2f593f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60190-improper-control-of-filename-for-in-4a51c0d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60190%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Hinnerk%20Altenburg%20Immocaster%20WordPress%20Plugin&amp;severity=high&amp;id=690cc801ca26fb4dd2f593ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60189-improper-control-of-filename-for-in-2ab3885c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60189%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PoloPag%20PoloPag%20%26%238211%3B%20Pix%20Autom%C3%A1tico%20para%20Woocommerce&amp;severity=high&amp;id=690cc801ca26fb4dd2f593ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60188-insertion-of-sensitive-information--61ea6cde</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60188%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vito%20Peleg%20Atarim&amp;severity=high&amp;id=690cc801ca26fb4dd2f593e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60187-unrestricted-upload-of-file-with-da-8f913a54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60187%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=690cc801ca26fb4dd2f593e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60074-improper-control-of-filename-for-in-56758241</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60074%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Processby%20Lazy%20Load%20Optimizer&amp;severity=high&amp;id=690cc801ca26fb4dd2f593e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60073-improper-control-of-filename-for-in-05961d47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60073%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Processby%20Responsive%20Sidebar&amp;severity=high&amp;id=690cc801ca26fb4dd2f593de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59556-improper-neutralization-of-input-du-61d92859</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20GoStore&amp;severity=high&amp;id=690cc801ca26fb4dd2f593d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58998-deserialization-of-untrusted-data-i-2dfbc093</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58998%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=critical&amp;id=690cc7f7ca26fb4dd2f590c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58996-unrestricted-upload-of-file-with-da-5ddb7c95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58996%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Helmut%20Wandl%20Advanced%20Settings&amp;severity=critical&amp;id=690cc7f7ca26fb4dd2f590be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58995-improper-control-of-filename-for-in-6fc263ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58995%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Leblix&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58994-improper-control-of-filename-for-in-e1080e64</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58994%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designervily%20Greenify&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58986-missing-authorization-in-ganddser-j-25ea8b2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58986%3A%20Missing%20Authorization%20in%20ganddser%20Jock%20On%20Air%20Now%20(JOAN)&amp;severity=medium&amp;id=690cc7f7ca26fb4dd2f590b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58972-path-traversal-in-dmitry-v-ceo-of-u-fb5c3105</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58972%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58964-improper-neutralization-of-input-du-cb2d9559</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58964%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Enzy&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58638-improper-neutralization-of-input-du-151a9787</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58636-deserialization-of-untrusted-data-i-bb216451</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58636%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Keap%2FInfusionsoft&amp;severity=critical&amp;id=690cc7f7ca26fb4dd2f590a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58629-missing-authorization-in-kamleshyad-6038c386</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58629%3A%20Missing%20Authorization%20in%20kamleshyadav%20Miraculous&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58627-authorization-bypass-through-user-c-41381fa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58627%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kamleshyadav%20Miraculous%20Core%20Plugin&amp;severity=critical&amp;id=690cc7f5ca26fb4dd2f59062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58619-deserialization-of-untrusted-data-i-743adc33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58619%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sbouey%20Falang%20multilanguage&amp;severity=high&amp;id=690cc7f5ca26fb4dd2f5905f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58595-authentication-bypass-by-spoofing-i-6472f50b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58595%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Saad%20Iqbal%20All%20In%20One%20Login&amp;severity=critical&amp;id=690cc7f5ca26fb4dd2f5905c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58592-deserialization-of-untrusted-data-i-95585646</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58592%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cozmoslabs%20TranslatePress&amp;severity=high&amp;id=690cc7f5ca26fb4dd2f59059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58243-missing-authorization-in-jthemes-im-66c08558</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58243%3A%20Missing%20Authorization%20in%20Jthemes%20imEvent&amp;severity=medium&amp;id=690cc7f5ca26fb4dd2f59056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58207-missing-authorization-in-wp-messiah-81900cbd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58207%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=high&amp;id=690cc7f5ca26fb4dd2f59053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5803-missing-authorization-in-e4jvikwp-vi-586d966e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5803%3A%20Missing%20Authorization%20in%20e4jvikwp%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=high&amp;id=690cc801ca26fb4dd2f593db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54737-improper-neutralization-of-input-du-2cd33b0c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f59050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54722-improper-neutralization-of-input-du-d51ac229</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54722%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ex-Themes%20WooTour&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f5904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54721-improper-neutralization-of-input-du-db451d62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54721%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20Resca&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f5904a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54719-deserialization-of-untrusted-data-i-33975485</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54719%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Yogi%20-%20Health%20Beauty%20%26%20Yoga&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f59045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54718-improper-neutralization-of-input-du-a26043f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54718%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Yogi%20-%20Health%20Beauty%20%26%20Yoga&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54711-missing-authorization-in-bplugins-i-131867df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54711%3A%20Missing%20Authorization%20in%20bPlugins%20Info%20Cards&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53586-deserialization-of-untrusted-data-i-9f68c363</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53586%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20WeMusic&amp;severity=critical&amp;id=690cc7f2ca26fb4dd2f58ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53585-improper-neutralization-of-input-du-2b1ffa90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20WeMusic&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53574-improper-neutralization-of-input-du-e382b85b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ptibogxiv%20Doliconnect&amp;severity=medium&amp;id=690cc7f2ca26fb4dd2f58b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53573-improper-neutralization-of-input-du-6c1993ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Epic%20Review&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53349-improper-neutralization-of-input-du-cd984c4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Laborator%20Kalium&amp;severity=medium&amp;id=690cc7f2ca26fb4dd2f58b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53324-improper-neutralization-of-input-du-26fd73dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeYatri%20Gutenify&amp;severity=medium&amp;id=690cc7f2ca26fb4dd2f58b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53316-cross-site-request-forgery-csrf-in--393a07f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53316%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjahan%20Jewel%20WP%20GDPR%20Cookie%20Consent&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53286-improper-neutralization-of-input-du-69e55344</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53286%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jhainey%20Milevis%20Dropify&amp;severity=medium&amp;id=690cc7f2ca26fb4dd2f58b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53283-unrestricted-upload-of-file-with-da-3e4237c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53283%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20borisolhor%20Drop%20Uploader%20for%20CF7%20-%20Drag%26Drop%20File%20Uploader%20Addon&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53252-improper-control-of-filename-for-in-ee9f667a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53252%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zozothemes%20Zegen&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53246-missing-authorization-in-gaurav-agg-1296edd8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53246%3A%20Missing%20Authorization%20in%20Gaurav%20Aggarwal%20Backup%20and%20Move&amp;severity=high&amp;id=690cc7f0ca26fb4dd2f58b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53245-improper-neutralization-of-input-du-917a563d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Afzal%20Multani%20WP%20Logo%20Changer&amp;severity=medium&amp;id=690cc7f0ca26fb4dd2f58b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53242-deserialization-of-untrusted-data-i-9290cf85</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53242%3A%20Deserialization%20of%20Untrusted%20Data%20in%20VictorThemes%20Seil&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53239-improper-neutralization-of-input-du-3a81bda6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bnovotny%20User%20Registration%20Aide&amp;severity=medium&amp;id=690cc7f0ca26fb4dd2f58b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53214-missing-authorization-in-sertifier--42ae7fce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53214%3A%20Missing%20Authorization%20in%20sertifier%20Sertifier%20Certificate%20%26%20Badge%20Maker&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52773-improper-neutralization-of-special--9b0c4b8e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52773%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hiecor%20HieCOR%20Payment%20Gateway%20Plugin&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52764-improper-neutralization-of-input-du-c4c9ad04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marielav%20flexoslider&amp;severity=medium&amp;id=690cc7f0ca26fb4dd2f58b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49909-improper-neutralization-of-input-du-16ef2e34</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49909%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Bookmark%20%26%20Follow&amp;severity=medium&amp;id=690cc7f0ca26fb4dd2f58b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49905-improper-neutralization-of-input-du-faa8af29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsCafe%20Range%20Slider%20Addon%20for%20Gravity%20Forms&amp;severity=medium&amp;id=690cc7eeca26fb4dd2f58b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49904-improper-neutralization-of-input-du-7f303d99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=medium&amp;id=690cc7eeca26fb4dd2f58b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49900-incorrect-privilege-assignment-in-b-55fe2f85</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49900%3A%20Incorrect%20Privilege%20Assignment%20in%20bPlugins%20Advanced%20scrollbar&amp;severity=high&amp;id=690cc7edca26fb4dd2f58b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49394-missing-authorization-in-bplugins-i-9336cb5e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49394%3A%20Missing%20Authorization%20in%20bPlugins%20Image%20Gallery%20block%20%E2%80%93%20Create%20and%20display%20photo%20gallery%2Fphoto%20album.&amp;severity=high&amp;id=690cc7edca26fb4dd2f58b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49393-deserialization-of-untrusted-data-i-f970e6f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49393%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Fetch%20Designs%20Sign-up%20Sheets&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49390-improper-neutralization-of-input-du-57b20c2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49390%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20christophrado%20Cookie%20Notice%20%26%20Consent&amp;severity=medium&amp;id=690cc7edca26fb4dd2f58b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49386-deserialization-of-untrusted-data-i-f5af9d35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49386%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Scott%20Reilly%20Preserve%20Code%20Formatting&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49372-improper-control-of-generation-of-c-6c75e0af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49372%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20VillaTheme%20HAPPY&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48330-improper-control-of-filename-for-in-729bc385</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48330%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Daman%20Jeet%20Real%20Time%20Validation%20for%20Gravity%20Forms&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48290-improper-control-of-filename-for-in-d4b0f559</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48290%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20bslthemes%20Kinsley&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48090-path-traversal-in-cocobasic-blanka--58fd83cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48090%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20CocoBasic%20Blanka%20-%20One%20Page%20WordPress%20Theme&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48089-improper-neutralization-of-special--2b2cfbd6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48089%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rainbow-Themes%20Education%20WordPress%20Theme%20%7C%20HiStudy&amp;severity=critical&amp;id=690cc7cdca26fb4dd2f57a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48086-deserialization-of-untrusted-data-i-05956df8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48086%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpdreams%20Ajax%20Search%20Lite&amp;severity=critical&amp;id=690cc7cdca26fb4dd2f57a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48085-cross-site-request-forgery-csrf-in--0025c22e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48085%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZIPANG%20Simple%20Stripe&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48083-cross-site-request-forgery-csrf-in--c74fe185</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48083%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andriassundskard%20wpNamedUsers&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48078-cross-site-request-forgery-csrf-in--a6b8061f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48078%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Norbert%20Slick%20Google%20Map&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48077-cross-site-request-forgery-csrf-in--ed600bf5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48077%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nitinmaurya12%20Block%20Country&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47588-improper-control-of-generation-of-c-fa9ccb57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47588%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20acowebs%20Dynamic%20Pricing%20With%20Discount%20Rules%20for%20WooCommerce&amp;severity=critical&amp;id=690cc7caca26fb4dd2f57a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39468-improper-control-of-filename-for-in-368ce5a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39468%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pantherius%20Modal%20Survey&amp;severity=critical&amp;id=690cc7caca26fb4dd2f57a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39467-path-traversal-in-mikado-themes-wan-02bfd5d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39467%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Mikado-Themes%20Wanderland&amp;severity=critical&amp;id=690cc7c9ca26fb4dd2f57a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39466-improper-control-of-filename-for-in-8ffe6ee4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39466%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20D%C3%B8r&amp;severity=critical&amp;id=690cc7c9ca26fb4dd2f57a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39465-missing-authorization-in-flippercod-20f09185</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39465%3A%20Missing%20Authorization%20in%20flippercode%20Advanced%20Google%20Maps&amp;severity=high&amp;id=690cc7c9ca26fb4dd2f57a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39463-improper-control-of-filename-for-in-94f6103a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39463%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Dessau&amp;severity=critical&amp;id=690cc7c9ca26fb4dd2f57a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32222-improper-control-of-generation-of-c-12513e85</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32222%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Widgetlogic.org%20Widget%20Logic&amp;severity=critical&amp;id=690cc7c9ca26fb4dd2f57a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31029-improper-neutralization-of-input-du-9cc9d3dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31029%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bingu%20replyMail&amp;severity=medium&amp;id=690cc7c9ca26fb4dd2f57a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28953-improper-neutralization-of-special--edba27f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28953%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20axiomthemes%20smart%20SEO&amp;severity=high&amp;id=690cc7c9ca26fb4dd2f57a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22288-path-traversal-in-wpmu-dev-your-all-cd6b88d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22288%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Smush%20Image%20Compression%20and%20Optimization&amp;severity=medium&amp;id=690cc7c9ca26fb4dd2f57a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-hack-chatgpt-memories-and-web-search-f-157f1281</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Hack%20ChatGPT%20Memories%20and%20Web%20Search%20Features&amp;severity=medium&amp;id=690cc3ca2a1e959dda36d66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12556-cwe-88-improper-neutralization-of-a-9a433af2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12556%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20IDIS%20ICM%20Viewer&amp;severity=high&amp;id=690cc3e82a1e959dda36da33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trojanized-eset-installers-drop-kalambur-backdoor--7409e011</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trojanized%20ESET%20Installers%20Drop%20Kalambur%20Backdoor%20in%20Phishing%20Attacks%20on%20Ukraine&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leakyinjector-and-leakystealer-duo-hunts-for-crypt-2de545d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeakyInjector%20and%20LeakyStealer%20Duo%20Hunts%20For%20Crypto%20and%20Browser%20History&amp;severity=medium&amp;id=690cbccf2a1e959dda31c62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-new-firewall-attack-exploiting-cve--68eddc4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20New%20Firewall%20Attack%20Exploiting%20CVE-2025-20333%20and%20CVE-2025-20362&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11956-cwe-79-improper-neutralization-of-i-85ad9854</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11956%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proliz%20Software%20Ltd.%20Co.%20OBS%20(Student%20Affairs%20Information%20System)&amp;severity=high&amp;id=690cb9462a1e959dda2bef4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10955-cwe-79-improper-neutralization-of-i-407fe68b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10955%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netcad%20Software%20Inc.%20Netigma&amp;severity=medium&amp;id=690cb9462a1e959dda2bef56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37735-cwe-281-improper-preservation-of-pe-f9688ea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37735%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Elastic%20Kibana&amp;severity=high&amp;id=690cb5652a1e959dda296a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-returns-what-goodies-did-they-bring-9f3bb99b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gootloader%20Returns%3A%20What%20Goodies%20Did%20They%20Bring%3F&amp;severity=medium&amp;id=690cb1e3ad97a06a3c494305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36054-cwe-79-improper-neutralization-of-i-7dba545d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=medium&amp;id=690cb1f4ad97a06a3c497cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandworm-hackers-use-data-wipers-to-disrupt-ukrain-a860235c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sandworm%20hackers%20use%20data%20wipers%20to%20disrupt%20Ukraine&apos;s%20grain%20sector&amp;severity=high&amp;id=690caad5ad97a06a3c439c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rigged-poker-games-schneier-on-security-201e9aef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rigged%20Poker%20Games%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=690caad5ad97a06a3c439c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cavalry-werewolf-hackers-hit-russian-government-or-c9c68d9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cavalry%20Werewolf%20Hackers%20Hit%20Russian%20Government%20Organization%20with%20New%20ShellNET%20Backdoor&amp;severity=medium&amp;id=690ca3d1ad97a06a3c3cb0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evading-elastic-edrs-call-stack-signatures-with-ca-9965f623</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evading%20Elastic%20EDR&apos;s%20call%20stack%20signatures%20with%20call%20gadgets&amp;severity=medium&amp;id=690ca3e8ad97a06a3c3cbf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/follow-pragmatic-interventions-to-keep-agentic-ai--66decd0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Follow%20Pragmatic%20Interventions%20to%20Keep%20Agentic%20AI%20in%20Check&amp;severity=low&amp;id=690c98f748bc5002b4ff8001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defi-protocol-balancer-starts-recovering-funds-sto-e53d6abb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeFi%20Protocol%20Balancer%20Starts%20Recovering%20Funds%20Stolen%20in%20%24128%20Million%20Heist&amp;severity=medium&amp;id=690c91ee48bc5002b4fd58d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nevada-ransomware-attack-started-months-before-it--10bd6374</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nevada%20Ransomware%20Attack%20Started%20Months%20Before%20It%20Was%20Discovered%2C%20Per%20Report&amp;severity=medium&amp;id=690c8e7448bc5002b4fc803b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-tools-in-malware-botnets-gd-4a8a37eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Tools%20in%20Malware%2C%20Botnets%2C%20GDI%20Flaws%2C%20Election%20Attacks%20%26%20More&amp;severity=medium&amp;id=690eb03c3a8fd010ecf2003b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-are-the-best-practices-for-reducing-ecommerce-7c11e0af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20are%20the%20best%20practices%20for%20reducing%20ecommerce%20payment%20fraud%3F&amp;severity=medium&amp;id=690c876b48bc5002b4faf504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automotive-it-firm-hyundai-autoever-discloses-data-f4ca9aec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automotive%20IT%20Firm%20Hyundai%20AutoEver%20Discloses%20Data%20Breach&amp;severity=medium&amp;id=690c83de48bc5002b4fa1dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-acrobat-2020-end-of-life-06829c29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Acrobat%202020%20End%20of%20Life&amp;severity=medium&amp;id=690c796c48bc5002b4f627d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-contact--a8856138</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Contact%20Center%20Appliance&amp;severity=critical&amp;id=690c795248bc5002b4f619ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-windows-hyper-v-to-hide-linux-vm-d997c4d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20Windows%20Hyper-V%20to%20Hide%20Linux%20VM%20and%20Evade%20EDR%20Detection&amp;severity=high&amp;id=690c796c48bc5002b4f627d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-chatgpt-security-bugs-allow-rampant-data--397f2d9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20ChatGPT%20Security%20Bugs%20Allow%20Rampant%20Data%20Theft&amp;severity=low&amp;id=690c724d48bc5002b4f026d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/state-sponsored-hackers-stole-sonicwall-cloud-back-bf5ab30c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=State-Sponsored%20Hackers%20Stole%20SonicWall%20Cloud%20Backups%20in%20Recent%20Attack&amp;severity=medium&amp;id=690c727448bc5002b4f05843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fedora-linux-41-end-of-life-b92135b8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fedora%20Linux%2041%20End%20of%20Life&amp;severity=medium&amp;id=690c6b4b48bc5002b4e8a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11268-cwe-79-improper-neutralization-of-i-acfd61c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=690c621403d968117476fb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12360-cwe-285-improper-authorization-in-c-71462715</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12360%3A%20CWE-285%20Improper%20Authorization%20in%20codesolz%20Better%20Find%20and%20Replace%20%E2%80%93%20AI-Powered%20Suggestions&amp;severity=medium&amp;id=690c517b03d96811746f9a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-windows-hyper-v-to-hide-linux-vm-2b4db4be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20Windows%20Hyper-V%20to%20Hide%20Linux%20VM%20and%20Evade%20EDR%20Detection&amp;severity=medium&amp;id=690c513803d96811746f64b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10259-cwe-1284-improper-validation-of-spe-008ec737</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10259%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=medium&amp;id=690c4cee03d96811746c8703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12471-cwe-79-improper-neutralization-of-i-f02d371f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12471%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nerdpressteam%20Hubbub%20Lite%20%E2%80%93%20Fast%2C%20free%20social%20sharing%20and%20follow%20buttons&amp;severity=medium&amp;id=690c45e503d96811746b0702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9338-cwe-119-improper-restriction-of-oper-7c577b1c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9338%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ASUS%20Armoury%20Crate&amp;severity=high&amp;id=690c3ee903d9681174680384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-confirms-state-sponsored-hackers-behind--4f512768</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Confirms%20State-Sponsored%20Hackers%20Behind%20September%20Cloud%20Backup%20Breach&amp;severity=medium&amp;id=690c37c603d968117461108a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12560-cwe-918-server-side-request-forgery-be79bb7d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12560%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=690c37e403d968117461160a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11271-cwe-807-reliance-on-untrusted-input-82bf2d88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11271%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=690c27e36cabeda23dacfe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12563-cwe-862-missing-authorization-in-pr-4c17214d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12563%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=690c27e36cabeda23dacfe9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61994-cross-site-scripting-xss-in-growi-i-3781f18c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61994%3A%20Cross-site%20scripting%20(XSS)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=690c245f6cabeda23da8ace4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10691-cwe-352-cross-site-request-forgery--b7fcb326</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10691%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yudiz%20Easy%20Email%20Subscription&amp;severity=medium&amp;id=690c1959fd0d6d226485656f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10683-cwe-89-improper-neutralization-of-s-632e66d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10683%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20yudiz%20Easy%20Email%20Subscription&amp;severity=medium&amp;id=690c0ec4fd0d6d226483c9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/binary-breadcrumbs-correlating-malware-samples-wit-85dde6fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Nov%205th)&amp;severity=medium&amp;id=690c09dcfd0d6d2264828491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-bronze-butler-exploits-zero-day-to-root-japan--8a6c8023</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20&apos;Bronze%20Butler&apos;%20Exploits%20Zero-Day%20to%20Root%20Japan%20Orgs&amp;severity=critical&amp;id=690c042bfd0d6d22647d78f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-malware-is-back-with-new-tricks-after-7-0fcc26c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gootloader%20malware%20is%20back%20with%20new%20tricks%20after%207-month%20break&amp;severity=high&amp;id=690bebb6fd0d6d226463faa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64171-cwe-862-missing-authorization-in-3s-ce6d0c03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64171%3A%20CWE-862%3A%20Missing%20Authorization%20in%203scale-sre%20marin3r&amp;severity=high&amp;id=690bef58fd0d6d2264685b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hyundai-autoever-america-data-breach-exposes-ssns--4993b304</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hyundai%20AutoEver%20America%20data%20breach%20exposes%20SSNs%2C%20drivers%20licenses&amp;severity=high&amp;id=690be821fd0d6d22645fbcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-06-83c82901</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-06&amp;severity=medium&amp;id=690d3944c99da72cbe1ff26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63551-na-83e9aa6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63551%3A%20n%2Fa&amp;severity=high&amp;id=690cfba3e0be39967232b9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60541-na-6e2eb37d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60541%3A%20n%2Fa&amp;severity=high&amp;id=690cfba3e0be39967232b9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27919-na-7e2ea11d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27919%3A%20n%2Fa&amp;severity=high&amp;id=690cd9af1c9f718888294817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27918-na-c2275be1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27918%3A%20n%2Fa&amp;severity=critical&amp;id=690cd9af1c9f718888294813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27917-na-50d9712d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27917%3A%20n%2Fa&amp;severity=high&amp;id=690cd9af1c9f71888829480e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27916-na-b487ea7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27916%3A%20n%2Fa&amp;severity=high&amp;id=690cd9af1c9f71888829480a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63560-na-db0dd909</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63560%3A%20n%2Fa&amp;severity=high&amp;id=690cd45870ae18879c759e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59396-na-39f3cc84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59396&amp;severity=null&amp;id=690cd0d370ae18879c72e59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63589-na-c11f6a8f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63589%3A%20n%2Fa&amp;severity=high&amp;id=690ccd5c70ae18879c71a8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63588-na-0d89e966</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63588%3A%20n%2Fa&amp;severity=high&amp;id=690ccd5c70ae18879c71a8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63307-na-ecd21af8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63307%3A%20n%2Fa&amp;severity=high&amp;id=690cc9d770ae18879c6de90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59392-na-0b55d9d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59392%3A%20n%2Fa&amp;severity=medium&amp;id=690cc801ca26fb4dd2f593d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64114-cwe-89-improper-neutralization-of-s-c4d85aef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64114%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=690bdff52de49fb2b59d6991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62596-cwe-61-unix-symbolic-link-symlink-f-8855d46f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62596%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20youki-dev%20youki&amp;severity=high&amp;id=690bdc882de49fb2b5990aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-personal-data-and-17000-slack-messag-0b9634fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Steal%20Personal%20Data%20and%2017%2C000%2B%20Slack%20Messages%20in%20Nikkei%20Data%20Breach&amp;severity=high&amp;id=690bdc6f2de49fb2b598fda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62161-cwe-363-race-condition-enabling-lin-20d92f00</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62161%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20youki-dev%20youki&amp;severity=high&amp;id=690bdc882de49fb2b5990a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55278-cwe-613-insufficient-session-expira-569288c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55278%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20DevOps%20Loop&amp;severity=high&amp;id=690bd5375c8b8caf26f32450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nikkei-suffers-breach-via-slack-compromise-bb6c5ccb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nikkei%20Suffers%20Breach%20Via%20Slack%20Compromise&amp;severity=medium&amp;id=690c087afd0d6d22648229e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12779-cwe-497-access-of-sensitive-system--923d280a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12779%3A%20CWE-497%20Access%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Amazon%20Amazon%20WorkSpaces&amp;severity=high&amp;id=690bc2956ab8174a0d403370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/half-of-the-worlds-satellite-traffic-is-unencrypte-74621f21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Half%20of%20the%20world&apos;s%20satellite%20traffic%20is%20unencrypted%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=690bb050976718a7330913ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-uncovers-promptflux-malware-that-uses-gemin-aef26eb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Uncovers%20PROMPTFLUX%20Malware%20That%20Uses%20Gemini%20AI%20to%20Rewrite%20Its%20Code%20Hourly&amp;severity=high&amp;id=690bb027976718a733090a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-pennsylvania-confirms-data-stolen-in-4e808e59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Pennsylvania%20confirms%20data%20stolen%20in%20cyberattack&amp;severity=high&amp;id=690baca3976718a73305f3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-carriers-to-block-spoofed-phone-numbers-in-frau-60eb0d73</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20carriers%20to%20block%20spoofed%20phone%20numbers%20in%20fraud%20crackdown&amp;severity=high&amp;id=690baca3976718a73305f3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-says-state-sponsored-hackers-behind-sept-955116cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20says%20state-sponsored%20hackers%20behind%20September%20security%20breach&amp;severity=high&amp;id=690baca3976718a73305f3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-critical-centos-web-panel-bug-exploi-197deaee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20warns%20of%20critical%20CentOS%20Web%20Panel%20bug%20exploited%20in%20attacks&amp;severity=critical&amp;id=690baca3976718a73305f3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10853-cwe-79-improper-neutralization-of-i-fc4c8e11</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Open%20Banking%20IAM&amp;severity=medium&amp;id=690ba5a1976718a733ff3159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crossed-wires-a-case-study-of-iranian-espionage-an-24932ba3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crossed%20wires%3A%20a%20case%20study%20of%20Iranian%20espionage%20and%20attribution&amp;severity=medium&amp;id=690bc71a5c8b8caf26e670c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5770-cwe-79-improper-neutralization-of-in-c5156c6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=690ba217976718a733fdd256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43418-an-attacker-with-physical-access-to-e81b086e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43418%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690b9d3f5191fb7cf2298936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43000-processing-maliciously-crafted-web--6b2720b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43000%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20macOS&amp;severity=high&amp;id=690b9d3f5191fb7cf2298925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12745-buffer-over-read-in-quickjs-c448c738</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12745%3A%20Buffer%20Over-read%20in%20QuickJS&amp;severity=medium&amp;id=690b9d3f5191fb7cf229892d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11093-cwe-94-improper-control-of-generati-4775beb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11093%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WSO2%20WSO2%20Micro%20Integrator&amp;severity=high&amp;id=690b9d3f5191fb7cf229892a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31954-cwe-598-use-of-get-request-method-w-d55b0736</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31954%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20HCL%20Software%20iAutomate&amp;severity=medium&amp;id=690b99bc5191fb7cf2265e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10907-cwe-434-unrestricted-upload-of-file-8a18c482</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10907%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=690b96345191fb7cf2240254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10713-cwe-611-improper-restriction-of-xml-44cdf70d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10713%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=690b8b09ffac907e5bf4a9f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/severe-react-native-flaw-exposes-developer-systems-39d58deb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Severe%20React%20Native%20Flaw%20Exposes%20Developer%20Systems%20to%20Remote%20Attacks&amp;severity=critical&amp;id=690b83f9ffac907e5beedf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43990-cwe-250-execution-with-unnecessary--0ffefb12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43990%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Command%20Monitor%20(DCM)&amp;severity=high&amp;id=690b877dffac907e5bf1d3b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46366-cwe-256-plaintext-storage-of-a-pass-dbd48aec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46366%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=690b8418ffac907e5bef31c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46424-cwe-1240-use-of-a-cryptographic-pri-96d0647c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46424%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=690b8eb35191fb7cf21e1afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46365-cwe-77-improper-neutralization-of-s-46d00478</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46365%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=690b8eb35191fb7cf21e1af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46364-cwe-269-improper-privilege-manageme-89bb2a81</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46364%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20CloudLin&amp;severity=critical&amp;id=690b8077ffac907e5bea79ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20304-improper-neutralization-of-input-du-a30eaf42</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea7942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20305-insufficient-granularity-of-access--747a5089</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20305%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea7945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20289-improper-neutralization-of-input-du-e5398db0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea793c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20303-improper-neutralization-of-input-du-d904009e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20303%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea793f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45379-cwe-78-improper-neutralization-of-s-5ff8fa05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45379%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=high&amp;id=690b8077ffac907e5bea79b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20377-exposure-of-sensitive-information-t-3dd7dca6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20377%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Packaged%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=690b8077ffac907e5bea79aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20375-unrestricted-upload-of-file-with-da-c7022c7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20375%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=690b8074ffac907e5bea7954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20376-unrestricted-upload-of-file-with-da-a55edaad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20376%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=690b8074ffac907e5bea7957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20374-improper-limitation-of-a-pathname-t-631a67a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20374%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=690b8074ffac907e5bea7951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20358-missing-authentication-for-critical-31c5a58e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20358%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=critical&amp;id=690b8074ffac907e5bea794e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20354-unrestricted-upload-of-file-with-da-8626db6a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20354%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=critical&amp;id=690b8074ffac907e5bea794b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20343-incorrect-comparison-in-cisco-cisco-044c2318</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20343%3A%20Incorrect%20Comparison%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=high&amp;id=690b8074ffac907e5bea7948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30479-cwe-78-improper-neutralization-of-s-2e03a643</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30479%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=high&amp;id=690b8077ffac907e5bea79b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45378-cwe-78-improper-neutralization-of-s-4f87045a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45378%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=critical&amp;id=690b7c74ffac907e5be8d8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/updates-to-domainname-api-wed-nov-5th-eb8b8086</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Updates%20to%20Domainname%20API%2C%20(Wed%2C%20Nov%205th)&amp;severity=low&amp;id=690c09dcfd0d6d2264828494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operational-technology-security-poses-inherent-ris-bfdef819</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operational%20Technology%20Security%20Poses%20Inherent%20Risks%20for%20Manufacturers&amp;severity=medium&amp;id=690c087afd0d6d22648229e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-now-uses-ai-during-execution-to-mutate-and-1b42396b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Now%20Uses%20AI%20During%20Execution%20to%20Mutate%20and%20Collect%20Data%2C%20Google%20Warns&amp;severity=medium&amp;id=690b6efe39a16b4c6e57b6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64459-cwe-89-improper-neutralization-of-s-e82fc809</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64459%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=critical&amp;id=690b6b8d39a16b4c6e53b82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64458-cwe-407-inefficient-algorithmic-com-3038ebb8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64458%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=690b6b8d39a16b4c6e53b829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47151-cwe-843-access-of-resource-using-in-86a1a865</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47151%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Entr&apos;ouvert%20Lasso&amp;severity=critical&amp;id=690b6825eb4434bb4f92e008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46404-cwe-476-null-pointer-dereference-in-6ac4b37c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46404%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Entr&apos;ouvert%20Lasso&amp;severity=high&amp;id=690b6825eb4434bb4f92dfff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46784-cwe-401-improper-release-of-memory--81bc4c36</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46784%3A%20CWE-401%3A%20Improper%20Release%20of%20Memory%20Before%20Removing%20Last%20Reference%20in%20Entr&apos;ouvert%20Lasso&amp;severity=high&amp;id=690b6825eb4434bb4f92e005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46705-cwe-617-reachable-assertion-in-entr-60f19323</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46705%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20Entr&apos;ouvert%20Lasso&amp;severity=high&amp;id=690b6825eb4434bb4f92e002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3125-cwe-434-unrestricted-upload-of-file--e62e4ad0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3125%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=690b6825eb4434bb4f92e00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52602-cwe-359-exposure-of-private-persona-a67db4c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52602%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Software%20BigFix%20Query&amp;severity=medium&amp;id=690b6825eb4434bb4f92e00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-site-takeover-flaw-affects-400k-wordpress-69adb202</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Site%20Takeover%20Flaw%20Affects%20400K%20WordPress%20Sites&amp;severity=critical&amp;id=690c087afd0d6d22648229e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-scattered-spider-exposed-critical-ta-f32fb066</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20Scattered%20Spider%20Exposed%20%E2%80%93%20Critical%20Takeaways%20for%20Cyber%20Defenders&amp;severity=critical&amp;id=690b5d79eb4434bb4f9100eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-chatgpt-vulnerabilities-that-let--29c8ad6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20ChatGPT%20Vulnerabilities%20That%20Let%20Attackers%20Trick%20AI%20Into%20Leaking%20Data&amp;severity=medium&amp;id=690c07d3fd0d6d226481f700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/closing-the-ai-execution-gap-in-cybersecurity-a-ci-900947c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Closing%20the%20AI%20Execution%20Gap%20in%20Cybersecurity%20%E2%80%94%20A%20CISO%20Framework&amp;severity=critical&amp;id=690c087afd0d6d22648229ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/risk-comparable-to-solarwinds-incident-lurks-in-po-1b19016d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Risk%20&apos;Comparable&apos;%20to%20SolarWinds%20Incident%20Lurks%20in%20Popular%20Software%20Update%20Tool&amp;severity=medium&amp;id=690b59f4eb4434bb4f8f9b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/norton-researchers-crack-midnight-ransomware-relea-892c5cc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Norton%20Researchers%20Crack%20Midnight%20Ransomware%2C%20Release%20Free%20Decryptor&amp;severity=medium&amp;id=690b5a12eb4434bb4f8fa0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-cybersecurity-firm-experts-attempted-to-ext-6b6019a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20cybersecurity%20firm%20experts%20attempted%20to%20extort%20five%20U.S.%20companies%20in%202023%20using%20BlackCat%20ransomware%20attacks&amp;severity=medium&amp;id=690b4f71eb4434bb4f8c90e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-10-north-korean-entities-for-launderi-05676a63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%2010%20North%20Korean%20Entities%20for%20Laundering%20%2412.7M%20in%20Crypto%20and%20IT%20Fraud&amp;severity=high&amp;id=690b4f71eb4434bb4f8c90dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mysterious-smudgedserpent-hackers-target-us-policy-804e173f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mysterious%20&apos;SmudgedSerpent&apos;%20Hackers%20Target%20U.S.%20Policy%20Experts%20Amid%20Iran%E2%80%93Israel%20Tensions&amp;severity=high&amp;id=690b4f71eb4434bb4f8c90e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weaponized-military-documents-deliver-advanced-ssh-19fcfce5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weaponized%20Military%20Documents%20Deliver%20Advanced%20SSH-Tor%20Backdoor&amp;severity=medium&amp;id=690bc39f5c8b8caf26e1ed7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dragon-breath-apt-q-27-dimensional-reduc-dc76cc1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Dragon%20Breath%20(APT-Q-27)%3A%20Dimensional%20Reduction%20Attack%20Against%20the%20Gambling%20Industry&amp;severity=medium&amp;id=690bc39f5c8b8caf26e1ed95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-peek-a-baku-silent-lynx-apt-targets-dush-1e3d9910</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Peek-a-Baku%3A%20Silent%20Lynx%20APT%20Targets%20Dushanbe%20with%20Espionage%20Campaign&amp;severity=medium&amp;id=690bc2866ab8174a0d402f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky-new-android-malware-takes-over-your-phone-h-884285ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Sneaky%22%20new%20Android%20malware%20takes%20over%20your%20phone%2C%20hiding%20in%20fake%20news%20and%20ID%20apps&amp;severity=medium&amp;id=690bc2866ab8174a0d402f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-data-reveals-credentials-and-misconfigurations-3dfc23db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%20Data%20Reveals%20Credentials%20and%20Misconfigurations%20Behind%20Most%20Cloud%20Breaches&amp;severity=medium&amp;id=690b44e5eb4434bb4f8a7ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-an-attacker-drained-128m-from-balancer-through-905af0c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20an%20Attacker%20Drained%20%24128M%20from%20Balancer%20Through%20Rounding%20Error%20Exploitation&amp;severity=medium&amp;id=690b3f8ceb4434bb4f895c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-the-open-android-ecosystem-with-samsung-k-962b8fa9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20the%20Open%20Android%20Ecosystem%20with%20Samsung%20Knox&amp;severity=critical&amp;id=690b3e49eb4434bb4f89372a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-post-smtp-plugin-flaw-exposes-wordpress--0a03d9b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20%E2%80%98Post%20SMTP%E2%80%99%20Plugin%20Flaw%20Exposes%20WordPress%20Sites%20to%20Takeover&amp;severity=critical&amp;id=690b3f66eb4434bb4f8958fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11745-cwe-80-improper-neutralization-of-s-c0995e57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11745%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20spacetime%20Ad%20Inserter%20%E2%80%93%20Ad%20Manager%20%26%20AdSense%20Ads&amp;severity=medium&amp;id=690b36fdeb4434bb4f874748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12497-cwe-98-improper-control-of-filename-d347b1e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12497%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20averta%20Premium%20Portfolio%20Features%20for%20Phlox%20theme&amp;severity=high&amp;id=690b36fdeb4434bb4f87474d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nikkei-says-17000-impacted-by-data-breach-stemming-5bda1a32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nikkei%20Says%2017%2C000%20Impacted%20by%20Data%20Breach%20Stemming%20From%20Slack%20Account%20Hack&amp;severity=medium&amp;id=690b36cfeb4434bb4f873567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-flaws-allowed-attackers-to-fake-id-fc1857f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20Flaws%20Allowed%20Attackers%20to%20Fake%20Identities%20and%20Rewrite%20Chats&amp;severity=medium&amp;id=690b36eceb4434bb4f8736fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mysterious-smudgedserpent-hackers-target-us-policy-ce236eef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mysterious%20&apos;SmudgedSerpent&apos;%20Hackers%20Target%20U.S.%20Policy%20Experts%20Amid%20Iran%E2%80%93Israel%20Tensions&amp;severity=medium&amp;id=690b3e49eb4434bb4f89372d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-10-north-korean-entities-for-launderi-c686582c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%2010%20North%20Korean%20Entities%20for%20Laundering%20%2412.7M%20in%20Crypto%20and%20IT%20Fraud&amp;severity=medium&amp;id=690b3e49eb4434bb4f893730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elusive-iranian-apt-phishes-influential-us-policy--c9c6d00b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran&apos;s%20Elusive%20%26quot%3BSmudgedSerpent&apos;%20APT%20Phishes%20Influential%20US%20Policy%20Wonks&amp;severity=medium&amp;id=690b21b3eb4434bb4f7b0c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dragonforce-cartel-scattered-spider-at-the-gat-8b44e587</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20DragonForce%20Cartel%3A%20Scattered%20Spider%20at%20the%20gate&amp;severity=medium&amp;id=690dba651280f279b842fd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasion-and-persistence-via-hidden-hyper-v-virtual-ecf418b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasion%20and%20Persistence%20via%20Hidden%20Hyper-V%20Virtual%20Machines&amp;severity=medium&amp;id=690b1bc097eccd90738774a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12192-cwe-697-incorrect-comparison-in-ste-a2759a8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12192%3A%20CWE-697%20Incorrect%20Comparison%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=690b1bd197eccd907387bdc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12469-cwe-862-missing-authorization-in-am-7780dbfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12469%3A%20CWE-862%20Missing%20Authorization%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=690b1bd197eccd907387bdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11987-cwe-80-improper-neutralization-of-s-61a054bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11987%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20brechtvds%20Visual%20Link%20Preview&amp;severity=medium&amp;id=690b1bd197eccd907387bdbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12468-cwe-200-exposure-of-sensitive-infor-c909e088</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12468%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=690b1bd197eccd907387bdc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11820-cwe-79-improper-neutralization-of-i-a06dcbfc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20Graphina%20%E2%80%93%20Charts%20and%20Graphs%20For%20Elementor&amp;severity=medium&amp;id=690b1bd197eccd907387bdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58337-cwe-284-improper-access-control-in--2e3abcdf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58337%3A%20CWE-284%20Improper%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Doris-MCP-Server&amp;severity=medium&amp;id=690b1bd197eccd907387bdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55108-cwe-306-missing-authentication-for--6d680f41</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55108%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=690b184397eccd90738383be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-north-korean-bankers-accused-of-laund-7250c556</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Sanctions%20North%20Korean%20Bankers%20Accused%20of%20Laundering%20Stolen%20Cryptocurrency&amp;severity=medium&amp;id=690b0b5580abb2a1204aa5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/update-on-attacks-by-threat-group-apt-c-60-952bb079</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Update%20on%20Attacks%20by%20Threat%20Group%20APT-C-60&amp;severity=medium&amp;id=690b113e97eccd907379bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10622-client-side-enforcement-of-server-s-93f89c5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10622%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20The%20Foreman%20Foreman&amp;severity=high&amp;id=690b0215da9019f6f2715678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12675-cwe-862-missing-authorization-in-my-d4ddb8e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12675%3A%20CWE-862%20Missing%20Authorization%20in%20mykiot%20KiotViet%20Sync&amp;severity=medium&amp;id=690afea4da9019f6f26cbdf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12676-cwe-259-use-of-hard-coded-password--8cf4c833</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12676%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20mykiot%20KiotViet%20Sync&amp;severity=medium&amp;id=690afea4da9019f6f26cbdf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12674-cwe-434-unrestricted-upload-of-file-e0d702d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12674%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mykiot%20KiotViet%20Sync&amp;severity=critical&amp;id=690afea4da9019f6f26cbded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12677-cwe-200-exposure-of-sensitive-infor-109f049b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12677%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mykiot%20KiotViet%20Sync&amp;severity=medium&amp;id=690afea4da9019f6f26cbdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-cwp-vulnerability-exploited-in-the-w-922135ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20CWP%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=690afe86da9019f6f26c8926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12384-cwe-862-missing-authorization-in-bp-9a5a8015</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12384%3A%20CWE-862%20Missing%20Authorization%20in%20bplugins%20Document%20Embedder%20%E2%80%93%20Embed%20PDFs%2C%20Word%2C%20Excel%2C%20and%20Other%20Files&amp;severity=high&amp;id=690af19c063e7c5f011fbd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12388-cwe-918-server-side-request-forgery-ec85e019</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12388%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20Carousel%20Block%20%E2%80%93%20Responsive%20Image%20and%20Content%20Carousel&amp;severity=medium&amp;id=690af19c063e7c5f011fbd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11373-cwe-862-missing-authorization-in-av-b6d09c97</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11373%3A%20CWE-862%20Missing%20Authorization%20in%20averta%20Depicter%20%E2%80%94%20Popup%20%26%20Slider%20Builder&amp;severity=medium&amp;id=690af19c063e7c5f011fbd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12139-cwe-200-exposure-of-sensitive-infor-6173f7dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12139%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20princeahmed%20File%20Manager%20for%20Google%20Drive%20%E2%80%93%20Integrate%20Google%20Drive&amp;severity=high&amp;id=690af19c063e7c5f011fbd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11917-cwe-918-server-side-request-forgery-02412c73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11917%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20etruel%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=690af19c063e7c5f011fbd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62225-unquoted-search-path-or-element-in--4cd70736</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62225%3A%20Unquoted%20search%20path%20or%20element%20in%20Sony%20Corporation%20Optical%20Disc%20Archive%20Software%20(for%20Windows)&amp;severity=medium&amp;id=690aee14063e7c5f011b583c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64151-unquoted-search-path-or-element-in--d5fe30df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64151%3A%20Unquoted%20search%20path%20or%20element%20in%20Roboticsware%20PTE.%20LTD.%20FA-Panel6&amp;severity=medium&amp;id=690aee14063e7c5f011b5840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-gladinet-and-cwp-flaws-to-kev-catalog-am-5549eefd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Gladinet%20and%20CWP%20Flaws%20to%20KEV%20Catalog%20Amid%20Active%20Exploitation%20Evidence&amp;severity=low&amp;id=690b3e49eb4434bb4f893736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6027-cwe-287-improper-authentication-in-a-d055708d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6027%3A%20CWE-287%20Improper%20Authentication%20in%20Ace%20User%20Management&amp;severity=medium&amp;id=690aea9b063e7c5f0116da7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11072-cwe-22-improper-limitation-of-a-pat-bbfb67ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11072%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MelAbu%20WP%20Download%20Counter%20Button&amp;severity=medium&amp;id=690aea9b063e7c5f0116da7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10873-cwe-862-missing-authorization-in-el-c9eeb523</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10873%3A%20CWE-862%20Missing%20Authorization%20in%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=690aea9b063e7c5f0116da77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10567-cwe-79-cross-site-scripting-xss-in--358fe4a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10567%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20FunnelKit&amp;severity=medium&amp;id=690aea9b063e7c5f0116da74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21079-cwe-20-improper-input-validation-in-0a36b1d8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21079%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Members&amp;severity=high&amp;id=690aed84063e7c5f011b288f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21078-cwe-330-use-of-insufficiently-rando-177cbcdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21078%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=690aed84063e7c5f011b288c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21077-cwe-20-improper-input-validation-in-6ed562bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21077%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Email&amp;severity=low&amp;id=690aed84063e7c5f011b2889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21076-cwe-280-improper-handling-of-insuff-717d2266</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21076%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=medium&amp;id=690aed84063e7c5f011b2886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21075-cwe-787-out-of-bounds-write-in-sams-4f55802f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21075%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b2883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21074-cwe-125-out-of-bounds-read-in-samsu-af1dd65b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21074%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b2880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21073-cwe-1188-initialization-of-a-resour-c6204bed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21073%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b287d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21071-cwe-787-out-of-bounds-write-in-sams-f87e8197</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21071%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b287a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11749-cwe-200-exposure-of-sensitive-infor-fe07229e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11749%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=critical&amp;id=690ae4c4c336e58df48942bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12197-cwe-89-improper-neutralization-of-s-0832a5ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12197%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=high&amp;id=690ad7c644b7a50adeab69d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11162-cwe-79-improper-neutralization-of-i-82aa9a01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11162%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Spectra%20Gutenberg%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=medium&amp;id=690ad7c644b7a50adeab69d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11835-cwe-862-missing-authorization-in-co-96368cfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11835%3A%20CWE-862%20Missing%20Authorization%20in%20cozmoslabs%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=medium&amp;id=690ac97016b8dcb1e3eaa161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12580-cwe-79-improper-neutralization-of-i-8fe84616</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12580%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stanleychoi%20SMS%20for%20WordPress&amp;severity=medium&amp;id=690ac97016b8dcb1e3eaa165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12582-cwe-862-missing-authorization-in-kl-e96adf4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12582%3A%20CWE-862%20Missing%20Authorization%20in%20klicher%20Features&amp;severity=medium&amp;id=690abee616b8dcb1e3e916b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8871-cwe-502-deserialization-of-untrusted-e8b62189</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8871%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=medium&amp;id=690abee616b8dcb1e3e916b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-debuts-httptroy-backdoor-against-south-kor-900fb401</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Debuts%20HTTPTroy%20Backdoor%20Against%20South%20Korea%20Users&amp;severity=medium&amp;id=690ab0c616b8dcb1e3e1b7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12735-cwe-94-improper-control-of-generati-0c7d97f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12735%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(%E2%80%98Code%20Injection%E2%80%99)%20in%20silentmatt%20expr-eval&amp;severity=critical&amp;id=690a9bd016b8dcb1e3c928b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-05-c6186166</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-05&amp;severity=medium&amp;id=690be6ed2de49fb2b5a3549b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60784-na-331b7120</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60784%3A%20n%2Fa&amp;severity=medium&amp;id=690bb7fc6ab8174a0d369d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63585-na-d53a6dc5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63585%3A%20n%2Fa&amp;severity=medium&amp;id=690bb4796ab8174a0d3511e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63334-na-ccb46fe7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63334%3A%20n%2Fa&amp;severity=critical&amp;id=690bacf6976718a73306413d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55343-na-371d7a9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55343%3A%20n%2Fa&amp;severity=critical&amp;id=690ba5a1976718a733ff315c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63418-na-f95bcbfb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63418%3A%20n%2Fa&amp;severity=medium&amp;id=690ba1a5976718a733fd90e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63417-na-17b6d5d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63417%3A%20n%2Fa&amp;severity=high&amp;id=690ba1a5976718a733fd90dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55342-na-ea66e506</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55342%3A%20n%2Fa&amp;severity=medium&amp;id=690ba1a5976718a733fd90d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55341-na-215677d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55341%3A%20n%2Fa&amp;severity=medium&amp;id=690ba1a5976718a733fd90d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63416-na-4e575f93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63416%3A%20n%2Fa&amp;severity=critical&amp;id=690b9d3f5191fb7cf2298939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56232-na-c990d8c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56232%3A%20n%2Fa&amp;severity=medium&amp;id=690b99bc5191fb7cf2265e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56231-na-c46b039d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56231%3A%20n%2Fa&amp;severity=critical&amp;id=690b96345191fb7cf2240257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59716-na-6c6d933d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59716%3A%20n%2Fa&amp;severity=medium&amp;id=690b8eb35191fb7cf21e1afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57244-na-b9f9dc02</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57244%3A%20n%2Fa&amp;severity=medium&amp;id=690b8077ffac907e5bea79c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61304-na-914aa049</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61304%3A%20n%2Fa&amp;severity=critical&amp;id=690b7c74ffac907e5be8d906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63248-na-cfe63466</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63248%3A%20n%2Fa&amp;severity=high&amp;id=690b7c74ffac907e5be8d902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57130-na-cc37a31f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57130%3A%20n%2Fa&amp;severity=high&amp;id=690b78ebf80d35c469c0bdfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63601-na-2f1b09d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63601%3A%20n%2Fa&amp;severity=critical&amp;id=690b728e39a16b4c6e598be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60753-na-1872e9fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60753%3A%20n%2Fa&amp;severity=medium&amp;id=690b728e39a16b4c6e598bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61084-na-e5356601</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61084%3A%20n%2Fa&amp;severity=high&amp;id=690b648deb4434bb4f926ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privilege-escalation-with-jupyter-from-the-command-448f6782</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privilege%20Escalation%20With%20Jupyter%20From%20the%20Command%20Line&amp;severity=medium&amp;id=690a860e327a9365e25838e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59596-vulnerability-in-absolute-security--4b9ad083</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59596%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=690a8612327a9365e25841c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59595-vulnerability-in-absolute-secure-ac-0ba87216</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59595%3A%20Vulnerability%20in%20Absolute%20Secure%20Access&amp;severity=high&amp;id=690a8612327a9365e25841c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62722-cwe-79-improper-neutralization-of-i-4d71fd61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=690a8287327a9365e253b11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62721-cwe-200-exposure-of-sensitive-infor-991f470e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62721%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=690a797a9e609817bf7d764b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62720-cwe-200-exposure-of-sensitive-infor-56ba6c79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62720%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=690a797a9e609817bf7d7646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62719-cwe-918-server-side-request-forgery-b375642d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62719%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=low&amp;id=690a797a9e609817bf7d7650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54526-cwe-121-in-fuji-electric-monitouch--7dc27291</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54526%3A%20CWE-121%20in%20Fuji%20Electric%20Monitouch%20V-SFT-6&amp;severity=high&amp;id=690a75ef9e609817bf78f742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62715-cwe-79-improper-neutralization-of-i-e7a6157e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62715%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=690a75ef9e609817bf78f747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54496-cwe-122-in-fuji-electric-monitouch--1275230b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54496%3A%20CWE-122%20in%20Fuji%20Electric%20Monitouch%20V-SFT-6&amp;severity=high&amp;id=690a75ef9e609817bf78f73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-hackers-use-linux-vms-to-hide-in-windo-99a7df5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20Hackers%20Use%20Linux%20VMs%20to%20Hide%20in%20Windows&amp;severity=medium&amp;id=690ab78416b8dcb1e3e7ac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-makes-ransomware-groups-successful-88bc6609</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20Makes%20Ransomware%20Groups%20Successful%3F&amp;severity=medium&amp;id=690c087afd0d6d22648229f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62369-cwe-94-improper-control-of-generati-aaa8e03d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62369%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20xibosignage%20xibo-cms&amp;severity=high&amp;id=690a75ef9e609817bf78f74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europe-sees-increase-in-ransomware-extortion-attac-d9ac7400</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europe%20Sees%20Increase%20in%20Ransomware%2C%20Extortion%20Attacks&amp;severity=medium&amp;id=690ab78416b8dcb1e3e7ac9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32786-cwe-89-improper-neutralization-of-s-e05e06b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32786%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=high&amp;id=690a624d4499e136c2117c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-expands-chrome-autofill-to-passports-and-li-6582b47e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Expands%20Chrome%20Autofill%20to%20Passports%20and%20Licenses&amp;severity=medium&amp;id=690a5c32a730e5a3d9e111d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23358-cwe-427-uncontrolled-search-path-el-7b1ad387</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23358%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20NVApp&amp;severity=high&amp;id=690a5c46a730e5a3d9e13c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33176-cwe-923-improper-restriction-of-com-a6e091a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33176%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20NVIDIA%20RunAI&amp;severity=medium&amp;id=690a5c46a730e5a3d9e13c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12108-cwe-306-missing-authentication-for--826d6506</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12108%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Survision%20License%20Plate%20Recognition%20Camera&amp;severity=critical&amp;id=690a4c012a90255b94d06938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64322-cwe-732-incorrect-permission-assign-404be1b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64322%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Salesforce%20Agentforce%20Vibes%20Extension&amp;severity=medium&amp;id=690a4c012a90255b94d0693b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64321-cwe-1427-improper-neutralization-of-bbfb7838</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64321%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Agentforce%20Vibes%20Extension&amp;severity=medium&amp;id=690a47346d939959c8021a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64320-cwe-1427-improper-neutralization-of-d5f8887c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64320%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Agentforce%20Vibes%20Extension&amp;severity=medium&amp;id=690a47346d939959c8021a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64319-cwe-732-incorrect-permission-assign-8b79e7c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64319%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Salesforce%20Mulesoft%20Anypoint%20Code%20Builder&amp;severity=medium&amp;id=690a47346d939959c8021a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sesameop-backdoor-abused-openai-assistants-api-9692d3fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SesameOp%20Backdoor%20Abused%20OpenAI%20Assistants%20API%20for%20Remote%20Access&amp;severity=medium&amp;id=690a470b6d939959c801f032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64318-cwe-1427-improper-neutralization-of-6268ed80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64318%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Mulesoft%20Anypoint%20Code%20Builder&amp;severity=medium&amp;id=690a47346d939959c8021a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10875-cwe-1427-improper-neutralization-of-4f2a929e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10875%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Mulesoft%20Anypoint%20Code%20Builder&amp;severity=medium&amp;id=690a439b6d939959c8fdd563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cybercrime-merger-like-no-other-scattered-spider-d6040d7f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Cybercrime%20Merger%20Like%20No%20Other%20%E2%80%94%20Scattered%20Spider%2C%20LAPSUS%24%2C%20and%20ShinyHunters%20Join%20Forces&amp;severity=medium&amp;id=690ab65816b8dcb1e3e70732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react-native-cli-flaw-exposed-millions-of-1dddc1ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React%20Native%20CLI%20Flaw%20Exposed%20Millions%20of%20Developers%20to%20Remote%20Attacks&amp;severity=critical&amp;id=690a2eb5f0ba78a05054882d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61956-cwe-306-missing-authentication-for--0e27e1b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61956%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Radiometrics%20VizAir&amp;severity=critical&amp;id=690a2ddcf0ba78a050535a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54863-cwe-522-insufficiently-protected-cr-d009cf59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54863%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Radiometrics%20VizAir&amp;severity=critical&amp;id=690a2ddcf0ba78a050535a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61945-cwe-306-missing-authentication-for--6f9507e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61945%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Radiometrics%20VizAir&amp;severity=critical&amp;id=690a2ddcf0ba78a050535a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaw-in-popular-react-native-npm-package--699bd2c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaw%20in%20Popular%20React%20Native%20NPM%20Package%20Exposes%20Developers%20to%20Attacks&amp;severity=critical&amp;id=690a279c93114d0ef5c88a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-and-eurojust-dismantle-600-million-crypto--1ebaae11</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Authorities%20Dismantle%20%E2%82%AC600%20Million%20Crypto%20Fraud%20Network%20in%20Global%20Sweep&amp;severity=medium&amp;id=690ab65816b8dcb1e3e70735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-court-delivers-split-verdict-in-getty-images-vs-06e52db2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Court%20Delivers%20Split%20Verdict%20in%20Getty%20Images%20vs.%20Stability%20AI%20Image%20Generation%20Case&amp;severity=medium&amp;id=690a21d69fe43a2ba317e0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transportation-companies-hacked-to-steal-cargo-ec32d741</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transportation%20Companies%20Hacked%20to%20Steal%20Cargo&amp;severity=medium&amp;id=690a141d5ba1a6c630003dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sesameop-backdoor-uses-openai-api-for-covert-c2-43d711a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SesameOp%20Backdoor%20Uses%20OpenAI%20API%20for%20Covert%20C2&amp;severity=medium&amp;id=690ab78416b8dcb1e3e7ac9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12184-cwe-79-improper-neutralization-of-i-15675e7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12184%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rboatright%20MeetingList&amp;severity=medium&amp;id=690a109f5ba1a6c630faf34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react-native-cli-flaw-exposed-millions-of-ec4faa00</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React%20Native%20CLI%20Flaw%20Exposed%20Millions%20of%20Developers%20to%20Remote%20Attacks&amp;severity=critical&amp;id=690ab65816b8dcb1e3e70738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/built-slopguard-open-source-defense-against-ai-sup-6a0b4cbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Built%20SlopGuard%20-%20open-source%20defense%20against%20AI%20supply%20chain%20attacks%20(slopsquatting)&amp;severity=medium&amp;id=690a0cc4dc8910934c489e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-bugs-let-attackers-impersonate-col-6f82070b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20Bugs%20Let%20Attackers%20Impersonate%20Colleagues%20and%20Edit%20Messages%20Unnoticed&amp;severity=low&amp;id=690ab65816b8dcb1e3e7073b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploiting-microsoft-teams-impersonation-and-spoof-1c2977ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploiting%20Microsoft%20Teams%3A%20Impersonation%20and%20Spoofing%20Vulnerabilities%20Exposed&amp;severity=medium&amp;id=690a05e9dc8910934c3e995c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-skycloak-deploys-tor-enabled-openssh-bac-14ab2e8a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20SkyCloak%20Deploys%20Tor-Enabled%20OpenSSH%20Backdoor%20Targeting%20Defense%20Sectors&amp;severity=high&amp;id=690a05b8dc8910934c3e5e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-targeting-payroll-sites-schneier-on-09694e90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Targeting%20Payroll%20Sites%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=690a05b8dc8910934c3e5e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12682-cwe-434-unrestricted-upload-of-file-baa0401b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12682%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20fahadmahmood%20Easy%20Upload%20Files%20During%20Checkout&amp;severity=critical&amp;id=690a05dfdc8910934c3e7291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sesameop-malware-abuses-openai-api-f0490f88</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SesameOp%20Malware%20Abuses%20OpenAI%20API&amp;severity=medium&amp;id=690a022cdc8910934c3b3175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12695-cwe-653-improper-isolation-or-compa-25cbba3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12695%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization&amp;severity=medium&amp;id=690a0152dc8910934c3a8e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41345-cwe-862-missing-authorization-in-ca-9f5279a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41345%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0154dc8910934c3a8ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41344-cwe-862-missing-authorization-in-ca-aef247af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41344%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0154dc8910934c3a8ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41343-cwe-862-missing-authorization-in-ca-a475d37f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41343%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41342-cwe-862-missing-authorization-in-ca-1e825907</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41342%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41341-cwe-862-missing-authorization-in-ca-161acb57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41341%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41340-cwe-862-missing-authorization-in-ca-b10a2dbd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41340%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41339-cwe-862-missing-authorization-in-ca-6d15d4ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41339%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41338-cwe-862-missing-authorization-in-ca-35acb405</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41338%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41337-cwe-862-missing-authorization-in-ca-81f4a027</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41337%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41336-cwe-862-missing-authorization-in-ca-043bc7ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41336%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41335-cwe-862-missing-authorization-in-ca-7d24dd40</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41335%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41114-cwe-862-missing-authorization-in-ca-9579beab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41114%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41113-cwe-862-missing-authorization-in-ca-101956ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41113%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41112-cwe-862-missing-authorization-in-ca-a098abd4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41112%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41111-cwe-862-missing-authorization-in-ca-3cc0cc50</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41111%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-kernel-bluetooth-rce-b5dd106f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20kernel%20Bluetooth%20RCE&amp;severity=medium&amp;id=6909f5293cfa4baba4ba3922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-everything-again-tue-nov-4th-c9a84d18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Everything%2C%20Again%2C%20(Tue%2C%20Nov%204th)&amp;severity=medium&amp;id=6909eef84c0d499dad8661a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12045-cwe-79-improper-neutralization-of-i-1695383c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%3A%20Duplicate%20Page%2C%20Menu%20Icons%2C%20SVG%20Support%2C%20Cookie%20Notice%2C%20Custom%20Fonts%20%26%20More&amp;severity=medium&amp;id=6909e325e8d08963ed86c4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12493-cwe-22-improper-limitation-of-a-pat-643653c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12493%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=critical&amp;id=6909e325e8d08963ed86c4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-19-webkit-vulnerabilities-f0859c76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%2019%20WebKit%20Vulnerabilities&amp;severity=critical&amp;id=6909df99e8d08963ed81a71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-defense-using-the-wazuh-open-source-pla-bcf2478f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Defense%20Using%20the%20Wazuh%20Open%20Source%20Platform&amp;severity=critical&amp;id=690ab65816b8dcb1e3e7073e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-target-cisco-aka-firewalls-in-5d7d4cbb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Target%20Cisco%20AKA%20Firewalls%20in%20Global%20Campaign&amp;severity=medium&amp;id=6909dfbae8d08963ed81b70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-critical-auth-bypass-flaw-in-jobmo-e6cf9407</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%20critical%20auth%20bypass%20flaw%20in%20JobMonster%20WordPress%20theme&amp;severity=critical&amp;id=6909dc1ce8d08963ed7c7750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-ai-big-sleep-finds-5-new-vulnerabilities-i-78d4b758</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google&apos;s%20AI%20&apos;Big%20Sleep&apos;%20Finds%205%20New%20Vulnerabilities%20in%20Apple&apos;s%20Safari%20WebKit&amp;severity=high&amp;id=6909dc1ce8d08963ed7c7754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11690-cwe-639-authorization-bypass-throug-d15b640e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11690%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CFMOTO%20RIDE&amp;severity=high&amp;id=6909e7104c0d499dad7bcb28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-update-patches-critical-remote-code-execut-ce5bdd09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Update%20Patches%20Critical%20Remote%20Code%20Execution%20Flaw&amp;severity=critical&amp;id=6909c74a70fe4617e5489145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-rondodox-v2-a-650-expansion-in-exploi-e48b1077</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Research%3A%20RondoDox%20v2%2C%20a%20650%25%20Expansion%20in%20Exploits&amp;severity=high&amp;id=6909c3cf70fe4617e5439bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-ai-big-sleep-finds-5-new-vulnerabilities-i-6f5b6b43</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%E2%80%99s%20AI%20%E2%80%98Big%20Sleep%E2%80%99%20Finds%205%20New%20Vulnerabilities%20in%20Apple%E2%80%99s%20Safari%20WebKit&amp;severity=low&amp;id=690ab65816b8dcb1e3e70744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-prosecutors-indict-cybersecurity-insiders-accus-59419f37</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Prosecutors%20Indict%20Cybersecurity%20Insiders%20Accused%20of%20BlackCat%20Ransomware%20Attacks&amp;severity=medium&amp;id=690ab65816b8dcb1e3e70747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20749-cwe-121-stack-overflow-in-mediatek--438230a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20749%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6789%2C%20MT6835%2C%20MT6855%2C%20MT6878%2C%20MT6879%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8169%2C%20MT8188%2C%20MT8195%2C%20MT8196%2C%20MT8781%2C%20MT8796&amp;severity=medium&amp;id=6909a1aad66f5e62e3849366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20748-cwe-120-classic-buffer-overflow-in--d33fdbff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20748%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1aad66f5e62e3849363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20741-cwe-122-heap-overflow-in-mediatek-i-cdbbc0c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20741%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20747-cwe-121-stack-overflow-in-mediatek--c40c5745</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20747%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2737%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6982%2C%20MT6985%2C%20MT6986%2C%20MT6986D%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8893&amp;severity=medium&amp;id=6909a1aad66f5e62e3849360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20746-cwe-121-stack-overflow-in-mediatek--4e3cda7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20746%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2737%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6982%2C%20MT6985%2C%20MT6986%2C%20MT6986D%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8893&amp;severity=medium&amp;id=6909a1aad66f5e62e384935d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20739-cwe-121-stack-overflow-in-mediatek--e40d2999</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20739%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e384933d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20738-cwe-121-stack-overflow-in-mediatek--fb568ac8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20738%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e384933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20736-cwe-121-stack-overflow-in-mediatek--11309f57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20736%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20734-cwe-122-heap-overflow-in-mediatek-i-f6d54018</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20734%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20732-cwe-121-stack-overflow-in-mediatek--3f48bd90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20732%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20731-cwe-122-heap-overflow-in-mediatek-i-c67fed31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20731%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20729-cwe-122-heap-overflow-in-mediatek-i-4617cb59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20729%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20745-cwe-416-use-after-free-in-mediatek--cc8d5f57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20745%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6989%2C%20MT6991%2C%20MT8370%2C%20MT8390%2C%20MT8395%2C%20MT8676%2C%20MT8678%2C%20MT87920&amp;severity=medium&amp;id=6909a1aad66f5e62e384935a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20744-cwe-416-use-after-free-in-mediatek--b04c33cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20744%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6899%2C%20MT6991%2C%20MT8793&amp;severity=medium&amp;id=6909a1a8d66f5e62e384934c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20743-cwe-416-use-after-free-in-mediatek--64d01756</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20743%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6853%2C%20MT6877%2C%20MT6886%2C%20MT6893%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6989%2C%20MT6991%2C%20MT8113%2C%20MT8163%2C%20MT8168%2C%20MT8169%2C%20MT8183%2C%20MT8186%2C%20MT8188%2C%20MT8195%2C%20MT8196%2C%20MT8321%2C%20MT8365%2C%20MT8385%2C%20MT8390%2C%20MT8391%2C%20MT8512%2C%20MT8516%2C%20MT8519%2C%20MT8676%2C%20MT8678%2C%20MT8695%2C%20MT8696%2C%20MT8698%2C%20MT8755%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8775%2C%20MT8781%2C%20MT8786%2C%20MT8788E%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8796%2C%20MT8797%2C%20MT8798%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20742-cwe-122-heap-overflow-in-mediatek-i-ee1f26e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20742%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7603%2C%20MT7615%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a8d66f5e62e3849346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20740-cwe-367-time-of-check-time-of-use-t-88025ee1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20740%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20737-cwe-121-stack-overflow-in-mediatek--04e7e2b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20737%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a8d66f5e62e3849337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20735-cwe-122-heap-overflow-in-mediatek-i-41ff93ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20735%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a8d66f5e62e3849331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20733-cwe-122-heap-overflow-in-mediatek-i-6d764ad7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20733%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20730-cwe-287-improper-authentication-gen-cbbdd504</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20730%3A%20CWE-287%20Improper%20Authentication%20-%20Generic%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8188%2C%20MT8195%2C%20MT8676%2C%20MT8678%2C%20MT8696&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20728-cwe-122-heap-overflow-in-mediatek-i-1a9ce91d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20728%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20725-cwe-787-out-of-bounds-write-in-medi-8495b48c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20725%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8893&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20726-cwe-122-heap-overflow-in-mediatek-i-1bac505a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20726%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20727-cwe-787-out-of-bounds-write-in-medi-6035c779</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20727%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-detects-sesameop-backdoor-using-openais--d47f3fc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Detects%20%22SesameOp%22%20Backdoor%20Using%20OpenAI&apos;s%20API%20as%20a%20Stealth%20Command%20Channel&amp;severity=medium&amp;id=690ab65816b8dcb1e3e7074a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12396-cwe-79-improper-neutralization-of-i-15a9f062</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alaminopu%20clubmember&amp;severity=medium&amp;id=690984dd2b77ca42b4883ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11812-cwe-79-improper-neutralization-of-i-1625327f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11812%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redq%20Reuse%20Builder&amp;severity=medium&amp;id=690984dc2b77ca42b4883e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12403-cwe-352-cross-site-request-forgery--0d584639</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12403%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20revokee%20Associados%20Amazon%20Plugin&amp;severity=medium&amp;id=690984df2b77ca42b4883f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11753-cwe-79-improper-neutralization-of-i-ec78f777</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20augustinfotech%20Bootstrap%20Multi-language%20Responsive%20Portfolio&amp;severity=medium&amp;id=690984dc2b77ca42b4883e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12158-cwe-862-missing-authorization-in-ta-2fe2b264</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12158%3A%20CWE-862%20Missing%20Authorization%20in%20tanvirahmed1984%20Simple%20User%20Capabilities&amp;severity=critical&amp;id=690984dd2b77ca42b4883eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12452-cwe-352-cross-site-request-forgery--3e87e22d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12452%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bestiadurmiente%20Visit%20Counter&amp;severity=medium&amp;id=690984df2b77ca42b4883f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11733-cwe-79-improper-neutralization-of-i-4cb98692</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11733%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lumiblog%20Footnotes%20Made%20Easy&amp;severity=high&amp;id=690984dc2b77ca42b4883e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12065-cwe-79-improper-neutralization-of-i-b41a83f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12065%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carticon%20WP%20Carticon&amp;severity=medium&amp;id=690984dc2b77ca42b4883e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12371-cwe-79-improper-neutralization-of-i-28b67e58</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12371%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shakhi%20Nari%20Accountant&amp;severity=medium&amp;id=690984dd2b77ca42b4883ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12389-cwe-862-missing-authorization-in-si-343301a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12389%3A%20CWE-862%20Missing%20Authorization%20in%20sidngr%20Import%20Export%20For%20WooCommerce&amp;severity=medium&amp;id=690984dd2b77ca42b4883ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11704-cwe-98-improper-control-of-filename-f32ca2a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11704%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20impacttechlab%20Elegance%20Menu&amp;severity=high&amp;id=690984dc2b77ca42b4883e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12402-cwe-352-cross-site-request-forgery--c2554007</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12402%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bondnono%20LinkedIn%20Resume&amp;severity=medium&amp;id=690984df2b77ca42b4883f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12415-cwe-352-cross-site-request-forgery--25cf328f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12415%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sugiartha%20MapMap&amp;severity=medium&amp;id=690984df2b77ca42b4883f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12156-cwe-862-missing-authorization-in-ai-93b4bb65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12156%3A%20CWE-862%20Missing%20Authorization%20in%20aitool%20Ai%20Auto%20Tool%20Content%20Writing%20Assistant%20(Gemini%20Writer%2C%20ChatGPT%20)%20All%20in%20One&amp;severity=medium&amp;id=690984dc2b77ca42b4883e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11724-cwe-434-unrestricted-upload-of-file-ef8932f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11724%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20erinmorelli%20EM%20Beer%20Manager&amp;severity=high&amp;id=690984dc2b77ca42b4883e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12456-cwe-352-cross-site-request-forgery--11a483dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12456%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20centangle%20Centangle-Team&amp;severity=medium&amp;id=690984df2b77ca42b4883f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12400-cwe-352-cross-site-request-forgery--659d65b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12400%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lmbbox%20LMB%5EBox%20Smileys&amp;severity=medium&amp;id=690984dd2b77ca42b4883ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12369-cwe-79-improper-neutralization-of-i-f6dea0bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20Extensions%20for%20Leaflet%20Map&amp;severity=medium&amp;id=690984dd2b77ca42b4883ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11890-cwe-862-missing-authorization-in-be-b605ee21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11890%3A%20CWE-862%20Missing%20Authorization%20in%20beycanpress%20Crypto%20Payment%20Gateway%20with%20Payeer%20for%20WooCommerce&amp;severity=high&amp;id=690984dc2b77ca42b4883e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12157-cwe-862-missing-authorization-in-ta-5993750b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12157%3A%20CWE-862%20Missing%20Authorization%20in%20tanvirahmed1984%20Simple%20User%20Capabilities&amp;severity=medium&amp;id=690984dd2b77ca42b4883ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12410-cwe-352-cross-site-request-forgery--2ac2930d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20samhoamt%20SH%20Contextual%20Help&amp;severity=medium&amp;id=690984df2b77ca42b4883f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11758-cwe-862-missing-authorization-in-co-193596ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11758%3A%20CWE-862%20Missing%20Authorization%20in%20codebangers%20All%20in%20One%20Time%20Clock%20Lite%20%E2%80%93%20Tracking%20Employee%20Time%20Has%20Never%20Been%20Easier&amp;severity=medium&amp;id=690984dc2b77ca42b4883e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12413-cwe-352-cross-site-request-forgery--0e8136c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12413%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20socialmedialtd%20WPCF7%20Stop%20words&amp;severity=medium&amp;id=690984df2b77ca42b4883f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12350-cwe-862-missing-authorization-in-do-31a2cbcb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12350%3A%20CWE-862%20Missing%20Authorization%20in%20domiinodev%20DominoKit&amp;severity=medium&amp;id=690984dd2b77ca42b4883eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12393-cwe-79-improper-neutralization-of-i-a160cc62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12393%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kris_iv%20Free%20Quotation&amp;severity=medium&amp;id=690984dd2b77ca42b4883ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12416-cwe-352-cross-site-request-forgery--e8545de3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12416%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mahype%20Pagerank%20tools&amp;severity=medium&amp;id=690984df2b77ca42b4883f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10896-cwe-862-missing-authorization-in-li-df13c3ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10896%3A%20CWE-862%20Missing%20Authorization%20in%20litonice13%20Image%20Comparison%20Addon%20for%20Elementor&amp;severity=high&amp;id=690984dc2b77ca42b4883e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12412-cwe-352-cross-site-request-forgery--b164eb2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12412%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20josereyev%20Top%20Bar%20Notification&amp;severity=medium&amp;id=690984df2b77ca42b4883f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12188-cwe-352-cross-site-request-forgery--d883b447</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12188%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmasterscom%20Posts%20Navigation%20Links%20for%20Sections%20and%20Headings%20%E2%80%93%20Free%20by%20WP%20Masters&amp;severity=medium&amp;id=690984dd2b77ca42b4883eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12683-cwe-269-improper-privilege-manageme-edb2ef75</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12683%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Voidtools%20Everything&amp;severity=medium&amp;id=690984df2b77ca42b4883f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12069-cwe-352-cross-site-request-forgery--de9046bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12069%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stiand%20WP%20Global%20Screen%20Options&amp;severity=medium&amp;id=690977bf78d4f574c2b12d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11008-cwe-532-insertion-of-sensitive-info-28ecf379</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11008%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20ce21com%20CE21%20Suite&amp;severity=critical&amp;id=690977bf78d4f574c2b12d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12401-cwe-352-cross-site-request-forgery--85553ba1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12401%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theode%20Label%20Plugins&amp;severity=medium&amp;id=690977bf78d4f574c2b12d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11007-cwe-306-missing-authentication-for--e3e5c925</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11007%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ce21com%20CE21%20Suite&amp;severity=critical&amp;id=690977bf78d4f574c2b12d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47370-cwe-617-reachable-assertion-in-qual-fec8b16c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47370%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=690977c178d4f574c2b12d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47368-cwe-126-buffer-over-read-in-qualcom-0981403a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47368%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47367-cwe-787-out-of-bounds-write-in-qual-b405118e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47367%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47365-cwe-190-integer-overflow-or-wraparo-dd773da3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47365%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47362-cwe-126-buffer-over-read-in-qualcom-9339dc64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47362%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=690977c178d4f574c2b12d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47361-cwe-129-improper-validation-of-arra-240c3273</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47361%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47360-cwe-121-stack-based-buffer-overflow-398239f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47360%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47357-cwe-306-missing-authentication-for--4ab003cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47357%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47353-cwe-749-exposed-dangerous-method-or-53d18303</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47353%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47352-cwe-129-improper-validation-of-arra-f29d1643</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47352%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27074-cwe-131-incorrect-calculation-of-bu-fc3b18fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27074%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27070-cwe-787-out-of-bounds-write-in-qual-871c271b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27070%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27064-cwe-126-buffer-over-read-in-qualcom-e9a43067</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27064%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=690977bf78d4f574c2b12d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12324-cwe-79-improper-neutralization-of-i-dcbad306</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=69096d2c78d4f574c2addf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11841-cwe-79-improper-neutralization-of-i-d567fe19</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=690977c178d4f574c2b12d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43373-an-app-may-be-able-to-cause-unexpec-4bc9b8ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43373%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69095ba678d4f574c2a8f232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43365-an-unprivileged-process-may-be-able-eba39b95</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43365%3A%20An%20unprivileged%20process%20may%20be%20able%20to%20terminate%20a%20root%20processes%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095ba678d4f574c2a8f22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43430-processing-maliciously-crafted-web--735a3a18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43430%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43426-an-app-may-be-able-to-access-sensit-abab13f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43426%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bad78d4f574c2a8f36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43390-an-app-may-be-able-to-access-user-s-e0add798</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43390%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43447-an-app-may-be-able-to-cause-unexpec-569d0d0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43447%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43502-an-app-may-be-able-to-bypass-certai-9ec435d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43502%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bb578d4f574c2a8f60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43386-processing-a-maliciously-crafted-me-722e128e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43386%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba878d4f574c2a8f273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43345-an-app-may-be-able-to-access-sensit-d2d2f51f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43345%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43493-visiting-a-malicious-website-may-le-bc46f72e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43493%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43387-a-malicious-app-may-be-able-to-gain-aaeeba9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43387%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69095ba878d4f574c2a8f278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43411-an-app-may-be-able-to-access-user-s-7b1b4f11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43411%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43446-an-app-may-be-able-to-modify-protec-9ace1888</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43446%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43503-visiting-a-malicious-website-may-le-7c70c6e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43503%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20user%20interface%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb578d4f574c2a8f60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43450-an-app-may-be-able-to-learn-informa-d7e40151</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43450%3A%20An%20app%20may%20be%20able%20to%20learn%20information%20about%20the%20current%20camera%20view%20before%20being%20granted%20camera%20access%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb078d4f574c2a8f443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43391-an-app-may-be-able-to-access-sensit-f717a638</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43391%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43407-an-app-may-be-able-to-break-out-of--cf59ee3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43407%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43309-an-attacker-with-physical-access-to-b78c54a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43309%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20view%20notification%20contents%20from%20the%20Lock%20Screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095ba578d4f574c2a8f1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43427-processing-maliciously-crafted-web--45fc93ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43427%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43431-processing-maliciously-crafted-web--50dbdc94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43431%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bad78d4f574c2a8f385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43348-an-app-may-bypass-gatekeeper-checks-7b4dd2c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43348%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43364-an-app-may-be-able-to-break-out-of--7d8e67bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43364%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69095ba678d4f574c2a8f22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43396-a-sandboxed-app-may-be-able-to-acce-4f6b5798</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43396%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43379-an-app-may-be-able-to-access-protec-e38634ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43379%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43457-processing-maliciously-crafted-web--4926b968</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43457%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb078d4f574c2a8f451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43441-processing-maliciously-crafted-web--defb4887</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43441%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43504-a-user-in-a-privileged-network-posi-274839b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43504%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69095bb578d4f574c2a8f615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43338-processing-a-maliciously-crafted-me-afd3f74e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43338%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba578d4f574c2a8f1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43380-parsing-a-file-may-lead-to-an-unexp-9eb224cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43380%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43288-an-app-may-be-able-to-bypass-privac-4d60b0d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43288%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43322-an-app-may-be-able-to-access-user-s-b6de3793</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43322%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43334-an-app-may-be-able-to-access-user-s-1ace3175</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43334%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43436-an-app-may-be-able-to-enumerate-a-u-0115c8ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43436%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bae78d4f574c2a8f3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43420-an-app-may-be-able-to-access-sensit-0d11cfa7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43420%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43498-an-app-may-be-able-to-access-sensit-9ce3ab2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43498%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43477-an-app-may-be-able-to-access-sensit-8ece605b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43477%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43499-an-app-may-be-able-to-access-sensit-c1b1a890</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43499%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43476-an-app-may-be-able-to-break-out-of--b8a24997</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43476%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43421-processing-maliciously-crafted-web--8ea7616d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43421%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bab78d4f574c2a8f349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43460-an-attacker-with-physical-access-to-01f312e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43460%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43335-an-app-may-be-able-to-access-user-s-e0c72b08</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43335%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43323-an-app-may-be-able-to-fingerprint-t-cc391836</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43323%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba578d4f574c2a8f1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43495-an-app-may-be-able-to-monitor-keyst-06188090</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43495%3A%20An%20app%20may%20be%20able%20to%20monitor%20keystrokes%20without%20user%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43440-processing-maliciously-crafted-web--c1d9efbc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43440%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43505-processing-a-maliciously-crafted-fi-c49b40d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43505%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20heap%20corruption%20in%20Apple%20Xcode&amp;severity=high&amp;id=69095bb578d4f574c2a8f618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43397-an-app-may-be-able-to-cause-a-denia-b0d5a61a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43397%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43378-an-app-may-be-able-to-access-sensit-d2a0d093</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43378%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43401-a-remote-attacker-may-be-able-to-ca-6e76160f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43401%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43479-an-app-may-be-able-to-access-sensit-90e66f13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43479%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43496-remote-content-may-be-loaded-even-w-bd90f5cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43496%3A%20Remote%20content%20may%20be%20loaded%20even%20when%20the%20&apos;Load%20Remote%20Images&apos;%20setting%20is%20turned%20off%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb378d4f574c2a8f4b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43438-processing-maliciously-crafted-web--c548a4ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43438%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43480-a-malicious-website-may-exfiltrate--bd49eea7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43480%3A%20A%20malicious%20website%20may%20exfiltrate%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bb378d4f574c2a8f4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43382-an-app-may-be-able-to-access-sensit-c1c687aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43382%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43414-a-shortcut-may-be-able-to-access-fi-24a5759b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43414%3A%20A%20shortcut%20may%20be%20able%20to%20access%20files%20that%20are%20normally%20inaccessible%20to%20the%20Shortcuts%20app%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43443-processing-maliciously-crafted-web--11eda922</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43443%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43455-a-malicious-app-may-be-able-to-take-32210236</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43455%3A%20A%20malicious%20app%20may%20be%20able%20to%20take%20a%20screenshot%20of%20sensitive%20information%20in%20embedded%20views%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43394-an-app-may-be-able-to-access-protec-9032b479</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43394%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43422-an-attacker-with-physical-access-to-0d378202</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43422%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20disable%20Stolen%20Device%20Protection%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43434-processing-maliciously-crafted-web--36051cd1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43434%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43361-a-malicious-app-may-be-able-to-read-e62b1bff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43361%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba678d4f574c2a8f223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43336-an-app-with-root-privileges-may-be--32e63968</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43336%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43459-an-attacker-with-physical-access-to-d33ab445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43459%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20Apple%20Watch%20may%20be%20able%20to%20view%20Live%20Voicemail%20in%20Apple%20watchOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43377-an-app-may-be-able-to-cause-a-denia-a70f117e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43377%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43398-an-app-may-be-able-to-cause-unexpec-ef0b0a78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43398%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43376-a-remote-attacker-may-be-able-to-vi-bf1ceb44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43376%3A%20A%20remote%20attacker%20may%20be%20able%20to%20view%20leaked%20DNS%20queries%20with%20Private%20Relay%20turned%20on%20in%20Apple%20Safari&amp;severity=high&amp;id=69095ba678d4f574c2a8f236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43399-an-app-may-be-able-to-access-protec-e14673ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43399%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43458-processing-maliciously-crafted-web--6ed0773a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43458%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb178d4f574c2a8f466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43360-password-fields-may-be-unintentiona-40ac4262</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43360%3A%20Password%20fields%20may%20be%20unintentionally%20revealed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43419-processing-maliciously-crafted-web--4a4e258a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43419%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bab78d4f574c2a8f33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43462-an-app-may-be-able-to-cause-unexpec-63ba2b38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43462%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43435-processing-maliciously-crafted-web--80440aad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43435%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43423-an-attacker-with-physical-access-to-ff82e867</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43423%3A%20An%20attacker%20with%20physical%20access%20to%20an%20unlocked%20device%20paired%20with%20a%20Mac%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20system%20logging%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095bad78d4f574c2a8f35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43474-an-app-may-be-able-to-cause-unexpec-d5ad011c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43474%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43395-an-app-may-be-able-to-access-protec-d53947d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43395%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=69095baa78d4f574c2a8f2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43454-a-device-may-persistently-fail-to-l-f8b6b380</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43454%3A%20A%20device%20may%20persistently%20fail%20to%20lock%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb078d4f574c2a8f449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43507-an-app-may-be-able-to-fingerprint-t-6b367eb5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43507%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb578d4f574c2a8f61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43442-an-app-may-be-able-to-identify-what-221cc050</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43442%3A%20An%20app%20may%20be%20able%20to%20identify%20what%20other%20apps%20a%20user%20has%20installed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095bae78d4f574c2a8f400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43383-processing-a-maliciously-crafted-me-033de638</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43383%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43481-an-app-may-be-able-to-break-out-of--104b51e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43481%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43439-an-app-may-be-able-to-fingerprint-t-1c171731</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43439%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43478-an-app-may-be-able-to-cause-unexpec-a085dad9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43478%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43424-a-malicious-hid-device-may-cause-an-86a5a865</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43424%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bad78d4f574c2a8f364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43432-processing-maliciously-crafted-web--7b912960</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43432%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43449-a-malicious-app-may-be-able-to-trac-816aa556</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43449%3A%20A%20malicious%20app%20may%20be%20able%20to%20track%20users%20between%20installs%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb078d4f574c2a8f440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43408-an-attacker-with-physical-access-ma-57c5dd11</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43408%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20access%20contacts%20from%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=low&amp;id=69095bab78d4f574c2a8f323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43469-an-app-may-be-able-to-access-sensit-778a9a8f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43469%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43384-processing-a-maliciously-crafted-me-b9c38480</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43384%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43412-an-app-may-be-able-to-break-out-of--165a8cad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43412%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43500-an-app-may-be-able-to-access-sensit-ad815492</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43500%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb378d4f574c2a8f4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43445-processing-a-maliciously-crafted-me-74c16cea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43445%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43392-a-website-may-exfiltrate-image-data-46a25dc7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43392%3A%20A%20website%20may%20exfiltrate%20image%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43405-an-app-may-be-able-to-access-user-s-a6d3f8df</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43405%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43452-keyboard-suggestions-may-display-se-b6d18d9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43452%3A%20Keyboard%20suggestions%20may%20display%20sensitive%20information%20on%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43444-an-app-may-be-able-to-fingerprint-t-e10381b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43444%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bae78d4f574c2a8f40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43413-a-sandboxed-app-may-be-able-to-obse-2c34eb4d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43413%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20observe%20system-wide%20network%20connections%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bab78d4f574c2a8f332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43385-processing-a-maliciously-crafted-me-6cfdca7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43385%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43468-an-app-may-be-able-to-access-sensit-5c13ac4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43468%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43429-processing-maliciously-crafted-web--24196af0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43429%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43350-an-attacker-may-be-able-to-view-res-9a51e3c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43350%3A%20An%20attacker%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095ba678d4f574c2a8f21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43409-an-app-may-be-able-to-access-sensit-f2743abc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43409%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43448-an-app-may-be-able-to-break-out-of--3c65c86b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43448%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43389-an-app-may-be-able-to-access-sensit-ebe3133b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43389%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43433-processing-maliciously-crafted-web--068db1c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43433%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bad78d4f574c2a8f393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43425-processing-maliciously-crafted-web--6664d6e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43425%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43472-an-app-may-be-able-to-gain-root-pri-b768dc49</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43472%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35021-cwe-1188-insecure-default-initializ-4494496b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35021%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Abilis%20CPX&amp;severity=medium&amp;id=69094d8778d4f574c2794f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-04-fbd6dafe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-04&amp;severity=medium&amp;id=690a982816b8dcb1e3c3e05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56230-na-d157d9d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56230%3A%20n%2Fa&amp;severity=high&amp;id=690a75ef9e609817bf78f74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27374-na-99cb7080</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27374%3A%20n%2Fa&amp;severity=medium&amp;id=690a6cce4499e136c21ec516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52910-na-6a9dae74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52910%3A%20n%2Fa&amp;severity=critical&amp;id=690a694c4499e136c21a9bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54335-na-a24684c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54335%3A%20n%2Fa&amp;severity=medium&amp;id=690a65c74499e136c215e603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56426-na-4aab81d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56426%3A%20n%2Fa&amp;severity=high&amp;id=690a624d4499e136c2117c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49494-na-09d9c60e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49494%3A%20n%2Fa&amp;severity=high&amp;id=690a5fc6a730e5a3d9e580e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54327-na-098914ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54327%3A%20n%2Fa&amp;severity=medium&amp;id=690a58b2a730e5a3d9dc1464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61431-na-21e6f0e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61431%3A%20n%2Fa&amp;severity=medium&amp;id=690a53132a90255b94da5743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52512-na-ef3e7358</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52512%3A%20n%2Fa&amp;severity=high&amp;id=690a47346d939959c8021a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54334-na-54255b4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54334%3A%20n%2Fa&amp;severity=high&amp;id=690a439b6d939959c8fdd56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52513-na-1b4d5861</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52513%3A%20n%2Fa&amp;severity=high&amp;id=690a439b6d939959c8fdd566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54325-na-0dddca44</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54325%3A%20n%2Fa&amp;severity=medium&amp;id=690a40ddff58c9332ff73d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54333-na-47a07cc1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54333%3A%20n%2Fa&amp;severity=medium&amp;id=690a3d63ff58c9332ff26cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54332-na-32ed6a3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54332%3A%20n%2Fa&amp;severity=high&amp;id=690a323af0ba78a050599551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54331-na-7fb65d35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54331%3A%20n%2Fa&amp;severity=medium&amp;id=690a323af0ba78a050599547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54323-na-ec2018af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54323%3A%20n%2Fa&amp;severity=high&amp;id=690a2ec3f0ba78a05054a163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60925-na-6c65a3a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60925%3A%20n%2Fa&amp;severity=medium&amp;id=690a2ddcf0ba78a050535a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54330-na-f448294a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54330%3A%20n%2Fa&amp;severity=medium&amp;id=690a2ddcf0ba78a050535a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54329-na-b369ae1b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54329%3A%20n%2Fa&amp;severity=high&amp;id=690a2ddcf0ba78a050535a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63294-na-857c890a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63294%3A%20n%2Fa&amp;severity=medium&amp;id=690a1e549fe43a2ba3125a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/research-unvalidated-trust-cross-stage-failure-mod-a3df6706</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BResearch%5D%20Unvalidated%20Trust%3A%20Cross-Stage%20Failure%20Modes%20in%20LLM%2Fagent%20pipelines%20arXiv&amp;severity=medium&amp;id=6909438ca63c015b1ad8e1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-mutes-alerts-drains-crypto-wallets-4af149a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20Mutes%20Alerts%2C%20Drains%20Crypto%20Wallets&amp;severity=medium&amp;id=6909762578d4f574c2b06798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34501-cwe-798-use-of-hard-coded-credentia-b365052b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34501%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%202&amp;severity=high&amp;id=690929a9fe7723195e0fd62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13997-cwe-269-improper-privilege-manageme-8f643a65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13997%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Nagios%20XI&amp;severity=critical&amp;id=690929a9fe7723195e0fd62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13998-cwe-497-exposure-of-sensitive-syste-db841278</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13998%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=medium&amp;id=69092613fe7723195e0b3000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11193-cwe-256-plaintext-storage-of-a-pass-7cb21465</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11193%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Lenovo%20Tab%20M11%20TB330FU%20TB330XU&amp;severity=medium&amp;id=6909227bfe7723195e06123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-142-released-two-high-severity-v8-flaws-fix-a4b8b149</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20142%20Released%3A%20Two%20high-severity%20V8%20flaws%20fixed%2C%20%24100K%20in%20rewards%20paid&amp;severity=high&amp;id=69091dc4c28fd46ded866acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oauth-device-code-phishing-azure-vs-google-compare-d2a0b4f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OAuth%20Device%20Code%20Phishing%3A%20Azure%20vs.%20Google%20Compared&amp;severity=medium&amp;id=69091dc4c28fd46ded866ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-rmm-tools-to-breach-freighters-and-ste-4217769e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20use%20RMM%20tools%20to%20breach%20freighters%20and%20steal%20cargo%20shipments&amp;severity=high&amp;id=69091dc4c28fd46ded866ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36172-cwe-79-improper-neutralization-of-i-666d9f1b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=69091e13c28fd46ded8695da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vsx-extension-sleepyduck-uses-ethereum-t-2ecf319c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VSX%20Extension%20%22SleepyDuck%22%20Uses%20Ethereum%20to%20Keep%20Its%20Command%20Server%20Alive&amp;severity=medium&amp;id=69091dc4c28fd46ded866ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jabber-zeus-developer-mricq-extradited-to-us-from--da3b0f12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jabber%20Zeus%20developer%20%E2%80%98MrICQ%E2%80%99%20extradited%20to%20US%20from%20Italy&amp;severity=medium&amp;id=69091dc4c28fd46ded866ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12657-cwe-754-improper-check-for-unusual--6be44fd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12657%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=69092135fe7723195e0534bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12531-cwe-611-improper-restriction-of-xml-93abefeb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12531%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=690910fe7fff0e30ceee30a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-remote-tools-to-hijack-cargo-fre-dd281088</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=On%20the%20Road%20Again%3A%20Hackers%20Hijack%20Physical%20Cargo%20Freight&amp;severity=medium&amp;id=6909762578d4f574c2b0679b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mssql-exploitation-run-commands-like-a-pro-e8078eb2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MSSQL%20Exploitation%20-%20Run%20Commands%20Like%20A%20Pro&amp;severity=medium&amp;id=6908f876f612d110fea1760c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8558-cwe-306-missing-authentication-for-c-44e25d51</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8558%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Proofpoint%20Insider%20Threat%20Management%20(ITM)%20Server&amp;severity=low&amp;id=6908f874f612d110fea175d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vsx-extension-sleepyduck-uses-ethereum-t-3f858c73</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VSX%20Extension%20%22SleepyDuck%22%20Uses%20Ethereum%20to%20Keep%20Its%20Command%20Server%20Alive&amp;severity=medium&amp;id=6909758c78d4f574c2b04f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dante-spyware-linked-to-rebranded-hacking-team-2e492322</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Dante%20Spyware%20Linked%20to%20Rebranded%20Hacking%20Team%2C%20Now%20Memento%20Labs&amp;severity=medium&amp;id=6908ed3b1c2a0078ae50e584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sniffing-established-ble-connections-with-hackrf-o-1e56d858</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sniffing%20established%20BLE%20connections%20with%20HackRF%20One&amp;severity=low&amp;id=6908e5321c2a0078ae46cf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12463-cwe-89-improper-neutralization-of-s-957135d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12463%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Guetebruck%20G-Cam&amp;severity=critical&amp;id=6908e0dc2caf14b4c6e437c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-extradited-to-us-faces-charges-in-jabber-1ca8013a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Extradited%20to%20US%20Faces%20Charges%20in%20Jabber%20Zeus%20Cybercrime%20Case&amp;severity=medium&amp;id=6908dc622caf14b4c6de9f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10280-cwe-79-improper-neutralization-of-i-80f5396a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10280%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SailPoint%20Technologies%20IdentityIQ&amp;severity=high&amp;id=6908dc732caf14b4c6dea3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11953-cwe-78-improper-neutralization-of-s-8d972ba7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11953%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=6908dc732caf14b4c6dea3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-software-development-teams-can-securely-and-et-07f74eeb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Software%20Development%20Teams%20Can%20Securely%20and%20Ethically%20Deploy%20AI%20Tools&amp;severity=medium&amp;id=6908d4cabdcf00867c5adfcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36093-cwe-602-client-side-enforcement-of--f9b8f397</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36093%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Cloud%20Pak%20For%20Business%20Automation&amp;severity=medium&amp;id=6908d14bbdcf00867c55ae67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36092-cwe-1284-improper-validation-of-spe-e0929f82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36092%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Cloud%20Pak%20For%20Business%20Automation&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36091-cwe-283-unverified-ownership-in-ibm-6047ad88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36091%3A%20CWE-283%20Unverified%20Ownership%20in%20IBM%20Cloud%20Pak%20For%20Business%20Automation&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b466d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11761-cwe-427-uncontrolled-search-path-el-40269164</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11761%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20HP%20Inc%20HP%20Client%20Management%20Script%20Library&amp;severity=high&amp;id=6908ca4cbdcf00867c4b466a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ciso-burnout-epidemic-endemic-or-simply-inevitable-19153d04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISO%20Burnout%20%E2%80%93%20Epidemic%2C%20Endemic%2C%20or%20Simply%20Inevitable%3F&amp;severity=medium&amp;id=6908c44969f0cf13c915470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-access-real-cargo-cybercriminals-targeting--75eab978</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20access%2C%20real%20cargo%3A%20cybercriminals%20targeting%20trucking%20and%20logistics&amp;severity=medium&amp;id=690909ee7fff0e30cee423ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leveraging-generative-ai-to-reverse-engineer-xload-c07d0d8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leveraging%20Generative%20AI%20to%20Reverse%20Engineer%20XLoader&amp;severity=medium&amp;id=690909ee7fff0e30cee423d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8900-cwe-269-improper-privilege-managemen-c576ab7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8900%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Doccure%20Core&amp;severity=critical&amp;id=6908c0d069f0cf13c9121bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xwiki-solrsearch-exploit-attempts-cve-2025-24893-w-ead34534</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWiki%20SolrSearch%20Exploit%20Attempts%20(CVE-2025-24893)%20with%20link%20to%20Chicago%20Gangs%2FRappers%2C%20(Mon%2C%20Nov%203rd)&amp;severity=critical&amp;id=6908bd0532a746b8e5d27d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-v2-when-an-iot-botnet-goes-enterprise-rea-30f5456d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20v2%3A%20When%20an%20IoT%20Botnet%20Goes%20Enterprise-Ready&amp;severity=high&amp;id=6908ba5132a746b8e5cf6041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-peek-a-baku-apt-targets-dushanbe-with-es-d26a9dcd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Peek-a-Baku%3A%20APT%20Targets%20Dushanbe%20with%20Espionage%20Campaign&amp;severity=medium&amp;id=690909ee7fff0e30cee423ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lets-get-physical-a-new-convergence-for-electrical-cc3d7cce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Let&apos;s%20Get%20Physical%3A%20A%20New%20Convergence%20for%20Electrical%20Grid%20Security&amp;severity=medium&amp;id=6908b6c532a746b8e5ca09fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beating-xloader-at-speed-generative-ai-as-a-force--2a64250d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beating%20XLoader%20at%20Speed%3A%20Generative%20AI%20as%20a%20Force%20Multiplier%20for%20Reverse%20Engineering&amp;severity=medium&amp;id=6908b6f832a746b8e5ca6ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-ai-apis-can-be-abused-for-data-exfiltration-033a3ff3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20AI%20APIs%20Can%20Be%20Abused%20for%20Data%20Exfiltration&amp;severity=medium&amp;id=6908af3073fc97d070c66b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-exploit-remote-monitoring-tools-to--69b8ed40</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Exploit%20Remote%20Monitoring%20Tools%20to%20Infiltrate%20Logistics%20and%20Freight%20Networks&amp;severity=medium&amp;id=6908c95e69f0cf13c91d2d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64294-cwe-862-missing-authorization-in-d3-f5919c90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64294%3A%20Missing%20Authorization%20in%20d3wp%20WP%20Snow%20Effect&amp;severity=null&amp;id=6908adda73fc97d070c5c443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12626-path-traversal-in-jeecgboot-jeewx-b-fd2e7bfa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12626%3A%20Path%20Traversal%20in%20jeecgboot%20jeewx-boot&amp;severity=medium&amp;id=6908adda73fc97d070c5c446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-caught-on-video-using-ai-filt-bfff95db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Caught%20on%20Video%20Using%20AI%20Filters%20in%20Fake%20Job%20Interviews&amp;severity=medium&amp;id=6908b6da32a746b8e5ca0bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-httptroy-backdoor-poses-as-vpn-invoice-in-targ-26a1b1fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20HttpTroy%20Backdoor%20Poses%20as%20VPN%20Invoice%20in%20Targeted%20Cyberattack%20on%20South%20Kore&amp;severity=high&amp;id=6908a96c73fc97d070bec004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-bankbot-ynrk-and-deliveryrat-a-86a9412b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20BankBot-YNRK%20and%20DeliveryRAT%20Android%20Trojans%20Stealing%20Financial%20Da&amp;severity=high&amp;id=6908a96c73fc97d070bec008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-lazarus-hits-web3-intelamd-tees-crack-df598cf2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Lazarus%20Hits%20Web3%2C%20Intel%2FAMD%20TEEs%20Cracked%2C%20Dark%20Web%20Leak%20Tool%20%26%20More&amp;severity=medium&amp;id=6908a94c73fc97d070bebaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-developed-code-5-critical-security-checkpoints--58cc4a5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Developed%20Code%3A%205%20Critical%20Security%20Checkpoints%20for%20Human%20Oversight&amp;severity=critical&amp;id=6908aeab73fc97d070c61fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-evolution-of-soc-operations-how-continuous-exp-5f5c0e23</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Evolution%20of%20SOC%20Operations%3A%20How%20Continuous%20Exposure%20Management%20Transforms%20Security%20Operations&amp;severity=medium&amp;id=6908ae0d73fc97d070c5dc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0987-cwe-639-authorization-bypass-through-3b0bdac5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0987%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CB%20Project%20Ltd.%20Co.%20CVLand&amp;severity=critical&amp;id=69089bb7e3f4acb2c352ed70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-rotates-access-tokens-used-in-supply-chai-1f41102a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20rotates%20access%20tokens%20used%20in%20supply-chain%20malware%20attack&amp;severity=high&amp;id=69089836e3f4acb2c34f1b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-jabber-zeus-coder-mricq-in-us-custody-e321b621</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20Jabber%20Zeus%20Coder%20%E2%80%98MrICQ%E2%80%99%20in%20U.S.%20Custody&amp;severity=high&amp;id=69089836e3f4acb2c34f1b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/penn-hacker-claims-to-have-stolen-12-million-donor-1c69e86e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Penn%20hacker%20claims%20to%20have%20stolen%201.2%20million%20donor%20records%20in%20data%20breach&amp;severity=high&amp;id=690894b7e3f4acb2c34ab250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/conduent-january-2025-breach-impacts-10m-people-32ca261b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Conduent%20January%202025%20breach%20impacts%2010M%2B%20people&amp;severity=high&amp;id=690894b7e3f4acb2c34ab254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-bankbot-ynrk-and-deliveryrat-a-9c296903</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20BankBot-YNRK%20and%20DeliveryRAT%20Android%20Trojans%20Stealing%20Financial%20Data&amp;severity=medium&amp;id=6908a0cbe3f4acb2c35b4701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/youtube-ghost-network-spreads-infostealer-via-3000-d38387c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YouTube%20%E2%80%98Ghost%20Network%E2%80%99%20Spreads%20Infostealer%20via%203%2C000%20Fake%20Videos&amp;severity=medium&amp;id=69088dc45abee5c7f3616422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trufflenet-attack-wields-stolen-credentials-agains-962912f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;TruffleNet&apos;%20Attack%20Wields%20Stolen%20Credentials%20Against%20AWS&amp;severity=medium&amp;id=6908c9fc69f0cf13c91d7280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-httptroy-backdoor-poses-as-vpn-invoice-in-targ-ff3cda7c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20HttpTroy%20Backdoor%20Poses%20as%20VPN%20Invoice%20in%20Targeted%20Cyberattack%20on%20South%20Korea&amp;severity=medium&amp;id=69088a3c5abee5c7f35a3e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-uses-airstalk-malware-in-supply-chain--ff5ffaa7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Uses%20%E2%80%98Airstalk%E2%80%99%20Malware%20in%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=690883a67dae335bea13e8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprks-playbook-httptroy-and-new-blindingcan-varian-cc93e7a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK&apos;s%20Playbook%3A%20HttpTroy%20and%20New%20BLINDINGCAN%20Variant&amp;severity=medium&amp;id=69088a4d5abee5c7f35a4fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/certified-oysterloader-tracking-rhysida-ransomware-f37d37ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Certified%20OysterLoader%3A%20Tracking%20Rhysida%20ransomware%20gang%20activity%20via%20code-signing%20certificates&amp;severity=medium&amp;id=69088a4d5abee5c7f35a4dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3rd-november-threat-intelligence-report-0190ee2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3rd%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69087cb87dae335bea0b08dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breaking-down-8-open-source-ai-security-tools-at-b-ad4bf0e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breaking%20Down%208%20Open%20Source%20AI%20Security%20Tools%20at%20Black%20Hat%20Europe%202025%20Arsenal&amp;severity=medium&amp;id=69087ca07dae335bea0b00ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-pays-100000-in-rewards-for-two-chrome-vulne-60950c8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Pays%20%24100%2C000%20in%20Rewards%20for%20Two%20Chrome%20Vulnerabilities&amp;severity=high&amp;id=690872355b1bd484a8c9bf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-writeup-for-what-to-check-when-you-see-fireb-21a1f14d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20writeup%20for%20what%20to%20check%20when%20you%20see%20Firebase%20in%20a%20pentest&amp;severity=medium&amp;id=6908724c5b1bd484a8c9c7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48397-cwe-306-missing-authentication-for--52125ac9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48397%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Eaton%20Eaton%20Brightlayer%20Software%20Suite%20(BLSS)&amp;severity=high&amp;id=6908698d3bb3e250c652e21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12623-authorization-bypass-in-fushengqian-aae4f917</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12623%3A%20Authorization%20Bypass%20in%20fushengqian%20fuint&amp;severity=low&amp;id=690862853bb3e250c648388a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48396-cwe-434-unrestricted-upload-of-file-ea15d9fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48396%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Eaton%20Eaton%20Brightlayer%20Software%20Suite%20(BLSS)&amp;severity=high&amp;id=690862853bb3e250c6483890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12622-buffer-overflow-in-tenda-ac10-891cb438</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12622%3A%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=69085df94b5305b1c0b87d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12619-buffer-overflow-in-tenda-a15-3fd827e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12619%3A%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=high&amp;id=690856ef4b5305b1c0ad521d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12503-cwe-89-improper-neutralization-of-s-9cd40743</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12503%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=high&amp;id=690852be2e0de603d5414690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12618-buffer-overflow-in-tenda-ac8-4178f479</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12618%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=690852be2e0de603d5414694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12617-sql-injection-in-itsourcecode-billi-05c510fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12617%3A%20SQL%20Injection%20in%20itsourcecode%20Billing%20System&amp;severity=medium&amp;id=6908334e257da31884c8b6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12616-insertion-of-sensitive-information--38ef055d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12616%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=69082c50451a199c687e5d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12615-use-of-hard-coded-cryptographic-key-9124d76a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12615%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PHPGurukul%20News%20Portal&amp;severity=low&amp;id=690825a268fbb04b61f1dfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12614-sql-injection-in-sourcecodester-bes-cd12bfac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12614%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=69081ea068fbb04b61f07fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12612-sql-injection-in-campcodes-school-f-e9d7b82d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12612%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=6908179b68fbb04b61ed8a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12611-buffer-overflow-in-tenda-ac21-cd0e66db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12611%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=6908179b68fbb04b61ed8a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12610-sql-injection-in-codeastro-gym-mana-5188a280</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12610%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=69080d0b68fbb04b61e3d3b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12609-sql-injection-in-codeastro-gym-mana-26866042</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12609%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=690805fd68fbb04b61dd3046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12608-sql-injection-in-itsourcecode-onlin-4fbe7188</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12608%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907ffe668fbb04b61d889be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12607-sql-injection-in-itsourcecode-onlin-e16fa7fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12607%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907f80268fbb04b61d3775b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-03-9eab0c1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-03&amp;severity=medium&amp;id=6909437da63c015b1ad88f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63293-na-f346df31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63293%3A%20n%2Fa&amp;severity=medium&amp;id=6909133ec28fd46ded78ba28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50735-na-06b35192</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50735%3A%20n%2Fa&amp;severity=high&amp;id=690909fb7fff0e30cee434ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63593-na-7e95b1d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63593%3A%20n%2Fa&amp;severity=medium&amp;id=6909084f7fff0e30cee234fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63441-na-f9bbf39d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63441%3A%20n%2Fa&amp;severity=high&amp;id=6908d8e12caf14b4c6da1111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50363-na-9cf09b4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50363%3A%20n%2Fa&amp;severity=medium&amp;id=6908d8e12caf14b4c6da110d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60503-na-f4f0c7f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60503%3A%20n%2Fa&amp;severity=high&amp;id=6908d4e3bdcf00867c5ae6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60785-na-257cc4ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60785%3A%20n%2Fa&amp;severity=high&amp;id=6908d4e3bdcf00867c5ae6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63452-na-141833c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63452%3A%20n%2Fa&amp;severity=critical&amp;id=6908d14bbdcf00867c55ae6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63453-na-caa4488b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63453%3A%20n%2Fa&amp;severity=critical&amp;id=6908d14bbdcf00867c55ae6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63449-na-16b61803</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63449%3A%20n%2Fa&amp;severity=medium&amp;id=6908cdd1bdcf00867c4fc665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63451-na-7e18ff7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63451%3A%20n%2Fa&amp;severity=critical&amp;id=6908cdd1bdcf00867c4fc657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63450-na-b43eb49c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63450%3A%20n%2Fa&amp;severity=medium&amp;id=6908cdd1bdcf00867c4fc651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63448-na-a238d6d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63448%3A%20n%2Fa&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63447-na-e1f5113e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63447%3A%20n%2Fa&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63446-na-59bc6720</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63446%3A%20n%2Fa&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63443-na-9ebe62fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63443%3A%20n%2Fa&amp;severity=medium&amp;id=6908c7d269f0cf13c91ad0f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63442-na-dba89a3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63442%3A%20n%2Fa&amp;severity=medium&amp;id=6908c7d269f0cf13c91ad0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60892-na-06710ee9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60892%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c9156063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29699-na-e1ec2e33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29699%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c915605f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51317-na-e3f33d44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51317%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c915605b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45663-na-dd71b373</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45663%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c9156057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12606-sql-injection-in-itsourcecode-onlin-9d0f36f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12606%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907eab77f25edc77b67d006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12605-sql-injection-in-itsourcecode-onlin-ca8361d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12605%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907e56eedf7d393671f50e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/steal-ms-teams-app-cookies-6e3d8e3b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Steal%20MS%20Teams%20app%20cookies&amp;severity=medium&amp;id=6907df7bedf7d393671779e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12604-sql-injection-in-itsourcecode-onlin-2e36bec6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12604%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907cf0ae86687b6d231194c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-port-85308531-tcp-likely-related-to-wsus-21cddef0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20Port%208530%2F8531%20(TCP).%20Likely%20related%20to%20WSUS%20Vulnerability%20CVE-2025-59287%2C%20(Sun%2C%20Nov%202nd)&amp;severity=medium&amp;id=69079dc57eef5c312db38b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/drawn-to-danger-windows-graphics-vulnerabilities-l-4462158f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Drawn%20to%20Danger%3A%20Windows%20Graphics%20Vulnerabilities%20Lead%20to%20Remote%20Code%20Execution%20and%20Memory%20Exposure&amp;severity=critical&amp;id=6907626a2d54209f78d98806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12598-sql-injection-in-sourcecodester-bes-75c9891c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12598%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=69074a3c2c5f3d6573056ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12597-sql-injection-in-sourcecodester-bes-b847db98</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12597%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=6907424c2c5f3d6573fcfe15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12596-buffer-overflow-in-tenda-ac23-c61abae8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12596%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=69073c6d82ffca841a909986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12595-buffer-overflow-in-tenda-ac23-58e3253b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12595%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=69072ecb55f62b0f9af90999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12594-sql-injection-in-code-projects-simp-9ecc3119</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12594%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69071a8adb62f9b0ce09a13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12593-unrestricted-upload-in-code-project-b5b6341c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12593%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6906f96c7ed26d3e679435ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-02-5b3c6ac0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-02&amp;severity=medium&amp;id=6907f3c97f25edc77b73844f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asd-warns-of-ongoing-badcandy-attacks-exploiting-c-205f23af</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASD%20Warns%20of%20Ongoing%20BADCANDY%20Attacks%20Exploiting%20Cisco%20IOS%20XE%20Vulnerability&amp;severity=high&amp;id=69065d1d4f0ef70af711d217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12603-cwe-787-out-of-bounds-write-in-azur-4b111aed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12603%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=69065d944f0ef70af712612d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12602-cwe-787-out-of-bounds-write-in-azur-87667d98</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12602%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=69065d944f0ef70af712611c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12601-cwe-730-denial-of-service-in-azure--b3b372c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12601%3A%20CWE-730%20Denial%20of%20Service%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690657e0fdaff23802df3e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12600-cwe-730-denial-of-service-in-azure--bcd06cc5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12600%3A%20CWE-730%20Denial%20of%20Service%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690657e0fdaff23802df3e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12599-cwe-321-use-of-hard-coded-cryptogra-f6ccf1ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12599%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690657e0fdaff23802df3e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quantifying-swiss-cheese-the-bayesian-way-1c725fad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quantifying%20Swiss%20Cheese%2C%20the%20Bayesian%20Way&amp;severity=high&amp;id=69064fe2bd22b54dd70fbe0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-kurdish-hacktivists-hezi-rash-behind-350-ddos--0cb53e94</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Kurdish%20Hacktivists%20Hezi%20Rash%20Behind%20350%20DDoS%20Attacks%20in%202%20Months&amp;severity=medium&amp;id=690626b8a9f0be756def3e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-source-cve-scanner-for-project-dependencies-v-d4ed9b9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=open%20source%20CVE%20scanner%20for%20project%20dependencies.%20VSCode%20extension.&amp;severity=medium&amp;id=69061c34a9f0be756decfa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asd-warns-of-ongoing-badcandy-attacks-exploiting-c-2a68257e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASD%20Warns%20of%20Ongoing%20BADCANDY%20Attacks%20Exploiting%20Cisco%20IOS%20XE%20Vulnerability&amp;severity=critical&amp;id=6906ae5b4dd0d643165de7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36367-cwe-862-missing-authorization-6422a3cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36367%3A%20CWE-862%20Missing%20Authorization&amp;severity=high&amp;id=6905f7d9b1eaf3d2f0fca9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edr-redir-v2-blind-edr-with-fake-program-files-d6747ad6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EDR-Redir%20V2%3A%20Blind%20EDR%20With%20Fake%20%22Program%20Files%22&amp;severity=medium&amp;id=6905e809d7cf94fba2ea608f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloud-abuse-at-scale-9267025a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloud%20Abuse%20at%20Scale&amp;severity=medium&amp;id=69088a4d5abee5c7f35a4db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australia-warns-of-badcandy-infections-on-unpatche-df32f5a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australia%20warns%20of%20BadCandy%20infections%20on%20unpatched%20Cisco%20devices&amp;severity=high&amp;id=6905d7fe3e4baa1dbaf8b646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/we-got-hacked-emails-threaten-to-leak-university-o-b590b958</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98We%20got%20hacked%E2%80%99%20emails%20threaten%20to%20leak%20University%20of%20Pennsylvania%20data&amp;severity=high&amp;id=6905d7fe3e4baa1dbaf8b63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6988-cwe-79-improper-neutralization-of-in-fb9a778e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hogash%20KALLYAS%20-%20Creative%20eCommerce%20Multi-Purpose%20WordPress%20Theme&amp;severity=medium&amp;id=6905b8c4149d58da8cb27fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6990-cwe-94-improper-control-of-generatio-d8cacd8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6990%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20hogash%20KALLYAS%20-%20Creative%20eCommerce%20Multi-Purpose%20WordPress%20Theme&amp;severity=high&amp;id=6905b8c4149d58da8cb27fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12137-cwe-73-external-control-of-file-nam-26695e57</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12137%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20jcollings%20Import%20WP%20%E2%80%93%20Export%20and%20Import%20CSV%20and%20XML%20files%20to%20WordPress&amp;severity=medium&amp;id=6905ae02e1b1aafea8d7ec85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12171-cwe-434-unrestricted-upload-of-file-bf6d8f39</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12171%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20anthonyeden%20RESTful%20Content%20Syndication&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11755-cwe-434-unrestricted-upload-of-file-f99e3169</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11755%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpdelicious%20WP%20Delicious%20%E2%80%93%20Recipe%20Plugin%20for%20Food%20Bloggers%20(formerly%20Delicious%20Recipes)&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10487-cwe-94-improper-control-of-generati-9184271b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10487%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11499-cwe-434-unrestricted-upload-of-file-6af947e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11499%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20essekia%20Tablesome%20Table%20%E2%80%93%20Contact%20Form%20DB%20%E2%80%93%20WPForms%2C%20CF7%2C%20Gravity%2C%20Forminator%2C%20Fluent&amp;severity=critical&amp;id=6905ae02e1b1aafea8d7ec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6574-cwe-639-authorization-bypass-through-d6c582b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6574%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11502-cwe-79-improper-neutralization-of-i-cc3eaefa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11740-cwe-89-improper-neutralization-of-s-818a25b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11740%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12038-cwe-863-incorrect-authorization-in--edb88ace</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12038%3A%20CWE-863%20Incorrect%20Authorization%20in%20wpfolderly%20Folderly&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11983-cwe-200-exposure-of-sensitive-infor-20804bb1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11983%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20scossar%20WP%20Discourse&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12090-cwe-79-improper-neutralization-of-i-7bb2e7a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12090%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Employee%20Spotlight%20%E2%80%93%20Team%20Member%20Showcase%20%26%20Meet%20the%20Team%20Plugin&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12180-cwe-862-missing-authorization-in-qo-1a4778eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12180%3A%20CWE-862%20Missing%20Authorization%20in%20qodeinteractive%20Qi%20Blocks&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11927-cwe-79-improper-neutralization-of-i-af727743</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11927%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gijo%20Flying%20Images%3A%20Optimize%20and%20Lazy%20Load%20Images%20for%20Faster%20Page%20Speed&amp;severity=medium&amp;id=69058f8066e0c23159a8ccf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5949-cwe-639-authorization-bypass-through-fde58663</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5949%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=high&amp;id=69058f8066e0c23159a8cd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12118-cwe-79-improper-neutralization-of-i-52fe8b11</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevingillispie%20Schema%20Scalpel&amp;severity=medium&amp;id=69058f8066e0c23159a8ccff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11995-cwe-79-improper-neutralization-of-i-fc09cd7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11995%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=high&amp;id=69058f8066e0c23159a8ccfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11377-cwe-200-exposure-of-sensitive-infor-171addb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11377%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=69058f8066e0c23159a8ccef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11928-cwe-79-improper-neutralization-of-i-7a721ce7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11928%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wipeoutmedia%20CSS%20%26%20JavaScript%20Toolbox&amp;severity=medium&amp;id=6905841371a6fc4aff3da4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12367-cwe-285-improper-authorization-in-s-7eb2a310</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12367%3A%20CWE-285%20Improper%20Authorization%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=6905841371a6fc4aff3da4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11833-cwe-862-missing-authorization-in-sa-8d513e87</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11833%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=critical&amp;id=6905841371a6fc4aff3da4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62275-cwe-863-incorrect-authorization-in--dba97816</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62275%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6905798771a6fc4aff3b85fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11922-cwe-79-improper-neutralization-of-i-281d1d6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20j_3rk%20Inactive%20Logout&amp;severity=medium&amp;id=690567f271a6fc4aff36b3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11920-cwe-98-improper-control-of-filename-37d199f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11920%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20whyun%20WPCOM%20Member&amp;severity=high&amp;id=690567f271a6fc4aff36b3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11174-cwe-285-improper-authorization-in-b-14d445b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11174%3A%20CWE-285%20Improper%20Authorization%20in%20barn2media%20Document%20Library%20Lite&amp;severity=medium&amp;id=690567f271a6fc4aff36b3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11816-cwe-862-missing-authorization-in-wp-b4a75309</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11816%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Privacy%20Policy%20Generator%20%E2%80%93%20WPLP%20Legal%20Pages&amp;severity=medium&amp;id=690567f271a6fc4aff36b3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-01-6229a138</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-01&amp;severity=medium&amp;id=6906a1ea3dd8f1d01dd46f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62276-cwe-525-use-of-web-browser-cache-co-e0c14fac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62276%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6905491afb7fda9fbd25249b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-arrests-meduza-stealer-developers-after-gov-a46174ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20Arrests%20Meduza%20Stealer%20Developers%20After%20Government%20Hack&amp;severity=medium&amp;id=69052f2fa02e7fe8a679652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12464-stack-based-buffer-overflow-in-red--e68ed452</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12464%3A%20Stack-based%20Buffer%20Overflow&amp;severity=medium&amp;id=6905290a5a7d71ee5de3edbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-skycloak-tor-campaign-targets-military-o-18dd853b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20SkyCloak%3A%20Tor%20Campaign%20targets%20Military%20of%20Russia%20%26%20Belarus&amp;severity=medium&amp;id=69052bb4a02e7fe8a6757d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6384-targets-european-diplomatic-entities-with--508ebc4f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6384%20Targets%20European%20Diplomatic%20Entities%20With%20Windows%20Exploit&amp;severity=medium&amp;id=69055f4871a6fc4aff359281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ribbon-communications-breach-marks-latest-telecom--01eaced1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ribbon%20Communications%20Breach%20Marks%20Latest%20Telecom%20Attack&amp;severity=medium&amp;id=69055f4871a6fc4aff359284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60711-cwe-693-protection-mechanism-failur-9988d1b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60711%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69050e83f07fd4df0f173840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10693-cwe-757-selection-of-less-secure-al-c9798528</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10693%3A%20CWE-757%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20silabs.com%20Silicon%20Labs%20Z-Wave%20SDK&amp;severity=high&amp;id=69050e83f07fd4df0f173843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12547-improper-restriction-of-excessive-a-448a33af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12547%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20LogicalDOC%20Community%20Edition&amp;severity=medium&amp;id=690504b88e4e311697907915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12546-cross-site-scripting-in-logicaldoc--362369f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12546%3A%20Cross%20Site%20Scripting%20in%20LogicalDOC%20Community%20Edition&amp;severity=medium&amp;id=690504b88e4e31169790790f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62267-cwe-79-improper-neutralization-of-i-c0578934</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6904fe6639657deb20180355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62264-cwe-79-improper-neutralization-of-i-363c3f09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62264%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6904faef39657deb2013f7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-unveils-aardvark-gpt-5-agent-that-finds-and-577cd8b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Unveils%20Aardvark%3A%20GPT-5%20Agent%20That%20Finds%20and%20Fixes%20Code%20Flaws%20Automatically&amp;severity=medium&amp;id=69055e2471a6fc4aff34f132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59501-cwe-290-authentication-bypass-by-sp-7cc506b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59501%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=medium&amp;id=6904e98dae52ebddb37144ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6075-vulnerability-in-python-software-fou-52ab587c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6075%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=6904e98dae52ebddb37144c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-hackers-deploy-new-airstalk-malware-i-2e4ab527</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20Hackers%20Deploy%20New%20Airstalk%20Malware%20in%20Suspected%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69055e2471a6fc4aff34f135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12554-cwe-693-protection-mechanism-failur-d8b806fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12554%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=6904e78dae52ebddb370320f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12509-cwe-829-inclusion-of-functionality--893f2856</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12509%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Bizerba%20BRAIN2&amp;severity=high&amp;id=6904e78dae52ebddb3703209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12508-cwe-319-cleartext-transmission-of-s-3727b2a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12508%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Bizerba%20BRAIN2&amp;severity=high&amp;id=6904e78dae52ebddb3703206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12507-cwe-428-unquoted-search-path-or-ele-c577aded</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12507%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Bizerba%20_connect.BRAIN&amp;severity=high&amp;id=6904e78dae52ebddb3703203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12553-cwe-599-missing-validation-of-opens-52e3c03d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12553%3A%20CWE-599%20Missing%20Validation%20of%20OpenSSL%20Certificate%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6904e78dae52ebddb370320c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12552-cwe-521-weak-password-requirements--eea5b071</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12552%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=6904db52cf9c100c41c3e00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/government-approach-to-disrupt-cyber-scams-is-frag-8aa7e605</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Government%20Approach%20to%20Disrupt%20Cyber%20Scams%20is%20&apos;Fragmented&apos;&amp;severity=medium&amp;id=6909762578d4f574c2b0679e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12357-cwe-923-in-iso-15118-2-network-and--3ffa7d8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12357%3A%20CWE-923%20in%20ISO%2015118-2%20Network%20and%20Application%20Protocol%20Requirements%20EV%20Car%20Chargers&amp;severity=medium&amp;id=6904db52cf9c100c41c3e00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-whatsapp-passkey-encrypted-backups-r-077c4282</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20WhatsApp%20Passkey-Encrypted%20Backups%2C%20Russia%20Targets%20Meduza%20Malware%2C%20New%20Mastercard%20Solution&amp;severity=medium&amp;id=6904d42fdadb00d130f6c830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64168-cwe-362-concurrent-execution-using--af3aeef3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64168%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20agno-agi%20agno&amp;severity=high&amp;id=6904d0bddadb00d130f3212f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64385-cwe-20-improper-input-validation-in-417f5325</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64385%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Circutor%20TCPRS1plus&amp;severity=critical&amp;id=6904c9ac8ec00889be37f4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64389-cwe-319-cleartext-transmission-of-s-74fab0d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64389%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Circutor%20TCPRS1plus&amp;severity=high&amp;id=6904c9ac8ec00889be37f503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64388-cwe-400-uncontrolled-resource-consu-cac32ed0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64388%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Circutor%20TCPRS1plus&amp;severity=critical&amp;id=6904c7b38ec00889be3656e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64387-cwe-1021-improper-restriction-of-re-e1206d6f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64387%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Circutor%20TCPRS1plus&amp;severity=medium&amp;id=6904c7b38ec00889be3656e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12501-integer-overflow-in-opera-norway-as-8fa09d71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12501%3A%20Integer%20Overflow%20in%20Opera%20Norway%20AS%20GameMaker%20IDE&amp;severity=high&amp;id=6904c7b38ec00889be3656e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-exploit-windows-shortcut-flaw-49e2be6e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Exploit%20Windows%20Shortcut%20Flaw%20to%20Target%20European%20Diplomats&amp;severity=medium&amp;id=6904c289f54b4a899781a306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12460-cwe-79-improper-neutralization-of-i-f31bb708</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Afterlogic%20Aurora&amp;severity=medium&amp;id=6904c2a6f54b4a899781b912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12521-cwe-200-exposure-of-sensitive-infor-c1fe9368</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12521%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Analytify%20Analytify%20Pro&amp;severity=medium&amp;id=6904c2a6f54b4a899781b915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ernst-young-exposes-4tb-sql-server-backup-publicly-fd1b4d39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ernst%20%26%20Young%20Exposes%204TB%20SQL%20Server%20Backup%20Publicly%20on%20Microsoft%20Azure&amp;severity=high&amp;id=6904bf0ef54b4a89977c21c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-zero-day-actively-exploited-to-spy-on-euro-aed45052</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20zero-day%20actively%20exploited%20to%20spy%20on%20European%20diplomats&amp;severity=critical&amp;id=6904bf0ef54b4a89977c21c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64386-cwe-1021-improper-restriction-of-re-71b1ca95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64386%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Circutor%20TCPRS1plus&amp;severity=high&amp;id=6904bf30f54b4a89977c5647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-tick-group-exploits-lanscope-zero-day-99b087f0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Tick%20Group%20Exploits%20Lanscope%20Zero-Day%20to%20Hijack%20Corporate%20Systems&amp;severity=critical&amp;id=69055e2471a6fc4aff34f138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-man-extradited-from-ireland-to-us-over-c-da4dcca6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Man%20Extradited%20From%20Ireland%20to%20US%20Over%20Conti%20Ransomware%20Charges&amp;severity=medium&amp;id=6904b827a6ddfd238693b43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36249-cwe-614-sensitive-cookie-in-https-s-1d452c9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36249%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Jazz%20for%20Service%20Management&amp;severity=low&amp;id=6904bd22f54b4a89977ab6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33003-cwe-250-execution-with-unnecessary--c0741535</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33003%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=6904bd22f54b4a89977ab6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-wsus-flaw-to-spread-skuld-stealer--6ea5f322</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20WSUS%20Flaw%20to%20Spread%20Skuld%20Stealer%20Despite%20Microsoft%20Patch&amp;severity=high&amp;id=6904b12fa6ddfd23868a9dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13992-cwe-79-improper-neutralization-of-i-0a1ca514</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6904b13fa6ddfd23868ab73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4952-cwe-732-incorrect-permission-assignm-a2c0b981</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4952%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ESET%20ESET%20NOD32%20Antivirus&amp;severity=medium&amp;id=6904add5541c5042bae1090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-downplays-impact-from-glassworm-campaign-69597ee5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20Downplays%20Impact%20From%20GlassWorm%20Campaign&amp;severity=medium&amp;id=6904adbc541c5042bae0faf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64368-cross-site-request-forgery-csrf-in--340979d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64368%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mikado-Themes%20Bard&amp;severity=medium&amp;id=6904a350479ed964d8ea1f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64367-improper-neutralization-of-input-du-7cdabec8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=medium&amp;id=6904a350479ed964d8ea1f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64366-improper-neutralization-of-special--dbb299fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=high&amp;id=6904a350479ed964d8ea1f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64365-improper-neutralization-of-input-du-c31b385b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64365%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20colabrio%20Ohio%20Extra&amp;severity=medium&amp;id=6904a350479ed964d8ea1f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64364-improper-control-of-filename-for-in-78389db8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Masterstudy&amp;severity=high&amp;id=6904a350479ed964d8ea1f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64363-improper-control-of-filename-for-in-2e46e954</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64363%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SeventhQueen%20Kleo&amp;severity=high&amp;id=6904a350479ed964d8ea1f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64362-improper-neutralization-of-input-du-74f88d70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeventhQueen%20K%20Elements&amp;severity=medium&amp;id=6904a34e479ed964d8ea1ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64361-improper-neutralization-of-input-du-84f75ece</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StylemixThemes%20Consulting%20Elementor%20Widgets&amp;severity=medium&amp;id=6904a34e479ed964d8ea1ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64360-improper-control-of-filename-for-in-c2398146</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64360%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Consulting%20Elementor%20Widgets&amp;severity=high&amp;id=6904a34e479ed964d8ea1ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64359-improper-control-of-filename-for-in-f82d57b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64359%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Consulting&amp;severity=high&amp;id=6904a34e479ed964d8ea1ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64358-missing-authorization-in-webtoffee--e6c936a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64358%3A%20Missing%20Authorization%20in%20WebToffee%20Smart%20Coupons%20for%20WooCommerce&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64357-cross-site-request-forgery-csrf-in--56cf65a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64357%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Younes%20JFR.%20Advanced%20Database%20Cleaner&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64356-missing-authorization-in-f1logic-in-d4863d62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64356%3A%20Missing%20Authorization%20in%20f1logic%20Insert%20PHP%20Code%20Snippet&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64354-improper-neutralization-of-input-du-1ca1acd9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matias%20Ventura%20Gutenberg&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64353-deserialization-of-untrusted-data-i-c5a4bd0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64353%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Chouby%20Polylang&amp;severity=high&amp;id=6904a34e479ed964d8ea1e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64352-missing-authorization-in-wpdevelope-6b2c87b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64352%3A%20Missing%20Authorization%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=low&amp;id=6904a34e479ed964d8ea1e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-conti-ransomware-suspect-extradited-to-u-395ed5c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Conti%20Ransomware%20Suspect%20Extradited%20to%20US%20from%20Ireland&amp;severity=medium&amp;id=69049fc8479ed964d8e4638b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40603-cwe-532-insertion-of-sensitive-info-eb095ea2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40603%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SonicWall%20SMA100&amp;severity=medium&amp;id=690498e560041281bb1cf1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-exploited-xwiki-vmware-flaws-to-kev-cata-9f30d19b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Exploited%20XWiki%2C%20VMware%20Flaws%20to%20KEV%20Catalog&amp;severity=medium&amp;id=690498c760041281bb1cecd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-exploits-unpatched-windows-flaw-in-rec-e110ee35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Exploits%20Unpatched%20Windows%20Flaw%20in%20Recent%20Attacks&amp;severity=medium&amp;id=6904917f8338aee69048baf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11602-cwe-226-sensitive-information-in-re-e629c409</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11602%3A%20CWE-226%3A%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20neo4j%20Enterprise%20Edition&amp;severity=medium&amp;id=69048e028338aee690446fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11843-cwe-290-authentication-bypass-by-sp-06a0d0b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11843%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Therefore%20Corporation%20GmbH%20Therefore%20Online%20and%20Therefore%20On-Premises&amp;severity=high&amp;id=6904870d8338aee69039b244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wave-of-cyberattacks-by-apt-group-cloud-atlas--8a38ba1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20wave%20of%20cyberattacks%20by%20APT%20group%20Cloud%20Atlas%20on%20Russia&apos;s%20government%20sector&amp;severity=medium&amp;id=69049c46479ed964d8e04a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-brazil-with-love-new-tactics-from-lampion-fef0df3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Brazil%20with%20Love%3A%20New%20Tactics%20from%20Lampion&amp;severity=medium&amp;id=69049c46479ed964d8e04a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-an-evolving-discord-based-rat-family-380166e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20an%20evolving%20Discord-based%20RAT%20family&amp;severity=medium&amp;id=690498dc60041281bb1ceeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/latam-baited-into-the-delivery-of-purehvnc-3d15ff64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LATAM%20baited%20into%20the%20delivery%20of%20PureHVNC&amp;severity=medium&amp;id=690498dc60041281bb1cefe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-loader-executing-tornet-and-purehvnc-efed6f5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Loader%20Executing%20TorNet%20and%20PureHVNC&amp;severity=medium&amp;id=690498dc60041281bb1cf013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigation-report-androidbankbot-ynrk-mobile-ba-7334d161</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigation%20Report%3A%20Android%2FBankBot-YNRK%20Mobile%20Banking%20Trojan&amp;severity=medium&amp;id=690491968338aee69048ea17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12115-cwe-602-client-side-enforcement-of--9dc63988</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12115%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20wpclever%20WPC%20Name%20Your%20Price%20for%20WooCommerce&amp;severity=high&amp;id=690483ba189d660333d91771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12041-cwe-862-missing-authorization-in-ap-a8e1e44e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12041%3A%20CWE-862%20Missing%20Authorization%20in%20apos37%20ERI%20File%20Library&amp;severity=medium&amp;id=690483ba189d660333d9176d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-vmware-zero-day-exploited-by-china-link-2ed1373a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20VMware%20Zero-Day%20Exploited%20by%20China-Linked%20Hackers%20in%20Active%20Attacks&amp;severity=critical&amp;id=690483a0189d660333d909de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eclipse-foundation-revokes-leaked-open-vsx-tokens--da758c0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eclipse%20Foundation%20Revokes%20Leaked%20Open%20VSX%20Tokens%20Following%20Wiz%20Discovery&amp;severity=high&amp;id=690483a0189d660333d909e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30189-improper-preservation-of-consistenc-b9045fba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30189%3A%20Improper%20Preservation%20of%20Consistency%20Between%20Independent%20Representations%20of%20Shared%20State%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69048024189d660333d32ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30191-improper-restriction-of-rendered-ui-9790f329</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30191%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=69047ca9189d660333cf19e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30188-uncontrolled-resource-consumption-i-68cd8ed6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30188%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=high&amp;id=69047ca9189d660333cf19e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62232-cwe-532-insertion-of-sensitive-info-dfa48615</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62232%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=high&amp;id=69047ca9189d660333cf19e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-and-nsa-issue-urgent-guidance-to-secure-wsus--eb3952bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20and%20NSA%20Issue%20Urgent%20Guidance%20to%20Secure%20WSUS%20and%20Microsoft%20Exchange%20Servers&amp;severity=medium&amp;id=69055e2471a6fc4aff34f13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6384-weaponizes-zdi-can-25373-vulnerability-to--cd80b558</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6384%20Weaponizes%20ZDI-CAN-25373%20Vulnerability%20to%20Deploy%20PlugX%20Against%20Hungarian%20and%20Belgian%20Diplomatic%20Entities&amp;severity=medium&amp;id=69047c9e189d660333cf0809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8383-cwe-352-cross-site-request-forgery-c-cc6a2cdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8383%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20averta%20Depicter%20%E2%80%94%20Popup%20%26%20Slider%20Builder&amp;severity=medium&amp;id=690475de992e7194db50fe4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12094-cwe-693-protection-mechanism-failur-76331afb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12094%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20oopspam%20OOPSpam%20Anti-Spam%3A%20Spam%20Protection%20for%20WordPress%20Forms%20%26%20Comments%20(No%20CAPTCHA)&amp;severity=medium&amp;id=690475de992e7194db50fe41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12175-cwe-862-missing-authorization-in-st-a86d5f51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12175%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=690475de992e7194db50fe46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eclipse-foundation-revokes-leaked-open-vsx-tokens--c073460e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eclipse%20Foundation%20Revokes%20Leaked%20Open%20VSX%20Tokens%20Following%20Wiz%20Discovery&amp;severity=low&amp;id=69055e2471a6fc4aff34f141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/japan-issues-ot-security-guidance-for-semiconducto-681d2db8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Japan%20Issues%20OT%20Security%20Guidance%20for%20Semiconductor%20Factories&amp;severity=medium&amp;id=69046b5ec4aece8eb7bba98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6520-cwe-89-improper-neutralization-of-sp-41035cd6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6520%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Abis%20Technology%20BAPSIS&amp;severity=critical&amp;id=69046b76c4aece8eb7bbb0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8385-cwe-22-improper-limitation-of-a-path-8abeba51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8385%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PX-lab%20Zombify&amp;severity=medium&amp;id=6904678cd694fb7fc736cf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10897-cwe-22-improper-limitation-of-a-pat-aba0df75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10897%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20JMA%20Plugins%20WooCommerce%20Designer%20Pro&amp;severity=high&amp;id=6904678cd694fb7fc736cefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-vmware-zero-day-exploited-by-china-link-797a141c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20VMware%20Zero-Day%20Exploited%20by%20China-Linked%20Hackers%20in%20Active%20Attacks&amp;severity=high&amp;id=690463f2d694fb7fc7319064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7846-cwe-36-absolute-path-traversal-in-va-90866acd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7846%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20vanquish%20WordPress%20User%20Extra%20Fields&amp;severity=high&amp;id=69045cb533ef7ec31284379d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8489-cwe-269-improper-privilege-managemen-b5b3a721</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8489%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%204%2C000%2B%20ready%20Elementor%20sections%2C%20650%2B%20templates%2C%2070%2B%20FREE%20widgets%20for%20Elementor&amp;severity=critical&amp;id=69045cb533ef7ec3128437a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5397-cwe-288-authentication-bypass-using--eaf3d7aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5397%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Noo%20JobMonster&amp;severity=critical&amp;id=69045cb533ef7ec312843799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11191-cwe-862-missing-authorization-in-re-3344a713</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11191%3A%20CWE-862%20Missing%20Authorization%20in%20RealPress&amp;severity=medium&amp;id=69045e81d694fb7fc7296d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54763-improper-neutralization-of-special--f08e1930</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54763%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Century%20Systems%20Co.%2C%20Ltd.%20FutureNet%20MA-X%20series&amp;severity=high&amp;id=6904523333ef7ec31273476b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58152-files-or-directories-accessible-to--59c3d4da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58152%3A%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20Century%20Systems%20Co.%2C%20Ltd.%20FutureNet%20MA-X%20series&amp;severity=medium&amp;id=6904523333ef7ec31273476f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-security-layer-for-macos-takes-aim-at-admin--476b0907</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20New%20Security%20Layer%20for%20macOS%20Takes%20Aim%20at%20Admin%20Errors%20Before%20Hackers%20Do&amp;severity=medium&amp;id=69055e2471a6fc4aff34f144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11806-cwe-79-improper-neutralization-of-i-c75f04f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qzzr%20Qzzr%20Shortcode%20Plugin&amp;severity=medium&amp;id=69042534aebfcd547431d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11975-cwe-862-missing-authorization-in-fu-b813de93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11975%3A%20CWE-862%20Missing%20Authorization%20in%20fusewp%20FuseWP%20%E2%80%93%20WordPress%20User%20Sync%20to%20Email%20List%20%26%20Marketing%20Automation%20(Mailchimp%2C%20Constant%20Contact%2C%20ActiveCampaign%20etc.)&amp;severity=medium&amp;id=69042534aebfcd547431d430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6176-cwe-400-uncontrolled-resource-consum-e86a6505</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6176%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20scrapy%20scrapy%2Fscrapy&amp;severity=high&amp;id=6903fe8daebfcd5474a63725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-31-c0274374</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-31&amp;severity=medium&amp;id=6905500cfb7fda9fbd2ed095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63563-na-9d5d3738</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63563%3A%20n%2Fa&amp;severity=medium&amp;id=69051bc430c0d02a22040343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63561-na-530bbb87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63561%3A%20n%2Fa&amp;severity=high&amp;id=6905184f30c0d02a22fffc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63562-na-0eedc4d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63562%3A%20n%2Fa&amp;severity=medium&amp;id=69051574f07fd4df0f20dbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63458-na-b4598c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63458%3A%20n%2Fa&amp;severity=high&amp;id=690508328e4e311697948c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63454-na-77503cc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63454%3A%20n%2Fa&amp;severity=high&amp;id=6905063d8e4e3116979314c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63460-na-1a6f26b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63460%3A%20n%2Fa&amp;severity=high&amp;id=6904f211986dd4e4187f7593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63459-na-d1dc2699</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63459%3A%20n%2Fa&amp;severity=high&amp;id=6904f08d986dd4e4187ccde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63465-na-5cb624f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63465%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63464-na-e5c62316</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63464%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63463-na-9883fd32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63463%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63462-na-72b95be3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63462%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63461-na-2a1ed345</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63461%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63469-na-57c23d27</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63469%3A%20n%2Fa&amp;severity=high&amp;id=6904e78dae52ebddb3703212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57108-na-58043a4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57108%3A%20n%2Fa&amp;severity=critical&amp;id=6904dcd4cf9c100c41c66458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63468-na-53a3f353</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63468%3A%20n%2Fa&amp;severity=high&amp;id=6904db52cf9c100c41c3e016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63466-na-afc69715</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63466%3A%20n%2Fa&amp;severity=high&amp;id=6904db52cf9c100c41c3e013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63467-na-6bfa0cbc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63467%3A%20n%2Fa&amp;severity=high&amp;id=6904d7cadadb00d130fc157c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29270-na-c3c48668</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29270%3A%20n%2Fa&amp;severity=critical&amp;id=6904d7cadadb00d130fc1579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57107-na-4bb31bbe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57107%3A%20n%2Fa&amp;severity=high&amp;id=6904d0bddadb00d130f32132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57106-na-3e4ad546</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57106%3A%20n%2Fa&amp;severity=high&amp;id=6904d0bddadb00d130f3212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60749-na-64f7bea6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60749%3A%20n%2Fa&amp;severity=high&amp;id=6904cd2f8ec00889be3d7aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61427-na-d9dd7be0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61427%3A%20n%2Fa&amp;severity=medium&amp;id=6904c9ac8ec00889be37f4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flowise-304-remote-code-execution-rce-0d4ee7ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flowise%203.0.4%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=6904bcc1f54b4a89977a2e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23050-cwe-125-out-of-bounds-read-in-qt-8bd20c78</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23050%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Qt&amp;severity=low&amp;id=69041725aebfcd5474f35bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8849-cwe-400-uncontrolled-resource-consum-d4797e85</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8849%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=6903fb06aebfcd5474a51c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-will-vote-to-scrap-telecom-cybersecurity-requi-955b1987</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20will%20vote%20to%20scrap%20telecom%20cybersecurity%20requirements&amp;severity=medium&amp;id=6903f780aebfcd5474a443c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zombie-projects-rise-again-to-undermine-security-98d9685d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zombie%20Projects%20Rise%20Again%20to%20Undermine%20Security&amp;severity=medium&amp;id=69055f4871a6fc4aff359287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48983-vulnerability-in-veeam-backup-and-r-c62835d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48983%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=6903f7a3aebfcd5474a44742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48982-vulnerability-in-veeam-agent-for-mi-e117654c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48982%3A%20Vulnerability%20in%20Veeam%20Agent%20for%20Microsoft%20Windows&amp;severity=high&amp;id=6903f7a3aebfcd5474a4473f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27208-vulnerability-in-revive-revive-adse-f4fa953d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27208%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=6903f7a3aebfcd5474a4473c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48984-vulnerability-in-veeam-backup-and-r-9e80df79</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48984%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=6903f7a3aebfcd5474a4474d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brush-exploit-can-cause-any-chromium-browser-to-co-ccedb57d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brush%20exploit%20can%20cause%20any%20Chromium%20browser%20to%20collapse%20in%2015-60%20seconds&amp;severity=high&amp;id=6903f780aebfcd5474a443c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52665-vulnerability-in-ubiquiti-inc-unifi-32cc4757</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52665%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Access%20Application&amp;severity=critical&amp;id=6903f7a3aebfcd5474a44756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52663-vulnerability-in-ubiquiti-inc-unifi-990c9baf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52663%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Talk%20Touch&amp;severity=high&amp;id=6903f7a3aebfcd5474a44750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48980-vulnerability-in-brave-desktop-brow-e9cf4c9c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48980%3A%20Vulnerability%20in%20Brave%20Desktop%20Browser&amp;severity=medium&amp;id=6903f7a3aebfcd5474a4474a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52664-vulnerability-in-revive-revive-adse-6ba87dfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52664%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=6903f7a3aebfcd5474a44753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-claims-it-stole-23gb-from-apache--0b215574</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20Ransomware%20Claims%20It%20Stole%2023GB%20from%20Apache%20OpenOffice&amp;severity=medium&amp;id=6903f077aebfcd5474a1faef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7316-cwe-79-improper-neutralization-of-in-309084e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7315-cwe-79-improper-neutralization-of-in-ebcc7746</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7315%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14001-cwe-79-improper-neutralization-of-i-a4ce2627</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14001%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7318-cwe-79-improper-neutralization-of-in-9d172c6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14000-cwe-79-improper-neutralization-of-i-c08f3f85</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7313-cwe-79-improper-neutralization-of-in-f309c714</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7314-cwe-79-improper-neutralization-of-in-7eb9eefb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53688-cwe-79-improper-neutralization-of-i-400c930d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53688%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7317-cwe-862-missing-authorization-in-nag-58b17b6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7317%3A%20CWE-862%20Missing%20Authorization%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee7aebfcd54749e67fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13996-cwe-613-insufficient-session-expira-a18b20c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13996%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13993-cwe-79-improper-neutralization-of-i-451fccf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e6800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14008-cwe-78-improper-neutralization-of-s-34bf2173</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14008%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e682b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34286-cwe-78-improper-neutralization-of-s-efb80336</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34286%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14003-cwe-78-improper-neutralization-of-s-4a624af2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14003%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34134-cwe-78-improper-neutralization-of-s-ab21e3af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34134%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14009-cwe-269-improper-privilege-manageme-8f97daba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14009%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14004-cwe-269-improper-privilege-manageme-304ddc2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14004%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Nagios%20XI&amp;severity=high&amp;id=6903dee8aebfcd54749e681c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34287-cwe-732-incorrect-permission-assign-b2b17dc1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34287%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20XI&amp;severity=high&amp;id=6903deeaaebfcd54749e6b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34135-cwe-732-incorrect-permission-assign-5f207cbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34135%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee8aebfcd54749e683a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14006-cwe-346-origin-validation-error-in--5fac1da3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14006%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Nagios%20XI&amp;severity=high&amp;id=6903dee8aebfcd54749e6826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-18-year-old-codebase-left-smart-buildings-wide--afaed408</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%2018-Year-Old%20Codebase%20Left%20Smart%20Buildings%20Wide%20Open&amp;severity=medium&amp;id=69055f4871a6fc4aff35928a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14005-cwe-78-improper-neutralization-of-s-637c7973</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14005%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14002-cwe-98-improper-control-of-filename-73b69dc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14002%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db62aebfcd54749cd818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34284-cwe-78-improper-neutralization-of-s-1addf98c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34284%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903db62aebfcd54749cd81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13995-cwe-497-exposure-of-sensitive-syste-4d322a9b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13995%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db62aebfcd54749cd813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34283-cwe-497-exposure-of-sensitive-syste-34edced4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34283%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db64aebfcd54749cd8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13994-cwe-862-missing-authorization-in-na-10fe0d2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13994%3A%20CWE-862%20Missing%20Authorization%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db63aebfcd54749cd84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13999-cwe-497-exposure-of-sensitive-syste-480dc901</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13999%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db63aebfcd54749cd853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7319-cwe-79-improper-neutralization-of-in-4b1988d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Network%20Analyzer&amp;severity=medium&amp;id=6903db62aebfcd54749cd831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34278-cwe-79-improper-neutralization-of-i-208c0262</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Network%20Analyzer&amp;severity=medium&amp;id=6903db64aebfcd54749cd8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34280-cwe-78-improper-neutralization-of-s-a8eb2c7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34280%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Network%20Analyzer&amp;severity=high&amp;id=6903db64aebfcd54749cd8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7321-cwe-79-improper-neutralization-of-in-10f871a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7321%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db62aebfcd54749cd835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7323-cwe-79-improper-neutralization-of-in-53b4d033</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7323%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db62aebfcd54749cd83d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58272-cwe-79-improper-neutralization-of-i-685a8f7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58272&amp;severity=null&amp;id=6903db63aebfcd54749cd858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34298-cwe-281-improper-preservation-of-pe-60d50680</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34298%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db64aebfcd54749cd8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34277-cwe-94-improper-control-of-generati-e781fd2c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34277%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Nagios%20Log%20Server&amp;severity=critical&amp;id=6903db64aebfcd54749cd8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34272-cwe-200-exposure-of-sensitive-infor-d8859d85</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34272%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db63aebfcd54749cd872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34273-cwe-863-incorrect-authorization-in--59a87b49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34273%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db63aebfcd54749cd877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58273-cwe-266-incorrect-privilege-assignm-632aa834</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58273%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db63aebfcd54749cd85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34274-cwe-250-execution-with-unnecessary--6979e6b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34274%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Nagios%20Log%20Server&amp;severity=critical&amp;id=6903db63aebfcd54749cd87c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7322-cwe-863-incorrect-authorization-in-n-e0241be2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7322%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db62aebfcd54749cd839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34271-cwe-319-cleartext-transmission-of-s-ae1309bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34271%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db63aebfcd54749cd86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34270-cwe-312-cleartext-storage-of-sensit-66961f55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34270%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db63aebfcd54749cd867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53689-cwe-79-improper-neutralization-of-i-c228cc64</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Fusion&amp;severity=medium&amp;id=6903db62aebfcd54749cd822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53690-cwe-79-improper-neutralization-of-i-4edc0ff4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Fusion&amp;severity=medium&amp;id=6903db62aebfcd54749cd827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7312-cwe-79-improper-neutralization-of-in-12faff53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7312%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Fusion&amp;severity=medium&amp;id=6903db62aebfcd54749cd82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34269-cwe-613-insufficient-session-expira-9d180085</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34269&amp;severity=null&amp;id=6903db63aebfcd54749cd862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34249-cwe-307-improper-restriction-of-exc-92c6659c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34249&amp;severity=null&amp;id=6903d7ddaebfcd54749bf69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7325-cwe-306-missing-authentication-for-c-b6820620</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7325%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Anheng%20Information%20(Hangzhou%20DBAPP%20Security%20Information%20Technology%20Co.%2C%20Ltd.)%20Mingyu%20Operations%20and%20Maintenance%20Audit%20and%20Risk%20Control%20System&amp;severity=critical&amp;id=6903d7ddaebfcd54749bf69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-stands-out-in-refusal-to-sign-un-cybercrime-tre-96a4d257</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Stands%20Out%20in%20Refusal%20to%20Sign%20UN%20Cybercrime%20Treaty&amp;severity=low&amp;id=69055f4871a6fc4aff35928d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-claroty-authentication-bypass-flaw-opened-04540570</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Claroty%20Authentication%20Bypass%20Flaw%20Opened%20OT%20to%20Attack&amp;severity=critical&amp;id=69055f4871a6fc4aff359290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automating-comdcom-vulnerability-research-f704b274</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automating%20COM%2FDCOM%20vulnerability%20research&amp;severity=medium&amp;id=6903c9ceaebfcd54749995e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8850-cwe-440-expected-behavior-violation--36b4c778</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8850%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=low&amp;id=6903c64aaebfcd5474991deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lotl-attack-hides-malware-in-windows-native-ai-sta-41166944</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LotL%20Attack%20Hides%20Malware%20in%20Windows%20Native%20AI%20Stack&amp;severity=medium&amp;id=69055f4871a6fc4aff359293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3356-cwe-22-improper-limitation-of-a-path-a7e7c432</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3356%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Tivoli%20Monitoring&amp;severity=high&amp;id=6903bbbdaebfcd5474960ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3355-cwe-22-improper-limitation-of-a-path-46c85436</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3355%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Tivoli%20Monitoring&amp;severity=high&amp;id=6903bbbdaebfcd5474960ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36137-cwe-250-execution-with-unnecessary--d12693ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36137%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Sterling%20Connect%3ADirect%20for%20Unix&amp;severity=high&amp;id=6903b838aebfcd5474944466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62265-cwe-79-improper-neutralization-of-i-d21a69fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62265%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6903b13baebfcd5474914704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spyware-plugged-chatgpt-dalle-and-whatsapp-apps-ta-3876fa1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spyware-Plugged%20ChatGPT%2C%20DALL%C2%B7E%20and%20WhatsApp%20Apps%20Target%20US%20Users&amp;severity=medium&amp;id=6903adaaaebfcd54748fc5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64118-cwe-362-concurrent-execution-using--5e631f30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64118%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20isaacs%20node-tar&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-you-break-our-pickle-sandbox-blog-exploit-chal-9c9b9bbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20you%20break%20our%20pickle%20sandbox%3F%20Blog%20%2B%20exploit%20challenge%20inside&amp;severity=high&amp;id=6903a6a5aebfcd54748ac6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64112-cwe-79-improper-neutralization-of-i-db2db47d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=6903a6a4aebfcd54748ac668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64115-cwe-601-url-redirection-to-untruste-3b477e22</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64115%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20leepeuker%20movary&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac66f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62266-cwe-601-url-redirection-to-untruste-ab6fc836</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62266%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64116-cwe-601-url-redirection-to-untruste-3e14f705</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64116%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20leepeuker%20movary&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64096-cwe-121-stack-based-buffer-overflow-f4e21142</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64096%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6903adccaebfcd54748fc906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-built-in-ai-defenses-on-android-now-block--a4a184e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google&apos;s%20Built-In%20AI%20Defenses%20on%20Android%20Now%20Block%2010%20Billion%20Scam%20Messages%20a%20Month&amp;severity=medium&amp;id=69055e2471a6fc4aff34f147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-ransomware-gangs-weaponize-open-source-ada-0e297d19</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Ransomware%20Gangs%20Weaponize%20Open-Source%20AdaptixC2%20for%20Advanced%20Attacks&amp;severity=medium&amp;id=69055e2471a6fc4aff34f14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/year-long-nation-state-hack-hits-us-telecom-ribbon-203d4c95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Year-Long%20Nation-State%20Hack%20Hits%20US%20Telecom%20Ribbon%20Communications&amp;severity=medium&amp;id=6903951aaebfcd5474815d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62726-cwe-829-inclusion-of-functionality--0fa144da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62726%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69039529aebfcd547481615c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11998-cwe-200-exposure-of-sensitive-infor-dd7d8c38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11998%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc.%20Card%20Readers%20B%20Model&amp;severity=medium&amp;id=69038e10aebfcd54747db0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-found-2k-vulns-400-secrets-and-175-pii-inst-1aa44553</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20we%20found%20%2B2k%20vulns%2C%20400%2B%20secrets%20and%20175%20PII%20instances%20in%20publicly%20exposed%20apps%20built%20on%20vibe-coded%20platforms%20(Research%20methodology)&amp;severity=critical&amp;id=69038a86aebfcd54747b5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12517-cwe-448-obsolete-feature-in-ui-in-a-ac63c9bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12517%3A%20CWE-448%20Obsolete%20Feature%20in%20UI%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=69038a85aebfcd54747b5ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12516-cwe-394-unexpected-status-code-or-r-2740e6ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12516%3A%20CWE-394%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=69038a85aebfcd54747b5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12515-cwe-394-unexpected-status-code-or-r-8361783b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12515%3A%20CWE-394%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=69038a85aebfcd54747b5ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-deep-dive-into-warlock-ransomware-deployed-via-t-88ca7719</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Deep%20Dive%20Into%20Warlock%20Ransomware%20Deployed%20Via%20ToolShell%20SharePoint%20Chained%20Vulnerabilities&amp;severity=medium&amp;id=69038701aebfcd5474799457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36592-cwe-79-improper-neutralization-of-i-b913e0c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36592%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Secure%20Connect%20Gateway%20SCG%20Policy%20Manager&amp;severity=medium&amp;id=69038700aebfcd5474799441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46363-cwe-23-relative-path-traversal-in-d-0b443e25</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46363%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Dell%20Secure%20Connect%20Gateway%20SCG%205.0%20Application%20and%20Appliance&amp;severity=medium&amp;id=69038700aebfcd5474799447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-brash-exploit-crashes-chromium-browsers-instan-940fa577</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%22Brash%22%20Exploit%20Crashes%20Chromium%20Browsers%20Instantly%20with%20a%20Single%20Malicious%20URL&amp;severity=low&amp;id=69055e2471a6fc4aff34f14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5347-cwe-79-improper-neutralization-of-in-fc242a99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=medium&amp;id=690378f1aebfcd547472f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5343-cwe-79-improper-neutralization-of-in-0f1845c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=medium&amp;id=690378f1aebfcd547472f157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43942-cwe-78-improper-neutralization-of-s-e2e2b8cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43942%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=690378f1aebfcd547472f154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloud-outages-highlight-the-need-for-resilient-sec-e42f7fa1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloud%20Outages%20Highlight%20the%20Need%20for%20Resilient%2C%20Secure%20Infrastructure%20Recovery&amp;severity=high&amp;id=69055f4871a6fc4aff359296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5342-cwe-400-uncontrolled-resource-consum-77d83293</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5342%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=medium&amp;id=6903756daebfcd547471732a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46422-cwe-78-improper-neutralization-of-s-71ebb324</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46422%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6903756daebfcd547471731f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46423-cwe-78-improper-neutralization-of-s-65ea5176</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46423%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6903756daebfcd5474717322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43027-cwe-284-improper-access-control-in--36520a6f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43027%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Genetec%20Inc.%20Genetec%20Security%20Center&amp;severity=critical&amp;id=6903756daebfcd547471731b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43939-cwe-78-improper-neutralization-of-s-17f5567f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43939%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;%20in%20Dell%20Unity&amp;severity=high&amp;id=690378f1aebfcd547472f15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43940-cwe-78-improper-neutralization-of-s-655404b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43940%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6903a6a4aebfcd54748ac679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43941-cwe-78-improper-neutralization-of-s-65a134ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43941%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=690371e9aebfcd54746e8f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x-request-purpose-identifying-research-and-bug-bou-15a7e400</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=X-Request-Purpose%3A%20Identifying%20%22research%22%20and%20bug%20bounty%20related%20scans%26%23x3f%3B%2C%20(Thu%2C%20Oct%2030th)&amp;severity=medium&amp;id=69036752aebfcd5474676d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/millions-impacted-by-conduent-data-breach-86274f88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20Million%20Impacted%20by%20Conduent%20Data%20Breach&amp;severity=medium&amp;id=690363d0aebfcd547465b5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10348-cwe-79-improper-neutralization-of-i-45900c42</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10348%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Eveo%20URVE%20Smart%20Office&amp;severity=medium&amp;id=690363e9aebfcd547465bb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-defense-contractor-exec-pleads-guilty-to-sellin-2a7b8f12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-Defense%20contractor%20exec%20pleads%20guilty%20to%20selling%20cyber%20exploits%20to%20Russia&amp;severity=medium&amp;id=69036054aebfcd547464671a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-us-telecom-backbone-firm-hacked-by-nation-st-53e5efd7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20US%20Telecom%20Backbone%20Firm%20Hacked%20by%20Nation-State%20Actors&amp;severity=medium&amp;id=69035cc8aebfcd547462d39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-exploit-adaptix-multi-platform-pen-4a316877</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Exploit%20Adaptix%20Multi-Platform%20Pentesting%20Tool%20in%20Ransomware%20Attacks&amp;severity=high&amp;id=690355cdaebfcd54745fa958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-death-of-the-security-checkbox-bas-is-the-powe-bcca287c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Death%20of%20the%20Security%20Checkbox%3A%20BAS%20Is%20the%20Power%20Behind%20Real%20Defense&amp;severity=medium&amp;id=69055e2471a6fc4aff34f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10317-cwe-352-cross-site-request-forgery--8303a24e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10317%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=69035245aebfcd54745da8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canada-says-hackers-tampered-with-ics-at-water-fac-3fbf71e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canada%20Says%20Hackers%20Tampered%20With%20ICS%20at%20Water%20Facility%2C%20Oil%20and%20Gas%20Firm&amp;severity=medium&amp;id=69034eb8aebfcd54745be6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/136-npm-packages-delivering-infostealers-downloade-b4a33748</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=136%20NPM%20Packages%20Delivering%20Infostealers%20Downloaded%20100%2C000%20Times&amp;severity=medium&amp;id=690345d3aebfcd54745867b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-dns-poisoning-flaw-supply-chai-e92d73d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20DNS%20Poisoning%20Flaw%2C%20Supply-Chain%20Heist%2C%20Rust%20Malware%20Trick%20and%20New%20RATs%20Rising&amp;severity=high&amp;id=69055e2471a6fc4aff34f15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53883-cwe-80-improper-neutralization-of-s-3c6ac075</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53883%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20SUSE%20Container%20suse%20manager%205.0&amp;severity=critical&amp;id=690345edaebfcd54745877ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39663-cwe-80-improper-neutralization-of-s-3992d94f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39663%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=690345edaebfcd54745877ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53880-cwe-35-path-traversal-in-suse-conta-6026aa4f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53880%3A%20CWE-35%3A%20Path%20Traversal%20in%20SUSE%20Container%20suse%2Fmanager%2F4.3%2Fproxy-httpd%3Alatest&amp;severity=high&amp;id=690340b1aebfcd547455b960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantomraven-malware-found-in-126-npm-packages-ste-028e3a3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomRaven%20Malware%20Found%20in%20126%20npm%20Packages%20Stealing%20GitHub%20Tokens%20From%20Devs&amp;severity=medium&amp;id=69055e2471a6fc4aff34f160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54471-cwe-321-use-of-hard-coded-cryptogra-df538edb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54471%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20SUSE%20neuvector&amp;severity=medium&amp;id=690335411ead54a02dedddc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54941-cwe-78-improper-neutralization-of-s-7534876f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54941%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=690335411ead54a02dedddcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54469-cwe-78-improper-neutralization-of-s-36f98e7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54469%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SUSE%20neuvector&amp;severity=critical&amp;id=690335411ead54a02dedddc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54470-cwe-295-improper-certificate-valida-63474386</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54470%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SUSE%20neuvector&amp;severity=high&amp;id=6903330c1ead54a02de8d06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-us-defense-contractor-executive-admits-to-s-05341e44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20US%20Defense%20Contractor%20Executive%20Admits%20to%20Selling%20Exploits%20to%20Russia&amp;severity=medium&amp;id=690332f21ead54a02de8b063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62402-cwe-250-execution-with-unnecessary--81f6a57a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62402%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69032fc11ead54a02de5c439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62503-cwe-250-execution-with-unnecessary--3f793a6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62503%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69032fc11ead54a02de5c43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11906-cwe-732-incorrect-permission-assign-19bbd1a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11906%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Progress%20Software%20Flowmon&amp;severity=medium&amp;id=690319b962f3017fc2134dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11881-cwe-862-missing-authorization-in-sc-6f85f453</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11881%3A%20CWE-862%20Missing%20Authorization%20in%20scottopolis%20AppPresser%20%E2%80%93%20Mobile%20App%20Framework&amp;severity=medium&amp;id=69030ee925802725f5b0163a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10636-cwe-79-cross-site-scripting-xss-in--9fcea5f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10636%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20NS%20Maintenance%20Mode%20for%20WP&amp;severity=low&amp;id=69030287a36935f67201748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-leak-outs-students-of-irans-mois-training-aca-1529e86a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Leak%20Outs%20Hacker%20Students%20of%20Iran&apos;s%20MOIS%20Training%20Academy&amp;severity=medium&amp;id=6903026aa36935f672014418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62229-use-after-free-in-red-hat-red-hat-e-8c4c6704</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62229%3A%20Use%20After%20Free%20in%20X.Org%20Xwayland&amp;severity=high&amp;id=69030287a36935f67201749b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10008-cwe-862-missing-authorization-in-re-5b3bfb23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10008%3A%20CWE-862%20Missing%20Authorization%20in%20remyb92%20Translate%20WordPress%20with%20Weglot%20%E2%80%93%20Multilingual%20AI%20Translation&amp;severity=medium&amp;id=69030287a36935f672017491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11627-cwe-117-improper-output-neutralizat-25e43d00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11627%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20sminozzi%20Site%20Checkup%20Debug%20AI%20Troubleshooting%20with%20Wizard%20and%20Tips%20for%20Each%20Issue&amp;severity=medium&amp;id=69030287a36935f672017496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62230-use-after-free-in-red-hat-red-hat-e-c766d3dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62230%3A%20Use%20After%20Free%20in%20X.Org%20Xwayland&amp;severity=high&amp;id=6902f902867527dded2d9ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62231-integer-overflow-or-wraparound-in-r-f94f0749</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62231%3A%20Integer%20Overflow%20or%20Wraparound%20in%20X.Org%20Xwayland&amp;severity=high&amp;id=6902f42fa7d593c99349cd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12475-cwe-79-improper-neutralization-of-i-62c7d03d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12475%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy%20Companion&amp;severity=medium&amp;id=6902ed45a7d593c993388b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacktivists-breach-canadas-critical-infrastructure-98178fda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacktivists%20breach%20Canada%E2%80%99s%20critical%20infrastructure%2C%20cyber%20Agency%20warns&amp;severity=critical&amp;id=6902aac604b4f2cbf902fe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50739-na-f0a70666</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50739%3A%20n%2Fa&amp;severity=critical&amp;id=69043203fe27b1aa12d0c69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50736-na-962ab9d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50736%3A%20n%2Fa&amp;severity=medium&amp;id=69043203fe27b1aa12d0c699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-30-dbde9e0a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-30&amp;severity=medium&amp;id=6903fe7aaebfcd5474a5f00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60950-na-e294cc14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60950%3A%20n%2Fa&amp;severity=medium&amp;id=6903d46daebfcd54749b1920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61498-na-e9239115</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61498%3A%20n%2Fa&amp;severity=high&amp;id=6903d46daebfcd54749b191c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61141-na-091e4a36</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61141%3A%20n%2Fa&amp;severity=high&amp;id=6903d46daebfcd54749b1917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63423-na-745342b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63423%3A%20n%2Fa&amp;severity=high&amp;id=6903bf40aebfcd547497a028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63422-na-4d4ac0e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63422%3A%20n%2Fa&amp;severity=high&amp;id=6903b838aebfcd5474944469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63885-na-0049e6f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63885%3A%20n%2Fa&amp;severity=medium&amp;id=6903b13baebfcd547491470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61196-na-cd0397fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61196%3A%20n%2Fa&amp;severity=high&amp;id=6903b13baebfcd547491470b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63298-na-bd8ad9a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63298%3A%20n%2Fa&amp;severity=high&amp;id=6903b13baebfcd5474914707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52180-na-6bd746f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52180%3A%20n%2Fa&amp;severity=medium&amp;id=6903b13baebfcd5474914700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57109-na-cb2986d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57109%3A%20n%2Fa&amp;severity=medium&amp;id=6903adc2aebfcd54748fc6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52179-na-c0584ef0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52179%3A%20n%2Fa&amp;severity=medium&amp;id=6903adc2aebfcd54748fc6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56313-na-7538d73e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56313%3A%20n%2Fa&amp;severity=medium&amp;id=6903a323aebfcd5474891e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61121-na-770a4d2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61121%3A%20n%2Fa&amp;severity=high&amp;id=69039529aebfcd5474816158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61120-na-cbf0a87c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61120%3A%20n%2Fa&amp;severity=high&amp;id=69039529aebfcd5474816155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60319-na-a97e1990</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60319%3A%20n%2Fa&amp;severity=medium&amp;id=69039529aebfcd5474816151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61119-na-f40069bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61119%3A%20n%2Fa&amp;severity=high&amp;id=69039192aebfcd54747facdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61114-na-fdabc6ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61114%3A%20n%2Fa&amp;severity=high&amp;id=69039192aebfcd54747facda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61118-na-a879ba80</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61118%3A%20n%2Fa&amp;severity=high&amp;id=69038e10aebfcd54747db0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61117-na-d4255f5f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61117%3A%20n%2Fa&amp;severity=high&amp;id=69038a85aebfcd54747b5acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61116-na-0090662a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61116%3A%20n%2Fa&amp;severity=high&amp;id=69038700aebfcd547479944d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61113-na-d96c61dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61113%3A%20n%2Fa&amp;severity=high&amp;id=69038700aebfcd547479944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61115-na-82157f97</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61115%3A%20n%2Fa&amp;severity=high&amp;id=69038700aebfcd5474799444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50574-na-1e69c7b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50574%3A%20n%2Fa&amp;severity=medium&amp;id=6903756daebfcd5474717325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63608-na-3c8df444</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63608%3A%20n%2Fa&amp;severity=medium&amp;id=69035ce4aebfcd547462d5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-security-posture-management-what-does-best-in-42b4ac67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Security%20Posture%20Management%20%E2%80%94%20What%20Does%20&apos;Best%20in%20Class&apos;%20Look%20Like%3F&amp;severity=low&amp;id=69055f4871a6fc4aff359299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62257-cwe-307-improper-restriction-of-exc-1f076a25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62257%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6902a496d6627ef5904f74b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12466-cwe-288-authentication-bypass-using-0eddf91c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12466%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Simple%20OAuth%20(OAuth2)%20%26%20OpenID%20Connect&amp;severity=high&amp;id=6902a10ed6627ef5904a7ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12083-cwe-79-improper-neutralization-of-i-53978d82</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20CivicTheme%20Design%20System&amp;severity=medium&amp;id=6902a10ed6627ef5904a7abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12082-cwe-863-incorrect-authorization-in--33597dfb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12082%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20CivicTheme%20Design%20System&amp;severity=high&amp;id=6902a10ed6627ef5904a7abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10929-cwe-1288-improper-validation-of-con-15756f96</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10929%3A%20CWE-1288%20Improper%20Validation%20of%20Consistency%20within%20Input%20in%20Drupal%20Reverse%20Proxy%20Header&amp;severity=medium&amp;id=6902a10ed6627ef5904a7ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10930-cwe-352-cross-site-request-forgery--d296d724</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10930%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Currency&amp;severity=medium&amp;id=6902a10ed6627ef5904a7ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10931-cwe-79-improper-neutralization-of-i-51c07ba6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10931%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Umami%20Analytics&amp;severity=low&amp;id=6902a10ed6627ef5904a7ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10928-cwe-307-improper-restriction-of-exc-6c155f5f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10928%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Drupal%20Access%20code&amp;severity=medium&amp;id=6902a10ed6627ef5904a7aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10927-cwe-79-improper-neutralization-of-i-0788e1e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10927%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Plausible%20tracking&amp;severity=medium&amp;id=6902a10ed6627ef5904a7aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10926-cwe-79-improper-neutralization-of-i-0f30e46c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10926%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20JSON%20Field&amp;severity=medium&amp;id=6902a10ed6627ef5904a7aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9954-cwe-862-missing-authorization-in-dru-0f631a23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9954%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Acquia%20DAM&amp;severity=high&amp;id=6902a10ed6627ef5904a7ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54549-cwe-347-improper-verification-of-cr-916649c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54549%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=medium&amp;id=69029c9ff29b216d6d6a4c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54548-cwe-200-exposure-of-sensitive-infor-3dd9e603</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54548%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=medium&amp;id=69029c9ff29b216d6d6a4c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54547-cwe-613-in-arista-networks-danz-mon-abbcb9b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54547%3A%20CWE-613%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=medium&amp;id=69029c9ff29b216d6d6a4c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54546-cwe-732-in-arista-networks-danz-mon-2bb9a658</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54546%3A%20CWE-732%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=high&amp;id=69029c9ff29b216d6d6a4c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54545-cwe-732-in-arista-networks-danz-mon-839b197b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54545%3A%20CWE-732%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=high&amp;id=69029c9ff29b216d6d6a4c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-nfc-relay-malware-to-clone-android-tap-d7689093</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20NFC%20Relay%20Malware%20to%20Clone%20Android%20Tap-to-Pay%20Transactions&amp;severity=medium&amp;id=69029784f29b216d6d62bfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61724-cwe-407-inefficient-algorithmic-com-bdc8fdca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61724%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20net%2Ftextproto&amp;severity=medium&amp;id=69029404f29b216d6d5e20db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58183-cwe-400-uncontrolled-resource-consu-5f89bd3b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58183%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20archive%2Ftar&amp;severity=medium&amp;id=69029404f29b216d6d5e20b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58188-cwe-248-uncaught-exception-in-go-st-452ba3cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58188%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69029404f29b216d6d5e20c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58186-cwe-400-uncontrolled-resource-consu-c94217ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58186%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20net%2Fhttp&amp;severity=medium&amp;id=69029404f29b216d6d5e20bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58185-cwe-400-uncontrolled-resource-consu-25539bbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58185%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20encoding%2Fasn1&amp;severity=medium&amp;id=69029404f29b216d6d5e20b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47912-cwe-1286-improper-validation-of-syn-ab015c69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47912%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Go%20standard%20library%20net%2Furl&amp;severity=medium&amp;id=69029404f29b216d6d5e20ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61723-cwe-407-inefficient-algorithmic-com-f02bb21a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61723%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20encoding%2Fpem&amp;severity=high&amp;id=69029404f29b216d6d5e20d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58189-cwe-117-improper-output-neutralizat-b638c8bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58189%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=medium&amp;id=69029404f29b216d6d5e20cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58187-cwe-407-inefficient-algorithmic-com-fc38edee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58187%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69029404f29b216d6d5e20c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61725-cwe-407-inefficient-algorithmic-com-793630da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61725%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20net%2Fmail&amp;severity=high&amp;id=69029406f29b216d6d5e20ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61959-cwe-209-generation-of-error-message-c46868e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61959%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Vertikal%20Systems%20Hospital%20Manager%20Backend%20Services&amp;severity=medium&amp;id=69028fd8779efea1caa7305b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54459-cwe-497-exposure-of-sensitive-syste-a3bbb673</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54459%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Vertikal%20Systems%20Hospital%20Manager%20Backend%20Services&amp;severity=high&amp;id=69028fd8779efea1caa73058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-disguised-with-invisible-de-60254b4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NPM%20Packages%20Disguised%20With%20&apos;Invisible&apos;%20Dependencies&amp;severity=low&amp;id=690281ce8daac4bcead4b020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-search-tools-easily-fooled-by-fake-content-a8c75471</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Search%20Tools%20Easily%20Fooled%20by%20Fake%20Content&amp;severity=medium&amp;id=69028f16779efea1caa6d31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dentsu-subsidiary-breached-employee-data-stolen-a6542214</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dentsu%20Subsidiary%20Breached%2C%20Employee%20Data%20Stolen&amp;severity=medium&amp;id=690281ce8daac4bcead4b023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11465-cwe-416-use-after-free-in-ashlar-ve-73982a09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11465%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=69027029ea3d051f22387348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11464-cwe-122-heap-based-buffer-overflow--5383a5e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11464%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=69027029ea3d051f22387345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11463-cwe-190-integer-overflow-or-wraparo-931f582f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11463%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=69027028ea3d051f22387342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9870-cwe-59-improper-link-resolution-befo-f063dc65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9870%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Razer%20Synapse%203&amp;severity=high&amp;id=69027029ea3d051f2238734b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9871-cwe-59-improper-link-resolution-befo-021a2f44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9871%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Razer%20Synapse%203&amp;severity=high&amp;id=69027029ea3d051f2238734e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9869-cwe-59-improper-link-resolution-befo-433a46ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9869%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Razer%20Synapse%203&amp;severity=high&amp;id=69026ca6ea3d051f2234935d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64104-cwe-89-improper-neutralization-of-s-5fe153a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64104%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20langchain-ai%20langgraph&amp;severity=high&amp;id=69026375e09a14ef713ad330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-look-at-polaredge-adjacent-infrastructure-bd6bad13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Smoking%20Gun%20Uncovered%3A%20RPX%20Relay%20at%20PolarEdge&apos;s%20Core%20Exposed&amp;severity=medium&amp;id=68e0f2efb66c7f7acdd19dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-scripts-to-systems-a-comprehensive-look-at-ta-edc5174a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Scripts%20to%20Systems%3A%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations&amp;severity=medium&amp;id=6902755fea3d051f2241b5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-october-2025-cyber-attacks-your-soc-cant-ign-6479382e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20October%202025%20Cyber%20Attacks%20Your%20SOC%20Can&apos;t%20Ignore&amp;severity=medium&amp;id=6902755fea3d051f2241b5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11232-cwe-823-use-of-out-of-range-pointer-ad8fa2cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11232%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20ISC%20Kea&amp;severity=high&amp;id=6902598f52c03fa7b6eb66e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-security-change-for-azure-vms-creates-pi-ffb6f9ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Security%20Change%20for%20Azure%20VMs%20Creates%20Pitfalls&amp;severity=medium&amp;id=690255ff52c03fa7b6e5ac3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62797-cwe-352-cross-site-request-forgery--dfc70b3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62797%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rathena%20FluxCP&amp;severity=high&amp;id=6902561b52c03fa7b6e5bf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1549-cwe-77-improper-neutralization-of-sp-f30a95b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1549%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20WatchGuard%20Mobile%20VPN%20with%20SSL%20Client&amp;severity=medium&amp;id=69024872c461420f24c8f564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12479-cwe-352-cross-site-request-forgery--adbd5512</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12479%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=69024872c461420f24c8f561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12478-cwe-326-inadequate-encryption-stren-0796a748</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12478%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690244f5c461420f24c54244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12477-cwe-306-missing-authentication-for--5d81e1ed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12477%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690244f5c461420f24c54241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12476-cwe-306-missing-authentication-for--785223db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12476%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690244f5c461420f24c5423e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-hijack-corporate-xwiki-servers-for-crypto--9073ddc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Hijack%20Corporate%20XWiki%20Servers%20for%20Crypto%20Mining&amp;severity=medium&amp;id=6902400de6b2d94ab7036e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/botnets-step-up-cloud-attacks-via-flaws-misconfigu-56c29260</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Botnets%20Step%20Up%20Cloud%20Attacks%20Via%20Flaws%2C%20Misconfigurations&amp;severity=medium&amp;id=69026876e09a14ef7141f993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-npm-packages-caught-stealing-developer-credenti-5b906cd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20npm%20Packages%20Caught%20Stealing%20Developer%20Credentials%20on%20Windows%2C%20macOS%2C%20and%20Linux&amp;severity=high&amp;id=69023d22b9e127f7a36f1099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-target-ukrainian-organizations-usi-676e7bfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Target%20Ukrainian%20Organizations%20Using%20Stealthy%20Living-Off-the-Land%20Tactics&amp;severity=high&amp;id=69023d22b9e127f7a36f109d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-reports-sharp-increase-in-automated-botnet-84315c2e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Reports%20Sharp%20Increase%20in%20Automated%20Botnet%20Attacks%20Targeting%20PHP%20Servers%20and%20IoT%20Devices&amp;severity=medium&amp;id=69023607b9e127f7a36545eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12148-cwe-200-exposure-of-sensitive-infor-e1f04e9a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12148%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69023631b9e127f7a3656331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14012-cwe-426-untrusted-search-path-in-re-966cba5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14012%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Revenera%20InstallShield&amp;severity=high&amp;id=69023631b9e127f7a365632e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12147-cwe-200-exposure-of-sensitive-infor-a2555f16</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12147%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69023421b9e127f7a363597f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/which-social-media-are-the-most-privacy-oriented-i-6df90d71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Which%20social%20media%20are%20the%20most%20privacy-oriented%20in%202025%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69022fd983bae5e856672194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58269-cwe-532-insertion-of-sensitive-info-892443ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58269%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SUSE%20rancher&amp;severity=medium&amp;id=69022c4683bae5e8566219d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ai-targeted-cloaking-attack-tricks-ai-crawlers-1b2fba5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20AI-Targeted%20Cloaking%20Attack%20Tricks%20AI%20Crawlers%20Into%20Citing%20Fake%20Info%20as%20Verified%20Facts&amp;severity=medium&amp;id=69025c2652c03fa7b6eeccaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32199-cwe-281-improper-preservation-of-pe-6d66cde8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32199%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20SUSE%20rancher&amp;severity=medium&amp;id=69022c4683bae5e8566219ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10932-cwe-400-uncontrolled-resource-consu-8a9cae93</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10932%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Progress%20MOVEit%20Transfer&amp;severity=high&amp;id=690226d083bae5e8565b1722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-unveils-attck-v18-with-updates-to-detections-1ab94de5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Unveils%20ATT%26CK%20v18%20With%20Updates%20to%20Detections%2C%20Mobile%2C%20ICS&amp;severity=medium&amp;id=69021a6014cc779bff04bff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64150-vulnerability-in-jenkins-project-je-a837192d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64150%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Publish%20to%20Bitbucket%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64149-vulnerability-in-jenkins-project-je-f0977504</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64149%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Publish%20to%20Bitbucket%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64148-vulnerability-in-jenkins-project-je-2ede9281</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64148%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Publish%20to%20Bitbucket%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64147-vulnerability-in-jenkins-project-je-dc873849</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64147%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Curseforge%20Publisher%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05107f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64146-vulnerability-in-jenkins-project-je-0e12b12f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64146%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Curseforge%20Publisher%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64145-vulnerability-in-jenkins-project-je-f08e6f2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64145%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20ByteGuard%20Build%20Actions%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64144-vulnerability-in-jenkins-project-je-e92ac7d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64144%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20ByteGuard%20Build%20Actions%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64143-vulnerability-in-jenkins-project-je-ff876257</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64143%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20OpenShift%20Pipeline%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64142-vulnerability-in-jenkins-project-je-f58a1c98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64142%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nexus%20Task%20Runner%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64141-vulnerability-in-jenkins-project-je-23e863f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64141%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nexus%20Task%20Runner%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05106c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64140-vulnerability-in-jenkins-project-je-fde60171</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64140%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Azure%20CLI%20Plugin&amp;severity=high&amp;id=69021a8414cc779bff050feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64139-vulnerability-in-jenkins-project-je-efe70d08</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64139%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Start%20Windocks%20Containers%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64138-vulnerability-in-jenkins-project-je-025e7dad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64138%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Start%20Windocks%20Containers%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64137-vulnerability-in-jenkins-project-je-a92f410b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64137%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Themis%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64136-vulnerability-in-jenkins-project-je-4453b905</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64136%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Themis%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64135-vulnerability-in-jenkins-project-je-b2b2a89c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64135%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Eggplant%20Runner%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64134-vulnerability-in-jenkins-project-je-b4a24dd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64134%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20JDepend%20Plugin&amp;severity=high&amp;id=69021a8414cc779bff050fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64133-vulnerability-in-jenkins-project-je-bdfec17d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64133%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Extensible%20Choice%20Parameter%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64132-vulnerability-in-jenkins-project-je-be245172</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64132%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20MCP%20Server%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64131-vulnerability-in-jenkins-project-je-14782c0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64131%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20SAML%20Plugin&amp;severity=high&amp;id=69021a8414cc779bff050fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/suspected-nation-state-threat-actor-uses-new-airst-3cd86ab2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Suspected%20Nation-State%20Threat%20Actor%20Uses%20New%20Airstalk%20Malware%20in%20a%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=690216e314cc779bff00702a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11587-cwe-862-missing-authorization-in-jg-9e2672d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11587%3A%20CWE-862%20Missing%20Authorization%20in%20jgrietveld%20Call%20Now%20Button%20%E2%80%93%20The%20%231%20Click%20to%20Call%20Button%20for%20WordPress&amp;severity=medium&amp;id=69020d512a3e20b1cb02a670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11632-cwe-862-missing-authorization-in-jg-f713491e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11632%3A%20CWE-862%20Missing%20Authorization%20in%20jgrietveld%20Call%20Now%20Button%20%E2%80%93%20The%20%231%20Click%20to%20Call%20Button%20for%20WordPress&amp;severity=medium&amp;id=69020d512a3e20b1cb02a675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12142-cwe-120-buffer-copy-without-checkin-06391073</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12142%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ABB%20Terra%20AC%20wallbox&amp;severity=medium&amp;id=690204523aaa02566521b4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/preparing-for-the-digital-battlefield-of-2026-ghos-2ad8e93c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Preparing%20for%20the%20Digital%20Battlefield%20of%202026%3A%20Ghost%20Identities%2C%20Poisoned%20Accounts%2C%20%26%20AI%20Agent%20Havoc&amp;severity=medium&amp;id=690212ea2a3e20b1cb0af1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-target-ukrainian-organizations-usi-decc4b12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Target%20Ukrainian%20Organizations%20Using%20Stealthy%20Living-Off-the-Land%20Tactics&amp;severity=medium&amp;id=690212ea2a3e20b1cb0af200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberridge-emerges-from-stealth-with-26-million-fo-a1dcd543</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CyberRidge%20Emerges%20From%20Stealth%20With%20%2426%20Million%20for%20Photonic%20Encryption%20Solution&amp;severity=medium&amp;id=6901ff873aaa02566519c5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xwiki-vulnerability-exploited-in-cryptocurrency-mi-ed45fbf3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWiki%20Vulnerability%20Exploited%20in%20Cryptocurrency%20Mining%20Operation&amp;severity=medium&amp;id=6901f6848cf71dc7fdc07f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12461-cwe-522-insufficiently-protected-cr-f7089a96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12461%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Grupo%20Castilla%20Epsilon%20RH&amp;severity=medium&amp;id=6901f6a28cf71dc7fdc086b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-trigona-threat-actors-latest-attack-ca-ee5b0ab6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Trigona%20Threat%20Actor&apos;s%20Latest%20Attack%20Cases&amp;severity=medium&amp;id=6901f6978cf71dc7fdc08496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostgrab-android-malware-132acc8e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GHOSTGRAB%20ANDROID%20MALWARE&amp;severity=medium&amp;id=6901f6978cf71dc7fdc084a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/team46-and-taxoff-two-sides-of-the-same-coin-1179b947</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Team46%20and%20TaxOff%3A%20Two%20Sides%20of%20the%20Same%20Coin&amp;severity=medium&amp;id=6901f1da8cf71dc7fdb8619b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ad-and-pr-giant-dentsu-says-hackers-stole-merkle-d-db990c1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ad%20and%20PR%20Giant%20Dentsu%20Says%20Hackers%20Stole%20Merkle%20Data&amp;severity=medium&amp;id=6901f1cc8cf71dc7fdb84caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-eys-cloud-went-public-4tb-time-bomb-neo-securi-4e1d5f32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20EY&apos;s%20cloud%20went%20public.%204TB%20Time%20Bomb%20-%20Neo%20Security%20Labs&amp;severity=medium&amp;id=6901ee588cf71dc7fdb4878c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-two-more-actively-exploited-dassault-32c23902</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20warns%20of%20two%20more%20actively%20exploited%20Dassault%20vulnerabilities&amp;severity=high&amp;id=6901e4c367364219a65adb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-abuses-wsl-to-run-linux-encryptor-a01d069e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20ransomware%20abuses%20WSL%20to%20run%20Linux%20encryptors%20in%20Windows&amp;severity=high&amp;id=6901e4c367364219a65adb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-teefail-side-channel-attack-extracts-secrets-f-01167ddc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TEE.Fail%20Side-Channel%20Attack%20Extracts%20Secrets%20from%20Intel%20and%20AMD%20DDR5%20Secure%20Enclaves&amp;severity=high&amp;id=6901e4c367364219a65adb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/advertising-giant-dentsu-reports-data-breach-at-su-727ac59a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Advertising%20giant%20Dentsu%20reports%20data%20breach%20at%20subsidiary%20Merkle&amp;severity=high&amp;id=6901e4c367364219a65adb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-botnet-shifts-from-ddos-to-residential-prox-c0191837</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20Botnet%20Shifts%20from%20DDoS%20to%20Residential%20Proxies&amp;severity=high&amp;id=6901e4c367364219a65adb8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/herodotus-android-malware-mimics-human-typing-to-e-1dd4d6a3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Herodotus%20Android%20malware%20mimics%20human%20typing%20to%20evade%20detection&amp;severity=medium&amp;id=6901e4c367364219a65adb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-to-turn-https-on-by-default-for-public-site-a0c59282</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20to%20Turn%20HTTPS%20on%20by%20Default%20for%20Public%20Sites&amp;severity=medium&amp;id=6901e4a267364219a65ac38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12450-cwe-79-improper-neutralization-of-i-cad3a62c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litespeedtech%20LiteSpeed%20Cache&amp;severity=medium&amp;id=6901dfdacaab5f688cecedce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64291-improper-neutralization-of-input-du-5654c0fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64291%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premmerce%20Premmerce%20User%20Roles&amp;severity=medium&amp;id=6901d66086d093201c2b6248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64290-cross-site-request-forgery-csrf-in--ed7d957c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64290%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Premmerce%20Premmerce%20Product%20Search%20for%20WooCommerce&amp;severity=medium&amp;id=6901d66086d093201c2b6245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64289-improper-neutralization-of-input-du-2caa9d00</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premmerce%20Premmerce%20Product%20Search%20for%20WooCommerce&amp;severity=medium&amp;id=6901d66086d093201c2b6242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64286-cross-site-request-forgery-csrf-in--c6779568</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64286%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WpEstate%20WP%20Rentals&amp;severity=medium&amp;id=6901d66086d093201c2b623f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64285-missing-authorization-in-premmerce--f076ce9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64285%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20Wholesale%20Pricing%20for%20WooCommerce&amp;severity=medium&amp;id=6901d66086d093201c2b623c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64283-authorization-bypass-through-user-c-34d24bfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64283%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Rometheme%20RTMKit&amp;severity=medium&amp;id=6901d66086d093201c2b6239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64229-missing-authorization-in-boldgrid-c-eb9f2f4d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64229%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=medium&amp;id=6901d66086d093201c2b6236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64228-exposure-of-sensitive-system-inform-d6ec4dac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64228%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20FantasticPlugins%20SUMO%20Affiliates%20Pro&amp;severity=medium&amp;id=6901d65e86d093201c2b6191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64226-cross-site-request-forgery-csrf-in--9e1033b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64226%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20colabrio%20Stockie%20Extra&amp;severity=medium&amp;id=6901d65e86d093201c2b618e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64220-improper-neutralization-of-input-du-ad07a313</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64220%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ReyCommerce%20Rey%20Core&amp;severity=medium&amp;id=6901d65e86d093201c2b618b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64219-missing-authorization-in-strategy11-4a49f173</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64219%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Business%20Directory&amp;severity=medium&amp;id=6901d65e86d093201c2b6188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64216-improper-control-of-filename-for-in-0697eb9a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64216%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeSphere%20SmartMag&amp;severity=high&amp;id=6901d65e86d093201c2b6185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64212-missing-authorization-in-stylemixth-b08a53d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64212%3A%20Missing%20Authorization%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=medium&amp;id=6901d65e86d093201c2b6182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64211-missing-authorization-in-stylemixth-324169c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64211%3A%20Missing%20Authorization%20in%20StylemixThemes%20Masterstudy%20Elementor%20Widgets&amp;severity=medium&amp;id=6901d65e86d093201c2b617f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64210-missing-authorization-in-stylemixth-3de49d9a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64210%3A%20Missing%20Authorization%20in%20StylemixThemes%20Masterstudy%20Elementor%20Widgets&amp;severity=medium&amp;id=6901d65e86d093201c2b617c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64208-improper-neutralization-of-input-du-4b222e06</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64208%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TieLabs%20Jannah%20-%20Extensions&amp;severity=medium&amp;id=6901d65e86d093201c2b6179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64204-improper-neutralization-of-input-du-f7dadb6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64204%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeSphere%20SmartMag&amp;severity=medium&amp;id=6901d65e86d093201c2b6176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64202-improper-neutralization-of-input-du-1b941b7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64202%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TieLabs%20Sahifa&amp;severity=medium&amp;id=6901d65c86d093201c2b463f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64201-cross-site-request-forgery-csrf-in--543eedb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64201%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=medium&amp;id=6901d65c86d093201c2b463c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64200-improper-neutralization-of-input-du-a701cb09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64200%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20Email%20Template%20Customizer%20for%20WooCommerce&amp;severity=medium&amp;id=6901d65c86d093201c2b4639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64199-missing-authorization-in-wpestate-w-527b922b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64199%3A%20Missing%20Authorization%20in%20WpEstate%20wpresidence&amp;severity=medium&amp;id=6901d65c86d093201c2b4636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64197-improper-neutralization-of-input-du-fe5e9cc7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64197%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sizam%20Rehub&amp;severity=medium&amp;id=6901d65c86d093201c2b4633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64195-improper-control-of-filename-for-in-2c84f972</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64195%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20Eduma&amp;severity=high&amp;id=6901d65c86d093201c2b4630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64194-improper-neutralization-of-input-du-d4b6aa70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64194%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20Eduma&amp;severity=medium&amp;id=6901d65c86d093201c2b462d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60075-cross-site-request-forgery-csrf-in--f2ba5def</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60075%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Allegro%20Marketing%20hpb%20seo%20plugin%20for%20WordPress&amp;severity=high&amp;id=6901d65c86d093201c2b462a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58939-cross-site-request-forgery-csrf-in--6da036ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58939%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=medium&amp;id=6901d65c86d093201c2b4627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58711-missing-authorization-in-solwin-blo-568d49c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58711%3A%20Missing%20Authorization%20in%20solwin%20Blog%20Designer%20PRO&amp;severity=medium&amp;id=6901d65c86d093201c2b4624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-npm-packages-caught-stealing-developer-credenti-f2bbe61e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20npm%20Packages%20Caught%20Stealing%20Developer%20Credentials%20on%20Windows%2C%20macOS%2C%20and%20Linux&amp;severity=medium&amp;id=6901f64a8cf71dc7fdc00fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-delmia-factory-software-vu-44b6e187</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20DELMIA%20Factory%20Software%20Vulnerabilities&amp;severity=medium&amp;id=6901d10486d093201c2485b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-attack-targets-ddr5-memory-to-steal-keys-from--737dd12c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Attack%20Targets%20DDR5%20Memory%20to%20Steal%20Keys%20From%20Intel%20and%20AMD%20TEEs&amp;severity=medium&amp;id=6901c83eb4ac2fa6696c05be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-exploits-hit-dassault-and-xwiki-cisa-confir-b5a0c7e4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Exploits%20Hit%20Dassault%20and%20XWiki%20%E2%80%94%20CISA%20Confirms%20Critical%20Flaws%20Under%20Attack&amp;severity=critical&amp;id=6901dc1786d093201c32a356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7320-cwe-200-exposure-of-sensitive-inform-25d7f739</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7320%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20automattic%20WooCommerce&amp;severity=medium&amp;id=6901bb2cc38b57fedae38b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9544-cwe-862-missing-authorization-in-dop-222b5114</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9544%3A%20CWE-862%20Missing%20Authorization%20in%20Doppler%20Forms&amp;severity=medium&amp;id=6901af7f6b54f8e6682010d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-firms-see-surge-in-ai-powered-attack-36403765</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20Firms%20See%20Surge%20in%20AI-Powered%20Attacks%20Across%20Africa&amp;severity=medium&amp;id=6901af5e6b54f8e6681ff0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attacker-target-vscode-extension-marketplace-ide-p-c19644a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attacker%20Target%20VSCode%20Extension%20Marketplace%2C%20IDE%20Plugins%20Face%20Higher%20Supply%20Chain%20Attack%20Risks&amp;severity=medium&amp;id=6901a34214defc143b949662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-collect-memory-only-filesystems-on-linux-sy-263a639d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems%2C%20(Wed%2C%20Oct%2029th)&amp;severity=medium&amp;id=69019e7314defc143b8e8dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49042-cwe-79-improper-neutralization-of-i-802e71d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Automattic%20WooCommerce&amp;severity=null&amp;id=6901a8d56b54f8e6681812fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62776-uncontrolled-search-path-element-in-8a38e015</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62776%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Wireless%20Tsukamoto%20Co.%2C%20Ltd.%20WTW%20EAGLE%20(for%20Windows)&amp;severity=high&amp;id=69019e3e14defc143b8e5540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11705-cwe-862-missing-authorization-in-sc-2c285992</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11705%3A%20CWE-862%20Missing%20Authorization%20in%20scheeeli%20Anti-Malware%20Security%20and%20Brute-Force%20Firewall&amp;severity=medium&amp;id=69019e3e14defc143b8e553c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64296-cwe-862-missing-authorization-in-fa-9f48e531</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64296%3A%20Missing%20Authorization%20in%20Facebook%20Facebook%20for%20WooCommerce&amp;severity=null&amp;id=690194de28becc2dd67dfacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57931-cwe-352-cross-site-request-forgery--ef26ba33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57931%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Popup%20box&amp;severity=null&amp;id=690194de28becc2dd67dfac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-indias-largest-automaker-tata-motors-60604083</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20India&apos;s%20largest%20automaker%3A%20Tata%20Motors&amp;severity=medium&amp;id=690170ca3499185cc34fea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-generated-code-poses-security-bloat-challenges-6d3d0232</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Generated%20Code%20Poses%20Security%2C%20Bloat%20Challenges&amp;severity=medium&amp;id=69026876e09a14ef7141f999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xctdh-crypto-heist-part-2-ellis-stannard-ea905212</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCTDH%20Crypto%20Heist%20Part%202%20-%20Ellis%20Stannard&amp;severity=medium&amp;id=6903ded8aebfcd54749e6436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-29-43a4812c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-29&amp;severity=medium&amp;id=6902ae2004b4f2cbf9067471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60320-na-eeabd0fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60320%3A%20n%2Fa&amp;severity=medium&amp;id=69026ca6ea3d051f22349360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61876-na-d0d8dcbb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61876%3A%20n%2Fa&amp;severity=medium&amp;id=69026375e09a14ef713ad32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57227-na-e69ee319</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57227%3A%20n%2Fa&amp;severity=high&amp;id=6902561b52c03fa7b6e5bf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61234-na-3268eb37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61234%3A%20n%2Fa&amp;severity=high&amp;id=69024872c461420f24c8f55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56558-na-2e0ec680</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56558%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Dyson%20MQTT%20server&amp;severity=low&amp;id=69024872c461420f24c8f55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60595-na-dc72a69c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60595%3A%20n%2Fa&amp;severity=high&amp;id=690244f5c461420f24c54247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60542-na-605053ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60542%3A%20n%2Fa&amp;severity=medium&amp;id=69023421b9e127f7a3635987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60898-na-03be67a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60898%3A%20n%2Fa&amp;severity=medium&amp;id=69023421b9e127f7a3635983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63622-na-ba164808</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63622%3A%20n%2Fa&amp;severity=critical&amp;id=69022fcb83bae5e85666db54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61429-na-fbc4b30f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61429%3A%20n%2Fa&amp;severity=high&amp;id=69022fcb83bae5e85666db51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61156-na-7864386f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61156%3A%20n%2Fa&amp;severity=high&amp;id=69022c4683bae5e8566219d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45162-na-0d1cad9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45162%3A%20n%2Fa&amp;severity=critical&amp;id=690222c7d3833ffc6eb7191e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45161-na-222c67bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45161%3A%20n%2Fa&amp;severity=medium&amp;id=690222c7d3833ffc6eb7191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61161-na-578ef76c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61161%3A%20n%2Fa&amp;severity=high&amp;id=690222c7d3833ffc6eb71916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casdoor-2950-cross-site-request-forgery-csrf-3b50a255</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casdoor%202.95.0%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=6901b966c38b57fedaddc1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4665-cwe-89-improper-neutralization-of-sp-5cca9eab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4665%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WordPress%20Contact%20Form%207%20Database%20Addon%20CFDB7%20By%20Arshid%20CFDB7&amp;severity=critical&amp;id=69015aaf30d110a1a6d3e830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-data-on-insider-threats-what-1000-real--19ddb8a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Data%20on%20Insider%20Threats%3A%20What%201%2C000%20Real%20Cases%20Reveal%20About%20Hidden%20Risk&amp;severity=medium&amp;id=6902049e3aaa02566521ca6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-leaks-att-carrier-records-deman-a766ddd9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Leaks%20AT%26T%20Carrier%20Records%2C%20Demands%20%241M%20for%20Dublin%20Airport%20Passenger%20Data&amp;severity=medium&amp;id=69014702608506ea4395e4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64095-cwe-434-unrestricted-upload-of-file-9698bbb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64095%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dnnsoftware%20Dnn.Platform&amp;severity=critical&amp;id=6901419f608506ea438f86a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64094-cwe-79-improper-neutralization-of-i-b32ddcd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64094%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=6901419f608506ea438f86a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62802-cwe-1188-insecure-default-initializ-0a28b162</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62802%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69013a71995b0464d953776b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62801-cwe-78-improper-neutralization-of-s-57fdd28c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62801%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jlowin%20fastmcp&amp;severity=medium&amp;id=69013a71995b0464d9537768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-soc-teams-operationalize-real-time-defense-aga-4dd49a09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20SOC%20Teams%20Operationalize%20Real-Time%20Defense%20Against%20Credential%20Replay%20Attacks&amp;severity=medium&amp;id=69013a76995b0464d9538345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62800-cwe-79-improper-neutralization-of-i-f3956d20</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62800%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jlowin%20fastmcp&amp;severity=medium&amp;id=69013a71995b0464d953776e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62798-cwe-79-improper-neutralization-of-i-1018d9fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62798%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20code16%20sharp&amp;severity=medium&amp;id=6901300969001fc67a67b9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62794-cwe-522-insufficiently-protected-cr-af93f1a2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62794%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20RichardoC%20github-workflow-updater-extension&amp;severity=low&amp;id=6901300969001fc67a67b9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43017-cwe-250-execution-with-unnecessary--8c723362</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43017%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20HP%20Inc.%20HP%20ThinPro%208.1&amp;severity=high&amp;id=69012c8569001fc67a62663e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ai-trust-paradox-why-security-teams-fear-autom-273985f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AI%20Trust%20Paradox%3A%20Why%20Security%20Teams%20Fear%20Automated%20Remediation&amp;severity=medium&amp;id=69055f4871a6fc4aff35929c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/youtube-ghost-network-utilizes-spooky-tactics-to-t-e9b83789</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YouTube%20Ghost%20Network%20Utilizes%20Spooky%20Tactics%20to%20Target%20Users&amp;severity=medium&amp;id=69016ef83499185cc34fb172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11374-cwe-770-allocation-of-resources-wit-13136369</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11374%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=6901290f69001fc67a5e1760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62727-cwe-407-inefficient-algorithmic-com-22b7a8fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62727%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Kludex%20starlette&amp;severity=high&amp;id=690126348f7e67aef0117ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11375-cwe-770-allocation-of-resources-wit-2325c23e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11375%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=690126348f7e67aef0117de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62368-cwe-502-deserialization-of-untruste-97e46c7f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62368%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20taigaio%20taiga-back&amp;severity=critical&amp;id=690126348f7e67aef0117dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-ebs-attack-victims-may-be-more-numerous-tha-375cf505</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20EBS%20Attack%20Victims%20May%20Be%20More%20Numerous%20Than%20Expected&amp;severity=medium&amp;id=69016ef83499185cc34fb175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62367-cwe-89-improper-neutralization-of-s-65aff5ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62367%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20taigaio%20taiga-back&amp;severity=medium&amp;id=690122b38f7e67aef00c128e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59837-cwe-918-server-side-request-forgery-fe9f7df8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59837%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=high&amp;id=690122b38f7e67aef00c1291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27093-cwe-284-improper-access-control-in--0e852adf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27093%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69011c4b8f31b6f061ed5cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-teefail-side-channel-attack-extracts-secrets-f-fba67eff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TEE.Fail%20Side-Channel%20Attack%20Extracts%20Secrets%20from%20Intel%20and%20AMD%20DDR5%20Secure%20Enclaves&amp;severity=low&amp;id=6901629430d110a1a6e799c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40843-cwe-121-stack-based-buffer-overflow-008a5fe1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40843%3A%20CWE-121%20Stack%20based%20buffer%20overflow%20in%20Ericsson%20CodeChecker&amp;severity=medium&amp;id=6901125021370b3f606d87be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-malware-mimics-human-behavior-to-evade-74f1b687</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Malware%20Mimics%20Human%20Behavior%20to%20Evade%20Detection&amp;severity=medium&amp;id=690118ba8f31b6f061e7a729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12425-cwe-269-improper-privilege-manageme-5cc68efa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12425%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6901154e8f31b6f061e30bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12424-cwe-269-improper-privilege-manageme-ac110a5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12424%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690116f28f31b6f061e5f1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12423-cwe-248-uncaught-exception-in-azure-9b7c3217</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12423%3A%20CWE-248%20Uncaught%20Exception%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6901154e8f31b6f061e30bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12422-cwe-22-improper-limitation-of-a-pat-d501cd78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12422%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6901089f8bc57bfc69a7043b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stragglers-from-myanmar-scam-center-raided-by-army-9f8dda96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stragglers%20From%20Myanmar%20Scam%20Center%20Raided%20by%20Army%20Cross%20Into%20Thailand%20as%20Buildings%20are%20Blown%20Up&amp;severity=low&amp;id=6900ff80c2498ce55d2bc08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-atroposia-malware-comes-with-a-local-vulnerabi-20e6f9ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Atroposia%20malware%20comes%20with%20a%20local%20vulnerability%20scanner&amp;severity=high&amp;id=6900fc0ec2498ce55d254038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bidi-swap-the-bidirectional-text-trick-that-makes--fe9a50ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BiDi%20Swap%3A%20The%20bidirectional%20text%20trick%20that%20makes%20fake%20URLs%20look%20real&amp;severity=high&amp;id=6900fc0ec2498ce55d25403c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-group-claimed-the-hack-of-swedens-power-gr-24b37274</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20group%20claimed%20the%20hack%20of%20Sweden%E2%80%99s%20power%20grid%20operator%20Svenska%20kraftn%C3%A4t&amp;severity=medium&amp;id=6900fc0ec2498ce55d254040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-trojan-herodotus-outsmarts-anti-fraud--d986d67a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Trojan%20&apos;Herodotus&apos;%20Outsmarts%20Anti-Fraud%20Systems%20by%20Typing%20Like%20a%20Human&amp;severity=medium&amp;id=6901629430d110a1a6e799c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-ghostcall-and-ghosthire-bluenor-12ab82a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20GhostCall%20and%20GhostHire%3A%20BlueNoroff&apos;s%20New%20Malware%20Chains&amp;severity=medium&amp;id=6901629430d110a1a6e799c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-bluenoroff-expands-scope-of-crypto-he-7c298672</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea&apos;s%20BlueNoroff%20Expands%20Scope%20of%20Crypto%20Heists&amp;severity=medium&amp;id=69016ef83499185cc34fb178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36386-cwe-305-authentication-bypass-by-pr-4ac640d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36386%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IBM%20IBM%20Maximo%20Application%20Suite&amp;severity=critical&amp;id=6900e9469137f7a53a1f9d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34294-cwe-367-time-of-check-time-of-use-t-3f5579b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34294&amp;severity=null&amp;id=6900f0e28b5ca1e4f6b448e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostcall-and-ghosthire-two-campaigns-by-bluenorof-0f247596</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostCall%20and%20GhostHire%20%E2%80%94%20two%20campaigns%20by%20BlueNoroff&amp;severity=medium&amp;id=6900e057d44cb7cb5001080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hack-cessibility-when-dll-hijacks-meet-windows-hel-48f72209</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hack-cessibility%3A%20When%20DLL%20Hijacks%20Meet%20Windows%20Helpers&amp;severity=medium&amp;id=6900dcd5d44cb7cb50fc4e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36085-cwe-918-server-side-request-forgery-d20f33cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36085%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=6900dcd1d44cb7cb50fc4af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36083-cwe-244-improper-clearing-of-heap-m-36294c47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36083%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=6900dae71e78ed0e58915f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36081-cwe-117-improper-output-neutralizat-be7dce55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36081%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=6900dae71e78ed0e58915f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-netbak-pc-agent-affected-by-recent-aspnet-cor-5267e80f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20NetBak%20PC%20Agent%20Affected%20by%20Recent%20ASP.NET%20Core%20Vulnerability&amp;severity=critical&amp;id=6900daca1e78ed0e58913f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34311-cwe-78-improper-neutralization-of-s-d104dfe3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34311%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IPFire.org%20IPFire&amp;severity=high&amp;id=6900d7521e78ed0e5889e0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34312-cwe-78-improper-neutralization-of-s-e8879c01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34312%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IPFire.org%20IPFire&amp;severity=high&amp;id=6900d7521e78ed0e5889e0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34304-cwe-89-improper-neutralization-of-s-74be124f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34304%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IPFire.org%20IPFire&amp;severity=high&amp;id=6900d7521e78ed0e5889e099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34307-cwe-79-improper-neutralization-of-i-08ef4284</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34307%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34306-cwe-79-improper-neutralization-of-i-f1d199a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34306%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34308-cwe-79-improper-neutralization-of-i-ebace10f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34318-cwe-79-improper-neutralization-of-i-166f58e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7531e78ed0e5889e100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34317-cwe-79-improper-neutralization-of-i-5203fde9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34317%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7531e78ed0e5889e0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34309-cwe-79-improper-neutralization-of-i-8d7e12f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34309%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34301-cwe-79-improper-neutralization-of-i-b5ff6af4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34301%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34316-cwe-79-improper-neutralization-of-i-f38b43c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7531e78ed0e5889e0f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34305-cwe-79-improper-neutralization-of-i-702fb559</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34310-cwe-79-improper-neutralization-of-i-b178f180</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34310%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34315-cwe-79-improper-neutralization-of-i-ada648a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34315%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34302-cwe-79-improper-neutralization-of-i-5b560915</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34314-cwe-79-improper-neutralization-of-i-6f36ab4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34313-cwe-79-improper-neutralization-of-i-edf0a3d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34303-cwe-79-improper-neutralization-of-i-6af4e558</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redtiger-malware-steals-data-discord-tokens-and-ev-1e79c588</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedTiger%20Malware%20Steals%20Data%2C%20Discord%20Tokens%20and%20Even%20Webcam%20Images&amp;severity=medium&amp;id=6900d1661db591194a8911e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12380-use-after-free-in-webgpu-internals--f33cb850</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12380%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6900d1771db591194a8915da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/turbomirai-class-aisuru-botnet-blamed-for-20-tbps--3c9d5e2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TurboMirai-Class%20%E2%80%98Aisuru%E2%80%99%20Botnet%20Blamed%20for%2020%2B%20Tbps%20DDoS%20Attacks&amp;severity=medium&amp;id=6900cdd91db591194a82376b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53855-cwe-787-out-of-bounds-write-in-gcc--67a350fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53855%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20GCC%20Productions%20Inc.%20Fade%20In&amp;severity=high&amp;id=6900ca721db591194a7e02b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53814-cwe-416-use-after-free-in-gcc-produ-261d3773</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53814%3A%20CWE-416%3A%20Use%20After%20Free%20in%20GCC%20Productions%20Inc.%20Fade%20In&amp;severity=high&amp;id=6900ca721db591194a7e02b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12103-incorrect-privilege-assignment-in-r-a5738811</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12103%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%203.0&amp;severity=medium&amp;id=6900c82a05cd0025c8e834e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12390-session-fixation-in-red-hat-red-hat-8209dbcd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12390%3A%20Session%20Fixation%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=6900c82a05cd0025c8e834e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-payments-hit-record-low-only-23-pay-in--897eb089</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20payments%20hit%20record%20low%3A%20only%2023%25%20Pay%20in%20Q3%202025&amp;severity=low&amp;id=6900bf0feaec14ffc64824b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1038-cwe-78-improper-neutralization-of-sp-0528c4c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1038%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hitachi%20Energy%20TropOS%204th%20Gen&amp;severity=high&amp;id=6900b80ceaec14ffc63cb7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1037-cwe-269-improper-privilege-managemen-9d72790e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1037%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Hitachi%20Energy%20TropOS%204th%20Gen&amp;severity=high&amp;id=6900b80ceaec14ffc63cb7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1036-cwe-78-improper-neutralization-of-sp-6880a802</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1036%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hitachi%20Energy%20TropOS%204th%20Gen&amp;severity=high&amp;id=6900b5d793060580263d9ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/industrial-giants-schneider-electric-and-emerson-n-21d0de32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Industrial%20Giants%20Schneider%20Electric%20and%20Emerson%20Named%20as%20Victims%20of%20Oracle%20Hack&amp;severity=medium&amp;id=6900b25393060580263724dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9313-cwe-288-authentication-bypass-using--12c062cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9313%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Asseco%20Poland%20S.A.%20mMedica&amp;severity=critical&amp;id=6900aee0930605802632913a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ubuntu-kernel-lpe-6343474c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Ubuntu%20Kernel%20LPE!&amp;severity=medium&amp;id=6900acd316bbdbbc937764e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-trade-183-million-stolen-credential-6b0ca70b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Trade%20183%20Million%20Stolen%20Credentials%20on%20Telegram%2C%20Dark%20Forums&amp;severity=medium&amp;id=6900a5c016bbdbbc936b0aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-your-google-workspace-as-secure-as-you-think-it-af127eaf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20Your%20Google%20Workspace%20as%20Secure%20as%20You%20Think%20it%20is%3F&amp;severity=low&amp;id=6901629430d110a1a6e799cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-phishing-with-invisible-characters-in-the-subjec-cff17914</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line%2C%20(Tue%2C%20Oct%2028th)&amp;severity=medium&amp;id=69008f7868b9eefb8dadc43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mass-attack-targets-wordpress-sites-via-gutenkit-a-27c9c270</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mass%20Attack%20Targets%20WordPress%20Sites%20via%20GutenKit%20and%20Hunk%20Companion%20Plugins&amp;severity=medium&amp;id=690096201b1da53ce4946161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55758-cwe-352-cross-site-request-forgery--a4d534c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55758%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jdownloads.com%20JDownloads%20component%20for%20Joomla&amp;severity=medium&amp;id=690099981b1da53ce49acbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-swedish-power-grid-operator-a515a4ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20Swedish%20Power%20Grid%20Operator&amp;severity=medium&amp;id=690096091b1da53ce49450c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/memento-labs-the-ghost-of-hacking-team-has-returne-f9dd3870</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Memento%20Labs%2C%20the%20ghost%20of%20Hacking%20Team%2C%20has%20returned%20%E2%80%94%20or%20maybe%20it%20was%20never%20gone%20at%20all.&amp;severity=medium&amp;id=69008f9668b9eefb8dae1d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disputes-false-claims-of-massive-gmail-data-7e83c7b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20disputes%20false%20claims%20of%20massive%20Gmail%20data%20breach&amp;severity=high&amp;id=69008f9668b9eefb8dae1d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sidewinder-adopts-new-clickonce-based-attack-chain-1319ef9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SideWinder%20Adopts%20New%20ClickOnce-Based%20Attack%20Chain%20Targeting%20South%20Asian%20Diplomats&amp;severity=high&amp;id=69008bfc68b9eefb8da84dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41090-cwe-306-missing-authentication-for--c0b84407</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41090%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CCN-CERT%20microCLAUDIA&amp;severity=high&amp;id=69008c1568b9eefb8da85d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-zero-day-exploited-to-deliver-italian-memen-ddf9932f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Zero-Day%20Exploited%20to%20Deliver%20Italian%20Memento%20Labs&apos;%20LeetAgent%20Spyware&amp;severity=medium&amp;id=6901629430d110a1a6e799cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crafting-self-masking-functions-using-llvm-65e64f02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crafting%20self%20masking%20functions%20using%20LLVM&amp;severity=medium&amp;id=690079e4682198e57b19b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10151-cwe-667-improper-locking-in-softing-fdebb895</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10151%3A%20CWE-667%20Improper%20Locking%20in%20Softing%20Industrial%20Automation%20GmbH%20smartLink%20HW-PN&amp;severity=high&amp;id=6900734ec20c2200665f5b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10150-cwe-833-deadlock-in-softing-industr-f035f88f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10150%3A%20CWE-833%3A%20Deadlock%20in%20Softing%20Industrial%20Automation%20GmbH%20smartLink%20HW-PN&amp;severity=high&amp;id=6900734ec20c2200665f5b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12378-unrestricted-upload-in-code-project-f15752d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12378%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69005d1b5553ed2111ccc338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11735-cwe-89-improper-neutralization-of-s-6dba87c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11735%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=high&amp;id=69005d1b5553ed2111ccc334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10145-cwe-918-server-side-request-forgery-dcd0bf2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10145&amp;severity=null&amp;id=69005d1b5553ed2111ccc330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62777-use-of-hard-coded-credentials-in-pl-9fa12352</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62777%3A%20Use%20of%20hard-coded%20credentials%20in%20PLANEX%20COMMUNICATIONS%20INC.%20MZK-DP300N&amp;severity=high&amp;id=690053d57fd05562372c1e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sidewinder-adopts-new-clickonce-based-attack-chain-c9417719</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SideWinder%20Adopts%20New%20ClickOnce-Based%20Attack%20Chain%20Targeting%20South%20Asian%20Diplomats&amp;severity=medium&amp;id=6901629430d110a1a6e799d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypto-wasted-bluenoroffs-ghost-mirage-of-funding--7e49ab3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypto%20wasted%3A%20BlueNoroff%E2%80%99s%20ghost%20mirage%20of%20funding%20and%20jobs&amp;severity=medium&amp;id=69008f8b68b9eefb8dadcb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10939-uncontrolled-search-path-element-in-97508820</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10939%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69003706ba6dffc5e2309f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12347-unrestricted-upload-in-maxsite-cms-449bf3ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12347%3A%20Unrestricted%20Upload%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=690028ffba6dffc5e22648c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12346-unrestricted-upload-in-maxsite-cms-e3ffe8d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12346%3A%20Unrestricted%20Upload%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=690028ffba6dffc5e22648be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12344-unrestricted-upload-in-yonyou-u8-cl-ecedd8b6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12344%3A%20Unrestricted%20Upload%20in%20Yonyou%20U8%20Cloud&amp;severity=medium&amp;id=690021eeba6dffc5e22267fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12342-sql-injection-in-serdar-bayram-ghos-a4aa7fef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12342%3A%20SQL%20Injection%20in%20Serdar%20Bayram%20Ghost%20Hot%20Spot&amp;severity=medium&amp;id=6900176aba6dffc5e21fd5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12341-link-following-in-ermig1979-antidup-2858bc81</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12341%3A%20Link%20Following%20in%20ermig1979%20AntiDupl&amp;severity=high&amp;id=6900176aba6dffc5e21fd5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12339-sql-injection-in-campcodes-retro-ba-2dc798c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12339%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=690013efba6dffc5e21f118b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12338-sql-injection-in-campcodes-retro-ba-74389302</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12338%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=690013efba6dffc5e21f1184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12337-sql-injection-in-campcodes-retro-ba-f7470e68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12337%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=69000cd9ba6dffc5e21dd5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12336-sql-injection-in-campcodes-retro-ba-dcefa458</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12336%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=69000cd9ba6dffc5e21dd5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-28-80e3fb3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-28&amp;severity=medium&amp;id=69015a9b30d110a1a6d3c523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61235-na-d878544c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61235%3A%20n%2Fa&amp;severity=critical&amp;id=690122b38f7e67aef00c128b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60805-na-73841a13</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60805%3A%20n%2Fa&amp;severity=high&amp;id=69010ce521370b3f6065e07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61080-na-98592e86</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61080%3A%20n%2Fa&amp;severity=medium&amp;id=690101a38bc57bfc699ad6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60800-na-bb613e2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60800%3A%20n%2Fa&amp;severity=high&amp;id=6900ffacc2498ce55d2bf488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60355-na-01f45604</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60355%3A%20n%2Fa&amp;severity=critical&amp;id=6900ffacc2498ce55d2bf485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60354-na-24b62900</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60354%3A%20n%2Fa&amp;severity=high&amp;id=6900ffacc2498ce55d2bf482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54605-na-2b727aa4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54605%3A%20n%2Fa&amp;severity=high&amp;id=6900f88bc2498ce55d20aefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61155-na-377c9ca5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61155%3A%20n%2Fa&amp;severity=medium&amp;id=6900f0e28b5ca1e4f6b448ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60349-na-bbeedfff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60349%3A%20n%2Fa&amp;severity=high&amp;id=6900f0e28b5ca1e4f6b448e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54604-na-4ff0c0fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54604%3A%20n%2Fa&amp;severity=high&amp;id=6900ef4f8b5ca1e4f6b16412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60858-na-78780f8d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60858%3A%20n%2Fa&amp;severity=high&amp;id=6900e9469137f7a53a1f9d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56399-na-d99932dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56399%3A%20n%2Fa&amp;severity=high&amp;id=6900e5cb9137f7a53a1afc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61107-na-97ade869</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61107%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61106-na-a7777de9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61106%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61104-na-9f9825b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61104%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61103-na-22d8a93f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61103%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61128-na-9f129f2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61128%3A%20n%2Fa&amp;severity=critical&amp;id=6900dcd1d44cb7cb50fc4af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61043-na-08bc5af1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61043%3A%20n%2Fa&amp;severity=critical&amp;id=6900d7531e78ed0e5889e105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33133-cwe-787-out-of-bounds-write-in-ibm--0a0e7918</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33133%3A%20CWE-787%20Out-of-bounds%20Write%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33132-cwe-467-use-of-sizeof-on-a-pointer--9800ffc1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33132%3A%20CWE-467%20Use%20of%20sizeof()%20on%20a%20Pointer%20Type%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33131-cwe-120-buffer-copy-without-checkin-0fef9c46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33131%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33126-cwe-131-incorrect-calculation-of-bu-a7deff6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33126%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12335-cross-site-scripting-in-code-projec-735b5c79</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12335%3A%20Cross%20Site%20Scripting%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=6900024dba6dffc5e21931f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12332-cross-site-scripting-in-sourcecodes-0b1f4942</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12332%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Grades%20Management%20System&amp;severity=medium&amp;id=6900024dba6dffc5e2193200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43024-cwe-497-exposure-of-sensitive-syste-f608330d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43024%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20HP%20Inc%20ThinPro%208.1&amp;severity=medium&amp;id=68fffec9ba6dffc5e218c2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62258-cwe-352-cross-site-request-forgery--04efa349</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62258%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=high&amp;id=68fffb41ba6dffc5e218209b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12334-cross-site-scripting-in-code-projec-89bf1079</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12334%3A%20Cross%20Site%20Scripting%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68fff444ba6dffc5e21326a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12333-cross-site-scripting-in-code-projec-0195957d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12333%3A%20Cross%20Site%20Scripting%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68fff444ba6dffc5e21326a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62259-cwe-863-incorrect-authorization-in--839a3a9b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62259%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68fff444ba6dffc5e21326af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12331-unrestricted-upload-in-willow-cms-4896ff1a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12331%3A%20Unrestricted%20Upload%20in%20Willow%20CMS&amp;severity=medium&amp;id=68ffed31ba6dffc5e2122369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12330-cross-site-scripting-in-willow-cms-4bc70c5c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12330%3A%20Cross%20Site%20Scripting%20in%20Willow%20CMS&amp;severity=medium&amp;id=68ffed31ba6dffc5e2122362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62260-cwe-400-uncontrolled-resource-consu-face2cfb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62260%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=68ffe9aeba6dffc5e211b781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12329-sql-injection-in-shawon100-ruet-oj-4c36d51b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12329%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffe632ba6dffc5e21130bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12328-sql-injection-in-shawon100-ruet-oj-e99790fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12328%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffe632ba6dffc5e21130ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62781-cwe-613-insufficient-session-expira-44094685</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62781%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20THM-Health%20PILOS&amp;severity=medium&amp;id=68ffe632ba6dffc5e21130cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62779-cwe-79-improper-neutralization-of-i-4168794f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62779%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=low&amp;id=68ffe632ba6dffc5e21130c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62778-cwe-425-direct-request-forced-brows-1700e009</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62778%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20frappe%20lms&amp;severity=low&amp;id=68ffe632ba6dffc5e21130c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62261-cwe-312-cleartext-storage-of-sensit-a1956b0a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62261%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffe2a8ba6dffc5e210be3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-highlights-retail-cyber-threats-257bed41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Jingle%20Thief&apos;%20Highlights%20Retail%20Cyber%20Threats&amp;severity=high&amp;id=69016ef83499185cc34fb17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-tainted-memories-exploit-enables-command-i-fcbe7d33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98ChatGPT%20Tainted%20Memories%E2%80%99%20Exploit%20Enables%20Command%20Injection%20in%20Atlas%20Browser&amp;severity=high&amp;id=68ffdf22ba6dffc5e20e967e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12327-sql-injection-in-shawon100-ruet-oj-f72a0206</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12327%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e9776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12326-sql-injection-in-shawon100-ruet-oj-5e250c47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12326%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e9771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62784-cwe-837-improper-enforcement-of-a-s-6e55b336</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62784%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Phoenix616%20InventoryGui&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e977b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62783-cwe-837-improper-enforcement-of-a-s-23210f90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62783%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Phoenix616%20InventoryGui&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e977f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62782-cwe-837-improper-enforcement-of-a-s-7c6c421b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62782%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Phoenix616%20InventoryGui&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x-warns-users-with-security-keys-to-re-enroll-befo-abe552c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=X%20Warns%20Users%20With%20Security%20Keys%20to%20Re-Enroll%20Before%20November%2010%20to%20Avoid%20Lockouts&amp;severity=high&amp;id=68ffdb9cba6dffc5e20d78d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italian-spyware-vendor-linked-to-chrome-zero-day-a-394e7909</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italian%20spyware%20vendor%20linked%20to%20Chrome%20zero-day%20attacks&amp;severity=critical&amp;id=68ffdb9cba6dffc5e20d78c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-warns-of-critical-aspnet-flaw-in-its-windows--3fa86493</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20warns%20of%20critical%20ASP.NET%20flaw%20in%20its%20Windows%20backup%20software&amp;severity=critical&amp;id=68ffdb9cba6dffc5e20d78cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-profits-drop-as-victims-stop-paying-hac-3c22df97</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20profits%20drop%20as%20victims%20stop%20paying%20hackers&amp;severity=high&amp;id=68ffdb9cba6dffc5e20d78d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62262-cwe-532-insertion-of-sensitive-info-1d13d28b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62262%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62725-cwe-22-improper-limitation-of-a-pat-abc8fd06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62725%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20docker%20compose&amp;severity=high&amp;id=68ffdbe2ba6dffc5e20d7f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12325-sql-injection-in-sourcecodester-bes-f1093c2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12325%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12322-buffer-overflow-in-tenda-ch22-c4af0141</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12322%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ffdbe2ba6dffc5e20d7f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12316-sql-injection-in-code-projects-cour-ca1ab1fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12316%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62524-cwe-200-exposure-of-sensitive-infor-6cb5e3d0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62524%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20THM-Health%20PILOS&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c6581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62523-cwe-942-permissive-cross-domain-pol-4b2c1f0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62523%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20THM-Health%20PILOS&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c657d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12315-sql-injection-in-code-projects-food-f143d504</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12315%3A%20SQL%20Injection%20in%20code-projects%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c6593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12314-sql-injection-in-code-projects-food-ba12fe90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12314%3A%20SQL%20Injection%20in%20code-projects%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c658c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12313-command-injection-in-d-link-di-7001-1c796b40</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12313%3A%20Command%20Injection%20in%20D-Link%20DI-7001%20MINI&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c6585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/memento-spyware-tied-to-chrome-zero-day-attacks-bbe63122</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Memento%20Spyware%20Tied%20to%20Chrome%20Zero-Day%20Attacks&amp;severity=medium&amp;id=69016ef83499185cc34fb17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62516-cwe-200-exposure-of-sensitive-infor-60b50e0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62516&amp;severity=null&amp;id=68ffcd8cba6dffc5e20add2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59151-cwe-93-improper-neutralization-of-c-8e6231bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59151%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20pi-hole%20web&amp;severity=high&amp;id=68ffcd8cba6dffc5e20add29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62263-cwe-79-improper-neutralization-of-i-ce2f2a13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffcd8cba6dffc5e20add2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58356-cwe-347-improper-verification-of-cr-c05554f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58356%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20edgelesssys%20constellation&amp;severity=high&amp;id=68ffca08ba6dffc5e209fffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12312-cross-site-scripting-in-phpgurukul--a1716d8e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12312%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=68ffca08ba6dffc5e209fff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12311-cross-site-scripting-in-phpgurukul--cfb30418</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12311%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=68ffca08ba6dffc5e209ffee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12310-improper-restriction-of-excessive-a-624bf1ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12310%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20VirtFusion&amp;severity=medium&amp;id=68ffca08ba6dffc5e209ffe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-sell-turnkey-remote-access-trojan-atropo-cc886787</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Sell%20Turnkey%20Remote%20Access%20Trojan%20&apos;Atroposia&apos;&amp;severity=low&amp;id=69016ef83499185cc34fb184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53533-cwe-79-improper-neutralization-of-i-70c3e71d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53533%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=medium&amp;id=68ffc684ba6dffc5e2095d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12309-sql-injection-in-code-projects-nero-fdbbe3dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12309%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12308-sql-injection-in-code-projects-nero-298884a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12308%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12307-sql-injection-in-code-projects-nero-3a926002</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12307%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62253-cwe-601-url-redirection-to-untruste-3af9a573</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62253%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36138-cwe-79-improper-neutralization-of-i-4cb70af9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36138%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36170-cwe-79-improper-neutralization-of-i-81e3e383</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36170%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32785-cwe-79-improper-neutralization-of-i-fc0fbf05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32785%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=low&amp;id=68ffbf81ba6dffc5e207e32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46602-cwe-538-insertion-of-sensitive-info-25585f05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46602%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Dell%20SupportAssist%20OS%20Recovery&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36007-cwe-266-incorrect-privilege-assignm-0be2ee83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36007%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20IBM%20QRadar%20SIEM&amp;severity=high&amp;id=68ffbf81ba6dffc5e207e332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12306-sql-injection-in-code-projects-nero-20fb7e7b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12306%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12305-deserialization-in-quequnlong-shiyi-c4c833bd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12305%3A%20Deserialization%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12304-improper-authorization-in-dulaiduwa-719577c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12304%3A%20Improper%20Authorization%20in%20dulaiduwang003%20TIME-SEA-PLUS&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12365-cwe-209-generation-of-error-message-8fdfba16</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12365%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68ffbbf8ba6dffc5e2076444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12364-cwe-521-weak-password-requirements--0d6651d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12364%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68ffb875ba6dffc5e206e0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12363-cwe-200-exposure-of-sensitive-infor-7417b286</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12363%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68ffb875ba6dffc5e206e0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12303-cross-site-scripting-in-phpgurukul--c5e1b330</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12303%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=68ffb875ba6dffc5e206e0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12302-cross-site-scripting-in-code-projec-b9438a5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12302%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffb875ba6dffc5e206e0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12301-unrestricted-upload-in-code-project-110679de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12301%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffadeaba6dffc5e2050665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12300-cross-site-scripting-in-code-projec-40373787</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12300%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffadeaba6dffc5e205065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61795-cwe-404-improper-resource-shutdown--a43301b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61795%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=68ffadeaba6dffc5e205067d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55752-cwe-23-relative-path-traversal-in-a-66522afd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55752%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=68ffadeaba6dffc5e205066e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55754-cwe-150-improper-neutralization-of--8d7d2fcf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55754%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=68ffadeaba6dffc5e2050674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12299-cross-site-scripting-in-code-projec-3fb1957c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12299%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffa6e0ba6dffc5e2036881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12298-cross-site-scripting-in-code-projec-dba6429f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12298%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffa6e0ba6dffc5e203687a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12297-information-disclosure-in-atjiu-pyb-9c88682a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12297%3A%20Information%20Disclosure%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=68ffa364ba6dffc5e202ccee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12296-os-command-injection-in-d-link-dap--9f83be38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12296%3A%20OS%20Command%20Injection%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=68ffa364ba6dffc5e202cce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12295-improper-verification-of-cryptograp-e875a592</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12295%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20D-Link%20DAP-2695&amp;severity=high&amp;id=68ffa364ba6dffc5e202cce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x-warns-users-with-security-keys-to-re-enroll-befo-7003c9a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=X%20Warns%20Users%20With%20Security%20Keys%20to%20Re-Enroll%20Before%20November%2010%20to%20Avoid%20Lockouts&amp;severity=medium&amp;id=6901629430d110a1a6e799d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12294-sql-injection-in-sourcecodester-poi-f9285c25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12294%3A%20SQL%20Injection%20in%20SourceCodester%20Point%20of%20Sales&amp;severity=medium&amp;id=68ff98e5ba6dffc5e201350a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12293-sql-injection-in-sourcecodester-poi-5961733f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12293%3A%20SQL%20Injection%20in%20SourceCodester%20Point%20of%20Sales&amp;severity=medium&amp;id=68ff98e5ba6dffc5e2013503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/house-democrats-resume-bank-domewatch-leaked-data--75eba7cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=House%20Democrats%E2%80%99%20Resume%20Bank%20DomeWatch%20Leaked%20Data%20of%20Thousands%20of%20Capitol%20Hill%20Job%20Applicants&amp;severity=medium&amp;id=68ff98d2ba6dffc5e2013270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12292-sql-injection-in-sourcecodester-poi-ff18ccff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12292%3A%20SQL%20Injection%20in%20SourceCodester%20Point%20of%20Sales&amp;severity=medium&amp;id=68ff91d3ba6dffc5e2000d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12291-unrestricted-upload-in-ashymuzuro-f-dc6bc574</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12291%3A%20Unrestricted%20Upload%20in%20ashymuzuro%20Full-Ecommece-Website&amp;severity=medium&amp;id=68ff91d3ba6dffc5e2000d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leetagent-a-tool-shared-by-forumtroll-and-dante-f716c828</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeetAgent%3A%20a%20tool%20shared%20by%20ForumTroll%20and%20Dante&amp;severity=medium&amp;id=68ff8e5eba6dffc5e2ff113d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-water-saci-campaign-spreading-via-whatsapp--3ad4bff4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Water%20Saci%20Campaign%20Spreading%20Via%20WhatsApp%20Features%20Multi-Vector%20Persistence%20and%20Sophisticated%20C%26C&amp;severity=medium&amp;id=68ff9fd0ba6dffc5e2023fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-targets-windows-hosts-with-linux-based-ranso-17c9bfb3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Targets%20Windows%20Hosts%20With%20Linux-Based%20Ransomware&amp;severity=medium&amp;id=69016ef83499185cc34fb18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34133-cwe-352-cross-site-request-forgery--03d5610a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34133%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cloud%20Solutions%20SAS%20Wimi%20Teamwork&amp;severity=high&amp;id=68ff8e44ba6dffc5e2ff0b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-weve-learned-from-scanning-thousands-of-smart-8462d68a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20we%E2%80%99ve%20learned%20from%20scanning%20thousands%20of%20smart%20contracts%20with%20SolidityScan&amp;severity=high&amp;id=68ff8e47ba6dffc5e2ff0bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10023-cwe-79-improper-neutralization-of-i-bd75db39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10023%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ff8e44ba6dffc5e2ff0b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12351-cwe-639-authorization-bypass-throug-6104be6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12351%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Honeywell%20S35%203M%2F5M%2F8M%2FPinhole%2FKit%20Camera&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12290-cross-site-scripting-in-sui-shang-i-4b26cad1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12290%3A%20Cross%20Site%20Scripting%20in%20Sui%20Shang%20Information%20Technology%20Suishang%20Enterprise-Level%20B2B2C%20Multi-User%20Mall%20System&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12289-cross-site-scripting-in-sui-shang-i-dcda611e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12289%3A%20Cross%20Site%20Scripting%20in%20Sui%20Shang%20Information%20Technology%20Suishang%20Enterprise-Level%20B2B2C%20Multi-User%20Mall%20System&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36121-cwe-80-improper-neutralization-of-s-59e9719c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36121%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34292-cwe-502-deserialization-of-untruste-f9adb8b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34292%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BeWelcome%20Rox&amp;severity=critical&amp;id=68ff8744ba6dffc5e2fd65e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12288-authorization-bypass-in-bdtask-phar-9ead32ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12288%3A%20Authorization%20Bypass%20in%20Bdtask%20Pharmacy%20Management%20System&amp;severity=medium&amp;id=68ff8744ba6dffc5e2fd65e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12287-sql-injection-in-bdtask-wholesale-i-15a9788c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12287%3A%20SQL%20Injection%20in%20Bdtask%20Wholesale%20Inventory%20Control%20and%20Inventory%20Management%20System&amp;severity=medium&amp;id=68ff8744ba6dffc5e2fd65da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chatgpt-atlas-browser-exploit-lets-attackers-p-369ffb12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ChatGPT%20Atlas%20Browser%20Exploit%20Lets%20Attackers%20Plant%20Persistent%20Hidden%20Commands&amp;severity=low&amp;id=6901629430d110a1a6e799d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12286-unquoted-search-path-in-veepn-7896ce70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12286%3A%20Unquoted%20Search%20Path%20in%20VeePN&amp;severity=high&amp;id=68ff7cafba6dffc5e2fbe797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12283-authorization-bypass-in-code-projec-87d8913b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12283%3A%20Authorization%20Bypass%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff7cafba6dffc5e2fbe790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9164-cwe-427-uncontrolled-search-path-ele-5228e4d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9164%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Docker%20Docker%20Desktop&amp;severity=high&amp;id=68ff7cafba6dffc5e2fbe7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50055-cwe-79-improper-neutralization-of-i-9ecd431f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50055%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenVPN%20Access%20Server&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12282-cross-site-scripting-in-code-projec-38d7b6e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12282%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12281-cross-site-scripting-in-code-projec-0e8722b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12281%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12280-cross-site-scripting-in-code-projec-dc805d82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12280%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-china-linked-smishing-campaign-leveraged-1-12e4c165</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20China-Linked%20Smishing%20Campaign%20Leveraged%20194%2C000%20Domains&amp;severity=medium&amp;id=68ff75a2ba6dffc5e2fab31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-hyperrat-android-malware-sold-as-ready-made-sp-de335054</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20HyperRat%20Android%20Malware%20Sold%20as%20Ready-Made%20Spy%20Tool&amp;severity=medium&amp;id=68ff75b8ba6dffc5e2fab4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-variant-of-qilin-ransomware-targets-windows--df686a8b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20variant%20of%20Qilin%20Ransomware%20targets%20Windows%20via%20remote%20management%20tools%20and%20BYOVD&amp;severity=medium&amp;id=68ff7222ba6dffc5e2fa4f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-wap-a-surveillance-computer-youve-never-hear-1db43d4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20Wap%3A%20A%20Surveillance%20Computer%20You&apos;ve%20Never%20Heard%20Of%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=68ff7222ba6dffc5e2fa4f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12279-cross-site-scripting-in-code-projec-4275b1da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12279%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff7241ba6dffc5e2fa53c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12277-sql-injection-in-abdullah-hasan-saj-4f4753fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12277%3A%20SQL%20Injection%20in%20Abdullah-Hasan-Sajjad%20Online-School&amp;severity=medium&amp;id=68ff7241ba6dffc5e2fa53be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12276-information-disclosure-in-learnhous-75a2b057</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12276%3A%20Information%20Disclosure%20in%20LearnHouse&amp;severity=medium&amp;id=68ff7241ba6dffc5e2fa53b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11248-cwe-532-insertion-of-sensitive-info-66d30e77</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11248%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Zohocorp%20ManageEngine%20Endpoint%20Central&amp;severity=low&amp;id=68ff7241ba6dffc5e2fa53b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-wsus-exploited-lockbit-50-returns-tel-9088ce9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20WSUS%20Exploited%2C%20LockBit%205.0%20Returns%2C%20Telegram%20Backdoor%2C%20F5%20Breach%20Widens&amp;severity=medium&amp;id=68ff6b16ba6dffc5e2f831fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41068-cwe-617-reachable-assertion-in-newp-d8a4c263</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41068%3A%20CWE-617%20Reachable%20Assertion%20in%20NewPlane%20Open5GS&amp;severity=high&amp;id=68ff6edbba6dffc5e2f97675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41067-cwe-617-reachable-assertion-in-newp-75c0fca9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41067%3A%20CWE-617%20Reachable%20Assertion%20in%20NewPlane%20Open5GS&amp;severity=high&amp;id=68ff6edbba6dffc5e2f97671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12274-buffer-overflow-in-tenda-ch22-373686ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12274%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff6796ba6dffc5e2f5779f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12273-buffer-overflow-in-tenda-ch22-f6899b4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12273%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff6796ba6dffc5e2f57798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12272-buffer-overflow-in-tenda-ch22-005a7234</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12272%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff609aba6dffc5e2ea040b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12271-buffer-overflow-in-tenda-ch22-109a818f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12271%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff609aba6dffc5e2ea0404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12270-improper-control-of-resource-identi-ceb2317a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12270%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20LearnHouse&amp;severity=medium&amp;id=68ff6099ba6dffc5e2ea03fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41009-cwe-89-improper-neutralization-of-s-0a593df3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41009%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Disenno%20de%20Recursos%20Educativos%20S.L%20virtual%20campus%20platform&amp;severity=critical&amp;id=68ff5b452359da13b53d315f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12269-cross-site-scripting-in-learnhouse-c10dedc7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12269%3A%20Cross%20Site%20Scripting%20in%20LearnHouse&amp;severity=medium&amp;id=68ff5b452359da13b53d3159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12268-unrestricted-upload-in-learnhouse-99d0273b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12268%3A%20Unrestricted%20Upload%20in%20LearnHouse&amp;severity=medium&amp;id=68ff5b452359da13b53d3153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11955-cwe-299-improper-check-for-certific-c32cbfcd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11955%3A%20CWE-299%3A%20Improper%20Check%20for%20Certificate%20Revocation%20in%20TheGreenBow%20TheGreenBow%20VPN%20Client%20Windows%20Enterprise&amp;severity=high&amp;id=68ff59692359da13b53b5873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-firefox-extensions-required-to-disclose-data-c-6ccd95f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Firefox%20Extensions%20Required%20to%20Disclose%20Data%20Collection%20Practices&amp;severity=medium&amp;id=68ff55c904434cffeae9505f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12267-cross-site-scripting-in-abhicodebox-a97a9001</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12267%3A%20Cross%20Site%20Scripting%20in%20abhicodebox%20ModernShop&amp;severity=medium&amp;id=68ff524a04434cffeae2d25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12266-code-injection-in-zytec-dalian-zhuo-d21002f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12266%3A%20Code%20Injection%20in%20Zytec%20Dalian%20Zhuoyun%20Technology%20Central%20Authentication%20Service&amp;severity=medium&amp;id=68ff524a04434cffeae2d259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12265-buffer-overflow-in-tenda-ch22-78ff9447</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12265%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff524a04434cffeae2d252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/year-old-wordpress-plugin-flaws-exploited-to-hack--d70cee15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Year-Old%20WordPress%20Plugin%20Flaws%20Exploited%20to%20Hack%20Websites&amp;severity=critical&amp;id=68ff4ed204434cffeade4f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/27th-october-threat-intelligence-report-e014336a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=27th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68ff4d12bbaf5d265c8ed70b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-discord-accounts-with-redtiger-based-fc3c7187</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20steal%20Discord%20accounts%20with%20RedTiger-based%20infostealer&amp;severity=high&amp;id=68ff4ce5bbaf5d265c8de265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordfence-blocks-87m-attacks-exploiting-old-gutenk-4ff330b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wordfence%20blocks%208.7M%20attacks%20exploiting%20old%20GutenKit%20and%20Hunk%20Companion%20flaws&amp;severity=medium&amp;id=68ff4ce5bbaf5d265c8de269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bytes-over-dns-sans-internet-storm-center-d8ccc291</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bytes%20over%20DNS%20-%20SANS%20Internet%20Storm%20Center&amp;severity=medium&amp;id=68ff4ce5bbaf5d265c8de26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12264-cross-site-scripting-in-wisencode-fe8f788b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12264%3A%20Cross%20Site%20Scripting%20in%20Wisencode&amp;severity=medium&amp;id=68ff4d0fbbaf5d265c8ed1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12263-sql-injection-in-code-projects-onli-c02c22b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12263%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff4d0fbbaf5d265c8ed1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12262-sql-injection-in-code-projects-onli-13a3f798</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12262%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff4d0fbbaf5d265c8ed1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-payments-dropped-in-q3-2025-analysis-16c3acbe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Payments%20Dropped%20in%20Q3%202025%3A%20Analysis&amp;severity=medium&amp;id=68ff4960bbaf5d265c875b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59463-cwe-833-deadlock-in-sick-ag-tloc100-3b4d7a5c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59463%3A%20CWE-833%20Deadlock%20in%20SICK%20AG%20TLOC100-100%20all%20Firmware%20versions&amp;severity=medium&amp;id=68ff4972bbaf5d265c87718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59462-cwe-248-uncaught-exception-in-sick--5337da09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59462%3A%20CWE-248%20Uncaught%20Exception%20in%20SICK%20AG%20TLOC100-100%20all%20Firmware%20versions&amp;severity=medium&amp;id=68ff4972bbaf5d265c877185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59461-cwe-862-missing-authorization-in-si-cba65bd7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59461%3A%20CWE-862%20Missing%20Authorization%20in%20SICK%20AG%20TLOC100-100%20all%20Firmware%20versions&amp;severity=high&amp;id=68ff4972bbaf5d265c87717d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-dream-job-to-malware-dreamloaders-in-recent-c-185b6ce0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Dream%20Job%20to%20Malware%3A%20DreamLoaders%20in%20Recent%20Campaign&amp;severity=medium&amp;id=68ff4ce1bbaf5d265c8de12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59460-cwe-1391-use-of-weak-credentials-in-4191a421</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59460%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20SICK%20AG%20TLOC100-100%20with%20Firmware%20%3C7.1.1&amp;severity=high&amp;id=68ff4972bbaf5d265c877175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59459-cwe-770-allocation-of-resources-wit-86c816c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59459%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20SICK%20AG%20TLOC100-100&amp;severity=medium&amp;id=68ff4972bbaf5d265c87716d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8432-cwe-276-incorrect-default-permission-b9d1c12e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8432%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=68ff45eabbaf5d265c824126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12261-sql-injection-in-codeastro-gym-mana-7d47a7bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12261%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68ff45eabbaf5d265c82411f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12260-stack-based-buffer-overflow-in-toto-696570db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12260%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff45eabbaf5d265c824118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12259-stack-based-buffer-overflow-in-toto-437deb94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12259%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff45eabbaf5d265c824111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10561-cwe-1104-use-of-unmaintained-third--44afcc9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10561&amp;severity=null&amp;id=68ff45eabbaf5d265c824109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-zero-day-exploitation-linked-to-hacking-tea-a2746689</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Zero-Day%20Exploitation%20Linked%20to%20Hacking%20Team%20Spyware&amp;severity=medium&amp;id=68ff3cec092efa8a037267c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12258-stack-based-buffer-overflow-in-toto-40657c71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12258%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff4783bbaf5d265c856c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12257-sql-injection-in-sourcecodester-onl-242ff922</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12257%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Result%20System&amp;severity=medium&amp;id=68ff4783bbaf5d265c856c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12256-sql-injection-in-code-projects-onli-45cc6d8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12256%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff4783bbaf5d265c856c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46583-cwe-116-improper-encoding-or-escapi-2a3a2588</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46583%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20ZTE%20MC889A%20Pro&amp;severity=medium&amp;id=68ff3b148ee3628e2d7f52dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bytes-over-dns-mon-oct-27th-685a5807</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bytes%20over%20DNS%2C%20(Mon%2C%20Oct%2027th)&amp;severity=low&amp;id=68ff378d8ee3628e2d779a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12255-sql-injection-in-code-projects-onli-f1d59206</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12255%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff37aa8ee3628e2d77b5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12254-sql-injection-in-code-projects-onli-29770114</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12254%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff37aa8ee3628e2d77b5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12253-sql-injection-in-amtt-hotel-broadba-1502365e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12253%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=68ff37aa8ee3628e2d77b5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-combines-linux-payload-with-byovd-659322bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Combines%20Linux%20Payload%20With%20BYOVD%20Exploit%20in%20Hybrid%20Attack&amp;severity=high&amp;id=68ff6e72ba6dffc5e2f95f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12080-cwe-345-insufficient-verification-o-b1e5b7dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12080%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Google%20WearOS&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46582-cwe-321-use-of-hard-coded-cryptogra-199079ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46582%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ZTE%20ZXMP%20M721&amp;severity=high&amp;id=68ff324b8f87cfec3dea7cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12252-sql-injection-in-code-projects-onli-41edc75d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12252%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12251-cross-site-scripting-in-openwga-d0584e75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12251%3A%20Cross%20Site%20Scripting%20in%20OpenWGA&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12250-path-traversal-in-openwga-d2dc7eff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12250%3A%20Path%20Traversal%20in%20OpenWGA&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jettys-addpath-allows-lfi-in-windows-traccar-unaut-81e8d559</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jetty&apos;s%20addPath%20allows%20LFI%20in%20Windows%20-%20Traccar%20Unauthenticated%20LFI%20v5.8-v6.8.1&amp;severity=medium&amp;id=68ff2ec58f87cfec3de3053c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-qilin-attack-methods-exposed-through-mu-acbc9c75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Qilin%20attack%20methods%20exposed%20through%20multiple%20cases&amp;severity=medium&amp;id=68ff45e5bbaf5d265c82404a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12249-csv-injection-in-axosoft-scrum-and--1f7ac8c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12249%3A%20CSV%20Injection%20in%20Axosoft%20Scrum%20and%20Bug%20Tracking&amp;severity=medium&amp;id=68ff2ce08f87cfec3de104fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12248-sql-injection-in-cltphp-92597427</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12248%3A%20SQL%20Injection%20in%20CLTPHP&amp;severity=medium&amp;id=68ff2ce08f87cfec3de104f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12247-unquoted-search-path-in-hasleo-back-78db9bb1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12247%3A%20Unquoted%20Search%20Path%20in%20Hasleo%20Backup%20Suite&amp;severity=high&amp;id=68ff2ce08f87cfec3de104eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cophish-new-oauth-phishing-technique-abuses-micros-eb55c328</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoPHish%3A%20New%20OAuth%20phishing%20technique%20abuses%20Microsoft%20Copilot%20Studio%20chatbots%20to%20create%20convincing%20credential%20theft%20campaigns&amp;severity=medium&amp;id=68ff29743fb824cb8ce78a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11682-cwe-79-improper-neutralization-of-i-68c1e2a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Perx%20Technologies%20Customer%20Engagement%20%26%20Loyalty%20Platform&amp;severity=high&amp;id=68ff22703fb824cb8cdada05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12246-cross-site-scripting-in-chatwoot-d3443e3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12246%3A%20Cross%20Site%20Scripting%20in%20chatwoot&amp;severity=medium&amp;id=68ff24083fb824cb8cde2125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12245-origin-validation-error-in-chatwoot-8578d8cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12245%3A%20Origin%20Validation%20Error%20in%20chatwoot&amp;severity=medium&amp;id=68ff24083fb824cb8cde211f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12244-cross-site-scripting-in-code-projec-6f2c1302</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12244%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20E-Banking%20System&amp;severity=medium&amp;id=68ff24083fb824cb8cde2118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-atlas-browser-can-be-tricked-by-fake-urls--61e7d615</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20Atlas%20Browser%20Can%20Be%20Tricked%20by%20Fake%20URLs%20into%20Executing%20Hidden%20Commands&amp;severity=medium&amp;id=68ff6e72ba6dffc5e2f95f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12243-sql-injection-in-code-projects-clie-6daa66fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12243%3A%20SQL%20Injection%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff24083fb824cb8cde2139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12242-sql-injection-in-codeastro-gym-mana-8cac826c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12242%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68ff24083fb824cb8cde2132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12241-stack-based-buffer-overflow-in-toto-d045e579</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12241%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff24083fb824cb8cde212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12055-cwe-22-improper-limitation-of-a-pat-c5f9e325</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12055%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MPDV%20Mikrolab%20GmbH%20MIP%202&amp;severity=high&amp;id=68ff17d045f6dd1a506a0db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12240-buffer-overflow-in-totolink-a3300r-4ea3e5be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12240%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff17d045f6dd1a506a0dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12239-buffer-overflow-in-totolink-a3300r-4faf0f76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12239%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff17d045f6dd1a506a0dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12238-sql-injection-in-code-projects-auto-865364d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12238%3A%20SQL%20Injection%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68ff17d045f6dd1a506a0db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12237-sql-injection-in-projectworlds-adva-0f230df9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12237%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=68ff1b307e25bac6d3f8f116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12236-buffer-overflow-in-tenda-ch22-8b2ef6be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12236%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12235-buffer-overflow-in-tenda-ch22-25e20edc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12235%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12234-buffer-overflow-in-tenda-ch22-554c77c6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12234%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12233-buffer-overflow-in-tenda-ch22-0503470d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12233%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12232-buffer-overflow-in-tenda-ch22-c08fd25b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12232%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12231-cross-site-scripting-in-projectworl-f3e2101b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12231%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0bad4c2556d99606b1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12230-cross-site-scripting-in-projectworl-594ed5bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12230%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0bad4c2556d99606b1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11154-cwe-862-missing-authorization-in-id-f208f23b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11154%3A%20CWE-862%20Missing%20Authorization%20in%20IDonate&amp;severity=medium&amp;id=68ff0bad4c2556d99606b1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12229-cross-site-scripting-in-projectworl-cc2ff137</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12229%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0690748f7c5f7ca8c161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12228-cross-site-scripting-in-projectworl-e50f0a79</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12228%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0690748f7c5f7ca8c15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12227-cross-site-scripting-in-projectworl-a0b15e5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12227%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Gate%20Pass%20Management%20System&amp;severity=medium&amp;id=68ff0690748f7c5f7ca8c155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12226-sql-injection-in-sourcecodester-bes-a8427e10</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12226%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=68feff90748f7c5f7c9b0427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12225-stack-based-buffer-overflow-in-tend-0ad87a0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12225%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=68feff90748f7c5f7c9b0420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12224-cross-site-scripting-in-iqbolshoh-p-a3df1387</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12224%3A%20Cross%20Site%20Scripting%20in%20Iqbolshoh%20php-business-website&amp;severity=medium&amp;id=68ff0129748f7c5f7c9e45bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12223-unrestricted-upload-in-bdtask-fligh-cef5830d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12223%3A%20Unrestricted%20Upload%20in%20Bdtask%20Flight%20Booking%20Software&amp;severity=medium&amp;id=68ff0129748f7c5f7c9e45b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12222-unrestricted-upload-in-bdtask-fligh-42c3e97c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12222%3A%20Unrestricted%20Upload%20in%20Bdtask%20Flight%20Booking%20Software&amp;severity=medium&amp;id=68ff0129748f7c5f7c9e45b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12215-sql-injection-in-projectworlds-onli-847f26c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12215%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Shopping%20System&amp;severity=medium&amp;id=68fef1ce79a7bb5513bbd8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12214-stack-based-buffer-overflow-in-tend-51b2371e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12214%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fef1ce79a7bb5513bbd8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12213-stack-based-buffer-overflow-in-tend-5061791d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12213%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fef1ce79a7bb5513bbd8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/globalcve-opensource-unified-cve-data-from-around--8cb9a2a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlobalCVE%20%E2%80%94%20OpenSource%20Unified%20CVE%20Data%20from%20Around%20the%20World&amp;severity=medium&amp;id=68feec4623a7bbed3251185f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12212-stack-based-buffer-overflow-in-tend-ae4ac0c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12212%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68feefec79a7bb5513b9db66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12211-stack-based-buffer-overflow-in-tend-7637e1c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12211%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68feefec79a7bb5513b9db5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12210-stack-based-buffer-overflow-in-tend-de540c6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12210%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fee1ba23a7bbed324e8bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12209-stack-based-buffer-overflow-in-tend-2a5adfe4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12209%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fee1ba23a7bbed324e8bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12208-sql-injection-in-sourcecodester-bes-0f41bfb4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12208%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12207-null-pointer-dereference-in-kamaili-0be4da41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12207%3A%20NULL%20Pointer%20Dereference%20in%20Kamailio&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12206-null-pointer-dereference-in-kamaili-c00be081</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12206%3A%20NULL%20Pointer%20Dereference%20in%20Kamailio&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12205-use-after-free-in-kamailio-5b7d0b93</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12205%3A%20Use%20After%20Free%20in%20Kamailio&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48088-cwe-79-improper-neutralization-of-i-6f736b56</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm_Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68fedab123a7bbed324d60d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58918-cwe-352-cross-site-request-forgery--44b0df49</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58918%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Waituk%20Entrada&amp;severity=medium&amp;id=68fedab123a7bbed324d60d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12204-heap-based-buffer-overflow-in-kamai-6fccc870</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12204%3A%20Heap-based%20Buffer%20Overflow%20in%20Kamailio&amp;severity=medium&amp;id=68fedab123a7bbed324d60d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12203-path-traversal-in-givanz-vvveb-adeae2e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12203%3A%20Path%20Traversal%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68fedab123a7bbed324d60c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62988-server-side-request-forgery-ssrf-in-226e8d31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62988%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Codeless%20Slider%20Templates&amp;severity=medium&amp;id=68fed03623a7bbed324accd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62987-improper-neutralization-of-input-du-b9b3e38a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Builderall%20Builderall%20Builder%20for%20WordPress&amp;severity=medium&amp;id=68fed03623a7bbed324acccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62986-cross-site-request-forgery-csrf-in--1529806b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62986%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FanBridge%20FanBridge%20signup&amp;severity=high&amp;id=68fed03623a7bbed324acccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62985-improper-neutralization-of-input-du-70fe6fdf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62985%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20llamaman%20Simple%20Pull%20Quote&amp;severity=medium&amp;id=68fed03623a7bbed324accc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62984-improper-neutralization-of-input-du-53f6b178</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPeka%20WP%20AdCenter&amp;severity=medium&amp;id=68fed03623a7bbed324accc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62983-improper-neutralization-of-input-du-193b49c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sudar%20Muthu%20Posts%20By%20Tag&amp;severity=medium&amp;id=68fed03623a7bbed324accc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62982-improper-neutralization-of-input-du-535d93eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sarah%20Giles%20Dynamic%20User%20Directory&amp;severity=medium&amp;id=68fed03623a7bbed324accc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62981-url-redirection-to-untrusted-site-o-13d7833f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62981%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Zoho%20CRM%20and%20Bigin&amp;severity=medium&amp;id=68fed03623a7bbed324accbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62980-missing-authorization-in-mdz-persia-07d61d0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62980%3A%20Missing%20Authorization%20in%20MDZ%20Persian%20Admnin%20Fonts&amp;severity=high&amp;id=68fed03623a7bbed324accba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62979-insertion-of-sensitive-information--da9ef522</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62979%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20airesvsg%20ACF%20to%20REST%20API&amp;severity=medium&amp;id=68fed03523a7bbed324accad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62978-missing-authorization-in-kiotviet-k-879d79d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62978%3A%20Missing%20Authorization%20in%20Kiotviet%20KiotViet%20Sync&amp;severity=medium&amp;id=68fed03523a7bbed324accaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62977-missing-authorization-in-seobing-0b1a43e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62977%3A%20Missing%20Authorization%20in%20%E7%99%BE%E5%BA%A6%E7%AB%99%E9%95%BFSEO%E5%90%88%E9%9B%86(%E6%94%AF%E6%8C%81%E7%99%BE%E5%BA%A6%2F%E7%A5%9E%E9%A9%AC%2FBing%2F%E5%A4%B4%E6%9D%A1%E6%8E%A8%E9%80%81)&amp;severity=medium&amp;id=68fed03523a7bbed324acca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62976-missing-authorization-in-joovii-sen-e8b84f75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62976%3A%20Missing%20Authorization%20in%20Joovii%20Sendle%20Shipping&amp;severity=medium&amp;id=68fed03523a7bbed324acca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62974-improper-neutralization-of-input-du-7290b3d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62974%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoSchedule%20Headline%20Analyzer&amp;severity=medium&amp;id=68fed03523a7bbed324acca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62973-missing-authorization-in-themekraft-48a470a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62973%3A%20Missing%20Authorization%20in%20Themekraft%20BuddyForms&amp;severity=medium&amp;id=68fed03523a7bbed324acc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62972-missing-authorization-in-wpwebinars-4a3db737</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62972%3A%20Missing%20Authorization%20in%20WPWebinarSystem%20WebinarPress&amp;severity=medium&amp;id=68fed03523a7bbed324acc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62971-improper-neutralization-of-input-du-57d7362d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CrestaProject%20Attesa%20Extra&amp;severity=medium&amp;id=68fed03523a7bbed324acc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62970-missing-authorization-in-spencer-ha-92fa4573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62970%3A%20Missing%20Authorization%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=medium&amp;id=68fed03523a7bbed324acc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62969-improper-neutralization-of-input-du-97a27164</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62969%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20XLPlugins%20NextMove%20Lite&amp;severity=medium&amp;id=68fed03523a7bbed324acc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62968-improper-neutralization-of-input-du-9cf9623d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62968%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sayan%20Datta%20WP%20Last%20Modified%20Info&amp;severity=medium&amp;id=68fed03423a7bbed324acc85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62967-improper-neutralization-of-input-du-bb8a5bc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62967%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=68fed03423a7bbed324acc82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62966-missing-authorization-in-apiki-goca-07ddd724</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62966%3A%20Missing%20Authorization%20in%20Apiki%20GoCache&amp;severity=medium&amp;id=68fed03423a7bbed324acc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62965-missing-authorization-in-wpseek-adm-e1312e80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62965%3A%20Missing%20Authorization%20in%20wpseek%20Admin%20Management%20Xtended&amp;severity=high&amp;id=68fed03423a7bbed324acc7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62964-missing-authorization-in-realmag777-931fcbf3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62964%3A%20Missing%20Authorization%20in%20RealMag777%20MDTF&amp;severity=high&amp;id=68fed03423a7bbed324acc79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62962-cross-site-request-forgery-csrf-in--5d506231</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62962%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Andrea%20Landonio%20CloudSearch&amp;severity=high&amp;id=68fed03423a7bbed324acc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62959-improper-control-of-generation-of-c-b2066890</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62959%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site&amp;severity=critical&amp;id=68fed03423a7bbed324acc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62958-cross-site-request-forgery-csrf-in--68e56aa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62958%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Clifton%20Griffin%20Simple%20Content%20Templates%20for%20Blog%20Posts%20%26amp%3B%20Pages&amp;severity=high&amp;id=68fed03423a7bbed324acc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62957-cross-site-request-forgery-csrf-in--5d4d9729</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62957%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NikanWP%20NikanWP%20WooCommerce%20Reporting&amp;severity=high&amp;id=68fed03423a7bbed324acc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62956-cross-site-request-forgery-csrf-in--1f76cfe1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62956%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20iseremet%20Reloadly&amp;severity=high&amp;id=68fed03423a7bbed324acc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62954-missing-authorization-in-codeinwp-r-e36df88c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62954%3A%20Missing%20Authorization%20in%20rsocial%20Revive%20Old%20Posts&amp;severity=high&amp;id=68fed03323a7bbed324acc5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62953-missing-authorization-in-nanbu-welc-73c5015c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62953%3A%20Missing%20Authorization%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=high&amp;id=68fed03323a7bbed324acc5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62952-missing-authorization-in-quantumclo-4988b1d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62952%3A%20Missing%20Authorization%20in%20QuantumCloud%20ChatBot&amp;severity=high&amp;id=68fed03323a7bbed324acc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62951-improper-neutralization-of-input-du-d74555f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icc0rz%20H5P&amp;severity=medium&amp;id=68fed03323a7bbed324acc54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62949-improper-neutralization-of-input-du-a5fa908b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20Activity%20Plus%20Reloaded%20for%20BuddyPress&amp;severity=medium&amp;id=68fed03323a7bbed324acc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62948-improper-neutralization-of-input-du-89f557ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Konstantin%20Pankratov%20Date%20counter&amp;severity=medium&amp;id=68fed03323a7bbed324acc4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62946-missing-authorization-in-everestthe-34eb943f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62946%3A%20Missing%20Authorization%20in%20everestthemes%20Everest%20Backup&amp;severity=high&amp;id=68fed03323a7bbed324acc4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62945-cross-site-request-forgery-csrf-in--6385d974</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62945%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eduard%20Pinuaga%20Linares%20Did%20Prestashop%20Display&amp;severity=high&amp;id=68fed03323a7bbed324acc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62944-missing-authorization-in-mark-odonn-d56cf597</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62944%3A%20Missing%20Authorization%20in%20Mark%20O&apos;Donnell%20MSTW%20CSV%20EXPORTER&amp;severity=critical&amp;id=68fed03323a7bbed324acc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62943-improper-neutralization-of-input-du-c5b80cc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matt%20McInvale%20Next%20Page%2C%20Not%20Next%20Post&amp;severity=medium&amp;id=68fed03323a7bbed324acc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62942-improper-neutralization-of-input-du-41b9e7bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62942%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tempranova%20WP%20Mapbox%20GL%20JS%20Maps&amp;severity=medium&amp;id=68fed03223a7bbed324acc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62941-improper-neutralization-of-input-du-d2fbfba9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62941%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dFactory%20Events%20Maker%20by%20dFactory&amp;severity=medium&amp;id=68fed03223a7bbed324acc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62940-improper-neutralization-of-input-du-d82e2e00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nick%20Diego%20Blox%20Lite&amp;severity=medium&amp;id=68fed03223a7bbed324acc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62939-improper-neutralization-of-input-du-9f959e70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Open%20Currency%20Converter&amp;severity=medium&amp;id=68fed03223a7bbed324acc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62938-missing-authorization-in-reoon-tech-7aa417c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62938%3A%20Missing%20Authorization%20in%20Reoon%20Technology%20Reoon%20Email%20Verifier&amp;severity=high&amp;id=68fed03223a7bbed324acc11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62937-improper-neutralization-of-input-du-523b0769</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62937%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Johnny%20Post%20List%20Featured%20Image&amp;severity=medium&amp;id=68fed03223a7bbed324acc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62936-improper-neutralization-of-script-r-708e9c45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62936%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Jthemes%20xSmart&amp;severity=medium&amp;id=68fed03223a7bbed324acc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62935-missing-authorization-in-ilmosys-op-891870f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62935%3A%20Missing%20Authorization%20in%20StackWC%20Open%20Close%20WooCommerce%20Store&amp;severity=high&amp;id=68fed03223a7bbed324acc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62934-cross-site-request-forgery-csrf-in--ca610a8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62934%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mejar%20WP%20Business%20Hours&amp;severity=high&amp;id=68fed03223a7bbed324acc05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62933-cross-site-request-forgery-csrf-in--df61abb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62933%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Prakash%20Awesome%20Testimonials&amp;severity=high&amp;id=68fed03223a7bbed324acc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62932-missing-authorization-in-wprio-tabl-0c184cd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62932%3A%20Missing%20Authorization%20in%20wprio%20Table%20Block%20by%20RioVizual&amp;severity=high&amp;id=68fed03123a7bbed324acbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62931-missing-authorization-in-microsofts-674d8242</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62931%3A%20Missing%20Authorization%20in%20microsoftstart%20MSN%20Partner%20Hub&amp;severity=high&amp;id=68fed03123a7bbed324acbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62930-improper-neutralization-of-input-du-69983315</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RomanCode%20MapSVG&amp;severity=medium&amp;id=68fed03123a7bbed324acbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62929-missing-authorization-in-pickplugin-92795d43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62929%3A%20Missing%20Authorization%20in%20PickPlugins%20Testimonial%20Slider&amp;severity=high&amp;id=68fed03123a7bbed324acbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62928-missing-authorization-in-joby-josep-52246db1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62928%3A%20Missing%20Authorization%20in%20Joby%20Joseph%20SEO%20Meta%20Description%20Updater&amp;severity=high&amp;id=68fed03123a7bbed324acbe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62927-missing-authorization-in-nelio-soft-9e959958</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62927%3A%20Missing%20Authorization%20in%20Nelio%20Software%20Nelio%20Content&amp;severity=high&amp;id=68fed03123a7bbed324acbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62925-missing-authorization-in-conversios-37e991b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62925%3A%20Missing%20Authorization%20in%20Conversios%20Conversios.io&amp;severity=high&amp;id=68fed03123a7bbed324acbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62924-missing-authorization-in-pickplugin-8b4ac23d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62924%3A%20Missing%20Authorization%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=high&amp;id=68fed03123a7bbed324acbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62923-improper-neutralization-of-input-du-b2bf3591</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Debuggers%20Studio%20Marquee%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68fed03123a7bbed324acbdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62922-missing-authorization-in-shambhu-pa-f2312bb5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62922%3A%20Missing%20Authorization%20in%20Shambhu%20Patnaik%20Export%20Categories&amp;severity=high&amp;id=68fed03123a7bbed324acbda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62921-improper-neutralization-of-input-du-7be0151a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62921%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pagup%20Bulk%20Auto%20Image%20Title%20Attribute&amp;severity=medium&amp;id=68fed03023a7bbed324acbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62920-improper-neutralization-of-input-du-b71097ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webnique%20USERCENTRICS%20CMP&amp;severity=medium&amp;id=68fed03023a7bbed324acbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62919-missing-authorization-in-themeshopy-88384875</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62919%3A%20Missing%20Authorization%20in%20themeshopy%20TS%20Demo%20Importer&amp;severity=critical&amp;id=68fed03023a7bbed324acbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62918-missing-authorization-in-ignitionwp-09d3c763</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62918%3A%20Missing%20Authorization%20in%20ignitionwp%20IgnitionDeck&amp;severity=high&amp;id=68fed03023a7bbed324acbc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62917-improper-neutralization-of-input-du-da5b5635</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jamel.Z%20Tooltipy&amp;severity=medium&amp;id=68fed03023a7bbed324acbc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62916-missing-authorization-in-adivaha-fl-0e6630ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62916%3A%20Missing%20Authorization%20in%20Travon%20WP%20Flights%20%26amp%3B%20Hotels%20Booking%20WP%20Plugin&amp;severity=high&amp;id=68fed03023a7bbed324acbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62915-missing-authorization-in-clicksend--24b98750</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62915%3A%20Missing%20Authorization%20in%20clicksend%20SMS%20Contact%20Form%207%20Notifications%20by%20ClickSend&amp;severity=high&amp;id=68fed03023a7bbed324acbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62913-improper-neutralization-of-input-du-2153671a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62913%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpopal%20Opal%20Service&amp;severity=medium&amp;id=68fed03023a7bbed324acbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62912-improper-neutralization-of-input-du-185b3c1b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SiteGround%20SiteGround%20Email%20Marketing&amp;severity=medium&amp;id=68fed03023a7bbed324acbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62911-improper-neutralization-of-input-du-2921bf02</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rock%20Content%20Rock%20Convert&amp;severity=medium&amp;id=68fed03023a7bbed324acbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62910-improper-neutralization-of-input-du-006fc555</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62910%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deshine%20Video%20Gallery%20by%20Huzzaz&amp;severity=medium&amp;id=68fed02f23a7bbed324acb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62909-missing-authorization-in-mrityunjay-efab0dba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62909%3A%20Missing%20Authorization%20in%20mrityunjay%20Smart%20WeTransfer&amp;severity=high&amp;id=68fed02f23a7bbed324acb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62908-missing-authorization-in-gerritvana-d1652fc4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62908&amp;severity=critical&amp;id=68fed02f23a7bbed324acb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62907-improper-neutralization-of-input-du-f7f1dd72</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20Custom%20Post%20Type%20Attachment&amp;severity=medium&amp;id=68fed02f23a7bbed324acb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62906-missing-authorization-in-epiphanyit-fb25270c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62906%3A%20Missing%20Authorization%20in%20epiphanyit321%20Referral%20Link%20Tracker&amp;severity=critical&amp;id=68fed02f23a7bbed324acb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62905-improper-neutralization-of-input-du-ba75d48f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Justin%20Tadlock%20Query%20Posts&amp;severity=medium&amp;id=68fed02f23a7bbed324acb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62904-improper-neutralization-of-input-du-7deb6a2b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ben%20Huson%20WP%20Geo&amp;severity=medium&amp;id=68fed02f23a7bbed324acb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62903-improper-neutralization-of-input-du-7441aced</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPClever%20WPC%20Smart%20Messages%20for%20WooCommerce&amp;severity=medium&amp;id=68fed02f23a7bbed324acb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62902-exposure-of-sensitive-system-inform-5dd31129</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62902%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThemeHunk%20WP%20Popup%20Builder&amp;severity=high&amp;id=68fed02f23a7bbed324acb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62900-improper-neutralization-of-input-du-e5722c87</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62900%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WeblineIndia%20Popular%20Posts%20by%20Webline&amp;severity=medium&amp;id=68fed02f23a7bbed324acb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62899-improper-neutralization-of-input-du-117341c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62899%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20THRIVE%20-%20Web%20Design%20Gold%20Coast%20Photospace%20Responsive&amp;severity=medium&amp;id=68fed02e23a7bbed324acb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62898-improper-neutralization-of-input-du-cd2b0734</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maarten%20Links%20shortcode&amp;severity=medium&amp;id=68fed02e23a7bbed324acb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62897-improper-neutralization-of-script-r-ec0a36e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62897%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Brecht%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=68fed02e23a7bbed324acb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62896-cross-site-request-forgery-csrf-in--b63f7d12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62896%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digitaldonkey%20Multilang%20Contact%20Form&amp;severity=high&amp;id=68fed02e23a7bbed324acb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62895-insertion-of-sensitive-information--f6305b7e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62895%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vito%20Peleg%20Atarim&amp;severity=high&amp;id=68fed02e23a7bbed324acb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62894-improper-neutralization-of-input-du-3e06604e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magicoders%20ACF%20Recent%20Posts%20Widget&amp;severity=medium&amp;id=68fed02e23a7bbed324acb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62893-authorization-bypass-through-user-c-f237aa6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62893&amp;severity=null&amp;id=68fed02e23a7bbed324acb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62892-missing-authorization-in-sunshineph-50a5c653</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62892%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=critical&amp;id=68fed02e23a7bbed324acb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62891-cross-site-request-forgery-csrf-in--09d9573c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62891%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jory%20Hogeveen%20Off-Canvas%20Sidebars%20%26%20Menus%20(Slidebars)&amp;severity=high&amp;id=68fed02e23a7bbed324acb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62890-cross-site-request-forgery-csrf-in--ff9b2620</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62890%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Premmerce%20Premmerce%20Brands%20for%20WooCommerce&amp;severity=high&amp;id=68fed02e23a7bbed324acb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62889-missing-authorization-in-kingaddons-61ca6730</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62889%3A%20Missing%20Authorization%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=high&amp;id=68fed02d23a7bbed324acb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62887-improper-neutralization-of-input-du-c9ca9ba1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68fed02d23a7bbed324acb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62886-cross-site-request-forgery-csrf-in--76abdd10</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62886%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdevart%20Pricing%20Table%20builder&amp;severity=high&amp;id=68fed02d23a7bbed324acb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62885-improper-neutralization-of-input-du-14795a70</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62885%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RexTheme%20WP%20VR&amp;severity=medium&amp;id=68fed02d23a7bbed324acb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62884-missing-authorization-in-elliot-sow-2edd4f3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62884%3A%20Missing%20Authorization%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20Coupon%20Affiliates&amp;severity=medium&amp;id=68fed02d23a7bbed324acb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62883-missing-authorization-in-premmerce--35cbc8e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62883%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20User%20Roles&amp;severity=medium&amp;id=68fed02d23a7bbed324acb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62882-missing-authorization-in-craig-hewi-633bd11e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62882%3A%20Missing%20Authorization%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=68fed02d23a7bbed324acb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62881-missing-authorization-in-wp-lab-wp--05b88413</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62881%3A%20Missing%20Authorization%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=medium&amp;id=68fed02d23a7bbed324acb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12202-cross-site-request-forgery-in-ajayr-76beddd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12202%3A%20Cross-Site%20Request%20Forgery%20in%20ajayrandhawa%20User-Management-PHP-MYSQL%20web&amp;severity=medium&amp;id=68fed02d23a7bbed324acb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12201-unrestricted-upload-in-ajayrandhawa-fe14b4fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12201%3A%20Unrestricted%20Upload%20in%20ajayrandhawa%20User-Management-PHP-MYSQL&amp;severity=medium&amp;id=68fed02d23a7bbed324acb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12200-null-pointer-dereference-in-dnsmasq-db79851f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12200&amp;severity=null&amp;id=68fec91d23a7bbed324576ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12199-null-pointer-dereference-in-dnsmasq-70b08edf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12199&amp;severity=null&amp;id=68fec91d23a7bbed324576a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12198-heap-based-buffer-overflow-in-dnsma-c0eb5f5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12198&amp;severity=null&amp;id=68fec91d23a7bbed3245769f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-27-9162ce75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-27&amp;severity=medium&amp;id=69000944ba6dffc5e21a945f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61102-na-7fb5356f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61102%3A%20n%2Fa&amp;severity=high&amp;id=68ffd110ba6dffc5e20b749d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61105-na-8cfdf762</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61105%3A%20n%2Fa&amp;severity=high&amp;id=68ffca08ba6dffc5e20a0007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61101-na-0484b4c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61101%3A%20n%2Fa&amp;severity=high&amp;id=68ffca08ba6dffc5e20a0001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61100-na-270345a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61100%3A%20n%2Fa&amp;severity=high&amp;id=68ffc300ba6dffc5e2087c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61099-na-1e69e751</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61099%3A%20n%2Fa&amp;severity=high&amp;id=68ffbf81ba6dffc5e207e33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60983-na-4c14f908</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60983%3A%20n%2Fa&amp;severity=medium&amp;id=68ffb16eba6dffc5e205a2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60982-na-aaa241ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60982%3A%20n%2Fa&amp;severity=medium&amp;id=68ffb16eba6dffc5e205a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54965-na-daeb9b57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54965%3A%20n%2Fa&amp;severity=medium&amp;id=68ffadeaba6dffc5e2050680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61385-na-0df91256</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61385%3A%20n%2Fa&amp;severity=critical&amp;id=68ffadeaba6dffc5e2050679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54970-na-4d42913e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54970%3A%20n%2Fa&amp;severity=medium&amp;id=68ffa364ba6dffc5e202ccfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27225-na-fe629335</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27225%3A%20n%2Fa&amp;severity=high&amp;id=68ffa364ba6dffc5e202ccf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27224-na-260f14b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27224%3A%20n%2Fa&amp;severity=critical&amp;id=68ffa364ba6dffc5e202ccf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54969-na-0c722094</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54969%3A%20n%2Fa&amp;severity=medium&amp;id=68ffa364ba6dffc5e202ccdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54968-na-d2356e8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54968%3A%20n%2Fa&amp;severity=high&amp;id=68ffa364ba6dffc5e202ccd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54967-na-42db0a14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54967%3A%20n%2Fa&amp;severity=medium&amp;id=68ff9fd9ba6dffc5e20240f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27223-na-f88eb5e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27223%3A%20n%2Fa&amp;severity=high&amp;id=68ff9fd9ba6dffc5e20240ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27222-na-813b04ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27222%3A%20n%2Fa&amp;severity=high&amp;id=68ff9fd9ba6dffc5e20240e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60791-na-76de6d51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60791%3A%20n%2Fa&amp;severity=medium&amp;id=68ff98e5ba6dffc5e2013511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49440-na-ff1b4d4d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49440%3A%20n%2Fa&amp;severity=high&amp;id=68ff954cba6dffc5e200a747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60424-na-913192f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60424%3A%20n%2Fa&amp;severity=high&amp;id=68ff91d3ba6dffc5e2000d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37749-na-bc27e7fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37749%3A%20n%2Fa&amp;severity=medium&amp;id=68ff91d3ba6dffc5e2000d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60425-na-a1b8ac54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60425%3A%20n%2Fa&amp;severity=high&amp;id=68ff91d3ba6dffc5e2000d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61247-na-e79795af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61247%3A%20n%2Fa&amp;severity=high&amp;id=68ff8e44ba6dffc5e2ff0b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61482-na-a50536cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61482%3A%20n%2Fa&amp;severity=high&amp;id=68ff83b8ba6dffc5e2fcfce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52268-na-e33c3e97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52268%3A%20n%2Fa&amp;severity=high&amp;id=68ff8033ba6dffc5e2fca3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52264-na-647a03d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52264%3A%20n%2Fa&amp;severity=high&amp;id=68ff8033ba6dffc5e2fca3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61481-na-31ea4533</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61481%3A%20n%2Fa&amp;severity=critical&amp;id=68ff7cafba6dffc5e2fbe7a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52263-na-8292bdcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52263%3A%20n%2Fa&amp;severity=high&amp;id=68ff7cafba6dffc5e2fbe79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60291-na-b2c9e1dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60291%3A%20n%2Fa&amp;severity=critical&amp;id=68ff75d1ba6dffc5e2fab9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safepay-ransomware-group-claims-the-hack-of-profes-d3862f29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Safepay%20ransomware%20group%20claims%20the%20hack%20of%20professional%20video%20surveillance%20provider%20Xortec&amp;severity=medium&amp;id=68fe8eeba0e43e902b0ef7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-says-it-stole-15-million-dublin-c2392495</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Says%20It%20Stole%201.5%20Million%20Dublin%20Airport%20Passenger%20Records%20and%2018%2C000%20Air%20Arabia%20Employee%20Data&amp;severity=medium&amp;id=68fe78b79c27a1610cf281d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12285-cwe-20-improper-input-validation-in-af8754dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12285%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fe4e4702add13148482e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12284-cwe-20-improper-input-validation-in-f1e51e1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12284%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fe4e4702add13148482e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12275-cwe-20-improper-input-validation-in-0ba39d72</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12275%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fe513db833b4e939da9c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12278-cwe-20-improper-input-validation-in-e19329d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12278%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fe513db833b4e939da9c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tesla-fsd-shows-ai-getting-worse-over-time-5f1b99d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tesla%20FSD%20Shows%20AI%20Getting%20Worse%20Over%20Time&amp;severity=medium&amp;id=68fe31493279c2433b74b8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-edr-redir-to-break-edr-via-bind-link-and-clo-edc3879b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20EDR-Redir%20To%20Break%20EDR%20Via%20Bind%20Link%20and%20Cloud%20Filter&amp;severity=medium&amp;id=68fe2c5fcf01b13a1864bb87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-in-plain-sight-how-we-followed-one-maliciou-70ab338d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20in%20Plain%20Sight%3A%20How%20we%20followed%20one%20malicious%20extension%20to%20uncover%20a%20multi-extension%E2%80%A6&amp;severity=high&amp;id=68fe12e4925c27e1cd3c6402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-the-world-poker-tour-inside-clubwpt-golds--2ed4ccc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20the%20World%20Poker%20Tour%3A%20Inside%20ClubWPT%20Gold%E2%80%99s%20Back%20Office&amp;severity=medium&amp;id=68fe0a673c975fd57d80eee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8709-cwe-89-improper-neutralization-of-sp-b531fe8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8709%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=high&amp;id=68fdb65d9f5d064e8728d1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-26-0c569d29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-26&amp;severity=medium&amp;id=68feb97f1b250a83dcfad996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cophish-attack-steals-oauth-tokens-via-copilot-266ec823</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20CoPhish%20attack%20steals%20OAuth%20tokens%20via%20Copilot%20Studio%20agents&amp;severity=high&amp;id=68fd35f5bfa5fb493c427170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-rosselkhoznadzor-hit-by-ddos-attack-food-s-01253072</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Rosselkhoznadzor%20hit%20by%20DDoS%20attack%2C%20food%20shipments%20across%20Russia%20delayed&amp;severity=medium&amp;id=68fd35f5bfa5fb493c427174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55757-cwe-79-improper-neutralization-of-i-97286c4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20virtuemart.net%20Virtuemart%20component%20for%20Joomla&amp;severity=medium&amp;id=68fd19d5bfa5fb493c3f08d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12221-cwe-16-common-vulnerabilities-in-so-2dedc981</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12221%3A%20CWE-16%3A%20Common%20Vulnerabilities%20in%20Software%20Configuration%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=68fcf6aebfa5fb493c3aeb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12220-cwe-1395-dependency-on-vulnerable-t-3f7348e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12220%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcf32abfa5fb493c3aa01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12219-cwe-1395-dependency-on-vulnerable-t-f587a9f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12219%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcf32abfa5fb493c3aa01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12218-cwe-1392-use-of-default-credentials-f5630d65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12218%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcf32abfa5fb493c3aa018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12217-cwe-1392-use-of-default-credentials-ea5afb06</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12217%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fd989f05a4076d11f4e3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12216-cwe-1301-insufficient-or-incomplete-6985dd77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12216%3A%20CWE-1301%3A%20Insufficient%20or%20Incomplete%20Data%20Removal%20within%20Hardware%20Component%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcefa6bfa5fb493c39fa3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11897-cwe-79-improper-neutralization-of-i-52720fe1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dream-Theme%20The7%20%E2%80%94%20Website%20and%20eCommerce%20Builder%20for%20WordPress&amp;severity=medium&amp;id=68fcc57ebfa5fb493c33d06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1m-whatsapp-hack-flops-only-low-risk-bugs-disclose-73328d5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%241M%20WhatsApp%20Hack%20Flops%3A%20Only%20Low-Risk%20Bugs%20Disclosed%20to%20Meta%20After%20Pwn2Own%20Withdrawal&amp;severity=low&amp;id=68fcb763bfa5fb493c32522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-atlas-omnibox-is-vulnerable-to-jailbreaks-61c0f4ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Atlas%20Omnibox%20Is%20Vulnerable%20to%20Jailbreaks&amp;severity=medium&amp;id=68fcb764bfa5fb493c32523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11875-cwe-79-improper-neutralization-of-i-f6d599a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dr-thomas-fuessl%20SpendeOnline.org&amp;severity=medium&amp;id=68fc745855d697d32d439075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11976-cwe-352-cross-site-request-forgery--b0264535</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11976%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fusewp%20FuseWP%20%E2%80%93%20WordPress%20User%20Sync%20to%20Email%20List%20%26%20Marketing%20Automation%20(Mailchimp%2C%20Constant%20Contact%2C%20ActiveCampaign%20etc.)&amp;severity=medium&amp;id=68fc745955d697d32d439083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8416-cwe-89-improper-neutralization-of-sp-840bd934</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8416%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20woobewoo%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=high&amp;id=68fc745a55d697d32d4390d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4203-cwe-89-improper-neutralization-of-sp-fb9d1208</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4203%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=68fc745955d697d32d43908c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10637-cwe-862-missing-authorization-in-qu-f2e2efbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10637%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Social%20Feed%20Gallery&amp;severity=medium&amp;id=68fc745855d697d32d438ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8483-cwe-94-improper-control-of-generatio-6d94034a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8483%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20marketingfire%20Discussion%20Board%20%E2%80%93%20WordPress%20Forum%20Plugin&amp;severity=medium&amp;id=68fc745a55d697d32d4390d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9322-cwe-89-improper-neutralization-of-sp-0fd782d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9322%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeisle%20Stripe%20Payment%20Forms%20by%20WP%20Full%20Pay%20%E2%80%93%20Accept%20Credit%20Card%20Payments%2C%20Donations%20%26%20Subscriptions&amp;severity=high&amp;id=68fc745a55d697d32d4390da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10580-cwe-79-improper-neutralization-of-i-11e041b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10580%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marketingfire%20Widget%20Options%20%E2%80%93%20Advanced%20Conditional%20Visibility%20for%20Gutenberg%20Blocks%20%26%20Classic%20Widgets&amp;severity=medium&amp;id=68fc745855d697d32d438fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11255-cwe-862-missing-authorization-in-cy-28be2aa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11255%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20Password%20Policy%20Manager%20%7C%20Password%20Manager&amp;severity=medium&amp;id=68fc745855d697d32d43906a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11497-cwe-20-improper-input-validation-in-72988d71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11497%3A%20CWE-20%20Improper%20Input%20Validation%20in%20symptote%20Advanced%20Database%20Cleaner%20%E2%80%93%20Optimize%20%26%20Clean%20Database%20to%20Speed%20Up%20Site%20Performance&amp;severity=medium&amp;id=68fc745855d697d32d439071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11893-cwe-89-improper-neutralization-of-s-98fbf1d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11893%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smub%20Charitable%20%E2%80%93%20Donation%20Plugin%20for%20WordPress%20%E2%80%93%20Fundraising%20with%20Recurring%20Donations%20%26%20More&amp;severity=medium&amp;id=68fc745955d697d32d43907b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10488-cwe-22-improper-limitation-of-a-pat-0c7a580c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10488%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%2C%20Listings%20%26%20Classified%20Ads&amp;severity=high&amp;id=68fc745855d697d32d438f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12034-cwe-79-improper-neutralization-of-i-c7d3e1ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alignak%20Fast%20Velocity%20Minify&amp;severity=medium&amp;id=68fc745955d697d32d439087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12095-cwe-352-cross-site-request-forgery--b5a03db9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12095%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20astoundify%20Simple%20Registration%20for%20WooCommerce&amp;severity=high&amp;id=68fc626907185a1a52fd761c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12005-cwe-285-improper-authorization-in-r-8dcfa872</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12005%3A%20CWE-285%20Improper%20Authorization%20in%20rextheme%20WP%20VR%20%E2%80%93%20360%20Panorama%20and%20Free%20Virtual%20Tour%20Builder%20For%20WordPress&amp;severity=medium&amp;id=68fc626907185a1a52fd7617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10694-cwe-862-missing-authorization-in-sm-e50a62b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10694%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20UserFeedback%20%E2%80%93%20Create%20Interactive%20Feedback%20Form%2C%20User%20Surveys%2C%20and%20Polls%20in%20Seconds&amp;severity=medium&amp;id=68fc626907185a1a52fd75f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6639-cwe-285-improper-authorization-in-th-9d4511a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6639%3A%20CWE-285%20Improper%20Authorization%20in%20themeum%20Tutor%20LMS%20Pro&amp;severity=medium&amp;id=68fc626a07185a1a52fd762b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11888-cwe-863-incorrect-authorization-in--a116156d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11888%3A%20CWE-863%20Incorrect%20Authorization%20in%20roxnor%20ShopEngine%20Elementor%20WooCommerce%20Builder%20Addon%20%E2%80%93%20All%20in%20One%20WooCommerce%20Solution&amp;severity=low&amp;id=68fc626907185a1a52fd7613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10737-cwe-79-improper-neutralization-of-i-0687ab32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StudioPress%20Open%20Source%20Genesis%20Framework&amp;severity=medium&amp;id=68fc626907185a1a52fd75f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11879-cwe-285-improper-authorization-in-e-cf841b43</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11879%3A%20CWE-285%20Improper%20Authorization%20in%20edge22%20GenerateBlocks&amp;severity=medium&amp;id=68fc626907185a1a52fd760d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8588-cwe-79-improper-neutralization-of-in-0235a16e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20publishpress%20PublishPress%20Blocks%20%E2%80%93%20Block%20Controls%2C%20Block%20Visibility%2C%20Block%20Permissions&amp;severity=medium&amp;id=68fc626a07185a1a52fd7637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11244-cwe-285-improper-authorization-in-s-c5141c55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11244%3A%20CWE-285%20Improper%20Authorization%20in%20saadiqbal%20Password%20Protected%20%E2%80%94%20Lock%20Entire%20Site%2C%20Pages%2C%20Posts%2C%20Categories%2C%20and%20Partial%20Content&amp;severity=low&amp;id=68fc626907185a1a52fd75ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11564-cwe-862-missing-authorization-in-th-01782b6a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11564%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=68fc626907185a1a52fd7609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8666-cwe-79-improper-neutralization-of-in-90bfa779</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uapp%20Testimonial%20Carousel%20For%20Elementor&amp;severity=medium&amp;id=68fc626a07185a1a52fd763c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6680-cwe-284-improper-access-control-in-t-3f659073</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6680%3A%20CWE-284%20Improper%20Access%20Control%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=68fc626a07185a1a52fd762f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8413-cwe-79-improper-neutralization-of-in-3712ba28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8413%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20Listeo%20-%20Directory%20%26%20Listings%20With%20Booking%20-%20WordPress%20Theme&amp;severity=medium&amp;id=68fc626a07185a1a52fd7633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11238-cwe-79-improper-neutralization-of-i-57d0e0aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasunsen%20Watu%20Quiz&amp;severity=high&amp;id=68fc626907185a1a52fd75fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11269-cwe-862-missing-authorization-in-wo-f9799e7f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11269%3A%20CWE-862%20Missing%20Authorization%20in%20woobewoo%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=medium&amp;id=68fc626907185a1a52fd7604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11823-cwe-80-improper-neutralization-of-s-17fa3174</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11823%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=medium&amp;id=68fc525a9a6ac51d5490d294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10579-cwe-862-missing-authorization-in-wp-180bfe17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10579%3A%20CWE-862%20Missing%20Authorization%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=medium&amp;id=68fc525a9a6ac51d5490d28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11760-cwe-200-exposure-of-sensitive-infor-101447ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11760%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20digitalmeactivecampaign%20eRoom%20%E2%80%93%20Webinar%20%26%20Meeting%20Plugin%20for%20Zoom%2C%20Google%20Meet%2C%20Microsoft%20Teams&amp;severity=medium&amp;id=68fc33f2f816635dda09c014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-25-12ce565f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-25&amp;severity=medium&amp;id=68fd6728bfa5fb493c4932b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34503-cwe-347-improper-verification-of-cr-7f1518f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34503%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%201&amp;severity=high&amp;id=68fc09d0f816635ddaf339e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34502-cwe-1326-missing-immutable-root-of--fe950508</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34502%3A%20CWE-1326%20Missing%20Immutable%20Root%20of%20Trust%20in%20Hardware%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%202&amp;severity=high&amp;id=68fc09d0f816635ddaf339e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34500-cwe-321-use-of-hard-coded-cryptogra-6cec96a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34500%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%202&amp;severity=high&amp;id=68fc063ff816635ddaf2f2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12194-cwe-400-uncontrolled-resource-consu-3223442c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12194%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20Bouncy%20Castle%20for%20Java%20FIPS&amp;severity=medium&amp;id=68fc063ff816635ddaf2f2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62711-cwe-755-improper-handling-of-except-11d9b6e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62711%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=68fbf839f816635ddaf181e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4106-cwe-489-active-debug-code-in-watchgu-8e14f689</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4106%3A%20CWE-489%20Active%20Debug%20Code%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=68fbf126f816635ddaf05ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34293-cwe-639-authorization-bypass-throug-dbe8ff0f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34293%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Naviga%20Global%20%2F%20Miles%2033%20GN4%20Publishing%20System&amp;severity=high&amp;id=68fbedaaf816635ddaeff541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62723-cwe-772-missing-release-of-resource-288663a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62723%3A%20CWE-772%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20halfgaar%20FlashMQ&amp;severity=medium&amp;id=68fbe316f816635ddaee62b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pentesting-nextjs-server-actions-a1fcb3bf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pentesting%20Next.js%20Server%20Actions&amp;severity=high&amp;id=68fbdf97f816635ddaedfc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62716-cwe-79-improper-neutralization-of-i-5000e19c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62716%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20makeplane%20plane&amp;severity=high&amp;id=68fbdf95f816635ddaedfbd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smishing-triad-linked-to-194000-malicious-domains--abea59af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Smishing%20Triad%20Linked%20to%20194%2C000%20Malicious%20Domains%20in%20Global%20Phishing%20Operation&amp;severity=high&amp;id=68fbdc0df816635ddaed99d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-launch-mass-attacks-exploiting-outdated-wo-c24bd372</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20launch%20mass%20attacks%20exploiting%20outdated%20WordPress%20plugins&amp;severity=high&amp;id=68fbdc0df816635ddaed99cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-emergency-patch-for-critical-wind-34dc1837</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Issues%20Emergency%20Patch%20for%20Critical%20Windows%20Server%20Bug&amp;severity=critical&amp;id=68fc64e207185a1a52fe2bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mozilla-new-firefox-extensions-must-disclose-data--ff0e13a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mozilla%3A%20New%20Firefox%20extensions%20must%20disclose%20data%20collection%20practices&amp;severity=high&amp;id=68fbbc69f816635ddae90c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-targets-indian-government-with-golang-based--10fe43ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36%20Targets%20Indian%20Government%20with%20Golang-Based%20DeskRAT%20Malware%20Campaign&amp;severity=high&amp;id=68fbbc69f816635ddae90c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-lastpass-death-claims-used-to-breach-password-22480ce0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20LastPass%20death%20claims%20used%20to%20breach%20password%20vaults&amp;severity=high&amp;id=68fbbc69f816635ddae90c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cisa-layoffs-weaken-civilian-cyber-defense-41ef79dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20CISA%20Layoffs%20Weaken%20Civilian%20Cyber%20Defense&amp;severity=medium&amp;id=68fc64e207185a1a52fe2bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-att-careers-breach-with--473f02c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Claims%20AT%26T%20Careers%20Breach%20with%20576%2C000%20Records&amp;severity=high&amp;id=68fbb8eff816635ddae567da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-emergency-patch-for-actively-expl-5cb364dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Patched%20Critical%20Microsoft%20WSUS%20Flaw%20Comes%20Under%20Active%20Exploitation&amp;severity=critical&amp;id=68fbc58bf816635ddaea4365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shutdown-sparks-85-increase-in-us-government-cyber-1685f38a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shutdown%20Sparks%2085%25%20Increase%20in%20US%20Government%20Cyberattacks&amp;severity=medium&amp;id=68fc64e207185a1a52fe2bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privacy-rankings-of-popular-messaging-apps-in-2025-15ed1bb1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privacy%20rankings%20of%20popular%20messaging%20apps%20in%202025%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68fba6d444c617250775d1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12176-cwe-1242-inclusion-of-undocumented--6c13ea97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12176%3A%20CWE-1242%3A%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fba47553dd06bf204856d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62714-cwe-862-missing-authorization-in-ka-011b8bf2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62714%3A%20CWE-862%3A%20Missing%20Authorization%20in%20karmada-io%20dashboard&amp;severity=high&amp;id=68fba0f053dd06bf20425529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-windows-server-wsus-vulnerability-exploit-cfb4e058</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Windows%20Server%20WSUS%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=68fb9135b0116405c2a4ced3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11145-cwe-203-observable-discrepancy-in-c-04b51405</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11145%3A%20CWE-203%20Observable%20Discrepancy%20in%20CBK%20Soft%20Software%20Hardware%20Electronic%20Computer%20Systems%20Industry%20and%20Trade%20Inc.%20enVision&amp;severity=high&amp;id=68fb9152b0116405c2a4da20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8536-cwe-89-improper-neutralization-of-sp-d5c02924</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8536%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=68fb9152b0116405c2a4da1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43994-cwe-306-missing-authentication-for--9e8af551</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43994%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Dell%20Dell%20Storage%20Manager&amp;severity=high&amp;id=68fb93e23b281b3632d40dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43995-cwe-287-improper-authentication-in--5f7681b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43995%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20Dell%20Storage%20Manager&amp;severity=critical&amp;id=68fb956d3b281b3632d6adf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46425-cwe-611-improper-restriction-of-xml-cdf6bdad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46425%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20Dell%20Storage%20Manager&amp;severity=medium&amp;id=68fb8a56b0116405c29b03ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-perplexity-comet-browser-users-bea24928</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20Perplexity%20Comet%20Browser%20Users&amp;severity=medium&amp;id=68fb884fecfa37776dced118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-aim-at-european-drone-compani-337e37f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Aim%20at%20European%20Drone%20Companies&amp;severity=medium&amp;id=68fb7f59a4ecdcc9296547ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-ios-26-deletes-spyware-evidence-shad-4a08df82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20iOS%2026%20Deletes%20Spyware%20Evidence%2C%20Shadow%20Escape%20Attack%2C%20Cyber%20Exec%20Sold%20Secrets%20to%20Russia&amp;severity=medium&amp;id=68fb75fc65a68e4110999d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11576-cwe-1236-improper-neutralization-of-10b57814</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11576%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20newcodebyte%20AI%20Chatbot%20Free%20Models%20%E2%80%93%20Customer%20Support%2C%20Live%20Chat%2C%20Virtual%20Assistant&amp;severity=medium&amp;id=68fb728365a68e4110938108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3000-youtube-videos-exposed-as-malware-traps-in-ma-95227076</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%2C000%20YouTube%20Videos%20Exposed%20as%20Malware%20Traps%20in%20Massive%20Ghost%20Network%20Operation&amp;severity=high&amp;id=68fb6f0665a68e41108eaf27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toys-r-us-canada-warns-customers-info-leaked-in-da-145c7d1e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Toys%20%E2%80%9CR%E2%80%9D%20Us%20Canada%20warns%20customers&apos;%20info%20leaked%20in%20data%20breach&amp;severity=high&amp;id=68fb6f0665a68e41108eaf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-earn-1024750-for-73-zero-days-at-pwn2own-i-f8f061f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20earn%20%241%2C024%2C750%20for%2073%20zero-days%20at%20Pwn2Own%20Ireland&amp;severity=high&amp;id=68fb6f0665a68e41108eaf2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-server-emergency-patches-fix-wsus-bug-with-4c43c143</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Server%20emergency%20patches%20fix%20WSUS%20bug%20with%20PoC%20exploit&amp;severity=critical&amp;id=68fb6cbde72abe49433d7dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10861-cwe-918-server-side-request-forgery-eef41d53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10861%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=high&amp;id=68fb65c0e72abe4943328fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-smishing-deluge-china-based-campaign-flooding--646edf86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Smishing%20Deluge%3A%20China-Based%20Campaign%20Flooding%20Global%20Text%20Messages&amp;severity=medium&amp;id=68fb62139505544a4c4d54fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toys-r-us-canada-customer-information-leaked-onlin-eae39eaf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Toys%20%E2%80%98R%E2%80%99%20Us%20Canada%20Customer%20Information%20Leaked%20Online&amp;severity=medium&amp;id=68fb62089505544a4c4d5394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-cybersecurity-perception-gap-why-executives-an-50951c87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Cybersecurity%20Perception%20Gap%3A%20Why%20Executives%20and%20Practitioners%20See%20Risk%20Differently&amp;severity=medium&amp;id=68fbc58bf816635ddaea436b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-spotted-baohuo-android-backdoor-is-hijacking-243c0662</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Spotted%20Baohuo%20Android%20Backdoor%20Is%20Hijacking%20Telegram%20Accounts%20Through%20Fake%20Telegram%20X%20App&amp;severity=medium&amp;id=68fb5e8e9505544a4c484bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5605-vulnerability-in-wso2-wso2-identity--b223b425</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5605%3A%20Vulnerability%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=68fb50f0c5193890929c8395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5350-cwe-918-server-side-request-forgery--ee5374ed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5350%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=68fb50f0c5193890929c8392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-disables-downloaded-file-previews-to-blo-419ee883</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Disables%20Downloaded%20File%20Previews%20to%20Block%20NTLM%20Hash%20Leaks&amp;severity=medium&amp;id=68fb4f21c8f3a4177c5d3c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36361-missing-authorization-in-ibm-app-co-e4c07416</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36361%3A%20CWE-862%20Missing%20Authorization%20in%20IBM%20App%20Connect%20Enterprise&amp;severity=medium&amp;id=68fb4ba8c8f3a4177c54ac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12134-cwe-862-missing-authorization-in-bd-82ee9698</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12134%3A%20CWE-862%20Missing%20Authorization%20in%20bdthemes%20ZoloBlocks%20%E2%80%93%20Gutenberg%20Block%20Editor%20Plugin%20with%20Advanced%20Blocks%2C%20Dynamic%20Content%2C%20Templates%20%26%20Patterns&amp;severity=medium&amp;id=68fb482ec8f3a4177c4fd797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12136-cwe-918-server-side-request-forgery-a137d54f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12136%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20devowl%20Real%20Cookie%20Banner%3A%20GDPR%20%26%20ePrivacy%20Cookie%20Consent&amp;severity=medium&amp;id=68fb482ec8f3a4177c4fd79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jewelbug-chinese-apt-group-widens-reach-to-russia-63a80dac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jewelbug%3A%20Chinese%20APT%20Group%20Widens%20Reach%20to%20Russia&amp;severity=medium&amp;id=68fb4682df38e44162dd7192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11253-cwe-89-improper-neutralization-of-s-697280a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11253%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aksis%20Technology%20Inc.%20Netty%20ERP&amp;severity=critical&amp;id=68fb3da20691a1b5991c5184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10749-cwe-862-missing-authorization-in-10-d11ff0a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10749%3A%20CWE-862%20Missing%20Authorization%20in%2010up%20Microsoft%20Azure%20Storage%20for%20WordPress&amp;severity=medium&amp;id=68fb3a1e0691a1b599160705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12017-cwe-79-improper-neutralization-of-i-08f2d7f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12017%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teyldoan%20VNPAY%20Payment%20gateway&amp;severity=medium&amp;id=68fb3a1f0691a1b59916073e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11172-cwe-862-missing-authorization-in-pl-7a0c8f14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11172%3A%20CWE-862%20Missing%20Authorization%20in%20plagiarismchecker%20Check%20Plagiarism&amp;severity=medium&amp;id=68fb3a1e0691a1b599160712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10901-cwe-862-missing-authorization-in-or-fec8e4fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10901%3A%20CWE-862%20Missing%20Authorization%20in%20originalityai%20Originality.ai%20AI%20Checker&amp;severity=medium&amp;id=68fb3a1e0691a1b59916070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10902-cwe-285-improper-authorization-in-o-7b4cd60e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10902%3A%20CWE-285%20Improper%20Authorization%20in%20originalityai%20Originality.ai%20AI%20Checker&amp;severity=medium&amp;id=68fb3a1e0691a1b59916070e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12014-cwe-862-missing-authorization-in-ge-115206c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12014%3A%20CWE-862%20Missing%20Authorization%20in%20getclouder%20NGINX%20Cache%20Optimizer&amp;severity=medium&amp;id=68fb3a1f0691a1b599160736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11889-cwe-434-unrestricted-upload-of-file-83928661</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11889%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20edgarrojas%20AIO%20Forms%20%E2%80%93%20Craft%20Complex%20Forms%20Easily&amp;severity=high&amp;id=68fb3a1f0691a1b59916072e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11257-cwe-862-missing-authorization-in-li-4984cf4d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11257%3A%20CWE-862%20Missing%20Authorization%20in%20limelightmarketing%20LLM%20Hubspot%20Blog%20Import&amp;severity=medium&amp;id=68fb3a1e0691a1b599160716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12096-cwe-79-improper-neutralization-of-i-8b8ffc95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12096%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prawas%20Simple%20Excel%20Pricelist%20for%20WooCommerce&amp;severity=medium&amp;id=68fb3a1f0691a1b59916074c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11504-cwe-532-insertion-of-sensitive-info-325ea0cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11504%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20quickcreator%20Quickcreator%20%E2%80%93%20AI%20Blog%20Writer&amp;severity=high&amp;id=68fb3a1e0691a1b59916071a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10748-cwe-89-improper-neutralization-of-s-2238b942</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10748%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onlinediagnosticbd%20RapidResult&amp;severity=medium&amp;id=68fb3a1e0691a1b599160701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12028-cwe-352-cross-site-request-forgery--73da3966</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12028%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20indieweb%20IndieAuth&amp;severity=high&amp;id=68fb3a1f0691a1b599160742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10701-cwe-79-improper-neutralization-of-i-3ffc61e4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottpaterson%20Time%20Clock%20%E2%80%93%20A%20WordPress%20Employee%20%26%20Volunteer%20Time%20Clock%20Plugin&amp;severity=medium&amp;id=68fb3a1e0691a1b5991606f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11887-cwe-862-missing-authorization-in-ti-61b03fc7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11887%3A%20CWE-862%20Missing%20Authorization%20in%20tiagohillebrandt%20Supervisor&amp;severity=medium&amp;id=68fb3a1e0691a1b59916071e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10740-cwe-89-improper-neutralization-of-s-785ac503</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10740%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rupok98%20URL%20Shortener%20Plugin%20For%20WordPress&amp;severity=medium&amp;id=68fb3a1e0691a1b5991606fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12072-cwe-352-cross-site-request-forgery--9c18d1b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12072%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mynamevenu24%20Disable%20Content%20Editor%20For%20Specific%20Template&amp;severity=medium&amp;id=68fb3a1f0691a1b599160748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11992-cwe-80-improper-neutralization-of-s-78ac763a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11992%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20cnaveenkumar%20Multi%20Item%20Responsive%20Slider&amp;severity=medium&amp;id=68fb3a1f0691a1b599160732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12016-cwe-79-improper-neutralization-of-i-058bef98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12016%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20muniyandibg%20qnotsquiz&amp;severity=medium&amp;id=68fb3a1f0691a1b59916073a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-whatsapp-hacker-says-exploit-privately-rep-407be76f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20WhatsApp%20Hacker%20Says%20Exploit%20Privately%20Disclosed%20to%20Meta&amp;severity=medium&amp;id=68fb350e5d093e3bcff6dc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62868-cwe-98-improper-control-of-filename-23df7f45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62868%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Edge%20CPT&amp;severity=high&amp;id=68fb31975d093e3bcfef2e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6440-cwe-434-unrestricted-upload-of-file--7ab8e512</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6440%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20JMA%20Plugins%20WooCommerce%20Designer%20Pro&amp;severity=critical&amp;id=68fb2c431dfaf394b9f9a8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-spreading-glassworm-infects-vs-code-extension-7950b3ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Spreading%20&apos;GlassWorm&apos;%20Infects%20VS%20Code%20Extensions%20in%20Widespread%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=68fbc58bf816635ddaea4371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9158-cwe-79-improper-neutralization-of-in-3d977a2d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9158%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Best%20Practical%20Request%20Tracker&amp;severity=medium&amp;id=68fb1ac81658c9c3946ecbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9978-cwe-79-cross-site-scripting-xss-in-j-90e5fe26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9978%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Jeg%20Kit%20for%20Elementor&amp;severity=medium&amp;id=68fb1ac81658c9c3946ecbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10874-cwe-918-server-side-request-forgery-3f851184</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10874%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Orbit%20Fox%3A%20Duplicate%20Page%2C%20Menu%20Icons%2C%20SVG%20Support%2C%20Cookie%20Notice%2C%20Custom%20Fonts%20%26%20More&amp;severity=medium&amp;id=68fb1ac81658c9c3946ecbc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10723-cwe-22-improper-limitation-of-a-pat-6e959d61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10723%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PixelYourSite&amp;severity=low&amp;id=68fb1ac81658c9c3946ecbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61931-cross-site-scripting-xss-in-implem--ac7d5524</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61931%3A%20Cross-site%20scripting%20(XSS)%20in%20Implem%20Inc.%20Pleasanter&amp;severity=medium&amp;id=68fb0eacd0b277ca6d24c228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58070-cross-site-scripting-xss-in-implem--7731de11</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58070%3A%20Cross-site%20scripting%20(XSS)%20in%20Implem%20Inc.%20Pleasanter&amp;severity=medium&amp;id=68fb0eacd0b277ca6d24c224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-is-attempting-a-comeback-as-a-new-ransomwa-fcf647a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%20is%20attempting%20a%20comeback%20as%20a%20new%20ransomware%20variant%20%22ChuongDong%22%20targeting%20Windows%2C%20Linux%2C%20and%20ESXi&amp;severity=medium&amp;id=68faf36e00e9e97283b9a298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-crypto-bust-offers-hope-in-battle-against-cyber-0b78c9b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Crypto%20Bust%20Offers%20Hope%20in%20Battle%20Against%20Cybercrime%20Syndicates&amp;severity=medium&amp;id=68fade4400e9e97283b3df02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-cloud-account-for-information-thu-oct-23r-39696158</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Cloud%20Account%20for%20Information%2C%20(Thu%2C%20Oct%2023rd)&amp;severity=medium&amp;id=68faccc100e9e97283ae5144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-24-f5dc1d1e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-24&amp;severity=medium&amp;id=68fc143ef816635ddaf4dc93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60954-na-f9107b26</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60954%3A%20n%2Fa&amp;severity=high&amp;id=68fbe316f816635ddaee62ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52099-na-893fb4f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52099&amp;severity=null&amp;id=68fbe316f816635ddaee62b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60419-na-984f9b0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60419%3A%20n%2Fa&amp;severity=medium&amp;id=68fbd88af816635ddaed1bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60730-na-c703a3c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60730%3A%20n%2Fa&amp;severity=high&amp;id=68fbbfeff816635ddae95b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60735-na-e1013000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60735%3A%20n%2Fa&amp;severity=high&amp;id=68fbbc9cf816635ddae913b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60731-na-e8cace3d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60731%3A%20n%2Fa&amp;severity=high&amp;id=68fbbc9cf816635ddae913b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60729-na-8d656ffe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60729%3A%20n%2Fa&amp;severity=medium&amp;id=68fbbc9cf816635ddae913ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60561-na-89d06c3e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60561%3A%20n%2Fa&amp;severity=high&amp;id=68fba6ca44c617250775a793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60559-na-30f10c73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60559%3A%20n%2Fa&amp;severity=high&amp;id=68fba6ca44c617250775a790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60803-na-755648fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60803%3A%20n%2Fa&amp;severity=critical&amp;id=68fba47653dd06bf20485769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60552-na-51a759a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60552%3A%20n%2Fa&amp;severity=high&amp;id=68fba47653dd06bf20485766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60551-na-1153cba4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60551%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60550-na-a1a0c3d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60550%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf2048570e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60549-na-0288829a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60549%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf2048570b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60564-na-ea8e2f67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60564%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60563-na-f2ea1fc2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60563%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60562-na-1fd806b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60562%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60553-na-b5590e09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60553%3A%20n%2Fa&amp;severity=critical&amp;id=68fba47553dd06bf204856fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60548-na-5ca89883</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60548%3A%20n%2Fa&amp;severity=critical&amp;id=68fba47553dd06bf204856fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60547-na-bac5dfb8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60547%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf204856f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60558-na-3234c5a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60558%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf20425526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60557-na-60b907ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60557%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf20425523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60556-na-bb5b24f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60556%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf20425520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60555-na-412cd212</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60555%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf2042551d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60554-na-f30e070e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60554%3A%20n%2Fa&amp;severity=critical&amp;id=68fba0f053dd06bf2042551a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60801-na-1b83e602</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60801%3A%20n%2Fa&amp;severity=high&amp;id=68fb9d7b53dd06bf203dab00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60566-na-d5344691</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60566%3A%20n%2Fa&amp;severity=high&amp;id=68fb9d7b53dd06bf203daafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60565-na-e7ac0d06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60565%3A%20n%2Fa&amp;severity=high&amp;id=68fb9d7b53dd06bf203daafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56438-na-9b6baa6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56438%3A%20n%2Fa&amp;severity=medium&amp;id=68fb975e3b281b3632d8256f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60938-na-0037679b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60938%3A%20n%2Fa&amp;severity=high&amp;id=68fb956d3b281b3632d6adfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60936-na-df3b04fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60936%3A%20n%2Fa&amp;severity=medium&amp;id=68fb956d3b281b3632d6adfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60570-na-162d34b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60570%3A%20n%2Fa&amp;severity=high&amp;id=68fb93e23b281b3632d40dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60569-na-6fa93d41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60569%3A%20n%2Fa&amp;severity=high&amp;id=68fb93e23b281b3632d40dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60568-na-06b5f253</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60568%3A%20n%2Fa&amp;severity=high&amp;id=68fb93e23b281b3632d40dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61430-na-2152dfea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61430%3A%20n%2Fa&amp;severity=medium&amp;id=68fb9152b0116405c2a4da23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60572-na-7d629312</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60572%3A%20n%2Fa&amp;severity=high&amp;id=68fb9152b0116405c2a4da19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60571-na-750c6cfb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60571%3A%20n%2Fa&amp;severity=high&amp;id=68fb9152b0116405c2a4da16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46185-na-487c379a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46185%3A%20n%2Fa&amp;severity=medium&amp;id=68fb8a56b0116405c29b03a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46183-na-5ea9f7eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46183%3A%20n%2Fa&amp;severity=high&amp;id=68fb886cecfa37776dcfb8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7730-cwe-79-improper-neutralization-of-in-34540007</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=68faafd950358b89bd7bfd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60023-cwe-23-in-automationdirect-producti-3cd44c14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60023%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=medium&amp;id=68faafd950358b89bd7bfd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59776-cwe-23-in-automationdirect-producti-276eaa44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59776%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=medium&amp;id=68faac5550358b89bd740d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62254-cwe-22-improper-limitation-of-a-pat-691acb94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62254%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68faac5550358b89bd740d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58429-cwe-23-in-automationdirect-producti-211f46c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58429%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faac5550358b89bd740d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58078-cwe-23-in-automationdirect-producti-0577a3f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58078%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa8db50358b89bd6f0362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58456-cwe-23-in-automationdirect-producti-b3197443</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58456%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa8db50358b89bd6f0368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61934-cwe-1327-in-automationdirect-produc-1d9e035a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61934%3A%20CWE-1327%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=critical&amp;id=68faa76d436a4ae5df819867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62688-cwe-732-in-automationdirect-product-3d64145f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62688%3A%20CWE-732%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=medium&amp;id=68faa76d436a4ae5df81986d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61977-cwe-640-in-automationdirect-product-d357dedb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61977%3A%20CWE-640%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa76d436a4ae5df819873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/help-wanted-vietnamese-actors-using-fake-job-posti-b7d16ca8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Help%20Wanted%3A%20Vietnamese%20Actors%20Using%20Fake%20Job%20Posting%20Campaigns%20to%20Deliver%20Malware%20and%20Steal%20Credentials&amp;severity=medium&amp;id=68fb42fddf38e44162d5bae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparenttribe-targets-indian-military-with-desk-bd6f2394</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TransparentTribe%20Targets%20Indian%20Military%20with%20DeskRAT%20Malware&amp;severity=medium&amp;id=68fb42fddf38e44162d5baf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62498-cwe-23-in-automationdirect-producti-938f2593</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62498%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa3e9436a4ae5df797f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fear-the-sessionreaper-adobe-commerce-flaw-under-a-4ca43c60</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fear%20the%20&apos;SessionReaper&apos;%3A%20Adobe%20Commerce%20Flaw%20Under%20Attack&amp;severity=critical&amp;id=68fad07600e9e97283b1707b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59503-cwe-918-server-side-request-forgery-8b007bb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59503%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Compute%20Resource%20Provider&amp;severity=critical&amp;id=68fa9f43ff7543f249ea8df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59273-cwe-284-improper-access-control-in--4308bfe1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59273%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Event%20Grid%20System&amp;severity=high&amp;id=68fa9f42ff7543f249ea8df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59500-cwe-284-improper-access-control-in--7c264155</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59500%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Notification%20Service&amp;severity=high&amp;id=68fa9bb9ff7543f249e2ee0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12100-cwe-276-incorrect-default-permissio-ba3d994a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12100%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MongoDB%20BI%20Connector%20ODBC%20driver&amp;severity=high&amp;id=68fa99bbff7543f249e1540f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/my-aws-account-got-hacked-here-is-what-happened-2154829d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=My%20AWS%20Account%20Got%20Hacked%20-%20Here%20Is%20What%20Happened&amp;severity=medium&amp;id=68fa983eff7543f249de820a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tired-of-unpaid-toll-texts-blame-the-smishing-tria-a2e1241a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tired%20of%20Unpaid%20Toll%20Texts%3F%20Blame%20the%20&apos;Smishing%20Triad&apos;&amp;severity=high&amp;id=68fad07600e9e97283b1707e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57848-incorrect-default-permissions-in-re-60d7dc8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57848%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Virtualization%204&amp;severity=medium&amp;id=68fa8e34326f59cb11ee3240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62517-cwe-1321-improperly-controlled-modi-641442dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62517%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20rollbar%20rollbar.js&amp;severity=medium&amp;id=68fa8fc31a753c8dfc003b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58428-cwe-77-improper-neutralization-of-s-c25d3ee8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58428%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Veeder-Root%20TLS4B%20Automatic%20Tank%20Gauge%20System&amp;severity=critical&amp;id=68fa8736326f59cb11e0f20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55067-cwe-190-integer-overflow-or-wraparo-1f384240</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55067%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Veeder-Root%20TLS4B%20Automatic%20Tank%20Gauge%20System&amp;severity=high&amp;id=68fa85e2a3a2e7083d940cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-a-way-to-use-a-computer-mouse-for-2f1dd309</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20find%20a%20way%20to%20use%20a%20computer%20mouse%20for%20eavesdropping&amp;severity=low&amp;id=68fa85f0a3a2e7083d940ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62236-cwe-204-observable-response-discrep-10a1e0c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62236%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Frontier%20Airlines%20flyfrontier.com&amp;severity=medium&amp;id=68fa85e2a3a2e7083d940cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-leaks-834-gb-of-comcast-data-aft-c7175c97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Leaks%20834%20GB%20of%20Comcast%20Data%20After%20%241.2%20Million%20Ransom%20Demand&amp;severity=medium&amp;id=68fa85cfa3a2e7083d93e9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12044-cwe-770-allocation-of-resources-wit-3b1e9a44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12044%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=68fa824ea3a2e7083d8baf09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11621-cwe-288-authentication-bypass-using-690b69bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11621%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=68fa7ed3a3a2e7083d87191c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6978-cwe-78-improper-neutralization-of-sp-32aedff1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6978%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Arista%20Networks%20Arista%20Edge%20Threat%20Management%20-%20Arista%20Next%20Generation%20Firewall&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62255-cwe-79-improper-neutralization-of-i-11a4e110</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62255%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=low&amp;id=68fa7cdd3832d3f145b8bf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6979-cwe-287-improper-authentication-in-a-30933e7b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6979%3A%20CWE-287%20Improper%20Authentication%20in%20Arista%20Networks%20Arista%20Edge%20Threat%20Management%20-%20Arista%20Next%20Generation%20Firewall&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6980-cwe-200-exposure-of-sensitive-inform-032afac5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6980%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Arista%20Networks%20Arista%20Edge%20Threat%20Management%20-%20Arista%20Next%20Generation%20Firewall&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23352-cwe-824-access-of-uninitialized-poi-20eb5fef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23352%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23347-cwe-276-incorrect-default-permissio-ed918689</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23347%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=68fa73f6bf11aeb6491dbf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23345-cwe-125-out-of-bounds-read-in-nvidi-8d9c7c75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23345%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20GeForce&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23332-cwe-476-null-pointer-dereference-in-48e9cf1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23332%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23330-cwe-476-null-pointer-dereference-in-f56d74ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23330%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20GeForce&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10937-cwe-754-improper-check-for-unusual--c39503c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10937%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Oxford%20Nano%20Technologies%20MinKNOW&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23300-cwe-476-null-pointer-dereference-in-31c3b95f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23300%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54808-cwe-522-insufficiently-protected-cr-c4e34744</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54808%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Oxford%20Nano%20Technologies%20MinKNOW&amp;severity=high&amp;id=68fa73f6bf11aeb6491dbf97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shadow-escape-0-click-attack-in-ai-assistants--b7e3857a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Shadow%20Escape%200-Click%20Attack%20in%20AI%20Assistants%20Puts%20Trillions%20of%20Records%20at%20Risk&amp;severity=medium&amp;id=68fa680a9122777b72f8cee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34156-cwe-497-exposure-of-sensitive-syste-26ef4f26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34156%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Tibbo%20Systems%20AggreGate%20Network%20Manager&amp;severity=medium&amp;id=68fa5a8d2f85fa8bca6362c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34155-cwe-204-observable-response-discrep-b65226e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34155%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Tibbo%20Systems%20AggreGate%20Network%20Manager&amp;severity=medium&amp;id=68fa5a8d2f85fa8bca6362c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62169-cwe-287-improper-authentication-in--860ec987</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62169%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WildRikku%20OctoPrint-SpoolManager&amp;severity=high&amp;id=68fa55172f85fa8bca58f7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privescing-a-laptop-with-bitlocker-pin-cc796d59</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privescing%20a%20Laptop%20with%20BitLocker%20%2B%20PIN&amp;severity=medium&amp;id=68fa4e950fcf0b81396757df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12114-cwe-1191-on-chip-debug-and-test-int-8c011b7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12114%3A%20CWE-1191%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fa4ca10fcf0b8139659480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-lure-defense-engineers-with-f-9daef1cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Lure%20Defense%20Engineers%20With%20Fake%20Jobs%20to%20Steal%20Drone%20Secrets&amp;severity=medium&amp;id=68facf9f00e9e97283b112e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59048-cwe-863-incorrect-authorization-in--407aa5bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59048%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20openbao%20openbao-plugins&amp;severity=high&amp;id=68fa49d81a6be256cbb1964f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-government-now-actively-managing-cybercrim-6b63a856</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Government%20Now%20Actively%20Managing%20Cybercrime%20Groups%3A%20Security%20Firm&amp;severity=medium&amp;id=68fa40a0958c70c1028a71f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12110-insufficient-session-expiration-in--7b1abdc5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12110%3A%20Insufficient%20Session%20Expiration%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=68fa3b37958c70c10281cfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11429-insufficient-session-expiration-in--d01122fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11429%3A%20Insufficient%20Session%20Expiration%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=68fa382cf7adcc2ea5025029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/modding-and-distributing-mobile-apps-with-frida-e78e7cc2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Modding%20And%20Distributing%20Mobile%20Apps%20with%20Frida&amp;severity=medium&amp;id=68fa382ff7adcc2ea502504f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leveraging-machine-learning-to-enhance-acoustic-ea-ae3d9c66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leveraging%20Machine%20Learning%20to%20Enhance%20Acoustic%20Eavesdropping%20Attacks%20(Blog%20Series)&amp;severity=medium&amp;id=68fa34acf7adcc2ea5f9d3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1679-cwe-79-improper-neutralization-of-in-bb28313e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1679%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Moxa%20TN-4500A%20Series&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gotta-fly-lazarus-targets-the-uav-sector-e9ac2223</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gotta%20fly%3A%20Lazarus%20targets%20the%20UAV%20sector&amp;severity=medium&amp;id=68fb5e869505544a4c48472d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-youtubes-malware-distribution-network-9f709208</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20YouTube&apos;s%20Malware%20Distribution%20Network&amp;severity=medium&amp;id=68fb62139505544a4c4d5526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/agenda-ransomware-deploys-linux-variant-on-windows-72d5fb88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Agenda%20Ransomware%20Deploys%20Linux%20Variant%20on%20Windows%20Systems%20Through%20Remote%20Management%20Tools%20and%20BYOVD%20Techniques&amp;severity=medium&amp;id=690891465abee5c7f36b3228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62256-cwe-862-missing-authorization-in-li-4c6ce82a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62256%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d3a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53701-cwe-79-improper-neutralization-of-i-0b0d0f3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vilar%20VS-IPC1002&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d39c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53702-cwe-755-improper-handling-of-except-d1078036</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53702%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Vilar%20VS-IPC1002&amp;severity=high&amp;id=68fa34abf7adcc2ea5f9d39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-sidebar-spoofing-puts-chatgpt-atlas-perplexity--ecfa21e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Sidebar%20Spoofing%20Puts%20ChatGPT%20Atlas%2C%20Perplexity%20Comet%20and%20Other%20Browsers%20at%20Risk&amp;severity=medium&amp;id=68fa289b4ebc55e8a8379c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-youtubes-malware-distribution-network-bcfe546b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20YouTube%E2%80%99s%20Malware%20Distribution%20Network&amp;severity=medium&amp;id=68fa270e60d00e69dc99facd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10705-cwe-918-server-side-request-forgery-d217f5db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10705%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mxchat%20MxChat%20%E2%80%93%20AI%20Chatbot%20%26%20Content%20Generation%20for%20WordPress&amp;severity=medium&amp;id=68fa270860d00e69dc99f587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11128-cwe-918-server-side-request-forgery-176e8037</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11128%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20themeisle%20RSS%20Aggregator%20by%20Feedzy%20%E2%80%93%20Feed%20to%20Post%2C%20Autoblogging%2C%20News%20%26%20YouTube%20Video%20Feeds%20Aggregator&amp;severity=medium&amp;id=68fa270960d00e69dc99fa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8427-cwe-79-improper-neutralization-of-in-d7a5bda3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Beaver%20Builder%20Team%20Beaver%20Builder%20Plugin%20(Starter%20Version)&amp;severity=medium&amp;id=68fa270960d00e69dc99fa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11023-cwe-829-inclusion-of-functionality--095c680d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11023%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20ArkSigner%20Software%20and%20Hardware%20Inc.%20AcBakImzala&amp;severity=critical&amp;id=68fa270860d00e69dc99f5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/183-million-synthient-stealer-credentials-added-to-9ead0342</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=183%20Million%20Synthient%20Stealer%20Credentials%20Added%20to%20Have%20I%20Been%20Pwned&amp;severity=medium&amp;id=68fa238b60d00e69dc91d411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-targeting-android-devices-thu-oct-23rd-50719d6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20Targeting%20Android%20Devices%2C%20(Thu%2C%20Oct%2023rd)&amp;severity=medium&amp;id=68fa1e1cfd7c94938af099d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/secure-ai-at-scale-and-speed-learn-the-framework-i-eb90ad5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Secure%20AI%20at%20Scale%20and%20Speed%20%E2%80%94%20Learn%20the%20Framework%20in%20this%20Free%20Webinar&amp;severity=medium&amp;id=68facf9f00e9e97283b112e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-176m-crypto-fine-hacking-formu-edb56137</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20%24176M%20Crypto%20Fine%2C%20Hacking%20Formula%201%2C%20Chromium%20Vulns%2C%20AI%20Hijack%20%26%20More&amp;severity=high&amp;id=68facf9f00e9e97283b112e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62401-improper-authorization-448cd1e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62401%3A%20Improper%20Authorization&amp;severity=medium&amp;id=68fa15ae457d6b06b51715ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62395-improper-access-control-0125e526</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62395%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=68fa15ae457d6b06b51715d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62400-exposure-of-sensitive-information-t-3f2c83da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62400%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=68fa15ae457d6b06b51715ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62399-improper-restriction-of-excessive-a-13554b4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62399%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&amp;severity=high&amp;id=68fa15ae457d6b06b51715e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62398-improper-authentication-8c81a77e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62398%3A%20Improper%20Authentication&amp;severity=medium&amp;id=68fa15ae457d6b06b51715e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62397-generation-of-error-message-contain-78f436af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62397%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information&amp;severity=medium&amp;id=68fa15ae457d6b06b51715de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62396-exposure-of-information-through-dir-c035d8cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62396%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing&amp;severity=medium&amp;id=68fa15ae457d6b06b51715da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62394-incorrect-authorization-43727613</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62394%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=68fa15ae457d6b06b51715d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62393-improper-access-control-43fc1251</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62393%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=68fa15ae457d6b06b51715ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantomcaptcha-rat-attack-targets-aid-groups-suppo-7c17bb47</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomCaptcha%20RAT%20Attack%20Targets%20Aid%20Groups%20Supporting%20Ukraine&amp;severity=medium&amp;id=68fa1221457d6b06b50f1451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10355-cwe-601-url-redirection-to-untruste-3ffbcc0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10355%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20MOLGENIS%20MOLGENIS%20EMX2&amp;severity=medium&amp;id=68fa18a8fd7c94938ae69a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-codings-real-problem-isnt-bugsits-judgment-17728542</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe%20Coding%E2%80%99s%20Real%20Problem%20Isn%E2%80%99t%20Bugs%E2%80%94It%E2%80%99s%20Judgment&amp;severity=low&amp;id=68fad14a00e9e97283b1a878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-critical-adobe-commerce-flaw-puts--74131384</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Critical%20Adobe%20Commerce%20Flaw%20Puts%20Many%20eCommerce%20Sites%20at%20Risk&amp;severity=critical&amp;id=68fa0d2f551b7103c484092f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-organizations-are-abandoning-static-secrets-fo-f8e7ccc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Organizations%20Are%20Abandoning%20Static%20Secrets%20for%20Managed%20Identities&amp;severity=medium&amp;id=68fa0d19551b7103c483f168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unseeable-prompt-injections-in-screenshots-more-vu-6db4bd4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unseeable%20prompt%20injections%20in%20screenshots%3A%20more%20vulnerabilities%20in%20Comet%20and%20other%20AI%20browsers%20%7C%20Brave&amp;severity=medium&amp;id=68fa0d4d551b7103c4840b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41073-cwe-22-improper-limitation-of-a-pat-685565bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41073%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=68fa0d4a551b7103c4840ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40643-cwe-79-improper-neutralization-of-i-717361c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Status%20Tracker%20Energy%20CRM&amp;severity=medium&amp;id=68fa09a5551b7103c47b3236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-propagating-glassworm-malware-targets-develop-4e1327e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self%20Propagating%20GlassWorm%20Malware%20Targets%20Developers%20Through%20OpenVSX%20Marketplace&amp;severity=medium&amp;id=68fa047bd2c9d59cd47fb9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bind-updates-address-high-severity-cache-poisoning-9c888792</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BIND%20Updates%20Address%20High-Severity%20Cache%20Poisoning%20Flaws&amp;severity=high&amp;id=68fa00ecd2c9d59cd477a34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-lanscope-endpoint-manager-bug-exploited-i-fdd6aa12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Lanscope%20Endpoint%20Manager%20Bug%20Exploited%20in%20Ongoing%20Cyberattacks%2C%20CISA%20Confirms&amp;severity=critical&amp;id=68f9fd99d2c9d59cd4735ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lanscope-endpoint-manager-zero-day-exploited-in-th-637e74c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lanscope%20Endpoint%20Manager%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=medium&amp;id=68f9fd7fd2c9d59cd472dda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-250-magento-stores-hit-overnight-as-hackers-e-63dcd28c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20250%20Magento%20Stores%20Hit%20Overnight%20as%20Hackers%20Exploit%20New%20Adobe%20Commerce%20Flaw&amp;severity=high&amp;id=68f9fd99d2c9d59cd4735ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-hackers-exploit-cloud-infrastructure--3cd64a6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CJingle%20Thief%E2%80%9D%20Hackers%20Exploit%20Cloud%20Infrastructure%20to%20Steal%20Millions%20in%20Gift%20Cards&amp;severity=high&amp;id=68f9fbee3c8ea3a7c444b197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9981-cwe-79-improper-neutralization-of-in-0f7e25e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68f9f86d3c8ea3a7c43ca072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9980-cwe-79-improper-neutralization-of-in-7c295aa5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9980%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68f9f86d3c8ea3a7c43ca06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-security-verizon-says-attacks-soar-ai-power-6de30997</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20Security%3A%20Verizon%20Says%20Attacks%20Soar%2C%20AI-Powered%20Threats%20Raise%20Alarm&amp;severity=medium&amp;id=68f9f4e43c8ea3a7c4381c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12105-use-after-free-in-red-hat-red-hat-e-793ac9a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12105%3A%20Use%20After%20Free%20in%20GNOME%20libsoup&amp;severity=high&amp;id=68f9f347eae24e6f559392cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10914-cwe-79-improper-neutralization-of-i-d60a4c3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proliz%20Software%20Ltd.%20Co.%20OBS%20(Student%20Affairs%20Information%20System)&amp;severity=high&amp;id=68f9ea97c5ff90d17f9c4f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10727-cwe-79-improper-neutralization-of-i-f5a20b7f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ArkSigner%20Software%20and%20Hardware%20Inc.%20AcBakImzala&amp;severity=medium&amp;id=68f9edcdeae24e6f5589b0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-hackers-exploit-cloud-infrastructure--7b5d1412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Jingle%20Thief&apos;%20Hackers%20Exploit%20Cloud%20Infrastructure%20to%20Steal%20Millions%20in%20Gift%20Cards&amp;severity=medium&amp;id=68facf9f00e9e97283b112ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mideast-african-hackers-target-govts-banks-small-r-03dc4a40</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mideast%2C%20African%20Hackers%20Target%20Gov&apos;ts%2C%20Banks%2C%20Small%20Retailers&amp;severity=medium&amp;id=68f9c4b24e1be15805b4dd32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-250-magento-stores-hit-overnight-as-hackers-e-c68791e2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20250%20Magento%20Stores%20Hit%20Overnight%20as%20Hackers%20Exploit%20New%20Adobe%20Commerce%20Flaw&amp;severity=critical&amp;id=68f9c49e4e1be15805b4c918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-lanscope-endpoint-manager-bug-exploited-i-5750d6df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Lanscope%20Endpoint%20Manager%20Bug%20Exploited%20in%20Ongoing%20Cyberattacks%2C%20CISA%20Confirms&amp;severity=critical&amp;id=68facf9f00e9e97283b112ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61865-unquoted-search-path-or-element-in--9158600e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61865%3A%20Unquoted%20search%20path%20or%20element%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20NarSuS%20App&amp;severity=medium&amp;id=68f9af5e102015466a3d3402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54806-cross-site-scripting-xss-in-growi-i-f1f520aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54806%3A%20Cross-site%20scripting%20(XSS)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=68f9af5e102015466a3d33f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62499-cross-site-scripting-xss-in-six-apa-02607c96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62499%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=68f9af5e102015466a3d3406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54856-cross-site-scripting-xss-in-six-apa-4987ac0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54856%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=68f9af5e102015466a3d33fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-hunts-european-drone-manufacturing-d-e31792f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20Hunts%20European%20Drone%20Manufacturing%20Data&amp;severity=medium&amp;id=68f9abcb102015466a3513b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12104-cwe-1104-use-of-unmaintained-third--a70890e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12104%3A%20CWE-1104%3A%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68f9a9e6102015466a330fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48430-cwe-248-uncaught-exception-in-galla-decbc686</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48430%3A%20CWE-248%20Uncaught%20Exception%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a331000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48428-cwe-312-cleartext-storage-of-sensit-8083aea0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48428%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a330ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47699-cwe-497-exposure-of-sensitive-syste-5df26031</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47699%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=critical&amp;id=68f9a9e6102015466a330ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41402-cwe-602-client-side-enforcement-of--17a7f9a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41402%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a330ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35981-cwe-359-exposure-of-private-persona-74657a96</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35981%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a330ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11575-cwe-276-incorrect-default-permissio-d7416d16</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11575%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MongoDB%20Atlas%20SQL%20ODBC%20driver&amp;severity=high&amp;id=68f97a0b93bcde9f320064af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-23-361e19b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-23&amp;severity=medium&amp;id=68fac5a500e9e97283a8ae65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54963-na-94c6248b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54963%3A%20n%2Fa&amp;severity=medium&amp;id=68fa8e34326f59cb11ee323c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54966-na-283c71dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54966%3A%20n%2Fa&amp;severity=medium&amp;id=68fa8ab1326f59cb11e6286d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54964-na-17f464c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54964%3A%20n%2Fa&amp;severity=high&amp;id=68fa8ab1326f59cb11e62869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60859-na-766eb2ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60859%3A%20n%2Fa&amp;severity=medium&amp;id=68fa805aa3a2e7083d89a8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60837-na-3be9713a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60837%3A%20n%2Fa&amp;severity=medium&amp;id=68fa805aa3a2e7083d89a8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61413-na-c2b37c29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61413%3A%20n%2Fa&amp;severity=medium&amp;id=68fa681d9122777b72f8df3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57240-na-15529262</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57240%3A%20n%2Fa&amp;severity=medium&amp;id=68fa681d9122777b72f8df39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61464-na-3f777462</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61464%3A%20n%2Fa&amp;severity=medium&amp;id=68fa681d9122777b72f8df35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50951-na-b3d1aa67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50951%3A%20n%2Fa&amp;severity=medium&amp;id=68fa4e920fcf0b8139674ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50950-na-535fa866</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50950%3A%20n%2Fa&amp;severity=high&amp;id=68fa49d81a6be256cbb1964c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50949-na-468022bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50949%3A%20n%2Fa&amp;severity=medium&amp;id=68fa49d81a6be256cbb19649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61132-na-f2702853</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61132%3A%20n%2Fa&amp;severity=high&amp;id=68fa46541a6be256cba9872d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61136-na-fb27f586</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61136%3A%20n%2Fa&amp;severity=high&amp;id=68fa44661a6be256cba791e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56009-na-0eb16cea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56009%3A%20n%2Fa&amp;severity=medium&amp;id=68fa3d2c958c70c10283cd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56008-na-16987524</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56008%3A%20n%2Fa&amp;severity=medium&amp;id=68fa3d2c958c70c10283cd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56007-na-a8a8ea75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56007%3A%20n%2Fa&amp;severity=medium&amp;id=68fa3d2c958c70c10283cd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60852-na-4ba12307</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60852%3A%20n%2Fa&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d3a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62820-cwe-420-unprotected-alternate-chann-d80d62e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62820%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Slack%20Nebula&amp;severity=medium&amp;id=68f9a9e6102015466a330ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62813-cwe-158-improper-neutralization-of--393cd73e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62813&amp;severity=null&amp;id=68f9a43693bcde9f3214157f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-aid-groups-targeted-through-fake-zoom-meet-f22a18fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20Aid%20Groups%20Targeted%20Through%20Fake%20Zoom%20Meetings%20and%20Weaponized%20PDF%20Files&amp;severity=high&amp;id=68f95d53505c7fab67fda400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-muddywater-targets-100-organisations-i-49c83235</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20MuddyWater%20Targets%20100%2B%20Organisations%20in%20Global%20Espionage%20Campaign&amp;severity=high&amp;id=68f95d53505c7fab67fda3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canada-fines-cybercrime-friendly-cryptomus-176m-07f01da5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canada%20Fines%20Cybercrime%20Friendly%20Cryptomus%20%24176M&amp;severity=high&amp;id=68f95d53505c7fab67fda404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploiting-critical-sessionreaper-flaw-in--036d97d4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploiting%20critical%20%22SessionReaper%22%20flaw%20in%20Adobe%20Magento&amp;severity=critical&amp;id=68f95d53505c7fab67fda3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-day-2-hackers-exploit-56-zero-days-for-790-50167eef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20Day%202%3A%20Hackers%20exploit%2056%20zero-days%20for%20%24790%2C000&amp;severity=high&amp;id=68f95d53505c7fab67fda3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-underscores-secure-development-concerns-fb9c2e0a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20Underscores%20Secure%20Development%20Concerns&amp;severity=high&amp;id=68fad07600e9e97283b17081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62710-cwe-337-predictable-seed-in-pseudo--59da75f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62710%3A%20CWE-337%3A%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20sakaiproject%20sakai&amp;severity=medium&amp;id=68f96334884d3b6631feb0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-best-end-user-security-awareness-programs-aren-a86b7cdc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Best%20End%20User%20Security%20Awareness%20Programs%20Aren&apos;t%20About%20Awareness%20Anymore&amp;severity=medium&amp;id=68fad07600e9e97283b17084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62708-cwe-409-improper-handling-of-highly-3c9f2426</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62708%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=68f95300066c59488c99ac1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62707-cwe-834-excessive-iteration-in-py-p-eaa72a5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62707%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=68f95300066c59488c99ac15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62614-cwe-862-missing-authorization-in-bo-bb4906f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62614%3A%20CWE-862%3A%20Missing%20Authorization%20in%20booklore-app%20booklore&amp;severity=high&amp;id=68f9488fb5ec6c3fed4b87a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62613-cwe-79-improper-neutralization-of-i-6a4a61b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62613%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20steveseguin%20vdo.ninja&amp;severity=medium&amp;id=68f9472e5256beec8efc5608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62612-cwe-918-server-side-request-forgery-d4b5943b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62612%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=68f943aa5256beec8ef3de6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/it-takes-only-250-documents-to-poison-any-ai-model-7a63db6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=It%20Takes%20Only%20250%20Documents%20to%20Poison%20Any%20AI%20Model&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/too-many-secrets-attackers-pounce-on-sensitive-dat-b8b4694d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Too%20Many%20Secrets%3A%20Attackers%20Pounce%20on%20Sensitive%20Data%20Sprawl&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multi-stage-websocket-rat-targets-ukraine-in-singl-c0aa85d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomCaptcha%3A%20Multi-Stage%20WebSocket%20RAT%20Targets%20Ukraine%20in%20Single-Day%20Spearphishing%20Operation&amp;severity=medium&amp;id=68f9361b62bc771d0f55e424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62611-cwe-73-external-control-of-file-nam-0b51fb2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62611%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20aio-libs%20aiomysql&amp;severity=high&amp;id=68f932a662bc771d0f4e4a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62247-cwe-862-missing-authorization-in-li-f5e428f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62247%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=low&amp;id=68f932a662bc771d0f4e4aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62610-cwe-285-improper-authorization-in-h-b7c008eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62610%3A%20CWE-285%3A%20Improper%20Authorization%20in%20honojs%20hono&amp;severity=high&amp;id=68f932a662bc771d0f4e4aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62248-cwe-79-improper-neutralization-of-i-98160480</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62248%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68f92df1491c54bae897dd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-python-rat-targets-gamers-via-minecraft-f2248658</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Python%20RAT%20Targets%20Gamers%20via%20Minecraft&amp;severity=medium&amp;id=68f9361b62bc771d0f55e481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iis-servers-owned-by-rudepanda-like-its-2003-7eea466b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IIS%20servers%20owned%20by%20RudePanda%20like%20it&apos;s%202003&amp;severity=medium&amp;id=68f9361b62bc771d0f55e442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitter-apt-exploiting-old-winrar-vulnerability-and-c6a6ee86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitter%20APT%20Exploiting%20Old%20WinRAR%20Vulnerability%20and%20Office%20Files%20in%20New%20Backdoor%20Attacks&amp;severity=medium&amp;id=68f92a68491c54bae88fa338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58712-incorrect-default-permissions-in-re-65f23d62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58712%3A%20Incorrect%20Default%20Permissions%20in%20apache%20activemq-artemis&amp;severity=medium&amp;id=68f92183732d1470b7fcdfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-secures-ban-on-nso-group-after-6-year-leg-0eafb927</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Secures%20Ban%20on%20NSO%20Group%20After%206-Year%20Legal%20Battle&amp;severity=medium&amp;id=68f9194c2887d40ca3b9ce4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-nethereum-nuget-package-used-homoglyph-trick--d32190c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Nethereum%20NuGet%20Package%20Used%20Homoglyph%20Trick%20to%20Steal%20Crypto%20Wallet%20Keys&amp;severity=high&amp;id=68f913f4519b403272389dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-muddywater-targets-100-organisations-i-fffaf094</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20MuddyWater%20Targets%20100%2B%20Organisations%20in%20Global%20Espionage%20Campaign&amp;severity=high&amp;id=68f9831e93bcde9f320bfbd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tarmageddon-flaw-in-async-tar-rust-library-allows--41bbfade</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TARmageddon%20flaw%20in%20Async-Tar%20Rust%20library%20allows%20to%20smuggle%20extra%20archives%20when%20the%20library%20is%20processing%20nested%20TAR%20files&amp;severity=medium&amp;id=68f913f4519b403272389dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11957-cwe-639-authorization-bypass-throug-8e06826e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11957%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Devolutions%20Server&amp;severity=critical&amp;id=68f9120a519b40327236e527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11958-cwe-20-improper-input-validation-in-88a22836</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11958%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Devolutions%20Server&amp;severity=medium&amp;id=68f9120a519b40327236e52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-aid-groups-targeted-through-fake-zoom-meet-f46270bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20Aid%20Groups%20Targeted%20Through%20Fake%20Zoom%20Meetings%20and%20Weaponized%20PDF%20Files&amp;severity=medium&amp;id=68f9831e93bcde9f320bfbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22178-improper-authorization-in-atlassian-f98929e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22178%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3c99c688c2fb43c67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22169-improper-authorization-in-atlassian-8c691bbd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22169%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22173-improper-authorization-in-atlassian-34a2b2ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22173%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22170-improper-authorization-in-atlassian-cecb089a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22170%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22174-improper-authorization-in-atlassian-71101333</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22174%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22172-improper-authorization-in-atlassian-44d49049</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22172%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22176-improper-authorization-in-atlassian-124acd9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22176%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c64c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22171-improper-authorization-in-atlassian-711e1b7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22171%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22168-improper-authorization-in-atlassian-a1b0c6aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22168%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22177-improper-authorization-in-atlassian-762ab795</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22177%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22175-improper-authorization-in-atlassian-2a6c756b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22175%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rival-hackers-dox-alleged-operators-of-lumma-steal-54acfe41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rival%20Hackers%20Dox%20Alleged%20Operators%20of%20Lumma%20Stealer&amp;severity=medium&amp;id=68f9008aa70370bc87f7fc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40780-cwe-341-predictable-from-observable-f5cc22c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40780%3A%20CWE-341%20Predictable%20from%20Observable%20State%20in%20ISC%20BIND%209&amp;severity=high&amp;id=68f8ffa56e01a0ac47e2cb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40778-cwe-349-acceptance-of-extraneous-un-761b2f0d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40778%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20ISC%20BIND%209&amp;severity=high&amp;id=68f8ffa56e01a0ac47e2cb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8677-cwe-405-asymmetric-resource-consumpt-118c69a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8677%3A%20CWE-405%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20ISC%20BIND%209&amp;severity=high&amp;id=68f8ffa56e01a0ac47e2cb6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62607-cwe-306-missing-authentication-for--91b1a6d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62607%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20nautobot%20nautobot-app-ssot&amp;severity=medium&amp;id=68f8fc246e01a0ac47db56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62659-cwe-79-improper-neutralization-of-i-85f045c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62659%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20CookieConsent%20extension&amp;severity=low&amp;id=68f8fa3f6e01a0ac47d8a3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23299-cwe-787-out-of-bounds-write-in-nvid-aec4eb14</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23299%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20BlueField%20GA&amp;severity=medium&amp;id=68f8f7aea2d588d2bde2ff2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62606-cwe-89-improper-neutralization-of-s-6cf35fb1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62606%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20My-Little-Forum%20mylittleforum&amp;severity=high&amp;id=68f8f43ba2d588d2bddb93c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tarmageddon-flaw-in-popular-rust-library-leads-to--9c451573</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TARmageddon%20Flaw%20in%20Popular%20Rust%20Library%20Leads%20to%20RCE&amp;severity=low&amp;id=68f8f420a2d588d2bddb2712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11965-cwe-552-files-or-directories-access-c199d529</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11965%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Eclipse%20Foundation%20Vert.x&amp;severity=medium&amp;id=68f8f0b1a2d588d2bdd5f4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11966-cwe-79-improper-neutralization-of-i-2d4bf23e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Eclipse%20Foundation%20Vert.x&amp;severity=low&amp;id=68f8f249a2d588d2bdd990e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62073-missing-authorization-in-sovlix-mee-7d327abb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62073%3A%20Missing%20Authorization%20in%20Sovlix%20MeetingHub&amp;severity=medium&amp;id=68f8effb04677bbd79439bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62072-missing-authorization-in-rustaurius-d2884e51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62072%3A%20Missing%20Authorization%20in%20Rustaurius%20Front%20End%20Users&amp;severity=medium&amp;id=68f8effb04677bbd79439bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62071-missing-authorization-in-repuso-soc-2cad2518</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62071%3A%20Missing%20Authorization%20in%20Repuso%20Social%20proof%20testimonials%20and%20reviews%20by%20Repuso&amp;severity=medium&amp;id=68f8effb04677bbd79439bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62070-missing-authorization-in-wpxpo-wowr-3e60771d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62070%3A%20Missing%20Authorization%20in%20WPXPO%20WowRevenue&amp;severity=medium&amp;id=68f8effb04677bbd79439ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62069-improper-neutralization-of-input-du-b3b0ce63</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62069%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=68f8effb04677bbd79439ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62063-improper-neutralization-of-input-du-d965e1c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62063%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Travel%20WP%20Travel%20Gutenberg%20Blocks&amp;severity=medium&amp;id=68f8effb04677bbd79439ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62062-insertion-of-sensitive-information--7abc9c29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62062%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ThemeRuby%20Easy%20Post%20Submission&amp;severity=medium&amp;id=68f8effb04677bbd79439b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62061-cross-site-request-forgery-csrf-in--be02ba2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62061%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20impleCode%20Product%20Catalog%20Simple&amp;severity=medium&amp;id=68f8effb04677bbd79439b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62060-improper-neutralization-of-input-du-a0bb517b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62060%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Tab%20Ultimate&amp;severity=medium&amp;id=68f8effb04677bbd79439b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62058-improper-neutralization-of-input-du-12ee61e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=medium&amp;id=68f8effb04677bbd79439b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62054-improper-control-of-filename-for-in-42e9f77a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62054%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=high&amp;id=68f8eff904677bbd79439b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62052-missing-authorization-in-horea-radu-0fde957c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62052%3A%20Missing%20Authorization%20in%20Horea%20Radu%20One%20Page%20Express%20Companion&amp;severity=medium&amp;id=68f8eff904677bbd79439b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62048-missing-authorization-in-wpmu-dev-y-8431bd18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62048%3A%20Missing%20Authorization%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20SmartCrawl&amp;severity=medium&amp;id=68f8eff904677bbd79439b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62042-improper-neutralization-of-input-du-7e162b55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=medium&amp;id=68f8eff904677bbd79439b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62029-improper-control-of-filename-for-in-d0798786</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62029%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themesion%20Grevo&amp;severity=high&amp;id=68f8eff904677bbd79439b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62027-missing-authorization-in-stellarwp--39d45c84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62027%3A%20Missing%20Authorization%20in%20StellarWP%20Event%20Tickets&amp;severity=medium&amp;id=68f8eff904677bbd79439b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62025-deserialization-of-untrusted-data-i-a449fa84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62025%3A%20Deserialization%20of%20Untrusted%20Data%20in%20eyecix%20JobSearch&amp;severity=critical&amp;id=68f8eff904677bbd79439b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62024-improper-neutralization-of-input-du-69e593cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62024%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonathan%20Jernigan%20Pie%20Calendar&amp;severity=medium&amp;id=68f8eff904677bbd79439b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62023-improper-control-of-generation-of-c-63f6b24b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62023%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=critical&amp;id=68f8eff904677bbd79439b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62021-missing-authorization-in-made-neat--bceff550</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62021%3A%20Missing%20Authorization%20in%20Made%20Neat%20Acknowledgify&amp;severity=medium&amp;id=68f8eff904677bbd79439b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62020-improper-neutralization-of-input-du-0b83f449</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infomaniak%20Network%20VOD%20Infomaniak&amp;severity=high&amp;id=68f8eff804677bbd79439b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62019-missing-authorization-in-wpzoom-rec-6ce7607d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62019%3A%20Missing%20Authorization%20in%20WPZOOM%20Recipe%20Card%20Blocks%20for%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=68f8eff804677bbd79439b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62015-improper-neutralization-of-special--641be62d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62015%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Josh%20Kohlbach%20Advanced%20Coupons%20for%20WooCommerce%20Coupons&amp;severity=high&amp;id=68f8eff804677bbd79439b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62013-missing-authorization-in-posimyth-u-f6c4199f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62013%3A%20Missing%20Authorization%20in%20POSIMYTH%20UiChemy&amp;severity=medium&amp;id=68f8eff804677bbd79439b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62009-cross-site-request-forgery-csrf-in--0870ef70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62009%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20UPC%2FEAN%2FGTIN%20Code%20Generator&amp;severity=medium&amp;id=68f8eff804677bbd79439b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62008-deserialization-of-untrusted-data-i-586fb42c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62008%3A%20Deserialization%20of%20Untrusted%20Data%20in%20acowebs%20Product%20Table%20For%20WooCommerce&amp;severity=high&amp;id=68f8eff804677bbd79439b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62007-incorrect-privilege-assignment-in-b-1ffe391e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62007%3A%20Incorrect%20Privilege%20Assignment%20in%20bPlugins%20Voice%20Feedback&amp;severity=high&amp;id=68f8eff804677bbd79439b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62006-missing-authorization-in-veronalabs-bdaee1ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62006%3A%20Missing%20Authorization%20in%20VeronaLabs%20WP%20SMS&amp;severity=medium&amp;id=68f8eff804677bbd79439b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62005-cross-site-request-forgery-csrf-in--ffccadcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62005%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FantasticPlugins%20SUMO%20Memberships%20for%20WooCommerce&amp;severity=high&amp;id=68f8eff804677bbd79439b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60246-improper-neutralization-of-input-du-fc3f97d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60246%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weissmike%20Simple%20Finance%20Calculator&amp;severity=high&amp;id=68f8eff804677bbd79439afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60234-deserialization-of-untrusted-data-i-6d699473</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60234%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Single%20Property&amp;severity=high&amp;id=68f8eff704677bbd79439add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60232-deserialization-of-untrusted-data-i-737799aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60232%3A%20Deserialization%20of%20Untrusted%20Data%20in%20quantumcloud%20KBx%20Pro%20Ultimate&amp;severity=critical&amp;id=68f8eff704677bbd79439ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60228-deserialization-of-untrusted-data-i-4e30c275</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60228%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Knowledge%20Base&amp;severity=high&amp;id=68f8eff704677bbd79439ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60227-improper-limitation-of-a-pathname-t-e83f99aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60227%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=high&amp;id=68f8eff704677bbd79439ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60226-deserialization-of-untrusted-data-i-4b790ea4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60226%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20White%20Rabbit&amp;severity=critical&amp;id=68f8eff704677bbd79439ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60225-deserialization-of-untrusted-data-i-734d4821</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60225%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20BugsPatrol&amp;severity=critical&amp;id=68f8eff704677bbd79439ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60224-deserialization-of-untrusted-data-i-b2b6fc34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60224%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpshuffle%20Subscribe%20to%20Download&amp;severity=critical&amp;id=68f8eff704677bbd79439acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60222-incorrect-privilege-assignment-in-f-a9928163</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60222%3A%20Incorrect%20Privilege%20Assignment%20in%20FantasticPlugins%20SUMO%20Memberships%20for%20WooCommerce&amp;severity=high&amp;id=68f8eff704677bbd79439ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60221-deserialization-of-untrusted-data-i-c88e42ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60221%3A%20Deserialization%20of%20Untrusted%20Data%20in%20captivateaudio%20Captivate%20Sync&amp;severity=critical&amp;id=68f8eff704677bbd79439ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60220-incorrect-privilege-assignment-in-p-25a25ff6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60220%3A%20Incorrect%20Privilege%20Assignment%20in%20pebas%20CouponXxL&amp;severity=critical&amp;id=68f8eff704677bbd79439ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60217-improper-limitation-of-a-pathname-t-e174702d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60217%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ypromo%20PT%20Luxa%20Addons&amp;severity=high&amp;id=68f8eff704677bbd79439ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60216-deserialization-of-untrusted-data-i-29aa4869</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60216%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Addison&amp;severity=critical&amp;id=68f8eff604677bbd79439ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60215-deserialization-of-untrusted-data-i-33428adf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60215%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Kriya&amp;severity=high&amp;id=68f8eff604677bbd79439aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60214-deserialization-of-untrusted-data-i-bec92f6c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60214%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Goldenblatt&amp;severity=critical&amp;id=68f8eff604677bbd79439aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60213-deserialization-of-untrusted-data-i-18b66c85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60213%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Whitebox-Studio%20Scape&amp;severity=critical&amp;id=68f8eff604677bbd79439aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60212-deserialization-of-untrusted-data-i-f5c0d1fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60212%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20VEDA&amp;severity=high&amp;id=68f8eff604677bbd79439aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60211-incorrect-privilege-assignment-in-e-eae879b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60211%3A%20Incorrect%20Privilege%20Assignment%20in%20extendons%20WooCommerce%20Registration%20Fields%20Plugin%20-%20Custom%20Signup%20Fields&amp;severity=high&amp;id=68f8eff604677bbd79439aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60210-deserialization-of-untrusted-data-i-d23e97da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60210%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpeverest%20Everest%20Forms%20-%20Frontend%20Listing&amp;severity=critical&amp;id=68f8eff604677bbd79439aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60209-deserialization-of-untrusted-data-i-60dfb540</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60209%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20Connector%20for%20Gravity%20Forms%20and%20Google%20Sheets&amp;severity=critical&amp;id=68f8eff604677bbd79439a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60208-cross-site-request-forgery-csrf-in--b1e897f8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60208%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tusko%20Trush%20Advanced%20Custom%20Fields%20%3A%20CPT%20Options%20Pages&amp;severity=high&amp;id=68f8eff604677bbd79439a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60206-improper-control-of-generation-of-c-8a470208</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60206%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Beplusthemes%20Alone&amp;severity=critical&amp;id=68f8eff504677bbd79439a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60176-improper-neutralization-of-input-du-560283f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60176%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tattersoftware%20WP%20Tesseract&amp;severity=medium&amp;id=68f8eff504677bbd79439a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60168-cross-site-request-forgery-csrf-in--a5ff62e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60168%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20integrationshotelrunner%20HotelRunner%20Booking%20Widget&amp;severity=high&amp;id=68f8eff504677bbd79439a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60151-url-redirection-to-untrusted-site-o-98fbb7c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60151%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20HubSpot&amp;severity=medium&amp;id=68f8eff504677bbd79439a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60135-improper-neutralization-of-input-du-b79fb6be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NIKITAS%20GEORGOPOULOS%20WeShare%20Buttons&amp;severity=medium&amp;id=68f8eff504677bbd79439a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60134-cross-site-request-forgery-csrf-in--747e8722</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60134%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20John%20James%20Jacoby%20WP%20Media%20Categories&amp;severity=medium&amp;id=68f8eff504677bbd79439a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60132-cross-site-request-forgery-csrf-in--cf852300</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60132%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20johnh10%20Video%20Blogster%20Lite&amp;severity=medium&amp;id=68f8eff504677bbd79439a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60131-improper-neutralization-of-input-du-8b8fd21d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60131%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zoefff%20Werk%20aan%20de%20Muur&amp;severity=medium&amp;id=68f8eff504677bbd79439a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60041-authentication-bypass-using-an-alte-6f36d74f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60041%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Iulia%20Cazan%20Emails%20Catch%20All&amp;severity=high&amp;id=68f8eff504677bbd79439a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60039-deserialization-of-untrusted-data-i-4c1d5b78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60039%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Noisa&amp;severity=critical&amp;id=68f8eff504677bbd79439a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59593-improper-neutralization-of-input-du-d4374129</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Extend%20Themes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=68f8eff504677bbd79439a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59580-incorrect-privilege-assignment-in-g-7e1e998e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59580%3A%20Incorrect%20Privilege%20Assignment%20in%20GoodLayers%20Goodlayers%20Core&amp;severity=high&amp;id=68f8eff504677bbd79439a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59579-insertion-of-sensitive-information--39dc72d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59579%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20PressTigers%20Simple%20Job%20Board&amp;severity=high&amp;id=68f8eff504677bbd79439a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59578-insertion-of-sensitive-information--4454a299</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59578%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20wpdesk%20ShopMagic&amp;severity=medium&amp;id=68f8eff504677bbd79439a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59575-exposure-of-sensitive-system-inform-a06d3e28</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59575%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=medium&amp;id=68f8eff504677bbd79439a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59571-improper-neutralization-of-input-du-4fddcaae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59571%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20WorkScout-Core&amp;severity=high&amp;id=68f8eff504677bbd79439a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59566-improper-limitation-of-a-pathname-t-1c1c7035</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59566%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AmentoTech%20Workreap%20(theme&apos;s%20plugin)&amp;severity=high&amp;id=68f8eff504677bbd79439a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59564-improper-control-of-filename-for-in-72ae8ff3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59564%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20EduMall&amp;severity=high&amp;id=68f8eff504677bbd79439a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59558-improper-control-of-filename-for-in-a5b12f45</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59558%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Billey&amp;severity=high&amp;id=68f8eff504677bbd79439a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59557-improper-neutralization-of-special--ebf4aeec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59557%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ThemeMove%20Learts%20Addons&amp;severity=critical&amp;id=68f8eff504677bbd79439a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59555-improper-control-of-filename-for-in-ea0b42a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59555%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Medizin&amp;severity=high&amp;id=68f8eff404677bbd79439a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59550-improper-control-of-filename-for-in-6eecd681</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59550%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designervily%20Xcare&amp;severity=high&amp;id=68f8eff404677bbd79439a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59007-deserialization-of-untrusted-data-i-bb9a1ace</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59007%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themesflat%20TF%20Woo%20Product%20Grid%20Addon%20For%20Elementor&amp;severity=high&amp;id=68f8eff404677bbd79439a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59006-improper-neutralization-of-input-du-b2084ec9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20Easy%20Woocommerce%20Customizer&amp;severity=high&amp;id=68f8eff404677bbd79439a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59004-improper-neutralization-of-input-du-754b6123</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pco_58%20WC%20Return%20products&amp;severity=high&amp;id=68f8eff404677bbd79439a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58971-improper-neutralization-of-input-du-f52360c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AmentoTech%20Doctreat&amp;severity=high&amp;id=68f8eff404677bbd79439a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58970-improper-neutralization-of-script-r-aa41ace7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58970%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20AmentoTech%20Doctreat&amp;severity=medium&amp;id=68f8eff404677bbd79439a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58967-improper-control-of-filename-for-in-2d511584</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58967%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Businext&amp;severity=high&amp;id=68f8eff404677bbd79439a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58966-improper-neutralization-of-input-du-ad8823f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58966%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms%20LITE&amp;severity=high&amp;id=68f8eff404677bbd79439a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58963-unrestricted-upload-of-file-with-da-ce45f313</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58963%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%207oroof%20Medcity&amp;severity=critical&amp;id=68f8eff404677bbd79439a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58961-improper-neutralization-of-input-du-8aa7fc2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58961%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kamleshyadav%20CF7%20Auto%20Responder%20Addon&amp;severity=high&amp;id=68f8eff304677bbd794399f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58959-improper-limitation-of-a-pathname-t-b486dca6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58959%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AmentoTech%20Taskbot&amp;severity=high&amp;id=68f8eff304677bbd794399f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58958-improper-control-of-filename-for-in-9d8f14a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58958%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20SmilePure&amp;severity=high&amp;id=68f8eff304677bbd794399f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58955-improper-control-of-filename-for-in-b73f9a6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58955%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designervily%20Karzo&amp;severity=high&amp;id=68f8eff304677bbd794399ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58921-improper-neutralization-of-input-du-cbfa2bc3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58921%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arevico%20WP%20Tactical%20Popup&amp;severity=high&amp;id=68f8eff304677bbd794399ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58916-improper-neutralization-of-input-du-07031c09</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58916%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Munzir%20Author%3A%20Munzir&amp;severity=high&amp;id=68f8eff304677bbd794399e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53428-incorrect-privilege-assignment-in-n-686b2067</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53428%3A%20Incorrect%20Privilege%20Assignment%20in%20N-Media%20Simple%20User%20Registration&amp;severity=high&amp;id=68f8eff304677bbd794399e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53427-improper-neutralization-of-input-du-3fadf8ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chibueze%20Okechukwu%20SEO%20Pyramid&amp;severity=high&amp;id=68f8eff304677bbd794399e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53426-improper-neutralization-of-input-du-b2fb78f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53426%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Likert%20Survey%20Master&amp;severity=high&amp;id=68f8eff304677bbd794399dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53425-incorrect-privilege-assignment-in-d-035f710b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53425%3A%20Incorrect%20Privilege%20Assignment%20in%20Dokan%2C%20Inc.%20Dokan&amp;severity=high&amp;id=68f8eff204677bbd794399c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53424-missing-authorization-in-vanquish-w-d912d86e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53424%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Orders%20%26%20Customers%20Exporter&amp;severity=medium&amp;id=68f8eff204677bbd794399c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53423-improper-neutralization-of-input-du-c172c180</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53423%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20Triss&amp;severity=high&amp;id=68f8eff204677bbd794399bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53422-improper-neutralization-of-input-du-fafb5e41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53422%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeWarriors%20WhatsApp%20Chat%20for%20WordPress%20and%20WooCommerce&amp;severity=high&amp;id=68f8eff204677bbd794399bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53421-missing-authorization-in-pickplugin-ef4c9d02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53421%3A%20Missing%20Authorization%20in%20PickPlugins%20Accordion&amp;severity=medium&amp;id=68f8eff204677bbd794399b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53420-improper-neutralization-of-input-du-54c61171</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53420%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=high&amp;id=68f8eff204677bbd794399b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53352-improper-neutralization-of-input-du-aa25bf29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Grid%20Plus&amp;severity=high&amp;id=68f8eff204677bbd794399b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53351-improper-neutralization-of-input-du-cab0b1c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fidelo%20Software%20GmbH%20Fidelo%20Snippet&amp;severity=high&amp;id=68f8eff204677bbd794399b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53350-improper-neutralization-of-input-du-68cac151</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webjunk%20Calendar%20Plus&amp;severity=high&amp;id=68f8eff204677bbd794399ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53297-improper-neutralization-of-input-du-d199680b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53297%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AA-Team%20Woocommerce%20Envato%20Affiliates&amp;severity=high&amp;id=68f8eff204677bbd794399aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53238-improper-neutralization-of-input-du-7d8e694b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Toast%20Plugins%20Toast%20Mobile%20Menu&amp;severity=high&amp;id=68f8eff104677bbd7943998b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53236-missing-authorization-in-andondesig-3b3f859c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53236%3A%20Missing%20Authorization%20in%20AndonDesign%20UDesign%20Core&amp;severity=medium&amp;id=68f8eff104677bbd79439986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53234-improper-neutralization-of-input-du-cb9a0aef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53234%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AndonDesign%20UDesign%20Core&amp;severity=high&amp;id=68f8eff104677bbd79439980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53232-insertion-of-sensitive-information--534d2652</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53232%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20inkthemes%20WP%20Gmail%20SMTP&amp;severity=medium&amp;id=68f8eff104677bbd7943997c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53229-improper-neutralization-of-input-du-3af5f375</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53229%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kamleshyadav%20RockON%20DJ&amp;severity=high&amp;id=68f8eff104677bbd79439979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53218-insertion-of-sensitive-information--8b47cc1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53218%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Saad%20Iqbal%20AppExperts&amp;severity=medium&amp;id=68f8eff104677bbd79439976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52770-improper-neutralization-of-input-du-d1768e87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appscreo%20Hello%20Followers&amp;severity=high&amp;id=68f8eff104677bbd79439973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52763-improper-neutralization-of-input-du-9c93571a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52763%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NickDuncan%20Nifty%20Backups&amp;severity=high&amp;id=68f8eff104677bbd79439970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52760-improper-neutralization-of-input-du-4b541149</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Globalis%20MultiSite%20Clone%20Duplicator&amp;severity=medium&amp;id=68f8eff104677bbd7943996d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52758-unrestricted-upload-of-file-with-da-8df40abc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52758%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Gesundheit%20Bewegt%20GmbH%20Zippy&amp;severity=critical&amp;id=68f8eff104677bbd7943996a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52757-missing-authorization-in-fantasticp-59fb877c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52757%3A%20Missing%20Authorization%20in%20FantasticPlugins%20SUMO%20Memberships%20for%20WooCommerce&amp;severity=medium&amp;id=68f8eff004677bbd79439914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52756-improper-control-of-generation-of-c-e09b0395</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52756%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Sayan%20Datta%20WP%20Last%20Modified%20Info&amp;severity=high&amp;id=68f8eff004677bbd79439911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52755-improper-neutralization-of-input-du-8eb9640e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52755%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Taylor%20Child%20Themes&amp;severity=high&amp;id=68f8eff004677bbd7943990e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52754-improper-neutralization-of-input-du-2b6d6d39</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20selloio%20Sello%20ChannelConnector&amp;severity=high&amp;id=68f8eff004677bbd7943990b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52753-improper-neutralization-of-input-du-c7c36ddb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52753%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supsystic%20Contact%20Form%20by%20Supsystic&amp;severity=high&amp;id=68f8eff004677bbd79439908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52752-exposure-of-sensitive-system-inform-0ae7caa1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52752%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThemeAtelier%20IDonatePro&amp;severity=medium&amp;id=68f8eff004677bbd79439905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52751-improper-neutralization-of-input-du-624fb37e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52751%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20colome%20Slide%20Puzzle&amp;severity=high&amp;id=68f8eff004677bbd79439902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52750-improper-neutralization-of-input-du-c8e8f0f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Juergen%20Schulze%20Emu2&amp;severity=high&amp;id=68f8eff004677bbd794398ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52749-improper-neutralization-of-input-du-11410a9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Activity%20Track%20Uji%20Countdown&amp;severity=high&amp;id=68f8eff004677bbd794398fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52748-improper-neutralization-of-input-du-74beab4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Directory%20Pro&amp;severity=high&amp;id=68f8eff004677bbd794398f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52743-improper-neutralization-of-input-du-a98fa698</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20oik-privacy-policy&amp;severity=high&amp;id=68f8efef04677bbd794398de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52742-improper-neutralization-of-input-du-cf7d3e2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Igor%20Benic%20Pets&amp;severity=high&amp;id=68f8efef04677bbd794398db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52741-improper-neutralization-of-input-du-5ff8ee78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52741%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Barry%20Kooij%20Post%20Connector&amp;severity=high&amp;id=68f8efef04677bbd794398d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52740-deserialization-of-untrusted-data-i-859dc604</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52740%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hernan%20Villanueva%20Boldermail&amp;severity=high&amp;id=68f8efef04677bbd794398d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52738-missing-authorization-in-wikimedia--42d19275</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52738%3A%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20Wikipedia%20Preview&amp;severity=medium&amp;id=68f8efef04677bbd794398d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52737-deserialization-of-untrusted-data-i-ad67f52a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52737%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tijmen%20Smit%20WP%20Store%20Locator&amp;severity=high&amp;id=68f8efef04677bbd794398cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52736-improper-neutralization-of-input-du-9251d9a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52736%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daman%20Jeet%20Finale%20Lite&amp;severity=high&amp;id=68f8efef04677bbd794398cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52735-improper-neutralization-of-input-du-5c13a3e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20XLPlugins%20NextMove%20Lite&amp;severity=medium&amp;id=68f8efef04677bbd794398c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52734-improper-neutralization-of-input-du-e7699294</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ERA404%20CropRefine&amp;severity=medium&amp;id=68f8efef04677bbd794398c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49992-improper-neutralization-of-input-du-86be53f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20LearnPress%20Export%20Import&amp;severity=high&amp;id=68f8efef04677bbd794398c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49963-improper-neutralization-of-input-du-51d17239</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49963%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20growniche%20Simple%20Stripe%20Checkout&amp;severity=high&amp;id=68f8efee04677bbd794398b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49962-improper-neutralization-of-input-du-2e913cda</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20useStrict%20bbPress%20Notify&amp;severity=high&amp;id=68f8efee04677bbd794398b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49961-missing-authorization-in-breeze-tea-1a897630</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49961%3A%20Missing%20Authorization%20in%20Breeze%20Team%20Breeze%20Checkout&amp;severity=medium&amp;id=68f8efee04677bbd794398b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49960-improper-neutralization-of-input-du-2e35fbed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leadbi%20LeadBI%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=68f8efee04677bbd794398ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49959-improper-neutralization-of-input-du-cc9a7f5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pascal%20Casier%20bbPress%20Move%20Topics&amp;severity=high&amp;id=68f8efee04677bbd794398aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49958-improper-neutralization-of-input-du-61bd81ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49958%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robokassa%20Robokassa%20payment%20gateway%20for%20Woocommerce&amp;severity=high&amp;id=68f8efee04677bbd794398a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49957-improper-neutralization-of-input-du-c6e72013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49957%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Weboccult%20Technologies%20Pvt%20Ltd%20Email%20Attachment%20by%20Order%20Status%20%26amp%3B%20Products&amp;severity=high&amp;id=68f8efee04677bbd794398a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49956-improper-neutralization-of-input-du-7e8c3887</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49956%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anandaraj%20Balu%20Fade%20Slider&amp;severity=high&amp;id=68f8efee04677bbd794398a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49955-improper-neutralization-of-input-du-d930fbf7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49955%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rajan%20Vijayan%20WP%20Smart%20Flexslider&amp;severity=high&amp;id=68f8efee04677bbd7943989e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49954-improper-neutralization-of-input-du-c336736f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49954%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mithra62%20WP-Click-Tracker&amp;severity=high&amp;id=68f8efee04677bbd7943989b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49953-improper-neutralization-of-input-du-bbcc9968</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49953%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeinity%20ShareBang%2C%20Ultimate%20Social%20Share%20Buttons%20for%20WordPress&amp;severity=high&amp;id=68f8efed04677bbd7943988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49952-authorization-bypass-through-user-c-c9d3c1cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49952%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=68f8efed04677bbd7943988b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49951-improper-neutralization-of-input-du-4642d16a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcrunch%20gAppointments&amp;severity=high&amp;id=68f8efed04677bbd79439888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49950-missing-authorization-in-billingo-o-2b00827d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49950%3A%20Missing%20Authorization%20in%20billingo%20Official%20Integration%20for%20Billingo&amp;severity=high&amp;id=68f8efed04677bbd79439885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49948-improper-neutralization-of-input-du-5d9b8be6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ahmad%20Awais%20WP%20Super%20Edit&amp;severity=high&amp;id=68f8efed04677bbd79439882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49947-improper-neutralization-of-input-du-385dd9eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendons%20WooCommerce%20Registration%20Fields%20Plugin%20-%20Custom%20Signup%20Fields&amp;severity=high&amp;id=68f8efed04677bbd7943987f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49946-improper-neutralization-of-input-du-91d74910</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49946%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cynob%20IT%20Consultancy%20Auto%20Login%20After%20Registration&amp;severity=high&amp;id=68f8efed04677bbd7943987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49945-improper-neutralization-of-input-du-b81828b2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49945%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kylegetson%20Shortcode%20Generator&amp;severity=high&amp;id=68f8efed04677bbd79439879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49944-improper-neutralization-of-input-du-3f8c8501</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49944%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonatan%20Jumbert%20WPCode%20Content%20Ratio&amp;severity=high&amp;id=68f8efed04677bbd79439876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49940-improper-neutralization-of-input-du-2a97d50d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=68f8efed04677bbd79439873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49939-improper-neutralization-of-input-du-10c3d3f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=medium&amp;id=68f8efec04677bbd79439866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49938-improper-neutralization-of-input-du-163a04a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=medium&amp;id=68f8efec04677bbd79439863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49937-missing-authorization-in-syed-balkh-a18e95c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49937%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Smash%20Balloon%20Social%20Post%20Feed&amp;severity=medium&amp;id=68f8efec04677bbd79439860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49936-improper-neutralization-of-input-du-ee6fe639</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xtemos%20WoodMart&amp;severity=medium&amp;id=68f8efec04677bbd7943985d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49935-improper-control-of-filename-for-in-ad009b1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49935%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20xtemos%20WoodMart&amp;severity=high&amp;id=68f8efec04677bbd7943985a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49934-improper-neutralization-of-input-du-c4483961</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49934%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=medium&amp;id=68f8efec04677bbd79439857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49933-improper-neutralization-of-input-du-8752728d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49933%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlog&amp;severity=medium&amp;id=68f8efec04677bbd79439854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49932-improper-neutralization-of-input-du-7d03d48d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlog&amp;severity=medium&amp;id=68f8efec04677bbd79439851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49931-improper-neutralization-of-special--7c8c04d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49931%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=critical&amp;id=68f8efec04677bbd7943984e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49930-improper-neutralization-of-input-du-ffcbefe0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=high&amp;id=68f8efec04677bbd7943984b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49928-improper-neutralization-of-input-du-e836b6c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetWooBuilder&amp;severity=medium&amp;id=68f8efeb04677bbd7943980f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49927-improper-neutralization-of-input-du-a41c8da2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetWooBuilder&amp;severity=medium&amp;id=68f8efeb04677bbd7943980c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49926-improper-control-of-generation-of-c-6ab5318e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49926%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Laborator%20Kalium&amp;severity=high&amp;id=68f8efeb04677bbd79439809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49925-missing-authorization-in-vibethemes-374fe6bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49925%3A%20Missing%20Authorization%20in%20VibeThemes%20WPLMS&amp;severity=high&amp;id=68f8efeb04677bbd79439806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49924-incorrect-privilege-assignment-in-j-44791b6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49924%3A%20Incorrect%20Privilege%20Assignment%20in%20Josh%20Kohlbach%20Wholesale%20Suite&amp;severity=high&amp;id=68f8efeb04677bbd79439803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49923-improper-neutralization-of-input-du-5e6ba82f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=68f8efeb04677bbd79439800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49922-missing-authorization-in-etruel-wpe-62eb03bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49922%3A%20Missing%20Authorization%20in%20etruel%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=68f8efeb04677bbd794397fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49921-improper-control-of-filename-for-in-d8712cec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49921%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Crocoblock%20JetReviews&amp;severity=high&amp;id=68f8efeb04677bbd794397fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49920-missing-authorization-in-accessibe--b6933120</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49920%3A%20Missing%20Authorization%20in%20accessiBe%20Web%20Accessibility%20By%20accessiBe&amp;severity=medium&amp;id=68f8efeb04677bbd794397f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49917-server-side-request-forgery-ssrf-in-dcad35dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49917%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Icegram%20Icegram%20Express%20Pro&amp;severity=medium&amp;id=68f8efeb04677bbd794397f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49915-improper-neutralization-of-special--d10a9e1f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49915%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=critical&amp;id=68f8efea04677bbd794397c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49912-improper-neutralization-of-input-du-e2b9c72a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nks%20Email%20Subscription%20Popup&amp;severity=medium&amp;id=68f8efea04677bbd794397c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49911-improper-neutralization-of-input-du-3a3a3282</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpinstinct%20WooCommerce%20Vehicle%20Parts%20Finder&amp;severity=high&amp;id=68f8efea04677bbd794397c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49910-missing-authorization-in-amentotech-7ee4ab94</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49910%3A%20Missing%20Authorization%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=high&amp;id=68f8efea04677bbd794397be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49908-improper-neutralization-of-input-du-20369c20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49908%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPClever%20WPC%20Countdown%20Timer%20for%20WooCommerce&amp;severity=medium&amp;id=68f8efea04677bbd794397bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49907-missing-authorization-in-realmag777-7d293354</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49907%3A%20Missing%20Authorization%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=68f8efea04677bbd794397b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49906-missing-authorization-in-stellarwp--370654d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49906%3A%20Missing%20Authorization%20in%20StellarWP%20WPComplete&amp;severity=medium&amp;id=68f8efea04677bbd794397b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49903-missing-authorization-in-bdthemes-z-858fe8db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49903%3A%20Missing%20Authorization%20in%20bdthemes%20ZoloBlocks&amp;severity=medium&amp;id=68f8efea04677bbd794397b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49901-authentication-bypass-using-an-alte-000d706e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49901%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=critical&amp;id=68f8efea04677bbd794397af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49899-missing-authorization-in-jjlemstra--b655d126</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49899%3A%20Missing%20Authorization%20in%20jjlemstra%20Whydonate&amp;severity=medium&amp;id=68f8efea04677bbd794397ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49380-deserialization-of-untrusted-data-i-3f8f7dbb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49380%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpinstinct%20WooCommerce%20Vehicle%20Parts%20Finder&amp;severity=medium&amp;id=68f8efe904677bbd79439797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49378-improper-neutralization-of-special--a71edfd8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49378%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=68f8efe904677bbd79439794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49377-missing-authorization-in-themefic-h-dd934b94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49377%3A%20Missing%20Authorization%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=68f8efe904677bbd79439791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49376-missing-authorization-in-delucks-de-b0acff8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49376%3A%20Missing%20Authorization%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=high&amp;id=68f8efe904677bbd7943978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49060-unrestricted-upload-of-file-with-da-63678d3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49060%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CMSSuperHeroes%20Wastia&amp;severity=critical&amp;id=68f8efe904677bbd7943978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48338-improper-control-of-filename-for-in-d7195aa0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48338%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Kevon%20Adonis%20WP%20Abstracts&amp;severity=high&amp;id=68f8efe904677bbd79439788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48106-unrestricted-upload-of-file-with-da-d250c5bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48106%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CMSSuperHeroes%20Clanora&amp;severity=critical&amp;id=68f8efe904677bbd79439785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48099-cross-site-request-forgery-csrf-in--dcb2be1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48099%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Code%20Amp%20Search%20%26%20Filter&amp;severity=medium&amp;id=68f8efe904677bbd79439782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48098-improper-neutralization-of-input-du-e36f9886</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=high&amp;id=68f8efe904677bbd7943977f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48097-improper-neutralization-of-input-du-8f37fe32</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48097%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shiva%20WSAnalytics&amp;severity=high&amp;id=68f8efe904677bbd7943977c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48096-missing-authorization-in-freshface--234f5c42</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48096%3A%20Missing%20Authorization%20in%20FRESHFACE%20Custom%20CSS&amp;severity=medium&amp;id=68f8efe804677bbd79439745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48095-improper-neutralization-of-input-du-5bbabecd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48095%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=medium&amp;id=68f8efe804677bbd79439742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48093-improper-neutralization-of-input-du-9fcbae2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48093%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Calvaweb%20Password%20only%20login&amp;severity=high&amp;id=68f8efe804677bbd7943973f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48092-improper-neutralization-of-input-du-f9734beb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jurajpuchky%20Fix%20Multiple%20Redirects&amp;severity=high&amp;id=68f8efe804677bbd7943973c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48091-improper-neutralization-of-special--3ffc37ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48091%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Alexander%20AnyComment&amp;severity=high&amp;id=68f8efe804677bbd79439739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39534-improper-neutralization-of-input-du-b54ccadc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39534%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Somonator%20Terms%20Dictionary&amp;severity=high&amp;id=68f8efe804677bbd79439736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32657-improper-control-of-filename-for-in-b0708ff2</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32657%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Testimonial%20Slider%20And%20Showcase%20Pro&amp;severity=high&amp;id=68f8efe804677bbd79439733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32283-deserialization-of-untrusted-data-i-db727760</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32283%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Solar%20Energy&amp;severity=high&amp;id=68f8efe804677bbd79439730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31634-deserialization-of-untrusted-data-i-1a7fcecf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31634%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Insurance&amp;severity=high&amp;id=68f8efe804677bbd7943972d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30944-missing-authorization-in-essekia-ta-3d1778e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30944%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome%20Table%20Premium&amp;severity=high&amp;id=68f8efe804677bbd7943972a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57870-cwe-89-improper-neutralization-of-s-52468760</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57870%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=critical&amp;id=68f8eff304677bbd794399e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webctrlcgiblue-angel-software-suite-exploit-attemp-2639e953</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=webctrl.cgi%2FBlue%20Angel%20Software%20Suite%20Exploit%20Attempts.%20Maybe%20CVE-2025-34033%20Variant%26%23x3f%3B%2C%20(Wed%2C%20Oct%2022nd)&amp;severity=medium&amp;id=68f9856a93bcde9f320d1cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/socgholish-malware-using-compromised-sites-and-fak-b6ee9fd2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SocGholish%20Malware%20Using%20Compromised%20Sites%20and%20Fake%20Software%20Updates%20to%20Deliver%20Ransomware&amp;severity=medium&amp;id=68f8e7f537b5c18bc8279a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-pivots-cracks-down-on-low-level-hackers-b5e786d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20Pivots%2C%20Cracks%20Down%20on%20Resident%20Hackers&amp;severity=medium&amp;id=68f8e46737b5c18bc8200478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-path-traversal-to-supply-chain-compromise-bre-161bc713</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Path%20Traversal%20to%20Supply%20Chain%20Compromise%3A%20Breaking%20MCP%20Server%20Hosting&amp;severity=medium&amp;id=68f8e49737b5c18bc820e4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8848-cwe-94-improper-control-of-generatio-ec36af05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8848%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68f8e49237b5c18bc820c5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerabilities-patched-in-tp-links-omada-9fdedc17</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerabilities%20Patched%20in%20TP-Link%E2%80%99s%20Omada%20Gateways&amp;severity=critical&amp;id=68f8e01d2e6b0a7b0dd18d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-targets-100-gov-entities-in-mea-with-ph-9e431c60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Targets%20100%2B%20Gov%20Entities%20in%20MEA%20With%20Phoenix%20Backdoor&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11844-cwe-643-improper-neutralization-of--02fb03fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11844%3A%20CWE-643%20Improper%20Neutralization%20of%20Data%20within%20XPath%20Expressions%20in%20huggingface%20huggingface%2Fsmolagents&amp;severity=medium&amp;id=68f8dca32e6b0a7b0dc9bfb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11750-cwe-544-missing-standardized-error--569abda6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11750%3A%20CWE-544%20Missing%20Standardized%20Error%20Handling%20Mechanism%20in%20langgenius%20langgenius%2Fdify&amp;severity=medium&amp;id=68f8dca32e6b0a7b0dc9bfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-threat-actors-exploit-toolshell-sharepoint-2f425f77</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Threat%20Actors%20Exploit%20ToolShell%20SharePoint%20Flaw%20Weeks%20After%20Microsoft&apos;s%20July%20Patch&amp;severity=medium&amp;id=68f9831e93bcde9f320bfbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-security-paradox-of-local-llms-f614d401</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20security%20paradox%20of%20local%20LLMs&amp;severity=medium&amp;id=68f8d4ae79108345beae04be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-time-is-itx3f-accuracy-of-poolntporg-tue-oct--94972b3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20time%20is%20it%26%23x3f%3B%20Accuracy%20of%20pool.ntp.org.%2C%20(Tue%2C%20Oct%2021st)&amp;severity=medium&amp;id=68f78c23a08cdec9506cd8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11411-cwe-349-acceptance-of-extraneous-un-0a5bf447</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11411%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20NLnet%20Labs%20Unbound&amp;severity=medium&amp;id=68f8d2c779108345beab68dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-switches-to-new-backdoor-after-malware-cd849e43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Switches%20to%20New%20Backdoor%20After%20Malware%20Exposed%20by%20Researchers&amp;severity=medium&amp;id=68f8c847c46ffb59836826e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bridging-the-remediation-gap-introducing-pentera-r-0c2edfa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bridging%20the%20Remediation%20Gap%3A%20Introducing%20Pentera%20Resolve&amp;severity=critical&amp;id=68f9831e93bcde9f320bfbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-nethereum-nuget-package-used-homoglyph-trick--1830795d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Nethereum%20NuGet%20Package%20Used%20Homoglyph%20Trick%20to%20Steal%20Crypto%20Wallet%20Keys&amp;severity=medium&amp;id=68f9831e93bcde9f320bfbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11086-cwe-269-improper-privilege-manageme-b9d4c655</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11086%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20academylms%20Academy%20LMS%20Pro&amp;severity=high&amp;id=68f8c035f0152f21d78f1008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-inside-a-cloud-based-gift-card-fraud--edef2e6f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jingle%20Thief%3A%20Inside%20a%20Cloud-Based%20Gift%20Card%20Fraud%20Campaign&amp;severity=medium&amp;id=68f8efcd04677bbd79438542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fencing-and-pet-company-jewett-cameron-hit-by-rans-f657e0f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fencing%20and%20Pet%20Company%20Jewett-Cameron%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=68f8c01bf0152f21d78f0166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-releases-october-2025-patches-48725978</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Releases%20October%202025%20Patches&amp;severity=critical&amp;id=68f8ac89d137066578396fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/verizon-mobile-blindspot-leads-to-needless-data-br-cd23a84f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Verizon%3A%20Mobile%20Blindspot%20Leads%20to%20Needless%20Data%20Breaches&amp;severity=medium&amp;id=68f8ac7bd137066578390b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-you-should-swap-passwords-for-passphrases-f2cffa3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20You%20Should%20Swap%20Passwords%20for%20Passphrases&amp;severity=low&amp;id=68f9831e93bcde9f320bfbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6833-cwe-639-authorization-bypass-through-b45949b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6833%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codebangers%20All%20in%20One%20Time%20Clock%20Lite%20%E2%80%93%20Tracking%20Employee%20Time%20Has%20Never%20Been%20Easier&amp;severity=medium&amp;id=68f8a807ce3bbdd80f3596fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-34-zero-days-on-first-day-of-pwn2o-495657af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%2034%20zero-days%20on%20first%20day%20of%20Pwn2Own%20Ireland&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-windsurf-ides-riddled-with-94-n-day-chromiu-bb4d731d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%2C%20Windsurf%20IDEs%20riddled%20with%2094%2B%20n-day%20Chromium%20vulnerabilities&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vidar-stealer-20-adds-multi-threaded-data-theft-be-44957d78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vidar%20Stealer%202.0%20adds%20multi-threaded%20data%20theft%2C%20better%20evasion&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-four-omada-gateway-flaws-two-allow-2c9a85fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20Four%20Omada%20Gateway%20Flaws%2C%20Two%20Allow%20Remote%20Code%20Execution&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11915-cwe-444-inconsistent-interpretation-3cf55591</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11915%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Google%20Cloud%20Vertex%20AI%3A%20Partner%20Models%20for%20MaaS&amp;severity=medium&amp;id=68f8a4c3ce3bbdd80f2df544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-identify-passiveneuron-apt-using-neurs-760e4c0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Identify%20PassiveNeuron%20APT%20Using%20Neursite%20and%20NeuralExecutor%20Malware&amp;severity=medium&amp;id=68f89fcadd2148b88894b0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11825-cwe-79-improper-neutralization-of-i-addd1d96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11825%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pedrolaxe%20Playerzbr&amp;severity=medium&amp;id=68f897b0d59611fbd969791b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10047-cwe-89-improper-neutralization-of-s-5301ca8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10047%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pmbaldha%20Email%20Tracker&amp;severity=medium&amp;id=68f897afd59611fbd96978c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11883-cwe-79-improper-neutralization-of-i-d49195b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11883%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rene-puchinger%20Responsive%20Progress%20Bar&amp;severity=medium&amp;id=68f897b2d59611fbd9697951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11817-cwe-79-improper-neutralization-of-i-309453ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20garyhukkeri%20Simple%20Tableau%20Viz&amp;severity=medium&amp;id=68f897afd59611fbd96978ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11870-cwe-79-improper-neutralization-of-i-1992682f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dmbarber%20Simple%20Business%20Data&amp;severity=medium&amp;id=68f897b1d59611fbd9697935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11867-cwe-79-improper-neutralization-of-i-116e6ce2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vbog%20Bg%20Book%20Publisher&amp;severity=medium&amp;id=68f897b1d59611fbd9697931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11819-cwe-79-improper-neutralization-of-i-c43438f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robocasters%20WP-Thumbnail&amp;severity=medium&amp;id=68f897b0d59611fbd9697911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11824-cwe-79-improper-neutralization-of-i-b8722ee3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20madebycinza%20Cinza%20Grid&amp;severity=medium&amp;id=68f897b0d59611fbd9697916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11866-cwe-79-improper-neutralization-of-i-0f7bab03</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aurelienpierre%20Photographers%20galleries&amp;severity=medium&amp;id=68f897b1d59611fbd969792d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11830-cwe-79-improper-neutralization-of-i-b93f8d94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdrift%20WP%20Restaurant%20Listings&amp;severity=medium&amp;id=68f897b0d59611fbd9697925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11880-cwe-79-improper-neutralization-of-i-fb7f3806</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11880%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sierramike%20SM%20CountDown%20Widget&amp;severity=medium&amp;id=68f897b2d59611fbd969794d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11811-cwe-79-improper-neutralization-of-i-afa3d0bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matthewmarichiba%20Simple%20Youtube%20Shortcode&amp;severity=medium&amp;id=68f897afd59611fbd96978e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11813-cwe-79-improper-neutralization-of-i-3f34769a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pressmaninc%20Responsive%20iframe%20GoogleMap&amp;severity=medium&amp;id=68f897afd59611fbd96978e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11810-cwe-79-improper-neutralization-of-i-07b6ecfd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chrishurst%20Name%3A%20Print%20Button%20Shortcode&amp;severity=medium&amp;id=68f897afd59611fbd96978df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11818-cwe-79-improper-neutralization-of-i-e96e787d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vobi%20WP%20Responsive%20Meet%20The%20Team&amp;severity=medium&amp;id=68f897afd59611fbd96978f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11807-cwe-79-improper-neutralization-of-i-beb4491c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrgeorgegray%20Mixlr%20Shortcode&amp;severity=medium&amp;id=68f897afd59611fbd96978d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10138-cwe-79-improper-neutralization-of-i-e406bfc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10138%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andrex84%20This-or-That&amp;severity=medium&amp;id=68f897afd59611fbd96978cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11827-cwe-79-improper-neutralization-of-i-969cfe2c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oboxgroup%20Oboxmedia%20Ads&amp;severity=medium&amp;id=68f897b0d59611fbd9697920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11878-cwe-79-improper-neutralization-of-i-5ffa44ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beautifultemplates%20ST%20Categories%20Widget&amp;severity=medium&amp;id=68f897b2d59611fbd9697949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11809-cwe-79-improper-neutralization-of-i-fa1d556d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nazakatali32%20WP-Force%20Images%20Download&amp;severity=medium&amp;id=68f897afd59611fbd96978db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11872-cwe-79-improper-neutralization-of-i-1e25f405</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11872%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mcostales84%20Material%20Design%20Iconic%20Font%20Integration&amp;severity=medium&amp;id=68f897b1d59611fbd9697939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11804-cwe-79-improper-neutralization-of-i-ebfcd22a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jobair%20JB%20News%20Ticker&amp;severity=medium&amp;id=68f897afd59611fbd96978d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11834-cwe-79-improper-neutralization-of-i-3544d69c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wiellyam%20WP%20AD%20Gallery&amp;severity=medium&amp;id=68f897b0d59611fbd9697929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11952-cwe-79-improper-neutralization-of-i-f1429ea3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11952%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Oct8ne%20Chatbot&amp;severity=medium&amp;id=68f897b2d59611fbd9697956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41110-cwe-287-improper-authentication-in--cc8ecdda</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41110%3A%20CWE-287%20Improper%20Authentication%20in%20Ghost%20Robotics%20Vision%2060&amp;severity=high&amp;id=68f8942bd59611fbd95e6918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41109-cwe-798-use-of-hard-coded-credentia-49266820</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41109%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Ghost%20Robotics%20Vision%2060&amp;severity=high&amp;id=68f8942ad59611fbd95e690a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41108-cwe-287-improper-authentication-in--fef464fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41108%3A%20CWE-287%20Improper%20Authentication%20in%20Ghost%20Robotics%20Vision%2060&amp;severity=critical&amp;id=68f89429d59611fbd95e68ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-earn-over-520000-on-first-day-of-pwn2own-i-95252bc1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Earn%20Over%20%24520%2C000%20on%20First%20Day%20of%20Pwn2Own%20Ireland%202025&amp;severity=medium&amp;id=68f88c10e21654ab74afd1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tarmageddon-flaw-in-async-tar-rust-library-could-e-e0b926a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TARmageddon%20Flaw%20in%20Async-Tar%20Rust%20Library%20Could%20Enable%20Remote%20Code%20Execution&amp;severity=critical&amp;id=68f9831e93bcde9f320bfbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41724-cwe-239failure-to-handle-incomplete-f0cddbc2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41724%3A%20CWE-239%3AFailure%20to%20Handle%20Incomplete%20Element%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=high&amp;id=68f886d515c9ea51bb7190c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41723-cwe-35path-traversal-in-sauter-modu-7719e10e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41723%3A%20CWE-35%3APath%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=critical&amp;id=68f886d515c9ea51bb7190c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41722-cwe-798-use-of-hard-coded-credentia-bb25f452</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41722%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=high&amp;id=68f8835515c9ea51bb6854f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41721-cwe-77improper-neutralization-of-sp-5efa09b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41721%3A%20CWE-77%3AImproper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=low&amp;id=68f8835515c9ea51bb6854f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41720-cwe-646reliance-on-file-name-or-ext-dd42a7ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41720%3A%20CWE-646%3AReliance%20on%20File%20Name%20or%20Extension%20of%20Externally-Supplied%20File%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=medium&amp;id=68f8816c15c9ea51bb64fa28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41719-cwe-1286improper-validation-of-synt-0718017a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41719%3A%20CWE-1286%3AImproper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=high&amp;id=68f8816c15c9ea51bb64fa25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10570-cwe-639-authorization-bypass-throug-4975db7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10570%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpdesk%20Flexible%20Refund%20and%20Return%20Order%20for%20WooCommerce&amp;severity=medium&amp;id=68f87dba01fe9fee6c20e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12033-cwe-79-improper-neutralization-of-i-85567379</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12033%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rpetersen29%20Simple%20Banner%20%E2%80%93%20Easily%20add%20multiple%20Banners%2FBars%2FNotifications%2FAnnouncements%20to%20the%20top%20or%20bottom%20of%20your%20website&amp;severity=medium&amp;id=68f87dba01fe9fee6c20e44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10588-cwe-352-cross-site-request-forgery--ba016e8a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10588%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pixelyoursite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20%26%20API%20Manager&amp;severity=medium&amp;id=68f87dba01fe9fee6c20e44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5983-cwe-601-url-redirection-to-untrusted-ea0a8fa7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5983%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Meta%20Tag%20Manager&amp;severity=medium&amp;id=68f875a3431d95e35de16147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10638-cwe-862-missing-authorization-in-ns-b198ef91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10638%3A%20CWE-862%20Missing%20Authorization%20in%20NS%20Maintenance%20Mode%20for%20WP&amp;severity=medium&amp;id=68f875a3431d95e35de16144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unlocking-free-wifi-on-british-airways-2e558a3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unlocking%20free%20WiFi%20on%20British%20Airways&amp;severity=medium&amp;id=68f86e89431d95e35dd02a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10651-cwe-79-improper-neutralization-of-i-8f62059a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10651%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=medium&amp;id=68f86dad5aedc7cf04246c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-four-omada-gateway-flaws-two-allow-b15bc3da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20Four%20Omada%20Gateway%20Flaws%2C%20Two%20Allow%20Remote%20Code%20Execution&amp;severity=critical&amp;id=68f9831e93bcde9f320bfbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brazilian-caminho-loader-employs-lsb-steganography-a13f600a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brazilian%20Caminho%20Loader%20Employs%20LSB%20Steganography%20and%20Fileless%20Execution%20to%20Deliver%20Multiple%20Malware%20Families%20Across%20South%20America%2C%20Africa%2C%20and%20Eastern%20Europe&amp;severity=medium&amp;id=68f8c95f88c5cfbf96a22627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22167-path-traversal-arbitrary-readwrite--3042529d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22167%3A%20Path%20Traversal%20(Arbitrary%20Read%2FWrite)%20in%20Atlassian%20Jira%20Software%20Data%20Center&amp;severity=high&amp;id=68f8307187e9a01451ebf3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asian-nations-ramp-up-pressure-on-cybercrime-scam--feca4a4e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asian%20Nations%20Ramp%20Up%20Pressure%20on%20Cybercrime%20&apos;Scam%20Factories&apos;&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-22-89aa788e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-22&amp;severity=medium&amp;id=68f97123a68f163431ee7400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60343-na-d54e1a5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60343%3A%20n%2Fa&amp;severity=high&amp;id=68f91cdf2887d40ca3c19bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60342-na-5e09a8f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60342%3A%20n%2Fa&amp;severity=high&amp;id=68f91cdf2887d40ca3c19bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60341-na-e1d049da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60341%3A%20n%2Fa&amp;severity=high&amp;id=68f919682887d40ca3ba54fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60340-na-354723cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60340%3A%20n%2Fa&amp;severity=high&amp;id=68f915e12887d40ca3b4b713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60339-na-8888ea39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60339%3A%20n%2Fa&amp;severity=high&amp;id=68f915e12887d40ca3b4b710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60337-na-19eafbc3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60337%3A%20n%2Fa&amp;severity=high&amp;id=68f91416519b403272390e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60336-na-a36c53f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60336%3A%20n%2Fa&amp;severity=high&amp;id=68f91416519b403272390e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60338-na-bb77ac72</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60338%3A%20n%2Fa&amp;severity=high&amp;id=68f8fc246e01a0ac47db56a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60335-na-6889e0c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60335%3A%20n%2Fa&amp;severity=high&amp;id=68f8fa3f6e01a0ac47d8a3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60334-na-bbbddb20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60334%3A%20n%2Fa&amp;severity=high&amp;id=68f8f7aea2d588d2bde2ff37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60333-na-5477565e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60333%3A%20n%2Fa&amp;severity=high&amp;id=68f8f7aea2d588d2bde2ff34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60331-na-58c93695</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60331%3A%20n%2Fa&amp;severity=high&amp;id=68f8f43ba2d588d2bddb93c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60332-na-3141d43f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60332%3A%20n%2Fa&amp;severity=high&amp;id=68f8f249a2d588d2bdd990e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56447-na-c35cb2a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56447%3A%20n%2Fa&amp;severity=critical&amp;id=68f8e80537b5c18bc8279b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61035-na-1d9ef3fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61035%3A%20n%2Fa&amp;severity=high&amp;id=68f8e49237b5c18bc820c5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58274-cwe-78-improper-neutralization-of-s-1a40631c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58274%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hikvision%20CSMP%20iSecure%20Center&amp;severity=high&amp;id=68f856df8c4621f9a336a1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53691-cwe-24-path-traversal-filedir-in-hi-882e1cf1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53691%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Hikvision%20CSMP%20iSecure%20Center&amp;severity=high&amp;id=68f856df8c4621f9a336a1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62775-cwe-669-incorrect-resource-transfer-5bbba3c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62775%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Mercku%20M6a&amp;severity=high&amp;id=68f8501287e9a014511a9019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62774-cwe-331-insufficient-entropy-in-mer-e40dad61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62774%3A%20CWE-331%20Insufficient%20Entropy%20in%20Mercku%20M6a&amp;severity=low&amp;id=68f8501287e9a014511a9015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62773-cwe-912-hidden-functionality-in-mer-9436ca64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62773%3A%20CWE-912%20Hidden%20Functionality%20in%20Mercku%20M6a&amp;severity=low&amp;id=68f8501287e9a014511a9011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62772-cwe-305-authentication-bypass-by-pr-d4e2908c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62772%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Mercku%20M6a&amp;severity=low&amp;id=68f8501287e9a014511a900d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62771-cwe-352-cross-site-request-forgery--3cb7e8e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62771%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mercku%20M6a&amp;severity=high&amp;id=68f8501287e9a014511a9009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61756-easily-exploitable-vulnerability-al-1b5aaf76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61756%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=68f8144a6b1ace0f36b001a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casting-a-netty-for-bugs-and-catching-a-big-one-cv-7990ce9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casting%20a%20Net(ty)%20for%20Bugs%2C%20and%20Catching%20a%20Big%20One%20(CVE-2025-59419)&amp;severity=critical&amp;id=68f805f5061d6011e857c8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mirai-the-iot-botnet-9e031f8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mirai%3A%20The%20IoT%20Botnet&amp;severity=medium&amp;id=68f8941fd59611fbd95e412e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tykit-analysis-new-phishing-kit-stealing-hundreds--d337919c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tykit%20Analysis%3A%20New%20Phishing%20Kit%20Stealing%20Hundreds%20of%20Microsoft%20Accounts%20in%20Finance&amp;severity=medium&amp;id=68f88fd4e21654ab74ba35c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/electronic-warfare-puts-commercial-gps-users-on-no-388ae97f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Electronic%20Warfare%20Puts%20Commercial%20GPS%20Users%20on%20Notice&amp;severity=medium&amp;id=68f8343e87e9a01451028aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62641-easily-exploitable-vulnerability-al-6f76e0a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62641%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62592-easily-exploitable-vulnerability-al-b987be96</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62592%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=68f7e97201721c03c6f13f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62591-easily-exploitable-vulnerability-al-1f43d916</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62591%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=68f7e97201721c03c6f13f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62590-easily-exploitable-vulnerability-al-9c0015f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62590%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62589-easily-exploitable-vulnerability-al-5cc4d88c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62589%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62588-easily-exploitable-vulnerability-al-15f76695</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62588%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62587-easily-exploitable-vulnerability-al-a0bd34b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62587%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62481-easily-exploitable-vulnerability-al-b3306be9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62481%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Marketing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Marketing.%20in%20Oracle%20Corporation%20Oracle%20Marketing&amp;severity=critical&amp;id=68f7e97201721c03c6f13f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62480-easily-exploitable-vulnerability-al-394250b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62480%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=low&amp;id=68f7e97201721c03c6f13f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62479-easily-exploitable-vulnerability-al-8e7c5c9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62479%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=low&amp;id=68f7e97201721c03c6f13f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62478-easily-exploitable-vulnerability-al-ebbc8979</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62478%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62477-easily-exploitable-vulnerability-al-98f4948e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62477%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62476-easily-exploitable-vulnerability-al-f8c80c31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62476%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62475-easily-exploitable-vulnerability-al-39decc46</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62475%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62290-easily-exploitable-vulnerability-al-7f5d936a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62290%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=high&amp;id=68f7e97201721c03c6f13f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62289-easily-exploitable-vulnerability-al-f9475939</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62289%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97101721c03c6f13eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62288-easily-exploitable-vulnerability-al-ed50aeb5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62288%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Health%20Sciences%20Data%20Management%20Workbench.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Health%20Sciences%20Data%20Management%20Workbench%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Health%20Sciences%20Data%20Management%20Workbench&amp;severity=medium&amp;id=68f7e97101721c03c6f13eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62287-easily-exploitable-vulnerability-al-66ccdafe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62287%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Life%20Sciences%20InForm%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=68f7e97101721c03c6f13ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61885-easily-exploitable-vulnerability-al-1d05ec65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61885%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=68f7e97101721c03c6f13ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61881-difficult-to-exploit-vulnerability--0d2ac84b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61881%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Java%20VM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=68f7e97101721c03c6f13ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61764-easily-exploitable-vulnerability-al-c1cc7bee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61764%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=68f7e97101721c03c6f13edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61763-easily-exploitable-vulnerability-al-0acf5a24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61763%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Essbase.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Essbase%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Essbase%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Essbase&amp;severity=high&amp;id=68f7e97101721c03c6f13edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61762-easily-exploitable-vulnerability-al-775fe056</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61762%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Payables.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20FIN%20Payables%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20FIN%20Payables%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20PeopleSoft%20Enterprise%20FIN%20Payables.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Payables&amp;severity=medium&amp;id=68f7e97101721c03c6f13ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61761-easily-exploitable-vulnerability-al-3b55b785</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61761%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management&amp;severity=medium&amp;id=68f7e97101721c03c6f13ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61760-difficult-to-exploit-vulnerability--daf50cc5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61760%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97101721c03c6f13ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61759-easily-exploitable-vulnerability-al-ac23fe1e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61759%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61758-easily-exploitable-vulnerability-al-0a1e2f57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61758%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20IT%20Asset%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20IT%20Asset%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20IT%20Asset%20Management&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61757-easily-exploitable-vulnerability-al-e6a75922</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61757%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Identity%20Manager.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Identity%20Manager.%20in%20Oracle%20Corporation%20Identity%20Manager&amp;severity=critical&amp;id=68f7e96f01721c03c6f13e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61755-difficult-to-exploit-vulnerability--b1890674</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61755%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20GraalVM%20for%20JDK.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20GraalVM%20for%20JDK%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20GraalVM%20for%20JDK&amp;severity=low&amp;id=68f7e96f01721c03c6f13e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61754-easily-exploitable-vulnerability-al-d829e4f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61754%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20BI%20Publisher.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20BI%20Publisher%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20BI%20Publisher&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61753-easily-exploitable-vulnerability-al-dffe752c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61753%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Scripting.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Scripting%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Scripting%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Scripting%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Scripting&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61752-easily-exploitable-vulnerability-al-02e1bf24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61752%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%2F2%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20WebLogic%20Server.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=68f7e96f01721c03c6f13e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61751-easily-exploitable-vulnerability-al-bc591457</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61751%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=68f7e96f01721c03c6f13e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61750-easily-exploitable-vulnerability-al-28af73fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61750%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61749-easily-exploitable-vulnerability-al-d1eb9249</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61749%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20DBA%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Unified%20Audit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Unified%20Audit%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=68f7e96f01721c03c6f13e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61748-difficult-to-exploit-vulnerability--c47b1bb9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61748%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=68f7e96f01721c03c6f13e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53072-easily-exploitable-vulnerability-al-1b560ecf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53072%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Marketing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Marketing.%20in%20Oracle%20Corporation%20Oracle%20Marketing&amp;severity=critical&amp;id=68f7e96f01721c03c6f13e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53071-easily-exploitable-vulnerability-al-aff75ee5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53071%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53070-easily-exploitable-vulnerability-al-7c44fa44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53070%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53069-easily-exploitable-vulnerability-al-6150c453</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53069%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53068-easily-exploitable-vulnerability-al-ad8604af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53068%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53067-easily-exploitable-vulnerability-al-ce0aa0b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53067%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53066-easily-exploitable-vulnerability-al-640079b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53066%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=68f7e96f01721c03c6f13e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53065-easily-exploitable-vulnerability-al-51a0f3d6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53065%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53064-easily-exploitable-vulnerability-al-3f186fe3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53064%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53063-easily-exploitable-vulnerability-al-cb8808f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53063%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53062-easily-exploitable-vulnerability-al-213e28ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53062%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53061-easily-exploitable-vulnerability-al-1e0226db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53061%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20While%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53060-easily-exploitable-vulnerability-al-4696ac2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53060%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JD%20Edwards%20EnterpriseOne%20Tools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53059-easily-exploitable-vulnerability-al-079f839e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53059%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53058-easily-exploitable-vulnerability-al-dddc40be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53058%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Manager.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Applications%20Manager%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Manager%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Applications%20Manager%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Manager&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53057-difficult-to-exploit-vulnerability--04100289</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53057%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53056-easily-exploitable-vulnerability-al-69e76422</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53056%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JD%20Edwards%20EnterpriseOne%20Tools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53055-easily-exploitable-vulnerability-al-a09852bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53055%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53054-easily-exploitable-vulnerability-al-4ce202fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53054%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53053-easily-exploitable-vulnerability-al-ceb8f5ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53053%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53052-easily-exploitable-vulnerability-al-6cef64ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53052%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Workflow.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Workflow%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Workflow%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Workflow%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Workflow&amp;severity=medium&amp;id=68f7e96d01721c03c6f13df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53051-easily-exploitable-vulnerability-al-eda986bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53051%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20SYSDBA%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20RDBMS%20Functional%20Index.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20RDBMS%20Functional%20Index%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=68f7e96d01721c03c6f13df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53050-easily-exploitable-vulnerability-al-aec91c58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53050%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20PeopleSoft%20Enterprise%20PeopleTools.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=high&amp;id=68f7e96d01721c03c6f13df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53049-easily-exploitable-vulnerability-al-89d258e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53049%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Business%20Intelligence%20Enterprise%20Edition&amp;severity=high&amp;id=68f7e96d01721c03c6f13df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53048-easily-exploitable-vulnerability-al-b33bd7b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53048%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96d01721c03c6f13ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53047-easily-exploitable-vulnerability-al-5e18e2e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53047%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Bonjour%20to%20compromise%20Portable%20Clusterware.%20%20While%20the%20vulnerability%20is%20in%20Portable%20Clusterware%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Portable%20Clusterware%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53046-easily-exploitable-vulnerability-al-ed13818c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53046%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e96d01721c03c6f13de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53045-easily-exploitable-vulnerability-al-79a46f25</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53045%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53044-easily-exploitable-vulnerability-al-6d030414</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53044%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53043-easily-exploitable-vulnerability-al-6915cefd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53043%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Product%20Hub.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Product%20Hub%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Product%20Hub%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Product%20Hub&amp;severity=high&amp;id=68f7e96c01721c03c6f13dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53042-easily-exploitable-vulnerability-al-52833639</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53042%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53041-easily-exploitable-vulnerability-al-a5ad1c44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53041%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20iStore.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20iStore%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20iStore%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20iStore%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20iStore&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53040-easily-exploitable-vulnerability-al-e3feb773</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53040%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53037-easily-exploitable-vulnerability-al-768a4355</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53037%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=critical&amp;id=68f7e96c01721c03c6f13dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53036-easily-exploitable-vulnerability-al-853ab8c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53036%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=68f7e96c01721c03c6f13dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53035-easily-exploitable-vulnerability-al-407e1517</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53035%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53034-easily-exploitable-vulnerability-al-1abd9ad6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53034%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50075-easily-exploitable-vulnerability-al-5341b988</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50075%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50074-easily-exploitable-vulnerability-al-f1877392</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50074%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing&amp;severity=medium&amp;id=68f7e96c01721c03c6f13db8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62661-cwe-276-incorrect-default-permissio-b2298725</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62661%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Thanks%20Extension%2C%20Mediawiki%20-%20Growth%20Experiments%20Extension&amp;severity=medium&amp;id=68f7e40601721c03c6e7330b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salt-typhoon-apt-targets-global-telecom-and-energy-5760f494</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salt%20Typhoon%20APT%20Targets%20Global%20Telecom%20and%20Energy%20Sectors%2C%20Says%20Darktrace&amp;severity=medium&amp;id=68f7e1630ecb6bf811944952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polaredge-targets-cisco-asus-qnap-synology-routers-0150cb39</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PolarEdge%20Targets%20Cisco%2C%20ASUS%2C%20QNAP%2C%20Synology%20Routers%20in%20Expanding%20Botnet%20Campaign&amp;severity=high&amp;id=68f7d1841612af152e93b339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/real-time-audio-deepfakes-are-now-a-reality-f30b247f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Real-Time%20Audio%20Deepfakes%20Are%20Now%20a%20Reality&amp;severity=medium&amp;id=68f7d1841612af152e93b345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-evolve-malware-pushed-in-i-am-not--434b3061</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20hackers%20evolve%20malware%20pushed%20in%20%22I%20am%20not%20a%20robot%22%20captchas&amp;severity=high&amp;id=68f7d1841612af152e93b33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62249-cwe-79-improper-neutralization-of-i-447eb88d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62249%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68f7d1bd1612af152e93e22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11757-cwe-155-improper-neutralization-of--56e88257</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11757%3A%20CWE-155%20Improper%20Neutralization%20of%20Wildcards%20or%20Matching%20Symbols%20in%20CloudEdge%20CloudEdge%20App&amp;severity=high&amp;id=68f7c43cdde5d1d51b4c0d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12031-cwe-1004-sensitive-cookie-without-h-9fd8446e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12031%3A%20CWE-1004%3A%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8050-cwe-73-external-control-of-file-name-7128149d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8050%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20opentext%20Flipper&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-use-deepseek-both-privately-and-securely-ka-f23c6a98</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20use%20DeepSeek%20both%20privately%20and%20securely%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68f7c1f341ea2e78b89c740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11534-cwe-288-authentication-bypass-using-811d9833</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11534%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Raisecomm%20RAX701-GC-WP-01%20P200R002C52&amp;severity=critical&amp;id=68f7be6441ea2e78b8952f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-self-propagating-vscode-extension-worm-b3f3cc38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%3A%20Self-Propagating%20VSCode%20Extension%20Worm&amp;severity=medium&amp;id=68f7ddd50ecb6bf8118c7f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62598-cwe-79-improper-neutralization-of-i-8076d8a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62598%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68f7ba157853ccdda8797446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62597-cwe-79-improper-neutralization-of-i-9b87e51b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62597%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68f7ba157853ccdda8797441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62595-cwe-601-url-redirection-to-untruste-50fe52c2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62595%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20koajs%20koa&amp;severity=medium&amp;id=68f7b4a07853ccdda86f81c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62518-cwe-843-access-of-resource-using-in-8a9c1aa9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62518%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20astral-sh%20tokio-tar&amp;severity=high&amp;id=68f7b4a07853ccdda86f81b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privacy-and-prizes-rewards-from-a-malicious-browse-33d21902</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privacy%20and%20Prizes%3A%20Rewards%20from%20a%20Malicious%20Browser%20Extension&amp;severity=medium&amp;id=68f7b2cca08cdec950742a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-branding-used-in-new-tech-support-scam-73df4e31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Branding%20Used%20in%20New%20Tech%20Support%20Scam&amp;severity=medium&amp;id=68f7af44a08cdec95073a2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22166-dos-denial-of-service-in-atlassian--827b25f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22166%3A%20DoS%20(Denial%20of%20Service)%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=high&amp;id=68f7b2d6a08cdec950742b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62250-cwe-346-origin-validation-error-in--8c85a559</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62250%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68f7abc9a08cdec95072febd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiktok-videos-promoting-malware-installation-b2b76930</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TikTok%20Videos%20Promoting%20Malware%20Installation&amp;severity=medium&amp;id=68f7b2cca08cdec9507429fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-rolls-out-new-tools-to-protect-whatsapp-and-m-5d064cda</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20Rolls%20Out%20New%20Tools%20to%20Protect%20WhatsApp%20and%20Messenger%20Users%20from%20Scams&amp;severity=medium&amp;id=68f8339087e9a01451fc31bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberespionage-campaign-passiveneuron-targets-mach-d4f05152</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberespionage%20campaign%20PassiveNeuron%20targets%20machines%20running%20Windows%20Server&amp;severity=medium&amp;id=68f7af44a08cdec95073a2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/government-industrial-servers-targeted-in-china-li-80f7f107</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Government%2C%20Industrial%20Servers%20Targeted%20in%20China-Linked%20%E2%80%98PassiveNeuron%E2%80%99%20Campaign&amp;severity=high&amp;id=68f79a2da08cdec9506f41d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polaredge-targets-cisco-asus-qnap-synology-routers-169d781f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PolarEdge%20Targets%20Cisco%2C%20ASUS%2C%20QNAP%2C%20Synology%20Routers%20in%20Expanding%20Botnet%20Campaign&amp;severity=medium&amp;id=68f8339087e9a01451fc31c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9339-cwe-89-improper-neutralization-of-sp-90cf6288</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9339%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Simple%20SA%20SIMPLE.ERP&amp;severity=high&amp;id=68f7932da08cdec9506e3459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/streaming-fraud-campaigns-rely-on-ai-tools-bots-3974731c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Streaming%20Fraud%20Campaigns%20Rely%20on%20AI%20Tools%2C%20Bots&amp;severity=medium&amp;id=68f8343e87e9a01451028aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11625-cwe-287-improper-authentication-in--7ad22a33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11625%3A%20CWE-287%20Improper%20Authentication%20in%20wolfSSL%20wolfSSH&amp;severity=critical&amp;id=695d4b63a7c70f178f7611fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11151-cwe-200-exposure-of-sensitive-infor-63b83537</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11151%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Beyaz%20Bilgisayar%20Software%20Design%20Industry%20and%20Trade%20Ltd.%20Co.%20CityPLus&amp;severity=high&amp;id=68f796b2a08cdec9506ea1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-365-copilot-arbitrary-data-exfiltration--e118a303</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20365%20Copilot%20-%20Arbitrary%20Data%20Exfiltration%20Via%20Mermaid%20Diagrams&amp;severity=medium&amp;id=68f7851fa08cdec9506bda67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-apple-kentico-microsoft-vu-6958dfb5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20Apple%2C%20Kentico%2C%20Microsoft%20Vulnerabilities&amp;severity=high&amp;id=68f78192a08cdec9506b2f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6239-cwe-200-exposure-of-sensitive-inform-e528b257</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6239%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Zohocorp%20ManageEngine%20Applications%20Manager&amp;severity=medium&amp;id=68f781a9a08cdec9506b3157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/envoy-air-american-airlines-confirms-oracle-ebs-0--c8ba43de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Envoy%20Air%20(American%20Airlines)%20Confirms%20Oracle%20EBS%200-Day%20Breach%20Linked%20to%20Cl0p%20Ransomware&amp;severity=high&amp;id=68f77e12a08cdec9506a7545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-11-23h2-end-of-life-a37b5736</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2011%2023H2%20End%20of%20Life&amp;severity=medium&amp;id=68f77a95a08cdec95069ccc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10020-cwe-77-improper-neutralization-of-s-525ab93d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10020%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20ADManager%20Plus&amp;severity=high&amp;id=68f77e24a08cdec9506a767f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealth-bgp-hijacks-with-urpf-filtering-74fdfdad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealth%20BGP%20Hijacks%20with%20uRPF%20Filtering&amp;severity=medium&amp;id=68f7770da08cdec950690ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10641-cwe-319-cleartext-transmission-of-s-12113cfb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10641%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20EfficientLab%20WorkExaminer%20Professional&amp;severity=high&amp;id=68f7770ba08cdec950690ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10640-cwe-602-client-side-enforcement-of--727102fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10640%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20EfficientLab%20WorkExaminer%20Professional&amp;severity=critical&amp;id=68f77387a08cdec9506874ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9428-cwe-89-improper-neutralization-of-sp-c3c46b9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9428%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zohocorp%20Analytics%20Plus&amp;severity=high&amp;id=68f77387a08cdec9506874f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10639-cwe-798-use-of-hard-coded-credentia-429367ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10639%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20EfficientLab%20WorkExaminer%20Professional&amp;severity=high&amp;id=68f77387a08cdec9506874f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-targets-vs-code-extensions-wit-c884df58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%20Targets%20VS%20Code%20Extensions%20With%20%E2%80%98GlassWorm%E2%80%99%20Malware&amp;severity=medium&amp;id=68f77002a08cdec95067798d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-ai-to-benefit-from-ai-94676909</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20AI%20to%20Benefit%20from%20AI&amp;severity=medium&amp;id=68f778e6a08cdec9506979f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7473-cwe-91-xml-injection-aka-blind-xpath-5c4dc517</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7473%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20Zohocorp%20Endpoint%20Central&amp;severity=medium&amp;id=68f76a99a08cdec9505dbb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/passiveneuron-cyber-spies-target-orgs-with-custom--8931ee41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98PassiveNeuron%E2%80%99%20Cyber%20Spies%20Target%20Orgs%20With%20Custom%20Malware&amp;severity=medium&amp;id=68f8343e87e9a01451028aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-used-snappybee-malware-and-citrix-flaw-to--7d0f1a09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Used%20Snappybee%20Malware%20and%20Citrix%20Flaw%20to%20Breach%20European%20Telecom%20Network&amp;severity=high&amp;id=68f75d097f1dc93a1e7a1d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5496-cwe-269-improper-privilege-managemen-62594cba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5496%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Zohocorp%20Endpoint%20Central&amp;severity=low&amp;id=68f762f3fa1db7d161aa94c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-73000-watchguard-firebox-devices-impacted-by--f67a0e4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2073%2C000%20WatchGuard%20Firebox%20Devices%20Impacted%20by%20Recent%20Critical%20Flaw&amp;severity=critical&amp;id=68f75cf67f1dc93a1e79e343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/myanmar-military-shuts-down-major-cybercrime-cente-2e1fc786</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Myanmar%20Military%20Shuts%20Down%20Major%20Cybercrime%20Center%20and%20Detains%20Over%202%2C000%20People&amp;severity=medium&amp;id=68f758df159af2a541c15996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/to-be-a-robot-or-not-to-be-new-malware-attributed--c19c2406</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=To%20Be%20(A%20Robot)%20or%20Not%20to%20Be%3A%20New%20Malware%20Attributed%20to%20Russia%20State-Sponsored%20COLDRIVER&amp;severity=medium&amp;id=68f758f1159af2a541c15c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-phishing-emails-pretend-to-offer-jobs-in-top-f-c9e16dde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Phishing%20Emails%20Pretend%20to%20Offer%20Jobs%20in%20Top%20Firms%20to%20Steal%20Facebook%20Logins&amp;severity=medium&amp;id=68f750b0cab76000dd2a7865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10612-cwe-79-improper-neutralization-of-i-56c8a3aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20giSoft%20Information%20Technologies%20City%20Guide&amp;severity=medium&amp;id=68f74b48cab76000dd20dfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-confirms-exploitation-of-latest-oracle-ebs-vu-00d83904</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Confirms%20Exploitation%20of%20Latest%20Oracle%20EBS%20Vulnerability&amp;severity=medium&amp;id=68f748e76588c2a0ccddaf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/article-kerberos-security-attacks-and-detection-52d9726a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BArticle%5D%20Kerberos%20Security%3A%20Attacks%20and%20Detection&amp;severity=medium&amp;id=68f740e575ebabd95bb1c959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26392-cwe-89-improper-neutralization-of-s-7b88a781</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26392%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=68f73d5075ebabd95ba9f32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-identifies-three-new-russian-malware-famili-62a06544</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Identifies%20Three%20New%20Russian%20Malware%20Families%20Created%20by%20COLDRIVER%20Hackers&amp;severity=low&amp;id=68f73955d69d6f92d657d10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11949-cwe-306-missing-authentication-for--476d88ad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11949%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=high&amp;id=68f731c8068ea03ee5af7f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12004-cwe-732-incorrect-permission-assign-e4ef87a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12004%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Lockdown%20Extension&amp;severity=critical&amp;id=68f72c58068ea03ee5a63d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10916-cwe-73-external-control-of-file-nam-9c91d826</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10916%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20FormGent&amp;severity=critical&amp;id=68f724a6523859c72c10f9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62701-cwe-79-improper-neutralization-of-i-fecbad38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikistories&amp;severity=medium&amp;id=68f713c10f6a5ff36739b251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62702-cwe-79-improper-neutralization-of-i-bc0b858b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20PageTriage%20Extension&amp;severity=medium&amp;id=68f7103e0f6a5ff36732bb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62694-cwe-79-improper-neutralization-of-i-8e11ab71</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20WikiLove%20Extension&amp;severity=medium&amp;id=68f70e570f6a5ff3672ff423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62695-cwe-79-improper-neutralization-of-i-d5a4eda6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20WikiLambda%20Extension&amp;severity=medium&amp;id=68f708cf187cf981f21c9b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62696-cwe-77-improper-neutralization-of-s-6da6e8d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62696%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20Foundation%20-%20Springboard%20Extension&amp;severity=medium&amp;id=68f70e570f6a5ff3672ff427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62699-cwe-200-exposure-of-sensitive-infor-53b5edb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62699%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Translate%20Extension&amp;severity=medium&amp;id=68f70566187cf981f21700e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9133-cwe-862-missing-authorization-in-zyx-9f9b9459</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9133%3A%20CWE-862%20Missing%20Authorization%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=high&amp;id=68f6f0dbb870ea37e2aefe45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8078-cwe-78-improper-neutralization-of-sp-491e49e8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8078%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=high&amp;id=68f6f0dbb870ea37e2aefe42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7851-vulnerability-in-tp-link-systems-inc-fc5e84d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7851%3A%20Vulnerability%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=high&amp;id=68f6d853b870ea37e2a651e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7850-cwe-78-improper-neutralization-of-sp-ea7871c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7850%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=critical&amp;id=68f6d853b870ea37e2a651e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6542-cwe-78-improper-neutralization-of-sp-d3ffc6ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6542%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=critical&amp;id=68f6d853b870ea37e2a651dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6541-cwe-78-improper-neutralization-of-sp-34885acc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6541%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=high&amp;id=68f6d853b870ea37e2a651d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-21-a456d457</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-21&amp;severity=medium&amp;id=68f8216e1fa795c94c4b2a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52079-na-5292046b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52079%3A%20n%2Fa&amp;severity=high&amp;id=68f7e1720ecb6bf811944a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61457-na-58cfa808</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61457%3A%20n%2Fa&amp;severity=medium&amp;id=68f7dc040ecb6bf8118a36e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56802-na-f7cfd176</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56802%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace21685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56801-na-a88e56ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56801%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace21681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56800-na-0ca70483</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56800%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace2167d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56799-na-1ad2327b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56799%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace21679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61255-na-4b0d0aae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61255%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d410247d717aacd8c59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60507-na-83bf8c05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60507%3A%20n%2Fa&amp;severity=high&amp;id=68f7c9acdde5d1d51b5517bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60790-na-4cc1f59a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60790%3A%20n%2Fa&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60427-na-20b43510</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60427%3A%20n%2Fa&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60772-na-b71e1c33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60772%3A%20n%2Fa&amp;severity=critical&amp;id=68f7be6441ea2e78b8952f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60511-na-5b068702</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60511%3A%20n%2Fa&amp;severity=medium&amp;id=68f7be6441ea2e78b8952f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60506-na-5ab4b573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60506%3A%20n%2Fa&amp;severity=medium&amp;id=68f7be6441ea2e78b8952f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60500-na-d8a0e77f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60500%3A%20n%2Fa&amp;severity=high&amp;id=68f7be6441ea2e78b8952f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62763-cwe-918-server-side-request-forgery-ef8d059c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62763%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Zimbra%20Collaboration&amp;severity=medium&amp;id=68f7bc7541ea2e78b89317a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60280-na-2a296f76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60280%3A%20n%2Fa&amp;severity=medium&amp;id=68f7af4da08cdec95073a432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61220-na-d6acc624</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61220%3A%20n%2Fa&amp;severity=high&amp;id=68f7abc9a08cdec95072fec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61194-na-090a8f6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61194%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a844a08cdec950723b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60751-na-89eac558</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60751%3A%20n%2Fa&amp;severity=high&amp;id=68f7a844a08cdec950723b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61181-na-84e74787</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61181%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a844a08cdec950723b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60344-na-61323593</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60344%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20D-Link%20DSR-150&amp;severity=high&amp;id=68f7a4cea08cdec950718deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56450-na-4aab1ca0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56450%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a4cea08cdec950718de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57521-na-9dc346a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57521%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a146a08cdec95070f589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60934-na-d2974705</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60934%3A%20n%2Fa&amp;severity=medium&amp;id=68f79dc6a08cdec950700394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60933-na-0a76309c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60933%3A%20n%2Fa&amp;severity=medium&amp;id=68f79dc6a08cdec950700391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60932-na-0b98d863</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60932%3A%20n%2Fa&amp;severity=medium&amp;id=68f79dc6a08cdec95070038e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59438-na-17201df9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59438%3A%20n%2Fa&amp;severity=medium&amp;id=68f79a48a08cdec9506f4bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns0eu-private-dns-service-shuts-down-over-sustain-818a88a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS0.EU%20private%20DNS%20service%20shuts%20down%20over%20sustainability%20issues&amp;severity=high&amp;id=68f6c63b81b1d362526373ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-lynk-group-leaks-sensitive-uk-mod-files-in-44fe32a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Lynk%20group%20leaks%20sensitive%20UK%20MoD%20files%2C%20including%20info%20on%20eight%20military%20bases&amp;severity=high&amp;id=68f6c63b81b1d362526373ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-october-21st-2025-httpsi-e403e625</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20October%2021st%2C%202025%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9664%2C%20(Mon%2C%20Oct%2020th)&amp;severity=medium&amp;id=68f6bec880866bef67247b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12001-cwe-20-improper-input-validation-in-96c4a1a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12001%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68f6b0519b180d42fd423cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-spreading-glassworm-malware-hits-openvsx-vs-c-e2d7523e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-spreading%20GlassWorm%20malware%20hits%20OpenVSX%2C%20VS%20Code%20registries&amp;severity=high&amp;id=68f6b0009b180d42fd4135c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-75000-watchguard-security-devices-vulnerable--83aaced6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2075%2C000%20WatchGuard%20security%20devices%20vulnerable%20to%20critical%20RCE&amp;severity=critical&amp;id=68f6b0009b180d42fd4135bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/retail-giant-muji-halts-online-sales-after-ransomw-01b7ae6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Retail%20giant%20Muji%20halts%20online%20sales%20after%20ransomware%20attack%20on%20supplier&amp;severity=high&amp;id=68f6b0009b180d42fd4135bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-new-exploited-bugs-land-in-cisas-catalog-orac-21b6af4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20New%20Exploited%20Bugs%20Land%20in%20CISA&apos;s%20Catalog%20%E2%80%94%20Oracle%20and%20Microsoft%20Among%20Targets&amp;severity=high&amp;id=68f6b0009b180d42fd4135c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coldriver-drops-fresh-malware-on-targets-64a9baad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ColdRiver%20Drops%20Fresh%20Malware%20on%20Targets&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11536-cwe-918-server-side-request-forgery-3b5b3872</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11536%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68f6ac1bd243d1f5a41c5f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/international-sting-takes-down-sim-box-criminal-ne-e5393b2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=International%20Sting%20Takes%20Down%20SIM%20Box%20Criminal%20Network&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-your-car-a-byod-risk-researchers-demonstrate-ho-7682e581</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20Your%20Car%20a%20BYOD%20Risk%3F%20Researchers%20Demonstrate%20How&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62658-cwe-89-improper-neutralization-of-s-38d5d7dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62658%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20WatchAnalytics%20extension&amp;severity=high&amp;id=68f69d3c82b5baa232a16e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62657-cwe-79-improper-neutralization-of-i-bc18b46d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62657%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20PageForms%20extension&amp;severity=medium&amp;id=68f69d3c82b5baa232a16e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62656-cwe-79-improper-neutralization-of-i-830d2cce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20GlobalBlocking%20extension&amp;severity=medium&amp;id=68f69d3c82b5baa232a16e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62528-cwe-79-improper-neutralization-of-i-347af122</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62528%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remram44%20taguette&amp;severity=medium&amp;id=68f697d682b5baa2329830c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62527-cwe-15-external-control-of-system-o-cc98c365</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62527%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20remram44%20taguette&amp;severity=high&amp;id=68f697d682b5baa2329830bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8052-cwe-564-sql-injection-in-opentext-fl-3bc75e7b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8052%3A%20CWE-564%20SQL%20Injection%20in%20opentext%20Flipper&amp;severity=low&amp;id=68f697d682b5baa2329830c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62522-cwe-22-improper-limitation-of-a-pat-3ad29971</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62522%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite&amp;severity=medium&amp;id=68f697d682b5baa2329830b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8048-cwe-73-external-control-of-file-name-4b617e1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8048%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20opentext%20Flipper&amp;severity=medium&amp;id=68f695d3769ba8ba7073f766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8049-cwe-1220-insufficient-granularity-of-3b464b87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8049%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20opentext%20Flipper&amp;severity=low&amp;id=68f695d3769ba8ba7073f769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8051-cwe-35-path-traversal-in-opentext-fl-2aff0d74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8051%3A%20CWE-35%20Path%20Traversal%20in%20opentext%20Flipper&amp;severity=medium&amp;id=68f695d3769ba8ba7073f76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8053-cwe-1220-insufficient-granularity-of-e419b317</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8053%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20opentext%20Flipper&amp;severity=low&amp;id=68f695d3769ba8ba7073f76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/better-auth-critical-account-takeover-via-unauthen-f2040d12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Better-Auth%20Critical%20Account%20Takeover%20via%20Unauthenticated%20API%20Key%20Creation%20(CVE-2025-61928)&amp;severity=critical&amp;id=68f6924d769ba8ba706d73cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62697-cwe-74-improper-neutralization-of-s-ba7e412f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62697%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20LanguageSelector%20Extension&amp;severity=high&amp;id=68f68e75ecfb41cc9f200fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-new-exploited-bugs-land-in-cisas-catalog-orac-0de9f951</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20New%20Exploited%20Bugs%20Land%20in%20CISA&apos;s%20Catalog%20%E2%80%94%20Oracle%20and%20Microsoft%20Among%20Targets&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/south-korea-seeks-to-arrest-dozens-of-online-scam--bdef40a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=South%20Korea%20Seeks%20to%20Arrest%20Dozens%20of%20Online%20Scam%20Suspects%20Repatriated%20From%20Cambodia&amp;severity=medium&amp;id=68f68726b7571ea2b185f823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5517-cwe-122-heap-based-buffer-overflow-i-0362fdc5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5517%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20ABB%20Terra%20AC%20wallbox%20(UL40%2F80A)&amp;severity=medium&amp;id=68f6838cb7571ea2b17f2afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flawed-vendor-guidance-exposes-enterprises-to-avoi-0bfd8040</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flawed%20Vendor%20Guidance%20Exposes%20Enterprises%20to%20Avoidable%20Risk&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62698-cwe-79-improper-neutralization-of-i-02542a06</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62698%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20ExternalGuidance&amp;severity=medium&amp;id=68f67c627bf8d449e91d409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62700-cwe-79-improper-neutralization-of-i-2ed8c981</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20MultiBoilerplate%20Extensionmaste&amp;severity=medium&amp;id=68f67a417bf8d449e919cf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47902-cwe-89-improper-neutralization-of-s-c9708ccf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47902%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microchip%20Time%20Provider%204100&amp;severity=high&amp;id=68f6785707c863f509432cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3465-cwe-22-improper-limitation-of-a-path-aeceba29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3465%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ABB%20CoreSense%E2%84%A2%20HM&amp;severity=high&amp;id=68f6785707c863f509432ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62693-cwe-79-improper-neutralization-of-i-a1eeae6f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20LastModified%20Extension&amp;severity=medium&amp;id=68f6785707c863f509432cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55086-cwe-1285-in-eclipse-foundation-next-dde775bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55086%3A%20CWE-1285%20in%20Eclipse%20Foundation%20NextX%20Duo&amp;severity=medium&amp;id=68f6785707c863f509432cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47901-cwe-78-improper-neutralization-of-s-7f1717fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47901%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Microchip%20Time%20Provider%204100&amp;severity=high&amp;id=68f6785707c863f509432cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11979-cwe-416-use-after-free-in-mongodb-i-c6e3e1e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11979%3A%20CWE-416%20Use%20After%20Free%20in%20MongoDB%20Inc.%20Server&amp;severity=medium&amp;id=68f6785707c863f509432cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47900-cwe-78-improper-neutralization-of-s-b457946a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47900%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Microchip%20Time%20Provider%204100&amp;severity=high&amp;id=68f6785707c863f509432cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62510-cwe-280-improper-handling-of-insuff-4c414aff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62510%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20error311%20FileRise&amp;severity=high&amp;id=68f674d107c863f5093c9144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62509-cwe-280-improper-handling-of-insuff-1a0dadee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62509%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20error311%20FileRise&amp;severity=high&amp;id=68f674d107c863f5093c913f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tunneling-wireguard-over-https-using-wstunnel-bdf53d9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tunneling%20WireGuard%20over%20HTTPS%20using%20Wstunnel&amp;severity=medium&amp;id=68f674d107c863f5093c916b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9574-cwe-306-missing-authentication-for-c-2fbe3678</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9574%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ABB%20ALS-mini-s4%20IP&amp;severity=critical&amp;id=68f66ab8b4f32a3742401d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6515-cwe-330-use-of-insufficiently-random-74d7342a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6515%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20oatpp%20oatpp-mcp&amp;severity=medium&amp;id=68f6617fd7e10ba5fa8c36f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62429-cwe-94-improper-control-of-generati-f8a5ba0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62429%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=68f6617fd7e10ba5fa8c36f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10678-cwe-1392-use-of-default-credentials-8231ef9e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10678%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20NetBird%20VPN%20NetBird&amp;severity=critical&amp;id=68f65a059f0e7cefe16a9d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-microchip-tech-protects-vehicles-from-laser-at-1ed9c4ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bombarding%20Cars%20With%20Lasers%3A%20Novel%20Auto%20Cyberattacks%20Emerge&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-view-on-a-recent-salt-typhoon-intrusion-5d49395c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20view%20on%20a%20recent%20Salt%20Typhoon%20intrusion&amp;severity=medium&amp;id=68f75555159af2a541b9f98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57738-cwe-653-improper-isolation-or-compa-27df8ae1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57738%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=high&amp;id=68f64d4e059c7cb96272a087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-propagating-glassworm-attacks-vs-code-supply--6d5edb16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Propagating%20GlassWorm%20Attacks%20VS%20Code%20Supply%20Chain&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8884-cwe-639-authorization-bypass-through-68b9802e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8884%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20VHS%20Electronic%20Software%20Ltd.%20Co.%20ACE%20Center&amp;severity=medium&amp;id=68f64b0d50505a0863bf2f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41390-cwe-829-inclusion-of-functionality--e0a7f915</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41390%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Truffle%20Security%20Co.%20TruffleHog&amp;severity=high&amp;id=68f64d4e059c7cb96272a08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11680-cwe-787-out-of-bounds-write-in-warm-f4e9afcf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11680%3A%20CWE-787%20Out-of-bounds%20Write%20in%20warmcat%20libwebsockets&amp;severity=medium&amp;id=68f6439468d8b0c0b432bc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11679-cwe-125-out-of-bounds-read-in-warmc-f0b24989</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11679%3A%20CWE-125%20Out-of-bounds%20Read%20in%20warmcat%20libwebsockets&amp;severity=medium&amp;id=68f6439468d8b0c0b432bc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11678-cwe-121-stack-based-buffer-overflow-13ece604</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11678%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20warmcat%20libwebsocket&amp;severity=high&amp;id=68f6402668d8b0c0b42c1773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysing-clickfix-3-reasons-why-copypaste-attacks-fee115d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysing%20ClickFix%3A%203%20Reasons%20Why%20Copy%2FPaste%20Attacks%20Are%20Driving%20Security%20Breaches&amp;severity=high&amp;id=68f6401268d8b0c0b42bc79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11677-cwe-416-use-after-free-in-warmcat-l-1c9a13bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11677%3A%20CWE-416%20Use%20After%20Free%20in%20warmcat%20libwebsockets&amp;severity=medium&amp;id=68f63e2c68d8b0c0b429afd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/20th-october-threat-intelligence-report-100cd357</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=20th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=critical&amp;id=68f638650ac38c6dbff6cdcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sim-farm-dismantled-in-europe-seven-arrested-bde49dc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIM%20Farm%20Dismantled%20in%20Europe%2C%20Seven%20Arrested&amp;severity=high&amp;id=68f63395f866bd7f70e5a581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-activity-drops-after-doxxing-baf8d7da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20Activity%20Drops%20After%20Doxxing&amp;severity=medium&amp;id=68f6300df866bd7f70dd4ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connectwise-patches-critical-flaw-in-automate-rmm--6903ecce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ConnectWise%20Patches%20Critical%20Flaw%20in%20Automate%20RMM%20Tool&amp;severity=critical&amp;id=68f62be673b0747ff349a7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-f5-breached-linux-rootkits-pixnapping-bbdcd3de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20F5%20Breached%2C%20Linux%20Rootkits%2C%20Pixnapping%20Attack%2C%20EtherHiding%20%26%20More&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-outage-crashes-amazon-primevideo-fortnite-perp-65e5852d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%20outage%20crashes%20Amazon%2C%20PrimeVideo%2C%20Fortnite%2C%20Perplexity%20and%20more&amp;severity=high&amp;id=68f62bf873b0747ff349aed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysing-clickfix-3-reasons-why-copypaste-attacks-4a9b0d53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysing%20ClickFix%3A%203%20Reasons%20Why%20Copy%2FPaste%20Attacks%20Are%20Driving%20Security%20Breaches&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/131-chrome-extensions-caught-hijacking-whatsapp-we-8b992db0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=131%20Chrome%20Extensions%20Caught%20Hijacking%20WhatsApp%20Web%20for%20Massive%20Spam%20Campaign&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-configure-privacy-and-security-in-chatgpt-k-b20c8132</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20configure%20privacy%20and%20security%20in%20ChatGPT%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68f60950ed66740820aaf350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8349-cwe-79-improper-neutralization-of-in-b3aead97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tawk%20Live%20Chat&amp;severity=medium&amp;id=68f6093ced66740820aae006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-dolby-decoder-can-allow-zero-clic-c5830828</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20Dolby%20Decoder%20Can%20Allow%20Zero-Click%20Attacks&amp;severity=low&amp;id=68f6059eed66740820a57c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nso-ordered-to-stop-hacking-whatsapp-but-damages-c-69ddc943</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NSO%20Ordered%20to%20Stop%20Hacking%20WhatsApp%2C%20but%20Damages%20Cut%20to%20%244%20Million&amp;severity=medium&amp;id=68f604eb256a77fc0567920a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/many-online-services-and-websites-affected-by-an-a-db8a312d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Many%20Online%20Services%20and%20Websites%20Affected%20by%20an%20AWS%20Outage%2C%20(Mon%2C%20Oct%2020th)&amp;severity=medium&amp;id=68f604ea256a77fc056791f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mss-claims-nsa-used-42-cyber-tools-in-multi-stage--2059d544</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MSS%20Claims%20NSA%20Used%2042%20Cyber%20Tools%20in%20Multi-Stage%20Attack%20on%20Beijing%20Time%20Systems&amp;severity=high&amp;id=68f5fd3c1a5d33d7b2f0373f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41028-cwe-89-improper-neutralization-of-s-e49230fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41028%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Grupo%20Castilla%20Epsilon%20RH&amp;severity=critical&amp;id=68f5fd4a1a5d33d7b2f03a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ottercandy-malware-used-by-waterplum-6705a1c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OtterCandy%2C%20malware%20used%20by%20WaterPlum&amp;severity=medium&amp;id=68f5f63a1a5d33d7b2e42ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57837-cwe-200-exposure-of-sensitive-infor-882febea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57837%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Honor%20FCP-AN10&amp;severity=low&amp;id=68f5f23f58c1f730f1d98293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57839-cwe-200-exposure-of-sensitive-infor-e838b3e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57839%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Honor%20MagicOS&amp;severity=medium&amp;id=68f5ee79ee3f99bfc7e1bfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57838-cwe-200-exposure-of-sensitive-infor-b3771347</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57838%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Honor%20MagicOS&amp;severity=medium&amp;id=68f5ee79ee3f99bfc7e1bfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31342-cwe-434-unrestricted-upload-of-file-4391e83b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31342%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Galaxy%20Software%20Services%20Corporation%20Vitals%20ESP&amp;severity=critical&amp;id=68f5ee79ee3f99bfc7e1bfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/american-airlines-subsidiary-envoy-air-hit-by-orac-40069e64</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=American%20Airlines%20Subsidiary%20Envoy%20Air%20Hit%20by%20Oracle%20Hack&amp;severity=medium&amp;id=68f5eae0ee3f99bfc7daf5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61932-improper-verification-of-source-of--8024309c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61932%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20MOTEX%20Inc.%20Lanscope%20Endpoint%20Manager%20(On-Premises)%20(Client%20program%20(MR)%20and%20Detection%20agent%20(DA))&amp;severity=critical&amp;id=68f5e704b3e3725554c349af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-syscall-for-obfuscationfileless-activity-mon-a695658b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20Syscall()%20for%20Obfuscation%2FFileless%20Activity%2C%20(Mon%2C%20Oct%2020th)&amp;severity=medium&amp;id=68f5d82f16b8590182261279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62577-incorrect-default-permissions-in-fs-7000f9c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62577%3A%20Incorrect%20default%20permissions%20in%20Fsas%20Technologies%20Inc.%20ETERNUS%20SF%20AdvancedCopy%20Manager%20Standard%20Edition%20(for%20Solaris%2010%2F%2011)&amp;severity=high&amp;id=68f5cd683fa25f9d08ba72fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mss-claims-nsa-used-42-cyber-tools-in-multi-stage--e06c9632</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MSS%20Claims%20NSA%20Used%2042%20Cyber%20Tools%20in%20Multi-Stage%20Attack%20on%20Beijing%20Time%20Systems&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11948-cwe-434-unrestricted-upload-of-file-efde2151</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11948%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Excellent%20Infotek%20Document%20Management%20System&amp;severity=critical&amp;id=68f5b12c4f503908ae911c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-accuses-us-of-cyberattack-on-national-time-c-51cb577f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Accuses%20US%20of%20Cyberattack%20on%20National%20Time%20Center&amp;severity=medium&amp;id=68f58a7e4f503908ae796fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-20-d36baf7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-20&amp;severity=medium&amp;id=68f6cea1b870ea37e284378d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54764-na-ad689708</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54764%3A%20n%2Fa&amp;severity=medium&amp;id=68f6a8a4d243d1f5a415cf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61303-na-e4f67c7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61303%3A%20n%2Fa&amp;severity=critical&amp;id=68f6a14fe073070bd6ef9959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61301-na-4dbdf6b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61301%3A%20n%2Fa&amp;severity=high&amp;id=68f6a14fe073070bd6ef9954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60781-na-f265f054</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60781%3A%20n%2Fa&amp;severity=medium&amp;id=68f69f66e073070bd6ed126c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60783-na-31845747</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60783%3A%20n%2Fa&amp;severity=medium&amp;id=68f69d3c82b5baa232a16e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61488-na-eda8f875</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61488%3A%20n%2Fa&amp;severity=high&amp;id=68f67fa87bf8d449e923053c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48025-na-0b0f0c1d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48025%3A%20n%2Fa&amp;severity=medium&amp;id=68f65c0bd7e10ba5fa83242c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60856-na-99f6c6cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60856%3A%20n%2Fa&amp;severity=medium&amp;id=68f65c0bd7e10ba5fa832428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55568-na-8657cbd1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55568%3A%20n%2Fa&amp;severity=high&amp;id=68f65a059f0e7cefe16a9d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26782-na-9e045923</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26782%3A%20n%2Fa&amp;severity=high&amp;id=68f656869f0e7cefe163cf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26781-na-0f23c91e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26781%3A%20n%2Fa&amp;severity=high&amp;id=68f656869f0e7cefe163cf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61417-na-58b3f4c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61417%3A%20n%2Fa&amp;severity=high&amp;id=68f652b7059c7cb9627c07ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54957-na-539cd8e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54957%3A%20n%2Fa&amp;severity=critical&amp;id=68f64f36059c7cb96275288e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61456-na-357e2d5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61456%3A%20n%2Fa&amp;severity=medium&amp;id=68f64d4e059c7cb96272a08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61455-na-d372975c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61455%3A%20n%2Fa&amp;severity=critical&amp;id=68f63bd90ac38c6dbffe0b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61454-na-9005b0c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61454%3A%20n%2Fa&amp;severity=medium&amp;id=68f634eb0ac38c6dbff2af93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56223-na-fdf80d5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56223%3A%20n%2Fa&amp;severity=high&amp;id=68f634eb0ac38c6dbff2af8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56224-na-d97f3959</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56224%3A%20n%2Fa&amp;severity=high&amp;id=68f633a7f866bd7f70e5a6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56219-na-ec567ddf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56219%3A%20n%2Fa&amp;severity=high&amp;id=68f633a7f866bd7f70e5a6af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experian-fined-32-million-for-mass-collecting-pers-0cd8e478</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experian%20fined%20%243.2%20million%20for%20mass-collecting%20personal%20data&amp;severity=high&amp;id=68f57b63de6e321f23070d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11947-heap-based-buffer-overflow-in-bftpd-04c2b5a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11947%3A%20Heap-based%20Buffer%20Overflow%20in%20bftpd&amp;severity=low&amp;id=68f561fd0acf3516df87a330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11946-cross-site-scripting-in-logicaldoc--6cea66c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11946%3A%20Cross%20Site%20Scripting%20in%20LogicalDOC%20Community%20Edition&amp;severity=medium&amp;id=68f55abbd03e41f5d7ce2284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11945-cross-site-scripting-in-toeverythin-fd53f05a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11945%3A%20Cross%20Site%20Scripting%20in%20toeverything%20AFFiNE&amp;severity=medium&amp;id=68f556d8283c10e6bde4a71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11944-sql-injection-in-givanz-vvveb-6d219942</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11944%3A%20SQL%20Injection%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68f5484344f1d399063009ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11943-use-of-default-credentials-in-70mai-57cab3c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11943%3A%20Use%20of%20Default%20Credentials%20in%2070mai%20X200&amp;severity=medium&amp;id=68f540b8b572bcaa2b43c10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11942-missing-authentication-in-70mai-x20-317172c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11942%3A%20Missing%20Authentication%20in%2070mai%20X200&amp;severity=medium&amp;id=68f50e6f33dbe6918a21d6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-data-breach-what-happened-and-how-it-impacts-yo-8c427a49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Data%20Breach%3A%20What%20Happened%20and%20How%20It%20Impacts%20You&amp;severity=critical&amp;id=68f505665c78ab3001fe5759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11941-path-traversal-in-e107-cms-eeec1d2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11941%3A%20Path%20Traversal%20in%20e107%20CMS&amp;severity=medium&amp;id=68f506f75c78ab30010130f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defenderwrite-abusing-whitelisted-programs-for-arb-9420ecc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DefenderWrite%3A%20Abusing%20Whitelisted%20Programs%20for%20Arbitrary%20Writes%20into%20Antivirus&apos;s%20Operating%20Folder&amp;severity=medium&amp;id=68f4eda1fcc669043b4f9bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11940-uncontrolled-search-path-in-librewo-7cc9289e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11940%3A%20Uncontrolled%20Search%20Path%20in%20LibreWolf&amp;severity=high&amp;id=68f4a3e9a1caf49d9dcb28ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11939-path-traversal-in-churchcrm-2d917641</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11939%3A%20Path%20Traversal%20in%20ChurchCRM&amp;severity=medium&amp;id=68f49c99a2d65d4c729ee8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11938-deserialization-in-churchcrm-edbd9490</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11938%3A%20Deserialization%20in%20ChurchCRM&amp;severity=medium&amp;id=68f4954ddd9718ca70979f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-dismantles-sim-farm-network-powering-49-mi-024a7e76</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europol%20Dismantles%20SIM%20Farm%20Network%20Powering%2049%20Million%20Fake%20Accounts%20Worldwide&amp;severity=medium&amp;id=68f591024f503908ae7cd144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hardbit-40-investigation-by-reyben-cortes-41984652</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HardBit%204.0%20Investigation%20by%20Reyben%20Cortes&amp;severity=medium&amp;id=68facdcb00e9e97283af56c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-19-d3fc21df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-19&amp;severity=medium&amp;id=68f57f34424fb841ffc0f36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62672-na-a500cfe1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62672%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20boyns%20rplay&amp;severity=medium&amp;id=68f43dd577122960c164e2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-airport-chaos-to-cyber-intrigue-everest-gang--71029c3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Airport%20chaos%20to%20cyber%20intrigue%3A%20Everest%20Gang%20takes%20credit%20for%20Collins%20Aerospace%20breach%20-%20Security%20Affairs&amp;severity=high&amp;id=68f403d7099f60e0b7fe466b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/winos-40-hackers-expand-to-japan-and-malaysia-with-d58136a4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Winos%204.0%20hackers%20expand%20to%20Japan%20and%20Malaysia%20with%20new%20malware&amp;severity=medium&amp;id=68f403d7099f60e0b7fe466f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notice-google-gemini-ais-undisclosed-911-auto-dial-93405d38</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notice%3A%20Google%20Gemini%20AI&apos;s%20Undisclosed%20911%20Auto-Dial%20Bypass%20%E2%80%93%20Logs%20and%20Evidence%20Available&amp;severity=critical&amp;id=68f3cc8e9bcc951554e2d6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47410-cwe-352-cross-site-request-forgery--058a3311</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Geode&amp;severity=high&amp;id=68f3b0a2a1588a753f9e7244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-net-capi-backdoor-targets-russian-auto-and-e-c-14dece74</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20.NET%20CAPI%20Backdoor%20Targets%20Russian%20Auto%20and%20E-Commerce%20Firms%20via%20Phishing%20ZIPs&amp;severity=high&amp;id=68f39f94cbcef15488c39fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/american-airlines-subsidiary-envoy-confirms-oracle-501bab35</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=American%20Airlines%20subsidiary%20Envoy%20confirms%20Oracle%20data%20theft%20attack&amp;severity=high&amp;id=68f370bf9828099f3096efa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connectwise-fixes-automate-bug-allowing-aitm-updat-85668075</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ConnectWise%20fixes%20Automate%20bug%20allowing%20AiTM%20update%20attacks&amp;severity=high&amp;id=68f370bf9828099f3096efa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-expands-winos-40-attacks-to-japan-and-m-b27e1677</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Expands%20Winos%204.0%20Attacks%20to%20Japan%20and%20Malaysia%20via%20HoldingHands%20RAT&amp;severity=high&amp;id=68f370bf9828099f3096efaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11926-cwe-79-improper-neutralization-of-i-45c4b447</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11926%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdreams%20Related%20Posts%20Lite&amp;severity=medium&amp;id=68f361e78febb5b10781da79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9890-cwe-352-cross-site-request-forgery-c-55937c52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9890%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mndpsingh287%20Theme%20Editor&amp;severity=high&amp;id=68f352f16320622d3355204a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5555-stack-based-buffer-overflow-in-nixdo-1a9e9be3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5555%3A%20Stack-based%20Buffer%20Overflow%20in%20Nixdorf%20Wincor%20PORT%20IO%20Driver&amp;severity=high&amp;id=68f34ba09cdc1302af5780fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10750-cwe-200-exposure-of-sensitive-infor-bb3d3f9f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10750%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cyberlord92%20PowerBI%20Embed%20Reports&amp;severity=medium&amp;id=68f3445827133b8ceda05e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11256-cwe-285-improper-authorization-in-k-3c49a6a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11256%3A%20CWE-285%20Improper%20Authorization%20in%20kognetiks%20Kognetiks%20Chatbot%20for%20WordPress&amp;severity=medium&amp;id=68f3445827133b8ceda05e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-expands-winos-40-attacks-to-japan-and-m-b014396f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Expands%20Winos%204.0%20Attacks%20to%20Japan%20and%20Malaysia%20via%20HoldingHands%20RAT&amp;severity=medium&amp;id=68f43e5777122960c1652c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11691-cwe-89-improper-neutralization-of-s-3ab6f026</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11691%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeisle%20PPOM%20%E2%80%93%20Product%20Addons%20%26%20Custom%20Fields%20for%20WooCommerce&amp;severity=high&amp;id=68f33944197c8629076f80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11372-cwe-862-missing-authorization-in-th-95d639c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11372%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=68f33944197c8629076f80c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11391-cwe-434-unrestricted-upload-of-file-2c60773c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11391%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeisle%20PPOM%20%E2%80%93%20Product%20Addons%20%26%20Custom%20Fields%20for%20WooCommerce&amp;severity=critical&amp;id=68f33944197c8629076f80ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11270-cwe-79-improper-neutralization-of-i-c4e4a0cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11270%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=68f33944197c8629076f80c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11519-cwe-639-authorization-bypass-throug-ba40b26c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11519%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20in%20Real%20Time&amp;severity=medium&amp;id=68f33944197c8629076f80db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11510-cwe-285-improper-authorization-in-n-e890a4e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11510%3A%20CWE-285%20Improper%20Authorization%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=68f33944197c8629076f80d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9562-cwe-79-improper-neutralization-of-in-1d40aebd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9562%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=medium&amp;id=68f33945197c8629076fa118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11703-cwe-349-acceptance-of-extraneous-un-01a25b47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11703%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=68f33944197c8629076f80e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10006-cwe-79-improper-neutralization-of-i-05f7f7ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10006%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=68f33944197c8629076f80b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10187-cwe-89-improper-neutralization-of-s-597c2a5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10187%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20creative-solutions-1%20GSpeech%20TTS%20%E2%80%93%20WordPress%20Text%20To%20Speech%20Plugin&amp;severity=medium&amp;id=68f33944197c8629076f80bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11741-cwe-639-authorization-bypass-throug-ba1864c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11741%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpclever%20WPC%20Smart%20Quick%20View%20for%20WooCommerce&amp;severity=medium&amp;id=68f33945197c8629076fa114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11517-cwe-639-authorization-bypass-throug-078b8190</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11517%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20stellarwp%20Event%20Tickets%20and%20Registration&amp;severity=high&amp;id=68f33944197c8629076f80d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11742-cwe-862-missing-authorization-in-wp-f735f0ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11742%3A%20CWE-862%20Missing%20Authorization%20in%20wpclever%20WPC%20Smart%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=68f32a83bd206a5487a89662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11857-cwe-79-improper-neutralization-of-i-40f03655</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11857%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mxp%20XX2WP%20Integration%20Tools&amp;severity=medium&amp;id=68f32a83bd206a5487a89666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11738-cwe-73-external-control-of-file-nam-7bd2b601</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11738%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=68f32a83bd206a5487a8965d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11937-cwe-79-improper-neutralization-of-i-4547ad51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20SecurePoll%20Extension&amp;severity=medium&amp;id=68f3288dbd206a5487a3223a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62666-cwe-770-allocation-of-resources-wit-5a044c36</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62666%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CirrusSearch%20Extension&amp;severity=medium&amp;id=68f31f48eba81d1dad81143c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62667-cwe-79-improper-neutralization-of-i-9b892851</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=medium&amp;id=68f31f48eba81d1dad811440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62668-cwe-276-incorrect-default-permissio-fd526937</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62668%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=medium&amp;id=68f31bbeeba81d1dad79f298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62669-cwe-200-exposure-of-sensitive-infor-55efe4b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62669%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CentralAuth%20Extension&amp;severity=medium&amp;id=68f31bbeeba81d1dad79f29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62670-cwe-79-improper-neutralization-of-i-6ed0ddc8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20FlexDiagrams%20Extension&amp;severity=medium&amp;id=68f319cceba81d1dad76b569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11361-cwe-918-server-side-request-forgery-b8f2d118</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11361%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=68f319cceba81d1dad76b565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62671-cwe-79-improper-neutralization-of-i-dbbd73e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=68f319cceba81d1dad76b56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62662-cwe-79-improper-neutralization-of-i-de3cfa0b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20AdvancedSearch%20Extension&amp;severity=medium&amp;id=68f317da8ff74c446c8a11eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62663-cwe-79-improper-neutralization-of-i-af2537f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20UploadWizard%20Extension&amp;severity=medium&amp;id=68f317da8ff74c446c8a11ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62664-cwe-79-improper-neutralization-of-i-b54d33d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20ImageRating%20Extension&amp;severity=medium&amp;id=68f317da8ff74c446c8a11f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62665-cwe-79-improper-neutralization-of-i-f66e9e58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Skin%3ABlueSky&amp;severity=medium&amp;id=68f314568ff74c446c82ccd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11378-cwe-862-missing-authorization-in-sh-6762cb4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11378%3A%20CWE-862%20Missing%20Authorization%20in%20shortpixel%20ShortPixel%20Image%20Optimizer%20%E2%80%93%20Optimize%20Images%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=68f30d8cba51437ed4aaca68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-18-9190835c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-18&amp;severity=medium&amp;id=68f42bc1512992bed08622fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62655-cwe-89-improper-neutralization-of-s-ce74ba60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62655%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20Cargo%20extension&amp;severity=low&amp;id=68f2cadb9c34d0947f492883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62654-cwe-79-improper-neutralization-of-i-fa1f3570</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62654%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20QuizGame%20extension&amp;severity=low&amp;id=68f2c7559c34d0947f4887e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62653-cwe-79-improper-neutralization-of-i-5a41e0e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62653%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20PollNY%20extension&amp;severity=low&amp;id=68f30b9cba51437ed4a824e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62652-cwe-79-improper-neutralization-of-i-9540b2a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20WebAuthn%20extension&amp;severity=medium&amp;id=68f2c3d09c34d0947f47e1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62515-cwe-502-deserialization-of-untruste-91ef1bfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62515%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20marsupialtail%20quokka&amp;severity=critical&amp;id=68f2ab359c34d0947f42a464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11914-path-traversal-in-shenzhen-ruiming--5184be78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11914%3A%20Path%20Traversal%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f2ab359c34d0947f42a45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62508-cwe-79-improper-neutralization-of-i-234e0f70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62508%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=68f2aebd9c34d0947f437b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixes-highest-severity-aspnet-core-flaw--8086a971</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20fixes%20highest-severity%20ASP.NET%20Core%20flaw%20ever&amp;severity=high&amp;id=68f2a7ae9c34d0947f41ca5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-dismantles-sim-box-operation-renting-numbe-fd267a13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europol%20dismantles%20SIM%20box%20operation%20renting%20numbers%20for%20cybercrime&amp;severity=high&amp;id=68f2a7ae9c34d0947f41ca5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11913-path-traversal-in-shenzhen-ruiming--b07303b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11913%3A%20Path%20Traversal%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f2a4339c34d0947f40c74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11912-sql-injection-in-shenzhen-ruiming-t-5612c2aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11912%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f2a4339c34d0947f40c744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11925-cwe-754-improper-check-for-unusual--a7ed82d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11925%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68f2a0a79c34d0947f3fb6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62511-cwe-367-time-of-check-time-of-use-t-c0bf1169</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62511%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20zheny-creator%20YtGrabber-TUI&amp;severity=medium&amp;id=68f2a0a79c34d0947f3fb6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11911-sql-injection-in-shenzhen-ruiming-t-a90f5c5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11911%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f29d239c34d0947f3eff5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11910-sql-injection-in-shenzhen-ruiming-t-fe6044ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11910%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f29d239c34d0947f3eff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34282-cwe-918-server-side-request-forgery-82d72a6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34282%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThingsBoard%2C%20Inc.%20ThingsBoard&amp;severity=medium&amp;id=68f28f159c34d0947f3bb428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34281-cwe-79-improper-neutralization-of-i-c8b0980b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34281%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ThingsBoard%2C%20Inc.%20ThingsBoard&amp;severity=medium&amp;id=68f28f159c34d0947f3bb423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11909-sql-injection-in-shenzhen-ruiming-t-4d6d812d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11909%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f28f159c34d0947f3bb41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11908-unrestricted-upload-in-shenzhen-rui-7cb292b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11908%3A%20Unrestricted%20Upload%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f28f159c34d0947f3bb416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62505-cwe-918-server-side-request-forgery-0755ce4e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62505%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lobehub%20lobe-chat&amp;severity=low&amp;id=68f28b909c34d0947f3b1473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-malware-and-attack-expansion-a-hacker-gro-00b433af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20Malware%20and%20Attack%20Expansion%3A%20A%20Hacker%20Group&apos;s%20Journey%20across%20Asia&amp;severity=medium&amp;id=68f5f5be58c1f730f1e065df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-disrupts-ransomware-campaign-abusing-azu-068b694c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Disrupts%20Ransomware%20Campaign%20Abusing%20Azure%20Certificates&amp;severity=medium&amp;id=68f43f2a77122960c1656a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62430-cwe-79-improper-neutralization-of-i-f8b4237d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62430%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=68f284899c34d0947f39a008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62424-cwe-22-improper-limitation-of-a-pat-31aeb83b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62424%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=68f27d809c34d0947f370a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-agent-security-whose-responsibility-is-it-0c7fc083</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Agent%20Security%3A%20Whose%20Responsibility%20Is%20It%3F&amp;severity=medium&amp;id=68f43f2a77122960c1656a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiktok-videos-promoting-malware-installation-fri-o-c915aba1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TikTok%20Videos%20Promoting%20Malware%20Installation%2C%20(Fri%2C%20Oct%2017th)&amp;severity=low&amp;id=68f1f4589c34d0947f07f3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-russia-china-increasingly-using-ai-to-es-e188af61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%3A%20Russia%2C%20China%20Increasingly%20Using%20AI%20to%20Escalate%20Cyberattacks%20on%20the%20US&amp;severity=medium&amp;id=68f26f669c34d0947f3317a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62168-cwe-209-generation-of-error-message-87fa303f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62168%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20squid-cache%20squid&amp;severity=critical&amp;id=68f26f829c34d0947f331b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8414-cwe-20-improper-input-validation-in--77d2d526</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8414%3A%20CWE-20%20Improper%20Input%20Validation%20in%20silabs.com%20Simplicity%20SDK&amp;severity=critical&amp;id=68f26bed9c34d0947f3176bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/capi-backdoor-net-stealer-targeting-russian-auto-c-459ca4e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CAPI%20Backdoor%3A%20.NET%20Stealer%20Targeting%20Russian%20Auto-Commerce&amp;severity=medium&amp;id=68f268639c34d0947f2fb2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58747-cwe-79-improper-neutralization-of-i-732f4fea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58747%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=low&amp;id=68f268709c34d0947f2fc04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-chat-data-is-historys-most-thorough-record-of-e-60d469af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Chat%20Data%20Is%20History&apos;s%20Most%20Thorough%20Record%20of%20Enterprise%20Secrets.%20Secure%20It%20Wisely&amp;severity=medium&amp;id=68f43f2a77122960c1656a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62356-cwe-22-improper-limitation-of-a-pat-3d1f9415</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62356%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Qodo%20Qodo%20Gen&amp;severity=high&amp;id=68f264e59c34d0947f2e3de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11905-code-injection-in-yanyutao0402-chan-78b75398</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11905%3A%20Code%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f264e59c34d0947f2e3de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/email-bombs-exploit-lax-authentication-in-zendesk-691b5add</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Email%20Bombs%20Exploit%20Lax%20Authentication%20in%20Zendesk&amp;severity=high&amp;id=68f2615f9c34d0947f2ce6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11904-sql-injection-in-yanyutao0402-chanc-9b55c7e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11904%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f25ddf9c34d0947f2bbef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55085-cwe-125-out-of-bounds-read-in-eclip-133baa34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55085%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=high&amp;id=68f256d89c34d0947f29326a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48087-cwe-79-improper-neutralization-of-i-9e6124f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jason%20C.%20Memberlite%20Shortcodes&amp;severity=medium&amp;id=68f253519c34d0947f285c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11903-sql-injection-in-yanyutao0402-chanc-fc7d450f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11903%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f24fd29c34d0947f2503e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11902-sql-injection-in-yanyutao0402-chanc-94adf364</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11902%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f24fd29c34d0947f2503d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48044-cwe-863-incorrect-authorization-in--c0eb71bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48044%3A%20CWE-863%20Incorrect%20Authorization%20in%20ash-project%20ash&amp;severity=high&amp;id=68f24c4a9c34d0947f23ccc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-crowdstrike-vulnerabilities-cisa-lay-125ab212</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20CrowdStrike%20Vulnerabilities%2C%20CISA%20Layoffs%2C%20Mango%20Data%20Breach&amp;severity=medium&amp;id=68f248bc9c34d0947f22e051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-combine-beavertail-and-otterc-a7507f78</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Combine%20BeaverTail%20and%20OtterCookie%20into%20Advanced%20JS%20Malware&amp;severity=medium&amp;id=68f43e5777122960c1652c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-links-why-your-website-traffic-is-declining-f6cc87f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20links%3A%20why%20your%20website%20traffic%20is%20declining&amp;severity=medium&amp;id=68f268639c34d0947f2fb2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-package-with-adaptixc2-framework-agent-f-1419d77f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20package%20with%20AdaptixC2%20framework%20agent%20found%20in%20npm%20registry&amp;severity=medium&amp;id=68f268639c34d0947f2fb372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/links-to-porn-and-online-casinos-hidden-inside-cor-d8f2847a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Links%20to%20porn%20and%20online%20casinos%20hidden%20inside%20corporate%20websites&amp;severity=medium&amp;id=68f2293b9c34d0947f196f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-sensitive-data-from-auction-house-so-9f38a086</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Steal%20Sensitive%20Data%20From%20Auction%20House%20Sotheby%E2%80%99s&amp;severity=medium&amp;id=68f229159c34d0947f196c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-perplexity-comet-browser-download-ads-pu-1dfe242f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Perplexity%20Comet%20Browser%20Download%20Ads%20Push%20Password%20Stealer%20Via%20Google%20Search&amp;severity=medium&amp;id=68f2259b9c34d0947f17c982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28815-vulnerability-in-hikvision-isecure--e6054b77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28815%3A%20Vulnerability%20in%20Hikvision%20iSecure%20Center&amp;severity=critical&amp;id=68f30b9cba51437ed4a824e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28814-vulnerability-in-hikvision-isecure--c7ca8c98</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28814%3A%20Vulnerability%20in%20Hikvision%20iSecure%20Center&amp;severity=critical&amp;id=68f225aa9c34d0947f17ca54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/identity-security-your-first-and-last-line-of-defe-5497e0f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Identity%20Security%3A%20Your%20First%20and%20Last%20Line%20of%20Defense&amp;severity=medium&amp;id=68f43e5777122960c1652c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/powerschool-hacker-got-four-years-in-prison-a3f28143</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PowerSchool%20hacker%20got%20four%20years%20in%20prison&amp;severity=medium&amp;id=68f222299c34d0947f168b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-watchguard-vpn-bug-that-could--71bc42b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20WatchGuard%20VPN%20Bug%20That%20Could%20Let%20Attackers%20Take%20Over%20Devices&amp;severity=high&amp;id=68f222299c34d0947f168b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/highest-ever-severity-score-assigned-by-microsoft--6b2f16c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Highest%20Ever%E2%80%99%20Severity%20Score%20Assigned%20by%20Microsoft%20to%20ASP.NET%20Core%20Vulnerability&amp;severity=high&amp;id=68f2220d9c34d0947f168903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11895-cwe-639-authorization-bypass-throug-1b08bc2c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11895%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20letscms%20Binary%20MLM%20Plan&amp;severity=medium&amp;id=68f210859c34d0947f1033d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-watchguard-vpn-bug-that-could--9bfb583e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20WatchGuard%20VPN%20Bug%20That%20Could%20Let%20Attackers%20Take%20Over%20Devices&amp;severity=critical&amp;id=68f43e5777122960c1652c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-brief-nation-state-actor-steals-f5-source-c-a454f9e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Brief%3A%20Nation-State%20Actor%20Steals%20F5%20Source%20Code%20and%20Undisclosed%20Vulnerabilities&amp;severity=medium&amp;id=68f20cfe9c34d0947f0f3de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auction-giant-sothebys-says-data-breach-exposed-fi-1b9f42c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auction%20giant%20Sotheby%E2%80%99s%20says%20data%20breach%20exposed%20financial%20information&amp;severity=high&amp;id=68f20cfe9c34d0947f0f3dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-revokes-200-fraudulent-certificates-used-6335f99b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Revokes%20200%20Fraudulent%20Certificates%20Used%20in%20Rhysida%20Ransomware%20Campaign&amp;severity=high&amp;id=68f209799c34d0947f0e6bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prosper-data-breach-impacts-176-million-accounts-a7e3f7f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prosper%20Data%20Breach%20Impacts%2017.6%20Million%20Accounts&amp;severity=medium&amp;id=68f2026a9c34d0947f0ce078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-allow-disruption-of-phoenix-contac-8b2315d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Allow%20Disruption%20of%20Phoenix%20Contact%20UPS%20Devices&amp;severity=low&amp;id=68f1fee59c34d0947f0b8972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gladinet-patches-exploited-centrestack-vulnerabili-581515c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gladinet%20Patches%20Exploited%20CentreStack%20Vulnerability&amp;severity=low&amp;id=68f1f7e39c34d0947f094cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-reversed-amazons-kindle-web-obfuscation-beca-d4992c5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20I%20Reversed%20Amazon&apos;s%20Kindle%20Web%20Obfuscation%20Because%20Their%20App%20Sucked&amp;severity=medium&amp;id=68f1ed649c34d0947f04cbd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55087-cwe-1285-improper-validation-of-spe-169a084d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55087%3A%20CWE-1285%3A%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Eclipse%20Foundation%20NextX%20Duo&amp;severity=medium&amp;id=68f1df4d9c34d0947ffd557a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-revokes-200-fraudulent-certificates-used-e670ded8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Revokes%20200%20Fraudulent%20Certificates%20Used%20in%20Rhysida%20Ransomware%20Campaign&amp;severity=medium&amp;id=68f43e5777122960c1652c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55100-cwe-125-out-of-bounds-read-in-eclip-3e5dda77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55100%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55099-cwe-125-out-of-bounds-read-in-eclip-a93ade97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55099%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55098-cwe-125-out-of-bounds-read-in-eclip-263a5a9c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55098%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55097-cwe-125-out-of-bounds-read-in-eclip-17b5b763</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55097%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55096-cwe-191-integer-underflow-wrap-or-w-198a2eb6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55096%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=low&amp;id=68f1d5f59c34d0947ffa1173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55094-cwe-125-out-of-bounds-read-in-eclip-c2a9d29e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55094%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f1d5f59c34d0947ffa1170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55093-cwe-126-buffer-over-read-in-eclipse-6b42688e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55093%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f1d13d9c34d0947ff86bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55092-cwe-125-out-of-bounds-read-in-eclip-db4e29df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55092%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f1d13d9c34d0947ff86bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11849-directory-traversal-in-mammoth-101efb9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11849%3A%20Directory%20Traversal%20in%20mammoth&amp;severity=medium&amp;id=68f1d13d9c34d0947ff86bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11900-cwe-78-improper-neutralization-of-s-acbc1deb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11900%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20HGiga%20iSherlock%204.5&amp;severity=critical&amp;id=68f1bf5fc417520e4ddfcc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11899-cwe-321-use-of-hard-coded-cryptogra-8545e765</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11899%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Flowring%20Technology%20Agentflow&amp;severity=critical&amp;id=68f1bf5fc417520e4ddfcc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11898-cwe-23-relative-path-traversal-in-f-55a39568</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11898%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Flowring%20Technology%20Agentflow&amp;severity=high&amp;id=68f1bf5fc417520e4ddfcbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6950-cwe-798-use-of-hard-coded-credential-0e6643cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6950%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Moxa%20EDR-G9010%20Series&amp;severity=critical&amp;id=68f1b8039f8a5dbaea8c0706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6949-cwe-250-execution-with-unnecessary-p-a99a72ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6949%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20EDR-G9010%20Series&amp;severity=critical&amp;id=68f1b8039f8a5dbaea8c0703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6894-cwe-250-execution-with-unnecessary-p-36bf7976</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6894%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20EDR-G9010%20Series&amp;severity=medium&amp;id=68f1ba682c5d344c54e5d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6893-cwe-250-execution-with-unnecessary-p-cd75690d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6893%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20EDR-G9010%20Series&amp;severity=critical&amp;id=68f1ba682c5d344c54e5d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6892-cwe-863-incorrect-authorization-in-m-1b7367be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6892%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Moxa%20EDR-G9010%20Series&amp;severity=high&amp;id=68f1ba682c5d344c54e5d94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-17-ae57d6b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-17&amp;severity=medium&amp;id=68f2dc5c9c34d0947f4c6772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62645-cwe-266-incorrect-privilege-assignm-f73d8c8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62645%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=critical&amp;id=68f2aebd9c34d0947f437b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62644-cwe-359-exposure-of-private-persona-4ae35cea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62644%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2aebd9c34d0947f437b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62643-cwe-319-cleartext-transmission-of-s-b6270560</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62643%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=low&amp;id=68f2aebd9c34d0947f437b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62646-cwe-669-incorrect-resource-transfer-eb780049</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62646%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62649-cwe-603-use-of-client-side-authenti-796ca3f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62649%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62648-cwe-863-incorrect-authorization-in--d5cb6046</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62648%3A%20CWE-863%20Incorrect%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62647-cwe-863-incorrect-authorization-in--c1266568</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62647%3A%20CWE-863%20Incorrect%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62642-cwe-862-missing-authorization-in-re-30946901</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62642%3A%20CWE-862%20Missing%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62651-cwe-863-incorrect-authorization-in--290004b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62651%3A%20CWE-863%20Incorrect%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62650-cwe-603-use-of-client-side-authenti-7dd89d61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62650%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=high&amp;id=68f2ab359c34d0947f42a44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56221-na-8241ab30</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56221%3A%20n%2Fa&amp;severity=critical&amp;id=68f28f159c34d0947f3bb42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31573-na-6bbe4db4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31573%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20XMLUnit%20XMLUnit%20for%20Java&amp;severity=medium&amp;id=68f28f159c34d0947f3bb40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56320-na-b4b10bb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56320%3A%20n%2Fa&amp;severity=medium&amp;id=68f28b909c34d0947f3b146e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56316-na-a3a35313</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56316%3A%20n%2Fa&amp;severity=critical&amp;id=68f28b909c34d0947f3b146a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56218-na-76fab4a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56218%3A%20n%2Fa&amp;severity=critical&amp;id=68f28b909c34d0947f3b1465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60514-na-40fa0634</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60514%3A%20n%2Fa&amp;severity=medium&amp;id=68f2880c9c34d0947f3a7c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57164-na-2f018d06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57164%3A%20n%2Fa&amp;severity=medium&amp;id=68f284899c34d0947f39a003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60279-na-e20ffaff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60279%3A%20n%2Fa&amp;severity=critical&amp;id=68f2616f9c34d0947f2ce859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57567-na-0b493e53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57567%3A%20n%2Fa&amp;severity=critical&amp;id=68f2616f9c34d0947f2ce851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60361-na-ee4d8eca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60361%3A%20n%2Fa&amp;severity=low&amp;id=68f256d89c34d0947f29326d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60360-na-134777a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60360%3A%20n%2Fa&amp;severity=medium&amp;id=68f24fd29c34d0947f2503ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60359-na-e55dc443</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60359%3A%20n%2Fa&amp;severity=medium&amp;id=68f24fd29c34d0947f2503e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attacks-and-how-victims-respond-209d3c5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20attacks%20and%20how%20victims%20respond&amp;severity=medium&amp;id=68f1e9dc9c34d0947f026e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62504-cwe-416-use-after-free-in-envoyprox-c14c0eae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62504%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=68f1639f9f8a5dbaea0c0fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11864-server-side-request-forgery-in-nucl-d71cf618</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11864%3A%20Server-Side%20Request%20Forgery%20in%20NucleoidAI%20Nucleoid&amp;severity=medium&amp;id=68f160199f8a5dbaea0a238f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattackers-target-lastpass-top-password-manage-b799d77d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattackers%20Target%20LastPass%2C%20Top%20Password%20Managers&amp;severity=medium&amp;id=68f1d64d9c34d0947ffa2453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-cisco-snmp-flaw-to-deploy-rootkit--f4740f32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%20Cisco%20SNMP%20flaw%20to%20deploy%20rootkit%20on%20switches&amp;severity=high&amp;id=68f1558c9f8a5dbaea04a4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42192-cwe-522-insufficiently-protected-cr-f3fb1c60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42192%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20HCL%20Software%20Traveler%20for%20Microsoft%20Outlook&amp;severity=medium&amp;id=68f159139f8a5dbaea066b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leaks-in-microsoft-vs-code-marketplace-put-supply--49a36ffc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leaks%20in%20Microsoft%20VS%20Code%20Marketplace%20Put%20Supply%20Chain%20at%20Risk&amp;severity=medium&amp;id=68f1d64d9c34d0947ffa2456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11853-improper-access-controls-in-sismics-5c4175e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11853%3A%20Improper%20Access%20Controls%20in%20Sismics%20Teedy&amp;severity=medium&amp;id=68f143fc9f8a5dbaeaf964be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11852-missing-authentication-in-apeman-id-9979efc3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11852%3A%20Missing%20Authentication%20in%20Apeman%20ID71&amp;severity=medium&amp;id=68f143fc9f8a5dbaeaf964b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11493-cwe-494-download-of-code-without-in-d5861a74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11493%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ConnectWise%20Automate&amp;severity=high&amp;id=68f143fc9f8a5dbaeaf964b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11492-cwe-319-cleartext-transmission-of-s-fc777e45</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11492%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20ConnectWise%20Automate&amp;severity=critical&amp;id=68f143fc9f8a5dbaeaf964b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62428-cwe-601-url-redirection-to-untruste-89c6dd26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62428%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Drawing-Captcha%20Drawing-Captcha-APP&amp;severity=high&amp;id=68f140779f8a5dbaeaf6e5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34253-cwe-79-improper-neutralization-of-i-09432ac4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34253%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20D-Link%20Nuclias%20Connect&amp;severity=medium&amp;id=68f140779f8a5dbaeaf6e5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34255-cwe-204-observable-response-discrep-7591ef13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34255%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20D-Link%20Nuclias%20Connect&amp;severity=medium&amp;id=68f140779f8a5dbaeaf6e5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34254-cwe-204-observable-response-discrep-f010ccec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34254%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20D-Link%20Nuclias%20Connect&amp;severity=medium&amp;id=68f140779f8a5dbaeaf6e5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62427-cwe-918-server-side-request-forgery-4df3a1d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62427%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20angular%20angular-cli&amp;severity=high&amp;id=68f140779f8a5dbaeaf6e5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62425-cwe-620-unverified-password-change--3f03ac08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62425%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20element-hq%20matrix-authentication-service&amp;severity=high&amp;id=68f140779f8a5dbaeaf6e5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62423-cwe-89-improper-neutralization-of-s-81755ef3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62423%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=68f13cf29f8a5dbaeaf4a7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/misconfigured-netcorecloud-server-exposed-40-billi-77262a19</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Misconfigured%20NetcoreCloud%20Server%20Exposed%2040%20Billion%20Records%20in%2013.4TB%20of%20Data&amp;severity=medium&amp;id=68f135f29f8a5dbaeaf0fc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62413-cwe-79-improper-neutralization-of-i-772b81f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62413%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emqx%20MQTTX&amp;severity=medium&amp;id=68f136089f8a5dbaeaf0ff12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34517-cwe-22-improper-limitation-of-a-pat-72f78f39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34517%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34514-cwe-78-improper-neutralization-of-s-46c53c9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34514%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34519-cwe-327-use-of-a-broken-or-risky-cr-ea145229</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34519%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34512-cwe-79-improper-neutralization-of-i-f905e707</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=medium&amp;id=68f132679f8a5dbaeaef9b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34518-cwe-22-improper-limitation-of-a-pat-7e785b04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34515-cwe-250-execution-with-unnecessary--40189c8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34515%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68f132679f8a5dbaeaef9b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34513-cwe-78-improper-neutralization-of-s-c9bfc265</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34513%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68f132679f8a5dbaeaef9b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-group-on-the-block-unc5142-leverages-etherhidi-0deb2cf7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Group%20on%20the%20Block%3A%20UNC5142%20Leverages%20EtherHiding%20to%20Distribute%20Malware&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfdd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-adopts-etherhiding-nation-state-malware-hidin-1806b93e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK%20Adopts%20EtherHiding%3A%20Nation-State%20Malware%20Hiding%20on%20Blockchains&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/odyssey-stealer-amos-hit-macos-developers-with-fak-34ce0793</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Odyssey%20Stealer%20%26%20AMOS%20Hit%20macOS%20Developers%20with%20Fake%20Homebrew%20Sites&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfe82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-customers-it-has-not-been-hacked-am-a5289031</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20Customers%20It%20Has%20Not%20Been%20Hacked%20Amid%20Phishing%20Emails&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfe92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34516-cwe-1392-use-of-default-credentials-c75d55d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34516%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68f132679f8a5dbaeaef9b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62409-cwe-476-null-pointer-dereference-in-4f308a08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62409%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=68f132679f8a5dbaeaef9ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61924-cwe-184-incomplete-list-of-disallow-c8590deb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61924%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20PrestaShopCorp%20ps_checkout&amp;severity=low&amp;id=68f12ee39f8a5dbaeaee6015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61923-cwe-22-improper-limitation-of-a-pat-1ec0b857</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61923%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PrestaShopCorp%20ps_checkout&amp;severity=medium&amp;id=68f12ee39f8a5dbaeaee6012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61922-cwe-287-improper-authentication-in--78f6af06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61922%3A%20CWE-287%3A%20Improper%20Authentication%20in%20PrestaShopCorp%20ps_checkout&amp;severity=critical&amp;id=68f12ee39f8a5dbaeaee601e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61909-cwe-250-execution-with-unnecessary--26cce72e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61909%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Icinga%20icinga2&amp;severity=medium&amp;id=68f12ee39f8a5dbaeaee6018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62586-cwe-306-missing-authentication-for--57de8b07</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62586%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20OPEXUS%20FOIAXpress&amp;severity=high&amp;id=68f12ee39f8a5dbaeaee6025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61908-cwe-476-null-pointer-dereference-in-994f39aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61908%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Icinga%20icinga2&amp;severity=high&amp;id=68f12b5e9f8a5dbaeaed1b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61907-cwe-200-exposure-of-sensitive-infor-d24c6554</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61907%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Icinga%20icinga2&amp;severity=high&amp;id=68f12b5e9f8a5dbaeaed1b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-jewelbug-targets-russian-it-provi-9d00bf24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20APT%20Jewelbug%20targets%20Russian%20IT%20provider%20in%20rare%20cross-nation%20cyberattack&amp;severity=medium&amp;id=68f127e39f8a5dbaeaeb791e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linkpro-linux-rootkit-uses-ebpf-to-hide-and-activa-247742b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LinkPro%20Linux%20Rootkit%20Uses%20eBPF%20to%20Hide%20and%20Activates%20via%20Magic%20TCP%20Packets&amp;severity=high&amp;id=68f127e39f8a5dbaeaeb790a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-maximum-severity-adobe-flaw-now-exploited-in--39d4ae62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%3A%20Maximum-severity%20Adobe%20flaw%20now%20exploited%20in%20attacks&amp;severity=high&amp;id=68f127e39f8a5dbaeaeb790e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-blockchain-smart-contracts-to-spread-8082c766</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20Blockchain%20Smart%20Contracts%20to%20Spread%20Malware%20via%20Infected%20WordPress%20Sites&amp;severity=high&amp;id=68f127e39f8a5dbaeaeb7912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/model-context-protocol-credential-weakness-raises--07ba0af1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Model%20Context%20Protocol%20credential%20weakness%20raises%20red%20flags%20%7C%20ReversingLabs&amp;severity=medium&amp;id=68f127e39f8a5dbaeaeb7922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-day-initiative-pwn2own-automotive-returns-to--b083b293</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero%20Day%20Initiative%20%E2%80%94%20Pwn2Own%20Automotive%20Returns%20to%20Tokyo%20with%20Expanded%20Chargers%20and%20More!&amp;severity=critical&amp;id=68f127e39f8a5dbaeaeb791a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gladinet-fixes-actively-exploited-zero-day-in-file-07cc4269</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gladinet%20fixes%20actively%20exploited%20zero-day%20in%20file-sharing%20software&amp;severity=critical&amp;id=68f127e39f8a5dbaeaeb7906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-hackers-test-ai-optimized-attack-chains-in-t-aed01742</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Hackers%20Test%20AI-Optimized%20Attack%20Chains%20in%20Taiwan&amp;severity=medium&amp;id=68f127cc9f8a5dbaeaeb76d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61789-cwe-204-observable-response-discrep-99f0fa3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61789%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Icinga%20icingadb-web&amp;severity=medium&amp;id=68f1284b9f8a5dbaeaeb9039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36128-cwe-772-missing-release-of-resource-a84859f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36128%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20IBM%20MQ&amp;severity=high&amp;id=68f124619f8a5dbaeaea87b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58051-cwe-841-improper-enforcement-of-beh-d1c6dc24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58051%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=68f124619f8a5dbaeaea87b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-famous-chollima-hackers-use-beavertai-1c556f66</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea&apos;s%20Famous%20Chollima%20hackers%20Use%20BeaverTail%20and%20OtterCookie%20Malware%20in%20Job%20Scam&amp;severity=medium&amp;id=68f124519f8a5dbaeaea763d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11851-cross-site-scripting-in-apeman-id71-edeb51ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11851%3A%20Cross%20Site%20Scripting%20in%20Apeman%20ID71&amp;severity=medium&amp;id=68f119c69f8a5dbaeae59d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11842-path-traversal-in-shazwazza-smidge-e071d5df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11842%3A%20Path%20Traversal%20in%20Shazwazza%20Smidge&amp;severity=medium&amp;id=68f112c09f8a5dbaeae05646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11840-out-of-bounds-read-in-gnu-binutils-8bd2a714</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11840%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68f112c09f8a5dbaeae0563d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9559-cwe-639-authorization-bypass-through-577eb5b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9559%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=68f112c09f8a5dbaeae0564d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-etherhiding-to-hide-malwa-3666fabe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20EtherHiding%20to%20Hide%20Malware%20Inside%20Blockchain%20Smart%20Contracts&amp;severity=medium&amp;id=68f1d5609c34d0947ff9968e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36002-password-in-configuration-file-in-i-1ccccda4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36002%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=68f108349f8a5dbaeadb9478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41254-cwe-352-cross-site-request-forgery--e9855997</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41254%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=68f108349f8a5dbaeadb947b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-revokes-over-200-certificates-to-disrupt-66ed92fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Revokes%20Over%20200%20Certificates%20to%20Disrupt%20Ransomware%20Campaign&amp;severity=medium&amp;id=68f104a69f8a5dbaeada4666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linkpro-linux-rootkit-uses-ebpf-to-hide-and-activa-fbc386d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LinkPro%20Linux%20Rootkit%20Uses%20eBPF%20to%20Hide%20and%20Activates%20via%20Magic%20TCP%20Packets&amp;severity=medium&amp;id=68f1d5609c34d0947ff99694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41253-cwe-917-improper-neutralization-of--c34c7bed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41253%3A%20CWE-917%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20VMware%20Spring%20Cloud%20Gateway%20Server%20Webflux&amp;severity=high&amp;id=68f104c59f8a5dbaeada61fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denial-of-fuzzing-rust-in-the-windows-kernel-6b4f7100</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denial%20of%20Fuzzing%3A%20Rust%20in%20the%20Windows%20kernel&amp;severity=low&amp;id=68f101329f8a5dbaead96a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11839-unchecked-return-value-in-gnu-binut-f93c4b52</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11839%3A%20Unchecked%20Return%20Value%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68f0fda89f8a5dbaead89164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46752-information-disclosure-in-fortinet--1889cdb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46752%3A%20Information%20disclosure%20in%20Fortinet%20FortiDLP&amp;severity=medium&amp;id=68f0fda89f8a5dbaead8916c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53950-information-disclosure-in-fortinet--62e1c919</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53950%3A%20Information%20disclosure%20in%20Fortinet%20FortiDLP&amp;severity=medium&amp;id=68f0fda89f8a5dbaead8916f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53951-escalation-of-privilege-in-fortinet-7e4ebf82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53951%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiDLP&amp;severity=medium&amp;id=68f0fda89f8a5dbaead89172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54658-escalation-of-privilege-in-fortinet-8f87356a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54658%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiDLP&amp;severity=high&amp;id=68f0fda89f8a5dbaead89175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/postgresql-13-end-of-life-lansweeper-b22bb2e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PostgreSQL%2013%20End%20of%20Life%20-%20Lansweeper&amp;severity=medium&amp;id=68f0f04f9f8a5dbaead45d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisle-emerges-from-stealth-with-ai-based-reasoning-93416730</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AISLE%20Emerges%20From%20Stealth%20With%20AI-Based%20Reasoning%20System%20to%20Remediate%20Vulnerabilities%20on%20the%20Fly&amp;severity=medium&amp;id=68f0f0329f8a5dbaead45ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9152-vulnerability-in-wso2-wso2-api-manag-67b8e91f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9152%3A%20Vulnerability%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=68f0ec159f8a5dbaead3754e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9804-vulnerability-in-wso2-wso2-identity--2d9ea20f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9804%3A%20Vulnerability%20in%20WSO2%20WSO2%20Identity%20Server%20as%20Key%20Manager&amp;severity=critical&amp;id=68f0ec159f8a5dbaead37551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-adobe-aem-forms--57e72b18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Adobe%20AEM%20Forms%20Vulnerability&amp;severity=medium&amp;id=68f0e5029f8a5dbaead026db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9955-vulnerability-in-wso2-wso2-enterpris-efc29a4d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9955%3A%20Vulnerability%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=68f0e51d9f8a5dbaead0282f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10611-vulnerability-in-wso2-wso2-api-mana-3a47c8f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10611%3A%20Vulnerability%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=68f0e51d9f8a5dbaead0282c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fuji-electric-hmi-configurator-flaws-expose-indust-5ad75406</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fuji%20Electric%20HMI%20Configurator%20Flaws%20Expose%20Industrial%20Organizations%20to%20Hacking&amp;severity=medium&amp;id=68f0ddfd9f8a5dbaeacdfb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/architectures-risks-and-adoption-how-to-assess-and-dbfdcdc6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Architectures%2C%20Risks%2C%20and%20Adoption%3A%20How%20to%20Assess%20and%20Choose%20the%20Right%20AI-SOC%20Platform&amp;severity=medium&amp;id=68f1d5609c34d0947ff99697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-silk-lure-scheduled-tasks-weaponized-for-10d54c6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Silk%20Lure%3A%20Scheduled%20Tasks%20Weaponized%20for%20DLL%20Side-Loading%20(drops%20ValleyRAT)&amp;severity=medium&amp;id=68f108289f8a5dbaeadb936b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-deploy-linux-rootkits-via-cisco-snmp-flaw--b71dcbef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Deploy%20Linux%20Rootkits%20via%20Cisco%20SNMP%20Flaw%20in%20&apos;Zero%20Disco&apos;%20Attacks&amp;severity=low&amp;id=68f1d5609c34d0947ff9969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tech-support-scam-uses-microsoft-logo-to-fake--4f1305a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Tech%20Support%20Scam%20Uses%20Microsoft%20Logo%20to%20Fake%20Browser%20Lock%20to%20Steal%20Data&amp;severity=medium&amp;id=68f0da7d9f8a5dbaeacca292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-routers-hacked-for-rootkit-deployment-822a906c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Routers%20Hacked%20for%20Rootkit%20Deployment&amp;severity=medium&amp;id=68f0d36e9f8a5dbaeaca1504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-cambodian-executive-in-massive-crypto-s-fee93d6e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Charges%20Cambodian%20Executive%20in%20Massive%20Crypto%20Scam%20and%20Seizes%20More%20Than%20%2414%20Billion%20in%20Bitcoin&amp;severity=medium&amp;id=68f0cfea9f8a5dbaeac8de38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beware-the-hidden-costs-of-pen-testing-6c760732</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beware%20the%20Hidden%20Costs%20of%20Pen%20Testing&amp;severity=medium&amp;id=68f1d5609c34d0947ff9969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolving-with-a-new-javascript-module-ac262daf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolving%20with%20a%20new%20Javascript%20module&amp;severity=medium&amp;id=68f108289f8a5dbaeadb937f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58426-use-of-hard-coded-cryptographic-key-32bdd84c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58426%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58079-improper-protection-of-alternate-pa-7329530d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58079%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55072-cross-site-scripting-xss-in-neojapa-8e15e819</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55072%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54859-cross-site-scripting-xss-in-neojapa-5038059c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54859%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54760-cross-site-scripting-xss-in-neojapa-3722dd85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54760%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52583-cross-site-scripting-xss-in-neojapa-9e957c7d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52583%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20Web%20Server&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24833-cross-site-scripting-xss-in-neojapa-99ec283d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24833%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-year-prison-sentence-for-powerschool-hacker-72f30719</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four-Year%20Prison%20Sentence%20for%20PowerSchool%20Hacker&amp;severity=medium&amp;id=68f0be569f8a5dbaeac537dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6338-cwe-459-incomplete-cleanup-in-the-qt-517f4824</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6338%3A%20CWE-459%20Incomplete%20Cleanup%20in%20The%20Qt%20Company%20Qt&amp;severity=critical&amp;id=68f0be6f9f8a5dbaeac53a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-15b-crypto-bust-satellite-spyi-05370867</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20%2415B%20Crypto%20Bust%2C%20Satellite%20Spying%2C%20Billion-Dollar%20Smishing%2C%20Android%20RATs%20%26%20More&amp;severity=medium&amp;id=68f0bace9f8a5dbaeac43ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58115-cross-site-scripting-xss-in-neojapa-1b7e34a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58115%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20ChatLuck&amp;severity=medium&amp;id=68f0b5089f8a5dbaeac23886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54461-insufficient-granularity-of-access--e9303ffe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54461%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20NEOJAPAN%20Inc.%20ChatLuck&amp;severity=medium&amp;id=68f0b5089f8a5dbaeac23882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53858-cross-site-scripting-xss-in-neojapa-de1b3eda</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53858%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20ChatLuck&amp;severity=medium&amp;id=68f0b5089f8a5dbaeac2387e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-hack-attack-linked-to-china-big-ip-flaws-patche-70a8b07b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Hack%3A%20Attack%20Linked%20to%20China%2C%20BIG-IP%20Flaws%20Patched%2C%20Governments%20Issue%20Alerts&amp;severity=medium&amp;id=68f0b0469f8a5dbaeabeb78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61581-cwe-1333-inefficient-regular-expres-b2ce45c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61581%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Control&amp;severity=high&amp;id=68f0b5089f8a5dbaeac2388a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0277-cwe-693-protection-mechanism-failure-16cb869d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0277%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20BigFix%20Mobile&amp;severity=medium&amp;id=68f0b05f9f8a5dbaeabeba55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54539-cwe-502-deserialization-of-untruste-8253ccf0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54539%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20NMS%20AMQP%20Client&amp;severity=critical&amp;id=68f0accc9f8a5dbaeaba941c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0276-cwe-693-protection-mechanism-failure-b5e4a800</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0276%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20BigFix%20Modern%20Client%20Management&amp;severity=medium&amp;id=68f0accc9f8a5dbaeaba9419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41021-cwe-79-improper-neutralization-of-i-32d08f85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41021%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sergestec%20SISTICK&amp;severity=medium&amp;id=68f0b5099f8a5dbaeac23896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41020-cwe-639-authorization-bypass-throug-a017f033</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41020%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Sergestec%20Exito&amp;severity=high&amp;id=68f0b5089f8a5dbaeac23893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41019-cwe-89-improper-neutralization-of-s-562ea712</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41019%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sergestec%20SISTICK&amp;severity=critical&amp;id=68f0b5089f8a5dbaeac23890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55091-cwe-125-out-of-bounds-read-in-eclip-b3264547</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55091%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f0b5099f8a5dbaeac23899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41018-cwe-89-improper-neutralization-of-s-90a50b37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41018%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sergestec%20Exito&amp;severity=critical&amp;id=68f0b5089f8a5dbaeac2388d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62585-cwe-358-improperly-implemented-secu-17c01d07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62585%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=68f0983c20d29eed058254bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62584-cwe-346-origin-validation-error-in--8efee3aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62584%3A%20CWE-346%20Origin%20Validation%20Error%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=68f0983c20d29eed058254b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62583-cwe-358-improperly-implemented-secu-51576771</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62583%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=critical&amp;id=68f0983c20d29eed058254b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10849-cwe-862-missing-authorization-in-ri-40ca6a46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10849%3A%20CWE-862%20Missing%20Authorization%20in%20RiceTheme%20Felan%20Framework&amp;severity=medium&amp;id=68f0983c20d29eed058254ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10850-cwe-798-use-of-hard-coded-credentia-3db122b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10850%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20RiceTheme%20Felan%20Framework&amp;severity=critical&amp;id=68f0983c20d29eed058254b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10742-cwe-639-authorization-bypass-throug-3b4248e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10742%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dreamstechnologies%20Truelysell%20Core&amp;severity=critical&amp;id=68f0983c20d29eed058254aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10706-cwe-862-missing-authorization-in-cr-aff2e787</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10706%3A%20CWE-862%20Missing%20Authorization%20in%20Cridio%20Studio%20ClassifiedPro%20-%20reCommerce%20WordPress%20Theme&amp;severity=high&amp;id=68f0983c20d29eed058254a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55090-cwe-125-out-of-bounds-read-in-eclip-692b0402</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55090%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f09eb3b8696e8de1b1589f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55089-cwe-119-improper-restriction-of-ope-68ad5817</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55089%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Eclipse%20Foundation%20FileX&amp;severity=critical&amp;id=68f0938de05ddc61b131ce1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55084-cwe-126-buffer-over-read-in-eclipse-3c83968d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55084%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f0938de05ddc61b131ce1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58778-hidden-functionality-in-ruijie-netw-a3e1db1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58778%3A%20Hidden%20functionality%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20RG-EST300&amp;severity=high&amp;id=68f08e21e05ddc61b12878f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0275-cwe-306-missing-authentication-for-c-20f46470</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0275%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HCL%20Software%20BigFix%20Mobile&amp;severity=medium&amp;id=68f083e40279cbc56ef7734e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0274-cwe-306-missing-authentication-for-c-590dbebc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0274%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HCL%20Software%20BigFix%20Modern%20Client%20Management&amp;severity=medium&amp;id=68f07c48b3384a6fd3f74acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11814-cwe-79-improper-neutralization-of-i-517fad7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery&amp;severity=medium&amp;id=68f076d9b3384a6fd3edb858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-adobe-aem-flaw-with-perfect-100-score-a-a57d6b9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Adobe%20AEM%20Flaw%20with%20Perfect%2010.0%20Score%20%E2%80%94%20Already%20Under%20Active%20Attack&amp;severity=critical&amp;id=68f0b4f79f8a5dbaeac236f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10700-cwe-352-cross-site-request-forgery--b26a79c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10700%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20elemntor%20Ally%20%E2%80%93%20Web%20Accessibility%20%26%20Usability&amp;severity=medium&amp;id=68f05ee44f645e963f14c52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62580-cwe-121-stack-based-buffer-overflow-3b731f6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62580%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ASDA-Soft&amp;severity=high&amp;id=68f06f6c79054d06ca3cb5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62579-cwe-121-stack-based-buffer-overflow-b5ee64a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62579%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ASDA-Soft&amp;severity=high&amp;id=68f06f6c79054d06ca3cb5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11683-cwe-119-improper-restriction-of-ope-574c85a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11683%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20TODDR%20YAML%3A%3ASyck&amp;severity=medium&amp;id=68f03f534f645e963f083876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-16-63acfc99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-16&amp;severity=medium&amp;id=68f18a389f8a5dbaea422005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60358-na-b0ae39a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60358%3A%20n%2Fa&amp;severity=medium&amp;id=68f1520b9f8a5dbaea02a8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61539-na-d2027800</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61539%3A%20n%2Fa&amp;severity=medium&amp;id=68f14e869f8a5dbaea003e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60855-na-353018e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60855%3A%20n%2Fa&amp;severity=medium&amp;id=68f14b039f8a5dbaeafdfa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61554-na-5bcaaf8c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61554%3A%20n%2Fa&amp;severity=medium&amp;id=68f14b039f8a5dbaeafdfa84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61553-na-2967dd9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61553%3A%20n%2Fa&amp;severity=high&amp;id=68f143fc9f8a5dbaeaf964c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61514-na-aea655d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61514%3A%20n%2Fa&amp;severity=medium&amp;id=68f13cf29f8a5dbaeaf4a7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60639-na-c2bfa4e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60639%3A%20n%2Fa&amp;severity=medium&amp;id=68f136089f8a5dbaeaf0ff0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61330-na-5ddd016e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61330%3A%20n%2Fa&amp;severity=medium&amp;id=68f132689f8a5dbaeaef9be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60641-na-8326e285</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60641%3A%20n%2Fa&amp;severity=medium&amp;id=68f132679f8a5dbaeaef9b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56699-na-7cf72c62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56699%3A%20n%2Fa&amp;severity=medium&amp;id=68f124619f8a5dbaeaea87bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56700-na-f5ebe7af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56700%3A%20n%2Fa&amp;severity=medium&amp;id=68f120ce9f8a5dbaeae91931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61540-na-4efd01ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61540%3A%20n%2Fa&amp;severity=medium&amp;id=68f112c09f8a5dbaeae05654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22381-na-b7568af4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22381%3A%20n%2Fa&amp;severity=high&amp;id=68f112c09f8a5dbaeae05650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61543-na-3a4a6de4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61543%3A%20n%2Fa&amp;severity=high&amp;id=68f108349f8a5dbaeadb9488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61541-na-a7982b8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61541%3A%20n%2Fa&amp;severity=high&amp;id=68f108349f8a5dbaeadb9483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61536-na-10fa8bb6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61536%3A%20n%2Fa&amp;severity=high&amp;id=68f108349f8a5dbaeadb947f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mysterious-elephant-moves-beyond-recycled-malware-1e494d03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Mysterious%20Elephant&apos;%20Moves%20Beyond%20Recycled%20Malware&amp;severity=medium&amp;id=68f04b034f645e963f102fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43282-an-app-may-be-able-to-cause-unexpec-53003581</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43282%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68f00082d6afaf303e7d1301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43313-an-app-may-be-able-to-access-sensit-d4b1485a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43313%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68f00082d6afaf303e7d130b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43280-forwarding-an-email-could-display-r-3f9ce239</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43280%3A%20Forwarding%20an%20email%20could%20display%20remote%20images%20in%20Mail%20in%20Lockdown%20Mode%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68f00082d6afaf303e7d12fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43281-a-local-attacker-may-be-able-to-ele-c4f67dac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43281%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68f00082d6afaf303e7d12fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11619-cwe-295-improper-certificate-valida-cd73fcd3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11619%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Devolutions%20Devolutions%20Server&amp;severity=high&amp;id=68f00082d6afaf303e7d1310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11568-improper-validation-of-specified-qu-ff058e4a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11568%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Latchset%20luksmeta&amp;severity=medium&amp;id=68effb19d6afaf303e734bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62375-cwe-295-improper-certificate-valida-1e430518</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62375%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20in-toto%20go-witness&amp;severity=medium&amp;id=68eff91f8fdbc4b28b29b763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11832-cwe-770-allocation-of-resources-wit-5c379ebf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11832%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68eff3b78fdbc4b28b200684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-big-ip-environment-breached-by-nation-state-act-b206e6d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20BIG-IP%20Environment%20Breached%20by%20Nation-State%20Actor&amp;severity=medium&amp;id=68f04b034f645e963f102fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wiretap-and-battering-ram-attacks-on-tees-kaspersk-f6dbea37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WireTap%20and%20Battering%20RAM%3A%20attacks%20on%20TEEs%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68eff2298fdbc4b28b1cbaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-releases-big-ip-patches-for-stolen-security-vul-4d23cf6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20releases%20BIG-IP%20patches%20for%20stolen%20security%20vulnerabilities&amp;severity=high&amp;id=68efee6e610883e4f9527ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-confirms-nation-state-breach-source-code-and-vu-de96bb17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Confirms%20Nation-State%20Breach%2C%20Source%20Code%20and%20Vulnerability%20Data%20Stolen&amp;severity=high&amp;id=68efe74cd1a220c1e982638b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-oct-2025-fixs-175-vulnerab-61c0cd4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20Oct%202025%20Fixs%20175%20Vulnerabilities%20including%203%20Zero-Days&amp;severity=medium&amp;id=68efdc66d4cab3a2882c910f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-threat-group-jewelbug-quietly-infiltrated--7dd94623</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Threat%20Group%20&apos;Jewelbug&apos;%20Quietly%20Infiltrated%20Russian%20IT%20Network%20for%20Months&amp;severity=medium&amp;id=68f049d84f645e963f0fedfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62371-cwe-295-improper-certificate-valida-580b94d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62371%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20opensearch-project%20data-prepper&amp;severity=high&amp;id=68efdcb86817339dcf782799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62410-cwe-1321-improperly-controlled-modi-fdcd7008</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62410%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20capricorn86%20happy-dom&amp;severity=critical&amp;id=68efdcb86817339dcf78279f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62381-cwe-1321-improperly-controlled-modi-ac03fd09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62381%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20ciscoheat%20sveltekit-superforms&amp;severity=high&amp;id=68efd906d4cab3a288267939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-says-hackers-stole-undisclosed-big-ip-flaws-sou-a9712439</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20says%20hackers%20stole%20undisclosed%20BIG-IP%20flaws%2C%20source%20code&amp;severity=high&amp;id=68efd8e8d4cab3a288255172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clothing-giant-mango-discloses-data-breach-exposin-e11687b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clothing%20giant%20MANGO%20discloses%20data%20breach%20exposing%20customer%20info&amp;severity=high&amp;id=68efd8e8d4cab3a28825516e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62382-cwe-73-external-control-of-file-nam-bfb81067</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62382%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=68efd906d4cab3a28826793d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62378-cwe-706-use-of-incorrectly-resolved-37e47862</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62378%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20underctrl-io%20commandkit&amp;severity=medium&amp;id=68efd53e346ce4cfc57b3a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-latest-mirai-wave-exploiting-tbk-d-aec68058</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maverick%3A%20a%20new%20banking%20trojan%20abusing%20WhatsApp%20in%20a%20massive%20scale%20distribution&amp;severity=medium&amp;id=684585c571f4d251b54eaf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10577-cwe-266-in-hp-inc-sound-research-1b898718</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10577%3A%20CWE-266%20in%20HP%2C%20Inc.%20Sound%20Research&amp;severity=high&amp;id=68efd53e346ce4cfc57b3a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10576-cwe-266-in-hp-inc-sound-research-989a82a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10576%3A%20CWE-266%20in%20HP%2C%20Inc.%20Sound%20Research&amp;severity=high&amp;id=68efd53e346ce4cfc57b3a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62380-cwe-79-improper-neutralization-of-i-ed39fc35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62380%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eladnava%20mailgen&amp;severity=low&amp;id=68efd53e346ce4cfc57b3a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54271-time-of-check-time-of-use-toctou-ra-cc64b448</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54271%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20(CWE-367)%20in%20Adobe%20Creative%20Cloud%20Desktop&amp;severity=medium&amp;id=68efce11ed06978b6a61650d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20360-buffer-access-with-incorrect-length-23f4019f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20360%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=68efca8eed06978b6a597396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20359-buffer-under-read-in-cisco-cisco-cy-3e3310ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20359%3A%20Buffer%20Under-read%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=68efca8eed06978b6a597393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20351-improper-neutralization-of-input-du-5d374e7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Session%20Initiation%20Protocol%20(SIP)%20Software&amp;severity=medium&amp;id=68efca8eed06978b6a597390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20350-stack-based-buffer-overflow-in-cisc-c634f8d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20350%3A%20Stack-based%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Session%20Initiation%20Protocol%20(SIP)%20Software&amp;severity=high&amp;id=68efca8eed06978b6a59738d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20329-insertion-of-sensitive-information--04505814</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20329%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Cisco%20Cisco%20RoomOS%20Software&amp;severity=medium&amp;id=68efca8eed06978b6a59738a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58133-cwe-288-authentication-bypass-using-cb4811d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58133%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=medium&amp;id=68efca8eed06978b6a59739c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58132-cwe-77-improper-neutralization-of-s-c9aaea6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58132%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients%20for%20Windows&amp;severity=medium&amp;id=68efca8eed06978b6a597399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-breach-exposes-big-ip-source-code-nation-state--b1c16ce2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Breach%20Exposes%20BIG-IP%20Source%20Code%20%E2%80%94%20Nation-State%20Hackers%20Behind%20Massive%20Intrusion&amp;severity=high&amp;id=68f049d84f645e963f0fedfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62379-cwe-601-url-redirection-to-untruste-1f153e25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62379%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20reflex-dev%20reflex&amp;severity=low&amp;id=68efc69b60c3b60ff6f859d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62370-cwe-248-uncaught-exception-in-alloy-1df2a86c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62370%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20alloy-rs%20core&amp;severity=high&amp;id=68efbf6451297e5c13a0013f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2529-cwe-228-improper-handling-of-syntact-a4434123</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2529%3A%20CWE-228%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20IBM%20Terracotta&amp;severity=low&amp;id=68efbf6451297e5c13a0013c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61990-cwe-415-double-free-in-f5-big-ip-56894874</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61990%3A%20CWE-415%20Double%20Free%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efbf6451297e5c13a00152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57780-cwe-250-in-f5-f5os-appliance-4e839be1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57780%3A%20CWE-250%20in%20F5%20F5OS%20-%20Appliance&amp;severity=high&amp;id=68efbf6451297e5c13a00146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61933-cwe-79-improper-neutralization-of-i-bb5e3347</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61933%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efbf6451297e5c13a0014c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58071-cwe-457-use-of-uninitialized-variab-09e0d98d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58071%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efbf6451297e5c13a00149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61935-cwe-252-unchecked-return-value-in-f-86ebebb6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61935%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efbf6451297e5c13a0014f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53860-cwe-214-invocation-of-process-using-5be1347d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53860%3A%20CWE-214%3A%20Invocation%20of%20Process%20Using%20Visible%20Sensitive%20Information%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efbbee51297e5c1399a27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-university-breached-in-oracle-zero-day-att-b34cf7be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20University%20Breached%20in%20Oracle%20Zero-Day%20Attack&amp;severity=medium&amp;id=68f04b034f645e963f102fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-blames-nation-state-hackers-for-theft-of-source-dcae8651</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Says%20Nation-State%20Hackers%20Stole%20Source%20Code%20and%20Vulnerability%20Data&amp;severity=medium&amp;id=68efb494ea97afbedf527648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10699-cwe-295-improper-certificate-valida-1fb34407</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10699%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20LeCloud%20Client&amp;severity=medium&amp;id=68efb2aeea97afbedf4f99ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10581-cwe-427-uncontrolled-search-path-el-d06dac66</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10581%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=68efb2aeea97afbedf4f99a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9548-cwe-476-null-pointer-dereference-in--6befc85e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9548%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Lenovo%20Power%20Management%20Driver&amp;severity=medium&amp;id=68efb2aeea97afbedf4f99b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8486-cwe-250-execution-with-unnecessary-p-b2064c24</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8486%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=68efb2aeea97afbedf4f99b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6026-cwe-295-improper-certificate-validat-84af9df2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6026%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20Universal%20Device%20Client&amp;severity=low&amp;id=68efb2aeea97afbedf4f99b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-vs-code-extensions-exposed-developers-to--aa4e76a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20VS%20Code%20Extensions%20Exposed%20Developers%20to%20Hidden%20Supply%20Chain%20Risks&amp;severity=critical&amp;id=68f049d84f645e963f0fee01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55083-cwe-126-buffer-over-read-in-eclipse-aede0deb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55083%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68efb0ddb00d656ee54120bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60015-cwe-787-out-of-bounds-write-in-f5-f-464f4b71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60015%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efa99527d7577a180040de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54755-cwe-146-improper-neutralization-of--8718748c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54755%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a1800408c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59483-cwe-73-external-control-of-file-nam-66d2033f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59483%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61974-cwe-401-missing-release-of-memory-a-54b96a39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61974%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59481-cwe-250-execution-with-unnecessary--83f0750d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59481%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61960-cwe-476-null-pointer-dereference-in-c64305e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61960%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61955-cwe-95-improper-neutralization-of-d-82ec768a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61955%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20F5%20F5OS%20-%20Appliance&amp;severity=high&amp;id=68efa99527d7577a180040ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54854-cwe-125-out-of-bounds-read-in-f5-bi-60ca6c22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54854%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a18004092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61958-cwe-250-execution-with-unnecessary--f7a64daa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61958%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53521-cwe-770-allocation-of-resources-wit-0dad3b3b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53521%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20F5%20BIG-IP&amp;severity=critical&amp;id=68efa99327d7577a18004061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58096-cwe-787-out-of-bounds-write-in-f5-b-cb8c6bef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58096%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54858-cwe-674-uncontrolled-recursion-in-f-7dd2f977</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54858%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a18004095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53868-cwe-78-improper-neutralization-of-s-768dd43b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53868%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18004067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58120-cwe-476-null-pointer-dereference-in-a3b4c3e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58120%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP%20Next%20SPK&amp;severity=high&amp;id=68efa99427d7577a180040a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60013-cwe-78-improper-neutralization-of-s-ed76e46f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60013%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efa99427d7577a180040cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61951-cwe-125-out-of-bounds-read-in-f5-bi-b26ff8f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61951%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53856-cwe-705-incorrect-control-flow-scop-ad63bf5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53856%3A%20CWE-705%20Incorrect%20Control%20Flow%20Scoping%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18004064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54479-cwe-787-out-of-bounds-write-in-f5-b-0f2f407b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54479%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a1800406a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59778-cwe-770-allocation-of-resources-wit-7ce0575e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59778%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20F5OS%20-%20Chassis&amp;severity=high&amp;id=68efa99427d7577a180040c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54805-cwe-401-missing-release-of-memory-a-0578be16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54805%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20BIG-IP%20Next%20SPK&amp;severity=medium&amp;id=68efa99427d7577a1800408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55670-cwe-770-allocation-of-resources-wit-63c09158</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55670%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP%20Next%20SPK&amp;severity=medium&amp;id=68efa99427d7577a1800409e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41430-cwe-770-allocation-of-resources-wit-4d6ce177</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41430%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18001345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61938-cwe-1284-improper-validation-of-spe-d71ab58b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61938%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58424-cwe-340-generation-of-predictable-n-6aa3aad1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58424%3A%20CWE-340%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55036-cwe-787-out-of-bounds-write-in-f5-b-439be2f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55036%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a18004098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59781-cwe-459-incomplete-cleanup-in-f5-bi-45c32ff3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59781%3A%20CWE-459%20Incomplete%20Cleanup%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47150-cwe-401-missing-release-of-memory-a-22acb820</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47150%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efa99327d7577a18004055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46706-cwe-770-allocation-of-resources-wit-a0e8f6db</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46706%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18001348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55669-cwe-672-operation-on-a-resource-aft-de0ddcac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55669%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a1800409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48008-cwe-416-use-after-free-in-f5-big-ip-df4215d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48008%3A%20CWE-416%20Use%20After%20Free%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18004058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58153-cwe-703-improper-check-or-handling--e79a969e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58153%3A%20CWE-667%20Improper%20Locking%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60016-cwe-119-improper-restriction-of-ope-bba05d17</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60016%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59478-cwe-824-access-of-uninitialized-poi-e0dd4b9b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59478%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58474-cwe-770-allocation-of-resources-wit-fd730576</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58474%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47148-cwe-404-improper-resource-shutdown--20dde908</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47148%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99327d7577a1800134b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59269-cwe-79-improper-neutralization-of-i-8270cfe4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59269%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59268-cwe-201-in-f5-big-ip-35754850</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59268%3A%20CWE-201%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53474-cwe-120-buffer-copy-without-checkin-cd786f84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53474%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a1800405e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/singularity-deep-dive-into-a-modern-stealth-linux--d9610ef3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Singularity%3A%20Deep%20Dive%20into%20a%20Modern%20Stealth%20Linux%20Kernel%20Rootkit%20%E2%80%93%20Kyntra%20Blog&amp;severity=medium&amp;id=68efa99227d7577a18001308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/customer-service-firm-5ca-denies-responsibility-fo-9e15361c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Customer%20Service%20Firm%205CA%20Denies%20Responsibility%20for%20Discord%20Data%20Breach&amp;severity=medium&amp;id=68ef9edba4b88470136161a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elasticsearch-server-leak-exposes-6-billion-record-569ea046</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Elasticsearch%20Server%20Leak%20Exposes%206%20Billion%20Records%20from%20Scraping%2C%20Old%20and%20New%20Breaches&amp;severity=medium&amp;id=68ef9f0aa4b884701362a8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9640-vulnerability-in-red-hat-red-hat-ent-80ad4a53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9640%3A%20Use%20of%20Uninitialized%20Resource&amp;severity=medium&amp;id=68ef9b21178f764e1f470999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10869-cwe-79-improper-neutralization-of-i-95d18883</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Oct8ne%20Chatbot&amp;severity=medium&amp;id=68ef9b21178f764e1f470996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fake-google-job-offer-email-scam-targets-works-e375a8bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fake%20Google%20Job%20Offer%20Email%20Scam%20Targets%20Workspace%20and%20Microsoft%20365%20Users&amp;severity=medium&amp;id=68ef8c9dedb8272845fde0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-attackers-bypass-synced-passkeys-7002d36c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Attackers%20Bypass%20Synced%20Passkeys&amp;severity=medium&amp;id=68f049d84f645e963f0fee04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-fixes-announced-by-siemens-schne-4c1e9412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Fixes%20Announced%20by%20Siemens%2C%20Schneider%2C%20Rockwell%2C%20ABB%2C%20Phoenix%20Contact&amp;severity=medium&amp;id=68ef8561290e66ee3b417082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55082-cwe-125-out-of-bounds-read-in-eclip-36fb26e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55082%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68ef81e7290e66ee3b3a9f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55081-cwe-126-buffer-over-read-in-eclipse-d2c5befb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55081%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68ef7e24507ec470927a1454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unencrypted-satellites-expose-global-communication-97b78012</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unencrypted%20satellites%20expose%20global%20communications&amp;severity=medium&amp;id=68ef736aa13d368f6fc3c5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-new-windows-zero-days-exploited-in-the-wild-on-b19f3281</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20New%20Windows%20Zero-Days%20Exploited%20in%20the%20Wild%20%E2%80%94%20One%20Affects%20Every%20Version%20Ever%20Shipped&amp;severity=medium&amp;id=68f049d84f645e963f0fee07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anatomy-of-an-attack-the-blacksuit-blitz-at-a-glob-c314d471</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anatomy%20of%20an%20Attack%3A%20The%20%22BlackSuit%20Blitz%22%20at%20a%20Global%20Equipment%20Manufacturer&amp;severity=medium&amp;id=68ef64715578b80782323ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-ictbroadcast-servers-via-cookie-exp-e8c39b79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20ICTBroadcast%20Servers%20via%20Cookie%20Exploit%20to%20Gain%20Remote%20Shell%20Access&amp;severity=high&amp;id=68ef64715578b80782323aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-cvss-100-bugs-in-red-lion-rtus-could-hand-hack-a06f3f21</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20CVSS%2010.0%20Bugs%20in%20Red%20Lion%20RTUs%20Could%20Hand%20Hackers%20Full%20Industrial%20Control&amp;severity=medium&amp;id=68ef64715578b80782323aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10194-cwe-79-improper-neutralization-of-i-2adcd731</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10194%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eflyjason%20Shortcode%20Button&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5696b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11701-cwe-862-missing-authorization-in-qu-bd0773d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11701%3A%20CWE-862%20Missing%20Authorization%20in%20quicoto%20Zip%20Attachments&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10056-cwe-918-server-side-request-forgery-8ac7cbb3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10056%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20miunosoft%20Task%20Scheduler&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11728-cwe-306-missing-authentication-for--38282594</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11728%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20oceanpayment%20Oceanpayment%20CreditCard%20Gateway&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10313-cwe-862-missing-authorization-in-ja-62fd2fa4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10313%3A%20CWE-862%20Missing%20Authorization%20in%20jankimoradiya%20Find%20And%20Replace%20content%20for%20WordPress&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11196-cwe-200-exposure-of-sensitive-infor-ea14ff45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11196%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tbenyon%20External%20Login&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10486-cwe-532-insertion-of-sensitive-info-330a0223</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10486%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20steadycontent%20Content%20Writer&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10294-cwe-288-authentication-bypass-using-42eb1a0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10294%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20victornavarro%20OwnID%20Passwordless%20Login&amp;severity=critical&amp;id=68ef5c7cc4f69c9730e56974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9967-cwe-288-authentication-bypass-using--f980e8c9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9967%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20gsayed786%20Orion%20SMS%20OTP%20Verification.&amp;severity=critical&amp;id=68ef5c7ec4f69c9730e56a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10140-cwe-79-improper-neutralization-of-i-b220e2d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10140%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andreiigna%20Quick%20Social%20Login&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11692-cwe-862-missing-authorization-in-qu-d90e376c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11692%3A%20CWE-862%20Missing%20Authorization%20in%20quicoto%20Zip%20Attachments&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11365-cwe-89-improper-neutralization-of-s-ace3dbb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11365%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20akbrohi%20WP%20Google%20Map%20Plugin&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10303-cwe-862-missing-authorization-in-ow-60c3fed1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10303%3A%20CWE-862%20Missing%20Authorization%20in%20owthub%20Library%20Management%20System&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e56986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10312-cwe-352-cross-site-request-forgery--efd86491</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10312%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20steve-forster%20Theme%20Importer&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5698f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10300-cwe-352-cross-site-request-forgery--52dad469</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10300%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fmeaddons%20TopBar&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10135-cwe-79-improper-neutralization-of-i-930994fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falldeaf%20WP%20ViewSTL&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e5694c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10038-cwe-266-incorrect-privilege-assignm-0f6181ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10038%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20letscms%20Binary%20MLM%20Plan&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e5692f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10132-cwe-79-improper-neutralization-of-i-f4791f08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dash8x%20Dhivehi%20Text&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10743-cwe-89-improper-neutralization-of-s-af5c99ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20maycorolbuche1%20Outdoor&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11722-cwe-98-improper-control-of-filename-d4d01f09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11722%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ikhodal%20Woocommerce%20Category%20and%20Products%20Accordion%20Panel&amp;severity=high&amp;id=68ef5c7ec4f69c9730e56a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10133-cwe-79-improper-neutralization-of-i-88fa7849</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10133%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salamzadeh%20URLYar%20URL%20Shortner&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10299-cwe-862-missing-authorization-in-ha-81ade7aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10299%3A%20CWE-862%20Missing%20Authorization%20in%20hakik%20Bifr%C3%B6st%20%E2%80%93%20Instant%20Passwordless%20Temporary%20Login%20Links&amp;severity=high&amp;id=68ef5c7cc4f69c9730e56978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11177-cwe-89-improper-neutralization-of-s-25cc0e6f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11177%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tbenyon%20External%20Login&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10051-cwe-434-unrestricted-upload-of-file-a42ee4a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10051%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeinwp%20Demo%20Import%20Kit&amp;severity=high&amp;id=68ef5c7bc4f69c9730e5693c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10041-cwe-434-unrestricted-upload-of-file-c35e01cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10041%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ajitdas%20Flex%20QR%20Code%20Generator&amp;severity=critical&amp;id=68ef5c7bc4f69c9730e56933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10186-cwe-862-missing-authorization-in-jj-da1e7f8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10186%3A%20CWE-862%20Missing%20Authorization%20in%20jjlemstra%20WhyDonate%20%E2%80%93%20FREE%20Donate%20button%20%E2%80%93%20Crowdfunding%20%E2%80%93%20Fundraising&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e56967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10575-cwe-89-improper-neutralization-of-s-38688de1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10575%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ivycat%20WP%20jQuery%20Pager&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10301-cwe-352-cross-site-request-forgery--fe7e78ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10301%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flenskiproject%20FunKItools&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e56982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10730-cwe-89-improper-neutralization-of-s-98799312</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10730%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplushotmailcom%20Wp%20tabber%20widget&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10045-cwe-89-improper-neutralization-of-s-52a1756a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10045%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onofficeweb%20onOffice%20for%20WP-Websites&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10310-cwe-89-improper-neutralization-of-s-11c35d1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10310%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jayce53%20Rich%20Snippet%20Site%20Report&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5698a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10660-cwe-89-improper-neutralization-of-s-62dc4b2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10660%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicholasbosch%20WP%20Dashboard%20Chat&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10648-cwe-862-missing-authorization-in-cy-e60be01c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10648%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20Login%20with%20YourMembership%20%E2%80%93%20YM%20SSO%20Login&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10293-cwe-287-improper-authentication-in--22f8bf9a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10293%3A%20CWE-287%20Improper%20Authentication%20in%20nexist%20Keyy%20Two%20Factor%20Authentication%20(like%20Clef)&amp;severity=high&amp;id=68ef5c7cc4f69c9730e56970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10139-cwe-79-improper-neutralization-of-i-9dbd64eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10139%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remko%20WP%20BookWidgets&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10754-cwe-434-unrestricted-upload-of-file-bdf6bb7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10754%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20geolocationtechnology%20DocoDoco%20Store%20Locator&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/africa-remains-top-global-target-even-as-attacks-d-2058604c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Africa%20Remains%20Top%20Global%20Target%2C%20Even%20as%20Attacks%20Decline&amp;severity=medium&amp;id=68ef54ef8373f2b27ae48205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-severity-vulnerabilities-patched-by-fortinet--7c55936b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High-Severity%20Vulnerabilities%20Patched%20by%20Fortinet%20and%20Ivanti&amp;severity=high&amp;id=68ef51708373f2b27ade0858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61941-improper-limitation-of-a-pathname-t-917c06b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61941%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20BUFFALO%20INC.%20WXR9300BE6P%20series&amp;severity=high&amp;id=68ef50c5cae19e7fe92c3789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11501-cwe-89-improper-neutralization-of-s-e3315a70</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11501%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20markomaksym%20Dynamically%20Display%20Posts&amp;severity=high&amp;id=68ef50c5cae19e7fe92c3785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55039-cwe-347-improper-verification-of-cr-bcfac309</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55039%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Apache%20Software%20Foundation%20Apache%20Spark&amp;severity=medium&amp;id=68ef4d40cae19e7fe9244039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-cvss-100-bugs-in-red-lion-rtus-could-hand-hack-a9782699</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20CVSS%2010.0%20Bugs%20in%20Red%20Lion%20RTUs%20Could%20Hand%20Hackers%20Full%20Industrial%20Control&amp;severity=critical&amp;id=68f049d84f645e963f0fee0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11160-cwe-80-improper-neutralization-of-s-3e4ff3a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11160%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=68ef451c439e765f09a73bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11161-cwe-80-improper-neutralization-of-s-ce9868da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11161%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=68ef451c439e765f09a73be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-ictbroadcast-servers-via-cookie-exp-e3a2b978</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20ICTBroadcast%20Servers%20via%20Cookie%20Exploit%20to%20Gain%20Remote%20Shell%20Access&amp;severity=critical&amp;id=68f049d84f645e963f0fee0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26861-uncontrolled-search-path-element-in-88945977</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26861%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RSUPPORT%20CO.%2C%20LTD.%20RemoteCall%20Remote%20Support%20Program%20(for%20Operator)&amp;severity=high&amp;id=68ef3b8a68c5b4250c33579e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26860-uncontrolled-search-path-element-in-fe860ec5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26860%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RSUPPORT%20CO.%2C%20LTD.%20RemoteCall%20Remote%20Support%20Program%20(for%20Operator)&amp;severity=high&amp;id=68ef3b8a68c5b4250c33579a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26859-uncontrolled-search-path-element-in-249ce6ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26859%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RSUPPORT%20CO.%2C%20LTD.%20RemoteView%20PC%20Application%20Console&amp;severity=high&amp;id=68ef3b8a68c5b4250c335796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10406-cwe-22-improper-limitation-of-a-pat-4064aa80</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10406%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BlindMatrix%20e-Commerce&amp;severity=medium&amp;id=68ef3b8a68c5b4250c335793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31702-cwe-732-incorrect-permission-assign-2f31752c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31702%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dahua%20IPC&amp;severity=medium&amp;id=68ef39aeb5560353b8eac1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55080-cwe-233-improper-handling-of-parame-4e08bbbf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55080%3A%20CWE-233%20Improper%20Handling%20of%20Parameters%20in%20Eclipse%20Foundation%20ThreadX&amp;severity=high&amp;id=68ef3627b5560353b8e3938d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clipboard-pictures-exfiltration-in-python-infostea-43601c4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer%2C%20(Wed%2C%20Oct%2015th)&amp;severity=medium&amp;id=68ef360ab5560353b8e37a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sap-netweaver-bug-lets-attackers-take-over-ser-737fd0d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SAP%20NetWeaver%20Bug%20Lets%20Attackers%20Take%20Over%20Servers%20Without%20Login&amp;severity=medium&amp;id=68f049d84f645e963f0fee10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8561-cwe-87-improper-neutralization-of-al-585e517b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8561%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20ovatheme%20Ova%20Advent&amp;severity=medium&amp;id=68ef32334e16767881e4a827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6042-cwe-269-improper-privilege-managemen-7386e9e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6042%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20pebas%20Lisfinity%20Core%20-%20Lisfinity%20Core%20plugin%20used%20for%20pebas%C2%AE%20Lisfinity%20WordPress%20theme&amp;severity=high&amp;id=68ef32334e16767881e4a823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11176-cwe-639-authorization-bypass-throug-2d06dd12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11176%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kybernetikservices%20Quick%20Featured%20Images&amp;severity=medium&amp;id=68ef32334e16767881e4a81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55079-cwe-770-allocation-of-resources-wit-fa06acb5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55079%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Eclipse%20Foundation%20ThreadX&amp;severity=medium&amp;id=68ef254480e6e715302a8099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-critical-vulnerability-in-connect-co-9ed3c920</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Critical%20Vulnerability%20in%20Connect%20Collaboration%20Suite&amp;severity=critical&amp;id=68ef235099201ce2fe1bf537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-173-vulnerabilities-including-ex-93b5fb30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20173%20Vulnerabilities%2C%20Including%20Exploited%20Windows%20Flaws&amp;severity=critical&amp;id=68ef1fcd99201ce2fe14aa15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/search-click-steal-the-hidden-threat-of-spoofed-iv-d7e6f359</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Search%2C%20Click%2C%20Steal%3A%20The%20Hidden%20Threat%20of%20Spoofed%20Ivanti%20VPN%20Client%20Sites&amp;severity=medium&amp;id=68ef5ff1c4f69c9730edcbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11746-cwe-22-improper-limitation-of-a-pat-6edf1434</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11746%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%208theme%20XStore&amp;severity=high&amp;id=68ef0c4955734f1608eb63a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7305-cwe-434-unrestricted-upload-of-file--4480cd22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7305%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Guangzhou%20Smart%20Software%20Co.%2C%20Ltd.%20SmartBI&amp;severity=critical&amp;id=68eefe3955734f1608e6823f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7304-cwe-78-improper-neutralization-of-sp-a66b027f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7304%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20RG-UAC&amp;severity=critical&amp;id=68eefe3955734f1608e6823b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13991-cwe-22-improper-limitation-of-a-pat-456d957b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13991%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Huijietong%20Cloud%20Video%20Platform&amp;severity=high&amp;id=68eefe3955734f1608e6824b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7311-cwe-78-improper-neutralization-of-sp-1891bbc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7311%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BYTEVALUE%20(Luoyang%20Baiwei%20Intelligent%20Technology%20Co.%2C%20Ltd.)%20Flow%20Control%20Router&amp;severity=critical&amp;id=68eefe3955734f1608e68245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54268-heap-based-buffer-overflow-cwe-122--bb64a6a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54268%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=68eefe3955734f1608e6824f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54278-heap-based-buffer-overflow-cwe-122--27dd54a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54278%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=68eefe3955734f1608e68252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61804-heap-based-buffer-overflow-cwe-122--bcfeafac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61804%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Animate&amp;severity=high&amp;id=68eef02955734f1608d3dfac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54279-use-after-free-cwe-416-in-adobe-ani-56bc48cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54279%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Animate&amp;severity=high&amp;id=68eef02955734f1608d3dfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54269-out-of-bounds-read-cwe-125-in-adobe-ceb22c9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54269%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=68eef02955734f1608d3dfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54270-null-pointer-dereference-cwe-476-in-04563f94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54270%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=68eef02955734f1608d3dfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-15-9eae5e7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-15&amp;severity=medium&amp;id=68f0379eae27d187307571e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56749-na-185ced5a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56749%3A%20n%2Fa&amp;severity=critical&amp;id=68efb2aeea97afbedf4f99b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56748-na-b3644c91</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56748%3A%20n%2Fa&amp;severity=medium&amp;id=68efb0ddb00d656ee54120c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56746-na-2999ba81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56746%3A%20n%2Fa&amp;severity=low&amp;id=68efad53b00d656ee539c3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62376-cwe-287-improper-authentication-in--b492ac59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62376%3A%20CWE-287%3A%20Improper%20Authentication%20in%20pwncollege%20dojo&amp;severity=critical&amp;id=68eecaf64a57b2a930bdf0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49552-cross-site-scripting-dom-based-xss--8c606fff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49552%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=high&amp;id=68eeccd7eb8be918751956eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49553-cross-site-scripting-dom-based-xss--cdc1ca5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49553%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=68eeccd7eb8be918751956ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54196-url-redirection-to-untrusted-site-o-7b5b301f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54196%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20(CWE-601)%20in%20Adobe%20Adobe%20Connect&amp;severity=low&amp;id=68eeccd7eb8be918751956f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-drops-terrifyingly-large-october-patch-u-89ba9cfc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Drops%20Terrifyingly%20Large%20October%20Patch%20Update&amp;severity=high&amp;id=68eef95355734f1608e4f99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61797-cross-site-scripting-stored-xss-cwe-4b82bfbb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61797%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68eec00f519df59857dc719b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54272-cross-site-scripting-stored-xss-cwe-c1451b3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54272%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68eec00f519df59857dc7195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61796-cross-site-scripting-stored-xss-cwe-12672735</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61796%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68eec00f519df59857dc7198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinas-flax-typhoon-turns-geo-mapping-server-into--cbe6c8fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China&apos;s%20Flax%20Typhoon%20Turns%20Geo-Mapping%20Server%20into%20a%20Backdoor&amp;severity=medium&amp;id=68eef95355734f1608e4f99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-seizes-15-billion-in-crypto-from-pig-butchering-2357033f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20seizes%20%2415%20billion%20in%20crypto%20from%20&apos;pig%20butchering&apos;%20kingpin&amp;severity=high&amp;id=68eebc3407f6bbeafa149923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-of-widespread-rdp-attacks-by-100k-b0249da9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20warn%20of%20widespread%20RDP%20attacks%20by%20100K-node%20botnet&amp;severity=medium&amp;id=68eebc3407f6bbeafa149927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcp-snitch-the-mcp-security-tool-you-probably-need-e9160c82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MCP%20Snitch%20-%20The%20MCP%20Security%20Tool%20You%20Probably%20Need&amp;severity=medium&amp;id=68eeb4a254d2200316a0d6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54267-incorrect-authorization-cwe-863-in--23f5a2e1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54267%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68eeb4a054d2200316a0d6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54266-cross-site-scripting-stored-xss-cwe-f5436672</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54266%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68eeb4a054d2200316a0d6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54263-incorrect-authorization-cwe-863-in--ce7f93a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54263%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68eeb4a054d2200316a0d6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54277-incorrect-authorization-cwe-863-in--5e2368e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54277&amp;severity=null&amp;id=68eeb4a054d2200316a0d6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54265-incorrect-authorization-cwe-863-in--85d8ddae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54265%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68eeb4a054d2200316a0d6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54264-cross-site-scripting-stored-xss-cwe-aa33f662</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54264%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68eeb4a054d2200316a0d6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pixnapping-attack-lets-attackers-steal-2fa-on-andr-b3579615</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pixnapping%20Attack%20Lets%20Attackers%20Steal%202FA%20on%20Android&amp;severity=low&amp;id=68eef95355734f1608e4f9a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62374-cwe-1321-improperly-controlled-modi-6a068842</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62374%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20Parse-SDK-JS&amp;severity=medium&amp;id=68eeaf1354d220031697493e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61803-integer-overflow-or-wraparound-cwe--ff149b91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61803%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61802-use-after-free-cwe-416-in-adobe-sub-d06a85c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61802%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61805-out-of-bounds-read-cwe-125-in-adobe-c4ef7c84</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61805%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61807-integer-overflow-or-wraparound-cwe--7fbda66a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61807%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61806-out-of-bounds-read-cwe-125-in-adobe-3927684b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61806%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61799-out-of-bounds-read-cwe-125-in-adobe-5087f64a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61799%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61798-out-of-bounds-read-cwe-125-in-adobe-810b93cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61798%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61800-integer-overflow-or-wraparound-cwe--f8961cc7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61800%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61801-use-after-free-cwe-416-in-adobe-dim-840ef41b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61801%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61678-cwe-434-unrestricted-upload-of-file-7e5425aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61678%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FreePBX%20endpointman&amp;severity=high&amp;id=68eea752bbec4fba96d79ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34267-cwe-77-improper-neutralization-of-s-083774ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34267%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68eea752bbec4fba96d79ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61675-cwe-89-improper-neutralization-of-s-bf957697</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61675%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20endpoint&amp;severity=high&amp;id=68eea752bbec4fba96d79edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54283-out-of-bounds-write-cwe-787-in-adob-51e3f098</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54283%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=68eea592ae73b78941f498c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54284-out-of-bounds-write-cwe-787-in-adob-6c64ecde</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54284%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=68eea592ae73b78941f498c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59429-cwe-79-improper-neutralization-of-i-15a741e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59429%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FreePBX%20core&amp;severity=high&amp;id=68eea592ae73b78941f498ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33177-cwe-400-uncontrolled-resource-consu-1d8a8e0a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33177%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20NVIDIA%20Jetson%20Orin%20Series&amp;severity=medium&amp;id=68eea752bbec4fba96d79ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54282-heap-based-buffer-overflow-cwe-122--ef0b522b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54282%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=68eea752bbec4fba96d79ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54281-use-after-free-cwe-416-in-adobe-ado-120ffdc8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54281%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=68eea592ae73b78941f498d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59051-cwe-78-improper-neutralization-of-s-aa3be3c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59051%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20endpoint&amp;severity=high&amp;id=68eea592ae73b78941f498d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54276-out-of-bounds-read-cwe-125-in-adobe-93f24f29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54276%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=68eea592ae73b78941f498cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33182-cwe-862-missing-authorization-in-nv-ab250f56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33182%3A%20CWE-862%20Missing%20Authorization%20in%20NVIDIA%20Jetson%20Orin%20Series&amp;severity=high&amp;id=68eea212ae73b78941ef5551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54274-stack-based-buffer-overflow-cwe-121-ceef99e5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54274%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68eea212ae73b78941ef5557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54273-out-of-bounds-write-cwe-787-in-adob-2115cb90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54273%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68eea212ae73b78941ef5554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54275-out-of-bounds-write-cwe-787-in-adob-af035f21</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54275%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=medium&amp;id=68eea212ae73b78941ef555a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54280-out-of-bounds-write-cwe-787-in-adob-cf8ce6f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54280%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68eea212ae73b78941ef555d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bombshell-uefi-shell-vulnerabilities-allow-attacke-7e20677f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BombShell%3A%20UEFI%20shell%20vulnerabilities%20allow%20attackers%20to%20bypass%20Secure%20Boot%20on%20Framework%20Devices&amp;severity=medium&amp;id=68ee9814d8f994a66ec32b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-october-2025-tue-oct-14th-a1d916ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20October%202025%2C%20(Tue%2C%20Oct%2014th)&amp;severity=critical&amp;id=68ee9068f2e93b27b0244a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23356-cwe-306-in-nvidia-isaac-lab-02fa91bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23356%3A%20CWE-306%20in%20NVIDIA%20Isaac%20Lab&amp;severity=high&amp;id=68ee8c743dd1bfb0b7f039c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11736-sql-injection-in-itsourcecode-onlin-0def9c44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11736%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Examination%20System&amp;severity=medium&amp;id=68ee8c743dd1bfb0b7f039cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8459-cwe-79-improper-neutralization-of-in-70aa891d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=68ee8e6cf2e93b27b022870f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37145-vulnerability-in-hewlett-packard-en-6684be75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37145%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59497-cwe-367-time-of-check-time-of-use-t-f2207c75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59497%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Linux&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59289-cwe-415-double-free-in-microsoft-wi-c38b0059</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59289%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59287-cwe-502-deserialization-of-untruste-56bc0296</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59287%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Windows%20Server%202012&amp;severity=critical&amp;id=68ee85903dd1bfb0b7e4238d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59285-cwe-502-deserialization-of-untruste-2ca2fb0b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59285%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=68ee85903dd1bfb0b7e4238a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59278-cwe-1287-improper-validation-of-spe-024a5d81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59278%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59275-cwe-1287-improper-validation-of-spe-60831a5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59275%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37144-vulnerability-in-hewlett-packard-en-51bdb555</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37144%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59261-cwe-367-time-of-check-time-of-use-t-eedfad3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59261%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59260-cwe-200-exposure-of-sensitive-infor-b8069c9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59260%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59253-cwe-284-improper-access-control-in--ca3315a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59253%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858e3dd1bfb0b7e41c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59230-cwe-284-improper-access-control-in--b617baab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59230%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59248-cwe-20-improper-input-validation-in-96deefe3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59248%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59244-cwe-73-external-control-of-file-nam-5dd68607</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59244%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858e3dd1bfb0b7e41c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59241-cwe-59-improper-link-resolution-bef-c6b73d76</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59241%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59238-cwe-416-use-after-free-in-microsoft-e5b46ca1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59238%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59232-cwe-125-out-of-bounds-read-in-micro-dd512353</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59232%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59229-cwe-248-uncaught-exception-in-micro-e06e3bdf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59229%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=68ee858d3dd1bfb0b7e41c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59227-cwe-416-use-after-free-in-microsoft-8fb0e5ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59227%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59226-cwe-416-use-after-free-in-microsoft-6996e114</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59226%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59225-cwe-416-use-after-free-in-microsoft-07e7d3ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59225%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59224-cwe-416-use-after-free-in-microsoft-6a1041af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59224%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59223-cwe-416-use-after-free-in-microsoft-f0267063</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59223%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59222-cwe-416-use-after-free-in-microsoft-19f40732</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59222%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59221-cwe-416-use-after-free-in-microsoft-866c0812</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59221%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59214-cwe-200-exposure-of-sensitive-infor-3faa4ba9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59214%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858d3dd1bfb0b7e40cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59213-cwe-89-improper-neutralization-of-s-06fceafa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59213%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59210-cwe-416-use-after-free-in-microsoft-3137998a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59210%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858c3dd1bfb0b7e40645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59209-cwe-200-exposure-of-sensitive-infor-2f402466</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59209%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858c3dd1bfb0b7e40642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59208-cwe-125-out-of-bounds-read-in-micro-a7982385</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59208%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858c3dd1bfb0b7e4063f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59205-cwe-362-concurrent-execution-using--6654249f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59205%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858b3dd1bfb0b7e40636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59203-cwe-532-insertion-of-sensitive-info-17c36457</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59203%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858b3dd1bfb0b7e40630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59198-cwe-20-improper-input-validation-in-2b863ffc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59198%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e40555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59197-cwe-532-insertion-of-sensitive-info-bd7d79e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59197%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e40552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59194-cwe-908-use-of-uninitialized-resour-17911375</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59194%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59193-cwe-362-concurrent-execution-using--4b5216d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59193%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59192-cwe-126-buffer-over-read-in-microso-a137fea9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59192%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59191-cwe-122-heap-based-buffer-overflow--4190b1de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59191%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e401b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59190-cwe-20-improper-input-validation-in-e690db7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59190%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59189-cwe-416-use-after-free-in-microsoft-77fc7d3f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e401ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59188-cwe-200-exposure-of-sensitive-infor-be84c4a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59188%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202012&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59187-cwe-20-improper-input-validation-in-0f2c2cb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59187%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e401a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59184-cwe-200-exposure-of-sensitive-infor-3c1236c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59184%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e4019f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58739-cwe-200-exposure-of-sensitive-infor-1ba4aa5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58739%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e4019c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58738-cwe-416-use-after-free-in-microsoft-509f47a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58738%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58737-cwe-416-use-after-free-in-microsoft-87d0ae4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58737%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58736-cwe-416-use-after-free-in-microsoft-3101c2b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58736%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58734-cwe-416-use-after-free-in-microsoft-5278606d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58734%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58733-cwe-416-use-after-free-in-microsoft-9455c015</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58733%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58731-cwe-416-use-after-free-in-microsoft-dbb12639</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58731%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58730-cwe-416-use-after-free-in-microsoft-2b826a12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58730%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58729-cwe-1287-improper-validation-of-spe-f2bb59fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58729%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85893dd1bfb0b7e3fd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58727-cwe-362-concurrent-execution-using--1bf6f99c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58727%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58726-cwe-284-improper-access-control-in--ea01f350</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58726%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58725-cwe-122-heap-based-buffer-overflow--850f757c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58725%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58724-cwe-284-improper-access-control-in--1aeb1725</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58724%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Arc%20Enabled%20Servers%20-%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58720-cwe-1240-use-of-a-cryptographic-pri-d34923cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58720%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58718-cwe-416-use-after-free-in-microsoft-b4fec7c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58718%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58714-cwe-284-improper-access-control-in--271deec8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58714%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55699-cwe-200-exposure-of-sensitive-infor-81e44474</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55699%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85873dd1bfb0b7e3f5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55698-cwe-476-null-pointer-dereference-in-fb473587</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55698%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55697-cwe-122-heap-based-buffer-overflow--2ad52d3a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55697%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55696-cwe-367-time-of-check-time-of-use-t-87f24b6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55696%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55695-cwe-125-out-of-bounds-read-in-micro-1886bd6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55695%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85873dd1bfb0b7e3f5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55694-cwe-284-improper-access-control-in--89095ad9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55694%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55693-cwe-416-use-after-free-in-microsoft-2d3e6351</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55693%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55692-cwe-20-improper-input-validation-in-3e26b266</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55692%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55691-cwe-416-use-after-free-in-microsoft-1aca4ea1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55691%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55690-cwe-416-use-after-free-in-microsoft-c1381d18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55690%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55688-cwe-416-use-after-free-in-microsoft-573ff9c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55688%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55684-cwe-416-use-after-free-in-microsoft-34f766d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55684%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55683-cwe-200-exposure-of-sensitive-infor-0761f883</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55683%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55682-cwe-841-improper-enforcement-of-beh-2e6fd883</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55682%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55680-cwe-367-time-of-check-time-of-use-t-9b8ee541</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55680%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55679-cwe-20-improper-input-validation-in-3a0d9005</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55679%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55678-cwe-416-use-after-free-in-microsoft-2fbfb60b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55678%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55337-cwe-841-improper-enforcement-of-beh-e3a99106</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55337%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55334-cwe-312-cleartext-storage-of-sensit-8e598b54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55334%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55332-cwe-841-improper-enforcement-of-beh-98e12cfc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55332%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55331-cwe-416-use-after-free-in-microsoft-a1094552</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55331%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85843dd1bfb0b7e3ed06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55330-cwe-841-improper-enforcement-of-beh-1ee9f15e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55330%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55328-cwe-362-concurrent-execution-using--24c58b07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55328%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85843dd1bfb0b7e3ed00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55326-cwe-416-use-after-free-in-microsoft-d0a5ac77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55326%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55248-cwe-326-inadequate-encryption-stren-f0ae79b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55248%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20Microsoft%20.NET%208.0&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55240-cwe-284-improper-access-control-in--82ce5529</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55240%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53768-cwe-416-use-after-free-in-microsoft-ea18b58d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53768%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53139-cwe-319-cleartext-transmission-of-s-561dafdd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53139%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50175-cwe-416-use-after-free-in-microsoft-f27e8535</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50175%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53150-cwe-416-use-after-free-in-microsoft-8f4aa23a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53150%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50152-cwe-125-out-of-bounds-read-in-micro-bbd882ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50152%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53717-cwe-807-reliance-on-untrusted-input-0e7f2808</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53717%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25004-cwe-284-improper-access-control-in--977be0f8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25004%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20PowerShell%207.4&amp;severity=high&amp;id=68ee85823dd1bfb0b7e3e08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48813-cwe-324-use-of-a-key-past-its-expir-2137d0f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48813%3A%20CWE-324%3A%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59502-cwe-400-uncontrolled-resource-consu-909ed232</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59502%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59494-cwe-284-improper-access-control-in--67771589</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59494%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59295-cwe-122-heap-based-buffer-overflow--a5983a5c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59295%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59294-cwe-200-exposure-of-sensitive-infor-def82b92</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59294%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=68ee85903dd1bfb0b7e4239f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59292-cwe-73-external-control-of-file-nam-0a43e586</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59292%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Azure%20Compute%20Gallery&amp;severity=high&amp;id=68ee85903dd1bfb0b7e4239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59291-cwe-73-external-control-of-file-nam-6560353e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59291%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Azure%20Compute%20Gallery&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59290-cwe-416-use-after-free-in-microsoft-184a8f92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59290%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59288-cwe-347-improper-verification-of-cr-12c453ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59288%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20microsoft%2Fplaywright&amp;severity=medium&amp;id=68ee85903dd1bfb0b7e42390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59284-cwe-200-exposure-of-sensitive-infor-532dc7c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59284%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=low&amp;id=68ee85903dd1bfb0b7e42387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59282-cwe-362-concurrent-execution-using--5d6ff542</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59282%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59281-cwe-59-improper-link-resolution-bef-d1a1da96</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59281%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Xbox%20Gaming%20Services&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47979-cwe-532-insertion-of-sensitive-info-8b87495a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47979%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59280-cwe-287-improper-authentication-in--01409627</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59280%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=68ee858f3dd1bfb0b7e41d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59277-cwe-1287-improper-validation-of-spe-df8e1cb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59277%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59259-cwe-1287-improper-validation-of-spe-53758d07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59259%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59258-cwe-532-insertion-of-sensitive-info-c7b270c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59258%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%20Server%202012&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59257-cwe-1287-improper-validation-of-spe-1e714fad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59257%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59255-cwe-122-heap-based-buffer-overflow--8779f984</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59255%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59254-cwe-122-heap-based-buffer-overflow--5942782f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59254%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59250-cwe-20-improper-input-validation-in-87e97893</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59250%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20JDBC%20Driver%20for%20SQL%20Server%2010.2&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59249-cwe-1390-weak-authentication-in-mic-4ae2aadb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59249%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59243-cwe-416-use-after-free-in-microsoft-f0065a25</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59243%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49708-cwe-416-use-after-free-in-microsoft-5623b877</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49708%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=critical&amp;id=68ee85833dd1bfb0b7e3e65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59242-cwe-122-heap-based-buffer-overflow--733db26c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59242%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59237-cwe-502-deserialization-of-untruste-55ba3e2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59237%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59236-cwe-416-use-after-free-in-microsoft-1095d1e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59236%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59235-cwe-125-out-of-bounds-read-in-micro-7ae4b377</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59235%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59234-cwe-416-use-after-free-in-microsoft-260e4267</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59234%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59233-cwe-843-access-of-resource-using-in-96187bb9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59233%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59231-cwe-843-access-of-resource-using-in-55cc6b67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59231%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59228-cwe-20-improper-input-validation-in-705799c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59228%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59211-cwe-200-exposure-of-sensitive-infor-6caf2516</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59211%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858c3dd1bfb0b7e40648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59207-cwe-822-untrusted-pointer-dereferen-23c06e08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59207%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858c3dd1bfb0b7e4063c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59206-cwe-416-use-after-free-in-microsoft-74cb6fe5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59206%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858b3dd1bfb0b7e40639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59204-cwe-908-use-of-uninitialized-resour-9b508cfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59204%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee858b3dd1bfb0b7e40633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59202-cwe-416-use-after-free-in-microsoft-e1407c22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59202%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68ee858b3dd1bfb0b7e4062d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59201-cwe-284-improper-access-control-in--8dc0bac6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59201%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4055e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59200-cwe-362-concurrent-execution-using--6419bb7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59200%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4055b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59199-cwe-284-improper-access-control-in--bb7bc249</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59199%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59196-cwe-362-concurrent-execution-using--1a0ba6ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59196%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4054f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59195-cwe-362-concurrent-execution-using--6b7aee0c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59195%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4054c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59186-cwe-200-exposure-of-sensitive-infor-847cdccc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59186%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59185-cwe-73-external-control-of-file-nam-ea154171</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59185%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58735-cwe-416-use-after-free-in-microsoft-2088f594</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58735%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58732-cwe-416-use-after-free-in-microsoft-e834bbbb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58732%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58728-cwe-416-use-after-free-in-microsoft-0a6667e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58728%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58722-cwe-122-heap-based-buffer-overflow--255756a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58722%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58719-cwe-416-use-after-free-in-microsoft-e4816b3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58719%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68ee85883dd1bfb0b7e3f8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58717-cwe-125-out-of-bounds-read-in-micro-a929dcba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58717%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85883dd1bfb0b7e3f8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37143-vulnerability-in-hewlett-packard-en-b7c7b7a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37143%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58716-cwe-20-improper-input-validation-in-9be34fe1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58716%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58715-cwe-190-integer-overflow-or-wraparo-0e930cfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58715%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55701-cwe-1287-improper-validation-of-spe-2a73f269</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55701%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55700-cwe-125-out-of-bounds-read-in-micro-86fa41e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55700%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85873dd1bfb0b7e3f5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55689-cwe-416-use-after-free-in-microsoft-462043ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55689%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55687-cwe-362-concurrent-execution-using--fcd80125</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55687%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55686-cwe-416-use-after-free-in-microsoft-dcdd1a64</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55686%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55685-cwe-416-use-after-free-in-microsoft-552d4e32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55685%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55681-cwe-125-out-of-bounds-read-in-micro-d0bbfee9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55681%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55677-cwe-822-untrusted-pointer-dereferen-61d063a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55677%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55676-cwe-209-generation-of-error-message-ef0cb86b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55676%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55340-cwe-287-improper-authentication-in--1ca77a4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55340%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55339-cwe-125-out-of-bounds-read-in-micro-733fcc01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55339%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55338-security-feature-bypass-in-microsof-dcc69d37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55338%3A%20CWE-1310%3A%20Missing%20Ability%20to%20Patch%20ROM%20Code%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55336-cwe-200-exposure-of-sensitive-infor-4fea751f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55336%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55335-cwe-416-use-after-free-in-microsoft-02bc342d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55335%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85843dd1bfb0b7e3ed12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55333-cwe-1023-incomplete-comparison-with-0b489e65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55333%3A%20CWE-1023%3A%20Incomplete%20Comparison%20with%20Missing%20Factors%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55325-cwe-126-buffer-over-read-in-microso-5ecffc49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55325%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55320-cwe-89-improper-neutralization-of-s-7d3b6790</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55320%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24052-cwe-121-stack-based-buffer-overflow-36ea267a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24052%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85823dd1bfb0b7e3e089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24990-cwe-822-untrusted-pointer-dereferen-403d3e5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24990%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85823dd1bfb0b7e3e08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55315-cwe-444-inconsistent-interpretation-f826b6db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55315%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Microsoft%20ASP.NET%20Core%202.3&amp;severity=critical&amp;id=68ee85833dd1bfb0b7e3e745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55247-cwe-59-improper-link-resolution-bef-75809cdd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55247%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53782-cwe-303-incorrect-implementation-of-6fe53990</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53782%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50174-cwe-416-use-after-free-in-microsoft-e932973e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50174%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48004-cwe-416-use-after-free-in-microsoft-20e805a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48004%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47989-cwe-284-improper-access-control-in--ae8ae1be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47989%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Arc%20Enabled%20Servers%20-%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37142-vulnerability-in-hewlett-packard-en-2012c30d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37142%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37141-vulnerability-in-hewlett-packard-en-4af9352d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37141%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37140-vulnerability-in-hewlett-packard-en-86736df7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37140%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37139-vulnerability-in-hewlett-packard-en-17619d8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37139%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37138-vulnerability-in-hewlett-packard-en-11c61a2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37138%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37137-vulnerability-in-hewlett-packard-en-060e608d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37137%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e89a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37136-vulnerability-in-hewlett-packard-en-19e09fd4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37136%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37135-vulnerability-in-hewlett-packard-en-c5c0c55e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37135%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37134-vulnerability-in-hewlett-packard-en-f0363fc7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37134%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee81fc8fa40b621b08e891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-exploit-arcgis-server-as-backdoor--d4665610</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Exploit%20ArcGIS%20Server%20as%20Backdoor%20for%20Over%20a%20Year&amp;severity=medium&amp;id=68ee81d88fa40b621b088938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8430-cwe-79-improper-neutralization-of-in-417e72bb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8430%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37133-vulnerability-in-hewlett-packard-en-391ae6c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37133%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee81fc8fa40b621b08e88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37132-vulnerability-in-hewlett-packard-en-30298e0a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37132%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee81fc8fa40b621b08e88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11548-cwe-94-improper-control-of-generati-deb7e16b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11548%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ibi%20WebFOCUS&amp;severity=critical&amp;id=68ee81fc8fa40b621b08e8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37148-vulnerability-in-hewlett-packard-en-1c3050f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37148%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee7e6d8fa40b621b022aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37147-vulnerability-in-hewlett-packard-en-0411cf35</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37147%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee7e6d8fa40b621b022aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37146-vulnerability-in-hewlett-packard-en-3ecd48a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37146%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee7e6d8fa40b621b022aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pixnapping-android-flaw-lets-rogue-apps-steal--d59fda90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Pixnapping%20Android%20Flaw%20Lets%20Rogue%20Apps%20Steal%202FA%20Codes%20Without%20Permissions&amp;severity=high&amp;id=68ee772175ce224a043334e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-abuse-geo-mapping-tool-for-year-lo-6eeb6b1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20hackers%20abuse%20geo-mapping%20tool%20for%20year-long%20persistence&amp;severity=high&amp;id=68ee772175ce224a043334ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/secure-boot-bypass-risk-threatens-nearly-200000-li-27b76ca8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Secure%20Boot%20bypass%20risk%20threatens%20nearly%20200%2C000%20Linux%20Framework%20laptops&amp;severity=high&amp;id=68ee772175ce224a043334e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37149-vulnerability-in-hewlett-packard-en-1217854d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37149%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ProLiant%20RL300%20Gen11%20Server&amp;severity=medium&amp;id=68ee73a175ce224a042d3465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11577-cwe-321-use-of-hardcoded-cryptograp-df81799a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11577%3A%20CWE-321%20Use%20of%20Hard%E2%80%91coded%20Cryptographic%20Key%20in%20Clevo%20Notebook%20System%20Firmware&amp;severity=high&amp;id=68ee702b75ce224a0426b537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8429-cwe-79-improper-neutralization-of-in-7e968e10</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee702c75ce224a0426b924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54893-cwe-79-improper-neutralization-of-i-9044cf01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee702c75ce224a0426b914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31514-information-disclosure-in-fortinet--81a7aba5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31514%3A%20Information%20disclosure%20in%20Fortinet%20FortiProxy&amp;severity=low&amp;id=68ee702b75ce224a0426b559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46774-escalation-of-privilege-in-fortinet-78ff3290</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46774%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientMac&amp;severity=medium&amp;id=68ee702c75ce224a0426b90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54822-improper-access-control-in-fortinet-f50df995</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54822%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee702c75ce224a0426b911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62366-cwe-79-improper-neutralization-of-i-5d324b7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62366%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eladnava%20mailgen&amp;severity=low&amp;id=68ee702c75ce224a0426b920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31365-execute-unauthorized-code-or-comman-6d08eeb0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31365%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientMac&amp;severity=medium&amp;id=68ee702b75ce224a0426b556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53845-improper-access-control-in-fortinet-0d010291</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53845%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=68ee702c75ce224a0426b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59921-information-disclosure-in-fortinet--ae1dab5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59921%3A%20Information%20disclosure%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=68ee702c75ce224a0426b91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33507-denial-of-service-privilege-escalat-f9d56898</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33507%3A%20Denial%20of%20service%2C%20Privilege%20escalation%20in%20Fortinet%20FortiIsolator&amp;severity=high&amp;id=68ee702b75ce224a0426b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57716-execute-unauthorized-code-or-comman-613daaa3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57716%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=68ee702c75ce224a0426b91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25255-improper-access-control-in-fortinet-9cb7d4fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25255%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68ee702b75ce224a0426b553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25252-improper-access-control-in-fortinet-bc7a1be9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25252%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68ee702b75ce224a0426b550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26008-denial-of-service-in-fortinet-forti-221c90fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26008%3A%20Denial%20of%20service%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee702b75ce224a0426b542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47569-information-disclosure-in-fortinet--0f5d4aa2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47569%3A%20Information%20disclosure%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=68ee702b75ce224a0426b549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54973-improper-access-control-in-fortinet-5626ba59</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54973%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=68ee702c75ce224a0426b917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46718-execute-unauthorized-code-or-comman-48b25376</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46718%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68ee702b75ce224a0426b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50571-execute-unauthorized-code-or-comman-13926225</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50571%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=68ee702b75ce224a0426b54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31366-improper-access-control-in-fortinet-2b86f10d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31366%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e04032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22258-escalation-of-privilege-in-fortinet-46345852</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22258%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiPAM&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e0402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25253-information-disclosure-in-fortinet--ee20411d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25253%3A%20Information%20disclosure%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e0402f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57740-execute-unauthorized-code-or-comman-0f3cebcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57740%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e0403b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47890-improper-access-control-in-fortinet-e6626c76</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47890%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSASE&amp;severity=low&amp;id=68ee6cbb1b3029e3c7e04035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57741-escalation-of-privilege-in-fortinet-9a6930de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57741%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientMac&amp;severity=high&amp;id=68ee6cbb1b3029e3c7e0403e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49201-execute-unauthorized-code-or-comman-c178c16f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49201%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=high&amp;id=68ee6cbb1b3029e3c7e04038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58325-escalation-of-privilege-in-fortinet-8447598b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58325%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=68ee6cbb1b3029e3c7e04044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58324-execute-unauthorized-code-or-comman-787c7b0d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58324%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e04041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58903-denial-of-service-in-fortinet-forti-5d572aa2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58903%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=68ee6cbc1b3029e3c7e04054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48891-escalation-of-privilege-in-fortinet-eb4cdc48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48891%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e04029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62172-cwe-80-improper-neutralization-of-s-87ef0280</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62172%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20home-assistant%20core&amp;severity=high&amp;id=68ee6cbc1b3029e3c7e04057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54891-cwe-79-improper-neutralization-of-i-4abddc9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee69461b3029e3c7d96f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62157-cwe-522-insufficiently-protected-cr-58061e6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62157%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=68ee69461b3029e3c7d96f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54892-cwe-79-improper-neutralization-of-i-790983b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee69461b3029e3c7d96f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54889-cwe-79-improper-neutralization-of-i-4d227b00</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee65b283f5d4e8a43ff594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62156-cwe-22-improper-limitation-of-a-pat-829c0aa8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62156%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=68ee65b283f5d4e8a43ff597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0033-cwe-284-improper-access-control-in-a-aa8c05fe</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0033%3A%20CWE-284%20%20Improper%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors%20(formerly%20codenamed%20%22Milan%22)&amp;severity=medium&amp;id=68ee6aa71b3029e3c7dc1688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44088-cwe-79-improper-neutralization-of-i-16a1770e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Geode&amp;severity=medium&amp;id=68ee623083f5d4e8a43949f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5946-cwe-78-improper-neutralization-of-sp-071c6d2a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5946%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=68ee5f184c738d5ce3163a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10986-cwe-22-improper-limitation-of-a-pat-52f1e296</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10986%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=medium&amp;id=68ee5f184c738d5ce3163a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8428-cwe-79-improper-neutralization-of-in-b53b8284</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee5f184c738d5ce3163a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10985-cwe-78-improper-neutralization-of-s-7d0c7eb7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10985%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=68ee5f184c738d5ce3163a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10243-cwe-78-improper-neutralization-of-s-78f16f8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10243%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=68ee639883f5d4e8a43c4d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10242-cwe-78-improper-neutralization-of-s-f6d95e81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10242%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=68ee639883f5d4e8a43c4d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27906-cwe-548-exposure-of-information-thr-b2ea9622</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27906%3A%20CWE-548%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20IBM%20Content%20Navigator&amp;severity=medium&amp;id=68ee639883f5d4e8a43c4d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-limits-ie-mode-in-edge-after-chakra-zero-7c1f8e3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Limits%20IE%20Mode%20in%20Edge%20After%20Chakra%20Zero-Day%20Activity%20Detected&amp;severity=critical&amp;id=68ee5b974c738d5ce30f2a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33044-cwe-119-improper-restriction-of-ope-7fe1e62b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33044%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22833-cwe-787-out-of-bounds-write-in-ami--2eae5f4a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22833%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7daf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22832-cwe-787-out-of-bounds-write-in-ami--cd19ef40</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22832%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22831-cwe-787-out-of-bounds-write-in-ami--f00835d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22831%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-vulnerabilities-in-netweaver--1140eff4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20Vulnerabilities%20in%20NetWeaver%2C%20Print%20Service%2C%20SRM&amp;severity=critical&amp;id=68ee587d2f0a6ddb6c7aeab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47856-execute-unauthorized-code-or-comman-2b934ff5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47856%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=high&amp;id=68ee550c2f0a6ddb6c734b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9178-cwe-787-out-of-bounds-write-in-rockw-58d4a8d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9178%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Rockwell%20Automation%201715-AENTR%20EtherNet%2FIP%20Adapter&amp;severity=high&amp;id=68ee4b3a509368ccaa76d788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9177-cwe-770-allocation-of-resources-with-32c13096</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9177%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Rockwell%20Automation%201715-AENTR%20EtherNet%2FIP%20Adapter&amp;severity=high&amp;id=68ee4b3a509368ccaa76d785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-is-first-confirmed-victim-of-oracle-ebs-ze-98b0275d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20Is%20First%20Confirmed%20Victim%20of%20Oracle%20EBS%20Zero-Day%20Hack&amp;severity=medium&amp;id=68ee47b1509368ccaa6f7316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7330-cwe-352-cross-site-request-forgery-c-31e9a41f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7330%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rockwell%20Automation%20Comms%20-%201783-NATR&amp;severity=high&amp;id=68ee47d0509368ccaa6fc9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10610-cwe-89-improper-neutralization-of-s-9e6b2322</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10610%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SFS%20Consulting%20Information%20Processing%20Industry%20and%20Foreign%20Trade%20Inc.%20Winsure&amp;severity=critical&amp;id=68ee47cf509368ccaa6fc896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11498-cwe-1236-improper-neutralization-of-67b4f8c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11498%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20B%26R%20Industrial%20Automation%20GmbH%20Automation%20Runtime&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7329-cwe-79-improper-neutralization-of-in-db8c44d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7329%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rockwell%20Automation%20Comms%20-%201783-NATR&amp;severity=high&amp;id=68ee47d0509368ccaa6fc9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7328-cwe-306-missing-authentication-for-c-505b1ccf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7328%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Rockwell%20Automation%20Comms%20-%201783-NATR&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11720-spoofing-risk-in-android-custom-tab-3f789d77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11720%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47d0509368ccaa6fc9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11718-address-bar-could-be-spoofed-on-and-9693bd23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11718%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47d0509368ccaa6fc99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11717-the-password-edit-screen-was-not-hi-d0c1a0a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11717%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11721-memory-safety-bug-fixed-in-firefox--034643e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11721%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11719-use-after-free-caused-by-the-native-2eb86c2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11719%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11716-sandboxed-iframes-allowed-links-to--85e6e601</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11716%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11715-memory-safety-bugs-fixed-in-firefox-d7d91895</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11715%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47cf509368ccaa6fc8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11713-potential-user-assisted-code-execut-9f1c24fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11713%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47cf509368ccaa6fc8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11712-an-object-tag-type-attribute-overro-f7980773</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11712%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11708-use-after-free-in-mediatrackgraphim-8aefe1c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11708%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47cf509368ccaa6fc89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11714-memory-safety-bugs-fixed-in-firefox-d179cdde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11714%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47cf509368ccaa6fc8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11711-some-non-writable-object-properties-72a5cfe7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11711%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11710-cross-process-information-leaked-du-9a26668c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11710%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47cf509368ccaa6fc8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11709-out-of-bounds-readwrite-in-a-privil-26725319</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11709%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee4920509368ccaa72487e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9067-cwe-269-improper-privilege-managemen-3abe94b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9067%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Rockwell%20Automation%20FactoryTalk%20Linx&amp;severity=high&amp;id=68ee4920509368ccaa72488f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9124-cwe-248-uncaught-exception-in-rockwe-0bc4e2be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9124%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Rockwell%20Automation%20Compact%20GuardLogix%C2%AE%205370&amp;severity=high&amp;id=68ee4920509368ccaa724895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9068-cwe-269-improper-privilege-managemen-21f0c63f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9068%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Rockwell%20Automation%20FactoryTalk%20Linx&amp;severity=high&amp;id=68ee4920509368ccaa724892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9064-cwe-287-improper-authentication-in-r-5ddcf4cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9064%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Rockwell%20Automation%20FactoryTalk%20View%20Machine%20Edition&amp;severity=high&amp;id=68ee4920509368ccaa724889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9063-cwe-287-improper-authentication-in-r-f43c7d7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9063%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Rockwell%20Automation%20PanelView%20Plus%207%20Performance%20Series%20B&amp;severity=high&amp;id=68ee4920509368ccaa724886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9066-cwe-20-improper-input-validation-in--3202352d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9066%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20FactoryTalk%20ViewPoint&amp;severity=high&amp;id=68ee4920509368ccaa72488c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9437-cwe-755-improper-handling-of-excepti-a334b193</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9437%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Rockwell%20Automation%20ArmorStart%20AOP&amp;severity=high&amp;id=68ee412a6844b28d82f10590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pixnapping-attack-steals-data-from-google-samsung--bad7c6fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pixnapping%20Attack%20Steals%20Data%20From%20Google%2C%20Samsung%20Android%20Phones&amp;severity=medium&amp;id=68ee3a7865eb75fc048633fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rmpocalypse-single-8-byte-write-shatters-amds-sev--d47e3566</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RMPocalypse%3A%20Single%208-Byte%20Write%20Shatters%20AMD%E2%80%99s%20SEV-SNP%20Confidential%20Computing&amp;severity=medium&amp;id=68eef85f55734f1608e47850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intents-android-12-fonctionnement-scurit-et-exempl-ab4e6ba9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intents%20Android%20(1%2F2)%20%3A%20fonctionnement%2C%20s%C3%A9curit%C3%A9%20et%20exemples%20d&apos;attaques&amp;severity=medium&amp;id=68ee3773f4a587eca87a8509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pixnapping-android-flaw-lets-rogue-apps-steal--7c977b39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Pixnapping%20Android%20Flaw%20Lets%20Rogue%20Apps%20Steal%202FA%20Codes%20Without%20Permissions&amp;severity=medium&amp;id=68eef85f55734f1608e47853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-ai-reveals-about-web-applications-and-why-it--639e85dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20AI%20Reveals%20About%20Web%20Applications%E2%80%94%20and%20Why%20It%20Matters&amp;severity=low&amp;id=68eef85f55734f1608e47856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rmpocalypse-new-attack-breaks-amd-confidential-com-3064afef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RMPocalypse%3A%20New%20Attack%20Breaks%20AMD%20Confidential%20Computing&amp;severity=low&amp;id=68ee2d1aeab6788b87c8510e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-10-still-on-over-40-of-devices-as-it-reach-7d3b7fce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2010%20Still%20on%20Over%2040%25%20of%20Devices%20as%20It%20Reaches%20End%20of%20Support&amp;severity=medium&amp;id=68ee1fe5fadadd4ae262ba32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-pypi-and-rubygems-packages-found-sending-devel-7f81f155</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%2C%20PyPI%2C%20and%20RubyGems%20Packages%20Found%20Sending%20Developer%20Data%20to%20Discord%20Channels&amp;severity=high&amp;id=68ee2008fadadd4ae263392a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/astaroth-trojan-targets-windows-uses-github-images-4d9a7ae3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Astaroth%20Trojan%20Targets%20Windows%2C%20Uses%20GitHub%20Images%20to%20Stay%20Active%20After%20Takedowns&amp;severity=medium&amp;id=68ee2008fadadd4ae263392e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unverified-cots-hardware-enables-persistent-attack-27301b7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unverified%20COTS%20hardware%20enables%20persistent%20attacks%20in%20small%20satellites%20via%20SpyChain&amp;severity=medium&amp;id=68ee2008fadadd4ae2633932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10228-cwe-384-session-fixation-in-rolanti-40f2e4fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10228%3A%20CWE-384%20Session%20Fixation%20in%20Rolantis%20Information%20Technologies%20Agentis&amp;severity=high&amp;id=68ee16307eab8b438c025d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40812-cwe-125-out-of-bounds-read-in-sieme-e9e76491</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40811-cwe-125-out-of-bounds-read-in-sieme-07b3932b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40811%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40810-cwe-787-out-of-bounds-write-in-siem-b13e8bc3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40810%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40809-cwe-787-out-of-bounds-write-in-siem-39a22030</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40809%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40774-cwe-257-storing-passwords-in-a-reco-2664a477</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40774%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Siemens%20SiPass%20integrated&amp;severity=medium&amp;id=68ee16327eab8b438c025d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40773-cwe-639-authorization-bypass-throug-190cbd72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40773%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Siemens%20SiPass%20integrated&amp;severity=low&amp;id=68ee16327eab8b438c025d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40772-cwe-79-improper-neutralization-of-i-6fb5df8a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40772%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20SiPass%20integrated&amp;severity=high&amp;id=68ee16327eab8b438c025d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40771-cwe-306-missing-authentication-for--c662fe93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40771%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20SIMATIC%20CP%201542SP-1&amp;severity=critical&amp;id=68ee16317eab8b438c025d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40765-cwe-306-missing-authentication-for--e591b3ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40765%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20TeleControl%20Server%20Basic%20V3.1&amp;severity=critical&amp;id=68ee16317eab8b438c025d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40755-cwe-89-improper-neutralization-of-s-c3cfa8d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40755%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=68ee16317eab8b438c025d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20724-cwe-125-out-of-bounds-read-in-media-b812432a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20724%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=68ee16317eab8b438c025d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20717-cwe-121-stack-overflow-in-mediatek--fb0f91e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20717%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20716-cwe-787-out-of-bounds-write-in-medi-2b148028</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20716%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20715-cwe-787-out-of-bounds-write-in-medi-41d2d89a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20715%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20723-cwe-787-out-of-bounds-write-in-medi-8451e58a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20723%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8775%2C%20MT8791T%2C%20MT8796%2C%20MT8873&amp;severity=high&amp;id=68ee16317eab8b438c025d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20722-cwe-190-integer-overflow-in-mediate-e2646c80</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20722%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6980D%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8775%2C%20MT8791T%2C%20MT8796%2C%20MT8873&amp;severity=medium&amp;id=68ee16317eab8b438c025d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20714-cwe-121-stack-overflow-in-mediatek--064e4a57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20714%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20713-cwe-121-stack-overflow-in-mediatek--41b8193b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20713%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20721-cwe-787-out-of-bounds-write-in-medi-4eb918e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20721%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8195%2C%20MT8196%2C%20MT8370%2C%20MT8390%2C%20MT8395%2C%20MT8792%2C%20MT8793&amp;severity=high&amp;id=68ee16317eab8b438c025d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20720-cwe-122-heap-overflow-in-mediatek-i-3c87af6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20720%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7603%2C%20MT7615%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16317eab8b438c025d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20719-cwe-121-stack-overflow-in-mediatek--d236e968</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20719%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7603%2C%20MT7615%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16317eab8b438c025d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20718-cwe-121-stack-overflow-in-mediatek--753dd459</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20718%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16317eab8b438c025d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20709-cwe-120-classic-buffer-overflow-in--eb16bfe2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20709%3A%20CWE-120%20Classic%20Buffer%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20710-cwe-190-integer-overflow-in-mediate-a7e820e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20710%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20711-cwe-1287-specified-type-in-mediatek-fc0942b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20711%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20712-cwe-122-heap-overflow-in-mediatek-i-d5f66391</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20712%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6990%2C%20MT7990%2C%20MT7991%2C%20MT7992%2C%20MT7993&amp;severity=high&amp;id=68ee16307eab8b438c025d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/banking-trojan-abusing-github-for-resilience-c9f6e401</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Banking%20Trojan%20Abusing%20GitHub%20for%20Resilience&amp;severity=medium&amp;id=68ee16217eab8b438c022a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46581-cwe-94-improper-control-of-generati-d70ae5ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46581%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ZTE%20ZXCDN&amp;severity=critical&amp;id=68ee12ad7eab8b438cfa7656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41699-cwe-94-improper-control-of-generati-b83ab47f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41699%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=68ee0c499bdcb32828080e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-ta585s-monsterv2-malware-capabi-93ef58cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20TA585%E2%80%99s%20MonsterV2%20Malware%20Capabilities%20and%20Attack%20Chain&amp;severity=high&amp;id=68ee0c389bdcb3282807d1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/streamlining-vulnerability-research-with-the-idali-ad5388b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Streamlining%20Vulnerability%20Research%20with%20the%20idalib%20Rust%20Bindings%20for%20IDA%209.2%20-%20HN%20Security&amp;severity=medium&amp;id=68ee0c4a9bdcb32828081204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41718-cwe-319-cleartext-transmission-of-s-16a7a6f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41718%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Murrelektronik%20Firmware%20Impact67%20Pro%2054630&amp;severity=high&amp;id=68ee0c499bdcb32828080e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41707-cwe-120-buffer-copy-without-checkin-d09ef133</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41707%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41706-cwe-120-buffer-copy-without-checkin-0f218ffa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41706%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41705-cwe-523-unprotected-transport-of-cr-8f6ad93b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41705%3A%20CWE-523%20Unprotected%20Transport%20of%20Credentials%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41704-cwe-770-allocation-of-resources-wit-fc6345fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41704%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41703-cwe-306-missing-authentication-for--b00c23de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41703%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=high&amp;id=68ee0d9d9bdcb328280b3ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55078-cwe-233-improper-handling-of-parame-9d51b4d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55078%3A%20CWE-233%20Improper%20Handling%20of%20Parameters%20in%20Eclipse%20Foundation%20ThreadX&amp;severity=medium&amp;id=68edfbefcfc28f75da6ec64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-pypi-and-rubygems-packages-found-sending-devel-5d3d22fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%2C%20PyPI%2C%20and%20RubyGems%20Packages%20Found%20Sending%20Developer%20Data%20to%20Discord%20Channels&amp;severity=medium&amp;id=68eef85f55734f1608e47859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11731-access-of-resource-using-incompatib-b846153a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11731%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)&amp;severity=low&amp;id=68edeb573aa78542cebbacfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8594-cwe-918-server-side-request-forgery--266e1754</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8594%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Pz-LinkCard&amp;severity=low&amp;id=68edeb573aa78542cebbad00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10357-cwe-79-cross-site-scripting-xss-in--71bf745c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10357%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Simple%20SEO&amp;severity=medium&amp;id=68edeb573aa78542cebbacf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10732-cwe-862-missing-authorization-in-br-3eb8f7e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10732%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=medium&amp;id=68ede1c61a06eb79bea0b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59889-cwe-427-uncontrolled-search-path-el-5a993389</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59889%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Eaton%20Eaton%20IPP%20software&amp;severity=high&amp;id=68edde4b1a06eb79be991ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-critical-bugs-in-adobe-experience-manager-a7d1cbf2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20Critical%20Bugs%20in%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=68edd1460a9b8f553a63bd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-the-monster-bytes-tracking-ta585-and-its-arse-4d0ae5ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20the%20monster%20bytes%3A%20tracking%20TA585%20and%20its%20arsenal&amp;severity=medium&amp;id=68ee12a37eab8b438cfa6e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42939-cwe-863-incorrect-authorization-in--34a47f5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42939%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Manage%20Processing%20Rules%20-%20For%20Bank%20Statements)&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42937-cwe-35-path-traversal-in-sapse-sap--b5678cbf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42937%3A%20CWE-35%3A%20Path%20Traversal%20in%20SAP_SE%20SAP%20Print%20Service&amp;severity=critical&amp;id=68ed9e3ae121319cf76b7b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42910-cwe-434-unrestricted-upload-of-file-49ee3843</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42910%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management&amp;severity=critical&amp;id=68ed9e3ae121319cf76b7b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42909-cwe-1004-sensitive-cookie-without-h-2fee8b90</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42909%3A%20CWE-1004%3A%20Sensitive%20Cookie%20Without%20HttpOnly%20Flag%20in%20SAP_SE%20SAP%20Cloud%20Appliance%20Library%20Appliances&amp;severity=low&amp;id=68ed9e3ae121319cf76b7b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42908-cwe-352-cross-site-request-forgery--cebee152</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42908%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42906-cwe-22-improper-limitation-of-a-pat-605d17db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42906%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20Commerce%20Cloud&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42903-cwe-204-observable-response-discrep-b3df29bd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42903%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20SAP_SE%20SAP%20Financial%20Service%20Claims%20Management&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42902-cwe-476-null-pointer-dereference-in-df41b2c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42902%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20SAP_SE%20SAP%20Netweaver%20AS%20ABAP%20and%20ABAP%20Platform&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42901-cwe-94-improper-control-of-generati-9b6e0af6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42901%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Application%20Server%20for%20ABAP%20(BAPI%20Browser)&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-14-5bfe3b3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-14&amp;severity=medium&amp;id=68eee8a6b519a370726fef6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60374-na-0ee40893</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60374%3A%20n%2Fa&amp;severity=medium&amp;id=68eeacdbbbec4fba96e15baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60540-na-005c1fd7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60540%3A%20n%2Fa&amp;severity=medium&amp;id=68eea752bbec4fba96d79ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60537-na-53053d84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60537%3A%20n%2Fa&amp;severity=medium&amp;id=68ee8e6cf2e93b27b022870a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60536-na-f6295c18</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60536%3A%20n%2Fa&amp;severity=high&amp;id=68ee8e6cf2e93b27b0228705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57618-na-709eed91</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57618%3A%20n%2Fa&amp;severity=high&amp;id=68ee88ef3dd1bfb0b7e95c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57563-na-5c5f5539</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57563%3A%20n%2Fa&amp;severity=medium&amp;id=68ee88ef3dd1bfb0b7e95c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60535-na-f5020c8e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60535%3A%20n%2Fa&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54603-na-09d577f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54603%3A%20n%2Fa&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56747-na-c0463182</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56747%3A%20n%2Fa&amp;severity=medium&amp;id=68ee6aa71b3029e3c7dc168b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62363-cwe-59-improper-link-resolution-bef-0bed9b13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62363%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20zheny-creator%20YtGrabber-TUI&amp;severity=high&amp;id=68ed73a7efcc33289f4e04fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62362-cwe-359-exposure-of-private-persona-6c4a41d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62362%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20GPP-Woo%20GPP-burgerportaal&amp;severity=medium&amp;id=68ed73a7efcc33289f4e04f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62361-cwe-601-url-redirection-to-untruste-b694bc0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62361%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68ed702cefcc33289f469148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62360-cwe-89-improper-neutralization-of-s-f2c80d34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62360%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68ed702cefcc33289f469154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62251-cwe-732-incorrect-permission-assign-53240f75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62251%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed702cefcc33289f46914c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62359-cwe-79-improper-neutralization-of-i-350bf7fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62359%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68ed702cefcc33289f46914f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62358-cwe-79-improper-neutralization-of-i-19e93bc5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62358%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62179-cwe-89-improper-neutralization-of-s-52a05542</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62179%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68ed6d2e38344d8bcf324872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62384-cwe-89-improper-neutralization-of-s-0ae68dd9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62384%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf32487d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62386-cwe-89-improper-neutralization-of-s-dc44eca4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62386%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62383-cwe-89-improper-neutralization-of-s-a7bf65f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62383%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf32487a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62391-cwe-89-improper-neutralization-of-s-d947fb12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62391%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62178-cwe-79-improper-neutralization-of-i-af2eb4f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62178%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=68ed6d2e38344d8bcf32486d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62385-cwe-89-improper-neutralization-of-s-a9c0b82e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62385%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62387-cwe-89-improper-neutralization-of-s-d0cf5ea6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62387%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62388-cwe-89-improper-neutralization-of-s-dfdc5512</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62388%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62389-cwe-89-improper-neutralization-of-s-ef7721d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62389%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62390-cwe-89-improper-neutralization-of-s-28fe940a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62390%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62392-cwe-89-improper-neutralization-of-s-2d649999</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62392%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62177-cwe-89-improper-neutralization-of-s-cea4d891</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62177%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68ed6d2e38344d8bcf324869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11623-cwe-89-improper-neutralization-of-s-be0efed1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11623%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9713-cwe-22-improper-limitation-of-a-path-84467dc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9713%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=68ed718fefcc33289f495f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11622-cwe-502-deserialization-of-untruste-cdfd6d4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11622%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=68ed718fefcc33289f495f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61688-cwe-200-exposure-of-sensitive-infor-db5e4078</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61688%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20siderolabs%20omni&amp;severity=high&amp;id=68ed66ece828b4dd3cc6ab2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59836-cwe-703-improper-check-or-handling--54944e44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59836%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20siderolabs%20omni&amp;severity=medium&amp;id=68ed66ece828b4dd3cc6ab26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62252-cwe-639-authorization-bypass-throug-80773cbb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62252%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed66ece828b4dd3cc6ab2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-releases-emergency-patch-for-new-e-business-e88d1bc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20releases%20emergency%20patch%20for%20new%20E-Business%20Suite%20flaw&amp;severity=critical&amp;id=68ed66bee828b4dd3cc60f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-multi-country-botnet-targets-rdp-services--469a9630</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20multi-country%20botnet%20targets%20RDP%20services%20in%20the%20US&amp;severity=high&amp;id=68ed66bee828b4dd3cc60fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/customer-payment-data-stolen-in-unity-technologies-fc80d594</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Customer%20payment%20data%20stolen%20in%20Unity%20Technologies%E2%80%99s%20SpeedTree%20website%20compromise&amp;severity=high&amp;id=68ed66bee828b4dd3cc60fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62364-cwe-59-improper-link-resolution-bef-5a1ba851</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62364%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=68ed6345e828b4dd3cbdd2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62246-cwe-79-improper-neutralization-of-i-1441d158</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62246%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed60592e9a9eee888b853d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62241-cwe-639-authorization-bypass-throug-4144fee6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62241%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20DXP&amp;severity=medium&amp;id=68ed566e06a2a330d3233343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62242-cwe-639-authorization-bypass-throug-af80d1a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62242%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed57c406a2a330d326046c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/judicial-notification-phish-targets-colombian-user-72f40cab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Judicial%20Notification%20Phish%20Targets%20Colombian%20Users%20%E2%80%93%20.SVG%20Attachment%20Deploys%20Info-stealer%20Malware&amp;severity=medium&amp;id=68ed566406a2a330d32311e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61775-cwe-613-insufficient-session-expira-952fa92c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61775%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Whimsies-YAT%20Vickey&amp;severity=medium&amp;id=68ed396165e259ed7edc1e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62243-cwe-863-incorrect-authorization-in--6599d06e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62243%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed35e765e259ed7ed4fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-leak-millions-of-users-data-from-qant-d0bf1155</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20Leak%20Millions%20of%20Users&apos;%20Data%20from%20Qantas%2C%20Vietnam%20Airlines%20and%20Others&amp;severity=medium&amp;id=68ed32d939004152d7f5a900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62244-cwe-639-authorization-bypass-throug-9bd702f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62244%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed375065e259ed7ed7d000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/heads-up-scans-for-esafenet-cdg-v5-mon-oct-13th-31120a59</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20%2C%20(Mon%2C%20Oct%2013th)&amp;severity=medium&amp;id=68ed2be94a0d14fc5abc2db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11695-cwe-295-improper-certificate-valida-40f7100c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11695%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20MongoDB%20Rust%20Driver&amp;severity=high&amp;id=68ed30c839004152d7ef8a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7707-cwe-377-insecure-temporary-file-in-r-a038680d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7707%3A%20CWE-377%20Insecure%20Temporary%20File%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68ed28784a0d14fc5ab516ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/def-con-33-how-i-hacked-over-1000-car-dealerships--d5544abc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=(DEF%20CON%2033)%20How%20I%20hacked%20over%201%2C000%20car%20dealerships%20across%20the%20US&amp;severity=medium&amp;id=68ed1ec2e2beed89262b47ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/astaroth-trojan-abuses-github-to-host-configs-and--d2f1ecb3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Astaroth%20Trojan%20abuses%20GitHub%20to%20host%20configs%20and%20evade%20takedowns&amp;severity=medium&amp;id=68ed1e6ee2beed89262a5ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-rondodox-botnet-is-weaponizing-ov-3262c5f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20RondoDox%20Botnet%20is%20Weaponizing%20Over%2050%20Flaws%20Across%2030%2B%20Vendors&amp;severity=high&amp;id=68ed1e6ee2beed89262a5eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-investigating-breach-linked-to-oracle-zero-bf1df288</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20investigating%20breach%20linked%20to%20Oracle%20zero-day%20exploit&amp;severity=critical&amp;id=68ed1e6ee2beed89262a5ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-unmonitored-javascript-is-your-biggest-holiday-276eab24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Unmonitored%20JavaScript%20Is%20Your%20Biggest%20Holiday%20Security%20Risk&amp;severity=high&amp;id=68ed1e6ee2beed89262a5ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simonmed-imaging-discloses-a-data-breach-impacting-e9b2392f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SimonMed%20Imaging%20discloses%20a%20data%20breach%20impacting%20over%201.2%20million%20people&amp;severity=high&amp;id=68ed1e6ee2beed89262a5ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openais-guardrails-can-be-bypassed-by-simple-promp-b8c2a5a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%E2%80%99s%20Guardrails%20Can%20Be%20Bypassed%20by%20Simple%20Prompt%20Injection%20Attack&amp;severity=medium&amp;id=68ed1af6e2beed8926232566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llm-honeypot-vs-cryptojacking-understanding-the-en-a4fb08ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLM%20Honeypot%20vs.%20Cryptojacking%3A%20Understanding%20the%20Enemy&amp;severity=medium&amp;id=68ed179d9bc739241f40d343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/financial-other-industries-urged-to-prepare-for-qu-8ff07b57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Financial%2C%20Other%20Industries%20Urged%20to%20Prepare%20for%20Quantum%20Computers&amp;severity=medium&amp;id=68eda150e121319cf76c6bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43991-cwe-61-unix-symbolic-link-symlink-f-092f9a6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43991%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Dell%20SupportAssist%20for%20Home%20PCs&amp;severity=medium&amp;id=68ed158d9bc739241f3ccd69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-code-on-unity-website-skims-information--ded398fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Code%20on%20Unity%20Website%20Skims%20Information%20From%20Hundreds%20of%20Customers&amp;severity=medium&amp;id=68ed0d6352482bb54d52d4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-infrastructure-cisos-cant-ignore-back-off-3a58fb63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20infrastructure%20CISOs%20Can&apos;t%20Ignore%20&apos;Back-Office%20Clutter&apos;%20Data&amp;severity=critical&amp;id=68ed066025fb26f08f8b77a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37729-cwe-1336-in-elastic-elastic-cloud-e-d422b4c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37729%3A%20CWE-1336%20in%20Elastic%20Elastic%20Cloud%20Enterprise%20(ECE)&amp;severity=critical&amp;id=68ed034f67696672afefd273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-whatsapp-worm-critical-cves-oracle-0--080fef14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20WhatsApp%20Worm%2C%20Critical%20CVEs%2C%20Oracle%200-Day%2C%20Ransomware%20Cartel%20%26%20More&amp;severity=critical&amp;id=68eda062e121319cf76c34fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-ssl-vpn-accounts-in-attacker-crosshairs-668916d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20SSL%20VPN%20Accounts%20in%20Attacker%20Crosshairs&amp;severity=medium&amp;id=68ecfc877da36148c99f8e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9902-cwe-639-authorization-bypass-through-477d5848</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9902%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20AKIN%20Software%20Computer%20Import%20Export%20Industry%20and%20Trade%20Co.%20Ltd.%20QRMenu&amp;severity=high&amp;id=68ed014867696672afeb29c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6919-cwe-89-improper-neutralization-of-sp-a7de2e17</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6919%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cats%20Information%20Technology%20Software%20Development%20Technologies%20Aykome%20License%20Tracking%20System&amp;severity=critical&amp;id=68ecf9147da36148c998a6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simonmed-imaging-data-breach-impacts-12-million-48b0a62e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SimonMed%20Imaging%20Data%20Breach%20Impacts%201.2%20Million&amp;severity=medium&amp;id=68ecf247dd5e0d603050473f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-unmonitored-javascript-is-your-biggest-holiday-db4069a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Unmonitored%20JavaScript%20Is%20Your%20Biggest%20Holiday%20Security%20Risk&amp;severity=critical&amp;id=68eda062e121319cf76c3500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-infrastructure-abused-in-phishing-campaign-aim-632ab965</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Infrastructure%20Abused%20in%20Phishing%20Campaign%20Aimed%20at%20Industrial%20and%20Electronics%20Firms&amp;severity=medium&amp;id=68ece878daa53b24786fa2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invoicely-database-leak-exposes-180000-sensitive-r-de8c5f1a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invoicely%20Database%20Leak%20Exposes%20180%2C000%20Sensitive%20Records&amp;severity=medium&amp;id=68ece1834f0998eca3fbdb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-patches-ebs-vulnerability-allowing-access-t-d29731a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Patches%20EBS%20Vulnerability%20Allowing%20Access%20to%20Sensitive%20Data&amp;severity=low&amp;id=68ecd6b89fb532f07af2d401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-rondodox-botnet-is-weaponizing-ov-0b0e2ae7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20RondoDox%20Botnet%20is%20Weaponizing%20Over%2050%20Flaws%20Across%2030%2B%20Vendors&amp;severity=medium&amp;id=68eda062e121319cf76c3503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-locks-down-ie-mode-after-hackers-turned--56f20384</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Locks%20Down%20IE%20Mode%20After%20Hackers%20Turned%20Legacy%20Feature%20Into%20Backdoor&amp;severity=medium&amp;id=68eda062e121319cf76c3506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10720-cwe-639-authorization-bypass-throug-58f4d786</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10720%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20Private%20Content%20Plus&amp;severity=medium&amp;id=68ecd13f847004351751526f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spanish-authorities-dismantle-gxc-team-crime-as-a--10b85e4a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spanish%20Authorities%20Dismantle%20%E2%80%98GXC%20Team%E2%80%99%20Crime-as-a-Service%20Operation&amp;severity=medium&amp;id=68ecc8f7ff270e1f1a064f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9337-cwe-476-null-pointer-dereference-in--df657ce0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9337%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20ASUS%20Armoury%20Crate&amp;severity=medium&amp;id=68ecc911ff270e1f1a069210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9336-cwe-121-stack-based-buffer-overflow--885cab87</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9336%3A%20CWE-121%20-%20Stack-based%20Buffer%20Overflow%20in%20ASUS%20Armoury%20Crate&amp;severity=medium&amp;id=68ecc911ff270e1f1a06920d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11184-cwe-79-improper-neutralization-of-i-2336a6aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11184%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20qwc-services%20qwc-registration-gui&amp;severity=medium&amp;id=68ecc5a7617226e321685f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11183-cwe-79-improper-neutralization-of-i-1a12943f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20QGIS%20QWC2&amp;severity=medium&amp;id=68ecc5a7617226e321685f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13th-october-threat-intelligence-report-57b35e13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68ecbed9fcb31871cb71f1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/extortion-group-leaks-millions-of-records-from-sal-c3670b48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Extortion%20Group%20Leaks%20Millions%20of%20Records%20From%20Salesforce%20Hacks&amp;severity=medium&amp;id=68ecbec2fcb31871cb71dd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9968-cwe-59-improper-link-resolution-befo-e9de5c51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9968%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20ASUS%20Armoury%20Crate&amp;severity=high&amp;id=68ecbcbcfcb31871cb6ddb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11668-sql-injection-in-code-projects-auto-3a805de6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11668%3A%20SQL%20Injection%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68ecb4ba5296f0f0802d7ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11675-cwe-434-unrestricted-upload-of-file-6f9a4b74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11675%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ragic%20Enterprise%20Cloud%20Database&amp;severity=high&amp;id=68ecb1b913a035d7a75ed865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11674-cwe-918-server-side-request-forgery-f8427d3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11674%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PiExtract%20SOOP-CLM&amp;severity=medium&amp;id=68ecb62b5296f0f080308ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10558-cwe-79-improper-neutralization-of-i-d09a4d84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10558%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%203DSwymer&amp;severity=high&amp;id=68ecae3d13a035d7a7575c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10557-cwe-79-improper-neutralization-of-i-a2e438c8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10557%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=68ecae3d13a035d7a7575c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10556-cwe-79-improper-neutralization-of-i-2fd7399a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10556%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Specification%20Manager&amp;severity=high&amp;id=68ecae3d13a035d7a7575bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10552-cwe-79-improper-neutralization-of-i-29d539dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%203DSwymer&amp;severity=high&amp;id=68ecae3d13a035d7a7575bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11673-cwe-912-hidden-functionality-in-pie-76f1b7ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11673%3A%20CWE-912%20Hidden%20Functionality%20in%20PiExtract%20SOOP-CLM&amp;severity=high&amp;id=68ecae3d13a035d7a7575c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9976-cwe-78-improper-neutralization-of-sp-2b6cdb67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9976%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Station%20Launcher%20App%20in%203DEXPERIENCE%20platform&amp;severity=critical&amp;id=68ecae3d13a035d7a7575c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11672-cwe-306-missing-authentication-for--c99d1601</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11672%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20EBM%20Technologies%20Uniweb%2FSoliPACS%20WebServer&amp;severity=medium&amp;id=68ecae3d13a035d7a7575c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11667-sql-injection-in-code-projects-auto-6c36a341</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11667%3A%20SQL%20Injection%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68ecae3d13a035d7a7575c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11671-cwe-306-missing-authentication-for--f56cfc81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11671%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20EBM%20Technologies%20Uniweb%2FSoliPACS%20WebServer&amp;severity=medium&amp;id=68ecae3d13a035d7a7575c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11666-use-of-hard-coded-password-in-tenda-31abd94e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11666%3A%20Use%20of%20Hard-coded%20Password%20in%20Tenda%20RP3%20Pro&amp;severity=high&amp;id=68eca73af9d7069310c27773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8915-cwe-200-exposure-of-sensitive-inform-a666c6b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8915%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kiloview%20N30&amp;severity=high&amp;id=68eca3f676ac24bf78e1805f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9265-cwe-346-origin-validation-error-in-k-d982bf26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9265%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Kiloview%20NDI&amp;severity=critical&amp;id=68eca3f676ac24bf78e18062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/astaroth-banking-trojan-abuses-github-to-remain-op-59a3fe52</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Astaroth%20Banking%20Trojan%20Abuses%20GitHub%20to%20Remain%20Operational%20After%20Takedowns&amp;severity=medium&amp;id=68eda062e121319cf76c3509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11665-os-command-injection-in-d-link-dap--379f7223</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11665%3A%20OS%20Command%20Injection%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=68eca07b76ac24bf78d95a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0636-cwe-78-improper-neutralization-of-sp-d317c429</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0636%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ericsson%20Site%20Controller%206610&amp;severity=high&amp;id=68ec9d40a7330cdb49adeae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27258-cwe-284-improper-access-control-in--80cca729</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27258%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Ericsson%20Ericsson%20Network%20Manager(ENM)&amp;severity=medium&amp;id=68ec9d40a7330cdb49adeaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27259-cwe-79-improper-neutralization-of-i-c9e5f153</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ericsson%20Ericsson%20Network%20Manager(ENM)&amp;severity=low&amp;id=68ec9d40a7330cdb49adeaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11664-sql-injection-in-campcodes-online-b-05766d68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11664%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68ec99d4a7330cdb49a66d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9698-cwe-79-cross-site-scripting-xss-in-t-aade89ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9698%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20The%20Plus%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68ec96c744969315cfd5cb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11663-sql-injection-in-campcodes-online-b-047e65ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11663%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68ec9049d25177382441df02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-rust-based-malware-chaosbot-uses-discord-chann-515129af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Rust-Based%20Malware%20%22ChaosBot%22%20Uses%20Discord%20Channels%20to%20Control%20Victims&apos;%20PCs&amp;severity=low&amp;id=68eda062e121319cf76c350c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11662-sql-injection-in-sourcecodester-bes-84d90fcc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11662%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68ec89cf1590c630c202cbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31995-cwe-20-improper-input-validation-in-85de45d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31995%3A%20CWE-20%20Improper%20Input%20Validation%20in%20HCL%20Software%20MaxAI%20Workbench&amp;severity=low&amp;id=68ec89cf1590c630c202cbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11661-missing-authentication-in-projectsa-b86c44ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11661%3A%20Missing%20Authentication%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec836385888e71ae1a402e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11660-unrestricted-upload-in-projectsandp-8e07fbfe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11660%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec7cd32800e7e3a061fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31994-cwe-79-improper-neutralization-of-i-548263d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20Unica%20Campaign&amp;severity=medium&amp;id=68ec815385888e71ae15df7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31996-cwe-552-files-or-directories-access-ca4b4bed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31996%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20HCL%20Software%20Unica%20Platform&amp;severity=medium&amp;id=68ec79542800e7e3a05a7f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11659-unrestricted-upload-in-projectsandp-dab5650a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11659%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec764afbc519dcfe649f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11658-unrestricted-upload-in-projectsandp-a3b4a187</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11658%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec72b9fbc519dcfe63011b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11657-unrestricted-upload-in-projectsandp-4a15bdb3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11657%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec6bb7fbc519dcfe6190f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11656-unrestricted-upload-in-projectsandp-c2a14beb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11656%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec64b6fbc519dcfe601ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11655-unrestricted-upload-in-totaljs-flow-8281e6c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11655%3A%20Unrestricted%20Upload%20in%20Total.js%20Flow&amp;severity=medium&amp;id=68ec5d9efbc519dcfe5dfc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11654-sql-injection-in-yousaf530-inferno--290b59e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11654%3A%20SQL%20Injection%20in%20yousaf530%20Inferno%20Online%20Clothing%20Store&amp;severity=medium&amp;id=68ec5315fbc519dcfe5c047e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36087-cwe-798-use-of-hard-coded-credentia-772d0dd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36087%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Security%20Verify%20Access&amp;severity=high&amp;id=68ec4e11fbc519dcfe5af6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11653-buffer-overflow-in-utt-hiper-2620g-feb39aa4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11653%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%202620G&amp;severity=high&amp;id=68ec4e11fbc519dcfe5af6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11652-buffer-overflow-in-utt-518g-f8b679f6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11652%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20518G&amp;severity=high&amp;id=68ec4896fbc519dcfe53b447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-13-cf0ca0f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-13&amp;severity=medium&amp;id=68ed93f253be882d4e4b5136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11651-buffer-overflow-in-utt-518g-f5994709</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11651%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20518G&amp;severity=high&amp;id=68ec3b1ffb97228d20438bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11650-use-of-weak-hash-in-tomofun-furbo-3-891749cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11650%3A%20Use%20of%20Weak%20Hash%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ec3621b99bb870f150ee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11649-use-of-hard-coded-password-in-tomof-948cb52a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11649%3A%20Use%20of%20Hard-coded%20Password%20in%20Tomofun%20Furbo%20360&amp;severity=high&amp;id=68ec2e4f54ebfa14c6b73c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11648-server-side-request-forgery-in-tomo-8e23d8ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11648%3A%20Server-Side%20Request%20Forgery%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ec27b2152e6fbe60df9308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11647-information-disclosure-in-tomofun-f-7c635ab5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11647%3A%20Information%20Disclosure%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ec21584063b57761c6472e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-oracle-e-business-suite-bug-could-let-hackers--d9fc564a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Oracle%20E-Business%20Suite%20Bug%20Could%20Let%20Hackers%20Access%20Data%20Without%20Login&amp;severity=high&amp;id=68ec1e512951d0f0a8781ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11646-improper-access-controls-in-tomofun-47d6d427</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11646%3A%20Improper%20Access%20Controls%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ec1ad92951d0f0a8712bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11645-insecure-storage-of-sensitive-infor-203d2854</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11645%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20Mobile%20App&amp;severity=low&amp;id=68ec117fb0f2f6c74eaacec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11644-insecure-storage-of-sensitive-infor-0100ce95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11644%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ec0b3b8f179ca8e875fda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spain-dismantles-gxc-team-cybercrime-syndicate-arr-351f2e4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spain%20dismantles%20%E2%80%9CGXC%20Team%E2%80%9D%20cybercrime%20syndicate%2C%20arrests%20leader&amp;severity=high&amp;id=68ec0b018f179ca8e87579be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-inflation-refund-texts-target-new-yorkers-in--fee95c7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20&apos;Inflation%20Refund&apos;%20texts%20target%20New%20Yorkers%20in%20new%20scam&amp;severity=high&amp;id=68ec0b018f179ca8e87579c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-group-claims-the-hack-of-harvard-u-3fed64c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20Ransomware%20group%20claims%20the%20hack%20of%20Harvard%20University&amp;severity=medium&amp;id=68ec0b018f179ca8e87579c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11643-hard-coded-credentials-in-tomofun-f-4f0feb69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11643%3A%20Hard-coded%20Credentials%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ec04772ad1f36bd948e97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11642-denial-of-service-in-tomofun-furbo--a41afc9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11642%3A%20Denial%20of%20Service%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebfdab326426c3ce4b9041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11641-improper-access-controls-in-tomofun-976c73a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11641%3A%20Improper%20Access%20Controls%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ebf5e4b1bbab260229ddf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11640-cleartext-transmission-of-sensitive-42bbee41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11640%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ebf07242ddb1210bc1e905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11639-insecure-storage-of-sensitive-infor-576356d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11639%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebe832514ee80e17c46bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-oracle-e-business-suite-bug-could-let-hackers--7c970d10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Oracle%20E-Business%20Suite%20Bug%20Could%20Let%20Hackers%20Access%20Data%20Without%20Login&amp;severity=high&amp;id=68ec4cb8fbc519dcfe59fede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11638-denial-of-service-in-tomofun-furbo--83fd62c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11638%3A%20Denial%20of%20Service%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebe1892b9503bda4776cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11637-race-condition-in-tomofun-furbo-360-5f5b5ad2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11637%3A%20Race%20Condition%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebdaac94f05d7804bfc0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11636-server-side-request-forgery-in-tomo-c79c5d1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11636%3A%20Server-Side%20Request%20Forgery%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebc5b38f89936022b765da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11635-resource-consumption-in-tomofun-fur-59e05df6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11635%3A%20Resource%20Consumption%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebb8db8ff13aa08ba99207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2138-cwe-602-client-side-enforcement-of-s-4ea38d89</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2138%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=low&amp;id=68ebb20ce7e4c74b800ba668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2139-cwe-602-client-side-enforcement-of-s-3df394bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2139%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=low&amp;id=68ebb20ce7e4c74b800ba66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2140-cwe-346-origin-validation-error-in-i-570e4a6a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2140%3A%20CWE-346%20Origin%20Validation%20Error%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=medium&amp;id=68ebb20ce7e4c74b800ba66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33096-cwe-674-uncontrolled-recursion-in-i-d8e26230</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33096%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=medium&amp;id=68ebb20ce7e4c74b800ba671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11634-information-disclosure-in-tomofun-f-e2719d68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11634%3A%20Information%20Disclosure%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68eba4434919031131a7368e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11633-improper-certificate-validation-in--4858f15d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11633%3A%20Improper%20Certificate%20Validation%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68eb9db55b13363b9aae311e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52615-cwe-693-protection-mechanism-failur-0f224390</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52615%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20Unica%20Platform&amp;severity=low&amp;id=68eb66275e31a5ce11114464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11631-path-traversal-in-rainygao-docsys-4b92fd72</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11631%3A%20Path%20Traversal%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=68eb6abbca4916fd91025b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52614-cwe-614-sensitive-cookie-in-https-s-d7d00b09</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52614%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20HCL%20Software%20Unica%20Platform&amp;severity=low&amp;id=68eb5f99e1ad852e9038ab35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31969-cwe-358-improperly-implemented-secu-c3c03f31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31969%3A%20CWE-358%20%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20HCL%20Software%20Unica%20Platform&amp;severity=medium&amp;id=68eb64135e31a5ce110d0bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11630-path-traversal-in-rainygao-docsys-94536486</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11630%3A%20Path%20Traversal%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=68eb5c37e1ad852e9031a4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-4410-and-460-released-sun-oct-12th-62c56c58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.4.10%20and%204.6.0%20Released%2C%20(Sun%2C%20Oct%2012th)&amp;severity=medium&amp;id=68eb5c1ae1ad852e903127e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11629-sql-injection-in-rainygao-docsys-8898313b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11629%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=68eb55984e7fa26e3d2396e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31992-cwe-80-improper-neutralization-of-s-368b5e65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31992%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20HCL%20Software%20MaxAI%20Assistant&amp;severity=medium&amp;id=68eb454c3a1a0b12de17ca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11628-sql-injection-in-jimit105-project-o-d9481388</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11628%3A%20SQL%20Injection%20in%20jimit105%20Project-Online-Shopping-Website&amp;severity=medium&amp;id=68eb38594d1b2b17802d79c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52616-cwe-497-exposure-of-sensitive-syste-b2c16011</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52616%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20HCL%20Software%20Unica&amp;severity=medium&amp;id=68eb31dec96eae101eba8414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blind-enumeration-of-grpc-services-69d72040</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blind%20Enumeration%20of%20gRPC%20Services&amp;severity=medium&amp;id=68eb23a39e4c4c77c0af044a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31998-cwe-703-improper-check-or-handling--9fe412b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31998%3A%20CWE-703%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20HCL%20Software%20Unica%20Centralized%20Offer%20Management&amp;severity=low&amp;id=68eb18ce5baaa01f1c02ff9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61884-easily-exploitable-vulnerability-al-08dc9c67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61884%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Configurator.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Configurator%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Configurator&amp;severity=high&amp;id=68eb18ce5baaa01f1c02ffa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31997-cwe-639-authorization-bypass-throug-280b4e36</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31997%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20HCL%20Software%20Unica%20Centralized%20Offer%20Management&amp;severity=medium&amp;id=68eb18ce5baaa01f1c02ff9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31993-cwe-918-server-side-request-forgery-c1354369</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31993%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HCL%20Software%20Unica%20Centralized%20Offer%20Management&amp;severity=low&amp;id=68eb18ce5baaa01f1c02ff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-12-bec3dff1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-12&amp;severity=medium&amp;id=68ec44fafbc519dcfe506e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11615-sql-injection-in-sourcecodester-bes-366ee80e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11615%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68eacef65baaa01f1cdaf783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11614-sql-injection-in-sourcecodester-bes-58604d75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11614%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68eac0e95baaa01f1cd4ba18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-warn-of-widespread-sonicwall-vpn-compromis-7c043863</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Warn%20of%20Widespread%20SonicWall%20VPN%20Compromise%20Impacting%20Over%20100%20Accounts&amp;severity=high&amp;id=68eab9e15baaa01f1cd2ca64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11613-sql-injection-in-code-projects-simp-b0baa22f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11613%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68eab2d95baaa01f1cd0f778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11612-sql-injection-in-code-projects-simp-1b80a0eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11612%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68eaabda5baaa01f1cce7baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11611-sql-injection-in-sourcecodester-sim-302effdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11611%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Inventory%20System&amp;severity=medium&amp;id=68eaa4d85baaa01f1cccb515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11610-sql-injection-in-sourcecodester-sim-604c58f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11610%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Inventory%20System&amp;severity=medium&amp;id=68eb218d9e4c4c77c0aa679f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11609-use-of-hard-coded-cryptographic-key-39683e2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11609%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20code-projects%20Hospital%20Management%20System&amp;severity=medium&amp;id=68ea96c55baaa01f1cc98d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11608-sql-injection-in-code-projects-e-ba-5c7d6b14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11608%3A%20SQL%20Injection%20in%20code-projects%20E-Banking%20System&amp;severity=medium&amp;id=68ea8fb15baaa01f1cc7ee1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11607-path-traversal-in-harry0703-moneypr-a534a8b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11607%3A%20Path%20Traversal%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=68ea88af5baaa01f1cc5800d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11606-sql-injection-in-ipynch-social-netw-32679cc2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11606%3A%20SQL%20Injection%20in%20iPynch%20Social%20Network%20Website&amp;severity=medium&amp;id=68ea73935baaa01f1cbf8143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11605-sql-injection-in-code-projects-clie-645a6232</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11605%3A%20SQL%20Injection%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ea6c8a5baaa01f1cbd7828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11604-sql-injection-in-projectworlds-onli-3052b7eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11604%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Ordering%20Food%20System&amp;severity=medium&amp;id=68ea65895baaa01f1cbb6470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11603-sql-injection-in-code-projects-simp-7a2e5e00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11603%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ea5e7a5baaa01f1cb96f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-warn-of-widespread-sonicwall-vpn-compromis-a532dc91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Warn%20of%20Widespread%20SonicWall%20VPN%20Compromise%20Impacting%20Over%20100%20Accounts&amp;severity=medium&amp;id=68ec4cb8fbc519dcfe59fee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-turn-velociraptor-dfir-tool-into-weapon-in-1024e98e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Turn%20Velociraptor%20DFIR%20Tool%20Into%20Weapon%20in%20LockBit%20Ransomware%20Attacks&amp;severity=medium&amp;id=68ec4cb8fbc519dcfe59fee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11601-sql-injection-in-sourcecodester-onl-a633600c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11601%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Result%20System&amp;severity=medium&amp;id=68ea57795baaa01f1cb66479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11600-sql-injection-in-code-projects-simp-7dce2bb5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11600%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ea506a5baaa01f1cb35758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11599-sql-injection-in-campcodes-online-a-3c2bc02a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11599%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68eb218d9e4c4c77c0aa67a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11597-sql-injection-in-code-projects-e-co-8022c8e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11597%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68ea3b545baaa01f1cab1962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11596-sql-injection-in-code-projects-e-co-2564d46b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11596%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68ea2d435baaa01f1ca3be09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iamantimalware-inject-malicious-code-into-antiviru-8906fa70</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IAmAntimalware%3A%20Inject%20Malicious%20Code%20Into%20Antivirus&amp;severity=medium&amp;id=68ea29c25baaa01f1ca27b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11595-sql-injection-in-campcodes-online-a-dcf44a7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11595%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10376-cwe-352-cross-site-request-forgery--574ba577</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10376%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ercbs%20Course%20Redirects%20for%20Learndash%20Plugin&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10129-cwe-79-improper-neutralization-of-i-16bb8075</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miksco%20WordPress%20Live%20Webcam%20Widget%20%26%20Shortcode&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10375-cwe-352-cross-site-request-forgery--8efebdb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10375%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20accessibewp%20Web%20Accessibility%20by%20accessiBe&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9947-cwe-89-improper-neutralization-of-sp-2fed07b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9947%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kunalnagar%20Custom%20404%20Pro&amp;severity=medium&amp;id=68ea263e5baaa01f1ca10003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8606-cwe-352-cross-site-request-forgery-c-87f0ef33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8606%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20westerndeal%20GSheetConnector%20for%20Gravity%20Forms%20%E2%80%93%20Send%20Gravity%20Forms%20Entries%20to%20Google%20Sheets%20in%20Real-Time&amp;severity=low&amp;id=68ea263e5baaa01f1ca0ffed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10175-cwe-89-improper-neutralization-of-s-d1448a12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10175%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rico-macchi%20WP%20Links%20Page&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8593-cwe-862-missing-authorization-in-wes-c29e6199</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8593%3A%20CWE-862%20Missing%20Authorization%20in%20westerndeal%20GSheetConnector%20for%20Gravity%20Forms%20%E2%80%93%20Send%20Gravity%20Forms%20Entries%20to%20Google%20Sheets%20in%20Real-Time&amp;severity=high&amp;id=68ea263e5baaa01f1ca0ffe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8484-cwe-200-exposure-of-sensitive-inform-5864d773</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8484%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nickclarkweb%20Code%20Quality%20Control%20Tool&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ffa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9950-cwe-22-improper-limitation-of-a-path-455b0c7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9950%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bestwebsoft%20Error%20Log%20Viewer%20by%20BestWebSoft&amp;severity=medium&amp;id=68ea263e5baaa01f1ca10007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8682-cwe-862-missing-authorization-in-the-933ec437</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8682%3A%20CWE-862%20Missing%20Authorization%20in%20themeansar%20Newsup&amp;severity=medium&amp;id=68ea263e5baaa01f1ca0fff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9626-cwe-352-cross-site-request-forgery-c-44d687a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9626%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20softwud%20Page%20Blocks&amp;severity=medium&amp;id=68ea263e5baaa01f1ca0fffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10190-cwe-79-improper-neutralization-of-i-3ef136ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10190%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20husainahmedqureshi%20WP%20Easy%20Toggles&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9975-cwe-918-server-side-request-forgery--c9e43dee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9975%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20rico-macchi%20WP%20Scraper&amp;severity=medium&amp;id=68ea263e5baaa01f1ca1000b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6439-cwe-22-improper-limitation-of-a-path-0932a760</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6439%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20JMA%20Plugins%20WooCommerce%20Designer%20Pro&amp;severity=critical&amp;id=68ea263d5baaa01f1ca0ffa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7652-cwe-79-improper-neutralization-of-in-e6c4e4ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ndiego%20Easy%20Plugin%20Stats&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ffa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10167-cwe-79-improper-neutralization-of-i-e3e8f333</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10167%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodefactory%20Stock%20History%20%26%20Reports%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9621-cwe-352-cross-site-request-forgery-c-fc05f531</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9621%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20widgetpack%20WidgetPack%20Comment%20System&amp;severity=medium&amp;id=68ea263e5baaa01f1ca0fff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58293-cwe-264-permissions-privileges-and--39b5bf2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58293%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea263e5baaa01f1ca10016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58289-cwe-840-business-logic-errors-in-hu-a0fb5537</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58289%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea263e5baaa01f1ca1000f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58301-cwe-121-stack-based-buffer-overflow-5adb99b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58301%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea263f5baaa01f1ca1003c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58300-cwe-121-stack-based-buffer-overflow-4413a861</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58300%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea22b95baaa01f1c9f768f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58299-cwe-416-use-after-free-in-huawei-ha-b7649818</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58299%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ea1f345baaa01f1c9e3c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58298-cwe-121-stack-based-buffer-overflow-d55dfbb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58298%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ea1f345baaa01f1c9e3c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11594-improper-validation-of-specified-qu-5d063e17</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11594%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20ywxbear%20PHP-Bookstore-Website-Example&amp;severity=medium&amp;id=68ea1f345baaa01f1c9e3c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58297-cwe-121-stack-based-buffer-overflow-8d84767c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58297%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea1f345baaa01f1c9e3c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58295-cwe-121-stack-based-buffer-overflow-6c4a6891</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58295%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea1bb15baaa01f1c9d1d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58292-cwe-27-path-traversal-dirfilename-i-3936ca1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58292%3A%20CWE-27%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58291-cwe-29-path-traversal-filename-in-h-764c8d91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58291%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58290-cwe-41-improper-resolution-of-path--41a359bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58290%3A%20CWE-41%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58288-cwe-275-permission-issues-in-huawei-07e051ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58288%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea1bb15baaa01f1c9d1d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58287-cwe-275-permission-issues-in-huawei-f474e5d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58287%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ea1bb15baaa01f1c9d1d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58286-cwe-25-path-traversal-filedir-in-hu-e61f3bdd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58286%3A%20CWE-25%20Path%20Traversal%3A%20&apos;%2F..%2Ffiledir&apos;%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11167-cwe-601-url-redirection-to-untruste-524ec643</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11167%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20creativemindssolutions%20CM%20Registration%20%E2%80%93%20Tailored%20tool%20for%20seamless%20login%20and%20invitation-based%20registrations&amp;severity=medium&amp;id=68ea182c5baaa01f1c9bed29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11518-cwe-639-authorization-bypass-throug-4f852b5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11518%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpclever%20WPC%20Smart%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=68ea182c5baaa01f1c9bed32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11254-cwe-1236-improper-neutralization-of-52f67e4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11254%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=68ea182c5baaa01f1c9bed2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6553-cwe-434-unrestricted-upload-of-file--b45e0c70</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6553%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ovatheme%20Ovatheme%20Events%20Manager&amp;severity=critical&amp;id=68ea182c5baaa01f1c9bed36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10185-cwe-89-improper-neutralization-of-s-e62abbf0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10185%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=68ea07c7ea13521b93fae104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10048-cwe-89-improper-neutralization-of-s-95a50c00</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10048%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=medium&amp;id=68ea07c7ea13521b93fae100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9196-cwe-200-exposure-of-sensitive-inform-1823c363</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9196%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sergiotrinity%20Trinity%20Audio%20%E2%80%93%20Text%20to%20Speech%20AI%20audio%20player%20to%20convert%20content%20into%20audio&amp;severity=medium&amp;id=68ea07c7ea13521b93fae112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11197-cwe-79-improper-neutralization-of-i-ba3a6fd5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11197%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Draft%20List&amp;severity=medium&amp;id=68ea07c7ea13521b93fae109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11533-cwe-269-improper-privilege-manageme-36e924d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11533%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ApusTheme%20WP%20Freeio&amp;severity=critical&amp;id=68ea07c7ea13521b93fae10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9496-cwe-79-improper-neutralization-of-in-b2bd13b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shortpixel%20Enable%20Media%20Replace&amp;severity=medium&amp;id=68ea07c7ea13521b93fae116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11593-sql-injection-in-codeastro-gym-mana-649342e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11593%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68ea044cea13521b93f32531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11592-sql-injection-in-codeastro-gym-mana-f03fa658</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11592%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e9fdd46ec084c5e89a5566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11591-sql-injection-in-codeastro-gym-mana-47c5220f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11591%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e9e6f7cd0503e930188560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58285-cwe-264-permissions-privileges-and--23a5f992</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58285%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9de46bc1e212db987cfff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58284-cwe-264-permissions-privileges-and--69159c3a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58284%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9de46bc1e212db987cffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58283-cwe-264-permissions-privileges-and--bdb66415</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58283%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9d65caf47a96dabc8f9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58282-cwe-264-permissions-privileges-and--e67bb8c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58282%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68e9d65caf47a96dabc8f9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58278-cwe-200-exposure-of-sensitive-infor-5e6c6cf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58278%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9d65caf47a96dabc8f9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58277-cwe-200-exposure-of-sensitive-infor-96d0c883</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58277%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9d38e54cfe91d8ff083ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-story-about-bypassing-air-canadas-in-flight-netw-98c21b6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Story%20About%20Bypassing%20Air%20Canada&apos;s%20In-flight%20Network%20Restrictions&amp;severity=medium&amp;id=68e9d00f54cfe91d8fefed1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stealit-campaign-abuses-nodejs-single-executab-de061660</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Stealit%20Campaign%20Abuses%20Node.js%20Single%20Executable%20Application&amp;severity=medium&amp;id=68ecd3468470043517556eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11380-cwe-862-missing-authorization-in-ev-608ef6b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11380%3A%20CWE-862%20Missing%20Authorization%20in%20everestthemes%20Everest%20Backup%20%E2%80%93%20WordPress%20Cloud%20Backup%2C%20Migration%2C%20Restore%20%26%20Cloning%20Plugin&amp;severity=medium&amp;id=68e9c57e54cfe91d8fee2b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9560-cwe-79-improper-neutralization-of-in-4dd5ab81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9560%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=68e9c57e54cfe91d8fee2b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54654-cwe-264-permissions-privileges-and--34f6e38a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54654%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9be7854cfe91d8fec883f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11590-sql-injection-in-codeastro-gym-mana-05e18dc8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11590%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e9b06754cfe91d8fea642c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31718-cwe-78-os-command-injection-in-unis-6bf0c291</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31718%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T606%2FT612%2FT616%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=high&amp;id=68e9a97654cfe91d8fe5c94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31717-cwe-78-os-command-injection-in-unis-4cbe3d70</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31717%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=high&amp;id=68e9a97654cfe91d8fe5c94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-11-edcafc36</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-11&amp;severity=medium&amp;id=68eaf2135baaa01f1ce556ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11626-cwe-835-loop-with-unreachable-exit--ff2a18d5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11626%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=68e98d8a427d841ed4f6b6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9554-vulnerability-in-drupal-owl-carousel-c2210e58</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9554%3A%20Vulnerability%20in%20Drupal%20Owl%20Carousel%202&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9553-vulnerability-in-drupal-api-key-mana-b8296744</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9553%3A%20Vulnerability%20in%20Drupal%20API%20Key%20manager&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9552-vulnerability-in-drupal-synchronize--28ebba23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9552%3A%20Vulnerability%20in%20Drupal%20Synchronize%20composer.json%20With%20Contrib%20Modules&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9551-cwe-307-improper-restriction-of-exce-28270199</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9551%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Drupal%20Protected%20Pages&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9550-cwe-79-improper-neutralization-of-in-c125be01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9550%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Facets&amp;severity=medium&amp;id=68e98a03a6e766b7172b969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9549-cwe-862-missing-authorization-in-dru-b8e02924</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9549%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Facets&amp;severity=medium&amp;id=68e98a03a6e766b7172b969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8093-cwe-288-authentication-bypass-using--d090a7bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8093%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Authenticator%20Login&amp;severity=high&amp;id=68e98a03a6e766b7172b9697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52647-cwe-644-improper-neutralization-of--21bc2246</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52647%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20HCL%20Software%20BigFix%20WebUI&amp;severity=medium&amp;id=68e98689a6e766b717250985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploiting-zero-day-in-gladinet-file-shari-edeb0bb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploiting%20zero-day%20in%20Gladinet%20file%20sharing%20software&amp;severity=critical&amp;id=68e97fb88031eb1aa2d23790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11589-sql-injection-in-codeastro-gym-mana-13f46a3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11589%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e97fc68031eb1aa2d2662c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11588-sql-injection-in-codeastro-gym-mana-9a485f6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11588%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e97fc68031eb1aa2d26625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1password-addresses-critical-ai-browser-agent-secu-cdd52355</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1Password%20Addresses%20Critical%20AI%20Browser%20Agent%20Security%20Gap&amp;severity=critical&amp;id=68e9af5454cfe91d8fea39a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11586-stack-based-buffer-overflow-in-tend-c5664a1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11586%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e9756d807ca07d502307f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11585-sql-injection-in-code-projects-proj-86d935d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11585%3A%20SQL%20Injection%20in%20code-projects%20Project%20Monitoring%20System&amp;severity=medium&amp;id=68e9756d807ca07d502307f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-infostealer-to-full-rat-dissecting-the-purera-7934e8b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20infostealer%20to%20full%20RAT%3A%20dissecting%20the%20PureRAT%20attack%20chain&amp;severity=medium&amp;id=68e96e4d4338e1ae7d84ca8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11584-sql-injection-in-code-projects-onli-40929b28</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11584%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=68e971f7807ca07d501c4640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62158-cwe-200-exposure-of-sensitive-infor-917267ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62158%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20frappe%20lms&amp;severity=low&amp;id=68e96ae14338e1ae7d7efb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11583-sql-injection-in-code-projects-onli-e4197f13</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11583%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=68e96ae14338e1ae7d7efb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11582-sql-injection-in-code-projects-onli-4b63eef0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11582%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=68e96ae14338e1ae7d7efb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61929-cwe-94-improper-control-of-generati-e750e089</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61929%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CherryHQ%20cherry-studio&amp;severity=critical&amp;id=68e9657bb83e3429f3274514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61927-cwe-94-improper-control-of-generati-630ef7e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61927%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=68e96415b83e3429f324341a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61925-cwe-470-use-of-externally-controlle-daced5a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61925%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=68e96415b83e3429f3243537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-an-exploit-shotgun-for-edge-vulns-ee297d14</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%3A%20an%20&apos;Exploit%20Shotgun&apos;%20for%20Edge%20Vulns&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-now-offers-2-million-for-zero-click-rce-vuln-925e6c17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20now%20offers%20%242%20million%20for%20zero-click%20RCE%20vulnerabilities&amp;severity=high&amp;id=68e95d14710816ddd72cdab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-chrome-to-revoke-notification-access-for-in-39d7580d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Chrome%20to%20revoke%20notification%20access%20for%20inactive%20sites&amp;severity=high&amp;id=68e95d14710816ddd72cdab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62245-cwe-352-cross-site-request-forgery--6b3391c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62245%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e95d32710816ddd72d64df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11581-missing-authorization-in-powerjob-a3cd7e9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11581%3A%20Missing%20Authorization%20in%20PowerJob&amp;severity=medium&amp;id=68e95d32710816ddd72d64e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-fight-against-ransomware-heats-up-on-the-facto-4c3cf2d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Fight%20Against%20Ransomware%20Heats%20Up%20on%20the%20Factory%20Floor&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11580-missing-authorization-in-powerjob-c7b3ae0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11580%3A%20Missing%20Authorization%20in%20PowerJob&amp;severity=medium&amp;id=68e94f461df34bad8db23a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-clickfix-factory-first-exposure-of-iuam-clickf-34f428d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20ClickFix%20Factory%3A%20First%20Exposure%20of%20IUAM%20ClickFix%20Generator&amp;severity=medium&amp;id=68e94bbba811ebd3155d19b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23282-cwe-415-double-free-in-nvidia-virtu-4cb39d6a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23282%3A%20CWE-415%20Double%20Free%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=high&amp;id=68e9484da811ebd31556bed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23280-cwe-416-use-after-free-in-nvidia-ge-b066e491</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23280%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=68e9484da811ebd31556bedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23309-cwe-427-uncontrolled-search-path-el-abe288af</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23309%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=68e9484da811ebd31556bee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crimson-collective-a-new-threat-group-observed-ope-10ee0f34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crimson%20Collective%3A%20A%20New%20Threat%20Group%20Observed%20Operating%20in%20the%20Cloud&amp;severity=medium&amp;id=68e94164a46c174737d6e699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11618-cwe-476-null-pointer-dereference-in-0d5832b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11618%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=68e94174a46c174737d6e772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11617-cwe-126-buffer-over-read-in-aws-fre-779213f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11617%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=68e94174a46c174737d6e76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11616-cwe-126-buffer-over-read-in-aws-fre-ee6010fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11616%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20AWS%20FreeRTOS-Plus_TCP&amp;severity=medium&amp;id=68e94174a46c174737d6e76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-payroll-pirates-hijacking-hr-sa-90cc9a30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20%E2%80%98Payroll%20Pirates%E2%80%99%20Hijacking%20HR%20SaaS%20Accounts%20to%20Steal%20Employee%20Salaries&amp;severity=high&amp;id=68e93e0f811be5ca96d13eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blog-anatomy-of-a-hacktivist-attack-russian-aligne-6ff697f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blog%20Anatomy%20of%20a%20Hacktivist%20Attack%3A%20Russian-Aligned%20Group%20Targets%20OT%2FICS&amp;severity=medium&amp;id=68e93e03811be5ca96d13cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61689-cwe-113-improper-neutralization-of--04169100</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61689%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20JuliaWeb%20HTTP.jl&amp;severity=high&amp;id=68e93a9c811be5ca96ca6d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feds-shutter-shinyhunters-salesforce-extortion-sit-03a097d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feds%20Shutter%20ShinyHunters%20Salesforce%20Extortion%20Site&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-risks-of-vibe-coding-and-llm-assistants-f-6ccfe02f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20risks%20of%20vibe%20coding%20and%20LLM%20assistants%20for%20developers&amp;severity=medium&amp;id=68e93752ca439c55520f8597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auth-bypass-flaw-in-service-finder-wordpress-plugi-e76c2598</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auth%20Bypass%20Flaw%20in%20Service%20Finder%20WordPress%20Plugin%20Under%20Active%20Exploit&amp;severity=high&amp;id=68e933d1ca439c5552087378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48043-cwe-863-incorrect-authorization-in--23695597</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48043%3A%20CWE-863%20Incorrect%20Authorization%20in%20ash-project%20ash&amp;severity=high&amp;id=68e93535ca439c55520b301d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-use-velociraptor-ir-tool-in-ransom-fd66d3f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Use%20Velociraptor%20IR%20Tool%20in%20Ransomware%20Attacks&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-sees-surge-in-ai-powered-cyberattacks-by-r-687fbec9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20sees%20surge%20in%20AI-Powered%20cyberattacks%20by%20Russia-linked%20Threat%20Actors&amp;severity=medium&amp;id=68e91f6393e1426593c0ee9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-patched-nine-critical-flaws-in-junos-space-a77110eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20patched%20nine%20critical%20flaws%20in%20Junos%20Space&amp;severity=critical&amp;id=68e91f6393e1426593c0ee9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealit-malware-using-nodejs-to-hide-in-fake-game--b5973dad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealit%20Malware%20Using%20Node.js%20to%20Hide%20in%20Fake%20Game%20and%20VPN%20Installers&amp;severity=medium&amp;id=68e9189899b0507a101d806b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deepfake-awareness-high-at-orgs-but-cyber-defenses-8d7f6004</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deepfake%20Awareness%20High%20at%20Orgs%2C%20But%20Cyber%20Defenses%20Badly%20Lag&amp;severity=high&amp;id=68e9af5454cfe91d8fea39b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mid-sized-firms-worried-but-confident-over-deepfak-3901303b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mid-Sized%20Firms%20Worried%20But%20Confident%20Over%20Deepfakes&amp;severity=medium&amp;id=68e9187d99b0507a101d5032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealit-malware-abuses-nodejs-single-executable-fe-303f2e88</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealit%20Malware%20Abuses%20Node.js%20Single%20Executable%20Feature%20via%20Game%20and%20VPN%20Installers&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/living-off-nodejs-addons-f4de520c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Living%20off%20Node.js%20Addons&amp;severity=medium&amp;id=68e918a999b0507a101de8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-gladinet-flaw-exploitation-attacks-o-3d92f1e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Gladinet%20Flaw%20Exploitation%2C%20Attacks%20on%20ICS%20Honeypot%2C%20ClayRat%20Spyware&amp;severity=medium&amp;id=68e915809497c34e0b75da4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8887-cwe-639-authorization-bypass-through-d2562d34</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8887%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Usta%20Information%20Systems%20Inc.%20Aybs%20Interaktif&amp;severity=medium&amp;id=68e912159497c34e0b6ebdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8886-cwe-732-incorrect-permission-assignm-809090ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8886%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Usta%20Information%20Systems%20Inc.%20Aybs%20Interaktif&amp;severity=medium&amp;id=68e9137e9497c34e0b718e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-payroll-pirates-hijacking-hr-sa-81ac3c25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20%E2%80%98Payroll%20Pirates%E2%80%99%20Hijacking%20HR%20SaaS%20Accounts%20to%20Steal%20Employee%20Salaries&amp;severity=high&amp;id=68e9ae2654cfe91d8fe9e2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62237-cwe-79-improper-neutralization-of-i-6818521f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62237%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fortinet-palo-alto-networks-devices-targeted-38318fd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%2C%20Fortinet%2C%20Palo%20Alto%20Networks%20Devices%20Targeted%20in%20Coordinated%20Campaign&amp;severity=medium&amp;id=68e9019cfd0dca528e8b3eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62238-cwe-79-improper-neutralization-of-i-c24ab4bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62239-cwe-79-improper-neutralization-of-i-fdb6ecd9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e8fe2ffd0dca528e83b21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-takes-exploit-shotgun-approach-dbc1d3da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Takes%20%E2%80%98Exploit%20Shotgun%E2%80%99%20Approach&amp;severity=medium&amp;id=68e8f7744fe17e26d4190908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-vector-analysis-250-surge-prom-74811b93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%20Vector%20Analysis%3A%20250%25%20Surge%20Prompts%20CISA%20Emergency%20Response&amp;severity=critical&amp;id=68e8f7964fe17e26d4199524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-detection-to-patch-fortra-reveals-full-timeli-d569181c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Detection%20to%20Patch%3A%20Fortra%20Reveals%20Full%20Timeline%20of%20CVE-2025-10035%20Exploitation&amp;severity=critical&amp;id=68e9ae2654cfe91d8fe9e2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7374-cwe-863-incorrect-authorization-in-w-bb12706b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7374%3A%20CWE-863%20Incorrect%20Authorization%20in%20WP%20JobHunt&amp;severity=medium&amp;id=68e8f247395901574383ec06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7781-cwe-79-improper-neutralization-of-in-d00e9554</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7781%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20JobHunt&amp;severity=medium&amp;id=68e8f247395901574383ec0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11579-cwe-789-memory-allocation-with-exce-5b6fc628</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11579%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20nwaples%20rardecode&amp;severity=medium&amp;id=68e8f247395901574383ec03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61864-use-after-free-in-fuji-electric-co--daba407a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61864%3A%20Use%20after%20free%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8ea6230774abc8f786ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11190-cwe-89-improper-neutralization-of-s-251c9d38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11190%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Synchroweb%20Kiwire&amp;severity=medium&amp;id=68e8ea6230774abc8f786ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11189-cwe-79-improper-neutralization-of-i-df00ef1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Synchroweb%20Kiwire&amp;severity=high&amp;id=68e8ea6230774abc8f786ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11188-cwe-89-improper-neutralization-of-s-c6ce3745</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11188%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Synchroweb%20Kiwire&amp;severity=high&amp;id=68e8ea6230774abc8f786ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61863-out-of-bounds-read-in-fuji-electric-2a8883e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61863%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8ea6230774abc8f786ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ai-soc-stack-of-2026-what-sets-top-tier-platfo-85aa321f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AI%20SOC%20Stack%20of%202026%3A%20What%20Sets%20Top-Tier%20Platforms%20Apart%3F&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61862-out-of-bounds-read-in-fuji-electric-48460685</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61862%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e768bc5428e10f9f4407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-takes-down-breachforums-portal-used-for-salesf-31fd873a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20takes%20down%20BreachForums%20portal%20used%20for%20Salesforce%20extortion&amp;severity=high&amp;id=68e8e746bc5428e10f9eb2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61861-out-of-bounds-read-in-fuji-electric-7d539e4b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61861%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e768bc5428e10f9f4403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-lfi-to-rce-active-exploitation-detected-in-gl-07926b0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20LFI%20to%20RCE%3A%20Active%20Exploitation%20Detected%20in%20Gladinet%20and%20TrioFox%20Vulnerability&amp;severity=high&amp;id=68e8e746bc5428e10f9eb2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/175-malicious-npm-packages-with-26000-downloads-us-d487aae4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=175%20Malicious%20npm%20Packages%20with%2026%2C000%20Downloads%20Used%20in%20Credential%20Phishing%20Campaign&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61860-out-of-bounds-read-in-fuji-electric-7b826e15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61860%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e3e0bc5428e10f97dccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-grafana-flaw-to-its-known-exploited-v-a38a1860</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Grafana%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68e8e3d0bc5428e10f97838c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61859-out-of-bounds-write-in-fuji-electri-c7cead73</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61859%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e3e0bc5428e10f97dcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61857-out-of-bounds-write-in-fuji-electri-61db863d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61857%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e0e3aec0381be5865212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52625-cwe-525-in-hcl-aion-6be1b91c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52625%3A%20CWE-525%20in%20HCL%20AION&amp;severity=low&amp;id=68e8e0e3aec0381be5865208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61858-out-of-bounds-write-in-fuji-electri-970a60f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61858%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e0e3aec0381be5865216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-patches-critical-junos-space-vuln-c5afe2ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20Patches%20Critical%20Junos%20Space%20Vulnerabilities&amp;severity=critical&amp;id=68e8e0c0aec0381be585eef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52624-cwe-1032-in-hcl-aion-80fb7b4b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52624%3A%20CWE-1032%20in%20HCL%20AION&amp;severity=medium&amp;id=68e8e0e3aec0381be5865205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52635-cwe-1032-in-hcl-aion-2ef35cc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52635%3A%20CWE-1032%20in%20HCL%20AION&amp;severity=low&amp;id=68e8e0e3aec0381be586520b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61856-stack-based-buffer-overflow-in-fuji-3aa39b11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61856%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e0e3aec0381be586520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52632-cwe-614-in-hcl-aion-65282dad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52632%3A%20CWE-614%20in%20HCL%20AION&amp;severity=medium&amp;id=68e8dd52aec0381be57eb4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37727-cwe-532-insertion-of-sensitive-info-7648d052</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37727%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=68e8da15014f1108aabb06d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52630-cwe-200-exposure-of-sensitive-infor-fb244a51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52630%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20AION&amp;severity=low&amp;id=68e8da15014f1108aabb06db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ida-tips-for-reversing-u-boot-1093d40e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IDA%20tips%20for%20reversing%20U-Boot&amp;severity=medium&amp;id=68e8da18014f1108aabb07a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25017-cwe-79-improper-neutralization-of-i-60245127</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25017%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=68e8da15014f1108aabb06d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30001-cwe-279-incorrect-execution-assigne-89232480</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30001%3A%20CWE-279%20Incorrect%20Execution-Assigned%20Permissions%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=high&amp;id=68e8da15014f1108aabb06d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25018-cwe-79-improper-neutralization-of-i-adf76ccf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25018%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=68e8debbaec0381be58193b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zdi-drops-13-unpatched-ivanti-endpoint-manager-vul-235adb03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZDI%20Drops%2013%20Unpatched%20Ivanti%20Endpoint%20Manager%20Vulnerabilities&amp;severity=low&amp;id=68e8d68e014f1108aab3a90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52634-cwe-200-exposure-of-sensitive-infor-78c30aa3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52634%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20HCL%20AION&amp;severity=low&amp;id=68e8d6b0014f1108aab40a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-emergency-directive-ai-powered-phishing-campa-d846f0fb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Emergency%20Directive%3A%20AI-Powered%20Phishing%20Campaign%20Analysis%20-%20300%25%20Surge%2C%20%242.3B%20Q3%20Losses&amp;severity=critical&amp;id=68e8d6b3014f1108aab41ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-lfi-to-rce-active-exploitation-detected-in-gl-29e57b73</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20LFI%20to%20RCE%3A%20Active%20Exploitation%20Detected%20in%20Gladinet%20and%20TrioFox%20Vulnerability&amp;severity=low&amp;id=68e9ae2654cfe91d8fe9e2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52650-cwe-1032-in-hcl-hcl-aion-dc72f665</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52650%3A%20CWE-1032%20in%20HCL%20HCL%20AION&amp;severity=high&amp;id=68e8d389cad02c497658ef8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41089-cwe-79-improper-neutralization-of-i-763c9561</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41089%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xibo%20Signage%20Xibo%20CMS&amp;severity=medium&amp;id=68e8d178cad02c49765494c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41088-cwe-79-improper-neutralization-of-i-325cd76d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xibo%20Signage%20Xibo%20CMS&amp;severity=medium&amp;id=68e8d178cad02c49765494c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-ai-remembers-too-much-persistent-behaviors-in-0cf1d022</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20AI%20Remembers%20Too%20Much%20%E2%80%93%20Persistent%20Behaviors%20in%20Agents%E2%80%99%20Memory&amp;severity=medium&amp;id=68e8cc54a06d5f7cba036b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-targets-56-flaws-across-30-device--6d9907b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20targets%2056%20flaws%20across%2030%2B%20device%20types%20worldwide&amp;severity=medium&amp;id=68e8cc54a06d5f7cba036b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52655-cwe-829-inclusion-of-functionality--e291599b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52655%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20HCL%20HCL%20MyXalytics&amp;severity=low&amp;id=68e8cc6ea06d5f7cba03b390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-vietnamese-threat-actors-shift-from-pxa-stealer--6f7821c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Vietnamese%20threat%20actor&apos;s%20shift%20from%20PXA%20Stealer%20to%20PureRAT&amp;severity=medium&amp;id=68e8c5819fd71783de4a68f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40640-cwe-79-improper-neutralization-of-i-af068634</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40640%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Status%20Tracker%20Energy%20CRM&amp;severity=medium&amp;id=68e8c37b9fd71783de462c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clayrat-a-new-android-spyware-targeting-russia-0c5e5919</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClayRat%3A%20A%20New%20Android%20Spyware%20Targeting%20Russia&amp;severity=medium&amp;id=68e8c5819fd71783de4a68fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-malware-deployed-in-oracle-ebs-zero--fe30ec9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20Malware%20Deployed%20in%20Oracle%20EBS%20Zero-Day%20Attacks&amp;severity=medium&amp;id=68e8b96063e03efae96a661e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21050-cwe-20-improper-input-validation-in-8592d5e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21050%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=68e8ad897817465f6ff3a6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cl0p-linked-hackers-breach-dozens-of-organizations-889611b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CL0P-Linked%20Hackers%20Breach%20Dozens%20of%20Organizations%20Through%20Oracle%20Software%20Flaw&amp;severity=low&amp;id=68e9ae2654cfe91d8fe9e2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21070-cwe-787-out-of-bounds-write-in-sams-aef990fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21070%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff2496e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21069-cwe-125-out-of-bounds-read-in-samsu-ad471782</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21069%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff2496b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21068-cwe-125-out-of-bounds-read-in-samsu-9017e0ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21068%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21067-cwe-125-out-of-bounds-read-in-samsu-83cd3717</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21067%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21066-cwe-125-out-of-bounds-read-in-samsu-a73b5841</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21066%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21065-cwe-20-improper-input-validation-in-297d9420</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21065%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Retail%20Mode&amp;severity=medium&amp;id=68e8ab7a7817465f6ff24955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21064-cwe-287-improper-authentication-in--23dba1fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21064%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=68e8ab7a7817465f6ff24952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21063-cwe-284-improper-access-control-in--3fc46bc7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21063%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Voice%20Recorder&amp;severity=medium&amp;id=68e8ab7a7817465f6ff2494f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21062-cwe-327-use-of-a-broken-or-risky-cr-cc37a901</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21062%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=68e8ab7a7817465f6ff2494c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21061-cwe-312-cleartext-storage-of-sensit-d0968596</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21061%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=68e8ab7a7817465f6ff24949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21060-cwe-312-cleartext-storage-of-sensit-b3870fce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21060%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=68e8ab7a7817465f6ff24946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21059-cwe-285-improper-authorization-in-s-e678590f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21059%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Health&amp;severity=medium&amp;id=68e8ab7a7817465f6ff24943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21058-cwe-284-improper-access-control-in--d216b3a0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21058%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Routines&amp;severity=high&amp;id=68e8ab7a7817465f6ff24940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21057-cwe-927-use-of-implicit-intent-for--dae6c93b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21057%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7a7817465f6ff2493d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21055-cwe-125-out-of-bounds-read-in-samsu-5821a4b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21055%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab7a7817465f6ff2493a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21054-cwe-125-out-of-bounds-read-in-samsu-169621de</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21054%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2492d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21053-cwe-787-out-of-bounds-write-in-sams-8daa8fe8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21053%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2492a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21052-cwe-787-out-of-bounds-write-in-sams-71c4da0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21052%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21051-cwe-787-out-of-bounds-write-in-sams-c2b413c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21051%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21049-cwe-284-improper-access-control-in--6e0198b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21049%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21048-cwe-23-relative-path-traversal-in-s-95b2beb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21048%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2491e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21047-cwe-284-improper-access-control-in--5ce90712</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21047%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2491b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21046-cwe-284-improper-access-control-in--f05e3fe2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21046%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=low&amp;id=68e8ab797817465f6ff24918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21045-cwe-922-insecure-storage-of-sensiti-ba49c5b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21045%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21044-cwe-787-out-of-bounds-write-in-sams-1889ed4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21044%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10124-cwe-863-incorrect-authorization-in--59c878ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10124%3A%20CWE-863%20Incorrect%20Authorization%20in%20Booking%20Manager&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11570-cross-site-scripting-xss-in-drupal--db336d05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11570%3A%20Cross-site%20Scripting%20(XSS)%20in%20drupal-pattern-lab%2Funified-twig-extensions&amp;severity=medium&amp;id=68e89b8508dbb565a295228f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11569-directory-traversal-in-cross-zip-54f8c221</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11569&amp;severity=null&amp;id=68e89b8508dbb565a295228a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61871-unquoted-search-path-or-element-in--815d7fdf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61871%3A%20Unquoted%20search%20path%20or%20element%20in%20BUFFALO%20INC.%20NAS%20Navigator2%20(Windows%20version%20only)&amp;severity=medium&amp;id=68e892fd3eb08f791a703a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11449-cwe-79-improper-neutralization-of-i-1e9afc49</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=medium&amp;id=68e87f2bfb63177606d960e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11450-cwe-79-improper-neutralization-of-i-4b4410fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=medium&amp;id=68e87f2bfb63177606d960e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-10-f1495105</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-10&amp;severity=medium&amp;id=68e9a25054cfe91d8fdfba08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55903-na-acafc25b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55903%3A%20n%2Fa&amp;severity=high&amp;id=68e9657bb83e3429f3274517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61505-na-66d7fff9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61505%3A%20n%2Fa&amp;severity=medium&amp;id=68e952c11df34bad8db92885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60880-na-2e80506f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60880%3A%20n%2Fa&amp;severity=high&amp;id=68e952c11df34bad8db92882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60838-na-72242219</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60838%3A%20n%2Fa&amp;severity=medium&amp;id=68e94bc9a811ebd3155d6560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60268-na-1fc6e1b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60268%3A%20n%2Fa&amp;severity=medium&amp;id=68e949afa811ebd315597ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60308-na-2b892ae6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60308%3A%20n%2Fa&amp;severity=medium&amp;id=68e93a9c811be5ca96ca6d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60269-na-f72f28c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60269%3A%20n%2Fa&amp;severity=critical&amp;id=68e93a9c811be5ca96ca6d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60306-na-3b85649b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60306%3A%20n%2Fa&amp;severity=critical&amp;id=68e93746ca439c55520f7f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60305-na-8911c90a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60305%3A%20n%2Fa&amp;severity=high&amp;id=68e92e74956de071395be5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60307-na-364b484b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60307%3A%20n%2Fa&amp;severity=critical&amp;id=68e9261b5488f82d99852e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60869-na-e8db0848</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60869%3A%20n%2Fa&amp;severity=high&amp;id=68e91f8393e1426593c1e515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60378-na-1769f630</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60378%3A%20n%2Fa&amp;severity=high&amp;id=68e91c0c99b0507a10243325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61319-na-b057c892</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61319%3A%20n%2Fa&amp;severity=medium&amp;id=68e912159497c34e0b6ebdcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61152-na-f0e49284</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61152%3A%20n%2Fa&amp;severity=medium&amp;id=68e912159497c34e0b6ebdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60868-na-0cedec57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60868%3A%20n%2Fa&amp;severity=medium&amp;id=68e912159497c34e0b6ebdc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62292-cwe-669-incorrect-resource-transfer-914bf3ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62292%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20SonarSource%20SonarQube&amp;severity=medium&amp;id=68e8a8b066587de92d235d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61926-cwe-453-insecure-default-variable-i-a908e295</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61926%3A%20CWE-453%3A%20Insecure%20Default%20Variable%20Initialization%20in%20ossf%20allstar&amp;severity=medium&amp;id=68e82b3aba0e608b4fad9ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adaptixc2-uncovered-capabilities-tactics-hunting-s-267686da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AdaptixC2%20Uncovered%3A%20Capabilities%2C%20Tactics%20%26%20Hunting%20Strategies&amp;severity=medium&amp;id=68e8c5819fd71783de4a68f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62240-cwe-79-improper-neutralization-of-i-0c08a7bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e827b1ba0e608b4fad4efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59286-cwe-77-improper-neutralization-of-s-a92d4f5f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59286%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&apos;s%20Business%20Chat&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59272-cwe-77-improper-neutralization-of-s-3db4f965</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59272%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&apos;s%20Business%20Chat&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59271-cwe-285-improper-authorization-in-m-a73c6ff6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59271%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Cache%20for%20Redis%20Enterprise&amp;severity=high&amp;id=68e827b1ba0e608b4fad4ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59252-cwe-77-improper-neutralization-of-s-08cd6b00</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59252%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Word%20Copilot&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55321-cwe-79-improper-neutralization-of-i-baefc863</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55321%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20Monitor&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59247-cwe-269-improper-privilege-manageme-13970598</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59247%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Azure%20PlayFab&amp;severity=high&amp;id=68e827b1ba0e608b4fad4eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59246-cwe-306-missing-authentication-for--a1dd06df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59246%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59218-cwe-284-improper-access-control-in--bbedc393</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59218%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11558-sql-injection-in-code-projects-e-co-71b772fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11558%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e8243cba0e608b4facfb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11557-sql-injection-in-projectworlds-gate-dc252956</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11557%3A%20SQL%20Injection%20in%20projectworlds%20Gate%20Pass%20Management%20System&amp;severity=medium&amp;id=68e8243cba0e608b4facfb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-says-hackers-breached-all-of-its-firewal-64143b5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Says%20Hackers%20Breached%20All%20of%20Its%20Firewall%20Backups&amp;severity=medium&amp;id=68e8242cba0e608b4facfa58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61783-cwe-303-incorrect-implementation-of-26ebadd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61783%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20python-social-auth%20social-app-django&amp;severity=medium&amp;id=68e8243cba0e608b4facfb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61779-cwe-639-authorization-bypass-throug-17c91dd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61779%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20confidential-containers%20trustee&amp;severity=high&amp;id=68e8243cba0e608b4facfb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43296-an-app-may-bypass-gatekeeper-checks-7da254e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43296%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=68e820a9ba0e608b4facc8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34248-cwe-22-improper-limitation-of-a-pat-c75673c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34248%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20D-Link%20Nuclias%20Connect&amp;severity=high&amp;id=68e820a9ba0e608b4facc8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11556-sql-injection-in-code-projects-simp-558b652d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11556%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Leave%20Manager&amp;severity=medium&amp;id=68e87f2bfb63177606d960f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11555-sql-injection-in-campcodes-online-l-08ea1bcd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11555%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68e87f2bfb63177606d960ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35061-cwe-294-authentication-bypass-by-ca-f055e56e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35061%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Newforma%20Project%20Center&amp;severity=high&amp;id=68e81d27ba0e608b4fac9458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35062-cwe-276-incorrect-default-permissio-e376e4eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35062%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d27ba0e608b4fac945c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35060-cwe-79-improper-neutralization-of-i-5d727a61</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35060%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d27ba0e608b4fac9454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35059-cwe-601-url-redirection-to-untruste-5ef79e35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35059%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35058-cwe-294-authentication-bypass-by-ca-8a5b9147</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35058%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Newforma%20Project%20Center&amp;severity=high&amp;id=68e81d26ba0e608b4fac9442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35057-cwe-294-authentication-bypass-by-ca-0c59a66f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35057%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac943e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35056-cwe-22-improper-limitation-of-a-pat-b8daada8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35056%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35055-cwe-22-improper-limitation-of-a-pat-cf9e5914</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35055%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Newforma%20Project%20Center&amp;severity=high&amp;id=68e81d26ba0e608b4fac9434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35054-cwe-922-insecure-storage-of-sensiti-6f82877d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35054%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35053-cwe-22-improper-limitation-of-a-pat-b486f489</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35053%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac942b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35052-cwe-321-use-of-hard-coded-cryptogra-4b9ce459</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35052%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35051-cwe-502-deserialization-of-untruste-9727e767</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35051%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Newforma%20Project%20Center&amp;severity=critical&amp;id=68e81d26ba0e608b4fac9422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35050-cwe-502-deserialization-of-untruste-5e60a06b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35050%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Newforma%20Project%20Center&amp;severity=critical&amp;id=68e81d26ba0e608b4fac941c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-targets-56-n-day-flaws-in-worldwid-725411f0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20botnet%20targets%2056%20n-day%20flaws%20in%20worldwide%20attacks&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-healthkick-to-govershell-the-evolution-of-uta-08f1ce17</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20HealthKick%20to%20GOVERSHELL%3A%20The%20Evolution%20of%20UTA0388&apos;s%20Espionage%20Malware&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-defender-mistakenly-flags-sql-server-as--cab28825</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Defender%20mistakenly%20flags%20SQL%20Server%20as%20end-of-life&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-now-use-velociraptor-dfir-tool-in-ransomwa-f2d906de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20now%20use%20Velociraptor%20DFIR%20tool%20in%20ransomware%20attacks&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11554-insecure-inherited-permissions-in-p-d9df09c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11554%3A%20Insecure%20Inherited%20Permissions%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68e87f2bfb63177606d960f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-copilot-camoleak-ai-attack-exfiltrates-data-70b57452</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Copilot%20&apos;CamoLeak&apos;%20AI%20Attack%20Exfiltrates%20Data&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11553-sql-injection-in-code-projects-cour-f06fb15c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11553%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=68e80f15ba0e608b4fab452c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-100-of-firewall-backups-were-breached-e058c43c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%3A%20100%25%20of%20Firewall%20Backups%20Were%20Breached&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11552-sql-injection-in-code-projects-onli-46b30e35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11552%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e80b92ba0e608b4fab12d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59146-cwe-918-server-side-request-forgery-83379e96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59146%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=68e8080dba0e608b4faad9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4615-cwe-83-improper-neutralization-of-sc-c65ded9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4615%3A%20CWE-83%20Improper%20Neutralization%20of%20Script%20in%20Attributes%20in%20a%20Web%20Page%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=68e8048eba0e608b4faa7cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4614-cwe-497-exposure-of-sensitive-system-0c62414a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4614%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=68e80105ba0e608b4fa9e3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11551-sql-injection-in-code-projects-stud-20222a84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11551%3A%20SQL%20Injection%20in%20code-projects%20Student%20Result%20Manager&amp;severity=medium&amp;id=68e7fd81ba0e608b4fa9648d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11550-null-pointer-dereference-in-tenda-w-df0770d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11550%3A%20NULL%20Pointer%20Dereference%20in%20Tenda%20W12&amp;severity=high&amp;id=68e7fd81ba0e608b4fa96486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11573-cwe-1286-improper-validation-of-syn-0140b7b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11573%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Amazon%20Amazon.IonDotnet&amp;severity=high&amp;id=68e7fa08ba0e608b4fa8ce46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-tiktok-and-whatsapp-apps-infect-android-devic-078d8374</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20TikTok%20and%20WhatsApp%20Apps%20Infect%20Android%20Devices%20with%20ClayRat%20Spyware&amp;severity=medium&amp;id=68e7f2f6ba0e608b4fa56cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11549-stack-based-buffer-overflow-in-tend-c807d3f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11549%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W12&amp;severity=high&amp;id=68e7ebf3ba0e608b4fa3cf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-actively-exploiting-critical-vulnerabili-8f864e3b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Actively%20Exploiting%20Critical%20Vulnerability%20in%20Service%20Finder%20Bookings%20Plugin&amp;severity=medium&amp;id=68e7ebe2ba0e608b4fa3ca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11371-vulnerability-in-gladinet-centresta-a1700cc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11371%3A%20Vulnerability%20in%20Gladinet%20CentreStack%20and%20TrioFox&amp;severity=high&amp;id=68e7ebf3ba0e608b4fa3cf85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-crown-prince-nezha-a-new-tool-favored-by-china-c9178a46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Crown%20Prince%2C%20Nezha%3A%20A%20New%20Tool%20Favored%20by%20China-Nexus%20Threat%20Actors&amp;severity=medium&amp;id=68e7ebe2ba0e608b4fa3c9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60010-cwe-262-not-using-password-aging-in-236c7b3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60010%3A%20CWE-262%20Not%20Using%20Password%20Aging%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60009-cwe-79-improper-neutralization-of-i-c54ce2e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60009%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60006-cwe-78-improper-neutralization-of-s-fb295dfd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60006%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60004-cwe-754-improper-check-for-unusual--3f09ce38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60004%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68e7e4e6ba0e608b4fa29d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60002-cwe-79-improper-neutralization-of-i-cdf6c715</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60001-cwe-79-improper-neutralization-of-i-33b53c5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60001%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60000-cwe-79-improper-neutralization-of-i-0eea9f8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59999-cwe-79-improper-neutralization-of-i-fa4572f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59999%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59998-cwe-79-improper-neutralization-of-i-8afc3ad4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59998%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59997-cwe-79-improper-neutralization-of-i-fc2d6ca1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59996-cwe-79-improper-neutralization-of-i-6fa27740</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59995-cwe-79-improper-neutralization-of-i-31adce3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59995%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59994-cwe-79-improper-neutralization-of-i-ef10b87c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59993-cwe-79-improper-neutralization-of-i-6f19958f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59992-cwe-79-improper-neutralization-of-i-4170f2e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59991-cwe-79-improper-neutralization-of-i-30cde6d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59991%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59990-cwe-79-improper-neutralization-of-i-e77d949d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59990%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59989-cwe-79-improper-neutralization-of-i-5b996997</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59988-cwe-79-improper-neutralization-of-i-2084cf62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59987-cwe-79-improper-neutralization-of-i-dc524c1b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59986-cwe-79-improper-neutralization-of-i-68c7191e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59985-cwe-79-improper-neutralization-of-i-e84ad20c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59984-cwe-79-improper-neutralization-of-i-77a7df38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59984%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59983-cwe-79-improper-neutralization-of-i-59c161f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59982-cwe-79-improper-neutralization-of-i-041a2d7e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59982%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59981-cwe-79-improper-neutralization-of-i-d7b29ef9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59980-cwe-305-authentication-bypass-by-pr-d4ff9bc7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59980%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59978-cwe-79-improper-neutralization-of-i-b40549f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59978%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=critical&amp;id=68e7e163ba0e608b4fa1e471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59976-cwe-552-files-or-directories-access-c3bd5f23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59976%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7dde2ba0e608b4fa12b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59975-cwe-400-uncontrolled-resource-consu-419ca762</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59975%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=high&amp;id=68e7dde2ba0e608b4fa12b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59974-cwe-79-improper-neutralization-of-i-9b8f8a8b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59974%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space%20Security%20Director&amp;severity=high&amp;id=68e7dde2ba0e608b4fa12b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59968-cwe862-missing-authorization-in-jun-8ba387c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59968%3A%20CWE%E2%80%91862%3A%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20Space%20Security%20Director&amp;severity=high&amp;id=68e7dde2ba0e608b4fa12b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-analysis-of-a-medical-device-methods-and--51827958</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Analysis%20of%20a%20medical%20device%3A%20Methods%20and%20Findings&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59967-cwe-476-null-pointer-dereference-in-fca82f20</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59967%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7dde2ba0e608b4fa12b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59964-cwe-908-use-of-uninitialized-resour-72f413ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59964%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68e7da5fba0e608b4fa05bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10284-cwe-22-improper-limitation-of-a-pat-4e343310</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10284%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=critical&amp;id=68e7da5eba0e608b4fa05b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10283-cwe-22-improper-limitation-of-a-pat-efceffeb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10283%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=critical&amp;id=68e7da5eba0e608b4fa05b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10282-cwe-200-exposure-of-sensitive-infor-12c1764b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10282%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10281-cwe-200-exposure-of-sensitive-infor-8d07250b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10281%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59962-cwe-824-access-of-uninitialized-poi-fbffa826</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59962%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59958-cwe-754-improper-check-for-unusual--b40dc879</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59958%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59957-cwe-346-origin-validation-error-in--82d4676d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59957%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52961-cwe-400-uncontrolled-resource-consu-be110863</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52961%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52960-cwe-120-buffer-copy-without-checkin-6893900a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52960%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11198-cwe-306-missing-authentication-for--5ec89938</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11198%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Security%20Director%20Policy%20Enforcer&amp;severity=high&amp;id=68e7da5eba0e608b4fa05b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-says-hackers-stole-70000-government-id-pho-e0c029d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Says%20Hackers%20Stole%2070%2C000%20Government%20ID%20Photos%2C%20Dismisses%20Extortion%20Claims&amp;severity=medium&amp;id=68e7d6d4ba0e608b4f9f9ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-clayrat-spyware-targets-android-users-via-fake-428db3a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ClayRat%20Spyware%20Targets%20Android%20Users%20via%20Fake%20WhatsApp%20and%20TikTok%20Apps&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39664-cwe-22-improper-limitation-of-a-pat-5f421917</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39664%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=68e7cfcdba0e608b4f9eb509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32919-cwe-427-uncontrolled-search-path-el-2c1bda5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32919%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=68e7cfcdba0e608b4f9eb506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32916-cwe-598-use-of-get-request-method-w-8543614d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32916%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=low&amp;id=68e7cfcdba0e608b4f9eb503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-cpu-spikes-to-defense-b0ff69cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20CPU%20Spikes%20to%20Defense&amp;severity=high&amp;id=68e7c8ecba0e608b4f9e1ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/take-note-cyber-risks-with-ai-notetakers-7818be46</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Take%20Note%3A%20Cyber-Risks%20With%20AI%20Notetakers&amp;severity=medium&amp;id=68e7c1b4ba0e608b4f9cd844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36171-cwe-770-allocation-of-resources-wit-81125b68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36171%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68e7c1d2ba0e608b4f9cd95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36225-cwe-203-observable-discrepancy-in-i-b35a534e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36225%3A%20CWE-203%20Observable%20Discrepancy%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68e7c1d2ba0e608b4f9cd963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37401-cwe-942-overly-permissive-cross-dom-dc8b4f2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37401%3A%20CWE-942%20Overly%20Permissive%20Cross-domain%20Whitelist%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68e7c1d2ba0e608b4f9cd960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-access-sonicwall-cloud-firewall-backups-sp-58f51ccc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Access%20SonicWall%20Cloud%20Firewall%20Backups%2C%20Spark%20Urgent%20Security%20Checks&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11561-improper-privilege-management-in-re-4598bc8c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11561%3A%20Improper%20Privilege%20Management&amp;severity=high&amp;id=68e7be44ba0e608b4f9c42d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-car-from-hacking-kaspersky-off-6f51ff48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20car%20from%20hacking%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e7bacaba0e608b4f9be812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62228-cwe-89-improper-neutralization-of-s-e620fd97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62228%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Flink%20CDC&amp;severity=medium&amp;id=68e7b744ba0e608b4f9b9a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-shipment-notification-is-now-a-malware-droppe-0dd9875c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Shipment%20Notification%20Is%20Now%20a%20Malware%20Dropper&amp;severity=medium&amp;id=68e7b732ba0e608b4f9b9961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/all-sonicwall-cloud-backup-users-have-firewall-con-56794710</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=All%20SonicWall%20Cloud%20Backup%20Users%20Have%20Firewall%20Configuration%20Files%20Sto&amp;severity=high&amp;id=68e7b3acba0e608b4f9b07fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacktivists-target-critical-infrastructure-hit-dec-3eca830e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacktivists%20target%20critical%20infrastructure%2C%20hit%20decoy%20plant&amp;severity=critical&amp;id=68e7b3acba0e608b4f9b07f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10240-cwe-79-improper-neutralization-of-i-21cf3f4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=68e7b3ceba0e608b4f9b09a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10239-cwe-78-improper-neutralization-of-s-5ca3d8a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10239%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=68e7b3ceba0e608b4f9b09a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ms-teams-hack-mfa-hijacking-2b-c91c315f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20MS%20Teams%20Hack%2C%20MFA%20Hijacking%2C%20%242B%20Crypto%20Heist%2C%20Apple%20Siri%20Probe%20%26%20More&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chaos-c-ransomware-targets-windows-by-wiping-d-e83913b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Chaos-C%2B%2B%20Ransomware%20Targets%20Windows%20by%20Wiping%20Data%20and%20Stealing%20Crypto&amp;severity=medium&amp;id=68e7a21cba0e608b4f97fa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/saas-breaches-start-with-tokens-what-security-team-74939a23</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SaaS%20Breaches%20Start%20with%20Tokens%20-%20What%20Security%20Teams%20Must%20Watch&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9371-cwe-79-improper-neutralization-of-in-4c04bd5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9371%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=68e7a23bba0e608b4f980fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10249-cwe-23-relative-path-traversal-in-r-c538971d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10249%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Revolution%20Slider%20Slider%20Revolution&amp;severity=medium&amp;id=68e7a23aba0e608b4f980f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-copilot-chat-flaw-leaked-data-from-private--337a6fd8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Copilot%20Chat%20Flaw%20Leaked%20Data%20From%20Private%20Repositories&amp;severity=low&amp;id=68e7962d253d340dd454117b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-denies-massive-breach-confirms-limited-exp-418662e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20denies%20massive%20breach%2C%20confirms%20limited%20exposure%20of%2070K%20ID%20photos&amp;severity=high&amp;id=68e7896301b7ab9c73bf525a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-teams-installers-dropping-oyster-backdoor-aka-9f074269</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Teams%20Installers%20Dropping%20Oyster%20Backdoor%20(aka%20Broomstick)%20in%20New%20Malvertising%20Scam&amp;severity=medium&amp;id=68e7896301b7ab9c73bf525e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chaos-ransomware-upgrades-with-aggressive-new-c-va-05a0671f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chaos%20Ransomware%20Upgrades%20With%20Aggressive%20New%20C%2B%2B%20Variant&amp;severity=medium&amp;id=68e9af5554cfe91d8fea39c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-breached-law-firm-williams-connoll-3fd757ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Breached%20Law%20Firm%20Williams%20%26%20Connolly%20via%20Zero-Day&amp;severity=medium&amp;id=68e785c7d7a0c363cfd4ac17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-filefix-attack-uses-cache-smuggling-to-evade-s-d514c0a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20FileFix%20attack%20uses%20cache%20smuggling%20to%20evade%20security%20software&amp;severity=high&amp;id=68e78275d7a0c363cfd10a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-claim-discord-breach-exposed-data-of-55-mi-443ebeea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20claim%20Discord%20breach%20exposed%20data%20of%205.5%20million%20users&amp;severity=high&amp;id=68e78275d7a0c363cfd10a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-phishing-to-malware-ai-becomes-russias-new-cy-eaec2470</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Phishing%20to%20Malware%3A%20AI%20Becomes%20Russia&apos;s%20New%20Cyber%20Weapon%20in%20War%20on%20Ukraine&amp;severity=medium&amp;id=68e7923401b7ab9c73cb0c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/all-sonicwall-cloud-backup-users-had-firewall-conf-f26c39c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=All%20SonicWall%20Cloud%20Backup%20Users%20Had%20Firewall%20Configurations%20Stolen&amp;severity=medium&amp;id=68e7745d6b49b1a4209508f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10862-cwe-89-improper-neutralization-of-s-c48468d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10862%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=high&amp;id=68e772546b49b1a420925e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-says-70000-users-had-ids-exposed-in-recent-a6300222</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Says%2070%2C000%20Users%20Had%20IDs%20Exposed%20in%20Recent%20Data%20Breach&amp;severity=medium&amp;id=68e76d22f5254f629ab65abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11522-cwe-288-authentication-bypass-using-18ab30f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11522%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated-Themes%20Search%20%26%20Go%20-%20Directory%20WordPress%20Theme&amp;severity=critical&amp;id=68e766774454a62ee99e89df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11539-cwe-94-improper-control-of-generati-e55386f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11539%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Grafana%20grafana-image-renderer&amp;severity=critical&amp;id=68e762fe4454a62ee9978f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-exploit-lets-hackers-bypass-authenticatio-88280a13</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Exploit%20Lets%20Hackers%20Bypass%20Authentication%20in%20WordPress%20Service%20Finder%20Theme&amp;severity=critical&amp;id=68e782118736dec42f6616fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7634-cwe-98-improper-control-of-filename--733a6ee0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7634%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=critical&amp;id=68e74b345132fb26fe2091fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7526-cwe-22-improper-limitation-of-a-path-df768a4c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7526%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=critical&amp;id=68e74b345132fb26fe2091f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11530-sql-injection-in-code-projects-onli-7e571518</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11530%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e72e7b32de7eb26af8bf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-building-better-defenses-redtail-36c9be11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Building%20Better%20Defenses%3A%20RedTail%20Observations%20from%20a%20Honeypot%2C%20(Thu%2C%20Oct%209th)&amp;severity=low&amp;id=68e7a4f8ba0e608b4f98b8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6038-cwe-639-authorization-bypass-through-cbec0b04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6038%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pebas%20Lisfinity%20Core%20-%20Lisfinity%20Core%20plugin%20used%20for%20pebas%C2%AE%20Lisfinity%20WordPress%20theme&amp;severity=high&amp;id=68e72afc32de7eb26af88bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47355-cwe-787-out-of-bounds-write-in-qual-ec8e312a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47355%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afc32de7eb26af88bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47354-cwe-416-use-after-free-in-qualcomm--5848c0c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47354%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afc32de7eb26af88bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47351-cwe-190-integer-overflow-or-wraparo-1b424d36</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47351%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afc32de7eb26af88bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47349-cwe-823-use-of-out-of-range-pointer-88e7b744</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47349%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afc32de7eb26af88baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47347-cwe-121-stack-based-buffer-overflow-f3d19047</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47347%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47342-cwe-416-use-after-free-in-qualcomm--17bbc8c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47342%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47341-cwe-120-buffer-copy-without-checkin-4df6206b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47341%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47340-cwe-787-out-of-bounds-write-in-qual-a2a75740</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47340%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47338-cwe-822-untrusted-pointer-dereferen-6ef172f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47338%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27060-cwe-822-untrusted-pointer-dereferen-30271825</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27060%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27059-cwe-823-use-of-out-of-range-pointer-4fa55eb5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27059%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27054-cwe-787-out-of-bounds-write-in-qual-aa3bfeda</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27054%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27053-cwe-131-incorrect-calculation-of-bu-58c01f6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27053%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27049-cwe-126-buffer-over-read-in-qualcom-e6c44643</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27049%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68e72afb32de7eb26af88b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27048-cwe-822-untrusted-pointer-dereferen-7bef80d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27048%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27045-cwe-126-buffer-over-read-in-qualcom-8db7af15</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27045%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68e72afb32de7eb26af88b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27041-cwe-126-buffer-over-read-in-qualcom-1c501c20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27041%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68e72afb32de7eb26af88b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27040-cwe-20-improper-input-validation-in-f8f81cfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27040%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68e72afb32de7eb26af88b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27039-cwe-390-detection-of-error-conditio-9e906a6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27039%3A%20CWE-390%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68e72afb32de7eb26af88b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11529-missing-authentication-in-churchcrm-06893d6f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11529%3A%20Missing%20Authentication%20in%20ChurchCRM&amp;severity=medium&amp;id=68e727b132de7eb26af7f8f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11528-stack-based-buffer-overflow-in-tend-e7af37ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11528%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e727b132de7eb26af7f8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11527-stack-based-buffer-overflow-in-tend-af579991</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11527%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e7240f32de7eb26af75f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11526-stack-based-buffer-overflow-in-tend-f8d558b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11526%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e7240f32de7eb26af75f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10496-cwe-80-improper-neutralization-of-s-33beba2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10496%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20christophrado%20Cookie%20Notice%20%26%20Consent&amp;severity=high&amp;id=68e71ce832de7eb26af6c050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10586-cwe-89-improper-neutralization-of-s-01141e3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10586%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=critical&amp;id=68e71ce832de7eb26af6c057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11166-cwe-352-cross-site-request-forgery--c471a101</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11166%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=68e71ce832de7eb26af6c05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11525-stack-based-buffer-overflow-in-tend-652b9960</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11525%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e7125c32de7eb26af59731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11524-stack-based-buffer-overflow-in-tend-d66ed925</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11524%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e7125c32de7eb26af5972a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11523-command-injection-in-tenda-ac7-f84a7fa8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11523%3A%20Command%20Injection%20in%20Tenda%20AC7&amp;severity=medium&amp;id=68e7125c32de7eb26af59723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11516-sql-injection-in-code-projects-onli-13bd2dbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11516%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e7046932de7eb26af0f7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11515-sql-injection-in-code-projects-onli-572b2b4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11515%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e7046932de7eb26af0f7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11514-sql-injection-in-code-projects-onli-66d099e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11514%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e7046932de7eb26af0f7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-09-a742ff0a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-09&amp;severity=medium&amp;id=68e84e4cba0e608b4fb0bae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60375-na-09a5e85e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60375%3A%20n%2Fa&amp;severity=high&amp;id=68e820a9ba0e608b4facc8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60316-na-0d849969</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60316%3A%20n%2Fa&amp;severity=critical&amp;id=68e80b92ba0e608b4fab12d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60267-na-7a67c8e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60267%3A%20n%2Fa&amp;severity=medium&amp;id=68e7f304ba0e608b4fa56d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60304-na-489648e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60304%3A%20n%2Fa&amp;severity=medium&amp;id=68e7e86aba0e608b4fa35fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60266-na-9d957292</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60266%3A%20n%2Fa&amp;severity=medium&amp;id=68e7e86aba0e608b4fa35fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60265-na-201f2e68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60265%3A%20n%2Fa&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61577-na-ba4145fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61577%3A%20n%2Fa&amp;severity=high&amp;id=68e7d6e7ba0e608b4f9fa15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61532-na-76c03821</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61532%3A%20n%2Fa&amp;severity=medium&amp;id=68e7d6e7ba0e608b4f9f9f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60302-na-698decca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60302%3A%20n%2Fa&amp;severity=medium&amp;id=68e7d6e7ba0e608b4f9f9f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56426-na-123f26fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56426%3A%20n%2Fa&amp;severity=medium&amp;id=68e7d6e7ba0e608b4f9f9f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56683-na-9f4d3d30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56683%3A%20n%2Fa&amp;severity=critical&amp;id=68e7cfcdba0e608b4f9eb50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45095-na-5b96252f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45095%3A%20n%2Fa&amp;severity=high&amp;id=68e7c8edba0e608b4f9e1e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11513-sql-injection-in-code-projects-e-co-42135f36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11513%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e6f7045269778ce9b0c3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11512-cross-site-scripting-in-code-projec-de8cae5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11512%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68e6f7045269778ce9b0c3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11511-sql-injection-in-code-projects-e-co-756531c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11511%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e6f1c50e1a2843ff9dd5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61913-cwe-22-improper-limitation-of-a-pat-524b5565</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61913%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=68e6f1c50e1a2843ff9dd5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11509-sql-injection-in-code-projects-e-co-1626101f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11509%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e6e6ee7a93ff0f45116434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11508-unrestricted-upload-in-code-project-cf4e97d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11508%3A%20Unrestricted%20Upload%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68e6e6ee7a93ff0f4511642d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11535-cwe-276-incorrect-default-permissio-27477207</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11535%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MongoDB%20Inc%20MongoDB%20Connector%20for%20BI&amp;severity=high&amp;id=68e6e35e7a93ff0f450a133a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11507-sql-injection-in-phpgurukul-beauty--240c7ab5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11507%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e6e0a2cd67e8d183717e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11506-sql-injection-in-phpgurukul-beauty--f33ed649</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11506%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e6da3805e85d528e093f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11505-sql-injection-in-phpgurukul-beauty--0e319d7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11505%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e6da3805e85d528e093f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vampire-bot-malware-sinks-fangs-into-job-hunters-e3af18be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vampire%20Bot%20Malware%20Sinks%20Fangs%20Into%20Job%20Hunters&amp;severity=medium&amp;id=68e70b6732de7eb26af5081d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-hackers-team-up-with-scattered-lapsus-hunt-dabf205e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20Hackers%20Team%20Up%20With%20Scattered%20Lapsus%24%20Hunters&amp;severity=medium&amp;id=68e70b6732de7eb26af50820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/draftkings-thwarts-credential-stuffing-attack-but--1d5c3fc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DraftKings%20thwarts%20credential%20stuffing%20attack%2C%20but%20urges%20password%20reset%20and%20MFA&amp;severity=medium&amp;id=68e6cda68d029ba8452a7873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-weaponize-open-source-nezha-tool-i-730d998f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Weaponize%20Open-Source%20Nezha%20Tool%20in%20New%20Attack%20Wave&amp;severity=high&amp;id=68e6cda68d029ba8452a786f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flok-license-plate-surveillance-97dfe516</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flok%20License%20Plate%20Surveillance&amp;severity=medium&amp;id=68e6cda68d029ba8452a7877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-wordpress-sites-to-power-next-gen--5bdea2fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20WordPress%20Sites%20to%20Power%20Next-Gen%20ClickFix%20Phishing%20Attacks&amp;severity=high&amp;id=68e6ca2c8d029ba845235de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crimson-collective-hackers-target-aws-cloud-instan-3c1de480</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crimson%20Collective%20hackers%20target%20AWS%20cloud%20instances%20for%20data%20theft&amp;severity=high&amp;id=68e6ca2c8d029ba845235de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dragonforce-lockbit-and-qilin-a-new-triad-aims-to--b166eecb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DragonForce%2C%20LockBit%2C%20and%20Qilin%2C%20a%20new%20triad%20aims%20to%20dominate%20the%20ransomware%20landscape&amp;severity=medium&amp;id=68e6ca2c8d029ba845235de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11503-sql-injection-in-phpgurukul-beauty--0fc8ae51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11503%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e6c5b748d5c0a0f2492e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11495-heap-based-buffer-overflow-in-gnu-b-f2dce3b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11495%3A%20Heap-based%20Buffer%20Overflow%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68e6c5b748d5c0a0f2492e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-qilin-amp-dragonforce-join-forces-in-ranso-a33373a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%2C%20Qilin%20%26amp%3B%20DragonForce%20Join%20Forces%20in%20Ransomware%20&apos;Cartel&apos;&amp;severity=medium&amp;id=68e70b6732de7eb26af50823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11494-out-of-bounds-read-in-gnu-binutils-9fedd9c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11494%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68e6bdfa0d022f229cdb3b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11491-os-command-injection-in-wonderwhy-e-358a041b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11491%3A%20OS%20Command%20Injection%20in%20wonderwhy-er%20DesktopCommanderMCP&amp;severity=medium&amp;id=68e6b7bb76a6052c466fd265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11490-os-command-injection-in-wonderwhy-e-0005bd63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11490%3A%20OS%20Command%20Injection%20in%20wonderwhy-er%20DesktopCommanderMCP&amp;severity=medium&amp;id=68e6b1852ff6d6ea8f091143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-directory-domain-joinown-accounts-revisited-9c1eed87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Directory%20domain%20(join)own%20accounts%20revisited%202025&amp;severity=high&amp;id=68e6ab3c69f5e3b72424960b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11489-symlink-following-in-wonderwhy-er-d-db50fb75</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11489%3A%20Symlink%20Following%20in%20wonderwhy-er%20DesktopCommanderMCP&amp;severity=low&amp;id=68e6ab3a69f5e3b7242495f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11488-command-injection-in-d-link-dir-852-1d4e63dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11488%3A%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=68e6ab3a69f5e3b7242495ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11487-sql-injection-in-sourcecodester-far-434f706e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11487%3A%20SQL%20Injection%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=68e6a25e2d3a96faa29891e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42701-cwe-367-time-of-check-time-of-use-t-8775ba1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42701%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20CrowdStrike%20Falcon%20sensor%20for%20Windows&amp;severity=medium&amp;id=68e6a07a2d3a96faa293b1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42706-cwe-346-origin-validation-error-in--c1ed59e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42706%3A%20CWE-346%20Origin%20Validation%20Error%20in%20CrowdStrike%20Falcon%20sensor%20for%20Windows&amp;severity=medium&amp;id=68e6a07a2d3a96faa293b1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/figma-mcp-server-opens-orgs-to-agentic-ai-compromi-f6f15258</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Framelink%20Figma%20MCP%20Server%20Opens%20Orgs%20to%20Agentic%20AI%20Compromise&amp;severity=critical&amp;id=68e69ed02d3a96faa290bea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9868-cwe-918-server-side-request-forgery--2709c53e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9868%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Sonatype%20Nexus%20Repository&amp;severity=high&amp;id=68e69eeb2d3a96faa291106e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11486-sql-injection-in-sourcecodester-far-38e037c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11486%3A%20SQL%20Injection%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=68e69bbc55fe9682061a81d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11485-cross-site-scripting-in-sourcecodes-a0d4d192</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11485%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Grades%20Management%20System&amp;severity=medium&amp;id=68e69bbc55fe9682061a81cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-wordpress-sites-to-power-next-gen--39469315</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20WordPress%20Sites%20to%20Power%20Next-Gen%20ClickFix%20Phishing%20Attacks&amp;severity=medium&amp;id=68e70a4432de7eb26af4e138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9970-cwe-316-cleartext-storage-of-sensiti-de728000</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9970%3A%20CWE-316%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20ABB%20MConfig&amp;severity=medium&amp;id=68e694c69d1d1c8c4f59bf84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11481-sql-injection-in-varunsardana004-bl-4f37e794</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11481%3A%20SQL%20Injection%20in%20varunsardana004%20Blood-Bank-And-Donation-Management-System&amp;severity=medium&amp;id=68e694c69d1d1c8c4f59bf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/will-ai-spm-become-the-standard-security-layer-for-a6fa96a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Will%20AI-SPM%20Become%20the%20Standard%20Security%20Layer%20for%20Safe%20AI%20Adoption%3F&amp;severity=medium&amp;id=68e6913d9d1d1c8c4f53a9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-police-arrest-two-teens-over-kido-nursery-ranso-4d632f7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Police%20Arrest%20Two%20Teens%20Over%20Kido%20Nursery%20Ransomware%20Attack&amp;severity=medium&amp;id=68e6915f9d1d1c8c4f541f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-evolution-of-qilin-raas-c8190f0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Evolution%20of%20Qilin%20RaaS&amp;severity=medium&amp;id=68e691559d1d1c8c4f53d397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-meets-gpt-targeted-operations-with-untamed-llm-d23795a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Meets%20GPT%3A%20Targeted%20Operations%20with%20Untamed%20LLMs&amp;severity=medium&amp;id=68e68dec47cdb70919db7f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5009-cwe-359-exposure-of-private-personal-02eaf6bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5009%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Google%20Gemini&amp;severity=low&amp;id=68e6855f620140f5ffd6acb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shuyal-stealer-advanced-infostealer-targeting-19-b-a4ae7a48</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shuyal%20Stealer%3A%20Advanced%20Infostealer%20Targeting%2019%20Browsers&amp;severity=medium&amp;id=68e68dec47cdb70919db7efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nezha-tool-used-in-new-cyber-campaign-targeting-we-57f4da3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nezha%20Tool%20Used%20in%20New%20Cyber%20Campaign%20Targeting%20Web%20Applications&amp;severity=medium&amp;id=68e68dec47cdb70919db7f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-brickstorm-stealthy-backdoor-enabling-espi-43d888c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20BRICKSTORM%3A%20Stealthy%20Backdoor%20Enabling%20Espionage%20into%20Tech%20and%20Legal%20Sectors&amp;severity=medium&amp;id=68e683ab620140f5ffd3e0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36636-vulnerability-in-tenable-security-c-8cda4590</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36636%3A%20Vulnerability%20in%20Tenable%20Security%20Center&amp;severity=medium&amp;id=68e683b8620140f5ffd3e1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61672-cwe-1287-improper-validation-of-spe-4ed93d97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61672%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20element-hq%20synapse&amp;severity=medium&amp;id=68e67d0e724b643b1d6515fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43724-cwe-639-authorization-bypass-throug-9cccf9a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43724%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=68e67ead724b643b1d67f7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11480-sql-injection-in-sourcecodester-sim-bd0cd886</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11480%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-Commerce%20Bookstore&amp;severity=medium&amp;id=68e679d365720131af13d4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11479-sql-injection-in-sourcecodester-wed-fa433597</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11479%3A%20SQL%20Injection%20in%20SourceCodester%20Wedding%20Reservation%20Management%20System&amp;severity=medium&amp;id=68e679d365720131af13d49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43771-cwe-79-improper-neutralization-of-i-8a4e9dd7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43771%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e673033f6e1cf3f1f3e55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-actors-weaponize-nezha-open-source-too-61c1a5e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Nexus%20Actors%20Weaponize%20&apos;Nezha&apos;%20Open%20Source%20Tool&amp;severity=medium&amp;id=68e70b6732de7eb26af50826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11478-sql-injection-in-sourcecodester-far-d269a13e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11478%3A%20SQL%20Injection%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=68e671233f6e1cf3f1f0272d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11477-sql-injection-in-sourcecodester-wed-ca0a3b2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11477%3A%20SQL%20Injection%20in%20SourceCodester%20Wedding%20Reservation%20Management%20System&amp;severity=medium&amp;id=68e671233f6e1cf3f1f02726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-weaponize-open-source-nezha-tool-i-3ac9337f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Weaponize%20Open-Source%20Nezha%20Tool%20in%20New%20Attack%20Wave&amp;severity=medium&amp;id=68e70a4432de7eb26af4e13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43829-cwe-79-cross-site-scripting-in-life-ceb11b1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43829%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e66f813f6e1cf3f1ed69c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/calling-all-influencers-spear-phishers-dangle-tesl-b631b30b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Calling%20All%20Influencers%3A%20Spear-Phishers%20Dangle%20Tesla%2C%20Red%20Bull%20Jobs&amp;severity=medium&amp;id=68e70b6732de7eb26af50829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11476-sql-injection-in-sourcecodester-sim-9320a063</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11476%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-Commerce%20Bookstore&amp;severity=medium&amp;id=68e66a1b5e259e903d9159bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-deepminds-new-ai-agent-finds-and-fixes-vuln-ad51ac97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20DeepMind%E2%80%99s%20New%20AI%20Agent%20Finds%20and%20Fixes%20Vulnerabilities&amp;severity=medium&amp;id=68e6686c5e259e903d8ea0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43830-cwe-79-cross-site-scripting-in-life-08d5af95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43830%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e6688d5e259e903d8f09e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/look-mom-hr-application-look-mom-no-job-phishing-u-60ba0dfd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Look%20mom%20HR%20application%2C%20look%20mom%20no%20job%20-%20phishing%20using%20Zoom%20docs%20to%20harvest%20Gmail%20creds&amp;severity=medium&amp;id=68e663069e2ffba8db3c0645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11475-sql-injection-in-projectworlds-adva-a42905c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11475%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=68e663569e2ffba8db3c4578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43821-cwe-79-improper-neutralization-of-i-c596bec6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43821%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e663569e2ffba8db3c457e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11474-sql-injection-in-sourcecodester-hot-c1e1765a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11474%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e65ab6efc31e4e30866b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-offers-up-to-20000-in-new-ai-bug-bounty-pro-5730f00e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Offers%20Up%20to%20%2420%2C000%20in%20New%20AI%20Bug%20Bounty%20Program&amp;severity=medium&amp;id=68e65a98efc31e4e3086197b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-qilin-and-dragonforce-join-forces-to-domin-bb73677e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%2C%20Qilin%2C%20and%20DragonForce%20Join%20Forces%20to%20Dominate%20the%20Ransomware%20Ecosystem&amp;severity=medium&amp;id=68e70a4432de7eb26af4e141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11473-sql-injection-in-sourcecodester-hot-f7acac64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11473%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e653dc42bf4392300c2b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11472-sql-injection-in-sourcecodester-hot-c2df3d64</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11472%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e653dc42bf4392300c2b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11471-sql-injection-in-sourcecodester-hot-8d659a90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11471%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e64d0011331cab562ed16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-finds-growing-exploitation-of-ai-tools-by-f-3cb25a34</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Finds%20Growing%20Exploitation%20of%20AI%20Tools%20by%20Foreign%20Threat%20Groups&amp;severity=medium&amp;id=68e64cee11331cab562e8d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10649-cwe-89-improper-neutralization-of-s-705cb31c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10649%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=medium&amp;id=68e649a87ee77265a91805fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-have-stolen-2-billion-in-cryp-eff9e053</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Have%20Stolen%20%242%20Billion%20in%20Cryptocurrency%20in%202025&amp;severity=medium&amp;id=68e6498a7ee77265a917afca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/airline-mimicking-fraud-kaspersky-official-blog-687b1741</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Airline-mimicking%20fraud%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e646267ee77265a9118015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/severe-figma-mcp-vulnerability-lets-hackers-execut-8f439e95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Severe%20Framelink%20Figma%20MCP%20Vulnerability%20Lets%20Hackers%20Execute%20Code%20Remotely&amp;severity=low&amp;id=68e70a4432de7eb26af4e144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10353-cwe-43-path-equivalence-filename-in-363738fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10353%3A%20CWE-43%3A%20Path%20Equivalence%3A%20&apos;filename....&apos;%20in%20Melis%20Technology%20Melis%20Platform&amp;severity=critical&amp;id=68e647c37ee77265a914398b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10352-cwe-862-missing-authorization-in-me-f9e189f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10352%3A%20CWE-862%20Missing%20Authorization%20in%20Melis%20Technology%20Melis%20Platform&amp;severity=critical&amp;id=68e642d5f468503fc453c25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10351-cwe-89-improper-neutralization-of-s-232d8b98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10351%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Melis%20Technology%20Melis%20Platform&amp;severity=critical&amp;id=68e642d5f468503fc453c258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11470-unrestricted-upload-in-sourcecodest-88061fde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11470%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e638d621a669664c3e135b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11469-sql-injection-in-sourcecodester-hot-4a4384ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11469%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e638d621a669664c3e1353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shuyal-stealer-targets-17-web-browsers-for-log-d836e32f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Shuyal%20Stealer%20Targets%2017%20Web%20Browsers%20for%20Login%20Data%20and%20Discord%20Tokens&amp;severity=medium&amp;id=68e62d3a859c29afa39e5316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-disrupts-russian-north-korean-and-chinese-h-d3987d5f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Disrupts%20Russian%2C%20North%20Korean%2C%20and%20Chinese%20Hackers%20Misusing%20ChatGPT%20for%20Cyberattacks&amp;severity=high&amp;id=68e62d3a859c29afa39e5312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-group-claims-attack-on-beer-giant-asahi-8eb6539f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Group%20Claims%20Attack%20on%20Beer%20Giant%20Asahi&amp;severity=medium&amp;id=68e62d0b859c29afa39e169e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/draftkings-warns-users-of-credential-stuffing-atta-8150af82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DraftKings%20Warns%20Users%20of%20Credential%20Stuffing%20Attacks&amp;severity=medium&amp;id=68e62d0b859c29afa39e16a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/no-time-to-waste-embedding-ai-to-cut-noise-and-red-d4d2221d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=No%20Time%20to%20Waste%3A%20Embedding%20AI%20to%20Cut%20Noise%20and%20Reduce%20Risk&amp;severity=medium&amp;id=68e70a4432de7eb26af4e147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11445-injection-in-kilo-code-43b434ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11445%3A%20Injection%20in%20Kilo%20Code&amp;severity=medium&amp;id=68e625ceda3febf7f3bdd31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11444-buffer-overflow-in-totolink-n600r-c9eba986</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11444%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N600R&amp;severity=high&amp;id=68e61d166a38b6d000947f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-oracle-ebs-zero-day-started-2-mont-59431fb6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Oracle%20EBS%20Zero-Day%20Started%202%20Months%20Before%20Patching&amp;severity=medium&amp;id=68e619b98c782e8a5017e69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polymorphic-python-malware-wed-oct-8th-a0d41ed4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Polymorphic%20Python%20Malware%2C%20(Wed%2C%20Oct%208th)&amp;severity=low&amp;id=68e70c8e32de7eb26af52226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11443-information-exposure-through-discre-6e6a2e0e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11443%3A%20Information%20Exposure%20Through%20Discrepancy%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e616528c782e8a501129a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11442-cross-site-request-forgery-in-jhuma-30e35df2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11442%3A%20Cross-Site%20Request%20Forgery%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e616528c782e8a5011299f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-disrupts-russian-north-korean-and-chinese-h-695dcf91</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Disrupts%20Russian%2C%20North%20Korean%2C%20and%20Chinese%20Hackers%20Misusing%20ChatGPT%20for%20Cyberattacks&amp;severity=medium&amp;id=68e612e5460aa5f0575866f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11441-improper-restriction-of-excessive-a-6e4f94ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11441%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e60f7a460aa5f05751ac2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11440-improper-access-controls-in-jhumanj-2deedc04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11440%3A%20Improper%20Access%20Controls%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e60f7a460aa5f05751ac24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48464-cwe-200-exposure-of-sensitive-infor-ca73fa1a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48464%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20DuckDuckGo%20DuckDuckGo%20Browser&amp;severity=medium&amp;id=68e60c4e521103a448f6da6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11439-missing-authorization-in-jhumanj-op-a86e64d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11439%3A%20Missing%20Authorization%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e608d2521103a448f0285e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11438-missing-authorization-in-jhumanj-op-15b3b9a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11438%3A%20Missing%20Authorization%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e608d2521103a448f02841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11437-cross-site-scripting-in-jhumanj-opn-14a94ece</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11437%3A%20Cross%20Site%20Scripting%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e60222b199f16041195962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10635-cwe-89-sql-injection-in-find-me-on-0ce7ca32</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10635%3A%20CWE-89%20SQL%20Injection%20in%20Find%20Me%20On&amp;severity=high&amp;id=68e60222b199f1604119595f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11436-unrestricted-upload-in-jhumanj-opnf-2186285e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11436%3A%20Unrestricted%20Upload%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e5fb6c339ddfd99564b614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11435-cross-site-scripting-in-jhumanj-opn-01f8c67a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11435%3A%20Cross%20Site%20Scripting%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e5fb6c339ddfd99564b60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11171-cwe-306-missing-authentication-for--03d31b5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11171%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ays-pro%20Chartify%20%E2%80%93%20WordPress%20Chart%20Plugin&amp;severity=medium&amp;id=68e5f884c921af165e2d8721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11434-sql-injection-in-itsourcecode-stude-7c400a05</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11434%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Transcript%20Processing%20System&amp;severity=medium&amp;id=68e5f6acc921af165e29156d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11433-cross-site-scripting-in-itsourcecod-12bfe3e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11433%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Leave%20Management%20System&amp;severity=medium&amp;id=68e5f6acc921af165e291566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11432-sql-injection-in-itsourcecode-leave-4b53f7c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11432%3A%20SQL%20Injection%20in%20itsourcecode%20Leave%20Management%20System&amp;severity=medium&amp;id=68e5eb8f699de06e9802b2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11204-cwe-89-improper-neutralization-of-s-eee58739</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11204%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=high&amp;id=68e5f02d53704711fa0c3714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11431-sql-injection-in-code-projects-web--e45f8efc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11431%3A%20SQL%20Injection%20in%20code-projects%20Web-Based%20Inventory%20and%20POS%20System&amp;severity=medium&amp;id=68e5e55ce018c7f9c2035cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11430-sql-injection-in-sourcecodester-sim-905514cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11430%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-Commerce%20Bookstore&amp;severity=medium&amp;id=68e5dd90c8e674871eac10c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10587-cwe-89-improper-neutralization-of-s-ec38f44c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10587%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=critical&amp;id=68e5dd90c8e674871eac10c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10494-cwe-73-external-control-of-file-nam-97bb4dfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10494%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=high&amp;id=68e5dd8fc8e674871eac10be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11426-unrestricted-upload-in-projectworld-e60472a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11426%3A%20Unrestricted%20Upload%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=68e5d74ca677756fc9b5b9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11425-cross-site-scripting-in-projectworl-b001acf2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11425%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=68e5d047a677756fc9ae27f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11424-sql-injection-in-code-projects-web--70126c76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11424%3A%20SQL%20Injection%20in%20code-projects%20Web-Based%20Inventory%20and%20POS%20System&amp;severity=medium&amp;id=68e5c93ca677756fc9ace994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11423-memory-corruption-in-tenda-ch22-49a9e856</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11423%3A%20Memory%20Corruption%20in%20Tenda%20CH22&amp;severity=critical&amp;id=68e5c93ca677756fc9ace98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-wont-fix-new-ascii-smuggling-attack-in-gemi-d7849929</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20won%E2%80%99t%20fix%20new%20ASCII%20smuggling%20attack%20in%20Gemini&amp;severity=high&amp;id=68e5c5b7a677756fc9acb11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-wage-broad-corporate-extortion-spree-a421ba45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20Wage%20Broad%20Corporate%20Extortion%20Spree&amp;severity=high&amp;id=68e5c5b7a677756fc9acb126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-refuses-to-pay-ransom-over-widespread-d-045b8021</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20refuses%20to%20pay%20ransom%20over%20widespread%20data%20theft%20attacks&amp;severity=high&amp;id=68e5c5b7a677756fc9acb11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11422-sql-injection-in-campcodes-advanced-25e0306b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11422%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20Management%20System&amp;severity=medium&amp;id=68e5c234a677756fc9ac4c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11421-cross-site-scripting-in-code-projec-cbdf7a04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11421%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68e5c234a677756fc9ac4c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-leads-to-beer-shortage-as-asahi-recove-28e5f1e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20Leads%20to%20Beer%20Shortage%20as%20Asahi%20Recovers&amp;severity=medium&amp;id=68e70b6732de7eb26af5082c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61787-cwe-77-improper-neutralization-of-s-c5ff7c9f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61787%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=68e5c234a677756fc9ac4c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61786-cwe-269-improper-privilege-manageme-f64c5f4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61786%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20denoland%20deno&amp;severity=low&amp;id=68e5b7a8a677756fc9ab1387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48981-vulnerability-in-compugroup-medical-5cea8c1a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48981%3A%20Vulnerability%20in%20CompuGroup%20Medical%20CGM%20MEDICO&amp;severity=high&amp;id=68e5b7a8a677756fc9ab137d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61785-cwe-266-incorrect-privilege-assignm-4be643db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61785%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20denoland%20deno&amp;severity=low&amp;id=68e5b7a8a677756fc9ab1380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11420-sql-injection-in-code-projects-e-co-4cf7fd5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11420%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e5b43da677756fc9a95d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11418-stack-based-buffer-overflow-in-tend-35fe3a84</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11418%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=critical&amp;id=68e5b43da677756fc9a95d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-08-246ebac9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-08&amp;severity=medium&amp;id=68e6fd3e32de7eb26aece213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60311-na-c7d3c98e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60311%3A%20n%2Fa&amp;severity=high&amp;id=68e6bdfa0d022f229cdb3b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61524-na-cd1fdfea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61524%3A%20n%2Fa&amp;severity=high&amp;id=68e6b5002ff6d6ea8f108dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57457-na-84c9231b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57457%3A%20n%2Fa&amp;severity=high&amp;id=68e6b5002ff6d6ea8f108dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53967-na-8ed17cf4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53967%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Framelink%20Figma%20MCP%20Server&amp;severity=high&amp;id=68e691709d1d1c8c4f54b380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59303-cwe-791-incomplete-filtering-of-spe-81a66a6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59303%3A%20CWE-791%20Incomplete%20Filtering%20of%20Special%20Elements%20in%20HAProxy%20HAProxy%20Kubernetes%20Ingress%20Controller&amp;severity=medium&amp;id=68e68dfc47cdb70919dbcb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60318-na-b61a20db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60318%3A%20n%2Fa&amp;severity=medium&amp;id=68e6855f620140f5ffd6acbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60313-na-84179033</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60313%3A%20n%2Fa&amp;severity=medium&amp;id=68e6765965720131af0cf255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60834-na-a1eb9df9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60834%3A%20n%2Fa&amp;severity=medium&amp;id=68e673033f6e1cf3f1f3e55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60833-na-94e7dbdd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60833%3A%20n%2Fa&amp;severity=medium&amp;id=68e671233f6e1cf3f1f02738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60830-na-1c4f87a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60830%3A%20n%2Fa&amp;severity=medium&amp;id=68e671233f6e1cf3f1f02734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61183-na-c430637f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61183%3A%20n%2Fa&amp;severity=medium&amp;id=68e66bf75e259e903d950569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60828-na-a113330a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60828%3A%20n%2Fa&amp;severity=medium&amp;id=68e66bf75e259e903d950565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60314-na-8b0cd3b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60314%3A%20n%2Fa&amp;severity=medium&amp;id=68e6688d5e259e903d8f09e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60299-na-65dddbfe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60299%3A%20n%2Fa&amp;severity=medium&amp;id=68e663569e2ffba8db3c4585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60298-na-3d450388</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60298%3A%20n%2Fa&amp;severity=medium&amp;id=68e663569e2ffba8db3c4581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11417-unrestricted-upload-in-campcodes-ad-47d68abe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11417%3A%20Unrestricted%20Upload%20in%20Campcodes%20Advanced%20Online%20Voting%20Management%20System&amp;severity=medium&amp;id=68e5a615a677756fc9a5e6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61999-cwe-79-improper-neutralization-of-i-f4db80d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61999%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20FOIAXpress&amp;severity=medium&amp;id=68e5a292a677756fc9a5a212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61998-cwe-79-improper-neutralization-of-i-77e9750a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61998%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20FOIAXpress&amp;severity=medium&amp;id=68e5a292a677756fc9a5a20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61997-cwe-79-improper-neutralization-of-i-bdb941f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20FOIAXpress&amp;severity=medium&amp;id=68e5a292a677756fc9a5a208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61996-cwe-79-improper-neutralization-of-i-de326f78</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20FOIAXpress&amp;severity=medium&amp;id=68e5a292a677756fc9a5a203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11416-sql-injection-in-phpgurukul-beauty--69a12f6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11416%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e59f0da677756fc9a55d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11415-sql-injection-in-phpgurukul-beauty--d426d1e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11415%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e59f0da677756fc9a55d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11414-out-of-bounds-read-in-gnu-binutils-733ef33d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11414%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68e59804a677756fc9a4be39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43822-cwe-79-improper-neutralization-of-i-22192320</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e5948ca677756fc9a47c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11413-out-of-bounds-read-in-gnu-binutils-bde75d40</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11413%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68e590fca677756fc9a3f98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11412-out-of-bounds-read-in-gnu-binutils-8c9f638a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11412%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68e590fca677756fc9a3f982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43823-cwe-79-improper-neutralization-of-i-64f8f308</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e58d79a677756fc9a383cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11410-sql-injection-in-campcodes-advanced-dec5c036</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11410%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20Management%20System&amp;severity=medium&amp;id=68e589f9a677756fc9a320db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-season-spam-with-a-touch-of-salt-22246274</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Season%20Spam%20With%20a%20Touch%20of%20&apos;Salt&apos;&amp;severity=medium&amp;id=68e70b6732de7eb26af5082f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/draftkings-warns-of-account-breaches-in-credential-61f9a9d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DraftKings%20warns%20of%20account%20breaches%20in%20credential%20stuffing%20attacks&amp;severity=high&amp;id=68e582eaa677756fc9a25c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11409-sql-injection-in-campcodes-advanced-26813693</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11409%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20Management%20System&amp;severity=medium&amp;id=68e582fea677756fc9a25d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34252-cwe-506-embedded-malicious-code-in--7efafdd8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34252&amp;severity=null&amp;id=68e582fea677756fc9a25d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11408-buffer-overflow-in-d-link-di-7001-m-e077544d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11408%3A%20Buffer%20Overflow%20in%20D-Link%20DI-7001%20MINI&amp;severity=high&amp;id=68e57be5a677756fc9a19479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11407-os-command-injection-in-d-link-di-7-8e856e97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11407%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-7001%20MINI&amp;severity=medium&amp;id=68e574dca677756fc9a0e40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36565-cwe-88-improper-neutralization-of-a-6d9e717b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36565%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e57159a677756fc9a08302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6242-server-side-request-forgery-ssrf-in--6a610542</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6242%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20AI%20Inference%20Server&amp;severity=high&amp;id=68e57159a677756fc9a082fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11462-cwe-59-improper-link-resolution-bef-685a3221</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11462%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AWS%20Client%20VPN&amp;severity=critical&amp;id=68e57159a677756fc9a082f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36566-cwe-78-improper-neutralization-of-s-b17adecc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36566%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e57159a677756fc9a082fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36569-cwe-78-improper-neutralization-of-s-2c8badc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36569%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e56dd5a677756fc9a02cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11406-information-disclosure-in-kaifangqi-6403ae48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11406%3A%20Information%20Disclosure%20in%20kaifangqian%20kaifangqian-base&amp;severity=medium&amp;id=68e56dd5a677756fc9a02ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36567-cwe-78-improper-neutralization-of-s-374afa4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36567%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e56dd5a677756fc9a02ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61910-cwe-789-memory-allocation-with-exce-83a69346</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61910%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20nasa-jpl%20ION-DTN&amp;severity=high&amp;id=68e56dd5a677756fc9a02cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43727-cwe-303-incorrect-implementation-of-7876d8c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43727%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=high&amp;id=68e56a54a677756fc99e5a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43910-cwe-121-stack-based-buffer-overflow-82f0b5c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43910%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=low&amp;id=68e56a54a677756fc99e5a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43909-cwe-327-use-of-a-broken-or-risky-cr-7557eb6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43909%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=low&amp;id=68e566d0a677756fc99d8dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-concerns-shadow-vibe-coding-adoption-23201591</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Concerns%20Shadow%20Vibe%20Coding%20Adoption&amp;severity=medium&amp;id=68e70b6732de7eb26af50832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11192-cwe-287-improper-authentication-in--a9eb5881</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11192%3A%20CWE-287%20Improper%20Authentication%20in%20Extreme%20Networks%20Fabric%20Engine%20(VOSS)&amp;severity=high&amp;id=68e566d0a677756fc99d8dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43905-cwe-88-improper-neutralization-of-a-c0d12903</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43905%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e566d0a677756fc99d8dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11405-sql-injection-in-sourcecodester-hot-dc42e115</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11405%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e566d0a677756fc99d8dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61784-cwe-22-improper-limitation-of-a-pat-51bab548</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61784%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20hiyouga%20LLaMA-Factory&amp;severity=high&amp;id=68e566d0a677756fc99d8dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45375-cwe-121-stack-based-buffer-overflow-726c2b16</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45375%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e566d0a677756fc99d8dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61776-cwe-522-insufficiently-protected-cr-46d73fbd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61776%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20DependencyTrack%20dependency-track&amp;severity=medium&amp;id=68e566d0a677756fc99d8dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43913-cwe-327-use-of-a-broken-or-risky-cr-0017fa0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43913%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e56349a677756fc99d111c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61670-cwe-772-missing-release-of-resource-8419984c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61670%3A%20CWE-772%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=68e56349a677756fc99d1128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43912-cwe-122-heap-based-buffer-overflow--9654dc48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43912%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e56349a677756fc99d1125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43891-cwe-327-use-of-a-broken-or-risky-cr-3d73caff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43891%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e56349a677756fc99d1121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43889-cwe-22-improper-limitation-of-a-pat-2f0f7fc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43889%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e55fc5a677756fc99c5724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11404-sql-injection-in-sourcecodester-hot-b5f2668a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11404%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e55fc5a677756fc99c571d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43934-cwe-22-improper-limitation-of-a-pat-fcb2a14f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43934%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e55fc5a677756fc99c5727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43908-cwe-78-improper-neutralization-of-s-57ae8f45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43908%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e55c41a677756fc99bb4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3449-cwe-340-generation-of-predictable-nu-7844f8a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3449%3A%20CWE-340%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20B%26R%20Industrial%20Automation%20GmbH%20Automation%20Runtime&amp;severity=low&amp;id=68e55c41a677756fc99bb4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3448-cwe-79-improper-neutralization-of-in-a5fd5fef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20B%26R%20Industrial%20Automation%20GmbH%20Automation%20Runtime&amp;severity=medium&amp;id=68e55c41a677756fc99bb4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43907-cwe-35-path-traversal-in-dell-power-cd6a54a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43907%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e55c41a677756fc99bb4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/electronics-giant-avnet-confirms-breach-says-stole-e85b9afb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Electronics%20giant%20Avnet%20confirms%20breach%2C%20says%20stolen%20data%20unreadable&amp;severity=high&amp;id=68e558bda677756fc99b47a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-stole-over-2-billion-in-crypt-8dd6a5fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20hackers%20stole%20over%20%242%20billion%20in%20crypto%20this%20year&amp;severity=high&amp;id=68e558bda677756fc99b47ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-exploited-oracle-zero-day-for-data-theft-sinc-00975fbe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20exploited%20Oracle%20zero-day%20for%20data%20theft%20since%20early%20August&amp;severity=critical&amp;id=68e558bda677756fc99b47a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8291-vulnerability-in-python-software-fou-ebe6955f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8291%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=68e558f4a677756fc99b5208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43911-cwe-78-improper-neutralization-of-s-fc6c37b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43911%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e558f4a677756fc99b5205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3450-cwe-413-improper-resource-locking-in-73957373</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3450%3A%20CWE-413%20Improper%20Resource%20Locking%20in%20B%26R%20Industrial%20Automation%20Automation%20Runtime&amp;severity=critical&amp;id=68e558f4a677756fc99b51ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43906-cwe-78-improper-neutralization-of-s-31141612</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43906%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e558f4a677756fc99b5202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11403-sql-injection-in-sourcecodester-hot-01eb4632</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11403%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e558f4a677756fc99b51f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43890-cwe-78-improper-neutralization-of-s-c2787076</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43890%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e55537a677756fc99a7728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1826-cwe-79-improper-neutralization-of-in-69a9cefb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Jazz%20Foundation&amp;severity=medium&amp;id=68e55537a677756fc99a7725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43914-cwe-266-incorrect-privilege-assignm-47270ad4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43914%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerProtect%20Data%20Domain%20BoostFS%20for%20Linux%20Ubuntu%20Feature%20Release&amp;severity=high&amp;id=68e55537a677756fc99a772b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13-year-old-redishell-vulnerability-puts-60000-red-90a50a75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13-Year-Old%20RediShell%20Vulnerability%20Puts%2060%2C000%20Redis%20Servers%20at%20Risk&amp;severity=medium&amp;id=68e551b0a677756fc999fc5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36156-cwe-119-improper-restriction-of-ope-681f0ee1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36156%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20IBM%20InfoSphere%20Data%20Replication%20VSAM%20for%20z%2FOS%20Remote%20Source&amp;severity=high&amp;id=68e551c3a677756fc999ff6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11402-sql-injection-in-sourcecodester-hot-2e33ee76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11402%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e551c3a677756fc999ff6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/batshadow-group-uses-new-go-based-vampire-bot-malw-2fd7756e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BatShadow%20Group%20Uses%20New%20Go-Based%20&apos;Vampire%20Bot&apos;%20Malware%20to%20Hunt%20Job%20Seekers&amp;severity=medium&amp;id=68e70a4432de7eb26af4e14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11401-sql-injection-in-sourcecodester-hot-7c500958</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11401%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e54aaaa677756fc998dc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-actors-exploit-critical-fortra-g-c90501d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Actors%20Exploit%20Critical%20Fortra%20GoAnywhere%20Flaw&amp;severity=critical&amp;id=68e70b6732de7eb26af50835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploit-against-freepbx-cve-2025-57819-with-code-e-20a51acc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploit%20Against%20FreePBX%20(CVE-2025-57819)%20with%20code%20execution.%2C%20(Tue%2C%20Oct%207th)&amp;severity=low&amp;id=68e54014a677756fc996ba89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11400-sql-injection-in-sourcecodester-hot-6588b18c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11400%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e53c9ba677756fc9965d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-exploiting-goanywhere-mft-flaw-c-028a8fc2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Exploiting%20GoAnywhere%20MFT%20Flaw%2C%20Confirms%20Microsoft&amp;severity=medium&amp;id=68e53590a677756fc994434a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11399-sql-injection-in-sourcecodester-hot-48d2f9b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11399%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e535a2a677756fc994444e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-new-ai-doesnt-just-find-vulnerabilities-it-902180b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google&apos;s%20New%20AI%20Doesn&apos;t%20Just%20Find%20Vulnerabilities%20%E2%80%94%20It%20Rewrites%20Code%20to%20Patch%20Them&amp;severity=medium&amp;id=68e70a4432de7eb26af4e14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11398-unrestricted-upload-in-sourcecodest-5190437b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11398%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e52784a677756fc992c213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6215-vulnerability-in-hp-inc-hp-sure-star-0ec0c936</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6215%3A%20Vulnerability%20in%20HP%2C%20Inc.%20HP%20Sure%20Start%20IFD%20Protection&amp;severity=high&amp;id=68e52784a677756fc992c210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-60-returns-with-35-plugins-and-enhanced-data-e107f8bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%206.0%20Returns%20with%2035%2B%20Plugins%20and%20Enhanced%20Data%20Theft%20Capabilities&amp;severity=high&amp;id=68e52400a677756fc992607b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-ai-is-already-the-1-data-exfiltration-fa26005f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Research%3A%20AI%20Is%20Already%20the%20%231%20Data%20Exfiltration%20Channel%20in%20the%20Enterprise&amp;severity=high&amp;id=68e52400a677756fc992607f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59425-cwe-385-covert-timing-channel-in-vl-382e4a86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59425%3A%20CWE-385%3A%20Covert%20Timing%20Channel%20in%20vllm-project%20vllm&amp;severity=high&amp;id=68e5207aa677756fc991b831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11397-sql-injection-in-sourcecodester-hot-d8ae86a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11397%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e5207aa677756fc991b826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25009-cwe-79-improper-neutralization-of-i-4823c67a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25009%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=68e52784a677756fc992c1fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54402-cwe-121-stack-based-buffer-overflow-3cbebbcb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54402%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54401-cwe-121-stack-based-buffer-overflow-ed3e7f32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54401%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54400-cwe-121-stack-based-buffer-overflow-4f73a460</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54400%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54399-cwe-121-stack-based-buffer-overflow-a6931196</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54399%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54404-cwe-78-improper-neutralization-of-s-1f5d2496</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54404%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54403-cwe-78-improper-neutralization-of-s-bbace43d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54403%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48826-cwe-134-use-of-externally-controlle-fd583422</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48826%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e535a2a677756fc9944455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54406-cwe-78-improper-neutralization-of-s-c06c90d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54406%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e535a2a677756fc994445b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54405-cwe-78-improper-neutralization-of-s-c54e8bd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54405%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e535a2a677756fc9944458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37728-cwe-522-insufficiently-protected-cr-317b1202</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37728%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=68e51d0ca677756fc991120e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53476-cwe-775-missing-release-of-file-des-e66c056d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53476%3A%20CWE-775%3A%20Missing%20Release%20of%20File%20Descriptor%20or%20Handle%20after%20Effective%20Lifetime%20in%20OpenPLC%20OpenPLC_v3&amp;severity=medium&amp;id=68e51d0ca677756fc9911217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-stole-data-from-public-safety-comms-firm-b-9bad7ac4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Stole%20Data%20From%20Public%20Safety%20Comms%20Firm%20BK%20Technologies&amp;severity=medium&amp;id=68e515e9a677756fc98deb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11396-sql-injection-in-code-projects-simp-11b937b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11396%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68e51270a677756fc98d6741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40888-cwe-89-improper-neutralization-of-s-c53fb6db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40888%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=68e50ee5a677756fc98ca4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40889-cwe-22-improper-limitation-of-a-pat-a193631d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40889%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=68e50ee5a677756fc98ca4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40887-cwe-89-improper-neutralization-of-s-0a3512e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40887%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=68e50ee5a677756fc98ca4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40886-cwe-89-improper-neutralization-of-s-1610ea97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40886%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=68e50ee5a677756fc98ca4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40885-cwe-89-improper-neutralization-of-s-6da5477a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40885%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=68e50ee5a677756fc98ca4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3719-cwe-863-incorrect-authorization-in-n-c7662e9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3719%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=68e50b71a677756fc98c2731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3718-cwe-22-improper-limitation-of-a-path-a394732e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3718%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=68e50b71a677756fc98c272e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40676-cwe-639-authorization-bypass-throug-b1f95981</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40676%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20BBMRI-ERIC%20Negotiator&amp;severity=medium&amp;id=68e50b71a677756fc98c2737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40649-cwe-79-improper-neutralization-of-i-3656a29f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20BBMRI-ERIC%20Negotiator&amp;severity=medium&amp;id=68e50b71a677756fc98c2734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11390-cross-site-scripting-in-phpgurukul--f96bc6b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11390%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=68e5045da677756fc98b28cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0603-cwe-89-improper-neutralization-of-sp-99fd7352</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0603%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Callvision%20Healthcare%20Callvision%20Emergency%20Code&amp;severity=critical&amp;id=68e4fe9ca677756fc98a5099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11389-stack-based-buffer-overflow-in-tend-a3436941</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11389%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=68e4fe9ca677756fc98a509c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11388-stack-based-buffer-overflow-in-tend-bef1454f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11388%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=68e4f655a677756fc988cb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-ai-is-already-the-1-data-exfiltration-be458a28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Research%3A%20AI%20Is%20Already%20the%20%231%20Data%20Exfiltration%20Channel%20in%20the%20Enterprise&amp;severity=critical&amp;id=68e70a4432de7eb26af4e150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-60-returns-with-35-plugins-and-enhanced-data-0efc8f9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%206.0%20Returns%20with%2035%2B%20Plugins%20and%20Enhanced%20Data%20Theft%20Capabilities&amp;severity=medium&amp;id=68e70a4432de7eb26af4e153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-now-redishell-threatens-cloud-via-redis-rce-2da94854</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%20Now%3A%20&apos;RediShell&apos;%20Threatens%20Cloud%20Via%20Redis%20RCE&amp;severity=low&amp;id=68e70b6732de7eb26af50838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-firm-exposes-role-of-beijing-research-ins-1a56dfe1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Firm%20Exposes%20Role%20of%20Beijing%20Research%20Institute%20in%20China%E2%80%99s%20Cyber%20Operations&amp;severity=medium&amp;id=68e4f01d4f7f35a610571911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11387-stack-based-buffer-overflow-in-tend-138267fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11387%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=68e4ecad4f7f35a6104f9b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mic-e-mouse-attack-shows-computer-mice-can-cap-c004bbbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Mic-E-Mouse%20Attack%20Shows%20Computer%20Mice%20Can%20Capture%20Conversations&amp;severity=medium&amp;id=68e4ea01434a490243e03ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11386-stack-based-buffer-overflow-in-tend-9095546d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11386%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=68e4e83c434a490243dbbf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortra-goanywhere-mft-zero-day-exploited-in-ransom-a688e086</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortra%20GoAnywhere%20MFT%20Zero-Day%20Exploited%20in%20Ransomware%20Attacks&amp;severity=medium&amp;id=68e4e063ab797cfef8b07343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11385-buffer-overflow-in-tenda-ac20-9d3e51a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11385%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68e4e080ab797cfef8b0b8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-oracle-mozilla-microsoft-windows-linu-52937b7b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Oracle%2C%20Mozilla%2C%20Microsoft%20Windows%2C%20Linux%20Kernel%2C%20and%20Microsoft%20IE%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68e4dd9e6ce4090a3e84c089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11360-cross-site-scripting-in-jakowenko-d-2b4b57b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11360%3A%20Cross%20Site%20Scripting%20in%20jakowenko%20double-take&amp;severity=medium&amp;id=68e4da266ce4090a3e7d70a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-cve-2025-59489-vulnerability-in-unity-and-how--e517ca08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20CVE-2025-59489%20vulnerability%20in%20Unity%2C%20and%20how%20to%20fix%20it%20in%20games%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e4d779769a746382d0cc09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-y2k38-bug-is-a-vulnerability-not-just-a-date-p-a62187a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Y2K38%20Bug%20Is%20a%20Vulnerability%2C%20Not%20Just%20a%20Date%20Problem%2C%20Researchers%20Warn&amp;severity=medium&amp;id=68e4d3ea769a746382c94569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13-year-old-redis-flaw-exposed-cvss-100-vulnerabil-807db79d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13-Year-Old%20Redis%20Flaw%20Exposed%3A%20CVSS%2010.0%20Vulnerability%20Lets%20Attackers%20Run%20Code%20Remotely&amp;severity=critical&amp;id=68e4fe7ca677756fc98a4e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-puts-60000-redis-servers-at-cc549522</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20Puts%2060%2C000%20Redis%20Servers%20at%20Risk%20of%20Exploitation&amp;severity=critical&amp;id=68e4d12d768805d4eae397a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11359-sql-injection-in-code-projects-simp-d3c301c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11359%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Banking%20System&amp;severity=medium&amp;id=68e4d148768805d4eae3e95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10645-cwe-532-insertion-of-sensitive-info-66fef1aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10645%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20webfactory%20WP%20Reset&amp;severity=medium&amp;id=68e4d148768805d4eae3e95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-links-storm-1175-to-goanywhere-exploit-d-0e3afbff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Links%20Storm-1175%20to%20GoAnywhere%20Exploit%20Deploying%20Medusa%20Ransomware&amp;severity=critical&amp;id=68e4fe7ca677756fc98a4e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11358-sql-injection-in-code-projects-simp-33cd1f0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11358%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Banking%20System&amp;severity=medium&amp;id=68e4cb233f98f1161b9a3b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11357-sql-injection-in-code-projects-simp-4dfea686</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11357%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Banking%20System&amp;severity=medium&amp;id=68e4c332b08cfbbcc3c5e902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7400-cwe-79-improper-neutralization-of-in-1141749d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7400%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=68e4c18bb08cfbbcc3c2db23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11356-buffer-overflow-in-tenda-ac23-f3673b6e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11356%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=68e4bd0a62e88349a68c2792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11355-buffer-overflow-in-utt-1250gw-0275a842</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11355%3A%20Buffer%20Overflow%20in%20UTT%201250GW&amp;severity=high&amp;id=68e4bd0a62e88349a68c2799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11354-unrestricted-upload-in-code-project-ee0ac4c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11354%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68e4af0350b3b89b2181d408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10162-cwe-22-improper-limitation-of-a-pat-f42cbe7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10162%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Admin%20and%20Customer%20Messages%20After%20Order%20for%20WooCommerce%3A%20OrderConvo&amp;severity=high&amp;id=68e4af0350b3b89b2181d405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11353-unrestricted-upload-in-code-project-4d2bdafc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11353%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68e4a8e1f36fcb72ab3b3d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-ebs-under-fire-as-cl0p-exploits-cve-2025-61-3ef6c79f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20EBS%20Under%20Fire%20as%20Cl0p%20Exploits%20CVE-2025-61882%20in%20Real-World%20Attacks&amp;severity=critical&amp;id=68e4fe7ca677756fc98a4e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11352-unrestricted-upload-in-code-project-0808c5a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11352%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68e4a2b8a0f5db0db2785ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11362-allocation-of-resources-without-lim-3be9168f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11362%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20pdfmake&amp;severity=high&amp;id=68e4a2b8a0f5db0db2785ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11351-unrestricted-upload-in-code-project-19a0bd95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11351%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68e499fd3b3ae40543e7ee7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11350-sql-injection-in-campcodes-online-a-29092dd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11350%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68e493d46ce96be75a0a2611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11349-sql-injection-in-campcodes-online-a-e3a28563</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11349%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68e48d326a45552f36eb7389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11348-sql-injection-in-campcodes-online-a-7695d4fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11348%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68e4862a6a45552f36eb0390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11347-unrestricted-upload-in-code-project-95c6d13a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11347%3A%20Unrestricted%20Upload%20in%20code-projects%20Student%20Crud%20Operation&amp;severity=medium&amp;id=68e4862a6a45552f36eb0389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-october-7th-2025-httpsis-3514c36f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20October%207th%2C%202025%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9644%2C%20(Tue%2C%20Oct%207th)&amp;severity=medium&amp;id=68e4748c6a45552f36e9abd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-07-f7f0ab1c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-07&amp;severity=medium&amp;id=68e5ad0ba677756fc9a6b000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62185-cwe-427-uncontrolled-search-path-el-42475e5d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62185%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Ankitects%20Anki&amp;severity=medium&amp;id=68e582fea677756fc9a25d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62187-cwe-23-relative-path-traversal-in-a-b2ffe603</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62187%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Ankitects%20Anki&amp;severity=low&amp;id=68e582fea677756fc9a25d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62186-cwe-829-inclusion-of-functionality--ced2a08c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62186%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Ankitects%20Anki&amp;severity=medium&amp;id=68e582fea677756fc9a25d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44824-cwe-863-incorrect-authorization-in--127007c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44824%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=68e56dd5a677756fc9a02cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44823-cwe-497-exposure-of-sensitive-syste-989fc5cb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44823%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20Log%20Server&amp;severity=critical&amp;id=68e56dd5a677756fc9a02cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56243-na-d229e563</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56243%3A%20n%2Fa&amp;severity=medium&amp;id=68e54726a677756fc9984850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52021-na-2d913583</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52021%3A%20n%2Fa&amp;severity=critical&amp;id=68e54726a677756fc998484d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60312-na-bb8ec3e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60312%3A%20n%2Fa&amp;severity=medium&amp;id=68e53917a677756fc995dfd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57564-na-4edce169</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57564%3A%20n%2Fa&amp;severity=high&amp;id=68e5207aa677756fc991b82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50505-na-6ac24c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50505%3A%20n%2Fa&amp;severity=high&amp;id=68e51d0ca677756fc9911211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zeroday-cloud-hacking-contest-offers-45-million-in-3de050e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zeroday%20Cloud%20hacking%20contest%20offers%20%244.5%20million%20in%20bounties&amp;severity=critical&amp;id=68e455e079fe82f008c207a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-critical-goanywhere-bug-exploited-in-ran-c18f5ff1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%3A%20Critical%20GoAnywhere%20bug%20exploited%20in%20ransomware%20attacks&amp;severity=critical&amp;id=68e455e079fe82f008c2079e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-data-breach-escalates-as-shinyhunters-join-866ab16e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20data%20breach%20escalates%20as%20ShinyHunters%20joins%20extortion&amp;severity=high&amp;id=68e455e079fe82f008c207a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34251-cwe-269-improper-privilege-manageme-37b9d1ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34251%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tesla%20Telematics%20Control%20Unit%20(TCU)&amp;severity=high&amp;id=68e4536752d9d39e2226205f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43824-cwe-79-improper-neutralization-of-i-98f15cc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e43f694819f8f2e191a0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61768-cwe-20-improper-input-validation-in-6a4c1c9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61768%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20xuemian168%20kuno&amp;severity=medium&amp;id=68e43b3134fac240349f66b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/know-your-enemy-how-cybercriminals-and-nation-stat-8efb73ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Know%20Your%20Enemy%3A%20How%20cybercriminals%20and%20nation-state%20hackers%20operate&amp;severity=medium&amp;id=68e369b5bd6176610b498abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattackers-exploit-zimbra-zero-day-via-ics-d14adc82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattackers%20Exploit%20Zimbra%20Zero-Day%20Via%20ICS&amp;severity=medium&amp;id=68e469f16a45552f36e90707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11346-deserialization-in-ilias-f66e3077</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11346%3A%20Deserialization%20in%20ILIAS&amp;severity=medium&amp;id=68e41a9cfa9ee2dfa0ac712f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-hits-oracle-customers-via-zero-day-a29f9c11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20Ransomware%20Hits%20Oracle%20Customers%20Via%20Zero-Day%20Flaw&amp;severity=medium&amp;id=68e4160e4d3b0698c0125c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11345-deserialization-in-ilias-6f73f9fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11345%3A%20Deserialization%20in%20ILIAS&amp;severity=medium&amp;id=68e4144c4d3b0698c00df52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-v6-exploring-pivotal-plugins-afdf4405</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%20V6%3A%20Exploring%20Pivotal%20Plugins&amp;severity=medium&amp;id=68e412954d3b0698c00ae5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-propagating-malware-spreading-via-whatsapp-ta-0f878fdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Propagating%20Malware%20Spreading%20Via%20WhatsApp%2C%20Targets%20Brazilian%20Users&amp;severity=medium&amp;id=68e412954d3b0698c00ae607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11344-remote-code-execution-in-ilias-0c04ee9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11344%3A%20Code%20Injection%20in%20ILIAS&amp;severity=medium&amp;id=68e40de8cf87aa9c343fb6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spyware-in-fake-signal-and-totok-apps-targets-uae--38fa80b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spyware%20in%20Fake%20Signal%20and%20ToTok%20Apps%20Targets%20UAE%20Android%20Users&amp;severity=medium&amp;id=68e405eb64f972a16d66fe4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11343-sql-injection-in-code-projects-stud-7b869aa4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11343%3A%20SQL%20Injection%20in%20code-projects%20Student%20Crud%20Operation&amp;severity=medium&amp;id=68e4079864f972a16d6a0ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6985-cwe-611-improper-restriction-of-xml--804486b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6985%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=high&amp;id=68e405fa64f972a16d673f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11342-sql-injection-in-code-projects-onli-1c1cba7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11342%3A%20SQL%20Injection%20in%20code-projects%20Online%20Course%20Registration&amp;severity=medium&amp;id=68e3ff9d1c1196eac613431e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linkedin-sues-proapis-for-using-1m-fake-accounts-t-21412500</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LinkedIn%20sues%20ProAPIs%20for%20using%201M%20fake%20accounts%20to%20scrape%20user%20data&amp;severity=high&amp;id=68e3f93d10d29ec2ec454b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redis-warns-of-critical-flaw-impacting-thousands-o-5bec5958</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Redis%20warns%20of%20critical%20flaw%20impacting%20thousands%20of%20instances&amp;severity=critical&amp;id=68e3f93d10d29ec2ec454b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11341-xml-external-entity-reference-in-ji-7ad03120</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11341%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68e3f95810d29ec2ec45cc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36354-cwe-78-improper-neutralization-of-s-9625c04d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36354%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=68e3f641083a44572bca373c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61778-cwe-290-authentication-bypass-by-sp-d3182a9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61778%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20akkadotnet%20akka.net&amp;severity=critical&amp;id=68e3f641083a44572bca3745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36355-cwe-829-inclusion-of-functionality--adcff379</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36355%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=68e3f641083a44572bca373f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36356-cwe-250-execution-with-unnecessary--3837d4c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36356%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=critical&amp;id=68e3f641083a44572bca3742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61777-cwe-200-exposure-of-sensitive-infor-f157d5c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61777%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlagForgeCTF%20flagForge&amp;severity=critical&amp;id=68e3f46f083a44572bc63cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10363-cwe-502-deserialization-of-untruste-66015baa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10363%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Topal%20Solutions%20AG%20Topal%20Finanzbuchhaltung&amp;severity=critical&amp;id=68e3f2c5083a44572bc2aa12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11339-buffer-overflow-in-d-link-di-7100g--8d034ca7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11339%3A%20Buffer%20Overflow%20in%20D-Link%20DI-7100G%20C1&amp;severity=high&amp;id=68e3f2c5083a44572bc2aa16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0038-cwe-1284-improper-validation-of-spec-acb882e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0038%3A%20CWE-1284%20-%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20Kria(TM)%20SOM&amp;severity=medium&amp;id=68e3ecad3a3ccaa613952b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61766-cwe-674-uncontrolled-recursion-in-w-e6437333</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61766%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20weirdgloop%20mediawiki-extensions-Bucket&amp;severity=medium&amp;id=68e3ecad3a3ccaa613952b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61765-cwe-502-deserialization-of-untruste-abbf83e7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61765%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20miguelgrinberg%20python-socketio&amp;severity=medium&amp;id=68e3ea0f7f1d1774cab77ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11338-buffer-overflow-in-d-link-di-7100g--b1989bb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11338%3A%20Buffer%20Overflow%20in%20D-Link%20DI-7100G%20C1&amp;severity=high&amp;id=68e3ea0f7f1d1774cab77b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61687-cwe-434-unrestricted-upload-of-file-f035be13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61687%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68e3e8427f1d1774cab273fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-cybercrime-group-runs-global-seo-fraud-rin-843d88dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Cybercrime%20Group%20Runs%20Global%20SEO%20Fraud%20Ring%20Using%20Compromised%20IIS%20Servers&amp;severity=high&amp;id=68e3e3f60d99582527bb4695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-malware-resurfaces-with-ransomware-module-ov-91121c97</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%20malware%20resurfaces%20with%20ransomware%20module%2C%20over%2035%20plugins&amp;severity=high&amp;id=68e3e3f60d99582527bb4691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/steam-and-microsoft-warn-of-unity-flaw-exposing-ga-2ac8180b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Steam%20and%20Microsoft%20warn%20of%20Unity%20flaw%20exposing%20gamers%20to%20attacks&amp;severity=high&amp;id=68e3e3f60d99582527bb4699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taking-remote-control-over-industrial-generators-e72b45ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taking%20remote%20control%20over%20industrial%20generators&amp;severity=medium&amp;id=68e3e07e0d99582527b333af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59152-cwe-807-reliance-on-untrusted-input-55b27963</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59152%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20litestar-org%20litestar&amp;severity=high&amp;id=68e3e22d0d99582527b656f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52472-cwe-89-improper-neutralization-of-s-b863cc29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52472%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=68e3da725799e49c42c45190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49594-cwe-285-improper-authorization-in-x-069429c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49594%3A%20CWE-285%3A%20Improper%20Authorization%20in%20xwiki-contrib%20oidc&amp;severity=critical&amp;id=68e3d7f5cb24753c988f01cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49886-cwe-502-deserialization-of-untruste-96cc76ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49886%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20Transformation%20Extender%20Advanced&amp;severity=critical&amp;id=68e3d7f5cb24753c988f01c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-says-user-information-stolen-in-third-part-89fad90a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Says%20User%20Information%20Stolen%20in%20Third-Party%20Data%20Breach&amp;severity=medium&amp;id=68e3d7ddcb24753c988ee6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rainwalk-pet-insurance-exposes-158-gb-of-us-custom-fbb33983</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rainwalk%20Pet%20Insurance%20Exposes%20158%20GB%20of%20US%20Customer%20and%20Pet%20Data&amp;severity=medium&amp;id=68e3d18bfa854abf392e0a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-govt-fronts-trick-the-west-to-obtain-cyber-4bd5f993</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Gov&apos;t%20Fronts%20Trick%20the%20West%20to%20Obtain%20Cyber%20Tech&amp;severity=medium&amp;id=68e3ce0cfa854abf39264006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-report-links-research-firms-bieta-and-ciii-to--a438d07d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Report%20Links%20Research%20Firms%20BIETA%20and%20CIII%20to%20China%E2%80%99s%20MSS%20Cyber%20Operations&amp;severity=medium&amp;id=68e467466a45552f36e85b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11337-path-traversal-in-four-faith-water--1843beb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11337%3A%20Path%20Traversal%20in%20Four-Faith%20Water%20Conservancy%20Informatization%20Platform&amp;severity=medium&amp;id=68e3c79efee0e782790922d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-and-steam-take-action-as-unity-vulnerabi-1d185d81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20and%20Steam%20Take%20Action%20as%20Unity%20Vulnerability%20Puts%20Games%20at%20Risk&amp;severity=low&amp;id=68e3c0edce01562c4aae4c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11336-path-traversal-in-four-faith-water--feb69fdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11336%3A%20Path%20Traversal%20in%20Four-Faith%20Water%20Conservancy%20Informatization%20Platform&amp;severity=medium&amp;id=68e3c2aace01562c4ab140ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-dll-hijacking-with-ml-kaspersky-official-30097b42</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20DLL%20hijacking%20with%20ML%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e3bda84ffbcd9cf4f9add0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-and-dirty-analysis-of-possible-oracle-e-busi-8d73c5a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20and%20Dirty%20Analysis%20of%20Possible%20Oracle%20E-Business%20Suite%20Exploit%20Script%20(CVE-2025-61882)%20%26%23x5b%3BUPDATED%26%23x5b%3B%2C%20(Mon%2C%20Oct%206th)&amp;severity=medium&amp;id=68e33efb99657e9cbd630ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11335-command-injection-in-d-link-di-7100-0aaf5ff4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11335%3A%20Command%20Injection%20in%20D-Link%20DI-7100G%20C1&amp;severity=medium&amp;id=68e3ba264ffbcd9cf4f20805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-oracle-0-day-bitlocker-bypass-vmscape-60122db7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Oracle%200-Day%2C%20BitLocker%20Bypass%2C%20VMScape%2C%20WhatsApp%20Worm%20%26%20More&amp;severity=high&amp;id=68e467466a45552f36e85b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-rushes-patch-for-cve-2025-61882-after-cl0p--aefa1e37</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Rushes%20Patch%20for%20CVE-2025-61882%20After%20Cl0p%20Exploited%20It%20in%20Data%20Theft%20Attacks&amp;severity=critical&amp;id=68e467466a45552f36e85b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-cybercrime-group-runs-global-seo-fraud-rin-da0a57dd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Cybercrime%20Group%20Runs%20Global%20SEO%20Fraud%20Ring%20Using%20Compromised%20IIS%20Servers&amp;severity=high&amp;id=68e467466a45552f36e85b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11334-sql-injection-in-campcodes-online-a-d01b802c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11334%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68e3aa44a74bcb39a88e54bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-extorting-salesforce-after-stealing-data-f-2461aa4e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Extorting%20Salesforce%20After%20Stealing%20Data%20From%20Dozens%20of%20Customers&amp;severity=medium&amp;id=68e3aa2ca74bcb39a88e0017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securitysnack-18e-crime-68c2af3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SecuritySnack%3A%2018%2BE-Crime&amp;severity=medium&amp;id=68e3a7d4a74bcb39a887eed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11333-cross-site-scripting-in-langleyfcu--9378a2f8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11333%3A%20Cross%20Site%20Scripting%20in%20langleyfcu%20Online%20Banking%20System&amp;severity=medium&amp;id=68e3a6c5a74bcb39a885c280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breach-at-doctors-imaging-group-impacts-17100-cddc7318</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Breach%20at%20Doctors%20Imaging%20Group%20Impacts%20171%2C000%20People&amp;severity=medium&amp;id=68e39feb5c165d4385dfe321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11332-cross-site-scripting-in-cmseasy-ed23db07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11332%3A%20Cross%20Site%20Scripting%20in%20CmsEasy&amp;severity=medium&amp;id=68e39cda5ba1d306aee24fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dell-unityvsa-flaw-allows-command-execution-withou-294198dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dell%20UnityVSA%20Flaw%20Allows%20Command%20Execution%20Without%20Login&amp;severity=medium&amp;id=68e399615ba1d306aedb637b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11331-command-injection-in-ideacms-2bfcf5ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11331%3A%20Command%20Injection%20in%20IdeaCMS&amp;severity=medium&amp;id=68e39650f4355415119cc432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-propagating-malware-hits-whatsapp-users-in-br-1c2c1e28</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Propagating%20Malware%20Hits%20WhatsApp%20Users%20in%20Brazil&amp;severity=medium&amp;id=68e469f16a45552f36e9070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/6th-october-threat-intelligence-report-c732cf5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=6th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68e39040a7175d123a625b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/45-million-offered-in-new-cloud-hacking-competitio-133068c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%244.5%20Million%20Offered%20in%20New%20Cloud%20Hacking%20Competition&amp;severity=medium&amp;id=68e3901aa7175d123a6216cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zimbra-users-targeted-in-zero-day-exploit-using-ic-5e63c328</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zimbra%20users%20targeted%20in%20zero-day%20exploit%20using%20iCalendar%20attachments&amp;severity=critical&amp;id=68e3902fa7175d123a624b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11330-sql-injection-in-phpgurukul-beauty--24b01308</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11330%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e38e59a7175d123a5dc02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0609-cwe-79-improper-neutralization-of-in-c27d19e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Logo%20Software%20Inc.%20Logo%20Cloud&amp;severity=medium&amp;id=68e38ca5a7175d123a5aa1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0608-cwe-601-url-redirection-to-untrusted-be2154ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0608%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Logo%20Software%20Inc.%20Logo%20Cloud&amp;severity=medium&amp;id=68e38ca5a7175d123a5aa1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0607-cwe-79-improper-neutralization-of-in-4a5eb377</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0607%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Logo%20Software%20Inc.%20Logo%20Cloud&amp;severity=medium&amp;id=68e38ca5a7175d123a5aa1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0606-cwe-639-authorization-bypass-through-7be5a571</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0606%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Logo%20Software%20Inc.%20Logo%20Cloud&amp;severity=medium&amp;id=68e38a0e9a8b61c808612f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11329-sql-injection-in-code-projects-onli-5bb05afb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11329%3A%20SQL%20Injection%20in%20code-projects%20Online%20Course%20Registration&amp;severity=medium&amp;id=68e38a0e9a8b61c808612f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11328-stack-based-buffer-overflow-in-tend-2a8c2017</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11328%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68e380724a42da91e754f204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-southnet-sidewinder-expands-phishing-and-cc84627a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20SouthNet%3A%20SideWinder%20Expands%20Phishing%20and%20Malware%20Operations%20in%20South%20Asia&amp;severity=medium&amp;id=68e3a3645c165d4385e75d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59728-cwe-787-out-of-bounds-write-in-ffmp-12c00db6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59728%3A%20CWE-787%20Out-of-bounds%20Write%20in%20FFmpeg%20MPEG-DASH&amp;severity=high&amp;id=68e382204a42da91e7586492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warmcookie-one-year-later-new-features-and-fresh-i-aa79cc94</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WARMCOOKIE%20One%20Year%20Later%3A%20New%20Features%20and%20Fresh%20Insights&amp;severity=medium&amp;id=68e3a3645c165d4385e75d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11327-stack-based-buffer-overflow-in-tend-5a717cca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11327%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68e382204a42da91e758648b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beer-giant-asahi-says-data-stolen-in-ransomware-at-89a450ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beer%20Giant%20Asahi%20Says%20Data%20Stolen%20in%20Ransomware%20Attack&amp;severity=medium&amp;id=68e3771ac6adcde93497ab3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-e-business-suite-zero-day-exploited-in-cl0p-34264bbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20E-Business%20Suite%20Zero-Day%20Exploited%20in%20Cl0p%20Attacks&amp;severity=critical&amp;id=68e3739bc6adcde9348f1fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-the-salesloft-drift-breach-c3298fa7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20The%20Salesloft-Drift%20Breach&amp;severity=high&amp;id=68e373afc6adcde9348f4ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11326-stack-based-buffer-overflow-in-tend-9751ceba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11326%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68e37266de39319c4ea35b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58579-cwe-497-exposure-of-sensitive-syste-98d3b533</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58579%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58591-cwe-22-improper-limitation-of-a-pat-c9061b0c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58591%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58590-cwe-22-improper-limitation-of-a-pat-c8513d86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58590%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58589-cwe-200-exposure-of-sensitive-infor-c4820374</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58589%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=low&amp;id=68e36cef0e76680ec164d67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58587-cwe-307-improper-restriction-of-exc-3a5d928d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58587%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58586-cwe-204-observable-response-discrep-e198427a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58586%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11325-stack-based-buffer-overflow-in-tend-f8e47d5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11325%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68e36cee0e76680ec164d64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58585-cwe-497-exposure-of-sensitive-syste-4b50ced4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58585%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58584-cwe-598-use-of-get-request-method-w-f9599deb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58584%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58583-cwe-497-exposure-of-sensitive-syste-ecc29e89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58583%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SICK%20AG%20Enterprise%20Analytics&amp;severity=medium&amp;id=68e369cfbd6176610b49caae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58582-cwe-770-allocation-of-resources-wit-b1856b56</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58582%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20SICK%20AG%20Enterprise%20Analytics&amp;severity=medium&amp;id=68e369cfbd6176610b49caa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58581-cwe-200-exposure-of-sensitive-infor-2cf024a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58581%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20Enterprise%20Analytics&amp;severity=medium&amp;id=68e369cfbd6176610b49ca9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58580-cwe-117-improper-output-neutralizat-2c57fd81</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58580%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20SICK%20AG%20Enterprise%20Analytics&amp;severity=medium&amp;id=68e369cfbd6176610b49ca93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58578-cwe-770-allocation-of-resources-wit-af7cea9f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58578%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20SICK%20AG%20Enterprise%20Analytics&amp;severity=low&amp;id=68e369cfbd6176610b49ca8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9914-cwe-288-authentication-bypass-using--10231a47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9914%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e369cfbd6176610b49cab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9913-cwe-79-improper-neutralization-of-in-087784d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e366f236c79392d67e7d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11324-stack-based-buffer-overflow-in-tend-54ce98ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11324%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68e366f236c79392d67e7d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11323-buffer-overflow-in-utt-1250gw-2c097f55</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11323%3A%20Buffer%20Overflow%20in%20UTT%201250GW&amp;severity=high&amp;id=68e35d5084408e5eb7a864a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zimbra-zero-day-exploited-to-target-brazilian-mili-609f5c38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zimbra%20Zero-Day%20Exploited%20to%20Target%20Brazilian%20Military%20via%20Malicious%20ICS%20Files&amp;severity=medium&amp;id=68e467466a45552f36e85b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9710-cwe-79-cross-site-scripting-xss-in-r-0ff9e29a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9710%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=68e35d5084408e5eb7a864a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9703-cwe-79-cross-site-scripting-xss-in-u-0822e9d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9703%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ultimate%20Addons%20for%20Elementor%20(Formerly%20Elementor%20Header%20%26%20Footer%20Builder)&amp;severity=medium&amp;id=68e35d5084408e5eb7a864a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11322-weak-password-requirements-in-manga-2d918e72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11322%3A%20Weak%20Password%20Requirements%20in%20Mangati%20NovoSGA&amp;severity=medium&amp;id=68e35731815f0abbc161fe58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57781-uncontrolled-search-path-element-in-e2144a74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57781%3A%20Uncontrolled%20Search%20Path%20Element%20in%20DENSO%20TEN%20Limited.%20Multiple%20installers%20of%20DENSO%20TEN%20drive%20recorder%20viewer&amp;severity=high&amp;id=68e358fa815f0abbc1653e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11321-authorization-bypass-in-zhuimengsha-d69c473d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11321%3A%20Authorization%20Bypass%20in%20zhuimengshaonian%20wisdom-education&amp;severity=medium&amp;id=68e35113b4b904171a8a84bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11320-unrestricted-upload-in-zhuimengshao-64a9933e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11320%3A%20Unrestricted%20Upload%20in%20zhuimengshaonian%20wisdom-education&amp;severity=medium&amp;id=68e34872ef2a4689752637cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11319-sql-injection-in-nahiduddinahammed--935a26c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11319%3A%20SQL%20Injection%20in%20nahiduddinahammed%20Hospital-Management-System-Website&amp;severity=medium&amp;id=68e346c0ef2a46897521b50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11318-unrestricted-upload-in-tipray-data--792c18f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11318%3A%20Unrestricted%20Upload%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e33c3494eb61166fa9b94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11317-sql-injection-in-tipray-data-leakag-6af56ead</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11317%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3352b94eb61166fa90df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11316-sql-injection-in-tipray-data-leakag-dff9df4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11316%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e32e2294eb61166fa847af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11315-sql-injection-in-tipray-data-leakag-87a406ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11315%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3271594eb61166fa5265a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11314-sql-injection-in-tipray-data-leakag-eac01e20</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11314%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3200d94eb61166fa26433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11313-sql-injection-in-tipray-data-leakag-cb3aae91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11313%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3200d94eb61166fa2642b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11312-sql-injection-in-tipray-data-leakag-e83138a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11312%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3134894eb61166f9d7982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11311-sql-injection-in-tipray-data-leakag-fa93e6c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11311%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3077c94eb61166f996f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-06-11c57eb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-06&amp;severity=medium&amp;id=68e4594d79fe82f008c9859c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59452-cwe-340-generation-of-predictable-n-d596e95d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59452%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20YoSmart%20YoLink%20API&amp;severity=medium&amp;id=68e422c3315b94cd152517a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59451-cwe-863-incorrect-authorization-in--169d82b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59451%3A%20CWE-863%20Incorrect%20Authorization%20in%20YoSmart%20YoLink%20application&amp;severity=low&amp;id=68e422c3315b94cd1525179e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59450-cwe-312-cleartext-storage-of-sensit-cd6c7579</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59450%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20YoSmart%20YoLink%20Smart%20Hub&amp;severity=medium&amp;id=68e422c3315b94cd15251799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59449-cwe-863-incorrect-authorization-in--8ad16fb6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59449%3A%20CWE-863%20Incorrect%20Authorization%20in%20YoSmart%20YoLink%20MQTT%20broker&amp;severity=medium&amp;id=68e420ef315b94cd1520a15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59448-cwe-319-cleartext-transmission-of-s-005ffce8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59448%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20YoSmart%20YoLink%20ecosystem&amp;severity=medium&amp;id=68e420ef315b94cd1520a156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59447-cwe-497-exposure-of-sensitive-syste-76a29b40</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59447%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20YoSmart%20YoLink%20Smart%20Hub&amp;severity=low&amp;id=68e41f4d315b94cd151daa7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61985-cwe-158-improper-neutralization-of--db9e4a5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61985%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=68e40c3dcf87aa9c343ce4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61984-cwe-159-improper-handling-of-invali-fdc7bcf3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61984%3A%20CWE-159%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=68e40c3dcf87aa9c343ce4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57515-na-dc581369</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57515%3A%20n%2Fa&amp;severity=critical&amp;id=68e4079864f972a16d6a0ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28129-na-63a75a75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28129%3A%20n%2Fa&amp;severity=medium&amp;id=68e403161c1196eac61ad847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56382-na-0e55c441</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56382%3A%20n%2Fa&amp;severity=medium&amp;id=68e3faeb10d29ec2ec48448a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60963-na-ec534a36</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60963%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60962-na-56fee16f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60962%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60961-na-a1456843</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60961%3A%20n%2Fa&amp;severity=medium&amp;id=68e3f95810d29ec2ec45cc61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60960-na-038613d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60960%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60959-na-8c12416d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60959%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60958-na-f281ca47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60958%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60957-na-8430085b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60957%3A%20n%2Fa&amp;severity=critical&amp;id=68e3f95810d29ec2ec45cc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60956-na-cc39f320</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60956%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60969-na-bddb5804</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60969%3A%20n%2Fa&amp;severity=medium&amp;id=68e3f641083a44572bca3737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60967-na-6e9a7e5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60967%3A%20n%2Fa&amp;severity=high&amp;id=68e3f641083a44572bca3732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60965-na-e71e9456</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60965%3A%20n%2Fa&amp;severity=critical&amp;id=68e3f641083a44572bca372d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60964-na-10cc2da9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60964%3A%20n%2Fa&amp;severity=critical&amp;id=68e3f641083a44572bca3728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57247-na-6b735d10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57247%3A%20n%2Fa&amp;severity=critical&amp;id=68e3ecad3a3ccaa613952b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61224-na-c19a241a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61224%3A%20n%2Fa&amp;severity=medium&amp;id=68e3e6967f1d1774caaf32f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61198-na-7a049191</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61198%3A%20n%2Fa&amp;severity=medium&amp;id=68e3ce25fa854abf3926de95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61197-na-9354c197</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61197%3A%20n%2Fa&amp;severity=high&amp;id=68e3ce25fa854abf3926de91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50538-cwe-79-improper-neutralization-of-i-d4004771</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50538%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68e3200d94eb61166fa2643e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29192-cwe-79-improper-neutralization-of-i-4ac240e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29192%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68e3200d94eb61166fa26439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11310-sql-injection-in-tipray-data-leakag-03a58d4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11310%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e301c443279ad048c580f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11309-sql-injection-in-tipray-data-leakag-0043119c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11309%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e2fba6ec9f95d72e436907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11308-cross-site-scripting-in-vanderlande-f080a8af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11308%3A%20Cross%20Site%20Scripting%20in%20Vanderlande%20Baggage%20360&amp;severity=medium&amp;id=68e2f3a3b3fd695dc7e5d86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11306-cross-site-scripting-in-qianfox-fox-c31003ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11306%3A%20Cross%20Site%20Scripting%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=68e2ed7bb3cc4ef154d59724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cometjacking-prompt-injection-attack-turns-perplex-3598c84f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CometJacking%3A%20Prompt%20Injection%20Attack%20Turns%20Perplexity%E2%80%99s%20Comet%20AI%20Browser%20Into%20a%20Data%20Exfiltration%20Vector&amp;severity=high&amp;id=68e2e7b547833ad03504d801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11305-buffer-overflow-in-utt-hiper-840g-da13cf28</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11305%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=68e2e6369dfa7c9a8bbe6586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11304-permissive-cross-domain-policy-with-0bbc2153</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11304%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20CodeCanyon%20Mentor%20LMS&amp;severity=medium&amp;id=68e2df953551304f9c7cf52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11303-command-injection-in-belkin-f9k1015-8cbfd6f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11303%3A%20Command%20Injection%20in%20Belkin%20F9K1015&amp;severity=medium&amp;id=68e2d93a186c081cfc65797d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11302-buffer-overflow-in-belkin-f9k1015-666290f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11302%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2d0ccb074b89397637cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11301-buffer-overflow-in-belkin-f9k1015-744d969c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11301%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2c962a8dc79b36dd78b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11300-buffer-overflow-in-belkin-f9k1015-7216a39b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11300%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2c1e2e5b728efc8e2bc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11299-buffer-overflow-in-belkin-f9k1015-3b3a4e0c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11299%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2bd4453013999795405fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11298-command-injection-in-belkin-f9k1015-fbe46ca4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11298%3A%20Command%20Injection%20in%20Belkin%20F9K1015&amp;severity=medium&amp;id=68e2b3a20e7d28f9448242cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11297-buffer-overflow-in-belkin-f9k1015-5fb2ed3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11297%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2adf0fcbc91e1679b440a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11296-buffer-overflow-in-belkin-f9k1015-f89639a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11296%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2a7dd787ae4b4d2635add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11295-buffer-overflow-in-belkin-f9k1015-a81cdec1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11295%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e29f135aee1242a853dcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11294-buffer-overflow-in-belkin-f9k1015-71599fd4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11294%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e297f66e5daa7007366d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11293-buffer-overflow-in-belkin-f9k1015-d7ee0971</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11293%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2901b53ceab86b661a8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/parkmobile-pays-1-each-for-2021-data-breach-that-h-4c7f8c78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ParkMobile%20pays...%20%241%20each%20for%202021%20data%20breach%20that%20hit%2022%20million&amp;severity=high&amp;id=68e28bb5dc3a23974dd13e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghost-in-the-cloud-weaponizing-aws-x-ray-for-comma-588eb599</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ghost%20in%20the%20Cloud%3A%20Weaponizing%20AWS%20X-Ray%20for%20Command%20%26%20Control&amp;severity=medium&amp;id=68e28ac5af193d2522a88f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11292-command-injection-in-belkin-f9k1015-cf465a35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11292%3A%20Command%20Injection%20in%20Belkin%20F9K1015&amp;severity=medium&amp;id=68e27c0780a937f685525155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11291-cross-site-scripting-in-ixmaps-webs-b3a2d381</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11291%3A%20Cross%20Site%20Scripting%20in%20ixmaps%20website2017&amp;severity=medium&amp;id=68e274eea08882725d27c484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11290-use-of-hard-coded-cryptographic-key-bd3356a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11290%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20CRMEB&amp;severity=medium&amp;id=68e25908f2976755585fea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11289-cross-site-scripting-in-westboy-cic-334916d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11289%3A%20Cross%20Site%20Scripting%20in%20westboy%20CicadasCMS&amp;severity=medium&amp;id=68e24be4a2a916f2cf693f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8917-cwe-22-improper-limitation-of-a-path-91cb7d81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8917%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20allegroai%20allegroai%2Fclearml&amp;severity=medium&amp;id=68e2493884495731131fb050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cometjacking-one-click-can-turn-perplexitys-comet--e258e834</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CometJacking%3A%20One%20Click%20Can%20Turn%20Perplexity%E2%80%99s%20Comet%20AI%20Browser%20Into%20a%20Data%20Thief&amp;severity=high&amp;id=68e244d94f6cef8c834198f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-smartbedded-meteobridge-samsung-junip-7d3a448e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Smartbedded%20Meteobridge%2C%20Samsung%2C%20Juniper%20ScreenOS%2C%20Jenkins%2C%20and%20GNU%20Bash%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68e244d94f6cef8c834198fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8406-cwe-22-improper-limitation-of-a-path-fe45de37</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8406%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zenml-io%20zenml-io%2Fzenml&amp;severity=medium&amp;id=68e2361dd6879b519909ecbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11288-sql-injection-in-crmeb-7bd19f02</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11288%3A%20SQL%20Injection%20in%20CRMEB&amp;severity=medium&amp;id=68e2205a5af94fe5bed218f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/signal-introduces-sparse-post-quantum-ratchet-spqr-7189051c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Signal%20Introduces%20Sparse%20Post-Quantum%20Ratchet%20(SPQR)%20to%20Strengthen%20Encryption%20Against%20Quantum%20Attacks&amp;severity=high&amp;id=68e21dc55af94fe5bec97c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11287-improper-authentication-in-samanhap-5086afc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11287%3A%20Improper%20Authentication%20in%20samanhappy%20MCPHub&amp;severity=medium&amp;id=68e2199b345efa50bd0541f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11286-server-side-request-forgery-in-sama-46f26f76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11286%3A%20Server-Side%20Request%20Forgery%20in%20samanhappy%20MCPHub&amp;severity=medium&amp;id=68e21448db3a1fc88804bd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11285-os-command-injection-in-samanhappy--605bc8a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11285%3A%20OS%20Command%20Injection%20in%20samanhappy%20MCPHub&amp;severity=medium&amp;id=68e20c8008606f182c48396b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/netherlands-leads-europes-secure-quantum-communica-825a8b92</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Netherlands%20Leads%20Europe%E2%80%99s%20Secure%20Quantum%20Communication%20Network%20Initiative&amp;severity=medium&amp;id=68e2075dfeae5fd536c5c47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11284-use-of-hard-coded-password-in-zytec-b53d6454</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11284%3A%20Use%20of%20Hard-coded%20Password%20in%20Zytec%20Dalian%20Zhuoyun%20Technology%20Central%20Authentication%20Service&amp;severity=medium&amp;id=68e204c6feae5fd536bee355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11283-cross-site-scripting-in-frappe-lms-ae15fc50</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11283%3A%20Cross%20Site%20Scripting%20in%20Frappe%20LMS&amp;severity=medium&amp;id=68e1fdcc6e243458d9a4d56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11282-cross-site-scripting-in-frappe-lms-26887b00</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11282%3A%20Cross%20Site%20Scripting%20in%20Frappe%20LMS&amp;severity=medium&amp;id=68e1f7d3e418621140a2e09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11281-improper-access-controls-in-frappe--1f1b74b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11281%3A%20Improper%20Access%20Controls%20in%20Frappe%20LMS&amp;severity=low&amp;id=68e1f3765bfa5e0556990040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11280-direct-request-in-frappe-lms-74d7efc6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11280%3A%20Direct%20Request%20in%20Frappe%20LMS&amp;severity=medium&amp;id=68e1ea81930c1d4e7e6b5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61882-easily-exploitable-vulnerability-al-a26af592</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61882%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Concurrent%20Processing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Concurrent%20Processing.%20in%20Oracle%20Corporation%20Oracle%20Concurrent%20Processing&amp;severity=critical&amp;id=68e1e6fe930c1d4e7e6b1149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11279-csv-injection-in-axosoft-scrum-and--44b66dc4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11279%3A%20CSV%20Injection%20in%20Axosoft%20Scrum%20and%20Bug%20Tracking&amp;severity=medium&amp;id=68e1e37a930c1d4e7e6ac0b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11278-cross-site-scripting-in-allstarlink-11d1fd81</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11278%3A%20Cross%20Site%20Scripting%20in%20AllStarLink%20Supermon&amp;severity=medium&amp;id=68e1dc74930c1d4e7e6539eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11277-heap-based-buffer-overflow-in-open--687212e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11277%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=68e1d56e930c1d4e7e61e6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11276-cross-site-scripting-in-rebuild-60aa7f5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11276%3A%20Cross%20Site%20Scripting%20in%20Rebuild&amp;severity=medium&amp;id=68e1ef1f8f93edf234e8c3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11275-heap-based-buffer-overflow-in-open--9dd6d1a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11275%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=68e1c908930c1d4e7e5ce957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11274-allocation-of-resources-in-open-ass-66143806</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11274%3A%20Allocation%20of%20Resources%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=68e1bcd1930c1d4e7e3cd5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-05-d395b4ea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-05&amp;severity=medium&amp;id=68e30aea94eb61166f9a7c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11273-deserialization-in-lachatterie-verg-fc0de2f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11273%3A%20Deserialization%20in%20LaChatterie%20Verger&amp;severity=medium&amp;id=68e1ab7c6f9dba9571b552ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11272-improper-authorization-in-seriawei--8c9ffbd4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11272%3A%20Improper%20Authorization%20in%20SeriaWei%20ZKEACMS&amp;severity=medium&amp;id=68e180348ab2c50a2d2f9909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-data-breach-hackers-access-ids-billing-det-77f17325</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Data%20Breach%3A%20Hackers%20Access%20IDs%2C%20Billing%20Details%20and%20Support%20Chats&amp;severity=high&amp;id=68e14e9c8e3a3ddfb2918873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cometjacking-one-click-can-turn-perplexitys-comet--7bba96bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CometJacking%3A%20One%20Click%20Can%20Turn%20Perplexity%E2%80%99s%20Comet%20AI%20Browser%20Into%20a%20Data%20Thief&amp;severity=medium&amp;id=68e467466a45552f36e85b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-study-warns-several-free-ios-and-android-vpn-a-63f1987b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Study%20Warns%20Several%20Free%20iOS%20and%20Android%20VPN%20Apps%20Use%20Outdated%20Software%20and%20Leak%20User%20Data&amp;severity=medium&amp;id=68e119f5cd0b9d70e0a90a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-stealer-evolves-adds-device-fingerpri-0edbd286</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%20Stealer%20Evolves%3A%20Adds%20Device%20Fingerprinting%2C%20PNG%20Steganography%20Payloads&amp;severity=high&amp;id=68e10bc4535c69599fe5451d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detour-dog-caught-running-dns-powered-malware-fact-0e1ac8d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detour%20Dog%20Caught%20Running%20DNS-Powered%20Malware%20Factory%20for%20Strela%20Stealer&amp;severity=high&amp;id=68e10bc4535c69599fe54519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-launches-data-leak-site-trinity-of-ch-5ac7b779</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20Launches%20Data%20Leak%20Site%3A%20Trinity%20of%20Chaos%20Announces%20New%20Ransomware%20Victims&amp;severity=medium&amp;id=68e10bc4535c69599fe54525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-activity-on-palo-alto-networks-portals-ju-c1dfde7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20Activity%20on%20Palo%20Alto%20Networks%20Portals%20Jump%20500%25%20in%20One%20Day&amp;severity=high&amp;id=68e467466a45552f36e85b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yurei-ransomware-the-digital-ghost-79f1c1ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YUREI%20RANSOMWARE%3A%20THE%20DIGITAL%20GHOST&amp;severity=medium&amp;id=68e3772bc6adcde93497d5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ved-2026-after-cfi-data-only-2ddd9097</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VED%202026%3A%20after%20CFI%20-%20data%20only&amp;severity=medium&amp;id=68e0a417cc3aa38dabff730d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9886-cwe-352-cross-site-request-forgery-c-e29e62c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9886%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sergiotrinity%20Trinity%20Audio%20%E2%80%93%20Text%20to%20Speech%20AI%20audio%20player%20to%20convert%20content%20into%20audio&amp;severity=medium&amp;id=68e0990b11971642e85c3bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10383-cwe-79-improper-neutralization-of-i-3aa2a0c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=68e0990b11971642e85c3bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9952-cwe-79-improper-neutralization-of-in-c0d9d57a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9952%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergiotrinity%20Trinity%20Audio%20%E2%80%93%20Text%20to%20Speech%20AI%20audio%20player%20to%20convert%20content%20into%20audio&amp;severity=medium&amp;id=68e0990b11971642e85c3bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9029-cwe-862-missing-authorization-in-pos-11cad23d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9029%3A%20CWE-862%20Missing%20Authorization%20in%20posimyththemes%20WDesignKit%20%E2%80%93%20Elementor%20%26%20Gutenberg%20Starter%20Templates%2C%20Patterns%2C%20Cloud%20Workspace%20%26%20Widget%20Builder&amp;severity=medium&amp;id=68e0877c11971642e85b3476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9030-cwe-79-improper-neutralization-of-in-461642b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9030%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maneshtimilsina%20Majestic%20Before%20After%20Image&amp;severity=medium&amp;id=68e0877c11971642e85b347a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11228-cwe-862-missing-authorization-in-gi-79cdfe3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11228%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=68e0877c11971642e85b346c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9485-cwe-347-improper-verification-of-cry-bc151e9d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9485%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20cyberlord92%20OAuth%20Single%20Sign%20On%20%E2%80%93%20SSO%20(OAuth%20Client)&amp;severity=critical&amp;id=68e0877c11971642e85b3483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10746-cwe-306-missing-authentication-for--0d66501c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10746%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20cyberlord92%20Integrate%20Dynamics%20365%20CRM&amp;severity=medium&amp;id=68e0877c11971642e85b345e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9243-cwe-862-missing-authorization-in-sty-060a8350</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9243%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=high&amp;id=68e0877c11971642e85b347e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8726-cwe-79-improper-neutralization-of-in-35c08650</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8726%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opajaap%20WP%20Photo%20Album%20Plus&amp;severity=medium&amp;id=68e0877c11971642e85b3471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11227-cwe-285-improper-authorization-in-g-b992f2b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11227%3A%20CWE-285%20Improper%20Authorization%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=68e0877c11971642e85b3464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10751-cwe-732-incorrect-permission-assign-c646c6a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10751%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20MacEnhance%20MacForge&amp;severity=high&amp;id=68e0701f11971642e85862e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-04-385aa968</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-04&amp;severity=medium&amp;id=68e1b8629540e595d5924d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61685-cwe-548-exposure-of-information-thr-ecb71101</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61685%3A%20CWE-548%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20mastra-ai%20mastra&amp;severity=medium&amp;id=68e065e211971642e8580b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61681-cwe-79-improper-neutralization-of-i-3e497a2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61681%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xuemian168%20kuno&amp;severity=medium&amp;id=68e045c4d49c5616e17c79ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61680-cwe-256-plaintext-storage-of-a-pass-8469008c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61680%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20jaketcooper%20Minecraft-rcon&amp;severity=medium&amp;id=68e04324a707627a15869645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61679-cwe-200-exposure-of-sensitive-infor-03b8b275</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61679%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20julien040%20anyquery&amp;severity=high&amp;id=68e0416dfe629daf7734019d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61677-cwe-502-deserialization-of-untruste-86257465</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61677%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20iterative%20datachain&amp;severity=low&amp;id=68e03fb9048a557269cb688e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43825-cwe-201-insertion-of-sensitive-info-6e5b5731</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43825%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e03dfd61cc5255ff0f5c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61673-cwe-306-missing-authentication-for--0ab876ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61673%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Aiven-Open%20karapace&amp;severity=high&amp;id=68e03dfe61cc5255ff0f5c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59943-cwe-286-incorrect-user-management-i-5f22e24f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59943%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=68e036d86594606488593572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59829-cwe-61-unix-symbolic-link-symlink-f-5727afe5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59829%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20anthropics%20claude-code&amp;severity=low&amp;id=68e02d46436ecd09b3607b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54374-cwe-94-improper-control-of-generati-9dba0c32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54374%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mayneyao%20eidos&amp;severity=high&amp;id=68e02d46436ecd09b3607b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53354-cwe-79-improper-neutralization-of-i-2369fdc8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53354%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=68e0255f54e6f846175538d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-lapsus-hunters-returns-with-salesforce-l-cda2b007</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Lapsus%24%20Hunters%20Returns%20With%20Salesforce%20Leak%20Site&amp;severity=medium&amp;id=68e469f16a45552f36e9070d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-authorities-arrest-two-teens-for-alleged-pro-d2ed845e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Authorities%20Arrest%20Two%20Teens%20for%20Alleged%20Pro-Russian%20Espionage&amp;severity=medium&amp;id=68e469f16a45552f36e90710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52656-cwe-915-in-hcl-hcl-myxalytics-2b3445a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52656%3A%20CWE-915%20in%20HCL%20HCL%20MyXalytics&amp;severity=high&amp;id=68e014ac1485ec6038e2a7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52658-hcl-myxalytics-product-is-affected--62b843a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52658%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20HCL%20Software%20MyXalytics&amp;severity=low&amp;id=68e014ac1485ec6038e2a7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57714-cwe-428-in-qnap-systems-inc-netbak--f67d8e26</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57714%3A%20CWE-428%20in%20QNAP%20Systems%20Inc.%20NetBak%20Replicator&amp;severity=high&amp;id=68e014ae1485ec6038e2a85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54154-cwe-287-in-qnap-systems-inc-qnap-au-614becc5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54154%3A%20CWE-287%20in%20QNAP%20Systems%20Inc.%20QNAP%20Authenticator&amp;severity=medium&amp;id=68e014ad1485ec6038e2a835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54153-cwe-89-in-qnap-systems-inc-qsync-ce-43f4ee93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54153%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e014ad1485ec6038e2a832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53595-cwe-89-in-qnap-systems-inc-qsync-ce-0cee0c02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53595%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e014ad1485ec6038e2a82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53407-cwe-134-in-qnap-systems-inc-qts-41ea1916</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53407%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53406-cwe-134-in-qnap-systems-inc-qts-ac6c98f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53406%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52867-cwe-400-in-qnap-systems-inc-qsync-c-5fc0e043</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52867%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014ad1485ec6038e2a826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52866-cwe-476-in-qnap-systems-inc-qts-41af9e0c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52866%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52862-cwe-476-in-qnap-systems-inc-qts-2aca512e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52862%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52860-cwe-476-in-qnap-systems-inc-qts-98456c53</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52860%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52859-cwe-476-in-qnap-systems-inc-qts-edbe07ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52859%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52858-cwe-476-in-qnap-systems-inc-qts-2987cbd9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52858%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52857-cwe-476-in-qnap-systems-inc-qts-61d22eee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52857%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52855-cwe-476-in-qnap-systems-inc-qts-663aef7a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52855%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52854-cwe-476-in-qnap-systems-inc-qts-5c197270</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52854%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52853-cwe-476-in-qnap-systems-inc-qts-5e4916d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52853%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52433-cwe-476-in-qnap-systems-inc-qts-4a6debe9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52433%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52432-cwe-476-in-qnap-systems-inc-qts-24452570</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52432%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52429-cwe-134-in-qnap-systems-inc-qts-29dfef64</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52429%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52654-cwe-80-in-hcl-hcl-myxalytics-34e05753</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52654%3A%20CWE-80%20in%20HCL%20Software%20HCL%20MyXalytics&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52428-cwe-476-in-qnap-systems-inc-qts-50cc4803</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52428%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52427-cwe-476-in-qnap-systems-inc-qts-72c2233d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52427%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52424-cwe-476-in-qnap-systems-inc-qts-34c15b2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52424%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48730-cwe-134-in-qnap-systems-inc-qts-1486a2fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48730%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48729-cwe-476-in-qnap-systems-inc-qts-e7f554ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48729%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48728-cwe-476-in-qnap-systems-inc-qts-bd4b1551</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48728%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48727-cwe-476-in-qnap-systems-inc-qts-2cc51470</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48727%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48726-cwe-476-in-qnap-systems-inc-qts-bdcac577</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48726%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47214-cwe-476-in-qnap-systems-inc-qts-a0e39e8f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47214%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47213-cwe-476-in-qnap-systems-inc-qts-0fee9eb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47213%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47212-cwe-78-in-qnap-systems-inc-qts-7f196fcd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47212%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47211-cwe-22-in-qnap-systems-inc-qts-164d6b10</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47211%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014aa1485ec6038e2a762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47210-cwe-476-in-qnap-systems-inc-qsync-c-d786d123</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47210%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014aa1485ec6038e2a75f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44014-cwe-787-in-qnap-systems-inc-qsync-c-f2b66b60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44014%3A%20CWE-787%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e014aa1485ec6038e2a75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44012-cwe-770-in-qnap-systems-inc-qsync-c-9fb8433e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44012%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e014aa1485ec6038e2a759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44011-cwe-476-in-qnap-systems-inc-qsync-c-007ccaac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44011%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014aa1485ec6038e2a756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44010-cwe-476-in-qnap-systems-inc-qsync-c-a53e75cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44010%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014aa1485ec6038e2a750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44009-cwe-476-in-qnap-systems-inc-qsync-c-f4beb7e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44009%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014aa1485ec6038e2a74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44008-cwe-476-in-qnap-systems-inc-qsync-c-e74385e9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44008%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014aa1485ec6038e2a74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44007-cwe-770-in-qnap-systems-inc-qsync-c-54377676</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44007%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e065e211971642e8580b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44006-cwe-770-in-qnap-systems-inc-qsync-c-8d6f1e67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44006%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e065e211971642e8580b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33040-cwe-770-in-qnap-systems-inc-qsync-c-5001e0cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33040%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e065e211971642e8580b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33039-cwe-770-in-qnap-systems-inc-qsync-c-16e427c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33039%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e065e211971642e8580b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33034-cwe-22-in-qnap-systems-inc-qsync-ce-ab82624c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33034%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e065e211971642e8580b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56804-cwe-89-in-qnap-systems-inc-video-st-ce0ab9ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56804%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Video%20Station&amp;severity=medium&amp;id=68e0f3bdb66c7f7acdd3cb7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52653-cwe-79-improper-neutralization-of-i-fba0ef79</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52653%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20HCL%20MyXalytics&amp;severity=high&amp;id=68e01811b494e59f8222abeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-lapsus-hunters-claim-salesforce-breach-1-d0ccf5df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20LAPSUS%24%20Hunters%20Claim%20Salesforce%20Breach%2C%201%20Billion%20Records%2C%2039%20Firms%20Listed&amp;severity=high&amp;id=68e00fb8acc68196644c0d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-exposure-of-180000-icsot-devices-raises-saf-b510fa3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Exposure%20of%20180%2C000%20ICS%2FOT%20Devices%20Raises%20Safety%20Concerns&amp;severity=medium&amp;id=68dff7792528db188ec74d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phoenix-rowhammer-that-works-on-ddr5-kaspersky-off-d1e132ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phoenix%3A%20Rowhammer%20that%20works%20on%20DDR5%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e95747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-stealer-evolves-adds-device-fingerpri-5ddd26f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%20Stealer%20Evolves%3A%20Adds%20Device%20Fingerprinting%2C%20PNG%20Steganography%20Payloads&amp;severity=medium&amp;id=68e467466a45552f36e85b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prospy-tospy-malware-pose-as-signal-and-totok-to-s-a5759593</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ProSpy%2C%20ToSpy%20malware%20pose%20as%20Signal%20and%20ToTok%20to%20steal%20data%20in%20UAE&amp;severity=medium&amp;id=68dfee6388368ae77cfd5740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34226-cwe-664-improper-control-of-a-resou-348d4fac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34226%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20Its%20Lifetime%20in%20Autonomy%20Logic%20OpenPLC%20Runtime&amp;severity=high&amp;id=68dfee6e88368ae77cfd5805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-shows-cyberattacks-mean-bad-busi-fb31ebc2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20Shows%20Cyberattacks%20Mean%20(Bad)%20Business&amp;severity=high&amp;id=68e469f16a45552f36e90713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cavalry-werewolf-attack-hits-russian-agencies--f7f967b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%22Cavalry%20Werewolf%22%20Attack%20Hits%20Russian%20Agencies%20with%20FoalShell%20and%20StallionRAT&amp;severity=high&amp;id=68dfe2a3e5c3f9235f449a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-of-self-spreading-whatsapp-malwar-71df1bfa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20of%20Self-Spreading%20WhatsApp%20Malware%20Named%20SORVEPOTEL&amp;severity=high&amp;id=68dfe1c908664d267fd05eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-links-clop-extortion-attacks-to-july-2025-v-90d1b681</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20links%20Clop%20extortion%20attacks%20to%20July%202025%20vulnerabilities&amp;severity=high&amp;id=68dfe1c908664d267fd05ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10729-cwe-416-use-after-free-in-the-qt-co-82ba4b55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10729%3A%20CWE-416%20Use%20After%20Free%20in%20The%20Qt%20Company%20Qt&amp;severity=critical&amp;id=68dfe1e808664d267fd061f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10728-cwe-674-uncontrolled-recursion-in-t-72d02fb3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10728%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20The%20Qt%20Company%20Qt&amp;severity=critical&amp;id=68dfe0218ea44fea9ba2abad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-pqc-adoption-new-android-spyware-fem-8e5671b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20PQC%20Adoption%2C%20New%20Android%20Spyware%2C%20FEMA%20Data%20Breach&amp;severity=medium&amp;id=68e46d046a45552f36e94aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bci-the-stuff-of-nightmares-or-dreams-8a7a3130</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BCI%3A%20The%20Stuff%20of%20Nightmares%20or%20Dreams%3F&amp;severity=medium&amp;id=68e469f16a45552f36e90716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsofts-voice-clone-becomes-scary-amp-unsalvage-84c59e50</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft&apos;s%20Voice%20Clone%20Becomes%20Scary%20%26amp%3B%20Unsalvageable&amp;severity=medium&amp;id=68e469f16a45552f36e9071c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-8099-hijacks-reputable-sites-for-seo-fraud-amp-9766e128</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-8099%20Hijacks%20Reputable%20Sites%20for%20SEO%20Fraud%20%26amp%3B%20Theft&amp;severity=low&amp;id=68e469f16a45552f36e90719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cl0p-linked-gang-attempts-to-extort-oracle-e-busin-2f44d751</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cl0p-Linked%20Gang%20Attempts%20to%20Extort%20Oracle%20E-Business%20Customers&amp;severity=medium&amp;id=68dfc112cf1c65c05d2f19d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10609-cwe-798-use-of-hard-coded-credentia-d8560fdd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10609%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Logo%20Software%20Inc.%20TigerWings%20ERP&amp;severity=medium&amp;id=68dfbe870a619476430d35c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unauthenticated-rce-flaw-patched-in-draytek-router-284925c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unauthenticated%20RCE%20Flaw%20Patched%20in%20DrayTek%20Routers&amp;severity=medium&amp;id=68e46d046a45552f36e94aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10547-cwe-456-in-draytek-corporation-vigo-9615ded5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10547%3A%20CWE-456%3A%20Missing%20Initialization%20of%20a%20Variable%20in%20DrayTek%20Corporation%20Vigor1000B&amp;severity=critical&amp;id=68dfb5c496307f28cda31bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/product-walkthrough-how-passwork-7-addresses-compl-542946e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Product%20Walkthrough%3A%20How%20Passwork%207%20Addresses%20Complexity%20of%20Enterprise%20Security&amp;severity=medium&amp;id=68e467466a45552f36e85b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0876-cwe-79-improper-neutralization-of-in-a51f3ed8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Isin%20Basi%20Advertisement%20Information%20Technologies%20Trade%20Inc.%20IT&apos;s%20Workif&amp;severity=medium&amp;id=68dfb41981bced3a3cd42366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10302-cwe-352-cross-site-request-forgery--b0d478f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10302%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hameha%20Ultimate%20Viral%20Quiz&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10165-cwe-79-improper-neutralization-of-i-f1e7bb84</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10165%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hovanesvn%20AP%20Background&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9897-cwe-352-cross-site-request-forgery-c-697c9914</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9897%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hovanesvn%20AP%20Background&amp;severity=medium&amp;id=68dfb277c3835a5fbe033cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9212-cwe-434-unrestricted-upload-of-file--e1eb74cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9212%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ekndev%20WP%20Dispatcher&amp;severity=high&amp;id=68dfb275c3835a5fbe033c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9561-cwe-434-unrestricted-upload-of-file--7fd2cdcc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9561%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20hovanesvn%20AP%20Background&amp;severity=high&amp;id=68dfb276c3835a5fbe033c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9194-cwe-862-missing-authorization-in-ant-07a6df96</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9194%3A%20CWE-862%20Missing%20Authorization%20in%20antonshevchuk%20Constructor&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9204-cwe-79-improper-neutralization-of-in-16cf153e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9204%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pencilwp%20X%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9129-cwe-79-improper-neutralization-of-in-df98051f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20odude%20Flexi%20%E2%80%93%20Guest%20Submit&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7825-cwe-96-improper-neutralization-of-di-49358ca1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7825%3A%20CWE-96%20Improper%20Neutralization%20of%20Directives%20in%20Statically%20Saved%20Code%20(&apos;Static%20Code%20Injection&apos;)%20in%20wpt00ls%20Schema%20Plugin%20For%20Divi%2C%20Gutenberg%20%26%20Shortcodes&amp;severity=medium&amp;id=68dfb275c3835a5fbe033bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9895-cwe-352-cross-site-request-forgery-c-82cb300a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9895%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20umarbajwa%20Notification%20Bar&amp;severity=medium&amp;id=68dfb277c3835a5fbe033cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9858-cwe-79-improper-neutralization-of-in-90dc3fa5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9858%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mtoolstec%20Auto%20Bulb%20Finder%20for%20WordPress&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9630-cwe-352-cross-site-request-forgery-c-eaf0706c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9630%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20samueljesse%20WP%20SinoType&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10582-cwe-89-improper-neutralization-of-s-5cc33512</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10582%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ekndev%20WP%20Dispatcher&amp;severity=high&amp;id=68dfb274c3835a5fbe033be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9889-cwe-352-cross-site-request-forgery-c-db8a7a20</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9889%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20contentmx%20ContentMX%20Content%20Publisher&amp;severity=medium&amp;id=68dfb277c3835a5fbe033caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8669-cwe-352-cross-site-request-forgery-c-62dc9f1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8669%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pressmaximum%20Customify&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9859-cwe-79-improper-neutralization-of-in-43a6f4a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9859%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ambitioncloud%20Fintelligence%20Calculator&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8776-cwe-79-improper-neutralization-of-in-0f368528</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mikemayhem3030%20Epic%20Bootstrap%20Buttons&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9372-cwe-79-improper-neutralization-of-in-6a6c7559</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9372%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gbsdeveloper%20Ultimate%20Multi%20Design%20Video%20Carousel&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9200-cwe-89-improper-neutralization-of-sp-c026e78f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9200%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nebelhorn%20Blappsta%20Mobile%20App%20Plugin%20%E2%80%93%20Your%20native%2C%20mobile%20iPhone%20App%20and%20Android%20App&amp;severity=high&amp;id=68dfb275c3835a5fbe033c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9892-cwe-352-cross-site-request-forgery-c-3211d92c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9892%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devrix%20Restrict%20User%20Registration&amp;severity=medium&amp;id=68dfb277c3835a5fbe033cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9199-cwe-89-improper-neutralization-of-sp-2898010c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9199%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20Woo%20superb%20slideshow%20transition%20gallery%20with%20random%20effect&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10309-cwe-352-cross-site-request-forgery--3a603745</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10309%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bsmye%20PayPal%20Forms&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10053-cwe-79-improper-neutralization-of-i-8d0f9464</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20exlac%20TableGen%20%E2%80%93%20Data%20Table%20Generator&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9206-cwe-79-improper-neutralization-of-in-6a9ce5c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9206%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mekshq%20Meks%20Easy%20Maps&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9080-cwe-79-improper-neutralization-of-in-f2e04a8c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9080%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdevs%20Generic%20Elements&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9854-cwe-79-improper-neutralization-of-in-f1f3ccfc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piupiiu%20A%20Simple%20Multilanguage%20Plugin&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9945-cwe-352-cross-site-request-forgery-c-92ba89c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9945%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aryadhiratara%20Optimize%20More!%20%E2%80%93%20CSS&amp;severity=medium&amp;id=68dfb277c3835a5fbe033cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10306-cwe-73-external-control-of-file-nam-fe014aad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10306%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20backupbolt%20Backup%20Bolt&amp;severity=low&amp;id=68dfb274c3835a5fbe033bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10192-cwe-79-improper-neutralization-of-i-61166f47</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10192%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20muhammad-rehman%20WP%20Photo%20Effects&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9884-cwe-352-cross-site-request-forgery-c-2015adc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9884%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webdevabq%20Mobile%20Site%20Redirect&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9077-cwe-79-improper-neutralization-of-in-f57d91a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultrapressorg%20Ultra%20Addons%20Lite%20for%20Elementor&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7721-cwe-98-improper-control-of-filename--4666f970</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7721%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20beardev%20JoomSport%20%E2%80%93%20for%20Sports%3A%20Team%20%26%20League%2C%20Football%2C%20Hockey%20%26%20more&amp;severity=critical&amp;id=68dfb275c3835a5fbe033bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9332-cwe-79-improper-neutralization-of-in-919f0c48</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9332%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clickanatomy%20Interactive%20Human%20Anatomy%20with%20Clickable%20Body%20Parts&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9876-cwe-79-improper-neutralization-of-in-ce4ec567</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20inforrada%20Ird%20Slider&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9875-cwe-79-improper-neutralization-of-in-551cb3f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ticketspot%20Event%20Tickets%2C%20RSVPs%2C%20Calendar&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9198-cwe-89-improper-neutralization-of-sp-a8e45a39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9198%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopi_plus%20Wp%20cycle%20text%20announcement&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9286-cwe-620-unverified-password-change-i-b1e65ee8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9286%3A%20CWE-620%20Unverified%20Password%20Change%20in%20hancock11%20Appy%20Pie%20Connect%20for%20WooCommerce&amp;severity=critical&amp;id=68dfb275c3835a5fbe033c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9209-cwe-200-exposure-of-sensitive-inform-cf6f0b22</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9209%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20magnigenie%20RestroPress%20%E2%80%93%20Online%20Food%20Ordering%20System&amp;severity=critical&amp;id=68dfb275c3835a5fbe033c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9885-cwe-352-cross-site-request-forgery-c-0bcc822d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9885%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20laudanumsoft%20MPWizard%20%E2%80%93%20Create%20Mercado%20Pago%20Payment%20Links&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9333-cwe-79-improper-neutralization-of-in-63a1b185</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ibachal%20Smart%20Docs&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9130-cwe-79-improper-neutralization-of-in-70e2f381</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9130%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeclouds%20Unify&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10726-cwe-89-improper-neutralization-of-s-2adcc4f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10726%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quantumrose%20WPRecovery&amp;severity=critical&amp;id=68dfb274c3835a5fbe033be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10311-cwe-352-cross-site-request-forgery--66837dad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10311%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tom_riddle%20Comment%20Info%20Detector&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9045-cwe-79-improper-neutralization-of-in-a3b9b8ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons%20%E2%80%93%20Addons%20Pack%20for%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10212-cwe-862-missing-authorization-in-si-fa7fb0da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10212%3A%20CWE-862%20Missing%20Authorization%20in%20sitealert%20SiteAlert%20(Formerly%20WP%20Health)&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11234-use-after-free-in-red-hat-red-hat-e-faf9aa3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11234%3A%20Use%20After%20Free&amp;severity=high&amp;id=68dff4bbf049963e8ab8ce60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cavalry-werewolf-attack-hits-russian-agencies--5211fa67</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%22Cavalry%20Werewolf%22%20Attack%20Hits%20Russian%20Agencies%20with%20FoalShell%20and%20StallionRAT&amp;severity=medium&amp;id=68e467466a45552f36e85b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6388-cwe-288-authentication-bypass-using--2aa8b1a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6388%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Theme-Spirit%20Spirit%20Framework&amp;severity=critical&amp;id=68df8882bb515cfcaa844c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-meteobridge-cve-2025-4008-flaw-as-activ-674bac78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Meteobridge%20CVE-2025-4008%20Flaw%20as%20Actively%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=68e467466a45552f36e85b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0616-cwe-89-improper-neutralization-of-sp-9dfe8429</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0616%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Teknolojik%20Center%20Telecommunication%20Industry%20Trade%20Co.%20Ltd.%20B2B%20-%20Netsis%20Panel&amp;severity=high&amp;id=68df8882bb515cfcaa844c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11223-cwe-427-uncontrolled-search-path-el-058b7351</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11223%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Panasonic%20AutoDownloader&amp;severity=high&amp;id=68dff2c6bb74e9a7597c18dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59536-cwe-94-improper-control-of-generati-4e5a9c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59536%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=68df70b3322c599a48f0ae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59489-arbitrary-code-execution-in-unity-r-01fe00c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59489%3A%20Arbitrary%20Code%20Execution%20in%20Unity%20Runtime&amp;severity=medium&amp;id=68df5b034d2ee9b526abb806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/confucius-espionage-from-stealer-to-backdoor-38bf8b1e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Confucius%20Espionage%3A%20From%20Stealer%20to%20Backdoor&amp;severity=medium&amp;id=68df908a0c40395553ed9975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59300-cwe-787-out-of-bounds-write-in-delt-45b0eca2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59300%3A%20CWE-787%20Out-Of-Bounds%20Write%20in%20Delta%20Electronics%20DIAScreen&amp;severity=medium&amp;id=68df399e0005234f78fa5e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59299-cwe-787-out-of-bounds-write-in-delt-90126031</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59299%3A%20CWE-787%20Out-Of-Bounds%20Write%20in%20Delta%20Electronics%20DIAScreen&amp;severity=medium&amp;id=68df399e0005234f78fa5e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59298-cwe-787-out-of-bounds-write-in-delt-1e2a7fe4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59298%3A%20CWE-787%20Out-Of-Bounds%20Write%20in%20Delta%20Electronics%20DIAScreen&amp;severity=medium&amp;id=68df399e0005234f78fa5e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59297-cwe-787-out-of-bounds-write-in-delt-6557fff5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59297%3A%20CWE-787%20Out-Of-Bounds%20Write%20in%20Delta%20Electronics%20DIAScreen&amp;severity=medium&amp;id=68df399e0005234f78fa5e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11241-cwe-80-improper-neutralization-of-s-98e6f6b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11241%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Yoast%20SEO%20Premium&amp;severity=medium&amp;id=68df32960005234f78fa30e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-03-88746b7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-03&amp;severity=medium&amp;id=68e0644b11971642e857a1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56551-na-c67197dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56551%3A%20n%2Fa&amp;severity=high&amp;id=68e003289ea10347bcc22d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55972-na-ecfdd028</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55972%3A%20n%2Fa&amp;severity=high&amp;id=68dffc4fb7ee07964d95f622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60450-na-73f98480</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60450%3A%20n%2Fa&amp;severity=medium&amp;id=68dff1cb58033f1b088a766a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60445-na-26bf56fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60445%3A%20n%2Fa&amp;severity=medium&amp;id=68dff1cb58033f1b088a7667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57423-na-9b961ed9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57423%3A%20n%2Fa&amp;severity=medium&amp;id=68dfeca493c3f6f177228e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55971-na-7988ed62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55971%3A%20n%2Fa&amp;severity=medium&amp;id=68dfe45063749ed1da7ba4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60787-na-d4ea20b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60787%3A%20n%2Fa&amp;severity=high&amp;id=68dfe1e808664d267fd061fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60449-na-e0ace1a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60449%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd89ea59dbcde03c0fdca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60447-na-e5532c17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60447%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd89ea59dbcde03c0fdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60448-na-f9cd1234</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60448%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd6f4d911b0b97de3963f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60454-na-0ba4aa9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60454%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd2c47375cad79a84239e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60453-na-986289f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60453%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd2c47375cad79a84239b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60452-na-70a59b60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60452%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd2c47375cad79a842398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60451-na-03b999d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60451%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd2c47375cad79a842395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61668-cwe-476-null-pointer-dereference-in-03ae1dec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61668%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20plone%20volto&amp;severity=high&amp;id=68def32ca247cd72dfc01a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61600-cwe-400-uncontrolled-resource-consu-e31e33e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61600%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20stalwartlabs%20stalwart&amp;severity=high&amp;id=68def0bad9a6bc6009193265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/renault-uk-alerts-customers-after-third-party-data-081c0ade</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Renault%20UK%20Alerts%20Customers%20After%20Third-Party%20Data%20Breach&amp;severity=high&amp;id=68deebd682b55c8660b6182b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61665-cwe-287-improper-authentication-in--35787790</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61665%3A%20CWE-287%3A%20Improper%20Authentication%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68df13500005234f78f7269e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61606-cwe-601-url-redirection-to-untruste-0b7879d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61606%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68df13500005234f78f726a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54089-vulnerability-in-absolute-security--2163feed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54089%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=68df13500005234f78f726b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61605-cwe-89-improper-neutralization-of-s-ef349190</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61605%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68df13500005234f78f726b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54088-vulnerability-in-absolute-security--0b46eb48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54088%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=68df13500005234f78f726ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61604-cwe-352-cross-site-request-forgery--f136085a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61604%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68df13500005234f78f726aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54087-vulnerability-in-absolute-security--91e9ccc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54087%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=low&amp;id=68df13500005234f78f726b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10653-cwe-288-in-raise3d-pro2-series-0fc318e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10653%3A%20CWE-288%20in%20Raise3D%20Pro2%20Series&amp;severity=high&amp;id=68df13500005234f78f726a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54086-vulnerability-in-absolute-security--d64d980a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54086%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=68deda8d0830ba3f196a998a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61603-cwe-89-improper-neutralization-of-s-447d79a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61603%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68ded8e1d3babf1bddf68a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61595-cwe-400-uncontrolled-resource-consu-5039ac78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61595%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20MANTRA-Chain%20mantrachain&amp;severity=high&amp;id=68ded665257559930e8ffe03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-confirms-security-incident-after-hackers-b-667099dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20confirms%20security%20incident%20after%20hackers%20breach%20GitLab%20instance&amp;severity=high&amp;id=68decedb2a4fb8c5550cfe00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/confucius-hackers-hit-pakistan-with-new-wooperstea-23d92d62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Confucius%20Hackers%20Hit%20Pakistan%20With%20New%20WooperStealer%20and%20Anondoor%20Malware&amp;severity=high&amp;id=68decedb2a4fb8c5550cfe04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59835-cwe-23-relative-path-traversal-in-l-ac592181</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59835%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20langbot-app%20LangBot&amp;severity=high&amp;id=68dece099604eca2c589acfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/despite-more-cves-cyber-insurers-arent-altering-po-3bce7034</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Despite%20More%20CVEs%2C%20Cyber%20Insurers%20Aren&apos;t%20Altering%20Policies&amp;severity=medium&amp;id=68e469f16a45552f36e9071f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/for-one-nfl-team-tackling-cyber-threats-is-basic-d-78f50e21</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=For%20One%20NFL%20Team%2C%20Tackling%20Cyber%20Threats%20Is%20Basic%20Defense&amp;severity=medium&amp;id=68e469f16a45552f36e90722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-spyware-campaigns-target-privacy-conscious-and-08df66e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20spyware%20campaigns%20target%20privacy-conscious%20Android%20users%20in%20the%20UAE&amp;severity=medium&amp;id=68deaab857ef7b252d27f356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34210-cwe-256-plaintext-storage-of-a-pass-25d853ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34210%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68dea7707d138d8f7b8e83a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34208-cwe-327-use-of-a-broken-or-risky-cr-03a318e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34208%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68dea7707d138d8f7b8e83a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-investigates-widespread-breach-of-private--98f583e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20Investigates%20Widespread%20Breach%20of%20Private%20GitLab%20Repositories&amp;severity=medium&amp;id=68e469f16a45552f36e90739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-defender-bug-triggers-erroneous-bios-upd-0fb61857</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Defender%20bug%20triggers%20erroneous%20BIOS%20update%20alerts&amp;severity=high&amp;id=68de989168392835ef667d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-8099-chinese-speaking-cybercrime-group-targets-46e8c5b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-8099%3A%20Chinese-speaking%20cybercrime%20group%20targets%20high-value%20IIS%20for%20SEO%20fraud&amp;severity=medium&amp;id=68dea28f74e254631608624d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59774-cwe-79-improper-neutralization-of-i-8d463547</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59774%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de921a9b49700e4c2875fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59773-cwe-79-improper-neutralization-of-i-23a47fe6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59773%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de921a9b49700e4c2875fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59772-cwe-79-improper-neutralization-of-i-18686275</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59772%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de921a9b49700e4c2875f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59771-cwe-79-improper-neutralization-of-i-9b9aadb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59771%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9076d3a86bc5231afbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59770-cwe-79-improper-neutralization-of-i-884249a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9076d3a86bc5231afbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59769-cwe-79-improper-neutralization-of-i-7e8bb7c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9076d3a86bc5231afbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59768-cwe-79-improper-neutralization-of-i-e19d1c8a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59768%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9076d3a86bc5231afbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59767-cwe-79-improper-neutralization-of-i-d4ae2c4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59766-cwe-79-improper-neutralization-of-i-a66235e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59766%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59765-cwe-79-improper-neutralization-of-i-6a10d5a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59764-cwe-79-improper-neutralization-of-i-562e2a63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59764%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59763-cwe-79-improper-neutralization-of-i-dc53c98a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59763%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59762-cwe-79-improper-neutralization-of-i-28e12f2a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59762%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59761-cwe-79-improper-neutralization-of-i-be289dd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59760-cwe-79-improper-neutralization-of-i-e6cbca93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59759-cwe-79-improper-neutralization-of-i-2a00400b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59759%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59758-cwe-79-improper-neutralization-of-i-75e49c93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59758%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59757-cwe-79-improper-neutralization-of-i-6e0a4b5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59756-cwe-79-improper-neutralization-of-i-65f12f89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59755-cwe-79-improper-neutralization-of-i-2fa06806</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59755%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59754-cwe-79-improper-neutralization-of-i-0e0cd476</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59753-cwe-79-improper-neutralization-of-i-fe1dee1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59752-cwe-79-improper-neutralization-of-i-3f8bf326</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59751-cwe-79-improper-neutralization-of-i-19b92c93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59750-cwe-79-improper-neutralization-of-i-727be281</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59749-cwe-79-improper-neutralization-of-i-74d932b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59748-cwe-79-improper-neutralization-of-i-4084824a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59747-cwe-79-improper-neutralization-of-i-313d5861</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59746-cwe-79-improper-neutralization-of-i-77f42154</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59745-cwe-327-use-of-a-broken-or-risky-cr-9ba18010</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59745%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59744-cwe-22-improper-limitation-of-a-pat-ba425756</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59744%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AndSoft%20e-TMS&amp;severity=high&amp;id=68de8a13d034459bbdfb0c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59743-cwe-89-improper-neutralization-of-s-2174188f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de8a13d034459bbdfb0c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59742-cwe-89-improper-neutralization-of-s-645a39f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59742%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de8a13d034459bbdfb0c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59741-cwe-77-improper-neutralization-of-s-50399d99</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59741%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de8a13d034459bbdfb0c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-well-known-scans-thu-oct-2nd-a9276f54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20.well-known%20Scans%2C%20(Thu%2C%20Oct%202nd)&amp;severity=medium&amp;id=68e46e546a45552f36e9696e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59740-cwe-77-improper-neutralization-of-s-593464b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59740%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/20-yolink-iot-gateway-vulnerabilities-put-home-sec-52f92b14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2420%20YoLink%20IoT%20Gateway%20Vulnerabilities%20Put%20Home%20Security%20at%20Risk&amp;severity=medium&amp;id=68de87821199a3d5d3438b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59739-cwe-77-improper-neutralization-of-s-ec557ddf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59739%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59738-cwe-77-improper-neutralization-of-s-ba607136</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59738%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59737-cwe-77-improper-neutralization-of-s-c157d264</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59737%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59736-cwe-77-improper-neutralization-of-s-1ba48086</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59736%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-is-moving-from-email-to-mobile-is-your-se-2867e470</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Is%20Moving%20From%20Email%20to%20Mobile.%20Is%20Your%20Security%3F&amp;severity=medium&amp;id=68e469f16a45552f36e9073c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59735-cwe-77-improper-neutralization-of-s-bcd23163</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59735%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53881-cwe-61-unix-symbolic-link-symlink-f-57b9f1c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53881%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20openSUSE%20Tumbleweed&amp;severity=medium&amp;id=68de84261e53c7e7c4725dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-carplay-exploit-byovd-tactics--f10a8f97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20CarPlay%20Exploit%2C%20BYOVD%20Tactics%2C%20SQL%20C2%20Attacks%2C%20iCloud%20Backdoor%20Demand%20%26%20More&amp;severity=high&amp;id=68de7d6e751dcaab32f604a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-gemini-trifecta-vulnerabilities-in--b6cced57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20%E2%80%9CGemini%20Trifecta%E2%80%9D%20Vulnerabilities%20in%20Gemini%20AI%20Suite%20That%20Could%20Steal%20User%20Data&amp;severity=medium&amp;id=68de7a1333c890fca8cec193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alert-malicious-pypi-package-soopsocks-infects-265-d2c3fea5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alert%3A%20Malicious%20PyPI%20Package%20soopsocks%20Infects%202%2C653%20Systems%20Before%20Takedown&amp;severity=medium&amp;id=68e467466a45552f36e85b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/confucius-cyberspy-evolves-from-stealers-to-backdo-89e4bbb3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Confucius&apos;%20Cyberspy%20Evolves%20From%20Stealers%20to%20Backdoors%20in%20Pakistan&amp;severity=medium&amp;id=68e469f16a45552f36e9073f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22862-escalation-of-privilege-in-fortinet-394ef087</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22862%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68de786dd3ffb1ecf5acc7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0642-cwe-798-use-of-hard-coded-credential-bea4fac5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0642%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20PosCube%20Hardware%20Software%20and%20Consulting%20Ltd.%20Co.%20Assist&amp;severity=medium&amp;id=68de74eced052d5593f9e4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11240-cwe-601-url-redirection-to-untruste-772cec7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11240%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=medium&amp;id=68de74eced052d5593f9e4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11239-cwe-863-incorrect-authorization-in--e38aef84</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11239%3A%20CWE-863%20Incorrect%20Authorization%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=low&amp;id=68de708c9a610dc11233fc63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41010-cwe-942-permissive-cross-domain-sec-856fecb4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41010%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20Hiberus%20Sintra&amp;severity=medium&amp;id=68de708c9a610dc11233fc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58260-cwe-863-incorrect-authorization-in--523a4997</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58260%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SUSE%20rancher&amp;severity=high&amp;id=68e0f3bfb66c7f7acdd3cc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58267-cwe-345-insufficient-verification-o-86317804</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58267%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20SUSE%20rancher&amp;severity=high&amp;id=68e0f3bfb66c7f7acdd3cbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-yourself-from-voting-phishing-scams-be602f5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20yourself%20from%20%22voting%22%20phishing%20scams%2C%20and%20avoid%20losing%20your%20WhatsApp%20account%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e9574a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-carplay-exploit-byovd-tactics--68685fef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20CarPlay%20Exploit%2C%20BYOVD%20Tactics%2C%20SQL%20C2%20Attacks%2C%20iCloud%20Backdoor%20Demand%20%26%20More&amp;severity=critical&amp;id=68e467466a45552f36e85b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-mandiant-probes-new-oracle-extortion-wave-p-0d73c514</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Mandiant%20Probes%20New%20Oracle%20Extortion%20Wave%20Possibly%20Linked%20to%20Cl0p%20Ransomware&amp;severity=medium&amp;id=68e467466a45552f36e85b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41064-cwe-287-improper-authentication-in--586fa36e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41064%3A%20CWE-287%20Improper%20Authentication%20in%20GTT%20OpenSIAC&amp;severity=critical&amp;id=68de612ad9c552cd9d084e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-close-threat-detection-gaps-your-socs-actio-ea1102bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Close%20Threat%20Detection%20Gaps%3A%20Your%20SOC&apos;s%20Action%20Plan&amp;severity=medium&amp;id=68e467466a45552f36e85b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40992-cwe-79-improper-neutralization-of-i-f85aab54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Creativeitem%20Sociopro&amp;severity=medium&amp;id=68dea19388ef6ccb1e84f5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40991-cwe-79-improper-neutralization-of-i-56ae8b04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40991%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Creativeitem%20Ekushey%20CRM&amp;severity=medium&amp;id=68de5841274727b051111922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54293-cwe-22-improper-limitation-of-a-pat-e2f8e728</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54293%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Canonical%20LXD&amp;severity=high&amp;id=68de5841274727b051111925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40990-cwe-79-improper-neutralization-of-i-8dfcb82a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40990%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Creativeitem%20Ekushey%20CRM&amp;severity=medium&amp;id=68de5841274727b05111191f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40989-cwe-79-improper-neutralization-of-i-a1ae8e06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Creativeitem%20Ekushey%20CRM&amp;severity=medium&amp;id=68de571d8613837f0a3aa611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-leverage-seo-poisoning-and-malicious-a97011e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Leverage%20SEO%20Poisoning%20and%20Malicious%20Ads%20to%20Distribute%20Backdoored%20Microsoft%20Teams%20Installers&amp;severity=medium&amp;id=68de53a267ab0ec8fec2bb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-zip-files-use-windows-shortcuts-to-drop--316fd0ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20ZIP%20Files%20Use%20Windows%20Shortcuts%20to%20Drop%20Malware&amp;severity=medium&amp;id=68de528432efd56130b54b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54468-cwe-200-exposure-of-sensitive-infor-d8c9835c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54468%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SUSE%20rancher&amp;severity=medium&amp;id=68de8a13d034459bbdfb0c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61735-cwe-918-server-side-request-forgery-2c607a80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61735%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Kylin&amp;severity=high&amp;id=68de4acb4e9ed523ee9b5d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61733-cwe-288-authentication-bypass-using-3d608e03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61733%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Apache%20Software%20Foundation%20Apache%20Kylin&amp;severity=high&amp;id=68de4acb4e9ed523ee9b5d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61734-cwe-552-files-or-directories-access-7e833018</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61734%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Apache%20Software%20Foundation%20Apache%20Kylin&amp;severity=high&amp;id=68de4acb4e9ed523ee9b5d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/werewolf-raids-russias-public-sector-with-trusted--8416492a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Werewolf%20raids%20Russia&apos;s%20public%20sector%20with%20trusted%20relationship%20attacks&amp;severity=medium&amp;id=68de7a2533c890fca8cec2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40646-cwe-79-improper-neutralization-of-i-c00f6033</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Status%20Tracker%20Energy%20CRM&amp;severity=medium&amp;id=68e8c37b9fd71783de462c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-analytics-bug-leaked-customer-tracking-data--8f2e8200</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Analytics%20bug%20leaked%20customer%20tracking%20data%20to%20other%20tenants&amp;severity=high&amp;id=68de4848cfd3705b75446bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breach-at-dealership-software-provider-impact-1a3e69c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20breach%20at%20dealership%20software%20provider%20impacts%20766k%20clients&amp;severity=high&amp;id=68de4848cfd3705b75446bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-extortion-emails-claim-theft-of-oracle-e-busi-3aaf5e04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20extortion%20emails%20claim%20theft%20of%20Oracle%20E-Business%20Suite%20data&amp;severity=high&amp;id=68de47693a84497e8a359283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-phantom-taurus-uses-net-star-malw-84432eb3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20APT%20Phantom%20Taurus%20uses%20Net-Star%20malware%20in%20espionage%20campaigns%20against%20key%20sectors&amp;severity=medium&amp;id=68de47693a84497e8a359287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54292-cwe-22-improper-limitation-of-a-pat-dd18fac9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54292%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Canonical%20LXD&amp;severity=medium&amp;id=68de46967ead30c0938fe4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54291-cwe-209-generation-of-error-message-2660b426</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54291%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Canonical%20LXD&amp;severity=medium&amp;id=68de46967ead30c0938fe4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54290-cwe-200-exposure-of-sensitive-infor-5a5394d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54290%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Canonical%20LXD&amp;severity=medium&amp;id=68de46967ead30c0938fe4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warning-beware-of-android-spyware-disguised-as-sig-4cb5c2a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warning%3A%20Beware%20of%20Android%20Spyware%20Disguised%20as%20Signal%20Encryption%20Plugin%20and%20ToTok%20Pro&amp;severity=medium&amp;id=68e467476a45552f36e85b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54289-cwe-1385-missing-origin-validation--5c487b33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54289%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20Canonical%20LXD&amp;severity=high&amp;id=68de46967ead30c0938fe4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54288-cwe-290-authentication-bypass-by-sp-6dfbb7db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54288%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Canonical%20LXD&amp;severity=medium&amp;id=68de46967ead30c0938fe4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54287-cwe-1336-improper-neutralization-of-d33a2ec8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54287%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Canonical%20LXD&amp;severity=high&amp;id=68de5841274727b05111192b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54286-cwe-352-cross-site-request-forgery--7431f16f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54286%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Canonical%20LXD&amp;severity=high&amp;id=68de5841274727b051111928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-spyware-in-the-uae-masquerades-as-spyware-92285cf9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Spyware%20in%20the%20UAE%20Masquerades%20as%20...%20Spyware&amp;severity=medium&amp;id=68e469f16a45552f36e90742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-ai-powered-ransomware-from-apt-group-5e4c492e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%3A%20AI-powered%20Ransomware%20from%20APT%20Group&amp;severity=medium&amp;id=68de31e168d1a1db7a820674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9697-cwe-89-sql-injection-in-ajax-woosear-dc2f2416</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9697%3A%20CWE-89%20SQL%20Injection%20in%20Ajax%20WooSearch&amp;severity=critical&amp;id=68dea19388ef6ccb1e84f5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9587-cwe-89-sql-injection-in-ctl-behance--ffd38ebc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9587%3A%20CWE-89%20SQL%20Injection%20in%20CTL%20Behance%20Importer%20Lite&amp;severity=high&amp;id=68deb7bf5c73916daeaaaac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61690-buffer-underwrite-buffer-underflow--d098ddd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61690%3A%20Buffer%20underwrite%20(&apos;Buffer%20underflow&apos;)%20in%20KEYENCE%20CORPORATION%20KV%20STUDIO&amp;severity=high&amp;id=68deb9611faa9666742bb45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61692-use-after-free-in-keyence-corporati-d4970b5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61692%3A%20Use%20after%20free%20in%20KEYENCE%20CORPORATION%20VT%20STUDIO&amp;severity=high&amp;id=68deb9611faa9666742bb45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61691-out-of-bounds-read-in-keyence-corpo-d49db5ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61691%3A%20Out-of-bounds%20Read%20in%20KEYENCE%20CORPORATION%20VT%20STUDIO&amp;severity=high&amp;id=68debf28f18dd408beac484c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58777-access-of-uninitialized-pointer-in--19b78a3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58777%3A%20Access%20of%20uninitialized%20pointer%20in%20KEYENCE%20CORPORATION%20VT%20STUDIO&amp;severity=high&amp;id=68debf28f18dd408beac4848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58776-stack-based-buffer-overflow-in-keye-865a358b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58776%3A%20Stack-based%20buffer%20overflow%20in%20KEYENCE%20CORPORATION%20KV%20STUDIO&amp;severity=high&amp;id=68debf28f18dd408beac4844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58775-stack-based-buffer-overflow-in-keye-c750d1cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58775%3A%20Stack-based%20buffer%20overflow%20in%20KEYENCE%20CORPORATION%20KV%20STUDIO&amp;severity=high&amp;id=68debf28f18dd408beac4840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11020-cwe-89-improper-neutralization-of-s-e83d5431</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11020%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MarkAny%20SafePC%20Enterprise&amp;severity=high&amp;id=68de0bcfb62217a1ee704c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11221-cwe-22-improper-limitation-of-a-pat-646e7621</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11221%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GTONE%20ChangeFlow&amp;severity=critical&amp;id=68de0bcfb62217a1ee704c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11182-cwe-22-improper-limitation-of-a-pat-8ea92e6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11182%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GTONE%20ChangeFlow&amp;severity=high&amp;id=68de0bcfb62217a1ee704c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28760-na-d48a8263</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28760%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3bfb66c7f7acdd3cc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60782-na-0425f91c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60782%3A%20n%2Fa&amp;severity=medium&amp;id=68df13500005234f78f726bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-02-64b03d8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-02&amp;severity=medium&amp;id=68df12ee0005234f78f6ca74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57443-na-7059eb5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57443%3A%20n%2Fa&amp;severity=medium&amp;id=68ded30f7dcc80feb140548d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32942-na-9bfec992</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32942%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20SSH%20Tectia%20Server&amp;severity=high&amp;id=68decc6c903d1527944295fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54315-cwe-837-improper-enforcement-of-a-s-d1941b8b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54315%3A%20CWE-837%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Matrix%20Matrix%20specification&amp;severity=high&amp;id=68dec76b0040948278cba87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49090-cwe-642-external-control-of-critica-e7807ddf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49090%3A%20CWE-642%20External%20Control%20of%20Critical%20State%20Data%20in%20Matrix%20Matrix%20specification&amp;severity=high&amp;id=68dec76b0040948278cba874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56019-na-5b3f8867</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56019%3A%20n%2Fa&amp;severity=medium&amp;id=68deb604da2dc2424f5e63c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59409-na-c9f688f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59409%3A%20n%2Fa&amp;severity=high&amp;id=68deb38427b31a41b5936d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59407-na-6971b607</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59407%3A%20n%2Fa&amp;severity=critical&amp;id=68deb38427b31a41b5936d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59406-na-9d5c3e9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59406%3A%20n%2Fa&amp;severity=medium&amp;id=68deb38427b31a41b5936d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59405-na-f257c597</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59405%3A%20n%2Fa&amp;severity=high&amp;id=68deb38427b31a41b5936d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59403-na-7cb568a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59403%3A%20n%2Fa&amp;severity=critical&amp;id=68deb12af660c882cd1794a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60663-na-6687108d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60663%3A%20n%2Fa&amp;severity=high&amp;id=68dea7707d138d8f7b8e83b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60661-na-f0403c3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60661%3A%20n%2Fa&amp;severity=medium&amp;id=68dea7707d138d8f7b8e83af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60662-na-59995b06</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60662%3A%20n%2Fa&amp;severity=high&amp;id=68dea4352d88283ed76fb5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60660-na-3510feb1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60660%3A%20n%2Fa&amp;severity=high&amp;id=68dea4342d88283ed76fb5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57305-na-9cb6494c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57305%3A%20n%2Fa&amp;severity=medium&amp;id=68dea4342d88283ed76fb5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56154-na-3d01a815</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56154%3A%20n%2Fa&amp;severity=medium&amp;id=68dea4342d88283ed76fb5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56162-na-b4b0c4c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56162%3A%20n%2Fa&amp;severity=medium&amp;id=68de9f650cc3618ea8d681b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56161-na-d30d9a75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56161%3A%20n%2Fa&amp;severity=high&amp;id=68de9f650cc3618ea8d681b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61087-na-34807789</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61087%3A%20n%2Fa&amp;severity=medium&amp;id=68de9076d3a86bc5231afbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61096-na-96f73c5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61096%3A%20n%2Fa&amp;severity=medium&amp;id=68de8edb779290c94ba70b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56381-na-1b3d0276</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56381%3A%20n%2Fa&amp;severity=medium&amp;id=68de87961199a3d5d3438cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56380-na-3a62e1c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56380%3A%20n%2Fa&amp;severity=medium&amp;id=68de87961199a3d5d3438cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56379-na-7880b318</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56379%3A%20n%2Fa&amp;severity=medium&amp;id=68de87961199a3d5d3438cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61583-cwe-20-improper-input-validation-in-57941a54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61583%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20joni1802%20ts3-manager&amp;severity=medium&amp;id=68ddaceb72d3e5aff1251267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61582-cwe-20-improper-input-validation-in-dc9b4167</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61582%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20joni1802%20ts3-manager&amp;severity=high&amp;id=68ddaceb72d3e5aff1251263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61587-cwe-601-url-redirection-to-untruste-1a3d83a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61587%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=68dda589b3e3ddcc713a4ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59951-cwe-348-use-of-less-trusted-source--d06676af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59951%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20LukeGus%20Termix&amp;severity=critical&amp;id=68dda3ebe96067ff09c5f065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nuclei-templates-for-detecting-ami-megarac-bmc-vul-a8e5139a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nuclei%20Templates%20for%20Detecting%20AMI%20MegaRAC%20BMC%20Vulnerabilities&amp;severity=medium&amp;id=68dda24aa0e683776d6fdadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23297-cwe-276-incorrect-default-permissio-0846e282</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23297%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20NVIDIA%20NVIDIA%20App&amp;severity=high&amp;id=68dd9c8d82ee871e1bdf1d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23355-cwe-427-uncontrolled-search-path-el-8e7d6c42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23355%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20Nsight%20Graphics&amp;severity=medium&amp;id=68dd9c8d82ee871e1bdf1d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sheds-light-on-shinyhunters-salesforce-tact-95f5971d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sheds%20Light%20on%20ShinyHunters&apos;%20Salesforce%20Tactics&amp;severity=medium&amp;id=68e469f16a45552f36e90745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59538-cwe-248-uncaught-exception-in-argop-b0f330c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59538%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20argoproj%20argo-cd&amp;severity=high&amp;id=68dd9a10b702a18e6b04b1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59537-cwe-20-improper-input-validation-in-a2deb911</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59537%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20argoproj%20argo-cd&amp;severity=high&amp;id=68dd986158b778dbe226e796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59531-cwe-703-improper-check-or-handling--dad3f4dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59531%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20argoproj%20argo-cd&amp;severity=high&amp;id=68dd94f67eacd1ac925ba1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shutdown-threatens-us-intel-sharing-cyber-defense-1d56664e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shutdown%20Threatens%20US%20Intel%20Sharing%2C%20Cyber%20Defense&amp;severity=critical&amp;id=68e469f16a45552f36e90748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/westjet-confirms-passenger-ids-and-passports-stole-6db45990</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WestJet%20Confirms%20Passenger%20IDs%20and%20Passports%20Stolen%20in%20Cyberattack&amp;severity=medium&amp;id=68dd919222e2e2668768dbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-09x-walk-through-the-updates-beb01102</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%200.9.x%20-%20walk%20through%20the%20updates&amp;severity=medium&amp;id=68dda0a614065076695d09e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59150-cwe-476-null-pointer-dereference-in-53899199</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59150%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=68dd8fe35b743f3e8e9287c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59149-cwe-121-stack-based-buffer-overflow-44a1064b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59149%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=medium&amp;id=68dd8addbe10d062bc70049e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58769-cwe-22-improper-limitation-of-a-pat-ca2d54b2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58769%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20auth0%20laravel-auth0&amp;severity=low&amp;id=68dd88785d568b8243744790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59148-cwe-476-null-pointer-dereference-in-9f703e7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59148%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=68dd86de2801a4fa284df5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wiretap-attack-extracts-intel-sgx-ecdsa-key-vi-b71d5cda</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20WireTap%20Attack%20Extracts%20Intel%20SGX%20ECDSA%20Key%20via%20DDR4%20Memory-Bus%20Interposer&amp;severity=high&amp;id=68dd8378faa82da0fe7d9782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-bug-in-classic-outlook-can-only-be-fixed-via-m-ac222d7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20bug%20in%20classic%20Outlook%20can%20only%20be%20fixed%20via%20Microsoft%20support&amp;severity=high&amp;id=68dd8378faa82da0fe7d9786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59147-cwe-358-improperly-implemented-secu-3a581fd0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59147%3A%20CWE-358%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20OISF%20suricata&amp;severity=high&amp;id=68dd82a3486fd6ef324febcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/allianz-life-says-july-data-breach-impacts-15-mill-6bb602b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Allianz%20Life%20says%20July%20data%20breach%20impacts%201.5%20million%20people&amp;severity=high&amp;id=68dd7cbd9b40a9292cf082c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10578-cwe-269-improper-privilege-manageme-d7e48e5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10578%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20HP%20Inc.%20HP%20Support%20Assistant&amp;severity=medium&amp;id=68dd78861b22ab563598541f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wiretap-attack-extracts-intel-sgx-ecdsa-key-vi-797a0e46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20WireTap%20Attack%20Extracts%20Intel%20SGX%20ECDSA%20Key%20via%20DDR4%20Memory-Bus%20Interposer&amp;severity=low&amp;id=68e467476a45552f36e85b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8679-cwe-307-improper-restriction-of-exce-4762a712</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8679%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Extreme%20Networks%20ExtremeGuest%20Essentials&amp;severity=high&amp;id=68dd632038a5623ddac75ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49883-cwe-521-weak-password-requirements--fed88610</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49883%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20IBM%20Transformation%20Extender%20Advanced&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50300-cwe-284-improper-access-control-in--30ea6316</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50300%3A%20CWE-284%20Improper%20Access%20Control%20in%20IBM%20Transformation%20Extender%20Advanced&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49881-cwe-613-insufficient-session-expira-d9ebd4a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49881%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Transformation%20Extender%20Advanced&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34182-cwe-79-improper-neutralization-of-i-b8f0ed7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34182%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Deciso%20OPNsense&amp;severity=medium&amp;id=68dd5ef5ebdfe95d2e1694d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11233-cwe-22-improper-limitation-of-a-pat-1907c86f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11233%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Rust%20Project%20std&amp;severity=medium&amp;id=68dd5d4e20bc8d682462ef3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meet-spamgpt-and-matrixpdf-new-ai-toolkits-driving-5c817eef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meet%20SpamGPT%20and%20MatrixPDF%2C%20New%20AI%20Toolkits%20Driving%20Malware%20and%20Phishing%20Attacks&amp;severity=medium&amp;id=68dd54df56e9634c8024fb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20357-improper-neutralization-of-input-du-0dd3ac59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=68dd5401795552734e391052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20356-improper-neutralization-of-input-du-0bc65ba0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=68dd5401795552734e39104f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20361-improper-neutralization-of-input-du-ab2f30a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager&amp;severity=medium&amp;id=68dd5401795552734e391055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20368-the-software-does-not-neutralize-or-9fbb9f03</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20368%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=68dd5401795552734e39105e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20371-the-web-server-receives-a-url-or-si-c9ec118c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20371%3A%20The%20web%20server%20receives%20a%20URL%20or%20similar%20request%20from%20an%20upstream%20component%20and%20retrieves%20the%20contents%20of%20this%20URL%2C%20but%20it%20does%20not%20sufficiently%20ensure%20that%20the%20request%20is%20being%20sent%20to%20the%20expected%20destination.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=68dd5401795552734e391067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20367-the-software-does-not-neutralize-or-190193f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20367%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=68dd5401795552734e39105b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20370-the-software-does-not-properly-cont-47bc9869</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20370%3A%20The%20software%20does%20not%20properly%20control%20the%20allocation%20and%20maintenance%20of%20a%20limited%20resource%20thereby%20enabling%20an%20actor%20to%20influence%20the%20amount%20of%20resources%20consumed%2C%20eventually%20leading%20to%20the%20exhaustion%20of%20available%20resources.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=68dd5401795552734e391064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20366-the-software-does-not-restrict-or-i-258d8b00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20366%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=68dd5401795552734e391058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20369-the-software-uses-xml-documents-and-ec5676dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20369%3A%20The%20software%20uses%20XML%20documents%20and%20allows%20their%20structure%20to%20be%20defined%20with%20a%20Document%20Type%20Definition%20(DTD)%2C%20but%20it%20does%20not%20properly%20control%20the%20number%20of%20recursive%20definitions%20of%20entities.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=68dd5401795552734e391061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-openshift-ai-flaw-exposes-hybrid-cloud-inf-c7ab85af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20OpenShift%20AI%20Flaw%20Exposes%20Hybrid%20Cloud%20Infrastructure%20to%20Full%20Takeover&amp;severity=critical&amp;id=68dd4b1c114c3ddd031de7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50301-cwe-532-insertion-of-sensitive-info-2524c459</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50301%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Transformation%20Extender%20Advanced&amp;severity=low&amp;id=68e0f3c0b66c7f7acdd3d09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-50-battering-ram-can-bust-confidential-computing-4df105d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20%2450%20&apos;Battering%20RAM&apos;%20Can%20Bust%20Confidential%20Computing&amp;severity=medium&amp;id=68e469f16a45552f36e9074b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-security-hardening-kaspersky-official-blog-51e1a233</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20security%20hardening%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e9574d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/undead-operating-systems-haunt-enterprise-security-cfeab8db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Undead%20Operating%20Systems%20Haunt%20Enterprise%20Security%20Networks&amp;severity=medium&amp;id=68e469f16a45552f36e9074e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41421-cwe-59-improper-link-resolution-bef-142e87e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41421%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TeamViewer%20Full%20Client&amp;severity=medium&amp;id=68ddc314107aa30f08655c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/onelogin-bug-let-attackers-use-api-keys-to-steal-o-35274fba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OneLogin%20Bug%20Let%20Attackers%20Use%20API%20Keys%20to%20Steal%20OIDC%20Secrets%20and%20Impersonate%20Apps&amp;severity=high&amp;id=68e467476a45552f36e85b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detour-dogs-dns-hijacking-infects-30000-websites-w-836db2ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detour%20Dog&apos;s%20DNS%20Hijacking%20Infects%2030%2C000%20Websites%20with%20Strela%20Stealer&amp;severity=medium&amp;id=68dd2963da19b4c5d0e15b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-openshift-ai-flaw-exposes-hybrid-cloud-inf-62fbcf1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20OpenShift%20AI%20Flaw%20Exposes%20Hybrid%20Cloud%20Infrastructure%20to%20Full%20Takeover&amp;severity=low&amp;id=68e467476a45552f36e85b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40648-cwe-79-improper-neutralization-of-i-61f36ba2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40648%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20issabel-pbx%20module%20Issabel&amp;severity=medium&amp;id=68dd426f50050273f35a9a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40647-cwe-79-improper-neutralization-of-i-af72b38d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20issabel-pbx%20module%20Issabel&amp;severity=medium&amp;id=68ddc314107aa30f08655c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-banking-trojan-klopatra-uses-hidden-vn-2af272c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Banking%20Trojan%20%E2%80%9CKlopatra%E2%80%9D%20Uses%20Hidden%20VNC%20to%20Control%20Infected%20Smartphones&amp;severity=high&amp;id=68dd169593313e20a68415e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/use-of-generative-ai-in-scams-f710c301</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Use%20of%20Generative%20AI%20in%20Scams&amp;severity=medium&amp;id=68dd169593313e20a68415e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-milesight-routers-to-send-phishing-ae3bcc1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Milesight%20Routers%20to%20Send%20Phishing%20SMS%20to%20European%20Users&amp;severity=high&amp;id=68dd169593313e20a68415dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53502-f8985d97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53502&amp;severity=null&amp;id=68e0f3c1b66c7f7acdd3e945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53469-164931f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53469&amp;severity=null&amp;id=695450bcdb813ff03e2bf87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2025-cybersecurity-reality-check-breaches-hidden-a-72e4880d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2025%20Cybersecurity%20Reality%20Check%3A%20Breaches%20Hidden%2C%20Attack%20Surfaces%20Growing%2C%20and%20AI%20Misperceptions%20Rising&amp;severity=medium&amp;id=68e467476a45552f36e85b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-milesight-routers-to-send-phishing-e1cb7ed7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Milesight%20Routers%20to%20Send%20Phishing%20SMS%20to%20European%20Users&amp;severity=medium&amp;id=68e467476a45552f36e85b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10847-vulnerability-in-broadcom-unified-i-73a653c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10847%3A%20Vulnerability%20in%20Broadcom%20Unified%20Infrastructure%20Management&amp;severity=high&amp;id=68dd07a25471b4f5afeb8f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-wd-my-cloud-bug-allows-remote-command-inj-c793dfd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20WD%20My%20Cloud%20bug%20allows%20remote%20command%20injection&amp;severity=critical&amp;id=68dcfbefe79dafb355ebb985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tesla-fixes-tcu-usb-flaw-allowing-root-access-6b750a8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tesla%20Fixes%20TCU%20USB%20Flaw%20Allowing%20Root%20Access&amp;severity=medium&amp;id=68dcfb17897535789374b089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-50-battering-ram-attack-breaks-intel-and-amd-c-3c09e7ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%2450%20Battering%20RAM%20Attack%20Breaks%20Intel%20and%20AMD%20Cloud%20Security%20Protections&amp;severity=high&amp;id=68dcfb17897535789374b081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-matrixpdf-toolkit-turns-pdfs-into-phishing-and-e00d9cc8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MatrixPDF%20toolkit%20turns%20PDFs%20into%20phishing%20and%20malware%20lures&amp;severity=high&amp;id=68dcfb17897535789374b07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61622-cwe-502-deserialization-of-untruste-02ef2c91</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61622%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Fory&amp;severity=critical&amp;id=68ddc314107aa30f08655c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/westjet-confirms-cyberattack-exposed-ids-passports-dfc0321d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WestJet%20confirms%20cyberattack%20exposed%20IDs%2C%20passports%20in%20June%20incident&amp;severity=high&amp;id=68dcfa3cdf8d945b36ae8688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-warns-of-cabinetrat-backdoor-xll-add-ins-s-d35c4dd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20Warns%20of%20CABINETRAT%20Backdoor%20%2B%20XLL%20Add-ins%20Spread%20via%20Signal%20ZIPs&amp;severity=high&amp;id=68dcfa3cdf8d945b36ae8684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-09x-walk-through-the-updates-302e69c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%200.9.x%20%E2%80%93%20walk%20through%20the%20updates&amp;severity=high&amp;id=68e46d3b6a45552f36e94e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39898-768d0b11</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39898&amp;severity=null&amp;id=68fb79f0a4ecdcc9295d63fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostsocks-from-initial-access-to-residential-prox-e29bba4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostSocks%3A%20From%20Initial%20Access%20to%20Residential%20Proxy&amp;severity=medium&amp;id=68dceb233fb6425729d8e369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xiebroc2-identified-in-ms-sql-server-attack-cases-fea85048</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XiebroC2%20Identified%20in%20MS-SQL%20Server%20Attack%20Cases&amp;severity=medium&amp;id=68dceb233fb6425729d8e360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11226-cwe-20-improper-input-validation-in-adb3c95c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11226%3A%20CWE-20%20Improper%20Input%20Validation%20in%20QOS.CH%20Sarl%20Logback-core&amp;severity=medium&amp;id=68ddc314107aa30f08655c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-warns-of-cabinetrat-backdoor-xll-add-ins-s-d9526925</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20Warns%20of%20CABINETRAT%20Backdoor%20%2B%20XLL%20Add-ins%20Spread%20via%20Signal%20ZIPs&amp;severity=low&amp;id=68e467476a45552f36e85b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9512-cwe-79-cross-site-scripting-xss-in-s-3e64c629</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9512%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=68dcc4bb8fb4916d8527d90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10538-cwe-288-authentication-bypass-using-8be572e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10538%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20LG%20Innotek%20Camera%20Model%20LND7210&amp;severity=high&amp;id=68dca8f1ca6202e366a921c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9075-cwe-79-improper-neutralization-of-in-9b55ab6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9075%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20ZoloBlocks%20%E2%80%93%20Gutenberg%20Block%20Editor%20Plugin%20with%20Advanced%20Blocks%2C%20Dynamic%20Content%2C%20Templates%20%26%20Patterns&amp;severity=medium&amp;id=68dca0d55d588c52e5e0c389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10735-cwe-918-server-side-request-forgery-75e71915</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10735%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20Block%20for%20Mailchimp%20%E2%80%93%20Add%20Email%20Subscription%20Forms%20and%20Collect%20Leads&amp;severity=medium&amp;id=68dca0d55d588c52e5e0c37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10744-cwe-200-exposure-of-sensitive-infor-fd1f154a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10744%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20softdiscover%20File%20Manager%2C%20Code%20Editor%2C%20and%20Backup%20by%20Managefy&amp;severity=medium&amp;id=68dca0d55d588c52e5e0c383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/software-secured-hacking-furbo-2-mobile-app-and-p2-434ee97d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Software%20Secured%20%7C%20Hacking%20Furbo%202%3A%20Mobile%20App%20and%20P2P%20Exploits%20%7C%20USA&amp;severity=medium&amp;id=68dc883e5d588c52e5dfa728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-imposes-one-hour-reporting-rule-for-major-cy-3f789fdb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Imposes%20One-Hour%20Reporting%20Rule%20for%20Major%20Cyber%20Incidents&amp;severity=medium&amp;id=68e469f16a45552f36e90751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57494-na-84bb544e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57494%3A%20n%2Fa&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-01-dc2d5ba5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-01&amp;severity=medium&amp;id=68ddc4dc107aa30f08656c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61045-na-dccc0430</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61045%3A%20n%2Fa&amp;severity=high&amp;id=68ddc314107aa30f08655c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57389-na-a86aa78c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57389%3A%20n%2Fa&amp;severity=medium&amp;id=68dd8fe35b743f3e8e9287c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61189-na-822cdf22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61189%3A%20n%2Fa&amp;severity=medium&amp;id=68dd8addbe10d062bc7004a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61188-na-bba64a61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61188%3A%20n%2Fa&amp;severity=medium&amp;id=68dd8addbe10d062bc7004a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56588-na-169ec1d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56588%3A%20n%2Fa&amp;severity=high&amp;id=68dd86de2801a4fa284df5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57444-na-5db88632</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57444%3A%20n%2Fa&amp;severity=medium&amp;id=68dd82a3486fd6ef324febc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43718-na-6d7132b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43718%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20freedesktop%20Poppler&amp;severity=low&amp;id=68dd7b129f41f345b1268044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59682-na-4ff519a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59682%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20djangoproject%20Django&amp;severity=low&amp;id=68dd78861b22ab5635985427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59681-cwe-89-improper-neutralization-of-s-9798d5e9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59681%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=high&amp;id=68dd78861b22ab5635985422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60991-na-af5633b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60991%3A%20n%2Fa&amp;severity=high&amp;id=68dd72dbabca8358e689ff9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46205-na-b8bfbfa3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46205%3A%20n%2Fa&amp;severity=high&amp;id=68dd72dbabca8358e689ff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57393-na-80d86369</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57393%3A%20n%2Fa&amp;severity=high&amp;id=68dd6f80b8c556e771f690da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28357-na-9db31b62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28357%3A%20n%2Fa&amp;severity=high&amp;id=68dd6f80b8c556e771f690d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56515-na-585922ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56515%3A%20n%2Fa&amp;severity=high&amp;id=68dd4b2c114c3ddd031de8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56514-na-f7bb03a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56514%3A%20n%2Fa&amp;severity=medium&amp;id=68dd473d4f9fd6165021822f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61044-na-d84fcea2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61044%3A%20n%2Fa&amp;severity=medium&amp;id=68dd426f50050273f35a9a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59687-na-31a465a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59687%3A%20n%2Fa&amp;severity=medium&amp;id=68dd426f50050273f35a9a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57275-na-adff0aff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57275%3A%20n%2Fa&amp;severity=medium&amp;id=68dd426f50050273f35a9a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59686-na-5db52955</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59686%3A%20n%2Fa&amp;severity=medium&amp;id=68dd40de844624949e000c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59685-na-1ed6a9ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59685%3A%20n%2Fa&amp;severity=medium&amp;id=68dd40de844624949e000c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59684-na-bc85ae98</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59684%3A%20n%2Fa&amp;severity=high&amp;id=68dd40de844624949e000c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52040-na-86f2b1f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52040%3A%20n%2Fa&amp;severity=high&amp;id=68dd3f4eb7ffd96e585d7a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52041-na-b092a3e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52041%3A%20n%2Fa&amp;severity=high&amp;id=68dd3cf604e976796deff843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52039-na-882ad587</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52039%3A%20n%2Fa&amp;severity=high&amp;id=68dd3cf604e976796deff83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52042-na-37fa0262</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52042%3A%20n%2Fa&amp;severity=high&amp;id=68dd3a90787d03c6c8e4750e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24525-cwe-321-in-keysight-ixia-vision-pro-c2c059fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24525%3A%20CWE-321%20in%20Keysight%20Ixia%20Vision%20Product%20Family&amp;severity=high&amp;id=68dc71325d588c52e5de4759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-comparing-honeypot-passwords-wit-dde1510a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Comparing%20Honeypot%20Passwords%20with%20HIBP%2C%20(Wed%2C%20Oct%201st)&amp;severity=medium&amp;id=68e46e546a45552f36e96977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55191-cwe-362-concurrent-execution-using--e1dbe4f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55191%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=68dc71325d588c52e5de475f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43826-cwe-79-improper-neutralization-of-i-1bb71f7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68dc71325d588c52e5de4767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-code-execution-and-authentication-bypass-in-7a05163f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Code%20Execution%20and%20Authentication%20Bypass%20in%20Materialise%20OrthoView%20(CVE-2025-23049)&amp;severity=medium&amp;id=68dc4e72f6cdf058d6b2668a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-china-apt-strikes-with-precision-and-persisten-24ac20e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20China%20APT%20Strikes%20With%20Precision%20and%20Persistence&amp;severity=medium&amp;id=68e469f16a45552f36e90754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/klopatra-trojan-makes-bank-transfers-while-you-sle-d64302c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Klopatra&apos;%20Trojan%20Makes%20Bank%20Transfers%20While%20You%20Sleep&amp;severity=medium&amp;id=68e469f26a45552f36e90762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10659-cwe-78-improper-neutralization-of-s-c536e09c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10659%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MegaSys%20Telenium%20Online%20Web%20Application%3A&amp;severity=critical&amp;id=68dc412b4167b98bea01ab8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36262-cwe-1286-improper-validation-of-syn-80b50eb3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36262%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=68dc412b4167b98bea01ab94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36132-cwe-79-improper-neutralization-of-i-986e9937</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=68dc412b4167b98bea01ab91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-exploited-new-vmware-bug-for-nearly-a-year-679e9ece</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Exploited%20New%20VMware%20Bug%20for%20Nearly%20a%20Year&amp;severity=medium&amp;id=68e469f26a45552f36e90765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chinese-apt-phantom-taurus-targeted-ms-exchang-6cfa0f1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Chinese%20APT%20Phantom%20Taurus%20Targeted%20MS%20Exchange%20Servers%20Over%203%20Years&amp;severity=medium&amp;id=68dc2d1ee5213aba7a30154d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43827-cwe-639-authorization-bypass-throug-ae847805</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43827%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68dc293ea02184cd1d6a01d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zeroday-cloud-the-first-open-source-cloud-hacking--d2361272</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZeroDay%20Cloud%3A%20The%20first%20open-source%20cloud%20hacking%20competition&amp;severity=critical&amp;id=68dc2941a02184cd1d6a01df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-50-battering-ram-attack-breaks-intel-and-amd-c-50a716c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%2450%20Battering%20RAM%20Attack%20Breaks%20Intel%20and%20AMD%20Cloud%20Security%20Protections&amp;severity=medium&amp;id=68e467476a45552f36e85b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-audits-fail-four-critical-pre-auth-vulnerabil-ce7f759f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Audits%20Fail%3A%20Four%20Critical%20Pre-Auth%20Vulnerabilities%20in%20TRUfusion%20Enterprise&amp;severity=critical&amp;id=68dc230df0f117f21d0d9d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11195-cwe-20-improper-input-validation-in-b04d4b0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11195%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rapid7%20AppSpider%20Pro&amp;severity=low&amp;id=68dc1e4eda058bed8e684ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disallow-security-research-crypto-phishing-sites-f-6280c528</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disallow%3A%20%2Fsecurity-research%3F%20Crypto%20Phishing%20Sites&apos;%20Failed%20Attempt%20to%20Block%20Investigators&amp;severity=medium&amp;id=68dc34118d3f665f21c9d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23293-cwe-306-missing-authentication-for--79ad68b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23293%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NVIDIA%20DLS%20component%20of%20NVIDIA%20License%20System&amp;severity=high&amp;id=68dc1a5e38591454ec7551be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23292-cwe-943-improper-neutralization-of--74acae9f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23292%3A%20CWE-943%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20NVIDIA%20DLS%20component%20of%20NVIDIA%20License%20System&amp;severity=medium&amp;id=68dc1a5e38591454ec7551b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23291-cwe-312-cleartext-storage-of-sensit-33acde95</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23291%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20NVIDIA%20DLS%20component%20of%20NVIDIA%20License%20System&amp;severity=low&amp;id=68dc1a5e38591454ec7551b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10725-incorrect-privilege-assignment-in-r-8d7818a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10725%3A%20Incorrect%20Privilege%20Assignment%20in%20opendatahub-io%20opendatahub-operator&amp;severity=critical&amp;id=68dc18cc7e0729622ee4ccef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-taurus-a-new-chinese-nexus-apt-and-the-dis-d3a6835a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Taurus%3A%20A%20New%20Chinese%20Nexus%20APT%20and%20the%20Discovery%20of%20the%20NET-STAR%20Malware%20Suite&amp;severity=medium&amp;id=68dc359a4fa123577f2a8430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-disclose-google-gemini-ai-flaws-allowi-02a24f92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Disclose%20Google%20Gemini%20AI%20Flaws%20Allowing%20Prompt%20Injection%20and%20Cloud%20Exploits&amp;severity=high&amp;id=68dc0e906d6bde08e78ae909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broadcom-patches-vmware-zero-day-actively-exploite-8c61005b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broadcom%20patches%20VMware%20Zero-Day%20actively%20exploited%20by%20UNC5174&amp;severity=critical&amp;id=68dc0dc527f4c7e4fcc7b63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-exploiting-vmware-zero-day-since-o-3c2766a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20hackers%20exploiting%20VMware%20zero-day%20since%20October%202024&amp;severity=critical&amp;id=68dc0dc527f4c7e4fcc7b639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-breaches-us-surveillance-firm-remotecom-acc-16589f0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Breaches%20US%20Surveillance%20Firm%20RemoteCOM%2C%20Accesses%20Court%20Supervision%20Records%20and%20Criminal%20Data&amp;severity=medium&amp;id=68dc04f86bb53bfbb49f9117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6034-cwe-125-out-of-bounds-read-in-ni-cir-2af95224</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6034%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=68dc027ac906f71936581348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-taurus-new-china-linked-hacker-group-hits--8496e67a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Taurus%3A%20New%20China-Linked%20Hacker%20Group%20Hits%20Governments%20With%20Stealth%20Malware&amp;severity=medium&amp;id=68e467476a45552f36e85bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6033-cwe-787-out-of-bounds-write-in-ni-ci-b128f041</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6033%3A%20CWE-787%C2%A0-%20Out%20of%20Bounds%20Write%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=68dc027ac906f71936581345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54477-cwe-203-observable-discrepancy-in-j-599ca730</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54477%3A%20CWE-203%20Observable%20Discrepancy%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=68dc000c07b0365a4556815c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54476-cwe-79-improper-neutralization-of-i-12314d94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54476%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=68dc000c07b0365a45568159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-auto-insurance-platform-claimpix-leaked-107tb-o-73b53229</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Auto%20Insurance%20Platform%20ClaimPix%20Leaked%2010.7TB%20of%20Records%20Online&amp;severity=medium&amp;id=68dbf7352da6e479b9e9883d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7493-insufficient-granularity-of-access-c-a5b0603a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7493%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=critical&amp;id=68dc000c07b0365a4556815f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/useradmin-sometimes-you-dont-even-need-to-log-in-t-470134fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22user%3Dadmin%22.%20Sometimes%20you%20don&apos;t%20even%20need%20to%20log%20in.%2C%20(Tue%2C%20Sep%2030th)&amp;severity=medium&amp;id=68e46e546a45552f36e9697a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7779-cwe-269-in-acronis-acronis-true-imag-52299677</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7779%3A%20CWE-269%20in%20Acronis%20Acronis%20True%20Image&amp;severity=high&amp;id=68dbf9a6e965c789fc619924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11178-cwe-427-in-acronis-acronis-true-ima-e7b834c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11178%3A%20CWE-427%20in%20Acronis%20Acronis%20True%20Image&amp;severity=high&amp;id=68dbf9a6e965c789fc61991d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57852-incorrect-default-permissions-in-re-8319fb30</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57852%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.16&amp;severity=medium&amp;id=68dbf9a6e965c789fc619920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-shadow-ai-risks-be-stopped-28df19b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20Shadow%20AI%20Risks%20Be%20Stopped%3F&amp;severity=medium&amp;id=68e469f26a45552f36e90768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-disclose-google-gemini-ai-flaws-allowi-430401c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Disclose%20Google%20Gemini%20AI%20Flaws%20Allowing%20Prompt%20Injection%20and%20Cloud%20Exploits&amp;severity=low&amp;id=68e467476a45552f36e85bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34217-cwe-321-use-of-hard-coded-cryptogra-4e89724b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34217%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68dbda3e53ffcfa45c3c44f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flipswitch-a-novel-syscall-hooking-technique-14feafb7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FlipSwitch%3A%20a%20Novel%20Syscall%20Hooking%20Technique&amp;severity=medium&amp;id=68dc37ec0079d7edc75fa150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-expands-sentinel-into-agentic-security-p-995f692c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Expands%20Sentinel%20Into%20Agentic%20Security%20Platform%20With%20Unified%20Data%20Lake&amp;severity=low&amp;id=68e467476a45552f36e85bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10859-data-stored-in-cookies-for-non-html-04688e3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10859%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=68dc71325d588c52e5de478d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11153-jit-miscompilation-in-the-javascrip-242cb441</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11153%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68dc71325d588c52e5de4795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11152-sandbox-escape-due-to-integer-overf-33088070</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11152%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68dc71325d588c52e5de4791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10217-cwe-117-improper-output-neutralizat-6bf49b6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10217%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Hitachi%20Energy%20Asset%20Suite&amp;severity=medium&amp;id=68dbcc0dc1fddf59aea26315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/datzbro-rat-hiding-behind-senior-travel-scams-4c8b5c54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Datzbro%3A%20RAT%20Hiding%20Behind%20Senior%20Travel%20Scams&amp;severity=medium&amp;id=68dc36656cc735edd4bd9857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stop-alert-chaos-context-is-the-key-to-effective-i-1c69b40d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stop%20Alert%20Chaos%3A%20Context%20Is%20the%20Key%20to%20Effective%20Incident%20Response&amp;severity=medium&amp;id=68e467476a45552f36e85bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41098-cwe-639-authorization-bypass-throug-9a3a26b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41098%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dc2f6b11d133094dbff38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41099-cwe-639-authorization-bypass-throug-68f5432a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41099%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b378e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41097-cwe-639-authorization-bypass-throug-a3c4aee2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41097%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b378b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41096-cwe-639-authorization-bypass-throug-10e08264</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41096%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b3788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41095-cwe-639-authorization-bypass-throug-f08ba3ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41095%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b3785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41094-cwe-639-authorization-bypass-throug-d586a341</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41094%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b3782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41093-cwe-639-authorization-bypass-throug-f607a452</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41093%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b377f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41092-cwe-639-authorization-bypass-throug-22a81a80</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41092%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b377c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41091-cwe-639-authorization-bypass-throug-ceeb52ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41091%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b3779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urgent-china-linked-hackers-exploit-new-vmware-zer-9626ae12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Urgent%3A%20China-Linked%20Hackers%20Exploit%20New%20VMware%20Zero-Day%20Since%20October%202024&amp;severity=high&amp;id=68e467476a45552f36e85bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trifecta-of-google-gemini-flaws-turn-ai-into-attac-f062ea9b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Trifecta&apos;%20of%20Google%20Gemini%20Flaws%20Turn%20AI%20Into%20Attack%20Vehicle&amp;severity=medium&amp;id=68e469f26a45552f36e9076b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8122-cwe-89-improper-neutralization-of-sp-46e2b9c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8122%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=high&amp;id=68dbac586e3c400c0ffa5e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8121-cwe-89-improper-neutralization-of-sp-3d47c63b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8121%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=high&amp;id=68dbac586e3c400c0ffa5e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8120-cwe-434-unrestricted-upload-of-file--44690427</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8120%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=critical&amp;id=68dbac586e3c400c0ffa5e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8119-cwe-352-cross-site-request-forgery-c-af8d96e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8119%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=medium&amp;id=68dbac586e3c400c0ffa5e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8118-cwe-307-improper-restriction-of-exce-0e889e8c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8118%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=medium&amp;id=68dbac586e3c400c0ffa5dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8117-cwe-909-missing-initialization-of-re-b2142ebf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8117%3A%20CWE-909%20Missing%20Initialization%20of%20Resource%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=high&amp;id=68dbac586e3c400c0ffa5dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8116-cwe-79-improper-neutralization-of-in-c48c6b03</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=medium&amp;id=68dbac586e3c400c0ffa5df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7065-cwe-434-unrestricted-upload-of-file--9377e05c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7065%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=critical&amp;id=68dbac586e3c400c0ffa5df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7063-cwe-434-unrestricted-upload-of-file--f9d21ef6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7063%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=critical&amp;id=68dbac586e3c400c0ffa5df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-flags-ai-phishing-attack-hiding-in-svg-f-d454ac2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Flags%20AI%20Phishing%20Attack%20Hiding%20in%20SVG%20Files&amp;severity=medium&amp;id=68dbab8d1ffc5e5475e59bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asahi-halts-ordering-shipping-and-customer-service-3e772c34</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asahi%20halts%20ordering%2C%20shipping%2C%20and%20customer%20service%20after%20cyberattack&amp;severity=medium&amp;id=68dba79e9cc38c2ec92e5025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-sounds-alarm-on-critical-sudo-flaw-actively-e-c47fc4ca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Sounds%20Alarm%20on%20Critical%20Sudo%20Flaw%20Actively%20Exploited%20in%20Linux%20and%20Unix%20Systems&amp;severity=critical&amp;id=68dba208cbeea856edd1bafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-shinyhunters-restructure-new-atta-58933406</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%2C%20ShinyHunters%20Restructure%20-%20New%20Attacks%20Underway&amp;severity=medium&amp;id=68dba209cbeea856edd1bb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-trojan-datzbro-tricking-elderly-with-a-bba91f34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Trojan%20%E2%80%9CDatzbro%E2%80%9D%20Tricking%20Elderly%20with%20AI-Generated%20Facebook%20Travel%20Events&amp;severity=medium&amp;id=68e467476a45552f36e85bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/klopatra-exposing-a-new-android-banking-trojan-ope-55f3b5e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Klopatra%3A%20exposing%20a%20new%20Android%20banking%20trojan%20operation%20with%20roots%20in%20Turkey%20%7C%20Cleafy%20LABS&amp;severity=medium&amp;id=68db9fa0e0aba895b36c4866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolving-enterprise-defense-to-secure-the-modern-a-64052a2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolving%20Enterprise%20Defense%20to%20Secure%20the%20Modern%20AI%20Supply%20Chain&amp;severity=medium&amp;id=68e467476a45552f36e85c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-police-just-seized-55-billion-in-bitcoin-the-wo-da1d49f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.K.%20Police%20Just%20Seized%20%C2%A35.5%20Billion%20in%20Bitcoin%20%E2%80%94%20The%20World%E2%80%99s%20Largest%20Crypto%20Bust&amp;severity=medium&amp;id=68e467476a45552f36e85c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-powered-voice-cloning-raises-vishing-risks-958ce244</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Powered%20Voice%20Cloning%20Raises%20Vishing%20Risks&amp;severity=medium&amp;id=68e469f26a45552f36e9076e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-sounds-alarm-on-critical-sudo-flaw-actively-e-962c980c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Sounds%20Alarm%20on%20Critical%20Sudo%20Flaw%20Actively%20Exploited%20in%20Linux%20and%20Unix%20Systems&amp;severity=critical&amp;id=68e467476a45552f36e85c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11163-cwe-284-improper-access-control-in--1833562c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11163%3A%20CWE-284%20Improper%20Access%20Control%20in%20wpmudev%20SmartCrawl%20SEO%20checker%2C%20analyzer%20%26%20optimizer&amp;severity=medium&amp;id=68db6be4e3e4268bc5ca6662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-profile-conti-ransomware-group-dc0f138b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Profile%3A%20Conti%20Ransomware%20Group&amp;severity=medium&amp;id=68db93c93772af9d5319a874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11149-denial-of-service-dos-in-node-stati-54455e4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11149%3A%20Denial%20of%20Service%20(DoS)%20in%20node-static&amp;severity=high&amp;id=68dc2b910f4bd9873cf3a458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11148-command-injection-in-check-branches-2a7b1923</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11148%3A%20Command%20Injection%20in%20check-branches&amp;severity=critical&amp;id=68dc2b910f4bd9873cf3a454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7052-cwe-352-cross-site-request-forgery-c-ef57fd3d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7052%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=68db5dce3dea812c77a6ce67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7038-cwe-288-authentication-bypass-using--0b905191</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7038%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=68db5dce3dea812c77a6ce60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6941-cwe-79-improper-neutralization-of-in-441ab934</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6941%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=68db5dce3dea812c77a6ce5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6815-cwe-79-improper-neutralization-of-in-bd93274f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=68db5dce3dea812c77a6ce55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59668-null-pointer-dereference-in-nihon-k-416d4a22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59668%3A%20NULL%20pointer%20dereference%20in%20NIHON%20KOHDEN%20CORPORATION%20Central%20Monitor%20CNS-6201&amp;severity=high&amp;id=68dbfce0c26e85889f7966af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10196-cwe-79-improper-neutralization-of-i-33344384</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10196%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sdebois%20Survey%20Anyplace&amp;severity=medium&amp;id=68db52aea473ffe031e447aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9946-cwe-352-cross-site-request-forgery-c-74d87bde</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9946%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lockerpress%20LockerPress%20%E2%80%93%20WordPress%20Security%20Plugin&amp;severity=medium&amp;id=68db52afa473ffe031e447fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8214-cwe-79-improper-neutralization-of-in-3ac62182</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8214%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addon&amp;severity=medium&amp;id=68db52afa473ffe031e447c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10128-cwe-80-improper-neutralization-of-s-4d6d1df6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10128%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20michaellow%20Eulerpool%20Research%20Systems&amp;severity=medium&amp;id=68db52aea473ffe031e44787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8608-cwe-79-improper-neutralization-of-in-d7f65226</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mihdan%20Maps%20from%20Yandex%20for%20Elementor&amp;severity=medium&amp;id=68db52afa473ffe031e447d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10189-cwe-79-improper-neutralization-of-i-4d01bed3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrwulf%20BP%20Direct%20Menus&amp;severity=medium&amp;id=68db52aea473ffe031e447a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9991-cwe-98-improper-control-of-filename--4dd3199d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9991%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20migli%20Tiny%20Bootstrap%20Elements%20Light&amp;severity=high&amp;id=68db52afa473ffe031e44804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10168-cwe-79-improper-neutralization-of-i-c7f07474</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10168%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mucasoft%20Any%20News%20Ticker&amp;severity=medium&amp;id=68db52aea473ffe031e44794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9948-cwe-352-cross-site-request-forgery-c-dc2ae7ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9948%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20paulq%20Chat%20by%20Chatwee&amp;severity=medium&amp;id=68db52afa473ffe031e447ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10182-cwe-79-improper-neutralization-of-i-c19b0b76</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10182%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20john-ackers%20dbview&amp;severity=medium&amp;id=68db52aea473ffe031e4479d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8559-cwe-22-improper-limitation-of-a-path-6baf11c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8559%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sanzeeb3%20All%20in%20One%20Music%20Player&amp;severity=medium&amp;id=68db52afa473ffe031e447c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8624-cwe-79-improper-neutralization-of-in-4d3d8ba1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdive%20Nexa%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=68db52afa473ffe031e447df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10191-cwe-79-improper-neutralization-of-i-d68d3517</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10191%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fusedsoftware%20Big%20Post%20Shipping%20for%20WooCommerce&amp;severity=medium&amp;id=68db52aea473ffe031e447a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8623-cwe-79-improper-neutralization-of-in-90a8aa04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bmoredrew%20WeedMaps%20Menu%20for%20WordPress&amp;severity=medium&amp;id=68db52afa473ffe031e447da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9762-cwe-78-improper-neutralization-of-sp-0eac9022</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9762%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20westi%20Post%20By%20Email&amp;severity=critical&amp;id=68db52afa473ffe031e447e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10131-cwe-79-improper-neutralization-of-i-1b83e6ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codiblog%20All%20Social%20Share%20Options&amp;severity=medium&amp;id=68db52aea473ffe031e44790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9993-cwe-98-improper-control-of-filename--fb9fb0b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9993%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20d3rd4v1d%20Bei%20Fen%20%E2%80%93%20WordPress%20Backup%20Plugin&amp;severity=high&amp;id=68db52afa473ffe031e44809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9852-cwe-79-improper-neutralization-of-in-3dcbf936</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20momostefan%20Yoga%20Schedule%20Momoyoga&amp;severity=medium&amp;id=68db52afa473ffe031e447eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8560-cwe-79-improper-neutralization-of-in-aedda588</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8560%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ghosttoast%20FancyTabs&amp;severity=medium&amp;id=68db52afa473ffe031e447cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10000-cwe-434-unrestricted-upload-of-file-5a1abb9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10000%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpchill%20Qyrr%20%E2%80%93%20simply%20and%20modern%20QR-Code%20creation&amp;severity=medium&amp;id=68db52aea473ffe031e44783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10130-cwe-79-improper-neutralization-of-i-268faf8c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10130%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stripeswp%20Layers&amp;severity=medium&amp;id=68db52aea473ffe031e4478b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8625-cwe-321-use-of-hard-coded-cryptograp-d75a4a6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8625%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20copypressdev%20Copypress%20Rest%20API&amp;severity=critical&amp;id=68db52afa473ffe031e447e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10179-cwe-79-improper-neutralization-of-i-ef5af4e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10179%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20myaskai%20My%20AskAI&amp;severity=medium&amp;id=68db52aea473ffe031e44799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8566-cwe-79-improper-neutralization-of-in-29e73242</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8566%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cssigniterteam%20GutenBee%20%E2%80%93%20Gutenberg%20Blocks&amp;severity=medium&amp;id=68db52afa473ffe031e447d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10991-vulnerability-in-tp-link-systems-in-36e93e7f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10991%3A%20Vulnerability%20in%20TP-Link%20Systems%20Inc.%20Tapo%20D230S1%20V1.20&amp;severity=high&amp;id=68db2174a473ffe031e293ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55017-na-2d94af28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55017%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3c3b66c7f7acdd3e9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-30-69b2755e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-30&amp;severity=medium&amp;id=68dc73165d588c52e5de5738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56301-na-1bede414</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56301%3A%20n%2Fa&amp;severity=high&amp;id=68dc71325d588c52e5de477c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56207-na-2f01eb3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56207%3A%20n%2Fa&amp;severity=medium&amp;id=68dc71325d588c52e5de4779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28016-na-b7f2d580</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28016%3A%20n%2Fa&amp;severity=medium&amp;id=68dc71325d588c52e5de4776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52049-na-1c414d1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52049%3A%20n%2Fa&amp;severity=medium&amp;id=68dc71325d588c52e5de4772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52050-na-8c9f0e81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52050%3A%20n%2Fa&amp;severity=medium&amp;id=68dc71325d588c52e5de476e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56392-na-fdecdbe5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56392%3A%20n%2Fa&amp;severity=high&amp;id=68dc71325d588c52e5de476a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61792-cwe-362-concurrent-execution-using--932ba9dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61792%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Quadient%20DS-700%20iQ&amp;severity=medium&amp;id=68dc71325d588c52e5de4764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56132-na-3f95ab0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56132%3A%20n%2Fa&amp;severity=high&amp;id=68dc27b1f4713a97a9e907e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56675-cwe-669-incorrect-resource-transfer-be8b10ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56675%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20EKEN%20video%20doorbell%20T6&amp;severity=low&amp;id=68dc1e4eda058bed8e684ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56200-na-4a9b4e34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56200%3A%20n%2Fa&amp;severity=medium&amp;id=68dc15a24cea8c94888a26c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56513-na-5db6394e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56513%3A%20n%2Fa&amp;severity=critical&amp;id=68dc1411c0dd278f0e2a225d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57254-na-3cc0588e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57254%3A%20n%2Fa&amp;severity=medium&amp;id=68dc11b7f7438576f4f7d413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56520-na-22d7b902</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56520%3A%20n%2Fa&amp;severity=medium&amp;id=68dc0f5ee5d0c285ebb3d67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55797-na-46b9357b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55797%3A%20n%2Fa&amp;severity=medium&amp;id=68dbfe6f055163c02d473839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56572-na-092c6565</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56572%3A%20n%2Fa&amp;severity=high&amp;id=68dbfb4a5fb4e84ba9305f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56571-na-017cf134</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56571%3A%20n%2Fa&amp;severity=high&amp;id=68dbfb4a5fb4e84ba9305f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56018-na-23549a94</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56018%3A%20n%2Fa&amp;severity=medium&amp;id=68dbfb4a5fb4e84ba9305f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56676-na-dc21ce36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56676%3A%20n%2Fa&amp;severity=medium&amp;id=68dbf9a6e965c789fc619918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52047-na-1595aca2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52047%3A%20n%2Fa&amp;severity=medium&amp;id=68dbe4577491dc7f348b7539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52043-na-3f3cf41a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52043%3A%20n%2Fa&amp;severity=medium&amp;id=68dbe4577491dc7f348b7535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59956-cwe-350-reliance-on-reverse-dns-res-f9801434</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59956%3A%20CWE-350%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20coder%20agentapi&amp;severity=medium&amp;id=68db2175a473ffe031e293b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58040-cwe-338-use-of-cryptographically-we-790f6a8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58040%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20QWER%20Crypt%3A%3ARandomEncryption&amp;severity=critical&amp;id=68e0f3c4b66c7f7acdd3ea29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59954-cwe-94-improper-control-of-generati-27061490</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59954%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20KnowageLabs%20Knowage-Server&amp;severity=critical&amp;id=68db1ba69eb02b06e7e4affc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59952-cwe-20-improper-input-validation-in-9329c983</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59952%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20minio%20minio-java&amp;severity=high&amp;id=68db1fa6a473ffe031e2788b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59942-cwe-190-integer-overflow-or-wraparo-771f0441</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59942%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20filecoin-project%20go-f3&amp;severity=high&amp;id=68db1fa6a473ffe031e2788f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59941-cwe-305-authentication-bypass-by-pr-0a380493</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59941%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20filecoin-project%20go-f3&amp;severity=medium&amp;id=68db1fa6a473ffe031e27892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43817-cwe-79-cross-site-scripting-in-life-67c71c7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43817%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68db1fa6a473ffe031e27899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36245-cwe-78-improper-neutralization-of-s-2f4b9195</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36245%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=68db1fa6a473ffe031e27896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59940-cwe-20-improper-input-validation-in-137fec12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59940%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20mondeja%20mkdocs-include-markdown-plugin&amp;severity=medium&amp;id=68db1fa6a473ffe031e278a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59937-cwe-88-improper-neutralization-of-a-1ee81b63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59937%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20wneessen%20go-mail&amp;severity=high&amp;id=68db1fa6a473ffe031e2789f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43813-cwe-22-path-traversal-in-liferay-po-8a0d335f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43813%3A%20CWE-22%3A%20Path%20Traversal%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68db1fa6a473ffe031e2789c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43812-cwe-79-cross-site-scripting-in-life-845ab6a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43812%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68db060a2f6a52bf6c323ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43811-cwe-79-cross-site-scripting-in-life-2b947dbb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43811%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68db1fa6a473ffe031e278ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59163-cwe-350-reliance-on-reverse-dns-res-eda85696</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59163%3A%20CWE-350%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20safedep%20vet&amp;severity=low&amp;id=68db1fa7a473ffe031e278bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43820-cwe-79-cross-site-scripting-in-life-e7b22d1b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43820%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68db1fa6a473ffe031e278ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iot-security-flounders-amid-churning-risk-aea1e7ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IoT%20Security%20Flounders%20Amid%20Churning%20Risk&amp;severity=medium&amp;id=68e469f26a45552f36e90771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43818-cwe-79-cross-site-scripting-in-life-3f5aafa7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43818%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68dafd8cdd654ac92628bc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43815-cwe-79-improper-neutralization-of-i-05eb1a47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68daf8e9d2edde9b66264019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky-malicious-mcp-server-exfiltrates-secrets-vi-3a7aab6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneaky%2C%20Malicious%20MCP%20Server%20Exfiltrates%20Secrets%20via%20BCC&amp;severity=medium&amp;id=68e469f26a45552f36e90774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30247-cwe-78-improper-neutralization-of-s-8d14c7d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30247%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Western%20Digital%20My%20Cloud&amp;severity=critical&amp;id=68daf69abe7b2c5b088d344b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-hits-sonicwall-vpns-in-broad-ransomware-camp-1493c41a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20Hits%20SonicWall%20VPNs%20in%20Broad%20Ransomware%20Campaign&amp;severity=medium&amp;id=68e469f26a45552f36e90777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34235-cwe-295-improper-certificate-valida-2148c2ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34235%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daf13ab7e37eb34163aac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34221-cwe-306-missing-authentication-for--539d89f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34221%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34215-cwe-306-missing-authentication-for--c767a88a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34215%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34224-cwe-306-missing-authentication-for--2f2232a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34224%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34220-cwe-306-missing-authentication-for--c83b34a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34220%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=medium&amp;id=68daefb54b0d68cddf56c5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34222-cwe-306-missing-authentication-for--ad8e9495</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34222%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34228-cwe-306-missing-authentication-for--63e78a5b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34228%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb54b0d68cddf56c60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34229-cwe-306-missing-authentication-for--89572015</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34229%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=medium&amp;id=68daefb54b0d68cddf56c612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34230-cwe-306-missing-authentication-for--e854b9f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34230%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=medium&amp;id=68daefb64b0d68cddf56c618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34231-cwe-306-missing-authentication-for--4f0a96e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34231%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb64b0d68cddf56c61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34225-cwe-306-missing-authentication-for--de20619d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34225%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb54b0d68cddf56c5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34216-cwe-306-missing-authentication-for--d6296ff6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34216%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34233-cwe693-protection-mechanism-failure-e95c1a92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34233%3A%20CWE%E2%80%91693%20Protection%20Mechanism%20Failure%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb64b0d68cddf56c624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34207-cwe-522-insufficiently-protected-cr-58f550ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34207%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb54b0d68cddf56c5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34223-cwe-798-use-of-hard-coded-credentia-d0c2d74e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34223%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34212-cwe-494-download-of-code-without-in-4c092265</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34212%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb54b0d68cddf56c5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34211-cwe-321-use-of-hard-coded-cryptogra-ecd64c85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34211%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daee27ec38439ac41e3a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34209-cwe-798-use-of-hard-coded-credentia-10399203</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34209%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daee27ec38439ac41e3a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34234-cwe-321-use-of-hardcoded-cryptograp-0c3adfe8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34234%3A%20CWE-321%20Use%20of%20Hard%E2%80%91coded%20Cryptographic%20Key%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daee27ec38439ac41e3a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34218-cwe-306-missing-authentication-for--326498fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34218%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daee27ec38439ac41e3a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34232-cwe-306-missing-authentication-for--86fe99f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34232%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=medium&amp;id=68daee27ec38439ac41e3a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-single-vulnerability-cve-2025-43400--335fc6cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400%2C%20(Mon%2C%20Sep%2029th)&amp;severity=medium&amp;id=68e46e546a45552f36e96980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45376-cwe-280-improper-handling-of-insuff-9d366c91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45376%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Dell%20Dell%20Repository%20Manager%20(DRM)&amp;severity=high&amp;id=68daea3ff2d6b484e3e84629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35034-cwe-79-improper-neutralization-of-i-ce5d218e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=medium&amp;id=68dae7e1c05da5c004a42960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35033-cwe-1236-improper-neutralization-of-902a83a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35033%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=medium&amp;id=68dae7e1c05da5c004a4295c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35032-cwe-434-unrestricted-upload-of-file-483dcfd9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35032%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=low&amp;id=68dae7e1c05da5c004a42958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35031-cwe-1295-debug-messages-revealing-u-7c02a092</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35031%3A%20CWE-1295%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=low&amp;id=68dae7e1c05da5c004a42954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35030-cwe-352-cross-site-request-forgery--c5f6b83e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35030%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=high&amp;id=68dae7e1c05da5c004a42950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34196-cwe-798-use-of-hard-coded-credentia-a33832ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34196%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68dada9fcf5ae426d225ee00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41252-cwe-203-observable-discrepancy-in-v-f1b2af09</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41252%3A%20CWE-203%20Observable%20Discrepancy%20in%20VMware%20NSX&amp;severity=high&amp;id=68dad84b14cf74c068426806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evilai-malware-masquerades-as-ai-tools-to-infiltra-6e4e5028</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EvilAI%20Malware%20Masquerades%20as%20AI%20Tools%20to%20Infiltrate%20Global%20Organizations&amp;severity=high&amp;id=68dad6bc78957a325c13e777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41251-cwe-640-weak-password-recovery-mech-b38c8df4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41251%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20vmware%20NSX&amp;severity=high&amp;id=68dad52838edf801b1798cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57871-cwe-79-improper-neutralization-of-i-d45252a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57871%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57872-cwe-601-url-redirection-to-untruste-74fa94d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57872%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57873-cwe-79-improper-neutralization-of-i-c3abf33c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57874-cwe-79-improper-neutralization-of-i-cff21167</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57875-cwe-79-improper-neutralization-of-i-9a0ff3e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57877-cwe-79-improper-neutralization-of-i-585dd008</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57878-cwe-601-url-redirection-to-untruste-2162ef01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57878%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57879-cwe-601-url-redirection-to-untruste-e7210be7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57879%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57876-cwe-79-improper-neutralization-of-i-f11581c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36099-cwe-770-allocation-of-resources-wit-5bdd8efe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36099%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=68dacfb938e990277d40876a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43400-processing-a-maliciously-crafted-fo-5fc2a3c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43400%3A%20Processing%20a%20maliciously%20crafted%20font%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68dacc9fcb1797236e60a255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41250-cwe-77-improper-neutralization-of-s-9cbd3dc3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41250%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20VMware%20vCenter&amp;severity=high&amp;id=68dac9871df083c7d5c131a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7104-cwe-915-improperly-controlled-modifi-6e9823c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7104%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68dabdf79d147c79351e02c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41245-cwe-1188-in-vmware-vmware-aria-oper-d83d8797</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41245%3A%20CWE-1188%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=medium&amp;id=68dab3b8bdc05a1fb23fae3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41244-cwe-267-in-vmware-vcf-operations-3ac057d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41244%3A%20CWE-267%20in%20VMware%20VCF%20operations&amp;severity=high&amp;id=68dab14e2d87401d280dfda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41246-cwe-863-incorrect-authorization-in--10a3af74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41246%3A%20CWE-863%20Incorrect%20Authorization%20in%20VMware%20Tools&amp;severity=high&amp;id=68daad45a142b006e54fd378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harrods-data-breach-430000-customer-records-stolen-e324a330</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harrods%20Data%20Breach%3A%20430%2C000%20Customer%20Records%20Stolen%20Via%20Third-Party%20Attack&amp;severity=high&amp;id=68daa6c150257826091366dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11155-cwe-261-weak-encoding-for-password--f7cc7b10</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11155%3A%20CWE-261%3A%20Weak%20Encoding%20for%20Password%20in%20SATO%20S86-ex%20203dpi&amp;severity=medium&amp;id=68daa6ce502578260913672f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-cops-spoofed-in-fileless-phishing-attack-a87d028b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Cops%20Spoofed%20in%20Fileless%20Phishing%20Attacks%20on%20Kyiv&amp;severity=medium&amp;id=68e469f26a45552f36e9077a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36351-cwe-284-authentication-bypass-using-b2dd4883</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36351%3A%20CWE-284%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20IBM%20License%20Metric%20Tool&amp;severity=medium&amp;id=68da982a15f3c5a417dc16a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36352-cwe-79-improper-neutralization-of-i-37912c47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20License%20Metric%20Tool&amp;severity=medium&amp;id=68da982a15f3c5a417dc16ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13150-cwe-89-improper-neutralization-of-s-d4d5db37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13150%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Fayton%20Software%20and%20Consulting%20Services%20fayton.pro%20ERP&amp;severity=critical&amp;id=68e0f3c7b66c7f7acdd3eac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/29th-september-threat-intelligence-report-80b90de6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=29th%20September%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-set-up-anti-phishing-security-in-kaspersky--924f71cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20set%20up%20anti-phishing%20security%20in%20Kaspersky%20for%20Android%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e95753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkcloud-infostealer-relaunched-to-grab-credentia-6fffce17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkCloud%20Infostealer%20Relaunched%20to%20Grab%20Credentials%2C%20Crypto%20and%20Contacts&amp;severity=medium&amp;id=68da74d4045c927b2522a4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8868-cwe-200-exposure-of-sensitive-inform-0f357c73</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8868%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Progress%20Software%20Chef%20Automate&amp;severity=critical&amp;id=68db1fa7a473ffe031e278d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6724-cwe-89-improper-neutralization-of-sp-ad237627</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6724%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Progress%20Software%20Chef%20Automate&amp;severity=high&amp;id=68db1fa7a473ffe031e278d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11150-d9871bde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11150&amp;severity=null&amp;id=68dacfb938e990277d40876d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harrods-reveals-supply-chain-breach-impacting-onli-3f7288bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harrods%20Reveals%20Supply%20Chain%20Breach%20Impacting%20Online%20Customers&amp;severity=high&amp;id=68da58af1c73c30fea0e5390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lockbit-50-targets-windows-linux-esxi-eb7e8886</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20LockBit%205.0%20Targets%20Windows%2C%20Linux%2C%20ESXi&amp;severity=medium&amp;id=68da46bb648a8168815818d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-rat-delivered-via-shellcode-multi-stage-atta-183f899c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%20RAT%20Delivered%20via%20Shellcode%3A%20Multi-Stage%20Attack%20Analysis&amp;severity=medium&amp;id=68da46bb648a8168815818d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/olymp-loader-a-new-malware-as-a-service-written-in-011178e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Olymp%20Loader%3A%20A%20new%20Malware-as-a-Service%20written%20in%20Assembly&amp;severity=medium&amp;id=68da477f0d493c953e7cd671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/potentially-unwanted-applications-puas-weaponized--761c1879</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Potentially%20Unwanted%20Applications%20(PUAs)%20weaponized%20for%20covert%20delivery&amp;severity=medium&amp;id=68da4863b34724c7e2fd7fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48006-improper-restriction-of-xml-externa-781f81cb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48006%3A%20Improper%20restriction%20of%20XML%20external%20entity%20reference%20in%20Saison%20Technology%20Co.%2CLtd.%20DataSpider%20Servista&amp;severity=high&amp;id=68db1fa7a473ffe031e278dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5200-cwe-79-cross-site-scripting-xss-in-p-6c7267eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5200%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Postie&amp;severity=medium&amp;id=68e0f3c5b66c7f7acdd3ea51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11141-os-command-injection-in-ruijie-nbr2-e2b48963</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11141%3A%20OS%20Command%20Injection%20in%20Ruijie%20NBR2100G-E&amp;severity=medium&amp;id=68db1fa7a473ffe031e278d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10504-cwe-122-heap-based-buffer-overflow--d8b81984</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10504%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20ABB%20Terra%20AC%20wallbox&amp;severity=medium&amp;id=68db1fa7a473ffe031e278ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11140-xml-external-entity-reference-in-bj-941233de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11140%3A%20XML%20External%20Entity%20Reference%20in%20Bjskzy%20Zhiyou%20ERP&amp;severity=medium&amp;id=68da07a4c27c13ff57ca8165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11139-path-traversal-in-bjskzy-zhiyou-erp-099b0216</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11139%3A%20Path%20Traversal%20in%20Bjskzy%20Zhiyou%20ERP&amp;severity=medium&amp;id=68da015a49cfd472f5831785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11138-os-command-injection-in-mirweiye-we-ae51d2ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11138%3A%20OS%20Command%20Injection%20in%20mirweiye%20wenkucms&amp;severity=medium&amp;id=68d9fa5349cfd472f58152b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11137-cross-site-scripting-in-gstarsoft-g-bee9c657</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11137%3A%20Cross%20Site%20Scripting%20in%20Gstarsoft%20GstarCAD&amp;severity=medium&amp;id=68da7c77bcc355985f2b5cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11136-unrestricted-upload-in-yifang-cms-903838a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11136%3A%20Unrestricted%20Upload%20in%20YiFang%20CMS&amp;severity=medium&amp;id=68d9ec4249cfd472f58041f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11135-deserialization-in-pmticket-project-43adaa4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11135%3A%20Deserialization%20in%20pmTicket%20Project-Management-Software&amp;severity=medium&amp;id=68d9e53a49cfd472f58008d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11134-cross-site-scripting-in-cudy-tr1200-b8433be9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11134%3A%20Cross%20Site%20Scripting%20in%20Cudy%20TR1200&amp;severity=medium&amp;id=68d9de3249cfd472f57c87fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-breaching-mfa-protected-sonicwall-191be991</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20ransomware%20breaching%20MFA-protected%20SonicWall%20VPN%20accounts&amp;severity=high&amp;id=68d9dab449cfd472f57c71df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7698-cwe-125-out-of-bounds-read-in-canon--0f18c6f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7698%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canon%20Inc.%20Generic%20Plus%20PCL6%20Printer%20Driver&amp;severity=medium&amp;id=68d9de3249cfd472f57c8802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9904-cwe-696-incorrect-behavior-order-in--60ce4fe3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9904%3A%20CWE-696%3A%20Incorrect%20Behavior%20Order%20in%20Canon%20Inc.%20Generic%20Plus%20PCL6%20Printer%20Driver&amp;severity=medium&amp;id=68d9de3249cfd472f57c880e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9903-cwe-787-out-of-bounds-write-in-canon-0aeda4f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9903%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Generic%20Plus%20PCL6%20Printer%20Driver&amp;severity=medium&amp;id=68d9de3249cfd472f57c8808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fullhunt-open-source-39408-exploits-from-0daytoday-86bb2512</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FullHunt%20%F0%9F%92%9C%20Open-Source%3A%2039%2C408%20Exploits%20from%200day.today%20is%20Back%20Online&amp;severity=medium&amp;id=68d9d72b49cfd472f579b057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11130-missing-authentication-in-ihongren--7a1af66f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11130%3A%20Missing%20Authentication%20in%20iHongRen%20pptp-vpn&amp;severity=high&amp;id=68d9d72a49cfd472f579b032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-claims-comcast-data-breach-deman-032da118</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Claims%20Comcast%20Data%20Breach%2C%20Demands%20%241.2M&amp;severity=high&amp;id=68d9d02149cfd472f57959b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11126-hard-coded-credentials-in-apeman-id-f63a45b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11126%3A%20Hard-coded%20Credentials%20in%20Apeman%20ID71&amp;severity=critical&amp;id=68d9ce3549cfd472f5795016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57412-na-30e1e559</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57412%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3c5b66c7f7acdd3ea5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-29-ff5cdc5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-29&amp;severity=medium&amp;id=68db216ea473ffe031e28fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56449-na-d76f3a8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56449%3A%20n%2Fa&amp;severity=high&amp;id=68db1fa7a473ffe031e278c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55795-na-281fea35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55795%3A%20n%2Fa&amp;severity=low&amp;id=68db1fa7a473ffe031e278c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57266-na-2ae5c7df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57266%3A%20n%2Fa&amp;severity=critical&amp;id=68daea3ff2d6b484e3e8462c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56764-na-d693a9a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56764%3A%20n%2Fa&amp;severity=medium&amp;id=68dae7e1c05da5c004a42964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57424-na-f2a4b8a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57424%3A%20n%2Fa&amp;severity=high&amp;id=68dad52838edf801b1798cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56807-na-5fc5426d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56807%3A%20n%2Fa&amp;severity=medium&amp;id=68dacc9fcb1797236e60a25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57197-na-6cafbfa3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57197%3A%20n%2Fa&amp;severity=medium&amp;id=68dac2946c49d694f9bd907c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57483-na-922d1ff8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57483%3A%20n%2Fa&amp;severity=high&amp;id=68dac04ba61193cb1a8a2190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56233-na-be9e1278</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56233%3A%20n%2Fa&amp;severity=high&amp;id=68dabdf79d147c79351e02be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61659-cwe-377-insecure-temporary-file-in--27b4b04f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61659%3A%20CWE-377%20Insecure%20Temporary%20File%20in%20magicmonty%20bash-git-prompt&amp;severity=medium&amp;id=68dab94e936545403921621c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56234-na-4d70ea38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56234%3A%20n%2Fa&amp;severity=high&amp;id=68dab94e9365454039216219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51495-na-bb722e1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51495%3A%20n%2Fa&amp;severity=high&amp;id=68dab94e9365454039216213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56795-na-9113b2b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56795%3A%20n%2Fa&amp;severity=critical&amp;id=68dab55602c0cee7baf61d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57516-na-4c4e4bbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57516%3A%20n%2Fa&amp;severity=high&amp;id=68da982a15f3c5a417dc16af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57428-na-02d90bda</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57428%3A%20n%2Fa&amp;severity=medium&amp;id=68da92e05fb35d5f62948633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11125-cross-site-scripting-in-langleyfcu--2fb8e622</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11125%3A%20Cross%20Site%20Scripting%20in%20langleyfcu%20Online%20Banking%20System&amp;severity=medium&amp;id=68d9c6ee9caa8e428e29d0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11124-cross-site-scripting-in-code-projec-080d8550</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11124%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Project%20Monitoring%20System&amp;severity=medium&amp;id=68d9ce3549cfd472f579501b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11123-stack-based-buffer-overflow-in-tend-bfb6aa0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11123%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68d9b83dc6b35b90c30a3ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11122-stack-based-buffer-overflow-in-tend-e5991574</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11122%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68d9ce3549cfd472f5795023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11121-command-injection-in-tenda-ac18-9f75865b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11121%3A%20Command%20Injection%20in%20Tenda%20AC18&amp;severity=medium&amp;id=68d9ce3549cfd472f579502c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11120-buffer-overflow-in-tenda-ac8-ef461ad3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11120%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=68d9a4895caf7730a660807d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11119-cross-site-scripting-in-itsourcecod-ca52e230</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11119%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d99d3728a6443cd4970ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11118-sql-injection-in-codeastro-student--84fc41e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11118%3A%20SQL%20Injection%20in%20CodeAstro%20Student%20Grading%20System&amp;severity=medium&amp;id=68d99688b966a587752dbb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11117-buffer-overflow-in-tenda-ch22-656c13b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11117%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68d98ed7da6b87fcc8fca724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11116-sql-injection-in-code-projects-simp-86b1983f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11116%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d987277554179dcb262790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11115-sql-injection-in-code-projects-simp-9f89161c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11115%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d980386591aad183f07cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11114-sql-injection-in-codeastro-online-l-c7a90cfd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11114%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Leave%20Application&amp;severity=medium&amp;id=68d97af8bc6a13509115fa70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11113-sql-injection-in-codeastro-online-l-fab0feca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11113%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Leave%20Application&amp;severity=medium&amp;id=68d974c36031a9358c959a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11112-cross-site-scripting-in-phpgurukul--62546f07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11112%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=68d96bd7c3ae9676b3cf41db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11111-sql-injection-in-campcodes-advanced-588f75ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11111%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20Management%20System&amp;severity=medium&amp;id=68d963e6b675644cb601a668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-heap-exploitation-from-heap-overflow-to-ar-d03dbb8d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Heap%20Exploitation%20-%20From%20Heap%20Overflow%20to%20Arbitrary%20R%2FW&amp;severity=medium&amp;id=68d96068f7c9c199916979d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11110-sql-injection-in-campcodes-online-l-5cf8ead5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11110%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d95cdf6dd299fc3f4ba59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11109-sql-injection-in-campcodes-computer-931cfc0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11109%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d956c29cc34a5a08126f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11108-sql-injection-in-code-projects-simp-3682cd60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11108%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d94fcc6b0e9d0a52738750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11107-sql-injection-in-code-projects-simp-c3868019</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11107%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d947dcbb80f31703d9c519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11106-sql-injection-in-code-projects-simp-a7773894</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11106%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d9ce3549cfd472f5795033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11105-sql-injection-in-code-projects-simp-662adf34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11105%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d9349fb9360513218c4c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11104-sql-injection-in-codeastro-electric-94410927</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11104%3A%20SQL%20Injection%20in%20CodeAstro%20Electricity%20Billing%20System&amp;severity=medium&amp;id=68d92e77b92a55b72f034d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11103-unrestricted-upload-in-projectworld-b12215d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11103%3A%20Unrestricted%20Upload%20in%20Projectworlds%20Online%20Tours%20and%20Travels&amp;severity=medium&amp;id=68d917a2208e12cbe8df394b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11102-sql-injection-in-campcodes-online-l-64838289</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11102%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d9ce3549cfd472f579503a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11101-sql-injection-in-itsourcecode-open--c3e9f676</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11101%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d8df2fafce9a583e23ef78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11100-command-injection-in-d-link-dir-823-0f6cff66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11100%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d8d83686bcdf1cdb8b76d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11099-command-injection-in-d-link-dir-823-04193eea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11099%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d9ce3549cfd472f5795041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11098-command-injection-in-d-link-dir-823-8e422ff9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11098%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d8c9ef53264fd77f15183e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11097-command-injection-in-d-link-dir-823-e0b01262</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11097%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d9ce3549cfd472f5795048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11096-command-injection-in-d-link-dir-823-2f3b477b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11096%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d8bbbb94f095cc8d909001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11095-command-injection-in-d-link-dir-823-4d5a4dc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11095%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d9ce3549cfd472f579504f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11094-sql-injection-in-code-projects-e-co-0fedd1eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11094%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68d8affe5d6228f86de0bf3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11092-command-injection-in-d-link-dir-823-805ad611</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11092%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d89e6a5d6228f86ddfa4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11091-buffer-overflow-in-tenda-ac21-c636529d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11091%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=68d897635d6228f86ddf2d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11090-sql-injection-in-itsourcecode-open--aeda70df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11090%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d88cdc5d6228f86dddbb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11089-sql-injection-in-kidaze-courseselec-bda05ad1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11089%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68d87ec65d6228f86ddcb334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-28-1aab1102</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-28&amp;severity=medium&amp;id=68d9d01e49cfd472f57956c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11088-sql-injection-in-itsourcecode-open--4c98ba51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11088%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d87cd15d6228f86ddc9223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-microsoft-teams-installers-push-oyster-malwar-85aa3587</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Microsoft%20Teams%20installers%20push%20Oyster%20malware%20via%20malvertising&amp;severity=high&amp;id=68d870a66f70b44ea5888203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ohios-union-county-suffers-ransomware-attack-impac-4f7e5051</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ohio%E2%80%99s%20Union%20County%20suffers%20ransomware%20attack%20impacting%2045%2C000%20people&amp;severity=medium&amp;id=68d870a66f70b44ea588820b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11083-heap-based-buffer-overflow-in-gnu-b-42f4d072</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11083%3A%20Heap-based%20Buffer%20Overflow%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68d87cd15d6228f86ddc922a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11082-heap-based-buffer-overflow-in-gnu-b-7426b7a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11082%3A%20Heap-based%20Buffer%20Overflow%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68d87cd15d6228f86ddc9234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11081-out-of-bounds-read-in-gnu-binutils-627730ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11081%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68d87cd15d6228f86ddc923e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11080-improper-authorization-in-zhuimengs-aff4ab90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11080%3A%20Improper%20Authorization%20in%20zhuimengshaonian%20wisdom-education&amp;severity=medium&amp;id=68d859aee2b9752dec525354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11079-file-and-directory-information-expo-38273c26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11079%3A%20File%20and%20Directory%20Information%20Exposure%20in%20Campcodes%20Farm%20Management%20System&amp;severity=medium&amp;id=68d85295d7f9d9c7bcfa2bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11078-unrestricted-upload-in-itsourcecode-d7e9c1c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11078%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d84aa323f504e55a7e3fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-is-the-first-time-ive-ever-found-chicken-in-a-e261a1bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20is%20the%20first%20time%20I&apos;ve%20ever%20found%20chicken%20in%20a%20public%20(storage)%20bucket.%20You&apos;re%20not%20ready%20for%20this%20masterpiece.&amp;severity=medium&amp;id=68d84720d7b3efc405b777f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11077-sql-injection-in-campcodes-online-l-cb3ee6f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11077%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d8447f1c0197ce5ba4800d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11076-sql-injection-in-campcodes-online-l-cb3100f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11076%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d83c846f1be24301d853c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11075-sql-injection-in-campcodes-online-l-2a2b4221</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11075%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d8358076282b26dbbfa827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11074-sql-injection-in-code-projects-proj-912fdd95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11074%3A%20SQL%20Injection%20in%20code-projects%20Project%20Monitoring%20System&amp;severity=medium&amp;id=68d82f89a61d1e3e38808fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11073-command-injection-in-keyfactor-rg-e-4fb12537</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11073%3A%20Command%20Injection%20in%20Keyfactor%20RG-EW5100BE&amp;severity=medium&amp;id=68d8272cc4b8961499c6ea7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11071-sql-injection-in-seacms-b5fc3e56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11071%3A%20SQL%20Injection%20in%20SeaCMS&amp;severity=medium&amp;id=68d8206c8710982e4c769eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11070-sql-injection-in-projectworlds-onli-496b3ecb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11070%3A%20SQL%20Injection%20in%20Projectworlds%20Online%20Shopping%20System&amp;severity=medium&amp;id=68d819c0f98d3a6506964431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7647-cwe-378-creation-of-temporary-file-w-f720b2ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7647%3A%20CWE-378%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68d813d8c38eb2a1b8713fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11069-cross-site-scripting-in-westboy-cic-a02d6d57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11069%3A%20Cross%20Site%20Scripting%20in%20westboy%20CicadasCMS&amp;severity=medium&amp;id=68d813d8c38eb2a1b8713fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11068-cross-site-scripting-in-westboy-cic-2fa6e061</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11068%3A%20Cross%20Site%20Scripting%20in%20westboy%20CicadasCMS&amp;severity=medium&amp;id=68d80d1139084229f5337fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11067-cross-site-scripting-in-projectworl-b7716501</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11067%3A%20Cross%20Site%20Scripting%20in%20Projectworlds%20Visitor%20Management%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc9248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11066-sql-injection-in-code-projects-onli-73ef41c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11066%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc924e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11064-sql-injection-in-campcodes-online-l-6c7887e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11064%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc9255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11063-sql-injection-in-campcodes-online-l-e61de700</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11063%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc925c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11062-sql-injection-in-campcodes-online-l-93123059</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11062%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc9263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11061-sql-injection-in-campcodes-online-l-0c77c4b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11061%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d7dbd632b1dc6cfc30c795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11057-sql-injection-in-sourcecodester-pet-7ac00071</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11057%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d7d47bbffa51b9449a73f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-fake-invoices-to-spread-xworm-rat-via--7a440033</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20Fake%20Invoices%20to%20Spread%20XWorm%20RAT%20via%20Malicious%20Office%20Files&amp;severity=medium&amp;id=68d7c4412707e1ddffe13046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11056-sql-injection-in-projectsandprogram-cbef061d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11056%3A%20SQL%20Injection%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc926a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11055-sql-injection-in-sourcecodester-onl-adad1299</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11055%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68d87cd25d6228f86ddc927a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11054-sql-injection-in-itsourcecode-open--80a94359</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11054%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d7afe81660833d5ee9e775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11053-sql-injection-in-phpgurukul-small-c-2ad23b69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11053%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=68d87cd25d6228f86ddc9281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11052-sql-injection-in-kidaze-courseselec-671221c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11052%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68d87cd25d6228f86ddc9288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9893-cwe-352-cross-site-request-forgery-c-b342faf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9893%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20milankyada%20VM%20Menu%20Reorder%20plugin&amp;severity=medium&amp;id=68d87cd25d6228f86ddc928e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9944-cwe-352-cross-site-request-forgery-c-79ce0dc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9944%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kelderic%20Professional%20Contact%20Form&amp;severity=medium&amp;id=68d87cd25d6228f86ddc92a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9898-cwe-352-cross-site-request-forgery-c-334e9965</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9898%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20compojoom%20cForms%20%E2%80%93%20Light%20speed%20fast%20Form%20Builder&amp;severity=medium&amp;id=68d87cd25d6228f86ddc929a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9899-cwe-352-cross-site-request-forgery-c-e7a07574</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9899%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20trustreviews%20Trust%20Reviews%20plugin%20for%20Google%2C%20Tripadvisor%2C%20Yelp%2C%20Airbnb%20and%20other%20platforms&amp;severity=medium&amp;id=68d87cd25d6228f86ddc929e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9894-cwe-352-cross-site-request-forgery-c-a287d3eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9894%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cristianr909090%20Sync%20Feedly&amp;severity=medium&amp;id=68d87cd25d6228f86ddc9292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9896-cwe-352-cross-site-request-forgery-c-3479a7ee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9896%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20funnnny%20HidePost&amp;severity=medium&amp;id=68d87cd25d6228f86ddc9296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11051-cross-site-request-forgery-in-sourc-9d66c2c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11051%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d87cd25d6228f86ddc92a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3193-prototype-pollution-in-algoliasearch-097901a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3193%3A%20Prototype%20Pollution%20in%20algoliasearch-helper&amp;severity=high&amp;id=68d87cd25d6228f86ddc92bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10954-improper-validation-of-syntactic-co-b857a05f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10954%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20github.com%2Fnyaruka%2Fphonenumbers&amp;severity=medium&amp;id=68d87cd25d6228f86ddc92b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11050-improper-authorization-in-portabili-53d3d092</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11050%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d7695569faf04b7c596afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9816-cwe-79-improper-neutralization-of-in-06ff98c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9816%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=high&amp;id=68d7695569faf04b7c596b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11049-improper-authorization-in-portabili-65068ccf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11049%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d87cd25d6228f86ddc92c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10498-cwe-352-cross-site-request-forgery--a14528c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10498%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=68d7508979aa5c9d0857d8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10499-cwe-352-cross-site-request-forgery--558eb0ed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10499%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=68d7508979aa5c9d0857d8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8440-cwe-79-improper-neutralization-of-in-9a027d46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spwebguy%20Team%20Members&amp;severity=medium&amp;id=68d7427979aa5c9d0857538f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36239-cwe-79-improper-neutralization-of-i-4d1c312b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Storage%20TS4500%20Library&amp;severity=medium&amp;id=68d7427979aa5c9d0857538c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43192-cwe-352-cross-site-request-forgery--06b066ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43192%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Storage%20TS4500%20Library&amp;severity=medium&amp;id=68e0f3c7b66c7f7acdd3eac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59945-cwe-266-incorrect-privilege-assignm-d3d73cef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59945%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Syslifters%20sysreptor&amp;severity=high&amp;id=68d73b6c79aa5c9d08560839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59932-cwe-284-improper-access-control-in--0c8bf7d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59932%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=68d73b6c79aa5c9d08560836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59939-cwe-89-improper-neutralization-of-s-b3c5ee7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59939%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68d7346479aa5c9d08557688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59936-cwe-116-improper-encoding-or-escapi-96a52517</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59936%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20nearform%20get-jwks&amp;severity=critical&amp;id=68d7346479aa5c9d08557684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36144-cwe-532-insertion-of-sensitive-info-beb84e94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36144%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20watsonx.data&amp;severity=low&amp;id=68d730e279aa5c9d085546ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-27-147e99a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-27&amp;severity=medium&amp;id=68d87ebe5d6228f86ddcb0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59845-cwe-346-origin-validation-error-in--4acce862</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59845%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20apollographql%20embeddable-explorer&amp;severity=high&amp;id=68d7171e261b76bde8012a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11048-improper-authorization-in-portabili-a00699f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11048%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d72b6079aa5c9d0854f439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11047-improper-authorization-in-portabili-ae9dc414</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11047%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d72b6079aa5c9d0854f432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10657-cwe-269-improper-privilege-manageme-68c902ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10657%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Docker%20Docker%20Desktop&amp;severity=high&amp;id=68d7025dbc7d242638d7c86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11046-server-side-request-forgery-in-tenc-ccadf180</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11046%3A%20Server-Side%20Request%20Forgery%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=68d6fff0e67893b049ed5375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11045-command-injection-in-wayos-lq04-d8b9cc18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11045%3A%20Command%20Injection%20in%20WAYOS%20LQ_04&amp;severity=medium&amp;id=68d6fa2b4787b50b9b4329bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/svg-phishing-hits-ukraine-with-amatera-stealer-pur-3846f778</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SVG%20Phishing%20hits%20Ukraine%20with%20Amatera%20Stealer%2C%20PureMiner&amp;severity=medium&amp;id=68da4fcd5fbdde62c760164d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11041-sql-injection-in-itsourcecode-open--69b3e9ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11041%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d6f394e3653e42a7283e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11040-sql-injection-in-code-projects-host-f8986289</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11040%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d6f394e3653e42a7283e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volvo-employee-ssns-stolen-in-supplier-ransomware--a9b9271b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Volvo%20Employee%20SSNs%20Stolen%20in%20Supplier%20Ransomware%20Attack&amp;severity=medium&amp;id=68e469f26a45552f36e9077d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11039-sql-injection-in-campcodes-computer-2fc9c800</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11039%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d6ec209a0af5971e60e6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11038-sql-injection-in-itsourcecode-onlin-5c4e17d1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11038%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Clinic%20Management%20System&amp;severity=medium&amp;id=68d6ec209a0af5971e60e6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11037-sql-injection-in-code-projects-e-co-6a7deace</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11037%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68d6e4be631c4dd17dc9d93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11036-sql-injection-in-code-projects-e-co-4e05a114</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11036%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68d6e4be631c4dd17dc9d933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-phantom-extension-backdooring-chrome-through-u-70706bcd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Phantom%20Extension%3A%20Backdooring%20chrome%20through%20uncharted%20pathways&amp;severity=medium&amp;id=68d6de65d0242cefa1be0449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11035-xml-external-entity-reference-in-ji-9b652726</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11035%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68d6de61d0242cefa1be041b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11034-path-traversal-in-dibo-data-decisio-fbf04357</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11034%3A%20Path%20Traversal%20in%20Dibo%20Data%20Decision%20Making%20System&amp;severity=medium&amp;id=68d6de62d0242cefa1be0421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11033-sql-injection-in-kidaze-courseselec-22c6a926</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11033%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68d6d5a7721a41f476d92a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-scammers-have-mastered-ai-deepfakes-fake-websi-f736c34b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20scammers%20have%20mastered%20AI%3A%20deepfakes%2C%20fake%20websites%2C%20and%20phishing%20emails%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e95756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11032-sql-injection-in-kidaze-courseselec-02b5df58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11032%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68d6d342dc133514c6449453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11031-path-traversal-in-datatables-07b8aed0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11031%3A%20Path%20Traversal%20in%20DataTables&amp;severity=medium&amp;id=68d6d342dc133514c644944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11030-improper-authorization-in-tutorials-e1145a93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11030%3A%20Improper%20Authorization%20in%20Tutorials-Website%20Employee%20Management%20System&amp;severity=medium&amp;id=68d6d342dc133514c6449444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11029-cross-site-request-forgery-in-givan-cdae3829</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11029%3A%20Cross-Site%20Request%20Forgery%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68d6c082ef60383855e1ad2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59844-cwe-78-improper-neutralization-of-s-abdec85f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59844%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SonarSource%20sonarqube-scan-action&amp;severity=high&amp;id=68d6c082ef60383855e1ad37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-ads-used-to-spread-trojan-disguised-as-trad-9de98198</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Ads%20Used%20to%20Spread%20Trojan%20Disguised%20as%20TradingView%20Premium&amp;severity=medium&amp;id=68d6bd68c8285d06b1f8bae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59843-cwe-359-exposure-of-private-persona-921b093f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59843%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlagForgeCTF%20flagForge&amp;severity=medium&amp;id=68d6bb0017bcb728eab3155b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11028-information-disclosure-in-givanz-vv-3d2e9507</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11028%3A%20Information%20Disclosure%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68d6bb0017bcb728eab31555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11027-cross-site-scripting-in-givanz-vvve-5c660244</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11027%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68d6bb0017bcb728eab3154f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-state-hackers-use-sslcom-certificates-to-s-14919e67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20State%20Hackers%20Use%20SSL.com%20Certificates%20to%20Sign%20Malware&amp;severity=medium&amp;id=68e469f26a45552f36e9078a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11026-information-disclosure-in-givanz-vv-ef3455cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11026%3A%20Information%20Disclosure%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68d6ac1736ec037b02fcaae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11019-cross-site-scripting-in-totaljs-cms-50d04156</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11019%3A%20Cross%20Site%20Scripting%20in%20Total.js%20CMS&amp;severity=medium&amp;id=68d6a5c85686aca512dbede9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36326-cwe-321-use-of-hard-coded-cryptogra-ace23ee7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36326%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20IBM%20Cognos%20Controller&amp;severity=low&amp;id=68d72b6179aa5c9d0854f47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36274-cwe-319-cleartext-transmission-of-s-df4301d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36274%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Aspera%20HTTP%20Gateway&amp;severity=high&amp;id=68d6a11b70abc604262e788c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6396-cwe-79-improper-neutralization-of-in-3d2f1aab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Webbeyaz%20Website%20Design%20Website%20Software&amp;severity=medium&amp;id=68d6a11b70abc604262e7893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11018-path-traversal-in-four-faith-water--d433d9e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11018%3A%20Path%20Traversal%20in%20Four-Faith%20Water%20Conservancy%20Informatization%20Platform&amp;severity=medium&amp;id=68d69ecbfe14716afd8d9b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11017-null-pointer-dereference-in-ogrecav-808c4366</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11017%3A%20NULL%20Pointer%20Dereference%20in%20OGRECave%20Ogre&amp;severity=medium&amp;id=68d69ecbfe14716afd8d9b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iocs-for-phishing-campaign-using-bitm-pages-e885506f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IOCs%20for%20phishing%20campaign%20using%20BitM%20pages&amp;severity=medium&amp;id=68d69af2bb2d0545928903c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prep-is-underway-but-2026-fifa-world-cup-poses-sig-23c028b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prep%20is%20Underway%2C%20But%202026%20FIFA%20World%20Cup%20Poses%20Significant%20Cyber%20Challenges&amp;severity=medium&amp;id=68e469f26a45552f36e9078d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11016-path-traversal-in-kalcaddle-kodbox-b3063f53</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11016%3A%20Path%20Traversal%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=68d6f04fc05fe5ce539b34e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11015-mismatched-memory-management-routin-e176f000</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11015%3A%20Mismatched%20Memory%20Management%20Routines%20in%20OGRECave%20Ogre&amp;severity=medium&amp;id=68d6f04fc05fe5ce539b34e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11025-cwe-201-insertion-of-sensitive-info-2a403648</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11025%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vimesoft%20Information%20Technologies%20and%20Software%20Inc.%20Vimesoft%20Corporate%20Messaging%20Platform&amp;severity=medium&amp;id=68d68c5d844c7fcfc6e06c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9267-cwe-427-uncontrolled-search-path-ele-22a1d274</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9267%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Seagate%20Toolkit&amp;severity=high&amp;id=68d72b6279aa5c9d0854f4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11014-heap-based-buffer-overflow-in-ogrec-6e0d303c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11014%3A%20Heap-based%20Buffer%20Overflow%20in%20OGRECave%20Ogre&amp;severity=medium&amp;id=68d68454446db3b7cfbd1064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11013-null-pointer-dereference-in-behavio-90135a53</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11013%3A%20NULL%20Pointer%20Dereference%20in%20BehaviorTree&amp;severity=medium&amp;id=68d68454446db3b7cfbd105c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11060-incorrect-authorization-in-red-hat--34cc7105</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11060%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=68d68454446db3b7cfbd106b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11012-stack-based-buffer-overflow-in-beha-aa37cd38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11012%3A%20Stack-based%20Buffer%20Overflow%20in%20BehaviorTree&amp;severity=medium&amp;id=68d67b6d15851312793660d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11011-null-pointer-dereference-in-behavio-88b07eaa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11011%3A%20NULL%20Pointer%20Dereference%20in%20BehaviorTree&amp;severity=medium&amp;id=68d67b6d15851312793660ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arcanedoor-threat-actor-resurfaces-in-continued-at-f3174e24</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ArcaneDoor%20Threat%20Actor%20Resurfaces%20in%20Continued%20Attacks%20Against%20Cisco&amp;severity=high&amp;id=68d679d8777aff183e4c1841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11010-heap-based-buffer-overflow-in-vstak-94ce4c53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11010%3A%20Heap-based%20Buffer%20Overflow%20in%20vstakhov%20libucl&amp;severity=medium&amp;id=68d72b6279aa5c9d0854f4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10544-cwe-434-unrestricted-upload-of-file-167892e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10544%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AvePoint%20DocAve&amp;severity=high&amp;id=68d66b42a36fdc65e40f724e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-ukraine-police-notices-spread-new-amatera-ste-51520203</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Ukraine%20Police%20Notices%20Spread%20New%20Amatera%20Stealer%20and%20PureMiner&amp;severity=medium&amp;id=68d66215f19eb20a2fa98cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/co-op-says-it-lost-107-million-after-scattered-spi-248636e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Co-op%20says%20it%20lost%20%24107%20million%20after%20Scattered%20Spider%20attack&amp;severity=high&amp;id=68d65acf01790ae50ff670d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unofficial-postmark-mcp-npm-silently-stole-users-e-1ec83bfa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unofficial%20Postmark%20MCP%20npm%20silently%20stole%20users&apos;%20emails&amp;severity=high&amp;id=68d65acf01790ae50ff670d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-new-xcsset-macos-malware-varian-b45be2d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20warns%20of%20new%20XCSSET%20macOS%20malware%20variant%20targeting%20Xcode%20devs&amp;severity=high&amp;id=68d65acf01790ae50ff670de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11021-out-of-bounds-read-in-red-hat-red-h-6555b8fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11021%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=68d6b4b791eb8c33bca9f9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60219-cwe-434-unrestricted-upload-of-file-2b86d959</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60219%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HaruTheme%20WooCommerce%20Designer%20Pro&amp;severity=null&amp;id=68d6b4b791eb8c33bca9f9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60186-cwe-79-improper-neutralization-of-i-3ebd0ed1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60186%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Moss%20Google%2B%20Comments&amp;severity=null&amp;id=68d6b71e6694d7d085551510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60185-cwe-79-improper-neutralization-of-i-4b52990b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60185%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kontur.us%20kontur%20Admin%20Style&amp;severity=null&amp;id=68d692e2828ba7f61ebe57fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60184-cwe-79-improper-neutralization-of-i-3cba7690</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60184%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Terry%20L.%20SEO%20Search%20Permalink&amp;severity=null&amp;id=68d692e1828ba7f61ebe57ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60181-cwe-918-server-side-request-forgery-17dc3a7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60181%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20silence%20Silencesoft%20RSS%20Reader&amp;severity=null&amp;id=68d692e1828ba7f61ebe57ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60179-cwe-79-improper-neutralization-of-i-81836f3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60179%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Space%20Studio%20Click%20%26amp%3B%20Tweet&amp;severity=medium&amp;id=68d692e1828ba7f61ebe57e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60177-cwe-79-improper-neutralization-of-i-d152bf52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60177%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rozx%20Recaptcha%20%26%238211%3B%20wp&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60173-cwe-352-cross-site-request-forgery--2df9965e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60173%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ashwani%20kumar%20GST%20for%20WooCommerce&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60172-cwe-352-cross-site-request-forgery--f128fa08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60172%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flytedesk%20Flytedesk%20Digital&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60171-cwe-352-cross-site-request-forgery--99039d15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60171%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yourplugins%20Conditional%20Cart%20Messages%20for%20WooCommerce%20%26%238211%3B%20YourPlugins.com&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60170-cwe-352-cross-site-request-forgery--64fa9e67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60170%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Taraprasad%20Swain%20HTACCESS%20IP%20Blocker&amp;severity=null&amp;id=68d72b6179aa5c9d0854f4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60169-cwe-352-cross-site-request-forgery--e58b42ec</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60169%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20W3S%20Cloud%20Technology%20W3SCloud%20Contact%20Form%207%20to%20Zoho%20CRM&amp;severity=null&amp;id=68d72b6179aa5c9d0854f4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60167-cwe-497-exposure-of-sensitive-syste-6dcb86f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60167%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20honzat%20Page%20Manager%20for%20Elementor&amp;severity=null&amp;id=68d6bb0017bcb728eab31561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60166-cwe-862-missing-authorization-in-wp-286d17a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60166%3A%20Missing%20Authorization%20in%20wpshuffle%20WP%20Subscription%20Forms%20PRO&amp;severity=null&amp;id=68d6bb0017bcb728eab3155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60165-cwe-862-missing-authorization-in-ha-2249690b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60165%3A%20Missing%20Authorization%20in%20HaruTheme%20Frames&amp;severity=null&amp;id=68d6bda8c8285d06b1f8f902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60164-cwe-352-cross-site-request-forgery--6d4340a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60164%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NewsMAN%20NewsmanApp&amp;severity=null&amp;id=68d6c082ef60383855e1ad3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60163-cwe-79-improper-neutralization-of-i-977f359f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60163%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robin%20W%20bbp%20topic%20count&amp;severity=null&amp;id=68d72b6179aa5c9d0854f462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60162-cwe-79-improper-neutralization-of-i-a6f0218c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60162%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=68d72b6079aa5c9d0854f44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60161-cwe-918-server-side-request-forgery-1b4a1033</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60161%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20ZoloBlocks&amp;severity=null&amp;id=68d72b6079aa5c9d0854f449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60160-cwe-79-improper-neutralization-of-i-00910ddc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60160%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sharkthemes%20Smart%20Related%20Products&amp;severity=null&amp;id=68d72b6079aa5c9d0854f446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60159-cwe-862-missing-authorization-in-we-d595ff36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60159%3A%20Missing%20Authorization%20in%20webmaniabr%20Nota%20Fiscal%20Eletr%C3%B4nica%20WooCommerce&amp;severity=null&amp;id=68d72b6179aa5c9d0854f49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60158-cwe-79-improper-neutralization-of-i-7c76f632</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60158%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webmaniabr%20Nota%20Fiscal%20Eletr%C3%B4nica%20WooCommerce&amp;severity=null&amp;id=68d6989183dae5453b6d11a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60157-cwe-79-improper-neutralization-of-i-7487580b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60157%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20WP%20Ticket%20Customer%20Service%20Software%20%26%20Support%20Ticket%20System&amp;severity=null&amp;id=68d69ecbfe14716afd8d9b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60156-cwe-352-cross-site-request-forgery--4ea44247</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60156%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webandprint%20AR%20For%20WordPress&amp;severity=null&amp;id=68d6a11b70abc604262e7896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60155-cwe-862-missing-authorization-in-lo-bc113043</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60155%3A%20Missing%20Authorization%20in%20loopus%20WP%20Virtual%20Assistant&amp;severity=null&amp;id=68d72b6179aa5c9d0854f496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60154-cwe-79-improper-neutralization-of-i-49075a21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60154%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jennifer%20Moss%20MWW%20Disclaimer%20Buttons&amp;severity=null&amp;id=68d72b6379aa5c9d0854f51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60153-cwe-98-improper-control-of-filename-9be13b12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60153%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpshuffle%20Subscribe%20To%20Unlock&amp;severity=null&amp;id=68d692e1828ba7f61ebe57e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60152-cwe-862-missing-authorization-in-wp-e40d53a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60152%3A%20Missing%20Authorization%20in%20wpshuffle%20Subscribe%20To%20Unlock&amp;severity=null&amp;id=68d692e1828ba7f61ebe57e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60150-cwe-98-improper-control-of-filename-afe6e0f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60150%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpshuffle%20Subscribe%20to%20Download&amp;severity=null&amp;id=68d692e1828ba7f61ebe57de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60149-cwe-79-improper-neutralization-of-i-c183a527</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60149%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rocket%20Apps%20Notely&amp;severity=null&amp;id=68d692e1828ba7f61ebe57db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60148-cwe-862-missing-authorization-in-wp-d31a6118</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60148%3A%20Missing%20Authorization%20in%20wpshuffle%20Subscribe%20to%20Download&amp;severity=null&amp;id=68d692e1828ba7f61ebe57d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60147-cwe-79-improper-neutralization-of-i-c54fc5af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60147%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Feed&amp;severity=null&amp;id=68d6a5c85686aca512dbedee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60146-cwe-79-improper-neutralization-of-i-498d0ea6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60146%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amit%20Verma%20Map%20Categories%20to%20Pages&amp;severity=null&amp;id=68d6a75c119dbca086c38a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60145-cwe-352-cross-site-request-forgery--ad85f2f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60145%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonifre%20Lenix%20scss%20compiler&amp;severity=null&amp;id=68d72b6179aa5c9d0854f490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60144-cwe-79-improper-neutralization-of-i-0cdfce47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60144%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yonifre%20Lenix%20scss%20compiler&amp;severity=null&amp;id=68d72b6179aa5c9d0854f48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60142-cwe-79-improper-neutralization-of-i-6202f24c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60142%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DaganLev%20Simple%20Meta%20Tags&amp;severity=null&amp;id=68d692e1828ba7f61ebe57d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60141-cwe-79-improper-neutralization-of-i-97f30e13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60141%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thetechtribe%20The%20Tribal&amp;severity=null&amp;id=68d692e1828ba7f61ebe57d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60140-cwe-201-insertion-of-sensitive-info-76fb0fbd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60140%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20thetechtribe%20The%20Tribal&amp;severity=null&amp;id=68d72b6079aa5c9d0854f443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60139-cwe-352-cross-site-request-forgery--9dc7be92</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60139%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Joovii%20Sendle%20Shipping&amp;severity=null&amp;id=68d72b6079aa5c9d0854f440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60138-cwe-79-improper-neutralization-of-i-35dab64d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60138%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=68d72b6179aa5c9d0854f468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60137-cwe-352-cross-site-request-forgery--1bfecabc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60137%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Galaxy%20Weblinks%20Post%20Featured%20Video&amp;severity=null&amp;id=68d72b6179aa5c9d0854f465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60136-cwe-79-improper-neutralization-of-i-58f2faff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60136%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cartpauj%20User%20Notes&amp;severity=null&amp;id=68d72b6079aa5c9d0854f455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60133-cwe-79-improper-neutralization-of-i-db4b4afb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60133%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DJ-Extensions.com%20PE%20Easy%20Slider&amp;severity=null&amp;id=68d72b6079aa5c9d0854f452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60130-cwe-862-missing-authorization-in-we-d52fb743</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60130%3A%20Missing%20Authorization%20in%20wedos.com%20WEDOS%20Global&amp;severity=null&amp;id=68d72b6079aa5c9d0854f44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60128-cwe-862-missing-authorization-in-wp-84c5e197</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60128%3A%20Missing%20Authorization%20in%20WP%20Delicious%20Delisho&amp;severity=null&amp;id=68d72b6179aa5c9d0854f48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60127-cwe-862-missing-authorization-in-ar-29247aa3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60127%3A%20Missing%20Authorization%20in%20ArtistScope%20CopySafe%20Web%20Protection&amp;severity=null&amp;id=68d6ac1736ec037b02fcaaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60126-cwe-98-improper-control-of-filename-73fd9e13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60126%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PluginOps%20Testimonial%20Slider&amp;severity=null&amp;id=68d692e0828ba7f61ebe57c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60125-cwe-201-insertion-of-sensitive-info-36f553f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60125%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20themelooks%20FoodBook&amp;severity=null&amp;id=68d692e0828ba7f61ebe57c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60124-cwe-79-improper-neutralization-of-i-a2dbbc44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60124%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Hellyer%20Simple%20Colorbox&amp;severity=null&amp;id=68d692e0828ba7f61ebe57bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60123-cwe-862-missing-authorization-in-hi-72e30ac9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60123%3A%20Missing%20Authorization%20in%20HivePress%20HivePress%20Claim%20Listings&amp;severity=null&amp;id=68d692e0828ba7f61ebe57bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60122-cwe-862-missing-authorization-in-hi-3da0393d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60122%3A%20Missing%20Authorization%20in%20HivePress%20HivePress%20Claim%20Listings&amp;severity=null&amp;id=68d692e0828ba7f61ebe57b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60121-cwe-862-missing-authorization-in-ex-11e32262</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60121%3A%20Missing%20Authorization%20in%20Ex-Themes%20WooEvents&amp;severity=null&amp;id=68d692e0828ba7f61ebe57b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60120-cwe-862-missing-authorization-in-wp-2981dd6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60120%3A%20Missing%20Authorization%20in%20WPDirectoryKit%20WP%20Directory%20Kit&amp;severity=null&amp;id=68d692e0828ba7f61ebe57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60118-cwe-89-improper-neutralization-of-s-00142826</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60118%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Potenzaglobalsolutions%20PGS%20Core&amp;severity=null&amp;id=68d6ac1736ec037b02fcaaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60117-cwe-352-cross-site-request-forgery--168939bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60117%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TangibleWP%20Vehica%20Core&amp;severity=null&amp;id=68d72b6179aa5c9d0854f47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60116-cwe-862-missing-authorization-in-th-0a318c17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60116%3A%20Missing%20Authorization%20in%20ThemeGoods%20Grand%20Conference%20Theme%20Custom%20Post%20Type&amp;severity=null&amp;id=68d72b6179aa5c9d0854f477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60115-cwe-352-cross-site-request-forgery--5473b036</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60115%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20instapagedev%20Instapage%20Plugin&amp;severity=null&amp;id=68d72b6179aa5c9d0854f46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60114-cwe-94-improper-control-of-generati-6e61ee98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60114%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20YayCommerce%20YayCurrency&amp;severity=null&amp;id=68d72b6179aa5c9d0854f46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60113-cwe-352-cross-site-request-forgery--3d676e16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60113%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20grooni%20Groovy%20Menu&amp;severity=null&amp;id=68d692e0828ba7f61ebe57b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60112-cwe-79-improper-neutralization-of-i-80e4591f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20aThemes%20Addons%20for%20Elementor&amp;severity=null&amp;id=68d692e0828ba7f61ebe57ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60111-cwe-352-cross-site-request-forgery--e36a1982</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60111%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20javothemes%20Javo%20Core&amp;severity=null&amp;id=68d692e0828ba7f61ebe57aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60110-cwe-89-improper-neutralization-of-s-12e88abb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60110%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20AllInOne%20-%20Banner%20Rotator&amp;severity=null&amp;id=68d72b6179aa5c9d0854f493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60109-cwe-89-improper-neutralization-of-s-fd1b5e7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60109%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Content%20Slider&amp;severity=null&amp;id=68d6ac1736ec037b02fcaaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60108-cwe-89-improper-neutralization-of-s-4bd29716</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60108%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Thumbnails&amp;severity=null&amp;id=68d6ac1736ec037b02fcaaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60107-cwe-89-improper-neutralization-of-s-91b3fd8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60107%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Playlist&amp;severity=null&amp;id=68d6ac1736ec037b02fcaaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60106-cwe-862-missing-authorization-in-ro-f8411a74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60106%3A%20Missing%20Authorization%20in%20Roxnor%20EmailKit&amp;severity=null&amp;id=68d72b6179aa5c9d0854f474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60105-cwe-79-improper-neutralization-of-i-347d9583</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60105%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metaphorcreations%20Ditty&amp;severity=null&amp;id=68d72b6179aa5c9d0854f471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60104-cwe-79-improper-neutralization-of-i-4e0fbd32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60104%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jordy%20Meow%20Gallery%20Custom%20Links&amp;severity=null&amp;id=68d72b6379aa5c9d0854f51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60103-cwe-862-missing-authorization-in-cr-fc75f07a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60103%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=null&amp;id=68d72b6379aa5c9d0854f518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60102-cwe-79-improper-neutralization-of-i-be735a61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syam%20Mohan%20WPFront%20User%20Role%20Editor&amp;severity=null&amp;id=68d69a346c7234617c8fd9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60099-cwe-79-improper-neutralization-of-i-2b50203d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60099%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awsm.in%20Embed%20Any%20Document&amp;severity=null&amp;id=68d69a346c7234617c8fd9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60100-cwe-80-improper-neutralization-of-s-84c7b1b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60100%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%208theme%20XStore&amp;severity=null&amp;id=68d72b6379aa5c9d0854f515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60101-improper-neutralization-of-input-du-b3b26950</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60101%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duongancol%20Woostify&amp;severity=null&amp;id=69cd7410e6bfc5ba1def503e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60098-cwe-862-missing-authorization-in-je-c5ba3ad6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60098%3A%20Missing%20Authorization%20in%20Jeff%20Farthing%20Theme%20My%20Login&amp;severity=null&amp;id=68d72b6379aa5c9d0854f508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60097-cwe-862-missing-authorization-in-co-298083a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60097%3A%20Missing%20Authorization%20in%20CodexThemes%20TheGem&amp;severity=null&amp;id=68d72b6379aa5c9d0854f505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60096-cwe-862-missing-authorization-in-co-0219e492</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60096%3A%20Missing%20Authorization%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=null&amp;id=68d72b6379aa5c9d0854f502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60095-cwe-201-insertion-of-sensitive-info-74fc05fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60095%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Benjamin%20Intal%20Stackable&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60094-cwe-862-missing-authorization-in-be-35ef1171</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60094%3A%20Missing%20Authorization%20in%20Benjamin%20Intal%20Stackable&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60093-cwe-352-cross-site-request-forgery--1a329296</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60093%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjada%20Download%20Manager&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60092-cwe-497-exposure-of-sensitive-syste-42f1c19e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60092%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Shahjada%20Download%20Manager&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60040-cwe-79-improper-neutralization-of-i-d6890e5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60040%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fkrauthan%20wp-mpdf&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4957-cwe-79-improper-neutralization-of-in-0ee83745</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4957%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=68d69bbb5823e76c4c18643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27006-cwe-79-improper-neutralization-of-i-08c84ded</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeplugs%20Authorsy&amp;severity=null&amp;id=68d69bbb5823e76c4c18643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48107-cwe-79-improper-neutralization-of-i-bd2a8700</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48107%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20undsgn%20Uncode&amp;severity=null&amp;id=68d72b6179aa5c9d0854f499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48326-cwe-862-missing-authorization-in-ac-5aab6610</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48326%3A%20Missing%20Authorization%20in%20Acclectic%20Media%20Acclectic%20Media%20Organizer&amp;severity=null&amp;id=68d72b6179aa5c9d0854f49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58914-cwe-352-cross-site-request-forgery--d5b26222</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58914%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Di%20Themes%20Di%20Themes%20Demo%20Site%20Importer&amp;severity=null&amp;id=68d69ecbfe14716afd8d9b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58917-cwe-79-improper-neutralization-of-i-ccd22cf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nick%20Verwymeren%20Quantities%20and%20Units%20for%20WooCommerce&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58919-cwe-862-missing-authorization-in-gu-a8ce9a7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58919%3A%20Missing%20Authorization%20in%20guihom%20Wide%20Banner&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59012-cwe-79-improper-neutralization-of-i-100f9f68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59012%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59002-cwe-22-improper-limitation-of-a-pat-7f1368ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59002%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SeaTheme%20BM%20Content%20Builder&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59010-cwe-201-insertion-of-sensitive-info-da06db7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59010%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Maciej%20Bis%20Permalink%20Manager%20Lite&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59011-cwe-862-missing-authorization-in-sh-11574461</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59011%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1862-cwe-434-unrestricted-upload-of-file--7a1bf76b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1862%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=68d72b6379aa5c9d0854f521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1396-vulnerability-in-wso2-wso2-identity--33faa5c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1396%3A%20CWE-203%20Observable%20Discrepancy%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=low&amp;id=68d646fc458ec434dfd2d0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54831-cwe-213-exposure-of-sensitive-infor-f5fb2b69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54831%3A%20CWE-213%20Exposure%20of%20Sensitive%20Information%20Due%20to%20Incompatible%20Policies%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=68d642b69087ccfd2afd5d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35027-cwe-78-improper-neutralization-of-s-57149fc3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35027%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Unitree%20Go2&amp;severity=high&amp;id=68d63a3cd03b6389fc3d0de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10490-cwe-79-improper-neutralization-of-i-47b84bf5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dylanjkotze%20Zephyr%20Project%20Manager&amp;severity=medium&amp;id=68d6368f9104bf76542472b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10136-cwe-79-improper-neutralization-of-i-995c7c59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10136%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20douglaskarr%20TweetThis%20Shortcode&amp;severity=medium&amp;id=68d6368f9104bf765424729f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10180-cwe-79-improper-neutralization-of-i-73b24b3b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10180%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jhoppe%20Markdown%20Shortcode&amp;severity=medium&amp;id=68d6368f9104bf76542472af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10137-cwe-918-server-side-request-forgery-cf3562b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10137%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20inc2734%20Snow%20Monkey&amp;severity=medium&amp;id=68d6368f9104bf76542472a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10307-cwe-22-improper-limitation-of-a-pat-d56bbc5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10307%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20softaculous%20Backuply%20%E2%80%93%20Backup%2C%20Restore%2C%20Migrate%20and%20Clone&amp;severity=medium&amp;id=68d6368f9104bf76542472b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9490-cwe-79-improper-neutralization-of-in-c0feec88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danieliser%20Popup%20Maker%20%E2%80%93%20Boost%20Sales%2C%20Conversions%2C%20Optins%2C%20Subscribers%20with%20the%20Ultimate%20WP%20Popup%20Builder&amp;severity=medium&amp;id=68d625c5452d465b6e4d0619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10747-cwe-434-unrestricted-upload-of-file-9138534b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10747%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gamerz%20WP-DownloadManager&amp;severity=high&amp;id=68d625c5452d465b6e4d0610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10036-cwe-89-improper-neutralization-of-s-2eff1dce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10036%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=68d6187890922828e6e3b949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9985-cwe-532-insertion-of-sensitive-infor-df823b7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9985%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=68d6187890922828e6e3b958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9984-cwe-862-missing-authorization-in-mar-91702694</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9984%3A%20CWE-862%20Missing%20Authorization%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=68d6187890922828e6e3b953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10037-cwe-89-improper-neutralization-of-s-8ac3aaff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10037%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=68d6187890922828e6e3b94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11000-null-pointer-dereference-in-open-ba-0546b58c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11000%3A%20NULL%20Pointer%20Dereference%20in%20Open%20Babel&amp;severity=medium&amp;id=68d60d329e21be37e93b470d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10377-cwe-352-cross-site-request-forgery--081723c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10377%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20qriouslad%20System%20Dashboard&amp;severity=medium&amp;id=68d60d329e21be37e93b4701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9044-cwe-79-improper-neutralization-of-in-d0a8f126</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mapster%20Mapster%20WP%20Maps&amp;severity=medium&amp;id=68d60d329e21be37e93b4714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10745-cwe-330-use-of-insufficiently-rando-3cf05f88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10745%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20specialk%20Banhammer%20%E2%80%93%20Monitor%20Site%20Traffic%2C%20Block%20Bad%20Users%20and%20Bots&amp;severity=medium&amp;id=68d60d329e21be37e93b4706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10173-cwe-862-missing-authorization-in-ro-2943e826</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10173%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20ShopEngine%20Elementor%20WooCommerce%20Builder%20Addon%20%E2%80%93%20All%20in%20One%20WooCommerce%20Solution&amp;severity=low&amp;id=68d60d329e21be37e93b46fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10999-null-pointer-dereference-in-open-ba-e33642ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10999%3A%20NULL%20Pointer%20Dereference%20in%20Open%20Babel&amp;severity=medium&amp;id=68d6062c9e21be37e93acc3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10998-null-pointer-dereference-in-open-ba-51b9a9df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10998%3A%20NULL%20Pointer%20Dereference%20in%20Open%20Babel&amp;severity=medium&amp;id=68d6062c9e21be37e93acc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10997-heap-based-buffer-overflow-in-open--b5df8006</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10997%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Babel&amp;severity=medium&amp;id=68d5ff229e21be37e93a76a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10996-heap-based-buffer-overflow-in-open--80da3d18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10996%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Babel&amp;severity=medium&amp;id=68d5ff229e21be37e93a769a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10995-memory-corruption-in-open-babel-4f3b4a3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10995%3A%20Memory%20Corruption%20in%20Open%20Babel&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10994-use-after-free-in-open-babel-f65ff4fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10994%3A%20Use%20After%20Free%20in%20Open%20Babel&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10752-cwe-352-cross-site-request-forgery--30fb9893</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10752%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cyberlord92%20OAuth%20Single%20Sign%20On%20%E2%80%93%20SSO%20(OAuth%20Client)&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8200-cwe-79-improper-neutralization-of-in-9ee142e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8200%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kraftplugins%20Mega%20Elements%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10178-cwe-79-improper-neutralization-of-i-61694d3b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20Business%20Directory%20%E2%80%93%20Optimise%20and%20showcase%20local%20business&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8906-cwe-79-improper-neutralization-of-in-504afb4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8906%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Tiktok%20Feed&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10993-code-injection-in-muyucms-dc0f5c3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10993%3A%20Code%20Injection%20in%20MuYuCMS&amp;severity=medium&amp;id=68d5f1129e21be37e93976ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10992-improper-authorization-in-roncoo-ro-807c2c99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10992%3A%20Improper%20Authorization%20in%20roncoo%20roncoo-pay&amp;severity=medium&amp;id=68d5f1129e21be37e93976b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10989-improper-authorization-in-yangzongz-20d7591a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10989%3A%20Improper%20Authorization%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=68d5e3049e21be37e93844d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10988-improper-authorization-in-yunaiv-ru-21599432</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10988%3A%20Improper%20Authorization%20in%20YunaiV%20ruoyi-vue-pro&amp;severity=medium&amp;id=68d5e3049e21be37e93844cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10987-improper-authorization-in-yunaiv-yu-74d93cab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10987%3A%20Improper%20Authorization%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=68d5da069e21be37e937d02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10981-improper-authorization-in-jeecgboot-4061c98c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10981%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68d5da069e21be37e937d025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-26-202f4793</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-26&amp;severity=medium&amp;id=68d729d579aa5c9d0854568e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59362-na-57e80d49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59362%3A%20n%2Fa&amp;severity=medium&amp;id=68d6fa2b4787b50b9b4329d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55848-na-bfad1193</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55848%3A%20n%2Fa&amp;severity=high&amp;id=68d6fa2b4787b50b9b4329ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26258-na-914348bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26258%3A%20n%2Fa&amp;severity=medium&amp;id=68d6fa2b4787b50b9b4329ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57692-na-0214a025</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57692%3A%20n%2Fa&amp;severity=medium&amp;id=68d6e8d265371a9d75545af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58384-na-372c0abc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58384%3A%20n%2Fa&amp;severity=critical&amp;id=68d6d5a7721a41f476d92a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56383-na-47588b21</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56383%3A%20n%2Fa&amp;severity=high&amp;id=68d6d410f1ae9b1f443404a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55847-na-3495b812</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55847%3A%20n%2Fa&amp;severity=high&amp;id=68d6ce8855cc370af661461a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45994-na-4bda6b6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45994%3A%20n%2Fa&amp;severity=high&amp;id=68d6ce8855cc370af6614616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58385-na-0d272ec3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58385%3A%20n%2Fa&amp;severity=high&amp;id=68d6b71e6694d7d08555150c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57292-na-a121fa93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57292%3A%20n%2Fa&amp;severity=medium&amp;id=68d6b0ce9ebdae9623c32eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56463-na-48efea09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56463%3A%20n%2Fa&amp;severity=medium&amp;id=68d6b0ce9ebdae9623c32ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55187-na-c8a5f04d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55187%3A%20n%2Fa&amp;severity=critical&amp;id=68d6a11b70abc604262e788f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60251-cwe-306-missing-authentication-for--c9f3e86c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60251%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Unitree%20Go2&amp;severity=medium&amp;id=68d5e6869e21be37e938873f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60250-cwe-321-use-of-hard-coded-cryptogra-1e871b42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60250%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Unitree%20Go2&amp;severity=medium&amp;id=68d5e6869e21be37e938873b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60017-cwe-78-improper-neutralization-of-s-206f95e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60017%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Unitree%20Go2&amp;severity=high&amp;id=68d5e6869e21be37e9388737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10980-improper-authorization-in-jeecgboot-d97da8ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10980%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68d5d2ab47dc232cc2f7e491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-signatures-detecting-lumma-stealer-with-an--4a502f36</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20Signatures%3A%20Detecting%20Lumma%20Stealer%20with%20an%20ML-Powered%20Sandbox&amp;severity=medium&amp;id=68d6779375e7e97f9013399e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10979-improper-authorization-in-jeecgboot-76ff1337</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10979%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68d5da069e21be37e937d031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10978-improper-authorization-in-jeecgboot-592c2325</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10978%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68d5c33eadeba2ac3e9e5f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10977-improper-authorization-in-jeecgboot-a9c8048b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10977%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=68d5c33eadeba2ac3e9e5f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10976-improper-authorization-in-jeecgboot-7bbedfd5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10976%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=68d5bce02738e8358fa1962e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10975-deserialization-in-guanxinglu-vlarl-84a2ad49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10975%3A%20Deserialization%20in%20GuanxingLu%20vlarl&amp;severity=medium&amp;id=68d5b59634831eff076c22ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10974-deserialization-in-giantspatula-sew-9a61f15b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10974%3A%20Deserialization%20in%20giantspatula%20SewKinect&amp;severity=medium&amp;id=68d5b59634831eff076c22f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26482-cwe-1258-exposure-of-sensitive-syst-bbe45e12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26482%3A%20CWE-1258%3A%20Exposure%20of%20Sensitive%20System%20Information%20Due%20to%20Uncleared%20Debug%20Information%20in%20Dell%20PowerEdge%20R770&amp;severity=medium&amp;id=68d5b0d5a5b750d00e6b4b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10973-sql-injection-in-jackiedyh-resume-m-33504c61</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10973%3A%20SQL%20Injection%20in%20JackieDYH%20Resume-management-system&amp;severity=medium&amp;id=68d5ae6ff728b01cbf7e14df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11005-cwe-78-improper-neutralization-of-s-acde5294</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11005%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOTOLINK%20X6000R&amp;severity=critical&amp;id=68d5a4d621839f32c6f2259f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43816-cwe-401-missing-release-of-memory-a-6f228f0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43816%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d5da079e21be37e937d058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10967-sql-injection-in-mufen-mker-php-use-e3fb63d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10967%3A%20SQL%20Injection%20in%20MuFen-mker%20PHP-Usermm&amp;severity=medium&amp;id=68d5da079e21be37e937d052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10965-deserialization-in-lazyagi-lazyllm-c87437a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10965%3A%20Deserialization%20in%20LazyAGI%20LazyLLM&amp;severity=medium&amp;id=68d5da069e21be37e937d04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43993-cwe-428-unquoted-search-path-or-ele-5bbd6e69</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43993%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Dell%20Wireless%205932e&amp;severity=high&amp;id=68d59bc858afd90a7d662e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10964-command-injection-in-wavlink-nu516u-11a36419</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10964%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d59a07384a6c1fec5c37fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59817-cwe-77-improper-neutralization-of-s-62c96c83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59817%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zenitel%20TCIS-3%2B&amp;severity=high&amp;id=68d59a07384a6c1fec5c380d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59816-cwe-89-improper-neutralization-of-s-e06984a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59816%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zenitel%20ICX500&amp;severity=high&amp;id=68d59a07384a6c1fec5c3809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59815-cwe-77-improper-neutralization-of-s-1f1b8c87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59815%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zenitel%20ICX500&amp;severity=high&amp;id=68d59a07384a6c1fec5c3805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59814-cwe-89-improper-neutralization-of-s-ea0ee454</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59814%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zenitel%20ICX500&amp;severity=high&amp;id=68d59a07384a6c1fec5c3801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ciscos-wave-of-actively-exploited-zero-day-bugs-ta-a6ee9ddc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco&apos;s%20Wave%20of%20Actively%20Exploited%20Zero-Day%20Bugs%20Targets%20Firewalls%2C%20IOS&amp;severity=medium&amp;id=68e469f26a45552f36e90790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-new-plugx-variant-abuses-dll-search-order-hi-84104983</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20new%20PlugX%20variant%20abuses%20DLL%20search%20order%20hijacking&amp;severity=medium&amp;id=68d5977082abd4e860dbde52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-drops-brickstorm-backdoors-on-edge-dev-67ea2ca5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Drops%20&apos;Brickstorm&apos;%20Backdoors%20on%20Edge%20Devices&amp;severity=medium&amp;id=68e469f26a45552f36e90793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10963-command-injection-in-wavlink-nu516u-39fc56b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10963%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d5985b1b02452dbc516200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10962-command-injection-in-wavlink-nu516u-c455cea6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10962%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d58ce367e88d0912c2c145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-asa-firewall-zero-days-exploited-in-32594d61</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20of%20ASA%20firewall%20zero-days%20exploited%20in%20attacks&amp;severity=high&amp;id=68d585a01eed5fe604593724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volvo-north-america-disclosed-a-data-breach-follow-441e5ad7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Volvo%20North%20America%20disclosed%20a%20data%20breach%20following%20a%20ransomware%20attack%20on%20IT%20provider%20Milj%C3%B6data&amp;severity=high&amp;id=68d584d1df58693707498d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-ai-agents-forced-to-leak-sensitive-data-24584e27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20AI%20Agents%20Forced%20to%20Leak%20Sensitive%20Data&amp;severity=medium&amp;id=68e469f26a45552f36e90796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10961-command-injection-in-wavlink-nu516u-d408fd2e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10961%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d5866d384303d4316bb4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10960-command-injection-in-wavlink-nu516u-39d84b3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10960%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d5866d384303d4316bb4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10959-command-injection-in-wavlink-nu516u-547bdbab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10959%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d57e67e672e5bf72dcbaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10958-command-injection-in-wavlink-nu516u-711ab39b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10958%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d57e67e672e5bf72dcbaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vietnamese-hackers-use-fake-copyright-notices-to-s-0ab5b523</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vietnamese%20Hackers%20Use%20Fake%20Copyright%20Notices%20to%20Spread%20Lone%20None%20Stealer&amp;severity=medium&amp;id=68d579a111274775d1091418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34227-cwe-78-improper-neutralization-of-s-891f7e62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34227%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Nagios%20XI&amp;severity=high&amp;id=68d57805ed5018220eb18957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10880-cwe-522-insufficiently-protected-cr-a35fd05a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10880%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Dingtian%20DT-R002&amp;severity=high&amp;id=68d57020e272fbc5dc2d800f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10879-cwe-522-insufficiently-protected-cr-bfede555</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10879%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Dingtian%20DT-R002&amp;severity=high&amp;id=68d57020e272fbc5dc2d800c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-primitive-crypto-theft-to-sophisticated-ai-ba-9ccfd471</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeceptiveDevelopment%3A%20From%20primitive%20crypto%20theft%20to%20sophisticated%20AI-based%20deception&amp;severity=medium&amp;id=68d5944cf92361eae53e91ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xcsset-evolves-again-analyzing-the-latest-updates--8a1b1378</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCSSET%20evolves%20again%3A%20Analyzing%20the%20latest%20updates%20to%20XCSSET&apos;s%20inventory&amp;severity=medium&amp;id=68d5905dc721681d7538d1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teen-suspected-of-vegas-casino-cyberattacks-releas-67193eac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Teen%20suspected%20of%20Vegas%20casino%20cyberattacks%20released%20to%20parents&amp;severity=high&amp;id=68d56daf8b0bcc090c43b033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-secure-are-passkeys-really-heres-what-you-need-0c18c8b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20secure%20are%20passkeys%2C%20really%3F%20Here&apos;s%20what%20you%20need%20to%20know&amp;severity=high&amp;id=68d56c1d8c285c7912be4d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20363-heap-based-buffer-overflow-in-cisco-e95eb40b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20363%3A%20Heap-based%20Buffer%20Overflow%20in%20Cisco%20IOS&amp;severity=critical&amp;id=68d56a80611617954beac295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20362-missing-authorization-in-cisco-cisc-0abfca33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20362%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=68d56a80611617954beac292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20333-buffer-copy-without-checking-size-o-c0dba447</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20333%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=critical&amp;id=68d56a80611617954beac28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10953-buffer-overflow-in-utt-1200gw-e0e94239</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10953%3A%20Buffer%20Overflow%20in%20UTT%201200GW&amp;severity=high&amp;id=68d5682325eee97faa1f4cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60019-null-pointer-dereference-c82b6dd9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60019%3A%20NULL%20Pointer%20Dereference&amp;severity=low&amp;id=68d56693c17b2efb31c3d01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60018-out-of-bounds-read-e67b11c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60018%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=68d56693c17b2efb31c3d016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10952-information-disclosure-in-geyang-ml-3efdff5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10952%3A%20Information%20Disclosure%20in%20geyang%20ml-logger&amp;severity=medium&amp;id=68d56205919e15837c9c5a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-new-akdoortea-backdoor-to-b6efdfd1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20New%20AkdoorTea%20Backdoor%20to%20Target%20Global%20Crypto%20Developers&amp;severity=high&amp;id=68d55ef83768aa19ad4d4034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43943-cwe-78-improper-neutralization-of-s-58be7fe5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43943%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Cloud%20Disaster%20Recovery&amp;severity=medium&amp;id=68d56a80611617954beac2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-forcedleak-vulnerability-in-salesforce-ag-47d05463</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20ForcedLeak%20Vulnerability%20in%20Salesforce%20Agentforce%20AI%20Agent%20Exposed%20CRM%20Data&amp;severity=critical&amp;id=68d55d747985981ee483e2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26333-cwe-209-generation-of-error-message-1dd2b1a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26333%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Dell%20BSAFE%20Crypto-J&amp;severity=medium&amp;id=68d56a80611617954beac29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59841-cwe-384-session-fixation-in-flagfor-0c0a9e3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59841%3A%20CWE-384%3A%20Session%20Fixation%20in%20FlagForgeCTF%20flagForge&amp;severity=critical&amp;id=68d5da079e21be37e937d09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10911-expired-pointer-dereference-in-red--ad3c5c39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10911%3A%20Expired%20Pointer%20Dereference&amp;severity=medium&amp;id=68d59bc858afd90a7d662e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33116-cwe-79-improper-neutralization-of-i-3eff7880</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Watson%20Studio%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=68d56a80611617954beac29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10951-path-traversal-in-geyang-ml-logger-59e4f519</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10951%3A%20Path%20Traversal%20in%20geyang%20ml-logger&amp;severity=medium&amp;id=68d55a60971c2c3f09de9158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36601-cwe-200-exposure-of-sensitive-infor-6214d06a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36601%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=68d558e1bbd73d20e5f4081b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40838-cwe-522-insufficiently-protected-cr-33c0351f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40838%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=medium&amp;id=68d558e1bbd73d20e5f40821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40837-cwe-862-missing-authorization-in-er-59fe3125</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40837%3A%20CWE-862%20Missing%20Authorization%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=68d558e1bbd73d20e5f4081e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59838-cwe-79-improper-neutralization-of-i-fb619cac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20monkeytypegame%20monkeytype&amp;severity=low&amp;id=68d558e1bbd73d20e5f40828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40836-cwe-20-improper-input-validation-in-03176d80</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40836%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=68d5575aecede5b1064c44b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59832-cwe-79-improper-neutralization-of-i-faba07be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59832%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=critical&amp;id=68d5575aecede5b1064c44b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27262-cwe-78-improper-neutralization-of-s-ca4aa4d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27262%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=68d555d5bcd404e045649dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36857-cwe-276-incorrect-default-permissio-30552de1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36857%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Rapid7%20Appspider%20Pro&amp;severity=low&amp;id=68d555d5bcd404e045649dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10542-cwe-1392-use-of-default-credentials-d4bdb270</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10542%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20iMonitor%20Software%20Inc.%20iMonitor%20EAM&amp;severity=critical&amp;id=68d5538429ad9c2ccd0a3db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10950-deserialization-in-geyang-ml-logger-1ca38c22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10950%3A%20Deserialization%20in%20geyang%20ml-logger&amp;severity=medium&amp;id=68d5538429ad9c2ccd0a3dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10949-cross-site-scripting-in-changsha-de-cbc3e521</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10949%3A%20Cross%20Site%20Scripting%20in%20Changsha%20Developer%20Technology%20iView%20Editor&amp;severity=medium&amp;id=68d5538429ad9c2ccd0a3db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10541-cwe-732-incorrect-permission-assign-f963b990</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10541%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20iMonitor%20Software%20Inc.%20iMonitor%20EAM&amp;severity=high&amp;id=68d5538429ad9c2ccd0a3dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59823-cwe-94-improper-control-of-generati-9e9e680c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59823%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20gardener%20gardener-extension-provider-aws&amp;severity=critical&amp;id=68d5511823f14e593ee333af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookworm-to-stately-taurus-using-the-attribution-f-7875d2e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bookworm%20to%20Stately%20Taurus%20Using%20the%20Attribution%20Framework&amp;severity=medium&amp;id=68d5905dc721681d7538d1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-worm-infects-npm-packages-67517ec1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20worm%20infects%20npm%20packages&amp;severity=medium&amp;id=68d5905dc721681d7538d1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10540-cwe-319-cleartext-transmission-of-s-db55c48c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10540%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20iMonitor%20Software%20Inc.%20iMonitor%20EAM&amp;severity=medium&amp;id=68d54e7be78e93d9c01760ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10948-buffer-overflow-in-mikrotik-routero-5b1b25fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10948%3A%20Buffer%20Overflow%20in%20MikroTik%20RouterOS&amp;severity=high&amp;id=68d54bd4b8fb385711ea40d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59426-cwe-601-url-redirection-to-untruste-6e7c5f2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59426%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20lobehub%20lobe-chat&amp;severity=medium&amp;id=68d54bd4b8fb385711ea40db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59839-cwe-79-improper-neutralization-of-i-16346a34</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59839%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenWiki%20mediawiki-extensions-EmbedVideo&amp;severity=high&amp;id=68d5511823f14e593ee333b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27261-cwe-89-improper-neutralization-of-s-e6c0217c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27261%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=68d5538429ad9c2ccd0a3dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59834-cwe-77-improper-neutralization-of-s-810858f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59834%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20srmorete%20adb-mcp&amp;severity=critical&amp;id=68d54789ac522a786501f6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cloud-service-disruptions-are-making-resilienc-2a393efd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Cloud%20Service%20Disruptions%20Are%20Making%20Resilience%20Critical%20for%20Developers&amp;severity=critical&amp;id=68e469f26a45552f36e90799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59831-cwe-77-improper-neutralization-of-s-776ce37f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59831%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20snowyu%20git-commiters.js&amp;severity=high&amp;id=68d54789ac522a786501f6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10467-cwe-79-improper-neutralization-of-i-f247353d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PROLIZ%20Computer%20Software%20Hardware%20Service%20Trade%20Ltd.%20Co.%20OBS%20(Student%20Affairs%20Information%20System)&amp;severity=high&amp;id=68d5da079e21be37e937d09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59422-cwe-284-improper-access-control-in--adfa4005</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59422%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20langgenius%20dify&amp;severity=medium&amp;id=68d5da079e21be37e937d0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5494-cwe-269-improper-privilege-managemen-3e572a75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5494%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Zohocorp%20Endpoint%20Central&amp;severity=low&amp;id=68d541e7880f8ca3dd887c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10947-authorization-bypass-in-sistemas-pl-88cfb026</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10947%3A%20Authorization%20Bypass%20in%20Sistemas%20Pleno%20Gest%C3%A3o%20de%20Loca%C3%A7%C3%A3o&amp;severity=medium&amp;id=68d53de3fd5656ece925daf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10946-cross-site-scripting-in-nuz007-smsb-09bf033e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10946%3A%20Cross%20Site%20Scripting%20in%20nuz007%20smsboom&amp;severity=medium&amp;id=68d53de3fd5656ece925daeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10449-cwe-22-improper-limitation-of-a-pat-2be8ea6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10449%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Saysis%20Computer%20Systems%20Trade%20Ltd.%20Co.%20Saysis%20Web%20Portal&amp;severity=high&amp;id=68d53de3fd5656ece925daf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10945-cross-site-scripting-in-nuz007-smsb-ccb77578</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10945%3A%20Cross%20Site%20Scripting%20in%20nuz007%20smsboom&amp;severity=medium&amp;id=68d541e7880f8ca3dd887c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10944-cross-site-scripting-in-yi-ge-get-h-6999adde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10944%3A%20Cross%20Site%20Scripting%20in%20yi-ge%20get-header-ip&amp;severity=medium&amp;id=68d541e7880f8ca3dd887c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10943-cross-site-scripting-in-mikecen-wec-61b4ecd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10943%3A%20Cross%20Site%20Scripting%20in%20MikeCen%20WeChat-Face-Recognition&amp;severity=medium&amp;id=68d5324743ab49a6dbd6591f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10957-cwe-284-improper-access-control-in--a5610d7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10957%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Syrotech%20Networks%20Syrotech%20SY-GPON-2010-WADONT&amp;severity=high&amp;id=68d52c18ed49a32d85cd570f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-rust-crates-steal-solana-and-ethereum-ke-1e596d3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Rust%20Crates%20Steal%20Solana%20and%20Ethereum%20Keys%20%E2%80%94%208%2C424%20Downloads%20Confirmed&amp;severity=high&amp;id=68d528f5e24b804ba5ca565e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40698-cwe-89-improper-neutralization-of-s-f783c08e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40698%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nedatec%20Consulting%20Prevengos&amp;severity=high&amp;id=68d525f3ffe4ae4539397db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10942-buffer-overflow-in-h3c-magic-b3-f6315552</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10942%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B3&amp;severity=high&amp;id=68d523a21c4cbdeab7737b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10941-permission-issues-in-topaz-servcore-c3d29cfa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10941%3A%20Permission%20Issues%20in%20Topaz%20SERVCore%20Teller&amp;severity=high&amp;id=68d523a21c4cbdeab7737b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yet-another-random-story-vbscripts-randomize-inter-b7a806a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yet%20Another%20Random%20Story.%20VBScript&apos;s%20Randomize%20Internals.&amp;severity=medium&amp;id=68d51ef6e2e0da4db617259a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-cvss-10-flaw-in-goanywhere-file-transfer--6326b8f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20CVSS%2010%20Flaw%20in%20GoAnywhere%20File%20Transfer%20Threatens%2020%2C000%20Systems&amp;severity=critical&amp;id=68d51bd7e8d81b94073fdd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10940-cross-site-scripting-in-totaljs-cms-d015dfd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10940%3A%20Cross%20Site%20Scripting%20in%20Total.js%20CMS&amp;severity=medium&amp;id=68d51b1690f1f33c6f4a1e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-furbo-a-hardware-research-project-part-5-e-5f10d1d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Furbo%20-%20A%20Hardware%20Research%20Project%20%E2%80%93%20Part%205%3A%20Exploiting%20BLE&amp;severity=medium&amp;id=68d51b1a90f1f33c6f4a1ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-hit-us-tech-firms-with-bricks-09696ac7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Hit%20US%20Tech%20Firms%20with%20BRICKSTORM%20Malware&amp;severity=medium&amp;id=68d511c5fb73ef7523214648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fixed-actively-exploited-zero-day-in-cisco-i-dfe04cb3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20fixed%20actively%20exploited%20zero-day%20in%20Cisco%20IOS%20and%20IOS%20XE%20software&amp;severity=critical&amp;id=68d50ba1fbffafbda1d8d1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/systembc-bringing-the-noise-adbb556d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SystemBC%20%E2%80%93%20Bringing%20the%20Noise&amp;severity=medium&amp;id=68d54d90ac1bc8e99ea1075e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prompts-as-code-embedded-keys-the-hunt-for-llm-ena-da781beb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prompts%20as%20Code%20%26%20Embedded%20Keys%20%7C%20The%20Hunt%20for%20LLM-Enabled%20Malware&amp;severity=medium&amp;id=68d54d90ac1bc8e99ea10717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-rewrite-chinese-speaking-threat-actors-d-11e53419</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Rewrite%3A%20Chinese-Speaking%20Threat%20Actors%20Deploy%20BadIIS%20in%20a%20Wide%20Scale%20SEO%20Poisoning%20Campaign&amp;severity=medium&amp;id=68d54f4fee8591765f469634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-online-speedtest-application-81dfe8ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Online%20Speedtest%20Application&amp;severity=medium&amp;id=68d5516523f14e593ee37144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-emerging-ddos-for-hire-botnet-bd8acff5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20emerging%20DDoS%20for%20hire%20botnet&amp;severity=medium&amp;id=68d552bfee13037d38697208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10438-cwe-27-path-traversal-dirfilename-i-85109923</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10438%3A%20CWE-27%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Yordam%20Information%20Technology%20Consulting%20Education%20and%20Electrical%20Systems%20Industry%20Trade%20Inc.%20Yordam%20Katalog&amp;severity=high&amp;id=68d50baffbffafbda1d8d2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-contained-doesnt-mean-safe-in-modern-socs-6f2738c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20%E2%80%9Ccontained%E2%80%9D%20doesn%E2%80%99t%20mean%20%E2%80%9Csafe%E2%80%9D%20in%20modern%20SOCs&amp;severity=medium&amp;id=68d507d2afbf41d56563b961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21056-cwe-20-improper-input-validation-in-e72ee1b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21056%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Retail%20Mode&amp;severity=medium&amp;id=68d5da079e21be37e937d0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55557-na-385d7c93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55557%3A%20n%2Fa&amp;severity=high&amp;id=68d5da079e21be37e937d096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55556-na-106e2410</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55556%3A%20n%2Fa&amp;severity=medium&amp;id=68d5da079e21be37e937d092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55554-na-9f6168ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55554%3A%20n%2Fa&amp;severity=medium&amp;id=68d5da079e21be37e937d08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55553-na-c7c8ce91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55553%3A%20n%2Fa&amp;severity=high&amp;id=68d5da079e21be37e937d089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55552-na-94f15cff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55552%3A%20n%2Fa&amp;severity=medium&amp;id=68d5da079e21be37e937d085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55558-na-70efa2bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55558%3A%20n%2Fa&amp;severity=high&amp;id=68d5da079e21be37e937d080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59408-na-fe384ab5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59408%3A%20n%2Fa&amp;severity=high&amp;id=68d5da069e21be37e937d046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59404-na-31f3e59a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59404%3A%20n%2Fa&amp;severity=high&amp;id=68d5da069e21be37e937d040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59402-na-b3114b53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59402%3A%20n%2Fa&amp;severity=medium&amp;id=68d5da069e21be37e937d03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56769-na-c4c55b32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56769%3A%20n%2Fa&amp;severity=medium&amp;id=68d5da069e21be37e937d037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-25-a47cf8d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-25&amp;severity=medium&amp;id=68d5d8739e21be37e93721bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57632-na-5fddaad4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57632%3A%20n%2Fa&amp;severity=high&amp;id=68d5a008597989c5fdb74a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29156-na-6f43863e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29156%3A%20n%2Fa&amp;severity=medium&amp;id=68d58f789fccefb1f2be0d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29157-na-186a3ca4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29157%3A%20n%2Fa&amp;severity=medium&amp;id=68d58ce367e88d0912c2c14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48707-na-d1c75d18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48707%3A%20n%2Fa&amp;severity=high&amp;id=68d58265902a85114cc3a044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29155-na-1a055232</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29155%3A%20n%2Fa&amp;severity=medium&amp;id=68d580ce834f0486529e5af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57623-na-07c72b97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57623%3A%20n%2Fa&amp;severity=medium&amp;id=68d57cd0558a673da2800335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60249-cwe-79-improper-neutralization-of-i-705faf7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60249%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20CIRCL%20vulnerability-lookup&amp;severity=medium&amp;id=68d57a717f709e48c38d3def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57446-na-0111accc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57446%3A%20n%2Fa&amp;severity=high&amp;id=68d56a80611617954beac298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55560-na-bdec813f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55560%3A%20n%2Fa&amp;severity=high&amp;id=68d5682325eee97faa1f4ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55559-na-06beeecf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55559%3A%20n%2Fa&amp;severity=high&amp;id=68d56205919e15837c9c5a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55551-na-003b24e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55551%3A%20n%2Fa&amp;severity=high&amp;id=68d558e1bbd73d20e5f40824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46153-na-f67db563</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46153%3A%20n%2Fa&amp;severity=medium&amp;id=68d5511823f14e593ee333a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46152-na-da5ad851</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46152%3A%20n%2Fa&amp;severity=medium&amp;id=68d5511823f14e593ee333a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46150-na-a5369630</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46150%3A%20n%2Fa&amp;severity=medium&amp;id=68d5511823f14e593ee3339d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46149-na-3a83907d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46149%3A%20n%2Fa&amp;severity=medium&amp;id=68d5511823f14e593ee33398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46148-na-16d5bd4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46148%3A%20n%2Fa&amp;severity=medium&amp;id=68d5511823f14e593ee33392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57317-na-b6602963</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57317%3A%20n%2Fa&amp;severity=high&amp;id=68d54e7be78e93d9c01760f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26278-na-cc3f0079</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26278%3A%20n%2Fa&amp;severity=high&amp;id=68d54e7be78e93d9c01760ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-supermicro-bmc-flaws-can-create-persistent-bac-9ce1a268</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Supermicro%20BMC%20flaws%20can%20create%20persistent%20backdoors&amp;severity=high&amp;id=68d4676795af6723ad453733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54520-cwe-1247-improper-protection-agains-e1c47753</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54520%3A%20CWE-1247%20%20Improper%20Protection%20Against%20Voltage%20and%20Clock%20Glitches%20in%20AMD%20Kintex%E2%84%A2%207-Series%20FPGA&amp;severity=high&amp;id=68d487f92f6beace9efc356e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-attackers-breach-federal-agency-via-critical--8f0b4f31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%3A%20Attackers%20Breach%20Federal%20Agency%20via%20Critical%20GeoServer%20Flaw&amp;severity=critical&amp;id=68e469f26a45552f36e9079c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10894-embedded-malicious-code-dd656a23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10894%3A%20Embedded%20Malicious%20Code&amp;severity=critical&amp;id=68d487f92f6beace9efc3566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redisclosure-new-technique-for-exploiting-full-tex-830160e4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ReDisclosure%3A%20New%20technique%20for%20exploiting%20Full-Text%20Search%20in%20MySQL%20(myBB%20case%20study)&amp;severity=high&amp;id=68d45f2b42da3d67ba36d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59833-cwe-200-exposure-of-sensitive-infor-7e9af4c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59833%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=68d487f92f6beace9efc3571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59827-cwe-862-missing-authorization-in-fl-c5ed0def</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59827%3A%20CWE-862%3A%20Missing%20Authorization%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=68d453e8af778555c6843a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-fall-of-scattered-spider-teen-member-surrender-35583819</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Fall%20of%20Scattered%20Spider%3F%20Teen%20Member%20Surrenders%20Amid%20Group&apos;s%20Shutdown%20Claims&amp;severity=medium&amp;id=68e469f26a45552f36e9079f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-targets-moldovan-election-in-disinformation-dd0a8062</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20Targets%20Moldovan%20Election%20in%20Disinformation%20Play&amp;severity=medium&amp;id=68e469f26a45552f36e907a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59824-cwe-863-incorrect-authorization-in--576e0be5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59824%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20siderolabs%20omni&amp;severity=low&amp;id=68d487f92f6beace9efc3578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-ios-zero-day-vulnerability-exploite-84bafe4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20of%20IOS%20zero-day%20vulnerability%20exploited%20in%20attacks&amp;severity=critical&amp;id=68d448a75cc31078ce44a101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59828-cwe-829-inclusion-of-functionality--9e0b47d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59828%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20anthropics%20claude-code&amp;severity=high&amp;id=68d447f114a0e3bf04cbd2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59251-remote-code-execution-in-microsoft--51cba0b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59251%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=68d441f3006fc02db7d1f73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55322-cwe-1327-binding-to-an-unrestricted-beae1fb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55322%3A%20CWE-1327%3A%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Microsoft%20OmniParser&amp;severity=high&amp;id=68d441f3006fc02db7d1f737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55178-cwe-78-improper-neutralization-of-s-12d624a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55178%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Meta%20Platforms%2C%20Inc%20Llama%20Stack&amp;severity=medium&amp;id=68d43b319524cade097fb1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-flaw-in-oneplus-phones-lets-rogue-apps-t-f2b7f50b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20flaw%20in%20OnePlus%20phones%20lets%20rogue%20apps%20text%20messages&amp;severity=high&amp;id=68d4383098715fbf47f038f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-rednovember-target-global-governme-5d534e87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20RedNovember%20Target%20Global%20Governments%20Using%20Pantegana%20and%20Cobalt%20Strike&amp;severity=high&amp;id=68d436a858bf5b62d9cd8e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59525-cwe-79-improper-neutralization-of-i-35118202</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59525%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=68d4384798715fbf47f03b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59524-cwe-79-improper-neutralization-of-i-c241c072</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59524%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=68d4352b82e2e362236e248d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52907-cwe-20-improper-input-validation-in-69876063</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52907%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TOTOLINK%20X6000R&amp;severity=high&amp;id=68d4352b82e2e362236e2475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20314-improper-handling-of-undefined-valu-6d4b4336</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20314%3A%20Improper%20Handling%20of%20Undefined%20Values%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d4316e56f46ad084c135a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52906-cwe-78-improper-neutralization-of-s-4abc749a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52906%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOTOLINK%20X6000R&amp;severity=critical&amp;id=68d42fee54b886c7946c3db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59343-cwe-22-improper-limitation-of-a-pat-e5756a8f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59343%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mafintosh%20tar-fs&amp;severity=high&amp;id=68d42e6da3ef9dc8da572d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48867-cwe-79-improper-neutralization-of-i-48207c94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48867%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=68d42aa5b9c074a9a4466274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/python-software-foundation-warns-of-fake-pypi-logi-54a38742</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Python%20Software%20Foundation%20Warns%20of%20Fake%20PyPI%20Login%20Site%20Stealing%20User%20Credentials&amp;severity=medium&amp;id=68d429e0b7cfebb6efe74f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targets-government-defense-and-technology-organiza-1f1f10ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targets%20Government%2C%20Defense%2C%20and%20Technology%20Organizations&amp;severity=medium&amp;id=68d44a34f2b114103f06512a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48869-cwe-284-improper-access-control-in--49bc0c13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48869%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=68d428628faa9b2aaac16ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20316-improper-access-control-in-cisco-ci-5664271d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20316%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d428618faa9b2aaac16ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20293-incomplete-cleanup-in-cisco-cisco-i-fdf5deee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20293%3A%20Incomplete%20Cleanup%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d428618faa9b2aaac16aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20338-improper-neutralization-of-paramete-59c7234b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20338%3A%20Improper%20Neutralization%20of%20Parameter%2FArgument%20Delimiters%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d428628faa9b2aaac16ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20240-incomplete-blacklist-to-cross-site--cbc522f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20240%3A%20Incomplete%20Blacklist%20to%20Cross-Site%20Scripting%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d428618faa9b2aaac16a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20149-buffer-copy-without-checking-size-o-433d240a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20149%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Cisco%20IOS&amp;severity=medium&amp;id=68d428618faa9b2aaac16a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20313-path-traversal-in-cisco-cisco-ios-x-a2583902</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20313%3A%20Path%20Traversal%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d428618faa9b2aaac16aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20311-data-handling-in-cisco-cisco-ios-xe-33fbf401</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20311%3A%20Data%20Handling%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=68d428618faa9b2aaac16aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20327-improper-validation-of-specified-ty-753e195b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20327%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20IOS&amp;severity=high&amp;id=68d428618faa9b2aaac16ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20312-loop-with-unreachable-exit-conditio-1fb30851</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20312%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=68d428618faa9b2aaac16aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20352-stack-based-buffer-overflow-in-cisc-3a60cd99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20352%3A%20Stack-based%20Buffer%20Overflow%20in%20Cisco%20IOS&amp;severity=high&amp;id=68d428628faa9b2aaac16ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20160-improper-authentication-in-cisco-io-9a073271</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20160%3A%20Improper%20Authentication%20in%20Cisco%20IOS&amp;severity=high&amp;id=68d428618faa9b2aaac16a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20315-buffer-access-with-incorrect-length-4f1b0ff8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20315%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=68d428618faa9b2aaac16aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20334-improper-neutralization-of-special--630d380a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20334%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=68d4261cb958913f5513c5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20339-improper-access-control-in-cisco-ci-d416c5e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20339%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20SD-WAN%20vEdge%20Cloud&amp;severity=medium&amp;id=68d420cba63865f9ee9266d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20365-improper-verification-of-source-of--50195c58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20365%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Cisco%20Cisco%20Aironet%20Access%20Point%20Software%20(IOS%20XE%20Controller)&amp;severity=medium&amp;id=68d420cba63865f9ee9266d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20364-origin-validation-error-in-cisco-ci-1ea1de2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20364%3A%20Origin%20Validation%20Error%20in%20Cisco%20Cisco%20Aironet%20Access%20Point%20Software%20(IOS%20XE%20Controller)&amp;severity=medium&amp;id=68d420cba63865f9ee9266d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10909-cross-site-scripting-in-mangati-nov-afb4f13e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10909%3A%20Cross%20Site%20Scripting%20in%20Mangati%20NovoSGA&amp;severity=medium&amp;id=68d41e84617790002496d56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10892-integer-overflow-in-google-chrome-a1f4faf5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10892%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68d41b0baa6112407a6d8675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10891-integer-overflow-in-google-chrome-3664b2aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10891%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68d41b0baa6112407a6d8671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10890-side-channel-information-leakage-in-d59d66dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10890%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=critical&amp;id=68d41b0baa6112407a6d866d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10502-heap-buffer-overflow-in-google-chro-9ecbd01a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10502%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68d41b0baa6112407a6d8665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10501-use-after-free-in-google-chrome-08dc055d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10501%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68d41b0baa6112407a6d8661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10500-use-after-free-in-google-chrome-ce6f773c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10500%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68d41b0baa6112407a6d865d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/updates-arsenal-with-baitswitch-and-simplefix-194836d3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Updates%20Arsenal%20with%20BAITSWITCH%20and%20SIMPLEFIX&amp;severity=medium&amp;id=68d44a34f2b114103f06513a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10360-cwe-522-insufficiently-protected-cr-1c3baedc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10360%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Perforce%20Puppet%20Enterprise&amp;severity=medium&amp;id=68d4141b3928f2e6f6c93442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc5221-uses-brickstorm-backdoor-to-infiltrate-us--b845a76b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC5221%20Uses%20BRICKSTORM%20Backdoor%20to%20Infiltrate%20U.S.%20Legal%20and%20Technology%20Sectors&amp;severity=high&amp;id=68d40ff09a5cf4e1e38e8983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47329-cwe-763-release-of-invalid-pointer--5e4b0401</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47329%3A%20CWE-763%3A%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47328-cwe-126-buffer-over-read-in-qualcom-3cd420ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47328%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47327-cwe-416-use-after-free-in-qualcomm--4b575263</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47327%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b2ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47326-cwe-126-buffer-over-read-in-qualcom-428d2f08</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47326%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47318-cwe-126-buffer-over-read-in-qualcom-a1ced5ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47318%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47317-cwe-126-buffer-over-read-in-qualcom-a8df0bad</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47317%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47316-cwe-415-double-free-in-qualcomm-inc-1fc67608</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47316%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47315-cwe-416-use-after-free-in-qualcomm--13e20409</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47315%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b28a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47314-cwe-20-improper-input-validation-in-411f9a19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47314%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27077-cwe-416-use-after-free-in-qualcomm--6b97ee9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27077%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27037-cwe-416-use-after-free-in-qualcomm--3f713055</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27037%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27036-cwe-126-buffer-over-read-in-qualcom-73b1bf31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27036%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68d41181d0cbc63b6d41b27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27034-cwe-129-improper-validation-of-arra-dc3bf59a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27034%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=68d41181d0cbc63b6d41b278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27033-cwe-126-buffer-over-read-in-qualcom-a7adca71</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27033%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68d41180d0cbc63b6d41b260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27032-cwe-1257-improper-access-control-ap-9b841d5b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27032%3A%20CWE-1257%3A%20Improper%20Access%20Control%20Applied%20to%20Mirrored%20or%20Aliased%20Memory%20Regions%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27030-cwe-126-buffer-over-read-in-qualcom-36936f39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27030%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68d41180d0cbc63b6d41b25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21488-cwe-126-buffer-over-read-in-qualcom-e06c9756</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21488%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21487-cwe-126-buffer-over-read-in-qualcom-d6f4ab43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21487%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21484-cwe-126-buffer-over-read-in-qualcom-cee53c20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21484%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21483-cwe-119-improper-restriction-of-ope-35a3053b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21483%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=68d41180d0cbc63b6d41b24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21482-cwe-310-cryptographic-issues-in-qua-4fcbb3c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21482%3A%20CWE-310%20Cryptographic%20Issues%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21481-cwe-120-buffer-copy-without-checkin-41dd226b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21481%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21476-cwe-120-buffer-copy-without-checkin-9a75a4be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21476%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8869-vulnerability-in-python-packaging-au-2bf86130</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8869%3A%20Vulnerability%20in%20Python%20Packaging%20Authority%20pip&amp;severity=medium&amp;id=68d487f92f6beace9efc3584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowv2-botnet-uses-misconfigured-aws-docker-for--9cc47b8d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowV2%20Botnet%20Uses%20Misconfigured%20AWS%20Docker%20for%20DDoS-For-Hire%20Service&amp;severity=medium&amp;id=68d3fa3ed1859119b259a48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48868-cwe-95-improper-neutralization-of-d-f657d4ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48868%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=68d3f8033fb9861b3d7aea82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lovense-ignored-app-vulnerabilities-for-eight-year-b6f18874</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lovense%20ignored%20app%20vulnerabilities%20for%20eight%20years%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e9575c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macos-threat-abuses-ads-and-social-media-to-sp-4e1cbd8a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20macOS%20threat%20abuses%20ads%20and%20social%20media%20to%20spread%20malware&amp;severity=low&amp;id=68d3f4feac62d707fa618453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iframe-security-exposed-the-blind-spot-fueling-pay-4f5f130d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=iframe%20Security%20Exposed%3A%20The%20Blind%20Spot%20Fueling%20Payment%20Skimmer%20Attacks&amp;severity=high&amp;id=68d3f373b38162a24b52d414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-yibackdoor-malware-shares-major-code-overlaps--9ba4ad62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20YiBackdoor%20Malware%20Shares%20Major%20Code%20Overlaps%20with%20IcedID%20and%20Latrodectus&amp;severity=high&amp;id=68d3f373b38162a24b52d410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-one-bad-password-ended-a-158-year-old-business-7f335170</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20One%20Bad%20Password%20Ended%20a%20158-Year-Old%20Business&amp;severity=high&amp;id=68d3f2af9540140ef66f3623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23354-cwe-94-improper-control-of-generati-e32ca15d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23354%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=68d3f06d37fc381b138d5353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23353-cwe-94-improper-control-of-generati-dee94226</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23353%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=68d3f06d37fc381b138d534e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23349-cwe-94-improper-control-of-generati-5572ae47</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23349%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=68d3f06d37fc381b138d5349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23348-cwe-94-improper-control-of-generati-0961fca2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23348%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=68d3f06d37fc381b138d5344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23346-cwe-476-null-pointer-dereference-in-b4e47eeb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23346%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06d37fc381b138d533f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23340-cwe-125-out-of-bounds-read-in-nvidi-45f3a336</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23340%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06d37fc381b138d533a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23339-cwe-121-stack-based-buffer-overflow-c50e7298</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23339%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d531d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23338-cwe-129-improper-validation-of-arra-ae0209f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23338%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d5318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23308-cwe-122-heap-based-buffer-overflow--043bd3ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23308%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d5313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23275-cwe-787-out-of-bounds-write-in-nvid-7aabadbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23275%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=68d3f06c37fc381b138d530e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23274-cwe-125-out-of-bounds-read-in-nvidi-5cf9b7b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23274%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=68d3f06c37fc381b138d5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23273-cwe-369-divide-by-zero-in-nvidia-nv-a6f9427b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23273%3A%20CWE-369%20Divide%20By%20Zero%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d5304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23272-cwe-125-out-of-bounds-read-in-nvidi-c3e85ac8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23272%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=68d3f06c37fc381b138d52ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23271-cwe-125-out-of-bounds-read-in-nvidi-5ae5b189</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23271%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d52f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23255-cwe-125-out-of-bounds-read-in-nvidi-932021d1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23255%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d52f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23248-cwe-125-out-of-bounds-read-in-nvidi-3a42b32e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23248%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d52eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10906-missing-authentication-in-magnetism-45646a17</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10906%3A%20Missing%20Authentication%20in%20Magnetism%20Studios%20Endurance&amp;severity=high&amp;id=68d3ed6019ed1d2da3209504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-deploys-overstep-backdoor-in-ongoing--5f723c58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Deploys%20&apos;OVERSTEP&apos;%20Backdoor%20in%20Ongoing%20SonicWall%20SMA%20Attacks&amp;severity=low&amp;id=68e469f26a45552f36e907a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9353-cwe-79-improper-neutralization-of-in-d2b69cc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Builder&amp;severity=medium&amp;id=68d3e5327cf19d4a5bae2133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-arrest-made-after-cyberattack-disrupts-major-eu-4e69f528</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Arrest%20Made%20After%20Cyberattack%20Disrupts%20Major%20European%20Airports&amp;severity=medium&amp;id=68d3e2adcb0d61278ba940fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9054-cwe-862-missing-authorization-in-tec-0b71f34b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9054%3A%20CWE-862%20Missing%20Authorization%20in%20Techspawn%20MultiLoca%20-%20WooCommerce%20Multi%20Locations%20Inventory%20Management&amp;severity=critical&amp;id=68d3ed6119ed1d2da320950e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blocks-record-222-tbps-ddos-attack-2c79177a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Blocks%20Record%2022.2%20Tbps%20DDoS%20Attack&amp;severity=medium&amp;id=68d3d29f1d99fb2c28bb35d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-attack-disguised-as-sex-offender-notificat-7ad0532f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Attack%20Disguised%20as%20Sex%20Offender%20Notification%20Information&amp;severity=medium&amp;id=68d3dde1832437344391e242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nodejs-backdoors-delivering-proxyware-and-monetiza-d59f7692</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NodeJS%20backdoors%20delivering%20proxyware%20and%20monetization%20schemes&amp;severity=medium&amp;id=68d3df81a166c667ef433e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-wordpress-backdoors-creating-admin-accounts-872b3946</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20WordPress%20Backdoors%20Creating%20Admin%20Accounts&amp;severity=medium&amp;id=68d3e11b48ec59f6d6c2febc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gunra-ransomware-what-you-dont-know-87b4307a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GUNRA%20RANSOMWARE%3A%20What%20You%20Don&apos;t%20Know!&amp;severity=medium&amp;id=68d3e0484ff38f000da5fb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58457-cwe-280-improper-handling-of-insuff-f2cdd1ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58457%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=medium&amp;id=68d3f8033fb9861b3d7aea89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-fake-ic3-websites-designed-to-steal-p-640ba295</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Fake%20IC3%20Websites%20Designed%20to%20Steal%20Personal%20Data&amp;severity=medium&amp;id=68d3b835338068972fd9466f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41716-cwe-306-missing-authentication-for--828e5eec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41716%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WAGO%20Solution%20Builder&amp;severity=medium&amp;id=68d3ed6119ed1d2da320950b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41715-cwe-306-missing-authentication-for--7f501764</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41715%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WAGO%20Device%20Sphere&amp;severity=critical&amp;id=68d3f06d37fc381b138d5358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boyd-gaming-discloses-data-breach-after-suffering--b43a46fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boyd%20Gaming%20discloses%20data%20breach%20after%20suffering%20a%20cyberattack&amp;severity=high&amp;id=68d3b2b0aa9793035950f590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-hides-malware-in-steganographic-qr-cod-4900fdbc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Npm%20Package%20Hides%20Malware%20in%20Steganographic%20QR%20Codes&amp;severity=high&amp;id=68e469f36a45552f36e907b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/state-sponsored-hackers-exploiting-libraesva-email-c46f6480</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=State-Sponsored%20Hackers%20Exploiting%20Libraesva%20Email%20Security%20Gateway%20Vulnerability&amp;severity=high&amp;id=68d3b2b0aa9793035950f594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9031-cwe-208-observable-timing-discrepanc-71a73537</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9031%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20DivvyDrive%20Information%20Technologies%20Inc.%20DivvyDrive%20Web&amp;severity=medium&amp;id=68d3ae7056b277b1e6ee79fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48392-dos-vulnerability-in-apache-softwar-7f551281</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48392%3A%20DoS%20Vulnerability%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=high&amp;id=68d3a5ab039276d2d8ab6599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48459-cwe-502-deserialization-of-untruste-6d053ec7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48459%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=medium&amp;id=68d3a5ab039276d2d8ab659c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58319-cwe-121-stack-based-buffer-overflow-5d36d61c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58319%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20CNCSoft-G2&amp;severity=high&amp;id=68d3f06d37fc381b138d535e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58317-cwe-121-stack-based-buffer-overflow-9935dc50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58317%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20CNCSoft-G2&amp;severity=high&amp;id=68d3f06d37fc381b138d535b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43819-cwe-613-insufficient-session-expira-628bf9d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43819%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d34db5712f26b964cfef9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-leans-on-researcher-pocs-to-spy-on-oth-0a0349ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Leans%20on%20Researcher%20PoCs%20to%20Spy%20on%20Other%20Countries&amp;severity=medium&amp;id=68e469f36a45552f36e907b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43779-cwe-79-cross-site-scripting-in-life-b18ce1d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43779%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d34329712f26b964cf395c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/as-incidents-rise-japanese-governments-cybersecuri-2ba49cae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=As%20Incidents%20Rise%2C%20Japanese%20Government&apos;s%20Cybersecurity%20Falls%20Short&amp;severity=critical&amp;id=68e469f36a45552f36e907b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-24-1a8a747c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-24&amp;severity=medium&amp;id=68d489c32f6beace9efc3b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57321-na-21146e68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57321%3A%20n%2Fa&amp;severity=critical&amp;id=68d487f92f6beace9efc357c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57324-na-83a04c9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57324%3A%20n%2Fa&amp;severity=medium&amp;id=68d487f92f6beace9efc3574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57318-na-8da35515</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57318%3A%20n%2Fa&amp;severity=high&amp;id=68d45ac00d8469b2375cd9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57320-na-c0e926f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57320%3A%20n%2Fa&amp;severity=medium&amp;id=68d457a3d6be26694ed76f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57319-na-fa28a917</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57319%3A%20n%2Fa&amp;severity=high&amp;id=68d457a3d6be26694ed76f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57323-na-fbc1aa89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57323%3A%20n%2Fa&amp;severity=high&amp;id=68d453e8af778555c6843a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57327-na-9dd59f9a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57327%3A%20n%2Fa&amp;severity=high&amp;id=68d44aefd55094fd7eb40f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57326-na-972f6eff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57326%3A%20n%2Fa&amp;severity=high&amp;id=68d44aefd55094fd7eb40f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57325-na-6a7f1eef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57325%3A%20n%2Fa&amp;severity=high&amp;id=68d4466ec748203f5defd9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57329-na-b52d114a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57329%3A%20n%2Fa&amp;severity=high&amp;id=68d4442e04102bfdeaaefe70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57328-na-c0ebb878</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57328%3A%20n%2Fa&amp;severity=high&amp;id=68d4442e04102bfdeaaefe6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57330-na-7fc1635c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57330%3A%20n%2Fa&amp;severity=high&amp;id=68d441f3006fc02db7d1f73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57349-na-e409666c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57349%3A%20n%2Fa&amp;severity=high&amp;id=68d440702e3ca83904e5f27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57347-na-db157bef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57347%3A%20n%2Fa&amp;severity=critical&amp;id=68d43b319524cade097fb1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57351-na-4e248591</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57351%3A%20n%2Fa&amp;severity=medium&amp;id=68d4384798715fbf47f03b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57348-na-dffd3f8e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57348%3A%20n%2Fa&amp;severity=medium&amp;id=68d4384798715fbf47f03b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59305-na-1bc64ff5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59305%3A%20n%2Fa&amp;severity=high&amp;id=68d4352b82e2e362236e2489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57354-na-df6765d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57354%3A%20n%2Fa&amp;severity=medium&amp;id=68d4352b82e2e362236e2485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57353-na-61042408</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57353%3A%20n%2Fa&amp;severity=medium&amp;id=68d4352b82e2e362236e2481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57352-na-f94bc7a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57352%3A%20n%2Fa&amp;severity=medium&amp;id=68d4352b82e2e362236e247d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57350-na-3bf800a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57350%3A%20n%2Fa&amp;severity=high&amp;id=68d4352b82e2e362236e2479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56241-na-0b3dff78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56241%3A%20n%2Fa&amp;severity=high&amp;id=68d432ed74b22954c493700a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56816-na-131ad68a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56816%3A%20n%2Fa&amp;severity=high&amp;id=68d41e84617790002496d578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56815-na-149f45c9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56815%3A%20n%2Fa&amp;severity=high&amp;id=68d41e84617790002496d574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56819-na-a2081b76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56819%3A%20n%2Fa&amp;severity=critical&amp;id=68d4186d03ebb2084b0a22f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57882-cwe-404-improper-resource-shutdown--c886b9ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57882%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=high&amp;id=68d32020e9e7eb6a1ad1b627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55038-cwe-862-missing-authorization-in-au-302f2446</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55038%3A%20CWE-862%20Missing%20Authorization%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=high&amp;id=68d32020e9e7eb6a1ad1b623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58473-cwe-404-improper-resource-shutdown--0b58fd01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58473%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=high&amp;id=68d336ac712f26b964ce8e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55069-cwe-337-predictable-seed-in-pseudo--2d156863</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55069%3A%20CWE-337%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=high&amp;id=68d336ac712f26b964ce8e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-new-plugx-variant-abuses-dll-search-order-hi-bba25f7a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20new%20PlugX%20variant%20abuses%20DLL%20search%20order%20hijacking&amp;severity=medium&amp;id=68d3e458d2da9a2e8b223a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59484-cwe-327-use-of-a-broken-or-risky-cr-08b1c9fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59484%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=high&amp;id=68d31b57770bf6e4769153cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58069-cwe-321-use-of-hard-coded-cryptogra-eea845ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58069%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=medium&amp;id=68d31b57770bf6e4769153cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54855-cwe-312-cleartext-storage-of-sensit-dd069e61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54855%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=medium&amp;id=68d319714a1305fb85d6f649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/artificial-intelligence-exposes-the-homoglyph-hust-58c93655</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Artificial%20Intelligence%20Exposes%20the%20Homoglyph%20Hustle&amp;severity=medium&amp;id=68d317c4524e610dd61415f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixed-entra-id-vulnerability-allowing-gl-08075b60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Fixed%20Entra%20ID%20Vulnerability%20Allowing%20Global%20Admin%20Impersonation&amp;severity=medium&amp;id=68d310a8aab392951c79d260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-aims-to-secure-supply-chain-as-npm-hacks-ra-d1798a5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Aims%20to%20Secure%20Supply%20Chain%20as%20NPM%20Hacks%20Ramp%20Up&amp;severity=high&amp;id=68e469f36a45552f36e907bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-docker-daemons-fuel-ddos-botnet-c49ce35f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20Docker%20Daemons%20Fuel%20DDoS%20Botnet&amp;severity=medium&amp;id=68e469f36a45552f36e907be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59826-cwe-862-missing-authorization-in-fl-5d6e88a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59826%3A%20CWE-862%3A%20Missing%20Authorization%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=68d3042b708c92a6e0eb25ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59825-cwe-22-improper-limitation-of-a-pat-8c39d5c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59825%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20astral-sh%20tokio-tar&amp;severity=medium&amp;id=68d336ac712f26b964ce8e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58674-cwe-79-improper-neutralization-of-i-85ecbf39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58674%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Automattic%20WordPress&amp;severity=medium&amp;id=68d2ec7f8890fd6c4196a550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tea-continued-unauthenticated-access-to-150-fireba-dc3dc99f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tea%20continued%20-%20Unauthenticated%20access%20to%20150%2B%20Firebase%20databases%2C%20storage%20buckets%20and%20secrets&amp;severity=medium&amp;id=68d2eaf7ad5bdf3150921890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dark-reading-confidential-battle-space-cyber-pros--d6d8404b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dark%20Reading%20Confidential%3A%20Battle%20Space%3A%20Cyber%20Pros%20Land%20on%20the%20Front%20Lines%20of%20Protecting%20US%20Critical%20Infrastructure&amp;severity=critical&amp;id=68e469f36a45552f36e907c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-mitigates-new-record-breaking-222-tbps--3598993a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20mitigates%20new%20record-breaking%2022.2%20Tbps%20DDoS%20attack&amp;severity=high&amp;id=68d2e88b629c4b332c8f25ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/libraesva-esg-issues-emergency-fix-for-bug-exploit-d30394b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Libraesva%20ESG%20issues%20emergency%20fix%20for%20bug%20exploited%20by%20state%20hackers&amp;severity=critical&amp;id=68d2e88b629c4b332c8f25f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59534-cwe-78-improper-neutralization-of-s-2373c0ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59534%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=68d336ad712f26b964ce8eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54081-cwe-428-unquoted-search-path-or-ele-26d28f3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54081%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20LizardByte%20Sunshine&amp;severity=medium&amp;id=68d336ad712f26b964ce8eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59548-cwe-79-improper-neutralization-of-i-a987a7fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59548%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68d336ad712f26b964ce8ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59547-cwe-176-improper-handling-of-unicod-1b3d613b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59547%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68d2e0155bd4b74a8e69d44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52905-cwe-20-improper-input-validation-in-7529b75b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52905%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TOTOLINK%20X6000R&amp;severity=high&amp;id=68d2e0155bd4b74a8e69d443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8410-cwe-416-use-after-free-in-rti-connex-36a6b078</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8410%3A%20CWE-416%20Use%20After%20Free%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=68d2e0155bd4b74a8e69d44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4993-cwe-822-untrusted-pointer-dereferenc-fac093fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4993%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=68d2e0155bd4b74a8e69d440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4582-cwe-126-buffer-over-read-in-rti-conn-0476629d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4582%3A%20CWE-126%20Buffer%20Over-read%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=68d2e0155bd4b74a8e69d43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1255-cwe-822-untrusted-pointer-dereferenc-67f9a1dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1255%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=68d2de69f9236bec1dff86d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59821-cwe-79-improper-neutralization-of-i-5b11304c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59821%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68d336ad712f26b964ce8eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59546-cwe-79-improper-neutralization-of-i-e2ad5313</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59546%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=low&amp;id=68d336ad712f26b964ce8ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59545-cwe-79-improper-neutralization-of-i-87f7a7d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59545%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=critical&amp;id=68d336ad712f26b964ce8ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59539-cwe-79-improper-neutralization-of-i-ac077122</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59539%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68d336ad712f26b964ce8ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0672-vulnerability-in-wso2-wso2-identity--c26227b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0672%3A%20Vulnerability%20in%20WSO2%20WSO2%20Identity%20Server%20as%20Key%20Manager&amp;severity=low&amp;id=68d2da7af7fe4c56f0792df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58246-cwe-201-insertion-of-sensitive-info-faa1a700</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58246%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Automattic%20WordPress&amp;severity=medium&amp;id=68d2d9b550473c5b345e2613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0209-cwe-79-improper-neutralization-of-in-9bb00173</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0209%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=68d2d9b550473c5b345e2610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0663-vulnerability-in-wso2-wso2-open-bank-ab606ad5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0663%3A%20Vulnerability%20in%20WSO2%20WSO2%20Open%20Banking%20IAM&amp;severity=medium&amp;id=68d2d2a01f3dbb78c7815c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-dismantles-crypto-fraud-ring-linked-to-100--d63918e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20dismantles%20crypto%20fraud%20ring%20linked%20to%20%E2%82%AC100%20million%20in%20losses&amp;severity=high&amp;id=68d2cdf4cb0d0cd450bbd7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-secret-service-dismantled-covert-communications-1fd06b9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Secret%20Service%20dismantled%20covert%20communications%20network%20near%20the%20U.N.%20in%20New%20York&amp;severity=medium&amp;id=68d2cdf4cb0d0cd450bbd7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hacking-group-nimbus-manticore-expands-eur-ee45e676</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hacking%20Group%20Nimbus%20Manticore%20Expands%20European%20Targeting&amp;severity=high&amp;id=68d2cdf4cb0d0cd450bbd7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-says-hackers-breached-federal-agency-using-ge-394f65bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20says%20hackers%20breached%20federal%20agency%20using%20GeoServer%20exploit&amp;severity=high&amp;id=68d2cdf4cb0d0cd450bbd7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9900-write-what-where-condition-in-red-ha-9474a469</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9900%3A%20Write-what-where%20Condition&amp;severity=high&amp;id=68d2cd2b61502ab9d1baaff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5717-cwe-94-improper-control-of-generatio-6da69580</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5717%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=68d336ae712f26b964ce8ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-nimbus-manticore-hackers-use-fake-job-lure-7c72d3b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Nimbus%20Manticore%20Hackers%20Use%20Fake%20Job%20Lures%20to%20Breach%20Europe%E2%80%99s%20Critical%20Industries&amp;severity=critical&amp;id=68d2c475682ef734db53f9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4760-cwe-79-improper-neutralization-of-in-2bd5f65a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=68d2b59aa487dda776f3b297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6921-cwe-400-uncontrolled-resource-consum-b5c773f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6921%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=68d2a78d3a159a196863e81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8354-cwe-843-type-confusion-in-autodesk-r-9aa50fa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8354%3A%20CWE-843%20Type%20Confusion%20in%20Autodesk%20Revit&amp;severity=high&amp;id=68d2a1f477d80345469516fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9844-cwe-427-uncontrolled-search-path-ele-a3c375de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9844%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Salesforce%20Salesforce%20CLI&amp;severity=high&amp;id=68d29eae037b8c5ce43060c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10184-cwe-862-missing-authorization-in-on-2f573df7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10184%3A%20CWE-862%20Missing%20Authorization%20in%20OnePlus%20OxygenOS&amp;severity=high&amp;id=68d29b75ad0b11e5ad17acba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9846-cwe-434-unrestricted-upload-of-file--0a4cbb5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9846%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20TalentSys%20Consulting%20Information%20Technology%20Industry%20Inc.%20Inka.Net&amp;severity=critical&amp;id=68d2983f801f4b8d29164198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9966-cwe-269-improper-privilege-managemen-aa51e822</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9966%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Novakon%20P%20series%20(P07%2C%20P10%2C%20P12%2C%20P15)&amp;severity=high&amp;id=68d336ad712f26b964ce8ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9965-cwe-287-improper-authentication-in-n-9f256acf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9965%3A%20CWE-287%20Improper%20Authentication%20in%20Novakon%20P%20series%20(P07%2C%20P10%2C%20P12%2C%20P15)&amp;severity=critical&amp;id=68d336ad712f26b964ce8ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9964-cwe-521-weak-password-requirements-i-f1fe4416</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9964%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Novakon%20P%20series%20(P07%2C%20P10%2C%20P12%2C%20P15)&amp;severity=high&amp;id=68d336ad712f26b964ce8e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10244-cwe-79-cross-site-scripting-xss-sto-213aeb68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10244%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=68d336ac712f26b964ce8e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inc-ransomware-claims-57-tb-of-data-theft-at-penns-b82f0ea9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inc%20Ransomware%20Claims%205.7%20TB%20of%20Data%20Theft%20at%20Pennsylvania%20Attorney%20General&amp;severity=medium&amp;id=68d280b34049718c66f8cc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9963-cwe-22-improper-limitation-of-a-path-b8af4764</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9963%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Novakon%20P%20series%20(P07%2C%20P10%2C%20P12%2C%20P15)&amp;severity=critical&amp;id=68d336ac712f26b964ce8e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9962-cwe-120-buffer-copy-without-checking-4b528906</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9962%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Novakon%20P%20series%20(P07%2C%20P10%2C%20P12%2C%20P15)&amp;severity=critical&amp;id=68d27feb7aa9807c1fd5a5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seo-poisoning-campaign-tied-to-chinese-actor-1670513d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEO%20Poisoning%20Campaign%20Tied%20to%20Chinese%20Actor&amp;severity=medium&amp;id=68e469f36a45552f36e907c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7106-cwe-284-improper-access-control-in-d-942186d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7106%3A%20CWE-284%20Improper%20Access%20Control%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68d336ac712f26b964ce8e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10412-cwe-434-unrestricted-upload-of-file-e21a6693</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10412%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20MooMoo%20Product%20Options%20and%20Price%20Calculation%20Formulas%20for%20WooCommerce%20%E2%80%93%20Uni%20CPO%20(Premium)&amp;severity=critical&amp;id=68d269a359387df52bc4222b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9342-cwe-639-authorization-bypass-through-16e052aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9342%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Anadolu%20Hayat%20Emeklilik%20Inc.%20AHE%20Mobile&amp;severity=medium&amp;id=68d336ac712f26b964ce8e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badiis-malware-spreads-via-seo-poisoning-redirects-f2362814</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BadIIS%20Malware%20Spreads%20via%20SEO%20Poisoning%20%E2%80%94%20Redirects%20Traffic%2C%20Plants%20Web%20Shells&amp;severity=high&amp;id=68d26628ca3a77e99b9174c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-rewrite-chinese-speaking-threat-actors-d-fc26b654</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Rewrite%3A%20Chinese-Speaking%20Threat%20Actors%20Deploy%20BadIIS%20in%20a%20Wide%20Scale%20SEO%20Poisoning%20Campaign&amp;severity=medium&amp;id=68d31564c30b0a5e712e6a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9798-cwe-79-improper-neutralization-of-in-59435c92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9798%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netcad%20Software%20Inc.%20Netigma&amp;severity=high&amp;id=68d25ea083280103b6dcf47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10857-sql-injection-in-campcodes-point-of-1c9963c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10857%3A%20SQL%20Injection%20in%20Campcodes%20Point%20of%20Sale%20System%20POS&amp;severity=medium&amp;id=68d25c4623e5eeb014d89dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10147-cwe-434-unrestricted-upload-of-file-49fe7271</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10147%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20eteubert%20Podlove%20Podcast%20Publisher&amp;severity=critical&amp;id=68d25c4623e5eeb014d89dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10851-sql-injection-in-campcodes-gym-mana-a487bc32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10851%3A%20SQL%20Injection%20in%20Campcodes%20Gym%20Management%20System&amp;severity=medium&amp;id=68d336ac712f26b964ce8e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9588-cwe-78-improper-neutralization-of-sp-e2c95a7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9588%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Iron%20Mountain%20Archiving%20Services%20Inc.%20enVision&amp;severity=critical&amp;id=68d336ad712f26b964ce8ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blacklock-ransomware-from-meteoric-rise-to-sudden--7c748ff1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlackLock%20Ransomware%3A%20From%20Meteoric%20Rise%20to%20Sudden%20Disruption&amp;severity=medium&amp;id=68d24e1f93e351beddcc1685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10848-sql-injection-in-campcodes-society--3738474a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10848%3A%20SQL%20Injection%20in%20Campcodes%20Society%20Membership%20Information%20System&amp;severity=medium&amp;id=68d336ad712f26b964ce8ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10846-sql-injection-in-portabilis-i-educa-e3aedad8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10846%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d247e7cc150725e5c5bdc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10548-cwe-295-improper-certificate-valida-f93ec92c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10548%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20CleverControl%20CleverControl%20employee%20monitoring%20software&amp;severity=medium&amp;id=68d336ac712f26b964ce8e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10845-sql-injection-in-portabilis-i-educa-58697547</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10845%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d336ad712f26b964ce8ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10844-sql-injection-in-portabilis-i-educa-4a66cded</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10844%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d336ad712f26b964ce8e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10843-sql-injection-in-reservation-online-e663e6ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10843%3A%20SQL%20Injection%20in%20Reservation%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68d336ad712f26b964ce8e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10842-sql-injection-in-code-projects-onli-c4df817f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10842%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d336ad712f26b964ce8e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39867-13022e61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39867&amp;severity=null&amp;id=68db1fa7a473ffe031e278fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8282-cwe-79-cross-site-scripting-xss-in-s-ec953e45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8282%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20SureForms&amp;severity=low&amp;id=68d336ad712f26b964ce8eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10841-sql-injection-in-code-projects-onli-391eec87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10841%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d336ad712f26b964ce8e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26399-cwe-502-deserialization-of-untruste-8d02c526</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26399%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=68d22c2079681e6adcf142e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10840-sql-injection-in-sourcecodester-pet-4040d471</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10840%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d22c2079681e6adcf142e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10839-sql-injection-in-sourcecodester-pet-283a6391</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10839%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d2f210c36d6fa294642ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10838-buffer-overflow-in-tenda-ac21-a554c5f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10838%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=68d2f210c36d6fa294642acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9321-cwe-94-improper-control-of-generatio-997dc117</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9321%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpsight%20WPCasa&amp;severity=critical&amp;id=68d223009de83c5ed4d8df56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10837-cross-site-scripting-in-code-projec-6070ae52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10837%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68d2a78d3a159a196863e821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8902-cwe-79-improper-neutralization-of-in-0f8dae9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marketing%20Fire%2C%20LLC%20Widget%20Options%20-%20Extended&amp;severity=medium&amp;id=68d218bcefb46fd0305fd7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10380-cwe-1336-improper-neutralization-of-e93fd060</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10380%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20wplakeorg%20Advanced%20Views%20%E2%80%93%20Display%20Custom%20Fields%20(ACF%2C%20Pods%2C%20MetaBox)%2C%20Posts%2C%20CPT%20and%20Woo%20Products%20anywhere%20in%20Gutenberg%2C%20Elementor%2C%20Divi%2C%20Beaver%E2%80%A6&amp;severity=high&amp;id=68d218bcefb46fd0305fd7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10836-sql-injection-in-sourcecodester-pet-e5d736ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10836%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d218bcefb46fd0305fd7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10835-sql-injection-in-sourcecodester-pet-0b0d3956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10835%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d218bcefb46fd0305fd7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10834-sql-injection-in-itsourcecode-open--55e301e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10834%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d20e31efb46fd0305d8b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10833-sql-injection-in-1000projects-books-bb191fed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10833%3A%20SQL%20Injection%20in%201000projects%20Bookstore%20Management%20System&amp;severity=medium&amp;id=68d20aadefb46fd0305d7203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58915-cwe-79-improper-neutralization-of-i-baff75bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58915%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Request%20a%20Quote&amp;severity=null&amp;id=68d203c6efb46fd0305d3b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10832-sql-injection-in-sourcecodester-pet-14fba08d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10832%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d203c6efb46fd0305d3b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42907-cwe-918-server-side-request-forgery-250599d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42907%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20in%20SAP_SE%20SAP%20BI%20Platform&amp;severity=medium&amp;id=68d203c6efb46fd0305d3b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10831-sql-injection-in-campcodes-computer-119e2cbd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10831%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d1fc9cefb46fd030595bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10830-sql-injection-in-campcodes-computer-382f9a84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10830%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d1fc9cefb46fd030595ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9495-cwe-602-client-side-enforcement-of-s-96538e55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9495%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Viessmann%20Vitogate%20300&amp;severity=high&amp;id=68d1fc9cefb46fd030595bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9494-cwe-78-improper-neutralization-of-sp-66f87e2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9494%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Viessmann%20Vitogate%20300&amp;severity=high&amp;id=68d1fc9cefb46fd030595bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10829-sql-injection-in-campcodes-computer-b1ef290a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10829%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d1fc9cefb46fd030595b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10828-sql-injection-in-sourcecodester-pet-d5d55fb1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10828%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d1fc9cefb46fd030595b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10827-cross-site-scripting-in-phpjabbers--dd45a57f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10827%3A%20Cross%20Site%20Scripting%20in%20PHPJabbers%20Restaurant%20Menu%20Maker&amp;severity=medium&amp;id=68d1ee8defb46fd030578117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10826-sql-injection-in-campcodes-online-b-18cb75a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10826%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d1ee8defb46fd030578110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10825-sql-injection-in-campcodes-online-b-f23233b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10825%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d1ee8defb46fd030578109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10824-use-after-free-in-axboe-fio-4ea45fe7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10824%3A%20Use%20After%20Free%20in%20axboe%20fio&amp;severity=medium&amp;id=68d1ee8defb46fd030578102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-23-c97ca54f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-23&amp;severity=medium&amp;id=68d3388c712f26b964cea694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57407-na-529deacc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57407%3A%20n%2Fa&amp;severity=medium&amp;id=68d336ae712f26b964ce8f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29084-na-deefe8b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29084%3A%20n%2Fa&amp;severity=medium&amp;id=68d336ae712f26b964ce8f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29083-na-e0b7aa9e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29083%3A%20n%2Fa&amp;severity=medium&amp;id=68d336ae712f26b964ce8f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55780-na-dc9b3075</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55780%3A%20n%2Fa&amp;severity=high&amp;id=68d336ae712f26b964ce8efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57638-na-c36569af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57638%3A%20n%2Fa&amp;severity=high&amp;id=68d336ad712f26b964ce8edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45326-na-2a460d40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45326%3A%20n%2Fa&amp;severity=medium&amp;id=68d336ad712f26b964ce8ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57636-na-72b41799</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57636%3A%20n%2Fa&amp;severity=medium&amp;id=68d336ac712f26b964ce8e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56311-na-52e21a3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56311%3A%20n%2Fa&amp;severity=medium&amp;id=68d301ca02d8cd39a20f2f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51005-na-90db0c42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51005%3A%20n%2Fa&amp;severity=high&amp;id=68d2f210c36d6fa294642aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57637-na-bf802e5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57637%3A%20n%2Fa&amp;severity=high&amp;id=68d2ec7f8890fd6c4196a54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56146-na-9f84275d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56146%3A%20n%2Fa&amp;severity=medium&amp;id=68d2ec7f8890fd6c4196a549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57639-na-a797b67b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57639%3A%20n%2Fa&amp;severity=medium&amp;id=68d2e0155bd4b74a8e69d447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56394-na-6d99e150</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56394%3A%20n%2Fa&amp;severity=high&amp;id=68d2da7bf7fe4c56f0792df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56304-na-90b04fb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56304%3A%20n%2Fa&amp;severity=medium&amp;id=68d2d435b8769c2ff1af173a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/comicform-and-sectorj149-hackers-deploy-formbook-m-fa0ce93c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ComicForm%20and%20SectorJ149%20Hackers%20Deploy%20Formbook%20Malware%20in%20Eurasian%20Cyberattacks&amp;severity=high&amp;id=68d1e09447a4e463e993677a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automaker-giant-stellantis-confirms-data-breach-af-ecad2255</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automaker%20giant%20Stellantis%20confirms%20data%20breach%20after%20Salesforce%20hack&amp;severity=high&amp;id=68d1e09447a4e463e9936776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10823-null-pointer-dereference-in-axboe-f-08d934bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10823%3A%20NULL%20Pointer%20Dereference%20in%20axboe%20fio&amp;severity=medium&amp;id=68d1ddf8e7559940ff19a781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10822-improper-authorization-in-fuyanglip-3ccc96c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10822%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68d1ddf8e7559940ff19a77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10821-improper-authorization-in-fuyanglip-7194358f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10821%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68d1d6fd72b9f38792d8c73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43814-cwe-201-insertion-of-sensitive-info-e9a17271</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43814%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d1d6fd72b9f38792d8c740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jeep-and-dodge-parent-company-stellantis-confirms--95584c0c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jeep%20and%20Dodge%20Parent%20Company%20Stellantis%20Confirms%20Customer%20Data%20Breach&amp;severity=high&amp;id=68d1d0c313c60b927364ef08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10820-improper-authorization-in-fuyanglip-3d28d538</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10820%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68d1cf046f645f121d636567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10819-improper-authorization-in-fuyanglip-cb6a838d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10819%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68d1cf046f645f121d636561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43810-cwe-639-authorization-bypass-throug-32a88e1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43810%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d1cf046f645f121d63656d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/journeys-in-hosting-1x-precomputed-ssh-host-keys-5585ca41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Journeys%20in%20Hosting%201%2Fx%20-%20Precomputed%20SSH%20Host%20Keys&amp;severity=medium&amp;id=68d1c85eeb6ae793d1252b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10817-sql-injection-in-campcodes-online-l-9cb68880</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10817%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d1c7fdeb6ae793d124fcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43806-cwe-863-incorrect-authorization-in--8d228220</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43806%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d1e592efb46fd030526285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nimbus-manticore-deploys-new-malware-targeting-eur-e1b75e3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nimbus%20Manticore%20Deploys%20New%20Malware%20Targeting%20Europe&amp;severity=medium&amp;id=68d1c40bb929db36a9e2ef69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10816-xml-external-entity-reference-in-ji-c8482a2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10816%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68d1c0e126675e69899f01e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10815-buffer-overflow-in-tenda-ac20-f5a501a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10815%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68d1bb698864f11789659da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47910-cwe-284-improper-access-control-in--2384e190</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47910%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Go%20standard%20library%20net%2Fhttp&amp;severity=medium&amp;id=68d1bb698864f11789659dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59535-cwe-20-improper-input-validation-in-b31abf9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59535%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68d1b91e11da864c54429234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10814-command-injection-in-d-link-dir-823-9903e2ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10814%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d1b30dc6427514cac5c44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59532-cwe-20-improper-input-validation-in-34aab972</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59532%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20openai%20codex&amp;severity=high&amp;id=68d1b30dc6427514cac5c458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10813-sql-injection-in-code-projects-host-f936c6ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10813%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d1ac52392f2f9b111eeef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59528-cwe-94-improper-control-of-generati-dfa0f2a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59528%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=68d1aabbdb6dbbc21876f6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59527-cwe-918-server-side-request-forgery-1d15220a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59527%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68d1a936f1c6cd98eca24e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-zloader-updates-6cab1124</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20Zloader%20Updates&amp;severity=medium&amp;id=68d1bb688864f11789659d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59434-cwe-200-exposure-of-sensitive-infor-86ff019a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59434%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=68d1a62ada28327339612ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10812-sql-injection-in-code-projects-host-50de9478</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10812%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d1a4acfea788f604d983ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59526-cwe-79-improper-neutralization-of-i-2cbd7ae2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59526%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eladnava%20mailgen&amp;severity=low&amp;id=68d1a4acfea788f604d983c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59432-cwe-208-observable-timing-discrepan-3c70ca46</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59432%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20ongres%20scram&amp;severity=medium&amp;id=68d1a3298715dc2382a2ce15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10811-sql-injection-in-code-projects-host-c01fa95b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10811%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d19f5ffdac247d64feb198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8892-cwe-120-buffer-copy-without-checking-94f5ad6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8892%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68d19f5ffdac247d64feb19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59430-cwe-79-improper-neutralization-of-i-56e85d71</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59430%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FrontFin%20mesh-web-sdk&amp;severity=high&amp;id=68d19a1a93431051bd470175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10810-sql-injection-in-campcodes-online-l-0df56d7f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10810%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d197d505d26ef41525082f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58956-cwe-352-cross-site-request-forgery--d5a9b6d0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58956%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20loopus%20WP%20Attractive%20Donations%20System&amp;severity=null&amp;id=68d197d705d26ef4152508ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58957-cwe-862-missing-authorization-in-vi-61ae61e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58957%3A%20Missing%20Authorization%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=68d197d705d26ef4152508d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58960-cwe-79-improper-neutralization-of-i-cb1c1bdb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brijeshk89%20IP%20Based%20Login&amp;severity=null&amp;id=68d197d705d26ef4152508d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58965-cwe-79-improper-neutralization-of-i-f67d5c0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58965%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agency%20Dominion%20Inc.%20Fusion%20Page%20Builder%20%3A%20Extension%20%26%238211%3B%20Gallery&amp;severity=null&amp;id=68d197d705d26ef4152508f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58968-cwe-862-missing-authorization-in-ch-6fa891d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58968%3A%20Missing%20Authorization%20in%20Christiaan%20Pieterse%20MaxiBlocks&amp;severity=null&amp;id=68d197d705d26ef4152508f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58969-cwe-862-missing-authorization-in-gr-0907a2e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58969%3A%20Missing%20Authorization%20in%20Greg%20Winiarski%20Custom%20Login%20URL&amp;severity=null&amp;id=68d197d705d26ef4152508fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58973-cwe-98-improper-control-of-filename-40fd2ef3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58973%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=68d197d705d26ef4152508ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58974-cwe-79-improper-neutralization-of-i-fafdad1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58974%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20WPComplete&amp;severity=null&amp;id=68d197d705d26ef415250902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58992-cwe-79-improper-neutralization-of-i-c0aa0922</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20impleCode%20Product%20Catalog%20Simple&amp;severity=null&amp;id=68d197d705d26ef415250905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59549-cwe-79-improper-neutralization-of-i-1f9f0d1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20GetResponse%20Forms&amp;severity=null&amp;id=68d197d705d26ef415250908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59551-cwe-862-missing-authorization-in-wp-53ead58e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59551%3A%20Missing%20Authorization%20in%20WP%20Chill%20Revive.so&amp;severity=null&amp;id=68d197d705d26ef41525090b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59552-cwe-79-improper-neutralization-of-i-63a58de1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pdfcrowd%20Dev%20Team%20Save%20as%20PDF&amp;severity=null&amp;id=68d197d705d26ef41525090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59553-cwe-79-improper-neutralization-of-i-da917350</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Coderz%20Studio%20Custom%20iFrame%20for%20Elementor&amp;severity=null&amp;id=68d197d705d26ef415250911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59559-cwe-862-missing-authorization-in-pa-8629f846</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59559%3A%20Missing%20Authorization%20in%20payrexx%20Payrexx%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=68d197d805d26ef41525092c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59561-cwe-862-missing-authorization-in-ha-4a2012f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59561%3A%20Missing%20Authorization%20in%20hashthemes%20Smart%20Blocks&amp;severity=null&amp;id=68d197d805d26ef41525092f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59562-authorization-bypass-through-user-c-4fc62140</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59562%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Kodezen%20LLC%20Academy%20LMS&amp;severity=null&amp;id=69cd7410e6bfc5ba1def503b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59565-cwe-79-improper-neutralization-of-i-53087b9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59565%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Swings%20Upsell%20Order%20Bump%20Offer%20for%20WooCommerce&amp;severity=null&amp;id=68d197d805d26ef415250932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59567-cwe-862-missing-authorization-in-el-ca8cadd1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59567%3A%20Missing%20Authorization%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20Coupon%20Affiliates&amp;severity=null&amp;id=68d197d805d26ef415250935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59569-cwe-79-improper-neutralization-of-i-b72c2fc0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59569%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=null&amp;id=68d197d805d26ef415250938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59570-cwe-89-improper-neutralization-of-s-165e3e22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59570%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFunnels%20Mail%20Mint&amp;severity=null&amp;id=68d197d805d26ef41525093b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59572-cwe-352-cross-site-request-forgery--35a2ad89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20purethemes%20WorkScout-Core&amp;severity=null&amp;id=68d197d805d26ef41525093e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59573-cwe-80-improper-neutralization-of-s-c53825ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59573%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20CozyThemes%20Cozy%20Blocks&amp;severity=null&amp;id=68d197d805d26ef415250941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59576-cwe-862-missing-authorization-in-st-74d710e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59576%3A%20Missing%20Authorization%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=68d197d805d26ef415250944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59577-cwe-362-concurrent-execution-using--9ab3038e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59577%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=68d197d805d26ef415250947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59581-cwe-862-missing-authorization-in-vw-b1291058</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59581%3A%20Missing%20Authorization%20in%20VW%20THEMES%20Ibtana&amp;severity=null&amp;id=68d197d905d26ef41525095d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59582-cwe-497-exposure-of-sensitive-syste-fdf0c41a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59582%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Darren%20Cooney%20Ajax%20Load%20More&amp;severity=null&amp;id=68d197d905d26ef415250960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59583-cwe-79-improper-neutralization-of-i-f19d06d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59583%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Filter%20Everything&amp;severity=null&amp;id=68d197d905d26ef415250963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59584-cwe-79-improper-neutralization-of-i-a905b0a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Podcast&amp;severity=null&amp;id=68d197d905d26ef415250966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59585-cwe-79-improper-neutralization-of-i-1c440e9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Recipe&amp;severity=null&amp;id=68d197d905d26ef415250969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59586-cwe-79-improper-neutralization-of-i-387411b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Portfolio&amp;severity=null&amp;id=68d197d905d26ef41525096c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59587-cwe-79-improper-neutralization-of-i-3cc4482d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Shortcodes%20%26%20Performance&amp;severity=null&amp;id=68d197d905d26ef41525096f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59588-cwe-98-improper-control-of-filename-0986c635</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59588%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PenciDesign%20Soledad&amp;severity=null&amp;id=68d197d905d26ef415250972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59589-cwe-79-improper-neutralization-of-i-966672e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Soledad&amp;severity=null&amp;id=68d197d905d26ef415250975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59590-cwe-79-improper-neutralization-of-i-19cf9ea1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=null&amp;id=68d197d905d26ef415250978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59591-cwe-862-missing-authorization-in-ad-502ada3f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59591%3A%20Missing%20Authorization%20in%20AdvancedCoding%20wpDiscuz&amp;severity=null&amp;id=68d197d905d26ef415250993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59592-cwe-79-improper-neutralization-of-i-ca0e16b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fernando%20Acosta%20Make%20Column%20Clickable%20Elementor&amp;severity=null&amp;id=68d197da05d26ef415250996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53450-cwe-98-improper-control-of-filename-ab3a2023</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53450%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Pluginwale%20Easy%20Pricing%20Table%20WP&amp;severity=null&amp;id=68d197d505d26ef415250839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53452-cwe-862-missing-authorization-in-ba-7ca89b9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53452%3A%20CWE-862%20Missing%20Authorization%20in%20Barry%20Event%20Rocket&amp;severity=medium&amp;id=68d197d505d26ef41525083f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53451-cwe-352-cross-site-request-forgery--eccb5046</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53451%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mihdan%20Mihdan%3A%20No%20External%20Links&amp;severity=null&amp;id=68d197d505d26ef41525083c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53454-cwe-79-improper-neutralization-of-i-f9109844</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rustaurius%20Ultimate%20WP%20Mail&amp;severity=null&amp;id=68d197d505d26ef415250842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53455-cwe-79-improper-neutralization-of-i-15766ee3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CashBill%20CashBill.pl%20%26%238211%3B%20P%C5%82atno%C5%9Bci%20WooCommerce&amp;severity=null&amp;id=68d197d505d26ef415250845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53456-cwe-352-cross-site-request-forgery--405c2597</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53456%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20activewebsight%20SEO%20Backlink%20Monitor&amp;severity=null&amp;id=68d197d505d26ef415250848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53457-cwe-918-server-side-request-forgery-b3f85067</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53457%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20activewebsight%20SEO%20Backlink%20Monitor&amp;severity=null&amp;id=68d197d505d26ef41525084b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53458-cwe-79-improper-neutralization-of-i-6322b41d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53458%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davaxi%20Goracash&amp;severity=null&amp;id=68d197d505d26ef41525084e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53459-9923ad27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53459&amp;severity=null&amp;id=68f8a4c3ce3bbdd80f2df547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36064-cwe-307-improper-restriction-of-exc-97395c4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36064%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20IBM%20Sterling%20Connect%3AExpress%20for%20Microsoft%20Windows&amp;severity=medium&amp;id=68d197d505d26ef415250836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53460-cwe-79-improper-neutralization-of-i-b463fed9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20AffiliateWP%20%E2%80%93%20External%20Referral%20Links&amp;severity=null&amp;id=68d197d605d26ef415250861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53461-cwe-918-server-side-request-forgery-1845b859</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53461%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Binsaifullah%20Beaf&amp;severity=null&amp;id=68d197d605d26ef415250864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53462-cwe-79-improper-neutralization-of-i-fe6abc4f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAPO%20SAPO%20Feed&amp;severity=null&amp;id=68d197d605d26ef415250867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53463-cwe-79-improper-neutralization-of-i-2da09a3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68d197d605d26ef41525086a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53464-cwe-79-improper-neutralization-of-i-0fced7c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Online%20Optimisation%20WP%20Mailto%20Links&amp;severity=null&amp;id=68d197d605d26ef41525086d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53465-cwe-502-deserialization-of-untruste-cbe4b2de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53465%3A%20Deserialization%20of%20Untrusted%20Data%20in%20raoinfotech%20GSheets%20Connector&amp;severity=null&amp;id=68d197d605d26ef415250870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53466-cwe-79-improper-neutralization-of-i-faf81789</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53466%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeSolz%20Better%20Find%20and%20Replace&amp;severity=null&amp;id=68d197d605d26ef415250873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53467-cwe-79-improper-neutralization-of-i-9faf576f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Login-Logout&amp;severity=null&amp;id=68d197d605d26ef415250876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53468-cwe-89-improper-neutralization-of-s-4b9ec101</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53468%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%40hotmail.com%20Wp%20tabber%20widget&amp;severity=null&amp;id=68d197d605d26ef415250879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53469-cwe-79-improper-neutralization-of-i-c967e145</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53469%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mortgage%20Calculator%20BMI%20Adult%20%26%20Kid%20Calculator&amp;severity=null&amp;id=68d197d605d26ef41525087c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53570-cwe-79-improper-neutralization-of-i-9efbae26</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=null&amp;id=68d197d605d26ef415250889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57898-cwe-79-improper-neutralization-of-i-fd967d69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jose%20Vega%20WP%20Frontend%20Admin&amp;severity=null&amp;id=68d197d605d26ef415250891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57899-cwe-862-missing-authorization-in-ar-462ce75a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57899%3A%20Missing%20Authorization%20in%20AresIT%20WP%20Compress&amp;severity=null&amp;id=68d197d605d26ef415250894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57900-cwe-79-improper-neutralization-of-i-c86b687c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57900%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ataur%20R%20GutenKit&amp;severity=null&amp;id=68d197d605d26ef415250897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57901-cwe-79-improper-neutralization-of-i-41c47566</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57901&amp;severity=null&amp;id=68d197d605d26ef41525089a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57902-cwe-352-cross-site-request-forgery--f1d2b576</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57902%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Md%20Taufiqur%20Rahman%20RIS%20Version%20Switcher%20%26%238211%3B%20Downgrade%20or%20Upgrade%20WP%20Versions%20Easily&amp;severity=null&amp;id=68d197d605d26ef41525089d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57903-cwe-79-improper-neutralization-of-i-a2124145</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPSuperiors%20Developer%20WooCommerce%20Additional%20Fees%20On%20Checkout%20(Free)&amp;severity=null&amp;id=68d197d605d26ef4152508a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57904-cwe-79-improper-neutralization-of-i-b5e352c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP-EXPERTS.IN%20Sales%20Count%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68d197d605d26ef4152508a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57905-cwe-352-cross-site-request-forgery--29b4a2d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57905%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Amin%20Y%20AgreeMe%20Checkboxes%20For%20WooCommerce&amp;severity=null&amp;id=68d197d605d26ef4152508a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57906-cwe-79-improper-neutralization-of-i-81ab3619</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20epeken%20Epeken%20All%20Kurir&amp;severity=null&amp;id=68d197d705d26ef4152508b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57907-cwe-862-missing-authorization-in-he-5f2399ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57907%3A%20Missing%20Authorization%20in%20Heureka%20Group%20Heureka&amp;severity=null&amp;id=68d197d705d26ef4152508bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57908-cwe-79-improper-neutralization-of-i-79bb1f5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57908%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ProWCPlugins%20Product%20Time%20Countdown%20for%20WooCommerce&amp;severity=null&amp;id=68d197d705d26ef4152508bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57909-cwe-862-missing-authorization-in-ro-039e8500</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57909%3A%20Missing%20Authorization%20in%20Rouergue%20Cr%C3%A9ation%20Editor%20Custom%20Color%20Palette&amp;severity=null&amp;id=68d197d705d26ef4152508c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57910-cwe-79-improper-neutralization-of-i-33505c69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57910%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AnyClip%20Video%20Platform%20AnyClip%20Luminous%20Studio&amp;severity=null&amp;id=68d197d705d26ef4152508c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57911-cwe-79-improper-neutralization-of-i-e0597bc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Adverts&amp;severity=null&amp;id=68d197d705d26ef4152508c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57912-cwe-79-improper-neutralization-of-i-371d71a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dialogity%20Dialogity%20Free%20Live%20Chat&amp;severity=null&amp;id=68d197d705d26ef4152508cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57913-cwe-79-improper-neutralization-of-i-bd6421da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57913%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57914-cwe-352-cross-site-request-forgery--afe04ee5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57914%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Matat%20Technologies%20Deliver%20via%20Shipos%20for%20WooCommerce&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57915-cwe-352-cross-site-request-forgery--6ff806ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57915%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20C%C3%A9sar%20Mart%C3%ADn%20TOCHAT.BE&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57916-cwe-497-exposure-of-sensitive-syste-ce07b05f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57916%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nurul%20Amin%20WP%20System%20Information&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57917-cwe-862-missing-authorization-in-pr-80002190</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57917%3A%20Missing%20Authorization%20in%20printcart%20Printcart%20Web%20to%20Print%20Product%20Designer%20for%20WooCommerce&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57918-cwe-352-cross-site-request-forgery--4ca2ae40</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57918%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ERA404%20LinkedInclude&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57919-cwe-502-deserialization-of-untruste-31c6b44e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57919%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ConveyThis%20Language%20Translate%20Widget%20for%20WordPress%20%E2%80%93%20ConveyThis&amp;severity=high&amp;id=68d194c4a6a0abbafb7a38f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57920-cwe-79-improper-neutralization-of-i-9a590dfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CK%20MacLeod%20Category%20Featured%20Images%20Extended&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57921-cwe-862-missing-authorization-in-n--5721fdc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57921%3A%20Missing%20Authorization%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57922-cwe-201-insertion-of-sensitive-info-ee80b0f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57922%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Coordinadora%20Mercantil%20S.A.%20Env%C3%ADos%20Coordinadora%20Woocommerce&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57923-cwe-201-insertion-of-sensitive-info-eef59c2c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57923%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ideal%20Postcodes%20UK%20Address%20Postcode%20Validation&amp;severity=null&amp;id=68d194c5a6a0abbafb7a391f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57924-cwe-352-cross-site-request-forgery--f91c38f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Automattic%20Developer&amp;severity=medium&amp;id=68d194c5a6a0abbafb7a3922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57925-cwe-98-improper-control-of-filename-8ee1ebab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57925%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20immonex%20immonex%20Kickstart%20Team&amp;severity=null&amp;id=68d194c5a6a0abbafb7a3926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57926-cwe-79-improper-neutralization-of-i-8cf6c6a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57926%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Passster&amp;severity=null&amp;id=68d194c5a6a0abbafb7a3929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57927-cwe-352-cross-site-request-forgery--5a0d5e0b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57927%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stephanie%20Leary%20Dashboard%20Notepad&amp;severity=null&amp;id=68d194c5a6a0abbafb7a392c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57928-cwe-80-improper-neutralization-of-s-5e8a3f3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57928%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Strategy11%20Team%20AWP%20Classifieds&amp;severity=null&amp;id=68d194c5a6a0abbafb7a392f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57929-cwe-79-improper-neutralization-of-i-69e692bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57929%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kanwei_doublethedonation%20Double%20the%20Donation&amp;severity=null&amp;id=68d194c5a6a0abbafb7a3932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57930-cwe-352-cross-site-request-forgery--4faf5ca1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57930%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kanwei_doublethedonation%20Double%20the%20Donation&amp;severity=null&amp;id=68d194c5a6a0abbafb7a3935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57932-cwe-79-improper-neutralization-of-i-bd51fa91</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Diego%20Pereira%20PowerFolio&amp;severity=null&amp;id=68d194c5a6a0abbafb7a3938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57933-cwe-352-cross-site-request-forgery--d0006550</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57933%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20piotnetdotcom%20Piotnet%20Forms&amp;severity=null&amp;id=68d194c5a6a0abbafb7a393b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57934-cwe-352-cross-site-request-forgery--bdda6483</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57934%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aur%C3%A9lien%20LWS%20LWS%20Affiliation&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57935-cwe-79-improper-neutralization-of-i-260d253c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57935%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ricky%20Dawn%20Bot%20Block%20%26%238211%3B%20Stop%20Spam%20Referrals%20in%20Google%20Analytics&amp;severity=null&amp;id=68d194c6a6a0abbafb7a395c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57936-cwe-862-missing-authorization-in-me-ac3e2e42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57936%3A%20Missing%20Authorization%20in%20Meitar%20Subresource%20Integrity%20(SRI)%20Manager&amp;severity=null&amp;id=68d194c6a6a0abbafb7a395f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57937-cwe-497-exposure-of-sensitive-syste-3ab3c170</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57937%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20etruel%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57938-cwe-79-improper-neutralization-of-i-1bab1db5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themewant%20Easy%20Hotel%20Booking&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57939-cwe-862-missing-authorization-in-bl-06af126f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57939%3A%20Missing%20Authorization%20in%20Blocksera%20Image%20Hover%20Effects%20%E2%80%93%20Elementor%20Addon&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57940-cwe-79-improper-neutralization-of-i-f7710226</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Suresh%20Kumar%20Mukhiya%20Append%20extensions%20on%20Pages&amp;severity=null&amp;id=68d194c6a6a0abbafb7a396c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57941-cwe-79-improper-neutralization-of-i-de3a202a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57941%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JonathanMH%20Append%20Link%20on%20Copy&amp;severity=null&amp;id=68d194c6a6a0abbafb7a396f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57942-cwe-352-cross-site-request-forgery--dc96c6ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57942%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andy_moyle%20Emergency%20Password%20Reset&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57943-cwe-918-server-side-request-forgery-7301e444</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57943%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Skimlinks%20Skimlinks%20Affiliate%20Marketing%20Tool&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57944-cwe-862-missing-authorization-in-sk-6a8b270a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57944%3A%20Missing%20Authorization%20in%20Skimlinks%20Skimlinks%20Affiliate%20Marketing%20Tool&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57945-cwe-79-improper-neutralization-of-i-85f21c02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57945%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cedcommerce%20WP%20Advanced%20PDF&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57946-cwe-352-cross-site-request-forgery--2c45e269</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57946%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Loc%20Bui%20payOS&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57947-cwe-79-improper-neutralization-of-i-fa5353c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Photo%20Gallery%20by%20Ays&amp;severity=null&amp;id=68d194c6a6a0abbafb7a399a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57948-cwe-79-improper-neutralization-of-i-fe74cdf1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Directory%20Pro&amp;severity=null&amp;id=68d194c6a6a0abbafb7a399d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57949-cwe-862-missing-authorization-in-og-7bef1ee1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57949%3A%20Missing%20Authorization%20in%20oggix%20Ongkoskirim.id&amp;severity=null&amp;id=68d194c6a6a0abbafb7a39a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57950-cwe-79-improper-neutralization-of-i-18dc8953</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57950%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Glen%20Scott%20Plugin%20Security%20Scanner&amp;severity=null&amp;id=68d194c6a6a0abbafb7a39a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57951-cwe-79-improper-neutralization-of-i-9b528247</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ken107%20SiteNarrator%20Text-to-Speech%20Widget&amp;severity=null&amp;id=68d194c6a6a0abbafb7a39a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57952-cwe-79-improper-neutralization-of-i-c1cda29c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20Maps%20for%20WP&amp;severity=null&amp;id=68d194c6a6a0abbafb7a39a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57953-cwe-79-improper-neutralization-of-i-2cef4976</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57953%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20100plugins%20Open%20User%20Map&amp;severity=null&amp;id=68d194c6a6a0abbafb7a39ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57954-cwe-79-improper-neutralization-of-i-16b0dcaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57954%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57955-cwe-862-missing-authorization-in-pl-9794e8d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57955%3A%20Missing%20Authorization%20in%20Plugin%20Devs%20Post%20Carousel%20Slider%20for%20Elementor&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57956-cwe-79-improper-neutralization-of-i-03ab80f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57956%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcraft%20WooMS&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57957-cwe-862-missing-authorization-in-wp-49c0cde0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57957%3A%20Missing%20Authorization%20in%20wpcraft%20WooMS&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57958-cwe-862-missing-authorization-in-wp-f32a2dbc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57958&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57959-cwe-79-improper-neutralization-of-i-97dade6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tmatsuur%20Slightly%20troublesome%20permalink&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57960-cwe-352-cross-site-request-forgery--331472bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57960%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TravelMap%20Travel%20Map&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57961-cwe-862-missing-authorization-in-co-79cfa9e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57961%3A%20Missing%20Authorization%20in%20Codexpert%2C%20Inc%20CoDesigner&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57962-cwe-79-improper-neutralization-of-i-b106b119</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRestaurants&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57963-cwe-79-improper-neutralization-of-i-d48d5b99</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57963%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zoho%20Subscriptions%20Zoho%20Billing&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57964-cwe-79-improper-neutralization-of-i-f5efec9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57964%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photonicgnostic%20Library%20Bookshelves&amp;severity=null&amp;id=68d194c8a6a0abbafb7a39fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57965-cwe-79-improper-neutralization-of-i-b1685625</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57965%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20CodeUs%20WP%20Proposals&amp;severity=medium&amp;id=68d194c8a6a0abbafb7a39fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57966-cwe-79-improper-neutralization-of-i-baa25372</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57966%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Gallery%20Lightbox&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57967-cwe-79-improper-neutralization-of-i-b4357bff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57967%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPBean%20WPB%20Quick%20View%20for%20WooCommerce&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57968-cwe-79-improper-neutralization-of-i-504e40ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57968%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRestaurants&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57969-cwe-862-missing-authorization-in-je-fb3fc3a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57969%3A%20Missing%20Authorization%20in%20Jeremy%20Saxey%20Hide%20WP%20Toolbar&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57970-cwe-352-cross-site-request-forgery--c5b0f830</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57970%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SALESmanago%20SALESmanago%20%26%20Leadoo&amp;severity=null&amp;id=68e0920311971642e85b877b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57971-cwe-862-missing-authorization-in-sa-082bd231</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57971%3A%20Missing%20Authorization%20in%20SALESmanago%20SALESmanago%20%26%20Leadoo&amp;severity=null&amp;id=68e0920411971642e85b877e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57972-cwe-862-missing-authorization-in-wp-5ecd549e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57972%3A%20Missing%20Authorization%20in%20WPFactory%20Helpdesk%20Support%20Ticket%20System%20for%20WooCommerce&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57973-cwe-79-improper-neutralization-of-i-a4c2a80b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chad%20Butler%20WP-Members&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57974-cwe-79-improper-neutralization-of-i-72baca70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57974%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tuyennv%20TZ%20PlusGallery&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57975-cwe-862-missing-authorization-in-ra-83632226</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57975%3A%20Missing%20Authorization%20in%20RadiusTheme%20Team&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57976-cwe-862-missing-authorization-in-ca-314cc7df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57976%3A%20Missing%20Authorization%20in%20CardCom%20CardCom%20Payment%20Gateway&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57977-cwe-352-cross-site-request-forgery--77d588f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57977%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdesk%20Flexible%20PDF%20Invoices%20for%20WooCommerce%20%26amp%3B%20WordPress&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57978-cwe-352-cross-site-request-forgery--5f73fe76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57978%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themespride%20Advanced%20Appointment%20Booking%20%26amp%3B%20Scheduling&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57979-cwe-79-improper-neutralization-of-i-da390ca3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57979%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Russell%20Jamieson%20AuthorSure&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57980-cwe-79-improper-neutralization-of-i-4e883d89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tomas%20Cordero%20Safety%20Exit&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57981-cwe-79-improper-neutralization-of-i-d767790c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57981%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchsquare%20WP%20Social%20Widget&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57982-cwe-79-improper-neutralization-of-i-186500e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPBean%20Advance%20Portfolio%20Grid&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57983-cwe-352-cross-site-request-forgery--65dac4ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57983%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Damian%20BP%20Disable%20Activation%20Reloaded&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57984-cwe-918-server-side-request-forgery-1b86a4bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57984%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Pratik%20Ghela%20MakeStories%20(for%20Google%20Web%20Stories)&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57985-cwe-862-missing-authorization-in-ma-fb7a7ba2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57985%3A%20Missing%20Authorization%20in%20MantraBrain%20Ultimate%20Watermark&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57986-cwe-79-improper-neutralization-of-i-8c4d98d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57986%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20husani%20WP%20Subtitle&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57987-cwe-862-missing-authorization-in-th-a14ae87a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57987%3A%20Missing%20Authorization%20in%20ThimPress%20WP%20Events%20Manager&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57988-cwe-79-improper-neutralization-of-i-812a0ecc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Uncanny%20Owl%20Uncanny%20Toolkit%20for%20LearnDash&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57989-cwe-79-improper-neutralization-of-i-20a75d14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brajesh%20Singh%20WordPress%20Widgets%20Shortcode&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57990-cwe-862-missing-authorization-in-so-98a5c393</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57990%3A%20Missing%20Authorization%20in%20solwininfotech%20Blog%20Designer&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57992-cwe-352-cross-site-request-forgery--fdf31d06</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57992%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20InterServer%20Mail%20Baby%20SMTP&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57993-cwe-79-improper-neutralization-of-i-4e8128e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57993%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benjamin%20Pick%20Geolocation%20IP%20Detection&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57994-cwe-639-authorization-bypass-throug-9dfa123e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57994%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Sayful%20Islam%20Upcoming%20Events%20Lists&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57995-cwe-862-missing-authorization-in-de-79a0e638</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57995%3A%20Missing%20Authorization%20in%20Detheme%20DethemeKit%20For%20Elementor&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57996-cwe-79-improper-neutralization-of-i-a1660b15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57996%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matthewordie%20Buckets&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57997-cwe-862-missing-authorization-in-tr-389e7343</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57997%3A%20Missing%20Authorization%20in%20Trustpilot%20Trustpilot%20Reviews&amp;severity=null&amp;id=68d194caa6a0abbafb7a3a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57998-cwe-79-improper-neutralization-of-i-468723b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57998%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hamid%20Reza%20Yazdani%20E-namad%20%26amp%3B%20Shamed%20Logo%20Manager&amp;severity=null&amp;id=68d194caa6a0abbafb7a3a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57999-cwe-79-improper-neutralization-of-i-6944a29f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57999%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkoithemes%20WPKoi%20Templates%20for%20Elementor&amp;severity=null&amp;id=68d194caa6a0abbafb7a3a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58000-missing-authorization-in-memberful--41721f7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58000%3A%20Missing%20Authorization%20in%20memberful%20Memberful%20-%20Membership%20Plugin&amp;severity=null&amp;id=69cd7410e6bfc5ba1def5038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58001-cwe-79-improper-neutralization-of-i-9c96e596</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58001%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Compact%20Archives&amp;severity=null&amp;id=68d194caa6a0abbafb7a3a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58002-cwe-79-improper-neutralization-of-i-cd8eb5c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58002%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Milan%20Petrovic%20GD%20bbPress%20Tools&amp;severity=null&amp;id=68d194caa6a0abbafb7a3aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58003-cwe-862-missing-authorization-in-ja-bf515e27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58003%3A%20Missing%20Authorization%20in%20javothemes%20Javo%20Core&amp;severity=null&amp;id=68d194caa6a0abbafb7a3aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58004-cwe-862-missing-authorization-in-sm-c70470ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58004%3A%20Missing%20Authorization%20in%20SmartDataSoft%20DriCub&amp;severity=null&amp;id=68d194caa6a0abbafb7a3aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58005-cwe-918-server-side-request-forgery-977499ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58005%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SmartDataSoft%20DriCub&amp;severity=null&amp;id=68d194caa6a0abbafb7a3aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58006-cwe-601-url-redirection-to-untruste-7a874883</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58006%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Keap%2FInfusionsoft&amp;severity=null&amp;id=68d194caa6a0abbafb7a3aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58007-cwe-497-exposure-of-sensitive-syste-08a12c4d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58007%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20NerdPress%20Hubbub%20Lite&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58008-cwe-79-improper-neutralization-of-i-0a8888f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xnau%20webdesign%20Participants%20Database&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58009-cwe-862-missing-authorization-in-co-be73f93c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58009%3A%20Missing%20Authorization%20in%20codepeople%20CP%20Multi%20View%20Event%20Calendar&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58010-cwe-352-cross-site-request-forgery--96b0aafe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58010%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20straightvisions%20GmbH%20SV%20Proven%20Expert&amp;severity=null&amp;id=68d194caa6a0abbafb7a3acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58011-cwe-918-server-side-request-forgery-5976ccce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58011%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Alex%20Content%20Mask&amp;severity=null&amp;id=68d194caa6a0abbafb7a3acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58012-cwe-639-authorization-bypass-throug-f2e3679f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58012%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Alex%20Content%20Mask&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58013-cwe-352-cross-site-request-forgery--8791d841</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58013%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pebas%20CouponXxL&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58014-cwe-352-cross-site-request-forgery--e89273e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58014%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58015-cwe-497-exposure-of-sensitive-syste-61adc086</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58015%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=null&amp;id=68d194caa6a0abbafb7a3adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58016-cwe-862-missing-authorization-in-co-a561c6d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58016%3A%20Missing%20Authorization%20in%20Codexpert%2C%20Inc%20CF7%20Submissions&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58017-cwe-79-improper-neutralization-of-i-1c7acd53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58017%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58018-cwe-79-improper-neutralization-of-i-584e72d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Richard%20Leishman%20Mail%20Subscribe%20List&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58019-cwe-79-improper-neutralization-of-i-5b2ac129</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58019%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Search%20Atlas%20Group%20Search%20Atlas%20SEO&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58020-cwe-79-improper-neutralization-of-i-d0be44e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58021-cwe-79-improper-neutralization-of-i-d496048a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20douglaskarr%20List%20Child%20Pages%20Shortcode&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58022-cwe-79-improper-neutralization-of-i-a96080d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58022%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maxpagels%20ShortCode&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58023-cwe-79-improper-neutralization-of-i-39ac668a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58023%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20akdevs%20Genealogical%20Tree&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58025-cwe-79-improper-neutralization-of-i-4ca3e971</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58026-cwe-79-improper-neutralization-of-i-3bf8b956</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20termageddon%20Termageddon%3A%20Cookie%20Consent%20%26%20Privacy%20Compliance&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58027-cwe-79-improper-neutralization-of-i-77978509</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpo-HR%20NGG%20Smart%20Image%20Search&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58028-cwe-79-improper-neutralization-of-i-4a88ce36</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58028%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aum%20Watcharapon%20Designil%20PDPA%20Thailand&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58029-cwe-862-missing-authorization-in-su-50e3fb30</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58029%3A%20Missing%20Authorization%20in%20Sumit%20Singh%20Classic%20Widgets%20with%20Block-based%20Widgets&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58030-cwe-79-improper-neutralization-of-i-fbc9d863</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58030%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Page-list&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58031-cwe-79-improper-neutralization-of-i-0246886a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nextendweb%20Nextend%20Facebook%20Connect&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58032-cwe-352-cross-site-request-forgery--07579428</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58032%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bytes.co%20WP%20Compiler&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58033-cwe-79-improper-neutralization-of-i-e42e2d08</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leeshadle%20Draft&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58200-cwe-352-cross-site-request-forgery--79e9ab6f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58200%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bage%20Flexible%20FAQ&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58219-cwe-352-cross-site-request-forgery--0977252c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58219%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LIJE%20Show%20Pages%20List&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58220-cwe-79-improper-neutralization-of-i-862dc7b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58220%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Techeshta%20Card%20Elements%20for%20WPBakery&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58221-cwe-862-missing-authorization-in-on-00386ea0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58221%3A%20Missing%20Authorization%20in%20ONTRAPORT%20PilotPress&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58222-cwe-862-missing-authorization-in-ma-4202eae8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58222%3A%20Missing%20Authorization%20in%20Maidul%20Team%20Manager&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58224-cwe-352-cross-site-request-forgery--ab8f2c99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58224%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Printeers%20Printeers%20Print%20%26%20Ship&amp;severity=medium&amp;id=68d194cda6a0abbafb7a3b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58223-cwe-79-improper-neutralization-of-i-93bccd3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58223%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Taylor%20VoucherPress&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58226-cwe-201-insertion-of-sensitive-info-ddc50ca7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58226%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20iberezansky%203D%20FlipBook%20%E2%80%93%20PDF%20Flipbook%20Viewer%2C%20Flipbook%20Image%20Gallery&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58227-cwe-79-improper-neutralization-of-i-1273a355</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58227%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alexander%20Lueken%20Podlove%20Subscribe%20button&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58228-cwe-79-improper-neutralization-of-i-8cde50ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ShapedPlugin%20LLC%20Quick%20View%20for%20WooCommerce&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58229-cwe-79-improper-neutralization-of-i-ef7d5f88</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58229%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Sitekit&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58230-cwe-79-improper-neutralization-of-i-31267cfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58230%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20ZoloBlocks&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58231-cwe-79-improper-neutralization-of-i-a6759e05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitlydeveloper%20Bitly&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58232-cwe-79-improper-neutralization-of-i-6071f251</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58232%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ickata%20Image%20Editor%20by%20Pixo&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58233-cwe-79-improper-neutralization-of-i-dab573e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Guaven%20Labs%20SQL%20Chart%20Builder&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58234-cwe-79-improper-neutralization-of-i-23a15347</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58234%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58235-cwe-79-improper-neutralization-of-i-3a44a013</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rustaurius%20Front%20End%20Users&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58236-cwe-352-cross-site-request-forgery--70d808ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58236%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mayo%20Moriyama%20Force%20Update%20Translations&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58237-cwe-79-improper-neutralization-of-i-54b2ff53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Niaj%20Morshed%20LC%20Wizard&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58238-cwe-79-improper-neutralization-of-i-4a4091ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ONTRAPORT%20PilotPress&amp;severity=null&amp;id=68d194cda6a0abbafb7a3ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58239-cwe-79-improper-neutralization-of-i-2e417056</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chandrika%20Sista%20WP%20Category%20Dropdown&amp;severity=null&amp;id=68d194cda6a0abbafb7a3ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58240-cwe-79-improper-neutralization-of-i-02898c04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-tidy-tags&amp;severity=null&amp;id=68d194cda6a0abbafb7a3ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58241-cwe-79-improper-neutralization-of-i-41d8e880</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58241%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snapwidget%20SnapWidget%20Social%20Photo%20Feed%20Widget&amp;severity=null&amp;id=68d194cda6a0abbafb7a3bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58242-cwe-79-improper-neutralization-of-i-d09709f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58242%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vadim%20Bogaiskov%20Bg%20Church%20Memos&amp;severity=null&amp;id=68d194cda6a0abbafb7a3bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58244-cwe-352-cross-site-request-forgery--a4e25725</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58244%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Anps%20Constructo&amp;severity=null&amp;id=68d194cda6a0abbafb7a3bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58245-cwe-79-improper-neutralization-of-i-98df8782</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestweblayout%20Portfolio&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58247-cwe-862-missing-authorization-in-te-f19be31b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58247%3A%20Missing%20Authorization%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58248-cwe-79-improper-neutralization-of-i-8b46eef0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58248%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codefish%20Pinterest%20Pinboard%20Widget&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58249-cwe-201-insertion-of-sensitive-info-8d8b5083</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58249%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Themeum%20Qubely&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58250-cwe-352-cross-site-request-forgery--73fd2b24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58250%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ApusTheme%20Findgo&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58251-cwe-862-missing-authorization-in-po-2d161fdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58251%3A%20Missing%20Authorization%20in%20POSIMYTH%20Sticky%20Header%20Effects%20for%20Elementor&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58252-cwe-201-insertion-of-sensitive-info-4cddeeea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58252%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20jetmonsters%20Getwid&amp;severity=null&amp;id=68d194cea6a0abbafb7a3be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58253-cwe-79-improper-neutralization-of-i-3387c75d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58253%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=68d194cea6a0abbafb7a3be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58254-cwe-79-improper-neutralization-of-i-a98eef3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58254%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dtbaker%20StylePress%20for%20Elementor&amp;severity=null&amp;id=68d194cea6a0abbafb7a3be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58255-cwe-352-cross-site-request-forgery--ad803cb5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58255%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonisink%20Custom%20Post%20Type%20Images&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58256-cwe-79-improper-neutralization-of-i-20c5d8c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58256%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonathan%20Brinley%20DOAJ%20Export&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58257-cwe-79-improper-neutralization-of-i-87b6d9ea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58257%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Picture-Planet%20GmbH%20Verowa%20Connect&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58258-cwe-862-missing-authorization-in-nk-a4521a54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58258%3A%20Missing%20Authorization%20in%20nK%20Lazy%20Blocks&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58259-cwe-352-cross-site-request-forgery--8fa45a2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58259%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scriptsbundle%20Nokri&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58260-cwe-79-improper-neutralization-of-i-5f864163</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58260%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ronald%20Huereca%20Highlight%20and%20Share&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58261-cwe-352-cross-site-request-forgery--9269713b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58261%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PressPage%20Entertainment%20Inc%20Mavis%20HTTPS%20to%20HTTP%20Redirection&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58262-cwe-352-cross-site-request-forgery--f1aede7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58262%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPDirectoryKit%20Sweet%20Energy%20Efficiency&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58263-cwe-79-improper-neutralization-of-i-086ca2cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58263%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20BuddyPress%20Notification%20Widget&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58264-cwe-79-improper-neutralization-of-i-8ae7ebdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58264%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artbees%20JupiterX%20Core&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58265-cwe-79-improper-neutralization-of-i-b186b1b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58265%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stonehenge%20Creations%20Events%20Manager%20%26%238211%3B%20OpenStreetMaps&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58266-cwe-79-improper-neutralization-of-i-42637206</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fumiki%20Takahashi%20Gianism&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58267-cwe-352-cross-site-request-forgery--1286bc07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58267%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aftabul%20Islam%20Stock%20Message&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58268-cwe-352-cross-site-request-forgery--4228b184</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58268%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPMK%20WPMK%20PDF%20Generator&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58269-cwe-798-use-of-hard-coded-credentia-8b2b1c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58269%3A%20Use%20of%20Hard-coded%20Credentials%20in%20weDevs%20WP%20Project%20Manager&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58270-cwe-352-cross-site-request-forgery--2d9c9f0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58270%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NIX%20Solutions%20Ltd%20NIX%20Anti-Spam%20Light&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58271-cwe-79-improper-neutralization-of-i-ca2aa4ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58271%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AnyClip%20Video%20Platform%20AnyClip%20Luminous%20Studio&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58645-cwe-79-improper-neutralization-of-i-284b3331</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58645%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gravitate%20Gravitate%20Automated%20Tester&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58646-cwe-79-improper-neutralization-of-i-c23e7435</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chtombleson%20Mobi2Go&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58647-cwe-79-improper-neutralization-of-i-c2164821</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58647%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Will.I.am%20Simple%20Restaurant%20Menu&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58648-cwe-79-improper-neutralization-of-i-7bfe5f2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58648%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nicu%20Micle%20Simple%20JWT%20Login&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58649-cwe-201-insertion-of-sensitive-info-337c15b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58649%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Syed%20Balkhi%20All%20In%20One%20SEO%20Pack&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58650-cwe-862-missing-authorization-in-sy-1cccf5b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58650%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20All%20In%20One%20SEO%20Pack&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58652-cwe-79-improper-neutralization-of-i-ef8a579a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58652%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Carousel%20Ultimate&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58653-cwe-79-improper-neutralization-of-i-c2a16b9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58653%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JS%20Morisset%20JSM%20file_get_contents()%20Shortcode&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58654-cwe-79-improper-neutralization-of-i-d608b104</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58654%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-language&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58655-cwe-79-improper-neutralization-of-i-9f0189e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58655%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mat%20Category%20Featured%20Images&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58656-cwe-798-use-of-hard-coded-credentia-82e94a45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58656%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Risto%20Niinemets%20Estonian%20Shipping%20Methods%20for%20WooCommerce&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58657-cwe-352-cross-site-request-forgery--dd8d351d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58657%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EdwardBock%20Grid&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58658-cwe-79-improper-neutralization-of-i-92cab2b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58658%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Proof%20Factor%20LLC%20Proof%20Factor%20%26%238211%3B%20Social%20Proof%20Notifications&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58659-cwe-798-use-of-hard-coded-credentia-3a05f076</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58659%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Essekia%20Helpie%20FAQ&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58660-cwe-862-missing-authorization-in-br-774ae4fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58660%3A%20Missing%20Authorization%20in%20brandexponents%20Oshine%20Core&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58661-cwe-79-improper-neutralization-of-i-56c984a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58661%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eZee%20Technosys%20eZee%20Online%20Hotel%20Booking%20Engine&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58662-cwe-502-deserialization-of-untruste-c888ccf4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58662%3A%20Deserialization%20of%20Untrusted%20Data%20in%20awesomesupport%20Awesome%20Support&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58663-cwe-862-missing-authorization-in-th-cd60ec21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58663%3A%20Missing%20Authorization%20in%20Themeum%20Qubely&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58664-cwe-862-missing-authorization-in-az-b7e1c849</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58664%3A%20Missing%20Authorization%20in%20Azizul%20Hasan%20Text%20To%20Speech%20TTS%20Accessibility&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58665-cwe-79-improper-neutralization-of-i-b13b327b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58665%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tmontg1%20Form%20Generator%20for%20WordPress&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58666-cwe-862-missing-authorization-in-ko-1d560c7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58666%3A%20Missing%20Authorization%20in%20Kommo%20Website%20Chat%20Button%3A%20Kommo%20integration&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58667-cwe-862-missing-authorization-in-cr-6bf044d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58667%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro%20Reviews&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58668-cwe-862-missing-authorization-in-vi-02beb68b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58668%3A%20Missing%20Authorization%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58669-cwe-79-improper-neutralization-of-i-b3bf960f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58669%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Modern%20Minds%20Magento%202%20WordPress%20Integration&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58670-cwe-352-cross-site-request-forgery--2b90bec8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58670%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shankaranand%20Maurya%20WP%20Content%20Protection&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58671-cwe-79-improper-neutralization-of-i-16c3133e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58671%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20morganrichards%20Auction%20Feed&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58672-cwe-862-missing-authorization-in-ta-a52806fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58672%3A%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58673-cwe-94-improper-control-of-generati-2a18d1d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58673%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20weDevs%20WP%20User%20Frontend&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58675-cwe-352-cross-site-request-forgery--fc3375bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58675%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tryinteract%20Interact%3A%20Embed%20A%20Quiz%20On%20Your%20Site&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58676-cwe-352-cross-site-request-forgery--770e2b31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58676%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20extendyourweb%20HORIZONTAL%20SLIDER&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58677-cwe-352-cross-site-request-forgery--f5ebafe9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58677%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20puravida1976%20ShrinkTheWeb%20(STW)%20Website%20Previews&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58678-cwe-862-missing-authorization-in-pi-52b690db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58678%3A%20Missing%20Authorization%20in%20PickPlugins%20Accordion&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58681-cwe-862-missing-authorization-in-jr-5221a95b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58681%3A%20Missing%20Authorization%20in%20J%C3%BCrgen%20M%C3%BCller%20Easy%20Quotes&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58682-cwe-79-improper-neutralization-of-i-3d378eee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58682%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Timur%20Kamaev%20Kama%20Click%20Counter&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58683-cwe-79-improper-neutralization-of-i-bb58223e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Luke%20Mlsna%20Last%20Updated%20Shortcode&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58684-cwe-79-improper-neutralization-of-i-57064799</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58684%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Logo%20Showcase&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58685-cwe-862-missing-authorization-in-ce-c93e9b97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58685%3A%20Missing%20Authorization%20in%20cecabank%20Cecabank%20WooCommerce%20Plugin&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58686-cwe-89-improper-neutralization-of-s-b3e15f45</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58686%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quadlayers%20Perfect%20Brands%20for%20WooCommerce&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58687-cwe-352-cross-site-request-forgery--761bdf6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58687%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20CMS%20Ninja%20Current%20Age%20Plugin&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58688-cwe-352-cross-site-request-forgery--841c96e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58688%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Casengo%20Casengo%20Live%20Chat%20Support&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58691-cwe-79-improper-neutralization-of-i-3c9b90b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58691%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Russell%20Jamieson%20Genesis%20Club%20Lite&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58690-cwe-352-cross-site-request-forgery--9c198f1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58690%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ptibogxiv%20Doliconnect&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58702-cwe-79-improper-neutralization-of-i-d126f9f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58702%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebWizards%20MarketKing&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58703-cwe-79-improper-neutralization-of-i-3ecc689b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58703%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skyword%20Skyword%20API%20Plugin&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58704-cwe-79-improper-neutralization-of-i-93692982</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ren%20Ventura%20WP%20Delete%20User%20Accounts&amp;severity=null&amp;id=68d194d3a6a0abbafb7a3d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59418-cwe-770-allocation-of-resources-wit-4e1acf59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59418%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GSYT-Productions%20BunnyPad-SRC&amp;severity=medium&amp;id=68d194d3a6a0abbafb7a3d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10809-sql-injection-in-campcodes-online-l-d5eef7b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10809%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d18f781941fd9178dad985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10808-sql-injection-in-campcodes-farm-man-9229217b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10808%3A%20SQL%20Injection%20in%20Campcodes%20Farm%20Management%20System&amp;severity=medium&amp;id=68d18a33f374b317608a7fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10807-sql-injection-in-campcodes-online-b-b6e50e6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10807%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d181926d3a945b7030e02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10806-sql-injection-in-campcodes-online-b-9bcc54b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10806%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d17a761010bdf62ab0e30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmscape-attack-kaspersky-official-blog-85e51fc6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMScape%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e9575f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43807-cwe-79-improper-neutralization-of-i-95b84f5a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d1781a31c9c64c14377c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59413-cwe-862-missing-authorization-in-cu-a5fb9b7f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59413%3A%20CWE-862%3A%20Missing%20Authorization%20in%20cubecart%20v6&amp;severity=medium&amp;id=68d1781a31c9c64c14377c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59412-cwe-79-improper-neutralization-of-i-9585ee56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59412%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cubecart%20v6&amp;severity=medium&amp;id=68d1781a31c9c64c14377c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59411-cwe-79-improper-neutralization-of-i-e47c75c2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59411%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cubecart%20v6&amp;severity=medium&amp;id=68d1781a31c9c64c14377c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59335-cwe-613-insufficient-session-expira-65b0ac3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59335%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20cubecart%20v6&amp;severity=high&amp;id=68d1781a31c9c64c14377c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10805-sql-injection-in-campcodes-online-b-e1969e86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10805%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d17cd174c89a4b27bf04e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35042-cwe-1392-use-of-default-credentials-de871978</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35042%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Airship%20AI%20Acropolis&amp;severity=critical&amp;id=68d1e592efb46fd03052629a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35041-cwe-307-improper-restriction-of-exc-1dac38fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35041%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Airship%20AI%20Acropolis&amp;severity=high&amp;id=68d1e592efb46fd030526296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10804-sql-injection-in-campcodes-online-b-106513f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10804%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d16e40908623ce300f0d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-alerts-public-to-spoofed-ic3-site-used-in-frau-6cd654f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20alerts%20public%20to%20spoofed%20IC3%20site%20used%20in%20fraud%20schemes&amp;severity=medium&amp;id=68d16a1e1ea196d3ac0e78a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-says-recent-updates-cause-drm-video-play-5ee7340a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20says%20recent%20updates%20cause%20DRM%20video%20playback%20issues&amp;severity=high&amp;id=68d16a1e1ea196d3ac0e78a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36037-cwe-918-server-side-request-forgery-8481e9e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36037%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20webMethods%20Integration&amp;severity=medium&amp;id=68d16fe886694250c6d57f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-ukrainian-police-emails-spread-new-countloade-cecf9bc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Ukrainian%20Police%20Emails%20Spread%20New%20CountLoader%20Malware%20Loader&amp;severity=medium&amp;id=68d16947b060ef32b6d70b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36202-cwe-134-use-of-externally-controlle-0b90da59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36202%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20IBM%20webMethods%20Integration&amp;severity=high&amp;id=68d16fe886694250c6d57f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10803-buffer-overflow-in-tenda-ac23-96bbeb45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10803%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=68d18657c1d31cc80230d173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9038-cwe-269-improper-privilege-managemen-87601518</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9038%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20GE%20Vernova%20S1%20Agile%20Configuration%20Software&amp;severity=high&amp;id=68d1634941f9e1eae1d16d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10802-sql-injection-in-code-projects-onli-057c7d3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10802%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d16058f02364aaa505cb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10801-sql-injection-in-sourcecodester-pet-b95f6806</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10801%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d158461855446d097a9d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10800-sql-injection-in-itsourcecode-onlin-cdebf549</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10800%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68d150fe9da793c36eb64df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10799-sql-injection-in-code-projects-host-558a0771</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10799%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d1538e87dc0eeebe98c5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nimbus-manticore-deploys-new-malware-targeting-eur-3bbcfb3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nimbus%20Manticore%20Deploys%20New%20Malware%20Targeting%20Europe&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10798-sql-injection-in-code-projects-host-4605deac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10798%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d14699803041629e2f990d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infected-steam-game-blockblasters-downloads-crypto-12ca93bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infected%20Steam%20game%20%22BlockBlasters%22%20downloads%20crypto%20stealer%20malware&amp;severity=medium&amp;id=68d1a6ea45e15a9c326af23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10854-cwe-61-unix-symbolic-link-symlink-f-1df6b82f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10854%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following&amp;severity=high&amp;id=68d141f085a0e7c3384637f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10797-sql-injection-in-code-projects-host-5951b90c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10797%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d14699803041629e2f991b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10796-sql-injection-in-code-projects-host-5e16da9c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10796%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d135599209708d90811cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-malterminal-an-llm-enabled-malw-2bdbb51e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20expose%20MalTerminal%2C%20an%20LLM-enabled%20malware%20pioneer&amp;severity=medium&amp;id=68d13042359c900c607c6537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eu-agency-enisa-says-ransomware-attack-behind-airp-dd0ea499</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EU%20agency%20ENISA%20says%20ransomware%20attack%20behind%20airport%20disruptions&amp;severity=medium&amp;id=68d13042359c900c607c653b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9983-cwe-306-missing-authentication-for-c-e4d5166b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9983%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GALAYOU%20G2&amp;severity=high&amp;id=68d12f759fb0e7ec5cc11606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10795-sql-injection-in-code-projects-onli-51fe69ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10795%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d12dce38ee0fe1f3a7903e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10794-cross-site-scripting-in-phpgurukul--ae3dadee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10794%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Car%20Rental%20Project&amp;severity=medium&amp;id=68d126e5419b193bae2c43d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46711-cwe-476-null-pointer-dereference-in-cff145a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46711%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=68d1e592efb46fd0305262b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowleak-exploit-exposed-gmail-data-through-chat-e6d11cd9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowLeak%20Exploit%20Exposed%20Gmail%20Data%20Through%20ChatGPT%20Deep%20Search%20Agent&amp;severity=high&amp;id=68d1223ea4797b1cf0769095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25177-cwe-cwe-416-use-after-free-417-in-i-f223b045</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25177%3A%20CWE%20-%20CWE-416%3A%20Use%20After%20Free%20(4.17)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=68d15a31cfd56a20b8773957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10793-sql-injection-in-code-projects-e-co-b149b909</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10793%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68d14699803041629e2f9914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/airport-chaos-enters-third-day-after-supply-chain--bdb0e444</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Airport%20Chaos%20Enters%20Third%20Day%20After%20Supply%20Chain%20Attack&amp;severity=high&amp;id=68d11dec4c929331fce2740e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/verified-steam-game-steals-streamers-cancer-treatm-31d56310</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Verified%20Steam%20game%20steals%20streamer&apos;s%20cancer%20treatment%20donations&amp;severity=high&amp;id=68d11d0a94f93bcd57a4ef29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10792-buffer-overflow-in-d-link-dir-513-d0516cd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10792%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=68d119a4610b6faac8b60dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10009-cwe-434-unrestricted-upload-of-file-6c6c8d44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10009%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Invoice%20Ninja%20Invoice%20Ninja%205&amp;severity=high&amp;id=68d117efb26f32170e795dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9035-cwe-79-improper-neutralization-of-in-b43ec6d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9035%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Horato%20Internet%20Technologies%20Ind.%20and%20Trade%20Inc.%20Virtual%20Library%20Platform&amp;severity=medium&amp;id=68d1144d618e7518f19859e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-hackers-use-clickfix-to-deliver-beavertail-ma-5cb65e1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK%20Hackers%20Use%20ClickFix%20to%20Deliver%20BeaverTail%20Malware%20in%20Crypto%20Job%20Scams&amp;severity=high&amp;id=68d1136b34777a11854dfa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-critical-entra-id-flaw-enabling--ff40b209</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Critical%20Entra%20ID%20Flaw%20Enabling%20Global%20Admin%20Impersonation%20Across%20Tenants&amp;severity=critical&amp;id=68d1136b34777a11854dfa6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10791-sql-injection-in-code-projects-onli-8db8a408</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10791%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d1129231fab51cc6b549db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8079-cwe-79-improper-neutralization-of-in-691e5c28</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8079%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ak%C4%B1ll%C4%B1%20Ticaret%20Software%20Technologies%20Ltd.%20Co.%20Smart%20Trade%20E-Commerce&amp;severity=medium&amp;id=68d10e0c3262276ca81aee84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10790-sql-injection-in-sourcecodester-sim-c1755b3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10790%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Forum%20Discussion%20System&amp;severity=medium&amp;id=68d10c6e5d1c02090bb14a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/22nd-september-threat-intelligence-report-517038d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=22nd%20September%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/suspected-apt-c-00-delivers-havoc-trojan-b17227fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Suspected%20APT-C-00%20Delivers%20Havoc%20Trojan&amp;severity=medium&amp;id=68d1a6ea45e15a9c326af247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5962-improper-access-control-in-red-hat-r-7fbb7fe8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5962%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=68d103c34b809de657261e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0875-cwe-639-authorization-bypass-through-7213d064</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0875%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20PROLIZ%20Computer%20Software%20Hardware%20Service%20Trade%20Ltd.%20Co.%20OBS%20(Student%20Affairs%20Information%20System)&amp;severity=medium&amp;id=68d103c34b809de657261e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10789-sql-injection-in-sourcecodester-onl-ef39a164</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10789%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68d103c34b809de657261e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10788-sql-injection-in-sourcecodester-onl-cc162bc9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10788%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68d17182eaa8a5844730acf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10787-server-side-request-forgery-in-muyu-c89dc5e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10787%3A%20Server-Side%20Request%20Forgery%20in%20MuYuCMS&amp;severity=medium&amp;id=68d0f4b66189482ceecd2b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10786-sql-injection-in-campcodes-grocery--6dfbc09d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10786%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d0eebb55c5efc64e8347e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10785-sql-injection-in-campcodes-grocery--fbf30b3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10785%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d1e592efb46fd0305262a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9541-cwe-79-cross-site-scripting-xss-in-m-f97088e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9541%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Markup%20Markdown&amp;severity=medium&amp;id=68d16058f02364aaa505cb9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9540-cwe-79-cross-site-scripting-xss-in-m-dbb81964</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9540%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Markup%20Markdown&amp;severity=medium&amp;id=68d165383ade50c92c378dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9487-cwe-79-cross-site-scripting-xss-in-a-75b33e01</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9487%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=medium&amp;id=68d1781a31c9c64c14377c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9115-cwe-79-cross-site-scripting-xss-in-e-b33602ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9115%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Etsy%20Shop&amp;severity=medium&amp;id=68d1781a31c9c64c14377c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10784-sql-injection-in-campcodes-online-l-4585a914</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10784%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d0e13c5eca204502e5181e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/electron-app-vulnerabilities-testcases-03790e6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Electron%20App%20Vulnerabilities%20testcases&amp;severity=medium&amp;id=68d0dd7ea20405275e6ddd48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-god-mode-vulnerability-that-should-kill-trust--6eddeaea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20God%20Mode%20Vulnerability%20That%20Should%20Kill%20%E2%80%9CTrust%20Microsoft%E2%80%9D%20Forever&amp;severity=medium&amp;id=68d0d9b5f76fb45c1b0ea7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10783-sql-injection-in-campcodes-online-l-4c4d4daa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10783%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d17182eaa8a5844730aceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10782-sql-injection-in-campcodes-online-l-fb517560</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10782%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d0d22a2292bf50abde952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10781-sql-injection-in-campcodes-online-l-4c68eb60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10781%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d0caaeabfd0dcecbef9f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10780-sql-injection-in-codeastro-simple-p-51befc85</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10780%3A%20SQL%20Injection%20in%20CodeAstro%20Simple%20Pharmacy%20Management&amp;severity=medium&amp;id=68d0c68eb68a0c387d4566fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10779-stack-based-buffer-overflow-in-d-li-7fa80f7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10779%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-935L&amp;severity=high&amp;id=68d0bf8cb68a0c387d44cdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-infostealer-campaign-targeting-mac-users-via-g-16687f13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Infostealer%20Campaign%20Targeting%20Mac%20Users%20via%20GitHub%20Pages%20Claiming%20to%20Offer%20LastPass%20Premium&amp;severity=medium&amp;id=68d0b888b68a0c387d443293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10778-race-condition-in-smartstore-a06d628f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10778%3A%20Race%20Condition%20in%20Smartstore&amp;severity=low&amp;id=68d0bc02b68a0c387d44b9fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10777-path-traversal-in-jsc-r7-r7-office--3a0b79a2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10777%3A%20Path%20Traversal%20in%20JSC%20R7%20R7-Office%20Document%20Server&amp;severity=medium&amp;id=68d0b4fab68a0c387d43e9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10776-cleartext-transmission-of-sensitive-fb283328</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10776%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20LionCoders%20SalePro%20POS&amp;severity=medium&amp;id=68d0aa6eb68a0c387d43ae8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10775-os-command-injection-in-wavlink-wl--c5ec794e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10775%3A%20OS%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=68d0a36db68a0c387d4351c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10774-os-command-injection-in-ruijie-6000-1ec3baaa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10774%3A%20OS%20Command%20Injection%20in%20Ruijie%206000-E10&amp;severity=medium&amp;id=68d09c63b68a0c387d430362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10773-stack-based-buffer-overflow-in-b-li-d8fb0777</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10773%3A%20Stack-based%20Buffer%20Overflow%20in%20B-Link%20BL-AC2100&amp;severity=high&amp;id=68d09c63b68a0c387d43035c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-22-1e6bba14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-22&amp;severity=medium&amp;id=68d1e779efb46fd03054ec85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57682-na-433145be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57682%3A%20n%2Fa&amp;severity=medium&amp;id=68d1e592efb46fd0305262a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57430-na-fd9c91e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57430%3A%20n%2Fa&amp;severity=high&amp;id=68d1e592efb46fd03052629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57432-na-a8f33114</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57432%3A%20n%2Fa&amp;severity=critical&amp;id=68d1e592efb46fd030526292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55886-na-5d1c32f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55886%3A%20n%2Fa&amp;severity=medium&amp;id=68d1e592efb46fd03052628e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55888-na-31f3ad26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55888%3A%20n%2Fa&amp;severity=high&amp;id=68d1e592efb46fd030526288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57204-na-a73c7383</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57204%3A%20n%2Fa&amp;severity=medium&amp;id=68d1b55562c5b9ff4b6b8c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57205-na-4008ed2c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57205%3A%20n%2Fa&amp;severity=medium&amp;id=68d1b30dc6427514cac5c454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57203-na-2c5ab645</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57203%3A%20n%2Fa&amp;severity=medium&amp;id=68d1a1a38eeb7847b80a61b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55887-na-afd4183a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55887%3A%20n%2Fa&amp;severity=medium&amp;id=68d19b97a9eb7abab7dee674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52367-na-6bc7d2fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52367%3A%20n%2Fa&amp;severity=medium&amp;id=68d19a1a93431051bd470171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57685-na-50fe9c3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57685%3A%20n%2Fa&amp;severity=high&amp;id=68d197d605d26ef41525088c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55885-na-ca996776</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55885%3A%20n%2Fa&amp;severity=medium&amp;id=68d18f781941fd9178dad98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57440-na-3c536a58</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57440%3A%20n%2Fa&amp;severity=high&amp;id=68d18a33f374b317608a7fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57439-na-d5441b78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57439%3A%20n%2Fa&amp;severity=high&amp;id=68d18a33f374b317608a7fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57441-na-47e56f12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57441%3A%20n%2Fa&amp;severity=critical&amp;id=68d187eac9261cbf9d588d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57438-na-bab3f0b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57438%3A%20n%2Fa&amp;severity=medium&amp;id=68d187eac9261cbf9d588d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57437-na-e03a09f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57437%3A%20n%2Fa&amp;severity=critical&amp;id=68d18657c1d31cc80230d16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43953-na-c8467352</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43953%3A%20n%2Fa&amp;severity=high&amp;id=68d18657c1d31cc80230d16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57431-na-76457fae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57431%3A%20n%2Fa&amp;severity=high&amp;id=68d183f9fb52d8f830638a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57434-na-aab9c58e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57434%3A%20n%2Fa&amp;severity=high&amp;id=68d17ff6009da204b74e7600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57433-na-c16a05b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57433%3A%20n%2Fa&amp;severity=medium&amp;id=68d17182eaa8a5844730ace7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57605-na-2c359610</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57605%3A%20n%2Fa&amp;severity=high&amp;id=68d16c8bd2635369c1db5476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57602-na-388d57cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57602%3A%20n%2Fa&amp;severity=critical&amp;id=68d16c8bd2635369c1db5473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57601-na-956842b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57601%3A%20n%2Fa&amp;severity=critical&amp;id=68d16c8bd2635369c1db5470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56075-na-e845d7ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56075%3A%20n%2Fa&amp;severity=medium&amp;id=68d1538e87dc0eeebe98c5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56074-na-3255771c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56074%3A%20n%2Fa&amp;severity=critical&amp;id=68d1538e87dc0eeebe98c5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51006-na-6657e321</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51006%3A%20n%2Fa&amp;severity=high&amp;id=68d1538e87dc0eeebe98c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59798-cwe-121-stack-based-buffer-overflow-9e15fe41</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59798%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Artifex%20Ghostscript&amp;severity=medium&amp;id=68d0c68eb68a0c387d456704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59801-cwe-121-stack-based-buffer-overflow-64b397fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59801%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Artifex%20GhostXPS&amp;severity=medium&amp;id=68d0bf8cb68a0c387d44cdfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59800-cwe-190-integer-overflow-or-wraparo-84322c90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59800%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Artifex%20Ghostscript&amp;severity=medium&amp;id=68d0bf8cb68a0c387d44cdf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59799-na-b0864926</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59799%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Artifex%20Ghostscript&amp;severity=medium&amp;id=68d0bf8cb68a0c387d44cdf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10772-missing-authentication-in-huggingfa-457ead3e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10772%3A%20Missing%20Authentication%20in%20huggingface%20LeRobot&amp;severity=medium&amp;id=68d0935fb68a0c387d42a91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10771-deserialization-in-jeecgboot-jimure-aa62f15b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10771%3A%20Deserialization%20in%20jeecgboot%20JimuReport&amp;severity=medium&amp;id=68d084bbd7d6140a8f93227f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10770-deserialization-in-jeecgboot-jimure-2cd1a997</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10770%3A%20Deserialization%20in%20jeecgboot%20JimuReport&amp;severity=medium&amp;id=68d07e84d222ba3d60fe0b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10767-os-command-injection-in-cosmodiumcs-10e8417e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10767%3A%20OS%20Command%20Injection%20in%20CosmodiumCS%20OnlyRAT&amp;severity=low&amp;id=68d0783404e7eb6dd3cd17a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53692-cwe-79-improper-neutralization-of-i-83d39c32</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53692%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sitecore%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=high&amp;id=68d0569885ecdfe9ee75771f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10769-deserialization-in-h2oai-h2o-3-bf950913</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10769%3A%20Deserialization%20in%20h2oai%20h2o-3&amp;severity=medium&amp;id=68cfc7e69cd607c66dc0c176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10768-deserialization-in-h2oai-h2o-3-880cad51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10768%3A%20Deserialization%20in%20h2oai%20h2o-3&amp;severity=medium&amp;id=68cfc7e69cd607c66dc0c16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-edr-freeze-tool-that-puts-edrs-and-antivirus-i-618e4a55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20EDR-Freeze%20Tool%20That%20Puts%20EDRs%20and%20Antivirus%20Into%20A%20Coma%20State&amp;severity=high&amp;id=68cfc04921221ebe18503515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6544-cwe-502-deserialization-of-untrusted-b39b18f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6544%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=critical&amp;id=68d0935fb68a0c387d42a921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10766-path-traversal-in-seriawei-zkeacms-3f4be03a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10766%3A%20Path%20Traversal%20in%20SeriaWei%20ZKEACMS&amp;severity=medium&amp;id=68cfa49fd802737dba85e280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10765-server-side-request-forgery-in-seri-30cc21a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10765%3A%20Server-Side%20Request%20Forgery%20in%20SeriaWei%20ZKEACMS&amp;severity=medium&amp;id=68d0935fb68a0c387d42a925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10764-server-side-request-forgery-in-seri-b5fef907</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10764%3A%20Server-Side%20Request%20Forgery%20in%20SeriaWei%20ZKEACMS&amp;severity=medium&amp;id=68d0935fb68a0c387d42a92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10763-unrestricted-upload-in-academico-si-47510286</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10763%3A%20Unrestricted%20Upload%20in%20academico-sis%20academico&amp;severity=medium&amp;id=68d0935fb68a0c387d42a931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10762-sql-injection-in-kuaifan-dootask-97b04815</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10762%3A%20SQL%20Injection%20in%20kuaifan%20DooTask&amp;severity=medium&amp;id=68d0935fb68a0c387d42a937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edr-freeze-a-tool-that-puts-edrs-and-antivirus-int-a9914fc4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EDR-Freeze%3A%20A%20Tool%20That%20Puts%20EDRs%20And%20Antivirus%20Into%20A%20Coma%20State&amp;severity=medium&amp;id=68cf71e74a0b186b9323306b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10761-improper-restriction-of-excessive-a-d3af401a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10761%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Harness&amp;severity=medium&amp;id=68cf6e624a0b186b932318d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10760-server-side-request-forgery-in-harn-a21cd3cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10760%3A%20Server-Side%20Request%20Forgery%20in%20Harness&amp;severity=medium&amp;id=68cf6ade4a0b186b93230502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10759-authorization-bypass-in-webkul-qloa-ec78e3c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10759%3A%20Authorization%20Bypass%20in%20Webkul%20QloApps&amp;severity=medium&amp;id=68cf52424a0b186b932233e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10758-cross-site-scripting-in-htmly-dd9175ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10758%3A%20Cross%20Site%20Scripting%20in%20htmly&amp;severity=medium&amp;id=68cf4b3a4a0b186b932211cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-21-8263f433</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-21&amp;severity=medium&amp;id=68d09551b68a0c387d42afa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10757-buffer-overflow-in-utt-1200gw-1cf61d2d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10757%3A%20Buffer%20Overflow%20in%20UTT%201200GW&amp;severity=high&amp;id=68cf42444a0b186b9321b027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10756-buffer-overflow-in-utt-hiper-840g-91f9cd40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10756%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=68cf42444a0b186b9321b02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10755-unrestricted-upload-in-selleo-menti-6920f6f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10755%3A%20Unrestricted%20Upload%20in%20Selleo%20Mentingo&amp;severity=medium&amp;id=68cf17bf3d7292ce7311ba27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-disrupts-airport-check-in-systems-acro-c252ab95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20Disrupts%20Airport%20Check-In%20Systems%20Across%20Europe&amp;severity=medium&amp;id=68cebf5fdf99f94e8bae1bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40925-cwe-340-generation-of-predictable-n-fd04a059</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40925%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BLUEFEET%20Starch&amp;severity=critical&amp;id=68ce9f86302f5874260ddf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10741-unrestricted-upload-in-selleo-menti-816ce504</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10741%3A%20Unrestricted%20Upload%20in%20Selleo%20Mentingo&amp;severity=medium&amp;id=68ce99775be37aaae63283d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deerstealer-malware-campaign-stealth-persistence-a-3d98f021</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeerStealer%20Malware%20Campaign%3A%20Stealth%2C%20Persistence%2C%20and%20Rootkit-Like%20Capabilities&amp;severity=medium&amp;id=68d1a5724d07d146b7e4df0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowleak-zero-click-flaw-leaks-gmail-data-via-op-0e1486a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowLeak%20Zero-Click%20Flaw%20Leaks%20Gmail%20Data%20via%20OpenAI%20ChatGPT%20Deep%20Research%20Agent&amp;severity=high&amp;id=68ce81d7a4659bba14c65af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-gpt-4-powered-malterminal-malw-f46fefb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20GPT-4-Powered%20MalTerminal%20Malware%20Creating%20Ransomware%2C%20Reverse%20Shell&amp;severity=high&amp;id=68ce81d7a4659bba14c65aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-of-fake-repositories-infecting-maco-a5208c70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20of%20Fake%20Repositories%20Infecting%20macOS%20with%20Atomic%20Infostealer&amp;severity=high&amp;id=68ce81d7a4659bba14c65aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9887-cwe-352-cross-site-request-forgery-c-ce519091</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9887%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bittokazi%20Custom%20Login%20And%20Signup%20Widget&amp;severity=medium&amp;id=68ce4e4eab7f779c79ff312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9883-cwe-352-cross-site-request-forgery-c-59bc0986</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9883%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bpedrassani%20Browser%20Sniff&amp;severity=medium&amp;id=68ce4e4eab7f779c79ff3126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9882-cwe-352-cross-site-request-forgery-c-404d02e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9882%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20michaelbo%20osTicket%20WP%20Bridge&amp;severity=medium&amp;id=68ce4e4eab7f779c79ff3121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10658-cwe-307-improper-restriction-of-exc-d19f8a1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10658%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20psmplugins%20SupportCandy%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=medium&amp;id=68ce4e4eab7f779c79ff311b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9949-cwe-352-cross-site-request-forgery-c-2a31ba28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9949%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webraketen%20Internal%20Links%20Manager&amp;severity=medium&amp;id=68cf42444a0b186b9321b048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10002-cwe-89-improper-neutralization-of-s-af6152d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10002%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20clickwhale%20ClickWhale%20%E2%80%93%20Link%20Manager%2C%20Link%20Shortener%20and%20Click%20Tracker%20for%20Affiliate%20Links%20%26%20Link%20Pages&amp;severity=medium&amp;id=68cf42444a0b186b9321b035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10305-cwe-862-missing-authorization-in-en-8819e2ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10305%3A%20CWE-862%20Missing%20Authorization%20in%20endisha%20Secure%20Passkeys&amp;severity=medium&amp;id=68cf42444a0b186b9321b040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10489-cwe-862-missing-authorization-in-br-96980389</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10489%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=medium&amp;id=68cf42444a0b186b9321b044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10181-cwe-79-improper-neutralization-of-i-eb129895</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10181%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Draft%20List&amp;severity=medium&amp;id=68cf42444a0b186b9321b039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10652-cwe-89-improper-neutralization-of-s-aec32e2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10652%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robcore89%20Robcore%20Netatmo&amp;severity=medium&amp;id=68ce0ffa4b8a032c4fafda28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-20-4cf2bb0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-20&amp;severity=medium&amp;id=68cf44294a0b186b9321b585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43808-cwe-732-incorrect-permission-assign-55a590e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43808%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68cdc2a44b8a032c4fad9eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10568-cwe-78-improper-neutralization-of-s-f48fa38a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10568%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20HP%20Inc.%20HyperX%20NGENUITY&amp;severity=medium&amp;id=68cdb4944b8a032c4fad08cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43809-cwe-352-cross-site-request-forgery--87f7a12f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43809%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68cdad924b8a032c4faccd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13990-cwe-295-improper-certificate-valida-d7894691</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13990%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20MicroWorld%20Technologies%20eScan%20AV&amp;severity=critical&amp;id=691dec83964c14ffeeaeeb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26517-cwe-266-incorrect-privilege-assignm-0e48de8b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26517%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20NetApp%20StorageGRID&amp;severity=medium&amp;id=68cdaa094b8a032c4fac9ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34191-cwe-59-improper-link-following-in-v-a0d96090</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34191%3A%20CWE-59%20Improper%20Link%20Following%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cdaa094b8a032c4fac9ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26516-cwe-405-asymmetric-resource-consump-a3acde2e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26516%3A%20CWE-405%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20NetApp%20StorageGRID&amp;severity=medium&amp;id=68cdaa094b8a032c4fac9acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34190-cwe-306-missing-authentication-for--f8d636cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34190%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Application&amp;severity=high&amp;id=68cdaa094b8a032c4fac9adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34205-cwe-561-dead-code-in-vasion-print-v-eee5ffb1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34205%3A%20CWE-561%20Dead%20Code%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cdaa094b8a032c4fac9aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43803-cwe-639-insecure-direct-object-refe-2fea4a55</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43803%3A%20CWE-639%3A%20Insecure%20Direct%20Object%20Reference%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68cdaa094b8a032c4fac9af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34202-cwe-291-reliance-on-ip-address-for--072b5869</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34202%3A%20CWE-291%20Reliance%20on%20IP%20Address%20for%20Authentication%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cdaa094b8a032c4fac9ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34189-cwe-732-incorrect-permission-assign-2372aacf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34189%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=medium&amp;id=68cdaa094b8a032c4fac9ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34206-cwe-732-incorrect-permission-assign-e407380f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34206%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cdaa094b8a032c4fac9af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34199-cwe-319-cleartext-transmission-of-s-1a239ca7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34199%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cda6a24b8a032c4fac76f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34193-cwe-755-improper-handling-of-except-665358d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34193%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac76ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34201-cwe-653-improper-isolation-or-compa-d870d402</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34201%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac7704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34188-cwe-532-insertion-of-sensitive-info-87283699</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34188%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac76e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34194-cwe-59-improper-link-following-in-v-4d9a04ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34194%3A%20CWE-59%20Improper%20Link%20Following%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac76f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34200-cwe-312-cleartext-storage-of-sensit-a23f686a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34200%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac76fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34204-cwe-269-improper-privilege-manageme-c3439783</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34204%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac770a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34198-cwe-798-use-of-hard-coded-credentia-639b4a8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34198%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cda6a34b8a032c4fac7741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/17500-phishing-domains-target-316-brands-across-74-742eb688</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=17%2C500%20Phishing%20Domains%20Target%20316%20Brands%20Across%2074%20Countries%20in%20Global%20PhaaS%20Surge&amp;severity=high&amp;id=68cda6834b8a032c4fac7659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34197-cwe-798-use-of-hard-coded-credentia-174150fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34197%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a34b8a032c4fac773b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortra-warns-of-max-severity-flaw-in-goanywhere-mf-dc7b99f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortra%20warns%20of%20max%20severity%20flaw%20in%20GoAnywhere%20MFT%E2%80%99s%20License%20Servlet&amp;severity=high&amp;id=68cda6834b8a032c4fac765d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34192-cwe-1104-use-of-unmaintained-third--a82f2f00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34192%3A%20CWE-1104%3A%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cda6a34b8a032c4fac772f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34195-cwe-434-unrestricted-upload-of-file-14db65c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34195%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a34b8a032c4fac7735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34203-cwe-1395-dependency-on-vulnerable-t-2900d2c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34203%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cda6a34b8a032c4fac7747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-exposes-malware-kits-deployed-in-ivanti-epmm--171e86a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20exposes%20malware%20kits%20deployed%20in%20Ivanti%20EPMM%20attacks&amp;severity=high&amp;id=68cda2fe4b8a032c4fac5a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc1549-hacks-34-devices-in-11-telecom-firms-via-l-630e3467</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC1549%20Hacks%2034%20Devices%20in%2011%20Telecom%20Firms%20via%20LinkedIn%20Job%20Lures%20and%20MINIBIKE%20Malware&amp;severity=high&amp;id=68cda2fe4b8a032c4fac5a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-cybercriminals-using-fake-fbi-crime-r-7f87b3ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20warns%20of%20cybercriminals%20using%20fake%20FBI%20crime%20reporting%20portals&amp;severity=high&amp;id=68cda2fe4b8a032c4fac5a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26515-cwe-918-server-side-request-forgery-0b8276ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26515%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NetApp%20StorageGRID&amp;severity=high&amp;id=68cda6a24b8a032c4fac7710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26514-cwe-79-improper-neutralization-of-i-82bd1602</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26514%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NetApp%20StorageGRID&amp;severity=medium&amp;id=68cda6a24b8a032c4fac7716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10722-improper-export-of-android-applicat-3bb59f95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10722%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20SKTLab%20Mukbee%20App&amp;severity=medium&amp;id=68cd94ee4b8a032c4fabcb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10721-improper-export-of-android-applicat-d88e760b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10721%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Webull%20Investing%20%26%20Trading%20App&amp;severity=medium&amp;id=68cd94ee4b8a032c4fabcb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/modus-operandi-of-subtle-snail-espionage-group-14558850</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Modus%20Operandi%20of%20Subtle%20Snail%20Espionage%20Group&amp;severity=medium&amp;id=68cd86e04b8a032c4fab05d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36248-cwe-79-improper-neutralization-of-i-1f421af6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36248%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Copy%20Services%20Manager&amp;severity=medium&amp;id=68cd86df4b8a032c4fab05b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10718-improper-export-of-android-applicat-f9469c44</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10718%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Ooma%20Office%20Business%20Phone%20App&amp;severity=medium&amp;id=68cd7fd94b8a032c4faad0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59427-cwe-200-exposure-of-sensitive-infor-98245565</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59427%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cloudflare%20workers-sdk&amp;severity=low&amp;id=68cd78da4b8a032c4faa7307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-network-selling-thousands-of-fake-us-and-c-ce7acf0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Network%20Selling%20Thousands%20of%20Fake%20US%20and%20Canadian%20IDs&amp;severity=medium&amp;id=68cd78ce4b8a032c4faa72f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8664-cwe-79-improper-neutralization-of-in-eda14a70</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Saysis%20Computer%20Systems%20Trade%20Ltd.%20Co.%20StarCities%20E-Municipality%20Management&amp;severity=medium&amp;id=68cd6d3342cc324345d33b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10717-improper-export-of-android-applicat-bd600384</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10717%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20intsig%20CamScanner%20App&amp;severity=medium&amp;id=68cd6bdc148332b17b6b893f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10716-improper-export-of-android-applicat-29ef86c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10716%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Creality%20Cloud%20App&amp;severity=medium&amp;id=68cd6bdc148332b17b6b8938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8532-cwe-639-authorization-bypass-through-45a90af2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8532%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Bimser%20Solution%20Software%20Trade%20Inc.%20eBA%20Document%20and%20Workflow%20Management%20System&amp;severity=medium&amp;id=68cd6982a12a4b86fff5d0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gamaredon-x-turla-collaboration-1f64c75b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gamaredon%20X%20Turla%20collaboration&amp;severity=medium&amp;id=68cd9f7a4b8a032c4fac3fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-issues-urgent-chrome-140-update-after-zero--bd2dbc5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Issues%20Urgent%20Chrome%20140%20Update%20After%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=68cd5d786aa2e4be1d1280f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10715-improper-export-of-android-applicat-2d2de1af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10715%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20APEUni%20PTE%20Exam%20Practice%20App&amp;severity=medium&amp;id=68cd5bd4829848b34320abbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10712-sql-injection-in-07flycms-2b24c09f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10712%3A%20SQL%20Injection%20in%2007FLYCMS&amp;severity=medium&amp;id=68cd5bd4829848b34320abb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58114-cwe-20-improper-input-validation-in-16e94173</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58114%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=68cd58f208353649d1c39360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57880-cwe-116-improper-encoding-or-escapi-0efa2c26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57880%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=68cd58f208353649d1c3935d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48007-cwe-116-improper-encoding-or-escapi-3386cfae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48007%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=68cd58f208353649d1c3935a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46703-cwe-116-improper-encoding-or-escapi-23170850</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46703%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=68cd58f208353649d1c39357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10711-cross-site-scripting-in-07flycms-ec2b129b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10711%3A%20Cross%20Site%20Scripting%20in%2007FLYCMS&amp;severity=medium&amp;id=68cd76f94b8a032c4faa638f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10710-cross-site-scripting-in-07flycms-f1a1b53d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10710%3A%20Cross%20Site%20Scripting%20in%2007FLYCMS&amp;severity=medium&amp;id=68cd76f94b8a032c4faa6389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7665-cwe-862-missing-authorization-in-cyb-cff811f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7665%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20Miniorange%20OTP%20Verification%20with%20Firebase&amp;severity=high&amp;id=68cd76f94b8a032c4faa6395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10709-path-traversal-in-four-faith-water--59e36934</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10709%3A%20Path%20Traversal%20in%20Four-Faith%20Water%20Conservancy%20Informatization%20Platform&amp;severity=medium&amp;id=68cd478a343cc699e199ec14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10708-path-traversal-in-four-faith-water--59f2bb38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10708%3A%20Path%20Traversal%20in%20Four-Faith%20Water%20Conservancy%20Informatization%20Platform&amp;severity=medium&amp;id=68cd58f208353649d1c39369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10707-improper-authorization-in-jeecgboot-969066df</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10707%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68cd58f208353649d1c39363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9969-cwe-79-improper-neutralization-of-in-3d137300</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9969%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vizly%20Web%20Design%20Real%20Estate%20Packages&amp;severity=high&amp;id=68cd3e7b6c952af2596c3908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10468-cwe-22-improper-limitation-of-a-pat-a275582f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10468%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Beyaz%20Computer%20CityPlus&amp;severity=high&amp;id=68cd3a1b8bde6210f51371fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10719-cwe-639-authorization-bypass-throug-a9ec9348</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10719%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WisdomGarden%20Tronclass&amp;severity=medium&amp;id=68cd2c28287bbd261d2ca758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10630-cwe-20-improper-input-validation-in-4eee045d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10630%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Grafana%20grafana-zabbix-plugin&amp;severity=medium&amp;id=68cd76f94b8a032c4faa63a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8531-cwe-130-improper-handling-of-length--09ac7c0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8531%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC-Q%20Series%20Q03UDVCPU&amp;severity=medium&amp;id=68cd23e474a5d0d73a2558d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watchguard-issues-fix-for-93-rated-firebox-firewal-9badc5d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WatchGuard%20Issues%20Fix%20for%209.3-Rated%20Firebox%20Firewall%20Vulnerability&amp;severity=medium&amp;id=68cd223cb03991562587a619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/countloader-new-malware-loader-being-served-in-3-d-b36b2988</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CountLoader%3A%20New%20Malware%20Loader%20Being%20Served%20in%203%20Different%20Versions&amp;severity=medium&amp;id=68cd339450280a3868eb60ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10647-cwe-434-unrestricted-upload-of-file-f23f533d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10647%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20salzano%20Embed%20PDF%20for%20WPForms&amp;severity=high&amp;id=68cd76f94b8a032c4faa63a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9905-cwe-913-improper-control-of-dynamica-aad5cbb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9905%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Keras-team%20Keras&amp;severity=high&amp;id=68cd127d2a8afe82184746e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9906-cwe-502-deserialization-of-untrusted-02b0f560</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9906%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Keras-team%20Keras&amp;severity=high&amp;id=68cd127d2a8afe82184746e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7702-cwe-601-url-redirection-to-untrusted-5faaa242</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7702%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Pusula%20Communication%20Information%20Internet%20Industry%20and%20Trade%20Ltd.%20Co.%20Manageable%20Email%20Sending%20System&amp;severity=medium&amp;id=68cd76f94b8a032c4faa63a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5948-cwe-639-authorization-bypass-through-7d5cf151</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5948%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=critical&amp;id=68cd76f94b8a032c4faa639c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10456-integer-overflow-or-wraparound-in-z-91060f90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10456%3A%20Integer%20Overflow%20or%20Wraparound%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=68cd76f94b8a032c4faa6399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10458-improper-handling-of-length-paramet-5b177e45</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10458%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=68cce8ce8a2c56cc58c0a3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7403-write-what-where-condition-in-zephyr-3fe65f90</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7403%3A%20Write-what-where%20Condition%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=68cce8ce8a2c56cc58c0a3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10457-improperly-implemented-security-che-e6350814</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10457%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=68cce8ce8a2c56cc58c0a3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5955-cwe-288-authentication-bypass-using--82b3dd06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5955%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20aonetheme%20Service%20Finder%20SMS%20System&amp;severity=high&amp;id=68cd5bd4829848b34320abc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10146-cwe-79-improper-neutralization-of-i-45e5739d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10146%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=68cd478b343cc699e199ec1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8487-cwe-862-missing-authorization-in-ext-c666e504</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8487%3A%20CWE-862%20Missing%20Authorization%20in%20extendthemes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=68ccd247ca83b36a9f71db42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10690-cwe-862-missing-authorization-in-be-b3adba75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10690%3A%20CWE-862%20Missing%20Authorization%20in%20Bearsthemes%20Goza%20-%20Nonprofit%20Charity%20WordPress%20Theme&amp;severity=critical&amp;id=68ccc437ca83b36a9f716bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7937-cwe-347-improper-verification-of-cry-89709c13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7937%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SMCI%20MBD-X12STW&amp;severity=high&amp;id=68ccc437ca83b36a9f716beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6198-cwe-347-improper-verification-of-cry-b2bf1c84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6198%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SMCI%20X13SEM-F&amp;severity=high&amp;id=68ccbd2fca83b36a9f7135ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-19-db1dad7e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-19&amp;severity=medium&amp;id=68cdf0614b8a032c4faf46d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59689-cwe-77-improper-neutralization-of-s-5cac2d59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59689%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Libraesva%20Email%20Security%20Gateway&amp;severity=medium&amp;id=68cdbb9d4b8a032c4fad4197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57396-na-e0cd6159</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57396%3A%20n%2Fa&amp;severity=medium&amp;id=68cdb8184b8a032c4fad2312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56762-na-fbb0369a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56762%3A%20n%2Fa&amp;severity=medium&amp;id=68cdb8184b8a032c4fad230e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54815-na-88bc4402</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54815%3A%20n%2Fa&amp;severity=high&amp;id=68cdb4944b8a032c4fad08d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54761-na-84eccb47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54761%3A%20n%2Fa&amp;severity=high&amp;id=68cdb4944b8a032c4fad08d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52159-na-c7df2938</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52159%3A%20n%2Fa&amp;severity=high&amp;id=68cdb4944b8a032c4fad08cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57296-na-d5a9cb26</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57296%3A%20n%2Fa&amp;severity=medium&amp;id=68cd7fd94b8a032c4faad105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56869-na-3014e78d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56869%3A%20n%2Fa&amp;severity=medium&amp;id=68cd7fd94b8a032c4faad100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55910-na-9128cfbd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55910%3A%20n%2Fa&amp;severity=medium&amp;id=68cd78da4b8a032c4faa730d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57644-na-01402aad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57644%3A%20n%2Fa&amp;severity=critical&amp;id=68cd748d16d33c897eccce0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57528-na-eed1e118</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57528%3A%20n%2Fa&amp;severity=high&amp;id=68cd6bdc148332b17b6b8946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59717-cwe-843-access-of-resource-using-in-388c6415</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59717%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20DigitalOcean%20%40digitalocean%2Fdo-markdownit&amp;severity=medium&amp;id=68cccec3ca83b36a9f71c510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59714-cwe-863-incorrect-authorization-in--7639e72a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59714%3A%20CWE-863%20Incorrect%20Authorization%20in%20Internet2%20Grouper&amp;severity=medium&amp;id=68ccc437ca83b36a9f716be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59713-cwe-502-deserialization-of-untruste-d3ce71e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59713%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20snipeitapp%20Snipe-IT&amp;severity=medium&amp;id=68ccc437ca83b36a9f716be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59712-cwe-79-improper-neutralization-of-i-8e063be9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20snipeitapp%20Snipe-IT&amp;severity=medium&amp;id=68ccc437ca83b36a9f716be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30755-opengrok-1141-has-a-reflected-cross-ece729c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30755%3A%20OpenGrok%201.14.1%20has%20a%20reflected%20Cross-Site%20Scripting%20(XSS)%20issue%20when%20producing%20the%20cross%20reference%20page.%20This%20happens%20through%20improper%20handling%20of%20the%20revision%20parameter.%20The%20application%20reflects%20unsanitized%20user%20input%20into%20the%20HTML%20output.%20in%20Oracle%20Corporation%20OpenGrok&amp;severity=medium&amp;id=68cc97dfb3cee7708e8d3a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10035-cwe-77-improper-neutralization-of-s-2fc7b5b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10035%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=critical&amp;id=68cc81ade1e207df107c362d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53969-cwe-602-in-cognex-in-sight-2000-ser-4db64230</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53969%3A%20CWE-602%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59220-cwe-362-concurrent-execution-using--5f5ff49e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59220%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68cc7d698ad1e78619f757d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59216-cwe-362-concurrent-execution-using--1f3da919</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59216%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68cc7d698ad1e78619f757d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54810-cwe-294-in-cognex-in-sight-2000-ser-be8d7b3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54810%3A%20CWE-294%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59215-cwe-416-use-after-free-in-microsoft-f3659c66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59215%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68cc7d698ad1e78619f757cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54818-cwe-319-in-cognex-in-sight-2000-ser-a877534b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54818%3A%20CWE-319%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54497-cwe-732-in-cognex-in-sight-2000-ser-50397b45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54497%3A%20CWE-732%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52873-cwe-732-in-cognex-in-sight-2000-ser-06d5a6ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52873%3A%20CWE-732%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54860-cwe-307-in-cognex-in-sight-2000-ser-819d3d77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54860%3A%20CWE-307%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53947-cwe-276-in-cognex-in-sight-2000-ser-aeb4aee2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53947%3A%20CWE-276%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc762b04807de649625fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47698-cwe-319-in-cognex-in-sight-2000-ser-2ea7739d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47698%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc762b04807de649625fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54754-cwe-259-in-cognex-in-sight-2000-ser-340f7991</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54754%3A%20CWE-259%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc762b04807de649625fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30519-cwe-1391-in-dover-fueling-solutions-75708481</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30519%3A%20CWE-1391%20in%20Dover%20Fueling%20Solutions%20ProGauge%20MagLink%20LX%204&amp;severity=critical&amp;id=68cc710de742201e23dd5640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54807-cwe-321-in-dover-fueling-solutions--ce97c3f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54807%3A%20CWE-321%20in%20Dover%20Fueling%20Solutions%20ProGauge%20MagLink%20LX%204&amp;severity=critical&amp;id=68cc6f9bc42e09d33b9ea2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55068-cwe-190-in-dover-fueling-solutions--791c5149</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55068%3A%20CWE-190%20in%20Dover%20Fueling%20Solutions%20ProGauge%20MagLink%20LX%204&amp;severity=high&amp;id=68cc6f9bc42e09d33b9ea2c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10689-command-injection-in-d-link-dir-645-ef34cc4d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10689%3A%20Command%20Injection%20in%20D-Link%20DIR-645&amp;severity=medium&amp;id=68cc6e2bef6beda3cd78d386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59424-cwe-79-improper-neutralization-of-i-529e6c8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59424%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=68cc64c6b0b9cd5a3ed10585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10688-sql-injection-in-sourcecodester-pet-69931951</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10688%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68cc5efe1b4327aecb9f66b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10650-cwe-269-improper-privilege-manageme-83e929a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10650%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SoftIron%20HyperCloud&amp;severity=low&amp;id=68cc59e1db1798280b3a58f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26503-cwe-119-improper-restriction-of-ope-a782e38a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26503%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Wind%20River%20Systems%20Inc%20VxWorks%207&amp;severity=medium&amp;id=68cc5867aea2c857718d4224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47906-cwe-115-misinterpretation-of-input--83e0566e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47906%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20Go%20standard%20library%20os%2Fexec&amp;severity=medium&amp;id=68cc6f9bc42e09d33b9ea2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/systembc-malware-turns-infected-vps-systems-into-p-1f2614b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SystemBC%20malware%20turns%20infected%20VPS%20systems%20into%20proxy%20highway&amp;severity=high&amp;id=68cc4afc16636d8dd03982ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-york-blood-center-alerts-194000-people-to-data-f2d10db6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20York%20Blood%20Center%20Alerts%20194%2C000%20People%20to%20Data%20Breach&amp;severity=high&amp;id=68cc4afc16636d8dd03982fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10687-sql-injection-in-sourcecodester-res-69383c46</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10687%3A%20SQL%20Injection%20in%20SourceCodester%20Responsive%20E-Learning%20System&amp;severity=medium&amp;id=68cc43ca4250efa79f7b6a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10676-improper-authorization-in-fuyanglip-7f0db93d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10676%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68cc2e5c84c3e40d9e1945e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10675-improper-authorization-in-fuyanglip-781bb4e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10675%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68cc2e5b84c3e40d9e1945e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10674-improper-authorization-in-fuyanglip-cca81076</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10674%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68cc27fc88e1289d50d4155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36146-cwe-497-exposure-of-sensitive-syste-5f3ec3e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36146%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=68cc237367c782851fe3185a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36143-cwe-78-improper-neutralization-of-s-d0d0ec41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36143%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=68cc237367c782851fe31857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36139-cwe-79-improper-neutralization-of-i-d0afcafe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36139%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=68cc237367c782851fe31854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10673-sql-injection-in-itsourcecode-stude-f5842b4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10673%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68cc212964e6b4fd4107bb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-uk-teenagers-charged-over-transport-for-london-3969ee49</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20UK%20Teenagers%20Charged%20Over%20Transport%20for%20London%20(TFL)%20Hack%20Linked%20to%20Scattered%20Spider&amp;severity=medium&amp;id=68cc1ee25f43eb352644a3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59421-cwe-770-allocation-of-resources-wit-fafc9890</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59421%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20frappe%20press&amp;severity=low&amp;id=68cc1bf715657adce9c5e0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59417-cwe-79-improper-neutralization-of-i-c85c88d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59417%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lobehub%20lobe-chat&amp;severity=medium&amp;id=68cc1a808818f871806daf43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10672-missing-authentication-in-whuan132--0ec4356e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10672%3A%20Missing%20Authentication%20in%20whuan132%20AIBattery&amp;severity=high&amp;id=68cc18456ffb307f73dcb6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10671-insufficiently-random-values-in-you-04b8ccb7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10671%3A%20Insufficiently%20Random%20Values%20in%20youth-is-as-pale-as-poetry%20e-learning&amp;severity=medium&amp;id=68cc18456ffb307f73dcb6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59040-cwe-280-improper-handling-of-insuff-802440cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59040%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=68cc18456ffb307f73dcb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10670-sql-injection-in-itsourcecode-e-log-a70baba0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10670%3A%20SQL%20Injection%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=68cc112a80d290649cddf15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4444-resource-consumption-in-tor-9a29b95a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4444%3A%20Resource%20Consumption%20in%20Tor&amp;severity=medium&amp;id=68cc112a80d290649cddf166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10669-unrestricted-upload-in-airsonic-adv-3911ae6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10669%3A%20Unrestricted%20Upload%20in%20Airsonic-Advanced&amp;severity=medium&amp;id=68cc0b2216bc0da717cded50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10668-sql-injection-in-itsourcecode-onlin-88341288</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10668%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68cc0b2216bc0da717cded49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10667-sql-injection-in-itsourcecode-onlin-380f5b44</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10667%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68cc0508030f00d77e45da0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10666-buffer-overflow-in-d-link-dir-825-d8753a79</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10666%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=68cc0508030f00d77e45da01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-empire-podcast-invites-target-crypto-industry-9a463b6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Empire%20Podcast%20Invites%20Target%20Crypto%20Industry%20with%20macOS%20AMOS%20Stealer&amp;severity=medium&amp;id=68cbf732216d83833ec15dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10665-sql-injection-in-kidaze-courseselec-30d15ecd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10665%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68cbf67185df6e2bfaa71549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10664-sql-injection-in-phpgurukul-small-c-886c98d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10664%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=68cbf67185df6e2bfaa71542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13151-cwe-89-improper-neutralization-of-s-c9eff283</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13151%3A%20CWE%20-%2089%20-%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ESBI%20Information%20and%20Telecommunication%20Industry%20and%20Trade%20Limited%20Company%20Auto%20Service%20Software&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40678-cwe-434-unrestricted-upload-of-file-3e88b24d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40678%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Summar%20Software%20Portal%20del%20Empleado&amp;severity=medium&amp;id=68cbf299ee6173ddfc334c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40677-cwe-89-improper-neutralization-of-s-027774ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40677%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Summar%20Software%20Portal%20del%20Empleado&amp;severity=high&amp;id=68cbf299ee6173ddfc334c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watchguard-warns-of-critical-vulnerability-in-fire-523a02d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WatchGuard%20warns%20of%20critical%20vulnerability%20in%20Firebox%20firewalls&amp;severity=critical&amp;id=68cbedb003ae751429e19f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10585-is-the-sixth-actively-exploited-chr-a2c7e1ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10585%20is%20the%20sixth%20actively%20exploited%20Chrome%20zero-day%20patched%20by%20Google%20in%202025&amp;severity=critical&amp;id=68cbedb003ae751429e19fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10207-cwe-1287-improper-validation-of-spe-2c214691</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10207%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20ABB%20FLXEON&amp;severity=high&amp;id=68cc0b2216bc0da717cded56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10663-sql-injection-in-phpgurukul-online--cced6d9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10663%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=68cbe8acaf984949a8d1d413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10662-sql-injection-in-seacms-17ca6b17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10662%3A%20SQL%20Injection%20in%20SeaCMS&amp;severity=medium&amp;id=68cc0cd80f883ea1bda59c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vane-viper-malvertising-network-posed-as-legit-adt-5e7e3396</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vane%20Viper%20Malvertising%20Network%20Posed%20as%20Legit%20Adtech%20in%20Global%20Scams&amp;severity=medium&amp;id=68cbd8d8dcf8f705bf19ba88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8565-cwe-862-missing-authorization-in-wpl-a2e35f01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8565%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Privacy%20Policy%20Generator%20%E2%80%93%20WPLP%20Legal%20Pages&amp;severity=high&amp;id=68cc13c146e444568e341cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9992-cwe-79-improper-neutralization-of-in-786b8d9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nko%20Ghost%20Kit%20%E2%80%93%20Page%20Builder%20Blocks%2C%20Motion%20Effects%20%26%20Extensions&amp;severity=medium&amp;id=68cc13c146e444568e341cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30187-cwe-835-loop-with-unreachable-exit--903be3ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30187%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=68cc13c146e444568e341cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-office-20162019-end-of-life-257e0133</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Office%202016%2F2019%20End%20of%20Life&amp;severity=medium&amp;id=68cbcd34c76bde0bbe9f9704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/40-of-corporate-client-devices-still-run-windows-1-ca34340b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=40%25%20of%20Corporate%20Client%20Devices%20Still%20Run%20Windows%2010&amp;severity=medium&amp;id=68cbcb8e758e629c051b50da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0547-cwe-79-improper-neutralization-of-in-c134329b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0547%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Para%C5%9F%C3%BCt%20Software%20Bizmu&amp;severity=medium&amp;id=68cc13c146e444568e341cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6237-cwe-73-external-control-of-file-name-ca47e439</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6237%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20invoke-ai%20invoke-ai%2Finvokeai&amp;severity=critical&amp;id=68cc0b2216bc0da717cded60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10493-cwe-639-authorization-bypass-throug-892d1cee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10493%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20prasunsen%20Chained%20Quiz&amp;severity=medium&amp;id=68cc13c146e444568e341cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9083-cwe-502-deserialization-of-untrusted-db2111ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9083%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Ninja%20Forms&amp;severity=critical&amp;id=68cba0693675017f04545bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8942-cwe-284-improper-access-control-in-w-1ee9093f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8942%3A%20CWE-284%20Improper%20Access%20Control%20in%20WP%20Hotel%20Booking&amp;severity=critical&amp;id=68cba0693675017f04545bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5305-cwe-326-inadequate-encryption-streng-35cd2e8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5305%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Password%20Reset%20with%20Code%20for%20WordPress%20REST%20API&amp;severity=critical&amp;id=68cc9f1bca83b36a9f700a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deepens-its-playbook-with-new-websites-and-targets-64447b32</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deepens%20Its%20Playbook%20with%20New%20Websites%20and%20Targets&amp;severity=medium&amp;id=68cbcd42c76bde0bbe9f97f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10642-cross-site-scripting-in-wangchenyi1-46d7773b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10642%3A%20Cross%20Site%20Scripting%20in%20wangchenyi1996%20chat_forum&amp;severity=medium&amp;id=68cc9f1bca83b36a9f700a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-packages-deliver-silentsync-rat-debd9b9e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Packages%20Deliver%20SilentSync%20RAT&amp;severity=medium&amp;id=68cbbbcef311b98db4ab1c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-worm-compromises-npm-ecosystem-in-suppl-3dc8e19d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Shai-Hulud%22%20Worm%20Compromises%20npm%20Ecosystem%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=68cbb4aa21dc7e84600939ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10634-command-injection-in-d-link-dir-823-b58fb9ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10634%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68cc9f1bca83b36a9f700a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10632-cross-site-scripting-in-itsourcecod-35187365</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10632%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Online%20Petshop%20Management%20System&amp;severity=medium&amp;id=68cc0b2216bc0da717cded59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10631-cross-site-scripting-in-itsourcecod-30d2b6f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10631%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Online%20Petshop%20Management%20System&amp;severity=medium&amp;id=68cb5713e5fa2c8b14911b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10629-command-injection-in-d-link-dir-852-e911ab0c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10629%3A%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=68cb5713e5fa2c8b14911b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10628-command-injection-in-d-link-dir-852-6035659b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10628%3A%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=68cb5713e5fa2c8b14911b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-18-d7325981</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-18&amp;severity=medium&amp;id=68cca102ca83b36a9f701d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57293-na-44ab7319</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57293%3A%20n%2Fa&amp;severity=high&amp;id=68cc6f9bc42e09d33b9ea2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57295-na-071f3dce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57295%3A%20n%2Fa&amp;severity=high&amp;id=68cc69197c2864fad4194622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55912-na-00b02a65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55912%3A%20n%2Fa&amp;severity=high&amp;id=68cc237367c782851fe31860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50255-na-ef707f3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50255%3A%20n%2Fa&amp;severity=high&amp;id=68cc237367c782851fe3185d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55911-na-59009e64</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55911%3A%20n%2Fa&amp;severity=medium&amp;id=68cc1bf715657adce9c5e0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57452-na-bf82955d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57452%3A%20n%2Fa&amp;severity=medium&amp;id=68cc18456ffb307f73dcb6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10627-sql-injection-in-sourcecodester-onl-04273765</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10627%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cb466bd31237010cfa6062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10626-sql-injection-in-sourcecodester-onl-22cfa876</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10626%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cb466bd31237010cfa605b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10625-sql-injection-in-sourcecodester-onl-74d00180</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10625%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-claims-15-billion-salesforce-records--125cd228</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20claims%201.5%20billion%20Salesforce%20records%20stolen%20in%20Drift%20hacks&amp;severity=high&amp;id=68cb3a2c73a5a6cdbc6655b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-warns-customers-to-reset-credentials-aft-0863a4b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20warns%20customers%20to%20reset%20credentials%20after%20breach&amp;severity=high&amp;id=68cb3a2c73a5a6cdbc6655a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vc-giant-insight-partners-warns-thousands-after-ra-d765b655</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VC%20giant%20Insight%20Partners%20warns%20thousands%20after%20ransomware%20breach&amp;severity=high&amp;id=68cb3a2c73a5a6cdbc6655a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta558-uses-ai-generated-scripts-to-deploy-venom-ra-dc327269</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA558%20Uses%20AI-Generated%20Scripts%20to%20Deploy%20Venom%20RAT%20in%20Brazil%20Hotel%20Attacks&amp;severity=high&amp;id=68cb39657f563d9c088ee337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt41-targets-government-think-tanks--d5153ec5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20APT41%20targets%20government%2C%20think%20tanks%2C%20and%20academics%20tied%20to%20US-China%20trade%20and%20policy&amp;severity=medium&amp;id=68cb38a2383d6a624cd967f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10624-sql-injection-in-phpgurukul-user-ma-ec0787ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10624%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Management%20System&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10623-sql-injection-in-sourcecodester-hot-0d0594bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10623%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23337-cwe-1244-in-nvidia-hgx-gb200-hgx-gb-ed54112e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23337%3A%20CWE-1244%20in%20NVIDIA%20HGX%20GB200%2C%20HGX%20GB300%2C%20HGC%20B300&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23268-cwe-20-improper-input-validation-in-da6ba65c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23268%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68cb4e05e5fa2c8b1490b363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10621-sql-injection-in-sourcecodester-hot-d775ba82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10621%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23336-cwe-20-improper-input-validation-in-64a82390</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23336%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23329-cwe-284-in-nvidia-triton-inference--8bd43a79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23329%3A%20CWE-284%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68cb4e05e5fa2c8b1490b369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23328-cwe-787-out-of-bounds-write-in-nvid-0c7e7407</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23328%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68cb4e05e5fa2c8b1490b366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23316-cwe-78-improper-neutralization-of-s-cd4be2a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23316%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=critical&amp;id=68cb2f739685efe6fa5a5a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10620-sql-injection-in-itsourcecode-onlin-82dfc978</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10620%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Clinic%20Management%20System&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59415-cwe-79-improper-neutralization-of-i-728152a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59415%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10619-os-command-injection-in-sequa-ai-se-e08302b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10619%3A%20OS%20Command%20Injection%20in%20sequa-ai%20sequa-mcp&amp;severity=medium&amp;id=68cb22688afa0a79ca27307d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10618-sql-injection-in-itsourcecode-onlin-887d1fdb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10618%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Clinic%20Management%20System&amp;severity=medium&amp;id=68cb22688afa0a79ca273076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7993-cwe-416-use-after-free-in-ashlar-vel-26d169db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7993%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8006-cwe-125-out-of-bounds-read-in-ashlar-3acad4f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8006%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8002-cwe-843-access-of-resource-using-inc-ad59624a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8002%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8004-cwe-125-out-of-bounds-read-in-ashlar-1ec95bf1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8004%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8005-cwe-843-access-of-resource-using-inc-bdca17f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8005%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8001-cwe-119-improper-restriction-of-oper-603d7b4f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8001%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8003-cwe-125-out-of-bounds-read-in-ashlar-8a8e4733</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8003%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7997-cwe-125-out-of-bounds-read-in-ashlar-6dcd295f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7997%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8000-cwe-843-access-of-resource-using-inc-26f7f165</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8000%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7995-cwe-843-access-of-resource-using-inc-e646f2ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7995%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7996-cwe-787-out-of-bounds-write-in-ashla-aa234c5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7996%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7998-cwe-787-out-of-bounds-write-in-ashla-6335a6e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7998%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7994-cwe-125-out-of-bounds-read-in-ashlar-a5d002f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7994%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7999-cwe-843-access-of-resource-using-inc-4dbc664c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7999%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7988-cwe-787-out-of-bounds-write-in-ashla-6974b729</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7988%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e9c138e352740b9f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7991-cwe-125-out-of-bounds-read-in-ashlar-349c3899</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7991%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7992-cwe-125-out-of-bounds-read-in-ashlar-58983909</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7992%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7987-cwe-787-out-of-bounds-write-in-ashla-e4955a81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7987%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e9c138e352740b9f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7989-cwe-125-out-of-bounds-read-in-ashlar-9656be81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7989%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7986-cwe-787-out-of-bounds-write-in-ashla-374f0f22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7986%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7990-cwe-787-out-of-bounds-write-in-ashla-710a8d75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7990%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7985-cwe-190-integer-overflow-or-wraparou-9a28ad4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7985%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e8c138e352740b9f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7984-cwe-457-use-of-uninitialized-variabl-2b9a3a34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7984%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e8c138e352740b9f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7983-cwe-122-heap-based-buffer-overflow-i-ce018fbe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7983%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7981-cwe-457-use-of-uninitialized-variabl-3658100c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7981%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7979-cwe-121-stack-based-buffer-overflow--41a3e255</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7979%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7978-cwe-457-use-of-uninitialized-variabl-5f3f0448</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7978%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7980-cwe-787-out-of-bounds-write-in-ashla-26615e12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7980%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7982-cwe-190-integer-overflow-or-wraparou-7b0d4253</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7982%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e8c138e352740b9f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7977-cwe-125-out-of-bounds-read-in-ashlar-0338ec04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7977%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e8c138e352740b9f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10644-cwe-266-incorrect-privilege-assignm-899b2543</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10644%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Wondershare%20Repairit&amp;severity=critical&amp;id=68cb1dd46c72e58150640580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10643-cwe-732-incorrect-permission-assign-8d9fd377</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10643%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Wondershare%20Repairit&amp;severity=critical&amp;id=68cb1dd46c72e5815064057d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10617-sql-injection-in-sourcecodester-onl-c31e7f52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10617%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68cb1c55752de33ea51cfe55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10616-unrestricted-upload-in-itsourcecode-afe7dbf1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10616%3A%20Unrestricted%20Upload%20in%20itsourcecode%20E-Commerce%20Website&amp;severity=medium&amp;id=68cb1c55752de33ea51cfe4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10615-unrestricted-upload-in-itsourcecode-c2c58463</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10615%3A%20Unrestricted%20Upload%20in%20itsourcecode%20E-Commerce%20Website&amp;severity=medium&amp;id=68cb15679d86941e1ccd2bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59340-cwe-1336-improper-neutralization-of-b51614b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59340%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20HubSpot%20jinjava&amp;severity=critical&amp;id=68cb15679d86941e1ccd2bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59410-cwe-311-missing-encryption-of-sensi-170babe6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59410%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20dragonflyoss%20dragonfly&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59354-cwe-328-use-of-weak-hash-in-dragonf-89874023</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59354%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20dragonflyoss%20dragonfly&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59353-cwe-295-improper-certificate-valida-65f92204</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59353%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20dragonflyoss%20dragonfly&amp;severity=high&amp;id=68cb4e06e5fa2c8b1490b384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59352-cwe-202-exposure-of-sensitive-infor-f5305b12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59352%3A%20CWE-202%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20dragonflyoss%20dragonfly&amp;severity=medium&amp;id=68cb125572cbf43db2b5418a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59351-cwe-476-null-pointer-dereference-in-1c57d1dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59351%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20dragonflyoss%20dragonfly&amp;severity=low&amp;id=68cb4e06e5fa2c8b1490b39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59350-cwe-208-observable-timing-discrepan-72bd5562</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59350%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20dragonflyoss%20dragonfly&amp;severity=low&amp;id=68cb4e06e5fa2c8b1490b397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59349-cwe-732-incorrect-permission-assign-026d62f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59349%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20dragonflyoss%20dragonfly&amp;severity=low&amp;id=68cb0fb22139234af51c2bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10614-cross-site-scripting-in-itsourcecod-f0bae80f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10614%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=68cb0df12a0094034ff87a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37122-vulnerability-in-hewlett-packard-en-96f9af31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37122%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20ClearPass%20Policy%20Manager&amp;severity=medium&amp;id=68cb0df12a0094034ff87a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59348-cwe-457-use-of-uninitialized-variab-90fad79e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59348%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20dragonflyoss%20dragonfly&amp;severity=medium&amp;id=68cb0df12a0094034ff87a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59347-cwe-295-improper-certificate-valida-331ac0e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59347%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20dragonflyoss%20dragonfly&amp;severity=low&amp;id=68cb0c2a00fa06367f3c97bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59346-cwe-918-server-side-request-forgery-1f3a2368</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59346%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dragonflyoss%20dragonfly&amp;severity=medium&amp;id=68cb0b4650c37531b87a327c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59345-cwe-306-missing-authentication-for--0c69d7c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59345%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dragonflyoss%20dragonfly&amp;severity=high&amp;id=68cb0df12a0094034ff87a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10613-sql-injection-in-itsourcecode-stude-e0546d97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10613%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=68cb06d7ab9d7384897e2e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59416-cwe-862-missing-authorization-in-th-4f6a099d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59416%3A%20CWE-862%3A%20Missing%20Authorization%20in%20The-Scratch-Channel%20tsc-web-client&amp;severity=high&amp;id=68cb0517688cbe8f4eb893dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10608-improper-access-controls-in-portabi-6cbcc853</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10608%3A%20Improper%20Access%20Controls%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68caff33b5624fa867f4a632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10607-information-disclosure-in-portabili-dc025d05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10607%3A%20Information%20Disclosure%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68caf94c33b75e972181a555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10606-cross-site-scripting-in-portabilis--22aa03ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10606%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68caf94c33b75e972181a54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59342-cwe-24-path-traversal-filedir-in-es-cff557f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59342%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20esm-dev%20esm.sh&amp;severity=medium&amp;id=68caf94c33b75e972181a55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59341-cwe-23-relative-path-traversal-in-e-dfb5892c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59341%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=68caf79701ed836a75e1f9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59339-cwe-325-missing-cryptographic-step--880feb09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59339%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20ovh%20the-bastion&amp;severity=medium&amp;id=68cafbd7631213ff423d83fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58767-cwe-400-uncontrolled-resource-consu-a4252fae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58767%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ruby%20rexml&amp;severity=low&amp;id=68caf4a946aca7f3592e4643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-raven-stealer-malware-hits-browsers-for-cookie-cefabeb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Raven%20Stealer%20Malware%20Hits%20Browsers%20for%20Cookies%2C%20Passwords%20and%20Payment%20Data&amp;severity=medium&amp;id=68caf3c7d292aaab4d7d3a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58766-cwe-94-improper-control-of-generati-31efec3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58766%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dyad-sh%20dyad&amp;severity=critical&amp;id=68caf2f2822eeeec0bbb2583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10605-cross-site-scripting-in-portabilis--52d8c193</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10605%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10604-sql-injection-in-phpgurukul-online--19d0b76e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10604%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68cb125572cbf43db2b5418e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58432-cwe-250-execution-with-unnecessary--e1e4f19e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58432%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20IceWhaleTech%20ZimaOS&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58431-cwe-250-execution-with-unnecessary--cd04b776</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58431%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20IceWhaleTech%20ZimaOS&amp;severity=medium&amp;id=68caefa3050ae2a4a2bf03dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10603-sql-injection-in-phpgurukul-online--cd9d6e0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10603%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68caeaaf82663edd1bdc067a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10602-sql-injection-in-sourcecodester-onl-c769c77a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10602%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68caeaaf82663edd1bdc0673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35436-cwe-248-uncaught-exception-in-cisa--314d5960</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35436%3A%20CWE-248%20Uncaught%20Exception%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35435-cwe-369-divide-by-zero-in-cisa-thor-744c7aef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35435%3A%20CWE-369%20Divide%20By%20Zero%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35434-cwe-295-improper-certificate-valida-06742233</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35434%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35433-cwe-613-insufficient-session-expira-217429d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35433%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35432-cwe-400-uncontrolled-resource-consu-d19739c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35432%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35431-cwe-90-improper-neutralization-of-s-3be64d8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35431%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35430-cwe-22-improper-limitation-of-a-pat-00e06308</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35430%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b3a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10601-sql-injection-in-sourcecodester-onl-83569e5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10601%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cae414bbadf27e02c744d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10600-unrestricted-upload-in-sourcecodest-100cd117</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10600%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cae414bbadf27e02c744cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10599-sql-injection-in-itsourcecode-web-b-cb60193b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10599%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=68cade0df43ccdbecfedf8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10598-sql-injection-in-sourcecodester-pet-866d2e22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10598%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68cade0df43ccdbecfedf8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10597-sql-injection-in-kidaze-courseselec-ef2a3232</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10597%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68caf4a946aca7f3592e4647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bidi-swap-unmasking-the-art-of-url-misleading-with-d847b3cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BIDI%20Swap%3A%20Unmasking%20the%20Art%20of%20URL%20Misleading%20with%20Bidirectional%20Text%20Tricks&amp;severity=medium&amp;id=68cad0e1a32a4f153290b7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/one-token-to-rule-them-all-obtaining-global-admin--e3d15293</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=One%20Token%20to%20rule%20them%20all%20-%20obtaining%20Global%20Admin%20in%20every%20Entra%20ID%20tenant%20via%20Actor%20tokens&amp;severity=medium&amp;id=68cad024bcc5ab4e4ac09b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10596-sql-injection-in-sourcecodester-onl-10e38178</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10596%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cacea66b131705ffa8ffad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10205-cwe-759-use-of-a-one-way-hash-with--7bce990e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10205%3A%20CWE-759%20Use%20of%20a%20One-Way%20Hash%20with%20a%20Predictable%20Salt%20in%20ABB%20FLXEON&amp;severity=high&amp;id=68cad0dca32a4f153290b77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10595-sql-injection-in-sourcecodester-onl-5b064d95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10595%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68cac8129696ec3ac01d3cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40933-cwe-340-generation-of-predictable-n-2f440947</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40933%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20KGOLDOV%20Apache%3A%3AAuthAny&amp;severity=high&amp;id=68cac5e01f355dcd5a94ad8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shai-hulud-worm-infecting-npm-packages-with-mi-0b74e8a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Shai-hulud%20Worm%20Infecting%20npm%20Packages%20With%20Millions%20of%20Downloads&amp;severity=medium&amp;id=68cac17ed97bf4465cb5ccc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10594-sql-injection-in-sourcecodester-onl-7746ad6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10594%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68cac0c598f27b6b4d5b469c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10593-sql-injection-in-sourcecodester-onl-2f80958c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10593%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68caba2bbcb098e80ccc29d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59476-vulnerability-in-jenkins-project-je-18d005b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59476%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=68cab73ba2484644446021ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59475-vulnerability-in-jenkins-project-je-73e5d03d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59475%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=68cab73ba2484644446021a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59474-vulnerability-in-jenkins-project-je-cfdf6306</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59474%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=68cab73ba2484644446021a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10592-sql-injection-in-itsourcecode-onlin-78b3ec18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10592%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Public%20Access%20Catalog%20OPAC&amp;severity=medium&amp;id=68cab45254cf790925e52665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8463-cwe-639-authorization-bypass-through-0835edf1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8463%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SecHard%20Information%20Technologies%20SecHard&amp;severity=medium&amp;id=68cab09db62c8e2e63b2466a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/practical-guide-for-hunters-how-leaked-webhooks-ar-c01d20fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Practical%20guide%20for%20hunters%3A%20how%20leaked%20webhooks%20are%20abused%20and%20how%20to%20defend%20them&amp;severity=medium&amp;id=68caab79940d5859b9d108f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8077-cwe-1393-use-of-default-password-in--8649b1a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8077%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20SUSE%20neuvector&amp;severity=critical&amp;id=68caac2dd82284c39e479277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0879-cwe-79-improper-neutralization-of-in-899027d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0879%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shopside%20Software%20Shopside%20App&amp;severity=medium&amp;id=68caac2dd82284c39e479269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54467-cwe-522-insufficiently-protected-cr-a72773a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54467%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SUSE%20neuvector&amp;severity=medium&amp;id=68caac2dd82284c39e479273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53884-cwe-759-use-of-a-one-way-hash-witho-8d919f27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53884%3A%20CWE-759%3A%20Use%20of%20a%20One-Way%20Hash%20without%20a%20Salt%20in%20SUSE%20neuvector&amp;severity=medium&amp;id=68caac2dd82284c39e47926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-shuts-down-raccoono365-phishing-ring-sei-daf791a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Shuts%20Down%20RaccoonO365%20Phishing%20Ring%2C%20Seizes%20338%20Websites&amp;severity=medium&amp;id=68caa93a6ee91fb4e7872552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10439-cwe-89-improper-neutralization-of-s-19f1d9eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10439%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yordam%20Informatics%20Yordam%20Library%20Automation%20System&amp;severity=critical&amp;id=68cab45354cf790925e52677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0546-cwe-79-improper-neutralization-of-in-92d90ed7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0546%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Mevzuattr%20Software%20MevzuatTR&amp;severity=medium&amp;id=68cab45254cf790925e5266f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10157-cwe-693-protection-mechanism-failur-bf7ec55c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10157%3A%20CWE-693%20-%20Protection%20Mechanism%20Failure%20in%20mmaitre314%20picklescan&amp;severity=critical&amp;id=68cab45354cf790925e52672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8999-cwe-862-missing-authorization-in-ath-04ca3b45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8999%3A%20CWE-862%20Missing%20Authorization%20in%20athemes%20Sydney&amp;severity=medium&amp;id=68cab45354cf790925e52693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8411-cwe-79-improper-neutralization-of-in-69b0a225</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dokuzsoft%20Technology%20E-Commerce%20Web%20Design%20Product&amp;severity=high&amp;id=68cab45354cf790925e52686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10591-cross-site-scripting-in-portabilis--6dae0c5a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10591%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68ca96e193b16c2d2a62e6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10590-cross-site-scripting-in-portabilis--efbc6c73</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10590%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68ca96e193b16c2d2a62e6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10156-cwe-755-improper-handling-of-except-d82e8c95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10156%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20mmaitre314%20picklescan&amp;severity=critical&amp;id=68ca910cc83e56c86e2799ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hosting-a-website-on-a-disposable-vape-d7726a1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hosting%20a%20website%20on%20a%20disposable%20vape&amp;severity=medium&amp;id=68ca8f8b64b2ab792f3d5afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiantong-1-and-satphone-security-part-1-d778de43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tiantong-1%20and%20satphone%20security%20(part%201)&amp;severity=medium&amp;id=68ca884da4ccc8d40c13d97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vpn-ipv6-leak-3a309a92</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VPN%20IPv6%20leak&amp;severity=medium&amp;id=68ca884da4ccc8d40c13d980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/raccoono365-phishing-network-dismantled-as-microso-af8ceb5f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RaccoonO365%20Phishing%20Network%20Dismantled%20as%20Microsoft%2C%20Cloudflare%20Take%20Down%20338%20Domains&amp;severity=high&amp;id=68ca8780e059f3f42136d909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10155-cwe-20-improper-input-validation-in-aa0633e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10155%3A%20CWE-20%20Improper%20Input%20Validation%20in%20mmaitre314%20picklescan&amp;severity=critical&amp;id=68ca83a8e0086ebab8fe744a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0420-cwe-79-improper-neutralization-of-in-bb7c6293</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Para%C5%9F%C3%BCt%20Software%20Para%C5%9F%C3%BCt&amp;severity=medium&amp;id=68ca7d91f8eda5adc8374f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59458-cwe-77-in-jetbrains-junie-11bf0df7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59458%3A%20CWE-77%20in%20JetBrains%20Junie&amp;severity=high&amp;id=68cab45354cf790925e52683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59457-cwe-183-in-jetbrains-teamcity-5fdd26a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59457%3A%20CWE-183%20in%20JetBrains%20TeamCity&amp;severity=high&amp;id=68cab45354cf790925e52680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59456-cwe-23-in-jetbrains-teamcity-981d4e49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59456%3A%20CWE-23%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68cab45354cf790925e5267d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59455-cwe-362-in-jetbrains-teamcity-e6f5f9ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59455%3A%20CWE-362%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68cab45354cf790925e5267a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0419-cwe-79-improper-neutralization-of-in-899038d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0419%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zirve%20Information%20Technologies%20Inc.%20Zirve%20Nova&amp;severity=medium&amp;id=68cab45254cf790925e5266c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9242-cwe-787-out-of-bounds-write-in-watch-1286bb67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9242%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=critical&amp;id=68ca64c1ac160e1955053429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9972-cwe-78-improper-neutralization-of-sp-b6c5aa83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9972%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Planet%20Technology%20ICG-2510WG-LTE%20(EU%2FUS)&amp;severity=critical&amp;id=68ca8d1320342ce327dbd2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9971-cwe-306-missing-authentication-for-c-bf9a01c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9971%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Planet%20Technology%20ICG-2510WG-LTE%20(EU%2FUS)&amp;severity=critical&amp;id=68ca5b313fcd6e1bf2513c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9565-cwe-79-improper-neutralization-of-in-c4209732</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy%20Companion&amp;severity=medium&amp;id=68cab09db62c8e2e63b2469c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9216-cwe-434-unrestricted-upload-of-file--d3b3b2b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9216%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kodezen%20StoreEngine%20%E2%80%94%20Complete%20eCommerce%20Solution%20with%20Memberships%2C%20Licensing%2C%20Affiliates%20%26%20More&amp;severity=high&amp;id=68cab09db62c8e2e63b24695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9203-cwe-79-improper-neutralization-of-in-a989c8a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9203%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Media%20Player%20Addons%20for%20Elementor%20%E2%80%93%20Audio%20and%20Video%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=68cab09db62c8e2e63b24688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9215-cwe-22-improper-limitation-of-a-path-36210f1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9215%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kodezen%20StoreEngine%20%E2%80%94%20Complete%20eCommerce%20Solution%20with%20Memberships%2C%20Licensing%2C%20Affiliates%20%26%20More&amp;severity=medium&amp;id=68cab09db62c8e2e63b2468e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9450-cwe-457-use-of-uninitialized-variabl-9738c41c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9450%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=68ca52420a097cd99ae32361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9449-cwe-416-use-after-free-in-dassault-s-e7269636</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9449%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=68ca52420a097cd99ae3235e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9447-cwe-125-out-of-bounds-read-in-dassau-36a27153</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9447%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=68ca52420a097cd99ae3235b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/going-underground-china-aligned-ta415-conducts-us--6d79b657</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Going%20Underground%3A%20China-aligned%20TA415%20Conducts%20U.S.-China%20Economic%20Relations%20Targeting%20Using%20VS%20Code%20Remote%20Tunnels&amp;severity=medium&amp;id=68ca99c9e83bd2ac601399bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10057-cwe-94-improper-control-of-generati-2a54016c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10057%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20smackcoders%20WP%20Import%20%E2%80%93%20Ultimate%20CSV%20XML%20Importer%20for%20WordPress&amp;severity=high&amp;id=68cab09db62c8e2e63b24673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10058-cwe-73-external-control-of-file-nam-606aedee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10058%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=high&amp;id=68cab09db62c8e2e63b24679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10042-cwe-89-improper-neutralization-of-s-42f18373</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10042%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=68cab09db62c8e2e63b2466d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59307-unquoted-search-path-or-element-in--7274f9f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59307%3A%20Unquoted%20search%20path%20or%20element%20in%20Century%20Corporation%20RAID%20Manager&amp;severity=medium&amp;id=68ca3542cf800f555c4d167a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10125-cwe-80-improper-neutralization-of-s-3127118b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10125%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20strangerstudios%20Memberlite%20Shortcodes&amp;severity=medium&amp;id=68cab09db62c8e2e63b2467f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10188-cwe-352-cross-site-request-forgery--d022a958</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10188%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tvcnet%20The%20Hack%20Repair%20Guy&apos;s%20Plugin%20Archiver&amp;severity=medium&amp;id=68cab09db62c8e2e63b24684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10589-cwe-78-improper-neutralization-of-s-e7694850</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10589%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20N-Partner%20N-Reporter&amp;severity=high&amp;id=68ca2f55571b2840ff02d5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58116-improper-neutralization-of-special--1d62e4cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58116%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20WN-7D36QR&amp;severity=high&amp;id=68ca2bd1571b2840ff02c43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55075-hidden-functionality-in-i-o-data-de-4bcb9b23</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55075%3A%20Hidden%20functionality%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20WN-7D36QR&amp;severity=medium&amp;id=68ca2bd1571b2840ff02c43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9818-cwe-428-unquoted-search-path-or-elem-dd3623dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9818%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20OMRON%20SOCIAL%20SOLUTIONS%20CO.%2C%20Ltd.%20PowerAttendant%20Standard%20Edition&amp;severity=medium&amp;id=68ca2bd1571b2840ff02c446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10584-cross-site-scripting-in-portabilis--d7ba4837</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10584%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68ca2bd1571b2840ff02c434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8153-cwe-79-improper-neutralization-of-in-641e381f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8153%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NEC%20Corporation%20UNIVERGE%20IX&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9891-cwe-352-cross-site-request-forgery-c-6c29f695</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9891%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cyberlord92%20User%20Sync&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9629-cwe-352-cross-site-request-forgery-c-1568741a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9629%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shenyanzhi%20USS%20Upyun&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10050-cwe-22-improper-limitation-of-a-pat-bd115068</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10050%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20eskapism%20Developer%20Loggers%20for%20Simple%20History&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9851-cwe-79-improper-neutralization-of-in-6ffe0b94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gentlesource%20Appointmind&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10143-cwe-98-improper-control-of-filename-51917e01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10143%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20catchthemes%20Catch%20Dark%20Mode&amp;severity=high&amp;id=68ca1a3d571b2840ff0172de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8394-cwe-79-improper-neutralization-of-in-c822be60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8394%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20productiveminds%20Productive%20Style%20%E2%80%93%20Optimisations%20%26%20Content%20Publishing%20Support&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10166-cwe-79-improper-neutralization-of-i-35954fc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10166%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tw2113%20Social%20Media%20Shortcodes&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-17-61a13a3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-17&amp;severity=medium&amp;id=68cb4ffee5fa2c8b1490da0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56648-na-7d647a52</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56648%3A%20n%2Fa&amp;severity=medium&amp;id=68cb06d7ab9d7384897e2e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59304-na-a827e978</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59304%3A%20n%2Fa&amp;severity=critical&amp;id=68cae5b836e4949322b6f6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54390-na-46432655</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54390%3A%20n%2Fa&amp;severity=medium&amp;id=68cacafeb5ede819561abda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55904-na-ceb43ed3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55904%3A%20n%2Fa&amp;severity=medium&amp;id=68cac8129696ec3ac01d3cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57055-na-d54ed480</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57055%3A%20n%2Fa&amp;severity=medium&amp;id=68cac5e01f355dcd5a94ad91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50709-na-cb54daff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50709%3A%20n%2Fa&amp;severity=medium&amp;id=68cabe94c63ec85b9b839237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59518-cwe-78-improper-neutralization-of-s-2faf1907</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59518%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20lemonldap-ng%20LemonLDAP%3A%3ANG&amp;severity=high&amp;id=68ca2bd1571b2840ff02c442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37125-vulnerability-in-hewlett-packard-en-a25d35e6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37125%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=high&amp;id=68c9e6efa26b70491bc85827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37123-vulnerability-in-hewlett-packard-en-3d3af7f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37123%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=high&amp;id=68c9e57e1b7dc273b7496134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37124-vulnerability-in-hewlett-packard-en-482f958c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37124%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=high&amp;id=68c9e57e1b7dc273b7496137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43804-cwe-79-improper-neutralization-of-i-45e08a39</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c9e414de3f3ca929b62f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37128-vulnerability-in-hewlett-packard-en-1e4b83d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37128%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=medium&amp;id=68c9e414de3f3ca929b62f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37129-vulnerability-in-hewlett-packard-en-fe853556</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37129%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=medium&amp;id=68c9e414de3f3ca929b62f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37127-vulnerability-in-hewlett-packard-en-b2460825</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37127%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=high&amp;id=68c9e414de3f3ca929b62f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37130-vulnerability-in-hewlett-packard-en-6bbe562a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37130%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=medium&amp;id=68c9e414de3f3ca929b62f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37126-vulnerability-in-hewlett-packard-en-8e5f203b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37126%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=high&amp;id=68c9e414de3f3ca929b62f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37131-vulnerability-in-hewlett-packard-en-b9a7b149</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37131%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=medium&amp;id=68c9e414de3f3ca929b62f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-replicating-shai-hulud-worm-spreads-token-ste-9fe7ee76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-replicating%20Shai-hulud%20worm%20spreads%20token%20stealing%20malware%20on%20npm&amp;severity=medium&amp;id=68ca9a856f90669b55758b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43805-cwe-862-missing-authorization-in-li-af9c89f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43805%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c9d97f378f59cc24092211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10566-cross-site-scripting-in-campcodes-g-128e3d1b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10566%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c9d813d6e474b8e50ebcee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9708-cwe-295-improper-certificate-validat-9b326754</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9708%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Kubernetes%20Kubernetes%20CSharp%20Client&amp;severity=medium&amp;id=68c9d48cc64fcd5cd5375ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10565-sql-injection-in-campcodes-grocery--867e729d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10565%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c9c9e1a11609747ab60866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10564-sql-injection-in-campcodes-grocery--cc21e1c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10564%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c9c9e1a11609747ab6085f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10563-sql-injection-in-campcodes-grocery--611e1891</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10563%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c9c2d13e74084d506c7f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34187-cwe-269-improper-privilege-manageme-ecaf56b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34187%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Ilevia%20Srl.%20EVE%20X1%2FX5%20Server&amp;severity=critical&amp;id=68c9c7c0c844de074c59d830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34186-cwe-287-improper-authentication-in--d3457de5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34186%3A%20CWE-287%20Improper%20Authentication%20in%20Ilevia%20Srl.%20EVE%20X1%2FX5%20Server&amp;severity=critical&amp;id=68c9c9e1a11609747ab6086d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34185-cwe-200-exposure-of-sensitive-infor-b384622f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34185%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68c9be8e5515080b7bb74f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34184-cwe-78-improper-neutralization-of-s-22f44d2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34184%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68c9be8e5515080b7bb74f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34183-cwe-532-insertion-of-sensitive-info-d37fa94d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34183%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68c9be8e5515080b7bb74f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10562-sql-injection-in-campcodes-grocery--6b321c23</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10562%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c9b60bd3e32ff68f895038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-dcom-part-1-78a4be08</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20DCOM%20part%201&amp;severity=medium&amp;id=68c9b1f34dee7b73f6adc229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ongoing-filefix-attack-installs-stealc-infostealer-3972af01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ongoing%20FileFix%20Attack%20Installs%20StealC%20Infostealer%20Via%20Fake%20Facebook%20Pages&amp;severity=medium&amp;id=68c9ad7fb2b6370f0fcceb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49728-cwe-312-cleartext-storage-of-sensit-645c7851</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49728%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20PC%20Manager&amp;severity=medium&amp;id=68c9ac1668484133f6b9fc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47967-cwe-357-insufficient-ui-warning-of--6cf9a517</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47967%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68c9ac1668484133f6b9fc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54237-out-of-bounds-read-cwe-125-in-adobe-835d6ba4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54237%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=medium&amp;id=68c99efff4c09bec87d9a874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54262-out-of-bounds-read-cwe-125-in-adobe-ca19efa2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54262%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68c99efff4c09bec87d9a877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59336-cwe-22-improper-limitation-of-a-pat-eec051cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59336%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20lumen-oss%20luanox&amp;severity=medium&amp;id=68c9985b238a0184d6560f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-extends-shutdown-after-cyberatta-aa8cc259</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20extends%20shutdown%20after%20cyberattack%20by%20another%20week&amp;severity=high&amp;id=68c9956bcb0fe83b581fe751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-replicating-worm-hits-180-software-packages-af0482ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Replicating%20Worm%20Hits%20180%2B%20Software%20Packages&amp;severity=high&amp;id=68c9956bcb0fe83b581fe75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/slopads-fraud-ring-exploits-224-android-apps-to-dr-328f15dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SlopAds%20Fraud%20Ring%20Exploits%20224%20Android%20Apps%20to%20Drive%202.3%20Billion%20Daily%20Ad%20Bids&amp;severity=high&amp;id=68c9956bcb0fe83b581fe755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59334-cwe-347-improper-verification-of-cr-c0a08755</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59334%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20mohammadzain2008%20Linkr&amp;severity=critical&amp;id=68c995a8cb0fe83b58201ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fifteen-ransomware-gangs-retire-future-unclear-2e003cc5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fifteen%20Ransomware%20Gangs%20%E2%80%9CRetire%2C%E2%80%9D%20Future%20Unclear&amp;severity=high&amp;id=68c9956bcb0fe83b581fe75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59161-cwe-20-improper-input-validation-in-48c32dbf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59161%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20element-hq%20element-web&amp;severity=low&amp;id=68c995a8cb0fe83b58201ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10492-vulnerability-in-jaspersoft-jasperr-8b62b365</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10492%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Jaspersoft%20JasperReports%20Library%20Community%20Edition&amp;severity=high&amp;id=68c995a8cb0fe83b58201ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59160-cwe-345-insufficient-verification-o-7c128355</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59160%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20matrix-org%20matrix-js-sdk&amp;severity=low&amp;id=68c993298d6281de8b72eaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58174-cwe-79-improper-neutralization-of-i-742dbc4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58174%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=68c993298d6281de8b72eaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43801-cwe-606-unchecked-input-for-loop-co-42542335</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43801%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c98df7d592b4af578fc5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58749-cwe-822-untrusted-pointer-dereferen-dffc9d12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58749%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=low&amp;id=68c9896e330108e524b3d351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-supply-side-attack-s1ngularitynx-attackers-str-a1ec4d2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Supply%20Side%20Attack%20-%20S1ngularity%2Fnx%20attackers%20strike%20again&amp;severity=medium&amp;id=68c9826cde6d24f38e66944f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41243-cwe-917-improper-neutralization-of--cb22114f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41243%3A%20CWE-917%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20Spring%20Cloud%20Gateway&amp;severity=critical&amp;id=68c97badd327290d6e7319cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4953-creation-of-temporary-file-with-inse-d9a421ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4953%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions&amp;severity=high&amp;id=68c97badd327290d6e7319d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/appsuite-onestart-manualfinder-the-nexus-of-decept-6a6fb237</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AppSuite%2C%20OneStart%20%26%20ManualFinder%3A%20The%20Nexus%20of%20Deception&amp;severity=medium&amp;id=68c9985a238a0184d6560ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59270-cwe-757-selection-of-less-secure-al-9e585016</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59270%3A%20CWE-757%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20pspete%20psPAS&amp;severity=low&amp;id=68c978667303a81d6bf89e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36244-cwe-454-external-initialization-of--d1cdf923</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36244%3A%20CWE-454%20External%20Initialization%20of%20Trusted%20Variables%20or%20Data%20Stores%20in%20IBM%20AIX&amp;severity=high&amp;id=68c978667303a81d6bf89e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/filefix-in-the-wild-new-filefix-campaign-goes-beyo-bccc3557</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FileFix%20in%20the%20wild!%20New%20FileFix%20campaign%20goes%20beyond%20POC%20and%20leverages%20steganography&amp;severity=medium&amp;id=68c97556c5f0f7930cac8160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8894-cwe-122-heap-based-buffer-overflow-i-6f844875</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8894%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=68c97484c3a8a11ff039d593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59333-cwe-284-improper-access-control-in--57cdcd27</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59333%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20executeautomation%20mcp-database-server&amp;severity=high&amp;id=68c97484c3a8a11ff039d58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8893-cwe-787-out-of-bounds-write-in-autod-dd2fb5f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8893%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Revit&amp;severity=high&amp;id=68c97484c3a8a11ff039d58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8057-cwe-639-authorization-bypass-through-5de876d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8057%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Patika%20Global%20Technologies%20HumanSuite&amp;severity=medium&amp;id=68c96f20164fb734315ebab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8276-cwe-116-improper-encoding-or-escapin-294b08bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Patika%20Global%20Technologies%20HumanSuite&amp;severity=medium&amp;id=68c96f20164fb734315ebab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/august-2025-apt-attack-trends-report-ff0121fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=August%202025%20APT%20Attack%20Trends%20Report&amp;severity=medium&amp;id=68c972ebc2fae287eff2bab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/august-2025-infostealer-trend-report-3bdd0521</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=August%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=68c973c5ba2489d7522e0b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/under-the-pure-curtain-from-rat-to-builder-to-code-80732e1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Under%20the%20Pure%20Curtain%3A%20From%20RAT%20to%20Builder%20to%20Coder&amp;severity=medium&amp;id=68e301c843279ad048c58463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7355-cwe-639-authorization-bypass-through-cc7ed8bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7355%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Beefull%20Energy%20Technologies%20Beefull%20App&amp;severity=medium&amp;id=68c95d616f4da0585007d46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10290-opening-links-via-the-contextual-me-d4fb17a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10290%3A%20Vulnerability%20in%20Mozilla%20Focus%20for%20iOS&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10535-information-disclosure-mitigation-b-18ad242a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10535%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10534-spoofing-issue-in-the-site-permissi-b8aa5b84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10534%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10531-mitigation-bypass-in-the-web-compat-eaff9472</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10531%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10530-spoofing-issue-in-the-webauthn-comp-e797c263</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10530%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10537-memory-safety-bugs-fixed-in-firefox-1b0a3150</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10537%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10536-information-disclosure-in-the-netwo-24360fc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10536%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10532-incorrect-boundary-conditions-in-th-a622c58b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10532%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10529-same-origin-policy-bypass-in-the-la-71f41072</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10529%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10528-sandbox-escape-due-to-undefined-beh-28127e0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10528%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10527-sandbox-escape-due-to-use-after-fre-7604e379</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10527%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10533-integer-overflow-in-the-svg-compone-79236a99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10533%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55118-cwe-122-heap-based-buffer-overflow--da170a73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55118%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20BMC%20Control-M%2FAgent&amp;severity=high&amp;id=68c958c0ff7c553b3ddd1f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55117-cwe-121-stack-based-buffer-overflow-edb033b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55117%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20BMC%20Control-M%2FAgent&amp;severity=medium&amp;id=68c958c0ff7c553b3ddd1f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55116-cwe-121-stack-based-buffer-overflow-0b953bd0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55116%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=68c958bfff7c553b3ddd1f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55115-cwe-23-relative-path-traversal-in-b-581a75d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55115%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=68c958bfff7c553b3ddd1f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55114-cwe-696-incorrect-behavior-order-in-c913b9d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55114%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20BMC%20Control-M%2FAgent&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55113-cwe-158-improper-neutralization-of--43c4fe9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55113%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=68c958bfff7c553b3ddd1f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55112-cwe-321-use-of-hard-coded-cryptogra-d62b5b56</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55112%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20BMC%20Control-M%2FAgent&amp;severity=high&amp;id=68c958bfff7c553b3ddd1f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10546-cwe-79-improper-neutralization-of-i-31cf0282</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10546%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PPC%20Technologies%20PPC%20XPON%20ONT%20(Optical%20Network%20Terminal)%202K15X&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55111-cwe-276-incorrect-default-permissio-cf5e8273</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55111%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20BMC%20Control-M%2FAgent&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55110-cwe-1392-use-of-default-credentials-44387093</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55110%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20BMC%20Control-M%2FAgent&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55109-cwe-295-improper-certificate-valida-f011060c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55109%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=68c9aeedde7b17539b24308a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7743-cwe-319-cleartext-transmission-of-se-4fe77ef3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7743%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Dolusoft%20Omaspot&amp;severity=critical&amp;id=68c9bbbb28d23855bde227e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7744-cwe-89-improper-neutralization-of-sp-70f68a01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7744%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dolusoft%20Omaspot&amp;severity=critical&amp;id=68c9bbbb28d23855bde227e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6575-cwe-79-improper-neutralization-of-in-c1a7d16c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dolusoft%20Omaspot&amp;severity=medium&amp;id=68c9bbbb28d23855bde227df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockergoga-ransomware-admin-on-eu-most-wanted-list-3c2854aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockerGoga%20Ransomware%20Admin%20on%20EU%20Most%20Wanted%20List%20With%20%2410M%20DOJ%20Reward&amp;severity=medium&amp;id=68c94d573f860eb6de238022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lg-vulnerability-lg-webos-tv-path-traversal-au-a0df1dc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20LG%20Vulnerability%20-%20LG%20WebOS%20TV%20Path%20Traversal%2C%20Authentication%20Bypass%20and%20Full%20Device%20Takeover&amp;severity=medium&amp;id=68c94c847c9dc3cee46e4e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8446-cwe-862-missing-authorization-in-bla-ab569f8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8446%3A%20CWE-862%20Missing%20Authorization%20in%20blazethemes%20Blaze%20Demo%20Importer&amp;severity=medium&amp;id=68c9496f561c5e692a3e1c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41249-vulnerability-in-vmware-spring-fram-c2ba4cb4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41249%3A%20Vulnerability%20in%20VMware%20Spring%20Framework&amp;severity=high&amp;id=68c93a2ba0289a6492bfcc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gucci-balenciaga-and-alexander-mcqueen-breach-link-38a3c797</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gucci%2C%20Balenciaga%20and%20Alexander%20McQueen%20Breach%20Linked%20to%20ShinyHunters&amp;severity=high&amp;id=68c93962571dda8150db7b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41248-vulnerability-in-vmware-spring-secu-fd8f571e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41248%3A%20Vulnerability%20in%20VMware%20Spring%20Security&amp;severity=high&amp;id=68c93a2ba0289a6492bfcc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10016-cwe-863-incorrect-authorization-in--09b11dd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10016%3A%20CWE-863%20Incorrect%20Authorization%20in%20Sparkle%20Project%20Sparkle&amp;severity=high&amp;id=68c9bbbb28d23855bde227da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10015-cwe-863-incorrect-authorization-in--fab63ce0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10015%3A%20CWE-863%20Incorrect%20Authorization%20in%20Sparkle%20Project%20Sparkle&amp;severity=medium&amp;id=68c9bbbb28d23855bde227d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26711-cwe-200-exposure-of-sensitive-infor-b72d7f31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26711%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ZTE%20T5400&amp;severity=medium&amp;id=68c930ca3d980629458048fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26710-cwe-200-exposure-of-sensitive-infor-8f6817b6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26710%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ZTE%20T5400&amp;severity=low&amp;id=68c9ba513e540f592ae59bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10316-cwe-79-improper-neutralization-of-i-f77c85ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20Extension%20%22Form%20to%20Database%22%20(form_to_database)&amp;severity=low&amp;id=68c9ba513e540f592ae59bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/40-npm-packages-compromised-in-supply-chain-attack-0c7f16dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=40%20npm%20Packages%20Compromised%20in%20Supply%20Chain%20Attack%20Using%20bundle.js%20to%20Steal%20Credentials&amp;severity=high&amp;id=68c924b0c1430862a6bbbabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4688-cwe-89-improper-neutralization-of-sp-4464879c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4688%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BGS%20Interactive%20SINAV.LINK%20Exam%20Result%20Module&amp;severity=critical&amp;id=68c924bec1430862a6bbbb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2404-cwe-79-improper-neutralization-of-in-a7922b03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2404%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ubit%20Information%20Technologies%20STOYS&amp;severity=medium&amp;id=68c9ba513e540f592ae59bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53293-9bf7e503</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53293&amp;severity=low&amp;id=6901fa173aaa0256651529b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5519-cwe-201-insertion-of-sensitive-infor-6b7d0fd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5519%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ArgusTech%20BILGER&amp;severity=medium&amp;id=68c9fc31571b2840ff007f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-smokeloader-version-2025-418a5976</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20SmokeLoader%20Version%202025&amp;severity=medium&amp;id=68c930ca3d980629458048c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5518-cwe-639-authorization-bypass-through-4c4daf7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5518%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ArgusTech%20BILGER&amp;severity=medium&amp;id=68c9197a0bc99c4a12389274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9808-cwe-200-exposure-of-sensitive-inform-89c2c5b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9808%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=68c9fc31571b2840ff007f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctrltinycolor-and-40-npm-packages-compromised-c8a43d6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ctrl%2Ftinycolor%20and%2040%2B%20NPM%20Packages%20Compromised&amp;severity=medium&amp;id=68c8c185ee2781683eecac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/htmldoc-1913-stack-buffer-overflow-f22724c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTMLDOC%201.9.13%20-%20Stack%20Buffer%20Overflow&amp;severity=medium&amp;id=68db38bca473ffe031e3631d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/http2-20-denial-of-service-dos-6c612151</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTTP%2F2%202.0%20-%20Denial%20Of%20Service%20(DOS)&amp;severity=medium&amp;id=68db38bca473ffe031e3631a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mbed-tls-364-use-after-free-9579efdc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mbed%20TLS%203.6.4%20-%20Use-After-Free&amp;severity=medium&amp;id=68db38bca473ffe031e36317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/concrete-cms-943-stored-xss-d504df5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Concrete%20CMS%209.4.3%20-%20Stored%20XSS&amp;severity=medium&amp;id=68db38bba473ffe031e362ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xwiki-platform-151010-metasploit-module-for-remote-746e56f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWiki%20Platform%2015.10.10%20-%20Metasploit%20Module%20for%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68db38bba473ffe031e362eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elex-woocommerce-wordpress-plugin-143-sql-injectio-5654ac6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ELEX%20WooCommerce%20WordPress%20Plugin%201.4.3%20-%20SQL%20Injection&amp;severity=critical&amp;id=68db38bba473ffe031e362e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dotcms-250702-1-authenticated-blind-sql-injection-df73a834</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=dotCMS%2025.07.02-1%20-%20Authenticated%20Blind%20SQL%20Injection&amp;severity=medium&amp;id=68db38bba473ffe031e362e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casdoor-2550-cross-site-request-forgery-csrf-b6a0caaf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casdoor%202.55.0%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=68db38bba473ffe031e362e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tourism-management-system-20-arbitrary-shell-uploa-201a9e6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tourism%20Management%20System%202.0%20-%20Arbitrary%20Shell%20Upload&amp;severity=medium&amp;id=68db38bba473ffe031e362df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clipbucket-552-build-90-server-side-request-forger-4c2123c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClipBucket%205.5.2%20Build%20%2390%20-%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=68db38bba473ffe031e362dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clipbucket-550-arbitrary-file-upload-2e1ff91a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClipBucket%205.5.0%20-%20Arbitrary%20File%20Upload&amp;severity=medium&amp;id=68db38bba473ffe031e362d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-server-2025-hyper-v-nt-kernel-in-ed709097</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%20Server%202025%20Hyper-V%20NT%20Kernel%20Integration%20VSP%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=68db38bba473ffe031e362d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ilevia-eve-x1x5-server-47180eden-reverse-rootshell-eeb6d3fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ilevia%20EVE%20X1%2FX5%20Server%204.7.18.0.eden%20-%20Reverse%20Rootshell&amp;severity=medium&amp;id=68db38bba473ffe031e362d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57631-na-7ff53910</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57631%3A%20n%2Fa&amp;severity=critical&amp;id=68c9fc31571b2840ff007f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56264-na-f9f54c50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56264%3A%20n%2Fa&amp;severity=high&amp;id=68c9fc31571b2840ff007f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54391-na-2f9cfd07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54391%3A%20n%2Fa&amp;severity=critical&amp;id=68c9cd7b60de0cbc503e6cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56263-na-3dbe9927</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56263%3A%20n%2Fa&amp;severity=high&amp;id=68c9bd25693550a54d63d2e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56557-na-e29b7d0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56557%3A%20n%2Fa&amp;severity=critical&amp;id=68c9ac1668484133f6b9fc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57625-na-19190121</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57625%3A%20n%2Fa&amp;severity=high&amp;id=68c9a92f69caf095b57bf38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57624-na-f6b05162</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57624%3A%20n%2Fa&amp;severity=high&amp;id=68c9a92f69caf095b57bf38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56562-na-2f4db3d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56562%3A%20n%2Fa&amp;severity=high&amp;id=68c9a92f69caf095b57bf384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30075-ba6d910c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30075%3A%20CWE-673%20External%20Influence%20of%20Sphere%20Definition%20in%20Alludo%20MindManager&amp;severity=low&amp;id=68c984c585f45fd53b6e2804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57145-na-45781c82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57145%3A%20n%2Fa&amp;severity=medium&amp;id=68c97dc81745d1bd2332d286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56295-na-618f7afc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56295%3A%20n%2Fa&amp;severity=high&amp;id=68c97badd327290d6e7319d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56293-na-21cc00a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56293%3A%20n%2Fa&amp;severity=medium&amp;id=68c978667303a81d6bf89e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56289-na-7182e976</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56289%3A%20n%2Fa&amp;severity=medium&amp;id=68c97484c3a8a11ff039d588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56280-na-1cd43c80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56280%3A%20n%2Fa&amp;severity=medium&amp;id=68c9716b1028f00afd44d15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56276-na-54fde27b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56276%3A%20n%2Fa&amp;severity=medium&amp;id=68c96f20164fb734315ebaae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57119-na-26cccaea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57119%3A%20n%2Fa&amp;severity=critical&amp;id=68c96c13c51a739278df7100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44034-na-b98bc89e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44034%3A%20n%2Fa&amp;severity=high&amp;id=68c96c13c51a739278df70fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52044-na-112e904d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52044%3A%20n%2Fa&amp;severity=high&amp;id=68c96805849d7237d8ea7a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55834-na-e27237df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55834%3A%20n%2Fa&amp;severity=medium&amp;id=68c95d616f4da0585007d46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56697-na-e4e17f60</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56697%3A%20n%2Fa&amp;severity=medium&amp;id=68c9496f561c5e692a3e1c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56706-na-a56030cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56706%3A%20n%2Fa&amp;severity=high&amp;id=68c9472d35a89d3eac0aae49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59453-cwe-669-incorrect-resource-transfer-72c96cab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59453%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20clickstudios%20Passwordstate&amp;severity=low&amp;id=68c8dd86ee2781683eed6b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59437-cwe-918-server-side-request-forgery-972cf459</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59437%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20fedorindutny%20ip&amp;severity=low&amp;id=68c8c86eee2781683eecc885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59436-cwe-918-server-side-request-forgery-64d3f7a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59436%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20fedorindutny%20ip&amp;severity=low&amp;id=68c8c86eee2781683eecc881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finwise-insider-breach-impacts-689k-american-first-92e5b4b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FinWise%20insider%20breach%20impacts%20689K%20American%20First%20Finance%20customers&amp;severity=high&amp;id=68c89f75af2084f1f5772695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-confirms-fraudulent-account-created-in-law--cf8d0b02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20confirms%20fraudulent%20account%20created%20in%20law%20enforcement%20portal&amp;severity=high&amp;id=68c89f75af2084f1f5772699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-millions-of-gucci-balenciaga-and-ale-44cf728e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20steal%20millions%20of%20Gucci%2C%20Balenciaga%2C%20and%20Alexander%20McQueen%20customer%20records&amp;severity=medium&amp;id=68c89f76af2084f1f577269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43332-an-app-may-be-able-to-break-out-of--5333542b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43332%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6fee2781683eebd665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43298-an-app-may-be-able-to-gain-root-pri-dc790aba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43298%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6eee2781683eebd5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43349-processing-a-maliciously-crafted-vi-83b9aee9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43349%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=68c8aa70ee2781683eebd6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43308-an-app-may-be-able-to-access-sensit-b1e122f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43308%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=68c8aa6eee2781683eebd609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43328-an-app-may-be-able-to-access-sensit-a4271767</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43328%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=68c8aa6fee2781683eebd655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43294-an-app-may-be-able-to-access-sensit-e4efe66d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43294%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=68c8aa6dee2781683eebd5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43369-an-app-may-be-able-to-access-protec-cb3bb5ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43369%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43312-an-app-may-be-able-to-cause-unexpec-786ed0ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43312%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43353-processing-a-maliciously-crafted-st-ad9f05f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43353%3A%20Processing%20a%20maliciously%20crafted%20string%20may%20lead%20to%20heap%20corruption%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43304-an-app-may-be-able-to-gain-root-pri-c0136526</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43304%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6eee2781683eebd5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43305-a-malicious-app-may-be-able-to-acce-a7efeda3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43305%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43344-an-app-may-be-able-to-cause-unexpec-499ef3c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43344%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=68c8aa70ee2781683eebd6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43190-an-app-may-be-able-to-access-sensit-32ef4c99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43190%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43368-processing-maliciously-crafted-web--4a267181</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43368%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68c8aa70ee2781683eebd7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43295-an-app-may-be-able-to-cause-a-denia-94a8e5cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43295%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43329-an-app-may-be-able-to-break-out-of--8297a142</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43329%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68c8aa6fee2781683eebd658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43283-an-app-may-be-able-to-cause-unexpec-54576239</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43283%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=low&amp;id=68c8aa6dee2781683eebd59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43333-an-app-may-be-able-to-gain-root-pri-1ecac34d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43333%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6fee2781683eebd66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43299-an-app-may-be-able-to-cause-a-denia-efe059d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43299%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43325-an-app-may-be-able-to-access-sensit-8f840805</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43325%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6fee2781683eebd649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43372-processing-a-maliciously-crafted-me-eb039bc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43372%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43292-an-app-may-be-able-to-access-sensit-e92395f8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43292%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6dee2781683eebd5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43314-an-app-may-be-able-to-access-sensit-b5d9f16e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43314%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43343-processing-maliciously-crafted-web--ffafdb2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43343%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=critical&amp;id=68c8aa70ee2781683eebd6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43355-an-app-may-be-able-to-cause-a-denia-0501258f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43355%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43302-an-app-may-be-able-to-cause-unexpec-a29a8b93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43302%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43375-processing-an-overly-large-path-val-7525fefd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43375%3A%20Processing%20an%20overly%20large%20path%20value%20may%20crash%20a%20process%20in%20Apple%20Xcode&amp;severity=high&amp;id=68c8aa71ee2781683eebd7f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31271-incoming-facetime-calls-can-appear--9bf28a7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31271%3A%20Incoming%20FaceTime%20calls%20can%20appear%20or%20be%20accepted%20on%20a%20locked%20macOS%20device%2C%20even%20with%20notifications%20disabled%20on%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6cee2781683eebd568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43318-an-app-with-root-privileges-may-be--886d621c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43318%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43359-a-udp-server-socket-bound-to-a-loca-ed167c55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43359%3A%20A%20UDP%20server%20socket%20bound%20to%20a%20local%20interface%20may%20become%20bound%20to%20all%20interfaces%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68c8aa70ee2781683eebd7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43358-a-shortcut-may-be-able-to-bypass-sa-147f9a22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43358%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20sandbox%20restrictions%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68c8aa70ee2781683eebd7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43319-an-app-may-be-able-to-access-protec-bcb3be08</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43319%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43362-an-app-may-be-able-to-monitor-keyst-c11105d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43362%3A%20An%20app%20may%20be%20able%20to%20monitor%20keystrokes%20without%20user%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68c8aa70ee2781683eebd7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31270-an-app-may-be-able-to-access-protec-f629af30</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31270%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43231-an-app-may-be-able-to-access-user-s-66bf8aff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43231%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43303-an-app-may-be-able-to-access-sensit-bc194d59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43303%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43354-an-app-may-be-able-to-access-sensit-affe9264</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43354%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43342-processing-maliciously-crafted-web--1cf79370</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43342%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=critical&amp;id=68c8aa70ee2781683eebd6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43207-an-app-may-be-able-to-access-user-s-b953299f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43207%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43315-an-app-may-be-able-to-access-user-s-40681d86</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43315%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43293-an-app-may-be-able-to-access-sensit-a4213db0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43293%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6dee2781683eebd5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43285-an-app-may-be-able-to-access-protec-c9643b71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43285%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6dee2781683eebd5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43357-an-app-may-be-able-to-fingerprint-t-c9cf594b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43357%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43204-an-app-may-be-able-to-break-out-of--7888deff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43204%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6cee2781683eebd577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43341-an-app-may-be-able-to-gain-root-pri-dc129ff0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43341%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa70ee2781683eebd6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43316-a-malicious-app-may-be-able-to-gain-b8d37055</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43316%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6eee2781683eebd627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31269-an-app-may-be-able-to-access-protec-bbb5c8bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31269%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43286-an-app-may-be-able-to-break-out-of--ec94bbbe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43286%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6dee2781683eebd5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43208-an-app-may-be-able-to-read-sensitiv-abec2da5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43208%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24088-an-app-may-be-able-to-override-mdm--302926b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24088%3A%20An%20app%20may%20be%20able%20to%20override%20MDM-enforced%20settings%20from%20profiles%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6cee2781683eebd538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43321-an-app-may-be-able-to-access-protec-eaf84d84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43321%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6fee2781683eebd644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43337-an-app-may-be-able-to-access-sensit-35982685</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43337%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43272-processing-maliciously-crafted-web--c45cf4e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43272%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68c8aa6dee2781683eebd593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43287-processing-a-maliciously-crafted-im-c07fbc01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43287%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6dee2781683eebd5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31268-an-app-may-be-able-to-access-protec-85cbd336</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31268%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43291-an-app-may-be-able-to-modify-protec-166dbf83</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43291%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6dee2781683eebd5ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24197-an-app-may-be-able-to-access-sensit-096523ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24197%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43317-an-app-may-be-able-to-access-sensit-45791ad0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43317%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43340-an-app-may-be-able-to-break-out-of--79de87bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43340%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa70ee2781683eebd6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43356-a-website-may-be-able-to-access-sen-85efd7cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43356%3A%20A%20website%20may%20be%20able%20to%20access%20sensor%20information%20without%20user%20consent%20in%20Apple%20Safari&amp;severity=medium&amp;id=68c8aa70ee2781683eebd7a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43301-an-app-may-be-able-to-access-contac-c4182c63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43301%3A%20An%20app%20may%20be%20able%20to%20access%20contact%20info%20related%20to%20notifications%20in%20Notification%20Center%20in%20Apple%20macOS&amp;severity=low&amp;id=68c8aa6eee2781683eebd5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43367-an-app-may-be-able-to-access-protec-c4d5ad3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43367%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd7c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43330-an-app-may-be-able-to-break-out-of--c2fe6298</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43330%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6fee2781683eebd65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43326-an-app-may-be-able-to-access-sensit-1e7510dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43326%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6fee2781683eebd64c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43263-an-app-may-be-able-to-read-and-writ-8e815ad2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43263%3A%20An%20app%20may%20be%20able%20to%20read%20and%20write%20files%20outside%20of%20its%20sandbox%20in%20Apple%20Xcode&amp;severity=high&amp;id=68c8aa6cee2781683eebd586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43371-an-app-may-be-able-to-break-out-of--30f0c770</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43371%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20Xcode&amp;severity=high&amp;id=68c8aa71ee2781683eebd7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31255-an-app-may-be-able-to-access-sensit-442c68b0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31255%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68c8aa6cee2781683eebd54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43347-an-input-validation-issue-was-addre-93eda499</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43347%3A%20An%20input%20validation%20issue%20was%20addressed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68c8aa70ee2781683eebd6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43310-an-app-may-be-able-to-trick-a-user--53b4456f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43310%3A%20An%20app%20may%20be%20able%20to%20trick%20a%20user%20into%20copying%20sensitive%20data%20to%20the%20pasteboard%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43279-an-app-may-be-able-to-access-user-s-f84462a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43279%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6dee2781683eebd59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30468-private-browsing-tabs-may-be-access-63593d39</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30468%3A%20Private%20Browsing%20tabs%20may%20be%20accessed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43297-an-app-may-be-able-to-cause-a-denia-3d3452e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43297%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43311-an-app-may-be-able-to-access-protec-a8c54b7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43311%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43203-an-attacker-with-physical-access-to-39ec23cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43203%3A%20An%20attacker%20with%20physical%20access%20to%20an%20unlocked%20device%20may%20be%20able%20to%20view%20an%20image%20in%20the%20most%20recently%20viewed%20locked%20note%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43346-processing-a-maliciously-crafted-me-5b62b180</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43346%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd6cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31254-processing-maliciously-crafted-web--37c71d3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31254%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20unexpected%20URL%20redirection%20in%20Apple%20Safari&amp;severity=medium&amp;id=68c8aa6cee2781683eebd546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43307-an-app-may-be-able-to-access-sensit-dd4157dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43307%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43370-processing-an-overly-large-path-val-9e38b5a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43370%3A%20Processing%20an%20overly%20large%20path%20value%20may%20crash%20a%20process%20in%20Apple%20Xcode&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43327-visiting-a-malicious-website-may-le-a7e77749</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43327%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=68c8aa6fee2781683eebd651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43262-usb-restricted-mode-may-not-be-appl-012d5cfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43262%3A%20USB%20Restricted%20Mode%20may%20not%20be%20applied%20to%20accessories%20connected%20during%20boot%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24133-keyboard-suggestions-may-display-se-5c1f138f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24133&amp;severity=null&amp;id=68c8aa6cee2781683eebd53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43331-an-app-may-be-able-to-access-protec-7f9ec14e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43331%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6fee2781683eebd662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43366-an-app-may-be-able-to-disclose-copr-0e4a1df2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43366%3A%20An%20app%20may%20be%20able%20to%20disclose%20coprocessor%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10485-cross-site-scripting-in-pojoin-h3bl-af894aff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10485%3A%20Cross%20Site%20Scripting%20in%20pojoin%20h3blog&amp;severity=medium&amp;id=68c8aa6cee2781683eebd532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10483-sql-injection-in-sourcecodester-onl-e1f19f2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10483%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68c8aa6cee2781683eebd52b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10482-sql-injection-in-sourcecodester-onl-42496c63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10482%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68c88d72d3590a194cba1bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10481-sql-injection-in-sourcecodester-onl-dbe1ff1c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10481%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68c88d72d3590a194cba1bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43802-cwe-79-improper-neutralization-of-i-871f591f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c88d72d3590a194cba1bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10480-unrestricted-upload-in-sourcecodest-880f98a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10480%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68c887a0ade1c1a7413995e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43797-cwe-1188-insecure-default-initializ-b79b2876</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43797%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c8863160bc4e6b5be35132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6947-cwe-79-improper-neutralization-of-in-82d1bb42</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6947%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=68c884bf6a59ddba4fb1ef08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6999-cwe-444-inconsistent-interpretation--b9f69583</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6999%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=68c884bf6a59ddba4fb1ef0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59056-cwe-22-improper-limitation-of-a-pat-7c5d45f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59056%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FreePBX%20framework&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10479-sql-injection-in-sourcecodester-onl-8a763591</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10479%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55211-cwe-78-improper-neutralization-of-s-f6ec615e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55211%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20framework&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43798-cwe-304-missing-critical-step-in-au-b275b277</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43798%3A%20CWE-304%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Liferay%20DXP&amp;severity=low&amp;id=68c8aa71ee2781683eebd801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59145-cwe-506-embedded-malicious-code-in--98aedd8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59145%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20colorjs%20color-name&amp;severity=high&amp;id=68c878ea26cffcb34e4501df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10477-sql-injection-in-kidaze-courseselec-220570fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10477%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68c878ea26cffcb34e4501d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43799-cwe-1393-use-of-default-password-in-0377fab8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43799%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c87688c684d8f83c917c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-phoenix-attack-bypasses-rowhammer-defenses-in--2704226f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Phoenix%20attack%20bypasses%20Rowhammer%20defenses%20in%20DDR5%20memory&amp;severity=high&amp;id=68c8729ac5b6362f674bc180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fairmont-federal-credit-union-2023-data-breach-imp-c4e5580b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fairmont%20Federal%20Credit%20Union%202023%20data%20breach%20impacted%20187K%20people&amp;severity=high&amp;id=68c8729ac5b6362f674bc184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-deploys-snakedisk-usb-worm-to-delive-0c8fd732</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Deploys%20SnakeDisk%20USB%20Worm%20to%20Deliver%20Yokai%20Backdoor%20on%20Thailand%20IPs&amp;severity=high&amp;id=68c8729ac5b6362f674bc17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59332-cwe-79-improper-neutralization-of-i-1f81bf2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59332%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dolfinus%203DAlloy&amp;severity=high&amp;id=68c8742b2c83040ec3b092e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59154-cwe-290-authentication-bypass-by-sp-1f327a9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59154%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20igniterealtime%20Openfire&amp;severity=medium&amp;id=68c871cf33dcebdb35c678ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10475-denial-of-service-in-spyshelter-968525a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10475%3A%20Denial%20of%20Service%20in%20SpyShelter&amp;severity=medium&amp;id=68c871cf33dcebdb35c678e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59331-cwe-506-embedded-malicious-code-in--84d00a7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59331%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20node-is-arrayish&amp;severity=high&amp;id=68c86d1cd09586c390afd456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59330-cwe-506-embedded-malicious-code-in--4cb691b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59330%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20node-error-ex&amp;severity=high&amp;id=68c86d1cd09586c390afd44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59162-cwe-506-embedded-malicious-code-in--d427bf83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59162%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20color-convert&amp;severity=high&amp;id=68c866d82e2c3e5d6abeedca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59142-cwe-506-embedded-malicious-code-in--584e745e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59142%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20color-string&amp;severity=high&amp;id=68c866d82e2c3e5d6abeedb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59144-cwe-506-embedded-malicious-code-in--8050c169</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59144%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20debug-js%20debug&amp;severity=high&amp;id=68c866d82e2c3e5d6abeedc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59143-cwe-506-embedded-malicious-code-in--42cb4c65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59143%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20color&amp;severity=high&amp;id=68c866d82e2c3e5d6abeedbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59141-cwe-506-embedded-malicious-code-in--a4ed7657</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59141%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20node-simple-swizzle&amp;severity=high&amp;id=68c866d82e2c3e5d6abeedae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59140-cwe-506-embedded-malicious-code-in--c2446ec8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59140%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20node-backslash&amp;severity=high&amp;id=68c866d82e2c3e5d6abeeda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43800-cwe-79-improper-neutralization-of-i-16278a55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c8aa72ee2781683eebd814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10473-sql-injection-in-yangzongzhuan-ruoy-240cc8ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10473%3A%20SQL%20Injection%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=68c8aa71ee2781683eebd804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dangers-of-storing-unencrypted-passwords-bf2cdb1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Dangers%20of%20Storing%20Unencrypted%20Passwords&amp;severity=medium&amp;id=68c866e12e2c3e5d6abeeded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digital-frontlines-india-under-multi-nation-hackti-76e5e01b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Digital%20Frontlines%3A%20India%20Under%20Multi-Nation%20Hacktivist%20Attack&amp;severity=medium&amp;id=68c866e12e2c3e5d6abeedd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10472-path-traversal-in-harry0703-moneypr-868c9c51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10472%3A%20Path%20Traversal%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=68c85d5defcb880aa9e16334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/playing-with-http2-connect-8265d90c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Playing%20with%20HTTP%2F2%20CONNECT&amp;severity=medium&amp;id=68c8579c5265fac210ab6d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43791-cwe-79-improper-neutralization-of-i-7d61cd29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43791%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c8579a5265fac210ab6d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59155-cwe-918-server-side-request-forgery-73cda405</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59155%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20yuna0x0%20hackmd-mcp&amp;severity=medium&amp;id=68c8469be8cf1c5173493847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58177-cwe-79-improper-neutralization-of-i-3fdef5e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58177%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=68c8450c6a96d484bebadcfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58172-cwe-79-improper-neutralization-of-i-df798aea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58172%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plait-board%20drawnix&amp;severity=medium&amp;id=68c84ebea2f5a8445a4f6876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-kimsuky-group-uses-ai-generated-milit-8363c39b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%E2%80%99s%20Kimsuky%20Group%20Uses%20AI-Generated%20Military%20IDs%20in%20New%20Attacks&amp;severity=medium&amp;id=68c841f06411cb71021b3d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10471-server-side-request-forgery-in-zkea-e6d7e811</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10471%3A%20Server-Side%20Request%20Forgery%20in%20ZKEACMS&amp;severity=medium&amp;id=68c841fc6411cb71021b3df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10203-cwe-23-relative-path-traversal-in-d-1d2dc37c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10203%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Digilent%20WaveForms&amp;severity=high&amp;id=68c8579a5265fac210ab6d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59328-cwe-502-deserialization-of-untruste-d01c21d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59328%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Fory&amp;severity=medium&amp;id=68c8aa72ee2781683eebd825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43792-cwe-15-external-control-of-system-o-3a0f5c44</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43792%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Liferay%20Portal&amp;severity=low&amp;id=68c8579a5265fac210ab6d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10491-cwe-284-improper-access-control-in--b4311296</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10491%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=68c841fc6411cb71021b3dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43793-cwe-1284-improper-validation-of-spe-c261559d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43793%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c8332cc6fbfcc734e1fa6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36082-cwe-525-information-exposure-throug-a699c43c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36082%3A%20CWE-525%20Information%20Exposure%20Through%20Browser%20Caching%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=68c8332cc6fbfcc734e1fa6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6202-vulnerability-in-sk-hynix-ddr5-b7fe3105</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6202%3A%20Vulnerability%20in%20SK%20Hynix%20DDR5&amp;severity=high&amp;id=68c82c4e61269957fe261ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10459-sql-injection-in-phpgurukul-beauty--2a09e083</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10459%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68c82c4e61269957fe261eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8396-cwe-770-allocation-of-resources-with-d36b4e53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8396%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Temporal%20OSS%20Server&amp;severity=medium&amp;id=68c821294546c28387c2f386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53183-399b8282</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53183&amp;severity=low&amp;id=695b99acdb813ff03e48b58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10448-sql-injection-in-campcodes-online-j-75887d29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10448%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Job%20Finder%20System&amp;severity=medium&amp;id=68c81eed25c9b2752eb48a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-criminal-groups-compromising-salesforce-inst-91b8ce72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Criminal%20Groups%20Compromising%20Salesforce%20Instances%20for%20Data%20Theft%20and%20Extortion&amp;severity=medium&amp;id=68c81efc25c9b2752eb48b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10447-unrestricted-upload-in-campcodes-on-9af03edc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10447%3A%20Unrestricted%20Upload%20in%20Campcodes%20Online%20Job%20Finder%20System&amp;severity=medium&amp;id=68c816c046d9c11e5a23765d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10446-sql-injection-in-campcodes-computer-2d6da06d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10446%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c810b8b7a9c003946d30b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/15th-september-threat-intelligence-report-325e846d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=15th%20September%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10445-sql-injection-in-campcodes-computer-0dbc2ea2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10445%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c808eec396be2414c8bd35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-hide-rmm-installs-as-fake-chrome-updates-a-14ea5eda</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Hide%20RMM%20Installs%20as%20Fake%20Chrome%20Updates%20and%20Teams%20Invites&amp;severity=medium&amp;id=68c8065ad4203851b347cbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3025-cwe-552-files-or-directories-accessi-7050cb5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3025%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Gen%20Digital%20CCleaner&amp;severity=high&amp;id=68c808eec396be2414c8bd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10444-sql-injection-in-campcodes-online-j-20aee9b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10444%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Job%20Finder%20System&amp;severity=medium&amp;id=68c80217f4c0d71d10f561fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59361-cwe-78-improper-neutralization-of-s-6a56f7fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59361%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=68c7fcb9de24c9cd9e93fa7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59360-cwe-78-improper-neutralization-of-s-a51018ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59360%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=68c7fcb9de24c9cd9e93fa7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59359-cwe-78-improper-neutralization-of-s-864a34b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59359%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=68c7ffd636f16715d5b79722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59358-cwe-306-missing-authentication-for--85c214ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59358%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function&amp;severity=high&amp;id=68c80217f4c0d71d10f5620e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10443-buffer-overflow-in-tenda-ac9-28b8e5b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10443%3A%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=68c7fa5eb8737bd57b2256dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43794-cwe-79-improper-neutralization-of-i-dad03d2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c80217f4c0d71d10f5620b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10442-os-command-injection-in-tenda-ac9-bbf85c81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10442%3A%20OS%20Command%20Injection%20in%20Tenda%20AC9&amp;severity=medium&amp;id=68c80217f4c0d71d10f56202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10441-os-command-injection-in-d-link-di-8-6b0fa821</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10441%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-8100G&amp;severity=medium&amp;id=68c7ec148959976f4c493b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9826-cwe-79-improper-neutralization-of-in-141d2f31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9826%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M-Files%20Corporation%20Hubshare&amp;severity=high&amp;id=68c7e8e796db7a5e0fec5312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-powered-villager-pen-testing-tool-hits-11000-py-42848b1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Powered%20Villager%20Pen%20Testing%20Tool%20Hits%2011%2C000%20PyPI%20Downloads%20Amid%20Abuse%20Concerns&amp;severity=high&amp;id=68c7e5cdba7455fd7c5604a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10440-os-command-injection-in-d-link-di-8-f3b5878e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10440%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-8100&amp;severity=medium&amp;id=68c8aa72ee2781683eebd82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10436-sql-injection-in-campcodes-computer-32c747e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10436%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c8aa72ee2781683eebd81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-unc6040-unc6395-hackers-stealing-sale-fcc880cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20warns%20of%20UNC6040%2C%20UNC6395%20hackers%20stealing%20Salesforce%20data&amp;severity=high&amp;id=68c7db53c74b00e2f6d92a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inc-ransom-group-claimed-the-breach-of-panamas-min-500d90f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=INC%20ransom%20group%20claimed%20the%20breach%20of%20Panama%E2%80%99s%20Ministry%20of%20Economy%20and%20Finance&amp;severity=high&amp;id=68c7db53c74b00e2f6d92a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hiddengh0st-winos-and-kkrat-exploit-seo-github-pag-c7eb4443</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HiddenGh0st%2C%20Winos%20and%20kkRAT%20Exploit%20SEO%2C%20GitHub%20Pages%20in%20Chinese%20Malware%20Attacks&amp;severity=high&amp;id=68c7db53c74b00e2f6d92a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10435-sql-injection-in-campcodes-computer-ad920eb1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10435%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c8469be8cf1c517349384b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10434-cross-site-scripting-in-ibuyucms-3342a9fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10434%3A%20Cross%20Site%20Scripting%20in%20IbuyuCMS&amp;severity=medium&amp;id=68c7d17da2c318a4b22ed47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10433-deserialization-in-1panel-dev-maxkb-7c90f510</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10433%3A%20Deserialization%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=68c7c965d246d5a39a739527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41713-cwe-1188-insecure-default-initializ-580cf2c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41713%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20WAGO%20CC100%200751-9301&amp;severity=medium&amp;id=68c7c965d246d5a39a73952f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-driven-deepfake-military-id-fraud-campaign-184b13bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Driven%20Deepfake%20Military%20ID%20Fraud%20Campaign&amp;severity=medium&amp;id=68c7dd9102ac746af6ec8d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10432-stack-based-buffer-overflow-in-tend-af0efe1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10432%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC1206&amp;severity=critical&amp;id=68c7c2949d6d35cc686fb7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10431-sql-injection-in-sourcecodester-pet-74c6d36b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10431%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c7bc8a82b0368c62bbbecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10430-sql-injection-in-sourcecodester-pet-b1fb2054</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10430%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c7b690fabac0897cd1be92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10453-cwe-918-server-side-request-forgery-dfc5389a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10453%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PilotGaea%20Technologies%20O&apos;View%20MapServer&amp;severity=medium&amp;id=68c837c2b49def593d9ba14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10429-sql-injection-in-sourcecodester-pet-8085383f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10429%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c8aa72ee2781683eebd837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10428-unrestricted-upload-in-sourcecodest-aafb70b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10428%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c8aa72ee2781683eebd828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10427-unrestricted-upload-in-sourcecodest-af246b89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10427%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c79fa38ed571af3bf24875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10426-sql-injection-in-itsourcecode-onlin-603a654d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10426%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Laundry%20Management%20System&amp;severity=medium&amp;id=68c798584a132d3d4000d87c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10425-unrestricted-upload-in-1000projects-4ff56dfc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10425%3A%20Unrestricted%20Upload%20in%201000projects%20Online%20Student%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68c790caeccd1b27010717b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10424-unrestricted-upload-in-1000projects-d0e484e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10424%3A%20Unrestricted%20Upload%20in%201000projects%20Online%20Student%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68c78c4139776bc2a1496662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10423-guessable-captcha-in-newbee-mall-bfe3c3a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10423%3A%20Guessable%20CAPTCHA%20in%20newbee-mall&amp;severity=medium&amp;id=68c7853939776bc2a148fbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10452-cwe-306-missing-authentication-for--cceca56f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10452%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Gotac%20Statistical%20Database%20System&amp;severity=critical&amp;id=68c781b639776bc2a148c658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10422-improper-authorization-in-newbee-ma-13e13347</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10422%3A%20Improper%20Authorization%20in%20newbee-mall&amp;severity=medium&amp;id=68c781b639776bc2a148c651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10421-sql-injection-in-sourcecodester-stu-2249be83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10421%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c77aad39776bc2a1487c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10420-sql-injection-in-sourcecodester-stu-47439b86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10420%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c7702239776bc2a147ddb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10419-sql-injection-in-sourcecodester-stu-d6cb7637</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10419%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c7691a39776bc2a1471161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/strategies-for-analyzing-native-code-in-android-ap-432fd876</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Strategies%20for%20Analyzing%20Native%20Code%20in%20Android%20Applications%3A%20Combining%20Ghidra%20and%20Symbolic%E2%80%A6&amp;severity=medium&amp;id=68c7659739776bc2a146fef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10418-sql-injection-in-sourcecodester-stu-9a961e6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10418%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c7621239776bc2a146bc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10417-sql-injection-in-campcodes-grocery--8776268b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10417%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c7621239776bc2a146bc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-15-c15b4dbb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-15&amp;severity=medium&amp;id=68c8ac44ee2781683eebe982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57118-na-c8b866cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57118%3A%20n%2Fa&amp;severity=critical&amp;id=68c887a0ade1c1a7413995f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56274-na-3c8b6879</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56274%3A%20n%2Fa&amp;severity=high&amp;id=68c887a0ade1c1a7413995ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57117-na-f54e01a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57117%3A%20n%2Fa&amp;severity=medium&amp;id=68c8863160bc4e6b5be35135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56448-na-30b12b7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56448%3A%20n%2Fa&amp;severity=medium&amp;id=68c8742b2c83040ec3b092dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45091-na-805d1ed7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45091%3A%20n%2Fa&amp;severity=medium&amp;id=68c8703cade7e5f13766e920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59398-cwe-392-missing-report-of-error-con-fe2da85e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59398%3A%20CWE-392%20Missing%20Report%20of%20Error%20Condition%20in%20EVerest%20libocpp&amp;severity=low&amp;id=68c85fca5c6c1197c2b41eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57174-na-e8c69c02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57174%3A%20n%2Fa&amp;severity=critical&amp;id=68c85fca5c6c1197c2b41eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59399-cwe-460-improper-cleanup-on-thrown--d6e93bc0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59399%3A%20CWE-460%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20EVerest%20libocpp&amp;severity=low&amp;id=68c85d5defcb880aa9e1633a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52344-na-cca12890</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52344%3A%20n%2Fa&amp;severity=medium&amp;id=68c8539957f07d61793d40ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49089-na-cdb2d6d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49089%3A%20n%2Fa&amp;severity=medium&amp;id=68c848eec2afb2158518cf8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57176-na-514c5a67</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57176%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ceragon%20Networks%20%2F%20Siklu%20Communication%20EtherHaul%20and%20MultiHaul%20Series%20microwave%20antennas&amp;severity=medium&amp;id=68c8469be8cf1c5173493843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57104-na-4a177f8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57104%3A%20n%2Fa&amp;severity=medium&amp;id=68c8469be8cf1c517349383f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59397-cwe-89-improper-neutralization-of-s-14906c28</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59397%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20openwebanalytics%20Open%20Web%20Analytics&amp;severity=medium&amp;id=68c837c2b49def593d9ba144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52048-na-b5a953fb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52048%3A%20n%2Fa&amp;severity=medium&amp;id=68c837c2b49def593d9ba140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57248-na-e813decd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57248%3A%20n%2Fa&amp;severity=high&amp;id=68c830e1b701c863c6f66b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56252-na-398cc1ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56252%3A%20n%2Fa&amp;severity=medium&amp;id=68c82ddaac4e81a4c8420828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52053-na-c7ce9141</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52053%3A%20n%2Fa&amp;severity=critical&amp;id=68c82c4e61269957fe261ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46408-na-3ee9be13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46408%3A%20n%2Fa&amp;severity=critical&amp;id=68c81eed25c9b2752eb48a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50944-na-1921b5ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50944%3A%20n%2Fa&amp;severity=high&amp;id=68c81cad8674856831e4914e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50110-na-f9a28e26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50110%3A%20n%2Fa&amp;severity=high&amp;id=68c81cad8674856831e4914b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56710-na-bf4feba4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56710%3A%20n%2Fa&amp;severity=high&amp;id=68c81a1e1032ef8ad1e99103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59377-cwe-78-improper-neutralization-of-s-437aaa1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59377%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20feiskyer%20mcp-kubernetes-server&amp;severity=low&amp;id=68c81869a56a3262e7ec5ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59376-cwe-77-improper-neutralization-of-s-c90bf22f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59376%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20feiskyer%20mcp-kubernetes-server&amp;severity=low&amp;id=68c816c046d9c11e5a237664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59378-cwe-669-incorrect-resource-transfer-12df4304</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59378%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20GNU%20Guix&amp;severity=medium&amp;id=68c7a873484436f1fcd044a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59375-cwe-770-allocation-of-resources-wit-82d0797d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59375%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20libexpat%20project%20libexpat&amp;severity=high&amp;id=68c781b639776bc2a148c65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10416-sql-injection-in-campcodes-grocery--bc79e063</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10416%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c7591939776bc2a1466a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10415-sql-injection-in-campcodes-grocery--1afd6bad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10415%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c7591939776bc2a1466a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10414-sql-injection-in-campcodes-grocery--42b8739e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10414%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c7591939776bc2a1466a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samsung-fixes-image-parsing-vulnerability-exploite-079bf89e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Samsung%20Fixes%20Image%20Parsing%20Vulnerability%20Exploited%20in%20Android%20Attacks&amp;severity=medium&amp;id=68c73fb45077691efeffd8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10413-sql-injection-in-campcodes-grocery--85e55f34</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10413%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c73d8a5a306f7ce4d0ee8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10411-cross-site-scripting-in-itsourcecod-ca174b38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10411%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=68c7591939776bc2a1466a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10410-server-side-request-forgery-in-sour-495fc5bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10410%3A%20Server-Side%20Request%20Forgery%20in%20SourceCodester%20Link%20Status%20Checker&amp;severity=medium&amp;id=68c72efd75230e773636f615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10409-sql-injection-in-sourcecodester-stu-b0bd6271</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10409%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c727b86b2b635a0cd65b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10408-sql-injection-in-sourcecodester-stu-2d7b565c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10408%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c721247a11a6d763ce7421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10407-sql-injection-in-sourcecodester-stu-879bc402</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10407%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c719bea9cfbf958cb989a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10405-sql-injection-in-itsourcecode-bapti-ac3ce0e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10405%3A%20SQL%20Injection%20in%20itsourcecode%20Baptism%20Information%20Management%20System&amp;severity=medium&amp;id=68c70bd7169535fb44154e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10404-sql-injection-in-itsourcecode-bapti-c3c9bf56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10404%3A%20SQL%20Injection%20in%20itsourcecode%20Baptism%20Information%20Management%20System&amp;severity=medium&amp;id=68c703bc18915fc6ece40156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10403-sql-injection-in-phpgurukul-beauty--03eb0ed6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10403%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68c7591939776bc2a1466a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6051-cwe-1333-inefficient-regular-express-dd5e8314</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6051%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=68c6f734ed64d8647ec09549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10402-sql-injection-in-phpgurukul-beauty--cdf88e54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10402%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68c6ef1f5673b0861add6118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10401-command-injection-in-d-link-dir-823-4f3ef72c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10401%3A%20Command%20Injection%20in%20D-Link%20DIR-823x&amp;severity=medium&amp;id=68c6e0952f1f64d8cea24e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10400-sql-injection-in-sourcecodester-foo-61c6ded7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10400%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20Management%20System&amp;severity=medium&amp;id=68c6cbbe24663201be11a6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10399-sql-injection-in-korzh-easyquery-7ac92982</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10399%3A%20SQL%20Injection%20in%20Korzh%20EasyQuery&amp;severity=medium&amp;id=68c6bdfb256f5833ca9071d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0164-cwe-732-incorrect-permission-assignm-424b8375</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0164%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20QRadar%20SIEM&amp;severity=low&amp;id=68c6bdfb256f5833ca9071d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36035-cwe-770-allocation-of-resources-wit-8650efb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36035%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20PowerVM%20Hypervisor&amp;severity=medium&amp;id=68c7591939776bc2a1466a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10204-cwe-306-missing-authentication-for--b757c894</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10204%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20LG%20Electronics%20AC%20Smart%20II&amp;severity=high&amp;id=68c6b93c72e3f37451632354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10398-unrestricted-upload-in-fcbazzm-ics--f9485ab7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10398%3A%20Unrestricted%20Upload%20in%20fcba_zzm%20ics-park%20Smart%20Park%20Management%20System&amp;severity=medium&amp;id=68c6b1b98474b5068df1b80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10397-server-side-request-forgery-in-magi-8d6d3bdf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10397%3A%20Server-Side%20Request%20Forgery%20in%20Magicblack%20MacCMS&amp;severity=medium&amp;id=68c6a2e40061ecec26d742f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geedge-mesa-leak-analyzing-the-great-firewalls-lar-b16ffc92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Geedge%20%26%20MESA%20Leak%3A%20Analyzing%20the%20Great%20Firewall%E2%80%99s%20Largest%20Document%20Leak&amp;severity=medium&amp;id=68c69fc863fec7beb71689c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10396-sql-injection-in-sourcecodester-pet-0c841b0a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10396%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c67fea0a4526498bada67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10395-server-side-request-forgery-in-magi-6088caae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10395%3A%20Server-Side%20Request%20Forgery%20in%20Magicblack%20MacCMS&amp;severity=medium&amp;id=68c678f16e1d0c27045ffea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10394-code-injection-in-fcbazzm-ics-park--fe741e8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10394%3A%20Code%20Injection%20in%20fcba_zzm%20ics-park%20Smart%20Park%20Management%20System&amp;severity=medium&amp;id=68c7591939776bc2a1466a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10393-server-side-request-forgery-in-miur-d345ea8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10393%3A%20Server-Side%20Request%20Forgery%20in%20miurla%20morphic&amp;severity=medium&amp;id=68c7591939776bc2a1466a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10392-stack-based-buffer-overflow-in-merc-ba96f253</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10392%3A%20Stack-based%20Buffer%20Overflow%20in%20Mercury%20KM08-708H%20GiGA%20WiFi%20Wave2&amp;severity=critical&amp;id=68c7591939776bc2a1466a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10391-server-side-request-forgery-in-crme-809a7012</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10391%3A%20Server-Side%20Request%20Forgery%20in%20CRMEB&amp;severity=medium&amp;id=68c64da614e9827585ce5f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10390-improper-authorization-in-crmeb-a79533b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10390%3A%20Improper%20Authorization%20in%20CRMEB&amp;severity=medium&amp;id=68c7591939776bc2a1466a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10389-improper-authorization-in-crmeb-1278585f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10389%3A%20Improper%20Authorization%20in%20CRMEB&amp;severity=medium&amp;id=68c640bd97607eadceed6251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10388-cross-site-scripting-in-selleo-ment-afbc0337</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10388%3A%20Cross%20Site%20Scripting%20in%20Selleo%20Mentingo&amp;severity=medium&amp;id=68c7591939776bc2a1466a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10387-sql-injection-in-codesiddhant-jasmi-56cdb091</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10387%3A%20SQL%20Injection%20in%20codesiddhant%20Jasmin%20Ransomware&amp;severity=medium&amp;id=68c632832da15045691e1848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10386-cross-site-scripting-in-yida-ecms-c-319bd7dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10386%3A%20Cross%20Site%20Scripting%20in%20Yida%20ECMS%20Consulting%20Enterprise%20Management%20System&amp;severity=medium&amp;id=68c61e29e14ebf9f5ccb1827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10385-buffer-overflow-in-mercury-km08-708-e1fb8959</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10385%3A%20Buffer%20Overflow%20in%20Mercury%20KM08-708H%20GiGA%20WiFi%20Wave2&amp;severity=high&amp;id=68c61721e14ebf9f5ccae6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-14-95ba7e0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-14&amp;severity=medium&amp;id=68c75b0539776bc2a146757f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59363-cwe-669-incorrect-resource-transfer-1609a0a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59363%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20One%20Identity%20OneLogin&amp;severity=high&amp;id=68c7591939776bc2a1466a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59364-cwe-674-uncontrolled-recursion-in-e-e521ae47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59364%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Express%20XSS%20Sanitizer%20project%20Express%20XSS%20Sanitizer&amp;severity=medium&amp;id=68c741df245000a1c9af49ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-salesforce-attacks-by-unc6040-and-unc-c8f77d0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Salesforce%20attacks%20by%20UNC6040%20and%20UNC6395&amp;severity=medium&amp;id=68c5fe83e14ebf9f5cc9ea9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10384-improper-authorization-in-yangzongz-a155d7cb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10384%3A%20Improper%20Authorization%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=68c5c9cae14ebf9f5cc889e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10374-improper-authorization-in-shenzhen--6bbb08dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10374%3A%20Improper%20Authorization%20in%20Shenzhen%20Sixun%20Business%20Management%20System&amp;severity=medium&amp;id=68c5c2c0e14ebf9f5cc863f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10373-cross-site-scripting-in-portabilis--207e7d53</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10373%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68c5bbbae14ebf9f5cc83e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10372-cross-site-scripting-in-portabilis--4364cce9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10372%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68c5b4bee14ebf9f5cc7eca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/600-gb-of-alleged-great-firewall-of-china-data-pub-6419f4f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=600%20GB%20of%20Alleged%20Great%20Firewall%20of%20China%20Data%20Published%20in%20Largest%20Leak%20Yet&amp;severity=medium&amp;id=68c5b4afe14ebf9f5cc7ec48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10371-unrestricted-upload-in-echarge-hard-479cdc59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10371%3A%20Unrestricted%20Upload%20in%20eCharge%20Hardy%20Barth%20Salia%20PLCC&amp;severity=medium&amp;id=68c5ada9e14ebf9f5cc7b7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10370-cross-site-scripting-in-miczflor-rp-1bfade34</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10370%3A%20Cross%20Site%20Scripting%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c5a6a1e14ebf9f5cc782da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10369-cross-site-scripting-in-miczflor-rp-8d4966cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10369%3A%20Cross%20Site%20Scripting%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c59f9ae14ebf9f5cc7511d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qrator-labs-mitigated-record-l7-ddos-attack-from-5-c3e1e32c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qrator%20Labs%20Mitigated%20Record%20L7%20DDoS%20Attack%20from%205.76M-Device%20Botnet&amp;severity=medium&amp;id=68c59890e14ebf9f5cc71e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10368-cross-site-scripting-in-miczflor-rp-3baea73f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10368%3A%20Cross%20Site%20Scripting%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c5918ae14ebf9f5cc6fb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10367-cross-site-scripting-in-miczflor-rp-a9e750c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10367%3A%20Cross%20Site%20Scripting%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c57c72e14ebf9f5cc6689f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10366-cross-site-scripting-in-miczflor-rp-eb411dc8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10366%3A%20Cross%20Site%20Scripting%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c5756be14ebf9f5cc6246c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10359-os-command-injection-in-wavlink-wl--f8a8ec93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10359%3A%20OS%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c56e63e14ebf9f5cc60d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-voidproxy-phishing-service-bypasses-mfa-on-mic-80e63ede</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20VoidProxy%20Phishing%20Service%20Bypasses%20MFA%20on%20Microsoft%20and%20Google%20Accounts&amp;severity=medium&amp;id=68c547b5e14ebf9f5cc50bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-unc6040-and-unc6395-targeting-salesfo-c8b054e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20UNC6040%20and%20UNC6395%20Targeting%20Salesforce%20Platforms%20in%20Data%20Theft%20Attacks&amp;severity=high&amp;id=68c54431e14ebf9f5cc4f72c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10358-os-command-injection-in-wavlink-wl--a5810677</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10358%3A%20OS%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c52813e14ebf9f5cc434f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wsass-old-but-gold-dumping-lsass-with-windows-erro-a1c2aafb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WSASS%20-%20Old%20But%20Gold%2C%20Dumping%20LSASS%20With%20Windows%20Error%20Reporting%20On%20Modern%20Windows%2011&amp;severity=medium&amp;id=68c52110e14ebf9f5cc40ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10340-cross-site-scripting-in-whatcd-gaze-d2a29685</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10340%3A%20Cross%20Site%20Scripting%20in%20WhatCD%20Gazelle&amp;severity=medium&amp;id=68c4dcd46da8ad0abf38e5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10332-cross-site-scripting-in-cdevroe-unm-17964787</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10332%3A%20Cross%20Site%20Scripting%20in%20cdevroe%20unmark&amp;severity=medium&amp;id=68c4d9506da8ad0abf38b20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10331-cross-site-scripting-in-cdevroe-unm-1e1bd4ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10331%3A%20Cross%20Site%20Scripting%20in%20cdevroe%20unmark&amp;severity=medium&amp;id=68c4cb406da8ad0abf38368f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-13-b57ab5a2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-13&amp;severity=medium&amp;id=68c60905e14ebf9f5cca6831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10330-cross-site-scripting-in-cdevroe-unm-3b1209ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10330%3A%20Cross%20Site%20Scripting%20in%20cdevroe%20unmark&amp;severity=medium&amp;id=68c4a8226da8ad0abf36919f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10329-server-side-request-forgery-in-cdev-3ff28996</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10329%3A%20Server-Side%20Request%20Forgery%20in%20cdevroe%20unmark&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10328-os-command-injection-in-miczflor-rp-3690074e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10328%3A%20OS%20Command%20Injection%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c49285e7ced5bb5fd749ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10176-cwe-22-improper-limitation-of-a-pat-6ec55b14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10176%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tvcnet%20The%20Hack%20Repair%20Guy&apos;s%20Plugin%20Archiver&amp;severity=high&amp;id=68c4911f425bab5fac53e14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fine-grained-http-filtering-for-claude-code-b2b6a653</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fine-grained%20HTTP%20filtering%20for%20Claude%20Code&amp;severity=medium&amp;id=68c48e4f02795a2a456e6e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10327-os-command-injection-in-miczflor-rp-d562f377</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10327%3A%20OS%20Command%20Injection%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10326-os-command-injection-in-miczflor-rp-dfe72841</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10326%3A%20OS%20Command%20Injection%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10325-command-injection-in-wavlink-wl-wn5-95f374c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10325%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c4832aefb44f63f386e3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43795-cwe-601-url-redirection-to-untruste-94bc7513</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43795%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c4811ab0d74f55ea9c84b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10324-command-injection-in-wavlink-wl-wn5-47d08f2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10324%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c476a54a4a4e555d3ab11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43796-cwe-400-uncontrolled-resource-consu-9feec332</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43796%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=68c4726b93bc26e976274cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10323-command-injection-in-wavlink-wl-wn5-1febd98b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10323%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c473d4d1fbe3b93c93e4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10322-weak-password-recovery-in-wavlink-w-7b9cd43e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10322%3A%20Weak%20Password%20Recovery%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c461b9b1ab4abecae87e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58434-cwe-306-missing-authentication-for--dc4dfc7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58434%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=68c45b66055763ea6cf4ba8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10321-information-disclosure-in-wavlink-w-07ed248c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10321%3A%20Information%20Disclosure%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4234-cwe-532-insertion-of-sensitive-infor-39b007b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4234%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Microsoft%20365%20Defender%20Pack&amp;severity=low&amp;id=68c457e4c2c897903a232032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4235-cwe-497-exposure-of-sensitive-system-4fdf91a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4235%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20User-ID%20Credential%20Agent&amp;severity=high&amp;id=68c457e4c2c897903a232035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seo-poisoning-attack-hits-windows-users-with-hidde-f9e92952</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEO%20Poisoning%20Attack%20Hits%20Windows%20Users%20With%20Hiddengh0st%20and%20Winos%20Malware&amp;severity=medium&amp;id=68c447a65361a8cc9f085e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43787-cwe-79-improper-neutralization-of-i-123bfa57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c45033d5e8565f6a94eca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10320-weak-password-requirements-in-iteac-f78ababc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10320%3A%20Weak%20Password%20Requirements%20in%20iteachyou%20Dreamer%20CMS&amp;severity=low&amp;id=68c4463f09e75f78de1a0efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39799-f41c3d5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39799&amp;severity=null&amp;id=68db1fa7a473ffe031e278e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yurei-the-new-ransomware-group-on-the-scene-74bf43b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yurei%20the%20New%20Ransomware%20Group%20on%20the%20Scene&amp;severity=medium&amp;id=68c4753f61b7885b88584381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fixes-high-severity-ios-xr-flaws-enabling-im-7d5de7fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20fixes%20high-severity%20IOS%20XR%20flaws%20enabling%20image%20bypass%20and%20DoS&amp;severity=high&amp;id=68c43a54688fca75bb311281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10319-improper-authorization-in-jeecgboot-fbf63af1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10319%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deconstructing-a-cyber-deception-an-analysis-of-th-b9d5d35c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deconstructing%20a%20Cyber%20Deception%3A%20An%20Analysis%20of%20the%20Clickfix%20HijackLoader%20Phishing%20Campaign&amp;severity=medium&amp;id=68c4749156cc6d7fb97f0b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10364-cwe-77-improper-neutralization-of-s-61dc228e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10364%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Evertz%203080ipx-10G&amp;severity=critical&amp;id=68c425deaba797cca94012aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10365-cwe-287-improper-authentication-in--39d28040</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10365%3A%20CWE-287%20Improper%20Authentication%20in%20Evertz%203080ipx-10G&amp;severity=critical&amp;id=68c425deaba797cca94012ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59058-cwe-208-observable-timing-discrepan-f8582b52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59058%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20junkurihara%20httpsig-rs&amp;severity=medium&amp;id=68c41d5dd839f9a306304f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59139-cwe-400-uncontrolled-resource-consu-1dff05c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59139%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20honojs%20hono&amp;severity=medium&amp;id=68c41d5dd839f9a306304f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59054-cwe-552-files-or-directories-access-f6654f10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59054%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Dstack-TEE%20dstack&amp;severity=high&amp;id=68c431af701e2b3019751c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yurei-the-ghost-of-open-source-ransomware-93f108d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yurei%20%26%20The%20Ghost%20of%20Open%20Source%20Ransomware&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10318-improper-authorization-in-jeecgboot-c27edddc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10318%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68c416fc4e1289924792d731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-train-operator-lner-london-north-eastern-railwa-5393a442</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20train%20operator%20LNER%20(London%20North%20Eastern%20Railway)%20discloses%20a%20data%20breach&amp;severity=high&amp;id=68c40aea04036f09e518cef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samsung-patches-actively-exploited-zero-day-report-136f92ae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Samsung%20patches%20actively%20exploited%20zero-day%20reported%20by%20WhatsApp&amp;severity=critical&amp;id=68c40a357b764acc0df4e13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8699-cwe-922-insecure-storage-of-sensitiv-6146442d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8699%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20KioSoft%20Stored%20Value%20Unattended%20Payment%20Solution&amp;severity=critical&amp;id=68c403142c3fd21ea9204bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muck-stealer-malware-used-alongside-phishing-in-ne-a2a472cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Muck%20Stealer%20Malware%20Used%20Alongside%20Phishing%20in%20New%20Attack%20Waves&amp;severity=medium&amp;id=68c400eda65869593d00cc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6638-cwe-1333-inefficient-regular-express-69cbe25d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6638%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=68c3fa7ca466eacfca92b720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10267-cwe-306-missing-authentication-for--debc73fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10267%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NewType%20Infortech%20NUP%20Portal&amp;severity=medium&amp;id=68c43a62688fca75bb311351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10266-cwe-89-improper-neutralization-of-s-cd78c7fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10266%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NewType%20Infortech%20NUP%20Portal&amp;severity=critical&amp;id=68c3f48fd8e02c407295e36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10265-cwe-78-improper-neutralization-of-s-a4af554b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10265%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Digiever%20DS-1200&amp;severity=high&amp;id=68c3f48fd8e02c407295e366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10264-cwe-497-exposure-of-sensitive-syste-b7ffb627</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10264%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Digiever%20DS-1200&amp;severity=critical&amp;id=68c3f1b04d0b21a097082fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-ai-code-editor-flaw-enables-silent-code-exe-ffa4e871</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%20AI%20Code%20Editor%20Flaw%20Enables%20Silent%20Code%20Execution%20via%20Malicious%20Repositories&amp;severity=high&amp;id=68c3eb395e15e0cac086a4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-dassault-systmes-delmia-apriso-flaw-t-a8a3089e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Dassault%20Syst%C3%A8mes%20DELMIA%20Apriso%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68c3eb395e15e0cac086a4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-issues-spyware-warnings-as-cert-fr-confirms--1e15e792</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20issues%20spyware%20warnings%20as%20CERT-FR%20confirms%20attacks&amp;severity=medium&amp;id=68c3eb395e15e0cac086a4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7448-cwe-290-authentication-bypass-by-spo-b3a79aee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7448%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20silabs.com%20Wi-SUN%20Stack&amp;severity=high&amp;id=68c457e4c2c897903a232038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybervolk-ransomware-analysis-of-double-encryption-58a36cc3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CyberVolk%20Ransomware%3A%20Analysis%20of%20Double%20Encryption%20Structure%20and%20Disguised%20Decryption%20Logic&amp;severity=medium&amp;id=68c3d5ba78082adedc8e768b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trigona-rebranding-suspicions-and-global-threats-a-8de59f2c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trigona%20Rebranding%20Suspicions%20and%20Global%20Threats%2C%20and%20BlackNevas%20Ransomware%20Analysis&amp;severity=medium&amp;id=68c3d5ba78082adedc8e7683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-generated-code-and-fake-apps-used-for-far-reach-a476992e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Generated%20Code%20and%20Fake%20Apps%20Used%20for%20Far-Reaching%20Attacks&amp;severity=medium&amp;id=68c3d5ba78082adedc8e766b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21043-cwe-787-out-of-bounds-write-in-sams-096a0d22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21043%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=68c3ca6dbf4f1a3f8fc87880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21042-cwe-787-out-of-bounds-write-in-sams-4cc702c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21042%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=68c3ca6dbf4f1a3f8fc8787d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8280-cwe-79-cross-site-scripting-xss-in-c-f7b207a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8280%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Contact%20Form%207%20reCAPTCHA&amp;severity=medium&amp;id=68c44b486b89fb6d41320d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3650-cwe-79-cross-site-scripting-xss-in-j-edcb495f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3650%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20jQuery%20Colorbox&amp;severity=low&amp;id=68c44b486b89fb6d41320d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58781-improper-certificate-validation-in--194c96e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58781%3A%20Improper%20certificate%20validation%20in%20Wireless%20Tsukamoto%20Co.%2C%20Ltd.%20WTW-EAGLE%20App%20for%20iOS&amp;severity=medium&amp;id=68c44b486b89fb6d41320d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10291-improper-authorization-in-linlinjav-ed3e7bb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10291%3A%20Improper%20Authorization%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=68c44d67952198808531bac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8575-cwe-36-absolute-path-traversal-in-au-68d0c93f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8575%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20aurelienlws%20LWS%20Cleaner&amp;severity=high&amp;id=68c3afb5dee0ac6b6335ef2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10288-improper-authentication-in-roncoo-r-2f3656f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10288%3A%20Improper%20Authentication%20in%20roncoo%20roncoo-pay&amp;severity=medium&amp;id=68c41d5dd839f9a306304f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10287-direct-request-in-roncoo-roncoo-pay-9eea140e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10287%3A%20Direct%20Request%20in%20roncoo%20roncoo-pay&amp;severity=low&amp;id=68c455cda2d8b85c2507118f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10278-improper-authorization-in-yunaiv-ru-b8be9b8e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10278%3A%20Improper%20Authorization%20in%20YunaiV%20ruoyi-vue-pro&amp;severity=medium&amp;id=68c394f4b40dc0e4c24ff7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9881-cwe-352-cross-site-request-forgery-c-f70a9626</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9881%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jensg%20Ultimate%20Blogroll&amp;severity=medium&amp;id=68c394f4b40dc0e4c24ff7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9877-cwe-79-improper-neutralization-of-in-752e1798</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elangovan%20Embed%20Google%20Datastudio&amp;severity=medium&amp;id=68c394f4b40dc0e4c24ff7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9880-cwe-352-cross-site-request-forgery-c-9463ef7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9880%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dejocar%20Side%20Slide%20Responsive%20Menu&amp;severity=medium&amp;id=68c394f4b40dc0e4c24ff7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9879-cwe-79-improper-neutralization-of-in-53a50ca2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9879%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20slowmove%20Spotify%20Embed%20Creator&amp;severity=medium&amp;id=68c394f4b40dc0e4c24ff7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10277-improper-authorization-in-yunaiv-yu-bd55415a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10277%3A%20Improper%20Authorization%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=68c455cda2d8b85c25071189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10269-cwe-98-improper-control-of-filename-02b9f191</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10269%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Theme-Spirit%20Spirit%20Framework&amp;severity=high&amp;id=68c3859b563d4c3db0637010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43788-cwe-862-missing-authorization-in-li-c85fc171</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43788%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c3859b563d4c3db063701a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10276-improper-authorization-in-yunaiv-ru-013df125</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10276%3A%20Improper%20Authorization%20in%20YunaiV%20ruoyi-vue-pro&amp;severity=medium&amp;id=68c3859b563d4c3db0637014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43789-cwe-863-incorrect-authorization-in--b61d0f25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43789%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=low&amp;id=68c3859b563d4c3db063701d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9807-cwe-89-improper-neutralization-of-sp-9c6940ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9807%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=high&amp;id=68c37e92563d4c3db0633810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-2025-energy-phishing-wave-chevron-conoc-9e32e564</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%202025%20Energy%20Phishing%20Wave%3A%20Chevron%2C%20Conoco%2C%20PBF%2C%20Phillips%2066&amp;severity=medium&amp;id=68c3d71f1f88449e6f032ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10275-improper-authorization-in-yunaiv-yu-76f6f019</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10275%3A%20Improper%20Authorization%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=68c3778f563d4c3db0630923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55319-remote-code-execution-in-microsoft--aacdad5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55319%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=68c3778f563d4c3db0630929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beaches-and-breaches-d69b255b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beaches%20and%20breaches&amp;severity=medium&amp;id=68c3daac1ed0af3bad57537a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10274-cross-site-scripting-in-erjinzhi-10-64a52e26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10274%3A%20Cross%20Site%20Scripting%20in%20erjinzhi%2010OA&amp;severity=medium&amp;id=68c36981563d4c3db0629e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-12-08e5c123</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-12&amp;severity=medium&amp;id=68c4b61a6da8ad0abf37a4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55996-na-d0746ca1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55996%3A%20n%2Fa&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45587-na-098f14e8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45587%3A%20n%2Fa&amp;severity=high&amp;id=68c4811ab0d74f55ea9c84b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45586-na-1388091a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45586%3A%20n%2Fa&amp;severity=high&amp;id=68c4811ab0d74f55ea9c84b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45585-na-b47fa4bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45585%3A%20n%2Fa&amp;severity=medium&amp;id=68c4811ab0d74f55ea9c84b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45584-na-3f4f63df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45584%3A%20n%2Fa&amp;severity=high&amp;id=68c4811ab0d74f55ea9c84ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45583-na-3f7789ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45583%3A%20n%2Fa&amp;severity=critical&amp;id=68c4811ab0d74f55ea9c84aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52074-na-c41a8af1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52074%3A%20n%2Fa&amp;severity=medium&amp;id=68c44d67952198808531babd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56467-na-f8ee883e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56467%3A%20n%2Fa&amp;severity=medium&amp;id=68c44b486b89fb6d41320d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57579-na-4511741a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57579%3A%20n%2Fa&amp;severity=high&amp;id=68c4463f09e75f78de1a0f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57577-na-0e131e9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57577%3A%20n%2Fa&amp;severity=high&amp;id=68c44285875a4b523bb18107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57578-na-5eefd249</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57578%3A%20n%2Fa&amp;severity=high&amp;id=68c43ded0a8cd083103f5868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55835-na-23a63442</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55835%3A%20n%2Fa&amp;severity=critical&amp;id=68c43a62688fca75bb31134b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10273-path-traversal-in-erjinzhi-10oa-b8705d69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10273%3A%20Path%20Traversal%20in%20erjinzhi%2010OA&amp;severity=medium&amp;id=68c35eee563d4c3db0621dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10272-cross-site-scripting-in-erjinzhi-10-9871170e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10272%3A%20Cross%20Site%20Scripting%20in%20erjinzhi%2010OA&amp;severity=medium&amp;id=68c357e6563d4c3db061ed6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10271-cross-site-scripting-in-erjinzhi-10-6f2d7645</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10271%3A%20Cross%20Site%20Scripting%20in%20erjinzhi%2010OA&amp;severity=medium&amp;id=68c342ce563d4c3db06120d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36222-cwe-1188-insecure-default-initializ-e0b07c70</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36222%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20IBM%20Fusion&amp;severity=high&amp;id=68c41d5dd839f9a306304f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/payment-service-zelle-sued-for-bad-infosec-enablin-2de6ebb7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Payment%20service%20Zelle%20sued%20for%20bad%20infosec%20enabling%20fraud&amp;severity=high&amp;id=68c334bc563d4c3db060972f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10127-cwe-640-in-daikin-security-gateway-718c2177</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10127%3A%20CWE-640%20in%20Daikin%20Europe%20N.V%20Security%20Gateway&amp;severity=critical&amp;id=68c32a32563d4c3db06004aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/updated-toneshell-backdoor-and-novel-snakedisk-usb-3694f722</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Updated%20Toneshell%20backdoor%20and%20novel%20SnakeDisk%20USB%20worm%20dropped&amp;severity=medium&amp;id=68c32a3a563d4c3db06004b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-vmscape-attack-breaks-guest-host-isolation-on--c98c4810</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20VMScape%20attack%20breaks%20guest-host%20isolation%20on%20AMD%2C%20Intel%20CPUs&amp;severity=high&amp;id=68c31c2a563d4c3db05f0e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-exploiting-critical-sonicwall-ssl-174f7fc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20ransomware%20exploiting%20critical%20SonicWall%20SSLVPN%20bug%20again&amp;severity=critical&amp;id=68c31c2a563d4c3db05f0e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bulletproof-host-stark-industries-evades-eu-sancti-e79cc1c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bulletproof%20Host%20Stark%20Industries%20Evades%20EU%20Sanctions&amp;severity=high&amp;id=68c31c2a563d4c3db05f0e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59055-cwe-918-server-side-request-forgery-4d471f59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59055%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20instantsoft%20icms2&amp;severity=medium&amp;id=68c31ac15fe4190550a2ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8061-cwe-782-exposed-ioctl-with-insuffici-e91651fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8061%3A%20CWE-782%3A%20Exposed%20IOCTL%20with%20Insufficient%20Access%20Control%20in%20Lenovo%20Dispatcher%203.0%20Driver&amp;severity=high&amp;id=68c3168a00f99c09afdc9644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8557-cwe-420-unprotected-alternate-channe-320e65ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8557%3A%20CWE-420%3A%20Unprotected%20Alternate%20Channel%20in%20Lenovo%20XClarity%20Orchestrator%20(LXCO)&amp;severity=high&amp;id=68c3168a00f99c09afdc9647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9214-cwe-306-missing-authentication-for-c-b7d47679</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9214%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Lenovo%20LJ2206W%20Printer&amp;severity=medium&amp;id=68c3168a00f99c09afdc964d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9319-cwe-494-download-of-code-without-int-fd861321</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9319%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Lenovo%20Wallpaper%20Client&amp;severity=high&amp;id=68c3168a00f99c09afdc9650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9201-cwe-427-uncontrolled-search-path-ele-68e73f8c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9201%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Browser&amp;severity=high&amp;id=68c3168a00f99c09afdc964a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59053-cwe-94-improper-control-of-generati-e7485f77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59053%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20moeru-ai%20airi&amp;severity=critical&amp;id=68c3168a00f99c09afdc9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59047-cwe-682-incorrect-calculation-in-ma-6c0b1ee9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59047%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20matrix-org%20matrix-rust-sdk&amp;severity=low&amp;id=68c310fa2375b43386b94f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58065-cwe-287-improper-authentication-in--5d1189ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58065%3A%20CWE-287%3A%20Improper%20Authentication%20in%20dpgaspar%20Flask-AppBuilder&amp;severity=medium&amp;id=68c30ee6172f807b3b87dfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43790-cwe-639-authorization-bypass-throug-57b0bd58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43790%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=high&amp;id=68c30d7c64551817faa3ade7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43782-cwe-639-authorization-bypass-throug-f225c962</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43782%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c307eebb38cc0521773a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58364-cwe-20-improper-input-validation-in-cdfec7d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58364%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=68c307eebb38cc0521773a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/senator-urges-ftc-probe-into-microsoft-after-ascen-99740cee</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Senator%20Urges%20FTC%20Probe%20Into%20Microsoft%20After%20Ascension%20Ransomware%20Attack&amp;severity=medium&amp;id=68c303c329fde658ffdd6f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58060-cwe-287-improper-authentication-in--c5edaa28</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58060%3A%20CWE-287%3A%20Improper%20Authentication%20in%20OpenPrinting%20cups&amp;severity=high&amp;id=68c307eebb38cc0521773a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39751-aa606fca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39751&amp;severity=null&amp;id=68e392d0f435541511951758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-campaign-leverages-svgs-email-attachments--0a2c4470</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Campaign%20Leverages%20SVGs%2C%20Email%20Attachments%2C%20and%20CDNs%20to%20Drop%20XWorm%20and%20Remcos%20via%20BAT%20Scripts&amp;severity=medium&amp;id=68c303cf29fde658ffdd6fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10255-cross-site-scripting-in-ascensio-sy-d099d5f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10255%3A%20Cross%20Site%20Scripting%20in%20Ascensio%20System%20SIA%20OnlyOffice&amp;severity=medium&amp;id=68c2f52b5d9f58bf45d52198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-google-appsheet-phishing-scam-deliver-fake-tra-6db5f665</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Google%20AppSheet%20Phishing%20Scam%20Deliver%20Fake%20Trademark%20Notices&amp;severity=medium&amp;id=68c2f0467c81ad735a9035ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10254-cross-site-scripting-in-ascensio-sy-0faf6ae3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10254%3A%20Cross%20Site%20Scripting%20in%20Ascensio%20System%20SIA%20OnlyOffice&amp;severity=medium&amp;id=68c2ecd12dd08e98e9c669ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10193-cwe-346-origin-validation-error-in--bae7ccd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10193%3A%20CWE-346%20Origin%20Validation%20Error%20in%20neo4j%20neo4j-cypher%20MCP%20server&amp;severity=high&amp;id=68c2d8fd5aed1f7cf94a225a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10253-cross-site-scripting-in-opendcim-177ee08f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10253%3A%20Cross%20Site%20Scripting%20in%20openDCIM&amp;severity=medium&amp;id=68c2de05689da4b209a14d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/france-three-regional-healthcare-agencies-targeted-1db707ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=France%3A%20Three%20Regional%20Healthcare%20Agencies%20Targeted%20by%20Cyber-Attacks&amp;severity=high&amp;id=68c2d4a599ba2d5da4ef6326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-ssl-vpn-flaw-and-misconfigurations-activ-7a1903be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20SSL%20VPN%20Flaw%20and%20Misconfigurations%20Actively%20Exploited%20by%20Akira%20Ransomware%20Hackers&amp;severity=high&amp;id=68c2d4a599ba2d5da4ef6322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8716-cwe-754-improper-check-for-unusual-o-9cc44c2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8716%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20OpenText%20OpenText%20Content%20Management&amp;severity=medium&amp;id=68c2d27a99acb0d7b1c676ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10252-deserialization-in-seat-queue-ticke-b1fd3d22</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10252%3A%20Deserialization%20in%20SEAT%20Queue%20Ticket%20Kiosk&amp;severity=low&amp;id=68c2d10a9e4a63635b8cb09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-rail-operator-lner-confirms-cyber-attack-exposi-47ef753d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Rail%20Operator%20LNER%20Confirms%20Cyber%20Attack%20Exposing%20Passenger%20Data&amp;severity=medium&amp;id=68c2cb45ba74a000e3741deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10251-sql-injection-in-foxcms-c944f8cd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10251%3A%20SQL%20Injection%20in%20FoxCMS&amp;severity=medium&amp;id=68c2c91dba2d080483a08ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40696-cwe-79-improper-neutralization-of-i-3fa4a8bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68c2b8b2d0657d5b69535d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40695-cwe-79-improper-neutralization-of-i-85580465</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68c31dfb563d4c3db05f6e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40694-cwe-79-improper-neutralization-of-i-ae0198ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68c31dfb563d4c3db05f6e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40693-cwe-79-improper-neutralization-of-i-6465a9cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68c2ba22120f9ec6779c135e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10250-use-of-hard-coded-cryptographic-key-53572a09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10250%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20DJI%20Mavic%20Spark&amp;severity=low&amp;id=68c2b46a9f88baefcaada8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40692-cwe-89-improper-neutralization-of-s-b5793a71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40692%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=critical&amp;id=68c2b30b3f80e9fbe98f4bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40691-cwe-89-improper-neutralization-of-s-008debc1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40691%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=critical&amp;id=68c2b30b3f80e9fbe98f4bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40690-cwe-89-improper-neutralization-of-s-a29137a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40690%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=critical&amp;id=68c2b1a9a5ae58c0a7c992ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40689-cwe-89-improper-neutralization-of-s-deac528f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40689%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=critical&amp;id=68c2b1a9a5ae58c0a7c992b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40687-cwe-89-improper-neutralization-of-s-8c6788b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40687%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=critical&amp;id=68c2b1a9a5ae58c0a7c992b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9018-cwe-862-missing-authorization-in-ger-9a311d0c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9018%3A%20CWE-862%20Missing%20Authorization%20in%20germanpearls%20Time%20Tracker&amp;severity=high&amp;id=68c31dfb563d4c3db05f6e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chillyhell-macos-malware-resurfaces-using-googleco-e22548c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChillyHell%20macOS%20Malware%20Resurfaces%2C%20Using%20Google.com%20as%20a%20Decoy&amp;severity=medium&amp;id=68c2a3f27cf1d4f83c0ec579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/practice-spotting-typo-squatted-domains-browser-ga-b73620bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Practice%20spotting%20typo%20squatted%20domains%20(Browser%20game%3A%20Typosquat%20Detective)&amp;severity=medium&amp;id=68c299a8838cc57ee58bd273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58320-cwe-22-improper-limitation-of-a-pat-c00bbd9f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58320%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Delta%20Electronics%20DIALink&amp;severity=high&amp;id=68c28e22977d802f0c676e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58321-cwe-22-improper-limitation-of-a-pat-8bd3d48a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58321%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Delta%20Electronics%20DIALink&amp;severity=critical&amp;id=68c28e22977d802f0c676e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48041-cwe-770-allocation-of-resources-wit-79263ca6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48041%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Erlang%20OTP&amp;severity=high&amp;id=68c31dfb563d4c3db05f6e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48040-cwe-400-uncontrolled-resource-consu-1571c9f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48040%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Erlang%20OTP&amp;severity=medium&amp;id=68c31dfb563d4c3db05f6e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48039-cwe-770-allocation-of-resources-wit-68b8fbc9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48039%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Erlang%20OTP&amp;severity=medium&amp;id=68c31dfb563d4c3db05f6e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48038-cwe-770-allocation-of-resources-wit-2d27413a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48038%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Erlang%20OTP&amp;severity=medium&amp;id=68c31dfb563d4c3db05f6e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9918-cwe-22-improper-limitation-of-a-path-b2353e3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9918%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Cloud%20Google%20SecOps%20SOAR&amp;severity=high&amp;id=68c2c12d5fab504ad85bc105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9633-cwe-352-cross-site-request-forgery-c-d0e06e41</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9633%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shawfactor%20LH%20Signing&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8691-cwe-79-improper-neutralization-of-in-288f5832</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softmus%20WP%20Scriptcase&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8398-cwe-79-improper-neutralization-of-in-797329da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azurecurve%20azurecurve%20BBCode&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9855-cwe-79-improper-neutralization-of-in-572823a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9855%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zuotian%20Enhanced%20BibliPlug&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8425-cwe-862-missing-authorization-in-myt-bd38074c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8425%3A%20CWE-862%20Missing%20Authorization%20in%20mythemeshop%20My%20WP%20Translate&amp;severity=high&amp;id=68c27a22e1c560fa9d94d457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9123-cwe-79-improper-neutralization-of-in-0364428d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9123%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manchumahara%20CBX%20Map%20for%20Google%20Map%20%26%20OpenStreetMap&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9632-cwe-352-cross-site-request-forgery-c-c33b5e51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9632%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vinzzb%20PhpList%20Subber&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9617-cwe-352-cross-site-request-forgery-c-c972a128</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9617%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20evidentlycube%20Publish%20approval&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9128-cwe-79-improper-neutralization-of-in-10ea515c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9128%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eideasy%20eID%20Easy&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9693-cwe-22-improper-limitation-of-a-path-002e9fa5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9693%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20khaledsaikat%20User%20Meta%20%E2%80%93%20User%20Profile%20Builder%20and%20User%20management%20plugin&amp;severity=high&amp;id=68c27a23e1c560fa9d94d4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9620-cwe-352-cross-site-request-forgery-c-bf10a402</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9620%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edsteep%20Seo%20Monster&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8570-cwe-798-use-of-hard-coded-credential-d9213c0c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8570%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20beyondcart%20BeyondCart%20Connector&amp;severity=critical&amp;id=68c27a22e1c560fa9d94d467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9451-cwe-89-improper-neutralization-of-sp-38a0f4de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9451%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartcatai%20Smartcat%20Translator%20for%20WPML&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8689-cwe-79-improper-neutralization-of-in-6a6746c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cssigniterteam%20Elements%20Plus!&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8215-cwe-79-improper-neutralization-of-in-3e969012</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8215%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%2C%20Kits%20and%20Elementor%20Templates&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8481-cwe-352-cross-site-request-forgery-c-15558eab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8481%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mdimran41%20Blog%20Designer%20For%20Elementor%20%E2%80%93%20Post%20Slider%2C%20Post%20Carousel%2C%20Post%20Grid&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9623-cwe-352-cross-site-request-forgery-c-17315cc3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9623%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dontcare%20Admin%20in%20English%20with%20Switch&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8392-cwe-79-improper-neutralization-of-in-c9f49aa7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bessermitfahren%20Mitfahrgelegenheit&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8492-cwe-862-missing-authorization-in-wor-6fc32471</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8492%3A%20CWE-862%20Missing%20Authorization%20in%20wordpresschef%20Salon%20Booking%20System%20%E2%80%93%20Free%20Version&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9627-cwe-352-cross-site-request-forgery-c-41b98442</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9627%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20izem%20Run%20Log&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9860-cwe-79-improper-neutralization-of-in-dfc3f585</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20natata7%20Mixtape&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9874-cwe-98-improper-control-of-filename--0253e5f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9874%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20webcodingplace%20Ultimate%20Classified%20Listings&amp;severity=high&amp;id=68c27a23e1c560fa9d94d4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9635-cwe-352-cross-site-request-forgery-c-5e79b904</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9635%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ishan001%20Analytics%20Reduce%20Bounce%20Rate&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9634-cwe-352-cross-site-request-forgery-c-2eb336a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9634%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jegerwan%20Plugin%20updates%20blocker&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8318-cwe-79-improper-neutralization-of-in-b10ea462</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bmarshall511%20Jobify&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8423-cwe-862-missing-authorization-in-myt-d2255950</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8423%3A%20CWE-862%20Missing%20Authorization%20in%20mythemeshop%20My%20WP%20Translate&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8692-cwe-89-improper-neutralization-of-sp-e7f88629</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8692%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamilkhan%20Coupon%20API&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9073-cwe-89-improper-neutralization-of-sp-0f441910</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9073%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20maheshmthorat%20All%20in%20one%20Minifier&amp;severity=high&amp;id=68c27a22e1c560fa9d94d48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8445-cwe-79-improper-neutralization-of-in-af1f41fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaikhaezaz80%20Countdown%20Timer%20for%20Elementor&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5801-cwe-79-improper-neutralization-of-in-2de7d775</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rejuancse%20Digital%20Events%20Calendar&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8417-cwe-94-improper-control-of-generatio-4ae8b3b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8417%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20idiatech%20Catalog%20Importer%2C%20Scraper%20%26%20Crawler&amp;severity=high&amp;id=68c27a21e1c560fa9d94d43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8422-cwe-73-external-control-of-file-name-a7694c93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8422%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20fassionstorage%20Propovoice%3A%20All-in-One%20Client%20Management%20System&amp;severity=high&amp;id=68c27a21e1c560fa9d94d442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9628-cwe-352-cross-site-request-forgery-c-02f9524c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9628%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jh5ru%20The%20integration%20of%20the%20AMO.CRM&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9861-cwe-79-improper-neutralization-of-in-d3c8e322</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9861%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livingos%20ThemeLoom%20Widgets&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8686-cwe-79-improper-neutralization-of-in-03f55ddf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8686%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wen-solutions%20WP%20Easy%20FAQs&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0763-cwe-862-missing-authorization-in-web-2632e041</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0763%3A%20CWE-862%20Missing%20Authorization%20in%20webcodingplace%20Ultimate%20Classified%20Listings&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8316-cwe-79-improper-neutralization-of-in-62956cb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moreirapontocom%20Certifica%20WP&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9631-cwe-352-cross-site-request-forgery-c-7742b770</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9631%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gyaku%20AutoCatSet&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8721-cwe-79-improper-neutralization-of-in-d5594aad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miriamgoldman%20Workable%20Api&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8479-cwe-352-cross-site-request-forgery-c-f2acd236</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8479%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zohoflow%20Zoho%20Flow%20%E2%80%93%20Integrate%20100%2B%20plugins%20with%201000%2B%20business%20apps%2C%20no-code%20workflow%20automation&amp;severity=medium&amp;id=68c2e1a5a8af254b635031c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9034-cwe-601-url-redirection-to-untrusted-90a8ecb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9034%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Wp%20Edit%20Password%20Protected&amp;severity=medium&amp;id=68c2e1a5a8af254b635031c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10247-improper-access-controls-in-jepaas-22a975f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10247%3A%20Improper%20Access%20Controls%20in%20JEPaaS&amp;severity=medium&amp;id=68c261240d4576fefdffec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-its-crucial-to-scan-qr-codes-securely-in-today-671e00e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20It&apos;s%20Crucial%20to%20Scan%20QR%20Codes%20Securely%20in%20Today&apos;s%20Cybersecurity%20Landscape&amp;severity=critical&amp;id=68c25d6170b5a178096c8c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9059-cwe-427-uncontrolled-search-path-ele-7051467f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9059%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Broadcom%208.6.IT%20Management%20Suite&amp;severity=high&amp;id=68c25cac1c86892753756734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10246-cross-site-scripting-in-lokibhardwa-b44ba9ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10246%3A%20Cross%20Site%20Scripting%20in%20lokibhardwaj%20PHP-Code-For-Unlimited-File-Upload&amp;severity=medium&amp;id=68c2e1a5a8af254b635031bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9910-cross-site-scripting-xss-in-jsondiff-0a1daf5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9910%3A%20Cross-site%20Scripting%20(XSS)%20in%20jsondiffpatch&amp;severity=low&amp;id=68c2cc018a22ab8ffbcec2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9776-cwe-89-improper-neutralization-of-sp-d42fcea9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9776%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20catfolders%20CatFolders%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20Categories&amp;severity=medium&amp;id=68c2513d729aac9ae34ee3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10245-path-traversal-in-display-painis-tg-ef75c802</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10245%3A%20Path%20Traversal%20in%20Display%20Pain%C3%A9is%20TGA&amp;severity=medium&amp;id=68c229c512193b50d302ecb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10236-path-traversal-in-binary-husky-gpta-dad823c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10236%3A%20Path%20Traversal%20in%20binary-husky%20gpt_academic&amp;severity=medium&amp;id=68c229c512193b50d302ecb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6088-cwe-285-improper-authorization-in-da-3424bedd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6088%3A%20CWE-285%20Improper%20Authorization%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68c21f3a12193b50d3026e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10235-cross-site-scripting-in-scada-lts-4b9ea76b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10235%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68c21bb612193b50d3025395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-11-f846e457</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-11&amp;severity=medium&amp;id=68c365e7563d4c3db06266b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56556-na-651f9682</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56556%3A%20n%2Fa&amp;severity=low&amp;id=68c31ac15fe4190550a2ff4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10234-cross-site-scripting-in-scada-lts-a172e010</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10234%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68c20da512193b50d3018eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10233-path-traversal-in-kalcaddle-kodbox-13097c15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10233%3A%20Path%20Traversal%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=68c206a012193b50d3015877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10232-path-traversal-in-299ko-baa5f095</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10232%3A%20Path%20Traversal%20in%20299ko&amp;severity=medium&amp;id=68c1ff9512193b50d3013746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10229-open-redirect-in-freshwork-eb4d13b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10229%3A%20Open%20Redirect%20in%20Freshwork&amp;severity=medium&amp;id=68c1f88d12193b50d301108e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealing-the-keys-from-the-octopus-exfiltrate-git--a4b4d511</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealing%20the%20keys%20from%20the%20octopus%3A%20Exfiltrate%20Git%20Credentials%20in%20Argocd&amp;severity=medium&amp;id=68c1f18912193b50d300cf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10218-sql-injection-in-lostvip-com-ruoyi--caebd754</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10218%3A%20SQL%20Injection%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68c1f18512193b50d300cefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10216-race-condition-in-grandnode-fddfd053</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10216%3A%20Race%20Condition%20in%20GrandNode&amp;severity=low&amp;id=68c1ea7d12193b50d300abec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47120-cwe-250-execution-with-unnecessary--2f487897</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47120%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Verify%20Information%20Queue&amp;severity=medium&amp;id=69a0a1cc85912abc71d0bd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43783-cwe-79-improper-neutralization-of-i-1ad914c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c1dc6d12193b50d30006b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eggstreme-malware-unpacking-a-new-apt-framework-ta-486cfd4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EggStreme%20Malware%3A%20Unpacking%20a%20New%20APT%20Framework%20Targeting%20a%20Philippine%20Military%20Company&amp;severity=medium&amp;id=68c1dc6c12193b50d300065c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10211-server-side-request-forgery-in-yany-8ab5ece6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10211%3A%20Server-Side%20Request%20Forgery%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68c1dc6d12193b50d30006af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54376-cwe-200-exposure-of-sensitive-infor-cb1ea600</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54376%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SpectoLabs%20hoverfly&amp;severity=high&amp;id=68c1d8ec12193b50d3fff70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10201-inappropriate-implementation-in-goo-4610bbdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10201%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=68c1ce8dc458e92ac0137389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10200-use-after-free-in-google-chrome-5d93539b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10200%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68c1ce8dc458e92ac0137385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43784-cwe-863-incorrect-authorization-in--e61bbadb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43784%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c1ce8dc458e92ac013738d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10210-sql-injection-in-yanyutao0402-chanc-7d4298a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10210%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68c1cc7ef286523e0b8be523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-kkrat-3f3f7be5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20kkRAT&amp;severity=medium&amp;id=68c1dc6c12193b50d3000635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54123-cwe-20-improper-input-validation-in-e83de7d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54123%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20SpectoLabs%20hoverfly&amp;severity=critical&amp;id=68c1c79bd98a03aa75d81631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10209-improper-authorization-in-papermerg-b4e67b6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10209%3A%20Improper%20Authorization%20in%20Papermerge%20DMS&amp;severity=medium&amp;id=68c1c4c764e7e03488ac5a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8696-cwe-789-memory-allocation-with-exces-09ab01ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8696%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20ISC%20Stork&amp;severity=high&amp;id=68c1bf362fc5c5dfd9988aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-hits-philippine-military-firm-with-new-53d0d406</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Hits%20Philippine%20Military%20Firm%20with%20New%20EggStreme%20Fileless%20Malware&amp;severity=medium&amp;id=68c1b4a7be3ecb127f3ff141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-carplay-exploited-to-gain-root-access-by-exe-183da97b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20CarPlay%20Exploited%20To%20Gain%20Root%20Access%20By%20Executing%20Remote%20Code&amp;severity=high&amp;id=68c1ace4c91550039e05e205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-confirms-data-theft-after-recent-1d5a5caf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20confirms%20data%20theft%20after%20recent%20cyberattack&amp;severity=high&amp;id=68c1ac285b9fe1b8911bbed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adaptixc2-a-new-open-source-framework-leveraged-in-2881c691</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AdaptixC2%3A%20A%20New%20Open-Source%20Framework%20Leveraged%20in%20Real-World%20Attacks&amp;severity=medium&amp;id=68c1d4bb2da131ca1f63f0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43785-cwe-79-improper-neutralization-of-i-200e2697</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43785%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c1a63b3247d0c3ad2e9f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/learn-about-chillyhell-a-modular-mac-backdoor-16d24ddf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Learn%20about%20ChillyHell%2C%20a%20modular%20Mac%20backdoor&amp;severity=medium&amp;id=68c1d56f12193b50d3ff9e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59045-cwe-770-allocation-of-resources-wit-4d339154</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59045%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stalwartlabs%20stalwart&amp;severity=high&amp;id=68c1a33d65b18cd0836584b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43886-cwe-35-path-traversal-in-dell-power-e3cb28eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43886%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=68c1a33d65b18cd0836584b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20340-uncontrolled-resource-consumption-i-e4180e79</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20340%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=68c1a33d65b18cd0836584b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20159-improper-access-control-in-cisco-ci-411529e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20159%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=68c1a33d65b18cd0836584ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20248-improper-verification-of-cryptograp-dab7623d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20248%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=68c1a33d65b18cd0836584af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fileless-malware-attack-spotted-using-asyncrat-f1317f8e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fileless%20Malware%20Attack%20Spotted%20Using%20AsyncRAT%20for%20Credential%20Theft&amp;severity=medium&amp;id=68c1a27c14292ccda25cd8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43938-cwe-256-plaintext-storage-of-a-pass-b7c71558</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43938%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=68c1a1c551d6d0ab833ae284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8681-cwe-79-improper-neutralization-of-in-449a7af5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=68c1a1c551d6d0ab833ae28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43887-cwe-276-incorrect-default-permissio-f65d8ca6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43887%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=68c1a1c551d6d0ab833ae281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43725-cwe-276-incorrect-default-permissio-7e40721f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43725%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=68c1a1c551d6d0ab833ae27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43885-cwe-78-improper-neutralization-of-s-ce421d89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43885%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=68c1a0479f28e0fbf536df2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43884-cwe-78-improper-neutralization-of-s-a2566f2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43884%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=68c19e0ed3a3d6019ff9f126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43888-cwe-532-insertion-of-sensitive-info-6ff282a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43888%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=68c19d54cce016a9a48210ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59041-cwe-94-improper-control-of-generati-30e67775</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59041%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=68c196ac368ecf244925d85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58764-cwe-94-improper-control-of-generati-e3e04b73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58764%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=68c196ac368ecf244925d85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10231-cwe-276-incorrect-default-permissio-07efb51f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10231%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20N-able%20N-central&amp;severity=high&amp;id=68c180ede55cc6e90da2154e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hello-gym-data-leak-exposes-16-million-audio-files-72fdbe9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hello%20Gym%20Data%20Leak%20Exposes%201.6%20Million%20Audio%20Files%20of%20Gym%20Members&amp;severity=medium&amp;id=68c17d67e55cc6e90da1fd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10227-cwe-311-missing-encryption-of-sensi-1b30b8d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10227%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=medium&amp;id=68c17661e55cc6e90da1cfa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10226-cwe-1395-dependency-on-vulnerable-t-f4e49a82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10226%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=critical&amp;id=68c17661e55cc6e90da1cfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10225-cwe-119-improper-restriction-of-ope-e0736fbc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10225%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=high&amp;id=68c17661e55cc6e90da1cfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10224-cwe-287-improper-authentication-in--21e1ece7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10224%3A%20CWE-287%3A%20Improper%20Authentication%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=medium&amp;id=68c17661e55cc6e90da1cf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10223-cwe-613-insufficient-session-expira-85334318</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10223%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=medium&amp;id=68c172f9e55cc6e90da1b4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10222-cwe-200-exposure-of-sensitive-infor-d622a983</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10222%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=low&amp;id=68c172f9e55cc6e90da1b4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/killsec-ransomware-is-attacking-healthcare-institu-5adb33ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KillSec%20Ransomware%20is%20Attacking%20Healthcare%20Institutions%20in%20Brazil%20-%20Security%20Affairs&amp;severity=medium&amp;id=68c172dae55cc6e90da1b3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt41-hackers-target-us-trade-officia-f0103a0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT41%20Hackers%20Target%20U.S.%20Trade%20Officials%20Amid%202025%20Negotiations&amp;severity=high&amp;id=68c172dae55cc6e90da1b3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10221-cwe-532-insertion-of-sensitive-info-822a3fbd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10221%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20AxxonSoft%20AxxonNet%20ARP%20Agent%20C-WerkNet&amp;severity=medium&amp;id=68c172f9e55cc6e90da1b4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10220-cwe-1104-use-of-unmaintained-third--9088d9c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10220%3A%20CWE-1104%3A%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=critical&amp;id=68c172f9e55cc6e90da1b4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10219-3f9edce1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10219&amp;severity=null&amp;id=68c172f9e55cc6e90da1b4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7718-cwe-639-authorization-bypass-through-89f8fb25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7718%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pixel_prime%20Resideo%20Plugin%20for%20Resideo%20-%20Real%20Estate%20WordPress%20Theme&amp;severity=high&amp;id=68c172f9e55cc6e90da1b4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kerberoasting-0faa0f1e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kerberoasting&amp;severity=medium&amp;id=68c16bd7e55cc6e90da18534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40725-cwe-79-improper-neutralization-of-i-0f8647b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Azon%20Dominator%20Azon%20Dominator%20PHP%20script&amp;severity=medium&amp;id=68c16853e55cc6e90da16fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40979-cwe-427-uncontrolled-search-path-el-968f5dcc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40979%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Grandstream%20Networks%20Wave&amp;severity=high&amp;id=68c164cde55cc6e90da15a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-buterat-backdoor-malware-found-in-enterprise-a-569e815b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Buterat%20Backdoor%20Malware%20Found%20in%20Enterprise%20and%20Government%20Networks&amp;severity=medium&amp;id=68c156bae55cc6e90da0c999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36759-cwe-200-exposure-of-sensitive-infor-a20693bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36759%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SolaX%20Power%20SolaX%20Cloud&amp;severity=high&amp;id=68c13e20e55cc6e90da004a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36757-cwe-306-missing-authentication-for--878e2e45</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36757%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SolaX%20Power%20SolaX%20Cloud&amp;severity=medium&amp;id=68c13e20e55cc6e90da0049c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36758-cwe-307-improper-restriction-of-exc-e028dd2a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36758%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SolaX%20Power%20SolaX%20Cloud&amp;severity=medium&amp;id=68c13e20e55cc6e90da004a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36756-cwe-862-missing-authorization-in-so-8576b680</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36756%3A%20CWE-862%20Missing%20Authorization%20in%20SolaX%20Power%20SolaX%20Cloud&amp;severity=medium&amp;id=68c13e20e55cc6e90da00498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zynorrat-technical-analysis-reverse-engineering-a--65c05991</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZynorRAT%20technical%20analysis%3A%20Reverse%20engineering%20a%20novel%2C%20Turkish%20Go-based%20RAT&amp;severity=medium&amp;id=68c13393e55cc6e90d9fc6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-spotlight-speed-scale-and-stealth-how-axios-8c86afa0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Spotlight%3A%20Speed%2C%20Scale%2C%20and%20Stealth%3A%20How%20Axios%20Powers%20Automated%20Phishing&amp;severity=medium&amp;id=68c13011e55cc6e90d9fa8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41714-cwe-22-improper-limitation-of-a-pat-5c603641</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41714%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Welotec%20SmartEMS%20Web%20Application&amp;severity=high&amp;id=68c12201e55cc6e90d9f5602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9943-cwe-89-improper-neutralization-of-sp-5ae32dc0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9943%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shibboleth%20Service%20Provider&amp;severity=critical&amp;id=68c12201e55cc6e90d9f5605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10142-cwe-89-improper-neutralization-of-s-41af060c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10142%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20martins56%20PagBank%20%2F%20PagSeguro%20Connect%20para%20WooCommerce&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9857-cwe-79-improper-neutralization-of-in-a9c06f0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9857%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heateor%20Heateor%20Login%20%E2%80%93%20Social%20Login%20Plugin&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10126-cwe-79-improper-neutralization-of-i-fa14e368</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10126%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markohoven%20MyBrain%20Utilities&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10001-cwe-434-unrestricted-upload-of-file-e21c95c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10001%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpallimport%20WP%20All%20Import%20%E2%80%93%20Drag%20%26%20Drop%20Import%20for%20CSV%2C%20XML%2C%20Excel%20%26%20Google%20Sheets&amp;severity=high&amp;id=68c11e7ce55cc6e90d9f3b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9888-cwe-352-cross-site-request-forgery-c-56924ffe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9888%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonifre%20Maspik%20%E2%80%93%20Ultimate%20Spam%20Protection&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9622-cwe-352-cross-site-request-forgery-c-34e42181</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9622%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpblast%20WP%20Blast%20%7C%20SEO%20%26%20Performance%20Booster&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10040-cwe-862-missing-authorization-in-sm-a7431c67</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10040%3A%20CWE-862%20Missing%20Authorization%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=high&amp;id=68c11e7ce55cc6e90d9f3b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7843-cwe-918-server-side-request-forgery--45596f39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7843%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20fernandiez%20Auto%20Save%20Remote%20Images%20(Drafts)&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7826-cwe-89-improper-neutralization-of-sp-4ffa46e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7826%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20laki_patel%20Testimonial&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9367-cwe-79-improper-neutralization-of-in-1a008f43</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9979-cwe-862-missing-authorization-in-yon-209e03bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9979%3A%20CWE-862%20Missing%20Authorization%20in%20yonifre%20Maspik%20%E2%80%93%20Ultimate%20Spam%20Protection&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8778-cwe-862-missing-authorization-in-nit-af2f9c5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8778%3A%20CWE-862%20Missing%20Authorization%20in%20nitropack%20NitroPack%20%E2%80%93%20Performance%2C%20Page%20Speed%20%26%20Cache%20Plugin%20for%20Core%20Web%20Vitals%2C%20CDN%20%26%20Image%20Optimization&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9463-cwe-89-improper-neutralization-of-sp-1ecde312</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9463%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20peachpay%20PeachPay%20%E2%80%94%20Payments%20%26%20Express%20Checkout%20for%20WooCommerce%20(supports%20Stripe%2C%20PayPal%2C%20Square%2C%20Authorize.net%2C%20NMI)&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6189-cwe-89-improper-neutralization-of-sp-30d618fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6189%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20arjunthakur%20Duplicate%20Page%20and%20Post&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7049-cwe-639-authorization-bypass-through-290d54f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7049%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dasinfomedia%20WPGYM%20-%20Wordpress%20Gym%20Management%20System&amp;severity=high&amp;id=68c11e7de55cc6e90d9f3b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10049-cwe-434-unrestricted-upload-of-file-90a60516</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10049%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20nik00726%20Responsive%20Filterable%20Portfolio&amp;severity=high&amp;id=68c11e7ce55cc6e90d9f3b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8388-cwe-79-improper-neutralization-of-in-2a298544</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Addons%20for%20Elementor%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=68c0fed8e55cc6e90d9e33aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10197-sql-injection-in-hjsoft-hcm-human-r-febe3b31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10197%3A%20SQL%20Injection%20in%20HJSoft%20HCM%20Human%20Resources%20Management%20System&amp;severity=medium&amp;id=68c0cb539ed239a66bae6162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10195-improper-export-of-android-applicat-353a6b23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10195%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Seismic%20App&amp;severity=medium&amp;id=68c0c7e29ed239a66bae3b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-10-e3941084</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-10&amp;severity=medium&amp;id=68c2149e12193b50d301bf68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29592-na-9be3899c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29592%3A%20n%2Fa&amp;severity=medium&amp;id=68c1d71512193b50d3ffead6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50892-na-00c26325</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50892%3A%20n%2Fa&amp;severity=high&amp;id=68c1b6cbe8f25095999e12eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55976-na-16208a23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55976%3A%20n%2Fa&amp;severity=high&amp;id=68c1b4b8be3ecb127f3ff26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57392-na-fee006b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57392%3A%20n%2Fa&amp;severity=high&amp;id=68c1b28e3b1fa0753e490df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57520-na-d1d72b71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57520%3A%20n%2Fa&amp;severity=medium&amp;id=68c1b073772de968f7fdd33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57642-na-67f5ef21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57642%3A%20n%2Fa&amp;severity=high&amp;id=68c1acf5c91550039e05e31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57571-na-79113669</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57571%3A%20n%2Fa&amp;severity=medium&amp;id=68c1a1c551d6d0ab833ae28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57569-na-cc0fb9c9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57569%3A%20n%2Fa&amp;severity=medium&amp;id=68c1a1c551d6d0ab833ae287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57572-na-aae707fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57572%3A%20n%2Fa&amp;severity=medium&amp;id=68c19e0ed3a3d6019ff9f129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57573-na-944537ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57573%3A%20n%2Fa&amp;severity=medium&amp;id=68c19d54cce016a9a48210d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57570-na-f9bba449</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57570%3A%20n%2Fa&amp;severity=medium&amp;id=68c19d54cce016a9a48210d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56466-na-bb818965</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56466%3A%20n%2Fa&amp;severity=high&amp;id=68c19281e55cc6e90da2d551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56578-na-e7d484c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56578%3A%20n%2Fa&amp;severity=medium&amp;id=68c19281e55cc6e90da2d54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56407-na-58566794</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56407%3A%20n%2Fa&amp;severity=high&amp;id=68c187f5e55cc6e90da24a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56413-na-1c2f1a5f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56413%3A%20n%2Fa&amp;severity=high&amp;id=68c187f5e55cc6e90da24a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56406-na-39f03135</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56406%3A%20n%2Fa&amp;severity=high&amp;id=68c1847ae55cc6e90da22f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56405-na-54285e4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56405%3A%20n%2Fa&amp;severity=high&amp;id=68c1847ae55cc6e90da22f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56404-na-89937c41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56404%3A%20n%2Fa&amp;severity=high&amp;id=68c1847ae55cc6e90da22f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10172-buffer-overflow-in-utt-750w-861eab33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10172%3A%20Buffer%20Overflow%20in%20UTT%20750W&amp;severity=high&amp;id=68c0b63b9ed239a66badc434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59046-cwe-77-improper-neutralization-of-s-2646323f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59046%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ninofiliu%20interactive-git-checkout&amp;severity=critical&amp;id=68c0af389ed239a66bad90df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59044-cwe-1188-insecure-default-initializ-2166be93</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59044%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20himmelblau-idm%20himmelblau&amp;severity=medium&amp;id=68c0af389ed239a66bad90da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59039-cwe-506-embedded-malicious-code-in--ca64ba7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59039%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20prebid%20prebid-universal-creative&amp;severity=critical&amp;id=68c0abb29ed239a66bad7807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59038-cwe-506-embedded-malicious-code-in--90ffb6a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59038%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20prebid%20Prebid.js&amp;severity=high&amp;id=68c0ec1da3df14e7d73649e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59036-cwe-298-improper-validation-of-cert-538b6e68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59036%3A%20CWE-298%3A%20Improper%20Validation%20of%20Certificate%20Expiration%20in%20opsmill%20infrahub&amp;severity=medium&amp;id=68c0a82b9ed239a66bad624b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58131-cwe-367-time-of-check-time-of-use-t-3654f1ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58131%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20VDI%20Plugin%20macOS%20Universal%20installer%20for%20VMware%20Horizon&amp;severity=medium&amp;id=68c0a1239ed239a66bad109f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58135-cwe-837-improper-enforcement-of-a-s-55715b0a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58135%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Clients%20for%20Windows&amp;severity=medium&amp;id=68c0a1239ed239a66bad10a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58134-cwe-863-incorrect-authorization-in--dc98c4bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58134%3A%20CWE-863%20Incorrect%20Authorization%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Clients%20for%20Windows&amp;severity=medium&amp;id=68c0a1239ed239a66bad10a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49461-cwe-79-improper-neutralization-of-i-01315244</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49461%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Clients&amp;severity=medium&amp;id=68c0a1239ed239a66bad10ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54258-use-after-free-cwe-416-in-adobe-sub-ba4e6395</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54258%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=68c0a1239ed239a66bad10ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54259-integer-overflow-or-wraparound-cwe--0ef7a5e9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54259%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=68c0a1239ed239a66bad10b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54260-out-of-bounds-read-cwe-125-in-adobe-55c67feb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54260%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=68c0a1239ed239a66bad10b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49460-cwe-400-uncontrolled-resource-consu-f5c057b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49460%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Clients&amp;severity=medium&amp;id=68c0a1239ed239a66bad10a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10171-buffer-overflow-in-utt-1250gw-509ce996</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10171%3A%20Buffer%20Overflow%20in%20UTT%201250GW&amp;severity=high&amp;id=68c0a1239ed239a66bad10b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49459-cwe-862-missing-authorization-in-zo-004ff8cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49459%3A%20CWE-862%20Missing%20Authorization%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20for%20Windows%20on%20ARM&amp;severity=high&amp;id=68c09d9f9ed239a66bacf8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49458-cwe-120-buffer-copy-without-checkin-2c3e68bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49458%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Clients&amp;severity=medium&amp;id=68c09d9f9ed239a66bacf8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9997-cwe-78-improper-neutralization-of-sp-66e8b23c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9997%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Schneider%20Electric%20Saitel%20DR%20RTU&amp;severity=medium&amp;id=68c09d9f9ed239a66bacf8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9996-cwe-78-improper-neutralization-of-sp-913397b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9996%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Schneider%20Electric%20Saitel%20DR%20RTU&amp;severity=medium&amp;id=68c09a1b9ed239a66bacd6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54244-heap-based-buffer-overflow-cwe-122--860f4aa8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54244%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68c09a1b9ed239a66bacd6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54243-out-of-bounds-write-cwe-787-in-adob-dc4e14cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54243%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68c09a1b9ed239a66bacd6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54245-out-of-bounds-write-cwe-787-in-adob-88ef1060</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54245%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68c09a1b9ed239a66bacd6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58462-cwe-89-improper-neutralization-of-s-7583146c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58462%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OPEXUS%20FOIAXpress%20Public%20Access%20Link%20(PAL)&amp;severity=critical&amp;id=68c09a1b9ed239a66bacd6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-rise-of-raton-from-nfc-heists-to-remote-contro-07ab36a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Rise%20of%20RatOn%3A%20From%20NFC%20heists%20to%20remote%20control%20and%20ATS&amp;severity=medium&amp;id=68c0a4a69ed239a66bad4d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23344-cwe-78-improper-neutralization-of-s-b3e6ffa4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23344%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20NVDebug%20tool&amp;severity=high&amp;id=68c096a79ed239a66bac6ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23343-cwe-22-improper-limitation-of-a-pat-18507eec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23343%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NVIDIA%20NVDebug%20tool&amp;severity=high&amp;id=68c096a79ed239a66bac6adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23342-cwe-522-insufficiently-protected-cr-e11a2e80</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23342%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20NVIDIA%20NVDebug%20tool&amp;severity=high&amp;id=68c096a79ed239a66bac6ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10170-buffer-overflow-in-utt-1200gw-56a978cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10170%3A%20Buffer%20Overflow%20in%20UTT%201200GW&amp;severity=high&amp;id=68c096a79ed239a66bac6ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7746-cwe-79-improper-neutralization-of-in-f359e109</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schneider%20Electric%20ATV630%2F650%2F660%2F680%2F6A0%2F6B0%2F6L0%20Altivar%20Process%20Drives&amp;severity=medium&amp;id=68c096a79ed239a66bac6ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10169-buffer-overflow-in-utt-1200gw-e85eb40d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10169%3A%20Buffer%20Overflow%20in%20UTT%201200GW&amp;severity=high&amp;id=68c096a79ed239a66bac6ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10159-cwe-620-unverified-password-change--e438d018</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10159%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Sophos%20AP6%20Series%20Wireless%20Access%20Points&amp;severity=critical&amp;id=68c096a79ed239a66bac6acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-admin-of-lockergoga-megacortex-nefilim--bf190de2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20charges%20admin%20of%20LockerGoga%2C%20MegaCortex%2C%20Nefilim%20ransomware&amp;severity=high&amp;id=68c095326cc3622422b098c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kosovo-hacker-pleads-guilty-to-running-blackdb-cyb-9782fe97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kosovo%20hacker%20pleads%20guilty%20to%20running%20BlackDB%20cybercrime%20marketplace&amp;severity=high&amp;id=68c0947aa0d4a986bd5c22b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-hide-behind-tor-in-exposed-docker-api-brea-60db40e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20hide%20behind%20Tor%20in%20exposed%20Docker%20API%20breaches&amp;severity=high&amp;id=68c0947aa0d4a986bd5c22b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54241-out-of-bounds-read-cwe-125-in-adobe-bf71971a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54241%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=68c093c4f10b3c489f23d347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54239-out-of-bounds-read-cwe-125-in-adobe-31bbcb22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54239%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=68c093c4f10b3c489f23d341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54240-out-of-bounds-read-cwe-125-in-adobe-94d83aca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54240%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=68c093c4f10b3c489f23d344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54084-cwe-78-improper-neutralization-of-s-b2e3e77f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54084%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Calix%20GigaCenter%20ONT&amp;severity=high&amp;id=68c090f313e997301ccc53bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43491-cwe-99-in-hp-inc-poly-lens-793e9210</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43491%3A%20CWE-99%20in%20HP%2C%20Inc.%20Poly%20Lens&amp;severity=high&amp;id=68c08ee596774cc5680167b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54083-cwe-922-insecure-storage-of-sensiti-33726c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54083%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Calix%20GigaCenter%20ONT&amp;severity=medium&amp;id=68c08ee596774cc5680167b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59037-cwe-506-embedded-malicious-code-in--44ea6db1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59037%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20duckdb%20duckdb-node&amp;severity=high&amp;id=68c08ee596774cc5680167bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34178-cwe-79-improper-neutralization-of-i-8a75688a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c08ee596774cc5680167af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58768-cwe-94-improper-control-of-generati-955ee7cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58768%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=68c08cadbf8644e23a9d2227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34177-cwe-79-improper-neutralization-of-i-601c5109</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c08cadbf8644e23a9d221b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58765-cwe-79-improper-neutralization-of-i-4283ffb5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58765%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webrecorder%20wabac.js&amp;severity=high&amp;id=68c08cadbf8644e23a9d2222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34176-cwe-22-improper-limitation-of-a-pat-279c61b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34176%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c08cadbf8644e23a9d2217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54255-violation-of-secure-design-principl-7c6f12e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54255%3A%20Violation%20of%20Secure%20Design%20Principles%20(CWE-657)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=68c089dc075fc5f733c91a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34175-cwe-79-improper-neutralization-of-i-3a8f6db1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34175%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c089dc075fc5f733c91a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54257-use-after-free-cwe-416-in-adobe-acr-d7d41a60</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54257%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=68c089dc075fc5f733c91a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7635-cwe-306-missing-authentication-for-c-d757ca9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7635%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Calix%20GigaCenter%20ONT&amp;severity=high&amp;id=68c089dc075fc5f733c91a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34174-cwe-79-improper-neutralization-of-i-db988973</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34174%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c089dc075fc5f733c91a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53914-cwe-269-improper-privilege-manageme-7c90f626</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53914%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Calix%20GigaCenter%20ONT&amp;severity=high&amp;id=68c0983c9ed239a66bacc0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34173-cwe-22-improper-limitation-of-a-pat-5eaac10c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34173%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c0983c9ed239a66bacc0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58753-cwe-862-missing-authorization-in-90-9764591d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58753%3A%20CWE-862%3A%20Missing%20Authorization%20in%209001%20copyparty&amp;severity=medium&amp;id=68c0983c9ed239a66bacc0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53913-cwe-269-improper-privilege-manageme-56a4f39b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53913%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Calix%20GigaCenter%20ONT&amp;severity=high&amp;id=68c08ee596774cc5680167c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58759-cwe-20-improper-input-validation-in-be9843a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58759%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20datahihi1%20tiny-env&amp;severity=medium&amp;id=68c0983c9ed239a66bacc102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58758-cwe-703-improper-check-or-handling--3751f884</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58758%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20datahihi1%20tiny-env&amp;severity=medium&amp;id=68c0983c9ed239a66bacc0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58435-cwe-262-not-using-password-aging-in-05cc53bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58435%3A%20CWE-262%3A%20Not%20Using%20Password%20Aging%20in%20OSC%20ondemand&amp;severity=medium&amp;id=68c0859d840cb93c117a091d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34172-cwe-79-improper-neutralization-of-i-2064750b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c0983c9ed239a66bacc105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-technical-analysis-on-how-a-chinese-company-is-e-2275dbf7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Technical%20Analysis%20on%20How%20a%20Chinese%20Company%20is%20Exporting%20The%20Great%20Firewall%20to%20Autocratic%20Regimes&amp;severity=medium&amp;id=68c082c81d20e9585176ce07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58430-cwe-80-improper-neutralization-of-s-0033a11d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58430%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20knadh%20listmonk&amp;severity=high&amp;id=68c082c41d20e9585176cde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36011-cwe-614-sensitive-cookie-in-https-s-41d56416</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36011%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Jazz%20for%20Service%20Management&amp;severity=medium&amp;id=68c082c41d20e9585176cde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36125-cwe-79-improper-neutralization-of-i-e7e57ce2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Hardware%20Management%20Console&amp;severity=medium&amp;id=68c080a332300b81c82d9676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47415-cwe-22-improper-limitation-of-a-pat-9d24543d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47415%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CRESTRON%20TOUCHSCREENS%20x60%2C%20x70%20series&amp;severity=medium&amp;id=68c07f368d6da9cee16f97e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55054-cwe-79-improper-neutralization-of-i-2a97d2b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Baicells%20EG7035E-M11&amp;severity=medium&amp;id=68c07dca2a45f782fdb1779b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55053-cwe-328-use-of-weak-hash-in-baicell-1b44a7e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55053%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20Baicells%20NOVA430e%2F430i%2C%20NOVA436Q%2C%20NEUTRINO430%2C%20NOVA846&amp;severity=medium&amp;id=68c07dca2a45f782fdb17798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43786-cwe-79-improper-neutralization-of-i-c31da4a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43786%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c07dca2a45f782fdb17795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55052-cwe-200-exposure-of-sensitive-infor-98819cf2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55052%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Baicells%20NEUTRINO430%2C%20NOVA436Q%2C%20NOVA430e%2F430i%2C%20NOVA846%2C%20NOVA246%2C%20NOVA243%2C%20NOVA233%2C%20NOVA227&amp;severity=medium&amp;id=68c07ba9b6075907d2127cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55051-cwe-1392-use-of-default-credentials-5a3f2ece</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55051%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Baicells%20NOVA430e%2F430i%2C%20NOVA436Q%2C%20NEUTRINO430%2C%20NOVA846&amp;severity=critical&amp;id=68c07ba9b6075907d2127ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55050-cwe-1242-in-baicells-nova430e430i-n-0281ff5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55050%3A%20CWE-1242%20in%20Baicells%20NOVA430e%2F430i%2C%20NOVA436Q%2C%20NEUTRINO430%2C%20NOVA846&amp;severity=critical&amp;id=68c079872c3c95605bcf75c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55730-cwe-116-improper-encoding-or-escapi-5feb2dc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55730%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20xwikisas%20xwiki-pro-macros&amp;severity=critical&amp;id=68c0782035242cb3d0f995b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55049-cwe-1394-in-baicells-neutrino430-37bfdf48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55049%3A%20CWE-1394%20in%20Baicells%20NEUTRINO430&amp;severity=critical&amp;id=68c0782035242cb3d0f995a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55729-cwe-116-improper-encoding-or-escapi-3e41fa58</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55729%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20xwikisas%20xwiki-pro-macros&amp;severity=critical&amp;id=68c0782035242cb3d0f995aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43781-cwe-79-improper-neutralization-of-i-54c60550</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43781%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c0782035242cb3d0f995a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55048-multiple-cwe-78-in-baicells-neutrin-9adfb7cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55048%3A%20Multiple%20CWE-78%20in%20Baicells%20NEUTRINO430%2C%20NOVA436Q%2C%20NOVA430e%2F430i%2C%20NOVA846%2C%20NOVA246%2C%20NOVA243%2C%20NOVA233%2C%20NOVA227&amp;severity=critical&amp;id=68c076b59256f7c60d152edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55047-cwe-798-use-of-hard-coded-credentia-c120d26e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55047%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Baicells%20SPECTRA%20LTE-U%20eNB&amp;severity=high&amp;id=68c076b59256f7c60d152edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55728-cwe-95-improper-neutralization-of-d-b60cc2c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55728%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwikisas%20xwiki-pro-macros&amp;severity=critical&amp;id=68c076b59256f7c60d152ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10164-deserialization-in-lmsys-sglang-443fc0fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10164%3A%20Deserialization%20in%20lmsys%20sglang&amp;severity=medium&amp;id=68c0749c2bd84bebdc41b969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55727-cwe-95-improper-neutralization-of-d-9a8779ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55727%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwikisas%20xwiki-pro-macros&amp;severity=critical&amp;id=68c0749c2bd84bebdc41b972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54242-use-after-free-cwe-416-in-adobe-pre-7cb50507</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54242%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Premiere%20Pro&amp;severity=high&amp;id=68c071e0ce6ed8307545b972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54256-cross-site-request-forgery-csrf-cwe-49b03f51</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54256%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20(CWE-352)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=68c071e0ce6ed8307545b975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43775-cwe-79-improper-neutralization-of-i-5f96e0ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43775%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c06f24349e966b172a6669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10199-cwe-428-unquoted-search-path-or-ele-87b21015</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10199%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20LizardByte%20Sunshine%20for%20Windows&amp;severity=high&amp;id=68c064ee22bccc7413ab98b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10198-cwe-427-uncontrolled-search-path-el-97400766</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10198%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20LizardByte%20Sunshine%20for%20Windows&amp;severity=high&amp;id=68c064ee22bccc7413ab98b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9269-cwe-918-server-side-request-forgery--79b52d30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9269%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Lexmark%20CX%2C%20XC%2C%20CS%2C%20MS%2C%20MX%2C%20XM%2C%20et.%20al.&amp;severity=medium&amp;id=68c0749c2bd84bebdc41b977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55234-cwe-287-improper-authentication-in--35e64249</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55234%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e4ce6ed8307545babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55227-cwe-77-improper-neutralization-of-s-33863122</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55227%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=68c071e4ce6ed8307545bab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55224-cwe-362-concurrent-execution-using--cde33692</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55224%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e4ce6ed8307545baad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54917-cwe-693-protection-mechanism-failur-decaf7de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54917%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e3ce6ed8307545ba8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54915-cwe-843-access-of-resource-using-in-599dd7c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54915%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c064ee22bccc7413ab98cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54912-cwe-416-use-after-free-in-microsoft-60e8d38d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54912%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c064ee22bccc7413ab98c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54911-cwe-416-use-after-free-in-microsoft-c328338a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54911%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c064ee22bccc7413ab98c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54910-cwe-122-heap-based-buffer-overflow--23be1fd2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54910%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c064ee22bccc7413ab98c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54901-cwe-126-buffer-over-read-in-microso-d149b065</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54901%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=68c064ee22bccc7413ab98bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54900-cwe-122-heap-based-buffer-overflow--dad77e6e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54900%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c064ee22bccc7413ab98bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54116-cwe-284-improper-access-control-in--356dec38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54116%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54115-cwe-362-concurrent-execution-using--520c8ec9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54115%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e3ce6ed8307545ba45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54114-cwe-362-concurrent-execution-using--4aead464</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54114%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68c071e2ce6ed8307545ba2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54113-cwe-122-heap-based-buffer-overflow--9a0785ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54113%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=68c071e2ce6ed8307545ba2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54112-cwe-416-use-after-free-in-microsoft-986a7aa2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54112%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545ba29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54109-cwe-843-access-of-resource-using-in-57c2866d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54109%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e2ce6ed8307545ba20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54108-cwe-362-concurrent-execution-using--6c8faf58</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54108%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68c064ee22bccc7413ab98b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54107-cwe-41-improper-resolution-of-path--7f3af99a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54107%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e2ce6ed8307545ba1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54105-cwe-362-concurrent-execution-using--8c5586f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54105%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68c071e2ce6ed8307545ba17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54104-cwe-843-access-of-resource-using-in-bf257cfd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54104%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e2ce6ed8307545ba14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54103-cwe-416-use-after-free-in-microsoft-18befd8f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54103%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c071e2ce6ed8307545b9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54098-cwe-284-improper-access-control-in--28bda28d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54098%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545b9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54094-cwe-843-access-of-resource-using-in-0d094577</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54094%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e2ce6ed8307545b9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54093-cwe-367-time-of-check-time-of-use-t-e8bfd8b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54093%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545b9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54092-cwe-362-concurrent-execution-using--54368422</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54092%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e1ce6ed8307545b9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54091-cwe-190-integer-overflow-or-wraparo-cccd91de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54091%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c06b1099c168b213afaf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53810-cwe-843-access-of-resource-using-in-482a6068</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53810%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c06b1099c168b213afaf67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53809-cwe-20-improper-input-validation-in-b48a8f3f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53809%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68c071e1ce6ed8307545b9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53808-cwe-843-access-of-resource-using-in-5df691d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53808%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c06f24349e966b172a666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53807-cwe-362-concurrent-execution-using--4c3f124c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53807%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e1ce6ed8307545b9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53806-cwe-126-buffer-over-read-in-microso-063d5f02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53806%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e1ce6ed8307545b9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53805-cwe-125-out-of-bounds-read-in-micro-d6822398</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53805%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68c071e1ce6ed8307545b9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53804-cwe-200-exposure-of-sensitive-infor-c7d1cbb3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53804%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e1ce6ed8307545b9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53803-cwe-209-generation-of-error-message-0857c040</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53803%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e1ce6ed8307545b9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53802-cwe-416-use-after-free-in-microsoft-029bfbc9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53802%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c071e1ce6ed8307545b9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53801-cwe-822-untrusted-pointer-dereferen-a08e6578</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53801%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e1ce6ed8307545b9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53800-cwe-1419-incorrect-initialization-o-9d9c3a1a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53800%3A%20CWE-1419%3A%20Incorrect%20Initialization%20of%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68c071e1ce6ed8307545b9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53799-cwe-908-use-of-uninitialized-resour-b66eafee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53799%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=medium&amp;id=68c071e0ce6ed8307545b98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53796-cwe-126-buffer-over-read-in-microso-5f285a18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53796%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e0ce6ed8307545b985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47997-cwe-362-concurrent-execution-using--fd80b6c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47997%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=medium&amp;id=68c071e0ce6ed8307545b97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49692-cwe-284-improper-access-control-in--9a161827</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49692%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=68c071e0ce6ed8307545b97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55317-cwe-59-improper-link-resolution-bef-6b877592</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55317%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=68c071e5ce6ed8307545bae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55316-cwe-73-external-control-of-file-nam-d5e43680</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55316%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=68c071e5ce6ed8307545bae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55243-cwe-200-exposure-of-sensitive-infor-adf09744</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55243%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20OfficePLUS&amp;severity=high&amp;id=68c071e4ce6ed8307545bac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55245-cwe-59-improper-link-resolution-bef-2090f37b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55245%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Xbox%20Gaming%20Services&amp;severity=high&amp;id=68c071e5ce6ed8307545bade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55236-cwe-367-time-of-check-time-of-use-t-2d1aa7d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55236%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e4ce6ed8307545bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55232-cwe-502-deserialization-of-untruste-75a28431</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55232%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20HPC%20Pack%202019&amp;severity=critical&amp;id=68c071e4ce6ed8307545babc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55228-cwe-362-concurrent-execution-using--81aeb638</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55228%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c071e4ce6ed8307545bab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55226-cwe-362-concurrent-execution-using--e300de27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55226%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e4ce6ed8307545bab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55225-cwe-125-out-of-bounds-read-in-micro-f471c1d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55225%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e4ce6ed8307545bab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55223-cwe-362-concurrent-execution-using--9ae8c7f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55223%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e4ce6ed8307545baaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54919-cwe-362-concurrent-execution-using--135a40cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54919%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e3ce6ed8307545ba91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54918-cwe-287-improper-authentication-in--809cdb90</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54918%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54916-cwe-121-stack-based-buffer-overflow-1693850e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54916%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54913-cwe-362-concurrent-execution-using--566c5709</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54913%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54908-cwe-416-use-after-free-in-microsoft-4b17d339</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54908%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54907-cwe-122-heap-based-buffer-overflow--9106d495</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54907%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54906-cwe-416-use-after-free-in-microsoft-6be22266</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54906%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54905-cwe-822-untrusted-pointer-dereferen-e9ad562c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54905%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54904-cwe-416-use-after-free-in-microsoft-54fd3698</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54904%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54903-cwe-416-use-after-free-in-microsoft-c14d0b3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54903%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54902-cwe-125-out-of-bounds-read-in-micro-296f1355</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54902%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54899-cwe-590-free-of-memory-not-on-the-h-2fcc5a71</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54899%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54898-cwe-125-out-of-bounds-read-in-micro-9cc01fff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54898%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54897-cwe-502-deserialization-of-untruste-0c977396</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54897%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68c071e3ce6ed8307545ba54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54896-cwe-416-use-after-free-in-microsoft-8e4fa7d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54896%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54895-cwe-190-integer-overflow-or-wraparo-00e1fd31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54895%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54894-cwe-122-heap-based-buffer-overflow--31ecd3e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54894%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54111-cwe-416-use-after-free-in-microsoft-823cf597</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54111%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545ba26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54110-cwe-190-integer-overflow-or-wraparo-1d700f45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54110%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545ba23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54106-cwe-190-integer-overflow-or-wraparo-52f304e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54106%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=68c071e2ce6ed8307545ba1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54102-cwe-416-use-after-free-in-microsoft-21c148d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54102%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68c071e2ce6ed8307545b9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54101-cwe-416-use-after-free-in-microsoft-e7b15a44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54101%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e2ce6ed8307545b9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54099-cwe-121-stack-based-buffer-overflow-31ff7b7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54099%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545b9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54097-cwe-125-out-of-bounds-read-in-micro-82c88c9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54097%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e2ce6ed8307545b9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54096-cwe-125-out-of-bounds-read-in-micro-fe0715ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54096%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e2ce6ed8307545b9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54095-cwe-125-out-of-bounds-read-in-micro-9a9d2e6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54095%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e2ce6ed8307545b9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53798-cwe-126-buffer-over-read-in-microso-9deb32f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53798%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e0ce6ed8307545b98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53797-cwe-126-buffer-over-read-in-microso-d830da69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53797%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e0ce6ed8307545b988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49734-cwe-923-improper-restriction-of-com-af28cf2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49734%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Microsoft%20PowerShell%207.4&amp;severity=high&amp;id=68c071e0ce6ed8307545b982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54261-improper-limitation-of-a-pathname-t-cdaa0c5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54261%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=68c0983c9ed239a66bacc113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54250-improper-input-validation-cwe-20-in-967985cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54250%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54247-improper-input-validation-cwe-20-in-a165fd7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54247%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54246-incorrect-authorization-cwe-863-in--154f13ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54246%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54248-improper-input-validation-cwe-20-in-3a5f56b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54248%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=high&amp;id=68c05926ffcb452a184a8bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54251-xml-injection-aka-blind-xpath-injec-e2b41122</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54251%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20(CWE-91)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54252-cross-site-scripting-stored-xss-cwe-557e77ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54252%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54249-server-side-request-forgery-ssrf-cw-e2475c4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54249%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58975-cwe-352-cross-site-request-forgery--97af74b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58975%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Helmut%20Wandl%20Advanced%20Settings&amp;severity=null&amp;id=68c05927ffcb452a184a8c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58976-cwe-862-missing-authorization-in-eq-11bb82c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58976%3A%20Missing%20Authorization%20in%20Equalize%20Digital%20Accessibility%20Checker%20by%20Equalize%20Digital&amp;severity=null&amp;id=68c05927ffcb452a184a8c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58977-cwe-918-server-side-request-forgery-f736548f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58977%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Rhys%20Wynne%20WP%20eBay%20Product%20Feeds&amp;severity=null&amp;id=68c05927ffcb452a184a8c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58978-cwe-862-missing-authorization-in-wp-1cf6fa74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58978%3A%20Missing%20Authorization%20in%20WP%20Swings%20PDF%20Generator%20for%20WordPress&amp;severity=null&amp;id=68c05927ffcb452a184a8c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58980-cwe-862-missing-authorization-in-re-1117e67a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58980%3A%20Missing%20Authorization%20in%20recorp%20Export%20WP%20Page%20to%20Static%20HTML%2FCSS&amp;severity=null&amp;id=68c05927ffcb452a184a8c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58981-cwe-862-missing-authorization-in-eq-93c881c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58981%3A%20Missing%20Authorization%20in%20Equalize%20Digital%20Accessibility%20Checker%20by%20Equalize%20Digital&amp;severity=null&amp;id=68c05927ffcb452a184a8c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58982-cwe-79-improper-neutralization-of-i-43cc0a65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixeline%20Pixeline%26%23039%3Bs%20Email%20Protector&amp;severity=null&amp;id=68c05927ffcb452a184a8c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58983-cwe-79-improper-neutralization-of-i-a0f1e2d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stefano%20Lissa%20Include%20Me&amp;severity=null&amp;id=68c05927ffcb452a184a8c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58984-cwe-79-improper-neutralization-of-i-7748811a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=null&amp;id=68c05927ffcb452a184a8c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58985-cwe-79-improper-neutralization-of-i-1f55e9ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58985%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Additional%20Custom%20Product%20Tabs%20for%20WooCommerce&amp;severity=null&amp;id=68c05927ffcb452a184a8c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58987-cwe-79-improper-neutralization-of-i-158b5b27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AntoineH%20Football%20Pool&amp;severity=null&amp;id=68c05927ffcb452a184a8c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58988-cwe-79-improper-neutralization-of-i-a7d94fa2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=null&amp;id=68c05927ffcb452a184a8c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58989-cwe-79-improper-neutralization-of-i-2eeee953</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silverplugins217%20Dynamic%20Text%20Field%20For%20Contact%20Form%207&amp;severity=null&amp;id=68c05927ffcb452a184a8c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58991-cwe-352-cross-site-request-forgery--35509bdf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58991%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cristiano%20Zanca%20WooCommerce%20Booking%20Bundle%20Hours&amp;severity=high&amp;id=68c05927ffcb452a184a8c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58990-cwe-79-improper-neutralization-of-i-d281224c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58990%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevItems%20ShopLentor&amp;severity=null&amp;id=68c05927ffcb452a184a8c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58993-cwe-89-improper-neutralization-of-s-d438f51e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58993%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themeum%20Tutor%20LMS&amp;severity=null&amp;id=68c05927ffcb452a184a8c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58997-cwe-352-cross-site-request-forgery--276be5a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58997%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Frenify%20Mow&amp;severity=null&amp;id=68c05927ffcb452a184a8c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5500-improper-export-of-android-applicati-cfcf19c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5500%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20ZhenShi%20Mibro%20Fit%20App&amp;severity=medium&amp;id=68c05928ffcb452a184a8c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5005-server-side-request-forgery-in-shang-50942c2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5005%3A%20Server-Side%20Request%20Forgery%20in%20Shanghai%20Lingdang%20Information%20Technology%20Lingdang%20CRM&amp;severity=medium&amp;id=68c05927ffcb452a184a8c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53303-cwe-502-deserialization-of-untruste-d3ca4573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53303%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeMove%20ThemeMove%20Core&amp;severity=null&amp;id=68c076b69256f7c60d152f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58215-cwe-98-improper-control-of-filename-391e1320</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58215%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Ziston&amp;severity=null&amp;id=68c076b69256f7c60d152f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48101-cwe-502-deserialization-of-untruste-01993864</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48101%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webdevstudios%20Constant%20Contact%20for%20WordPress&amp;severity=high&amp;id=68c076b69256f7c60d152f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49430-cwe-918-server-side-request-forgery-4ab99005</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49430%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FWDesign%20Ultimate%20Video%20Player&amp;severity=null&amp;id=68c076b69256f7c60d152f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gayfemboy-malware-campaign-64314d42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gayfemboy%20malware%20campaign&amp;severity=medium&amp;id=68c0558403c143c029d0f9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30875-cwe-79-improper-neutralization-of-i-36d84229</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alexandre%20Froger%20WP%20Weixin&amp;severity=null&amp;id=68c076b59256f7c60d152ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53291-cwe-862-missing-authorization-in-sp-f3aa170d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53291%3A%20Missing%20Authorization%20in%20spoddev2021%20Spreadconnect&amp;severity=null&amp;id=68c076b69256f7c60d152f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53340-cwe-862-missing-authorization-in-aw-016fb51a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53340%3A%20Missing%20Authorization%20in%20awesomesupport%20Awesome%20Support&amp;severity=null&amp;id=68c076b69256f7c60d152f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53348-cwe-862-missing-authorization-in-la-7fa4abb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53348%3A%20Missing%20Authorization%20in%20Laborator%20Kalium&amp;severity=null&amp;id=68c076b69256f7c60d152f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54709-cwe-98-improper-control-of-filename-634be253</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54709%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20uxper%20Sala&amp;severity=high&amp;id=68c076b69256f7c60d152f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32486-cwe-640-weak-password-recovery-mech-406f66bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32486%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Hossein%20Material%20Dashboard&amp;severity=null&amp;id=68c076b59256f7c60d152eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32689-cwe-1284-improper-validation-of-spe-19944913</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32689%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Convers%20Lab%20WP%20SmartPay&amp;severity=null&amp;id=68c076b59256f7c60d152ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32688-cwe-862-missing-authorization-in-so-25e3a26c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32688%3A%20Missing%20Authorization%20in%20Nebojsa%20Target%20Video%20Easy%20Publish&amp;severity=null&amp;id=68c076b59256f7c60d152eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39541-cwe-862-missing-authorization-in-ro-e93022d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39541%3A%20Missing%20Authorization%20in%20Roland%20Murg%20WP%20Simple%20Booking%20Calendar&amp;severity=null&amp;id=68c076b59256f7c60d152ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39553-cwe-862-missing-authorization-in-an-1bfd6f33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39553%3A%20Missing%20Authorization%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=68c076b59256f7c60d152ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47437-cwe-918-server-side-request-forgery-e68cb61b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47437%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=null&amp;id=68c076b59256f7c60d152efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47569-cwe-89-improper-neutralization-of-s-1449b12b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47569%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPSwings%20WooCommerce%20Ultimate%20Gift%20Card&amp;severity=null&amp;id=68c076b69256f7c60d152f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47570-cwe-79-improper-neutralization-of-i-b9512dd3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20villatheme%20WooCommerce%20Photo%20Reviews&amp;severity=null&amp;id=68c076b69256f7c60d152f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47571-cwe-98-improper-control-of-filename-1fda9fb8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47571%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=68c076b69256f7c60d152f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47579-cwe-502-deserialization-of-untruste-2a6aa236</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47579%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Photography&amp;severity=null&amp;id=68c076b69256f7c60d152f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47694-cwe-79-improper-neutralization-of-i-39f9f8c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47694%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20solwin%20Blog%20Designer%20PRO&amp;severity=null&amp;id=68c076b69256f7c60d152f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47695-cwe-98-improper-control-of-filename-2cc9ab73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47695%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20solwin%20Blog%20Designer%20PRO&amp;severity=null&amp;id=68c076b69256f7c60d152f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59005-cwe-862-missing-authorization-in-fr-d04d55ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59005%3A%20Missing%20Authorization%20in%20frenify%20Categorify&amp;severity=null&amp;id=68c076b69256f7c60d152f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59008-cwe-89-improper-neutralization-of-s-eb3e5c8d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59008%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PressTigers%20ZIP%20Code%20Based%20Content%20Protection&amp;severity=null&amp;id=68c076b69256f7c60d152f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55144-cwe-862-missing-authorization-in-iv-a22fb06e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55144%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=68c04ef982742f13ef72ee75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55143-cwe-79-improper-neutralization-of-i-891512b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55143%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=68c04ef982742f13ef72ee72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55142-cwe-862-missing-authorization-in-iv-e665da6e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55142%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=68c04d9dbfc619fb092d2a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-salty2fa-phishing-kit-bypasses-mfa-and-clones--fe29f735</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Salty2FA%20Phishing%20Kit%20Bypasses%20MFA%20and%20Clones%20Login%20Pages&amp;severity=medium&amp;id=68c04ceea0bbf91eaf6af807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55141-cwe-862-missing-authorization-in-iv-b7acd44e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55141%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=68c04d9dbfc619fb092d2a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55139-cwe-918-server-side-request-forgery-7d5b882f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55139%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=68c04c3b35778de20ebc6d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55148-cwe-862-missing-authorization-in-iv-02d072e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55148%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=68c04a24f67a6277124b5fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55147-cwe-352-cross-site-request-forgery--e5905c79</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55147%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=68c04a24f67a6277124b5f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55146-cwe-252-unchecked-return-value-in-i-e1df2b70</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55146%3A%20CWE-252%20Unchecked%20Return%20Value%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=68c0481fbd4e3b9088076674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55145-cwe-862-missing-authorization-in-iv-a964e0c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55145%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure%2022.7R2.9&amp;severity=high&amp;id=68c0481fbd4e3b9088076671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8711-cwe-352-cross-site-request-forgery-c-11a14454</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8711%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=68c0481fbd4e3b9088076677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8712-cwe-862-missing-authorization-in-iva-d567f140</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8712%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure%20before&amp;severity=medium&amp;id=68c0456a12a58f153632f07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9872-cwe-434-unrestricted-upload-of-file--44c79c35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9872%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=68c0456a12a58f153632f085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9712-cwe-434-unrestricted-upload-of-file--a1b19543</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9712%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=68c0456a12a58f153632f082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10183-cwe-611-improper-restriction-of-xml-c43e6780</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10183%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20TecCom%20TecConnect&amp;severity=critical&amp;id=68c03f51fc6c09154073f357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10107-command-injection-in-trendnet-tew-8-6605d6f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10107%3A%20Command%20Injection%20in%20TRENDnet%20TEW-831DR&amp;severity=medium&amp;id=68c03beba5ec036039d1620f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43776-cwe-209-generation-of-error-message-d4e7616f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43776%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c039e58fbcd3351612442f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33045-cwe-123-write-what-where-condition--27eee157</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33045%3A%20CWE-123%3A%20Write-what-where%20Condition%20in%20AMI%20AptioV&amp;severity=high&amp;id=68c035030957a02cccbe8c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47416-cwe-697-incorrect-comparison-in-cre-363f0b77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47416%3A%20CWE-697%20Incorrect%20Comparison%20in%20CRESTRON%20TOUCHSCREEN%20x70&amp;severity=medium&amp;id=68c032e6d1b33bcea25a9a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53609-information-disclosure-in-fortinet--767c8de3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53609%3A%20Information%20disclosure%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=68c03160878aabb0db6d7334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54236-improper-input-validation-cwe-20-in-869e3424</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54236%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=critical&amp;id=68c02cbf9b1730b210897d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9994-cwe-306-missing-authentication-for-c-5dc7b462</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9994%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Amped%20RF%20BT-AP%20111&amp;severity=critical&amp;id=68c028f00b756cdd83640e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9161-cwe-77-improper-neutralization-of-sp-c036d16a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9161%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Rockwell%20Automation%20FactoryTalk%20Optix&amp;severity=high&amp;id=68c02524b7075cbbdbb1944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7350-cwe-74-improper-neutralization-of-sp-405c054f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7350%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Rockwell%20Automation%20Stratix%20IOS&amp;severity=high&amp;id=68c02524b7075cbbdbb19441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9065-cwe-610-externally-controlled-refere-d669189c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9065%3A%20CWE-610%3A%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20Rockwell%20Automation%20ThinManager&amp;severity=high&amp;id=68c02524b7075cbbdbb19447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7970-cwe-306-missing-authentication-for-c-557ae506</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7970%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Rockwell%20Automation%20FactoryTalk%20Activation%20Manager&amp;severity=high&amp;id=68c02524b7075cbbdbb19444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9364-cwe-497-exposure-of-sensitive-system-abff2cc4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9364%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20Analytics%E2%84%A2%20LogixAI%C2%AE&amp;severity=high&amp;id=68c02524b7075cbbdbb1944d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9166-cwe-476-null-pointer-dereference-in--ffba8343</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9166%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Rockwell%20Automation%20ControlLogix%C2%AE%205580&amp;severity=high&amp;id=68c02092b132c07409a3e3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9160-cwe-306-missing-authentication-for-c-42677158</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9160%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Rockwell%20Automation%20CompactLogix%C2%AE%205480&amp;severity=high&amp;id=68c02092b132c07409a3e3c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8007-cwe-20-improper-input-validation-in--5387ed21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8007%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%201756-ENT2R%2C%201756-EN4TR%2C%201756-EN4TRXT&amp;severity=high&amp;id=68c02091b132c07409a3e3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8008-cwe-755-improper-handling-of-excepti-d25531e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8008%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Rockwell%20Automation%201756-ENT2R%2C%201756-EN4TR%2C%201756-EN4TRXT&amp;severity=high&amp;id=68c02092b132c07409a3e3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-docker-malware-strain-spotted-blocking-rivals--86ee01e5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Docker%20Malware%20Strain%20Spotted%20Blocking%20Rivals%20on%20Exposed%20APIs&amp;severity=medium&amp;id=68c019b4bd6c3d06a0ca0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8277-missing-release-of-memory-after-effe-78d40c87</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8277%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime&amp;severity=low&amp;id=68c016a78380a768a8363979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-gentlemen-ransomware-tactics-techniq-4d04acc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20The%20Gentlemen%20Ransomware%3A%20Tactics%2C%20Techniques%2C%20and%20Procedures%20Revealed&amp;severity=medium&amp;id=68c0a4a69ed239a66bad4d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tor-based-cryptojacking-attack-expands-through-mis-0864f0e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TOR-Based%20Cryptojacking%20Attack%20Expands%20Through%20Misconfigured%20Docker%20APIs&amp;severity=high&amp;id=68c00ff39953a027ace1f38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-mostererat-to-clickfix-new-malware-campaigns--3c38381d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20MostereRAT%20to%20ClickFix%3A%20New%20Malware%20Campaigns%20Highlight%20Rising%20AI%20and%20Phishing%20Risks&amp;severity=high&amp;id=68c00ff39953a027ace1f389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cryptanalysis-of-the-fiat-shamir-protocol-schn-e763f3e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Cryptanalysis%20of%20the%20Fiat-Shamir%20Protocol%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=68c00ff39953a027ace1f391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10095-cwe-89-improper-neutralization-of-s-d36b202f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10095%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Proximus%20sp.%20z%20o.o.%20SMSEagle&amp;severity=medium&amp;id=68bffb5303190e417d89476d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/surge-in-networks-scans-targeting-cisco-asa-device-bf47628f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Surge%20in%20networks%20scans%20targeting%20Cisco%20ASA%20devices%20raise%20concerns&amp;severity=high&amp;id=68bff4dd6e8a17a29f14aaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/45-previously-unreported-domains-expose-longstandi-ddbc783c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=45%20Previously%20Unreported%20Domains%20Expose%20Longstanding%20Salt%20Typhoon%20Cyber%20Espionage&amp;severity=high&amp;id=68bff4dd6e8a17a29f14aaa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plex-tells-users-to-reset-passwords-after-new-data-e51341a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Plex%20tells%20users%20to%20reset%20passwords%20after%20new%20data%20breach&amp;severity=high&amp;id=68bff4dd6e8a17a29f14aa9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48208-cwe-90-improper-neutralization-of-s-b98fdcbf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48208%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20HertzBeat%20(incubating)&amp;severity=high&amp;id=68bff5086e8a17a29f14d445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lunalock-ransomware-threatens-victims-by-feeding-s-2aee14af</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LunaLock%20Ransomware%20threatens%20victims%20by%20feeding%20stolen%20data%20to%20AI%20models&amp;severity=medium&amp;id=68bff40f1df5ae06be9cb417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24404-cwe-91-xml-injection-aka-blind-xpat-e8c9d0e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24404%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20Apache%20Software%20Foundation%20Apache%20HertzBeat%20(incubating)&amp;severity=high&amp;id=68bff5086e8a17a29f14d442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59019-cwe-200-exposure-of-sensitive-infor-73bcfd8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59019%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59018-cwe-200-exposure-of-sensitive-infor-20c988c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59018%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TYPO3%20TYPO3%20CMS&amp;severity=high&amp;id=68bfedc5a77866b25848a256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59017-cwe-862-missing-authorization-in-ty-2cdf5ad6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59017%3A%20CWE-862%20Missing%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59016-cwe-209-generation-of-error-message-70def09c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59016%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59015-cwe-331-insufficient-entropy-in-typ-48e56872</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59015%3A%20CWE-331%20Insufficient%20Entropy%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59014-cwe-248-in-typo3-typo3-cms-a0472bd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59014%3A%20CWE-248%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59013-cwe-601-url-redirection-to-untruste-6f7b7883</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59013%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41701-cwe-502-deserialization-of-untruste-91ad4755</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41701%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Beckhoff%20TE1000%20%7C%20TwinCAT%203%20Enineering&amp;severity=high&amp;id=68bfedc4a77866b25848a244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40804-cwe-732-incorrect-permission-assign-2347ba0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40804%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SIMATIC%20Virtualization%20as%20a%20Service%20(SIVaaS)&amp;severity=critical&amp;id=68bfec1952647a71632fbdb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40803-cwe-200-exposure-of-sensitive-infor-4408e54e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40803%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=low&amp;id=68bfec1952647a71632fbdae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40802-cwe-400-uncontrolled-resource-consu-65ce596d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40802%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=low&amp;id=68bfec1952647a71632fbdab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40798-cwe-125-out-of-bounds-read-in-sieme-b37b950b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40798%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=68bfec1952647a71632fbda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40797-cwe-125-out-of-bounds-read-in-sieme-398ba8da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40797%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=68bfec1952647a71632fbda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40796-cwe-125-out-of-bounds-read-in-sieme-df066da7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40796%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=68bfec1952647a71632fbda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40795-cwe-121-stack-based-buffer-overflow-ab2cc7f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40795%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=critical&amp;id=68bfec1952647a71632fbd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40757-cwe-200-exposure-of-sensitive-infor-6bb12fd3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40757%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20APOGEE%20PXC%20Series%20(BACnet)&amp;severity=medium&amp;id=68bfec1952647a71632fbd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40594-cwe-269-improper-privilege-manageme-47791970</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40594%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Siemens%20SINAMICS%20G220%20V6.4&amp;severity=medium&amp;id=68bfec1952647a71632fbd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10134-cwe-73-external-control-of-file-nam-e601e47a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10134%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Bearsthemes%20Goza%20-%20Nonprofit%20Charity%20WordPress%20Theme&amp;severity=critical&amp;id=68c080a332300b81c82d9679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9539-cwe-94-improper-control-of-generatio-f0d02e03</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9539%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rubengc%20AutomatorWP%20%E2%80%93%20Automator%20plugin%20for%20no-code%20automations%2C%20webhooks%20%26%20custom%20integrations%20in%20WordPress&amp;severity=high&amp;id=68bfcdd7fab242a8024d3084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9542-cwe-862-missing-authorization-in-rub-9b13c01f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9542%3A%20CWE-862%20Missing%20Authorization%20in%20rubengc%20AutomatorWP%20%E2%80%93%20Automator%20plugin%20for%20no-code%20automations%2C%20webhooks%20%26%20custom%20integrations%20in%20WordPress&amp;severity=medium&amp;id=68bfcdd7fab242a8024d3088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9111-cwe-79-cross-site-scripting-xss-in-a-7be68c89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9111%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20AI%20ChatBot%20for%20WordPress&amp;severity=low&amp;id=68c082c41d20e9585176cdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8889-cwe-434-unrestricted-upload-of-file--0e157d1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8889%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Compress%20%26%20Upload&amp;severity=low&amp;id=68c082c41d20e9585176cde9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9058-cwe-79-improper-neutralization-of-in-c334da01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mikado%20Themes%20Mikado%20Core&amp;severity=medium&amp;id=68c080a332300b81c82d967d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9061-cwe-79-improper-neutralization-of-in-cf4e5811</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9061%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mikado%20Themes%20Wilmer%20Core&amp;severity=medium&amp;id=68c080a332300b81c82d9681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mostererat-deployed-anydesktightvnc-for-covert-ful-d7023b22</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MostereRAT%20Deployed%20AnyDesk%2FTightVNC%20for%20Covert%20Full%20Access&amp;severity=medium&amp;id=68c0122ff3699d7bbcf17071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9489-cwe-94-improper-control-of-generatio-ee2d6108</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9489%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=68c02cbf9b1730b210897da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43777-cwe-209-generation-of-error-message-81e56a9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43777%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c02cbf9b1730b210897da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10123-command-injection-in-d-link-dir-823-6cf6721b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10123%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68bf9505d5a2966cfc85b35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10122-sql-injection-in-maccms10-141fb2de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10122%3A%20SQL%20Injection%20in%20Maccms10&amp;severity=medium&amp;id=68bf9505d5a2966cfc85b355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42958-cwe-250-execution-with-unnecessary--4d5f8bef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42958%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20SAP_SE%20SAP%20NetWeaver&amp;severity=critical&amp;id=68bf8dfad5a2966cfc85818a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42944-cwe-502-deserialization-of-untruste-3083bc7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42944%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20Netweaver%20(RMI-P4)&amp;severity=critical&amp;id=68bf8dfad5a2966cfc85817c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42938-cwe-79-improper-neutralization-of-i-28eeea0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42938%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20ABAP%20Platform&amp;severity=medium&amp;id=68bf8dfad5a2966cfc858178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42933-cwe-522-insufficiently-protected-cr-33035dad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42933%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SAP_SE%20SAP%20Business%20One%20(SLD)&amp;severity=high&amp;id=68bf8dfad5a2966cfc858174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42930-cwe-606-unchecked-input-for-loop-co-e632aeaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42930%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20SAP_SE%20SAP%20Business%20Planning%20and%20Consolidation&amp;severity=medium&amp;id=68bf8dfad5a2966cfc858170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42929-cwe-1287-improper-validation-of-spe-2d1d0b8b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42929%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20SAP_SE%20SAP%20Landscape%20Transformation%20Replication%20Server&amp;severity=high&amp;id=68bf8dfad5a2966cfc85816c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42927-cwe-1395-dependency-on-vulnerable-t-71256a97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42927%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20Java%20(Adobe%20Document%20Service)&amp;severity=low&amp;id=68bf8dfad5a2966cfc858168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42926-cwe-306-missing-authentication-for--8dd5b749</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42926%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java&amp;severity=medium&amp;id=68bf8dfad5a2966cfc858164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42925-cwe-341-predictable-from-observable-0aeb4f77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42925%3A%20CWE-341%3A%20Predictable%20from%20Observable%20State%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20Java%20(IIOP%20Service)&amp;severity=medium&amp;id=68bf8dfad5a2966cfc858160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42923-cwe-352-cross-site-request-forgery--20908a07</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42923%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SAP_SE%20SAP%20Fiori%20App%20(F4044%20Manage%20Work%20Center%20Groups)&amp;severity=medium&amp;id=68bf8dfad5a2966cfc85815c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42922-cwe-94-improper-control-of-generati-a894626c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42922%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20Java%20(Deploy%20Web%20Service)&amp;severity=critical&amp;id=68bf8dfad5a2966cfc858158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42920-cwe-79-improper-neutralization-of-i-29fb96ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42920%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management&amp;severity=medium&amp;id=68bf8df9d5a2966cfc85814a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42918-cwe-862-missing-authorization-in-sa-7979ce06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42918%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP%20(Background%20Processing)&amp;severity=medium&amp;id=68bf8df9d5a2966cfc858146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42917-cwe-862-missing-authorization-in-sa-bd2f35b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42917%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20HCM%20(Approve%20Timesheets%20Fiori%202.0%20application)&amp;severity=medium&amp;id=68bf8df9d5a2966cfc858142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42916-cwe-1287-improper-validation-of-spe-dd6088d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42916%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20or%20On-Premise)&amp;severity=high&amp;id=68bf8df9d5a2966cfc85813e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42915-cwe-862-missing-authorization-in-sa-1afb144d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42915%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20Fiori%20app%20(Manage%20Payment%20Blocks)&amp;severity=medium&amp;id=68bf8df9d5a2966cfc85813a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42914-cwe-862-missing-authorization-in-sa-b767ff3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42914%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20HCM%20(My%20Timesheet%20Fiori%202.0%20application)&amp;severity=low&amp;id=68bf8df9d5a2966cfc858136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42913-cwe-862-missing-authorization-in-sa-5de1a587</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42913%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20HCM%20(My%20Timesheet%20Fiori%202.0%20application)&amp;severity=low&amp;id=68bf8df9d5a2966cfc858132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42912-cwe-862-missing-authorization-in-sa-9819b7ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42912%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20HCM%20(My%20Timesheet%20Fiori%202.0%20application)&amp;severity=medium&amp;id=68bf8df9d5a2966cfc85812e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42911-cwe-862-missing-authorization-in-sa-42f76d8a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42911%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20(Service%20Data%20Download)&amp;severity=medium&amp;id=68bf8df9d5a2966cfc85812a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10121-sql-injection-in-uverif-3c8c530d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10121%3A%20SQL%20Injection%20in%20uverif&amp;severity=medium&amp;id=68bf8df9d5a2966cfc858124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10120-buffer-overflow-in-tenda-ac20-9c0b34cd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10120%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68bf8703d5a2966cfc8533c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10118-sql-injection-in-itsourcecode-e-log-f148ca6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10118%3A%20SQL%20Injection%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=68bf8703d5a2966cfc8533bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43778-cwe-79-improper-neutralization-of-i-725661a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43778%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68bf8703d5a2966cfc8533cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10117-cross-site-scripting-in-sourcecodes-2a40debd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10117%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20To-Do%20List%20System&amp;severity=medium&amp;id=68bf8703d5a2966cfc8533b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10116-unrestricted-upload-in-siemprecms-abdff28e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10116%3A%20Unrestricted%20Upload%20in%20SiempreCMS&amp;severity=medium&amp;id=68bf8703d5a2966cfc8533af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10115-sql-injection-in-siemprecms-72fd0c4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10115%3A%20SQL%20Injection%20in%20SiempreCMS&amp;severity=medium&amp;id=68bf78efd5a2966cfc84c986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10114-sql-injection-in-phpgurukul-small-c-301569d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10114%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=68bf78efd5a2966cfc84c97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43774-cwe-79-cross-site-scripting-in-life-df7e09af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43774&amp;severity=null&amp;id=68bf78efd5a2966cfc84c98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10113-sql-injection-in-itsourcecode-stude-8a383724</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10113%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68bf71d9d5a2966cfc847710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-09-785dae66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-09&amp;severity=medium&amp;id=68c0c43d9ed239a66bae146a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57059-na-34626d89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57059%3A%20n%2Fa&amp;severity=high&amp;id=68c0983d9ed239a66bacc129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57058-na-394cecea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57058%3A%20n%2Fa&amp;severity=high&amp;id=68c0983d9ed239a66bacc126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57057-na-b30da141</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57057%3A%20n%2Fa&amp;severity=high&amp;id=68c0983d9ed239a66bacc123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57070-na-78b1d666</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57070%3A%20n%2Fa&amp;severity=high&amp;id=68c0983d9ed239a66bacc120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57665-na-6c5b4a67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57665%3A%20n%2Fa&amp;severity=medium&amp;id=68c0983c9ed239a66bacc10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57086-na-413375dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57086%3A%20n%2Fa&amp;severity=high&amp;id=68c0983c9ed239a66bacc109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44594-na-591fa0a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44594%3A%20n%2Fa&amp;severity=critical&amp;id=68c0983c9ed239a66bacc0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57633-na-cf214bbb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57633%3A%20n%2Fa&amp;severity=critical&amp;id=68c0925da5dafa93e8bc09ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44595-na-35cb5868</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44595%3A%20n%2Fa&amp;severity=medium&amp;id=68c08ee596774cc5680167b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44593-na-ec5bc82d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44593%3A%20n%2Fa&amp;severity=medium&amp;id=68c08cadbf8644e23a9d221f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57060-na-c9b70f59</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57060%3A%20n%2Fa&amp;severity=high&amp;id=68c0782035242cb3d0f995b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29089-na-6f0784d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29089%3A%20n%2Fa&amp;severity=high&amp;id=68c0749c2bd84bebdc41b96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57278-na-7d23e6d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57278%3A%20n%2Fa&amp;severity=high&amp;id=68c071e0ce6ed8307545b978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57085-na-984c8811</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57085%3A%20n%2Fa&amp;severity=critical&amp;id=68c06b1099c168b213afaf64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57078-na-e05e5dc9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57078%3A%20n%2Fa&amp;severity=high&amp;id=68c064ee22bccc7413ab98b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57087-na-c8f20c2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57087%3A%20n%2Fa&amp;severity=high&amp;id=68c060cd5eede281431406ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57072-na-a317f53f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57072%3A%20n%2Fa&amp;severity=high&amp;id=68c05ca9440e1c113d243f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57071-na-892a02a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57071%3A%20n%2Fa&amp;severity=high&amp;id=68c05ca9440e1c113d243f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57069-na-a63a22a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57069%3A%20n%2Fa&amp;severity=high&amp;id=68c05b484a9b2b5a7a8d3831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57063-na-03691336</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57063%3A%20n%2Fa&amp;severity=high&amp;id=68c05b484a9b2b5a7a8d382e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57062-na-7064e3cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57062%3A%20n%2Fa&amp;severity=high&amp;id=68c05b484a9b2b5a7a8d382b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57540-na-f494c9f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57540%3A%20n%2Fa&amp;severity=medium&amp;id=68c05927ffcb452a184a8c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57539-na-6a02e9f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57539%3A%20n%2Fa&amp;severity=medium&amp;id=68c05927ffcb452a184a8c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57538-na-53849207</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57538%3A%20n%2Fa&amp;severity=medium&amp;id=68c05926ffcb452a184a8c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57064-na-f1a766d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57064%3A%20n%2Fa&amp;severity=high&amp;id=68c05926ffcb452a184a8c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57061-na-9bb97288</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57061%3A%20n%2Fa&amp;severity=high&amp;id=68c05926ffcb452a184a8bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52915-na-027dd015</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52915%3A%20n%2Fa&amp;severity=high&amp;id=68c0481fbd4e3b908807666d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52322-na-bc21a910</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52322%3A%20n%2Fa&amp;severity=high&amp;id=68c0456a12a58f153632f07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52277-na-7a164792</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52277%3A%20n%2Fa&amp;severity=medium&amp;id=68c03df74c19e63d3813a4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58757-cwe-502-deserialization-of-untruste-525dc9a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58757%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Project-MONAI%20MONAI&amp;severity=high&amp;id=68bf6ad1d5a2966cfc84363e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58756-cwe-502-deserialization-of-untruste-3f164411</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58756%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Project-MONAI%20MONAI&amp;severity=high&amp;id=68bf6ad1d5a2966cfc84363b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58755-cwe-22-improper-limitation-of-a-pat-e64972ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58755%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Project-MONAI%20MONAI&amp;severity=high&amp;id=68bf6ad1d5a2966cfc843648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10112-sql-injection-in-itsourcecode-stude-1cf7fbb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10112%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68bf6ad1d5a2966cfc843641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43763-cwe-918-server-side-request-forgery-bed5d26f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43763%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68bf674cd5a2966cfc841563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10111-sql-injection-in-itsourcecode-stude-bf2a92a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10111%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68bf63c7d5a2966cfc83ff15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blurring-the-lines-intrusion-shows-connection-with-425bee25</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blurring%20the%20Lines%3A%20Intrusion%20Shows%20Connection%20With%20Three%20Major%20Ransomware%20Gangs&amp;severity=medium&amp;id=68c012ef6cae0adff416b7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58752-cwe-23-relative-path-traversal-in-v-301da041</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58752%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20vitejs%20vite&amp;severity=low&amp;id=68bf63c7d5a2966cfc83ff1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58751-cwe-22-improper-limitation-of-a-pat-207aa986</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58751%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite&amp;severity=low&amp;id=68bf6046d5a2966cfc83ed7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58746-cwe-79-improper-neutralization-of-i-dba724fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58746%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VolkovLabs%20business-links&amp;severity=critical&amp;id=68bf5ce1d5a2966cfc83ddad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58745-cwe-94-improper-control-of-generati-c421f401</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58745%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68bf5ce1d5a2966cfc83ddaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58454-cwe-89-improper-neutralization-of-s-85cbe6bf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58454%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68bf5ce1d5a2966cfc83ddbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10110-sql-injection-in-chancms-714c8419</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10110%3A%20SQL%20Injection%20in%20ChanCMS&amp;severity=medium&amp;id=68bf5ce1d5a2966cfc83ddb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10109-sql-injection-in-campcodes-online-l-41719c89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10109%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68bf5ce1d5a2966cfc83ddb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58453-cwe-89-improper-neutralization-of-s-6f16abd9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58453%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68bf5946d5a2966cfc83c8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58452-cwe-79-improper-neutralization-of-i-25f62cca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58452%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=68bf5946d5a2966cfc83c8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1761-cwe-824-improper-clearing-of-heap-me-eabed374</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1761%3A%20CWE-824%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68bf5946d5a2966cfc83c8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58451-cwe-1333-inefficient-regular-expres-9324b97c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58451%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20IEatUranium238%20Cattown&amp;severity=high&amp;id=68bf5946d5a2966cfc83c902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10108-sql-injection-in-campcodes-online-l-91cd01db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10108%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68bf5946d5a2966cfc83c8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blurring-the-lines-intrusion-shows-connection-with-e67af522</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blurring%20the%20Lines%3A%20Intrusion%20Shows%20Connection%20With%20Three%20Major%20Ransomware%20Gangs&amp;severity=medium&amp;id=68c0a4a69ed239a66bad4d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10106-sql-injection-in-yanyutao0402-chanc-2c8a1882</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10106%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68bf4eb7d5a2966cfc837d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58449-cwe-646-reliance-on-file-name-or-ex-49c7cb71</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58449%3A%20CWE-646%3A%20Reliance%20on%20File%20Name%20or%20Extension%20of%20Externally-Supplied%20File%20in%20MahoCommerce%20maho&amp;severity=high&amp;id=68bf4b2cd5a2966cfc836ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58444-cwe-84-improper-neutralization-of-e-93ebcf86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58444%3A%20CWE-84%3A%20Improper%20Neutralization%20of%20Encoded%20URI%20Schemes%20in%20a%20Web%20Page%20in%20modelcontextprotocol%20inspector&amp;severity=high&amp;id=68bf4b2cd5a2966cfc836cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58365-cwe-95-improper-neutralization-of-d-92462a3e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58365%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki-contrib%20application-blog&amp;severity=high&amp;id=68bf4b2cd5a2966cfc836cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57817-cwe-862-missing-authorization-in-et-2f24bd18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57817%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ethyca%20fides&amp;severity=high&amp;id=68bf4b2cd5a2966cfc836cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57816-cwe-799-improper-control-of-interac-68d37252</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57816%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20ethyca%20fides&amp;severity=medium&amp;id=68bf4b2cd5a2966cfc836cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57766-cwe-613-insufficient-session-expira-8b33e59c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57766%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20ethyca%20fides&amp;severity=low&amp;id=68bf4b2cd5a2966cfc836ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57815-cwe-307-improper-restriction-of-exc-1974f8bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57815%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20ethyca%20fides&amp;severity=low&amp;id=68bf4b2cd5a2966cfc836cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10105-sql-injection-in-yanyutao0402-chanc-c350bf66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10105%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68bf40d9d5a2966cfc832c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10104-sql-injection-in-code-projects-onli-008e79af</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10104%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68bf399cd5a2966cfc830bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54994-cwe-78-improper-neutralization-of-s-16346b12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54994%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20akoskm%20create-mcp-server-stdio&amp;severity=critical&amp;id=68bf3299d5a2966cfc82d270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53838-cwe-79-improper-neutralization-of-i-758ddbb2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=68bf2f30d5a2966cfc82a4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10103-sql-injection-in-code-projects-onli-bec5c705</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10103%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68bf2ba8d5a2966cfc82975e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gpugate-malware-uses-google-ads-and-fake-github-co-3a61e8c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GPUGate%20Malware%20Uses%20Google%20Ads%20and%20Fake%20GitHub%20Commits%20to%20Target%20IT%20Firms&amp;severity=high&amp;id=68bf2807d5a2966cfc827766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-account-compromise-led-to-salesloft-drift-b-483602f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Account%20Compromise%20Led%20to%20Salesloft%20Drift%20Breach%20Affecting%2022%20Companies&amp;severity=high&amp;id=68bf2807d5a2966cfc827762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lovesac-confirms-data-breach-after-ransomware-atta-bdf56c60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lovesac%20confirms%20data%20breach%20after%20ransomware%20attack%20claims&amp;severity=high&amp;id=68bf2807d5a2966cfc82775e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/department-of-war-doesnt-defend-its-web-streams-fr-3272f9fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Department%20of%20War%20Doesn%E2%80%99t%20Defend%20its%20Web%20Streams%20From%20Hackers&amp;severity=medium&amp;id=68bf2841d5a2966cfc827925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43722-cwe-269-improper-privilege-manageme-7ff8543e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43722%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=68bf283dd5a2966cfc82790d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10102-sql-injection-in-code-projects-onli-ced2e281</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10102%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68bf2487d5a2966cfc8267e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9114-cwe-639-authorization-bypass-through-10302110</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9114%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dreamstechnologies%20Doccure&amp;severity=critical&amp;id=68bf2103d5a2966cfc824db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9113-cwe-434-unrestricted-upload-of-file--bac3ef41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9113%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dreamstechnologies%20Doccure%20Core&amp;severity=critical&amp;id=68bf2103d5a2966cfc824dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9112-cwe-434-unrestricted-upload-of-file--ebd03dfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9112%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dreamstechnologies%20Doccure&amp;severity=high&amp;id=68bf2103d5a2966cfc824da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10100-sql-injection-in-sourcecodester-sim-b1558ed5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10100%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Forum%20Discussion%20System&amp;severity=medium&amp;id=68bf1d80d5a2966cfc822472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10099-cross-site-scripting-in-portabilis--cd689204</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10099%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68bf1696d5a2966cfc81ef0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-debug-and-chalk-packages-compromised-a221f37a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Debug%20and%20Chalk%20Packages%20Compromised&amp;severity=medium&amp;id=68bf169ad5a2966cfc81ef33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10098-sql-injection-in-phpgurukul-user-ma-3840dd7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10098%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Management%20System&amp;severity=medium&amp;id=68bf0f70d5a2966cfc81c06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-reveal-2-billion-weekly-downloads-comp-ef4fcd86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20reveal%202%20billion%20weekly%20downloads%20compromised%20in%20largest%20npm%20supply%20chain%20attack%20ever&amp;severity=medium&amp;id=68bf0884d5a2966cfc81938f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10097-code-injection-in-simstudioai-sim-e02e165f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10097%3A%20Code%20Injection%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=68bf0899d5a2966cfc8193ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-day-in-sitecore-exploited-to-deploy-weepsteel-d7b44702</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero-Day%20in%20Sitecore%20Exploited%20to%20Deploy%20WEEPSTEEL%20Malware&amp;severity=critical&amp;id=68befdf1d5a2966cfc80e152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10096-server-side-request-forgery-in-sims-93c2c1a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10096%3A%20Server-Side%20Request%20Forgery%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=68befa57d5a2966cfc80bd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canadian-investment-platform-wealthsimple-disclose-3d5175d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canadian%20investment%20platform%20Wealthsimple%20disclosed%20a%20data%20breach&amp;severity=high&amp;id=68bef6d2d5a2966cfc80a079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/significant-risk-and-proactive-defense-9ea2de31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Significant%20Risk%20and%20Proactive%20Defense&amp;severity=medium&amp;id=68bef6ded5a2966cfc80a0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40930-cwe-122-heap-based-buffer-overflow--8b6af171</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40930%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20PJUHASZ%20JSON%3A%3ASIMD&amp;severity=high&amp;id=68bef375d5a2966cfc808f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40929-cwe-122-heap-based-buffer-overflow--5c0d8e16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40929%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RURBAN%20Cpanel%3A%3AJSON%3A%3AXS&amp;severity=medium&amp;id=68bef375d5a2966cfc808f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40928-cwe-122-heap-based-buffer-overflow--38efe635</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40928%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20MLEHMANN%20JSON%3A%3AXS&amp;severity=high&amp;id=68bef375d5a2966cfc808efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7709-cwe-190-integer-overflow-or-wraparou-4c2c4faf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7709%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20SQLite%20FTS5&amp;severity=medium&amp;id=68beefe5d5a2966cfc8062cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-targeted-with-rust-backdoor-and-python-loa-d35d673d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Targeted%20with%20Rust%20Backdoor%20and%20Python%20Loader&amp;severity=medium&amp;id=68bef6ded5a2966cfc80a0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/venezuelas-president-maduro-said-his-huawei-mate-x-c083a4a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Venezuela%E2%80%99s%20President%20Maduro%20said%20his%20Huawei%20Mate%20X6%20cannot%20be%20hacked%20by%20US%20cyber%20spies&amp;severity=medium&amp;id=68bee536d5a2966cfc802888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/you-didnt-get-phished-you-onboarded-the-attacker-080ce654</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=You%20Didn%E2%80%99t%20Get%20Phished%20%E2%80%94%20You%20Onboarded%20the%20Attacker&amp;severity=high&amp;id=68bee536d5a2966cfc802884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mostererat-targets-windows-uses-anydesk-and-tightv-bb1e7abc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MostereRAT%20Targets%20Windows%2C%20Uses%20AnyDesk%20and%20TightVNC%20for%20Full%20Access&amp;severity=medium&amp;id=68bee536d5a2966cfc80288c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36855-cwe-126-buffer-over-read-in-microso-1f991f8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36855%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20.NET%206.0&amp;severity=high&amp;id=68bee1dfd5a2966cfc8014fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36854-cwe-416-use-after-free-in-microsoft-54a3531b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36854%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20.NET%206.0&amp;severity=high&amp;id=68bee1dfd5a2966cfc801501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36853-cwe-190-integer-overflow-or-wraparo-ecb4cb1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36853%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20.NET%206.0&amp;severity=high&amp;id=68bee1dfd5a2966cfc801505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-defenders-vulnerability-break-the-protecti-28d6d5b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Defender&apos;s%20vulnerability%3A%20Break%20The%20Protective%20Shell%20Of%20Windows%20Defender%20With%20The%20Folder%20Redirect%20Technique&amp;severity=medium&amp;id=68bee1e3d5a2966cfc80151e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3212-cwe-416-use-after-free-in-arm-ltd-bi-7d32b617</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3212%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Bifrost%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=68bed3a1d5a2966cfc7f959c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10093-information-disclosure-in-d-link-di-064339b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10093%3A%20Information%20Disclosure%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=68bec91ed5a2966cfc7f4acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10092-xml-external-entity-reference-in-ji-8186259e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10092%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68bec20dd5a2966cfc7f292d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40642-cwe-79-improper-neutralization-of-i-7cec29cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40642%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WebWork%20WebWork%20PHP%20script&amp;severity=medium&amp;id=68bebe89d5a2966cfc7efccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/8th-september-threat-intelligence-report-cd1e907c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=8th%20September%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10091-xml-external-entity-reference-in-ji-6c88428a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10091%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68bebb05d5a2966cfc7edfea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-deploys-malware-with-clickfix-scam-i-df063093</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20Deploys%20Malware%20With%20ClickFix%20Scam%20in%20Fake%20Job%20Interviews&amp;severity=medium&amp;id=68beb077d5a2966cfc7e791c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5993-cwe-22-improper-limitation-of-a-path-c0605419</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5993%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ITCube%20Software%20ITCube%20CRM&amp;severity=critical&amp;id=68beb084d5a2966cfc7e7967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indicators-of-malicious-activity-and-recommendatio-a667181d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indicators%20of%20Malicious%20Activity%20and%20Recommendations%20for%20Impacted%20Organizations%20-%20Hunting%20pulse&amp;severity=medium&amp;id=68bebb19d5a2966cfc7ee07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-kimsuky-leak-how-the-kim-dump-exposed-n-6411c7fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Kimsuky%20Leak%3A%20How%20the%20&apos;Kim&apos;%20Dump%20Exposed%20North%20Korea&apos;s%20Credential%20Theft%20Playbook&amp;severity=medium&amp;id=68bea98ad5a2966cfc7e55ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10090-sql-injection-in-jinher-oa-de418634</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10090%3A%20SQL%20Injection%20in%20Jinher%20OA&amp;severity=medium&amp;id=68bea5eed5a2966cfc7e3a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58782-cwe-502-deserialization-of-untruste-37c2f3e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58782%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Jackrabbit%20Core&amp;severity=medium&amp;id=68be9b63d5a2966cfc7df729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10088-cross-site-scripting-in-sourcecodes-3304fd48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10088%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Time%20Tracker&amp;severity=medium&amp;id=68be82c4d5a2966cfc7cc0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-actions-a-cloudy-day-for-security-part-1-27304a0b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Actions%3A%20A%20Cloudy%20Day%20for%20Security%20-%20Part%201&amp;severity=medium&amp;id=68be7bc0d5a2966cfc7c4f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41664-cwe-732-incorrect-permission-assign-1ef69b0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41664%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20WAGO%20Coupler%200750-0362&amp;severity=high&amp;id=68be7bbdd5a2966cfc7c4f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41708-cwe-319-cleartext-transmission-of-s-31f8e1c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41708%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Bender%20CC612&amp;severity=high&amp;id=68be7bbdd5a2966cfc7c4f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41682-cwe-522-insufficiently-protected-cr-ea31529c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41682%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Bender%20CC612&amp;severity=high&amp;id=68be7bbdd5a2966cfc7c4f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10087-sql-injection-in-sourcecodester-pet-56d13df5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10087%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68be7bbdd5a2966cfc7c4f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10086-improper-authorization-in-fuyanglip-3d8a98a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10086%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68be74bfd5a2966cfc7bda89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8085-cwe-918-server-side-request-forgery--f2d7ca4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8085%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ditty&amp;severity=high&amp;id=68be7635d5a2966cfc7c3594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10085-unrestricted-upload-in-sourcecodest-b698a622</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10085%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68be6b527c5dfe01cb12f135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10084-improper-authorization-in-elunez-el-59058421</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10084%3A%20Improper%20Authorization%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68be7635d5a2966cfc7c3597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58422-use-of-less-trusted-source-in-ricoh-56374cab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58422%3A%20Use%20of%20less%20trusted%20source%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX&amp;severity=low&amp;id=68be5f7f1de277c68dd71983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10083-unrestricted-upload-in-sourcecodest-6935344a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10083%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68be7635d5a2966cfc7c359d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10082-sql-injection-in-sourcecodester-onl-e5997fac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10082%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68be7635d5a2966cfc7c35a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10081-unrestricted-upload-in-sourcecodest-38217c1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10081%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pet%20Management%20System&amp;severity=medium&amp;id=68be7635d5a2966cfc7c35ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10080-use-of-hard-coded-cryptographic-key-df0c629f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10080%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20running-elephant%20Datart&amp;severity=low&amp;id=68be4aede3f0bafba8ab80f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10079-sql-injection-in-phpgurukul-small-c-e5557c68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10079%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=68be478fe3f0bafba8ab66f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10078-sql-injection-in-sourcecodester-onl-b090e85a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10078%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68be4061e3f0bafba8ab4247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/killerpid-bof-04272595</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=killerPID-BOF&amp;severity=medium&amp;id=68be395ee3f0bafba8ab0ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10077-sql-injection-in-sourcecodester-onl-c17d9e17</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10077%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68be35f6e3f0bafba8aaf712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10076-sql-injection-in-sourcecodester-onl-7527cab4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10076%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68be2edfe3f0bafba8aac59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10075-cross-site-scripting-in-sourcecodes-2e386028</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10075%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68be280ae3f0bafba8aaad7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10074-cross-site-scripting-in-portabilis--5e892b84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10074%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68be20e2e3f0bafba8aa6107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-08-1d8cc355</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-08&amp;severity=medium&amp;id=68bf71ccd5a2966cfc846d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52288-na-3bac85a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52288%3A%20n%2Fa&amp;severity=high&amp;id=68bf40d9d5a2966cfc832c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52389-na-93ba6163</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52389%3A%20n%2Fa&amp;severity=high&amp;id=68bf3299d5a2966cfc82d26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55849-na-35108eee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55849%3A%20n%2Fa&amp;severity=high&amp;id=68bf2ba8d5a2966cfc829765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57285-na-2402a00a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57285%3A%20n%2Fa&amp;severity=critical&amp;id=68bf1696d5a2966cfc81ef0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56265-na-614735e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56265%3A%20n%2Fa&amp;severity=high&amp;id=68bf12f3d5a2966cfc81cf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56267-na-91f13213</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56267%3A%20n%2Fa&amp;severity=critical&amp;id=68bf0f70d5a2966cfc81c067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56266-na-2fc02ae3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56266%3A%20n%2Fa&amp;severity=critical&amp;id=68bf0f70d5a2966cfc81c062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51586-na-19364e04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51586%3A%20n%2Fa&amp;severity=low&amp;id=68bf0899d5a2966cfc8193e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59033-na-98503abd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59033%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Microsoft%20Windows&amp;severity=high&amp;id=68bef375d5a2966cfc808f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55998-na-d6cf6eef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55998%3A%20n%2Fa&amp;severity=high&amp;id=68bef375d5a2966cfc808f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52161-na-eb9d12e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52161%3A%20n%2Fa&amp;severity=critical&amp;id=68bef375d5a2966cfc808f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57141-na-76ddca4a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57141%3A%20n%2Fa&amp;severity=critical&amp;id=68beefe5d5a2966cfc8062ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56630-na-98c841d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56630%3A%20n%2Fa&amp;severity=high&amp;id=68bee8bed5a2966cfc803b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22956-na-f7db6ab7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22956%3A%20n%2Fa&amp;severity=critical&amp;id=68bedaaad5a2966cfc7fda08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10073-improper-authorization-in-portabili-44fb2e8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10073%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68be172b54d6dcfcfc897088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10072-improper-access-controls-in-portabi-ea814715</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10072%3A%20Improper%20Access%20Controls%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68be110862f0ad016f7a9926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10071-improper-access-controls-in-portabi-a74c1f25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10071%3A%20Improper%20Access%20Controls%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68be09643478f9b54cf75609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10070-improper-access-controls-in-portabi-e35058d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10070%3A%20Improper%20Access%20Controls%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68be1ecce3f0bafba8aa56ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesloft-drift-breach-traced-to-github-compromise-9684276c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesloft%20Drift%20Breach%20Traced%20to%20GitHub%20Compromise%20and%20Stolen%20OAuth%20Tokens&amp;severity=high&amp;id=68bdfdc702802e212efa5f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/czech-cyber-agency-warns-against-chinese-tech-in-c-a62ca12d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Czech%20cyber%20agency%20warns%20against%20Chinese%20tech%20in%20critical%20infrastructure&amp;severity=critical&amp;id=68bdf2f6d5aebbdbb953912b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/icloud-calendar-abused-to-send-phishing-emails-fro-3b9161b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=iCloud%20Calendar%20abused%20to%20send%20phishing%20emails%20from%20Apple%E2%80%99s%20servers&amp;severity=high&amp;id=68bdf2f6d5aebbdbb953912f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48042-cwe-863-incorrect-authorization-in--46372275</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48042%3A%20CWE-863%20Incorrect%20Authorization%20in%20ash-project%20ash&amp;severity=high&amp;id=68bdac908c2d57aff41b42e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-salesloft-drift-breach-analyzing-the-biggest-s-a3ba525e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Salesloft-Drift%20Breach%3A%20Analyzing%20the%20Biggest%20SaaS%20Breach%20of%202025&amp;severity=high&amp;id=68bd31e1d15306d12f1024c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10068-sql-injection-in-itsourcecode-onlin-60d985e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10068%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68bd0b76b8f12c255cd10bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10067-cross-site-scripting-in-itsourcecod-eeb903d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10067%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bce42ba2c363fb1608c21e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10066-cross-site-scripting-in-itsourcecod-4cb3743a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10066%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bcdd23a2c363fb16087c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36100-cwe-260-password-in-configuration-f-a4137e8c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36100%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20MQ&amp;severity=medium&amp;id=68bcd61ca2c363fb160852b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10065-cross-site-scripting-in-itsourcecod-f48c4600</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10065%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bcd61ca2c363fb160852ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10064-cross-site-scripting-in-itsourcecod-cae5534e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10064%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bcd61ca2c363fb160852a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-07-f7e5d5b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-07&amp;severity=medium&amp;id=68be20b5e3f0bafba8aa5d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10063-cross-site-scripting-in-itsourcecod-03ffff25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10063%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bccd0da2c363fb16078f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10062-sql-injection-in-itsourcecode-stude-b71d613b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10062%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68bccd0da2c363fb16078f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qantas-cuts-executive-bonuses-by-15-after-a-july-d-c92e804f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qantas%20cuts%20executive%20bonuses%20by%2015%25%20after%20a%20July%20data%20breach&amp;severity=high&amp;id=68bc99e4a9171a64ba116615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/noisy-bear-targets-kazakhstan-energy-sector-with-b-9c943430</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Noisy%20Bear%20Targets%20Kazakhstan%20Energy%20Sector%20With%20BarrelFire%20Phishing%20Campaign&amp;severity=high&amp;id=68bc99e4a9171a64ba116611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58445-cwe-200-exposure-of-sensitive-infor-0b7512ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58445%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20runatlantis%20atlantis&amp;severity=medium&amp;id=68bccd0da2c363fb16078f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58446-cwe-770-allocation-of-resources-wit-5a9e280e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58446%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20mlc-ai%20xgrammar&amp;severity=medium&amp;id=68bc88c5337c3bba5b6942cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58438-cwe-22-improper-limitation-of-a-pat-712f9ed7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58438%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jjjake%20internetarchive&amp;severity=critical&amp;id=68bc81f54a2de11313a12439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0034-cwe-787-out-of-bounds-write-in-amd-a-37121af9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0034%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Instinct%E2%84%A2%20MI300X&amp;severity=medium&amp;id=68bc809c209f30cfade91150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0032-cwe-459-incomplete-cleanup-in-amd-am-16c27609</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0032%3A%20CWE-459%20%20Incomplete%20Cleanup%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=high&amp;id=68bc809c209f30cfade9114b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0011-cwe-212-improper-removal-of-sensitiv-bf12cf04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0011%3A%20CWE-212%20%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20AMD%20AMD%20Ryzen%E2%84%A2%208000%20Series%20Desktop%20Processors&amp;severity=low&amp;id=68bccd0da2c363fb16078f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0010-cwe-787-out-of-bounds-write-in-amd-a-dfde9192</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0010%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Radeon%E2%84%A2%20RX%205000%20Series%20Graphics%20Products&amp;severity=medium&amp;id=68bccd0da2c363fb16078f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0009-cwe-476-null-pointer-dereference-in--90052fce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0009%3A%20CWE-476%20%20NULL%20Pointer%20Dereference%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207035%20Series%20Processor%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=68bc7b3026d967d8af3d147b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36354-cwe-1231-improper-prevention-of-loc-ed9dacaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36354%3A%20CWE-1231%20-%20Improper%20Prevention%20of%20Lock%20Bit%20Modification%20in%20AMD%20AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%203000%20Processors&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36342-cwe-1285-improper-validation-of-spe-408c45c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36342%3A%20CWE-1285%20%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36331-cwe-665-improper-initialization-in--43773d4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36331%3A%20CWE-665%20%20Improper%20Initialization%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=low&amp;id=6908ed741c2a0078ae510258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36326-cwe-862-missing-authorization-in-am-21645195</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36326%3A%20CWE-862%20%20Missing%20Authorization%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21947-cwe-1220-insufficient-granularity-o-e0b86b64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21947%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20AMD%20AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%203000%20Processors&amp;severity=high&amp;id=69a0a1ca85912abc71d0bb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10034-buffer-overflow-in-d-link-dir-825-6b5651eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10034%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=68bccd0da2c363fb16078f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10033-sql-injection-in-itsourcecode-onlin-93b3e0fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10033%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68bc31d479caee59e39cc4c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10032-cross-site-scripting-in-campcodes-g-a3232e95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10032%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68bc2cc6c834eb2dd9dc2bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostaction-attack-steals-3325-secrets-from-github-da2c4935</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostAction%20Attack%20Steals%203%2C325%20Secrets%20from%20GitHub%20Projects&amp;severity=medium&amp;id=68bc2711dbd6aed9c4c57d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10031-sql-injection-in-campcodes-grocery--f62c5dc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10031%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68bc25970bc49059264df568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-impersonate-flashbots-steal-5046dad9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20Packages%20Impersonate%20Flashbots%2C%20Steal%20Ethereum%20Wallet%20Keys&amp;severity=high&amp;id=68bc1fee5d3760275ec99882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meetc2-a-serverless-c2-framework-that-leverages-go-e5be6e12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MeetC2%20-%20A%20serverless%20C2%20framework%20that%20leverages%20Google%20Calendar%20APIs%20as%20a%20communication%20channel&amp;severity=medium&amp;id=68bc1fee5d3760275ec99886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasked-salat-stealer-a-deep-dive-into-its-advanc-50d19d5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasked%3A%20Salat%20Stealer%20%E2%80%93%20A%20Deep%20Dive%20into%20Its%20Advanced%20Persistence%20Mechanisms%20and%20C2%20Infrastructure&amp;severity=medium&amp;id=68bea268d5a2966cfc7e1c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10030-sql-injection-in-campcodes-grocery--0ad407a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10030%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68bc0ed648e44a64aad8ca93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10029-cross-site-scripting-in-itsourcecod-3e01d6e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10029%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bccd0da2c363fb16078fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealthy-persistence-with-non-existent-executable--0156565c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealthy%20Persistence%20With%20Non-Existent%20Executable%20File&amp;severity=medium&amp;id=68bbdc4624da5655b4ce4614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9961-cwe-120-buffer-copy-without-checking-dc3818c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9961%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX10%20V1%2FV1.2%2FV2%2FV2.6%2FV3%2FV3.6&amp;severity=high&amp;id=68bccd0da2c363fb16078fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10046-cwe-89-improper-neutralization-of-s-da78ba33</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10046%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20elextensions%20ELEX%20WooCommerce%20Google%20Shopping%20(Google%20Product%20Feed)&amp;severity=medium&amp;id=68bccd0da2c363fb16078fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10028-cross-site-scripting-in-itsourcecod-0d45d62d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10028%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bbd65064d039b901d9c018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6757-cwe-79-improper-neutralization-of-in-a15dd904</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themejunkie%20Recent%20Posts%20Widget%20Extended&amp;severity=medium&amp;id=68bccd0da2c363fb16078fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8149-cwe-79-improper-neutralization-of-in-73f446bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8149%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20aThemes%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8564-cwe-79-improper-neutralization-of-in-789c2b32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8564%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7045-cwe-306-missing-authentication-for-c-18d8f8ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7045%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20cloudinfrastructureservices%20Cloud%20SAML%20SSO%20%E2%80%93%20Single%20Sign%20On%20Login&amp;severity=medium&amp;id=68bbabc7844ddfa4289c969e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9493-cwe-79-improper-neutralization-of-in-f21768d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9493%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20whiteshadow%20Admin%20Menu%20Editor&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7040-cwe-862-missing-authorization-in-clo-8aeb400c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7040%3A%20CWE-862%20Missing%20Authorization%20in%20cloudinfrastructureservices%20Cloud%20SAML%20SSO%20%E2%80%93%20Single%20Sign%20On%20Login&amp;severity=high&amp;id=68bbabc7844ddfa4289c9695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9442-cwe-79-improper-neutralization-of-in-a67da526</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9442%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20Kick%20Integration&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9126-cwe-79-improper-neutralization-of-in-029f9bda</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9126%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designful%20Smart%20Table%20Builder&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8722-cwe-79-improper-neutralization-of-in-7cca3d60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pt-guy%20Content%20Views%20%E2%80%93%20Post%20Grid%20%26%20Filter%2C%20Recent%20Posts%2C%20Category%20Posts%20%E2%80%A6%20(Shortcode%2C%20Gutenberg%20Blocks%2C%20and%20Widgets%20for%20Elementor)&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10003-cwe-89-improper-neutralization-of-s-383cb14f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10003%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=68bb9c18535f4a97731dab4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9853-cwe-79-improper-neutralization-of-in-6bea57ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optio%20Optio%20Dentistry&amp;severity=medium&amp;id=68bb9c18535f4a97731dab6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8359-cwe-288-authentication-bypass-using--d768ba99</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8359%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=68bb9c18535f4a97731dab59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9085-cwe-89-improper-neutralization-of-sp-c3a2e1ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9085%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=68bb9c18535f4a97731dab62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9515-cwe-434-unrestricted-upload-of-file--c57ba8c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9515%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mondula2016%20Multi%20Step%20Form&amp;severity=high&amp;id=68bb9c18535f4a97731dab68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8360-cwe-79-improper-neutralization-of-in-58b6f45c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8360%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=68bb9c18535f4a97731dab5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58374-cwe-78-improper-neutralization-of-s-3e1a128a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58374%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=68bb9c18535f4a97731dab54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6067-cwe-79-improper-neutralization-of-in-9361c8e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sjaved%20Easy%20Social%20Feed%20%E2%80%93%20Social%20Photos%20Gallery%20and%20Post%20Feed%20for%20WordPress&amp;severity=medium&amp;id=68bb9510535f4a97731d3e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9849-cwe-79-improper-neutralization-of-in-901590fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9849%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alimuzzamanalim%20Html%20Social%20share%20buttons&amp;severity=medium&amp;id=68bb9510535f4a97731d3e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7368-cwe-200-exposure-of-sensitive-inform-794e5641</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7368%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sizam%20REHub%20-%20Price%20Comparison%2C%20Multi%20Vendor%20Marketplace%20Wordpress%20Theme&amp;severity=medium&amp;id=68bb9510535f4a97731d3e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7366-cwe-94-improper-control-of-generatio-c820d939</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7366%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sizam%20REHub%20-%20Price%20Comparison%2C%20Multi%20Vendor%20Marketplace%20Wordpress%20Theme&amp;severity=high&amp;id=68bb9510535f4a97731d3e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58439-cwe-89-improper-neutralization-of-s-70e4d664</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58439%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20frappe%20erpnext&amp;severity=high&amp;id=68bb8705535f4a97731c0bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-06-92945e19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-06&amp;severity=medium&amp;id=68bccf08a2c363fb1607a2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58373-cwe-59-improper-link-resolution-bef-953c23b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58373%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=medium&amp;id=68bb6e64535f4a97731a2e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58372-cwe-732-incorrect-permission-assign-125a295c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58372%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=68bb6ae1535f4a977319deac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58371-cwe-78-improper-neutralization-of-s-77ec5e0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58371%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=critical&amp;id=68bb6ae1535f4a977319deb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58370-cwe-78-improper-neutralization-of-s-291f0574</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58370%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=68bb63db535f4a977319b0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58369-cwe-400-uncontrolled-resource-consu-e49481aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58369%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20typelevel%20fs2&amp;severity=medium&amp;id=68bb6059535f4a9773160d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58367-cwe-915-improperly-controlled-modif-953e36fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58367%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20seperman%20deepdiff&amp;severity=critical&amp;id=68bb5cd1535f4a977310270f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10027-cross-site-scripting-in-itsourcecod-332b92cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10027%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bb594d535f4a97730f6c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58366-cwe-522-insufficiently-protected-cr-1d9ea576</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58366%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20InseeFrLab%20onyxia&amp;severity=critical&amp;id=68bb594d535f4a97730f6c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10061-cwe-20-improper-input-validation-in-05d2d251</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10061%3A%20CWE-20%20Improper%20Input%20Validation%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=68bb4ec2535f4a97730ec319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10060-cwe-672-operation-on-a-resource-aft-8fdd004c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10060%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=68bb4ec2535f4a97730ec31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53791-cwe-284-improper-access-control-in--276f9e29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53791%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68bb4b3f535f4a97730eac15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10059-cwe-732-incorrect-permission-assign-ec55d40a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10059%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=68bb4b3f535f4a97730eac11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10043-external-control-of-file-name-or-pa-0362fccd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10043&amp;severity=null&amp;id=68bb4436535f4a97730e5828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10026-cross-site-scripting-in-itsourcecod-5fca4b01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10026%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bb4436535f4a97730e5821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10044-improper-neutralization-of-input-du-87bcfaa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.0&amp;severity=medium&amp;id=68bb425f535f4a97730e492a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9566-improper-limitation-of-a-pathname-to-49552f86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9566%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=68bb425f535f4a97730e492e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10025-sql-injection-in-phpgurukul-online--5c7a2e6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10025%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=68bb3e77e50436161e29a02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/possible-ss7-whatsapp-metadata-surveillance-need-e-256afc1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Possible%20SS7%20%2B%20WhatsApp%20metadata%20surveillance%20%E2%80%93%20need%20expert%20input&amp;severity=high&amp;id=68bb40c1535f4a97730de680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ghostaction-campaign-3325-secrets-stolen-throu-a12eec36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20GhostAction%20Campaign%3A%203%2C325%20Secrets%20Stolen%20Through%20Compromised%20GitHub%20Workflows&amp;severity=medium&amp;id=68bb3163110bdeeeb703939e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9057-cwe-79-improper-neutralization-of-in-f290f4d8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mikado%20Themes%20Biagiotti%20Core&amp;severity=medium&amp;id=68bb2b532275ef7b1c0861fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tls-noverify-bypass-all-the-things-66837bec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TLS%20NoVerify%3A%20Bypass%20All%20The%20Things&amp;severity=medium&amp;id=68bb23f8ab09d55d5457b08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35452-cwe-798-use-of-hard-coded-credentia-a0a8a280</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35452%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20PTZOptics%20PT12X-SE-xx-G3&amp;severity=critical&amp;id=68bb347efe6d142709f02386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30198-cwe-321-use-of-hard-coded-cryptogra-7bed4957</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30198%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ECOVACS%20DEEBOT%20X1%20Series&amp;severity=medium&amp;id=68bb230f3933eaf832a4e5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30199-cwe-494-download-of-code-without-in-b437bed0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30199%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ECOVACS%20DEEBOT%20X1%20Series&amp;severity=high&amp;id=68bb230f3933eaf832a4e5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35451-cwe-798-use-of-hard-coded-credentia-f67e6195</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35451%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20PTZOptics%20PT12X-SE-xx-G3&amp;severity=critical&amp;id=68bb230f3933eaf832a4e5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30200-cwe-321-use-of-hard-coded-cryptogra-a5ed53da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30200%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ECOVACS%20DEEBOT%20X1%20Series&amp;severity=medium&amp;id=68bb230f3933eaf832a4e5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10014-improper-authorization-in-elunez-el-ea19845c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10014%3A%20Improper%20Authorization%20in%20elunez%20eladmin&amp;severity=low&amp;id=68bb1fe2f9abd9586d5a6455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-barrelfire-targeting-kazakhstan-oil-gas-c1edc54d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20BarrelFire%3A%20Targeting%20Kazakhstan%20Oil%20%26%20Gas&amp;severity=medium&amp;id=68bb3cf16ebe005c8df37a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9709-cwe-1191-on-chip-debug-and-test-inte-42ceec8d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9709%3A%20CWE-1191%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Nordic%20Semiconductor%20nRF52810&amp;severity=high&amp;id=68bb1c09adefd13a08301999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tag-150-develops-castlerat-in-python-and-c-expandi-14ecea13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TAG-150%20Develops%20CastleRAT%20in%20Python%20and%20C%2C%20Expanding%20CastleLoader%20Malware%20Operations&amp;severity=high&amp;id=68bb1b429ba166050147e279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/max-severity-argo-cd-api-flaw-leaks-repository-cre-a460f874</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Max%20severity%20Argo%20CD%20API%20flaw%20leaks%20repository%20credentials&amp;severity=high&amp;id=68bb1a7a88cd7f061cebca2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/financial-services-firm-wealthsimple-discloses-dat-34404809</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Financial%20services%20firm%20Wealthsimple%20discloses%20data%20breach&amp;severity=high&amp;id=68bb1a7a88cd7f061cebca2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-orders-immediate-patch-of-critical-sitecore-v-6ff77cb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Orders%20Immediate%20Patch%20of%20Critical%20Sitecore%20Vulnerability%20Under%20Active%20Exploitation&amp;severity=critical&amp;id=68bb1a7988cd7f061cebca26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9999-cwe-940-improper-verification-of-sou-3f9ed9a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9999%3A%20CWE-940%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20arcinfo%20PcVue&amp;severity=high&amp;id=68bb1516b1fe325ba15996e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9998-cwe-754-improper-check-for-unusual-o-1588fb1f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9998%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=68bb12d27b333e59cd824c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27003-cwe-352-cross-site-request-forgery--30b57ee7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27003%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fullworks%20Quick%20Paypal%20Payments&amp;severity=null&amp;id=68bb10947b3099d93300d113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53571-cwe-862-missing-authorization-in-vi-b377cc85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53571%3A%20Missing%20Authorization%20in%20VillaTheme%20HAPPY&amp;severity=null&amp;id=68bb10947b3099d93300d116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58206-cwe-98-improper-control-of-filename-6a734288</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58206%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20MaxCoach&amp;severity=null&amp;id=68bb10947b3099d93300d119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58214-cwe-98-improper-control-of-filename-063af2a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58214%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Indutri&amp;severity=null&amp;id=68bb10947b3099d93300d11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58628-cwe-89-improper-neutralization-of-s-f5e59866</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58628%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20Miraculous&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48102-cwe-79-improper-neutralization-of-i-d21e74da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gourl%20GoUrl%20Bitcoin%20Payment%20Gateway%20%26amp%3B%20Paid%20Downloads%20%26amp%3B%20Membership&amp;severity=null&amp;id=68bb0d9de11b59d9ac04ed36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48103-cwe-79-improper-neutralization-of-i-edb970e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48103%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mulscully%20Today%26%23039%3Bs%20Date%20Inserter&amp;severity=null&amp;id=68bb0d9de11b59d9ac04ed39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48104-cwe-352-cross-site-request-forgery--c05cd435</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48104%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ericzane%20Floating%20Window%20Music%20Player&amp;severity=null&amp;id=68bb0d9de11b59d9ac04ed3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48105-cwe-79-improper-neutralization-of-i-3ba4630b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48105%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vincent%20Boiardt%20Easy%20Flash%20Embed&amp;severity=null&amp;id=68bb0d9de11b59d9ac04ed3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48317-cwe-35-path-traversal-in-stefan-kel-2a52e95b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48317%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Stefan%20Keller%20WooCommerce%20Payment%20Gateway%20for%20Saferpay&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49401-cwe-502-deserialization-of-untruste-5023bf93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49401%3A%20Incorrect%20Privilege%20Assignment%20in%20axiomthemes%20smart%20SEO&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53307-cwe-79-improper-neutralization-of-i-6c4be8a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Beaver%20Builder%20WordPress%20Assistant&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54744-cwe-862-missing-authorization-in-st-b2d642dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54744%3A%20Missing%20Authorization%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57889-cwe-98-improper-control-of-filename-057f9804</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57889%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RealMag777%20InPost%20Gallery&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32320-elevation-of-privilege-in-google-an-5c467bee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32320%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68bb0d9de11b59d9ac04ed33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32318-elevation-of-privilege-in-google-an-eb52dbf7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32318%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68bb0d9de11b59d9ac04ed30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32317-information-disclosure-in-google-an-d6e3e755</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32317%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68bb0d9de11b59d9ac04ed2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32316-information-disclosure-in-google-an-c7fed1b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32316%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68bb0d9de11b59d9ac04ed2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26461-information-disclosure-in-google-an-75c1df86</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26461%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=68bb0d9de11b59d9ac04ed27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26434-information-disclosure-in-google-an-f8e2c00e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26434%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68bb0d9de11b59d9ac04ed24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/virustotal-finds-44-undetected-svg-files-used-to-d-e7b80ca3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VirusTotal%20Finds%2044%20Undetected%20SVG%20Files%20Used%20to%20Deploy%20Base64-Encoded%20Phishing%20Pages&amp;severity=high&amp;id=68bb0615663fcc7fa5fe7a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/svg-files-used-in-hidden-malware-campaign-imperson-6d760903</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SVG%20files%20used%20in%20hidden%20malware%20campaign%20impersonating%20Colombian%20authorities&amp;severity=medium&amp;id=68bb055679cfce4135ad74f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-sitecore-android-and-linux-flaws-to-i-44a4e879</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Sitecore%2C%20Android%2C%20and%20Linux%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68bb055679cfce4135ad74fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10013-improper-access-controls-in-portabi-f7f4ff4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10013%3A%20Improper%20Access%20Controls%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68bb03d23c4e52c5877cbbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10012-sql-injection-in-portabilis-i-educa-c7dae4e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10012%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68baf67b04f80bd19b650cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10011-sql-injection-in-portabilis-i-educa-b80dd881</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10011%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68baf67b04f80bd19b650cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58887-cwe-79-improper-neutralization-of-i-ad513583</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Course%20Finder%20%7C%20andr%C3%A9%20martin%20-%20it%20solutions%20%26amp%3B%20research%20UG%20Course%20Booking%20Platform&amp;severity=null&amp;id=68baeaa757c5b37b67a461ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58886-cwe-79-improper-neutralization-of-i-8df2925d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58886%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tan%20Nguyen%20Instant%20Locations&amp;severity=null&amp;id=68baeaa757c5b37b67a461e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58884-cwe-79-improper-neutralization-of-i-802c32c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ivan%20Drago%20vipdrv&amp;severity=null&amp;id=68baeaa757c5b37b67a461e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58883-cwe-79-improper-neutralization-of-i-95771f6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58883%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Thomas%20Harris%20Search%20Cloud%20One&amp;severity=null&amp;id=68baeaa757c5b37b67a461e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58882-cwe-79-improper-neutralization-of-i-07b5ec90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20w1zzard%20Simple%20Text%20Slider&amp;severity=null&amp;id=68baeaa757c5b37b67a461de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58881-cwe-89-improper-neutralization-of-s-2907ce1b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58881%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20New%20Simple%20Gallery&amp;severity=null&amp;id=68baeaa757c5b37b67a461db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58880-cwe-79-improper-neutralization-of-i-6ff3b131</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reubenthiessen%20Translate%20This%20gTranslate%20Shortcode&amp;severity=null&amp;id=68baeaa757c5b37b67a461d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58878-cwe-352-cross-site-request-forgery--20eae3d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58878%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20usamafarooq%20Woocommerce%20Gifts%20Product&amp;severity=null&amp;id=68baeaa757c5b37b67a461d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58876-cwe-79-improper-neutralization-of-i-c10d9689</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58876%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ali%20Aghdam%20Aparat%20Video%20Shortcode&amp;severity=null&amp;id=68baeaa757c5b37b67a461d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58875-cwe-79-improper-neutralization-of-i-fcadc276</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sudar%20Muthu%20WP%20Github%20Gist&amp;severity=null&amp;id=68baeaa757c5b37b67a461b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58874-cwe-79-improper-neutralization-of-i-4d87abef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58874%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20josepsitjar%20StoryMap&amp;severity=null&amp;id=68baeaa757c5b37b67a461b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58873-cwe-79-improper-neutralization-of-i-43e436d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pusheco%20Pushe%20Web%20Push%20Notification&amp;severity=null&amp;id=68baeaa757c5b37b67a461ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58872-cwe-201-insertion-of-sensitive-info-55dd89b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58872%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20premiumbizthemes%20Simple%20Price%20Calculator&amp;severity=null&amp;id=68baeaa757c5b37b67a461ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58871-cwe-79-improper-neutralization-of-i-29a003e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Luis%20Rock%20Master%20Paper%20Collapse%20Toggle&amp;severity=null&amp;id=68baeaa757c5b37b67a461a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58870-cwe-79-improper-neutralization-of-i-7e3607b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58870%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DeBAAT%20WP-GraphViz&amp;severity=null&amp;id=68baeaa757c5b37b67a461a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58869-cwe-352-cross-site-request-forgery--6bd67e6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58869%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Simasicher%20SimaCookie&amp;severity=null&amp;id=68baeaa757c5b37b67a461a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58868-cwe-79-improper-neutralization-of-i-9c6c3924</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58868%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simasicher%20SimaCookie&amp;severity=null&amp;id=68baeaa757c5b37b67a4619e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58867-cwe-79-improper-neutralization-of-i-307e094b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58867%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Remi%20Corson%20Easy%20Download%20Media%20Counter&amp;severity=null&amp;id=68baeaa757c5b37b67a4619b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58866-cwe-497-exposure-of-sensitive-syste-e8a320e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58866%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Rami%20Yushuvaev%20Site%20Info&amp;severity=null&amp;id=68baeaa757c5b37b67a46197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58865-cwe-352-cross-site-request-forgery--2a08c2a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58865%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20reimund%20Compact%20Admin&amp;severity=null&amp;id=68baeaa657c5b37b67a46172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58864-cwe-79-improper-neutralization-of-i-eab834c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58864%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=68baeaa657c5b37b67a4616f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58863-cwe-79-improper-neutralization-of-i-76397cce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SdeWijs%20Zoomify%20embed%20for%20WP&amp;severity=null&amp;id=68baeaa657c5b37b67a4616c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58862-cwe-79-improper-neutralization-of-i-b51e437e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58862%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20George%20Sexton%20WordPress%20Events%20Calendar%20Plugin%20%E2%80%93%20connectDaily&amp;severity=null&amp;id=68baeaa657c5b37b67a46168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58861-cwe-352-cross-site-request-forgery--8d613f22</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58861%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Corner%20Quick%20Event%20Calendar&amp;severity=null&amp;id=68baeaa657c5b37b67a46165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58860-cwe-352-cross-site-request-forgery--b5f2ed63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58860%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20KaizenCoders%20Enable%20Latex&amp;severity=null&amp;id=68baeaa657c5b37b67a46162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58859-cwe-352-cross-site-request-forgery--117f1460</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58859%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Merinas%20Add%20to%20Feedly&amp;severity=null&amp;id=68baeaa657c5b37b67a4615f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58858-cwe-79-improper-neutralization-of-i-cffba5cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPBean%20WPB%20Image%20Widget&amp;severity=null&amp;id=68baeaa657c5b37b67a4615c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58857-cwe-79-improper-neutralization-of-i-821e5bab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58857%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KaizenCoders%20Table%20of%20content&amp;severity=null&amp;id=68baeaa657c5b37b67a46159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58856-cwe-352-cross-site-request-forgery--de5594f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58856%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ablancodev%20Woocommerce%20Notify%20Updated%20Product&amp;severity=null&amp;id=68baeaa657c5b37b67a46156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58855-cwe-1236-improper-neutralization-of-e765ce6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58855%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Denis%20V%20(Artprima)%20AP%20HoneyPot%20WordPress%20Plugin&amp;severity=null&amp;id=68baeaa557c5b37b67a46132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58854-cwe-352-cross-site-request-forgery--bb7586e3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58854%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Samer%20Bechara%20Ultimate%20AJAX%20Login&amp;severity=null&amp;id=68baeaa557c5b37b67a4612f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58853-cwe-352-cross-site-request-forgery--30f50134</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58853%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OTWthemes%20Popping%20Sidebars%20and%20Widgets%20Light&amp;severity=null&amp;id=68baeaa557c5b37b67a4612b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58852-cwe-352-cross-site-request-forgery--293624a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58852%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mark%20O&apos;Donnell%20MSTW%20League%20Manager&amp;severity=null&amp;id=68baeaa557c5b37b67a46128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58851-cwe-79-improper-neutralization-of-i-dfc30c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58851%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DigitalCourt%20Boxed%20Content&amp;severity=null&amp;id=68baeaa557c5b37b67a46125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58850-cwe-79-improper-neutralization-of-i-83e0379e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marcshowpass%20Showpass%20WordPress%20Extension&amp;severity=null&amp;id=68baeaa557c5b37b67a46122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58849-cwe-352-cross-site-request-forgery--aa207e51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58849%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Deepak%20S%20Hide%20Real%20Download%20Path&amp;severity=null&amp;id=68baeaa557c5b37b67a4611f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58848-cwe-352-cross-site-request-forgery--1ebcdc3b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58848%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aakash1911%20WP%20likes&amp;severity=null&amp;id=68baeaa557c5b37b67a4611c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58847-cwe-352-cross-site-request-forgery--cf5f6999</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58847%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yaidier%20WN%20Flipbox%20Pro&amp;severity=null&amp;id=68baeaa557c5b37b67a46119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58846-cwe-352-cross-site-request-forgery--aff10071</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58846%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dejan%20Markovic%20WordPress%20Buffer%20%E2%80%93%20HYPESocial.%20Social%20Media%20Auto%20Post%2C%20Social%20Media%20Auto%20Publish%20and%20Schedule&amp;severity=null&amp;id=68baeaa557c5b37b67a46116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58845-cwe-352-cross-site-request-forgery--ce1554dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58845%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ChrisHurst%20Bulk%20Watermark&amp;severity=null&amp;id=68baeaa457c5b37b67a460f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58844-cwe-352-cross-site-request-forgery--911464e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58844%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Subhash%20Kumar%20Database%20to%20Excel&amp;severity=null&amp;id=68baeaa457c5b37b67a460ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58843-cwe-352-cross-site-request-forgery--8a11b027</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58843%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Merinas%20Auto%20Last%20Youtube%20Video&amp;severity=null&amp;id=68baeaa457c5b37b67a460ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58842-cwe-79-improper-neutralization-of-i-60462675</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58842%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20givecloud%20Donation%20Forms%20WP%20by%20Givecloud&amp;severity=null&amp;id=68baeaa457c5b37b67a460e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58841-cwe-266-incorrect-privilege-assignm-84697dde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58841%3A%20Incorrect%20Privilege%20Assignment%20in%20John%20Luetke%20Media%20Author&amp;severity=null&amp;id=68baeaa457c5b37b67a460e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58840-cwe-79-improper-neutralization-of-i-23a36fce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58840%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ibnul%20H.%20Custom%20Team%20Manager&amp;severity=null&amp;id=68baeaa457c5b37b67a460e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58839-cwe-502-deserialization-of-untruste-21d6445e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58839%3A%20Deserialization%20of%20Untrusted%20Data%20in%20aThemeArt%20Translations%20eDS%20Responsive%20Menu&amp;severity=null&amp;id=68baeaa457c5b37b67a460de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58838-cwe-79-improper-neutralization-of-i-813d49e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zakir%20Smooth%20Accordion&amp;severity=null&amp;id=68baeaa457c5b37b67a460db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58837-cwe-79-improper-neutralization-of-i-f49a375f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58837%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shiful%20H%20SS%20Font%20Awesome%20Icon&amp;severity=null&amp;id=68baeaa457c5b37b67a460d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58836-cwe-79-improper-neutralization-of-i-2b9c3087</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58836%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Franz%20Wieser%20FW%20Anker&amp;severity=null&amp;id=68baeaa457c5b37b67a460d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58835-cwe-1284-improper-validation-of-spe-bdf4527e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58835%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20calliko%20Bonus%20for%20Woo&amp;severity=null&amp;id=68baeaa457c5b37b67a460b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58834-cwe-79-improper-neutralization-of-i-63a30c47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58834%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gugu%20short.io&amp;severity=null&amp;id=68baeaa457c5b37b67a460b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58833-cwe-352-cross-site-request-forgery--d6850e99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58833%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20INVELITY%20Invelity%20MyGLS%20connect&amp;severity=null&amp;id=68baeaa457c5b37b67a460b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58832-cwe-79-improper-neutralization-of-i-e89ab18d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58832%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Search%20by%20Google&amp;severity=null&amp;id=68baeaa457c5b37b67a460b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58831-cwe-352-cross-site-request-forgery--cbc2a6c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58831%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20snagysandor%20Parallax%20Scrolling%20Enllax.js&amp;severity=null&amp;id=68baeaa457c5b37b67a460ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58830-cwe-79-improper-neutralization-of-i-a2a5e6c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58830%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snagysandor%20Parallax%20Scrolling%20Enllax.js&amp;severity=null&amp;id=68baeaa457c5b37b67a460aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58829-cwe-918-server-side-request-forgery-907af9ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58829%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20aitool%20Ai%20Auto%20Tool%20Content%20Writing%20Assistant%20(Gemini%20Writer%2C%20ChatGPT%20)%20All%20in%20One&amp;severity=null&amp;id=68baeaa457c5b37b67a460a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58828-cwe-79-improper-neutralization-of-i-99503afb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58828%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=68baeaa457c5b37b67a460a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58827-cwe-94-improper-control-of-generati-a2c7e72d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58827%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=68baeaa457c5b37b67a460a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58826-cwe-79-improper-neutralization-of-i-5a7566e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58826%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eric%20Mann%20WP%20Publication%20Archive&amp;severity=null&amp;id=68baeaa457c5b37b67a4609e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58825-cwe-79-improper-neutralization-of-i-b22b397b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58825%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Habibur%20Rahman%20Comment%20Form%20WP%20%26%238211%3B%20Customize%20Default%20Comment%20Form&amp;severity=null&amp;id=68baeaa357c5b37b67a4607c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58824-cwe-862-missing-authorization-in-we-b76a05c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58824%3A%20Missing%20Authorization%20in%20priyanshumittal%20Shk%20Corporate&amp;severity=null&amp;id=68baeaa357c5b37b67a46078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58823-cwe-79-improper-neutralization-of-i-01b72159</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58823%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20African%20Boss%20Get%20Cash&amp;severity=null&amp;id=68baeaa357c5b37b67a46075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58822-cwe-79-improper-neutralization-of-i-8ef73cdf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58822%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mndpsingh287%20WP%20Mail&amp;severity=null&amp;id=68baeaa357c5b37b67a46072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58821-cwe-79-improper-neutralization-of-i-98e44def</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58821%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdever%20WP%20Notification%20Bell&amp;severity=null&amp;id=68baeaa357c5b37b67a4606f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58820-cwe-79-improper-neutralization-of-i-d55b5e4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58820%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Carousel%20Ultimate&amp;severity=null&amp;id=68baeaa357c5b37b67a4606c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58819-cwe-434-unrestricted-upload-of-file-86410e5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58819%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CreedAlly%20Bulk%20Featured%20Image&amp;severity=null&amp;id=68baeaa357c5b37b67a46069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58818-cwe-352-cross-site-request-forgery--cfc8c4d1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58818%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SwiftNinjaPro%20Developer%20Tools%20Blocker&amp;severity=null&amp;id=68baeaa357c5b37b67a46066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58817-cwe-862-missing-authorization-in-de-0824fbc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58817%3A%20Missing%20Authorization%20in%20desertthemes%20SoftMe&amp;severity=null&amp;id=68baeaa357c5b37b67a46063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58816-cwe-862-missing-authorization-in-pl-679a33d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58816%3A%20Missing%20Authorization%20in%20Plugin%20Devs%20Product%20Carousel%20Slider%20for%20Elementor&amp;severity=null&amp;id=68baeaa357c5b37b67a46060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58815-cwe-502-deserialization-of-untruste-c294b78f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58815%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Rubel%20Miah%20Aitasi%20Coming%20Soon&amp;severity=null&amp;id=68baeaa257c5b37b67a46033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58814-cwe-79-improper-neutralization-of-i-86059197</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58814%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ram%20Ratan%20Maurya%20Stagtools&amp;severity=null&amp;id=68baeaa257c5b37b67a46030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58813-cwe-862-missing-authorization-in-th-94ccf36f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58813%3A%20Missing%20Authorization%20in%20themearile%20Consultstreet&amp;severity=null&amp;id=68baeaa257c5b37b67a4602d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58812-cwe-79-improper-neutralization-of-i-01da5669</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PriceListo%20Best%20Restaurant%20Menu%20by%20PriceListo&amp;severity=null&amp;id=68baeaa257c5b37b67a4602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58811-cwe-79-improper-neutralization-of-i-e41346f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58811%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20CodeUs%20Ultimate%20Client%20Dash&amp;severity=null&amp;id=68baeaa257c5b37b67a46027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58810-cwe-79-improper-neutralization-of-i-2a094d29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58810%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jimmywb%20Simple%20Link%20List%20Widget&amp;severity=null&amp;id=68baeaa257c5b37b67a46024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58809-cwe-352-cross-site-request-forgery--7d41f643</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58809%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nick%20Ciske%20To%20Lead%20For%20Salesforce&amp;severity=null&amp;id=68baeaa257c5b37b67a46021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58808-cwe-79-improper-neutralization-of-i-6a5acd57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58808%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Babar%20prettyPhoto&amp;severity=null&amp;id=68baeaa257c5b37b67a4601e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58807-cwe-352-cross-site-request-forgery--59b30a38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58807%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dsingh%20Purge%20Varnish%20Cache&amp;severity=null&amp;id=68baeaa257c5b37b67a4601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58806-cwe-352-cross-site-request-forgery--2258fd4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58806%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tom%20Longridge%20WordPress%20Error%20Monitoring%20by%20Bugsnag&amp;severity=null&amp;id=68baeaa257c5b37b67a46018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58805-cwe-79-improper-neutralization-of-i-2ed7a7bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58805%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Widgetize%20Pages%20Light&amp;severity=null&amp;id=68baeaa257c5b37b67a45ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58804-cwe-352-cross-site-request-forgery--0441e470</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58804%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brijrajs%20WooCommerce%20Single%20Page%20Checkout&amp;severity=null&amp;id=68baeaa257c5b37b67a45ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58802-cwe-352-cross-site-request-forgery--b99bc336</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58802%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20michalzagdan%20TrustMate.io%20%E2%80%93%20WooCommerce%20integration&amp;severity=null&amp;id=68baeaa257c5b37b67a45ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58801-cwe-352-cross-site-request-forgery--67325b45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58801%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20KCS%20Responder&amp;severity=null&amp;id=68baeaa257c5b37b67a45ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58800-cwe-352-cross-site-request-forgery--472a200a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58800%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Steve%20Truman%20WP%20Email%20Template&amp;severity=null&amp;id=68baeaa157c5b37b67a45fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58799-cwe-352-cross-site-request-forgery--ded506bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58799%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themelocation%20Custom%20WooCommerce%20Checkout%20Fields%20Editor&amp;severity=null&amp;id=68baeaa157c5b37b67a45fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58798-cwe-352-cross-site-request-forgery--a5cee920</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58798%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bjorn%20Manintveld%20BCM%20Duplicate%20Menu&amp;severity=null&amp;id=68baeaa157c5b37b67a45fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58797-cwe-497-exposure-of-sensitive-syste-201512e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58797%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Mahmudul%20Hasan%20Arif%20Ninja%20Charts&amp;severity=null&amp;id=68baeaa157c5b37b67a45fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58796-cwe-79-improper-neutralization-of-i-bf9b378a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58796%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dudaster%20Elementor%20Element%20Condition&amp;severity=null&amp;id=68baeaa157c5b37b67a45fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58795-cwe-862-missing-authorization-in-pa-b4315df3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58795%3A%20CWE-862%20Missing%20Authorization%20in%20Payoneer%20Inc.%20Payoneer%20Checkout&amp;severity=medium&amp;id=68c7f891cb571854b09ee8bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58794-cwe-352-cross-site-request-forgery--0b017aa3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58794%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rainafarai%20Notification%20for%20Telegram&amp;severity=null&amp;id=68baeaa157c5b37b67a45fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58793-cwe-79-improper-neutralization-of-i-42f77ff4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58793%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPBean%20WPB%20Elementor%20Addons&amp;severity=null&amp;id=68baeaa157c5b37b67a45fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58792-cwe-352-cross-site-request-forgery--acdaa2ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58792%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPKube%20Authors%20List&amp;severity=null&amp;id=68baeaa157c5b37b67a45fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58791-cwe-79-improper-neutralization-of-i-4013af41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58791%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arjan%20Olsder%20SEO%20Auto%20Linker&amp;severity=null&amp;id=68baeaa157c5b37b67a45fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58790-cwe-79-improper-neutralization-of-i-40fe13f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58790%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPKube%20Kiwi&amp;severity=null&amp;id=68baeaa157c5b37b67a45fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58789-cwe-89-improper-neutralization-of-s-58e62031</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58789%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themeisle%20WP%20Full%20Stripe%20Free&amp;severity=null&amp;id=68baeaa157c5b37b67a45fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58788-cwe-89-improper-neutralization-of-s-9857a207</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58788%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Saad%20Iqbal%20License%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68baeaa157c5b37b67a45fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58787-cwe-79-improper-neutralization-of-i-70a036ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58787%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Popup&amp;severity=null&amp;id=68baeaa157c5b37b67a45faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58786-cwe-79-improper-neutralization-of-i-7b5153a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58786%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VW%20THEMES%20Ibtana%20%E2%80%93%20Ecommerce%20Product%20Addons&amp;severity=null&amp;id=68baeaa157c5b37b67a45fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58785-cwe-862-missing-authorization-in-jb-8cb1a4cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58785%3A%20Missing%20Authorization%20in%20Jiro%20Sasamoto%20Ray%20Enterprise%20Translation&amp;severity=null&amp;id=68baeaa157c5b37b67a45fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58784-cwe-79-improper-neutralization-of-i-2b9877c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58784%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arisoft%20ARI%20Fancy%20Lightbox&amp;severity=null&amp;id=68baeaa157c5b37b67a45fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8695-cwe-79-improper-neutralization-of-in-69ea8ddb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netcad%20NetGIS%20Server&amp;severity=medium&amp;id=68baeaa757c5b37b67a461ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intercepting-thick-client-tcp-and-tls-traffic-d6c6c1a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intercepting%20Thick%20Client%20TCP%20and%20TLS%20Traffic&amp;severity=medium&amp;id=68bae86b6e64aaa791c4cbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-exploit-grok-ai-with-video-ad-scam-to-pus-adbd8b74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Exploit%20Grok%20AI%20With%20Video%20Ad%20Scam%20to%20Push%20Malware%20on%20X&amp;severity=high&amp;id=68bad208a7e573575a7b2654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-botnet-emerges-from-the-shadows-nightshadec2-a5dd44c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Botnet%20Emerges%20from%20the%20Shadows%3A%20NightshadeC2&amp;severity=medium&amp;id=68baf67a04f80bd19b650c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chesscom-discloses-recent-data-breach-via-file-tra-1eddfc7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chess.com%20discloses%20recent%20data%20breach%20via%20file%20transfer%20app&amp;severity=high&amp;id=68baad096d016eb92d466a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frances-cnil-fined-google-379m-and-shein-175m-for--b3be80a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=France%E2%80%99s%20CNIL%20fined%20Google%20%24379M%20and%20Shein%20%24175M%20for%20breaching%20cookie%20rules&amp;severity=medium&amp;id=68baac4e0d09a87147b70cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58313-cwe-362-concurrent-execution-using--f089bf7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58313%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ba9a023d5df491ae76f9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58296-cwe-362-concurrent-execution-using--8e7d50c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58296%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ba9a023d5df491ae76f9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58281-cwe-125-out-of-bounds-read-in-huawe-5f8f5324</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58281%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68bae3f272cf923503aa9253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58280-cwe-1321-improperly-controlled-modi-d47c3e77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58280%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68bb425f535f4a97730e4948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58276-cwe-264-permissions-privileges-and--72c26cf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58276%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68bae6eb9bc4cbad54150dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48395-cwe-22-improper-limitation-of-a-pat-e5f21a71</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48395%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eaton%20NMC%20G2&amp;severity=medium&amp;id=68bae6eb9bc4cbad54150dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8944-cwe-863-incorrect-authorization-in-o-34416c56</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8944%3A%20CWE-863%20Incorrect%20Authorization%20in%20OceanWP&amp;severity=medium&amp;id=68bb0d9ee11b59d9ac04ed5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58400-unquoted-search-path-or-element-in--23563f1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58400%3A%20Unquoted%20search%20path%20or%20element%20in%20RATOC%20Systems%2C%20Inc.%20RATOC%20RAID%20Monitoring%20Manager%20for%20Windows&amp;severity=medium&amp;id=68bae925d59db91efd7c5081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41408-improper-authorization-in-handler-f-644802bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41408%3A%20Improper%20authorization%20in%20handler%20for%20custom%20URL%20scheme%20in%20LY%20Corporation%20%22Yahoo!%20Shopping%22%20App%20for%20Android&amp;severity=medium&amp;id=68baeaa857c5b37b67a4621f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55671-uncontrolled-search-path-element-in-e2090de2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55671%3A%20Uncontrolled%20Search%20Path%20Element%20in%20kujirahand%20TkEasyGUI&amp;severity=high&amp;id=68baeaa857c5b37b67a46222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55037-improper-neutralization-of-special--7262963e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55037%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kujirahand%20TkEasyGUI&amp;severity=critical&amp;id=68bafaea6a6383f5684f36aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58401-cleartext-storage-of-sensitive-info-5439eba7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58401%3A%20Cleartext%20storage%20of%20sensitive%20information%20in%20Pierre-Adrien%20Vasseur%20Obsidian%20GitHub%20Copilot%20Plugin&amp;severity=medium&amp;id=68ba6856fa81f142ed788962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8684-cwe-79-improper-neutralization-of-in-7604f291</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8684%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ux-themes%20Flatsome&amp;severity=medium&amp;id=68ba5af3917fe820479959c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7445-cwe-532-insertion-of-sensitive-infor-1253091c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7445%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Kubernetes%20secrets-store-sync-controller&amp;severity=medium&amp;id=68ba50c5884997992440222d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9990-cwe-98-improper-control-of-filename--fced1700</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9990%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20smackcoders%20WordPress%20Helpdesk%20Integration&amp;severity=high&amp;id=68ba50c58849979924402231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-05-703837cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-05&amp;severity=medium&amp;id=68bb7c68535f4a97731b7bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-widespread-data-theft-targets-salesforce-ins-4e44f211</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Widespread%20Data%20Theft%20Targets%20Salesforce%20Instances%20via%20Salesloft%20Drift&amp;severity=medium&amp;id=68bafb9b919d4c0e2d82ec6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58780-cwe-89-improper-neutralization-of-s-d222da4b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58780%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ScienceLogic%20SL1&amp;severity=high&amp;id=68baf466f95ed0f86c9048fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58362-cwe-706-use-of-incorrectly-resolved-4f6479d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58362%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20honojs%20hono&amp;severity=high&amp;id=68ba2a1988499799243e4010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58359-cwe-325-missing-cryptographic-step--ceeb54b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58359%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20ZcashFoundation%20frost&amp;severity=medium&amp;id=68bb0b63cc26dbd53247d4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-compromised-keys-to-phishing-campaigns-inside-6e9a14f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Compromised%20Keys%20to%20Phishing%20Campaigns%3A%20Inside%20a%20Cloud%20Email%20Service%20Takeover&amp;severity=medium&amp;id=68ba9e275dfe45ba5d8cf008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostredirector-poisons-windows-servers-backdoors--c8d3c8cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostRedirector%20poisons%20Windows%20servers%3A%20Backdoors%20with%20a%20side%20of%20Potatoes&amp;severity=medium&amp;id=68ba9edb7a8eab2bb04a595f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58179-cwe-918-server-side-request-forgery-4434b140</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58179%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=high&amp;id=68ba269488499799243e19b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58352-cwe-613-insufficient-session-expira-efd3438a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58352%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=68ba231188499799243e04ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55739-cwe-798-use-of-hard-coded-credentia-ae816c75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55739%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20FreePBX%20api&amp;severity=medium&amp;id=68ba231188499799243e04b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55241-cwe-287-improper-authentication-in--993fbfec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55241%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=68ba1f8f88499799243df764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55238-cwe-284-improper-access-control-in--091e6431</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55238%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Dynamics%20365%20FastTrack%20Implementation&amp;severity=high&amp;id=68ba1f8f88499799243df761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54914-cwe-284-improper-access-control-in--09f62958</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54914%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Networking&amp;severity=critical&amp;id=68ba1f8f88499799243df75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55242-cwe-200-exposure-of-sensitive-infor-127ec879</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55242%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Xbox%20Gaming%20Services&amp;severity=medium&amp;id=68ba1f8f88499799243df767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55244-cwe-284-improper-access-control-in--c2cb490e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55244%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Bot%20Service&amp;severity=critical&amp;id=68ba1f8f88499799243df76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55209-cwe-79-improper-neutralization-of-i-a4ae1447</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55209%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FreePBX%20contactmanager&amp;severity=medium&amp;id=68ba1c0988499799243de53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/manipulating-indias-stock-market-the-gst-portal-da-09b6a3f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Manipulating%20India%E2%80%99s%20Stock%20Market%3A%20The%20GST%20Portal%20Data%20Leak&amp;severity=medium&amp;id=68ba188b88499799243dd6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55190-cwe-200-exposure-of-sensitive-infor-c3aae4b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55190%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20argoproj%20argo-cd&amp;severity=critical&amp;id=68ba188588499799243dd6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt28-deploys-notdoor-backdoor-through-mic-b7914837</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT28%20Deploys%20%E2%80%9CNotDoor%E2%80%9D%20Backdoor%20Through%20Microsoft%20Outlook&amp;severity=medium&amp;id=68ba0a7488499799243d491d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/model-namespace-reuse-flaw-hijacks-ai-models-on-go-3d450592</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Model%20Namespace%20Reuse%22%20Flaw%20Hijacks%20AI%20Models%20on%20Google%20and%20Microsoft%20Platforms&amp;severity=medium&amp;id=68b9f55c88499799243cc417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58361-cwe-20-improper-input-validation-in-7fb39ceb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58361%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20MarceloTessaro%20promptcraft-forge-studio&amp;severity=critical&amp;id=68b9ee5588499799243cac32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32322-elevation-of-privilege-in-google-an-54fbb59f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32322%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ee5588499799243cac2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58353-cwe-79-improper-neutralization-of-i-736931e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58353%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MarceloTessaro%20promptcraft-forge-studio&amp;severity=high&amp;id=68b9ee5588499799243cac2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26439-elevation-of-privilege-in-google-an-b6314324</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26439%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ead188499799243c8789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26431-elevation-of-privilege-in-google-an-004ab372</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26431%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ead188499799243c8786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26419-elevation-of-privilege-in-google-an-6872372f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26419%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=low&amp;id=68b9ead188499799243c8783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22415-elevation-of-privilege-in-google-an-9c64818b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22415%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9ead188499799243c878f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22414-elevation-of-privilege-in-google-an-ebb25c43</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22414%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ead188499799243c878c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49731-elevation-of-privilege-in-google-an-1b0ebabc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49731%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69a0a1ce85912abc71d0be87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48581-elevation-of-privilege-in-google-an-a90e8ca0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48581%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc788499799243c3016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48563-elevation-of-privilege-in-google-an-4433dafd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48563%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc788499799243c3012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48562-information-disclosure-in-google-an-9251d3d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48562%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc788499799243c300e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48561-information-disclosure-in-google-an-843863b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48561%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc788499799243c300a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48560-information-disclosure-in-google-an-d02df97f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48560%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc788499799243c3006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48559-denial-of-service-in-google-android-47580209</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48559%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc788499799243c3002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48558-elevation-of-privilege-in-google-an-30e94229</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48558%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48556-elevation-of-privilege-in-google-an-d51af39a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48556%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48554-denial-of-service-in-google-android-e11717f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48554%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc688499799243c2fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48553-elevation-of-privilege-in-google-an-fdbe195d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48553%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48552-elevation-of-privilege-in-google-an-6ae80e2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48552%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48551-information-disclosure-in-google-an-69c51239</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48551%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc688499799243c2fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48550-denial-of-service-in-google-android-9764cf9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48550%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc688499799243c2fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48549-elevation-of-privilege-in-google-an-aff8e489</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48549%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48548-elevation-of-privilege-in-google-an-92e432f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48548%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48547-elevation-of-privilege-in-google-an-479f80ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48547%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48546-elevation-of-privilege-in-google-an-f0e68d8e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48546%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48545-information-disclosure-in-google-an-c0cecca5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48545%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48544-elevation-of-privilege-in-google-an-56b6b00e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48544%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48543-elevation-of-privilege-in-google-an-6a0dceb6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48543%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48542-denial-of-service-in-google-android-2da924fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48542%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc688499799243c2f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48541-elevation-of-privilege-in-google-an-f4e93848</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48541%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48540-elevation-of-privilege-in-google-an-56570f43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48540%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48539-remote-code-execution-in-google-and-e5992810</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48539%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48538-denial-of-service-in-google-android-ee843830</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48538%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc688499799243c2f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48537-information-disclosure-in-google-an-75f981ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48537%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48535-elevation-of-privilege-in-google-an-fb4d9342</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48535%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48534-denial-of-service-in-google-android-c1ed2e2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48534%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48532-elevation-of-privilege-in-google-an-54872bce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48532%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48531-elevation-of-privilege-in-google-an-acbf9567</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48531%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48529-information-disclosure-in-google-an-3aceb277</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48529%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48528-elevation-of-privilege-in-google-an-e47c9942</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48528%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48527-information-disclosure-in-google-an-2b41849e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48527%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48526-elevation-of-privilege-in-google-an-66f3890d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48526%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48524-denial-of-service-in-google-android-1f0e708b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48524%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48523-elevation-of-privilege-in-google-an-6dfc93e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48523%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48522-elevation-of-privilege-in-google-an-db8fd1cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48522%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32350-elevation-of-privilege-in-google-an-5ac72159</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32350%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32349-elevation-of-privilege-in-google-an-338a62fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32349%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32347-elevation-of-privilege-in-google-an-2754c4ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32347%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32346-elevation-of-privilege-in-google-an-61d17368</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32346%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32345-elevation-of-privilege-in-google-an-1e059a84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32345%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32333-elevation-of-privilege-in-google-an-f89fd941</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32333%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32332-unknown-in-google-android-38f21b75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32332%3A%20Unknown%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32331-elevation-of-privilege-in-google-an-1772eca7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32331%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32330-information-disclosure-in-google-an-7a74fa74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32330%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32327-elevation-of-privilege-in-google-an-2c02d5bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32327%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32326-elevation-of-privilege-in-google-an-241a270e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32326%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32325-elevation-of-privilege-in-google-an-679b891d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32325%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32324-elevation-of-privilege-in-google-an-ba801421</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32324%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32323-elevation-of-privilege-in-google-an-94b03085</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32323%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32321-elevation-of-privilege-in-google-an-22a07d2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32321%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26464-elevation-of-privilege-in-google-an-70c6c057</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26464%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26454-elevation-of-privilege-in-google-an-d82c5fcd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26454%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0089-elevation-of-privilege-in-google-and-f2fa1877</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0089%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0076-information-disclosure-in-google-and-709161d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0076%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=68b9dcc488499799243c2ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49714-elevation-of-privilege-in-google-an-18ffd434</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49714%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48533-elevation-of-privilege-in-google-an-9ccd9f77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48533%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc788499799243c301f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48530-remote-code-execution-in-google-and-47aebee0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48530%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc788499799243c301c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22441-elevation-of-privilege-in-google-an-3b6513db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22441%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc788499799243c3019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-analysis-of-the-amos-stealer-campaign-targeting-938b8125</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20Analysis%20of%20the%20AMOS%20Stealer%20Campaign%20Targeting%20macOS%20via%20&apos;Cracked&apos;%20Apps&amp;severity=medium&amp;id=68ba036c88499799243d2377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-interview-north-korean-threat-actors-re-eb95642f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Interview%20%7C%20North%20Korean%20Threat%20Actors%20Reveal%20Plans%20and%20Ops%20by%20Abusing%20Cyber%20Intel%20Platforms&amp;severity=medium&amp;id=68e15325ecbb611120a5605f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/subverting-code-integrity-checks-to-locally-backdo-18da0dce</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Subverting%20code%20integrity%20checks%20to%20locally%20backdoor%20Signal%2C%201Password%2C%20Slack%2C%20and%20more&amp;severity=medium&amp;id=68b9d25088499799243b66cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tire-giant-bridgestone-confirms-cyberattack-impact-79fb6aa2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tire%20giant%20Bridgestone%20confirms%20cyberattack%20impacts%20manufacturing&amp;severity=high&amp;id=68b9d23e88499799243b65fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tp-link-zero-day-surfaces-as-cisa-warns-other--41119cbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TP-Link%20zero-day%20surfaces%20as%20CISA%20warns%20other%20flaws%20are%20exploited&amp;severity=critical&amp;id=68b9d147f9dab285376f22c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32312-elevation-of-privilege-in-google-an-50bf866c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32312%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ccbad6fd7c5a76c5d8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26463-denial-of-service-in-google-android-bf03b266</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26463%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9ccbad6fd7c5a76c5d8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26462-elevation-of-privilege-in-google-an-8f10cfea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26462%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ccbad6fd7c5a76c5d8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26458-elevation-of-privilege-in-google-an-40ff622c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26458%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ccbad6fd7c5a76c5d8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26456-denial-of-service-in-google-android-107fa61e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26456%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9ccbad6fd7c5a76c5d8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26455-elevation-of-privilege-in-google-an-44573c85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26455%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ccbad6fd7c5a76c5d8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26453-information-disclosure-in-google-an-50402b60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26453%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9ccbad6fd7c5a76c5d89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26452-elevation-of-privilege-in-google-an-e74f1aae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26452%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ccbad6fd7c5a76c5d899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26450-elevation-of-privilege-in-google-an-ddf16317</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26450%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3bf88499799243bc1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26449-denial-of-service-in-google-android-8dc67a89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26449%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26448-information-disclosure-in-google-an-419984a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26448%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26445-information-disclosure-in-google-an-05427244</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26445%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26443-elevation-of-privilege-in-google-an-990a9e22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26443%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3bf88499799243bc1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26441-information-disclosure-in-google-an-060c51dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26441%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26437-information-disclosure-in-google-an-0dc5affe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26437%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3be88499799243bc18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26432-denial-of-service-in-google-android-92959440</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26432%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3be88499799243bc181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26444-elevation-of-privilege-in-google-an-8ef3f303</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26444%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3bf88499799243bc1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26442-information-disclosure-in-google-an-3962c09d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26442%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26440-elevation-of-privilege-in-google-an-97a520c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26440%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3be88499799243bc196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26438-elevation-of-privilege-in-google-an-2e9d1524</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26438%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3be88499799243bc192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26436-elevation-of-privilege-in-google-an-3529b1f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26436%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3be88499799243bc189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26435-elevation-of-privilege-in-google-an-500a8755</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26435%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3be88499799243bc185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26430-elevation-of-privilege-in-google-an-7bf559bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26430%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3be88499799243bc17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26429-denial-of-service-in-google-android-7a195eb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26429%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3be88499799243bc179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26428-elevation-of-privilege-in-google-an-d280145a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26428%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=low&amp;id=68b9d3be88499799243bc175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26427-elevation-of-privilege-in-google-an-982ad0eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26427%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3be88499799243bc170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26426-elevation-of-privilege-in-google-an-ae8c9ac8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26426%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26425-elevation-of-privilege-in-google-an-8d1162a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26425%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26424-information-disclosure-in-google-an-4381d841</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26424%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26423-elevation-of-privilege-in-google-an-399db0c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26423%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26422-elevation-of-privilege-in-google-an-bd58b85c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26422%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26421-elevation-of-privilege-in-google-an-06cf7aed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26421%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26420-elevation-of-privilege-in-google-an-1ee6a541</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26420%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22425-elevation-of-privilege-in-google-an-455b8c12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22425%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0087-elevation-of-privilege-in-google-and-4ad5911c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0087%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0077-elevation-of-privilege-in-google-and-00fd0596</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0077%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49739-elevation-of-privilege-in-google-an-2349160f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49739%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69a0a1ce85912abc71d0be8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9636-vulnerability-in-pgadminorg-pgadmin--6a4359d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9636%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=68b9c44a329bb27a4692c9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23262-cwe-863-incorrect-authorization-in--82526a50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23262%3A%20CWE-863%20Incorrect%20Authorization%20in%20NVIDIA%20ConnectX%20GA&amp;severity=medium&amp;id=68b9b71bd4970d57ae860d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23261-cwe-532-insertion-of-sensitive-info-912098fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23261%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20NVIDIA%20NVOS&amp;severity=medium&amp;id=68b9b71bd4970d57ae860d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23259-cwe-362-concurrent-execution-using--a6072994</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23259%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Mellanox%20DPDK%2022.11&amp;severity=medium&amp;id=68b9b65f14cfa2f169867da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23258-cwe-732-incorrect-permission-assign-695f1214</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23258%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20NVIDIA%20NVIDIA%20DOCA%20with%20collectx-dpeserver&amp;severity=high&amp;id=68b9b65f14cfa2f169867d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23257-cwe-732-incorrect-permission-assign-8c812290</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23257%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20NVIDIA%20NVIDIA%20DOCA%20with%20collectx-clxapidev&amp;severity=high&amp;id=68b9b65f14cfa2f169867d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23256-cwe-863-incorrect-authorization-in--b4c82519</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23256%3A%20CWE-863%20Incorrect%20Authorization%20in%20NVIDIA%20BlueField%20GA&amp;severity=high&amp;id=68b9b65f14cfa2f169867d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23302-cwe-1244-internal-asset-exposed-to--264217c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23302%3A%20CWE-1244%20Internal%20Asset%20Exposed%20to%20Unsafe%20Debug%20Access%20Level%20or%20State%20in%20NVIDIA%20HGX%2C%20DGX%20Hopper&amp;severity=medium&amp;id=68b9b65f14cfa2f169867da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23301-cwe-1244-internal-asset-exposed-to--a189a576</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23301%3A%20CWE-1244%20Internal%20Asset%20Exposed%20to%20Unsafe%20Debug%20Access%20Level%20or%20State%20in%20NVIDIA%20HGX%2C%20DGX%20Hopper&amp;severity=medium&amp;id=68b9b4c9eadac6644c66adeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25048-cwe-23-relative-path-traversal-in-i-2ae169c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25048%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20IBM%20Jazz%20Foundation&amp;severity=medium&amp;id=68b9ab85b757c88947999204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2667-cwe-497-exposure-of-sensitive-system-090c36ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2667%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=low&amp;id=68b9a6fddea7dd92b75def90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2694-cwe-79-improper-neutralization-of-in-cfb5b27b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=68b9a6fddea7dd92b75def93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6785-cwe-74-improper-neutralization-of-sp-d0510a60</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6785%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Tesla%20Model%203&amp;severity=medium&amp;id=68b9a281853c7233bf3749dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8311-cwe-89-improper-neutralization-of-sp-320ab272</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8311%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dotCMS%20dotCMS%20Cloud%20Services%20(dCS)&amp;severity=critical&amp;id=68b99f9af6759e9e78017a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-uses-windows-character-map-for-cryptom-9ec96765</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Uses%20Windows%20Character%20Map%20for%20Cryptomining&amp;severity=medium&amp;id=68b991edfed3536caf3428ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7388-cwe-77-in-progress-software-corporat-10c05ffc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7388%3A%20CWE-77%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=high&amp;id=68b98edd1baff54e4f42af0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7385-cwe-89-improper-neutralization-of-sp-7d78ae8d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7385%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Concept%20Intermedia%20GOV%20CMS&amp;severity=critical&amp;id=68b9835419f2aef16336f2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-lapsus-hunters-demand-google-fire-securi-25e18b28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Lapsus%24%20Hunters%20Demand%20Google%20Fire%20Security%20Experts%20or%20Face%20Data%20Leak&amp;severity=medium&amp;id=68b97cfaff9a251ac5d2100c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploit-development-for-ibm-i-turning-blind-as400--f69d0f41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploit%20development%20for%20IBM%20i%20-%20turning%20blind%20AS%2F400%20command%20execution%20into%20a%20proper%20shell&amp;severity=high&amp;id=68b97c2df6fca6bfbff9132b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41063-cwe-79-improper-neutralization-of-i-5b53776e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41062-cwe-79-improper-neutralization-of-i-15c53fc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41061-cwe-79-improper-neutralization-of-i-a12506b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41061%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41060-cwe-79-improper-neutralization-of-i-bedfb418</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41060%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41059-cwe-79-improper-neutralization-of-i-5febe7cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41058-cwe-79-improper-neutralization-of-i-d0333e99</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41057-cwe-79-improper-neutralization-of-i-cb08d14a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41056-cwe-79-improper-neutralization-of-i-07ec768a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41055-cwe-79-improper-neutralization-of-i-00da82a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41054-cwe-79-improper-neutralization-of-i-8a51f260</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f61f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41053-cwe-79-improper-neutralization-of-i-111d298b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41052-cwe-79-improper-neutralization-of-i-6123530a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41052%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41051-cwe-79-improper-neutralization-of-i-74fd372b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41051%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41050-cwe-79-improper-neutralization-of-i-dd2505a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41050%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41049-cwe-79-improper-neutralization-of-i-5884e4d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41049%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41048-cwe-79-improper-neutralization-of-i-21611148</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41047-cwe-79-improper-neutralization-of-i-0170c18e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41047%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41046-cwe-79-improper-neutralization-of-i-4db704e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41046%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41045-cwe-79-improper-neutralization-of-i-b0de846b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41044-cwe-79-improper-neutralization-of-i-f2140a7b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41043-cwe-79-improper-neutralization-of-i-d91dd235</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41042-cwe-79-improper-neutralization-of-i-a1fb814c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41042%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41041-cwe-79-improper-neutralization-of-i-c2331aac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41041%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41040-cwe-79-improper-neutralization-of-i-c1e92e2d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41039-cwe-79-improper-neutralization-of-i-df3b6e2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41038-cwe-79-improper-neutralization-of-i-c7f91682</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41038%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41037-cwe-79-improper-neutralization-of-i-2a4dcd42</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41037%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41036-cwe-79-improper-neutralization-of-i-57d06b7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41036%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41035-cwe-22-improper-limitation-of-a-pat-6904d0c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41035%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=high&amp;id=68b99f9af6759e9e78017a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41034-cwe-89-improper-neutralization-of-s-f4527ece</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41034%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=high&amp;id=68b9a281853c7233bf3749d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41033-cwe-89-improper-neutralization-of-s-b3e79c2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41033%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=high&amp;id=68b9a281853c7233bf3749d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41032-cwe-89-improper-neutralization-of-s-7536f44d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41032%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=high&amp;id=68b9a281853c7233bf3749d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-tp-link-wi-fi-and-whatsapp-spyware-flaws-a68f7ddc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20TP-Link%20Wi-Fi%20and%20WhatsApp%20Spyware%20Flaws%20to%20KEV%20List&amp;severity=medium&amp;id=68b9669723d09a4424475bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guide-pour-relayer-ntlm-sur-http-lexemple-de-glpi-e752fdc0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guide%20pour%20relayer%20NTLM%20sur%20HTTP%20-%20l&apos;exemple%20de%20GLPI&amp;severity=medium&amp;id=68b966f923d09a4424479575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-september-2025-android-security-update-fix-1013661e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google&apos;s%20September%202025%20Android%20Security%20Update%20Fixes%20120%20Vulnerabilities%2C%20Including%202%20Active%20Zero-Day%20Exploits&amp;severity=critical&amp;id=68b9669723d09a4424475bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/saas-giant-workiva-discloses-data-breach-after-sal-91fbd7b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SaaS%20giant%20Workiva%20discloses%20data%20breach%20after%20Salesforce%20attack&amp;severity=high&amp;id=68b9669723d09a4424475bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sues-robot-toy-maker-for-exposing-childrens-dat-50cf4c9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20sues%20robot%20toy%20maker%20for%20exposing%20children&apos;s%20data%20to%20Chinese%20devs&amp;severity=medium&amp;id=68b9669723d09a4424475bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-tp-link-archer-c7eu-and-tl-wr841n-fla-2695c3a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20TP-Link%20Archer%20C7(EU)%20and%20TL-WR841N%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68b9669723d09a4424475be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-barrelfire-targeting-kazakhstan-oil-gas-eab2ec3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20BarrelFire%3A%20Targeting%20Kazakhstan%20Oil%20%26%20Gas&amp;severity=medium&amp;id=68b9fff288499799243d1abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6085-cwe-434-unrestricted-upload-of-file--eb5efcb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6085%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20integromat%20Make%20Connector&amp;severity=high&amp;id=68b966f323d09a44244794b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9616-cwe-352-cross-site-request-forgery-c-a2119b82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9616%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alobaidi%20PopAd&amp;severity=medium&amp;id=68b966f323d09a44244794c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2411-cwe-307-improper-restriction-of-exce-62db17f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2411%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20TaskPano&amp;severity=high&amp;id=68b966f323d09a44244794c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6984-cwe-200-exposure-of-sensitive-inform-dd54047f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6984%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=high&amp;id=68b966f323d09a44244794c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2417-cwe-307-improper-restriction-of-exce-d129f608</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2417%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20e-Mutabakat&amp;severity=high&amp;id=68b966f323d09a44244794cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36887-elevation-of-privilege-in-google-an-44fb5a5f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36887%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b966f323d09a44244794cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56190-elevation-of-privilege-in-google-an-9c3e124f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56190%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a1ce85912abc71d0be93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36909-information-disclosure-in-google-an-fa69e709</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36909%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36908-elevation-of-privilege-in-google-an-8d98ee05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36908%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b994f6e06fce05ddc0580c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36907-elevation-of-privilege-in-google-an-83a46dba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36907%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b994f6e06fce05ddc05809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36906-elevation-of-privilege-in-google-an-3181ef44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36906%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3bf88499799243bc1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36905-elevation-of-privilege-in-google-an-dc3beae3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36905%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b99d8f2a7699688534ae15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36904-elevation-of-privilege-in-google-an-a06b59e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36904%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68b986c1a992e2db914fa0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36903-elevation-of-privilege-in-google-an-8a5354b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36903%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b99d8f2a7699688534ae12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36902-elevation-of-privilege-in-google-an-6b393639</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36902%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b99d8f2a7699688534ae0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36901-elevation-of-privilege-in-google-an-fcbe451a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36901%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b986c1a992e2db914fa0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36900-elevation-of-privilege-in-google-an-7c5108f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36900%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b99d8f2a7699688534ae0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36899-elevation-of-privilege-in-google-an-0e93e04b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36899%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b99d8f2a7699688534ae09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36898-elevation-of-privilege-in-google-an-09e57d49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36898%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b91d7ead5a09ad00021078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36897-remote-code-execution-in-google-and-03465245</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36897%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68b91d7ead5a09ad00021075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36896-elevation-of-privilege-in-google-an-c5d294fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36896%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68b986c1a992e2db914fa0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36895-information-disclosure-in-google-an-74a7fd0d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36895%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=68b91d7ead5a09ad00021072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36894-denial-of-service-in-google-android-084ca740</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36894%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=68b91d7ead5a09ad0002106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36893-information-disclosure-in-google-an-1be81398</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36893%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b91d7ead5a09ad0002106c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36892-denial-of-service-in-google-android-4734aac6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36892%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=68b91d7ead5a09ad00021069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36891-elevation-of-privilege-in-google-an-6785482d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36891%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b91d7ead5a09ad0002107e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36890-elevation-of-privilege-in-google-an-df05f614</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36890%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68b91d7ead5a09ad0002107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9519-cwe-94-improper-control-of-generatio-9f7d5c3b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9519%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kleor%20Easy%20Timer&amp;severity=high&amp;id=68b91670ad5a09ad00011cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9517-cwe-94-improper-control-of-generatio-3cb8e7e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9517%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20docjojo%20atec%20Debug&amp;severity=high&amp;id=68b91670ad5a09ad00011cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9516-cwe-36-absolute-path-traversal-in-do-cebe620a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9516%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20docjojo%20atec%20Debug&amp;severity=medium&amp;id=68b91670ad5a09ad00011ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9518-cwe-36-absolute-path-traversal-in-do-d9ba3f54</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9518%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20docjojo%20atec%20Debug&amp;severity=high&amp;id=68b91670ad5a09ad00011cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43772-cwe-400-uncontrolled-resource-consu-5a3832bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43772%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=68b8fa50ad5a09ad00fd449d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/not-safe-for-work-tracking-and-investigating-steal-9a6ddfe3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Not%20Safe%20for%20Work%3A%20Tracking%20and%20Investigating%20Stealerium%20and%20Phantom%20Infostealers&amp;severity=medium&amp;id=68b966f223d09a442447948f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ethereum-smart-contracts-used-to-push-malicious-co-2a676a60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ethereum%20smart%20contracts%20used%20to%20push%20malicious%20code%20on%20npm&amp;severity=medium&amp;id=68b966f223d09a4424479487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58358-cwe-77-improper-neutralization-of-s-e9ff11f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58358%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20zcaceres%20markdownify-mcp&amp;severity=high&amp;id=68b8e1b4ad5a09ad00fc4f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9942-unrestricted-upload-in-codeastro-rea-cbd4b16c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9942%3A%20Unrestricted%20Upload%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b8e1b4ad5a09ad00fc4f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9941-unrestricted-upload-in-codeastro-rea-39f6a65a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9941%3A%20Unrestricted%20Upload%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b8e1b4ad5a09ad00fc4f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58357-cwe-79-improper-neutralization-of-i-52bcd1ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58357%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=68b8e1b4ad5a09ad00fc4f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9940-cross-site-scripting-in-codeastro-re-81ad7c7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9940%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b8de39ad5a09ad00fc2504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9939-cross-site-scripting-in-codeastro-re-db986df6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9939%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b8de39ad5a09ad00fc24fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-04-12937d1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-04&amp;severity=medium&amp;id=68ba2a0b88499799243e3b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57576-na-0d168552</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57576%3A%20n%2Fa&amp;severity=medium&amp;id=68b9b65f14cfa2f169867dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57263-na-8919f2ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57263%3A%20n%2Fa&amp;severity=high&amp;id=68b994f6e06fce05ddc05806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58355-cwe-22-improper-limitation-of-a-pat-fcdacbe3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58355%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20charmbracelet%20soft-serve&amp;severity=high&amp;id=68b8d729ad5a09ad00fbecad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9938-stack-based-buffer-overflow-in-d-lin-3834edb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9938%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8400&amp;severity=high&amp;id=68b8d3a4ad5a09ad00fbd95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9937-improper-authorization-in-elunez-ela-7acfb000</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9937%3A%20Improper%20Authorization%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68b8d3a4ad5a09ad00fbd959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9936-improper-authorization-in-fuyanglipe-1f284d03</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9936%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68b8cc9dad5a09ad00fba05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9935-command-injection-in-totolink-n600r-3054328a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9935%3A%20Command%20Injection%20in%20TOTOLINK%20N600R&amp;severity=medium&amp;id=68b8cc9dad5a09ad00fba057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9934-command-injection-in-totolink-x5000r-632642cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9934%3A%20Command%20Injection%20in%20TOTOLINK%20X5000R&amp;severity=medium&amp;id=68b8c594ad5a09ad00fb5cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9933-sql-injection-in-phpgurukul-beauty-p-c41adae7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9933%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b8c594ad5a09ad00fb5cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58064-cwe-79-improper-neutralization-of-i-cdca5f26</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58064%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ckeditor%20ckeditor5&amp;severity=low&amp;id=68b8be8cad5a09ad00fb1d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9932-sql-injection-in-phpgurukul-beauty-p-eb2e6710</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9932%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b8be8cad5a09ad00fb1d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9931-cross-site-scripting-in-jinher-oa-6e0500b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9931%3A%20Cross%20Site%20Scripting%20in%20Jinher%20OA&amp;severity=medium&amp;id=68b8be8cad5a09ad00fb1d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-cyberattack-disrupts-production--5a5dff85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20Cyberattack%20Disrupts%20Production%20and%20Sales%20Operations&amp;severity=medium&amp;id=68b8bb07ad5a09ad00faffd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-new-hexstrike-ai-tool-to-rapidly-explo-b5568238</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20use%20new%20HexStrike-AI%20tool%20to%20rapidly%20exploit%20n-day%20flaws&amp;severity=high&amp;id=68b8b784ad5a09ad00fae4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9930-sql-injection-in-1000projects-beauty-b67e0507</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9930%3A%20SQL%20Injection%20in%201000projects%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b8b794ad5a09ad00fae54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9929-cross-site-scripting-in-code-project-fdeaf577</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9929%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Responsive%20Blog%20Site&amp;severity=medium&amp;id=68b8b794ad5a09ad00fae544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9928-sql-injection-in-projectworlds-trave-62f6e7d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9928%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=68b8b07bad5a09ad00faaa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9927-sql-injection-in-projectworlds-trave-14fccb48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9927%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=68b8a974ad5a09ad00fa4b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8268-cwe-862-missing-authorization-in-tig-db564ed4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8268%3A%20CWE-862%20Missing%20Authorization%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=medium&amp;id=68b8a5f1ad5a09ad00fa3003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55748-cwe-23-relative-path-traversal-in-x-7dcdaae6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55748%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=68b8a5f1ad5a09ad00fa300e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55747-cwe-23-relative-path-traversal-in-x-e2e50657</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55747%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=68b8a5f1ad5a09ad00fa3009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-campaign-discovered-via-manualfinder-149aba98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20malware%20campaign%20discovered%20via%20ManualFinder&amp;severity=medium&amp;id=68b8a26bad5a09ad00fa1283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53690-cwe-502-deserialization-of-untruste-47560685</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53690%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=critical&amp;id=68b8a26cad5a09ad00fa1530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9926-sql-injection-in-projectworlds-trave-9fcf6514</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9926%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=68b8a26cad5a09ad00fa1534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55162-cwe-613-insufficient-session-expira-a20d1661</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55162%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=68b89ee9ad5a09ad00f9f229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9365-cwe-502-deserialization-of-untrusted-14949b16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9365%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Fuji%20Electric%20FRENIC-Loader%204&amp;severity=high&amp;id=68b89b64ad5a09ad00f9d120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9925-sql-injection-in-projectworlds-trave-33578a8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9925%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=68b89b64ad5a09ad00f9d124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36193-cwe-732-incorrect-permission-assign-5f878875</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36193%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Transformation%20Advisor&amp;severity=high&amp;id=68b8945dad5a09ad00f99e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9924-sql-injection-in-projectworlds-trave-72b09527</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9924%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=68b88d54ad5a09ad00f963a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9923-cross-site-scripting-in-campcodes-sa-cd3b569d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9923%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68b88d54ad5a09ad00f9639e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20328-improper-neutralization-of-input-du-1133ce5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20328%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20291-url-redirection-to-untrusted-site-o-2e66bb46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20291%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20335-improper-access-control-in-cisco-ci-ceff24d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20335%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Session%20Initiation%20Protocol%20(SIP)%20Software&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20336-exposure-of-sensitive-information-t-54df5328</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20336%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Session%20Initiation%20Protocol%20(SIP)%20Software&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20330-improper-neutralization-of-input-du-7c170c2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20330%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager%20IM%20and%20Presence%20Service&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20280-improper-neutralization-of-input-du-23db35f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20280%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20326-cross-site-request-forgery-csrf-in--8cd32586</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20326%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20287-unrestricted-upload-of-file-with-da-413870ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20287%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20270-exposure-of-sensitive-information-t-cc5c6325</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20270%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tax-refund-scam-targets-californians-fd03eed5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tax%20refund%20scam%20targets%20Californians&amp;severity=medium&amp;id=68b89ee7ad5a09ad00f9f19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-campaign-targeting-diplomatic-assets-15779dc4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Campaign%20Targeting%20Diplomatic%20Assets&amp;severity=medium&amp;id=68b89ee7ad5a09ad00f9f1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dire-wolf-ransomware-threat-combining-data-encrypt-eae6dcfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dire%20Wolf%20Ransomware%3A%20Threat%20Combining%20Data%20Encryption%20and%20Leak%20Extortion&amp;severity=medium&amp;id=68b89ee7ad5a09ad00f9f1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-notdoor-inside-apt28s-expanding-arsenal-4fba4913</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20NotDoor%3A%20Inside%20APT28&apos;s%20Expanding%20Arsenal&amp;severity=medium&amp;id=68b89b64ad5a09ad00f9d0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9922-cross-site-scripting-in-campcodes-sa-7d76d6bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9922%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68b8783dad5a09ad00f89f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9921-cross-site-scripting-in-code-project-b111a4e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9921%3A%20Cross%20Site%20Scripting%20in%20code-projects%20POS%20Pharmacy%20System&amp;severity=medium&amp;id=68b8783dad5a09ad00f89f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9959-cwe-94-improper-control-of-generatio-72638d8b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9959%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=68b87504ad5a09ad00f87cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-influence-assets-converge-on-moldovan-elec-fb8ba39f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Influence%20Assets%20Converge%20on%20Moldovan%20Elections&amp;severity=medium&amp;id=68b89b64ad5a09ad00f9d0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-exploit-100-embassy-email-accounts-12d82897</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Exploit%20100%2B%20Embassy%20Email%20Accounts%20in%20Global%20Phishing%20Targeting%20Diplomats&amp;severity=high&amp;id=68b874b7ad5a09ad00f87b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disney-to-pay-10m-to-settle-claims-it-collected-ki-2d93a03f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disney%20to%20pay%20%2410M%20to%20settle%20claims%20it%20collected%20kids%E2%80%99%20data%20on%20YouTube&amp;severity=high&amp;id=68b874b7ad5a09ad00f87b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-fixes-actively-exploited-android-flaws-in-s-fd7d5811</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20fixes%20actively%20exploited%20Android%20flaws%20in%20September%20update&amp;severity=high&amp;id=68b874b7ad5a09ad00f87b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-exploit-ethereum-smart-cont-51d4a962</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20Packages%20Exploit%20Ethereum%20Smart%20Contracts&amp;severity=high&amp;id=68b874b7ad5a09ad00f87b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-grab-130m-using-brazils-real-time-payment--1b1adb03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Grab%20%24130M%20Using%20Brazil&apos;s%20Real-Time%20Payment%20System&amp;severity=medium&amp;id=68b874b7ad5a09ad00f87b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9867-inappropriate-implementation-in-goog-3e16b054</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9867%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68b86daead5a09ad00f83492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9866-inappropriate-implementation-in-goog-904435f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9866%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=68b86daead5a09ad00f8348e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9865-inappropriate-implementation-in-goog-05006104</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9865%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68b86daead5a09ad00f8348a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9864-use-after-free-in-google-chrome-623e3126</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9864&amp;severity=null&amp;id=68b86daead5a09ad00f83486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9920-file-inclusion-in-campcodes-recruitm-47b7c3a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9920%3A%20File%20Inclusion%20in%20Campcodes%20Recruitment%20Management%20System&amp;severity=medium&amp;id=68b86a2aad5a09ad00f81b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9919-sql-injection-in-1000projects-beauty-25452697</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9919%3A%20SQL%20Injection%20in%201000projects%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b86a2aad5a09ad00f81b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-mitigates-largest-ever-recorded-ddos-at-8bc4df29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Mitigates%20Largest%20Ever%20Recorded%20DDoS%20Attack%20at%2011.5%20Tbps&amp;severity=medium&amp;id=68b86322ad5a09ad00f7d731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-salesforce-breach-a-deep-dive-into-the-chai-094c2681</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Salesforce%20Breach%3A%20A%20Deep%20dive%20into%20the%20chain%20and%20extent%20of%20the%20compromise&amp;severity=medium&amp;id=68b8a26bad5a09ad00fa1350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0280-cwe-257-storing-passwords-in-a-recov-680a6743</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0280%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20HCL%20Software%20Compass&amp;severity=high&amp;id=68b85f9fad5a09ad00f7a481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58460-vulnerability-in-jenkins-project-je-6ea5f0de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58460%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20OpenTelemetry%20Plugin&amp;severity=medium&amp;id=68b85c1aad5a09ad00f7780e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58459-vulnerability-in-jenkins-project-je-300a5c6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58459%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20global-build-stats%20Plugin&amp;severity=medium&amp;id=68b85c1aad5a09ad00f7780b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58458-vulnerability-in-jenkins-project-je-92d05090</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58458%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Git%20client%20Plugin&amp;severity=medium&amp;id=68b85c1aad5a09ad00f77808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58644-cwe-502-deserialization-of-untruste-0cc5f55b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58644%3A%20Deserialization%20of%20Untrusted%20Data%20in%20enituretechnology%20LTL%20Freight%20Quotes%20-%20TQL%20Edition&amp;severity=null&amp;id=68b85518ad5a09ad00f71ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58643-cwe-502-deserialization-of-untruste-3e1aadd0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58643%3A%20Deserialization%20of%20Untrusted%20Data%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Daylight%20Edition&amp;severity=null&amp;id=68b85518ad5a09ad00f71edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58642-cwe-502-deserialization-of-untruste-245cd328</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58642%3A%20Deserialization%20of%20Untrusted%20Data%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Day%20%26%20Ross%20Edition&amp;severity=null&amp;id=68b85518ad5a09ad00f71ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58641-cwe-918-server-side-request-forgery-da6d6af0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58641%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kamleshyadav%20Exit%20Intent%20Popup&amp;severity=null&amp;id=68b85518ad5a09ad00f71ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58640-cwe-79-improper-neutralization-of-i-bbb97078</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58640%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MatrixAddons%20Document%20Engine&amp;severity=null&amp;id=68b85517ad5a09ad00f71ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58639-cwe-862-missing-authorization-in-al-d16fe3b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58639%3A%20Missing%20Authorization%20in%20Ali%20Khallad%20Contact%20Form%20By%20Mega%20Forms&amp;severity=null&amp;id=68b85517ad5a09ad00f71ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58637-cwe-98-improper-control-of-filename-eea03226</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58637%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20immonex%20immonex%20Kickstart&amp;severity=null&amp;id=68b85517ad5a09ad00f71eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58635-cwe-862-missing-authorization-in-pa-ac46515f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58635%3A%20Missing%20Authorization%20in%20DevItems%20Support%20Genix&amp;severity=null&amp;id=68b85517ad5a09ad00f71eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58634-cwe-862-missing-authorization-in-pe-209a85e8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58634%3A%20Missing%20Authorization%20in%20peachpay%20PeachPay%20Payments&amp;severity=null&amp;id=68b85517ad5a09ad00f71eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58633-cwe-79-improper-neutralization-of-i-f1482187</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58633%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Deetronix%20Booking%20Ultra%20Pro&amp;severity=null&amp;id=68b85517ad5a09ad00f71eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58632-cwe-79-improper-neutralization-of-i-225ba5a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dadevarzan%20Dadevarzan%20WordPress%20Common&amp;severity=null&amp;id=68b85517ad5a09ad00f71eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58631-cwe-79-improper-neutralization-of-i-2b9a445d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZEEN101%20IssueM&amp;severity=null&amp;id=68b85517ad5a09ad00f71eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58630-cwe-79-improper-neutralization-of-i-9dbffcb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rbaer%20Simple%20Matomo%20Tracking%20Code&amp;severity=null&amp;id=68b85517ad5a09ad00f71ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58626-cwe-79-improper-neutralization-of-i-e14a1c7e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RumbleTalk%20RumbleTalk%20Live%20Group%20Chat&amp;severity=null&amp;id=68b85517ad5a09ad00f71ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58625-cwe-79-improper-neutralization-of-i-57f0b37c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spiffy%20Plugins%20WP%20Flow%20Plus&amp;severity=null&amp;id=68b85517ad5a09ad00f71e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58624-cwe-79-improper-neutralization-of-i-ea2b2086</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falselight%20Exchange%20Rates&amp;severity=null&amp;id=68b85517ad5a09ad00f71e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58623-cwe-79-improper-neutralization-of-i-c8db2cd2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bohemia%20Plugins%20Event%20Feed%20for%20Eventbrite&amp;severity=null&amp;id=68b85517ad5a09ad00f71e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58622-cwe-862-missing-authorization-in-yy-1080bdae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58622%3A%20Missing%20Authorization%20in%20yydevelopment%20Mobile%20Contact%20Line&amp;severity=null&amp;id=68b85517ad5a09ad00f71e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58621-cwe-79-improper-neutralization-of-i-95f1f595</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amuse%20Labs%20PuzzleMe%20for%20WordPress&amp;severity=null&amp;id=68b85517ad5a09ad00f71e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58620-cwe-79-improper-neutralization-of-i-cdab5de2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=null&amp;id=68b85517ad5a09ad00f71e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58618-cwe-79-improper-neutralization-of-i-9ba684ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58618%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonathan%20Jernigan%20Pie%20Calendar&amp;severity=null&amp;id=68b85517ad5a09ad00f71e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58617-cwe-862-missing-authorization-in-fa-fd6c7ae2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58617%3A%20Missing%20Authorization%20in%20FAKTOR%20VIER%20F4%20Media%20Taxonomies&amp;severity=null&amp;id=68b85517ad5a09ad00f71e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58616-cwe-862-missing-authorization-in-fr-0c40d32c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58616%3A%20Missing%20Authorization%20in%20Frisbii%20Frisbii%20Pay&amp;severity=null&amp;id=68b85517ad5a09ad00f71e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58615-cwe-918-server-side-request-forgery-38a363f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58615%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gfazioli%20WP%20Bannerize%20Pro&amp;severity=null&amp;id=68b85517ad5a09ad00f71e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58614-cwe-79-improper-neutralization-of-i-5fe8106e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jamel.Z%20Tooltipy&amp;severity=null&amp;id=68b85516ad5a09ad00f71e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58613-cwe-862-missing-authorization-in-ba-eba300df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58613%3A%20Missing%20Authorization%20in%20Barn2%20Plugins%20Posts%20Table%20with%20Search%20%26%20Sort&amp;severity=null&amp;id=68b85516ad5a09ad00f71e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58612-cwe-79-improper-neutralization-of-i-1b868a25</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58612%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Property%20Hive%20PropertyHive&amp;severity=null&amp;id=68b85516ad5a09ad00f71e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58610-cwe-79-improper-neutralization-of-i-6393771d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Gallery%20PhotoBlocks&amp;severity=null&amp;id=68b85516ad5a09ad00f71e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58609-cwe-79-improper-neutralization-of-i-af4d86e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58609%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Iulia%20Cazan%20Latest%20Post%20Shortcode&amp;severity=null&amp;id=68b85516ad5a09ad00f71e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58608-cwe-98-improper-control-of-filename-b6247877</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58608%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BuddyDev%20MediaPress&amp;severity=null&amp;id=68b85516ad5a09ad00f71e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58607-cwe-79-improper-neutralization-of-i-83a87955</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GDPR%20Info%20Cookie%20Notice%20%26amp%3B%20Consent%20Banner%20for%20GDPR%20%26amp%3B%20CCPA%20Compliance&amp;severity=null&amp;id=68b85516ad5a09ad00f71e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58606-cwe-862-missing-authorization-in-co-ed741e51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58606%3A%20Missing%20Authorization%20in%20cozythemes%20SaasLauncher&amp;severity=null&amp;id=68b85516ad5a09ad00f71e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58604-cwe-89-improper-neutralization-of-s-6170f70d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58604%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFunnels%20Mail%20Mint&amp;severity=null&amp;id=68b85516ad5a09ad00f71e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58602-cwe-79-improper-neutralization-of-i-508fba69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58602%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20If-So%20Dynamic%20Content%20If-So%20Dynamic%20Content%20Personalization&amp;severity=null&amp;id=68b85516ad5a09ad00f71e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58601-cwe-862-missing-authorization-in-ra-8acd904a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58601%3A%20Missing%20Authorization%20in%20RadiusTheme%20Classified%20Listing&amp;severity=null&amp;id=68b85515ad5a09ad00f71e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58600-cwe-862-missing-authorization-in-co-06db41f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58600%3A%20Missing%20Authorization%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=null&amp;id=68b85515ad5a09ad00f71e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58599-cwe-862-missing-authorization-in-ty-316c479b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58599%3A%20Missing%20Authorization%20in%20tychesoftwares%20Order%20Delivery%20Date%20for%20WooCommerce&amp;severity=null&amp;id=68b85515ad5a09ad00f71e2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58598-cwe-215-insertion-of-sensitive-info-284cbe91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58598%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20Klarna%20Klarna%20Order%20Management%20for%20WooCommerce&amp;severity=null&amp;id=68b85515ad5a09ad00f71e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58597-cwe-639-authorization-bypass-throug-d652429d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58597%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tomdever%20wpForo%20Forum&amp;severity=null&amp;id=68b85515ad5a09ad00f71e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58596-cwe-79-improper-neutralization-of-i-668b173e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58596%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20properfraction%20MailOptin&amp;severity=null&amp;id=68b85515ad5a09ad00f71e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58594-cwe-862-missing-authorization-in-th-07f1c951</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58594%3A%20Missing%20Authorization%20in%20themefusecom%20Brizy&amp;severity=null&amp;id=68b85515ad5a09ad00f71e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58593-cwe-79-improper-neutralization-of-i-fc20ab65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=null&amp;id=68b85515ad5a09ad00f71e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inline-style-exfiltration-leaking-data-with-chaine-19d2176e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inline%20Style%20Exfiltration%3A%20leaking%20data%20with%20chained%20CSS%20conditionals&amp;severity=medium&amp;id=68b84a8cad5a09ad00f67903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marshal-madness-a-brief-history-of-ruby-deserializ-264da81a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marshal%20madness%3A%20A%20brief%20history%20of%20Ruby%20deserialization%20exploits&amp;severity=medium&amp;id=68b84a8cad5a09ad00f678ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47421-cwe-88-improper-neutralization-of-a-c0d49699</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47421%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20CRESTRON%20TOUCHSCREENS%20x70&amp;severity=high&amp;id=68b84a86ad5a09ad00f67896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2416-cwe-307-improper-restriction-of-exce-599fe4ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2416%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20LimonDesk&amp;severity=high&amp;id=68b84702ad5a09ad00f6511b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0878-cwe-79-improper-neutralization-of-in-c0cc004b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Akinsoft%20LimonDesk&amp;severity=medium&amp;id=68b8437ead5a09ad00f6166b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-they-got-in-davitas-data-breach-db7c8773</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20They%20Got%20In%20%E2%80%94%20DaVita%E2%80%99s%20Data%20Breach&amp;severity=high&amp;id=68b84029ad5a09ad00f5f8cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3701-cwe-862-missing-authorization-in-mal-5a3e5737</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3701%3A%20Missing%20Authorization%20in%20Malcure%20Web%20Security%20Malcure%20Malware%20Scanner&amp;severity=null&amp;id=68b83ffbad5a09ad00f5f824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53691-cwe-502-deserialization-of-untruste-80089fb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53691%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=high&amp;id=68b83c77ad5a09ad00f5b6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53693-cwe-470-use-of-externally-controlle-b1f42ad7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53693%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Sitecore%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=critical&amp;id=68b83c77ad5a09ad00f5b6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53694-cwe-200-exposure-of-sensitive-infor-7009b42b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53694%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Sitecore%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=high&amp;id=68b83c77ad5a09ad00f5b6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9901-use-of-cache-containing-sensitive-in-fdcfbf84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9901%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=68b83c77ad5a09ad00f5b700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/misconfigured-server-leaks-378-gb-of-navy-federal--61e6702c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Misconfigured%20Server%20Leaks%20378%20GB%20of%20Navy%20Federal%20Credit%20Union%20Backup%20Files&amp;severity=medium&amp;id=68b82056ad5a09ad00f41dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/secondary-context-path-traversal-in-omnissa-worksp-20600b9b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Secondary%20Context%20Path%20Traversal%20in%20Omnissa%20Workspace%20ONE%20UEM&amp;severity=medium&amp;id=68b81cd6ad5a09ad00f3c938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-anydesk-installer-spreads-metastealer-malware-afbae615</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20AnyDesk%20Installer%20Spreads%20MetaStealer%20Malware%20Through%20ClickFix%20Scam&amp;severity=medium&amp;id=68b81247ad5a09ad00f2617e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-cyberattack-2025-what-happened-a-f8b18194</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20Cyberattack%202025%3A%20What%20Happened%20and%20Its%20Impact&amp;severity=medium&amp;id=68b81247ad5a09ad00f2617a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43166-cwe-276-incorrect-default-permissio-441db30f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43166%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=critical&amp;id=690a6f059e609817bf702efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2415-cwe-307-improper-restriction-of-exce-91ae8b19</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2415%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20MyRezzta&amp;severity=high&amp;id=68b80438ad5a09ad00f096c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1740-cwe-307-improper-restriction-of-exce-baa338ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1740%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20MyRezzta&amp;severity=critical&amp;id=68b80438ad5a09ad00f096c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43115-cwe-20-improper-input-validation-in-feb6b99d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43115%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=high&amp;id=690a6f039e609817bf702c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9219-cwe-862-missing-authorization-in-saa-7de0a93f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9219%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=medium&amp;id=68b800b3ad5a09ad00f032bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9817-cwe-476-null-pointer-dereference-in--521cbb4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9817%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=68b7f2a3ad5a09ad00ef72bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anti-patterns-and-patterns-for-achieving-secure-ge-7c80ff8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=anti-patterns%20and%20patterns%20for%20achieving%20secure%20generation%20of%20code%20via%20AI&amp;severity=medium&amp;id=68b7ef23ad5a09ad00ef4ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8663-cwe-532-insertion-of-sensitive-infor-1b12ada8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8663%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20upKeeper%20Solutions%20upKeeper%20Manager&amp;severity=high&amp;id=68b7eb9cad5a09ad00eeec3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58210-cwe-862-missing-authorization-in-th-f8c98fbd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58210%3A%20Missing%20Authorization%20in%20ThemeMove%20Makeaholic&amp;severity=null&amp;id=68b7e818ad5a09ad00eec202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32444-incorrect-privilege-assignment-in-i-9a4c0601</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32444%3A%20Incorrect%20Privilege%20Assignment%20in%20InspiryThemes%20RealHomes&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9378-cwe-79-improper-neutralization-of-in-4f06094f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehunk%20Vayu%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=medium&amp;id=68b7e818ad5a09ad00eec205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21041-cwe-922-insecure-storage-of-sensiti-4236ea8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21041%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Secure%20Folder&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21040-cwe-925-improper-verification-of-in-4e872403</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21040%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20S%20Assistant&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21039-cwe-925-improper-verification-of-in-0f9c3f6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21039%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20S%20Assistant&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21038-cwe-925-improper-verification-of-in-5d7ffdae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21038%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20S%20Assistant&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21037-cwe-284-improper-access-control-in--3d18ab78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21037%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20SamsungNotes&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21036-cwe-927-use-of-implicit-intent-for--5c3b195d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21036%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21035-cwe-284-improper-access-control-in--a8046aea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21035%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Calendar&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21034-cwe-787-out-of-bounds-write-in-sams-94f2c016</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21034%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21033-cwe-284-improper-access-control-in--a1b0d0ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21033%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21032-cwe-284-improper-access-control-in--a789e751</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21032%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21031-cwe-284-improper-access-control-in--872bbc50</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21031%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21030-cwe-280-improper-handling-of-insuff-eae5e6ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21030%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21029-cwe-280-improper-handling-of-insuff-540e9f0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21029%3A%20CWE-280%3A%20Improper%20handling%20of%20insufficient%20permission%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21028-cwe-269-improper-privilege-manageme-7f6ab935</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21028%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21027-cwe-925-improper-verification-of-in-42a91ba5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21027%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21026-cwe-280-improper-handling-of-insuff-14edaef0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21026%3A%20CWE-280%3A%20Improper%20handling%20of%20insufficient%20permission%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21025-cwe-284-improper-access-control-in--f9c1be52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21025%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-rapperbot-botnet-from-infection-to-ddos-4549c31d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20RapperBot%20Botnet%3A%20From%20Infection%20to%20DDoS%20%26%20More&amp;severity=medium&amp;id=68b7dd8dad5a09ad00edd125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unveiling-a-python-stealer-inf0s3c-stealer-26daa38c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNVEILING%20A%20PYTHON%20STEALER%20%E2%80%93%20INF0S3C%20STEALER&amp;severity=medium&amp;id=68b7dd8dad5a09ad00edd121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58272-cross-site-request-forgery-csrf-in--88c246f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58272%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20NTT%20EAST%2C%20Inc.%20Web%20Caster%20V130&amp;severity=low&amp;id=68b7d300ad5a09ad00ed52c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9785-cwe-295-improper-certificate-validat-299c4090</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9785%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20PaperCut%20Print%20Deploy&amp;severity=high&amp;id=68b7c4efad5a09ad00ec9825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58176-cwe-94-improper-control-of-generati-617c0385</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58176%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenAgentPlatform%20Dive&amp;severity=high&amp;id=68b7bde8ad5a09ad00ec5b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7039-improper-limitation-of-a-pathname-to-45184f19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7039%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=68b7a54cad5a09ad00eb4451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58163-cwe-502-deserialization-of-untruste-de81b009</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58163%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=68b79e44ad5a09ad00eb0921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9848-execution-after-redirect-in-scriptan-6dcafccd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9848%3A%20Execution%20After%20Redirect%20in%20ScriptAndTools%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b79e44ad5a09ad00eb092c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9847-unrestricted-upload-in-scriptandtool-a01ab1d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9847%3A%20Unrestricted%20Upload%20in%20ScriptAndTools%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b79e44ad5a09ad00eb0926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57806-cwe-312-cleartext-storage-of-sensit-c26c156c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57806%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20LearningCircuit%20local-deep-research&amp;severity=medium&amp;id=68b793b8ad5a09ad00ea85dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9845-cross-site-scripting-in-code-project-fe597d42</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9845%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Fruit%20Shop%20Management%20System&amp;severity=medium&amp;id=68b79034ad5a09ad00ea404a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9843-information-disclosure-in-das-parkin-77a9fe58</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9843%3A%20Information%20Disclosure%20in%20Das%20Parking%20Management%20System%20%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68b79034ad5a09ad00ea4044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9842-information-disclosure-in-das-parkin-73613f73</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9842%3A%20Information%20Disclosure%20in%20Das%20Parking%20Management%20System%20%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68b7892dad5a09ad00e9da2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-03-549a7bf1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-03&amp;severity=medium&amp;id=68b8da9ead5a09ad00fc03b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57833-cwe-89-improper-neutralization-of-s-3ac921f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57833%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=high&amp;id=68b8a5f1ad5a09ad00fa3013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56139-na-21a40553</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56139%3A%20n%2Fa&amp;severity=medium&amp;id=68b8945dad5a09ad00f99e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57052-na-bfd6a96c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57052%3A%20n%2Fa&amp;severity=critical&amp;id=68b87f45ad5a09ad00f8f374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56803-na-448cf57a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56803%3A%20n%2Fa&amp;severity=high&amp;id=68b87bc1ad5a09ad00f8da3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57147-na-3521c6be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57147%3A%20n%2Fa&amp;severity=high&amp;id=68b87bc1ad5a09ad00f8da3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56752-na-3e240c8b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56752%3A%20n%2Fa&amp;severity=critical&amp;id=68b87bc1ad5a09ad00f8da37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52494-na-2f882dac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52494%3A%20n%2Fa&amp;severity=high&amp;id=68b87bc1ad5a09ad00f8da33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45805-na-7ba9aefd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45805%3A%20n%2Fa&amp;severity=high&amp;id=68b87bc1ad5a09ad00f8da2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56689-na-af1104cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56689%3A%20n%2Fa&amp;severity=medium&amp;id=68b8783dad5a09ad00f89f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56761-na-df8754fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56761%3A%20n%2Fa&amp;severity=medium&amp;id=68b87504ad5a09ad00f87cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56760-na-935dd764</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56760%3A%20n%2Fa&amp;severity=medium&amp;id=68b87504ad5a09ad00f87cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56498-na-51bebda3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56498%3A%20n%2Fa&amp;severity=medium&amp;id=68b86330ad5a09ad00f7d7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55944-na-d3cc8f52</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55944%3A%20n%2Fa&amp;severity=medium&amp;id=68b85f9fad5a09ad00f7a48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55852-na-e4d5c909</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55852%3A%20n%2Fa&amp;severity=high&amp;id=68b85f9fad5a09ad00f7a487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56435-na-ea89348f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56435%3A%20n%2Fa&amp;severity=medium&amp;id=68b85f9fad5a09ad00f7a484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57148-na-8df7535d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57148%3A%20n%2Fa&amp;severity=critical&amp;id=68b85898ad5a09ad00f74338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57146-na-745fe40c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57146%3A%20n%2Fa&amp;severity=high&amp;id=68b85898ad5a09ad00f74335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56608-na-6a1e0b6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56608%3A%20n%2Fa&amp;severity=medium&amp;id=68b85898ad5a09ad00f74330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57150-na-6245a8e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57150%3A%20n%2Fa&amp;severity=high&amp;id=68b85515ad5a09ad00f71e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57149-na-d127a959</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57149%3A%20n%2Fa&amp;severity=medium&amp;id=68b85515ad5a09ad00f71e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57151-na-fb6e16ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57151%3A%20n%2Fa&amp;severity=high&amp;id=68b8518ead5a09ad00f6f1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26210-na-612e5535</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26210%3A%20n%2Fa&amp;severity=high&amp;id=68b84a86ad5a09ad00f6789b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54588-cwe-416-use-after-free-in-envoyprox-0b3ee068</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54588%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=high&amp;id=68b78223ad5a09ad00e9adff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9841-unrestricted-upload-in-code-projects-287aab60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9841%3A%20Unrestricted%20Upload%20in%20code-projects%20Mobile%20Shop%20Management%20System&amp;severity=medium&amp;id=68b78d03ad5a09ad00ea2eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9260-cwe-502-deserialization-of-untrusted-0863a016</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9260%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=68b77eabad5a09ad00e996ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-breach-fintech-firm-in-attempted-130m-bank-1324bdf4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20breach%20fintech%20firm%20in%20attempted%20%24130M%20bank%20heist&amp;severity=high&amp;id=68b77e9fad5a09ad00e996a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9840-sql-injection-in-itsourcecode-sports-871be83f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9840%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b77b1bad5a09ad00e97caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9839-sql-injection-in-itsourcecode-studen-55124d52</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9839%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68b77414ad5a09ad00e94f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9838-sql-injection-in-itsourcecode-studen-943749e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9838%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68b77414ad5a09ad00e94f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26416-elevation-of-privilege-in-google-an-498a89c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26416%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68b77091ad5a09ad00e938e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22442-elevation-of-privilege-in-google-an-31f513f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22442%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22439-elevation-of-privilege-in-google-an-225aab9b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22439%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22438-elevation-of-privilege-in-google-an-e6ed3b3e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22438%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22437-elevation-of-privilege-in-google-an-5cf14774</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22437%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22435-elevation-of-privilege-in-google-an-dc368023</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22435%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68b77091ad5a09ad00e938d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22434-elevation-of-privilege-in-google-an-d203406c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22434%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22433-elevation-of-privilege-in-google-an-ce90779a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22433%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22431-denial-of-service-in-google-android-912301f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22431%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b77091ad5a09ad00e938c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22430-information-disclosure-in-google-an-b5766a66</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22430%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b77091ad5a09ad00e938c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22429-information-disclosure-in-google-an-892e90c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22429%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=critical&amp;id=68b77090ad5a09ad00e938b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22428-elevation-of-privilege-in-google-an-b04aec3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22428%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e938af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22427-elevation-of-privilege-in-google-an-274e5650</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22427%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e938ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22423-denial-of-service-in-google-android-5d62fc46</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22423%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e938a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22422-elevation-of-privilege-in-google-an-051d71bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22422%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e938a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22421-information-disclosure-in-google-an-850f6833</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22421%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b77090ad5a09ad00e9389e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22419-elevation-of-privilege-in-google-an-cbaa5670</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22419%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e9389a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22418-elevation-of-privilege-in-google-an-19c428c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22418%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e93896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22417-elevation-of-privilege-in-google-an-7fdb1b36</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22417%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e93892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22416-elevation-of-privilege-in-google-an-a1808918</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22416%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e9388e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49730-elevation-of-privilege-in-google-an-9d5fa300</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49730%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a1ce85912abc71d0be83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49720-elevation-of-privilege-in-google-an-b5353ddb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49720%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a1ce85912abc71d0be7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40653-elevation-of-privilege-in-google-an-b8cf2721</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40653%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9837-sql-injection-in-itsourcecode-studen-6ad5c821</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9837%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68b76d0bad5a09ad00e91e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9836-authorization-bypass-in-macrozheng-m-cd7ba1ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9836%3A%20Authorization%20Bypass%20in%20macrozheng%20mall&amp;severity=medium&amp;id=68b76d0bad5a09ad00e91e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-confirms-data-breach-linked-to-salesfor-b0be3488</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Confirms%20Data%20Breach%20Linked%20to%20Salesforce%20and%20Salesloft%20Drift&amp;severity=high&amp;id=68b76602ad5a09ad00e8e835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9835-authorization-bypass-in-macrozheng-m-3bfaf3fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9835%3A%20Authorization%20Bypass%20in%20macrozheng%20mall&amp;severity=medium&amp;id=68b76616ad5a09ad00e8e852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9834-cross-site-scripting-in-phpgurukul-s-a7bc17eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9834%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=68b75efbad5a09ad00e8b212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9833-sql-injection-in-sourcecodester-onli-d8767761</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9833%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Farm%20Management%20System&amp;severity=medium&amp;id=68b75efbad5a09ad00e8b20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9832-sql-injection-in-sourcecodester-food-7317237a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9832%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20Management%20System&amp;severity=medium&amp;id=68b757f4ad5a09ad00e8883c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9831-sql-injection-in-phpgurukul-beauty-p-01a80f15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9831%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b757f4ad5a09ad00e88844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9330-cwe-427-uncontrolled-search-path-ele-94a2eaa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9330%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=68b7546fad5a09ad00e87001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9323-cwe-125-out-of-bounds-read-in-foxit--3d157edf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9323%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=68b7546fad5a09ad00e86fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9324-cwe-125-out-of-bounds-read-in-foxit--28f0af27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9324%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=68b7546fad5a09ad00e86fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9325-cwe-125-out-of-bounds-read-in-foxit--969bc25b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9325%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=68b7546fad5a09ad00e86fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9326-cwe-125-out-of-bounds-read-in-foxit--21bb8efb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9326%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=68b7546fad5a09ad00e86ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9327-cwe-125-out-of-bounds-read-in-foxit--a66eef63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9327%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=68b7546fad5a09ad00e86ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9328-cwe-125-out-of-bounds-read-in-foxit--88134308</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9328%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=68b7546fad5a09ad00e86ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9329-cwe-125-out-of-bounds-read-in-foxit--68a8a315</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9329%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=68b7546fad5a09ad00e86ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8300-cwe-122-heap-based-buffer-overflow-i-ed512ada</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8300%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Realtek%20rtl81xx%20SDK&amp;severity=high&amp;id=68b750ecad5a09ad00e85e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8299-cwe-122-heap-based-buffer-overflow-i-6cd717c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8299%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Realtek%20rtl81xx%20SDK&amp;severity=high&amp;id=68b750ecad5a09ad00e85e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8298-cwe-125-out-of-bounds-read-in-realte-7084b7a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8298%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Realtek%20RTL8811AU&amp;severity=low&amp;id=68b750ecad5a09ad00e85e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8301-cwe-122-heap-based-buffer-overflow-i-e9b23c31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8301%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Realtek%20RTL8811AU&amp;severity=high&amp;id=68b750ecad5a09ad00e85e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8302-cwe-122-heap-based-buffer-overflow-i-028315f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8302%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Realtek%20rtl81xx%20SDK&amp;severity=high&amp;id=68b750ecad5a09ad00e85e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9830-sql-injection-in-phpgurukul-beauty-p-4689937f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9830%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b750ecad5a09ad00e85e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9276-cwe-258-empty-password-in-configurat-0a144e6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9276%3A%20CWE-258%3A%20Empty%20Password%20in%20Configuration%20File%20in%20Cockroach%20Labs%20cockroach-k8s-request-cert&amp;severity=critical&amp;id=68b750ecad5a09ad00e85e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9275-cwe-787-out-of-bounds-write-in-oxfor-c9f6fce4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9275%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Oxford%20Instruments%20Imaris%20Viewer&amp;severity=high&amp;id=68b750ecad5a09ad00e85e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9274-cwe-824-access-of-uninitialized-poin-cce57658</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9274%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Oxford%20Instruments%20Imaris%20Viewer&amp;severity=high&amp;id=68b750ecad5a09ad00e85e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9273-cwe-552-files-or-directories-accessi-ad74b2a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9273%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20CData%20API%20Server&amp;severity=medium&amp;id=68b750ecad5a09ad00e85e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8613-cwe-78-improper-neutralization-of-sp-eba43314</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8613%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Vacron%20Camera&amp;severity=high&amp;id=68b74d68ad5a09ad00e846b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6685-cwe-862-missing-authorization-in-ate-8fe9b012</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6685%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ATEN%20eco%20DC&amp;severity=high&amp;id=68b74d68ad5a09ad00e846a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7976-cwe-502-deserialization-of-untrusted-c394c2d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7976%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20ShockLine&amp;severity=high&amp;id=68b74d68ad5a09ad00e846af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7975-cwe-22-improper-limitation-of-a-path-a5bfe37e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7975%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Anritsu%20ShockLine&amp;severity=high&amp;id=68b74d68ad5a09ad00e846ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-of-mystrodx-backdoor-using-dns-an-2ddbb2c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20of%20MystRodX%20Backdoor%20Using%20DNS%20and%20ICMP%20Triggers%20for%20Stealthy%20Control&amp;severity=high&amp;id=68b73f57ad5a09ad00e7be8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-expands-malware-arsenal-with-pondrat-afa279ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20Expands%20Malware%20Arsenal%20With%20PondRAT%2C%20ThemeForestRAT%2C%20and%20RemotePE&amp;severity=high&amp;id=68b73f57ad5a09ad00e7be90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36162-cwe-497-exposure-of-sensitive-syste-93b24a78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36162%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20UrbanCode%20Deploy&amp;severity=medium&amp;id=68b73f70ad5a09ad00e7bf6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9829-sql-injection-in-phpgurukul-beauty-p-0882f5ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9829%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b73bd2ad5a09ad00e79f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43726-cwe-59-improper-link-resolution-bef-a1c2412c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43726%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Alienware%20Command%20Center%205.x%20(AWCC)&amp;severity=medium&amp;id=68b7384fad5a09ad00e77ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57777-cwe-1285-improper-validation-of-spe-ecfb2ea7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57777%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57775-cwe-1285-improper-validation-of-spe-3e591a54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57775%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9188-cwe-502-deserialization-of-untrusted-906148c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9188%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57778-cwe-1285-improper-validation-of-spe-bd4fba26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57778%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57776-cwe-1285-improper-validation-of-spe-ca597d1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57776%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57774-cwe-1285-improper-validation-of-spe-24103425</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57774%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9189-cwe-1285-improper-validation-of-spec-4c9219d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9189%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-lazarus-rats-coming-for-your-cheese-ce48350c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20Lazarus%20RATs%20coming%20for%20your%20cheese&amp;severity=medium&amp;id=68b742daad5a09ad00e7dc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9828-risky-cryptographic-algorithm-in-ten-45a99786</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9828%3A%20Risky%20Cryptographic%20Algorithm%20in%20Tenda%20CP6&amp;severity=medium&amp;id=68b726bbad5a09ad00e6df39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9696-cwe-798-use-of-hard-coded-credential-f014fe6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9696%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SunPower%20PVS6&amp;severity=critical&amp;id=68b71fb3ad5a09ad00e56fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-networks-zscaler-and-pagerduty-hit-in-sa-86f8ca39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Networks%2C%20Zscaler%20and%20PagerDuty%20Hit%20in%20Salesforce%20Linked%20Data%20Breaches&amp;severity=high&amp;id=68b70a9aad5a09ad00df84f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rapperbot-infection-ddos-in-seconds-deep-dive-writ-03e2656a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RapperBot%3A%20infection%20%E2%86%92%20DDoS%20in%20seconds%20(deep%20dive%20write-up)&amp;severity=medium&amp;id=68b7071dad5a09ad00df47a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9784-vulnerability-in-red-hat-red-hat-bui-5c8b2535</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9784%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=68b6f583ad5a09ad00ddfc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deep-specter-research-uncovers-a-global-phishing-e-ca4cbeaa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deep%20Specter%20Research%20Uncovers%20a%20Global%20Phishing%20Empire&amp;severity=medium&amp;id=68b6f202ad5a09ad00ddc658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2413-cwe-307-improper-restriction-of-exce-2c6d4b98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2413%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20ProKuafor&amp;severity=high&amp;id=68b6f583ad5a09ad00ddfc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0670-cwe-639-authorization-bypass-through-80ef166b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0670%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Akinsoft%20ProKuafor&amp;severity=medium&amp;id=68b6f1fead5a09ad00ddc634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-network-fdn3-launches-massive-brute-forc-c36c48c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Network%20FDN3%20Launches%20Massive%20Brute-Force%20Attacks%20on%20SSL%20VPN%20and%20RDP%20Devices&amp;severity=high&amp;id=68b6e3edad5a09ad00dca59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-connected-third-party-drift-application-22d5e75b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce-Connected%20Third-Party%20Drift%20Application%20Incident%20Response&amp;severity=high&amp;id=68b6e3edad5a09ad00dca596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2414-cwe-307-improper-restriction-of-exce-888eb436</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2414%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20OctoCloud&amp;severity=high&amp;id=68b6dce7ad5a09ad00dc785b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0640-cwe-639-authorization-bypass-through-c20d04d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0640%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Akinsoft%20OctoCloud&amp;severity=medium&amp;id=68b6dce7ad5a09ad00dc7861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46810-cwe-61-unix-symbolic-link-symlink-f-5cfa6a7a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46810%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20openSUSE%20Tumbleweed&amp;severity=high&amp;id=68b6d960ad5a09ad00dc4a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52551-cwe-306-missing-authentication-for--a1f24af2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52551%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Copeland%20LP%20E2%20Facility%20Management%20System&amp;severity=critical&amp;id=68b6d960ad5a09ad00dc4a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobsf-security-testing-tool-vulnerability-let-atta-1bc94d83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MobSF%20Security%20Testing%20Tool%20Vulnerability%20Let%20Attackers%20Upload%20Malicious%20Files&amp;severity=critical&amp;id=68b6d5dbad5a09ad00dbf8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52550-cwe-347-improper-verification-of-cr-1dc1e45e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52550%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=high&amp;id=68b6d5e9ad5a09ad00dbf905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52549-cwe-522-insufficiently-protected-cr-f37f1a3e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52549%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=critical&amp;id=68b6d5e9ad5a09ad00dbf902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52548-cwe-1242-in-copeland-lp-e3-supervis-044aa78d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52548%3A%20CWE-1242%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=medium&amp;id=68b6d5e9ad5a09ad00dbf8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52547-cwe-20-improper-input-validation-in-0de581fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52547%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=high&amp;id=68b6d5e9ad5a09ad00dbf8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52546-cwe-434-unrestricted-upload-of-file-badacfdd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52546%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=medium&amp;id=68b6d5e8ad5a09ad00dbf8f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52545-cwe-522-insufficiently-protected-cr-453b43c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52545%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=high&amp;id=68b6d5e8ad5a09ad00dbf8f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52544-cwe-20-improper-input-validation-in-dd3712fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52544%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=high&amp;id=68b6d5e8ad5a09ad00dbf8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52543-cwe-836-use-of-password-hash-instea-0f064814</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52543%3A%20CWE-836%20Use%20of%20Password%20Hash%20Instead%20of%20Password%20for%20Authentication%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=medium&amp;id=68b6d5e8ad5a09ad00dbf8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6519-cwe-522-insufficiently-protected-cre-aeffc36e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6519%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=critical&amp;id=68b6d5e9ad5a09ad00dbf908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5662-cwe-502-deserialization-of-untrusted-91b60adb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5662%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=critical&amp;id=68b6d5e9ad5a09ad00dbf90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/golden-dmsa-5fa92611</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Golden%20dMSA&amp;severity=medium&amp;id=68b6ced5ad5a09ad00dbae9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ksmbd-fuzzing-improvements-and-vulnerability-disco-465fa694</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ksmbd%20Fuzzing%20Improvements%20and%20Vulnerability%20Discovery&amp;severity=medium&amp;id=68b6b9c7ad5a09ad00daefe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-apt-exploits-signed-windows-driver-to-d-351bd566</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20APT%20Exploits%20Signed%20Windows%20Driver%20to%20Deliver%20ValleyRAT%20Malware&amp;severity=high&amp;id=68b6b9bbad5a09ad00daef7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cti-analysis-malicious-email-campaign-941ef63e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTI%20Analysis%3A%20Malicious%20Email%20Campaign&amp;severity=medium&amp;id=68b6b63cad5a09ad00dabf70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-package-nodejs-smtp-mimics-nodemaile-07792c55</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20Package%20nodejs-smtp%20Mimics%20Nodemailer%2C%20Targets%20Atomic%20and%20Exodus%20Wallets&amp;severity=high&amp;id=68b6b2b2ad5a09ad00daa4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9573-cwe-78-improper-neutralization-of-sp-5be17cdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9573%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TYPO3%20Extension%20%22TYPO3%20Backup%20Plus%22&amp;severity=high&amp;id=68b6b2bfad5a09ad00daa4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sindoor-dropper-new-phishing-campaign-dc5a03e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sindoor%20Dropper%3A%20New%20Phishing%20Campaign&amp;severity=medium&amp;id=68b6b63cad5a09ad00dabf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41031-cwe-863-incorrect-authorization-in--285bee86</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41031%3A%20CWE-863%20Incorrect%20Authorization%20in%20T-INNOVA%20Deporsite&amp;severity=medium&amp;id=68b6abafad5a09ad00da45c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41030-cwe-863-incorrect-authorization-in--edc1a342</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41030%3A%20CWE-863%20Incorrect%20Authorization%20in%20T-INNOVA%20Deporsite&amp;severity=medium&amp;id=68b6abafad5a09ad00da45c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41690-cwe-532-insertion-of-sensitive-info-d7b4fc8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41690%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Endress%2BHauser%20Promag%2010%20with%20HART&amp;severity=high&amp;id=68b6a826ad5a09ad00da0d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44017-insertion-of-sensitive-information--d9074f78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44017%3A%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20Gunosy%20Inc.%20%22Gunosy%22%20App%20for%20Android&amp;severity=medium&amp;id=68b6a11fad5a09ad00d9659a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9815-missing-authentication-in-alaneuler--8493c95a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9815%3A%20Missing%20Authentication%20in%20alaneuler%20batteryKid&amp;severity=high&amp;id=68b676eead5a09ad00d7ce37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9814-sql-injection-in-phpgurukul-beauty-p-bb2fc371</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9814%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b66c63ad5a09ad00d74c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9813-buffer-overflow-in-tenda-ch22-eaa1878d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9813%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68b66c63ad5a09ad00d74c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9812-buffer-overflow-in-tenda-ch22-badfe5e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9812%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68b661d8ad5a09ad00d709c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9811-sql-injection-in-campcodes-farm-mana-56c97c7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9811%3A%20SQL%20Injection%20in%20Campcodes%20Farm%20Management%20System&amp;severity=medium&amp;id=68b661d8ad5a09ad00d709bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8662-vulnerability-in-openam-consortium-o-69c94821</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8662%3A%20Vulnerability%20in%20OpenAM%20consortium%20OpenAM&amp;severity=low&amp;id=68b653c6ad5a09ad00d6b130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58178-cwe-77-improper-neutralization-of-s-b2a23e51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58178%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20SonarSource%20sonarqube-scan-action&amp;severity=high&amp;id=68b64234ad5a09ad00d5f972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58162-cwe-22-improper-limitation-of-a-pat-0a04bd44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58162%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=medium&amp;id=68b64234ad5a09ad00d5f96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58161-cwe-22-improper-limitation-of-a-pat-8dd82a5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58161%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=low&amp;id=68b64234ad5a09ad00d5f967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9806-hard-coded-credentials-in-tenda-f120-688d4d6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9806%3A%20Hard-coded%20Credentials%20in%20Tenda%20F1202&amp;severity=low&amp;id=68b63eafad5a09ad00d5e517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9805-server-side-request-forgery-in-simst-77f0315b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9805%3A%20Server-Side%20Request%20Forgery%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=68b63eafad5a09ad00d5e50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-02-47fd8f4b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-02&amp;severity=medium&amp;id=68b7891ead5a09ad00e9d59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32100-na-b6acbd45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32100%3A%20n%2Fa&amp;severity=medium&amp;id=68b734cbad5a09ad00e76254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32098-na-994ce7aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32098%3A%20n%2Fa&amp;severity=medium&amp;id=68b73147ad5a09ad00e73bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55824-na-2e15fc2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55824%3A%20n%2Fa&amp;severity=medium&amp;id=68b72dc3ad5a09ad00e7240c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51966-na-20bb7138</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51966%3A%20n%2Fa&amp;severity=medium&amp;id=68b72dc3ad5a09ad00e72408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50565-na-2a029e22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50565%3A%20n%2Fa&amp;severity=medium&amp;id=68b72dc3ad5a09ad00e72405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55474-na-f2a37ec3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55474%3A%20n%2Fa&amp;severity=medium&amp;id=68b726bbad5a09ad00e6df34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55476-na-ce9c5cc2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55476%3A%20n%2Fa&amp;severity=medium&amp;id=68b726bbad5a09ad00e6df2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55472-na-8198fb20</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55472%3A%20n%2Fa&amp;severity=medium&amp;id=68b72337ad5a09ad00e5b3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55473-na-36c37be7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55473%3A%20n%2Fa&amp;severity=medium&amp;id=68b71fb3ad5a09ad00e56fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55373-na-9924d73b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55373%3A%20n%2Fa&amp;severity=medium&amp;id=68b71fb3ad5a09ad00e56fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55372-na-eba2f350</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55372%3A%20n%2Fa&amp;severity=medium&amp;id=68b718abad5a09ad00e3ac51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57616-na-604922f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57616%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e372a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57615-na-342b1b0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57615%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e3729e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57614-na-dc9ea377</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57614%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e3729b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57613-na-d9501216</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57613%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e37298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57612-na-97cd750e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57612%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e37295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57611-na-e1b5d9bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57611%3A%20n%2Fa&amp;severity=medium&amp;id=68b71529ad5a09ad00e37292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54599-na-60d2ac56</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54599%3A%20n%2Fa&amp;severity=high&amp;id=68b70e25ad5a09ad00e2603a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50757-na-4a87725c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50757%3A%20n%2Fa&amp;severity=medium&amp;id=68b7071aad5a09ad00df4788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50755-na-f4798c7e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50755%3A%20n%2Fa&amp;severity=medium&amp;id=68b7071aad5a09ad00df4785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46047-na-6a4d3170</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46047%3A%20n%2Fa&amp;severity=medium&amp;id=68b6f1fead5a09ad00ddc637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57140-na-7d85d817</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57140%3A%20n%2Fa&amp;severity=critical&amp;id=68b6dce7ad5a09ad00dc7864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56254-na-738d4590</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56254%3A%20n%2Fa&amp;severity=medium&amp;id=68b6dce7ad5a09ad00dc785e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9802-sql-injection-in-remoteclinic-e1ce4a5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9802%3A%20SQL%20Injection%20in%20RemoteClinic&amp;severity=medium&amp;id=68b6309ead5a09ad00d548a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9801-path-traversal-in-simstudioai-sim-d9971b39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9801%3A%20Path%20Traversal%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=68b62996ad5a09ad00d519fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9800-unrestricted-upload-in-simstudioai-s-bb87374a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9800%3A%20Unrestricted%20Upload%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=68b6228ead5a09ad00d481cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9799-server-side-request-forgery-in-langf-6564d3bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9799%3A%20Server-Side%20Request%20Forgery%20in%20Langfuse&amp;severity=low&amp;id=68b61b86ad5a09ad00d4543f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9797-injection-in-mrvautin-expresscart-ce8342ae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9797%3A%20Injection%20in%20mrvautin%20expressCart&amp;severity=medium&amp;id=68b61b86ad5a09ad00d45438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9796-cross-site-scripting-in-thinkgem-jee-d4ab70ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9796%3A%20Cross%20Site%20Scripting%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=68b6147ead5a09ad00d41685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28988-cwe-502-deserialization-of-untruste-45de83aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28988%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=69a0a1cc85912abc71d0bd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9795-unrestricted-upload-in-xujeff-tianti-9c2727f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9795%3A%20Unrestricted%20Upload%20in%20xujeff%20tianti%20%E5%A4%A9%E6%A2%AF&amp;severity=medium&amp;id=68b60d77ad5a09ad00d3ee9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-show-hidden-commands-in-images-exploit-afa5680c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Show%20Hidden%20Commands%20in%20Images%20Exploit%20AI%20Chatbots%20and%20Steal%20Data&amp;severity=high&amp;id=68b609f2ad5a09ad00d3d58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9794-sql-injection-in-campcodes-computer--2d78abcf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9794%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68b6066ead5a09ad00d3bcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9793-sql-injection-in-itsourcecode-apartm-83d8d012</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9793%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b5fc00ad5a09ad00d35a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-droppers-now-deliver-sms-stealers-and-spyw-29cf7c26</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Droppers%20Now%20Deliver%20SMS%20Stealers%20and%20Spyware%2C%20Not%20Just%20Banking%20Trojans&amp;severity=high&amp;id=68b5fbe1ad5a09ad00d3593d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-hits-zscaler-via-salesloft-dri-a5c1e208</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply-chain%20attack%20hits%20Zscaler%20via%20Salesloft%20Drift%2C%20leaking%20customer%20info&amp;severity=high&amp;id=68b5fbe1ad5a09ad00d35941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9792-sql-injection-in-itsourcecode-apartm-2f64fa4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9792%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b5f85dad5a09ad00d3479c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9810-cwe-367-time-of-check-time-of-use-to-89f01062</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9810%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20antirez%20linenoise&amp;severity=medium&amp;id=68b5f155ad5a09ad00d306be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9791-stack-based-buffer-overflow-in-tenda-9a8ff63f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9791%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68b5f155ad5a09ad00d306b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9809-cwe-787-out-of-bounds-write-in-libre-b84de0e9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9809%3A%20CWE-787%20Out-of-bounds%20Write%20in%20libretro%20libretro-common&amp;severity=high&amp;id=68b5ea4dad5a09ad00d29545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9790-sql-injection-in-sourcecodester-hote-39caf821</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9790%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68b5ea4dad5a09ad00d2953e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3586-cwe-863-incorrect-authorization-in-l-3ce82344</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3586%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=high&amp;id=68b5e345ad5a09ad00d1e197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9789-sql-injection-in-sourcecodester-onli-dea0362c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9789%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68b5e345ad5a09ad00d1e19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9788-sql-injection-in-sourcecodester-scho-b0195768</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9788%3A%20SQL%20Injection%20in%20SourceCodester%20School%20Log%20Management%20System&amp;severity=medium&amp;id=68b5dc3cad5a09ad00d1abe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-scarcruft-targets-academics-with-rokr-54e50b22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%E2%80%99s%20ScarCruft%20Targets%20Academics%20With%20RokRAT%20Malware&amp;severity=medium&amp;id=68b5d8b8ad5a09ad00d19e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/article-ipv6-security-attacks-and-detection-method-dabfcd88</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BArticle%5D%20IPv6%20Security%3A%20Attacks%20and%20Detection%20Methods&amp;severity=medium&amp;id=68b5d1b1ad5a09ad00d13c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57799-cwe-78-improper-neutralization-of-s-d35a63c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57799%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20lemon8866%20StreamVault&amp;severity=high&amp;id=68b5c3a1ad5a09ad00d0bec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55007-cwe-918-server-side-request-forgery-232dad52</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55007%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20KnowageLabs%20Knowage-Server&amp;severity=low&amp;id=68b5c3a1ad5a09ad00d0bebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9786-sql-injection-in-campcodes-online-le-d4b6a555</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9786%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68b5c01cad5a09ad00d0a275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9783-buffer-overflow-in-totolink-a702r-c2519098</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9783%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68b5b20dad5a09ad00d0144e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0656-cwe-79-improper-neutralization-of-in-8f6cb2ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33082-cwe-79-improper-neutralization-of-i-b79874f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33083-cwe-79-improper-neutralization-of-i-501f6e17</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33084-cwe-327-use-of-a-broken-or-risky-cr-663bfceb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33084%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33099-cwe-295-improper-certificate-valida-bf8844e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33099%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffaff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33102-cwe-327-use-of-a-broken-or-risky-cr-cf10e780</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33102%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9782-buffer-overflow-in-totolink-a702r-5de4adc3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9782%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68b5ab04ad5a09ad00cfe65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-browsers-become-the-attack-surface-rethinking-5815e61b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Browsers%20Become%20the%20Attack%20Surface%3A%20Rethinking%20Security%20for%20Scattered%20Spider&amp;severity=high&amp;id=68b5a780ad5a09ad00cfcee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9781-buffer-overflow-in-totolink-a702r-c5ddb9e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9781%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68b5a3fcad5a09ad00cfaebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attack-on-pennsylvanias-ag-office-disru-5c13ab06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Attack%20on%20Pennsylvania%E2%80%99s%20AG%20Office%20Disrupts%20Court%20Cases&amp;severity=high&amp;id=68b5a077ad5a09ad00cfa03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9780-buffer-overflow-in-totolink-a702r-fac0f29a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9780%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68b59cf4ad5a09ad00cf6447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2412-cwe-307-improper-restriction-of-exce-b599a7d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2412%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20QR%20Menu&amp;severity=high&amp;id=68b59972ad5a09ad00cf4509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0610-cwe-352-cross-site-request-forgery-c-acbb7fb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0610%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ak%C4%B1nsoft%20QR%20Men%C3%BC&amp;severity=high&amp;id=68b59972ad5a09ad00cf4506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9779-buffer-overflow-in-totolink-a702r-908ad5fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9779%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68b595edad5a09ad00cf3268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9778-hard-coded-credentials-in-tenda-w12-7cf88476</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9778%3A%20Hard-coded%20Credentials%20in%20Tenda%20W12&amp;severity=low&amp;id=68b58ee5ad5a09ad00cef137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36133-cwe-532-insertion-of-sensitive-info-145bcae3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36133%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20App%20Connect%20Enterprise%20Certified%20Container&amp;severity=medium&amp;id=68b58b60ad5a09ad00cea898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-disrupts-russian-apt29-watering-hole-target-2bbbf37c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Disrupts%20Russian%20APT29%20Watering%20Hole%20Targeting%20Microsoft%20Authentication&amp;severity=medium&amp;id=68b580d4ad5a09ad00ce3b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9775-unrestricted-upload-in-remoteclinic-82ad2f43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9775%3A%20Unrestricted%20Upload%20in%20RemoteClinic&amp;severity=medium&amp;id=68b580e4ad5a09ad00ce3b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fraudster-stole-over-15-million-from-city-of-balti-16857b31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fraudster%20stole%20over%20%241.5%20million%20from%20city%20of%20Baltimore&amp;severity=medium&amp;id=68b579cbad5a09ad00cd5d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scarcruft-uses-rokrat-malware-in-operation-hankook-54de5d28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ScarCruft%20Uses%20RokRAT%20Malware%20in%20Operation%20HanKook%20Phantom%20Targeting%20South%20Korean%20Academics&amp;severity=high&amp;id=68b579cbad5a09ad00cd5d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9774-information-disclosure-in-remoteclin-c6430c9b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9774%3A%20Information%20Disclosure%20in%20RemoteClinic&amp;severity=medium&amp;id=68b579dfad5a09ad00cd5dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/8-cybersecurity-news-worth-your-attention-this-wee-a6602148</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=8%20Cybersecurity%20News%20Worth%20Your%20Attention%20this%20Week%20Summarised%20%E2%80%93%202025-09-01&amp;severity=medium&amp;id=68b57646ad5a09ad00cd2188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9773-cross-site-scripting-in-remoteclinic-aa7f0a78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9773%3A%20Cross%20Site%20Scripting%20in%20RemoteClinic&amp;severity=medium&amp;id=68b572c2ad5a09ad00cd036a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/traps-beneath-fault-repair-analysis-of-recent-atta-b67890a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Traps%20Beneath%20Fault%20Repair%3A%20Analysis%20of%20Recent%20Attacks%20Using%20ClickFix%20Technique&amp;severity=medium&amp;id=68b572c2ad5a09ad00cd02fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-apt-c-53-gamaredon-attack-on-ukrainian-d743a9ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20APT-C-53%20(Gamaredon)%20Attack%20on%20Ukrainian%20Government%20Agencies&amp;severity=medium&amp;id=68b572c2ad5a09ad00cd02e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-disrupts-watering-hole-campaign-by-russias--1d657948</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20disrupts%20watering%20hole%20campaign%20by%20Russia&apos;s%20APT29&amp;severity=medium&amp;id=68b572c2ad5a09ad00cd02e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tinkywinkey-keylogger-ab948138</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TINKYWINKEY%20KEYLOGGER&amp;severity=medium&amp;id=68b572c2ad5a09ad00cd02db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9772-unrestricted-upload-in-remoteclinic-d2df5005</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9772%3A%20Unrestricted%20Upload%20in%20RemoteClinic&amp;severity=medium&amp;id=68b56bd0ad5a09ad00cc91b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9771-sql-injection-in-sourcecodester-eye--9846118a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9771%3A%20SQL%20Injection%20in%20SourceCodester%20Eye%20Clinic%20Management%20System&amp;severity=medium&amp;id=68b564b3ad5a09ad00cc4d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9770-sql-injection-in-campcodes-hospital--9a48686f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9770%3A%20SQL%20Injection%20in%20Campcodes%20Hospital%20Management%20System&amp;severity=medium&amp;id=68b55dabad5a09ad00cbca18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9769-command-injection-in-d-link-di-7400g-2a8ce06d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9769%3A%20Command%20Injection%20in%20D-Link%20DI-7400G%2B&amp;severity=low&amp;id=68b556a3ad5a09ad00cb6387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9768-sql-injection-in-itsourcecode-sports-93ad0048</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9768%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b54f9bad5a09ad00ca9f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58318-cwe-306-missing-authentication-for--c415918c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58318%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Delta%20Electronics%20DIAView&amp;severity=medium&amp;id=68b54c17ad5a09ad00ca82bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9767-sql-injection-in-itsourcecode-sports-968da67e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9767%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b54893ad5a09ad00ca5c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9766-sql-injection-in-itsourcecode-sports-577bebb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9766%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b63b8cad5a09ad00d5d479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9765-sql-injection-in-itsourcecode-sports-64ed2e9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9765%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b53a84ad5a09ad00c9ab97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9764-sql-injection-in-itsourcecode-sports-8a56389e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9764%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b5337bad5a09ad00c96e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54857-improper-neutralization-of-special--0c9250a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54857%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Seiko%20Solutions%20Inc.%20SkyBridge%20BASIC%20MB-A130&amp;severity=critical&amp;id=68b5300ead5a09ad00c93948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20707-cwe-416-use-after-free-in-mediatek--f9db8a95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20707%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6853%2C%20MT6877%2C%20MT6893%2C%20MT6899%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8775%2C%20MT8786%2C%20MT8788E%2C%20MT8791T%2C%20MT8792%2C%20MT8796%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=68b52c73ad5a09ad00c8fc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20706-cwe-416-use-after-free-in-mediatek--7e4b2d34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20706%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6899%2C%20MT6989%2C%20MT6991%2C%20MT8676%2C%20MT8678&amp;severity=high&amp;id=68b52c73ad5a09ad00c8fc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20705-cwe-416-use-after-free-in-mediatek--f0a1cc86</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20705%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2735%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6980D%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8169%2C%20MT8186%2C%20MT8188%2C%20MT8676%2C%20MT8678%2C%20MT8696%2C%20MT8775%2C%20MT8792%2C%20MT8796&amp;severity=high&amp;id=68b52c73ad5a09ad00c8fc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20704-cwe-787-out-of-bounds-write-in-medi-e125fc50</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20704%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6813%2C%20MT6835%2C%20MT6835T%2C%20MT6878%2C%20MT6878M%2C%20MT6897%2C%20MT6899%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8863%2C%20MT8873%2C%20MT8883&amp;severity=high&amp;id=68b52c73ad5a09ad00c8fc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20703-cwe-125-out-of-bounds-read-in-media-edc0addd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20703%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=68b52c73ad5a09ad00c8fc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20708-cwe-787-out-of-bounds-write-in-medi-a4a70418</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20708%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6815%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=high&amp;id=68b52c73ad5a09ad00c8fc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6507-cwe-502-deserialization-of-untrusted-fcb4a255</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6507%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=critical&amp;id=68b52c73ad5a09ad00c8fc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9763-sql-injection-in-campcodes-online-le-15c2c9ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9763%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68b52c73ad5a09ad00c8fc35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9761-sql-injection-in-campcodes-online-fe-eb5f8621</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9761%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Feeds%20Product%20Inventory%20System&amp;severity=medium&amp;id=68b5256bad5a09ad00c88826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9760-improper-authorization-in-portabilis-9c0abcf5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9760%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b51e63ad5a09ad00c8282f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7731-cwe-319-cleartext-transmission-of-se-0bf88cee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7731%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=high&amp;id=68b51adfad5a09ad00c81c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7405-cwe-306-missing-authentication-for-c-c9aedcf6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7405%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=high&amp;id=68b51adfad5a09ad00c81c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9759-sql-injection-in-campcodes-courier-m-196c8265</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9759%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=68b5175bad5a09ad00c805db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9758-sql-injection-in-deepakmisal24-chemi-ddf96bc9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9758%3A%20SQL%20Injection%20in%20deepakmisal24%20Chemical%20Inventory%20Management%20System&amp;severity=medium&amp;id=68b51053ad5a09ad00c7d0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-day-alert-automated-discovery-of-critical-cwm-d9ff5f58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZERO-DAY%20ALERT%3A%20Automated%20Discovery%20of%20Critical%20CWMP%20Stack%20Overflow%20in%20TP-Link%20Routers&amp;severity=critical&amp;id=68b50ccfad5a09ad00c7b5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9570-cwe-23-relative-path-traversal-in-su-5fc13631</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9570%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Sunnet%20eHRD%20CTMS&amp;severity=medium&amp;id=68b51053ad5a09ad00c7d0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9569-cwe-79-improper-neutralization-of-in-6481b125</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sunnet%20eHRD%20CTMS&amp;severity=medium&amp;id=68b5094bad5a09ad00c7a872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9568-cwe-79-improper-neutralization-of-in-fc7105e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sunnet%20eHRD%20CTMS&amp;severity=medium&amp;id=68b5094bad5a09ad00c7a86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9567-cwe-79-improper-neutralization-of-in-72fe125c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9567%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sunnet%20eHRD%20CTMS&amp;severity=medium&amp;id=68b5094bad5a09ad00c7a86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9757-sql-injection-in-campcodes-courier-m-40a36d44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9757%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=68b5094bad5a09ad00c7a876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9756-sql-injection-in-phpgurukul-user-man-a0c381d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9756%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Management%20System&amp;severity=medium&amp;id=68b63b8cad5a09ad00d5d486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9755-cross-site-scripting-in-khanakag-17--0b2909ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9755%3A%20Cross%20Site%20Scripting%20in%20Khanakag-17%20Library%20Management%20System&amp;severity=medium&amp;id=68b63b8cad5a09ad00d5d480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9754-cross-site-scripting-in-campcodes-on-48f27ea3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9754%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9753-cross-site-scripting-in-campcodes-on-fb98032e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9753%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=68b4f0afad5a09ad00c625f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9752-os-command-injection-in-d-link-dir-8-85759c89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9752%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=68b4ea0cad5a09ad00c5da88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-01-75b8764c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-01&amp;severity=medium&amp;id=68b6379ead5a09ad00d57d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9751-sql-injection-in-campcodes-online-le-167f60d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9751%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68b4df1bad5a09ad00c44eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9750-sql-injection-in-campcodes-online-le-97e51f47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9750%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68b4d814ad5a09ad00c3cecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9749-sql-injection-in-hkritesh009-grocery-72e1de1a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9749%3A%20SQL%20Injection%20in%20HKritesh009%20Grocery%20List%20Management%20Web%20App&amp;severity=medium&amp;id=68b4d10cad5a09ad00c375df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9748-stack-based-buffer-overflow-in-tenda-0b456634</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9748%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68b4ca04ad5a09ad00c25241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9747-cross-site-request-forgery-in-koille-493c2b8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9747%3A%20Cross-Site%20Request%20Forgery%20in%20Koillection&amp;severity=medium&amp;id=68b4c2fcad5a09ad00c21962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9746-cross-site-scripting-in-campcodes-ho-cbb406e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9746%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Hospital%20Management%20System&amp;severity=medium&amp;id=68b4bbf4ad5a09ad00c1d425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9745-os-command-injection-in-d-link-di-50-1f158ca3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9745%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-500WF&amp;severity=medium&amp;id=68b4b4ecad5a09ad00c1ab0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9744-sql-injection-in-campcodes-online-lo-81ddcffe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9744%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68b4ade4ad5a09ad00c106df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9743-sql-injection-in-code-projects-human-42195e9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9743%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=68b4a6e1ad5a09ad00c0de41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9742-sql-injection-in-code-projects-human-d7839641</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9742%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=68b49fd4ad5a09ad00c096f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9741-sql-injection-in-code-projects-human-9178d783</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9741%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=68b498ccad5a09ad00c073d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9740-sql-injection-in-code-projects-human-6eaf17fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9740%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=68b491c5ad5a09ad00c04dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9739-sql-injection-in-campcodes-online-wa-0a248a1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9739%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Water%20Billing%20System&amp;severity=medium&amp;id=68b48abdad5a09ad00bff797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feds-seize-fake-ids-marketplace-veriftoolsnet-oper-05a751a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feds%20Seize%20Fake%20IDs%20Marketplace%20VerifTools.Net%2C%20Operators%20Relaunch%20with%20VerifTools.com&amp;severity=medium&amp;id=68b483b4ad5a09ad00bfd5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9738-cross-site-scripting-in-portabilis-i-ba99ca56</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9738%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b48030ad5a09ad00bfb367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9737-cross-site-scripting-in-o2oa-546392ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9737%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b47cb1ad5a09ad00bf5da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9736-cross-site-scripting-in-o2oa-65b1358c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9736%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b475a6ad5a09ad00bf347d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-0-day-exploited-in-attacks-on-targeted-io-000bf690</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%200-Day%20Exploited%20in%20Attacks%20on%20Targeted%20iOS%20and%20macOS%20Users&amp;severity=high&amp;id=68b46e9dad5a09ad00be4302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9735-cross-site-scripting-in-o2oa-89331547</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9735%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b46eaaad5a09ad00be4373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9734-cross-site-scripting-in-o2oa-d1802a0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9734%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b46795ad5a09ad00bd3d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9733-sql-injection-in-code-projects-human-1e181541</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9733%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=68b4608fad5a09ad00bc6487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9732-memory-corruption-in-dcmtk-ff152ac2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9732%3A%20Memory%20Corruption%20in%20DCMTK&amp;severity=medium&amp;id=68b45987ad5a09ad00bbef96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9731-hard-coded-credentials-in-tenda-ac9-7b3ebd60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9731%3A%20Hard-coded%20Credentials%20in%20Tenda%20AC9&amp;severity=low&amp;id=68b45281ad5a09ad00bb2287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9730-sql-injection-in-itsourcecode-apartm-b2af2d7e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9730%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b44b77ad5a09ad00bac57b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9729-sql-injection-in-phpgurukul-online-c-24de45bc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9729%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=68b4446fad5a09ad00ba8b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9728-cross-site-scripting-in-givanz-vvveb-f45d6862</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9728%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68b43d68ad5a09ad00ba480e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9727-os-command-injection-in-d-link-dir-8-ec132fad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9727%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-816L&amp;severity=medium&amp;id=68b43660ad5a09ad00ba13d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9726-sql-injection-in-campcodes-farm-mana-63c5e248</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9726%3A%20SQL%20Injection%20in%20Campcodes%20Farm%20Management%20System&amp;severity=medium&amp;id=68b42f58ad5a09ad00b9f021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9725-use-of-hard-coded-password-in-cudy-l-c90c170f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9725%3A%20Use%20of%20Hard-coded%20Password%20in%20Cudy%20LT500E&amp;severity=low&amp;id=68b42148ad5a09ad00b97195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9724-cross-site-scripting-in-portabilis-i-6d159de9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9724%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b41a40ad5a09ad00b7942d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9723-cross-site-scripting-in-portabilis-i-458620ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9723%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b41338ad5a09ad00b6ca01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9722-cross-site-scripting-in-portabilis-i-104c25c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9722%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b401a4ad5a09ad00b5e9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9721-cross-site-scripting-in-portabilis-i-4915737a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9721%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b3fe20ad5a09ad00b5c7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9720-cross-site-scripting-in-portabilis-i-d1dc2e38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9720%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b3f718ad5a09ad00b59117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9719-cross-site-scripting-in-o2oa-0774d103</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9719%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b3e908ad5a09ad00b532e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9718-cross-site-scripting-in-o2oa-5f341fd9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9718%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b3e200ad5a09ad00b46313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9717-cross-site-scripting-in-o2oa-78d33581</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9717%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b3daf8ad5a09ad00b10851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9716-cross-site-scripting-in-o2oa-e1342f61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9716%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b3d3f0ad5a09ad00b081ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5083-cwe-79-improper-neutralization-of-in-cfcabba2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milmor%20Amministrazione%20Trasparente&amp;severity=medium&amp;id=68b3d06cad5a09ad00aea88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31100-cwe-434-unrestricted-upload-of-file-ef4e975d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31100%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Mojoomla%20School%20Management&amp;severity=critical&amp;id=68b3c964ad5a09ad00a9a589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47696-cwe-98-improper-control-of-filename-3c491ef1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47696%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20solwin%20Blog%20Designer%20PRO&amp;severity=null&amp;id=68b3c964ad5a09ad00a9a58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32832-missing-authorization-in-hamid-alin-7b726551</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32832%3A%20Missing%20Authorization%20in%20Hamid%20Alinia%20Login%20with%20phone%20number&amp;severity=null&amp;id=69cd7430e6bfc5ba1def629d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32589-missing-authorization-in-dmitry-v-c-61a4d53a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32589%3A%20Missing%20Authorization%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9715-cross-site-scripting-in-o2oa-8eda73ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9715%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b39839ad5a09ad0099ca61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-31-ae814cae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-31&amp;severity=medium&amp;id=68b4e61ead5a09ad00c5774f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9706-sql-injection-in-sourcecodester-wate-6216d22b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9706%3A%20SQL%20Injection%20in%20SourceCodester%20Water%20Billing%20System&amp;severity=medium&amp;id=68b37888ad5a09ad009494a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9705-sql-injection-in-sourcecodester-wate-1f6d877a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9705%3A%20SQL%20Injection%20in%20SourceCodester%20Water%20Billing%20System&amp;severity=medium&amp;id=68b36a78ad5a09ad009428d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9704-sql-injection-in-sourcecodester-wate-9a6d5753</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9704%3A%20SQL%20Injection%20in%20SourceCodester%20Water%20Billing%20System&amp;severity=medium&amp;id=68b35c68ad5a09ad009348a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9702-sql-injection-in-sourcecodester-simp-78437fb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9702%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Cafe%20Billing%20System&amp;severity=medium&amp;id=68b34e58ad5a09ad0092af5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9701-sql-injection-in-sourcecodester-simp-18b98b47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9701%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Cafe%20Billing%20System&amp;severity=medium&amp;id=68b34048ad5a09ad0090ae9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9700-sql-injection-in-sourcecodester-onli-ad28d08b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9700%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Book%20Store&amp;severity=medium&amp;id=68b33940ad5a09ad00905df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9699-sql-injection-in-sourcecodester-onli-f414fce2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9699%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System%20Code&amp;severity=medium&amp;id=68b32b33ad5a09ad008baa41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-abuse-velociraptor-forensic-tool-to-depl-a03f87c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Abuse%20Velociraptor%20Forensic%20Tool%20to%20Deploy%20Visual%20Studio%20Code%20for%20C2%20Tunneling&amp;severity=high&amp;id=68b31d20ad5a09ad008b2676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9695-improper-export-of-android-applicati-c0e6d4bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9695%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20GalleryVault%20Gallery%20Vault%20App&amp;severity=medium&amp;id=68b31d3dad5a09ad008b270e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9694-sql-injection-in-campcodes-advanced--fb5979ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9694%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=68b3161aad5a09ad008ae8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9692-sql-injection-in-campcodes-online-sh-823a4c79</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9692%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20System&amp;severity=medium&amp;id=68b30f14ad5a09ad008aa391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9691-sql-injection-in-campcodes-online-sh-3e85bee4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9691%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20System&amp;severity=medium&amp;id=68b30488ad5a09ad008a3a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9690-sql-injection-in-sourcecodester-adva-19f81572</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9690%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20School%20Management%20System&amp;severity=medium&amp;id=68b30104ad5a09ad008a167e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9689-sql-injection-in-sourcecodester-adva-39964981</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9689%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20School%20Management%20System&amp;severity=medium&amp;id=68b2f9fcad5a09ad008706ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0165-cwe-89-improper-neutralization-of-sp-7137ff8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0165%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20watsonx%20Orchestrate%20Cartridge%20for%20IBM%20Cloud%20Pak%20for%20Data&amp;severity=high&amp;id=68b2f678ad5a09ad0086ecbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9688-integer-overflow-in-mupen64plus-9c44ffb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9688%3A%20Integer%20Overflow%20in%20Mupen64Plus&amp;severity=low&amp;id=68b2f2f4ad5a09ad0086ce88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-crushftp-zero-day-to-take-over-ser-ff39bbd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20CrushFTP%20Zero-Day%20to%20Take%20Over%20Servers%20-%20Patch%20NOW!&amp;severity=critical&amp;id=68b2ef6ead5a09ad0086a458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9687-improper-authorization-in-portabilis-38120c8d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9687%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b2ebedad5a09ad00864acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lab-dookhtegan-hacking-group-disrupts-communicatio-930f5aa9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lab%20Dookhtegan%20hacking%20group%20disrupts%20communications%20on%20dozens%20of%20Iranian%20ships&amp;severity=medium&amp;id=68b2e866ad5a09ad00862b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9686-sql-injection-in-portabilis-i-educar-603e05b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9686%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b2e4e4ad5a09ad00860b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9685-sql-injection-in-portabilis-i-educar-62528635</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9685%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b2dddcad5a09ad008421a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9684-sql-injection-in-portabilis-i-educar-7d67740c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9684%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b2d6d5ad5a09ad0083e9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9683-cross-site-scripting-in-o2oa-9e2e7310</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9683%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b2cfccad5a09ad0083961c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-issues-emergency-update-for-zero-click-ex-05d0f765</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Issues%20Emergency%20Update%20for%20Zero-Click%20Exploit%20Targeting%20iOS%20and%20macOS%20Devices&amp;severity=critical&amp;id=68b2c8c2ad5a09ad0080ca95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9682-cross-site-scripting-in-o2oa-919d095f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9682%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b2c8cead5a09ad0080cac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-a-fake-anydesk-installer-to-metastealer-258cfac4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20a%20Fake%20AnyDesk%20Installer%20to%20MetaStealer&amp;severity=medium&amp;id=68b556a2ad5a09ad00cb6363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9681-cross-site-scripting-in-o2oa-221af951</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9681%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b2bab8ad5a09ad00807dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9680-cross-site-scripting-in-o2oa-96eab8d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9680%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b2a5a1ad5a09ad007ff3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9679-sql-injection-in-itsourcecode-studen-c22e4bd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9679%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=68b28275ad5a09ad007eda43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9500-cwe-79-improper-neutralization-of-in-ded3b741</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=68b27ef0ad5a09ad007ec829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9499-cwe-79-improper-neutralization-of-in-f37f5365</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=68b27ef0ad5a09ad007ec823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54946-cwe-89-improper-neutralization-of-s-a80e11a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54946%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SUNNET%20Technology%20Co.%2C%20Ltd.%20Corporate%20Training%20Management%20System&amp;severity=critical&amp;id=68b27b6cad5a09ad007eaf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54945-cwe-73-external-control-of-file-nam-3f98c016</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54945%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20SUNNET%20Technology%20Co.%2C%20Ltd.%20Corporate%20Training%20Management%20System&amp;severity=critical&amp;id=68b277e9ad5a09ad007e9acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54944-cwe-434-unrestricted-upload-of-file-3449a0a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54944%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SUNNET%20Technology%20Co.%2C%20Ltd.%20Corporate%20Training%20Management%20System&amp;severity=medium&amp;id=68b277e9ad5a09ad007e9ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54943-cwe-862-missing-authorization-in-su-6619f57e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54943%3A%20CWE-862%20Missing%20Authorization%20in%20SUNNET%20Technology%20Co.%2C%20Ltd.%20Corporate%20Training%20Management%20System&amp;severity=critical&amp;id=68b27464ad5a09ad007e8450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54942-cwe-306-missing-authentication-for--8349be9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54942%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SUNNET%20Technology%20Co.%2C%20Ltd.%20Corporate%20Training%20Management%20System&amp;severity=critical&amp;id=68b27464ad5a09ad007e844d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4956-cwe-35-path-traversal-in-aa-team-pro-dbfc495f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4956%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20AA-Team%20Pro%20Bulk%20Watermark%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=68b25f4cad5a09ad007de32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9618-cwe-352-cross-site-request-forgery-c-7bbd0d5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9618%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdreams%20Related%20Posts%20Lite&amp;severity=medium&amp;id=68b25f4cad5a09ad007de32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-30-f110d953</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-30&amp;severity=medium&amp;id=68b394a6ad5a09ad0099a491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34165-cwe-121-stack-based-buffer-overflow-e4ea3e1b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34165%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NetSupport%20Ltd.%20NetSupport%20Manager&amp;severity=high&amp;id=68b23c25ad5a09ad007c55ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34164-cwe-122-heap-based-buffer-overflow--7fdd6f7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34164%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20NetSupport%20Ltd.%20NetSupport%20Manager&amp;severity=critical&amp;id=68b238b6ad5a09ad007c4611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-of-sitecore-exploit-chain-linking-30a10de4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20of%20Sitecore%20Exploit%20Chain%20Linking%20Cache%20Poisoning%20and%20Remote%20Code%20Execution&amp;severity=high&amp;id=68b2389fad5a09ad007c45cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-zero-click-exploit-allegedly-used-to-hack-what-337bc60b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20zero-click%20exploit%20allegedly%20used%20to%20hack%20WhatsApp%20users&amp;severity=high&amp;id=68b2389fad5a09ad007c45d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58159-cwe-434-unrestricted-upload-of-file-97920bbf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58159%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68b22a90ad5a09ad007bf759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57752-cwe-524-use-of-cache-containing-sen-9e9d915d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57752%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20vercel%20next.js&amp;severity=medium&amp;id=68b2270cad5a09ad007be08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55173-cwe-20-improper-input-validation-in-9360a81e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55173%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vercel%20next.js&amp;severity=medium&amp;id=68b22388ad5a09ad007bca25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58156-cwe-285-improper-authorization-in-n-9d3b8f7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58156%3A%20CWE-285%3A%20Improper%20Authorization%20in%20nofusscomputing%20centurion_erp&amp;severity=low&amp;id=68b22005ad5a09ad007bb540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57822-cwe-918-server-side-request-forgery-5280bee2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57822%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vercel%20next.js&amp;severity=medium&amp;id=68b22005ad5a09ad007bb545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9678-sql-injection-in-campcodes-online-lo-7df41940</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9678%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68b22005ad5a09ad007bb54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58160-cwe-150-improper-neutralization-of--6460e9c9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58160%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20tokio-rs%20tracing&amp;severity=low&amp;id=68b21c80ad5a09ad007ba03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58157-cwe-400-uncontrolled-resource-consu-b64b9afc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58157%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Consensys%20gnark&amp;severity=high&amp;id=68b21c80ad5a09ad007ba040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58067-cwe-601-url-redirection-to-untruste-e1b2aa42</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58067%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20basecamp%20google_sign_in&amp;severity=medium&amp;id=68b218fcad5a09ad007b7a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9677-improper-export-of-android-applicati-1fdc1607</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9677%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Modo%20Legend%20of%20the%20Phoenix&amp;severity=medium&amp;id=68b218fcad5a09ad007b7a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9676-improper-export-of-android-applicati-dcb87d2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9676%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20NCSOFT%20Universe%20App&amp;severity=medium&amp;id=68b218fcad5a09ad007b7a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58066-cwe-406-insufficient-control-of-net-9f42777d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58066%3A%20CWE-406%3A%20Insufficient%20Control%20of%20Network%20Message%20Volume%20(Network%20Amplification)%20in%20pendulum-project%20ntpd-rs&amp;severity=medium&amp;id=68b21578ad5a09ad007b61b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9675-improper-export-of-android-applicati-4fb704e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9675%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Voice%20Changer%20App&amp;severity=medium&amp;id=68b211f4ad5a09ad007b4663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9674-improper-export-of-android-applicati-2b993b04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9674%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Transbyte%20Scooper%20News%20App&amp;severity=medium&amp;id=68b211f4ad5a09ad007b465c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-targeting-businesses-11dd121b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20Ransomware%20Targeting%20Businesses&amp;severity=medium&amp;id=68b55a26ad5a09ad00cb9af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warning-about-nightspire-ransomware-following-case-1adfbd8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warning%20About%20NightSpire%20Ransomware%20Following%20Cases%20of%20Damage%20in%20South%20Korea&amp;severity=medium&amp;id=68b55dabad5a09ad00cbc9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mac-malware-identified-that-evades-detection-t-0e2aa6f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Mac%20malware%20identified%20that%20evades%20detection%20through%20fake%20PDF%20conversion%20tool&amp;severity=medium&amp;id=68b55dabad5a09ad00cbc9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/8-malicious-npm-packages-stole-chrome-user-data-on-d02e122b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=8%20Malicious%20NPM%20Packages%20Stole%20Chrome%20User%20Data%20on%20Windows&amp;severity=medium&amp;id=68b20aeaad5a09ad007addf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9673-improper-export-of-android-applicati-eabcce8f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9673%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Kakao%20%ED%97%A4%EC%9D%B4%EC%B9%B4%EC%B9%B4%EC%98%A4%20Hey%20Kakao%20App&amp;severity=medium&amp;id=68b20afbad5a09ad007ade35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9672-improper-export-of-android-applicati-0c245e3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9672%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Rejseplanen%20App&amp;severity=medium&amp;id=68b20afbad5a09ad007ade2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9671-improper-export-of-android-applicati-09cba634</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9671%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20UAB%20Paytend%20App&amp;severity=medium&amp;id=68b203e4ad5a09ad007a8a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9670-inefficient-regular-expression-compl-93c25326</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9670%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20mixmark-io%20turndown&amp;severity=medium&amp;id=68b1fcdead5a09ad007a60e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9669-sql-injection-in-jinher-oa-7104b8d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9669%3A%20SQL%20Injection%20in%20Jinher%20OA&amp;severity=medium&amp;id=68b1fcdead5a09ad007a60e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43773-cwe-862-missing-authorization-in-li-93358cd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43773%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68b1f959ad5a09ad007a4b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9667-sql-injection-in-code-projects-simpl-abc2f54a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9667%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1f5d4ad5a09ad007a36e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9666-sql-injection-in-code-projects-simpl-87f52777</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9666%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1eecfad5a09ad007a1e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9665-sql-injection-in-code-projects-simpl-62a6bdc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9665%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1eecfad5a09ad007a1e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9377-cwe-78-improper-neutralization-of-sp-19fc564e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9377%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20C7(EU)%20V2&amp;severity=high&amp;id=68b1f255ad5a09ad007a2862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52861-cwe-22-in-qnap-systems-inc-viostor-b8f2b5c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52861%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20VioStor&amp;severity=high&amp;id=68b1e445ad5a09ad0079b814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52856-cwe-287-in-qnap-systems-inc-viostor-75d48a55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52856%3A%20CWE-287%20in%20QNAP%20Systems%20Inc.%20VioStor&amp;severity=critical&amp;id=68b1e445ad5a09ad0079b811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44015-cwe-77-in-qnap-systems-inc-hybridde-be88b987</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44015%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20HybridDesk%20Station&amp;severity=low&amp;id=68b1e445ad5a09ad0079b80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33038-cwe-22-in-qnap-systems-inc-qsync-ce-29823e5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33038%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e445ad5a09ad0079b808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33037-cwe-22-in-qnap-systems-inc-qsync-ce-678e3cff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33037%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e445ad5a09ad0079b805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33036-cwe-22-in-qnap-systems-inc-qsync-ce-2da53637</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33036%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e444ad5a09ad0079b7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33033-cwe-22-in-qnap-systems-inc-qsync-ce-8db628c8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33033%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e444ad5a09ad0079b7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33032-cwe-22-in-qnap-systems-inc-qts-c926ee55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33032%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e444ad5a09ad0079b7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30278-cwe-295-in-qnap-systems-inc-qsync-c-b5b79e57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30278%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e444ad5a09ad0079b7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30277-cwe-295-in-qnap-systems-inc-qsync-c-960fe2c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30277%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e444ad5a09ad0079b7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30275-cwe-476-in-qnap-systems-inc-qsync-c-fb888f5d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30275%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68b1e444ad5a09ad0079b7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30274-cwe-476-in-qnap-systems-inc-qts-51b7c844</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30274%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e444ad5a09ad0079b7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30273-cwe-787-in-qnap-systems-inc-qts-95f1efe0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30273%3A%20CWE-787%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=68b1e444ad5a09ad0079b7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30272-cwe-476-in-qnap-systems-inc-qts-e65c4d48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30272%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e444ad5a09ad0079b7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30271-cwe-22-in-qnap-systems-inc-qts-8fa8ac0d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30271%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e444ad5a09ad0079b7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30270-cwe-22-in-qnap-systems-inc-qts-c4ccb0ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30270%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30268-cwe-476-in-qnap-systems-inc-qts-eff8c3ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30268%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30267-cwe-476-in-qnap-systems-inc-qts-23079d2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30267%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30265-cwe-120-in-qnap-systems-inc-qts-41fb2baa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30265%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=68b1e443ad5a09ad0079b7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30264-cwe-77-in-qnap-systems-inc-qts-25ff698b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30264%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30263-cwe-476-in-qnap-systems-inc-qsync-c-42dbee56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30263%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30262-cwe-476-in-qnap-systems-inc-qsync-c-ca41b617</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30262%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30261-cwe-770-in-qnap-systems-inc-qsync-c-2db278ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30261%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30260-cwe-770-in-qnap-systems-inc-qsync-c-8ccb6900</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30260%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29900-cwe-770-in-qnap-systems-inc-file-st-72c36d84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29900%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29899-cwe-770-in-qnap-systems-inc-file-st-e5f8aa97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29899%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29898-cwe-400-in-qnap-systems-inc-qsync-c-f7f254d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29898%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29894-cwe-89-in-qnap-systems-inc-qsync-ce-de0cde2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29894%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29893-cwe-89-in-qnap-systems-inc-qsync-ce-6a0a703a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29893%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e443ad5a09ad0079b79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29890-cwe-770-in-qnap-systems-inc-file-st-78862443</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29890%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68b1e443ad5a09ad0079b79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29889-cwe-476-in-qnap-systems-inc-file-st-cde82981</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29889%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29888-cwe-476-in-qnap-systems-inc-file-st-abfabd9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29888%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29887-cwe-77-in-qnap-systems-inc-qurouter-00143603</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29887%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=high&amp;id=68b1e443ad5a09ad0079b793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29886-cwe-476-in-qnap-systems-inc-file-st-dcebcdb8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29886%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29882-cwe-476-in-qnap-systems-inc-qts-8f8bd81b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29882%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b78d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29879-cwe-476-in-qnap-systems-inc-file-st-8625af85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29879%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e0bead5a09ad0079a9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29878-cwe-476-in-qnap-systems-inc-file-st-2178eeba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29878%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e0bead5a09ad0079a9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29875-cwe-476-in-qnap-systems-inc-file-st-0d340c45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29875%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68b1e0bead5a09ad0079a9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29874-cwe-476-in-qnap-systems-inc-file-st-4cc9ede6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29874%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e0bead5a09ad0079a9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22483-cwe-79-in-qnap-systems-inc-license--38584edf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22483%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20License%20Center&amp;severity=high&amp;id=68b1e0bead5a09ad0079a9da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9664-sql-injection-in-code-projects-simpl-e890dda4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9664%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1e0bead5a09ad0079a9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9663-sql-injection-in-code-projects-simpl-c4608da0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9663%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1e0bead5a09ad0079a9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-in-plain-sight-a-misconfigured-upload-path--9f2e7f27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20in%20plain%20sight%3A%20a%20misconfigured%20upload%20path%20that%20invited%20trouble&amp;severity=medium&amp;id=68b1dd54ad5a09ad0079983d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abandoned-sogou-zhuyin-update-server-hijacked-weap-18b0dc03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abandoned%20Sogou%20Zhuyin%20Update%20Server%20Hijacked%2C%20Weaponized%20in%20Taiwan%20Espionage%20Campaign&amp;severity=high&amp;id=68b1dd37ad5a09ad00799799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-disrupts-apt29-watering-hole-campaign-abusi-cf41d0ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Disrupts%20APT29%20Watering%20Hole%20Campaign%20Abusing%20Microsoft%20Device%20Code%20Authentication&amp;severity=high&amp;id=68b1dd37ad5a09ad00799795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-facebook-ads-install-brokewell-spyware-to-and-8c1da1cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Facebook%20Ads%20Install%20Brokewell%20Spyware%20to%20Android%20Users&amp;severity=medium&amp;id=68b1d9b3ad5a09ad0079825b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9662-sql-injection-in-code-projects-simpl-bd82cfd2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9662%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1d9c3ad5a09ad007982d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9660-sql-injection-in-sourcecodester-bake-fc857171</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9660%3A%20SQL%20Injection%20in%20SourceCodester%20Bakeshop%20Online%20Ordering%20System&amp;severity=medium&amp;id=68b1d9c3ad5a09ad007982d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9659-cross-site-scripting-in-o2oa-ca99dbe4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9659%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b1d2aead5a09ad00795e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9658-cross-site-scripting-in-o2oa-5d64307a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9658%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b1d2aead5a09ad00795e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55750-cwe-201-insertion-of-sensitive-info-98dc6343</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55750%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20gitpod-io%20gitpod&amp;severity=medium&amp;id=68b1cf29ad5a09ad0079437f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55177-cwe-863-in-facebook-whatsapp-deskto-20b30827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55177%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Facebook%20WhatsApp%20Desktop%20for%20Mac&amp;severity=medium&amp;id=68b1cf29ad5a09ad00794384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5808-cwe-1284-improper-validation-of-spec-5d4f4911</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5808%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20OpenText%20Self%20Service%20Password%20Reset&amp;severity=high&amp;id=68b1cba6ad5a09ad007921e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9657-cross-site-scripting-in-o2oa-e82063a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9657%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b1cba6ad5a09ad007921ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9656-cross-site-scripting-in-phpgurukul-d-bb802259</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9656%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=68b1cba6ad5a09ad007921e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-new-chaos-raas-group-attacks-20fa3357</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20the%20new%20Chaos%20RaaS%20group%20attacks&amp;severity=medium&amp;id=68b1c49cad5a09ad0079006c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-waifu-rat-a-ring3-malware-like-rat-based-on-llm-fb9f11d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Waifu%20RAT%3A%20A%20Ring3%20malware-like%20RAT%20based%20on%20LLM%20manipulation%20is%20circulating%20in%20the%20wild.&amp;severity=medium&amp;id=68b1c4a0ad5a09ad007900a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54877-cwe-863-incorrect-authorization-in--f255f169</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54877%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=68b1c49dad5a09ad0079008c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9655-cross-site-scripting-in-o2oa-d4e11a1e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9655%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b1c49dad5a09ad00790099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9654-command-injection-in-aiondadotcom-mc-82f2511c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9654%3A%20Command%20Injection%20in%20AiondaDotCom%20mcp-ssh&amp;severity=medium&amp;id=68b1c49dad5a09ad00790092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transunion-data-breach-44-million-us-consumers-dat-d69bcaf4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TransUnion%20Data%20Breach%3A%204.4%20Million%20US%20Consumers%E2%80%99%20Data%20Stolen&amp;severity=high&amp;id=68b1c116ad5a09ad0078da6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elastic-edr-0-day-part-2-technical-details-and-the-11ce8600</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Elastic%20EDR%200-day%3A%20Part%202%20-%20Technical%20Details%20and%20the%20Trigger&amp;severity=medium&amp;id=68b1bd96ad5a09ad0078bca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9653-cross-site-scripting-in-portabilis-i-c7e2be7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9653%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b1bd93ad5a09ad0078bc87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9652-cross-site-scripting-in-portabilis-i-79ac7bee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9652%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b1bd93ad5a09ad0078bc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9651-sql-injection-in-shafhasan-chatbox-93353ebd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9651%3A%20SQL%20Injection%20in%20shafhasan%20chatbox&amp;severity=medium&amp;id=68b1b68bad5a09ad00789c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9650-path-traversal-in-yeqifu-carrental-3392b3c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9650%3A%20Path%20Traversal%20in%20yeqifu%20carRental&amp;severity=medium&amp;id=68b1b68bad5a09ad00789c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-hankook-phantom-spear-phishing-campaign-37eebad3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20HanKook%20Phantom%3A%20Spear-Phishing%20Campaign&amp;severity=medium&amp;id=68b1c820ad5a09ad007910c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-first-ai-powered-ransomware-how-it-works-9345876e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20First%20AI-Powered%20Ransomware%20%26%20How%20It%20Works&amp;severity=medium&amp;id=68b1c820ad5a09ad007910b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9649-divide-by-zero-in-appneta-tcpreplay-e4388a6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9649%3A%20Divide%20By%20Zero%20in%20appneta%20tcpreplay&amp;severity=medium&amp;id=68b1af84ad5a09ad00780894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9647-cross-site-scripting-in-mtons-mblog-3e209a31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9647%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68b1a87cad5a09ad0077e768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9646-cross-site-scripting-in-o2oa-b38a1d82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9646%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b1a87cad5a09ad0077e760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9645-sql-injection-in-itsourcecode-apartm-29ed17d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9645%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b1a4f8ad5a09ad0077dbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9644-sql-injection-in-itsourcecode-apartm-eba9b317</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9644%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b1a4f8ad5a09ad0077dbdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hunting-laundry-bear-infrastructure-analysis-guide-686cc603</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hunting%20Laundry%20Bear%3A%20Infrastructure%20Analysis%20Guide%20and%20Findings&amp;severity=medium&amp;id=68b1c49cad5a09ad00790032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tamperedchef-malware-disguised-as-fake-pdf-editors-e303e66b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TamperedChef%20Malware%20Disguised%20as%20Fake%20PDF%20Editors%20Steals%20Credentials%20and%20Cookies&amp;severity=high&amp;id=68b19a6bad5a09ad00779f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feds-seize-64m-veriftools-fake-id-marketplace-but--7c3d08c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feds%20Seize%20%246.4M%20VerifTools%20Fake-ID%20Marketplace%2C%20but%20Operators%20Relaunch%20on%20New%20Domain&amp;severity=high&amp;id=68b19a6bad5a09ad00779f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9643-sql-injection-in-itsourcecode-apartm-6e2417e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9643%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b19a82ad5a09ad0077a000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40709-cwe-79-improper-neutralization-of-i-ca45dc00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40709%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b18fe0ad5a09ad00773ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40708-cwe-79-improper-neutralization-of-i-d7f744f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40708%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b18fe0ad5a09ad00773acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40707-cwe-79-improper-neutralization-of-i-2a123566</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40707%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b18fe0ad5a09ad00773ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40706-cwe-79-improper-neutralization-of-i-d958a865</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b18fe0ad5a09ad00773ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40705-cwe-79-improper-neutralization-of-i-0a9c7ee4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b19364ad5a09ad00775552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40704-cwe-79-improper-neutralization-of-i-9d668f04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b19364ad5a09ad0077554e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40703-cwe-79-improper-neutralization-of-i-2cc9d619</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b19364ad5a09ad0077554a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40702-cwe-79-improper-neutralization-of-i-7f827801</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b19364ad5a09ad00775546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9217-cwe-22-improper-limitation-of-a-path-95d15fe1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9217%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Revolution%20Slider%20Slider%20Revolution&amp;severity=medium&amp;id=68b188daad5a09ad00771278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13342-cwe-434-unrestricted-upload-of-file-d8afe7d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13342%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pluggabl%20Booster%20for%20WooCommerce%20%E2%80%93%20PDF%20Invoices%2C%20Abandoned%20Cart%2C%20Variation%20Swatches%20%26%20100%2B%20Tools&amp;severity=high&amp;id=699f6e50b7ef31ef0b59cbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cache-me-if-you-can-sitecore-experience-platform-c-afcac649</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cache%20Me%20If%20You%20Can%20(Sitecore%20Experience%20Platform%20Cache%20Poisoning%20to%20RCE)%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=68b17e4fad5a09ad0076ad20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4644-cwe-384-session-fixation-in-payload--0fd4d1f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4644%3A%20CWE-384%20Session%20Fixation%20in%20Payload%20CMS%20Payload&amp;severity=medium&amp;id=68b17e4cad5a09ad0076acf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4643-cwe-613-insufficient-session-expirat-85608e9f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4643%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Payload%20CMS%20Payload&amp;severity=medium&amp;id=68b17e4cad5a09ad0076acf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9071-cwe-780-use-of-rsa-algorithm-without-67b65483</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9071%3A%20CWE-780%20Use%20of%20RSA%20Algorithm%20without%20OEAP%20in%20Oberon%20microsystems%20AG%20Oberon%20PSA%20Crypto&amp;severity=low&amp;id=68b173c0ad5a09ad00763f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7383-cwe-208-observable-timing-discrepanc-ebf3b021</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7383%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Oberon%20microsystems%20AG%20Oberon%20PSA%20Crypto&amp;severity=medium&amp;id=68b173c0ad5a09ad00763f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7071-cwe-208-observable-timing-discrepanc-b462e84c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7071%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Oberon%20microsystems%20AG%20ocrypto&amp;severity=medium&amp;id=68b173c0ad5a09ad00763f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8150-cwe-79-improper-neutralization-of-in-d708c58f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8150%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Events%20Addon%20for%20Elementor&amp;severity=medium&amp;id=68b1d9c3ad5a09ad007982e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54777-uncaught-exception-in-konica-minolt-fda75d1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54777%3A%20Uncaught%20exception%20in%20Konica%20Minolta%2C%20Inc.%20Multiple%20products%20in%20bizhub%20series&amp;severity=medium&amp;id=68b14990ad5a09ad0074f10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9441-cwe-89-improper-neutralization-of-sp-de37540d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9441%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iatspaymentsdev%20iATS%20Online%20Forms&amp;severity=medium&amp;id=68b12d70ad5a09ad00741adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8290-cwe-79-improper-neutralization-of-in-2fd5c4db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8290%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weblineindia%20List%20Sub%20Pages&amp;severity=medium&amp;id=68b12d70ad5a09ad00741ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8619-cwe-79-improper-neutralization-of-in-ca33e804</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20garbowza%20OSM%20Map%20Widget%20for%20Elementor&amp;severity=medium&amp;id=68b12d70ad5a09ad00741ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9374-cwe-352-cross-site-request-forgery-c-f3068b31</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9374%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20briancolinger%20Ultimate%20Tag%20Warrior%20Importer&amp;severity=medium&amp;id=68b12d70ad5a09ad00741adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8147-cwe-285-improper-authorization-in-au-6efa4acf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8147%3A%20CWE-285%20Improper%20Authorization%20in%20aurelienlws%20LWSCache&amp;severity=medium&amp;id=68b12d70ad5a09ad00741acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53508-improper-neutralization-of-special--5ac72e38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53508%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20iND%20Co.%2CLtd%20HL330-DLS%20(for%20module%20MC7700)&amp;severity=high&amp;id=68b129ecad5a09ad00740d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53507-insecure-storage-of-sensitive-infor-fa1ba7ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53507%3A%20Insecure%20storage%20of%20sensitive%20information%20in%20iND%20Co.%2CLtd%20HL330-DLS%20(for%20module%20MC7700)&amp;severity=medium&amp;id=68b129ecad5a09ad00740d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9619-improper-control-of-resource-identif-75eb047d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9619%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20E4%20Sistemas%20Mercatus%20ERP&amp;severity=medium&amp;id=68b129ecad5a09ad00740d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9639-cwe-23-relative-path-traversal-in-ai-dfeeca8d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9639%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Ai3%20QbiCRMGateway&amp;severity=high&amp;id=68b122e4ad5a09ad0073d178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8858-cwe-89-improper-neutralization-of-sp-663c80fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8858%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Changing%20Clinic%20Image%20System&amp;severity=high&amp;id=68b122e4ad5a09ad0073d162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8857-cwe-798-use-of-hard-coded-credential-c3802259</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8857%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Changing%20Clinic%20Image%20System&amp;severity=critical&amp;id=68b122e4ad5a09ad0073d15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9610-sql-injection-in-code-projects-onlin-113d6e19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9610%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68b122e4ad5a09ad0073d171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9609-improper-authorization-in-portabilis-adecb29a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9609%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b122e4ad5a09ad0073d16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8861-cwe-306-missing-authentication-for-c-abe337fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8861%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Changing%20TSA&amp;severity=critical&amp;id=68b122e4ad5a09ad0073d166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9608-sql-injection-in-portabilis-i-educar-f46d53e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9608%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b11bdcad5a09ad0073ad51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9607-sql-injection-in-portabilis-i-educar-4d65b2b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9607%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b11bdcad5a09ad0073ad4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9606-sql-injection-in-portabilis-i-educar-dcb34ab4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9606%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b114d4ad5a09ad00735f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9605-stack-based-buffer-overflow-in-tenda-a93c764b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9605%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=critical&amp;id=68b10dcdad5a09ad00732fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58323-cwe-266-incorrect-privilege-assignm-02e2a5ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58323%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20NAVER%20NAVER%20MYBOX%20Explorer&amp;severity=high&amp;id=68b10dcdad5a09ad00732fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39247-vulnerability-in-hikvision-hikcentr-681b4337</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39247%3A%20Vulnerability%20in%20Hikvision%20HikCentral%20Professional&amp;severity=high&amp;id=68b10dcdad5a09ad00732fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39246-vulnerability-in-hikvision-hikcentr-0fc464b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39246%3A%20Vulnerability%20in%20Hikvision%20HikCentral%20FocSign&amp;severity=medium&amp;id=68b10dcdad5a09ad00732fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39245-vulnerability-in-hikvision-hikcentr-3886f35e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39245%3A%20Vulnerability%20in%20Hikvision%20HikCentral%20Master%20Lite&amp;severity=medium&amp;id=68b10dcdad5a09ad00732fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9604-use-of-hard-coded-cryptographic-key--3b240c3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9604%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20coze-studio&amp;severity=medium&amp;id=68b106c4ad5a09ad007273f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9603-command-injection-in-telesquare-tlr--6e88a518</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9603%3A%20Command%20Injection%20in%20Telesquare%20TLR-2005KSH&amp;severity=medium&amp;id=68b106c4ad5a09ad007273f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9602-improper-authorization-in-xinhu-rock-ce2f7e46</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9602%3A%20Improper%20Authorization%20in%20Xinhu%20RockOA&amp;severity=medium&amp;id=68b106c4ad5a09ad007273eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/loophole-allows-threat-actors-to-claim-vs-code-ext-744f0afc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Loophole%20allows%20threat%20actors%20to%20claim%20VS%20Code%20extension%20names&amp;severity=medium&amp;id=68b16cb9ad5a09ad00760ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9601-sql-injection-in-itsourcecode-apartm-dc843e2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9601%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b106c4ad5a09ad007273e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9600-sql-injection-in-itsourcecode-apartm-88c69031</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9600%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0f8baad5a09ad0071e455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9599-sql-injection-in-itsourcecode-apartm-8d3bcd05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9599%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0f8baad5a09ad0071e44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54554-an-app-may-be-able-to-access-sensit-7f24cd74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54554%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43187-running-an-hdiutil-command-may-unex-a6a54dc0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43187%3A%20Running%20an%20hdiutil%20command%20may%20unexpectedly%20execute%20arbitrary%20code%20in%20Apple%20macOS&amp;severity=high&amp;id=68b0f8baad5a09ad0071e43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43284-an-app-may-be-able-to-cause-unexpec-9adb57a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43284%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=68b0f8baad5a09ad0071e449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54568-parsing-a-maliciously-crafted-file--7377bc01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54568%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44271-an-app-may-be-able-to-record-the-sc-5df79ff1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44271%3A%20An%20app%20may%20be%20able%20to%20record%20the%20screen%20without%20an%20indicator%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb82ee6bfc5ba1df6ed23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43268-a-malicious-app-may-be-able-to-gain-8c7a39c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43268%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68b0f8baad5a09ad0071e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43255-an-app-may-be-able-to-cause-unexpec-1e4e774d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43255%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=low&amp;id=68b0f8baad5a09ad0071e441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40927-cwe-113-improper-neutralization-of--03295117</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40927%3A%20CWE-113%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20MANWAR%20CGI%3A%3ASimple&amp;severity=high&amp;id=68b0f8baad5a09ad0071e434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9598-sql-injection-in-itsourcecode-apartm-02c328d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9598%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0f1acad5a09ad0071979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9597-sql-injection-in-itsourcecode-apartm-f9216ea1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9597%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0f1acad5a09ad00719793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41471-na-cb6ae44b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41471%3A%20n%2Fa&amp;severity=high&amp;id=690849c42e0de603d533db57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-29-e648ac9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-29&amp;severity=medium&amp;id=68b2431ead5a09ad007c87d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa25-239a-countering-chinese-state-sponsored-actor-f720d128</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA25-239A%3A%20Countering%20Chinese%20State-Sponsored%20Actors%20Compromise%20of%20Networks%20Worldwide%20to%20Feed%20Global%20Espionage%20System&amp;severity=medium&amp;id=68b218efad5a09ad007b78b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56577-na-427225b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56577%3A%20n%2Fa&amp;severity=high&amp;id=68b203e4ad5a09ad007a8a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44033-na-be51fc25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44033%3A%20n%2Fa&amp;severity=critical&amp;id=68b1e445ad5a09ad0079b80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55763-na-a00b3405</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55763%3A%20n%2Fa&amp;severity=high&amp;id=68b1dd51ad5a09ad00799834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55580-na-850407f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55580%3A%20n%2Fa&amp;severity=medium&amp;id=68b1d9c3ad5a09ad007982ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55579-na-b951b3a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55579%3A%20n%2Fa&amp;severity=medium&amp;id=68b1d9c3ad5a09ad007982ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54142-cwe-444-inconsistent-interpretation-f1155168</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54142%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Akamai%20AkamaiGhost&amp;severity=medium&amp;id=68b0fc3dad5a09ad0071fa7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/link-up-lift-up-level-up-92c07918</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Link%20up%2C%20lift%20up%2C%20level%20up&amp;severity=medium&amp;id=68b16cb9ad5a09ad00760aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9596-sql-injection-in-itsourcecode-sports-cd11b93e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9596%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b0eaa5ad5a09ad0071776f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9595-cross-site-scripting-in-code-project-942840d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9595%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68b0eaa5ad5a09ad00717768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48979-vulnerability-in-ubiquiti-inc-uisp--1eb31c56</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48979%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UISP%20Application&amp;severity=low&amp;id=68b0e39cad5a09ad0070a7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9594-sql-injection-in-itsourcecode-apartm-cefd0662</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9594%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0e39cad5a09ad0070a7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9593-sql-injection-in-itsourcecode-apartm-ad148afb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9593%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0d910ad5a09ad00702700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58062-cwe-78-improper-neutralization-of-s-ef31b754</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58062%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LSTM-Kirigaya%20openmcp-client&amp;severity=high&amp;id=68b0d910ad5a09ad00702707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58061-cwe-200-exposure-of-sensitive-infor-596d7d4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58061%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20openebs%20rawfile-localpv&amp;severity=medium&amp;id=68b0d58dad5a09ad00700b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9592-sql-injection-in-itsourcecode-apartm-075db864</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9592%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0d58dad5a09ad00700b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9591-cross-site-scripting-in-zrlog-84dbfedc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9591%3A%20Cross%20Site%20Scripting%20in%20ZrLog&amp;severity=medium&amp;id=68b0d58dad5a09ad00700b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58058-cwe-770-allocation-of-resources-wit-8e38df7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58058%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ulikunitz%20xz&amp;severity=medium&amp;id=68b0d208ad5a09ad006ff0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9590-cross-site-scripting-in-weaver-e-mob-4734a279</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9590%3A%20Cross%20Site%20Scripting%20in%20Weaver%20E-Mobile%20Mobile%20Management%20Platform&amp;severity=medium&amp;id=68b0ce89ad5a09ad006fe03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9589-use-of-default-password-in-cudy-wr12-2b5cb351</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9589%3A%20Use%20of%20Default%20Password%20in%20Cudy%20WR1200EA&amp;severity=low&amp;id=68b0ce89ad5a09ad006fe038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9586-command-injection-in-comfast-cf-n1-6eaa47fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9586%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0c77dad5a09ad006fae93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9585-command-injection-in-comfast-cf-n1-02b518b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9585%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0c074ad5a09ad006f8562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9584-command-injection-in-comfast-cf-n1-6f6779ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9584%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0b96dad5a09ad006f4bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9583-command-injection-in-comfast-cf-n1-a2061ab3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9583%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0b96dad5a09ad006f4bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6203-cwe-770-allocation-of-resources-with-2234cdbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6203%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=68b0b26aad5a09ad006f2b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9582-command-injection-in-comfast-cf-n1-1d1d65d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9582%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0b26aad5a09ad006f2b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-citrix-and-git-flaws-to-kev-catalogue-am-aa8c6c0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Citrix%20and%20Git%20Flaws%20to%20KEV%20Catalogue%20Amid%20Active%20Exploitation&amp;severity=medium&amp;id=68b0aee4ad5a09ad006f1561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9581-command-injection-in-comfast-cf-n1-ae309721</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9581%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0b96dad5a09ad006f4bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9580-os-command-injection-in-lb-link-bl-x-c11b587e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9580%3A%20OS%20Command%20Injection%20in%20LB-LINK%20BL-X26&amp;severity=medium&amp;id=68b0b5e9ad5a09ad006f4136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9579-os-command-injection-in-lb-link-bl-x-f5eae0cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9579%3A%20OS%20Command%20Injection%20in%20LB-LINK%20BL-X26&amp;severity=medium&amp;id=68b0a454ad5a09ad006ef6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9577-use-of-default-credentials-in-totoli-caa4ab78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9577%3A%20Use%20of%20Default%20Credentials%20in%20TOTOLINK%20X2000R&amp;severity=low&amp;id=68b0a454ad5a09ad006ef6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/backdoor-in-appsuite-pdf-editor-a-detailed-technic-9aba761e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Backdoor%20in%20%22AppSuite%20PDF%20Editor%22%3A%20A%20Detailed%20Technical%20Analysis&amp;severity=medium&amp;id=68b0ab5bad5a09ad006f09a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31971-cwe-425-direct-request-forced-brows-4d715608</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31971%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20HCL%20Software%20AIML%20Solutions%20for%20SX&amp;severity=medium&amp;id=68b09d4cad5a09ad006ed78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9576-use-of-default-credentials-in-seeeds-d827c74a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9576%3A%20Use%20of%20Default%20Credentials%20in%20seeedstudio%20ReSpeaker&amp;severity=low&amp;id=68b09d4cad5a09ad006ed79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9575-os-command-injection-in-linksys-re62-bd851ab4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9575%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68b09d4cad5a09ad006ed795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9195-cwe-20-improper-input-validation-in--1720da1e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9195%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Solidigm%20D7-PS1010%2FD7-PS1030&amp;severity=medium&amp;id=68b09d4cad5a09ad006ed792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58059-cwe-78-improper-neutralization-of-s-50c741bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58059%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20valtimo-platform%20valtimo-backend-libraries&amp;severity=critical&amp;id=68b099c9ad5a09ad006eacd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58049-cwe-212-improper-removal-of-sensiti-dfff5727</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58049%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=68b099c9ad5a09ad006eacdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/200-swedish-municipalities-impacted-by-a-major-cyb-d677813a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=200%20Swedish%20municipalities%20impacted%20by%20a%20major%20cyberattack%20on%20IT%20provider&amp;severity=medium&amp;id=68b09643ad5a09ad006e9317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salt-typhoon-exploits-cisco-ivanti-palo-alto-flaws-6a192de2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salt%20Typhoon%20Exploits%20Cisco%2C%20Ivanti%2C%20Palo%20Alto%20Flaws%20to%20Breach%20600%20Organizations%20Worldwide&amp;severity=high&amp;id=68b09643ad5a09ad006e930f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/matlab-dev-says-ransomware-gang-stole-data-of-1000-378b035f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MATLAB%20dev%20says%20ransomware%20gang%20stole%20data%20of%2010%2C000%20people&amp;severity=high&amp;id=68b09643ad5a09ad006e9313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/passwordstate-dev-urges-users-to-patch-auth-bypass-b150a207</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Passwordstate%20dev%20urges%20users%20to%20patch%20auth%20bypass%20vulnerability&amp;severity=high&amp;id=68b092c0ad5a09ad006e76bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intercepting-ldap-with-interceptsuite-817b1ff5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intercepting%20LDAP%20With%20InterceptSuite&amp;severity=medium&amp;id=68b092d1ad5a09ad006e779e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58047-cwe-755-improper-handling-of-except-f170ba2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58047%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20plone%20volto&amp;severity=high&amp;id=68b092cead5a09ad006e7750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31979-cwe-434-unrestricted-upload-of-file-1d07abb5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31979%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20BigFix%20Service%20Management%20(SM)&amp;severity=medium&amp;id=68b08f3cad5a09ad006e6370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31977-cwe-311-missing-encryption-of-sensi-6b9fce28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31977%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20HCL%20Software%20BigFix%20Service%20Management%20(SM)&amp;severity=medium&amp;id=68b08f3cad5a09ad006e636d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31972-cwe-319-cleartext-transmission-of-s-790791b8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31972%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20HCL%20Software%20BigFix%20Service%20Management%20(SM)&amp;severity=medium&amp;id=68b08bb7ad5a09ad006e532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58335-cwe-356-in-jetbrains-junie-93dda2a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58335%3A%20CWE-356%20in%20JetBrains%20Junie&amp;severity=medium&amp;id=68b08bb7ad5a09ad006e5334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58334-cwe-862-in-jetbrains-ide-services-ba653bfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58334%3A%20CWE-862%20in%20JetBrains%20IDE%20Services&amp;severity=high&amp;id=68b08bb7ad5a09ad006e5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57819-cwe-89-improper-neutralization-of-s-24d09599</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57819%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20endpoint&amp;severity=critical&amp;id=68b08834ad5a09ad006e497e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25010-cwe-863-incorrect-authorization-in--f4612209</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25010%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=68b07dadad5a09ad006e0f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13986-cwe-434-unrestricted-upload-of-file-153698f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13986%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Nagios%20Nagios%20XI&amp;severity=high&amp;id=690a323af0ba78a05059954b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-developer-credentials-stolen-in-macos-6decc029</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Developer%20Credentials%20Stolen%20in%20macOS%20%E2%80%9Cs1ngularity%E2%80%9D%20Attack&amp;severity=medium&amp;id=68b0769fad5a09ad006deef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sliding-into-your-dms-abusing-microsoft-teams-for--06d3a0da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sliding%20into%20your%20DMs%3A%20Abusing%20Microsoft%20Teams%20for%20Malware%20Delivery&amp;severity=medium&amp;id=68b076b5ad5a09ad006defa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-nx-packages-in-s1ngularity-attack-leaked-ecc47ee8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Nx%20Packages%20in%20%E2%80%98s1ngularity%E2%80%99%20Attack%20Leaked%202%2C349%20GitHub%2C%20Cloud%2C%20and%20AI%20Credentials&amp;severity=high&amp;id=68b06f96ad5a09ad006dc036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/netherlands-confirms-chinas-salt-typhoon-targeted--0d07c91e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Netherlands%20Confirms%20China%E2%80%99s%20Salt%20Typhoon%20Targeted%20Small%20Dutch%20Telcos&amp;severity=high&amp;id=68b06f96ad5a09ad006dc03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transunion-suffers-data-breach-impacting-over-44-m-30a6548a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TransUnion%20suffers%20data%20breach%20impacting%20over%204.4%20million%20people&amp;severity=high&amp;id=68b06f96ad5a09ad006dc032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toath-campaign-exploits-end-of-support-software-to-ea07be08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TOATH%20Campaign%20Exploits%20End-of-Support%20Software%20to%20Target%20Traditional%20Chinese%20Users%20and%20Dissidents&amp;severity=medium&amp;id=68b0731aad5a09ad006dd3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8067-out-of-bounds-read-in-red-hat-red-ha-ff0f9003</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8067%3A%20Out-of-bounds%20Read%20in%20storaged-project%20udisks&amp;severity=high&amp;id=68b06fc4ad5a09ad006dc21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9578-cwe-732-in-acronis-acronis-cyber-pro-74e24b77</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9578%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=68b0650dad5a09ad006d6920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-appsuite-pdf-editor-spreads-tamperedchef-f1400b2e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Appsuite%20PDF%20Editor%20Spreads%20Tamperedchef%20Malware&amp;severity=medium&amp;id=68b05e04ad5a09ad006d2ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-us-and-allies-blame-three-chinese-tech-firms-fo-76ef53fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%2C%20US%20and%20Allies%20Blame%20Three%20Chinese%20Tech%20Firms%20for%20Global%20Cyberattacks&amp;severity=medium&amp;id=68b05a7ead5a09ad006d19c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chasing-the-silver-fox-cat-mouse-in-kernel-shadows-eccc98e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chasing%20the%20Silver%20Fox%3A%20Cat%20%26%20Mouse%20in%20Kernel%20Shadows&amp;severity=medium&amp;id=68b05a98ad5a09ad006d1a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58127-cwe-295-improper-certificate-valida-a16ce938</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58127%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=68b056fcad5a09ad006d0d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58126-cwe-295-improper-certificate-valida-0765a1fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58126%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=68b056fcad5a09ad006d0d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58125-cwe-295-improper-certificate-valida-65360ef3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58125%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=68b056fcad5a09ad006d0d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58124-cwe-295-improper-certificate-valida-afd544d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58124%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=68b056fcad5a09ad006d0d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58123-cwe-295-improper-certificate-valida-9de2f39b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58123%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=68b056fcad5a09ad006d0d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54742-cwe-502-deserialization-of-untruste-99ab55ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54742%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=68b05381ad5a09ad006cfd8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54738-cwe-288-authentication-bypass-using-b3f0bb02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54738%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20NooTheme%20Jobmonster&amp;severity=null&amp;id=68b05381ad5a09ad006cfd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54734-cwe-862-missing-authorization-in-bp-2083a4e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54734%3A%20Missing%20Authorization%20in%20bPlugins%20B%20Slider&amp;severity=null&amp;id=68b05381ad5a09ad006cfd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54733-cwe-862-missing-authorization-in-mi-f2a359f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54733%3A%20Missing%20Authorization%20in%20all_bootstrap_blocks%20All%20Bootstrap%20Blocks&amp;severity=null&amp;id=68b05381ad5a09ad006cfd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54731-cwe-94-improper-control-of-generati-82f92611</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54731%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20emarket-design%20YouTube%20Showcase&amp;severity=null&amp;id=68b05381ad5a09ad006cfd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54725-cwe-288-authentication-bypass-using-0acbab1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54725%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20uxper%20Golo&amp;severity=null&amp;id=68b05381ad5a09ad006cfd7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54724-cwe-79-improper-neutralization-of-i-68e9e57a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54724%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Golo&amp;severity=null&amp;id=68b05381ad5a09ad006cfd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54720-cwe-89-improper-neutralization-of-s-5f12e2ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54720%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SteelThemes%20Nest%20Addons&amp;severity=null&amp;id=68b05381ad5a09ad006cfd6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54716-cwe-98-improper-control-of-filename-65dcb93d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54716%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Ireca&amp;severity=null&amp;id=68b05381ad5a09ad006cfd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54714-cwe-862-missing-authorization-in-dy-5a3dfc17</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54714%3A%20Missing%20Authorization%20in%20Dylan%20James%20Zephyr%20Project%20Manager&amp;severity=null&amp;id=68b05381ad5a09ad006cfd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54710-cwe-862-missing-authorization-in-bp-732d9134</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54710%3A%20Missing%20Authorization%20in%20bPlugins%20Tiktok%20Feed&amp;severity=null&amp;id=68b05381ad5a09ad006cfd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54029-cwe-22-improper-limitation-of-a-pat-d6f86893</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54029%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20extendons%20WooCommerce%20csv%20import%20export&amp;severity=null&amp;id=68b05381ad5a09ad006cfd61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53588-cwe-22-improper-limitation-of-a-pat-80727f17</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53588%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20UPC%2FEAN%2FGTIN%20Code%20Generator&amp;severity=null&amp;id=68b05381ad5a09ad006cfd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53584-cwe-502-deserialization-of-untruste-0eb76c32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53584%3A%20Deserialization%20of%20Untrusted%20Data%20in%20emarket-design%20WP%20Ticket%20Customer%20Service%20Software%20%26%20Support%20Ticket%20System&amp;severity=null&amp;id=68b05381ad5a09ad006cfd5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53583-cwe-502-deserialization-of-untruste-43a38a66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53583%3A%20Deserialization%20of%20Untrusted%20Data%20in%20emarket-design%20Employee%20Spotlight&amp;severity=null&amp;id=68b05381ad5a09ad006cfd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53578-cwe-98-improper-control-of-filename-b1d21b45</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53578%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Kipso&amp;severity=null&amp;id=68b05381ad5a09ad006cfd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53576-cwe-98-improper-control-of-filename-7f527bda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53576%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Ovatheme%20Events&amp;severity=null&amp;id=68b05381ad5a09ad006cfd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53572-cwe-502-deserialization-of-untruste-c93e7ac1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53572%3A%20Deserialization%20of%20Untrusted%20Data%20in%20emarket-design%20WP%20Easy%20Contact&amp;severity=null&amp;id=68b05380ad5a09ad006cfd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53337-cwe-862-missing-authorization-in-as-9bdd9c22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53337%3A%20Missing%20Authorization%20in%20Ashan%20Perera%20LifePress&amp;severity=null&amp;id=68b05380ad5a09ad006cfd42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53334-cwe-98-improper-control-of-filename-7b91a752</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53334%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TieLabs%20Jannah&amp;severity=null&amp;id=68b05380ad5a09ad006cfd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53328-cwe-98-improper-control-of-filename-c9997941</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53328%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Opinion%20Stage%20Poll%2C%20Survey%20%26%20Quiz%20Maker%20Plugin%20by%20Opinion%20Stage&amp;severity=null&amp;id=68b05380ad5a09ad006cfd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53326-cwe-98-improper-control-of-filename-ad44f94f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodeYatri%20Gutenify&amp;severity=null&amp;id=68b05380ad5a09ad006cfd39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53289-cwe-79-improper-neutralization-of-i-e9f631bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jason%20Theme%20Blvd%20Widget%20Areas&amp;severity=null&amp;id=68b05380ad5a09ad006cfd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53248-cwe-98-improper-control-of-filename-8a4f6683</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53248%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magazine&amp;severity=null&amp;id=68b05380ad5a09ad006cfd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53247-cwe-98-improper-control-of-filename-3a1c7a46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53247%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpinterface%20BlogMarks&amp;severity=null&amp;id=68b05380ad5a09ad006cfd30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53244-cwe-98-improper-control-of-filename-128ef7a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53244%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magazine%20Elite&amp;severity=null&amp;id=68b05380ad5a09ad006cfd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53243-cwe-502-deserialization-of-untruste-2252a073</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53243%3A%20Deserialization%20of%20Untrusted%20Data%20in%20emarket-design%20Employee%20Directory%20%E2%80%93%20Staff%20Listing%20%26amp%3B%20Team%20Directory%20Plugin%20for%20WordPress&amp;severity=null&amp;id=68b05380ad5a09ad006cfd2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53230-cwe-862-missing-authorization-in-ho-84c6c778</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53230%3A%20Missing%20Authorization%20in%20honzat%20Page%20Manager%20for%20Elementor&amp;severity=null&amp;id=68b05380ad5a09ad006cfd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53227-cwe-98-improper-control-of-filename-78dc10b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53227%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magazine%20Saga&amp;severity=null&amp;id=68b05380ad5a09ad006cfd1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53225-cwe-79-improper-neutralization-of-i-b65b3378</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53225%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eboekhouden%20e-Boekhouden.nl&amp;severity=null&amp;id=68b05380ad5a09ad006cfd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53224-cwe-79-improper-neutralization-of-i-ca150c94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53224%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Koen%20Schuit%20NextGEN%20Gallery%20Search&amp;severity=null&amp;id=68b05380ad5a09ad006cfd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53223-cwe-79-improper-neutralization-of-i-4e0e81f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53223%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20undoIT%20Theme%20Switcher%20Reloaded&amp;severity=null&amp;id=68b05380ad5a09ad006cfd11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53220-cwe-79-improper-neutralization-of-i-f0ff99d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53220%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20XmasB%20XmasB%20Quotes&amp;severity=null&amp;id=68b05380ad5a09ad006cfd0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53216-cwe-98-improper-control-of-filename-56ee5e22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53216%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themeuniver%20Glamer&amp;severity=null&amp;id=68b05380ad5a09ad006cfd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53215-cwe-79-improper-neutralization-of-i-3a59f642</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53215%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208bitkid%20Yahoo!%20WebPlayer&amp;severity=null&amp;id=68b05380ad5a09ad006cfd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52761-cwe-502-deserialization-of-untruste-698ac8a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52761%3A%20Deserialization%20of%20Untrusted%20Data%20in%20manfcarlo%20WP%20Funnel%20Manager&amp;severity=null&amp;id=68b05380ad5a09ad006cfd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49407-cwe-79-improper-neutralization-of-i-777de832</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49407%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez&amp;severity=high&amp;id=68b05380ad5a09ad006cfd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49405-cwe-98-improper-control-of-filename-ec0fcbaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49405%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Favethemes%20Houzez&amp;severity=high&amp;id=68b0537fad5a09ad006cfcf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49404-cwe-89-improper-neutralization-of-s-967bcf6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49404%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20purethemes%20Listeo%20Core&amp;severity=null&amp;id=68b0537fad5a09ad006cfcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49402-cwe-862-missing-authorization-in-fa-66a67b65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49402%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scriptsbundle%20Exertio%20Framework&amp;severity=null&amp;id=68b0537fad5a09ad006cfcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49388-cwe-266-incorrect-privilege-assignm-5da84fdb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49388%3A%20Incorrect%20Privilege%20Assignment%20in%20kamleshyadav%20Miraculous%20Core%20Plugin&amp;severity=null&amp;id=68b0537fad5a09ad006cfcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49387-cwe-434-unrestricted-upload-of-file-1ff78201</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49387%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20add-ons.org%20Drag%20and%20Drop%20File%20Upload%20for%20Elementor%20Forms&amp;severity=null&amp;id=68b0537fad5a09ad006cfce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49383-cwe-98-improper-control-of-filename-c9bb2950</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CocoBasic%20Neresa&amp;severity=null&amp;id=68b0537fad5a09ad006cfce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48365-cwe-79-improper-neutralization-of-i-f6684c84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48365%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imaprogrammer%20Custom%20Comment&amp;severity=null&amp;id=68b0537fad5a09ad006cfce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48364-cwe-918-server-side-request-forgery-afaea58d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48364%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vEnCa-X%20rajce&amp;severity=null&amp;id=68b0537fad5a09ad006cfce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48363-cwe-352-cross-site-request-forgery--d1cccaf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48363%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Metin%20Sara%C3%A7%20Popup%20for%20CF7%20with%20Sweet%20Alert&amp;severity=null&amp;id=68b0537fad5a09ad006cfcdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48362-cwe-352-cross-site-request-forgery--c51f8a0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48362%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saeed%20Sattar%20Beglou%20Hesabfa%20Accounting&amp;severity=null&amp;id=68b0537fad5a09ad006cfcda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48361-cwe-201-insertion-of-sensitive-info-7cf922e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48361%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Saeed%20Sattar%20Beglou%20Hesabfa%20Accounting&amp;severity=null&amp;id=68b0537ead5a09ad006cfccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48360-cwe-79-improper-neutralization-of-i-3926717e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Razvan%20Stanga%20Varnish%2FNginx%20Proxy%20Caching&amp;severity=null&amp;id=68b0537ead5a09ad006cfcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48359-cwe-352-cross-site-request-forgery--1affb4f3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48359%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20thaihavnn07%20ATT%20YouTube%20Widget&amp;severity=null&amp;id=68b0537ead5a09ad006cfcc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48358-cwe-79-improper-neutralization-of-i-b1b07a42</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20everythingwp%20Risk%20Free%20Cash%20On%20Delivery%20(COD)%20%26%238211%3B%20WooCommerce&amp;severity=null&amp;id=68b0537ead5a09ad006cfcc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48357-cwe-352-cross-site-request-forgery--686a7e45</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48357%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Theme%20Century%20Century%20ToolKit&amp;severity=null&amp;id=68b0537ead5a09ad006cfcc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48356-cwe-79-improper-neutralization-of-i-ad10bed2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Isra%20Kanpress&amp;severity=null&amp;id=68b0537ead5a09ad006cfcbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48354-cwe-79-improper-neutralization-of-i-519a4618</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Smart%20Widgets%20Better%20Post%20%26%20Filter%20Widgets%20for%20Elementor&amp;severity=null&amp;id=68b0537ead5a09ad006cfcbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48353-cwe-352-cross-site-request-forgery--02dc221b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48353%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dactum%20Clickbank%20WordPress%20Plugin%20(Niche%20Storefront)&amp;severity=null&amp;id=68b0537ead5a09ad006cfcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48352-cwe-79-improper-neutralization-of-i-837bdc8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sitesearch-yandex%20Yandex%20Site%20search%20pinger&amp;severity=null&amp;id=68b0537ead5a09ad006cfcb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48351-cwe-352-cross-site-request-forgery--1825180c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48351%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PluginsPoint%20Kento%20Splash%20Screen&amp;severity=null&amp;id=68b0537ead5a09ad006cfcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48350-cwe-862-missing-authorization-in-ne-9ba95ece</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48350%3A%20Missing%20Authorization%20in%20Basar%20Ventures%20AutoWP&amp;severity=null&amp;id=68b0537ead5a09ad006cfca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48349-cwe-79-improper-neutralization-of-i-27fbc73f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20origincode%20Video%20Gallery%20%E2%80%93%20Vimeo%20and%20YouTube%20Gallery&amp;severity=null&amp;id=68b0537ead5a09ad006cfca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48348-cwe-266-incorrect-privilege-assignm-40ab0a73</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48348%3A%20Incorrect%20Privilege%20Assignment%20in%20chandrashekharsahu%20Site%20Offline&amp;severity=null&amp;id=68b0537ead5a09ad006cfc9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48347-cwe-79-improper-neutralization-of-i-94e0b54e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vincent%20Mimoun-Prat%20bxSlider%20integration%20for%20WordPress&amp;severity=null&amp;id=68b0537ead5a09ad006cfc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48343-cwe-352-cross-site-request-forgery--f2f08004</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aaron%20Axelsen%20WPMU%20Ldap%20Authentication&amp;severity=null&amp;id=68b0537ead5a09ad006cfc99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48327-cwe-862-missing-authorization-in-in-c8fc5bd5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48327%3A%20Missing%20Authorization%20in%20inkthemes%20WP%20Mailgun%20SMTP&amp;severity=null&amp;id=68b0537ead5a09ad006cfc96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48325-cwe-352-cross-site-request-forgery--fe579598</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48325%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shmish111%20WP%20Admin%20Theme&amp;severity=null&amp;id=68b0537ead5a09ad006cfc93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48324-cwe-79-improper-neutralization-of-i-5efe689b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20khashabawy%20tli.tl%20auto%20Twitter%20poster&amp;severity=null&amp;id=68b0537ead5a09ad006cfc90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48323-cwe-79-improper-neutralization-of-i-5ce08a7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Md%20Abunaser%20Khan%20Advance%20Food%20Menu&amp;severity=null&amp;id=68b0537ead5a09ad006cfc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48322-cwe-79-improper-neutralization-of-i-afd2cbe1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Finn%20Dohrn%20Statify%20Widget&amp;severity=null&amp;id=68b0537ead5a09ad006cfc8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48321-cwe-352-cross-site-request-forgery--e844b2b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48321%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dyiosah%20Ultimate%20twitter%20profile%20widget&amp;severity=null&amp;id=68b0537dad5a09ad006cfc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48320-cwe-352-cross-site-request-forgery--8fdd9c82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48320%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=null&amp;id=68b0537dad5a09ad006cfc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48319-cwe-79-improper-neutralization-of-i-f05e43fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48319%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gslauraspeck%20Mesa%20Mesa%20Reservation%20Widget&amp;severity=null&amp;id=68b0537dad5a09ad006cfc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48318-cwe-352-cross-site-request-forgery--2831e7bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48318%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=null&amp;id=68b0537dad5a09ad006cfc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48316-cwe-79-improper-neutralization-of-i-ed3d2518</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ItayXD%20Responsive%20Mobile-Friendly%20Tooltip&amp;severity=null&amp;id=68b0537dad5a09ad006cfc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48315-cwe-79-improper-neutralization-of-i-d821a697</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48315%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stanton119%20WordPress%20HTML&amp;severity=null&amp;id=68b0537dad5a09ad006cfc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48314-cwe-79-improper-neutralization-of-i-67503e95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48314%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salubrio%20Add%20Code%20To%20Head&amp;severity=null&amp;id=68b0537dad5a09ad006cfc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48313-cwe-79-improper-neutralization-of-i-3c93b780</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48313%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevin%20heath%20Tripadvisor%20Shortcode&amp;severity=null&amp;id=68b0537dad5a09ad006cfc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48312-cwe-79-improper-neutralization-of-i-bdb965b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48312%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%E6%96%87%E6%B4%BE%E7%BF%BB%E8%AF%91%EF%BC%88WP%20Chinese%20Translation%EF%BC%89%20WPAvatar&amp;severity=null&amp;id=68b0537dad5a09ad006cfc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48311-cwe-352-cross-site-request-forgery--34fbdaa8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48311%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OffClicks%20Invisible%20Optin&amp;severity=null&amp;id=68b0537dad5a09ad006cfc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48310-cwe-352-cross-site-request-forgery--a7886aef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48310%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wptableeditor%20Table%20Editor&amp;severity=null&amp;id=68b0537dad5a09ad006cfc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48309-cwe-352-cross-site-request-forgery--e9558ad3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48309%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20web-able%20BetPress&amp;severity=null&amp;id=68b0537dad5a09ad006cfc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48308-cwe-352-cross-site-request-forgery--a68f4223</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48308%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nonletter%20Newsletter%20subscription%20optin%20module&amp;severity=null&amp;id=68b0537dad5a09ad006cfc4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48307-cwe-352-cross-site-request-forgery--4f3b2437</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48307%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kasonzhao%20SEO%20For%20Images&amp;severity=null&amp;id=68b0537dad5a09ad006cfc4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48306-cwe-352-cross-site-request-forgery--887f7bf2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48306%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20developers%20savyour%20Savyour%20Affiliate%20Partner&amp;severity=null&amp;id=68b0537dad5a09ad006cfc49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48305-cwe-79-improper-neutralization-of-i-5506d4f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vikingjs%20Goal%20Tracker%20for%20Patreon&amp;severity=null&amp;id=68b0537dad5a09ad006cfc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48304-cwe-352-cross-site-request-forgery--11044422</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48304%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Gary%20Illyes%20Google%20XML%20News%20Sitemap%20plugin&amp;severity=null&amp;id=68b0537dad5a09ad006cfc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48110-cwe-79-improper-neutralization-of-i-6734f52c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48110%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mibuthu%20Link%20View&amp;severity=null&amp;id=68b0537dad5a09ad006cfc40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48109-cwe-352-cross-site-request-forgery--3638d9ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48109%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Xavier%20Media%20XM-Backup&amp;severity=null&amp;id=68b0537dad5a09ad006cfc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48100-cwe-94-improper-control-of-generati-e7d75ff0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48100%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20extremeidea%20bidorbuy%20Store%20Integrator&amp;severity=null&amp;id=68b0537dad5a09ad006cfc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-big-sleep-ai-detection-tool-finds-critical--401c1f6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Big%20Sleep%20AI%20Detection%20Tool%20Finds%20Critical%209.8%20Chrome%20Vulnerability&amp;severity=critical&amp;id=68b04c6fad5a09ad006cda89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39496-cwe-89-improper-neutralization-of-s-fedcb194</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39496%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WBW%20WooBeWoo%20Product%20Filter%20Pro&amp;severity=critical&amp;id=68b041e6ad5a09ad006c7cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9376-cwe-863-incorrect-authorization-in-s-f9528b97</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9376%3A%20CWE-863%20Incorrect%20Authorization%20in%20sminozzi%20Block%20Bad%20Bots%20and%20Stop%20Bad%20Bots%20Crawlers%20and%20Spiders%20and%20Anti%20Spam%20Protection&amp;severity=medium&amp;id=68b03addad5a09ad006c4c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-covert-dual-mode-backdoor-threat-fa74959e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Covert%20Dual-Mode%20Backdoor%20Threat&amp;severity=medium&amp;id=68b05a98ad5a09ad006d1a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55175-cwe-79-improper-neutralization-of-i-2f3a98d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55175%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54544-cwe-79-improper-neutralization-of-i-15338fe3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54544%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54543-cwe-79-improper-neutralization-of-i-88460a14</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54543%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54542-cwe-598-use-of-get-request-method-w-49ea03fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54542%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54541-cwe-352-cross-site-request-forgery--0633ad35</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54541%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54540-cwe-79-improper-neutralization-of-i-df814bb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48963-cwe-610-in-acronis-acronis-cyber-pr-ff1e201a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48963%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=68b02948ad5a09ad006bd635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freepbx-servers-hacked-via-zero-day-emergency-fix--8cdc98e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FreePBX%20servers%20hacked%20via%20zero-day%2C%20emergency%20fix%20released&amp;severity=critical&amp;id=68b0223fad5a09ad006b9782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-0501-hackers-shift-to-ransomware-attacks-in--0b3a2a79</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-0501%20hackers%20shift%20to%20ransomware%20attacks%20in%20the%20cloud&amp;severity=high&amp;id=68b0223fad5a09ad006b9786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58081-use-of-hard-coded-password-in-dos-c-daa306b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58081%3A%20Use%20of%20hard-coded%20password%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=high&amp;id=68b017b8ad5a09ad006b3c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58072-improper-limitation-of-a-pathname-t-f88a76e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58072%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=high&amp;id=68b017b8ad5a09ad006b3bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54819-improper-limitation-of-a-pathname-t-2ddae70f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54819%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=medium&amp;id=68b017b8ad5a09ad006b3bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54762-unrestricted-upload-of-file-with-da-29f090e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54762%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=critical&amp;id=68b017b8ad5a09ad006b3bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53970-unrestricted-upload-of-file-with-da-d2bad5d1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53970%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=critical&amp;id=68b017b8ad5a09ad006b3bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53396-incorrect-permission-assignment-for-4795482e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53396%3A%20Incorrect%20permission%20assignment%20for%20critical%20resource%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=high&amp;id=68b017b8ad5a09ad006b3bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52460-files-or-directories-accessible-to--a5e984cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52460%3A%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=medium&amp;id=68b017b8ad5a09ad006b3bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46409-inadequate-encryption-strength-in-d-a342d5d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46409%3A%20Inadequate%20encryption%20strength%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=high&amp;id=68b017b8ad5a09ad006b3be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58322-cwe-266-incorrect-privilege-assignm-4acb22f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58322%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20NAVER%20NAVER%20MYBOX%20Explorer&amp;severity=high&amp;id=68b010acad5a09ad006b00c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6255-cwe-79-improper-neutralization-of-in-8d9ab581</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6255%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugincy%20Dynamic%20AJAX%20Product%20Filters%20for%20WooCommerce&amp;severity=medium&amp;id=68affb97ad5a09ad006a13c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8073-cwe-79-improper-neutralization-of-in-f0b3620f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugincy%20Dynamic%20AJAX%20Product%20Filters%20for%20WooCommerce&amp;severity=medium&amp;id=68affb97ad5a09ad006a13cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7956-cwe-862-missing-authorization-in-wpd-96d21041</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7956%3A%20CWE-862%20Missing%20Authorization%20in%20wpdreams%20Ajax%20Search%20Lite%20%E2%80%93%20Live%20Search%20%26%20Filter&amp;severity=medium&amp;id=68afea00ad5a09ad006937b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13807-cwe-200-exposure-of-sensitive-infor-93bb4d3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13807%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xagio%20Xagio%20SEO%20%E2%80%93%20AI%20Powered%20SEO&amp;severity=high&amp;id=699f6d16b7ef31ef0b56dcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7955-cwe-287-improper-authentication-in-p-86d9cc73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7955%3A%20CWE-287%20Improper%20Authentication%20in%20pbmacintyre%20RingCentral%20Communications%20Plugin%20%E2%80%93%20FREE&amp;severity=critical&amp;id=68afea00ad5a09ad006937ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8977-cwe-89-improper-neutralization-of-sp-1a8f8d2e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8977%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mra13%20Simple%20Download%20Monitor&amp;severity=medium&amp;id=68afdbf0ad5a09ad0068ddf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9345-cwe-22-improper-limitation-of-a-path-de2ad3b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9345%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20softdiscover%20File%20Manager%2C%20Code%20Editor%2C%20and%20Backup%20by%20Managefy&amp;severity=medium&amp;id=68afd4e9ad5a09ad0068abaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9346-cwe-79-improper-neutralization-of-in-67a09978</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9346%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=68afd4e9ad5a09ad0068abb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9648-cwe-434-unrestricted-upload-of-file--56d04c57</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9648%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Ulike%20WP%20ULike%20Pro&amp;severity=medium&amp;id=699f6b56b7ef31ef0b553087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8603-cwe-79-improper-neutralization-of-in-973d5d31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8603%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=68afd4e9ad5a09ad0068abaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0951-cwe-862-missing-authorization-in-liq-79dacdd5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0951%3A%20CWE-862%20Missing%20Authorization%20in%20LiquidThemes%20AI%20Hub%20-%20Startup%20%26%20Technology%20WordPress%20Theme&amp;severity=medium&amp;id=68afd4e9ad5a09ad0068aba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36003-cwe-209-generation-of-error-message-f10ee358</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36003%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Security%20Verify%20Governance%20Identity%20Manager&amp;severity=high&amp;id=68afbc4cad5a09ad00682522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7812-cwe-352-cross-site-request-forgery-c-fef51e82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7812%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20videowhisper%20Video%20Share%20VOD%20%E2%80%93%20Turnkey%20Video%20Site%20Builder%20Script&amp;severity=high&amp;id=68afbc4cad5a09ad00682525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8897-cwe-79-improper-neutralization-of-in-fe2ad9c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=68afbc4cad5a09ad0068252b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9344-cwe-79-improper-neutralization-of-in-31067c92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9344%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=68afbc4cad5a09ad0068252f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9352-cwe-79-improper-neutralization-of-in-a132693e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pronamic%20Pronamic%20Google%20Maps&amp;severity=medium&amp;id=68afbc4cad5a09ad00682534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-28-1b652345</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-28&amp;severity=medium&amp;id=68b0f19ead5a09ad007192b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57219-na-b175077b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57219%3A%20n%2Fa&amp;severity=medium&amp;id=68b0a7d8ad5a09ad006f0175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57220-na-54645143</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57220%3A%20n%2Fa&amp;severity=medium&amp;id=68b0a7d8ad5a09ad006f0172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57215-na-9a26206a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57215%3A%20n%2Fa&amp;severity=high&amp;id=68b0a7d8ad5a09ad006f016e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57218-na-6e9ad413</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57218%3A%20n%2Fa&amp;severity=medium&amp;id=68b09669ad5a09ad006e93e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57217-na-bade6ae7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57217%3A%20n%2Fa&amp;severity=medium&amp;id=68b092cead5a09ad006e774d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51643-na-b7b93f94</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51643%3A%20n%2Fa&amp;severity=low&amp;id=68b07dadad5a09ad006e0f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29364-na-4cbba1f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29364%3A%20n%2Fa&amp;severity=medium&amp;id=68b076b2ad5a09ad006def9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56236-na-592aacc8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56236%3A%20n%2Fa&amp;severity=medium&amp;id=68b0731bad5a09ad006dd424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55583-na-cc15e546</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55583%3A%20n%2Fa&amp;severity=critical&amp;id=68b06c1aad5a09ad006da24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52054-na-db5602c8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52054%3A%20n%2Fa&amp;severity=medium&amp;id=68b06c1aad5a09ad006da248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51972-na-92f7c518</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51972%3A%20n%2Fa&amp;severity=medium&amp;id=68b06187ad5a09ad006d54c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51971-na-0415e08c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51971%3A%20n%2Fa&amp;severity=medium&amp;id=68b06187ad5a09ad006d54c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51969-na-8edcf212</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51969%3A%20n%2Fa&amp;severity=medium&amp;id=68b05e04ad5a09ad006d2fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51968-na-e9fea0f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51968%3A%20n%2Fa&amp;severity=medium&amp;id=68b05e04ad5a09ad006d2fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51967-na-84086301</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51967%3A%20n%2Fa&amp;severity=medium&amp;id=68b05e04ad5a09ad006d2fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-ai-powered-ransomware-promptlock-targets-win-34d86c3f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20AI-Powered%20Ransomware%20PromptLock%20Targets%20Windows%2C%20Linux%20and%20macOS&amp;severity=medium&amp;id=68af840cad5a09ad00667d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13979-cwe-89-improper-neutralization-of-s-3248fd16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13979%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Hangzhou%20Shengqiao%20Technology%20Co.%20Ltd.%20St.%20Joe%20ERP%20System%20(%22%E5%9C%A3%E4%B9%94ERP%E7%B3%BB%E7%BB%9F%22)&amp;severity=critical&amp;id=692a23934c03a75d3feb2747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13982-cwe-22-improper-limitation-of-a-pat-d1516b0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13982%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Changsha%20SPON%20Communication%20Technology%20Co.%20Ltd.%20SPON%20IP%20Network%20Broadcast%20System&amp;severity=high&amp;id=691f4e5838b88f02b519166a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7308-cwe-306-missing-authentication-for-c-1296e864</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7308%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NSFOCUS%20SecGate3600%20Firewall&amp;severity=high&amp;id=691f4e5838b88f02b5191665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13980-cwe-502-deserialization-of-untruste-b8dc7a82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13980%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20H3C%20Group%20Intelligent%20Management%20Center%20(iMC)&amp;severity=critical&amp;id=69a979570e5bba37cad8c287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34163-cwe-434-unrestricted-upload-of-file-aab9cd41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34163%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Qingdao%20Dongsheng%20Weiye%20Software%20Co.%2C%20Ltd.%20Dongsheng%20Logistics%20Software&amp;severity=critical&amp;id=68af7981ad5a09ad006645b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34162-cwe-89-improper-neutralization-of-s-83138d00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34162%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Feijiu%20Medical%20Technology%20Co.%2C%20Ltd.%20Bian%20Que%20Feijiu%20Intelligent%20Emergency%20and%20Quality%20Control%20System&amp;severity=critical&amp;id=68af7981ad5a09ad006645b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34160-cwe-78-improper-neutralization-of-s-a8442585</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34160%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shanghai%20Aishu%20Information%20Technology%20Co.%2C%20Ltd.%20AnyShare&amp;severity=critical&amp;id=68af7981ad5a09ad006645aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34520-cwe-288-authentication-bypass-using-0b030376</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34520%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Arcserve%20Unified%20Data%20Protection%20(UDP)&amp;severity=high&amp;id=68af7981ad5a09ad006645bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34521-cwe-79-improper-neutralization-of-i-fffb0b7d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Arcserve%20Unified%20Data%20Protection%20(UDP)&amp;severity=medium&amp;id=68af7981ad5a09ad006645bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34522-cwe-122-heap-based-buffer-overflow--7c4c1f06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34522%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Arcserve%20Unified%20Data%20Protection%20(UDP)&amp;severity=critical&amp;id=68af7981ad5a09ad006645c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34523-cwe-122-heap-based-buffer-overflow--1f0a1ed1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34523%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Arcserve%20Unified%20Data%20Protection%20(UDP)&amp;severity=critical&amp;id=68af7981ad5a09ad006645c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-28000-citrix-devices-vulnerable-to-new-exploi-43ebdf95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2028%2C000%20Citrix%20devices%20vulnerable%20to%20new%20exploited%20RCE%20flaw&amp;severity=high&amp;id=68af6ef4ad5a09ad00661659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-is-the-group-thats-been-swatting-us-universit-b8004a3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20Is%20the%20Group%20That&apos;s%20Been%20Swatting%20US%20Universities&amp;severity=high&amp;id=68af6ef4ad5a09ad00661661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-salt-typhoon-hacking-campaigns-linked-to-ch-af32a32a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Salt%20Typhoon%20hacking%20campaigns%20linked%20to%20Chinese%20tech%20firms&amp;severity=high&amp;id=68af6ef4ad5a09ad0066165d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40779-cwe-476-null-pointer-dereference-in-bacb9bcc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40779%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20ISC%20Kea&amp;severity=high&amp;id=68af6b74ad5a09ad0065fbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/it-system-supplier-cyberattack-impacts-200-municip-08a2280d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IT%20system%20supplier%20cyberattack%20impacts%20200%20municipalities%20in%20Sweden&amp;severity=high&amp;id=68af6468ad5a09ad0065d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-steal-1-million-in-crypto-using-fake-delt-4884377a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Steal%20%241%20Million%20in%20Crypto%20Using%20Fake%20Delta%20and%20AMC%20Sites&amp;severity=medium&amp;id=68af6468ad5a09ad0065d94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zipline-phishing-campaign-targets-us-manufacturing-a05ab842</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZipLine%20Phishing%20Campaign%20Targets%20U.S.%20Manufacturing&amp;severity=medium&amp;id=68af59dead5a09ad00657647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58050-cwe-125-out-of-bounds-read-in-pcre2-648cfd5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58050%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PCRE2Project%20pcre2&amp;severity=medium&amp;id=68af565cad5a09ad0065587f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-and-scattered-spider-linked-to-farmer-59019c2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20and%20Scattered%20Spider%20Linked%20to%20Farmers%20Insurance%20Data%20Breach&amp;severity=high&amp;id=68af44c4ad5a09ad0064ab65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58218-cwe-502-deserialization-of-untruste-7b8a11bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58218%3A%20Deserialization%20of%20Untrusted%20Data%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20USPS%20Edition&amp;severity=null&amp;id=68af44dead5a09ad0064ac5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58217-cwe-352-cross-site-request-forgery--87a618ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58217%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20GeroNikolov%20Instant%20Breaking%20News&amp;severity=null&amp;id=68af44dead5a09ad0064ac5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58216-cwe-79-improper-neutralization-of-i-b3e47194</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58216%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20Thumbtack%20Review%20Slider&amp;severity=null&amp;id=68af44dead5a09ad0064ac58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58213-cwe-79-improper-neutralization-of-i-49771c56</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58213%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ameliabooking%20Booking%20System%20Trafft&amp;severity=null&amp;id=68af44dead5a09ad0064ac55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58212-cwe-79-improper-neutralization-of-i-473c9975</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58212%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20epeken%20Epeken%20All%20Kurir&amp;severity=null&amp;id=68af44dead5a09ad0064ac52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58211-cwe-79-improper-neutralization-of-i-e6ad24e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58211%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexvtn%20Chatbox%20Manager&amp;severity=null&amp;id=68af44dead5a09ad0064ac4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58209-cwe-79-improper-neutralization-of-i-f514e16e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58209%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rtCamp%20Transcoder&amp;severity=null&amp;id=68af44dead5a09ad0064ac4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58208-cwe-79-improper-neutralization-of-i-8cf06855</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58208%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20add-ons.org%20PDF%20for%20Elementor%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=null&amp;id=68af44dead5a09ad0064ac49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58205-cwe-79-improper-neutralization-of-i-27035ac2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58205%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=68af44dead5a09ad0064ac46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58204-cwe-601-url-redirection-to-untruste-114ef517</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58204%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Eric%20Teubert%20Podlove%20Podcast%20Publisher&amp;severity=null&amp;id=68af44dead5a09ad0064ac43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58203-cwe-918-server-side-request-forgery-a8ee377c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58203%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20solacewp%20Solace%20Extra&amp;severity=null&amp;id=68af44dead5a09ad0064ac36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58202-cwe-352-cross-site-request-forgery--7b6592c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58202%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Plugins%20and%20Snippets%20Simple%20Page%20Access%20Restriction&amp;severity=null&amp;id=68af44dead5a09ad0064ac33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58201-cwe-862-missing-authorization-in-af-63700163</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58201%3A%20Missing%20Authorization%20in%20AfterShip%20%26amp%3B%20Automizely%20AfterShip%20Tracking&amp;severity=null&amp;id=68af44dead5a09ad0064ac30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58198-cwe-862-missing-authorization-in-xp-a0d38bc9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58198%3A%20Missing%20Authorization%20in%20Xpro%20Xpro%20Theme%20Builder&amp;severity=null&amp;id=68af44dead5a09ad0064ac2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58197-cwe-79-improper-neutralization-of-i-44b5ddd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58197%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Download%20Monitor&amp;severity=null&amp;id=68af44dead5a09ad0064ac2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58196-cwe-79-improper-neutralization-of-i-83c1f2a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58196%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uicore%20UiCore%20Elements&amp;severity=null&amp;id=68af44dead5a09ad0064ac27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58195-cwe-79-improper-neutralization-of-i-5becd751</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58195%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=null&amp;id=68af44dead5a09ad0064ac24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58194-cwe-79-improper-neutralization-of-i-daac0560</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58194%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=68af44dead5a09ad0064ac21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58193-cwe-862-missing-authorization-in-un-25797bab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58193%3A%20Missing%20Authorization%20in%20Uncanny%20Owl%20Uncanny%20Automator&amp;severity=null&amp;id=68af44dead5a09ad0064ac1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58192-cwe-862-missing-authorization-in-xy-037314fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58192%3A%20Missing%20Authorization%20in%20Xylus%20Themes%20WP%20Bulk%20Delete&amp;severity=null&amp;id=68af44dead5a09ad0064ac1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34157-cwe-79-improper-neutralization-of-i-1e21af67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34157%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20coolLabs%20Technologies%20Coolify&amp;severity=critical&amp;id=68af3a3bad5a09ad00642200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34159-cwe-94-improper-control-of-generati-9ed22bad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34159%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20coolLabs%20Technologies%20Coolify&amp;severity=critical&amp;id=68af3a3bad5a09ad0064220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34161-cwe-78-improper-neutralization-of-s-a37b5988</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34161%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coolLabs%20Technologies%20Coolify&amp;severity=critical&amp;id=68af3a3bad5a09ad00642212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57821-cwe-601-url-redirection-to-untruste-acbfd752</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57821%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20basecamp%20google_sign_in&amp;severity=medium&amp;id=68af36b6ad5a09ad0063f7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20241-compiler-optimization-removal-or-mo-b9687e15</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20241%3A%20Compiler%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=68af3334ad5a09ad0063d8b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20262-null-pointer-dereference-in-cisco-c-b6e91ef5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20262%3A%20NULL%20Pointer%20Dereference%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20290-exposure-of-sensitive-information-t-428617d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20290%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20292-improper-neutralization-of-special--496b8d41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20292%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20295-improper-neutralization-of-special--49b8c98a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20295%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20294-improper-neutralization-of-special--bcaf5276</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20294%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20342-improper-neutralization-of-script-r-20abdf95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20342%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20317-url-redirection-to-untrusted-site-o-02288199</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20317%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=high&amp;id=68af3334ad5a09ad0063d8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20296-improper-neutralization-of-input-du-c9c1598c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20348-exposure-of-sensitive-information-t-f2817546</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20348%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Sent%20Data%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20347-protection-mechanism-failure-in-cis-fc695fec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20347%3A%20Protection%20Mechanism%20Failure%20in%20Cisco%20Cisco%20Data%20Center%20Network%20Manager&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20344-improper-limitation-of-a-pathname-t-ab57cf26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20344%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc-cluster-targeting-south-asian-countries-57ccdec9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC%20Cluster%20Targeting%20South%20Asian%20Countries&amp;severity=medium&amp;id=68af5d62ad5a09ad0065ab1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/virtual-infrastructure-abuse-leads-to-saas-hijacks-c807736f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Virtual%20Infrastructure%20Abuse%20leads%20to%20SaaS%20Hijacks&amp;severity=medium&amp;id=68af5d62ad5a09ad0065ab75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spynote-malware-analysis-9abcf718</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SpyNote%20Malware%20Analysis&amp;severity=medium&amp;id=68af5d62ad5a09ad0065ab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/underground-ransomware-being-distributed-worldwide-08bddc16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Underground%20Ransomware%20Being%20Distributed%20Worldwide&amp;severity=medium&amp;id=68af5d62ad5a09ad0065aba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/like-putty-in-admins-hands-bc966c4b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Like%20PuTTY%20in%20Admin&apos;s%20Hands&amp;severity=medium&amp;id=68af5d62ad5a09ad0065abb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/belarus-linked-dslroot-proxy-network-deploys-hardw-e0db72a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Belarus-Linked%20DSLRoot%20Proxy%20Network%20Deploys%20Hardware%20in%20U.S.%20Residences%2C%20Including%20Military%20Homes&amp;severity=medium&amp;id=68af59dead5a09ad0065762f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-price-of-trust-analyzing-the-malware-campaign--f82c9174</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Price%20of%20Trust%3A%20Analyzing%20the%20Malware%20Campaign%20Exploiting%20TASPEN&apos;s%20Legacy%20to%20Target%20Indonesian%20Senior%20Citizens&amp;severity=medium&amp;id=68af52d9ad5a09ad006538bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/healthcare-services-group-data-breach-impacts-6240-ef61656b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Healthcare%20Services%20Group%20data%20breach%20impacts%20624%2C000%20people&amp;severity=high&amp;id=68af1e18ad5a09ad0062ffb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53105-cwe-269-improper-privilege-manageme-fecf299b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53105%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20glpi-project%20glpi&amp;severity=high&amp;id=68af1e37ad5a09ad00630d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-relying-on-llms-for-code-can-be-a-security-nig-c4fe8274</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Relying%20on%20LLMs%20for%20Code%20Can%20Be%20a%20Security%20Nightmare&amp;severity=medium&amp;id=68af1a9aad5a09ad0062e754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9533-improper-authentication-in-totolink--71751a8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9533%3A%20Improper%20Authentication%20in%20TOTOLINK%20T10&amp;severity=medium&amp;id=68af1a96ad5a09ad0062e727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nx-compromised-to-check-for-claude-code-cli-and-ex-fb209ae4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NX%20Compromised%20to%20Check%20for%20Claude%20Code%20CLI%20and%20Explore%20Filesystem%20for%20Credentials&amp;severity=medium&amp;id=68af1717ad5a09ad0062d1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43729-cwe-732-incorrect-permission-assign-c40bf0ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43729%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20ThinOS%2010&amp;severity=high&amp;id=68af139fad5a09ad0062b365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9532-sql-injection-in-portabilis-i-educar-225c4c7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9532%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68af139fad5a09ad0062b36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43730-cwe-88-improper-neutralization-of-a-ce0340e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43730%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Dell%20ThinOS%2010&amp;severity=high&amp;id=68af1018ad5a09ad006295c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43882-cwe-283-unverified-ownership-in-del-722fca08</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43882%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20Dell%20ThinOS%2010&amp;severity=high&amp;id=68af1018ad5a09ad006295ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-desktop-vulnerability-allowed-host-takeover-25ae8726</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Desktop%20Vulnerability%20Allowed%20Host%20Takeover%20on%20Windows%20and%20macOS&amp;severity=medium&amp;id=68af1008ad5a09ad0062948b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43728-cwe-693-protection-mechanism-failur-59c0e26f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43728%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Dell%20ThinOS%2010&amp;severity=critical&amp;id=68af1018ad5a09ad006295c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9531-sql-injection-in-portabilis-i-educar-fb12e24c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9531%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68af0c87ad5a09ad00627bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9529-file-inclusion-in-campcodes-payroll--8f696365</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9529%3A%20File%20Inclusion%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=68af0c87ad5a09ad00627bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-reveals-unc6395s-oauth-token-theft-in-sales-7300d4c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Reveals%20UNC6395%E2%80%99s%20OAuth%20Token%20Theft%20in%20Salesforce%20Breach&amp;severity=high&amp;id=68af01f8ad5a09ad006223c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9528-os-command-injection-in-linksys-e170-af264a87</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9528%3A%20OS%20Command%20Injection%20in%20Linksys%20E1700&amp;severity=medium&amp;id=68af057ead5a09ad00623b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9527-stack-based-buffer-overflow-in-links-b714741d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9527%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20E1700&amp;severity=high&amp;id=68af057ead5a09ad00623b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blind-eagles-five-clusters-target-colombia-using-r-004e505f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blind%20Eagle%E2%80%99s%20Five%20Clusters%20Target%20Colombia%20Using%20RATs%2C%20Phishing%20Lures%2C%20and%20Dynamic%20DNS%20Infra&amp;severity=high&amp;id=68af01f8ad5a09ad006223c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesloft-oauth-breach-via-drift-ai-chat-agent-exp-fd24ea7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesloft%20OAuth%20Breach%20via%20Drift%20AI%20Chat%20Agent%20Exposes%20Salesforce%20Customer%20Data&amp;severity=high&amp;id=68af01f8ad5a09ad006223c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9526-stack-based-buffer-overflow-in-links-ed39b703</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9526%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20E1700&amp;severity=high&amp;id=68aefe76ad5a09ad006203df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9525-stack-based-buffer-overflow-in-links-69c9236a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9525%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20E1700&amp;severity=high&amp;id=68aefe76ad5a09ad006203d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9523-stack-based-buffer-overflow-in-tenda-2200559a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9523%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC1206&amp;severity=critical&amp;id=68aee257ad5a09ad006124d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30064-cwe-912-hidden-functionality-in-cgm-75d01f5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30064%3A%20CWE-912%20Hidden%20Functionality%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=68aeded4ad5a09ad006111c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30063-cwe-732-incorrect-permission-assign-5645aef9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30063%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded4ad5a09ad006111c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30061-cwe-89-improper-neutralization-of-s-60706989</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30061%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=68aeded4ad5a09ad006111be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30060-cwe-89-improper-neutralization-of-s-89900b68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30060%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=68aeded4ad5a09ad006111bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30059-cwe-89-improper-neutralization-of-s-b067a47e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30059%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=68aeded4ad5a09ad006111b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30058-cwe-89-improper-neutralization-of-s-6113e667</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30058%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=68aeded4ad5a09ad006111b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30057-cwe-94-improper-control-of-generati-64f99650</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30057%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded4ad5a09ad006111b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30056-cwe-94-improper-control-of-generati-8e035474</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30056%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad006111a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30055-cwe-94-improper-control-of-generati-1c1dadf5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30055%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad006111a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30048-cwe-306-missing-authentication-for--20ed7952</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30048%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=68aeded3ad5a09ad0061119f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30041-cwe-306-missing-authentication-for--4ae6cf16</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30041%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad0061119c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30040-cwe-306-missing-authentication-for--c14e55c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30040%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad00611199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30039-cwe-306-missing-authentication-for--34d866d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30039%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad00611196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30038-cwe-1230-exposure-of-sensitive-info-29533a60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30038%3A%20CWE-1230%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=68aeded3ad5a09ad00611193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30037-cwe-306-missing-authentication-for--9d5c5097</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30037%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=68aeded3ad5a09ad00611190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30036-cwe-79-improper-neutralization-of-i-7510129c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30036%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=68aeded3ad5a09ad0061118d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2313-cwe-94-improper-control-of-generatio-d0a7e1a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2313%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad0061118a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sni5gect-attack-crashes-phones-and-downgrades--26c9b719</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sni5Gect%20Attack%20Crashes%20Phones%20and%20Downgrades%205G%20to%204G%20without%20Rogue%20Base%20Station&amp;severity=high&amp;id=68aed444ad5a09ad0060e226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrix-fixes-critical-netscaler-rce-flaw-exploited-d2d0276c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Citrix%20fixes%20critical%20NetScaler%20RCE%20flaw%20exploited%20in%20zero-day%20attacks&amp;severity=critical&amp;id=68aed444ad5a09ad0060e222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-silk-typhoon-targeted-diplomats-by-hi-0649e0b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20linked%20Silk%20Typhoon%20targeted%20diplomats%20by%20hijacking%20web%20traffic&amp;severity=medium&amp;id=68aed0c0ad5a09ad0060b738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9514-weak-password-requirements-in-macroz-66d809fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9514%3A%20Weak%20Password%20Requirements%20in%20macrozheng%20mall&amp;severity=medium&amp;id=68aea30fad5a09ad005fb773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57797-incorrect-privilege-assignment-in-p-93bba552</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57797%3A%20Incorrect%20privilege%20assignment%20in%20PFU%20Limited%20ScanSnap%20Manager%20installers&amp;severity=high&amp;id=68ae9c05ad5a09ad005f7f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9513-inadequate-encryption-strength-in-ed-b0942407</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9513%3A%20Inadequate%20Encryption%20Strength%20in%20editso%20fuso&amp;severity=medium&amp;id=68ae9c05ad5a09ad005f7f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9511-sql-injection-in-itsourcecode-apartm-4bedf1b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9511%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ae9c05ad5a09ad005f7f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57846-incorrect-default-permissions-in-di-fc5e241d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57846%3A%20Incorrect%20default%20permissions%20in%20Digital%20Arts%20Inc.%20i-%E3%83%95%E3%82%A3%E3%83%AB%E3%82%BF%E3%83%BC%206.0&amp;severity=high&amp;id=68ae9881ad5a09ad005f55cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48081-cwe-35-path-traversal-in-printeers--d22077e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48081%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Printeers%20Printeers%20Print%20%26%20Ship&amp;severity=medium&amp;id=68ae94fdad5a09ad005f4496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9510-sql-injection-in-itsourcecode-apartm-4f5f4980</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9510%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ae94fdad5a09ad005f4499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9509-sql-injection-in-itsourcecode-apartm-06eec087</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9509%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ae8df5ad5a09ad005f2b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9508-sql-injection-in-itsourcecode-apartm-c42d1e69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9508%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ae8df5ad5a09ad005f2afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9507-sql-injection-in-itsourcecode-apartm-bae6bb91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9507%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ae86edad5a09ad005f0d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9506-sql-injection-in-campcodes-online-lo-fc353701</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9506%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68ae86edad5a09ad005f0d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9505-sql-injection-in-campcodes-online-lo-fc3cd885</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9505%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68ae7fe5ad5a09ad005ee1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9504-sql-injection-in-campcodes-online-lo-53fc6d9a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9504%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68ae7fe5ad5a09ad005ee1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49035-cwe-79-improper-neutralization-of-i-479e5539</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chaimchaikin%20Admin%20Menu%20Groups&amp;severity=null&amp;id=68ae7c61ad5a09ad005ed10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49039-cwe-79-improper-neutralization-of-i-2ae8fc76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49039%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mibuthu%20Link%20View&amp;severity=null&amp;id=68ae7c61ad5a09ad005ed10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9503-sql-injection-in-campcodes-online-lo-dcc23359</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9503%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68ae78ddad5a09ad005ec2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9502-sql-injection-in-campcodes-online-lo-929043c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9502%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68ae71d5ad5a09ad005e80b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7732-cwe-79-improper-neutralization-of-in-2f2bacb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevinweber%20Lazy%20Load%20for%20Videos&amp;severity=medium&amp;id=68ae6ae4ad5a09ad005e556a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-27-a1343ea2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-27&amp;severity=medium&amp;id=68afa01ead5a09ad006743c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55618-na-afca144d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55618%3A%20n%2Fa&amp;severity=high&amp;id=68af67edad5a09ad0065ee54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55582-na-eda68f4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55582%3A%20n%2Fa&amp;severity=medium&amp;id=68af67edad5a09ad0065ee50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55495-na-1baa7129</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55495%3A%20n%2Fa&amp;severity=medium&amp;id=68af59dead5a09ad0065767e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51667-na-f4fbba25</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51667%3A%20n%2Fa&amp;severity=high&amp;id=68af484aad5a09ad0064cc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50979-na-9d196903</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50979%3A%20n%2Fa&amp;severity=high&amp;id=68af484aad5a09ad0064cc99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55422-na-7ba000d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55422%3A%20n%2Fa&amp;severity=high&amp;id=68af44dfad5a09ad0064ac77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50428-na-a717d466</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50428%3A%20n%2Fa&amp;severity=critical&amp;id=68af3dc0ad5a09ad00644f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50977-na-f4e8d185</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50977%3A%20n%2Fa&amp;severity=medium&amp;id=68af3a3bad5a09ad00642217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54598-na-ecdf548b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54598%3A%20n%2Fa&amp;severity=medium&amp;id=68af2c2bad5a09ad00638d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50984-na-854a3c06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50984%3A%20n%2Fa&amp;severity=medium&amp;id=68af28a6ad5a09ad00637382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50983-na-45e418ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50983%3A%20n%2Fa&amp;severity=high&amp;id=68af2523ad5a09ad006353c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50978-na-92d4153b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50978%3A%20n%2Fa&amp;severity=medium&amp;id=68af2523ad5a09ad006353c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50972-na-10461dd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50972%3A%20n%2Fa&amp;severity=critical&amp;id=68af219ead5a09ad00633591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50986-na-20e2fd69</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50986%3A%20n%2Fa&amp;severity=medium&amp;id=68af1e37ad5a09ad00630d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50985-na-93216db0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50985%3A%20n%2Fa&amp;severity=medium&amp;id=68af1e37ad5a09ad00630d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52122-na-8821d9a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52122%3A%20n%2Fa&amp;severity=critical&amp;id=68af1714ad5a09ad0062d1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50989-na-210fdb24</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50989%3A%20n%2Fa&amp;severity=high&amp;id=68af1714ad5a09ad0062d1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56694-na-8a3c1ff0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56694%3A%20n%2Fa&amp;severity=medium&amp;id=68af139fad5a09ad0062b368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-exclusive-disclosure-of-the-attack-activitie-9a77dc9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Exclusive%20disclosure%20of%20the%20attack%20activities%20of%20the%20APT%20group%20%E2%80%9CNightEagle%E2%80%9D&amp;severity=medium&amp;id=68aec628ad5a09ad006074d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8490-cwe-79-improper-neutralization-of-in-5636098a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20servmask%20All-in-One%20WP%20Migration%20and%20Backup&amp;severity=medium&amp;id=68ae4421ad5a09ad005c699e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26417-information-disclosure-in-google-an-fed7c6a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26417%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1cad5a09ad005c3c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22413-information-disclosure-in-google-an-fe2523b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22413%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1cad5a09ad005c3c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22412-remote-code-execution-in-google-and-d28c51d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22412%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22411-remote-code-execution-in-google-and-a344e2b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22411%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22410-remote-code-execution-in-google-and-49397771</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22410%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22409-elevation-of-privilege-in-google-an-843730d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22409%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22408-remote-code-execution-in-google-and-f58411ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22408%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68ae3d1cad5a09ad005c3c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22407-information-disclosure-in-google-an-2e36ff91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22407%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1cad5a09ad005c3c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22406-elevation-of-privilege-in-google-an-334b9a2d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22406%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22405-elevation-of-privilege-in-google-an-ac422b8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22405%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22404-elevation-of-privilege-in-google-an-d415f41e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22404%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22403-remote-code-execution-in-google-and-7d9f3a70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22403%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68ae3d1cad5a09ad005c3bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0093-information-disclosure-in-google-and-55b17661</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0093%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0092-information-disclosure-in-google-and-e74c7e38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0092%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1cad5a09ad005c3bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0086-information-disclosure-in-google-and-e7d94a8f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0086%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1bad5a09ad005c3bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0084-remote-code-execution-in-google-andr-08f3913a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0084%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1bad5a09ad005c3bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0083-information-disclosure-in-google-and-3ba9d5f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0083%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1bad5a09ad005c3bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0082-information-disclosure-in-google-and-393ea80c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0082%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1bad5a09ad005c3bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0081-denial-of-service-in-google-android-0a46b414</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0081%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1bad5a09ad005c3bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0080-elevation-of-privilege-in-google-and-1eb51c51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0080%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1bad5a09ad005c3bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0079-elevation-of-privilege-in-google-and-ae711840</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0079%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1bad5a09ad005c3bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0078-elevation-of-privilege-in-google-and-0eb227b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0078%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1bad5a09ad005c3bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0075-remote-code-execution-in-google-andr-60b446f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0075%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68ae3d1bad5a09ad005c3bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0074-remote-code-execution-in-google-andr-0e76e85b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0074%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68ae3d1bad5a09ad005c3bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57820-cwe-1321-improperly-controlled-modi-e8b6febb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57820%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sveltejs%20devalue&amp;severity=high&amp;id=68ae3995ad5a09ad005c2c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9277-cwe-79-improper-neutralization-of-in-2156e9e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9277%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=68ae3611ad5a09ad005c13e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9492-sql-injection-in-campcodes-online-wa-840b1292</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9492%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Water%20Billing%20System&amp;severity=medium&amp;id=68ae328dad5a09ad005c02ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9478-use-after-free-in-google-chrome-483136be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9478%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68ae04daad5a09ad005ad9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23315-cwe-94-improper-control-of-generati-b4451cc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23315%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=68ae0155ad5a09ad005ac22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23314-cwe-94-improper-control-of-generati-6ed614e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23314%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=68ae0155ad5a09ad005ac22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23313-cwe-94-improper-control-of-generati-93206871</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23313%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=68ae0155ad5a09ad005ac225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23312-cwe-94-improper-control-of-generati-c4519f01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23312%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=68ae0155ad5a09ad005ac220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23307-cwe-94-improper-control-of-generati-b295d818</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23307%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20NeMo%20Curator&amp;severity=high&amp;id=68ae0155ad5a09ad005ac21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/77-malicious-android-apps-with-19-million-installs-8fd5354b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=77%20Malicious%20Android%20Apps%20With%2019%20Million%20Installs%20Targeted%20831%20Banks%20Worldwide&amp;severity=medium&amp;id=68ade8b7ad5a09ad0059e4c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1994-cwe-242-use-of-inherently-dangerous--0131a592</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1994%3A%20CWE-242%20Use%20of%20Inherently%20Dangerous%20Function%20in%20IBM%20Cognos%20Command%20Center&amp;severity=high&amp;id=68ade8cdad5a09ad0059e516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2697-cwe-601-url-redirection-to-untrusted-58ee8df5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2697%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20Cognos%20Command%20Center&amp;severity=high&amp;id=68ade8cdad5a09ad0059e519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1494-cwe-1021-improper-restriction-of-ren-711716a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1494%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20IBM%20Cognos%20Command%20Center&amp;severity=medium&amp;id=68ade8cdad5a09ad0059e513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36729-cwe-269-improper-privilege-manageme-1aecff9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36729%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20RACOM%20M!DGE2&amp;severity=high&amp;id=68ade535ad5a09ad0059d7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9491-cwe-451-user-interface-ui-misreprese-d26dff76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9491%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Windows&amp;severity=high&amp;id=68ade535ad5a09ad0059d7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boxing-clever-uncovering-a-1m-task-scam-cluster-ex-17a069da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boxing%20Clever%3A%20Uncovering%20a%20%241M%20Task%20Scam%20Cluster%20Exploiting%20Major%20Brands&amp;severity=medium&amp;id=68ae0154ad5a09ad005ac1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-house-is-haunted-a-decade-old-rce-in-the-aion-99809261</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20House%20is%20Haunted%3A%20a%20decade%20old%20RCE%20in%20the%20AION%20client&amp;severity=high&amp;id=68adde6ead5a09ad00599c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-august-2025-cyber-attacks-7-stage-tycoon2fa--3676ba0c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20August%202025%20Cyber%20Attacks%3A%207-Stage%20Tycoon2FA%20Phishing%2C%20New%20ClickFix%20Campaign%2C%20and%20Salty2FA&amp;severity=medium&amp;id=68ae0154ad5a09ad005ac1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57813-cwe-532-insertion-of-sensitive-info-60ca2d92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57813%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20traPtitech%20traQ&amp;severity=medium&amp;id=68adde6aad5a09ad00599c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowcaptcha-exploits-wordpress-sites-to-spread-r-b65bdf51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowCaptcha%20Exploits%20WordPress%20Sites%20to%20Spread%20Ransomware%2C%20Info%20Stealers%2C%20and%20Crypto%20Miners&amp;severity=low&amp;id=68adde2bad5a09ad00599b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mixshell-malware-delivered-via-contact-forms-targe-6ac8bdff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MixShell%20Malware%20Delivered%20via%20Contact%20Forms%20Targets%20U.S.%20Supply%20Chain%20Manufacturers&amp;severity=high&amp;id=68adde2bad5a09ad00599b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nissan-confirms-design-studio-data-breach-claimed--791758c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nissan%20confirms%20design%20studio%20data%20breach%20claimed%20by%20Qilin%20ransomware&amp;severity=high&amp;id=68adde2bad5a09ad00599b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dslroot-proxies-and-the-threat-of-legal-botnets-a7d2c2f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DSLRoot%2C%20Proxies%2C%20and%20the%20Threat%20of%20%E2%80%98Legal%20Botnets%E2%80%99&amp;severity=high&amp;id=68adde2bad5a09ad00599b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57810-cwe-20-improper-input-validation-in-fe58c0f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57810%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20parallax%20jsPDF&amp;severity=high&amp;id=68add723ad5a09ad005974f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tag-144s-persistent-grip-on-south-american-organiz-b81ee29b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TAG-144&apos;s%20Persistent%20Grip%20on%20South%20American%20Organizations&amp;severity=medium&amp;id=68ae085dad5a09ad005ae6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nevada-state-offices-halt-services-after-cyber-inc-a126ff9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nevada%20State%20Offices%20Halt%20Services%20After%20Cyber%20Incident&amp;severity=medium&amp;id=68adcc94ad5a09ad005925f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6366-cwe-269-improper-privilege-managemen-ecb5b4e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6366%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ovatheme.com%20Event%20List&amp;severity=high&amp;id=68adc913ad5a09ad0059083c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9483-stack-based-buffer-overflow-in-links-6aeada95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9483%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68adc20cad5a09ad0058d255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9482-stack-based-buffer-overflow-in-links-e6ea8c5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9482%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68adbb04ad5a09ad00589361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9481-stack-based-buffer-overflow-in-links-60c82fac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9481%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68adbb04ad5a09ad00589359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8424-cwe-1284-improper-validation-of-spec-33d3e4d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8424%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NetScaler%20ADC&amp;severity=high&amp;id=68adb77ead5a09ad0058755b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7776-cwe-119-improper-restriction-of-oper-87405e14</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7776%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20NetScaler%20ADC&amp;severity=high&amp;id=68adb3fdad5a09ad00585931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7775-cwe-119-improper-restriction-of-oper-e3aca3d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7775%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20NetScaler%20ADC&amp;severity=critical&amp;id=68adb3fdad5a09ad0058592e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-hook-malware-variant-locks-devices-wit-eb41f662</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Hook%20Malware%20Variant%20Locks%20Devices%20With%20Ransomware&amp;severity=medium&amp;id=68ad9b5bad5a09ad005796ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44002-cwe-367-time-of-check-time-of-use-t-f171bb4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44002%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20TeamViewer%20Full%20Client&amp;severity=medium&amp;id=68ad97d9ad5a09ad00577251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tech-manufacturer-data-io-hit-by-ransomware-fd3de1f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tech%20Manufacturer%20Data%20I%2FO%20Hit%20by%20Ransomware&amp;severity=high&amp;id=68ad9453ad5a09ad00575e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hook-android-trojan-adds-ransomware-overlays-expan-7e3066dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HOOK%20Android%20Trojan%20Adds%20Ransomware%20Overlays%2C%20Expands%20to%20107%20Remote%20Commands&amp;severity=high&amp;id=68ad9453ad5a09ad00575e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1501-cwe-863-incorrect-authorization-in-n-b681e837</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1501%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nozomi%20Networks%20CMC&amp;severity=medium&amp;id=68ad90d0ad5a09ad0057457f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/farmers-insurance-data-breach-impacts-11m-people-a-10c3041a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Farmers%20Insurance%20data%20breach%20impacts%201.1M%20people%20after%20Salesforce%20attack&amp;severity=high&amp;id=68ad82bead5a09ad0056d26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/surge-in-coordinated-scans-targets-microsoft-rdp-a-92c89457</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Surge%20in%20coordinated%20scans%20targets%20Microsoft%20RDP%20auth%20servers&amp;severity=high&amp;id=68ad82bead5a09ad0056d273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-three-exploited-vulnerabilities-to-kev-c-fc39b4ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Three%20Exploited%20Vulnerabilities%20to%20KEV%20Catalog%20Affecting%20Citrix%20and%20Git&amp;severity=high&amp;id=68ad82bead5a09ad0056d26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48108-cwe-862-missing-authorization-in-mo-d6816277</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48108%3A%20CWE-862%20Missing%20Authorization%20in%20Mojoomla%20School%20Management&amp;severity=medium&amp;id=68ad8645ad5a09ad0056e572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29901-cwe-476-in-qnap-systems-inc-file-st-ebb44214</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29901%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68ad82f6ad5a09ad0056d367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6247-cwe-80-improper-neutralization-of-sc-dec1fa34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6247%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ValvePress%20WordPress%20Automatic%20Plugin&amp;severity=medium&amp;id=68ad7bb7ad5a09ad0056a0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8860-cwe-862-missing-authorization-in-the-b15a917b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8860%3A%20CWE-862%20Missing%20Authorization%20in%20themefic%20Tourfic%20%E2%80%93%20Travel%20Booking%2C%20Hotel%20Booking%20%26%20Car%20Rental%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53419-cwe-94-code-injection-in-delta-elec-76e91d75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53419%3A%20CWE-94%20Code%20Injection%20in%20Delta%20Electronics%20COMMGR&amp;severity=high&amp;id=68ad5f97ad5a09ad0055f0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53418-cwe-121-stack-based-buffer-overflow-ebfbdb28</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53418%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20COMMGR&amp;severity=high&amp;id=68ad5c13ad5a09ad0055e0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57704-cwe-611-xxe-improper-restriction-of-64746485</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57704%3A%20CWE-611%20XXE%20-%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Delta%20Electronics%20EIP%20Builder&amp;severity=medium&amp;id=68ad550bad5a09ad0055b903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41702-cwe-321-use-of-hard-coded-cryptogra-97111162</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41702%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Welotec%20EG400Mk2-D11001-000101&amp;severity=critical&amp;id=68ad5188ad5a09ad0055a20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9476-unrestricted-upload-in-sourcecodeste-a2cbb37e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9476%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Human%20Resource%20Information%20System&amp;severity=medium&amp;id=68ad5188ad5a09ad0055a20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9475-unrestricted-upload-in-sourcecodeste-e6af5a6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9475%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Human%20Resource%20Information%20System&amp;severity=medium&amp;id=68ad4a7fad5a09ad005578f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5931-cwe-269-improper-privilege-managemen-3e7db2bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5931%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wedevs%20Dokan%20Pro&amp;severity=high&amp;id=68ad4377ad5a09ad00554c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9474-creation-of-temporary-file-with-inse-04f35d6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9474%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Mihomo%20Party&amp;severity=low&amp;id=68ad4377ad5a09ad00554c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9473-sql-injection-in-sourcecodester-onli-81a2de8c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9473%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Bank%20Management%20System&amp;severity=medium&amp;id=68ad4377ad5a09ad00554c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9472-sql-injection-in-itsourcecode-apartm-37bca305</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9472%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad3c6fad5a09ad00552980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9471-sql-injection-in-itsourcecode-apartm-33787ebf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9471%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad3567ad5a09ad0054e300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9470-sql-injection-in-itsourcecode-apartm-4ee7cfa0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9470%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad3567ad5a09ad0054e2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9469-sql-injection-in-itsourcecode-apartm-3ae843d1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9469%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad2e5fad5a09ad0054b07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9468-sql-injection-in-itsourcecode-apartm-30860a58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9468%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad2e5fad5a09ad0054b074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9172-cwe-89-improper-neutralization-of-sp-239e8ce4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9172%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pierrelannoy%20Vibes&amp;severity=high&amp;id=68ad2e5fad5a09ad0054b06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9461-information-disclosure-in-diyhi-bbs-f0c498b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9461%3A%20Information%20Disclosure%20in%20diyhi%20bbs&amp;severity=medium&amp;id=68ad2757ad5a09ad00548441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9444-sql-injection-in-1000projects-online-63916fd4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9444%3A%20SQL%20Injection%20in%201000projects%20Online%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68ad2757ad5a09ad0054843b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9443-buffer-overflow-in-tenda-ch22-ab4b8193</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9443%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ad204fad5a09ad005446ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9440-cross-site-scripting-in-1000projects-52a5ed7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9440%3A%20Cross%20Site%20Scripting%20in%201000projects%20Online%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68ad1947ad5a09ad0054154e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9439-cross-site-scripting-in-1000projects-8bfb1986</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9439%3A%20Cross%20Site%20Scripting%20in%201000projects%20Online%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68ad1947ad5a09ad00541548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8447-cwe-639-authorization-bypass-through-d660c1fd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8447%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=68ad1947ad5a09ad0054153c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9438-cross-site-scripting-in-1000projects-febb4ae5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9438%3A%20Cross%20Site%20Scripting%20in%201000projects%20Online%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68ad1947ad5a09ad00541542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9434-cross-site-scripting-in-1000projects-bfab636e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9434%3A%20Cross%20Site%20Scripting%20in%201000projects%20Online%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68ad0ebbad5a09ad0053b3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9433-cross-site-scripting-in-mtons-mblog-9e8ee01d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9433%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68ad0ebbad5a09ad0053b3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9432-cross-site-scripting-in-mtons-mblog-82c590cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9432%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68ad07b3ad5a09ad005309c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-campaign-targeting-companies-via-upcrypte-90ca3cf0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Campaign%20Targeting%20Companies%20via%20UpCrypter&amp;severity=medium&amp;id=68ad669fad5a09ad00562d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prc-nexus-espionage-campaign-hijacks-web-traffic-t-e26761b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PRC-Nexus%20Espionage%20Campaign%20Hijacks%20Web%20Traffic%20to%20Target%20Diplomats&amp;severity=medium&amp;id=68ad669fad5a09ad00562d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9431-cross-site-scripting-in-mtons-mblog-2dc2f66e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9431%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68ad00b7ad5a09ad00529853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9430-cross-site-scripting-in-mtons-mblog-af3851fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9430%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68ad00b7ad5a09ad0052984d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/birth-chart-compatibility-wordpress-plugin-20-full-6461ede5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Birth%20Chart%20Compatibility%20WordPress%20Plugin%202.0%20-%20Full%20Path%20Disclosure&amp;severity=medium&amp;id=68ae5e7aad5a09ad005d88ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lingdang-crm-8647-sql-injection-8d063186</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lingdang%20CRM%208.6.4.7%20-%20SQL%20Injection&amp;severity=medium&amp;id=68ae5e7aad5a09ad005d88c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-endpoint-manager-mobile-12500-authenticatio-eec3fdfb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Endpoint%20Manager%20Mobile%2012.5.0.0%20-%20Authentication%20Bypass&amp;severity=medium&amp;id=68ae5e7aad5a09ad005d88c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storychief-wordpress-plugin-1042-arbitrary-file-up-41a848ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StoryChief%20Wordpress%20Plugin%201.0.42%20-%20Arbitrary%20File%20Upload&amp;severity=medium&amp;id=68ae5e7aad5a09ad005d88bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geovision-asmanager-windows-application-6120-crede-7e1c09c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeoVision%20ASManager%20Windows%20Application%206.1.2.0%20-%20Credentials%20Disclosure&amp;severity=medium&amp;id=68ae5e7aad5a09ad005d88b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geovision-asmanager-windows-application-6120-remot-ec25ae29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeoVision%20ASManager%20Windows%20Application%206.1.2.0%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68ae5e7aad5a09ad005d88b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50975-na-308afc15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50975%3A%20n%2Fa&amp;severity=medium&amp;id=68ae5292ad5a09ad005cef6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-26-73f8780c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-26&amp;severity=medium&amp;id=68ae4e9ead5a09ad005ca3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55443-na-abaf32bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55443%3A%20n%2Fa&amp;severity=critical&amp;id=68ae0f66ad5a09ad005b18ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52353-na-2fdb4a7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52353%3A%20n%2Fa&amp;severity=critical&amp;id=68ae0f66ad5a09ad005b18b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50971-na-ee13904d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50971%3A%20n%2Fa&amp;severity=high&amp;id=68ae0be1ad5a09ad005b0763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50976-na-da831c04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50976%3A%20n%2Fa&amp;severity=medium&amp;id=68adf346ad5a09ad005a44eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52184-na-ef84f26a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52184%3A%20n%2Fa&amp;severity=medium&amp;id=68ade8cdad5a09ad0059e51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50974-na-33a6929d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50974%3A%20n%2Fa&amp;severity=medium&amp;id=68ade8cdad5a09ad0059e510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57425-na-9e64f286</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57425%3A%20n%2Fa&amp;severity=medium&amp;id=68ade1b1ad5a09ad0059b92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56432-na-3a5f62a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56432%3A%20n%2Fa&amp;severity=medium&amp;id=68add39fad5a09ad0059626c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25737-na-259c876e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25737%3A%20n%2Fa&amp;severity=medium&amp;id=68adcca5ad5a09ad005926b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25736-na-a0837a4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25736%3A%20n%2Fa&amp;severity=medium&amp;id=68adcca5ad5a09ad005926b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25735-na-4eb739fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25735%3A%20n%2Fa&amp;severity=medium&amp;id=68adcca5ad5a09ad005926a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25734-na-2c45db07</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25734%3A%20n%2Fa&amp;severity=medium&amp;id=68adcca5ad5a09ad005926a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25733-na-f9872efb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25733%3A%20n%2Fa&amp;severity=low&amp;id=68adcca5ad5a09ad00592698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25732-na-4f3d69c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25732%3A%20n%2Fa&amp;severity=medium&amp;id=68adcca5ad5a09ad00592690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52036-na-e9e6e3d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52036%3A%20n%2Fa&amp;severity=medium&amp;id=68adc913ad5a09ad00590838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52035-na-bce7c0a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52035%3A%20n%2Fa&amp;severity=medium&amp;id=68adc913ad5a09ad00590834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52037-na-8c9370da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52037%3A%20n%2Fa&amp;severity=medium&amp;id=68adc913ad5a09ad00590830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52219-na-40aa90c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52219%3A%20n%2Fa&amp;severity=medium&amp;id=68adc58ead5a09ad0058eb7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52218-na-14e63dd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52218%3A%20n%2Fa&amp;severity=high&amp;id=68adc58ead5a09ad0058eb79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52217-na-a97f0254</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52217%3A%20n%2Fa&amp;severity=medium&amp;id=68adc58ead5a09ad0058eb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29992-na-91479327</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29992%3A%20n%2Fa&amp;severity=high&amp;id=68adc20cad5a09ad0058d251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55526-na-032ca3f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55526%3A%20n%2Fa&amp;severity=critical&amp;id=68adbe86ad5a09ad0058a5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50753-na-46a1babf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50753%3A%20n%2Fa&amp;severity=high&amp;id=68adbb04ad5a09ad00589354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9429-cross-site-scripting-in-mtons-mblog-100f946c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9429%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68acf61fad5a09ad0051685c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9426-sql-injection-in-itsourcecode-online-f68d3fee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9426%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=68acef17ad5a09ad005126ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9425-sql-injection-in-itsourcecode-online-3833f97e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9425%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=68acef17ad5a09ad005126c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9424-os-command-injection-in-ruijie-ws720-597e8bb9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9424%3A%20OS%20Command%20Injection%20in%20Ruijie%20WS7204-A&amp;severity=medium&amp;id=68ace80fad5a09ad0050f005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9423-sql-injection-in-campcodes-online-wa-2cf33fd2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9423%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Water%20Billing%20System&amp;severity=medium&amp;id=68ace80fad5a09ad0050effe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9422-cross-site-scripting-in-oitcode-sama-6176bbae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9422%3A%20Cross%20Site%20Scripting%20in%20oitcode%20samarium&amp;severity=medium&amp;id=68ace108ad5a09ad0050aa0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9421-sql-injection-in-itsourcecode-apartm-950c9011</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9421%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ace108ad5a09ad0050aa03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57814-cwe-918-server-side-request-forgery-ba8667e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57814%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20azu%20request-filtering-agent&amp;severity=medium&amp;id=68acdd84ad5a09ad00509dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9420-sql-injection-in-itsourcecode-apartm-4a56d118</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9420%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68acda00ad5a09ad00507538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57809-cwe-674-uncontrolled-recursion-in-m-84a3312c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57809%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20mlc-ai%20xgrammar&amp;severity=high&amp;id=68acd67cad5a09ad004ff987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8627-vulnerability-in-tp-link-systems-inc-5670ca28</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8627%3A%20Vulnerability%20in%20TP-Link%20Systems%20Inc.%20TP-Link%20KP303%20(US)%20Smartplug&amp;severity=high&amp;id=68acd67cad5a09ad004ff98f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57805-cwe-20-improper-input-validation-in-c654dff7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57805%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20The-Scratch-Channel%20tsc-web-client&amp;severity=high&amp;id=68acd67cad5a09ad004ff98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57804-cwe-93-improper-neutralization-of-c-548d4f16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57804%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20python-hyper%20h2&amp;severity=medium&amp;id=68acd2f8ad5a09ad004feac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9419-sql-injection-in-itsourcecode-apartm-aa9e1e40</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9419%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68acd2f8ad5a09ad004feac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-apps-with-19m-installs-removed-from-goog-b1a17799</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20apps%20with%20%2B19M%20installs%20removed%20from%20Google%20Play%20because%20spreading%20Anatsa%20banking%20trojan%20and%20other%20malware&amp;severity=medium&amp;id=68accf71ad5a09ad004f8fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weak-keys-on-camaro-muscle-car-make-it-most-stolen-a80a42d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weak%20Keys%20on%20Camaro%20Muscle%20Car%20Make%20it%20Most%20Stolen%20Car%20in%20America&amp;severity=medium&amp;id=68accf71ad5a09ad004f8fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6384-deploys-plugx-via-captive-portal-hijacks-a-6b66121e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6384%20Deploys%20PlugX%20via%20Captive%20Portal%20Hijacks%20and%20Valid%20Certificates%20Targeting%20Diplomats&amp;severity=high&amp;id=68accf71ad5a09ad004f8fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auchan-retailer-data-breach-impacts-hundreds-of-th-875e6106</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auchan%20retailer%20data%20breach%20impacts%20hundreds%20of%20thousands%20of%20customers&amp;severity=high&amp;id=68accf71ad5a09ad004f8fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9418-sql-injection-in-itsourcecode-apartm-c7aee976</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9418%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad0130ad5a09ad0052b038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6188-288-in-arista-networks-eos-0ee4e8cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6188%3A%20288%20in%20Arista%20Networks%20EOS&amp;severity=high&amp;id=68acc868ad5a09ad004f4d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3456-cwe-532-insertion-of-sensitive-infor-0c08e0a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3456%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Arista%20Networks%20EOS&amp;severity=low&amp;id=68acc4e4ad5a09ad004f2fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9417-sql-injection-in-itsourcecode-apartm-8adddca7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9417%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68acc4e4ad5a09ad004f2fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9416-cross-site-scripting-in-oitcode-sama-cfc5a346</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9416%3A%20Cross%20Site%20Scripting%20in%20oitcode%20samarium&amp;severity=medium&amp;id=68acbddcad5a09ad004ef940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safeguarding-vs-code-against-prompt-injections-7b85849a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Safeguarding%20VS%20Code%20against%20prompt%20injections&amp;severity=medium&amp;id=68acb6d7ad5a09ad004eb2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9415-unrestricted-upload-in-greencms-9c8ec537</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9415%3A%20Unrestricted%20Upload%20in%20GreenCMS&amp;severity=medium&amp;id=68acb6d5ad5a09ad004eb2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9414-server-side-request-forgery-in-kalca-56b6c09a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9414%3A%20Server-Side%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=68acafccad5a09ad004e8bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/build-a-new-kind-of-browser-security-care-to-try-i-fc635c8f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Build%20a%20new%20kind%20of%20browser%20security%2C%20care%20to%20try%20it%3F%20You%20have%20access%20to%20control%20a%20private%20key%20but%20cannot%20take%20it.%20Looking%20for%20things%20that%20break.%20No%20security%20knowledge%20needed%20to%20try%20it%20if%20you%20can%20copy%20paste%20and%20type%20you%20can%20try%20to%20break%20the%20new%20algorithm.&amp;severity=medium&amp;id=68aca8c6ad5a09ad004e6092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9413-sql-injection-in-lostvip-com-ruoyi-g-0e8b50c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9413%3A%20SQL%20Injection%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68aca8c4ad5a09ad004e6085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57811-cwe-1336-improper-neutralization-of-6a7721ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57811%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=medium&amp;id=68aca540ad5a09ad004e4a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57802-cwe-61-unix-symbolic-link-symlink-f-40d1e502</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57802%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20airlinklabs%20daemon&amp;severity=high&amp;id=68aca1bcad5a09ad004e308c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-voicemail-emails-install-upcrypter-malware-on-3e181810</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Voicemail%20Emails%20Install%20UpCrypter%20Malware%20on%20Windows%20Devices&amp;severity=medium&amp;id=68ac9e37ad5a09ad004e0bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9412-sql-injection-in-lostvip-com-ruoyi-g-b46463f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9412%3A%20SQL%20Injection%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68aca1bcad5a09ad004e3090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9411-sql-injection-in-lostvip-com-ruoyi-g-7da6b72c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9411%3A%20SQL%20Injection%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68ac9ab3ad5a09ad004deceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9410-sql-injection-in-lostvip-com-ruoyi-g-a4485d0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9410%3A%20SQL%20Injection%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68ac93acad5a09ad004dbb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57760-cwe-269-improper-privilege-manageme-cde408ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57760%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=68ac9028ad5a09ad004d3b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6737-cwe-1391-use-of-weak-credentials-in--79d42945</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6737%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20Securden%20Unified%20PAM&amp;severity=high&amp;id=68ac9028ad5a09ad004d3ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53120-cwe-22-improper-limitation-of-a-pat-3ebea95b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53120%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Securden%20Unified%20PAM&amp;severity=critical&amp;id=68ac9028ad5a09ad004d3b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53119-cwe-434-unrestricted-upload-of-file-bd2bb6b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53119%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Securden%20Unified%20PAM&amp;severity=high&amp;id=68ac8ca3ad5a09ad004d3029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53118-cwe-306-missing-authentication-for--8a0e2330</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53118%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Securden%20Unified%20PAM&amp;severity=critical&amp;id=68ac8ca3ad5a09ad004d3026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9409-path-traversal-in-lostvip-com-ruoyi--decb6b03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9409%3A%20Path%20Traversal%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68ac8ca3ad5a09ad004d302c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3478-cwe-79-improper-neutralization-of-in-3d38b50c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3478%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%20OpenText%20Enterprise%20Security%20Manager&amp;severity=high&amp;id=68ac893cad5a09ad004cf094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55301-cwe-20-improper-input-validation-in-6cc8c412</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55301%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20The-Scratch-Channel%20the-scratch-channel.github.io&amp;severity=medium&amp;id=68ac859bad5a09ad004cdbc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5302-cwe-674-uncontrolled-recursion-in-ru-1e9dcc0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5302%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68ac7e93ad5a09ad004caabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54370-cwe-918-server-side-request-forgery-ab632c82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54370%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PHPOffice%20PhpSpreadsheet&amp;severity=high&amp;id=68ac70a0ad5a09ad004c3ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/national-public-data-npd-relaunches-despite-29-bil-e39f8975</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=National%20Public%20Data%20(NPD)%20Relaunches%20Despite%202.9%20Billion%20SSNs%20Breach&amp;severity=high&amp;id=68ac7082ad5a09ad004c3af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26467-cwe-267-privilege-defined-with-unsa-936a7229</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26467%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=high&amp;id=68ac70a0ad5a09ad004c3b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53518-cwe-190-integer-overflow-or-wraparo-140f0004</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53518%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53853-cwe-122-heap-based-buffer-overflow--6c135e11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53853%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52581-cwe-190-integer-overflow-or-wraparo-b1bcc355</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52581%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54494-cwe-121-stack-based-buffer-overflow-385d433d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54494%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d03ad5a09ad004c2123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54493-cwe-121-stack-based-buffer-overflow-8e932621</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54493%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d03ad5a09ad004c2120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54492-cwe-121-stack-based-buffer-overflow-d5cbf9e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54492%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d03ad5a09ad004c211d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54491-cwe-121-stack-based-buffer-overflow-7a754495</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54491%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d03ad5a09ad004c211a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54490-cwe-121-stack-based-buffer-overflow-11436085</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54490%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c210d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54489-cwe-121-stack-based-buffer-overflow-a27d3587</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54489%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c210a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54488-cwe-121-stack-based-buffer-overflow-30eef4c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54488%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c2107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54487-cwe-121-stack-based-buffer-overflow-7449be11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54487%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c2104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54486-cwe-121-stack-based-buffer-overflow-083d5814</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54486%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c2101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54485-cwe-121-stack-based-buffer-overflow-958c6dfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54485%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c20fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54484-cwe-121-stack-based-buffer-overflow-2948eb66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54484%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c20fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54483-cwe-121-stack-based-buffer-overflow-676d0273</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54483%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c20f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54482-cwe-121-stack-based-buffer-overflow-e97ca8bc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54482%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c20f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54481-cwe-121-stack-based-buffer-overflow-e09360ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54481%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c20f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54480-cwe-121-stack-based-buffer-overflow-d4656069</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54480%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53557-cwe-122-heap-based-buffer-overflow--0d6856cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53557%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46411-cwe-121-stack-based-buffer-overflow-b075c4be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46411%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=high&amp;id=68ac6d01ad5a09ad004c20c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53511-cwe-122-heap-based-buffer-overflow--892b2d95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53511%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52461-cwe-125-out-of-bounds-read-in-the-b-e6ea750f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52461%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=high&amp;id=68ac6d01ad5a09ad004c20ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54462-cwe-122-heap-based-buffer-overflow--736ece71</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54462%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48005-cwe-122-heap-based-buffer-overflow--04bf3019</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48005%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparent-tribe-targets-indian-govt-with-weaponi-42ab4b2c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transparent%20Tribe%20Targets%20Indian%20Govt%20With%20Weaponized%20Desktop%20Shortcuts%20via%20Phishing&amp;severity=high&amp;id=68ac57e6ad5a09ad004b8cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-exploit-cheap-vps-to-launch-saas-hi-a45a80f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Exploit%20Cheap%20VPS%20to%20Launch%20SaaS%20Hijacking%20Attacks&amp;severity=high&amp;id=68ac50dead5a09ad004b6bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-backdoor-spies-on-russian-business-employe-0e3d3d19</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20backdoor%20spies%20on%20Russian%20business%20employees&amp;severity=medium&amp;id=68ac4652ad5a09ad004b19bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9407-cross-site-scripting-in-mtons-mblog-344abd7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9407%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68ac3f4aad5a09ad004aea55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vtenext-2502-a-three-way-path-to-rce-546ea8be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vtenext%2025.02%3A%20A%20three-way%20path%20to%20RCE&amp;severity=medium&amp;id=68ac3bc8ad5a09ad004ad3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48303-cwe-352-cross-site-request-forgery--21b07e24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48303%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kevin%20Langley%20Jr.%20Post%20Type%20Converter&amp;severity=null&amp;id=68ac3843ad5a09ad004aa554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/androidbackdoor916origin-malware-targets-russian-b-00886808</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android.Backdoor.916.origin%20malware%20targets%20Russian%20business%20executives&amp;severity=medium&amp;id=68ac313aad5a09ad004a85b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pakistan-linked-apt36-abuses-linux-desktop-files-t-e15b0b55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pakistan-linked%20APT36%20abuses%20Linux%20.desktop%20files%20to%20drop%20custom%20malware%20in%20new%20campaign&amp;severity=medium&amp;id=68ac313aad5a09ad004a85b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8562-cwe-22-improper-limitation-of-a-path-5054bc8f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8562%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20peterhebert%20Custom%20Query%20Shortcode&amp;severity=medium&amp;id=68ac315cad5a09ad004a8675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7426-cwe-200-exposure-of-sensitive-inform-0a3c2549</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7426%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MINOVA%20Information%20Services%20GmbH%20TTA&amp;severity=critical&amp;id=68ac26afad5a09ad004a4498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5191-cwe-428-unquoted-search-path-or-elem-e7a6ea77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5191%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Moxa%20Utility%20for%20DRP-A100%20Series&amp;severity=high&amp;id=68ac1c23ad5a09ad0049f6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-malicious-code-execution-in-python-0a2492ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20malicious%20code%20execution%20in%20Python&amp;severity=medium&amp;id=68ac151dad5a09ad0049be9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9118-cwe-22-improper-limitation-of-a-path-ff8f06cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9118%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Cloud%20Dataform&amp;severity=critical&amp;id=68ac0e13ad5a09ad00496a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54300-cwe-79-improper-neutralization-of-i-87fc37ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20norrnext.com%20Quantum%20Mamanger%20component%20for%20Joomla&amp;severity=high&amp;id=68ac0a8fad5a09ad00495487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54301-cwe-79-improper-neutralization-of-i-a6b7c8a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54301%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20norrnext.com%20Quantum%20Mamanger%20component%20for%20Joomla&amp;severity=high&amp;id=68ac0a8fad5a09ad0049548b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8997-cwe-598-use-of-get-request-method-wi-7dbbe279</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8997%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20OpenText%20OpenText%20Enterprise%20Security%20Manager&amp;severity=medium&amp;id=68ac070bad5a09ad00494509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5514-cwe-130-improper-handling-of-length--113d958f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5514%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=medium&amp;id=68abfc87ad5a09ad0048c208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9406-unrestricted-upload-in-xuhuisheng-le-33764b8d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9406%3A%20Unrestricted%20Upload%20in%20xuhuisheng%20lemon&amp;severity=medium&amp;id=68abe05fad5a09ad0047e454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9405-reachable-assertion-in-open5gs-37433bf7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9405%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=68abd958ad5a09ad0047beb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9404-cross-site-scripting-in-scada-lts-b4209d78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9404%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68abd250ad5a09ad00479d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9403-reachable-assertion-in-jqlang-jq-647b17b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9403%3A%20Reachable%20Assertion%20in%20jqlang%20jq&amp;severity=medium&amp;id=68abcb47ad5a09ad00477636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9402-server-side-request-forgery-in-huang-accb2f9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9402%3A%20Server-Side%20Request%20Forgery%20in%20HuangDou%20UTCMS&amp;severity=medium&amp;id=68abc43fad5a09ad00464f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9401-incorrect-comparison-in-huangdou-utc-15c0766f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9401%3A%20Incorrect%20Comparison%20in%20HuangDou%20UTCMS&amp;severity=medium&amp;id=68abba6fad5a09ad0044bd1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9400-unrestricted-upload-in-yifang-cms-31669530</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9400%3A%20Unrestricted%20Upload%20in%20YiFang%20CMS&amp;severity=medium&amp;id=68abb2abad5a09ad00448283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9399-sql-injection-in-yifang-cms-8fb5015c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9399%3A%20SQL%20Injection%20in%20YiFang%20CMS&amp;severity=medium&amp;id=68abaf34ad5a09ad00444a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-25-bdf08838</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-25&amp;severity=medium&amp;id=68acfd1ead5a09ad00525184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52130-na-a8025972</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52130%3A%20n%2Fa&amp;severity=medium&amp;id=68acbddcad5a09ad004ef93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50383-na-0fc99d95</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50383%3A%20n%2Fa&amp;severity=high&amp;id=68aca540ad5a09ad004e4a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50722-na-8c0fdb1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50722%3A%20n%2Fa&amp;severity=critical&amp;id=68ac972fad5a09ad004ddc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29421-na-607fc03a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29421%3A%20n%2Fa&amp;severity=high&amp;id=68ac93acad5a09ad004dbb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29420-na-4d71261b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29420%3A%20n%2Fa&amp;severity=high&amp;id=68ac93acad5a09ad004dbb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55574-na-f6d34d84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55574%3A%20n%2Fa&amp;severity=medium&amp;id=68ac893cad5a09ad004cf097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55575-na-3bf4883d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55575%3A%20n%2Fa&amp;severity=critical&amp;id=68ac859bad5a09ad004cdbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55409-na-3c871f49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55409%3A%20n%2Fa&amp;severity=high&amp;id=68ac8217ad5a09ad004cc9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29523-na-74648c8c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29523%3A%20n%2Fa&amp;severity=high&amp;id=68ac8217ad5a09ad004cc9a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56214-na-f6795e89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56214%3A%20n%2Fa&amp;severity=critical&amp;id=68ac7e93ad5a09ad004caaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56212-na-566fcfb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56212%3A%20n%2Fa&amp;severity=critical&amp;id=68ac7e93ad5a09ad004caab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50900-na-26cf8e81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50900%3A%20n%2Fa&amp;severity=critical&amp;id=68ac7e93ad5a09ad004caab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56216-na-4c523fb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56216%3A%20n%2Fa&amp;severity=high&amp;id=68ac7b10ad5a09ad004c8fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56215-na-b4bce054</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56215%3A%20n%2Fa&amp;severity=medium&amp;id=68ac7b10ad5a09ad004c8fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51281-na-916200a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51281%3A%20n%2Fa&amp;severity=high&amp;id=68ac778cad5a09ad004c785c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44178-na-adbac4e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44178%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c7859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29525-na-56f0fe74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29525%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c7856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29524-na-539ec538</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29524%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c7853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29522-na-ae0df6c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29522%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c784f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29521-na-169c4adc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29521%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c784b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29520-na-3c769968</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29520%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c7847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44179-na-6d6afc7f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44179%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c7844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29519-na-13f124e6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29519%3A%20n%2Fa&amp;severity=medium&amp;id=68ac7407ad5a09ad004c5013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29517-na-e486c640</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29517%3A%20n%2Fa&amp;severity=medium&amp;id=68ac70a0ad5a09ad004c3ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29516-na-0cd91a1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29516%3A%20n%2Fa&amp;severity=high&amp;id=68ac70a0ad5a09ad004c3ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29515-na-6ec5a54a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29515%3A%20n%2Fa&amp;severity=critical&amp;id=68ac70a0ad5a09ad004c3b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29514-na-0d07b753</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29514%3A%20n%2Fa&amp;severity=critical&amp;id=68ac70a0ad5a09ad004c3b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45968-na-dcf05240</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45968%3A%20n%2Fa&amp;severity=critical&amp;id=68ac6d03ad5a09ad004c2126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43960-na-f167bdec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43960%3A%20n%2Fa&amp;severity=high&amp;id=68ac65f7ad5a09ad004bdee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9398-information-disclosure-in-yifang-cms-088e4fe4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9398%3A%20Information%20Disclosure%20in%20YiFang%20CMS&amp;severity=medium&amp;id=68aba49bad5a09ad004306bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9397-unrestricted-upload-in-givanz-vvveb-be92badf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9397%3A%20Unrestricted%20Upload%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68ab9d93ad5a09ad0042dfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9396-null-pointer-dereference-in-ckolivas-5e142c7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9396%3A%20NULL%20Pointer%20Dereference%20in%20ckolivas%20lrzip&amp;severity=medium&amp;id=68ab968cad5a09ad00425276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9395-server-side-request-forgery-in-wangs-f5f77fde</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9395%3A%20Server-Side%20Request%20Forgery%20in%20wangsongyan%20wblog&amp;severity=medium&amp;id=68ab8f84ad5a09ad00415c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9394-use-after-free-in-podofo-ce43a1d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9394%3A%20Use%20After%20Free%20in%20PoDoFo&amp;severity=medium&amp;id=68ab3b25ad5a09ad0033d47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9393-stack-based-buffer-overflow-in-links-f35428e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9393%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68ab341dad5a09ad0033a4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9392-stack-based-buffer-overflow-in-links-70e8772d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9392%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68ab2d15ad5a09ad003387fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9391-sql-injection-in-bjskzy-zhiyou-erp-d2c82e99</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9391%3A%20SQL%20Injection%20in%20Bjskzy%20Zhiyou%20ERP&amp;severity=medium&amp;id=68ab260dad5a09ad0030750f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9390-buffer-overflow-in-vim-15a9146c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9390%3A%20Buffer%20Overflow%20in%20vim&amp;severity=medium&amp;id=68ab1f05ad5a09ad00304e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9389-memory-corruption-in-vim-550547c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9389%3A%20Memory%20Corruption%20in%20vim&amp;severity=medium&amp;id=68ab10f5ad5a09ad002fee00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9388-cross-site-scripting-in-scada-lts-40d71d90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9388%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68ab09eead5a09ad002fd072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9387-os-command-injection-in-dcn-dcme-720-c5fa4504</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9387%3A%20OS%20Command%20Injection%20in%20DCN%20DCME-720&amp;severity=medium&amp;id=68ab02e6ad5a09ad002fac21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-lamehug-e812f4e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20LAMEHUG&amp;severity=medium&amp;id=68ac42cead5a09ad004b0639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9386-use-after-free-in-appneta-tcpreplay-b6282630</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9386%3A%20Use%20After%20Free%20in%20appneta%20tcpreplay&amp;severity=medium&amp;id=68aaf4d6ad5a09ad002f6eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iot-under-siege-the-return-of-the-mirai-based-gayf-e734362c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IoT%20under%20siege%3A%20The%20return%20of%20the%20Mirai-based%20Gayfemboy%20Botnet&amp;severity=medium&amp;id=68aaedcdad5a09ad002f5563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9385-use-after-free-in-appneta-tcpreplay-f71dabad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9385%3A%20Use%20After%20Free%20in%20appneta%20tcpreplay&amp;severity=medium&amp;id=68aaedd9ad5a09ad002f5592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9384-null-pointer-dereference-in-appneta--be7655b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9384%3A%20NULL%20Pointer%20Dereference%20in%20appneta%20tcpreplay&amp;severity=medium&amp;id=68aae6c5ad5a09ad002f297e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9383-use-of-weak-hash-in-fnkvision-y215-c-b3a337a2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9383%3A%20Use%20of%20Weak%20Hash%20in%20FNKvision%20Y215%20CCTV%20Camera&amp;severity=low&amp;id=68aadfbead5a09ad002f0251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9382-backdoor-in-fnkvision-y215-cctv-came-f9188e38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9382%3A%20Backdoor%20in%20FNKvision%20Y215%20CCTV%20Camera&amp;severity=medium&amp;id=68aacaa7ad5a09ad002e8f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9381-information-disclosure-in-fnkvision--699c47ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9381%3A%20Information%20Disclosure%20in%20FNKvision%20Y215%20CCTV%20Camera&amp;severity=low&amp;id=68aac39fad5a09ad002e732b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9380-hard-coded-credentials-in-fnkvision--7a67070e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9380%3A%20Hard-coded%20Credentials%20in%20FNKvision%20Y215%20CCTV%20Camera&amp;severity=high&amp;id=68aabc97ad5a09ad002e532d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9379-insufficient-verification-of-data-au-082fc331</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9379%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Belkin%20AX1800&amp;severity=high&amp;id=68aab58fad5a09ad002e2ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8208-cwe-79-improper-neutralization-of-in-d7f4fa82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20templatescoderthemes%20Spexo%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%2C%20Mega%20Menu%2C%20Popup%20Builder%2C%20Template%20Kits%20and%20Starter%20Templates%20for%20Elementor&amp;severity=medium&amp;id=68aaa3fbad5a09ad002dfdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36174-cwe-434-unrestricted-upload-of-file-dbb1db28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36174%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20Integrated%20Analytics%20System&amp;severity=high&amp;id=68aa6bbbad5a09ad002d0c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36157-cwe-863-incorrect-authorization-in--b716a77f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36157%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Engineering%20Lifecycle%20Management&amp;severity=critical&amp;id=68aa6bbbad5a09ad002d0c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-24-60de6f96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-24&amp;severity=medium&amp;id=68abab9ead5a09ad00432131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/davita-confirms-ransomware-attack-compromised-data-c466fc5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DaVita%20confirms%20ransomware%20attack%20compromised%20data%20of%202.7M%20people&amp;severity=high&amp;id=68aa450ead5a09ad002b58fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-gmail-phishing-scam-uses-ai-style-prompt-injec-b7e33173</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Gmail%20Phishing%20Scam%20Uses%20AI-Style%20Prompt%20Injection%20to%20Evade%20Detection&amp;severity=medium&amp;id=68aa28f1ad5a09ad002ad752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-could-take-over-apple-devices-via-maliciou-51da2358</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Could%20Take%20Over%20Apple%20Devices%20Via%20Malicious%20Images%20%E2%80%93%20Patch%20Now!&amp;severity=medium&amp;id=68a9cd88ad5a09ad0029849a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9363-stack-based-buffer-overflow-in-links-dfd500b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9363%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a9cd9bad5a09ad002984b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9362-stack-based-buffer-overflow-in-links-4e336459</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9362%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68a9c681ad5a09ad00296a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9361-stack-based-buffer-overflow-in-links-5d3d6a75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9361%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a9b16aad5a09ad0029278a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-coinmarketcap-journalists-targeting-crypto-ex-4441852b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20CoinMarketCap%20Journalists%20Targeting%20Crypto%20Executives%20in%20Spear-Phishing%20Campaign&amp;severity=medium&amp;id=68a99c52ad5a09ad0028d489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-targets-indian-boss-linux-systems-with-weapo-96cd135a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36%3A%20Targets%20Indian%20BOSS%20Linux%20Systems%20with%20Weaponized%20AutoStart%20Files&amp;severity=medium&amp;id=68ac42cead5a09ad004b062c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9360-stack-based-buffer-overflow-in-links-006d144f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9360%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a99c5dad5a09ad0028d4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geoserver-exploits-polaredge-and-gayfemboy-push-cy-b02a4205</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeoServer%20Exploits%2C%20PolarEdge%2C%20and%20Gayfemboy%20Push%20Cybercrime%20Beyond%20Traditional%20Botnets&amp;severity=high&amp;id=68a998cfad5a09ad0028bda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/murky-panda-hackers-exploit-cloud-trust-to-hack-do-8c8a7a28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Murky%20Panda%20hackers%20exploit%20cloud%20trust%20to%20hack%20downstream%20customers&amp;severity=high&amp;id=68a98e41ad5a09ad00288a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-300-entities-hit-by-a-variant-of-atomic-macos-a0b51c1c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20300%20entities%20hit%20by%20a%20variant%20of%20Atomic%20macOS%20Stealer%20in%20recent%20campaign&amp;severity=medium&amp;id=68a98e41ad5a09ad00288a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9359-stack-based-buffer-overflow-in-links-06afeb49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9359%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a98e5dad5a09ad00288aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/countering-edrs-with-the-backing-of-protected-proc-b2abb249</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Countering%20EDRs%20With%20The%20Backing%20Of%20Protected%20Process%20Light%20(PPL)&amp;severity=medium&amp;id=68a983baad5a09ad00284c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9358-stack-based-buffer-overflow-in-links-2f2d605c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9358%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a97223ad5a09ad0027ff1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5352-cwe-79-improper-neutralization-of-in-7004d31f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68a96797ad5a09ad0027ba9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5060-cwe-288-authentication-bypass-using--ccd319f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5060%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Bravis-Themes%20Bravis%20User&amp;severity=high&amp;id=68aa5e2bad5a09ad002cc9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5821-cwe-288-authentication-bypass-using--f0163f32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5821%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Case-Themes%20Case%20Theme%20User&amp;severity=critical&amp;id=68aa5e2bad5a09ad002cc9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcp-hub-hackerone-mcp-37b5d619</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MCP%20Hub%20%3E%20hackerone-mcp&amp;severity=medium&amp;id=68a96092ad5a09ad00279c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9357-stack-based-buffer-overflow-in-links-ee993b24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9357%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a95d0cad5a09ad00278c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7813-cwe-918-server-side-request-forgery--31e5c723</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7813%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=high&amp;id=68a959b9ad5a09ad002780e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43764-cwe-1333-inefficient-regular-expres-6241b501</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43764%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a94b77ad5a09ad0026bc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43765-cwe-79-improper-neutralization-of-i-ce57438e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a947f3ad5a09ad0026a825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7957-cwe-79-improper-neutralization-of-in-ebf34618</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7957%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surror%20ShortcodeHub%20%E2%80%93%20MultiPurpose%20Shortcode%20Builder&amp;severity=medium&amp;id=68a9446fad5a09ad00269547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7841-cwe-352-cross-site-request-forgery-c-6a6d7503</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7841%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sertifier%20Sertifier%20Certificate%20%26%20Badge%20Maker%20for%20WordPress%20%E2%80%93%20Tutor%20LMS&amp;severity=medium&amp;id=68a9446fad5a09ad0026953f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7821-cwe-862-missing-authorization-in-wcp-7061c922</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7821%3A%20CWE-862%20Missing%20Authorization%20in%20wcplus%20WC%20Plus&amp;severity=medium&amp;id=68a9446fad5a09ad0026952f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7828-cwe-862-missing-authorization-in-evi-a9027329</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7828%3A%20CWE-862%20Missing%20Authorization%20in%20evigeo%20WP%20Filter%20%26%20Combine%20RSS%20Feeds&amp;severity=medium&amp;id=68a9446fad5a09ad00269537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7839-cwe-352-cross-site-request-forgery-c-609ebabe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7839%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pokornydavid%20Restore%20Permanently%20delete%20Post%20or%20Page%20Data&amp;severity=medium&amp;id=68a9446fad5a09ad0026953b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7842-cwe-352-cross-site-request-forgery-c-22ac42fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7842%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20silence%20Silencesoft%20RSS%20Reader&amp;severity=medium&amp;id=68a9446fad5a09ad00269543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8062-cwe-79-improper-neutralization-of-in-bd967540</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wen-solutions%20WS%20Theme%20Addons&amp;severity=medium&amp;id=68a9446fad5a09ad0026954c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9048-cwe-73-external-control-of-file-name-d02d6c61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9048%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wptobe%20Wptobe-memberships&amp;severity=high&amp;id=68a94470ad5a09ad0026955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7827-cwe-862-missing-authorization-in-anz-c38fb478</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7827%3A%20CWE-862%20Missing%20Authorization%20in%20anzia%20Ni%20WooCommerce%20Customer%20Product%20Report&amp;severity=medium&amp;id=68a9446fad5a09ad00269533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9131-cwe-79-improper-neutralization-of-in-bc8dd20f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ogulo%20Ogulo%20%E2%80%93%20360%C2%B0%20Tour&amp;severity=medium&amp;id=68a94470ad5a09ad00269560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7642-cwe-288-authentication-bypass-using--0c31e6bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7642%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20simplercheckout%20Simpler%20Checkout&amp;severity=critical&amp;id=68a9446fad5a09ad0026952b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43766-cwe-434-unrestricted-upload-of-file-ed632658</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43766%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a9446fad5a09ad00269528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43767-cwe-601-url-redirection-to-untruste-db33790d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43767%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a939e3ad5a09ad00267457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43768-cwe-201-insertion-of-sensitive-info-65f73ab4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43768%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a932dcad5a09ad00262a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43769-cwe-79-improper-neutralization-of-i-2c601b9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a932dcad5a09ad00262a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43770-cwe-79-improper-neutralization-of-i-e3b7acd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a91dc3ad5a09ad00246005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-23-4e7e5761</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-23&amp;severity=medium&amp;id=68aa5a1ead5a09ad002c8e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-document-readers-and-deception-tracking-th-42226465</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Document%20Readers%20and%20Deception%3A%20Tracking%20the%20Latest%20Updates%20to%20Anatsa&amp;severity=medium&amp;id=68ac42cead5a09ad004b061e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cookie-spiders-malvertising-attack-drops-new-shamo-61cc0e63</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=COOKIE%20SPIDER&apos;s%20Malvertising%20Attack%20Drops%20New%20SHAMOS%20macOS%20Malware&amp;severity=medium&amp;id=68a8fa9aad5a09ad002348b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9356-stack-based-buffer-overflow-in-links-8c0b201f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9356%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a8de7bad5a09ad00227c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9355-stack-based-buffer-overflow-in-links-f962dc9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9355%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a8de7bad5a09ad00227c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43761-cwe-79-improper-neutralization-of-i-6aa0ee69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8daf6ad5a09ad00226b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52451-cwe-20-improper-input-validation-in-c3e5c7f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52451%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=68a8d3f1ad5a09ad002249e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52450-cwe-22-improper-limitation-of-a-pat-afc10401</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52450%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Salesforce%20Tableau%20Server&amp;severity=medium&amp;id=68a8d3f1ad5a09ad002249dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26498-cwe-434-unrestricted-upload-of-file-3c2e4b23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26498%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=68a8d3f1ad5a09ad002249da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26497-cwe-434-unrestricted-upload-of-file-2e26aa0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26497%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=68a8d3f1ad5a09ad002249d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26496-cwe-843-access-of-resource-using-in-ec4b26b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26496%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Salesforce%20Tableau%20Server%2C%20Tableau%20Desktop&amp;severity=critical&amp;id=68a8d3f1ad5a09ad002249d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57801-cwe-347-improper-verification-of-cr-d0df0518</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57801%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Consensys%20gnark&amp;severity=high&amp;id=68a8cce7ad5a09ad0022289e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43759-cwe-732-incorrect-permission-assign-f4e13037</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43759%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8c25bad5a09ad00217696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6791-cwe-89-improper-neutralization-of-sp-d40c6d53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6791%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20web&amp;severity=high&amp;id=68a8bed7ad5a09ad0021645d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4650-cwe-89-improper-neutralization-of-sp-fa15c745</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4650%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20web&amp;severity=high&amp;id=68a8bed7ad5a09ad00216461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54812-cwe-117-improper-output-neutralizat-de7d1d4b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54812%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Apache%20Software%20Foundation%20Apache%20Log4cxx&amp;severity=low&amp;id=68a8bed7ad5a09ad00216468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54813-cwe-117-improper-output-neutralizat-88df2202</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54813%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Apache%20Software%20Foundation%20Apache%20Log4cxx&amp;severity=medium&amp;id=68a8bed7ad5a09ad0021646d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43762-cwe-770-allocation-of-resources-wit-f43a2a80</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43762%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8bed7ad5a09ad00216465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48988-cwe-564-sql-injection-in-apache-sof-5c00f079</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48988%3A%20CWE-564%20SQL%20Injection%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=high&amp;id=690a6f059e609817bf702f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43758-cwe-552-files-or-directories-access-609c0da9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43758%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8b7cfad5a09ad00212d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-on-macos-applescript-stealer-terminal-phi-23813e64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clickfix%20on%20macOS%3A%20AppleScript%20Stealer%2C%20Terminal%20Phishing%2C%20and%20C2%20Infrastructure&amp;severity=medium&amp;id=68ac4652ad5a09ad004b19a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43760-cwe-79-cross-site-scripting-in-life-0087736d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43760%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8ad43ad5a09ad0020e5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-mac-fixes-trick-users-into-installing-new-sha-69c01f05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Mac%20fixes%20trick%20users%20into%20installing%20new%20Shamos%20infostealer&amp;severity=high&amp;id=68a8a9bead5a09ad0020bcd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-harvest-extracting-windows-secrets-under-th-137cce61</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Harvest%3A%20Extracting%20Windows%20Secrets%20Under%20the%20Radar&amp;severity=medium&amp;id=68a8a9d4ad5a09ad0020bd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57800-cwe-523-unprotected-transport-of-cr-94cd0422</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57800%3A%20CWE-523%3A%20Unprotected%20Transport%20of%20Credentials%20in%20advplyr%20audiobookshelf&amp;severity=high&amp;id=68a8a63bad5a09ad0020a08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-boy-is-a-gadget-for-hackers-together-with-its-af07efbc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High%20Boy%20is%20a%20gadget%20for%20hackers%2C%20together%20with%20its%20friend%2C%20OctoBit&amp;severity=high&amp;id=68a8a2bcad5a09ad00208678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57771-cwe-78-improper-neutralization-of-s-375f7ba5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57771%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=68a89f33ad5a09ad0020783a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43751-cwe-203-observable-discrepancy-in-l-d32e160d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43751%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8982fad5a09ad00203a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53363-cwe-73-external-control-of-file-nam-b9bb1b3b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53363%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20donknap%20dpanel&amp;severity=medium&amp;id=68a88da0ad5a09ad001ff897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36042-cwe-79-improper-neutralization-of-i-303744d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36042%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=68a88698ad5a09ad001fd4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33120-cwe-250-in-ibm-qradar-siem-04e2a189</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33120%3A%20CWE-250%20in%20IBM%20QRadar%20SIEM&amp;severity=high&amp;id=68a88698ad5a09ad001fd4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/davita-says-ransomware-gang-stole-data-of-nearly-2-f8f48c31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DaVita%20says%20ransomware%20gang%20stole%20data%20of%20nearly%202.7%20million%20people&amp;severity=high&amp;id=68a8717fad5a09ad001f154c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57896-cwe-862-missing-authorization-in-an-31dd70b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57896%3A%20Missing%20Authorization%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=68a85feead5a09ad001ebe6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57895-cwe-352-cross-site-request-forgery--f97cbf80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57895%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hossni%20Mubarak%20JobWP&amp;severity=null&amp;id=68a85feead5a09ad001ebe67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57894-cwe-862-missing-authorization-in-ol-724ef91d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57894%3A%20Missing%20Authorization%20in%20ollybach%20WPPizza&amp;severity=null&amp;id=68a85feead5a09ad001ebe5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57893-cwe-352-cross-site-request-forgery--f2ab17e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57893%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=68a85feead5a09ad001ebe57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57892-cwe-352-cross-site-request-forgery--915d34e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57892%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jeff%20Starr%20Simple%20Statistics%20for%20Feeds&amp;severity=null&amp;id=68a85feead5a09ad001ebe54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57891-cwe-79-improper-neutralization-of-i-927f3fac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpecommerce%20Recurring%20PayPal%20Donations&amp;severity=null&amp;id=68a85feead5a09ad001ebe51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57890-cwe-79-improper-neutralization-of-i-b4c6aafa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pierre%20Lannoy%20Sessions&amp;severity=null&amp;id=68a85feead5a09ad001ebe4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57888-cwe-497-exposure-of-sensitive-syste-cc482aaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57888%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20NooTheme%20Jobmonster&amp;severity=null&amp;id=68a85feead5a09ad001ebe4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57887-cwe-79-improper-neutralization-of-i-04be1f8a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=null&amp;id=68a85feead5a09ad001ebe48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57886-cwe-639-authorization-bypass-throug-382a2a73</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57886%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Equalize%20Digital%20Accessibility%20Checker%20by%20Equalize%20Digital&amp;severity=null&amp;id=68a85feead5a09ad001ebe45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57885-cwe-352-cross-site-request-forgery--e1d54171</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57885%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjahan%20Jewel%20Fluent%20Support&amp;severity=null&amp;id=68a85feead5a09ad001ebe42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57884-cwe-862-missing-authorization-in-wp-4f560cff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57884%3A%20Missing%20Authorization%20in%20wpsoul%20Greenshift&amp;severity=null&amp;id=68a85feead5a09ad001ebe3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9259-cwe-36-absolute-path-traversal-in-un-217ae169</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9259%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=68a85c68ad5a09ad001ead27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9258-cwe-36-absolute-path-traversal-in-un-a317e358</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9258%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=68a87504ad5a09ad001f3cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9257-cwe-36-absolute-path-traversal-in-un-a1eb12c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9257%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=68a87504ad5a09ad001f3cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9256-cwe-36-absolute-path-traversal-in-un-0365f2c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9256%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=68a858e4ad5a09ad001e9c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9255-cwe-89-improper-neutralization-of-sp-5cebb8f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9255%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Uniong%20WebITR&amp;severity=high&amp;id=68a85560ad5a09ad001e8473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9254-cwe-306-missing-authentication-for-c-3ce2b295</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9254%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Uniong%20WebITR&amp;severity=critical&amp;id=68a85560ad5a09ad001e846f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9331-cwe-862-missing-authorization-in-the-f4b97e18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9331%3A%20CWE-862%20Missing%20Authorization%20in%20themegrill%20Spacious&amp;severity=medium&amp;id=68a85560ad5a09ad001e8477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proxyware-malware-being-distributed-on-youtube-vid-af108164</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Proxyware%20Malware%20Being%20Distributed%20on%20YouTube%20Video%20Download%20Site&amp;severity=medium&amp;id=68a8bed6ad5a09ad00216414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/after-sharepoint-attacks-microsoft-stops-sharing-p-0d837cb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=After%20SharePoint%20attacks%2C%20Microsoft%20stops%20sharing%20PoC%20exploit%20code%20with%20China&amp;severity=high&amp;id=68a843cbad5a09ad001e12ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-developer-jailed-four-years-for-sabotaging-ohio-3a62bc47</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-Developer%20Jailed%20Four%20Years%20for%20Sabotaging%20Ohio%20Employer%20with%20Kill-Switch%20Malware&amp;severity=high&amp;id=68a84053ad5a09ad001df92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-apple-ios-ipados-and-macos-flaw-to-it-d12ff67a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Apple%20iOS%2C%20iPadOS%2C%20and%20macOS%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68a83cc3ad5a09ad001dec26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9341-cwe-400-uncontrolled-resource-consum-a3150bcc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9341%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20Bouncy%20Castle%20for%20Java%20FIPS&amp;severity=medium&amp;id=68a835bcad5a09ad001dc375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8678-cwe-918-server-side-request-forgery--3b8e4a1c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8678%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20johnbillion%20WP%20Crontrol&amp;severity=medium&amp;id=68a81d21ad5a09ad001d27d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57699-unquoted-search-path-or-element-in--f8e5d6d0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57699%3A%20Unquoted%20search%20path%20or%20element%20in%20Western%20Digital%20Corporation%20Western%20Digital%20Kitfox%20for%20Windows&amp;severity=medium&amp;id=68a8161aad5a09ad001d0446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8281-cwe-79-cross-site-scripting-xss-in-w-c6faadf4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8281%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Talroo&amp;severity=high&amp;id=68a80b8ead5a09ad001cbcc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41452-cwe-15-external-control-of-system-o-ddcf84a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41452%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Danfoss%20AK-SM8xxA%20Series&amp;severity=medium&amp;id=68a7ddd8ad5a09ad001ac7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41451-cwe-77-improper-neutralization-of-s-96eedaa0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41451%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Danfoss%20AK-SM8xxA%20Series&amp;severity=high&amp;id=68a7ddd8ad5a09ad001ac7c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43752-cwe-770-allocation-of-resources-wit-8059fa03</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43752%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a7bab8ad5a09ad0019f01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55455-na-3f7f0148</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55455%3A%20n%2Fa&amp;severity=low&amp;id=68a90cc7ad5a09ad0023d515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-22-6ab7fd87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-22&amp;severity=medium&amp;id=68a9089ead5a09ad00239eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50859-na-5af11d62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50859%3A%20n%2Fa&amp;severity=medium&amp;id=68a8c25bad5a09ad002176a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50858-na-e0a6e524</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50858%3A%20n%2Fa&amp;severity=medium&amp;id=68a8c25bad5a09ad0021769f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55454-na-a526aded</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55454%3A%20n%2Fa&amp;severity=high&amp;id=68a8c25bad5a09ad0021769c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51092-na-9d5e08d6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51092%3A%20n%2Fa&amp;severity=critical&amp;id=68a8c25bad5a09ad00217699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52287-na-560bc61f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52287%3A%20n%2Fa&amp;severity=high&amp;id=68a8b44bad5a09ad00210d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55581-na-e8ccba13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55581%3A%20n%2Fa&amp;severity=high&amp;id=68a8b0c7ad5a09ad0020f794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52085-na-e3e987c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52085%3A%20n%2Fa&amp;severity=high&amp;id=68a8b0c7ad5a09ad0020f790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55613-na-2566f488</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55613%3A%20n%2Fa&amp;severity=critical&amp;id=68a8a9d0ad5a09ad0020bd5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigation-report-apt36-malware-campaign-using--79facd6f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigation%20Report%3A%20APT36%20Malware%20Campaign%20Using%20Desktop%20Entry%20Files%20and%20Google%20Drive%20Payload%20Delivery&amp;severity=medium&amp;id=68a8a9b3ad5a09ad0020bc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55637-na-ada085ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55637%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55634-na-858fb807</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55634%3A%20n%2Fa&amp;severity=high&amp;id=68a8a2b8ad5a09ad00208652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55631-na-f240bf46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55631%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad0020864f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55630-na-0571ebe6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55630%3A%20n%2Fa&amp;severity=high&amp;id=68a8a2b8ad5a09ad0020864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55629-na-7d4a7096</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55629%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad0020863f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55627-na-b12fb161</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55627%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad0020863c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55626-na-164a9d70</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55626%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55625-na-9012dd7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55625%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55624-na-608400d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55624%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55623-na-e903d14c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55623%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad0020862f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55622-na-53453b2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55622%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad0020862c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55621-na-7e0b5d67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55621%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55620-na-07d3cb05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55620%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55619-na-947ae373</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55619%3A%20n%2Fa&amp;severity=critical&amp;id=68a8a2b8ad5a09ad0020861f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55398-na-7e39acb7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55398%3A%20n%2Fa&amp;severity=critical&amp;id=68a89f33ad5a09ad00207837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57105-na-1bf05565</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57105%3A%20n%2Fa&amp;severity=critical&amp;id=68a89bafad5a09ad002059c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55611-na-9321fcd2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55611%3A%20n%2Fa&amp;severity=critical&amp;id=68a8982fad5a09ad00203a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55605-na-5b780b49</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55605%3A%20n%2Fa&amp;severity=critical&amp;id=68a8982fad5a09ad00203a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55606-na-a4d6892e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55606%3A%20n%2Fa&amp;severity=critical&amp;id=68a8982fad5a09ad00203a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55603-na-f7419590</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55603%3A%20n%2Fa&amp;severity=critical&amp;id=68a8982fad5a09ad00203a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55599-na-a01237c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55599%3A%20n%2Fa&amp;severity=critical&amp;id=68a894a7ad5a09ad00202838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52095-na-a96de7a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52095%3A%20n%2Fa&amp;severity=critical&amp;id=68a894a7ad5a09ad00202833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55602-na-44e9d075</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55602%3A%20n%2Fa&amp;severity=critical&amp;id=68a894a7ad5a09ad0020282f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29366-na-fa3667de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29366%3A%20n%2Fa&amp;severity=critical&amp;id=68a89124ad5a09ad0020033c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52094-na-5ac46a7e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52094%3A%20n%2Fa&amp;severity=high&amp;id=68a89124ad5a09ad00200337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50733-na-3e9555c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50733%3A%20n%2Fa&amp;severity=medium&amp;id=68a89124ad5a09ad00200333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51605-na-ac7db4fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51605%3A%20n%2Fa&amp;severity=high&amp;id=68a88da0ad5a09ad001ff894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50674-na-b54a0f53</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50674%3A%20n%2Fa&amp;severity=high&amp;id=68a88da0ad5a09ad001ff890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29365-na-e6d49979</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29365%3A%20n%2Fa&amp;severity=critical&amp;id=68a88da0ad5a09ad001ff88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55573-na-4d3cc880</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55573%3A%20n%2Fa&amp;severity=high&amp;id=68a88698ad5a09ad001fd4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50691-na-5f88cf49</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50691%3A%20n%2Fa&amp;severity=medium&amp;id=68a87888ad5a09ad001f4bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51825-na-08ae3784</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51825%3A%20n%2Fa&amp;severity=medium&amp;id=68a87888ad5a09ad001f4bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/colt-confirms-customer-data-stolen-as-warlock-rans-f06110e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Colt%20confirms%20customer%20data%20stolen%20as%20Warlock%20ransomware%20auctions%20files&amp;severity=high&amp;id=68a7b023ad5a09ad00193a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43753-cwe-79-improper-neutralization-of-i-9ac1e291</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=low&amp;id=68a79e90ad5a09ad0018c661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/camel-security-demonstration-defending-against-mos-1d19037f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CaMeL%20Security%20Demonstration%20-%20Defending%20Against%20(most)%20Prompt%20Injections%20by%20Design&amp;severity=medium&amp;id=68a79b10ad5a09ad0018b6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-hidden-risks-of-passkeys-in-ab-052dfb35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20uncover%20hidden%20risks%20of%20passkeys%20in%20abusive%20relationships&amp;severity=medium&amp;id=68a79787ad5a09ad0018a12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-malware-campaign-using-desktop-entry-files-a-7819bf28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36%20Malware%20Campaign%20Using%20Desktop%20Entry%20Files%20and%20Google%20Drive%20Payload%20Delivery&amp;severity=medium&amp;id=68a78cfbad5a09ad0018401e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/think-before-you-clickfix-analyzing-the-clickfix-s-a542f636</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Think%20before%20you%20Click(Fix)%3A%20Analyzing%20the%20ClickFix%20social%20engineering%20technique&amp;severity=medium&amp;id=68a78cfbad5a09ad00184012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43747-cwe-918-server-side-request-forgery-6f239f68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43747%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Liferay%20DXP&amp;severity=medium&amp;id=68a78270ad5a09ad0018061f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54460-cwe-434-in-aveva-pi-integrator-09cee76f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54460%3A%20CWE-434%20in%20AVEVA%20PI%20Integrator&amp;severity=high&amp;id=68a77b71ad5a09ad0017da64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41415-cwe-201-in-aveva-pi-integrator-9a8e10bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41415%3A%20CWE-201%20in%20AVEVA%20PI%20Integrator&amp;severity=medium&amp;id=68a77b71ad5a09ad0017da59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55231-cwe-362-concurrent-execution-using--acd02db7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55231%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=68a77b71ad5a09ad0017da74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55229-cwe-347-improper-verification-of-cr-84324734</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55229%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68a77b71ad5a09ad0017da6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55230-cwe-822-untrusted-pointer-dereferen-5fd7d636</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55230%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68a77b71ad5a09ad0017da71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53795-cwe-285-improper-authorization-in-m-57ca0d75</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53795%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20PC%20Manager&amp;severity=critical&amp;id=68a77b71ad5a09ad0017da6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53763-cwe-284-improper-access-control-in--4a43aaed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53763%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Purview%20Data%20Governance&amp;severity=critical&amp;id=68a77b71ad5a09ad0017da68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24489-cwe-434-in-infinitt-healthcare-infi-489ffbbc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24489%3A%20CWE-434%20in%20INFINITT%20Healthcare%20INFINITT%20PACS%20System%20Manager&amp;severity=medium&amp;id=68a77b71ad5a09ad0017da77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27714-cwe-434-in-infinitt-healthcare-infi-c013dad6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27714%3A%20CWE-434%20in%20INFINITT%20Healthcare%20INFINITT%20PACS%20System%20Manager&amp;severity=medium&amp;id=68a77b71ad5a09ad0017da7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3128-cwe-78-in-mitsubishi-electric-europe-2fe6d6fe</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3128%3A%20CWE-78%20in%20Mitsubishi%20Electric%20Europe%20smartRTU&amp;severity=critical&amp;id=68a777e4ad5a09ad0017b034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27721-cwe-497-in-infinitt-healthcare-infi-4f6674c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27721%3A%20CWE-497%20in%20INFINITT%20Healthcare%20INFINITT%20PACS%20System%20Manager&amp;severity=high&amp;id=68a777e4ad5a09ad0017b038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55107-cwe-79-improper-neutralization-of-i-32fa285c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55107%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS%20Enterprise%20Sites&amp;severity=medium&amp;id=68a77460ad5a09ad00179dd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55106-cwe-79-improper-neutralization-of-i-bd0dd185</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55106%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS%20Enterprise%20Sites&amp;severity=medium&amp;id=68a77460ad5a09ad00179dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55105-cwe-79-improper-neutralization-of-i-772df2e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55105%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS%20Enterprise%20Experience%20Sites&amp;severity=medium&amp;id=68a77460ad5a09ad00179dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55104-cwe-79-improper-neutralization-of-i-eb2bd7da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55104%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS%20Enterprise%20Sites&amp;severity=medium&amp;id=68a77460ad5a09ad00179dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55103-cwe-79-improper-neutralization-of-i-2f211022</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55103%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS%20Enterprise%20Sites&amp;severity=medium&amp;id=68a77460ad5a09ad00179dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38743-cwe-805-buffer-access-with-incorrec-584a4acd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38743%3A%20CWE-805%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Dell%20iDRAC%20Service%20Module%20(iSM)&amp;severity=high&amp;id=68a76d58ad5a09ad00177218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38742-cwe-732-incorrect-permission-assign-6bc05793</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38742%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20iDRAC%20Service%20Module%20(iSM)&amp;severity=medium&amp;id=68a76d58ad5a09ad0017721b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-gang-claims-4tb-data-breach-at-ni-9814751a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Gang%20Claims%204TB%20Data%20Breach%20at%20Nissan%20CBI&amp;severity=high&amp;id=68a7665aad5a09ad0017471f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pre-auth-exploit-chains-found-in-commvault-could-e-e118b56b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pre-Auth%20Exploit%20Chains%20Found%20in%20Commvault%20Could%20Enable%20Remote%20Code%20Execution%20Attacks&amp;severity=high&amp;id=68a75f46ad5a09ad00171f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7051-cwe-284-in-n-able-n-central-673dc131</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7051%3A%20CWE-284%20in%20N-able%20N-central&amp;severity=high&amp;id=68a75bc5ad5a09ad00170307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57768-cwe-79-improper-neutralization-of-i-3d6fc18b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57768%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alanaktion%20phproject&amp;severity=medium&amp;id=68a75bc4ad5a09ad00170304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43754-cwe-208-observable-timing-discrepan-9023f9d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43754%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a75bc4ad5a09ad001702f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57765-cwe-79-improper-neutralization-of-i-6904feeb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57765%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68a754bbad5a09ad0016a78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57764-cwe-79-improper-neutralization-of-i-c451b39f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57764%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68a754bbad5a09ad0016a786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9311-sql-injection-in-itsourcecode-apartm-282d8aab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9311%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68a754bbad5a09ad0016a78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57763-cwe-79-improper-neutralization-of-i-5b33e195</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57763%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68a75137ad5a09ad0012b6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57762-cwe-79-improper-neutralization-of-i-0f61e532</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57762%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68a75137ad5a09ad0012b6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43755-cwe-79-cross-site-scripting-in-life-11fcb566</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43755%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a74dc4ad5a09ad0012a5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57761-cwe-89-improper-neutralization-of-s-8779f0c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57761%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68a74dc4ad5a09ad0012a5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-browsers-can-be-tricked-into-paying-fake-stores-e53affdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Browsers%20Can%20Be%20Tricked%20Into%20Paying%20Fake%20Stores%20in%20PromptFix%20Attack&amp;severity=medium&amp;id=68a74db2ad5a09ad0012a58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9310-hard-coded-credentials-in-yeqifu-car-710bd1da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9310%3A%20Hard-coded%20Credentials%20in%20yeqifu%20carRental&amp;severity=medium&amp;id=68a74dc5ad5a09ad0012a5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9309-hard-coded-credentials-in-tenda-ac10-5209bc54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9309%3A%20Hard-coded%20Credentials%20in%20Tenda%20AC10&amp;severity=low&amp;id=68a74dc4ad5a09ad0012a5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57755-cwe-200-exposure-of-sensitive-infor-8f05e627</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57755%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20musistudio%20claude-code-router&amp;severity=high&amp;id=68a74a30ad5a09ad00128c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43756-cwe-79-cross-site-scripting-in-life-4359bba7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43756%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a74a30ad5a09ad00128c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-can-be-used-to-create-working-exploits-for-publ-38d79ce9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20can%20be%20used%20to%20create%20working%20exploits%20for%20published%20CVEs%20in%20a%20few%20minutes%20and%20for%20a%20few%20dollars&amp;severity=medium&amp;id=68a74a34ad5a09ad00128c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-variant-of-acrstealer-actively-distributed-wit-053c8685</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Variant%20of%20ACRStealer%20Actively%20Distributed%20with%20Modifications&amp;severity=medium&amp;id=68a77b67ad5a09ad0017d760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-leveraging-dchspy-for-israel-iran-confl-a42d8ade</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Leveraging%20DCHSpy%20For%20Israel-Iran%20Conflict&amp;severity=medium&amp;id=68a7745fad5a09ad00179d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57754-cwe-260-password-in-configuration-f-fb1d8ae1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57754%3A%20CWE-260%3A%20Password%20in%20Configuration%20File%20in%20kristoferfannar%20eslint-ban-moment&amp;severity=critical&amp;id=68a74a30ad5a09ad00128c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57753-cwe-22-improper-limitation-of-a-pat-48524f7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57753%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sapphi-red%20vite-plugin-static-copy&amp;severity=medium&amp;id=68a746acad5a09ad00127771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9308-inefficient-regular-expression-compl-97173154</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9308%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20yarnpkg%20Yarn&amp;severity=medium&amp;id=68a746acad5a09ad0012777b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9307-sql-injection-in-phpgurukul-online-c-d025024b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9307%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=68a746acad5a09ad00127774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9162-cleartext-storage-of-sensitive-infor-a62457e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9162%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.0&amp;severity=medium&amp;id=68a73fa3ad5a09ad00124d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9306-cross-site-scripting-in-sourcecodest-7eb60f4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9306%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Advanced%20School%20Management%20System&amp;severity=medium&amp;id=68a73c20ad5a09ad00123248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55297-cwe-120-buffer-copy-without-checkin-632d26ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55297%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=68a7389bad5a09ad00121fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9305-sql-injection-in-sourcecodester-onli-71e7ec29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9305%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Bank%20Management%20System&amp;severity=medium&amp;id=68a7389bad5a09ad00121fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9304-sql-injection-in-sourcecodester-onli-14b56911</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9304%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Bank%20Management%20System&amp;severity=medium&amp;id=68a7389bad5a09ad00121fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53251-cwe-434-unrestricted-upload-of-file-4b86a8a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53251%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20An-Themes%20Pin%20WP&amp;severity=null&amp;id=68a73519ad5a09ad0011fe4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48956-cwe-400-uncontrolled-resource-consu-78c7ee9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48956%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20vllm-project%20vllm&amp;severity=high&amp;id=68a73519ad5a09ad0011fe46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9303-buffer-overflow-in-totolink-a720r-f79f2690</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9303%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A720R&amp;severity=high&amp;id=68a73193ad5a09ad0011c053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9302-sql-injection-in-phpgurukul-user-man-0519d4f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9302%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Management%20System&amp;severity=medium&amp;id=68a72a8bad5a09ad00117f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/azures-weakest-link-full-cross-tenant-compromise-1edccdcd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Azure&apos;s%20Weakest%20Link%20-%20Full%20Cross-Tenant%20Compromise&amp;severity=medium&amp;id=68a7271cad5a09ad0011286f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34158-cwe-20-improper-input-validation-in-cae7d54d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34158%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Plex%20Media%20Server&amp;severity=high&amp;id=68a72384ad5a09ad00111837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9301-reachable-assertion-in-cmake-3cee0bfe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9301%3A%20Reachable%20Assertion%20in%20cmake&amp;severity=medium&amp;id=68a72384ad5a09ad0011184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weak-passwords-and-compromised-accounts-key-findin-d08adfef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weak%20Passwords%20and%20Compromised%20Accounts%3A%20Key%20Findings%20from%20the%20Blue%20Report%202025&amp;severity=high&amp;id=68a71c7aad5a09ad001101c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-using-new-quirkyloader-malware-to-spread-a-e2f48b56</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Using%20New%20QuirkyLoader%20Malware%20to%20Spread%20Agent%20Tesla%2C%20AsyncRAT%20and%20Snake%20Keylogger&amp;severity=high&amp;id=68a71c7aad5a09ad001101cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9300-stack-based-buffer-overflow-in-saito-168036dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9300%3A%20Stack-based%20Buffer%20Overflow%20in%20saitoha%20libsixel&amp;severity=medium&amp;id=68a71c96ad5a09ad0011027c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9299-stack-based-buffer-overflow-in-tenda-523bc229</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9299%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=68a718f8ad5a09ad0010f37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9298-stack-based-buffer-overflow-in-tenda-d593fbe3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9298%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=68a718f8ad5a09ad0010f377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9297-stack-based-buffer-overflow-in-tenda-5a6b7fb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9297%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i22&amp;severity=high&amp;id=68a70e6cad5a09ad0010ba7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nearly-1-million-health-records-and-ssns-exposed-i-b340dc47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nearly%201%20Million%20Health%20Records%20and%20SSNs%20Exposed%20in%20Marijuana%20Patient%20Database&amp;severity=medium&amp;id=68a70762ad5a09ad00107d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9296-unrestricted-upload-in-emlog-pro-41ac2509</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9296%3A%20Unrestricted%20Upload%20in%20Emlog%20Pro&amp;severity=medium&amp;id=68a70775ad5a09ad00107d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sim-swapper-scattered-spider-hacker-gets-10-years-0fbfc579</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIM-Swapper%2C%20Scattered%20Spider%20Hacker%20Gets%2010%20Years&amp;severity=high&amp;id=68a6e7bfad5a09ad000f098e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-certcc-warns-of-flaws-in-workhorse-software-acc-bb678dea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20CERT%2FCC%20warns%20of%20flaws%20in%20Workhorse%20Software%20accounting%20software%20used%20by%20hundreds%20of%20municipalities%20in%20Wisconsin&amp;severity=medium&amp;id=68a6e7bfad5a09ad000f0996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orange-belgium-discloses-data-breach-impacting-850-0bdb4c92</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Orange%20Belgium%20discloses%20data%20breach%20impacting%20850%2C000%20customers&amp;severity=high&amp;id=68a6e7bfad5a09ad000f098a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8064-cwe-79-improper-neutralization-of-in-280cc084</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aicwebtech%20Bible%20SuperSearch&amp;severity=medium&amp;id=68a6e7f7ad5a09ad000f0a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-muddywater-targets-cfos-with-multi-stage-phish-70ce8a10</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20MuddyWater%20Targets%20CFOs%20with%20Multi-Stage%20Phishing%20%26%20NetBird%20Abuse&amp;severity=medium&amp;id=68a70afaad5a09ad00108cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/we-put-agentic-ai-browsers-to-the-test-they-clicke-d501f37e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=We%20Put%20Agentic%20AI%20Browsers%20to%20the%20Test%20-%20They%20Clicked%2C%20They%20Paid%2C%20They%20Failed&amp;severity=medium&amp;id=68a6cf2bad5a09ad000c8b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8895-cwe-22-improper-limitation-of-a-path-a5339a91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8895%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20cozmoslabs%20WP%20Webhooks%20%E2%80%93%20Automate%20repetitive%20tasks%20by%20creating%20powerful%20automation%20workflows%20directly%20within%20WordPress&amp;severity=critical&amp;id=68a6cf24ad5a09ad000c8b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7390-cwe-295-improper-certificate-validat-5e32fa3a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7390%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Softing%20OPC%20UA%20C%2B%2B%20SDK&amp;severity=critical&amp;id=68a6ba0dad5a09ad000c04d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8607-cwe-79-improper-neutralization-of-in-cc825d4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amans2k%20SlingBlocks%20%E2%80%93%20Gutenberg%20Blocks%20by%20FunnelKit%20(Formerly%20WooFunnels)&amp;severity=medium&amp;id=68a73519ad5a09ad0011fe42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7221-cwe-285-improper-authorization-in-gi-bbd18d15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7221%3A%20CWE-285%20Improper%20Authorization%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=68a7389bad5a09ad00121fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8592-cwe-352-cross-site-request-forgery-c-02683447</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8592%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpzoom%20Inspiro&amp;severity=high&amp;id=68a74327ad5a09ad00126373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53505-improper-limitation-of-a-pathname-t-afb911b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53505%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Intermesh%20BV%20Group-Office&amp;severity=medium&amp;id=68a6a170ad5a09ad000b7263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53504-cross-site-scripting-xss-in-interme-d00f1377</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53504%3A%20Cross-site%20scripting%20(XSS)%20in%20Intermesh%20BV%20Group-Office&amp;severity=medium&amp;id=68a6a170ad5a09ad000b725f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48355-cwe-497-exposure-of-sensitive-syste-d8a2e8d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48355%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ProveSource%20LTD%20ProveSource%20Social%20Proof&amp;severity=null&amp;id=68a696e7ad5a09ad000b39cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abuse-ai-website-creation-app-for-p-763fb8b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abuse%20AI%20Website%20Creation%20App%20For%20Phishing&amp;severity=medium&amp;id=68a70e6bad5a09ad0010ba4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43300-processing-a-malicious-image-file-m-e2bce306</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43300%3A%20Processing%20a%20malicious%20image%20file%20may%20result%20in%20memory%20corruption.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68a66cb4ad5a09ad000a234c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24285-vulnerability-in-ubiquiti-inc-unifi-13cdd6e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24285%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20EV%20Station%20Lite&amp;severity=critical&amp;id=68a6693fad5a09ad0009f8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27213-vulnerability-in-ubiquiti-inc-unifi-d84e64f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27213%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20EV%20Station%20Pro&amp;severity=medium&amp;id=68a6693fad5a09ad0009f902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48978-vulnerability-in-ubiquiti-inc-edgem-a8ea892b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48978%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20EdgeMAX%20EdgeSwitch&amp;severity=high&amp;id=68a6693fad5a09ad0009f911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27215-vulnerability-in-ubiquiti-inc-unifi-fca5f367</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27215%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20Display%20Cast&amp;severity=high&amp;id=68a6693fad5a09ad0009f908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27214-vulnerability-in-ubiquiti-inc-unifi-021a8bd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27214%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20EV%20Station%20Pro&amp;severity=critical&amp;id=68a6693fad5a09ad0009f905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27216-vulnerability-in-ubiquiti-inc-uisp--196fd1a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27216%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UISP%20Application&amp;severity=high&amp;id=68a6693fad5a09ad0009f90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27217-vulnerability-in-ubiquiti-inc-uisp--ba689593</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27217%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UISP%20Application&amp;severity=critical&amp;id=68a6693fad5a09ad0009f90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45438-na-d79cf0af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45438%3A%20n%2Fa&amp;severity=critical&amp;id=68e7a931ba0e608b4f997e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-21-f612a683</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-21&amp;severity=medium&amp;id=68a7b71ead5a09ad0019cc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51606-na-eb2b29df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51606%3A%20n%2Fa&amp;severity=high&amp;id=68a78270ad5a09ad00180622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51989-na-837bfec8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51989%3A%20n%2Fa&amp;severity=high&amp;id=68a77b71ad5a09ad0017da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52351-na-22439906</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52351%3A%20n%2Fa&amp;severity=high&amp;id=68a75f5bad5a09ad00171f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52352-na-f7eaa3d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52352%3A%20n%2Fa&amp;severity=critical&amp;id=68a75f5bad5a09ad00171f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55524-na-f91fda6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55524%3A%20n%2Fa&amp;severity=high&amp;id=68a75bc4ad5a09ad00170300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55523-na-16682d23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55523%3A%20n%2Fa&amp;severity=low&amp;id=68a75bc4ad5a09ad001702fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55522-na-ca416c9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55522%3A%20n%2Fa&amp;severity=medium&amp;id=68a754bbad5a09ad0016a782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55521-na-c74c437a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55521%3A%20n%2Fa&amp;severity=medium&amp;id=68a754bbad5a09ad0016a77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52395-na-08b27bc3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52395%3A%20n%2Fa&amp;severity=critical&amp;id=68a74327ad5a09ad0012636f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55420-na-af949993</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55420%3A%20n%2Fa&amp;severity=high&amp;id=68a73c20ad5a09ad00123250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55383-na-cd96ac09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55383%3A%20n%2Fa&amp;severity=high&amp;id=68a73519ad5a09ad0011fe3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55371-na-bcf427b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55371%3A%20n%2Fa&amp;severity=medium&amp;id=68a72e10ad5a09ad0011a375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52194-na-7bf0cd19</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52194%3A%20n%2Fa&amp;severity=high&amp;id=68a72e10ad5a09ad0011a370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50860-na-c16f915d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50860%3A%20n%2Fa&amp;severity=medium&amp;id=68a72e10ad5a09ad0011a367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55370-na-130e2f23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55370%3A%20n%2Fa&amp;severity=high&amp;id=68a72a8bad5a09ad00117f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55368-na-972f84ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55368%3A%20n%2Fa&amp;severity=high&amp;id=68a72708ad5a09ad0011276d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51818-na-1b2fbf09</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51818%3A%20n%2Fa&amp;severity=medium&amp;id=68a72384ad5a09ad00111848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55367-na-9721c49c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55367%3A%20n%2Fa&amp;severity=medium&amp;id=68a72384ad5a09ad00111843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55366-na-05005cde</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55366%3A%20n%2Fa&amp;severity=medium&amp;id=68a72384ad5a09ad0011183e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55564-na-e1b15edf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55564%3A%20n%2Fa&amp;severity=high&amp;id=68a71fffad5a09ad00110cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47184-na-0d2b7cc6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47184%3A%20n%2Fa&amp;severity=medium&amp;id=68a71c96ad5a09ad00110278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9264-improper-control-of-resource-identif-cab742f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9264%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=68a65ea4ad5a09ad0009b8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9263-improper-control-of-resource-identif-ac8f37c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9263%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=68a6579cad5a09ad000991cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9262-os-command-injection-in-wong2-mcp-cl-13d1ea57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9262%3A%20OS%20Command%20Injection%20in%20wong2%20mcp-cli&amp;severity=medium&amp;id=68a6579cad5a09ad000991c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9253-stack-based-buffer-overflow-in-links-e73c11da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9253%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a65094ad5a09ad00096d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9252-stack-based-buffer-overflow-in-links-70ccf1cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9252%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a64608ad5a09ad000943cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9251-stack-based-buffer-overflow-in-links-6cdc3841</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9251%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a64608ad5a09ad000943c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9288-cwe-20-improper-input-validation-664ed48c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9288%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=critical&amp;id=68a64608ad5a09ad000943d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57749-cwe-59-improper-link-resolution-bef-47216104</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57749%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=68a64608ad5a09ad000943db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9287-cwe-20-improper-input-validation-4252ad4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9287%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=critical&amp;id=68a64284ad5a09ad00093432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9250-stack-based-buffer-overflow-in-links-c6f5c9bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9250%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a64284ad5a09ad00093436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9249-stack-based-buffer-overflow-in-links-cb10b5b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9249%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a63b7cad5a09ad000917f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9248-stack-based-buffer-overflow-in-links-fe0908f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9248%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a63b7cad5a09ad000917f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9247-stack-based-buffer-overflow-in-links-baa717ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9247%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a63474ad5a09ad0008ea3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-state-hackers-exploit-7-year-old-cisco-rou-1e16e529</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20State%20Hackers%20Exploit%207-Year-Old%20Cisco%20Router%20Vulnerability&amp;severity=high&amp;id=68a630efad5a09ad0008d661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54988-cwe-611-improper-restriction-of-xml-fbcadab2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54988%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Tika%20PDF%20parser%20module&amp;severity=high&amp;id=68a62d6bad5a09ad0008befd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9246-stack-based-buffer-overflow-in-links-3e73f6ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9246%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a629e8ad5a09ad000895c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9245-stack-based-buffer-overflow-in-links-11347b4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9245%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a629e8ad5a09ad000895be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-fixes-new-zero-day-flaw-exploited-in-targete-bd41aa7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20fixes%20new%20zero-day%20flaw%20exploited%20in%20targeted%20attacks&amp;severity=critical&amp;id=68a62662ad5a09ad00085209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9244-os-command-injection-in-linksys-re62-c9d32b67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9244%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68a6267aad5a09ad00085260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9241-csv-injection-in-elunez-eladmin-3db19e78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9241%3A%20CSV%20Injection%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68a6267aad5a09ad00085259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43757-cwe-79-cross-site-scripting-in-life-d33477c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43757%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a61f5bad5a09ad00082403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/behind-the-curtain-how-lumma-affiliates-operate-caa23ec2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Behind%20the%20Curtain%3A%20How%20Lumma%20Affiliates%20Operate&amp;severity=medium&amp;id=68a63b7bad5a09ad000917d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43746-cwe-79-cross-site-scripting-in-life-aaf4face</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43746%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a61853ad5a09ad0007edce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9240-information-disclosure-in-elunez-ela-f26ac984</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9240%3A%20Information%20Disclosure%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68a61853ad5a09ad0007edd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9239-inadequate-encryption-strength-in-el-bd721d00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9239%3A%20Inadequate%20Encryption%20Strength%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68a61154ad5a09ad0007a437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9238-sql-injection-in-swatadru-exam-seati-51c5735f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9238%3A%20SQL%20Injection%20in%20Swatadru%20Exam-Seating-Arrangement&amp;severity=medium&amp;id=68a61154ad5a09ad0007a430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/commvault-plugs-holes-in-backup-suite-that-allow-r-f7d01b95</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Commvault%20plugs%20holes%20in%20backup%20suite%20that%20allow%20remote%20code%20executio&amp;severity=high&amp;id=68a60dcfad5a09ad000785b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9237-cross-site-scripting-in-codeastro-ec-1f6806b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9237%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Ecommerce%20Website&amp;severity=medium&amp;id=68a60a48ad5a09ad0007726e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9236-sql-injection-in-portabilis-i-diario-813f959e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9236%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68a60a48ad5a09ad00077267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47054-cross-site-scripting-dom-based-xss--399c0989</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47054%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a6033dad5a09ad00074c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46849-cross-site-scripting-stored-xss-cwe-e8ff635d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46849%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a6033dad5a09ad00074c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46852-cross-site-scripting-stored-xss-cwe-c30743b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46852%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a6033dad5a09ad00074c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9235-cross-site-scripting-in-scada-lts-58e08055</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9235%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a6033dad5a09ad00074ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9234-cross-site-scripting-in-scada-lts-5f56f583</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9234%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a6033dad5a09ad00074c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46856-cross-site-scripting-dom-based-xss--f7cb66cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46856%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a6033dad5a09ad00074c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46932-cross-site-scripting-stored-xss-cwe-b2bda316</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46932%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a5ffd7ad5a09ad000736af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46936-cross-site-scripting-stored-xss-cwe-f6e20af2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46936%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a5ffd7ad5a09ad000736b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8309-cwe-269-improper-privilege-managemen-f5120604</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8309%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ManageEngine%20Asset%20Explorer&amp;severity=high&amp;id=68a5ffd7ad5a09ad000736b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-find-ai-browsers-can-be-tricked-by-promptf-0046cd42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Find%20AI%20Browsers%20Can%20Be%20Tricked%20by%20PromptFix%20Exploit%20to%20Run%20Malicious%20Hidden%20Prompts&amp;severity=high&amp;id=68a5ffb7ad5a09ad000735ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-password-managers-can-leak-logins-in-clickja-0ae62201</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20password%20managers%20can%20leak%20logins%20in%20clickjacking%20attacks&amp;severity=high&amp;id=68a5ffb7ad5a09ad000735af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46962-cross-site-scripting-stored-xss-cwe-3270626f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46962%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a5ffd7ad5a09ad000736be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6183-cwe-78-improper-neutralization-of-sp-5327c022</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6183%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20StrongDM%20sdm-cli&amp;severity=high&amp;id=68a5ffd7ad5a09ad000736d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6182-cwe-269-improper-privilege-managemen-cb1ccfe4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6182%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20StrongDM%20sdm&amp;severity=high&amp;id=68a5ffd7ad5a09ad000736cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46998-cross-site-scripting-stored-xss-cwe-fd4fdf50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46998%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a5ffd7ad5a09ad000736c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6181-cwe-78-improper-neutralization-of-sp-5ce8bb07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6181%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20StrongDM%20sdm-cli&amp;severity=high&amp;id=68a5ffd7ad5a09ad000736c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6180-cwe-319-cleartext-transmission-of-se-7c184df6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6180%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20StrongDM%20sdm-cli&amp;severity=high&amp;id=68a5fc57ad5a09ad00071a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-qr-codes-in-new-quishing-attacks-810d8dfc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20QR%20Codes%20in%20New%20%E2%80%98Quishing%E2%80%99%20Attacks&amp;severity=high&amp;id=68a5fc32ad5a09ad000719bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cereal-offender-analyzing-the-cornflakev3-backdo-af93bc56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Cereal%20Offender%3A%20Analyzing%20the%20CORNFLAKE.V3%20Backdoor&amp;severity=medium&amp;id=68a5fc32ad5a09ad000719c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8612-cwe-59-improper-link-resolution-befo-ff759fa3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8612%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AOMEI%20Backupper%20Workstation&amp;severity=high&amp;id=68a5f8afad5a09ad0006e52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20345-exposure-of-sensitive-information-t-5fe1985f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20345%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Duo%20Authentication%20Proxy&amp;severity=medium&amp;id=68a5f8afad5a09ad0006e523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20269-external-control-of-file-name-or-pa-be4cb2df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20269%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=68a5f8afad5a09ad0006e51d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20131-improper-access-control-in-cisco-ci-b80153a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20131%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=68a5f8afad5a09ad0006e517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8611-cwe-306-missing-authentication-for-c-051e7316</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8611%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20AOMEI%20Cyber%20Backup&amp;severity=critical&amp;id=68a5f8afad5a09ad0006e52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8610-cwe-306-missing-authentication-for-c-abbefb3a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8610%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20AOMEI%20Cyber%20Backup&amp;severity=critical&amp;id=68a5f8afad5a09ad0006e529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8415-authentication-bypass-by-alternate-n-e1ba9965</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8415%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Red%20Hat%20Cryostat%204%20on%20RHEL%209&amp;severity=medium&amp;id=68a5f8afad5a09ad0006e532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9233-cross-site-scripting-in-scada-lts-a8f2fbae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9233%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a5ee24ad5a09ad0006b3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55751-cwe-601-url-redirection-to-untruste-c17b8a44</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55751%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20HackUCF%20OnboardLite&amp;severity=medium&amp;id=68a5ee24ad5a09ad0006b3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-antivirus-app-spreads-android-malware-with-li-2abc7f09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Antivirus%20App%20Spreads%20Android%20Malware%20with%20Livestreaming%20Capability%20to%20Spy%20on%20Russian%20Users&amp;severity=medium&amp;id=68a5e71aad5a09ad00062608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1142-cwe-918-server-side-request-forgery--811352dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1142%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Edge%20Application%20Manager&amp;severity=medium&amp;id=68a5e015ad5a09ad00057746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1139-cwe-732-incorrect-permission-assignm-1dbc9940</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1139%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Edge%20Application%20Manager&amp;severity=medium&amp;id=68a5e015ad5a09ad00057743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36114-cwe-20-improper-input-validation-in-5c744a45</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36114%3A%20CWE-20%20Improper%20Input%20Validation%20in%20IBM%20QRadar%20SOAR%20Plugin%20App&amp;severity=medium&amp;id=68a5e015ad5a09ad00057749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43748-cwe-352-cross-site-request-forgery--a4955238</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43748%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=high&amp;id=68a5e015ad5a09ad0005774f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8448-cwe-200-exposure-of-sensitive-inform-bb84d304</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8448%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Schneider%20Eelctric%20EcoStruxure%20Building%20Operation%20Enterprise%20Server&amp;severity=low&amp;id=68a5d90cad5a09ad00052e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8449-cwe-400-uncontrolled-resource-consum-3e6707d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8449%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Schnieder%20Electric%20EcoStruxure%20Building%20Operation%20Enterprise%20Server&amp;severity=medium&amp;id=68a5d58ead5a09ad000521fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54927-cwe-22-improper-limitation-of-a-pat-4181d6b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54927%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=medium&amp;id=68a5d58ead5a09ad000521fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54926-cwe-22-improper-limitation-of-a-pat-693091eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54926%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=68a5d58ead5a09ad00052203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54925-cwe-918-server-side-request-forgery-eff78b1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54925%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=68a5d58ead5a09ad00052200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dripdropper-malware-exploits-linux-flaw-then-p-46ff652e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DripDropper%20Malware%20Exploits%20Linux%20Flaw%20Then%20Patches%20It%20Lock%20Rivals%20Out&amp;severity=medium&amp;id=68a5d202ad5a09ad000515e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54924-cwe-918-server-side-request-forgery-0c247919</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54924%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=68a5d214ad5a09ad000516a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54923-cwe-502-deserialization-of-untruste-095cf48a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54923%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=68a5d214ad5a09ad0005169f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9074-cwe-668-exposure-of-resource-to-wron-45bf55bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9074%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Docker%20Docker%20Desktop&amp;severity=critical&amp;id=68a5d214ad5a09ad000516a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31355-cwe-494-download-of-code-without-in-3dc0a6d1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31355%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Tenda%20AC6%20V5.0&amp;severity=high&amp;id=68a5caffad5a09ad0004fc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24322-cwe-304-missing-critical-step-in-au-7bb448f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24322%3A%20CWE-304%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Tenda%20AC6%20V5.0&amp;severity=high&amp;id=68a5caffad5a09ad0004fc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24496-cwe-288-authentication-bypass-using-20bcbd2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24496%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Tenda%20AC6%20V5.0&amp;severity=high&amp;id=68a5caffad5a09ad0004fc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27129-cwe-288-authentication-bypass-using-42b5d874</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27129%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Tenda%20AC6%20V5.0&amp;severity=critical&amp;id=68a5caffad5a09ad0004fc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30256-cwe-772-missing-release-of-resource-551fc82d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30256%3A%20CWE-772%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Tenda%20AC6%20V5.0&amp;severity=high&amp;id=68a5caffad5a09ad0004fc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32010-cwe-121-stack-based-buffer-overflow-8026d242</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32010%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6%20V5.0&amp;severity=high&amp;id=68a5caffad5a09ad0004fc79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54175-cwe-79-improper-neutralization-of-i-f65961bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54175%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20Quick.CMS.EXT&amp;severity=medium&amp;id=68a5c777ad5a09ad0004e162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54174-cwe-352-cross-site-request-forgery--47fcd8bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54174%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20Quick.CMS&amp;severity=medium&amp;id=68a5c777ad5a09ad0004e15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8453-cwe-269-improper-privilege-managemen-81612fb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8453%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Schneider%20Electric%20Saitel%20DR%20RTU&amp;severity=high&amp;id=68a5c777ad5a09ad0004e166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54172-cwe-79-improper-neutralization-of-i-e45b1916</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20Quick.CMS&amp;severity=medium&amp;id=68a5c777ad5a09ad0004e15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-uses-github-in-diplomat-cyber-attacks--4e9ae797</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%20Uses%20GitHub%20in%20Diplomat%20Cyber%20Attacks%20as%20IT%20Worker%20Scheme%20Hits%20320%2B%20Firms&amp;severity=high&amp;id=68a5c3f2ad5a09ad0004d10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43749-cwe-552-files-or-directories-access-3f5ce78f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43749%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a5c3ffad5a09ad0004d163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4877-out-of-bounds-write-45f15cc3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4877%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=68a5c06fad5a09ad0004bff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4437-allocation-of-resources-without-limi-e6126d92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4437%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204&amp;severity=medium&amp;id=68a5c06fad5a09ad0004bfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43750-cwe-434-unrestricted-upload-of-file-f71429b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43750%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a5c06fad5a09ad0004bfea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43741-cwe-79-improper-neutralization-of-i-21e57105</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43741%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a5b968ad5a09ad00049398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7777-vulnerability-in-red-hat-mirror-regi-fad14a2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7777%3A%20Vulnerability%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=68a5b5e3ad5a09ad0004573a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43742-cwe-79-improper-neutralization-of-i-19a9fc15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a5b5e3ad5a09ad00045737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8102-cwe-352-cross-site-request-forgery-c-fcfadcfa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8102%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=68a5b270ad5a09ad00043f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-website-builder-lovable-abused-for-global-phish-26977b0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Website%20Builder%20Lovable%20Abused%20for%20Global%20Phishing%20and%20Malware%20Scams&amp;severity=medium&amp;id=68a5b25fad5a09ad00043ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9173-unrestricted-upload-in-emlog-pro-e72a9404</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9173&amp;severity=null&amp;id=68a5aedcad5a09ad00042bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptojacking-is-dead-long-live-cryptojacking-eda6b2b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CryptoJacking%20is%20dead%3A%20long%20live%20CryptoJacking&amp;severity=medium&amp;id=68a5b967ad5a09ad0004938d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attacks-targeting-linux-ssh-servers-to-install-svf-46e1bc9c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attacks%20Targeting%20Linux%20SSH%20Servers%20to%20Install%20SVF%20DDoS%20Bot&amp;severity=medium&amp;id=68a5c3fead5a09ad0004d15c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guess-who-would-be-stupid-enough-to-rob-the-same-v-16f81384</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guess%20Who%20Would%20Be%20Stupid%20Enough%20To%20Rob%20The%20Same%20Vault%20Twice%3F%20Pre-Auth%20RCE%20Chains%20in%20Commvault%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=68a5a7d8ad5a09ad0003fed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploit-weaponizes-sap-netweaver-bugs-for-full-sys-52a521fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploit%20weaponizes%20SAP%20NetWeaver%20bugs%20for%20full%20system%20compromise&amp;severity=high&amp;id=68a59d46ad5a09ad0003bf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doj-charges-22-year-old-for-running-rapperbot-botn-0230fae2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DOJ%20Charges%2022-Year-Old%20for%20Running%20RapperBot%20Botnet%20Behind%20370%2C000%20DDoS%20Attacks&amp;severity=high&amp;id=68a59d46ad5a09ad0003bf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57734-cwe-538-in-jetbrains-teamcity-47eb1b11</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57734%3A%20CWE-538%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68a592bbad5a09ad0003701d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57733-cwe-77-in-jetbrains-teamcity-c5d48beb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57733%3A%20CWE-77%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68a592bbad5a09ad0003701a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57732-cwe-282-in-jetbrains-teamcity-37d77e88</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57732%3A%20CWE-282%20in%20JetBrains%20TeamCity&amp;severity=high&amp;id=68a592bbad5a09ad00037017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57731-cwe-79-in-jetbrains-youtrack-71094b82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57731%3A%20CWE-79%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=68a592bbad5a09ad00037014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57730-cwe-80-in-jetbrains-intellij-idea-d50c9481</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57730%3A%20CWE-80%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=68a592bbad5a09ad00037011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57729-cwe-829-in-jetbrains-intellij-idea-5063dd01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57729%3A%20CWE-829%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=68a592bbad5a09ad0003700e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57728-cwe-863-in-jetbrains-intellij-idea-1a130a5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57728%3A%20CWE-863%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=68a592bbad5a09ad0003700b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57727-cwe-319-in-jetbrains-intellij-idea-13a77ef8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57727%3A%20CWE-319%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=68a592bbad5a09ad00037008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copilot-broke-your-audit-log-but-microsoft-wont-te-463c91e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Copilot%20Broke%20Your%20Audit%20Log%2C%20but%20Microsoft%20Won%E2%80%99t%20Tell%20You&amp;severity=medium&amp;id=68a58f3dad5a09ad00035e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9229-cwe-209-generation-of-error-message--cb4dbb61</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9229%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Mobile%20Industrial%20Robots%20MiR%20Robots&amp;severity=medium&amp;id=68a58bb3ad5a09ad00033816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5261-cwe-639-authorization-bypass-through-d21c70ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5261%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Pik%20Online%20Yaz%C4%B1l%C4%B1m%20%C3%87%C3%B6z%C3%BCmleri%20A.%C5%9E.%20Pik%20Online&amp;severity=high&amp;id=68a58bb3ad5a09ad00033813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9228-cwe-863-incorrect-authorization-in-m-29ce7570</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9228%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mobile%20Industrial%20Robots%20MiR%20Robots&amp;severity=medium&amp;id=68a5882fad5a09ad00032140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5260-cwe-918-server-side-request-forgery--0ce45145</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5260%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Pik%20Online%20Yaz%C4%B1l%C4%B1m%20%C3%87%C3%B6z%C3%BCmleri%20A.%C5%9E.%20Pik%20Online&amp;severity=high&amp;id=68a584b3ad5a09ad0002e282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49381-cwe-352-cross-site-request-forgery--281707f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49381%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ads.txt%20Guru%20ads.txt%20Guru%20Connect&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49382-cwe-352-cross-site-request-forgery--637f953c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49382%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DexignZone%20JobZilla%20-%20Job%20Board%20WordPress%20Theme&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49389-cwe-79-improper-neutralization-of-i-4a53b1ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WEN%20Solutions%20Notice%20Bar&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49391-cwe-352-cross-site-request-forgery--0f3fbeda</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49391%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Fetch%20Designs%20Sign-up%20Sheets&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49392-cwe-79-improper-neutralization-of-i-888b8092</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Audio%20Dock&amp;severity=null&amp;id=68a584b5ad5a09ad0002e2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49395-cwe-79-improper-neutralization-of-i-a367bc82</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49395%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Icons&amp;severity=null&amp;id=68a584b5ad5a09ad0002e2fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49396-cwe-862-missing-authorization-in-th-cfe87ffe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49396%3A%20Missing%20Authorization%20in%20themifyme%20Themify%20Builder&amp;severity=null&amp;id=68a584b5ad5a09ad0002e300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49397-cwe-79-improper-neutralization-of-i-79c8ab2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49397%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Colorbox%20Lightbox&amp;severity=null&amp;id=68a584b5ad5a09ad0002e303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49399-cwe-352-cross-site-request-forgery--f2e907a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49399%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Basix%20NEX-Forms&amp;severity=null&amp;id=68a584b5ad5a09ad0002e306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49400-cwe-79-improper-neutralization-of-i-1a317618</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49400%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=medium&amp;id=68a584b5ad5a09ad0002e309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49406-cwe-862-missing-authorization-in-fa-05919a4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49406%3A%20CWE-862%20Missing%20Authorization%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=68a584b5ad5a09ad0002e30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49408-cwe-201-insertion-of-sensitive-info-ea3971b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49408%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPDeveloper%20Templately&amp;severity=medium&amp;id=68a584b5ad5a09ad0002e30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28977-cwe-79-improper-neutralization-of-i-a80eaf98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=high&amp;id=68a584b3ad5a09ad0002e285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30975-cwe-94-improper-control-of-generati-9c4e064c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30975%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=null&amp;id=68a584b3ad5a09ad0002e288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47650-cwe-22-improper-limitation-of-a-pat-d33c1a48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47650%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Infility%20Infility%20Global&amp;severity=null&amp;id=68a584b3ad5a09ad0002e28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49409-cwe-79-improper-neutralization-of-i-df7b43b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49409%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brewlabs%20SensorPress&amp;severity=medium&amp;id=68a584b5ad5a09ad0002e312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49410-cwe-79-improper-neutralization-of-i-5d337261</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49410%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Emu%20TC%20Testimonials&amp;severity=medium&amp;id=68a584b5ad5a09ad0002e315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49411-cwe-79-improper-neutralization-of-i-9d9b51d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vikas%20Sharma%20iFrame%20Block&amp;severity=medium&amp;id=68a584b6ad5a09ad0002e322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49412-cwe-79-improper-neutralization-of-i-a5512f04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49412%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20numixtech%20Page%20Transition&amp;severity=null&amp;id=68a584b6ad5a09ad0002e325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49413-cwe-79-improper-neutralization-of-i-8257e265</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49413%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=68a584b6ad5a09ad0002e328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49420-cwe-79-improper-neutralization-of-i-efc6348a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49420%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Ultra%20Portfolio&amp;severity=null&amp;id=68a584b6ad5a09ad0002e32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49422-cwe-79-improper-neutralization-of-i-65de19cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49422%3A%20Incorrect%20Privilege%20Assignment%20in%20themepassion%20Support%20Ticket&amp;severity=null&amp;id=68a584b6ad5a09ad0002e32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49424-cwe-79-improper-neutralization-of-i-7ec294fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49424%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Support%20Ticket&amp;severity=null&amp;id=68a584b6ad5a09ad0002e331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49426-cwe-352-cross-site-request-forgery--6331b469</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49426%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Dahz%20Kitring&amp;severity=null&amp;id=68a584b6ad5a09ad0002e334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49428-cwe-79-improper-neutralization-of-i-d3849e31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dourou%20Cookie%20Warning&amp;severity=medium&amp;id=68a584b6ad5a09ad0002e337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49434-cwe-79-improper-neutralization-of-i-8def67fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49434%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Cars4Rent&amp;severity=null&amp;id=68a584b6ad5a09ad0002e33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49436-cwe-79-improper-neutralization-of-i-dbe3cef7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49436%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CocoBasic%20Anotte&amp;severity=null&amp;id=68a584b6ad5a09ad0002e33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49438-cwe-502-deserialization-of-untruste-baefe48c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49438%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Max%20Chirkov%20Simple%20Login%20Log&amp;severity=high&amp;id=68a584b6ad5a09ad0002e34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49889-cwe-79-improper-neutralization-of-i-b3fefb6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49889%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Edge%20CPT&amp;severity=null&amp;id=68a584b6ad5a09ad0002e34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49890-cwe-79-improper-neutralization-of-i-2ebae4f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49890%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Organic%20Beauty&amp;severity=null&amp;id=68a584b6ad5a09ad0002e350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49891-cwe-79-improper-neutralization-of-i-af85bd47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49891%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20uxper%20Uxper%20Booking&amp;severity=null&amp;id=68a584b6ad5a09ad0002e353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49892-cwe-79-improper-neutralization-of-i-23a25d5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49892%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20uxper%20Uxper%20Booking&amp;severity=null&amp;id=68a584b6ad5a09ad0002e356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49893-cwe-79-improper-neutralization-of-i-c912c060</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49893%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Nuss&amp;severity=null&amp;id=68a584b6ad5a09ad0002e359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49894-cwe-79-improper-neutralization-of-i-d3600bef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49894%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20uxper%20Nuss&amp;severity=null&amp;id=68a584b6ad5a09ad0002e35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49896-cwe-352-cross-site-request-forgery--df3c7bf5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49896%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wptasker%20WP%20Discord%20Post%20Plus%20%26%238211%3B%20%20Supports%20Unlimited%20Channels&amp;severity=medium&amp;id=68a584b6ad5a09ad0002e35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48142-cwe-266-incorrect-privilege-assignm-e05ec915</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48142%3A%20Incorrect%20Privilege%20Assignment%20in%20Saad%20Iqbal%20Bookify&amp;severity=null&amp;id=68a584b3ad5a09ad0002e28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48148-cwe-434-unrestricted-upload-of-file-75565ab9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48148%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StoreKeeper%20B.V.%20StoreKeeper%20for%20WooCommerce&amp;severity=null&amp;id=68a584b3ad5a09ad0002e291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48149-cwe-98-improper-control-of-filename-0bc9e9ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48149%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dedalx%20Cook%26Meal&amp;severity=null&amp;id=68a584b3ad5a09ad0002e294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48151-cwe-79-improper-neutralization-of-i-b0ed3c0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48151%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Map%20Locations&amp;severity=null&amp;id=68a584b3ad5a09ad0002e297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48152-cwe-79-improper-neutralization-of-i-a9edc767</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48152%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dimafreund%20Rentsyst&amp;severity=null&amp;id=68a584b3ad5a09ad0002e29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48154-cwe-79-improper-neutralization-of-i-4277f410</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48154%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Multimedia%20Playlist%20Slider%20Addon%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68a584b3ad5a09ad0002e29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48157-cwe-98-improper-control-of-filename-5d61fec4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48157%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Michele%20Giorgi%20Formality&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48158-cwe-22-improper-limitation-of-a-pat-ca1fde6f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48158%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Alex%20Githatu%20BuddyPress%20XProfile%20Custom%20Image%20Field&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48159-cwe-79-improper-neutralization-of-i-de50b3eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48159%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Youtube%20Vimeo%20Video%20Player%20and%20Slider%20WP%20Plugin&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48160-cwe-98-improper-control-of-filename-3c9169ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48160%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CocoBasic%20Caliris&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48162-cwe-79-improper-neutralization-of-i-ce2b6aa4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48162%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quantumcloud%20Simple%20Business%20Directory%20Pro&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48163-cwe-79-improper-neutralization-of-i-d9337f07</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48163%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20SHOUT%20-%20HTML5%20Radio%20Player%20With%20Ads%20-%20ShoutCast%20and%20IceCast%20Support&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48164-cwe-266-incorrect-privilege-assignm-ba882936</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48164%3A%20Incorrect%20Privilege%20Assignment%20in%20Brainstorm%20Force%20SureDash&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48165-cwe-266-incorrect-privilege-assignm-073033d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48165%3A%20Incorrect%20Privilege%20Assignment%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48168-cwe-79-improper-neutralization-of-i-2ad27012</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48168%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Apollo%20-%20Sticky%20Full%20Width%20HTML5%20Audio%20Player&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48169-cwe-94-improper-control-of-generati-5f5136eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48169%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jordy%20Meow%20Code%20Engine&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48170-cwe-79-improper-neutralization-of-i-b876c56f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48170%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player%20-%20Addon%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48171-cwe-98-improper-control-of-filename-bced40c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48171%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Cena%20Store&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48296-cwe-79-improper-neutralization-of-i-70d3794c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20UpStore&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48297-cwe-79-improper-neutralization-of-i-7b9b95fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48297%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48298-cwe-98-improper-control-of-filename-7a1f59cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48298%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Benjamin%20Denis%20SEOPress%20for%20MainWP&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48302-cwe-98-improper-control-of-filename-94436861</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48302%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Roxnor%20FundEngine&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53194-cwe-1336-improper-neutralization-of-7fd0f38b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53194%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=68a584b6ad5a09ad0002e362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53195-cwe-79-improper-neutralization-of-i-252f66c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53195%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=68a584b6ad5a09ad0002e365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53196-cwe-201-insertion-of-sensitive-info-533f10d8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53196%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=68a584b7ad5a09ad0002e372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53198-cwe-98-improper-control-of-filename-3cd6d1d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53198%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20favethemes%20Houzez&amp;severity=null&amp;id=68a584b7ad5a09ad0002e375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53201-cwe-79-improper-neutralization-of-i-779b9f0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53201%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=null&amp;id=68a584b7ad5a09ad0002e378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53204-cwe-98-improper-control-of-filename-6edc9724</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53204%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20eventlist&amp;severity=null&amp;id=68a584b7ad5a09ad0002e37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53205-cwe-79-improper-neutralization-of-i-f4f2ceb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53205%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Radio%20Player%20Shoutcast%20%26%20Icecast&amp;severity=null&amp;id=68a584b7ad5a09ad0002e37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53207-cwe-98-improper-control-of-filename-8f7713d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53207%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Travel%20WP%20Travel%20Gutenberg%20Blocks&amp;severity=null&amp;id=68a584b7ad5a09ad0002e381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53208-cwe-639-authorization-bypass-throug-72907cbd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53208%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20paymayapg%20Maya%20Business&amp;severity=null&amp;id=68a584b7ad5a09ad0002e384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53210-cwe-98-improper-control-of-filename-0563f5cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53210%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20bdthemes%20ZoloBlocks&amp;severity=null&amp;id=68a584b7ad5a09ad0002e387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53212-cwe-79-improper-neutralization-of-i-d14248eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53212%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Revolution%20Video%20Player%20With%20Bottom%20Playlist&amp;severity=null&amp;id=68a584b7ad5a09ad0002e38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53213-cwe-434-unrestricted-upload-of-file-577045ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53213%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ELEXtensions%20ReachShip%20WooCommerce%20Multi-Carrier%20%26%20Conditional%20Shipping&amp;severity=null&amp;id=68a584b7ad5a09ad0002e38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53226-cwe-79-improper-neutralization-of-i-3fcb0d36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53226%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digitalzoomstudio%20Comments%20Capcha%20Box&amp;severity=null&amp;id=68a584b8ad5a09ad0002e39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53299-cwe-502-deserialization-of-untruste-375d29e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53299%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeMakers%20ThemeMakers%20Visual%20Content%20Composer&amp;severity=null&amp;id=68a584b8ad5a09ad0002e39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53319-cwe-79-improper-neutralization-of-i-8e8868d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53319%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Raptive%20Raptive%20Ads&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53559-cwe-79-improper-neutralization-of-i-d847c75b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player%20-%20Addon%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53560-cwe-502-deserialization-of-untruste-55c94e0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53560%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Noisa&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53561-cwe-35-path-traversal-in-miniorange-20474bfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53561%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20miniOrange%20Prevent%20files%20%2F%20folders%20access&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53562-cwe-79-improper-neutralization-of-i-aef43500</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53562%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player%20-%20Addon%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53563-cwe-79-improper-neutralization-of-i-3aecf3a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Youtube%20Vimeo%20Video%20Player%20and%20Slider&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53564-cwe-79-improper-neutralization-of-i-bfee2ea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20HTML5%20Radio%20Player%20-%20WPBakery%20Page%20Builder%20Addon&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53565-cwe-98-improper-control-of-filename-c6a5c495</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53565%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Widget%20for%20Google%20Reviews&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53567-cwe-98-improper-control-of-filename-8d45ee76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53567%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nK%20Ghost%20Kit&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53577-cwe-94-improper-control-of-generati-b9c785f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53577%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20thehp%20Global%20DNS&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53580-cwe-266-incorrect-privilege-assignm-b3779a9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53580%3A%20Incorrect%20Privilege%20Assignment%20in%20quantumcloud%20Simple%20Business%20Directory%20Pro&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53983-cwe-201-insertion-of-sensitive-info-48a68b16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53983%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53985-cwe-201-insertion-of-sensitive-info-ef17f3f3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53985%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetTabs&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53987-cwe-201-insertion-of-sensitive-info-81d82e54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53987%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetMenu&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53988-cwe-201-insertion-of-sensitive-info-3b59b5a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53988%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53992-cwe-201-insertion-of-sensitive-info-2a82cfc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53992%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetTricks&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53993-cwe-201-insertion-of-sensitive-info-eb2fa6d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53993%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetPopup&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53998-cwe-201-insertion-of-sensitive-info-a8171cf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53998%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetWooBuilder&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54007-cwe-502-deserialization-of-untruste-1ba5b548</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54007%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54008-cwe-201-insertion-of-sensitive-info-8e8ab351</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54008%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetSmartFilters&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54012-cwe-502-deserialization-of-untruste-ef712ac0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54012%3A%20Deserialization%20of%20Untrusted%20Data%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54014-cwe-502-deserialization-of-untruste-4ffe7323</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54014%3A%20Deserialization%20of%20Untrusted%20Data%20in%20QuanticaLabs%20MediCenter%20-%20Health%20Medical%20Clinic&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54017-cwe-98-improper-control-of-filename-eccb05e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54019-cwe-94-improper-control-of-generati-f265dcce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54019%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Beplusthemes%20Alone&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54021-cwe-22-improper-limitation-of-a-pat-7580bb20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54021%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54025-cwe-862-missing-authorization-in-el-41bdf055</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54025%3A%20Missing%20Authorization%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20Coupon%20Affiliates&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54027-cwe-79-improper-neutralization-of-i-348cc15e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=null&amp;id=68a584b9ad5a09ad0002e402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54028-cwe-98-improper-control-of-filename-f9409617</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54028%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%20CF7%20WOW%20Styler&amp;severity=null&amp;id=68a584b9ad5a09ad0002e405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54031-cwe-98-improper-control-of-filename-93ecef9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54031%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=null&amp;id=68a584baad5a09ad0002e412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54032-cwe-79-improper-neutralization-of-i-6af23a84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebCodingPlace%20Real%20Estate%20Manager%20Pro&amp;severity=null&amp;id=68a584baad5a09ad0002e415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54034-cwe-98-improper-control-of-filename-162f197e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54034%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Tribulant%20Software%20Newsletters&amp;severity=null&amp;id=68a584baad5a09ad0002e418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54040-cwe-862-missing-authorization-in-we-622e7764</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54040%3A%20Missing%20Authorization%20in%20Webba%20Appointment%20Booking%20Webba%20Booking&amp;severity=null&amp;id=68a584baad5a09ad0002e41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54044-cwe-79-improper-neutralization-of-i-0d92da05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20_CreativeMedia_%20Elite%20Video%20Player&amp;severity=null&amp;id=68a584baad5a09ad0002e41e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54046-cwe-79-improper-neutralization-of-i-9286c06c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20Cost%20Calculator&amp;severity=null&amp;id=68a584baad5a09ad0002e421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54048-cwe-89-improper-neutralization-of-s-b1e3881b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54048%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20miniOrange%20Custom%20API%20for%20WP&amp;severity=null&amp;id=68a584baad5a09ad0002e424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54049-cwe-266-incorrect-privilege-assignm-99b967c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54049%3A%20Incorrect%20Privilege%20Assignment%20in%20miniOrange%20Custom%20API%20for%20WP&amp;severity=null&amp;id=68a584baad5a09ad0002e427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54052-cwe-352-cross-site-request-forgery--58f27a54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54052%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Realtyna%20Realtyna%20Organic%20IDX%20plugin&amp;severity=null&amp;id=68a584baad5a09ad0002e42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54053-cwe-502-deserialization-of-untruste-6c276642</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54053%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=null&amp;id=68a584baad5a09ad0002e42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54055-cwe-79-improper-neutralization-of-i-1658974b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54055%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Druco&amp;severity=null&amp;id=68a584baad5a09ad0002e43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54056-cwe-79-improper-neutralization-of-i-a4c374e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54056%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Responsive%20HTML5%20Audio%20Player%20PRO%20With%20Playlist&amp;severity=null&amp;id=68a584baad5a09ad0002e43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54670-cwe-79-improper-neutralization-of-i-b951e1ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54670%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20oik&amp;severity=null&amp;id=68a584baad5a09ad0002e440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54677-cwe-434-unrestricted-upload-of-file-2e8b2669</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54677%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=null&amp;id=68a584baad5a09ad0002e443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54713-cwe-288-authentication-bypass-using-924bb8a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54713%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20magepeopleteam%20Taxi%20Booking%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68a584baad5a09ad0002e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54726-cwe-89-improper-neutralization-of-s-ed8d567a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54726%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Miguel%20Useche%20JS%20Archive%20List&amp;severity=null&amp;id=68a584baad5a09ad0002e449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54735-cwe-266-incorrect-privilege-assignm-137e9ce2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54735%3A%20Incorrect%20Privilege%20Assignment%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=null&amp;id=68a584baad5a09ad0002e44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54750-cwe-98-improper-control-of-filename-5680da6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54750%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Aman%20Funnel%20Builder%20by%20FunnelKit&amp;severity=null&amp;id=68a584baad5a09ad0002e44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55715-cwe-201-insertion-of-sensitive-info-62751339</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55715%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Themeisle%20Otter%20-%20Gutenberg%20Block&amp;severity=null&amp;id=68a584baad5a09ad0002e452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9225-cwe-79-improper-neutralization-of-in-43f77a95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9225%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Mobile%20Industrial%20Robots%20MiR%20Robots&amp;severity=medium&amp;id=68a57a1fad5a09ad000280ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9202-cwe-862-missing-authorization-in-the-c575b052</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9202%3A%20CWE-862%20Missing%20Authorization%20in%20themegrill%20ColorMag&amp;severity=medium&amp;id=68a56f93ad5a09ad00020ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54551-external-control-of-assumed-immutab-44fd45ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54551%3A%20External%20control%20of%20assumed-Immutable%20web%20parameter%20in%20FUJIFILM%20Healthcare%20Americas%20Corporation%20Synapse%20Mobility&amp;severity=medium&amp;id=68a60a48ad5a09ad00077263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8618-cwe-79-improper-neutralization-of-in-2604565e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpclever%20WPC%20Smart%20Quick%20View%20for%20WooCommerce&amp;severity=medium&amp;id=68a54fefad5a09ad0000e0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55706-url-redirection-to-untrusted-site-o-66290f27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55706%3A%20URL%20redirection%20to%20untrusted%20site%20(&apos;Open%20Redirect&apos;)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=68a54fefad5a09ad0000e0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53522-use-of-less-trusted-source-in-six-a-645f34ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53522%3A%20Use%20of%20less%20trusted%20source%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=68a54fefad5a09ad0000e0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57791-cwe-88-improper-neutralization-of-a-e523433d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57791%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20in%20Commvault%20CommCell&amp;severity=medium&amp;id=68a54563ad5a09ad000085d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57790-cwe-36-absolute-path-traversal-in-c-4897ffc3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57790%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20Commvault%20CommCell&amp;severity=high&amp;id=68a54563ad5a09ad000085d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57789-cwe-257-storing-passwords-in-a-reco-cc793086</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57789%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Commvault%20CommCell&amp;severity=medium&amp;id=68a54563ad5a09ad000085cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8141-cwe-22-improper-limitation-of-a-path-fd980da4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8141%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=high&amp;id=68a533d0ad5a09ad00ff4062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8289-cwe-502-deserialization-of-untrusted-b15f4b3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8289%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=high&amp;id=68a533d0ad5a09ad00ff406a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8145-cwe-502-deserialization-of-untrusted-76a165a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8145%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=high&amp;id=68a533d0ad5a09ad00ff4066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9132-out-of-bounds-write-in-google-chrome-a96fb6d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9132%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=68a5223bad5a09ad00fe0ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9193-open-redirect-in-totvs-portal-meu-rh-30d287a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9193%3A%20Open%20Redirect%20in%20TOTVS%20Portal%20Meu%20RH&amp;severity=medium&amp;id=68a5142bad5a09ad00fc988d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-20-1fe34a48</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-20&amp;severity=medium&amp;id=68a6659ead5a09ad0009cd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50902-na-6b1cb2cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50902%3A%20n%2Fa&amp;severity=high&amp;id=68a61f5bad5a09ad00082406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55444-na-cd76c755</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55444%3A%20n%2Fa&amp;severity=critical&amp;id=68a5ffd7ad5a09ad000736c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28041-na-f4f89031</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28041%3A%20n%2Fa&amp;severity=high&amp;id=68a5ffd7ad5a09ad000736bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50904-na-063ceeea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50904%3A%20n%2Fa&amp;severity=critical&amp;id=68a5ffd7ad5a09ad000736b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50901-na-bd561d2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50901%3A%20n%2Fa&amp;severity=critical&amp;id=68a5fc57ad5a09ad00071a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50864-na-2a938279</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50864%3A%20n%2Fa&amp;severity=medium&amp;id=68a5e397ad5a09ad0005f17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51991-na-83892187</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51991%3A%20n%2Fa&amp;severity=high&amp;id=68a5e397ad5a09ad0005f17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51990-na-5c940b36</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51990%3A%20n%2Fa&amp;severity=medium&amp;id=68a5e397ad5a09ad0005f178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55482-na-42aa8505</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55482%3A%20n%2Fa&amp;severity=high&amp;id=68a5e015ad5a09ad00057752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55498-na-243bc61f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55498%3A%20n%2Fa&amp;severity=high&amp;id=68a5e015ad5a09ad0005774c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55499-na-401c6d6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55499%3A%20n%2Fa&amp;severity=medium&amp;id=68a5d90cad5a09ad00052e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55483-na-dbfc7623</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55483%3A%20n%2Fa&amp;severity=high&amp;id=68a5d58ead5a09ad00052206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55503-na-dad26c88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55503%3A%20n%2Fa&amp;severity=high&amp;id=68a5d214ad5a09ad000516a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50503-na-75494447</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50503%3A%20n%2Fa&amp;severity=high&amp;id=68a5ce7fad5a09ad00050951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57788-cwe-259-use-of-hard-coded-password--068d693f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57788%3A%20CWE-259%3A%20Use%20of%20Hard-coded%20Password%20in%20Commvault%20CommCell&amp;severity=medium&amp;id=68a54563ad5a09ad000085d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54364-cwe-1333-inefficient-regular-expres-4ecfe59c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54364%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Microsoft%20Knack&amp;severity=medium&amp;id=68a53ad7ad5a09ad00ffc756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54363-cwe-1333-inefficient-regular-expres-973b6493</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54363%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Microsoft%20Knack&amp;severity=medium&amp;id=68a53ad7ad5a09ad00ffc752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9176-os-command-injection-in-neurobin-shc-81ad5393</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9176%3A%20OS%20Command%20Injection%20in%20neurobin%20shc&amp;severity=medium&amp;id=68a50d23ad5a09ad00fc6c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9175-stack-based-buffer-overflow-in-neuro-3c84414c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9175%3A%20Stack-based%20Buffer%20Overflow%20in%20neurobin%20shc&amp;severity=medium&amp;id=68a5061bad5a09ad00fc4945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9174-os-command-injection-in-neurobin-shc-8becafc5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9174%3A%20OS%20Command%20Injection%20in%20neurobin%20shc&amp;severity=medium&amp;id=68a4ff14ad5a09ad00fc17b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9171-cross-site-scripting-in-solidinvoice-2d2bee06</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9171%3A%20Cross%20Site%20Scripting%20in%20SolidInvoice&amp;severity=medium&amp;id=68a4ff14ad5a09ad00fc17ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-exposes-zero-day-clickjacking-vulnerabi-3832911f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Exposes%20Zero-Day%20Clickjacking%20Vulnerabilities%20in%20Major%20Password%20Managers&amp;severity=critical&amp;id=68a4fb95ad5a09ad00fc016a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9170-cross-site-scripting-in-solidinvoice-5259ea04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9170%3A%20Cross%20Site%20Scripting%20in%20SolidInvoice&amp;severity=medium&amp;id=68a4f80bad5a09ad00fbeb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/noodlophile-stealer-evolves-targeted-copyright-phi-e83ea269</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Noodlophile%20Stealer%20Evolves%3A%20Targeted%20Copyright%20Phishing%20Hits%20Enterprises%20with%20Social%20Media%20Footprints&amp;severity=medium&amp;id=68a4f487ad5a09ad00fbd6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9169-cross-site-scripting-in-solidinvoice-8408aeae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9169%3A%20Cross%20Site%20Scripting%20in%20SolidInvoice&amp;severity=medium&amp;id=68a4f10ead5a09ad00fbbd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9168-cross-site-scripting-in-solidinvoice-ec8eca57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9168%3A%20Cross%20Site%20Scripting%20in%20SolidInvoice&amp;severity=medium&amp;id=68a4e9fbad5a09ad00fb71ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55033-drag-and-drop-gestures-in-focus-for-9258d444</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55033%3A%20Vulnerability%20in%20Mozilla%20Focus%20for%20iOS&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55032-focus-incorrectly-ignores-content-d-06d57941</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55032%3A%20Vulnerability%20in%20Mozilla%20Focus%20for%20iOS&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55029-malicious-scripts-could-spam-popups-d87223be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55029%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=high&amp;id=68a4e678ad5a09ad00fb5d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55031-passkey-phishing-within-bluetooth-r-c9ca8c63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55031%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=critical&amp;id=68a4e678ad5a09ad00fb5d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55028-javascript-alerts-could-impede-ui-i-3b744bd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55028%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55030-content-disposition-headers-incorre-ca5c63e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55030%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54145-scanning-a-malicious-url-utilizing--844e9562</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54145%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=critical&amp;id=68a4e678ad5a09ad00fb5d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54144-internal-firefox-open-text-url-sche-880faa28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54144%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54143-sandboxed-iframes-could-allow-local-c87c76be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54143%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=critical&amp;id=68a4e678ad5a09ad00fb5d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8364-address-bar-spoofing-using-an-blob-u-7f74d063</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8364%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68a4e679ad5a09ad00fb5db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8042-sandboxed-iframe-could-start-downloa-87166baa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8042%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68a4e679ad5a09ad00fb5dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8041-incorrect-url-truncation-in-firefox--af8b74dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8041%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9184-memory-safety-bugs-fixed-in-firefox--1c41a3b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9184%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68a4e2f4ad5a09ad00faecb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9187-memory-safety-bugs-fixed-in-firefox--f559e661</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9187%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68a4e2f4ad5a09ad00faecc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9183-spoofing-issue-in-the-address-bar-co-86f575f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9183%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68a4e2f4ad5a09ad00faecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9182-denial-of-service-due-to-out-of-memo-4f8d64fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9182%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68a4e2f4ad5a09ad00faeca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9186-spoofing-issue-in-the-address-bar-co-1843d9fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9186%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68a4e2f4ad5a09ad00faecc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9185-memory-safety-bugs-fixed-in-firefox--34ae1c2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9185%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68a4e2f4ad5a09ad00faecb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9181-uninitialized-memory-in-the-javascri-7319d05c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9181%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68a4e2f4ad5a09ad00faec9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9180-same-origin-policy-bypass-in-the-gra-c1f01ba2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9180%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68a4e2f4ad5a09ad00faec91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9179-sandbox-escape-due-to-invalid-pointe-b0aea5dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9179%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68a4e2f4ad5a09ad00faec87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9167-cross-site-scripting-in-solidinvoice-bd82c16e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9167%3A%20Cross%20Site%20Scripting%20in%20SolidInvoice&amp;severity=medium&amp;id=68a4e2f4ad5a09ad00faec80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9165-memory-leak-in-libtiff-c396b4f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9165%3A%20Memory%20Leak%20in%20LibTIFF&amp;severity=low&amp;id=68a4dbedad5a09ad00fac866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9157-use-after-free-in-appneta-tcpreplay-7b3dcdeb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9157%3A%20Use%20After%20Free%20in%20appneta%20tcpreplay&amp;severity=medium&amp;id=68a4dbedad5a09ad00fac85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55740-cwe-1392-use-of-default-credentials-4781dfac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55740%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Anipaleja%20nginx-defender&amp;severity=medium&amp;id=68a4d876ad5a09ad00fab184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/noodlophile-stealer-evolution-security-affairs-d191dcb7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Noodlophile%20Stealer%20evolution%20-%20Security%20Affairs&amp;severity=medium&amp;id=68a4d867ad5a09ad00fab11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43744-cwe-79-cross-site-scripting-in-life-ddfe7031</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43744%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a4d4e5ad5a09ad00fa972e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9156-sql-injection-in-itsourcecode-sports-5ed587ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9156%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68a4d4e5ad5a09ad00fa9738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9155-sql-injection-in-itsourcecode-online-236a5194</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9155%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=68a4d4e5ad5a09ad00fa9731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2988-cwe-497-exposure-of-sensitive-system-a568ebdf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2988%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=low&amp;id=68a4d162ad5a09ad00fa857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43743-cwe-203-observable-discrepancy-in-l-c700842b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43743%3A%20CWE-203%20Observable%20Discrepancy%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a4cddcad5a09ad00fa75eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55737-cwe-639-authorization-bypass-throug-18d3e876</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55737%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20DogukanUrker%20FlaskBlog&amp;severity=medium&amp;id=68a4cddcad5a09ad00fa75ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55736-cwe-425-direct-request-forced-brows-bc48bc69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55736%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20DogukanUrker%20FlaskBlog&amp;severity=critical&amp;id=68a4cddcad5a09ad00fa75f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33008-cwe-79-improper-neutralization-of-i-cb3ff364</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33008%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=68a4cddcad5a09ad00fa75f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9154-sql-injection-in-itsourcecode-online-013afd04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9154%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=68a4cddcad5a09ad00fa75fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55735-cwe-79-improper-neutralization-of-i-608d9657</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55735%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DogukanUrker%20FlaskBlog&amp;severity=medium&amp;id=68a4ca58ad5a09ad00fa40f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elastic-rejects-claims-of-a-zero-day-rce-flaw-in-d-388bf4d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Elastic%20rejects%20claims%20of%20a%20zero-day%20RCE%20flaw%20in%20Defend%20EDR&amp;severity=critical&amp;id=68a4c6d3ad5a09ad00fa2833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apache-activemq-flaw-exploited-to-deploy-dripdropp-eb3bef29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apache%20ActiveMQ%20Flaw%20Exploited%20to%20Deploy%20DripDropper%20Malware%20on%20Cloud%20Linux%20Systems&amp;severity=high&amp;id=68a4c6d3ad5a09ad00fa2837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43745-cwe-352-cross-site-request-forgery--7c1d8207</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43745%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a4c6efad5a09ad00fa2970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55734-cwe-862-missing-authorization-in-do-84e603fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55734%3A%20CWE-862%3A%20Missing%20Authorization%20in%20DogukanUrker%20FlaskBlog&amp;severity=medium&amp;id=68a4c6efad5a09ad00fa2973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9153-unrestricted-upload-in-itsourcecode--4f035ac0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9153%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=68a4c6efad5a09ad00fa2977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55733-cwe-94-improper-control-of-generati-9df783aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55733%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=68a4c34fad5a09ad00fa175d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55306-cwe-522-insufficiently-protected-cr-e9277d71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55306%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Mouy-leng%20GenX_FX&amp;severity=critical&amp;id=68a4c34fad5a09ad00fa175a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43737-cwe-79-cross-site-scripting-in-life-6dd102e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43737%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a4bfcbad5a09ad00fa098e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31988-cwe-79-improper-neutralization-of-i-1d970810</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20Digital%20Experience&amp;severity=medium&amp;id=68a4bfcbad5a09ad00fa098b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55303-cwe-79-improper-neutralization-of-i-29747905</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55303%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=68a4bfcbad5a09ad00fa0991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-incidents-in-japan-during-the-first-hal-6aea147f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20incidents%20in%20Japan%20during%20the%20first%20half%20of%202025&amp;severity=medium&amp;id=68a4ed7fad5a09ad00fba94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9151-improper-authorization-in-liuyuyang0-6cf88dfd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9151%3A%20Improper%20Authorization%20in%20LiuYuYang01%20ThriveX-Blog&amp;severity=medium&amp;id=68a4bfcbad5a09ad00fa0998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8450-cwe-434-unrestricted-upload-of-file--fce9e435</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8450%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Fortra%20FileCatalyst&amp;severity=high&amp;id=68a4bfcbad5a09ad00fa0995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55295-cwe-22-improper-limitation-of-a-pat-128fdde5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55295%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20StuffAnThings%20qbit_manage&amp;severity=medium&amp;id=68a4bc48ad5a09ad00f9e49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55294-cwe-77-improper-neutralization-of-s-2a21a368</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55294%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20bencevans%20screenshot-desktop&amp;severity=critical&amp;id=68a4b8c3ad5a09ad00f992b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9150-sql-injection-in-surbowl-dormitory-m-4c746761</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9150%3A%20SQL%20Injection%20in%20Surbowl%20dormitory-management-php&amp;severity=medium&amp;id=68a4b8c3ad5a09ad00f992c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9149-command-injection-in-wavlink-wl-nu51-6fed7dd0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9149%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=68a4b8c3ad5a09ad00f992b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salty-2fa-undetected-phaas-hitting-us-and-eu-indus-71abc5fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salty%202FA%3A%20Undetected%20PhaaS%20Hitting%20US%20and%20EU%20Industries&amp;severity=medium&amp;id=68a4ed7fad5a09ad00fba95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legitimate-chrome-vpn-extension-turns-to-browser-s-55648dc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Legitimate%20Chrome%20VPN%20Extension%20Turns%20to%20Browser%20Spyware&amp;severity=medium&amp;id=68a4e9fbad5a09ad00fb7145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54881-cwe-79-improper-neutralization-of-i-d6e48c98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54881%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mermaid-js%20mermaid&amp;severity=medium&amp;id=68a4b1bfad5a09ad00f9671f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38611-ae7ba5b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38611&amp;severity=null&amp;id=68bb425f535f4a97730e4932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38603-dd4a4ee5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38603&amp;severity=null&amp;id=68ba9a023d5df491ae76f9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9148-sql-injection-in-codephiliax-chat2db-25608dd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9148%3A%20SQL%20Injection%20in%20CodePhiliaX%20Chat2DB&amp;severity=medium&amp;id=68a4b1bfad5a09ad00f96724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54880-cwe-79-improper-neutralization-of-i-4c4f286a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54880%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mermaid-js%20mermaid&amp;severity=medium&amp;id=68a4ae37ad5a09ad00f95597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pharma-firm-inotiv-says-ransomware-attack-impacted-8580439f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pharma%20firm%20Inotiv%20says%20ransomware%20attack%20impacted%20operations&amp;severity=high&amp;id=68a4aab2ad5a09ad00f93f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-godrat-trojan-targets-trading-firms-using-steg-15a8f841</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20GodRAT%20Trojan%20Targets%20Trading%20Firms%20Using%20Steganography%20and%20Gh0st%20RAT%20Code&amp;severity=high&amp;id=68a4aab2ad5a09ad00f93f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52478-cwe-79-improper-neutralization-of-i-636800fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52478%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=68a4aacfad5a09ad00f93fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9147-cross-site-scripting-in-jasonclark-g-e20b89ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9147%3A%20Cross%20Site%20Scripting%20in%20jasonclark%20getsemantic&amp;severity=medium&amp;id=68a4aacfad5a09ad00f93fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/enumerating-aws-the-quiet-way-cloudtrail-free-disc-93308dcb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Enumerating%20AWS%20the%20quiet%20way%3A%20CloudTrail-free%20discovery%20with%20Resource%20Explorer%20%7C%20Datadog%20Security%20Labs&amp;severity=medium&amp;id=68a4a3b0ad5a09ad00f91341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/july-2025-apt-attack-trends-report-south-korea-52710ecd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=July%202025%20APT%20Attack%20Trends%20Report%20(South%20Korea)&amp;severity=medium&amp;id=68a4e9fbad5a09ad00fb714a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9146-risky-cryptographic-algorithm-in-lin-b0356cfc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9146%3A%20Risky%20Cryptographic%20Algorithm%20in%20Linksys%20E5600&amp;severity=high&amp;id=68a4a3aaad5a09ad00f91320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-exploited-coderabbit-from-a-simple-pr-to-rc-eaab3a65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20We%20Exploited%20CodeRabbit%3A%20From%20a%20Simple%20PR%20to%20RCE%20and%20Write%20Access%20on%201M%20Repositories&amp;severity=medium&amp;id=68a4a02cad5a09ad00f8f763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43738-cwe-79-cross-site-scripting-in-life-230e24e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43738%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a4a026ad5a09ad00f8f754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9145-cross-site-scripting-in-scada-lts-3b80067a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9145%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a4991ead5a09ad00f8cfdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9144-cross-site-scripting-in-scada-lts-4bf00f24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9144%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a4959aad5a09ad00f8b3c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9143-cross-site-scripting-in-scada-lts-42522452</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9143%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a4959aad5a09ad00f8b3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beware-the-false-false-positive-how-to-distinguish-ffe41de5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beware%20the%20false%20false-positive%3A%20how%20to%20distinguish%20HTTP%20pipelining%20from%20request%20smuggling&amp;severity=medium&amp;id=68a48eadad5a09ad00f88721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citizen-lab-reports-hidden-vpn-networks-sharing-ow-c1f2eb85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Citizen%20Lab%20Reports%20Hidden%20VPN%20Networks%20Sharing%20Ownership%20and%20Security%20Flaws&amp;severity=medium&amp;id=68a48e91ad5a09ad00f886b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ny-business-council-discloses-data-breach-affectin-4c88dc77</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NY%20Business%20Council%20discloses%20data%20breach%20affecting%2047%2C000%20people&amp;severity=high&amp;id=68a48e91ad5a09ad00f886ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43739-cwe-203-observable-discrepancy-in-l-3b724887</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43739%3A%20CWE-203%20Observable%20Discrepancy%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a48405ad5a09ad00f845d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45062-cwe-121-stack-based-buffer-overflow-fae4943d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45062%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OpenPrinting%20ippusbxd&amp;severity=medium&amp;id=6909084f7fff0e30cee2352a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9140-sql-injection-in-shanghai-lingdang-i-209264a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9140%3A%20SQL%20Injection%20in%20Shanghai%20Lingdang%20Information%20Technology%20Lingdang%20CRM&amp;severity=medium&amp;id=68a48084ad5a09ad00f82386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4690-cwe-1333-inefficient-regular-express-f369ae6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4690%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Google%20AngularJS&amp;severity=medium&amp;id=68a47cffad5a09ad00f80eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4046-cwe-862-missing-authorization-in-lex-39c5dd7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4046%3A%20CWE-862%20Missing%20Authorization%20in%20Lexmark%20Lexmark%20Cloud%20Services&amp;severity=high&amp;id=68a47cffad5a09ad00f80eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4044-cwe-611-improper-restriction-of-xml--5e0df7d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4044%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Lexmark%20Universal%20Print%20Driver&amp;severity=high&amp;id=68a47cffad5a09ad00f80eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43740-cwe-79-cross-site-scripting-in-life-64935ebc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43740%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a47979ad5a09ad00f7f09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9139-information-disclosure-in-scada-lts-d9335f6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9139%3A%20Information%20Disclosure%20in%20Scada-LTS&amp;severity=medium&amp;id=68a47979ad5a09ad00f7f0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australian-isp-iinet-suffers-breach-of-280000-reco-29c25dcb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australian%20ISP%20iiNet%20Suffers%20Breach%20of%20280%2C000%2B%20Records&amp;severity=high&amp;id=68a475f4ad5a09ad00f7cd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9138-cross-site-scripting-in-scada-lts-6a86d8f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9138%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a47602ad5a09ad00f7ce7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9137-cross-site-scripting-in-scada-lts-2264e5cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9137%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a46b68ad5a09ad00f76df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/96000-uk-police-bodycam-videos-lost-after-data-tra-472343d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=96%2C000%20UK%20Police%20Bodycam%20Videos%20Lost%20After%20Data%20Transfer%20Mishap&amp;severity=medium&amp;id=68a46460ad5a09ad00f6ea01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9136-out-of-bounds-read-in-libretro-retro-ab75af3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9136%3A%20Out-of-Bounds%20Read%20in%20libretro%20RetroArch&amp;severity=medium&amp;id=68a46468ad5a09ad00f6ea34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9135-improper-export-of-android-applicati-73a0b772</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9135%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Verkehrsauskunft%20%C3%96sterreich%20SmartRide&amp;severity=medium&amp;id=68a45d58ad5a09ad00f6b52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8783-cwe-79-improper-neutralization-of-in-a453d8f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kleor%20Contact%20Manager&amp;severity=medium&amp;id=68a45d58ad5a09ad00f6b529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trivial-c-random-exploitation-fa91c9ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trivial%20C%23%20Random%20Exploitation&amp;severity=high&amp;id=68a459d7ad5a09ad00f6a646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-evolution-of-the-pipemagic-malware-0949017e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20evolution%20of%20the%20PipeMagic%20malware&amp;severity=medium&amp;id=68a4564fad5a09ad00f67feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9134-improper-export-of-android-applicati-c7937028</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9134%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20AfterShip%20Package%20Tracker%20App&amp;severity=medium&amp;id=68a47cffad5a09ad00f80ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-trend-micro-apex-one-flaw-to-its-know-16554c8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Trend%20Micro%20Apex%20One%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68a44137ad5a09ad00f4a548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-allianz-life-data-breach-impacts-11-millio-2292af5f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Allianz%20Life%20data%20breach%20impacts%201.1%20million%20people&amp;severity=high&amp;id=68a44137ad5a09ad00f4a544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8567-cwe-79-improper-neutralization-of-in-c9b9d27c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8567%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20Nexter%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20%26%20AI%20Website%20Builder&amp;severity=medium&amp;id=68a436abad5a09ad00f43fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41685-cwe-359-exposure-of-private-persona-12d327c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41685%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20SMA%20ennexos.sunnyportal.com&amp;severity=medium&amp;id=68a43327ad5a09ad00f42abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41689-cwe-306-missing-authentication-for--fd7241f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41689%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Wiesemann%20%26%20Theis%20Motherbox%203&amp;severity=high&amp;id=68a43327ad5a09ad00f42ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8622-cwe-79-improper-neutralization-of-in-363108d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8622%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webaware%20Flexible%20Map&amp;severity=medium&amp;id=68a4289bad5a09ad00f3caf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7654-cwe-200-exposure-of-sensitive-inform-45962b56</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7654%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=high&amp;id=68a4289bad5a09ad00f3cae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7670-cwe-89-improper-neutralization-of-sp-52906876</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7670%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20skatox%20JS%20Archive%20List&amp;severity=high&amp;id=68a4289bad5a09ad00f3caee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8723-cwe-94-improper-control-of-generatio-c6692009</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8723%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mecanik%20Cloudflare%20Image%20Resizing%20%E2%80%93%20Optimize%20%26%20Accelerate%20Your%20Images&amp;severity=critical&amp;id=68a4289bad5a09ad00f3cafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6758-cwe-269-improper-privilege-managemen-c6ba83fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6758%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20imithemes%20Real%20Spaces%20-%20WordPress%20Properties%20Directory%20Theme&amp;severity=critical&amp;id=68a48084ad5a09ad00f82390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8218-cwe-269-improper-privilege-managemen-25ab0284</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8218%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20imithemes%20Real%20Spaces%20-%20WordPress%20Properties%20Directory%20Theme&amp;severity=high&amp;id=68a48084ad5a09ad00f82394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5417-incorrect-privilege-assignment-in-re-03dfc2ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5417%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20Developer%20Hub&amp;severity=medium&amp;id=68a401efad5a09ad00f237ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8357-cwe-862-missing-authorization-in-dgl-2dcbce08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8357%3A%20CWE-862%20Missing%20Authorization%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=68a401efad5a09ad00f237be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7496-cwe-79-improper-neutralization-of-in-fc048c3d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpclever%20WPC%20Smart%20Compare%20for%20WooCommerce&amp;severity=medium&amp;id=68a3f3dfad5a09ad00f0c4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44373-na-63042a0c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44373%3A%20n%2Fa&amp;severity=critical&amp;id=69306fa987f844e860799612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-19-b0bbbe9b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-19&amp;severity=medium&amp;id=68a5141ead5a09ad00fc95d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51529-na-831940b2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51529%3A%20n%2Fa&amp;severity=medium&amp;id=68a4d876ad5a09ad00fab18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50579-na-751a237f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50579%3A%20n%2Fa&amp;severity=medium&amp;id=68a4d876ad5a09ad00fab187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51543-na-6ec74ad0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51543%3A%20n%2Fa&amp;severity=critical&amp;id=68a4d876ad5a09ad00fab180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50926-na-d72227ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50926%3A%20n%2Fa&amp;severity=medium&amp;id=68a4d876ad5a09ad00fab17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52337-na-62519fe8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52337%3A%20n%2Fa&amp;severity=medium&amp;id=68a4d162ad5a09ad00fa857d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50891-na-002cd1f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Adform%20server-side%20backend%20for%20Site%20Tracking&amp;severity=high&amp;id=68a4cddcad5a09ad00fa75f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52338-na-e9105413</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52338%3A%20n%2Fa&amp;severity=medium&amp;id=68a4ca58ad5a09ad00fa40f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51506-na-2d638531</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51506%3A%20n%2Fa&amp;severity=medium&amp;id=68a4ae37ad5a09ad00f9559c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51540-na-055c48d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51540%3A%20n%2Fa&amp;severity=medium&amp;id=68a4a3aaad5a09ad00f9131d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50938-na-d0232520</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50938%3A%20n%2Fa&amp;severity=medium&amp;id=68a4a3aaad5a09ad00f91319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50434-na-b127e48a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50434%3A%20n%2Fa&amp;severity=medium&amp;id=68a4a3aaad5a09ad00f91316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51539-na-eee24fb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51539%3A%20n%2Fa&amp;severity=medium&amp;id=68a4a026ad5a09ad00f8f751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50897-na-2e169d98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50897%3A%20n%2Fa&amp;severity=medium&amp;id=68a49216ad5a09ad00f89be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51510-na-f58c8818</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51510%3A%20n%2Fa&amp;severity=medium&amp;id=68a49216ad5a09ad00f89bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51489-na-5bb0b6b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51489%3A%20n%2Fa&amp;severity=medium&amp;id=68a49216ad5a09ad00f89bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51488-na-d501d419</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51488%3A%20n%2Fa&amp;severity=medium&amp;id=68a49216ad5a09ad00f89bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51487-na-0daaa186</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51487%3A%20n%2Fa&amp;severity=medium&amp;id=68a49216ad5a09ad00f89bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54336-na-aa4e8513</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54336%3A%20n%2Fa&amp;severity=critical&amp;id=68a48084ad5a09ad00f8238c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50567-na-228fbd0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50567%3A%20n%2Fa&amp;severity=critical&amp;id=68a48084ad5a09ad00f82380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50461-na-3ebb5e7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50461%3A%20n%2Fa&amp;severity=medium&amp;id=68a48084ad5a09ad00f82379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54759-cwe-79-improper-neutralization-of-i-0c18aa4d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54759%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Santesoft%20Sante%20PACS%20Server&amp;severity=medium&amp;id=68a39bfcad5a09ad00df5d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54862-cwe-79-improper-neutralization-of-i-045f3a09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Santesoft%20Sante%20PACS%20Server&amp;severity=medium&amp;id=68a39bfcad5a09ad00df5d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54156-cwe-319-cleartext-transmission-of-s-4281d6f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54156%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Santesoft%20Sante%20PACS%20Server&amp;severity=critical&amp;id=68a39bfcad5a09ad00df5d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53948-cwe-415-double-free-in-santesoft-sa-959ff154</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53948%3A%20CWE-415%20Double%20Free%20in%20Santesoft%20Sante%20PACS%20Server&amp;severity=high&amp;id=68a39bfcad5a09ad00df5d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46269-cwe-122-heap-based-buffer-overflow--22fc2983</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46269%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68a39bfcad5a09ad00df5d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52584-cwe-122-heap-based-buffer-overflow--65198402</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52584%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68a39bfcad5a09ad00df5d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41392-cwe-125-out-of-bounds-read-in-ashla-f89bdd57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41392%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68a39877ad5a09ad00cd7ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53705-cwe-787-out-of-bounds-write-in-ashl-95cbb432</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53705%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68a39877ad5a09ad00cd7ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9119-cross-site-scripting-in-netis-wf2419-1594f093</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9119%3A%20Cross%20Site%20Scripting%20in%20Netis%20WF2419&amp;severity=medium&amp;id=68a3916fad5a09ad00b1ff21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53192-cwe-146-improper-neutralization-of--8305f858</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53192%3A%20CWE-146%20Improper%20Neutralization%20of%20Expression%2FCommand%20Delimiters%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20OGNL&amp;severity=high&amp;id=68a38a67ad5a09ad00b1d067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8098-cwe-276-incorrect-default-permission-47cd9f35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8098%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=68a38a67ad5a09ad00b1d06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4371-cwe-347-improper-verification-of-cry-f8af577e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4371%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Lenovo%20510%20FHD%20Webcam&amp;severity=high&amp;id=68a38a67ad5a09ad00b1d064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-chatgpt-desktop-app-delivering-pipemagic-back-1b1f2cb5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20ChatGPT%20Desktop%20App%20Delivering%20PipeMagic%20Backdoor%2C%20Microsoft&amp;severity=medium&amp;id=68a3754fad5a09ad00b138fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43731-cwe-79-improper-neutralization-of-i-f3e617c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a371dfad5a09ad00b11dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-800-n-able-servers-left-unpatched-against-cri-80ca94ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20800%20N-able%20servers%20left%20unpatched%20against%20critical%20flaws&amp;severity=critical&amp;id=68a36e46ad5a09ad00b104cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7693-cwe-20-improper-input-validation-in--8ecc573c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7693%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20PLC%20-%20Micro850%20L50E&amp;severity=critical&amp;id=68a36accad5a09ad00b0f424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55300-cwe-79-improper-neutralization-of-i-9955d8bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55300%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20komari-monitor%20komari&amp;severity=high&amp;id=68a3673ead5a09ad00b0dda1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55299-cwe-521-weak-password-requirements--12fb59e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55299%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%207ritn%20VaulTLS&amp;severity=critical&amp;id=68a3673ead5a09ad00b0dd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55293-cwe-287-improper-authentication-in--153e7802</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55293%3A%20CWE-287%3A%20Improper%20Authentication%20in%20meshtastic%20firmware&amp;severity=critical&amp;id=68a3673ead5a09ad00b0dda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-scam-with-fake-copyright-notices-drops-ne-22bf543e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Scam%20with%20Fake%20Copyright%20Notices%20Drops%20New%20Noodlophile%20Stealer%20Variant&amp;severity=medium&amp;id=68a36035ad5a09ad00b0c498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55288-cwe-79-improper-neutralization-of-i-65f2a52f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55288%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MGeurts%20genealogy&amp;severity=medium&amp;id=68a35cb2ad5a09ad00b0b5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55287-cwe-79-improper-neutralization-of-i-7a5e3781</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55287%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MGeurts%20genealogy&amp;severity=high&amp;id=68a35cb2ad5a09ad00b0b5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3639-cwe-288-authentication-bypass-using--c453136c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3639%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Liferay%20Portal&amp;severity=low&amp;id=68a35cb2ad5a09ad00b0b5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55283-cwe-77-improper-neutralization-of-s-860fa63f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55283%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20aiven%20aiven-db-migrate&amp;severity=critical&amp;id=68a35cb2ad5a09ad00b0b5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55282-cwe-22-improper-limitation-of-a-pat-38e65d8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55282%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aiven%20aiven-db-migrate&amp;severity=critical&amp;id=68a35cb2ad5a09ad00b0b5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54234-server-side-request-forgery-ssrf-cw-74aca427</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54234%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=68a35cb2ad5a09ad00b0b5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55214-cwe-22-improper-limitation-of-a-pat-50dbaa08</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55214%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=medium&amp;id=68a3592dad5a09ad00b0a8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55205-cwe-863-incorrect-authorization-in--f1f85087</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55205%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20projectcapsule%20capsule&amp;severity=critical&amp;id=68a355a9ad5a09ad00b09d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55201-cwe-22-improper-limitation-of-a-pat-91bc3c6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55201%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=high&amp;id=68a355a9ad5a09ad00b09d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54117-cwe-80-improper-neutralization-of-s-833c826e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54117%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20NamelessMC%20Nameless&amp;severity=critical&amp;id=68a35225ad5a09ad00b084b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54421-cwe-79-improper-neutralization-of-i-50cde360</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54421%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NamelessMC%20Nameless&amp;severity=high&amp;id=68a35225ad5a09ad00b084b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54118-cwe-200-exposure-of-sensitive-infor-ff8946ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54118%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20NamelessMC%20Nameless&amp;severity=medium&amp;id=68a35225ad5a09ad00b084b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-hacking-abusing-developer-trust-in-cursor-and-d1950aca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CVibe%20Hacking%E2%80%9D%3A%20Abusing%20Developer%20Trust%20in%20Cursor%20and%20VS%20Code%20Remote%20Development&amp;severity=medium&amp;id=68a35cb4ad5a09ad00b0b604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/manpower-data-breach-hits-144000-users-workday-con-e9731d65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Manpower%20Data%20Breach%20Hits%20144%2C000%20users%2C%20Workday%20Confirms%203rd-Party%20CRM%20Breach&amp;severity=high&amp;id=68a34414ad5a09ad00b01d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intel-outside-hacking-every-intel-employee-and-var-90331968</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intel%20Outside%3A%20Hacking%20every%20Intel%20employee%20and%20various%20internal%20websites&amp;severity=medium&amp;id=68a33d18ad5a09ad00afe707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-365-direct-send-abuse-phishing-risks-sec-a6f7c7a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20365%20Direct%20Send%20Abuse%3A%20Phishing%20Risks%20%26%20Security%20Recommendations&amp;severity=medium&amp;id=68a33999ad5a09ad00af08fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33100-cwe-798-use-of-hard-coded-credentia-4d55f70c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33100%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68a33604ad5a09ad00aedd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33090-cwe-1333-inefficient-regular-expres-38b98eb9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33090%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20IBM%20Concert%20Software&amp;severity=high&amp;id=68a33281ad5a09ad00aeb234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27909-cwe-942-permissive-cross-domain-pol-1bf4a362</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27909%3A%20CWE-942%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68a33281ad5a09ad00aeb231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1759-cwe-244-improper-clearing-of-heap-me-cc252cc3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1759%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68a33281ad5a09ad00aeb22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36120-cwe-863-incorrect-authorization-in--88063fea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36120%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Storage%20Virtualize&amp;severity=high&amp;id=68a32efdad5a09ad00ae96f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4962-cwe-284-improper-access-control-in-l-e8b29907</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4962%3A%20CWE-284%20Improper%20Access%20Control%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68a32efdad5a09ad00ae96f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43732-cwe-639-authorization-bypass-throug-639a03ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43732%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a32b79ad5a09ad00ae8695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-and-npm-packages-discovered-exploit-714c3518</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20and%20npm%20Packages%20Discovered%20Exploiting%20Dependencies%20in%20Supply%20Chain%20Attacks&amp;severity=high&amp;id=68a32470ad5a09ad00ae40cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eavesdropping-on-phone-conversations-through-vibra-a2a11058</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eavesdropping%20on%20Phone%20Conversations%20Through%20Vibrations%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=68a32470ad5a09ad00ae40d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43733-cwe-79-improper-neutralization-of-i-388dc2cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43733%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=low&amp;id=68a378d4ad5a09ad00b15321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warlock-ransomware-group-claims-breach-at-colt-tel-8128220a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WarLock%20Ransomware%20group%20Claims%20Breach%20at%20Colt%20Telecom%20and%20Hitachi&amp;severity=high&amp;id=68a312dbad5a09ad00ad3f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/workday-reveals-crm-breach-c202f37e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Workday%20Reveals%20CRM%20Breach&amp;severity=high&amp;id=68a2fa40ad5a09ad00ac7169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xerox-fixed-path-traversal-and-xxe-bugs-in-freeflo-90f0c240</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Xerox%20fixed%20path%20traversal%20and%20XXE%20bugs%20in%20FreeFlow%20Core&amp;severity=medium&amp;id=68a2f6bbad5a09ad00ac4fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-attackers-can-execute-arbitrary-code-at-the-ke-4b7e9282</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20attackers%20can%20execute%20arbitrary%20code%20at%20the%20kernel%20level%3A%20A%20critical%20Linux%20Kernel%20netfilter%3A%20ipset%3A%20Missing%20Range%20Check%20LPE&amp;severity=critical&amp;id=68a2f339ad5a09ad00ac0d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41242-vulnerability-in-vmware-spring-fram-eb8d70d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41242%3A%20Vulnerability%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=68a2ec30ad5a09ad00abda5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47206-cwe-787-in-qnap-systems-inc-file-st-1cd14cca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47206%3A%20CWE-787%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68a2e528ad5a09ad00ab8b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5296-cwe-59-improper-link-resolution-befo-f3106e63</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5296%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Schneider%20Electric%20SESU&amp;severity=high&amp;id=68a2d718ad5a09ad00aa1588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6625-cwe-20-improper-input-validation-in--7f3e5a58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6625%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Schneider%20Electric%20Modicon%20M340&amp;severity=high&amp;id=68a2d394ad5a09ad00a8e851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57703-cwe-79-improper-neutralization-of-i-51a8f9f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57703%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Delta%20Electronics%20DIAEnergie&amp;severity=medium&amp;id=68a2d012ad5a09ad00a8d153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57702-cwe-79-improper-neutralization-of-i-18390e76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57702%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Delta%20Electronics%20DIAEnergie&amp;severity=medium&amp;id=68a2d012ad5a09ad00a8d150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57701-cwe-79-improper-neutralization-of-i-e714757a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57701%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Delta%20Electronics%20DIAEnergie&amp;severity=medium&amp;id=68a2cc8cad5a09ad00a8b8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57700-cwe-79-improper-neutralization-of-i-823ef7fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57700%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Delta%20Electronics%20DIAEnergie&amp;severity=high&amp;id=68a2cc8cad5a09ad00a8b8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9109-observable-response-discrepancy-in-p-46cdf96a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9109%3A%20Observable%20Response%20Discrepancy%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2c584ad5a09ad00a83dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9108-improper-restriction-of-rendered-ui--2006687b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9108%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2be7cad5a09ad00a538e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9107-cross-site-scripting-in-portabilis-i-e63c247e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9107%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2b774ad5a09ad00a45e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9106-cross-site-scripting-in-portabilis-i-ce0a1d24</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9106%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2b06cad5a09ad00a2881d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9105-cross-site-scripting-in-portabilis-i-255cc7c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9105%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2a965ad5a09ad00a25315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9104-cross-site-scripting-in-portabilis-i-25c97be4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9104%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2a5e2ad5a09ad00a247e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9103-cross-site-scripting-in-zencart-40e8be1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9103%3A%20Cross%20Site%20Scripting%20in%20ZenCart&amp;severity=medium&amp;id=68a327f5ad5a09ad00ae5c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9102-improper-export-of-android-applicati-769d4310</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9102%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%201%261%20Mail%20%26%20Media%20mail.com%20App&amp;severity=medium&amp;id=68a2944dad5a09ad00a1c2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9101-cross-site-scripting-in-zhenfeng13-m-ccade076</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9101%3A%20Cross%20Site%20Scripting%20in%20zhenfeng13%20My-Blog&amp;severity=medium&amp;id=68a2944dad5a09ad00a1c2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9100-authentication-bypass-by-capture-rep-aa5bc96e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9100%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20zhenfeng13%20My-Blog&amp;severity=medium&amp;id=68a289c1ad5a09ad00a00580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9099-unrestricted-upload-in-acrel-environ-b5a81b4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9099%3A%20Unrestricted%20Upload%20in%20Acrel%20Environmental%20Monitoring%20Cloud%20Platform&amp;severity=medium&amp;id=68a28050ad5a09ad009f3d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31715-cwe-77-improper-neutralization-of-s-277e7c7f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31715%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SL8521E%2FSL8521ET%2F%20SL8541E%2FUIS8141E%2FUWS6137%2FUWS6137E%2FUWS6151(E)%2FUWS6152&amp;severity=critical&amp;id=68a2782cad5a09ad009d9877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31714-cwe-20-improper-input-validation-in-86c9e83f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31714%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SL8521E%2FSL8521ET%2F%20SL8541E%2FUIS8141E%2FUWS6137%2FUWS6137E%2FUWS6151(E)%2FUWS6152&amp;severity=medium&amp;id=68a2782cad5a09ad009d9874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31713-cwe-77-improper-neutralization-of-s-39fb7dcf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31713%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SL8521E%2FSL8521ET%2F%20SL8541E%2FUIS8141E%2FUWS6137%2FUWS6137E%2FUWS6151(E)%2FUWS6152&amp;severity=high&amp;id=68a2782cad5a09ad009d9871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9098-improper-export-of-android-applicati-faea0e02</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9098%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Elseplus%20File%20Recovery%20App&amp;severity=medium&amp;id=68a2782cad5a09ad009d987a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9097-improper-export-of-android-applicati-8ddcabcb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9097%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Euro%20Information%20CIC%20banque%20et%20compte%20en%20ligne%20App&amp;severity=medium&amp;id=68a27124ad5a09ad009d5bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bigant-office-messenger-5606-sql-injection-f9511796</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BigAnt%20Office%20Messenger%205.6.06%20-%20SQL%20Injection&amp;severity=medium&amp;id=68a3d92dad5a09ad00eed720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ritecms-300-reflected-cross-site-scripting-xss-da46a3e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RiteCMS%203.0.0%20-%20Reflected%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=68a3d92dad5a09ad00eed71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyadmin-30-bruteforce-login-bypass-91b86cd8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PHPMyAdmin%203.0%20-%20Bruteforce%20Login%20Bypass&amp;severity=critical&amp;id=68a3d92dad5a09ad00eed715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-10019045-ntlmv2-hash-disclosure-13280e11</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%2010.0.19045%20-%20NTLMv2%20Hash%20Disclosure&amp;severity=medium&amp;id=68a3d92dad5a09ad00eed70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soosyze-cms-20-brute-force-login-03b8f52a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Soosyze%20CMS%202.0%20-%20Brute%20Force%20Login&amp;severity=critical&amp;id=68a3d92dad5a09ad00eed706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lantronix-provisioning-manager-7103-xml-external-e-8590dc4a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lantronix%20Provisioning%20Manager%207.10.3%20-%20XML%20External%20Entity%20Injection%20(XXE)&amp;severity=medium&amp;id=68a3d92dad5a09ad00eed701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tenda-ac20-16030812-command-injection-3554b2a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tenda%20AC20%2016.03.08.12%20-%20Command%20Injection&amp;severity=medium&amp;id=68a3d92dad5a09ad00eed6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-18-3f827c13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-18&amp;severity=medium&amp;id=68a3c29ead5a09ad00e1d2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32992-na-66a38f65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32992%3A%20n%2Fa&amp;severity=high&amp;id=68a386e4ad5a09ad00b1b7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55591-na-685f4118</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55591%3A%20n%2Fa&amp;severity=critical&amp;id=68a37fdbad5a09ad00b186fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55590-na-fb6afa33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55590%3A%20n%2Fa&amp;severity=medium&amp;id=68a37fdbad5a09ad00b186fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55589-na-cb4260e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55589%3A%20n%2Fa&amp;severity=medium&amp;id=68a37fdbad5a09ad00b186f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55588-na-5bd675b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55588%3A%20n%2Fa&amp;severity=high&amp;id=68a37fdbad5a09ad00b186f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55587-na-c1380b29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55587%3A%20n%2Fa&amp;severity=high&amp;id=68a37fdbad5a09ad00b186f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55586-na-819c3228</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55586%3A%20n%2Fa&amp;severity=high&amp;id=68a37fdbad5a09ad00b186ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55585-na-9218f688</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55585%3A%20n%2Fa&amp;severity=medium&amp;id=68a37fdbad5a09ad00b186eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55584-na-e127b471</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55584%3A%20n%2Fa&amp;severity=medium&amp;id=68a37fdbad5a09ad00b186e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/colt-technology-faces-multi-day-outage-after-warlo-46612432</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Colt%20Technology%20faces%20multi-day%20outage%20after%20WarLock%20ransomware%20attack&amp;severity=high&amp;id=68a26d9fad5a09ad009d4bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9096-cross-site-scripting-in-expressgatew-c59e43f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9096%3A%20Cross%20Site%20Scripting%20in%20ExpressGateway%20express-gateway&amp;severity=medium&amp;id=68a26a1cad5a09ad009d25c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-claims-to-sell-158-million-plain-text-47298107</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Claims%20to%20Sell%2015.8%20Million%20Plain-Text%20PayPal%20Credentials&amp;severity=medium&amp;id=68a26313ad5a09ad009cf8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7342-cwe-798-use-of-hard-coded-credential-e1399c12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7342%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Kubernetes%20Image%20Builder&amp;severity=high&amp;id=68a2631ead5a09ad009cf956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9095-cross-site-scripting-in-expressgatew-af3ca0ff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9095%3A%20Cross%20Site%20Scripting%20in%20ExpressGateway%20express-gateway&amp;severity=medium&amp;id=68a2631ead5a09ad009cf95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9094-improper-neutralization-of-special-e-158dfa48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9094%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20ThingsBoard&amp;severity=medium&amp;id=68a25c0cad5a09ad009cb636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9093-improper-export-of-android-applicati-dc8b61c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9093%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20BuzzFeed%20App&amp;severity=medium&amp;id=68a25503ad5a09ad009c451e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-seizes-28-million-in-crypto-from-zeppelin-ranso-9fed395a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20seizes%20%242.8%20million%20in%20crypto%20from%20Zeppelin%20ransomware%20operator&amp;severity=high&amp;id=68a23c66ad5a09ad009b93bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-exposed-teslamate-instances-leak-sensitive-tes-3745b7ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Exposed%20TeslaMate%20Instances%20Leak%20Sensitive%20Tesla%20Data&amp;severity=medium&amp;id=68a1d9faad5a09ad008e735b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-to-release-exploit-for-full-auth-bypass-7de9c536</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20to%20release%20exploit%20for%20full%20auth%20bypass%20on%20FortiWeb&amp;severity=high&amp;id=68a1a1b9ad5a09ad008c5822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9091-hard-coded-credentials-in-tenda-ac20-8b634e93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9091%3A%20Hard-coded%20Credentials%20in%20Tenda%20AC20&amp;severity=low&amp;id=68a142cead5a09ad0088a3a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9090-command-injection-in-tenda-ac20-d1ab2fe9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9090%3A%20Command%20Injection%20in%20Tenda%20AC20&amp;severity=medium&amp;id=68a142cead5a09ad0088a39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-17-18106f8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-17&amp;severity=medium&amp;id=68a2711ead5a09ad009d58e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9089-stack-based-buffer-overflow-in-tenda-a7d26227</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9089%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68a1189ead5a09ad0086d79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9088-stack-based-buffer-overflow-in-tenda-64ced0d8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9088%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68a11196ad5a09ad0086b7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9087-stack-based-buffer-overflow-in-tenda-8b885e42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9087%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68a10a8ead5a09ad008649a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/top-israeli-cybersecurity-director-arrested-in-us--214fc7d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Top%20Israeli%20Cybersecurity%20Director%20Arrested%20in%20US%20Child%20Exploitation%20Sting&amp;severity=high&amp;id=68a0d5d2ad5a09ad00822d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elastic-edr-0-day-microsoft-signed-driver-can-be-w-1e47514b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Elastic%20EDR%200-day%3A%20Microsoft-signed%20driver%20can%20be%20weaponized%20to%20attack%20its%20own%20host&amp;severity=medium&amp;id=68a0a49ead5a09ad00808fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ermac-v30-banking-trojan-source-code-leak-exposes--35b2add6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ERMAC%20V3.0%20Banking%20Trojan%20Source%20Code%20Leak%20Exposes%20Full%20Malware%20Infrastructure&amp;severity=high&amp;id=68a08174ad5a09ad007b2045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8143-cwe-79-improper-neutralization-of-in-52da72d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8143%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pencidesign%20Soledad&amp;severity=medium&amp;id=68a068e4ad5a09ad0079fbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8105-cwe-94-improper-control-of-generatio-0c34fb77</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8105%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20pencidesign%20Soledad&amp;severity=high&amp;id=68a068e4ad5a09ad0079fbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8878-cwe-94-improper-control-of-generatio-40bd485f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8878%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=68a068e4ad5a09ad0079fbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8142-cwe-98-improper-control-of-filename--ea31a626</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8142%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pencidesign%20Soledad&amp;severity=high&amp;id=68a068e4ad5a09ad0079fbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-compromised-by-own-malware-expose-467m-op-6e7e27e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Compromised%20by%20Own%20Malware%2C%20Expose%20%244.67M%20Operation%20and%20Identities&amp;severity=medium&amp;id=68a068d8ad5a09ad0079fba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9092-cwe-400-uncontrolled-resource-consum-82c8423c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9092%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20Bouncy%20Castle%20for%20Java%20-%20BC-FJA%202.1.0&amp;severity=low&amp;id=68a12387ad5a09ad0087d688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/encrypthub-abuses-brave-support-in-new-campaign-ex-527e5902</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EncryptHub%20abuses%20Brave%20Support%20in%20new%20campaign%20exploiting%20MSC%20EvilTwin%20flaw&amp;severity=medium&amp;id=68a05e4bad5a09ad00799617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8719-cwe-79-improper-neutralization-of-in-f930f797</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8719%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reubenthiessen%20Translate%20This%20gTranslate%20Shortcode&amp;severity=medium&amp;id=68a045b3ad5a09ad0077bb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gmail-phishing-campaign-analysis-new-voicemail-ema-8f7d0c28</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gmail%20Phishing%20Campaign%20Analysis%20%E2%80%93%20%E2%80%9CNew%20Voicemail%E2%80%9D%20Email%20with%20Dynamics%20Redirect%20%2B%20Captcha&amp;severity=medium&amp;id=68a03b28ad5a09ad007715cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7499-cwe-862-missing-authorization-in-wpd-5cbe3d91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7499%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Docs%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=68a0341fad5a09ad007601cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8464-cwe-23-relative-path-traversal-in-gl-8b5bf7a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8464%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=medium&amp;id=68a0341fad5a09ad007601d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8898-cwe-862-missing-authorization-in-mag-65f74aaf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8898%3A%20CWE-862%20Missing%20Authorization%20in%20magepeopleteam%20E-cab%20Taxi%20Booking%20Manager%20for%20Woocommerce&amp;severity=critical&amp;id=68a02993ad5a09ad0075aa19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8089-cwe-79-improper-neutralization-of-in-4faca3fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8089%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=68a02993ad5a09ad0075aa10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8896-cwe-79-improper-neutralization-of-in-6a83937b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=68a02993ad5a09ad0075aa15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8113-cwe-79-cross-site-scripting-xss-in-e-a6471689</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8113%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ebook%20Store&amp;severity=medium&amp;id=68a0228bad5a09ad00754c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7686-cwe-352-cross-site-request-forgery-c-a1fed7e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7686%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lmyoaoa%20weichuncai(WP%E4%BC%AA%E6%98%A5%E8%8F%9C)&amp;severity=medium&amp;id=689fff64ad5a09ad007439b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8293-cwe-79-improper-neutralization-of-in-810bf444</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8293%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Theerawat%20Patthawee%20Intl%20DateTime%20Calendar&amp;severity=medium&amp;id=689fff64ad5a09ad007439bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6079-cwe-434-unrestricted-upload-of-file--04f27251</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6079%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=high&amp;id=689fff64ad5a09ad0074397e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8393-cwe-98-improper-control-of-filename--668af9fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8393%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20delabon%20Woocommerce%20Blocks%20%E2%80%93%20Woolook&amp;severity=medium&amp;id=699f6c28b7ef31ef0b560925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7439-cwe-79-improper-neutralization-of-in-d8da324c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yeashir%20Anber%20Elementor%20Addon&amp;severity=medium&amp;id=689fff64ad5a09ad0074398b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7683-cwe-352-cross-site-request-forgery-c-7ab94157</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7683%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20janyksteenbeek%20LatestCheckins&amp;severity=medium&amp;id=689fff64ad5a09ad007439af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7668-cwe-352-cross-site-request-forgery-c-23018dc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7668%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20timothyja%20Linux%20Promotional%20Plugin&amp;severity=medium&amp;id=689fff64ad5a09ad007439a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7664-cwe-862-missing-authorization-in-low-1e6350e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7664%3A%20CWE-862%20Missing%20Authorization%20in%20loword%20AL%20Pack&amp;severity=high&amp;id=689fff64ad5a09ad0074399b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6080-cwe-269-improper-privilege-managemen-c182c627</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6080%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dasinfomedia%20WPGYM%20-%20Wordpress%20Gym%20Management%20System&amp;severity=high&amp;id=689fff64ad5a09ad00743982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7440-cwe-79-improper-neutralization-of-in-8e843195</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yeashir%20Anber%20Elementor%20Addon&amp;severity=medium&amp;id=689fff64ad5a09ad0074398f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3671-cwe-22-improper-limitation-of-a-path-7558a663</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3671%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dasinfomedia%20WPGYM%20-%20Wordpress%20Gym%20Management%20System&amp;severity=high&amp;id=689fff64ad5a09ad0074397a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7649-cwe-79-improper-neutralization-of-in-c8b1e2f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20Recent%20Comments%20Shortcode&amp;severity=medium&amp;id=689fff64ad5a09ad00743993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7651-cwe-79-improper-neutralization-of-in-82fede10</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7651%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20earnware%20Earnware%20Connect&amp;severity=medium&amp;id=689fff64ad5a09ad00743997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7684-cwe-352-cross-site-request-forgery-c-fd81d079</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7684%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20remysharp%20Last.fm%20Recent%20Album%20Artwork&amp;severity=medium&amp;id=689fff64ad5a09ad007439b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6221-cwe-79-improper-neutralization-of-in-851c606b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6221%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luuptek%20Embed%20Bokun&amp;severity=medium&amp;id=689fff64ad5a09ad00743986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12612-cwe-89-improper-neutralization-of-s-5f44e7b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12612%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49895-cwe-352-cross-site-request-forgery--fafd58ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49895%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20iThemes%20ServerBuddy%20by%20PluginBuddy.com&amp;severity=high&amp;id=689ff4d7ad5a09ad0073dc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12575-cwe-200-exposure-of-sensitive-infor-be8e5df1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12575%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Versus%20Polls%2C%20Anonymous%20Polls%2C%20Image%20Polls&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-risk-in-python-termcolor-and-colorama-2d1fe36f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Risk%20in%20Python%3A%20Termcolor%20and%20Colorama%20Explained&amp;severity=medium&amp;id=68a355a8ad5a09ad00b09cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55284-cwe-78-improper-neutralization-of-s-012ac235</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55284%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=689fe343ad5a09ad00736e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55286-cwe-119-improper-restriction-of-ope-fd37ba27</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55286%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20vancluever%20z2d&amp;severity=high&amp;id=689fdc40ad5a09ad0072e795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-16-149c3254</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-16&amp;severity=medium&amp;id=68a11f9ead5a09ad0086eb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52618-cwe-89-improper-neutralization-of-s-21740cf5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52618%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=689fbc9aad5a09ad00717f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52619-cwe-209-generation-of-error-message-5158a525</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52619%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=689fbc9aad5a09ad00717f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52620-cwe-20-improper-input-validation-in-22efaccc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52620%3A%20CWE-20%20Improper%20Input%20Validation%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=689fbc9aad5a09ad00717f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52621-cwe-346-origin-validation-error-in--1a43a7bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52621%3A%20CWE-346%20Origin%20Validation%20Error%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=689fbc9aad5a09ad00717f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43201-an-app-may-be-able-to-unexpectedly--e6bf9b5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43201%3A%20An%20app%20may%20be%20able%20to%20unexpectedly%20leak%20a%20user&apos;s%20credentials%20in%20Apple%20Apple%20Music%20Classical&amp;severity=medium&amp;id=689fae9ead5a09ad00710cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8959-cwe-59-improper-link-resolution-befo-6ae02c41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8959%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(Link%20Following)%20in%20HashiCorp%20Shared%20library&amp;severity=high&amp;id=689f9cf6ad5a09ad0070ac46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-profile-interlock-ransomware-4490aa64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Profile%3A%20Interlock%20Ransomware&amp;severity=medium&amp;id=689f9976ad5a09ad007098ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36088-cwe-79-improper-neutralization-of-i-55e875df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Storage%20TS4500%20Library&amp;severity=medium&amp;id=689f8b5fad5a09ad00701c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43490-cwe-59-improper-link-resolution-bef-ef28aea1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43490%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20HP%2C%20Inc.%20HP%20Hotkey%20Support%20Software&amp;severity=high&amp;id=689f8457ad5a09ad006fbd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/colt-telecom-attack-claimed-by-warlock-ransomware--7169c948</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Colt%20Telecom%20attack%20claimed%20by%20WarLock%20ransomware%2C%20data%20up%20for%20sale&amp;severity=high&amp;id=689f6f3ead5a09ad006ef4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taiwan-web-servers-breached-by-uat-7237-using-cust-dba0d9b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taiwan%20Web%20Servers%20Breached%20by%20UAT-7237%20Using%20Customized%20Open-Source%20Hacking%20Tools&amp;severity=high&amp;id=689f6f3ead5a09ad006ef49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7961-cwe-94-improper-control-of-generatio-c4081e3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7961%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Wulkano%20KAP&amp;severity=medium&amp;id=689f64b5ad5a09ad006eb477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8996-cwe-862-missing-authorization-in-dru-2658ed3a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8996%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Layout%20Builder%20Advanced%20Permissions&amp;severity=medium&amp;id=689f64b5ad5a09ad006eb480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8995-cwe-288-authentication-bypass-using--4712f99c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8995%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Authenticator%20Login&amp;severity=critical&amp;id=689f64b5ad5a09ad006eb47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8675-cwe-918-server-side-request-forgery--f2b84923</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8675%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Drupal%20AI%20SEO%20Link%20Advisor&amp;severity=medium&amp;id=689f64b5ad5a09ad006eb48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8362-cwe-79-improper-neutralization-of-in-b986f8e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20GoogleTag%20Manager&amp;severity=medium&amp;id=689f64b5ad5a09ad006eb489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8361-cwe-962-missing-authorization-in-dru-cccd6eaf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8361%3A%20CWE-962%20Missing%20Authorization%20in%20Drupal%20Config%20Pages&amp;severity=high&amp;id=689f64b5ad5a09ad006eb486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8092-cwe-79-improper-neutralization-of-in-cab0cd55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8092%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20COOKiES%20Consent%20Management&amp;severity=high&amp;id=689f64b5ad5a09ad006eb483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9060-cwe-20-improper-input-validation-in--f6967e59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9060%3A%20CWE-20%20Improper%20Input%20Validation%20in%20MSoft%20MFlash&amp;severity=critical&amp;id=689f64b5ad5a09ad006eb48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8066-cwe-601-url-redirection-to-untrusted-25c2ebfc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8066%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Bunkerity%20Bunker%20Web&amp;severity=medium&amp;id=689f5dabad5a09ad006e89d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49898-cwe-79-improper-neutralization-of-i-b336b2fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xolluteon%20Dropshix&amp;severity=medium&amp;id=689f56a3ad5a09ad006e40fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-bust-crypto-money-laundering-group-nab-smis-1d46800e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20Bust%20Crypto%20Money%20Laundering%20Group%2C%20Nab%20Smishing%20SMS%20Blaster%20Operator&amp;severity=medium&amp;id=689f4f9aad5a09ad006e0694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49432-cwe-862-missing-authorization-in-fw-0aa86042</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49432%3A%20Missing%20Authorization%20in%20FWDesign%20Ultimate%20Video%20Player&amp;severity=null&amp;id=689f531fad5a09ad006e210b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49897-cwe-89-improper-neutralization-of-s-c1bf62c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49897%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20Vertical%20scroll%20slideshow%20gallery%20v2&amp;severity=high&amp;id=689f531fad5a09ad006e210e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55207-cwe-601-url-redirection-to-untruste-f06ad89e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55207%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=689f531fad5a09ad006e2111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24975-cwe-754-improper-check-for-unusual--2f733f48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24975%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=689f4faaad5a09ad006e06d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55203-cwe-79-improper-neutralization-of-i-982abaa3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55203%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20makeplane%20plane&amp;severity=medium&amp;id=689f4faaad5a09ad006e06e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54989-cwe-476-null-pointer-dereference-in-2cda351f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54989%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20FirebirdSQL%20firebird&amp;severity=medium&amp;id=689f4faaad5a09ad006e06db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5048-cwe-120-buffer-copy-without-checking-add31143</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5048%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=689f4893ad5a09ad006dc696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5047-cwe-457-use-of-uninitialized-variabl-7481f54f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5047%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=689f4893ad5a09ad006dc692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5046-cwe-125-out-of-bounds-read-in-autode-a92a04b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5046%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=689f4893ad5a09ad006dc68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54466-cwe-94-improper-control-of-generati-62483186</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54466%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=medium&amp;id=689f4512ad5a09ad006db9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9053-sql-injection-in-projectworlds-trave-3ef0cd58</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9053%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=689f337fad5a09ad006d184d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9052-sql-injection-in-projectworlds-trave-02446add</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9052%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-infrastructure-behind-vextrios-tds-432af0fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20Infrastructure%20Behind%20VexTrio&apos;s%20TDS&amp;severity=medium&amp;id=689f2ff7ad5a09ad006cf1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blue-locker-analysis-ransomware-targeting-oil-gas--54513a69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Blue%20Locker&apos;%20Analysis%3A%20Ransomware%20Targeting%20Oil%20%26%20Gas%20Sector%20in%20Pakistan&amp;severity=medium&amp;id=689f2ff7ad5a09ad006cf1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trojans-embedded-in-svg-files-dd80531b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trojans%20Embedded%20in%20.svg%20Files&amp;severity=medium&amp;id=689f28eead5a09ad006c5ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plex-warns-users-to-patch-security-vulnerability-i-fe4c3fea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Plex%20warns%20users%20to%20patch%20security%20vulnerability%20immediately&amp;severity=high&amp;id=689f28eead5a09ad006c5ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1929-cwe-89-improper-neutralization-of-sp-c89768c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1929%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Risk%20Yaz%C4%B1l%C4%B1m%20Teknolojileri%20Ltd.%20%C5%9Eti.%20Reel%20Sekt%C3%B6r%20Hazine%20ve%20Risk%20Y%C3%B6netimi%20Yaz%C4%B1l%C4%B1m%C4%B1&amp;severity=high&amp;id=689f2570ad5a09ad006c45ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9051-sql-injection-in-projectworlds-trave-0fc88ce8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9051%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=689f2570ad5a09ad006c45f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54475-cwe-89-improper-neutralization-of-s-991962d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54475%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20joomsky.com%20JS%20Jobs%20component%20for%20Joomla&amp;severity=high&amp;id=689f21e9ad5a09ad006c34a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54474-cwe-89-improper-neutralization-of-s-d3bf5fab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54474%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dj-extensions.com%20DJ-Classifieds%20component%20for%20Joomla&amp;severity=high&amp;id=689f21e9ad5a09ad006c34a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54473-cwe-434-unrestricted-upload-of-file-a9354e74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54473%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20phoca.cz%20phoca.cz%20-%20Phoca%20Commander%20for%20Joomla&amp;severity=critical&amp;id=689f21e9ad5a09ad006c34a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crossc2-expanding-cobalt-strike-beacon-to-cross-pl-12f2c9fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrossC2%20Expanding%20Cobalt%20Strike%20Beacon%20to%20Cross-Platform%20Attacks&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-sap-ariba-quote-isnt-what-it-seemsits-ransomw-14817b34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20&apos;SAP%20Ariba%20Quote&apos;%20Isn&apos;t%20What%20It%20Seems%E2%80%94It&apos;s%20Ransomware&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-bulletin-fire-in-the-woods-a-new-variant-of-4a847a84</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Bulletin%3A%20Fire%20in%20the%20Woods%20%E2%80%93%20A%20New%20Variant%20of%20FireWood&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9050-sql-injection-in-projectworlds-trave-86fe6f71</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9050%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=689f1e64ad5a09ad006bde58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9047-sql-injection-in-projectworlds-visit-620bff93</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9047%3A%20SQL%20Injection%20in%20projectworlds%20Visitor%20Management%20System&amp;severity=medium&amp;id=689f175dad5a09ad006b9ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9046-stack-based-buffer-overflow-in-tenda-89a53113</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9046%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=689f175dad5a09ad006b9aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26709-cwe-200-exposure-of-sensitive-infor-cddf8147</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26709%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ZTE%20F50&amp;severity=medium&amp;id=689f1055ad5a09ad006b3940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9028-sql-injection-in-code-projects-onlin-15e77236</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9028%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=689f1055ad5a09ad006b3943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fixed-maximum-severity-security-flaw-in-secu-aae36da5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20fixed%20maximum-severity%20security%20flaw%20in%20Secure%20Firewall%20Management%20Center&amp;severity=medium&amp;id=689f094bad5a09ad006a8e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9027-sql-injection-in-code-projects-onlin-8596e9ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9027%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=689f0960ad5a09ad006a8ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9026-os-command-injection-in-d-link-dir-8-f78d22e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9026%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-860L&amp;severity=medium&amp;id=689f0246ad5a09ad006a5212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9025-sql-injection-in-code-projects-simpl-fceb4dd0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9025%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=689efb3cad5a09ad00699b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9024-sql-injection-in-phpgurukul-beauty-p-b5531efa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9024%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=689efb3cad5a09ad00699b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9023-buffer-overflow-in-tenda-ac7-e99ae452</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9023%3A%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=689ef437ad5a09ad00697379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5844-cwe-79-improper-neutralization-of-in-5cdc8cd1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5844%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techlabpro1%20Radius%20Blocks%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=689ef436ad5a09ad0069732b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7662-cwe-89-improper-neutralization-of-sp-770daac9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7662%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20evigeo%20Gestion%20de%20tarifs&amp;severity=medium&amp;id=689ef436ad5a09ad0069733d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8905-cwe-94-improper-control-of-generatio-65545985</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8905%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20inpersttion%20Inpersttion%20For%20Theme&amp;severity=medium&amp;id=689ef437ad5a09ad00697375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7507-cwe-20-improper-input-validation-in--c3504177</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7507%3A%20CWE-20%20Improper%20Input%20Validation%20in%20elinkcontent%20elink%20%E2%80%93%20Embed%20Content&amp;severity=medium&amp;id=689ef436ad5a09ad00697330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8720-cwe-79-improper-neutralization-of-in-b952bffb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20morehawes%20Plugin%20README%20Parser&amp;severity=medium&amp;id=689ef436ad5a09ad0069735a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8080-cwe-79-improper-neutralization-of-in-f10aae5e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8080%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alobaidi%20Alobaidi%20Captcha&amp;severity=medium&amp;id=689ef436ad5a09ad0069734c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8091-cwe-200-exposure-of-sensitive-inform-4db44b81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8091%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ashanjay%20EventON%20%E2%80%93%20Events%20Calendar&amp;severity=medium&amp;id=689ef436ad5a09ad00697352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7778-cwe-285-improper-authorization-in-ar-35305b0e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7778%3A%20CWE-285%20Improper%20Authorization%20in%20artkrylov%20Icons%20Factory&amp;severity=critical&amp;id=689ef436ad5a09ad00697347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7688-cwe-352-cross-site-request-forgery-c-4dfc3255</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7688%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jason-lau%20Add%20User%20Meta&amp;severity=medium&amp;id=689ef436ad5a09ad00697342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7641-cwe-22-improper-limitation-of-a-path-6fc93624</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7641%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%2048hmorris%20Assistant%20for%20NextGEN%20Gallery&amp;severity=high&amp;id=689ef436ad5a09ad00697334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7650-cwe-98-improper-control-of-filename--53508e6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7650%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20setriosoft%20BizCalendar%20Web&amp;severity=high&amp;id=689ef436ad5a09ad00697339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9022-sql-injection-in-sourcecodester-onli-3b468677</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9022%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Bank%20Management%20System&amp;severity=medium&amp;id=689eed33ad5a09ad00682006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9021-sql-injection-in-sourcecodester-onli-1016dba6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9021%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Bank%20Management%20System&amp;severity=medium&amp;id=689eed33ad5a09ad00682000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9020-use-after-free-in-px4-px4-autopilot-0a0318a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9020%3A%20Use%20After%20Free%20in%20PX4%20PX4-Autopilot&amp;severity=low&amp;id=689ee629ad5a09ad0063f0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8604-cwe-79-improper-neutralization-of-in-e4e98c69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptb%20WP%20Table%20Builder%20%E2%80%93%20Drag%20%26%20Drop%20Table%20Builder&amp;severity=medium&amp;id=689ee2a1ad5a09ad0063d6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9019-heap-based-buffer-overflow-in-tcprep-8df2e96c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9019%3A%20Heap-based%20Buffer%20Overflow%20in%20tcpreplay&amp;severity=low&amp;id=689f2570ad5a09ad006c45fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9017-cross-site-scripting-in-phpgurukul-z-792e3556</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9017%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=689f2570ad5a09ad006c45f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6679-cwe-434-unrestricted-upload-of-file--3ce90109</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6679%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bitpressadmin%20Bit%20Form%20%E2%80%93%20Custom%20Contact%20Form%2C%20Multi%20Step%2C%20Conversational%20Form%20%26%20Payment%20Form%20builder&amp;severity=critical&amp;id=689ed815ad5a09ad00637456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8451-cwe-79-improper-neutralization-of-in-14900684</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=689ed815ad5a09ad00637461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8013-cwe-918-server-side-request-forgery--de6c4b53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8013%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20quttera%20Quttera%20ThreatSign%20%E2%80%93%20Web%20Malware%20Scanner%20for%20WordPress&amp;severity=low&amp;id=689ed815ad5a09ad0063745b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9016-uncontrolled-search-path-in-mechrevo-a8f9b901</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9016%3A%20Uncontrolled%20Search%20Path%20in%20Mechrevo%20Control%20Center%20GX%20V2&amp;severity=high&amp;id=689ed815ad5a09ad00637466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9013-sql-injection-in-phpgurukul-online-s-3dc14e38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9013%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=689ed10ead5a09ad006331d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9012-sql-injection-in-phpgurukul-online-s-91592911</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9012%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=689eca06ad5a09ad0062f190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ermac-v30-banking-trojan-full-source-code-leak-and-045f39a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ERMAC%20V3.0%20Banking%20Trojan%3A%20Full%20Source%20Code%20Leak%20and%20Infrastructure%20Analysis&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kawabunga-dude-youve-been-ransomed-d923eb8e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kawabunga%2C%20Dude%2C%20You&apos;ve%20Been%20Ransomed!&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9011-sql-injection-in-phpgurukul-online-s-92a46c60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9011%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=689ec301ad5a09ad00627a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9010-sql-injection-in-itsourcecode-online-a3638f2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9010%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689ebbf5ad5a09ad006246d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9009-sql-injection-in-itsourcecode-online-898a17e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9009%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689ebbf5ad5a09ad006246cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31961-cwe-1220-insufficient-granularity-o-794d3fce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31961%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20HCL%20Software%20Connections&amp;severity=low&amp;id=689ebbf5ad5a09ad006246c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9008-sql-injection-in-itsourcecode-online-2fd20e34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9008%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689eb4edad5a09ad00620d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9007-buffer-overflow-in-tenda-ch22-f1e982cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9007%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=689eade5ad5a09ad0061dec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9006-buffer-overflow-in-tenda-ch22-9102ed16</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9006%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=689ea6e1ad5a09ad0061ab0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9005-information-exposure-through-error-m-48064a39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9005%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20mtons%20mblog&amp;severity=medium&amp;id=689ea6e1ad5a09ad0061ab04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9004-improper-restriction-of-excessive-au-9c088bf9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9004%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20mtons%20mblog&amp;severity=medium&amp;id=689ea6e1ad5a09ad0061aafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9003-cross-site-scripting-in-d-link-dir-8-db0c2fc8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9003%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DIR-818LW&amp;severity=medium&amp;id=689ea6e1ad5a09ad0061aaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8676-cwe-200-exposure-of-sensitive-inform-2329c67b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8676%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bplugins%20bSlider%20%E2%80%93%20Create%20Responsive%20Image%2C%20Post%2C%20Product%2C%20and%20Video%20Sliders&amp;severity=medium&amp;id=689e9c51ad5a09ad00615fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8867-cwe-79-improper-neutralization-of-in-6ecf6d25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20Graphina%20%E2%80%93%20Charts%20and%20Graphs%20For%20Elementor&amp;severity=medium&amp;id=689e9c51ad5a09ad00615fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8680-cwe-918-server-side-request-forgery--e81abcbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8680%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20bSlider%20%E2%80%93%20Create%20Responsive%20Image%2C%20Post%2C%20Product%2C%20and%20Video%20Sliders&amp;severity=medium&amp;id=689e9c51ad5a09ad00615fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6025-cwe-602-client-side-enforcement-of-s-65b19cb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6025%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20railmedia%20Order%20Tip%20for%20WooCommerce&amp;severity=high&amp;id=689e9c51ad5a09ad00615fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8342-cwe-862-missing-authorization-in-glb-10d3dd7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8342%3A%20CWE-862%20Missing%20Authorization%20in%20glboy%20OTP%20Login%20With%20Phone%20Number%2C%20OTP%20Verification&amp;severity=high&amp;id=689e9c51ad5a09ad00615fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9002-sql-injection-in-surbowl-dormitory-m-7b584350</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9002%3A%20SQL%20Injection%20in%20Surbowl%20dormitory-management-php&amp;severity=medium&amp;id=689e9c51ad5a09ad00615fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9001-stack-based-buffer-overflow-in-lemon-94250a64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9001%3A%20Stack-based%20Buffer%20Overflow%20in%20LemonOS&amp;severity=medium&amp;id=689e9c51ad5a09ad00615fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9000-uncontrolled-search-path-in-mechrevo-e7fd9640</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9000%3A%20Uncontrolled%20Search%20Path%20in%20Mechrevo%20Control%20Center%20GX%20V2&amp;severity=high&amp;id=689e91c5ad5a09ad0060fec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8993-sql-injection-in-itsourcecode-online-69dd3b7b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8993%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e91c5ad5a09ad0060feba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8992-cross-site-request-forgery-in-mtons--d6d73d1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8992%3A%20Cross-Site%20Request%20Forgery%20in%20mtons%20mblog&amp;severity=medium&amp;id=689e91c5ad5a09ad0060feb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8991-business-logic-errors-in-linlinjava--3cfec12d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8991%3A%20Business%20Logic%20Errors%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=689e83b5ad5a09ad00604d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8990-sql-injection-in-code-projects-onlin-c3e7005e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8990%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=689e83b5ad5a09ad00604d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-15-31dd537d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-15&amp;severity=medium&amp;id=689fce1ead5a09ad0071d919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8989-sql-injection-in-sourcecodester-covi-8fa0ae5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8989%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689e75a7ad5a09ad005fc0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8988-sql-injection-in-sourcecodester-covi-6c51cc72</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8988%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689e6ea3ad5a09ad005fa116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8987-sql-injection-in-sourcecodester-covi-a07012ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8987%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689e6795ad5a09ad005f7e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31987-cwe-405-asymmetric-resource-consump-f75cd706</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31987%3A%20CWE-405%20Asymmetric%20Resource%20Consumption%20in%20HCL%20Software%20Connections%20Docs&amp;severity=medium&amp;id=689e608dad5a09ad005f45c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8986-sql-injection-in-sourcecodester-covi-be482508</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8986%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689e608dad5a09ad005f45c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8985-sql-injection-in-sourcecodester-covi-811b72b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8985%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689e5985ad5a09ad005ef78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8984-sql-injection-in-itsourcecode-online-751292c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8984%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e5985ad5a09ad005ef783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/on-going-malvertising-attack-spreads-new-crypto-st-4624a0ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=On%20Going%20Malvertising%20Attack%20Spreads%20New%20Crypto%20Stealing%20PS1Bot%20Malware&amp;severity=medium&amp;id=689e527bad5a09ad005eafee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8983-sql-injection-in-itsourcecode-online-036105be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8983%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e5293ad5a09ad005eb049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8982-sql-injection-in-itsourcecode-online-db04d87a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8982%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e4b75ad5a09ad005e70c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8981-sql-injection-in-itsourcecode-online-dafaeea2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8981%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e446ead5a09ad005e52cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8980-insufficient-verification-of-data-au-fc72a31f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8980%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Tenda%20G1&amp;severity=high&amp;id=689e3d67ad5a09ad005e2baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8979-insufficient-verification-of-data-au-5a3bba54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8979%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Tenda%20AC15&amp;severity=high&amp;id=689e3d67ad5a09ad005e2ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8978-insufficient-verification-of-data-au-11188fea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8978%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=689e40ebad5a09ad005e47c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8976-cross-site-scripting-in-givanz-vvveb-6bb5ef96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8976%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=689e3d67ad5a09ad005e2bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8975-cross-site-scripting-in-givanz-vvveb-19cf32c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8975%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=689e2f55ad5a09ad005de84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52765-cwe-352-cross-site-request-forgery--2e24ef9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52765%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lisensee%20NetInsight%20Analytics%20Implementation%20Plugin&amp;severity=null&amp;id=689e2bd4ad5a09ad005db2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52767-cwe-352-cross-site-request-forgery--78c3f826</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52767%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lisensee%20NetInsight%20Analytics%20Implementation%20Plugin&amp;severity=null&amp;id=689e2bd4ad5a09ad005db2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52769-cwe-352-cross-site-request-forgery--2fd35b68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52769%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flexostudio%20flexo-social-gallery&amp;severity=null&amp;id=689e2bd4ad5a09ad005db302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52771-cwe-79-improper-neutralization-of-i-c1544a5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bcupham%20Video%20Expander&amp;severity=null&amp;id=689e2bd4ad5a09ad005db305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52797-cwe-352-cross-site-request-forgery--e82b6a9f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52797%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20josepsitjar%20StoryMap&amp;severity=null&amp;id=689e2bd4ad5a09ad005db308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53219-cwe-352-cross-site-request-forgery--645fb782</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53219%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pl4g4%20WP-Database-Optimizer-Tools&amp;severity=null&amp;id=689e2bd4ad5a09ad005db30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53241-cwe-918-server-side-request-forgery-2027ea10</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53241%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kodeshpa%20Simplified&amp;severity=null&amp;id=689e2bd4ad5a09ad005db30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53249-cwe-352-cross-site-request-forgery--24932d85</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53249%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hakeemnala%20Build%20App%20Online&amp;severity=null&amp;id=689e2bd4ad5a09ad005db311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53330-cwe-79-improper-neutralization-of-i-41832be2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53330%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WpEstate%20WP%20Rentals&amp;severity=null&amp;id=689e2bd4ad5a09ad005db314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53341-cwe-862-missing-authorization-in-th-72356786</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53341%3A%20Missing%20Authorization%20in%20Themovation%20App%2C%20SaaS%20%26%20Software%20Startup%20Tech%20Theme%20-%20Stratus&amp;severity=null&amp;id=689e2bd4ad5a09ad005db317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53342-cwe-79-improper-neutralization-of-i-01559ba2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53342%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Modernize&amp;severity=null&amp;id=689e2bd4ad5a09ad005db324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53343-cwe-862-missing-authorization-in-go-9fa86430</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53343%3A%20Missing%20Authorization%20in%20GoodLayers%20Modernize&amp;severity=null&amp;id=689e2bd4ad5a09ad005db327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53347-cwe-352-cross-site-request-forgery--616fd5f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53347%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Laborator%20Kalium&amp;severity=null&amp;id=689e2bd4ad5a09ad005db32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53575-cwe-79-improper-neutralization-of-i-70e8684e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20primersoftware%20Primer%20MyData%20for%20Woocommerce&amp;severity=null&amp;id=689e2bd4ad5a09ad005db32d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53581-cwe-79-improper-neutralization-of-i-4ad1a0a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artiosmedia%20RSS%20Feed%20Pro&amp;severity=null&amp;id=689e2bd4ad5a09ad005db330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53587-cwe-352-cross-site-request-forgery--1b872e9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53587%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ApusTheme%20Findgo&amp;severity=null&amp;id=689e2bd4ad5a09ad005db333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54054-cwe-79-improper-neutralization-of-i-4cbd5d3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=null&amp;id=689e2bd4ad5a09ad005db336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54708-cwe-79-improper-neutralization-of-i-d6b6f86c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54708%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20B%20Blocks&amp;severity=null&amp;id=689e2bd4ad5a09ad005db339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54712-cwe-862-missing-authorization-in-ha-f2432114</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54712%3A%20Missing%20Authorization%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=689e2bd4ad5a09ad005db33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54715-cwe-22-improper-limitation-of-a-pat-62aaaef0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54715%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=689e2bd4ad5a09ad005db33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54717-cwe-862-missing-authorization-in-e--fe2ef86f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54717%3A%20Missing%20Authorization%20in%20e-plugins%20WP%20Membership&amp;severity=null&amp;id=689e2bd5ad5a09ad005db34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54727-cwe-79-improper-neutralization-of-i-e16a0f36</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54727%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20On%20Demand%20Search%20And%20Replace&amp;severity=null&amp;id=689e2bd5ad5a09ad005db34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54728-cwe-352-cross-site-request-forgery--2bf27ef3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54728%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CreativeMindsSolutions%20CM%20On%20Demand%20Search%20And%20Replace&amp;severity=null&amp;id=689e2bd5ad5a09ad005db352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54729-cwe-79-improper-neutralization-of-i-2d9aed89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54729%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webba%20Appointment%20Booking%20Webba%20Booking&amp;severity=null&amp;id=689e2bd5ad5a09ad005db355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54730-cwe-862-missing-authorization-in-pa-f4bb8512</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54730%3A%20Missing%20Authorization%20in%20PARETO%20Digital%20Embedder%20for%20Google%20Reviews&amp;severity=null&amp;id=689e2bd5ad5a09ad005db358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54732-cwe-352-cross-site-request-forgery--9755bd2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54732%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjada%20WPDM%20%E2%80%93%20Premium%20Packages&amp;severity=null&amp;id=689e2bd5ad5a09ad005db35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54736-cwe-497-exposure-of-sensitive-syste-7cbcc961</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54736%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20NordicMade%20Savoy&amp;severity=null&amp;id=689e2bd5ad5a09ad005db35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54739-cwe-862-missing-authorization-in-po-9f059324</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54739%3A%20Missing%20Authorization%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=null&amp;id=689e2bd5ad5a09ad005db361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54740-cwe-79-improper-neutralization-of-i-0bfdf5a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54740%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michael%20Nelson%20Print%20My%20Blog&amp;severity=null&amp;id=689e2bd5ad5a09ad005db364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54746-cwe-79-improper-neutralization-of-i-52ac35cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cartpauj%20Shortcode%20Redirect&amp;severity=null&amp;id=689e2bd5ad5a09ad005db367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54747-cwe-79-improper-neutralization-of-i-85212523</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54747%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20Templatera&amp;severity=null&amp;id=689e2bd5ad5a09ad005db374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54749-cwe-79-improper-neutralization-of-i-bdb036ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetProductGallery&amp;severity=null&amp;id=689e2bd5ad5a09ad005db377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55708-cwe-89-improper-neutralization-of-s-d24b3381</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55708%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=null&amp;id=689e2bd5ad5a09ad005db37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55709-cwe-79-improper-neutralization-of-i-b0756a43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Visual%20Composer%20Visual%20Composer%20Website%20Builder&amp;severity=null&amp;id=689e2bd5ad5a09ad005db37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55710-cwe-201-insertion-of-sensitive-info-34c3a595</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55710%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Steve%20Burge%20TaxoPress&amp;severity=null&amp;id=689e2bd5ad5a09ad005db380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55712-cwe-862-missing-authorization-in-po-7e73f67b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55712%3A%20Missing%20Authorization%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=null&amp;id=689e2bd5ad5a09ad005db383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55713-cwe-79-improper-neutralization-of-i-5536efe1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55713%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=null&amp;id=689e2bd5ad5a09ad005db386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55714-cwe-79-improper-neutralization-of-i-5cc5dcbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55714%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=689e2bd5ad5a09ad005db389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55716-cwe-862-missing-authorization-in-ve-35fbc57b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55716%3A%20Missing%20Authorization%20in%20VeronaLabs%20WP%20Statistics&amp;severity=null&amp;id=689e2bd5ad5a09ad005db38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21110-cwe-250-execution-with-unnecessary--a5ce277c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21110%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Data%20Lakehouse&amp;severity=medium&amp;id=689e284ead5a09ad005d9e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8974-hard-coded-credentials-in-linlinjava-a94ccc52</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8974%3A%20Hard-coded%20Credentials%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=689e284ead5a09ad005d9e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8973-sql-injection-in-sourcecodester-cash-65dece05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8973%3A%20SQL%20Injection%20in%20SourceCodester%20Cashier%20Queuing%20System&amp;severity=medium&amp;id=689e284ead5a09ad005d9e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8972-sql-injection-in-itsourcecode-online-560b6bc2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8972%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e2145ad5a09ad005d56cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-netflix-job-phishing-scam-steals-facebook-logi-7ec19921</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Netflix%20Job%20Phishing%20Scam%20Steals%20Facebook%20Login%20Data&amp;severity=medium&amp;id=689e1dc1ad5a09ad005d3c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-found-using-crossc2-to-expand-cobalt-strik-b4d22d5f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Found%20Using%20CrossC2%20to%20Expand%20Cobalt%20Strike%20Beacon%E2%80%99s%20Reach%20to%20Linux%20and%20macOS&amp;severity=high&amp;id=689e1dc1ad5a09ad005d3c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-theft-replaces-encryption-blue-report-2025-on-d3a76c52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Theft%20Replaces%20Encryption%3A%20Blue%20Report%202025%20on%20Ransomware%20%26%20Infostealers&amp;severity=high&amp;id=689e1dc0ad5a09ad005d3c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookingcom-phishing-campaign-uses-sneaky-character-b3cc768d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Booking.com%20phishing%20campaign%20uses%20sneaky%20&apos;%E3%82%93&apos;%20character%20to%20trick%20you&amp;severity=high&amp;id=689e1dc0ad5a09ad005d3c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37945-improper-neutralization-of-input-du-bec70681</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37945%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8971-sql-injection-in-itsourcecode-online-5d834168</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8971%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e1a3dad5a09ad005d25cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8970-sql-injection-in-itsourcecode-online-64082e56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8970%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e1a3dad5a09ad005d25c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55192-cwe-94-improper-control-of-generati-1d3cdb84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55192%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20JurajNyiri%20HomeAssistant-Tapo-Control&amp;severity=high&amp;id=689e16b9ad5a09ad005d0c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20220-improper-neutralization-of-special--5b51466e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20220%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e16b9ad5a09ad005d0c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55195-cwe-1321-improperly-controlled-modi-4f2b73cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55195%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20denoland%20std&amp;severity=high&amp;id=689e16b9ad5a09ad005d0c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8969-sql-injection-in-itsourcecode-online-906fa8fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8969%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e1338ad5a09ad005ce419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8968-sql-injection-in-itsourcecode-online-fb7873d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8968%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e1338ad5a09ad005ce412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20306-improper-neutralization-of-special--0aabac59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20306%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e1338ad5a09ad005ce40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20302-missing-authorization-in-cisco-cisc-02b11c98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20302%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e1338ad5a09ad005ce40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20301-missing-authorization-in-cisco-cisc-02867278</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20301%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e1338ad5a09ad005ce409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20268-improper-handling-of-values-in-cisc-5fc69d52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20268%3A%20Improper%20Handling%20of%20Values%20in%20Cisco%20Cisco%20Firepower%20Threat%20Defense%20Software&amp;severity=medium&amp;id=689e1338ad5a09ad005ce406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20265-improper-neutralization-of-special--048ff4be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20265%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=critical&amp;id=689e1338ad5a09ad005ce403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20254-missing-release-of-memory-after-eff-5dea20e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20254%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1338ad5a09ad005ce3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20263-integer-overflow-to-buffer-overflow-38ec3d55</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20263%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1338ad5a09ad005ce400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20253-loop-with-unreachable-exit-conditio-c61c3af5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20253%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1338ad5a09ad005ce3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20252-missing-release-of-memory-after-eff-23e621ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20252%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20251-improper-validation-of-specified-ty-36cad1eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20251%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20244-improper-validation-of-specified-ty-e43d94f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20244%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20243-loop-with-unreachable-exit-conditio-66a6f2ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20243%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20239-missing-release-of-memory-after-eff-361b3ed9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20239%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20IOS&amp;severity=high&amp;id=689e1337ad5a09ad005ce3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20237-improper-neutralization-of-expressi-d6281dd8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20237%3A%20Improper%20Neutralization%20of%20Expression%2FCommand%20Delimiters%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20238-improper-authorization-on-physical--8ebae0f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20238%3A%20Improper%20Authorization%20on%20Physical%20Debug%20and%20Test%20Interfaces%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20225-missing-release-of-memory-after-eff-12be8d82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20225%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20IOS&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20235-improper-neutralization-of-input-du-5baf55f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20224-missing-release-of-memory-after-eff-98dec020</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20224%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20222-buffer-copy-without-checking-size-o-8d51b610</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20222%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Cisco%20Cisco%20Firepower%20Threat%20Defense%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20219-improper-access-control-in-cisco-ci-76be2ed9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20219%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20218-improper-neutralization-of-data-wit-e3686559</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20218%3A%20Improper%20Neutralization%20of%20Data%20within%20XPath%20Expressions%20(&apos;XPath%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20217-loop-with-unreachable-exit-conditio-64233b80</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20217%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Firepower%20Threat%20Defense%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20148-improper-input-validation-in-cisco--8ce1a3bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20148%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=high&amp;id=689e1337ad5a09ad005ce3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20136-loop-with-unreachable-exit-conditio-5be517e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20136%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20135-missing-release-of-memory-after-eff-9be16697</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20135%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20127-improper-resource-shutdown-or-relea-3197624a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20127%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20133-missing-release-of-memory-after-eff-0be0c27e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20133%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20134-double-free-in-cisco-cisco-adaptive-5c941cf7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20134%3A%20Double%20Free%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9043-cwe-428-unquoted-search-path-or-elem-e8e5eada</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9043%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Seagate%20Toolkit&amp;severity=medium&amp;id=689e1338ad5a09ad005ce42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9039-cwe-277-insecure-inherited-permissio-169636fb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9039%3A%20CWE-277%3A%20Insecure%20Inherited%20Permissions%2C%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Amazon%20ECS&amp;severity=medium&amp;id=689e0fb1ad5a09ad005cb829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54867-cwe-61-unix-symbolic-link-symlink-f-c3a84a8c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54867%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20youki-dev%20youki&amp;severity=high&amp;id=689e0c2dad5a09ad005ca280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8967-sql-injection-in-itsourcecode-online-46a42ff4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8967%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e0c2dad5a09ad005ca285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33142-cwe-295-improper-certificate-valida-9ed2e275</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33142%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=689e0567ad5a09ad005c27de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacked-law-enforcement-and-government-email-accoun-e1fa7593</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacked%20Law%20Enforcement%20and%20Government%20Email%20Accounts%20Sold%20on%20Dark%20Web&amp;severity=high&amp;id=689e0523ad5a09ad005c2711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36047-cwe-770-allocation-of-resources-wit-da8e7874</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36047%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=689e0567ad5a09ad005c27e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canadas-house-of-commons-investigating-data-breach-eb7e6695</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canada%E2%80%99s%20House%20of%20Commons%20investigating%20data%20breach%20after%20cyberattack&amp;severity=high&amp;id=689e0523ad5a09ad005c270d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8966-sql-injection-in-itsourcecode-online-3ce4beed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8966%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e0567ad5a09ad005c27eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8965-unrestricted-upload-in-linlinjava-li-02be5ac5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8965%3A%20Unrestricted%20Upload%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=689e0567ad5a09ad005c27e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53631-cwe-79-improper-neutralization-of-i-39b6d605</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53631%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DogukanUrker%20flaskBlog&amp;severity=medium&amp;id=689e01a3ad5a09ad005c05b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantomcard-new-nfc-driven-android-malware-emergin-1aaf79d8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomCard%3A%20New%20NFC-driven%20Android%20malware%20emerging%20in%20Brazil&amp;severity=medium&amp;id=689e01a2ad5a09ad005c0596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/norway-blames-pro-russian-hackers-for-dam-cyberatt-cbe53dfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Norway%20Blames%20Pro-Russian%20Hackers%20for%20Dam%20Cyberattack&amp;severity=medium&amp;id=689dfe1bad5a09ad005beed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40758-cwe-347-improper-verification-of-cr-5564da53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40758%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Siemens%20Mendix%20SAML%20(Mendix%2010.12%20compatible)&amp;severity=high&amp;id=689dfe47ad5a09ad005bef45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8964-improper-authentication-in-code-proj-692aa19a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8964%3A%20Improper%20Authentication%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=689dfe47ad5a09ad005bef4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7971-cwe-20-improper-input-validation-in--15bf0975</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7971%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20Studio%205000%20Logix%20Designer%C2%AE&amp;severity=high&amp;id=689dfe47ad5a09ad005bef48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8875-cwe-502-deserialization-of-untrusted-9cf275ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8875%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20N-able%20N-central&amp;severity=critical&amp;id=689dfaa3ad5a09ad005bd06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8876-cwe-20-improper-input-validation-in--06fa81df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8876%3A%20CWE-20%20Improper%20Input%20Validation%20in%20N-able%20N-central&amp;severity=critical&amp;id=689dfaa3ad5a09ad005bd071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7972-cwe-286-incorrect-user-management-in-225b136b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7972%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20Linx&amp;severity=high&amp;id=689dfaa3ad5a09ad005bd074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36613-cwe-266-incorrect-privilege-assignm-969a025d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36613%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20SupportAssist%20for%20Home%20PCs&amp;severity=low&amp;id=689dfaa3ad5a09ad005bd07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36612-cwe-266-incorrect-privilege-assignm-1edf1a7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36612%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20SupportAssist%20for%20Business%20PCs&amp;severity=medium&amp;id=689df717ad5a09ad005bb37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38738-cwe-266-incorrect-privilege-assignm-b47aae39</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38738%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20SupportAssist%20for%20Home%20PCs&amp;severity=medium&amp;id=689df717ad5a09ad005bb37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/home-office-phishing-scam-target-uk-visa-sponsorsh-07dfce60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Home%20Office%20Phishing%20Scam%20Target%20UK%20Visa%20Sponsorship%20System&amp;severity=medium&amp;id=689df39dad5a09ad005b90a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8962-stack-based-buffer-overflow-in-code--b7b82078</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8962%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=689df3d9ad5a09ad005b9178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38745-cwe-532-insertion-of-sensitive-info-ce47aca3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38745%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20OpenManage%20Enterprise&amp;severity=medium&amp;id=689df3d9ad5a09ad005b9175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26484-cwe-611-improper-restriction-of-xml-632727d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26484%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=689df3d9ad5a09ad005b9172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9042-cwe-1287-improper-validation-of-spec-2763c9ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9042%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Rockwell%20Automation%20FLEX%205000%20I%2FO&amp;severity=high&amp;id=689df3d9ad5a09ad005b9180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9041-cwe-1287-improper-validation-of-spec-72584f7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9041%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Rockwell%20Automation%20FLEX%205000%20I%2FO&amp;severity=high&amp;id=689df3d9ad5a09ad005b9188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-mega-malware-analysis-tutorial-featuring-donut-g-ac70d1a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Mega%20Malware%20Analysis%20Tutorial%20Featuring%20Donut-Generated%20Shellcode&amp;severity=medium&amp;id=689e01a2ad5a09ad005c059d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36581-cwe-788-access-of-memory-location-a-2c54dfc2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36581%3A%20CWE-788%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20in%20Dell%20PowerEdge&amp;severity=low&amp;id=689dec89ad5a09ad005b6871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7973-cwe-268-privilege-chaining-in-rockwe-5459a1bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7973%3A%20CWE-268%3A%20Privilege%20Chaining%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20ViewPoint&amp;severity=high&amp;id=689dec89ad5a09ad005b687e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7773-cwe-863-incorrect-authorization-in-r-48fb50b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7773%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Rockwell%20Automation%205032-CFGB16M12P5DR&amp;severity=high&amp;id=689dec89ad5a09ad005b687a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7774-cwe-306-missing-authentication-for-c-56076458</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7774%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Rockwell%20Automation%205032-CFGB16M12P5DR&amp;severity=high&amp;id=689de906ad5a09ad005b49c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9036-cwe-200-exposure-of-sensitive-inform-539ff2ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9036%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20Action%20Manager&amp;severity=high&amp;id=689de906ad5a09ad005b49cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7353-cwe-1188-initialization-of-a-resourc-477235fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7353%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Rockwell%20Automation%201756-EN2T%2FD&amp;severity=critical&amp;id=689de581ad5a09ad005b2ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55675-cwe-285-improper-authorization-in-a-04553742</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55675%3A%20CWE-285%20Improper%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=689de581ad5a09ad005b2ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55674-cwe-89-improper-neutralization-of-s-521131a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55674%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=689de581ad5a09ad005b2ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55672-cwe-80-improper-neutralization-of-s-3b9d50a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55672%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=689de581ad5a09ad005b2ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55673-cwe-200-exposure-of-sensitive-infor-1ec97274</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55673%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=689de581ad5a09ad005b2add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8963-deserialization-in-jeecgboot-jimurep-039e7e24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8963%3A%20Deserialization%20in%20jeecgboot%20JimuReport&amp;severity=medium&amp;id=689de1fdad5a09ad005b0bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8715-improper-neutralization-of-crlf-sequ-402b9f9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8715%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20PostgreSQL&amp;severity=high&amp;id=689de1fdad5a09ad005b0bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8714-inclusion-of-functionality-from-untr-e8ebe689</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8714%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20PostgreSQL&amp;severity=high&amp;id=689de1fdad5a09ad005b0bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8713-exposure-of-sensitive-information-th-ab50a4c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8713%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20PostgreSQL&amp;severity=low&amp;id=689de1fdad5a09ad005b0bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8961-memory-corruption-in-libtiff-efbd14ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8961%3A%20Memory%20Corruption%20in%20LibTIFF&amp;severity=medium&amp;id=689dd3edad5a09ad005a922b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8960-sql-injection-in-campcodes-online-fl-9e56b168</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8960%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Flight%20Booking%20Management%20System&amp;severity=medium&amp;id=689dccebad5a09ad005a4292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8958-stack-based-buffer-overflow-in-tenda-685496bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8958%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20TX3&amp;severity=high&amp;id=689dc5dcad5a09ad005a0b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54707-cwe-89-improper-neutralization-of-s-e107c2d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54707%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RealMag777%20MDTF&amp;severity=null&amp;id=689dbee7ad5a09ad0059e70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54706-cwe-79-improper-neutralization-of-i-12115993</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54706%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Magical%20Posts%20Display&amp;severity=null&amp;id=689dbee7ad5a09ad0059e707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54705-cwe-862-missing-authorization-in-ma-4b52b340</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54705%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=689dbee7ad5a09ad0059e704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54704-cwe-79-improper-neutralization-of-i-64e638e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=689dbee7ad5a09ad0059e701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54703-cwe-352-cross-site-request-forgery--8c712aee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54703%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20princeahmed%20Integrate%20Google%20Drive&amp;severity=null&amp;id=689dbee7ad5a09ad0059e6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54702-cwe-352-cross-site-request-forgery--6fa8c3ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54702%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20motov.net%20Ebook%20Store&amp;severity=null&amp;id=689dbee7ad5a09ad0059e6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54701-cwe-98-improper-control-of-filename-f1391fe7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54701%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Unicamp&amp;severity=null&amp;id=689dbee7ad5a09ad0059e6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54700-cwe-98-improper-control-of-filename-ae1c62e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54700%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Makeaholic&amp;severity=null&amp;id=689dbee7ad5a09ad0059e6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54699-cwe-79-improper-neutralization-of-i-ecc70cf8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54699%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=null&amp;id=689dbee7ad5a09ad0059e6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54698-cwe-80-improper-neutralization-of-s-eedf8ded</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54698%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20RadiusTheme%20Classified%20Listing&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54697-cwe-266-incorrect-privilege-assignm-50be3682</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54697%3A%20Incorrect%20Privilege%20Assignment%20in%20StellarWP%20Kadence%20WooCommerce%20Email%20Designer&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54695-cwe-862-missing-authorization-in-ha-3bac507d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54695%3A%20Missing%20Authorization%20in%20DevItems%20HT%20Mega&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54694-cwe-352-cross-site-request-forgery--13b435a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54694%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bPlugins%20Button%20Block&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54693-cwe-434-unrestricted-upload-of-file-01dd0392</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54693%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20epiphyt%20Form%20Block&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54692-cwe-862-missing-authorization-in-wp-5ebf0ab8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54692%3A%20Missing%20Authorization%20in%20WP%20Swings%20Membership%20For%20WooCommerce&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54691-cwe-639-authorization-bypass-throug-e056ac29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54691%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Stylemix%20Motors&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54690-cwe-98-improper-control-of-filename-a8c39ec4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54690%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themeStek%20Xinterio&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54689-cwe-98-improper-control-of-filename-c766adeb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54689%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Urna&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54688-cwe-79-improper-neutralization-of-i-1b37e3c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54688%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54687-cwe-79-improper-neutralization-of-i-86d6c8c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54687%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTabs&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54686-cwe-502-deserialization-of-untruste-0f05bdb8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54686%3A%20Deserialization%20of%20Untrusted%20Data%20in%20scriptsbundle%20Exertio&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54685-cwe-201-insertion-of-sensitive-info-0dc5fa2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54685%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Brainstorm%20Force%20SureDash&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54684-cwe-79-improper-neutralization-of-i-4576ae90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54684%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CRM%20Perks%20Integration%20for%20Contact%20Form%207%20and%20Constant%20Contact&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54683-cwe-79-improper-neutralization-of-i-07ecdaa0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20WP%20Modal%20Popup%20with%20Cookie%20Integration&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54682-cwe-352-cross-site-request-forgery--5035c9f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54682%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CRM%20Perks%20Connector%20for%20Gravity%20Forms%20and%20Google%20Sheets&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54681-cwe-601-url-redirection-to-untruste-093ddd5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54681%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20Connector%20for%20Gravity%20Forms%20and%20Google%20Sheets&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54680-cwe-79-improper-neutralization-of-i-2285d988</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54680%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Blogger%20Buzz&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54679-cwe-862-missing-authorization-in-ve-4a4a296e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54679%3A%20Missing%20Authorization%20in%20vertim%20Neon%20Channel%20Product%20Customizer%20Free&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54678-cwe-89-improper-neutralization-of-s-a987e0c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54678%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hassantafreshi%20Easy%20Form%20Builder&amp;severity=null&amp;id=689dbee5ad5a09ad0059e6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54676-cwe-79-improper-neutralization-of-i-35ea2110</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=null&amp;id=689dbee5ad5a09ad0059e695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54675-cwe-352-cross-site-request-forgery--4c2e9870</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54675%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20YITHEMES%20YITH%20WooCommerce%20Popup&amp;severity=null&amp;id=689dbee5ad5a09ad0059e692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54674-cwe-352-cross-site-request-forgery--990cf1d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54674%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mklacroix%20Product%20Configurator%20for%20WooCommerce&amp;severity=null&amp;id=689dbee5ad5a09ad0059e68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54673-cwe-352-cross-site-request-forgery--f4ec9561</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54673%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Chartify&amp;severity=null&amp;id=689dbee5ad5a09ad0059e68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54672-cwe-352-cross-site-request-forgery--7f85294d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54672%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jordy%20Meow%20Photo%20Engine&amp;severity=null&amp;id=689dbee5ad5a09ad0059e689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54671-cwe-352-cross-site-request-forgery--1fb711db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54671%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bobbingwide%20oik&amp;severity=null&amp;id=689dbee5ad5a09ad0059e686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54669-cwe-89-improper-neutralization-of-s-398ba574</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54669%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=689dbee5ad5a09ad0059e683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54668-cwe-79-improper-neutralization-of-i-a7f00c52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54668%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=689dbee5ad5a09ad0059e680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54667-cwe-367-time-of-check-time-of-use-t-ec1f2968</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54667%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=689dbee5ad5a09ad0059e67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3703-cwe-98-improper-control-of-filename--2511cd74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3703%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wipeoutmedia%20CSS%20%26%20JavaScript%20Toolbox&amp;severity=null&amp;id=689dbee1ad5a09ad0059e599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24766-cwe-98-improper-control-of-filename-b6fd33bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24766%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wproyal%20News%20Magazine%20X&amp;severity=null&amp;id=689dbee0ad5a09ad0059e556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24775-cwe-434-unrestricted-upload-of-file-d60c2d16</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24775%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Made%20I.T.%20Forms&amp;severity=null&amp;id=689dbee0ad5a09ad0059e559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25172-cwe-98-improper-control-of-filename-ff151be8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25172%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20beeteam368%20VidMov&amp;severity=null&amp;id=689dbee0ad5a09ad0059e55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25174-cwe-98-improper-control-of-filename-f086f0e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25174%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20beeteam368%20BeeTeam368%20Extensions&amp;severity=null&amp;id=689dbee0ad5a09ad0059e55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28962-cwe-862-missing-authorization-in-st-6550fe9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28962%3A%20Missing%20Authorization%20in%20stefanoai%20Advanced%20Google%20Universal%20Analytics&amp;severity=null&amp;id=689dbee0ad5a09ad0059e562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28975-cwe-79-improper-neutralization-of-i-8f7ee652</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28975%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redqteam%20Alike%20-%20WordPress%20Custom%20Post%20Comparison&amp;severity=null&amp;id=689dbee0ad5a09ad0059e565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28979-cwe-98-improper-control-of-filename-8f1ea43d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28979%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=high&amp;id=689dbee0ad5a09ad0059e568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28999-cwe-79-improper-neutralization-of-i-e3f628bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28999%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZoomIt%20WooCommerce%20Shop%20Page%20Builder&amp;severity=high&amp;id=689dbee0ad5a09ad0059e56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29014-cwe-79-improper-neutralization-of-i-b192bcfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29014%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZoomIt%20FoodMenu&amp;severity=high&amp;id=689dbee0ad5a09ad0059e56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30626-cwe-79-improper-neutralization-of-i-4220a040</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Multimedia%20Playlist%20Slider%20Addon%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=689dbee0ad5a09ad0059e571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30635-cwe-98-improper-control-of-filename-3ab51976</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30635%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeAtelier%20IDonatePro&amp;severity=null&amp;id=689dbee1ad5a09ad0059e57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30639-cwe-862-missing-authorization-in-th-37d530c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30639%3A%20Missing%20Authorization%20in%20ThemeAtelier%20IDonatePro&amp;severity=null&amp;id=689dbee1ad5a09ad0059e581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30993-cwe-862-missing-authorization-in-vi-f958b0d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30993%3A%20Missing%20Authorization%20in%20VillaTheme%20Thank%20You%20Page%20Customizer%20for%20WooCommerce&amp;severity=null&amp;id=689dbee1ad5a09ad0059e584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30998-cwe-89-improper-neutralization-of-s-772c773f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30998%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rico%20Macchi%20WP%20Links%20Page&amp;severity=null&amp;id=689dbee1ad5a09ad0059e587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31007-cwe-79-improper-neutralization-of-i-7b0d5fda</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31007%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alvind%20Billplz%20Addon%20for%20Contact%20Form%207&amp;severity=null&amp;id=689dbee1ad5a09ad0059e58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31425-cwe-862-missing-authorization-in-ka-9fca7dba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31425%3A%20Missing%20Authorization%20in%20kamleshyadav%20WP%20Lead%20Capturing%20Pages&amp;severity=null&amp;id=689dbee1ad5a09ad0059e58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32288-cwe-98-improper-control-of-filename-74e6b4ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32288%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20stmcan%20RT-Theme%2018%20%7C%20Extensions&amp;severity=null&amp;id=689dbee1ad5a09ad0059e590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39483-cwe-94-improper-control-of-generati-003cbca6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39483%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20imithemes%20Eventer&amp;severity=null&amp;id=689dbee1ad5a09ad0059e593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39510-cwe-89-improper-neutralization-of-s-59f3b025</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39510%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ValvePress%20Pinterest%20Automatic%20Pin&amp;severity=null&amp;id=689dbee1ad5a09ad0059e596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47536-cwe-502-deserialization-of-untruste-78d9f228</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47536%3A%20Deserialization%20of%20Untrusted%20Data%20in%20keywordrush%20Content%20Egg&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47610-cwe-79-improper-neutralization-of-i-d3be5e3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wetail%20WooCommerce%20Fortnox%20Integration&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47689-cwe-79-improper-neutralization-of-i-45994b71</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47689%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnh10%20Video%20Blogster%20Lite&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48293-cwe-98-improper-control-of-filename-fea5b6f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48293%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Dylan%20Kuhn%20Geo%20Mashup&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48332-cwe-98-improper-control-of-filename-dd9ff1a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48332%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PublishPress%20Gutenberg%20Blocks&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49033-cwe-89-improper-neutralization-of-s-427d385e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49033%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49036-cwe-98-improper-control-of-filename-ec3f1ab1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49036%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20octagonwebstudio%20Premium%20Addons%20for%20KingComposer&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49037-cwe-79-improper-neutralization-of-i-c5a93849</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Federico%20Rota%20Authentication%20and%20xmlrpc%20log%20writer&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49038-cwe-79-improper-neutralization-of-i-29714486</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49038%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soflyy%20WP%20Dynamic%20Links&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49044-cwe-352-cross-site-request-forgery--a41021c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49044%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tosend.it%20Simple%20Poll&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49047-cwe-79-improper-neutralization-of-i-c587654a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49047%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keeross%20DigitalOcean%20Spaces%20Sync&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49048-cwe-79-improper-neutralization-of-i-bf3c7074</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49048%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20inspectlet%20Inspectlet%20%26%238211%3B%20User%20Session%20Recording%20and%20Heatmaps&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49051-cwe-79-improper-neutralization-of-i-72774d74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20biscia7%20Hide%20Text%20Shortcode&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49052-cwe-862-missing-authorization-in-da-9327e911</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49052%3A%20Missing%20Authorization%20in%20Dariolee%20Netease%20Music&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49053-cwe-79-improper-neutralization-of-i-77d7bed9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kadesthemes%20WP%20Airdrop%20Manager&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49054-cwe-79-improper-neutralization-of-i-39219b92</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrdenny%20Time%20Sheets&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49056-cwe-79-improper-neutralization-of-i-0e897a11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49056%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49057-cwe-79-improper-neutralization-of-i-d4a837d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ko%20Min%20WP%20Voting&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49058-cwe-79-improper-neutralization-of-i-7c2704df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sound%20Strategies%20SoundSt%20SEO%20Search&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49059-cwe-89-improper-neutralization-of-s-e72246a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49059%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CleverReach%C2%AE%20CleverReach%C2%AE%20WP&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49061-cwe-79-improper-neutralization-of-i-f32086cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49061%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20perteus%20Porn%20Videos%20Embed&amp;severity=null&amp;id=689dbee3ad5a09ad0059e602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49062-cwe-79-improper-neutralization-of-i-a34a2caa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49062%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cornfeed%20WP-jScrollPane&amp;severity=null&amp;id=689dbee3ad5a09ad0059e605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49063-cwe-79-improper-neutralization-of-i-19c0e431</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49063%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20i3geek%20BaiduXZH%20Submit(%E7%99%BE%E5%BA%A6%E7%86%8A%E6%8E%8C%E5%8F%B7)&amp;severity=null&amp;id=689dbee3ad5a09ad0059e608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49064-cwe-79-improper-neutralization-of-i-7c9115c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49064%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webilop%20User%20Language%20Switch&amp;severity=null&amp;id=689dbee3ad5a09ad0059e60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49065-cwe-79-improper-neutralization-of-i-245febbc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49065%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BestiaDurmiente%20Visit%20Counter&amp;severity=null&amp;id=689dbee3ad5a09ad0059e60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49264-cwe-98-improper-control-of-filename-d873df83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49264%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Cloud%20Infrastructure%20Services%20Cloud%20SAML%20SSO%20-%20Single%20Sign%20On%20Login&amp;severity=null&amp;id=689dbee3ad5a09ad0059e611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49267-cwe-89-improper-neutralization-of-s-12aa32db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49267%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shabti%20Kaplan%20Frontend%20Admin%20by%20DynamiApps&amp;severity=null&amp;id=689dbee3ad5a09ad0059e614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49271-cwe-98-improper-control-of-filename-223a9e77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49271%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20GravityWP%20GravityWP%20-%20Merge%20Tags&amp;severity=null&amp;id=689dbee3ad5a09ad0059e617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49433-cwe-79-improper-neutralization-of-i-298aa5c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49433%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThanhD%20Supermalink&amp;severity=null&amp;id=689dbee3ad5a09ad0059e61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49437-cwe-79-improper-neutralization-of-i-22218a83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20worstguy%20WP%20LOL%20Rotation&amp;severity=null&amp;id=689dbee3ad5a09ad0059e61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49869-cwe-502-deserialization-of-untruste-8861bae1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49869%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=689dbee4ad5a09ad0059e62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49887-cwe-94-improper-control-of-generati-bd2a901f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49887%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WPFactory%20Product%20XML%20Feed%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=689dbee4ad5a09ad0059e62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50029-cwe-862-missing-authorization-in-as-67417a76</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50029%3A%20Missing%20Authorization%20in%20Ashish%20AI%20Tools&amp;severity=null&amp;id=689dbee4ad5a09ad0059e630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50031-cwe-862-missing-authorization-in-sy-20168f54</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50031%3A%20Missing%20Authorization%20in%20syedamirhussain91%20DB%20Backup&amp;severity=null&amp;id=689dbee4ad5a09ad0059e633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50040-cwe-79-improper-neutralization-of-i-731ec74d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50040%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moshensky%20CF7%20Spreadsheets&amp;severity=null&amp;id=689dbee4ad5a09ad0059e636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52712-cwe-35-path-traversal-in-boldgrid-p-529a692e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52712%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=null&amp;id=689dbee4ad5a09ad0059e639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52716-cwe-98-improper-control-of-filename-9e1c096b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52716%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Acato%20WP%20REST%20Cache&amp;severity=null&amp;id=689dbee4ad5a09ad0059e63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52720-cwe-89-improper-neutralization-of-s-61c2f380</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52720%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=689dbee4ad5a09ad0059e63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52721-cwe-862-missing-authorization-in-lc-339bd929</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52721%3A%20CWE-862%20Missing%20Authorization%20in%20LCweb%20Global%20Gallery&amp;severity=medium&amp;id=689dbee4ad5a09ad0059e642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52728-cwe-98-improper-control-of-filename-49a4275d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52728%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=null&amp;id=689dbee4ad5a09ad0059e645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52730-cwe-79-improper-neutralization-of-i-595d4bb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52730%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefunction%20WordPress%20Event%20Manager%2C%20Event%20Calendar%20and%20Booking%20Plugin&amp;severity=null&amp;id=689dbee4ad5a09ad0059e652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52731-cwe-862-missing-authorization-in-th-26071131</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52731%3A%20Missing%20Authorization%20in%20themefunction%20WordPress%20Event%20Manager%2C%20Event%20Calendar%20and%20Booking%20Plugin&amp;severity=null&amp;id=689dbee4ad5a09ad0059e655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52732-cwe-98-improper-control-of-filename-a826283a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52732%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RealMag777%20GMap%20Targeting&amp;severity=null&amp;id=689dbee4ad5a09ad0059e658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52775-cwe-862-missing-authorization-in-ro-1c8c96d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52775%3A%20Missing%20Authorization%20in%20Ronik%40UnlimitedWP%20Project%20Cost%20Calculator&amp;severity=null&amp;id=689dbee4ad5a09ad0059e65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52785-cwe-862-missing-authorization-in-so-426ab1cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52785%3A%20Missing%20Authorization%20in%20softnwords%20SMM%20API&amp;severity=null&amp;id=689dbee4ad5a09ad0059e65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52788-cwe-79-improper-neutralization-of-i-0be1e98a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52788%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Russell%20Jamieson%20CaptionPix&amp;severity=null&amp;id=689dbee4ad5a09ad0059e661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52800-cwe-862-missing-authorization-in-un-8eadddaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52800%3A%20Missing%20Authorization%20in%20Unity%20Business%20Technology%20Pty%20Ltd%20The%20E-Commerce%20ERP&amp;severity=null&amp;id=689dbee4ad5a09ad0059e664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52801-cwe-862-missing-authorization-in-vo-24781862</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52801%3A%20Missing%20Authorization%20in%20VonStroheim%20TheBooking&amp;severity=null&amp;id=689dbee4ad5a09ad0059e667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52806-cwe-98-improper-control-of-filename-ca586294</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52806%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20eyecix%20JobSearch&amp;severity=null&amp;id=689dbee4ad5a09ad0059e66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52820-cwe-89-improper-neutralization-of-s-ebb86f6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52820%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20infosoftplugin%20WooCommerce%20Point%20Of%20Sale%20(POS)&amp;severity=null&amp;id=689dbee4ad5a09ad0059e66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52823-cwe-89-improper-neutralization-of-s-fe0ee4f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52823%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ovatheme%20Cube%20Portfolio&amp;severity=null&amp;id=689dbee5ad5a09ad0059e67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8957-sql-injection-in-campcodes-online-fl-90bfd733</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8957%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Flight%20Booking%20Management%20System&amp;severity=medium&amp;id=689dbee7ad5a09ad0059e70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/august-news-and-resources-catch-up-french-72619718</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=August%20News%20and%20Resources%20Catch%20Up%20(French)&amp;severity=critical&amp;id=689db7d4ad5a09ad00599b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8956-command-injection-in-d-link-dir818l-05954769</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8956%3A%20Command%20Injection%20in%20D-Link%20DIR%E2%80%91818L&amp;severity=medium&amp;id=689db7cfad5a09ad00599b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7761-cwe-79-improper-neutralization-of-in-70dc1858</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Akcess-Net%20Lepszy%20BIP&amp;severity=medium&amp;id=689db7cfad5a09ad00599b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flaw-in-older-version-of-android-rooting-tool-kern-51e5d606</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flaw%20in%20Older%20Version%20of%20Android%20Rooting%20Tool%20KernelSU%20Allows%20Full%20Device%20Takeover&amp;severity=medium&amp;id=689db446ad5a09ad00598253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8943-2a88bf99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8943&amp;severity=critical&amp;id=689db456ad5a09ad005982e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8047-cwe-829-inclusion-of-functionality-f-7a4499b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8047%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20disable-right-click-powered-by-pixterme&amp;severity=critical&amp;id=689db456ad5a09ad005982e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55346-cwe-94-improper-control-of-generati-6311aa40</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55346%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=critical&amp;id=689db456ad5a09ad005982ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8955-sql-injection-in-phpgurukul-hospital-a22b6be7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8955%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=689db0cbad5a09ad00596b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-microsoft-internet-explorer-microsoft-e878c55a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Microsoft%20Internet%20Explorer%2C%20Microsoft%20Office%20Excel%2C%20and%20WinRAR%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=689dad3fad5a09ad005944b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-requires-crypto-app-licenses-in-15-regions--53139e4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Requires%20Crypto%20App%20Licenses%20in%2015%20Regions%20as%20FBI%20Warns%20of%20%249.9M%20Scam%20Losses&amp;severity=high&amp;id=689dad3fad5a09ad005944ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/manpower-data-breach-impacted-144180-individuals-b120647c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Manpower%20data%20breach%20impacted%20144%2C180%20individuals&amp;severity=high&amp;id=689dad3fad5a09ad005944b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-n-able-n-central-flaws-to-its-known-e-3f0b0916</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20N-able%20N-Central%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog%20-%20Security%20Affairs&amp;severity=medium&amp;id=689dad3fad5a09ad005944b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48862-cwe-1104-use-of-unmaintained-third--f441d1c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48862%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Setup&amp;severity=high&amp;id=689da9bdad5a09ad00592739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48861-cwe-284-improper-access-control-in--09e70532</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48861%3A%20CWE-284%20Improper%20Access%20Control%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Setup&amp;severity=medium&amp;id=689da9bdad5a09ad00592736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48860-cwe-284-improper-access-control-in--ab855eec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48860%3A%20CWE-284%20Improper%20Access%20Control%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Setup&amp;severity=high&amp;id=689da9bdad5a09ad00592733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54472-cwe-400-uncontrolled-resource-consu-cb0d4f7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54472%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20bRPC&amp;severity=high&amp;id=689da9bdad5a09ad0059273c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8954-sql-injection-in-phpgurukul-hospital-ff924cda</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8954%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=689da9bdad5a09ad00592746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8953-sql-injection-in-sourcecodester-covi-5bc3082a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8953%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689da9bdad5a09ad0059273f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5998-cwe-2280-improper-handling-of-insuff-fd1483d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5998%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20PPWP%20%E2%80%93%20Password%20Protect%20Pages&amp;severity=medium&amp;id=689da638ad5a09ad005906d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8952-sql-injection-in-campcodes-online-fl-f0d20b41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8952%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Flight%20Booking%20Management%20System&amp;severity=medium&amp;id=689da2b4ad5a09ad0058ed22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-javascript-injects-fullscreen-iframe-on--2168036c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20JavaScript%20Injects%20Fullscreen%20Iframe%20On%20a%20WordPress%20Website&amp;severity=medium&amp;id=689dc258ad5a09ad0059fea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8951-sql-injection-in-phpgurukul-teachers-122dc9db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8951%3A%20SQL%20Injection%20in%20PHPGurukul%20Teachers%20Record%20Management%20System&amp;severity=medium&amp;id=689d9bacad5a09ad0058bed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8950-sql-injection-in-campcodes-online-re-a48c77ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8950%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=689d94a4ad5a09ad00588f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-chrome-renderer-code-exec-to-kernel-with-msgo-d96fbb81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Chrome%20renderer%20code%20exec%20to%20kernel%20with%20MSG_OOB&amp;severity=medium&amp;id=689d9125ad5a09ad0058629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27388-cwe-20-improper-input-validation-in-63728ce1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27388%3A%20CWE-20%20Improper%20Input%20Validation%20in%20OPPO%20OPPO%20HEALTH%20APP&amp;severity=high&amp;id=689d9120ad5a09ad00586272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8949-stack-based-buffer-overflow-in-d-lin-7a8c3d0b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8949%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=689d8d9fad5a09ad005849f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8948-sql-injection-in-projectworlds-visit-e28db489</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8948%3A%20SQL%20Injection%20in%20projectworlds%20Visitor%20Management%20System&amp;severity=medium&amp;id=689d8d9fad5a09ad005849f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8947-sql-injection-in-projectworlds-visit-05ce00cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8947%3A%20SQL%20Injection%20in%20projectworlds%20Visitor%20Management%20System&amp;severity=medium&amp;id=689d8694ad5a09ad00581090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8946-sql-injection-in-projectworlds-onlin-0a198cfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8946%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Notes%20Sharing%20Platform&amp;severity=medium&amp;id=689e40ebad5a09ad005e47be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8046-cwe-79-cross-site-scripting-xss-in-i-ff8736bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8046%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Injection%20Guard&amp;severity=medium&amp;id=689d7c3ead5a09ad0057c47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7808-cwe-79-cross-site-scripting-xss-in-w-2bd4cd07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7808%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Shopify&amp;severity=medium&amp;id=689d7c3ead5a09ad0057c479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6790-cwe-352-cross-site-request-forgery-c-e5016e23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6790%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Quiz%20and%20Survey%20Master%20(QSM)&amp;severity=medium&amp;id=689d7c3ead5a09ad0057c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3414-cwe-79-cross-site-scripting-xss-in-s-109d3ac2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3414%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Structured%20Content%20(JSON-LD)%20%23wpsc&amp;severity=medium&amp;id=689d7c3ead5a09ad0057c46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8940-buffer-overflow-in-tenda-ac20-b79e9ea2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8940%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=689e80abad5a09ad00602947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8939-buffer-overflow-in-tenda-ac20-2d62fb61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8939%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=689e80abad5a09ad0060293f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8938-backdoor-in-totolink-n350r-a582f357</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8938%3A%20Backdoor%20in%20TOTOLINK%20N350R&amp;severity=medium&amp;id=689d717ead5a09ad00576d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5942-cwe-122-heap-based-buffer-overflow-i-b2d36fe9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5942%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Netskope%20Netskope%20Client&amp;severity=medium&amp;id=689d6a74ad5a09ad005741be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0309-vulnerability-in-netskope-netskope-c-07441599</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0309%3A%20Vulnerability%20in%20Netskope%20Netskope%20Client&amp;severity=medium&amp;id=689d6a74ad5a09ad005741b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5941-cwe-125-out-of-bounds-read-in-netsko-589d819d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5941%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Netskope%20Netskope%20Client&amp;severity=low&amp;id=689d6a74ad5a09ad005741bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8937-command-injection-in-totolink-n350r-f7d0182a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8937%3A%20Command%20Injection%20in%20TOTOLINK%20N350R&amp;severity=medium&amp;id=689d6a74ad5a09ad005741c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8936-sql-injection-in-1000-projects-sales-05c1f59a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8936%3A%20SQL%20Injection%20in%201000%20Projects%20Sales%20Management%20System&amp;severity=medium&amp;id=689d6a74ad5a09ad005741c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8935-sql-injection-in-1000-projects-sales-d5592e57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8935%3A%20SQL%20Injection%20in%201000%20Projects%20Sales%20Management%20System&amp;severity=medium&amp;id=689d636cad5a09ad005714a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8934-cross-site-scripting-in-1000-project-0ec7b4a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8934%3A%20Cross%20Site%20Scripting%20in%201000%20Projects%20Sales%20Management%20System&amp;severity=medium&amp;id=689d636cad5a09ad0057149e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8933-cross-site-scripting-in-1000-project-83bc9607</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8933%3A%20Cross%20Site%20Scripting%20in%201000%20Projects%20Sales%20Management%20System&amp;severity=medium&amp;id=689d5c65ad5a09ad0056eb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8932-sql-injection-in-1000-projects-sales-56c5de6f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8932%3A%20SQL%20Injection%20in%201000%20Projects%20Sales%20Management%20System&amp;severity=medium&amp;id=689d555cad5a09ad00567a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8931-sql-injection-in-code-projects-medic-766432e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8931%3A%20SQL%20Injection%20in%20code-projects%20Medical%20Store%20Management%20System&amp;severity=medium&amp;id=689d555cad5a09ad00567a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8930-sql-injection-in-code-projects-medic-a2c2d7f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8930%3A%20SQL%20Injection%20in%20code-projects%20Medical%20Store%20Management%20System&amp;severity=medium&amp;id=689d555cad5a09ad00567a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50518-na-cfc724b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50518%3A%20n%2Fa&amp;severity=critical&amp;id=689e80abad5a09ad0060293b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-14-030161c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-14&amp;severity=medium&amp;id=689e7c9ead5a09ad005ff304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50862-na-4f2b8ef3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50862%3A%20n%2Fa&amp;severity=medium&amp;id=689e446ead5a09ad005e52c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50861-na-ac3b8b33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50861%3A%20n%2Fa&amp;severity=medium&amp;id=689e446ead5a09ad005e52c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51965-na-e4b2740e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51965%3A%20n%2Fa&amp;severity=medium&amp;id=689e40ebad5a09ad005e47b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51986-na-4eb81cf1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51986%3A%20n%2Fa&amp;severity=high&amp;id=689e2145ad5a09ad005d56cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52335-na-6725fbc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52335%3A%20n%2Fa&amp;severity=medium&amp;id=689e1e59ad5a09ad005d3d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50515-na-aa4cf636</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50515%3A%20n%2Fa&amp;severity=medium&amp;id=689e1a3dad5a09ad005d25c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50817-na-0dad8d6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50817%3A%20n%2Fa&amp;severity=medium&amp;id=689e1a3dad5a09ad005d25bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27845-na-a4f3e6a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27845%3A%20n%2Fa&amp;severity=critical&amp;id=689dfaa3ad5a09ad005bd077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27847-na-be1b1ea4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27847%3A%20n%2Fa&amp;severity=medium&amp;id=689dfaa3ad5a09ad005bd06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27846-na-29a2f3b8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27846%3A%20n%2Fa&amp;severity=medium&amp;id=689dfaa3ad5a09ad005bd066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43983-na-a2a76949</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43983%3A%20n%2Fa&amp;severity=critical&amp;id=689df3d9ad5a09ad005b9183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43984-na-2b55f25d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43984%3A%20n%2Fa&amp;severity=critical&amp;id=689dec89ad5a09ad005b6874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55197-cwe-400-uncontrolled-resource-consu-afeaa7a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55197%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=689d1d1cad5a09ad0054d653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55194-cwe-248-uncaught-exception-in-part--9a4b08c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55194%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Part-DB%20Part-DB-server&amp;severity=medium&amp;id=689d2ef7ad5a09ad00555d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8929-sql-injection-in-code-projects-medic-54573fba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8929%3A%20SQL%20Injection%20in%20code-projects%20Medical%20Store%20Management%20System&amp;severity=medium&amp;id=689d0f0cad5a09ad005499d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8928-sql-injection-in-code-projects-medic-79cb31f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8928%3A%20SQL%20Injection%20in%20code-projects%20Medical%20Store%20Management%20System&amp;severity=medium&amp;id=689d0f0cad5a09ad005499cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34154-cwe-22-improper-limitation-of-a-pat-cc3a8585</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34154%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synergetic%20Data%20Systems%20Inc.%20UnForm%20Server%20Manager&amp;severity=critical&amp;id=689d00fdad5a09ad0053f3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8927-improper-restriction-of-excessive-au-c6329f45</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8927%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20mtons%20mblog&amp;severity=medium&amp;id=689cf2f0ad5a09ad005233c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-video-surveillance-platforms-cc1fb9f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Video%20Surveillance%20Platforms&amp;severity=medium&amp;id=689cef6ead5a09ad0052269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8926-sql-injection-in-sourcecodester-covi-f6c93359</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8926%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689cebe6ad5a09ad0051ed12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8925-sql-injection-in-itsourcecode-sports-ef8fa353</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8925%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=689ce4dead5a09ad0051c02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8924-sql-injection-in-campcodes-online-wa-d5883ae1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8924%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Water%20Billing%20System&amp;severity=medium&amp;id=689ce4dead5a09ad0051c025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8923-sql-injection-in-code-projects-job-d-2bccc7d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8923%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=689cddd6ad5a09ad00518747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8922-sql-injection-in-code-projects-job-d-c4085849</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8922%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=689cddd6ad5a09ad00518740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/efimer-trojan-steals-crypto-hacks-wordpress-sites--1f54905d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Efimer%20Trojan%20Steals%20Crypto%2C%20Hacks%20WordPress%20Sites%20via%20Torrents%20and%20Phishing&amp;severity=medium&amp;id=689cd6caad5a09ad0050617f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8921-sql-injection-in-code-projects-job-d-ba86c510</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8921%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=689cd6f1ad5a09ad0051017b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8920-cross-site-scripting-in-portabilis-i-1a549b19</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8920%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=689cd6f1ad5a09ad00510175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zoom-and-xerox-release-critical-security-updates-f-86d74e10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zoom%20and%20Xerox%20Release%20Critical%20Security%20Updates%20Fixing%20Privilege%20Escalation%20and%20RCE%20Flaws&amp;severity=critical&amp;id=689ccfc4ad5a09ad004fb48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8754-cwe-306-missing-authentication-for-c-8cf667a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8754%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ABB%20ABB%20AbilityTM%20zenon&amp;severity=high&amp;id=689ccfdaad5a09ad004fb4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23306-cwe-94-improper-control-of-generati-f9a0b6cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23306%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=689ccfdaad5a09ad004fb4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23305-cwe-94-improper-control-of-generati-ed4ac8a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23305%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=689ccfdaad5a09ad004fb4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8919-cross-site-scripting-in-portabilis-i-5f7ac2b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8919%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=689ccfdaad5a09ad004fb50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23298-cwe-94-improper-control-of-generati-6c0d4749</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23298%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Merlin%20Transformers4Rec&amp;severity=high&amp;id=689ccfdaad5a09ad004fb4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23296-cwe-94-improper-control-of-generati-8f058708</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23296%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Isaac-GR00T%20N1&amp;severity=high&amp;id=689ccfdaad5a09ad004fb4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23295-cwe-94-improper-control-of-generati-bd23c690</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23295%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Apex&amp;severity=high&amp;id=689ccc41ad5a09ad004f80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23304-cwe-22-improper-limitation-of-a-pat-7e9ad0d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23304%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NVIDIA%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=689ccc41ad5a09ad004f80ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23303-cwe-502-deserialization-of-untruste-8a831eb7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23303%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=689ccc41ad5a09ad004f80e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23294-cwe-78-improper-neutralization-of-s-6d6323f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23294%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20WebDataset&amp;severity=high&amp;id=689cc8bead5a09ad004f5c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8904-cwe-257-storing-passwords-in-a-recov-43468dee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8904%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Amazon%20EMR&amp;severity=critical&amp;id=689cc8bead5a09ad004f5c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2184-cwe-1392-use-of-default-credentials--0b59e6fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2184%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=689cc8bead5a09ad004f5ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2183-cwe-295-improper-certificate-validat-fbf01346</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2183%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=medium&amp;id=689cc8bead5a09ad004f5ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2182-cwe-312-cleartext-storage-of-sensiti-9a433600</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2182%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=689cc8bead5a09ad004f5c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2181-cwe-312-cleartext-storage-of-sensiti-bf78efaa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2181%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Palo%20Alto%20Networks%20Checkov%20by%20Prisma%20Cloud&amp;severity=medium&amp;id=689cc8bead5a09ad004f5c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2180-cwe-502-deserialization-of-untrusted-8ef59b9e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2180%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Palo%20Alto%20Networks%20Checkov%20by%20Prisma%20Cloud&amp;severity=medium&amp;id=689cc8bead5a09ad004f5c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coordinated-brute-force-campaign-targets-fortinet--a50c31f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coordinated%20Brute%20Force%20Campaign%20Targets%20Fortinet%20SSL%20VPN&amp;severity=medium&amp;id=689cc8bdad5a09ad004f5c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34153-cwe-502-deserialization-of-untruste-22045679</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34153%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hyland%20Software%20OnBase&amp;severity=critical&amp;id=689cc539ad5a09ad004e1a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-code-execution-in-xerox-freeflow-core-d31069b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Code%20Execution%20in%20Xerox%20FreeFlow%20Core&amp;severity=critical&amp;id=689cc1b9ad5a09ad004d449a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/distribution-of-smartloader-malware-via-github-rep-82cf3176</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Distribution%20of%20SmartLoader%20Malware%20via%20Github%20Repository%20Disguised%20as%20a%20Legitimate%20Project&amp;severity=medium&amp;id=689cb3a4ad5a09ad00459d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8918-cross-site-scripting-in-portabilis-i-8548173e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8918%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=689cb3abad5a09ad00459e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-helpful-ai-assistants-are-accidentally-destroy-8d9fffa8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20%22helpful%22%20AI%20assistants%20are%20accidentally%20destroying%20production%20systems%20-%20and%20what%20we&apos;re%20doing%20about%20it.&amp;severity=medium&amp;id=689cb028ad5a09ad00455e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53859-cwe-125-out-of-bounds-read-in-f5-ng-4de1db12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53859%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20NGINX%20Plus&amp;severity=low&amp;id=689ca919ad5a09ad004493fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54500-cwe-770-allocation-of-resources-wit-fe0677e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54500%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=689ca919ad5a09ad00449401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48500-cwe-353-missing-support-for-integri-0b1c9cb9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48500%3A%20CWE-353%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20F5%20BIG-IP%20Edge%20Client&amp;severity=high&amp;id=689ca919ad5a09ad004493f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46405-cwe-121-stack-based-buffer-overflow-7022220a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46405%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20F5%20BIG-IP&amp;severity=high&amp;id=689ca919ad5a09ad004493f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52585-cwe-476-null-pointer-dereference-in-513875d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52585%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=689ca919ad5a09ad004493fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54809-cwe-295-improper-certificate-valida-1b2e1490</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54809%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20F5%20F5%20Access&amp;severity=high&amp;id=689ca919ad5a09ad00449404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8941-improper-limitation-of-a-pathname-to-08065748</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8941%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=689ca59aad5a09ad00442ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-asks-users-to-ignore-certificate-enrollm-ff1bf6a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20asks%20users%20to%20ignore%20certificate%20enrollment%20errors&amp;severity=high&amp;id=689c9e8aad5a09ad00424868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-brute-force-campaign-hits-fortinet-ssl-vpn-in--2195a749</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Brute-Force%20Campaign%20Hits%20Fortinet%20SSL%20VPN%20in%20Coordinated%20Attack&amp;severity=medium&amp;id=689c9e8aad5a09ad0042486c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54791-cwe-209-generation-of-error-message-ef0333d0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54791%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20ome%20omero-web&amp;severity=medium&amp;id=689c9edbad5a09ad00424b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32451-cwe-824-access-of-uninitialized-poi-567d116c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32451%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=689c9784ad5a09ad00420ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54382-cwe-78-improper-neutralization-of-s-8c98ac63</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54382%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CherryHQ%20cherry-studio&amp;severity=critical&amp;id=689c9784ad5a09ad00420caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54074-cwe-78-improper-neutralization-of-s-11a7ca34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54074%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CherryHQ%20cherry-studio&amp;severity=high&amp;id=689c9784ad5a09ad00420ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55668-cwe-384-session-fixation-in-apache--9dd5da2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55668%3A%20CWE-384%20Session%20Fixation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=689c9400ad5a09ad0041cfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8908-sql-injection-in-shanghai-lingdang-i-72d57eee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8908%3A%20SQL%20Injection%20in%20Shanghai%20Lingdang%20Information%20Technology%20Lingdang%20CRM&amp;severity=medium&amp;id=689c907cad5a09ad0041bfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8907-execution-with-unnecessary-privilege-93244b1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8907%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20H3C%20M2%20NAS&amp;severity=high&amp;id=689c907cad5a09ad0041bfbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48989-cwe-404-improper-resource-shutdown--3351873c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48989%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=689c826dad5a09ad00415599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8671-cwe-404-improper-resource-shutdown-o-5d85bfa9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8671%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools&amp;severity=high&amp;id=689c826dad5a09ad0041559c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-watcher-dissecting-cmimai-stealers-vbs-payl-a2206915</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Watcher%3A%20Dissecting%20Cmimai%20Stealer&apos;s%20VBS%20Payload&amp;severity=medium&amp;id=689cb3a4ad5a09ad00459d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-analysis-dadf5238</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Analysis&amp;severity=medium&amp;id=689cb3a4ad5a09ad00459d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dark-side-of-parental-control-apps-28515be6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Dark%20Side%20of%20Parental%20Control%20Apps&amp;severity=medium&amp;id=689cb3a4ad5a09ad00459d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-a-web3-interview-scam-780e1417</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20a%20Web3%20Interview%20Scam&amp;severity=medium&amp;id=689cb3a4ad5a09ad00459d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55280-cwe-312-cleartext-storage-of-sensit-06e4e6c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55280%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20ZKTeco%20Co%20WL20%20Biometric%20Attendance%20System&amp;severity=medium&amp;id=689c7b65ad5a09ad0040f1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-minecraft-installer-is-spreading-njrat-spywar-4ce404bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Minecraft%20Installer%20is%20Spreading%20NjRat%20Spyware%20to%20Steal%20Data&amp;severity=medium&amp;id=689c77e4ad5a09ad0040d3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55279-cwe-798-use-of-hard-coded-credentia-5b90fa5f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55279%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20ZKTeco%20Co%20WL20%20Biometric%20Attendance%20System&amp;severity=medium&amp;id=689c7805ad5a09ad0040d55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54465-cwe-798-use-of-hard-coded-credentia-a259790e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54465%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20ZKTeco%20Co%20WL20%20Biometric%20Attendance%20System&amp;severity=medium&amp;id=689c7805ad5a09ad0040d55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54464-cwe-312-cleartext-storage-of-sensit-c136070e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54464%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20ZKTeco%20Co%20WL20%20Biometric%20Attendance%20System&amp;severity=high&amp;id=689c745dad5a09ad0040acab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-brings-back-real-trojan-horse-malware-fd8fec13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20brings%20back%20real%20trojan%20horse%20malware&amp;severity=medium&amp;id=689cac9cad5a09ad00451d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8916-cwe-770-allocation-of-resources-with-01383f04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8916%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC%20Java&amp;severity=medium&amp;id=689c5f46ad5a09ad00402965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8914-cwe-89-improper-neutralization-of-sp-16a4e72a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8914%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=high&amp;id=689c5bc4ad5a09ad0040166c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8913-cwe-98-improper-control-of-filename--20652322</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8913%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=critical&amp;id=689c5bc4ad5a09ad00401668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8912-cwe-36-absolute-path-traversal-in-we-fca36166</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8912%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=high&amp;id=689c5bc4ad5a09ad00401664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8911-cwe-79-improper-neutralization-of-in-4d870eea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8911%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=medium&amp;id=689c583dad5a09ad004003da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8910-cwe-79-improper-neutralization-of-in-10b8a88a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=medium&amp;id=689c583dad5a09ad004003d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8909-cwe-36-absolute-path-traversal-in-we-f297bc79</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8909%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=medium&amp;id=689c583dad5a09ad004003d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-hub-still-hosts-dozens-of-linux-images-with-3913913a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Hub%20still%20hosts%20dozens%20of%20Linux%20images%20with%20the%20XZ%20backdoor&amp;severity=high&amp;id=689c54b7ad5a09ad003fe967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/charon-ransomware-hits-middle-east-sectors-using-a-665ed829</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Charon%20Ransomware%20Hits%20Middle%20East%20Sectors%20Using%20APT-Level%20Evasion%20Tactics&amp;severity=high&amp;id=689c54b7ad5a09ad003fe963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leak-28m-sensitive-records-from-allianz-li-873f0e0b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20leak%202.8M%20sensitive%20records%20from%20Allianz%20Life%20in%20Salesforce%20data%20breach&amp;severity=high&amp;id=689c54b7ad5a09ad003fe96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55345-cwe-61-unix-symbolic-link-symlink-f-e970b996</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55345%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following&amp;severity=high&amp;id=689c5514ad5a09ad003fea5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6184-cwe-89-improper-neutralization-of-sp-569bdd32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6184%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20Pro&amp;severity=high&amp;id=689c3519ad5a09ad003f21b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8761-denial-of-service-in-instar-2k-dc79acd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8761%3A%20Denial%20of%20Service%20in%20INSTAR%202K%2B&amp;severity=high&amp;id=689c3192ad5a09ad003f0635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8762-improper-physical-access-control-in--c5ce7100</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8762%3A%20Improper%20Physical%20Access%20Control%20in%20INSTAR%202K%2B&amp;severity=high&amp;id=689c3192ad5a09ad003f063a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8760-buffer-overflow-in-instar-2k-137e2265</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8760%3A%20Buffer%20Overflow%20in%20INSTAR%202K%2B&amp;severity=critical&amp;id=689c3192ad5a09ad003f0630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6715-cwe-22-improper-limitation-of-a-path-a43f5424</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6715%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LatePoint&amp;severity=critical&amp;id=689c2acaad5a09ad003ec5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7384-cwe-502-deserialization-of-untrusted-b1821a6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7384%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=critical&amp;id=689c18f7ad5a09ad003e6af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0818-cwe-22-improper-limitation-of-a-path-dcfb5cc6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0818%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ninjateam%20File%20Manager%20Pro%20%E2%80%93%20Filester&amp;severity=medium&amp;id=689c0e6dad5a09ad003e38d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8491-cwe-352-cross-site-request-forgery-c-0c62a6e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8491%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nikelschubert%20Easy%20restaurant%20menu%20manager&amp;severity=medium&amp;id=689c0e6dad5a09ad003e38da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8882-use-after-free-in-google-chrome-dedaeb3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8882%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=689c03dead5a09ad003dddd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8881-inappropriate-implementation-in-goog-b8782bf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8881%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=689c03dead5a09ad003dddcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8901-out-of-bounds-write-in-google-chrome-de3ead85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8901%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=689c03dead5a09ad003dddd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8880-race-in-google-chrome-b95d6f52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8880%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=689c03dead5a09ad003dddc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8879-heap-buffer-overflow-in-google-chrom-7c4954b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8879%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=689c03dead5a09ad003dddc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4410-cwe-20-improper-input-validation-in--03f709d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4410%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=689bf952ad5a09ad003d402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4277-cwe-20-improper-input-validation-in--604f54ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4277%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=689bf24aad5a09ad003c84d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4276-cwe-20-improper-input-validation-in--97d8271f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4276%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=689bf24aad5a09ad003c84cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50610-na-17877a74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50610%3A%20n%2Fa&amp;severity=high&amp;id=689d2ef7ad5a09ad00555d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50609-na-287e820b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50609%3A%20n%2Fa&amp;severity=high&amp;id=689d2ef7ad5a09ad00555d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50608-na-1f46f03f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50608%3A%20n%2Fa&amp;severity=high&amp;id=689d2ef7ad5a09ad00555d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-13-1bb98a65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-13&amp;severity=medium&amp;id=689d2b1ead5a09ad00551b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43988-na-708ed391</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43988%3A%20n%2Fa&amp;severity=high&amp;id=689cef6aad5a09ad00522678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43986-na-77e26f1f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43986%3A%20n%2Fa&amp;severity=critical&amp;id=689cebe6ad5a09ad0051ed0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43982-na-e21d7b77</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43982%3A%20n%2Fa&amp;severity=critical&amp;id=689ce862ad5a09ad0051cfa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43989-na-a1e5dfd3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43989%3A%20n%2Fa&amp;severity=medium&amp;id=689ce4dead5a09ad0051c01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45313-na-0eb6c1db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45313%3A%20n%2Fa&amp;severity=medium&amp;id=689cda51ad5a09ad00516017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45316-na-574f4fcc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45316%3A%20n%2Fa&amp;severity=medium&amp;id=689cd6f1ad5a09ad0051016e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45314-na-0451a8dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45314%3A%20n%2Fa&amp;severity=medium&amp;id=689cd6f1ad5a09ad00510169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45317-na-18d2ef3d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45317%3A%20n%2Fa&amp;severity=medium&amp;id=689ccfdaad5a09ad004fb507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45315-na-0c6772f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45315%3A%20n%2Fa&amp;severity=medium&amp;id=689ccfdaad5a09ad004fb501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50617-na-467a4174</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50617%3A%20n%2Fa&amp;severity=high&amp;id=689ccc41ad5a09ad004f80ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50946-na-59d4bd8d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50946%3A%20n%2Fa&amp;severity=medium&amp;id=689cc8bead5a09ad004f5c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50616-na-efbf36c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50616%3A%20n%2Fa&amp;severity=high&amp;id=689cc8bead5a09ad004f5c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50615-na-b165a170</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50615%3A%20n%2Fa&amp;severity=high&amp;id=689cc8bead5a09ad004f5c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52385-na-505f70db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52385%3A%20n%2Fa&amp;severity=critical&amp;id=689cc539ad5a09ad004e1a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50594-na-e8ae90fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50594%3A%20n%2Fa&amp;severity=critical&amp;id=689cc1b5ad5a09ad004d447e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51451-na-e82f6822</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51451%3A%20n%2Fa&amp;severity=critical&amp;id=689cbe31ad5a09ad004cf66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50614-na-e43e1a0d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50614%3A%20n%2Fa&amp;severity=high&amp;id=689cb72aad5a09ad0046ad6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50613-na-6cfae73b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50613%3A%20n%2Fa&amp;severity=high&amp;id=689cb3abad5a09ad00459e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50612-na-28510861</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50612%3A%20n%2Fa&amp;severity=high&amp;id=689cb3abad5a09ad00459e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51452-na-2b3b87e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51452%3A%20n%2Fa&amp;severity=critical&amp;id=689cb024ad5a09ad00455e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50611-na-a51676bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50611%3A%20n%2Fa&amp;severity=high&amp;id=689cb024ad5a09ad00455e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50635-na-d1bde01c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50635%3A%20n%2Fa&amp;severity=high&amp;id=689caca5ad5a09ad00451eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50251-na-547923c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50251%3A%20n%2Fa&amp;severity=critical&amp;id=689caca5ad5a09ad00451eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50690-na-8436775b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50690%3A%20n%2Fa&amp;severity=medium&amp;id=689ca59aad5a09ad00442efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51691-na-26419e32</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51691%3A%20n%2Fa&amp;severity=medium&amp;id=689ca21ead5a09ad00426558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52392-na-a10a8c9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52392%3A%20n%2Fa&amp;severity=medium&amp;id=689c9edbad5a09ad00424b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52386-na-9c727a0b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52386%3A%20n%2Fa&amp;severity=medium&amp;id=689c9edbad5a09ad00424b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-tuesday-microsoft-fixes-107-vulnerabilities--98c421f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%20Tuesday%3A%20Microsoft%20Fixes%20107%20Vulnerabilities%2C%20Including%2013%20Critical%20RCE%20Flaws&amp;severity=critical&amp;id=689bc817ad5a09ad00374935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49457-cwe-426-untrusted-search-path-in-zo-05f9882e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49457%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Zoom%20Communications%20Inc%20Zoom%20Clients%20for%20Windows&amp;severity=critical&amp;id=689bc82dad5a09ad00374a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49456-cwe-426-untrusted-search-path-in-zo-21cc3ed4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49456%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Zoom%20Communications%20Inc%20Zoom%20Clients%20for%20Windows&amp;severity=medium&amp;id=689bc82dad5a09ad00374a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54238-out-of-bounds-read-cwe-125-in-adobe-36da3cce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54238%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=689bc496ad5a09ad003740f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54233-out-of-bounds-read-cwe-125-in-adobe-3707c52f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54233%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=689bc112ad5a09ad00373603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54230-use-after-free-cwe-416-in-adobe-ado-652b1910</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54230%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=689bc112ad5a09ad003735fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54232-use-after-free-cwe-416-in-adobe-ado-674b6da0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54232%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=689bc112ad5a09ad00373600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54231-use-after-free-cwe-416-in-adobe-ado-03681cde</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54231%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=689bc112ad5a09ad003735fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54229-use-after-free-cwe-416-in-adobe-ado-927c7838</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54229%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=689bc112ad5a09ad003735f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54222-out-of-bounds-write-cwe-787-in-adob-3e5c2579</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54222%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=689bdd96ad5a09ad0039b2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malvertising-campaign-leads-to-ps1bot-a-multi-stag-1a526a17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malvertising%20campaign%20leads%20to%20PS1Bot%2C%20a%20multi-stage%20malware%20framework&amp;severity=medium&amp;id=689c69d2ad5a09ad00406958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/challenge-for-human-and-ai-reverse-engineers-15275ccb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Challenge%20for%20human%20and%20AI%20reverse%20engineers&amp;severity=medium&amp;id=689baf83ad5a09ad0036d786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54216-out-of-bounds-write-cwe-787-in-adob-58ec4e57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54216%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b2fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54217-heap-based-buffer-overflow-cwe-122--20a4a1de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54217%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54215-out-of-bounds-write-cwe-787-in-adob-a09384e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54215%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54218-out-of-bounds-write-cwe-787-in-adob-71763fee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54218%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54223-use-after-free-cwe-416-in-adobe-inc-b2fa7143</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54223%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54219-heap-based-buffer-overflow-cwe-122--316ac7d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54219%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54221-out-of-bounds-write-cwe-787-in-adob-411a6256</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54221%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54220-heap-based-buffer-overflow-cwe-122--8a17371e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54220%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54211-heap-based-buffer-overflow-cwe-122--b7197007</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54211%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54207-access-of-uninitialized-pointer-cwe-ad52ea06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54207%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54214-out-of-bounds-read-cwe-125-in-adobe-1d750332</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54214%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=689bac14ad5a09ad0036c6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54224-use-after-free-cwe-416-in-adobe-ind-3f6ffa69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54224%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54213-out-of-bounds-write-cwe-787-in-adob-e84a9fab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54213%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54210-out-of-bounds-write-cwe-787-in-adob-5466e406</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54210%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54225-use-after-free-cwe-416-in-adobe-ind-83277aeb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54225%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54209-heap-based-buffer-overflow-cwe-122--f9477503</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54209%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54208-out-of-bounds-write-cwe-787-in-adob-c4bc0e64</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54208%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54227-out-of-bounds-read-cwe-125-in-adobe-30f27a2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54227%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=689bac14ad5a09ad0036c6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54228-out-of-bounds-read-cwe-125-in-adobe-9fb5b60f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54228%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=689bac14ad5a09ad0036c6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54226-use-after-free-cwe-416-in-adobe-ind-3f6792d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54226%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54212-heap-based-buffer-overflow-cwe-122--631ea780</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54212%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54206-out-of-bounds-write-cwe-787-in-adob-a5f184b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54206%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55165-cwe-200-exposure-of-sensitive-infor-221e1d26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55165%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gelbphoenix%20autocaliweb&amp;severity=high&amp;id=689bac14ad5a09ad0036c6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54205-out-of-bounds-read-cwe-125-in-adobe-a6124ee6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54205%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54188-out-of-bounds-read-cwe-125-in-adobe-8d1e009c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54188%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54193-out-of-bounds-read-cwe-125-in-adobe-89b5557e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54193%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54194-out-of-bounds-read-cwe-125-in-adobe-b1f373c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54194%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54187-out-of-bounds-write-cwe-787-in-adob-b3e94e4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54187%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=689bac15ad5a09ad0036c6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54190-out-of-bounds-read-cwe-125-in-adobe-41dce1ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54190%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54191-out-of-bounds-read-cwe-125-in-adobe-1a46c98c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54191%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54195-out-of-bounds-read-cwe-125-in-adobe-d0d0d1b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54195%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54189-out-of-bounds-read-cwe-125-in-adobe-e5d16c52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54189%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54192-out-of-bounds-read-cwe-125-in-adobe-5f4e6fb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54192%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49573-out-of-bounds-write-cwe-787-in-adob-dcbe94b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49573%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=689ba87aad5a09ad00367c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49572-out-of-bounds-write-cwe-787-in-adob-78dc13cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49572%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=689ba87aad5a09ad00367c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54197-out-of-bounds-read-cwe-125-in-adobe-20bdff6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54197%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54186-out-of-bounds-read-cwe-125-in-adobe-eb0f173a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54186%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54235-out-of-bounds-read-cwe-125-in-adobe-41b7c906</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54235%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87bad5a09ad00367c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54203-out-of-bounds-read-cwe-125-in-adobe-8983661a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54203%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87bad5a09ad00367c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54200-out-of-bounds-read-cwe-125-in-adobe-546b0b32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54200%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54204-out-of-bounds-read-cwe-125-in-adobe-4d2f653d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54204%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87bad5a09ad00367c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49571-uncontrolled-search-path-element-cw-a9aba36c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49571%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=689ba87aad5a09ad00367c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54202-out-of-bounds-read-cwe-125-in-adobe-11de5548</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54202%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54199-out-of-bounds-read-cwe-125-in-adobe-23e848bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54199%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54201-out-of-bounds-read-cwe-125-in-adobe-106d1aab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54201%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54198-out-of-bounds-read-cwe-125-in-adobe-39fb3ae1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54198%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49570-out-of-bounds-write-cwe-787-in-adob-df627192</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49570%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=689ba87bad5a09ad00367c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49562-use-after-free-cwe-416-in-adobe-ani-a5e5d097</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49562%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=689ba87bad5a09ad00367c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49561-use-after-free-cwe-416-in-adobe-ani-b2d1660e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49561%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Animate&amp;severity=high&amp;id=689ba87bad5a09ad00367c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55171-cwe-287-improper-authentication-in--dff5552c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55171%3A%20CWE-287%3A%20Improper%20Authentication%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=689ba4f3ad5a09ad0036643d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55170-cwe-79-improper-neutralization-of-i-31a627a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55170%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=689ba4f3ad5a09ad00366438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49569-out-of-bounds-write-cwe-787-in-adob-7b5e1be9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49569%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=689ba16fad5a09ad0036580a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49560-heap-based-buffer-overflow-cwe-122--32b60b11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49560%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=689ba16fad5a09ad00365807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36000-cwe-79-improper-neutralization-of-i-2affcc32</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=689b9a79ad5a09ad00360d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-govt-seizes-1-million-in-crypto-from-blacksuit--002f60c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20govt%20seizes%20%241%20million%20in%20crypto%20from%20BlackSuit%20ransomware%20gang&amp;severity=high&amp;id=689b9a67ad5a09ad00360ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connex-credit-union-data-breach-affects-172000-mem-a8ea725c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Connex%20Credit%20Union%20Data%20Breach%20Affects%20172%2C000%20Members&amp;severity=high&amp;id=689b96dfad5a09ad0035f8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55169-cwe-287-improper-authentication-in--273fe010</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55169%3A%20CWE-287%3A%20Improper%20Authentication%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=689b935ead5a09ad0035dc82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47857-execute-unauthorized-code-or-comman-50c9db25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47857%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32932-execute-unauthorized-code-or-comman-4a26cce5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32932%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSOAR&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27759-escalation-of-privilege-in-fortinet-55048f34</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27759%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26009-execute-unauthorized-code-or-comman-267a9481</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26009%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25248-denial-of-service-in-fortinet-forti-53242cf7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25248%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52970-improper-access-control-in-fortinet-fdbbb4b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52970%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=high&amp;id=689b8fe3ad5a09ad0035cd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53744-escalation-of-privilege-in-fortinet-0e621602</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53744%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49813-execute-unauthorized-code-or-comman-44c621ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49813%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32766-execute-unauthorized-code-or-comman-2b2c56c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32766%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25256-escalation-of-privilege-in-fortinet-e4ebd72a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25256%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSIEM&amp;severity=critical&amp;id=689b8fe3ad5a09ad0035cd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40588-improper-access-control-in-fortinet-69bb0791</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40588%3A%20Improper%20access%20control%20in%20Fortinet%20FortiCamera&amp;severity=medium&amp;id=68f0c1e29f8a5dbaeac5cdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55168-cwe-89-improper-neutralization-of-s-39e8fadf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55168%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=689b8fe3ad5a09ad0035cd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/click-to-allow-robot-exposes-online-fraud-empire-c99a78be</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Click%20to%20Allow%22%20Robot%20Exposes%20Online%20Fraud%20Empire&amp;severity=medium&amp;id=689b96f2ad5a09ad0035fe9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43734-cwe-79-improper-neutralization-of-i-bc5c7fd6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43734%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cdb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36124-cwe-268-privilege-chaining-in-ibm-w-bdbe1ff1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36124%3A%20CWE-268%20Privilege%20Chaining%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49556-incorrect-authorization-cwe-863-in--33cb4ce1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49556%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=689b81cbad5a09ad0035539f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49557-cross-site-scripting-stored-xss-cwe-25f8182c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49557%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=689b81cbad5a09ad003553a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49558-time-of-check-time-of-use-toctou-ra-e10c7d90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49558%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20(CWE-367)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=689b81cbad5a09ad003553a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49554-improper-input-validation-cwe-20-in-83c46798</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49554%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=689b81cbad5a09ad00355399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49559-improper-limitation-of-a-pathname-t-a412ecc7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49559%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=689b81cbad5a09ad003553a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49555-cross-site-request-forgery-csrf-cwe-a68584b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49555%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20(CWE-352)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=689b81cbad5a09ad0035539c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20044-escalation-of-privilege-in-intelr-t-8c503590</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20044%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20TDX%20Module%20firmware&amp;severity=medium&amp;id=689b7e46ad5a09ad00354154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49736-cwe-449-the-ui-performs-the-wrong-a-b5bdaf06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49736%3A%20CWE-449%3A%20The%20UI%20Performs%20the%20Wrong%20Action%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=689b7749ad5a09ad003490fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49712-cwe-502-deserialization-of-untruste-78cb958e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49712%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=689b7749ad5a09ad003490fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49707-cwe-284-improper-access-control-in--2108c71c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49707%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20DCadsv5-series%20Azure%20VM&amp;severity=high&amp;id=689b7749ad5a09ad003490f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49755-cwe-451-user-interface-ui-misrepres-e7cb7c32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49755%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=689b774aad5a09ad00349113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48807-cwe-923-improper-restriction-of-com-c1c3a913</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48807%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=689b7749ad5a09ad003490f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53793-cwe-287-improper-authentication-in--4914ec3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53793%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Azure%20Stack%20Hub%202406&amp;severity=high&amp;id=689b774fad5a09ad003492a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53789-cwe-306-missing-authentication-for--7a96917a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53789%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774fad5a09ad003492a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53788-cwe-367-time-of-check-time-of-use-t-8ea76a97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53788%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%20Subsystem%20for%20Linux%20(WSL2)&amp;severity=high&amp;id=689b774fad5a09ad0034929d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53784-cwe-416-use-after-free-in-microsoft-f9b29849</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53784%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774fad5a09ad0034929a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53783-cwe-122-heap-based-buffer-overflow--7cf9177e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53783%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Teams%20for%20Android&amp;severity=high&amp;id=689b774fad5a09ad00349297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53779-cwe-23-relative-path-traversal-in-m-d40c443a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53779%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Windows%20Server%202025&amp;severity=high&amp;id=689b774ead5a09ad00349287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53778-cwe-287-improper-authentication-in--cf4cee80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53778%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774ead5a09ad00349284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50155-cwe-843-access-of-resource-using-in-602f4127</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50155%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad00349135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50157-cwe-908-use-of-uninitialized-resour-40affe9a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50157%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774aad5a09ad0034913b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53769-cwe-73-external-control-of-file-nam-189e07ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53769%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%20Security%20App&amp;severity=medium&amp;id=689b774ead5a09ad0034927b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53766-cwe-122-heap-based-buffer-overflow--2403cc3a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53766%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=critical&amp;id=689b774ead5a09ad00349278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53765-cwe-359-exposure-of-private-persona-aff58104</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53765%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Stack%20Hub&amp;severity=medium&amp;id=689b774ead5a09ad00349275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53740-cwe-416-use-after-free-in-microsoft-09cf7b85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53740%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad0034925c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53739-cwe-843-access-of-resource-using-in-813f2211</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53739%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad00349259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53738-cwe-416-use-after-free-in-microsoft-12d7ba63</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53738%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad00349256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53737-cwe-122-heap-based-buffer-overflow--f90cbedc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53737%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad00349253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53736-cwe-126-buffer-over-read-in-microso-37b341bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53736%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=689b774ead5a09ad00349250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53735-cwe-416-use-after-free-in-microsoft-58543784</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53735%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad0034924d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53734-cwe-416-use-after-free-in-microsoft-c3139b6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53734%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad0034924a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53733-cwe-681-incorrect-conversion-betwee-40b2394f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53733%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad00349247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53732-cwe-122-heap-based-buffer-overflow--951dcfee</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53732%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=689b774ead5a09ad00349244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53731-cwe-416-use-after-free-in-microsoft-5f07bba3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53731%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774dad5a09ad00349221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47954-cwe-89-improper-neutralization-of-s-370ef31c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47954%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20(CU%2020)&amp;severity=high&amp;id=689b7749ad5a09ad003490f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53728-cwe-200-exposure-of-sensitive-infor-7cf7c819</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53728%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=medium&amp;id=689b774dad5a09ad00349218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53726-cwe-843-access-of-resource-using-in-41ce18ea</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53726%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774dad5a09ad00349212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53725-cwe-843-access-of-resource-using-in-3c9cb624</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53725%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774dad5a09ad0034920f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53724-cwe-843-access-of-resource-using-in-5032c757</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53724%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774dad5a09ad0034920c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53723-cwe-197-numeric-truncation-error-in-249d85a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53723%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774dad5a09ad00349209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53722-cwe-400-uncontrolled-resource-consu-e0301c36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53722%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774dad5a09ad00349206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53721-cwe-416-use-after-free-in-microsoft-f25122a3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53721%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=689b774cad5a09ad003491f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53720-cwe-122-heap-based-buffer-overflow--8e900ff1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53720%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774cad5a09ad003491f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53719-cwe-908-use-of-uninitialized-resour-c46f1bcb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53719%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774cad5a09ad003491f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53718-cwe-416-use-after-free-in-microsoft-9745be7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53718%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53716-cwe-476-null-pointer-dereference-in-08328e51</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53716%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=689b774cad5a09ad003491ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53156-cwe-200-exposure-of-sensitive-infor-f0b026c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53156%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=689b774cad5a09ad003491ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53155-cwe-122-heap-based-buffer-overflow--36f51fdc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53155%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53154-cwe-476-null-pointer-dereference-in-17e969a2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53154%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53153-cwe-908-use-of-uninitialized-resour-5b1e072d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53153%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774cad5a09ad003491e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53152-cwe-416-use-after-free-in-microsoft-34654ac9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53152%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53151-cwe-416-use-after-free-in-microsoft-8640c5b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53151%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=689b774cad5a09ad003491d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53149-cwe-122-heap-based-buffer-overflow--2a9ed5ef</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53149%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53148-cwe-908-use-of-uninitialized-resour-a7afba70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53148%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774cad5a09ad003491cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53147-cwe-416-use-after-free-in-microsoft-d2e2921d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53147%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53145-cwe-843-access-of-resource-using-in-5d2d6947</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53145%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53144-cwe-843-access-of-resource-using-in-afcd81b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53144%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53143-cwe-843-access-of-resource-using-in-cae240b2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53143%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53142-cwe-416-use-after-free-in-microsoft-27c83330</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53142%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=689b774cad5a09ad003491bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53141-cwe-476-null-pointer-dereference-in-ab4a40dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53141%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53140-cwe-416-use-after-free-in-microsoft-0b6032ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53140%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53138-cwe-908-use-of-uninitialized-resour-92bc176f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53138%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774bad5a09ad003491a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53137-cwe-416-use-after-free-in-microsoft-bee66659</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53137%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad003491a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53136-cwe-200-exposure-of-sensitive-infor-8c2aee8e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53136%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=689b774bad5a09ad003491a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53135-cwe-362-concurrent-execution-using--66b63ee5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53135%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad003491a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53134-cwe-367-time-of-check-time-of-use-t-8dd03f57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53134%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad0034919d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53133-cwe-416-use-after-free-in-microsoft-61e6174a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53133%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=689b774bad5a09ad0034919a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53132-cwe-362-concurrent-execution-using--9e108f85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53132%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad00349197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53131-cwe-122-heap-based-buffer-overflow--7507adf3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53131%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=689b774bad5a09ad00349194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50177-cwe-416-use-after-free-in-microsoft-375ce91d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50177%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad00349191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50176-cwe-843-access-of-resource-using-in-2c05facb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50176%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=689b774bad5a09ad0034918e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50173-cwe-1390-weak-authentication-in-mic-e14c97d0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50173%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Multimedia%20Redirection%20Installer&amp;severity=high&amp;id=689b774bad5a09ad00349181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50172-cwe-770-allocation-of-resources-wit-82cd671b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50172%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=689b774bad5a09ad0034917e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50171-cwe-862-missing-authorization-in-mi-52cb06a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50171%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=critical&amp;id=689b774bad5a09ad0034917b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50170-cwe-280-improper-handling-of-insuff-4edbdc99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50170%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=689b774bad5a09ad00349178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50169-cwe-362-concurrent-execution-using--d2d77814</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50169%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=689b774bad5a09ad00349175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50168-cwe-843-access-of-resource-using-in-4127baf0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50168%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=689b774bad5a09ad00349172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50167-cwe-362-concurrent-execution-using--170ca208</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50167%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad0034916f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50166-cwe-190-integer-overflow-or-wraparo-32adb440</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50166%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=689b774bad5a09ad0034916c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50165-cwe-822-untrusted-pointer-dereferen-91ddcf3a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50165%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=critical&amp;id=689b774bad5a09ad00349169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50164-cwe-122-heap-based-buffer-overflow--d66dbf24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50164%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774bad5a09ad00349166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50163-cwe-122-heap-based-buffer-overflow--3b330a3b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50163%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774aad5a09ad0034914d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50162-cwe-122-heap-based-buffer-overflow--2af0d117</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50162%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774aad5a09ad0034914a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50161-cwe-122-heap-based-buffer-overflow--144f0370</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50161%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad00349147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50160-cwe-122-heap-based-buffer-overflow--b8e607d7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50160%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774aad5a09ad00349144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50159-cwe-416-use-after-free-in-microsoft-622a3002</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50159%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad00349141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50158-cwe-367-time-of-check-time-of-use-t-a2687bfd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50158%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad0034913e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50156-cwe-908-use-of-uninitialized-resour-214b14de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50156%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774aad5a09ad00349138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50154-cwe-200-exposure-of-sensitive-infor-ce2b4f73</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50154%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=689b774aad5a09ad00349132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50153-cwe-416-use-after-free-in-microsoft-77fbbca5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50153%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad00349125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49762-cwe-362-concurrent-execution-using--359e2da5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49762%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad00349122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49761-cwe-416-use-after-free-in-microsoft-24d29a97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49761%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad0034911f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49759-cwe-89-improper-neutralization-of-s-0e51b6aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49759%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=689b774aad5a09ad0034911c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49757-cwe-122-heap-based-buffer-overflow--ff162899</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49757%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774aad5a09ad00349116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49743-cwe-362-concurrent-execution-using--2a201a68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49743%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=689b774aad5a09ad0034910a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25007-cwe-1286-improper-validation-of-syn-5e355efb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25007%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=689b7749ad5a09ad003490eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25006-cwe-167-improper-handling-of-additi-ec4ab954</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25006%3A%20CWE-167%3A%20Improper%20Handling%20of%20Additional%20Special%20Element%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=689b7749ad5a09ad003490e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25005-cwe-20-improper-input-validation-in-6bca72dd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25005%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=689b7749ad5a09ad003490e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53781-cwe-200-exposure-of-sensitive-infor-8934641b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53781%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20DCadsv5-series%20Azure%20VM&amp;severity=high&amp;id=689b774fad5a09ad00349294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53773-cwe-77-improper-neutralization-of-s-57efa6b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53773%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=high&amp;id=689b774ead5a09ad00349281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53772-cwe-502-deserialization-of-untruste-80f7d624</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53772%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Web%20Deploy%204.0&amp;severity=high&amp;id=689b774ead5a09ad0034927e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24999-cwe-284-improper-access-control-in--60ea7e26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24999%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=689b7749ad5a09ad003490e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53761-cwe-416-use-after-free-in-microsoft-dd5a138d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53761%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad00349272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53760-cwe-918-server-side-request-forgery-82af4e48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53760%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=689b774ead5a09ad0034926f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53759-cwe-908-use-of-uninitialized-resour-e45b53c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53759%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad0034926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53741-cwe-122-heap-based-buffer-overflow--9d6f0f2b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53741%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad0034925f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53730-cwe-416-use-after-free-in-microsoft-7721a896</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53730%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774dad5a09ad0034921e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33051-cwe-200-exposure-of-sensitive-infor-19c597f0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33051%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=689b7749ad5a09ad003490ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53729-cwe-284-improper-access-control-in--5b72106e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53729%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20File%20Sync&amp;severity=high&amp;id=689b774dad5a09ad0034921b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53727-cwe-89-improper-neutralization-of-s-587c446a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53727%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=689b774dad5a09ad00349215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49758-cwe-269-improper-privilege-manageme-b99c718a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49758%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=689b774aad5a09ad00349119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49745-cwe-79-improper-neutralization-of-i-902734ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49745%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=medium&amp;id=689b774aad5a09ad0034910d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49751-cwe-820-missing-synchronization-in--1922540b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49751%3A%20CWE-820%3A%20Missing%20Synchronization%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=689b774aad5a09ad00349110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49563-out-of-bounds-write-cwe-787-in-adob-cf408496</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49563%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=689b7752ad5a09ad00349393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49568-use-after-free-cwe-416-in-adobe-ill-815ab5c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49568%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=689b7752ad5a09ad0034939c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49564-stack-based-buffer-overflow-cwe-121-2b8eed68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49564%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=689b7752ad5a09ad00349396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49567-null-pointer-dereference-cwe-476-in-ab8052f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49567%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=689b7752ad5a09ad00349399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32086-escalation-of-privilege-in-intelr-x-41773ddb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32086%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20Processors%20when%20using%20Intel(R)%20SGX%20or%20Intel(R)%20TDX&amp;severity=medium&amp;id=689b7752ad5a09ad00349390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32004-escalation-of-privilege-in-intelr-s-8efeb62a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32004%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20SGX%20SDK&amp;severity=low&amp;id=689b7752ad5a09ad0034938d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27717-escalation-of-privilege-in-intelr-g-afa86b36</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27717%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=689b7752ad5a09ad0034938a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27707-denial-of-service-in-edge-orchestra-7d0a6023</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27707%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software&amp;severity=low&amp;id=689b7752ad5a09ad00349387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27576-denial-of-service-in-edge-orchestra-fee20531</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27576%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software&amp;severity=low&amp;id=689b7752ad5a09ad00349384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27559-escalation-of-privilege-in-ai-playg-fb349eff</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27559%3A%20Escalation%20of%20Privilege%20in%20AI%20Playground%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27537-escalation-of-privilege-in-edge-orc-173e6708</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27537%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27250-denial-of-service-in-edge-orchestra-6aa04e60</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27250%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26863-denial-of-service-in-intelr-700-ser-f32e627b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26863%3A%20Denial%20of%20Service%20in%20Intel(R)%20700%20Series%20Ethernet&amp;severity=medium&amp;id=689b7751ad5a09ad0034936e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26697-denial-of-service-in-intelr-700-ser-f2ee625c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26697%3A%20Denial%20of%20Service%20in%20Intel(R)%20700%20Series%20Ethernet&amp;severity=medium&amp;id=689b7751ad5a09ad0034936b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26472-denial-of-service-in-edge-orchestra-c3337020</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26472%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26470-escalation-of-privilege-in-intelr-d-ad6e978f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26470%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Distribution%20for%20Python%20software%20installers&amp;severity=medium&amp;id=689b7751ad5a09ad00349365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26404-escalation-of-privilege-in-intelr-d-9be16e41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26404%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20DSA%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26403-escalation-of-privilege-in-intelr-x-eeec4403</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26403%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20processors%20when%20using%20Intel(R)%20SGX%20or%20Intel(R)%20TDX&amp;severity=medium&amp;id=689b7751ad5a09ad0034935f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25273-escalation-of-privilege-in-intelr-7-0ac5f6fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25273%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20700%20Series%20Ethernet&amp;severity=high&amp;id=689b7751ad5a09ad0034935c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24923-escalation-of-privilege-in-intelr-a-beeb36b6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24923%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20AI%20for%20Enterprise%20Retrieval-augmented%20Generation%20software&amp;severity=medium&amp;id=689b7751ad5a09ad0034934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24921-information-disclosure-in-edge-orch-1621c739</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24921%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software&amp;severity=medium&amp;id=689b7751ad5a09ad0034934c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24840-escalation-of-privilege-in-edge-orc-710f4849</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24840%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software&amp;severity=low&amp;id=689b7751ad5a09ad00349349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24835-denial-of-service-in-intelr-arctm-b-c3d895f3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24835%3A%20Denial%20of%20Service%20in%20Intel(R)%20Arc(TM)%20B-Series%20graphics&amp;severity=medium&amp;id=689b7751ad5a09ad00349346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24523-denial-of-service-in-edge-orchestra-70ff26d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24523%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24520-information-disclosure-in-intelr-lo-11521935</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24520%3A%20Information%20Disclosure%20in%20Intel(R)%20Local%20Manageability%20Service%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24515-denial-of-service-in-intelr-graphic-5888722a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24515%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers&amp;severity=medium&amp;id=689b7751ad5a09ad0034933d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24511-information-disclosure-in-intelr-i3-7b3e2d5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24511%3A%20Information%20Disclosure%20in%20Intel(R)%20I350%20Series%20Ethernet&amp;severity=low&amp;id=689b7751ad5a09ad0034933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24486-escalation-of-privilege-in-intelr-7-6041b0c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24486%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20700%20Series%20Ethernet&amp;severity=high&amp;id=689b7751ad5a09ad00349337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24484-escalation-of-privilege-in-intelr-8-90414427</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24484%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b7751ad5a09ad00349334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24325-escalation-of-privilege-in-intelr-8-25487632</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24325%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=critical&amp;id=689b7750ad5a09ad00349327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24324-escalation-of-privilege-in-intelr-8-ef7bcb3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24324%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=low&amp;id=689b7750ad5a09ad00349324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24323-escalation-of-privilege-in-firmware-88be8f9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24323%3A%20Escalation%20of%20Privilege%20in%20firmware%20package%20and%20LED%20mode%20toggle%20tool%20for%20some%20Intel(R)%20PCIe%20Switch%20software&amp;severity=high&amp;id=689b7750ad5a09ad00349321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24313-denial-of-service-in-device-plugins-1211fae4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24313%3A%20Denial%20of%20Service%20in%20Device%20Plugins%20for%20Kubernetes%20software%20maintained%20by%20Intel&amp;severity=medium&amp;id=689b7750ad5a09ad0034931e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24305-escalation-of-privilege-in-intelr-x-679d1c38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24305%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%20processors&amp;severity=high&amp;id=689b7750ad5a09ad0034931b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24303-escalation-of-privilege-in-intelr-8-915c2def</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24303%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b7750ad5a09ad00349318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24302-escalation-of-privilege-in-tinycbor-412e3efc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24302%3A%20Escalation%20of%20Privilege%20in%20TinyCBOR%20libraries%20maintained%20by%20Intel(R)&amp;severity=medium&amp;id=689b7750ad5a09ad00349315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24296-denial-of-service-in-firmware-for-t-acd4603c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24296%3A%20Denial%20of%20Service%20in%20firmware%20for%20the%20Intel(R)%20E810%20Ethernet&amp;severity=medium&amp;id=689b7750ad5a09ad00349312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23241-denial-of-service-in-intelr-800-ser-5616f39a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23241%3A%20Denial%20of%20Service%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b7750ad5a09ad0034930f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22893-escalation-of-privilege-in-intelr-8-d3a9be4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22893%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b7750ad5a09ad0034930c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22889-escalation-of-privilege-in-intelr-x-267d1af3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22889%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20processor%20with%20Intel(R)%20TDX&amp;severity=high&amp;id=689b7750ad5a09ad003492ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22853-escalation-of-privilege-in-intelr-t-03dee2dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22853%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20TDX&amp;severity=low&amp;id=689b7750ad5a09ad003492fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22840-escalation-of-privilege-in-intelr-x-37f66f66</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22840%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20Scalable%20processors&amp;severity=medium&amp;id=689b7750ad5a09ad003492f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22839-escalation-of-privilege-in-intelr-x-1443aa26</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22839%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20Scalable%20processors&amp;severity=high&amp;id=689b7750ad5a09ad003492f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22838-escalation-of-privilege-in-intelr-r-ab841533</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22838%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20RealSense(TM)%20Dynamic%20Calibrator%20software&amp;severity=medium&amp;id=689b7750ad5a09ad003492f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22836-escalation-of-privilege-in-intelr-8-3364522a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22836%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b7750ad5a09ad003492f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22392-information-disclosure-in-intelr-am-c8263dda</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22392%3A%20Information%20Disclosure%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=medium&amp;id=689b7750ad5a09ad003492ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21096-escalation-of-privilege-in-intelr-t-14bafb73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21096%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20TDX&amp;severity=low&amp;id=689b7750ad5a09ad003492ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21093-escalation-of-privilege-in-intelr-d-a6318827</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21093%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Driver%20%26amp%3B%20Support%20Assistant%20Tool%20software&amp;severity=medium&amp;id=689b7750ad5a09ad003492e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21090-denial-of-service-in-intelr-xeonr-p-93956443</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21090%3A%20Denial%20of%20Service%20in%20Intel(R)%20Xeon(R)%20processors&amp;severity=medium&amp;id=689b7750ad5a09ad003492e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21086-escalation-of-privilege-in-intelr-7-e0940821</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21086%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20700%20Series%20Ethernet&amp;severity=medium&amp;id=689b774fad5a09ad003492d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20627-escalation-of-privilege-in-intelr-o-1c00613a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20627%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20oneAPI%20DPC%2B%2B%2FC%2B%2B%20Compiler%20software&amp;severity=medium&amp;id=689b774fad5a09ad003492d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20625-denial-of-service-in-intelr-prosetw-d9229db3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20625%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=689b774fad5a09ad003492d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20613-information-disclosure-in-intelr-td-2330bd85</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20613%3A%20Information%20Disclosure%20in%20Intel(R)%20TDX&amp;severity=low&amp;id=689b774fad5a09ad003492ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20109-escalation-of-privilege-in-intelr-p-5008f710</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20109%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=689b774fad5a09ad003492cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20099-escalation-of-privilege-in-intelr-r-448cc363</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20099%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Rapid%20Storage%20Technology%20installation%20software&amp;severity=medium&amp;id=689b774fad5a09ad003492c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20093-escalation-of-privilege-in-intelr-8-1cf7e358</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20093%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b774fad5a09ad003492c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20092-escalation-of-privilege-in-clock-ji-c6229ab6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20092%3A%20Escalation%20of%20Privilege%20in%20Clock%20Jitter%20Tool%20software&amp;severity=medium&amp;id=689b774fad5a09ad003492c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20090-denial-of-service-in-intelr-quickas-b94a635b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20090%3A%20Denial%20of%20Service%20in%20Intel(R)%20QuickAssist%20Technology%20software&amp;severity=medium&amp;id=689b774fad5a09ad003492bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20087-escalation-of-privilege-in-intelr-o-4ee91dfe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20087%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20oneAPI%20DPC%2B%2B%2FC%2B%2B%20Compiler%20software%20installers&amp;severity=medium&amp;id=689b774fad5a09ad003492bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20077-denial-of-service-in-intelr-referen-b208c038</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20077%3A%20Denial%20of%20Service%20in%20Intel(R)%20reference%20server%20platforms&amp;severity=medium&amp;id=689b774fad5a09ad003492af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20074-escalation-of-privilege-in-intelr-c-8695d014</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20074%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Connectivity%20Performance%20Suite%20software%20installers&amp;severity=high&amp;id=689b774fad5a09ad003492ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20067-information-disclosure-in-intelr-cs-46ea09e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20067%3A%20Information%20Disclosure%20in%20Intel(R)%20CSME%20and%20Intel(R)%20SPS&amp;severity=medium&amp;id=689b774fad5a09ad003492a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20053-escalation-of-privilege-in-intelr-x-b96e81a6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20053%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%20Processor%20firmware%20with%20SGX%20enabled&amp;severity=high&amp;id=689b774fad5a09ad003492a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20048-escalation-of-privilege-in-intelr-t-4bba1b8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20048%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Trace%20Analyzer%20and%20Collector%20software&amp;severity=medium&amp;id=689b73baad5a09ad00347d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20037-escalation-of-privilege-in-intelr-c-28ecb85a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20037%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Converged%20Security%20and%20Management%20Engine&amp;severity=medium&amp;id=689b73baad5a09ad00347d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20025-denial-of-service-in-tinycbor-libra-04a577c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20025%3A%20Denial%20of%20Service%20in%20TinyCBOR%20libraries%20maintained%20by%20Intel(R)&amp;severity=medium&amp;id=689b73baad5a09ad00347d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20023-escalation-of-privilege-in-intelr-g-2c6efb6f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20023%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software%20installers&amp;severity=medium&amp;id=689b73baad5a09ad00347d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20017-escalation-of-privilege-in-intelr-o-c030c336</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20017%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20oneAPI%20Toolkit%20and%20component%20software%20installers&amp;severity=medium&amp;id=689b73baad5a09ad00347d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55167-cwe-89-improper-neutralization-of-s-c4de2c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55167%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=689b703bad5a09ad003460cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/home-office-phishing-scam-targets-uk-immigration-s-9afeea14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Home%20Office%20Phishing%20Scam%20Targets%20UK%20Immigration%20Sponsors&amp;severity=high&amp;id=689b6cbcad5a09ad00345195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/curly-comrades-cyberspies-hit-govt-orgs-with-custo-537a272f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Curly%20COMrades%20cyberspies%20hit%20govt%20orgs%20with%20custom%20malware&amp;severity=high&amp;id=689b6cbcad5a09ad00345191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55166-cwe-79-improper-neutralization-of-i-cb239560</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55166%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20darylldoyle%20svg-sanitizer&amp;severity=medium&amp;id=689b703bad5a09ad003460c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3089-cwe-639-authorization-bypass-through-03cfbfe0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3089%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=medium&amp;id=689b692fad5a09ad00343d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55164-cwe-1321-improperly-controlled-modi-e87b6ad7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55164%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20helmetjs%20content-security-policy-parser&amp;severity=high&amp;id=689b692fad5a09ad00343d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54864-cwe-306-missing-authentication-for--c25cbce5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54864%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20NixOS%20hydra&amp;severity=medium&amp;id=689b65aaad5a09ad003430a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54800-cwe-79-improper-neutralization-of-i-c6ab73b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54800%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NixOS%20hydra&amp;severity=high&amp;id=689b65aaad5a09ad003430a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-linked-curly-comrades-deploy-new-mucoragen-2c7de057</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian-Linked%20Curly%20COMrades%20Deploy%20New%20MucorAgent%20Malware%20in%20Europe&amp;severity=medium&amp;id=689b5eafad5a09ad0033f59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8452-cwe-538-insertion-of-sensitive-infor-0c4d8e72</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8452%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Brother%20Industries%2C%20Ltd%20DCP-L8410CDW&amp;severity=medium&amp;id=689b5eeead5a09ad0033f6b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5468-cwe-61-unix-symbolic-link-in-ivanti--b5865eca</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5468%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=689b5b1dad5a09ad0033e2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5466-cwe-776-improper-restriction-of-recu-423be894</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5466%3A%20CWE-776%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=689b5b1dad5a09ad0033e2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-threat-actor-targeting-geopolitical-hotbeds-8ca187d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20New%20Threat%20Actor%20Targeting%20Geopolitical%20Hotbeds&amp;severity=medium&amp;id=689b692cad5a09ad00343c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5462-cwe-122-heap-based-buffer-overflow-i-c30d386d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5462%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=689b5798ad5a09ad00337b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5456-cwe-125-out-of-bounds-read-in-ivanti-01d09e44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5456%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=689b5799ad5a09ad00337b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3831-cwe-200-exposure-of-sensitive-inform-33ab59d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3831%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor.%20in%20checkpoint%20Check%20Point%20Harmony%20SASE&amp;severity=high&amp;id=689b5799ad5a09ad00337b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8310-cwe-862-missing-authorization-in-iva-79fbceb4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8310%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Virtual%20Application%20Delivery%20ControllerCWE-862&amp;severity=medium&amp;id=689b5415ad5a09ad00335157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8297-cwe-434-unrestricted-upload-of-file--180ce9c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8297%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=689b5415ad5a09ad00335154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8296-cwe-89-improper-neutralization-of-sp-0b957505</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8296%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=689b5415ad5a09ad00335151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-directory-enumeration-adws-43ce7221</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Directory%20Enumeration%20%E2%80%93%20ADWS&amp;severity=medium&amp;id=689b5099ad5a09ad00333fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-group-leaks-43gb-of-data-in-c-c2d90671</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20Ransomware%20Group%20Leaks%2043GB%20of%20Data%20in%20City%20of%20St.%20Paul%20Cyberattack&amp;severity=medium&amp;id=689b4d0fad5a09ad00331cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22830-cwe-362-concurrent-execution-using--e7476505</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22830%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20AMI%20AptioV&amp;severity=high&amp;id=689b4d3dad5a09ad00331dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22834-cwe-665-improper-initialization-in--27850308</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22834%3A%20CWE-665%20Improper%20Initialization%20in%20AMI%20AptioV&amp;severity=medium&amp;id=689b4d3dad5a09ad00331dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43735-cwe-79-improper-neutralization-of-i-9d5a94f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=689b3470ad5a09ad003199cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ransomware-charon-uses-earth-baxia-apt-techniq-44827b6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Ransomware%20Charon%20Uses%20Earth%20Baxia%20APT%20Techniques%20to%20Target%20Enterprises&amp;severity=medium&amp;id=689b65a8ad5a09ad00343049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40770-cwe-300-channel-accessible-by-non-e-3c2f482b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40770%3A%20CWE-300%3A%20Channel%20Accessible%20by%20Non-Endpoint%20in%20Siemens%20SINEC%20Traffic%20Analyzer&amp;severity=high&amp;id=689b2662ad5a09ad0031330b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40769-cwe-1164-irrelevant-code-in-siemens-90527ae1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40769%3A%20CWE-1164%3A%20Irrelevant%20Code%20in%20Siemens%20SINEC%20Traffic%20Analyzer&amp;severity=high&amp;id=689b2662ad5a09ad00313308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40768-cwe-200-exposure-of-sensitive-infor-5cbeb192</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40768%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SINEC%20Traffic%20Analyzer&amp;severity=high&amp;id=689b2662ad5a09ad00313305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40767-cwe-250-execution-with-unnecessary--b7aa0552</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40767%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Siemens%20SINEC%20Traffic%20Analyzer&amp;severity=high&amp;id=689b2662ad5a09ad00313302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40766-cwe-400-uncontrolled-resource-consu-bd313c38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40766%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20SINEC%20Traffic%20Analyzer&amp;severity=medium&amp;id=689b2662ad5a09ad003132ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40764-cwe-125-out-of-bounds-read-in-sieme-c2dde0c9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40764%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap%20V2406&amp;severity=high&amp;id=689b2662ad5a09ad003132fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40762-cwe-787-out-of-bounds-write-in-siem-98c615d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40762%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Simcenter%20Femap%20V2406&amp;severity=high&amp;id=689b2662ad5a09ad003132f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40761-cwe-288-authentication-bypass-using-b31b280e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40761%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=689b2662ad5a09ad003132f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40759-cwe-502-deserialization-of-untruste-0d047b24</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40759%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Siemens%20SIMATIC%20S7-PLCSIM%20V17&amp;severity=high&amp;id=689b2662ad5a09ad003132f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40753-cwe-312-cleartext-storage-of-sensit-b2b2c3dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40753%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Siemens%20POWER%20METER%20SICAM%20Q100&amp;severity=medium&amp;id=689b2662ad5a09ad003132e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40752-cwe-312-cleartext-storage-of-sensit-c41ad7ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40752%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Siemens%20POWER%20METER%20SICAM%20Q100&amp;severity=medium&amp;id=689b2662ad5a09ad003132df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40751-cwe-522-insufficiently-protected-cr-cf80d889</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40751%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Siemens%20SIMATIC%20RTLS%20Locating%20Manager&amp;severity=medium&amp;id=689b2662ad5a09ad003132dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40746-cwe-20-improper-input-validation-in-bdaf72e9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40746%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20SIMATIC%20RTLS%20Locating%20Manager&amp;severity=critical&amp;id=689b2662ad5a09ad003132d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40743-cwe-288-authentication-bypass-using-c5ee2bc9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40743%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Siemens%20SINUMERIK%20828D%20PPU.4&amp;severity=high&amp;id=689b2662ad5a09ad003132d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40584-cwe-611-improper-restriction-of-xml-ff9736b6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40584%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Siemens%20SIMOTION%20SCOUT%20TIA%20V5.4&amp;severity=medium&amp;id=689b2662ad5a09ad003132d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40570-cwe-770-allocation-of-resources-wit-0eb1d36e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40570%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=low&amp;id=689b2661ad5a09ad003132d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33023-cwe-434-unrestricted-upload-of-file-41d3c90d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33023%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=medium&amp;id=689b2661ad5a09ad003132cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30034-cwe-617-reachable-assertion-in-siem-cc1f6562</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30034%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20Siemens%20SIMATIC%20RTLS%20Locating%20Manager&amp;severity=medium&amp;id=689b2661ad5a09ad003132ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30033-cwe-427-uncontrolled-search-path-el-25ca5171</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30033%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20Automation%20License%20Manager%20V6.0&amp;severity=high&amp;id=689b2661ad5a09ad003132c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54678-cwe-502-deserialization-of-untruste-5a611e25</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54678%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=68ee16327eab8b438c025da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43736-cwe-770-allocation-of-resources-wit-63175e87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43736%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Liferay%20Portal&amp;severity=medium&amp;id=689b22e1ad5a09ad003125a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-raid-dutch-lab-stealing-data-on-500000-pat-ccb39d12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Raid%20Dutch%20Lab%2C%20Stealing%20Data%20on%20500%2C000%20Patients&amp;severity=high&amp;id=689b1bd2ad5a09ad0030e4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-29000-unpatched-microsoft-exchange-servers-le-35bef72d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2029%2C000%20Unpatched%20Microsoft%20Exchange%20Servers%20Leaving%20Networks%20at%20Risk&amp;severity=medium&amp;id=689b1144ad5a09ad00309c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-oobe-breakout-revived-4f9f1706</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20OOBE%20Breakout%20Revived&amp;severity=medium&amp;id=689b0dc8ad5a09ad00305a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8885-cwe-770-allocation-of-resources-with-86a112e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8885%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC%20Java&amp;severity=medium&amp;id=689b0a3ead5a09ad00304844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26398-cwe-798-use-of-hard-coded-credentia-7d733148</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26398%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SolarWinds%20Database%20Performance%20Analyzer&amp;severity=medium&amp;id=689af8aaad5a09ad002f4ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41686-cwe-306-missing-authentication-for--89c7ec66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41686%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Phoenix%20Contact%20DaUM&amp;severity=high&amp;id=689af1a2ad5a09ad002f1695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8418-cwe-862-missing-authorization-in-bpl-be323e66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8418%3A%20CWE-862%20Missing%20Authorization%20in%20bplugins%20bSlider%20%E2%80%93%20Create%20Responsive%20Image%2C%20Post%2C%20Product%2C%20and%20Video%20Sliders&amp;severity=high&amp;id=689ae392ad5a09ad002e8174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8482-cwe-862-missing-authorization-in-10u-782ef81b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8482%3A%20CWE-862%20Missing%20Authorization%20in%2010up%20Simple%20Local%20Avatars&amp;severity=medium&amp;id=689ae392ad5a09ad002e8179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8874-cwe-79-improper-neutralization-of-in-622c9c23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20For%20Elementor%20%E2%80%93%20Widgets%2C%20Extensions%2C%20Theme%20Builder%2C%20Popup%20Builder%20%26%20Template%20Kits&amp;severity=medium&amp;id=689ae392ad5a09ad002e8186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8767-cwe-1236-improper-neutralization-of--88c8cd25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8767%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20anwppro%20AnWP%20Football%20Leagues&amp;severity=medium&amp;id=689ae392ad5a09ad002e817f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47444-cwe-201-insertion-of-sensitive-info-7b29e1c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47444%3A%20Missing%20Authorization%20in%20Damian%20G%C3%B3ra%20FiboSearch&amp;severity=null&amp;id=689ae392ad5a09ad002e8170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6253-cwe-862-missing-authorization-in-uic-9043b32c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6253%3A%20CWE-862%20Missing%20Authorization%20in%20uicore%20UiCore%20Elements%20%E2%80%93%20Free%20widgets%20and%20templates%20for%20Elementor&amp;severity=high&amp;id=689ad582ad5a09ad002df1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8081-cwe-22-improper-limitation-of-a-path-4b23b8a2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8081%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=689ad582ad5a09ad002df1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30027-cwe-1287-improper-validation-of-spe-e884b25a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30027%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=689ad1fead5a09ad002dcf02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3892-cwe-250-execution-with-unnecessary-p-35160318</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3892%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=689ad1fead5a09ad002dcf05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7622-cwe-918-server-side-request-forgery--616fb1ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7622%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=689ace7fad5a09ad002d1130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8314-cwe-79-improper-neutralization-of-in-eee19127</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Project%20Management%2C%20Bug%20and%20Issue%20Tracking%20Plugin%20%E2%80%93%20Software%20Issue%20Manager&amp;severity=medium&amp;id=689ac3eead5a09ad002cc45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8059-cwe-862-missing-authorization-in-bpl-cb384285</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8059%3A%20CWE-862%20Missing%20Authorization%20in%20bplugins%20bBlocks%20%E2%80%93%20Essential%20Gutenberg%20Blocks%20%26%20Patterns%20Collection&amp;severity=critical&amp;id=689ac3eead5a09ad002cc458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8568-cwe-79-improper-neutralization-of-in-03693c9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prabode%20GMap%20Generator&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be7ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8688-cwe-79-improper-neutralization-of-in-ff8b950a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8688%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ebernstein%20Inline%20Stock%20Quotes&amp;severity=medium&amp;id=689aa7d3ad5a09ad002be7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8621-cwe-80-improper-neutralization-of-sc-f9a7acd9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8621%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20odn%20Mosaic%20Generator&amp;severity=medium&amp;id=689aa7d3ad5a09ad002be7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8690-cwe-79-improper-neutralization-of-in-37f0a325</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20addix%20Simple%20Responsive%20Slider&amp;severity=medium&amp;id=689aa7d3ad5a09ad002be7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4390-cwe-200-exposure-of-sensitive-inform-1964ef92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4390%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nimeshrmr%20WP%20Private%20Content%20Plus&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8685-cwe-79-improper-neutralization-of-in-8a768325</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8685%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emilien%20Wp%20chart%20generator&amp;severity=medium&amp;id=689aa7d3ad5a09ad002be7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8462-cwe-79-improper-neutralization-of-in-a0d36f9e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20risetheme%20RT%20Easy%20Builder%20%E2%80%93%20Advanced%20addons%20for%20Elementor&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be7aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5391-cwe-22-improper-limitation-of-a-path-9df51c52</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5391%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bbioon%20Purchase%20Orders%20for%20WooCommerce&amp;severity=high&amp;id=689aa7d2ad5a09ad002be7a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42976-cwe-125-out-of-bounds-read-in-sapse-53e6749b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42976%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20(BIC%20Document)&amp;severity=high&amp;id=689aa7d2ad5a09ad002be79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42975-cwe-79-improper-neutralization-of-i-50d4a3ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42975%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20(BIC%20Document)&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42957-cwe-94-improper-control-of-generati-0196112f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42957%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20or%20On-Premise)&amp;severity=critical&amp;id=689aa7d2ad5a09ad002be794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42955-cwe-862-missing-authorization-in-sa-b8924a33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42955%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Cloud%20Connector&amp;severity=low&amp;id=689aa7d2ad5a09ad002be790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42951-cwe-863-incorrect-authorization-in--e58257bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42951%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SAP_SE%20SAP%20Business%20One%20(SLD)&amp;severity=high&amp;id=689aa7d2ad5a09ad002be78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42950-cwe-94-improper-control-of-generati-10481c7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42950%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Landscape%20Transformation%20(Analysis%20Platform)&amp;severity=critical&amp;id=689aa7d2ad5a09ad002be788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42949-cwe-862-missing-authorization-in-sa-67f98534</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42949%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20ABAP%20Platform&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42948-cwe-79-improper-neutralization-of-i-d99f9fd0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42948%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20ABAP%20Platform&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42946-cwe-22-improper-limitation-of-a-pat-18a9631f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42946%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Bank%20Communication%20Management)&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42945-cwe-94-improper-control-of-generati-2a67bdc8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42945%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42943-cwe-250-execution-with-unnecessary--483a3546</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42943%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20SAP_SE%20SAP%20GUI%20for%20Windows&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42942-cwe-79-improper-neutralization-of-i-aecdb9f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42942%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42941-cwe-1022-use-of-web-link-to-untrust-5099e7d8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42941%3A%20CWE-1022%3A%20Use%20of%20Web%20Link%20to%20Untrusted%20Target%20with%20window.opener%20Access%20in%20SAP_SE%20SAP%20Fiori%20(Launchpad)&amp;severity=low&amp;id=689aa7d2ad5a09ad002be762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42936-cwe-266-incorrect-privilege-assignm-bc14f965</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42936%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42935-cwe-532-insertion-of-sensitive-info-dfede04a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42935%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20for%20ABAP%20and%20ABAP%20Platform(Internet%20Communication%20Manager)&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42934-cwe-113-improper-neutralization-of--20c69ba4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42934%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Supplier%20invoice)&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-12-b5bafbaf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-12&amp;severity=medium&amp;id=689bd99dad5a09ad0037d987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55159-cwe-119-improper-restriction-of-ope-932d4c45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55159%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20tokio-rs%20slab&amp;severity=medium&amp;id=689a7a2ead5a09ad0029c879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55161-cwe-918-server-side-request-forgery-bf410a9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55161%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=689a6f8ead5a09ad002982d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55150-cwe-918-server-side-request-forgery-f834aa82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=689a6886ad5a09ad002967b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55151-cwe-918-server-side-request-forgery-40d843af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55151%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=689a6886ad5a09ad002967bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25235-cwe-918-server-side-request-forgery-ddd5e2e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25235%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Omnissa%20Secure%20Email%20Gateway&amp;severity=high&amp;id=689a6886ad5a09ad002967c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54992-cwe-611-improper-restriction-of-xml-3a5b9ece</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54992%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20telstra%20open-kilda&amp;severity=medium&amp;id=689a6502ad5a09ad00294e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55012-cwe-288-authentication-bypass-using-345a5947</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55012%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20zed-industries%20zed&amp;severity=high&amp;id=689a617ead5a09ad00291d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54878-cwe-122-heap-based-buffer-overflow--d65af7bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54878%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=689a573bad5a09ad0028f07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywaters-darkbit-ransomware-cracked-for-free-da-12af63d1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%E2%80%99s%20DarkBit%20ransomware%20cracked%20for%20free%20data%20recovery&amp;severity=high&amp;id=689a56f3ad5a09ad0028eecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spot-surge-in-erlangotp-ssh-rce-exploi-26b3cd74</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Spot%20Surge%20in%20Erlang%2FOTP%20SSH%20RCE%20Exploits%2C%2070%25%20Target%20OT%20Firewalls&amp;severity=high&amp;id=689a56f3ad5a09ad0028eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tetra-radio-encryption-flaws-expose-law-enforc-fc85a35d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TETRA%20Radio%20Encryption%20Flaws%20Expose%20Law%20Enforcement%20Communications&amp;severity=high&amp;id=689a56f3ad5a09ad0028eed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/details-emerge-on-winrar-zero-day-attacks-that-inf-5595aae9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Details%20emerge%20on%20WinRAR%20zero-day%20attacks%20that%20infected%20PCs%20with%20malware&amp;severity=critical&amp;id=689a536aad5a09ad0028c227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40920-cwe-340-generation-of-predictable-n-c77f0fed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40920%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20ETHER%20Catalyst%3A%3AAuthentication%3A%3ACredential%3A%3AHTTP&amp;severity=high&amp;id=689a5384ad5a09ad0028c285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/carmakers-portal-vulnerability-could-have-allowed--2e374b66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Carmaker%E2%80%99s%20Portal%20Vulnerability%20Could%20Have%20Allowed%20Hackers%20to%20Unlock%20Vehicles%20and%20Access%20Data&amp;severity=medium&amp;id=689a4fe7ad5a09ad002899c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8285-cwe-862-missing-authorization-in-mat-9afa58c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8285%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54525-cwe-1287-improper-validation-of-spe-e4c10c06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54525%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=689a41d9ad5a09ad00285b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54478-cwe-306-missing-authentication-for--d4652503</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54478%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=689a41d9ad5a09ad00285b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54463-cwe-754-improper-check-for-unusual--adb17086</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54463%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54458-cwe-862-missing-authorization-in-ma-4e8c3f02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54458%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53910-cwe-862-missing-authorization-in-ma-894aa51d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53910%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53857-cwe-862-missing-authorization-in-ma-89a8d3c9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53857%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=low&amp;id=689a41d9ad5a09ad00285b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53514-cwe-754-improper-check-for-unusual--813df849</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53514%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52931-cwe-754-improper-check-for-unusual--d80cedc7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52931%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=689a41d9ad5a09ad00285afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49221-cwe-862-missing-authorization-in-ma-2f497697</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49221%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=low&amp;id=689a41d9ad5a09ad00285af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48731-cwe-862-missing-authorization-in-ma-c6d84f65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48731%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44004-cwe-306-missing-authentication-for--5fdaca33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44004%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=689a41d9ad5a09ad00285af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44001-cwe-862-missing-authorization-in-ma-b48395c4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44001%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7679-cwe-306-missing-authentication-for-c-e9d1e9aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7679%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ABB%20Aspect&amp;severity=high&amp;id=689a3acfad5a09ad00283c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7677-cwe-306-missing-authentication-for-c-b56b1f2d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7677%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ABB%20Aspect&amp;severity=medium&amp;id=689a3acfad5a09ad00283c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53191-cwe-306-missing-authentication-for--07ccf3b9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53191&amp;severity=null&amp;id=689a3acfad5a09ad00283c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53190-cwe-286-in-abb-aspect-8c4a1e0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53190&amp;severity=null&amp;id=689a3acfad5a09ad00283c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53189-cwe-639-authorization-bypass-throug-92945590</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53189&amp;severity=null&amp;id=689a3acfad5a09ad00283c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53188-cwe-522-insufficiently-protected-cr-23d8c82b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53188&amp;severity=null&amp;id=689a3acfad5a09ad00283c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25229-vulnerability-in-omnissa-omnissa-wo-b8557300</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25229%3A%20Vulnerability%20in%20Omnissa%20Omnissa%20Workspace%20ONE%20UEM&amp;severity=medium&amp;id=689a3750ad5a09ad0028300f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25231-vulnerability-in-omnissa-omnissa-wo-f60fae89</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25231%3A%20Vulnerability%20in%20Omnissa%20Omnissa%20Workspace%20ONE%20UEM&amp;severity=high&amp;id=689a33c7ad5a09ad00281cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54063-cwe-94-improper-control-of-generati-856006a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54063%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CherryHQ%20cherry-studio&amp;severity=high&amp;id=689a3048ad5a09ad0027c678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53187-cwe-94-improper-control-of-generati-f36fca93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53187%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ABB%20ASPECT&amp;severity=critical&amp;id=689a3048ad5a09ad0027c67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-drone-strike-to-file-recovery-outsmarting-a-n-9bd60cb5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Drone%20Strike%20to%20File%20Recovery%3A%20Outsmarting%20a%20Nation%20State&amp;severity=medium&amp;id=689a2cc1ad5a09ad0027ad2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8866-cwe-200-exposure-of-sensitive-inform-c5921121</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8866%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20YugabyteDB%20Inc%20YugabyteDB%20Anywhere&amp;severity=medium&amp;id=689a1eafad5a09ad00272b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-clickfix-to-command-a-full-powershell-attack--b64ab077</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20ClickFix%20to%20Command%3A%20A%20Full%20PowerShell%20Attack%20Chain&amp;severity=medium&amp;id=689a109fad5a09ad0026aa51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8859-unrestricted-upload-in-code-projects-6e445cc3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8859%3A%20Unrestricted%20Upload%20in%20code-projects%20eBlog%20Site&amp;severity=medium&amp;id=689a028fad5a09ad002669bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chairmen-of-100-million-scam-operation-extradited--6deb97ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Chairmen&apos;%20of%20%24100%20million%20scam%20operation%20extradited%20to%20US&amp;severity=high&amp;id=6899ff09ad5a09ad00265344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8865-cwe-476-null-pointer-dereference-in--014c92cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8865%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20YugabyteDB%20Inc%20YugabyteDB&amp;severity=medium&amp;id=6899ff25ad5a09ad002653c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8852-information-exposure-through-error-m-a98b5121</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8852%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=6899fb8aad5a09ad002616f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8851-stack-based-buffer-overflow-in-libti-f9d0ce1d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8851%3A%20Stack-based%20Buffer%20Overflow%20in%20LibTIFF&amp;severity=medium&amp;id=6899f47fad5a09ad0025ec14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8864-cwe-532-insertion-of-sensitive-infor-ecac62a0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8864%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20YugabyteDB%20Inc%20YugabyteDB%20Anywhere&amp;severity=medium&amp;id=6899f47fad5a09ad0025ec1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leak-9gb-of-data-from-alleged-north-korean-32cd9b36</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Leak%209GB%20of%20Data%20from%20Alleged%20North%20Korean%20Hacker%E2%80%99s%20Computer&amp;severity=medium&amp;id=6899f0f9ad5a09ad0025d345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8863-cwe-319-cleartext-transmission-of-se-64669ac4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8863%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20YugabyteDB%20Inc%20YugabyteDB&amp;severity=high&amp;id=6899ed76ad5a09ad0025a09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8847-cross-site-scripting-in-yangzongzhua-79c93238</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8847%3A%20Cross%20Site%20Scripting%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=6899ed76ad5a09ad0025a098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8862-cwe-201-insertion-of-sensitive-infor-b57f036f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8862%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20YugabyteDB%20Inc%20YugabyteDB&amp;severity=high&amp;id=6899e9f3ad5a09ad00258682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8846-stack-based-buffer-overflow-in-nasm--154680aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8846%3A%20Stack-based%20Buffer%20Overflow%20in%20NASM%20Netwide%20Assember&amp;severity=medium&amp;id=6899e9f3ad5a09ad0025867b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-29000-exchange-servers-unpatched-against-high-c6bef72b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2029%2C000%20Exchange%20servers%20unpatched%20against%20high-severity%20flaw&amp;severity=high&amp;id=6899e2e8ad5a09ad00254b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8845-stack-based-buffer-overflow-in-nasm--6c06cbbd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8845%3A%20Stack-based%20Buffer%20Overflow%20in%20NASM%20Netwide%20Assember&amp;severity=medium&amp;id=6899df69ad5a09ad002528e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8844-null-pointer-dereference-in-nasm-net-09b8971b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8844%3A%20NULL%20Pointer%20Dereference%20in%20NASM%20Netwide%20Assember&amp;severity=medium&amp;id=6899d85cad5a09ad0025097b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-group-scarcruft-expands-from-spying-t-ecbce21d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Group%20ScarCruft%20Expands%20From%20Spying%20to%20Ransomware%20Attacks&amp;severity=medium&amp;id=6899d153ad5a09ad00249911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8843-heap-based-buffer-overflow-in-nasm-n-0a8c3f12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8843%3A%20Heap-based%20Buffer%20Overflow%20in%20NASM%20Netwide%20Assember&amp;severity=medium&amp;id=6899d166ad5a09ad0024996f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detail-windows-epm-poisoning-exploit-c-d8635e38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Detail%20Windows%20EPM%20Poisoning%20Exploit%20Chain%20Leading%20to%20Domain%20Privilege%20Escalation&amp;severity=high&amp;id=6899ca4aad5a09ad00247493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-win-ddos-flaws-let-attackers-turn-public-domai-04561c4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Win-DDoS%20Flaws%20Let%20Attackers%20Turn%20Public%20Domain%20Controllers%20into%20DDoS%20Botnet%20via%20RPC%2C%20LDAP&amp;severity=high&amp;id=6899ca4aad5a09ad0024749f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/winrar-zero-day-under-active-exploitation-update-t-ecd984ee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WinRAR%20Zero-Day%20Under%20Active%20Exploitation%20%E2%80%93%20Update%20to%20Latest%20Version%20Immediately&amp;severity=critical&amp;id=6899ca4aad5a09ad00247497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusalocker-ransomware-group-is-looking-for-pente-9612a8c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MedusaLocker%20ransomware%20group%20is%20looking%20for%20pentesters&amp;severity=medium&amp;id=6899ca4aad5a09ad002474a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connex-credit-union-data-breach-impacts-172000-mem-434bed78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Connex%20Credit%20Union%20data%20breach%20impacts%20172%2C000%20members&amp;severity=high&amp;id=6899ca4aad5a09ad0024749b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8842-use-after-free-in-nasm-netwide-assem-e4f63872</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8842%3A%20Use%20After%20Free%20in%20NASM%20Netwide%20Assember&amp;severity=medium&amp;id=6899cab0ad5a09ad0024763d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8841-unrestricted-upload-in-zlt2000-micro-af9cfd46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8841%3A%20Unrestricted%20Upload%20in%20zlt2000%20microservices-platform&amp;severity=medium&amp;id=6899c341ad5a09ad00243311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8840-improper-authorization-in-jsherp-aa26b26b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8840%3A%20Improper%20Authorization%20in%20jshERP&amp;severity=medium&amp;id=6899bc39ad5a09ad00240529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8853-cwe-290-authentication-bypass-by-spo-d668c1ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8853%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%202100%20Technology%20Official%20Document%20Management%20System&amp;severity=critical&amp;id=6899b531ad5a09ad00238e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8839-improper-authorization-in-jsherp-3e640cc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8839%3A%20Improper%20Authorization%20in%20jshERP&amp;severity=medium&amp;id=6899e9f3ad5a09ad00258685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8838-improper-authentication-in-winterche-ebfed894</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8838%3A%20Improper%20Authentication%20in%20WinterChenS%20my-site&amp;severity=medium&amp;id=6899ae29ad5a09ad0022b1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8837-use-after-free-in-jasper-2ef27b27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8837%3A%20Use%20After%20Free%20in%20JasPer&amp;severity=medium&amp;id=6899a721ad5a09ad00227d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8661-vulnerability-in-broadcom-symantec-p-31cfa509</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8661%3A%20Vulnerability%20in%20Broadcom%20Symantec%20PGP%20Encryption&amp;severity=medium&amp;id=6899a39dad5a09ad0022676c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8836-reachable-assertion-in-jasper-65388514</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8836%3A%20Reachable%20Assertion%20in%20JasPer&amp;severity=medium&amp;id=6899a019ad5a09ad0022583c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8747-cwe-502-deserialization-of-untrusted-6c22ad13</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8747%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Google%20Keras&amp;severity=high&amp;id=68999c95ad5a09ad00224b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8660-vulnerability-in-broadcom-symantec-p-9b32421b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8660%3A%20Vulnerability%20in%20Broadcom%20Symantec%20PGP%20Encryption&amp;severity=medium&amp;id=68999c95ad5a09ad00224b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8835-null-pointer-dereference-in-jasper-69a07b45</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8835%3A%20NULL%20Pointer%20Dereference%20in%20JasPer&amp;severity=medium&amp;id=68999911ad5a09ad00221cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8834-cross-site-scripting-in-jcg-link-net-accd3bb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8834%3A%20Cross%20Site%20Scripting%20in%20JCG%20Link-net%20LW-N915R&amp;severity=medium&amp;id=689a8bf2ad5a09ad002aa9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8833-stack-based-buffer-overflow-in-links-1bd91c00</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8833%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68998b02ad5a09ad0021531a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7965-cwe-352-cross-site-request-forgery-c-69a7e78b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7965%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CBX%20Restaurant%20Booking&amp;severity=medium&amp;id=6899878fad5a09ad0021344b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8832-stack-based-buffer-overflow-in-links-113b2e58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8832%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=689983f8ad5a09ad002105f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8831-stack-based-buffer-overflow-in-links-3d9466f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8831%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68997cf1ad5a09ad0020e3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8830-os-command-injection-in-linksys-re62-5670629e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8830%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=689a573bad5a09ad0028f082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8854-cwe-120-buffer-copy-without-checking-f92a7800</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8854%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20bulletphysics%20bullet3&amp;severity=high&amp;id=689a573bad5a09ad0028f08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8829-os-command-injection-in-linksys-re62-f1aa6bef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8829%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68996ee1ad5a09ad00208e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8828-os-command-injection-in-linksys-re62-ca4e2b2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8828%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68996b5dad5a09ad00207610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8827-os-command-injection-in-linksys-re62-a66bda33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8827%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=689960d1ad5a09ad002027f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8826-stack-based-buffer-overflow-in-links-259ef8e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8826%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=689959c9ad5a09ad001ff2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8825-os-command-injection-in-linksys-re62-906083eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8825%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=689959c9ad5a09ad001ff2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8824-stack-based-buffer-overflow-in-links-30273934</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8824%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68994bd2ad5a09ad001f678a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8823-os-command-injection-in-linksys-re62-dd32fd45</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8823%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68994bd2ad5a09ad001f6782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8822-stack-based-buffer-overflow-in-links-72b290ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8822%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68993da9ad5a09ad001d42b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8821-os-command-injection-in-linksys-re62-8e66c935</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8821%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68993da9ad5a09ad001d42a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-ise-30-remote-code-execution-rce-ca9bcedf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20ISE%203.0%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=689a95b8ad5a09ad002b09b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-ise-30-authorization-bypass-97d36db7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20ISE%203.0%20-%20Authorization%20Bypass&amp;severity=medium&amp;id=689a95b8ad5a09ad002b09ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/projectworlds-online-admission-system-10-sql-injec-994b4737</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=projectworlds%20Online%20Admission%20System%201.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=689a95b8ad5a09ad002b09a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-storage-qos-filter-driver-checke-afd9fa56</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%20-%20Storage%20QoS%20Filter%20Driver%20Checker&amp;severity=medium&amp;id=689a95b8ad5a09ad002b09a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atjiu-pybbs-600-cross-site-scripting-xss-e3f469e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=atjiu%20pybbs%206.0.0%20-%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=689a95b8ad5a09ad002b099e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrix-netscaler-adcgateway-141-memory-disclosure-328b4039</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Citrix%20NetScaler%20ADC%2FGateway%2014.1%20-%20Memory%20Disclosure&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grav-cms-1748-remote-code-execution-rce-4b23914b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grav%20CMS%201.7.48%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=689a95b8ad5a09ad002b098a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-edge-renderer-process-mojo-ipc-134069981-463302ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Edge%20Renderer%20Process%20(Mojo%20IPC)%20134.0.6998.177%20-%20Sandbox%20Escape&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tigo-energy-cloud-connect-advanced-cca-401-command-ee904677</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tigo%20Energy%20Cloud%20Connect%20Advanced%20(CCA)%204.0.1%20-%20Command%20Injection&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-sharepoint-server-2019-1601038320020-rem-c4a57493</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20SharePoint%20Server%202019%20(16.0.10383.20020)%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=689a95b8ad5a09ad002b097b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-vsphere-client-8030-reflected-cross-site-sc-3a07ba07</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20vSphere%20Client%208.0.3.0%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/belkin-f9k1009-f9k1010-2000420009-hard-coded-crede-b38d4748</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Belkin%20F9K1009%20F9K1010%202.00.04%2F2.00.09%20-%20Hard%20Coded%20Credentials&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghost-cms-5421-path-traversal-4b1a8ac2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ghost%20CMS%205.42.1%20-%20Path%20Traversal&amp;severity=medium&amp;id=689a95b8ad5a09ad002b096c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghost-cms-5591-arbitrary-file-read-b4deb80e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ghost%20CMS%205.59.1%20-%20Arbitrary%20File%20Read&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/servicenow-multiple-versions-input-validation-temp-3518d2a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ServiceNow%20Multiple%20Versions%20-%20Input%20Validation%20%26%20Template%20Injection&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jetbrains-teamcity-2023114-authentication-bypass-3afd83bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JetBrains%20TeamCity%202023.11.4%20-%20Authentication%20Bypass&amp;severity=medium&amp;id=689a95b8ad5a09ad002b095d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-11-972d4b1e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-11&amp;severity=medium&amp;id=689a881dad5a09ad002a6f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51824-na-78027238</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51824%3A%20n%2Fa&amp;severity=medium&amp;id=689a41d9ad5a09ad00285aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51823-na-39db1da1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51823%3A%20n%2Fa&amp;severity=medium&amp;id=689a41d9ad5a09ad00285ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45146-na-80d948ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45146%3A%20n%2Fa&amp;severity=critical&amp;id=689a1424ad5a09ad0026c84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8820-stack-based-buffer-overflow-in-links-0784f930</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8820%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68992f9aad5a09ad001c9049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8819-stack-based-buffer-overflow-in-links-f5a50f19</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8819%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68992892ad5a09ad001c74c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8818-os-command-injection-in-linksys-re62-26eb694a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8818%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=6899218aad5a09ad001c4a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8817-stack-based-buffer-overflow-in-links-61bbdc33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8817%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68993a6cad5a09ad001cf0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-tesla-websites-scams-4083c4b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Tesla%20Websites%20Scams&amp;severity=medium&amp;id=6899f47ead5a09ad0025ebeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8816-stack-based-buffer-overflow-in-links-b0b37d8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8816%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=6898c2a5ad5a09ad00199b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8815-path-traversal-in-i-morning-4df01872</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8815%3A%20Path%20Traversal%20in%20%E7%8C%AB%E5%AE%81i%20Morning&amp;severity=medium&amp;id=6898bf1bad5a09ad0019792b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8814-cross-site-request-forgery-in-atjiu--9d715d3f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8814%3A%20Cross-Site%20Request%20Forgery%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6898b814ad5a09ad001953d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8813-open-redirect-in-atjiu-pybbs-6c815128</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8813%3A%20Open%20Redirect%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6898b10bad5a09ad00191464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8812-cross-site-scripting-in-atjiu-pybbs-d66cde6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8812%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6898aa05ad5a09ad0018d126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8811-sql-injection-in-code-projects-simpl-6772ea90</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8811%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Art%20Gallery&amp;severity=medium&amp;id=6898a2fcad5a09ad0018a33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8810-stack-based-buffer-overflow-in-tenda-70b04837</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8810%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68989bfaad5a09ad0018937a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8809-sql-injection-in-code-projects-onlin-880f07cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8809%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=689894eead5a09ad001862d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8808-csv-injection-in-xujeff-tianti-b2a9cbc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8808%3A%20CSV%20Injection%20in%20xujeff%20tianti%20%E5%A4%A9%E6%A2%AF&amp;severity=medium&amp;id=68988de7ad5a09ad00183e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8807-missing-authorization-in-xujeff-tian-88985141</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8807%3A%20Missing%20Authorization%20in%20xujeff%20tianti%20%E5%A4%A9%E6%A2%AF&amp;severity=medium&amp;id=689886dfad5a09ad00181689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8806-sql-injection-in-zhilink-adp-applica-53dabe0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8806%3A%20SQL%20Injection%20in%20zhilink%20%E6%99%BA%E4%BA%92%E8%81%94(%E6%B7%B1%E5%9C%B3)%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20ADP%20Application%20Developer%20Platform%20%E5%BA%94%E7%94%A8%E5%BC%80%E5%8F%91%E8%80%85%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=68987fdaad5a09ad0017dfce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/agentflayer-0-click-exploit-abuses-chatgpt-connect-fc9c2f29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AgentFlayer%200-click%20exploit%20abuses%20ChatGPT%20Connectors%20to%20Steal%203rd-party%20app%20data&amp;severity=high&amp;id=689878cdad5a09ad0017b47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8805-denial-of-service-in-open5gs-ac7390d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8805%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=689878dcad5a09ad0017b498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8804-reachable-assertion-in-open5gs-6e2425f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8804%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=689871c7ad5a09ad0017a35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8803-denial-of-service-in-open5gs-1cad868b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8803%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=68986ac2ad5a09ad00177d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8802-denial-of-service-in-open5gs-6e8efa2e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8802%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=689863b7ad5a09ad00176291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8801-denial-of-service-in-open5gs-fa4b37b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8801%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=68985cafad5a09ad00173270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8800-denial-of-service-in-open5gs-8434833d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8800%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=689855a7ad5a09ad00137452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8799-denial-of-service-in-open5gs-74b32e75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8799%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=68984e9fad5a09ad00135897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8798-unrestricted-upload-in-oitcode-samar-d5aba4ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8798%3A%20Unrestricted%20Upload%20in%20oitcode%20samarium&amp;severity=medium&amp;id=68984797ad5a09ad001199c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8797-permission-issues-in-litmuschaos-lit-37ddd71d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8797%3A%20Permission%20Issues%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=68984090ad5a09ad0011787c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8796-missing-authorization-in-litmuschaos-1f8a41bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8796%3A%20Missing%20Authorization%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=68983989ad5a09ad0011631c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8795-improper-access-controls-in-litmusch-516c6371</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8795%3A%20Improper%20Access%20Controls%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=6898327fad5a09ad00114414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8794-authorization-bypass-in-litmuschaos--c39190e9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8794%3A%20Authorization%20Bypass%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=6898246fad5a09ad0011135b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8793-improper-control-of-resource-identif-85d2e0d6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8793%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=68981d67ad5a09ad0010f9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8792-client-side-enforcement-of-server-si-e32c85f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8792%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=6898165fad5a09ad0010ec9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8791-improper-authorization-in-litmuschao-10f3416f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8791%3A%20Improper%20Authorization%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=6898165fad5a09ad0010ec98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8790-improper-authorization-in-portabilis-9d17fae5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8790%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68980bd3ad5a09ad0010d8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pentest-trick-out-of-sight-out-of-mind-with-window-8a300c1f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pentest%20Trick%3A%20Out%20of%20sight%2C%20out%20of%20mind%20with%20Windows%20Long%20File%20Names&amp;severity=medium&amp;id=689804ccad5a09ad0010c79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8789-authorization-bypass-in-portabilis-i-f7d1aa84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8789%3A%20Authorization%20Bypass%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68980147ad5a09ad0010c09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8788-cross-site-scripting-in-portabilis-i-f91bb890</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8788%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68980147ad5a09ad0010c093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8787-cross-site-scripting-in-portabilis-i-c8e9c8f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8787%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=6897f6bcad5a09ad00109f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8786-cross-site-scripting-in-portabilis-i-2bb8d915</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8786%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=6897efb3ad5a09ad000f96c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-10-8e56b84d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-10&amp;severity=medium&amp;id=6899369dad5a09ad001cc375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8785-cross-site-scripting-in-portabilis-i-e7dd1078</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8785%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=6897de23ad5a09ad000f1481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8784-cross-site-scripting-in-portabilis-i-b4d8aad0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8784%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=6897d71fad5a09ad000f039a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/embargo-ransomware-nets-342m-in-crypto-since-april-f6b6af4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Embargo%20Ransomware%20nets%20%2434.2M%20in%20crypto%20since%20April%202024&amp;severity=medium&amp;id=6897baf7ad5a09ad000e94c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8775-unrestricted-upload-in-qiyuesuo-eele-0b4c7c44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8775%3A%20Unrestricted%20Upload%20in%20Qiyuesuo%20Eelectronic%20Signature%20Platform&amp;severity=medium&amp;id=6897bb0dad5a09ad000e951b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8774-observable-timing-discrepancy-in-ris-97a0f51d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8774%3A%20Observable%20Timing%20Discrepancy%20in%20riscv-boom%20SonicBOOM&amp;severity=low&amp;id=6897e8eaad5a09ad000f48e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8773-sql-injection-in-dinstar-monitoring--63ffdf21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8773%3A%20SQL%20Injection%20in%20Dinstar%20Monitoring%20Platform%20%E7%94%98%E8%82%83%E7%9C%81%E5%8D%B1%E9%99%A9%E5%93%81%E5%BA%93%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=6897aceaad5a09ad000e61dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8772-server-side-request-forgery-in-vinad-7f6f2c6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8772%3A%20Server-Side%20Request%20Forgery%20in%20Vinades%20NukeViet&amp;severity=medium&amp;id=6897a5e7ad5a09ad000e3e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8765-cross-site-scripting-in-datacom-dm95-a3a25c47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8765%3A%20Cross%20Site%20Scripting%20in%20Datacom%20DM955%205GT%201200&amp;severity=medium&amp;id=68979ee4ad5a09ad000e184f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8764-unrestricted-upload-in-linlinjava-li-f5459e20</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8764%3A%20Unrestricted%20Upload%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=689797d2ad5a09ad000dec5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8763-missing-encryption-of-sensitive-data-7568cc2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8763%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Ruijie%20EG306MG&amp;severity=medium&amp;id=6897e8eaad5a09ad000f48e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8759-use-of-hard-coded-cryptographic-key--2338644c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8759%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20TRENDnet%20TN-200&amp;severity=medium&amp;id=689782c2ad5a09ad000d5f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8758-least-privilege-violation-in-trendne-068692fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8758%3A%20Least%20Privilege%20Violation%20in%20TRENDnet%20TEW-822DRE&amp;severity=high&amp;id=689774a9ad5a09ad000d1393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8757-least-privilege-violation-in-trendne-ea55cefc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8757%3A%20Least%20Privilege%20Violation%20in%20TRENDnet%20TV-IP110WN&amp;severity=high&amp;id=68976699ad5a09ad000cbdd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8756-improper-authorization-in-tduckcloud-64fe2862</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8756%3A%20Improper%20Authorization%20in%20TDuckCloud%20tduck-platform&amp;severity=medium&amp;id=68975f97ad5a09ad000c55f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8755-authorization-bypass-in-macrozheng-m-0c7fcf90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8755%3A%20Authorization%20Bypass%20in%20macrozheng%20mall&amp;severity=medium&amp;id=6897e8eaad5a09ad000f48ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7726-cwe-79-improper-neutralization-of-in-022ffcf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7726%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dream-Theme%20The7%20%E2%80%94%20Website%20and%20eCommerce%20Builder%20for%20WordPress&amp;severity=medium&amp;id=68975505ad5a09ad000c1f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8753-path-traversal-in-linlinjava-litemal-416060ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8753%3A%20Path%20Traversal%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=68975187ad5a09ad000c0c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7020-cwe-656-incorrect-encryption-impleme-7c3ad52a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7020%3A%20CWE-656%3A%20Incorrect%20Encryption%20Implementation%20in%20BYD%20DiLink%20OS&amp;severity=medium&amp;id=68974388ad5a09ad000bb4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8752-command-injection-in-wangzhixuan-spr-861e6b8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8752%3A%20Command%20Injection%20in%20wangzhixuan%20spring-shiro-training&amp;severity=medium&amp;id=68973c6aad5a09ad000b94f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8751-cross-site-scripting-in-protected-to-bd94c538</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8751%3A%20Cross%20Site%20Scripting%20in%20Protected%20Total%20WebShield%20Extension&amp;severity=low&amp;id=6896fd23ad5a09ad0009fe41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8750-cross-site-scripting-in-macrozheng-m-3e8f8b30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8750%3A%20Cross%20Site%20Scripting%20in%20macrozheng%20mall&amp;severity=medium&amp;id=6896f61bad5a09ad0009e17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8746-memory-corruption-in-gnu-libopts-173215c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8746%3A%20Memory%20Corruption%20in%20GNU%20libopts&amp;severity=medium&amp;id=6896e80dad5a09ad00095c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8745-improper-export-of-android-applicati-70808f67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8745%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Weee%20RICEPO%20App&amp;severity=medium&amp;id=6896d9fbad5a09ad00091c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4655-cwe-918-server-side-request-forgery--92460be3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4655%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6896d67aad5a09ad00091384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4581-cwe-918-server-side-request-forgery--1dfcf827</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4581%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6896cf6fad5a09ad0008f3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55149-cwe-22-improper-limitation-of-a-pat-091d81ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55149%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ulab-uiuc%20tiny-scientist&amp;severity=medium&amp;id=6896b351ad5a09ad00087c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55013-cwe-23-relative-path-traversal-in-c-5263e20f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55013%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20CybercentreCanada%20assemblyline&amp;severity=medium&amp;id=6896b351ad5a09ad00087c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55008-cwe-200-exposure-of-sensitive-infor-74e96ecf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55008%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20workos%20authkit-react-router&amp;severity=high&amp;id=6896b351ad5a09ad00087c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55009-cwe-200-exposure-of-sensitive-infor-c325b69e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55009%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20workos%20authkit-remix&amp;severity=high&amp;id=6896b351ad5a09ad00087c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55006-cwe-20-improper-input-validation-in-118b9a4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55006%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20frappe%20lms&amp;severity=medium&amp;id=6896b351ad5a09ad00087c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54888-cwe-287-improper-authentication-in--7c8f93db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54888%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fedify-dev%20fedify&amp;severity=high&amp;id=6896a8c3ad5a09ad00085a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54417-cwe-94-improper-control-of-generati-41dcd796</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54417%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=6896a8c3ad5a09ad00085a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55152-cwe-400-uncontrolled-resource-consu-85404952</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55152%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20oakserver%20oak&amp;severity=medium&amp;id=6896a8c3ad5a09ad00085a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ftc-older-adults-lost-record-700-million-to-scamme-dd5b7fdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FTC%3A%20older%20adults%20lost%20record%20%24700%20million%20to%20scammers%20in%202024&amp;severity=high&amp;id=68969736ad5a09ad0007f19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/winrar-zero-day-exploited-to-plant-malware-on-arch-9775d166</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WinRAR%20zero-day%20exploited%20to%20plant%20malware%20on%20archive%20extraction&amp;severity=critical&amp;id=68969736ad5a09ad0007f191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-09-ea036af9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-09&amp;severity=medium&amp;id=6897e51dad5a09ad000f211b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8744-sql-injection-in-cesiumlab-web-98cdfd60</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8744%3A%20SQL%20Injection%20in%20CesiumLab%20Web&amp;severity=medium&amp;id=68968ca3ad5a09ad0007a78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46709-cwe-416-use-after-free-in-imaginati-6f7de367</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46709%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=68968ca3ad5a09ad0007a789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6573-cwe-cwe-280-improper-handling-of-ins-e2719d45</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6573%3A%20CWE%20-%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20(4.15)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=6896891fad5a09ad00078b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8743-cross-site-scripting-in-scada-lts-24fd0699</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8743%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=6896859bad5a09ad00076012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8742-improper-restriction-of-excessive-au-6391cda1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8742%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20macrozheng%20mall&amp;severity=medium&amp;id=6896778bad5a09ad00071915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8741-cleartext-transmission-of-sensitive--6323dd6f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8741%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20macrozheng%20mall&amp;severity=medium&amp;id=68967097ad5a09ad0006f262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8740-cross-site-scripting-in-zhenfeng13-m-178587ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8740%3A%20Cross%20Site%20Scripting%20in%20zhenfeng13%20My-Blog&amp;severity=medium&amp;id=6896697cad5a09ad0006d241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/theori-aixcc-writeup-0day-in-sqlite-more-db7085ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Theori%20AIxCC%20writeup%20%2C%200day%20in%20sqlite%20%2B%20more&amp;severity=medium&amp;id=6896627aad5a09ad00069fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8739-cross-site-request-forgery-in-zhenfe-cf0e80ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8739%3A%20Cross-Site%20Request%20Forgery%20in%20zhenfeng13%20My-Blog&amp;severity=medium&amp;id=68966275ad5a09ad00069fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8738-information-disclosure-in-zlt2000-mi-6740f9bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8738%3A%20Information%20Disclosure%20in%20zlt2000%20microservices-platform&amp;severity=medium&amp;id=68965b6cad5a09ad00067141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8737-open-redirect-in-zlt2000-microservic-c0424075</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8737%3A%20Open%20Redirect%20in%20zlt2000%20microservices-platform&amp;severity=medium&amp;id=68965465ad5a09ad00064b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8736-buffer-overflow-in-gnu-cflow-587bf5d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8736%3A%20Buffer%20Overflow%20in%20GNU%20cflow&amp;severity=medium&amp;id=68964d74ad5a09ad00061695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8735-null-pointer-dereference-in-gnu-cflo-4ff8a388</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8735%3A%20NULL%20Pointer%20Dereference%20in%20GNU%20cflow&amp;severity=medium&amp;id=68964654ad5a09ad0005efbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4796-cwe-639-authorization-bypass-through-75153690</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4796%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=high&amp;id=68964654ad5a09ad0005efb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8734-double-free-in-gnu-bison-3b45408e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8734&amp;severity=null&amp;id=68963f4cad5a09ad0005cd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8733-reachable-assertion-in-gnu-bison-7fa5014c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8733&amp;severity=null&amp;id=68963844ad5a09ad00059cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5095-cwe-306-in-burk-technology-arc-solo-70be6c91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5095%3A%20CWE-306%20in%20Burk%20Technology%20ARC%20Solo&amp;severity=critical&amp;id=689634c3ad5a09ad00058732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-jdwp-exploited-in-the-wild-what-happens-wh-fe427dc6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20JDWP%20Exploited%20in%20the%20Wild%3A%20What%20Happens%20When%20Debug%20Ports%20Are%20Left%20Open&amp;severity=medium&amp;id=6896697cad5a09ad0006d1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-attack-deploying-malware-on-indian-defens-8b2a6c8c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Attack%3A%20Deploying%20Malware%20on%20Indian%20Defense%20BOSS%20Linux&amp;severity=medium&amp;id=6896697cad5a09ad0006d1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-socgholish-the-malware-web-behind-the-pi-df354d46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20SocGholish%3A%20The%20Malware%20Web%20Behind%20the%20&apos;Pioneer%20of%20Fake%20Updates&apos;%20and%20Its%20Operator%2C%20TA569&amp;severity=medium&amp;id=689665faad5a09ad0006b434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/statistics-report-on-malware-targeting-windows-dat-6b9ade44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Statistics%20Report%20on%20Malware%20Targeting%20Windows%20Database%20Servers%20in%20Q2%202025&amp;severity=medium&amp;id=689665faad5a09ad0006b454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/statistics-report-on-malware-targeting-windows-web-559b6c7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Statistics%20Report%20on%20Malware%20Targeting%20Windows%20Web%20Servers%20in%20Q2%202025&amp;severity=medium&amp;id=689665faad5a09ad0006b467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/650-attack-tools-one-coordinated-campaign-f1790ab9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=650%20Attack%20Tools%2C%20One%20Coordinated%20Campaign&amp;severity=medium&amp;id=689665faad5a09ad0006b475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unclaimed-google-play-store-package-73621107</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unclaimed%20Google%20Play%20Store%20package&amp;severity=medium&amp;id=68962a3aad5a09ad00054f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/genai-used-to-impersonate-brazils-government-websi-42da9f8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GenAI%20Used%20to%20Impersonate%20Brazil&apos;s%20Government%20Websites&amp;severity=medium&amp;id=68966274ad5a09ad00069e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-homograph-illusion-not-everything-is-as-it-see-829f3c5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Homograph%20Illusion%3A%20Not%20Everything%20Is%20As%20It%20Seems&amp;severity=medium&amp;id=68965ef2ad5a09ad00068d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8732-uncontrolled-recursion-in-libxml2-48d14c9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8732%3A%20Uncontrolled%20Recursion%20in%20libxml2&amp;severity=medium&amp;id=68962a34ad5a09ad00054f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8284-cwe-306-in-packet-power-emx-8c8d31c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8284%3A%20CWE-306%20in%20Packet%20Power%20EMX&amp;severity=critical&amp;id=689626b0ad5a09ad00053371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8393-cwe-295-in-dreame-technology-dreameh-116ece46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8393%3A%20CWE-295%20in%20Dreame%20Technology%20Dreamehome%20iOS%20app&amp;severity=high&amp;id=689626b0ad5a09ad00053374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46414-cwe-307-in-eg4-electronics-eg4-12kp-f54e5740</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46414%3A%20CWE-307%20in%20EG4%20Electronics%20EG4%2012kPV&amp;severity=high&amp;id=689626b0ad5a09ad0005336d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47872-cwe-203-in-eg4-electronics-eg4-12kp-07b453c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47872%3A%20CWE-203%20in%20EG4%20Electronics%20EG4%2012kPV&amp;severity=medium&amp;id=68964d74ad5a09ad0006168d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53520-cwe-494-in-eg4-electronics-eg4-12kp-222403dd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53520%3A%20CWE-494%20in%20EG4%20Electronics%20EG4%2012kPV&amp;severity=high&amp;id=68964d74ad5a09ad00061691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52586-cwe-319-in-eg4-electronics-eg4-12kp-aff10941</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52586%3A%20CWE-319%20in%20EG4%20Electronics%20EG4%2012kPV&amp;severity=medium&amp;id=6896232cad5a09ad0005287f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4576-cwe-79-improper-neutralization-of-in-1d8f72ec</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4576%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68961fa9ad5a09ad00051cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8356-cwe-22-improper-limitation-of-a-path-c7213120</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8356%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Xerox%20FreeFlow%20Core&amp;severity=critical&amp;id=68961c24ad5a09ad00050559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8731-use-of-default-credentials-in-trendn-a133a382</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8731%3A%20Use%20of%20Default%20Credentials%20in%20TRENDnet%20TI-G160i&amp;severity=critical&amp;id=68961c24ad5a09ad0005055c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8355-cwe-611-improper-restriction-of-xml--82cc294f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8355%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Xerox%20FreeFlow%20Core&amp;severity=high&amp;id=68961c24ad5a09ad00050556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36023-cwe-639-authorization-bypass-throug-cec630b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36023%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=68961198ad5a09ad0004c7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8730-hard-coded-credentials-in-belkin-f9k-e6586f12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8730%3A%20Hard-coded%20Credentials%20in%20Belkin%20F9K1009&amp;severity=critical&amp;id=68960e1dad5a09ad0004b010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36119-cwe-290-authentication-bypass-by-sp-75f9e43b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36119%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing&amp;severity=high&amp;id=68960aacad5a09ad000490a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rubygems-pypi-hit-by-malicious-packages-stealing-c-51963e43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RubyGems%2C%20PyPI%20Hit%20by%20Malicious%20Packages%20Stealing%20Credentials%2C%20Crypto%2C%20Forcing%20Security%20Changes&amp;severity=high&amp;id=68960a8ead5a09ad00048f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leaked-credentials-up-160-what-attackers-are-doing-a3961e0a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leaked%20Credentials%20Up%20160%25%3A%20What%20Attackers%20Are%20Doing%20With%20Them&amp;severity=high&amp;id=68960a8ead5a09ad00048f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/efimer-trojan-delivered-via-email-and-hacked-wordp-53ba6455</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Efimer%20Trojan%20delivered%20via%20email%20and%20hacked%20WordPress%20websites&amp;severity=medium&amp;id=68965b6bad5a09ad00067112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unveiling-a-new-variant-of-the-darkcloud-campaign-11fd6b35</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unveiling%20a%20New%20Variant%20of%20the%20DarkCloud%20Campaign&amp;severity=medium&amp;id=68965ef2ad5a09ad00068d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8729-path-traversal-in-migoxlab-lmeterx-00e1c832</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8729%3A%20Path%20Traversal%20in%20MigoXLab%20LMeterX&amp;severity=medium&amp;id=68960004ad5a09ad000436e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flipper-zero-darkweb-firmware-bypasses-rolling-cod-bceb527d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flipper%20Zero%20&apos;DarkWeb&apos;%20Firmware%20Bypasses%20Rolling%20Code%20Security%20on%20Major%20Vehicle%20Brands&amp;severity=high&amp;id=6895ee6fad5a09ad000387a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/royal-and-blacksuit-ransomware-gangs-hit-over-450--eb2fc1b3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Royal%20and%20BlackSuit%20ransomware%20gangs%20hit%20over%20450%20US%20companies&amp;severity=high&amp;id=6895ee6fad5a09ad000387a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/columbia-university-data-breach-impacts-nearly-870-c507de44</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Columbia%20University%20data%20breach%20impacts%20nearly%20870%2C000%20individuals&amp;severity=high&amp;id=6895ee6fad5a09ad0003879f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-365-apps-to-soon-block-file-access-via-f-2d632474</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20365%20apps%20to%20soon%20block%20file%20access%20via%20FPRPC%20by%20default&amp;severity=high&amp;id=6895ee6fad5a09ad000387ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/greedybear-40-fake-crypto-wallet-extensions-found--bea1935e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GreedyBear%3A%2040%20Fake%20Crypto%20Wallet%20Extensions%20Found%20on%20Firefox%20Marketplace&amp;severity=medium&amp;id=6895e767ad5a09ad000312de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8749-cwe-22-improper-limitation-of-a-path-b49d99e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8749%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mobile%20Industrial%20Robots%20MiR%20Robots&amp;severity=medium&amp;id=6895e3f6ad5a09ad0002fd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/greedybear-scam-150-fake-crypto-wallet-extensions--d1c9462b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GreedyBear%20Scam%3A%20150%20Fake%20Crypto%20Wallet%20Extensions%20Found%20on%20Firefox%20Marketplace&amp;severity=medium&amp;id=6895e3e2ad5a09ad0002fcbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8088-cwe-35-path-traversal-in-winrar-gmbh-59118f52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8088%3A%20CWE-35%20Path%20traversal%20in%20win.rar%20GmbH%20WinRAR&amp;severity=high&amp;id=6895e060ad5a09ad0002e7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8748-cwe-78-improper-neutralization-of-sp-0175aa01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8748%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Mobile%20Industrial%20Robots%20MiR%20Robots&amp;severity=high&amp;id=6895dcdcad5a09ad0002c9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53606-cwe-502-deserialization-of-untruste-8a26a77d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53606%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Seata%20(incubating)&amp;severity=critical&amp;id=6895c441ad5a09ad0002032f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48913-cwe-20-improper-input-validation-in-386f6c70</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48913%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20CXF&amp;severity=critical&amp;id=6895c441ad5a09ad0002032c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/observed-malicious-driver-use-associated-with-akir-cf1336da</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Observed%20Malicious%20Driver%20Use%20Associated%20with%20Akira%20SonicWall%20Campaign&amp;severity=medium&amp;id=6895b2abad5a09ad00019ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-socgholish-untangling-the-malware-web-be-3e19e572</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20SocGholish%3A%20Untangling%20the%20Malware%20Web%20Behind%20the%20&apos;Pioneer%20of%20Fake%20Updates&apos;%20and%20Its%20Operator&amp;severity=medium&amp;id=6895b62fad5a09ad0001b28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6572-cwe-79-cross-site-scripting-xss-in-o-c8312ba3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6572%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20OpenStreetMap%20for%20Gutenberg%20and%20WPBakery%20Page%20Builder%20(formerly%20Visual%20Composer)&amp;severity=medium&amp;id=6895968dad5a09ad0000c784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54958-improper-neutralization-of-special--124d9705</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54958%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Mubit%20co.%2Cltd.%20Powered%20BLUE%20870&amp;severity=medium&amp;id=689584f8ad5a09ad00005b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54959-improper-limitation-of-a-pathname-t-0f9e4d09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54959%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Mubit%20co.%2Cltd.%20Powered%20BLUE%20870&amp;severity=medium&amp;id=689584f8ad5a09ad00005b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54940-code-injection-in-wpengine-inc-adva-62045627</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54940%3A%20Code%20injection%20in%20WPEngine%2C%20Inc.%20Advanced%20Custom%20Fields&amp;severity=low&amp;id=68958174ad5a09ad00003b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8708-deserialization-in-antabot-white-jot-6175fb3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8708%3A%20Deserialization%20in%20Antabot%20White-Jotter&amp;severity=low&amp;id=68956554ad5a09ad00ff8165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8707-improper-export-of-android-applicati-c4ac44e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8707%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Huuge%20Box%20App&amp;severity=medium&amp;id=68956554ad5a09ad00ff815e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8706-sql-injection-in-wanzhou-woes-intell-b8f7fcf8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8706%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=68955744ad5a09ad00ff05cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8705-sql-injection-in-wanzhou-woes-intell-d6ea10b5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8705%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=6895503cad5a09ad00fed5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bouygues-telecom-confirms-data-breach-impacting-64-fe4342e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bouygues%20Telecom%20confirms%20data%20breach%20impacting%206.4%20million%20customers&amp;severity=high&amp;id=68954932ad5a09ad00fe87b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-edr-killer-tool-used-by-eight-different-ransom-29069f66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20EDR%20killer%20tool%20used%20by%20eight%20different%20ransomware%20groups&amp;severity=high&amp;id=68954932ad5a09ad00fe87b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/socgholish-malware-spread-via-ad-tools-delivers-ac-4b17bf5d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SocGholish%20Malware%20Spread%20via%20Ad%20Tools%3B%20Delivers%20Access%20to%20LockBit%2C%20Evil%20Corp%2C%20and%20Others&amp;severity=high&amp;id=68954932ad5a09ad00fe87bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8704-sql-injection-in-wanzhou-woes-intell-5bb8dd05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8704%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=6895495bad5a09ad00fe8c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-whatsapp-developer-libraries-hide-destructive-9c61a704</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20WhatsApp%20developer%20libraries%20hide%20destructive%20data-wiping%20code&amp;severity=high&amp;id=689545b2ad5a09ad00fe4dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54887-cwe-354-improper-validation-of-inte-95345ef3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54887%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20jwt%20ruby-jwe&amp;severity=critical&amp;id=6895495bad5a09ad00fe8c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54886-cwe-502-deserialization-of-untruste-7fc53b73</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54886%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20skops-dev%20skops&amp;severity=high&amp;id=6895495bad5a09ad00fe8c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54793-cwe-601-url-redirection-to-untruste-49925502</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54793%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=6895495bad5a09ad00fe8c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8703-sql-injection-in-wanzhou-woes-intell-b2f196ca</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8703%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=6895495bad5a09ad00fe8c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54368-cwe-436-interpretation-conflict-in--db3ace55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54368%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20astral-sh%20uv&amp;severity=medium&amp;id=68953ea5ad5a09ad00fe06ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-08-42e4e01a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-08&amp;severity=medium&amp;id=6896939dad5a09ad0007c1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52914-na-041324d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52914%3A%20n%2Fa&amp;severity=high&amp;id=68963844ad5a09ad00059cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52913-na-2afb61db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52913%3A%20n%2Fa&amp;severity=critical&amp;id=68963844ad5a09ad00059ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50928-na-9d296bc6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50928%3A%20n%2Fa&amp;severity=medium&amp;id=689634c3ad5a09ad00058736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50927-na-39e4a7df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50927%3A%20n%2Fa&amp;severity=medium&amp;id=689634c3ad5a09ad0005872e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50467-na-778a72e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50467%3A%20n%2Fa&amp;severity=medium&amp;id=68962db8ad5a09ad0005624f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50466-na-750ef929</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50466%3A%20n%2Fa&amp;severity=high&amp;id=68962db8ad5a09ad0005624a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50465-na-2fe7e671</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50465%3A%20n%2Fa&amp;severity=high&amp;id=68962db8ad5a09ad00056245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50468-na-37ed3be4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50468%3A%20n%2Fa&amp;severity=medium&amp;id=68962a34ad5a09ad00054f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8702-sql-injection-in-wanzhou-woes-intell-cdd85c7a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8702%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=68953b20ad5a09ad00fdf6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54952-integer-overflow-to-buffer-overflow-119da1ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54952%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20(CWE-680)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=6895379cad5a09ad00fde2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54951-heap-based-buffer-overflow-cwe-122--46e29251</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54951%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=6895342bad5a09ad00fdcd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54950-out-of-bounds-read-cwe-125-in-meta--029001ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54950%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=6895342bad5a09ad00fdcd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54949-heap-based-buffer-overflow-cwe-122--55f06c34</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54949%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=68953094ad5a09ad00fdbe54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30405-integer-overflow-or-wraparound-cwe--01c5e5bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30405%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=68953094ad5a09ad00fdbe50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30404-integer-overflow-or-wraparound-cwe--95f8cedb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30404%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=68953094ad5a09ad00fdbe58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blog-exploiting-retbleed-in-the-real-world-52c47e4c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blog%3A%20Exploiting%20Retbleed%20in%20the%20real%20world&amp;severity=medium&amp;id=68951f05ad5a09ad00fd4141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/consent-compromise-abusing-entra-oauth-for-fun-and-a89846ae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Consent%20%26%20Compromise%3A%20Abusing%20Entra%20OAuth%20for%20Fun%20and%20Access%20to%20Internal%20Microsoft%20Applications&amp;severity=medium&amp;id=68951b81ad5a09ad00fd3115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-svg-threat-how-hackers-use-vector-gr-d5701c68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20the%20SVG%20Threat%3A%20How%20Hackers%20Use%20Vector%20Graphics%20for%20Phishing%20Attacks&amp;severity=medium&amp;id=68951f00ad5a09ad00fd411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-infection-chain-and-confuserex-based-obfuscati-b8d2e472</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Infection%20Chain%20and%20ConfuserEx-Based%20Obfuscation%20for%20DarkCloud%20Stealer&amp;severity=medium&amp;id=68951b7cad5a09ad00fd30cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/odyssey-stealer-malware-attacks-macos-users-883e406d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Odyssey%20Stealer%20Malware%20Attacks%20macOS%20Users&amp;severity=medium&amp;id=68951b7cad5a09ad00fd30de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8701-sql-injection-in-wanzhou-woes-intell-d482c818</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8701%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=689517f8ad5a09ad00fd1cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53787-cwe-77-improper-neutralization-of-s-42a1a210</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53787%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&apos;s%20Business%20Chat&amp;severity=high&amp;id=689517f8ad5a09ad00fd1cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53774-cwe-77-improper-neutralization-of-s-17c5b648</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53774%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&apos;s%20Business%20Chat&amp;severity=medium&amp;id=689517f8ad5a09ad00fd1cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53767-cwe-918-server-side-request-forgery-dfee4d77</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53767%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Open%20AI&amp;severity=critical&amp;id=689517f8ad5a09ad00fd1cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53792-cwe-285-improper-authorization-in-m-470fa6a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53792%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Portal&amp;severity=critical&amp;id=689517f8ad5a09ad00fd1cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prompt-injection-engineering-for-attackers-exploit-f931dd61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prompt%20injection%20engineering%20for%20attackers%3A%20Exploiting%20GitHub%20Copilot&amp;severity=medium&amp;id=689510f4ad5a09ad00fcd0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8698-reachable-assertion-in-open5gs-4aafc063</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8698%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=689510f0ad5a09ad00fcd0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26513-267-in-netapp-san-host-utilities-fo-fe46d288</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26513%3A%20267%20in%20NetApp%20SAN%20Host%20Utilities%20for%20Windows&amp;severity=high&amp;id=689510f0ad5a09ad00fcd0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7195-incorrect-default-permissions-in-red-af0cccee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7195%3A%20Incorrect%20Default%20Permissions%20in%20operator-framework%20operator-sdk&amp;severity=medium&amp;id=6894fbd9ad5a09ad00fc400a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8697-os-command-injection-in-agentunivers-b810eed9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8697%3A%20OS%20Command%20Injection%20in%20agentUniverse&amp;severity=medium&amp;id=6894fbd9ad5a09ad00fc400e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shared-secret-edr-killer-in-the-kill-chain-2768358e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shared%20secret%3A%20EDR%20killer%20in%20the%20kill%20chain&amp;severity=medium&amp;id=68951f00ad5a09ad00fd40d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55077-cwe-250-execution-with-unnecessary--283ee7cd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55077%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Tyler%20Technologies%20ERP%20Pro%209%20SaaS&amp;severity=medium&amp;id=6894f4d0ad5a09ad00fbae47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24000-cwe-288-authentication-bypass-using-bb0ee835</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24000%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Saad%20Iqbal%20Post%20SMTP&amp;severity=null&amp;id=6894dfb8ad5a09ad00fb3dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34148-cwe-78-improper-neutralization-of-s-5720704b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34148%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6894d8b1ad5a09ad00fb13e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34149-cwe-78-improper-neutralization-of-s-a995e69c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34149%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6894d8b1ad5a09ad00fb13e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34150-cwe-78-improper-neutralization-of-s-bcde81f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34150%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6894d8b1ad5a09ad00fb13e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34151-cwe-78-improper-neutralization-of-s-4040732f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34151%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6894d8b1ad5a09ad00fb13ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34152-cwe-78-improper-neutralization-of-s-f6f4203a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34152%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6894d8b1ad5a09ad00fb13f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47907-cwe-362-concurrent-execution-using--172f4e14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47907%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Go%20standard%20library%20database%2Fsql&amp;severity=high&amp;id=6894ce25ad5a09ad00fae4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/email-delivered-rmm-abusing-pdfs-for-silent-initia-9b3d19d2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Email-Delivered%20RMM%3A%20Abusing%20PDFs%20for%20Silent%20Initial%20Access&amp;severity=medium&amp;id=68951f00ad5a09ad00fd409d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7054-cwe-835-loop-with-unreachable-exit-c-3283aace</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7054%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cloudflare%20quiche&amp;severity=high&amp;id=6894ce25ad5a09ad00fae4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-infection-chain-and-confuserex-based-obfuscati-1da7267c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Infection%20Chain%20and%20ConfuserEx-Based%20Obfuscation%20for%20DarkCloud%20Stealer&amp;severity=medium&amp;id=6894bc94ad5a09ad00fa7a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/greedy-bear-massive-crypto-wallet-attack-spans-acr-72e776d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Greedy%20Bear%20%E2%80%94Massive%20Crypto%20Wallet%20Attack%20Spans%20Across%20Multiple%20Vectors&amp;severity=medium&amp;id=6894b92aad5a09ad00fa65f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cracking-the-vault-how-we-found-zero-day-flaws-in--524a15f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cracking%20the%20Vault%3A%20how%20we%20found%20zero-day%20flaws%20in%20authentication%2C%20identity%2C%20and%20authorization%20in%20HashiCorp%20Vault&amp;severity=critical&amp;id=6894a77bad5a09ad00fa15ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/air-france-and-klm-disclose-data-breaches-impactin-5dce7ce9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Air%20France%20and%20KLM%20disclose%20data%20breaches%20impacting%20customers&amp;severity=high&amp;id=68949969ad5a09ad00f9ae00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-arsenal-lamehug-the-first-ai-powered-malware-e3562d75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Arsenal%3A%20LAMEHUG%2C%20the%20First%20AI-Powered%20Malware&amp;severity=medium&amp;id=68951f00ad5a09ad00fd408e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rokrat-shellcode-and-steganographic-threats-analys-c4bb01c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RoKRAT%20Shellcode%20and%20Steganographic%20Threats%3A%20Analysis%20and%20EDR%20Response%20Strategies&amp;severity=medium&amp;id=6894c71cad5a09ad00fac0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/playpraetors-evolving-threat-how-chinese-speaking--2f4f7b2e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlayPraetor&apos;s%20evolving%20threat%3A%20How%20Chinese-speaking%20actors%20globally%20scale%20an%20Android%20RAT&amp;severity=medium&amp;id=6894c399ad5a09ad00faac85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-reconnaissance-to-control-the-operational-blu-c0611bd2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Reconnaissance%20to%20Control%3A%20The%20Operational%20Blueprint%20of%20Kimsuky%20APT%20for%20Cyber%20Espionage&amp;severity=medium&amp;id=6894c399ad5a09ad00faaca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-bing-search-to-ransomware-bumblebee-and-adapt-e5330496</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Bing%20Search%20to%20Ransomware%3A%20Bumblebee%20and%20AdaptixC2%20Deliver%20Akira&amp;severity=medium&amp;id=6894c399ad5a09ad00faacb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-promptware-attack-hijacks-users-gemini-ai-via--2d0e4e1b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Promptware%20Attack%20Hijacks%20User&apos;s%20Gemini%20AI%20Via%20Google%20Calendar%20Invite&amp;severity=medium&amp;id=689487d6ad5a09ad00f93c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/slowtempest-cobalt-strike-loader-95cc7700</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SLOW%23TEMPEST%20Cobalt%20Strike%20Loader&amp;severity=medium&amp;id=68948452ad5a09ad00f926e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8533-cwe-863-incorrect-authorization-in-f-c96ebd72</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8533%3A%20CWE-863%20Incorrect%20Authorization%20in%20Flexibits%20Fantastical&amp;severity=medium&amp;id=68947d4bad5a09ad00f8f78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-medium-confidence-detec-d932a0de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Medium%20Confidence%20Detection&amp;severity=medium&amp;id=6895dcdbad5a09ad0002c7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-medium-confidence-fastf-a3a56034</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Medium%20Confidence%20FastFlux&amp;severity=medium&amp;id=6895aba3ad5a09ad00016c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-medium-confidence-infos-4219f3ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Medium%20Confidence%20InfoStealer&amp;severity=medium&amp;id=6895aba3ad5a09ad00016c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-medium-confidence-comma-49ce9106</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Medium%20Confidence%20Command%20And%20Control&amp;severity=medium&amp;id=6895aba3ad5a09ad00016c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-medium-confidence-phish-7913a375</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Medium%20Confidence%20Phishing&amp;severity=medium&amp;id=6895aba3ad5a09ad00016c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-high-confidence-44797350</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20High%20Confidence%20Detection&amp;severity=medium&amp;id=6895a81fad5a09ad00013bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-high-confidence-fastflu-a78cf859</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20High%20Confidence%20FastFlux&amp;severity=medium&amp;id=6895a81fad5a09ad00013d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-high-confidence-infoste-88c75f4d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20High%20Confidence%20InfoStealer&amp;severity=medium&amp;id=6895a81fad5a09ad00013d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-high-confidence-command-98393de5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20High%20Confidence%20Command%20And%20Control&amp;severity=medium&amp;id=6895a81fad5a09ad00013d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-high-confidence-phishin-66cd9e0e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20High%20Confidence%20Phishing&amp;severity=medium&amp;id=6895a81fad5a09ad00013d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35970-use-of-weak-credentials-in-seiko-ep-16c28c52</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35970%3A%20Use%20of%20weak%20credentials%20in%20SEIKO%20EPSON%20Multiple%20EPSON%20product&amp;severity=high&amp;id=68943e03ad5a09ad00f73b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29866-cwe-73-external-control-of-file-nam-a0f37e3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29866%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20TAGFREE%20X-Free%20Uploader&amp;severity=high&amp;id=68943a7fad5a09ad00f729d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8583-inappropriate-implementation-in-goog-b9ae4e15</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8583%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8582-insufficient-validation-of-untrusted-1d0dc30f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8582%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8581-inappropriate-implementation-in-goog-4460eb3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8581%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8580-inappropriate-implementation-in-goog-848c30c2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8580%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8579-inappropriate-implementation-in-goog-e04a826f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8579%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8578-use-after-free-in-google-chrome-e0587967</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8578%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68940948ad5a09ad00f60f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8577-inappropriate-implementation-in-goog-aaf07dc2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8577%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8576-use-after-free-in-google-chrome-d5eec489</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8576%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68940948ad5a09ad00f60f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29865-cwe-22-improper-limitation-of-a-pat-2bbc3d15</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29865%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TAGFREE%20X-Free%20Uploader&amp;severity=high&amp;id=68940948ad5a09ad00f60f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-abuses-cpu-tuning-tool-to-disable-60f24204</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20ransomware%20abuses%20CPU%20tuning%20tool%20to%20disable%20Microsoft%20Defender&amp;severity=high&amp;id=6893fb35ad5a09ad00f5ce8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-ecscape-flaw-in-amazon-ecs-ena-adf812e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20ECScape%20Flaw%20in%20Amazon%20ECS%20Enabling%20Cross-Task%20Credential%20Theft&amp;severity=high&amp;id=6893f7b1ad5a09ad00f58d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3770-cwe-693-protection-mechanism-failure-966bca45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3770%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20TianoCore%20EDK2&amp;severity=high&amp;id=6893febbad5a09ad00f5db87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54798-cwe-59-improper-link-resolution-bef-9287b6d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54798%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20raszi%20node-tmp&amp;severity=low&amp;id=6893f7c1ad5a09ad00f58d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54799-cwe-319-cleartext-transmission-of-s-7d1ce94e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54799%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20go-acme%20lego&amp;severity=low&amp;id=6893f7c1ad5a09ad00f58d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54885-cwe-331-insufficient-entropy-in-sim-13ec5f67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54885%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20simbo1905%20thinbus-srp-npm&amp;severity=medium&amp;id=6893f7c1ad5a09ad00f58d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54882-cwe-522-insufficiently-protected-cr-ba911cf4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54882%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20himmelblau-idm%20himmelblau&amp;severity=high&amp;id=6893f7c1ad5a09ad00f58d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-07-aa750a3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-07&amp;severity=medium&amp;id=6895421dad5a09ad00fe1ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45765-na-94b9ccb1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45765%3A%20n%2Fa&amp;severity=critical&amp;id=689517f8ad5a09ad00fd1cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48709-na-5c8ba7ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48709%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20BMC%20Control-M%2FServer&amp;severity=medium&amp;id=689509e8ad5a09ad00fca7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47808-na-f31ad026</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47808%3A%20n%2Fa&amp;severity=medium&amp;id=6894ff5cad5a09ad00fc662b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47807-na-81c71baf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47807%3A%20n%2Fa&amp;severity=medium&amp;id=6894ff5cad5a09ad00fc6627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47806-na-df59c747</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47806%3A%20n%2Fa&amp;severity=medium&amp;id=6894ff5cad5a09ad00fc6623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47219-na-4f7307b0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47219%3A%20n%2Fa&amp;severity=high&amp;id=6894ff5cad5a09ad00fc661f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47183-na-c5bbf8f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47183%3A%20n%2Fa&amp;severity=medium&amp;id=6894ff5cad5a09ad00fc661b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50692-na-6a29e9be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50692%3A%20n%2Fa&amp;severity=critical&amp;id=6894f4d0ad5a09ad00fbae43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50675-na-29efc5b2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50675%3A%20n%2Fa&amp;severity=high&amp;id=6894f4d0ad5a09ad00fbae3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51533-na-8276b1ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51533%3A%20n%2Fa&amp;severity=medium&amp;id=6894f14cad5a09ad00fb9865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51629-na-617b5f0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51629%3A%20n%2Fa&amp;severity=high&amp;id=6894ea44ad5a09ad00fb8278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55138-cwe-304-missing-critical-step-in-au-278af90e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55138%3A%20CWE-304%20Missing%20Critical%20Step%20in%20Authentication%20in%20Latkecrszy%20LinkJoin&amp;severity=high&amp;id=6894d8b2ad5a09ad00fb1414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55137-cwe-843-access-of-resource-using-in-a9115b86</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55137%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Latkecrszy%20LinkJoin&amp;severity=high&amp;id=6894d8b2ad5a09ad00fb1411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54397-na-5dc50f18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54397%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b2ad5a09ad00fb140e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54396-na-880ffb19</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54396%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b1ad5a09ad00fb1400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54395-na-74e794f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54395%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b1ad5a09ad00fb13fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54394-na-48c10732</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54394%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b1ad5a09ad00fb13fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54393-na-206d0734</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54393%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b1ad5a09ad00fb13f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54392-na-b16f681f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54392%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b1ad5a09ad00fb13f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55136-na-9efa91f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55136%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20tae898%20ERC&amp;severity=medium&amp;id=6894d1a9ad5a09ad00faf3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55135-cwe-434-unrestricted-upload-of-file-fb243228</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55135%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Agora%20Foundation%20Agora&amp;severity=medium&amp;id=6894d1a9ad5a09ad00faf39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55134-cwe-79-improper-neutralization-of-i-64740d69</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55134%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Agora%20Foundation%20Agora&amp;severity=medium&amp;id=6894d1a9ad5a09ad00faf397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55133-cwe-79-improper-neutralization-of-i-fc1da20c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55133%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Agora%20Foundation%20Agora&amp;severity=medium&amp;id=6894d1a9ad5a09ad00faf393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44779-na-6c6e8919</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44779%3A%20n%2Fa&amp;severity=medium&amp;id=6894c71cad5a09ad00fac0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50952-na-f1db1bf7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50952%3A%20n%2Fa&amp;severity=medium&amp;id=6894c399ad5a09ad00faad0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47188-na-6f9b7bb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47188%3A%20n%2Fa&amp;severity=medium&amp;id=6894c01aad5a09ad00fa89f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32094-cwe-444-inconsistent-interpretation-acabfba9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32094%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Akamai%20AkamaiGhost&amp;severity=medium&amp;id=689428ebad5a09ad00f6b4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/http11-must-die-the-desync-endgame-whitepaper-82ed93f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTTP%2F1.1%20must%20die%3A%20the%20desync%20endgame%20(whitepaper)&amp;severity=medium&amp;id=6893ed26ad5a09ad00f5432d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54786-cwe-200-exposure-of-sensitive-infor-b7ca2007</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54786%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=6893e61ead5a09ad00f4ed38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-groups-stole-115-million-us-cards-in-16-mo-5adf347a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Groups%20Stole%20115%20Million%20US%20Cards%20in%2016-Month%20Smishing%20Campaign&amp;severity=medium&amp;id=6893d105ad5a09ad00f46f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/agentic-misalignment-how-llms-could-be-insider-thr-3ee29d5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Agentic%20Misalignment%3A%20How%20LLMs%20could%20be%20insider%20threats&amp;severity=medium&amp;id=6893c679ad5a09ad00f41d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7770-cwe-337-predictable-seed-in-pseudo-r-abe09480</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7770%3A%20CWE-337%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Tigo%20Energy%20Cloud%20Connect%20Advanced&amp;severity=high&amp;id=6893c2f5ad5a09ad00f41437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6634-cwe-120-buffer-copy-without-checking-6c762da3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6634%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=6893bf74ad5a09ad00f4090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6633-cwe-787-out-of-bounds-write-in-autod-c8bed724</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6633%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=6893bf74ad5a09ad00f4090b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7769-cwe-77-improper-neutralization-of-sp-eb07efa9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7769%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Tigo%20Energy%20Cloud%20Connect%20Advanced&amp;severity=high&amp;id=6893bf74ad5a09ad00f40911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6632-cwe-125-out-of-bounds-read-in-autode-0e3161d9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6632%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%203ds%20Max&amp;severity=medium&amp;id=6893bf74ad5a09ad00f40908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7768-cwe-798-use-of-hard-coded-credential-604c635d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7768%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Tigo%20Energy%20Cloud%20Connect%20Advanced&amp;severity=critical&amp;id=6893bf74ad5a09ad00f40918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/revault-flaws-let-hackers-bypass-windows-login-on--c4ac4169</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ReVault%20flaws%20let%20hackers%20bypass%20Windows%20login%20on%20Dell%20laptops&amp;severity=high&amp;id=6893b868ad5a09ad00f3b601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-suffers-data-breach-in-ongoing-salesforce-d-88ad5867</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20suffers%20data%20breach%20in%20ongoing%20Salesforce%20data%20theft%20attacks&amp;severity=high&amp;id=6893b868ad5a09ad00f3b5fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mfa-matters-but-it-isnt-enough-on-its-own-e83fc396</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MFA%20matters%E2%80%A6%20But%20it%20isn%E2%80%99t%20enough%20on%20its%20own&amp;severity=high&amp;id=6893b868ad5a09ad00f3b605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-fixes-two-actively-exploited-apex-one--1f53c9ed</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20fixes%20two%20actively%20exploited%20Apex%20One%20RCE%20flaws&amp;severity=medium&amp;id=6893b868ad5a09ad00f3b611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ghost-calls-tactic-abuses-zoom-and-microsoft-t-3a241c3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Ghost%20Calls%20tactic%20abuses%20Zoom%20and%20Microsoft%20Teams%20for%20C2%20operations&amp;severity=high&amp;id=6893b868ad5a09ad00f3b60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38746-cwe-200-exposure-of-sensitive-infor-61b5d8d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38746%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20SupportAssist%20OS%20Recovery&amp;severity=low&amp;id=6893b4e7ad5a09ad00f3acb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38747-cwe-378-creation-of-temporary-file--88bb9f4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38747%3A%20CWE-378%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Dell%20SupportAssist%20OS%20Recovery&amp;severity=high&amp;id=6893b4e7ad5a09ad00f3acbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8667-os-command-injection-in-skyworkai-de-fcde29d4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8667%3A%20OS%20Command%20Injection%20in%20SkyworkAI%20DeepResearchAgent&amp;severity=medium&amp;id=68939c47ad5a09ad00f31c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-accesses-millions-of-imdatacenter-records-f-cecc1b58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Accesses%20Millions%20of%20IMDataCenter%20Records%20from%20Exposed%20AWS%20Bucket&amp;severity=medium&amp;id=68939540ad5a09ad00f2f706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8419-improper-neutralization-of-crlf-sequ-7cb1d762</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8419%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.0&amp;severity=medium&amp;id=68938e39ad5a09ad00f2dd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8665-os-command-injection-in-agno-agi-agn-0b575849</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8665%3A%20OS%20Command%20Injection%20in%20agno-agi%20agno&amp;severity=medium&amp;id=68938e39ad5a09ad00f2dd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20215-improper-certificate-validation-in--307b081c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20215%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=689383b3ad5a09ad00f2896f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20332-incorrect-authorization-in-cisco-ci-a90f8028</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20332%3A%20Incorrect%20Authorization%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=689383b3ad5a09ad00f28975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20331-improper-neutralization-of-script-r-d734165e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20331%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=689383b3ad5a09ad00f28972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53786-cwe-287-improper-authentication-in--6e0d1575</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53786%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68938029ad5a09ad00f27bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8244-cwe-367-time-of-check-time-of-use-to-e0f63742</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8244%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Go%20standard%20library%20path%2Ffilepath&amp;severity=low&amp;id=69091538c28fd46ded7ba9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48394-cwe-22-improper-limitation-of-a-pat-95887e81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48394%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eaton%20G4%20PDU&amp;severity=medium&amp;id=68937922ad5a09ad00f257af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48393-cwe-295-improper-certificate-valida-ad9161bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48393%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Eaton%20G4%20PDU&amp;severity=medium&amp;id=68937922ad5a09ad00f257ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2028-cwe-295-improper-certificate-validat-8d401122</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2028%3A%20CWE-295%3A%20Improper%20Certificate%20Validation.%20in%20checkpoint%20Check%20Point%20Management%20Log%20Server&amp;severity=medium&amp;id=68936e98ad5a09ad00f216dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36020-cwe-319-in-ibm-guardium-data-protec-a5f7d054</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36020%3A%20CWE-319%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=68936b11ad5a09ad00f1e91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8616-cwe-294-authentication-bypass-by-cap-89e3f59e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8616%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20OpenText%20Advanced%20Authentication&amp;severity=medium&amp;id=68936409ad5a09ad00f1c8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3354-cwe-122-heap-based-buffer-overflow-i-2a2833a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3354%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20IBM%20Tivoli%20Monitoring&amp;severity=high&amp;id=6893608bad5a09ad00f1b804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3320-cwe-122-heap-based-buffer-overflow-i-c82f913a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3320%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20IBM%20Tivoli%20Monitoring&amp;severity=high&amp;id=6893608bad5a09ad00f1b801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23335-cwe-191-integer-underflow-wrap-or-w-c81f1760</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23335%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=6893527aad5a09ad00f16588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23334-cwe-125-out-of-bounds-read-in-nvidi-82c33eb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23334%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=6893527aad5a09ad00f16583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23333-cwe-125-out-of-bounds-read-in-nvidi-7b4577c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23333%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=6893527aad5a09ad00f1657e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pbs-confirms-data-breach-after-employee-info-leake-286e6493</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PBS%20confirms%20data%20breach%20after%20employee%20info%20leaked%20on%20Discord%20servers&amp;severity=high&amp;id=68934ef0ad5a09ad00f14e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23331-cwe-789-memory-allocation-with-exce-7a111b0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23331%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=6893527aad5a09ad00f16579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23327-cwe-190-integer-overflow-or-wraparo-525e4dcf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23327%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=6893527aad5a09ad00f16574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23326-cwe-680-integer-overflow-to-buffer--3ad105af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23326%3A%20CWE-680%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=6893527aad5a09ad00f1656f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-fixed-two-qualcomm-bugs-that-were-actively--449d536a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20fixed%20two%20Qualcomm%20bugs%20that%20were%20actively%20exploited%20in%20the%20wild&amp;severity=medium&amp;id=68934ef0ad5a09ad00f14e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23325-cwe-674-uncontrolled-recursion-in-n-bba1a525</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23325%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f16558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-d-link-cameras-and-network-video-reco-a85d22a8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20D-Link%20cameras%20and%20Network%20Video%20Recorder%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68934ef0ad5a09ad00f14e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23324-cwe-190-integer-overflow-or-wraparo-f39f8e04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23324%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f16553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23323-cwe-190-integer-overflow-or-wraparo-fa2adbc3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23323%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f1654e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23322-cwe-415-double-free-in-nvidia-trito-956b1327</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23322%3A%20CWE-415%20Double%20Free%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f16549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23321-cwe-369-divide-by-zero-in-nvidia-tr-15123ef7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23321%3A%20CWE-369%20Divide%20By%20Zero%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f16544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23320-cwe-209-generation-of-error-message-b82265b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23320%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f1653f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23319-cwe-805-buffer-access-with-incorrec-2d147935</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23319%3A%20CWE-805%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f1653a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23318-cwe-805-buffer-access-with-incorrec-cc0cdfb8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23318%3A%20CWE-805%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f16535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/klm-airlines-confirms-customer-data-breach-linked--089845f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KLM%20Airlines%20Confirms%20Customer%20Data%20Breach%20Linked%20to%20Third-Party%20System&amp;severity=high&amp;id=68934ef0ad5a09ad00f14e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23317-cwe-122-heap-based-buffer-overflow--80af4f76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23317%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=critical&amp;id=68935279ad5a09ad00f16530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23311-cwe-121-stack-based-buffer-overflow-ae1e1740</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23311%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=critical&amp;id=68935279ad5a09ad00f1652b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23310-cwe-121-stack-based-buffer-overflow-000c9406</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23310%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=critical&amp;id=68934f36ad5a09ad00f14f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5197-cwe-1333-inefficient-regular-express-976fe9e1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5197%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=68934465ad5a09ad00f11e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46391-cwe-284-improper-access-control-in--23332a3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46391%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Emby%20MediaBrowser&amp;severity=medium&amp;id=689339d9ad5a09ad00f0a492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46390-cwe-204-observable-response-discrep-3050d072</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46390%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Emby%20MediaBrowser&amp;severity=high&amp;id=68933655ad5a09ad00f09819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46389-cwe-620-unverified-password-change--8b2e89c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46389%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20Emby%20MediaBrowser&amp;severity=medium&amp;id=68933655ad5a09ad00f09816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46388-cwe-200-exposure-of-sensitive-infor-355e5377</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46388%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Emby%20MediaBrowser&amp;severity=medium&amp;id=68933655ad5a09ad00f09813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46387-cwe-639-authorization-bypass-throug-e3e9a2cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46387%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Emby%20MediaBrowser&amp;severity=high&amp;id=6893f49cad5a09ad00f57e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46386-cwe-639-authorization-bypass-throug-55c5fa64</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46386%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Emby%20MediaBrowser&amp;severity=high&amp;id=68932f4fad5a09ad00f06d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6013-cwe-156-improper-neutralization-of-w-518b0128</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6013%3A%20CWE-156%3A%20Improper%20Neutralization%20of%20Whitespace%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=68932bc9ad5a09ad00f05f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22470-unrestricted-upload-of-file-with-da-07d4b7c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22470%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20SATO%20Corporation%20CL4%2F6NX%20Plus&amp;severity=critical&amp;id=68932845ad5a09ad00f04b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22469-improper-neutralization-of-special--712818f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22469%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SATO%20Corporation%20CL4%2F6NX%20Plus&amp;severity=high&amp;id=68932845ad5a09ad00f04b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7771-cwe-782-exposed-ioctl-with-insuffici-c952e5ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7771%3A%20CWE-782%3A%20Exposed%20IOCTL%20with%20Insufficient%20Access%20Control%20in%20TechPowerUp%20ThrottleStop&amp;severity=high&amp;id=689324c5ad5a09ad00f03d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8620-cwe-200-exposure-of-sensitive-inform-6df3003c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8620%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=6893213dad5a09ad00f0266e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8556-improper-verification-of-cryptograph-f659df6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8556%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input&amp;severity=low&amp;id=68931a35ad5a09ad00efd766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7202-cwe-352-cross-site-request-forgery-c-303d9f17</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7202%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Elgato%20Key%20Light&amp;severity=medium&amp;id=689316b1ad5a09ad00efb4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47324-cwe-1230-exposure-of-sensitive-info-86b038f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47324%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a4ad5a09ad00ef020d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27076-cwe-367-time-of-check-time-of-use-t-62387aff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27076%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a4ad5a09ad00ef020a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27075-cwe-129-improper-validation-of-arra-420a599e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27075%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a4ad5a09ad00ef0207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27073-cwe-617-reachable-assertion-in-qual-64917195</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27073%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a4ad5a09ad00ef0204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27072-cwe-120-buffer-copy-without-checkin-867bfd5b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27072%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=689308a3ad5a09ad00ef01f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27071-cwe-120-buffer-copy-without-checkin-dfcc4c38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27071%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27069-cwe-822-untrusted-pointer-dereferen-44c6213a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27069%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27068-cwe-126-buffer-over-read-in-qualcom-7ea8cef3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27068%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27067-cwe-129-improper-validation-of-arra-2cd05d44</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27067%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27066-cwe-617-reachable-assertion-in-qual-b7d8d90f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27066%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27065-cwe-126-buffer-over-read-in-qualcom-3acd67de</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27065%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27062-cwe-284-improper-access-control-in--f7d9e76f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27062%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21477-cwe-20-improper-input-validation-in-78670fb6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21477%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21474-cwe-416-use-after-free-in-qualcomm--7ff120bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21474%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21473-cwe-367-time-of-check-time-of-use-t-82001110</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21473%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21472-cwe-489-leftover-debug-code-in-qual-26e9909e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21472%3A%20CWE-489%20Leftover%20Debug%20Code%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=689308a3ad5a09ad00ef01cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21465-cwe-125-out-of-bounds-read-in-qualc-7bd21e2c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21465%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=689308a3ad5a09ad00ef01c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21464-cwe-125-out-of-bounds-read-in-qualc-94049b68</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21464%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=689308a3ad5a09ad00ef01c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21461-cwe-787-out-of-bounds-write-in-qual-941e470b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21461%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21458-cwe-416-use-after-free-in-qualcomm--e575fd20</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21458%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21457-cwe-126-buffer-over-read-in-qualcom-4eabb2b9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21457%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=689308a3ad5a09ad00ef01bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21456-cwe-416-use-after-free-in-qualcomm--16e16224</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21456%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21455-cwe-367-time-of-check-time-of-use-t-4b5fb3dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21455%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21452-cwe-617-reachable-assertion-in-qual-43966bd0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21452%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a2ad5a09ad00ef01b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7727-cwe-79-improper-neutralization-of-in-1ac915d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20%E2%80%93%20Ultimate%20WordPress%20FSE%20Blocks%20Addons%20%26%20Ecosystem&amp;severity=medium&amp;id=6892fa91ad5a09ad00eea6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7376-cwe-64-windows-shortcut-following-ln-ad1884be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7376%3A%20CWE-64%20Windows%20Shortcut%20Following%20(.LNK)%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=medium&amp;id=6892fa91ad5a09ad00eea6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21024-cwe-927-use-of-implicit-intent-for--892ea7a2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21024%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Smart%20View&amp;severity=low&amp;id=6892de73ad5a09ad00ee2074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21023-cwe-284-improper-access-control-in--c52160a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21023%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20WcsExtension%20for%20Galaxy%20Watch&amp;severity=low&amp;id=6892de73ad5a09ad00ee2071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21022-cwe-284-improper-access-control-in--01045b44</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21022%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Galaxy%20Wearable&amp;severity=low&amp;id=6892de73ad5a09ad00ee206e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21021-cwe-787-out-of-bounds-write-in-sams-4ae7cf6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21021%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Blockchain%20Keystore&amp;severity=medium&amp;id=6892de73ad5a09ad00ee206b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21020-cwe-787-out-of-bounds-write-in-sams-6699ece7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21020%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Blockchain%20Keystore&amp;severity=medium&amp;id=6892de73ad5a09ad00ee2068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21019-cwe-285-improper-authorization-in-s-ddffd9bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21019%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Health&amp;severity=medium&amp;id=6892de73ad5a09ad00ee2065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21018-cwe-125-out-of-bounds-read-in-samsu-bec02970</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21018%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Blockchain%20Keystore&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21017-cwe-787-out-of-bounds-write-in-sams-38e19fec</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21017%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Blockchain%20Keystore&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21016-cwe-284-improper-access-control-in--cd52b4e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21016%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21015-cwe-22-improper-limitation-of-a-pat-21c78d02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21015%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(%26%2339%3BPath%20Traversal%26%2339%3B)%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee204f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21014-cwe-926-improper-export-of-android--dd73e575</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21014%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee204c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21013-cwe-284-improper-access-control-in--10fbd590</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21013%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21012-cwe-284-improper-access-control-in--cb1fd2e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21012%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21011-cwe-284-improper-access-control-in--9799458a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21011%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21010-cwe-269-improper-privilege-manageme-d9d54add</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21010%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20990-cwe-284-improper-access-control-in--6d8243d8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20990%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee203d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6994-cwe-269-improper-privilege-managemen-41919379</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6994%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SmartDataSoft%20Reveal%20Listing&amp;severity=critical&amp;id=6892d3e8ad5a09ad00edee9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7399-cwe-79-improper-neutralization-of-in-f8c963e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=6892d3e8ad5a09ad00edee9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7498-cwe-79-improper-neutralization-of-in-72262fad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6892d3e8ad5a09ad00edeea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8100-cwe-79-improper-neutralization-of-in-6663deff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8100%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6892d3e8ad5a09ad00edeea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54651-cwe-362-concurrent-execution-using--e8bdea5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54651%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54650-cwe-129-improper-validation-of-arra-4424498c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54650%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54649-cwe-843-access-of-resource-using-in-fe842863</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54649%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54648-cwe-125-out-of-bounds-read-in-huawe-5f792999</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54648%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54647-cwe-125-out-of-bounds-read-in-huawe-75efd518</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54647%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54646-cwe-130-improper-handling-of-length-8786f10f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54646%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54645-cwe-129-improper-validation-of-arra-0293a3db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54645%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54644-cwe-125-out-of-bounds-read-in-huawe-070a4d54</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54644%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54643-cwe-125-out-of-bounds-read-in-huawe-987f4c52</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54643%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54642-cwe-20-improper-input-validation-in-faa1f0c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54642%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54641-cwe-20-improper-input-validation-in-0bb0c56e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54641%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54640-cwe-502-deserialization-of-untruste-79d7e90c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54640%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54639-cwe-502-deserialization-of-untruste-497ddb86</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54639%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54638-cwe-502-deserialization-of-untruste-223884c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54638%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54637-cwe-125-out-of-bounds-read-in-huawe-f9c907ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54637%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54636-cwe-20-improper-input-validation-in-7cd8cd52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54636%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54635-cwe-416-use-after-free-in-huawei-ha-c4b4f8ca</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54635%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8420-cwe-95-improper-neutralization-of-di-27368f94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8420%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20emarket-design%20Campus%20Directory%20%E2%80%93%20Faculty%2C%20Staff%20%26%20Student%20Directory%20Plugin%20for%20WordPress&amp;severity=high&amp;id=6892c252ad5a09ad00edba4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8595-cwe-862-missing-authorization-in-the-ff3f7681</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8595%3A%20CWE-862%20Missing%20Authorization%20in%20themegrill%20Zakra&amp;severity=medium&amp;id=6892c252ad5a09ad00edba4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54634-cwe-755-improper-handling-of-except-d14a64e5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54634%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892c252ad5a09ad00edba3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54633-cwe-125-out-of-bounds-read-in-huawe-cd009357</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54633%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54632-cwe-120-buffer-copy-without-checkin-a861c464</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54632%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54631-cwe-190-integer-overflow-or-wraparo-2eceea5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54631%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54630-cwe-122-heap-based-buffer-overflow--aa761926</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54630%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54629-cwe-362-concurrent-execution-using--1c46d1ce</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54629%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54628-cwe-118-incorrect-access-of-indexab-145e729f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54628%3A%20CWE-118%20Incorrect%20Access%20of%20Indexable%20Resource%20(&apos;Range%20Error&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54627-cwe-787-out-of-bounds-write-in-huaw-a51510ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54627%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892c252ad5a09ad00edba1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54625-cwe-414-missing-lock-check-in-huawe-bbdfef06</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54625%3A%20CWE-414%20Missing%20Lock%20Check%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54626-cwe-416-use-after-free-in-huawei-ha-067294f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54626%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54624-cwe-275-permission-issues-in-huawei-e1d9dbe3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54624%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7502-cwe-79-improper-neutralization-of-in-ab8e87fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6986-cwe-89-improper-neutralization-of-sp-1e6fc228</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6986%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6256-cwe-79-improper-neutralization-of-in-f5138f64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6256%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dragwp%20Flex%20Guten%20%E2%80%93%20Multile%20Blocks&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6690-cwe-79-improper-neutralization-of-in-c5d666b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20archaeopath%20WP%20Tournament%20Registration&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7036-cwe-89-improper-neutralization-of-sp-eca724f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7036%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cleverreach43%20CleverReach%C2%AE%20WP&amp;severity=high&amp;id=6892b7caad5a09ad00ed7e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6259-cwe-79-improper-neutralization-of-in-fe07ea39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20geoplay9%20esri-map-view&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54623-cwe-680-integer-overflow-to-buffer--607ccec5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54623%3A%20CWE-680%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54622-cwe-305-authentication-bypass-by-pr-17e64e35</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54622%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892b7c9ad5a09ad00ed7de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54621-cwe-664-improper-control-of-a-resou-7fc146d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54621%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54620-cwe-502-deserialization-of-untruste-9467d573</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54620%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54619-cwe-664-improper-control-of-a-resou-5a31fdeb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54619%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54618-cwe-275-permission-issues-in-huawei-8b679e9e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54618%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54617-cwe-121-stack-based-buffer-overflow-c8697d55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54617%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54616-cwe-787-out-of-bounds-write-in-huaw-5953ee71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54616%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54615-cwe-200-exposure-of-sensitive-infor-b9d0a887</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54615%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54614-cwe-20-improper-input-validation-in-17125b69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54614%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54613-cwe-664-improper-control-of-a-resou-061e07cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54613%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54612-cwe-664-improper-control-of-a-resou-125c5aa3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54612%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8656-cwe-693-protection-mechanism-failure-f9c48433</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8656%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8655-cwe-78-improper-neutralization-of-sp-b249d23a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8655%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8654-cwe-78-improper-neutralization-of-sp-c64c597c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8654%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=high&amp;id=6892b7cbad5a09ad00ed7e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8653-cwe-121-stack-based-buffer-overflow--c2a21eb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8653%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Kenwood%20DMX958XR&amp;severity=high&amp;id=6892b7cbad5a09ad00ed7e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8652-cwe-78-improper-neutralization-of-sp-d82c573e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8652%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8651-cwe-78-improper-neutralization-of-sp-9bf453cf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8651%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8650-cwe-78-improper-neutralization-of-sp-e6600214</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8650%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8649-cwe-78-improper-neutralization-of-sp-9c00b14f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8649%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54611-cwe-840-business-logic-errors-in-hu-3fa8bab9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54611%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892b7c9ad5a09ad00ed7db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8648-cwe-78-improper-neutralization-of-sp-71e7beea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8648%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8647-cwe-78-improper-neutralization-of-sp-0eb0965d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8647%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8646-cwe-78-improper-neutralization-of-sp-d4997cd8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8646%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8645-cwe-78-improper-neutralization-of-sp-0e583196</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8645%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8644-cwe-78-improper-neutralization-of-sp-7e4c48b0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8644%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8643-cwe-78-improper-neutralization-of-sp-67c5df54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8643%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8642-cwe-78-improper-neutralization-of-sp-590f060d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8642%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8641-cwe-78-improper-neutralization-of-sp-cad994d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8641%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8640-cwe-78-improper-neutralization-of-sp-a01117fa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8640%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8639-cwe-78-improper-neutralization-of-sp-fc3baa20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8639%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8638-cwe-78-improper-neutralization-of-sp-0d07bcfc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8638%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8637-cwe-78-improper-neutralization-of-sp-32d2c1fe</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8637%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8636-cwe-78-improper-neutralization-of-sp-dae2adea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8636%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8635-cwe-78-improper-neutralization-of-sp-cd2015b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8635%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8634-cwe-78-improper-neutralization-of-sp-7c6b0279</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8634%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8633-cwe-78-improper-neutralization-of-sp-a2dbaabf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8633%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8632-cwe-78-improper-neutralization-of-sp-c05f26ab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8632%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8631-cwe-78-improper-neutralization-of-sp-53b1d9e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8631%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8630-cwe-78-improper-neutralization-of-sp-a1d971d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8630%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8629-cwe-78-improper-neutralization-of-sp-f01f845b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8629%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8628-cwe-78-improper-neutralization-of-sp-42dd5ba1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8628%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54610-cwe-129-improper-validation-of-arra-f113dada</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54610%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54609-cwe-125-out-of-bounds-read-in-huawe-f22c229d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54609%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54608-cwe-264-permissions-privileges-and--414cb133</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54608%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54607-cwe-295-improper-certificate-valida-cfffb3aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54607%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892b7c9ad5a09ad00ed7dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54606-cwe-840-business-logic-errors-in-hu-a8d55f7d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54606%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892b7c9ad5a09ad00ed7da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54655-cwe-367-time-of-check-time-of-use-t-7ba5e2ac</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54655%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892ad39ad5a09ad00eceaad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54653-cwe-22-improper-limitation-of-a-pat-78948cab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54653%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892ad39ad5a09ad00eceaaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54652-cwe-22-improper-limitation-of-a-pat-4c452eb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54652%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892ad39ad5a09ad00eceaa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51532-na-03976521</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51532%3A%20n%2Fa&amp;severity=high&amp;id=6893f49cad5a09ad00f57e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-06-65435d4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-06&amp;severity=medium&amp;id=6893f09dad5a09ad00f54837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51057-na-81d0481d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51057%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf75ad5a09ad00f4093d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51056-na-03fb2e28</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51056%3A%20n%2Fa&amp;severity=high&amp;id=6893bf75ad5a09ad00f40939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51055-na-3dc7ce5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51055%3A%20n%2Fa&amp;severity=high&amp;id=6893bf75ad5a09ad00f40935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51054-na-688d368b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51054%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf74ad5a09ad00f40923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51052-na-a278df8f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51052%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf74ad5a09ad00f4091f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50740-na-6aabe586</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50740%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf74ad5a09ad00f4091b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51053-na-fb238e9a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51053%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf74ad5a09ad00f40914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51058-na-70af963a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51058%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf74ad5a09ad00f40904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46660-na-f33f7249</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46660%3A%20n%2Fa&amp;severity=medium&amp;id=6893bbeead5a09ad00f3eac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46659-na-75e25906</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46659%3A%20n%2Fa&amp;severity=high&amp;id=6893b8a7ad5a09ad00f3c168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51624-na-c3cd3142</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51624%3A%20n%2Fa&amp;severity=high&amp;id=6893b15fad5a09ad00f39dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45764-na-8f0fc216</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45764%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20jsrsasign%20project%20jsrsasign&amp;severity=low&amp;id=6893b15fad5a09ad00f39db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45766-na-f7090b25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45766%3A%20n%2Fa&amp;severity=high&amp;id=6893adfcad5a09ad00f396a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30127-na-6706d9aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30127%3A%20n%2Fa&amp;severity=critical&amp;id=68938ab5ad5a09ad00f29f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51531-na-af80981e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51531%3A%20n%2Fa&amp;severity=medium&amp;id=68937ca5ad5a09ad00f26742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50234-na-27c9fbbd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50234%3A%20n%2Fa&amp;severity=medium&amp;id=68937219ad5a09ad00f23539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51308-na-bd6d41fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51308%3A%20n%2Fa&amp;severity=medium&amp;id=68936e98ad5a09ad00f216d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51306-na-9e741c4c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51306%3A%20n%2Fa&amp;severity=medium&amp;id=68936e98ad5a09ad00f216d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50233-na-b2631502</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50233%3A%20n%2Fa&amp;severity=medium&amp;id=68936e98ad5a09ad00f216ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50286-na-da3c9abe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50286%3A%20n%2Fa&amp;severity=high&amp;id=68936b11ad5a09ad00f1e91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51040-na-70395ffe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51040%3A%20n%2Fa&amp;severity=high&amp;id=6893678dad5a09ad00f1dae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54872-cwe-798-use-of-hard-coded-credentia-6a2ada64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54872%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Vessel9817%20onion-site-template&amp;severity=high&amp;id=68929ba5ad5a09ad00ec79ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54571-cwe-252-unchecked-return-value-in-o-bfee7e94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54571%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20owasp-modsecurity%20ModSecurity&amp;severity=medium&amp;id=68929821ad5a09ad00ec5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54884-cwe-400-uncontrolled-resource-consu-b32a8ac7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54884%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20DavidOsipov%20Vision-ui&amp;severity=high&amp;id=68929821ad5a09ad00ec5aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54883-cwe-338-use-of-cryptographically-we-53edbc77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54883%3A%20CWE-338%3A%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20DavidOsipov%20Vision-ui&amp;severity=critical&amp;id=68929821ad5a09ad00ec5ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54876-cwe-522-insufficiently-protected-cr-977973c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54876%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20JanssenProject%20jans&amp;severity=medium&amp;id=68929821ad5a09ad00ec5ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54869-cwe-770-allocation-of-resources-wit-e60f5d94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54869%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Setasign%20FPDI&amp;severity=medium&amp;id=68929821ad5a09ad00ec5adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54801-cwe-789-memory-allocation-with-exce-a00aae97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54801%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20gofiber%20fiber&amp;severity=high&amp;id=68929821ad5a09ad00ec5adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54594-cwe-269-improper-privilege-manageme-9aec1db3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54594%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20callstackincubator%20react-native-bottom-tabs&amp;severity=critical&amp;id=68929821ad5a09ad00ec5ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54125-cwe-359-exposure-of-private-persona-3b4e1873</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54125%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=6892949dad5a09ad00ec4d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54124-cwe-359-exposure-of-private-persona-13bec42c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54124%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=6892949dad5a09ad00ec4d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32430-cwe-79-improper-neutralization-of-i-1a127c96</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32430%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=6892949dad5a09ad00ec4d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53534-cwe-305-authentication-bypass-by-pr-0de6282c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53534%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20tnb-labs%20panel&amp;severity=high&amp;id=689274f9ad5a09ad00ebcf08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8586-null-pointer-dereference-in-libav-c3935ef0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8586%3A%20NULL%20Pointer%20Dereference%20in%20libav&amp;severity=medium&amp;id=689243c1ad5a09ad00eabe40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8585-double-free-in-libav-e17b98fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8585%3A%20Double%20Free%20in%20libav&amp;severity=medium&amp;id=68923cb9ad5a09ad00ea9c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54253-misconfiguration-sub-domain-takeove-c5fe6fc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54253%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=68923937ad5a09ad00ea8614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54254-improper-restriction-of-xml-externa-99118bce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54254%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=high&amp;id=68923937ad5a09ad00ea8617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7674-cwe-20-improper-input-validation-in--af5f45f2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7674%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Roche%20Diagnostics%20navify%20Monitoring&amp;severity=high&amp;id=68923937ad5a09ad00ea861a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-dell-laptop-models-plagued-by-vulnerabili-81f3877f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20Dell%20Laptop%20Models%20Plagued%20by%20Vulnerabilities%20Impacting%20Millions&amp;severity=medium&amp;id=689235b0ad5a09ad00ea7511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8584-null-pointer-dereference-in-libav-35e2b02e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8584%3A%20NULL%20Pointer%20Dereference%20in%20libav&amp;severity=medium&amp;id=689235bbad5a09ad00ea7538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/odoomap-a-pentesting-tool-for-odoo-applications-d7bf6e04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OdooMap%20-%20A%20Pentesting%20Tool%20for%20Odoo%20Applications&amp;severity=high&amp;id=68922b26ad5a09ad00ea38f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-discloses-data-breach-impacting-ciscocom-use-06e8a4c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20discloses%20data%20breach%20impacting%20Cisco.com%20user%20accounts&amp;severity=high&amp;id=6892241cad5a09ad00ea1193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2611-cwe-20-improper-input-validation-in--684b7c60</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2611%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ICT%20Innovations%20ICTBroadcast&amp;severity=critical&amp;id=68921d1ead5a09ad00e9dd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pandora-cyber-attack-exposes-customer-data-via-thi-b66a0bba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pandora%20Cyber%20Attack%20Exposes%20Customer%20Data%20Via%20Third-Party%20Vendor&amp;severity=medium&amp;id=68921d13ad5a09ad00e9dd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27931-cwe-125-out-of-bounds-read-in-pdf-x-37a85cdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27931%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20Co.%20Ltd%20PDF-XChange%20Editor&amp;severity=medium&amp;id=68921d1ead5a09ad00e9dd9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47152-cwe-125-out-of-bounds-read-in-pdf-x-616dc610</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47152%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20Co.%20Ltd%20PDF-XChange%20Editor&amp;severity=medium&amp;id=68921d1ead5a09ad00e9dda1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54874-cwe-457-use-of-uninitialized-variab-aa551e72</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54874%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20uclouvain%20openjpeg&amp;severity=medium&amp;id=68921990ad5a09ad00e9cbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46958-cross-site-scripting-stored-xss-cwe-5e841f26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46958%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68921990ad5a09ad00e9cbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7033-cwe-122-heap-based-buffer-overflow-i-12551399</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7033%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Rockwell%20Automation%20Arena%C2%AE%20Simulation&amp;severity=high&amp;id=68920f04ad5a09ad00e98d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7032-cwe-121-stack-based-buffer-overflow--5f298c62</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7032%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Rockwell%20Automation%20Arena%C2%AE%20Simulation&amp;severity=high&amp;id=68920f04ad5a09ad00e98d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7025-cwe-122-heap-based-buffer-overflow-i-ce512681</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7025%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Rockwell%20Automation%20Arena%C2%AE%20Simulation&amp;severity=high&amp;id=68920f04ad5a09ad00e98cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bumblebee-malware-seo-poisoning-campaign-leads-to--2021b0d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bumblebee%20Malware%20SEO%20Poisoning%20Campaign%20Leads%20to%20Akira%20Ransomware%20Deployment&amp;severity=medium&amp;id=68920b7fad5a09ad00e96eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smart-contract-scams-ethereum-drainers-pose-as-tra-edc7d78c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Smart%20Contract%20Scams%20%7C%20Ethereum%20Drainers%20Pose%20as%20Trading%20Bots%20to%20Steal%20Crypto&amp;severity=medium&amp;id=68920b7fad5a09ad00e96ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54987-cwe-78-os-command-injection-in-tren-c8afde18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54987%3A%20CWE-78%3A%20OS%20Command%20Injection%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=critical&amp;id=68920478ad5a09ad00e931cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54948-cwe-78-os-command-injection-in-tren-77a5ba25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54948%3A%20CWE-78%3A%20OS%20Command%20Injection%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=critical&amp;id=68920478ad5a09ad00e931c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-investigating-potential-ssl-vpn-zero-day-e6390304</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Investigating%20Potential%20SSL%20VPN%20Zero-Day%20After%2020%2B%20Targeted%20Attacks%20Reported&amp;severity=critical&amp;id=6891f666ad5a09ad00e8e502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/15000-fake-tiktok-shop-domains-deliver-malware-ste-8c6fbc42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=15%2C000%20Fake%20TikTok%20Shop%20Domains%20Deliver%20Malware%2C%20Steal%20Crypto%20via%20AI-Driven%20Scam%20Campaign&amp;severity=high&amp;id=6891f667ad5a09ad00e8e50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-gets-patches-for-qualcomm-flaws-exploited--94fd5c6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20gets%20patches%20for%20Qualcomm%20flaws%20exploited%20in%20attacks&amp;severity=high&amp;id=6891f667ad5a09ad00e8e50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-cdn-link-abused-to-deliver-rat-disguised-a-1364b587</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20CDN%20Link%20Abused%20to%20Deliver%20RAT%20Disguised%20as%20OneDrive%20File&amp;severity=medium&amp;id=6891f2e0ad5a09ad00e8d12e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8555-cross-site-scripting-in-atjiu-pybbs-7d1d957b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8555%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891d33dad5a09ad00e7f799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8554-cross-site-scripting-in-atjiu-pybbs-f31ddea6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8554%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891cc35ad5a09ad00e7c8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8553-cross-site-scripting-in-atjiu-pybbs-7353c96c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8553%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891c52dad5a09ad00e7a391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2810-cwe-321use-of-hard-coded-cryptograph-b1233ff4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2810%3A%20CWE-321%3AUse%20of%20Hard-coded%20Cryptographic%20Key%20in%20Draeger%20Draeger%20ICMHelper&amp;severity=medium&amp;id=6891be25ad5a09ad00e76e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41698-cwe-862-missing-authorization-in-dr-3a81b3c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41698%3A%20CWE-862%20Missing%20Authorization%20in%20Draeger%20Draeger%20ICMHelper&amp;severity=high&amp;id=6891be25ad5a09ad00e76e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8552-cross-site-scripting-in-atjiu-pybbs-80b4e460</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8552%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891be25ad5a09ad00e76e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8551-cross-site-scripting-in-atjiu-pybbs-f4236500</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8551%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891b71dad5a09ad00e73ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8294-cwe-79-improper-neutralization-of-in-c2e2125b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8294%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anatolyk%20Download%20Counter&amp;severity=medium&amp;id=6891b39aad5a09ad00e72779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8295-cwe-79-improper-neutralization-of-in-7969fb3d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Employee%20Directory%20%E2%80%93%20Staff%20%26%20Team%20Directory&amp;severity=medium&amp;id=6891b39aad5a09ad00e7277e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5061-cwe-434-unrestricted-upload-of-file--02e23663</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5061%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20vjinfotech%20WP%20Import%20Export%20Lite&amp;severity=high&amp;id=6891b39aad5a09ad00e7276d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6207-cwe-434-unrestricted-upload-of-file--5586e469</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6207%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20vjinfotech%20WP%20Import%20Export%20Lite&amp;severity=high&amp;id=6891b39aad5a09ad00e72774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8550-cross-site-scripting-in-atjiu-pybbs-ba13c8b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8550%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891b015ad5a09ad00e716d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8313-cwe-79-improper-neutralization-of-in-3f76d428</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Campus%20Directory%20%E2%80%93%20Faculty%2C%20Staff%20%26%20Student%20Directory%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=6891ac91ad5a09ad00e6f49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7050-cwe-79-improper-neutralization-of-in-a383147c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7050%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Cloud%20Plugins%2F_deleeuw_%20Use-your-Drive%20%7C%20Google%20Drive%20plugin%20for%20WordPress&amp;severity=high&amp;id=6891ac91ad5a09ad00e6f49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8315-cwe-79-improper-neutralization-of-in-8b5f374a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8315%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Simple%20Contact%20Form%20Plugin%20for%20WordPress%20%E2%80%93%20WP%20Easy%20Contact&amp;severity=medium&amp;id=6891ac91ad5a09ad00e6f4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8549-weak-password-requirements-in-atjiu--463eb24b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8549%3A%20Weak%20Password%20Requirements%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891ac91ad5a09ad00e6f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8548-information-exposure-through-error-m-c9bf3597</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8548%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891a206ad5a09ad00e6b199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54982-cwe-347-improper-verification-of-cr-e9f16fd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54982%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Zscaler%20Authentication%20Server&amp;severity=critical&amp;id=68919afdad5a09ad00e6183f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8547-improper-authorization-in-atjiu-pybb-a3bf3c6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8547%3A%20Improper%20Authorization%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=68919afdad5a09ad00e61842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8546-guessable-captcha-in-atjiu-pybbs-21f58e3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8546%3A%20Guessable%20CAPTCHA%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=689193f5ad5a09ad00e5f194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54868-cwe-285-improper-authorization-in-d-f6918ba5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54868%3A%20CWE-285%3A%20Improper%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=68919071ad5a09ad00e5ca58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8545-cross-site-scripting-in-portabilis-i-cc163e6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8545%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68918ceead5a09ad00e5be0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8544-cross-site-scripting-in-portabilis-i-911e334d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8544%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=6891896aad5a09ad00e5ae11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8543-cross-site-scripting-in-portabilis-i-1b0bc688</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8543%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68918261ad5a09ad00e581cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8542-cross-site-scripting-in-portabilis-i-7b91b2cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8542%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68917b59ad5a09ad00e5629d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8541-cross-site-scripting-in-portabilis-i-c02bc01a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8541%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=689170dcad5a09ad00e51c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53417-cwe-35-path-traversal-in-delta-elec-57577d11</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53417%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Delta%20Electronics%20DIAView&amp;severity=critical&amp;id=689170dcad5a09ad00e51c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8540-cross-site-scripting-in-portabilis-i-1fc9bd53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8540%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=689170dcad5a09ad00e51c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8539-cross-site-scripting-in-portabilis-i-de9edaf2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8539%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68916641ad5a09ad00e4ef0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8538-cross-site-scripting-in-portabilis-i-0afe6b8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8538%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68915bd6ad5a09ad00e4ac2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8537-allocation-of-resources-in-axiomatic-8871ee14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8537%3A%20Allocation%20of%20Resources%20in%20Axiomatic%20Bento4&amp;severity=medium&amp;id=689154afad5a09ad00e46829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53544-cwe-307-improper-restriction-of-exc-3f0ee582</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53544%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20TriliumNext%20Trilium&amp;severity=high&amp;id=689154aead5a09ad00e467e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54387-cwe-22-improper-limitation-of-a-pat-4f7f0a2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54387%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20unjs%20ipx&amp;severity=medium&amp;id=689154aead5a09ad00e467e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54780-cwe-73-external-control-of-file-nam-7e0296d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54780%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20cconard96%20glpi-screenshot-plugin&amp;severity=high&amp;id=689154aead5a09ad00e467ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54794-cwe-22-improper-limitation-of-a-pat-3ad6897f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54794%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=689154aead5a09ad00e467f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54795-cwe-78-improper-neutralization-of-s-17ad2928</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54795%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=689154aead5a09ad00e467f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54803-cwe-1321-improperly-controlled-modi-f1cbb767</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54803%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sunnyadn%20js-toml&amp;severity=high&amp;id=689154aead5a09ad00e467f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54804-cwe-190-integer-overflow-or-wraparo-835b1103</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54804%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Eugeny%20russh&amp;severity=medium&amp;id=689154aead5a09ad00e467fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54865-cwe-89-improper-neutralization-of-s-d44b1bef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54865%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FTB-Gamepedia%20Tilesheets&amp;severity=high&amp;id=689154aead5a09ad00e467ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54871-cwe-284-improper-access-control-in--1f7106ff</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54871%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20steveseguin%20electroncapture&amp;severity=medium&amp;id=689154aead5a09ad00e46807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54870-cwe-636-not-failing-securely-failin-a0eb4541</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54870%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20leakingmemory%20vtun-ng&amp;severity=high&amp;id=689154aead5a09ad00e46803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8535-cross-site-scripting-in-cronoh-nanov-80fc072b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8535%3A%20Cross%20Site%20Scripting%20in%20cronoh%20NanoVault&amp;severity=medium&amp;id=689154afad5a09ad00e46822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-05-43f3e340</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-05&amp;severity=medium&amp;id=68929f1dad5a09ad00ec8c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52237-na-cbba3e80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52237%3A%20n%2Fa&amp;severity=medium&amp;id=68926df2ad5a09ad00ebac07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51541-na-3908e558</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51541%3A%20n%2Fa&amp;severity=medium&amp;id=68926366ad5a09ad00eb6978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50592-na-b9e18412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50592%3A%20n%2Fa&amp;severity=medium&amp;id=68926366ad5a09ad00eb6973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43979-na-0bd1258f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43979%3A%20n%2Fa&amp;severity=high&amp;id=68926366ad5a09ad00eb696f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52078-na-78b94004</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52078%3A%20n%2Fa&amp;severity=medium&amp;id=68925c5dad5a09ad00eb4bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45512-na-a33713ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45512%3A%20n%2Fa&amp;severity=medium&amp;id=689258dfad5a09ad00eb41f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51060-na-366a0373</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51060%3A%20n%2Fa&amp;severity=medium&amp;id=68924ac9ad5a09ad00eadd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51857-na-d5c1ba38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51857%3A%20n%2Fa&amp;severity=medium&amp;id=68924745ad5a09ad00eacf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50454-na-0d5de574</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50454%3A%20n%2Fa&amp;severity=medium&amp;id=68924745ad5a09ad00eacf5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51627-na-084e70e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51627%3A%20n%2Fa&amp;severity=medium&amp;id=689243c1ad5a09ad00eabe3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50688-na-78c59d29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50688%3A%20n%2Fa&amp;severity=medium&amp;id=689243c1ad5a09ad00eabe37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51628-na-5e902ca5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51628%3A%20n%2Fa&amp;severity=high&amp;id=6892403dad5a09ad00eaaea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43980-na-e1355a61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43980%3A%20n%2Fa&amp;severity=medium&amp;id=68923cb9ad5a09ad00ea9c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43978-na-793a5cd0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43978%3A%20n%2Fa&amp;severity=high&amp;id=68923cb9ad5a09ad00ea9bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46658-na-e90a2716</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46658%3A%20n%2Fa&amp;severity=critical&amp;id=68922428ad5a09ad00ea11dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50707-na-f8c0a6a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50707%3A%20n%2Fa&amp;severity=critical&amp;id=68922098ad5a09ad00e9f6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50706-na-dd3cfc57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50706%3A%20n%2Fa&amp;severity=critical&amp;id=68922098ad5a09ad00e9f6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44964-na-5bf1e9e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44964%3A%20n%2Fa&amp;severity=low&amp;id=68921990ad5a09ad00e9cbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29745-na-415e52d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29745%3A%20n%2Fa&amp;severity=high&amp;id=68921990ad5a09ad00e9cbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8534-null-pointer-dereference-in-libtiff-5c425439</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8534%3A%20NULL%20Pointer%20Dereference%20in%20libtiff&amp;severity=low&amp;id=6891469dad5a09ad00e3d695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8530-use-of-default-credentials-in-elunez-3aeaa471</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8530%3A%20Use%20of%20Default%20Credentials%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68913f95ad5a09ad00e3bedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8529-server-side-request-forgery-in-cloud-f501958f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8529%3A%20Server-Side%20Request%20Forgery%20in%20cloudfavorites%20favorites-web&amp;severity=medium&amp;id=6891388dad5a09ad00e3a763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27211-vulnerability-in-ubiquiti-inc-edgem-f3a98f9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27211%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20EdgeMAX%20EdgeSwitch&amp;severity=high&amp;id=68913509ad5a09ad00e397e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27212-vulnerability-in-ubiquiti-inc-unifi-80139596</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27212%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Access%20Reader%20Pro&amp;severity=critical&amp;id=68913509ad5a09ad00e397ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4604-cwe-79-improper-neutralization-of-in-6d9cdc18</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68913186ad5a09ad00e3622a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8528-cleartext-storage-of-sensitive-infor-691c7488</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8528%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20a%20Cookie%20in%20Exrick%20xboot&amp;severity=medium&amp;id=68913186ad5a09ad00e3622d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7844-cwe-121-in-wolfssl-inc-wolftpm-e19a92f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7844%3A%20CWE-121%20in%20wolfSSL%20Inc.%20wolfTPM&amp;severity=low&amp;id=68912a7dad5a09ad00e3496b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8527-server-side-request-forgery-in-exric-c764fce1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8527%3A%20Server-Side%20Request%20Forgery%20in%20Exrick%20xboot&amp;severity=medium&amp;id=68912a7dad5a09ad00e3496e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4599-cwe-79-improper-neutralization-of-in-ecf04db2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4599%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=low&amp;id=689126f9ad5a09ad00e339fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8526-unrestricted-upload-in-exrick-xboot-8f326641</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8526%3A%20Unrestricted%20Upload%20in%20Exrick%20xboot&amp;severity=medium&amp;id=6891237cad5a09ad00e331bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8525-information-disclosure-in-exrick-xbo-168d89a8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8525%3A%20Information%20Disclosure%20in%20Exrick%20xboot&amp;severity=medium&amp;id=68911c6dad5a09ad00e31796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8524-improper-export-of-android-applicati-bbe6d703</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8524%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Boquan%20DotWallet%20App&amp;severity=medium&amp;id=68911568ad5a09ad00e300c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proton-fixes-authenticator-bug-leaking-totp-secret-711a40e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Proton%20fixes%20Authenticator%20bug%20leaking%20TOTP%20secrets%20in%20logs&amp;severity=high&amp;id=689111e0ad5a09ad00e2f6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-microsoft-365-direct-send-to-send-in-3f57e857</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20Microsoft%20365%20Direct%20Send%20to%20Send%20Internal%20Phishing%20Emails&amp;severity=medium&amp;id=68910ad8ad5a09ad00e2e430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8523-improper-export-of-android-applicati-dec0d781</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8523%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20RiderLike%20Fruit%20Crush-Brain%20App&amp;severity=medium&amp;id=68910e5dad5a09ad00e2ef1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8522-path-traversal-in-givanz-vvvebjs-c97aba2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8522%3A%20Path%20Traversal%20in%20givanz%20Vvvebjs&amp;severity=low&amp;id=68910754ad5a09ad00e2dae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26476-cwe-321-use-of-hard-coded-cryptogra-8eb9fd52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26476%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Dell%20ECS&amp;severity=high&amp;id=689103d1ad5a09ad00e2ca81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21120-cwe-650-trusting-http-permission-me-8fe6d94f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21120%3A%20CWE-650%3A%20Trusting%20HTTP%20Permission%20Methods%20on%20the%20Server%20Side%20in%20Dell%20Avamar%20Server&amp;severity=high&amp;id=6891004dad5a09ad00e2bbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8521-cross-site-scripting-in-givanz-vvveb-dd9f26a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8521%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=6891004dad5a09ad00e2bbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38741-cwe-321-use-of-hard-coded-cryptogra-11800bac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38741%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Dell%20Enterprise%20SONiC%20OS&amp;severity=high&amp;id=6891004dad5a09ad00e2bbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8520-server-side-request-forgery-in-givan-1542c851</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8520%3A%20Server-Side%20Request%20Forgery%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=6890f945ad5a09ad00e2a005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vietnamese-hackers-use-pxa-stealer-hit-4000-ips-an-cb3f4257</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vietnamese%20Hackers%20Use%20PXA%20Stealer%2C%20Hit%204%2C000%20IPs%20and%20Steal%20200%2C000%20Passwords%20Globally&amp;severity=high&amp;id=6890f5c0ad5a09ad00e29445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-plague-linux-malware-stealthily-maintains-ssh--f4da0495</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Plague%20Linux%20malware%20stealthily%20maintains%20SSH%20access&amp;severity=high&amp;id=6890f5c0ad5a09ad00e29441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/northwest-radiologists-data-breach-hits-350000-in--3cba4b04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Northwest%20Radiologists%20data%20breach%20hits%20350%2C000%20in%20Washington&amp;severity=high&amp;id=6890f5c0ad5a09ad00e2944d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nvidia-triton-bugs-let-unauthenticated-attackers-e-3114b96f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NVIDIA%20Triton%20Bugs%20Let%20Unauthenticated%20Attackers%20Execute%20Code%20and%20Hijack%20AI%20Servers&amp;severity=high&amp;id=6890f5c0ad5a09ad00e29449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34147-cwe-78-improper-neutralization-of-s-e7013498</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34147%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6890f23bad5a09ad00e27de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8519-information-disclosure-in-givanz-vvv-c4643539</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8519%3A%20Information%20Disclosure%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=6890f23bad5a09ad00e27df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8518-code-injection-in-givanz-vvveb-85d5d16d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8518%3A%20Code%20Injection%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=6890eb33ad5a09ad00e26aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-vulnerabilities-in-claude-code-a03b4019</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20vulnerabilities%20in%20Claude%20code&amp;severity=medium&amp;id=6890e7bead5a09ad00e2640a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghost-in-the-zip-new-pxa-stealer-and-its-telegram--49ccd191</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ghost%20in%20the%20Zip%20%7C%20New%20PXA%20Stealer%20and%20Its%20Telegram-Powered%20Ecosystem&amp;severity=medium&amp;id=689118e8ad5a09ad00e30c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8517-session-fixiation-in-givanz-vvveb-9155eeb8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8517%3A%20Session%20Fixiation%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=6890dd22ad5a09ad00e23633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-jsceal-malware-targets-millions-via-fake-crypt-c468aa9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20JSCEAL%20Malware%20Targets%20Millions%20via%20Fake%20Crypto%20App%20Ads&amp;severity=medium&amp;id=6890d99dad5a09ad00e22c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38739-cwe-522-insufficiently-protected-cr-a4c277ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38739%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Dell%20Dell%20Digital%20Delivery&amp;severity=high&amp;id=6890d9a9ad5a09ad00e22cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8516-path-traversal-in-kingdee-cloud-star-2752e615</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8516%3A%20Path%20Traversal%20in%20Kingdee%20Cloud-Starry-Sky%20Enterprise%20Edition&amp;severity=medium&amp;id=6890d61aad5a09ad00e21575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5988-cross-site-request-forgery-csrf-in-r-c54a06ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5988%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=6890d297ad5a09ad00e20787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-exploitation-of-sonicwall-vpns-a221b8a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Exploitation%20of%20SonicWall%20VPNs&amp;severity=medium&amp;id=6890cf11ad5a09ad00e1f986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30099-cwe-78-improper-neutralization-of-s-eca64a76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30099%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20Feature%20Release&amp;severity=high&amp;id=6890cb8ead5a09ad00e1ea11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30098-cwe-78-improper-neutralization-of-s-14e2fdc1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30098%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20Feature%20Release&amp;severity=medium&amp;id=6890cb8ead5a09ad00e1ea0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30097-cwe-78-improper-neutralization-of-s-e1f691f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30097%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20Feature%20Release&amp;severity=medium&amp;id=6890c80aad5a09ad00e1d6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30096-cwe-78-improper-neutralization-of-s-28450fac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30096%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20Feature%20Release&amp;severity=medium&amp;id=6890c80aad5a09ad00e1d6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36594-cwe-290-authentication-bypass-by-sp-7d287e67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36594%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Dell%20PowerProtect%20Data%20Domain%20Feature%20Release&amp;severity=critical&amp;id=6890c80aad5a09ad00e1d6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36607-cwe-78-improper-neutralization-of-s-7e264bf0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36607%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6890c103ad5a09ad00e1a780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36606-cwe-78-improper-neutralization-of-s-4452a6f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36606%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6890c103ad5a09ad00e1a77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36605-cwe-79-improper-neutralization-of-i-26534f38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36605%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unity&amp;severity=medium&amp;id=6890c102ad5a09ad00e1a776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36604-cwe-78-improper-neutralization-of-s-5fe815b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36604%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6890c103ad5a09ad00e1a783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legalpwn-attack-tricks-popular-genai-tools-into-mi-30fcb8ab</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LegalPwn%20Attack%20Tricks%20Popular%20GenAI%20Tools%20Into%20Misclassifying%20Malware%20as%20Safe%20Code&amp;severity=medium&amp;id=6890b675ad5a09ad00e0dab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8109-cwe-cwe-280-improper-handling-of-ins-6fe67e9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8109%3A%20CWE%20-%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20(4.15)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=6890b683ad5a09ad00e0db51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/playpraetor-android-trojan-infects-11000-devices-v-d249c16d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlayPraetor%20Android%20Trojan%20Infects%2011%2C000%2B%20Devices%20via%20Fake%20Google%20Play%20Pages%20and%20Meta%20Ads&amp;severity=high&amp;id=6890a4e1ad5a09ad00e06a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lovense-flaws-expose-emails-and-allow-account-take-f33b0c50</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lovense%20flaws%20expose%20emails%20and%20allow%20account%20takeover&amp;severity=medium&amp;id=6890a4e1ad5a09ad00e06a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-offers-1m-for-zero-click-whatsapp-exploit-abd7a4ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20Offers%20%241m%20for%20Zero-Click%20WhatsApp%20Exploit&amp;severity=high&amp;id=6890a4e0ad5a09ad00e06a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitdefender-warns-users-to-update-dahua-cameras-ov-d23e79b9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitdefender%20Warns%20Users%20to%20Update%20Dahua%20Cameras%20Over%20Critical%20Flaws&amp;severity=critical&amp;id=689096d0ad5a09ad00e0414b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8515-information-disclosure-in-intelbras--15c299b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8515%3A%20Information%20Disclosure%20in%20Intelbras%20InControl&amp;severity=low&amp;id=68908fc8ad5a09ad00e01f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0932-cwe-416-use-after-free-in-arm-ltd-bi-dace4ed6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0932%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Bifrost%20GPU%20Userspace%20Driver&amp;severity=medium&amp;id=689088c0ad5a09ad00dffba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lateral-movement-bitlocker-a4093e7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lateral%20Movement%20%E2%80%93%20BitLocker&amp;severity=medium&amp;id=68907e6fad5a09ad00dfb9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6205-cwe-862-missing-authorization-in-das-950d8659</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6205%3A%20CWE-862%20Missing%20Authorization%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Apriso&amp;severity=critical&amp;id=68907e6ead5a09ad00dfb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6204-cwe-94-improper-control-of-generatio-b3a2f1ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6204%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Apriso&amp;severity=high&amp;id=68907e6ead5a09ad00dfb9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8341-cwe-918-server-side-request-forgery--02dc5b13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8341%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Grafana%20grafana-infinity-datasource&amp;severity=medium&amp;id=689073a8ad5a09ad00df7b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41691-cwe-476-null-pointer-dereference-in-0718aa3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41691%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=68906ca0ad5a09ad00df5902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41659-cwe-732-incorrect-permission-assign-ce79f548</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41659%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=68906ca0ad5a09ad00df58ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41658-cwe-276-incorrect-default-permissio-20e2951b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41658%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20CODESYS%20Runtime%20Toolkit&amp;severity=medium&amp;id=68906ca0ad5a09ad00df58fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20702-cwe-306-missing-authentication-for--315ed8d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20702%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Airoha%20Technology%20Corp.%20AB156x%2C%20AB157x%2C%20AB158x%2C%20AB159x%20series%2C%20AB1627&amp;severity=high&amp;id=68905789ad5a09ad00def642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20701-cwe-863-incorrect-authorization-in--3a7f33ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20701%3A%20CWE-863%20Incorrect%20Authorization%20in%20Airoha%20Technology%20Corp.%20AB156x%2C%20AB157x%2C%20AB158x%2C%20AB159x%20series&amp;severity=high&amp;id=68905789ad5a09ad00def63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20700-cwe-306-missing-authentication-for--7ff56722</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20700%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Airoha%20Technology%20Corp.%20AB156x%2C%20AB157x%2C%20AB158x%2C%20AB159x%20series%2C%20AB1627&amp;severity=high&amp;id=68905789ad5a09ad00def63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48499-out-of-bounds-write-in-fujifilm-bus-6d36228e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48499%3A%20Out-of-bounds%20Write%20in%20FUJIFILM%20Business%20Innovation%20Corp.%20DocuPrint%20CP225%20w&amp;severity=medium&amp;id=689045f5ad5a09ad00de9ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20698-cwe-787-out-of-bounds-write-in-medi-78f48d15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20698%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8196%2C%20MT8391%2C%20MT8676%2C%20MT8678%2C%20MT8775%2C%20MT8786%2C%20MT8788E%2C%20MT8792%2C%20MT8796%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=68901843ad5a09ad00ddefbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20697-cwe-787-out-of-bounds-write-in-medi-dc4f83ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20697%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT6897%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8196%2C%20MT8391%2C%20MT8678%2C%20MT8775%2C%20MT8786%2C%20MT8788E%2C%20MT8792%2C%20MT8796%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=68901843ad5a09ad00ddefbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20696-cwe-787-out-of-bounds-write-in-medi-7160e575</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20696%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6813%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8188%2C%20MT8196%2C%20MT8370%2C%20MT8390%2C%20MT8676&amp;severity=medium&amp;id=68901843ad5a09ad00ddefb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54554-cwe-863-incorrect-authorization-in--92bd7dfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54554%3A%20CWE-863%20Incorrect%20Authorization%20in%20Tera%20Insights%20tiCrypt&amp;severity=medium&amp;id=689151abad5a09ad00e45170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-04-ae19f5f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-04&amp;severity=medium&amp;id=68914d9dad5a09ad00e3ee76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50754-na-defd2617</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50754%3A%20n%2Fa&amp;severity=critical&amp;id=68911ff1ad5a09ad00e325ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51726-na-778a04bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51726%3A%20n%2Fa&amp;severity=high&amp;id=68911ff1ad5a09ad00e325a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51387-na-78098647</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51387%3A%20n%2Fa&amp;severity=critical&amp;id=68911ff1ad5a09ad00e325a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50341-na-7fe657e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50341%3A%20n%2Fa&amp;severity=critical&amp;id=689118e9ad5a09ad00e30cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50340-na-9ba3b77a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50340%3A%20n%2Fa&amp;severity=medium&amp;id=68911568ad5a09ad00e300c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52239-na-5224809f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52239%3A%20n%2Fa&amp;severity=critical&amp;id=689103d1ad5a09ad00e2ca7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53395-na-24aa4631</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53395%3A%20n%2Fa&amp;severity=high&amp;id=6891004dad5a09ad00e2bbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53394-na-ea3b839e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53394%3A%20n%2Fa&amp;severity=high&amp;id=6891004dad5a09ad00e2bbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51390-na-7009f981</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51390%3A%20n%2Fa&amp;severity=critical&amp;id=6890f23bad5a09ad00e27dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50420-na-1a96f18c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50420%3A%20n%2Fa&amp;severity=medium&amp;id=6890eb33ad5a09ad00e26aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46206-na-2b474bf1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46206%3A%20n%2Fa&amp;severity=medium&amp;id=6890eb33ad5a09ad00e26a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51535-na-5eb8e25e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51535%3A%20n%2Fa&amp;severity=critical&amp;id=6890e42bad5a09ad00e252e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51534-na-a867ec40</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51534%3A%20n%2Fa&amp;severity=high&amp;id=6890e42bad5a09ad00e252e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50422-na-fc0013b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50422%3A%20CWE-617%20Reachable%20Assertion%20in%20cairographics%20Cairo&amp;severity=low&amp;id=6890e42bad5a09ad00e252dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44960-cwe-78-improper-neutralization-of-s-47e5d3f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44960%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RUCKUS%20SmartZone&amp;severity=high&amp;id=6890e42bad5a09ad00e252d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44958-cwe-257-storing-passwords-in-a-reco-b3fa4388</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44958%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20RUCKUS%20Network%20Director&amp;severity=medium&amp;id=6890e42bad5a09ad00e252d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44957-cwe-288-authentication-bypass-using-d7d8c4e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44957%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20RUCKUS%20SmartZone&amp;severity=high&amp;id=6890e42bad5a09ad00e252ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44963-cwe-321-use-of-hard-coded-cryptogra-8d8dbf20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44963%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20RUCKUS%20Network%20Director&amp;severity=critical&amp;id=6890e0a7ad5a09ad00e2476a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44962-na-9c153d32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44962%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20RUCKUS%20SmartZone&amp;severity=medium&amp;id=6890e0a7ad5a09ad00e24765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44961-cwe-78-improper-neutralization-of-s-2f9d7e64</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44961%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RUCKUS%20SmartZone&amp;severity=critical&amp;id=6890e0a7ad5a09ad00e24760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44954-cwe-1394-use-of-default-cryptograph-633fe352</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44954%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20RUCKUS%20SmartZone&amp;severity=critical&amp;id=6890e0a7ad5a09ad00e2475b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44955-cwe-259-use-of-hard-coded-password--c79191fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44955%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20RUCKUS%20Network%20Director&amp;severity=high&amp;id=6890d9a9ad5a09ad00e22cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51536-na-08dc6049</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51536%3A%20n%2Fa&amp;severity=critical&amp;id=6890c80aad5a09ad00e1d6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44643-na-04e02e2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44643%3A%20n%2Fa&amp;severity=high&amp;id=6890c80aad5a09ad00e1d6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26065-na-c520fb15</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26065%3A%20n%2Fa&amp;severity=high&amp;id=6890c486ad5a09ad00e1c9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54962-cwe-434-unrestricted-upload-of-file-8a0603e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54962%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20thiagoralves%20OpenPLC_v3&amp;severity=medium&amp;id=68901843ad5a09ad00ddefc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8513-improper-export-of-android-applicati-e3875212</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8513%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Caixin%20News%20App&amp;severity=medium&amp;id=688f768aad5a09ad00db0beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8512-improper-export-of-android-applicati-e05f493d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8512%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20TVB%20Big%20Big%20Shop%20App&amp;severity=medium&amp;id=688f6f81ad5a09ad00dae9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8511-cross-site-scripting-in-portabilis-i-e0c3df68</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8511%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=688f687bad5a09ad00dac97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8510-cross-site-scripting-in-portabilis-i-a0a97682</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8510%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688f6174ad5a09ad00daa5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8509-cross-site-scripting-in-portabilis-i-4f403602</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8509%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688f5deead5a09ad00da9715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8508-cross-site-scripting-in-portabilis-i-29eee1e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8508%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688f3e4aad5a09ad00da0cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51775-cwe-1385-missing-origin-validation--e6df69ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51775%3A%20CWE-1385%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20Apache%20Software%20Foundation%20Apache%20Zeppelin&amp;severity=high&amp;id=690a6f059e609817bf702f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41177-cwe-79-improper-neutralization-of-i-d64a7f21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Zeppelin&amp;severity=medium&amp;id=690a6f039e609817bf702c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8507-cross-site-scripting-in-portabilis-i-44924aed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8507%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688f3742ad5a09ad00d9ed8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52279-cwe-20-improper-input-validation-in-4bab30b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52279%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Zeppelin&amp;severity=high&amp;id=690a6f059e609817bf702f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8506-cross-site-scripting-in-495300897-wx-07e7a502</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8506%3A%20Cross%20Site%20Scripting%20in%20495300897%20wx-shop&amp;severity=medium&amp;id=688f2934ad5a09ad00d9b101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8505-cross-site-request-forgery-in-495300-82aef620</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8505%3A%20Cross-Site%20Request%20Forgery%20in%20495300897%20wx-shop&amp;severity=medium&amp;id=688f1b2aad5a09ad00d9761c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8504-unrestricted-upload-in-code-projects-e667db96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8504%3A%20Unrestricted%20Upload%20in%20code-projects%20Kitchen%20Treasure&amp;severity=medium&amp;id=688f141fad5a09ad00d94bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8503-sql-injection-in-code-projects-onlin-52f2f64d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8503%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688f0d18ad5a09ad00d91d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8502-sql-injection-in-code-projects-onlin-b5fb77d7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8502%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688f060cad5a09ad00d8f6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8501-cross-site-scripting-in-code-project-2ec02a1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8501%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=688eff05ad5a09ad00d8d07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8500-sql-injection-in-code-projects-human-95d711e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8500%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=688ef0f4ad5a09ad00d8715a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8499-sql-injection-in-code-projects-onlin-a58eb574</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8499%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688eed70ad5a09ad00d86514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-telegram-premium-site-distributes-new-lumma-s-3927dfcd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FAKE%20TELEGRAM%20PREMIUM%20SITE%20DISTRIBUTES%20NEW%20LUMMA%20STEALER%20VARIANT&amp;severity=medium&amp;id=6890772bad5a09ad00df9c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-phishing-campaign-targeting-indian-government-en-0e4be951</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Phishing%20Campaign%20Targeting%20Indian%20Government%20Entities&amp;severity=medium&amp;id=6890772bad5a09ad00df9c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8498-sql-injection-in-code-projects-onlin-abb9988f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8498%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688ee2e9ad5a09ad00d83803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8497-sql-injection-in-code-projects-onlin-8fa9f0a3</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8497%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688edbdcad5a09ad00d7fe4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8496-sql-injection-in-projectworlds-onlin-4af66aa9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8496%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=688edbdcad5a09ad00d7fe49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8495-sql-injection-in-code-projects-inter-d36bf078</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8495%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=688ec340ad5a09ad00d7b3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gandia-integra-total-4422361-sql-injection-8d97734c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gandia%20Integra%20Total%204.4.2236.1%20-%20SQL%20Injection&amp;severity=medium&amp;id=68900844ad5a09ad00dd9e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-edge-chromium-based-13507049114115-infor-83eb4eaa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Edge%20(Chromium-based)%20135.0.7049.114%2F.115%20-%20Information%20Disclosure&amp;severity=medium&amp;id=68900844ad5a09ad00dd9e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copyparty-1186-reflected-cross-site-scripting-xss-ecb812ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Copyparty%201.18.6%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=68900844ad5a09ad00dd9e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lpar2rrd-804-remote-code-execution-rce-18b2f6a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LPAR2RRD%208.04%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68900844ad5a09ad00dd9dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/swagger-ui-103-cross-site-scripting-xss-f449eebe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Swagger%20UI%201.0.3%20-%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=68900844ad5a09ad00dd9df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ultimate-member-wordpress-plugin-266-privilege-esc-88ee0ab3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ultimate%20Member%20WordPress%20Plugin%202.6.6%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68900844ad5a09ad00dd9df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-virtual-hard-disk-vhdx-11-remote-code-ex-954fc3db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Virtual%20Hard%20Disk%20(VHDX)%2011%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68900844ad5a09ad00dd9ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-03-5e673acf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-03&amp;severity=medium&amp;id=688ffc1dad5a09ad00dd214e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54956-cwe-669-incorrect-resource-transfer-d617ef3a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54956%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20r-lib%20gh&amp;severity=low&amp;id=688fa7c1ad5a09ad00dbdb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52133-cwe-79-improper-neutralization-of-i-3025363e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52133%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20Mocca%20Calendar&amp;severity=medium&amp;id=688edbdcad5a09ad00d7fe43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52132-cwe-79-improper-neutralization-of-i-acd8a482</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20Mocca%20Calendar&amp;severity=medium&amp;id=688edbdcad5a09ad00d7fe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52131-cwe-79-improper-neutralization-of-i-b8fa55ba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20Mocca%20Calendar&amp;severity=medium&amp;id=688edbdcad5a09ad00d7fe33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54351-cwe-420-unprotected-alternate-chann-916a43de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54351%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20ES%20iperf3&amp;severity=high&amp;id=688eb8b5ad5a09ad00d780d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54350-cwe-617-reachable-assertion-in-es-i-4c8129ff</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54350%3A%20CWE-617%20Reachable%20Assertion%20in%20ES%20iperf3&amp;severity=low&amp;id=688eb8b5ad5a09ad00d780d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54349-cwe-193-off-by-one-error-in-es-iper-2b6a0b30</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54349%3A%20CWE-193%20Off-by-one%20Error%20in%20ES%20iperf3&amp;severity=medium&amp;id=688eb8b5ad5a09ad00d780d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8494-sql-injection-in-code-projects-inter-9394ab15</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8494%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=688ea3b9ad5a09ad00d6a431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8493-sql-injection-in-code-projects-inter-36951b0a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8493%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=688e958cad5a09ad00d6698e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32253-improper-resource-locking-a1d8037b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32253%3A%20Improper%20Resource%20Locking&amp;severity=medium&amp;id=691f519438b88f02b51baaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32255-missing-release-of-resource-after-e-03a7e221</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32255%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime&amp;severity=medium&amp;id=691f519438b88f02b51baace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23290-cwe-200-exposure-of-sensitive-infor-c426bdac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23290%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=low&amp;id=688e9208ad5a09ad00d66087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23285-cwe-732-incorrect-permission-assign-a906110e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23285%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=medium&amp;id=688e9208ad5a09ad00d66084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23284-cwe-121-in-nvidia-gpu-display-drive-5d95ce4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23284%3A%20CWE-121%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e9208ad5a09ad00d66081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23283-cwe-121-in-nvidia-gpu-display-drive-af59bde9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23283%3A%20CWE-121%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23288-cwe-497-in-nvidia-gpu-display-drive-d9b18873</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23288%3A%20CWE-497%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=low&amp;id=688e8e84ad5a09ad00d658eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23287-cwe-497-in-nvidia-gpu-display-drive-b4cda767</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23287%3A%20CWE-497%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=low&amp;id=688e8e84ad5a09ad00d658e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23286-cwe-125-out-of-bounds-read-in-nvidi-6d3fcbde</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23286%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=medium&amp;id=688e8e84ad5a09ad00d658e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23281-cwe-416-use-after-free-in-nvidia-gp-c28cffa4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23281%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23279-cwe-367-time-of-check-time-of-use-t-b1615de7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23279%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23278-cwe-129-improper-validation-of-arra-52889e58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23278%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23277-cwe-284-in-nvidia-gpu-display-drive-0cf612ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23277%3A%20CWE-284%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23276-cwe-552-files-or-directories-access-9705c6e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23276%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-attack-uses-windows-shortcut-files-to-install--e9a012bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Attack%20Uses%20Windows%20Shortcut%20Files%20to%20Install%20REMCOS%20Backdoor&amp;severity=medium&amp;id=688e6454ad5a09ad00d5ea71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8471-sql-injection-in-projectworlds-onlin-07ee480d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8471%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=688e5d4dad5a09ad00d5c886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8470-sql-injection-in-sourcecodester-onli-86b6db86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8470%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688e4f3dad5a09ad00d57be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8469-sql-injection-in-sourcecodester-onli-2a1d741f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8469%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8468-sql-injection-in-code-projects-wazif-04de4f6d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8468%3A%20SQL%20Injection%20in%20code-projects%20Wazifa%20System&amp;severity=medium&amp;id=688e250dad5a09ad00d4a072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7500-cwe-79-improper-neutralization-of-in-f24a4a09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Social%20Sharing&amp;severity=medium&amp;id=688df75aad5a09ad00d30f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7710-cwe-288-authentication-bypass-using--c1295b64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7710%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Brave%20Brave%20Conversion%20Engine%20(PRO)&amp;severity=critical&amp;id=688df75aad5a09ad00d30f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/forced-to-give-your-password-here-is-the-solution-df16a77d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Forced%20to%20give%20your%20password%3F%20Here%20is%20the%20solution.&amp;severity=critical&amp;id=688df055ad5a09ad00d2f25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8467-sql-injection-in-code-projects-wazif-ba746c28</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8467%3A%20SQL%20Injection%20in%20code-projects%20Wazifa%20System&amp;severity=medium&amp;id=688df3d6ad5a09ad00d300e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8488-cwe-862-missing-authorization-in-bra-e45f539a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8488%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20Ultimate%20Addons%20for%20Elementor&amp;severity=medium&amp;id=688ddec0ad5a09ad00d2a67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6722-cwe-200-exposure-of-sensitive-inform-512bc97b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6722%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bitslip6%20BitFire%20Security%20%E2%80%93%20Firewall%2C%20WAF%2C%20Bot%2FSpam%20Blocker%2C%20Login%20Security&amp;severity=medium&amp;id=688ddec0ad5a09ad00d2a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8466-sql-injection-in-code-projects-onlin-9594fa50</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8466%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8391-cwe-79-improper-neutralization-of-in-ffd3104c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awssoft%20Magic%20Edge%20%E2%80%93%20Lite&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8400-cwe-79-improper-neutralization-of-in-5f390b2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8400%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aumsrini%20Image%20Gallery&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6832-cwe-79-improper-neutralization-of-in-97a048ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6832%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codebangers%20All%20in%20One%20Time%20Clock%20Lite%20%E2%80%93%20Tracking%20Employee%20Time%20Has%20Never%20Been%20Easier&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8399-cwe-79-improper-neutralization-of-in-b2ab96c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mmanifesto%20Mmm%20Unity%20Loader&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-exploits-sonicwall-vpns-in-likely-4fa9cf85</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20Ransomware%20Exploits%20SonicWall%20VPNs%20in%20Likely%20Zero-Day%20Attack%20on%20Fully-Patched%20Devices&amp;severity=critical&amp;id=688dc29fad5a09ad00d2094d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8317-cwe-79-improper-neutralization-of-in-76c2779a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8317%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bnielsen%20Custom%20Word%20Cloud&amp;severity=medium&amp;id=688dbf27ad5a09ad00d1fb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4588-cwe-79-improper-neutralization-of-in-4c4af6fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrgoodfellow%20360%20Photo%20Spheres&amp;severity=medium&amp;id=688dbf27ad5a09ad00d1faef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8212-cwe-79-improper-neutralization-of-in-9b386cf0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Medical%20Addon%20for%20Elementor&amp;severity=medium&amp;id=688dbf27ad5a09ad00d1fb06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8152-cwe-862-missing-authorization-in-ble-73d736f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8152%3A%20CWE-862%20Missing%20Authorization%20in%20blendmedia%20WP%20CTA%20%E2%80%93%20Call%20Now%20Button%2C%20Sticky%20Button%20%26%20Call%20to%20Action%20Builder&amp;severity=medium&amp;id=688dbf27ad5a09ad00d1fb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6626-cwe-79-improper-neutralization-of-in-68812bf8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shortpixel%20ShortPixel%20Adaptive%20Images%20%E2%80%93%20WebP%2C%20AVIF%2C%20CDN%2C%20Image%20Optimization&amp;severity=medium&amp;id=688dbf27ad5a09ad00d1faf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6754-cwe-862-missing-authorization-in-seo-30e20c16</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6754%3A%20CWE-862%20Missing%20Authorization%20in%20seometricsplugin%20SEO%20Metrics&amp;severity=high&amp;id=688dbf27ad5a09ad00d1faf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ai-generated-npm-package-hits-solana-use-fe12086e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20AI-generated%20npm%20package%20hits%20Solana%20users&amp;severity=medium&amp;id=688dbf1bad5a09ad00d1fabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8146-cwe-79-improper-neutralization-of-in-a02c327b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8146%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=medium&amp;id=688d9873ad5a09ad00d12695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-the-top-20-oss-vulnerabilities-reveal-about-t-d2efad57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20the%20Top%2020%20OSS%20Vulnerabilities%20Reveal%20About%20the%20Real%20Challenges%20in%20Security%20Governance&amp;severity=high&amp;id=688d9169ad5a09ad00d10a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7694-cwe-22-improper-limitation-of-a-path-b32b19a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7694%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WofficeIO%20Woffice%20Core&amp;severity=medium&amp;id=688d8a60ad5a09ad00d0f58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6078-cwe-79-improper-neutralization-of-in-4497b51f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6078%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Partner%20Software%20Partner%20Web&amp;severity=medium&amp;id=688d7c4fad5a09ad00d0c4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6077-cwe-1391-in-partner-software-partner-4347fd93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6077%3A%20CWE-1391%20in%20Partner%20Software%20Partner%20Web&amp;severity=critical&amp;id=688d7c4fad5a09ad00d0c4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6076-cwe-434-unrestricted-upload-of-file--b01bb60f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6076%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Partner%20Software%20Partner%20Web&amp;severity=high&amp;id=688d7c4fad5a09ad00d0c4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-02-c031c5e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-02&amp;severity=medium&amp;id=688eaa9dad5a09ad00d6ba1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54796-cwe-400-uncontrolled-resource-consu-6660a03d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54796%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%209001%20copyparty&amp;severity=high&amp;id=688d5220ad5a09ad00cfe403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54790-cwe-89-improper-neutralization-of-s-ef3a9b5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54790%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20humhub%20cfiles&amp;severity=critical&amp;id=688d5220ad5a09ad00cfe3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54782-cwe-77-improper-neutralization-of-s-a0a00bb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54782%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20nestjs%20nest&amp;severity=critical&amp;id=688d5220ad5a09ad00cfe3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54781-cwe-532-insertion-of-sensitive-info-0812f0df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54781%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20himmelblau-idm%20himmelblau&amp;severity=low&amp;id=688d5220ad5a09ad00cfe408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54789-cwe-80-improper-neutralization-of-s-f926e0f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54789%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20humhub%20cfiles&amp;severity=medium&amp;id=688d4e9cad5a09ad00cfd476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54424-cwe-77-improper-neutralization-of-s-3ac93ef5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54424%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%201Panel-dev%201Panel&amp;severity=high&amp;id=688d4b18ad5a09ad00cfcc04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13978-null-pointer-dereference-in-libtiff-6e71fecc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13978%3A%20NULL%20Pointer%20Dereference%20in%20LibTIFF&amp;severity=low&amp;id=6908f50bf612d110fe9cbe73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-firewall-devices-hit-in-surge-of-akira-r-810688c9</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20firewall%20devices%20hit%20in%20surge%20of%20Akira%20ransomware%20attacks&amp;severity=high&amp;id=688d19dfad5a09ad00cede56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54595-cwe-78-improper-neutralization-of-s-379fae72</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54595%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20alienator88%20Pearcleaner&amp;severity=high&amp;id=688d04c8ad5a09ad00cb1883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6015-cwe-307-improper-restriction-of-exce-d3b6ef55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6015%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=688d04c8ad5a09ad00cb188c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54590-cwe-918-server-side-request-forgery-0d6a36f4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54590%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20silverbucket%20webfinger.js&amp;severity=medium&amp;id=688d04c8ad5a09ad00cb187e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54574-cwe-122-heap-based-buffer-overflow--9d813098</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54574%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20squid-cache%20squid&amp;severity=critical&amp;id=688d04c8ad5a09ad00cb1879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53012-cwe-400-uncontrolled-resource-consu-4a62b0d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53012%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20AcademySoftwareFoundation%20MaterialX&amp;severity=medium&amp;id=688d04c8ad5a09ad00cb1870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6011-cwe-203-observable-discrepancy-in-ha-74b096c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6011%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20HashiCorp%20Vault&amp;severity=low&amp;id=688d04c8ad5a09ad00cb1889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53011-cwe-476-null-pointer-dereference-in-3a4a4ba6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53011%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20AcademySoftwareFoundation%20MaterialX&amp;severity=low&amp;id=688d0144ad5a09ad00cb0c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53010-cwe-476-null-pointer-dereference-in-67527036</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53010%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20AcademySoftwareFoundation%20MaterialX&amp;severity=low&amp;id=688d0144ad5a09ad00cb0c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53009-cwe-121-stack-based-buffer-overflow-3ca3c831</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53009%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20AcademySoftwareFoundation%20MaterialX&amp;severity=medium&amp;id=688d0144ad5a09ad00cb0c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6004-cwe-307-improper-restriction-of-exce-4058b818</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6004%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=688d0144ad5a09ad00cb0c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6037-cwe-295-improper-certificate-validat-a667de62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6037%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=688d0144ad5a09ad00cb0c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6014-cwe-156-improper-neutralization-of-w-44b899ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6014%3A%20CWE-156%3A%20Improper%20Neutralization%20of%20Whitespace%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=688d0144ad5a09ad00cb0c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2824-cwe-601-url-redirection-to-untrusted-a6fadcdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2824%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20Operational%20Decision%20Manager&amp;severity=high&amp;id=688d0144ad5a09ad00cb0c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6000-cwe-94-improper-control-of-generatio-1fe5a742</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6000%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(Code%20Injection)%20in%20HashiCorp%20Vault&amp;severity=critical&amp;id=688cfdc0ad5a09ad00cae4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5999-cwe-266-incorrect-privilege-assignme-11a2abec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5999%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8477-cwe-121-stack-based-buffer-overflow--f0e66f6d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8477%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Alpine%20iLX-507&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8480-cwe-22-improper-limitation-of-a-path-9f984260</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8480%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Alpine%20iLX-507&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8476-cwe-295-improper-certificate-validat-5832b62b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8476%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Alpine%20iLX-507&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8475-cwe-121-stack-based-buffer-overflow--8ff6cae9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8475%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Alpine%20iLX-507&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8474-cwe-121-stack-based-buffer-overflow--c933299b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8474%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Alpine%20iLX-507&amp;severity=medium&amp;id=688cfdc0ad5a09ad00cae4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8473-cwe-78-improper-neutralization-of-sp-890eebdf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8473%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Alpine%20iLX-507&amp;severity=medium&amp;id=688cfdc0ad5a09ad00cae4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8472-cwe-121-stack-based-buffer-overflow--b188e35f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8472%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Alpine%20iLX-507&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32256-race-condition-during-access-to-alt-aac81690</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32256%3A%20Race%20Condition%20During%20Access%20to%20Alternate%20Channel&amp;severity=high&amp;id=691ebfd29f5a9374a9cb41b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33118-cwe-79-improper-neutralization-of-i-8f02cec1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=688cfa3cad5a09ad00cac523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48074-cwe-770-allocation-of-resources-wit-b1eedc0b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48074%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=688cefb0ad5a09ad00ca6abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-oauth-app-impersonation-campaign-leads-t-6e5ecc8d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20OAuth%20App%20Impersonation%20Campaign%20Leads%20to%20MFA%20Phishing&amp;severity=medium&amp;id=68908c43ad5a09ad00e00aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/behind-random-words-doubletrouble-mobile-banking-t-96a6349f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Behind%20Random%20Words%3A%20DoubleTrouble%20Mobile%20Banking%20Trojan%20Revealed&amp;severity=medium&amp;id=688ccc87ad5a09ad00c9789d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-2603-deploys-dns-controlled-backdoor-in-warl-ed06fe03</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-2603%20Deploys%20DNS-Controlled%20Backdoor%20in%20Warlock%20and%20LockBit%20Ransomware%20Attacks&amp;severity=high&amp;id=688cc903ad5a09ad00c95b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toolshell-under-siege-check-point-analyzes-chinese-4385296d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ToolShell%20under%20siege%3A%20Check%20Point%20analyzes%20Chinese%20APT%20Storm-2603&amp;severity=medium&amp;id=688cc903ad5a09ad00c95b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indian-infrastructure-targeted-with-desktop-lures--290f555f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indian%20Infrastructure%20Targeted%20with%20Desktop%20Lures%20and%20Poseidon%20Backdoor&amp;severity=medium&amp;id=688cb3ecad5a09ad00c8cca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41376-cwe-89-improper-neutralization-of-s-94fdc607</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41376%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=688cb771ad5a09ad00c8e386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41375-cwe-89-improper-neutralization-of-s-1829e829</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41375%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=688cb771ad5a09ad00c8e383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41374-cwe-89-improper-neutralization-of-s-c9db9c45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41374%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=688cb771ad5a09ad00c8e380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41373-cwe-89-improper-neutralization-of-s-3a115682</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41373%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=688cb771ad5a09ad00c8e37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41372-cwe-89-improper-neutralization-of-s-c2988344</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41372%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=688cb771ad5a09ad00c8e37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41371-cwe-89-improper-neutralization-of-s-775d8afb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41371%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=critical&amp;id=688cb771ad5a09ad00c8e377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41370-cwe-89-improper-neutralization-of-s-81e2427f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41370%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=critical&amp;id=688cb771ad5a09ad00c8e374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-lockbit-a-deep-dive-into-dll-sideloading-1dacd105</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20LockBit%3A%20A%20Deep%20Dive%20into%20DLL%20Sideloading%20and%20Masquerading%20Tactics&amp;severity=medium&amp;id=688ca960ad5a09ad00c88a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6228-cwe-79-improper-neutralization-of-in-5fbf630e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6228%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor&amp;severity=medium&amp;id=688ca5e0ad5a09ad00c876e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4684-cwe-79-improper-neutralization-of-in-f0edfcb5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4684%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blockspare%20BlockSpare%20%E2%80%94%20News%2C%20Magazine%20and%20Blog%20Addons%20for%20(Gutenberg)%20Block%20Editor&amp;severity=medium&amp;id=688ca5e0ad5a09ad00c876dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-detect-multi-layer-redirect-tactic-used-to-35eb0967</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Detect%20Multi-Layer%20Redirect%20Tactic%20Used%20to%20Steal%20Microsoft%20365%20Login%20Credentials&amp;severity=high&amp;id=688c89bdad5a09ad00c78e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-apt-secret-blizzard-targets-foreign--d964feeb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-linked%20APT%20Secret%20Blizzard%20targets%20foreign%20embassies%20in%20Moscow%20with%20ApolloShadow%20malware&amp;severity=medium&amp;id=688c89bdad5a09ad00c78e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6398-cwe-476-null-pointer-dereference-in--e2e3f3a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6398%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20ASUS%20AI%20Suite&amp;severity=medium&amp;id=688c82cdad5a09ad00c76f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/playpraetors-evolving-threat-how-chinese-speaking--89b88a63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlayPraetor&apos;s%20evolving%20threat%3A%20How%20Chinese-speaking%20actors%20globally%20scale%20an%20Android%20RAT%20%7C%20Cleafy&amp;severity=medium&amp;id=688c7f32ad5a09ad00c75bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8443-sql-injection-in-code-projects-onlin-84d1669a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8443%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688c7f31ad5a09ad00c75bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8442-sql-injection-in-code-projects-onlin-c14dc564</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8442%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688c7829ad5a09ad00c6f11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8441-sql-injection-in-code-projects-onlin-9d33b3c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8441%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688c7121ad5a09ad00c6ce47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8439-sql-injection-in-code-projects-wazif-a56b47f9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8439%3A%20SQL%20Injection%20in%20code-projects%20Wazifa%20System&amp;severity=medium&amp;id=688c6a19ad5a09ad00c69a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7646-cwe-79-improper-neutralization-of-in-2286092f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=688c6695ad5a09ad00c68506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8438-sql-injection-in-code-projects-wazif-93c42a16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8438%3A%20SQL%20Injection%20in%20code-projects%20Wazifa%20System&amp;severity=medium&amp;id=688c6695ad5a09ad00c6850a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8437-sql-injection-in-code-projects-kitch-c19aa38f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8437%3A%20SQL%20Injection%20in%20code-projects%20Kitchen%20Treasure&amp;severity=medium&amp;id=688c5c0aad5a09ad00c612b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5921-cwe-79-cross-site-scripting-xss-in-s-f5bd287e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5921%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20SureForms&amp;severity=medium&amp;id=688c58c0ad5a09ad00c5e709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31716-cwe-121-stack-based-buffer-overflow-0b2da83f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31716%3A%20cwe-121%20Stack-based%20Buffer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=688c58c0ad5a09ad00c5e706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8454-vulnerability-in-debian-devscripts-af508af6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8454%3A%20Vulnerability%20in%20Debian%20devscripts&amp;severity=critical&amp;id=688c58c0ad5a09ad00c5e70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8436-sql-injection-in-projectworlds-onlin-570155a3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8436%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=688c5501ad5a09ad00c5d576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8435-missing-authorization-in-code-projec-c2d57f85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8435%3A%20Missing%20Authorization%20in%20code-projects%20Online%20Movie%20Streaming&amp;severity=medium&amp;id=688c46f1ad5a09ad00c4fdb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7845-cwe-79-improper-neutralization-of-in-e5e6d983</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20Stratum%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=688c46f1ad5a09ad00c4fdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4523-cwe-200-exposure-of-sensitive-inform-e0ab7de6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4523%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=medium&amp;id=688c46f1ad5a09ad00c4fd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7443-cwe-434-unrestricted-upload-of-file--531c020a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7443%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20berqwp%20BerqWP%20%E2%80%93%20Automated%20All-In-One%20Page%20Speed%20Optimization%20for%20Core%20Web%20Vitals%2C%20Cache%2C%20CDN%2C%20Images%2C%20CSS%2C%20and%20JavaScript&amp;severity=high&amp;id=688c46f1ad5a09ad00c4fda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7725-cwe-79-improper-neutralization-of-in-8049f247</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=high&amp;id=688c46f1ad5a09ad00c4fda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8434-missing-authorization-in-code-projec-d28696dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8434%3A%20Missing%20Authorization%20in%20code-projects%20Online%20Movie%20Streaming&amp;severity=medium&amp;id=688c3fe9ad5a09ad00bfe0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5947-cwe-639-authorization-bypass-through-3017b539</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5947%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=critical&amp;id=688c355ead5a09ad00bf5557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8433-path-traversal-in-code-projects-docu-4498c9e9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8433%3A%20Path%20Traversal%20in%20code-projects%20Document%20Management%20System&amp;severity=medium&amp;id=688c355ead5a09ad00bf555b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5954-cwe-269-improper-privilege-managemen-36bba42d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5954%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20aonetheme%20Service%20Finder%20SMS%20System&amp;severity=critical&amp;id=688c2ad1ad5a09ad00bf0bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8431-sql-injection-in-phpgurukul-boat-boo-9a49b98e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8431%3A%20SQL%20Injection%20in%20PHPGurukul%20Boat%20Booking%20System&amp;severity=medium&amp;id=688c1cc1ad5a09ad00bec92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-01-0705db94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-01&amp;severity=medium&amp;id=688d591dad5a09ad00cffdde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54564-na-e0dc64db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54564%3A%20n%2Fa&amp;severity=high&amp;id=688d04c8ad5a09ad00cb1876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50869-na-5c439c47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50869%3A%20n%2Fa&amp;severity=medium&amp;id=688cfdc0ad5a09ad00cae4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50868-na-39546bf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50868%3A%20n%2Fa&amp;severity=medium&amp;id=688cfdc0ad5a09ad00cae4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50870-na-b62c557c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50870%3A%20n%2Fa&amp;severity=critical&amp;id=688cfa3cad5a09ad00cac526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45778-na-bb843d54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45778%3A%20n%2Fa&amp;severity=medium&amp;id=688cf6b8ad5a09ad00cabb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45150-na-b79051cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45150%3A%20n%2Fa&amp;severity=critical&amp;id=688cf334ad5a09ad00caa6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51504-na-ff1a8ec5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51504%3A%20n%2Fa&amp;severity=high&amp;id=688cefb0ad5a09ad00ca6ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51502-na-8eab2c30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51502%3A%20n%2Fa&amp;severity=medium&amp;id=688cefb0ad5a09ad00ca6acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51501-na-862d47ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51501%3A%20n%2Fa&amp;severity=medium&amp;id=688cefb0ad5a09ad00ca6ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52390-na-bc01c05f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52390%3A%20n%2Fa&amp;severity=critical&amp;id=688ce8a8ad5a09ad00ca4607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50472-na-036faa6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50472%3A%20n%2Fa&amp;severity=critical&amp;id=688ce8a8ad5a09ad00ca4603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52361-na-9c6f9431</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52361%3A%20n%2Fa&amp;severity=high&amp;id=688ce524ad5a09ad00ca3848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50460-na-1a0c76d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50460%3A%20n%2Fa&amp;severity=critical&amp;id=688ce524ad5a09ad00ca3842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52327-na-d1c16275</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52327%3A%20n%2Fa&amp;severity=high&amp;id=688ce1a0ad5a09ad00ca1334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44139-na-b9407977</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44139%3A%20n%2Fa&amp;severity=high&amp;id=688ce1a0ad5a09ad00ca1330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-frozen-in-transit-secret-blizzards-aitm-camp-438ddabe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Frozen%20in%20transit%3A%20Secret%20Blizzard%E2%80%99s%20AiTM%20campaign%20against%20diplomats&amp;severity=medium&amp;id=688ce196ad5a09ad00ca121e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45767-na-c9e25787</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45767%3A%20n%2Fa&amp;severity=high&amp;id=688cd390ad5a09ad00c9b3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46018-na-db5c96ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46018%3A%20n%2Fa&amp;severity=medium&amp;id=688cc57fad5a09ad00c944f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54939-cwe-770-allocation-of-resources-wit-9c1330cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54939%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20litespeedtech%20LSQUIC&amp;severity=medium&amp;id=688c517dad5a09ad00c54f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53399-cwe-346-origin-validation-error-in--fa851d95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53399%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Sipwise%20rtpengine&amp;severity=medium&amp;id=688c355dad5a09ad00bf552d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32251-improper-restriction-of-excessive-a-9e0c1fa3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32251%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&amp;severity=low&amp;id=6920022204dd2c5f998cacda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23289-cwe-532-insertion-of-sensitive-info-4a0cfe1d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23289%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20NVIDIA%20NVIDIA%20Omniverse%20Launcher&amp;severity=medium&amp;id=688bd9f5ad5a09ad00bc37e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48073-cwe-476-null-pointer-dereference-in-e087db28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48073%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=688bd2edad5a09ad00bc1fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48072-cwe-125-out-of-bounds-read-in-acade-d2b19f55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48072%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=688bd2edad5a09ad00bc1fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48071-cwe-122-heap-based-buffer-overflow--d89af4a3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48071%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=688bcf6aad5a09ad00bc13fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maas-appeal-an-infostealer-rises-from-the-ashes-3b9303f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MaaS%20Appeal%3A%20An%20Infostealer%20Rises%20From%20The%20Ashes&amp;severity=medium&amp;id=688bcf68ad5a09ad00bc13ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-mailchimp-as-new-victim--f6f56a70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Claims%20Mailchimp%20as%20New%20Victim%20in%20Relatively%20Small%20Breach&amp;severity=high&amp;id=688bcbe4ad5a09ad00bbfdbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37112-cwe-798-use-of-hard-coded-credentia-fd5478d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37112%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Hewlett%20Packard%20Enterprise%20HPE%20Telco%20Network%20Function%20Virtual%20Orchestrator&amp;severity=medium&amp;id=688bc861ad5a09ad00bbeacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37111-cwe-798-use-of-hard-coded-credentia-c9bb8ba5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37111%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Hewlett%20Packard%20Enterprise%20HPE%20Telco%20Network%20Function%20Virtual%20Orchestrator&amp;severity=medium&amp;id=688bc861ad5a09ad00bbeaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37110-cwe-922-insecure-storage-of-sensiti-e8178e16</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37110%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Hewlett%20Packard%20Enterprise%20HPE%20Telco%20Network%20Function%20Virtual%20Orchestrator&amp;severity=medium&amp;id=688bc861ad5a09ad00bbeac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redhook-a-new-android-banking-trojan-targeting-use-0a08abad</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedHook%3A%20A%20New%20Android%20Banking%20Trojan%20Targeting%20Users%20In%20Vietnam&amp;severity=medium&amp;id=688bc4dcad5a09ad00bbdc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8286-cwe-306-in-gralp-systems-gralp-fmus--6ff9b87d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8286%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20G%C3%BCralp%20Systems%20G%C3%BCralp%20FMUS%20Series&amp;severity=critical&amp;id=688bc4ddad5a09ad00bbdca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37109-vulnerability-in-hewlett-packard-en-7b044aaa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37109%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Telco%20Service%20Activator&amp;severity=low&amp;id=688bc4ddad5a09ad00bbdcac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37108-vulnerability-in-hewlett-packard-en-c421ffd4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37108%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Telco%20Service%20Activator&amp;severity=low&amp;id=688bc4ddad5a09ad00bbdca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8426-cwe-22-improper-limitation-of-a-path-434381e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8426%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=critical&amp;id=688bafc9ad5a09ad00bb510a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54833-cwe-307-improper-restriction-of-exc-2905397b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54833%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20OPEXUS%20FOIAXpress%20Public%20Access%20Link%20(PAL)&amp;severity=medium&amp;id=688bac43ad5a09ad00bb354e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54834-cwe-204-observable-response-discrep-5bd6d320</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54834%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20OPEXUS%20FOIAXpress%20Public%20Access%20Link%20(PAL)&amp;severity=medium&amp;id=688bac43ad5a09ad00bb3553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54832-cwe-472-external-control-of-assumed-c75e489c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54832%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20OPEXUS%20FOIAXpress%20Public%20Access%20Link%20(PAL)&amp;severity=medium&amp;id=688bac43ad5a09ad00bb3549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-onlyfans-discord-and-twitch-clickfix-themed-p-88c2e064</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20OnlyFans%2C%20Discord%20and%20Twitch%20ClickFix-Themed%20Pages%20Spread%20Epsilon%20Red%20Ransomware&amp;severity=medium&amp;id=688b9e32ad5a09ad00ba1b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8409-sql-injection-in-code-projects-vehic-a5467c84</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8409%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b9022ad5a09ad00b97573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46809-cwe-532-insertion-of-sensitive-info-415ecf64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46809%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20SUSE%20Container%20suse%2Fmanager%2F4.3%2Fproxy-httpd%3A4.3.16.9.67.1&amp;severity=medium&amp;id=688b8c9ead5a09ad00b92639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/materialx-and-openexr-security-audit-shielder-6e1d2a20</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MaterialX%20and%20OpenEXR%20Security%20Audit%20-%20Shielder&amp;severity=medium&amp;id=688b891dad5a09ad00b919a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8408-sql-injection-in-code-projects-vehic-50a059be</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8408%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b891aad5a09ad00b9198d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gold-blade-remote-dll-sideloading-attack-deploys-r-d262df98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GOLD%20BLADE%20remote%20DLL%20sideloading%20attack%20deploys%20RedLoader&amp;severity=medium&amp;id=688b891aad5a09ad00b9196e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34146-cwe-1321-improperly-controlled-modi-c20804a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34146%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nyariv%20sandboxjs&amp;severity=high&amp;id=688b891aad5a09ad00b91987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7738-cleartext-storage-of-sensitive-infor-ca134946</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7738%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Ansible%20django-ansible-base&amp;severity=medium&amp;id=688b7b1cad5a09ad00b8c2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-link-new-ss7-encoding-attack-to-survei-bfe9b307</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Link%20New%20SS7%20Encoding%20Attack%20to%20Surveillance%20Vendor%20Activity&amp;severity=medium&amp;id=688b7b0fad5a09ad00b8c269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8407-sql-injection-in-code-projects-vehic-86ecc042</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8407%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b7e8ead5a09ad00b8cc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54589-cwe-79-improper-neutralization-of-i-a9a263df</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54589%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=688b7786ad5a09ad00b8a643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-and-the-hidden-dangers-of-byovd-e2dd9111</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20and%20the%20Hidden%20Dangers%20of%20BYOVD&amp;severity=medium&amp;id=688b6cfaad5a09ad00b7e2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-200-malicious-open-source-packages-traced-to--2a1a378b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20200%20Malicious%20Open%20Source%20Packages%20Traced%20to%20Lazarus%20Campaign&amp;severity=high&amp;id=688b6271ad5a09ad00b7950d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8213-cwe-36-absolute-path-traversal-in-ni-06e40731</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8213%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20nintechnet%20NinjaScanner%20%E2%80%93%20Virus%20%26%20Malware%20scan&amp;severity=high&amp;id=688b6281ad5a09ad00b7953f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/browser-extensions-can-exploit-chatgpt-gemini-in-m-0872df24</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Browser%20Extensions%20Can%20Exploit%20ChatGPT%2C%20Gemini%20in%20%E2%80%98Man%20in%20the%20Prompt%E2%80%99%20Attack&amp;severity=high&amp;id=688b5eeaad5a09ad00b77f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8382-sql-injection-in-campcodes-online-ho-1dc0a3b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8382%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688b5ef7ad5a09ad00b77f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8381-sql-injection-in-campcodes-online-ho-bb5a5193</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8381%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688b57e3ad5a09ad00b73fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8068-cwe-863-incorrect-authorization-in-d-77a23d05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8068%3A%20CWE-863%20Incorrect%20Authorization%20in%20devitemsllc%20HT%20Mega%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%20%26%20Template%20Builder&amp;severity=medium&amp;id=688b545fad5a09ad00b721ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8401-cwe-285-improper-authorization-in-de-056dc956</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8401%3A%20CWE-285%20Improper%20Authorization%20in%20devitemsllc%20HT%20Mega%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%20%26%20Template%20Builder&amp;severity=medium&amp;id=688b545fad5a09ad00b721b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8151-cwe-22-improper-limitation-of-a-path-506d24cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8151%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20devitemsllc%20HT%20Mega%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%20%26%20Template%20Builder&amp;severity=medium&amp;id=688b545fad5a09ad00b721b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8380-cross-site-scripting-in-campcodes-on-771e7a86</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8380%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688b50dbad5a09ad00b6e7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8379-unrestricted-upload-in-campcodes-onl-c3638243</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8379%3A%20Unrestricted%20Upload%20in%20Campcodes%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688b49d3ad5a09ad00b66828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-facebook-ads-to-spread-jsceal-malware--e067d3ea</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20Facebook%20Ads%20to%20Spread%20JSCEAL%20Malware%20via%20Fake%20Cryptocurrency%20Trading%20Apps&amp;severity=high&amp;id=688b42caad5a09ad00b61699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-plant-4g-raspberry-pi-on-bank-network-in-f-f9d4092a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20plant%204G%20Raspberry%20Pi%20on%20bank%20network%20in%20failed%20ATM%20heist&amp;severity=high&amp;id=688b42caad5a09ad00b616a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2813-cwe-770-allocation-of-resources-with-c941ba44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2813%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20AXL%20F%20BK%20PN%20TPS&amp;severity=high&amp;id=688b4307ad5a09ad00b61a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safepay-ransomware-threatens-to-leak-35tb-of-ingra-85bffdd0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SafePay%20ransomware%20threatens%20to%20leak%203.5TB%20of%20Ingram%20Micro%20data&amp;severity=high&amp;id=688b42caad5a09ad00b6169d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-behind-salesforce-data-theft-attacks--8d62ab7e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20behind%20Salesforce%20data%20theft%20attacks%20at%20Qantas%2C%20Allianz%20Life%2C%20and%20LVMH&amp;severity=high&amp;id=688b42caad5a09ad00b61695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-released-a-decryptor-for-the-funksec-r-7b70ba91</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20released%20a%20decryptor%20for%20the%20FunkSec%20ransomware&amp;severity=medium&amp;id=688b42caad5a09ad00b616a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41688-cwe-653-improper-isolation-or-compa-f756f3ab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41688%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20MB%20connect%20line%20mbNET%20HW1&amp;severity=high&amp;id=688b4307ad5a09ad00b61a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8378-sql-injection-in-campcodes-online-ho-70373801</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8378%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688b4307ad5a09ad00b61a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sealed-chain-of-deception-actors-leveraging-nodejs-0a0862aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sealed%20Chain%20of%20Deception%3A%20Actors%20leveraging%20Node.JS%20to%20Launch%20JSCeal&amp;severity=medium&amp;id=688b3f45ad5a09ad00b5ff86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40980-cwe-79-improper-neutralization-of-i-6fb8065f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40980%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20UltimateFosters%20UltimatePOS&amp;severity=medium&amp;id=688b3f45ad5a09ad00b600ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8376-sql-injection-in-code-projects-vehic-56c80bfd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8376%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b3bc1ad5a09ad00b5e2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8375-sql-injection-in-code-projects-vehic-ae216882</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8375%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b34bbad5a09ad00b5bf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24854-cwe-79-improper-neutralization-of-i-cff8fafd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20JSPWiki&amp;severity=medium&amp;id=688b2db3ad5a09ad00b4fe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24853-cwe-79-improper-neutralization-of-i-a7ed8822</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20JSPWiki&amp;severity=high&amp;id=688b2db3ad5a09ad00b4fe1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8374-sql-injection-in-code-projects-vehic-8db4fdc7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8374%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b2db3ad5a09ad00b4fe23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8192-cwe-367-time-of-check-time-of-use-to-e81e9baa</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8192%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Android%20TV&amp;severity=medium&amp;id=688b2a2fad5a09ad00b4e13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8373-sql-injection-in-code-projects-vehic-51917607</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8373%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b26abad5a09ad00b4b85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8372-sql-injection-in-code-projects-exam--408bd818</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8372%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b489b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36563-cross-site-scripting-xss-in-alfasad-d2b422ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36563%3A%20Cross-site%20scripting%20(XSS)%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b4899a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41391-cross-site-scripting-xss-in-alfasad-4c90db80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41391%3A%20Cross-site%20scripting%20(XSS)%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b4899e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7205-cwe-79-improper-neutralization-of-in-84646903</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7205%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b489ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41396-improper-limitation-of-a-pathname-t-388d93e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41396%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b489a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46359-improper-limitation-of-a-pathname-t-9db0db3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46359%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=high&amp;id=688b1fa4ad5a09ad00b489a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54752-improper-neutralization-of-formula--af454649</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54752%3A%20Improper%20neutralization%20of%20formula%20elements%20in%20a%20CSV%20file%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b489aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54757-unrestricted-upload-of-file-with-da-4312c0ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54757%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=medium&amp;id=688b1c1fad5a09ad00b478e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8371-sql-injection-in-code-projects-exam--3194039e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8371%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=688b189bad5a09ad00b460e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8370-cross-site-scripting-in-portabilis-i-111b7d9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8370%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688b1196ad5a09ad00b4221a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8369-cross-site-scripting-in-portabilis-i-8070160f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8369%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688b0a8bad5a09ad00b3b6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53558-use-of-weak-credentials-in-zte-japa-0ad8df79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53558%3A%20Use%20of%20weak%20credentials%20in%20ZTE%20Japan.%20K.K.%20ZXHN-F660T&amp;severity=high&amp;id=688b0383ad5a09ad00b38618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8368-cross-site-scripting-in-portabilis-i-6125e093</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8368%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688b0383ad5a09ad00b3861b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8367-cross-site-scripting-in-portabilis-i-e797c2e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8367%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688afc7bad5a09ad00b319b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8366-cross-site-scripting-in-portabilis-i-4e20b2c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8366%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688af8f7ad5a09ad00b2f7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5720-cwe-79-improper-neutralization-of-in-cce09a1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=688af1f7ad5a09ad00b2c418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7847-cwe-434-unrestricted-upload-of-file--52ff1a37</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7847%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tigroumeow%20AI%20Engine&amp;severity=high&amp;id=688af1f7ad5a09ad00b2c41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8365-cross-site-scripting-in-portabilis-i-0f5cea76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8365%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688aee6ead5a09ad00b2b227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8348-improper-authentication-in-kehua-cha-6f93fc96</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8348%3A%20Improper%20Authentication%20in%20Kehua%20Charging%20Pile%20Cloud%20Platform&amp;severity=medium&amp;id=688aeae7ad5a09ad00b29939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8347-sql-injection-in-kehua-charging-pile-59e0f53a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8347%3A%20SQL%20Injection%20in%20Kehua%20Charging%20Pile%20Cloud%20Platform&amp;severity=medium&amp;id=688ae05bad5a09ad00b25691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8346-cross-site-scripting-in-portabilis-i-ebd09f50</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8346%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688b821dad5a09ad00b8e78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8345-sql-injection-in-shanghai-lingdang-i-0c52a08d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8345%3A%20SQL%20Injection%20in%20Shanghai%20Lingdang%20Information%20Technology%20Lingdang%20CRM&amp;severity=medium&amp;id=688b821dad5a09ad00b8e788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8344-unrestricted-upload-in-openviglet-sh-56a09ee3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8344%3A%20Unrestricted%20Upload%20in%20openviglet%20shio&amp;severity=medium&amp;id=688acb43ad5a09ad00b1dd1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8343-path-traversal-in-openviglet-shio-d36920a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8343%3A%20Path%20Traversal%20in%20openviglet%20shio&amp;severity=medium&amp;id=688ac43aad5a09ad00b1c02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8340-cross-site-scripting-in-code-project-66f66d94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8340%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=688abd36ad5a09ad00b1764e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8339-sql-injection-in-code-projects-inter-13909721</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8339%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=688abd36ad5a09ad00b17647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-31-8e3032c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-31&amp;severity=medium&amp;id=688c079dad5a09ad00bdb1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45768-na-b0a7ad4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45768%3A%20n%2Fa&amp;severity=high&amp;id=688bcf6aad5a09ad00bc13f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50847-na-b9b6d33b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50847%3A%20n%2Fa&amp;severity=medium&amp;id=688bcbf9ad5a09ad00bbffc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50850-na-375409a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50850%3A%20n%2Fa&amp;severity=high&amp;id=688bcbf9ad5a09ad00bbffc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45769-na-d23e3df2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45769%3A%20n%2Fa&amp;severity=medium&amp;id=688bcbf9ad5a09ad00bbffbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50572-na-401e099c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50572%3A%20n%2Fa&amp;severity=high&amp;id=688bc4ddad5a09ad00bbdca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45770-na-de3a0880</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45770%3A%20n%2Fa&amp;severity=high&amp;id=688bc4dcad5a09ad00bbdc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26064-na-de161255</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26064%3A%20n%2Fa&amp;severity=high&amp;id=688bbde8ad5a09ad00bba87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26063-na-b50af3ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26063%3A%20n%2Fa&amp;severity=critical&amp;id=688bbde8ad5a09ad00bba878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26062-na-a2dd2561</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26062%3A%20n%2Fa&amp;severity=critical&amp;id=688bbde8ad5a09ad00bba873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51503-na-6f5017cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51503%3A%20n%2Fa&amp;severity=high&amp;id=688bb34bad5a09ad00bb71c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51385-na-d0609807</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51385%3A%20n%2Fa&amp;severity=low&amp;id=688bac43ad5a09ad00bb3545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51384-na-00570191</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51384%3A%20n%2Fa&amp;severity=low&amp;id=688bac43ad5a09ad00bb3541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51383-na-8d31a716</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51383%3A%20n%2Fa&amp;severity=low&amp;id=688bac43ad5a09ad00bb353d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50866-na-3bb6a2b6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50866%3A%20n%2Fa&amp;severity=medium&amp;id=688ba1b7ad5a09ad00baaf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50867-na-677b0752</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50867%3A%20n%2Fa&amp;severity=medium&amp;id=688b972aad5a09ad00b9c2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29556-na-a1cc0750</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29556%3A%20n%2Fa&amp;severity=high&amp;id=688b972aad5a09ad00b9c2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50848-na-b6ddc1d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50848%3A%20n%2Fa&amp;severity=medium&amp;id=688b93bdad5a09ad00b99f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52203-na-6984f2bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52203%3A%20n%2Fa&amp;severity=high&amp;id=688b8c9ead5a09ad00b9263c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50849-na-4d7d6681</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50849%3A%20n%2Fa&amp;severity=high&amp;id=688b891aad5a09ad00b91983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50475-na-033991fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50475%3A%20n%2Fa&amp;severity=critical&amp;id=688b891aad5a09ad00b9197e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29557-na-d598bc83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29557%3A%20n%2Fa&amp;severity=medium&amp;id=688b8596ad5a09ad00b90298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51569-na-fd5bf26d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51569%3A%20n%2Fa&amp;severity=medium&amp;id=688b8596ad5a09ad00b90294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52289-na-899ab492</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52289%3A%20n%2Fa&amp;severity=high&amp;id=688b821dad5a09ad00b8e784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50270-na-6fbc0136</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50270%3A%20n%2Fa&amp;severity=medium&amp;id=688b821dad5a09ad00b8e780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36040-cwe-613-insufficient-session-expira-209b1a51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36040%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=688ab2a7ad5a09ad00b0cbc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36039-cwe-602-client-side-enforcement-of--4bf672a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36039%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=688ab2a7ad5a09ad00b0cbc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49082-vulnerability-in-absolute-security--8c2b44c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49082%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=688aaf24ad5a09ad00b0c3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54085-vulnerability-in-absolute-security--30132b5d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54085%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=688aaf24ad5a09ad00b0c3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49084-vulnerability-in-absolutee-security-e40fdaa0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49084%3A%20Vulnerability%20in%20Absolutee%20Security%20Secure%20Access&amp;severity=medium&amp;id=688aaf24ad5a09ad00b0c3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8338-sql-injection-in-projectworlds-onlin-8b7042bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8338%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=688aaf24ad5a09ad00b0c3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49083-vulnerability-in-absolute-security--7abaf612</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49083%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=high&amp;id=688aaf24ad5a09ad00b0c3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8337-cross-site-scripting-in-code-project-2095990a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8337%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Car%20Rental%20System&amp;severity=medium&amp;id=688aa81bad5a09ad00b08f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8336-sql-injection-in-campcodes-online-re-d5a675d2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8336%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=688aba19ad5a09ad00b13b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-critical-crushftp-cve-2025-54309-rce-explained-c53e4968</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Critical%20CrushFTP%20CVE-2025-54309%20RCE%20Explained%20%2B%20PoC&amp;severity=critical&amp;id=688a9a0ead5a09ad00afe594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8335-cross-site-request-forgery-in-code-p-a83d7bd9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8335%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20Simple%20Car%20Rental%20System&amp;severity=medium&amp;id=688a9a0bad5a09ad00afe588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8334-sql-injection-in-campcodes-online-re-00bc4253</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8334%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=688a9304ad5a09ad00afbb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54586-cwe-200-exposure-of-sensitive-infor-7948a734</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54586%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20finos%20git-proxy&amp;severity=high&amp;id=688a8f80ad5a09ad00afa685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8333-sql-injection-in-code-projects-onlin-cf6beffa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8333%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=688a8bfcad5a09ad00af7e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8332-sql-injection-in-code-projects-onlin-665ea57c</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8332%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=688a84f4ad5a09ad00af448e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54585-cwe-285-improper-authorization-in-f-8d082a90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54585%3A%20CWE-285%3A%20Improper%20Authorization%20in%20finos%20git-proxy&amp;severity=high&amp;id=688a8174ad5a09ad00af0cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8331-sql-injection-in-code-projects-onlin-99182052</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8331%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=688a7dedad5a09ad00aefbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54584-cwe-115-misinterpretation-of-input--f00a4e37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54584%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20finos%20git-proxy&amp;severity=high&amp;id=688a7dedad5a09ad00aefbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54583-cwe-863-incorrect-authorization-in--08589336</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54583%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20finos%20git-proxy&amp;severity=high&amp;id=688a7dedad5a09ad00aefbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54581-cwe-369-divide-by-zero-in-0x676e67--150a777a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54581%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%200x676e67%20vproxy&amp;severity=high&amp;id=688a7dedad5a09ad00aefbed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54575-cwe-400-uncontrolled-resource-consu-592430f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54575%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SixLabors%20ImageSharp&amp;severity=medium&amp;id=688a7a68ad5a09ad00aeea8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8330-sql-injection-in-code-projects-vehic-8a2b3328</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8330%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688a76e4ad5a09ad00ae7a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8329-sql-injection-in-code-projects-vehic-3a285370</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8329%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688a6fdcad5a09ad00ae31cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-v6-advanced-evasion-and-amsi-bypass-capabili-498e74e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%20V6%3A%20Advanced%20Evasion%20and%20AMSI%20Bypass%20Capabilities%20Revealed&amp;severity=medium&amp;id=688a6fdbad5a09ad00ae31b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30103-cwe-552-files-or-directories-access-91ceefed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30103%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=688a6550ad5a09ad00add7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36609-cwe-259-use-of-hard-coded-password--63c35841</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36609%3A%20CWE-259%3A%20Use%20of%20Hard-coded%20Password%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=low&amp;id=688a6550ad5a09ad00add7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36608-cwe-611-improper-restriction-of-xml-4343cef3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36608%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=688a6550ad5a09ad00add7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8328-sql-injection-in-code-projects-exam--d63ea576</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8328%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=688a61cdad5a09ad00adaf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30480-cwe-20-improper-input-validation-in-00093173</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30480%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=688a61cdad5a09ad00adaf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26332-cwe-532-insertion-of-sensitive-info-bf579805</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26332%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20TechAdvisor&amp;severity=high&amp;id=688a5e4dad5a09ad00ad8920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30105-cwe-532-insertion-of-sensitive-info-f8754e92</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30105%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20XtremIO&amp;severity=high&amp;id=688a5e4dad5a09ad00ad8923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-urges-patch-after-3-major-vpn-vulnerabil-fef78e17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Urges%20Patch%20After%203%20Major%20VPN%20Vulnerabilities%20Disclosed&amp;severity=medium&amp;id=688a5ac3ad5a09ad00ad6423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8327-sql-injection-in-code-projects-exam--6327d678</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8327%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=688a5acdad5a09ad00ad6450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36611-cwe-59-improper-link-resolution-bef-f5525a88</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36611%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Encryption&amp;severity=high&amp;id=688a4930ad5a09ad00ac938e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8312-cwe-833-deadlock-in-devolutions-serv-777c618c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8312%3A%20CWE-833%3A%20Deadlock%20in%20Devolutions%20Server&amp;severity=high&amp;id=688a45bdad5a09ad00aad1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8353-cwe-446-ui-discrepancy-for-security--9d7cc4db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8353%3A%20CWE-446%3A%20UI%20Discrepancy%20for%20Security%20Feature%20in%20Devolutions%20Server&amp;severity=medium&amp;id=688a45bdad5a09ad00aad1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54656-cwe-117-improper-output-neutralizat-75ade675</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54656%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Apache%20Software%20Foundation%20Apache%20Struts%20Extras&amp;severity=medium&amp;id=688a4228ad5a09ad00a927f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2593-loop-with-unreachable-exit-condition-7e73c825</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2593%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)&amp;severity=medium&amp;id=691f519438b88f02b51baac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spear-phishing-campaign-delivers-vip-keylogger-via-a6189621</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spear%20Phishing%20Campaign%20Delivers%20VIP%20Keylogger%20via%20Email%20Attachment&amp;severity=medium&amp;id=688a379bad5a09ad00a8807b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lnk-trojan-delivers-remcos-d99c2944</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LNK%20Trojan%20delivers%20REMCOS&amp;severity=medium&amp;id=688a3427ad5a09ad00a86d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-dahua-camera-flaws-enable-remote-hijack-v-7a5afc74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Dahua%20Camera%20Flaws%20Enable%20Remote%20Hijack%20via%20ONVIF%20and%20File%20Upload%20Exploits&amp;severity=critical&amp;id=688a3417ad5a09ad00a86d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeted-attacks-leverage-accounts-on-popular-onli-819130d9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeted%20attacks%20leverage%20accounts%20on%20popular%20online%20platforms%20as%20C2%20servers&amp;severity=medium&amp;id=688a3096ad5a09ad00a85234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gunra-ransomware-group-unveils-efficient-linux-var-1ae2ff35</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gunra%20Ransomware%20Group%20Unveils%20Efficient%20Linux%20Variant&amp;severity=medium&amp;id=688a3096ad5a09ad00a85247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54573-cwe-287-improper-authentication-in--3cc65262</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54573%3A%20CWE-287%3A%20Improper%20Authentication%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=688a3097ad5a09ad00a852b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43018-cwe-200-exposure-of-sensitive-infor-46d6470c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43018%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%2C%20Inc.%20Certain%20HP%20LaserJet%20Pro%20Printers&amp;severity=medium&amp;id=688a3097ad5a09ad00a852af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53944-cwe-285-improper-authorization-in-s-d9467dae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53944%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=688a3097ad5a09ad00a852b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46811-cwe-306-missing-authentication-for--99d6679a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46811%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SUSE%20Container%20suse%2Fmanager%2F5.0%2Fx86_64%2Fserver%3A5.0.5.7.30.1&amp;severity=critical&amp;id=688a2d10ad5a09ad00a699a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53357-cwe-639-authorization-bypass-throug-d3d204d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53357%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=688a2d10ad5a09ad00a699b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53113-cwe-284-improper-access-control-in--89680f32</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53113%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20glpi-project%20glpi&amp;severity=low&amp;id=688a2d10ad5a09ad00a699b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53112-cwe-284-improper-access-control-in--f030ca41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53112%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=688a2d10ad5a09ad00a699ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53111-cwe-284-improper-access-control-in--74d27c50</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53111%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=688a2d10ad5a09ad00a699ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53008-cwe-522-insufficiently-protected-cr-7f270ce4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53008%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=688a2991ad5a09ad00a671b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52897-cwe-80-improper-neutralization-of-s-ba89882b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52897%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=688a2991ad5a09ad00a671af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52567-cwe-918-server-side-request-forgery-40132ea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52567%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20glpi-project%20glpi&amp;severity=low&amp;id=688a2991ad5a09ad00a671ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54572-cwe-400-uncontrolled-resource-consu-bc79a718</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54572%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SAML-Toolkits%20ruby-saml&amp;severity=medium&amp;id=688a2991ad5a09ad00a671b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54430-cwe-78-improper-neutralization-of-s-d156be7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54430%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20dedupeio%20dedupe&amp;severity=critical&amp;id=688a2609ad5a09ad00a65510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54425-cwe-200-exposure-of-sensitive-infor-32acc31c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54425%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=688a2609ad5a09ad00a65514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inc-ransomware-claims-12tb-data-breach-at-dollar-t-488449ce</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inc%20Ransomware%20Claims%201.2TB%20Data%20Breach%20at%20Dollar%20Tree&amp;severity=high&amp;id=688a1f00ad5a09ad00a5da70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8326-sql-injection-in-code-projects-exam--46a19b5d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8326%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=688a1b7cad5a09ad00a5b343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47001-cross-site-scripting-stored-xss-cwe-8eb55880</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47001%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=688a1b7cad5a09ad00a5b340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-safari-vulnerability-also-exploited--986481a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Safari%20Vulnerability%20Also%20Exploited%20as%20Zero-Day%20in%20Google%20Chrome&amp;severity=critical&amp;id=688a17f6ad5a09ad00a3f907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-firms-linked-to-silk-typhoon-filed-15-pate-d39b7b54</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Firms%20Linked%20to%20Silk%20Typhoon%20Filed%2015%2B%20Patents%20for%20Cyber%20Espionage%20Tools&amp;severity=high&amp;id=688a17f6ad5a09ad00a3f90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-hacker-arrests-halt-attacks-but-c-e653e808</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%20Hacker%20Arrests%20Halt%20Attacks%2C%20But%20Copycat%20Threats%20Sustain%20Security%20Pressure&amp;severity=high&amp;id=688a0661ad5a09ad00a02a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seizes-20-btc-from-chaos-ransomware-affiliate--c7d98765</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20seizes%2020%20BTC%20from%20Chaos%20Ransomware%20affiliate%20targeting%20Texas%20firms&amp;severity=medium&amp;id=688a0661ad5a09ad00a02a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-behind-more-than-724-million-in-crypto-th-2d5ca836</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TrickBot%20Behind%20More%20Than%20%24724%20Million%20in%20Crypto%20Theft%20and%20Extortion%20to%20Date&amp;severity=medium&amp;id=688a02dcad5a09ad00a01630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-sap-flaw-exploited-to-launch-auto-color-m-84a6c946</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20SAP%20flaw%20exploited%20to%20launch%20Auto-Color%20Malware%20attack%20on%20U.S.%20company&amp;severity=critical&amp;id=6889e6bdad5a09ad009ca12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6348-cwe-89-improper-neutralization-of-sp-0eacb27a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6348%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nextendweb%20Smart%20Slider%203&amp;severity=medium&amp;id=6889d8aead5a09ad009c39cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1394-cwe-252-unchecked-return-value-in-si-1e944092</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1394%3A%20CWE-252%20Unchecked%20Return%20Value%20in%20silabs.com%20Zigbee%20Stack&amp;severity=medium&amp;id=6889d52dad5a09ad009905ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1221-cwe-667-improper-locking-in-silabsco-fc01f957</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1221%3A%20CWE-667%20Improper%20Locking%20in%20silabs.com%20Zigbee&amp;severity=medium&amp;id=6889d52dad5a09ad009905e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploiting-zero-days-in-abandoned-hardware-575a4f04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploiting%20zero%20days%20in%20abandoned%20hardware&amp;severity=medium&amp;id=6889caa2ad5a09ad0098b698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8323-cwe-434-unrestricted-upload-of-file--addedf32</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8323%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ventem%20e-School&amp;severity=high&amp;id=688a2609ad5a09ad00a6551f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8322-cwe-862-missing-authorization-in-ven-c1e1b9bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8322%3A%20CWE-862%20Missing%20Authorization%20in%20Ventem%20e-School&amp;severity=high&amp;id=688a2609ad5a09ad00a6551b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8292-use-after-free-in-google-chrome-45af6460</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8292%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=688a3428ad5a09ad00a86dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8320-cwe-1284-improper-validation-of-spec-45201348</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8320%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Tesla%20Wall%20Connector&amp;severity=high&amp;id=688972baad5a09ad00926b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8321-cwe-1328-security-version-number-mut-903274f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8321%3A%20CWE-1328%3A%20Security%20Version%20Number%20Mutable%20to%20Older%20Versions%20in%20Tesla%20Wall%20Connector&amp;severity=medium&amp;id=688972baad5a09ad00926b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4426-cwe-200-exposure-of-sensitive-inform-9799d807</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4426%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Insyde%20Software%20InsydeH2O&amp;severity=medium&amp;id=688972baad5a09ad00926b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4425-cwe-121-stack-based-buffer-overflow--2916afbd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4425%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=688972baad5a09ad00926b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4424-cwe-20-improper-input-validation-in--00d6289e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4424%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Insyde%20Software%20InsydeH2O&amp;severity=medium&amp;id=688972b9ad5a09ad00926b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4423-cwe-119-improper-restriction-of-oper-274fbcd0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4423%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=688972b9ad5a09ad00926b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4422-cwe-787-out-of-bounds-write-in-insyd-da7062cc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4422%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=688972b9ad5a09ad00926b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4421-cwe-787-out-of-bounds-write-in-insyd-21627ac2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4421%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=68896bb2ad5a09ad00925209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8217-cwe-506-embedded-malicious-code-in-a-bf0e525f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8217%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20Amazon%20Q%20Developer%20VS%20Code%20Extension&amp;severity=medium&amp;id=68896bb2ad5a09ad0092520d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25011-cwe-427-uncontrolled-search-path-el-20337de2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25011%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Elastic%20Beats&amp;severity=high&amp;id=68896bb2ad5a09ad00925206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0712-cwe-427-uncontrolled-search-path-ele-4c1dac67</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0712%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Elastic%20APM%20Server&amp;severity=high&amp;id=68896bb2ad5a09ad00925203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-30-44011901</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-30&amp;severity=medium&amp;id=688ab61dad5a09ad00b0e353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52187-na-c4be656d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52187%3A%20n%2Fa&amp;severity=high&amp;id=688a7361ad5a09ad00ae4ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51954-na-3dbf599b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51954%3A%20n%2Fa&amp;severity=medium&amp;id=688a7361ad5a09ad00ae4ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53022-na-9efb6615</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53022%3A%20n%2Fa&amp;severity=high&amp;id=688a7361ad5a09ad00ae4c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51951-na-714c698a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51951%3A%20n%2Fa&amp;severity=medium&amp;id=688a6fdcad5a09ad00ae31c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50464-na-3618f34c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50464%3A%20n%2Fa&amp;severity=medium&amp;id=688a6fdcad5a09ad00ae31c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50777-na-908c6407</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50777%3A%20n%2Fa&amp;severity=high&amp;id=688a6c58ad5a09ad00ae17a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45619-na-bd002f37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45619%3A%20n%2Fa&amp;severity=medium&amp;id=688a53bcad5a09ad00ace387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25692-na-b1c2284f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25692%3A%20n%2Fa&amp;severity=medium&amp;id=688a5038ad5a09ad00acbbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45620-na-2d674d53</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45620%3A%20n%2Fa&amp;severity=high&amp;id=688a5038ad5a09ad00acbbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25691-na-17594aee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25691%3A%20n%2Fa&amp;severity=medium&amp;id=688a5038ad5a09ad00acbbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50578-na-5028025c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50578%3A%20n%2Fa&amp;severity=critical&amp;id=688a3b20ad5a09ad00a89d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-from-pyongyang-to-your-payroll-the-rise-of-n-658a3b2b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20From%20Pyongyang%20to%20Your%20Payroll%3A%20The%20Rise%20of%20North%20Korean%20Remote%20Workers%20in%20the%20West&amp;severity=medium&amp;id=688a1b6ead5a09ad00a5ad0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43191-an-app-may-be-able-to-cause-a-denia-747f081d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43191%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=68896129ad5a09ad0091c5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43237-an-app-may-be-able-to-cause-unexpec-9c09a1d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43237%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=68896129ad5a09ad0091c5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43197-an-app-may-be-able-to-access-sensit-837e7a54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43197%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68896129ad5a09ad0091c5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43206-an-app-may-be-able-to-access-protec-a97435e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43206%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68896129ad5a09ad0091c5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43196-an-app-may-be-able-to-gain-root-pri-4fde9ecf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43196%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68896129ad5a09ad0091c5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43265-processing-maliciously-crafted-web--dc8c3442</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43265%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20internal%20states%20of%20the%20app%20in%20Apple%20Safari&amp;severity=medium&amp;id=68896129ad5a09ad0091c5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43233-a-malicious-app-acting-as-a-https-p-b42ce75d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43233%3A%20A%20malicious%20app%20acting%20as%20a%20HTTPS%20proxy%20could%20get%20access%20to%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=68896129ad5a09ad0091c5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43218-processing-a-maliciously-crafted-us-5e046a43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43218%3A%20Processing%20a%20maliciously%20crafted%20USD%20file%20may%20disclose%20memory%20contents%20in%20Apple%20macOS&amp;severity=medium&amp;id=68896129ad5a09ad0091c5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24188-processing-maliciously-crafted-web--0738935b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24188%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da6ad5a09ad0091b857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43216-processing-maliciously-crafted-web--a4422208</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43216%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da6ad5a09ad0091b8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43186-parsing-a-file-may-lead-to-an-unexp-e9fb125e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43186%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68895da6ad5a09ad0091b87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43217-privacy-indicators-for-microphone-o-bdc6b458</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43217%3A%20Privacy%20Indicators%20for%20microphone%20or%20camera%20access%20may%20not%20be%20correctly%20displayed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43276-icloud-private-relay-may-not-activa-061079e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43276%3A%20iCloud%20Private%20Relay%20may%20not%20activate%20when%20more%20than%20one%20user%20is%20logged%20in%20at%20the%20same%20time%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da8ad5a09ad0091b95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31276-remote-content-may-be-loaded-even-w-295d3777</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31276%3A%20Remote%20content%20may%20be%20loaded%20even%20when%20the%20&apos;Load%20Remote%20Images&apos;%20setting%20is%20turned%20off%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68895da6ad5a09ad0091b868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43260-an-app-may-be-able-to-hijack-entitl-dd53077b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43260%3A%20An%20app%20may%20be%20able%20to%20hijack%20entitlements%20granted%20to%20other%20privileged%20apps%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43247-a-malicious-app-with-root-privilege-8e42501e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43247%3A%20A%20malicious%20app%20with%20root%20privileges%20may%20be%20able%20to%20modify%20the%20contents%20of%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43230-an-app-may-be-able-to-access-user-s-53fa5ea9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43230%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43226-processing-a-maliciously-crafted-im-39d6e678</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43226%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24224-a-remote-attacker-may-be-able-to-ca-4975635d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24224%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68895da6ad5a09ad0091b85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43227-processing-maliciously-crafted-web--e86216e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43227%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20sensitive%20user%20information%20in%20Apple%20Safari&amp;severity=high&amp;id=68895da7ad5a09ad0091b8ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43270-an-app-may-gain-unauthorized-access-96b27e06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43270%3A%20An%20app%20may%20gain%20unauthorized%20access%20to%20Local%20Network%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da7ad5a09ad0091b946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43266-an-app-may-be-able-to-break-out-of--1d3edfe5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43266%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43211-processing-web-content-may-lead-to--6c0e6bc5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43211%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da6ad5a09ad0091b8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43250-an-app-may-be-able-to-break-out-of--389f89a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43250%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43245-an-app-may-be-able-to-access-protec-db733ed9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43245%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43212-processing-maliciously-crafted-web--f818492d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43212%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da6ad5a09ad0091b8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43253-a-malicious-app-may-be-able-to-laun-4599d9d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43253%3A%20A%20malicious%20app%20may%20be%20able%20to%20launch%20arbitrary%20binaries%20on%20a%20trusted%20device%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43195-an-app-may-be-able-to-access-sensit-03ce0be5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43195%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da6ad5a09ad0091b895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43228-visiting-a-malicious-website-may-le-5946948a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43228%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da7ad5a09ad0091b8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43249-an-app-may-be-able-to-gain-root-pri-834c927f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43249%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da7ad5a09ad0091b927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43199-a-malicious-app-may-be-able-to-gain-cba7297f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43199%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da6ad5a09ad0091b89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43224-processing-a-maliciously-crafted-me-bacdeeff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43224%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68895da7ad5a09ad0091b8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43232-an-app-may-be-able-to-bypass-certai-c570c7a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43232%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43198-an-app-may-be-able-to-access-protec-2d915268</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43198%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da6ad5a09ad0091b89a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43209-processing-maliciously-crafted-web--0f4d79d2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43209%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68895da6ad5a09ad0091b8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24119-an-app-may-be-able-to-execute-arbit-72792c9e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24119%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da6ad5a09ad0091b852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43194-an-app-may-be-able-to-modify-protec-362755ef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43194%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da6ad5a09ad0091b890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43252-a-website-may-be-able-to-access-sen-911fceaf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43252%3A%20A%20website%20may%20be%20able%20to%20access%20sensitive%20user%20data%20when%20resolving%20symlinks%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43244-an-app-may-be-able-to-cause-unexpec-45fb1611</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43244%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43259-an-attacker-with-physical-access-to-f73594b3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43259%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43275-an-app-may-be-able-to-break-out-of--3503f704</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43275%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43234-processing-a-maliciously-crafted-te-2b9422cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43234%3A%20Processing%20a%20maliciously%20crafted%20texture%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43185-an-app-may-be-able-to-access-protec-e36c6484</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43185%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da6ad5a09ad0091b877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43214-processing-maliciously-crafted-web--89839f0c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43214%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da6ad5a09ad0091b8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31243-an-app-may-be-able-to-gain-root-pri-70136162</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31243%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da6ad5a09ad0091b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31280-processing-a-maliciously-crafted-fi-22ba7203</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31280%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20heap%20corruption%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da6ad5a09ad0091b874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31278-processing-maliciously-crafted-web--668e7e41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31278%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=68895da6ad5a09ad0091b86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43215-processing-a-maliciously-crafted-im-dcb155c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43215%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da6ad5a09ad0091b8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43188-a-malicious-app-may-be-able-to-gain-4ac5bf02</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43188%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da6ad5a09ad0091b883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8319-cwe-79-improper-neutralization-of-in-28f62853</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20Barracuda%20Barracuda%20Message%20Archiver&amp;severity=medium&amp;id=68895da8ad5a09ad0091b95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43261-an-app-may-be-able-to-break-out-of--c2e57295</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43261%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a2aad5a09ad0091ae71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31277-processing-maliciously-crafted-web--b9ad7c9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31277%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=68895a29ad5a09ad0091ade3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43277-processing-a-maliciously-crafted-au-f1276986</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43277%3A%20Processing%20a%20maliciously%20crafted%20audio%20file%20may%20lead%20to%20memory%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68895a2bad5a09ad0091ae89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43220-an-app-may-be-able-to-access-protec-f9782dd2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43220%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=68895a2aad5a09ad0091ae19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43241-an-app-may-be-able-to-read-files-ou-6c53d37c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43241%3A%20An%20app%20may%20be%20able%20to%20read%20files%20outside%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43240-a-downloads-origin-may-be-incorrect-5255373e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43240%3A%20A%20download&apos;s%20origin%20may%20be%20incorrectly%20associated%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43256-an-app-may-be-able-to-gain-root-pri-628376b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43256%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43221-processing-a-maliciously-crafted-me-2d8bd12a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43221%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43251-a-local-attacker-may-gain-access-to-3d5975c9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43251%3A%20A%20local%20attacker%20may%20gain%20access%20to%20Keychain%20items%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43267-an-app-may-be-able-to-access-sensit-1a28271e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43267%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43246-an-app-may-be-able-to-access-sensit-d71dcd9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43246%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43273-a-sandboxed-process-may-be-able-to--8c4d82d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43273%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a2aad5a09ad0091ae79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31273-processing-maliciously-crafted-web--1c214ef7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31273%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=68895a29ad5a09ad0091add9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43225-an-app-may-be-able-to-access-sensit-93e78dd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43225%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iPadOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43248-a-malicious-app-may-be-able-to-gain-4f4873fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43248%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31229-passcode-may-be-read-aloud-by-voice-37c57d55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31229%3A%20Passcode%20may%20be%20read%20aloud%20by%20VoiceOver%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091add6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43229-processing-maliciously-crafted-web--b7656a59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43229%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20universal%20cross%20site%20scripting%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43213-processing-maliciously-crafted-web--e6a4e498</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43213%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43189-a-malicious-app-may-be-able-to-read-fcd0e934</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43189%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091adfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43222-an-attacker-may-be-able-to-cause-un-86698b6c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43222%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=68895a2aad5a09ad0091ae25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31275-a-sandboxed-process-may-be-able-to--2d49cc6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31275%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20launch%20any%20installed%20app%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a29ad5a09ad0091ade0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43243-an-app-may-be-able-to-modify-protec-2ac87e31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43243%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a2aad5a09ad0091ae58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43193-an-app-may-be-able-to-cause-a-denia-e1b8b47a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43193%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091ae03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31279-an-app-may-be-able-to-fingerprint-t-1ae6dc2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31279%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091adea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43239-processing-a-maliciously-crafted-fi-8991fa55</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43239%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31281-processing-a-maliciously-crafted-fi-6cbfec0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31281%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091adf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43192-account-driven-user-enrollment-may--42e6046b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43192%3A%20Account-driven%20User%20Enrollment%20may%20still%20be%20possible%20with%20Lockdown%20Mode%20turned%20on%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091adff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43254-processing-a-maliciously-crafted-fi-426b1409</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43254%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43184-a-shortcut-may-be-able-to-bypass-se-77c43a75</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43184%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20sensitive%20Shortcuts%20app%20settings%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091adf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43235-an-app-may-be-able-to-cause-a-denia-b197acc4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43235%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43274-a-sandboxed-process-may-be-able-to--dd3ef74e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43274%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2bad5a09ad0091ae86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43223-a-non-privileged-user-may-be-able-t-882b27ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43223%3A%20A%20non-privileged%20user%20may%20be%20able%20to%20modify%20restricted%20network%20settings%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/minnesota-activates-national-guard-after-st-paul-c-6f1b3828</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Minnesota%20activates%20National%20Guard%20after%20St.%20Paul%20cyberattack&amp;severity=high&amp;id=68895a1cad5a09ad0091adbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54126-cwe-668-exposure-of-resource-to-wro-07c40f92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54126%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=medium&amp;id=68894505ad5a09ad00916e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7849-cwe-1285-in-ni-labview-1ad89ef9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7849%3A%20CWE-1285%20in%20NI%20LabVIEW&amp;severity=high&amp;id=68893dfdad5a09ad00914ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7848-cwe-1285-improper-validation-of-spec-af09917a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7848%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20NI%20LabVIEW&amp;severity=high&amp;id=68893dfdad5a09ad00914ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7361-cwe-94-improper-control-of-generatio-f43cca86</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7361%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NI%20LabVIEW&amp;severity=high&amp;id=68893dfdad5a09ad00914ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4674-cwe-73-external-control-of-file-name-ee3447bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4674%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=68893dfdad5a09ad00914ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-q-now-with-helpful-ai-powered-self-destruct-3705db49</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Q%3A%20Now%20with%20Helpful%20AI-Powered%20Self-Destruct%20Capabilities&amp;severity=medium&amp;id=68893e01ad5a09ad00914ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40600-cwe-134-use-of-externally-controlle-f123dc6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40600%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20SonicWall%20SonicOS&amp;severity=critical&amp;id=68893dfdad5a09ad00914ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5684-cwe-79-improper-neutralization-of-in-2007742b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5684%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roxnor%20MetForm%20%E2%80%93%20Contact%20Form%2C%20Survey%2C%20Quiz%2C%20%26%20Custom%20Form%20Builder%20for%20Elementor&amp;severity=medium&amp;id=68892561ad5a09ad00908c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53902-cwe-863-incorrect-authorization-in--874fc1dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53902%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=68892561ad5a09ad00908c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53541-cwe-79-improper-neutralization-of-i-5c19503c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53541%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=688921ddad5a09ad008fc735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52899-cwe-204-observable-response-discrep-59af2f86</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52899%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=688921ddad5a09ad008fc72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seizes-24m-in-bitcoin-from-new-chaos-ransomwar-4248acca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20seizes%20%242.4M%20in%20Bitcoin%20from%20new%20Chaos%20ransomware%20operation&amp;severity=high&amp;id=68891750ad5a09ad008f93e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-telecom-giant-orange-discloses-cyberattack-b31a25e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20telecom%20giant%20Orange%20discloses%20cyberattack&amp;severity=high&amp;id=68891750ad5a09ad008f93e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wiz-uncovers-critical-access-bypass-flaw-in-ai-pow-53db7f28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wiz%20Uncovers%20Critical%20Access%20Bypass%20Flaw%20in%20AI-Powered%20Vibe%20Coding%20Platform%20Base44&amp;severity=critical&amp;id=68891750ad5a09ad008f93e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33114-cwe-943-improper-neutralization-of--b080b3f6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33114%3A%20CWE-943%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20IBM%20Db2&amp;severity=medium&amp;id=6889176ead5a09ad008f94ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33092-cwe-121-stack-based-buffer-overflow-e33c4e5a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33092%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20IBM%20Db2&amp;severity=high&amp;id=6889176ead5a09ad008f94aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36071-cwe-772-missing-release-of-resource-20858afc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36071%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20IBM%20IBM%20Db2&amp;severity=medium&amp;id=6889176ead5a09ad008f94b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36010-cwe-833-deadlock-in-ibm-db2-968d43d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36010%3A%20CWE-833%20Deadlock%20in%20IBM%20Db2&amp;severity=medium&amp;id=68891048ad5a09ad008f649c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53715-cwe-119-improper-restriction-of-ope-2de44f75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53715%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20TP-Link%20Systems%20INC.%20TL-WR841N%20V11&amp;severity=medium&amp;id=68890cc5ad5a09ad008f5cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53714-cwe-119-improper-restriction-of-ope-19edc753</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53714%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20TP-Link%20Systems%20INC.%20TL-WR841N%20V11&amp;severity=medium&amp;id=68890cc5ad5a09ad008f5cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53713-cwe-120-buffer-copy-without-checkin-1b5ca5dd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53713%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Systems%20INC.%20TL-WR841N%20V11&amp;severity=medium&amp;id=68890cc5ad5a09ad008f5cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53712-cwe-120-buffer-copy-without-checkin-b129e199</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53712%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Systems%20INC.%20TL-WR841N%20V11&amp;severity=medium&amp;id=68890cc5ad5a09ad008f5cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7675-cwe-787-out-of-bounds-write-in-autod-e700c2d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7675%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53711-cwe-120-buffer-copy-without-checkin-e49a48c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53711%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Systems%20INC.%20TL-WR841N%20v11&amp;severity=medium&amp;id=68890cc5ad5a09ad008f5cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7497-cwe-787-out-of-bounds-write-in-autod-972be439</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7497%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6637-cwe-787-out-of-bounds-write-in-autod-bd8ab68e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6637%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6636-cwe-416-use-after-free-in-autodesk-s-f8179348</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6636%3A%20CWE-416%20Use%20After%20Free%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6635-cwe-125-out-of-bounds-read-in-autode-baa669f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6635%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6631-cwe-787-out-of-bounds-write-in-autod-54c11733</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6631%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5043-cwe-122-heap-based-buffer-overflow-i-a85040aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5043%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5038-cwe-120-buffer-copy-without-checking-8b45346b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5038%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2928-improper-neutralization-of-special-e-5745e8b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2928%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Genetec%20Inc.%20Genetec%20Security%20Center&amp;severity=high&amp;id=68890941ad5a09ad008f4e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2533-cwe-789-uncontrolled-memory-allocati-1c83289f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2533%3A%20CWE-789%20Uncontrolled%20Memory%20Allocation%20in%20IBM%20Db2&amp;severity=medium&amp;id=68890940ad5a09ad008f4e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27514-cwe-80-improper-neutralization-of-s-38307965</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27514%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=68890940ad5a09ad008f4e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-choicejacking-attack-steals-data-from-phones-v-98ce7ed3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Choicejacking%20Attack%20Steals%20Data%20from%20Phones%20via%20Public%20Chargers&amp;severity=medium&amp;id=688905bbad5a09ad008f3a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2179-cwe-266-incorrect-privilege-assignme-7c6ae2fe</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2179%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=medium&amp;id=688905c6ad5a09ad008f3af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5922-cwe-522-insufficiently-protected-cre-fb68b0bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5922%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20TSplus%20TSplus%20Remote%20Access&amp;severity=medium&amp;id=6888feb4ad5a09ad008eef18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31965-cwe-305-authentication-bypass-by-pr-81c6efa4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31965%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20HCL%20Software%20BigFix%20Remote%20Control&amp;severity=high&amp;id=6888feb4ad5a09ad008eef11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-react-didnt-kill-xss-the-new-javascript-inject-10d28079</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20React%20Didn&apos;t%20Kill%20XSS%3A%20The%20New%20JavaScript%20Injection%20Playbook&amp;severity=high&amp;id=6888e293ad5a09ad008e6efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-use-fake-apps-to-steal-data-and-bla-59ccd000</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Use%20Fake%20Apps%20to%20Steal%20Data%20and%20Blackmail%20Users%20Across%20Asia%E2%80%99s%20Mobile%20Networks&amp;severity=high&amp;id=6888e293ad5a09ad008e6f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-netweaver-vulnerability-used-in-first-auto-col-854c2568</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20NetWeaver%20Vulnerability%20Used%20in%20First%20Auto-Color%20Malware%20Attack%20on%20US%20Firm&amp;severity=medium&amp;id=6888d0fdad5a09ad008e0de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6505-unauthorized-access-and-impersonatio-2498b9fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6505%3A%20Unauthorized%20Access%20and%20Impersonation%20in%20Progress%20Software%20Hybrid%20Data%20Pipeline&amp;severity=high&amp;id=6888c9f6ad5a09ad008de59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6504-unauthorized-access-to-sensitive-res-5f4645d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6504%3A%20Unauthorized%20Access%20to%20Sensitive%20resources%20in%20Progress%20Software%20Hybrid%20Data%20Pipeline&amp;severity=high&amp;id=6888c9f6ad5a09ad008de597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54422-cwe-312-cleartext-storage-of-sensit-95712eba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54422%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20sandboxie-plus%20Sandboxie&amp;severity=medium&amp;id=6888c9f6ad5a09ad008de592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-ukraine-hacktivists-claim-cyberattack-on-russi-7de26118</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Ukraine%20hacktivists%20claim%20cyberattack%20on%20Russian%20Airline%20Aeroflot%20that%20caused%20the%20cancellation%20of%20%2B100%20flights&amp;severity=medium&amp;id=6888c2edad5a09ad008dbfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aeroflot-hacked-schneier-on-security-793aee4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aeroflot%20Hacked%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6888c2edad5a09ad008dbfb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attacking-genai-applications-and-llms-sometimes-al-614a6c14</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attacking%20GenAI%20applications%20and%20LLMs%20-%20Sometimes%20all%20it%20takes%20is%20to%20ask%20nicely!&amp;severity=medium&amp;id=6888bf6cad5a09ad008dac54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6060-cwe-79-improper-neutralization-of-in-95c39006</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6060%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DECE%20Software%20Geodi&amp;severity=medium&amp;id=6888c301ad5a09ad008dc307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41241-cwe-754-improper-check-for-unusual--dfa82d21</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41241%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20VMware%20vCenter&amp;severity=medium&amp;id=6888c301ad5a09ad008dc304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6175-cwe-93-improper-neutralization-of-cr-0882199b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6175%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20DECE%20Software%20Geodi&amp;severity=high&amp;id=6888c301ad5a09ad008dc30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5587-cwe-79-improper-neutralization-of-in-e903466c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Appzend&amp;severity=medium&amp;id=6888b159ad5a09ad008d61d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lovense-sex-toy-app-flaw-leaks-private-user-email--ebc14a7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lovense%20sex%20toy%20app%20flaw%20leaks%20private%20user%20email%20addresses&amp;severity=high&amp;id=688898bfad5a09ad008cd7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-papercut-ngmf-csrf-vulnerability-to-kev--2e0722b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20PaperCut%20NG%2FMF%20CSRF%20Vulnerability%20to%20KEV%20Catalog%20Amid%20Active%20Exploitation&amp;severity=high&amp;id=688898bfad5a09ad008cd7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seychelles-commercial-bank-reported-cybersecurity--d37bb117</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Seychelles%20Commercial%20Bank%20Reported%20Cybersecurity%20Incident&amp;severity=high&amp;id=688898bfad5a09ad008cd7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6692-cwe-79-improper-neutralization-of-in-a983146b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6692%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hanucodes%20YouTube%20Embed%20%E2%80%93%20YouTube%20Gallery%2C%20Vimeo%20Gallery%20%E2%80%93%20WordPress%20Plugin&amp;severity=medium&amp;id=68889537ad5a09ad008cc7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7689-cwe-862-missing-authorization-in-the-21d79579</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7689%3A%20CWE-862%20Missing%20Authorization%20in%20themefic%20Hydra%20Booking%20%E2%80%93%20All%20in%20One%20Appointment%20Booking%20System%20%7C%20Appointment%20Scheduling%2C%20Booking%20Calendar%20%26%20WooCommerce%20Bookings&amp;severity=high&amp;id=68889537ad5a09ad008cc7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6681-cwe-79-improper-neutralization-of-in-eb9d26d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20delower186%20Fan%20Page&amp;severity=medium&amp;id=68889537ad5a09ad008cc7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8196-cwe-79-improper-neutralization-of-in-84396929</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8196%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nalam-1%20Magical%20Addons%20For%20Elementor%20(%20Header%20Footer%20Builder%2C%20Free%20Elementor%20Widgets%2C%20Elementor%20Templates%20Library%20)&amp;severity=medium&amp;id=68889537ad5a09ad008cc7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6730-cwe-862-missing-authorization-in-ama-ae1749af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6730%3A%20CWE-862%20Missing%20Authorization%20in%20amans2k%20Bonanza%20%E2%80%93%20WooCommerce%20Free%20Gifts%20Lite&amp;severity=medium&amp;id=68889537ad5a09ad008cc7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8216-cwe-79-improper-neutralization-of-in-abd194d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8216%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wowdevs%20Sky%20Addons%20%E2%80%93%20Elementor%20Addons%20with%20Widgets%20%26%20Templates&amp;severity=medium&amp;id=68889537ad5a09ad008cc7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/struts-devmode-in-2025-critical-pre-auth-vulnerabi-e312fdfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Struts%20Devmode%20in%202025%3F%20Critical%20Pre-Auth%20Vulnerabilities%20in%20Adobe%20Experience%20Manager%20Forms&amp;severity=critical&amp;id=6888872aad5a09ad008c704f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-gemini-ai-cli-hijack-code-execution-through-10658cfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Gemini%20AI%20CLI%20Hijack%20-%20Code%20Execution%20Through%20Deception&amp;severity=medium&amp;id=688883a5ad5a09ad008c45f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26400-cwe-611-improper-restriction-of-xml-ef4904a3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26400%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=medium&amp;id=688883a3ad5a09ad008c45e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53082-cwe-23-relative-path-traversal-in-s-22e03448</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53082%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Samsung%20Electronics%20Data%20Management%20Server&amp;severity=medium&amp;id=68885cf7ad5a09ad008b57f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53081-cwe-22-improper-limitation-of-a-pat-13c39280</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53081%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20Data%20Management%20Server&amp;severity=medium&amp;id=68885cf7ad5a09ad008b57ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53080-cwe-22-improper-limitation-of-a-pat-1436dcf9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53080%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20Data%20Management%20Server&amp;severity=high&amp;id=68885973ad5a09ad008b437d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53079-cwe-36-absolute-path-traversal-in-s-77503fb5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53079%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Samsung%20Electronics%20Data%20Management%20Server&amp;severity=medium&amp;id=68885973ad5a09ad008b437a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53078-cwe-502-deserialization-of-untruste-5bb31e7f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53078%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Samsung%20Electronics%20Data%20Management%20Server&amp;severity=high&amp;id=68885973ad5a09ad008b4377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53077-cwe-698-execution-after-redirect-ea-dc947bfd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53077%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20Samsung%20Electronics%20DMS(Data%20Management%20Server)&amp;severity=medium&amp;id=68885973ad5a09ad008b4374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8264-sql-injection-in-z-pushz-push-dev-7a3ed000</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8264%3A%20SQL%20Injection%20in%20z-push%2Fz-push-dev&amp;severity=critical&amp;id=68885973ad5a09ad008b4380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53649-insertion-of-sensitive-information--18e0bee5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53649%3A%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20SwitchBot%20SwitchBot%20App%20for%20iOS%2FAndroid&amp;severity=medium&amp;id=688855efad5a09ad008b38e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4370-cwe-862-missing-authorization-in-the-804ce41e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4370%3A%20CWE-862%20Missing%20Authorization%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=68884ee8ad5a09ad008b0616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4566-cwe-79-improper-neutralization-of-in-83f43ca7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4566%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=68884ee8ad5a09ad008b061b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3075-cwe-79-improper-neutralization-of-in-9327077a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3075%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=68884ee8ad5a09ad008b0612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6495-cwe-89-improper-neutralization-of-sp-228df740</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bricks%20Builder%20Bricks&amp;severity=high&amp;id=68884ee8ad5a09ad008b0621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7811-cwe-79-improper-neutralization-of-in-849352cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20YouTube%20Integration&amp;severity=medium&amp;id=68884b63ad5a09ad008aed54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7809-cwe-79-improper-neutralization-of-in-fff365e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20Twitch%20Integration&amp;severity=medium&amp;id=68884b63ad5a09ad008aed4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7810-cwe-79-improper-neutralization-of-in-f0718432</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20Kick%20Integration&amp;severity=medium&amp;id=68884b63ad5a09ad008aed4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-29-7321fe28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-29&amp;severity=medium&amp;id=6889649cad5a09ad0091e9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52490-na-b58e5dad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52490%3A%20n%2Fa&amp;severity=high&amp;id=68892c6fad5a09ad0090e08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45346-na-09d129a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45346%3A%20n%2Fa&amp;severity=high&amp;id=68892561ad5a09ad00908c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51045-na-1f000cd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51045%3A%20n%2Fa&amp;severity=medium&amp;id=6889176ead5a09ad008f94b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51044-na-e6982bb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51044%3A%20n%2Fa&amp;severity=medium&amp;id=6889176ead5a09ad008f94b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52284-na-dfcd0a77</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52284%3A%20n%2Fa&amp;severity=medium&amp;id=68890941ad5a09ad008f4e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44137-na-fa26b2b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44137%3A%20n%2Fa&amp;severity=high&amp;id=68890237ad5a09ad008ef5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44136-na-72fd0b58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44136%3A%20n%2Fa&amp;severity=critical&amp;id=6888feb4ad5a09ad008eef14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28170-na-cfc0485d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28170%3A%20n%2Fa&amp;severity=high&amp;id=6888feb4ad5a09ad008eef0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28171-na-e144075e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28171%3A%20n%2Fa&amp;severity=medium&amp;id=6888ed23ad5a09ad008ea7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28172-na-7684e85c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28172%3A%20n%2Fa&amp;severity=medium&amp;id=6888e618ad5a09ad008e7cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51970-na-88c4791f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51970%3A%20n%2Fa&amp;severity=high&amp;id=6888e2aaad5a09ad008e6f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46059-na-21a19291</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46059%3A%20n%2Fa&amp;severity=critical&amp;id=6888df0ead5a09ad008e5f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50738-na-409cd627</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50738%3A%20n%2Fa&amp;severity=critical&amp;id=6888d806ad5a09ad008e3c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52358-na-5cb21334</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52358%3A%20n%2Fa&amp;severity=medium&amp;id=6888d10fad5a09ad008e140e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54769-cwe-24-path-traversal-filedir-in-xo-24e0f7f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54769%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Xorux%20LPAR2RRD&amp;severity=high&amp;id=68880c1bad5a09ad008855e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54768-cwe-648-incorrect-use-of-privileged-29472f3e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54768%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Xorux%20LPAR2RRD&amp;severity=medium&amp;id=68880c1bad5a09ad008855f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54767-cwe-648-incorrect-use-of-privileged-8a3373bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54767%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Xorux%20LPAR2RRD&amp;severity=medium&amp;id=68880c1bad5a09ad008855ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54765-cwe-648-incorrect-use-of-privileged-674561ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54765%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Xorux%20XorMon-NG&amp;severity=medium&amp;id=68880c1bad5a09ad008855ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54766-cwe-648-incorrect-use-of-privileged-dcb7815a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54766%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Xorux%20XorMon-NG&amp;severity=medium&amp;id=68880897ad5a09ad00884acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-group-ransomware-claims-breach-of-media-gia-362d328d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GLOBAL%20GROUP%20Ransomware%20Claims%20Breach%20of%20Media%20Giant%20Albavisi%C3%B3n&amp;severity=high&amp;id=6887f37ead5a09ad0087c10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54429-cwe-704-incorrect-type-conversion-o-19a45c63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54429%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20polkadot-evm%20frontier&amp;severity=medium&amp;id=6887e1ecad5a09ad0087279c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54428-cwe-522-insufficiently-protected-cr-d4d89600</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54428%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20musombi123%20RevelaCode-Backend&amp;severity=critical&amp;id=6887de68ad5a09ad00871937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54427-cwe-682-incorrect-calculation-in-po-e5513153</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54427%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20polkadot-evm%20frontier&amp;severity=medium&amp;id=6887de68ad5a09ad00871932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54426-cwe-327-use-of-a-broken-or-risky-cr-3ff1c747</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54426%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20polkadot-evm%20frontier&amp;severity=critical&amp;id=6887de68ad5a09ad0087193b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54423-cwe-79-improper-neutralization-of-i-92c9550c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54423%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=6887d760ad5a09ad0086e271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-launching-ransomware-on-hijacked--97255fc9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%20Launching%20Ransomware%20on%20Hijacked%20VMware%20Systems%2C%20Warns%20Google&amp;severity=medium&amp;id=6887c5caad5a09ad008660c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8194-cwe-835-loop-with-unreachable-exit-c-5566a6f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8194%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=6887c950ad5a09ad00867b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8283-external-control-of-system-or-config-f890fce3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8283%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting&amp;severity=low&amp;id=6887c247ad5a09ad00864a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-sploitlight-vulnerability-exposes-apple-inte-c3eff6a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20Sploitlight%20Vulnerability%20Exposes%20Apple%20Intelligence-Cached%20Data%20to%20Attackers%2C%20Microsoft&amp;severity=medium&amp;id=6887bb43ad5a09ad00860905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43023-cwe-347-improper-verification-of-cr-39b213d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43023%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20HP%2C%20Inc.%20HP%20Linux%20Imaging%20and%20Printing%20Software&amp;severity=medium&amp;id=6887bb4dad5a09ad0086092d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54299-cwe-79-improper-neutralization-of-i-28a0d8da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nobossextensions.com%20No%20Boss%20Testimonials%20component%20for%20Joomla&amp;severity=critical&amp;id=6887b7bcad5a09ad0085f541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54298-cwe-79-improper-neutralization-of-i-f4298df0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54298%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20firecoders.com%20CommentBox%20component%20for%20Joomla&amp;severity=critical&amp;id=6887b7bcad5a09ad0085f53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-purple-team-approach-on-badsuccessor-d65a5d10</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20purple%20team%20approach%20on%20BadSuccessor&amp;severity=medium&amp;id=6887b439ad5a09ad0085e692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/post-smtp-plugin-flaw-allowed-subscribers-to-take--e4f938e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Post%20SMTP%20Plugin%20Flaw%20Allowed%20Subscribers%20to%20Take%20Over%20Admin%20Accounts&amp;severity=medium&amp;id=6887a9a9ad5a09ad00855425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7676-cwe-427-uncontrolled-search-path-ele-1d9d2064</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7676%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%2C%20Inc%20Windows%2011&amp;severity=medium&amp;id=6887a9b7ad5a09ad00855475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54538-cwe-312-in-jetbrains-teamcity-8c0c9f7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54538%3A%20CWE-312%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54537-cwe-312-in-jetbrains-teamcity-d51a8808</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54537%3A%20CWE-312%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54536-cwe-352-in-jetbrains-teamcity-0af31a95</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54536%3A%20CWE-352%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54535-cwe-328-in-jetbrains-teamcity-f2011e94</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54535%3A%20CWE-328%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54534-cwe-79-in-jetbrains-teamcity-bb4300ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54534%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54533-cwe-863-in-jetbrains-teamcity-55eec73b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54533%3A%20CWE-863%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54532-cwe-863-in-jetbrains-teamcity-22b7c506</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54532%3A%20CWE-863%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54531-cwe-23-in-jetbrains-teamcity-37b087c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54531%3A%20CWE-23%20in%20JetBrains%20TeamCity&amp;severity=high&amp;id=6887a62bad5a09ad008544d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54530-cwe-276-in-jetbrains-teamcity-e587944e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54530%3A%20CWE-276%20in%20JetBrains%20TeamCity&amp;severity=high&amp;id=6887a62bad5a09ad008544d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54529-cwe-352-in-jetbrains-teamcity-e07b0d17</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54529%3A%20CWE-352%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=6887a62bad5a09ad008544d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54528-cwe-352-in-jetbrains-teamcity-66851a37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54528%3A%20CWE-352%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54527-cwe-1021-in-jetbrains-youtrack-6d0d6634</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54527%3A%20CWE-1021%20in%20JetBrains%20YouTrack&amp;severity=medium&amp;id=6887a62bad5a09ad008544cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6250-cwe-424-in-beyondtrust-privilege-man-a5be9b0d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6250%3A%20CWE-424%20in%20BeyondTrust%20Privilege%20Management%20for%20Windows&amp;severity=high&amp;id=68879b9aad5a09ad0084eb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2297-cwe-268-in-beyondtrust-privilege-man-0934ef3e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2297%3A%20CWE-268%20in%20BeyondTrust%20Privilege%20Management%20for%20Windows&amp;severity=high&amp;id=68879b9aad5a09ad0084eb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53696-cwe-494-download-of-code-without-in-2b89df7f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53696%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Johnson%20Controls%2C%20Inc%20iSTAR%20Ultra&amp;severity=critical&amp;id=68878d8aad5a09ad008474ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53695-cwe-78-improper-neutralization-of-s-bd4554a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53695%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%2C%20Inc%20iSTAR%20Ultra&amp;severity=critical&amp;id=68878682ad5a09ad00842ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8279-cwe-306-missing-authentication-for-c-2a8ee878</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8279%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20GitLab%20GitLab%20Language%20Server&amp;severity=high&amp;id=68878682ad5a09ad00842ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26469-cwe-732-incorrect-permission-assign-a31399c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26469%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=critical&amp;id=6887910fad5a09ad0084b289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27724-cwe-284-improper-access-control-in--f2d6da0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27724%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=critical&amp;id=6887910fad5a09ad0084b28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32731-cwe-79-improper-neutralization-of-i-f43df137</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32731%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=6887910fad5a09ad0084b28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24485-cwe-918-server-side-request-forgery-6f1e8896</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24485%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=6887910fad5a09ad0084b286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4056-improper-control-of-generation-of-co-01f11039</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4056%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=688774f0ad5a09ad0083c0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badsuccessor-purple-team-3e0bfdcc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BadSuccessor%20%E2%80%93%20Purple%20Team&amp;severity=medium&amp;id=68876de7ad5a09ad008375e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8275-improper-export-of-android-applicati-cb1058a9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8275%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20bsc%20Peru%20Cocktails%20App&amp;severity=medium&amp;id=68876a67ad5a09ad008330c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tea-app-breach-women-only-dating-platform-leaks-72-2a6670ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tea%20App%20Breach%3A%20Women%20Only%20Dating%20Platform%20Leaks%2072%2C000%20User%20Images&amp;severity=high&amp;id=6887635dad5a09ad0082e878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8274-sql-injection-in-campcodes-online-re-773a722f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8274%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=6887636aad5a09ad0082e8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5997-cwe-648-incorrect-use-of-privileged--d1827f23</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5997%3A%20CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Beamsec%20PhishPro&amp;severity=high&amp;id=68875fd9ad5a09ad0082bcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6918-cwe-89-improper-neutralization-of-sp-d4c9540e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6918%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ncvav%20Virtual%20PBX%20Software&amp;severity=critical&amp;id=68875c52ad5a09ad008291a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8273-sql-injection-in-code-projects-exam--d28aca87</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8273%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68875c52ad5a09ad008291ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-group-fire-ant-exploits-vmware-and-f5-a0521bd1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20group%20Fire%20Ant%20exploits%20VMware%20and%20F5%20flaws%20since%20early%202025&amp;severity=medium&amp;id=688758cdad5a09ad0082729d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8272-sql-injection-in-code-projects-exam--9bdaec08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8272%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68875549ad5a09ad00825f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40730-cwe-79-improper-neutralization-of-i-9a59521e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vox%20Media%20Chorus%20CMS&amp;severity=medium&amp;id=68875549ad5a09ad00825f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-iso-file-used-in-romance-scam-targeting--3af3feec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20ISO%20File%20Used%20in%20Romance%20Scam%20Targeting%20German%20Speakers&amp;severity=medium&amp;id=688751c4ad5a09ad0082476a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8271-sql-injection-in-code-projects-exam--929b597d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8271%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68874e41ad5a09ad00823ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaws-in-niagara-framework-threaten-smart-91cdf2c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaws%20in%20Niagara%20Framework%20Threaten%20Smart%20Buildings%20and%20Industrial%20Systems%20Worldwide&amp;severity=critical&amp;id=68874738ad5a09ad0082170a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-hijacks-vmware-esxi-to-deploy-ran-43db9797</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%20Hijacks%20VMware%20ESXi%20to%20Deploy%20Ransomware%20on%20Critical%20U.S.%20Infrastructure&amp;severity=critical&amp;id=68874738ad5a09ad00821705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8270-sql-injection-in-code-projects-exam--e7be6fc3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8270%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6887474fad5a09ad00821772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8269-sql-injection-in-code-projects-exam--4a4f6b26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8269%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68874030ad5a09ad0081c5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27802-cwe-79-improper-neutralization-of-i-a18f96be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Optimizely%20Episerver%20Content%20Management%20System%20(CMS)&amp;severity=medium&amp;id=68873cacad5a09ad00819c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27801-cwe-79-improper-neutralization-of-i-184687f4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Optimizely%20Episerver%20Content%20Management%20System%20(CMS)&amp;severity=medium&amp;id=68873928ad5a09ad008166a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27800-cwe-79-improper-neutralization-of-i-84cea1ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Optimizely%20Episerver%20Content%20Management%20System%20(CMS)&amp;severity=medium&amp;id=68873928ad5a09ad008166a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8266-deserialization-in-yanyutao0402-chan-a8f1ca01</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8266%3A%20Deserialization%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68873928ad5a09ad008166ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8265-unrestricted-upload-in-299ko-cms-2df55a35</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8265%3A%20Unrestricted%20Upload%20in%20299Ko%20CMS&amp;severity=medium&amp;id=68873220ad5a09ad008130c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8263-inefficient-regular-expression-compl-1f8d84dd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8263&amp;severity=null&amp;id=68872b18ad5a09ad00810e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8262-inefficient-regular-expression-compl-da5173e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8262%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20yarnpkg%20Yarn&amp;severity=medium&amp;id=6887b438ad5a09ad0085e685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8261-improper-authorization-in-vaelsys-bb979a41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8261%3A%20Improper%20Authorization%20in%20Vaelsys%20VaelsysV4&amp;severity=medium&amp;id=68871d08ad5a09ad0080b9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8260-use-of-weak-hash-in-vaelsys-d879cc69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8260%3A%20Use%20of%20Weak%20Hash%20in%20Vaelsys%20VaelsysV4&amp;severity=low&amp;id=68871600ad5a09ad00808664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8259-os-command-injection-in-vaelsys-a7b0b602</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8259%3A%20OS%20Command%20Injection%20in%20Vaelsys%20VaelsysV4&amp;severity=medium&amp;id=68870ef8ad5a09ad008008de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8258-improper-export-of-android-applicati-c27ff97c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8258%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Cool%20Mo%20Maigcal%20Number%20App&amp;severity=medium&amp;id=688707f0ad5a09ad007f3fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8267-server-side-request-forgery-ssrf-in--330d2ac9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8267%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ssrfcheck&amp;severity=high&amp;id=688707f0ad5a09ad007f3fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8257-improper-export-of-android-applicati-7eabcce1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8257%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Lobby%20Universe%20Lobby%20App&amp;severity=medium&amp;id=688700f4ad5a09ad007ef7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8256-unrestricted-upload-in-code-projects-5fbe092c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8256%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6886fd72ad5a09ad007ee002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8255-unrestricted-upload-in-code-projects-3717395c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8255%3A%20Unrestricted%20Upload%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886f65cad5a09ad007af1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8254-sql-injection-in-campcodes-courier-m-98009116</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8254%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6886ef54ad5a09ad0079e53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8253-sql-injection-in-code-projects-exam--f1361077</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8253%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886e4c8ad5a09ad00796c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8252-sql-injection-in-code-projects-exam--a27748c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8252%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886e4c8ad5a09ad00796c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8251-sql-injection-in-code-projects-exam--5c1a32b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8251%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886da3cad5a09ad0079428a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8250-sql-injection-in-code-projects-exam--3bbf0302</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8250%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886cfb0ad5a09ad00785a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8249-sql-injection-in-code-projects-exam--5209ffb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8249%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886c8a8ad5a09ad00783424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8248-sql-injection-in-code-projects-onlin-5cf64fed</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8248%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6886c8a8ad5a09ad0078341d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xlight-ftp-11-denial-of-service-dos-59adebff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Xlight%20FTP%201.1%20-%20Denial%20Of%20Service%20(DOS)&amp;severity=medium&amp;id=688824f4ad5a09ad0089713e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invision-community-4720-calendarviewphp-sql-inject-49938314</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invision%20Community%204.7.20%20-%20(calendar%2Fview.php)%20SQL%20Injection&amp;severity=medium&amp;id=688824f4ad5a09ad00897139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xwiki-14-sql-injection-via-getdeleteddocumentsvm-f9720dfb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWiki%2014%20-%20SQL%20Injection%20via%20getdeleteddocuments.vm&amp;severity=medium&amp;id=688824f4ad5a09ad00897134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mezzanine-cms-610-stored-cross-site-scripting-xss-532254ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mezzanine%20CMS%206.1.0%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=688824f4ad5a09ad0089712f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-pam-environment-variable-injection-local-pri-6641fce6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20PAM%20Environment%20-%20Variable%20Injection%20Local%20Privilege%20Escalation&amp;severity=high&amp;id=688824f4ad5a09ad0089712a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-coldfusion-20236-remote-file-read-e0668c57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20ColdFusion%202023.6%20-%20Remote%20File%20Read&amp;severity=medium&amp;id=688824f4ad5a09ad00897125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30126-na-2fb794df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30126%3A%20n%2Fa&amp;severity=medium&amp;id=68881728ad5a09ad0088bcc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-28-58cec029</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-28&amp;severity=medium&amp;id=6888131cad5a09ad00887c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50486-na-5ad85524</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50486%3A%20n%2Fa&amp;severity=high&amp;id=6887d3dcad5a09ad0086bd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50485-na-46aa98b0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50485%3A%20n%2Fa&amp;severity=high&amp;id=6887d3dcad5a09ad0086bd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29534-na-d98aac99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29534%3A%20n%2Fa&amp;severity=high&amp;id=6887d3dcad5a09ad0086bd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50487-na-50eca2ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50487%3A%20n%2Fa&amp;severity=high&amp;id=6887ccd4ad5a09ad00868951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50484-na-0ee9b34b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50484%3A%20n%2Fa&amp;severity=high&amp;id=6887c950ad5a09ad00867b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50491-na-39959e68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50491%3A%20n%2Fa&amp;severity=high&amp;id=6887bb4dad5a09ad00860928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50492-na-799b8380</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50492%3A%20n%2Fa&amp;severity=high&amp;id=6887b7bcad5a09ad0085f539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50489-na-50d22ca3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50489%3A%20n%2Fa&amp;severity=high&amp;id=6887b7bcad5a09ad0085f534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50488-na-c8fc4b27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50488%3A%20n%2Fa&amp;severity=high&amp;id=6887b438ad5a09ad0085e680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50494-na-d5ab7360</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50494%3A%20n%2Fa&amp;severity=high&amp;id=6887b0b4ad5a09ad0085cd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50493-na-cb9d6dd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50493%3A%20n%2Fa&amp;severity=high&amp;id=6887ad35ad5a09ad00856c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50490-na-283857a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50490%3A%20n%2Fa&amp;severity=high&amp;id=6887ad35ad5a09ad00856c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30125-na-773773d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30125%3A%20n%2Fa&amp;severity=critical&amp;id=68878a06ad5a09ad00846122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30124-na-c9c8e566</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30124%3A%20n%2Fa&amp;severity=critical&amp;id=68878682ad5a09ad00842ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30133-na-1e7c8c47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30133%3A%20n%2Fa&amp;severity=critical&amp;id=688782fead5a09ad00842474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54569-cwe-863-incorrect-authorization-in--5aa12f8f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54569%3A%20CWE-863%20Incorrect%20Authorization%20in%20Malwarebytes%20Binisoft%20Windows%20Firewall%20Control&amp;severity=medium&amp;id=68876de5ad5a09ad008375d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8247-sql-injection-in-projectworlds-onlin-f1a89907</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8247%3A%20SQL%20Injection%20in%20Projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=6886c5adad5a09ad0077a59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8246-buffer-overflow-in-totolink-x15-2b81b20e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8246%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6886b391ad5a09ad00774356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8245-buffer-overflow-in-totolink-x15-1ce9aae9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8245%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6886ac89ad5a09ad007728bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8244-buffer-overflow-in-totolink-x15-6816c95b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8244%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6886a581ad5a09ad00770ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8243-buffer-overflow-in-totolink-x15-b5029715</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8243%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68869e7aad5a09ad0076f2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8242-buffer-overflow-in-totolink-x15-9322944f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8242%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68869771ad5a09ad0076d7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8241-sql-injection-in-1000-projects-abc-c-af929cfa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8241%3A%20SQL%20Injection%20in%201000%20Projects%20ABC%20Courier%20Management%20System&amp;severity=medium&amp;id=68869070ad5a09ad0076b01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8240-sql-injection-in-code-projects-exam--84aabfc8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8240%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886825bad5a09ad00768230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8239-sql-injection-in-code-projects-exam--0d84c2a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8239%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68867b55ad5a09ad00766ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8238-sql-injection-in-code-projects-exam--dcdedccb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8238%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886744bad5a09ad007636f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arizona-woman-jailed-for-helping-north-korea-in-17-f3e6fd4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arizona%20Woman%20Jailed%20for%20Helping%20North%20Korea%20in%20%2417%20Million%20IT%20Job%20Scam&amp;severity=medium&amp;id=68866d41ad5a09ad007613a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8237-sql-injection-in-code-projects-exam--02d532fb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8237%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68866d4aad5a09ad007613e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8236-sql-injection-in-code-projects-onlin-c5a84471</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8236%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6886663aad5a09ad0075c7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8235-sql-injection-in-code-projects-onlin-a7af8e3e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8235%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=68865122ad5a09ad007564fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8234-sql-injection-in-code-projects-onlin-13fbe28e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8234%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6886c5adad5a09ad0077a5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8233-sql-injection-in-code-projects-onlin-1fd436cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8233%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=68863c0bad5a09ad0074d0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8232-sql-injection-in-code-projects-onlin-05b780bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8232%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=68863503ad5a09ad0074b58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8231-hard-coded-credentials-in-d-link-dir-63849a92</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8231%3A%20Hard-coded%20Credentials%20in%20D-Link%20DIR-890L&amp;severity=high&amp;id=68862dfbad5a09ad0074836c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8230-sql-injection-in-campcodes-courier-m-191a27c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8230%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=688618e4ad5a09ad00741fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8229-sql-injection-in-campcodes-courier-m-fc428f67</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8229%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6885fcc4ad5a09ad007192c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8228-server-side-request-forgery-in-yanyu-e89a709e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8228%3A%20Server-Side%20Request%20Forgery%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=6885f5bcad5a09ad007160ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8227-deserialization-in-yanyutao0402-chan-086ac2fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8227%3A%20Deserialization%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=6885eeb4ad5a09ad007133a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8226-information-disclosure-in-yanyutao04-ca281421</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8226%3A%20Information%20Disclosure%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=6885e7adad5a09ad00711156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8225-memory-leak-in-gnu-binutils-acba7aec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8225%3A%20Memory%20Leak%20in%20GNU%20Binutils&amp;severity=medium&amp;id=6885e0a9ad5a09ad0070e54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5120-cwe-94-improper-control-of-generatio-3ba9f785</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5120%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20huggingface%20huggingface%2Fsmolagents&amp;severity=high&amp;id=6885dd20ad5a09ad0070d476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8224-null-pointer-dereference-in-gnu-binu-47c51b7f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8224%3A%20NULL%20Pointer%20Dereference%20in%20GNU%20Binutils&amp;severity=medium&amp;id=6885bd7dad5a09ad006edeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8223-cross-site-request-forgery-in-jerrys-20ccc986</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8223%3A%20Cross-Site%20Request%20Forgery%20in%20jerryshensjf%20JPACookieShop%20%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88&amp;severity=medium&amp;id=6885b675ad5a09ad006e760b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8222-cross-site-scripting-in-jerryshensjf-47c993fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8222%3A%20Cross%20Site%20Scripting%20in%20jerryshensjf%20JPACookieShop%20%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88&amp;severity=medium&amp;id=6885af6cad5a09ad006e571f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8104-cwe-352-cross-site-request-forgery-c-b1b82aa2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8104%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sminozzi%20Memory%20Usage%2C%20Memory%20Limit%2C%20PHP%20and%20Server%20Memory%20Health%20Check%20and%20Provide%20Suggestions&amp;severity=medium&amp;id=6885af6cad5a09ad006e5719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8221-cross-site-scripting-in-jerryshensjf-97821a06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8221%3A%20Cross%20Site%20Scripting%20in%20jerryshensjf%20JPACookieShop%20%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88&amp;severity=medium&amp;id=6885a864ad5a09ad006e3eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8220-sql-injection-in-engeman-web-0deadd83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8220%3A%20SQL%20Injection%20in%20Engeman%20Web&amp;severity=medium&amp;id=68859dd9ad5a09ad006c8a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8219-sql-injection-in-shanghai-lingdang-i-c2e648f4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8219%3A%20SQL%20Injection%20in%20Shanghai%20Lingdang%20Information%20Technology%20Lingdang%20CRM&amp;severity=medium&amp;id=6885934ead5a09ad006c6164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6241-cwe-427-uncontrolled-search-path-ele-fbc4c4e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6241%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Lakeside%20Software%20SysTrack&amp;severity=medium&amp;id=68857e34ad5a09ad006c030b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-27-708041ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-27&amp;severity=medium&amp;id=6886c19cad5a09ad00776ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54597-cwe-79-improper-neutralization-of-i-7f7fc1d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54597%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LinuxServer%20Heimdall&amp;severity=high&amp;id=6885934ead5a09ad006c6160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/law-enforcement-operations-seized-blacksuit-ransom-44ff63f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Law%20enforcement%20operations%20seized%20BlackSuit%20ransomware%20gang%E2%80%99s%20darknet%20sites&amp;severity=medium&amp;id=68855082ad5a09ad0069c273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/allianz-life-confirms-data-breach-impacts-majority-01327bce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Allianz%20Life%20confirms%20data%20breach%20impacts%20majority%20of%201.4%20million%20customers&amp;severity=high&amp;id=68855082ad5a09ad0069c26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deepfakes-vishing-and-gpt-scams-phishing-just-leve-f3da35fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deepfakes%2C%20Vishing%2C%20and%20GPT%20Scams%3A%20Phishing%20Just%20Levelled%20Up&amp;severity=medium&amp;id=688545f8ad5a09ad00675b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8211-cross-site-scripting-in-roothub-05bb2d51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8211%3A%20Cross%20Site%20Scripting%20in%20Roothub&amp;severity=medium&amp;id=688545f6ad5a09ad00675b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8210-improper-export-of-android-applicati-3eb4f844</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8210%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Yeelink%20Yeelight%20App&amp;severity=medium&amp;id=68853eeead5a09ad0066f439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8207-improper-export-of-android-applicati-0fd72f33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8207%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Canara%20ai1%20Mobile%20Banking%20App&amp;severity=medium&amp;id=688537e6ad5a09ad00669f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8206-cross-site-scripting-in-comodo-drago-13786e6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8206%3A%20Cross%20Site%20Scripting%20in%20Comodo%20Dragon&amp;severity=low&amp;id=688529d6ad5a09ad006639ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8205-cleartext-transmission-of-sensitive--dbc71855</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8205%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Comodo%20Dragon&amp;severity=medium&amp;id=688522d0ad5a09ad00660e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8204-security-check-for-standard-in-comod-659c5555</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8204%3A%20Security%20Check%20for%20Standard%20in%20Comodo%20Dragon&amp;severity=low&amp;id=6884f89ead5a09ad0064c043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/raven-stealer-unmasked-telegram-based-data-exfiltr-c17e9890</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RAVEN%20STEALER%20UNMASKED%3A%20Telegram-Based%20Data%20Exfiltration&amp;severity=medium&amp;id=68873927ad5a09ad00816653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigate-phishing-emails-6154db5f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigate%20phishing%20emails&amp;severity=medium&amp;id=6884ee16ad5a09ad0060e94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8203-sql-injection-in-jingmen-zeyou-large-1ba55768</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8203%3A%20SQL%20Injection%20in%20Jingmen%20Zeyou%20Large%20File%20Upload%20Control&amp;severity=medium&amp;id=6884ea90ad5a09ad0060b511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8191-cross-site-scripting-in-macrozheng-m-508f39f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8191%3A%20Cross%20Site%20Scripting%20in%20macrozheng%20mall&amp;severity=medium&amp;id=6884dc80ad5a09ad00605152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8190-sql-injection-in-campcodes-courier-m-2141c00e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8190%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6884d578ad5a09ad005fe6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8189-sql-injection-in-campcodes-courier-m-2ac1c5f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8189%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6884d1f4ad5a09ad005f6a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8188-sql-injection-in-campcodes-courier-m-4a9b3c26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8188%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6884c777ad5a09ad005ed39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-massive-online-fake-currency-op-bbf3c0b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20Massive%20Online%20Fake%20Currency%20Operation%20in%20India&amp;severity=medium&amp;id=6884c05fad5a09ad005e7de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8187-sql-injection-in-campcodes-courier-m-7c7e9a11</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8187%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6884c06cad5a09ad005e7e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8186-sql-injection-in-campcodes-courier-m-cb1d7107</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8186%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6884b958ad5a09ad005e4551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8185-sql-injection-in-1000-projects-abc-c-668811c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8185%3A%20SQL%20Injection%20in%201000%20Projects%20ABC%20Courier%20Management%20System&amp;severity=medium&amp;id=6884a441ad5a09ad005d2f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8184-stack-based-buffer-overflow-in-d-lin-efb035cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8184%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=68849d3aad5a09ad005cdffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8182-weak-password-requirements-in-tenda--c6ba520f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8182%3A%20Weak%20Password%20Requirements%20in%20Tenda%20AC18&amp;severity=medium&amp;id=68849632ad5a09ad005ca8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6991-cwe-98-improper-control-of-filename--008fb089</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6991%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hogash%20KALLYAS%20-%20Creative%20eCommerce%20Multi-Purpose%20WordPress%20Theme&amp;severity=high&amp;id=6884849ead5a09ad005c4a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6989-cwe-22-improper-limitation-of-a-path-30d4ef44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6989%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20hogash%20KALLYAS%20-%20Creative%20eCommerce%20Multi-Purpose%20WordPress%20Theme&amp;severity=high&amp;id=6884849ead5a09ad005c4a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5529-cwe-79-improper-neutralization-of-in-53ec79c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5529%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Educenter&amp;severity=medium&amp;id=6884849ead5a09ad005c4a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8181-least-privilege-violation-in-totolin-5d325d2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8181%3A%20Least%20Privilege%20Violation%20in%20TOTOLINK%20N600R&amp;severity=high&amp;id=6884811bad5a09ad005c3a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8097-cwe-20-improper-input-validation-in--569401d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8097%3A%20CWE-20%20Improper%20Input%20Validation%20in%20xTemos%20Woodmart&amp;severity=medium&amp;id=68847d96ad5a09ad005c240e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6987-cwe-79-improper-neutralization-of-in-b1e7cd17</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=68847d96ad5a09ad005c2402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7501-cwe-79-improper-neutralization-of-in-95ca4dc2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wonderplugin%20Wonder%20Slider&amp;severity=medium&amp;id=68847d96ad5a09ad005c2409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8180-buffer-overflow-in-tenda-ch22-1b106c81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8180%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68847a12ad5a09ad005c050f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8198-cwe-472-external-control-of-assumed--22d981d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8198%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20ThemeMove%20MinimogWP%20%E2%80%93%20The%20High%20Converting%20eCommerce%20WordPress%20Theme&amp;severity=high&amp;id=688573fcad5a09ad006b9cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8179-sql-injection-in-phpgurukul-local-se-ff5b87eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8179%3A%20SQL%20Injection%20in%20PHPGurukul%20Local%20Services%20Search%20Engine%20Management%20System&amp;severity=medium&amp;id=688464faad5a09ad005b5da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8178-heap-based-buffer-overflow-in-tenda--ac5ec281</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8178%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=68845df1ad5a09ad005b282c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6895-cwe-288-authentication-bypass-using--c05db41d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6895%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20melapress%20Melapress%20Login%20Security&amp;severity=critical&amp;id=68845df1ad5a09ad005b2825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8177-buffer-overflow-in-libtiff-9b8c5410</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8177%3A%20Buffer%20Overflow%20in%20LibTIFF&amp;severity=medium&amp;id=688456e9ad5a09ad005ab272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8103-cwe-352-cross-site-request-forgery-c-6bb074d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8103%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20etruel%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=68844fe2ad5a09ad005a5afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13507-cwe-89-improper-neutralization-of-s-b020f62d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13507%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20paoltaia%20GeoDirectory%20%E2%80%93%20WP%20Business%20Directory%20Plugin%20and%20Classified%20Listings%20Directory&amp;severity=high&amp;id=699f6e5cb7ef31ef0b59eeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54366-cwe-502-deserialization-of-untruste-ac6d8256</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54366%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=68844fe2ad5a09ad005a5acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54416-cwe-77-improper-neutralization-of-s-7dcfb678</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54416%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20tj-actions%20branch-names&amp;severity=critical&amp;id=68844fe2ad5a09ad005a5af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54415-cwe-78-improper-neutralization-of-s-181ff98a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54415%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20astronomer%20dag-factory&amp;severity=critical&amp;id=68844fe2ad5a09ad005a5aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8176-use-after-free-in-libtiff-5446ff94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8176%3A%20Use%20After%20Free%20in%20LibTIFF&amp;severity=medium&amp;id=68844fe2ad5a09ad005a5b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54414-cwe-80-improper-neutralization-of-s-0adc653a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54414%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20TecharoHQ%20anubis&amp;severity=medium&amp;id=68844fe2ad5a09ad005a5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54413-cwe-351-insufficient-type-distincti-eb16c589</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54413%3A%20CWE-351%3A%20Insufficient%20Type%20Distinction%20in%20skops-dev%20skops&amp;severity=high&amp;id=68844fe2ad5a09ad005a5ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54412-cwe-351-insufficient-type-distincti-f4b9edd6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54412%3A%20CWE-351%3A%20Insufficient%20Type%20Distinction%20in%20skops-dev%20skops&amp;severity=high&amp;id=68844fe2ad5a09ad005a5ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54385-cwe-20-improper-input-validation-in-935cc2fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54385%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=68844fe2ad5a09ad005a5ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54378-cwe-285-improper-authorization-in-h-25c21010</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54378%3A%20CWE-285%3A%20Improper%20Authorization%20in%20haxtheweb%20issues&amp;severity=high&amp;id=68844fe2ad5a09ad005a5ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8175-null-pointer-dereference-in-d-link-d-016064b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8175%3A%20NULL%20Pointer%20Dereference%20in%20D-Link%20DI-8400&amp;severity=high&amp;id=688448d9ad5a09ad0059e48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/admin-emails-passwords-exposed-via-http-method-cha-7919b6fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Admin%20Emails%20%26%20Passwords%20Exposed%20via%20HTTP%20Method%20Change&amp;severity=medium&amp;id=68843040ad5a09ad0058ffe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8174-unrestricted-upload-in-code-projects-09a94094</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8174%3A%20Unrestricted%20Upload%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68842cb9ad5a09ad0058f286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-26-cd80aee6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-26&amp;severity=medium&amp;id=6885701cad5a09ad006b64c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-flaw-in-eol-lg-lnv5110r-cameras-lets-hac-2b00ac97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20flaw%20in%20EoL%20LG%20LNV5110R%20cameras%20lets%20hackers%20gain%20Admin%20access&amp;severity=medium&amp;id=68841b25ad5a09ad00587a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-cargotalon-targets-russias-aerospace-wit-1fdb4dbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20CargoTalon%20targets%20Russia%E2%80%99s%20aerospace%20with%20EAGLET%20malware%2C&amp;severity=medium&amp;id=68841b25ad5a09ad00587a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8173-sql-injection-in-1000-projects-abc-c-190067aa</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8173%3A%20SQL%20Injection%20in%201000%20Projects%20ABC%20Courier%20Management%20System&amp;severity=medium&amp;id=68841099ad5a09ad00585214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-resurfaces-on-original-dark-web-onion-06147cda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Resurfaces%20on%20Original%20Dark%20Web%20(.onion)%20Address&amp;severity=medium&amp;id=68840287ad5a09ad0057d71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8172-sql-injection-in-itsourcecode-employ-cd1a1dee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8172%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Management%20System&amp;severity=medium&amp;id=68840292ad5a09ad0057d74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8171-unrestricted-upload-in-code-projects-8888c301</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8171%3A%20Unrestricted%20Upload%20in%20code-projects%20Document%20Management%20System&amp;severity=medium&amp;id=68842287ad5a09ad0058b37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8170-buffer-overflow-in-totolink-t6-d23b94d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8170%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=6883f478ad5a09ad0057361b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8169-buffer-overflow-in-d-link-dir-513-4c081d56</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8169%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=6883ed70ad5a09ad00570055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-checkmate-blacksuit-ransomwares-dark-web-ceab9aa1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Checkmate%3A%20BlackSuit%20Ransomware%E2%80%99s%20Dark%20Web%20Domains%20Seized&amp;severity=medium&amp;id=6883e9ebad5a09ad0056e11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8168-buffer-overflow-in-d-link-dir-513-6bbd44e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8168%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=6883e667ad5a09ad0056cd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8167-cross-site-scripting-in-code-project-854977f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8167%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=6883df60ad5a09ad0056867f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8197-out-of-bounds-write-in-red-hat-red-h-3eef88f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8197&amp;severity=null&amp;id=6883dbdcad5a09ad00567202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52455-cwe-918-server-side-request-forgery-b149c2a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52455%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Salesforce%20Tableau%20Server&amp;severity=medium&amp;id=6883d858ad5a09ad00565a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52454-cwe-918-server-side-request-forgery-07cbcd6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52454%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d858ad5a09ad00565a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52453-cwe-918-server-side-request-forgery-3211cd79</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52453%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d858ad5a09ad00565a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8166-sql-injection-in-code-projects-churc-4081622b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8166%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=6883d858ad5a09ad00565a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52452-cwe-22-improper-limitation-of-a-pat-fae1fdbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52452%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d858ad5a09ad00565a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52449-cwe-434-unrestricted-upload-of-file-39b7a18d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52449%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d858ad5a09ad00565a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52448-cwe-639-authorization-bypass-throug-5fbedb78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52448%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d4d3ad5a09ad0056441f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52447-cwe-639-authorization-bypass-throug-769936d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52447%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d4d3ad5a09ad0056441c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52446-cwe-639-authorization-bypass-throug-41ab26ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52446%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d161ad5a09ad00561b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8165-sql-injection-in-code-projects-food--4b971ad4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8165%3A%20SQL%20Injection%20in%20code-projects%20Food%20Review%20System&amp;severity=medium&amp;id=6883d161ad5a09ad00561b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8164-sql-injection-in-code-projects-publi-762fbf91</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8164%3A%20SQL%20Injection%20in%20code-projects%20Public%20Chat%20Room&amp;severity=medium&amp;id=6883ca47ad5a09ad0055b7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8163-sql-injection-in-deerwms-deer-wms-2-7ac91dd6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8163%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6883c6c5ad5a09ad0055a67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5449-integer-overflow-or-wraparound-93e1aac3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5449%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=6883bfbdad5a09ad00545182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8162-sql-injection-in-deerwms-deer-wms-2-9ef4edf9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8162%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6883bc39ad5a09ad00539a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nascar-confirms-medusa-ransomware-breach-after-4m--0102c7de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NASCAR%20Confirms%20Medusa%20Ransomware%20Breach%20After%20%244M%20Demand&amp;severity=high&amp;id=6883b8b4ad5a09ad0053847a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8161-sql-injection-in-deerwms-deer-wms-2-3a9aa45a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8161%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6883b532ad5a09ad00533857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-added-prompt-to-amazon-q-to-erase-files-and-ba838721</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Added%20Prompt%20to%20Amazon%20Q%20to%20Erase%20Files%20and%20Cloud%20Data&amp;severity=medium&amp;id=6883ae28ad5a09ad00530b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3508-cwe-200-exposure-of-sensitive-inform-4942e404</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3508%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc.%20Certain%20HP%20DesignJet%20products&amp;severity=medium&amp;id=6883ae32ad5a09ad00530b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34138-vulnerability-in-sitecore-experienc-e5c27741</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34138&amp;severity=null&amp;id=6883aaa8ad5a09ad005300e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34139-vulnerability-in-sitecore-experienc-671b45bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34139%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=high&amp;id=6883aaa8ad5a09ad005300ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34114-cwe-749-exposed-dangerous-method-or-71172af6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34114%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Laser%20Romae%E2%80%AFs.r.l.%20OpenBlow&amp;severity=high&amp;id=6883aaa8ad5a09ad005300e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13976-cwe-427-uncontrolled-search-path-el-8219545e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13976%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Commvault%20Commvault%20for%20Windows&amp;severity=high&amp;id=6921acbf8e780dcd644b6531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2329-cwe-908-use-of-uninitialized-resourc-a1383582</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2329%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20silabs.com%20OpenThread&amp;severity=medium&amp;id=6883aaa8ad5a09ad005300de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3873-cwe-787-out-of-bounds-write-in-silab-5be676e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3873%3A%20CWE-787%20Out-of-bounds%20Write%20in%20silabs.com%20WiseConnect&amp;severity=medium&amp;id=6883aaa8ad5a09ad005300f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8160-buffer-overflow-in-tenda-ac20-ef7a7f82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8160%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=6883a019ad5a09ad0052b93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8159-stack-based-buffer-overflow-in-d-lin-cef5cb91</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8159%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=68839914ad5a09ad00510d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-gained-full-access-to-a-100m-zero-trust-sta-0b9c0537</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20We%20Gained%20Full%20Access%20to%20a%20%24100M%20Zero-Trust%20Startup&amp;severity=medium&amp;id=6883920cad5a09ad0050aeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8158-sql-injection-in-phpgurukul-login-an-01a1754b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8158%3A%20SQL%20Injection%20in%20PHPGurukul%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=68838b02ad5a09ad00508065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8157-sql-injection-in-phpgurukul-user-reg-6b9fe4e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8157%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management&amp;severity=medium&amp;id=68838b02ad5a09ad0050806f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38380-8bcbde2b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38380&amp;severity=null&amp;id=68cb4e06e5fa2c8b1490b3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8156-sql-injection-in-phpgurukul-user-reg-8db0c699</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8156%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management&amp;severity=medium&amp;id=68837cf1ad5a09ad00501d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/koske-a-new-ai-generated-linux-malware-appears-in--46acadf9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Koske%2C%20a%20new%20AI-Generated%20Linux%20malware%20appears%20in%20the%20threat%20landscape&amp;severity=medium&amp;id=6883796cad5a09ad005004ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soco404-and-koske-malware-target-cloud-services-wi-e88946fb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Soco404%20and%20Koske%20Malware%20Target%20Cloud%20Services%20with%20Cross-Platform%20Cryptomining%20Attacks&amp;severity=high&amp;id=6883796cad5a09ad005004e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/woman-gets-8-years-for-aiding-north-koreans-infilt-acc6644f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Woman%20gets%208%20years%20for%20aiding%20North%20Koreans%20infiltrate%20300%20US%20firms&amp;severity=high&amp;id=6883796cad5a09ad005004e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8155-cross-site-scripting-in-d-link-dcs-6-244c658a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8155%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DCS-6010L&amp;severity=medium&amp;id=688375e7ad5a09ad004ff49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-rooted-copilot-d3e058ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20we%20Rooted%20Copilot&amp;severity=high&amp;id=68836ee2ad5a09ad004fc7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5254-cwe-79-improper-neutralization-of-in-df0bd99a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5254%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kron%20Technologies%20Kron%20PAM&amp;severity=medium&amp;id=68836b5cad5a09ad004fb35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5253-cwe-770-allocation-of-resources-with-33d56b5c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5253%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Kron%20Technologies%20Kron%20PAM&amp;severity=medium&amp;id=68836b5cad5a09ad004fb357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-posing-as-indian-bank-apps-b77858b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20Posing%20As%20Indian%20Bank%20Apps&amp;severity=medium&amp;id=68837986ad5a09ad00500ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-lure-victims-into-downloading-hta-fi-a0e285b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Lure%20Victims%20Into%20Downloading%20.HTA%20Files%20Using%20ClickFix%20To%20Spread%20Epsilon%20Red%20Ransomware&amp;severity=medium&amp;id=68837986ad5a09ad00500ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8183-cwe-476-null-pointer-dereference-in--73dd0065</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8183%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20D3TN%20GmbH%20%C2%B5D3TN&amp;severity=high&amp;id=688352c0ad5a09ad004f228a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitel-patches-critical-mivoice-mx-one-auth-bypass--2062652d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mitel%20patches%20critical%20MiVoice%20MX-ONE%20Auth%20bypass%20flaw&amp;severity=critical&amp;id=68834f3cad5a09ad004f08df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8140-buffer-overflow-in-totolink-a702r-899303bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8140%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68834bc0ad5a09ad004ef236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8139-buffer-overflow-in-totolink-a702r-28ed0d1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8139%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=688344b2ad5a09ad004ecc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8138-buffer-overflow-in-totolink-a702r-3c8e4735</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8138%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68833da9ad5a09ad004e9e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8137-buffer-overflow-in-totolink-a702r-014b1b42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8137%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=688336a1ad5a09ad004e842c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8136-buffer-overflow-in-totolink-a702r-64ab198e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8136%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68832f99ad5a09ad004e6283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8135-sql-injection-in-itsourcecode-insura-503f6fe3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8135%3A%20SQL%20Injection%20in%20itsourcecode%20Insurance%20Management%20System&amp;severity=medium&amp;id=68832890ad5a09ad004e3ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8134-sql-injection-in-phpgurukul-bp-monit-5af2fb0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8134%3A%20SQL%20Injection%20in%20PHPGurukul%20BP%20Monitoring%20Management%20System&amp;severity=medium&amp;id=68832189ad5a09ad004e1c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7022-cwe-79-cross-site-scripting-xss-in-m-3a8ca36b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7022%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20My%20Reservation%20System&amp;severity=medium&amp;id=68832189ad5a09ad004e1c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8133-server-side-request-forgery-in-yanyu-2dbc9ebd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8133%3A%20Server-Side%20Request%20Forgery%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68831a81ad5a09ad004dee55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8132-path-traversal-in-yanyutao0402-chanc-22bacd75</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8132%3A%20Path%20Traversal%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68831378ad5a09ad004dc9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8131-stack-based-buffer-overflow-in-tenda-a8a6eb4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8131%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68830c70ad5a09ad004db22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8129-open-redirect-in-koajs-koa-c70fc489</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8129%3A%20Open%20Redirect%20in%20KoaJS%20Koa&amp;severity=medium&amp;id=688308ecad5a09ad004da4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8128-unrestricted-upload-in-zhousg-letao-962bf949</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8128%3A%20Unrestricted%20Upload%20in%20zhousg%20letao&amp;severity=medium&amp;id=6882fe60ad5a09ad004d4c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8127-sql-injection-in-deerwms-deer-wms-2-1c3b0266</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8127%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6882fe60ad5a09ad004d4c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8126-sql-injection-in-deerwms-deer-wms-2-107b8b39</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8126%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6882ecccad5a09ad004d0c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8125-sql-injection-in-deerwms-deer-wms-2-cd100e5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8125%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6882debdad5a09ad004c1e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0253-cwe-384-session-fixation-in-hcl-soft-23bcf733</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0253%3A%20CWE-384%20Session%20Fixation%20in%20HCL%20Software%20IEM&amp;severity=low&amp;id=6882d0b3ad5a09ad004b7d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0252-cwe-319-cleartext-transmission-of-se-d21c94b6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0252%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20HCL%20Software%20IEM&amp;severity=low&amp;id=6882d0b3ad5a09ad004b7d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0251-cwe-384-session-fixation-in-hcl-soft-d46582b6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0251%3A%20CWE-384%20Session%20Fixation%20in%20HCL%20Software%20IEM&amp;severity=low&amp;id=6882d0b3ad5a09ad004b7d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-25-d4f8c65b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-25&amp;severity=medium&amp;id=68841e9cad5a09ad005883d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46198-na-5838793b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46198%3A%20n%2Fa&amp;severity=high&amp;id=6883df60ad5a09ad0056867b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30135-na-aaf9d69d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30135%3A%20n%2Fa&amp;severity=critical&amp;id=6883dbdcad5a09ad005671fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46199-na-4c605828</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46199%3A%20n%2Fa&amp;severity=critical&amp;id=6883ca47ad5a09ad0055b7bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45893-na-19b598ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45893%3A%20n%2Fa&amp;severity=medium&amp;id=6883bc39ad5a09ad00539a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45960-na-ea485e81</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45960%3A%20n%2Fa&amp;severity=medium&amp;id=6883b8bfad5a09ad00538529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54596-cwe-863-incorrect-authorization-in--e719799c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54596%3A%20CWE-863%20Incorrect%20Authorization%20in%20Abnormal%20AI%20Abnormal%20Security&amp;severity=medium&amp;id=6883b8bfad5a09ad00538526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45892-na-4e053c76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45892%3A%20n%2Fa&amp;severity=medium&amp;id=6883b8bfad5a09ad00538522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45406-na-68f090e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45406%3A%20n%2Fa&amp;severity=medium&amp;id=6883b8bfad5a09ad0053851c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29629-na-e3a568a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29629%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Gardyn%20Home%20Kit%20Firmware&amp;severity=critical&amp;id=6883b532ad5a09ad00533853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29631-na-a76c2293</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29631%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Gardyn%20Home%20Kit%20Firmware&amp;severity=critical&amp;id=6883b1adad5a09ad005320d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29630-na-ce892953</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29630&amp;severity=null&amp;id=6883b1adad5a09ad005320d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29628-na-6f354dc2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29628%3A%20CWE-924%20Improper%20Enforcement%20of%20Message%20Integrity%20During%20Transmission%20in%20a%20Communication%20Channel%20in%20Gardyn%20Home%20Kit%20Firmware&amp;severity=critical&amp;id=6883b1adad5a09ad005320cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45467-na-adb40122</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45467%3A%20n%2Fa&amp;severity=high&amp;id=6883a019ad5a09ad0052b943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45466-na-7c9bd198</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45466%3A%20n%2Fa&amp;severity=high&amp;id=6883a019ad5a09ad0052b938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44608-na-d65df802</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44608%3A%20n%2Fa&amp;severity=medium&amp;id=68839c97ad5a09ad00516e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52360-na-e3d43ea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52360%3A%20n%2Fa&amp;severity=high&amp;id=6883958dad5a09ad0050e728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30086-na-6fc3df70</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30086%3A%20n%2Fa&amp;severity=medium&amp;id=6883958dad5a09ad0050e722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45777-na-fdf3df98</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45777%3A%20n%2Fa&amp;severity=critical&amp;id=68839209ad5a09ad0050ae7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45939-na-3ab3236c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45939%3A%20n%2Fa&amp;severity=medium&amp;id=68838e84ad5a09ad005098da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51411-na-1fb2989b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51411%3A%20n%2Fa&amp;severity=medium&amp;id=68838b02ad5a09ad0050806c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43712-na-1635af3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43712%3A%20n%2Fa&amp;severity=high&amp;id=6883877ead5a09ad00505e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54568-cwe-684-incorrect-provision-of-spec-ad0a27ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54568%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Akamai%20Rate%20Control&amp;severity=low&amp;id=6882fe60ad5a09ad004d4c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54558-cwe-829-inclusion-of-functionality--9a3b4c45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54558%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20OpenAI%20Codex%20CLI&amp;severity=medium&amp;id=6882debdad5a09ad004c1e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8124-sql-injection-in-deerwms-deer-wms-2-abaa19cc</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8124%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6882c620ad5a09ad00468601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7742-cwe-288-authentication-bypass-using--ebc1ee33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7742%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20LG%20Innotek%20Camera%20Model%20LNV5110R&amp;severity=high&amp;id=6882c29cad5a09ad00467c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0250-cwe-319-cleartext-transmission-of-se-68025939</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0250%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20HCL%20Software%20IEM&amp;severity=low&amp;id=6882c29cad5a09ad00467c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0249-cwe-287-improper-authentication-in-h-bd3203f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0249%3A%20CWE-287%20Improper%20Authentication%20in%20HCL%20Software%20IEM&amp;severity=low&amp;id=6882c29cad5a09ad00467c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-sneaks-infostealer-malware-into-early-acces-16108fea</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20sneaks%20infostealer%20malware%20into%20early%20access%20Steam%20game&amp;severity=high&amp;id=6882bf17ad5a09ad004667c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fire-ant-exploits-vmware-flaws-to-compromise-esxi--031e6557</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fire%20Ant%20Exploits%20VMware%20Flaws%20to%20Compromise%20ESXi%20Hosts%20and%20vCenter%20Environments&amp;severity=high&amp;id=6882bf17ad5a09ad004667bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-malware-is-first-ever-malware-abusing-windo-9c321330</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%20malware%20is%20first-ever%20malware%20abusing%20Windows%20UI%20Automation&amp;severity=medium&amp;id=6882bf17ad5a09ad004667c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-koske-linux-malware-hides-in-cute-panda-images-4713485b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Koske%20Linux%20malware%20hides%20in%20cute%20panda%20images&amp;severity=high&amp;id=6882bf17ad5a09ad004667c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22165-security-misconfiguration-in-atlass-6b8fcdec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22165%3A%20Security%20Misconfiguration%20in%20Atlassian%20Sourcetree%20for%20Mac&amp;severity=medium&amp;id=6882b80ead5a09ad004644fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54379-cwe-89-improper-neutralization-of-s-321b0644</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54379%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20lf-edge%20ekuiper&amp;severity=high&amp;id=6882b80fad5a09ad00464512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53940-cwe-208-observable-timing-discrepan-38bfe8f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53940%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20TryQuiet%20quiet&amp;severity=high&amp;id=6882b80ead5a09ad0046450b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3614-cwe-79-improper-neutralization-of-in-38c47338</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6882b80ead5a09ad00464506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32429-cwe-89-improper-neutralization-of-s-39b97e45</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32429%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=6882b80ead5a09ad00464500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scavenger-trojan-targets-crypto-wallets-via-game-m-b941fc94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scavenger%20Trojan%20Targets%20Crypto%20Wallets%20via%20Game%20Mods%20and%20Browser%20Flaws&amp;severity=medium&amp;id=6882b105ad5a09ad0046265e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8123-sql-injection-in-deerwms-deer-wms-2-7d7ad8a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8123%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6882a2f7ad5a09ad0045efb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31952-cwe-613-insufficient-session-expira-4f428939</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31952%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20iAutomate&amp;severity=high&amp;id=6882a2f7ad5a09ad0045efaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31955-cwe-200-exposure-of-sensitive-infor-9c01ee75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31955%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Software%20iAutomate&amp;severity=high&amp;id=6882a2f7ad5a09ad0045efad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6260-cwe-306-missing-authentication-for-c-a375517e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6260%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Network%20Thermostat%20X-Series%20WiFi%20thermostats&amp;severity=critical&amp;id=68829f72ad5a09ad00443b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-malware-fake-github-and-phishing-atta-c21b18dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Malware%3A%20Fake%20GitHub%20and%20Phishing%20Attack%20Hits%20469%20Devices&amp;severity=medium&amp;id=68829f76ad5a09ad00443b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31953-cwe-798-use-of-hard-coded-credentia-1ee9f269</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31953%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20HCL%20Software%20iAutomate&amp;severity=high&amp;id=68829beead5a09ad004432d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-generated-malware-in-panda-image-hides-persiste-3ccf8533</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Generated%20Malware%20in%20Panda%20Image%20Hides%20Persistent%20Linux%20Threat&amp;severity=medium&amp;id=6882986aad5a09ad0044293a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8115-cross-site-scripting-in-phpgurukul-t-6daf3406</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8115%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=68827fd0ad5a09ad0041a727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5039-cwe-426-untrusted-search-path-in-aut-1efb3e2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5039%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=68826ab9ad5a09ad003f03a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/replit-ai-agent-deletes-sensitive-data-despite-exp-f4ce6ee0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Replit%20AI%20Agent%20Deletes%20Sensitive%20Data%20Despite%20Explicit%20Instructions&amp;severity=medium&amp;id=68826735ad5a09ad003ef7de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46993-cross-site-scripting-stored-xss-cwe-36ba82e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46993%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68825925ad5a09ad003a27b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46996-cross-site-scripting-stored-xss-cwe-89a8c31c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46996%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68825925ad5a09ad003a27b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47061-cross-site-scripting-stored-xss-cwe-a27e0cb9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47061%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=688255a1ad5a09ad003a1ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-2603-exploits-sharepoint-flaws-to-deploy-war-75eb0b8a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-2603%20Exploits%20SharePoint%20Flaws%20to%20Deploy%20Warlock%20Ransomware%20on%20Unpatched%20Systems&amp;severity=high&amp;id=68824e98ad5a09ad0037aa3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-urges-admins-to-patch-critical-rce-flaw--0aa77b33</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20urges%20admins%20to%20patch%20critical%20RCE%20flaw%20in%20SMA%20100%20devices&amp;severity=critical&amp;id=68824e98ad5a09ad0037aa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-breach-toptal-github-account-publish-malic-7546637b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20breach%20Toptal%20GitHub%20account%2C%20publish%20malicious%20npm%20packages&amp;severity=high&amp;id=68824e98ad5a09ad0037aa37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46410-cwe-79-improper-neutralization-of-i-cd96a359</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46410%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=6882521dad5a09ad003a1569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53084-cwe-79-improper-neutralization-of-i-1b34761c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53084%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=6882521dad5a09ad003a1572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50128-cwe-79-improper-neutralization-of-i-9a3eb22a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50128%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=6882521dad5a09ad003a156f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36548-cwe-79-improper-neutralization-of-i-b722cb6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36548%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=6882521dad5a09ad003a1563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41420-cwe-79-improper-neutralization-of-i-2450bc5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41420%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=6882521dad5a09ad003a1566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25214-cwe-362-concurrent-execution-using--a3498a3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25214%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=6882521dad5a09ad003a1560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48732-cwe-184-incomplete-blacklist-in-wwb-4be3bbfc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48732%3A%20CWE-184%3A%20Incomplete%20Blacklist%20in%20WWBN%20AVideo&amp;severity=high&amp;id=6882521dad5a09ad003a156c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33109-cwe-250-execution-with-unnecessary--39ced187</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33109%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges&amp;severity=high&amp;id=68824ec4ad5a09ad0037ab17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33013-cwe-244-improper-clearing-of-heap-m-cc098738</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33013%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=68824b13ad5a09ad0036f0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36005-cwe-295-improper-certificate-valida-6fdef538</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36005%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=68824b13ad5a09ad0036f0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8114-null-pointer-dereference-in-red-hat--f23576c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8114%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=6882440cad5a09ad0036d5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-advanced-stealer-shuyal-targets-credentials-ac-e406f975</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Advanced%20Stealer%20(SHUYAL)%20Targets%20Credentials%20Across%2019%20Popular%20Browsers&amp;severity=medium&amp;id=68838b04ad5a09ad005080a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercrime-forum-xss-returns-on-mirror-and-dark-we-2234025d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercrime%20Forum%20XSS%20Returns%20on%20Mirror%20and%20Dark%20Web%20Day%20After%20Seizure&amp;severity=medium&amp;id=6882397fad5a09ad0035a35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4784-cwe-89-improper-neutralization-of-sp-aead5b77</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4784%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Moderec%20Tourtella&amp;severity=critical&amp;id=6882398ead5a09ad0035a3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4822-cwe-89-improper-neutralization-of-sp-65e43d21</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4822%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bayraktar%20Solar%20Energies%20ScadaWatt%20Otopilot&amp;severity=critical&amp;id=68823278ad5a09ad003579f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5243-cwe-434-unrestricted-upload-of-file--9bc3b445</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5243%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SMG%20Software%20Information%20Portal&amp;severity=critical&amp;id=68823278ad5a09ad003579f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40680-cwe-311-missing-encryption-of-sensi-74d344c0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40680%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Capillary%20io%20CapillaryScope&amp;severity=medium&amp;id=688227ecad5a09ad00352b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sharepoint-toolshell-one-request-preauth-rce-chain-d77f9930</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SharePoint%20ToolShell%20%E2%80%93%20One%20Request%20PreAuth%20RCE%20Chain&amp;severity=medium&amp;id=68821d64ad5a09ad0034ea11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gunra-ransomware-emerges-with-new-dls-77a68239</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gunra%20Ransomware%20Emerges%20with%20New%20DLS&amp;severity=medium&amp;id=6882986aad5a09ad0044295a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/national-nuclear-security-administration-systems-b-20466bd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=National%20Nuclear%20Security%20Administration%20Systems%20Breached%20in%20SharePoint%20Cyberattack&amp;severity=medium&amp;id=68820f50ad5a09ad003485ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophos-fixed-two-critical-sophos-firewall-vulnerab-1dd5f79e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophos%20fixed%20two%20critical%20Sophos%20Firewall%20vulnerabilities&amp;severity=critical&amp;id=6881fdbdad5a09ad0033bd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brave-blocks-windows-recall-from-screenshotting-yo-64273c74</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brave%20blocks%20Windows%20Recall%20from%20screenshotting%20your%20browsing%20activity&amp;severity=high&amp;id=6881fdbdad5a09ad0033bd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7959-cwe-79-improper-neutralization-of-in-b0c8d505</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7959%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marviorocha%20Station%20Pro%20%E2%80%93%20Advanced%20Audio%20Streaming%20%26%20Player%20for%20WordPress&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7690-cwe-352-cross-site-request-forgery-c-4ec3f362</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7690%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mindnl%20Affiliate%20Plus&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033befd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7835-cwe-352-cross-site-request-forgery-c-1f65a49a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7835%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gerkin%20iThoughts%20Advanced%20Code%20Editor&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7695-cwe-862-missing-authorization-in-ale-7e0d07a8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7695%3A%20CWE-862%20Missing%20Authorization%20in%20alexacrm%20Dataverse%20Integration&amp;severity=high&amp;id=6881fdd8ad5a09ad0033bf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4608-cwe-79-improper-neutralization-of-in-2eeccc45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gorbo%20Structured%20Content%20(JSON-LD)%20%23wpsc&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6382-cwe-79-improper-neutralization-of-in-12aabd26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6382%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taeggie%20Taeggie%20Feed&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6539-cwe-79-improper-neutralization-of-in-7920fd7d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6539%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minutemedia%20Voltax%20Video%20Player&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033beea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3669-cwe-79-improper-neutralization-of-in-be88e71e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3669%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ullakalim8%20Supreme%20Addons%20for%20Beaver%20Builder%20%E2%80%93&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6387-cwe-79-improper-neutralization-of-in-e018daa5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonsisk%20WP%20Get%20The%20Table&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bedf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6262-cwe-79-improper-neutralization-of-in-ec6e488b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6262%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20museai%20skiv%20video%20embedding&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033becc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6385-cwe-79-improper-neutralization-of-in-7b8c5181</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ejointjp%20WP%20Applink&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7822-cwe-862-missing-authorization-in-ale-3dbf5f0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7822%3A%20CWE-862%20Missing%20Authorization%20in%20alexalouit%20WP%20Wallcreeper&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6380-cwe-862-missing-authorization-in-onl-b14c9d06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6380%3A%20CWE-862%20Missing%20Authorization%20in%20onlyoffice%20ONLYOFFICE%20Docs&amp;severity=critical&amp;id=6881fdd8ad5a09ad0033bed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8071-cwe-79-improper-neutralization-of-in-068118eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8071%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20995525477-1%20Mine%20CloudVod%20LMS&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7966-cwe-79-improper-neutralization-of-in-ac47341e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zohaib167%20Get%20Youtube%20Subs&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6441-cwe-862-missing-authorization-in-tob-8ec47cd0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6441%3A%20CWE-862%20Missing%20Authorization%20in%20tobias_conrad%20WebinarIgnition%20%E2%80%93%20Live%2C%20Automated%20%26%20Evergreen%20Webinars%20for%20WooCommerce&amp;severity=critical&amp;id=6881fdd8ad5a09ad0033bee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7780-cwe-200-exposure-of-sensitive-inform-b482c26c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7780%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7640-cwe-22-improper-limitation-of-a-path-dc3ae814</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7640%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20den-media%20hiWeb%20Export%20Posts&amp;severity=high&amp;id=6881fdd8ad5a09ad0033bef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5084-cwe-79-improper-neutralization-of-in-83414c5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdshuvo%20Post%20Grid%20Master%20%E2%80%94%20Post%20Grids%20%26%20AJAX%20Filters&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26397-cwe-502-deserialization-of-untruste-abc1ee35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26397%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=high&amp;id=6881e8a5ad5a09ad003161df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8009-cwe-36-absolute-path-traversal-in-cl-aa38bee6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8009%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20cleverplugins%20Security%20Ninja%20%E2%80%93%20WordPress%20Security%20Plugin%20%26%20Firewall&amp;severity=medium&amp;id=6881e521ad5a09ad003135fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8107-cwe-668-exposure-of-resource-to-wron-7f3e9522</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8107%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20OB%20OceanBase%20Server&amp;severity=medium&amp;id=6881e19dad5a09ad003124d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7745-cwe-126-buffer-over-read-in-abb-ac50-6480f63e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7745%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20ABB%20AC500%20V2&amp;severity=medium&amp;id=6881e19dad5a09ad003124d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41240-vulnerability-in-vmware-bitnamichar-f662b305</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41240%3A%20Vulnerability%20in%20VMware%20bitnamicharts%2Fappsmith&amp;severity=critical&amp;id=6881d711ad5a09ad0030e375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-cargotalon-targeting-russian-aerospace-d-a425a732</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Cargotalon%3A%20Targeting%20Russian%20Aerospace%20Defense%20Using%20Eaglet%20Implant&amp;severity=medium&amp;id=6881f6b8ad5a09ad0031b694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7437-cwe-434-unrestricted-upload-of-file--e9168916</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7437%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20motovnet%20Ebook%20Store&amp;severity=critical&amp;id=6881b76dad5a09ad00306acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7852-cwe-434-unrestricted-upload-of-file--0e4c1a95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7852%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20WPBookit&amp;severity=critical&amp;id=6881b76dad5a09ad00306ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4968-cwe-79-improper-neutralization-of-in-45c63c58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4968%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=6881b066ad5a09ad00303fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4395-cwe-258-empty-password-in-configurat-e3d2cbed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4395%3A%20CWE-258%20Empty%20Password%20in%20Configuration%20File%20in%20Medtronic%20MyCareLink%20Patient%20Monitor%2024950&amp;severity=medium&amp;id=6881b066ad5a09ad00303fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4394-cwe-312-cleartext-storage-of-sensiti-1093ced1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4394%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Medtronic%20MyCareLink%20Patient%20Monitor%2024950&amp;severity=medium&amp;id=6881b066ad5a09ad00303fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4393-cwe-502-deserialization-of-untrusted-c1356da7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4393%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Medtronic%20MyCareLink%20Patient%20Monitor%2024950&amp;severity=medium&amp;id=6881b066ad5a09ad00303fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-24-6a73393f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-24&amp;severity=medium&amp;id=6882cd1cad5a09ad004b5a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45702-na-c56c3d66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45702%3A%20n%2Fa&amp;severity=medium&amp;id=688263b1ad5a09ad003c1633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51089-na-62d99ac7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51089%3A%20n%2Fa&amp;severity=medium&amp;id=68824b13ad5a09ad0036f0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51088-na-0aa5fc6f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51088%3A%20n%2Fa&amp;severity=medium&amp;id=68824b13ad5a09ad0036f0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51085-na-6098bdeb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51085%3A%20n%2Fa&amp;severity=medium&amp;id=68824790ad5a09ad0036e8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51082-na-40a42c6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51082%3A%20n%2Fa&amp;severity=medium&amp;id=68824790ad5a09ad0036e8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51087-na-472c35d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51087%3A%20n%2Fa&amp;severity=high&amp;id=68824790ad5a09ad0036e8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45731-na-5cdc06ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45731%3A%20n%2Fa&amp;severity=medium&amp;id=6882398ead5a09ad0035a3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-special-mission-to-nowhere-39fa40a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Special%20Mission%20to%20Nowhere&amp;severity=medium&amp;id=6881fa4fad5a09ad003390e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54365-cwe-20-improper-input-validation-in-e01dd906</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54365%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20rennf93%20fastapi-guard&amp;severity=high&amp;id=6881630dad5a09ad0028e316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32019-cwe-79-improper-neutralization-of-i-f0fd144d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32019%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goharbor%20harbor&amp;severity=medium&amp;id=68814a71ad5a09ad0027bdef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54377-cwe-77-improper-neutralization-of-s-5a2252f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54377%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=68814a71ad5a09ad0027be01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53537-cwe-401-missing-release-of-memory-a-c837803d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53537%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20OISF%20libhtp&amp;severity=high&amp;id=68814a71ad5a09ad0027bdf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53942-cwe-269-improper-privilege-manageme-8d342b40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53942%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20goauthentik%20authentik&amp;severity=high&amp;id=68814a71ad5a09ad0027bdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8058-cwe-415-double-free-in-the-gnu-c-lib-baff35c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8058%3A%20CWE-415%20Double%20Free%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=68813fe5ad5a09ad00279216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-and-cisa-warn-of-interlock-ransomware-targetin-4058eb79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20and%20CISA%20Warn%20of%20Interlock%20Ransomware%20Targeting%20Critical%20Infrastructure&amp;severity=critical&amp;id=68812acdad5a09ad00274dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-is-with-28m-weekly-downloads-infected--87dafba7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20package%20%E2%80%98is%E2%80%99%20with%202.8M%20weekly%20downloads%20infected%20devs%20with%20malware&amp;severity=high&amp;id=68812749ad5a09ad002741d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-fooled-cognizant-help-desk-says-clorox-in--dc37bd6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20fooled%20Cognizant%20help%20desk%2C%20says%20Clorox%20in%20%24380M%20cyberattack%20lawsuit&amp;severity=high&amp;id=68812749ad5a09ad002741d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hijacking-cursors-agent-how-we-took-over-an-ec2-in-921ee837</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hijacking%20Cursor%E2%80%99s%20Agent%3A%20How%20We%20Took%20Over%20an%20EC2%20Instance&amp;severity=medium&amp;id=68810b2dad5a09ad0026c6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2634-cwe-1285-improper-validation-of-spec-03a911e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2634%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20NI%20LabVIEW&amp;severity=high&amp;id=688107a5ad5a09ad0026b3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2633-cwe-1285-improper-validation-of-spec-1820e7e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2633%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20NI%20LabVIEW&amp;severity=high&amp;id=688107a5ad5a09ad0026b3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/illusory-wishes-china-nexus-apt-targets-the-tibeta-b2776143</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Illusory%20Wishes%3A%20China-nexus%20APT%20Targets%20the%20Tibetan%20Community&amp;severity=medium&amp;id=68810eabad5a09ad0026d46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8069-cwe-276-incorrect-default-permission-eb0ef8d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8069%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AWS%20Client%20VPN&amp;severity=high&amp;id=688107a5ad5a09ad0026b3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6018-incorrect-authorization-e26bb440</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6018%3A%20Incorrect%20Authorization&amp;severity=high&amp;id=6880fd19ad5a09ad00269657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40598-cwe-79-improper-neutralization-of-i-57f27370</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40598%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SonicWall%20SMA%20100%20Series&amp;severity=medium&amp;id=6880f995ad5a09ad002679cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33077-cwe-119-improper-restriction-of-ope-f12a2ae5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33077%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20IBM%20Engineering%20Systems%20Design%20Rhapsody&amp;severity=high&amp;id=6880f995ad5a09ad002679c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33076-cwe-119-improper-restriction-of-ope-093278f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33076%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20IBM%20Engineering%20Systems%20Design%20Rhapsody&amp;severity=high&amp;id=6880f995ad5a09ad002679c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40597-cwe-122-heap-based-buffer-overflow--147e69fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40597%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20SonicWall%20SMA%20100%20Series&amp;severity=high&amp;id=6880f995ad5a09ad002679ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33020-cwe-311-missing-encryption-of-sensi-2a4887f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33020%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20IBM%20Engineering%20Systems%20Design%20Rhapsody&amp;severity=medium&amp;id=6880f995ad5a09ad002679c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40596-cwe-121-stack-based-buffer-overflow-1ad54501</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40596%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SMA%20100%20Series&amp;severity=high&amp;id=6880f613ad5a09ad00266d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36117-cwe-384-session-fixation-in-ibm-db2-df000d7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36117%3A%20CWE-384%20Session%20Fixation%20in%20IBM%20Db2%20Mirror%20for%20i&amp;severity=medium&amp;id=6880f613ad5a09ad00266d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36116-cwe-1385-missing-origin-validation--323d5fc8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36116%3A%20CWE-1385%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20IBM%20Db2%20Mirror%20for%20i&amp;severity=medium&amp;id=6880f613ad5a09ad00266d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54090-cwe-253-incorrect-check-of-function-ce53af9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54090%3A%20CWE-253%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=6880e47ead5a09ad0026093b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40599-cwe-434-unrestricted-upload-of-file-7ea1f2df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40599%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SonicWall%20SMA%20100%20Series&amp;severity=critical&amp;id=6880e47ead5a09ad00260938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4411-cwe-79-improper-neutralization-of-in-17d882ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dataprom%20Informatics%20PACS-ACSS&amp;severity=medium&amp;id=6880d66cad5a09ad0025c7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-guest-who-could-exploiting-lpe-in-vmware-tools-82c1ec5b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Guest%20Who%20Could%3A%20Exploiting%20LPE%20in%20VMWare%20Tools&amp;severity=medium&amp;id=6880cf69ad5a09ad0025b342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-craft-a-raw-tcp-socket-without-winsock-5f1dfb87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20craft%20a%20raw%20TCP%20socket%20without%20Winsock%3F&amp;severity=medium&amp;id=688429e0ad5a09ad0058e904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4296-cwe-601-url-redirection-to-untrusted-2e8873c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4296%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20HotelRunner%20B2B&amp;severity=medium&amp;id=6880c85cad5a09ad002587b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54297-cwe-79-improper-neutralization-of-i-234b244d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54297%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20compojoom.com%20CComment%20component%20for%20Joomla&amp;severity=high&amp;id=6880c85cad5a09ad002587c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54294-cwe-89-improper-neutralization-of-s-da821b19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54294%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stackideas.com%20Komento%20component%20for%20Joomla&amp;severity=critical&amp;id=6880c85cad5a09ad002587b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54295-cwe-79-improper-neutralization-of-i-c6f4eabf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dj-extensions.com%20DJ-Reviews%20component%20for%20Joomla&amp;severity=medium&amp;id=6880c85cad5a09ad002587bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54296-cwe-79-improper-neutralization-of-i-1f697ad2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54296%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mooj.org%20ProFiles%20component%20for%20Joomla&amp;severity=high&amp;id=6880c85cad5a09ad002587bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50127-cwe-89-improper-neutralization-of-s-2ed409bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50127%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dj-extensions.com%20DJ-Flyer%20component%20for%20Joomla&amp;severity=high&amp;id=6880c85cad5a09ad002587b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27930-cwe-79-improper-neutralization-of-i-20592a22</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27930%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ManageEngine%20Applications%20Manager&amp;severity=medium&amp;id=6880ba4cad5a09ad002527b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48932-invision-community-4720-calendarvie-a975d7b3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BCVE-2025-48932%5D%20Invision%20Community%20%3C%3D%204.7.20%20(calendar%2Fview.php)%20SQL%20Injection%20Vulnerability&amp;severity=medium&amp;id=6880b6cead5a09ad00251338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48933-invision-community-507-oauthcallbac-3f41b538</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BCVE-2025-48933%5D%20Invision%20Community%20%3C%3D%205.0.7%20(oauth%2Fcallback)%20Reflected%20Cross-Site%20Scripting%20Vulnerability&amp;severity=medium&amp;id=6880b6cead5a09ad0025133c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-infostealer-malware-returns-after-law-enforc-db04ee16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20infostealer%20malware%20returns%20after%20law%20enforcement%20disruption&amp;severity=high&amp;id=6880afc0ad5a09ad0024cc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53882-cwe-807-reliance-on-untrusted-input-65e06722</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53882%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20SUSE%20openSUSE%20Tumbleweed&amp;severity=medium&amp;id=6880afcead5a09ad0024ccb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/usurpation-didentits-manages-dans-azure-60eaa6e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Usurpation%20d%E2%80%99Identit%C3%A9s%20manag%C3%A9es%20dans%20Azure&amp;severity=medium&amp;id=6880a538ad5a09ad0022db0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41687-cwe-121-stack-based-buffer-overflow-73a34584</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41687%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Weidmueller%20IE-SR-2TX-WL&amp;severity=critical&amp;id=68809e2ead5a09ad000c5773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41684-cwe-78-improper-neutralization-of-s-a60f9af1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41684%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Weidmueller%20IE-SR-2TX-WL&amp;severity=high&amp;id=68809e2ead5a09ad000c5770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41683-cwe-78-improper-neutralization-of-s-a2adf7a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41683%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Weidmueller%20IE-SR-2TX-WL&amp;severity=high&amp;id=68809e2ead5a09ad000c576d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/net-rfq-request-for-quote-scammers-casting-wide-ne-993b1d80</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NET%20RFQ%3A%20Request%20for%20Quote%20Scammers%20Casting%20Wide%20Net%20to%20Steal%20Real%20Goods&amp;severity=medium&amp;id=6880a8b8ad5a09ad0023246d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/back-to-business-lumma-stealer-returns-with-stealt-25a9ecca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Back%20to%20Business%3A%20Lumma%20Stealer%20Returns%20with%20Stealthier%20Methods&amp;severity=medium&amp;id=6880a8b8ad5a09ad002324cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8070-cwe-428-unquoted-search-path-or-elem-4542a70d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8070%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20ASUSTOR%20ABP%20and%20AES&amp;severity=critical&amp;id=6880901cad5a09ad0008ab16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31701-vulnerability-in-dahua-ipc-10a925e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31701%3A%20Vulnerability%20in%20Dahua%20IPC&amp;severity=high&amp;id=68808914ad5a09ad000853d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31700-vulnerability-in-dahua-ipc-223227c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31700%3A%20Vulnerability%20in%20Dahua%20IPC&amp;severity=high&amp;id=68808914ad5a09ad000853cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6174-cwe-79-cross-site-scripting-xss-in-q-073d9b36</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6174%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Qwizcards%20%7C%20online%20quizzes%20and%20flashcards&amp;severity=medium&amp;id=68807b22ad5a09ad0007fe0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54439-cwe-434-unrestricted-upload-of-file-b5f31b0e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54439%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807781ad5a09ad0007e8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54438-cwe-22-improper-limitation-of-a-pat-7389ba32</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54438%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54444-cwe-434-unrestricted-upload-of-file-8adb0ca3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54444%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54443-cwe-22-improper-limitation-of-a-pat-28f60554</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54443%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54442-cwe-434-unrestricted-upload-of-file-dfe7e3fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54442%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54441-cwe-434-unrestricted-upload-of-file-1f8348fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54441%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807781ad5a09ad0007e8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54440-cwe-434-unrestricted-upload-of-file-608079a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54440%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54447-cwe-434-unrestricted-upload-of-file-f17881b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54447%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807781ad5a09ad0007e8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54446-cwe-22-improper-limitation-of-a-pat-c140d8c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54446%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54445-cwe-611-improper-restriction-of-xml-560c2e1d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54445%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807781ad5a09ad0007e8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54448-cwe-434-unrestricted-upload-of-file-c6ab5f1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54448%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807782ad5a09ad0007e8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54453-cwe-22-improper-limitation-of-a-pat-e906039d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54453%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807782ad5a09ad0007e8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54452-cwe-287-improper-authentication-in--ddba588d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54452%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807782ad5a09ad0007e8fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54451-cwe-94-improper-control-of-generati-8bd5adce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54451%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807782ad5a09ad0007e8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54450-cwe-22-improper-limitation-of-a-pat-05cafe2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54450%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=688073fcad5a09ad0007da6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54449-cwe-434-unrestricted-upload-of-file-d9d96c7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54449%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=688073fcad5a09ad0007da6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54455-cwe-798-use-of-hard-coded-credentia-385f53b6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54455%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=688073fcad5a09ad0007da74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54454-cwe-798-use-of-hard-coded-credentia-42385b81</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54454%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=688073fcad5a09ad0007da71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-in-the-wild-first-ever-malware-that-abuses--4cf127d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%20in%20the%20Wild%3A%20First-Ever%20Malware%20That%20Abuses%20UI%20Automation&amp;severity=medium&amp;id=6880707cad5a09ad0007d08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8022-improper-neutralization-of-special-e-d0da9b70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8022&amp;severity=null&amp;id=68806cf5ad5a09ad0007c8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8021-directory-traversal-in-files-bucket--287d46da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8021%3A%20Directory%20Traversal%20in%20files-bucket-server&amp;severity=high&amp;id=68806cf5ad5a09ad0007c8eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8020-server-side-request-forgery-ssrf-in--f7f1dcfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8020%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20private-ip&amp;severity=high&amp;id=68806cf4ad5a09ad0007c8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43881-improper-validation-of-specified-qu-f06880f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43881%3A%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20SYNCK%20GRAPHICA%20Real-time%20Bus%20Tracking%20System&amp;severity=medium&amp;id=6881009fad5a09ad00269f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42947-cwe-94-improper-control-of-generati-c863e409</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42947%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20FICA%20ODN%20framework&amp;severity=medium&amp;id=68805b60ad5a09ad0006b2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7722-cwe-272-least-privilege-violation-in-e214b6be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7722%3A%20CWE-272%20Least%20Privilege%20Violation%20in%20steverio%20Social%20Streams&amp;severity=high&amp;id=68804d51ad5a09ad00065fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5753-cwe-79-improper-neutralization-of-in-5ddf4578</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reallaunch%20Commercial%20Real%20Estate%20Valuation%20Calculator&amp;severity=medium&amp;id=68804d50ad5a09ad00065fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6214-cwe-352-cross-site-request-forgery-c-75d98233</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6214%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20omnishop%20Omnishop%20%E2%80%93%20Mobile%20shop%20apps%20complementing%20your%20WooCommerce%20webshop&amp;severity=medium&amp;id=68804d50ad5a09ad00065fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6190-cwe-862-missing-authorization-in-noo-3631909b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6190%3A%20CWE-862%20Missing%20Authorization%20in%20nootheme%20Realty%20Portal%20%E2%80%93%20Agent&amp;severity=high&amp;id=68804d50ad5a09ad00065fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6261-cwe-79-improper-neutralization-of-in-7612d820</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fleetwire%20Fleetwire%20Fleet%20Management&amp;severity=medium&amp;id=68804d51ad5a09ad00065fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5818-cwe-918-server-side-request-forgery--02072c06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5818%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20krasenslavov%20Featured%20Image%20Plus%20%E2%80%93%20Bulk%20Edit%20Featured%20Images%2C%20Unsplash%20%26%20Alt%20Text%20Manager&amp;severity=medium&amp;id=68804d50ad5a09ad00065fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6054-cwe-352-cross-site-request-forgery-c-6e47ca8f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6054%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stratosg%20YANewsflash&amp;severity=medium&amp;id=68804d50ad5a09ad00065fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6215-cwe-862-missing-authorization-in-omn-79991d05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6215%3A%20CWE-862%20Missing%20Authorization%20in%20omnishop%20Omnishop%20%E2%80%93%20Mobile%20shop%20apps%20complementing%20your%20WooCommerce%20webshop&amp;severity=medium&amp;id=68804d50ad5a09ad00065fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8060-stack-based-buffer-overflow-in-tenda-be3beea9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8060%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=68803f41ad5a09ad0005fa36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54120-cwe-532-insertion-of-sensitive-info-523dac1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54120%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20PCL-Community%20PCL2-CE&amp;severity=critical&amp;id=68803137ad5a09ad0004bf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-23-58c673d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-23&amp;severity=medium&amp;id=68817b9cad5a09ad00294202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44109-na-e92fb807</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44109%3A%20n%2Fa&amp;severity=medium&amp;id=688138ddad5a09ad002778ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50477-na-db3eaa20</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50477%3A%20n%2Fa&amp;severity=medium&amp;id=68812e52ad5a09ad00275618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47187-na-8d777e03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47187%3A%20n%2Fa&amp;severity=high&amp;id=68812aedad5a09ad00274dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46686-na-0002c27d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46686%3A%20n%2Fa&amp;severity=medium&amp;id=68812aedad5a09ad00274df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50481-na-9f102cc8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50481%3A%20n%2Fa&amp;severity=medium&amp;id=68810b29ad5a09ad0026c690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46171-na-3284229c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46171%3A%20n%2Fa&amp;severity=medium&amp;id=68810421ad5a09ad0026a6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46099-na-730ff9e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46099%3A%20n%2Fa&amp;severity=high&amp;id=6880e801ad5a09ad002613b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-disrupting-active-exploitation-of-on-premise-229e1525</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Disrupting%20active%20exploitation%20of%20on-premises%20SharePoint%20vulnerabilities&amp;severity=high&amp;id=6880a8adad5a09ad002321f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43489-cwe-502-deserialization-of-untruste-d23eb673</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43489%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=low&amp;id=68802406a915ff00f7fcc073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43488-cwe-79-improper-neutralization-of-i-bedd3d26</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=low&amp;id=6880207ca915ff00f7fc9719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43487-cwe-250-execution-with-unnecessary--b3b9dbc4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43487%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880207ca915ff00f7fc9716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54139-cwe-1021-improper-restriction-of-re-fc343624</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54139%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=6880207ca915ff00f7fc971c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43486-cwe-79-improper-neutralization-of-i-ff602d7b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880207ca915ff00f7fc9713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43485-cwe-532-insertion-of-sensitive-info-3f0c7c38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43485%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880207da915ff00f7fc9727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43484-cwe-79-improper-neutralization-of-i-c241c559</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880207ca915ff00f7fc9724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43483-cwe-321-use-of-hard-coded-cryptogra-c4a6e6b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43483%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880207ca915ff00f7fc9721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43022-cwe-89-improper-neutralization-of-s-e1bf0ec2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43022%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=high&amp;id=68801cf1a915ff00f7fc5980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43021-cwe-1393-use-of-default-password-in-cd4665e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43021%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=68801cf1a915ff00f7fc597d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43020-cwe-78-improper-neutralization-of-s-91d8c7a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43020%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880197fa915ff00f7fc2327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-banking-trojan-becomes-first-to-exploit-mic-3102490e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%20Banking%20Trojan%20Becomes%20First%20to%20Exploit%20Microsoft%20UI%20Automation%20in%20Active%20Attacks%20on%20Banks%20and%20Crypto%20Platforms&amp;severity=high&amp;id=68800bdca915ff00f7fbead6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7766-cwe-611-improper-restriction-of-xml--979f19f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7766%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Lantronix%20Provisioning%20Manager&amp;severity=high&amp;id=688007daa915ff00f7fbc690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41425-cwe-79-improper-neutralization-of-i-6848e402</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41425%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DuraComm%20Corporation%20SPM-500%20DP-10iN-100-MU&amp;severity=high&amp;id=688007d9a915ff00f7fbc68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53538-cwe-770-allocation-of-resources-wit-82a264cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53538%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20OISF%20suricata&amp;severity=high&amp;id=688007daa915ff00f7fbc698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48733-cwe-306-missing-authentication-for--53e51919</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48733%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20DuraComm%20Corporation%20SPM-500%20DP-10iN-100-MU&amp;severity=high&amp;id=688007daa915ff00f7fbc694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54137-cwe-1392-use-of-default-credentials-542fe677</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54137%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20haxtheweb%20issues&amp;severity=high&amp;id=688007daa915ff00f7fbc6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53703-cwe-319-cleartext-transmission-of-s-638293bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53703%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20DuraComm%20Corporation%20SPM-500%20DP-10iN-100-MU&amp;severity=high&amp;id=688007daa915ff00f7fbc69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8011-type-confusion-in-google-chrome-5625a215</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8011%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=688000daa915ff00f7fb7275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8010-type-confusion-in-google-chrome-5ab67bf6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8010%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=688000daa915ff00f7fb7271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8044-memory-safety-bugs-fixed-in-firefox--ac649862</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8044%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd51a915ff00f7fb59d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8043-incorrect-url-truncation-in-mozilla--9b38d670</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8043%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd51a915ff00f7fb59d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8035-memory-safety-bugs-fixed-in-firefox--b28a8c4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8035%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb599e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8040-memory-safety-bugs-fixed-in-firefox--40b7f45b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8040%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd51a915ff00f7fb59cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8034-memory-safety-bugs-fixed-in-firefox--f020645b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8034%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb5994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8033-incorrect-javascript-state-machine-f-368b8269</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8033%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=687ffd50a915ff00f7fb598a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8039-search-terms-persisted-in-url-bar-in-b8d56040</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8039%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd51a915ff00f7fb59c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8038-csp-frame-src-was-not-correctly-enfo-e782d592</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8038%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd51a915ff00f7fb59bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8032-xslt-documents-could-bypass-csp-in-m-5a134119</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8032%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb5981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8031-incorrect-url-stripping-in-csp-repor-4791b609</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8031%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd50a915ff00f7fb5978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8030-potential-user-assisted-code-executi-059fa4d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8030%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb596f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8037-nameless-cookies-shadow-secure-cooki-e7fe8ab5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8037%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd51a915ff00f7fb59b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8036-dns-rebinding-circumvents-cors-in-mo-71640ed3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8036%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb59a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8029-javascript-urls-executed-on-object-a-68bb59b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8029%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb5966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8028-large-branch-table-could-lead-to-tru-6e352fc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8028%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd50a915ff00f7fb595c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8027-javascript-engine-only-wrote-partial-f5f10304</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8027%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=687ffd50a915ff00f7fb5952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7724-cwe-78-improper-neutralization-of-sp-75368b26</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7724%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20VIGI%20NVR1104H-4P%20V1&amp;severity=high&amp;id=687ff9c9a915ff00f7fb1811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7723-cwe-78-improper-neutralization-of-sp-d38a6e7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7723%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20VIGI%20NVR1104H-4P%20V1&amp;severity=high&amp;id=687ff9c9a915ff00f7fb180b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-european-healthcare-network-discloses-securi-384ecb82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20European%20healthcare%20network%20discloses%20security%20breach&amp;severity=high&amp;id=687fed54c25aab2414f977e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-and-fbi-warn-of-escalating-interlock-ransomwa-2ad5576b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20and%20FBI%20warn%20of%20escalating%20Interlock%20ransomware%20attacks&amp;severity=high&amp;id=687fed54c25aab2414f977f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-malware-abuses-windows-accessibility-framew-bfc0c9f0</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%20malware%20abuses%20Windows%20accessibility%20framework%20for%20data%20theft&amp;severity=high&amp;id=687fed54c25aab2414f977ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/credential-theft-and-remote-access-surge-as-allako-6025676f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Credential%20Theft%20and%20Remote%20Access%20Surge%20as%20AllaKore%2C%20PureRAT%2C%20and%20Hijack%20Loader%20Proliferate&amp;severity=high&amp;id=687fd8eca83201eaac1e9ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-confirms-active-exploits-targeting-ise-flaws-746e52e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Confirms%20Active%20Exploits%20Targeting%20ISE%20Flaws%20Enabling%20Unauthenticated%20Root%20Access&amp;severity=high&amp;id=687fd8eca83201eaac1e9ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-reveals-3-chinese-state-hacker-groups-ex-82e98572</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Reveals%203%20Chinese%20State%20Hacker%20Groups%20Exploiting%20SharePoint%20Flaws&amp;severity=high&amp;id=687fc756a83201eaac1e0087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6741-cwe-284-improper-access-control-in-d-16490293</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6741%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=high&amp;id=687fc762a83201eaac1e0104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6523-cwe-1391-use-of-weak-credentials-in--22e32b6f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6523%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20Devolutions%20Server&amp;severity=critical&amp;id=687fc762a83201eaac1e0101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5042-cwe-125-out-of-bounds-read-in-autode-f16e0172</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5042%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Revit&amp;severity=high&amp;id=687fb947a83201eaac1dc368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7371-cwe-532-insertion-of-sensitive-infor-2b4a576e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7371%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Okta%20Okta%20On-Premises%20Provisioning%20Agent&amp;severity=medium&amp;id=687fb5d2a83201eaac1da8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8019-buffer-overflow-in-shenzhen-libituo--5377682e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8019%3A%20Buffer%20Overflow%20in%20Shenzhen%20Libituo%20Technology%20LBT-T300-T310&amp;severity=high&amp;id=687fb240a83201eaac1d91a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36520-cwe-476-null-pointer-dereference-in-1bca116c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36520%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Bloomberg%20Comdb2&amp;severity=high&amp;id=687fb240a83201eaac1d91a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46354-cwe-617-reachable-assertion-in-bloo-22dd86f9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46354%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20Bloomberg%20Comdb2&amp;severity=high&amp;id=687fb240a83201eaac1d91a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48498-cwe-476-null-pointer-dereference-in-8e718a26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48498%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Bloomberg%20Comdb2&amp;severity=high&amp;id=687fb240a83201eaac1d91a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36512-cwe-617-reachable-assertion-in-bloo-5802e6cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36512%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20Bloomberg%20Comdb2&amp;severity=high&amp;id=687fb240a83201eaac1d919d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35966-cwe-476-null-pointer-dereference-in-06b770a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35966%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Bloomberg%20Comdb2&amp;severity=high&amp;id=687fb240a83201eaac1d919a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autofill-phishing-the-silent-scam-that-nobody-warn-ff334441</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autofill%20Phishing%3A%20The%20Silent%20Scam%20That%20Nobody%20Warned%20You%20About&amp;severity=medium&amp;id=687faec0a83201eaac1d3080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8015-cwe-79-improper-neutralization-of-in-e915941a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8015%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8018-sql-injection-in-code-projects-food--885ac37c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8018%3A%20SQL%20Injection%20in%20code-projects%20Food%20Ordering%20Review%20System&amp;severity=medium&amp;id=687fa432a83201eaac1ce8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4878-use-after-free-in-red-hat-red-hat-en-ff288696</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4878%3A%20Use%20After%20Free&amp;severity=low&amp;id=687fa0aca83201eaac1ccc8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4295-cwe-297-improper-validation-of-certi-bf07b754</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4295%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20HotelRunner%20B2B&amp;severity=medium&amp;id=687f9d28a83201eaac1cb948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4294-cwe-79-improper-neutralization-of-in-19621681</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4294%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HotelRunner%20B2B&amp;severity=medium&amp;id=687f99a5a83201eaac1c9523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8017-stack-based-buffer-overflow-in-tenda-fec90417</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8017%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=687f9622a83201eaac1c861f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-microsoft-sharepoint-flaws-in-glob-58e08a14</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Microsoft%20SharePoint%20Flaws%20in%20Global%20Breaches&amp;severity=high&amp;id=687f8f17a83201eaac1c4886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34141-cwe-79-improper-neutralization-of-i-73966b85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34141%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ETQ%20Reliance%20CG%20(legacy)&amp;severity=medium&amp;id=687f881fa83201eaac1c0ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34140-cwe-639-authorization-bypass-throug-bfa03e54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34140%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ETQ%20Reliance%20CG%20(legacy)&amp;severity=high&amp;id=687f881fa83201eaac1c0eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34142-cwe-611-improper-restriction-of-xml-101bb8ac</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34142%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20ETQ%20Reliance%20CG%20(legacy)&amp;severity=medium&amp;id=687f881fa83201eaac1c0ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34143-cwe-288-authentication-bypass-using-fd92a361</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34143%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ETQ%20Reliance%20CG%20(legacy)&amp;severity=critical&amp;id=687f881fa83201eaac1c0ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-sharepoint-toolshell-attacks-linked-to-c-d18eda1d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Sharepoint%20ToolShell%20attacks%20linked%20to%20Chinese%20hackers&amp;severity=high&amp;id=687f880ea83201eaac1c0e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7705-cwe-489-active-debug-code-in-abb-swi-84cab53a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7705%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20ABB%20Switch%20Actuator%204%20DU-83330&amp;severity=medium&amp;id=687f7d82a83201eaac1bc9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4284-cwe-79-improper-neutralization-of-in-ecc24007</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4284%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Rolantis%20Information%20Technologies%20Agentis&amp;severity=medium&amp;id=687f79fea83201eaac1bbd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4285-cwe-89-improper-neutralization-of-sp-4f85b4fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4285%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rolantis%20Information%20Technologies%20Agentis&amp;severity=critical&amp;id=687f79fea83201eaac1bbd1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-fashion-label-sabos-35-million-customer-rec-5cf37c47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Fashion%20Label%20SABO%E2%80%99s%203.5%20Million%20Customer%20Records%20Exposed%20Online&amp;severity=medium&amp;id=687f6beda83201eaac1aff68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7900-cwe-639-authorization-bypass-through-b3a35e4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7900%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TYPO3%20Extension%20%22femanager%22&amp;severity=medium&amp;id=687f686aa83201eaac1af337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7899-cwe-639-authorization-bypass-through-d07d3af0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7899%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TYPO3%20Extension%20%22powermail%22&amp;severity=medium&amp;id=687f686aa83201eaac1af334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7427-cwe-427-uncontrolled-search-path-ele-52bcecfe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7427%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Arm%20Development%20Studio&amp;severity=medium&amp;id=687f6162a83201eaac1a6039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ring-denies-breach-after-users-report-suspicious-l-2893099d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ring%20denies%20breach%20after%20users%20report%20suspicious%20logins&amp;severity=high&amp;id=687f5ddda83201eaac1a4839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46267-hidden-functionality-in-elecom-colt-a4740220</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46267%3A%20Hidden%20functionality%20in%20ELECOM%20CO.%2CLTD.%20WRC-BE36QS-B&amp;severity=medium&amp;id=687f5defa83201eaac1a48d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53472-improper-neutralization-of-special--1d093052</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53472%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRC-BE36QS-B&amp;severity=high&amp;id=687f5defa83201eaac1a48da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6187-cwe-862-missing-authorization-in-bse-c537fdc6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6187%3A%20CWE-862%20Missing%20Authorization%20in%20bsecuretech%20bSecure%20%E2%80%93%20Your%20Universal%20Checkout&amp;severity=critical&amp;id=687f5a59a83201eaac1a3a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6213-cwe-94-improper-control-of-generatio-192cb55a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6213%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20psauxit%20Nginx%20Cache%20Purge%20Preload&amp;severity=high&amp;id=687f5a59a83201eaac1a3a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7685-cwe-352-cross-site-request-forgery-c-09c2c024</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sflack%20Like%20%26%20Share%20My%20Site&amp;severity=medium&amp;id=687f5a59a83201eaac1a3a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6082-cwe-200-exposure-of-sensitive-inform-3e46f472</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6082%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mia4%20Birth%20Chart%20Compatibility&amp;severity=medium&amp;id=687f5a59a83201eaac1a3a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7692-cwe-288-authentication-bypass-using--b02ff0b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7692%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20gsayed786%20Orion%20Login%20with%20SMS&amp;severity=high&amp;id=687f5a59a83201eaac1a3a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7687-cwe-352-cross-site-request-forgery-c-8ba47490</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7687%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anop-goswami%20Latest%20Post%20Accordian%20Slider&amp;severity=medium&amp;id=687f5a59a83201eaac1a3a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-accidentally-discovered-a-remote-code-execu-c5c66589</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20We%20Accidentally%20Discovered%20a%20Remote%20Code%20Execution%20Vulnerability%20in%20ETQ%20Reliance&amp;severity=medium&amp;id=687f4c4ca83201eaac19867a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7645-cwe-22-improper-limitation-of-a-path-4a522fb3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7645%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20htplugins%20Extensions%20For%20CF7%20(Contact%20form%207%20Database%2C%20Conditional%20Fields%20and%20Redirection)&amp;severity=high&amp;id=687f33ada83201eaac18c00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52580-insertion-of-sensitive-information--f6412046</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52580%3A%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20Gift%20Pad%20Co.%2CLtd.%20%22region%20PAY%22%20App%20for%20Android&amp;severity=low&amp;id=687f1b12a83201eaac18426b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6585-cwe-20-improper-input-validation-in--99432f20</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6585%3A%20CWE-20%20Improper%20Input%20Validation%20in%20WP%20JobHunt&amp;severity=high&amp;id=687f140aa83201eaac181667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7644-cwe-79-improper-neutralization-of-in-10524d04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Pixel%20Gallery%20Addons%20for%20Elementor%20%E2%80%93%20Easy%20Grid%2C%20Creative%20Gallery%2C%20Drag%20and%20Drop%20Grid%2C%20Custom%20Grid%20Layout%2C%20Portfolio%20Gallery&amp;severity=medium&amp;id=687f140aa83201eaac181672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7495-cwe-79-improper-neutralization-of-in-f9caac8c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7495%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=687f140aa83201eaac18166b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7953-open-redirect-in-sanluan-publiccms-3b5ed5e3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7953%3A%20Open%20Redirect%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=687f097da83201eaac17c927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7952-command-injection-in-totolink-t6-062520ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7952%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=687f0276a83201eaac176971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7951-cross-site-scripting-in-code-project-e7460301</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7951%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Public%20Chat%20Room&amp;severity=medium&amp;id=687efb6ea83201eaac17238c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7950-sql-injection-in-code-projects-publi-24a45e36</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7950%3A%20SQL%20Injection%20in%20code-projects%20Public%20Chat%20Room&amp;severity=medium&amp;id=687efb6ea83201eaac172385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6831-cwe-79-improper-neutralization-of-in-69db3073</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6831%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=687ef0e1a83201eaac16c9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5240-cwe-79-improper-neutralization-of-in-b56ac038</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20CRM%20and%20Lead%20Management%20by%20vcita&amp;severity=medium&amp;id=687ef0e1a83201eaac16c9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7949-open-redirect-in-sanluan-publiccms-0cff2a74</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7949%3A%20Open%20Redirect%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=687ef0e1a83201eaac16c9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7948-weak-password-recovery-in-jsherp-8b74f0ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7948%3A%20Weak%20Password%20Recovery%20in%20jshERP&amp;severity=medium&amp;id=687ee656a83201eaac1662a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7947-improper-authorization-in-jsherp-01fa9726</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7947%3A%20Improper%20Authorization%20in%20jshERP&amp;severity=medium&amp;id=687edf4ea83201eaac161043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7946-cross-site-scripting-in-phpgurukul-a-7507f923</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7946%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687edf4da83201eaac16103c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-22-19d92fc2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-22&amp;severity=medium&amp;id=68802773a915ff00f7fcdb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pie-register-wordpress-plugin-3714-authentication--54001d49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pie%20Register%20WordPress%20Plugin%203.7.1.4%20-%20Authentication%20Bypass%20to%20RCE&amp;severity=critical&amp;id=687ffbf0a915ff00f7fb5333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simple-file-list-wordpress-plugin-422-file-upload--0f6b1453</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Simple%20File%20List%20WordPress%20Plugin%204.2.2%20-%20File%20Upload%20to%20RCE&amp;severity=critical&amp;id=687ffbf0a915ff00f7fb532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-edge-windows-10-version-1511-cross-site--f86d9880</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Edge%20Windows%2010%20Version%201511%20-%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/joomla-js-jobs-plugin-142-sql-injection-8817e5c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Joomla%20JS%20Jobs%20plugin%201.4.2%20-%20SQL%20injection&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tenda-fh451-1009-router-stack-based-buffer-overflo-4565834b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tenda%20FH451%201.0.0.9%20Router%20-%20Stack-based%20Buffer%20Overflow&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discourse-311-unauthenticated-chat-message-access-87a4dd24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discourse%203.1.1%20-%20Unauthenticated%20Chat%20Message%20Access&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-9aac79c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20Telegram%20Bot%20Username&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-667e120d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20Operator%20Surname&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-06134dc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20Facebook%20Integration%20Page%20Name%20Field&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-598124ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20Personal%20Canned%20Messages&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-7bd62c45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20the%20Chat%20Transfer%20Function&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb529d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-ae320570</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20Department%20Assignment%20Alias%20Nick%20Field&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb5298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51472-na-31d16e2d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51472%3A%20n%2Fa&amp;severity=medium&amp;id=687ff645a915ff00f7fa9e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51462-na-1236f640</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51462%3A%20n%2Fa&amp;severity=medium&amp;id=687ff645a915ff00f7fa9e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51475-na-840bcd70</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51475%3A%20n%2Fa&amp;severity=medium&amp;id=687fe6fca83201eaac205b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51458-na-7aa88db0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51458%3A%20n%2Fa&amp;severity=medium&amp;id=687fe6fca83201eaac205b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31513-na-16c89da1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31513%3A%20n%2Fa&amp;severity=medium&amp;id=687fe6fca83201eaac205b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31512-na-a20738da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31512%3A%20n%2Fa&amp;severity=high&amp;id=687fe6fca83201eaac205b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31511-na-81ba05da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31511%3A%20n%2Fa&amp;severity=high&amp;id=687fe6fca83201eaac205b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51479-na-9c21c5ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51479%3A%20n%2Fa&amp;severity=medium&amp;id=687fdff8a83201eaac1fae34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51459-na-0ffce093</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51459%3A%20n%2Fa&amp;severity=medium&amp;id=687fdff8a83201eaac1fae30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51471-na-9016d393</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51471%3A%20n%2Fa&amp;severity=medium&amp;id=687fdc70a83201eaac1f06b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48964-na-0dfd0f02</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48964%3A%20n%2Fa&amp;severity=medium&amp;id=687fce60a83201eaac1e16a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51464-na-6e037226</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51464%3A%20n%2Fa&amp;severity=high&amp;id=687fcadba83201eaac1e0de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51481-na-fe0b90be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51481%3A%20n%2Fa&amp;severity=medium&amp;id=687fc762a83201eaac1e00fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51482-na-4165349e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51482%3A%20n%2Fa&amp;severity=high&amp;id=687fc3d2a83201eaac1dedec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51480-na-27d29173</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51480%3A%20n%2Fa&amp;severity=high&amp;id=687fb5d2a83201eaac1da8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51463-na-c78f3b58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51463%3A%20n%2Fa&amp;severity=high&amp;id=687faebba83201eaac1d2ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51863-na-9b08e17a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51863%3A%20n%2Fa&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51862-na-b073e4a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51862%3A%20n%2Fa&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51860-na-ccaaa707</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51860%3A%20n%2Fa&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51859-na-e8da7585</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51859%3A%20n%2Fa&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51858-na-d2b6dbac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51858%3A%20n%2Fa&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51865-na-a2690f9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51865%3A%20n%2Fa&amp;severity=high&amp;id=687fa432a83201eaac1ce8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51864-na-d26e9b52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51864%3A%20n%2Fa&amp;severity=medium&amp;id=687fa432a83201eaac1ce8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51867-na-ef5662a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51867%3A%20n%2Fa&amp;severity=medium&amp;id=687f9d28a83201eaac1cb94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7945-buffer-overflow-in-d-link-dir-513-8ad04f21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7945%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=687ed146a83201eaac158b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7944-cross-site-scripting-in-phpgurukul-t-35f78171</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7944%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=687eca36a83201eaac154f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7943-cross-site-scripting-in-phpgurukul-t-149e6266</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7943%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=687ec32da83201eaac151ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7486-cwe-79-improper-neutralization-of-in-1611802b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motovnet%20Ebook%20Store&amp;severity=medium&amp;id=687feeee723ca1aca2722c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7942-cross-site-scripting-in-phpgurukul-t-b284539e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7942%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=687ebc26a83201eaac14e010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7941-cross-site-scripting-in-phpgurukul-t-58545ece</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7941%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Time%20Table%20Generator%20System&amp;severity=medium&amp;id=687eb51ea83201eaac14b666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7940-improper-export-of-android-applicati-c38f2a19</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7940%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Genshin%20Albedo%20Cat%20House%20App&amp;severity=medium&amp;id=687eae17a83201eaac148f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54134-cwe-20-improper-input-validation-in-1ca30ba9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54134%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20haxtheweb%20issues&amp;severity=high&amp;id=687eaa92a83201eaac1449a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54129-cwe-204-observable-response-discrep-f409ed1b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54129%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=687eaa92a83201eaac1449a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54128-cwe-79-improper-neutralization-of-i-fa0a28a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54128%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20haxtheweb%20issues&amp;severity=high&amp;id=687eaa92a83201eaac1449ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54127-cwe-1188-insecure-default-initializ-8b31ad21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54127%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20haxtheweb%20issues&amp;severity=critical&amp;id=687ea70ea83201eaac142c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7939-unrestricted-upload-in-jerryshensjf--b8ccb5ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7939%3A%20Unrestricted%20Upload%20in%20jerryshensjf%20JPACookieShop%20%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88&amp;severity=medium&amp;id=687ea70ea83201eaac142c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54122-cwe-918-server-side-request-forgery-dc99c92f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54122%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Manager-io%20Manager&amp;severity=critical&amp;id=687ea70ea83201eaac142c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53832-cwe-77-improper-neutralization-of-s-5b507ad2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53832%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20translated%20lara-mcp&amp;severity=high&amp;id=687ea38ba83201eaac13dd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53528-cwe-79-improper-neutralization-of-i-6185280f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53528%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zmievsa%20cadwyn&amp;severity=high&amp;id=687ea38ba83201eaac13dd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54071-cwe-434-unrestricted-upload-of-file-c0a9c581</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54071%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rommapp%20romm&amp;severity=critical&amp;id=687ea00aa83201eaac13ae4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54121-cwe-770-allocation-of-resources-wit-8e348c9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54121%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20encode%20starlette&amp;severity=medium&amp;id=687ea00aa83201eaac13ae53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7938-authorization-bypass-in-jerryshensjf-422e4794</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7938%3A%20Authorization%20Bypass%20in%20jerryshensjf%20JPACookieShop%20%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88&amp;severity=medium&amp;id=687ea00aa83201eaac13ae59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7231-cwe-787-out-of-bounds-write-in-invt--3d86137e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7231%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20VT-Designer&amp;severity=high&amp;id=687e9c85a83201eaac12fa9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7230-cwe-843-access-of-resource-using-inc-b55cc891</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7230%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20INVT%20VT-Designer&amp;severity=high&amp;id=687e9c85a83201eaac12fa97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7229-cwe-787-out-of-bounds-write-in-invt--e28c5de9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7229%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20VT-Designer&amp;severity=high&amp;id=687e9c85a83201eaac12fa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7228-cwe-787-out-of-bounds-write-in-invt--60e5d545</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7228%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20VT-Designer&amp;severity=high&amp;id=687e9c85a83201eaac12fa91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7227-cwe-787-out-of-bounds-write-in-invt--4dbef2a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7227%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20VT-Designer&amp;severity=high&amp;id=687e9c85a83201eaac12fa8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7226-cwe-787-out-of-bounds-write-in-invt--7b4fa9a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7226%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20HMITool&amp;severity=high&amp;id=687e9c85a83201eaac12fa8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7225-cwe-787-out-of-bounds-write-in-invt--7bce161b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7225%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20HMITool&amp;severity=high&amp;id=687e9c85a83201eaac12fa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7224-cwe-787-out-of-bounds-write-in-invt--14abc6c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7224%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20HMITool&amp;severity=high&amp;id=687e9c85a83201eaac12fa85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7223-cwe-787-out-of-bounds-write-in-invt--1be7a0d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7223%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20HMITool&amp;severity=high&amp;id=687e9c85a83201eaac12fa82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7222-cwe-787-out-of-bounds-write-in-luxio-0d2eb044</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7222%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Luxion%20KeyShot&amp;severity=high&amp;id=687e9c85a83201eaac12fa7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7936-sql-injection-in-fuyanglipengjun-pla-373badc3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7936%3A%20SQL%20Injection%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=687e9900a83201eaac12e785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7935-sql-injection-in-fuyanglipengjun-pla-e668f7db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7935%3A%20SQL%20Injection%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=687e91f7a83201eaac12bea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/just-in-world-leaks-group-claims-dell-data-breach--650b13c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Just%20In%3A%20World%20Leaks%20Group%20Claims%20Dell%20Data%20Breach%2C%20Leaks%201.3%20TB%20of%20Files&amp;severity=high&amp;id=687e8aeda83201eaac128f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7934-sql-injection-in-fuyanglipengjun-pla-bc5bf149</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7934%3A%20SQL%20Injection%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=687e8afda83201eaac128fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-dchspy-android-malware-masquerades-as--0121e677</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20DCHSpy%20Android%20Malware%20Masquerades%20as%20VPN%20Apps%20to%20Spy%20on%20Dissidents&amp;severity=high&amp;id=687e8769a83201eaac127dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36057-cwe-299-authentication-bypass-using-fd97de1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36057%3A%20CWE-299%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20IBM%20Cognos%20Analytics%20Mobile&amp;severity=medium&amp;id=687e8777a83201eaac127e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36062-cwe-311-missing-encryption-of-sensi-d08df1eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36062%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20IBM%20Cognos%20Analytics%20Mobile&amp;severity=medium&amp;id=687e8777a83201eaac127e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36106-cwe-326-inadequate-encryption-stren-d6856885</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36106%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20IBM%20Cognos%20Analytics%20Mobile&amp;severity=medium&amp;id=687e8777a83201eaac127e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36107-cwe-319-cleartext-transmission-of-s-c0fc2787</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36107%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Cognos%20Analytics%20Mobile&amp;severity=medium&amp;id=687e83e6a83201eaac1260fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7933-sql-injection-in-campcodes-sales-and-bdd21a19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7933%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=687e83e6a83201eaac1260ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7962-cwe-147-improper-neutralization-of-i-cf53bf4c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7962%3A%20CWE-147%20Improper%20Neutralization%20of%20Input%20Terminators%20in%20Eclipse%20Foundation%20Jakarta%20Mail&amp;severity=medium&amp;id=687e7cdfa83201eaac121637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7932-command-injection-in-d-link-dir817l-cec03930</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7932%3A%20Command%20Injection%20in%20D-Link%20DIR%E2%80%91817L&amp;severity=medium&amp;id=687e75daa83201eaac11de9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7717-cwe-862-missing-authorization-in-dru-90dd3097</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7717%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20File%20Download&amp;severity=high&amp;id=687e7252a83201eaac11c513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7716-cwe-79-improper-neutralization-of-in-94fc4d02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7716%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Real-time%20SEO%20for%20Drupal&amp;severity=medium&amp;id=687e7252a83201eaac11c510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7715-cwe-79-improper-neutralization-of-in-84ef4bdb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7715%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Block%20Attributes&amp;severity=medium&amp;id=687e7252a83201eaac11c50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7392-cwe-79-improper-neutralization-of-in-c74faa4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Cookies%20Addons&amp;severity=medium&amp;id=687e7252a83201eaac11c50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7393-cwe-307-improper-restriction-of-exce-fac20646</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7393%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Drupal%20Mail%20Login&amp;severity=critical&amp;id=687e6ecfa83201eaac11ade6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30477-cwe-327-use-of-a-broken-or-risky-cr-5b806635</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30477%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=687e6ecfa83201eaac11addc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7931-unrestricted-upload-in-code-projects-16cebfe6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7931%3A%20Unrestricted%20Upload%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687e6ecfa83201eaac11ade9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32744-cwe-434-unrestricted-upload-of-file-dd83108b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32744%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Dell%20AppSync&amp;severity=medium&amp;id=687e6ecfa83201eaac11addf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54082-cwe-434-unrestricted-upload-of-file-aca992e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54082%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20marshmallow-packages%20nova-tiptap&amp;severity=high&amp;id=687e6ecfa83201eaac11ade2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-npm-website-used-to-push-malware-via-stolen-t-14e92b28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20npm%20Website%20Used%20to%20Push%20Malware%20via%20Stolen%20Token%2C%20Multiple%20Packages%20Impacted&amp;severity=medium&amp;id=687e6b48a83201eaac1191d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36603-cwe-611-improper-restriction-of-xml-3eaf06be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36603%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20AppSync&amp;severity=medium&amp;id=687e6b55a83201eaac119236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7930-sql-injection-in-code-projects-churc-25cac622</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7930%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687e67c6a83201eaac117515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7929-sql-injection-in-code-projects-churc-18518a37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7929%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687e60bea83201eaac114e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7928-sql-injection-in-code-projects-churc-788faca5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7928%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687e59b5a83201eaac111004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7927-sql-injection-in-phpgurukul-online-b-40b2376f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7927%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Banquet%20Booking%20System&amp;severity=medium&amp;id=687e52aea83201eaac10603e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6235-cwe-79-improper-neutralization-of-in-59138807</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6235%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Extreme%20Networks%20ExtremeControl&amp;severity=medium&amp;id=687e4ba8a83201eaac10094a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4130-cwe-798-use-of-hard-coded-credential-a4d9e865</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4130%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20PAVO%20Inc.%20PAVO%20Pay&amp;severity=high&amp;id=687e4ba8a83201eaac100947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4129-cwe-639-authorization-bypass-through-6cd59583</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4129%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20PAVO%20Inc.%20PAVO%20Pay&amp;severity=high&amp;id=687e4ba8a83201eaac100944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7926-cross-site-scripting-in-phpgurukul-o-9e23c3f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7926%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Online%20Banquet%20Booking%20System&amp;severity=medium&amp;id=687e4822a83201eaac0ff584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7382-vulnerability-in-sophos-sophos-firew-261711b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7382%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sophos%20Sophos%20Firewall&amp;severity=high&amp;id=687e4119a83201eaac0fbb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7624-cwe-89-improper-neutralization-of-sp-e8e66fff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7624%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sophos%20Sophos%20Firewall&amp;severity=critical&amp;id=687e4119a83201eaac0fbb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6704-cwe-78-improper-neutralization-of-sp-341ae876</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6704%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sophos%20Sophos%20Firewall&amp;severity=critical&amp;id=687e4119a83201eaac0fbb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30192-cwe-345-insufficient-verification-o-0768cd03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30192%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20PowerDNS%20Recursor&amp;severity=high&amp;id=687e3a12a83201eaac0f8674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7925-cross-site-scripting-in-phpgurukul-o-5aa4d500</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7925%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Online%20Banquet%20Booking%20System&amp;severity=medium&amp;id=687e368da83201eaac0f54af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-supply-chain-vulnerability-513a53d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20Supply%20Chain%20Vulnerability&amp;severity=medium&amp;id=687e3307a83201eaac0f2f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4040-cwe-639-authorization-bypass-through-96d6b29c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4040%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Turpak%20Automatic%20Station%20Monitoring%20System&amp;severity=high&amp;id=687e368da83201eaac0f54ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wave-of-squidloader-malware-targeting-financia-626aef38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Wave%20of%20SquidLoader%20Malware%20Targeting%20Financial%20Institutions&amp;severity=medium&amp;id=687e368da83201eaac0f547c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2301-cwe-639-authorization-bypass-through-7d296c12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2301%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Akbim%20Software%20Online%20Exam%20Registration&amp;severity=medium&amp;id=687e2889a83201eaac0edba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-confirms-active-exploits-of-sharepoint-f-92ddbf8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Confirms%20Active%20Exploits%20of%20SharePoint%20Flaws%2C%20Urges%20Immediate%20Patching%20for%20On-Prem%20Users&amp;severity=high&amp;id=687e287ba83201eaac0eda9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-internet-red-button-a-2016-bug-still-lets-anyo-9f96a1c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Internet%20Red%20Button%3A%20a%202016%20Bug%20Still%20Lets%20Anyone%20Kill%20Solar%20Farms%20in%203%20Clicks&amp;severity=medium&amp;id=687e2177a83201eaac0ea5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5681-cwe-639-authorization-bypass-through-f5c2bdc5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5681%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Turtek%20Software%20Eyotek&amp;severity=medium&amp;id=687e2174a83201eaac0ea5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7924-cross-site-scripting-in-phpgurukul-o-e0719b61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7924%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Online%20Banquet%20Booking%20System&amp;severity=medium&amp;id=687e2174a83201eaac0ea5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41459-cwe-287-improper-authentication-in--2b44756d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41459%3A%20CWE-287%20Improper%20Authentication%20in%20Two%20App%20Studio%20Journey&amp;severity=high&amp;id=687e2174a83201eaac0ea5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41458-cwe-312-cleartext-storage-of-sensit-21250ef6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41458%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Two%20App%20Studio%20Journey&amp;severity=medium&amp;id=687e2174a83201eaac0ea5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deedrat-backdoor-enhanced-with-advanced-capabiliti-50d0bea8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeedRAT%20Backdoor%20Enhanced%20with%20Advanced%20Capabilities&amp;severity=medium&amp;id=687e1a6da83201eaac0b9e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nailaolocker-ransomwares-cheese-24f22c75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NailaoLocker%20Ransomware&apos;s%20&apos;Cheese&apos;&amp;severity=medium&amp;id=687e1a6da83201eaac0b9ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ghostcontainer-malware-hits-high-value-ms-exch-9ed86ebf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20GhostContainer%20Malware%20Hits%20High-Value%20MS%20Exchange%20Servers%20in%20Asia&amp;severity=high&amp;id=687e16e7a83201eaac0b8537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soc-files-an-apt41-attack-on-government-it-service-a829853f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SOC%20files%3A%20an%20APT41%20attack%20on%20government%20IT%20services%20in%20Africa&amp;severity=medium&amp;id=687e24f8a83201eaac0ebeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-novel-technique-for-sql-injection-in-pdos-prepar-dce16944</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Novel%20Technique%20for%20SQL%20Injection%20in%20PDO%E2%80%99s%20Prepared%20Statements&amp;severity=medium&amp;id=687e0fe3a83201eaac0b477e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50151-cwe-20-in-apache-software-foundatio-656c3182</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50151%3A%20CWE-20%20in%20Apache%20Software%20Foundation%20Apache%20Jena&amp;severity=high&amp;id=687e0c60a83201eaac0b17aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41681-cwe-79-improper-neutralization-of-i-b4d8788c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=medium&amp;id=687e0c60a83201eaac0b17a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41679-cwe-787-out-of-bounds-write-in-mb-c-badea641</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41679%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=medium&amp;id=687e0c60a83201eaac0b17a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41678-cwe-89-improper-neutralization-of-s-66a904f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41678%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=medium&amp;id=687e0c60a83201eaac0b179e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49656-cwe-22-improper-limitation-of-a-pat-02ff9e03</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49656%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Jena&amp;severity=high&amp;id=687e0c60a83201eaac0b17a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41677-cwe-400-uncontrolled-resource-consu-2a88be1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41677%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=medium&amp;id=687e0c60a83201eaac0b179b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41676-cwe-400-uncontrolled-resource-consu-39062adc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41676%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=medium&amp;id=687e0c60a83201eaac0b1798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41675-cwe-78-improper-neutralization-of-s-2a330b9d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41675%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=high&amp;id=687e0c60a83201eaac0b1795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41674-cwe-78-improper-neutralization-of-s-cf00213a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41674%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=high&amp;id=687e0c60a83201eaac0b1792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41673-cwe-78-improper-neutralization-of-s-6c702528</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41673%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=high&amp;id=687e0c5fa83201eaac0b178b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hard-coded-credentials-found-in-hpe-instant-on-dev-6537babd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hard-Coded%20Credentials%20Found%20in%20HPE%20Instant%20On%20Devices%20Allow%20Admin%20Access&amp;severity=high&amp;id=687e08d8a83201eaac0b013d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1469-cwe-639-authorization-bypass-through-ad2ed1bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1469%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Turtek%20Software%20Eyotek&amp;severity=high&amp;id=687e7cdfa83201eaac12163e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/getting-to-the-crux-ransomware-of-the-matter-c9724459</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Getting%20to%20the%20Crux%20(Ransomware)%20of%20the%20Matter&amp;severity=medium&amp;id=687dfac9a83201eaac0a9634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4570-cwe-798-use-of-hard-coded-credential-a98c2291</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4570%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20ASUS%20MyASUS&amp;severity=medium&amp;id=687df3eaa83201eaac0a51f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4569-cwe-798-use-of-hard-coded-credential-21e26e44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4569%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20ASUS%20MyASUS&amp;severity=high&amp;id=687df3eaa83201eaac0a51ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4049-cwe-798-use-of-hard-coded-credential-c463c968</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4049%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SIGNUM-NET%20FARA&amp;severity=high&amp;id=687df3eaa83201eaac0a51f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7354-cwe-79-improper-neutralization-of-in-77ec0928</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7354%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=687df03ea83201eaac0a3ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7369-cwe-352-cross-site-request-forgery-c-927127bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7369%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=687df03ea83201eaac0a3aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4685-cwe-79-improper-neutralization-of-in-d6527a34</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4685%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gutentor%20Gutentor%20%E2%80%93%20Gutenberg%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=687df03ea83201eaac0a3ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0664-cwe-94-improper-control-of-generatio-384aec28</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0664%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Trellix%20Trellix%20Endpoint%20Security%20(HX)%20Agent&amp;severity=medium&amp;id=687de936a83201eaac0a1148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7920-cwe-79-improper-neutralization-of-in-f8098742</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7920%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Simopro%20Technology%20WinMatrix3%20Web%20package&amp;severity=medium&amp;id=687de936a83201eaac0a114b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7344-cwe-648-incorrect-use-of-privileged--508fad1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7344%3A%20CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Digiwin%20EAI&amp;severity=high&amp;id=687de5b2a83201eaac09f824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7343-cwe-89-improper-neutralization-of-sp-c15d63be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7343%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Digiwin%20SFT&amp;severity=critical&amp;id=687de5b2a83201eaac09f820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7921-cwe-121-stack-based-buffer-overflow--013ca7cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7921%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ASKEY%20RTF8207w&amp;severity=critical&amp;id=687e3a12a83201eaac0f867d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24938-vulnerability-in-nokia-wavesuite-no-f11f29c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24938%3A%20Vulnerability%20in%20Nokia%20WaveSuite%20NOC&amp;severity=high&amp;id=687ea3e3a83201eaac13fa97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24937-vulnerability-in-nokia-wavesuite-no-31e2640b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24937%3A%20Vulnerability%20in%20Nokia%20WaveSuite%20NOC&amp;severity=critical&amp;id=687ea3e3a83201eaac13fa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24936-vulnerability-in-nokia-wavesuite-no-b5fb23f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24936%3A%20Vulnerability%20in%20Nokia%20WaveSuite%20NOC&amp;severity=critical&amp;id=687ddeaaa83201eaac09d0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7919-cwe-200-exposure-of-sensitive-inform-8eb3e492</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7919%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Simopro%20Technology%20WinMatrix3%20Web%20package&amp;severity=high&amp;id=687ddeaaa83201eaac09d0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7918-cwe-89-improper-neutralization-of-sp-0d799cbf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7918%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Simopro%20Technology%20WinMatrix3%20Web%20package&amp;severity=critical&amp;id=687ddb26a83201eaac09b82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7917-cwe-434-unrestricted-upload-of-file--7d6ea86b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7917%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Simopro%20Technology%20WinMatrix3%20Web%20package&amp;severity=high&amp;id=687ddb26a83201eaac09b827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7916-cwe-502-deserialization-of-untrusted-42175960</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7916%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Simopro%20Technology%20WinMatrix3&amp;severity=critical&amp;id=687ddb26a83201eaac09b82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7915-sql-injection-in-chanjet-crm-f0d58d03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7915%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=687d8dcea83201eaac05f84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7914-buffer-overflow-in-tenda-ac6-00ac202d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7914%3A%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=687d8dcea83201eaac05f843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-21-12ab2ba5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-21&amp;severity=medium&amp;id=687ed83da83201eaac15d6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51868-na-ad4b75f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51868%3A%20n%2Fa&amp;severity=high&amp;id=687ea00aa83201eaac13ae4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52362-na-515bc755</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52362%3A%20n%2Fa&amp;severity=critical&amp;id=687e957ba83201eaac12cf69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51869-na-fe89872d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51869%3A%20n%2Fa&amp;severity=high&amp;id=687e957ba83201eaac12cf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51403-na-79d6d921</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51403%3A%20n%2Fa&amp;severity=medium&amp;id=687e91f7a83201eaac12bea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51401-na-5c7e78b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51401%3A%20n%2Fa&amp;severity=medium&amp;id=687e91f7a83201eaac12be9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51400-na-fdd578e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51400%3A%20n%2Fa&amp;severity=medium&amp;id=687e91f7a83201eaac12be98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51398-na-8c52cec6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51398%3A%20n%2Fa&amp;severity=medium&amp;id=687e8e75a83201eaac12a8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51397-na-04c99d20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51397%3A%20n%2Fa&amp;severity=medium&amp;id=687e8e75a83201eaac12a8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51396-na-2bd721b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51396%3A%20n%2Fa&amp;severity=medium&amp;id=687e8e75a83201eaac12a8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36846-na-8ac1f689</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36846%3A%20n%2Fa&amp;severity=critical&amp;id=687e8063a83201eaac1235dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36845-na-10a01973</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36845%3A%20n%2Fa&amp;severity=high&amp;id=687e8063a83201eaac1235d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44654-na-8a97698a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44654%3A%20n%2Fa&amp;severity=critical&amp;id=687e7cdfa83201eaac12163a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44652-na-6dad1efd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44652%3A%20n%2Fa&amp;severity=high&amp;id=687e795da83201eaac11f321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44653-na-35d49208</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44653%3A%20n%2Fa&amp;severity=high&amp;id=687e75daa83201eaac11de97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43720-na-6f0d7d89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43720%3A%20n%2Fa&amp;severity=medium&amp;id=687e75daa83201eaac11de92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44649-na-681b55f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44649%3A%20n%2Fa&amp;severity=high&amp;id=687e7252a83201eaac11c506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52374-na-f4af7ff3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52374%3A%20n%2Fa&amp;severity=medium&amp;id=687e67c6a83201eaac117510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52373-na-e5505ca0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52373%3A%20n%2Fa&amp;severity=medium&amp;id=687e67c6a83201eaac11750b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52372-na-ef5a0eb4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52372%3A%20n%2Fa&amp;severity=medium&amp;id=687e67c6a83201eaac117506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44655-na-32db8bc1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44655%3A%20n%2Fa&amp;severity=critical&amp;id=687e6442a83201eaac116126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44657-na-d10a4abc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44657%3A%20n%2Fa&amp;severity=low&amp;id=687e60bea83201eaac114e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44651-na-550ce09a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44651%3A%20n%2Fa&amp;severity=high&amp;id=687e60bea83201eaac114e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44647-na-b2ad09de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44647%3A%20n%2Fa&amp;severity=high&amp;id=687e60bea83201eaac114e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44658-na-a86b4a3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44658%3A%20n%2Fa&amp;severity=critical&amp;id=687e60bea83201eaac114e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44650-na-db18554a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44650%3A%20n%2Fa&amp;severity=high&amp;id=687e5d5aa83201eaac112432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43977-na-173e65c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43977%3A%20n%2Fa&amp;severity=medium&amp;id=687e59b5a83201eaac110fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43976-na-c481b550</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43976%3A%20n%2Fa&amp;severity=medium&amp;id=687e59b5a83201eaac110ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46119-na-76e6d0cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46119%3A%20n%2Fa&amp;severity=medium&amp;id=687e52aea83201eaac106039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46118-na-65a338d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46118%3A%20n%2Fa&amp;severity=medium&amp;id=687e52aea83201eaac106034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46117-na-8c279b1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46117%3A%20n%2Fa&amp;severity=critical&amp;id=687e52aea83201eaac10602f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46116-na-9ae758ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46116%3A%20n%2Fa&amp;severity=high&amp;id=687e52aea83201eaac10602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46123-na-26b13838</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46123%3A%20n%2Fa&amp;severity=high&amp;id=687e52aea83201eaac106025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46122-na-437d7aff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46122%3A%20n%2Fa&amp;severity=critical&amp;id=687e52aea83201eaac106020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46121-na-76018490</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46121%3A%20n%2Fa&amp;severity=critical&amp;id=687e52aea83201eaac10601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46120-na-b2b898e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46120%3A%20n%2Fa&amp;severity=critical&amp;id=687e52aea83201eaac106016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7913-buffer-overflow-in-totolink-t6-407083d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7913%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=687d7fbea83201eaac054889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7912-buffer-overflow-in-totolink-t6-06a37e0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7912%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=687d78b6a83201eaac052fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7911-stack-based-buffer-overflow-in-d-lin-dee35d9a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7911%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=687d71aea83201eaac051b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53771-cwe-22-improper-limitation-of-a-pat-d5dfe54f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53771%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=687d6e36a83201eaac051192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7910-stack-based-buffer-overflow-in-d-lin-65d7ede2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7910%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=687d6aa6a83201eaac050721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7909-stack-based-buffer-overflow-in-d-lin-6ceb64c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7909%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=687d639ea83201eaac04f353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7908-stack-based-buffer-overflow-in-d-lin-9e9b1d9a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7908%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=687d5c96a83201eaac04e39c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7907-use-of-default-credentials-in-yangzo-0ca397e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7907%3A%20Use%20of%20Default%20Credentials%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=687d558ea83201eaac0495d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-interpreter-open-ports-36cb9a8a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20Interpreter%20Open%20Ports&amp;severity=medium&amp;id=687d4e88a83201eaac04527c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/path-traversal-in-vim-tar-archive-cve-2025-53905-d56a0a33</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Path%20traversal%20in%20vim%20(tar%20archive)%20CVE-2025-53905&amp;severity=high&amp;id=687d4b04a83201eaac0440f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/path-traversal-in-vim-zip-archive-cve-2025-53906-66594d58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Path%20traversal%20in%20vim%20(zip%20archive)%20CVE-2025-53906&amp;severity=high&amp;id=687d4b04a83201eaac0440fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tips-on-detecting-suspicious-sign-in-activity-from-d1ce2c60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tips%20on%20detecting%20suspicious%20sign%20in%20activity%20from%20phishing%20attack%20(AiTM)!%20(Using%20Entra%20ID%20%26%20M365%20as%20example)&amp;severity=low&amp;id=687d4780a83201eaac0438f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7906-unrestricted-upload-in-yangzongzhuan-1486dfb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7906%3A%20Unrestricted%20Upload%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=687d477ea83201eaac0438e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-loyalty-card-is-a-liability-lessons-from-the--ccd8cd75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Loyalty%20Card%20is%20a%20Liability%3A%20Lessons%20from%20the%20Co-op%20Attack&amp;severity=medium&amp;id=687d4077a83201eaac0424f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7905-sql-injection-in-itsourcecode-insura-885eac68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7905%3A%20SQL%20Injection%20in%20itsourcecode%20Insurance%20Management%20System&amp;severity=medium&amp;id=687d4076a83201eaac0424db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7904-sql-injection-in-itsourcecode-insura-f0da2d13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7904%3A%20SQL%20Injection%20in%20itsourcecode%20Insurance%20Management%20System&amp;severity=medium&amp;id=687d2457a83201eaac03c8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/squidloader-malware-campaign-hits-hong-kong-financ-992fd7a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SquidLoader%20Malware%20Campaign%20Hits%20Hong%20Kong%20Financial%20Firms&amp;severity=medium&amp;id=687d1d4da83201eaac03a3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7903-improper-restriction-of-rendered-ui--83a2e539</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7903%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=687d1d5fa83201eaac03a422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7902-cross-site-scripting-in-yangzongzhua-094a73cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7902%3A%20Cross%20Site%20Scripting%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=687d1647a83201eaac03681c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7901-cross-site-scripting-in-yangzongzhua-a4ac7f02</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7901%3A%20Cross%20Site%20Scripting%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=687d0f3fa83201eaac034b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7898-unrestricted-upload-in-codecanyon-id-60472d8e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7898%3A%20Unrestricted%20Upload%20in%20Codecanyon%20iDentSoft&amp;severity=medium&amp;id=687d0bbba83201eaac03072c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-injected-into-5-npm-packages-after-maintai-b1f82177</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Injected%20into%205%20npm%20Packages%20After%20Maintainer%20Tokens%20Stolen%20in%20Phishing%20Attack&amp;severity=high&amp;id=687d0835a83201eaac02fba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-unpatched-sharepoint-zero-day-actively-ex-504c98ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Unpatched%20SharePoint%20Zero-Day%20Actively%20Exploited%2C%20Breaches%2075%2B%20Company%20Servers&amp;severity=critical&amp;id=687d0835a83201eaac02fb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-fortinet-fortiweb-flaw-to-its-known-e-4b453b96</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Fortinet%20FortiWeb%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=687d0835a83201eaac02fbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7897-missing-authentication-in-harry0703--690bb272</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7897%3A%20Missing%20Authentication%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=687d085ca83201eaac02fc4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7896-path-traversal-in-harry0703-moneypri-cf3ffc62</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7896%3A%20Path%20Traversal%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=687d04b1a83201eaac02eded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46385-cwe-918-server-side-request-forgery-2259e85c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46385%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Emby%20Windows&amp;severity=high&amp;id=687d04b1a83201eaac02edea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46384-cwe-434-unrestricted-upload-of-file-663fa995</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46384%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Emby%20Windows&amp;severity=high&amp;id=687d04b1a83201eaac02ede7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46383-cwe-79-improper-neutralization-of-i-b2f8ac5b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Emby%20Windows&amp;severity=medium&amp;id=687d012da83201eaac02df46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7895-unrestricted-upload-in-harry0703-mon-3785f7fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7895%3A%20Unrestricted%20Upload%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=687d012da83201eaac02df49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46382-cwe-200-exposure-of-sensitive-infor-3c978e36</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46382%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20CyberArk%20IDP&amp;severity=medium&amp;id=687d012da83201eaac02df43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7894-sql-injection-in-onyx-4534c243</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7894%3A%20SQL%20Injection%20in%20Onyx&amp;severity=medium&amp;id=687cfa26a83201eaac02c79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copy-paste-pitfalls-revealing-the-applocker-bypass-4e999d61</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Copy-Paste%20Pitfalls%3A%20Revealing%20the%20AppLocker%20Bypass%20Risks%20in%20The%20Suggested%20Block-list%20Policy&amp;severity=medium&amp;id=687cf6a2a83201eaac02ba84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7893-improper-export-of-android-applicati-8341d6b2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7893%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Foresight%20News%20App&amp;severity=medium&amp;id=687cf6a1a83201eaac02ba78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-groups-launder-580m-in-india-using-fake-ap-f798b95f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Groups%20Launder%20%24580M%20in%20India%20Using%20Fake%20Apps%20and%20Mule%20Accounts&amp;severity=medium&amp;id=687cef97a83201eaac02937d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7892-improper-export-of-android-applicati-f7da4b34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7892%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20IDnow%20App&amp;severity=medium&amp;id=687cefa2a83201eaac029405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7891-improper-export-of-android-applicati-5a8db4fb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7891%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20InstantBits%20Web%20Video%20Cast%20App&amp;severity=medium&amp;id=687cec15a83201eaac028ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7890-improper-export-of-android-applicati-1ddf52f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7890%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Dunamu%20StockPlus%20App&amp;severity=medium&amp;id=687ce891a83201eaac0277de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7889-improper-export-of-android-applicati-519d1afc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7889%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20CallApp%20Caller%20ID%20App&amp;severity=medium&amp;id=687ce891a83201eaac0277d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7888-sql-injection-in-tduckcloud-tduck-pl-0f47e128</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7888%3A%20SQL%20Injection%20in%20TDuckCloud%20tduck-platform&amp;severity=medium&amp;id=687cde05a83201eaac025eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7887-cross-site-scripting-in-zavy86-wikid-500ba14e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7887%3A%20Cross%20Site%20Scripting%20in%20Zavy86%20WikiDocs&amp;severity=medium&amp;id=687cd6fea83201eaac023924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7886-sql-injection-in-pmticket-project-ma-5177d1de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7886%3A%20SQL%20Injection%20in%20pmTicket%20Project-Management-Software&amp;severity=medium&amp;id=687cd6fea83201eaac02392c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7885-cross-site-scripting-in-huashengdun--6f19c25f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7885%3A%20Cross%20Site%20Scripting%20in%20Huashengdun%20WebSSH&amp;severity=medium&amp;id=687cd37aa83201eaac022c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7884-insufficient-verification-of-data-au-7e790c43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7884%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Eluktronics%20Control%20Center&amp;severity=medium&amp;id=687ccffaa83201eaac0223e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7883-command-injection-in-eluktronics-con-8030c538</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7883%3A%20Command%20Injection%20in%20Eluktronics%20Control%20Center&amp;severity=high&amp;id=687ccc72a83201eaac021a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7882-improper-restriction-of-excessive-au-e924f814</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7882%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Mercusys%20MW301R&amp;severity=low&amp;id=687cc56aa83201eaac01f2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7881-weak-password-recovery-in-mercusys-m-1cb5d413</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7881%3A%20Weak%20Password%20Recovery%20in%20Mercusys%20MW301R&amp;severity=medium&amp;id=687cbe62a83201eaac01e1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/radiology-associates-of-richmond-data-breach-impac-535db01f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Radiology%20Associates%20of%20Richmond%20data%20breach%20impacts%201.4M%20people&amp;severity=high&amp;id=687cbadca83201eaac01cf39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7880-unrestricted-upload-in-metasoft-meta-6d19fa8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7880%3A%20Unrestricted%20Upload%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687cb75aa83201eaac01c6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7879-unrestricted-upload-in-metasoft-meta-2dddc3f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7879%3A%20Unrestricted%20Upload%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687cb3d6a83201eaac01bf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7878-unrestricted-upload-in-metasoft-meta-f3e93479</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7878%3A%20Unrestricted%20Upload%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687cacd0a83201eaac01ab53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legless-ipv6-penetration-testing-real-attacks-via--70771ad7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Legless%3A%20IPv6%20Penetration%20Testing%20%E2%80%93%20Real%20Attacks%20via%20RA%2C%20RDNSS%2C%20and%20DHCPv6%20Spoofing&amp;severity=medium&amp;id=687ca5c9a83201eaac018805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7877-unrestricted-upload-in-metasoft-meta-79ed3d95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7877%3A%20Unrestricted%20Upload%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687ca5c8a83201eaac0187fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7876-deserialization-in-metasoft-metacrm-6283c364</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7876%3A%20Deserialization%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687d5258a83201eaac048f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7875-improper-authentication-in-metasoft--7e2e6e84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7875%3A%20Improper%20Authentication%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687c9b3ca83201eaac016794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7874-information-disclosure-in-metasoft-m-9ab64bbf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7874%3A%20Information%20Disclosure%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687c97b8a83201eaac015f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7873-sql-injection-in-metasoft-metacrm-f0a18833</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7873%3A%20SQL%20Injection%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687c9435a83201eaac01545e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7872-cross-site-scripting-in-portabilis-i-d1ac9ae0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7872%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=687c90b1a83201eaac014c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7871-cross-site-scripting-in-portabilis-i-cc9c5eba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7871%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=687c89a8a83201eaac0133f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7870-cross-site-scripting-in-portabilis-i-4367f702</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7870%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=687c82a0a83201eaac0120cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7869-cross-site-scripting-in-portabilis-i-0c2d0e3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7869%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=687c7b98a83201eaac010a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7868-cross-site-scripting-in-portabilis-i-cae7d19c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7868%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=687c7490a83201eaac00f915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7867-cross-site-scripting-in-portabilis-i-a244967d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7867%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=687c7115a83201eaac00e916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7866-cross-site-scripting-in-portabilis-i-480ac9ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7866%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=687c6a04a83201eaac00d1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7865-cross-site-scripting-in-thinkgem-jee-5b89fe82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7865%3A%20Cross%20Site%20Scripting%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=687c62fca83201eaac00bf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7864-unrestricted-upload-in-thinkgem-jees-8137d5f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7864%3A%20Unrestricted%20Upload%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=687c5870a83201eaac007e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7863-open-redirect-in-thinkgem-jeesite-10e31af1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7863%3A%20Open%20Redirect%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=687c5870a83201eaac007e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7862-missing-authentication-in-totolink-t-1cd94c9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7862%3A%20Missing%20Authentication%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=687c5870a83201eaac007e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53770-cwe-502-deserialization-of-untruste-5926caaa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53770%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=critical&amp;id=687c4361a83201eaac002e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7861-sql-injection-in-code-projects-churc-cb81167c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7861%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687c4361a83201eaac002e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7860-sql-injection-in-code-projects-churc-89009a73</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7860%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687c3c51a83201eaac0015b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7859-sql-injection-in-code-projects-churc-3c936e0d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7859%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687c3c51a83201eaac0015ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-20-80df855b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-20&amp;severity=medium&amp;id=687d86bda83201eaac055fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54319-cwe-532-insertion-of-sensitive-info-8aa43b93</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54319%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Westermo%20WeOS&amp;severity=medium&amp;id=687d5912a83201eaac049d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47917-cwe-416-use-after-free-in-mbed-mbed-988e278c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47917%3A%20CWE-416%20Use%20After%20Free%20in%20Mbed%20mbedtls&amp;severity=high&amp;id=687d396ea83201eaac04070d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49087-cwe-385-covert-timing-channel-in-mb-cca547e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49087%3A%20CWE-385%20Covert%20Timing%20Channel%20in%20Mbed%20mbedtls&amp;severity=medium&amp;id=687d35eaa83201eaac03f7a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48965-cwe-696-incorrect-behavior-order-in-64610afc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48965%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20Mbed%20mbedtls&amp;severity=medium&amp;id=687d2ee3a83201eaac03e1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54314-cwe-78-improper-neutralization-of-s-86da8d7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54314%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20rubyonrails%20Thor&amp;severity=low&amp;id=687c5870a83201eaac007e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7858-cross-site-scripting-in-phpgurukul-a-661276ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7858%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687c31c4a83201eaacfff306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7857-cross-site-scripting-in-phpgurukul-a-14242e4d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7857%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687c23b5a83201eaacffcf9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7856-cross-site-scripting-in-phpgurukul-a-57199ab6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7856%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687c0e9da83201eaacff8e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7855-stack-based-buffer-overflow-in-tenda-018584a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7855%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687c0b19a83201eaacff80da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7854-stack-based-buffer-overflow-in-tenda-3003935a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7854%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687c0411a83201eaacff392d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7853-stack-based-buffer-overflow-in-tenda-5744c250</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7853%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687bf983a83201eaacfeeb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7840-cross-site-scripting-in-campcodes-on-57d36577</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7840%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=687be0e9a83201eaacfe8872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7838-sql-injection-in-campcodes-online-mo-7dd47f9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7838%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=687bd65da83201eaacfe5c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7837-buffer-overflow-in-totolink-t6-47ae9058</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7837%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=687bd2d9a83201eaacfe4b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7836-command-injection-in-d-link-dir-816l-aede67cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7836%3A%20Command%20Injection%20in%20D-Link%20DIR-816L&amp;severity=medium&amp;id=687bcf55a83201eaacfe3cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7834-cross-site-request-forgery-in-phpgur-2584cc85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7834%3A%20Cross-Site%20Request%20Forgery%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=687bc4caa83201eaacfe203e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7833-sql-injection-in-code-projects-churc-0adb6b4c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7833%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687bc146a83201eaacfe0a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7832-sql-injection-in-code-projects-churc-1c75bc02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7832%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687bba43a83201eaacfdeef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7831-sql-injection-in-code-projects-churc-efd498da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7831%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687bb6baa83201eaacfdb770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7830-sql-injection-in-code-projects-churc-b240fbad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7830%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687bafb2a83201eaacfd972f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7829-sql-injection-in-code-projects-churc-f20287bc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7829%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687b9e1ea83201eaacfd2240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7824-xml-external-entity-reference-in-jin-45cea991</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7824%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=687b9a9aa83201eaacfd0ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7823-xml-external-entity-reference-in-jin-033b659c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7823%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=687b9719a83201eaacfd01ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7819-cross-site-scripting-in-phpgurukul-a-fa545cf5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7819%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687b900ea83201eaacfcebd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7818-cross-site-scripting-in-phpgurukul-a-d33a386e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7818%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687b8c8aa83201eaacfcde4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7817-cross-site-scripting-in-phpgurukul-a-61fdb8ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7817%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687b8582a83201eaacfcbe2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7816-cross-site-scripting-in-phpgurukul-a-97933abb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7816%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687b7773a83201eaacfc78c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-alcohol-retailer-winelab-closes-stores-aft-f3b6cd88</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20alcohol%20retailer%20WineLab%20closes%20stores%20after%20ransomware%20attack&amp;severity=high&amp;id=687b706aa83201eaacfc5369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-zero-days-exploited-to-drop-mdifyloader-and-adc5d978</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Zero-Days%20Exploited%20to%20Drop%20MDifyLoader%20and%20Launch%20In-Memory%20Cobalt%20Strike%20Attacks&amp;severity=high&amp;id=687b706aa83201eaacfc5365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/authorities-released-free-decryptor-for-phobos-and-af644a69</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Authorities%20released%20free%20decryptor%20for%20Phobos%20and%208base%20ransomware&amp;severity=medium&amp;id=687b6ce5a83201eaacfc42e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arch-linux-pulls-aur-packages-that-installed-chaos-8ef5ccd1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arch%20Linux%20pulls%20AUR%20packages%20that%20installed%20Chaos%20RAT%20malware&amp;severity=high&amp;id=687b6ce5a83201eaacfc42e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-crushftp-zero-day-exploited-in-attacks-to-hija-c8028696</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20CrushFTP%20zero-day%20exploited%20in%20attacks%20to%20hijack%20servers&amp;severity=critical&amp;id=687b6ce5a83201eaacfc42e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7815-cross-site-scripting-in-phpgurukul-a-b2aeef3a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7815%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687b6962a83201eaacfc2802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6997-cwe-79-improper-neutralization-of-in-2933b6b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeREX%20ThemeREX%20Addons&amp;severity=medium&amp;id=687b5b52a83201eaacfba692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6720-cwe-862-missing-authorization-in-ban-dd34e35e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6720%3A%20CWE-862%20Missing%20Authorization%20in%20bandido%20MORKVA%20Vchasno%20Kasa%20Integration&amp;severity=medium&amp;id=687b3122a83201eaacfa3af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6721-cwe-862-missing-authorization-in-ban-396489c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6721%3A%20CWE-862%20Missing%20Authorization%20in%20bandido%20MORKVA%20Vchasno%20Kasa%20Integration&amp;severity=medium&amp;id=687b3122a83201eaacfa3af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29757-cwe-863-incorrect-authorization-in--2ccb76fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29757%3A%20CWE-863%20Incorrect%20Authorization%20in%20Growatt%20https%3A%2F%2Foss.growatt.com&amp;severity=critical&amp;id=687b2d9ea83201eaacfa23a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7697-cwe-502-deserialization-of-untrusted-0842daa0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7697%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20crmperks%20Integration%20for%20Google%20Sheets%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Ninja%20Forms&amp;severity=critical&amp;id=687b1f8ea83201eaacf9c494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7696-cwe-502-deserialization-of-untrusted-1a8cade9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7696%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20crmperks%20Integration%20for%20Pipedrive%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Ninja%20Forms&amp;severity=critical&amp;id=687b1f8ea83201eaacf9c48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7669-cwe-352-cross-site-request-forgery-c-e5ce98b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7669%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20avishika%20Avishi%20WP%20PayPal%20Payment%20Button&amp;severity=medium&amp;id=687b036ea83201eaacf8db4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7653-cwe-79-improper-neutralization-of-in-5977c0ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7653%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vloo%20EPay.bg%20Payments&amp;severity=medium&amp;id=687b036ea83201eaacf8db3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7658-cwe-79-improper-neutralization-of-in-acb9a82f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7658%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codents%20Temporarily%20Hidden%20Content&amp;severity=medium&amp;id=687b036ea83201eaacf8db43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7661-cwe-79-improper-neutralization-of-in-91da8e9e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7661%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maxomatos%20Partnersk%C3%BD%20syst%C3%A9m%20Martinus&amp;severity=medium&amp;id=687b036ea83201eaacf8db48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7655-cwe-79-improper-neutralization-of-in-177ff9c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7655%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tkrivickas%20Live%20Stream%20Badger&amp;severity=medium&amp;id=687b036ea83201eaacf8db3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-19-c9a8c925</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-19&amp;severity=medium&amp;id=687c353da83201eaacfff7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54313-cwe-506-embedded-malicious-code-in--797dbbb3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54313%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20prettier%20eslint-config-prettier&amp;severity=high&amp;id=687bcf55a83201eaacfe3cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52924-cwe-89-improper-neutralization-of-s-6be6d612</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52924%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20One%20Identity%20OneLogin&amp;severity=medium&amp;id=687b036ea83201eaacf8db36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27210-vulnerability-in-nodejs-node-098966ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27210%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=687ad236a83201eaacf76194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27209-vulnerability-in-nodejs-node-47bd4ec1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27209%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=687ad236a83201eaacf76191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7814-sql-injection-in-code-projects-food--2b6031a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7814%3A%20SQL%20Injection%20in%20code-projects%20Food%20Ordering%20Review%20System&amp;severity=medium&amp;id=687ac430a83201eaacf71464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7807-stack-based-buffer-overflow-in-tenda-0113a544</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7807%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687ab616a83201eaacf6a16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7806-stack-based-buffer-overflow-in-tenda-4e27971a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7806%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687ab292a83201eaacf699b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7805-stack-based-buffer-overflow-in-tenda-7558b43d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7805%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687aa483a83201eaacf5fc2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7803-cross-site-scripting-in-descreekert--dfc722ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7803%3A%20Cross%20Site%20Scripting%20in%20descreekert%20wx-discuz&amp;severity=medium&amp;id=687aaf8da83201eaacf68f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7802-cross-site-scripting-in-phpgurukul-c-22049360</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7802%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=687a9d7ba83201eaacf5caaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33014-cwe-1022-use-of-web-link-to-untrust-e9586175</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33014%3A%20CWE-1022%20Use%20of%20Web%20Link%20to%20Untrusted%20Target%20with%20window.opener%20Access%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=687a99f8a83201eaacf59725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7801-sql-injection-in-bosssoft-crm-6d4387f9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7801%3A%20SQL%20Injection%20in%20BossSoft%20CRM&amp;severity=medium&amp;id=687a99f8a83201eaacf5972d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7800-cross-site-scripting-in-cgpandey-hot-e70e49a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7800%3A%20Cross%20Site%20Scripting%20in%20cgpandey%20hotelmis&amp;severity=medium&amp;id=687a9673a83201eaacf58eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anne-arundel-dermatology-data-breach-impacts-19-mi-b03cf8dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anne%20Arundel%20Dermatology%20data%20breach%20impacts%201.9%20million%20people&amp;severity=high&amp;id=687a92eea83201eaacf578ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-scanning-for-telemessage-signal-clone-flaw-f573c36a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20scanning%20for%20TeleMessage%20Signal%20clone%20flaw%20exposing%20passwords&amp;severity=high&amp;id=687a8f69a83201eaacf571b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7798-sql-injection-in-beijing-shenzhou-sh-8eb9ca48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7798%3A%20SQL%20Injection%20in%20Beijing%20Shenzhou%20Shihan%20Technology%20Multimedia%20Integrated%20Business%20Display%20System&amp;severity=medium&amp;id=687a9308a83201eaacf57929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7797-null-pointer-dereference-in-gpac-f1082258</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7797%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=687a8be6a83201eaacf563ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7796-stack-based-buffer-overflow-in-tenda-e64b498f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7796%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687a8862a83201eaacf5597b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poisonseed-hackers-tricking-users-into-bypassing-f-aeeee882</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PoisonSeed%20Hackers%20Tricking%20Users%20Into%20Bypassing%20FIDO%20Keys%20With%20QR%20Codes&amp;severity=medium&amp;id=687a84dda83201eaacf54efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7795-stack-based-buffer-overflow-in-tenda-998da2c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7795%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687a84eba83201eaacf54f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53901-cwe-672-operation-on-a-resource-aft-bfefe74d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53901%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=687a84eba83201eaacf54f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53762-cwe-183-permissive-list-of-allowed--6e04e0a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53762%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=687a8163a83201eaacf547bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47158-cwe-302-authentication-bypass-by-as-ebe1715f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47158%3A%20CWE-302%3A%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Microsoft%20Azure%20DevOps&amp;severity=critical&amp;id=687a8163a83201eaacf547aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47995-cwe-1390-weak-authentication-in-mic-db9561ef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47995%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Azure%20Machine%20Learning&amp;severity=medium&amp;id=687a8163a83201eaacf547ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49746-cwe-285-improper-authorization-in-m-bb846408</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49746%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Machine%20Learning&amp;severity=critical&amp;id=687a8163a83201eaacf547b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49747-cwe-862-missing-authorization-in-mi-f7184950</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49747%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Azure%20Machine%20Learning&amp;severity=critical&amp;id=687a8163a83201eaacf547b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7794-stack-based-buffer-overflow-in-tenda-07d91aab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7794%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687a8163a83201eaacf547c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7783-cwe-330-use-of-insufficiently-random-ec36637b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7783%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values&amp;severity=critical&amp;id=687a7a52a83201eaacf52a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7793-stack-based-buffer-overflow-in-tenda-b109cbd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7793%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687a7a52a83201eaacf52a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7792-stack-based-buffer-overflow-in-tenda-075b040b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7792%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687a76cea83201eaacf510fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54079-cwe-89-improper-neutralization-of-s-a548a286</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54079%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=687a6fc6a83201eaacf4f8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54078-cwe-79-improper-neutralization-of-i-58d0f345</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54078%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=687a6fc6a83201eaacf4f8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54077-cwe-79-improper-neutralization-of-i-edf7c110</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54077%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=687a6fc6a83201eaacf4f89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54076-cwe-79-improper-neutralization-of-i-109163be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54076%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=687a6fc6a83201eaacf4f8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54075-cwe-79-improper-neutralization-of-i-f53a4b0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54075%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nuxt-modules%20mdc&amp;severity=high&amp;id=687a6fc6a83201eaacf4f8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54073-cwe-77-improper-neutralization-of-s-f82ee6a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54073%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20sammcj%20mcp-package-docs&amp;severity=high&amp;id=687a6fc6a83201eaacf4f8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7791-cross-site-scripting-in-phpgurukul-o-cffb84f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7791%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Online%20Security%20Guards%20Hiring%20System&amp;severity=medium&amp;id=687a6fc6a83201eaacf4f8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54059-cwe-276-incorrect-default-permissio-7d358884</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54059%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=687a6c42a83201eaacf4a483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53945-cwe-276-incorrect-default-permissio-358fa737</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53945%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20chainguard-dev%20apko&amp;severity=high&amp;id=687a6c42a83201eaacf4a47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53888-cwe-120-buffer-copy-without-checkin-6446b3a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53888%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20RIOT-OS%20RIOT&amp;severity=medium&amp;id=687a6c42a83201eaacf4a48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7790-stack-based-buffer-overflow-in-d-lin-6a24a689</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7790%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=687a6c42a83201eaacf4a491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7789-password-hash-with-insufficient-comp-0f36e71e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7789%3A%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=687a68bea83201eaacf49364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46732-cwe-285-improper-authorization-in-o-6d363786</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46732%3A%20CWE-285%3A%20Improper%20Authorization%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=687a653aa83201eaacf48a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7788-os-command-injection-in-xuxueli-xxl--fb0fce04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7788%3A%20OS%20Command%20Injection%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=687a653aa83201eaacf48a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7787-server-side-request-forgery-in-xuxue-3f862f4d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7787%3A%20Server-Side%20Request%20Forgery%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=687a5aaea83201eaacf443e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7784-improper-privilege-management-in-red-c3c0b706</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7784%3A%20Improper%20Privilege%20Management&amp;severity=medium&amp;id=687a53a7a83201eaacf41efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7786-cross-site-scripting-in-gnuboard-g6-fac9a0f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7786%3A%20Cross%20Site%20Scripting%20in%20Gnuboard%20g6&amp;severity=medium&amp;id=687a4c9fa83201eaacf3eeb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-cryptojacker-masquerades-as-banking-app-to-694a593e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Cryptojacker%20Masquerades%20as%20Banking%20App%20to%20Mine%20Cryptocurrency%20on%20Locked%20Devices&amp;severity=medium&amp;id=687aaf02a83201eaacf67532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lamehug-first-ai-powered-malware-linked-to-russias-bca2b18b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LameHug%3A%20first%20AI-Powered%20malware%20linked%20to%20Russia%E2%80%99s%20APT28&amp;severity=medium&amp;id=687a3b0aa83201eaacf34635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7785-open-redirect-in-thinkgem-jeesite-cb7970cb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7785%3A%20Open%20Redirect%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=687a3787a83201eaacf33b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/years-long-linux-cryptominer-spotted-using-legit-s-1c764c11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Years%20Long%20Linux%20Cryptominer%20Spotted%20Using%20Legit%20Sites%20to%20Spread%20Malware&amp;severity=medium&amp;id=687a2cfaa83201eaacf2e768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49484-cwe-89-improper-neutralization-of-s-4e2ba8bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49484%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20joomsky.com%20JS%20Jobs%20component%20for%20Joomla&amp;severity=high&amp;id=687a1b67a83201eaacf1f460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50126-cwe-79-improper-neutralization-of-i-d49b9a91</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50126%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSBlog!%20component%20for%20Joomla&amp;severity=medium&amp;id=687a1b67a83201eaacf1f473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50058-cwe-79-improper-neutralization-of-i-cf1917d8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSDirectory!%20component%20for%20Joomla&amp;severity=medium&amp;id=687a1b67a83201eaacf1f470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50057-cwe-400-uncontrolled-resource-consu-0f973c61</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50057%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20rsjoomla.com%20RSFiles!%20component%20for%20Joomla&amp;severity=medium&amp;id=687a1b67a83201eaacf1f46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50056-cwe-79-improper-neutralization-of-i-a3c8b1d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSMail!%20component%20for%20Joomla&amp;severity=medium&amp;id=687a1b67a83201eaacf1f46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49485-cwe-89-improper-neutralization-of-s-9a8f4417</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49485%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20balbooa.com%20Balbooa%20Forms%20component%20for%20Joomla&amp;severity=high&amp;id=687a1b67a83201eaacf1f464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49486-cwe-79-improper-neutralization-of-i-7224e7b6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20balbooa.com%20Balbooa%20Gallery%20component%20for%20Joomla&amp;severity=high&amp;id=687a1b67a83201eaacf1f467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2425-cwe-367-time-of-check-time-of-use-to-249321c4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2425%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20NOD32%20Antivirus&amp;severity=medium&amp;id=687a17e3a83201eaacf1bf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-a-teams-call-to-a-ransomware-threat-matanbuch-e60b9b22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20a%20Teams%20Call%20to%20a%20Ransomware%20Threat%3A%20Matanbuchus%203.0%20MaaS%20Levels%20Up&amp;severity=medium&amp;id=687a0dd5a83201eaacf1730e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sues-to-disrupt-badbox-20-botnet-infecting--4e53b0f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20sues%20to%20disrupt%20BadBox%202.0%20botnet%20infecting%2010%20million%20devices&amp;severity=high&amp;id=687a0d56a83201eaacf16a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-voice-calls-abused-to-push-matanbu-4e4b5e76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20voice%20calls%20abused%20to%20push%20Matanbuchus%20malware&amp;severity=high&amp;id=687a0d56a83201eaacf16a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-fixes-four-esxi-zero-day-bugs-exploited-at--07ce74ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20fixes%20four%20ESXi%20zero-day%20bugs%20exploited%20at%20Pwn2Own%20Berlin&amp;severity=critical&amp;id=687a0d56a83201eaacf16a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrix-bleed-2-exploited-weeks-before-pocs-as-citr-5f5fdf14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Citrix%20Bleed%202%20exploited%20weeks%20before%20PoCs%20as%20Citrix%20denied%20attacks&amp;severity=high&amp;id=687a0d56a83201eaacf16a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poor-passwords-tattle-on-ai-hiring-bot-maker-parad-1db44acc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Poor%20Passwords%20Tattle%20on%20AI%20Hiring%20Bot%20Maker%20Paradox.ai&amp;severity=high&amp;id=687a0d56a83201eaacf16a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7444-cwe-288-authentication-bypass-using--4768c321</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7444%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20LoginPress%20LoginPress%20Pro&amp;severity=critical&amp;id=687a09d3a83201eaacf15579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27779-improper-access-control-in-fortinet-d15cb395</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27779%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a963d0ff220b9507e1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-githubs-security-crisis-39m-secret-leaks--1220fcb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BAnalysis%5D%20GitHub&apos;s%20Security%20Crisis%2039M%20Secret%20Leaks%2C%20Amadey%20MaaS%20Campaign%20Exploiting%20Repository%20Trust%2C%20and%20Supply%20Chain%20Attack%20Vectors&amp;severity=low&amp;id=6879ff4ba83201eaacf0dcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26855-cwe-89-improper-neutralization-of-s-734541a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26855%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20joomcar.net%20Articles%20Calendar%20extension%20for%20Joomla&amp;severity=critical&amp;id=6879fbc5a83201eaacf0bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26854-cwe-89-improper-neutralization-of-s-1ab190ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26854%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20joomcar.net%20Articles%20Good%20Search%20extension%20for%20Joomla&amp;severity=critical&amp;id=6879fbc5a83201eaacf0babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kawa4096s-ransomware-tide-rising-threat-with-borro-02151326</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KAWA4096%E2%80%99s%20Ransomware%20Tide%3A%20Rising%20Threat%20With%20Borrowed%20Styles&amp;severity=medium&amp;id=687a0dd5a83201eaacf1733d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-mobile-forensic-tooling-discovered-bd35bbca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Mobile%20Forensic%20Tooling%20Discovered&amp;severity=medium&amp;id=687a09d2a83201eaacf15551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-malware-delivery-domains-part-iii-6ad88467</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Malware%20Delivery%20Domains%3A%20Part%20III&amp;severity=medium&amp;id=6879fbc4a83201eaacf0b62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-identified-in-attacks-exploiting-ivanti-co-7ef05b0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Identified%20in%20Attacks%20Exploiting%20Ivanti%20Connect%20Secure%20Vulnerabilities&amp;severity=medium&amp;id=687a0dd5a83201eaacf17323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7438-cwe-434-unrestricted-upload-of-file--5dc2a873</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7438%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=high&amp;id=6879f137a83201eaacf066fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7772-cwe-862-missing-authorization-in-mal-2dffc3b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7772%3A%20CWE-862%20Missing%20Authorization%20in%20malcure%20Malcure%20Malware%20Shield%20%E2%80%94%20Removal%2C%20Repair%2C%20Monitor&amp;severity=medium&amp;id=6879f137a83201eaacf06700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5811-cwe-862-missing-authorization-in-mil-e635eff7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5811%3A%20CWE-862%20Missing%20Authorization%20in%20milanmk%20Listly%3A%20Listicles%20For%20WordPress&amp;severity=medium&amp;id=6879dc20a83201eaacef69f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5800-cwe-79-improper-neutralization-of-in-bcfa51db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20juiiee8487%20Testimonial%20Post%20type&amp;severity=medium&amp;id=6879dc20a83201eaacef69f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5752-cwe-79-improper-neutralization-of-in-a855a4f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Vertical%20scroll%20image%20slideshow%20gallery&amp;severity=medium&amp;id=6879dc20a83201eaacef69e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6717-cwe-89-improper-neutralization-of-sp-dcb3bd0a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6717%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20b1accounting%20Site.pro%20for%20WooCommerce&amp;severity=medium&amp;id=6879dc20a83201eaacef6a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5767-cwe-79-improper-neutralization-of-in-106dc0d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwham%20Crowdfunding%20for%20WooCommerce&amp;severity=medium&amp;id=6879dc20a83201eaacef69ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6719-cwe-79-improper-neutralization-of-in-7008e494</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6719%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vladimirs%20Terms%20descriptions&amp;severity=medium&amp;id=6879dc20a83201eaacef6a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6726-cwe-862-missing-authorization-in-kra-e793bad5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6726%3A%20CWE-862%20Missing%20Authorization%20in%20krasenslavov%20Block%20Editor%20Gallery%20Slider%20for%20WordPress%20%E2%80%93%20Image%20Slider%2C%20Gallery%20Carousel%20%26%20Lightbox%20Plugin&amp;severity=medium&amp;id=6879dc21a83201eaacef6a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7643-cwe-22-improper-limitation-of-a-path-7ccc832e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7643%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aaroncampbell%20Attachment%20Manager&amp;severity=critical&amp;id=6879dc21a83201eaacef6a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5754-cwe-79-improper-neutralization-of-in-d095e966</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bbc000tommy%20Useful%20Tab%20Block%20%E2%80%93%20Responsive%20%26%20AMP-Compatible&amp;severity=medium&amp;id=6879dc20a83201eaacef69e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6718-cwe-862-missing-authorization-in-b1a-8d550da1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6718%3A%20CWE-862%20Missing%20Authorization%20in%20b1accounting%20Site.pro%20for%20WooCommerce&amp;severity=high&amp;id=6879dc20a83201eaacef6a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6222-cwe-434-unrestricted-upload-of-file--11b37d1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6222%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Swings%20WooCommerce%20Refund%20And%20Exchange%20with%20RMA%20-%20Warranty%20Management%2C%20Refund%20Policy%2C%20Manage%20User%20Wallet&amp;severity=critical&amp;id=6879dc20a83201eaacef69fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6781-cwe-352-cross-site-request-forgery-c-3314ceeb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6781%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ryanfaber%20Copymatic%20%E2%80%93%20AI%20Content%20Writer%20%26%20Generator&amp;severity=medium&amp;id=6879ce10a83201eaaceef2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6053-cwe-352-cross-site-request-forgery-c-dc73f68e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6053%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bogdansilivestru%20Zuppler%20Online%20Ordering&amp;severity=medium&amp;id=6879ce10a83201eaaceef29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7660-cwe-79-improper-neutralization-of-in-a0508dfd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7660%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lewisking0072%20Map%20My%20Locations&amp;severity=medium&amp;id=6879ce10a83201eaaceef2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7638-cwe-89-improper-neutralization-of-sp-1230e11f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7638%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=6879ce10a83201eaaceef2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5816-cwe-862-missing-authorization-in-bit-3e132416</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5816%3A%20CWE-862%20Missing%20Authorization%20in%20biteship%20Plugin%20Pengiriman%20WooCommerce%20Kurir%20Reguler%2C%20Instan%2C%20Kargo%20%E2%80%93%20Biteship&amp;severity=medium&amp;id=6879ce10a83201eaaceef298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6813-cwe-862-missing-authorization-in-aap-0d371aab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6813%3A%20CWE-862%20Missing%20Authorization%20in%20aapanel%20aapanel%20WP%20Toolkit&amp;severity=high&amp;id=6879ce10a83201eaaceef2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3740-cwe-22-improper-limitation-of-a-path-6d7614c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3740%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=high&amp;id=6879ce10a83201eaaceef294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7648-cwe-79-improper-neutralization-of-in-20412e09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7648%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ruven-themes%20Ruven%20Themes%3A%20Shortcodes&amp;severity=medium&amp;id=6879ce10a83201eaaceef2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7431-cwe-79-improper-neutralization-of-in-435c3679</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7431%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajay%20Knowledge%20Base&amp;severity=medium&amp;id=6879aae8a83201eaacec206e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7767-cross-site-scripting-in-phpgurukul-a-5c843edb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7767%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=687995d6a83201eaaceb8306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-18-da24d527</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-18&amp;severity=medium&amp;id=687ae3bda83201eaacf7af56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50583-na-feb1e64d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50583%3A%20n%2Fa&amp;severity=medium&amp;id=687abd1ea83201eaacf70018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50582-na-e60b5bc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50582%3A%20n%2Fa&amp;severity=medium&amp;id=687abd1ea83201eaacf70013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50581-na-a08879cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50581%3A%20n%2Fa&amp;severity=medium&amp;id=687abd1ea83201eaacf7000e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50584-na-e685785a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50584%3A%20n%2Fa&amp;severity=medium&amp;id=687aa483a83201eaacf5fc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50708-na-a847d51b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50708%3A%20n%2Fa&amp;severity=high&amp;id=687aa483a83201eaacf5fc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50585-na-33af7896</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50585%3A%20n%2Fa&amp;severity=high&amp;id=687a99f8a83201eaacf59728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52169-na-9db2ed0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52169%3A%20n%2Fa&amp;severity=high&amp;id=687a9673a83201eaacf58eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52163-na-796f6da0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52163%3A%20n%2Fa&amp;severity=medium&amp;id=687a9673a83201eaacf58eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52164-na-b03fa0e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52164%3A%20n%2Fa&amp;severity=high&amp;id=687a8be6a83201eaacf563ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52166-na-95839c2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52166%3A%20n%2Fa&amp;severity=medium&amp;id=687a8be6a83201eaacf563c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52168-na-8571dd25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52168%3A%20n%2Fa&amp;severity=medium&amp;id=687a84eba83201eaacf54f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52162-na-3cd04db1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52162%3A%20n%2Fa&amp;severity=medium&amp;id=687a8163a83201eaacf547bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50586-na-eb947661</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50586%3A%20n%2Fa&amp;severity=medium&amp;id=687a8163a83201eaacf547b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45157-na-2982a838</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45157%3A%20n%2Fa&amp;severity=medium&amp;id=687a7dd6a83201eaacf53d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45156-na-47dc6433</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45156%3A%20n%2Fa&amp;severity=medium&amp;id=687a7dd6a83201eaacf53d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46000-na-cd7021a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46000%3A%20n%2Fa&amp;severity=medium&amp;id=687a61b8a83201eaacf46d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46002-na-d8c9bc3f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46002%3A%20n%2Fa&amp;severity=medium&amp;id=687a572ba83201eaacf4327d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46001-na-69f797f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46001%3A%20n%2Fa&amp;severity=critical&amp;id=687a53a7a83201eaacf41ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6185-cwe-79-in-leviton-acquisuite-ced1fdc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6185%3A%20CWE-79%20in%20Leviton%20AcquiSuite&amp;severity=critical&amp;id=687a572ba83201eaacf43288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7765-sql-injection-in-code-projects-onlin-74aa8502</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7765%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=687980b8a83201eaaceab04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7764-sql-injection-in-code-projects-onlin-7bb97b94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7764%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68797d33a83201eaacea9c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-telemessage-sgnl-vulnerability-is-actively-bei-7d8da462</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TeleMessage%20SGNL%20Vulnerability%20Is%20Actively%20Being%20Exploited%20by%20Attackers&amp;severity=medium&amp;id=687979ada83201eaacea8e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7763-open-redirect-in-thinkgem-jeesite-73b914ef</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7763%3A%20Open%20Redirect%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=687979bfa83201eaacea8e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7397-cwe-312-cleartext-storage-of-sensiti-de077fdc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7397%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Broadcom%20Brocade%20ASCG&amp;severity=medium&amp;id=687972a7a83201eaacea64d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6391-cwe-532-insertion-of-sensitive-infor-2f912525</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6391%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Broadcom%20Brocade%20ASCG&amp;severity=high&amp;id=687972a7a83201eaacea64d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7762-stack-based-buffer-overflow-in-d-lin-a1cb040a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7762%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=687972a7a83201eaacea64dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7759-server-side-request-forgery-in-think-28eaff6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7759%3A%20Server-Side%20Request%20Forgery%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=68796f23a83201eaacea4dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7398-cwe-326-inadequate-encryption-streng-f0e5253b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7398%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20Broadcom%20Brocade%20ASCG&amp;severity=high&amp;id=68796f23a83201eaacea4de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7758-buffer-overflow-in-totolink-t6-fd60b4e1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7758%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=6879681ba83201eaace9f22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7757-sql-injection-in-phpgurukul-land-rec-e12bd059</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7757%3A%20SQL%20Injection%20in%20PHPGurukul%20Land%20Record%20System&amp;severity=medium&amp;id=6879681ba83201eaace9f233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7756-cross-site-request-forgery-in-code-p-f04d3ab9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7756%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20E-Commerce%20Site&amp;severity=medium&amp;id=68796497a83201eaace9cd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7755-unrestricted-upload-in-code-projects-8b5be5c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7755%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=68796115a83201eaace9b977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23269-cwe-1423-exposure-of-sensitive-info-b45b4c16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23269%3A%20CWE-1423%3A%20Exposure%20of%20Sensitive%20Information%20caused%20by%20Shared%20Microarchitectural%20Predictor%20State%20that%20Influences%20Transient%20Execution%20in%20NVIDIA%20Jetson%20Orin%20and%20Xavier%20Devices&amp;severity=medium&amp;id=68795de2a83201eaace94c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phish-and-chips-china-aligned-espionage-actors-ram-66ec37a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phish%20and%20Chips%3A%20China-Aligned%20Espionage%20Actors%20Ramp%20Up%20Taiwan%20Semiconductor%20Industry%20Targeting&amp;severity=medium&amp;id=68795a0aa83201eaace8b7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7754-sql-injection-in-code-projects-patie-7a89858d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7754%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=68795a0ca83201eaace8b8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23270-cwe-392-missing-report-of-error-con-c4cfbe75</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23270%3A%20CWE-392%3A%20Missing%20Report%20of%20Error%20Condition%20in%20NVIDIA%20Jetson%20Orin%2C%20IGX%20Orin%20and%20Xavier%20Devices&amp;severity=high&amp;id=68795a0ca83201eaace8b89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-data-leak-at-texas-adoption-agency-exposes-44ded463</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Data%20Leak%20at%20Texas%20Adoption%20Agency%20Exposes%201.1%20Million%20Records&amp;severity=medium&amp;id=68795687a83201eaace88a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7753-sql-injection-in-code-projects-onlin-f055c4a1</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7753%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68795694a83201eaace88a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/powerful-maas-on-the-prowl-for-credentials-and-cry-eb616960</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Powerful%20MaaS%20On%20the%20Prowl%20for%20Credentials%20and%20Crypto%20Assets&amp;severity=medium&amp;id=68795a0aa83201eaace8b7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23267-cwe-59-improper-link-resolution-bef-f324c588</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23267%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20NVIDIA%20Container%20Toolkit&amp;severity=high&amp;id=68795303a83201eaace879b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7752-sql-injection-in-code-projects-onlin-c723d1ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7752%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68795303a83201eaace879bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4657-cwe-122-heap-based-buffer-overflow-i-aca6ad18</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4657%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=68794f7fa83201eaace863f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6249-cwe-602-client-side-enforcement-of-s-8b15cdd4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6249%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Lenovo%20FileZ%20Client&amp;severity=high&amp;id=68794f7fa83201eaace86403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6248-cwe-79-improper-neutralization-of-in-a1b2b9dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6248%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lenovo%20Browser&amp;severity=high&amp;id=68794f7fa83201eaace86400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6232-cwe-88-improper-neutralization-of-ar-58450b07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6232%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=high&amp;id=68794f7fa83201eaace863fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6231-cwe-88-improper-neutralization-of-ar-88232c74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6231%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=high&amp;id=68794f7fa83201eaace863fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6230-cwe-89-improper-neutralization-of-sp-2e537cfa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6230%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=68794f7fa83201eaace863f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2818-cwe-319-cleartext-transmission-of-se-2c937788</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2818%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Motorola%20Smart%20Connect%20Android%20Application&amp;severity=medium&amp;id=68794f7fa83201eaace863f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1700-cwe-427-uncontrolled-search-path-ele-5cd045f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1700%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Motorola%20Software%20Fix&amp;severity=high&amp;id=68794f7fa83201eaace863e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0886-cwe-276-incorrect-default-permission-0eba0dfe</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0886%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20Elliptic%20Virtual%20Lock%20Sensor%20Service%20For%20ThinkPad%20P1%20Gen%206%20(Type%2021FV%2C%2021FW)&amp;severity=high&amp;id=68794f7fa83201eaace863e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3753-cwe-95-improper-neutralization-of-di-b0251859</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3753%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Open%20Source%20Robotics%20Foundation%20Robot%20Operating%20System%20(ROS)&amp;severity=high&amp;id=68794c09a83201eaace85095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7751-sql-injection-in-code-projects-onlin-932ed83f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7751%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68794c09a83201eaace8509b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7433-cwe-502-deserialization-of-untrusted-67ac1fb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7433%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Sophos%20Sophos%20Intercept%20X%20for%20Windows&amp;severity=high&amp;id=68794c09a83201eaace85098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23266-cwe-426-untrusted-search-path-in-nv-65efbbdd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23266%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20NVIDIA%20Container%20Toolkit&amp;severity=critical&amp;id=68794c09a83201eaace85092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stormous-ransomware-gang-targets-north-country-hea-52de4764</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stormous%20Ransomware%20gang%20targets%20North%20Country%20HealthCare&amp;severity=high&amp;id=68794bf9a83201eaace84fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7750-sql-injection-in-code-projects-onlin-69500cfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7750%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68794c09a83201eaace850a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7472-vulnerability-in-sophos-intercept-x--c5beb746</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7472%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Sophos%20Sophos%20Intercept%20X%20for%20Windows%20Installer&amp;severity=high&amp;id=68794876a83201eaace83485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54070-cwe-125-out-of-bounds-read-in-openz-19c45689</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54070%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OpenZeppelin%20openzeppelin-contracts&amp;severity=medium&amp;id=68794189a83201eaace81890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/max-severity-cisco-ise-bug-allows-pre-auth-command-e5633599</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Max%20severity%20Cisco%20ISE%20bug%20allows%20pre-auth%20command%20execution%2C%20patch%20now&amp;severity=high&amp;id=6879416ca83201eaace81778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-steals-27-million-in-bigone-exchange-crypto-71889f62</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20steals%20%2427%20million%20in%20BigONE%20exchange%20crypto%20breach&amp;severity=high&amp;id=6879416ca83201eaace81774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53817-cwe-476-null-pointer-dereference-in-3e351a96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53817%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ipavlov%207-Zip&amp;severity=medium&amp;id=68794189a83201eaace81897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53816-cwe-122-heap-based-buffer-overflow--4bc38336</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53816%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ipavlov%207-Zip&amp;severity=medium&amp;id=68794189a83201eaace81894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7749-sql-injection-in-code-projects-onlin-2c28d115</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7749%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68793deba83201eaace7fc69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53638-cwe-754-improper-check-for-unusual--00dce838</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53638%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Vectorized%20solady&amp;severity=medium&amp;id=68793a67a83201eaace7e22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/larva-208s-new-campaign-targets-web3-developers-ee0418b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LARVA-208&apos;s%20New%20Campaign%20Targets%20Web3%20Developers&amp;severity=medium&amp;id=68793a6ba83201eaace7e23f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7748-cross-site-scripting-in-zcms-55fcabd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7748%3A%20Cross%20Site%20Scripting%20in%20ZCMS&amp;severity=medium&amp;id=687936e6a83201eaace7c2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23263-cwe-279-incorrect-execution-assigne-6f799cf3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23263%3A%20CWE-279%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20NVIDIA%20DOCA-Host%20and%20Mellanox%20OFED&amp;severity=high&amp;id=6879335fa83201eaace7af27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7747-buffer-overflow-in-tenda-fh451-dd4ae3b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7747%3A%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=6879335fa83201eaace7af2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolution-of-macos-odyssey-stealer-new-techniques--1bb0851d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolution%20of%20macOS%20Odyssey%20Stealer%3A%20New%20Techniques%20%26%20Signed%20Malware&amp;severity=medium&amp;id=68795693a83201eaace88a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-apache-http-server-flaw-to-deploy--0ced271c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Apache%20HTTP%20Server%20Flaw%20to%20Deploy%20Linuxsys%20Cryptocurrency%20Miner&amp;severity=high&amp;id=687921c9a83201eaace726c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7339-cwe-241-in-jshttp-on-headers-3b3a4c63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7339%3A%20CWE-241%20in%20jshttp%20on-headers&amp;severity=low&amp;id=68791e47a83201eaace70a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7338-cwe-248-in-expressjs-multer-1c737640</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7338%3A%20CWE-248%20in%20expressjs%20multer&amp;severity=high&amp;id=68792c57a83201eaace78070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostcontainer-backdoor-for-exchange-servers-22be8d5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostContainer%20backdoor%20for%20Exchange%20servers&amp;severity=medium&amp;id=68795302a83201eaace87981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maas-operation-using-emmenhtal-and-amadey-linked-t-f72d7455</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MaaS%20operation%20using%20Emmenhtal%20and%20Amadey%20linked%20to%20threats%20against%20Ukrainian%20entities&amp;severity=medium&amp;id=68795302a83201eaace87986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54066-cwe-601-url-redirection-to-untruste-ea3b6ca1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54066%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20DIRACGrid%20diracx-web&amp;severity=medium&amp;id=68791037a83201eaace69110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54064-cwe-532-insertion-of-sensitive-info-406888ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54064%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20rucio%20helm-charts&amp;severity=medium&amp;id=68790cb4a83201eaace66ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54062-cwe-89-improper-neutralization-of-s-ad57dd02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54062%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68790cb4a83201eaace66ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54061-cwe-89-improper-neutralization-of-s-da8fb5af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54061%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68790cb4a83201eaace66baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54060-cwe-89-improper-neutralization-of-s-ce9e9130</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54060%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=6879092fa83201eaace65557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54058-cwe-89-improper-neutralization-of-s-6b0ba33e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54058%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=6879092fa83201eaace65554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53946-cwe-89-improper-neutralization-of-s-e92d55a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53946%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=687905aba83201eaace63c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53941-cwe-79-improper-neutralization-of-i-06421deb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53941%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fedify-dev%20hollo&amp;severity=medium&amp;id=687905aba83201eaace63c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53928-cwe-94-improper-control-of-generati-4af94aef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53928%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=68790228a83201eaace61c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53927-cwe-94-improper-control-of-generati-8840c3a2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53927%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=68790228a83201eaace61c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53909-cwe-1336-improper-neutralization-of-38246a7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53909%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20mailcow%20mailcow-dockerized&amp;severity=critical&amp;id=68790228a83201eaace61c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40924-cwe-340-generation-of-predictable-n-7fe67340</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40924%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20HAARG%20Catalyst%3A%3APlugin%3A%3ASession&amp;severity=medium&amp;id=6878fea3a83201eaace5f704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/svg-smuggling-image-embedded-javascript-redirect-a-e32795b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SVG%20Smuggling%20-%20Image%20Embedded%20JavaScript%20Redirect%20Attacks&amp;severity=medium&amp;id=68794f7ea83201eaace863c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns-a-small-but-effective-c2-system-08e3f580</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS%3A%20A%20Small%20but%20Effective%20C2%20system&amp;severity=medium&amp;id=68794f7ea83201eaace863ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5346-cwe-926-improper-export-of-android-a-66c0b95f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5346%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Bluebird%20kr.co.bluebird.android.bbsettings&amp;severity=medium&amp;id=6878f79ba83201eaace5cfab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5344-cwe-926-improper-export-of-android-a-ee03b7fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5344%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Bluebird%20com.bluebird.kiosk.launcher&amp;severity=high&amp;id=6878f79ba83201eaace5cfa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5345-cwe-926-improper-export-of-android-a-630d9ff8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5345%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Bluebird%20com.bluebird.filemanagers&amp;severity=medium&amp;id=6878f79ba83201eaace5cfa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bypassing-root-detection-and-rasp-in-sensitive-and-8455046b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bypassing%20root%20detection%20and%20RASP%20in%20sensitive%20Android%20apps&amp;severity=medium&amp;id=6878f0a8a83201eaace5814a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-abused-to-spread-amadey-lumma-and-redline-i-c70c9a16</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Abused%20to%20Spread%20Amadey%2C%20Lumma%20and%20Redline%20InfoStealers%20in%20Ukraine&amp;severity=medium&amp;id=6878f092a83201eaace58082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-salt-typhoon-infiltrated-us-national-guard-afed24ef</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Salt%20Typhoon%20Infiltrated%20US%20National%20Guard%20Network%20for%20Months&amp;severity=medium&amp;id=6878d7f5a83201eaace4ba31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-suspicious-domains-165de963</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Suspicious%20Domains&amp;severity=medium&amp;id=6878d0efa83201eaace4467f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/co-op-confirms-data-of-65-million-members-stolen-i-35f8afe7</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Co-op%20confirms%20data%20of%206.5%20million%20members%20stolen%20in%20cyberattack&amp;severity=high&amp;id=6878c9e6a83201eaace414ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-critical-ise-flaw-allowing-unauthen-87c37b9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20Critical%20ISE%20Flaw%20Allowing%20Unauthenticated%20Attackers%20to%20Execute%20Root%20Code&amp;severity=critical&amp;id=6878c9e6a83201eaace414e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-target-taiwans-semiconductor-secto-4cbb7527</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Target%20Taiwan&apos;s%20Semiconductor%20Sector%20with%20Cobalt%20Strike%2C%20Custom%20Backdoors&amp;severity=high&amp;id=6878c9e6a83201eaace414f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4302-cwe-203-observable-discrepancy-in-st-ddd01889</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4302%3A%20CWE-203%20Observable%20Discrepancy%20in%20Stop%20User%20Enumeration&amp;severity=medium&amp;id=6878aa44a83201eaace33190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7735-cwe-89-improper-neutralization-of-sp-905efe74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7735%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20UNIMAX%20Hospital%20Information%20System&amp;severity=high&amp;id=68786e80a83201eaace14b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7712-cwe-22-improper-limitation-of-a-path-b57bab18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7712%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MangaBooth%20Madara%20-%20Core&amp;severity=critical&amp;id=68786778a83201eaace11810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7729-cross-site-scripting-in-scada-lts-1cbb0b15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7729%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68785ceca83201eaace0cbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5396-cwe-94-improper-control-of-generatio-78201b13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5396%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Bearsthemes%20Bears%20Backup&amp;severity=critical&amp;id=68785ceca83201eaace0cbd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7728-cross-site-scripting-in-scada-lts-2c4e621b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7728%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68785260a83201eaace0477c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-17-95b33d75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-17&amp;severity=medium&amp;id=6879923da83201eaaceb6c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50240-na-0ba450aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50240%3A%20n%2Fa&amp;severity=critical&amp;id=68795de2a83201eaace94c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46102-na-20584cb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46102%3A%20n%2Fa&amp;severity=medium&amp;id=68795694a83201eaace88a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53964-na-e27c9474</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53964%3A%20n%2Fa&amp;severity=critical&amp;id=68795303a83201eaace879b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51497-na-83f1cc00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51497%3A%20n%2Fa&amp;severity=medium&amp;id=6879335fa83201eaace7af2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53867-na-26a38f5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53867%3A%20n%2Fa&amp;severity=critical&amp;id=687921d7a83201eaace72755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52046-na-775f95db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52046%3A%20n%2Fa&amp;severity=critical&amp;id=687921d7a83201eaace72752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47189-na-05f20e97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47189%3A%20n%2Fa&amp;severity=medium&amp;id=687913bba83201eaace6a0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51630-na-9e62cc3f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51630%3A%20n%2Fa&amp;severity=critical&amp;id=68790228a83201eaace61c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34132-cwe-78-improper-neutralization-of-s-6dab4678</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34132%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Merit%20LILIN%20DVR%20Firmware&amp;severity=critical&amp;id=68781a21a83201eaacded290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34130-cwe-306-missing-authentication-for--d9b44d25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34130%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Merit%20LILIN%20DVR%20Firmware&amp;severity=high&amp;id=68781a21a83201eaacded28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34129-cwe-78-improper-neutralization-of-s-0bccef22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34129%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Merit%20LILIN%20DVR%20Firmware&amp;severity=high&amp;id=68781a21a83201eaacded286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34128-cwe-120-buffer-copy-without-checkin-c7879fa5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34128%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20X360Soft%20X360%20VideoPlayer%20ActiveX%20Control&amp;severity=high&amp;id=68781a21a83201eaacded295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34127-cwe-121-stack-based-buffer-overflow-ac6cb7f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34127%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Achat%20Software%20Achat%20Chat%20Server&amp;severity=critical&amp;id=68791037a83201eaace6910b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34126-cwe-22-improper-limitation-of-a-pat-0c7562d1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34126%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RIPS%20Technologies%20RIPS%20Scanner&amp;severity=high&amp;id=68791ac3a83201eaace6fab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34125-cwe-78-improper-neutralization-of-s-a11ac33d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34125%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20D-Link%20DSP-W110A1&amp;severity=critical&amp;id=68795303a83201eaace879c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34124-cwe-121-stack-based-buffer-overflow-b133f6af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34124%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20The%203DO%20Company%20Heroes%20of%20Might%20and%20Magic%20III&amp;severity=high&amp;id=68795303a83201eaace879b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34123-cwe-121-stack-based-buffer-overflow-0415c016</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34123%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20VideoCharge%20Software%20Studio&amp;severity=high&amp;id=6878174da83201eaacdec308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34121-cwe-434-unrestricted-upload-of-file-591e0efb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34121%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Idera%20Up.Time%20Monitoring%20Station&amp;severity=critical&amp;id=6878174da83201eaacdec302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34120-cwe-22-improper-limitation-of-a-pat-a18a0e48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34120%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LimeSurvey%20GmbH%20LimeSurvey&amp;severity=high&amp;id=6878174da83201eaacdec2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34119-cwe-668-exposure-of-resource-to-wro-488bf293</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34119%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Tinasoft%20EasyCafe%20Server&amp;severity=high&amp;id=6878174da83201eaacdec2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34118-cwe-22-improper-limitation-of-a-pat-815e9fa8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34118%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Linknat%20Technology%20VOS%20Manager&amp;severity=high&amp;id=6878174da83201eaacdec2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34117-cwe-912-hidden-functionality-in-net-5b56c392</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34117%3A%20CWE-912%20Hidden%20Functionality%20in%20Netcore%20Technology%20Router%20firmware&amp;severity=critical&amp;id=6878174da83201eaacdec2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6983-cwe-1021-improper-restriction-of-ren-cef36937</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6983%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20TP-Link%20System%20Inc.%20Archer%20C1200&amp;severity=medium&amp;id=6878088ea83201eaacde2e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6982-cwe-798-use-of-hard-coded-credential-2e21db26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6982%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20TP-Link%20System%20Inc.%20Archer%20C50%20V3&amp;severity=medium&amp;id=6878088ea83201eaacde2e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53908-cwe-26-path-traversal-dirfilename-i-cadfbe94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53908%3A%20CWE-26%3A%20Path%20Traversal%3A%20&apos;%2Fdir%2F..%2Ffilename&apos;%20in%20rommapp%20romm&amp;severity=high&amp;id=68780519a83201eaacde16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badbox-20-found-preinstalled-on-android-iot-device-9f19f23f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BADBOX%202.0%20Found%20Preinstalled%20on%20Android%20IoT%20Devices%20Worldwide&amp;severity=medium&amp;id=68780506a83201eaacde164e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37107-vulnerability-in-hewlett-packard-en-f3e96d4d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37107%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20AutoPass%20License%20Server&amp;severity=high&amp;id=6877e8eba83201eaacdd3dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37106-vulnerability-in-hewlett-packard-en-31928df6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37106%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20AutoPass%20License%20Server&amp;severity=high&amp;id=6877e8eba83201eaacdd3df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36097-cwe-121-stack-based-buffer-overflow-fc5a10ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36097%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=high&amp;id=6877e8eba83201eaacdd3dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37105-vulnerability-in-hewlett-packard-en-ef2e3b79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37105%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20AutoPass%20License%20Server&amp;severity=high&amp;id=6877e8eba83201eaacdd3e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40777-cwe-617-reachable-assertion-in-isc--2a859af3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40777%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20BIND%209&amp;severity=high&amp;id=6877e564a83201eaacdcef2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fortinet-fortiweb-hacks-likely-linked-to-publi-22c15580</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fortinet%20FortiWeb%20hacks%20likely%20linked%20to%20public%20RCE%20exploits&amp;severity=high&amp;id=6877e1dea83201eaacdcd737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-cybercrime-network-demolished-in-opera-5b16823b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20Cybercrime%20Network%20Demolished%20in%20Operation%20Eastwood&amp;severity=high&amp;id=6877e1dea83201eaacdcd73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-sma-devices-hacked-with-overstep-rootkit-18163b58</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20SMA%20devices%20hacked%20with%20OVERSTEP%20rootkit%20tied%20to%20ransomware&amp;severity=high&amp;id=6877de5aa83201eaacdcb0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/squidloader-malware-campaign-targets-hong-kong-fin-331f3285</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SquidLoader%20Malware%20Campaign%20Targets%20Hong%20Kong%20Financial%20Sector&amp;severity=high&amp;id=6877de5aa83201eaacdcb0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trail-of-bits-libafl-notes-c1c57ace</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trail%20of%20Bits%20LibAFL%20Notes&amp;severity=medium&amp;id=6877de7da83201eaacdcb38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53904-cwe-79-improper-neutralization-of-i-4e182a76</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53904%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The-Scratch-Channel%20the-scratch-channel.github.io&amp;severity=low&amp;id=6877de7aa83201eaacdcb370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20337-improper-neutralization-of-special--8a999346</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20337%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=6877d3d0a83201eaacdc65de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20285-authentication-bypass-by-assumed-im-6523633a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20285%3A%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20288-server-side-request-forgery-ssrf-in-3e3f3dc9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20288%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20284-improper-neutralization-of-special--948725f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20284%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20283-improper-neutralization-of-special--21378f44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20283%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20272-improper-neutralization-of-special--d861b06c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20272%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20274-unrestricted-upload-of-file-with-da-6143a9c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20274%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypto-wallets-continue-to-be-drained-in-elaborate-4142c42d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypto%20Wallets%20Continue%20to%20be%20Drained%20in%20Elaborate%20Social%20Media%20Scam&amp;severity=medium&amp;id=6877fa7ba83201eaacddde9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-solidity-language-open-source-package-was-used-6ae81215</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Solidity%20Language%20open-source%20package%20was%20used%20in%20a%20%24500%2C000%20crypto%20heist&amp;severity=medium&amp;id=6877fdffa83201eaacddecd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/june-2025-apt-attack-trends-report-south-korea-c0b3bdf3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=June%202025%20APT%20Attack%20Trends%20Report%20(South%20Korea)&amp;severity=medium&amp;id=68780518a83201eaacde16b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/june-2025-security-issues-in-korean-global-financi-b3ead841</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=June%202025%20Security%20Issues%20in%20Korean%20%26%20Global%20Financial%20Sector&amp;severity=medium&amp;id=68780518a83201eaacde16af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/june-2025-threat-trend-report-on-ransomware-5ab6c55b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=June%202025%20Threat%20Trend%20Report%20on%20Ransomware&amp;severity=medium&amp;id=68780518a83201eaacde16a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/june-2025-infostealer-trend-report-491cdade</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=June%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=68780518a83201eaacde1699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emerging-ransomware-as-a-service-supporting-ai-dri-3980f9f6</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emerging%20Ransomware-as-a-Service%2C%20Supporting%20AI%20Driven%20Negotiation%20and%20Mobile%20Control%20Panel%20for%20Their%20Affiliates&amp;severity=medium&amp;id=6877fa7ba83201eaacdddecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53943-cwe-863-incorrect-authorization-in--8514f9c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53943%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Death1Clown%20VoidBot_open-source&amp;severity=high&amp;id=6877d04ca83201eaacdc5a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53938-cwe-306-missing-authentication-for--cf9f432f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53938%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877d04ca83201eaacdc5a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53937-cwe-89-improper-neutralization-of-s-329628cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53937%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=6877d04ca83201eaacdc5a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53936-cwe-79-improper-neutralization-of-i-3702f37b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53936%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877d04ca83201eaacdc5a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53935-cwe-79-improper-neutralization-of-i-33b243b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53935%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877d04ca83201eaacdc5a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53934-cwe-79-improper-neutralization-of-i-759de41f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53934%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc4940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47053-cross-site-scripting-dom-based-xss--dfa33705</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47053%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6877ccf3a83201eaacdc4937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53933-cwe-79-improper-neutralization-of-i-2b109401</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53933%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc493d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7357-cwe-256-plaintext-storage-of-a-passw-ca6720b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7357%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20LITEON%20IC48A%20EV%20Charger&amp;severity=high&amp;id=6877ccf3a83201eaacdc4943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53932-cwe-79-improper-neutralization-of-i-00f6bdd1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53932%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc493a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46959-cross-site-scripting-dom-based-xss--4d16a414</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46959%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6877ccf3a83201eaacdc4934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53931-cwe-79-improper-neutralization-of-i-fe2ed335</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53931%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc4946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53930-cwe-79-improper-neutralization-of-i-f1da4f24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53930%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc494c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53929-cwe-79-improper-neutralization-of-i-b4990300</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53929%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc4949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ung0002-unknown-group-0002-espionage-campaigns-unc-bcb765cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNG0002%20(Unknown%20Group%200002)%3A%20Espionage%20Campaigns%20Uncovered&amp;severity=medium&amp;id=6877fa7ba83201eaacdddedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5994-cwe-349-acceptance-of-extraneous-unt-744ce175</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5994%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20NLnet%20Labs%20Unbound&amp;severity=high&amp;id=6877bb51a83201eaacdbe12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-golden-dmsa-attack-in-windows-server-2025-049721c4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Golden%20dMSA%20Attack%20in%20Windows%20Server%202025%20Enables%20Cross-Domain%20Attacks%20and%20Persistent%20Access&amp;severity=critical&amp;id=6877bb32a83201eaacdbdfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salt-typhoon-breach-chinese-apt-compromises-us-arm-1b649b60</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salt%20Typhoon%20breach%3A%20Chinese%20APT%20compromises%20U.S.%20Army%20National%20Guard%20network&amp;severity=high&amp;id=6877bb32a83201eaacdbdff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37104-vulnerability-in-hewlett-packard-en-74823c7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37104%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Telco%20Service%20Orchestrator&amp;severity=high&amp;id=6877b7b3a83201eaacdbc99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40913-cwe-1395-dependency-on-vulnerable-t-635a93ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40913%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20ATRODO%20Net%3A%3ADropbear&amp;severity=medium&amp;id=6877b42ca83201eaacdbbfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40919-cwe-340-generation-of-predictable-n-33f17ab8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40919%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20SALVA%20Authen%3A%3ADigestMD5&amp;severity=medium&amp;id=6877b42ca83201eaacdbbfe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3871-cwe-862-missing-authorization-in-for-d794b4f4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3871%3A%20CWE-862%20Missing%20Authorization%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=6877b42ca83201eaacdbbfe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40918-cwe-340-generation-of-predictable-n-997d2ff8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40918%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20EHUELS%20Authen%3A%3ASASL%3A%3APerl%3A%3ADIGEST_MD5&amp;severity=medium&amp;id=6877b42ca83201eaacdbbfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53892-cwe-79-improper-neutralization-of-i-03136fc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53892%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intlify%20vue-i18n&amp;severity=medium&amp;id=6877ad45a83201eaacdb7e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40776-cwe-349-acceptance-of-extraneous-un-caa522ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40776%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20ISC%20BIND%209&amp;severity=high&amp;id=6877ad45a83201eaacdb7e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unitedhealth-linked-health-tech-firm-episource-bre-7a142020</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UnitedHealth-Linked%20Health%20Tech%20Firm%20Episource%20Breach%20Hits%205.4M%20Patients&amp;severity=high&amp;id=6877ad21a83201eaacdb7d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53840-cwe-200-exposure-of-sensitive-infor-d58967dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53840%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Icinga%20icingadb-web&amp;severity=low&amp;id=6877ad45a83201eaacdb7e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40923-cwe-340-generation-of-predictable-n-a67fb210</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40923%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20MIYAGAWA%20Plack%3A%3AMiddleware%3A%3ASession&amp;severity=high&amp;id=6877a61aa83201eaacdb3fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34300-cwe-20-improper-input-validation-in-8b4a1c23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34300%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Sawtooth%20Software%20Lighthouse%20Studio&amp;severity=critical&amp;id=6877a61aa83201eaacdb3fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53758-cwe-312-cleartext-storage-of-sensit-d25081f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53758%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Digisol%20XPON%20ONU%20Wi-Fi%20Router%20(DG-GR6821AC)&amp;severity=medium&amp;id=6877910aa83201eaacda58f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24759-cwe-89-improper-neutralization-of-s-e1b2d335</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24759%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CMSJunkie%20-%20WordPress%20Business%20Directory%20Plugins%20WP-BusinessDirectory&amp;severity=null&amp;id=68779108a83201eaacda582f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24777-cwe-502-deserialization-of-untruste-40381e13</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24777%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20awethemes%20Hillter&amp;severity=high&amp;id=68779108a83201eaacda5832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24779-cwe-502-deserialization-of-untruste-477dd34a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24779%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Yogi&amp;severity=null&amp;id=68779108a83201eaacda5835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28955-cwe-22-improper-limitation-of-a-pat-e2464d94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28955%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FWDesign%20Easy%20Video%20Player%20Wordpress%20%26%20WooCommerce&amp;severity=null&amp;id=68779108a83201eaacda5838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28959-cwe-89-improper-neutralization-of-s-16f40249</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28959%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Md%20Yeasin%20Ul%20Haider%20URL%20Shortener&amp;severity=null&amp;id=68779108a83201eaacda583b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28961-cwe-502-deserialization-of-untruste-35cc7524</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28961%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Md%20Yeasin%20Ul%20Haider%20URL%20Shortener&amp;severity=null&amp;id=68779108a83201eaacda583e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28965-cwe-862-missing-authorization-in-md-b8503672</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28965%3A%20Missing%20Authorization%20in%20Md%20Yeasin%20Ul%20Haider%20URL%20Shortener&amp;severity=null&amp;id=68779108a83201eaacda5841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28982-cwe-89-improper-neutralization-of-s-582eebfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28982%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=critical&amp;id=68779108a83201eaacda5844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29000-cwe-862-missing-authorization-in-au-69922291</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29000%3A%20Missing%20Authorization%20in%20August%20Infotech%20Multi-language%20Responsive%20Contact%20Form&amp;severity=null&amp;id=68779108a83201eaacda5847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29009-cwe-434-unrestricted-upload-of-file-7f25a583</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29009%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Webkul%20Medical%20Prescription%20Attachment%20Plugin%20for%20WooCommerce&amp;severity=null&amp;id=68779108a83201eaacda584a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30936-cwe-89-improper-neutralization-of-s-a8a4efd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30936%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Torod%20Company%20for%20Information%20Technology%20Torod&amp;severity=null&amp;id=68779108a83201eaacda5861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30949-cwe-502-deserialization-of-untruste-5edec0d7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30949%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Guru%20Team%20Site%20Chat%20on%20Telegram&amp;severity=null&amp;id=68779108a83201eaacda5864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30955-cwe-79-improper-neutralization-of-i-d08ca57f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30955%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20ListingEasy&amp;severity=null&amp;id=68779108a83201eaacda5867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30959-cwe-862-missing-authorization-in-wp-58a8f96a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30959%3A%20Missing%20Authorization%20in%20WPFactory%20Product%20XML%20Feed%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68779108a83201eaacda586a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30973-cwe-502-deserialization-of-untruste-52276379</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30973%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Codexpert%2C%20Inc%20CoSchool%20LMS&amp;severity=null&amp;id=68779108a83201eaacda586d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31055-cwe-79-improper-neutralization-of-i-139bfdb6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31055%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vergatheme%20Electrician%20-%20Electrical%20Service%20WordPress&amp;severity=null&amp;id=68779108a83201eaacda5870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31070-cwe-22-improper-limitation-of-a-pat-b18b717e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31070%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LambertGroup%20HTML5%20Radio%20Player%20-%20WPBakery%20Page%20Builder%20Addon&amp;severity=null&amp;id=68779108a83201eaacda5873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31072-cwe-79-improper-neutralization-of-i-d2762b11</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20Ofiz%20-%20WordPress%20Business%20Consulting%20Theme&amp;severity=null&amp;id=68779108a83201eaacda5876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31422-cwe-502-deserialization-of-untruste-564da00b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31422%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Visual%20Art%20%7C%20Gallery%20WordPress%20Theme&amp;severity=null&amp;id=68779108a83201eaacda5879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31427-cwe-79-improper-neutralization-of-i-0772b443</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20Invico%20-%20WordPress%20Consulting%20Business%20Theme&amp;severity=null&amp;id=68779108a83201eaacda587c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32574-cwe-89-improper-neutralization-of-s-4893fba9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32574%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20WPGYM&amp;severity=high&amp;id=68779109a83201eaacda588a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46500-cwe-79-improper-neutralization-of-i-ac1eb8d6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ValvePress%20Wordpress%20Auto%20Spinner&amp;severity=null&amp;id=68779109a83201eaacda588d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47554-cwe-79-improper-neutralization-of-i-a66f2f5b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20CSS3%20Compare%20Pricing%20Tables%20for%20WordPress&amp;severity=null&amp;id=68779109a83201eaacda5890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47645-cwe-89-improper-neutralization-of-s-109943da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47645%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ELEXtensions%20ELEX%20WooCommerce%20Advanced%20Bulk%20Edit%20Products%2C%20Prices%20%26%20Attributes&amp;severity=null&amp;id=68779109a83201eaacda5893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47652-cwe-79-improper-neutralization-of-i-a3ed94bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47652%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infility%20Infility%20Global&amp;severity=null&amp;id=68779109a83201eaacda5896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48291-cwe-79-improper-neutralization-of-i-38ebdbce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48291%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=68779109a83201eaacda5899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48300-cwe-434-unrestricted-upload-of-file-4f0cac80</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48300%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=null&amp;id=68779109a83201eaacda589c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48339-cwe-862-missing-authorization-in-ac-5f1ce30b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48339%3A%20CWE-862%20Missing%20Authorization%20in%20activity-log.com%20Profiler%20-%20What%20Slowing%20Down%20Your%20WP&amp;severity=medium&amp;id=68779109a83201eaacda589f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48345-cwe-79-improper-neutralization-of-i-882a9b67</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48345%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arisoft%20Contact%20Form%207%20Editor%20Button&amp;severity=null&amp;id=68779109a83201eaacda58a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49031-cwe-79-improper-neutralization-of-i-ab4fcaf2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stefan%20M.%20SMu%20Manual%20DoFollow&amp;severity=null&amp;id=68779109a83201eaacda58a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49034-cwe-89-improper-neutralization-of-s-d0efd1a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49034%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aman%20Funnel%20Builder%20by%20FunnelKit&amp;severity=null&amp;id=68779109a83201eaacda58b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49319-cwe-862-missing-authorization-in-wp-4bb72e4a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49319%3A%20Missing%20Authorization%20in%20WPFactory%20Wishlist%20for%20WooCommerce&amp;severity=null&amp;id=68779109a83201eaacda58b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49876-cwe-89-improper-neutralization-of-s-8971f34d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49876%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=68779109a83201eaacda58b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49884-cwe-862-missing-authorization-in-al-772c8267</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49884%3A%20Missing%20Authorization%20in%20alexvtn%20Internal%20Linking%20of%20Related%20Contents&amp;severity=null&amp;id=68779109a83201eaacda58bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49888-cwe-862-missing-authorization-in-pi-a914d261</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49888%3A%20Missing%20Authorization%20in%20pimwick%20PW%20WooCommerce%20On%20Sale!&amp;severity=null&amp;id=68779109a83201eaacda58be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50028-cwe-862-missing-authorization-in-co-2a579219</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50028%3A%20Missing%20Authorization%20in%20CodeSolz%20Ultimate%20Push%20Notifications&amp;severity=null&amp;id=68779109a83201eaacda58c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52714-cwe-89-improper-neutralization-of-s-f7e99790</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52714%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=68779109a83201eaacda58c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52777-cwe-79-improper-neutralization-of-i-e0c8ceab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52777%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmsMinds%20Pay%20with%20Contact%20Form%207&amp;severity=null&amp;id=68779109a83201eaacda58c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52779-cwe-79-improper-neutralization-of-i-ff9c8e65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52779%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karimmughal%20Dot%20html%2Cphp%2Cxml%20etc%20pages&amp;severity=null&amp;id=68779109a83201eaacda58ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52786-cwe-79-improper-neutralization-of-i-3f96734e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52786%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kingdom%20Creation%20Media%20Folder&amp;severity=null&amp;id=68779109a83201eaacda58cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52787-cwe-79-improper-neutralization-of-i-8fd5e565</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52787%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EZiHosting%20Tennis%20Court%20Bookings&amp;severity=null&amp;id=6877910aa83201eaacda58e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52803-cwe-862-missing-authorization-in-ux-827154b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52803%3A%20CWE-862%20Missing%20Authorization%20in%20uxper%20Sala&amp;severity=high&amp;id=6877910aa83201eaacda58e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52804-cwe-862-missing-authorization-in-ux-da574267</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52804%3A%20Missing%20Authorization%20in%20uxper%20Nuss&amp;severity=null&amp;id=6877910aa83201eaacda58ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52819-cwe-89-improper-neutralization-of-s-d74a99d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52819%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pakkemx%20Pakke%20Env%C3%ADos&amp;severity=null&amp;id=6877910aa83201eaacda58ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52836-cwe-266-incorrect-privilege-assignm-b760e292</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52836%3A%20Incorrect%20Privilege%20Assignment%20in%20Unity%20Business%20Technology%20Pty%20Ltd%20The%20E-Commerce%20ERP&amp;severity=null&amp;id=6877910aa83201eaacda58f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53757-cwe-614-sensitive-cookie-in-https-s-6aa81dec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53757%3A%20CWE-614%3A%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20Digisol%20XPON%20ONU%20Wi-Fi%20Router%20(DG-GR6821AC)&amp;severity=high&amp;id=6877910aa83201eaacda58f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53756-cwe-319-cleartext-transmission-of-s-1700cbc6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53756%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Digisol%20XPON%20ONU%20Wi-Fi%20Router%20(DG-GR6821AC)&amp;severity=high&amp;id=68778d7fa83201eaacda060a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53755-cwe-312-cleartext-storage-of-sensit-19e7ba97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53755%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Digisol%20XPON%20ONU%20Wi-Fi%20Router%20(DG-GR6821AC)&amp;severity=medium&amp;id=68778d7fa83201eaacda0607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53754-cwe-798-use-of-hard-coded-credentia-48b5d29d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53754%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Digisol%20XPON%20ONU%20Wi-Fi%20Router%20(DG-GR6821AC)&amp;severity=medium&amp;id=68778d7fa83201eaacda0604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/psa-crystaldiskinfo-crystaldiskmark-now-embeds-adw-d9da8464</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PSA%3A%20CrystalDiskInfo%20%26%20CrystalDiskMark%20now%20embeds%20adwares%20%2F!%5C&amp;severity=medium&amp;id=68778679a83201eaacd9e78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48150-cwe-862-missing-authorization-in-bi-cb3f8197</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48150%3A%20Missing%20Authorization%20in%20sminozzi%20Real%20Estate%20Property%202024%20Create%20Your%20Own%20Fields%20and%20Search%20Bar%20WP%20Plugin&amp;severity=null&amp;id=687782f9a83201eaacd978f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48153-cwe-352-cross-site-request-forgery--0fbf3979</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48153%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Atakan%20Au%20Import%20CDN-Remote%20Images&amp;severity=null&amp;id=687782f9a83201eaacd978f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48155-cwe-862-missing-authorization-in-en-b57f02c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48155%3A%20Missing%20Authorization%20in%20enituretechnology%20Residential%20Address%20Detection&amp;severity=null&amp;id=687782f9a83201eaacd978f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48156-cwe-79-improper-neutralization-of-i-ab5326fd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48156%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Parakoos%20Image%20Wall&amp;severity=null&amp;id=687782f9a83201eaacd978fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48161-cwe-89-improper-neutralization-of-s-bfbdcd2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48161%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YaySMTP&amp;severity=null&amp;id=687782f9a83201eaacd978ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48166-cwe-862-missing-authorization-in-bi-a943b041</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48166%3A%20Missing%20Authorization%20in%20sminozzi%20Stop%20and%20Block%20bots%20plugin%20Anti%20bots&amp;severity=null&amp;id=687782f9a83201eaacd97902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48167-cwe-862-missing-authorization-in-al-0202fefe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48167%3A%20Missing%20Authorization%20in%20alexvtn%20Chatbox%20Manager&amp;severity=null&amp;id=687782f9a83201eaacd97905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48294-cwe-918-server-side-request-forgery-6d5343db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48294%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kerfred%20FG%20Drupal%20to%20WordPress&amp;severity=null&amp;id=687782f9a83201eaacd97908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48295-cwe-79-improper-neutralization-of-i-7527722e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48295%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=687782f9a83201eaacd9790b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48299-cwe-89-improper-neutralization-of-s-51820541</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48299%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YayExtra&amp;severity=null&amp;id=687782f9a83201eaacd9790e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48301-cwe-89-improper-neutralization-of-s-4a8879dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48301%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20SMTP%20for%20SendGrid%20%E2%80%93%20YaySMTP&amp;severity=null&amp;id=687782faa83201eaacd9791b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54051-cwe-79-improper-neutralization-of-i-ee5c62d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20LightBox%20Block&amp;severity=null&amp;id=687782fba83201eaacd9799f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54050-cwe-79-improper-neutralization-of-i-925d86bf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54050%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Addons%20for%20Elementor&amp;severity=null&amp;id=687782fba83201eaacd9799c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54047-cwe-862-missing-authorization-in-qu-db0197fb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54047%3A%20Missing%20Authorization%20in%20QuanticaLabs%20Cost%20Calculator&amp;severity=null&amp;id=687782fba83201eaacd97999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54043-cwe-89-improper-neutralization-of-s-23fd8ec3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54043%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20SMTP%20for%20Amazon%20SES&amp;severity=null&amp;id=687782fba83201eaacd97996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54042-cwe-352-cross-site-request-forgery--33c28fee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54042%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Xfinitysoft%20WP%20Post%20Hide&amp;severity=null&amp;id=687782fba83201eaacd97993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54041-cwe-352-cross-site-request-forgery--ec1be161</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54041%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Swings%20Wallet%20System%20for%20WooCommerce&amp;severity=null&amp;id=687782fba83201eaacd97986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54039-cwe-352-cross-site-request-forgery--eaa70b2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54039%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Toast%20Plugins%20Animator&amp;severity=null&amp;id=687782fba83201eaacd97983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54038-cwe-352-cross-site-request-forgery--4f1848ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54038%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jetmonsters%20Restaurant%20Menu%20by%20MotoPress&amp;severity=null&amp;id=687782fba83201eaacd97980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54037-cwe-862-missing-authorization-in-bl-f45b4f32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54037%3A%20Missing%20Authorization%20in%20blazethemes%20News%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=687782fba83201eaacd9797d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54036-cwe-352-cross-site-request-forgery--c3664769</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54036%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Webba%20Appointment%20Booking%20Webba%20Booking&amp;severity=null&amp;id=687782fba83201eaacd9797a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54035-cwe-352-cross-site-request-forgery--331137d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54035%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tribulant%20Software%20Newsletters&amp;severity=null&amp;id=687782fba83201eaacd97977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54033-cwe-352-cross-site-request-forgery--07543f14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54033%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BlocksWP%20Theme%20Builder%20For%20Elementor&amp;severity=null&amp;id=687782fba83201eaacd97974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54030-cwe-352-cross-site-request-forgery--4156c724</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54030%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WesternDeal%20WooCommerce%20Google%20Sheet%20Connector&amp;severity=null&amp;id=687782fba83201eaacd97971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54026-cwe-89-improper-neutralization-of-s-1319ee15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54026%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20QuanticaLabs%20GymBase%20Theme%20Classes&amp;severity=null&amp;id=687782fba83201eaacd9796e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54024-cwe-79-improper-neutralization-of-i-37f7953d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54024%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=687782fba83201eaacd9796b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54022-cwe-352-cross-site-request-forgery--9b8c8dec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54022%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20Coupon%20Affiliates&amp;severity=null&amp;id=687782faa83201eaacd9795e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54020-cwe-352-cross-site-request-forgery--39b275f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54020%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Erik%20AntiSpam%20for%20Contact%20Form%207&amp;severity=null&amp;id=687782faa83201eaacd9795b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54018-cwe-862-missing-authorization-in-cr-b4de0bd3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54018%3A%20Missing%20Authorization%20in%20CreativeMindsSolutions%20CM%20Pop-Up%20banners&amp;severity=null&amp;id=687782faa83201eaacd97958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54016-cwe-79-improper-neutralization-of-i-0e6a093f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54016%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kyle%20Gilman%20Videopack&amp;severity=null&amp;id=687782faa83201eaacd97955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54015-cwe-98-improper-control-of-filename-4a1c66b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54015%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20HT%20Plugins%20HT%20Contact%20Form%207&amp;severity=null&amp;id=687782faa83201eaacd97952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54013-cwe-79-improper-neutralization-of-i-01e796f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54013%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=null&amp;id=687782faa83201eaacd9794f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54010-cwe-352-cross-site-request-forgery--8e931d4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54010%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjahan%20Jewel%20FluentSnippets&amp;severity=null&amp;id=687782faa83201eaacd9794c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54009-cwe-79-improper-neutralization-of-i-29766ebf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54009%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSmartFilters&amp;severity=null&amp;id=687782faa83201eaacd97949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54006-cwe-79-improper-neutralization-of-i-fad71a1e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=687782faa83201eaacd97946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53997-cwe-862-missing-authorization-in-fa-50ee1550</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53997%3A%20Missing%20Authorization%20in%20favethemes%20Houzez&amp;severity=null&amp;id=687782faa83201eaacd97943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53996-cwe-79-improper-neutralization-of-i-37735cdc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53996%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=null&amp;id=687782faa83201eaacd97936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53995-cwe-79-improper-neutralization-of-i-b0aa2e66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53995%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetPopup&amp;severity=null&amp;id=687782faa83201eaacd97933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53994-cwe-79-improper-neutralization-of-i-dfa446e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53994%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetPopup&amp;severity=null&amp;id=687782faa83201eaacd97930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53991-cwe-79-improper-neutralization-of-i-c95442e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTricks&amp;severity=null&amp;id=687782faa83201eaacd9792d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53990-cwe-502-deserialization-of-untruste-8e56c9f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53990%3A%20Deserialization%20of%20Untrusted%20Data%20in%20jetmonsters%20JetFormBuilder&amp;severity=null&amp;id=687782faa83201eaacd9792a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53989-cwe-79-improper-neutralization-of-i-50d432eb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=null&amp;id=687782faa83201eaacd97927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53986-cwe-862-missing-authorization-in-th-757d7ee6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53986%3A%20Missing%20Authorization%20in%20themeisle%20Hestia&amp;severity=null&amp;id=687782faa83201eaacd97924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53984-cwe-79-improper-neutralization-of-i-2ed9008d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTabs&amp;severity=null&amp;id=687782faa83201eaacd97921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53982-cwe-79-improper-neutralization-of-i-e1bafff5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=687782faa83201eaacd9791e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-in-the-most-popular-survey-software-youve-neve-82d1c5b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20in%20the%20Most%20Popular%20Survey%20Software%20You%E2%80%99ve%20Never%20Heard%20Of&amp;severity=medium&amp;id=687a17e7a83201eaacf1bf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7699-cwe-287-improper-authentication-in-a-c86fe5d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7699%3A%20CWE-287%20Improper%20Authentication%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=68777867a83201eaacd9257c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22227-vulnerability-in-vmware-reactor-net-b533ea6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22227%3A%20Vulnerability%20in%20VMware%20Reactor%20Netty&amp;severity=medium&amp;id=687774e3a83201eaacd91706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40985-cwe-89-improper-neutralization-of-s-fd4607f9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40985%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SCATI%20SCATI%20Vision%20Web&amp;severity=high&amp;id=687774e3a83201eaacd91709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7035-cwe-79-improper-neutralization-of-in-b128e7b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7035%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=68777169a83201eaacd8f4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6993-cwe-862-missing-authorization-in-rus-70993841</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6993%3A%20CWE-862%20Missing%20Authorization%20in%20rustaurius%20Ultimate%20WP%20Mail&amp;severity=high&amp;id=68777169a83201eaacd8f4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5284-cwe-79-improper-neutralization-of-in-f51fabdb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5284%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20For%20Elementor%20%E2%80%93%20Widgets%2C%20Extensions%2C%20Theme%20Builder%2C%20Popup%20Builder%20%26%20Template%20Kits&amp;severity=medium&amp;id=68777169a83201eaacd8f4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-ai-big-sleep-stops-exploitation-of-critical-50e99710</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20AI%20%22Big%20Sleep%22%20Stops%20Exploitation%20of%20Critical%20SQLite%20Vulnerability%20Before%20Hackers%20Act&amp;severity=critical&amp;id=6877715ea83201eaacd8f45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7703-cwe-287-improper-authentication-in-t-2d2db09a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7703%3A%20CWE-287%20Improper%20Authentication%20in%20TECNO%20tech.palm.id&amp;severity=low&amp;id=68776ddba83201eaacd8d5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-execution-through-email-how-i-used-claude-to--8ffd1d55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20Execution%20Through%20Email%3A%20How%20I%20Used%20Claude%20to%20Hack&amp;severity=medium&amp;id=68776352a83201eaacd84bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-secp0-ransomware-ea8f30b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Secp0%20Ransomware&amp;severity=medium&amp;id=68775fcaa83201eaacd81eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/octalyn-stealer-unmasked-fa2ecfc9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OCTALYN%20STEALER%20UNMASKED&amp;severity=medium&amp;id=68775fcaa83201eaacd81ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konfety-returns-classic-mobile-threat-with-new-eva-fbcfc2de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Konfety%20Returns%3A%20Classic%20Mobile%20Threat%20with%20New%20Evasion%20Techniques&amp;severity=medium&amp;id=68775c90a83201eaacd4c60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-asyncrat-navigating-the-labyrinth-of-for-22861dc2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20AsyncRAT%3A%20Navigating%20the%20labyrinth%20of%20forks&amp;severity=medium&amp;id=68775c90a83201eaacd4c677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7673-cwe-120-buffer-copy-without-checking-add3c16d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7673%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zyxel%20VMG8825-T50K%20firmware&amp;severity=critical&amp;id=687751bba83201eaacd46d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6747-cwe-79-improper-neutralization-of-in-59b867a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=68774ab7a83201eaacd4380e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6043-cwe-862-missing-authorization-in-mal-06f85414</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6043%3A%20CWE-862%20Missing%20Authorization%20in%20malcure%20Malcure%20Malware%20Shield%20%E2%80%94%20Removal%2C%20Repair%2C%20Monitor&amp;severity=high&amp;id=68774ab7a83201eaacd43808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5845-cwe-79-improper-neutralization-of-in-de4bf192</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchop%20Affiliate%20Reviews&amp;severity=medium&amp;id=68774ab7a83201eaacd43803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5843-cwe-79-improper-neutralization-of-in-88c8956f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5843%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandfolder%20Brandfolder%20%E2%80%93%20Digital%20Asset%20Management%20Simplified.&amp;severity=medium&amp;id=68774ab7a83201eaacd437fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7359-cwe-22-improper-limitation-of-a-path-7d04a4ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7359%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danielriera%20Counter%20live%20visitors%20for%20WooCommerce&amp;severity=high&amp;id=68774ab7a83201eaacd43812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52690-cwe-77-improper-neutralization-of-s-b1431ff3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52690%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Alcatel-Lucent%20OmniAccess%20Stellar%20Products&amp;severity=high&amp;id=68774ab7a83201eaacd437f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52689-cwe-384-session-fixation-in-alcatel-8cbfa686</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52689%3A%20CWE-384%20Session%20Fixation%20in%20Alcatel-Lucent%20OmniAccess%20Stellar%20Products&amp;severity=critical&amp;id=68774ab7a83201eaacd437f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52688-cwe-77-improper-neutralization-of-s-c90e905b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52688%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Alcatel-Lucent%20OmniAccess%20Stellar%20Products&amp;severity=critical&amp;id=6877472ea83201eaacd4048e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52687-vulnerability-in-alcatel-lucent-omn-e7568f05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52687%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Alcatel-Lucent%20OmniAccess%20Stellar&amp;severity=low&amp;id=6877472ea83201eaacd4048a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2799-cwe-79-improper-neutralization-of-in-210b21e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeventmanager%20WP%20Event%20Manager%20%E2%80%93%20Events%20Calendar%2C%20Registrations%2C%20Sell%20Tickets%20with%20WooCommerce&amp;severity=medium&amp;id=6877391fa83201eaacd3599a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2800-cwe-79-improper-neutralization-of-in-8c38831b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeventmanager%20WP%20Event%20Manager%20%E2%80%93%20Events%20Calendar%2C%20Registrations%2C%20Sell%20Tickets%20with%20WooCommerce&amp;severity=high&amp;id=6877391fa83201eaacd3599e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53842-use-of-hard-coded-credentials-in-ze-468a0867</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53842%3A%20Use%20of%20hard-coded%20credentials%20in%20ZEXELON%20CO.%2C%20LTD.%20ZWX-2000CSW2-HN&amp;severity=medium&amp;id=68772e93a83201eaacd32c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6977-cwe-79-improper-neutralization-of-in-24fae73c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=68772b0ea83201eaacd31d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-16-77028c01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-16&amp;severity=medium&amp;id=687840bda83201eaacdfd997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/keras-215-remote-code-execution-rce-21aa0f41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Keras%202.15%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=687816daa83201eaacdebcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-brokering-file-system-windows-11-version-bb2fbabd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Brokering%20File%20System%20Windows%2011%20Version%2022H2%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=687816daa83201eaacdebc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivotx-300-rc3-remote-code-execution-rce-9a112f96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PivotX%203.0.0%20RC3%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=687816daa83201eaacdebc97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-graphics-component-windows-11-pro-build--a87846c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Graphics%20Component%20Windows%2011%20Pro%20(Build%2026100%2B)%20-%20Local%20Elevation%20of%20Privileges&amp;severity=high&amp;id=687816daa83201eaacdebc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/totolink-n300rb-854-command-execution-2ddc0616</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TOTOLINK%20N300RB%208.54%20-%20Command%20Execution&amp;severity=medium&amp;id=687816daa83201eaacdebc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/langflow-12x-remote-code-execution-rce-2a40eedd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Langflow%201.2.x%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=687816daa83201eaacdebc88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sugarcrm-1400-ssrfcode-injection-a8e058a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SugarCRM%2014.0.0%20-%20SSRF%2FCode%20Injection&amp;severity=medium&amp;id=687816daa83201eaacdebc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mikrotik-routeros-7191-reflected-xss-da830603</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MikroTik%20RouterOS%207.19.1%20-%20Reflected%20XSS&amp;severity=medium&amp;id=687816daa83201eaacdebc7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-star-software-protop-442-2024-11-27-local-fi-8ba4e472</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20Star%20Software%20Protop%204.4.2-2024-11-27%20-%20Local%20File%20Inclusion%20(LFI)&amp;severity=medium&amp;id=687816daa83201eaacdebc79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wp-publications-wordpress-plugin-12-stored-xss-0238b880</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WP%20Publications%20WordPress%20Plugin%201.2%20-%20Stored%20XSS&amp;severity=medium&amp;id=687816daa83201eaacdebc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nodejs-24x-path-traversal-7f1f742a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NodeJS%2024.x%20-%20Path%20Traversal&amp;severity=medium&amp;id=687816daa83201eaacdebc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32353-na-61b49f66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32353%3A%20n%2Fa&amp;severity=high&amp;id=6877bb51a83201eaacdbe12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32874-na-4946bfda</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32874%3A%20n%2Fa&amp;severity=high&amp;id=6877bb51a83201eaacdbe125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-telegram-apps-spread-via-607-domains-in-new-a-25a4f652</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Telegram%20Apps%20Spread%20via%20607%20Domains%20in%20New%20Android%20Malware%20Attack&amp;severity=medium&amp;id=6876c51aa83201eaacd0e079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30761-difficult-to-exploit-vulnerability--8ed55824</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30761%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=6876c198a83201eaacd0caa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6981-cwe-863-incorrect-authorization-in-g-39c68371</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6981%3A%20CWE-863%20Incorrect%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=6876c198a83201eaacd0cab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49841-cwe-502-deserialization-of-untruste-35e76796</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49841%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876c198a83201eaacd0caae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49840-cwe-502-deserialization-of-untruste-932dd2d1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49840%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876c198a83201eaacd0caa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49839-cwe-502-deserialization-of-untruste-9572b18f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49839%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rainbow-hyena-strikes-again-new-backdoor-and-shift-7e1c6be8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rainbow%20Hyena%20strikes%20again%3A%20new%20backdoor%20and%20shift%20in%20tactics&amp;severity=medium&amp;id=68775c90a83201eaacd4c651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49838-cwe-502-deserialization-of-untruste-641f73de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49838%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bcdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49837-cwe-502-deserialization-of-untruste-8c6a3714</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49837%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bcd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49836-cwe-77-improper-neutralization-of-s-736439d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49836%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bd04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49835-cwe-77-improper-neutralization-of-s-692c762e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49835%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bcfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49834-cwe-77-improper-neutralization-of-s-3c75e161</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49834%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49833-cwe-77-improper-neutralization-of-s-b98a3cd2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49833%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49831-cwe-287-improper-authentication-in--6d5b7789</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49831%3A%20CWE-287%3A%20Improper%20Authentication%20in%20cyberark%20conjur&amp;severity=critical&amp;id=6876bae4a83201eaacd0a1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49830-cwe-22-improper-limitation-of-a-pat-8eda23d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49830%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20cyberark%20conjur&amp;severity=high&amp;id=6876b715a83201eaacd0668e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49829-cwe-862-missing-authorization-in-cy-1dde8fef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49829%3A%20CWE-862%3A%20Missing%20Authorization%20in%20cyberark%20conjur&amp;severity=medium&amp;id=6876b38da83201eaacd057b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49828-cwe-1336-improper-neutralization-of-bcb7c7c7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49828%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20cyberark%20conjur&amp;severity=high&amp;id=6876b008a83201eaacd043c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53032-easily-exploitable-vulnerability-al-48e0c985</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53032%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ca83201eaacd044f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53031-easily-exploitable-vulnerability-al-048d64cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53031%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=6876b00ca83201eaacd044f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53030-easily-exploitable-vulnerability-al-fff3b996</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53030%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=6876b00ca83201eaacd044f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53029-easily-exploitable-vulnerability-al-30c9fe3f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53029%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=low&amp;id=6876b00ca83201eaacd044ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53028-easily-exploitable-vulnerability-al-7e717858</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53028%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=6876b00ca83201eaacd044ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53027-easily-exploitable-vulnerability-al-d1dc7d99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53027%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=6876b00ca83201eaacd044e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53026-easily-exploitable-vulnerability-al-c762761c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53026%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=6876b00ca83201eaacd044e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53025-easily-exploitable-vulnerability-al-77d4068f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53025%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=6876b00ca83201eaacd044e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53024-easily-exploitable-vulnerability-al-f9a37606</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53024%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=6876b00ca83201eaacd044d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53023-easily-exploitable-vulnerability-al-32ccecfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53023%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6876b00ca83201eaacd044d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50108-easily-exploitable-vulnerability-al-e2c9e449</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50108%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hyperion%20Financial%20Reporting.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Hyperion%20Financial%20Reporting%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Hyperion%20Financial%20Reporting%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Hyperion%20Financial%20Reporting%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Hyperion%20Financial%20Reporting&amp;severity=medium&amp;id=6876b00ca83201eaacd044ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50107-easily-exploitable-vulnerability-al-9eb2c6ae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50107%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Universal%20Work%20Queue.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Universal%20Work%20Queue%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Universal%20Work%20Queue%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Universal%20Work%20Queue%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Universal%20Work%20Queue&amp;severity=medium&amp;id=6876b00ca83201eaacd044cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50106-difficult-to-exploit-vulnerability--5dbece0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50106%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=6876b00ca83201eaacd044c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50105-easily-exploitable-vulnerability-al-51adf12d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50105%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Universal%20Work%20Queue.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Universal%20Work%20Queue%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Universal%20Work%20Queue%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Universal%20Work%20Queue&amp;severity=high&amp;id=6876b00ca83201eaacd044c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50104-easily-exploitable-vulnerability-al-5eeb7a8c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50104%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6876b00ca83201eaacd044c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50103-difficult-to-exploit-vulnerability--04789bb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50103%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ca83201eaacd044bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50102-easily-exploitable-vulnerability-al-64a447a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50102%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ca83201eaacd044bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50101-easily-exploitable-vulnerability-al-e3c9eae4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50101%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ca83201eaacd044b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50100-difficult-to-exploit-vulnerability--5306c560</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50100%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6876b00ba83201eaacd044ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50099-easily-exploitable-vulnerability-al-d0907318</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50099%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd044a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50098-easily-exploitable-vulnerability-al-440b7d13</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50098%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6876b00ba83201eaacd044a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50097-easily-exploitable-vulnerability-al-5d4f5da0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50097%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd044a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50096-easily-exploitable-vulnerability-al-f70f5aec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50096%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Server%20executes%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd044a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50095-easily-exploitable-vulnerability-al-67ce7e87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50095%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd0449d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50094-easily-exploitable-vulnerability-al-2e308913</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50094%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd0449a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50093-easily-exploitable-vulnerability-al-705c96b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50093%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50092-easily-exploitable-vulnerability-al-aca1d251</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50092%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50091-easily-exploitable-vulnerability-al-de399de3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50091%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50090-easily-exploitable-vulnerability-al-3d012777</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50090%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Applications%20Framework%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Applications%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=6876b00ba83201eaacd04484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50089-easily-exploitable-vulnerability-al-3d0b87f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50089%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50088-easily-exploitable-vulnerability-al-41bc92ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50088%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd0447e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50087-easily-exploitable-vulnerability-al-548cd537</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50087%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20MySQL%20Cluster%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6876b00ba83201eaacd0447b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50086-easily-exploitable-vulnerability-al-233908f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50086%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50085-easily-exploitable-vulnerability-al-785d5fd6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50085%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50084-easily-exploitable-vulnerability-al-6930c830</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50084%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50083-easily-exploitable-vulnerability-al-84f6518a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50083%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd0446f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50082-easily-exploitable-vulnerability-al-616d9947</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50082%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd0446c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50081-difficult-to-exploit-vulnerability--a6af2d74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50081%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Cluster%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Cluster%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=low&amp;id=6876b00ba83201eaacd04469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50080-easily-exploitable-vulnerability-al-4d41d8b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50080%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd0445c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50079-easily-exploitable-vulnerability-al-08b55534</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50079%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd04459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50078-easily-exploitable-vulnerability-al-2e4b3850</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50078%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd04456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50077-easily-exploitable-vulnerability-al-d504e601</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50077%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6876b00aa83201eaacd04453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50076-easily-exploitable-vulnerability-al-10b3b823</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50076%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd04450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50073-easily-exploitable-vulnerability-al-535d091c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50073%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20WebLogic%20Server%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20WebLogic%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd0444d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50072-easily-exploitable-vulnerability-al-c47de3e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50072%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20WebLogic%20Server%20executes%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd0444a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50071-easily-exploitable-vulnerability-al-875387b0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50071%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Applications%20Framework%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Applications%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=6876b00aa83201eaacd04447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50070-difficult-to-exploit-vulnerability--fe62dd35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50070%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20having%20Authenticated%20OS%20User%20privilege%20with%20logon%20to%20the%20infrastructure%20where%20JDBC%20executes%20to%20compromise%20JDBC.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JDBC%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20JDBC%20accessible%20data.%20in%20Oracle%20Corporation%20JDBC&amp;severity=medium&amp;id=6876b00aa83201eaacd04444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50069-easily-exploitable-vulnerability-al-62b4847e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50069%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20having%20Create%20Session%2C%20Create%20Procedure%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20While%20the%20vulnerability%20is%20in%20Java%20VM%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Java%20VM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=6876b00aa83201eaacd04441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50068-easily-exploitable-vulnerability-al-981e9297</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50068%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Cluster%20executes%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6876b00aa83201eaacd04434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50067-easily-exploitable-vulnerability-al-22e8fdaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50067%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Application%20Express.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Application%20Express%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Application%20Express.%20in%20Oracle%20Corporation%20Oracle%20Application%20Express&amp;severity=critical&amp;id=6876b00aa83201eaacd04431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50066-easily-exploitable-vulnerability-al-f57734b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50066%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20Execute%20on%20DBMS_REDEFINITION%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Database%20Materialized%20View.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Database%20Materialized%20View%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=6876b00aa83201eaacd0442e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50065-difficult-to-exploit-vulnerability--2bd74565</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50065%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20GraalVM%20for%20JDK.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20GraalVM%20for%20JDK.%20in%20Oracle%20Corporation%20Oracle%20GraalVM%20for%20JDK&amp;severity=low&amp;id=6876b00aa83201eaacd0442b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50064-easily-exploitable-vulnerability-al-698f1ad0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50064%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20WebLogic%20Server%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20WebLogic%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd04428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50063-easily-exploitable-vulnerability-al-b1902ae3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50063%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%20executes%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Java%20SE.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=6876b00aa83201eaacd04425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50062-easily-exploitable-vulnerability-al-19f5e675</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50062%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Global%20Payroll%20Core.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20HCM%20Global%20Payroll%20Core%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20HCM%20Global%20Payroll%20Core%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Global%20Payroll%20Core&amp;severity=high&amp;id=6876b00aa83201eaacd04422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50061-easily-exploitable-vulnerability-al-3806529d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50061%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Primavera%20P6%20Enterprise%20Project%20Portfolio%20Management.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Primavera%20P6%20Enterprise%20Project%20Portfolio%20Management%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Primavera%20P6%20Enterprise%20Project%20Portfolio%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Primavera%20P6%20Enterprise%20Project%20Portfolio%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20Primavera%20P6%20Enterprise%20Project%20Portfolio%20Management&amp;severity=medium&amp;id=6876b00aa83201eaacd0441f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50060-easily-exploitable-vulnerability-al-0cffb4c2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50060%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20BI%20Publisher.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20BI%20Publisher%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20BI%20Publisher%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20BI%20Publisher&amp;severity=high&amp;id=6876b00aa83201eaacd0441c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50059-easily-exploitable-vulnerability-al-71570e81</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50059%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=6876b00aa83201eaacd04419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30762-easily-exploitable-vulnerability-al-6d688195</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30762%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20T3%2C%20IIOP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=6876b009a83201eaacd04408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30760-easily-exploitable-vulnerability-al-821e4c5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30760%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=6876b009a83201eaacd04405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30759-easily-exploitable-vulnerability-al-1f08a18a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30759%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Business%20Intelligence%20Enterprise%20Edition&amp;severity=medium&amp;id=6876b009a83201eaacd04402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30758-easily-exploitable-vulnerability-al-34f270cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30758%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Siebel%20CRM%20End%20User.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Siebel%20CRM%20End%20User%20accessible%20data.%20in%20Oracle%20Corporation%20Siebel%20CRM%20End%20User&amp;severity=medium&amp;id=6876b009a83201eaacd043ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30756-easily-exploitable-vulnerability-al-959a62b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30756%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20REST%20Data%20Services.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20REST%20Data%20Services%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20REST%20Data%20Services%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20REST%20Data%20Services%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20REST%20Data%20Services&amp;severity=medium&amp;id=6876b009a83201eaacd043fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30754-difficult-to-exploit-vulnerability--977eb099</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30754%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TLS%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=6876b009a83201eaacd043f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30753-easily-exploitable-vulnerability-al-103f7a9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30753%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20WebLogic%20Server.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=6876b009a83201eaacd043f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30752-difficult-to-exploit-vulnerability--a5b49bf3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30752%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=6876b009a83201eaacd043f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30751-easily-exploitable-vulnerability-al-9b35e4cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30751%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20having%20Create%20Session%2C%20Create%20Procedure%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Database.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Database.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=6876b009a83201eaacd043f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30750-easily-exploitable-vulnerability-al-7d176934</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30750%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20Create%20User%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Unified%20Audit.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Unified%20Audit%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=6876b008a83201eaacd043e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30749-difficult-to-exploit-vulnerability--59a318d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30749%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=6876b008a83201eaacd043e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30748-easily-exploitable-vulnerability-al-c1a75a3a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30748%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=6876b008a83201eaacd043dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30747-easily-exploitable-vulnerability-al-a49f7018</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30747%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=6876b008a83201eaacd043da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30746-easily-exploitable-vulnerability-al-d624ba7b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30746%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20iStore.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20iStore%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20iStore%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20iStore%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20iStore&amp;severity=medium&amp;id=6876b008a83201eaacd043d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30745-easily-exploitable-vulnerability-al-73143425</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30745%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20MES%20for%20Process%20Manufacturing.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20MES%20for%20Process%20Manufacturing%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20MES%20for%20Process%20Manufacturing%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20MES%20for%20Process%20Manufacturing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20MES%20for%20Process%20Manufacturing&amp;severity=medium&amp;id=6876b008a83201eaacd043d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30744-easily-exploitable-vulnerability-al-7a36b72e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30744%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Mobile%20Field%20Service.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Mobile%20Field%20Service%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Mobile%20Field%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Mobile%20Field%20Service&amp;severity=high&amp;id=6876b008a83201eaacd043d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30743-easily-exploitable-vulnerability-al-0fab26f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30743%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Lease%20and%20Finance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Lease%20and%20Finance%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Lease%20and%20Finance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Lease%20and%20Finance%20Management&amp;severity=high&amp;id=6876b008a83201eaacd043ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49827-cwe-807-reliance-on-untrusted-input-cd8c53fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49827%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20cyberark%20conjur&amp;severity=critical&amp;id=6876b009a83201eaacd0440b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30739-easily-exploitable-vulnerability-al-db524bd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30739%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20CRM%20Technical%20Foundation.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20CRM%20Technical%20Foundation%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20CRM%20Technical%20Foundation%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20CRM%20Technical%20Foundation%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20CRM%20Technical%20Foundation&amp;severity=medium&amp;id=6876b008a83201eaacd043cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41239-cwe-908-use-of-uninitialized-resour-d5f6d487</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41239%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20VMware%20ESXi&amp;severity=high&amp;id=6876a1f4a83201eaaccfe709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41238-cwe-787-out-of-bounds-write-in-vmwa-071ba4d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41238%3A%20CWE-787%20Out-of-bounds%20Write%20in%20VMware%20ESXi&amp;severity=critical&amp;id=6876a1f4a83201eaaccfe706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41237-cwe-787-out-of-bounds-write-in-vmwa-6e1d4afe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41237%3A%20CWE-787%20Out-of-bounds%20Write%20in%20VMware%20Cloud%20Foundation&amp;severity=critical&amp;id=6876a1f4a83201eaaccfe703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41236-cwe-787-out-of-bounds-write-in-vmwa-ea68248c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41236%3A%20CWE-787%20Out-of-bounds%20Write%20in%20VMware%20ESXi&amp;severity=critical&amp;id=6876a1f4a83201eaaccfe700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-emerged-global-group-raas-expands-operations-d8520e00</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Emerged%20GLOBAL%20GROUP%20RaaS%20Expands%20Operations%20with%20AI-Driven%20Negotiation%20Tools&amp;severity=high&amp;id=68769e6ea83201eaaccfd98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hyper-volumetric-ddos-attacks-reach-record-73-tbps-e2aea9f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hyper-Volumetric%20DDoS%20Attacks%20Reach%20Record%207.3%20Tbps%2C%20Targeting%20Key%20Global%20Sectors&amp;severity=high&amp;id=68769e6ea83201eaaccfd991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-disrupt-diskstation-ransomware-gang-attacki-7ebf1777</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20disrupt%20%E2%80%9CDiskstation%E2%80%9D%20ransomware%20gang%20attacking%20NAS%20devices&amp;severity=high&amp;id=68769e6ea83201eaaccfd989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53903-cwe-79-improper-neutralization-of-i-79856e1e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53903%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The-Scratch-Channel%20the-scratch-channel.github.io&amp;severity=low&amp;id=68769e9ca83201eaaccfda5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7657-use-after-free-in-google-chrome-b4653c1a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7657%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68769aeba83201eaaccfd390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6558-insufficient-validation-of-untrusted-60b1a264</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6558%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=68769aeba83201eaaccfd388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7656-integer-overflow-in-google-chrome-8310d91c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7656%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68769aeba83201eaaccfd38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-hide-javascript-in-svg-images-to-lure-us-f5c305bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Hide%20JavaScript%20in%20SVG%20Images%20to%20Lure%20Users%20to%20Malicious%20Sites&amp;severity=medium&amp;id=687693e0a83201eaaccfa202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53959-cwe-862-in-jetbrains-youtrack-daba85dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53959%3A%20CWE-862%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=6876826ca83201eaaccf758f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/belk-hit-by-may-cyberattack-dragonforce-stole-150g-0b854907</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Belk%20hit%20by%20May%20cyberattack%3A%20DragonForce%20stole%20150GB%20of%20data&amp;severity=high&amp;id=6876824ba83201eaaccf7537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-konfety-uses-malformed-apks-to-eva-aa694956</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20malware%20Konfety%20uses%20malformed%20APKs%20to%20evade%20detection&amp;severity=high&amp;id=6876824ba83201eaaccf7533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7042-cwe-416-use-after-free-in-dassault-s-8931000f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7042%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6974-cwe-457-use-of-uninitialized-variabl-5b4c9f3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6974%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6973-cwe-416-use-after-free-in-dassault-s-e63718a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6973%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6972-cwe-416-use-after-free-in-dassault-s-8516e859</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6972%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6971-cwe-416-use-after-free-in-dassault-s-70432ac0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6971%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0831-cwe-125-out-of-bounds-read-in-dassau-8c0b321b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0831%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30483-cwe-532-insertion-of-sensitive-info-eeb9ad56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30483%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20ECS&amp;severity=medium&amp;id=687669b1a83201eaaccf1d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33097-cwe-79-in-ibm-qradar-siem-b13a8e90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33097%3A%20CWE-79%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=687669b1a83201eaaccf1d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48795-cwe-400-uncontrolled-resource-consu-5c54736b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48795%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20CXF&amp;severity=medium&amp;id=687669b1a83201eaaccf1d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/homebrew-malware-campaign-50170dd3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Homebrew%20Malware%20Campaign&amp;severity=medium&amp;id=687669b6a83201eaaccf1d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34107-cwe-121-stack-based-buffer-overflow-074e71f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34107%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20LabF%20WinaXe%20FTP%20Client&amp;severity=high&amp;id=687654a5a83201eaaccea50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34103-cwe-78-improper-neutralization-of-s-a2b202ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34103%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WePresent%20(Barco)%20WiPG-1000&amp;severity=critical&amp;id=687654a5a83201eaaccea4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34111-cwe-434-unrestricted-upload-of-file-9d22fca7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34111%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Tiki%20Software%20Community%20Association%20Wiki%20CMS%20Groupware&amp;severity=critical&amp;id=687654a5a83201eaaccea526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34113-cwe-306-missing-authentication-for--35dbba99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34113%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Tiki%20Software%20Community%20Association%20Wiki%20CMS%20Groupware&amp;severity=high&amp;id=687654a5a83201eaaccea53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34068-cwe-78-improper-neutralization-of-s-0c9c1475</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34068%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Samsung%20Electronics%20WLAN%20AP%20WEA453e&amp;severity=critical&amp;id=687654a5a83201eaaccea4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34112-cwe-89-improper-neutralization-of-s-66cce053</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34112%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Riverbed%20Technology%20SteelCentral%20NetExpress&amp;severity=critical&amp;id=687654a5a83201eaaccea536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34104-cwe-434-unrestricted-upload-of-file-fb2ed972</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34104%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Piwik%20(now%20Matomo)%20Web%20Analytics%20Platform&amp;severity=critical&amp;id=687654a5a83201eaaccea4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34106-cwe-119-improper-restriction-of-ope-5b06c5f4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34106%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Burnaware%20PDF%20Shaper&amp;severity=high&amp;id=687654a5a83201eaaccea505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34109-cwe-427-uncontrolled-search-path-el-d01505a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34109%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Panda%20Security%20Panda%20Global%20Protection%202016&amp;severity=high&amp;id=687654a5a83201eaaccea519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34115-cwe-78-improper-neutralization-of-s-69938142</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34115%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ITRS%20Group%20OP5%20Monitor&amp;severity=high&amp;id=687654a5a83201eaaccea543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34116-cwe-78-improper-neutralization-of-s-5d84418b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34116%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IPFire%20Project%20IPFire&amp;severity=high&amp;id=687654a5a83201eaaccea549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34105-cwe-20-improper-input-validation-in-919d542a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34105%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Flexense%20DiskBoss%20Enterprise&amp;severity=critical&amp;id=687654a5a83201eaaccea4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-pet-owners-targeted-by-fake-microchip-renewal-s-3e8e454b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Pet%20Owners%20Targeted%20by%20Fake%20Microchip%20Renewal%20Scams&amp;severity=medium&amp;id=68765497a83201eaaccea4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34108-cwe-121-stack-based-buffer-overflow-8331a3d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34108%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Falconstor%20Software%20Disk%20Pulse%20Enterprise&amp;severity=high&amp;id=687654a5a83201eaaccea512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34110-cwe-22-improper-limitation-of-a-pat-5e0fae7d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34110%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ColoradoFTP%20Server&amp;severity=critical&amp;id=687654a5a83201eaaccea520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asyncrats-open-source-code-sparks-surge-in-dangero-7a844e06</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AsyncRAT&apos;s%20Open-Source%20Code%20Sparks%20Surge%20in%20Dangerous%20Malware%20Variants%20Across%20the%20Globe&amp;severity=high&amp;id=68765112a83201eaacce93d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/state-backed-hazybeacon-malware-uses-aws-lambda-to-ff817ce1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=State-Backed%20HazyBeacon%20Malware%20Uses%20AWS%20Lambda%20to%20Steal%20Data%20from%20SE%20Asian%20Governments&amp;severity=high&amp;id=68765112a83201eaacce93de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7667-cwe-352-cross-site-request-forgery-c-5393875d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7667%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20josxha%20Restrict%20File%20Access&amp;severity=high&amp;id=68763bfda83201eaacce4b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-flood-npm-registry-with-xorin-25d4973e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Flood%20npm%20Registry%20with%20XORIndex%20Malware%20in%20Ongoing%20Attack%20Campaign&amp;severity=high&amp;id=6876316da83201eaacce1e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doge-denizen-marko-elez-leaked-api-key-for-xai-5e0b0302</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DOGE%20Denizen%20Marko%20Elez%20Leaked%20API%20Key%20for%20xAI&amp;severity=high&amp;id=687626e1a83201eaaccdff34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seized-multiple-piracy-sites-distributing-pira-3a571ded</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20seized%20multiple%20piracy%20sites%20distributing%20pirated%20video%20games&amp;severity=medium&amp;id=687626e1a83201eaaccdff3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4369-cwe-79-improper-neutralization-of-in-6c92bc1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20papin%20Companion%20Auto%20Update&amp;severity=medium&amp;id=68761fd9a83201eaaccdead4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24477-escalation-of-privilege-in-fortinet-528c83de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24477%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=687611c9a83201eaaccd94f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7672-cwe-79-improper-neutralization-of-in-68844ecb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JiranSoft%20CrossEditor4&amp;severity=low&amp;id=687603bda83201eaaccd60fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3621-cwe-77-improper-neutralization-of-sp-2d40ff80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3621%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ProTNS%20ActADUR&amp;severity=critical&amp;id=687603bda83201eaaccd60fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7340-cwe-434-unrestricted-upload-of-file--e14c8bc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7340%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20htplugins%20HT%20Contact%20Form%20%E2%80%93%20Drag%20%26%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=critical&amp;id=6875d989a83201eaacccacf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7360-cwe-22-improper-limitation-of-a-path-48960e48</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7360%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20htplugins%20HT%20Contact%20Form%20%E2%80%93%20Drag%20%26%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=critical&amp;id=6875d989a83201eaacccacfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7367-cwe-79-improper-neutralization-of-in-940bad2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=6875d989a83201eaacccad02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7341-cwe-269-improper-privilege-managemen-04354ed1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7341%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20htplugins%20HT%20Contact%20Form%20%E2%80%93%20Drag%20%26%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=critical&amp;id=6875d989a83201eaacccacf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5394-cwe-862-missing-authorization-in-bea-ab3af619</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5394%3A%20CWE-862%20Missing%20Authorization%20in%20Bearsthemes%20Alone%20%E2%80%93%20Charity%20Multipurpose%20Non-profit%20WordPress%20Theme&amp;severity=critical&amp;id=6875d2dfa83201eaaccc9375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5393-cwe-73-external-control-of-file-name-b45083e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5393%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Bearsthemes%20Alone%20%E2%80%93%20Charity%20Multipurpose%20Non-profit%20WordPress%20Theme&amp;severity=critical&amp;id=6875d2dfa83201eaaccc9371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6265-cwe-22-improper-limitation-of-a-path-8caabc1e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6265%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zyxel%20NWA50AX%20PRO%20firmware&amp;severity=high&amp;id=6875b667a83201eaaccc25e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53891-cwe-434-unrestricted-upload-of-file-f93c18da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53891%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20TimeLineOfficial%20Time-Line-&amp;severity=medium&amp;id=68759dc5a83201eaaccb4e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-15-4d87fda0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-15&amp;severity=medium&amp;id=6876ef3da83201eaacd1c7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26186-na-e96b626e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26186%3A%20n%2Fa&amp;severity=high&amp;id=68768cdda83201eaaccf939e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52082-na-c4831016</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52082%3A%20n%2Fa&amp;severity=medium&amp;id=68767b45a83201eaaccf63f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52081-na-28a67128</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52081%3A%20n%2Fa&amp;severity=medium&amp;id=68767b45a83201eaaccf63ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52080-na-c7cf787a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52080%3A%20n%2Fa&amp;severity=medium&amp;id=68767b45a83201eaaccf63ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50819-na-728a4fc4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50819%3A%20n%2Fa&amp;severity=high&amp;id=6876743da83201eaaccf5583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52377-na-613242f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52377%3A%20n%2Fa&amp;severity=medium&amp;id=68766d35a83201eaaccf34c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52379-na-46633e21</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52379%3A%20n%2Fa&amp;severity=medium&amp;id=687669b1a83201eaaccf1d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52378-na-afcf0682</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52378%3A%20n%2Fa&amp;severity=medium&amp;id=6876662ca83201eaaccf13bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52376-na-cf52445c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52376%3A%20n%2Fa&amp;severity=critical&amp;id=687662afa83201eaaccf09bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53839-cwe-79-improper-neutralization-of-i-353db707</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53839%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dracoon%20security-advisories&amp;severity=medium&amp;id=6876b38da83201eaacd057bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53836-cwe-863-incorrect-authorization-in--d7118136</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53836%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20xwiki%20xwiki-rendering&amp;severity=critical&amp;id=6876b38da83201eaacd057b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53835-cwe-79-improper-neutralization-of-i-71092183</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53835%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-rendering&amp;severity=critical&amp;id=68758fb5a83201eaaccb2975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53833-cwe-1336-improper-neutralization-of-a831857e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53833%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20saleem-hadad%20larecipe&amp;severity=critical&amp;id=68758c31a83201eaaccb1779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53824-cwe-79-improper-neutralization-of-i-91d75a27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53824%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=687588ada83201eaaccb1207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53823-cwe-89-improper-neutralization-of-s-b041eb53</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53823%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=687588ada83201eaaccb120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53822-cwe-79-improper-neutralization-of-i-4c9a40ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53822%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=687588ada83201eaaccb120a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53821-cwe-601-url-redirection-to-untruste-7261d6a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53821%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68758529a83201eaaccb0bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-basketball-star-daniil-kasatkin-arrested-i-5e98058e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Basketball%20Star%20Daniil%20Kasatkin%20Arrested%20in%20Ransomware%20Probe&amp;severity=medium&amp;id=68757e1fa83201eaaccafd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53820-cwe-79-improper-neutralization-of-i-4cf84087</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53820%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68757011a83201eaaccacdc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53819-cwe-271-privilege-dropping-lowering-15b97ecb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53819%3A%20CWE-271%3A%20Privilege%20Dropping%20%2F%20Lowering%20Errors%20in%20NixOS%20nix&amp;severity=high&amp;id=68756c8da83201eaaccac0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53818-cwe-78-improper-neutralization-of-s-e2286be8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53818%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sunwood-ai-labs%20github-kanban-mcp-server&amp;severity=high&amp;id=68756c8da83201eaaccac0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53643-cwe-444-inconsistent-interpretation-68f10362</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53643%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=6875696ba83201eaaccaa8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53623-cwe-78-improper-neutralization-of-s-cfb16af6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53623%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shopify%20job-iteration&amp;severity=high&amp;id=68756214a83201eaacc9e211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-adopts-filefix-method-to-deli-d32ca324</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20ransomware%20adopts%20FileFix%20method%20to%20deliver%20malware&amp;severity=high&amp;id=687561ffa83201eaacc9e1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-jailbreak-grok-4-ai-within-48-hours-of-8551d24c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Jailbreak%20Grok-4%20AI%20Within%2048%20Hours%20of%20Launch&amp;severity=medium&amp;id=68755778a83201eaacc9ab1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gigabyte-motherboards-vulnerable-to-uefi-malware-b-510f7adf</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gigabyte%20motherboards%20vulnerable%20to%20UEFI%20malware%20bypassing%20Secure%20Boot&amp;severity=high&amp;id=68754968a83201eaacc8ea9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/louis-vuitton-uk-hit-by-cyberattack-third-lvmh-bre-c486f332</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Louis%20Vuitton%20UK%20Hit%20by%20Cyberattack%2C%20Third%20LVMH%20Breach%20in%203%20Months&amp;severity=high&amp;id=68754968a83201eaacc8ea9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7628-path-traversal-in-yijiusmile-kkfilev-d080c0be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7628%3A%20Path%20Traversal%20in%20YiJiuSmile%20kkFileViewOfficeEdit&amp;severity=medium&amp;id=68754984a83201eaacc8eaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7627-unrestricted-upload-in-yijiusmile-kk-7a7bf83e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7627%3A%20Unrestricted%20Upload%20in%20YiJiuSmile%20kkFileViewOfficeEdit&amp;severity=medium&amp;id=6875425ba83201eaacc8b915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7626-path-traversal-in-yijiusmile-kkfilev-c7a419ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7626%3A%20Path%20Traversal%20in%20YiJiuSmile%20kkFileViewOfficeEdit&amp;severity=medium&amp;id=68753b53a83201eaacc84e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7625-path-traversal-in-yijiusmile-kkfilev-87c35334</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7625%3A%20Path%20Traversal%20in%20YiJiuSmile%20kkFileViewOfficeEdit&amp;severity=medium&amp;id=687530c7a83201eaacc8223c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7616-memory-corruption-in-gmg137-snap7-rs-82be2028</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7616%3A%20Memory%20Corruption%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=6875263ba83201eaacc7f113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7615-command-injection-in-totolink-t6-e3e50559</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7615%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=687522b7a83201eaacc7ca81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7614-command-injection-in-totolink-t6-e739b542</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7614%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=68751f33a83201eaacc7c00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7613-command-injection-in-totolink-t6-f7b2f8a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7613%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=68751bafa83201eaacc7aa8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-forensic-technique-uncovers-hidden-trails-left-1e083e77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Forensic%20Technique%20Uncovers%20Hidden%20Trails%20Left%20by%20Hackers%20Exploiting%20Remote%20Desktop%20Protocol&amp;severity=high&amp;id=68751828a83201eaacc7859f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7612-sql-injection-in-code-projects-mobil-6a79fa05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7612%3A%20SQL%20Injection%20in%20code-projects%20Mobile%20Shop&amp;severity=medium&amp;id=68751835a83201eaacc785de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7611-sql-injection-in-code-projects-weddi-1dfcd0b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7611%3A%20SQL%20Injection%20in%20code-projects%20Wedding%20Reservation&amp;severity=medium&amp;id=687514a8a83201eaacc75dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/behind-the-clouds-attackers-targeting-governments--e7eb126e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Behind%20the%20Clouds%3A%20Attackers%20Targeting%20Governments%20in%20Southeast%20Asia%20Implement%20Novel%20Covert%20C2%20Communication&amp;severity=medium&amp;id=68761fd8a83201eaaccdeaaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7610-sql-injection-in-code-projects-elect-0f59932d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7610%3A%20SQL%20Injection%20in%20code-projects%20Electricity%20Billing%20System&amp;severity=medium&amp;id=68751122a83201eaacc74adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealthy-php-malware-uses-zip-archive-to-redirect--c2684475</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealthy%20PHP%20Malware%20Uses%20ZIP%20Archive%20to%20Redirect%20WordPress%20Visitors&amp;severity=medium&amp;id=68750da0a83201eaacc72b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/norddragonscan-quiet-data-harvester-on-windows-b198a370</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NordDragonScan%3A%20Quiet%20Data-Harvester%20on%20Windows&amp;severity=medium&amp;id=68750da0a83201eaacc72b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7609-sql-injection-in-code-projects-simpl-7decc8dd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7609%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=68751122a83201eaacc74ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7519-out-of-bounds-write-in-red-hat-red-h-f44bae2a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7519%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=68750da0a83201eaacc72b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7608-sql-injection-in-code-projects-simpl-524547f1</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7608%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6875696ba83201eaaccaa8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7607-sql-injection-in-code-projects-simpl-154d7777</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7607%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=68750696a83201eaacc6cd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7606-sql-injection-in-code-projects-avl-r-646aeb1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7606%3A%20SQL%20Injection%20in%20code-projects%20AVL%20Rooms&amp;severity=medium&amp;id=68750312a83201eaacc6b38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recruitment-themed-phishing-campaign-7e1fc6b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recruitment%20Themed%20Phishing%20Campaign&amp;severity=medium&amp;id=6874ff92a83201eaacc68976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7605-sql-injection-in-code-projects-avl-r-8a2f99fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7605%3A%20SQL%20Injection%20in%20code-projects%20AVL%20Rooms&amp;severity=medium&amp;id=6874ff8ea83201eaacc68960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7604-sql-injection-in-phpgurukul-hospital-28072852</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7604%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=6874fc0aa83201eaacc6625b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7603-stack-based-buffer-overflow-in-d-lin-8dfd2d70</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7603%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=6874f886a83201eaacc63576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7602-stack-based-buffer-overflow-in-d-lin-5b3f0ab0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7602%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=6874f502a83201eaacc5fb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/louis-vuitton-uk-latest-retailer-hit-by-data-breac-9f03655d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Louis%20Vuitton%20UK%20Latest%20Retailer%20Hit%20by%20Data%20Breach&amp;severity=high&amp;id=6874f17ba83201eaacc5e5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/likely-belarus-nexus-threat-actor-delivers-downloa-0e58802e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Likely%20Belarus-Nexus%20Threat%20Actor%20Delivers%20Downloader%20to%20Poland&amp;severity=medium&amp;id=68750a19a83201eaacc714d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7601-cross-site-scripting-in-phpgurukul-o-b7afc126</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7601%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=6874f886a83201eaacc6357d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7600-sql-injection-in-phpgurukul-online-l-d3bc7777</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7600%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=6874edf9a83201eaacc5d3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7599-sql-injection-in-phpgurukul-dairy-fa-d2dbf9d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7599%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874ea75a83201eaacc5b162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7598-stack-based-buffer-overflow-in-tenda-225199db</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7598%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AX1803&amp;severity=high&amp;id=6874e6f4a83201eaacc53dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7597-stack-based-buffer-overflow-in-tenda-b4ddcf1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7597%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AX1803&amp;severity=high&amp;id=6874ff8ea83201eaacc68967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fooling-the-sandbox-a-chrome-atic-escape-1227b1c1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fooling%20the%20Sandbox%3A%20A%20Chrome-atic%20Escape&amp;severity=medium&amp;id=6874dff1a83201eaacc50ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7596-stack-based-buffer-overflow-in-tenda-6cf6fd04</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7596%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1205&amp;severity=high&amp;id=6874dfeba83201eaacc50aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51768-vulnerability-in-hewlett-packard-en-ac3fcea2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51768%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20AutoPass%20License%20Server&amp;severity=high&amp;id=69a0a1ce85912abc71d0be8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7618-cwe-79-improper-neutralization-of-in-a2f14200</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=6874dc67a83201eaacc4eaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7595-sql-injection-in-code-projects-job-d-c27d7fcb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7595%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=6874dc67a83201eaacc4eaed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7594-sql-injection-in-code-projects-job-d-f64305c3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7594%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=6874d8eda83201eaacc4c86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7593-sql-injection-in-code-projects-job-d-f4dd7a09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7593%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=6874d55fa83201eaacc4ba3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7592-sql-injection-in-phpgurukul-dairy-fa-e8c17f93</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7592%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874d1dba83201eaacc4b152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cbi-shuts-down-390k-uk-tech-support-scam-arrests-k-848b99a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CBI%20Shuts%20Down%20%C2%A3390K%20U.K.%20Tech%20Support%20Scam%2C%20Arrests%20Key%20Operatives%20in%20Noida%20Call%20Center&amp;severity=high&amp;id=6874ce5ba83201eaacc48c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53689-cwe-611-improper-restriction-of-xml-ed4f574a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53689%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Jackrabbit&amp;severity=high&amp;id=6874ce68a83201eaacc48c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7591-sql-injection-in-phpgurukul-dairy-fa-cdeb0956</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7591%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874cad8a83201eaacc466d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7590-sql-injection-in-phpgurukul-dairy-fa-487ac9ea</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7590%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874cad8a83201eaacc466d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7589-sql-injection-in-phpgurukul-dairy-fa-d9663f3c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7589%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874c74fa83201eaacc45148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7588-sql-injection-in-phpgurukul-dairy-fa-7624dbba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7588%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874c3cba83201eaacc432d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/revisiting-automating-ms-rpc-vulnerability-researc-e70e8929</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Revisiting%20automating%20MS-RPC%20vulnerability%20research%20and%20making%20the%20tool%20open%20source&amp;severity=medium&amp;id=6874c3cda83201eaacc432ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24391-cwe-203-observable-discrepancy-in-o-c6eb3030</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24391%3A%20CWE-203%20Observable%20Discrepancy%20in%20OTRS%20AG%20OTRS&amp;severity=medium&amp;id=6874c046a83201eaacc38abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7587-sql-injection-in-code-projects-onlin-3654ae7c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7587%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=6874c046a83201eaacc38ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7586-stack-based-buffer-overflow-in-tenda-45503775</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7586%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC500&amp;severity=high&amp;id=6874bcc3a83201eaacc37452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7585-sql-injection-in-phpgurukul-online-f-4d6f1269</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7585%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6875263ba83201eaacc7f10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7584-sql-injection-in-phpgurukul-online-f-bf8dd7b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7584%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6874b5bba83201eaacc33364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7583-sql-injection-in-phpgurukul-online-f-b3ebb4f5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7583%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6874b237a83201eaacc3035f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7582-sql-injection-in-phpgurukul-online-f-2184d2cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7582%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6874aeb3a83201eaacc2f68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7581-sql-injection-in-code-projects-votin-507fc097</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7581%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=6874ab2fa83201eaacc2c185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7580-sql-injection-in-code-projects-votin-956350c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7580%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=6874a7aba83201eaacc2b885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7579-inefficient-regular-expression-compl-4b3a07e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7579%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20chinese-poetry&amp;severity=medium&amp;id=6874a428a83201eaacc29d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7578-command-injection-in-teledyne-flir-f-67893bac</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7578%3A%20Command%20Injection%20in%20Teledyne%20FLIR%20FB-Series%20O&amp;severity=low&amp;id=6874a0a5a83201eaacc25f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7577-use-of-hard-coded-password-in-teledy-6da41522</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7577%3A%20Use%20of%20Hard-coded%20Password%20in%20Teledyne%20FLIR%20FB-Series%20O&amp;severity=medium&amp;id=68749d1fa83201eaacc242b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7380-cwe-79-improper-neutralization-of-in-28baa4b6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7380%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=6874999ba83201eaacc2347a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7576-improper-access-controls-in-teledyne-7d3b33fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7576%3A%20Improper%20Access%20Controls%20in%20Teledyne%20FLIR%20FB-Series%20O&amp;severity=medium&amp;id=6874999ba83201eaacc2347d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7575-path-traversal-in-zavy86-wikidocs-fd1bc874</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7575%3A%20Path%20Traversal%20in%20Zavy86%20WikiDocs&amp;severity=medium&amp;id=68749293a83201eaacc2106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7574-improper-authentication-in-lb-link-b-84743308</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7574%3A%20Improper%20Authentication%20in%20LB-LINK%20BL-AC1900&amp;severity=critical&amp;id=68749293a83201eaacc21077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7573-information-disclosure-in-lb-link-bl-42c2648a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7573%3A%20Information%20Disclosure%20in%20LB-LINK%20BL-AC1900&amp;severity=medium&amp;id=68748f0fa83201eaacc1f7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7572-information-disclosure-in-lb-link-bl-af0dbb17</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7572%3A%20Information%20Disclosure%20in%20LB-LINK%20BL-AC1900&amp;severity=medium&amp;id=68748f0fa83201eaacc1f7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7571-buffer-overflow-in-utt-hiper-840g-97b04655</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7571%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=68748807a83201eaacc19cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7570-buffer-overflow-in-utt-hiper-840g-2826a053</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7570%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=68748483a83201eaacc193cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7569-cross-site-scripting-in-bigotry-oneb-69509501</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7569%3A%20Cross%20Site%20Scripting%20in%20Bigotry%20OneBase&amp;severity=medium&amp;id=687480ffa83201eaacc17f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7568-sql-injection-in-qianfox-foxcms-ee895133</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7568%3A%20SQL%20Injection%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=687480ffa83201eaacc17f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7620-cwe-494-download-of-code-without-int-6d5cbd1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7620%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20DSIC%20Cross-browser%20Components%20for%20Official%20Document%20Creation&amp;severity=high&amp;id=68747a01a83201eaacc15742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7567-cross-site-scripting-in-shopxo-51da94c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7567%3A%20Cross%20Site%20Scripting%20in%20ShopXO&amp;severity=medium&amp;id=68747a01a83201eaacc15737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7566-path-traversal-in-jsherp-91ef9df3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7566%3A%20Path%20Traversal%20in%20jshERP&amp;severity=medium&amp;id=68747a01a83201eaacc15730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7619-cwe-23-relative-path-traversal-in-we-24db45bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7619%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20WellChoose%20BatchSignCS&amp;severity=high&amp;id=68747a01a83201eaacc1573e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7565-information-disclosure-in-lb-link-bl-dbf5fe1b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7565%3A%20Information%20Disclosure%20in%20LB-LINK%20BL-AC3600&amp;severity=medium&amp;id=68747a01a83201eaacc15729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7451-cwe-78-improper-neutralization-of-sp-fd0e6111</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7451%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hgiga%20iSherlock-maillog-4.5&amp;severity=critical&amp;id=68746f6ba83201eaacc117ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7564-hard-coded-credentials-in-lb-link-bl-7b669254</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7564%3A%20Hard-coded%20Credentials%20in%20LB-LINK%20BL-AC3600&amp;severity=high&amp;id=68746f6ba83201eaacc117fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7563-sql-injection-in-phpgurukul-online-f-4c68a592</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7563%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68746f6ba83201eaacc117f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7562-sql-injection-in-phpgurukul-online-f-e5ab800d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7562%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68746f6ba83201eaacc117f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7561-sql-injection-in-phpgurukul-online-f-830e32d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7561%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=687464dfa83201eaacc09f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kongtuke-filefix-leads-to-new-interlock-rat-varian-e62b5cd5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KongTuke%20FileFix%20Leads%20to%20New%20Interlock%20RAT%20Variant&amp;severity=medium&amp;id=6874616ea83201eaacc093da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25180-cwe-cwe-823-use-of-out-of-range-poi-c1330c90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25180%3A%20CWE%20-%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20(4.17)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=687464dfa83201eaacc09f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7560-sql-injection-in-phpgurukul-online-f-2c11376c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7560%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=687464dfa83201eaacc09f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7559-sql-injection-in-phpgurukul-online-f-0faacd94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7559%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=687464dfa83201eaacc09f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7558-sql-injection-in-code-projects-votin-09e281f0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7558%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68745a53a83201eaacc06e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7557-sql-injection-in-code-projects-votin-73dbdfdf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7557%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68745a53a83201eaacc06e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7556-sql-injection-in-code-projects-votin-115c7644</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7556%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=6874534ba83201eaacc03a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7555-sql-injection-in-code-projects-votin-9e71af1a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7555%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=6874534ba83201eaacc03a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7554-cross-site-scripting-in-sapido-rb-18-4518ba3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7554%3A%20Cross%20Site%20Scripting%20in%20Sapido%20RB-1802&amp;severity=medium&amp;id=6874534ba83201eaacc03a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-14-5ef69368</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-14&amp;severity=medium&amp;id=68759dbda83201eaaccb4c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52363-na-b4dcc6e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52363%3A%20n%2Fa&amp;severity=medium&amp;id=68753ed7a83201eaacc86fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51660-na-5523efe7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51660%3A%20n%2Fa&amp;severity=medium&amp;id=687537d0a83201eaacc846a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51659-na-5e2b25bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51659%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51658-na-c4bd0584</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51658%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51657-na-0e473666</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51657%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc8468c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51656-na-5cc89ef6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51656%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51655-na-3f8a6b71</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51655%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc8467e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51654-na-59410943</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51654%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51653-na-3f515b51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51653%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51652-na-9657f981</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51652%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc8466f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51651-na-3704f3d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51651%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc8466c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51650-na-9490436e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51650%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50756-na-a49e8b67</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50756%3A%20n%2Fa&amp;severity=critical&amp;id=687514a8a83201eaacc75df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27582-cwe-829-inclusion-of-functionality--be4e6266</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27582%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20One%20Identity%20Password%20Manager&amp;severity=high&amp;id=6874fc0aa83201eaacc66258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29606-cwe-770-allocation-of-resources-wit-ce467c27</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29606%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20libp2p%20py-libp2p&amp;severity=medium&amp;id=68748807a83201eaacc19ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7553-os-command-injection-in-d-link-dir-8-cfd51a0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7553%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-818LW&amp;severity=medium&amp;id=687448bea83201eaacbf81c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1384-cwe-272-least-privilege-violation-in-c8c24f6e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1384%3A%20CWE-272%20Least%20Privilege%20Violation%20in%20OMRON%20Corporation%20Machine%20Automation%20Controller%20NJ-series&amp;severity=high&amp;id=687448bea83201eaacbf81bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7552-improper-access-controls-in-dromara--c7919014</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7552%3A%20Improper%20Access%20Controls%20in%20Dromara%20Northstar&amp;severity=medium&amp;id=68744540a83201eaacbf7a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7551-stack-based-buffer-overflow-in-tenda-cca151fb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7551%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=687441b7a83201eaacbf67d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7550-stack-based-buffer-overflow-in-tenda-9020d358</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7550%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=68743e33a83201eaacbf59d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7549-stack-based-buffer-overflow-in-tenda-842a5eb6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7549%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=68743abba83201eaacbf4d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7548-stack-based-buffer-overflow-in-tenda-cd3451c1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7548%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=6874372ba83201eaacbf3d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1735-cwe-89-improper-neutralization-of-sp-9ae985f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1735%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=6874372ba83201eaacbf3d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1220-cwe-918-server-side-request-forgery--81d8b0a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1220%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PHP%20Group%20PHP&amp;severity=low&amp;id=687433a7a83201eaacbf2beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7547-unrestricted-upload-in-campcodes-onl-a5cd631b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7547%3A%20Unrestricted%20Upload%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=687433a7a83201eaacbf2bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6491-cwe-476-null-pointer-dereference-in--f8fd310d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6491%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=68743023a83201eaacbf14dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7546-out-of-bounds-write-in-gnu-binutils-eb252c2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7546%3A%20Out-of-bounds%20Write%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68743023a83201eaacbf14e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7545-heap-based-buffer-overflow-in-gnu-bi-7156f763</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7545%3A%20Heap-based%20Buffer%20Overflow%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68742ca0a83201eaacbf0c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7544-stack-based-buffer-overflow-in-tenda-403ad417</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7544%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC1206&amp;severity=high&amp;id=68742921a83201eaacbefc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7543-sql-injection-in-phpgurukul-user-reg-6e095910</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7543%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=68742598a83201eaacbea976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7542-sql-injection-in-phpgurukul-user-reg-efee4a4e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7542%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=68742213a83201eaacbe9f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7541-sql-injection-in-code-projects-onlin-a85699e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7541%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68741b0ba83201eaacbe6f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7540-sql-injection-in-code-projects-onlin-1da5c10b</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7540%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=6874140da83201eaacbe268c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hello-excuse-my-intrusion-but-i-need-help-surfing--8a3aa21e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hello%2C%20excuse%20my%20intrusion%2C%20but%20I%20need%20help%20surfing%20the%20Internet.%20I%20found%20an%20encrypted%20code%20and%20it%20seems%20to%20contain%20some%20kind%20of%20page.%20I%20suppose%20because%20they%20give%20a%20password%20below%2C%20but%20I%20don&apos;t%20know%20what%20it%20is%2C%20could%20you%20help%20me%20please%3F%20I&apos;ll%20give%20you%20the%20link%20to%20the%20post%20in%20case%20you%20can%20help%20me%20https&amp;severity=medium&amp;id=68741414a83201eaacbe2698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7539-sql-injection-in-code-projects-onlin-3a6fbc56</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7539%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68740cfaa83201eaacbdf89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7538-unrestricted-upload-in-campcodes-sal-3473ec7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7538%3A%20Unrestricted%20Upload%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=687405f7a83201eaacbdb1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7537-sql-injection-in-campcodes-sales-and-bd0569b4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7537%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=6873feeba83201eaacbd60cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7536-sql-injection-in-campcodes-sales-and-8bcf7bb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7536%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=6873f7e2a83201eaacbd1f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7535-sql-injection-in-campcodes-sales-and-4747aedf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7535%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=6873f0dda83201eaacbd00a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7534-sql-injection-in-phpgurukul-student--a6689886</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7534%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6873e9d3a83201eaacbceb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7533-sql-injection-in-code-projects-job-d-240d1859</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7533%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=6873e2cca83201eaacbcc74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7532-stack-based-buffer-overflow-in-tenda-7d42e634</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7532%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=6873dbc4a83201eaacbcb05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7531-stack-based-buffer-overflow-in-tenda-cc9c5b71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7531%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=6873d4bca83201eaacbc5426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7530-stack-based-buffer-overflow-in-tenda-4dd81849</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7530%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=6873cdb3a83201eaacbc170d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7529-stack-based-buffer-overflow-in-tenda-34d1c20c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7529%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=6873a384a83201eaacba962d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7528-stack-based-buffer-overflow-in-tenda-2733503a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7528%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=68739c7ca83201eaacba27ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/historical-analysis-of-reflected-vulnerabilities-t-59f76fbb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Historical%20Analysis%20of%20Reflected%20Vulnerabilities%3A%0AThe%20Evolution%20of%20Windows%20Defender%20Defenses&amp;severity=critical&amp;id=68738e6ea83201eaacb9b18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7527-stack-based-buffer-overflow-in-tenda-1ea2f1eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7527%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=68738e6ca83201eaacb9b175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llm-crawlers-continue-to-ddos-sourcehut-771e5701</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLM%20crawlers%20continue%20to%20DDoS%20SourceHut&amp;severity=medium&amp;id=6873805fa83201eaacb92ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7525-command-injection-in-totolink-t6-d26fe17f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7525%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=6873805da83201eaacb92a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7524-command-injection-in-totolink-t6-c841c328</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7524%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=68737955a83201eaacb8fbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7012-cwe-59-improper-link-resolution-befo-0f4a5870</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7012%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Cato%20Networks%20Cato%20Client&amp;severity=high&amp;id=68736b45a83201eaacb8cc61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7523-xml-external-entity-reference-in-jin-887d5025</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7523%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68735d35a83201eaacb897ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7522-sql-injection-in-phpgurukul-vehicle--5a4f36dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7522%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6873562da83201eaacb7f09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7521-sql-injection-in-phpgurukul-vehicle--a6465155</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7521%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=68734f28a83201eaacb7da1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7520-sql-injection-in-phpgurukul-vehicle--06dec7de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7520%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=68734115a83201eaacb7b2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7517-sql-injection-in-code-projects-onlin-6b224028</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7517%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68733a0da83201eaacb79a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7516-sql-injection-in-code-projects-onlin-122eab67</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7516%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68733305a83201eaacb7864f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7515-sql-injection-in-code-projects-onlin-487450d7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7515%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68732f81a83201eaacb76eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7514-sql-injection-in-code-projects-moder-974254bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7514%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=68732879a83201eaacb750d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7513-sql-injection-in-code-projects-moder-93bcec7c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7513%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=68731deda83201eaacb71c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7512-sql-injection-in-code-projects-moder-ec176a35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7512%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=68731deda83201eaacb71c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7511-sql-injection-in-code-projects-chat--dd4fef29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7511%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=68731361a83201eaacb706dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-blind-xss-to-rce-when-headers-became-my-termi-269aa85a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Blind%20XSS%20to%20RCE%3A%20When%20Headers%20Became%20My%20Terminal&amp;severity=medium&amp;id=687301cfa83201eaacb6c04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7510-sql-injection-in-code-projects-moder-c3b8167d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7510%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=687301cda83201eaacb6c03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7509-sql-injection-in-code-projects-moder-690cac75</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7509%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=687301cda83201eaacb6c033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-13-aee621d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-13&amp;severity=medium&amp;id=68744c3da83201eaacbf98ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53865-cwe-79-improper-neutralization-of-i-bec72eda</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20roundup-tracker%20Roundup&amp;severity=medium&amp;id=68740976a83201eaacbdea92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7508-sql-injection-in-code-projects-moder-29886e17</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7508%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=6872f3bda83201eaacb65011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7506-stack-based-buffer-overflow-in-tenda-55584b1b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7506%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=6872ecb5a83201eaacb63bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7505-stack-based-buffer-overflow-in-tenda-07747386</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7505%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=6872e5ada83201eaacb6288f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7492-sql-injection-in-phpgurukul-vehicle--c2662512</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7492%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872d79da83201eaacb605f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7491-sql-injection-in-phpgurukul-vehicle--f824871c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7491%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872d095a83201eaacb5f0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7490-sql-injection-in-phpgurukul-vehicle--a1f56ec6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7490%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872c98da83201eaacb5e1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7489-sql-injection-in-phpgurukul-vehicle--43d4f0d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7489%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872c286a83201eaacb5c02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7488-path-traversal-in-joeybling-springbo-14ad9fdb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7488%3A%20Path%20Traversal%20in%20JoeyBling%20SpringBoot_MyBatisPlus&amp;severity=medium&amp;id=6872bb7da83201eaacb5aeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7487-unrestricted-upload-in-joeybling-spr-3c631f15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7487%3A%20Unrestricted%20Upload%20in%20JoeyBling%20SpringBoot_MyBatisPlus&amp;severity=medium&amp;id=6872b475a83201eaacb59961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7485-reachable-assertion-in-open5gs-b476d0f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7485%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=6872ad6ea83201eaacb58cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7484-sql-injection-in-phpgurukul-vehicle--a2658c44</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7484%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872a666a83201eaacb57860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7483-sql-injection-in-phpgurukul-vehicle--0ab68f96</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7483%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=68729f5ea83201eaacb55e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7482-sql-injection-in-phpgurukul-vehicle--f2711357</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7482%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=68729856a83201eaacb543f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7481-sql-injection-in-phpgurukul-vehicle--99fa20b7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7481%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872914ea83201eaacb535c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41169-cwe-664-improper-control-of-a-resou-417e5d07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41169%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Apache%20Software%20Foundation%20Apache%20Zeppelin&amp;severity=high&amp;id=690a6f039e609817bf702c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7480-sql-injection-in-phpgurukul-vehicle--50da3b89</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7480%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=68728a46a83201eaacb51e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7479-sql-injection-in-phpgurukul-vehicle--cd8289d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7479%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872833ea83201eaacb50c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7478-sql-injection-in-code-projects-moder-277ca6c0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7478%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=68727c37a83201eaacb4f9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7477-unrestricted-upload-in-code-projects-df5b5761</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7477%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Car%20Rental%20System&amp;severity=medium&amp;id=6872752fa83201eaacb4e7c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7476-sql-injection-in-code-projects-simpl-89607d2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7476%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Car%20Rental%20System&amp;severity=medium&amp;id=6872671fa83201eaacb4a115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7475-sql-injection-in-code-projects-simpl-c356375a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7475%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Car%20Rental%20System&amp;severity=medium&amp;id=6872590fa83201eaacb47511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7474-sql-injection-in-code-projects-job-d-317b1895</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7474%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=68725207a83201eaacb45cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7471-sql-injection-in-code-projects-moder-a712729a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7471%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=68724affa83201eaacb43c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36104-cwe-277-insecure-inherited-permissi-e7366b7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36104%3A%20CWE-277%20Insecure%20Inherited%20Permissions%20in%20IBM%20Storage%20Scale&amp;severity=medium&amp;id=68724affa83201eaacb43c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7470-unrestricted-upload-in-campcodes-sal-a4336070</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7470%3A%20Unrestricted%20Upload%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=687243f7a83201eaacb419a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-zero-day-that-couldve-compromised-every-cursor-ef76afb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20zero-day%20that%20could&apos;ve%20compromised%20every%20Cursor%20and%20Windsurf%20user&amp;severity=critical&amp;id=68723ceda83201eaacb40002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nvidia-shares-guidance-to-defend-gddr6-gpus-agains-c238d517</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NVIDIA%20shares%20guidance%20to%20defend%20GDDR6%20GPUs%20against%20Rowhammer%20attacks&amp;severity=high&amp;id=68723ceda83201eaacb4000a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploits-for-pre-auth-fortinet-fortiweb-rce-flaw-r-6e814894</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploits%20for%20pre-auth%20Fortinet%20FortiWeb%20RCE%20flaw%20released%2C%20patch%20now&amp;severity=high&amp;id=68723ceda83201eaacb40006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/athlete-or-hacker-russian-basketball-player-accuse-e988df59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Athlete%20or%20Hacker%3F%20Russian%20basketball%20player%20accused%20in%20U.S.%20ransomware%20case&amp;severity=medium&amp;id=68723ceda83201eaacb4000e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7469-sql-injection-in-campcodes-sales-and-54eb13c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7469%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68723d29a83201eaacb40172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7518-cwe-22-improper-limitation-of-a-path-861a72ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rsjoomla%20RSFirewall!&amp;severity=medium&amp;id=68722b5aa83201eaacb3aa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7468-buffer-overflow-in-tenda-fh1201-9832c101</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7468%3A%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=687227dba83201eaacb3a350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7467-sql-injection-in-code-projects-moder-b24cf2ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7467%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=687220cea83201eaacb38c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7504-cwe-502-deserialization-of-untrusted-b64cf3ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7504%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20akirk%20Friends&amp;severity=high&amp;id=6875696ba83201eaaccaa8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7466-sql-injection-in-1000projects-abc-co-117c582d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7466%3A%20SQL%20Injection%20in%201000projects%20ABC%20Courier%20Management&amp;severity=medium&amp;id=687219c6a83201eaacb37ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6423-cwe-434-unrestricted-upload-of-file--55cd4521</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6423%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20beeteam368%20BeeTeam368%20Extensions&amp;severity=high&amp;id=687212bea83201eaacb366ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7465-buffer-overflow-in-tenda-fh1201-7ad2cddb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7465%3A%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=68720bbaa83201eaacb354dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7464-out-of-bounds-read-in-osrg-gobgp-daaeaad8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7464%3A%20Out-of-Bounds%20Read%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=6875696ba83201eaaccaa8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7463-buffer-overflow-in-tenda-fh1201-edca9cbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7463%3A%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=6871fda7a83201eaacb32a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7462-null-pointer-dereference-in-artifex--7c82e2fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7462%3A%20NULL%20Pointer%20Dereference%20in%20Artifex%20GhostPDL&amp;severity=medium&amp;id=6871f69ea83201eaacb31097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1313-cwe-288-authentication-bypass-using--6c08dca4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1313%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20scriptsbundle%20Nokri%20%E2%80%93%20Job%20Board%20WordPress%20Theme&amp;severity=high&amp;id=6871f69ea83201eaacb31093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7461-sql-injection-in-code-projects-moder-4a161303</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7461%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=6871e88ea83201eaacb2c951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6057-cwe-434-unrestricted-upload-of-file--e27415dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6057%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20WPBookit&amp;severity=high&amp;id=6871e88ea83201eaacb2c946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6058-cwe-434-unrestricted-upload-of-file--85a2054d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6058%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20WPBookit&amp;severity=critical&amp;id=6871e88ea83201eaacb2c94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24294-vulnerability-in-ruby-resolv-7ca18671</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24294%3A%20Vulnerability%20in%20Ruby%20resolv&amp;severity=high&amp;id=6871da7ea83201eaacb28576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-12-3e836180</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-12&amp;severity=medium&amp;id=6872fabda83201eaacb65ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5199-cwe-276-incorrect-default-permission-af57e17f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5199%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Canonical%20Multipass&amp;severity=high&amp;id=68719ecda83201eaacb1b8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/donot-apt-hits-european-ministry-with-fake-diploma-09fc7667</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoNot%20APT%20Hits%20European%20Ministry%20with%20Fake%20Diplomacy%20Emails%20and%20LoptikMod%20Malware&amp;severity=medium&amp;id=68719eb7a83201eaacb1b841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leaked-shellter-elite-tool-for-red-teams-now-enabl-7b8e875e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leaked%20Shellter%20Elite%20Tool%20for%20Red%20Teams%20Now%20Enabling%20Infostealer%20Attacks%20Worldwide&amp;severity=medium&amp;id=6871942ca83201eaacb19c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7460-buffer-overflow-in-totolink-t6-d1432c8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7460%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=6871861da83201eaacb17733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53636-cwe-400-uncontrolled-resource-consu-2027bf92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53636%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OSC%20ondemand&amp;severity=medium&amp;id=6871829aa83201eaacb16c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7459-sql-injection-in-code-projects-mobil-68470083</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7459%3A%20SQL%20Injection%20in%20code-projects%20Mobile%20Shop&amp;severity=medium&amp;id=68717f14a83201eaacb16504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7457-sql-injection-in-campcodes-online-mo-e6a0ef6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7457%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=6871780ca83201eaacb147fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7456-sql-injection-in-campcodes-online-mo-84ca3a3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7456%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=68717105a83201eaacb06a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7455-sql-injection-in-campcodes-online-mo-a1386035</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7455%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=687169fca83201eaacb040dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7454-sql-injection-in-campcodes-online-mo-5eb82ffd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7454%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=687162faa83201eaacb0190c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7503-cwe-798-use-of-hard-coded-credential-debb8405</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7503%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Shenzhen%20Liandian%20Communication%20Technology%20LTD%20V380%20IP%20Camera%20%2F%20AppFHE1_V1.0.6.0&amp;severity=critical&amp;id=68715f74a83201eaacb00bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3631-cwe-416-use-after-free-in-ibm-mq-f023143b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3631%3A%20CWE-416%20Use%20After%20Free%20in%20IBM%20MQ&amp;severity=medium&amp;id=68715bf3a83201eaacb00416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7453-use-of-hard-coded-password-in-saltbo-37813469</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7453%3A%20Use%20of%20Hard-coded%20Password%20in%20saltbo%20zpan&amp;severity=medium&amp;id=68715bf3a83201eaacb0041a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30403-heap-based-buffer-overflow-cwe-122--a62c6ed4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30403%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Facebook%20mvfst&amp;severity=high&amp;id=68715bf3a83201eaacb00412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30402-heap-based-buffer-overflow-cwe-122--42175e44</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30402%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=high&amp;id=68714ddea83201eaacafd49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53642-cwe-613-insufficient-session-expira-b74be674</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53642%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=68714ddea83201eaacafd4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7452-path-traversal-in-kone-net-go-chat-92791636</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7452%3A%20Path%20Traversal%20in%20kone-net%20go-chat&amp;severity=medium&amp;id=68714ddea83201eaacafd4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53641-cwe-918-server-side-request-forgery-937fc1a3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53641%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=68714ddea83201eaacafd4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43856-cwe-303-incorrect-implementation-of-1a6429e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43856%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20immich-app%20immich&amp;severity=high&amp;id=687146d9a83201eaacafc3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7450-path-traversal-in-letseeqiji-gorobbs-12b76ac1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7450%3A%20Path%20Traversal%20in%20letseeqiji%20gorobbs&amp;severity=medium&amp;id=687146d9a83201eaacafc3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/14-arrested-in-romania-for-47-million-uk-tax-phish-9130a976</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=14%20Arrested%20in%20Romania%20for%20%C2%A347%20Million%20UK%20Tax%20Phishing%20Scam&amp;severity=medium&amp;id=68714350a83201eaacafb680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47963-spoofing-in-microsoft-microsoft-edg-6d8bb779</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47963%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68713fd2a83201eaacaf9cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47964-spoofing-in-microsoft-microsoft-edg-012b6993</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47964%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68713fd2a83201eaacaf9cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47182-cwe-20-improper-input-validation-in-c298878d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47182%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68713fd2a83201eaacaf9cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7026-cwe-822-untrusted-pointer-dereferenc-d914ff6b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7026%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20GIGABYTE%20UEFI-GenericComponentSmmEntry&amp;severity=high&amp;id=687131bea83201eaacaf6612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7028-cwe-822-untrusted-pointer-dereferenc-6579825e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7028%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20GIGABYTE%20UEFI-SmiFlash&amp;severity=high&amp;id=687131bea83201eaacaf661c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7027-cwe-822-untrusted-pointer-dereferenc-d882eaad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7027%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20GIGABYTE%20UEFI-GenericComponentSmmEntry&amp;severity=high&amp;id=687131bea83201eaacaf6617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7029-cwe-822-uncontrolled-pointer-deferen-bec6d4a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7029%3A%20CWE-822%20uncontrolled%20pointer%20deference%20in%20GIGABYTE%20UEFI-OverClockSmiHandler&amp;severity=high&amp;id=687131bea83201eaacaf6621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52988-cwe-78-improper-neutralization-of-s-1fd156e2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52988%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6549-cwe-863-incorrect-authorization-in-j-a3f7c71f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6549%3A%20CWE-863%20Incorrect%20Authorization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52989-cwe-140-improper-neutralization-of--4922d57d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52989%3A%20CWE-140%20Improper%20Neutralization%20of%20Delimiters%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52986-cwe-401-missing-release-of-memory-a-f8b0a91d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52986%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52985-cwe-480-use-of-incorrect-operator-i-a918510c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52985%3A%20CWE-480%20Use%20of%20Incorrect%20Operator%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52984-cwe-476-null-pointer-dereference-in-52058b2a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52984%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52983-cwe-446-ui-discrepancy-for-security-cdab3983</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52983%3A%20CWE-446%20UI%20Discrepancy%20for%20Security%20Feature%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68712e3ba83201eaacaf5d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52982-cwe-404-improper-resource-shutdown--d65ea414</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52982%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52981-cwe-754-improper-check-for-unusual--40ab6ea1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52981%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68712e3ba83201eaacaf5d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52980-cwe-198-use-of-incorrect-byte-order-6257fb55</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52980%3A%20CWE-198%20Use%20of%20Incorrect%20Byte%20Ordering%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68712e3ba83201eaacaf5d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52964-cwe-617-reachable-assertion-in-juni-96c04852</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52964%3A%20CWE-617%20Reachable%20Assertion%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52963-cwe-284-improper-access-control-in--6c97cf04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52963%3A%20CWE-284%20Improper%20Access%20Control%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52953-cwe-440-expected-behavior-violation-e23114e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52953%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52952-cwe-787-out-of-bounds-write-in-juni-747e4fdb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52952%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48924-cwe-674-uncontrolled-recursion-in-a-ee5e547d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48924%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20Lang&amp;severity=medium&amp;id=68712732a83201eaacaf3f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52958-cwe-617-reachable-assertion-in-juni-9c88403e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52958%3A%20CWE-617%20Reachable%20Assertion%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712732a83201eaacaf3f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52955-cwe-131-incorrect-calculation-of-bu-7ad64200</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52955%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68717105a83201eaacb06aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52954-cwe-862-missing-authorization-in-ju-0049b6e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52954%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=68712732a83201eaacaf3f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52951-cwe-693-protection-mechanism-failur-3ee2c760</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52951%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712732a83201eaacaf3f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52950-cwe-862-missing-authorization-in-ju-cd4c5f5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52950%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Juniper%20Security%20Director&amp;severity=critical&amp;id=68712ab6a83201eaacaf4800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52949-cwe-130-improper-handling-of-length-d9d2f5d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52949%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52948-cwe-755-improper-handling-of-except-43ad4a27</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52948%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52947-cwe-755-improper-handling-of-except-1fccd627</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52947%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=687131bea83201eaacaf6629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52946-cwe-416-use-after-free-in-juniper-n-40f5e1d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52946%3A%20CWE-416%20Use%20After%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=687131bea83201eaacaf6626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30661-cwe-732-incorrect-permission-assign-695ad8f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30661%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68717105a83201eaacb06aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolving-tactics-of-slowtempest-a-deep-dive-into-a-d4da4b0c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolving%20Tactics%20of%20SLOW%23TEMPEST%3A%20A%20Deep%20Dive%20Into%20Advanced%20Malware%20Techniques&amp;severity=medium&amp;id=68717483a83201eaacb0b82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-backed-pay2key-ransomware-resurfaces-with--0b6d11f4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian-Backed%20Pay2Key%20Ransomware%20Resurfaces%20with%2080%25%20Profit%20Share%20for%20Cybercriminals&amp;severity=high&amp;id=68712029a83201eaacaf288a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53861-cleartext-transmission-of-sensitive-d6c96546</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53861%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=low&amp;id=68710b14a83201eaacaed6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53862-exposure-of-sensitive-system-inform-0b1f713a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53862%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=low&amp;id=68710b14a83201eaacaed6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6788-cwe-668-exposure-of-resource-to-wron-5f17de4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6788%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert&amp;severity=medium&amp;id=6870f5fea83201eaacae7227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50124-cwe-269-improper-privilege-manageme-99aebc1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50124%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=high&amp;id=6870eef2a83201eaacae47d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50125-cwe-918-server-side-request-forgery-de374334</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50125%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=medium&amp;id=6870eef2a83201eaacae47d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-citrix-netscaler-adc-and-gateway-flaw-77a7ff91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Citrix%20NetScaler%20ADC%20and%20Gateway%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=6870eb6ca83201eaacae2014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amd-warns-of-transient-scheduler-attacks-affecting-43fec996</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMD%20Warns%20of%20Transient%20Scheduler%20Attacks%20Affecting%20Wide%20Range%20of%20Chipsets&amp;severity=high&amp;id=6870e7e8a83201eaacae0d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pre-auth-sql-injection-to-rce-fortinet-fortiweb-fa-f9c1b485</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pre-Auth%20SQL%20Injection%20to%20RCE%20-%20Fortinet%20FortiWeb%20Fabric%20Connector%20(CVE-2025-25257)%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=6870e46aa83201eaacadfe09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50123-cwe-94-improper-control-of-generati-024bb0da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50123%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=high&amp;id=6870e465a83201eaacadfdf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3933-cwe-1333-inefficient-regular-express-1699f9d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3933%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=6870dd5da83201eaacadb457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50122-cwe-331-insufficient-entropy-in-sch-51ef082d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50122%3A%20CWE-331%20Insufficient%20Entropy%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=high&amp;id=6870d9daa83201eaacada66f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50121-cwe-78-improper-neutralization-of-s-ca0d2b5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50121%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=critical&amp;id=6870d9daa83201eaacada66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6438-cwe-611-improper-restriction-of-xml--e801b8c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6438%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=medium&amp;id=6870d656a83201eaacad8e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6838-cwe-1236-improper-neutralization-of--3cb3dfda</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6838%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20apos37%20Broken%20Link%20Notifier&amp;severity=medium&amp;id=6870cbcaa83201eaacad5c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6851-cwe-918-server-side-request-forgery--9183feb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6851%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20apos37%20Broken%20Link%20Notifier&amp;severity=high&amp;id=6870cbcaa83201eaacad5c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7442-cwe-89-improper-neutralization-of-sp-7dd7a132</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7442%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dasinfomedia%20WPGYM%20-%20Wordpress%20Gym%20Management%20System&amp;severity=high&amp;id=6870bdbba83201eaacacf705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6068-cwe-79-improper-neutralization-of-in-3bccefc7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6068%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fooplugins%20Gallery%20by%20FooGallery&amp;severity=medium&amp;id=6870bdbba83201eaacacf6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5530-cwe-79-improper-neutralization-of-in-b0482b6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5530%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpclever%20WPC%20Smart%20Compare%20for%20WooCommerce&amp;severity=medium&amp;id=6870bdbba83201eaacacf6f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6745-cwe-200-exposure-of-sensitive-inform-1d2d9f5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6745%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xTemos%20Woodmart&amp;severity=medium&amp;id=6870bdbba83201eaacacf701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4593-cwe-200-exposure-of-sensitive-inform-fadd5258</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4593%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20avimegladon%20WP%20Register%20Profile%20With%20Shortcode&amp;severity=medium&amp;id=6870bdbba83201eaacacf6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5992-cwe-20-improper-input-validation-in--5ea8bb74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5992%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Qt%20Company%20Qt&amp;severity=low&amp;id=6870b6b3a83201eaacacdbda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5392-cwe-94-improper-control-of-generatio-e0471b14</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5392%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20gb-plugins%20GB%20Forms%20DB&amp;severity=critical&amp;id=6870b6b3a83201eaacacdbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6716-cwe-79-improper-neutralization-of-in-d334c3dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6716%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=6870b6b3a83201eaacacdbdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-inject-code-into-wordpress-theme-to-redi-0ed59157</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Inject%20Code%20into%20WordPress%20Theme%20to%20Redirect%20Visitors&amp;severity=medium&amp;id=6870f276a83201eaacae6078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-track-repeat-422f7cc1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%2C%20track%2C%20repeat&amp;severity=medium&amp;id=6870eb7ea83201eaacae206c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5028-cwe-269-improper-privilege-managemen-1629b08e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5028%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20NOD32%20Antivirus&amp;severity=medium&amp;id=6870b32fa83201eaacacce9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30026-cwe-288-authentication-bypass-using-050eb6e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30026%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=6870ac27a83201eaacacabfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30025-cwe-502-deserialization-of-untruste-6df01793</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30025%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Axis%20Communications%20AB%20AXIS%20Device%20Manager&amp;severity=medium&amp;id=6870ac27a83201eaacacabf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30024-cwe-295-improper-certificate-valida-6714e8d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30024%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Axis%20Communications%20AB%20AXIS%20Device%20Manager&amp;severity=medium&amp;id=6870ac27a83201eaacacabf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30023-cwe-502-deserialization-of-untruste-0f79b87c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30023%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=critical&amp;id=6870ac27a83201eaacacabf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6200-cwe-79-cross-site-scripting-xss-in-g-050fc95a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6200%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20GeoDirectory&amp;severity=medium&amp;id=68712038a83201eaacaf28dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2942-cwe-200-information-exposure-in-orde-dce1bf79</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2942%3A%20CWE-200%20Information%20Exposure%20in%20Order%20Delivery%20Date&amp;severity=medium&amp;id=6875696ba83201eaaccaa8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-critical-credential-vulnerabilities-have-been--09ffa5e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20critical%20credential%20vulnerabilities%20have%20been%20found%20in%20Kaseya&apos;s%20RapidFire%20Tools%20Network%20Detective&amp;severity=critical&amp;id=68709713a83201eaacabf7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7401-cwe-798-use-of-hard-coded-credential-7c3a445a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7401%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20aa-team%20Premium%20Age%20Verification%20%2F%20Restriction%20for%20WordPress&amp;severity=critical&amp;id=6870938ba83201eaacabee32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7436-sql-injection-in-campcodes-online-re-7f1f5c3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7436%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=687115a1a83201eaacaefd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7435-cross-site-scripting-in-livehelperch-744deb73</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7435%3A%20Cross%20Site%20Scripting%20in%20LiveHelperChat%20lhc-php-resque%20Extension&amp;severity=medium&amp;id=68707aefa83201eaacab62a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7434-stack-based-buffer-overflow-in-tenda-45c8bccd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7434%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=68707063a83201eaacab403f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7423-stack-based-buffer-overflow-in-tenda-428a08f5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7423%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=687065d8a83201eaacaaf777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7422-stack-based-buffer-overflow-in-tenda-34bfc7de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7422%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=68705ed0a83201eaacaae382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5241-cwe-645-overly-restrictive-account-l-76203020</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5241%3A%20CWE-645%20Overly%20Restrictive%20Account%20Lockout%20Mechanism%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=medium&amp;id=68705b4fa83201eaacaad88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7421-stack-based-buffer-overflow-in-tenda-e122907f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7421%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=68705b4fa83201eaacaad891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-11-51198ab2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-11&amp;severity=medium&amp;id=6871a93da83201eaacb1d0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52089-na-6f4a2a06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52089%3A%20n%2Fa&amp;severity=high&amp;id=68717105a83201eaacb06aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45582-cwe-24-path-traversal-filedir-in-gn-b562b11c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45582%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20GNU%20Tar&amp;severity=medium&amp;id=6871435da83201eaacafb6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52994-cwe-78-improper-neutralization-of-s-effa0262</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52994%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20phpThumb%20project%20phpThumb&amp;severity=medium&amp;id=68712ab6a83201eaacaf4803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51591-na-f14e24d3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51591%3A%20n%2Fa&amp;severity=low&amp;id=687115a1a83201eaacaefd54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53864-cwe-674-uncontrolled-recursion-in-c-46ad5b3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53864%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Connect2id%20Nimbus%20JOSE%2BJWT&amp;severity=medium&amp;id=68707aefa83201eaacab62a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcdonalds-ai-hiring-tool-mchire-leaked-data-of-64--cf2b7750</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=McDonald%E2%80%99s%20AI%20Hiring%20Tool%20McHire%20Leaked%20Data%20of%2064%20Million%20Job%20Seekers&amp;severity=medium&amp;id=68705441a83201eaacaabc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53471-cwe-20-in-emerson-valvelink-solo-79b09b6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53471%3A%20CWE-20%20in%20Emerson%20ValveLink%20SOLO&amp;severity=medium&amp;id=687115a1a83201eaacaefd59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48496-cwe-427-in-emerson-valvelink-solo-12e4ba73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48496%3A%20CWE-427%20in%20Emerson%20ValveLink%20SOLO&amp;severity=medium&amp;id=68711928a83201eaacaf0f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46358-cwe-693-in-emerson-valvelink-solo-03a3ee25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46358%3A%20CWE-693%20in%20Emerson%20ValveLink%20SOLO&amp;severity=high&amp;id=68711928a83201eaacaf0f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50109-cwe-316-in-emerson-valvelink-solo-60adfeb6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50109%3A%20CWE-316%20in%20Emerson%20ValveLink%20SOLO&amp;severity=high&amp;id=68711928a83201eaacaf0f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52579-cwe-316-in-emerson-valvelink-solo-cff8c147</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52579%3A%20CWE-316%20in%20Emerson%20ValveLink%20SOLO&amp;severity=critical&amp;id=687050c0a83201eaacaab01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7420-stack-based-buffer-overflow-in-tenda-b5ab86f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7420%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=687050c0a83201eaacaab023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53509-cwe-88-in-advantech-iview-756d6219</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53509%3A%20CWE-88%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52459-cwe-88-in-advantech-iview-1f224737</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52459%3A%20CWE-88%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53515-cwe-89-in-advantech-iview-f569d2a5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53515%3A%20CWE-89%20in%20Advantech%20iView&amp;severity=high&amp;id=68704d3ca83201eaacaaa063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52577-cwe-89-in-advantech-iview-bb79e473</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52577%3A%20CWE-89%20in%20Advantech%20iView&amp;severity=high&amp;id=68704d3ca83201eaacaaa057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53475-cwe-89-in-advantech-iview-eb1fe90e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53475%3A%20CWE-89%20in%20Advantech%20iView&amp;severity=high&amp;id=68704d3ca83201eaacaaa05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46704-cwe-22-in-advantech-iview-7c49cee2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46704%3A%20CWE-22%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48891-cwe-89-in-advantech-iview-6fc14ade</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48891%3A%20CWE-89%20in%20Advantech%20iView&amp;severity=high&amp;id=68704d3ca83201eaacaaa06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41442-cwe-79-in-advantech-iview-0924b626</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41442%3A%20CWE-79%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53519-cwe-79-in-advantech-iview-623a132a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53519%3A%20CWE-79%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53397-cwe-79-in-advantech-iview-f03850f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53397%3A%20CWE-79%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcdonalds-mchire-vulnerability-leaked-data-of-64-m-0279b9be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=McDonald%E2%80%99s%20McHire%20Vulnerability%20Leaked%20Data%20of%2064%20Million%20Job%20Seekers&amp;severity=medium&amp;id=687049b5a83201eaacaa9019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7419-stack-based-buffer-overflow-in-tenda-8fb7e2bf</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7419%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=687049c1a83201eaacaa904b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7418-stack-based-buffer-overflow-in-tenda-d6865c1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7418%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=687042aea83201eaacaa59de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31267-an-attacker-with-physical-access-to-097275ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31267%3A%20An%20attacker%20with%20physical%20access%20to%20an%20unlocked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20App%20Store%20Connect&amp;severity=medium&amp;id=68703f2ba83201eaacaa4fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7417-stack-based-buffer-overflow-in-tenda-10bd15f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7417%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=68703ba7a83201eaacaa45ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deploying-netsupport-rat-via-wordpress-clickfix-38fd1292</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deploying%20NetSupport%20RAT%20via%20WordPress%20%26%20ClickFix&amp;severity=medium&amp;id=68703822a83201eaacaa3b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7416-stack-based-buffer-overflow-in-tenda-c35bd30f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7416%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=6870349fa83201eaacaa23fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53637-cwe-78-improper-neutralization-of-s-b63f26ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53637%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20meshtastic%20firmware&amp;severity=medium&amp;id=6870349fa83201eaacaa23f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24798-cwe-617-reachable-assertion-in-mesh-b2f9fc29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24798%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20meshtastic%20firmware&amp;severity=medium&amp;id=6870311ba83201eaacaa0c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6392-cwe-532-insertion-of-sensitive-infor-4c0f69d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6392%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Broadcom%20Brocade%20SANnav&amp;severity=medium&amp;id=6870311ba83201eaacaa0c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6390-cwe-497-exposure-of-sensitive-system-7695f209</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6390%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Broadcom%20Brocade%20SANnav&amp;severity=medium&amp;id=68702d97a83201eaaca9fa85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7415-command-injection-in-tenda-o3v2-37235081</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7415%3A%20Command%20Injection%20in%20Tenda%20O3V2&amp;severity=medium&amp;id=68702d97a83201eaaca9fa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4662-cwe-497-exposure-of-sensitive-system-98f39405</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4662%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Broadcom%20Brocade%20SANnav&amp;severity=medium&amp;id=68702a13a83201eaaca9e506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7414-os-command-injection-in-tenda-o3v2-fb64a358</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7414%3A%20OS%20Command%20Injection%20in%20Tenda%20O3V2&amp;severity=medium&amp;id=6870268fa83201eaaca9d2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3947-cwe-191-integer-underflow-wrap-or-wr-fa28d46a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3947%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Honeywell%20C300%20PCNT02&amp;severity=high&amp;id=6870230ba83201eaaca9b884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3946-cwe-430-deployment-of-wrong-handler--f217b319</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3946%3A%20CWE-430%20Deployment%20of%20Wrong%20Handler%20in%20Honeywell%20C300%20PCNT02&amp;severity=high&amp;id=6870230ba83201eaaca9b881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2523-cwe-191-integer-underflow-wrap-or-wr-b65a0333</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2523%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Honeywell%20C300%20PCNT02&amp;severity=critical&amp;id=6870230ba83201eaaca9b87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2522-cwe-226-sensitive-information-in-res-f59116d6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2522%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20Honeywell%20C300%20PCNT02&amp;severity=medium&amp;id=68701f8ba83201eaaca99fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2521-cwe-119-improper-restriction-of-oper-14113d99</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2521%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Honeywell%20C300%20PCNT02&amp;severity=high&amp;id=68701f8ba83201eaaca99fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7413-unrestricted-upload-in-code-projects-cab03725</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7413%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=68701f8ba83201eaaca99fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2520-cwe-457-use-of-uninitialized-variabl-e509002a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2520%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Honeywell%20C300%20PCNT02&amp;severity=high&amp;id=68701c03a83201eaaca9926a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53629-cwe-770-allocation-of-resources-wit-eb9ffa4a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53629%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=68701c03a83201eaaca99272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53628-cwe-835-loop-with-unreachable-exit--1e3a0512</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53628%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=68701c03a83201eaaca9926d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53634-cwe-770-allocation-of-resources-wit-b609ce36</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53634%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ctfer-io%20chall-manager&amp;severity=high&amp;id=6870230ba83201eaaca9b887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53633-cwe-405-asymmetric-resource-consump-dc1abdd9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53633%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20ctfer-io%20chall-manager&amp;severity=high&amp;id=6870187fa83201eaaca986cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53632-cwe-22-improper-limitation-of-a-pat-e4e972c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53632%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ctfer-io%20chall-manager&amp;severity=high&amp;id=6870187fa83201eaaca986c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53630-cwe-122-heap-based-buffer-overflow--820c47e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53630%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=6870187fa83201eaaca986d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7412-unrestricted-upload-in-code-projects-c17562e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7412%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6870187fa83201eaaca986d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34100-cwe-434-unrestricted-upload-of-file-f6f116a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34100%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20BuilderEngine%20CMS&amp;severity=critical&amp;id=687014fca83201eaaca979e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34102-cwe-89-improper-neutralization-of-s-7d380c2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34102%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crypttech%20CryptoLog&amp;severity=critical&amp;id=687014fca83201eaaca979ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34096-cwe-119-improper-restriction-of-ope-350533c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34096%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20EFS%20Software%20Inc.%20Easy%20File%20Sharing%20HTTP%20Server&amp;severity=critical&amp;id=687014fca83201eaaca979c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34095-cwe-78-improper-neutralization-of-s-f18da8a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34095%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Real%20Time%20Logic%20Mako%20Server&amp;severity=critical&amp;id=687014fca83201eaaca979c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53506-cwe-400-uncontrolled-resource-consu-83e80860</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53506%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=687014fca83201eaaca97a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34093-cwe-78-improper-neutralization-of-s-7743c35e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34093%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Polycom%20HDX%20Series&amp;severity=high&amp;id=687014fca83201eaaca979bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34097-cwe-434-unrestricted-upload-of-file-7cdc42b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34097%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ProcessMaker%20Inc.%20ProcessMaker&amp;severity=high&amp;id=687014fca83201eaaca979ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34098-cwe-200-exposure-of-sensitive-infor-815fc07a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34098%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Riverbed%20Technology%20SteelHead%20VCX&amp;severity=high&amp;id=687014fca83201eaaca979d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34101-cwe-78-improper-neutralization-of-s-98163af6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34101%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Serviio%20Media%20Server&amp;severity=critical&amp;id=687014fca83201eaaca979e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34099-cwe-78-improper-neutralization-of-s-2edd9d87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34099%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20VICIdial%20Group%20VICIdial&amp;severity=critical&amp;id=687014fca83201eaaca979db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7021-cwe-451-user-interface-ui-misreprese-f6f10707</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7021%3A%20CWE-451%20%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20OpenAI%20Operator&amp;severity=medium&amp;id=687014fca83201eaaca97a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52520-cwe-190-integer-overflow-or-wraparo-fefeef79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52520%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=68701177a83201eaaca96453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52434-cwe-362-concurrent-execution-using--00c732d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52434%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=68701177a83201eaaca96450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7411-sql-injection-in-code-projects-lifes-8fbbef37</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7411%3A%20SQL%20Injection%20in%20code-projects%20LifeStyle%20Store&amp;severity=medium&amp;id=68701177a83201eaaca96456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53503-cwe-64-windows-shortcut-following-l-171d6193</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53503%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20(.LNK)%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Cleaner%20One%20Pro&amp;severity=high&amp;id=68700df3a83201eaaca957ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53378-cwe-306-missing-authentication-for--12e32886</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53378%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Worry-Free%20Business%20Security%20Services&amp;severity=high&amp;id=68700df3a83201eaaca957c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52837-cwe-64-windows-shortcut-following-l-e8b81f68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52837%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20(.LNK)%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Password%20Manager&amp;severity=high&amp;id=68700df3a83201eaaca957c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52521-cwe-64-windows-shortcut-following-l-3d6b5c4c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52521%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20(.LNK)%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Security%20(Consumer)&amp;severity=high&amp;id=68700df3a83201eaaca957bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52473-cwe-200-exposure-of-sensitive-infor-5ea37673</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52473%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20open-quantum-safe%20liboqs&amp;severity=medium&amp;id=68700df4a83201eaaca957d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-apt-c-55-kimsuky-organizations-happydo-550fb5ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20APT-C-55%20(Kimsuky)%20Organization&apos;s%20HappyDoor%20Backdoor%20Attack%20Based%20on%20VMP%20Strong%20Shell&amp;severity=medium&amp;id=68703822a83201eaacaa3b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atomic-macos-stealer-includes-a-backdoor-for-persi-29adbdc5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atomic%20macOS%20Stealer%20includes%20a%20backdoor%20for%20persistent%20access&amp;severity=medium&amp;id=68703822a83201eaacaa3b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53709-the-product-does-not-perform-or-inc-3279d5df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53709%3A%20The%20product%20does%20not%20perform%20or%20incorrectly%20performs%20an%20authorization%20check%20when%20an%20actor%20attempts%20to%20access%20a%20resource%20or%20perform%20an%20action.%20in%20Palantir%20com.palantir.secupload%3Asecure-upload&amp;severity=medium&amp;id=68700a6fa83201eaaca94483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53625-cwe-359-exposure-of-private-persona-41c78580</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53625%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Universal-Omega%20DynamicPageList3&amp;severity=high&amp;id=68700a6fa83201eaaca9447f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pay2keys-resurgence-iranian-cyber-warfare-targets--303f659b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pay2Key&apos;s%20Resurgence%3A%20Iranian%20Cyber%20Warfare%20Targets%20the%20West&amp;severity=medium&amp;id=68703822a83201eaacaa3af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-and-microsoft-trusted-them-23-million-users-d19d55b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20and%20Microsoft%20Trusted%20Them.%202.3%20Million%20Users%20Installed%20Them.%20They%20Were%20Malware.&amp;severity=medium&amp;id=68703822a83201eaacaa3aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53549-cwe-89-improper-neutralization-of-s-007420f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53549%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20matrix-org%20matrix-rust-sdk&amp;severity=medium&amp;id=68700a6fa83201eaaca9447a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53542-cwe-78-improper-neutralization-of-s-c97c3016</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53542%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kubernetes-sigs%20headlamp&amp;severity=high&amp;id=687006eba83201eaaca92a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/perfektblue-bluetooth-flaws-impact-mercedes-volksw-4638ca93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PerfektBlue%20Bluetooth%20flaws%20impact%20Mercedes%2C%20Volkswagen%2C%20Skoda%20cars&amp;severity=high&amp;id=68700366a83201eaaca917f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fix-the-click-preventing-the-clickfix-attack-vecto-21c21ddb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fix%20the%20Click%3A%20Preventing%20the%20ClickFix%20Attack%20Vector&amp;severity=medium&amp;id=687006eaa83201eaaca929eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macoszuru-resurfaces-modified-khepri-c2-hides-insi-257b117b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS.ZuRu%20Resurfaces%20%7C%20Modified%20Khepri%20C2%20Hides%20Inside%20Doctored%20Termius%20App&amp;severity=medium&amp;id=687006eaa83201eaaca92a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53371-cwe-400-uncontrolled-resource-consu-5cf841b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53371%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20miraheze%20DiscordNotifications&amp;severity=critical&amp;id=686ff8dba83201eaaca8f4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7410-sql-injection-in-code-projects-lifes-0eb8ef66</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7410%3A%20SQL%20Injection%20in%20code-projects%20LifeStyle%20Store&amp;severity=medium&amp;id=686ff55aa83201eaaca8e9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53020-cwe-401-missing-release-of-memory-a-007254f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53020%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=686ff55aa83201eaaca8e9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49812-cwe-287-improper-authentication-in--c3ecfc02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49812%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=686ff55aa83201eaaca8e9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49630-cwe-617-reachable-assertion-in-apac-3d5250cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49630%3A%20CWE-617%20Reachable%20Assertion%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=686ff55aa83201eaaca8e9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23048-cwe-284-improper-access-control-in--f999dde7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23048%3A%20CWE-284%20Improper%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=critical&amp;id=686ff1d3a83201eaaca8def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43394-cwe-918-server-side-request-forgery-5df5082e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43394%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6909084f7fff0e30cee23518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47252-cwe-150-improper-neutralization-of--eda656bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47252%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=690908517fff0e30cee2357d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43204-cwe-918-server-side-request-forgery-b5bf4578</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43204%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6909084f7fff0e30cee23514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42516-cwe-20-improper-input-validation-in-0a75bec4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42516%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6909084f7fff0e30cee23510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49464-cwe-287-improper-authentication-in--9e8ccc3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49464%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients%20for%20Windows&amp;severity=medium&amp;id=686fee50a83201eaaca8ca96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7409-sql-injection-in-code-projects-mobil-992bc0c5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7409%3A%20SQL%20Injection%20in%20code-projects%20Mobile%20Shop&amp;severity=medium&amp;id=686fee50a83201eaaca8ca99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49463-cwe-691-insufficient-control-flow-m-e43f3335</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49463%3A%20CWE-691%3A%20Insufficient%20Control%20Flow%20Management%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients%20for%20iOS&amp;severity=medium&amp;id=686fee50a83201eaaca8ca93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49462-cwe-352-cross-site-request-forgery--557fc1c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49462%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients&amp;severity=low&amp;id=686fee50a83201eaaca8ca90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploring-delegated-admin-risks-in-aws-organizatio-026220a9</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploring%20Delegated%20Admin%20Risks%20in%20AWS%20Organizations&amp;severity=medium&amp;id=686fe3caa83201eaaca8a12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46789-cwe-120-buffer-copy-without-checkin-6462f5e0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46789%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients%20for%20Windows&amp;severity=medium&amp;id=686fe3c5a83201eaaca8a110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46788-cwe-295-improper-certificate-valida-47470a28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46788%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20for%20Linux&amp;severity=high&amp;id=686fe3c5a83201eaaca8a10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6395-null-pointer-dereference-in-red-hat--6e6fcec4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6395%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=686fdcbba83201eaaca87c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53364-cwe-497-exposure-of-sensitive-syste-111dda3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53364%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=686fdcbba83201eaaca87c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46835-cwe-88-improper-neutralization-of-a-90976da3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46835%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20j6t%20git-gui&amp;severity=high&amp;id=686fd939a83201eaaca86b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46334-cwe-78-improper-neutralization-of-s-2854e76b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46334%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20j6t%20git-gui&amp;severity=high&amp;id=686fd939a83201eaaca86b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27614-cwe-78-improper-neutralization-of-s-40f9c845</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27614%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20j6t%20gitk&amp;severity=high&amp;id=686fd939a83201eaaca86b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27613-cwe-78-improper-neutralization-of-s-4a07b0bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27613%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20j6t%20gitk&amp;severity=low&amp;id=686fd5b8a83201eaaca851ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploiting-public-appkey-leaks-to-achieve-rce-in-h-576da58a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploiting%20Public%20APP_KEY%20Leaks%20to%20Achieve%20RCE%20in%20Hundreds%20of%20Laravel%20Applications&amp;severity=medium&amp;id=686fd239a83201eaaca83e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7408-cross-site-scripting-in-sourcecodest-8bed5105</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7408%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Zoo%20Management%20System&amp;severity=medium&amp;id=686fd230a83201eaaca83e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7365-origin-validation-error-in-red-hat-r-67ee3b17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7365%3A%20Origin%20Validation%20Error&amp;severity=high&amp;id=686fceada83201eaaca818f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36090-cwe-209-generation-of-error-message-9b1ee3b5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36090%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Analytics%20Content%20Hub&amp;severity=medium&amp;id=686fceada83201eaaca818f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7370-null-pointer-dereference-in-red-hat--2843c711</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7370&amp;severity=null&amp;id=686fceada83201eaaca818fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7424-access-of-resource-using-incompatibl-31ed5aac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7424%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20GNOME%20libxslt&amp;severity=high&amp;id=686fcb28a83201eaaca80f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7425-use-after-free-in-red-hat-red-hat-en-3dcb7036</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7425%3A%20Use%20After%20Free%20in%20GNOME%20libxml2&amp;severity=high&amp;id=686fc7a4a83201eaaca7ffbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/strengthening-microsoft-defender-understanding-log-81be85b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Strengthening%20Microsoft%20Defender%3A%20Understanding%20Logical%20Evasion%20Threats&amp;severity=high&amp;id=686fc424a83201eaaca7e7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7407-os-command-injection-in-netgear-d640-32fb555f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7407%3A%20OS%20Command%20Injection%20in%20Netgear%20D6400&amp;severity=medium&amp;id=686fc420a83201eaaca7e7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6211-cwe-440-expected-behavior-violation--9c1892d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6211%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=686fbd17a83201eaaca7d1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5040-cwe-122-heap-based-buffer-overflow-i-3d54e0a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5040%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=686fa801a83201eaaca73eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5037-cwe-120-buffer-copy-without-checking-f8c091ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5037%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Revit&amp;severity=high&amp;id=686fa801a83201eaaca73eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32990-heap-based-buffer-overflow-in-red-h-3b85eafa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32990%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=686f8bdfa83201eaaca6d794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5023-cwe-798-use-of-hard-coded-credential-6e6d0fc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5023%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Mitsubishi%20Electric%20Corporation%20PV-DR004J&amp;severity=high&amp;id=686f7dd1a83201eaaca69a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5022-cwe-521-weak-password-requirements-i-bb361a49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5022%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Mitsubishi%20Electric%20Corporation%20PV-DR004J&amp;severity=medium&amp;id=686f7dd1a83201eaaca69a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32989-improper-certificate-validation-in--ed015365</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32989%3A%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=686f76caa83201eaaca669d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32988-double-free-in-red-hat-red-hat-ente-22fdea7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32988%3A%20Double%20Free&amp;severity=medium&amp;id=686f76caa83201eaaca669ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6236-cwe-79-cross-site-scripting-xss-in-h-147454a0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6236%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Hostel&amp;severity=medium&amp;id=686f5aaaa83201eaaca59a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6234-cwe-79-cross-site-scripting-xss-in-h-bfe50c90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6234%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Hostel&amp;severity=medium&amp;id=686f5aaaa83201eaaca59a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7387-cwe-79-improper-neutralization-of-in-93261b77</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lanacodes%20Lana%20Downloads%20Manager&amp;severity=medium&amp;id=686f53a1a83201eaaca567f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatchable-vulnerabilities-in-windows-1011-securi-ae7e32f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatchable%20Vulnerabilities%20in%20Windows%2010%2F11%3A%20Security%20Report%202025&amp;severity=critical&amp;id=686f4215a83201eaaca4eeb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46406-cwe-270-privilege-context-switching-79cc574e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46406%3A%20CWE-270%20Privilege%20Context%20Switching%20Error%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=686f307ca83201eaaca4840e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44003-cwe-772-missing-release-of-resource-0f3f69f9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44003%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Gallagher%20T-Series%20Readers&amp;severity=medium&amp;id=686f307ba83201eaaca4840b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35983-cwe-295-improper-certificate-valida-fabd1294</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35983%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Gallagher%20Controller%207000&amp;severity=medium&amp;id=686f307aa83201eaaca48408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5807-cwe-79-improper-neutralization-of-in-ab801625</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mpol%20Gwolle%20Guestbook&amp;severity=medium&amp;id=686f1ee6a83201eaaca42833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4406-cwe-79-improper-neutralization-of-in-358dcbda</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4406%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=686f1ee6a83201eaaca4282e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-10-efc42793</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-10&amp;severity=medium&amp;id=687057bda83201eaacaac4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45662-na-cb95cffa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45662%3A%20n%2Fa&amp;severity=medium&amp;id=687014fca83201eaaca979b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28245-na-24dc49a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28245%3A%20n%2Fa&amp;severity=medium&amp;id=68700df4a83201eaaca957d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28244-na-c573cae6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28244%3A%20n%2Fa&amp;severity=high&amp;id=68700df3a83201eaaca957cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28243-na-887b4da2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28243%3A%20n%2Fa&amp;severity=high&amp;id=68700df3a83201eaaca957bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47813-cwe-209-generation-of-error-message-16d59a42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47813%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20wftpserver%20Wing%20FTP%20Server&amp;severity=medium&amp;id=686ff1d3a83201eaaca8df04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47811-cwe-267-privilege-defined-with-unsa-66e9f8e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47811%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20wftpserver%20Wing%20FTP%20Server&amp;severity=medium&amp;id=686ff1d3a83201eaaca8df00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27889-cwe-15-external-control-of-system-o-384687dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27889%3A%20CWE-15%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20wftpserver%20Wing%20FTP%20Server&amp;severity=low&amp;id=686ff1d3a83201eaaca8defb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44251-na-6e937638</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44251%3A%20n%2Fa&amp;severity=high&amp;id=686fd5b8a83201eaaca851b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0141-cwe-426-untrusted-search-path-in-pal-00700af7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0141%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=high&amp;id=686ef4b5a83201eaaca35358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0140-cwe-266-incorrect-privilege-assignme-29d18ee0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0140%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=medium&amp;id=686ef4b5a83201eaaca35355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0139-cwe-266-incorrect-privilege-assignme-eecf7611</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0139%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Palo%20Alto%20Networks%20Autonomous%20Digital%20Experience%20Manager&amp;severity=medium&amp;id=686ef4b5a83201eaaca35352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6976-cwe-79-improper-neutralization-of-in-6b01aebc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6976%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=686eedb2a83201eaaca33f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6975-cwe-79-improper-neutralization-of-in-a7b631bd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6975%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=686eedb2a83201eaaca33f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6970-cwe-89-improper-neutralization-of-sp-1b8323e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6970%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=high&amp;id=686eedb2a83201eaaca33f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53624-cwe-200-exposure-of-sensitive-infor-1622e9f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53624%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20webbertakken%20docusaurus-plugin-content-gists&amp;severity=critical&amp;id=686edc19a83201eaac9fb811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/would-you-like-an-idor-with-that-leaking-64-millio-1fbf6ce8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Would%20you%20like%20an%20IDOR%20with%20that%3F%20Leaking%2064%20million%20McDonald%E2%80%99s%20job%20applications&amp;severity=medium&amp;id=686ed19fa83201eaac9f3ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6376-cwe-20-improper-input-validation-in--829c3786</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6376%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20Arena%C2%AE&amp;severity=high&amp;id=686ed198a83201eaac9f3b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6377-cwe-20-improper-input-validation-in--c59b509d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6377%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20Arena%C2%AE&amp;severity=high&amp;id=686ed198a83201eaac9f3b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitcoin-depot-breach-exposes-data-of-nearly-27000--17bfc45f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitcoin%20Depot%20breach%20exposes%20data%20of%20nearly%2027%2C000%20crypto%20users&amp;severity=high&amp;id=686ec5736f40f0eb7205f620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nippon-steel-solutions-suffered-a-data-breach-foll-368a681e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nippon%20Steel%20Solutions%20suffered%20a%20data%20breach%20following%20a%20zero-day%20attack&amp;severity=critical&amp;id=686ec5736f40f0eb7205f624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53620-cwe-248-uncaught-exception-in-qwikd-19e2b88d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53620%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20QwikDev%20qwik&amp;severity=critical&amp;id=686ebaf16f40f0eb7205cb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36599-cwe-532-insertion-of-sensitive-info-67b81bdc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36599%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerFlex%20Manager%20VM&amp;severity=medium&amp;id=686ebaf16f40f0eb7205cb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/donot-apt-expands-operations-targets-european-fore-d14183de</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoNot%20APT%20Expands%20Operations%2C%20Targets%20European%20Foreign%20Ministries%20with%20LoptikMod%20Malware&amp;severity=high&amp;id=686eb05c6f40f0eb72059f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ingram-micro-starts-restoring-systems-after-ransom-f8688f54</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ingram%20Micro%20starts%20restoring%20systems%20after%20ransomware%20attack&amp;severity=high&amp;id=686eb05c6f40f0eb72059f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ruckus-networks-leaves-severe-flaws-unpatched-in-m-fe037cde</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ruckus%20Networks%20leaves%20severe%20flaws%20unpatched%20in%20management%20devices&amp;severity=critical&amp;id=686eb05c6f40f0eb72059f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53548-cwe-345-insufficient-verification-o-76fe39d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53548%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20clerk%20javascript&amp;severity=high&amp;id=686ea5d06f40f0eb72054170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-privilege-escalation-bugs-in-lenovo-van-d85a61c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Privilege%20Escalation%20Bugs%20in%20Lenovo%20Vantage%20%E2%80%94%20Atredis%20Partners&amp;severity=medium&amp;id=686e94456f40f0eb7204cbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53743-vulnerability-in-jenkins-project-je-673b4fab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53743%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Applitools%20Eyes%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53742-vulnerability-in-jenkins-project-je-e360fa55</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53742%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Applitools%20Eyes%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53678-vulnerability-in-jenkins-project-je-3c9656eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53678%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20User1st%20uTester%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53677-vulnerability-in-jenkins-project-je-17b7ef92</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53677%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Xooa%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53676-vulnerability-in-jenkins-project-je-4b37facc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53676%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Xooa%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53675-vulnerability-in-jenkins-project-je-8b4a54ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53675%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Warrior%20Framework%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53674-vulnerability-in-jenkins-project-je-9a74a044</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53674%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Sensedia%20Api%20Platform%20tools%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53673-vulnerability-in-jenkins-project-je-30346923</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53673%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Sensedia%20Api%20Platform%20tools%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53672-vulnerability-in-jenkins-project-je-57d2150f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53672%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Kryptowire%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53671-vulnerability-in-jenkins-project-je-8e75e739</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53671%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nouvola%20DiveCloud%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53670-vulnerability-in-jenkins-project-je-14770a11</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53670%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nouvola%20DiveCloud%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53669-vulnerability-in-jenkins-project-je-226477d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53669%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20VAddy%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53668-vulnerability-in-jenkins-project-je-102d63d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53668%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20VAddy%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53667-vulnerability-in-jenkins-project-je-5eeaef52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53667%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Dead%20Man&apos;s%20Snitch%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53666-vulnerability-in-jenkins-project-je-6acd8bab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53666%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Dead%20Man&apos;s%20Snitch%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53665-vulnerability-in-jenkins-project-je-22d9c5b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53665%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Apica%20Loadtest%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53664-vulnerability-in-jenkins-project-je-a79e767a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53664%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Apica%20Loadtest%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53663-vulnerability-in-jenkins-project-je-5b0a06ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53663%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20IBM%20Cloud%20DevOps%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53662-vulnerability-in-jenkins-project-je-f2d133db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53662%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20IFTTT%20Build%20Notifier%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53661-vulnerability-in-jenkins-project-je-85a0bd1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53661%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Testsigma%20Test%20Plan%20run%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53660-vulnerability-in-jenkins-project-je-6b964c65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53660%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20QMetry%20Test%20Management%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53659-vulnerability-in-jenkins-project-je-635e1da6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53659%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20QMetry%20Test%20Management%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53658-vulnerability-in-jenkins-project-je-ded29742</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53658%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Applitools%20Eyes%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53657-vulnerability-in-jenkins-project-je-d9f7dc21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53657%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20ReadyAPI%20Functional%20Testing%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53656-vulnerability-in-jenkins-project-je-5445dda7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53656%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20ReadyAPI%20Functional%20Testing%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53655-vulnerability-in-jenkins-project-je-682f6cff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53655%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Statistics%20Gatherer%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53654-vulnerability-in-jenkins-project-je-bfdc5f63</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53654%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Statistics%20Gatherer%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53653-vulnerability-in-jenkins-project-je-d6dae703</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53653%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Aqua%20Security%20Scanner%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53652-vulnerability-in-jenkins-project-je-3d3722f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53652%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Git%20Parameter%20Plugin&amp;severity=high&amp;id=686e90ba6f40f0eb7204bd20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53651-vulnerability-in-jenkins-project-je-67276466</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53651%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20HTML%20Publisher%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53650-vulnerability-in-jenkins-project-je-50565e39</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53650%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Credentials%20Binding%20Plugin&amp;severity=high&amp;id=686e90ba6f40f0eb7204bd1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7381-cwe-497-in-mautic-docker-mautic-8d2ff969</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7381%3A%20CWE-497%20in%20mautic%20Docker%20Mautic&amp;severity=medium&amp;id=686e943d6f40f0eb7204cbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7204-cwe-201-insertion-of-sensitive-infor-9d13896e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7204%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ConnectWise%20PSA&amp;severity=medium&amp;id=686e862c6f40f0eb72047eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-group-pay2keyi2p-ramps-up-ransomware-attac-135c2fad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20group%20Pay2Key.I2P%20ramps%20Up%20ransomware%20attacks%20against%20Israel%20and%20US%20with%20incentives%20for%20affiliates&amp;severity=medium&amp;id=686e82a76f40f0eb72045f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attack-stops-nova-scotia-power-meter-re-27592a27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Attack%20Stops%20Nova%20Scotia%20Power%20Meter%20Readings&amp;severity=high&amp;id=686e82a76f40f0eb72045f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1112-cwe-282-improper-ownership-managemen-e8af9a62</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1112%3A%20CWE-282%20Improper%20Ownership%20Management%20in%20IBM%20OpenPages%20with%20Watson&amp;severity=medium&amp;id=686e82c46f40f0eb72045fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2670-cwe-497-exposure-of-sensitive-system-fd07f2af</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2670%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=686e7f236f40f0eb72045275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53546-cwe-829-inclusion-of-functionality--a383e92f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53546%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20RSSNext%20Folo&amp;severity=critical&amp;id=686e7f236f40f0eb72045278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pull-request-infects-vs-code-extension-838a52b1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20pull%20request%20infects%20VS%20Code%20extension&amp;severity=medium&amp;id=686ec58d6f40f0eb7206fd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-leaked-machine-keys-by-initial-acc-8ceed63a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Leaked%20Machine%20Keys%20by%20Initial%20Access%20Broker&amp;severity=medium&amp;id=686e71156f40f0eb7203f20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6514-cwe-78-improper-neutralization-of-sp-95e77237</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6514%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=686e66886f40f0eb7203a122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/server-with-rockerbox-tax-firm-data-exposed-286gb--df972f8c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Server%20with%20Rockerbox%20Tax%20Firm%20Data%20Exposed%20286GB%20of%20PII%20Records&amp;severity=medium&amp;id=686e3c566f40f0eb72026c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-taptrap-attack-fools-users-with-invisi-ab6a05c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20TapTrap%20attack%20fools%20users%20with%20invisible%20UI%20trick&amp;severity=high&amp;id=686e31ca6f40f0eb72023a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ms-confirms-social-engineering-led-to-massive-rans-72d07b89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M%26S%20confirms%20social%20engineering%20led%20to%20massive%20ransomware%20attack&amp;severity=high&amp;id=686e31ca6f40f0eb72023a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3499-cwe-78-improper-neutralization-of-sp-2cd73387</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3499%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(%E2%80%99OS%20Command%20Injection%E2%80%99)%20in%20Radiflow%20iSAP%20Smart%20Collector&amp;severity=critical&amp;id=686e31e96f40f0eb72023af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3498-cwe-306-missing-authentication-for-c-eaab1b25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3498%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Radiflow%20iSAP%20Smart%20Collector&amp;severity=critical&amp;id=686e31e96f40f0eb72023af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3497-cwe-1104-use-of-unmaintained-third-p-51517884</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3497%3A%20CWE-1104%3A%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20Radiflow%20iSAP%20Smart%20Collector&amp;severity=high&amp;id=686e2e466f40f0eb72022b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27028-vulnerability-in-radiflow-isap-smar-9404fde2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27028%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Radiflow%20iSAP%20Smart%20Collector&amp;severity=medium&amp;id=686e2e466f40f0eb72022b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27027-vulnerability-in-radiflow-isap-smar-c1578886</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27027%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20Radiflow%20iSAP%20Smart%20Collector&amp;severity=medium&amp;id=686e2e466f40f0eb72022b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7379-cwe-352-cross-site-request-forgery-c-a50bb7da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7379%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=686e2e466f40f0eb72022b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7378-cwe-20-improper-input-validation-in--a573bb5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7378%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=686e192f6f40f0eb720017c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7220-sql-injection-in-campcodes-payroll-m-2de60b49</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7220%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686e12276f40f0eb72fff4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7219-sql-injection-in-campcodes-payroll-m-731899f0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7219%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686e0b1e6f40f0eb72ffdce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7218-sql-injection-in-campcodes-payroll-m-2d4e8df9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7218%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686e00926f40f0eb72ff9b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6691-cwe-73-external-control-of-file-name-c2d09e9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6691%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20brainstormforce%20SureForms%20%E2%80%93%20Drag%20and%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=high&amp;id=686e00926f40f0eb72ff9b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6742-cwe-502-deserialization-of-untrusted-97395e83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6742%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20brainstormforce%20SureForms%20%E2%80%93%20Drag%20and%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=high&amp;id=686e00926f40f0eb72ff9b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-announces-arresting-state-sponsored-chinese-hac-68b884f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Announces%20Arresting%20State-Sponsored%20Chinese%20Hacker%20Linked%20to%20HAFNIUM%20(Silk%20Typhoon)%20Group&amp;severity=medium&amp;id=686df9896f40f0eb72ff79a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7217-sql-injection-in-campcodes-payroll-m-42f34743</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7217%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686dfd0e6f40f0eb72ff91ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7216-deserialization-in-lty628-aidigu-789c00f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7216%3A%20Deserialization%20in%20lty628%20Aidigu&amp;severity=medium&amp;id=686df2826f40f0eb72fe4a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7215-cleartext-storage-of-sensitive-infor-ada03569</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7215%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20FNKvision%20FNK-GU2&amp;severity=low&amp;id=686def016f40f0eb72fe3779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7214-risky-cryptographic-algorithm-in-fnk-0f6c57ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7214%3A%20Risky%20Cryptographic%20Algorithm%20in%20FNKvision%20FNK-GU2&amp;severity=low&amp;id=686de4726f40f0eb72fdff0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4606-cwe-620-unverified-password-change-i-6ac15fdf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4606%3A%20CWE-620%20Unverified%20Password%20Change%20in%20uxper%20Sala%20-%20Startup%20%26%20SaaS%20WordPress%20Theme&amp;severity=critical&amp;id=686de4726f40f0eb72fdff05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7059-cwe-79-improper-neutralization-of-in-bee58a71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jdegayojr%20Simple%20Featured%20Image&amp;severity=medium&amp;id=686de4726f40f0eb72fdff09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bypassing-live-html-filtering-to-trigger-stored-xs-79ac0a46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bypassing%20Live%20HTML%20Filtering%20to%20Trigger%20Stored%20XSS%20%E2%80%93%20DOM-Based%20Exploitation&amp;severity=medium&amp;id=686de0f76f40f0eb72fded67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spyware-targets-employees-via-weaponized-word-docu-f362758a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spyware%20Targets%20Employees%20via%20Weaponized%20Word%20Documents%20Delivering%20Malware%20Payloads&amp;severity=medium&amp;id=686e58776f40f0eb72032d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7213-on-chip-debug-and-test-interface-wit-7d415ea0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7213%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20FNKvision%20FNK-GU2&amp;severity=medium&amp;id=686de0ee6f40f0eb72fded2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7212-sql-injection-in-itsourcecode-insura-bdb1e700</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7212%3A%20SQL%20Injection%20in%20itsourcecode%20Insurance%20Management%20System&amp;severity=medium&amp;id=686dd6626f40f0eb72fdaed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7211-sql-injection-in-code-projects-lifes-fbbd7235</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7211%3A%20SQL%20Injection%20in%20code-projects%20LifeStyle%20Store&amp;severity=medium&amp;id=686dd6626f40f0eb72fdaed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5678-cwe-79-improper-neutralization-of-in-ba6ab51f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5678%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=686dcbd66f40f0eb72fd7834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7210-unrestricted-upload-in-code-projects-e96a3293</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7210%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20Management%20System&amp;severity=medium&amp;id=686dcbd66f40f0eb72fd7839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7209-null-pointer-dereference-in-9fans-pl-822ed7f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7209%3A%20NULL%20Pointer%20Dereference%20in%209fans%20plan9port&amp;severity=medium&amp;id=686dc4ce6f40f0eb72fd189a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34083-cwe-434-unrestricted-upload-of-file-817d0ba0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34083&amp;severity=null&amp;id=686dc4ce6f40f0eb72fd187d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34084-cwe-200-exposure-of-sensitive-infor-16bd0df8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34084&amp;severity=null&amp;id=686dc4ce6f40f0eb72fd1887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34077-cwe-434-unrestricted-upload-of-file-a60a1fb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34077%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Genetech%20Solutions%20WordPress%20Pie%20Register%20Plugin&amp;severity=critical&amp;id=686dc4ce6f40f0eb72fd1875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34085-cwe-434-unrestricted-upload-of-file-7286e0e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34085&amp;severity=null&amp;id=686dc4ce6f40f0eb72fd188f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7208-heap-based-buffer-overflow-in-9fans--04d069d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7208%3A%20Heap-based%20Buffer%20Overflow%20in%209fans%20plan9port&amp;severity=medium&amp;id=686dbdc66f40f0eb72fcf597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7207-heap-based-buffer-overflow-in-mruby-118a606d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7207%3A%20Heap-based%20Buffer%20Overflow%20in%20mruby&amp;severity=medium&amp;id=686db6c86f40f0eb72fcceb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-09-7c163c67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-09&amp;severity=medium&amp;id=686f063da83201eaaca39fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52357-na-8fcdb30c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52357%3A%20n%2Fa&amp;severity=medium&amp;id=686ed198a83201eaac9f3b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53645-na-fea0454c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53645%3A%20n%2Fa&amp;severity=high&amp;id=686e9ec76f40f0eb720500db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44525-na-6a0e2c61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44525%3A%20n%2Fa&amp;severity=medium&amp;id=686e97c56f40f0eb7204eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49604-na-f89248e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49604%3A%20n%2Fa&amp;severity=medium&amp;id=686e943d6f40f0eb7204cbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44526-na-1897ed65</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44526%3A%20n%2Fa&amp;severity=medium&amp;id=686e943d6f40f0eb7204cbc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44177-na-163ddbcd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44177%3A%20n%2Fa&amp;severity=high&amp;id=686e90ba6f40f0eb7204bd16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52364-na-18199642</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52364%3A%20n%2Fa&amp;severity=high&amp;id=686e82c46f40f0eb72045fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7206-stack-based-buffer-overflow-in-d-lin-eb352869</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7206%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=critical&amp;id=686dac326f40f0eb72fc67a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4855-cwe-639-authorization-bypass-through-df73ce54</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4855%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Schiocco%20Support%20Board&amp;severity=critical&amp;id=686dac326f40f0eb72fc67b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4828-cwe-22-improper-limitation-of-a-path-9a4ec86e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4828%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=critical&amp;id=686dac326f40f0eb72fc67b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3780-cwe-862-missing-authorization-in-wcl-4fc81a3d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3780%3A%20CWE-862%20Missing%20Authorization%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=686dac326f40f0eb72fc67ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7200-sql-injection-in-krishna9772-pharmac-935f1084</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7200%3A%20SQL%20Injection%20in%20krishna9772%20Pharmacy%20Management%20System&amp;severity=medium&amp;id=686da52a6f40f0eb72fc4561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7199-sql-injection-in-code-projects-libra-a4580885</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7199%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686d9e226f40f0eb72fc0f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47098-access-of-uninitialized-pointer-cwe-23580586</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47098%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=686d9e226f40f0eb72fc0f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47097-integer-underflow-wrap-or-wraparoun-e7d8d929</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47097%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=686d9e226f40f0eb72fc0f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47099-heap-based-buffer-overflow-cwe-122--959e0f09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47099%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=686d9e226f40f0eb72fc0f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47120-stack-based-buffer-overflow-cwe-121-907af528</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47120%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=686d9a9f6f40f0eb72fbf84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47126-out-of-bounds-write-cwe-787-in-adob-e2040c5b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47126%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47128-integer-underflow-wrap-or-wraparoun-624c529e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47128%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47131-heap-based-buffer-overflow-cwe-122--5db9b910</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47131%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47122-heap-based-buffer-overflow-cwe-122--319ab3fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47122%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47130-integer-underflow-wrap-or-wraparoun-5dbe9916</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47130%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47133-out-of-bounds-write-cwe-787-in-adob-ea21f50f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47133%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47121-access-of-uninitialized-pointer-cwe-28a57e9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47121%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47124-out-of-bounds-write-cwe-787-in-adob-8de6f8b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47124%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47127-out-of-bounds-write-cwe-787-in-adob-57ab2fdb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47127%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47129-out-of-bounds-write-cwe-787-in-adob-97bcdbd6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47129%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47119-null-pointer-dereference-cwe-476-in-21b81382</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47119%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=686d9a9f6f40f0eb72fbf847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47125-heap-based-buffer-overflow-cwe-122--4bc1e5ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47125%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47123-heap-based-buffer-overflow-cwe-122--b767b7df</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47123%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47132-out-of-bounds-write-cwe-787-in-adob-7247c56b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47132%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7198-sql-injection-in-code-projects-jonny-7dbd8776</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7198%3A%20SQL%20Injection%20in%20code-projects%20Jonnys%20Liquor&amp;severity=medium&amp;id=686d971c6f40f0eb72fbe6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49524-null-pointer-dereference-cwe-476-in-12f15644</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49524%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=686d971b6f40f0eb72fbe6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49528-stack-based-buffer-overflow-cwe-121-cd84b44c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49528%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49531-integer-overflow-or-wraparound-cwe--bfb27049</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49531%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49527-stack-based-buffer-overflow-cwe-121-57061155</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49527%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49532-integer-underflow-wrap-or-wraparoun-f36f64e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49532%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49525-out-of-bounds-read-cwe-125-in-adobe-4b887670</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49525%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=686d971b6f40f0eb72fbe6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49529-access-of-uninitialized-pointer-cwe-d97dffc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49529%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49530-out-of-bounds-write-cwe-787-in-adob-55beda48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49530%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49526-out-of-bounds-write-cwe-787-in-adob-d1063ad6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49526%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30313-out-of-bounds-read-cwe-125-in-adobe-2ceb0aa2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30313%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=686d971b6f40f0eb72fbe6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43591-heap-based-buffer-overflow-cwe-122--7b320af1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43591%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93966f40f0eb72fbc807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43592-access-of-uninitialized-pointer-cwe-7b5fc2a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43592%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93976f40f0eb72fbc80a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43594-out-of-bounds-write-cwe-787-in-adob-22978a9b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43594%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93976f40f0eb72fbc80d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47134-heap-based-buffer-overflow-cwe-122--325aa841</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47134%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93976f40f0eb72fbc813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47136-integer-underflow-wrap-or-wraparoun-927c1b22</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47136%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93976f40f0eb72fbc816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47103-heap-based-buffer-overflow-cwe-122--3be5480b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47103%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93976f40f0eb72fbc810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6759-cwe-269-improper-privilege-managemen-b8ed1693</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6759%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Citrix%20Windows%20Virtual%20Delivery%20Agent%20for%20CVAD%20and%20Citrix%20DaaS&amp;severity=high&amp;id=686d93976f40f0eb72fbc81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49547-cross-site-scripting-stored-xss-cwe-b9d88d6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49547%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=686d93976f40f0eb72fbc81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49534-cross-site-scripting-stored-xss-cwe-c41ab3aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49534%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=686d93976f40f0eb72fbc819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49533-deserialization-of-untrusted-data-c-81de7990</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49533%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Experience%20Manager%20(MS)&amp;severity=critical&amp;id=686d90126f40f0eb72fbad72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7197-sql-injection-in-code-projects-jonny-8236c498</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7197%3A%20SQL%20Injection%20in%20code-projects%20Jonnys%20Liquor&amp;severity=medium&amp;id=686d90126f40f0eb72fbad75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27203-deserialization-of-untrusted-data-c-cfc5e3c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27203%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=686d90126f40f0eb72fbad7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27165-out-of-bounds-read-cwe-125-in-adobe-66394c55</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27165%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=medium&amp;id=686d8cfe6f40f0eb72fb9fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43584-out-of-bounds-read-cwe-125-in-adobe-71366ed6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43584%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=medium&amp;id=686d8d0e6f40f0eb72fba021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43583-null-pointer-dereference-cwe-476-in-84f384a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43583%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=medium&amp;id=686d8d036f40f0eb72fba00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43582-heap-based-buffer-overflow-cwe-122--0c474e1e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43582%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=686d8d016f40f0eb72fb9ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7196-sql-injection-in-code-projects-jonny-ff52cf43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7196%3A%20SQL%20Injection%20in%20code-projects%20Jonnys%20Liquor&amp;severity=medium&amp;id=686d8d0e6f40f0eb72fba028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7031-cwe-306-missing-authentication-for-c-98af8a52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7031%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Drupal%20Config%20Pages%20Viewer&amp;severity=medium&amp;id=686d862b6f40f0eb72fb67f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7030-cwe-267-privilege-defined-with-unsaf-657291df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7030%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Drupal%20Two-factor%20Authentication%20(TFA)&amp;severity=medium&amp;id=686d862b6f40f0eb72fb67f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49542-cross-site-scripting-reflected-xss--437748b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49542%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb6766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49535-improper-restriction-of-xml-externa-153db7d8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49535%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=686d86116f40f0eb72fb6751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49536-incorrect-authorization-cwe-863-in--c3c6fd97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49536%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=686d86126f40f0eb72fb6754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49539-improper-restriction-of-xml-externa-ab40c344</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49539%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb675d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49545-server-side-request-forgery-ssrf-cw-98f4692a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49545%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86296f40f0eb72fb67d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49541-cross-site-scripting-stored-xss-cwe-75db7033</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49541%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb6763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49537-improper-neutralization-of-special--062b584a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49537%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=686d86126f40f0eb72fb6757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49551-use-of-hard-coded-credentials-cwe-7-6312ebab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49551%3A%20Use%20of%20Hard-coded%20Credentials%20(CWE-798)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=686d862a6f40f0eb72fb67e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49546-improper-access-control-cwe-284-in--4fbe651b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49546%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=686d862a6f40f0eb72fb67e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49544-improper-restriction-of-xml-externa-bb8fcbfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49544%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb676c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49543-cross-site-scripting-stored-xss-cwe-2ea22a0d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49543%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb6769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49540-cross-site-scripting-stored-xss-cwe-70781077</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49540%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb6760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49538-xml-injection-aka-blind-xpath-injec-74c7b728</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49538%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20(CWE-91)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=686d86126f40f0eb72fb675a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7194-stack-based-buffer-overflow-in-d-lin-4fd463d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7194%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-500WF&amp;severity=high&amp;id=686d862b6f40f0eb72fb6800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7193-sql-injection-in-itsourcecode-agri-t-2d038426</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7193%3A%20SQL%20Injection%20in%20itsourcecode%20Agri-Trading%20Online%20Shopping%20System&amp;severity=medium&amp;id=686d7afb6f40f0eb72fb3377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53355-cwe-77-improper-neutralization-of-s-f03f2a5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53355%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Flux159%20mcp-server-kubernetes&amp;severity=high&amp;id=686d777b6f40f0eb72fa15a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7192-command-injection-in-d-link-dir-645-06b839f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7192%3A%20Command%20Injection%20in%20D-Link%20DIR-645&amp;severity=medium&amp;id=686d73ff6f40f0eb72f9fce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37103-vulnerability-in-hewlett-packard-en-e4ec5fe1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37103%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Networking%20Instant%20On&amp;severity=critical&amp;id=686d707d6f40f0eb72f9dd06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37102-vulnerability-in-hewlett-packard-en-80289359</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37102%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Networking%20Instant%20On&amp;severity=high&amp;id=686d6d446f40f0eb72f9d117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7191-sql-injection-in-code-projects-stude-0efa2636</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7191%3A%20SQL%20Injection%20in%20code-projects%20Student%20Enrollment%20System&amp;severity=medium&amp;id=686d6d446f40f0eb72f9d11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italian-police-arrested-a-chinese-national-suspect-9eb29496</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italian%20police%20arrested%20a%20Chinese%20national%20suspected%20of%20cyberespionage%20on%20a%20U.S.%20warrant&amp;severity=medium&amp;id=686d6d256f40f0eb72f9d0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27369-cwe-497-exposure-of-sensitive-syste-8e18ea1e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27369%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20OpenPages%20with%20Watson&amp;severity=medium&amp;id=686d6adf6f40f0eb72f9c54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27367-cwe-602-client-side-enforcement-of--9ae8de83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27367%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20OpenPages%20with%20Watson&amp;severity=medium&amp;id=686d6adf6f40f0eb72f9c542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7190-unrestricted-upload-in-code-projects-819d4120</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7190%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20Management%20System&amp;severity=medium&amp;id=686d6ae06f40f0eb72f9c550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7189-sql-injection-in-code-projects-chat--720f86d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7189%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=686d5eda6f40f0eb72f987ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4663-cwe-754-improper-check-for-unusual-o-d19838aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4663%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Broadcom%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=686d5eda6f40f0eb72f987f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7188-sql-injection-in-code-projects-chat--cd087a9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7188%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=686d57da6f40f0eb72f94b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30312-out-of-bounds-write-cwe-787-in-adob-2490c605</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30312%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=686d57da6f40f0eb72f94b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47135-out-of-bounds-read-cwe-125-in-adobe-6610ce85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47135%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=686d57da6f40f0eb72f94b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7363-cwe-79-improper-neutralization-of-in-8d0ff86a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20TitleIcon%20extension&amp;severity=medium&amp;id=686d57da6f40f0eb72f94b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7362-cwe-79-improper-neutralization-of-in-a4f00fc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20MsUpload%20extension&amp;severity=medium&amp;id=686d54576f40f0eb72f9310f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0928-cwe-285-improper-authorization-in-ca-33dc3e99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0928%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Canonical%20Juju&amp;severity=high&amp;id=686d54576f40f0eb72f93108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53479-cwe-79-improper-neutralization-of-i-6a8e1628</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20CheckUser%20extension&amp;severity=medium&amp;id=686d54576f40f0eb72f9310b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7187-sql-injection-in-code-projects-chat--e568bc91</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7187%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=686d50d86f40f0eb72f91cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36357-cwe-1421-exposure-of-sensitive-info-9a734776</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36357%3A%20CWE-1421%20%20Exposure%20of%20Sensitive%20Information%20in%20Shared%20Microarchitectural%20Structures%20during%20Transient%20Execution%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors&amp;severity=medium&amp;id=6908ed741c2a0078ae510262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47988-cwe-94-improper-control-of-generati-aad0df58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47988%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=686d50d36f40f0eb72f91b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49744-cwe-122-heap-based-buffer-overflow--b3afd351</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49744%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d86f40f0eb72f91ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49742-cwe-190-integer-overflow-or-wraparo-61f88ec0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49742%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d86f40f0eb72f91ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49740-cwe-693-protection-mechanism-failur-b45f273b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49740%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d86f40f0eb72f91cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49739-cwe-59-improper-link-resolution-bef-56ae6c56</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49739%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202015%20Update%203&amp;severity=high&amp;id=686d50d86f40f0eb72f91cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49738-cwe-59-improper-link-resolution-bef-881eab79</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49738%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20PC%20Manager&amp;severity=high&amp;id=686d50d86f40f0eb72f91cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49737-cwe-362-concurrent-execution-using--12a077fa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49737%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Microsoft%20Teams%20for%20Mac%2C%20New%20Edition&amp;severity=high&amp;id=686d50d76f40f0eb72f91cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47999-cwe-820-missing-synchronization-in--414de2d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47999%3A%20CWE-820%3A%20Missing%20Synchronization%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49733-cwe-416-use-after-free-in-microsoft-365fe658</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49733%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=686d50d76f40f0eb72f91cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49732-cwe-122-heap-based-buffer-overflow--1be712f7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49732%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d76f40f0eb72f91cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49730-cwe-367-time-of-check-time-of-use-t-722f09e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49730%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d76f40f0eb72f91ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49729-cwe-122-heap-based-buffer-overflow--5dca7a3c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49729%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d76f40f0eb72f91ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49727-cwe-122-heap-based-buffer-overflow--d9839c3b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49727%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d76f40f0eb72f91ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49725-cwe-416-use-after-free-in-microsoft-800e5a31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49725%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d76f40f0eb72f91c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49724-cwe-416-use-after-free-in-microsoft-d95e55e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49724%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=686d50d76f40f0eb72f91c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49722-cwe-400-uncontrolled-resource-consu-7ee08ea5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49722%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d76f40f0eb72f91c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49718-cwe-908-use-of-uninitialized-resour-cd46aa12</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49718%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2032)&amp;severity=high&amp;id=686d50d76f40f0eb72f91c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49714-cwe-501-trust-boundary-violation-in-f744ba58</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49714%3A%20CWE-501%3A%20Trust%20Boundary%20Violation%20in%20Microsoft%20Python%20extension%20for%20Visual%20Studio%20Code&amp;severity=high&amp;id=686d50d76f40f0eb72f91c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49706-cwe-287-improper-authentication-in--912e5ab8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49706%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=686d50d66f40f0eb72f91c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49705-cwe-122-heap-based-buffer-overflow--50b716af</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49705%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49704-cwe-94-improper-control-of-generati-0493c535</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49704%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=686d50d66f40f0eb72f91c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49703-cwe-416-use-after-free-in-microsoft-27d94042</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49703%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49702-cwe-843-access-of-resource-using-in-0e0f9fa2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49702%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49701-cwe-285-improper-authorization-in-m-a1f37791</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49701%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=686d50d66f40f0eb72f91c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49700-cwe-416-use-after-free-in-microsoft-79d25e27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49700%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49699-cwe-416-use-after-free-in-microsoft-8fbf6a7e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49699%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49698-cwe-416-use-after-free-in-microsoft-a699458f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49698%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49697-cwe-122-heap-based-buffer-overflow--2948c499</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49697%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49696-cwe-125-out-of-bounds-read-in-micro-414e5503</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49696%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49695-cwe-416-use-after-free-in-microsoft-f6ac9837</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49695%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49693-cwe-415-double-free-in-microsoft-wi-f334cdb6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49693%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=686d50d66f40f0eb72f91c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49685-cwe-416-use-after-free-in-microsoft-795d9115</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49685%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=686d50d66f40f0eb72f91c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49684-cwe-126-buffer-over-read-in-microso-c7abed1a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49684%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d66f40f0eb72f91c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49683-cwe-190-integer-overflow-or-wraparo-f8e64a94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49683%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49682-cwe-416-use-after-free-in-microsoft-ebaa0802</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49682%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=686d50d66f40f0eb72f91c0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49681-cwe-125-out-of-bounds-read-in-micro-b37159b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49681%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=686d50d66f40f0eb72f91c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49680-cwe-59-improper-link-resolution-bef-9f251517</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49680%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49679-cwe-197-numeric-truncation-error-in-2a9ebfd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49679%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49678-cwe-476-null-pointer-dereference-in-75854200</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49678%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49675-cwe-416-use-after-free-in-microsoft-1a371410</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49675%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49673-cwe-122-heap-based-buffer-overflow--89cc7362</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49673%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49669-cwe-122-heap-based-buffer-overflow--9cbf142f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49669%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49668-cwe-122-heap-based-buffer-overflow--fefbb465</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49668%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49667-cwe-415-double-free-in-microsoft-wi-5c9427f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49667%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49666-cwe-122-heap-based-buffer-overflow--fab36769</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49666%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=686d50d56f40f0eb72f91bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49665-cwe-362-concurrent-execution-using--985065c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49665%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49664-cwe-200-exposure-of-sensitive-infor-9a72311a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49664%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d56f40f0eb72f91bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49663-cwe-122-heap-based-buffer-overflow--45b90f59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49663%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49660-cwe-416-use-after-free-in-microsoft-eef5ccaf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49660%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49659-cwe-126-buffer-over-read-in-microso-3b284e93</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49659%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48823-information-disclosure-in-microsoft-d4ff6772</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48823%3A%20CWE-310%3A%20CWE%20CATEGORY%3A%20Cryptographic%20Issues%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d56f40f0eb72f91bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48822-cwe-125-out-of-bounds-read-in-micro-8c201fa5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48822%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d46f40f0eb72f91b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48821-cwe-416-use-after-free-in-microsoft-023535ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48821%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48820-cwe-59-improper-link-resolution-bef-913c146a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48820%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48819-cwe-591-sensitive-data-storage-in-i-2db08258</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48819%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48818-cwe-367-time-of-check-time-of-use-t-a9097669</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48818%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48817-cwe-23-relative-path-traversal-in-m-d26f6287</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48817%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=686d50d46f40f0eb72f91b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48816-cwe-190-integer-overflow-or-wraparo-f7836539</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48816%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48815-cwe-843-access-of-resource-using-in-c1448c7e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48815%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48814-cwe-306-missing-authentication-for--658bcb2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48814%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d46f40f0eb72f91b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48811-cwe-353-missing-support-for-integri-ccd28cde</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48811%3A%20CWE-353%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48810-cwe-1037-processor-optimization-rem-46167e85</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48810%3A%20CWE-1037%3A%20%20Processor%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48809-cwe-1037-processor-optimization-rem-0167ab15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48809%3A%20CWE-1037%3A%20%20Processor%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48808-cwe-200-exposure-of-sensitive-infor-099be242</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48808%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48806-cwe-416-use-after-free-in-microsoft-8df8db53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48806%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48805-cwe-122-heap-based-buffer-overflow--2dee5d1c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48805%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48804-cwe-349-acceptance-of-extraneous-un-25f70721</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48804%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48803-cwe-353-missing-support-for-integri-a18de237</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48803%3A%20CWE-353%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48802-cwe-295-improper-certificate-valida-e525e3c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48802%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48800-cwe-693-protection-mechanism-failur-09410087</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48800%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48799-cwe-59-improper-link-resolution-bef-2fb6583a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48799%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d46f40f0eb72f91b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48003-cwe-693-protection-mechanism-failur-4c5180dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48003%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48002-cwe-190-integer-overflow-or-wraparo-5ca2d22b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48002%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48001-cwe-367-time-of-check-time-of-use-t-1507a11c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48001%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48000-cwe-416-use-after-free-in-microsoft-9d8c4b55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48000%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d46f40f0eb72f91b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47998-cwe-122-heap-based-buffer-overflow--84e65615</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47998%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d46f40f0eb72f91b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47996-cwe-191-integer-underflow-wrap-or-w-151192e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47996%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47982-cwe-20-improper-input-validation-in-969b361a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47982%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d36f40f0eb72f91b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47981-cwe-122-heap-based-buffer-overflow--a0c0da81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47981%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=critical&amp;id=686d50d36f40f0eb72f91b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47980-cwe-200-exposure-of-sensitive-infor-f9bc52e7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47980%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d36f40f0eb72f91b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47978-cwe-125-out-of-bounds-read-in-micro-b83666ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47978%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202022&amp;severity=medium&amp;id=686d50d36f40f0eb72f91b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47975-cwe-415-double-free-in-microsoft-wi-d2789d6c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47975%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47973-cwe-126-buffer-over-read-in-microso-ae8b1b0f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47973%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49760-cwe-73-external-control-of-file-nam-25a576e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49760%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=686d50d86f40f0eb72f91cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49756-cwe-327-use-of-a-broken-or-risky-cr-f6afbfb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49756%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=low&amp;id=686d50d86f40f0eb72f91cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49753-cwe-122-heap-based-buffer-overflow--ef6fc8f0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49753%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d86f40f0eb72f91cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47178-cwe-89-improper-neutralization-of-s-2e29280f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47178%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=high&amp;id=686d50d36f40f0eb72f91aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49735-cwe-416-use-after-free-in-microsoft-dc53467c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49735%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=686d50d76f40f0eb72f91cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49731-cwe-280-improper-handling-of-insuff-f2f74a84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49731%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Microsoft%20Teams%20for%20Android&amp;severity=low&amp;id=686d50d76f40f0eb72f91caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49726-cwe-416-use-after-free-in-microsoft-cc4bb3eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49726%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d76f40f0eb72f91c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49723-cwe-862-missing-authorization-in-mi-b12b72f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49723%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=686d50d76f40f0eb72f91c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49721-cwe-122-heap-based-buffer-overflow--0a1d0cc3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49721%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d76f40f0eb72f91c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49719-cwe-20-improper-input-validation-in-09f65677</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49719%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20for%20Service%20Pack%202%20(GDR)&amp;severity=high&amp;id=686d50d76f40f0eb72f91c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49717-cwe-122-heap-based-buffer-overflow--82012ebc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49717%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2032)&amp;severity=high&amp;id=686d50d76f40f0eb72f91c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49716-cwe-400-uncontrolled-resource-consu-f523a981</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49716%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d76f40f0eb72f91c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49711-cwe-416-use-after-free-in-microsoft-1260a61b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49711%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d76f40f0eb72f91c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48812-cwe-125-out-of-bounds-read-in-micro-04ca545b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47994-cwe-502-deserialization-of-untruste-718ff89e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47994%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d46f40f0eb72f91b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47993-cwe-284-improper-access-control-in--88c6cc29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47993%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=686d50d46f40f0eb72f91b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47991-cwe-416-use-after-free-in-microsoft-ceb5507b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47991%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d36f40f0eb72f91b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49694-cwe-476-null-pointer-dereference-in-3ec38ad4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49694%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=686d50d66f40f0eb72f91c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49691-cwe-122-heap-based-buffer-overflow--c424c637</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49691%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49690-cwe-362-concurrent-execution-using--64c2cc1b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49690%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=686d50d66f40f0eb72f91c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49689-cwe-190-integer-overflow-or-wraparo-1af75000</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49689%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49688-cwe-415-double-free-in-microsoft-wi-10379cd3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49688%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=686d50d66f40f0eb72f91c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49687-cwe-125-out-of-bounds-read-in-micro-e4dcc613</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49687%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49686-cwe-476-null-pointer-dereference-in-1806e36b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49686%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49677-cwe-416-use-after-free-in-microsoft-deafa7b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49677%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=686d50d66f40f0eb72f91bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49676-cwe-122-heap-based-buffer-overflow--943f90af</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49676%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d66f40f0eb72f91bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49674-cwe-122-heap-based-buffer-overflow--c57cc473</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49674%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49672-cwe-122-heap-based-buffer-overflow--f2573d23</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49672%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49671-cwe-200-exposure-of-sensitive-infor-60d58aba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49671%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=686d50d56f40f0eb72f91be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49670-cwe-122-heap-based-buffer-overflow--6ec7bbd7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49670%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=686d50d56f40f0eb72f91bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49661-cwe-822-untrusted-pointer-dereferen-c5df33fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49661%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49658-cwe-125-out-of-bounds-read-in-micro-ddbac7ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49658%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d56f40f0eb72f91bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49657-cwe-122-heap-based-buffer-overflow--6d639acf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49657%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48824-cwe-122-heap-based-buffer-overflow--e136e176</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48824%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47987-cwe-122-heap-based-buffer-overflow--8e371afb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47987%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53513-cwe-24-path-traversal-filedir-in-ca-6c8cf16b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53513%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Canonical%20Juju&amp;severity=high&amp;id=686d50d86f40f0eb72f91cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47986-cwe-416-use-after-free-in-microsoft-573a4ed7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47986%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47985-cwe-822-untrusted-pointer-dereferen-7de0ef05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47985%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47984-cwe-693-protection-mechanism-failur-08bd15a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47984%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47976-cwe-416-use-after-free-in-microsoft-6e3a08e2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47976%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47972-cwe-362-concurrent-execution-using--8cfbd667</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47972%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47971-cwe-126-buffer-over-read-in-microso-07a6a0d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47971%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21195-cwe-59-improper-link-resolution-bef-2ba204b0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21195%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Service%20Fabric&amp;severity=medium&amp;id=686d50d36f40f0eb72f91ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47159-cwe-693-protection-mechanism-failur-be9c5f9b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47159%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33054-cwe-357-insufficient-ui-warning-of--ae2f3360</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33054%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=686d50d36f40f0eb72f91ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26636-cwe-1037-processor-optimization-rem-dfea23f4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26636%3A%20CWE-1037%3A%20%20Processor%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=686d50d36f40f0eb72f91ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36350-cwe-1421-exposure-of-sensitive-info-f2870ef3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36350%3A%20CWE-1421%20%20Exposure%20of%20Sensitive%20Information%20in%20Shared%20Microarchitectural%20Structures%20during%20Transient%20Execution%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors&amp;severity=medium&amp;id=6908ed741c2a0078ae51025d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/18-malicious-chrome-and-edge-extensions-disguise-a-9fe1380d</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=18%20Malicious%20Chrome%20and%20Edge%20Extensions%20Disguise%20as%20Everyday%20Tools&amp;severity=high&amp;id=686d4d446f40f0eb72f90c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-anatsa-infiltrates-google-play-to--acd13494</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20malware%20Anatsa%20infiltrates%20Google%20Play%20to%20target%20US%20banks&amp;severity=high&amp;id=686d4d446f40f0eb72f90c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53512-cwe-200-exposure-of-sensitive-infor-321030f3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53512%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Canonical%20Juju&amp;severity=medium&amp;id=686d50d86f40f0eb72f91cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36348-cwe-1420-exposure-of-sensitive-info-fffafc0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36348%3A%20CWE-1420%20%20Exposure%20of%20Sensitive%20Information%20during%20Transient%20Execution%20in%20AMD%20AMD%20EPYC%E2%84%A2%207002%20Series%20Processors&amp;severity=low&amp;id=690a6f039e609817bf702c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21168-out-of-bounds-read-cwe-125-in-adobe-37359ed0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21168%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=686d4d676f40f0eb72f90cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21165-out-of-bounds-write-cwe-787-in-adob-53b345c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21165%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=686d4d676f40f0eb72f90cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21166-out-of-bounds-write-cwe-787-in-adob-27110944</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21166%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=686d4d676f40f0eb72f90cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21167-out-of-bounds-read-cwe-125-in-adobe-6ffc8611</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21167%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=686d4d676f40f0eb72f90cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21164-out-of-bounds-write-cwe-787-in-adob-a14ea464</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21164%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=686d4d676f40f0eb72f90cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7186-sql-injection-in-code-projects-chat--35d12e5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7186%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=686d49c06f40f0eb72f89399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43580-access-of-memory-location-after-end-4e079706</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43580%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=686d49c06f40f0eb72f89390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43587-out-of-bounds-read-cwe-125-in-adobe-90228550</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43587%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=686d49c06f40f0eb72f89393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47109-null-pointer-dereference-cwe-476-in-b2b1391d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47109%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=686d49c06f40f0eb72f89396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privilege-escalation-using-tpqmassistantexe-on-len-f976423b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privilege%20Escalation%20Using%20TPQMAssistant.exe%20on%20Lenovo&amp;severity=medium&amp;id=686d46466f40f0eb72f868ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-for-post-quantum-cryptographic-support-abe0389b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20for%20Post-Quantum%20Cryptographic%20Support&amp;severity=medium&amp;id=686d46466f40f0eb72f868f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3648-cwe-1220-insufficient-granularity-of-a6002366</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3648%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20ServiceNow%20Now%20Platform&amp;severity=high&amp;id=686d42bf6f40f0eb72f85c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7185-sql-injection-in-code-projects-libra-5074240f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7185%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686d42bf6f40f0eb72f85c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitchat-mitm-flaw-fc8d6f9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitchat%20MITM%20Flaw&amp;severity=medium&amp;id=686d3f446f40f0eb72f82b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6771-cwe-78-improper-neutralization-of-sp-3040ef58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6771%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=686d3f3d6f40f0eb72f82b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0292-cwe-918-server-side-request-forgery--5e2b7932</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0292%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d3bb16f40f0eb72f81ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0293-cwe-93-improper-neutralization-of-cr-179872fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0293%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d3bb16f40f0eb72f81baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5464-cwe-532-insertion-of-sensitive-infor-b2397e05</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5464%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d3bb16f40f0eb72f81bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7184-sql-injection-in-code-projects-libra-9ad4f277</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7184%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686d3bb16f40f0eb72f81bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43019-cwe-269-improper-privilege-manageme-05cbd1a3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43019%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20HP%20Inc.%20HP%20Support%20Assistant&amp;severity=medium&amp;id=686d3bb16f40f0eb72f81bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6770-cwe-78-improper-neutralization-of-sp-cb3b4242</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6770%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=686d34a96f40f0eb72f7c5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5463-cwe-532-insertion-of-sensitive-infor-bdc5a44d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5463%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53545-cwe-287-improper-authentication-in--b9adabe5</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53545%3A%20CWE-287%3A%20Improper%20Authentication%20in%20frappe%20press&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7183-sql-injection-in-campcodes-sales-and-68eb4d21</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7183%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5451-cwe-121-stack-based-buffer-overflow--ba647dbd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5451%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2827-cwe-548-exposure-of-information-thro-ff9c7b85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2827%3A%20CWE-548%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20IBM%20Sterling%20File%20Gateway&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5450-cwe-602-client-side-enforcement-of-s-df22cc33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5450%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2793-cwe-79-improper-neutralization-of-in-68104566</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2793%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53480-cwe-79-improper-neutralization-of-i-8c3291db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53480%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20CheckUser%20extension&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7037-cwe-89-improper-neutralization-of-sp-c97319c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7037%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=686d34a96f40f0eb72f7c5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53372-cwe-77-improper-neutralization-of-s-e6caf41c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53372%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20alfonsograziano%20node-code-sandbox-mcp&amp;severity=high&amp;id=686d34a96f40f0eb72f7c5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3630-cwe-79-improper-neutralization-of-in-5d57ce59</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3630%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6996-cwe-257-storing-passwords-in-a-recov-58484ae0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6996%3A%20CWE-257%20%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=686d31256f40f0eb72f633c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6995-cwe-257-storing-passwords-in-a-recov-c03fdbe6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6995%3A%20CWE-257%20%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=686d31256f40f0eb72f633c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24474-execute-unauthorized-code-or-comman-5281dbdd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24474%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=low&amp;id=686d31256f40f0eb72f633c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7182-cross-site-scripting-in-itsourcecode-06e2e4d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7182%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Student%20Transcript%20Processing%20System&amp;severity=medium&amp;id=686d2da46f40f0eb72f619dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7326-cwe-1390-weak-authentication-in-micr-b1044366</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7326%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20ASP.NET%20Core%206.0&amp;severity=high&amp;id=686d2da46f40f0eb72f619e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36600-cwe-1257-improper-access-control-ap-4a9521e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36600%3A%20CWE-1257%3A%20Improper%20Access%20Control%20Applied%20to%20Mirrored%20or%20Aliased%20Memory%20Regions%20in%20Dell%20Client%20Platform%20BIOS&amp;severity=high&amp;id=686d2a1f6f40f0eb72f606b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7181-unrestricted-upload-in-code-projects-f2f360b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7181%3A%20Unrestricted%20Upload%20in%20code-projects%20Staff%20Audit%20System&amp;severity=medium&amp;id=686d2a1f6f40f0eb72f606b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7345-out-of-bounds-write-in-red-hat-red-h-699eb78f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7345%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=high&amp;id=686d23166f40f0eb72f5d541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7180-sql-injection-in-code-projects-staff-52331607</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7180%3A%20SQL%20Injection%20in%20code-projects%20Staff%20Audit%20System&amp;severity=medium&amp;id=686d23166f40f0eb72f5d53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7179-sql-injection-in-code-projects-libra-7d7b0d88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7179%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686d1c126f40f0eb72f54a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50130-heap-based-buffer-overflow-in-fuji--d6b12e6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50130%3A%20Heap-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT-6&amp;severity=high&amp;id=686d1c126f40f0eb72f54a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27061-cwe-787-out-of-bounds-write-in-qual-83727a89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27061%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15076f40f0eb72f50fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27058-cwe-120-buffer-copy-without-checkin-00ff7b34</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27058%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15076f40f0eb72f50fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27057-cwe-126-buffer-over-read-in-qualcom-c993401c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27057%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15076f40f0eb72f50fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27056-cwe-416-use-after-free-in-qualcomm--db196d06</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27056%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15076f40f0eb72f50fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27055-cwe-126-buffer-over-read-in-qualcom-3deb67d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27055%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15076f40f0eb72f50fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27052-cwe-120-buffer-copy-without-checkin-b2fd8bdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27052%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27051-cwe-415-double-free-in-qualcomm-inc-7920b32d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27051%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27050-cwe-416-use-after-free-in-qualcomm--1a6605cd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27050%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27047-cwe-416-use-after-free-in-qualcomm--7c0a9609</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27047%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27046-cwe-415-double-free-in-qualcomm-inc-308528f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27046%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27044-cwe-787-out-of-bounds-write-in-qual-f8943491</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27044%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27043-cwe-120-buffer-copy-without-checkin-6a880f90</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27043%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27042-cwe-131-incorrect-calculation-of-bu-2c767c68</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27042%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21466-cwe-416-use-after-free-in-qualcomm--bdafd895</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21466%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21454-cwe-126-buffer-over-read-in-qualcom-8170b0da</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21454%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21450-cwe-287-improper-authentication-in--9d64fe37</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21450%3A%20CWE-287%20Improper%20Authentication%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=686d15066f40f0eb72f50f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21449-cwe-126-buffer-over-read-in-qualcom-2f74f526</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21449%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21446-cwe-126-buffer-over-read-in-qualcom-843c1d91</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21446%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21445-cwe-120-buffer-copy-without-checkin-db35ba05</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21445%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21444-cwe-120-buffer-copy-without-checkin-737a90fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21444%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21433-cwe-476-null-pointer-dereference-in-e7a07b8f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21433%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=686d15066f40f0eb72f50f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21432-cwe-415-double-free-in-qualcomm-inc-ecfc8e35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21432%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21427-cwe-126-buffer-over-read-in-qualcom-01a2e7be</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21427%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21426-cwe-120-buffer-copy-without-checkin-712c5230</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21426%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=686d15066f40f0eb72f50f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21422-cwe-310-cryptographic-issues-in-qua-539d8622</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21422%3A%20CWE-310%20Cryptographic%20Issues%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lateral-movement-with-code-execution-in-the-contex-5fc996de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lateral%20Movement%20with%20code%20execution%20in%20the%20context%20of%20active%20user%20sessions&amp;severity=medium&amp;id=686d150e6f40f0eb72f51013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-attack-on-tls-opossum-attack-86832479</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Attack%20on%20TLS%3A%20Opossum%20attack&amp;severity=medium&amp;id=686d150e6f40f0eb72f51017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7178-sql-injection-in-code-projects-food--4a8881c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7178%3A%20SQL%20Injection%20in%20code-projects%20Food%20Distributor%20Site&amp;severity=medium&amp;id=686d11806f40f0eb72f5009d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-kernel-double-free-to-lpe-b159d838</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20kernel%20double-free%20to%20LPE&amp;severity=critical&amp;id=686d0e026f40f0eb72f4da66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealers-as-a-service-push-identity-hacks-to-r-10b796a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealers-as-a-Service%20Push%20Identity%20Hacks%20to%20Record%20Highs%2C%20Report&amp;severity=medium&amp;id=686d0a7d6f40f0eb72f4af2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-batavia-windows-spyware-steali-5b837b18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Batavia%20Windows%20Spyware%20Stealing%20Documents%20from%20Russian%20Firms&amp;severity=high&amp;id=686d0a7c6f40f0eb72f4af11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7177-sql-injection-in-phpgurukul-car-wash-975f7abc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7177%3A%20SQL%20Injection%20in%20PHPGurukul%20Car%20Washing%20Management%20System&amp;severity=medium&amp;id=686d0abd6f40f0eb72f4bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40721-cwe-79-improper-neutralization-of-i-583a02b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=medium&amp;id=686d06c36f40f0eb72f44472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40720-cwe-79-improper-neutralization-of-i-257c7b72</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=medium&amp;id=686d06b86f40f0eb72f4444b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40719-cwe-79-improper-neutralization-of-i-4218b154</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40719%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=medium&amp;id=686d06b16f40f0eb72f44421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40718-cwe-209-generation-of-error-message-119060ea</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40718%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=medium&amp;id=686d06a06f40f0eb72f443f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40717-cwe-89-improper-neutralization-of-s-405a9bec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40717%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d07b16f40f0eb72f4487c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40716-cwe-89-improper-neutralization-of-s-64257c05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40716%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d071a6f40f0eb72f4458c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40715-cwe-89-improper-neutralization-of-s-1e23514c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40715%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d07116f40f0eb72f44551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40714-cwe-89-improper-neutralization-of-s-7d1b5f91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40714%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d07016f40f0eb72f44513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40713-cwe-89-improper-neutralization-of-s-b08cc042</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40713%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d06ce6f40f0eb72f444db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40712-cwe-89-improper-neutralization-of-s-5f93061a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40712%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d06cc6f40f0eb72f444ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40711-cwe-89-improper-neutralization-of-s-74bafbc6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40711%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d06c86f40f0eb72f44499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7176-sql-injection-in-phpgurukul-hospital-642ecd31</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7176%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=686d07b46f40f0eb72f4489f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shellcode-execution-using-messagebox-dialog-076f8af0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shellcode%20execution%20using%20MessageBox%20Dialog&amp;severity=medium&amp;id=686cfff16f40f0eb72f42822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7175-unrestricted-upload-in-code-projects-3373f8de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7175%3A%20Unrestricted%20Upload%20in%20code-projects%20E-Commerce%20Site&amp;severity=medium&amp;id=686cffec6f40f0eb72f4280c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41224-cwe-693-protection-mechanism-failur-d07d3521</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41224%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Siemens%20RUGGEDCOM%20RMC8388%20V5.X&amp;severity=high&amp;id=686cf5646f40f0eb72f3f62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41223-cwe-327-use-of-a-broken-or-risky-cr-713bdc2d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41223%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41222-cwe-755-improper-handling-of-except-201b69eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41222%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40742-cwe-598-use-of-get-request-method-w-bdd37dff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40742%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40741-cwe-121-stack-based-buffer-overflow-1c9ded5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40741%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20Solid%20Edge%20SE2025&amp;severity=high&amp;id=686cf5646f40f0eb72f3f61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40740-cwe-125-out-of-bounds-read-in-sieme-77583167</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40740%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2025&amp;severity=high&amp;id=686cf5646f40f0eb72f3f61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40739-cwe-125-out-of-bounds-read-in-sieme-a551d2ab</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40739%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2025&amp;severity=high&amp;id=686cf5646f40f0eb72f3f618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40738-cwe-22-improper-limitation-of-a-pat-b3097ced</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40738%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=686cf5646f40f0eb72f3f615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40737-cwe-22-improper-limitation-of-a-pat-623825a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40737%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=686cf5646f40f0eb72f3f612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40736-cwe-306-missing-authentication-for--f904ba84</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40736%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20SINEC%20NMS&amp;severity=critical&amp;id=686cf5646f40f0eb72f3f60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40735-cwe-89-improper-neutralization-of-s-bae8e693</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40735%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=686cf5646f40f0eb72f3f602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40593-cwe-20-improper-input-validation-in-8d837881</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40593%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21009-cwe-125-out-of-bounds-read-in-samsu-78d6d256</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21009%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20libsavsvc.so&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21008-cwe-125-out-of-bounds-read-in-samsu-20e95a3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21008%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20libsavsvc.so&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21007-cwe-787-out-of-bounds-write-in-sams-a48d6a91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21007%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20libsavsvc.so&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21006-cwe-787-out-of-bounds-write-in-sams-d6dfacbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21006%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20libsavsvc.so&amp;severity=high&amp;id=686cf5646f40f0eb72f3f5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21005-cwe-284-improper-access-control-in--c3ffe447</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21005%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20isemtelephony&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21004-cwe-284-improper-access-control-in--9d5ffb75</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21004%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21003-cwe-922-insecure-storage-of-sensiti-79bdbe5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21003%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21002-cwe-284-improper-access-control-in--495ddce8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21002%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27127-cwe-434-unrestricted-upload-of-file-c325491b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27127%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Siemens%20TIA%20Project-Server&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21001-cwe-284-improper-access-control-in--1adb4ad0</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21001%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23365-cwe-284-improper-access-control-in--f35b9d3b</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23365%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Siemens%20TIA%20Administrator&amp;severity=high&amp;id=686cf5646f40f0eb72f3f5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21000-cwe-269-improper-privilege-manageme-df05a5f7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21000%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20999-cwe-285-improper-authorization-in-s-3d80dbe8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20999%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23364-cwe-347-improper-verification-of-cr-559a05f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23364%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Siemens%20TIA%20Administrator&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20998-cwe-284-improper-access-control-in--9517c61a</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20998%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20997-cwe-276-incorrect-default-permissio-ca02c93e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20997%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20983-cwe-787-out-of-bounds-write-in-sams-215176a2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20983%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20982-cwe-787-out-of-bounds-write-in-sams-e5ec8948</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20982%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52236-cwe-327-use-of-a-broken-or-risky-cr-7de22062</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52236%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=high&amp;id=68ee16327eab8b438c025da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7174-sql-injection-in-code-projects-libra-4eb1c7f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7174%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686cf5656f40f0eb72f3f637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32461-tiki-wiki-cms-groupware-283-two-sst-55e1a61c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BCVE-2025-32461%5D%20Tiki%20Wiki%20CMS%20Groupware%20%3C%3D%2028.3%20Two%20SSTI%20Vulnerabilities&amp;severity=medium&amp;id=686cee5b6f40f0eb72f3c520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7173-sql-injection-in-code-projects-libra-6b4c5741</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7173%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686cee576f40f0eb72f3c510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-chinese-hacker-tied-to-silk-typhoon-arrest-4c8df30b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20Chinese%20hacker%20tied%20to%20Silk%20Typhoon%20arrested%20for%20cyberespionage&amp;severity=high&amp;id=686ce74e6f40f0eb72f2e5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7172-sql-injection-in-code-projects-crime-169db292</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7172%3A%20SQL%20Injection%20in%20code-projects%20Crime%20Reporting%20System&amp;severity=medium&amp;id=686ce78b6f40f0eb72f2e6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tag-140-targets-indian-government-via-clickfix-sty-7502df3f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TAG-140%20Targets%20Indian%20Government%20Via%20&apos;ClickFix-Style&apos;%20Lure&amp;severity=high&amp;id=686ce74e6f40f0eb72f2e5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-four-critical-vulnerabilities-to-kev-cat-b994b620</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Four%20Critical%20Vulnerabilities%20to%20KEV%20Catalog%20Due%20to%20Active%20Exploitation&amp;severity=critical&amp;id=686ce74e6f40f0eb72f2e5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-bert-ransomware-group-strikes-globally-with-mu-6ba3dc4d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Bert%20Ransomware%20Group%20Strikes%20Globally%20with%20Multiple%20Variants&amp;severity=high&amp;id=686ce74e6f40f0eb72f2e5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6744-cwe-94-improper-control-of-generatio-03510591</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6744%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20xTemos%20Woodmart&amp;severity=high&amp;id=686ce78b6f40f0eb72f2e6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pakistans-apt36-transparent-tribe-targets-indian-d-24611a7c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pakistan%E2%80%99s%20APT36%20Transparent%20Tribe%20Targets%20Indian%20Defense%20Sector%20with%20New%20Linux%20Malware&amp;severity=medium&amp;id=686ce3c86f40f0eb72f2db56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7171-sql-injection-in-code-projects-crime-0db8ae2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7171%3A%20SQL%20Injection%20in%20code-projects%20Crime%20Reporting%20System&amp;severity=medium&amp;id=686ce3d66f40f0eb72f2db74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7170-sql-injection-in-code-projects-crime-54997de6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7170%3A%20SQL%20Injection%20in%20code-projects%20Crime%20Reporting%20System&amp;severity=medium&amp;id=686cdcc16f40f0eb72f2b65d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-windows-net-quirks-and-unicode-normalizati-7257f710</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20Windows%2C%20.NET%20quirks%2C%20and%20Unicode%20Normalization%20to%20exploit%20DNN%20(DotNetNuke)&amp;severity=high&amp;id=686cd23a6f40f0eb72f28512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7169-sql-injection-in-code-projects-crime-f93a3d37</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7169%3A%20SQL%20Injection%20in%20code-projects%20Crime%20Reporting%20System&amp;severity=medium&amp;id=686cd5b96f40f0eb72f29673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7168-sql-injection-in-code-projects-crime-ec73b0e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7168%3A%20SQL%20Injection%20in%20code-projects%20Crime%20Reporting%20System&amp;severity=medium&amp;id=686ccb2c6f40f0eb72f266aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41668-cwe-59-improper-link-resolution-bef-f7f55d33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41668%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20PHOENIX%20CONTACT%20AXC%20F%201152&amp;severity=high&amp;id=686cc7a96f40f0eb72f25244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41667-cwe-59-improper-link-resolution-bef-3210f2f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41667%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20PHOENIX%20CONTACT%20AXC%20F%201152&amp;severity=high&amp;id=686cc7a96f40f0eb72f25241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41666-cwe-59-improper-link-resolution-bef-fe2d4c48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41666%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20PHOENIX%20CONTACT%20AXC%20F%201152&amp;severity=high&amp;id=686cc7a96f40f0eb72f2523e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41665-cwe-276-incorrect-default-permissio-e0b55166</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41665%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20PHOENIX%20CONTACT%20AXC%20F%201152&amp;severity=medium&amp;id=686cc7a96f40f0eb72f2523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7167-sql-injection-in-code-projects-respo-1c6eb0e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7167%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Blog%20Site&amp;severity=medium&amp;id=686cc7a96f40f0eb72f25247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25271-cwe-1188-insecure-default-initializ-79eb908b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25271%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc7a96f40f0eb72f25238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25270-cwe-913-improper-control-of-dynamic-8387fcd3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25270%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=critical&amp;id=686cc7a96f40f0eb72f25235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25269-cwe-78-improper-neutralization-of-s-85d9a574</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25269%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc4256f40f0eb72f2426d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25268-cwe-306-missing-authentication-for--504a7344</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25268%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc4256f40f0eb72f2426a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24006-cwe-269-improper-privilege-manageme-31b54ca7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24006%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc4256f40f0eb72f24267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24005-cwe-20-improper-input-validation-in-fd968cda</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24005%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc4256f40f0eb72f24264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24004-cwe-120-buffer-copy-without-checkin-f9269474</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24004%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=medium&amp;id=686cc4256f40f0eb72f24261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24003-cwe-120-buffer-copy-without-checkin-2c36e1ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24003%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc4256f40f0eb72f2425e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24002-cwe-20-improper-input-validation-in-c4c982f2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24002%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=medium&amp;id=686cc4256f40f0eb72f2425b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42956-cwe-79-improper-neutralization-of-i-9bc147d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42956%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SAP%20SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=medium&amp;id=686cc4256f40f0eb72f24270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6746-cwe-98-improper-control-of-filename--987d9f3c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6746%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20xTemos%20Woodmart&amp;severity=high&amp;id=686cc0a16f40f0eb72f236e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6743-cwe-79-improper-neutralization-of-in-8123c289</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6743%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xTemos%20Woodmart&amp;severity=medium&amp;id=686cc0a16f40f0eb72f236dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7166-sql-injection-in-code-projects-respo-a91b64ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7166%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Blog%20Site&amp;severity=medium&amp;id=686cc0a16f40f0eb72f236e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7165-sql-injection-in-phpgurukul-cyber-ca-0e289db5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7165%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=686cb99b6f40f0eb72f1d739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7164-sql-injection-in-phpgurukul-cyber-ca-2be92a35</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7164%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=686caf0c6f40f0eb72f19af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7327-cwe-98-improper-control-of-filename--ee3278cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7327%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20techlabpro1%20Widget%20for%20Google%20Reviews&amp;severity=high&amp;id=686caf0d6f40f0eb72f19af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7163-sql-injection-in-phpgurukul-zoo-mana-08c84fc5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7163%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686ca8156f40f0eb72f17afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7162-sql-injection-in-phpgurukul-zoo-mana-0997355e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7162%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686ca0fc6f40f0eb72f14ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5957-cwe-862-missing-authorization-in-rca-6b1967cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5957%3A%20CWE-862%20Missing%20Authorization%20in%20rcatheme%20Guest%20Support&amp;severity=medium&amp;id=686ca0fc6f40f0eb72f14b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5537-cwe-79-improper-neutralization-of-in-e6ee9f42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fooplugins%20Lightbox%20%26%20Modal%20Popup%20WordPress%20Plugin%20%E2%80%93%20FooBox&amp;severity=medium&amp;id=686ca0fc6f40f0eb72f14b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7161-sql-injection-in-phpgurukul-zoo-mana-10b67bf3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7161%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686c99f56f40f0eb72f12340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7160-sql-injection-in-phpgurukul-zoo-mana-b63c6c78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7160%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686c92ec6f40f0eb72f0e554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7159-sql-injection-in-phpgurukul-zoo-mana-d7590e65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7159%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686c8beb6f40f0eb72f05aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7158-sql-injection-in-phpgurukul-zoo-mana-cc8d6dbd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7158%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686c8beb6f40f0eb72f05a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7157-sql-injection-in-code-projects-onlin-d1a0621e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7157%3A%20SQL%20Injection%20in%20code-projects%20Online%20Note%20Sharing&amp;severity=medium&amp;id=686c84de6f40f0eb72f00042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20695-cwe-124-buffer-underflow-in-mediate-4d0ee09d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20695%3A%20CWE-124%20Buffer%20Underflow%20in%20MediaTek%2C%20Inc.%20MT6639%2C%20MT6653%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT7925%2C%20MT7927%2C%20MT8196%2C%20MT8678%2C%20MT8796&amp;severity=medium&amp;id=686c84de6f40f0eb72f00037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20694-cwe-124-buffer-underflow-in-mediate-fa28ae5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20694%3A%20CWE-124%20Buffer%20Underflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6639%2C%20MT6653%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT7925%2C%20MT7927%2C%20MT8113%2C%20MT8115%2C%20MT8127%2C%20MT8163%2C%20MT8168%2C%20MT8169%2C%20MT8173%2C%20MT8183%2C%20MT8186%2C%20MT8188%2C%20MT8195%2C%20MT8196%2C%20MT8370%2C%20MT8390%2C%20MT8391%2C%20MT8395%2C%20MT8512%2C%20MT8516%2C%20MT8519%2C%20MT8676%2C%20MT8678%2C%20MT8695%2C%20MT8696%2C%20MT8698%2C%20MT8786%2C%20MT8792%2C%20MT8796%2C%20MT8893&amp;severity=medium&amp;id=686c84de6f40f0eb72f00034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20693-cwe-125-out-of-bounds-read-in-media-6fdb833c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20693%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7923%2C%20MT7925%2C%20MT7927%2C%20MT7932%2C%20MT8196%2C%20MT8678%2C%20MT8796%2C%20MT8893&amp;severity=medium&amp;id=686c84de6f40f0eb72f00031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20692-cwe-125-out-of-bounds-read-in-media-5bf86188</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20692%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=686c84de6f40f0eb72f0002e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20691-cwe-125-out-of-bounds-read-in-media-cd1feace</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20691%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=686c84de6f40f0eb72f0002b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20690-cwe-125-out-of-bounds-read-in-media-2bf2a370</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20690%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=686c84de6f40f0eb72f00028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20689-cwe-125-out-of-bounds-read-in-media-25a24f39</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20689%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=686c84dd6f40f0eb72f0001b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20688-cwe-125-out-of-bounds-read-in-media-2deffd36</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20688%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=686c84dd6f40f0eb72f00018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20687-cwe-125-out-of-bounds-read-in-media-37f39694</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20687%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=686c84dd6f40f0eb72f00015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20686-cwe-122-heap-overflow-in-mediatek-i-2e97569f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20686%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=686c84dd6f40f0eb72f00012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20685-cwe-122-heap-overflow-in-mediatek-i-2da7fbce</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20685%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=686c84dd6f40f0eb72f0000f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20684-cwe-787-out-of-bounds-write-in-medi-a99bcc5d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20684%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT7615%2C%20MT7622%2C%20MT7663&amp;severity=critical&amp;id=686c84dd6f40f0eb72f0000c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20683-cwe-787-out-of-bounds-write-in-medi-5ea5b8ab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20683%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=critical&amp;id=686c84dd6f40f0eb72f00009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20682-cwe-787-out-of-bounds-write-in-medi-8aaf7e12</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20682%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=critical&amp;id=686c84dd6f40f0eb72f00006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20681-cwe-787-out-of-bounds-write-in-medi-7479fdea</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20681%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915&amp;severity=critical&amp;id=686c84dd6f40f0eb72f00003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20680-cwe-122-heap-overflow-in-mediatek-i-b62878bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20680%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=critical&amp;id=686c84dd6f40f0eb72f00000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/offline-blockchain-governance-with-qrusb-sync-this-af59d1d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Offline%20blockchain%20governance%20with%20QR%2FUSB%20sync%3F%20This%20project%20seems%20like%20it%E2%80%99s%20thinking%20about%20failure%20modes%E2%80%A6&amp;severity=medium&amp;id=686c7dd86f40f0eb72efcdd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5570-cwe-79-improper-neutralization-of-in-c068b966</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5570%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%2C%20AI%20Framework%20%26%20MCP%20for%20WordPress&amp;severity=medium&amp;id=686c84de6f40f0eb72f0003a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6244-cwe-79-improper-neutralization-of-in-47683e44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6244%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=686c84de6f40f0eb72f0003e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7156-sql-injection-in-hitsz-ids-airda-6b6f1d16</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7156%3A%20SQL%20Injection%20in%20hitsz-ids%20airda&amp;severity=medium&amp;id=686c7a506f40f0eb72efae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7146-cwe-23-relative-path-traversal-in-jh-e602d7bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7146%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Jhenggao%20iPublish%20System&amp;severity=high&amp;id=686c7a506f40f0eb72efae60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7155-sql-injection-in-phpgurukul-online-n-048e0751</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7155%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Notes%20Sharing%20System&amp;severity=medium&amp;id=686c6fc56f40f0eb72ef2e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-hardens-windows-11-against-file-junction-bc7563c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20hardens%20Windows%2011%20against%20file%20junction%20attacks&amp;severity=medium&amp;id=686c6c436f40f0eb72eee3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43001-cwe-266-incorrect-privilege-assignm-14986fe6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43001%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20SAP_SE%20SAPCAR&amp;severity=medium&amp;id=686c6fc56f40f0eb72ef2e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42992-cwe-266-incorrect-privilege-assignm-1dbd7d6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42992%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20SAP_SE%20SAPCAR&amp;severity=medium&amp;id=686c6fc56f40f0eb72ef2e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42986-cwe-862-missing-authorization-in-sa-7347819b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42986%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20and%20ABAP%20Platform&amp;severity=medium&amp;id=686c6fc56f40f0eb72ef2e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42985-cwe-601-url-redirection-to-untruste-2d4786f6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42985%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20BusinessObjects%20Content%20Administrator%20workbench&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42981-cwe-601-url-redirection-to-untruste-de323774</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42981%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42980-cwe-502-deserialization-of-untruste-7b67491f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42980%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal%20Federated%20Portal%20Network&amp;severity=critical&amp;id=686c68cd6f40f0eb72eec68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42979-cwe-922-insecure-storage-of-sensiti-d2c67f1b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42979%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20SAP_SE%20SAP%20GUI%20for%20Windows&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42978-cwe-940-improper-verification-of-so-3115fc6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42978%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java&amp;severity=low&amp;id=686c68cd6f40f0eb72eec675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42974-cwe-862-missing-authorization-in-sa-2b67f6eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42974%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20and%20ABAP%20Platform%20(SDCCN)&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42973-cwe-79-improper-neutralization-of-i-4bc6a913</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42973%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Data%20Services%20(DQ%20Report)&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42971-cwe-787-out-of-bounds-write-in-saps-8e54e664</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42971%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20SAP_SE%20SAPCAR&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42970-cwe-22-improper-limitation-of-a-pat-0142f41d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42970%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAPCAR&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42969-cwe-79-improper-neutralization-of-i-6e5f5752</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42969%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42968-cwe-862-missing-authorization-in-sa-3fea0f59</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42968%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20(RFC%20enabled%20function%20module)&amp;severity=medium&amp;id=686c68cc6f40f0eb72eec65d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42967-cwe-94-improper-control-of-generati-b43bcf57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42967%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20S%2F4HANA%20and%20SAP%20SCM%20(Characteristic%20Propagation)&amp;severity=critical&amp;id=686c68cc6f40f0eb72eec659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42966-cwe-502-deserialization-of-untruste-a89f121e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42966%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20(XML%20Data%20Archiving%20Service)&amp;severity=critical&amp;id=686c68cc6f40f0eb72eec655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42965-cwe-918-server-side-request-forgery-8a1b0b5d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42965%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20in%20SAP_SE%20SAP%20BusinessObjects%20BI%20Platform%20Central%20Management%20Console%20Promotion%20Management%20Application&amp;severity=medium&amp;id=686c68cc6f40f0eb72eec651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42964-cwe-502-deserialization-of-untruste-e4f83d11</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42964%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal%20Administration&amp;severity=critical&amp;id=686c68cc6f40f0eb72eec643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42963-cwe-502-deserialization-of-untruste-4d453177</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42963%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20Java%20(Log%20Viewer%20)&amp;severity=critical&amp;id=686c68cc6f40f0eb72eec63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42962-cwe-79-improper-neutralization-of-i-7693f519</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42962%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20Warehouse%20(Business%20Explorer%20Web%203.5%20loading%20animation)&amp;severity=medium&amp;id=686c68cc6f40f0eb72eec63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42961-cwe-862-missing-authorization-in-sa-c638fb3f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42961%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=686c68cc6f40f0eb72eec637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42960-cwe-862-missing-authorization-in-sa-2247186b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42960%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Warehouse%20and%20SAP%20BW%2F4HANA%20BEx%20Tools&amp;severity=medium&amp;id=686c68cc6f40f0eb72eec633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42959-cwe-308-use-of-single-factor-authen-fe11f3ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42959%3A%20CWE-308%3A%20Use%20of%20Single-factor%20Authentication%20in%20SAP_SE%20SAP%20NetWeaver%20ABAP%20Server%20and%20ABAP%20Platform&amp;severity=high&amp;id=686c68cc6f40f0eb72eec62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42954-cwe-835-loop-with-unreachable-exit--b93d5bf9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42954%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20SAP_SE%20SAP%20NetWeaver%20Business%20Warehouse%20(CCAW%20application)&amp;severity=low&amp;id=686c68cc6f40f0eb72eec625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42953-cwe-862-missing-authorization-in-sa-8312b33c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42953%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=high&amp;id=686c68cc6f40f0eb72eec621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42952-cwe-862-missing-authorization-in-sa-2317786c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42952%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Warehouse%20and%20SAP%20Plug-In%20Basis&amp;severity=high&amp;id=686c68cc6f40f0eb72eec61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31326-cwe-80-improper-neutralization-of-s-5f09b634</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31326%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(Web%20Intelligence)&amp;severity=medium&amp;id=686c68cb6f40f0eb72eec619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7154-os-command-injection-in-totolink-n20-dd398d17</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7154%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20N200RE&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7153-cross-site-scripting-in-codeastro-si-742832fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7153%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Simple%20Hospital%20Management%20System&amp;severity=medium&amp;id=686c61b56f40f0eb72ee1e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-powerpoint-2019-remote-code-execution-rc-21dd435f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20PowerPoint%202019%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=686e74f66f40f0eb72042df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sudo-chroot-1917-local-privilege-escalation-2ee7524e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sudo%20chroot%201.9.17%20-%20Local%20Privilege%20Escalation&amp;severity=high&amp;id=686e74f66f40f0eb72042df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scriptcase-912006-23-remote-command-execution-rce-52c87dbf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ScriptCase%209.12.006%20(23)%20-%20Remote%20Command%20Execution%20(RCE)&amp;severity=critical&amp;id=686e74f66f40f0eb72042ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sudo-1917-host-option-elevation-of-privilege-04b7100c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sudo%201.9.17%20Host%20Option%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=686e74f66f40f0eb72042de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-defender-for-endpoint-mde-elevation-of-p-59f7eaba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Defender%20for%20Endpoint%20(MDE)%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=686e74f66f40f0eb72042de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-outlook-remote-code-execution-rce-3b5f875c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Outlook%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=686e74f66f40f0eb72042dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stacks-mobile-app-builder-523-authentication-bypas-abc4f43a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stacks%20Mobile%20App%20Builder%205.2.3%20-%20Authentication%20Bypass%20via%20Account%20Takeover&amp;severity=medium&amp;id=686e74f66f40f0eb72042dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discourse-32x-anonymous-cache-poisoning-0d46cc40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discourse%203.2.x%20-%20Anonymous%20Cache%20Poisoning&amp;severity=medium&amp;id=686e74f66f40f0eb72042dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-08-d2330d71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-08&amp;severity=medium&amp;id=686db32e6f40f0eb72fcbb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29267-na-77aca87d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29267%3A%20n%2Fa&amp;severity=medium&amp;id=686d2a1f6f40f0eb72f606b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47422-na-25d0cc98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47422%3A%20n%2Fa&amp;severity=high&amp;id=686d269f6f40f0eb72f5f8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7152-unrestricted-upload-in-campcodes-adv-e54373b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7152%3A%20Unrestricted%20Upload%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=686c5aac6f40f0eb72edf72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7151-unrestricted-upload-in-campcodes-adv-0e091aa3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7151%3A%20Unrestricted%20Upload%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=686c53a56f40f0eb72edd2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7150-sql-injection-in-campcodes-advanced--0deba2a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7150%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=686c4c9d6f40f0eb72ed9790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7149-sql-injection-in-campcodes-advanced--5a16cd49</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7149%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=686c45946f40f0eb72ed5ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7148-cross-site-scripting-in-codeastro-si-96f0d3d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7148%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Simple%20Hospital%20Management%20System&amp;severity=medium&amp;id=686c3e8c6f40f0eb72ed2e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7147-sql-injection-in-codeastro-patient-r-21cb71d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7147%3A%20SQL%20Injection%20in%20CodeAstro%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=686c37856f40f0eb72ecd32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7144-cross-site-scripting-in-sourcecodest-980585cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7144%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c31236f40f0eb72ecba92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seo-poisoning-campaign-targets-8500-smb-users-with-359fbeb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEO%20Poisoning%20Campaign%20Targets%208%2C500%2B%20SMB%20Users%20with%20Malware%20Disguised%20as%20AI%20Tools&amp;severity=high&amp;id=686c30e46f40f0eb72ecb72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atomic-macos-infostealer-adds-backdoor-for-persist-da485f84</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atomic%20macOS%20infostealer%20adds%20backdoor%20for%20persistent%20attacks&amp;severity=high&amp;id=686c30e56f40f0eb72ecb733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/employee-gets-920-for-credentials-used-in-140-mill-66cbdd23</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Employee%20gets%20%24920%20for%20credentials%20used%20in%20%24140%20million%20bank%20heist&amp;severity=high&amp;id=686c30e56f40f0eb72ecb738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7143-cross-site-scripting-in-sourcecodest-3aa5df9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7143%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c2cfb6f40f0eb72eca334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53543-cwe-79-improper-neutralization-of-i-8262a034</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53543%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kestra-io%20kestra&amp;severity=medium&amp;id=686c29786f40f0eb72ec83d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7142-cross-site-scripting-in-sourcecodest-ef9a8198</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7142%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c227b6f40f0eb72ec6078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/att-reaches-177-million-deal-over-2019-and-2024-da-de9a0a98</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AT%26T%20Reaches%20%24177%20Million%20Deal%20Over%202019%20and%202024%20Data%20Breaches&amp;severity=medium&amp;id=686c226a6f40f0eb72ec6053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53540-cwe-352-cross-site-request-forgery--07523d78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53540%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20espressif%20arduino-esp32&amp;severity=high&amp;id=686c227b6f40f0eb72ec607f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53539-cwe-1333-inefficient-regular-expres-b8a78452</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53539%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20rennf93%20fastapi-guard&amp;severity=medium&amp;id=686c1ee76f40f0eb72ec3eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53496-cwe-79-improper-neutralization-of-i-72b5bf35</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20MediaSearch%20Extension&amp;severity=medium&amp;id=686c1ee76f40f0eb72ec3eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7141-cross-site-scripting-in-sourcecodest-21cafb83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7141%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c1b656f40f0eb72ec2c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6044-files-or-directories-accessible-to-e-2c7928ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6044%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Google%20ChromeOS&amp;severity=medium&amp;id=686c1b656f40f0eb72ec2c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53488-cwe-79-improper-neutralization-of-i-e1a2d9d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20WikiHiero%20Extension&amp;severity=medium&amp;id=686c17de6f40f0eb72ec1765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/batavia-windows-spyware-campaign-targets-dozens-of-4994919e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Batavia&apos;%20Windows%20spyware%20campaign%20targets%20dozens%20of%20Russian%20orgs&amp;severity=high&amp;id=686c145a6f40f0eb72eb8936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qantas-is-being-extorted-in-recent-data-theft-cybe-480bb2cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qantas%20is%20being%20extorted%20in%20recent%20data-theft%20cyberattack&amp;severity=high&amp;id=686c145a6f40f0eb72eb893a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53498-cwe-778-insufficient-logging-in-wik-9b700580</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53498%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20AbuseFilter%20Extension&amp;severity=medium&amp;id=686c17de6f40f0eb72ec176d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53499-cwe-862-missing-authorization-in-wi-22dae8e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53499%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20AbuseFilter%20Extension&amp;severity=critical&amp;id=686c17de6f40f0eb72ec1771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7140-cross-site-scripting-in-sourcecodest-cc841da2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7140%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c17de6f40f0eb72ec1775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53495-cwe-862-missing-authorization-in-wi-ebf05c71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53495%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20AbuseFilter%20Extension&amp;severity=critical&amp;id=686c17de6f40f0eb72ec1769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53478-cwe-79-improper-neutralization-of-i-a971b93d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53478%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20CheckUser%20extension&amp;severity=medium&amp;id=686c14776f40f0eb72eb89c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7139-cross-site-scripting-in-sourcecodest-ff1d8e29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7139%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c0d526f40f0eb72eb6695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53536-cwe-552-files-or-directories-access-1bfed6cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53536%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=686c0d526f40f0eb72eb6690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20322-the-web-application-does-not-or-can-6c446b5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20322%3A%20The%20web%20application%20does%20not%2C%20or%20can%20not%2C%20sufficiently%20verify%20whether%20a%20well-formed%2C%20valid%2C%20consistent%20request%20was%20intentionally%20provided%20by%20the%20user%20who%20submitted%20the%20request.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20323-the-software-does-not-restrict-or-i-80e44b3c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20323%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20321-the-web-application-does-not-or-can-330c1cc9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20321%3A%20The%20web%20application%20does%20not%2C%20or%20can%20not%2C%20sufficiently%20verify%20whether%20a%20well-formed%2C%20valid%2C%20consistent%20request%20was%20intentionally%20provided%20by%20the%20user%20who%20submitted%20the%20request.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20325-the-product-exposes-sensitive-infor-6ae27fab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20325%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=686c09cf6f40f0eb72eb4a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20319-the-software-constructs-all-or-part-b373c0b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20319%3A%20The%20software%20constructs%20all%20or%20part%20of%20an%20OS%20command%20using%20externally-influenced%20input%20from%20an%20upstream%20component%2C%20but%20it%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20special%20elements%20that%20could%20modify%20the%20intended%20OS%20command%20when%20it%20is%20sent%20to%20a%20downstream%20component.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20324-the-software-does-not-restrict-or-i-a5bf69e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20324%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20320-the-software-uses-external-input-to-a545ade6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20320%3A%20The%20software%20uses%20external%20input%20to%20construct%20a%20pathname%20that%20should%20be%20within%20a%20restricted%20directory%2C%20but%20it%20does%20not%20properly%20neutralize%20&apos;...%2F...%2F%2F&apos;%20(doubled%20triple%20dot%20slash)%20sequences%20that%20can%20resolve%20to%20a%20location%20that%20is%20outside%20of%20that%20directory.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20300-the-software-performs-an-authorizat-f330815b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20300%3A%20The%20software%20performs%20an%20authorization%20check%20when%20an%20actor%20attempts%20to%20access%20a%20resource%20or%20perform%20an%20action%2C%20but%20it%20does%20not%20correctly%20perform%20the%20check.%20This%20allows%20attackers%20to%20bypass%20intended%20access%20restrictions.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09ce6f40f0eb72eb4a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7138-sql-injection-in-sourcecodester-best-4af28a15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7138%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c06496f40f0eb72eb3a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-gps-leak-no-one-talked-about-uffizios-silent-e-94a4ff82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20GPS%20Leak%20No%20One%20Talked%20About%3A%20Uffizio%E2%80%99s%20Silent%20Exposure&amp;severity=medium&amp;id=686c02c96f40f0eb72eb3103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53531-cwe-770-allocation-of-resources-wit-bd481a37</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53531%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=686bff426f40f0eb72eb25e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7137-sql-injection-in-sourcecodester-best-7e0b5f39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7137%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686bff426f40f0eb72eb25ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53530-cwe-770-allocation-of-resources-wit-08e8b0ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53530%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=686bff426f40f0eb72eb25e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53529-cwe-89-improper-neutralization-of-s-36601dab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53529%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=686bff426f40f0eb72eb25f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53527-cwe-89-improper-neutralization-of-s-fbd27b89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53527%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=686bfbbe6f40f0eb72eaa80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1351-cwe-362-concurrent-execution-using-s-1d50adff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1351%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20IBM%20Storage%20Virtualize&amp;severity=medium&amp;id=686bfbbe6f40f0eb72eaa808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53526-cwe-79-improper-neutralization-of-i-55c797ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53526%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=686bf83b6f40f0eb72ea9d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7136-sql-injection-in-campcodes-online-re-f6588fc0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7136%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=686bf83b6f40f0eb72ea9d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53525-cwe-79-improper-neutralization-of-i-3c8eaee2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53525%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=686bf83b6f40f0eb72ea9d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53497-cwe-79-improper-neutralization-of-i-16ec03db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53497%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20RelatedArticles%20Extension&amp;severity=medium&amp;id=686bf83b6f40f0eb72ea9d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53377-cwe-79-improper-neutralization-of-i-c2178717</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53377%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=686bf4b96f40f0eb72ea6aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53491-cwe-79-improper-neutralization-of-i-773ea350</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53491%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20FlaggedRevs%20Extension&amp;severity=medium&amp;id=686bf4b96f40f0eb72ea6abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36014-cwe-94-improper-control-of-generati-4d40d5ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36014%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20IBM%20Integration%20Bus&amp;severity=high&amp;id=686bf4b96f40f0eb72ea6ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-leaked-shellter-red-team-tool-to-dep-2d7d8bb3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20abuse%20leaked%20Shellter%20red%20team%20tool%20to%20deploy%20infostealers&amp;severity=high&amp;id=686bf1306f40f0eb72ea5de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7135-sql-injection-in-campcodes-online-re-2dae394b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7135%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=686bf4b96f40f0eb72ea6aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7259-cwe-843-access-of-resource-using-inc-c226903f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7259%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=686bf1406f40f0eb72ea5fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53373-cwe-640-weak-password-recovery-mech-e51c6904</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53373%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20ahmed-elgaml11%20Natours&amp;severity=high&amp;id=686bedae6f40f0eb72ea4e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7134-sql-injection-in-campcodes-online-re-4f79c102</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7134%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=686bedae6f40f0eb72ea4e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53487-cwe-79-improper-neutralization-of-i-364115ab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53487%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20ApprovedRevs%20extension&amp;severity=medium&amp;id=686be6aa6f40f0eb72ea2e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7057-cwe-79-improper-neutralization-of-in-d6a20b11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Quiz%20Extension&amp;severity=medium&amp;id=686be6aa6f40f0eb72ea2e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53486-cwe-79-improper-neutralization-of-i-9ca2bc7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20WikiCategoryTagCloud%20extension&amp;severity=medium&amp;id=686be34b6f40f0eb72ea2065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7133-cross-site-request-forgery-in-codeas-47dd463b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7133%3A%20Cross-Site%20Request%20Forgery%20in%20CodeAstro%20Online%20Movie%20Ticket%20Booking%20System&amp;severity=medium&amp;id=686be34b6f40f0eb72ea2069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6811-cwe-502-deserialization-of-untrusted-5ecb1f96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6811%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mescius%20ActiveReports.NET&amp;severity=critical&amp;id=686bdfa06f40f0eb72ea12dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6810-cwe-502-deserialization-of-untrusted-9c779ff2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6810%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mescius%20ActiveReports.NET&amp;severity=critical&amp;id=686bdfa06f40f0eb72ea12da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6802-cwe-434-unrestricted-upload-of-file--2864ec57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6802%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Marvell%20QConvergeConsole&amp;severity=critical&amp;id=686bdfa06f40f0eb72ea12c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6806-cwe-22-improper-limitation-of-a-path-ee721f6f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6806%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6807-cwe-22-improper-limitation-of-a-path-41f9acf7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6807%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=medium&amp;id=686bdfa06f40f0eb72ea12d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6795-cwe-22-improper-limitation-of-a-path-6c8b1d1f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6795%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=medium&amp;id=686bdfa06f40f0eb72ea12a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6794-cwe-22-improper-limitation-of-a-path-b1cd93ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6794%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=critical&amp;id=686bdfa06f40f0eb72ea12a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6801-cwe-22-improper-limitation-of-a-path-8bb97a90</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6801%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6800-cwe-22-improper-limitation-of-a-path-674070c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6800%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6799-cwe-22-improper-limitation-of-a-path-94d2ea1b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6799%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6798-cwe-22-improper-limitation-of-a-path-a4e1dbc1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6798%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6797-cwe-22-improper-limitation-of-a-path-5e1284fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6797%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6805-cwe-22-improper-limitation-of-a-path-372d9f4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6805%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6796-cwe-22-improper-limitation-of-a-path-090dad0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6796%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6793-cwe-22-improper-limitation-of-a-path-6bab51a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6793%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=critical&amp;id=686bdfa06f40f0eb72ea12a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6804-cwe-22-improper-limitation-of-a-path-6e0c2224</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6804%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6803-cwe-22-improper-limitation-of-a-path-87b81ab0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6803%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6714-cwe-834-excessive-iteration-in-mongo-70e02df4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6714%3A%20CWE-834%20Excessive%20Iteration%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6713-cwe-285-improper-authorization-in-mo-af144f21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6713%3A%20CWE-285%3A%20Improper%20Authorization%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=686bdfa06f40f0eb72ea129d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6712-cwe-400-uncontrolled-resource-consum-49341ce8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6712%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=686bdfa06f40f0eb72ea12e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6711-cwe-532-insertion-of-sensitive-infor-77913592</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6711%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=686bdfa16f40f0eb72ea12ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-discovered-a-libpng-vulnerability-11-years-a-2255ef2e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20I%20Discovered%20a%20Libpng%20Vulnerability%2011%20Years%20After%20It%20Was%20Patched&amp;severity=medium&amp;id=686bdc1c6f40f0eb72e9f8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7132-sql-injection-in-campcodes-payroll-m-aa7b5a47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7132%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686bdc1a6f40f0eb72e9f8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5987-return-of-wrong-status-code-in-red-h-159e0366</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5987%3A%20Return%20of%20Wrong%20Status%20Code&amp;severity=high&amp;id=686bdc1a6f40f0eb72e9f8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7131-sql-injection-in-campcodes-payroll-m-e667663d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7131%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686bd5126f40f0eb72e9c81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7056-cwe-79-improper-neutralization-of-in-c8cc28a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20UrlShortener%20Extension&amp;severity=medium&amp;id=686bd5126f40f0eb72e9c81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digging-gold-with-a-spoon-resurgence-of-monero-min-3f5d0810</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Digging%20Gold%20with%20a%20Spoon%20%E2%80%93%20Resurgence%20of%20Monero-mining%20Malware&amp;severity=medium&amp;id=686c37846f40f0eb72ecd2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/batavia-spyware-steals-data-from-russian-organizat-494a5c9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Batavia%20spyware%20steals%20data%20from%20Russian%20organizations&amp;severity=medium&amp;id=686c3b086f40f0eb72ecf6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7130-sql-injection-in-campcodes-payroll-m-87622c83</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7130%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686bce096f40f0eb72e9561c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/satanlock-ransomware-ends-operations-says-stolen-d-216ddfcf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SatanLock%20Ransomware%20Ends%20Operations%2C%20Says%20Stolen%20Data%20Will%20Be%20Leaked&amp;severity=medium&amp;id=686bca846f40f0eb72e8e778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7129-sql-injection-in-campcodes-payroll-m-782e63ee</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7129%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686bc7006f40f0eb72e8cfc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7128-sql-injection-in-campcodes-payroll-m-c4a9280b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7128%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686bc37c6f40f0eb72e8a67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6209-cwe-29-path-traversal-filename-in-ru-320877a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6209%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=686bbff86f40f0eb72e88b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7127-sql-injection-in-itsourcecode-employ-5cd0b70e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7127%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Management%20System&amp;severity=medium&amp;id=686bbc746f40f0eb72e59460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bert-ransomware-group-targets-asia-and-europe-on-m-c5c69b71</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BERT%20Ransomware%20Group%20Targets%20Asia%20and%20Europe%20on%20Multiple%20Platforms&amp;severity=medium&amp;id=686bce096f40f0eb72e955f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7126-sql-injection-in-itsourcecode-employ-850ba3b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7126%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Management%20System&amp;severity=medium&amp;id=686bb1e96f40f0eb72e3c3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7125-sql-injection-in-itsourcecode-employ-73322714</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7125%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Management%20System&amp;severity=medium&amp;id=686baae16f40f0eb72e3a3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7124-unrestricted-upload-in-code-projects-a1963590</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7124%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Note%20Sharing&amp;severity=medium&amp;id=686ba3d86f40f0eb72e38091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7123-sql-injection-in-campcodes-complaint-eac5a7d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7123%3A%20SQL%20Injection%20in%20Campcodes%20Complaint%20Management%20System&amp;severity=medium&amp;id=686b9cd16f40f0eb72e2e225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3467-cwe-79-improper-neutralization-of-in-bd43a1b0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20langgenius%2Fdify&amp;severity=high&amp;id=686b9cd16f40f0eb72e2e249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5472-cwe-674-uncontrolled-recursion-in-ru-30f4b7b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5472%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=686b9cd26f40f0eb72e2e26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6210-cwe-22-improper-limitation-of-a-path-39e1b220</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6210%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=686b9cd26f40f0eb72e2e270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3777-cwe-20-improper-input-validation-in--319fa4fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3777%3A%20CWE-20%20Improper%20Input%20Validation%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=low&amp;id=686b9cd16f40f0eb72e2e24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3466-cwe-1100-insufficient-isolation-of-s-222f14a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3466%3A%20CWE-1100%20Insufficient%20Isolation%20of%20System-Dependent%20Functions%20in%20langgenius%20langgenius%2Fdify&amp;severity=critical&amp;id=686b9cd16f40f0eb72e2e245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6386-cwe-203-observable-discrepancy-in-pa-1b35c718</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6386%3A%20CWE-203%20Observable%20Discrepancy%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=686b9cd26f40f0eb72e2e274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3264-cwe-1333-inefficient-regular-express-402d36be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3264%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=686b9cd16f40f0eb72e2e241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3263-cwe-1333-inefficient-regular-express-b975a99a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3263%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=686b9cd16f40f0eb72e2e23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3046-cwe-22-improper-limitation-of-a-path-8a7517e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3046%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=686b9cd16f40f0eb72e2e231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3262-cwe-1333-inefficient-regular-express-cbd56a5b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3262%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=686b9cd16f40f0eb72e2e239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3044-cwe-440-expected-behavior-violation--3f08376a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3044%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=686b9cd16f40f0eb72e2e22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3225-cwe-776-improper-restriction-of-recu-619ad06e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3225%3A%20CWE-776%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=686b9cd16f40f0eb72e2e235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43334-improper-neutralization-of-input-du-44740f14</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43334%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gavias%20Zilom&amp;severity=null&amp;id=69cd746fe6bfc5ba1def789b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4779-cwe-79-improper-neutralization-of-in-889b23d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4779%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=686b9cd26f40f0eb72e2e268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7122-sql-injection-in-campcodes-complaint-eb6cb107</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7122%3A%20SQL%20Injection%20in%20Campcodes%20Complaint%20Management%20System&amp;severity=medium&amp;id=686b95c86f40f0eb72e2c082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3705-cwe-78-improper-neutralization-of-sp-031b7150</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3705%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Frauscher%20FDS102&amp;severity=medium&amp;id=686c06496f40f0eb72eb3a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3626-cwe-78-improper-neutralization-of-sp-bd3458f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3626%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Frauscher%20FDS102&amp;severity=critical&amp;id=686c09cf6f40f0eb72eb4a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7121-sql-injection-in-campcodes-complaint-b9f9b21b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7121%3A%20SQL%20Injection%20in%20Campcodes%20Complaint%20Management%20System&amp;severity=medium&amp;id=686b92456f40f0eb72e2b501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7120-sql-injection-in-campcodes-complaint-4eb6000f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7120%3A%20SQL%20Injection%20in%20Campcodes%20Complaint%20Management%20System&amp;severity=medium&amp;id=686b8b3d6f40f0eb72e22433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-surge-hits-android-adware-trojans-and-cryp-bb562a28</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Surge%20Hits%20Android%3A%20Adware%2C%20Trojans%20and%20Crypto%20Theft%20Lead%20Q2%20Threats&amp;severity=medium&amp;id=686b87b76f40f0eb72e1dad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7119-sql-injection-in-campcodes-complaint-e1f8ce1b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7119%3A%20SQL%20Injection%20in%20Campcodes%20Complaint%20Management%20System&amp;severity=medium&amp;id=686b84346f40f0eb72de8095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7118-buffer-overflow-in-utt-hiper-840g-fcf999ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7118%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=686b79a86f40f0eb72ddb59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7117-buffer-overflow-in-utt-hiper-840g-5d7fb2d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7117%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=686b76246f40f0eb72dd78be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7116-buffer-overflow-in-utt-750w-b27b19c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7116%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20750W&amp;severity=high&amp;id=686b6f1c6f40f0eb72dd3f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41672-cwe-1188-in-wago-wago-device-sphere-1c0a7fa8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41672%3A%20CWE-1188%20in%20WAGO%20Wago%20Device%20Sphere&amp;severity=critical&amp;id=686b6b986f40f0eb72dd2a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7115-missing-authentication-in-rowboatlab-8f663d3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7115%3A%20Missing%20Authentication%20in%20rowboatlabs%20rowboat&amp;severity=medium&amp;id=686b68146f40f0eb72dcbca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7114-missing-authentication-in-simstudioa-29ee1699</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7114%3A%20Missing%20Authentication%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=686b5d886f40f0eb72db8a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7113-cross-site-scripting-in-portabilis-i-333c2a73</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7113%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=686b5a056f40f0eb72db6818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24508-vulnerability-in-broadcom-symantec--585890dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24508%3A%20Vulnerability%20in%20Broadcom%20Symantec%20IT%20Management%20Suite&amp;severity=medium&amp;id=686b56806f40f0eb72db5a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53473-server-side-request-forgery-ssrf-in-08c80233</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53473%3A%20Server-side%20request%20forgery%20(SSRF)%20in%20Nimesa%20Nimesa%20Backup%20and%20Recovery&amp;severity=high&amp;id=686b56806f40f0eb72db5a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48501-improper-neutralization-of-special--a2555ec3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48501%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nimesa%20Nimesa%20Backup%20and%20Recovery&amp;severity=critical&amp;id=686b56806f40f0eb72db5a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7112-cross-site-scripting-in-portabilis-i-2b2a9e72</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7112%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=686b4f796f40f0eb72db34cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7111-cross-site-scripting-in-portabilis-i-34ac076a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7111%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=686b4bf56f40f0eb72db2490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7110-cross-site-scripting-in-portabilis-i-482f15be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7110%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=686b44ed6f40f0eb72db13f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7109-cross-site-scripting-in-portabilis-i-462ac600</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7109%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=686d862b6f40f0eb72fb6820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53186-cwe-264-permissions-privileges-and--93efcb1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53186%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686c0d526f40f0eb72eb669f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53185-cwe-416-use-after-free-in-huawei-ha-9a7682d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53185%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686c0d526f40f0eb72eb669c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53184-cwe-122-heap-based-buffer-overflow--63343353</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53184%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686c02c66f40f0eb72eb30d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7108-path-traversal-in-risesoft-y9-digita-88ea80c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7108%3A%20Path%20Traversal%20in%20risesoft-y9%20Digital-Infrastructure&amp;severity=medium&amp;id=686c02c66f40f0eb72eb30da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53183-cwe-122-heap-based-buffer-overflow--3ca9fabb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53183%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53182-cwe-122-heap-based-buffer-overflow--bd067b79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53182%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53181-cwe-122-heap-based-buffer-overflow--42f35f33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53181%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53180-cwe-122-heap-based-buffer-overflow--2e646c68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53180%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53179-cwe-122-heap-based-buffer-overflow--91c2a741</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53179%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53178-cwe-264-permissions-privileges-and--910f5ed7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53178%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7145-cwe-78-improper-neutralization-of-sp-cdb83c07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7145%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=686b335a6f40f0eb72dac3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53177-cwe-264-permissions-privileges-and--5abc7f7d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53177%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=686b335a6f40f0eb72dac3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53176-cwe-121-stack-based-buffer-overflow-5e4c3093</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53176%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=686b335a6f40f0eb72dac393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53175-cwe-121-stack-based-buffer-overflow-69fd8c41</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53175%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53174-cwe-121-stack-based-buffer-overflow-1bff26c7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53174%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53173-cwe-121-stack-based-buffer-overflow-40a20f0c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53173%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53172-cwe-121-stack-based-buffer-overflow-c7080e2e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53172%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53171-cwe-121-stack-based-buffer-overflow-9a9acafa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53171%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7107-path-traversal-in-simstudioai-sim-6127d29d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7107%3A%20Path%20Traversal%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53170-cwe-476-null-pointer-dereference-in-e28861a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53170%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53169-others-in-huawei-harmonyos-9bdce566</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53169%3A%20Others%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=686b335a6f40f0eb72dac37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53168-cwe-275-permission-issues-in-huawei-59fa84b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53168%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53167-cwe-305-authentication-bypass-by-pr-a0fe554a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53167%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7103-server-side-request-forgery-in-boyun-c3b5d75e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7103%3A%20Server-Side%20Request%20Forgery%20in%20BoyunCMS&amp;severity=medium&amp;id=686b28cc6f40f0eb72da3f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7102-sql-injection-in-boyuncms-c3274ed3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7102%3A%20SQL%20Injection%20in%20BoyunCMS&amp;severity=medium&amp;id=686b1e416f40f0eb72da1297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7101-code-injection-in-boyuncms-685802eb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7101%3A%20Code%20Injection%20in%20BoyunCMS&amp;severity=medium&amp;id=686b17386f40f0eb72d9d21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7100-unrestricted-upload-in-boyuncms-033c21c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7100%3A%20Unrestricted%20Upload%20in%20BoyunCMS&amp;severity=medium&amp;id=686b17386f40f0eb72d9d217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25178-na-3215eef6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25178%3A%20n%2Fa&amp;severity=critical&amp;id=6908f50bf612d110fe9cbe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25177-na-254bfe79</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25177%3A%20n%2Fa&amp;severity=high&amp;id=6908f50bf612d110fe9cbe8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25176-na-96fd26bb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25176%3A%20n%2Fa&amp;severity=critical&amp;id=6908f50bf612d110fe9cbe85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45479-na-2680e49f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45479%3A%20n%2Fa&amp;severity=critical&amp;id=686d5b606f40f0eb72f9758e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-07-2b8293ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-07&amp;severity=medium&amp;id=686c61ae6f40f0eb72ee1c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26780-na-f59e51a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26780%3A%20n%2Fa&amp;severity=high&amp;id=686bf4b96f40f0eb72ea6ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47202-na-d20244dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47202%3A%20n%2Fa&amp;severity=critical&amp;id=686bf1406f40f0eb72ea5fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45065-na-97a0688f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45065%3A%20n%2Fa&amp;severity=critical&amp;id=686bedae6f40f0eb72ea4e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52492-na-c3ab2a52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52492%3A%20n%2Fa&amp;severity=high&amp;id=686bea346f40f0eb72ea4427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43933-na-8e598de0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43933%3A%20n%2Fa&amp;severity=critical&amp;id=686be6aa6f40f0eb72ea2e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43932-na-130780d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43932%3A%20n%2Fa&amp;severity=critical&amp;id=686be6aa6f40f0eb72ea2e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43931-na-2bb870c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43931%3A%20n%2Fa&amp;severity=critical&amp;id=686be6aa6f40f0eb72ea2e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43930-na-3294909e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43930%3A%20n%2Fa&amp;severity=critical&amp;id=686be34b6f40f0eb72ea2061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7099-deserialization-in-boyuncms-426f5c30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7099%3A%20Deserialization%20in%20BoyunCMS&amp;severity=medium&amp;id=686b0cac6f40f0eb72d968ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7098-path-traversal-in-comodo-internet-se-17276090</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7098%3A%20Path%20Traversal%20in%20Comodo%20Internet%20Security%20Premium&amp;severity=medium&amp;id=686b02206f40f0eb72d93dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3108-cwe-1112-incomplete-documentation-of-89b43994</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3108%3A%20CWE-1112%20Incomplete%20Documentation%20of%20Program%20Execution%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=686afe9c6f40f0eb72d914f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7097-os-command-injection-in-comodo-inter-b946d8d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7097%3A%20OS%20Command%20Injection%20in%20Comodo%20Internet%20Security%20Premium&amp;severity=critical&amp;id=686afb196f40f0eb72d90787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7096-improper-validation-of-integrity-che-876c0d20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7096%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Comodo%20Internet%20Security%20Premium&amp;severity=critical&amp;id=686af4106f40f0eb72d8e286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tat-de-lart-sur-le-phishing-azure-en-2025-partie-2-8d303959</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%C3%89tat%20de%20l%E2%80%99art%20sur%20le%20phishing%20Azure%20en%202025%20(partie%202)%20%E2%80%93%20%C3%89tendre%20l%E2%80%99acc%C3%A8s&amp;severity=medium&amp;id=686af08d6f40f0eb72d8d693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7095-improper-certificate-validation-in-c-8a92f057</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7095%3A%20Improper%20Certificate%20Validation%20in%20Comodo%20Internet%20Security%20Premium&amp;severity=medium&amp;id=686aed086f40f0eb72d74a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7094-stack-based-buffer-overflow-in-belki-d63fefc1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7094%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ae6006f40f0eb72d71766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7093-stack-based-buffer-overflow-in-belki-ad41f8a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7093%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686adef86f40f0eb72d6dbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7092-stack-based-buffer-overflow-in-belki-081443c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7092%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ad7f06f40f0eb72d6caab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-linux-boot-flaw-bypasses-secure-boot-and-full-850b4716</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20Linux%20boot%20flaw%20bypasses%20Secure%20Boot%20and%20full%20disk%20encryption%20but%20the%20fix%20is%20easy&amp;severity=medium&amp;id=686ad0ea6f40f0eb72d6b99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7091-stack-based-buffer-overflow-in-belki-6d49f176</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7091%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ad0e96f40f0eb72d6b993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7090-stack-based-buffer-overflow-in-belki-368d8126</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7090%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ac9e26f40f0eb72d5d3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7089-stack-based-buffer-overflow-in-belki-efcd25fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7089%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ac2d86f40f0eb72d5a838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7088-stack-based-buffer-overflow-in-belki-b6bde1c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7088%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686abbd16f40f0eb72d5700b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7087-stack-based-buffer-overflow-in-belki-deff9a01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7087%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ab4c96f40f0eb72d5620a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7086-stack-based-buffer-overflow-in-belki-006f3c0b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7086%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686aadc16f40f0eb72d54927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7085-stack-based-buffer-overflow-in-belki-247ad5d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7085%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686aa6b96f40f0eb72d53244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7084-stack-based-buffer-overflow-in-belki-7c14b363</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7084%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686aa3356f40f0eb72d523a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/schizophrenic-zip-file-yet-another-zip-trick-write-0f8bfe33</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Schizophrenic%20ZIP%20file%20-%20Yet%20Another%20ZIP%20Trick%20Writeup&amp;severity=medium&amp;id=686a9c2f6f40f0eb72d50430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7083-os-command-injection-in-belkin-f9k11-7f94f7c8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7083%3A%20OS%20Command%20Injection%20in%20Belkin%20F9K1122&amp;severity=medium&amp;id=686a98a96f40f0eb72d5003f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7082-os-command-injection-in-belkin-f9k11-2f73be51</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7082%3A%20OS%20Command%20Injection%20in%20Belkin%20F9K1122&amp;severity=medium&amp;id=686a83916f40f0eb72d4bf07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5333-vulnerability-in-broadcom-symantec-i-f5a1b248</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5333%3A%20Vulnerability%20in%20Broadcom%20Symantec%20IT%20Management%20Suite&amp;severity=critical&amp;id=686bd5126f40f0eb72e9c826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7081-os-command-injection-in-belkin-f9k11-83d60aea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7081%3A%20OS%20Command%20Injection%20in%20Belkin%20F9K1122&amp;severity=medium&amp;id=686a800d6f40f0eb72d49c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-spam-plugin-uses-victims-domain-name-to-evade-9a4e042b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Spam%20Plugin%20Uses%20Victim&apos;s%20Domain%20Name%20to%20Evade%20Detection&amp;severity=medium&amp;id=686b994c6f40f0eb72e2ca2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-message-from-the-mechanical-shark-f1a84a12</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20message%20from%20the%20mechanical%20shark&amp;severity=medium&amp;id=686b994c6f40f0eb72e2ca1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7080-use-of-hard-coded-password-in-done-0-1059bbcb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7080%3A%20Use%20of%20Hard-coded%20Password%20in%20Done-0%20Jank&amp;severity=medium&amp;id=686a79066f40f0eb72d15a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7079-use-of-hard-coded-password-in-mao888-9f44829e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7079%3A%20Use%20of%20Hard-coded%20Password%20in%20mao888%20bluebell-plus&amp;severity=medium&amp;id=686a71fd6f40f0eb72d08af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7078-cross-site-request-forgery-in-07flyc-fbe2cd65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7078%3A%20Cross-Site%20Request%20Forgery%20in%2007FLYCMS&amp;severity=medium&amp;id=686a363b6f40f0eb72cd6c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7077-buffer-overflow-in-shenzhen-libituo--9f728dec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7077%3A%20Buffer%20Overflow%20in%20Shenzhen%20Libituo%20Technology%20LBT-T300-T310&amp;severity=high&amp;id=686a1a1b6f40f0eb72cc1c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27446-cwe-732-incorrect-permission-assign-287204e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27446%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20APISIX%20Java%20Plugin%20Runner&amp;severity=high&amp;id=686a16976f40f0eb72ca5570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7076-improper-access-controls-in-blackvue-356e45f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7076%3A%20Improper%20Access%20Controls%20in%20BlackVue%20Dashcam%20590X&amp;severity=medium&amp;id=6869c93f6f40f0eb72b61239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-06-671c103d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-06&amp;severity=medium&amp;id=686b102e6f40f0eb72d99409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7075-unrestricted-upload-in-blackvue-dash-463b8b0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7075%3A%20Unrestricted%20Upload%20in%20BlackVue%20Dashcam%20590X&amp;severity=medium&amp;id=6869b7ab6f40f0eb72b3cd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7074-inefficient-regular-expression-compl-8e73f892</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7074%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20vercel%20hyper&amp;severity=medium&amp;id=6868ebc76f40f0eb72a8c933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53605-cwe-674-uncontrolled-recursion-in-s-fcb2ac04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53605%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20stepancheg%20protobuf&amp;severity=medium&amp;id=68687b486f40f0eb72a48a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53604-cwe-130-improper-handling-of-length-79cbee8b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53604%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20pimeys%20web-push&amp;severity=medium&amp;id=686877c46f40f0eb72a47d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53603-cwe-476-null-pointer-dereference-in-cea1526a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53603%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Alinto%20SOPE&amp;severity=high&amp;id=686870c16f40f0eb72a422b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48952-cwe-697-incorrect-comparison-in-jok-5232e6b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48952%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20jokob-sk%20NetAlertX&amp;severity=critical&amp;id=6868549c6f40f0eb72a3d4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53366-cwe-248-uncaught-exception-in-model-bed56cf4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53366%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20modelcontextprotocol%20python-sdk&amp;severity=high&amp;id=6868549c6f40f0eb72a3d4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53365-cwe-248-uncaught-exception-in-model-e3179b37</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53365%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20modelcontextprotocol%20python-sdk&amp;severity=high&amp;id=6868549c6f40f0eb72a3d4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7070-allocation-of-resources-in-iroad-das-f885e3b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7070%3A%20Allocation%20of%20Resources%20in%20IROAD%20Dashcam%20Q9&amp;severity=medium&amp;id=68684a106f40f0eb72a3bb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7069-heap-based-buffer-overflow-in-hdf5-61c27c51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7069%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=6868468c6f40f0eb72a3b265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7068-memory-leak-in-hdf5-e023b32f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7068%3A%20Memory%20Leak%20in%20HDF5&amp;severity=medium&amp;id=68683c026f40f0eb72a330d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ingram-micro-suffers-global-outage-as-internal-sys-745f47c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ingram%20Micro%20suffers%20global%20outage%20as%20internal%20systems%20inaccessible&amp;severity=high&amp;id=68681c686f40f0eb72a215e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-leaks-telefnica-data-allegedly-stolen-in-a--fca2f4bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20leaks%20Telef%C3%B3nica%20data%20allegedly%20stolen%20in%20a%20new%20breach&amp;severity=high&amp;id=68681c686f40f0eb72a215de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7067-heap-based-buffer-overflow-in-hdf5-2d09cdfe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7067%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=686818d86f40f0eb72a20eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53485-cwe-862-missing-authorization-in-wi-0139304a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53485%3A%20CWE-862%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20SecurePoll%20extension&amp;severity=high&amp;id=686815556f40f0eb72a1e957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53484-cwe-79-improper-neutralization-of-i-0291cc3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20SecurePoll%20extension&amp;severity=critical&amp;id=686811d36f40f0eb72a1e2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53483-cwe-352-cross-site-request-forgery--f1835eec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53483%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20SecurePoll%20extension&amp;severity=high&amp;id=686811d36f40f0eb72a1e2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53482-cwe-79-improper-neutralization-of-i-41c45579</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53482%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20IPInfo%20Extension&amp;severity=medium&amp;id=6868003c6f40f0eb72a175e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53481-cwe-400-uncontrolled-resource-consu-d4bf2af1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53481%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20IPInfo%20Extension&amp;severity=high&amp;id=6867f9346f40f0eb72a14159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nighteagle-apt-exploits-microsoft-exchange-flaw-to-1739d04a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NightEagle%20APT%20Exploits%20Microsoft%20Exchange%20Flaw%20to%20Target%20China&apos;s%20Military%20and%20Tech%20Sectors&amp;severity=high&amp;id=6867f5af6f40f0eb72a13690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38213-8d0ec891</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38213&amp;severity=null&amp;id=689a109fad5a09ad0026aadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38178-428f1723</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38178&amp;severity=null&amp;id=688700f4ad5a09ad007ef7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46733-cwe-755-improper-handling-of-except-2634fa97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46733%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20OP-TEE%20optee_os&amp;severity=high&amp;id=686bf4b96f40f0eb72ea6ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7061-csv-injection-in-intelbras-incontrol-d0abe306</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7061%3A%20CSV%20Injection%20in%20Intelbras%20InControl&amp;severity=medium&amp;id=6867cb876f40f0eb72a0909d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7066-cwe-79-improper-neutralization-of-in-30a17923</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7066%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jirafeau%20project%20Jirafeau&amp;severity=medium&amp;id=6867c4786f40f0eb72a08436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6056-cwe-203-observable-discrepancy-in-er-f7c3b097</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6056%3A%20CWE-203%20Observable%20Discrepancy%20in%20Ergon%20Informatik%20AG%20Airlock%20IAM&amp;severity=medium&amp;id=6867b9f16f40f0eb72a04a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6740-cwe-79-improper-neutralization-of-in-867da488</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6740%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arshidkv12%20Database%20Addon%20for%20Contact%20Form%207%20%E2%80%93%20CFDB7&amp;severity=medium&amp;id=6867b9f16f40f0eb72a04a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23970-cwe-266-incorrect-privilege-assignm-247631f8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23970%3A%20Incorrect%20Privilege%20Assignment%20in%20aonetheme%20Service%20Finder%20Booking&amp;severity=null&amp;id=6867b9f06f40f0eb72a0496e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24771-cwe-79-improper-neutralization-of-i-375ed80b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Content%20Manager%20Light&amp;severity=null&amp;id=6867b9f06f40f0eb72a04971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24780-cwe-89-improper-neutralization-of-s-4aa43b20</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24780%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20printcart%20Printcart%20Web%20to%20Print%20Product%20Designer%20for%20WooCommerce&amp;severity=null&amp;id=6867b9f06f40f0eb72a04974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28968-cwe-79-improper-neutralization-of-i-8d0ec932</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28968%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladimir%20Prelovac%20WP%20Wall&amp;severity=null&amp;id=6867b9f06f40f0eb72a04977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28976-cwe-79-improper-neutralization-of-i-f55eceae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28976%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dsrodzin%20Email%20Address%20Security%20by%20WebEmailProtector&amp;severity=null&amp;id=6867b9f06f40f0eb72a0497a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28978-cwe-79-improper-neutralization-of-i-274d13d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hung%20Trang%20Si%20SB%20Breadcrumbs&amp;severity=null&amp;id=6867b9f06f40f0eb72a0497d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28980-cwe-22-improper-limitation-of-a-pat-b56a1809</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28980%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20machouinard%20Aviation%20Weather%20from%20NOAA&amp;severity=null&amp;id=6867b9f06f40f0eb72a04980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28983-cwe-89-improper-neutralization-of-s-bcae9037</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28983%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ClickandPledge%20Click%20%26%20Pledge%20Connect&amp;severity=critical&amp;id=6867b9f06f40f0eb72a04983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30933-cwe-434-unrestricted-upload-of-file-6d6f85e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30933%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20LiquidThemes%20LogisticsHub&amp;severity=null&amp;id=6867b9f06f40f0eb72a04986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31037-cwe-79-improper-neutralization-of-i-aeee1fa5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Homey&amp;severity=null&amp;id=6867b9f06f40f0eb72a04989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32297-cwe-89-improper-neutralization-of-s-4bb83f24</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32297%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=null&amp;id=6867b9f06f40f0eb72a04998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32311-cwe-79-improper-neutralization-of-i-1222b078</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32311%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20Pressroom&amp;severity=null&amp;id=6867b9f06f40f0eb72a0499b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39487-cwe-79-improper-neutralization-of-i-cf2bef7a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39487%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ValvePress%20Rankie&amp;severity=null&amp;id=6867b9f06f40f0eb72a0499e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47479-cwe-1390-weak-authentication-in-are-c1f89b34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47479%3A%20Weak%20Authentication%20in%20AresIT%20WP%20Compress&amp;severity=null&amp;id=6867b9f06f40f0eb72a049a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47565-cwe-862-missing-authorization-in-as-56424f64</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47565%3A%20Missing%20Authorization%20in%20ashanjay%20EventON&amp;severity=null&amp;id=6867b9f06f40f0eb72a049a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47627-cwe-98-improper-control-of-filename-193af7e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47627%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LCweb%20PrivateContent%20-%20Mail%20Actions&amp;severity=high&amp;id=6867b9f06f40f0eb72a049a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47634-cwe-862-missing-authorization-in-ke-eed4a2ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47634%3A%20Missing%20Authorization%20in%20Keylor%20Mendoza%20WC%20Pickup%20Store&amp;severity=null&amp;id=6867b9f06f40f0eb72a049aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48231-cwe-79-improper-neutralization-of-i-250b15a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Booking%20Calendar%20Contact%20Form&amp;severity=null&amp;id=6867b9f06f40f0eb72a049ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49245-cwe-79-improper-neutralization-of-i-9f4f16a2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmoreira%20Testimonials%20Showcase&amp;severity=null&amp;id=6867b9f06f40f0eb72a049b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49247-cwe-79-improper-neutralization-of-i-0c42a8da</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49247%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmoreira%20Team%20Showcase&amp;severity=null&amp;id=6867b9f16f40f0eb72a049c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49274-cwe-79-improper-neutralization-of-i-17e4a40b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49274%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awordpresslife%20Neom%20Blog&amp;severity=null&amp;id=6867b9f16f40f0eb72a049c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49302-cwe-94-improper-control-of-generati-57375efd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49302%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Scott%20Paterson%20Easy%20Stripe&amp;severity=null&amp;id=6867b9f16f40f0eb72a049c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49303-cwe-22-improper-limitation-of-a-pat-f345fe68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49303%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Shabti%20Kaplan%20Frontend%20Admin%20by%20DynamiApps&amp;severity=null&amp;id=6867b9f16f40f0eb72a049cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49866-cwe-79-improper-neutralization-of-i-2ad49cb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49866%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nikel%20Beautiful%20Cookie%20Consent%20Banner&amp;severity=null&amp;id=6867b9f16f40f0eb72a049da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49867-cwe-266-incorrect-privilege-assignm-27f695bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49867%3A%20Incorrect%20Privilege%20Assignment%20in%20InspiryThemes%20RealHomes&amp;severity=null&amp;id=6867b9f16f40f0eb72a049dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49870-cwe-89-improper-neutralization-of-s-d799035a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49870%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=null&amp;id=6867b9f16f40f0eb72a049ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50032-cwe-862-missing-authorization-in-pa-432ed219</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50032%3A%20Missing%20Authorization%20in%20Paytiko%20-%20Payment%20Orchestration%20Platform%20Paytiko%20for%20WooCommerce&amp;severity=null&amp;id=6867b9f16f40f0eb72a049f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50039-cwe-862-missing-authorization-in-vg-8c348840</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50039%3A%20Missing%20Authorization%20in%20vgwort%20VG%20WORT%20METIS&amp;severity=null&amp;id=6867b9f16f40f0eb72a049f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52718-cwe-94-improper-control-of-generati-012d306a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52718%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Beplusthemes%20Alone&amp;severity=null&amp;id=6867b9f16f40f0eb72a049f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52776-cwe-79-improper-neutralization-of-i-a6aff65c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52776%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thanhtungtnt%20Video%20List%20Manager&amp;severity=null&amp;id=6867b9f16f40f0eb72a049fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52796-cwe-79-improper-neutralization-of-i-0b73b6eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tggfref%20WP-Recall&amp;severity=high&amp;id=6867b9f16f40f0eb72a049fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52798-cwe-79-improper-neutralization-of-i-41663e96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52798%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20JobSearch&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52805-cwe-35-path-traversal-in-vaultdwell-5275ab77</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52805%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20VaultDweller%20Leyka&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52807-cwe-98-improper-control-of-filename-90055f7f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52807%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusWP%20Kossy%20-%20Minimalist%20eCommerce%20WordPress%20Theme&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52813-cwe-862-missing-authorization-in-pi-705c5c04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52813%3A%20CWE-862%20Missing%20Authorization%20in%20pietro%20MobiLoud&amp;severity=high&amp;id=6867b9f16f40f0eb72a04a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52828-cwe-502-deserialization-of-untruste-27f6ec8d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52828%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Red%20Art&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52830-cwe-89-improper-neutralization-of-s-be7bf20a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52830%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bsecuretech%20bSecure%20%26%238211%3B%20Your%20Universal%20Checkout&amp;severity=critical&amp;id=6867b9f16f40f0eb72a04a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52831-cwe-89-improper-neutralization-of-s-08b04f8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52831%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thanhtungtnt%20Video%20List%20Manager&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52832-cwe-89-improper-neutralization-of-s-4745dfce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52832%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpo-HR%20NGG%20Smart%20Image%20Search&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52833-cwe-89-improper-neutralization-of-s-b2058fec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52833%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20designthemes%20LMS&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4414-cwe-98-improper-control-of-filename--92b23333</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4414%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=null&amp;id=6867b9f16f40f0eb72a049ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49070-cwe-98-improper-control-of-filename-1da67f0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49070%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NasaTheme%20Elessi&amp;severity=null&amp;id=6867b9f06f40f0eb72a049b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49414-cwe-434-unrestricted-upload-of-file-2c9acc37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49414%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Fastw3b%20LLC%20FW%20Gallery&amp;severity=null&amp;id=6867b9f16f40f0eb72a049ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49417-cwe-502-deserialization-of-untruste-ebae4036</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49417%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BestWpDeveloper%20WooCommerce%20Product%20Multi-Action&amp;severity=null&amp;id=6867b9f16f40f0eb72a049d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49418-cwe-918-server-side-request-forgery-c178be91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49418%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TeconceTheme%20Allmart&amp;severity=null&amp;id=6867b9f16f40f0eb72a049d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49431-cwe-862-missing-authorization-in-gn-49207aad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49431%3A%20Missing%20Authorization%20in%20Gnuget%20MF%20Plus%20WPML&amp;severity=null&amp;id=6867b9f16f40f0eb72a049d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7060-improper-input-validation-in-monitor-9fa8951c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7060%3A%20Improper%20Input%20Validation%20in%20Monitorr&amp;severity=low&amp;id=6867b6696f40f0eb72a0436c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gamaredon-in-2024-cranking-out-spearphishing-campa-e5161eb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gamaredon%20in%202024%3A%20Cranking%20out%20spearphishing%20campaigns%20against%20Ukraine%20with%20an%20evolved%20toolset&amp;severity=medium&amp;id=6867b2e56f40f0eb72a03c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-issues-emergency-fix-for-critical-root-crede-4e4c664f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Issues%20Emergency%20Fix%20for%20Critical%20Root%20Credential%20Flaw%20in%20Unified%20CM&amp;severity=critical&amp;id=6867af606f40f0eb72a00fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discovery-of-qwizzserial-a-new-android-sms-stealer-27d0e922</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discovery%20of%20Qwizzserial%3A%20A%20New%20Android%20SMS%20Stealer%20Family&amp;severity=medium&amp;id=6867abe26f40f0eb729fd0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-flaw-in-catwatchful-spyware-exposed-logins-of-62-5523c961</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20flaw%20in%20Catwatchful%20spyware%20exposed%20logins%20of%20%2B62%2C000%20users&amp;severity=medium&amp;id=6867a8586f40f0eb729fcaad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5920-cwe-201-insertion-of-sensitive-infor-0ec23b1e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5920%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Sharable%20Password%20Protected%20Posts&amp;severity=high&amp;id=6867a4e56f40f0eb729fc16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hunters-international-ransomware-gang-rebrands-as--0afa0696</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hunters%20International%20Ransomware%20Gang%20Rebrands%20as%20World%20Leaks&amp;severity=medium&amp;id=6867a4d46f40f0eb729fc12c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-nimdoor-north-korean-threat-actors-target-we-e909ef0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20NimDoor%20%7C%20North%20Korean%20Threat%20Actors%20Target%20Web3%20and%20Crypto%20Platforms%20with%20Nim-Based%20Malware&amp;severity=medium&amp;id=6867a4e46f40f0eb729fc14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30983-cwe-79-improper-neutralization-of-i-dc585692</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Card%20flip%20image%20slideshow&amp;severity=null&amp;id=686796cc6f40f0eb729fa598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30979-cwe-89-improper-neutralization-of-s-e5618df9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30979%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20Pixelating%20image%20slideshow%20gallery&amp;severity=null&amp;id=686796cc6f40f0eb729fa595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30969-cwe-89-improper-neutralization-of-s-4edea515</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30969%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20iFrame%20Images%20Gallery&amp;severity=null&amp;id=686796cb6f40f0eb729fa588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30947-cwe-89-improper-neutralization-of-s-5514bb3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30947%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20Cool%20fade%20popup&amp;severity=null&amp;id=686796cb6f40f0eb729fa585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30943-cwe-79-improper-neutralization-of-i-f9484cfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aakif%20Kadiwala%20Posts%20Slider%20Shortcode&amp;severity=null&amp;id=686796cb6f40f0eb729fa582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30929-cwe-862-missing-authorization-in-am-6433da92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30929%3A%20Missing%20Authorization%20in%20amazewp%20fluXtore&amp;severity=null&amp;id=686796cb6f40f0eb729fa57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29012-cwe-862-missing-authorization-in-ka-525e325a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29012%3A%20Missing%20Authorization%20in%20kamleshyadav%20CF7%207%20Mailchimp%20Add-on&amp;severity=null&amp;id=686796cb6f40f0eb729fa57c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29007-cwe-862-missing-authorization-in-lm-af3c20e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29007%3A%20Missing%20Authorization%20in%20LMSACE%20LMSACE%20Connect&amp;severity=null&amp;id=686796cb6f40f0eb729fa579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29001-cwe-862-missing-authorization-in-zo-1b3bdeed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29001%3A%20CWE-862%20Missing%20Authorization%20in%20ZoomIt%20WooCommerce%20Shop%20Page%20Builder&amp;severity=medium&amp;id=686796cb6f40f0eb729fa576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28971-cwe-79-improper-neutralization-of-i-618f3936</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CWD%20Web%20Designer%20Easy%20Elements%20Hider&amp;severity=null&amp;id=686796cb6f40f0eb729fa573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28969-cwe-89-improper-neutralization-of-s-c568d72c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28969%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cybio%20Gallery%20Widget&amp;severity=null&amp;id=686796cb6f40f0eb729fa570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28967-cwe-89-improper-neutralization-of-s-66eb56d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28967%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Steve%20Truman%20Contact%20Us%20page%20-%20Contact%20people%20LITE&amp;severity=null&amp;id=686796cb6f40f0eb729fa56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28963-cwe-918-server-side-request-forgery-11590772</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28963%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Md%20Yeasin%20Ul%20Haider%20URL%20Shortener&amp;severity=null&amp;id=686796cb6f40f0eb729fa560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28957-improper-neutralization-of-input-du-798d270f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28957%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OwnerRez%20OwnerRez%20API&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28951-cwe-434-unrestricted-upload-of-file-4dd0578c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28951%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CreedAlly%20Bulk%20Featured%20Image&amp;severity=null&amp;id=686796cb6f40f0eb729fa55d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27358-cwe-80-improper-neutralization-of-s-3104066a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27358%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=null&amp;id=686796cb6f40f0eb729fa55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27326-cwe-79-improper-neutralization-of-i-3a1dc83f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27326%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Video%20Gallery%20Block&amp;severity=null&amp;id=686796cb6f40f0eb729fa557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26591-cwe-79-improper-neutralization-of-i-16764366</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26591%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20WP%20fancybox&amp;severity=null&amp;id=686796cb6f40f0eb729fa554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24764-cwe-79-improper-neutralization-of-i-db8f559f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20A.%20Jones%20(Simply)%20Guest%20Author%20Name&amp;severity=null&amp;id=686796cb6f40f0eb729fa551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24757-cwe-79-improper-neutralization-of-i-eba39d2b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24757%3A%20Missing%20Authorization%20in%20AndonDesign%20uDesign&amp;severity=null&amp;id=686796cb6f40f0eb729fa54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24748-cwe-89-improper-neutralization-of-s-13f45ea7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24748%3A%20Missing%20Authorization%20in%20ThemeFusion%20Avada&amp;severity=null&amp;id=686796cb6f40f0eb729fa54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24735-cwe-79-improper-neutralization-of-i-6e457956</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chatra%20Chatra%20Live%20Chat%20%2B%20ChatBot%20%2B%20Cart%20Saver&amp;severity=medium&amp;id=686796cb6f40f0eb729fa548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23972-cwe-352-cross-site-request-forgery--d9937002</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23972%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Brian%20S.%20Reed%20Contact%20Form%207%20reCAPTCHA&amp;severity=null&amp;id=686796cb6f40f0eb729fa545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53569-cwe-352-cross-site-request-forgery--8bb6e1c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53569%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Trust%20Payments%20Trust%20Payments%20Gateway%20for%20WooCommerce%20(JavaScript%20Library)&amp;severity=null&amp;id=686796cc6f40f0eb729fa5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53568-cwe-352-cross-site-request-forgery--ed095d1e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53568%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tony%20Zeoli%20Radio%20Station&amp;severity=null&amp;id=686796cc6f40f0eb729fa59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53566-cwe-79-improper-neutralization-of-i-aa26f5c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=null&amp;id=686796cc6f40f0eb729fa59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9453-insertion-of-sensitive-information-i-e4f31e2e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9453%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Jenkins%20openshift-sync-plugin&amp;severity=medium&amp;id=691f82024f1c50aa2eb5aeab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5351-double-free-in-red-hat-red-hat-enter-63a66338</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5351%3A%20Double%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=686793516f40f0eb729f9d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32918-cwe-140-improper-neutralization-of--b1e8a3cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32918%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=68678fbd6f40f0eb729f93e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6673-cwe-79-improper-neutralization-of-in-1506eafd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6673%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nikelschubert%20Easy%20restaurant%20menu%20manager&amp;severity=medium&amp;id=686781ad6f40f0eb729f7b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11937-cwe-79-improper-neutralization-of-i-07dd80bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor%20%E2%80%93%20Powerful%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=699f6e28b7ef31ef0b596ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53600-cwe-346-origin-validation-error-in--5d2fd104</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53600%3A%20CWE-346%20Origin%20Validation%20Error%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=686781ad6f40f0eb729f7b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53599-cwe-79-improper-neutralization-of-i-c6201c91</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53599%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=critical&amp;id=686781ad6f40f0eb729f7b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5372-incorrect-calculation-in-red-hat-red-5a5611b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5372%3A%20Incorrect%20Calculation%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=686770196f40f0eb729f595d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6944-cwe-79-improper-neutralization-of-in-417a3c83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6944%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20undsgn%20Uncode%20Core&amp;severity=medium&amp;id=686769146f40f0eb729f45ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5567-cwe-79-improper-neutralization-of-in-5969a20a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5567%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7053-cross-site-scripting-in-cockpit-1a28934f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7053%3A%20Cross%20Site%20Scripting%20in%20Cockpit&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6039-cwe-79-improper-neutralization-of-in-01c4b577</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cageehv%20ProcessingJS%20for%20WordPress&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6782-cwe-89-improper-neutralization-of-sp-e556141d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6782%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20optinlyhq%20GoZen%20Forms&amp;severity=high&amp;id=68673b5e6f40f0eb729e5fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5924-cwe-352-cross-site-request-forgery-c-639bb62a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20skywaveinfo%20WP%20Firebase%20Push%20Notification&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6783-cwe-89-improper-neutralization-of-sp-92f77b07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6783%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20optinlyhq%20GoZen%20Forms&amp;severity=high&amp;id=68673b5e6f40f0eb729e5fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6787-cwe-79-improper-neutralization-of-in-8e6c3f61</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ibachal%20Smart%20Docs&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6814-cwe-862-missing-authorization-in-dun-235220b7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6814%3A%20CWE-862%20Missing%20Authorization%20in%20dunskii%20Booking%20X%20%E2%80%93%20Appointment%20and%20Reservation%20Availability%20Calendar&amp;severity=high&amp;id=68673b5e6f40f0eb729e5fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5953-cwe-862-missing-authorization-in-asa-1786a1c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5953%3A%20CWE-862%20Missing%20Authorization%20in%20asaquzzaman%20WP%20Human%20Resource%20Management&amp;severity=high&amp;id=68673b5e6f40f0eb729e5f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6586-cwe-434-unrestricted-upload-of-file--b6c2ad7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6586%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20metagauss%20Download%20Plugin&amp;severity=high&amp;id=68673b5e6f40f0eb729e5fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6729-cwe-918-server-side-request-forgery--d0eaef37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6729%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20qazomardok%20PayMaster%20for%20WooCommerce&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5956-cwe-862-missing-authorization-in-asa-8f2cfb06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5956%3A%20CWE-862%20Missing%20Authorization%20in%20asaquzzaman%20WP%20Human%20Resource%20Management&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6238-cwe-601-url-redirection-to-untrusted-98a8e013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6238%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20tigroumeow%20AI%20Engine&amp;severity=high&amp;id=68673b5e6f40f0eb729e5fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6041-cwe-352-cross-site-request-forgery-c-5cdef3bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6041%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonisink%20yContributors&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6739-cwe-89-improper-neutralization-of-sp-b6b5b652</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6739%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bauc%20WPQuiz&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7046-cwe-79-improper-neutralization-of-in-309fc0f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7046%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dotrex%20PowerFolio%20%E2%80%93%20Portfolio%20%26%20Image%20Gallery%20for%20Elementor&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5933-cwe-352-cross-site-request-forgery-c-e482e44e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5933%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20richarddev7%20RD%20Contacto&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6786-cwe-284-improper-access-control-in-a-d9b326a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6786%3A%20CWE-284%20Improper%20Access%20Control%20in%20antwerpes%20DocCheck%20Login&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-group-houken-hit-french-organizations-76261648</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20group%20Houken%20hit%20French%20organizations%20using%20zero-days&amp;severity=medium&amp;id=68671f446f40f0eb729e2b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-04-3185b367</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-04&amp;severity=medium&amp;id=68686d2e6f40f0eb72a41214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43711-cwe-459-incomplete-cleanup-in-tunne-e9371c8c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43711%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Tunnelblick%20Project%20Tunnelblick&amp;severity=high&amp;id=686869b46f40f0eb72a40bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26850-cwe-863-incorrect-authorization-in--7bb6ab75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26850%3A%20CWE-863%20Incorrect%20Authorization%20in%20Quest%20KACE%20Systems%20Management%20Appliance&amp;severity=critical&amp;id=686862ac6f40f0eb72a3fa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53602-cwe-1188-initialization-of-a-resour-ca5f8f3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53602%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Open%20Zipkin%20Zipkin&amp;severity=medium&amp;id=686843086f40f0eb72a39502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49600-cwe-325-missing-cryptographic-step--67177ca0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49600%3A%20CWE-325%20Missing%20Cryptographic%20Step%20in%20Mbed%20mbedtls&amp;severity=medium&amp;id=6867eea86f40f0eb72a12684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49601-cwe-125-out-of-bounds-read-in-mbed--0eea0732</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49601%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Mbed%20mbedtls&amp;severity=medium&amp;id=6867eea86f40f0eb72a12681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52497-cwe-193-off-by-one-error-in-mbed-mb-0e3bc984</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52497%3A%20CWE-193%20Off-by-one%20Error%20in%20Mbed%20mbedtls&amp;severity=medium&amp;id=6867eb246f40f0eb72a120bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52496-na-f24872aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52496%3A%20CWE-733%20Compiler%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Mbed%20mbedtls&amp;severity=high&amp;id=6867eb246f40f0eb72a120b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5322-cwe-434-unrestricted-upload-of-file--77989700</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5322%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20e4jvikwp%20VikRentCar%20Car%20Rental%20Management%20System&amp;severity=high&amp;id=6866f8926f40f0eb729c92bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53367-cwe-787-out-of-bounds-write-in-djvu-b11f10f8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53367%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20DjvuNet%20DjVuLibre&amp;severity=high&amp;id=6866f50d6f40f0eb729c68ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49826-cwe-444-inconsistent-interpretation-f90ac4f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49826%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20vercel%20next.js&amp;severity=high&amp;id=6866f50d6f40f0eb729c68b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49005-cwe-444-inconsistent-interpretation-7f9a1edb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49005%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20vercel%20next.js&amp;severity=low&amp;id=6866f1946f40f0eb729c3cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52554-cwe-862-missing-authorization-in-n8-200a18ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52554%3A%20CWE-862%3A%20Missing%20Authorization%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=6866e7016f40f0eb729bb598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53369-cwe-79-improper-neutralization-of-i-e8c25cc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53369%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-extensions-ShortDescription&amp;severity=high&amp;id=6866e37a6f40f0eb729b8c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34089-cwe-306-missing-authentication-for--92dbb79c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34089%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Aexol%20Studio%20Remote%20for%20Mac&amp;severity=critical&amp;id=6866dff66f40f0eb729b625a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34087-cwe-78-improper-neutralization-of-s-ff81cf6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34087%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Pi-hole%20LLC%20Web&amp;severity=critical&amp;id=6866dff66f40f0eb729b624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34088-cwe-78-improper-neutralization-of-s-83126801</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34088%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Artica%20ST%20Pandora%20FMS&amp;severity=high&amp;id=6866dff66f40f0eb729b6253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34082-cwe-78-improper-neutralization-of-s-aa2b5c46</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34082%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IGEL%20Technology%20GmbH%20OS&amp;severity=critical&amp;id=6866dff66f40f0eb729b623e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34086-cwe-94-improper-control-of-generati-5c1a1644</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34086%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Bolt%20CMS&amp;severity=high&amp;id=6866dff66f40f0eb729b6244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34061-cwe-94-improper-control-of-generati-e2be5f6f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34061%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Henan%20Xiaopi%20Security%20Technology%20Co.%2C%20Ltd.%20PHPStudy&amp;severity=critical&amp;id=6866dff66f40f0eb729b623a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53370-cwe-79-improper-neutralization-of-i-6dcd7274</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53370%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=high&amp;id=6866dff66f40f0eb729b6261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53368-cwe-79-improper-neutralization-of-i-9f320a50</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53368%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=high&amp;id=6866dc736f40f0eb729b38df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23968-cwe-434-unrestricted-upload-of-file-e1138ad6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23968%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WebFactory%20AiBud%20WP&amp;severity=null&amp;id=6866d1e86f40f0eb729ab73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/instagram-uses-expiring-certificates-as-single-day-5c5f6ed7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Instagram%20uses%20expiring%20certificates%20as%20single%20day%20TLS%20certificates&amp;severity=medium&amp;id=6866ce686f40f0eb729a8da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/idealab-confirms-data-stolen-in-ransomware-attack--d812a7ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IdeaLab%20confirms%20data%20stolen%20in%20ransomware%20attack%20last%20year&amp;severity=high&amp;id=6866cae06f40f0eb729a643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-android-fraud-operations-uncovered-iconads-e0f7a7ba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Android%20Fraud%20Operations%20Uncovered%3A%20IconAds%2C%20Kaleidoscope%2C%20SMS%20Malware%2C%20NFC%20Scams&amp;severity=high&amp;id=6866cae06f40f0eb729a6440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fake-marketplace-from-china-mimics-top-retail--65e6d132</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fake%20Marketplace%20From%20China%20Mimics%20Top%20Retail%20Brands%20for%20Phishing%20Scams&amp;severity=medium&amp;id=6866c3d66f40f0eb729a0f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6071-cwe-321-use-of-hard-coded-cryptograp-75590c18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6071%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ABB%20RMC-100&amp;severity=medium&amp;id=6866b94b6f40f0eb7299875a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6072-cwe-121-stack-based-buffer-overflow--80efd0b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6072%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ABB%20RMC-100&amp;severity=high&amp;id=6866b5c76f40f0eb72995da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6073-cwe-121-stack-based-buffer-overflow--d695f371</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6073%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ABB%20RMC-100&amp;severity=high&amp;id=6866b5c76f40f0eb72995da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6074-cwe-321-use-of-hard-coded-cryptograp-4d9e4631</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6074%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ABB%20RMC-100&amp;severity=medium&amp;id=6866b5c76f40f0eb72995daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49846-cwe-117-improper-output-neutralizat-8b4879d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49846%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20wireapp%20wire-ios&amp;severity=medium&amp;id=6866b5c76f40f0eb72995dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48939-cwe-138-improper-neutralization-of--832990f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48939%3A%20CWE-138%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20AmauriC%20tarteaucitron.js&amp;severity=medium&amp;id=6866b2446f40f0eb7299335a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6926-cwe-287-improper-authentication-in-w-b6055b33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6926%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20CentralAuth%20Extension&amp;severity=high&amp;id=6866b2446f40f0eb72993362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53500-cwe-79-improper-neutralization-of-i-24ef9dff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20MassEditRegex%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb7299335e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53501-cwe-284-improper-access-control-in--f3be80f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53501%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Scribunto%20Extension&amp;severity=high&amp;id=6866aebf6f40f0eb72990a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53502-cwe-20-improper-input-validation-in-2b1865c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53502%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20FeaturedFeeds%20Extension&amp;severity=medium&amp;id=6866aebf6f40f0eb72990a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53489-cwe-79-improper-neutralization-of-i-279e34fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20GoogleDocs4MW%20Extension&amp;severity=medium&amp;id=6866aebf6f40f0eb72990a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53490-cwe-79-improper-neutralization-of-i-fa933ca0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20CampaignEvents%20Extension&amp;severity=medium&amp;id=6866ab3b6f40f0eb7298e169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/applocker-bypass-on-lenovo-machines-the-curious-ca-8bab2451</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Applocker%20bypass%20on%20Lenovo%20machines%20%E2%80%93%20The%20curious%20case%20of%20MFGSTAT.zip&amp;severity=medium&amp;id=686692a56f40f0eb7297b6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5961-cwe-434-unrestricted-upload-of-file--c9f02d01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5961%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpvividplugins%20WPvivid%20%E2%80%94%20Backup%2C%20Migration%20%26%20Staging&amp;severity=high&amp;id=68668b996f40f0eb72975191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hunters-international-ransomware-shuts-down-releas-ac56a8c8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hunters%20International%20ransomware%20shuts%20down%2C%20releases%20free%20decryptors&amp;severity=high&amp;id=6866810c6f40f0eb7296a558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/surveillance-used-by-a-drug-cartel-schneier-on-sec-492a873f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Surveillance%20Used%20by%20a%20Drug%20Cartel%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6866810c6f40f0eb7296a560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2932-cwe-22-improper-limitation-of-a-path-c71cb1dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2932%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jkdevstudio%20JKDEVKIT&amp;severity=high&amp;id=68667a046f40f0eb72967139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2537-cwe-79-improper-neutralization-of-in-3f50f812</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20YouTube%20Embed%2C%20Playlist%20and%20Popup%20by%20WpDevArt&amp;severity=medium&amp;id=68667a046f40f0eb72967132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49595-cwe-400-uncontrolled-resource-consu-6777e835</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49595%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=68667a046f40f0eb7296713d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3702-cwe-862-missing-authorization-in-mel-37b26256</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3702%3A%20Missing%20Authorization%20in%20Melapress%20Melapress%20File%20Monitor&amp;severity=null&amp;id=6866767e6f40f0eb729669ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49032-cwe-79-improper-neutralization-of-i-debeb3ec</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PublishPress%20Gutenberg%20Blocks&amp;severity=null&amp;id=6866767e6f40f0eb729669f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40723-cwe-79-improper-neutralization-of-i-55d522d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40723%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flatboard%20Pro%20Flatboard&amp;severity=medium&amp;id=68666f776f40f0eb729659d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40722-cwe-79-improper-neutralization-of-i-f2735a80</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flatboard%20Pro%20Flatboard&amp;severity=medium&amp;id=68666f776f40f0eb729659d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27461-cwe-862-missing-authorization-in-en-a6d70f5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27461%3A%20CWE-862%20Missing%20Authorization%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finnish-hacker-harri-hursti-hacks-us-voting-machin-97762f25</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finnish%20hacker%20Harri%20Hursti%20hacks%20U.S.%20voting%20machine%20on%20live%20podcast&amp;severity=medium&amp;id=68666bf86f40f0eb72964d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27460-cwe-312-cleartext-storage-of-sensit-7060e7f5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27460%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27459-cwe-257-storing-passwords-in-a-reco-89292282</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27459%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27458-cwe-327-use-of-a-broken-or-risky-cr-d0fc2619</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27458%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27457-cwe-319-cleartext-transmission-of-s-22f8a9d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27457%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27456-cwe-307-improper-restriction-of-exc-3ea7f876</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27456%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27455-cwe-1021-improper-restriction-of-re-cce87d80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27455%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27454-cwe-352-cross-site-request-forgery--17e20962</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27454%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27453-cwe-1004-sensitive-cookie-without-h-bc121616</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27453%3A%20CWE-1004%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27452-cwe-548-exposure-of-information-thr-14143bbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27452%3A%20CWE-548%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27451-cwe-204-observable-response-discrep-ab1e3764</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27451%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27450-cwe-614-sensitive-cookie-in-https-s-599efd48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27450%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27449-cwe-307-improper-restriction-of-exc-37f36257</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27449%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27448-cwe-79-improper-neutralization-of-i-8bbb4534</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27447-cwe-79-improper-neutralization-of-i-024b5099</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27447%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1711-cwe-1392-use-of-default-credentials--0fffaa1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1711%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1710-cwe-307-improper-restriction-of-exce-51327d77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1710%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1709-cwe-256-plaintext-storage-of-a-passw-b74d93b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1709%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2540-cwe-79-improper-neutralization-of-in-7aefe177</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nayon46%20Awesome%20Wp%20Image%20Gallery&amp;severity=medium&amp;id=68666bf36f40f0eb72964d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6563-cwe-20-improper-input-validation-in--db1b6ac5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6563%3A%20CWE-20%20Improper%20Input%20Validation%20in%20MikroTik%20RouterOS&amp;severity=medium&amp;id=6866686e6f40f0eb7296466b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1708-cwe-89-improper-neutralization-of-sp-e8067e47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1708%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=6866686e6f40f0eb72964663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n-korean-hackers-drop-nimdoor-macos-malware-via-fa-b44e00e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=N%20Korean%20Hackers%20Drop%20NimDoor%20macOS%20Malware%20Via%20Fake%20Zoom%20Updates&amp;severity=medium&amp;id=686664ea6f40f0eb72963ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6587-cwe-532-insertion-of-sensitive-infor-fd042892</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6587%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Docker%20Docker%20Desktop&amp;severity=medium&amp;id=686656db6f40f0eb7296200d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0885-cwe-863-incorrect-authorization-in-o-e02bd61f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0885%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenText%E2%84%A2%20GroupWise&amp;severity=low&amp;id=686656db6f40f0eb72962010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-users-urged-to-patch-critical-sudo-cve-91c9d25f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20Users%20Urged%20to%20Patch%20Critical%20Sudo%20CVE&amp;severity=critical&amp;id=68664fd26f40f0eb72960db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5647-cwe-79-improper-neutralization-of-in-c3296686</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blossomthemes%20BlossomThemes%20Social%20Feed&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-houken-group-breaches-top-french-syst-4e11372d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Linked%20Houken%20Group%20Breaches%20Top%20French%20Systems%20with%20Ivanti%20Zero%20Days&amp;severity=high&amp;id=686641c16f40f0eb7295ea25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-coinbases-400m-problem-started-in-an-indian-ca-6ecf0255</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Coinbase&apos;s%20%24400M%20Problem%20Started%20in%20an%20Indian%20Call%20Center&amp;severity=high&amp;id=68663e426f40f0eb7295bf72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9017-cwe-79-improper-neutralization-of-in-14912dfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9017%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PeepSo%20PeepSo%20Core%3A%20Groups&amp;severity=medium&amp;id=699f6b3cb7ef31ef0b54f97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5944-cwe-79-improper-neutralization-of-in-3f7c2899</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5944%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=686609826f40f0eb7295299d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-03-6e779507</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-03&amp;severity=medium&amp;id=68671bae6f40f0eb729e1a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45809-na-5867de01</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45809%3A%20n%2Fa&amp;severity=medium&amp;id=6866d1e86f40f0eb729ab742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45938-na-5d0210d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45938%3A%20n%2Fa&amp;severity=high&amp;id=686696236f40f0eb7297e394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43713-na-e9f0d502</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43713%3A%20n%2Fa&amp;severity=medium&amp;id=68668b996f40f0eb7297518d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50263-na-6e991ce7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50263%3A%20n%2Fa&amp;severity=high&amp;id=686688156f40f0eb729702f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50262-na-bb3206df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50262%3A%20n%2Fa&amp;severity=high&amp;id=686688156f40f0eb729702f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50260-na-702121b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50260%3A%20n%2Fa&amp;severity=high&amp;id=686688156f40f0eb729702ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50258-na-02d98f93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50258%3A%20n%2Fa&amp;severity=high&amp;id=686684936f40f0eb7296d978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49618-na-fc17f159</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49618%3A%20CWE-402%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20Plesk%20Obsidian&amp;severity=medium&amp;id=68667a046f40f0eb72967142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-that-unified-cm-has-hardcoded-root-ssh-75d179a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20that%20Unified%20CM%20has%20hardcoded%20root%20SSH%20credentials&amp;severity=high&amp;id=686599016f40f0eb7293d1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spain-arrests-hackers-who-targeted-politicians-and-e3f616e7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spain%20arrests%20hackers%20who%20targeted%20politicians%20and%20journalists&amp;severity=high&amp;id=6865957e6f40f0eb7293cafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43025-cwe-121-stack-based-buffer-overflow-cb3f8e3c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43025%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20HP%20Inc.%20Universal%20Print%20Driver&amp;severity=medium&amp;id=68658e746f40f0eb7293c06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gitphish-automating-enterprise-github-device-code--aaa883cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitPhish%3A%20Automating%20Enterprise%20GitHub%20Device%20Code%20Phishing&amp;severity=medium&amp;id=68658af86f40f0eb7293bb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34076-cwe-22-improper-limitation-of-a-pat-77ac7e06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34076%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microweber%20Ltd.%20CMS&amp;severity=medium&amp;id=68658af26f40f0eb7293bb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34074-cwe-94-improper-control-of-generati-67cb256b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34074%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Lucee%20Association%20Switzerland%20Lucee&amp;severity=critical&amp;id=68658af26f40f0eb7293bb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34075-cwe-276-incorrect-default-permissio-ac8634a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34075&amp;severity=null&amp;id=68658af26f40f0eb7293bb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34092-cwe-287-improper-authentication-in--033dccfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34092&amp;severity=null&amp;id=68658af26f40f0eb7293bb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34091-cwe-203-observable-discrepancy-in-g-c91d5921</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34091&amp;severity=null&amp;id=68658af26f40f0eb7293bb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34090-cwe-426-untrusted-search-path-in-go-a2cc4133</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34090&amp;severity=null&amp;id=68658af26f40f0eb7293bb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49713-cwe-843-access-of-resource-using-in-2268a784</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49713%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=6865b5226f40f0eb72940aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20309-use-of-hard-coded-credentials-in-ci-1eaa1647</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20309%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager&amp;severity=critical&amp;id=686564476f40f0eb72933799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20307-improper-neutralization-of-input-du-75885c46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20BroadWorks&amp;severity=medium&amp;id=68655d3f6f40f0eb729329e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20310-improper-neutralization-of-input-du-d39f06aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20310%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20Chat%20and%20Email&amp;severity=medium&amp;id=68655d3f6f40f0eb729329ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20308-improper-neutralization-of-special--5e5f9075</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20308%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20DNA%20Spaces%20Connector&amp;severity=medium&amp;id=68655d3f6f40f0eb729329e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53359-cwe-754-improper-check-for-unusual--c252c774</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53359%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20rust-ethereum%20ethereum&amp;severity=medium&amp;id=686559bb6f40f0eb7293234a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6942-cwe-639-authorization-bypass-through-1daf1bb1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6942%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Delinea%20Secret%20Server&amp;severity=low&amp;id=686559bb6f40f0eb7293234f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6943-cwe-269-improper-privilege-managemen-4be397ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6943%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Delinea%20Secret%20Server&amp;severity=low&amp;id=686556376f40f0eb72931bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53358-cwe-22-improper-limitation-of-a-pat-347219f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53358%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cinnamon%20kotaemon&amp;severity=medium&amp;id=686556376f40f0eb72931bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qantas-confirms-major-data-breach-linked-to-third--6410db0e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qantas%20Confirms%20Major%20Data%20Breach%20Linked%20to%20Third-Party%20Vendor&amp;severity=high&amp;id=686552b26f40f0eb72930f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dcrat-impersonating-the-colombian-government-3f409be2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DCRAT%20Impersonating%20the%20Colombian%20Government&amp;severity=medium&amp;id=68655d3e6f40f0eb729329c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52891-cwe-20-improper-input-validation-in-26cf4615</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52891%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20owasp-modsecurity%20ModSecurity&amp;severity=medium&amp;id=68654baa6f40f0eb729301fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53108-cwe-862-missing-authorization-in-sy-f54aa66b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53108%3A%20CWE-862%3A%20Missing%20Authorization%20in%20sysadminsmedia%20homebox&amp;severity=medium&amp;id=686548286f40f0eb7292fbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53492-cwe-79-improper-neutralization-of-i-0aae481d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53492%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20MintyDocs%20Extension&amp;severity=low&amp;id=686548286f40f0eb7292fbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6725-cwe-79-improper-neutralization-of-in-ff31e695</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Kendo%20UI%20for%20jQuery&amp;severity=medium&amp;id=686548286f40f0eb7292fbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53493-cwe-79-improper-neutralization-of-i-417d18c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53493%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20MintyDocs%20Extension&amp;severity=medium&amp;id=686548286f40f0eb7292fbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53109-cwe-59-improper-link-resolution-bef-9d2ec939</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53109%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=high&amp;id=686544a26f40f0eb7292f606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53110-cwe-22-improper-limitation-of-a-pat-56a12e4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53110%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=high&amp;id=686544a26f40f0eb7292f60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53494-cwe-79-improper-neutralization-of-i-873faefc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53494%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20TwoColConflict%20Extension&amp;severity=medium&amp;id=686544a26f40f0eb7292f60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/azure-api-vulnerability-and-built-in-roles-misconf-fd53c7ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Azure%20API%20vulnerability%20and%20built-in%20roles%20misconfiguration%20enable%20corporate%20network%20takeover&amp;severity=medium&amp;id=68653da06f40f0eb7292e3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34073-cwe-78-improper-neutralization-of-s-a9bd4e39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34073%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Stamparm%20Maltrail&amp;severity=critical&amp;id=68653a166f40f0eb7292c95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34072-cwe-200-exposure-of-sensitive-infor-032fa7a5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34072%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Anthropic%20Slack%20MCP%20Server&amp;severity=critical&amp;id=68653a166f40f0eb7292c959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34071-cwe-306-missing-authentication-for--6351caa6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34071%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GFI%20Software%20Kerio%20Control&amp;severity=critical&amp;id=68653a166f40f0eb7292c955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34070-cwe-306-missing-authentication-for--0a8fd170</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34070%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GFI%20Software%20Kerio%20Control&amp;severity=critical&amp;id=68653a166f40f0eb7292c951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34069-cwe-306-missing-authentication-for--c5e2ad7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34069%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GFI%20Software%20Kerio%20Control&amp;severity=critical&amp;id=68653a166f40f0eb7292c94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34067-cwe-502-deserialization-of-untruste-475dc43e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34067%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hikvision%20Integrated%20Security%20Management%20Platform&amp;severity=critical&amp;id=68653a166f40f0eb7292c948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34057-cwe-200-exposure-of-sensitive-infor-77de50a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34057%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Ruijie%20NBR%20Router&amp;severity=high&amp;id=68653a166f40f0eb7292c943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27026-cwe-1220-insufficient-granularity-o-c185744f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27026%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Infinera%20G42&amp;severity=medium&amp;id=68653a166f40f0eb7292c93f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53106-cwe-285-improper-authorization-in-g-20c4b6ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53106%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Graylog2%20graylog2-server&amp;severity=high&amp;id=686536926f40f0eb7292bf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blind-eagle-linked-to-russian-host-proton66-in-lat-fe00a7d5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blind%20Eagle%20Linked%20to%20Russian%20Host%20Proton66%20in%20Latin%20America%20Attacks&amp;severity=medium&amp;id=68652c066f40f0eb7292a8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/schizophrenic-zip-files-different-contents-dependi-68ad784e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22schizophrenic%22%20zip%20files.%20Different%20contents%20depending%20on%20your%20archive%20reader.&amp;severity=medium&amp;id=686528876f40f0eb7292a3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-russian-bulletproof-hosting-provider--06c9c1c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%20Russian%20Bulletproof%20Hosting%20Provider%20for%20Supporting%20Cybercriminals%20Behind%20Ransomware&amp;severity=high&amp;id=686521796f40f0eb72928b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35164-cwe-129-improper-validation-of-arra-0de7912e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35164%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Apache%20Software%20Foundation%20Apache%20Guacamole&amp;severity=medium&amp;id=690a6f039e609817bf702c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46647-cwe-302-authentication-bypass-by-as-399ded76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46647%3A%20CWE-302%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=medium&amp;id=686516ee6f40f0eb72926ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/verizon-and-t-mobile-deny-data-breaches-as-million-32b95ba6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Verizon%20and%20T-Mobile%20Deny%20Data%20Breaches%20as%20Millions%20of%20User%20Records%20Sold%20Online&amp;severity=medium&amp;id=686513696f40f0eb729268b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39362-cwe-862-missing-authorization-in-mo-4cb172d7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39362%3A%20Missing%20Authorization%20in%20Mollie%20Mollie%20Payments%20for%20WooCommerce&amp;severity=null&amp;id=686513796f40f0eb729268da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27025-cwe-280-improper-handling-of-insuff-585f5fc2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27025%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Infinera%20G42&amp;severity=high&amp;id=686505596f40f0eb72924fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27024-cwe-274-improper-handling-of-insuff-d69902b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27024%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Infinera%20G42&amp;severity=medium&amp;id=686501d56f40f0eb7292445a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2330-cwe-79-improper-neutralization-of-in-14c468f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2330%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shamsbd71%20All-in-One%20Addons%20for%20Elementor%20%E2%80%93%20WidgetKit&amp;severity=medium&amp;id=6864fe536f40f0eb72923f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4946-cwe-22-improper-limitation-of-a-path-c12c2799</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4946%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Odin_Design%20Vikinger&amp;severity=high&amp;id=6864fe536f40f0eb72923f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27023-cwe-20-improper-input-validation-in-80293b28</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27023%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Infinera%20G42&amp;severity=medium&amp;id=6864fad36f40f0eb72923030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27022-vulnerability-in-infinera-g42-3c26284d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27022%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Infinera%20G42&amp;severity=high&amp;id=6864f74a6f40f0eb729229ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qantas-discloses-cyberattack-amid-scattered-spider-667a35e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qantas%20discloses%20cyberattack%20amid%20Scattered%20Spider%20aviation%20breaches&amp;severity=high&amp;id=6864f3c56f40f0eb72921eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27021-vulnerability-in-infinera-g42-0bfbb11a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27021%3A%20Vulnerability%20in%20Infinera%20G42&amp;severity=high&amp;id=6864f3d76f40f0eb72921eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24335-vulnerability-in-nokia-nokia-single-47a28609</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24335%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=low&amp;id=6864f0416f40f0eb729218b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24334-vulnerability-in-nokia-nokia-single-01e00d81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24334%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=low&amp;id=6864f0416f40f0eb729218b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24333-vulnerability-in-nokia-nokia-single-551633e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24333%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=medium&amp;id=6864f0416f40f0eb729218b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24332-vulnerability-in-nokia-nokia-single-a33105b5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24332%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN%20AirScale%20(Flexi%20Multiradio%20is%20not%20affected)&amp;severity=high&amp;id=6864f0416f40f0eb729218af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24331-vulnerability-in-nokia-nokia-single-f1b366a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24331%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=medium&amp;id=6864f0416f40f0eb729218ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24330-vulnerability-in-nokia-nokia-single-cfc610ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24330%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=medium&amp;id=6864f0416f40f0eb729218a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24329-vulnerability-in-nokia-nokia-single-6c6517e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24329%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=medium&amp;id=6864f0416f40f0eb729218a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24328-vulnerability-in-nokia-nokia-single-9c62c669</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24328%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=medium&amp;id=6864e5b56f40f0eb72920451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-warns-critical-chrome-flaw-letting-hackers--5332c6ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Warns%3A%20Critical%20Chrome%20Flaw%20Letting%20Hackers%20Take%20Over%20PCs%20Is%20Already%20Being%20Exploited&amp;severity=critical&amp;id=6864deb76f40f0eb7291e925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-threat-case-of-kimsuky-group-using-ed55dcc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20threat%20case%20of%20kimsuky%20group%20using%20&apos;ClickFix&apos;%20tactic&amp;severity=medium&amp;id=6864e2316f40f0eb7291f913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-encrypted-an-excel-file-into-a-wav-no-aes-no-cip-e2f2f687</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20encrypted%20an%20Excel%20file%20into%20a%20.wav%20%E2%80%94%20no%20AES%2C%20no%20ciphertext%2C%20no%20memory%20traces.&amp;severity=high&amp;id=6864deb76f40f0eb7291e929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/devman-ransomware-analysis-of-new-dragonforce-vari-fff3d9f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DEVMAN%20Ransomware%3A%20Analysis%20of%20New%20DragonForce%20Variant&amp;severity=medium&amp;id=6864deb26f40f0eb7291e877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pakistani-freelancers-building-cracking-websites-f-ab88008e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pakistani%20freelancers%20building%20cracking%20websites%20for%20stealer-delivery&amp;severity=medium&amp;id=6864deb26f40f0eb7291e87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dire-wolf-strikes-new-ransomware-group-targeting-g-3127f34b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dire%20Wolf%20Strikes%3A%20New%20Ransomware%20Group%20Targeting%20Global%20Sectors&amp;severity=medium&amp;id=6864deb26f40f0eb7291e90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13786-cwe-502-deserialization-of-untruste-33c4921d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13786%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Education%20Center%20%7C%20LMS%20%26%20Online%20Courses%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e6fb7ef31ef0b5a093e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6017-exposure-of-private-personal-informa-d5b0c2cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6017%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=6864d7a66f40f0eb7291c1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13451-cwe-200-exposure-of-sensitive-infor-ac4f6206</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13451%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bitpressadmin%20Bit%20Form%20%E2%80%93%20Custom%20Contact%20Form%2C%20Multi%20Step%2C%20Conversational%20Form%20%26%20Payment%20Form%20builder&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59ea0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6464-cwe-502-deserialization-of-untrusted-0db8fda1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6464%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=6864c9966f40f0eb7291a3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52463-cross-site-request-forgery-csrf-in--43bc583b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52463%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20QUALITIA%20CO.%2C%20LTD.%20Active!%20mail%206&amp;severity=low&amp;id=6864bf186f40f0eb72918bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52462-cross-site-scripting-xss-in-qualiti-a46aff97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52462%3A%20Cross-site%20scripting%20(XSS)%20in%20QUALITIA%20CO.%2C%20LTD.%20Active!%20mail%206&amp;severity=medium&amp;id=6864bf186f40f0eb72918bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6463-cwe-73-external-control-of-file-name-ca627c71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6463%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=6864b8046f40f0eb72917e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11405-cwe-79-improper-neutralization-of-i-8e2faa78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hellomohsinkhan%20WP%20Front-end%20login%20and%20register&amp;severity=medium&amp;id=699f6e12b7ef31ef0b594a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5339-cwe-89-improper-neutralization-of-sp-9a6cc5db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5339%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6864b0fa6f40f0eb72917188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3848-cwe-639-authorization-bypass-through-a4519531</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3848&amp;severity=null&amp;id=6864b0fa6f40f0eb72917170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5014-cwe-22-improper-limitation-of-a-path-1d97d9a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5014%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Chimp%20Group%20Home%20Villas%20%7C%20Real%20Estate%20WordPress%20Theme&amp;severity=high&amp;id=6864b0fa6f40f0eb72917184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6437-cwe-89-improper-neutralization-of-sp-34507a75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6437%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6864b0fa6f40f0eb72917194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5817-cwe-918-server-side-request-forgery--6d9186be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5817%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20suhailahmad64%20Amazon%20Products%20to%20WooCommerce&amp;severity=high&amp;id=6864b0fa6f40f0eb72917190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4654-cwe-285-improper-authorization-in-so-cd1c97ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4654%3A%20CWE-285%20Improper%20Authorization%20in%20soumettre%20Soumettre.fr&amp;severity=low&amp;id=6864b0fa6f40f0eb7291717c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6686-cwe-79-improper-neutralization-of-in-a7df0e3e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6686%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rexdot%20Magic%20Buttons%20for%20Elementor&amp;severity=medium&amp;id=6864b0fa6f40f0eb729171a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5746-cwe-434-unrestricted-upload-of-file--3bf66bd0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5746%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodeDropz%20Drag%20and%20Drop%20Multiple%20File%20Upload%20(Pro)%20-%20WooCommerce&amp;severity=critical&amp;id=6864b0fa6f40f0eb7291718c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4380-cwe-98-improper-control-of-filename--1386923b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4380%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6864b0fa6f40f0eb72917174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6687-cwe-79-improper-neutralization-of-in-b75c0fa1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rexdot%20Magic%20Buttons%20for%20Elementor&amp;severity=medium&amp;id=6864b0fa6f40f0eb729171aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6459-cwe-352-cross-site-request-forgery-c-d3e72276</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6459%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6864b0fa6f40f0eb729171a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4381-cwe-89-improper-neutralization-of-sp-3520b6ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4381%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6864b0fa6f40f0eb72917178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4689-cwe-98-improper-control-of-filename--9a41e4ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4689%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=critical&amp;id=6864b0fa6f40f0eb72917180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5692-cwe-862-missing-authorization-in-sma-b9a402aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5692%3A%20CWE-862%20Missing%20Authorization%20in%20smackcoders%20Lead%20Form%20Data%20Collection%20to%20CRM&amp;severity=medium&amp;id=68649be16f40f0eb729133b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-rce-in-anthropic-mcp-inspector-cve-2025-4-d319eeba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20RCE%20in%20Anthropic%20MCP%20Inspector%20(CVE-2025-49596)%20Enables%20Browser-Based%20Exploits%20%7C%20Oligo%20Security&amp;severity=critical&amp;id=68647c456f40f0eb7290f1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-02-a03910e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-02&amp;severity=medium&amp;id=6865ca2e6f40f0eb7294436e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45813-na-4dd3d50a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45813%3A%20n%2Fa&amp;severity=critical&amp;id=68656b616f40f0eb72934467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45814-na-7ae9ef76</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45814%3A%20n%2Fa&amp;severity=critical&amp;id=686567ca6f40f0eb72933c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45424-na-f5d241ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45424%3A%20n%2Fa&amp;severity=medium&amp;id=686560c36f40f0eb72932f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wing-ftp-server-743-unauthenticated-remote-code-ex-bd3169d1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wing%20FTP%20Server%207.4.3%20-%20Unauthenticated%20Remote%20Code%20Execution%20%20(RCE)&amp;severity=critical&amp;id=68653a7e6f40f0eb7292de06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gogs-0130-remote-code-execution-rce-3316daa1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=gogs%200.13.0%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68653a7e6f40f0eb7292de01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-sharepoint-2019-ntlm-authentication-ccfa1318</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20SharePoint%202019%20-%20NTLM%20Authentication&amp;severity=medium&amp;id=68653a7e6f40f0eb7292ddfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/moodle-440-authenticated-remote-code-execution-c7bf16f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Moodle%204.4.0%20-%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=68653a7e6f40f0eb7292ddf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45029-na-acde60b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45029%3A%20n%2Fa&amp;severity=medium&amp;id=68653a166f40f0eb7292c964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52925-cwe-402-transmission-of-private-res-64c4d984</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52925%3A%20CWE-402%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20OneLogin%20Active%20Directory%20Connector&amp;severity=medium&amp;id=6864a9ff6f40f0eb729165b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36630-cwe-269-improper-privilege-manageme-915752f2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36630%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tenable%20Nessus&amp;severity=high&amp;id=68646e2d6f40f0eb7290c91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49741-information-disclosure-in-microsoft-fa1ed6d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49741%3A%20CWE-268%3A%20Privilege%20Chaining%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=686463a26f40f0eb7290b55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kelly-benefits-says-2024-data-breach-impacts-55000-21f9a05b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kelly%20Benefits%20says%202024%20data%20breach%20impacts%20550%2C000%20customers&amp;severity=high&amp;id=686447806f40f0eb72907f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-in-anthropics-mcp-exposes-d-24443e78</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20in%20Anthropic&apos;s%20MCP%20Exposes%20Developer%20Machines%20to%20Remote%20Exploits&amp;severity=critical&amp;id=686447806f40f0eb72907f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46259-cwe-862-missing-authorization-in-po-9cba0e10</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46259%3A%20CWE-862%20Missing%20Authorization%20in%20POSIMYTH%20Innovation%20The%20Plus%20Addons%20for%20Elementor%20Pro&amp;severity=medium&amp;id=686435ee6f40f0eb72905e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-issues-emergency-patch-for-fourth-chrome-ze-6fba4b59</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Issues%20Emergency%20Patch%20for%20Fourth%20Chrome%20Zero-Day%20of%202025&amp;severity=critical&amp;id=686432696f40f0eb72905758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta829-and-unkgreensec-share-tactics-and-infrastruc-57fdc3cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA829%20and%20UNK_GreenSec%20Share%20Tactics%20and%20Infrastructure%20in%20Ongoing%20Malware%20Campaigns&amp;severity=high&amp;id=686432696f40f0eb7290575c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-filefix-attack-runs-jscript-while-bypassing-wi-d59bf21c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20FileFix%20attack%20runs%20JScript%20while%20bypassing%20Windows%20MoTW%20alerts&amp;severity=high&amp;id=686432696f40f0eb72905760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6600-cwe-200-exposure-of-sensitive-inform-1b0ce5b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6600%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20GitHub%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=686432966f40f0eb72905816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48379-cwe-122-heap-based-buffer-overflow--03acfed7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48379%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20python-pillow%20Pillow&amp;severity=high&amp;id=68642b616f40f0eb72904a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27153-cwe-284-improper-access-control-in--54732b9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27153%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20pluginsGLPI%20escalade&amp;severity=medium&amp;id=68642b616f40f0eb72904a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53104-cwe-77-improper-neutralization-of-s-24128111</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53104%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20gluestack%20gluestack-ui&amp;severity=critical&amp;id=686427df6f40f0eb72904267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53103-cwe-312-cleartext-storage-of-sensit-443eca72</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53103%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20junit-team%20junit-framework&amp;severity=medium&amp;id=686427df6f40f0eb7290427d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34081-cwe-215-insertion-of-sensitive-info-e29c9506</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34081%3A%20CWE-215%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20Contec%20Co.%2CLtd.%20CONPROSYS%20HMI%20System%20(CHS)&amp;severity=medium&amp;id=686424586f40f0eb72903b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53107-cwe-77-improper-neutralization-of-s-91fb5c9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53107%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20cyanheads%20git-mcp-server&amp;severity=high&amp;id=686424586f40f0eb72903b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34080-cwe-79-improper-neutralization-of-i-58bc2207</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34080%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Contec%20Co.%2CLtd.%20CONPROSYS%20HMI%20System%20(CHS)&amp;severity=medium&amp;id=68642ee56f40f0eb72905145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53100-cwe-78-improper-neutralization-of-s-9a50e6ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53100%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RestDB%20codehooks-mcp-server&amp;severity=high&amp;id=68642ee56f40f0eb72905148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37099-vulnerability-in-hewlett-packard-en-843dd151</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37099%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20Insight%20Remote%20Support&amp;severity=critical&amp;id=68641d506f40f0eb72902ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6297-vulnerability-in-debian-dpkg-772a11f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6297%3A%20Vulnerability%20in%20Debian%20dpkg&amp;severity=high&amp;id=68641d506f40f0eb72902caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6963-sql-injection-in-campcodes-employee--66199294</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6963%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=68640bbc6f40f0eb7290079f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-health-insurance-scam-stealing-person-39c96457</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Health%20Insurance%20Scam%20Stealing%20Personal%20and%20Medical%20Data&amp;severity=medium&amp;id=6864012f6f40f0eb728feb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6962-sql-injection-in-campcodes-employee--6637eafa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6962%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=686401476f40f0eb728feba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6961-sql-injection-in-campcodes-employee--3efba6cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6961%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=686401476f40f0eb728feb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-chrome-remote-desktop-on-red-team-operatio-001c646a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20Chrome%20Remote%20Desktop%20on%20Red%20Team%20Operations&amp;severity=medium&amp;id=6863fa2c6f40f0eb728fdb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6960-sql-injection-in-campcodes-employee--e2a9bf0c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6960%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863fdad6f40f0eb728fe34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6959-sql-injection-in-campcodes-employee--19a01ab1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6959%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863fdad6f40f0eb728fe345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53099-cwe-288-authentication-bypass-using-399d2a95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53099%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20getsentry%20sentry&amp;severity=medium&amp;id=6863fa286f40f0eb728fdb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34064-cwe-668-exposure-of-resource-to-wro-e1cdf2d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34064%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20One%20Identity%20OneLogin%20Active%20Directory%20Connector%20(ADC)&amp;severity=critical&amp;id=6863fa286f40f0eb728fdb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34063-cwe-290-authentication-bypass-by-sp-733a1652</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34063%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20One%20Identity%20OneLogin%20Active%20Directory%20Connector%20(ADC)&amp;severity=critical&amp;id=6863fa286f40f0eb728fdb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34062-cwe-200-exposure-of-sensitive-infor-3639691e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34062%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20One%20Identity%20OneLogin%20Active%20Directory%20Connector%20(ADC)&amp;severity=medium&amp;id=6863fa286f40f0eb728fdb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34060-cwe-502-deserialization-of-untruste-c33c1ba1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34060%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Monero%20Project%20Forum&amp;severity=critical&amp;id=6863f6b26f40f0eb728fd27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34059-cwe-89-improper-neutralization-of-s-abda9564</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34059%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zhejiang%20Dahua%20Technology%20Co.%2C%20Ltd.%20Smart%20Cloud%20Gateway%20Registration%20Management%20Platform&amp;severity=high&amp;id=6863f6b26f40f0eb728fd277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34058-cwe-521-weak-password-requirements--e2cfa22e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34058%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Hangzhou%20Hikvision%20System%20Technology%20Streaming%20Media%20Management%20Server&amp;severity=high&amp;id=6863f6b26f40f0eb728fd271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34066-cwe-295-improper-certificate-valida-943f7438</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34066%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20AVTECH%20IP%20cameras&amp;severity=high&amp;id=6863f6b26f40f0eb728fd295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34065-cwe-290-authentication-bypass-by-sp-c0e8f4bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34065%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20AVTECH%20IP%20camera%2C%20DVR%2C%20and%20NVR%20Devices&amp;severity=medium&amp;id=6863f6b26f40f0eb728fd28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34056-cwe-78-improper-neutralization-of-s-16a6e2da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34056%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AVTECH%20IP%20camera%2C%20DVR%2C%20and%20NVR%20Devices&amp;severity=critical&amp;id=6863f6b26f40f0eb728fd26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34055-cwe-78-improper-neutralization-of-s-624e895d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34055%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AVTECH%20IP%20camera%2C%20DVR%2C%20and%20NVR%20Devices&amp;severity=critical&amp;id=6863f6b26f40f0eb728fd263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34054-cwe-78-improper-neutralization-of-s-df4e5597</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34054%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AVTECH%20IP%20camera%2C%20DVR%2C%20and%20NVR%20Devices&amp;severity=critical&amp;id=6863f6b26f40f0eb728fd25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34053-cwe-290-authentication-bypass-by-sp-6715cd2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34053%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20AVTECH%20IP%20camera%2C%20DVR%2C%20and%20NVR%20devices&amp;severity=medium&amp;id=6863f6b26f40f0eb728fd255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34052-cwe-200-exposure-of-sensitive-infor-fb5e6524</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34052&amp;severity=null&amp;id=6863f6b26f40f0eb728fd24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34051-cwe-918-server-side-request-forgery-36ecbbcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34051%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20AVTECH%20DVR%20devices&amp;severity=medium&amp;id=6863f6b26f40f0eb728fd247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34050-cwe-352-cross-site-request-forgery--7ad5b654</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34050%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AVTECH%20IP%20cameras&amp;severity=medium&amp;id=6863f6b26f40f0eb728fd240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/johnson-controls-starts-notifying-people-affected--3018451e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Johnson%20Controls%20starts%20notifying%20people%20affected%20by%202023%20breach&amp;severity=high&amp;id=6863f6a36f40f0eb728fd1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37098-vulnerability-in-hewlett-packard-en-b3168c0c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37098%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20Insight%20Remote%20Support&amp;severity=high&amp;id=6863f6b36f40f0eb728fd29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/esse-health-says-recent-data-breach-affects-over-2-79accac1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Esse%20Health%20says%20recent%20data%20breach%20affects%20over%20263%2C000%20patients&amp;severity=high&amp;id=6863f3216f40f0eb728fc6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/international-criminal-court-hit-by-new-sophistica-e21c8a5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=International%20Criminal%20Court%20hit%20by%20new%20&apos;sophisticated&apos;%20cyberattack&amp;severity=high&amp;id=6863f3216f40f0eb728fc6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6958-sql-injection-in-campcodes-employee--93d80e10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6958%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863f6b36f40f0eb728fd2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6957-sql-injection-in-campcodes-employee--b562e030</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6957%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863f6b36f40f0eb728fd29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37097-vulnerability-in-hewlett-packard-en-9a4f6ee4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37097%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20Insight%20Remote%20Support&amp;severity=high&amp;id=6863ef9a6f40f0eb728fbc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6956-sql-injection-in-campcodes-employee--2e0f7a37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6956%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863ef9a6f40f0eb728fbc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6955-sql-injection-in-campcodes-employee--230c3e13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6955%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863ef9a6f40f0eb728fbc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6954-sql-injection-in-campcodes-employee--232d8a35</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6954%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863e8936f40f0eb728f960e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6953-buffer-overflow-in-totolink-a3002ru-c3a1a1b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6953%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002RU&amp;severity=high&amp;id=6863e8936f40f0eb728f9606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49029-cwe-94-improper-control-of-generati-49f2ecf5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49029%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20bitto.kazi%20Custom%20Login%20And%20Signup%20Widget&amp;severity=null&amp;id=6863e50e6f40f0eb728f8e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6920-missing-authentication-for-critical--e3815abd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6920%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Red%20Hat%20Red%20Hat%20AI%20Inference%20Server&amp;severity=medium&amp;id=6863e18a6f40f0eb728f87d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36582-cwe-757-selection-of-less-secure-al-cd7ff949</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36582%3A%20CWE-757%3A%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20Dell%20NetWorker&amp;severity=medium&amp;id=6863e18a6f40f0eb728f87d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6952-reachable-assertion-in-open5gs-c126f65b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6952%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=6863c9006f40f0eb728f0ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6951-use-of-default-credentials-in-safeca-064a05f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6951%3A%20Use%20of%20Default%20Credentials%20in%20SAFECAM%20X300&amp;severity=medium&amp;id=6863c9006f40f0eb728f0ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49483-cwe-404-improper-resource-shutdown--4bf83b7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49483%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863c9006f40f0eb728f0ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49482-cwe-404-improper-resource-shutdown--a762c085</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49482%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863c9006f40f0eb728f0ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5314-cwe-79-improper-neutralization-of-in-707635bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dearhive%20Dear%20Flipbook%20%E2%80%93%20PDF%20Flipbook%2C%203D%20Flipbook%2C%20PDF%20embed%2C%20PDF%20viewer&amp;severity=medium&amp;id=6863c9006f40f0eb728f0ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-use-microsoft-365-direct-send-to-spoof-em-b59b51a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Use%20Microsoft%20365%20Direct%20Send%20to%20Spoof%20Emails%20Targeting%20over%2070%20US%20Firms&amp;severity=medium&amp;id=6863c8ef6f40f0eb728f0ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49481-cwe-404-improper-resource-shutdown--07cef312</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49481%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863c56a6f40f0eb728f061c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49480-cwe-125-out-of-bounds-read-in-asr-f-267a2d7b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49480%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=high&amp;id=6863c56a6f40f0eb728f0619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49488-cwe-404-improper-resource-shutdown--4b133afd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49488%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863c1e66f40f0eb728efaa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49492-cwe-787-out-of-bounds-write-in-asr--a5fff6b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49492%3A%20CWE-787%20Out-of-bounds%20Write%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=high&amp;id=6863c1e66f40f0eb728efaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6224-cwe-312-cleartext-storage-of-sensiti-a092c9f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6224%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Canonical%20Juju%20utils&amp;severity=medium&amp;id=6863be626f40f0eb728ef548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49491-cwe-404-improper-resource-shutdown--dc504d74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49491%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863be626f40f0eb728ef545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-arrests-facilitator-in-north-korean-it-worker-s-9a1e77d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Arrests%20Facilitator%20in%20North%20Korean%20IT%20Worker%20Scheme%3B%20Seizes%2029%20Domains%20and%20Raids%2021%20Laptop%20Farms&amp;severity=high&amp;id=6863b7596f40f0eb728ee813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-critical-zero-day-flaw-in-chromes-v-b84b5959</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20Critical%20Zero-Day%20Flaw%20in%20Chrome%E2%80%99s%20V8%20Engine%20After%20Active%20Exploitation&amp;severity=critical&amp;id=6863b7596f40f0eb728ee80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49490-cwe-404-improper-resource-shutdown--24fd8c7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49490%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863b3da6f40f0eb728ee0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49489-cwe-404-improper-resource-shutdown--837fe796</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49489%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863b0516f40f0eb728ed6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6756-cwe-79-improper-neutralization-of-in-a29aa7b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefic%20Ultra%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=6863accd6f40f0eb728ecda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5072-cwe-404-improper-resource-shutdown-o-b7db4735</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5072%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863a5c56f40f0eb728ebeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41648-cwe-704-incorrect-type-conversion-o-ea121f93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41648%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20Pilz%20IndustrialPI%204%20with%20IndustrialPI%20webstatus&amp;severity=critical&amp;id=68639b396f40f0eb728ea645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41656-cwe-306-missing-authentication-for--3e183b9f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41656%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pilz%20IndustrialPI%204%20with%20Firmware%20Bullseye&amp;severity=critical&amp;id=68639b396f40f0eb728ea648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-things-i-hate-about-attribution-romcom-vs-trans-9cad9744</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20Things%20I%20Hate%20About%20Attribution%3A%20RomCom%20vs.%20TransferLoader&amp;severity=medium&amp;id=68639b396f40f0eb728ea5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-got-persistent-xss-on-every-aem-cloud-site--5445cba1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20we%20got%20persistent%20XSS%20on%20every%20AEM%20cloud%20site%2C%20thrice&amp;severity=medium&amp;id=6863943b6f40f0eb728e96b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6934-cwe-269-improper-privilege-managemen-c1a44303</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6934%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpopal%20Opal%20Estate%20Pro%20%E2%80%93%20Property%20Management%20and%20Submission&amp;severity=critical&amp;id=686386216f40f0eb728e62a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-through-path-traversal-e5998bbf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20through%20Path%20Traversal&amp;severity=medium&amp;id=68636d886f40f0eb728e3a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6081-cwe-522-insufficiently-protected-cre-9c2dfdab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6081%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Konica%20Minolta%20bizhub%20227%20Multifunction%20printers&amp;severity=medium&amp;id=68635bf26f40f0eb728e15ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5967-cwe-79-improper-neutralization-of-in-23645f05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5967%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Trellix%20Endpoint%20Security%20HX&amp;severity=medium&amp;id=686354ef6f40f0eb728e0a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6940-buffer-overflow-in-totolink-a702r-3c4383d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6940%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68634de26f40f0eb728df7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6939-buffer-overflow-in-totolink-a3002ru-2ebf29d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6939%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002RU&amp;severity=high&amp;id=68634de26f40f0eb728df7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53095-cwe-352-cross-site-request-forgery--44568b1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53095%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LizardByte%20Sunshine&amp;severity=critical&amp;id=686343566f40f0eb728ddd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53096-cwe-1021-improper-restriction-of-re-e3d2d295</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53096%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20LizardByte%20Sunshine&amp;severity=medium&amp;id=686343566f40f0eb728ddd85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6938-sql-injection-in-code-projects-simpl-4152240a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6938%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=686343566f40f0eb728ddd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53003-cwe-200-exposure-of-sensitive-infor-ba5c7b0d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53003%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20JanssenProject%20jans&amp;severity=high&amp;id=686343566f40f0eb728ddd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2141-cwe-79-improper-neutralization-of-in-bbcd645b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2141%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20System%20Storage%20Virtualization%20Engine%20TS7700&amp;severity=medium&amp;id=686338ca6f40f0eb728dc231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36056-cwe-79-improper-neutralization-of-i-96eb1d70</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20System%20Storage%20Virtualization%20Engine%20TS7700&amp;severity=medium&amp;id=686338ca6f40f0eb728dc234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6937-sql-injection-in-code-projects-simpl-f1567775</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6937%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=686331d96f40f0eb728db533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6936-sql-injection-in-code-projects-simpl-aebd10af</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6936%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=686327386f40f0eb728d98d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-01-7b6b7cea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-01&amp;severity=medium&amp;id=686478ae6f40f0eb7290e14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45006-na-0af3d6cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45006%3A%20n%2Fa&amp;severity=critical&amp;id=686443fd6f40f0eb72907909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52101-na-6e023dbd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52101%3A%20n%2Fa&amp;severity=critical&amp;id=686443fd6f40f0eb72907905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52294-na-a8b776b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52294%3A%20n%2Fa&amp;severity=medium&amp;id=686427df6f40f0eb7290427a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45083-na-513a37da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45083%3A%20n%2Fa&amp;severity=medium&amp;id=686427df6f40f0eb72904277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45081-na-92201d0a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45081%3A%20n%2Fa&amp;severity=high&amp;id=686427df6f40f0eb72904274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45080-na-71ec5081</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45080&amp;severity=null&amp;id=686427df6f40f0eb72904271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50641-na-b5fc8168</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50641%3A%20n%2Fa&amp;severity=medium&amp;id=6863fdad6f40f0eb728fe342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50405-na-baadd943</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50405%3A%20n%2Fa&amp;severity=medium&amp;id=6863f33c6f40f0eb728fc775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50404-na-7e73f67e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50404%3A%20n%2Fa&amp;severity=medium&amp;id=6863f33c6f40f0eb728fc771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45872-na-afaf107a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45872%3A%20n%2Fa&amp;severity=critical&amp;id=6863ef9a6f40f0eb728fbc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6935-sql-injection-in-campcodes-sales-and-7d3e3e68</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6935%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=686320336f40f0eb728d8b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6932-use-of-hard-coded-password-in-d-link-d334a178</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6932%3A%20Use%20of%20Hard-coded%20Password%20in%20D-Link%20DCS-7517&amp;severity=medium&amp;id=686319266f40f0eb728d808e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6931-insufficient-entropy-in-d-link-dcs-6-60f4ce29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6931%3A%20Insufficient%20Entropy%20in%20D-Link%20DCS-6517&amp;severity=medium&amp;id=6863121e6f40f0eb728d7521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6930-sql-injection-in-phpgurukul-zoo-mana-a2e6a1ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6930%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=68630b166f40f0eb728d467a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6554-type-confusion-in-google-chrome-3352da1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6554%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=6863008a6f40f0eb728cf6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6929-sql-injection-in-phpgurukul-zoo-mana-8cf95c74</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6929%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=6863008a6f40f0eb728cf6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49520-improper-neutralization-of-argument-eb21abb6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49520%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=high&amp;id=6862f9826f40f0eb728cea5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49521-improper-control-of-generation-of-c-aad92b1f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49521%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=high&amp;id=6862f9826f40f0eb728cea63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-the-null-wing-ftp-server-rce-cve-2025-47812-0ade04ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20the%20NULL%3F!%20Wing%20FTP%20Server%20RCE%20(CVE-2025-47812)&amp;severity=medium&amp;id=6862eb826f40f0eb728cc41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-agencies-warn-of-rising-iranian-cyberattacks-on-5fd53a26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Agencies%20Warn%20of%20Rising%20Iranian%20Cyberattacks%20on%20Defense%2C%20OT%20Networks%2C%20and%20Critical%20Infrastructure&amp;severity=critical&amp;id=6862eb716f40f0eb728cc3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hide-your-rdp-password-spray-leads-to-ransomhub-de-e8682047</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hide%20Your%20RDP%3A%20Password%20Spray%20Leads%20to%20RansomHub%20Deployment&amp;severity=medium&amp;id=686397b46f40f0eb728e9e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36593-cwe-294-authentication-bypass-by-ca-e3a203af</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36593%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Dell%20OpenManage%20Network%20Integration&amp;severity=high&amp;id=6862dd626f40f0eb728ca985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6925-path-traversal-in-dromara-ruoyi-vue--771e1f7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6925%3A%20Path%20Traversal%20in%20Dromara%20RuoYi-Vue-Plus&amp;severity=medium&amp;id=6862d65a6f40f0eb728c9b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6917-sql-injection-in-code-projects-onlin-794c1731</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6917%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hotel%20Booking&amp;severity=medium&amp;id=6862cbce6f40f0eb728c82e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/c4-bomb-blowing-up-chromes-appbound-cookie-encrypt-5ae52fd0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=C4%20Bomb%3A%20Blowing%20Up%20Chrome%E2%80%99s%20AppBound%20Cookie%20Encryption&amp;severity=medium&amp;id=6862c85d6f40f0eb728c7d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blind-eagle-uses-proton66-hosting-for-phishing-rat-c99a7c8f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blind%20Eagle%20Uses%20Proton66%20Hosting%20for%20Phishing%2C%20RAT%20Deployment%20on%20Colombian%20Banks&amp;severity=high&amp;id=6862c4c46f40f0eb728c7589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/switzerland-says-government-data-stolen-in-ransomw-8b7d63d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Switzerland%20says%20government%20data%20stolen%20in%20ransomware%20attack&amp;severity=high&amp;id=6862c4c46f40f0eb728c7585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6916-missing-authentication-in-totolink-t-4ade07db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6916%3A%20Missing%20Authentication%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=6862c4e76f40f0eb728c75eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6915-sql-injection-in-phpgurukul-student--22a5104c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6915%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6862bdbc6f40f0eb728c6b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snake-keylogger-in-geopolitical-affairs-abuse-of-t-176536a4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snake%20Keylogger%20in%20Geopolitical%20Affairs%3A%20Abuse%20of%20Trusted%20Java%20Utilities%20in%20Cybercrime%20Operations&amp;severity=medium&amp;id=6862bdbb6f40f0eb728c6aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6914-sql-injection-in-phpgurukul-student--83300127</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6914%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6862b6b56f40f0eb728c2b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chromes-appbound-cookie-encryption-bypassed-via-si-513fc001</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%E2%80%99s%20AppBound%20Cookie%20Encryption%20Bypassed%20via%20Side-Channel%20Timing%20Attack&amp;severity=medium&amp;id=6862b3376f40f0eb728c1c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6913-sql-injection-in-phpgurukul-student--564a4c4d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6913%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6862afac6f40f0eb728c1551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6912-sql-injection-in-phpgurukul-student--fe2ae53d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6912%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6862ac286f40f0eb728c07ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2895-cwe-80-improper-neutralization-of-sc-4e596712</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2895%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Cloud%20Pak%20System&amp;severity=medium&amp;id=6862a5206f40f0eb728bef43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6911-sql-injection-in-phpgurukul-student--f10e6bae</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6911%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6862a19c6f40f0eb728bea92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tat-de-lart-sur-le-phishing-azure-en-2025-partie-1-5e7aa41a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%C3%89tat%20de%20l%E2%80%99art%20sur%20le%20phishing%20Azure%20en%202025%20(partie%201)%20%E2%80%93%20Device%20code%20flow&amp;severity=medium&amp;id=68629e1a6f40f0eb728be276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6910-sql-injection-in-phpgurukul-student--e448adfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6910%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=68629a946f40f0eb728bd836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-2-ransomware-attacks-on-2-hospitals-led-to-2-d-62b1f6a0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%202%20Ransomware%20Attacks%20on%202%20Hospitals%20Led%20to%202%20Deaths%20in%20Europe&amp;severity=medium&amp;id=6862938b6f40f0eb728bb920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6909-sql-injection-in-phpgurukul-old-age--d91edb37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6909%3A%20SQL%20Injection%20in%20PHPGurukul%20Old%20Age%20Home%20Management%20System&amp;severity=medium&amp;id=686293986f40f0eb728bb960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6908-sql-injection-in-phpgurukul-old-age--83d50dd1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6908%3A%20SQL%20Injection%20in%20PHPGurukul%20Old%20Age%20Home%20Management%20System&amp;severity=medium&amp;id=68628c836f40f0eb728ba6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6907-sql-injection-in-code-projects-car-r-c2cd9d1b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6907%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=686289006f40f0eb728b9f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6906-sql-injection-in-code-projects-car-r-8fd04550</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6906%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=686281f76f40f0eb728b8dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6905-sql-injection-in-code-projects-car-r-b62c8bf6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6905%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=6862776c6f40f0eb728b71d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4407-cwe-613-insufficient-session-expirat-b88e8a8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4407%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20ABB%20Lite%20Panel%20Pro&amp;severity=medium&amp;id=686273e86f40f0eb728a85b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6904-sql-injection-in-code-projects-car-r-fc0c9c18</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6904%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=686270646f40f0eb728a7fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40710-cwe-74-improper-neutralization-of-s-571e1fcc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40710%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Hotspot%20Shield%20Hotspot%20Shield%20VPN%20client&amp;severity=low&amp;id=68626ce16f40f0eb728a7a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6903-sql-injection-in-code-projects-car-r-ea66095a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6903%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=6862695c6f40f0eb728a7373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6902-sql-injection-in-code-projects-inven-a7081703</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6902%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686265d86f40f0eb728a647e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/norwegian-dam-valve-forced-open-for-hours-in-cyber-9713ca00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Norwegian%20Dam%20Valve%20Forced%20Open%20for%20Hours%20in%20Cyberattack&amp;severity=medium&amp;id=68625ecf6f40f0eb728a4a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8419-cwe-306-missing-authentication-for-c-2a031bf8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8419%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ifm%20electronic%20GmbH%20ifm%20Smart%20PLC%20AC402s&amp;severity=high&amp;id=6994257080d747be207b7295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6901-sql-injection-in-code-projects-inven-bddd79d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6901%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=68625b4c6f40f0eb728a27ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41439-cross-site-scripting-xss-in-ricoh-c-54195313</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41439%3A%20Cross-site%20scripting%20(XSS)%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX&amp;severity=medium&amp;id=68625b4c6f40f0eb728a27f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53416-793170fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53416%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Delta%20Electronics%20DTN%20Soft&amp;severity=high&amp;id=68625b4c6f40f0eb728a27fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53415-cwe-502-deserialization-of-untruste-250f03c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53415%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Delta%20Electronics%20DTM%20Soft&amp;severity=high&amp;id=686257c86f40f0eb728a1f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6900-unrestricted-upload-in-code-projects-da5840fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6900%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686254446f40f0eb728a1987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6899-os-command-injection-in-d-link-di-73-f8e4828f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6899%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-7300G%2B&amp;severity=medium&amp;id=68624d3c6f40f0eb728a0cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6898-os-command-injection-in-d-link-di-73-04304382</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6898%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-7300G%2B&amp;severity=medium&amp;id=686246346f40f0eb7289fa42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ahold-delhaize-confirms-data-breach-of-22m-amid-in-e14e10db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ahold%20Delhaize%20Confirms%20Data%20Breach%20of%202.2M%20amid%20INC%20Ransomware%20Claims&amp;severity=high&amp;id=686242af6f40f0eb7289f521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6897-os-command-injection-in-d-link-di-73-8bb9c869</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6897%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-7300G%2B&amp;severity=medium&amp;id=68623f2c6f40f0eb7289ef61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6896-os-command-injection-in-d-link-di-73-6cfef37a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6896%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-7300G%2B&amp;severity=medium&amp;id=686238236f40f0eb728960c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6891-sql-injection-in-code-projects-inven-816e959b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6891%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6862311b6f40f0eb728954ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6890-sql-injection-in-code-projects-movie-b50d79e7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6890%3A%20SQL%20Injection%20in%20code-projects%20Movie%20Ticketing%20System&amp;severity=medium&amp;id=68622a136f40f0eb72893b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5730-cwe-79-cross-site-scripting-xss-in-c-624e7090</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5730%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Contact%20Form%20Plugin&amp;severity=medium&amp;id=68622a136f40f0eb72893b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3745-cwe-79-cross-site-scripting-xss-in-w-07fc3cb8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3745%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Lightbox%202&amp;severity=medium&amp;id=68622a136f40f0eb72893b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6889-sql-injection-in-code-projects-movie-d82f6d2c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6889%3A%20SQL%20Injection%20in%20code-projects%20Movie%20Ticketing%20System&amp;severity=medium&amp;id=6862230b6f40f0eb7288ace3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6888-sql-injection-in-phpgurukul-teachers-ab213d79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6888%3A%20SQL%20Injection%20in%20PHPGurukul%20Teachers%20Record%20Management%20System&amp;severity=medium&amp;id=68621f8a6f40f0eb72889fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6887-stack-based-buffer-overflow-in-tenda-c30dce07</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6887%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=686214fb6f40f0eb72888056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6886-stack-based-buffer-overflow-in-tenda-25c90c53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6886%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=686211776f40f0eb728878e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6885-sql-injection-in-phpgurukul-teachers-df8ed912</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6885%3A%20SQL%20Injection%20in%20PHPGurukul%20Teachers%20Record%20Management%20System&amp;severity=medium&amp;id=68620a6f6f40f0eb72886dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6884-sql-injection-in-code-projects-staff-fefa6af7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6884%3A%20SQL%20Injection%20in%20code-projects%20Staff%20Audit%20System&amp;severity=medium&amp;id=686203676f40f0eb72886067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6883-sql-injection-in-code-projects-staff-06f816ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6883%3A%20SQL%20Injection%20in%20code-projects%20Staff%20Audit%20System&amp;severity=medium&amp;id=6861f8dc6f40f0eb72881574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6882-buffer-overflow-in-d-link-dir-513-900121ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6882%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=6861f8dc6f40f0eb7288156e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53074-cwe-125-out-of-bounds-read-in-samsu-1c90a561</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53074%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Samsung%20Open%20Source%20rLottie&amp;severity=medium&amp;id=6861f8dc6f40f0eb72881568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53076-cwe-20-improper-input-validation-in-85112ed8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53076%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Open%20Source%20rLottie&amp;severity=medium&amp;id=6861f8dc6f40f0eb7288156b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53075-cwe-20-improper-input-validation-in-8258f1f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53075%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Open%20Source%20rLottie&amp;severity=medium&amp;id=6861ee4f6f40f0eb7287e2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0634-cwe-416-use-after-free-in-samsung-op-bff90e8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0634%3A%20CWE-416%20Use%20After%20Free%20in%20Samsung%20Open%20Source%20rLottie&amp;severity=medium&amp;id=6861ee4f6f40f0eb7287e2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6881-buffer-overflow-in-d-link-di-8100-bf02f667</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6881%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=6861ee4f6f40f0eb7287e2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6880-sql-injection-in-sourcecodester-best-c61aa8da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6880%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861e3c46f40f0eb72876fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6879-sql-injection-in-sourcecodester-best-9093dde3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6879%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861e03f6f40f0eb728767ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6878-sql-injection-in-sourcecodester-best-50cdbd75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6878%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861e03f6f40f0eb728767e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-30-8d19c212</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-30&amp;severity=medium&amp;id=6863272e6f40f0eb728d9662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32463-cwe-829-inclusion-of-functionality--c61a2c6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32463%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Sudo%20project%20Sudo&amp;severity=critical&amp;id=6862f6046f40f0eb728ce4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32462-cwe-863-incorrect-authorization-in--ecb908f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32462%3A%20CWE-863%20Incorrect%20Authorization%20in%20Sudo%20project%20Sudo&amp;severity=low&amp;id=6862f6046f40f0eb728ce4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49493-cwe-611-improper-restriction-of-xml-dfb0ef88</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49493%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Akamai%20CloudTest&amp;severity=medium&amp;id=6862eb7e6f40f0eb728cc403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52491-cwe-918-server-side-request-forgery-a49f9cd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52491%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Akamai%20CloudTest&amp;severity=medium&amp;id=6862eb7e6f40f0eb728cc3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45931-na-4f99a444</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45931%3A%20n%2Fa&amp;severity=critical&amp;id=6862c85a6f40f0eb728c7d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45143-na-279237e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45143%3A%20n%2Fa&amp;severity=high&amp;id=6862c4e76f40f0eb728c75e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26074-na-20ff6f7e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26074%3A%20n%2Fa&amp;severity=critical&amp;id=6862c1406f40f0eb728c7085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46014-na-1349ab22</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46014%3A%20n%2Fa&amp;severity=high&amp;id=6861ee4f6f40f0eb7287e2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6877-sql-injection-in-sourcecodester-best-511d1f8f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6877%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861ceb06f40f0eb7286f96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6876-sql-injection-in-sourcecodester-best-bc5a26f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6876%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861c7a36f40f0eb7286e399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6875-sql-injection-in-sourcecodester-best-c598f8e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6875%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861c09b6f40f0eb7286cb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6874-sql-injection-in-sourcecodester-best-59744365</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6874%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861b9936f40f0eb72860547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6873-unrestricted-upload-in-sourcecodeste-26f030d1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6873%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=6861b28b6f40f0eb7285e80d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6872-unrestricted-upload-in-sourcecodeste-48c09232</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6872%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=6861ab836f40f0eb7285d813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6871-sql-injection-in-sourcecodester-simp-89a8d717</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6871%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=6861a7ff6f40f0eb7285cfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6870-unrestricted-upload-in-sourcecodeste-328cc9ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6870%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=6861a0f86f40f0eb72858f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6869-sql-injection-in-sourcecodester-simp-158d91c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6869%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=6861967a6f40f0eb72851e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluetooth-flaws-could-let-hackers-spy-through-your-396cd353</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bluetooth%20flaws%20could%20let%20hackers%20spy%20through%20your%20microphone&amp;severity=high&amp;id=6861966a6f40f0eb72851e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24292-vulnerability-in-ubiquiti-inc-unifi-715899e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24292%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Application&amp;severity=medium&amp;id=6861967a6f40f0eb72851e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24290-vulnerability-in-ubiquiti-inc-uisp--741026aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24290%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UISP%20Application&amp;severity=critical&amp;id=6861967a6f40f0eb72851e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24289-vulnerability-in-ubiquiti-inc-ucrm--b24f2998</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24289%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UCRM%20Client%20Signup%20Plugin&amp;severity=high&amp;id=6861967a6f40f0eb72851e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6868-sql-injection-in-sourcecodester-simp-b32575ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6868%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=68618f626f40f0eb7284fc9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6867-sql-injection-in-sourcecodester-simp-908c9c07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6867%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=68618be46f40f0eb7284f404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6866-path-traversal-in-code-projects-simp-f060ecde</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6866%3A%20Path%20Traversal%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=686181536f40f0eb7284d019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6865-cross-site-request-forgery-in-daicuo-bf838dac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6865%3A%20Cross-Site%20Request%20Forgery%20in%20DaiCuo&amp;severity=medium&amp;id=686173436f40f0eb7284a274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6864-cross-site-request-forgery-in-seacms-2faf02aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6864%3A%20Cross-Site%20Request%20Forgery%20in%20SeaCMS&amp;severity=medium&amp;id=686165336f40f0eb72846ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6863-sql-injection-in-phpgurukul-local-se-4cd67235</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6863%3A%20SQL%20Injection%20in%20PHPGurukul%20Local%20Services%20Search%20Engine%20Management%20System&amp;severity=medium&amp;id=686157426f40f0eb7280cb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6862-sql-injection-in-sourcecodester-best-a9cdee67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6862%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861501b6f40f0eb7280ba20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6861-sql-injection-in-sourcecodester-best-8f086bd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6861%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686149136f40f0eb7280937a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6860-sql-injection-in-sourcecodester-best-6e0699b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6860%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68613b036f40f0eb728048d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6859-sql-injection-in-sourcecodester-best-5844a481</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6859%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861377f6f40f0eb72803b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5878-improper-neutralization-of-special-e-b6cce6ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5878%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20ESAPI%20esapi-java-legacy&amp;severity=medium&amp;id=686122686f40f0eb727febaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6858-null-pointer-dereference-in-hdf5-1da12055</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6858%3A%20NULL%20Pointer%20Dereference%20in%20HDF5&amp;severity=medium&amp;id=68611ee46f40f0eb727fe287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6857-stack-based-buffer-overflow-in-hdf5-cf5f1191</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6857%3A%20Stack-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=686110d66f40f0eb727c3247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6856-use-after-free-in-hdf5-db4827a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6856%3A%20Use%20After%20Free%20in%20HDF5&amp;severity=medium&amp;id=686109ce6f40f0eb727c0c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6855-path-traversal-in-chatchat-space-lan-b3579312</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6855%3A%20Path%20Traversal%20in%20chatchat-space%20Langchain-Chatchat&amp;severity=medium&amp;id=686102d26f40f0eb727b899a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-fbi-warns-that-scattered-spider-is-now-targeti-ba83feb4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20FBI%20warns%20that%20Scattered%20Spider%20is%20now%20targeting%20the%20airline%20sector&amp;severity=medium&amp;id=686102c56f40f0eb727b8953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6854-path-traversal-in-chatchat-space-lan-93e0050c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6854%3A%20Path%20Traversal%20in%20chatchat-space%20Langchain-Chatchat&amp;severity=medium&amp;id=6860ff426f40f0eb727b806a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6853-path-traversal-in-chatchat-space-lan-8d429151</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6853%3A%20Path%20Traversal%20in%20chatchat-space%20Langchain-Chatchat&amp;severity=medium&amp;id=6860edae6f40f0eb727879bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6850-sql-injection-in-code-projects-simpl-4582c285</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6850%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860e6a66f40f0eb72785f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6849-cross-site-scripting-in-code-project-108e95ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6849%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6862b3346f40f0eb728c1c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6848-unrestricted-upload-in-code-projects-f01bdd85</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6848%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860dc216f40f0eb727842b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6847-sql-injection-in-code-projects-simpl-3c6ca147</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6847%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860d18d6f40f0eb727803c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6846-sql-injection-in-code-projects-simpl-c424a001</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6846%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860ca856f40f0eb7277cc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6845-sql-injection-in-code-projects-simpl-fb5cb991</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6845%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860c37d6f40f0eb7277a9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6462-cwe-79-improper-neutralization-of-in-8b098da8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scheeeli%20EZ%20SQL%20Reports%20Shortcode%20Widget%20and%20DB%20Backup&amp;severity=medium&amp;id=6860c37d6f40f0eb7277a9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6844-sql-injection-in-code-projects-simpl-58da34c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6844%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860bc7b6f40f0eb72778621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6843-unrestricted-upload-in-code-projects-8f48f541</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6843%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Photo%20Gallery&amp;severity=medium&amp;id=6860b8f16f40f0eb72777cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6842-sql-injection-in-code-projects-produ-34408a54</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6842%3A%20SQL%20Injection%20in%20code-projects%20Product%20Inventory%20System&amp;severity=medium&amp;id=6860b1ef6f40f0eb7277194a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6841-sql-injection-in-code-projects-produ-178fa463</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6841%3A%20SQL%20Injection%20in%20code-projects%20Product%20Inventory%20System&amp;severity=medium&amp;id=6860a75d6f40f0eb7276f0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6840-sql-injection-in-code-projects-produ-52c2db51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6840%3A%20SQL%20Injection%20in%20code-projects%20Product%20Inventory%20System&amp;severity=medium&amp;id=6860a75d6f40f0eb7276f0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6839-backdoor-in-conjure-position-departm-9989d892</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6839%3A%20Backdoor%20in%20Conjure%20Position%20Department%20Service%20Quality%20Evaluation%20System&amp;severity=medium&amp;id=68609cd16f40f0eb7275dade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6837-unrestricted-upload-in-code-projects-bb2199eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6837%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686095c96f40f0eb7275a772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6836-sql-injection-in-code-projects-libra-5cb7f590</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6836%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=68608ec16f40f0eb72754453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6835-sql-injection-in-code-projects-libra-c6b0ae08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6835%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686084356f40f0eb7274d142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-29-4f4db9ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-29&amp;severity=medium&amp;id=6861d5ae6f40f0eb72871999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6834-sql-injection-in-code-projects-inven-8d3d5bcc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6834%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=68607d2e6f40f0eb7274b57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6829-sql-injection-in-aaluoxiang-oasystem-faaedfd9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6829%3A%20SQL%20Injection%20in%20aaluoxiang%20oa_system&amp;severity=medium&amp;id=686076266f40f0eb727498c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6828-sql-injection-in-code-projects-inven-e884527c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6828%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686072a26f40f0eb72748bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6827-sql-injection-in-code-projects-inven-91d908e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6827%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686068156f40f0eb72746209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6826-sql-injection-in-code-projects-payro-a15918bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6826%3A%20SQL%20Injection%20in%20code-projects%20Payroll%20Management%20System&amp;severity=medium&amp;id=68605a0b6f40f0eb7273e3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6825-buffer-overflow-in-totolink-a702r-60eaf1b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6825%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=686052fd6f40f0eb7273cb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6824-buffer-overflow-in-totolink-x15-c70d1fee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6824%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68604bf66f40f0eb7273b0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6823-sql-injection-in-code-projects-inven-cb7b6cc9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6823%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686044ee6f40f0eb727209d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6822-sql-injection-in-code-projects-inven-25549c50</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6822%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686036e06f40f0eb72718c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32897-cwe-502-deserialization-of-untruste-60abfe2d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32897%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Seata%20(incubating)&amp;severity=critical&amp;id=686036e06f40f0eb72718c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6821-sql-injection-in-code-projects-inven-51429d2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6821%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6860335d6f40f0eb727184fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6820-sql-injection-in-code-projects-inven-7a260086</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6820%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686028cf6f40f0eb727159e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6819-sql-injection-in-code-projects-inven-3430d0b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6819%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=68601abf6f40f0eb72712b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6818-heap-based-buffer-overflow-in-hdf5-5c2ed56d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6818%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=68600caf6f40f0eb7270712b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1991-cwe-191-integer-underflow-wrap-or-wr-1740054a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1991%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20IBM%20Informix%20Dynamic%20Server&amp;severity=high&amp;id=685fe9876f40f0eb726fd9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-attack-on-nhs-causes-patient-deat-a78dd6aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Attack%20on%20NHS%20Causes%20Patient%20Death%20in%20the%20UK&amp;severity=medium&amp;id=685fdb776f40f0eb726dc1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6817-resource-consumption-in-hdf5-61e51732</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6817%3A%20Resource%20Consumption%20in%20HDF5&amp;severity=medium&amp;id=685fd46f6f40f0eb726d949f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/giftedcrook-malware-evolves-from-browser-stealer-t-fc7bac60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GIFTEDCROOK%20Malware%20Evolves%3A%20From%20Browser%20Stealer%20to%20Intelligence-Gathering%20Tool&amp;severity=high&amp;id=685fc2da6f40f0eb726d50d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6816-heap-based-buffer-overflow-in-hdf5-6f8c89bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6816%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=685fa3406f40f0eb726b4291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5937-cwe-352-cross-site-request-forgery-c-fee4edaa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5937%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20videowhisper%20MicroPayments%20%E2%80%93%20Fans%20Paysite%3A%20Paid%20Creator%20Subscriptions%2C%20Digital%20Assets%2C%20Wallet&amp;severity=medium&amp;id=685f9c306f40f0eb726b287e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6755-cwe-22-improper-limitation-of-a-path-58387b50</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6755%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gameusers%20Game%20Users%20Share%20Buttons&amp;severity=high&amp;id=685f80106f40f0eb726abc16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5304-cwe-862-missing-authorization-in-bla-a57ed333</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5304%3A%20CWE-862%20Missing%20Authorization%20in%20blafoley%20PT%20Project%20Notebooks%20%E2%80%93%20Take%20Meeting%20minutes%2C%20create%20budgets%2C%20track%20task%20management%2C%20and%20more&amp;severity=critical&amp;id=685f80106f40f0eb726abc10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6252-cwe-79-improper-neutralization-of-in-6e80f334</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6252%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=medium&amp;id=685f72006f40f0eb726a8628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6350-cwe-79-improper-neutralization-of-in-9c3fc99c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rextheme%20WP%20VR%20%E2%80%93%20360%20Panorama%20and%20Free%20Virtual%20Tour%20Builder%20For%20WordPress&amp;severity=medium&amp;id=685f63f06f40f0eb726a575a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6381-cwe-36-absolute-path-traversal-in-be-9bed0c35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6381%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20beeteam368%20BeeTeam368%20Extensions&amp;severity=high&amp;id=685f63f06f40f0eb726a5763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6379-cwe-22-improper-limitation-of-a-path-be0bb357</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6379%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20beeteam368%20BeeTeam368%20Extensions%20Pro&amp;severity=high&amp;id=685f63f06f40f0eb726a575f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36027-cwe-1021-improper-restriction-of-re-471fea96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36027%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20IBM%20Datacap&amp;severity=medium&amp;id=685f40c86f40f0eb72695e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36026-cwe-614-sensitive-cookie-in-https-s-f374c243</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36026%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Datacap&amp;severity=medium&amp;id=685f40c86f40f0eb72695e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-28-d69c000a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-28&amp;severity=medium&amp;id=6860842e6f40f0eb7274cd73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53392-cwe-36-absolute-path-traversal-in-n-de13ba5c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53392%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Netgate%20pfSense&amp;severity=medium&amp;id=68606f1d6f40f0eb727478ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53391-na-b9863e0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53391%3A%20CWE-863%20Incorrect%20Authorization%20in%20Debian%20zulucrypt&amp;severity=critical&amp;id=686061126f40f0eb72744240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36347-cwe-347-improper-verification-of-cr-e1702516</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36347%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20AMD%20AMD%20EPYC%E2%84%A2%207001%20Series&amp;severity=medium&amp;id=69a0a1cc85912abc71d0bd10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53098-cwe-77-improper-neutralization-of-s-0d6382e1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53098%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=685f13136f40f0eb7266fd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53097-cwe-74-improper-neutralization-of-s-2d07d982</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53097%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=medium&amp;id=685f13136f40f0eb7266fd06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6778-cross-site-scripting-in-code-project-4fe1b6b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6778%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Food%20Distributor%20Site&amp;severity=medium&amp;id=685f01806f40f0eb7266be80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6777-sql-injection-in-code-projects-food--3c51ce2a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6777%3A%20SQL%20Injection%20in%20code-projects%20Food%20Distributor%20Site&amp;severity=medium&amp;id=685f01806f40f0eb7266be79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6776-path-traversal-in-xiaoyunjie-openvpn-34693dce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6776%3A%20Path%20Traversal%20in%20xiaoyunjie%20openvpn-cms-flask&amp;severity=medium&amp;id=685efa786f40f0eb72665539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6775-command-injection-in-xiaoyunjie-open-f32d7352</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6775%3A%20Command%20Injection%20in%20xiaoyunjie%20openvpn-cms-flask&amp;severity=medium&amp;id=685efa786f40f0eb72665530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53094-cwe-93-improper-neutralization-of-c-607a8611</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53094%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20ESP32Async%20ESPAsyncWebServer&amp;severity=high&amp;id=685efa786f40f0eb7266552b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-backups-open-backdoors-accessing-sensitive-cl-1eb07241</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Backups%20Open%20Backdoors%3A%20Accessing%20Sensitive%20Cloud%20Data%20via%20%22Synology%20Active%20Backup%20for%20Microsoft%20365%22&amp;severity=medium&amp;id=685ef3736f40f0eb7266170d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6774-path-traversal-in-gooaclok819-sublin-5469466d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6774%3A%20Path%20Traversal%20in%20gooaclok819%20sublinkX&amp;severity=medium&amp;id=685ef3706f40f0eb726616ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6773-path-traversal-in-hkuds-lightrag-56c70c8c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6773%3A%20Path%20Traversal%20in%20HKUDS%20LightRAG&amp;severity=medium&amp;id=685eec836f40f0eb726601af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-1000-soho-devices-hacked-in-china-linked-lapd-00497305</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%201%2C000%20SOHO%20Devices%20Hacked%20in%20China-linked%20LapDogs%20Cyber%20Espionage%20Campaign&amp;severity=high&amp;id=685eec676f40f0eb72660148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-hackers-shift-focus-to-aviation-t-d6ad5d80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%20hackers%20shift%20focus%20to%20aviation%2C%20transportation%20firms&amp;severity=high&amp;id=685eec676f40f0eb7266014c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6772-path-traversal-in-eosphoros-ai-db-gp-b4345726</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6772%3A%20Path%20Traversal%20in%20eosphoros-ai%20db-gpt&amp;severity=medium&amp;id=685ee55f6f40f0eb7265dd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53093-cwe-79-improper-neutralization-of-i-c0e12056</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53093%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-extensions-TabberNeue&amp;severity=high&amp;id=685edad36f40f0eb72658492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5310-cwe-306-in-dover-fueling-solutions-p-adae10a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5310%3A%20CWE-306%20in%20Dover%20Fueling%20Solutions%20ProGauge%20MagLink%20LX%204&amp;severity=critical&amp;id=685ed7556f40f0eb7265731a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6522-cwe-77-in-trendmakers-sight-bulb-pro-d1acd94e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6522%3A%20CWE-77%20in%20TrendMakers%20Sight%20Bulb%20Pro%20Firmware%20ZJ_CG32-2201&amp;severity=medium&amp;id=685ed3cb6f40f0eb7265567d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6521-cwe-327-in-trendmakers-sight-bulb-pr-a04cf660</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6521%3A%20CWE-327%20in%20TrendMakers%20Sight%20Bulb%20Pro%20Firmware%20ZJ_CG32-2201&amp;severity=high&amp;id=685ed0476f40f0eb72654d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46708-cwe-cwe-280-improper-handling-of-in-22b0e624</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46708%3A%20CWE%20-%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20(4.15)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=685ed0476f40f0eb72654d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46707-cwe-cwe-668-exposure-of-resource-to-47f1cb10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46707%3A%20CWE%20-%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=686544a26f40f0eb7292f616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stealthy-remcos-malware-campaigns-target-busin-2a0c6661</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Stealthy%20Remcos%20Malware%20Campaigns%20Target%20Businesses%20and%20Schools&amp;severity=medium&amp;id=685ec5ba6f40f0eb72651917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53091-cwe-89-improper-neutralization-of-s-ca59ad97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53091%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=685eb7aa6f40f0eb726448be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52553-cwe-287-improper-authentication-in--6c2260dd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52553%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=medium&amp;id=685eb7aa6f40f0eb726448b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6705-cwe-913-improper-control-of-dynamica-5cc6979b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6705%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Eclipse%20Foundation%20Eclipse%20Open%20VSX%20Registry&amp;severity=high&amp;id=685eb4266f40f0eb7263ec9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36595-cwe-96-improper-neutralization-of-d-96968af1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36595%3A%20CWE-96%3A%20Improper%20Neutralization%20of%20Directives%20in%20Statically%20Saved%20Code%20(&apos;Static%20Code%20Injection&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax%20vApp&amp;severity=high&amp;id=685ea2a26f40f0eb726349d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6768-sql-injection-in-sfturing-hosporder-36d156f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6768%3A%20SQL%20Injection%20in%20sfturing%20hosp_order&amp;severity=medium&amp;id=685ea034f6cf9081996a7a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53339-cwe-98-improper-control-of-filename-827388bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53339%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20devnex%20Devnex%20Addons%20For%20Elementor&amp;severity=null&amp;id=685ea034f6cf9081996a7a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53338-cwe-352-cross-site-request-forgery--3b3cc4ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53338%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dor%20re.place&amp;severity=null&amp;id=685ea034f6cf9081996a7a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53336-cwe-79-improper-neutralization-of-i-40d34c26</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53336%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20abditsori%20My%20Resume%20Builder&amp;severity=null&amp;id=685ea034f6cf9081996a7a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53332-cwe-352-cross-site-request-forgery--42726785</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53332%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ethoseo%20Track%20Everything&amp;severity=null&amp;id=685ea034f6cf9081996a7a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53331-cwe-352-cross-site-request-forgery--7bfc33ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53331%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20samcharrington%20RSS%20Digest&amp;severity=null&amp;id=685ea034f6cf9081996a7a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53329-cwe-352-cross-site-request-forgery--87139fed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53329%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20szajenw%20Spo%C5%82eczno%C5%9Bciowa%206%20PL%202013&amp;severity=null&amp;id=685ea034f6cf9081996a7a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53327-cwe-352-cross-site-request-forgery--305d3baf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53327%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rui_mashita%20Aioseo%20Multibyte%20Descriptions&amp;severity=null&amp;id=685ea034f6cf9081996a7a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53325-cwe-79-improper-neutralization-of-i-25b3e80f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53325%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dilip%20kumar%20Beauty%20Contact%20Popup%20Form&amp;severity=null&amp;id=685ea034f6cf9081996a7a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53323-cwe-862-missing-authorization-in-da-f225da1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53323%3A%20Missing%20Authorization%20in%20danbriapps%20Pre-Publish%20Post%20Checklist&amp;severity=null&amp;id=685ea034f6cf9081996a7a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53322-cwe-201-insertion-of-sensitive-info-b43d6fc4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53322%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ZealousWeb%20Accept%20Authorize.NET%20Payments%20Using%20Contact%20Form%207&amp;severity=null&amp;id=685ea034f6cf9081996a7a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53320-cwe-79-improper-neutralization-of-i-1468443c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wp%20Enhanced%20Free%20Downloads%20EDD&amp;severity=medium&amp;id=685ea034f6cf9081996a7a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53318-cwe-862-missing-authorization-in-wp-e5cef7bf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53318%3A%20Missing%20Authorization%20in%20WPManiax%20WP%20DB%20Booster&amp;severity=null&amp;id=685ea034f6cf9081996a7a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53317-cwe-352-cross-site-request-forgery--840cb435</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53317%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AcmeeDesign%20WPShapere%20-%20WordPress%20admin%20theme&amp;severity=null&amp;id=685ea034f6cf9081996a7a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53315-cwe-352-cross-site-request-forgery--729956e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53315%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alanft%20Relocate%20Upload&amp;severity=null&amp;id=685ea034f6cf9081996a79ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53314-cwe-352-cross-site-request-forgery--750bfeb3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53314%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sh1zen%20WP%20Optimizer&amp;severity=null&amp;id=685ea033f6cf9081996a79f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53313-cwe-352-cross-site-request-forgery--1b9ffb1d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53313%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20plumwd%20Twitch%20TV%20Embed%20Suite&amp;severity=null&amp;id=685ea033f6cf9081996a79ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53312-cwe-352-cross-site-request-forgery--a029248e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53312%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Looks%20Awesome%20OnionBuzz&amp;severity=null&amp;id=685ea033f6cf9081996a79ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53311-cwe-352-cross-site-request-forgery--6a4e6c36</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53311%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Amol%20Nirmala%20Waman%20Navayan%20Subscribe&amp;severity=null&amp;id=685ea033f6cf9081996a79e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53310-cwe-352-cross-site-request-forgery--c11997ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53310%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Funnnny%20HidePost&amp;severity=null&amp;id=685ea033f6cf9081996a79e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53309-cwe-201-insertion-of-sensitive-info-1e89c174</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53309%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ZealousWeb%20Accept%20Stripe%20Payments%20Using%20Contact%20Form%207&amp;severity=null&amp;id=685ea033f6cf9081996a79e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53308-cwe-352-cross-site-request-forgery--299d70bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53308%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gopi_plus%20Image%20Slider%20With%20Description&amp;severity=null&amp;id=685ea033f6cf9081996a79e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53306-cwe-89-improper-neutralization-of-s-4a82f755</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53306%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20lucidcrew%20WP%20Forum%20%20Server&amp;severity=null&amp;id=685ea033f6cf9081996a79dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53305-cwe-352-cross-site-request-forgery--bc25504d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53305%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lucidcrew%20WP%20Forum%20%20Server&amp;severity=null&amp;id=685ea033f6cf9081996a79da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53304-cwe-862-missing-authorization-in-ro-081e8cb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53304%3A%20Missing%20Authorization%20in%20Rohil%20Contact%20Form%20%26%238211%3B%207%20%3A%20Hide%20Success%20Message&amp;severity=null&amp;id=685ea033f6cf9081996a79d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53301-cwe-79-improper-neutralization-of-i-3c81775b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53301%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Theme%20Junkie%20Theme%20Junkie%20Team%20Content&amp;severity=null&amp;id=685ea033f6cf9081996a79ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53300-cwe-79-improper-neutralization-of-i-ccfeb11a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53300%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20douglaskarr%20Podcast%20Feed%20Player%20Widget%20and%20Shortcode&amp;severity=null&amp;id=685ea033f6cf9081996a79c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53298-cwe-22-improper-limitation-of-a-pat-f3ae68c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53298%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gioni%20Plugin%20Inspector&amp;severity=null&amp;id=685ea033f6cf9081996a79c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53296-cwe-79-improper-neutralization-of-i-4d1cb01d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ecoal95%20EC%20Stars%20Rating&amp;severity=null&amp;id=685ea033f6cf9081996a79c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53295-cwe-862-missing-authorization-in-ic-9b3e1cb5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53295%3A%20Missing%20Authorization%20in%20iCount%20iCount%20Payment%20Gateway&amp;severity=null&amp;id=685ea033f6cf9081996a79be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53293-cwe-862-missing-authorization-in-mo-2c9a4d8b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53293%3A%20Missing%20Authorization%20in%20Morten%20Dalgaard%20Johansen%20Dashboard%20Widget%20Sidebar&amp;severity=null&amp;id=685ea033f6cf9081996a79bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53292-cwe-79-improper-neutralization-of-i-bd904e2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samsk%20WP%20DataTable&amp;severity=null&amp;id=685ea033f6cf9081996a79b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53290-cwe-79-improper-neutralization-of-i-ea8476b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53290%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MS%20WP%20Visual%20Sitemap&amp;severity=null&amp;id=685ea033f6cf9081996a79b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53288-cwe-862-missing-authorization-in-ad-ed2a2e21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53288%3A%20Missing%20Authorization%20in%20Adrian%20Lad%C3%B3%20PlatiOnline%20Payments&amp;severity=null&amp;id=685ea033f6cf9081996a79b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53287-cwe-79-improper-neutralization-of-i-ce7fd788</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53287%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20Cummings%20Quick%20Favicon&amp;severity=null&amp;id=685ea033f6cf9081996a79af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53285-cwe-79-improper-neutralization-of-i-c7f055b3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53285%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Website%20Flip%20Add%20%26amp%3B%20Replace%20Affiliate%20Links%20for%20Amazon&amp;severity=null&amp;id=685ea033f6cf9081996a79a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53284-cwe-862-missing-authorization-in-pa-21cb1f7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53284%3A%20Missing%20Authorization%20in%20pankaj.sakaria%20CMS%20Blocks&amp;severity=null&amp;id=685ea033f6cf9081996a799f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53282-cwe-79-improper-neutralization-of-i-6ab0555a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53282%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20Thumbnail%20Editor&amp;severity=null&amp;id=685ea033f6cf9081996a799c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53281-cwe-98-improper-control-of-filename-a27cf888</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53281%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WPBean%20WPB%20Category%20Slider%20for%20WooCommerce&amp;severity=null&amp;id=685ea033f6cf9081996a7999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53280-cwe-79-improper-neutralization-of-i-4f3eb7cd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53280%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AntoineH%20Football%20Pool&amp;severity=null&amp;id=685ea033f6cf9081996a7996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53279-cwe-79-improper-neutralization-of-i-4cab3c2b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53279%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aman%20Popup%20addon%20for%20Ninja%20Forms&amp;severity=null&amp;id=685ea033f6cf9081996a7993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53278-cwe-79-improper-neutralization-of-i-236312df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53278%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPeka%20WP%20AdCenter&amp;severity=null&amp;id=685ea033f6cf9081996a7990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53277-cwe-352-cross-site-request-forgery--0a63cfea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53277%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Infigo%20Software%20IS-theme-companion&amp;severity=null&amp;id=685ea033f6cf9081996a798d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53276-cwe-79-improper-neutralization-of-i-6fc7201b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53276%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=null&amp;id=685ea033f6cf9081996a798a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53275-cwe-79-improper-neutralization-of-i-0c084716</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53275%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VaultDweller%20Leyka&amp;severity=null&amp;id=685ea033f6cf9081996a7987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53274-cwe-352-cross-site-request-forgery--51df8513</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53274%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hossin%20Asaadi%20WP%20Permalink%20Translator&amp;severity=null&amp;id=685ea032f6cf9081996a7970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53272-cwe-352-cross-site-request-forgery--6770daf3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53272%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20opicron%20Image%20Cleanup&amp;severity=null&amp;id=685ea032f6cf9081996a796d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53271-cwe-352-cross-site-request-forgery--98673ec0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53271%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Anton%20Bond%20Additional%20Order%20Filters%20for%20WooCommerce&amp;severity=null&amp;id=685ea032f6cf9081996a796a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53270-cwe-352-cross-site-request-forgery--321b7a19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53270%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Blend%20Media%20WordPress%20CTA&amp;severity=null&amp;id=685ea032f6cf9081996a7967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53269-cwe-352-cross-site-request-forgery--4b2b801b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53269%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imw3%20My%20Wp%20Brand&amp;severity=null&amp;id=685ea032f6cf9081996a7964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53268-cwe-352-cross-site-request-forgery--4285e394</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53268%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ryanpcmcquen%20Import%20external%20attachments&amp;severity=null&amp;id=685ea032f6cf9081996a7961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53267-cwe-352-cross-site-request-forgery--2169bda8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53267%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aftab%20Husain%20Hide%20Admin%20Bar%20From%20Front%20End&amp;severity=null&amp;id=685ea032f6cf9081996a795e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53266-cwe-862-missing-authorization-in-ed-5ac64eae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53266%3A%20Missing%20Authorization%20in%20EdwardBock%20Cron%20Logger&amp;severity=null&amp;id=685ea032f6cf9081996a795b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53265-cwe-352-cross-site-request-forgery--96744fb4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53265%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Elena%20Yamshikova%20Virusdie&amp;severity=medium&amp;id=685ea032f6cf9081996a7958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53264-cwe-352-cross-site-request-forgery--60b1e09f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53264%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Konr%C3%A1d%20Koller%20ONet%20Regenerate%20Thumbnails&amp;severity=null&amp;id=685ea032f6cf9081996a7955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53263-cwe-352-cross-site-request-forgery--75d5c15a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53263%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PluginsCafe%20Address%20Autocomplete%20via%20Google%20for%20Gravity%20Forms&amp;severity=null&amp;id=685ea032f6cf9081996a7948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53261-cwe-352-cross-site-request-forgery--13897892</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53261%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20macbookandrew%20WP%20YouTube%20Live&amp;severity=null&amp;id=685ea032f6cf9081996a7945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53260-cwe-434-unrestricted-upload-of-file-4c660354</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53260%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20getredhawkstudio%20File%20Manager%20Plugin%20For%20Wordpress&amp;severity=null&amp;id=685ea032f6cf9081996a7942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53259-cwe-98-improper-control-of-filename-ad2a9d9e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53259%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nicdark%20Hotel%20Booking&amp;severity=null&amp;id=685ea032f6cf9081996a793f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53258-cwe-89-improper-neutralization-of-s-fab22dc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53258%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Wow-Company%20Hover%20Effects&amp;severity=null&amp;id=685ea032f6cf9081996a793c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53257-cwe-98-improper-control-of-filename-b03791e4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53257%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Serhii%20Pasyuk%20Gmedia%20Photo%20Gallery&amp;severity=null&amp;id=685ea032f6cf9081996a7939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53256-cwe-89-improper-neutralization-of-s-0ab3574c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53256%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YaySMTP&amp;severity=null&amp;id=685ea032f6cf9081996a7936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53255-cwe-862-missing-authorization-in-na-5614da61</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53255%3A%20Missing%20Authorization%20in%20Nabil%20Lemsieh%20HurryTimer&amp;severity=null&amp;id=685ea032f6cf9081996a7933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53254-cwe-352-cross-site-request-forgery--7e7bde82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53254%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themeisle%20Cyrlitera&amp;severity=null&amp;id=685ea032f6cf9081996a7930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53253-cwe-79-improper-neutralization-of-i-50a0edce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53253%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20WP%20Edit&amp;severity=null&amp;id=685ea032f6cf9081996a792d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53211-cwe-497-exposure-of-sensitive-syste-d666a87c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53211%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Roland%20Beaussant%20Audio%20Editor%20%26amp%3B%20Recorder&amp;severity=null&amp;id=685ea032f6cf9081996a7920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53206-cwe-79-improper-neutralization-of-i-45c3e9a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53206%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=685ea032f6cf9081996a791d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53203-cwe-352-cross-site-request-forgery--1ffc0f24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53203%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EDGARROJAS%20WooCommerce%20PDF%20Invoice%20Builder&amp;severity=null&amp;id=685ea032f6cf9081996a791a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53202-cwe-79-improper-neutralization-of-i-52976222</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53202%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=null&amp;id=685ea032f6cf9081996a7917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53200-cwe-862-missing-authorization-in-qu-abcdf374</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53200%3A%20Missing%20Authorization%20in%20QuantumCloud%20ChatBot&amp;severity=null&amp;id=685ea032f6cf9081996a7914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53199-cwe-79-improper-neutralization-of-i-c263c2ff</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53199%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Slider%20For%20Elementor&amp;severity=null&amp;id=685ea032f6cf9081996a7911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53193-cwe-352-cross-site-request-forgery--7fa20099</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53193%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Burst%20Statistics%20B.V.%20Burst%20Statistics&amp;severity=null&amp;id=685ea032f6cf9081996a790e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6767-sql-injection-in-sfturing-hosporder-0c2a4589</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6767%3A%20SQL%20Injection%20in%20sfturing%20hosp_order&amp;severity=medium&amp;id=685e9924f6cf9081996a6060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53018-cwe-918-server-side-request-forgery-d46a97d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53018%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=685e9924f6cf9081996a605c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6766-sql-injection-in-sfturing-hosporder-fb34d23f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6766%3A%20SQL%20Injection%20in%20sfturing%20hosp_order&amp;severity=medium&amp;id=685e921cf6cf9081996887a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40910-cwe-1287-improper-validation-of-spe-0df7d0d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40910%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20TPODER%20Net%3A%3AIP%3A%3ALPM&amp;severity=medium&amp;id=685e8ea2f6cf908199682bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6765-permission-issues-in-intelbras-incon-31a9b7b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6765%3A%20Permission%20Issues%20in%20Intelbras%20InControl&amp;severity=medium&amp;id=685e8c6cca1063fb875df1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24765-cwe-22-improper-limitation-of-a-pat-ed627665</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24765%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RobMarsh%20Image%20Shadow&amp;severity=null&amp;id=685e88edca1063fb875de472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24769-cwe-98-improper-control-of-filename-a89741bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24769%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Zenny&amp;severity=null&amp;id=685e88edca1063fb875de475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24774-cwe-79-improper-neutralization-of-i-d88a37e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24774%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojoomla%20WPCRM%20-%20CRM%20for%20Contact%20form%20CF7%20%26%20WooCommerce&amp;severity=null&amp;id=685e88edca1063fb875de478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25171-cwe-288-authentication-bypass-using-60510568</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25171%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Convers%20Lab%20WP%20SmartPay&amp;severity=null&amp;id=685e88edca1063fb875de47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25173-cwe-79-improper-neutralization-of-i-eb681ee3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25173%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FasterThemes%20FastBook&amp;severity=null&amp;id=685e88edca1063fb875de47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27361-cwe-79-improper-neutralization-of-i-0ea4b9ed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thhake%20Photo%20Express%20for%20Google&amp;severity=null&amp;id=685e88edca1063fb875de481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28946-cwe-98-improper-control-of-filename-0af62d0a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28946%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20PrintXtore&amp;severity=null&amp;id=685e88edca1063fb875de484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28947-cwe-98-improper-control-of-filename-f8273b63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28947%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20MBStore%20-%20Digital%20WooCommerce%20WordPress%20Theme&amp;severity=null&amp;id=685e88edca1063fb875de491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28956-cwe-79-improper-neutralization-of-i-ad002c09</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28956%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphobby%20Backwp&amp;severity=null&amp;id=685e88edca1063fb875de494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28960-cwe-79-improper-neutralization-of-i-6463047b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20regibaer%20Evangelische%20Termine&amp;severity=null&amp;id=685e88edca1063fb875de497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28970-cwe-502-deserialization-of-untruste-bb4ef810</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28970%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pep.vn%20WP%20Optimize%20By%20xTraffic&amp;severity=null&amp;id=685e88edca1063fb875de49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28988-cwe-79-improper-neutralization-of-i-e2a34a80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aharonyan%20WP%20Front%20User%20Submit%20%2F%20Front%20Editor&amp;severity=null&amp;id=685e88edca1063fb875de49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28990-cwe-98-improper-control-of-filename-0930fe5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28990%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20SNS%20Vicky&amp;severity=null&amp;id=685e88edca1063fb875de4a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28993-cwe-94-improper-control-of-generati-ff6caace</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28993%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jose%20Mortellaro%20Content%20No%20Cache&amp;severity=null&amp;id=685e88edca1063fb875de4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28998-cwe-98-improper-control-of-filename-ce2b5789</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28998%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20serpednet%20SERPed.net&amp;severity=null&amp;id=685e88edca1063fb875de4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30972-cwe-79-improper-neutralization-of-i-31bc519b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30972%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iamapinan%20Woocommerce%20Line%20Notify&amp;severity=null&amp;id=685e88edca1063fb875de4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30992-cwe-98-improper-control-of-filename-281dd446</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Puca&amp;severity=null&amp;id=685e88edca1063fb875de4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31067-cwe-79-improper-neutralization-of-i-b6d99782</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeton%20Seven%20Stars&amp;severity=high&amp;id=685e88eeca1063fb875de4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31428-cwe-79-improper-neutralization-of-i-214bd05e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31428%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddhaThemes%20HYDRO&amp;severity=null&amp;id=685e88eeca1063fb875de4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32281-cwe-862-missing-authorization-in-fo-14be01ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32281%3A%20CWE-862%20Missing%20Authorization%20in%20FocuxTheme%20WPKit%20For%20Elementor&amp;severity=critical&amp;id=685e88eeca1063fb875de4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32298-cwe-98-improper-control-of-filename-c674b72b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32298%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Case-Themes%20CTUsers&amp;severity=null&amp;id=685e88eeca1063fb875de4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39474-cwe-89-improper-neutralization-of-s-8bd2faf8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39474%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ThemeMove%20Amely&amp;severity=null&amp;id=685e88eeca1063fb875de4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39478-cwe-79-improper-neutralization-of-i-e43a52c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39478%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartiolabs%20Smart%20Notification&amp;severity=high&amp;id=685e88eeca1063fb875de4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39488-cwe-79-improper-neutralization-of-i-a65251c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39488%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sneeit%20MagOne&amp;severity=null&amp;id=685e88eeca1063fb875de4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47574-cwe-79-improper-neutralization-of-i-c351d7f6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojoomla%20School%20Management&amp;severity=high&amp;id=685e88eeca1063fb875de4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47654-cwe-79-improper-neutralization-of-i-ed0c04a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47654%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Tobey%20FormLift%20for%20Infusionsoft%20Web%20Forms&amp;severity=null&amp;id=685e88eeca1063fb875de4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49290-cwe-79-improper-neutralization-of-i-f31c3378</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49290%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jory%20Hogeveen%20Off-Canvas%20Sidebars%20%26%20Menus%20(Slidebars)&amp;severity=null&amp;id=685e88eeca1063fb875de4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49321-cwe-79-improper-neutralization-of-i-ca70b248</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49321%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=685e88eeca1063fb875de4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49883-cwe-98-improper-control-of-filename-3447a23b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49883%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Greenmart&amp;severity=null&amp;id=685e88eeca1063fb875de4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49885-cwe-434-unrestricted-upload-of-file-4f0fd1e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49885%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HaruTheme%20Drag%20and%20Drop%20Multiple%20File%20Upload%20(Pro)%20-%20WooCommerce&amp;severity=null&amp;id=685e88eeca1063fb875de4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49886-cwe-98-improper-control-of-filename-cce18086</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49886%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebGeniusLab%20Zikzag%20Core&amp;severity=null&amp;id=685e88eeca1063fb875de4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50052-cwe-79-improper-neutralization-of-i-05bf5c0b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50052%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexostudio%20Flexo%20Counter&amp;severity=null&amp;id=685e88eeca1063fb875de4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52709-cwe-502-deserialization-of-untruste-e168c6b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52709&amp;severity=null&amp;id=685e88eeca1063fb875de4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52717-cwe-89-improper-neutralization-of-s-dbfbb7f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52717%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chrisbadgett%20LifterLMS&amp;severity=null&amp;id=685e88eeca1063fb875de4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52722-cwe-89-improper-neutralization-of-s-0f19fd4f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52722%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoinWebs%20Classiera&amp;severity=null&amp;id=685e88eeca1063fb875de509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52723-cwe-98-improper-control-of-filename-e95940c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52723%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20codesupplyco%20Networker&amp;severity=null&amp;id=685e88eeca1063fb875de50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52724-cwe-502-deserialization-of-untruste-5372c816</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52724%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Amwerk&amp;severity=null&amp;id=685e88eeca1063fb875de50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52725-cwe-502-deserialization-of-untruste-2e87d00e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52725%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pebas%20CouponXxL&amp;severity=null&amp;id=685e88eeca1063fb875de512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52726-cwe-266-incorrect-privilege-assignm-c7ac0032</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52726%3A%20Incorrect%20Privilege%20Assignment%20in%20pebas%20CouponXxL%20Custom%20Post%20Types&amp;severity=null&amp;id=685e88eeca1063fb875de515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52727-cwe-79-improper-neutralization-of-i-fcde5783</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52727%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20CSS3%20Vertical%20Web%20Pricing%20Tables&amp;severity=null&amp;id=685e88eeca1063fb875de518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52729-cwe-98-improper-control-of-filename-8ebe96c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52729%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=null&amp;id=685e88eeca1063fb875de51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52774-cwe-79-improper-neutralization-of-i-c29874ea</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52774%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infility%20Infility%20Global&amp;severity=null&amp;id=685e88eeca1063fb875de51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52778-cwe-79-improper-neutralization-of-i-cdad83d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-dictionary&amp;severity=null&amp;id=685e88eeca1063fb875de521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52799-cwe-79-improper-neutralization-of-i-21f39d36</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52799%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20LMS&amp;severity=null&amp;id=685e88eeca1063fb875de524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52808-cwe-98-improper-control-of-filename-a9cb89a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52808%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20real-web%20RealtyElite&amp;severity=null&amp;id=685e88efca1063fb875de533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52809-cwe-98-improper-control-of-filename-e2d82422</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52809%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20John%20Russell%20National%20Weather%20Service%20Alerts&amp;severity=null&amp;id=685e88efca1063fb875de536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52810-cwe-35-path-traversal-in-tmrw-studi-1b3a0d08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52810%3A%20CWE-35%20Path%20Traversal%20in%20TMRW-studio%20Katerio%20-%20Magazine&amp;severity=high&amp;id=685e88efca1063fb875de539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52811-cwe-35-path-traversal-in-creanncy-d-47e17844</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52811%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Creanncy%20Davenport%20-%20Versatile%20Blog%20and%20Magazine%20WordPress%20Theme&amp;severity=null&amp;id=685e88efca1063fb875de53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52812-cwe-98-improper-control-of-filename-7baf7c34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52812%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusWP%20Domnoo&amp;severity=null&amp;id=685e88efca1063fb875de53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52814-cwe-98-improper-control-of-filename-6ccb6549</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52814%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20BRW&amp;severity=null&amp;id=685e88efca1063fb875de542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52815-cwe-98-improper-control-of-filename-660aea32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52815%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20CityGov&amp;severity=null&amp;id=685e88efca1063fb875de545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52816-cwe-98-improper-control-of-filename-b3b2f1df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52816%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themehunk%20Zita&amp;severity=null&amp;id=685e88efca1063fb875de548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52817-cwe-862-missing-authorization-in-ze-8a36124d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52817%3A%20Missing%20Authorization%20in%20ZealousWeb%20Abandoned%20Contact%20Form%207&amp;severity=null&amp;id=685e88efca1063fb875de54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52818-cwe-862-missing-authorization-in-de-519daf22</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52818%3A%20Missing%20Authorization%20in%20Dejan%20Jasnic%20Trusty%20Whistleblowing&amp;severity=null&amp;id=685e88efca1063fb875de54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52824-cwe-862-missing-authorization-in-md-cc243691</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52824%3A%20Missing%20Authorization%20in%20MDJM%20Mobile%20DJ%20Manager&amp;severity=null&amp;id=685e88efca1063fb875de55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52826-cwe-502-deserialization-of-untruste-41d40406</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52826%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20uxper%20Sala&amp;severity=high&amp;id=685e88efca1063fb875de55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52827-cwe-502-deserialization-of-untruste-2edfce2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52827%3A%20Deserialization%20of%20Untrusted%20Data%20in%20uxper%20Nuss&amp;severity=null&amp;id=685e88efca1063fb875de561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52829-cwe-89-improper-neutralization-of-s-05776123</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52829%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20DirectIQ%20DirectIQ%20Email%20Marketing&amp;severity=null&amp;id=685e88efca1063fb875de564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52834-cwe-89-improper-neutralization-of-s-c9b93313</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52834%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20favethemes%20Homey&amp;severity=null&amp;id=685e88efca1063fb875de567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23967-cwe-89-improper-neutralization-of-s-85024121</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23967%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpopal%20GG%20Bought%20Together%20for%20WooCommerce&amp;severity=null&amp;id=685e88edca1063fb875de469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23973-cwe-79-improper-neutralization-of-i-db6431bc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dugudlabs%20SpecFit-Virtual%20Try%20On%20Woocommerce&amp;severity=null&amp;id=685e88edca1063fb875de46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24760-cwe-98-improper-control-of-filename-ae440632</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24760%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Sofass&amp;severity=null&amp;id=685e88edca1063fb875de46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49416-cwe-98-improper-control-of-filename-47170b33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49416%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Fastw3b%20LLC%20FW%20Gallery&amp;severity=null&amp;id=685e88eeca1063fb875de4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49423-cwe-79-improper-neutralization-of-i-d556aacf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49423%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Tahir%20Ali%20Jan%20Bulk%20YouTube%20Post%20Creator&amp;severity=null&amp;id=685e88eeca1063fb875de4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49448-cwe-22-improper-limitation-of-a-pat-e0f24c3a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49448%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Fastw3b%20LLC%20FW%20Food%20Menu&amp;severity=high&amp;id=685e88eeca1063fb875de4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/retail-giant-ahold-delhaize-says-data-breach-affec-406b35bf</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Retail%20giant%20Ahold%20Delhaize%20says%20data%20breach%20affects%202.2%20million%20people&amp;severity=high&amp;id=685e8563ca1063fb875a17e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6763-missing-authentication-in-comet-syst-ee113fb4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6763%3A%20Missing%20Authentication%20in%20Comet%20System%20T0510&amp;severity=critical&amp;id=685e81e0ca1063fb8759fc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6762-server-side-request-forgery-in-diyhi-59faa74c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6762%3A%20Server-Side%20Request%20Forgery%20in%20diyhi%20bbs&amp;severity=medium&amp;id=685e81e0ca1063fb8759fbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hawaiian-airlines-discloses-cyberattack-flights-no-ed2f1460</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hawaiian%20Airlines%20discloses%20cyberattack%2C%20flights%20not%20affected&amp;severity=high&amp;id=685e7753ca1063fb87578a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whole-foods-supplier-unfi-restores-core-systems-af-fd2f1bc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Whole%20Foods%20supplier%20UNFI%20restores%20core%20systems%20after%20cyberattack&amp;severity=high&amp;id=685e7753ca1063fb87578a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oneclik-malware-targets-energy-sector-using-micros-fa50968a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OneClik%20Malware%20Targets%20Energy%20Sector%20Using%20Microsoft%20ClickOnce%20and%20Golang%20Backdoors&amp;severity=high&amp;id=685e7753ca1063fb87578a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/moveit-transfer-faces-increased-threats-as-scannin-e9ddbab1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MOVEit%20Transfer%20Faces%20Increased%20Threats%20as%20Scanning%20Surges%20and%20CVE%20Flaws%20Are%20Targeted&amp;severity=high&amp;id=685e7753ca1063fb87578a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-free-vpn-apps-on-google-play-and--3066457b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20Free%20VPN%20Apps%20on%20Google%20Play%20and%20App%20Stores%20Could%20Leak%20US%20Data%20to%20China&amp;severity=medium&amp;id=685e7753ca1063fb87578a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6761-improper-neutralization-of-special-e-78b086ff</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6761%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Kingdee%20Cloud-Starry-Sky%20Enterprise%20Edition&amp;severity=medium&amp;id=685e73ceca1063fb8757515a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5398-cwe-79-improper-neutralization-of-in-2513ef40</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=685e65beca1063fb8756abf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/getting-a-career-in-cybersecurity-isnt-easy-but-th-cd91d8a3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Getting%20a%20career%20in%20cybersecurity%20isn&apos;t%20easy%2C%20but%20this%20can%20help&amp;severity=medium&amp;id=685ec5ca6f40f0eb726521d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12827-cwe-620-unverified-password-change--7e594ed8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12827%3A%20CWE-620%20Unverified%20Password%20Change%20in%20scriptsbundle%20DWT%20-%20Directory%20%26%20Listing%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e49b7ef31ef0b59c58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2940-cwe-918-server-side-request-forgery--8d4cc7cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2940%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20techjewel%20Ninja%20Tables%20%E2%80%93%20Easy%20Data%20Table%20Builder&amp;severity=high&amp;id=685e57aeca1063fb875649f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6688-cwe-288-authentication-bypass-using--d208e2ab</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6688%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20idokd%20Simple%20Payment&amp;severity=critical&amp;id=685e499eca1063fb87560142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5936-cwe-352-cross-site-request-forgery-c-ca6cb200</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5936%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20innate-images-llc%20VR%20Calendar&amp;severity=medium&amp;id=685e499eca1063fb87560130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5940-cwe-79-improper-neutralization-of-in-6bbf5a3d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5940%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osompress%20Osom%20Blocks&amp;severity=medium&amp;id=685e499eca1063fb87560134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6550-cwe-79-improper-neutralization-of-in-1a2d63c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6550%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addon&amp;severity=medium&amp;id=685e499eca1063fb87560139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4587-cwe-79-improper-neutralization-of-in-9cdb2510</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnjamesjacoby%20A%2FB%20Testing%20for%20WordPress&amp;severity=medium&amp;id=685e499eca1063fb8756012c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6689-cwe-79-improper-neutralization-of-in-b8303961</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20armandofiore%20FL3R%20Accessibility%20Suite&amp;severity=medium&amp;id=685e499eca1063fb87560146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5526-cwe-639-authorization-bypass-through-1f765cfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5526%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20BuddyPress%20Docs&amp;severity=medium&amp;id=685e380cca1063fb8753f69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5194-cwe-79-cross-site-scripting-xss-in-w-44d87900</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5194%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Map%20Block&amp;severity=medium&amp;id=685e380cca1063fb8753f69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5093-cwe-79-cross-site-scripting-xss-in-r-151d1a66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5093%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=685e380cca1063fb8753f698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5035-cwe-79-cross-site-scripting-xss-in-f-f3ff41e7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5035%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Firelight%20Lightbox&amp;severity=medium&amp;id=685e380cca1063fb8753f695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41418-buffer-overflow-in-tb-eye-ltd-xrn-4-77939412</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41418%3A%20Buffer%20overflow%20in%20TB-eye%20Ltd.%20XRN-410SN%2FTE&amp;severity=medium&amp;id=6862dd626f40f0eb728ca981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36529-improper-neutralization-of-special--81349574</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36529%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TB-eye%20Ltd.%20XRN-410SN%2FTE&amp;severity=high&amp;id=6862dd626f40f0eb728ca97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ongoing-campaign-abuses-microsoft-365s-direct-send-7708e912</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ongoing%20Campaign%20Abuses%20Microsoft%20365%E2%80%99s%20Direct%20Send%20to%20Deliver%20Phishing%20Emails&amp;severity=high&amp;id=685e22f5ca1063fb874f4897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6488-cwe-79-improper-neutralization-of-in-431edc69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jairoochoa%20isMobile()%20Shortcode%20for%20WordPress&amp;severity=medium&amp;id=685e1f70ca1063fb874f3b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6753-sql-injection-in-huija-bicyclesharin-6a1f0b25</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6753%3A%20SQL%20Injection%20in%20huija%20bicycleSharingServer&amp;severity=medium&amp;id=685e1bebca1063fb874f2cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6752-stack-based-buffer-overflow-in-links-310afaff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6752%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20WRT1900ACS&amp;severity=high&amp;id=685e14e3ca1063fb874f17e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6751-buffer-overflow-in-linksys-e8450-8e4710f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6751%3A%20Buffer%20Overflow%20in%20Linksys%20E8450&amp;severity=high&amp;id=685e117bca1063fb874f03a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6750-heap-based-buffer-overflow-in-hdf5-cfe75bf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6750%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=685e0a57ca1063fb874ed12c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6749-sql-injection-in-huija-bicyclesharin-6edc78ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6749%3A%20SQL%20Injection%20in%20huija%20bicycleSharingServer&amp;severity=medium&amp;id=685dffcbca1063fb874e0964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6748-cleartext-storage-in-a-file-or-on-di-fd542e19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6748%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20Bharti%20Airtel%20Thanks%20App&amp;severity=low&amp;id=685dffcbca1063fb874e095d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6738-sql-injection-in-huija-bicyclesharin-a1bd9986</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6738%3A%20SQL%20Injection%20in%20huija%20bicycleSharingServer&amp;severity=medium&amp;id=685de734ca1063fb874d8f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-27-564784fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-27&amp;severity=medium&amp;id=685f32ae6f40f0eb72691e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44559-na-d2e95e5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44559%3A%20n%2Fa&amp;severity=medium&amp;id=685ed0476f40f0eb72654d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52207-cwe-23-relative-path-traversal-in-m-73dfcbdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52207%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20MIKO%20MikoPBX&amp;severity=critical&amp;id=685ed0476f40f0eb72654d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44557-na-bbfa25d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44557%3A%20n%2Fa&amp;severity=high&amp;id=685eccc36f40f0eb72653af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50367-na-163aa0da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50367%3A%20n%2Fa&amp;severity=medium&amp;id=685ebeb26f40f0eb7265080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50370-na-fee47f00</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50370%3A%20n%2Fa&amp;severity=medium&amp;id=685ebeb26f40f0eb72650807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50369-na-6cce9f23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50369%3A%20n%2Fa&amp;severity=medium&amp;id=685ebeb26f40f0eb72650804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45729-na-f910ed4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45729%3A%20n%2Fa&amp;severity=medium&amp;id=685ea6216f40f0eb7263a4c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44163-na-656c887c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44163%3A%20n%2Fa&amp;severity=medium&amp;id=685ea6216f40f0eb7263a4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52993-cwe-362-concurrent-execution-using--6c3ce1e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52993%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NixOS%20Nix&amp;severity=medium&amp;id=685ea2a26f40f0eb726349de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50528-na-775af79e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50528%3A%20n%2Fa&amp;severity=high&amp;id=685ea2a26f40f0eb726349db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52992-na-17fd70a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52992%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20NixOS%20Nix&amp;severity=low&amp;id=685ea032f6cf9081996a7906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52991-cwe-276-incorrect-default-permissio-241e11bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52991%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20NixOS%20Nix&amp;severity=low&amp;id=685ea032f6cf9081996a78fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46416-cwe-282-improper-ownership-manageme-5118c122</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46416%3A%20CWE-282%20Improper%20Ownership%20Management%20in%20NixOS%20Nix&amp;severity=low&amp;id=685ea032f6cf9081996a78f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46415-cwe-367-time-of-check-time-of-use-t-8af44bd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46415%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20NixOS%20Nix&amp;severity=low&amp;id=685e9caaf6cf9081996a6c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45851-na-5cf1c480</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45851%3A%20n%2Fa&amp;severity=high&amp;id=685e8c6cca1063fb875df1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45737-na-fd96cb99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45737%3A%20n%2Fa&amp;severity=medium&amp;id=685e1bebca1063fb874f2cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47824-cwe-312-cleartext-storage-of-sensit-7e1102d3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47824%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Flock%20Safety%20License%20Plate%20Reader&amp;severity=low&amp;id=685e0a57ca1063fb874ed129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47823-cwe-259-use-of-hard-coded-password--62cf60be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47823%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Flock%20Safety%20License%20Plate%20Reader&amp;severity=low&amp;id=685e0a57ca1063fb874ed126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47822-cwe-1191-on-chip-debug-and-test-int-de8e926e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47822%3A%20CWE-1191%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Flock%20Safety%20License%20Plate%20Reader&amp;severity=medium&amp;id=685e0a57ca1063fb874ed123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47821-cwe-259-use-of-hard-coded-password--4cb95b8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47821%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Flock%20Safety%20Gunshot%20Detection%20devices&amp;severity=low&amp;id=685e0a57ca1063fb874ed120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47820-na-122123c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47820%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Flock%20Safety%20Gunshot%20Detection%20devices&amp;severity=low&amp;id=685dffcbca1063fb874e095a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47819-cwe-1191-on-chip-debug-and-test-int-9ab52485</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47819%3A%20CWE-1191%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Flock%20Safety%20Gunshot%20Detection%20devices&amp;severity=medium&amp;id=685dffcbca1063fb874e0957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47818-cwe-259-use-of-hard-coded-password--38692401</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47818%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Flock%20Safety%20Gunshot%20Detection%20devices&amp;severity=low&amp;id=685dffcbca1063fb874e0954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-an-email-address-crypto-wallet-and-youtube-act-8e655f84</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20an%20Email%20Address%2C%20Crypto%20Wallet%20and%20YouTube%20Activity%20Led%20the%20FBI%20to%20IntelBroker&amp;severity=medium&amp;id=685ddca2ca1063fb874d51ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6736-improper-authorization-in-juzaweb-cm-0216ef9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6736%3A%20Improper%20Authorization%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=685dd920ca1063fb874d26f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6735-improper-authorization-in-juzaweb-cm-7f0e5032</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6735%3A%20Improper%20Authorization%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=685dd91fca1063fb874d26f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6734-buffer-overflow-in-utt-hiper-840g-7d68db41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6734%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=685ea99c6f40f0eb7263bdd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3699-cwe-306-missing-authentication-for-c-5fa3dc0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3699%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mitsubishi%20Electric%20Corporation%20G-50&amp;severity=critical&amp;id=685dce93ca1063fb874c451e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6733-buffer-overflow-in-utt-hiper-840g-93519f64</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6733%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=685dce93ca1063fb874c4522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6732-buffer-overflow-in-utt-hiper-840g-78c74ee2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6732%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=685dc084ca1063fb874a8274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6731-path-traversal-in-yzcheng90-x-spring-c461f82e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6731%3A%20Path%20Traversal%20in%20yzcheng90%20X-SpringBoot&amp;severity=medium&amp;id=685dc084ca1063fb874a826d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5731-generation-of-error-message-containi-8b658f4a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5731%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20infinispan&amp;severity=medium&amp;id=685dbd00ca1063fb874916cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sadfuture-mapping-xdspy-latest-evolution-19ce76e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SadFuture%3A%20Mapping%20XDSpy%20latest%20evolution&amp;severity=medium&amp;id=685dbcffca1063fb874915dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-kimsukys-attacks-on-south-korea-in-dept-66d7e4b6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20Kimsuky&apos;s%20Attacks%20on%20South%20Korea%3A%20In-Depth%20Analysis%20of%20GitHub-Based%20Malicious%20Infrastructure&amp;severity=medium&amp;id=685dbcffca1063fb8749169d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-exploit-social-security-statement-theme-to--26df1441</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Exploit%20Social%20Security%20Statement%20Theme%20to%20Target%20Over%202%2C000%20Victims%20with%20Malware&amp;severity=medium&amp;id=685db983ca1063fb87490362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shoe-rack-a-post-exploitation-tool-for-remote-shel-a1641051</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SHOE%20RACK%3A%20A%20post-exploitation%20tool%20for%20remote%20shell%20access%20%26%20TCP%20tunnelling%20through%20a%20victim%20device&amp;severity=medium&amp;id=685db983ca1063fb87490368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-educated-manticore-targets-leading-tech-ac-30b6185d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Educated%20Manticore%20Targets%20Leading%20Tech%20Academics&amp;severity=medium&amp;id=685db5f7ca1063fb8748f6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53122-cwe-89-improper-neutralization-of-s-2e223c61</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53122%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20The%20OpenNMS%20Group%20Horizon&amp;severity=medium&amp;id=685da7e9ca1063fb8748af04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49592-cwe-601-url-redirection-to-untruste-61c85965</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49592%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=685da483ca1063fb8744e14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/man-pleads-guilty-to-hacking-networks-to-pitch-sec-33ec9b13</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Man%20pleads%20guilty%20to%20hacking%20networks%20to%20pitch%20security%20services&amp;severity=high&amp;id=685da464ca1063fb8744e0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-max-severity-rce-flaws-in-identity--1cc0ad15</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20of%20max%20severity%20RCE%20flaws%20in%20Identity%20Services%20Engine&amp;severity=high&amp;id=685da464ca1063fb8744e0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-student-charged-over-hacking-university-for-che-15146df5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-student%20charged%20over%20hacking%20university%20for%20cheap%20parking%2C%20data%20breaches&amp;severity=high&amp;id=685da464ca1063fb8744e0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5995-cwe-732-incorrect-permission-assignm-1844fd88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5995%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Canon%20USA%20Inc.%20Canon%20EOS%20Webcam%20Utility%20Pro&amp;severity=medium&amp;id=685d9d5eca1063fb8744d17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53121-cwe-79-improper-neutralization-of-i-fd7bdf36</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53121%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20OpenNMS%20Group%20Horizon&amp;severity=medium&amp;id=685d99d8ca1063fb8744adee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53013-cwe-287-improper-authentication-in--6728bb9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53013%3A%20CWE-287%3A%20Improper%20Authentication%20in%20himmelblau-idm%20himmelblau&amp;severity=medium&amp;id=685d8f4dca1063fb87448e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/black-hat-seo-poisoning-search-engine-results-for--06a1a93b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Black%20Hat%20SEO%20Poisoning%20Search%20Engine%20Results%20For%20AI%20to%20Distribute%20Malware&amp;severity=medium&amp;id=685db273ca1063fb8748d2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abuse-open-source-tools-to-target-a-91909d0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abuse%20Open-Source%20Tools%20To%20Target%20Africa&apos;s%20Financial%20Sector&amp;severity=medium&amp;id=685db273ca1063fb8748d2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52477-cwe-918-server-side-request-forgery-429a8d6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52477%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20octo-sts%20app&amp;severity=high&amp;id=685e9caaf6cf9081996a6c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-login-page-becomes-the-frontline-lessons-ff6e5def</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Your%20Login%20Page%20Becomes%20the%20Frontline%3A%20Lessons%20from%20a%20Real-World%20DDoS%20Attack&amp;severity=medium&amp;id=685d7a58ca1063fb8742ff89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34047-cwe-22-improper-limitation-of-a-pat-2b7d8032</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34047%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Beijing%20NetGuard%20Nebula%20Information%20Technology%20Co.%2C%20Ltd.%20Leadsec%20SSL%20VPN&amp;severity=high&amp;id=685d732dca1063fb8742c4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6702-improper-authorization-in-linlinjava-2b5b27bb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6702%3A%20Improper%20Authorization%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=685d6fabca1063fb8742bbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6701-open-redirect-in-xuxueli-xxl-sso-fb65af97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6701%3A%20Open%20Redirect%20in%20Xuxueli%20xxl-sso&amp;severity=medium&amp;id=685d6fabca1063fb8742bbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34049-cwe-78-improper-neutralization-of-s-410849dd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34049%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20OptiLink%20ONT1GEW%20GPON&amp;severity=critical&amp;id=685d6fabca1063fb8742bc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34048-cwe-22-improper-limitation-of-a-pat-da453f9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34048%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20D-Link%20DSL-2730U&amp;severity=high&amp;id=685d6fabca1063fb8742bc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34046-cwe-434-unrestricted-upload-of-file-dae91445</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34046%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Shanghai%20Fanwei%20Network%20Technology%20E-Office&amp;severity=critical&amp;id=685d6fabca1063fb8742bc09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34045-cwe-22-improper-limitation-of-a-pat-768a1591</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34045%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Shenzhen%20Yuanmengyun%20Technology%20Co.%2C%20Ltd.%20WeiPHP&amp;severity=high&amp;id=685d6fabca1063fb8742bc04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34044-cwe-78-improper-neutralization-of-s-b65d5c0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34044%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Lingkong%20Technology%20WIFISKY%207-layer%20flow%20control%20router&amp;severity=critical&amp;id=685d6fabca1063fb8742bbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34043-cwe-78-improper-neutralization-of-s-3be769f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34043%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Vacron%20Network%20Video%20Recorder%20(NVR)&amp;severity=critical&amp;id=685d6fabca1063fb8742bbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34042-cwe-78-improper-neutralization-of-s-90e717f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34042%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Beward%20N100%20IP%20Camera&amp;severity=critical&amp;id=685d6fabca1063fb8742bbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6700-cross-site-scripting-in-xuxueli-xxl--97856b1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6700%3A%20Cross%20Site%20Scripting%20in%20Xuxueli%20xxl-sso&amp;severity=medium&amp;id=685d6c25ca1063fb8742933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6699-cross-site-scripting-in-labredescefe-adc4acda</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6699%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d6c25ca1063fb87429338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36034-cwe-319-cleartext-transmission-of-s-621c1640</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36034%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=685d651dca1063fb874274d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6698-cross-site-scripting-in-labredescefe-5dcf952f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6698%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d651dca1063fb874274df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6697-cross-site-scripting-in-labredescefe-7bfba8e9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6697%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d651dca1063fb874274d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53007-cwe-113-improper-neutralization-of--e38a12c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53007%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20espressif%20arduino-esp32&amp;severity=high&amp;id=685d5e15ca1063fb8742460b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53002-cwe-94-improper-control-of-generati-676f1b8a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53002%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20hiyouga%20LLaMA-Factory&amp;severity=high&amp;id=685d5e15ca1063fb87424606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52887-cwe-400-uncontrolled-resource-consu-002cb24c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52887%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=685d5e16ca1063fb87424617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6696-cross-site-scripting-in-labredescefe-3014a32e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6696%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d5e15ca1063fb87424611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6710-cwe-674-uncontrolled-recursion-in-mo-b44d615d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6710%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=685d570dca1063fb8741f4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52573-cwe-78-improper-neutralization-of-s-6f9863eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52573%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20joshuayoes%20ios-simulator-mcp&amp;severity=medium&amp;id=685d570dca1063fb8741f497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6709-cwe-20-improper-input-validation-in--ac753966</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6709%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=685d570dca1063fb8741f4a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6707-cwe-863-incorrect-authorization-in-m-57ca4429</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6707%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=685d570dca1063fb8741f49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6706-cwe-416-use-after-free-in-mongodb-in-0ead070d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6706%3A%20CWE-416%3A%20Use%20After%20Free%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=685d8844ca1063fb874372ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-beyond-the-patch-a-public-interest-hunt-f-c8dbec36</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20Beyond%20the%20Patch%3A%20A%20Public-Interest%20Hunt%20for%20Hidden%20Shells&amp;severity=medium&amp;id=685d538eca1063fb8741e2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6677-cwe-79-improper-neutralization-of-in-eaaf647e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6677%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Paragraphs%20table&amp;severity=high&amp;id=685d5007ca1063fb8741d93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6676-cwe-79-improper-neutralization-of-in-147ac687</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6676%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Simple%20XML%20sitemap&amp;severity=high&amp;id=685d5007ca1063fb8741d93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6675-cwe-288-authentication-bypass-using--2a34fbd7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6675%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=medium&amp;id=685d5007ca1063fb8741d937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6674-cwe-79-improper-neutralization-of-in-97abd6ae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6674%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20CKEditor5%20Youtube&amp;severity=medium&amp;id=685d5007ca1063fb8741d934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5682-cwe-79-improper-neutralization-of-in-d66edece</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Klaro%20Cookie%20%26%20Consent%20Management&amp;severity=medium&amp;id=685d5007ca1063fb8741d931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48921-cwe-352-cross-site-request-forgery--81423e84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48921%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Open%20Social&amp;severity=high&amp;id=685d5007ca1063fb8741d928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48922-cwe-79-improper-neutralization-of-i-35b47c76</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20GLightbox&amp;severity=medium&amp;id=685d5007ca1063fb8741d92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48923-cwe-79-improper-neutralization-of-i-def346ac</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Toc.js&amp;severity=medium&amp;id=685d5007ca1063fb8741d92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6695-cross-site-scripting-in-labredescefe-347b3293</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6695%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d5007ca1063fb8741d946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6694-cross-site-scripting-in-labredescefe-5eb64924</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6694%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d5007ca1063fb8741d940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6693-memory-corruption-in-rt-thread-752bc7a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6693%3A%20Memory%20Corruption%20in%20RT-Thread&amp;severity=high&amp;id=685d48feca1063fb8741c2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5966-cwe-79-improper-neutralization-of-in-ea25dce9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=685d3e71ca1063fb87418b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5366-cwe-79-improper-neutralization-of-in-4711de9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5366%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=685d3e71ca1063fb87418b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6562-cwe-78-improper-neutralization-of-sp-1eb379f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6562%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hunt%20Electronic%20Hybrid%20DVR&amp;severity=high&amp;id=685d3aedca1063fb87418066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6561-cwe-497-exposure-of-sensitive-system-b3ac79e7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6561%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Hunt%20Electronic%20HBF-09KD&amp;severity=critical&amp;id=685d376bca1063fb87417329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marketplace-takeover-how-we-couldve-taken-over-eve-b63229dd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marketplace%20Takeover%3A%20How%20We%20Could%E2%80%99ve%20Taken%20Over%20Every%20Developer%20Using%20a%20VSCode%20Fork%20-%20Putting%20Millions%20at%20Risk&amp;severity=medium&amp;id=685d2ce3ca1063fb874146a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3771-cwe-59-improper-link-resolution-befo-c10e8f72</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3771%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Trellix%20System%20Information%20Reporter&amp;severity=high&amp;id=685d2cdeca1063fb8741469d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-turn-screenconnect-into-malware-using-auth-8e94e416</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20turn%20ScreenConnect%20into%20malware%20using%20Authenticode%20stuffing&amp;severity=high&amp;id=685d17c5ca1063fb8740885e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-intelbroker-charged-in-us-for-global-data-t-51c375cf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20&apos;IntelBroker&apos;%20charged%20in%20US%20for%20global%20data%20theft%20breaches&amp;severity=high&amp;id=685d17c5ca1063fb8740885a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-crackdown-4-shinyhunters-members-arre-2fa1a5f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Crackdown%3A%204%20ShinyHunters%20Members%20Arrested%2C%20IntelBroker%20hacker%20Identified%20as%20British%20National%20Kai%20West&amp;severity=medium&amp;id=685d1440ca1063fb87407936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6703-cwe-20-improper-input-validation-in--6bff0924</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6703%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Mozilla%20neqo&amp;severity=low&amp;id=685d17e3ca1063fb87408893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6212-cwe-79-improper-neutralization-of-in-74d0ad8e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefic%20Ultra%20Addons%20for%20Contact%20Form%207&amp;severity=high&amp;id=685d144eca1063fb8740799a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5338-cwe-79-improper-neutralization-of-in-78e7f8c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5338%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=685d144eca1063fb8740798e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5842-cwe-79-improper-neutralization-of-in-e03fe6cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5842%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20butterflymedia%20Modern%20Design%20Library&amp;severity=medium&amp;id=685d144eca1063fb87407994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5459-cwe-78-improper-neutralization-of-sp-502a82e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5459%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Perforce%20Puppet%20Enterprise&amp;severity=high&amp;id=685ceee1be005fe9be6e0bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48497-cross-site-request-forgery-csrf-in--a4d04446</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48497%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20iroha%20Soft%20Co.%2C%20Ltd.%20iroha%20Board&amp;severity=medium&amp;id=685ce818e230f5b23489f5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41404-direct-request-forced-browsing-in-i-8159e336</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41404%3A%20Direct%20request%20(&apos;Forced%20Browsing&apos;)%20in%20iroha%20Soft%20Co.%2C%20Ltd.%20iroha%20Board&amp;severity=medium&amp;id=685ce818e230f5b23489f5fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37101-cwe-269-improper-privilege-manageme-3756c441</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37101%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Hewlett%20Packard%20Enterprise%20HPE%20OneView%20for%20VMware%20vCenter&amp;severity=high&amp;id=685cda08e230f5b23489c228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6624-insertion-of-sensitive-information-i-2623de1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6624%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20snyk&amp;severity=low&amp;id=685cd684e230f5b234897c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/read-windows-registry-manipulation-by-onesithuatio-66ee35c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Read%20%E2%80%9CWindows%20Registry%20Manipulation%E2%80%9C%20by%20ONESithuation&amp;severity=critical&amp;id=685cdd90e230f5b23489cd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6540-cwe-79-improper-neutralization-of-in-64887c36</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20murtuzamakda52%20web-cam&amp;severity=medium&amp;id=685cb6e0e230f5b234861d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5813-cwe-862-missing-authorization-in-suh-c430f0dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5813%3A%20CWE-862%20Missing%20Authorization%20in%20suhailahmad64%20Amazon%20Products%20to%20WooCommerce&amp;severity=medium&amp;id=685cb6e0e230f5b234861d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6546-cwe-79-improper-neutralization-of-in-b774266a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6546%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azumbro%20Drive%20Folder%20Embedder&amp;severity=medium&amp;id=685cb6e0e230f5b234861d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5275-cwe-79-improper-neutralization-of-in-a966e5f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Charitable%20%E2%80%93%20Donation%20Plugin%20for%20WordPress%20%E2%80%93%20Fundraising%20with%20Recurring%20Donations%20%26%20More&amp;severity=medium&amp;id=685cb6e0e230f5b234861d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6537-cwe-79-improper-neutralization-of-in-2c6ca11b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdesignfa%20Namasha%20By%20Mdesign&amp;severity=medium&amp;id=685cb6e0e230f5b234861d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5932-cwe-352-cross-site-request-forgery-c-a7dcc665</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5932%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20coolrunner%20Homerunner&amp;severity=medium&amp;id=685cb6e0e230f5b234861d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5929-cwe-79-improper-neutralization-of-in-d35b1e67</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5929%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zourbuth%20The%20Countdown%20%E2%80%93%20Block%20Countdown%20Timer&amp;severity=medium&amp;id=685cb6e0e230f5b234861d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5559-cwe-79-improper-neutralization-of-in-6899ee5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neoxx%20TimeZoneCalculator&amp;severity=medium&amp;id=685cac96e230f5b2348611fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5540-cwe-79-improper-neutralization-of-in-e8728bf9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Event%20RSVP%20and%20Simple%20Event%20Management%20Plugin&amp;severity=medium&amp;id=685cac96e230f5b2348611f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6258-cwe-79-improper-neutralization-of-in-c5e6909e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grosbouff%20WP%20SoundSystem&amp;severity=medium&amp;id=685cac9ee230f5b23486121c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5564-cwe-79-improper-neutralization-of-in-e0ad9138</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5564%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gurievcreative%20GC%20Social%20Wall&amp;severity=medium&amp;id=685cac97e230f5b2348611ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4334-cwe-269-improper-privilege-managemen-5b447c21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4334%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20nmedia%20Simple%20User%20Registration&amp;severity=critical&amp;id=685cac95e230f5b2348611ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6383-cwe-79-improper-neutralization-of-in-89de9861</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fmos%20WP-PhotoNav&amp;severity=medium&amp;id=685cac9ee230f5b234861228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6290-cwe-79-improper-neutralization-of-in-79de8e58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6290%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blakelong%20Tournament%20Bracket%20Generator&amp;severity=medium&amp;id=685cac9ee230f5b234861220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5812-cwe-862-missing-authorization-in-vgw-7d62c643</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5812%3A%20CWE-862%20Missing%20Authorization%20in%20vgwort%20VG%20WORT%20METIS&amp;severity=medium&amp;id=685cac97e230f5b23486120e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6378-cwe-79-improper-neutralization-of-in-fcd224cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20corporatezen222%20Responsive%20Food%20and%20Drink%20Menu&amp;severity=medium&amp;id=685cac9ee230f5b234861224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6538-cwe-79-improper-neutralization-of-in-454c3cb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6538%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bourgesloic%20Post%20Rating%20and%20Review&amp;severity=medium&amp;id=685cac9ee230f5b23486122c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3863-cwe-862-missing-authorization-in-plu-90af2711</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3863%3A%20CWE-862%20Missing%20Authorization%20in%20plugindevs%20Post%20Carousel%20Slider%20for%20Elementor&amp;severity=medium&amp;id=685cac94e230f5b2348611e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5590-cwe-89-improper-neutralization-of-sp-938596fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5590%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20Owl%20carousel%20responsive&amp;severity=high&amp;id=685cac97e230f5b234861209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5488-cwe-79-improper-neutralization-of-in-bcfcb693</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaushik07%20WP%20Masonry%20%26%20Infinite%20Scroll&amp;severity=medium&amp;id=685cac96e230f5b2348611ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5535-cwe-79-improper-neutralization-of-in-1693db17</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5535%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chemiker%20e.nigma%20buttons&amp;severity=medium&amp;id=685cac96e230f5b2348611f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5588-cwe-79-improper-neutralization-of-in-d699c6e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ickata%20Image%20Editor%20by%20Pixo&amp;severity=medium&amp;id=685cac97e230f5b234861203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sitecore-104-remote-code-execution-rce-80476233</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sitecore%2010.4%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=685e4315ca1063fb8755ec3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcafee-agent-576-insecure-storage-of-sensitive-inf-9639d558</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=McAfee%20Agent%205.7.6%20-%20Insecure%20Storage%20of%20Sensitive%20Information&amp;severity=medium&amp;id=685e4315ca1063fb8755ec39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/social-warfare-wordpress-plugin-352-remote-code-ex-12449699</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Social%20Warfare%20WordPress%20Plugin%203.5.2%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=685e4315ca1063fb8755ec34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-26-78bf251d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-26&amp;severity=medium&amp;id=685de3a4ca1063fb874d6fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49603-na-5cc2465e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49603%3A%20n%2Fa&amp;severity=critical&amp;id=685d813cca1063fb87434a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30131-na-a9e4aa27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30131%3A%20n%2Fa&amp;severity=critical&amp;id=685d76b1ca1063fb8742d05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44141-na-1a9fa0b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44141%3A%20n%2Fa&amp;severity=medium&amp;id=685d6fabca1063fb8742bc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50350-na-4a27fa76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50350%3A%20n%2Fa&amp;severity=medium&amp;id=685d6c25ca1063fb87429335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51672-na-efece6cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51672%3A%20n%2Fa&amp;severity=high&amp;id=685d651dca1063fb874274d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51671-na-1e928e6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51671%3A%20n%2Fa&amp;severity=medium&amp;id=685d651dca1063fb874274d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29331-na-4e17c3ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29331%3A%20n%2Fa&amp;severity=high&amp;id=685d6199ca1063fb87425a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/px4-military-uav-autopilot-1123-denial-of-service--4c19e4d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PX4%20Military%20UAV%20Autopilot%201.12.3%20-%20Denial%20of%20Service%20(DoS)&amp;severity=medium&amp;id=685cf039be005fe9be6e5a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/onetrust-sdk-6330-denial-of-service-dos-1fb291bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OneTrust%20SDK%206.33.0%20-%20Denial%20Of%20Service%20(DoS)&amp;severity=medium&amp;id=685cf038be005fe9be6e5a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pterodactyl-panel-11111-remote-code-execution-rce-8a541928</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pterodactyl%20Panel%201.11.11%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=685cf038be005fe9be6e5a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freesshd-109-denial-of-service-dos-69eb6a7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=freeSSHd%201.0.9%20-%20Denial%20of%20Service%20(DoS)&amp;severity=medium&amp;id=685cf038be005fe9be6e5a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-excel-2024-use-after-free-remote-code-ex-400f48ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Excel%202024%20Use%20after%20free%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=685cf038be005fe9be6e5a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6669-use-of-hard-coded-cryptographic-key--6cad72de</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6669%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20gooaclok819%20sublinkX&amp;severity=medium&amp;id=685c7b1ce230f5b23485b964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6668-sql-injection-in-code-projects-inven-1893474f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6668%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=685c7537e230f5b23485b2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6667-unrestricted-upload-in-code-projects-f42abaa2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6667%3A%20Unrestricted%20Upload%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=685c7536e230f5b23485b2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6640-cwe-416-use-after-free-in-pdf-xchang-0d7c25f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6640%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c711fe230f5b23485ac68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6641-cwe-125-out-of-bounds-read-in-pdf-xc-d7035805</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6641%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c711fe230f5b23485ac6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6642-cwe-125-out-of-bounds-read-in-pdf-xc-00f10b6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6642%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c711fe230f5b23485ac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6643-cwe-125-out-of-bounds-read-in-pdf-xc-350fc726</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6643%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c711fe230f5b23485ac74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6644-cwe-416-use-after-free-in-pdf-xchang-d6d7ebdc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6644%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c711fe230f5b23485ac78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6645-cwe-416-use-after-free-in-pdf-xchang-1cb48aef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6645%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c711fe230f5b23485ac7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6646-cwe-416-use-after-free-in-pdf-xchang-06e9e6ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6646%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c711fe230f5b23485ac80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6647-cwe-787-out-of-bounds-write-in-pdf-x-987b8e5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6647%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c711fe230f5b23485ac84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6648-cwe-125-out-of-bounds-read-in-pdf-xc-812011a2</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6648%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c711fe230f5b23485ac88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6649-cwe-125-out-of-bounds-read-in-pdf-xc-dd436168</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6649%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c711fe230f5b23485ac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6650-cwe-125-out-of-bounds-read-in-pdf-xc-c2419207</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6650%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485ac9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6651-cwe-787-out-of-bounds-write-in-pdf-x-c365213a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6651%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c7122e230f5b23485aca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6652-cwe-125-out-of-bounds-read-in-pdf-xc-627a565d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6652%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485aca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6653-cwe-125-out-of-bounds-read-in-pdf-xc-2cda1d84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6653%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485acaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6654-cwe-787-out-of-bounds-write-in-pdf-x-34b78574</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6654%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c7122e230f5b23485acae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6655-cwe-125-out-of-bounds-read-in-pdf-xc-6d28396b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6655%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485acb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6656-cwe-125-out-of-bounds-read-in-pdf-xc-192edc05</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6656%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485acb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6657-cwe-125-out-of-bounds-read-in-pdf-xc-35fbf47e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6657%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485acba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6658-cwe-125-out-of-bounds-read-in-pdf-xc-5d13f058</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6658%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485acbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6659-cwe-787-out-of-bounds-write-in-pdf-x-6d2aefb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6659%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c7122e230f5b23485acc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6660-cwe-122-heap-based-buffer-overflow-i-eabc3c0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6660%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c7124e230f5b23485acd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6661-cwe-416-use-after-free-in-pdf-xchang-00cebe17</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6661%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c7124e230f5b23485acd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6662-cwe-125-out-of-bounds-read-in-pdf-xc-550345dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6662%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7124e230f5b23485acd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6443-cwe-284-improper-access-control-in-m-970eed43</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6443%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Mikrotik%20RouterOS&amp;severity=high&amp;id=685c6d0de230f5b23485a8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36038-cwe-502-deserialization-of-untruste-04667f61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36038%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=critical&amp;id=685c6281e230f5b234859062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6665-sql-injection-in-code-projects-inven-1f3ecbff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6665%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=685c5efde230f5b2348587b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6664-cross-site-request-forgery-in-codeas-b5322a3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6664%3A%20Cross-Site%20Request%20Forgery%20in%20CodeAstro%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=685c5efde230f5b2348587ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6627-buffer-overflow-in-totolink-a702r-0e959a08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6627%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=685c42dde230f5b234855d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5825-cwe-1328-security-version-number-mut-a6d95e9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5825%3A%20CWE-1328%3A%20Security%20Version%20Number%20Mutable%20to%20Older%20Versions%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=high&amp;id=685c3f5ae230f5b23485596f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6678-cwe-306-missing-authentication-for-c-745b8358</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6678%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=high&amp;id=685c3f5be230f5b2348559a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5830-cwe-122-heap-based-buffer-overflow-i-66638fa9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5830%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=high&amp;id=685c3f5ae230f5b234855984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5829-cwe-121-stack-based-buffer-overflow--48c553e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5829%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=medium&amp;id=685c3f5ae230f5b234855981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5823-cwe-749-exposed-dangerous-method-or--6d9e062e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5823%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=medium&amp;id=685c3f5ae230f5b234855975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5827-cwe-121-stack-based-buffer-overflow--969c166a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5827%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=high&amp;id=685c3f5ae230f5b23485597b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5822-cwe-863-incorrect-authorization-in-a-e985d2d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5822%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=high&amp;id=685c3f5ae230f5b234855972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5828-cwe-120-buffer-copy-without-checking-557045fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5828%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=medium&amp;id=685c3f5ae230f5b23485597e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5826-cwe-115-misinterpretation-of-input-i-b9919645</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5826%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=medium&amp;id=685c3f5ae230f5b234855978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6621-os-command-injection-in-totolink-ca3-fcebe138</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6621%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20CA300-PoE&amp;severity=medium&amp;id=685c3f5ae230f5b23485598f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6620-os-command-injection-in-totolink-ca3-e2fd2723</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6620%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20CA300-PoE&amp;severity=medium&amp;id=685c3f5ae230f5b234855987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5824-cwe-346-origin-validation-error-in-a-41b5f10e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5824%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=medium&amp;id=685c3bd7e230f5b234855609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5833-cwe-345-insufficient-verification-of-87076187</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5833%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Pioneer%20DMH-WT7600NEX&amp;severity=medium&amp;id=685c3bd7e230f5b23485560f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5834-cwe-1326-missing-immutable-root-of-t-c7959ac4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5834%3A%20CWE-1326%3A%20Missing%20Immutable%20Root%20of%20Trust%20in%20Hardware%20in%20Pioneer%20DMH-WT7600NEX&amp;severity=medium&amp;id=685c3bd7e230f5b234855612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5832-cwe-345-insufficient-verification-of-171c49b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5832%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Pioneer%20DMH-WT7600NEX&amp;severity=medium&amp;id=685c3bd7e230f5b23485560c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49550-incorrect-authorization-cwe-863-in--4e9efe26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49550%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=685c3853e230f5b2348551ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49549-incorrect-authorization-cwe-863-in--b0c08deb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49549%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=low&amp;id=685c3853e230f5b2348551ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6619-os-command-injection-in-totolink-ca3-de6eef74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6619%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20CA300-PoE&amp;severity=medium&amp;id=685c33b3f95e997babc44cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6618-os-command-injection-in-totolink-ca3-46f08228</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6618%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20CA300-PoE&amp;severity=medium&amp;id=685c33b3f95e997babc44cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52999-cwe-121-stack-based-buffer-overflow-735e56b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52999%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20FasterXML%20jackson-core&amp;severity=high&amp;id=685c2fdef95e997babc447c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6617-stack-based-buffer-overflow-in-d-lin-386e3448</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6617%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=685c2fdef95e997babc447c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6442-cwe-444-inconsistent-interpretation--3ded5a96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6442%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Ruby%20WEBrick&amp;severity=medium&amp;id=685c2b635eba5e446993156f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52890-cwe-863-incorrect-authorization-in--1aef94a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52890%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20lxc%20incus&amp;severity=high&amp;id=685c2b635eba5e446993157c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52889-cwe-770-allocation-of-resources-wit-6898e228</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52889%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxc%20incus&amp;severity=low&amp;id=685c2b635eba5e4469931577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52569-cwe-20-improper-input-validation-in-dc144136</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52569%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20JuliaWeb%20GitHub.jl&amp;severity=medium&amp;id=685c2b635eba5e4469931573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52483-cwe-77-improper-neutralization-of-s-27fbc22c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52483%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20JuliaRegistries%20Registrator.jl&amp;severity=high&amp;id=685c27e95eba5e446992c41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52480-cwe-88-improper-neutralization-of-a-1e629a47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52480%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20JuliaRegistries%20Registrator.jl&amp;severity=high&amp;id=685c27e95eba5e446992c417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49153-cwe-22-in-microsens-nmp-web-339cfd7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49153%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsens%20NMP%20Web%2B&amp;severity=critical&amp;id=685c27e95eba5e446992c413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49152-cwe-613-in-microsens-nmp-web-2b881af1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49152%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Microsens%20NMP%20Web%2B&amp;severity=high&amp;id=685c27e95eba5e446992c40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49151-cwe-547-in-microsens-nmp-web-86dd5f4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49151%3A%20CWE-547%3A%20Use%20of%20Hard-coded%2C%20Security-relevant%20Constants%20in%20Microsens%20NMP%20Web%2B&amp;severity=critical&amp;id=685c27e95eba5e446992c40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6616-stack-based-buffer-overflow-in-d-lin-ca1f557e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6616%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=685c27e95eba5e446992c41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20282-improper-privilege-management-in-ci-0760efa9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20282%3A%20Improper%20Privilege%20Management%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=685c27e95eba5e446992c408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5015-cwe-79-in-parsons-parsons-utility-en-9591678a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5015%3A%20CWE-79%20in%20Parsons%20Parsons%20Utility%20Enterprise%20Data%20Management&amp;severity=high&amp;id=685c25a8c6576a567aed85d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4656-cwe-1088-synchronous-access-of-remot-41496894</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4656%3A%20CWE-1088%3A%20Synchronous%20Access%20of%20Remote%20Resource%20without%20Timeout%20in%20HashiCorp%20Vault&amp;severity=low&amp;id=685c25a8c6576a567aed85d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20281-improper-neutralization-of-special--8517b3eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20281%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=685c2224c6576a567aed81d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20264-improper-authorization-in-cisco-cis-9f8bb528</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20264%3A%20Improper%20Authorization%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=685c2224c6576a567aed81d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52479-cwe-93-improper-neutralization-of-c-438c1867</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52479%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20JuliaWeb%20HTTP.jl&amp;severity=high&amp;id=685c2224c6576a567aed81d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6615-stack-based-buffer-overflow-in-d-lin-c3f50cb6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6615%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=685c1eaac6576a567aed30cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6614-stack-based-buffer-overflow-in-d-lin-e0ea9a53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6614%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=685c1eaac6576a567aed30c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50179-cwe-352-cross-site-request-forgery--b133d1d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50179%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=685c1d03a1cfc9c6487ddcb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6612-sql-injection-in-code-projects-inven-19a0ed9f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6612%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=685c197fa1cfc9c6487da229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6611-sql-injection-in-code-projects-inven-589f3d2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6611%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=685c197fa1cfc9c6487da222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50178-cwe-20-improper-input-validation-in-1ac61cec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50178%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20JuliaWeb%20GitForge.jl&amp;severity=medium&amp;id=685c15fca1cfc9c6487d9ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49135-cwe-639-authorization-bypass-throug-d5e69b04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49135%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=685c1277a1cfc9c6487d9af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6610-sql-injection-in-itsourcecode-employ-0b0ba8f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6610%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Management%20System&amp;severity=medium&amp;id=685c1277a1cfc9c6487d9afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrix-bleed-2-flaw-enables-token-theft-sap-gui-fl-92d424e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Citrix%20Bleed%202%20Flaw%20Enables%20Token%20Theft%3B%20SAP%20GUI%20Flaws%20Risk%20Sensitive%20Data%20Exposure&amp;severity=high&amp;id=685c0b6ea1cfc9c6487d92bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6609-sql-injection-in-sourcecodester-best-ac731c79</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6609%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685c0b82a1cfc9c6487d9357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6608-sql-injection-in-sourcecodester-best-ecdef505</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6608%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685c0b82a1cfc9c6487d935e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48991-cwe-352-cross-site-request-forgery--96e2e7b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48991%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=685c0467a1cfc9c6487d811f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6607-sql-injection-in-sourcecodester-best-65b72971</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6607%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685c0467a1cfc9c6487d8125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6606-sql-injection-in-sourcecodester-best-4f3861ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6606%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685bfd5fa1cfc9c6487d7a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6605-sql-injection-in-sourcecodester-best-a5cdf7e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6605%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685bfd5fa1cfc9c6487d7a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6604-sql-injection-in-sourcecodester-best-063dd228</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6604%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685bf657a1cfc9c6487d68fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6543-cwe-119-improper-restriction-of-oper-3fb98c7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6543%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20NetScaler%20ADC&amp;severity=critical&amp;id=685bf2d5a1cfc9c6487d64f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25012-cwe-601-url-redirection-to-untruste-7f683c44</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25012%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=685be4c4a1cfc9c6487d56bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6603-integer-overflow-in-coldfunction-qcu-634a83a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6603%3A%20Integer%20Overflow%20in%20coldfunction%20qCUDA&amp;severity=medium&amp;id=685bd330a1cfc9c6487d1009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deleting-a-file-in-wire-doesnt-remove-it-from-serv-6f2a0754</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deleting%20a%20file%20in%20Wire%20doesn%E2%80%99t%20remove%20it%20from%20servers%20%E2%80%94%20and%20other%20findings&amp;severity=medium&amp;id=685bc8bea1cfc9c6487d00d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-supply-chain-attack-targets-dev-ff10aef2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-linked%20Supply%20Chain%20Attack%20Targets%20Developers%20with%2035%20Malicious%20npm%20Packages&amp;severity=high&amp;id=685bc8a5a1cfc9c6487d00a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41647-cwe-312-cleartext-storage-of-sensit-ac1db903</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41647%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Lenze%20PLC%20Designer%20V4&amp;severity=medium&amp;id=685bc521a1cfc9c6487cfb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49797-files-or-directories-accessible-to--bdae4494</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49797%3A%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20BROTHER%20INDUSTRIES%2C%20LTD.%20Multiple%20driver%20installers%20for%20Windows&amp;severity=high&amp;id=685bc521a1cfc9c6487cfb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6613-cross-site-scripting-in-phpgurukul-h-2d600a15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6613%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=685bc521a1cfc9c6487cfb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5927-cwe-36-absolute-path-traversal-in-wp-3e9a4014</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5927%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=high&amp;id=685bc521a1cfc9c6487cfb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41255-cwe-266-incorrect-privilege-assignm-6a93ed45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41255%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20iterate%20GmbH%20Cyberduck&amp;severity=high&amp;id=685bc521a1cfc9c6487cfb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41256-cwe-328-use-of-weak-hash-in-iterate-54536236</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41256%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20iterate%20GmbH%20Cyberduck&amp;severity=high&amp;id=685bc19da1cfc9c6487cf7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-benchmarking-authorization-policy-engines-83c4b4c2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Benchmarking%20Authorization%20Policy%20Engines&amp;severity=medium&amp;id=685bbe1ea1cfc9c6487cf10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51984-cwe-522-insufficiently-protected-cr-b77cb76c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51984%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Brother%20Industries%2C%20Ltd%20HL-L8260CDN&amp;severity=medium&amp;id=69d49a21aaed68159acbc2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51983-cwe-1286-improper-validation-of-syn-45093a9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51983%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Brother%20Industries%2C%20Ltd%20HL-L8260CDN&amp;severity=high&amp;id=69d49a21aaed68159acbc2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51982-cwe-1286-improper-validation-of-syn-f60dc90c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51982%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Brother%20Industries%2C%20Ltd%20HL-L8260CDN&amp;severity=high&amp;id=69ce7bdce6bfc5ba1ddfe793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51981-cwe-918-server-side-request-forgery-687f2e32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51981%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Brother%20Industries%2C%20Ltd%20HL-L8260CDN&amp;severity=medium&amp;id=69d49de1aaed68159acfad26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51980-cwe-918-server-side-request-forgery-a26c4f63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51980%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Brother%20Industries%2C%20Ltd%20HL-L8260CDN&amp;severity=medium&amp;id=69d49de1aaed68159acfad1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51979-cwe-121-stack-based-buffer-overflow-97b0d11d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51979%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Brother%20Industries%2C%20Ltd%20HL-L8260CDN&amp;severity=high&amp;id=69d49de1aaed68159acfad0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wordpress-malware-hides-on-checkout-pages-and--f34814ff</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20WordPress%20Malware%20Hides%20on%20Checkout%20Pages%20and%20Imitates%20Cloudflare&amp;severity=medium&amp;id=685ba57ca1cfc9c6487cc97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51978-cwe-1391-use-of-weak-credentials-in-820eaf07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51978%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20Brother%20Industries%2C%20Ltd%20DCP-J928N-W%2FB&amp;severity=critical&amp;id=69cac31de6bfc5ba1d5bec89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51977-cwe-538-insertion-of-sensitive-info-57daf776</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51977%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Brother%20Industries%2C%20Ltd%20HL-L8260CDN&amp;severity=medium&amp;id=69caa378e6bfc5ba1d4bb8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43880-inefficient-regular-expression-comp-9b600e89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43880%3A%20Inefficient%20regular%20expression%20complexity%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=685b8ddc66faf0c1de3bc61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0966-cwe-89-improper-neutralization-of-sp-1a436ddc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0966%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=685b673066faf0c1de3b9867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36004-cwe-427-uncontrolled-search-path-el-519cc17d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36004%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element&amp;severity=high&amp;id=685b673066faf0c1de3b986a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5585-cwe-79-improper-neutralization-of-in-c3f06130</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5585%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=685b602b66faf0c1de3b8af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-warns-of-trojanized-netextender-stealing-bceafe14</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20warns%20of%20trojanized%20NetExtender%20stealing%20VPN%20logins&amp;severity=high&amp;id=685b440766faf0c1de3b6783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abuse-open-source-tools-to-target-a-1456b1f1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abuse%20Open-Source%20Tools%20To%20Target%20Africa%E2%80%99s%20Financial%20Sector&amp;severity=medium&amp;id=685b440766faf0c1de3b6787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6583-sql-injection-in-sourcecodester-best-9c9f5b0d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6583%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685b3cff66faf0c1de3b5bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-25-9f6ea9d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-25&amp;severity=medium&amp;id=685c902fe230f5b23485ed64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45333-na-be58dda4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45333%3A%20n%2Fa&amp;severity=high&amp;id=685c50eee230f5b234857689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45332-na-6c846e04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45332%3A%20n%2Fa&amp;severity=high&amp;id=685c3853e230f5b2348551a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44206-na-95c1f43b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44206%3A%20n%2Fa&amp;severity=medium&amp;id=685c1d03a1cfc9c6487ddcaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25905-na-48474e13</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25905%3A%20n%2Fa&amp;severity=high&amp;id=685c15fca1cfc9c6487d9e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6582-sql-injection-in-sourcecodester-best-d05c10a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6582%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685b398066faf0c1de3b5994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6581-sql-injection-in-sourcecodester-best-2d9edb20</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6581%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685b2b6c66faf0c1de3b4414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6580-sql-injection-in-sourcecodester-best-3f622ff5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6580%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685b1d5b66faf0c1de3b2da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52884-cwe-159-improper-handling-of-invali-710211d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52884%3A%20CWE-159%3A%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20risc0%20risc0-ethereum&amp;severity=low&amp;id=685b0bc766faf0c1de3b130d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52883-cwe-1287-improper-validation-of-spe-f600bf3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52883%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20meshtastic%20Meshtastic-Android&amp;severity=medium&amp;id=685b0bc766faf0c1de3b1309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52572-cwe-287-improper-authentication-in--fd2c43b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52572%3A%20CWE-287%3A%20Improper%20Authentication%20in%20hikariatama%20Hikka&amp;severity=critical&amp;id=685b0bc766faf0c1de3b1305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52571-cwe-287-improper-authentication-in--cd8f77df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52571%3A%20CWE-287%3A%20Improper%20Authentication%20in%20hikariatama%20Hikka&amp;severity=critical&amp;id=685b087866faf0c1de3b0f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-over-70-microsoft-exchange-servers--7f63d080</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20Over%2070%20Microsoft%20Exchange%20Servers%20to%20Steal%20Credentials%20via%20Keyloggers&amp;severity=high&amp;id=685b084266faf0c1de3b0ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-way-to-shut-down-cryptominer-camp-8297ac5b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Way%20to%20Shut%20Down%20Cryptominer%20Campaigns%20Using%20Bad%20Shares%20and%20XMRogue&amp;severity=high&amp;id=685b084266faf0c1de3b0ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-filefix-attack-weaponizes-windows-file-explore-05c5a6bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20FileFix%20attack%20weaponizes%20Windows%20File%20Explorer%20for%20stealthy%20commands&amp;severity=high&amp;id=685b084266faf0c1de3b0ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trezors-support-platform-abused-in-crypto-theft-ph-21f2c3f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trezor%E2%80%99s%20support%20platform%20abused%20in%20crypto%20theft%20phishing%20attacks&amp;severity=high&amp;id=685b084266faf0c1de3b0ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6557-insufficient-data-validation-in-goog-b6a75c3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6557%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=medium&amp;id=685b087866faf0c1de3b0f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6556-insufficient-policy-enforcement-in-g-10bff199</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6556%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=685b087866faf0c1de3b0f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6555-use-after-free-in-google-chrome-c739a859</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6555%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=685b087866faf0c1de3b0f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52882-cwe-1385-missing-origin-validation--38687993</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52882%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20anthropics%20claude-code&amp;severity=high&amp;id=685b087866faf0c1de3b0f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6579-sql-injection-in-code-projects-car-r-d96f9327</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6579%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=685b087866faf0c1de3b0f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6578-sql-injection-in-code-projects-simpl-c6c08941</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6578%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685b087866faf0c1de3b0f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sparkkitty-spyware-on-app-store-and-play-store-ste-d928e5e7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SparkKitty%20Spyware%20on%20App%20Store%20and%20Play%20Store%2C%20Steals%20Photos%20for%20Crypto%20Data&amp;severity=medium&amp;id=685b04bc66faf0c1de3b0b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52880-cwe-799-improper-control-of-interac-81960906</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52880%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20gotson%20komga&amp;severity=medium&amp;id=685b04bf66faf0c1de3b0b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52471-cwe-191-integer-underflow-wrap-or-w-c2d7df6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52471%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20espressif%20esp-idf&amp;severity=high&amp;id=685b04bf66faf0c1de3b0b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52888-cwe-611-improper-restriction-of-xml-2d135995</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52888%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20allure-framework%20allure2&amp;severity=high&amp;id=685b013966faf0c1de3b077a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49853-cwe-89-improper-neutralization-of-s-f312fa03</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49853%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ControlID%20iDSecure%20On-premises&amp;severity=critical&amp;id=685afdb566faf0c1de3b039e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49852-cwe-918-server-side-request-forgery-e40e004f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49852%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ControlID%20iDSecure%20On-premises&amp;severity=high&amp;id=685afdb566faf0c1de3b03a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49851-cwe-287-improper-authentication-in--f3fc77ce</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49851%3A%20CWE-287%20Improper%20Authentication%20in%20ControlID%20iDSecure%20On-premises&amp;severity=high&amp;id=685afdb566faf0c1de3b03a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5087-cwe-319-cleartext-transmission-of-se-63aa0a5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5087%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Kaleris%20Navis%20N4&amp;severity=medium&amp;id=685aefaf66faf0c1de3aa176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2566-cwe-502-deserialization-of-untrusted-0181a86e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2566%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Kaleris%20Navis%20N4&amp;severity=critical&amp;id=685aefaf66faf0c1de3aa173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-kerio-control-advisory-f82e5687</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Kerio%20Control%20Advisory!&amp;severity=medium&amp;id=685ae8890e5630b102ff2e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trashtalkme-a-new-secure-way-to-chat-85eadb8a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TrashTalk.me%20-%20A%20new%20secure%20way%20to%20chat&amp;severity=medium&amp;id=685ae55d77d44901f08d3290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptominers-anatomy-shutting-down-mining-botnets-48aa1629</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cryptominers%E2%80%99%20Anatomy%3A%20Shutting%20Down%20Mining%20Botnets&amp;severity=medium&amp;id=685ae55d77d44901f08d328c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49147-cwe-497-exposure-of-sensitive-syste-3f9f46e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49147%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=685ae55477d44901f08d324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/androxgh0st-botnet-expands-reach-exploiting-us-uni-e390910e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Androxgh0st%20Botnet%20Expands%20Reach%2C%20Exploiting%20US%20University%20Servers&amp;severity=high&amp;id=685ae1ce77d44901f08d2c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23260-cwe-266-incorrect-privilege-assignm-f6993246</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23260%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20NVIDIA%20AIStore&amp;severity=medium&amp;id=685ae55477d44901f08d324f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4378-cwe-319-cleartext-transmission-of-se-5b44e0d5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4378%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Ataturk%20University%20ATA-AOF%20Mobile%20Application&amp;severity=critical&amp;id=685ad74277d44901f08d1b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kali-linux-20251c-fixes-key-issue-adds-new-tools-a-0d2ce28d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kali%20Linux%202025.1c%20Fixes%20Key%20Issue%2C%20Adds%20New%20Tools%20and%20Interface%20Updates&amp;severity=medium&amp;id=685ad3bd77d44901f08d11ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6570-sql-injection-in-phpgurukul-hospital-9f725506</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6570%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=685ac93d77d44901f08c63d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23265-cwe-94-improper-control-of-generati-512a686b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23265%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=685ac567eea9540c4f4840bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23264-cwe-94-improper-control-of-generati-715500c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23264%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=685ac567eea9540c4f4840ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4383-cwe-307-improper-restriction-of-exce-29d879ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4383%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Art-in%20Bili%C5%9Fim%20Teknolojileri%20ve%20Yaz%C4%B1l%C4%B1m%20Hizm.%20Tic.%20Ltd.%20%C5%9Eti.%20Wi-Fi%20Cloud%20Hotspot&amp;severity=critical&amp;id=685ac567eea9540c4f4840c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6569-cross-site-scripting-in-code-project-0d08e5a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6569%3A%20Cross%20Site%20Scripting%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=685ac1bbf899b1a8c38942d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/filefix-new-alternative-to-clickfix-attack-cf324a0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FileFix%20%E2%80%93%20New%20Alternative%20to%20ClickFix%20Attack&amp;severity=medium&amp;id=685abb2f3267a9227e572a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6568-buffer-overflow-in-totolink-ex1200t-242c04d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6568%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=685ab877af41c610cd96167e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6567-sql-injection-in-campcodes-online-re-31546ba7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6567%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=685ab877af41c610cd961677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36537-incorrect-permission-assignment-for-246c8b20</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36537%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20TeamViewer%20Remote%20Management%20in%20TeamViewer%20Full%20Client&amp;severity=high&amp;id=685ab877af41c610cd961674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5318-out-of-bounds-read-in-red-hat-red-ha-551ec327</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5318%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=685ab29b8e5e669c7fb575fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-code-execution-in-centos-web-panel-cve-2025-c3adb23c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20code%20execution%20in%20CentOS%20Web%20Panel%20-%20CVE-2025-48703&amp;severity=medium&amp;id=685ab1be4dc24046c1dc8c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6032-improper-certificate-validation-in-r-c96d6619</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6032%3A%20Improper%20Certificate%20Validation&amp;severity=high&amp;id=685ab1ba4dc24046c1dc8c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6566-stack-based-buffer-overflow-in-oatpp-72dbedb4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6566%3A%20Stack-based%20Buffer%20Overflow%20in%20oatpp%20Oat%2B%2B&amp;severity=medium&amp;id=685aa3aa4dc24046c1dc5db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6565-stack-based-buffer-overflow-in-netge-c2a9227a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6565%3A%20Stack-based%20Buffer%20Overflow%20in%20Netgear%20WNCE3001&amp;severity=high&amp;id=685aa3aa4dc24046c1dc5dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6436-memory-safety-bugs-fixed-in-firefox--e42ee8ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6436%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=685aa0274dc24046c1dc5acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6435-save-as-in-devtools-could-download-f-ff089114</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6435%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=685aa0274dc24046c1dc5ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6434-https-only-exception-screen-lacked-a-8368cd44</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6434%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6433-webauthn-would-allow-a-user-to-sign--ddcfb2dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6433%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=685aa0274dc24046c1dc5ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6432-dns-requests-leaked-outside-of-a-con-c3cd2680</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6432%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=685aa0274dc24046c1dc5ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6431-the-prompt-in-firefox-for-android-th-67501dd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6431%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6428-firefox-for-android-opened-urls-spec-2d784f4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6428%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6427-connect-src-content-security-policy--7249856c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6427%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=685aa0274dc24046c1dc5a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6430-content-disposition-header-ignored-w-a9f3a759</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6430%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6429-incorrect-parsing-of-urls-could-have-86c89628</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6429%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6426-no-warning-when-opening-executable-t-6564ed0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6426%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=685aa0274dc24046c1dc5a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6425-the-webcompat-webextension-shipped-w-90a90d6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6425%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6424-use-after-free-in-fontfaceset-in-moz-c6c7bf0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6424%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=685aa0274dc24046c1dc5a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39205-cwe-295-improper-certificate-valida-04fb0aae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39205%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=medium&amp;id=685a99584dc24046c1dc53e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt28-uses-signal-chat-to-deploy-beardshell-malwar-51209472</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT28%20Uses%20Signal%20Chat%20to%20Deploy%20BEARDSHELL%20Malware%20and%20COVENANT%20in%20Ukraine&amp;severity=high&amp;id=685a991d4dc24046c1dc53b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-house-bans-whatsapp-on-official-devices-over-se-b935fb97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20House%20Bans%20WhatsApp%20on%20Official%20Devices%20Over%20Security%20and%20Data%20Protection%20Issues&amp;severity=high&amp;id=685a991d4dc24046c1dc53b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-misconfigured-docker-apis-to-mine--5f359481</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Misconfigured%20Docker%20APIs%20to%20Mine%20Cryptocurrency%20via%20Tor%20Network&amp;severity=high&amp;id=685a991d4dc24046c1dc53af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39204-cwe-200-exposure-of-sensitive-infor-86ebd6ce</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39204%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=high&amp;id=685a99584dc24046c1dc53e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39203-cwe-354-improper-validation-of-inte-30046a19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39203%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=medium&amp;id=685a9582dec26fc862d9807c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39202-cwe-269-improper-privilege-manageme-4bb98c1d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39202%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=high&amp;id=685a91fedec26fc862d97be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39201-cwe-276-incorrect-default-permissio-14c2ed99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39201%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=medium&amp;id=685a91fedec26fc862d97beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2403-cwe-770-allocation-of-resources-with-70b77f4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2403%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Hitachi%20Energy%20Relion%20670%2F650%20and%20SAM600-IO&amp;severity=high&amp;id=685a91fedec26fc862d97bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1718-cwe-754-improper-check-for-unusual-o-34863a36</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1718%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Hitachi%20Energy%20Relion%20670%2F650%20and%20SAM600-IO&amp;severity=medium&amp;id=685a8e7adec26fc862d97548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6206-cwe-434-unrestricted-upload-of-file--9337de5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6206%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodeRevolution%20Aiomatic%20-%20Automatic%20AI%20Content%20Writer%20%26%20Editor%2C%20GPT-3%20%26%20GPT-4%2C%20ChatGPT%20ChatBot%20%26%20AI%20Toolkit&amp;severity=high&amp;id=685a644adec26fc862d94a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3092-cwe-204observable-response-discrepan-aff11cb6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3092%3A%20CWE-204%3AObservable%20Response%20Discrepancy%20in%20Helmholz%20myREX24&amp;severity=high&amp;id=685a60c6dec26fc862d94732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3091-cwe-639-authorization-bypass-through-b09f88d4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3091%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=685a60c6dec26fc862d9472e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3090-cwe-306-missing-authentication-for-c-e9c3457d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3090%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=685a5d42dec26fc862d9446e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5258-cwe-79-improper-neutralization-of-in-89de4c6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20swift%20Conference%20Scheduler&amp;severity=medium&amp;id=685a563adec26fc862d93d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50213-cwe-75-failure-to-sanitize-special--6461f05d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50213%3A%20CWE-75%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Snowflake&amp;severity=critical&amp;id=685a52b6dec26fc862d936a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2962-loop-with-unreachable-exit-condition-8d5bc19d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2962%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=685a3a1adec26fc862d91188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48890-improper-neutralization-of-special--f3b1244f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48890%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRH-733GBK&amp;severity=critical&amp;id=685a2f8edec26fc862d90957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43879-improper-neutralization-of-special--9c17ee40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43879%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRH-733GBK&amp;severity=critical&amp;id=685a2f8edec26fc862d90953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43877-cross-site-scripting-xss-in-elecom--a43b128b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43877%3A%20Cross-site%20scripting%20(XSS)%20in%20ELECOM%20CO.%2CLTD.%20WRC-1167GHBK2-S&amp;severity=medium&amp;id=685a2f8edec26fc862d9094f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41427-improper-neutralization-of-special--baaf8284</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41427%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRC-X3000GS&amp;severity=high&amp;id=685a2f8edec26fc862d9094b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36519-unrestricted-upload-of-file-with-da-cc7ff199</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36519%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20ELECOM%20CO.%2CLTD.%20WRC-2533GST2&amp;severity=medium&amp;id=685a2f8edec26fc862d90947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52566-cwe-119-improper-restriction-of-ope-77bbba00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52566%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=685a1dfadec26fc862d8f682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52570-cwe-799-improper-control-of-interac-9cbdb2b1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52570%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20mbuesch%20letmein&amp;severity=low&amp;id=685a1dfadec26fc862d8f68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52568-cwe-20-improper-input-validation-in-48012ea1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52568%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nekernel-org%20nekernel&amp;severity=high&amp;id=685a1dfadec26fc862d8f686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52574-cwe-22-improper-limitation-of-a-pat-5e3fb246</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52574%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bocaletto-luca%20elixir-system-monitor&amp;severity=high&amp;id=685a16f4dec26fc862d8ed63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48470-vulnerability-in-advantech-advantec-bdb18adf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48470%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=medium&amp;id=685a0febdec26fc862d8d91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48469-vulnerability-in-advantech-advantec-02fc22a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48469%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=critical&amp;id=685a0febdec26fc862d8d91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48468-vulnerability-in-advantech-advantec-9432ffed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48468%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=medium&amp;id=685a0febdec26fc862d8d917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48467-vulnerability-in-advantech-advantec-8835bd67</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48467%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=medium&amp;id=685a0febdec26fc862d8d914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48466-vulnerability-in-advantech-advantec-ef5af1f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48466%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=high&amp;id=685a0febdec26fc862d8d910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48463-vulnerability-in-advantech-advantec-159232de</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48463%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=low&amp;id=685a0febdec26fc862d8d90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48462-vulnerability-in-advantech-advantec-3f4432cc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48462%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=medium&amp;id=685a0febdec26fc862d8d90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48461-vulnerability-in-advantech-advantec-8171de73</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48461%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=medium&amp;id=685a0febdec26fc862d8d907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6560-cwe-256-plaintext-storage-of-a-passw-842c9215</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6560%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20Sapido%20BR071n&amp;severity=critical&amp;id=685a0febdec26fc862d8d936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6552-open-redirect-in-java-aodeng-hope-bo-e0c3eaec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6552%3A%20Open%20Redirect%20in%20java-aodeng%20Hope-Boot&amp;severity=medium&amp;id=685a0febdec26fc862d8d921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6559-cwe-78-improper-neutralization-of-sp-a92f95d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6559%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sapido%20BR071n&amp;severity=critical&amp;id=685a0febdec26fc862d8d928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34041-cwe-78-improper-neutralization-of-s-951a7e2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34041%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sangfor%20Technologies%20Co.%2C%20Ltd.%20Endpoint%20Detection%20and%20Response%20Platform&amp;severity=critical&amp;id=685a0560dec26fc862d8cf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6551-cross-site-scripting-in-java-aodeng--6befae1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6551%3A%20Cross%20Site%20Scripting%20in%20java-aodeng%20Hope-Boot&amp;severity=medium&amp;id=685a0560dec26fc862d8cf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6536-reachable-assertion-in-tarantool-4cdf921b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6536%3A%20Reachable%20Assertion%20in%20Tarantool&amp;severity=medium&amp;id=685a0560dec26fc862d8cf7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34040-cwe-434-unrestricted-upload-of-file-17db9957</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34040%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Seeyon%20(Beijing%20Zhiyuan%20Internet%20Software%20Co.%2C%20Ltd.)%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=critical&amp;id=685a0560dec26fc862d8cf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34039-cwe-78-improper-neutralization-of-s-80ab3b15</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34039%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Yonyou%20Co.%2C%20Ltd.%20UFIDA%20NC&amp;severity=critical&amp;id=685a0560dec26fc862d8cf6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34038-cwe-89-improper-neutralization-of-s-3d5855c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34038%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Weaver%20E-cology&amp;severity=high&amp;id=685a0560dec26fc862d8cf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34037-cwe-78-improper-neutralization-of-s-f3b7faee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34037%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Linksys%20E4200&amp;severity=critical&amp;id=6859fad3dec26fc862d8c385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34036-cwe-78-improper-neutralization-of-s-d182fc38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34036%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20TVT%20CCTV-DVR&amp;severity=critical&amp;id=6859fad3dec26fc862d8c380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34035-cwe-78-improper-neutralization-of-s-8d31c385</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34035%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20EnGenius%20EnShare%20IoT%20Gigabit%20Cloud%20Service&amp;severity=critical&amp;id=6859fad3dec26fc862d8c379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6535-sql-injection-in-xxyopen-novel-plus-525ec8ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6535%3A%20SQL%20Injection%20in%20xxyopen%20novel-plus&amp;severity=medium&amp;id=6859fad3dec26fc862d8c38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34034-cwe-798-use-of-hard-coded-credentia-a9683a49</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34034%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%205VTechnologies%20Blue%20Angel%20Software%20Suite&amp;severity=critical&amp;id=6859fad3dec26fc862d8c375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34033-cwe-78-improper-neutralization-of-s-f035acab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34033%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%205VTechnologies%20Blue%20Angel%20Software%20Suite&amp;severity=high&amp;id=6859fad3dec26fc862d8c371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34032-cwe-79-improper-neutralization-of-i-fc466788</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Moodle%20Jmol%20Plugin&amp;severity=medium&amp;id=6859fad3dec26fc862d8c36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34031-cwe-22-improper-limitation-of-a-pat-716f970e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34031%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Moodle%20Jmol%20Plugin&amp;severity=high&amp;id=6859fad3dec26fc862d8c367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6534-improper-control-of-resource-identif-99307920</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6534%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20xxyopen%20novel-plus&amp;severity=low&amp;id=6859f3d7dec26fc862d8bdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6533-authentication-bypass-by-capture-rep-5205e739</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6533%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20xxyopen%20novel-plus&amp;severity=medium&amp;id=6859ecc2dec26fc862d8b65d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6532-improper-access-controls-in-noyafa-l-b2c8eff3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6532%3A%20Improper%20Access%20Controls%20in%20NOYAFA%20LF9%20Pro&amp;severity=medium&amp;id=6859ecc2dec26fc862d8b656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-24-2c3ba89c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-24&amp;severity=medium&amp;id=685b407766faf0c1de3b5e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44531-na-72719f0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44531%3A%20n%2Fa&amp;severity=high&amp;id=685accb677d44901f08ce539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50699-na-e42fec95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50699%3A%20n%2Fa&amp;severity=medium&amp;id=685ac93d77d44901f08c63d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50695-na-255cc5e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50695%3A%20n%2Fa&amp;severity=medium&amp;id=685ac93d77d44901f08c63d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50693-na-e5f92150</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50693%3A%20n%2Fa&amp;severity=medium&amp;id=685ac93d77d44901f08c63cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32977-na-1ee18aa4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32977%3A%20n%2Fa&amp;severity=critical&amp;id=685abb2a3267a9227e572a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32978-na-2d553241</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32978%3A%20n%2Fa&amp;severity=high&amp;id=685ab877af41c610cd96166f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32976-na-4163ae96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32976%3A%20n%2Fa&amp;severity=high&amp;id=685ab877af41c610cd96166a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32975-na-ef3de748</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32975%3A%20n%2Fa&amp;severity=critical&amp;id=685ab877af41c610cd961665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27828-na-e0174d93</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27828%3A%20n%2Fa&amp;severity=high&amp;id=685ab29b8e5e669c7fb575f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27827-na-4b25e016</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27827%3A%20n%2Fa&amp;severity=high&amp;id=685ab1ba4dc24046c1dc8c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6531-improper-access-controls-in-sifusm-b-570fefc4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6531%3A%20Improper%20Access%20Controls%20in%20SIFUSM%20BD%20S1&amp;severity=medium&amp;id=6859e5badec26fc862d8b061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6530-denial-of-service-in-70mai-m300-4c8d34b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6530%3A%20Denial%20of%20Service%20in%2070mai%20M300&amp;severity=medium&amp;id=6859dec7dec26fc862d8abbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6529-use-of-default-credentials-in-70mai--e137dfb2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6529%3A%20Use%20of%20Default%20Credentials%20in%2070mai%20M300&amp;severity=high&amp;id=6859dec7dec26fc862d8abb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6528-improper-authentication-in-70mai-m30-901ff740</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6528%3A%20Improper%20Authentication%20in%2070mai%20M300&amp;severity=medium&amp;id=6859d7aadec26fc862d8a6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-salt-typhoon-targets-telecoms-via-rou-0d0c34ce</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Salt%20Typhoon%20Targets%20Telecoms%20via%20Router%20Flaws%2C%20Warn%20FBI%20and%20Canada&amp;severity=medium&amp;id=6859d425dec26fc862d8a4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6527-improper-access-controls-in-70mai-m3-aa2e3ca6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6527%3A%20Improper%20Access%20Controls%20in%2070mai%20M300&amp;severity=low&amp;id=6859d0a2dec26fc862d8a2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6526-insufficiently-protected-credentials-a2019619</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6526%3A%20Insufficiently%20Protected%20Credentials%20in%2070mai%20M300&amp;severity=low&amp;id=6859d0a2dec26fc862d8a2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6525-improper-authorization-in-70mai-1s-6965d243</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6525%3A%20Improper%20Authorization%20in%2070mai%201S&amp;severity=medium&amp;id=6859c9a8dec26fc862d89b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-lapdogs-campaign-drops-shortleash-bac-054455e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20LapDogs%20Campaign%20Drops%20ShortLeash%20Backdoor%20with%20Fake%20Certs&amp;severity=medium&amp;id=6859c999dec26fc862d89b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52561-cwe-79-improper-neutralization-of-i-854a85b8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52561%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JuliaComputing%20HTMLSanitizer.jl&amp;severity=medium&amp;id=6859c3c943d9e1063349dbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6524-improper-authentication-in-70mai-1s-796f012a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6524%3A%20Improper%20Authentication%20in%2070mai%201S&amp;severity=low&amp;id=6859c3c943d9e1063349dc01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/irans-internet-a-censys-perspective-d7505f8d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran&apos;s%20Internet%3A%20A%20Censys%20Perspective&amp;severity=medium&amp;id=6859c06243d9e10633498807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52558-cwe-79-improper-neutralization-of-i-7690150f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52558%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=6859c00fa220c77d4f671f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52562-cwe-22-improper-limitation-of-a-pat-1bdef3d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52562%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ConvoyPanel%20panel&amp;severity=critical&amp;id=6859c00fa220c77d4f671f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2828-cwe-918-server-side-request-forgery--f4d9cd43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2828%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=high&amp;id=6859c00fa220c77d4f671f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-code-execution-on-40000-wifi-alarm-clocks-f367ad10</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Code%20Execution%20on%2040%2C000%20WiFi%20alarm%20clocks&amp;severity=medium&amp;id=6859bc8ea220c77d4f671b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49574-cwe-668-exposure-of-resource-to-wro-c6b013a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49574%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20quarkusio%20quarkus&amp;severity=medium&amp;id=6859b1fea220c77d4f670a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6547-cwe-20-improper-input-validation-369a7d8f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6547%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=critical&amp;id=6859a824e1fba96401e74ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6518-improper-neutralization-of-special-e-e071e14b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6518%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20PySpur-Dev%20pyspur&amp;severity=medium&amp;id=6859a824e1fba96401e74ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6545-cwe-20-improper-input-validation-9d40f19a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6545%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=critical&amp;id=6859a4a0e1fba96401e74798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/drat-v2-updated-drat-emerges-in-arsenal-6544c987</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DRAT%20V2%3A%20Updated%20DRAT%20Emerges%20in%20Arsenal&amp;severity=medium&amp;id=685ab4fdaf41c610cd95c1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canada-says-salt-typhoon-hacked-telecom-firm-via-c-64fb91c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canada%20says%20Salt%20Typhoon%20hacked%20telecom%20firm%20via%20Cisco%20flaw&amp;severity=high&amp;id=68599d97e1fba96401e74184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/echo-chamber-jailbreak-tricks-llms-like-openai-and-7bb41d6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Echo%20Chamber%20Jailbreak%20Tricks%20LLMs%20Like%20OpenAI%20and%20Google%20into%20Generating%20Harmful%20Content&amp;severity=high&amp;id=68599d97e1fba96401e7418c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-homeland-security-warns-of-escalating-iranian-c-bc99e06c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Homeland%20Security%20warns%20of%20escalating%20Iranian%20cyberattack%20risks&amp;severity=high&amp;id=68599d97e1fba96401e74188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6517-server-side-request-forgery-in-droma-f9b76c73</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6517%3A%20Server-Side%20Request%20Forgery%20in%20Dromara%20MaxKey&amp;severity=medium&amp;id=685aaab34dc24046c1dc83cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6516-heap-based-buffer-overflow-in-hdf5-6091edfd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6516%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=68598c03e1fba96401e725ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-hunting-introduction-cobalt-strike-e37e8708</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Hunting%20Introduction%3A%20Cobalt%20Strike&amp;severity=medium&amp;id=68598501e1fba96401e720b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6511-stack-based-buffer-overflow-in-netge-dfb7df99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6511%3A%20Stack-based%20Buffer%20Overflow%20in%20Netgear%20EX6150&amp;severity=high&amp;id=685984fee1fba96401e720a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6510-stack-based-buffer-overflow-in-netge-fca1dcd3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6510%3A%20Stack-based%20Buffer%20Overflow%20in%20Netgear%20EX6100&amp;severity=high&amp;id=68597df3e1fba96401e71a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/haveibeenpwnedwatch-open-source-no-fluff-charts-sh-80af7638</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=haveibeenpwned.watch%20-%20Open-source%2C%20no-fluff%20charts%20showcasing%20haveibeenpwned.com&apos;s%20pwned%20account%20data&amp;severity=medium&amp;id=68597a71e1fba96401e71752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6509-cross-site-scripting-in-seaswalker-s-7609f313</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6509%3A%20Cross%20Site%20Scripting%20in%20seaswalker%20spring-analysis&amp;severity=medium&amp;id=685976ebe1fba96401e714ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-secures-llms-calling-apis-via-mcp-a-stack-of--011281b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20secures%20LLMs%20calling%20APIs%20via%20MCP%3F%20A%20stack%20of%20OAuth%20specs%E2%80%94here%E2%80%99s%20how%20they%20fit%20together&amp;severity=medium&amp;id=68596b45b023ea275d7dec01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52879-cwe-79-in-jetbrains-teamcity-91fb2967</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52879%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68596271179a4edd60b69993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52878-cwe-862-in-jetbrains-teamcity-96b6e277</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52878%3A%20CWE-862%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68596271179a4edd60b69990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52877-cwe-79-in-jetbrains-teamcity-07fcf7b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52877%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68596271179a4edd60b6998d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52876-cwe-79-in-jetbrains-teamcity-c9a9665f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52876%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68596271179a4edd60b6998a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52875-cwe-79-in-jetbrains-teamcity-c62ac8ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52875%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68596271179a4edd60b69987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2172-cwe-78-improper-neutralization-of-sp-82bb7546</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2172%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Aviatrix%20Controller&amp;severity=medium&amp;id=68596271179a4edd60b6999a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2171-cwe-307-improper-restriction-of-exce-11b60ba9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2171%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Aviatrix%20Controller&amp;severity=high&amp;id=68596271179a4edd60b69996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-dmv-texts-scam-hit-thousands-in-widespread-ph-abecafa9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20DMV%20Texts%20Scam%20Hit%20Thousands%20in%20Widespread%20Phishing%20Campaign&amp;severity=medium&amp;id=685957e4179a4edd60b68e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52542-100bb2ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52542&amp;severity=low&amp;id=68595b69179a4edd60b69351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6512-cwe-94-improper-control-of-generatio-37e83441</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6512%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Bizerba%20SE%20%26%20Co.%20KG%20BRAIN2&amp;severity=critical&amp;id=68595460179a4edd60b68c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6513-cwe-260-password-in-configuration-fi-369e3e4d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6513%3A%20CWE-260%3A%20Password%20in%20Configuration%20File%20in%20Bizerba%20SE%20%26%20Co.%20KG%20BRAIN2&amp;severity=critical&amp;id=68594d59179a4edd60b68459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-minecraft-mods-on-github-found-stealing-playe-fddeb4cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Minecraft%20Mods%20on%20GitHub%20Found%20Stealing%20Player%20Data%20and%20Crypto%20Wallet%20Info&amp;severity=low&amp;id=685942cb179a4edd60b67c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-analysis-report-umbrella-stand-malware-tar-f662bc54</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Analysis%20Report%3A%20UMBRELLA%20STAND%20-%20Malware%20targeting%20Fortinet%20devices&amp;severity=medium&amp;id=685ab4fdaf41c610cd95c1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/novel-ssrf-technique-involving-http-redirect-loops-d49bf5ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Novel%20SSRF%20Technique%20Involving%20HTTP%20Redirect%20Loops&amp;severity=medium&amp;id=68593842179a4edd60b6749c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oxford-city-council-suffers-breach-exposing-two-de-59393826</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oxford%20City%20Council%20suffers%20breach%20exposing%20two%20decades%20of%20data&amp;severity=high&amp;id=68592a2f179a4edd60b66b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-threat-actors-cyber-fattah-leak-visito-b75cf048</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Threat%20Actors%20Cyber%20Fattah%20Leak%20Visitors%20and%20Athletes&apos;%20Data%20from%20Saudi%20Games&amp;severity=medium&amp;id=68592a2f179a4edd60b66b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-financial-impact-of-marks-spencer-and-co-op-cy-6c6f55be</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20financial%20impact%20of%20Marks%20%26%20Spencer%20and%20Co-op%20cyberattacks%20could%20reach%20%C2%A3440M&amp;severity=medium&amp;id=68592a2f179a4edd60b66b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27387-cwe-200-exposure-of-sensitive-infor-7993a7ef</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27387%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20OPPO%20ColorOS&amp;severity=high&amp;id=68592327179a4edd60b65f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52935-cwe-190-integer-overflow-or-wraparo-1f2118b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52935%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20dragonflydb%20dragonfly&amp;severity=critical&amp;id=68592327179a4edd60b65f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52939-cwe-787-out-of-bounds-write-in-dail-d9d5d358</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52939%3A%20CWE-787%20Out-of-bounds%20Write%20in%20dail8859%20NotepadNext&amp;severity=critical&amp;id=68592327179a4edd60b65f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52938-cwe-125-out-of-bounds-read-in-dail8-32cc9459</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52938%3A%20CWE-125%20Out-of-bounds%20Read%20in%20dail8859%20NotepadNext&amp;severity=medium&amp;id=68592327179a4edd60b65f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52937-vulnerability-in-pointcloudlibrary--edfdcc69</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52937%3A%20Vulnerability%20in%20PointCloudLibrary%20pcl&amp;severity=low&amp;id=68592327179a4edd60b65f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52936-cwe-59-improper-link-resolution-bef-c41e3035</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52936%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20yrutschle%20sslh&amp;severity=critical&amp;id=68592327179a4edd60b65f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-new-sparkkitty-trojan-spy-in-the-app-store-and-2950de46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20new%20SparkKitty%20Trojan%20spy%20in%20the%20App%20Store%20and%20Google%20Play&amp;severity=medium&amp;id=685ab3b48e5e669c7fb5ad1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6503-sql-injection-in-code-projects-inven-85e2cc5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6503%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6858d24b179a4edd60b60306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6502-sql-injection-in-code-projects-inven-c3e4137f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6502%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6858cece179a4edd60b600a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6501-sql-injection-in-code-projects-inven-2cd432d3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6501%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6858c7be179a4edd60b5fb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6500-sql-injection-in-code-projects-inven-9cb498de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6500%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6858bd32179a4edd60b5f232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6499-heap-based-buffer-overflow-in-vstakh-e5ab10c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6499%3A%20Heap-based%20Buffer%20Overflow%20in%20vstakhov%20libucl&amp;severity=medium&amp;id=6858bd32179a4edd60b5f22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6498-memory-leak-in-htacg-tidy-html5-457d49e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6498%3A%20Memory%20Leak%20in%20HTACG%20tidy-html5&amp;severity=medium&amp;id=6858b2a7179a4edd60b5ebc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6497-reachable-assertion-in-htacg-tidy-ht-448125cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6497%3A%20Reachable%20Assertion%20in%20HTACG%20tidy-html5&amp;severity=medium&amp;id=6858a497179a4edd60b5e02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rawpa-hierarchical-methodology-comprehensive-toolk-36aee75f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RAWPA%20-%20hierarchical%20methodology%2C%20comprehensive%20toolkits%2C%20and%20guided%20workflows&amp;severity=medium&amp;id=68589d8f179a4edd60b5cab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6496-null-pointer-dereference-in-htacg-ti-f811f3b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6496%3A%20NULL%20Pointer%20Dereference%20in%20HTACG%20tidy-html5&amp;severity=medium&amp;id=68589a0a179a4edd60b5be75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52969-d6d95a6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52969&amp;severity=low&amp;id=6866a4326f40f0eb72988b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-23-1bf1ca2e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-23&amp;severity=medium&amp;id=6859ecbadec26fc862d8b4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23092-na-15dc60f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23092%3A%20n%2Fa&amp;severity=high&amp;id=6859c00fa220c77d4f671f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44528-na-a97985b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44528%3A%20n%2Fa&amp;severity=high&amp;id=6859ad4f0112634db7041056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48026-na-ab92a9d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48026%3A%20n%2Fa&amp;severity=high&amp;id=6859aba8e1fba96401e7530e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50349-na-59d13735</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50349%3A%20n%2Fa&amp;severity=high&amp;id=6859a11ce1fba96401e7445a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50348-na-f8766d0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50348%3A%20n%2Fa&amp;severity=high&amp;id=6859a11ce1fba96401e74457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52968-cwe-420-unprotected-alternate-chann-6c44d47b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52968%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20freedesktop%20xdg-utils&amp;severity=low&amp;id=68596fe3e1fba96401e70db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46101-na-f784fb4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46101%3A%20n%2Fa&amp;severity=critical&amp;id=68596b43b023ea275d7debf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52967-na-ce0f2ac3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52967%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lfprojects%20MLflow&amp;severity=medium&amp;id=685967c5b023ea275d7de789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48700-na-414615f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48700%3A%20n%2Fa&amp;severity=medium&amp;id=685967c5b023ea275d7de784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23049-cwe-78-improper-neutralization-of-s-080e03e2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23049%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Materialise%20OrthoView&amp;severity=high&amp;id=68593bc4179a4edd60b676fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52926-cwe-223-omission-of-security-releva-4345502c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52926%3A%20CWE-223%20Omission%20of%20Security-relevant%20Information%20in%20spytrap-org%20spytrap-adb&amp;severity=low&amp;id=6858a497179a4edd60b5e028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6494-heap-based-buffer-overflow-in-sparkl-32945e9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6494%3A%20Heap-based%20Buffer%20Overflow%20in%20sparklemotion%20nokogiri&amp;severity=medium&amp;id=68588876179a4edd60b5b272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6493-inefficient-regular-expression-compl-876f6130</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6493%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20CodeMirror&amp;severity=medium&amp;id=6858816f179a4edd60b5aa11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-use-inferno-drainer-to-steal-43000-of-cry-7d93eff4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Use%20Inferno%20Drainer%20to%20Steal%20%2443%2C000%20of%20Crypto%20from%20Over%20110%20Wallets%20on%20CoinMarketCap&amp;severity=medium&amp;id=685868d2179a4edd60b59872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6492-inefficient-regular-expression-compl-79d0e3e1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6492%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20MarkText&amp;severity=medium&amp;id=685861cb179a4edd60b51c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6490-heap-based-buffer-overflow-in-sparkl-d7870982</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6490%3A%20Heap-based%20Buffer%20Overflow%20in%20sparklemotion%20nokogiri&amp;severity=medium&amp;id=6858573f179a4edd60b51445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6489-sql-injection-in-itsourcecode-agri-t-c8956535</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6489%3A%20SQL%20Injection%20in%20itsourcecode%20Agri-Trading%20Online%20Shopping%20System&amp;severity=medium&amp;id=68584cba179a4edd60b50ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6487-stack-based-buffer-overflow-in-totol-014c8f00</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6487%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=68584931179a4edd60b50915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6486-stack-based-buffer-overflow-in-totol-081b3258</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6486%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=68583ea5179a4edd60b4c0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6485-os-command-injection-in-totolink-a30-30d7a2c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6485%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20A3002R&amp;severity=medium&amp;id=6858379c179a4edd60b4b6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6484-sql-injection-in-code-projects-onlin-c27532a4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6484%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shopping%20Store&amp;severity=medium&amp;id=68583417179a4edd60b4b3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6483-sql-injection-in-code-projects-simpl-be59f0ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6483%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68582993179a4edd60b4a951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6482-sql-injection-in-code-projects-simpl-196f5a5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6482%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=685826b8179a4edd60b4a588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6481-sql-injection-in-code-projects-simpl-47a4b996</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6481%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68581b7c179a4edd60b48057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6480-sql-injection-in-code-projects-simpl-437ea642</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6480%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=685817f9179a4edd60b47676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6479-sql-injection-in-code-projects-simpl-a76cedee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6479%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=685810f1179a4edd60b47189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6478-cross-site-request-forgery-in-codeas-bdbba824</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6478%3A%20Cross-Site%20Request%20Forgery%20in%20CodeAstro%20Expense%20Management%20System&amp;severity=medium&amp;id=685809ea179a4edd60b46be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6477-cross-site-scripting-in-sourcecodest-5a2b01bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6477%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6857ff61179a4edd60b46408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6476-cross-site-request-forgery-in-source-22e6e75e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6476%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Gym%20Management%20System&amp;severity=medium&amp;id=6857fbd9179a4edd60b46188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6475-cross-site-scripting-in-sourcecodest-a2dcbcdd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6475%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6857f14d179a4edd60b459a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6474-sql-injection-in-code-projects-inven-ad128748</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6474%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6857edc9179a4edd60b456a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6473-cross-site-scripting-in-code-project-f0c2dfac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6473%3A%20Cross%20Site%20Scripting%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=6857e340179a4edd60b3d1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6472-sql-injection-in-code-projects-onlin-1a850c0a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6472%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68598c03e1fba96401e725f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6471-sql-injection-in-code-projects-onlin-f3f75854</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6471%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6857d1a9179a4edd60b3b7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6470-sql-injection-in-code-projects-onlin-46692f86</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6470%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6857c71e179a4edd60b392ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6469-sql-injection-in-code-projects-onlin-332d21a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6469%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6857bc9e179a4edd60b380a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6468-sql-injection-in-code-projects-onlin-798d82b0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6468%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6857b207179a4edd60b37894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6467-sql-injection-in-code-projects-onlin-5838bc0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6467%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=685795ea179a4edd60b35a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6466-unrestricted-upload-in-ageerle-ruoyi-b8062c27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6466%3A%20Unrestricted%20Upload%20in%20ageerle%20ruoyi-ai&amp;severity=medium&amp;id=68578ede179a4edd60b35626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6458-sql-injection-in-code-projects-onlin-3fffe02f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6458%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685787d7179a4edd60b3513f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6457-sql-injection-in-code-projects-onlin-6db95557</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6457%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685780ce179a4edd60b34bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6456-sql-injection-in-code-projects-onlin-627e244a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6456%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68577d52179a4edd60b3498b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6455-sql-injection-in-code-projects-onlin-7710a266</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6455%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6857764d179a4edd60b33e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/just-casually-broke-bunqs-sandbox-with-0day-level--abb6f5ff</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Just%20casually%20broke%20bunq%E2%80%99s%20sandbox%20with%200day-level%20spoofing%2C%20and%20nobody%20seems%20to%20care%20%F0%9F%87%B3%F0%9F%87%B1&amp;severity=critical&amp;id=68576f3d179a4edd60b33864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6453-path-traversal-in-diyhi-bbs-21cabe56</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6453%3A%20Path%20Traversal%20in%20diyhi%20bbs&amp;severity=medium&amp;id=68576f3b179a4edd60b33857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6452-cross-site-scripting-in-codeastro-pa-5198982f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6452%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=68576f3b179a4edd60b3384f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6451-sql-injection-in-code-projects-simpl-3415c0d1</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6451%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685764af179a4edd60b3312f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6450-sql-injection-in-code-projects-simpl-a7b0e4dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6450%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68575a23179a4edd60b32961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6449-sql-injection-in-code-projects-simpl-0cc7e9d7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6449%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6857531b179a4edd60b31ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6448-sql-injection-in-code-projects-simpl-47993d89</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6448%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6857492ad804313c2171b62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-22-5324ef38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-22&amp;severity=medium&amp;id=68589d8b179a4edd60b5bfb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52923-cwe-732-incorrect-permission-assign-acf72cb5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52923%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Sangfor%20aTrust&amp;severity=medium&amp;id=6857531b179a4edd60b31fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6447-sql-injection-in-code-projects-simpl-304546c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6447%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685742578c71073d87a84aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/series-2-implementing-the-wpa-in-rawpa-part-2-b6a15f7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Series%202%3A%20Implementing%20the%20WPA%20in%20RAWPA%20-%20Part%202&amp;severity=medium&amp;id=6857402af20900b727cb4823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6446-sql-injection-in-code-projects-clien-55412f79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6446%3A%20SQL%20Injection%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68573caff20900b727cae1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6422-unrestricted-upload-in-campcodes-onl-736d300d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6422%3A%20Unrestricted%20Upload%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=685734da56b83d086c5cf016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6421-sql-injection-in-code-projects-simpl-3f0f9906</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6421%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68572dd156b83d086c5ce13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1987-cwe-79-improper-neutralization-of-in-5b8ad67f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Psono%20Psono-client&amp;severity=critical&amp;id=685728ceb82cdf239d3c4be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6420-sql-injection-in-code-projects-simpl-03065827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6420%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685725be6504ee7903b69a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6419-sql-injection-in-code-projects-simpl-462b78ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6419%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6857223e6504ee7903b69738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6418-sql-injection-in-code-projects-simpl-6a3535a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6418%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685717b26504ee7903b68769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6417-sql-injection-in-phpgurukul-art-gall-9f9a3604</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6417%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=685710a76504ee7903b67dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6416-sql-injection-in-phpgurukul-art-gall-b677056f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6416%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6857099e6504ee7903b67139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6415-sql-injection-in-phpgurukul-art-gall-04f7adc8</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6415%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6857061b6504ee7903b6657b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6414-sql-injection-in-phpgurukul-art-gall-0dee9b59</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6414%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=685967c5b023ea275d7de78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hack-our-smart-contract-keep-the-eth-500k-open-sou-ed5d1c05</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%F0%9F%9A%A8%20Hack%20Our%20Smart%20Contract%2C%20Keep%20the%20ETH%20%E2%80%93%20%24500K%20Open-Source%20Heist%20Challenge%20Is%20Live&amp;severity=medium&amp;id=6856f80d6504ee7903b63291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6413-sql-injection-in-phpgurukul-art-gall-fcbb9bb2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6413%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6856f4886504ee7903b62fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6412-sql-injection-in-phpgurukul-art-gall-3ecffd1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6412%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6859ad500112634db7041087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6411-sql-injection-in-phpgurukul-art-gall-39edea5e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6411%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6856e9fc6504ee7903b61f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6410-sql-injection-in-phpgurukul-art-gall-86d3623f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6410%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6856df706504ee7903b5f030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6409-sql-injection-in-phpgurukul-art-gall-9e0205e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6409%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6856d8686504ee7903b5ea39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6408-sql-injection-in-campcodes-online-ho-7b0f21a9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6408%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6856ca626504ee7903b5d65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-campaign-targets-indian-defense-using-cre-d6c20c52</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Campaign%20Targets%20Indian%20Defense%20Using%20Credential-Stealing%20Malware&amp;severity=medium&amp;id=685ab3b48e5e669c7fb5ad00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6407-sql-injection-in-campcodes-online-ho-b2b0d967</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6407%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6856c6db6504ee7903b5d2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akamai-report-warns-of-sophisticated-ddos-campaign-9599075b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akamai%20Report%20Warns%20of%20Sophisticated%20DDoS%20Campaigns%20Crippling%20Global%20Banks&amp;severity=medium&amp;id=6856bfcb6504ee7903b5cb8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6406-sql-injection-in-campcodes-online-ho-0ce42de3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6406%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6856bfd66504ee7903b5cb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6405-sql-injection-in-campcodes-online-te-90b0fe4f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6405%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Teacher%20Record%20Management%20System&amp;severity=medium&amp;id=6856b5406504ee7903b5c0d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unexpected-security-footguns-in-gos-parsers-844e4a2e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unexpected%20security%20footguns%20in%20Go&apos;s%20parsers&amp;severity=medium&amp;id=6856ae416504ee7903b5ba8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3629-cwe-282-improper-ownership-managemen-e1f0ffb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3629%3A%20CWE-282%20Improper%20Ownership%20Management%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=6856ae3f6504ee7903b5ba81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3221-cwe-770-allocation-of-resources-with-e588f7be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3221%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=6856ae3f6504ee7903b5ba7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36016-cwe-601-url-redirection-to-untruste-ea73a996</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36016%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20Process%20Mining&amp;severity=medium&amp;id=6856ae3f6504ee7903b5ba7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/violence-as-a-service-encrypted-apps-used-in-recru-52d1687a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Violence-as-a-Service%3A%20Encrypted%20Apps%20Used%20in%20Recruiting%20Teens%20as%20Hitmen&amp;severity=medium&amp;id=6856a72f6504ee7903b5b40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6404-sql-injection-in-campcodes-online-te-ca0823a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6404%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Teacher%20Record%20Management%20System&amp;severity=medium&amp;id=6856a3ab6504ee7903b5af82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5289-cwe-79-improper-neutralization-of-in-3430ce7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iberezansky%203D%20FlipBook%20%E2%80%93%20PDF%20Embedder%2C%20PDF%20Flipbook%20Viewer%2C%20Flipbook%20Image%20Gallery&amp;severity=medium&amp;id=6856959e6504ee7903b5a239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6403-sql-injection-in-code-projects-schoo-6faa26dd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6403%3A%20SQL%20Injection%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=68568e7faded773421b5a6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6402-buffer-overflow-in-totolink-x15-09a32a74</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6402%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68568e7faded773421b5a6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5143-cwe-79-improper-neutralization-of-in-a295e08e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5143%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20TableOn%20%E2%80%93%20WordPress%20Posts%20Table%20Filterable&amp;severity=medium&amp;id=68568e7faded773421b5a6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6401-denial-of-service-in-totolink-n300rh-a31a8440</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6401%3A%20Denial%20of%20Service%20in%20TOTOLINK%20N300RH&amp;severity=medium&amp;id=68568e7faded773421b5a6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5034-cwe-79-cross-site-scripting-xss-in-w-0a8d965c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5034%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20wp-file-download&amp;severity=high&amp;id=68568e7faded773421b5a6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6400-buffer-overflow-in-totolink-n300rh-df4bfeff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6400%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N300RH&amp;severity=high&amp;id=68568e7faded773421b5a6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6399-buffer-overflow-in-totolink-x15-8ac95873</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6399%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68568e7faded773421b5a6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52488-cwe-200-exposure-of-sensitive-infor-06d3279e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52488%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=68568e80aded773421b5a722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52487-cwe-863-incorrect-authorization-in--0ed579b8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52487%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=68568e7faded773421b5a704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52486-cwe-79-improper-neutralization-of-i-06d79b88</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52486%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68568e7faded773421b5a6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52485-cwe-79-improper-neutralization-of-i-8c0fe171</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52485%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68568e7faded773421b5a6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52552-cwe-601-url-redirection-to-untruste-db1f8c6e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52552%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=68568e80aded773421b5a725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52557-cwe-1384-improper-handling-of-physi-6581edf9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52557%3A%20CWE-1384%3A%20Improper%20Handling%20of%20Physical%20or%20Environmental%20Conditions%20in%20Mail-0%20Zero&amp;severity=high&amp;id=68568e80aded773421b5a72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52556-cwe-347-improper-verification-of-cr-b3e22cc9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52556%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20trailofbits%20rfc3161-client&amp;severity=critical&amp;id=68568e80aded773421b5a729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6394-sql-injection-in-code-projects-simpl-e7bc66a3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6394%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68568e80aded773421b5a732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6393-buffer-overflow-in-totolink-a702r-c689aab6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6393%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68568e80aded773421b5a739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6375-null-pointer-dereference-in-poco-7a5fa74a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6375%3A%20NULL%20Pointer%20Dereference%20in%20poco&amp;severity=medium&amp;id=68568e80aded773421b5a744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5475-cwe-190-integer-overflow-or-wraparou-09832c98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5475%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Sony%20XAV-AX8500&amp;severity=high&amp;id=68568e80aded773421b5a74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5477-cwe-122-heap-based-buffer-overflow-i-b3f8983f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5477%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Sony%20XAV-AX8500&amp;severity=high&amp;id=68568e80aded773421b5a755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5478-cwe-190-integer-overflow-or-wraparou-fbca52ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5478%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Sony%20XAV-AX8500&amp;severity=high&amp;id=68568e80aded773421b5a77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5479-cwe-122-heap-based-buffer-overflow-i-418d2686</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5479%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Sony%20XAV-AX8500&amp;severity=high&amp;id=68568e80aded773421b5a77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5476-cwe-653-improper-isolation-or-compar-2ca8dd12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5476%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Sony%20XAV-AX8500&amp;severity=medium&amp;id=68568e80aded773421b5a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5820-cwe-288-authentication-bypass-using--5a5aee48</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5820%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Sony%20XAV-AX8500&amp;severity=medium&amp;id=68568e80aded773421b5a784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6218-cwe-22-improper-limitation-of-a-path-add70d9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6218%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RARLAB%20WinRAR&amp;severity=high&amp;id=68568e80aded773421b5a78b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6217-cwe-367-time-of-check-time-of-use-to-2333b6df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6217%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20PEAK-System%20Driver&amp;severity=low&amp;id=68568e80aded773421b5a788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6374-stack-based-buffer-overflow-in-d-lin-bfa65f19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6374%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e80aded773421b5a78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-21-96e2e66d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-21&amp;severity=medium&amp;id=68574922d804313c2171b4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52919-na-0e93014f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52919%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Yealink%20RPS&amp;severity=medium&amp;id=68573caff20900b727cae1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52918-na-2d39d1d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52918%3A%20CWE-863%20Incorrect%20Authorization%20in%20Yealink%20RPS&amp;severity=medium&amp;id=68573caff20900b727cae1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52917-na-42e2c78e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52917%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Yealink%20RPS&amp;severity=medium&amp;id=68573caff20900b727cae1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52916-cwe-307-improper-restriction-of-exc-38b281d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52916%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Yealink%20RPS&amp;severity=low&amp;id=68573caff20900b727cae1ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6373-stack-based-buffer-overflow-in-d-lin-91438102</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6373%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e80aded773421b5a796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6372-stack-based-buffer-overflow-in-d-lin-d6ca1f33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6372%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e80aded773421b5a79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6371-stack-based-buffer-overflow-in-d-lin-aa21dc26</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6371%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e80aded773421b5a7a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anubis-ransomware-lists-disneyland-paris-as-new-vi-6cce7dba</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anubis%20Ransomware%20Lists%20Disneyland%20Paris%20as%20New%20Victim&amp;severity=medium&amp;id=68568e39aded773421b54f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6370-stack-based-buffer-overflow-in-d-lin-fdca55d1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6370%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e80aded773421b5a7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6369-stack-based-buffer-overflow-in-d-lin-03c0ec8f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6369%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e81aded773421b5a7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6368-stack-based-buffer-overflow-in-d-lin-caba986c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6368%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e81aded773421b5a7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-invite-hijacking-how-fake-links-are-delive-5ca0d2ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Invite%20Hijacking%3A%20How%20Fake%20Links%20Are%20Delivering%20Infostealers&amp;severity=medium&amp;id=685ab3b48e5e669c7fb5acd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6367-stack-based-buffer-overflow-in-d-lin-a16de2b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6367%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e81aded773421b5a7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6365-resource-consumption-in-hobbesosr-ki-cbd71049</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6365%3A%20Resource%20Consumption%20in%20HobbesOSR%20Kitten&amp;severity=medium&amp;id=68568e81aded773421b5a7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6364-sql-injection-in-code-projects-simpl-d0904ffc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6364%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e81aded773421b5a7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6363-sql-injection-in-code-projects-simpl-99be1175</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6363%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e81aded773421b5a80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6362-sql-injection-in-code-projects-simpl-b03d49a4</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6362%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e81aded773421b5a819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6361-sql-injection-in-code-projects-simpl-42486109</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6361%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e81aded773421b5a812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abusing-vercel-to-deliver-remote-ac-d2e4a930</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abusing%20Vercel%20to%20Deliver%20Remote%20Access%20Malware&amp;severity=medium&amp;id=68568e6baded773421b5987f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/caught-in-the-act-uncovering-spynote-in-unexpected-5a7ae6e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Caught%20in%20the%20Act%3A%20Uncovering%20SpyNote%20in%20Unexpected%20Places&amp;severity=medium&amp;id=68568e6baded773421b59a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dmv-themed-phishing-campaign-targeting-us-citizens-586680ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DMV-Themed%20Phishing%20Campaign%20Targeting%20U.S.%20Citizens&amp;severity=medium&amp;id=68568e6baded773421b59a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-loan-app-removed-from-ios-and-google-pla-929f53f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Loan%20App%20Removed%20from%20iOS%20and%20Google%20Play%20App%20Store%20Posed%20Severe%20Risks%20to%20Users&amp;severity=medium&amp;id=68568e6baded773421b59a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypto-phishing-applications-on-the-play-store-ffabf327</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypto%20Phishing%20Applications%20On%20The%20Play%20Store&amp;severity=medium&amp;id=68568e6baded773421b59aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bert-ransomware-the-raven-file-f2260bbb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BERT%20RANSOMWARE%20-%20THE%20RAVEN%20FILE&amp;severity=medium&amp;id=68568e6baded773421b59a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hiding-in-github-bb40c595</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hiding%20in%20GitHub&amp;severity=medium&amp;id=68568e6baded773421b59ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48945-cwe-416-use-after-free-in-aio-libs--d01be0b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48945%3A%20CWE-416%3A%20Use%20After%20Free%20in%20aio-libs%20aiodns&amp;severity=high&amp;id=68568e81aded773421b5a804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6360-sql-injection-in-code-projects-simpl-ddda134e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6360%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e81aded773421b5a7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/steam-phishing-popular-as-ever-582f10cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Steam%20Phishing%3A%20Popular%20as%20Ever&amp;severity=medium&amp;id=68568e6caded773421b5a150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34029-cwe-78-improper-neutralization-of-s-1380e320</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34029%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Edimax%20Edimax%20EW-7438RPn%20Mini&amp;severity=critical&amp;id=68568e82aded773421b5a869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34024-cwe-78-improper-neutralization-of-s-0c9f76cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34024%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Edimax%20Edimax%20EW-7438RPn%20Mini&amp;severity=critical&amp;id=68568e82aded773421b5a863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34023-cwe-22-improper-limitation-of-a-pat-d65f09b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34023%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Karel%20Karel%20IP%20Phone%20IP1211&amp;severity=high&amp;id=68568e82aded773421b5a85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34022-cwe-22-improper-limitation-of-a-pat-64e74f9e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34022%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Selea%20Targa%20IP%20OCR-ANPR%20Camera&amp;severity=critical&amp;id=68568e82aded773421b5a855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34021-cwe-918-server-side-request-forgery-06f79cb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34021%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Selea%20Targa%20IP%20OCR-ANPR%20Camera&amp;severity=high&amp;id=68568e82aded773421b5a84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25037-cwe-200-exposure-of-sensitive-infor-2afcaecd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25037%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Aquatronica%20Aquatronica%20Controller%20System&amp;severity=critical&amp;id=68568e82aded773421b5a846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6359-sql-injection-in-code-projects-simpl-18928e5b</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6359%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e82aded773421b5a86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6358-sql-injection-in-code-projects-simpl-a818e71e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6358%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e82aded773421b5a87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-adds-call-lawyer-feature-to-press-abb4e71f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Adds%20%22Call%20Lawyer%22%20Feature%20to%20Pressure%20Victims%20for%20Larger%20Ransoms&amp;severity=high&amp;id=68568e39aded773421b54f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6357-sql-injection-in-code-projects-simpl-623e12cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6357%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e82aded773421b5a8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6356-sql-injection-in-code-projects-simpl-485bcf17</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6356%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e82aded773421b5a8bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cyber-detection-method-uses-hackers-own-jitter-41e01ab2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Cyber%20Detection%20Method%20Uses%20Hackers%E2%80%99%20Own%20Jitter%20Patterns%20Against%20Them&amp;severity=medium&amp;id=68568e39aded773421b54f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6355-sql-injection-in-sourcecodester-onli-1d58203d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6355%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68568e82aded773421b5a8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49132-cwe-94-improper-control-of-generati-c9a94acd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49132%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20pterodactyl%20panel&amp;severity=critical&amp;id=68568e82aded773421b5a8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48059-cwe-1333-inefficient-regular-expres-cfcbe971</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48059%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20powsybl%20powsybl-core&amp;severity=low&amp;id=68568e82aded773421b5a8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6354-sql-injection-in-code-projects-onlin-357b0210</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6354%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=68568e83aded773421b5a914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6353-cross-site-scripting-in-code-project-af824c35</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6353%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Responsive%20Blog&amp;severity=medium&amp;id=68568e82aded773421b5a8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aflac-discloses-breach-amidst-scattered-spider-ins-022580f7</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aflac%20discloses%20breach%20amidst%20Scattered%20Spider%20insurance%20attacks&amp;severity=high&amp;id=68568e39aded773421b54f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-social-engineering-to-target-expert-on-8de17712</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20Social%20Engineering%20to%20Target%20Expert%20on%20Russian%20Operations&amp;severity=medium&amp;id=68568e39aded773421b54f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5416-exposure-of-sensitive-system-informa-da07b6ac</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5416%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=68568e82aded773421b5a8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6352-direct-request-in-code-projects-auto-c600449b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6352%3A%20Direct%20Request%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68568e83aded773421b5a937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6351-sql-injection-in-itsourcecode-employ-d8d2268a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6351%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=68568e83aded773421b5a930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6193-improper-neutralization-of-special-e-279f3aad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6193%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=medium&amp;id=68568e82aded773421b5a8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6347-cross-site-scripting-in-code-project-1034a35b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6347%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Responsive%20Blog&amp;severity=medium&amp;id=68568e83aded773421b5a96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49873-cwe-79-improper-neutralization-of-i-a3290f20</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NasaTheme%20Elessi&amp;severity=null&amp;id=68568e83aded773421b5a93f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49964-cwe-352-cross-site-request-forgery--26a26626</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49964%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20indgeek%20ClipLink&amp;severity=null&amp;id=68568e83aded773421b5a92a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49965-cwe-352-cross-site-request-forgery--556f3c9f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49965%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oganro%20PixelBeds%20Channel%20Manager%20and%20Hotel%20Booking%20Engine&amp;severity=null&amp;id=68568e83aded773421b5a91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49966-cwe-352-cross-site-request-forgery--19376869</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49966%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oganro%20Oganro%20Travel%20Portal%20Search%20Widget%20for%20HotelBeds%20APITUDE%20API&amp;severity=null&amp;id=68568e83aded773421b5a91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49967-cwe-352-cross-site-request-forgery--00c18e63</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49967%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marcusjansen%20Live%20Sports%20Streamthunder&amp;severity=null&amp;id=68568e83aded773421b5a922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49968-cwe-352-cross-site-request-forgery--e25ef2b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49968%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oganro%20XML%20Travel%20Portal%20Widget&amp;severity=null&amp;id=68568e83aded773421b5a982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49969-cwe-862-missing-authorization-in-za-e51f7274</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49969%3A%20Missing%20Authorization%20in%20Zara%204%20Zara%204%20Image%20Compression&amp;severity=null&amp;id=68568e83aded773421b5a985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49970-cwe-862-missing-authorization-in-sp-63b691f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49970%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Hello%20FSE%20Blog&amp;severity=null&amp;id=68568e83aded773421b5a988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49971-cwe-862-missing-authorization-in-at-a83a6377</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49971%3A%20Missing%20Authorization%20in%20aThemeArt%20Translations%20eDS%20Responsive%20Menu&amp;severity=null&amp;id=68568e83aded773421b5a98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49972-cwe-352-cross-site-request-forgery--c91dd2eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49972%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Wood%20TM%20Replace%20Howdy&amp;severity=null&amp;id=68568e83aded773421b5a98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49973-cwe-862-missing-authorization-in-gr-d7776dc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49973%3A%20Missing%20Authorization%20in%20GrandPlugins%20Image%20Sizes%20Controller%2C%20Create%20Custom%20Image%20Sizes%2C%20Disable%20Image%20Sizes&amp;severity=null&amp;id=68568e83aded773421b5a991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49974-cwe-862-missing-authorization-in-up-98ec34c3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49974%3A%20Missing%20Authorization%20in%20upstreamplugin%20UpStream%3A%20a%20Project%20Management%20Plugin%20for%20WordPress&amp;severity=null&amp;id=68568e84aded773421b5a9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49975-cwe-352-cross-site-request-forgery--8a196eea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49975%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hossni%20Mubarak%20JobWP&amp;severity=null&amp;id=68568e84aded773421b5a9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49976-missing-authorization-in-wanotifier-a4b1fe83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49976%3A%20Missing%20Authorization%20in%20WANotifier%20Notifier&amp;severity=null&amp;id=69cd7410e6bfc5ba1def5035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49977-cwe-352-cross-site-request-forgery--dc7aac54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49977%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Inventory%20WP%20Inventory%20Manager&amp;severity=null&amp;id=68568e84aded773421b5a9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49978-cwe-639-authorization-bypass-throug-3eabac42</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49978%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20eyecix%20JobSearch&amp;severity=null&amp;id=68568e84aded773421b5a9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49979-cwe-862-missing-authorization-in-sl-04114167</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49979%3A%20Missing%20Authorization%20in%20slui%20Media%20Hygiene&amp;severity=null&amp;id=68568e84aded773421b5a9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49980-cwe-862-missing-authorization-in-wp-b699523c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49980%3A%20Missing%20Authorization%20in%20WP%20Event%20Manager%20WP%20User%20Profile%20Avatar&amp;severity=null&amp;id=68568e84aded773421b5a9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49981-cwe-862-missing-authorization-in-ma-56a3aafc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49981%3A%20Missing%20Authorization%20in%20mahabub81%20User%20Roles%20and%20Capabilities&amp;severity=null&amp;id=68568e84aded773421b5a9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49982-cwe-862-missing-authorization-in-ag-ab99d865</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49982%3A%20Missing%20Authorization%20in%20aguilatechnologies%20WP%20Customer%20Area&amp;severity=null&amp;id=68568e82aded773421b5a8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49983-cwe-918-server-side-request-forgery-6c476e6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49983%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Joe%20Hoyle%20WPThumb&amp;severity=null&amp;id=68568e84aded773421b5a9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49984-cwe-918-server-side-request-forgery-b1fd4b72</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49984%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=null&amp;id=68568e84aded773421b5a9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49985-cwe-918-server-side-request-forgery-0cf180bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49985%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ali%20Irani%20Auto%20Upload%20Images&amp;severity=null&amp;id=68568e84aded773421b5a9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49986-cwe-862-missing-authorization-in-th-af0af4be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49986%3A%20Missing%20Authorization%20in%20thanhtungtnt%20Video%20List%20Manager&amp;severity=null&amp;id=68568e84aded773421b5aa07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49987-cwe-862-missing-authorization-in-wp-a9dc369d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49987%3A%20Missing%20Authorization%20in%20WPFactory%20CRM%20ERP%20Business%20Solution&amp;severity=null&amp;id=68568e84aded773421b5aa0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49988-cwe-862-missing-authorization-in-re-01112c06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49988%3A%20Missing%20Authorization%20in%20Renzo%20Johnson%20Contact%20Form%207%20AWeber%20Extension&amp;severity=null&amp;id=68568e84aded773421b5aa0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49989-cwe-862-missing-authorization-in-ap-2a9f1df7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49989%3A%20Missing%20Authorization%20in%20App%20Cheap%20App%20Builder&amp;severity=null&amp;id=68568e84aded773421b5aa11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49991-cwe-862-missing-authorization-in-tg-6879efaf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49991%3A%20CWE-862%20Missing%20Authorization%20in%20tggfref%20WP-Recall&amp;severity=medium&amp;id=68568e84aded773421b5aa17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49993-cwe-862-missing-authorization-in-co-02446d40</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49993%3A%20Missing%20Authorization%20in%20csarturas%20Cookie-Script.com&amp;severity=null&amp;id=68568e84aded773421b5aa1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49995-cwe-639-authorization-bypass-throug-584cfe13</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49995%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dFactory%20Download%20Attachments&amp;severity=null&amp;id=68568e84aded773421b5aa20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49996-cwe-862-missing-authorization-in-os-090184b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49996%3A%20Missing%20Authorization%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=null&amp;id=68568e84aded773421b5aa23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49997-cwe-862-missing-authorization-in-sy-b2efbf58</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49997%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Giveaways%20and%20Contests%20by%20RafflePress&amp;severity=null&amp;id=68568e84aded773421b5aa26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49998-cwe-862-missing-authorization-in-we-1e18efd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49998%3A%20Missing%20Authorization%20in%20Wetail%20WooCommerce%20Fortnox%20Integration&amp;severity=null&amp;id=68568e84aded773421b5aa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50008-cwe-862-missing-authorization-in-cs-09992d1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50008%3A%20Missing%20Authorization%20in%20cscode%20WooCommerce%20Manager%20%26%238211%3B%20Customize%20and%20Control%20Cart%20page%2C%20Add%20to%20Cart%20button%2C%20Checkout%20fields%20easily&amp;severity=null&amp;id=68568e85aded773421b5aa53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50009-cwe-862-missing-authorization-in-cl-866c50ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50009%3A%20Missing%20Authorization%20in%20Climax%20Themes%20Kata%20Plus&amp;severity=null&amp;id=68568e85aded773421b5aa56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50010-cwe-862-missing-authorization-in-za-25717061</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50010%3A%20Missing%20Authorization%20in%20Zapier%20Zapier%20for%20WordPress&amp;severity=null&amp;id=68568e85aded773421b5aa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50011-cwe-79-improper-neutralization-of-i-4469f7b1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F%C3%A9lix%20Mart%C3%ADnez%20Recipes%20manager%20-%20WPH&amp;severity=medium&amp;id=68568e85aded773421b5aa5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50012-cwe-79-improper-neutralization-of-i-3b9ea90f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50012%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fridaysystems%20Inventory%20Presser&amp;severity=null&amp;id=68568e85aded773421b5aa61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50013-cwe-79-improper-neutralization-of-i-ded9e39b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50013%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jason%20Judge%20CSV%20Importer%20Improved&amp;severity=null&amp;id=68568e85aded773421b5aa65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50014-cwe-79-improper-neutralization-of-i-6bb5b3da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50014%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iamapinan%20PDPA%20Consent%20for%20Thailand&amp;severity=null&amp;id=68568e85aded773421b5aa68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50015-cwe-79-improper-neutralization-of-i-2e565be0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50015%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rodrigo%20Bastos%20Hand%20Talk&amp;severity=null&amp;id=68568e85aded773421b5aa6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50016-cwe-79-improper-neutralization-of-i-3081fc38</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50016%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brijeshk89%20IP%20Based%20Login&amp;severity=null&amp;id=68568e85aded773421b5aa6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50017-cwe-79-improper-neutralization-of-i-eb901fc1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50017%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matt%20WP%20Voting%20Contest&amp;severity=null&amp;id=68568e85aded773421b5aa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50019-cwe-79-improper-neutralization-of-i-f83dc2a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50019%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sandor%20Kovacs%20Simple%20Sticky%20Footer&amp;severity=null&amp;id=68568e85aded773421b5aa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50020-cwe-79-improper-neutralization-of-i-80cd86c9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nitin%20Yawalkar%20RDFa%20Breadcrumb&amp;severity=null&amp;id=68568e85aded773421b5aa97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50021-cwe-79-improper-neutralization-of-i-b4fb4c85</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20Peake%20Better%20Random%20Redirect&amp;severity=null&amp;id=68568e85aded773421b5aa9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50022-cwe-79-improper-neutralization-of-i-e275fa36</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50022%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JK%20WP-FB-AutoConnect&amp;severity=null&amp;id=68568e85aded773421b5aa9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50023-cwe-79-improper-neutralization-of-i-24f72625</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50023%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Coyier%20CodePen%20Embed%20Block&amp;severity=null&amp;id=68568e85aded773421b5aaa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50024-cwe-79-improper-neutralization-of-i-6bb38052</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50024%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Truong%20Thanh%20ATP%20Call%20Now&amp;severity=null&amp;id=68568e85aded773421b5aaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50025-cwe-79-improper-neutralization-of-i-140c2728</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20CP%20Polls&amp;severity=null&amp;id=68568e85aded773421b5aaa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50027-cwe-79-improper-neutralization-of-i-60d6e294</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xootix%20Login%2FSignup%20Popup&amp;severity=null&amp;id=68568e85aded773421b5aaab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50030-cwe-79-improper-neutralization-of-i-d2af3a6b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50030%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Spark%20Multipurpose&amp;severity=null&amp;id=68568e85aded773421b5aaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50033-cwe-79-improper-neutralization-of-i-1570158e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Fitness%20Park&amp;severity=null&amp;id=68568e85aded773421b5aab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50034-cwe-862-missing-authorization-in-ma-997b4f78</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50034%3A%20Missing%20Authorization%20in%20Mahmudul%20Hasan%20Arif%20Enhanced%20Blocks%20%26%238211%3B%20Page%20Builder%20Blocks%20for%20Gutenberg&amp;severity=null&amp;id=68568e85aded773421b5aadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50035-cwe-79-improper-neutralization-of-i-61706710</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyrilG%20Fyrebox%20Quizzes&amp;severity=null&amp;id=68568e85aded773421b5aae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50036-cwe-352-cross-site-request-forgery--440f5faa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50036%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yamna%20Khawaja%20Mailing%20Group%20Listserv&amp;severity=null&amp;id=68568e85aded773421b5aae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50037-cwe-79-improper-neutralization-of-i-b907f992</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Buying%20Buddy%20Buying%20Buddy%20IDX%20CRM&amp;severity=null&amp;id=68568e85aded773421b5aae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50038-cwe-79-improper-neutralization-of-i-dd1abf52</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50038%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anantaddons%20Anant%20Addons%20for%20Elementor&amp;severity=null&amp;id=68568e85aded773421b5aaea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50041-cwe-79-improper-neutralization-of-i-61b0641e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50041%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Engine%20Gutenberg%20Blocks%20%E2%80%93%20ACF%20Blocks%20Suite&amp;severity=null&amp;id=68568e85aded773421b5aaed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50042-cwe-79-improper-neutralization-of-i-d518604f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20WP%20Register%20Profile%20With%20Shortcode&amp;severity=null&amp;id=68568e85aded773421b5aaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50043-cwe-79-improper-neutralization-of-i-8dc6bf6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50043%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jordy%20Meow%20Code%20Engine&amp;severity=null&amp;id=68568e85aded773421b5aaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50044-cwe-352-cross-site-request-forgery--067c7e01</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50044%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=68568e85aded773421b5aaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50045-cwe-79-improper-neutralization-of-i-d8423604</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50045%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ProWCPlugins%20Related%20Products%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68568e85aded773421b5aaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50046-cwe-79-improper-neutralization-of-i-bf1a2ef4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20WPComplete&amp;severity=null&amp;id=68568e86aded773421b5ab26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50047-cwe-79-improper-neutralization-of-i-82764b41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50047%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Sitekit&amp;severity=null&amp;id=68568e86aded773421b5ab29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50048-cwe-79-improper-neutralization-of-i-31b0d3f8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50048%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atakan%20Au%20Automatically%20Hierarchic%20Categories%20in%20Menu&amp;severity=null&amp;id=68568e86aded773421b5ab2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50049-cwe-79-improper-neutralization-of-i-f3f9aee1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50049%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prismtechstudios%20Modern%20Footnotes&amp;severity=null&amp;id=68568e86aded773421b5ab2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50050-cwe-79-improper-neutralization-of-i-2a6c7ef5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50050%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BlueGlass%20Interactive%20AG%20Jobs%20for%20WordPress&amp;severity=null&amp;id=68568e86aded773421b5ab32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50051-cwe-79-improper-neutralization-of-i-84dabc8e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chad%20Butler%20WP-Members&amp;severity=null&amp;id=68568e86aded773421b5ab35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52772-cwe-352-cross-site-request-forgery--d0dde249</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52772%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Adnan%20Haque%20(a11n)%20Virtual%20Moderator&amp;severity=high&amp;id=68568e86aded773421b5ab7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52780-cwe-352-cross-site-request-forgery--906f9842</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52780%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mohammad%20Parsa%20Logo%20Manager%20For%20Samandehi&amp;severity=null&amp;id=68568e86aded773421b5ab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52781-cwe-352-cross-site-request-forgery--69866733</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52781%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Beee%20TinyNav&amp;severity=null&amp;id=68568e86aded773421b5ab82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52782-cwe-79-improper-neutralization-of-i-1629604a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52782%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20King%20Rayhan%20Scroll%20UP&amp;severity=null&amp;id=68568e86aded773421b5ab85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52783-cwe-352-cross-site-request-forgery--b3fdb48a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52783%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themelocation%20Change%20Cart%20button%20Colors%20WooCommerce&amp;severity=null&amp;id=68568e86aded773421b5ab89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52784-cwe-352-cross-site-request-forgery--403de506</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52784%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hideoguchi%20Bluff%20Post&amp;severity=null&amp;id=68568e86aded773421b5ab8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52789-cwe-352-cross-site-request-forgery--b4a21288</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52789%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20George%20Lewe%20Lewe%20ChordPress&amp;severity=null&amp;id=68568e87aded773421b5abb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52790-cwe-352-cross-site-request-forgery--cdf67976</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52790%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20r-win%20WP-DownloadCounter&amp;severity=null&amp;id=68568e87aded773421b5abbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52791-cwe-352-cross-site-request-forgery--a751e73e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52791%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devfelixmoira%20Knowledge%20Base%20%26%238211%3B%20Knowledge%20Base%20Maker&amp;severity=null&amp;id=68568e87aded773421b5abbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52792-cwe-352-cross-site-request-forgery--49b74832</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52792%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vgstef%20WP%20User%20Stylesheet%20Switcher&amp;severity=null&amp;id=68568e87aded773421b5abc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52793-cwe-352-cross-site-request-forgery--311e57be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52793%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Esselink.nu%20Esselink.nu%20Settings&amp;severity=null&amp;id=68568e87aded773421b5abc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52794-cwe-352-cross-site-request-forgery--0b1108e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52794%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Creative-Solutions%20Creative%20Contact%20Form&amp;severity=null&amp;id=68568e87aded773421b5abc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52795-cwe-352-cross-site-request-forgery--086e4c0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52795%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aharonyan%20WP%20Front%20User%20Submit%20%2F%20Front%20Editor&amp;severity=null&amp;id=68568e87aded773421b5abcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52802-cwe-862-missing-authorization-in-en-e1df5c7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52802%3A%20Missing%20Authorization%20in%20enguerranws%20Import%20YouTube%20videos%20as%20WP%20Posts&amp;severity=null&amp;id=68568e87aded773421b5abce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52821-cwe-89-improper-neutralization-of-s-53808498</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52821%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thanhtungtnt%20Video%20List%20Manager&amp;severity=null&amp;id=68568e87aded773421b5abd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52822-cwe-89-improper-neutralization-of-s-23204694</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52822%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Iqonic%20Design%20WP%20Roadmap&amp;severity=null&amp;id=68568e87aded773421b5abd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52825-cwe-352-cross-site-request-forgery--ed7f33ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52825%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=68568e87aded773421b5abfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52733-cwe-79-improper-neutralization-of-i-29914336</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52733%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anonform%20Ab%20ANON%3A%3Aform%20embedded%20secure%20form&amp;severity=null&amp;id=68568e86aded773421b5ab79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52719-cwe-497-exposure-of-sensitive-syste-d3763eec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52719%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=68568e86aded773421b5ab76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52715-cwe-98-improper-control-of-filename-12145ca8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52715%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Classified%20Listing&amp;severity=null&amp;id=68568e86aded773421b5ab72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52713-cwe-918-server-side-request-forgery-d3855db3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52713%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=null&amp;id=68568e86aded773421b5ab6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52711-cwe-352-cross-site-request-forgery--4e6eb15f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52711%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=null&amp;id=68568e86aded773421b5ab45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52710-cwe-79-improper-neutralization-of-i-1ddaed53</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52710%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ninja%20Team%20File%20Manager%20Pro&amp;severity=null&amp;id=68568e86aded773421b5ab3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52708-cwe-98-improper-control-of-filename-842c60da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52708%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RealMag777%20HUSKY&amp;severity=null&amp;id=68568e86aded773421b5ab3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52707-cwe-79-improper-neutralization-of-i-d1bbd0a4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52707%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Firelight%20Firelight%20Lightbox&amp;severity=null&amp;id=68568e86aded773421b5ab38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6346-sql-injection-in-sourcecodester-adva-9d11dda5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6346%3A%20SQL%20Injection%20in%20SourceCodester%20Advance%20Charity%20Management%20System&amp;severity=medium&amp;id=68568e83aded773421b5a976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3319-cwe-306-missing-authentication-for-c-aaed22f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3319%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20IBM%20Spectrum%20Protect%20Server&amp;severity=high&amp;id=68568e87aded773421b5ac00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6345-cross-site-scripting-in-sourcecodest-286cf0ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6345%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20My%20Food%20Recipe&amp;severity=medium&amp;id=68568e87aded773421b5ac07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6344-sql-injection-in-code-projects-onlin-1b244f9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6344%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=68556d5d7ff74dad36a6694d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53298-cwe-862-missing-authorization-in-de-417dccfe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53298%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Dell%20PowerScale%20OneFS&amp;severity=critical&amp;id=69a0a1ce85912abc71d0be90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32753-cwe-89-improper-neutralization-of-s-1d95e014</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32753%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=685569cf7ff74dad36a660ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6343-sql-injection-in-code-projects-onlin-cd703f35</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6343%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=685566507ff74dad36a65758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/resurgence-of-the-prometei-botnet-31935097</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Resurgence%20of%20the%20Prometei%20Botnet&amp;severity=medium&amp;id=68568e6caded773421b5a171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6342-sql-injection-in-code-projects-onlin-742b37e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6342%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=685562cd7ff74dad36a649df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6341-cross-site-request-forgery-in-code-p-b8d431b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6341%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=6855583a7ff74dad36a62e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6340-cross-site-scripting-in-code-project-893a9b39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6340%3A%20Cross%20Site%20Scripting%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=6855583a7ff74dad36a62e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mocha-manakin-malware-deploys-nodeinitrat-via--66407687</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Mocha%20Manakin%20Malware%20Deploys%20NodeInitRAT%20via%20Clickfix%20Attack&amp;severity=medium&amp;id=685551327ff74dad36a600f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6339-sql-injection-in-ponaravindb-hospita-941e4d23</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6339%3A%20SQL%20Injection%20in%20ponaravindb%20Hospital%20Management%20System&amp;severity=medium&amp;id=685551437ff74dad36a6010c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6337-buffer-overflow-in-totolink-a3002r-0cc796a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6337%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=685551437ff74dad36a60103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6336-buffer-overflow-in-totolink-ex1200t-6f240db7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6336%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68554a2f7ff74dad36a5f037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4102-cwe-434-unrestricted-upload-of-file--8dd8e099</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4102%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20The%20Beaver%20Builder%20Team%20Beaver%20Builder%20Plugin%20(Starter%20Version)&amp;severity=high&amp;id=685546a87ff74dad36a5e6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6335-command-injection-in-dedecms-96607c2d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6335%3A%20Command%20Injection%20in%20DedeCMS&amp;severity=medium&amp;id=685543287ff74dad36a5de79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6334-stack-based-buffer-overflow-in-d-lin-1d892d6f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6334%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-867&amp;severity=high&amp;id=685543287ff74dad36a5de72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-expert-falls-prey-to-elite-hackers-disguise-f270443d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20Expert%20Falls%20Prey%20to%20Elite%20Hackers%20Disguised%20as%20US%20Officials&amp;severity=high&amp;id=68553c1b7ff74dad36a5cd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6333-sql-injection-in-phpgurukul-director-68a5c643</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6333%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=68553c267ff74dad36a5cd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6332-sql-injection-in-phpgurukul-director-b8f66e00</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6332%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=68553c267ff74dad36a5cd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5255-cwe-276-incorrect-default-permission-b1175aea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5255%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Core.ai%20Phoenix%20Code&amp;severity=medium&amp;id=685535137ff74dad36a5ba22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6331-sql-injection-in-phpgurukul-director-eea5559b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6331%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=685535137ff74dad36a5ba2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6330-sql-injection-in-phpgurukul-director-e0ee3c41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6330%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=685535137ff74dad36a5ba27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6329-authorization-bypass-in-scriptandtoo-78d084f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6329%3A%20Authorization%20Bypass%20in%20ScriptAndTools%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=685569cf7ff74dad36a660ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6328-stack-based-buffer-overflow-in-d-lin-dd5da96b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6328%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-815&amp;severity=high&amp;id=68568e82aded773421b5a876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-ransomware-attack-pushed-the-german-napkin-firm--cd1f9cfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20ransomware%20attack%20pushed%20the%20German%20napkin%20firm%20Fasana%20into%20insolvency&amp;severity=medium&amp;id=68552a8a7ff74dad36a2286c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/no-the-16-billion-credentials-leak-is-not-a-new-da-aa218246</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=No%2C%20the%2016%20billion%20credentials%20leak%20is%20not%20a%20new%20data%20breach&amp;severity=high&amp;id=68552a8a7ff74dad36a22868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/txtag-takedown-busting-phishing-email-schemes-368f21f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TxTag%20Takedown%3A%20Busting%20Phishing%20Email%20Schemes&amp;severity=medium&amp;id=685527017ff74dad36a21956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6323-sql-injection-in-phpgurukul-pre-scho-a2848d5c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6323%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=685527027ff74dad36a21968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6322-sql-injection-in-phpgurukul-pre-scho-b15d3fb8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6322%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=685527027ff74dad36a21961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6321-sql-injection-in-phpgurukul-pre-scho-69a6f9d6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6321%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=68551ffc7ff74dad36a1fbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6320-sql-injection-in-phpgurukul-pre-scho-25f3ff47</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6320%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=68551ffc7ff74dad36a1fbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6257-cwe-79-improper-neutralization-of-in-0349ff2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6257%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joostdekeijzer%20Euro%20FxRef%20Currency%20Converter%20(by%20DKZR)&amp;severity=medium&amp;id=68551c787ff74dad36a1f0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6319-sql-injection-in-phpgurukul-pre-scho-34c7a7d8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6319%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=685518f47ff74dad36a1e1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6318-sql-injection-in-phpgurukul-pre-scho-7ead1ca0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6318%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=685511ee7ff74dad36a1d0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6317-sql-injection-in-code-projects-onlin-ee8de9c8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6317%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=685511ee7ff74dad36a1d0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6316-sql-injection-in-code-projects-onlin-041d470b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6316%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=68550ae57ff74dad36a1be9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6315-sql-injection-in-code-projects-onlin-6efa9025</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6315%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=68550ae57ff74dad36a1be93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6314-sql-injection-in-campcodes-sales-and-40da6e40</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6314%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=685503dc7ff74dad36a1ad45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6313-sql-injection-in-campcodes-sales-and-41c3947f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6313%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=685503dc7ff74dad36a1ad3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50054-cwe-122-heap-based-buffer-overflow--c5bcca8a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50054%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OpenVPN%20ovpn-dco-win&amp;severity=medium&amp;id=685503dc7ff74dad36a1ad3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-serpentinecloud-threat-actors-abuse-clou-40498acb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20SERPENTINE%23CLOUD%3A%20Threat%20Actors%20Abuse%20Cloudflare%20Tunnels%20to%20Infect%20Systems%20with%20Stealthy%20Python-Based%20Malware&amp;severity=medium&amp;id=68551c777ff74dad36a1efe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6312-sql-injection-in-campcodes-sales-and-3c03ec80</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6312%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68568e82aded773421b5a83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5125-cwe-79-cross-site-scripting-xss-in-c-781bca08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5125%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Custom%20Post%20Carousels%20with%20Owl&amp;severity=medium&amp;id=6854f98a7ff74dad36a193e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6311-sql-injection-in-campcodes-sales-and-7857c419</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6311%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=6854f5cc7ff74dad36a18b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6310-sql-injection-in-phpgurukul-emergenc-176a9317</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6310%3A%20SQL%20Injection%20in%20PHPGurukul%20Emergency%20Ambulance%20Hiring%20Portal&amp;severity=medium&amp;id=6854eb407ff74dad36a1521c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6309-sql-injection-in-phpgurukul-emergenc-b549c1a2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6309%3A%20SQL%20Injection%20in%20PHPGurukul%20Emergency%20Ambulance%20Hiring%20Portal&amp;severity=medium&amp;id=6854eb407ff74dad36a15215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6308-sql-injection-in-phpgurukul-emergenc-983d4f4f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6308%3A%20SQL%20Injection%20in%20PHPGurukul%20Emergency%20Ambulance%20Hiring%20Portal&amp;severity=medium&amp;id=6854e7bc7ff74dad36a14824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6307-sql-injection-in-code-projects-onlin-41eced01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6307%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=6854e7bc7ff74dad36a1481d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6306-sql-injection-in-code-projects-onlin-a514f720</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6306%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=6854e0b47ff74dad36a1339d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6305-sql-injection-in-code-projects-onlin-ba66f739</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6305%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=6859ad500112634db7041080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6304-sql-injection-in-code-projects-onlin-833e8188</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6304%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=6859ad500112634db7041079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6303-sql-injection-in-code-projects-onlin-7485c74e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6303%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=6854d2a47ff74dad36a11447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6302-stack-based-buffer-overflow-in-totol-41f51869</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6302%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6854d2a47ff74dad36a11440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6301-cross-site-scripting-in-phpgurukul-n-60315cab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6301%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=6854d2a47ff74dad36a1143a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6264-cwe-276-incorrect-default-permission-2f94b0b2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6264%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Rapid7%20Velociraptor&amp;severity=medium&amp;id=6854c8187ff74dad36a0ec82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6300-sql-injection-in-phpgurukul-employee-6c65baca</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6300%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6854c8187ff74dad36a0ec8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6299-os-command-injection-in-totolink-n15-179f2ea9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6299%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=6854c8187ff74dad36a0ec85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6296-sql-injection-in-code-projects-hoste-770e27ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6296%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=6854c1117ff74dad36a0dd1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6295-sql-injection-in-code-projects-hoste-6f53424f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6295%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=6854c1117ff74dad36a0dd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49715-cwe-359-exposure-of-private-persona-33914a2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49715%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Dynamics%20365%20FastTrack%20Implementation&amp;severity=high&amp;id=6854b6887ff74dad36a0c1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6294-sql-injection-in-code-projects-hoste-1b6923df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6294%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=6854b6887ff74dad36a0c1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48058-cwe-1333-inefficient-regular-expres-87a27850</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48058%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20powsybl%20powsybl-core&amp;severity=medium&amp;id=6854af7f7ff74dad36a0b066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6293-sql-injection-in-code-projects-hoste-39c1a7d3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6293%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=6854af7f7ff74dad36a0b073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6292-stack-based-buffer-overflow-in-d-lin-65470246</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6292%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=6854af7f7ff74dad36a0b06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6291-stack-based-buffer-overflow-in-d-lin-6d513f2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6291%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=6854ac027ff74dad36a0a8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6288-cross-site-scripting-in-phpgurukul-b-cbf74a6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6288%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Bus%20Pass%20Management%20System&amp;severity=medium&amp;id=6854ac027ff74dad36a0a8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortios-ssl-vpn-744-insufficient-session-expiratio-6d06a25d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FortiOS%20SSL-VPN%207.4.4%20-%20Insufficient%20Session%20Expiration%20%26%20Cookie%20Reuse&amp;severity=medium&amp;id=6856903f6504ee7903b59cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-excel-ltsc-2024-remote-code-execution-rc-726128fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Excel%20LTSC%202024%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=6856903f6504ee7903b59ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ingress-nginx-4110-remote-code-execution-rce-9b9304d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ingress-NGINX%204.11.0%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=6856903f6504ee7903b59cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46179-na-a6e69e3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46179%3A%20n%2Fa&amp;severity=critical&amp;id=68568e87aded773421b5ac03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45331-na-61fc6904</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45331%3A%20n%2Fa&amp;severity=high&amp;id=68568e83aded773421b5a97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44203-na-a837ec0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44203%3A%20n%2Fa&amp;severity=high&amp;id=68568e83aded773421b5a972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45890-na-72e8cde0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45890%3A%20n%2Fa&amp;severity=critical&amp;id=68568e83aded773421b5a92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44635-na-0eba1297</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44635%3A%20n%2Fa&amp;severity=critical&amp;id=68568e83aded773421b5a926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46158-na-de587394</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46158%3A%20n%2Fa&amp;severity=medium&amp;id=68568e82aded773421b5a8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-20-f5ad52da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-20&amp;severity=medium&amp;id=68568e31aded773421b54db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32875-na-914126fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32875%3A%20n%2Fa&amp;severity=medium&amp;id=68556d5d7ff74dad36a66948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32880-na-c9409404</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32880%3A%20n%2Fa&amp;severity=critical&amp;id=685569cf7ff74dad36a660e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32877-na-63303fb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32877%3A%20n%2Fa&amp;severity=critical&amp;id=685569cf7ff74dad36a660e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48706-na-750915eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48706%3A%20n%2Fa&amp;severity=critical&amp;id=685566507ff74dad36a65754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32879-na-88cb5065</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32879%3A%20n%2Fa&amp;severity=high&amp;id=685566507ff74dad36a6574f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32878-na-e06b0d87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32878%3A%20n%2Fa&amp;severity=critical&amp;id=685566507ff74dad36a6574a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48705-na-02d3306f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48705%3A%20n%2Fa&amp;severity=high&amp;id=685566507ff74dad36a65746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32876-na-06026477</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32876%3A%20n%2Fa&amp;severity=medium&amp;id=685566507ff74dad36a65741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-file-creates-network-socket-and-contacts-62e84b9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20File%20Creates%20Network%20Socket%20and%20Contacts%20fdh32fsdfhs.shop%20-%20Kunai%20Analysis%20Report%20sample%20-%202d266ab2597c72424aa21bc00718f9a13e5836e8&amp;severity=low&amp;id=685538917ff74dad36a5c34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47771-cwe-502-deserialization-of-untruste-9bed96c2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47771%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20powsybl%20powsybl-core&amp;severity=high&amp;id=6854a16d7ff74dad36a08d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6287-cross-site-scripting-in-phpgurukul-c-e00b5c18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6287%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=6854a16d7ff74dad36a08d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6286-open-redirect-in-phpgurukul-covid19--a0d2f3f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6286%3A%20Open%20Redirect%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=6859ad500112634db7041073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6285-cross-site-scripting-in-phpgurukul-c-e7c2ec31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6285%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=6859ad500112634db704106d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6284-cross-site-request-forgery-in-phpgur-cfdcc979</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6284%3A%20Cross-Site%20Request%20Forgery%20in%20PHPGurukul%20Car%20Rental%20Portal&amp;severity=medium&amp;id=6854935d7ff74dad36a08217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6283-path-traversal-in-xataio-xata-agent-c9809e5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6283%3A%20Path%20Traversal%20in%20xataio%20Xata%20Agent&amp;severity=medium&amp;id=6854935d7ff74dad36a0820e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/part-2-tracking-lummac2-infrastructure-2f7e4cc8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Part%202%3A%20Tracking%20LummaC2%20Infrastructure&amp;severity=medium&amp;id=68551c777ff74dad36a1ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealthy-github-malware-campaign-targets-devs-a3f32394</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealthy%20GitHub%20Malware%20Campaign%20Targets%20Devs&amp;severity=medium&amp;id=68551ffb7ff74dad36a1fbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frida-1720-released-3ae9d444</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frida%2017.2.0%20Released&amp;severity=medium&amp;id=68548fdb7ff74dad36a07f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6282-path-traversal-in-xlang-ai-openagent-695801f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6282%3A%20Path%20Traversal%20in%20xlang-ai%20OpenAgents&amp;severity=medium&amp;id=68548c5b7ff74dad36a07cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47293-cwe-611-improper-restriction-of-xml-7d234607</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47293%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20powsybl%20powsybl-core&amp;severity=low&amp;id=6854854d7ff74dad36a07533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6281-path-traversal-in-openbmb-xagent-49053841</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6281%3A%20Path%20Traversal%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=6854854d7ff74dad36a07538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6280-path-traversal-in-transformeroptimus-8f93f2ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6280%3A%20Path%20Traversal%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=685481c97ff74dad36a06f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6279-deserialization-in-upsonic-e185a3e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6279%3A%20Deserialization%20in%20Upsonic&amp;severity=medium&amp;id=6859ad500112634db7041067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6278-path-traversal-in-upsonic-6bc6a6cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6278%3A%20Path%20Traversal%20in%20Upsonic&amp;severity=medium&amp;id=6859ad500112634db7041061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6277-sql-injection-in-brilliance-golden-l-6625de82</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6277%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=6859ad500112634db704105b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6276-sql-injection-in-brilliance-golden-l-c309ce5a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6276%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=685470367ff74dad36a05d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/banana-squad-spotted-hiding-data-stealing-malware--7b6baf6f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Banana%20Squad%20Spotted%20Hiding%20Data-Stealing%20Malware%20in%20Fake%20GitHub%20Repositories&amp;severity=medium&amp;id=685465b9cd4c45acbcc1d19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6275-use-after-free-in-webassembly-wabt-b093dbef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6275%3A%20Use%20After%20Free%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=68546823568348440d477460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-malware-surge-hits-devices-via-overlay-40dc1e3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Malware%20Surge%20Hits%20Devices%20via%20Overlays%2C%20Virtualization%20Fraud%20and%20NFC%20Theft&amp;severity=high&amp;id=685465b9cd4c45acbcc1d18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-group-salt-typhoon-breached-satellite-074fcd9e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20group%20Salt%20Typhoon%20breached%20satellite%20firm%20Viasat&amp;severity=medium&amp;id=685465b9cd4c45acbcc1d195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/antidot-android-malware-analysis-193c31b1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AntiDot%20Android%20Malware%20Analysis&amp;severity=medium&amp;id=6854621b33c7acc0460e0d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6274-resource-consumption-in-webassembly--dbe81acc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6274%3A%20Resource%20Consumption%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=6854621833c7acc0460e0d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6273-reachable-assertion-in-webassembly-w-dcb3e516</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6273%3A%20Reachable%20Assertion%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=68545b1033c7acc0460e0713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6272-out-of-bounds-write-in-wasm3-ace429e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6272%3A%20Out-of-bounds%20Write%20in%20wasm3&amp;severity=medium&amp;id=6854540a33c7acc0460e005e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6271-out-of-bounds-read-in-swftools-886f0881</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6271%3A%20Out-of-Bounds%20Read%20in%20swftools&amp;severity=medium&amp;id=68544d0033c7acc0460ded47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33117-cwe-73-external-control-of-file-nam-d7345312</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33117%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IBM%20QRadar%20SIEM&amp;severity=critical&amp;id=6854498033c7acc0460de96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33121-cwe-611-improper-restriction-of-xml-33da9611</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33121%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20QRadar%20SIEM&amp;severity=high&amp;id=6854498033c7acc0460de96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36050-cwe-532-insertion-of-sensitive-info-2720fb8d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36050%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=6854498033c7acc0460de970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-banana-squad-exploits-github-repos-in-ee4d9242</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20actor%20Banana%20Squad%20exploits%20GitHub%20repos%20in%20new%20campaign&amp;severity=medium&amp;id=685465e2cd4c45acbcc20a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6270-heap-based-buffer-overflow-in-hdf5-928e6743</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6270%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=68543ef033c7acc0460dde8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50200-cwe-532-insertion-of-sensitive-info-d8be2983</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50200%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20rabbitmq%20rabbitmq-server&amp;severity=medium&amp;id=68543b7133c7acc0460d50da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6269-heap-based-buffer-overflow-in-hdf5-8b7cd05f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6269%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=685437e933c7acc0460cff73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-insert-fake-support-numbers-on-real-apple-4650de02</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Insert%20Fake%20Support%20Numbers%20on%20Real%20Apple%2C%20Netflix%2C%20PayPal%20Pages&amp;severity=medium&amp;id=6854346b33c7acc0460ccf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52464-cwe-331-insufficient-entropy-in-mes-46179923</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52464%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20meshtastic%20firmware&amp;severity=critical&amp;id=68542d5c33c7acc0460c8093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49014-cwe-416-use-after-free-in-jqlang-jq-8cabedb9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49014%3A%20CWE-416%3A%20Use%20After%20Free%20in%20jqlang%20jq&amp;severity=medium&amp;id=685429df33c7acc0460c31b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6268-cross-site-scripting-in-luna-imaging-cd4682d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6268%3A%20Cross%20Site%20Scripting%20in%20Luna%20Imaging&amp;severity=medium&amp;id=6854265433c7acc0460c0def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48886-cwe-755-improper-handling-of-except-119e1f51</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48886%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20cardano-scaling%20hydra&amp;severity=medium&amp;id=68541f4c33c7acc0460adad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6267-sql-injection-in-zhilink-adp-applica-0cc1c002</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6267%3A%20SQL%20Injection%20in%20zhilink%20%E6%99%BA%E4%BA%92%E8%81%94(%E6%B7%B1%E5%9C%B3)%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20ADP%20Application%20Developer%20Platform%20%E5%BA%94%E7%94%A8%E5%BC%80%E5%8F%91%E8%80%85%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=68541bce33c7acc0460ac8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4738-cwe-89-improper-neutralization-of-sp-d61f2a21</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4738%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yirmibes%20Software%20MY%20ERP&amp;severity=critical&amp;id=685562cd7ff74dad36a649e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n-korean-hackers-deploy-new-pylangghost-malware-in-f004b213</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=N.%20Korean%20Hackers%20Deploy%20New%20PylangGhost%20Malware%20in%20Fake%20Crypto%20and%20Blockchain%20Job%20Interviews&amp;severity=medium&amp;id=6853ffa533c7acc04609878a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6266-unrestricted-upload-in-flir-ax8-59ac1a88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6266%3A%20Unrestricted%20Upload%20in%20Teledyne%20FLIR%20AX8&amp;severity=medium&amp;id=6853ffb833c7acc0460987d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krispy-kreme-says-november-data-breach-impacts-ove-f4290d58</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Krispy%20Kreme%20says%20November%20data%20breach%20impacts%20over%20160%2C000%20people&amp;severity=high&amp;id=6853fc2033c7acc046098369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6019-execution-with-unnecessary-privilege-ac1420c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6019%3A%20Execution%20with%20Unnecessary%20Privileges&amp;severity=high&amp;id=6853fc3233c7acc046098387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32896-cwe-306-missing-authentication-for--4fa64592</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32896%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Apache%20Software%20Foundation%20Apache%20SeaTunnel&amp;severity=medium&amp;id=6853ea8e33c7acc046092662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt29-exploits-gmail-app-passwords-to-bypa-4df8c115</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT29%20Exploits%20Gmail%20App%20Passwords%20to%20Bypass%202FA%20in%20Targeted%20Phishing%20Campaign&amp;severity=high&amp;id=6853e38433c7acc046092042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31698-cwe-284-improper-access-control-in--6be450d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31698%3A%20CWE-284%20Improper%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=6853e39333c7acc046092090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49763-cwe-400-uncontrolled-resource-consu-8c157133</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49763%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=6853e39333c7acc046092093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5234-cwe-79-improper-neutralization-of-in-402e4ef8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5234%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20News%20%E2%80%93%20%20Advanced%20News%20Magazine%20Blog%20Gutenberg%20Blocks%20Addons&amp;severity=medium&amp;id=6853dc7f33c7acc046090eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5071-cwe-863-incorrect-authorization-in-t-1d7ba375</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5071%3A%20CWE-863%20Incorrect%20Authorization%20in%20tigroumeow%20AI%20Engine&amp;severity=high&amp;id=6853dc7f33c7acc046090eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-israel-hackers-hit-irans-nobitex-exchange-burn-cf1313f2</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Israel%20hackers%20hit%20Iran&apos;s%20Nobitex%20exchange%2C%20burn%20%2490M%20in%20crypto&amp;severity=high&amp;id=6853c76633c7acc04608de12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ryuk-ransomwares-initial-access-expert-extradited--29655678</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ryuk%20ransomware%E2%80%99s%20initial%20access%20expert%20extradited%20to%20the%20U.S.&amp;severity=high&amp;id=6853c76633c7acc04608de0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-bluenoroff-web3-macos-intrusion-analysi-d519d9ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20BlueNoroff%20Web3%20macOS%20Intrusion%20Analysis&amp;severity=medium&amp;id=685465e2cd4c45acbcc20b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4965-cwe-79-improper-neutralization-of-in-99166ac9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4965%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=6853b5d433c7acc04608c993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4571-cwe-862-missing-authorization-in-giv-05fa42a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4571%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=6853b5d433c7acc04608c988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sleepless-strings-template-injection-in-insomnia-90397598</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sleepless%20Strings%20-%20Template%20Injection%20in%20Insomnia&amp;severity=medium&amp;id=6853b25333c7acc04608c64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5490-cwe-79-improper-neutralization-of-in-8326dbc9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antoineh%20Football%20Pool&amp;severity=medium&amp;id=6853a44633c7acc046086d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52474-cwe-89-improper-neutralization-of-s-b6419cbb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52474%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68538ba433c7acc0460837fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4479-cwe-79-improper-neutralization-of-in-be5c9d92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68538ba433c7acc0460837f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4367-cwe-80-improper-neutralization-of-sc-ca50cba3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4367%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=68538ba433c7acc0460837eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50201-cwe-78-improper-neutralization-of-s-d4644ecc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50201%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68538ba433c7acc0460837f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52467-cwe-200-exposure-of-sensitive-infor-bf5a2f18</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52467%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20timescale%20pgai&amp;severity=critical&amp;id=6853811e33c7acc046082f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4661-cwe-22-improper-limitation-of-a-path-35957482</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4661%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=6853768c33c7acc046081e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50183-cwe-79-improper-neutralization-of-i-aa13aad8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenListTeam%20OpenList&amp;severity=medium&amp;id=6853768c33c7acc046081e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6201-cwe-79-improper-neutralization-of-in-497d2686</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6201%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alekv%20Pixel%20Manager%20for%20WooCommerce%20%E2%80%93%20Conversion%20Tracking%2C%20Google%20Ads%2C%20GA4%2C%20TikTok%2C%20Dynamic%20Remarketing&amp;severity=medium&amp;id=6853768c33c7acc046081e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-a-malicious-wordpress-plugin-the-cover-728d4075</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20a%20Malicious%20WordPress%20Plugin%3A%20The%20Covert%20Redirector&amp;severity=medium&amp;id=6854621733c7acc0460e0d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-19-40e9b185</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-19&amp;severity=medium&amp;id=6854a8677ff74dad36a093fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whats-in-an-asp-creative-phishing-attack-on-promin-654aa8c1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What&apos;s%20in%20an%20ASP%3F%20Creative%20Phishing%20Attack%20on%20Prominent%20Academics%20and%20Critics%20of%20Russia&amp;severity=medium&amp;id=6854621733c7acc0460e0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24288-vulnerability-in-versa-director-5ce1cb7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24288%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=critical&amp;id=68534fe133c7acc04607dd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24291-vulnerability-in-versa-director-6316f288</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24291%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=medium&amp;id=68534fe133c7acc04607dd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23171-vulnerability-in-versa-director-99f94689</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23171%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=high&amp;id=68534fe133c7acc04607dd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23168-vulnerability-in-versa-director-1d2c5b3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23168%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=medium&amp;id=68534fe133c7acc04607dd51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24286-vulnerability-in-veeam-backup-and-r-c3be02c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24286%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=high&amp;id=68534fe133c7acc04607dd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23172-vulnerability-in-versa-director-8e4c6627</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23172%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=high&amp;id=68534fe133c7acc04607dd6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23173-vulnerability-in-versa-director-7f67aef3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23173%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=high&amp;id=68534fe133c7acc04607dd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23169-vulnerability-in-versa-director-3be428d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23169%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=medium&amp;id=68534fe133c7acc04607dd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23170-vulnerability-in-versa-director-ee62e9d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23170%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=medium&amp;id=68534fe133c7acc04607dd5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23121-vulnerability-in-veeam-backup-and-r-3bbfd184</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23121%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=68534fe133c7acc04607dd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24287-vulnerability-in-veeam-backup-for-m-09e4f379</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24287%3A%20Vulnerability%20in%20Veeam%20Backup%20for%20Microsoft%20Windows&amp;severity=medium&amp;id=68534fe133c7acc04607dd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/godfather-android-malware-runs-real-apps-in-a-sand-75476f67</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GodFather%20Android%20Malware%20Runs%20Real%20Apps%20in%20a%20Sandbox%20to%20Steal%20Data&amp;severity=medium&amp;id=6853179f33c7acc046074e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-jitter-trap-how-randomness-betrays-the-evasive-69bfd4c2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Jitter-Trap%3A%20How%20Randomness%20Betrays%20the%20Evasive&amp;severity=medium&amp;id=685317ad33c7acc046075019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6192-use-after-free-in-google-chrome-11e3289c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6192%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6853060c33c7acc0460697a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6191-integer-overflow-in-google-chrome-ed8a6559</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6191%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6853060c33c7acc04606979e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/may-2025-infostealer-trend-report-c04855dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=May%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=685317a933c7acc046074f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/may-2025-apt-group-trends-south-korea-3efa6352</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=May%202025%20APT%20Group%20Trends%20(South%20Korea)&amp;severity=medium&amp;id=685317a933c7acc046074f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warning-against-distribution-of-malware-disguised--7e7fdf81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warning%20Against%20Distribution%20of%20Malware%20Disguised%20as%20Research%20Papers&amp;severity=medium&amp;id=685317a933c7acc046074f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/masslogger-fileless-variant-spreads-via-vbe-hides--27bb3b38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Masslogger%20Fileless%20Variant%20%E2%80%93%20Spreads%20via%20.VBE%2C%20Hides%20in%20Registry&amp;severity=medium&amp;id=685317a933c7acc046074f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/famous-chollima-deploying-python-version-of-golang-a4a57714</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Famous%20Chollima%20deploying%20Python%20version%20of%20GolangGhost%20RAT&amp;severity=medium&amp;id=685317a933c7acc046074f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amatera-stealer-rebranded-acr-stealer-with-improve-e1b835e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amatera%20Stealer%3A%20Rebranded%20ACR%20Stealer%20With%20Improved%20Evasion%2C%20Sophistication&amp;severity=medium&amp;id=685317a933c7acc046074fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20260-heap-based-buffer-overflow-in-cisco-d5e50408</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20260%3A%20Heap-based%20Buffer%20Overflow%20in%20Cisco%20ClamAV&amp;severity=critical&amp;id=6852f7fe33c7acc046eeac18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20271-use-of-uninitialized-variable-in-ci-1088b793</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20271%3A%20Use%20of%20Uninitialized%20Variable%20in%20Cisco%20Cisco%20Meraki%20MX%20Firmware&amp;severity=high&amp;id=6852f0f433c7acc046ee349f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-minecraft-mods-distributed-by-the-stargazers--cfd0ba92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Minecraft%20mods%20distributed%20by%20the%20Stargazers%20Ghost%20Network%20to%20steal%20gamers%E2%80%99%20data&amp;severity=medium&amp;id=685317a933c7acc046074fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/healthcare-saas-firm-says-data-breach-impacts-54-m-a86dca60</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Healthcare%20SaaS%20firm%20says%20data%20breach%20impacts%205.4%20million%20patients&amp;severity=high&amp;id=6852e9ea33c7acc046ee2953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chainlink-phishing-how-trusted-domains-become-thre-0ed51b53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChainLink%20Phishing%3A%20How%20Trusted%20Domains%20Become%20Threat%20Vectors&amp;severity=high&amp;id=6852e9ea33c7acc046ee295b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/agentsmith-flaw-in-langsmiths-prompt-hub-exposed-u-f57989a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AgentSmith%20Flaw%20in%20LangSmith&apos;s%20Prompt%20Hub%20Exposed%20User%20API%20Keys%2C%20Data&amp;severity=medium&amp;id=6852e9ea33c7acc046ee295f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1500-minecraft-players-infected-by-java-malware-ma-5bd8f29d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1%2C500%2B%20Minecraft%20Players%20Infected%20by%20Java%20Malware%20Masquerading%20as%20Game%20Mods%20on%20GitHub&amp;severity=high&amp;id=6852e9ea33c7acc046ee2957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1349-cwe-79-improper-neutralization-of-in-87def923</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6852ea2433c7acc046ee29cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20234-out-of-bounds-read-in-cisco-cisco-s-79f873d4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20234%3A%20Out-of-bounds%20Read%20in%20Cisco%20Cisco%20Secure%20Endpoint&amp;severity=medium&amp;id=6852ea2433c7acc046ee29cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1348-cwe-525-information-exposure-through-65af6518</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1348%3A%20CWE-525%20Information%20Exposure%20Through%20Browser%20Caching%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6852ea2433c7acc046ee29c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36049-cwe-611-improper-restriction-of-xml-8f0a4089</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36049%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20webMethods%20Integration%20Server&amp;severity=high&amp;id=6852e66833c7acc046ee2427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36048-cwe-250-execution-with-unnecessary--1474de18</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36048%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20webMethods%20Integration%20Server&amp;severity=high&amp;id=6852e66833c7acc046ee2424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4821-cwe-770-allocation-of-resources-with-10328e5e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4821%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Cloudflare%20quiche&amp;severity=high&amp;id=6852e2e433c7acc046ee1f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4820-cwe-770-allocation-of-resources-with-c95e1372</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4820%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Cloudflare%20quiche&amp;severity=medium&amp;id=6852e2e433c7acc046ee1f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-networks-cortex-xdr-agent-86-eol-details-3680c75a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Networks%20Cortex%20XDR%20Agent%208.6%20EOL%20Details%20and%20Dates&amp;severity=medium&amp;id=6852cdc933c7acc046ee04a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/she-won-they-didnt-just-change-the-machines-they-r-a31b9f24</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=She%20Won.%20They%20Didn&apos;t%20Just%20Change%20the%20Machines.%20They%20Rewired%20the%20Election.&amp;severity=low&amp;id=6852b964a8c9212743885d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/news-flodrix-botnet-targets-vulnerable-langflow-se-e529e989</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=News%20Flodrix%20botnet%20targets%20vulnerable%20Langflow%20servers&amp;severity=medium&amp;id=6852b5daa8c921274388552c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/githubs-dark-side-unveiling-malware-disguised-as-c-936dc5cb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub&apos;s%20Dark%20Side%3A%20Unveiling%20Malware%20Disguised%20as%20Cracks%2C%20Hacks%2C%20and%20Crypto%20Tools&amp;severity=medium&amp;id=6852b5e8a8c92127438856e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-clickfix-deception-to-information-stealer-dep-05e2c27b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20ClickFix%20deception%20to%20information%20stealer%20deployment&amp;severity=medium&amp;id=6852b258a8c921274388513e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-linux-udisks-flaw-lets-attackers-get-root-on-m-050cce80</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Linux%20udisks%20flaw%20lets%20attackers%20get%20root%20on%20major%20Linux%20distros&amp;severity=high&amp;id=6852ab4fa8c92127438848b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-group-qilin-offers-legal-counsel-to-aff-e96b2230</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Group%20Qilin%20Offers%20Legal%20Counsel%20to%20Affiliates&amp;severity=high&amp;id=6852ab4fa8c92127438848b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wormgpt-makes-a-comeback-using-jailbroken-grok-and-a66a24e4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WormGPT%20Makes%20a%20Comeback%20Using%20Jailbroken%20Grok%20and%20Mixtral%20Models&amp;severity=medium&amp;id=6852ab4fa8c92127438848ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6220-cwe-434-unrestricted-upload-of-file--5c65438a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6220%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themefic%20Ultra%20Addons%20for%20Contact%20Form%207&amp;severity=high&amp;id=6852a447a8c921274388360b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38073-f09947a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38073&amp;severity=null&amp;id=695843a1db813ff03e04a568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38046-94f624cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38046&amp;severity=low&amp;id=6852a447a8c9212743883614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38030-604dc83a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38030&amp;severity=low&amp;id=685406af33c7acc04609901d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38026-2f6af660</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38026&amp;severity=low&amp;id=6852a447a8c9212743883612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23999-cwe-862-missing-authorization-in-cl-6a26002d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23999%3A%20Missing%20Authorization%20in%20Cloudways%20Breeze&amp;severity=null&amp;id=6852882da8c921274387fa34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5237-cwe-79-improper-neutralization-of-in-ab6d362e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5237%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nebojsadabic%20Target%20Video%20Easy%20Publish&amp;severity=medium&amp;id=6852882da8c921274387fa37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6086-cwe-434-unrestricted-upload-of-file--380f492c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6086%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20scottyla%20CSV%20Me&amp;severity=high&amp;id=6852882da8c921274387fa3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-slows-internet-to-prevent-cyber-attacks-amid--45c7c8ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Slows%20Internet%20to%20Prevent%20Cyber%20Attacks%20Amid%20Escalating%20Regional%20Conflict&amp;severity=high&amp;id=68528120a8c921274387a474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-cia-analyst-sentenced-to-37-months-for-leaking--15899a50</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-CIA%20Analyst%20Sentenced%20to%2037%20Months%20for%20Leaking%20Top%20Secret%20National%20Defense%20Documents&amp;severity=high&amp;id=68528120a8c921274387a478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-exploitation-of-linux-kernel--b5956fbe</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Exploitation%20of%20Linux%20Kernel%20Privilege%20Escalation%20Vulnerability&amp;severity=high&amp;id=68528120a8c921274387a46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asana-warns-mcp-ai-feature-exposed-customer-data-t-5d541488</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asana%20warns%20MCP%20AI%20feature%20exposed%20customer%20data%20to%20other%20orgs&amp;severity=high&amp;id=68528120a8c921274387a470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5981-cwe-427-uncontrolled-search-path-ele-228e6582</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5981%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Google%20osv-scalibr&amp;severity=medium&amp;id=68527d9ba8c9212743879169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fault-injection-follow-the-white-rabbit-dce25888</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fault%20Injection%20-%20Follow%20the%20White%20Rabbit&amp;severity=medium&amp;id=68527a1aa8c9212743878746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1562-cwe-862-missing-authorization-in-ama-63f82cc7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1562%3A%20CWE-862%20Missing%20Authorization%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=critical&amp;id=68526c07a8c92127438728d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4955-cwe-79-cross-site-scripting-xss-in-t-b89273f8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4955%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20tarteaucitron.io&amp;severity=medium&amp;id=685256f0a8c921274386f544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51381-authentication-bypass-using-an-alte-fab2c209</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51381%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20KAON%20KCM3100&amp;severity=critical&amp;id=685241d9a8c921274386ca5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50202-cwe-22-improper-limitation-of-a-pat-4d3ab3eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50202%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LycheeOrg%20Lychee&amp;severity=high&amp;id=68523e53a8c921274386c67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4413-cwe-434-unrestricted-upload-of-file--914197fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4413%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20byrev%20Pixabay%20Images&amp;severity=high&amp;id=685225b7a8c9212743869f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23252-cwe-1244-in-nvidia-nvdebug-tool-1594eb04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23252%3A%20CWE-1244%20in%20NVIDIA%20NVDebug%20tool&amp;severity=medium&amp;id=68520d1fa8c921274386646d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-18-bf849e3a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-18&amp;severity=medium&amp;id=685356d833c7acc04607f195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26199-na-6f77c254</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26199%3A%20n%2Fa&amp;severity=critical&amp;id=6853141e33c7acc0460738e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29646-na-2c5d74d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29646%3A%20n%2Fa&amp;severity=high&amp;id=6852ff0433c7acc046ffa85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26198-na-6726a886</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26198%3A%20n%2Fa&amp;severity=critical&amp;id=6852ff0433c7acc046ffa859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44952-na-2dbae36c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44952%3A%20n%2Fa&amp;severity=high&amp;id=6852df6133c7acc046ee1a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44951-na-3636d1a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44951%3A%20n%2Fa&amp;severity=high&amp;id=6852df6133c7acc046ee1a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46109-na-01d08cfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46109%3A%20n%2Fa&amp;severity=high&amp;id=6852d85c33c7acc046ee1194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45786-na-a9e014c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45786%3A%20n%2Fa&amp;severity=high&amp;id=6852cddb33c7acc046ee04cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49015-na-3146d551</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49015%3A%20n%2Fa&amp;severity=medium&amp;id=6852ca4933c7acc046edf9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45784-na-a7f38720</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45784%3A%20n%2Fa&amp;severity=critical&amp;id=6852ca4933c7acc046edf9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45661-na-f4edb76b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45661%3A%20n%2Fa&amp;severity=medium&amp;id=6852c638fc49f9a2b3311854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46157-na-433399d7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46157%3A%20n%2Fa&amp;severity=critical&amp;id=6852c3eea8c921274388802f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49149-cwe-79-improper-neutralization-of-i-7c2dcbd4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49149%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=medium&amp;id=6851f0fba8c921274386456b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wallet-apps-arent-safe-either-heres-how-attackers--7a275cbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wallet%20apps%20aren%E2%80%99t%20safe%20either%20%E2%80%94%20here%E2%80%99s%20how%20attackers%20exploit%20their%20flawed%20security%20models&amp;severity=high&amp;id=6851e9f5a8c9212743863f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49825-cwe-863-incorrect-authorization-in--8c575009</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49825%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitational%20teleport&amp;severity=critical&amp;id=6851e2eba8c92127438638f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-aims-at-us-insurers-after-uk-reta-99e4a1c7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%20Aims%20at%20US%20Insurers%20After%20UK%20Retail%20Hit%2C%20Google%20Warns&amp;severity=medium&amp;id=6851d85da8c9212743862eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49385-cwe-64-windows-shortcut-following-i-fc25183a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49385%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Internet%20Security%20(Consumer)&amp;severity=high&amp;id=6851d4dea8c9212743862bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49384-cwe-64-windows-shortcut-following-i-62849730</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49384%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Internet%20Security%20(Consumer)&amp;severity=high&amp;id=6851d4dea8c9212743862bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49824-cwe-200-exposure-of-sensitive-infor-e56603df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49824%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20conda-forge%20conda-smithy&amp;severity=low&amp;id=6851d4dea8c9212743862bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49843-cwe-276-incorrect-default-permissio-ff9680e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49843%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20conda-forge%20conda-smithy&amp;severity=low&amp;id=6851d4dea8c9212743862bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asyncrat-campaign-continues-to-evade-endpoint-dete-d871818c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AsyncRAT%20Campaign%20Continues%20to%20Evade%20Endpoint%20Detection&amp;severity=medium&amp;id=6852a447a8c92127438835da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48443-cwe-64-windows-shortcut-following-i-53922f54</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48443%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Password%20Manager&amp;severity=medium&amp;id=6851d4dea8c9212743862bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scania-confirms-insurance-claim-data-breach-in-ext-6809d0e3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scania%20confirms%20insurance%20claim%20data%20breach%20in%20extortion%20attempt&amp;severity=high&amp;id=6851d154a8c9212743862812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49218-cwe-89-sql-injection-in-trend-micro-50cf7049</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49218%3A%20CWE-89%3A%20SQL%20Injection%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=high&amp;id=6851d172a8c9212743862867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49217-cwe-477-use-of-obsolete-function-in-c1d52bfb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49217%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=critical&amp;id=6851d172a8c9212743862863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49216-cwe-477-use-of-obsolete-function-in-e15d856f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49216%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=critical&amp;id=6851d172a8c921274386285f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49215-cwe-242-use-of-inherently-dangerous-700c96e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49215%3A%20CWE-242%3A%20Use%20of%20Inherently%20Dangerous%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=high&amp;id=6851d172a8c921274386285b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49214-cwe-477-use-of-obsolete-function-in-a0219b59</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49214%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=high&amp;id=6851d172a8c9212743862857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49213-cwe-477-use-of-obsolete-function-in-c4a1962a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49213%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=critical&amp;id=6851d172a8c9212743862853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49212-cwe-477-use-of-obsolete-function-in-27026209</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49212%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=critical&amp;id=6851d172a8c921274386284f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41388-cwe-121-stack-based-buffer-overflow-35eeccc2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41388%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Smart%20Editor&amp;severity=high&amp;id=6851d172a8c9212743862849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41413-cwe-787-out-of-bounds-write-in-fuji-f7c0d797</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41413%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Fuji%20Electric%20Smart%20Editor&amp;severity=high&amp;id=6851d172a8c921274386284c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32412-cwe-125-out-of-bounds-read-in-fuji--5993cce4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32412%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Fuji%20Electric%20Smart%20Editor&amp;severity=high&amp;id=6851cdd1a8c9212743862506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49211-cwe-89-sql-injection-in-trend-micro-e7c82aff</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49211%3A%20CWE-89%3A%20SQL%20Injection%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=high&amp;id=6851cdd1a8c9212743862509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30642-cwe-59-improper-link-resolution-bef-8f9aed8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30642%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Deep%20Security&amp;severity=medium&amp;id=6851cdd1a8c9212743862502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30641-cwe-59-improper-link-resolution-bef-b4787ab2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30641%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Deep%20Security&amp;severity=high&amp;id=6851cdd1a8c92127438624fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30640-cwe-59-improper-link-resolution-bef-2ea005e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30640%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Deep%20Security&amp;severity=high&amp;id=6851cdd1a8c92127438624fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49847-cwe-119-improper-restriction-of-ope-5d0684f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49847%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=6851cdd1a8c921274386250d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30680-cwe-918-ssrf-in-trend-micro-inc-tre-44055e44</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30680%3A%20CWE-918%3A%20SSRF%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=6851ca4da8c92127438621d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30679-cwe-918-ssrf-in-trend-micro-inc-tre-37b6f5ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30679%3A%20CWE-918%3A%20SSRF%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=medium&amp;id=6851ca4da8c92127438621cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30678-cwe-918-ssrf-in-trend-micro-inc-tre-2e73aab1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30678%3A%20CWE-918%3A%20SSRF%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=medium&amp;id=6851ca4da8c92127438621c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5141-cwe-524-use-of-cache-containing-sens-f2252291</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5141%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20Fortra%20Core%20Privileged%20Access%20Manager%20(BoKS)&amp;severity=medium&amp;id=6851c6c9a8c9212743861d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34511-cwe-434-unrestricted-upload-of-file-f6108af7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34511%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Sitecore%20Powershell%20Extension&amp;severity=high&amp;id=6851bfc2a8c9212743861748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34510-cwe-23-relative-path-traversal-in-s-9e99ca80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34510%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Sitecore%20Experience%20Manager&amp;severity=high&amp;id=6851bc3da8c921274386138d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49487-cwe-427-uncontrolled-search-path-el-caae248e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49487%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Worry-Free%20Business%20Security%20Services&amp;severity=medium&amp;id=6851b8bca8c921274386108f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49158-cwe-427-uncontrolled-search-path-el-941f4e8d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49158%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=medium&amp;id=6851b8bca8c921274386108b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49157-cwe-269-improper-privilege-manageme-ba4c34dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49157%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6851b8bca8c9212743861087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49156-cwe-269-improper-privilege-manageme-3f4bb568</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49156%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6851b8bca8c9212743861083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49155-cwe-427-uncontrolled-search-path-el-9a20e456</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49155%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6851b8bca8c921274386107f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49154-cwe-284-improper-access-control-in--f144b002</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49154%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6851b8bca8c921274386107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49850-cwe-122-heap-based-buffer-overflow--39b65947</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49850%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20LS%20Electric%20GMWin%204&amp;severity=high&amp;id=6851b8bca8c9212743861099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49849-cwe-125-out-of-bounds-read-in-ls-el-6169f64d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49849%3A%20CWE-125%20Out-of-bounds%20Read%20in%20LS%20Electric%20GMWin%204&amp;severity=high&amp;id=6851b8bca8c9212743861096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49848-cwe-787-out-of-bounds-write-in-ls-e-9917131c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49848%3A%20CWE-787%20Out-of-bounds%20Write%20in%20LS%20Electric%20GMWin%204&amp;severity=high&amp;id=6851b8bca8c9212743861093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34509-cwe-798-use-of-hard-coded-credentia-cdb3eb4c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34509%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sitecore%20Experience%20Manager&amp;severity=high&amp;id=6851b53ba8c9212743860ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49220-cwe-477-use-of-obsolete-function-in-e3f981fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49220%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=critical&amp;id=6851aaa9a8c9212743860204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49219-cwe-477-use-of-obsolete-function-in-73110187</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49219%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=critical&amp;id=6851aaa9a8c9212743860200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47867-cwe-74-improper-neutralization-of-s-019ff740</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47867%3A%20CWE-74%3A%20%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=6851aaa9a8c92127438601fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47866-cwe-475-undefined-behavior-for-inpu-fbd55328</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47866%3A%20CWE-475%3A%20Undefined%20Behavior%20for%20Input%20to%20API%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=medium&amp;id=6851aaa9a8c92127438601f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47865-cwe-475-undefined-behavior-for-inpu-969b4d84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47865%3A%20CWE-475%3A%20Undefined%20Behavior%20for%20Input%20to%20API%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=6851aaa9a8c92127438601f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33122-cwe-427-uncontrolled-search-path-el-404d08a5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33122%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element&amp;severity=high&amp;id=6851a3a1a8c921274385fb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacklink-market-linked-to-seo-poisoning-attacks-in-8c2bf282</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacklink%20Market%20Linked%20to%20SEO%20Poisoning%20Attacks%20in%20Google%20Results&amp;severity=medium&amp;id=68519c97a8c921274385f548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34508-another-file-sharing-application-an-c89d6583</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34508%3A%20Another%20File%20Sharing%20Application%2C%20Another%20Path%20Traversal&amp;severity=medium&amp;id=6851878da8c921274385dfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48111-cwe-352-cross-site-request-forgery--a97f3f4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48111%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20YITHEMES%20YITH%20PayPal%20Express%20Checkout%20for%20WooCommerce&amp;severity=medium&amp;id=68518788a8c921274385defb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48333-cwe-79-improper-neutralization-of-i-3e03207c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPQuark%20eForm%20-%20WordPress%20Form%20Builder&amp;severity=null&amp;id=68518789a8c921274385df11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49071-cwe-434-unrestricted-upload-of-file-ca0e2e98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49071%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20NasaTheme%20Flozen&amp;severity=null&amp;id=68518789a8c921274385df14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49451-cwe-35-path-traversal-in-yannisraft-f8cae88c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49451%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20yannisraft%20Aeroscroll%20Gallery%20%E2%80%93%20Infinite%20Scroll%20Image%20Gallery%20%26amp%3B%20Post%20Grid%20with%20Photo%20Gallery&amp;severity=null&amp;id=68518789a8c921274385df6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49452-cwe-89-improper-neutralization-of-s-451bff9c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49452%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Adrian%20Lad%C3%B3%20PostaPanduri&amp;severity=null&amp;id=68518789a8c921274385df6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49508-cwe-98-improper-control-of-filename-51c7cf0b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49508%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20CozyStay&amp;severity=null&amp;id=68518789a8c921274385df71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24761-cwe-98-improper-control-of-filename-8d9385d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24761%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20DSK&amp;severity=null&amp;id=68518788a8c921274385debb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24773-cwe-89-improper-neutralization-of-s-20257c27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24773%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20WPCRM%20-%20CRM%20for%20Contact%20form%20CF7%20%26%20WooCommerce&amp;severity=null&amp;id=68518788a8c921274385debe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28972-cwe-89-improper-neutralization-of-s-e1ecd50e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28972%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Suhas%20Surse%20WP%20Employee%20Attendance%20System&amp;severity=null&amp;id=68518788a8c921274385dec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28991-cwe-98-improper-control-of-filename-75763142</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28991%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20Evon&amp;severity=null&amp;id=68518788a8c921274385dec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29002-cwe-98-improper-control-of-filename-1b779072</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29002%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20Simen&amp;severity=null&amp;id=68518788a8c921274385dec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30562-cwe-89-improper-neutralization-of-s-4c04b2d4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30562%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdistillery%20Navigation%20Tree%20Elementor&amp;severity=null&amp;id=68518788a8c921274385deca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30618-cwe-502-deserialization-of-untruste-4aa66cd4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30618%3A%20Deserialization%20of%20Untrusted%20Data%20in%20yuliaz%20Rapyd%20Payment%20Extension%20for%20WooCommerce&amp;severity=null&amp;id=68518788a8c921274385decd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30988-cwe-79-improper-neutralization-of-i-9859c2c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20_CreativeMedia_%20Elite%20Video%20Player&amp;severity=null&amp;id=68518788a8c921274385ded0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31919-cwe-502-deserialization-of-untruste-aae09881</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31919%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20Spare&amp;severity=critical&amp;id=68518788a8c921274385ded3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32510-cwe-434-unrestricted-upload-of-file-4b42e5df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32510%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ovatheme%20Ovatheme%20Events%20Manager&amp;severity=null&amp;id=68518788a8c921274385ded6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32549-cwe-98-improper-control-of-filename-f1f6a1d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32549%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20mojoomla%20WPGYM&amp;severity=high&amp;id=68518788a8c921274385dee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39479-cwe-89-improper-neutralization-of-s-58374bd3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39479%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartiolabs%20Smart%20Notification&amp;severity=critical&amp;id=68518788a8c921274385dee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39486-cwe-89-improper-neutralization-of-s-293a94e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39486%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ValvePress%20Rankie&amp;severity=null&amp;id=68518788a8c921274385dee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39508-cwe-79-improper-neutralization-of-i-6eac194d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39508%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NasaTheme%20Nasa%20Core&amp;severity=null&amp;id=68518788a8c921274385deec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47452-cwe-434-unrestricted-upload-of-file-f03c4e81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47452%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RexTheme%20WP%20VR&amp;severity=null&amp;id=68518788a8c921274385deef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47559-cwe-434-unrestricted-upload-of-file-9848bfcc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47559%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=68518788a8c921274385def2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47572-cwe-98-improper-control-of-filename-f9c448ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47572%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20mojoomla%20School%20Management&amp;severity=high&amp;id=68518788a8c921274385def5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47573-cwe-89-improper-neutralization-of-s-3af61dcb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47573%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20School%20Management&amp;severity=critical&amp;id=68518788a8c921274385def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48118-cwe-89-improper-neutralization-of-s-b09aa063</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48118%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WpExperts%20Hub%20Woocommerce%20Partial%20Shipment&amp;severity=null&amp;id=68518788a8c921274385defe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48145-cwe-79-improper-neutralization-of-i-437b6441</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48145%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michal%20Jaworski%20Track%2C%20Analyze%20%26%20Optimize%20by%20WP%20Tao&amp;severity=null&amp;id=68518789a8c921274385df0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48274-cwe-89-improper-neutralization-of-s-6fefff62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48274%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=68518789a8c921274385df0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49234-cwe-862-missing-authorization-in-de-68a1154e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49234%3A%20Missing%20Authorization%20in%20Deepak%20anand%20WP%20Dummy%20Content%20Generator&amp;severity=null&amp;id=68518789a8c921274385df1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49251-cwe-98-improper-control-of-filename-5ecea245</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49251%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Fana&amp;severity=null&amp;id=68518789a8c921274385df1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49252-cwe-98-improper-control-of-filename-c812e516</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49252%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Besa&amp;severity=null&amp;id=68518789a8c921274385df21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49253-cwe-98-improper-control-of-filename-f2bf20ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49253%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Lasa&amp;severity=null&amp;id=68518789a8c921274385df24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49254-cwe-98-improper-control-of-filename-c2faae2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49254%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Nika&amp;severity=null&amp;id=68518789a8c921274385df27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49255-cwe-98-improper-control-of-filename-554711d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49255%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Ruza&amp;severity=null&amp;id=68518789a8c921274385df34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49256-cwe-98-improper-control-of-filename-5f9cd895</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49256%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Sapa&amp;severity=null&amp;id=68518789a8c921274385df37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49257-cwe-98-improper-control-of-filename-f41d7799</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49257%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Zota&amp;severity=null&amp;id=68518789a8c921274385df3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49258-cwe-98-improper-control-of-filename-a258bed0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49258%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Maia&amp;severity=null&amp;id=68518789a8c921274385df3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49259-cwe-98-improper-control-of-filename-4f632cbd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49259%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Hara&amp;severity=null&amp;id=68518789a8c921274385df40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49260-cwe-98-improper-control-of-filename-d7ae976c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49260%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Aora&amp;severity=null&amp;id=68518789a8c921274385df43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49261-cwe-98-improper-control-of-filename-ba8e9e3e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49261%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=null&amp;id=68518789a8c921274385df46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49266-cwe-79-improper-neutralization-of-i-d8db8715</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rustaurius%20Ultimate%20Reviews&amp;severity=null&amp;id=68518789a8c921274385df49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49312-cwe-79-improper-neutralization-of-i-04565b1c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49312%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeRevolution%20Echo%20RSS%20Feed%20Post%20Generator%20Plugin%20for%20WordPress&amp;severity=null&amp;id=68518789a8c921274385df4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49316-cwe-79-improper-neutralization-of-i-c1b0c32e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=68518789a8c921274385df4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49330-cwe-502-deserialization-of-untruste-84f7ff95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49330%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20Integration%20for%20Contact%20Form%207%20and%20Zoho%20CRM%2C%20Bigin&amp;severity=null&amp;id=68518789a8c921274385df5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49331-cwe-502-deserialization-of-untruste-e4f0a3c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49331%3A%20Deserialization%20of%20Untrusted%20Data%20in%20impleCode%20eCommerce%20Product%20Catalog&amp;severity=null&amp;id=68518789a8c921274385df5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49854-cwe-89-improper-neutralization-of-s-777544ab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49854%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Anh%20Tran%20Slim%20SEO&amp;severity=null&amp;id=68518789a8c921274385df74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49855-cwe-79-improper-neutralization-of-i-6d95f744</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Meks%20Meks%20Flexible%20Shortcodes&amp;severity=null&amp;id=68518789a8c921274385df77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49856-cwe-352-cross-site-request-forgery--971e0e92</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49856%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CyberChimps%20Responsive%20Plus&amp;severity=null&amp;id=6851878aa8c921274385df84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49857-cwe-862-missing-authorization-in-wp-e9a20936</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49857%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=6851878aa8c921274385df87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49858-cwe-79-improper-neutralization-of-i-f866c793</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=null&amp;id=6851878aa8c921274385df8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49859-cwe-79-improper-neutralization-of-i-25aa8968</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49859%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20etruel%20WP%20Views%20Counter&amp;severity=null&amp;id=6851878aa8c921274385df8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49861-cwe-79-improper-neutralization-of-i-e30d33c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49861%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Timur%20Kamaev%20Kama%20Click%20Counter&amp;severity=null&amp;id=6851878aa8c921274385df90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49862-cwe-79-improper-neutralization-of-i-48378d89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49862%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motov.net%20Ebook%20Store&amp;severity=null&amp;id=6851878aa8c921274385df93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49863-cwe-79-improper-neutralization-of-i-71f2491a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20CodeUs%20Advanced%20Sermons&amp;severity=null&amp;id=6851878aa8c921274385df96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49865-cwe-352-cross-site-request-forgery--23159cb9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49865%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Helmut%20Wandl%20Advanced%20Settings&amp;severity=null&amp;id=6851878aa8c921274385df99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49868-cwe-601-url-redirection-to-untruste-371893a4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49868%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Aman%20FunnelKit%20Automations&amp;severity=null&amp;id=6851878aa8c921274385df9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49871-cwe-79-improper-neutralization-of-i-3f42f198</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noptin%20Newsletter%20Team%20Noptin&amp;severity=null&amp;id=6851878aa8c921274385df9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49872-cwe-862-missing-authorization-in-wp-6ffa707e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49872%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=6851878aa8c921274385dfac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49874-cwe-862-missing-authorization-in-ty-746f8455</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49874%3A%20Missing%20Authorization%20in%20tychesoftwares%20Arconix%20FAQ&amp;severity=null&amp;id=6851878aa8c921274385dfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49875-cwe-79-improper-neutralization-of-i-4a5783d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20If-So%20Dynamic%20Content%20If-So%20Dynamic%20Content%20Personalization&amp;severity=null&amp;id=6851878aa8c921274385dfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49877-cwe-918-server-side-request-forgery-496818e9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49877%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=6851878aa8c921274385dfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49878-cwe-79-improper-neutralization-of-i-d289347e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=6851878aa8c921274385dfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49879-cwe-22-improper-limitation-of-a-pat-0f76ab44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49879%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20themezaa%20Litho&amp;severity=null&amp;id=6851878aa8c921274385dfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49880-cwe-862-missing-authorization-in-em-e8725e18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49880%3A%20Missing%20Authorization%20in%20Imran%20Tauqeer%20CubeWP%20Forms&amp;severity=null&amp;id=6851878aa8c921274385dfbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49881-cwe-79-improper-neutralization-of-i-b23ca2b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49881%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=null&amp;id=6851878aa8c921274385dfc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49882-cwe-79-improper-neutralization-of-i-2d382e6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=null&amp;id=6851878aa8c921274385dfc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49415-cwe-22-improper-limitation-of-a-pat-7047ccca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49415%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Fastw3b%20LLC%20FW%20Gallery&amp;severity=null&amp;id=68518789a8c921274385df62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49444-cwe-434-unrestricted-upload-of-file-bb8e8e55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49444%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20merkulove%20Reformer%20for%20Elementor&amp;severity=null&amp;id=68518789a8c921274385df65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49447-cwe-434-unrestricted-upload-of-file-8dac6a23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49447%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Fastw3b%20LLC%20FW%20Food%20Menu&amp;severity=critical&amp;id=68518789a8c921274385df68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49180-integer-overflow-or-wraparound-in-r-4445a451</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49180%3A%20Integer%20Overflow%20or%20Wraparound%20in%20X.Org%20xwayland&amp;severity=high&amp;id=68518789a8c921274385df17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49179-integer-overflow-or-wraparound-in-r-0146a7bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49179%3A%20Integer%20Overflow%20or%20Wraparound%20in%20X.Org%20xwayland&amp;severity=high&amp;id=685183fca8c921274385da59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49178-improper-locking-in-red-hat-red-hat-f5e32c02</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49178%3A%20Improper%20Locking%20in%20X.Org%20xwayland&amp;severity=medium&amp;id=685183fca8c921274385da55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49177-exposure-of-sensitive-information-t-1552a321</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49177%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20X.Org%20xwayland&amp;severity=medium&amp;id=685183fca8c921274385da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49176-integer-overflow-or-wraparound-in-r-1c6d9c58</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49176%3A%20Integer%20Overflow%20or%20Wraparound%20in%20X.Org%20xwayland&amp;severity=high&amp;id=685183fca8c921274385da61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49175-out-of-bounds-read-in-red-hat-red-h-537731bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49175%3A%20Out-of-bounds%20Read%20in%20X.Org%20xwayland&amp;severity=medium&amp;id=68518079a8c921274385d6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4754-cwe-613-insufficient-session-expirat-a2cf8ec9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4754%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20ash-project%20ash_authentication_phoenix&amp;severity=low&amp;id=68517cf5a8c921274385d335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6199-exposure-of-sensitive-information-to-b9abc980</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6199%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=low&amp;id=68517cf5a8c921274385d33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6196-integer-overflow-or-wraparound-in-re-f02e7632</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6196%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=68517cf5a8c921274385d339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49842-cwe-276-incorrect-default-permissio-7ebe1290</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49842%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20conda-forge%20conda-forge-webservices&amp;severity=low&amp;id=68517970a8c921274385cfb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6069-cwe-1333-inefficient-regular-express-d6881876</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6069%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=68517269a8c921274385c3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4404-insufficient-granularity-of-access-c-91e743cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4404%3A%20Insufficient%20Granularity%20of%20Access%20Control&amp;severity=critical&amp;id=68517269a8c921274385c3c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0320-cwe-269-improper-privilege-managemen-31d46445</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0320%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Citrix%20Secure%20Access%20Client%20for%20Windows&amp;severity=high&amp;id=68517269a8c921274385c3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4879-cwe-269-improper-privilege-managemen-b8bcbac3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4879%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Citrix%20Workspace%20App%20for%20Windows&amp;severity=high&amp;id=68516ee4a8c921274385befe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6020-improper-limitation-of-a-pathname-to-5c5da957</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6020%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=685167e3a8c921274385b7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4365-cwe-1284-improper-validation-of-spec-93e65ac2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4365%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NetScaler%20Console&amp;severity=medium&amp;id=68516458a8c921274385b4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploring-a-new-kimjongrat-stealer-variant-and-its-2ce7c5b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploring%20a%20New%20KimJongRAT%20Stealer%20Variant%20and%20Its%20PowerShell%20Implementation&amp;severity=medium&amp;id=685160d3a8c921274385b116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5349-cwe-1284-improper-validation-of-spec-e17b6e52</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5349%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NetScaler%20ADC&amp;severity=high&amp;id=68516458a8c921274385b4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hard-coded-b-password-in-sitecore-xp-sparks-major--9e8933c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hard-Coded%20&apos;b&apos;%20Password%20in%20Sitecore%20XP%20Sparks%20Major%20RCE%20Risk%20in%20Enterprise%20Deployments&amp;severity=high&amp;id=685160d3a8c921274385b112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5777-cwe-125-out-of-bounds-read-in-netsca-7cc36845</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5777%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NetScaler%20ADC&amp;severity=critical&amp;id=68516458a8c921274385b4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zoomcar-data-breach-exposes-personal-info-of-84-mi-db705c49</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zoomcar%20Data%20Breach%20Exposes%20Personal%20Info%20of%208.4%20Million%20Users&amp;severity=high&amp;id=68515646a8c921274385a42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5291-cwe-79-improper-neutralization-of-in-f07c5577</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5291%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20%E2%80%93%20Responsive%20Touch%20Slider&amp;severity=medium&amp;id=685152c6a8c921274385a0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3880-cwe-863-incorrect-authorization-in-a-acdaf801</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3880%3A%20CWE-863%20Incorrect%20Authorization%20in%20assafp%20Quiz%2C%20Poll%20%26%20Survey%20Maker%20by%20Opinion%20Stage&amp;severity=medium&amp;id=685152c6a8c921274385a0b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5700-cwe-79-improper-neutralization-of-in-7e5da287</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tvledesign%20Simple%20Logo%20Carousel&amp;severity=medium&amp;id=685152c6a8c921274385a0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6050-cwe-79-improper-neutralization-of-in-62fb4771</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6050%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20jupo%20mezzanine&amp;severity=medium&amp;id=68514f3ea8c9212743859c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-e-5fac7d61</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20b%20For%20Backdoor%3F%20Pre-Auth%20RCE%20Chain%20In%20Sitecore%20Experience%20Platform%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=68514131a8c9212743858d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3515-cwe-434-unrestricted-upload-of-file--8058e8df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3515%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=685136a2a8c92127438581c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-seizes-774m-in-crypto-tied-to-north-koreas-glob-ccaf73c8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Seizes%20%247.74M%20in%20Crypto%20Tied%20to%20North%20Korea%E2%80%99s%20Global%20Fake%20IT%20Worker%20Network&amp;severity=high&amp;id=6851331da8c9212743857d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-analysis-mcp-protocol-vulnerabilities-in--72e121e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Analysis%3A%20MCP%20Protocol%20Vulnerabilities%20in%20AI%20Toolchains&amp;severity=medium&amp;id=68513352a8c9212743857da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-switch-to-targeting-us-insurance-companies-8d25b4fe</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20switch%20to%20targeting%20U.S.%20insurance%20companies&amp;severity=high&amp;id=6851331da8c9212743857d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-based-car-sharing-company-zoomcar-suffered-a-493df453</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India-based%20car-sharing%20company%20Zoomcar%20suffered%20a%20data%20breach%20impacting%208.4M%20users&amp;severity=high&amp;id=6851331da8c9212743857d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6173-sql-injection-in-webkul-qloapps-8d86dfc1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6173%3A%20SQL%20Injection%20in%20Webkul%20QloApps&amp;severity=medium&amp;id=68510ff4a8c921274385592b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6167-path-traversal-in-themanojdesai-pyth-108af54e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6167%3A%20Path%20Traversal%20in%20themanojdesai%20python-a2a&amp;severity=medium&amp;id=68510ff4a8c9212743855923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6166-path-traversal-in-frdel-agent-zero-dc735483</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6166%3A%20Path%20Traversal%20in%20frdel%20Agent-Zero&amp;severity=medium&amp;id=6851056aa8c9212743854dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6165-buffer-overflow-in-totolink-x15-0add1da2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6165%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6851056aa8c9212743854da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5209-cwe-79-cross-site-scripting-xss-in-i-5d70e0d9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5209%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ivory%20Search&amp;severity=medium&amp;id=6851056aa8c9212743854da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6164-buffer-overflow-in-totolink-a3002r-39567fab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6164%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=6850fe60a8c921274385300d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6163-buffer-overflow-in-totolink-a3002ru-14898456</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6163%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002RU&amp;severity=high&amp;id=6850f758a8c9212743852369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6162-buffer-overflow-in-totolink-ex1200t-53e400cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6162%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6850f758a8c9212743852361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6161-unrestricted-upload-in-sourcecodeste-f966302f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6161%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68518b04a8c921274385e31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6160-sql-injection-in-sourcecodester-clie-54d7fa87</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6160%3A%20SQL%20Injection%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=6851bfc2a8c9212743861741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6159-sql-injection-in-code-projects-hoste-fe04c701</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6159%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=6850eccca8c921274385197f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6158-stack-based-buffer-overflow-in-d-lin-5b6923f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6158%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-665&amp;severity=high&amp;id=6850e5c4a8c92127438512d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6157-sql-injection-in-phpgurukul-nipah-vi-72fb588b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6157%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=6850debda8c9212743850b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6156-sql-injection-in-phpgurukul-nipah-vi-afc450c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6156%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=6850debda8c9212743850b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6155-sql-injection-in-phpgurukul-hostel-m-263d5f23</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6155%3A%20SQL%20Injection%20in%20PHPGurukul%20Hostel%20Management%20System&amp;severity=medium&amp;id=6850d430a8c921274384f9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6154-sql-injection-in-phpgurukul-hostel-m-c95e6fb6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6154%3A%20SQL%20Injection%20in%20PHPGurukul%20Hostel%20Management%20System&amp;severity=medium&amp;id=6850d430a8c921274384f9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6153-sql-injection-in-phpgurukul-hostel-m-d29bcdbc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6153%3A%20SQL%20Injection%20in%20PHPGurukul%20Hostel%20Management%20System&amp;severity=medium&amp;id=6850d430a8c921274384f9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5673-cwe-89-improper-neutralization-of-sp-4ebd0472</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5673%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=6850cd28a8c921274384f3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4775-cwe-79-improper-neutralization-of-in-bd8d46c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4775%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dcooney%20Ajax%20Load%20More%20%E2%80%93%20Infinite%20Scroll%2C%20Load%20More%2C%20%26%20Lazy%20Load&amp;severity=medium&amp;id=6850cd28a8c921274384f3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3774-cwe-79-improper-neutralization-of-in-6b22f829</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3774%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marcinlawrowski%20Wise%20Chat&amp;severity=high&amp;id=6850cd28a8c921274384f3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6152-path-traversal-in-steel-browser-a4b8789a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6152%3A%20Path%20Traversal%20in%20Steel%20Browser&amp;severity=medium&amp;id=6850cd28a8c921274384f3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6151-buffer-overflow-in-tp-link-tl-wr940n-afc731c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6151%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Systems%20INC.%20TL-WR940N%20V4&amp;severity=high&amp;id=6850c29ca8c921274384e88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48993-cwe-79-improper-neutralization-of-i-3f1c54a6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48993%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=6850bb99a8c921274384e14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6150-buffer-overflow-in-totolink-x15-cf8c21c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6150%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6850bb99a8c921274384e158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6149-buffer-overflow-in-totolink-a3002r-c0bf006c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6149%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=6850bb99a8c921274384e150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6148-buffer-overflow-in-totolink-a3002ru-91ec2262</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6148%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002RU&amp;severity=high&amp;id=6850b811a8c921274384de09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6147-buffer-overflow-in-totolink-a702r-7d407f2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6147%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=6850b811a8c921274384de01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-17-053248a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-17&amp;severity=medium&amp;id=68520606a8c921274386573b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45525-na-e4ae393d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45525%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20asvd%20microlight&amp;severity=low&amp;id=6851ca4da8c92127438621d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45526-na-c953a5bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45526%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20asvd%20microlight&amp;severity=low&amp;id=6851c6c9a8c9212743861d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45878-na-aaac5cfa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45878%3A%20n%2Fa&amp;severity=medium&amp;id=6851a3a1a8c921274385fb7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45880-na-169be551</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45880%3A%20n%2Fa&amp;severity=medium&amp;id=68519ca4a8c921274385f554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45879-na-38e79bf6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45879%3A%20n%2Fa&amp;severity=medium&amp;id=6851920ca8c921274385eb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6146-buffer-overflow-in-totolink-x15-00e4bfae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6146%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6850aa03a8c921274384c65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6145-buffer-overflow-in-totolink-ex1200t-c20630aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6145%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6850a2f8a8c921274384c03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6144-buffer-overflow-in-totolink-ex1200t-906e8ff7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6144%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6850a2f8a8c921274384c037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6143-buffer-overflow-in-totolink-ex1200t-eb079389</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6143%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68509f77a8c921274384bcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48992-cwe-79-improper-neutralization-of-i-3dfbf7c8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48992%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=68509bf5a8c921274384ba39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6142-server-side-request-forgery-in-inter-76dee187</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6142%3A%20Server-Side%20Request%20Forgery%20in%20Intera%20InHire&amp;severity=medium&amp;id=6850986ea8c921274384b7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6141-stack-based-buffer-overflow-in-gnu-n-6d357865</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6141%3A%20Stack-based%20Buffer%20Overflow%20in%20GNU%20ncurses&amp;severity=medium&amp;id=6850986ea8c921274384b7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6140-resource-consumption-in-spdlog-bebf7bba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6140%3A%20Resource%20Consumption%20in%20spdlog&amp;severity=medium&amp;id=68509166a8c921274384b1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49134-cwe-359-exposure-of-private-persona-ffa5398f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49134%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=68508a5da8c921274384ab40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6139-use-of-hard-coded-password-in-totoli-22052dd6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6139%3A%20Use%20of%20Hard-coded%20Password%20in%20TOTOLINK%20T10&amp;severity=low&amp;id=685086dda8c921274384a891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47951-cwe-307-improper-restriction-of-exc-abbd4ff7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47951%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=685086dda8c921274384a88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32800-cwe-1357-reliance-on-insufficiently-677ad684</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32800%3A%20CWE-1357%3A%20Reliance%20on%20Insufficiently%20Trustworthy%20Component%20in%20conda%20conda-build&amp;severity=high&amp;id=68508357a8c921274384a30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6138-buffer-overflow-in-totolink-t10-1e55107c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6138%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68507fd4a8c921274384a08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32799-cwe-22-improper-limitation-of-a-pat-f3ad8e32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32799%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20conda%20conda-build&amp;severity=medium&amp;id=68507fd3a8c921274384a086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32798-cwe-94-improper-control-of-generati-04d54420</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32798%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20conda%20conda-build&amp;severity=high&amp;id=68507c50a8c9212743849b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6137-buffer-overflow-in-totolink-t10-ed439b73</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6137%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=685078cba8c921274384963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6136-sql-injection-in-projectworlds-life--96a12c12</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6136%3A%20SQL%20Injection%20in%20Projectworlds%20Life%20Insurance%20Management%20System&amp;severity=medium&amp;id=68507547a8c921274384933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6135-sql-injection-in-projectworlds-life--ba96a122</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6135%3A%20SQL%20Injection%20in%20Projectworlds%20Life%20Insurance%20Management%20System&amp;severity=medium&amp;id=68506acaa8c9212743848a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asus-armoury-crate-bug-lets-attackers-get-windows--4e21470c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASUS%20Armoury%20Crate%20bug%20lets%20attackers%20get%20Windows%20admin%20privileges&amp;severity=high&amp;id=68506ab9a8c9212743848a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32797-cwe-277-insecure-inherited-permissi-27a7f714</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32797%3A%20CWE-277%3A%20Insecure%20Inherited%20Permissions%20in%20conda%20conda-build&amp;severity=medium&amp;id=68506737a8c9212743848754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6134-sql-injection-in-projectworlds-life--3a9477d3</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6134%3A%20SQL%20Injection%20in%20Projectworlds%20Life%20Insurance%20Management%20System&amp;severity=medium&amp;id=68506737a8c921274384875d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6087-cwe-918-server-side-request-forgery--a3e54754</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6087%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=high&amp;id=68506737a8c921274384875a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kali-linux-20252-released-with-13-new-tools-car-ha-062eb361</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kali%20Linux%202025.2%20released%20with%2013%20new%20tools%2C%20car%20hacking%20updates&amp;severity=high&amp;id=685063b1a8c92127438483ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/washington-posts-email-system-hacked-journalists-a-d4bf7c91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Washington%20Post&apos;s%20email%20system%20hacked%2C%20journalists&apos;%20accounts%20compromised&amp;severity=high&amp;id=685063b1a8c92127438483a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6133-sql-injection-in-projectworlds-life--4416d5a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6133%3A%20SQL%20Injection%20in%20Projectworlds%20Life%20Insurance%20Management%20System&amp;severity=medium&amp;id=6850602fa8c9212743848056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telegram-messengers-ties-to-russias-fsb-revealed-i-c79a08f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telegram%20messenger&apos;s%20ties%20to%20Russia&apos;s%20FSB%20revealed%20in%20new%20report&amp;severity=medium&amp;id=68505928a8c9212743847792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6132-sql-injection-in-chanjet-crm-eea5b100</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6132%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=68505926a8c9212743847787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6131-cross-site-scripting-in-codeastro-fo-1ce4ef2e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6131%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Food%20Ordering%20System&amp;severity=medium&amp;id=6850521da8c921274384675c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6179-permissions-bypass-privilege-escalat-fe127fa6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6179%3A%20Permissions%20Bypass%20%2F%20Privilege%20Escalation%20in%20Google%20ChromeOS&amp;severity=critical&amp;id=68504e99a8c921274384649c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6177-privilege-escalation-in-google-chrom-b78cae76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6177%3A%20Privilege%20Escalation%20in%20Google%20ChromeOS&amp;severity=high&amp;id=68504e99a8c92127438464a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6130-buffer-overflow-in-totolink-ex1200t-71e8b5da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6130%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68504b16a8c92127438460e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2327-cwe-532-insertion-of-sensitive-infor-d8faf571</loc>
    <lastmod>2026-04-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2327%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Pure%20Storage%20FlashArray&amp;severity=medium&amp;id=68504791a8c9212743845d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5309-cwe-94-improper-control-of-generatio-396d4407</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5309%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20BeyondTrust%20Remote%20support%20%26%20Privileged%20Remote%20Access&amp;severity=high&amp;id=6850440da8c921274384591d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6129-buffer-overflow-in-totolink-ex1200t-3af481fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6129%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6850440da8c9212743845924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6128-buffer-overflow-in-totolink-ex1200t-cd921c67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6128%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6850408fa8c9212743845415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49794-expired-pointer-dereference-in-red--18de3c2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49794%3A%20Expired%20Pointer%20Dereference&amp;severity=critical&amp;id=6850408fa8c9212743845411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6170-stack-based-buffer-overflow-in-red-h-e89eea12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6170%3A%20Stack-based%20Buffer%20Overflow&amp;severity=low&amp;id=6850440da8c9212743845920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49795-expired-pointer-dereference-in-red--71d0a7a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49795%3A%20Expired%20Pointer%20Dereference&amp;severity=high&amp;id=68503980a8c9212743844972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tenable-fixes-three-high-severity-flaws-in-nessus-4466708a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tenable%20Fixes%20Three%20High-Severity%20Flaws%20in%20Nessus&amp;severity=high&amp;id=685035faa8c921274384421a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49796-out-of-bounds-read-in-red-hat-red-h-0dc6c777</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49796%3A%20Out-of-bounds%20Read&amp;severity=critical&amp;id=68503981a8c9212743844976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48976-allocation-of-resources-with-insuff-b19c03a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48976%3A%20Allocation%20of%20resources%20with%20insufficient%20limits%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20FileUpload&amp;severity=high&amp;id=6850327da8c9212743843f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6127-cross-site-scripting-in-phpgurukul-n-a6d36a69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6127%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=6850327da8c9212743843f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4565-cwe-674-uncontrolled-recursion-in-pr-3c14d57c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4565%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20protocolbuffers%20Python-Protobuf&amp;severity=high&amp;id=6850327da8c9212743843f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6126-cross-site-scripting-in-phpgurukul-r-957c8f53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6126%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=68502ef4a8c9212743843bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49124-cwe-426-untrusted-search-path-in-ap-cb55d916</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49124%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=68502b73a8c92127438438cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3526-cwe-400-uncontrolled-resource-consum-8bb97558</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3526%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=685027eca8c9212743843599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49125-cwe-288-authentication-bypass-using-b702aef9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49125%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=685027eca8c92127438435a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3594-cwe-22-improper-limitation-of-a-path-584287ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3594%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Liferay%20Portal&amp;severity=high&amp;id=685027eca8c921274384359c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48988-cwe-770-allocation-of-resources-wit-d0193ac0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48988%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=685027eca8c921274384359f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/archetyp-dark-web-market-seized-admin-arrested-in--643f6357</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Archetyp%20Dark%20Web%20Market%20Seized%2C%20Admin%20Arrested%20in%20Spain&amp;severity=medium&amp;id=68502466a8c921274384321c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6125-cross-site-scripting-in-phpgurukul-r-522e5fce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6125%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=685027eca8c92127438435a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36632-cwe-276-incorrect-default-permissio-d69f9111</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36632%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Tenable%20Agent&amp;severity=high&amp;id=68502479a8c9212743843278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3602-cwe-400-uncontrolled-resource-consum-8fa41b84</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3602%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=68502479a8c921274384327b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6124-sql-injection-in-code-projects-resta-dca77286</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6124%3A%20SQL%20Injection%20in%20code-projects%20Restaurant%20Order%20System&amp;severity=medium&amp;id=685020e4a8c9212743842f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fileless-asyncrat-distributed-via-clickfix-techniq-aa1acac6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fileless%20AsyncRAT%20Distributed%20Via%20Clickfix%20Technique%20Targeting%20German%20Speaking%20Users&amp;severity=medium&amp;id=6850327ca8c9212743843eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clone-compile-compromise-open-source-malware-trap--8f0fe7e9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clone%2C%20Compile%2C%20Compromise%3A%20Open-Source%20Malware%20Trap%20on%20GitHub&amp;severity=medium&amp;id=6850327ca8c9212743843eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6123-sql-injection-in-code-projects-resta-d6a40d25</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6123%3A%20SQL%20Injection%20in%20code-projects%20Restaurant%20Order%20System&amp;severity=medium&amp;id=685019e1a8c92127438427bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-a-third-of-grafana-instances-exposed-to-xss-f-5b430358</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20a%20Third%20of%20Grafana%20Instances%20Exposed%20to%20XSS%20Flaw&amp;severity=high&amp;id=68500f4ea8c92127438419bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6122-sql-injection-in-code-projects-resta-7b67aba0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6122%3A%20SQL%20Injection%20in%20code-projects%20Restaurant%20Order%20System&amp;severity=medium&amp;id=68501657a8c9212743842463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6121-stack-based-buffer-overflow-in-d-lin-1c97c4a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6121%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-632&amp;severity=critical&amp;id=68500846a8c9212743841044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5689-vulnerability-in-canonical-authd-d5f8de91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5689%3A%20Vulnerability%20in%20Canonical%20authd&amp;severity=high&amp;id=685004c3a8c9212743840d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6120-heap-based-buffer-overflow-in-open-a-1e265216</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6120%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=685004c3a8c9212743840d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24388-cwe-184-incomplete-list-of-disallow-b67b4fa9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24388%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20OTRS%20AG%20OTRS&amp;severity=low&amp;id=685004c3a8c9212743840d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46710-cwe-cwe-416-use-after-free-417-in-i-116d0234</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46710%3A%20CWE%20-%20CWE-416%3A%20Use%20After%20Free%20(4.17)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=6850013ea8c9212743840a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40916-cwe-338-use-of-cryptographically-we-d8435282</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40916%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20GRYPHON%20Mojolicious%3A%3APlugin%3A%3ACaptchaPNG&amp;severity=critical&amp;id=684ffa37a8c921274384023d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4748-cwe-22-improper-limitation-of-a-path-f13d5b13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4748%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=684ffa37a8c921274384024b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47869-cwe-119-improper-restriction-of-ope-65439f7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47869%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS&amp;severity=critical&amp;id=684ffa37a8c9212743840247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6119-use-after-free-in-open-asset-import--4d54ca38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6119%3A%20Use%20After%20Free%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=684ffa37a8c9212743840250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47868-cwe-787-out-of-bounds-write-in-apac-8cc7a426</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47868%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS%3A%20tools%2Fbdf-converter.&amp;severity=critical&amp;id=684ffa37a8c9212743840243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6118-sql-injection-in-das-parking-managem-5f3e9dba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6118%3A%20SQL%20Injection%20in%20Das%20Parking%20Management%20System%20%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=684ff6b8a8c921274383fdf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-predator-spyware-infrastructure-revealed-activ-cc5c5269</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Predator%20spyware%20infrastructure%20revealed%20activity%20in%20Mozambique%20for%20first%20time&amp;severity=medium&amp;id=684ff32da8c921274383fb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6117-sql-injection-in-das-parking-managem-278aa07e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6117%3A%20SQL%20Injection%20in%20Das%20Parking%20Management%20System%20%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=684fefaaa8c921274383f680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25265-cwe-306-missing-authentication-for--a98a349d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25265%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WAGO%20WAGO%20CC100%200751-9x01&amp;severity=medium&amp;id=684fec2ca8c921274383f276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25264-cwe-942-permissive-cross-domain-pol-2f8eaf6f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25264%3A%20CWE-942%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20WAGO%20CC100%200751-9x01&amp;severity=medium&amp;id=684fec2ca8c921274383f273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6116-sql-injection-in-das-parking-managem-f367264e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6116%3A%20SQL%20Injection%20in%20Das%20Parking%20Management%20System%20%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=684fe8a2a8c921274383ef56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3464-cwe-367-time-of-check-time-of-use-to-939abb76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3464%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ASUS%20Armoury%20Crate&amp;severity=high&amp;id=684fe19aa8c921274383e7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6115-stack-based-buffer-overflow-in-d-lin-4d741ff5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6115%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=684fe19aa8c921274383e7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-package-masquerades-as-chimera-modu-fa506e99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Package%20Masquerades%20as%20Chimera%20Module%20to%20Steal%20AWS%2C%20CI%2FCD%2C%20and%20macOS%20Data&amp;severity=high&amp;id=684fde15a8c921274383e43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6172-cwe-287-improper-authentication-in-t-8acc3494</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6172%3A%20CWE-287%20Improper%20Authentication%20in%20TECNO%20com.afmobi.boomplayer&amp;severity=critical&amp;id=684fde2ba8c921274383e459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6114-stack-based-buffer-overflow-in-d-lin-776616ed</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6114%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=684fda92a8c921274383e0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2091-cwe-601-url-redirection-to-untrusted-9ceab2a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2091%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20M-Files%20Corporation%20M-Files%20Mobile&amp;severity=medium&amp;id=684fda92a8c921274383e0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40727-cwe-79-improper-neutralization-of-i-cf985197</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20BV%20Phoenix%20CMS&amp;severity=medium&amp;id=684fd70ea8c921274383dca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6113-buffer-overflow-in-tenda-fh1203-216fe1ae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6113%3A%20Buffer%20Overflow%20in%20Tenda%20FH1203&amp;severity=high&amp;id=684fd38ba8c921274383d979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6112-buffer-overflow-in-tenda-fh1205-86c709cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6112%3A%20Buffer%20Overflow%20in%20Tenda%20FH1205&amp;severity=high&amp;id=684fc8fea8c921274383ce93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4987-cwe-79-improper-neutralization-of-in-a58c2574</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Project%20Portfolio%20Manager&amp;severity=high&amp;id=684fc8fea8c921274383ce9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6111-stack-based-buffer-overflow-in-tenda-e1792b66</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6111%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1205&amp;severity=high&amp;id=684fc1f6a8c921274383c699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6110-stack-based-buffer-overflow-in-tenda-51b21c25</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6110%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=684fbe72a8c921274383c379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6169-cwe-89-improper-neutralization-of-sp-8b104354</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6169%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HAMASTAR%20Technology%20WIMP&amp;severity=critical&amp;id=684fbaeea8c921274383c0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6109-path-traversal-in-javahongxi-whatsma-a3ccd07d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6109%3A%20Path%20Traversal%20in%20javahongxi%20whatsmars&amp;severity=medium&amp;id=684fb76ca8c921274383bb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6108-path-traversal-in-hansonwang99-sprin-19e2f8fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6108%3A%20Path%20Traversal%20in%20hansonwang99%20Spring-Boot-In-Action&amp;severity=medium&amp;id=684fb061a8c921274383b3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6107-dynamically-determined-object-attrib-65fc3c89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6107%3A%20Dynamically-Determined%20Object%20Attributes%20in%20comfyanonymous%20comfyui&amp;severity=low&amp;id=684fa5d5a8c9212743839699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6106-cross-site-request-forgery-in-wukong-d7784ab4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6106%3A%20Cross-Site%20Request%20Forgery%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=684fa251a8c921274383935c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6105-cross-site-request-forgery-in-jflyfo-cb32fb58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6105%3A%20Cross-Site%20Request%20Forgery%20in%20jflyfox%20jfinal_cms&amp;severity=medium&amp;id=684f9b52a8c9212743838b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6104-os-command-injection-in-wifi-soft-un-f0c0f9c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6104%3A%20OS%20Command%20Injection%20in%20Wifi-soft%20UniBox%20Controller&amp;severity=high&amp;id=684f9442a8c9212743838553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6103-os-command-injection-in-wifi-soft-un-430620d4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6103%3A%20OS%20Command%20Injection%20in%20Wifi-soft%20UniBox%20Controller&amp;severity=high&amp;id=684f8d3aa8c921274383800e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6102-os-command-injection-in-wifi-soft-un-13ae7248</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6102%3A%20OS%20Command%20Injection%20in%20Wifi-soft%20UniBox%20Controller&amp;severity=high&amp;id=684f8d3aa8c9212743838008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6101-improper-neutralization-of-directive-6fe1117a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6101%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20letta-ai%20letta&amp;severity=medium&amp;id=684f82b7a8c921274383702b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6100-sql-injection-in-realguoshuai-open-v-1a88d6a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6100%3A%20SQL%20Injection%20in%20realguoshuai%20open-video-cms&amp;severity=medium&amp;id=684f7825a8c9212743836893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6099-improper-authorization-in-szluyu99-g-f6f80821</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6099%3A%20Improper%20Authorization%20in%20szluyu99%20gin-vue-blog&amp;severity=medium&amp;id=684f711aa8c92127438361a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6098-buffer-overflow-in-utt-750w-36fe7295</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6098%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20750W&amp;severity=critical&amp;id=684f6a11a8c9212743835a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6097-unverified-password-change-in-utt-75-432a7b9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6097%3A%20Unverified%20Password%20Change%20in%20UTT%20%E8%BF%9B%E5%8F%96%20750W&amp;severity=medium&amp;id=684f630aa8c9212743834d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-16-310c6be8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-16&amp;severity=medium&amp;id=6850b485a8c921274384d5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27587-na-22829afe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27587%3A%20n%2Fa&amp;severity=medium&amp;id=685094eda8c921274384b50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6096-sql-injection-in-codesiddhant-jasmin-c701173c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6096%3A%20SQL%20Injection%20in%20codesiddhant%20Jasmin%20Ransomware&amp;severity=medium&amp;id=684f5c01a8c92127438341d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6095-sql-injection-in-codesiddhant-jasmin-79704669</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6095%3A%20SQL%20Injection%20in%20codesiddhant%20Jasmin%20Ransomware&amp;severity=medium&amp;id=684f5176a8c9212743833710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6094-sql-injection-in-foxcms-0f669882</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6094%3A%20SQL%20Injection%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=684f4df4a8c921274383350d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6093-stack-based-buffer-overflow-in-uyank-be462c9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6093%3A%20Stack-based%20Buffer%20Overflow%20in%20uYanki%20board-stm32f103rc-berial&amp;severity=medium&amp;id=684f46eaa8c9212743832ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leak-data-of-10000-virtualmacosx-customers-155bd75a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Leak%20Data%20of%2010%2C000%20VirtualMacOSX%20Customers%20in%20Alleged%20Breach&amp;severity=high&amp;id=684f3fe3a8c92127438326fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hosting-images-inside-dns-records-using-txt-d1f902a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hosting%20images%20inside%20dns%20records%20using%20TXT.&amp;severity=medium&amp;id=684f2e59a8c92127438319da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5964-cwe-22-improper-limitation-of-a-path-ec409023</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5964%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=high&amp;id=684f23c1a8c9212743830fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5990-cwe-79-improper-neutralization-of-in-7883d040</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5990%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=high&amp;id=684f0eaaa8c921274383034b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6092-cross-site-scripting-in-comfyanonymo-378049da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6092%3A%20Cross%20Site%20Scripting%20in%20comfyanonymous%20comfyui&amp;severity=medium&amp;id=684f041ea8c921274382fccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6091-buffer-overflow-in-h3c-gr-3000ax-c7a20764</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6091%3A%20Buffer%20Overflow%20in%20H3C%20GR-3000AX&amp;severity=high&amp;id=684ef99aa8c921274382f6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22854-cwe-394-unexpected-status-code-or-r-fcfe53f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22854%3A%20CWE-394%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20Ping%20Identity%20PingFederate&amp;severity=medium&amp;id=684ee0f8a8c921274382e6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6090-buffer-overflow-in-h3c-gr-5400ax-29ea79aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6090%3A%20Buffer%20Overflow%20in%20H3C%20GR-5400AX&amp;severity=high&amp;id=684edd74a8c921274382e506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21085-cwe-462-duplicate-key-in-associativ-e8026147</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21085%3A%20CWE-462%20Duplicate%20Key%20in%20Associative%20List%20in%20Ping%20Identity%20PingFederate&amp;severity=low&amp;id=684edd74a8c921274382e502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6089-open-redirect-in-astun-technology-is-15a41b61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6089%3A%20Open%20Redirect%20in%20Astun%20Technology%20iShare%20Maps&amp;severity=medium&amp;id=684ec4dda8c921274382d49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36041-cwe-295-improper-certificate-valida-60a59c5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36041%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=684ec4dda8c921274382d497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1411-cwe-250-execution-with-unnecessary-p-f73a9185</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1411%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Verify%20Directory&amp;severity=high&amp;id=684ec152a8c921274382d27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/goclipc2-clipboard-for-c2-on-windows-in-go-73d70264</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoClipC2%20-%20Clipboard%20for%20C2%20on%20Windows%20in%20Go&amp;severity=medium&amp;id=684eac42a8c921274382c3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/input-on-using-the-rot-and-network-connection-to-h-291f73d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Input%20on%20using%20the%20ROT%20and%20network%20connection%20to%20hack%20voting%20and%20tabulating%20software%20and%20hardware.&amp;severity=medium&amp;id=684e5ee8a8c92127438280e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pcman-ftp-server-207-buffer-overflow-8a8ba0c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PCMan%20FTP%20Server%202.0.7%20-%20Buffer%20Overflow&amp;severity=medium&amp;id=684fad5ba8c921274383b114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anchor-cms-0127-stored-cross-site-scripting-xss-4176e081</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anchor%20CMS%200.12.7%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=684fad5ba8c921274383b10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/litespeed-cache-wordpress-plugin-6301-privilege-es-2ab109f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Litespeed%20Cache%20WordPress%20Plugin%206.3.0.1%20-%20Privilege%20Escalation&amp;severity=high&amp;id=684fad5ba8c921274383b10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/parrot-and-dji-variants-drone-oses-kernel-panic-ex-0d4b2c9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Parrot%20and%20DJI%20variants%20Drone%20OSes%20-%20Kernel%20Panic%20Exploit&amp;severity=medium&amp;id=684fad5ba8c921274383b105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-11-smb-client-privilege-escalation-remote--3d721b16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2011%20SMB%20Client%20-%20Privilege%20Escalation%20%26%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=684fad5ba8c921274383b100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/php-cgi-module-834-remote-code-execution-rce-33dd2d51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PHP%20CGI%20Module%208.3.4%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=684fad5ba8c921274383b0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-excel-use-after-free-local-code-executio-ec6f5f33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Excel%20Use%20After%20Free%20-%20Local%20Code%20Execution&amp;severity=medium&amp;id=684fad5ba8c921274383b0f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/airkeyboard-ios-app-105-remote-input-injection-219ad705</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AirKeyboard%20iOS%20App%201.0.5%20-%20Remote%20Input%20Injection&amp;severity=medium&amp;id=684fad5ba8c921274383b0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webdav-windows-10-remote-code-execution-rce-8fec652a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WebDAV%20Windows%2010%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=684fad5ba8c921274383b0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/skyvern-0185-remote-code-execution-rce-via-ssti-f80ab3ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Skyvern%200.1.85%20-%20Remote%20Code%20Execution%20(RCE)%20via%20SSTI&amp;severity=critical&amp;id=684fad5ba8c921274383b0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-15-01e900b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-15&amp;severity=medium&amp;id=684f6304a8c9212743834b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anubis-ransomware-adds-wiper-to-destroy-files-beyo-7279f916</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anubis%20ransomware%20adds%20wiper%20to%20destroy%20files%20beyond%20recovery&amp;severity=high&amp;id=684de3d6a8c921274382088f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/westjet-investigates-cyberattack-disrupting-intern-e085e435</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WestJet%20investigates%20cyberattack%20disrupting%20internal%20systems&amp;severity=high&amp;id=684de3d6a8c9212743820893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-steganography-e39b148d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20Steganography!&amp;severity=medium&amp;id=6850327ca8c9212743843f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gimp-heap-overflow-re-discovery-and-exploitation-c-2550c34a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GIMP%20Heap%20Overflow%20Re-Discovery%20and%20Exploitation%20(CVE-2025%E2%80%936035)&amp;severity=medium&amp;id=684daf23a8c921274381e421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unusual-toolset-used-in-recent-fog-ransomware-atta-ae5bcb0d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unusual%20toolset%20used%20in%20recent%20Fog%20Ransomware%20attack&amp;severity=medium&amp;id=684d4caaa8c9212743819e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5238-cwe-79-improper-neutralization-of-in-dfa86643</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yithemes%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=684d421fa8c9212743819608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4667-cwe-79-improper-neutralization-of-in-619ecf8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=684d421fa8c9212743819600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5337-cwe-79-improper-neutralization-of-in-c0d7fb32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5337%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metaslider%20Slider%2C%20Gallery%2C%20and%20Carousel%20by%20MetaSlider%20%E2%80%93%20Image%20Slider%2C%20Video%20Slider&amp;severity=medium&amp;id=684d421fa8c921274381960f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/make-self-xss-great-again-5ad35bf4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Make%20Self-XSS%20Great%20Again&amp;severity=low&amp;id=684d3797a8c9212743818d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6063-cwe-352-cross-site-request-forgery-c-c382eac1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6063%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dmitry78%20XiSearch%20bar&amp;severity=medium&amp;id=684d3417a8c9212743818b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6061-cwe-79-improper-neutralization-of-in-18a75b32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6061%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bhittani%20kk%20Youtube%20Video&amp;severity=medium&amp;id=684d3416a8c9212743818b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5336-cwe-79-improper-neutralization-of-in-fbf3cc70</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5336%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20holithemes%20Click%20to%20Chat%20%E2%80%93%20HoliThemes&amp;severity=medium&amp;id=684d3416a8c9212743818af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6062-cwe-352-cross-site-request-forgery-c-dbe4428a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6062%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20netlatch%20Yougler%20Blogger%20Profile%20Page&amp;severity=medium&amp;id=684d3416a8c9212743818b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6070-cwe-22-improper-limitation-of-a-path-bd906c26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6070%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20josxha%20Restrict%20File%20Access&amp;severity=medium&amp;id=684d3417a8c9212743818b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4592-cwe-352-cross-site-request-forgery-c-249606bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4592%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aspengrovestudios%20AI%20Image%20Lab%20%E2%80%93%20Free%20AI%20Image%20Generator&amp;severity=medium&amp;id=684d3416a8c9212743818aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5589-cwe-79-improper-neutralization-of-in-4c333bd3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20Kick%20Integration&amp;severity=medium&amp;id=684d3416a8c9212743818afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6055-cwe-352-cross-site-request-forgery-c-1dd7d2ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6055%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bogdanding%20Zen%20Sticky%20Social&amp;severity=medium&amp;id=684d3416a8c9212743818b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4200-cwe-98-improper-control-of-filename--b12fc3c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4200%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Zagg%20-%20Electronics%20%26%20Accessories%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=684d3416a8c9212743818ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4187-cwe-22-improper-limitation-of-a-path-8b556093</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4187%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20UserPro%20-%20Community%20and%20User%20Profile%20WordPress%20Plugin&amp;severity=medium&amp;id=684d3416a8c9212743818ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6040-cwe-79-improper-neutralization-of-in-957d0a3d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sagesony%20Easy%20Flashcards&amp;severity=medium&amp;id=684d3416a8c9212743818b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4216-cwe-79-improper-neutralization-of-in-3a99d01f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4216%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scada%20DIOT%20SCADA%20with%20MQTT&amp;severity=medium&amp;id=684d3416a8c9212743818aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6064-cwe-352-cross-site-request-forgery-c-1d131a39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6064%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20djerba%20WP%20URL%20Shortener&amp;severity=medium&amp;id=684d3417a8c9212743818b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6065-cwe-22-improper-limitation-of-a-path-bae1c8e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6065%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wework4web%20Image%20Resizer%20On%20The%20Fly&amp;severity=critical&amp;id=684d3417a8c9212743818b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5487-cwe-89-improper-neutralization-of-sp-7a8759de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5487%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rubengc%20AutomatorWP%20%E2%80%93%20Automator%20plugin%20for%20no-code%20automations%2C%20webhooks%20%26%20custom%20integrations%20in%20WordPress&amp;severity=high&amp;id=684d1b74a8c92127438178c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3234-cwe-434-unrestricted-upload-of-file--b988f875</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3234%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ninjateam%20File%20Manager%20Pro%20%E2%80%93%20Filester&amp;severity=high&amp;id=684d0d64a8c9212743816dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6059-cwe-352-cross-site-request-forgery-c-1064f00d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6059%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=684cdfb1a8c9212743813269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33108-cwe-250-execution-with-unnecessary--4054a6f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33108%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Backup%20Recovery%20and%20Media%20Services%20for%20i&amp;severity=high&amp;id=684cc715a8c9212743811df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-14-e0c3841f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-14&amp;severity=medium&amp;id=684e1184a8c9212743822b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/giving-an-llm-command-line-access-to-nmap-ca7c35a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Giving%20an%20LLM%20Command%20Line%20Access%20to%20Nmap&amp;severity=medium&amp;id=684ca3f1a8c921274380fc97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24919-cwe-502-deserialization-of-untruste-34b222eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24919%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=684ca06aa8c921274380fa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25215-cwe-763-release-of-invalid-pointer--cf4ad7b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25215%3A%20CWE-763%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=684c9966a8c921274380f5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6083-cwe-287-improper-authentication-in-e-6bb1a55a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6083%3A%20CWE-287%20Improper%20Authentication%20in%20Extreme%20Networks%20ExtremeCloud%20Universal%20ZTNA&amp;severity=medium&amp;id=684c95dda8c921274380f361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25050-cwe-787-out-of-bounds-write-in-broa-f3b81270</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25050%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=684c925aa8c921274380f112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fin7-linked-infrastructure-powernet-loader-and-34033b3a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20FIN7-Linked%20Infrastructure%2C%20PowerNet%20Loader%2C%20and%20Fake%20Update%20Attacks&amp;severity=medium&amp;id=6852b5e8a8c9212743885547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24922-cwe-121-stack-based-buffer-overflow-1f67ce78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24922%3A%20CWE-121%20-%20Stack-based%20Buffer%20Overflow%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=684c925aa8c921274380f115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24311-cwe-125-out-of-bounds-read-in-broad-b5d442b3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24311%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=684c8ed5a8c921274380ee6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49598-cwe-95-improper-neutralization-of-d-05efd0a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49598%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20conda-forge%20conda-forge-ci-setup-feedstock&amp;severity=medium&amp;id=684c8b51a8c921274380ebd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49596-cwe-306-missing-authentication-for--cb78398d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49596%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20modelcontextprotocol%20inspector&amp;severity=critical&amp;id=684c87cda8c921274380e923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49597-cwe-915-improperly-controlled-modif-87f804cd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49597%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20handcraftedinthealps%20goodby-csv&amp;severity=low&amp;id=684c8450a8c921274380e66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/private-contractor-linked-to-multiple-chinese-stat-00f22a1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Private%20Contractor%20Linked%20to%20Multiple%20Chinese%20State-Sponsored%20Groups&amp;severity=medium&amp;id=684c8b50a8c921274380eb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-flaw-lets-hackers-reuse-expired-invites-in-831c7158</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20flaw%20lets%20hackers%20reuse%20expired%20invites%20in%20malware%20campaign&amp;severity=high&amp;id=684c72b9a8c921274380d897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/paraguay-suffered-data-breach-74-million-citizen-r-5d9a7516</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Paraguay%20Suffered%20Data%20Breach%3A%207.4%20Million%20Citizen%20Records%20Leaked%20on%20Dark%20Web&amp;severity=high&amp;id=684c72b9a8c921274380d89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49587-cwe-357-insufficient-ui-warning-of--d7d06c84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49587%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=684c6829a8c921274380d111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49586-cwe-863-incorrect-authorization-in--6dcae437</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49586%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c6829a8c921274380d10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-269000-websites-infected-with-jsfiretruck-jav-39256a5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20269%2C000%20Websites%20Infected%20with%20JSFireTruck%20JavaScript%20Malware%20in%20One%20Month&amp;severity=high&amp;id=684c64a3a8c921274380ce73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49585-cwe-357-insufficient-ui-warning-of--6bb4ff8c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49585%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c64b4a8c921274380cebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49584-cwe-201-insertion-of-sensitive-info-5bd8fee0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49584%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c6120a8c921274380b95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49583-cwe-270-privilege-context-switching-91e18166</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49583%3A%20CWE-270%3A%20Privilege%20Context%20Switching%20Error%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=684c5d9ca8c921274380b6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/batteries-included-collaborative-knowledge-managem-3af56908</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Batteries%20included%20collaborative%20knowledge%20management%20solution%20for%20threat%20intelligence%20researchers&amp;severity=medium&amp;id=684c5a1ba8c921274380b49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49582-cwe-693-protection-mechanism-failur-747b2159</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49582%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c5697a8c921274380b20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49581-cwe-94-improper-control-of-generati-c6dd390e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49581%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c4f8ca8c921274380ac94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49580-cwe-266-incorrect-privilege-assignm-843a1e82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49580%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c4c0ba8c921274380a907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48915-cwe-79-improper-neutralization-of-i-3f394629</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48915%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20COOKiES%20Consent%20Management&amp;severity=high&amp;id=684c4884a8c921274380a653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48914-cwe-79-improper-neutralization-of-i-1236305a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20COOKiES%20Consent%20Management&amp;severity=high&amp;id=684c4884a8c921274380a650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6052-integer-overflow-or-wraparound-in-re-d5d24d93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6052%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=684c4884a8c921274380a665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48920-cwe-79-improper-neutralization-of-i-7e0ad51d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48920%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20etracker&amp;severity=high&amp;id=684c4884a8c921274380a662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48919-cwe-79-improper-neutralization-of-i-967e18c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Simple%20Klaro&amp;severity=medium&amp;id=684c4884a8c921274380a65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48917-cwe-79-improper-neutralization-of-i-1c73647a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48917%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20EU%20Cookie%20Compliance%20(GDPR%20Compliance)&amp;severity=medium&amp;id=684c4884a8c921274380a659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48918-cwe-79-improper-neutralization-of-i-8db3e7ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48918%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Simple%20Klaro&amp;severity=high&amp;id=684c4884a8c921274380a65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48916-cwe-862-missing-authorization-in-dr-8b0ea9e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48916%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Bookable%20Calendar&amp;severity=medium&amp;id=684c4884a8c921274380a656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6035-out-of-bounds-write-in-red-hat-red-h-7c60e323</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6035%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=684c4501a8c921274380a39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/may-2025-security-issues-in-korean-global-financia-1e562d09</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=May%202025%20Security%20Issues%20in%20Korean%20%26%20Global%20Financial%20Sector&amp;severity=medium&amp;id=684c8b50a8c921274380ebac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-trust-to-threat-hijacked-discord-invites-used-e4461ff1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Trust%20to%20Threat%3A%20Hijacked%20Discord%20Invites%20Used%20for%20Multi-Stage%20Malware%20Delivery&amp;severity=medium&amp;id=684c8b50a8c921274380ebb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6030-cwe-307-improper-restriction-of-exce-6c797812</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6030%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Autoeastern%20Cyclone%20Matrix%20TRF&amp;severity=critical&amp;id=684c3a74a8c9212743809a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36631-cwe-269-improper-privilege-manageme-94ca5c11</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36631%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tenable%20Agent&amp;severity=high&amp;id=684c3a74a8c9212743809a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6029-cwe-307-improper-restriction-of-exce-26c7d0e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6029%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20KIA%20Aftermarket%20Generic%20Smart%20Keyless%20Entry%20System&amp;severity=critical&amp;id=684c36f0a8c9212743809719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36633-cwe-269-improper-privilege-manageme-604447f6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36633%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tenable%20Agent&amp;severity=high&amp;id=684c36f0a8c9212743809716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/serverless-tokens-in-the-cloud-exploitation-and-de-d4ec6481</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Serverless%20Tokens%20in%20the%20Cloud%3A%20Exploitation%20and%20Detections&amp;severity=medium&amp;id=684c7638a8c921274380db72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anubis-a-closer-look-at-an-emerging-ransomware-wit-58bb8c41</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anubis%3A%20A%20Closer%20Look%20at%20an%20Emerging%20Ransomware%20with%20Built-in%20Wiper&amp;severity=medium&amp;id=684c87cca8c921274380e914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/victorias-secret-restores-critical-systems-after-c-71d11440</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Victoria%E2%80%99s%20Secret%20restores%20critical%20systems%20after%20cyberattack&amp;severity=critical&amp;id=684c28dfa8c9212743808654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-confirmed-that-messages-app-flaw-was-activel-e2527c9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20confirmed%20that%20Messages%20app%20flaw%20was%20actively%20exploited%20in%20the%20wild&amp;severity=medium&amp;id=684c1acfa8c92127438072f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-gang-exploits-simplehelp-rmm-to-comprom-54fc42ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Gang%20Exploits%20SimpleHelp%20RMM%20to%20Compromise%20Utility%20Billing&amp;severity=high&amp;id=684c05b8a8c9212743806086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49468-cwe-89-improper-neutralization-of-s-92f18a60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49468%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nobossextensions.com%20No%20Boss%20Calendar%20component%20for%20Joomla&amp;severity=high&amp;id=684bf7a9a8c92127438053cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-dark-adtech-empire-fed-by-fake-captchas-f0123fed</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20Dark%20Adtech%20Empire%20Fed%20by%20Fake%20CAPTCHAs&amp;severity=high&amp;id=684bf423a8c92127438050a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-fixes-critical-bugs-in-apex-central-an-22634b80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20fixes%20critical%20bugs%20in%20Apex%20Central%20and%20TMEE%20PolicyServer&amp;severity=critical&amp;id=684bf423a8c92127438050a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29902-cwe-94-improper-control-of-generati-5151af3e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29902%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Telex%20Remote%20Dispatch%20Console%20Server&amp;severity=critical&amp;id=684bf09fa8c9212743804e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48825-use-of-less-trusted-source-in-ricoh-24bb9ae0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48825%3A%20Use%20of%20less%20trusted%20source%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX%20V3%20PC%20Client&amp;severity=low&amp;id=684be28fa8c9212743803aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46783-improper-limitation-of-a-pathname-t-665948b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46783%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX%20V3%20PC%20Client&amp;severity=critical&amp;id=684be28fa8c9212743803aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36506-external-control-of-file-name-or-pa-7eaf49e9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36506%3A%20External%20control%20of%20file%20name%20or%20path%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX%20V3%20PC%20Client&amp;severity=medium&amp;id=684be28fa8c9212743803aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-the-real-relationship-between-wordpress-ha-bb69077a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20the%20Real%20Relationship%20between%20WordPress%20Hackers%20and%20Malicious%20Adtech%3F&amp;severity=medium&amp;id=684bdf0ca8c9212743803712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beware-of-ai-pickpockets-pickai-backdoor-spreading-2ac2ee30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beware%20of%20AI%20Pickpockets%3A%20Pickai%20Backdoor%20Spreading%20Through%20ComfyUI%20Vulnerability&amp;severity=medium&amp;id=684bdf0ca8c9212743803700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/understanding-cybereye-rat-builder-capabilities-an-fb56accd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Understanding%20CyberEYE%20RAT%20Builder%3A%20Capabilities%20and%20Implications&amp;severity=medium&amp;id=684bdf0ca8c92127438036f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6012-cwe-79-improper-neutralization-of-in-501f2c59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6012%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaisercrazy%20Auto%20Attachments&amp;severity=medium&amp;id=684bd490a8c9212743802d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39240-vulnerability-in-hikvision-ds-3wap6-0b6d8489</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39240%3A%20Vulnerability%20in%20Hikvision%20DS-3WAP622G-SI&amp;severity=high&amp;id=684bd491a8c9212743802da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38824-vulnerability-in-vmware-salt-c678efe9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38824%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=critical&amp;id=69a0a1cc85912abc71d0bd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22242-vulnerability-in-vmware-salt-8e3bec83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22242%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=medium&amp;id=684bd0fda8c9212743802a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22241-vulnerability-in-vmware-salt-8e584f67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22241%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=medium&amp;id=684bd0fda8c9212743802a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22240-vulnerability-in-vmware-salt-0abd6692</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22240%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=medium&amp;id=684bd0fda8c9212743802a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22239-vulnerability-in-vmware-salt-f2a57ef8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22239%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=high&amp;id=684bd0fda8c9212743802a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22238-vulnerability-in-vmware-salt-65d0ba84</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22238%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=medium&amp;id=684bcd89a8c921274380274c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22237-vulnerability-in-vmware-salt-632fbfe9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22237%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=medium&amp;id=684bcd89a8c9212743802748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22236-vulnerability-in-vmware-salt-bde4c7a6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22236%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=high&amp;id=684bcd89a8c9212743802744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5923-cwe-79-improper-neutralization-of-in-3ad10efa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marcdk%20Game%20Review%20Block&amp;severity=medium&amp;id=684bcd89a8c9212743802750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4227-cwe-319-cleartext-transmission-of-se-df972ea7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4227%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=low&amp;id=684bbf71a8c921274380180f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4229-cwe-497-exposure-of-sensitive-system-bc4e4942</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4229%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=684bbbe5a8c921274380152e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5282-cwe-862-missing-authorization-in-wpt-147c6b2c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5282%3A%20CWE-862%20Missing%20Authorization%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=high&amp;id=684ba0b6358c65714e6b6d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5815-cwe-862-missing-authorization-in-dmi-de977259</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5815%3A%20CWE-862%20Missing%20Authorization%20in%20dmitriamartin%20Traffic%20Monitor&amp;severity=medium&amp;id=684ba0b6358c65714e6b6d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5491-cwe-269-improper-privilege-managemen-bc39c41d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5491%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Acer%20ControlCenter&amp;severity=high&amp;id=684b8f23358c65714e6b578d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5928-cwe-352-cross-site-request-forgery-c-0d1e8b07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5928%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fay-1%20WP%20Sliding%20Login%2FDashboard%20Panel&amp;severity=medium&amp;id=684b8f23358c65714e6b579c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5938-cwe-352-cross-site-request-forgery-c-dafe8f75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5938%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themebon%20Digital%20Marketing%20and%20Agency%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=684b8f24358c65714e6b57af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5123-cwe-79-improper-neutralization-of-in-350db0b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5123%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20a3rev%20Contact%20Us%20Page%20%E2%80%93%20Contact%20People&amp;severity=medium&amp;id=684b8f23358c65714e6b577e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5939-cwe-79-improper-neutralization-of-in-81ac2f29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5939%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amir-mousavi%20Telegram%20for%20WP&amp;severity=medium&amp;id=684b8f24358c65714e6b57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4586-cwe-79-improper-neutralization-of-in-0af1ed85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4586%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20irmau%20IRM%20Newsroom&amp;severity=medium&amp;id=684b8f23358c65714e6b577a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5233-cwe-79-improper-neutralization-of-in-6ee07f04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5233%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thatdevgirl%20Color%20Palette&amp;severity=medium&amp;id=684b8f23358c65714e6b5783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5930-cwe-352-cross-site-request-forgery-c-e26b751f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5930%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digitalacornjp%20WP2HTML&amp;severity=medium&amp;id=684b8f24358c65714e6b57aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5841-cwe-79-improper-neutralization-of-in-c2c86878</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andremacola%20ACF%20Onyx%20Poll&amp;severity=medium&amp;id=684b8f23358c65714e6b5792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5926-cwe-352-cross-site-request-forgery-c-425041c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5926%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jconti%20Link%20Shield&amp;severity=medium&amp;id=684b8f23358c65714e6b5798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5950-cwe-79-improper-neutralization-of-in-cb7236f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5950%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20janboddez%20IndieBlocks&amp;severity=medium&amp;id=684b8f24358c65714e6b57b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4584-cwe-79-improper-neutralization-of-in-29b2bc01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4584%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20irmau%20IRM%20Newsroom&amp;severity=medium&amp;id=684b8f23358c65714e6b5772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5288-cwe-862-missing-authorization-in-web-66837af5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5288%3A%20CWE-862%20Missing%20Authorization%20in%20weboccults%20REST%20API%20%7C%20Custom%20API%20Generator%20For%20Cross%20Platform%20And%20Import%20Export%20In%20WP&amp;severity=critical&amp;id=684b8f23358c65714e6b5788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4585-cwe-79-improper-neutralization-of-in-26ee8cdb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4585%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20irmau%20IRM%20Newsroom&amp;severity=medium&amp;id=684b8f23358c65714e6b5776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47959-cwe-77-improper-neutralization-of-s-b93a32f6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47959%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.10&amp;severity=high&amp;id=684b849b358c65714e6b4f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30399-cwe-426-untrusted-search-path-in-mi-889ff8e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30399%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=684b849b358c65714e6b4f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freefloat-ftp-server-10-remote-buffer-overflow-008b8257</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Freefloat%20FTP%20Server%201.0%20-%20Remote%20Buffer%20Overflow&amp;severity=medium&amp;id=684d0a38a8c9212743816b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/roundcube-1610-remote-code-execution-rce-1b510cae</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Roundcube%201.6.10%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=684d0a38a8c9212743816b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-file-explorer-windows-10-pro-x64-tar-extra-def10946</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20File%20Explorer%20Windows%2010%20Pro%20x64%20-%20TAR%20Extraction&amp;severity=medium&amp;id=684d0a38a8c9212743816b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-13-d29d6021</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-13&amp;severity=medium&amp;id=684cc003a8c9212743811543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28384-na-9e5fe034</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28384%3A%20n%2Fa&amp;severity=critical&amp;id=684c2c64a8c9212743808993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28382-na-b9b5bb39</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28382%3A%20n%2Fa&amp;severity=high&amp;id=684c2c64a8c921274380898f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28381-na-594d0e21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28381%3A%20n%2Fa&amp;severity=high&amp;id=684c2c64a8c921274380898b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28389-na-7bf777a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28389%3A%20n%2Fa&amp;severity=high&amp;id=684c2c64a8c9212743808987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28388-na-65e6c60f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28388%3A%20n%2Fa&amp;severity=critical&amp;id=684c2c64a8c9212743808983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28386-na-579bd194</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28386%3A%20n%2Fa&amp;severity=critical&amp;id=684c2c64a8c921274380897f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28380-na-00905d4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28380%3A%20n%2Fa&amp;severity=medium&amp;id=684c28eba8c9212743808660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46096-na-9085ff49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46096%3A%20n%2Fa&amp;severity=medium&amp;id=684c21d8a8c921274380805e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46060-na-12844e2b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46060%3A%20n%2Fa&amp;severity=critical&amp;id=684c21d8a8c9212743808059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45988-na-5d99dec2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45988%3A%20n%2Fa&amp;severity=critical&amp;id=684c0cc0a8c9212743806659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45987-na-d0cf5438</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45987%3A%20n%2Fa&amp;severity=critical&amp;id=684c0cc0a8c9212743806656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45986-na-2222ef68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45986%3A%20n%2Fa&amp;severity=critical&amp;id=684c0cc0a8c9212743806653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45985-na-10af30f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45985%3A%20n%2Fa&amp;severity=critical&amp;id=684c0cc0a8c9212743806650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45984-na-f316c569</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45984%3A%20n%2Fa&amp;severity=critical&amp;id=684c0cc0a8c921274380664d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4228-cwe-266-incorrect-privilege-assignme-a696422b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4228%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=684b6876358c65714e6b31da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4230-cwe-78-improper-neutralization-of-sp-7a406b05</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4230%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=684b64f2358c65714e6b22df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4231-cwe-77-improper-neutralization-of-sp-2f3197dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4231%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=684b64f2358c65714e6b22e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4232-cwe-155-improper-neutralization-of-w-080b37f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4232%3A%20CWE-155%3A%20Improper%20Neutralization%20of%20Wildcards%20or%20Matching%20Symbols%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=high&amp;id=684b64f2358c65714e6b22e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4233-cwe-524-use-of-cache-containing-sens-55d6b8d1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4233%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20Palo%20Alto%20Networks%20Prisma%20Access%20Browser&amp;severity=medium&amp;id=684b535f358c65714e6b0ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/graphite-caught-first-forensic-confirmation-of-par-01db231e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Graphite%20Caught%3A%20First%20Forensic%20Confirmation%20of%20Paragon&apos;s%20iOS%20Mercenary%20Spyware%20Finds%20Journalists%20Targeted&amp;severity=medium&amp;id=684be28ea8c9212743803a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/know-thyself-know-thy-environment-fe1cca75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Know%20thyself%2C%20know%20thy%20environment&amp;severity=medium&amp;id=684be28ea8c9212743803a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41233-cwe-89-improper-neutralization-of-s-90bbcbc4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41233%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VMware%20Avi%20Load%20Balancer&amp;severity=medium&amp;id=684b4c57358c65714e6b07b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41234-cwe-113-improper-neutralization-of--87aadec5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41234%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Response%20Splitting&apos;)%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=684b454f358c65714e6b0221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27689-cwe-284-improper-access-control-in--a18290de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27689%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20iDRAC%20Tools&amp;severity=high&amp;id=684b3e47358c65714e6afd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5485-cwe-204-in-sinotrack-iot-pc-platform-5be9462b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5485%3A%20CWE-204%20in%20SinoTrack%20IOT%20PC%20Platform&amp;severity=high&amp;id=684b3748358c65714e6af79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5484-cwe-1390-in-sinotrack-iot-pc-platfor-da98d531</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5484%3A%20CWE-1390%20in%20SinoTrack%20IOT%20PC%20Platform&amp;severity=high&amp;id=684b3748358c65714e6af799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36539-cwe-248-in-aveva-pi-data-archive-cdd31ff9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36539%3A%20CWE-248%20in%20AVEVA%20PI%20Data%20Archive&amp;severity=medium&amp;id=684b33bd358c65714e6af41e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44019-cwe-248-in-aveva-pi-data-archive-2afbaf5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44019%3A%20CWE-248%20in%20AVEVA%20PI%20Data%20Archive&amp;severity=high&amp;id=684b33bd358c65714e6af422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2745-cwe-79-in-aveva-pi-web-api-879101d4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2745%3A%20CWE-79%20in%20AVEVA%20PI%20Web%20API&amp;severity=medium&amp;id=684b303f358c65714e6af06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4418-cwe-354-in-aveva-pi-connector-for-cy-b20ce90d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4418%3A%20CWE-354%20in%20AVEVA%20PI%20Connector%20for%20CygNet&amp;severity=medium&amp;id=684b303f358c65714e6af070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4417-cwe-79-in-aveva-pi-connector-for-cyg-f2b3cf36</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4417%3A%20CWE-79%20in%20AVEVA%20PI%20Connector%20for%20CygNet&amp;severity=medium&amp;id=684b2cba358c65714e6aede7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6031-cwe-672-operation-on-a-resource-afte-a126cfc9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6031%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20Amazon%20Cloud%20Cam&amp;severity=high&amp;id=684b2cba358c65714e6aedeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49576-cwe-79-improper-neutralization-of-i-5829eb03</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49576%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=684b25b2358c65714e6ae79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49578-cwe-79-improper-neutralization-of-i-df5a5e87</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49578%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=684b25b2358c65714e6ae79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49579-cwe-79-improper-neutralization-of-i-6465c108</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49579%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=684b25b2358c65714e6ae7a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49575-cwe-79-improper-neutralization-of-i-31cc7b49</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49575%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=684b2228358c65714e6ae293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49577-cwe-79-improper-neutralization-of-i-7766b096</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49577%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=684b2228358c65714e6ae298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/influencing-llm-output-using-logprobs-and-token-di-092d7943</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Influencing%20LLM%20Output%20using%20logprobs%20and%20Token%20Distribution&amp;severity=medium&amp;id=684b1b27358c65714e6ac5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49081-vulnerability-in-absolute-security--2b2f7183</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49081%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=684b109e358c65714e6abd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49080-vulnerability-in-absolute-security--56ad0a7e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49080%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=high&amp;id=684b0d11358c65714e6aba7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/introducing-github-device-code-phishing-a6fd1365</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Introducing%3A%20GitHub%20Device%20Code%20Phishing&amp;severity=low&amp;id=684aff08358c65714e6aafa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/millions-of-vulnerabilities-one-checklist-to-kill--c64539c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Millions%20of%20Vulnerabilities%3A%20One%20Checklist%20to%20Kill%20The%20Noise&amp;severity=medium&amp;id=684af47b358c65714e6a96f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49467-cwe-89-improper-neutralization-of-s-13928faa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49467%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jevents.net%20%2F%20GWE%20Systems%20Ltd%20JEvents%20component%20for%20Joomla&amp;severity=critical&amp;id=684af476358c65714e6a96e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36573-cwe-532-insertion-of-sensitive-info-14de938c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36573%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20Smart%20Dock&amp;severity=high&amp;id=684af476358c65714e6a96df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/visual-studio-178-goes-end-of-life-on-july-8th-68079ca8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Visual%20Studio%2017.8%20Goes%20End-of-Life%20on%20July%208th&amp;severity=medium&amp;id=684af0ef358c65714e6a9444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56158-cwe-89-improper-neutralization-of-s-89fdc85d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56158%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=69650e81da2266e838bdb817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49200-cwe-200-exposure-of-sensitive-infor-ac17c20e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49200%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae666358c65714e6a8a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49199-cwe-345-insufficient-verification-o-5df66ad4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49199%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=high&amp;id=684ae666358c65714e6a8a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49198-cwe-330-use-of-insufficiently-rando-519121b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49198%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=low&amp;id=684ae666358c65714e6a8a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49197-cwe-328-use-of-weak-hash-in-sick-ag-bc757bb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49197%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=medium&amp;id=684ae666358c65714e6a8a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49196-cwe-327-use-of-a-broken-or-risky-cr-b3f69d27</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49196%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae666358c65714e6a8a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49195-cwe-307-improper-restriction-of-exc-7cd17f2e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49195%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=medium&amp;id=684ae2e2358c65714e6a8720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49194-cwe-319-cleartext-transmission-of-s-fd03a3f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49194%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=high&amp;id=684ae2e2358c65714e6a8718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49193-cwe-693-protection-mechanism-failur-b479587e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49193%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20SICK%20AG%20Field%20Analytics&amp;severity=medium&amp;id=684ae2e2358c65714e6a8710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49192-cwe-1021-improper-restriction-of-re-aae1b340</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49192%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae2e2358c65714e6a8708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49191-cwe-1021-improper-restriction-of-re-5f5afed6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49191%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae2e2358c65714e6a8728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49190-cwe-918-server-side-request-forgery-45d686ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49190%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae2e2358c65714e6a8740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49189-cwe-1004-sensitive-cookie-without-h-45b5231e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49189%3A%20CWE-1004%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=medium&amp;id=684ae2e2358c65714e6a8738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49188-cwe-598-use-of-get-request-method-w-50898db4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49188%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae2e2358c65714e6a8730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-open-source-agent-hacked-mercado-libre-cd791846</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20Open%20Source%20agent%20hacked%20Mercado%20libre&amp;severity=medium&amp;id=684adf63358c65714e6a8415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49187-cwe-204-observable-response-discrep-16c0f451</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49187%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ad856358c65714e6a7e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49186-cwe-79-improper-neutralization-of-i-3329594f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49186%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SICK%20AG%20Field%20Analytics&amp;severity=medium&amp;id=684ad856358c65714e6a7e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49185-cwe-79-improper-neutralization-of-i-537079ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ad856358c65714e6a7e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49184-cwe-200-exposure-of-sensitive-infor-232df4ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49184%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20Field%20Analytics&amp;severity=high&amp;id=684ad856358c65714e6a7e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49183-cwe-319-cleartext-transmission-of-s-20e6f4e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49183%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=high&amp;id=684ad856358c65714e6a7e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49182-cwe-862-missing-authorization-in-si-5903408c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49182%3A%20CWE-540%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=high&amp;id=684ad4d2358c65714e6a7475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49181-cwe-862-missing-authorization-in-si-4753f541</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49181%3A%20CWE-862%20Missing%20Authorization%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=high&amp;id=684ad4d2358c65714e6a746d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6021-stack-based-buffer-overflow-in-red-h-0a879e1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6021%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=684ad14d358c65714e6a717c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-is-able-to-track-its-users-via-webrtc-on-andr-748fb748</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20is%20able%20to%20track%20it%E2%80%99s%20users%20via%20WebRTC%20on%20Android%20including%20private%20mode%20and%20behind%20VPN&amp;severity=medium&amp;id=684ac6c6358c65714e6a69c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fog-ransomware-attack-uses-unusual-mix-of-legitima-cf9db057</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fog%20ransomware%20attack%20uses%20unusual%20mix%20of%20legitimate%20and%20open-source%20tools&amp;severity=high&amp;id=684ab1a9358c65714e6a55c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-tops-list-of-unsecured-cameras-exposing-homes-a-b3ad817d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Tops%20List%20of%20Unsecured%20Cameras%20Exposing%20Homes%20and%20Offices%2C%20BitSight%20Reveals&amp;severity=medium&amp;id=684ab1a9358c65714e6a55c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stryker-android-pentesting-app-with-premium-access-295ab760</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stryker%20-%20Android%20pentesting%20app%20with%20premium%20access%20is%20now%20free%20until%202050&amp;severity=low&amp;id=684aa39e358c65714e6a4b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-80000-microsoft-entra-id-accounts-targeted-us-13e54cca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2080%2C000%20Microsoft%20Entra%20ID%20Accounts%20Targeted%20Using%20Open-Source%20TeamFiltration%20Tool&amp;severity=high&amp;id=684aa019358c65714e6a47f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-eyes-40000-security-cameras-vulnerable-to--21c989c6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20eyes%3A%2040%2C000%20security%20cameras%20vulnerable%20to%20remote%20hacking&amp;severity=medium&amp;id=684aa019358c65714e6a47fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4613-cwe-20-improper-input-validation-in--3a3420e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4613%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Web%20Designer%20App&amp;severity=high&amp;id=684a9c92358c65714e6a458b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6003-cwe-863-incorrect-authorization-in-c-98d3442e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6003%3A%20CWE-863%20Incorrect%20Authorization%20in%20cyberlord92%20WordPress%20Single%20Sign-On%20(SSO)%20-%20Single%20Site%20Standard&amp;severity=medium&amp;id=684a9206358c65714e6a3cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40592-cwe-22-improper-limitation-of-a-pat-a553fc8f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40592%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Siemens%20Mendix%20Studio%20Pro%2010&amp;severity=medium&amp;id=684a8e82358c65714e6a3a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5301-cwe-79-improper-neutralization-of-in-ce651dc2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5301%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OnlyOffice%20Docs%20(DocumentServer)&amp;severity=medium&amp;id=684a8afe358c65714e6a37eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35978-improper-restriction-of-communicati-4b24bcf6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35978%3A%20Improper%20restriction%20of%20communication%20channel%20to%20intended%20endpoints%20in%20Fujitsu%20Client%20Computing%20Limited%20UpdateNavi&amp;severity=high&amp;id=684a7262358c65714e6a2530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4973-cwe-288-authentication-bypass-using--cb31097a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4973%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20AmentoTech%20Workreap&amp;severity=critical&amp;id=684a67d6358c65714e6a146b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5012-cwe-434-unrestricted-upload-of-file--46a41291</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5012%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AmentoTech%20Workreap&amp;severity=high&amp;id=684a67d6358c65714e6a146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/erie-insurance-confirms-cyberattack-behind-busines-bdec66d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Erie%20Insurance%20confirms%20cyberattack%20behind%20business%20disruptions&amp;severity=high&amp;id=684a4f38358c65714e6a0369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartattack-uses-smartwatches-to-steal-data-from-a-2cf23e6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartAttack%20uses%20smartwatches%20to%20steal%20data%20from%20air-gapped%20systems&amp;severity=high&amp;id=684a4f38358c65714e6a0371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6009-sql-injection-in-kicode111-like-girl-dcd0185a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6009%3A%20SQL%20Injection%20in%20kiCode111%20like-girl&amp;severity=medium&amp;id=684a412e358c65714e69f338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6008-sql-injection-in-kicode111-like-girl-35528307</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6008%3A%20SQL%20Injection%20in%20kiCode111%20like-girl&amp;severity=medium&amp;id=684a369d358c65714e69eaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6007-sql-injection-in-kicode111-like-girl-8053991a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6007%3A%20SQL%20Injection%20in%20kiCode111%20like-girl&amp;severity=medium&amp;id=684a369d358c65714e69ea9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6006-sql-injection-in-kicode111-like-girl-e70288d9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6006%3A%20SQL%20Injection%20in%20kiCode111%20like-girl&amp;severity=medium&amp;id=684a2c11358c65714e69e35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6005-sql-injection-in-kicode111-like-girl-d8caeee1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6005%3A%20SQL%20Injection%20in%20kiCode111%20like-girl&amp;severity=medium&amp;id=684a2c11358c65714e69e357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-12-ccb296c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-12&amp;severity=medium&amp;id=684b6bf1358c65714e6b3296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44091-na-40642269</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44091%3A%20n%2Fa&amp;severity=high&amp;id=684b3ac9358c65714e6afa41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46035-na-98ecd6de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46035%3A%20n%2Fa&amp;severity=high&amp;id=684af476358c65714e6a96e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29744-na-64d5efcd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29744%3A%20n%2Fa&amp;severity=medium&amp;id=684af476358c65714e6a96db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-triple-combo-threat-of-the-kimsuky-fda3d799</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20Triple%20Combo%20Threat%20of%20the%20Kimsuky%20Group&amp;severity=medium&amp;id=684a0009c06833077b26c2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-click-ai-data-leak-flaw-uncovered-in-microsof-71aff87b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero-click%20AI%20data%20leak%20flaw%20uncovered%20in%20Microsoft%20365%20Copilot&amp;severity=high&amp;id=6849deb978307950bca180ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30085-cwe-94-improper-control-of-generati-4d78d077</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30085%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rsjoomla.com%20RSform!Pro%20component%20for%20Joomla&amp;severity=critical&amp;id=6849d6100d5ebfc3fd66de4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32466-cwe-89-improper-neutralization-of-s-3a47a7b5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32466%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rsjoomla.com%20RSMediaGallery%20component%20for%20Joomla&amp;severity=medium&amp;id=6849d6100d5ebfc3fd66de55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32465-cwe-79-improper-neutralization-of-i-0fa2aeb6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32465%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSTickets!%20component%20for%20Joomla&amp;severity=high&amp;id=6849d6100d5ebfc3fd66de52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49150-cwe-200-exposure-of-sensitive-infor-55597135</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49150%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20getcursor%20cursor&amp;severity=medium&amp;id=6849c32c527d26c5b90ccd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40912-cwe-1395-dependency-on-vulnerable-t-b0ea859d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40912%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20MIK%20CryptX&amp;severity=critical&amp;id=6849c32c527d26c5b90ccd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0923-cwe-540-inclusion-of-sensitive-infor-ae0da7c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0923%3A%20CWE-540%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20IBM%20Cognos%20Analytics&amp;severity=medium&amp;id=6849bfa7527d26c5b90cca12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0917-cwe-79-improper-neutralization-of-in-6f63c2eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0917%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cognos%20Analytics&amp;severity=medium&amp;id=6849bfa7527d26c5b90cca0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25032-cwe-770-allocation-of-resources-wit-e7950dd0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25032%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Cognos%20Analytics&amp;severity=high&amp;id=6849bfa7527d26c5b90cca15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0913-cwe-59-improper-link-resolution-befo-d27bf59a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0913%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Go%20standard%20library%20syscall&amp;severity=medium&amp;id=6849bbac23110031d410557b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40915-cwe-338-use-of-cryptographically-we-cd53eed2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40915%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20GRYPHON%20Mojolicious%3A%3APlugin%3A%3ACSRF&amp;severity=high&amp;id=6849bbac23110031d4105581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4673-cwe-201-insertion-of-sensitive-infor-b56af503</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4673%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Go%20standard%20library%20net%2Fhttp&amp;severity=medium&amp;id=6849b4aa23110031d4104ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22874-cwe-295-improper-certificate-valida-b2e30c3a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22874%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=6849b4aa23110031d4104ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1699-cwe-276-incorrect-default-permission-bc0f5ef3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1699%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Motorola%20g34&amp;severity=low&amp;id=6849ad9c23110031d4104321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1698-cwe-476-null-pointer-dereference-in--b39c0489</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1698%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Motorola%20Razr%2040%20Ultra&amp;severity=low&amp;id=6849ad9c23110031d410431e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26383-cwe-457-use-of-uninitialized-variab-566b26cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26383%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Johnson%20Controls%20iSTAR%20Configuration%20Utility%20(ICU)&amp;severity=medium&amp;id=6849a69523110031d4103be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49148-cwe-427-uncontrolled-search-path-el-55e0cc74</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49148%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20thevindu-w%20clip_share_server&amp;severity=high&amp;id=68499c0e23110031d41030c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48447-cwe-79-improper-neutralization-of-i-4992b3a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48447%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Lightgallery&amp;severity=high&amp;id=6849989023110031d4102824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48448-cwe-770-allocation-of-resources-wit-a22d0c5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48448%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Drupal%20Admin%20Audit%20Trail&amp;severity=medium&amp;id=6849989023110031d4102827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48446-cwe-863-incorrect-authorization-in--035ff193</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48446%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Commerce%20Alphabank%20Redirect&amp;severity=high&amp;id=6849989023110031d4102821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48445-cwe-863-incorrect-authorization-in--e58aa0db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48445%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Commerce%20Eurobank%20(Redirect)&amp;severity=high&amp;id=6849989023110031d410281e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3473-cwe-277-insecure-inherited-permissio-0ff8d8d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3473%3A%20CWE-277%20Insecure%20Inherited%20Permissions%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=6849950223110031d41023ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0163-cwe-204-response-discrepancy-informa-04ca9b57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0163%3A%20CWE-204%20Response%20Discrepancy%20Information%20Exposure%20in%20IBM%20Security%20Verify%20Access&amp;severity=medium&amp;id=6849950223110031d41023cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48013-cwe-862-missing-authorization-in-dr-39c59d3a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48013%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Quick%20Node%20Block&amp;severity=medium&amp;id=6849950223110031d41023d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48444-cwe-862-missing-authorization-in-dr-12a5a10e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48444%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Quick%20Node%20Block&amp;severity=medium&amp;id=6849950223110031d41023d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40914-cwe-1395-dependency-on-vulnerable-t-64839f7f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40914%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20MIK%20CryptX&amp;severity=critical&amp;id=6849989023110031d4102818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4605-cwe-789-memory-allocation-with-exces-e1bb095e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4605%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Autodesk%20USD%20for%20Maya&amp;severity=medium&amp;id=68498e0523110031d4101335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weaponized-google-oauth-triggers-malicious-websock-16b17453</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weaponized%20Google%20OAuth%20Triggers%20Malicious%20WebSocket&amp;severity=medium&amp;id=684986fc23110031d40ff910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4922-cwe-266-incorrect-privilege-assignme-83a46742</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4922%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20HashiCorp%20Nomad&amp;severity=high&amp;id=684986f623110031d40ff6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-secure-interpol-disrupts-20000-infosteal-3b98b3d7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Secure%3A%20INTERPOL%20Disrupts%2020%2C000%20Infostealer%20Domains%2C%2032%20Arrested%20and%20%20216%2C000%20Victims%20Notified&amp;severity=medium&amp;id=6849836b23110031d40fec8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32711-cwe-77-improper-neutralization-of-s-944d08cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32711%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=critical&amp;id=684986f623110031d40ff6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/getting-rce-on-monero-forums-with-wrapwrap-1cae4cc8</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Getting%20RCE%20on%20Monero%20forums%20with%20wrapwrap&amp;severity=medium&amp;id=6849838223110031d40fece1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35941-vulnerability-in-myscada-mypro-7e26d1dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35941%3A%20Vulnerability%20in%20mySCADA%20myPRO&amp;severity=medium&amp;id=6849837d23110031d40fecd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/les-comptes-machines-dans-active-directory-1b90d0b4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Les%20comptes%20machines%20dans%20Active%20Directory&amp;severity=medium&amp;id=68497fed23110031d40fdddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-industry-cloud-hit-by-20-vulnerabilitie-51d08865</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Industry%20Cloud%20Hit%20by%2020%20Vulnerabilities%20Including%20Several%200days&amp;severity=medium&amp;id=684978de23110031d40faf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sinotrack-gps-devices-vulnerable-to-remote-vehicle-01b2aa6c</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SinoTrack%20GPS%20Devices%20Vulnerable%20to%20Remote%20Vehicle%20Control%20via%20Default%20Passwords&amp;severity=high&amp;id=684978de23110031d40faf73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5144-cwe-79-improper-neutralization-of-in-1443df8b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5144%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=684978f723110031d40faf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5986-unsolicited-file-download-disk-space-ccd61093</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5986%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=6849756223110031d40fa8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49710-integer-overflow-in-orderedhashtabl-29b58f70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49710%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6849756223110031d40fa8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49709-memory-corruption-in-canvas-surface-7eeaa617</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49709%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6849756223110031d40fa8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5687-local-privilege-escalation-vulnerabi-6f75b924</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5687%3A%20Vulnerability%20in%20Mozilla%20Mozilla%20VPN%202.28.0&amp;severity=high&amp;id=6849756223110031d40fa8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3302-cwe-79-improper-neutralization-of-in-95be26ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xagio%20Xagio%20SEO%20%E2%80%93%20AI%20Powered%20SEO&amp;severity=high&amp;id=684968f59ea7c3ca70af288c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-infrastructure-of-a-spearphishing-ca-f029bd43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20the%20Infrastructure%20of%20a%20Spear%E2%80%91phishing%20Campaign&amp;severity=medium&amp;id=684953df9ea7c3ca70af04f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eggs-in-a-cloudy-basket-skeleton-spiders-trusted-c-ce2f8c22</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eggs%20in%20a%20Cloudy%20Basket%3A%20Skeleton%20Spider&apos;s%20Trusted%20Cloud%20Malware%20Delivery&amp;severity=medium&amp;id=684953df9ea7c3ca70af04d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4315-cwe-269-improper-privilege-managemen-ad3ee204</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4315%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20cubewp1211%20CubeWP%20Framework&amp;severity=high&amp;id=684950599ea7c3ca70af0097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26412-cwe-912-hidden-functionality-in-sim-ba7b536f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26412%3A%20CWE-912%20Hidden%20Functionality%20in%20SIMCom%20SIM7600G%20Modem&amp;severity=medium&amp;id=6849402963853f603f4ba3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41663-cwe-78-improper-neutralization-of-s-b894f5ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41663%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Weidmueller%20IE-SR-2TX-WL&amp;severity=critical&amp;id=68493ca3cacb3d99bea60348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41661-cwe-352-cross-site-request-forgery--30917437</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41661%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Weidmueller%20IE-SR-2TX-WL&amp;severity=high&amp;id=68493ca3cacb3d99bea60342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41662-cwe-352-cross-site-request-forgery--416abcba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41662&amp;severity=null&amp;id=68493ca3cacb3d99bea60345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29756-cwe-862-missing-authorization-in-su-518d8962</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29756%3A%20CWE-862%20Missing%20Authorization%20in%20SunGrow%20iSolarCloud&amp;severity=high&amp;id=6849397cb3117cc9568fa574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5991-cwe-416-use-after-free-in-the-qt-com-777449df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5991%3A%20CWE-416%20Use%20After%20Free%20in%20The%20Qt%20Company%20Qt&amp;severity=low&amp;id=6849339d72c9cfbdf1192f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5395-cwe-434-unrestricted-upload-of-file--f14692b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5395%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ValvePress%20WordPress%20Automatic%20Plugin&amp;severity=high&amp;id=684929083cd93dcca832a588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4799-cwe-36-absolute-path-traversal-in-ga-4e331953</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4799%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20gamerz%20WP-DownloadManager&amp;severity=high&amp;id=6848fed43cd93dcca831b163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4798-cwe-200-exposure-of-sensitive-inform-a1ee2a06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4798%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gamerz%20WP-DownloadManager&amp;severity=medium&amp;id=6848fed43cd93dcca831b15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4666-cwe-79-improper-neutralization-of-in-6dce439d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kseaborn%20Zotpress&amp;severity=medium&amp;id=6848fed43cd93dcca831b156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5959-type-confusion-in-google-chrome-a93942f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5959%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=6848d81a3cd93dcca8315ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5958-use-after-free-in-google-chrome-cddfc618</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5958%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6848d81a3cd93dcca8315ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4275-cwe-284-improper-access-control-in-i-93fc4867</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4275%3A%20cwe-284%3A%20Improper%20Access%20Control%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=6848d1753cd93dcca8315821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-11-c8ef9bf7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-11&amp;severity=medium&amp;id=684a1a71358c65714e69d43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1055-cwe-862-missing-authorization-in-k7--1a640357</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1055%3A%20CWE-862%20Missing%20Authorization%20in%20K7%20Security%20K7%20Security%20Anti-Malware&amp;severity=medium&amp;id=6848c2e63cd93dcca8312f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32717-cwe-122-heap-based-buffer-overflow--bd005210</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32717%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=6848bf863cd93dcca8312d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30675-cwe-200-exposure-of-sensitive-infor-27b04ee8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30675%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=medium&amp;id=6848bf863cd93dcca8312d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22829-cwe-269-improper-privilege-manageme-97dd294a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22829%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=low&amp;id=6848bbe13cd93dcca831279f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26521-cwe-200-exposure-of-sensitive-infor-e9ab2d2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26521%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=high&amp;id=6848bbe13cd93dcca83127a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47849-cwe-269-improper-privilege-manageme-82c1d190</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47849%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=high&amp;id=6848bbe13cd93dcca83127ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47713-cwe-269-improper-privilege-manageme-234d7084</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47713%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=high&amp;id=6848bbe13cd93dcca83127a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-secure-boot-flaw-lets-attackers-install-bootki-bce14ef7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Secure%20Boot%20flaw%20lets%20attackers%20install%20bootkit%20malware%2C%20patch%20now&amp;severity=high&amp;id=6848b86f3cd93dcca83126f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5985-improper-authentication-in-code-proj-29d98039</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5985%3A%20Improper%20Authentication%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=6848b4e53cd93dcca831247a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5984-cross-site-scripting-in-sourcecodest-4670b4f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5984%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=6848b4e53cd93dcca8312474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/june-2025-patch-tuesday-microsoft-fixes-66-bugs-in-3039dd89</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=June%202025%20Patch%20Tuesday%3A%20Microsoft%20Fixes%2066%20Bugs%2C%20Including%20Active%200-Day&amp;severity=medium&amp;id=6848b4ea3cd93dcca83124a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46995-cross-site-scripting-stored-xss-cwe-b6ff5c93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46995%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46917-cross-site-scripting-stored-xss-cwe-ba8f2f25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46917%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46901-cross-site-scripting-stored-xss-cwe-b98f668b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46901%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47052-cross-site-scripting-dom-based-xss--d8861391</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47052%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831204f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46954-cross-site-scripting-dom-based-xss--6beb1e78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46954%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47077-cross-site-scripting-stored-xss-cwe-12977352</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47077%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831209c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47091-cross-site-scripting-stored-xss-cwe-386d13c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47091%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47065-cross-site-scripting-stored-xss-cwe-2a8983f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47065%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47015-cross-site-scripting-stored-xss-cwe-12e7f36d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47015%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47029-cross-site-scripting-stored-xss-cwe-9d4ee650</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47029%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8311ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47060-cross-site-scripting-stored-xss-cwe-c949b458</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47060%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831205b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46951-cross-site-scripting-stored-xss-cwe-accbd6fa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46951%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46985-cross-site-scripting-stored-xss-cwe-5da9247d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46985%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46874-cross-site-scripting-reflected-xss--54ae67a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46874%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47075-cross-site-scripting-stored-xss-cwe-f1904403</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47075%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831208c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46971-cross-site-scripting-stored-xss-cwe-55be243c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46971%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46997-cross-site-scripting-stored-xss-cwe-797cc985</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46997%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46922-cross-site-scripting-stored-xss-cwe-5c4db05e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46922%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47102-cross-site-scripting-dom-based-xss--a1869c86</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47102&amp;severity=high&amp;id=6848b19c3cd93dcca83120ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46882-cross-site-scripting-stored-xss-cwe-853f6dc3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46882%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46991-cross-site-scripting-stored-xss-cwe-b58a2791</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46991%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47016-cross-site-scripting-stored-xss-cwe-066d0e1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47016%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46978-cross-site-scripting-stored-xss-cwe-bfa4c738</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46978%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46878-cross-site-scripting-stored-xss-cwe-b94706fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46878%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47073-cross-site-scripting-stored-xss-cwe-6b63d2c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47073%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47041-cross-site-scripting-dom-based-xss--7e7a8796</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47041%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831202a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46838-cross-site-scripting-dom-based-xss--c4935324</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46838%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46942-cross-site-scripting-stored-xss-cwe-71b0c5f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46942%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46949-cross-site-scripting-stored-xss-cwe-60ce24df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46949%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46989-cross-site-scripting-dom-based-xss--e246d928</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46989%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46981-cross-site-scripting-stored-xss-cwe-1a68c55f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46981%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46905-cross-site-scripting-stored-xss-cwe-2c06ee4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46905%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47050-cross-site-scripting-dom-based-xss--bf2d7d09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47050%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831203f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46918-cross-site-scripting-stored-xss-cwe-9f545d23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46918%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46976-cross-site-scripting-dom-based-xss--69cb87d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46976%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47085-cross-site-scripting-stored-xss-cwe-dba40c0d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47085%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47115-cross-site-scripting-stored-xss-cwe-5febf056</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47115%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47096-improper-input-validation-cwe-20-in-23514cf9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47096%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=low&amp;id=6848b19c3cd93dcca83120df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47092-cross-site-scripting-stored-xss-cwe-ad016fac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47092%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47057-cross-site-scripting-dom-based-xss--d8ac3897</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47057%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46910-cross-site-scripting-stored-xss-cwe-120787ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46910%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46903-cross-site-scripting-stored-xss-cwe-87d19bf0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46903%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46979-cross-site-scripting-stored-xss-cwe-4a7dbb09</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46979%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46845-cross-site-scripting-stored-xss-cwe-de870850</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46845%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46999-cross-site-scripting-stored-xss-cwe-480213b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46999%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47114-cross-site-scripting-stored-xss-cwe-1e9e8dfc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47114%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47040-cross-site-scripting-dom-based-xss--387b6497</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47040%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47074-cross-site-scripting-stored-xss-cwe-9f55b22b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47074%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47017-cross-site-scripting-stored-xss-cwe-688a7a41</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47017%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47034-cross-site-scripting-dom-based-xss--c146d3cb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47034%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831200b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47006-cross-site-scripting-stored-xss-cwe-876fc7be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47006%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47027-cross-site-scripting-dom-based-xss--c4e57429</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47027%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47067-cross-site-scripting-stored-xss-cwe-f02f4d06</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47067%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46957-cross-site-scripting-stored-xss-cwe-01351d48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46957%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46974-cross-site-scripting-dom-based-xss--5d35222e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46974%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46947-cross-site-scripting-stored-xss-cwe-12eae8b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46947%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47080-cross-site-scripting-stored-xss-cwe-fc01c385</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47080%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46887-cross-site-scripting-stored-xss-cwe-8e0a18f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46887%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47045-cross-site-scripting-dom-based-xss--99da9519</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47045%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47026-cross-site-scripting-stored-xss-cwe-6e70876e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47026%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46990-cross-site-scripting-stored-xss-cwe-002c2b51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46990%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46895-cross-site-scripting-stored-xss-cwe-621a1fb6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46895%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46890-cross-site-scripting-dom-based-xss--cf308448</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46890%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46923-cross-site-scripting-stored-xss-cwe-7ba7e4a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46923%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46924-cross-site-scripting-stored-xss-cwe-b25efd0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46924%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46988-cross-site-scripting-dom-based-xss--ddd4a989</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46988%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46975-cross-site-scripting-dom-based-xss--12658c3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46975%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46956-cross-site-scripting-dom-based-xss--f85aa0f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46956%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46848-cross-site-scripting-dom-based-xss--15405fb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46848%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46982-cross-site-scripting-stored-xss-cwe-3d3c0a1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46982%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47071-cross-site-scripting-stored-xss-cwe-66a85286</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47071%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47039-cross-site-scripting-dom-based-xss--57e80992</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47039%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46906-cross-site-scripting-stored-xss-cwe-741cf63a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46906%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46850-cross-site-scripting-stored-xss-cwe-683338b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46850%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46939-cross-site-scripting-stored-xss-cwe-6c8b663b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46939%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46871-cross-site-scripting-stored-xss-cwe-32600f04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46871%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47036-cross-site-scripting-dom-based-xss--24e44cc5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47036%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46915-cross-site-scripting-stored-xss-cwe-f65353dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46915%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47056-cross-site-scripting-dom-based-xss--9f46b0ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47056%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46888-cross-site-scripting-stored-xss-cwe-35ddbc25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46888%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47066-cross-site-scripting-stored-xss-cwe-7e8aeb32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47066%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46855-cross-site-scripting-stored-xss-cwe-39b6ead7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46855%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47004-cross-site-scripting-stored-xss-cwe-725e65db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47004%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46872-cross-site-scripting-dom-based-xss--ef56fb31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46872%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47070-cross-site-scripting-stored-xss-cwe-9f0ddb10</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47070%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831207d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47079-cross-site-scripting-stored-xss-cwe-fffc4f49</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47079%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46841-cross-site-scripting-stored-xss-cwe-dc6320e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46841%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46919-cross-site-scripting-stored-xss-cwe-6cd3f2fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46919%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47019-cross-site-scripting-stored-xss-cwe-2c08bfcc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47019%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47021-cross-site-scripting-stored-xss-cwe-99d3c333</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47021%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47038-cross-site-scripting-dom-based-xss--0b579d9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47038%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46880-cross-site-scripting-stored-xss-cwe-724f2aee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46880%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47012-cross-site-scripting-stored-xss-cwe-22d82bd8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47012%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46913-cross-site-scripting-stored-xss-cwe-be2dd1c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46913%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46854-cross-site-scripting-dom-based-xss--423bfe26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46854%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46909-cross-site-scripting-stored-xss-cwe-a85740f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46909%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46927-cross-site-scripting-stored-xss-cwe-d0ada617</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46927%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47116-cross-site-scripting-stored-xss-cwe-c20d6df0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47116%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47062-cross-site-scripting-stored-xss-cwe-6ee54a49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47062%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831205e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46902-cross-site-scripting-stored-xss-cwe-7cdf3fb8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46902%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46965-cross-site-scripting-stored-xss-cwe-8939d689</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46965%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46900-cross-site-scripting-stored-xss-cwe-abf959b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46900%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46952-cross-site-scripting-stored-xss-cwe-00640e2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46952%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47082-cross-site-scripting-stored-xss-cwe-c05c79a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47082%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46899-cross-site-scripting-stored-xss-cwe-8a4a4690</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46899%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47020-cross-site-scripting-stored-xss-cwe-77b26c47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47020%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47005-cross-site-scripting-dom-based-xss--34481a11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47005%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46948-cross-site-scripting-stored-xss-cwe-ec76af32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46948%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46876-cross-site-scripting-stored-xss-cwe-c90d730d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46876%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46931-cross-site-scripting-stored-xss-cwe-8f1268e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46931%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47022-cross-site-scripting-dom-based-xss--5253bc60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47022%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46945-cross-site-scripting-stored-xss-cwe-0ef26e5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46945%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46904-cross-site-scripting-stored-xss-cwe-66221ed8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46904%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46860-cross-site-scripting-stored-xss-cwe-39698da1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46860%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47048-cross-site-scripting-dom-based-xss--7848f58d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47048%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46879-cross-site-scripting-stored-xss-cwe-6da86361</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46879%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47069-cross-site-scripting-stored-xss-cwe-0c7f42c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47069%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831207a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47081-cross-site-scripting-stored-xss-cwe-e1cbdcb4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47081%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47033-cross-site-scripting-dom-based-xss--0fec6bee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47033%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46941-cross-site-scripting-stored-xss-cwe-1ebfec48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46941%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46986-cross-site-scripting-stored-xss-cwe-f1e21842</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46986%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46898-cross-site-scripting-dom-based-xss--82f5c0f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46898%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46893-cross-site-scripting-stored-xss-cwe-ba28c882</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46893%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46929-cross-site-scripting-stored-xss-cwe-7156628f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46929%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46983-cross-site-scripting-stored-xss-cwe-bdf11baf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46983%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46916-cross-site-scripting-stored-xss-cwe-44fb0952</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46916%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46953-cross-site-scripting-stored-xss-cwe-dc637c1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46953%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47032-cross-site-scripting-dom-based-xss--e421948a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47032%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46861-cross-site-scripting-stored-xss-cwe-2d587f8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46861%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46926-cross-site-scripting-stored-xss-cwe-595af46c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46926%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47008-cross-site-scripting-stored-xss-cwe-457ec13d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47008%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47044-cross-site-scripting-dom-based-xss--5da88c7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47044%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47014-cross-site-scripting-stored-xss-cwe-0ea91e18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47014%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46943-cross-site-scripting-stored-xss-cwe-e66ac336</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46943%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46889-improper-access-control-cwe-284-in--1dc3d540</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46889%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46946-cross-site-scripting-stored-xss-cwe-88c2f799</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46946%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47031-cross-site-scripting-stored-xss-cwe-086cb350</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47031%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47094-cross-site-scripting-reflected-xss--b7b58469</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47094%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47090-cross-site-scripting-stored-xss-cwe-df51e3ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47090%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47084-cross-site-scripting-stored-xss-cwe-35133ab7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47084%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47002-cross-site-scripting-stored-xss-cwe-eaebf865</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47002%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46857-cross-site-scripting-reflected-xss--d742e896</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46857%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47089-cross-site-scripting-stored-xss-cwe-4bc69f8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47089%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46967-cross-site-scripting-stored-xss-cwe-1a9877e9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46967%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46873-cross-site-scripting-stored-xss-cwe-047beaac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46873%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46963-cross-site-scripting-dom-based-xss--5c39cee5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46963%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47068-cross-site-scripting-stored-xss-cwe-e56338cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47068%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46891-cross-site-scripting-stored-xss-cwe-e43626e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46891%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46840-improper-authorization-cwe-285-in-a-746ec14f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46840%3A%20Improper%20Authorization%20(CWE-285)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=high&amp;id=6848b1923cd93dcca8311d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47000-cross-site-scripting-stored-xss-cwe-906d917b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47000%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47042-cross-site-scripting-dom-based-xss--02849f37</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47042%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831202d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47072-cross-site-scripting-stored-xss-cwe-8c9470af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47072%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46859-cross-site-scripting-stored-xss-cwe-d1746684</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46859%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46987-cross-site-scripting-stored-xss-cwe-0643b63f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46987%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47030-cross-site-scripting-stored-xss-cwe-19492f76</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47030%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8311fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46970-cross-site-scripting-dom-based-xss--3f22d8b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46970%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46884-cross-site-scripting-stored-xss-cwe-44ebb806</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46884%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46846-cross-site-scripting-stored-xss-cwe-8037de08</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46846%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46847-cross-site-scripting-stored-xss-cwe-843eebc0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46847%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46864-cross-site-scripting-stored-xss-cwe-7c379ff1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46864%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46842-cross-site-scripting-stored-xss-cwe-591ef235</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46842%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46886-cross-site-scripting-stored-xss-cwe-52f590be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46886%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46964-cross-site-scripting-dom-based-xss--86abb066</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46964%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46920-cross-site-scripting-stored-xss-cwe-73b012ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46920%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46870-cross-site-scripting-dom-based-xss--e3de44fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46870%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46875-cross-site-scripting-reflected-xss--d73ac501</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46875%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47047-cross-site-scripting-dom-based-xss--b7de09d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47047%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47113-cross-site-scripting-stored-xss-cwe-02ba526b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47113%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46851-cross-site-scripting-stored-xss-cwe-eeedb36f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46851%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46863-cross-site-scripting-stored-xss-cwe-96ba0bc3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46863%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46858-cross-site-scripting-stored-xss-cwe-2a7dc8a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46858%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46977-cross-site-scripting-dom-based-xss--2a3b96e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46977%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46866-cross-site-scripting-dom-based-xss--ec974f71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46866%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46885-cross-site-scripting-stored-xss-cwe-36ad9e52</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46885%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47087-cross-site-scripting-stored-xss-cwe-5299edbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47087%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47011-cross-site-scripting-stored-xss-cwe-c4318ea7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47011%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46935-cross-site-scripting-stored-xss-cwe-6484f181</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46935%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47055-cross-site-scripting-stored-xss-cwe-943a16a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47055%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46940-cross-site-scripting-stored-xss-cwe-a59f0b87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46940%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46992-cross-site-scripting-stored-xss-cwe-3991a115</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46992%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46944-cross-site-scripting-stored-xss-cwe-59ef5b74</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46944%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46955-cross-site-scripting-dom-based-xss--f52392b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46955%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47037-cross-site-scripting-dom-based-xss--fa9511b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47037%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47063-cross-site-scripting-dom-based-xss--ee0d59cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47063%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46911-cross-site-scripting-stored-xss-cwe-662d3ba9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46911%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47013-cross-site-scripting-stored-xss-cwe-e7d3fdad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47013%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47007-cross-site-scripting-stored-xss-cwe-97cb3c5b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47007%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47083-cross-site-scripting-stored-xss-cwe-5a0716f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47083%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47076-cross-site-scripting-stored-xss-cwe-de0cbf6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47076%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831208f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46843-cross-site-scripting-stored-xss-cwe-436398c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46843%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46933-cross-site-scripting-stored-xss-cwe-a1e495be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46933%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46914-cross-site-scripting-stored-xss-cwe-b9e65053</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46914%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47025-cross-site-scripting-dom-based-xss--f371abbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47025%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46894-cross-site-scripting-stored-xss-cwe-0b63c50c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46894%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47088-cross-site-scripting-stored-xss-cwe-ecc35cd2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47088%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46883-cross-site-scripting-stored-xss-cwe-ff569713</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46883%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47010-cross-site-scripting-stored-xss-cwe-4439eaa4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47010%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46968-cross-site-scripting-stored-xss-cwe-832f829f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46968%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46865-cross-site-scripting-dom-based-xss--19b44ecc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46865%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46844-cross-site-scripting-stored-xss-cwe-9b62d7fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46844%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46853-cross-site-scripting-stored-xss-cwe-8f81b8e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46853%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46907-cross-site-scripting-stored-xss-cwe-539bb757</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46907%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46930-cross-site-scripting-stored-xss-cwe-94b92008</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46930%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47078-cross-site-scripting-stored-xss-cwe-c82bd24f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47078%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831209f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46972-cross-site-scripting-dom-based-xss--d582bf2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46972%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46984-cross-site-scripting-dom-based-xss--51402b15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46984%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47051-cross-site-scripting-dom-based-xss--a0bea5e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47051%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831204c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46881-cross-site-scripting-stored-xss-cwe-d710205b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46881%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47086-cross-site-scripting-stored-xss-cwe-07e430c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47086%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46966-cross-site-scripting-dom-based-xss--df59fc9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46966%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47095-url-redirection-to-untrusted-site-o-df0e6d7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47095&amp;severity=medium&amp;id=6848b19c3cd93dcca83120dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47117-cross-site-scripting-dom-based-xss--db83a406</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47117%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46950-cross-site-scripting-stored-xss-cwe-0bad315f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46950%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47049-cross-site-scripting-dom-based-xss--65220f67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47049%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831203c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46908-cross-site-scripting-stored-xss-cwe-a54a9c93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46908%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46837-cross-site-scripting-stored-xss-cwe-69a58c26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46837%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=high&amp;id=6848b1923cd93dcca8311d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46892-cross-site-scripting-stored-xss-cwe-86bb5e61</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46892%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46877-cross-site-scripting-dom-based-xss--2e46608b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46877%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47093-cross-site-scripting-stored-xss-cwe-103d4993</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47093%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47003-cross-site-scripting-stored-xss-cwe-e01603b8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47003%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46973-cross-site-scripting-dom-based-xss--03eaf62e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46973%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46934-cross-site-scripting-stored-xss-cwe-91772534</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46934%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46960-cross-site-scripting-stored-xss-cwe-3201c66f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46960%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47035-cross-site-scripting-dom-based-xss--8b0fd97a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47035%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831200e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46912-cross-site-scripting-stored-xss-cwe-77ffdb3d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46912%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46862-cross-site-scripting-stored-xss-cwe-af7339e9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46862%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5980-sql-injection-in-code-projects-resta-63a9785d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5980%3A%20SQL%20Injection%20in%20code-projects%20Restaurant%20Order%20System&amp;severity=medium&amp;id=6848a2383cd93dcca8310c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-mirai-botnets-lzrd-and-resgod-spotted-exploiti-19668f97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Mirai%20Botnets%2C%20Lzrd%20and%20Resgod%20Spotted%20Exploiting%20Wazuh%20Vulnerability&amp;severity=medium&amp;id=68489a13d5c54782e1622696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-industry-clouds-security-whitepaper-5-c-7d2bbab4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Industry%20Cloud(s)%20Security%20Whitepaper%3A%205%20CVEs%2C%2015%2B%20Security%20Risks&amp;severity=high&amp;id=6848a3883cd93dcca8310f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5979-sql-injection-in-code-projects-schoo-09ae4176</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5979%3A%20SQL%20Injection%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=6848a2383cd93dcca8310c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5978-stack-based-buffer-overflow-in-tenda-8a765660</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5978%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=6848a2383cd93dcca8310c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35940-cwe-798-use-of-hard-coded-credentia-42fb5bc3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35940%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20GFI%20Archiver&amp;severity=high&amp;id=6848a2383cd93dcca8310c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5977-sql-injection-in-code-projects-schoo-7c71e58f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5977%3A%20SQL%20Injection%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=684891ea48de16fa2fcfc184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5976-cross-site-scripting-in-phpgurukul-r-b197c757</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5976%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=684891ea48de16fa2fcfc17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49133-cwe-125-out-of-bounds-read-in-stefa-67ef6ef9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49133%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20stefanberger%20libtpms&amp;severity=medium&amp;id=684891ea48de16fa2fcfc18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5975-cross-site-scripting-in-phpgurukul-r-2d5cc716</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5975%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=68488d63b74e04a9958dc73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5974-cross-site-scripting-in-phpgurukul-r-0a34ef23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5974%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Restaurant%20Table%20Booking%20System&amp;severity=medium&amp;id=68488d63b74e04a9958dc738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36852-cwe-829-inclusion-of-functionality--e6d62e9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36852%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Niklas%20Portmann%20Azure%20Based%20Remote%20Cache%20Plugin%20for%20Nx&amp;severity=critical&amp;id=684888ea5669e5710431efa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3052-cwe-123-write-what-where-condition-i-1fe78e96</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3052%3A%20CWE-123%3A%20Write-what-where%20Condition%20in%20DT%20Research%20BiosFlashShell&amp;severity=high&amp;id=684888ea5669e5710431efaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47111-null-pointer-dereference-cwe-476-in-0ac4ea82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47111%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=684888ea5669e5710431f004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43579-information-exposure-cwe-200-in-ado-b9f6c6ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43579%3A%20Information%20Exposure%20(CWE-200)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=684888ea5669e5710431efdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43573-use-after-free-cwe-416-in-adobe-acr-05df711e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43573%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43577-use-after-free-cwe-416-in-adobe-acr-1fe9f989</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43577%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43550-use-after-free-cwe-416-in-adobe-acr-a62d616d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43550%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47112-out-of-bounds-read-cwe-125-in-adobe-f3b33e4f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47112%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=684888ea5669e5710431f007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43575-out-of-bounds-write-cwe-787-in-adob-4581e57a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43575%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43578-out-of-bounds-read-cwe-125-in-adobe-ac10d678</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43578%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=684888ea5669e5710431efd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43574-use-after-free-cwe-416-in-adobe-acr-5df6d426</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43574%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43576-use-after-free-cwe-416-in-adobe-acr-4a4f91ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43576%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47107-heap-based-buffer-overflow-cwe-122--cf55e6d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47107%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=684888ea5669e5710431f00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30327-integer-overflow-or-wraparound-cwe--de82f1b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30327%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=684888ea5669e5710431f00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rust-based-myth-stealer-malware-spread-via-fake-ga-af93368b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rust-based%20Myth%20Stealer%20Malware%20Spread%20via%20Fake%20Gaming%20Sites%20Targets%20Chrome%2C%20Firefox%20Users&amp;severity=high&amp;id=68487cc01b0bd07c392fa3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/texas-dept-of-transportation-breached-300k-crash-r-68072876</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Texas%20Dept.%20of%20Transportation%20breached%2C%20300k%20crash%20records%20stolen&amp;severity=high&amp;id=68487cc01b0bd07c392fa3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fin6-uses-aws-hosted-fake-resumes-on-linkedin-to-d-48996647</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FIN6%20Uses%20AWS-Hosted%20Fake%20Resumes%20on%20LinkedIn%20to%20Deliver%20More_eggs%20Malware&amp;severity=high&amp;id=68487cc01b0bd07c392fa3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5973-cross-site-scripting-in-phpgurukul-r-8f10bdd8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5973%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Restaurant%20Table%20Booking%20System&amp;severity=medium&amp;id=68487f4f1b0bd07c393897c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5972-cross-site-scripting-in-phpgurukul-r-d626b3ff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5972%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Restaurant%20Table%20Booking%20System&amp;severity=medium&amp;id=68487f4f1b0bd07c393897b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whispering-in-the-dark-2e264175</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Whispering%20in%20the%20dark&amp;severity=medium&amp;id=684888e75669e5710431eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5971-sql-injection-in-code-projects-schoo-51359b61</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5971%3A%20SQL%20Injection%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=68487f4f1b0bd07c393898ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36576-cwe-352-cross-site-request-forgery--f0f44a0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36576%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=low&amp;id=68487f4f1b0bd07c39389821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-execution-from-web-browser-using-url-schemes--655e498a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20execution%20from%20web%20browser%20using%20URL%20schemes%20handled%20by%20KDE&apos;s%20KTelnetService%20and%20Konsole%20(CVE-2025-49091)&amp;severity=low&amp;id=68487321813f166aeb7f4083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36577-cwe-79-improper-neutralization-of-i-79d7284f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36577%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=68487f501b0bd07c393899b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5943-cwe-787-out-of-bounds-write-in-micro-b08861d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5943%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MicroDicom%20DICOM%20Viewer&amp;severity=high&amp;id=68487f501b0bd07c393899b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0052-cwe-20-improper-input-validation-in--d9a35a3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0052%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Pure%20Storage%20FlashBlade&amp;severity=high&amp;id=68486f71813f166aeb76f17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36580-cwe-79-improper-neutralization-of-i-49f058a0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36580%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=68486f71813f166aeb76f185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2474-cwe-787-out-of-bounds-write-in-black-17326b7c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2474%3A%20CWE-787%20Out-of-bounds%20Write%20in%20BlackBerry%20QNX%20Software%20Development%20Platform%20(SDP)&amp;severity=critical&amp;id=68486f71813f166aeb76f17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36578-cwe-863-incorrect-authorization-in--050d3f88</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36578%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=68486f71813f166aeb76f182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0051-cwe-20-improper-input-validation-in--1a5690dc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0051%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Pure%20Storage%20FlashArray&amp;severity=high&amp;id=68487f501b0bd07c393899bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2884-cwe-125-out-of-bounds-read-in-truste-534e1039</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2884%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Trusted%20Computing%20Group%20TPM2.0&amp;severity=medium&amp;id=68487f501b0bd07c393899c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36574-cwe-36-absolute-path-traversal-in-d-547e834c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36574%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=68487f501b0bd07c393899b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43581-out-of-bounds-write-cwe-787-in-adob-a1e4b34e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43581%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=high&amp;id=68487f4f1b0bd07c393898d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43588-out-of-bounds-write-cwe-787-in-adob-9ea2086b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43588%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=high&amp;id=68487f4f1b0bd07c393898e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36575-cwe-202-exposure-of-sensitive-infor-e871acad</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36575%3A%20CWE-202%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=68487f501b0bd07c3938996a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47977-cwe-79-improper-neutralization-of-i-1f4cd8e5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47977%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Nuance%20Digital%20Engagement%20Platform&amp;severity=high&amp;id=68487f501b0bd07c3938995b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47968-cwe-20-improper-input-validation-in-9b65e7d9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47968%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=68487f501b0bd07c393899c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47176-remote-code-execution-in-microsoft--75fadd09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47176%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f501b0bd07c39389958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47175-cwe-416-use-after-free-in-microsoft-6f16a066</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47175%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f501b0bd07c39389955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47174-cwe-122-heap-based-buffer-overflow--f42f6a69</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47174%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f501b0bd07c39389952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47173-cwe-641-improper-restriction-of-nam-7f0ac30d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47173%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f501b0bd07c39389964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47172-cwe-89-improper-neutralization-of-s-f0138547</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47172%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68487f4f1b0bd07c393898c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47171-cwe-20-improper-input-validation-in-67b55f41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47171%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=68487f4f1b0bd07c39389817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47170-cwe-416-use-after-free-in-microsoft-f0b95193</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47170%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f501b0bd07c3938994f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47169-cwe-122-heap-based-buffer-overflow--181fd139</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47169%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f4f1b0bd07c3938980a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47168-cwe-416-use-after-free-in-microsoft-410138bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47168%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f4f1b0bd07c393897fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47167-cwe-843-access-of-resource-using-in-fbe258fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47167%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f4f1b0bd07c393897f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47166-cwe-502-deserialization-of-untruste-4ae1074a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47166%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68487f4f1b0bd07c393897eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47165-cwe-416-use-after-free-in-microsoft-490e78a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f521b0bd07c39389c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47164-cwe-416-use-after-free-in-microsoft-65e15dc2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47164%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f521b0bd07c39389c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47163-cwe-502-deserialization-of-untruste-b1d37953</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47163%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68487f511b0bd07c39389c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33073-cwe-284-improper-access-control-in--df4eb99d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33073%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33070-cwe-908-use-of-uninitialized-resour-8d9c939c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33070%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33069-cwe-347-improper-verification-of-cr-26784409</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33069%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68487f511b0bd07c39389c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33068-cwe-400-uncontrolled-resource-consu-65698a93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33068%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=68487f511b0bd07c39389c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33057-cwe-476-null-pointer-dereference-in-0f502ee8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33057%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33056-cwe-284-improper-access-control-in--19580e6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33056%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33055-cwe-125-out-of-bounds-read-in-micro-2c2834ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33055%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33053-cwe-73-external-control-of-file-nam-e3b270e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33053%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33052-cwe-908-use-of-uninitialized-resour-c0778d8c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33052%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68487f511b0bd07c39389b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33050-cwe-693-protection-mechanism-failur-246aaacd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33050%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=68487f511b0bd07c39389b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32725-cwe-693-protection-mechanism-failur-ccb876b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32725%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=68487f511b0bd07c39389b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24065-cwe-125-out-of-bounds-read-in-micro-1f0eb960</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24065%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f501b0bd07c39389a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24069-cwe-125-out-of-bounds-read-in-micro-aa11b8ab</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24069%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f501b0bd07c39389ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24068-cwe-126-buffer-over-read-in-microso-4f37042b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24068%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f501b0bd07c39389ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47969-cwe-200-exposure-of-sensitive-infor-a14eee35</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47969%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=68487f521b0bd07c39389c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47962-cwe-284-improper-access-control-in--844bed4e</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47962%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20SDK&amp;severity=high&amp;id=68487f521b0bd07c39389c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33071-cwe-416-use-after-free-in-microsoft-e818436e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33071%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=68487f511b0bd07c39389c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47956-cwe-73-external-control-of-file-nam-bb1a5f29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47956%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%20Security%20App&amp;severity=medium&amp;id=68487f521b0bd07c39389c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47955-cwe-269-improper-privilege-manageme-0a974fef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47955%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f521b0bd07c39389c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47953-cwe-641-improper-restriction-of-nam-ab0c8e21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47953%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f521b0bd07c39389c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47162-cwe-122-heap-based-buffer-overflow--ff9e5477</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47162%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f511b0bd07c39389c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47160-cwe-693-protection-mechanism-failur-244ff847</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47160%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33075-cwe-59-improper-link-resolution-bef-2831b4be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33075%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33067-cwe-269-improper-privilege-manageme-f22c25c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33067%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33066-cwe-122-heap-based-buffer-overflow--8f6a139b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33066%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33065-cwe-125-out-of-bounds-read-in-micro-ec252924</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33065%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33064-cwe-122-heap-based-buffer-overflow--f72ba731</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33064%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33063-cwe-125-out-of-bounds-read-in-micro-772b7736</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33063%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68487f511b0bd07c39389bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33062-cwe-125-out-of-bounds-read-in-micro-d21378f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33062%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68487f511b0bd07c39389ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33061-cwe-125-out-of-bounds-read-in-micro-40707cce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33061%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68487f511b0bd07c39389ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33060-cwe-125-out-of-bounds-read-in-micro-f72e747b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33060%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33059-cwe-125-out-of-bounds-read-in-micro-c4f4cff3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33059%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33058-cwe-125-out-of-bounds-read-in-micro-0be95894</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33058%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32724-cwe-400-uncontrolled-resource-consu-45d02d69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32724%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32722-cwe-284-improper-access-control-in--32cf91fc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32722%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32721-cwe-59-improper-link-resolution-bef-f90aa93c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32721%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32720-cwe-125-out-of-bounds-read-in-micro-1be50ba6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32720%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32719-cwe-125-out-of-bounds-read-in-micro-20985908</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32719%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32718-cwe-190-integer-overflow-or-wraparo-a0f8116a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32718%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32716-cwe-125-out-of-bounds-read-in-micro-df601b2d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32716%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32715-cwe-125-out-of-bounds-read-in-micro-02b6f521</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32715%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=medium&amp;id=68487f501b0bd07c39389ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32714-cwe-284-improper-access-control-in--3da545c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32714%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32713-cwe-122-heap-based-buffer-overflow--12f7767e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32713%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32712-cwe-416-use-after-free-in-microsoft-d5a082f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32712%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32710-cwe-416-use-after-free-in-microsoft-ba09dd16</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32710%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=68487f501b0bd07c39389acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29828-cwe-401-missing-release-of-memory-a-245a885e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29828%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68487f501b0bd07c39389aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47957-cwe-416-use-after-free-in-microsoft-17997330</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47957%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f521b0bd07c39389c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5970-cross-site-scripting-in-phpgurukul-r-48875863</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5970%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Restaurant%20Table%20Booking%20System&amp;severity=medium&amp;id=68487f501b0bd07c393899c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43706-cwe-285-improper-authorization-in-e-93e48bb7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43706%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Elastic%20Kibana&amp;severity=high&amp;id=68486f71813f166aeb76f188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-shuts-down-10-malicious-chatgpt-ai-ops-link-a9a1269d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Shuts%20Down%2010%20Malicious%20ChatGPT%20AI%20Ops%20Linked%20to%20China%2C%20Russia%2C%20Iran%20and%20North%20Korea&amp;severity=medium&amp;id=684863a32b23ede18964824f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50568-execute-unauthorized-code-or-comman-94f51e86</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50568%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68487f521b0bd07c39389d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25250-information-disclosure-in-fortinet--aa03031e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25250%3A%20Information%20disclosure%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=68487f531b0bd07c39389ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29184-improper-access-control-in-fortinet-ed6429a5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29184%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=low&amp;id=68487f521b0bd07c39389d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48786-execute-unauthorized-code-or-comman-384087a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48786%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=68487f521b0bd07c39389d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24471-improper-access-control-in-fortinet-d7b66954</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24471%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68487f531b0bd07c39389dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22254-escalation-of-privilege-in-fortinet-b56b283e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22254%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68487f4f1b0bd07c393897d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22256-improper-access-control-in-fortinet-9650eb5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22256%3A%20Improper%20access%20control%20in%20Fortinet%20FortiPAM&amp;severity=medium&amp;id=68487f521b0bd07c39389d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32119-execute-unauthorized-code-or-comman-58d67e57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32119%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=68487f521b0bd07c39389d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31104-execute-unauthorized-code-or-comman-0576ec5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31104%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiADC&amp;severity=high&amp;id=68487f4f1b0bd07c393897e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22251-improper-access-control-in-fortinet-21e2c2bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22251%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=68487f521b0bd07c39389d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50562-improper-access-control-in-fortinet-6ddb53ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50562%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68487f521b0bd07c39389d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54019-improper-access-control-in-fortinet-db5df984</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54019%3A%20Improper%20access%20control%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=68487f521b0bd07c39389d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45329-improper-access-control-in-fortinet-9c418c43</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45329%3A%20Improper%20access%20control%20in%20Fortinet%20FortiPortal&amp;severity=low&amp;id=68487f521b0bd07c39389d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feedback-new-secure-doc-sharing-platform-getsafedo-9528afce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feedback%20-%20new%20secure%20doc%20sharing%20platform%20GetSafeDocs.com&amp;severity=medium&amp;id=6848601d2b23ede18963d450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5969-stack-based-buffer-overflow-in-d-lin-aed70e38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5969%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-632&amp;severity=high&amp;id=68487f531b0bd07c39389de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33112-cwe-23-relative-path-traversal-in-i-1299fbae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33112%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20IBM%20AIX&amp;severity=high&amp;id=68487f501b0bd07c39389967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47108-out-of-bounds-write-cwe-787-in-adob-53045b94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47108%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=68487f531b0bd07c39389dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30321-null-pointer-dereference-cwe-476-in-2f1700c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30321%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=68487f531b0bd07c39389e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43589-use-after-free-cwe-416-in-adobe-ind-20c9ca4d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43589%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=68487f531b0bd07c39389e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30317-heap-based-buffer-overflow-cwe-122--2f1f5377</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30317%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=68487f531b0bd07c39389dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43558-out-of-bounds-write-cwe-787-in-adob-4fa1353a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43558%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=68487f531b0bd07c39389e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47105-out-of-bounds-read-cwe-125-in-adobe-9bb8781b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47105%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=68487f531b0bd07c39389e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47104-out-of-bounds-read-cwe-125-in-adobe-52866d94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47104%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=68487f531b0bd07c39389e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43593-out-of-bounds-write-cwe-787-in-adob-44437c91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43593%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=68487f531b0bd07c39389e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47106-use-after-free-cwe-416-in-adobe-ind-39ca3f18</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47106%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=68487f531b0bd07c39389e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43590-out-of-bounds-write-cwe-787-in-adob-e69fd6b6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43590%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=68487f531b0bd07c39389e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20599-cwe-1262-register-interface-allows--8615c8fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20599%3A%20CWE-1262%20%20Register%20Interface%20Allows%20Software%20Access%20to%20Sensitive%20Data%20or%20Security%20Settings%20in%20AMD%20AMD%20EPYC%E2%84%A2%207002%20Series%20Processors&amp;severity=high&amp;id=68487f531b0bd07c39389df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27206-improper-access-control-cwe-284-in--002b1dd4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27206%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68487f4f1b0bd07c393898d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43586-improper-access-control-cwe-284-in--46b6dca2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43586%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68487f4f1b0bd07c393898df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47110-cross-site-scripting-stored-xss-cwe-ba70161e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47110%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68487f4f1b0bd07c393898e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27207-improper-access-control-cwe-284-in--439d9717</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27207%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68487f4f1b0bd07c393898d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43585-improper-authorization-cwe-285-in-a-f82aef66</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43585%3A%20Improper%20Authorization%20(CWE-285)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68487f4f1b0bd07c393898dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4678-cwe-77-improper-neutralization-of-sp-f29dc8b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4678%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Pandora%20FMS%20Pandora%20ITSM&amp;severity=high&amp;id=68487f501b0bd07c39389961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4653-cwe-77-improper-neutralization-of-sp-1d8e6121</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4653%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Pandora%20FMS%20Pandora%20ITSM&amp;severity=high&amp;id=68487f501b0bd07c3938995e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49143-cwe-200-exposure-of-sensitive-infor-2d21b691</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49143%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nautobot%20nautobot&amp;severity=medium&amp;id=68487f4f1b0bd07c393898c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49142-cwe-1336-improper-neutralization-of-3b07fb92</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49142%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20nautobot%20nautobot&amp;severity=medium&amp;id=68487f501b0bd07c39389a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48937-cwe-290-authentication-bypass-by-sp-1af6801a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48937%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20matrix-org%20matrix-rust-sdk&amp;severity=medium&amp;id=68487f531b0bd07c39389f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48879-cwe-140-improper-neutralization-of--5043d553</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48879%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20OctoPrint%20OctoPrint&amp;severity=medium&amp;id=68487f531b0bd07c39389f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48067-cwe-73-external-control-of-file-nam-82f31f4f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48067%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20OctoPrint%20OctoPrint&amp;severity=medium&amp;id=68487f531b0bd07c39389fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40591-cwe-602-client-side-enforcement-of--0628c552</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40591%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=68487f531b0bd07c39389f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40585-cwe-276-incorrect-default-permissio-d160481e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40585%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Siemens%20Energy%20Services&amp;severity=critical&amp;id=68487f501b0bd07c39389a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40569-cwe-362-concurrent-execution-using--80090a54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40569%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=medium&amp;id=68487f501b0bd07c39389a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40568-cwe-863-incorrect-authorization-in--0c7e1f33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40568%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=medium&amp;id=68487f501b0bd07c39389a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40567-cwe-863-incorrect-authorization-in--ef5509e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40567%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=medium&amp;id=68487f501b0bd07c39389a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41797-cwe-269-improper-privilege-manageme-b65a6e10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41797%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=medium&amp;id=68487f501b0bd07c39389a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30220-cwe-611-improper-restriction-of-xml-b0d12b2f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30220%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20geoserver%20geoserver&amp;severity=critical&amp;id=68487f501b0bd07c39389a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37100-vulnerability-in-hewlett-packard-en-35a42066</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37100%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=high&amp;id=68487f551b0bd07c3938a25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30145-cwe-835-loop-with-unreachable-exit--6da1f736</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30145%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20geoserver%20geoserver&amp;severity=high&amp;id=68487f551b0bd07c3938a253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27505-cwe-862-missing-authorization-in-ge-16713e87</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27505%3A%20CWE-862%3A%20Missing%20Authorization%20in%20geoserver%20geoserver&amp;severity=medium&amp;id=68487f551b0bd07c3938a3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5335-cwe-426-untrusted-search-path-in-aut-7c3f81cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5335%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Autodesk%20Installer&amp;severity=high&amp;id=68487f551b0bd07c3938a3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40625-cwe-918-server-side-request-forgery-baa062ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40625%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20geoserver%20geoserver&amp;severity=medium&amp;id=68487f551b0bd07c3938a3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38524-cwe-200-exposure-of-sensitive-infor-454cb9ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38524%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20geoserver%20geoserver&amp;severity=medium&amp;id=68487f551b0bd07c3938a368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26395-cwe-79-improper-neutralization-of-i-1a78968c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26395%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=high&amp;id=68487f551b0bd07c3938a3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26394-cwe-601-url-redirection-to-untruste-ce5d88bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26394%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=68487f551b0bd07c3938a3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5353-cwe-321-use-of-hard-coded-cryptograp-85e26925</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5353%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Ivanti%20Workspace%20Control&amp;severity=high&amp;id=68487f561b0bd07c3938a3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22463-cwe-321-use-of-hard-coded-cryptogra-dcf4cbe8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22463%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Ivanti%20Workspace%20Control&amp;severity=high&amp;id=68487f551b0bd07c3938a36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22455-cwe-321-use-of-hard-coded-cryptogra-7ba66732</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22455%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Ivanti%20Workspace%20Control&amp;severity=high&amp;id=68487f551b0bd07c3938a365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34711-cwe-200-exposure-of-sensitive-infor-8fd70ca8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34711%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20geoserver%20geoserver&amp;severity=critical&amp;id=68487f551b0bd07c3938a361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29198-cwe-918-server-side-request-forgery-13ec8672</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29198%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20geoserver%20geoserver&amp;severity=high&amp;id=68487f561b0bd07c3938a482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49454-cwe-98-improper-control-of-filename-de986030</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49454%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20TinySalt&amp;severity=null&amp;id=68487f591b0bd07c3938a9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49455-cwe-502-deserialization-of-untruste-13826ad2</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49455%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ClickandPledge%20WordPress-WPJobBoard&amp;severity=null&amp;id=68487f581b0bd07c3938a8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49507-cwe-502-deserialization-of-untruste-fc6592d1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20LoftOcean%20CozyStay&amp;severity=null&amp;id=68487f581b0bd07c3938a8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49509-cwe-862-missing-authorization-in-ro-eb81ed0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49509%3A%20Missing%20Authorization%20in%20Roland%20Beaussant%20Audio%20Editor%20%26amp%3B%20Recorder&amp;severity=null&amp;id=68487f581b0bd07c3938a8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49510-cwe-352-cross-site-request-forgery--8e873d17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49510%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPFactory%20Min%20Max%20Step%20Quantity%20Limits%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68487f591b0bd07c3938a9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49511-cwe-352-cross-site-request-forgery--1c97530b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49511%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20uxper%20Civi%20Framework&amp;severity=null&amp;id=68487f571b0bd07c3938a70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rare-werewolf-apt-uses-legitimate-software-in-atta-d0325b84</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rare%20Werewolf%20APT%20Uses%20Legitimate%20Software%20in%20Attacks%20on%20Hundreds%20of%20Russian%20Enterprises&amp;severity=high&amp;id=684820eb2b23ede189578180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-found-flaw-to-discover-phone-numbers-li-b37e1c47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Found%20Flaw%20to%20Discover%20Phone%20Numbers%20Linked%20to%20Any%20Google%20Account&amp;severity=high&amp;id=684820eb2b23ede189578184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43699-cwe-281-improper-preservation-of-pe-2222cbb3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43699%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Salesforce%20OmniStudio&amp;severity=medium&amp;id=68487f551b0bd07c3938a2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43698-cwe-281-improper-preservation-of-pe-e3cb94c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43698%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Salesforce%20OmniStudio&amp;severity=critical&amp;id=68487f591b0bd07c3938aa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43697-cwe-281-improper-preservation-of-pe-f24d07f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43697%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Salesforce%20OmniStudio&amp;severity=high&amp;id=68487f591b0bd07c3938aa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4577-cwe-79-improper-neutralization-of-in-fd7f69da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Smash%20Balloon%20Social%20Post%20Feed%20%E2%80%93%20Simple%20Social%20Feeds%20for%20WordPress&amp;severity=medium&amp;id=68487f571b0bd07c3938a690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2918-cwe-79-improper-neutralization-of-in-1e331359</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2918%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimateblocks%20Ultimate%20Blocks%20%E2%80%93%2025%2B%20Gutenberg%20Blocks%20for%20Block%20Editor&amp;severity=medium&amp;id=68487f561b0bd07c3938a566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4774-cwe-79-improper-neutralization-of-in-a41ac77d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4774%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor%20%E2%80%93%20Powerful%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=68487f561b0bd07c3938a577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43701-cwe-281-improper-preservation-of-pe-ce038989</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43701%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Salesforce%20OmniStudio&amp;severity=high&amp;id=68487f551b0bd07c3938a340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43700-cwe-281-improper-preservation-of-pe-c56504df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43700%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Salesforce%20OmniStudio&amp;severity=high&amp;id=68487f551b0bd07c3938a2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ispconfig-authenticated-remote-code-execution--d8aba9d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ISPConfig%20Authenticated%20Remote%20Code%20Execution%20Vulnerability&amp;severity=medium&amp;id=684811e717e89880603e43bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-41-threat-intelligence-report-and-malware-anal-1f942631</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%2041%3A%20Threat%20Intelligence%20Report%20and%20Malware%20Analysis&amp;severity=medium&amp;id=684811df17e89880603e42e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41657-cwe-207-observable-behavioral-discr-864b717e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41657%3A%20CWE-207%20Observable%20Behavioral%20Discrepancy%20With%20Equivalent%20Products%20in%20Auma%20AC1.2&amp;severity=medium&amp;id=68487f561b0bd07c3938a4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13090-cwe-250-execution-with-unnecessary--fb45f612</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13090%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=68487f561b0bd07c3938a48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13089-cwe-78-improper-neutralization-of-s-64f7d554</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13089%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=68487f561b0bd07c3938a487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40662-cwe-200-exposure-of-sensitive-infor-238ac5c3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40662%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=medium&amp;id=68487f561b0bd07c3938a499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40661-cwe-639-authorization-bypass-throug-dba179fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40661%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=medium&amp;id=68487f561b0bd07c3938a47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40660-cwe-639-authorization-bypass-throug-54b15ac2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40660%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=medium&amp;id=68487f561b0bd07c3938a571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40659-cwe-639-authorization-bypass-throug-fcb8478f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40659%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=medium&amp;id=68487f561b0bd07c3938a56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40658-cwe-639-authorization-bypass-throug-58ee8a5a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40658%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=medium&amp;id=68487f591b0bd07c3938a9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40657-cwe-89-improper-neutralization-of-s-49bc95a6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40657%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=critical&amp;id=68487f591b0bd07c3938aa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40656-cwe-89-improper-neutralization-of-s-13e1c97f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40656%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=critical&amp;id=68487f591b0bd07c3938a9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40655-cwe-89-improper-neutralization-of-s-39523634</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40655%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=critical&amp;id=68487f561b0bd07c3938a4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40654-cwe-89-improper-neutralization-of-s-c72ec907</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40654%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=critical&amp;id=68487f561b0bd07c3938a4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-open-source-secure-code-f6db112b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Open%20Source%20%E2%89%A0%20Secure%20Code&amp;severity=medium&amp;id=6848041c5a4bad0d1cbe1de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stolen-ticketmaster-data-from-snowflake-attacks-br-f447fad8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stolen%20Ticketmaster%20data%20from%20Snowflake%20attacks%20briefly%20for%20sale%20again&amp;severity=high&amp;id=684800cac220e718de2409f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-threat-actor-targeted-70-orgs-worldwi-8fd188c8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20threat%20actor%20targeted%20%2B70%20orgs%20worldwide%2C%20SentinelOne%20warns&amp;severity=medium&amp;id=684800cac220e718de2409fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-purelogs-traffic-with-caploader-8a3564cf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20PureLogs%20traffic%20with%20CapLoader&amp;severity=medium&amp;id=684811df17e89880603e42dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4681-cwe-269-improper-privilege-managemen-9816e4a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4681%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=high&amp;id=68487f561b0bd07c3938a502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3117-cwe-79-improper-neutralization-of-in-413d4112</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=medium&amp;id=68487f561b0bd07c3938a493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4680-cwe-20-improper-input-validation-in--fa99b155</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4680%3A%20CWE-20%20Improper%20Input%20Validation%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=high&amp;id=68487f561b0bd07c3938a4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3116-cwe-20-improper-input-validation-in--b8d6f328</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3116%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=high&amp;id=68487f561b0bd07c3938a490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3905-cwe-79-improper-neutralization-of-in-0c81f255</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3905%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=medium&amp;id=68487f561b0bd07c3938a496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3112-cwe-400-uncontrolled-resource-consum-5a6c0e90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3112%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=high&amp;id=68487f561b0bd07c3938a48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3899-cwe-79-improper-neutralization-of-in-981781b0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=medium&amp;id=68487f561b0bd07c3938a47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3898-cwe-20-improper-input-validation-in--d29cd74b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3898%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=high&amp;id=68487f561b0bd07c3938a411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5743-cwe-78-improper-neutralization-of-sp-9e81b7f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5743%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Schneider%20Electric%20EVLink%20WallBox&amp;severity=high&amp;id=68487f591b0bd07c3938aa42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5742-cwe-79-improper-neutralization-of-in-9c6b41e7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schneider%20Electric%20EVLink%20WallBox&amp;severity=medium&amp;id=68487f591b0bd07c3938a9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5741-cwe-22-improper-limitation-of-a-path-ec109ce7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5741%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20EVLink%20WallBox&amp;severity=medium&amp;id=68487f591b0bd07c3938a9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5740-cwe-22-improper-limitation-of-a-path-8967bd20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5740%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20EVLink%20WallBox&amp;severity=high&amp;id=68487f591b0bd07c3938a9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27817-arbitrary-file-read-and-ssrf-vulner-400f8e5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27817%3A%20Arbitrary%20file%20read%20and%20SSRF%20vulnerability%20in%20Apache%20Software%20Foundation%20Apache%20Kafka%20Client&amp;severity=high&amp;id=68487f551b0bd07c3938a248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27819-cwe-502-deserialization-of-untruste-fad73d43</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27819%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=high&amp;id=68487f551b0bd07c3938a250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27818-cwe-502-deserialization-of-untruste-caaba881</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27818%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=high&amp;id=68487f551b0bd07c3938a24c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5945-3822317b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5945&amp;severity=low&amp;id=6847ebafc220e718de1ff0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1041-cwe-20-improper-input-validation-in--0bca81d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1041%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Avaya%20Avaya%20Call%20Management%20System&amp;severity=critical&amp;id=68487f591b0bd07c3938aaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4954-cwe-434-unrestricted-upload-of-file--095a54f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4954%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Axle%20Demo%20Importer&amp;severity=low&amp;id=68487f591b0bd07c3938aaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4840-cwe-89-sql-injection-in-unknown-inpr-48413201</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4840%3A%20CWE-89%20SQL%20Injection%20in%20inprosysmedia-likes-dislikes-post&amp;severity=high&amp;id=68487f591b0bd07c3938aaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/danabot-c2-server-memory-leak-bug-c39da384</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DanaBot%20C2%20Server%20Memory%20Leak%20Bug&amp;severity=medium&amp;id=6847f650c220e718de21fe36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5952-os-command-injection-in-zendto-59055165</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5952%3A%20OS%20Command%20Injection%20in%20Zend.To&amp;severity=medium&amp;id=68487f551b0bd07c3938a35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5935-denial-of-service-in-open5gs-b5032752</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5935%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=68487f561b0bd07c3938a408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3076-cwe-79-improper-neutralization-of-in-a15cd1b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20https%3A%2F%2Felementor.com%2F%20Elementor%20Website%20Builder%20Pro&amp;severity=medium&amp;id=68487f561b0bd07c3938a400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4601-cwe-269-improper-privilege-managemen-336c62aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4601%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20InspiryThemes%20RH%20-%20Real%20Estate%20WordPress%20Theme&amp;severity=high&amp;id=68487f561b0bd07c3938a4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4387-cwe-434-unrestricted-upload-of-file--ae3e1e5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4387%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Tyche%20Softwares%20Abandoned%20Cart%20Pro%20for%20WooCommerce&amp;severity=high&amp;id=68487f561b0bd07c3938a4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5925-cwe-352-cross-site-request-forgery-c-f54d7b87</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5925%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20steph%20Bunny%E2%80%99s%20Print%20CSS&amp;severity=medium&amp;id=68487f591b0bd07c3938aa54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5934-stack-based-buffer-overflow-in-netge-9048a9d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5934%3A%20Stack-based%20Buffer%20Overflow%20in%20Netgear%20EX3700&amp;severity=high&amp;id=68487f591b0bd07c3938aa58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5913-sql-injection-in-phpgurukul-vehicle--61a2b2c6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5913%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Record%20Management%20System&amp;severity=medium&amp;id=68487f591b0bd07c3938aa4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5912-stack-based-buffer-overflow-in-d-lin-2929e753</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5912%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-632&amp;severity=high&amp;id=68487f591b0bd07c3938aa45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5911-buffer-overflow-in-totolink-ex1200t-376ce93f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5911%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68487f591b0bd07c3938a9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5910-buffer-overflow-in-totolink-ex1200t-065ecc3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5910%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68487f551b0bd07c3938a354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5909-buffer-overflow-in-totolink-ex1200t-2f40b2fd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5909%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68487f551b0bd07c3938a34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5908-buffer-overflow-in-totolink-ex1200t-67b12a48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5908%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68487f541b0bd07c3938a19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5907-buffer-overflow-in-totolink-ex1200t-008d6861</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5907%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68487f541b0bd07c3938a196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5906-missing-authentication-in-code-proje-b9aceb58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5906%3A%20Missing%20Authentication%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=68487f551b0bd07c3938a346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42998-cwe-346-origin-validation-error-in--49f08481</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42998%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20SAP_SE%20SAP%20Business%20One%20Integration%20Framework&amp;severity=medium&amp;id=68487f551b0bd07c3938a2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42996-cwe-590-free-of-memory-not-on-the-h-067783dd</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42996%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20SAP_SE%20SAP%20MDM%20Server&amp;severity=medium&amp;id=68487f551b0bd07c3938a2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42995-cwe-590-free-of-memory-not-on-the-h-9ed8e7e6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42995%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20SAP_SE%20SAP%20MDM%20Server&amp;severity=high&amp;id=68487f551b0bd07c3938a2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42994-cwe-590-free-of-memory-not-on-the-h-779683b7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42994%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20SAP_SE%20SAP%20MDM%20Server&amp;severity=high&amp;id=68487f551b0bd07c3938a2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42993-cwe-862-missing-authorization-in-sa-c376969c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42993%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Enterprise%20Event%20Enablement)&amp;severity=medium&amp;id=68487f551b0bd07c3938a2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42991-cwe-862-missing-authorization-in-sa-9cfc778a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42991%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Bank%20Account%20Application)&amp;severity=medium&amp;id=68487f551b0bd07c3938a2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42990-cwe-79-improper-neutralization-of-i-033094dc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42990%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAPUI5%20applications&amp;severity=low&amp;id=68487f551b0bd07c3938a2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42989-cwe-862-missing-authorization-in-sa-08edf1f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42989%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=critical&amp;id=68487f541b0bd07c3938a037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42988-cwe-918-server-side-request-forgery-e2d4ef80</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42988%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20in%20SAP_SE%20SAP%20Business%20Objects%20Business%20Intelligence%20Platform&amp;severity=low&amp;id=68487f541b0bd07c3938a033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42987-cwe-862-missing-authorization-in-sa-35a0fdc7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42987%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Manage%20Processing%20Rules%20-%20For%20Bank%20Statement)&amp;severity=medium&amp;id=68487f551b0bd07c3938a2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42984-cwe-862-missing-authorization-in-sa-45604d3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42984%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Manage%20Central%20Purchase%20Contract%20application)&amp;severity=medium&amp;id=68487f551b0bd07c3938a262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42983-cwe-862-missing-authorization-in-sa-0181a440</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42983%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Warehouse%20and%20SAP%20Plug-In%20Basis&amp;severity=high&amp;id=68487f551b0bd07c3938a25e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42982-cwe-862-missing-authorization-in-sa-adbd0b76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42982%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20GRC%20(AC%20Plugin)&amp;severity=high&amp;id=68487f541b0bd07c3938a02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42977-cwe-22-improper-limitation-of-a-pat-bca96640</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42977%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20NetWeaver%20Visual%20Composer&amp;severity=high&amp;id=68487f541b0bd07c3938a02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31325-cwe-79-improper-neutralization-of-i-3cfc733e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31325%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20(ABAP%20Keyword%20Documentation)&amp;severity=medium&amp;id=68487f541b0bd07c3938a027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23192-cwe-79-improper-neutralization-of-i-780cfa39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23192%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20(BI%20Workspace)&amp;severity=high&amp;id=68487f531b0bd07c39389fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5905-buffer-overflow-in-totolink-t10-3c78f645</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5905%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68487f541b0bd07c3938a18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5904-buffer-overflow-in-totolink-t10-9b43b154</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5904%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68487f541b0bd07c3938a188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-10-3e890b0b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-10&amp;severity=medium&amp;id=6848c9f93cd93dcca8313cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46612-na-in-na-210d1627</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46612%3A%20n%2Fa&amp;severity=high&amp;id=68487f561b0bd07c3938a405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44044-na-in-na-d197b6af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44044%3A%20n%2Fa&amp;severity=high&amp;id=68487f541b0bd07c3938a1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44043-na-in-na-1842188a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44043%3A%20n%2Fa&amp;severity=medium&amp;id=68487f541b0bd07c3938a1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57189-na-in-na-24842ae0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57189%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f521b0bd07c39389d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57186-na-in-na-324b926d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57186%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f521b0bd07c39389cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57190-na-in-na-d8a5112f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57190%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f521b0bd07c39389c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37396-na-in-na-dd7d2d09</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37396%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f501b0bd07c393899d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37395-na-in-na-c8fdfc7d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37395%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f501b0bd07c393899d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37394-na-in-na-4a9fcf43</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37394%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f501b0bd07c393899ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0036-cwe-682-incorrect-calculation-in-amd-3a07c4ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0036%3A%20CWE-682%20Incorrect%20Calculation%20in%20AMD%20Platform%20Loader%20and%20Manager%20(PLM)&amp;severity=low&amp;id=68487f531b0bd07c39389fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0037-cwe-20-improper-input-validation-in--b5233f3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0037%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMD%20Platform%20Loader%20and%20Manager%20(PLM)&amp;severity=medium&amp;id=68487f531b0bd07c39389fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5903-buffer-overflow-in-totolink-t10-7441c3a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5903%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68487f541b0bd07c3938a181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5902-buffer-overflow-in-totolink-t10-b7ec4625</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5902%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68487f541b0bd07c3938a0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30515-cwe-35-in-cyberdata-011209-sip-emer-22f99516</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30515%3A%20CWE-35%20in%20CyberData%20011209%20SIP%20Emergency%20Intercom&amp;severity=critical&amp;id=68487f541b0bd07c3938a024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5901-buffer-overflow-in-totolink-t10-4807d60a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5901%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68487f541b0bd07c3938a0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30183-cwe-522-in-cyberdata-011209-sip-eme-4cda44e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30183%3A%20CWE-522%20in%20CyberData%20011209%20SIP%20Emergency%20Intercom&amp;severity=high&amp;id=68487f531b0bd07c39389fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30507-cwe-89-in-cyberdata-011209-sip-emer-07253d59</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30507%3A%20CWE-89%20in%20CyberData%20011209%20SIP%20Emergency%20Intercom&amp;severity=medium&amp;id=68487f541b0bd07c3938a021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26468-cwe-306-in-cyberdata-011209-sip-eme-584acec2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26468%3A%20CWE-306%20in%20CyberData%20011209%20SIP%20Emergency%20Intercom&amp;severity=high&amp;id=68487f531b0bd07c39389fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30184-cwe-288-in-cyberdata-011209-sip-eme-95fd4743</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30184%3A%20CWE-288%20in%20CyberData%20011209%20SIP%20Emergency%20Intercom&amp;severity=critical&amp;id=68487f531b0bd07c39389fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5900-cross-site-request-forgery-in-tenda--0128934f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5900%3A%20Cross-Site%20Request%20Forgery%20in%20Tenda%20AC9&amp;severity=medium&amp;id=68487f541b0bd07c3938a0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5899-free-of-memory-not-on-the-heap-in-gn-8149f13f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5899%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20GNU%20PSPP&amp;severity=medium&amp;id=68487f541b0bd07c3938a0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5898-out-of-bounds-write-in-gnu-pspp-1b34f316</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5898%3A%20Out-of-bounds%20Write%20in%20GNU%20PSPP&amp;severity=medium&amp;id=68487f541b0bd07c3938a0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49140-cwe-770-allocation-of-resources-wit-47f473d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49140%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20pion%20interceptor&amp;severity=high&amp;id=68487f591b0bd07c3938aaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49141-cwe-78-improper-neutralization-of-s-9e242fe0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49141%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20haxtheweb%20issues&amp;severity=high&amp;id=68487f541b0bd07c3938a0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49139-cwe-1021-improper-restriction-of-re-8c4858d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49139%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=68487f541b0bd07c3938a0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49138-cwe-22-improper-limitation-of-a-pat-c164c450</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49138%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=68487f541b0bd07c3938a042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5897-inefficient-regular-expression-compl-79594e7e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5897%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20vuejs%20vue-cli&amp;severity=medium&amp;id=68487f541b0bd07c3938a0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49137-cwe-79-improper-neutralization-of-i-f2691373</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49137%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20haxtheweb%20issues&amp;severity=high&amp;id=68487f541b0bd07c3938a03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5896-inefficient-regular-expression-compl-80338f19</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5896%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20tarojs%20taro&amp;severity=medium&amp;id=68487f541b0bd07c3938a0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49004-cwe-290-authentication-bypass-by-sp-3502988d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49004%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20caido%20caido&amp;severity=high&amp;id=68487f541b0bd07c3938a03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sensata-technologies-says-personal-data-stolen-by--44ff364a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sensata%20Technologies%20says%20personal%20data%20stolen%20by%20ransomware%20gang&amp;severity=high&amp;id=684742a41164aab0bfda195a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5895-inefficient-regular-expression-compl-f7a47b10</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5895%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Metabase&amp;severity=medium&amp;id=68487f541b0bd07c3938a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5914-double-free-in-red-hat-red-hat-enter-321b0090</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5914%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=high&amp;id=68487f541b0bd07c3938a1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5918-out-of-bounds-read-in-red-hat-red-ha-75903fe6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5918%3A%20Out-of-bounds%20Read&amp;severity=low&amp;id=68487f561b0bd07c3938a58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5917-out-of-bounds-write-in-red-hat-red-h-a5860ddd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5917%3A%20Out-of-bounds%20Write&amp;severity=low&amp;id=68487f561b0bd07c3938a587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5916-integer-overflow-or-wraparound-in-re-081668f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5916%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=low&amp;id=68487f561b0bd07c3938a581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5915-heap-based-buffer-overflow-in-red-ha-4f828323</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5915%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=68487f561b0bd07c3938a57b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bruteforcing-the-phone-number-of-any-google-user-98b0dc9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bruteforcing%20the%20phone%20number%20of%20any%20Google%20user&amp;severity=medium&amp;id=68473bac1164aab0bf21a395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5892-inefficient-regular-expression-compl-7aafab82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5892%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20RocketChat&amp;severity=medium&amp;id=68487f5a1b0bd07c3938ab87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-backdoors-in-npm-packages-let-attackers-wip-89e16c1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20Backdoors%20in%20npm%20Packages%20Let%20Attackers%20Wipe%20Entire%20Systems&amp;severity=medium&amp;id=68473654ce8a0143f8308d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-carries-out-attacks-with-data-theft-and-crypto-a346b054</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20carries%20out%20attacks%20with%20data%20theft%20and%20crypto%20miner%20deployment&amp;severity=medium&amp;id=684738f31164aab0bf20b611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5891-inefficient-regular-expression-compl-6664148f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5891%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Unitech%20pm2&amp;severity=medium&amp;id=68487f5a1b0bd07c3938b48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5890-inefficient-regular-expression-compl-eb2f9317</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5890%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20actions%20toolkit&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5889-inefficient-regular-expression-compl-924f8bf1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5889%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20juliangruber%20brace-expansion&amp;severity=low&amp;id=68487f5b1b0bd07c3938c192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47081-cwe-522-insufficiently-protected-cr-16e1c087</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47081%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20psf%20requests&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/limited-canva-creator-data-exposed-via-russia-ai-c-50d442cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Limited%20Canva%20Creator%20Data%20Exposed%20Via%20Russia%20AI%20Chatbot%20Database&amp;severity=medium&amp;id=68473654ce8a0143f8308d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5888-cross-site-request-forgery-in-jsnjfz-abcb02b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5888%3A%20Cross-Site%20Request%20Forgery%20in%20jsnjfz%20WebStack-Guns&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49653-cwe-200-exposure-of-sensitive-infor-2737a8a4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49653%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Lablup%20BackendAI&amp;severity=high&amp;id=68487f5b1b0bd07c3938c1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49652-cwe-306-missing-authentication-for--e3142da9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49652%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Lablup%20BackendAI&amp;severity=critical&amp;id=68487f5b1b0bd07c3938bd59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49651-cwe-862-missing-authorization-in-la-25165be7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49651%3A%20CWE-862%20Missing%20Authorization%20in%20Lablup%20BackendAI&amp;severity=high&amp;id=68487f5b1b0bd07c3938bd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5887-cross-site-scripting-in-jsnjfz-webst-bcba822e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5887%3A%20Cross%20Site%20Scripting%20in%20jsnjfz%20WebStack-Guns&amp;severity=medium&amp;id=68487f5a1b0bd07c3938b482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49136-cwe-1336-improper-neutralization-of-f26efd43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49136%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20knadh%20listmonk&amp;severity=critical&amp;id=68487f591b0bd07c3938a9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-linked-hackers-targeted-70-global-organiza-6b838e19</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese-Linked%20Hackers%20Targeted%2070%2B%20Global%20Organizations%2C%20SentinelLABS&amp;severity=medium&amp;id=68473654ce8a0143f8308d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grocery-wholesale-giant-united-natural-foods-hit-b-0a61ef99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grocery%20wholesale%20giant%20United%20Natural%20Foods%20hit%20by%20cyberattack&amp;severity=high&amp;id=68473654ce8a0143f8308d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5886-cross-site-scripting-in-emlog-507f5180</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5886%3A%20Cross%20Site%20Scripting%20in%20Emlog&amp;severity=medium&amp;id=68487f591b0bd07c3938a9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25999-cwe-98-improper-control-of-filename-32927576</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25999%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20BodyCenter%20-%20Gym%2C%20Fitness%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=68487f571b0bd07c3938a70f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26005-cwe-98-improper-control-of-filename-bb0e2a6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26005%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Fitrush&amp;severity=high&amp;id=68487f571b0bd07c3938a712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23974-cwe-266-incorrect-privilege-assignm-836b7670</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23974%3A%20Incorrect%20Privilege%20Assignment%20in%20ifkooo%20One-Login&amp;severity=null&amp;id=68487f581b0bd07c3938a791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24767-cwe-89-improper-neutralization-of-s-41e9d6cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24767%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20facturaone%20TicketBAI%20Facturas%20para%20WooCommerce&amp;severity=null&amp;id=68487f581b0bd07c3938a7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24768-cwe-98-improper-control-of-filename-648e87a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24768%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20Nitan&amp;severity=null&amp;id=68487f581b0bd07c3938a91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24770-cwe-98-improper-control-of-filename-fd00dcd0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24770%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20CraftXtore&amp;severity=null&amp;id=68487f581b0bd07c3938a801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26592-cwe-98-improper-control-of-filename-34c5e7db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26592%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Lab&amp;severity=null&amp;id=68487f581b0bd07c3938a804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27362-cwe-98-improper-control-of-filename-fe5a43e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27362%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Petito&amp;severity=null&amp;id=68487f581b0bd07c3938a807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28888-cwe-98-improper-control-of-filename-9671b587</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28888%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20GiftXtore&amp;severity=null&amp;id=68487f5b1b0bd07c3938c8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28944-cwe-98-improper-control-of-filename-3453bd19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28944%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20Avaz&amp;severity=null&amp;id=68487f5b1b0bd07c3938c8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28945-cwe-98-improper-control-of-filename-29cab1f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28945%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20Valen%20-%20Sport%2C%20Fashion%20WooCommerce%20WordPress%20Theme&amp;severity=null&amp;id=68487f5b1b0bd07c3938c8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28992-cwe-98-improper-control-of-filename-00f23fef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20SNS%20Anton&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31019-cwe-288-authentication-bypass-using-12b02dc9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31019%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20miniOrange%20Password%20Policy%20Manager&amp;severity=null&amp;id=68487f571b0bd07c3938a69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31022-cwe-288-authentication-bypass-using-6a0bc5a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31022%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20PayU%20PayU%20India&amp;severity=critical&amp;id=68487f571b0bd07c3938a69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31039-cwe-611-improper-restriction-of-xml-74b7b6e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31039%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20pixelgrade%20Category%20Icon&amp;severity=null&amp;id=68487f571b0bd07c3938a6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31045-cwe-497-exposure-of-sensitive-syste-59642834</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31045%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20elfsight%20elfsight%20Contact%20Form%20widget&amp;severity=null&amp;id=68487f571b0bd07c3938a6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31050-cwe-22-improper-limitation-of-a-pat-822e7d04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31050%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20appthaplugins%20Apptha%20Slider%20Gallery&amp;severity=null&amp;id=68487f571b0bd07c3938a6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31052-cwe-502-deserialization-of-untruste-3fc8bef8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31052%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20The%20Fashion%20-%20Model%20Agency%20One%20Page%20Beauty%20Theme&amp;severity=null&amp;id=68487f571b0bd07c3938a6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31057-cwe-79-improper-neutralization-of-i-54383725</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player&amp;severity=null&amp;id=68487f571b0bd07c3938a6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31058-cwe-79-improper-neutralization-of-i-ff3bcfce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Revolution%20Video%20Player&amp;severity=null&amp;id=68487f571b0bd07c3938a700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31059-cwe-89-improper-neutralization-of-s-9c79e16d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31059%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20woobewoo%20WBW%20Product%20Table%20PRO&amp;severity=null&amp;id=68487f571b0bd07c3938a703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31061-cwe-79-improper-neutralization-of-i-f7ea75a7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31061%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redqteam%20Wishlist&amp;severity=null&amp;id=68487f581b0bd07c3938a80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31396-cwe-502-deserialization-of-untruste-3980df49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31396%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20FLAP%20-%20Business%20WordPress%20Theme&amp;severity=critical&amp;id=68487f5c1b0bd07c3938cd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31398-cwe-502-deserialization-of-untruste-e777e4e5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31398%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20PIMP%20-%20Creative%20MultiPurpose&amp;severity=critical&amp;id=68487f5c1b0bd07c3938cd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31424-cwe-89-improper-neutralization-of-s-ff13678b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31424%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20WP%20Lead%20Capturing%20Pages&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31426-cwe-79-improper-neutralization-of-i-984d9b05</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31426%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Sticky%20Radio%20Player&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31429-cwe-502-deserialization-of-untruste-f8fe1c34</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31429%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20PressGrid%20-%20Frontend%20Publish%20Reaction%20%26%20Multimedia%20Theme&amp;severity=critical&amp;id=68487f5c1b0bd07c3938cd35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31635-cwe-22-improper-limitation-of-a-pat-e247aa8e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31635%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LambertGroup%20CLEVER&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31638-cwe-79-improper-neutralization-of-i-dacc437f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31638%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeton%20Spare&amp;severity=high&amp;id=68487f581b0bd07c3938a80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31917-cwe-79-improper-neutralization-of-i-00b4aca3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player&amp;severity=null&amp;id=68487f581b0bd07c3938a811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31920-cwe-89-improper-neutralization-of-s-9380c8f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31920%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AmentoTech%20WP%20Guppy&amp;severity=null&amp;id=68487f581b0bd07c3938a814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31925-cwe-79-improper-neutralization-of-i-f3e5f869</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31925%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20SHOUT&amp;severity=null&amp;id=68487f581b0bd07c3938a817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32291-cwe-434-unrestricted-upload-of-file-20faf142</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32291%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FantasticPlugins%20SUMO%20Affiliates%20Pro&amp;severity=null&amp;id=68487f5c1b0bd07c3938d8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32305-cwe-79-improper-neutralization-of-i-bb65a924</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sneeit%20WordPress%20FlatNews%20Theme&amp;severity=null&amp;id=68487f5c1b0bd07c3938d4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32308-cwe-862-missing-authorization-in-lo-ce097abf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32308%3A%20Missing%20Authorization%20in%20looks_awesome%20Team%20Builder&amp;severity=null&amp;id=68487f581b0bd07c3938a81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32595-cwe-98-improper-control-of-filename-da4ecd05</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32595%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Krowd&amp;severity=null&amp;id=68487f581b0bd07c3938a874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39473-cwe-22-improper-limitation-of-a-pat-c09aa529</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39473%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WebGeniusLab%20Seofy%20Core&amp;severity=null&amp;id=68487f581b0bd07c3938a877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39475-cwe-35-path-traversal-in-frenify-ar-defeb933</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39475%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Frenify%20Arlo&amp;severity=null&amp;id=68487f581b0bd07c3938a87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39476-cwe-98-improper-control-of-filename-9ed5b3e4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39476%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20Revo&amp;severity=null&amp;id=68487f581b0bd07c3938a87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39539-cwe-79-improper-neutralization-of-i-328c102a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brewlabs%20WP%20Email%20Delivery&amp;severity=null&amp;id=68487f571b0bd07c3938a706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47463-cwe-862-missing-authorization-in-fa-cc3488d2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47463%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20Stock%20Locations%20for%20WooCommerce&amp;severity=null&amp;id=68487f571b0bd07c3938a61f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47477-cwe-79-improper-neutralization-of-i-fd5e1c6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47477%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revmakx%20Backup%20and%20Staging%20by%20WP%20Time%20Capsule&amp;severity=null&amp;id=68487f571b0bd07c3938a622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47487-cwe-79-improper-neutralization-of-i-44271803</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47487%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Moreconvert%20Team%20MC%20Woocommerce%20Wishlist&amp;severity=null&amp;id=68487f571b0bd07c3938a625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47511-cwe-22-improper-limitation-of-a-pat-f8eaa0ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47511%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=null&amp;id=68487f571b0bd07c3938a628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47527-cwe-862-missing-authorization-in-ic-f7927112</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47527%3A%20Missing%20Authorization%20in%20Icegram%20Icegram%20Collect&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47561-cwe-266-incorrect-privilege-assignm-95908681</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47561%3A%20Incorrect%20Privilege%20Assignment%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47598-cwe-79-improper-neutralization-of-i-145325fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20click5%20History%20Log%20by%20click5&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47608-cwe-89-improper-neutralization-of-s-0206cd31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47608%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sonalsinha21%20Recover%20abandoned%20cart%20for%20WooCommerce&amp;severity=null&amp;id=68487f5c1b0bd07c3938d473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47651-cwe-89-improper-neutralization-of-s-a49f851e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47651%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Infility%20Infility%20Global&amp;severity=null&amp;id=68487f5c1b0bd07c3938d47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48122-cwe-89-improper-neutralization-of-s-f4560880</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48122%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Holest%20Engineering%20Spreadsheet%20Price%20Changer%20for%20WooCommerce%20and%20WP%20E-commerce%20%E2%80%93%20Light&amp;severity=null&amp;id=68487f581b0bd07c3938a880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48123-cwe-94-improper-control-of-generati-d3b52931</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48123%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Holest%20Engineering%20Spreadsheet%20Price%20Changer%20for%20WooCommerce%20and%20WP%20E-commerce%20%E2%80%93%20Light&amp;severity=null&amp;id=68487f581b0bd07c3938a883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48124-cwe-22-improper-limitation-of-a-pat-f28ddcef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48124%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Holest%20Engineering%20Spreadsheet%20Price%20Changer%20for%20WooCommerce%20and%20WP%20E-commerce%20%E2%80%93%20Light&amp;severity=null&amp;id=68487f581b0bd07c3938a886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48125-cwe-98-improper-control-of-filename-603151b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48125%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Event%20Manager%20WP%20Event%20Manager&amp;severity=high&amp;id=68487f581b0bd07c3938a889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48126-cwe-98-improper-control-of-filename-a4adf6b6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48126%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=null&amp;id=68487f581b0bd07c3938a88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48129-cwe-266-incorrect-privilege-assignm-c79349be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48129%3A%20Incorrect%20Privilege%20Assignment%20in%20Holest%20Engineering%20Spreadsheet%20Price%20Changer%20for%20WooCommerce%20and%20WP%20E-commerce%20%E2%80%93%20Light&amp;severity=null&amp;id=68487f581b0bd07c3938a890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48130-cwe-22-improper-limitation-of-a-pat-b8bde759</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48130%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20spicethemes%20Spice%20Blocks&amp;severity=null&amp;id=68487f581b0bd07c3938a8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48139-cwe-862-missing-authorization-in-re-1834c859</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48139%3A%20Missing%20Authorization%20in%20relentlo%20StyleAI&amp;severity=null&amp;id=68487f581b0bd07c3938a8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48140-cwe-94-improper-control-of-generati-7e88a822</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48140%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20metalpriceapi%20MetalpriceAPI&amp;severity=critical&amp;id=68487f581b0bd07c3938a8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48141-cwe-89-improper-neutralization-of-s-f907eac2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48141%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Alex%20Zaytseff%20Multi%20CryptoCurrency%20Payments&amp;severity=null&amp;id=68487f571b0bd07c3938a689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48143-cwe-79-improper-neutralization-of-i-74005c82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48143%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salesup2019%20Formulario%20de%20contacto%20SalesUp!&amp;severity=null&amp;id=68487f571b0bd07c3938a68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48147-cwe-862-missing-authorization-in-cr-e5def533</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48147%3A%20Missing%20Authorization%20in%20Crypto%20Cloud%20CryptoCloud%20-%20Crypto%20Payment%20Gateway&amp;severity=null&amp;id=68487f561b0bd07c3938a574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48261-cwe-201-insertion-of-sensitive-info-cc7cdbd6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48261%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20MultiVendorX%20MultiVendorX&amp;severity=high&amp;id=68487f571b0bd07c3938a709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48267-cwe-22-improper-limitation-of-a-pat-277505c2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48267%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=high&amp;id=68487f5a1b0bd07c3938af36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48279-cwe-79-improper-neutralization-of-i-667fca78</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48279%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Richard%20Perdaan%20WC%20MyParcel%20Belgium&amp;severity=high&amp;id=68487f5a1b0bd07c3938af3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48281-cwe-89-improper-neutralization-of-s-2fcbebe1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48281%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mystyleplatform%20MyStyle%20Custom%20Product%20Designer&amp;severity=null&amp;id=68487f5c1b0bd07c3938d485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49265-cwe-862-missing-authorization-in-wp-02610f74</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49265%3A%20Missing%20Authorization%20in%20WP%20Swings%20Membership%20For%20WooCommerce&amp;severity=null&amp;id=68487f5a1b0bd07c3938af42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49275-cwe-98-improper-control-of-filename-56e8b4d7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49275%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Blogbyte&amp;severity=null&amp;id=68487f5a1b0bd07c3938af4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49276-cwe-98-improper-control-of-filename-adfec383</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49276%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Blogmine&amp;severity=null&amp;id=68487f5a1b0bd07c3938af57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49277-cwe-98-improper-control-of-filename-27089430</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49277%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Blogprise&amp;severity=null&amp;id=68487f5a1b0bd07c3938af5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49278-cwe-98-improper-control-of-filename-80713bb8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49278%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Blogty&amp;severity=null&amp;id=68487f5a1b0bd07c3938b446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49279-cwe-98-improper-control-of-filename-cd09a64c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49279%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Blogvy&amp;severity=null&amp;id=68487f5a1b0bd07c3938b44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49280-cwe-98-improper-control-of-filename-2dc3f785</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49280%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magty&amp;severity=null&amp;id=68487f5a1b0bd07c3938b455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49281-cwe-98-improper-control-of-filename-3ffe67c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49281%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magways&amp;severity=null&amp;id=68487f5a1b0bd07c3938b45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49282-cwe-98-improper-control-of-filename-37d1a572</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49282%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magze&amp;severity=null&amp;id=68487f5a1b0bd07c3938b46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49295-cwe-35-path-traversal-in-mikado-the-7d19bd02</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49295%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Mikado-Themes%20MediClinic&amp;severity=null&amp;id=68487f5a1b0bd07c3938b476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49296-cwe-35-path-traversal-in-mikado-the-f654b769</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49296%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Mikado-Themes%20GrandPrix&amp;severity=null&amp;id=68487f5a1b0bd07c3938b47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49297-cwe-35-path-traversal-in-mikado-the-4f23cb8b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49297%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Mikado-Themes%20Grill%20and%20Chow&amp;severity=null&amp;id=68487f5c1b0bd07c3938d48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5885-cross-site-request-forgery-in-konica-1a2b7156</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5885%3A%20Cross-Site%20Request%20Forgery%20in%20Konica%20Minolta%20bizhub&amp;severity=medium&amp;id=68487f5e1b0bd07c3938f3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5884-cross-site-scripting-in-konica-minol-19ad54c5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5884%3A%20Cross%20Site%20Scripting%20in%20Konica%20Minolta%20bizhub&amp;severity=medium&amp;id=68487f5e1b0bd07c3938fef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5881-sql-injection-in-code-projects-chat--dea39760</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5881%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=68487f5e1b0bd07c3938ff43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5880-path-traversal-in-whistle-27d1cb01</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5880%3A%20Path%20Traversal%20in%20Whistle&amp;severity=medium&amp;id=68487f5e1b0bd07c3938ff36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5879-cross-site-scripting-in-wukongopenso-5b8df2b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5879%3A%20Cross%20Site%20Scripting%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=6846e0147b622a9fdf246e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49130-cwe-79-improper-neutralization-of-i-dadd0e52</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49130%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20barryvdh%20laravel-translation-manager&amp;severity=medium&amp;id=6846dc927b622a9fdf23bfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49013-cwe-94-improper-control-of-generati-1b49ed68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49013%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WilderForge%20WilderForge&amp;severity=critical&amp;id=6846dc927b622a9fdf23bfd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49131-cwe-732-incorrect-permission-assign-91056c66</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49131%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20labring%20FastGPT&amp;severity=medium&amp;id=6846dc927b622a9fdf23bfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49006-cwe-276-incorrect-default-permissio-89188c0b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49006%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20wasp-lang%20wasp&amp;severity=high&amp;id=6846dc927b622a9fdf23bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48877-cwe-1038-insecure-automated-optimiz-45765300</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48877%3A%20CWE-1038%3A%20Insecure%20Automated%20Optimizations%20in%20discourse%20discourse&amp;severity=high&amp;id=6846dc927b622a9fdf23bfd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48062-cwe-116-improper-encoding-or-escapi-bd24a0b2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48062%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20discourse%20discourse&amp;severity=high&amp;id=6846d5937b622a9fdf225522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5877-xml-external-entity-reference-in-fen-b484921a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5877%3A%20XML%20External%20Entity%20Reference%20in%20Fengoffice%20Feng%20Office&amp;severity=medium&amp;id=6846d5937b622a9fdf225524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48053-cwe-400-uncontrolled-resource-consu-8190de81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48053%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20discourse%20discourse&amp;severity=high&amp;id=6846d5937b622a9fdf225520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40670-cwe-863-incorrect-authorization-in--2766b52b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40670%3A%20CWE-863%20Incorrect%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=6846d5937b622a9fdf22551e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40669-cwe-863-incorrect-authorization-in--5d528229</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40669%3A%20CWE-863%20Incorrect%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=6846d5937b622a9fdf22551c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40668-cwe-863-incorrect-authorization-in--19e912ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40668%3A%20CWE-863%20Incorrect%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=6846d5937b622a9fdf22551a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5876-missing-authentication-in-lucky-lm-5-950ea86f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5876%3A%20Missing%20Authentication%20in%20Lucky%20LM-520-SC&amp;severity=medium&amp;id=6846d2137b622a9fdf219091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5875-buffer-overflow-in-tp-link-tl-ipc544-03336053</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5875%3A%20Buffer%20Overflow%20in%20TP-LINK%20Technologies%20TL-IPC544EP-W4&amp;severity=high&amp;id=6846c7637b622a9fdf1f2a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41444-cwe-89-improper-neutralization-of-s-77207af1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41444%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=6846c7637b622a9fdf1f2a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36528-cwe-89-improper-neutralization-of-s-c3774430</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36528%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=6846c7637b622a9fdf1f2a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27709-cwe-89-improper-neutralization-of-s-638cfcf9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27709%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=6846c7637b622a9fdf1f2a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5874-sandbox-issue-in-redash-efb055a8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5874%3A%20Sandbox%20Issue%20in%20Redash&amp;severity=low&amp;id=6846c7637b622a9fdf1f2a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pathwiper-malware-strikes-ukraines-critical-in-22427b35</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20PathWiper%20Malware%20Strikes%20Ukraine&apos;s%20Critical%20Infrastructure&amp;severity=critical&amp;id=6846bb8171f4d251b58e9e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41437-cwe-79-improper-neutralization-of-i-b64b7a08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ManageEngine%20OpManager&amp;severity=medium&amp;id=6846bcdd7b622a9fdf5f5e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5873-unrestricted-upload-in-echarge-hardy-f3cdadd9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5873%3A%20Unrestricted%20Upload%20in%20eCharge%20Hardy%20Barth%20Salia%20PLCC&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e7915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3835-cwe-434-unrestricted-upload-of-file--a360cb2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3835%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=critical&amp;id=6846b80d71f4d251b58dd63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5872-missing-authentication-in-egauge-eg3-e1aab255</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5872%3A%20Missing%20Authentication%20in%20eGauge%20EG3000%20Energy%20Monitor&amp;severity=medium&amp;id=6846b47c71f4d251b58d142a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40675-cwe-79-improper-neutralization-of-i-93aca3b8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bagisto%20Bagisto&amp;severity=medium&amp;id=6846b14d71f4d251b58c4ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5871-missing-authentication-in-papendorf--22a41558</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5871%3A%20Missing%20Authentication%20in%20Papendorf%20SOL%20Connect%20Center&amp;severity=medium&amp;id=6846ad6171f4d251b58b89c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5870-improper-authentication-in-trendnet--0ea2a5f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5870%3A%20Improper%20Authentication%20in%20TRENDnet%20TV-IP121W&amp;severity=medium&amp;id=6846a66571f4d251b58a14d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5869-memory-corruption-in-rt-thread-3e28c27c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5869%3A%20Memory%20Corruption%20in%20RT-Thread&amp;severity=high&amp;id=68469f4371f4d251b5889ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5868-improper-validation-of-array-index-i-d61ac4e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5868%3A%20Improper%20Validation%20of%20Array%20Index%20in%20RT-Thread&amp;severity=high&amp;id=6846985671f4d251b58731f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5894-cwe-862-missing-authorization-in-hon-f9195c8f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5894%3A%20CWE-862%20Missing%20Authorization%20in%20Honding%20Technology%20Smart%20Parking%20Management%20System&amp;severity=high&amp;id=6846914371f4d251b585ccd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5867-null-pointer-dereference-in-rt-threa-b71df60b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5867%3A%20NULL%20Pointer%20Dereference%20in%20RT-Thread&amp;severity=high&amp;id=6846c60d7b622a9fdf1e7917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5866-improper-validation-of-array-index-i-04ba0c1e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5866%3A%20Improper%20Validation%20of%20Array%20Index%20in%20RT-Thread&amp;severity=high&amp;id=68468a2671f4d251b58461cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5893-cwe-497-exposure-of-sensitive-system-7888aa6e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5893%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Honding%20Technology%20Smart%20Parking%20Management%20System&amp;severity=critical&amp;id=684686c771f4d251b583a857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5865-memory-corruption-in-rt-thread-c4418e82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5865%3A%20Memory%20Corruption%20in%20RT-Thread&amp;severity=high&amp;id=6846c60d7b622a9fdf1e7919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25209-exposure-of-sensitive-information-t-bda37384</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25209%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e791f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25208-uncontrolled-resource-consumption-4d51afb0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25208%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e791d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25207-uncontrolled-resource-consumption-f0d83745</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25207%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=68467c3671f4d251b5818859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47711-off-by-one-error-in-red-hat-red-hat-6109522f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47711%3A%20Off-by-one%20Error&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e7923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5864-improper-restriction-of-excessive-au-2dc83f2c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5864%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Tenda%20TDSEE%20App&amp;severity=medium&amp;id=6846c60e7b622a9fdf1e7933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4652-cwe-79-cross-site-scripting-xss-in-u-4e36643b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4652%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Broadstreet&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e7927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3582-cwe-79-cross-site-scripting-xss-in-u-5175594e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3582%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Newsletter&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e7921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3581-cwe-79-cross-site-scripting-xss-in-u-545d54ff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3581%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Newsletter&amp;severity=medium&amp;id=684679e871f4d251b580cf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47712-integer-overflow-or-wraparound-in-r-87221d5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47712%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e7925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5863-stack-based-buffer-overflow-in-tenda-6f3a63a7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5863%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=6846751e71f4d251b580111c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5862-buffer-overflow-in-tenda-ac7-1182acfc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5862%3A%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68466dfd71f4d251b57ea555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5861-buffer-overflow-in-tenda-ac7-a828375d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5861%3A%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=6846672371f4d251b57d288e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5860-sql-injection-in-phpgurukul-maid-hir-f82e3822</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5860%3A%20SQL%20Injection%20in%20PHPGurukul%20Maid%20Hiring%20Management%20System&amp;severity=medium&amp;id=6846600c71f4d251b57bc255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5859-sql-injection-in-phpgurukul-nipah-vi-73a342bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5859%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=684658fc71f4d251b57a5b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5858-sql-injection-in-phpgurukul-nipah-vi-12e4a160</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5858%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=6846c60e7b622a9fdf1e7953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5857-sql-injection-in-code-projects-patie-50f092c0</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5857%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=684651f271f4d251b578ef08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5856-sql-injection-in-phpgurukul-bp-monit-d2cb8d70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5856%3A%20SQL%20Injection%20in%20PHPGurukul%20BP%20Monitoring%20Management%20System&amp;severity=medium&amp;id=684647d171f4d251b576b19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5855-stack-based-buffer-overflow-in-tenda-640540f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5855%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=68463cc871f4d251b57496db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5854-buffer-overflow-in-tenda-ac6-c203c548</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5854%3A%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=684635e171f4d251b5732ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5853-stack-based-buffer-overflow-in-tenda-2c9333d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5853%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5852-buffer-overflow-in-tenda-ac6-77c87192</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5852%3A%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=68462eda71f4d251b571c596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/laravel-pulse-131-arbitrary-code-injection-ef7448b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Laravel%20Pulse%201.3.1%20-%20Arbitrary%20Code%20Injection&amp;severity=medium&amp;id=68489c7b82cbcead92620aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-11-version-24h2-cross-device-ser-8a607775</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%2011%20Version%2024H2%20Cross%20Device%20Service%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=68489c7682cbcead92620a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prosshd-12-20090726-denial-of-service-dos-5722ae52</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ProSSHD%201.2%2020090726%20-%20Denial%20of%20Service%20(DoS)&amp;severity=medium&amp;id=68489c7082cbcead92620a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tightvnc-2883-control-pipe-manipulation-b5ef2947</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TightVNC%202.8.83%20-%20Control%20Pipe%20Manipulation&amp;severity=medium&amp;id=68489c6b82cbcead92620a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-09-bf21d0b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-09&amp;severity=medium&amp;id=68488af8b74e04a9958ce241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46041-na-in-na-95c3d77f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46041%3A%20n%2Fa&amp;severity=medium&amp;id=68487f5a1b0bd07c3938af2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45055-na-in-na-16aba638</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45055%3A%20n%2Fa&amp;severity=medium&amp;id=68487f5a1b0bd07c3938af27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45002-na-in-na-96d813aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45002%3A%20n%2Fa&amp;severity=medium&amp;id=68487f5a1b0bd07c3938af20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45001-na-in-na-307b7c61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45001%3A%20n%2Fa&amp;severity=high&amp;id=68487f5a1b0bd07c3938af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29627-na-in-na-ec942257</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29627%3A%20n%2Fa&amp;severity=medium&amp;id=68487f5a1b0bd07c3938ab95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46452-na-in-na-4e291cff</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46452%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5a1b0bd07c3938ab8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46178-na-in-na-4ce4d788</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46178%3A%20n%2Fa&amp;severity=medium&amp;id=68487f551b0bd07c3938a343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5851-buffer-overflow-in-tenda-ac15-1eebf17e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5851%3A%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=684620b471f4d251b56efc90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5850-buffer-overflow-in-tenda-ac15-16d3ee32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5850%3A%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=684619c371f4d251b56d95e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hmas-canberra-accidentally-blocks-wireless-interne-c6399ad4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HMAS%20Canberra%20accidentally%20blocks%20wireless%20internet%20and%20radio%20services%20in%20New%20Zealand&amp;severity=medium&amp;id=6846164471f4d251b56ce886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5849-stack-based-buffer-overflow-in-tenda-521befd8</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5849%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=684612a671f4d251b56c2f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5848-buffer-overflow-in-tenda-ac15-3044201a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5848%3A%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-using-fake-it-support-calls-to-breach-corp-1c981d51</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Using%20Fake%20IT%20Support%20Calls%20to%20Breach%20Corporate%20Systems%2C%20Google&amp;severity=high&amp;id=6846048c71f4d251b5696901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-supply-chain-malware-operation-hits-npm-and-py-cf9af3cc</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Supply%20Chain%20Malware%20Operation%20Hits%20npm%20and%20PyPI%20Ecosystems%2C%20Targeting%20Millions%20Globally&amp;severity=high&amp;id=6846011671f4d251b568b3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mirai-botnet-infect-tbk-dvr-devices-via-comman-68dc3f6f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Mirai%20botnet%20infect%20TBK%20DVR%20devices%20via%20command%20injection%20flaw&amp;severity=high&amp;id=6846011671f4d251b568b3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35010-cwe-88-improper-neutralization-of-a-07bf7b2d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35010%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35009-cwe-88-improper-neutralization-of-a-7516e709</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35009%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35008-cwe-88-improper-neutralization-of-a-48ce6f4d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35008%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35007-cwe-88-improper-neutralization-of-a-94043a92</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35007%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e793f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35006-cwe-88-improper-neutralization-of-a-79a58ae9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35006%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e793d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35005-cwe-88-improper-neutralization-of-a-77afea1b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35005%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e793b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35004-cwe-88-improper-neutralization-of-a-3de0e6e9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35004%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6845fd8e71f4d251b567fadc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32459-cwe-88-improper-neutralization-of-a-7e897fc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32459%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6845fd8f71f4d251b567faf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32458-cwe-88-improper-neutralization-of-a-aa07caac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32458%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6845fd8f71f4d251b567faee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32457-cwe-88-improper-neutralization-of-a-1e7c453d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32457%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32456-cwe-88-improper-neutralization-of-a-81f394a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32456%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32455-cwe-88-improper-neutralization-of-a-1a25643f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32455%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3461-cwe-306-missing-authentication-for-c-411d29f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3461%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=critical&amp;id=6845fd8f71f4d251b567fafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3460-cwe-88-improper-neutralization-of-ar-570c1841</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3460%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6845fd8f71f4d251b567faf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3459-cwe-88-improper-neutralization-of-ar-6fe2b349</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3459%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6845fd8f71f4d251b567faf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5847-stack-based-buffer-overflow-in-tenda-ecf19417</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5847%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=6845942271f4d251b5528aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27247-cwe-281-improper-preservation-of-pe-c54c8236</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27247%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=68458da771f4d251b5510445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27242-cwe-20-improper-input-validation-in-a5bfd693</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27242%3A%20CWE-20%20Improper%20Input%20Validation%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68458da771f4d251b551043c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27563-cwe-281-improper-preservation-of-pe-29126088</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27563%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68457be371f4d251b54d387c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26693-cwe-281-improper-preservation-of-pe-ba0e1c85</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26693%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68458da771f4d251b55103e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26691-cwe-281-improper-preservation-of-pe-0496675f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26691%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=68458da771f4d251b55103e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27131-cwe-20-improper-input-validation-in-a9df9514</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27131%3A%20CWE-20%20Improper%20Input%20Validation%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=68458da771f4d251b5510424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24493-cwe-362-concurrent-execution-using--dc066632</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24493%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=68458da771f4d251b55103d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25217-cwe-476-null-pointer-dereference-in-0454cb8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25217%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68458da771f4d251b55103dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23235-cwe-125-out-of-bounds-read-in-openh-1d818854</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23235%3A%20CWE-125%20Out-of-bounds%20Read%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68458da771f4d251b55103c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21082-cwe-843-access-of-resource-using-in-bb42a855</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21082%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68458da771f4d251b55103aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20063-cwe-843-access-of-resource-using-in-86444830</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20063%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68457be371f4d251b54d386e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38004-vulnerability-in-linux-linux-c3f967e3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68458da771f4d251b551044e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38003-vulnerability-in-linux-linux-2e8c9083</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=684569fb71f4d251b549bb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-08-0625aa2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-08&amp;severity=medium&amp;id=68490f133cd93dcca831c5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-posing-as-utilities-delete--7da8b479</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20packages%20posing%20as%20utilities%20delete%20project%20directories&amp;severity=high&amp;id=6844c4c371f4d251b5292b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-hits-gluestack-npm-packages-wi-1386e90f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20chain%20attack%20hits%20Gluestack%20NPM%20packages%20with%20960K%20weekly%20downloads&amp;severity=high&amp;id=6844c12171f4d251b5287bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-20-malicious-apps-on-google-play-spotted-targ-0630623c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2020%20Malicious%20Apps%20on%20Google%20Play%20Spotted%20Targeting%20Users%20for%20Seed%20Phrases&amp;severity=medium&amp;id=6844890771f4d251b51d6fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5840-unrestricted-upload-in-sourcecodeste-b6b6f3f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5840%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=684481f671f4d251b51b5975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5839-buffer-overflow-in-tenda-ac9-88c753c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5839%3A%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=68447ad371f4d251b519f1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5838-sql-injection-in-phpgurukul-employee-4c0dd7d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5838%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6844626671f4d251b515113c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/riding-the-time-machine-journey-through-an-old-vbu-41eeef34</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Riding%20The%20Time%20Machine%3A%20Journey%20Through%20An%20Old%20vBulletin%20PHP%20Object%20Injection&amp;severity=medium&amp;id=6844465171f4d251b50f756f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5837-sql-injection-in-phpgurukul-employee-c8a01a4e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5837%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=684449ab71f4d251b5102ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5836-command-injection-in-tenda-ac9-0a490ad8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5836%3A%20Command%20Injection%20in%20Tenda%20AC9&amp;severity=medium&amp;id=6844429271f4d251b50e99a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9993-cwe-79-improper-neutralization-of-in-7e44a5a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=684422fc71f4d251b507bfff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5568-cwe-79-improper-neutralization-of-in-052683a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20Event%20Booking%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=68443c7f71f4d251b50d005d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5528-cwe-79-improper-neutralization-of-in-ad2b57ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heateor%20Social%20Sharing%20Plugin%20%E2%80%93%20Sassy%20Social%20Share&amp;severity=medium&amp;id=68443c7f71f4d251b50d0049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9994-cwe-79-improper-neutralization-of-in-8055ff92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=68443c7f71f4d251b50d0029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tax-resolution-firm-optima-tax-relief-hit-by-ranso-09c6c652</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tax%20resolution%20firm%20Optima%20Tax%20Relief%20hit%20by%20ransomware%2C%20data%20leaked&amp;severity=high&amp;id=684414ff71f4d251b50506fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-exploit-fortinet-flaws-to-deploy-qilin-r-06c952bb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20exploit%20Fortinet%20flaws%20to%20deploy%20Qilin%20ransomware&amp;severity=high&amp;id=6844187d71f4d251b505b520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dragonclone-chinese-telecom-targeted-by--1798aec7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20DRAGONCLONE%3A%20Chinese%20Telecom%20Targeted%20by%20Malware&amp;severity=medium&amp;id=68433b1b71f4d251b5d94948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5303-cwe-79-improper-neutralization-of-in-76f98331</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Freightview%20Edition&amp;severity=high&amp;id=6843f8df71f4d251b5ff87b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5399-cwe-835-loop-with-unreachable-exit-c-993ee7d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5399%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20curl%20curl&amp;severity=high&amp;id=6843f20a71f4d251b5fe2076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47601-cwe-862-missing-authorization-in-ch-0ad2ed31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47601%3A%20Missing%20Authorization%20in%20Christiaan%20Pieterse%20MaxiBlocks&amp;severity=null&amp;id=6843c3f571f4d251b5f51a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5814-cwe-862-missing-authorization-in-swi-cec40fa4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5814%3A%20CWE-862%20Missing%20Authorization%20in%20switcorp%20Profiler%20%E2%80%93%20What%20Slowing%20Down%20Your%20WP&amp;severity=medium&amp;id=6843c08b71f4d251b5f46162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-07-66939e0c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-07&amp;severity=medium&amp;id=68490f133cd93dcca831dc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55585-na-in-na-1eb71281</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55585%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20MOPS%20moPS&amp;severity=critical&amp;id=68448cb171f4d251b51e1fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49619-cwe-1336-improper-neutralization-of-8c15811f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49619%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Skyvern%20Skyvern&amp;severity=high&amp;id=6844464f71f4d251b50f7568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49128-cwe-209-generation-of-error-message-2b6f946b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49128%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20FasterXML%20jackson-core&amp;severity=medium&amp;id=68435e1971f4d251b5e1083c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/possible-malware-in-official-microdicom-installer--7dd526a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Possible%20Malware%20in%20Official%20MicroDicom%20Installer%20(PDF%20%2B%20Hashes%20%2B%20Scan%20Results%20Included)&amp;severity=high&amp;id=684368b171f4d251b5e31d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49127-cwe-502-deserialization-of-untruste-6f7a2845</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49127%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20kafbat%20kafka-ui&amp;severity=high&amp;id=6843538571f4d251b5def98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-intelligence-disruption-badbox-20-targets-c-5b6eba3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Intelligence%20Disruption%3A%20BADBOX%202.0%20Targets%20Consumer%20Devices%20with%20Multiple%20Fraud%20Schemes&amp;severity=medium&amp;id=68434ffe71f4d251b5de3cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5799-stack-based-buffer-overflow-in-tenda-1df7a7f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5799%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=68443c7f71f4d251b50d006f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5798-stack-based-buffer-overflow-in-tenda-a2337b87</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5798%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=684345db71f4d251b5dc11d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kettering-health-confirms-interlock-ransomware-beh-242a20f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kettering%20Health%20confirms%20Interlock%20ransomware%20behind%20cyberattack&amp;severity=high&amp;id=68433e7671f4d251b5da038f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5797-cross-site-scripting-in-laundry-laun-b6c0340e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5797%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=68433e8671f4d251b5da03a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5796-cross-site-scripting-in-code-project-30612400</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5796%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=68433e8671f4d251b5da039d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2766-cwe-1393-use-of-default-password-in--9917d32a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2766%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%2070mai%20A510&amp;severity=high&amp;id=68433b2271f4d251b5d94a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3485-cwe-22-improper-limitation-of-a-path-6d37d65c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Allegra%20Allegra&amp;severity=high&amp;id=68433b2271f4d251b5d94a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5481-cwe-787-out-of-bounds-write-in-sante-f08db1e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5481%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Sante%20DICOM%20Viewer%20Pro&amp;severity=high&amp;id=68433b2271f4d251b5d94a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5480-cwe-427-uncontrolled-search-path-ele-14ebe5c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5480%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Action1%20Action1&amp;severity=high&amp;id=68433b2271f4d251b5d94a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5474-cwe-59-improper-link-resolution-befo-5ac68783</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5474%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%202BrightSparks%20SyncBackFree&amp;severity=high&amp;id=68433b2271f4d251b5d94a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5473-cwe-190-integer-overflow-or-wraparou-3cef0756</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5473%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GIMP%20GIMP&amp;severity=high&amp;id=68433b2271f4d251b5d94a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5795-buffer-overflow-in-tenda-ac5-e2c15282</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5795%3A%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=6843377571f4d251b5d89015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5794-buffer-overflow-in-tenda-ac5-a2b5e3ba</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5794%3A%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=6843377571f4d251b5d89012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5793-buffer-overflow-in-totolink-ex1200t-b65252a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5793%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6843377571f4d251b5d8901e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5792-buffer-overflow-in-totolink-ex1200t-b35c8fc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5792%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6843377571f4d251b5d8901b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/popular-chrome-extensions-found-leaking-data-via-u-f84d0f98</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Popular%20Chrome%20Extensions%20Found%20Leaking%20Data%20via%20Unencrypted%20Connections&amp;severity=medium&amp;id=68432d1f71f4d251b5d66f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49011-cwe-358-improperly-implemented-secu-a6a2995b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49011%3A%20CWE-358%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20authzed%20spicedb&amp;severity=low&amp;id=6843377571f4d251b5d89018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47950-cwe-770-allocation-of-resources-wit-334a8ded</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47950%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20coredns%20coredns&amp;severity=high&amp;id=6843296371f4d251b5d5b4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5790-buffer-overflow-in-totolink-x15-ac1fd634</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5790%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68443c7f71f4d251b50d005a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5789-buffer-overflow-in-totolink-x15-bde7575a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5789%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68433b2271f4d251b5d94a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5788-buffer-overflow-in-totolink-x15-4d654047</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5788%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6843225a71f4d251b5d448aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meet-nickname-zero-click-imessage-exploit-targeted-e17252c5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meet%20NICKNAME%3A%20Zero-Click%20iMessage%20Exploit%20Targeted%20Key%20Figures%20in%20US%2C%20EU&amp;severity=high&amp;id=68431efa71f4d251b5d38d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5787-buffer-overflow-in-totolink-x15-82132bca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5787%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68431b5671f4d251b5d2d3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5786-buffer-overflow-in-totolink-x15-1b8d621f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5786%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68431b5671f4d251b5d2d3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5785-buffer-overflow-in-totolink-x15-84d7028b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5785%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6843146e71f4d251b5d16016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5784-sql-injection-in-phpgurukul-employee-9e07996d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5784%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6843146e71f4d251b5d16013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29885-cwe-295-in-qnap-systems-inc-file-st-e096af56</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29885%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29884-cwe-295-in-qnap-systems-inc-file-st-4463270f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29884%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29883-cwe-295-in-qnap-systems-inc-file-st-bbc1d2ab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29883%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22486-cwe-295-in-qnap-systems-inc-file-st-00975e1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22486%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110571f4d251b5d0a5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29892-cwe-89-in-qnap-systems-inc-qsync-ce-949d577d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29892%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=6843110671f4d251b5d0a5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22482-cwe-134-in-qnap-systems-inc-qsync-c-810a5b57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22482%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=6843110571f4d251b5d0a5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50406-cwe-79-in-qnap-systems-inc-license--d733d913</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50406%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20License%20Center&amp;severity=low&amp;id=6843110571f4d251b5d0a5be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22481-cwe-77-in-qnap-systems-inc-qts-07eae78c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22481%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=6843110571f4d251b5d0a5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56805-cwe-120-in-qnap-systems-inc-qts-67f961b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56805%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6843110571f4d251b5d0a5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13088-cwe-287-in-qnap-systems-inc-quroute-79a82164</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13088%3A%20CWE-287%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=medium&amp;id=6843110571f4d251b5d0a5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13087-cwe-78-in-qnap-systems-inc-qurouter-3297facd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13087%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=low&amp;id=6843110571f4d251b5d0a5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22484-cwe-770-in-qnap-systems-inc-file-st-b1e51d33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22484%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110571f4d251b5d0a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22490-cwe-476-in-qnap-systems-inc-file-st-e0689492</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22490%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=6843110571f4d251b5d0a5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29871-cwe-125-in-qnap-systems-inc-file-st-5e78bb9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29871%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=6843110571f4d251b5d0a5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29872-cwe-770-in-qnap-systems-inc-file-st-a25ff476</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29872%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29873-cwe-476-in-qnap-systems-inc-file-st-71309a37</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29873%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=6843110671f4d251b5d0a5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29876-cwe-476-in-qnap-systems-inc-file-st-415ad519</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29876%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=6843110671f4d251b5d0a5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29877-cwe-476-in-qnap-systems-inc-file-st-0bedcf82</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29877%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=6843110671f4d251b5d0a5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30279-cwe-295-in-qnap-systems-inc-file-st-b1356300</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30279%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33031-cwe-295-in-qnap-systems-inc-file-st-641346a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33031%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33035-cwe-22-in-qnap-systems-inc-file-sta-23e4204f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33035%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5783-sql-injection-in-phpgurukul-employee-2d85a5e1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5783%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=68430d3871f4d251b5cfea8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5747-cwe-115-misinterpretation-of-input-i-c13975ce</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5747%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20WOLFBOX%20Level%202%20EV%20Charger&amp;severity=high&amp;id=68430d3871f4d251b5cfea7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5748-cwe-749-exposed-dangerous-method-or--72ad8962</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5748%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20WOLFBOX%20Level%202%20EV%20Charger&amp;severity=high&amp;id=68430d3871f4d251b5cfea7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5749-cwe-457-use-of-uninitialized-variabl-a96f9541</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5749%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20WOLFBOX%20Level%202%20EV%20Charger&amp;severity=medium&amp;id=68430d3871f4d251b5cfea81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5750-cwe-122-heap-based-buffer-overflow-i-3019041e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5750%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20WOLFBOX%20Level%202%20EV%20Charger&amp;severity=high&amp;id=68430d3871f4d251b5cfea84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5751-cwe-798-use-of-hard-coded-credential-e37a8546</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5751%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20WOLFBOX%20Level%202%20EV%20Charger&amp;severity=medium&amp;id=68430d3871f4d251b5cfea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5782-sql-injection-in-phpgurukul-employee-f5d42cbf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5782%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6843062b71f4d251b5ce778b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5780-sql-injection-in-code-projects-patie-c46c37e4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5780%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6843062b71f4d251b5ce7788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27531-cwe-502-deserialization-of-untruste-e0a0e467</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27531%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20InLong&amp;severity=critical&amp;id=6843030371f4d251b5cdbdeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41646-cwe-704-incorrect-type-conversion-o-280cfa46</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41646%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20Kunbus%20Revolution%20Pi%20webstatus&amp;severity=critical&amp;id=6843030371f4d251b5cdbdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5779-sql-injection-in-code-projects-patie-967aa0ef</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5779%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6842ff2071f4d251b5cd032f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5778-sql-injection-in-1000-projects-abc-c-f765b558</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5778%3A%20SQL%20Injection%20in%201000%20Projects%20ABC%20Courier%20Management%20System&amp;severity=medium&amp;id=6842f51971f4d251b5ca3e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38002-vulnerability-in-linux-linux-c2654820</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=6842f51971f4d251b5ca3e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38001-vulnerability-in-linux-linux-fe1233a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=6842f51971f4d251b5ca3e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5806-vulnerability-in-jenkins-project-jen-0d48dd4a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5806%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Gatling%20Plugin&amp;severity=high&amp;id=6842f14871f4d251b5c95e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5791-incorrect-privilege-assignment-in-re-7870fd3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5791%3A%20Incorrect%20Privilege%20Assignment&amp;severity=high&amp;id=6842f14871f4d251b5c95e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0620-files-or-directories-accessible-to-e-a9a32d7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0620%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&amp;severity=medium&amp;id=6842edd971f4d251b5c87eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38000-vulnerability-in-linux-linux-51dc61ff</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=6842edde71f4d251b5c88055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5766-cross-site-request-forgery-in-code-p-b4853cd4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5766%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=6842eddf71f4d251b5c8809e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49419-cwe-497-exposure-of-sensitive-syste-27579900</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49419%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20esigngenie%20Foxit%20eSign%20for%20WordPress&amp;severity=null&amp;id=6842edde71f4d251b5c88058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49421-cwe-89-improper-neutralization-of-s-a7fc3f28</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49421%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Andrei%20Filonov%20WP%20Text%20Expander&amp;severity=null&amp;id=6842edde71f4d251b5c8805b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49425-cwe-352-cross-site-request-forgery--ed1ae2bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49425%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Adrian%20Hanft%20Konami%20Easter%20Egg&amp;severity=null&amp;id=6842edde71f4d251b5c8805e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49427-cwe-79-improper-neutralization-of-i-7fe5c145</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Burnette%20Abbie%20Expander&amp;severity=null&amp;id=6842edde71f4d251b5c88061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49429-cwe-79-improper-neutralization-of-i-ca0d43d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49429%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Burnette%20Video%20Embeds&amp;severity=null&amp;id=6842edde71f4d251b5c88064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49435-cwe-352-cross-site-request-forgery--83a625d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hasina77%20Wp%20Easy%20Allopass&amp;severity=null&amp;id=6842edde71f4d251b5c88067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49439-cwe-352-cross-site-request-forgery--300993e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49439%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mariusz88atelierweb%20Atelier%20Create%20CV&amp;severity=null&amp;id=6842edde71f4d251b5c88075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49440-cwe-352-cross-site-request-forgery--26a577a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49440%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vuong%20Nguyen%20WP%20Security%20Master&amp;severity=null&amp;id=6842edde71f4d251b5c88078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49441-cwe-862-missing-authorization-in-wp-97c68512</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49441%3A%20Missing%20Authorization%20in%20WP%20Map%20Plugins%20Interactive%20Regional%20Map%20of%20Florida&amp;severity=null&amp;id=6842edde71f4d251b5c8807b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49442-cwe-79-improper-neutralization-of-i-87920623</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mostafa%20Shahiri%20Simple%20Nested%20Menu&amp;severity=null&amp;id=6842edde71f4d251b5c8807e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49443-cwe-79-improper-neutralization-of-i-43cb03d9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49443%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20McCoy%20Bacon%20Ipsum&amp;severity=null&amp;id=6842edde71f4d251b5c88081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49445-cwe-352-cross-site-request-forgery--d1c48972</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49445%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Map%20Plugins%20Interactive%20UK%20Regional%20Map&amp;severity=null&amp;id=6842edde71f4d251b5c88084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49446-cwe-352-cross-site-request-forgery--48d956e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49446%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20minhlaobao%20Admin%20Notes&amp;severity=null&amp;id=6842edde71f4d251b5c88087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49449-cwe-352-cross-site-request-forgery--af0ad0cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49449%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Map%20Plugins%20Interactive%20Regional%20Map%20of%20Africa&amp;severity=null&amp;id=6842edde71f4d251b5c8808a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49450-cwe-79-improper-neutralization-of-i-0f54b9a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mhallmann%20SEPA%20Girocode&amp;severity=null&amp;id=6842edde71f4d251b5c8808d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49453-cwe-352-cross-site-request-forgery--89f49b48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49453%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jatinder%20Pal%20Singh%20BP%20Profile%20as%20Homepage&amp;severity=null&amp;id=6842eddf71f4d251b5c88090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25995-cwe-98-improper-control-of-filename-be3d9e2c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25995%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20choicehomemortgage%20AI%20Mortgage%20Calculator&amp;severity=high&amp;id=6842f14871f4d251b5c95e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25997-cwe-862-missing-authorization-in-so-c7044072</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25997%3A%20CWE-862%20Missing%20Authorization%20in%20SolaPlugins%20Sola%20Support%20Ticket&amp;severity=medium&amp;id=6842f14871f4d251b5c95e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26000-cwe-79-improper-neutralization-of-i-c5e2cf97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hanhdo205%20Bang%20tinh%20vay&amp;severity=medium&amp;id=6842f14871f4d251b5c95e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26001-cwe-79-improper-neutralization-of-i-65fc04f9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26001%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marchetti%20Design%20Next%20Event%20Calendar&amp;severity=medium&amp;id=6842f14871f4d251b5c95e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26002-cwe-862-missing-authorization-in-6s-2b5e36dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26002%3A%20CWE-862%20Missing%20Authorization%20in%206Storage%206Storage%20Rentals&amp;severity=medium&amp;id=6842f14871f4d251b5c95e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26003-cwe-89-improper-neutralization-of-s-cf10ad88</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26003%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vipul%20Jariwala%20WP%20Post%20Corrector&amp;severity=high&amp;id=6842f14871f4d251b5c95e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23969-cwe-497-exposure-of-sensitive-syste-273574be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23969%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20whassan%20KI%20Live%20Video%20Conferences&amp;severity=null&amp;id=6842f14971f4d251b5c95e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23971-cwe-862-missing-authorization-in-wh-a712fbe7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23971%3A%20Missing%20Authorization%20in%20whassan%20KI%20Live%20Video%20Conferences&amp;severity=null&amp;id=6842f14971f4d251b5c95e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24762-cwe-862-missing-authorization-in-fa-a8918a10</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24762%3A%20Missing%20Authorization%20in%20facturaone%20TicketBAI%20Facturas%20para%20WooCommerce&amp;severity=null&amp;id=6842edd971f4d251b5c87f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24763-cwe-862-missing-authorization-in-pa-ff1cb103</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24763%3A%20Missing%20Authorization%20in%20Pascal%20Casier%20bbPress%20API&amp;severity=null&amp;id=6842edd971f4d251b5c87f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24772-cwe-352-cross-site-request-forgery--2d9c9b05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24772%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cmsMinds%20Pay%20with%20Contact%20Form%207&amp;severity=null&amp;id=6842edd971f4d251b5c87f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24776-cwe-862-missing-authorization-in-co-4bdd5eb4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24776%3A%20Missing%20Authorization%20in%20codelobster%20Responsive%20Flipbooks&amp;severity=null&amp;id=6842edd971f4d251b5c87f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24778-cwe-862-missing-authorization-in-de-6edfa39e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24778%3A%20Missing%20Authorization%20in%20De%20paragon%20No%20Spam%20At%20All&amp;severity=null&amp;id=6842edd971f4d251b5c87f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26590-cwe-89-improper-neutralization-of-s-d091ccc7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26590%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nir%20Complete%20Google%20Seo%20Scan&amp;severity=null&amp;id=6842edd971f4d251b5c87f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26593-cwe-352-cross-site-request-forgery--62906279</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26593%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FasterThemes%20FastBook&amp;severity=null&amp;id=6842edd971f4d251b5c87f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27334-cwe-79-improper-neutralization-of-i-c168ffbc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27334%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%C3%81ngel%20C.%20Simple%20Google%20Static%20Map&amp;severity=null&amp;id=6842edd971f4d251b5c87f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27359-cwe-352-cross-site-request-forgery--56aec5a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27359%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Seerox%20WP%20Media%20File%20Type%20Manager&amp;severity=null&amp;id=6842edd971f4d251b5c87f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27360-cwe-352-cross-site-request-forgery--adfb2b3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27360%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Corner%20Quick%20Event%20Calendar&amp;severity=null&amp;id=6842edd971f4d251b5c87f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28948-cwe-352-cross-site-request-forgery--f7626077</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28948%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codedraft%20Mediabay%20-%20WordPress%20Media%20Library%20Folders&amp;severity=high&amp;id=6842edda71f4d251b5c87f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28950-cwe-352-cross-site-request-forgery--0324ff7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28950%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Shabtai%20Post%20Author&amp;severity=null&amp;id=6842edda71f4d251b5c87f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28952-cwe-352-cross-site-request-forgery--8381f8f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28952%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jonathan%20Lau%20CubePoints&amp;severity=null&amp;id=6842edda71f4d251b5c87f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28954-cwe-352-cross-site-request-forgery--e0b80c2b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28954%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wphobby%20Backwp&amp;severity=null&amp;id=6842edda71f4d251b5c87f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28958-cwe-352-cross-site-request-forgery--03e83e63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28958%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vadim%20Bogaiskov%20Bg%20Orthodox%20Calendar&amp;severity=null&amp;id=6842edda71f4d251b5c87f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28964-cwe-352-cross-site-request-forgery--63e4142e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28964%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mangup%20Personal%20Favicon&amp;severity=null&amp;id=6842edda71f4d251b5c87f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28966-cwe-352-cross-site-request-forgery--882fbb63</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28966%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dilemma123%20Recent%20Posts%20Slider%20Responsive&amp;severity=null&amp;id=6842edda71f4d251b5c87f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28974-cwe-352-cross-site-request-forgery--ad14eb9e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28974%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mail250%20Free%20WP%20Mail%20SMTP&amp;severity=null&amp;id=6842edda71f4d251b5c87f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28981-cwe-352-cross-site-request-forgery--30290dca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28981%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Soli%20WP%20Mail%20Options&amp;severity=null&amp;id=6842edda71f4d251b5c87f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28984-cwe-352-cross-site-request-forgery--797c9e1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28984%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20storepro%20Subscription%20Renewal%20Reminders%20for%20WooCommerce&amp;severity=null&amp;id=6842edda71f4d251b5c87f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28985-cwe-862-missing-authorization-in-el-7a31205e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28985%3A%20Missing%20Authorization%20in%20Elastic%20Email%20Elastic%20Email%20Subscribe%20Form&amp;severity=null&amp;id=6842edda71f4d251b5c87f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28986-cwe-352-cross-site-request-forgery--865c4d9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28986%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Webaholicson%20Epicwin%20Plugin&amp;severity=null&amp;id=6842edda71f4d251b5c87f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28989-cwe-79-improper-neutralization-of-i-69170dea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arildur%20Read%20More%20Login&amp;severity=null&amp;id=6842edda71f4d251b5c87f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28994-cwe-862-missing-authorization-in-vi-793969c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28994%3A%20Missing%20Authorization%20in%20viralloops%20Viral%20Loops%20WP%20Integration&amp;severity=null&amp;id=6842edda71f4d251b5c87f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28995-cwe-862-missing-authorization-in-vi-a0f0d3e1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28995%3A%20Missing%20Authorization%20in%20viralloops%20Viral%20Loops%20WP%20Integration&amp;severity=null&amp;id=6842edda71f4d251b5c87f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28996-cwe-862-missing-authorization-in-th-6bc0df08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28996%3A%20Missing%20Authorization%20in%20Thad%20Allender%20GPP%20Slideshow&amp;severity=null&amp;id=6842edda71f4d251b5c87f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28997-cwe-862-missing-authorization-in-ex-ebd571e0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28997%3A%20Missing%20Authorization%20in%20EXEIdeas%20International%20WP%20AutoKeyword&amp;severity=null&amp;id=6842edda71f4d251b5c87f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29003-cwe-79-improper-neutralization-of-i-ff74a108</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29003%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mva7%20The%20Holiday%20Calendar&amp;severity=null&amp;id=6842edda71f4d251b5c87f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29005-cwe-352-cross-site-request-forgery--4e6081fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29005%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Weblizar%20-%20WordPress%20Themes%20%26amp%3B%20Plugin%20HR%20Management%20Lite&amp;severity=null&amp;id=6842eddb71f4d251b5c87f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29006-cwe-862-missing-authorization-in-ce-947a5918</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29006%3A%20Missing%20Authorization%20in%20centangle%20Direct%20Checkout%20for%20WooCommerce%20Lite&amp;severity=null&amp;id=6842eddb71f4d251b5c87f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29008-cwe-918-server-side-request-forgery-bfef1341</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29008%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ShawonPro%20SocialMark&amp;severity=null&amp;id=6842eddb71f4d251b5c87f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29010-cwe-862-missing-authorization-in-el-fefa28c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29010%3A%20Missing%20Authorization%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=null&amp;id=6842eddb71f4d251b5c87f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29011-cwe-79-improper-neutralization-of-i-194ec73c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CHR%20Designer%20YouTube%20Simple%20Gallery&amp;severity=null&amp;id=6842eddb71f4d251b5c87f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29013-cwe-862-missing-authorization-in-fa-fc10791e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29013%3A%20Missing%20Authorization%20in%20faaiq%20Custom%20Category%2FPost%20Type%20Post%20order&amp;severity=null&amp;id=6842eddb71f4d251b5c87f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30624-cwe-862-missing-authorization-in-wo-ddc42a32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30624%3A%20CWE-862%20Missing%20Authorization%20in%20WordLift%20WordLift&amp;severity=medium&amp;id=6842eddb71f4d251b5c87f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30625-cwe-79-improper-neutralization-of-i-9fecaa9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matt%20Pramschufer%20AppBanners&amp;severity=null&amp;id=6842eddb71f4d251b5c87f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30627-cwe-79-improper-neutralization-of-i-4721e9cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20regolithsjk%20Elegant%20Visitor%20Counter&amp;severity=null&amp;id=6842eddb71f4d251b5c87f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30629-cwe-352-cross-site-request-forgery--472dcfa6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30629%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Codehaveli%20Bitly%20URL%20Shortener&amp;severity=null&amp;id=6842eddb71f4d251b5c87f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30630-cwe-79-improper-neutralization-of-i-5a9c3f75</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pozzad%20Global%20Translator&amp;severity=null&amp;id=6842eddb71f4d251b5c87f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30632-cwe-352-cross-site-request-forgery--2375100b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30632%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pozzad%20Global%20Translator&amp;severity=null&amp;id=6842eddb71f4d251b5c87f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30634-cwe-79-improper-neutralization-of-i-35d39df8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30634%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IWEBIX%20WP%20Featured%20Content%20Slider&amp;severity=null&amp;id=6842eddb71f4d251b5c87fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30636-cwe-862-missing-authorization-in-ab-3b1a40e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30636%3A%20Missing%20Authorization%20in%20Ability%2C%20Inc%20Accessibility%20Suite&amp;severity=null&amp;id=6842eddb71f4d251b5c87fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30637-cwe-79-improper-neutralization-of-i-22de7a8a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30637%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Deetronix%20Booking%20Ultra%20Pro&amp;severity=null&amp;id=6842eddb71f4d251b5c87fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30638-cwe-79-improper-neutralization-of-i-d5a543d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PowieT%20Powie&apos;s%20Uptime%20Robot&amp;severity=null&amp;id=6842eddb71f4d251b5c87fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30927-cwe-862-missing-authorization-in-wo-a33ffb24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30927%3A%20Missing%20Authorization%20in%20Wordapp%20Team%20Wordapp&amp;severity=null&amp;id=6842eddb71f4d251b5c87fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30928-cwe-79-improper-neutralization-of-i-861a28d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vicchi%20WP%20Biographia&amp;severity=null&amp;id=6842eddc71f4d251b5c87fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30930-cwe-79-improper-neutralization-of-i-6879e462</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Unreal%20Themes%20ACF%3A%20Yandex%20Maps%20Field&amp;severity=null&amp;id=6842eddc71f4d251b5c87fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30931-cwe-79-improper-neutralization-of-i-5252cfbf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30931%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shamil%20Shafeev%20%C2%AB%D0%9F%D0%BE%D0%B4%D1%81%D0%BA%D0%B0%D0%B7%D0%BA%D0%B8%C2%BB%20%D0%BE%D1%82%20DaData.ru&amp;severity=null&amp;id=6842eddc71f4d251b5c87fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30932-cwe-862-missing-authorization-in-wp-cc2b1280</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30932%3A%20Missing%20Authorization%20in%20WP%20Compress%20WP%20Compress%20for%20MainWP&amp;severity=null&amp;id=6842eddc71f4d251b5c87fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30934-cwe-862-missing-authorization-in-ol-cef1cf89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30934%3A%20Missing%20Authorization&amp;severity=null&amp;id=6842eddc71f4d251b5c87fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30935-cwe-79-improper-neutralization-of-i-3104f3c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30935%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NickDuncan%20Contact%20Form&amp;severity=null&amp;id=6842eddc71f4d251b5c87fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30937-cwe-79-improper-neutralization-of-i-5df56929</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30937%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stefanledin%20Responsify%20WP&amp;severity=null&amp;id=6842eddc71f4d251b5c87fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30938-cwe-79-improper-neutralization-of-i-7b0fe41d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20broadly%20Broadly%20for%20WordPress&amp;severity=null&amp;id=6842eddc71f4d251b5c87fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30939-cwe-79-improper-neutralization-of-i-dae3f35d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Debashish%20IFrame%20Widget&amp;severity=null&amp;id=6842eddc71f4d251b5c87fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30940-cwe-79-improper-neutralization-of-i-25150c6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30940%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20melipayamak%20Melipayamak&amp;severity=medium&amp;id=6842eddc71f4d251b5c87fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30941-cwe-79-improper-neutralization-of-i-70541ac2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30941%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marvie%20Pons%20Pinterest%20Verify%20Meta%20Tag&amp;severity=null&amp;id=6842eddc71f4d251b5c87fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30942-cwe-79-improper-neutralization-of-i-eabd9e89</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30942%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Post%20Custom%20Templates%20Lite&amp;severity=null&amp;id=6842eddc71f4d251b5c87fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30945-cwe-862-missing-authorization-in-ta-d6964388</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30945%3A%20CWE-862%20Missing%20Authorization%20in%20taskbuilder%20Taskbuilder&amp;severity=medium&amp;id=6842eddc71f4d251b5c87fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30946-cwe-352-cross-site-request-forgery--56b90809</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30946%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Michael%20Cannon%20Custom%20Bulk%2FQuick%20Edit&amp;severity=null&amp;id=6842eddc71f4d251b5c87fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30948-cwe-352-cross-site-request-forgery--01dd5947</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30948%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Giraphix%20Creative%20Layouts%20for%20Elementor&amp;severity=null&amp;id=6842eddc71f4d251b5c87fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30950-cwe-79-improper-neutralization-of-i-086203de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30950%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Wham%20All%20Currencies%20for%20WooCommerce&amp;severity=null&amp;id=6842eddc71f4d251b5c87ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30951-cwe-79-improper-neutralization-of-i-9bfca4e3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stiofan%20BlockStrap%20Page%20Builder%20-%20Bootstrap%20Blocks&amp;severity=null&amp;id=6842eddc71f4d251b5c87ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30952-cwe-79-improper-neutralization-of-i-d65e9aaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdive%20Nexa%20Blocks&amp;severity=null&amp;id=6842eddd71f4d251b5c88000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30953-cwe-601-url-redirection-to-untruste-ab6628c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30953%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Salesforce&amp;severity=null&amp;id=6842eddd71f4d251b5c88003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30954-cwe-601-url-redirection-to-untruste-6a27478a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30954%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Constant%20Contact%20Plugin&amp;severity=null&amp;id=6842eddd71f4d251b5c88006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30956-cwe-352-cross-site-request-forgery--5ea021a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30956%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Booqable%20Rental%20Software%20Booqable%20Rental&amp;severity=null&amp;id=6842eddd71f4d251b5c88009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30957-cwe-862-missing-authorization-in-bu-ecad86e0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30957%3A%20Missing%20Authorization%20in%20BuddyDev%20Activity%20Plus%20Reloaded%20for%20BuddyPress&amp;severity=null&amp;id=6842eddd71f4d251b5c8800c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30958-cwe-862-missing-authorization-in-on-34fb390e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30958%3A%20Missing%20Authorization%20in%20onOffice%20GmbH%20onOffice%20for%20WP-Websites&amp;severity=null&amp;id=6842eddd71f4d251b5c8800f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30968-cwe-352-cross-site-request-forgery--23fb8c36</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30968%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jokerbr313%20Advanced%20Post%20List&amp;severity=null&amp;id=6842eddd71f4d251b5c88012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30974-cwe-862-missing-authorization-in-ak-98fa3545</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30974%3A%20Missing%20Authorization%20in%20Akhtarujjaman%20Shuvo%20Post%20Grid%20Master&amp;severity=null&amp;id=6842eddd71f4d251b5c88015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30976-cwe-918-server-side-request-forgery-da92a4e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30976%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpdive%20Nexa%20Blocks&amp;severity=null&amp;id=6842eddd71f4d251b5c88023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30977-cwe-79-improper-neutralization-of-i-f98424fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30977%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chaport%20Live%20Chat%20Chaport&amp;severity=null&amp;id=6842eddd71f4d251b5c88026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30978-cwe-862-missing-authorization-in-do-ac2f2eeb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30978%3A%20Missing%20Authorization%20in%20Dor%20Zuberi%20Slack%20Notifications%20by%20dorzki&amp;severity=null&amp;id=6842eddd71f4d251b5c88029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30980-cwe-352-cross-site-request-forgery--35d2b1a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30980%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alessandro%20Piconi%20Simple%20Keyword%20to%20Link&amp;severity=null&amp;id=6842eddd71f4d251b5c8802c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30981-cwe-352-cross-site-request-forgery--ac43704e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30981%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tggfref%20WP-Recall&amp;severity=medium&amp;id=6842eddd71f4d251b5c8802f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30986-cwe-352-cross-site-request-forgery--b1f6c737</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30986%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20_CreativeMedia_%20Elite%20Video%20Player&amp;severity=null&amp;id=6842eddd71f4d251b5c88032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30989-cwe-89-improper-neutralization-of-s-5f67db9f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30989%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Renzo%20Tejada%20Libro%20de%20Reclamaciones%20y%20Quejas&amp;severity=null&amp;id=6842eddd71f4d251b5c88035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30990-cwe-862-missing-authorization-in-th-2ebb93fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30990%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeHunk%20ThemeHunk&amp;severity=medium&amp;id=6842eddd71f4d251b5c88038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30991-cwe-79-improper-neutralization-of-i-f50b1487</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shahjada%20WPDM%20%E2%80%93%20Premium%20Packages&amp;severity=null&amp;id=6842eddd71f4d251b5c8803b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30994-cwe-352-cross-site-request-forgery--59dcccd5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30994%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=null&amp;id=6842eddd71f4d251b5c8803e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30995-cwe-352-cross-site-request-forgery--5c0b0953</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30995%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OTWthemes%20Widgetize%20Pages%20Light&amp;severity=null&amp;id=6842edde71f4d251b5c8804c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30997-cwe-918-server-side-request-forgery-bc2e54b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30997%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SmartDataSoft%20Car%20Repair%20Services&amp;severity=null&amp;id=6842edde71f4d251b5c8804f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30999-cwe-98-improper-control-of-filename-8c3a0934</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30999%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Fahad%20Mahmood%20External%20Store%20for%20Shopify&amp;severity=null&amp;id=6842edde71f4d251b5c88052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31000-cwe-862-missing-authorization-in-mi-c53f37b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31000%3A%20Missing%20Authorization%20in%20Miguel%20Fuentes%20Payment%20QR%20WooCommerce&amp;severity=null&amp;id=6842eddf71f4d251b5c880a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31025-cwe-79-improper-neutralization-of-i-36d5ee28</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blocksera%20Image%20Hover%20Effects%20Block&amp;severity=null&amp;id=6842eddf71f4d251b5c880a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49333-cwe-79-improper-neutralization-of-i-73534712</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wp.insider%20Simple%20Membership&amp;severity=null&amp;id=6842ede271f4d251b5c8818f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49332-cwe-352-cross-site-request-forgery--d4a309a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49332%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codepeople%20WP%20Time%20Slots%20Booking%20Form&amp;severity=null&amp;id=6842ede271f4d251b5c88186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49329-cwe-434-unrestricted-upload-of-file-db688820</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49329%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Agile%20Logix%20Store%20Locator%20WordPress&amp;severity=null&amp;id=6842ede271f4d251b5c88183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49328-cwe-89-improper-neutralization-of-s-46ba74e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49328%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Agile%20Logix%20Store%20Locator%20WordPress&amp;severity=null&amp;id=6842ede271f4d251b5c88180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49327-cwe-89-improper-neutralization-of-s-4f47644f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49327%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ruben%20Garcia%20ShortLinks%20Pro&amp;severity=null&amp;id=6842ede271f4d251b5c8817d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49326-cwe-89-improper-neutralization-of-s-bac80193</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49326%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ruben%20Garcia%20GamiPress&amp;severity=null&amp;id=6842ede271f4d251b5c8817a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49325-cwe-601-url-redirection-to-untruste-3d66a322</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49325%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Automattic%20Newspack%20Newsletters&amp;severity=null&amp;id=6842ede271f4d251b5c88177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49324-cwe-862-missing-authorization-in-pi-5bb6dca1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49324%3A%20Missing%20Authorization%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=6842ede271f4d251b5c88174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49323-cwe-89-improper-neutralization-of-s-df6c2ca8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49323%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=null&amp;id=6842ede271f4d251b5c88171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49322-cwe-79-improper-neutralization-of-i-27a41b80</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49322%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeedProd%20404%20Page%20by%20SeedProd&amp;severity=medium&amp;id=6842ede271f4d251b5c8816e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49320-cwe-862-missing-authorization-in-fr-6c0b0601</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49320%3A%20Missing%20Authorization%20in%20fraudlabspro%20FraudLabs%20Pro%20for%20WooCommerce&amp;severity=null&amp;id=6842ede171f4d251b5c8816b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49318-cwe-79-improper-neutralization-of-i-ce7a8adb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPtouch%20WPtouch&amp;severity=medium&amp;id=6842ede171f4d251b5c8815d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49317-cwe-352-cross-site-request-forgery--649885af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49317%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NTC%20WP%20Page%20Loading&amp;severity=null&amp;id=6842ede171f4d251b5c8815a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49315-cwe-89-improper-neutralization-of-s-eb38f02b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49315%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PersianScript%20Persian%20Woocommerce%20SMS&amp;severity=null&amp;id=6842ede171f4d251b5c88157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49314-cwe-79-improper-neutralization-of-i-62deb837</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49314%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ovatheme%20BRW&amp;severity=null&amp;id=6842ede171f4d251b5c88154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49313-cwe-98-improper-control-of-filename-031794d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49313%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20BRW&amp;severity=null&amp;id=6842ede171f4d251b5c88151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49311-cwe-79-improper-neutralization-of-i-40a03b3a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49311%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoolHappy%20The%20Events%20Calendar%20Countdown%20Addon&amp;severity=null&amp;id=6842ede171f4d251b5c8814e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49310-cwe-79-improper-neutralization-of-i-135ac36e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49310%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M%20A%20Vinoth%20Kumar%20Frontend%20Dashboard&amp;severity=null&amp;id=6842ede171f4d251b5c8814b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49309-cwe-79-improper-neutralization-of-i-645340c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49309%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Team%20Member&amp;severity=null&amp;id=6842ede171f4d251b5c88148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49308-cwe-98-improper-control-of-filename-276509f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49308%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Travel%20Engine%20WP%20Travel%20Engine&amp;severity=high&amp;id=6842ede171f4d251b5c88145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49307-cwe-98-improper-control-of-filename-c4f66c43</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49307%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Magazine3%20WP%20Multilang&amp;severity=null&amp;id=6842ede171f4d251b5c88142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49306-cwe-79-improper-neutralization-of-i-c7a758ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49306%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchsquare%20WP%20Social%20Widget&amp;severity=null&amp;id=6842ede171f4d251b5c88134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49305-cwe-79-improper-neutralization-of-i-d5ce274f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20impleCode%20Product%20Catalog%20Simple&amp;severity=null&amp;id=6842ede171f4d251b5c88131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49304-cwe-79-improper-neutralization-of-i-e6aa6df3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeManas%20Search%20with%20Typesense&amp;severity=null&amp;id=6842ede171f4d251b5c8812e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49301-cwe-79-improper-neutralization-of-i-cebc9397</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49301%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift&amp;severity=null&amp;id=6842ede171f4d251b5c8812b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49299-cwe-79-improper-neutralization-of-i-98dbee77</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49299%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPlugged.com%20WebHotelier&amp;severity=null&amp;id=6842ede171f4d251b5c88128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49298-cwe-79-improper-neutralization-of-i-ea55febc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49298%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=null&amp;id=6842ede171f4d251b5c88125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49294-cwe-201-insertion-of-sensitive-info-50889768</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49294%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20CodeRevolution%20Crawlomatic%20Multisite%20Scraper%20Post%20Generator&amp;severity=null&amp;id=6842ede071f4d251b5c88122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49293-cwe-862-missing-authorization-in-co-3adb7ad7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49293%3A%20Missing%20Authorization%20in%20CodeRevolution%20Crawlomatic%20Multisite%20Scraper%20Post%20Generator&amp;severity=null&amp;id=6842ede071f4d251b5c8811f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49292-cwe-1284-improper-validation-of-spe-74f49694</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49292%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Cozmoslabs%20Profile%20Builder&amp;severity=null&amp;id=6842ede071f4d251b5c8811c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49291-cwe-352-cross-site-request-forgery--dbc84971</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49291%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=null&amp;id=6842ede071f4d251b5c88119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49289-cwe-862-missing-authorization-in-ad-f38a15a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49289%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=null&amp;id=6842ede071f4d251b5c8810b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49288-cwe-862-missing-authorization-in-ru-da3bcf2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49288%3A%20Missing%20Authorization%20in%20Rustaurius%20Ultimate%20WP%20Mail&amp;severity=null&amp;id=6842ede071f4d251b5c88108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49287-cwe-862-missing-authorization-in-we-aa1bc219</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49287%3A%20Missing%20Authorization%20in%20WebToffee%20Product%20Feed%20for%20WooCommerce&amp;severity=null&amp;id=6842ede071f4d251b5c88105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49286-cwe-352-cross-site-request-forgery--e122fd96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49286%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Table%20Builder%20WP%20Table%20Builder&amp;severity=medium&amp;id=6842ede071f4d251b5c88102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49285-cwe-352-cross-site-request-forgery--cabaf598</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49285%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=null&amp;id=6842ede071f4d251b5c880ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49284-cwe-352-cross-site-request-forgery--05fbc034</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49284%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp-buy%20WP%20Maintenance%20Mode%20%26%20Site%20Under%20Construction&amp;severity=null&amp;id=6842ede071f4d251b5c880fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49283-cwe-352-cross-site-request-forgery--7679fda1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49283%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Matthias%20Nordwig%20Anti-spam%2C%20Spam%20protection%2C%20ReCaptcha%20for%20all%20forms%20and%20GDPR-compliant&amp;severity=null&amp;id=6842ede071f4d251b5c880f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49273-cwe-352-cross-site-request-forgery--f9dd02eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49273%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sminozzi%20WP%20Tools&amp;severity=null&amp;id=6842ede071f4d251b5c880f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49272-cwe-862-missing-authorization-in-se-69d9055e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49272%3A%20Missing%20Authorization%20in%20sergiotrinity%20Trinity%20Audio&amp;severity=null&amp;id=6842ede071f4d251b5c880f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49270-cwe-862-missing-authorization-in-ma-624d57f8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49270%3A%20Missing%20Authorization%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=null&amp;id=6842ede071f4d251b5c880f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49269-cwe-352-cross-site-request-forgery--78af0ee0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49269%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Anton%20Vanyukov%20Market%20Exporter&amp;severity=null&amp;id=6842ede071f4d251b5c880e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49268-cwe-862-missing-authorization-in-so-df96b667</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49268%3A%20Missing%20Authorization%20in%20Soft8Soft%20LLC%20Verge3D&amp;severity=null&amp;id=6842ede071f4d251b5c880df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49263-cwe-89-improper-neutralization-of-s-33eed615</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49263%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WCVendors%20WC%20Vendors%20Marketplace&amp;severity=null&amp;id=6842ede071f4d251b5c880dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49262-cwe-79-improper-neutralization-of-i-ef38343a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49262%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor&amp;severity=null&amp;id=6842ede071f4d251b5c880d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49250-cwe-94-improper-control-of-generati-d274ba63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49250%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20cmoreira%20Team%20Showcase&amp;severity=null&amp;id=6842eddf71f4d251b5c880d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49248-cwe-862-missing-authorization-in-cm-4a5a8ca3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49248%3A%20Missing%20Authorization%20in%20cmoreira%20Team%20Showcase&amp;severity=null&amp;id=6842eddf71f4d251b5c880d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49246-cwe-862-missing-authorization-in-cm-82c7b457</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49246%3A%20Missing%20Authorization%20in%20cmoreira%20Testimonials%20Showcase&amp;severity=null&amp;id=6842eddf71f4d251b5c880d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49244-cwe-79-improper-neutralization-of-i-567f33c4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49244%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vova%20Shortcodes%20Ultimate&amp;severity=null&amp;id=6842eddf71f4d251b5c880cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49243-cwe-79-improper-neutralization-of-i-4f3afb54</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49243%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sevenspark%20ShiftNav%20%E2%80%93%20Responsive%20Mobile%20Menu&amp;severity=null&amp;id=6842eddf71f4d251b5c880ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49242-cwe-79-improper-neutralization-of-i-284ad555</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49242%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sevenspark%20Bellows%20Accordion%20Menu&amp;severity=null&amp;id=6842eddf71f4d251b5c880c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49241-cwe-862-missing-authorization-in-bo-a43e6161</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49241%3A%20Missing%20Authorization%20in%20bobbingwide%20oik&amp;severity=null&amp;id=6842eddf71f4d251b5c880b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49240-cwe-862-missing-authorization-in-nk-f8e346a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49240%3A%20Missing%20Authorization%20in%20nK%20DocsPress&amp;severity=null&amp;id=6842eddf71f4d251b5c880b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49239-cwe-352-cross-site-request-forgery--2f3b1a0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49239%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=null&amp;id=6842eddf71f4d251b5c880b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49238-cwe-352-cross-site-request-forgery--d3ef4ac0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49238%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20everestthemes%20Everest%20Backup&amp;severity=null&amp;id=6842eddf71f4d251b5c880b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49237-cwe-352-cross-site-request-forgery--54efcf76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49237%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20POEditor%20POEditor&amp;severity=high&amp;id=6842eddf71f4d251b5c880ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49236-cwe-862-missing-authorization-in-ra-5cc69320</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49236%3A%20CWE-862%20Missing%20Authorization%20in%20raychat%20Raychat&amp;severity=medium&amp;id=6842eddf71f4d251b5c880aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49235-cwe-79-improper-neutralization-of-i-ee1a36ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rometheme%20RTMKit&amp;severity=null&amp;id=6842eddf71f4d251b5c880a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blitz-malware-a-tale-of-game-cheats-and-code-repos-84d98ae1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blitz%20Malware%3A%20A%20Tale%20of%20Game%20Cheats%20and%20Code%20Repositories&amp;severity=medium&amp;id=6844344671f4d251b50adf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5765-cross-site-scripting-in-code-project-bc4caf79</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5765%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=6842e15f1a426642debd4c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5764-cross-site-scripting-in-code-project-391d65b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5764%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=6842e15f1a426642debd4c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49072-cwe-502-deserialization-of-untruste-35c5c180</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49072%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Mr.%20Murphy&amp;severity=null&amp;id=6842e15f1a426642debd4c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49073-cwe-502-deserialization-of-untruste-9bc7d095</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49073%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Sweet%20Dessert&amp;severity=null&amp;id=6842e15f1a426642debd4c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5763-command-injection-in-tenda-cp3-ff92e051</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5763%3A%20Command%20Injection%20in%20Tenda%20CP3&amp;severity=medium&amp;id=6842e15f1a426642debd4c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5762-sql-injection-in-code-projects-patie-774a55f9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5762%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6842e15f1a426642debd4c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41361-cwe-400-uncontrolled-resource-consu-eb31fd97</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41361%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=high&amp;id=6842e15f1a426642debd4ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41367-cwe-79-improper-neutralization-of-i-86928329</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842e15f1a426642debd4ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41366-cwe-942-permissive-cross-domain-pol-3cf89f0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41366%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842df081a426642debcb516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41365-cwe-94-improper-control-of-generati-be0aae07</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41365%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842df081a426642debcb514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41364-cwe-79-improper-neutralization-of-i-6387eed3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842df081a426642debcb512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48329-cwe-79-improper-neutralization-of-i-711261d1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48329%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daman%20Jeet%20Real%20Time%20Validation%20for%20Gravity%20Forms&amp;severity=null&amp;id=6842df081a426642debcb51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41363-cwe-942-permissive-cross-domain-pol-171355bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41363%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842df081a426642debcb510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39358-cwe-502-deserialization-of-untruste-158428cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39358%3A%20Deserialization%20of%20Untrusted%20Data%20in%20teastudio.pl%20WP%20Posts%20Carousel&amp;severity=null&amp;id=6842df081a426642debcb50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41362-cwe-94-improper-control-of-generati-ddd8f2a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41362%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842df081a426642debcb50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47584-cwe-502-deserialization-of-untruste-87c26e3b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47584%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=6842df081a426642debcb518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41360-cwe-400-uncontrolled-resource-consu-4dbbec96</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41360%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=high&amp;id=6842df031a426642debc9388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47586-cwe-98-improper-control-of-filename-fb1a6eeb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47586%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Motors%20-%20Events&amp;severity=null&amp;id=6842df081a426642debcb4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48335-cwe-862-missing-authorization-in-cy-0e1385a1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48335%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Plus&amp;severity=null&amp;id=6842df081a426642debcb4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48328-cwe-352-cross-site-request-forgery--16c8bd89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48328%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Daman%20Jeet%20Real%20Time%20Validation%20for%20Gravity%20Forms&amp;severity=null&amp;id=6842df081a426642debcb4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49076-cwe-79-improper-neutralization-of-i-98a83e48</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=null&amp;id=6842df081a426642debcb4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49075-cwe-79-improper-neutralization-of-i-da4e38bf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Wishlist&amp;severity=null&amp;id=6842df081a426642debcb4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49074-cwe-79-improper-neutralization-of-i-1368e3b2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49074%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Abu%20Huraira%20Bin%20Aman%20WidgetKit&amp;severity=null&amp;id=6842df081a426642debcb4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49068-cwe-79-improper-neutralization-of-i-fddbce76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49068%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=null&amp;id=6842df081a426642debcb4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49067-cwe-79-improper-neutralization-of-i-3ae770b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49067%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NasaTheme%20Nasa%20Core&amp;severity=null&amp;id=6842df081a426642debcb4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5761-sql-injection-in-phpgurukul-bp-monit-27d5356a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5761%3A%20SQL%20Injection%20in%20PHPGurukul%20BP%20Monitoring%20Management%20System&amp;severity=medium&amp;id=6842df081a426642debcb4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49077-cwe-352-cross-site-request-forgery--219eaf43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49077%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeHigh%20Dynamic%20Pricing%20and%20Discount%20Rules&amp;severity=null&amp;id=6842df031a426642debc93ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48337-cwe-862-missing-authorization-in-qu-95c985e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48337%3A%20CWE-862%20Missing%20Authorization%20in%20QuickcabWP%20QuickCab&amp;severity=medium&amp;id=6842df031a426642debc93a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5239-cwe-79-improper-neutralization-of-in-edf13c9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeatelier%20Domain%20For%20Sale%20%E2%80%93%20Sell%20Domains%20with%20Landing%20Pages%2C%20Offers%20%26%20Inquiries&amp;severity=medium&amp;id=6842df031a426642debc93b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5760-cwe-256-plaintext-storage-of-a-passw-6555c413</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5760%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20eskapism%20Simple%20History%20%E2%80%93%20Track%2C%20Log%2C%20and%20Audit%20WordPress%20Changes&amp;severity=medium&amp;id=6842df031a426642debc93b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-open-source-to-open-threat-tracking-chaos-rat-7843c7f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20open-source%20to%20open%20threat%3A%20Tracking%20Chaos%20RAT%E2%80%99s%20evolution&amp;severity=medium&amp;id=6846bdb07b622a9fdf66b6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-apt37-attack-case-disguised-as-a-think-999bea35</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20APT37%20Attack%20Case%20Disguised%20as%20a%20Think%20Tank%20for%20National%20Security%20Strategy%20in%20South%20Korea%20(Operation%20ToyBox%20Story)&amp;severity=medium&amp;id=6843376d71f4d251b5d88f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-analysis-dcrat-presence-growing-in-latin-am-1567894b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Analysis%3A%20DCRat%20presence%20growing%20in%20Latin%20America&amp;severity=medium&amp;id=6846bdb07b622a9fdf66b72c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bladedfeline-whispering-in-the-dark-b294c74b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BladedFeline%3A%20Whispering%20in%20the%20dark&amp;severity=medium&amp;id=6846bdb07b622a9fdf66b737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-pasteee-to-deploy-xworm-and-asyncrat-acros-2ca7caff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20Paste.ee%20to%20Deploy%20XWorm%20and%20AsyncRAT%20Across%20Global%20C2%20Infrastructure&amp;severity=medium&amp;id=6846bdb07b622a9fdf66b740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5759-sql-injection-in-phpgurukul-local-se-1d3d886f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5759%3A%20SQL%20Injection%20in%20PHPGurukul%20Local%20Services%20Search%20Engine%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc93bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5758-sql-injection-in-sourcecodester-open-7eda2887</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5758%3A%20SQL%20Injection%20in%20SourceCodester%20Open%20Source%20Clinic%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc93ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5757-cross-site-scripting-in-code-project-346516d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5757%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Traffic%20Offense%20Reporting%20System&amp;severity=medium&amp;id=6842c652182aa0cae20c28c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pathwiper-data-wiper-malware-disrupts-ukrainia-f61db96e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20PathWiper%20Data%20Wiper%20Malware%20Disrupts%20Ukrainian%20Critical%20Infrastructure%20in%202025%20Attack&amp;severity=critical&amp;id=6842c2d5182aa0cae20baa17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5756-sql-injection-in-code-projects-real--3358a8c8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5756%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=6842bf69182aa0cae20b29e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5755-sql-injection-in-sourcecodester-open-e3f46f88</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5755%3A%20SQL%20Injection%20in%20SourceCodester%20Open%20Source%20Clinic%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc93d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48784-cwe-862-missing-authorization-in-so-5b4bf53e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48784%3A%20CWE-862%20Missing%20Authorization%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=high&amp;id=6842df031a426642debc93ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48783-cwe-73-external-control-of-file-nam-74017ac4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48783%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=high&amp;id=6842df031a426642debc93c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48782-cwe-434-unrestricted-upload-of-file-77acfb25</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48782%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=critical&amp;id=6842df031a426642debc93c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48781-cwe-73-external-control-of-file-nam-e59cd5ff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48781%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=high&amp;id=6842b857182aa0cae20a247f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48780-cwe-502-deserialization-of-untruste-b05f7a39</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48780%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=critical&amp;id=6842b4bf182aa0cae209a476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5192-cwe-306-missing-authentication-for-c-e8ed1d4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5192%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=critical&amp;id=6842df031a426642debc947f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5739-buffer-overflow-in-totolink-x15-b0ca0a14</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5739%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6842df031a426642debc9484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5738-buffer-overflow-in-totolink-x15-fbc371db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5738%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6842b14e182aa0cae20925c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5737-buffer-overflow-in-totolink-x15-5b894260</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5737%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6842aa46182aa0cae2082638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3365-cwe-23-relative-path-traversal-in-b--e57b3055</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3365%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20B.%20Braun%20Melsungen%20AG%20OnlineSuite&amp;severity=critical&amp;id=6842df031a426642debc9489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3322-cwe-917-improper-neutralization-of-s-4705a052</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3322%3A%20CWE-917%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20B.%20Braun%20Melsungen%20AG%20OnlineSuite&amp;severity=critical&amp;id=6842a6a5182aa0cae207a77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3321-cwe-798-use-of-hard-coded-credential-fed00787</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3321%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20B.%20Braun%20Melsungen%20AG%20OnlineSuite&amp;severity=critical&amp;id=6842a32b182aa0cae2072843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5736-buffer-overflow-in-totolink-x15-25e55623</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5736%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6842df031a426642debc9493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5735-buffer-overflow-in-totolink-x15-0e9e26d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5735%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6842df031a426642debc948e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5734-buffer-overflow-in-totolink-x15-10d16bec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5734%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68429c2d182aa0cae2061714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5732-cross-site-request-forgery-in-code-p-c263763d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5732%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20Traffic%20Offense%20Reporting%20System&amp;severity=medium&amp;id=68429c2d182aa0cae2061712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5729-sql-injection-in-code-projects-healt-393ad6b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5729%3A%20SQL%20Injection%20in%20code-projects%20Health%20Center%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc9498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5728-unrestricted-upload-in-sourcecodeste-d5aa31df</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5728%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Open%20Source%20Clinic%20Management%20System&amp;severity=medium&amp;id=68429530182aa0cae20512fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48908-cwe-567-unsynchronized-access-to-sh-3871fef2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48908%3A%20CWE-567%20Unsynchronized%20Access%20to%20Shared%20Data%20in%20a%20Multithreaded%20Context%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68429199182aa0cae20492c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48911-cwe-266-incorrect-privilege-assignm-1e361ad3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48911%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68429199182aa0cae20492cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48910-cwe-122-heap-based-buffer-overflow--4c037146</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48910%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68429199182aa0cae20492ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48909-cwe-287-improper-authentication-in--a216a009</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48909%3A%20CWE-287%20Improper%20Authentication%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68429199182aa0cae20492c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5686-cwe-80-improper-neutralization-of-sc-7197afdf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5686%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20andreyk%20Paged%20Gallery&amp;severity=medium&amp;id=68429199182aa0cae20492f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5563-cwe-89-improper-neutralization-of-sp-37c2e439</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5563%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberscorp%20WP-Addpub&amp;severity=medium&amp;id=68429199182aa0cae20492ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5486-cwe-862-missing-authorization-in-drs-a7a4e46f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5486%3A%20CWE-862%20Missing%20Authorization%20in%20dr_scythe%20WP%20Email%20Debug&amp;severity=critical&amp;id=68429199182aa0cae20492e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5541-cwe-79-improper-neutralization-of-in-d37b8d19</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5541%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frold%20Runners%20Log&amp;severity=medium&amp;id=68429199182aa0cae20492eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5565-cwe-79-improper-neutralization-of-in-210927aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jason-lau%20Hide%20It&amp;severity=medium&amp;id=68429199182aa0cae20492ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2935-cwe-352-cross-site-request-forgery-c-7a105b72</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2935%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webguyio%20Stop%20Spammers%20Classic&amp;severity=medium&amp;id=68429199182aa0cae20492c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5538-cwe-79-improper-neutralization-of-in-1d3e7adf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5538%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cais%20BNS%20Featured%20Category&amp;severity=medium&amp;id=68429199182aa0cae20492e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4964-cwe-89-improper-neutralization-of-sp-bd349b10</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4964%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hk1993%20WP%20Online%20Users%20Stats&amp;severity=medium&amp;id=68429199182aa0cae20492ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4966-cwe-352-cross-site-request-forgery-c-97abecbe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4966%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hk1993%20WP%20Online%20Users%20Stats&amp;severity=medium&amp;id=68429199182aa0cae20492d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5018-cwe-862-missing-authorization-in-hiv-eaa772f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5018%3A%20CWE-862%20Missing%20Authorization%20in%20hivesupport%20Hive%20Support%20%7C%20AI-Powered%20Help%20Desk%2C%20Live%20Chat%20and%20Chatbot&amp;severity=high&amp;id=68429199182aa0cae20492d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5536-cwe-79-improper-neutralization-of-in-8ed3584e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5536%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsemeteys%20Freemind%20Viewer&amp;severity=medium&amp;id=68429199182aa0cae20492e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5703-cwe-79-improper-neutralization-of-in-145650de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20malcolm-oph%20StageShow&amp;severity=medium&amp;id=68429199182aa0cae20492fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5699-cwe-79-improper-neutralization-of-in-8211e761</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5699%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gsaraiva%20Developer%20Formatter&amp;severity=medium&amp;id=68429199182aa0cae20492f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5586-cwe-79-improper-neutralization-of-in-75ca2abd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5586%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tushargohel%20WordPress%20Ajax%20Load%20More%20and%20Infinite%20Scroll&amp;severity=medium&amp;id=68429199182aa0cae20492f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5019-cwe-352-cross-site-request-forgery-c-e4fc9d57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5019%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hivesupport%20Hive%20Support%20%7C%20AI-Powered%20Help%20Desk%2C%20Live%20Chat%20and%20Chatbot&amp;severity=medium&amp;id=68429199182aa0cae20492d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5534-cwe-79-improper-neutralization-of-in-dd661d22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5534%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20calebzahnd%20ESV%20Bible%20Shortcode%20for%20WordPress&amp;severity=medium&amp;id=68429199182aa0cae20492e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5533-cwe-79-improper-neutralization-of-in-7d8ce918</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5533%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajay%20Knowledge%20Base&amp;severity=medium&amp;id=68429199182aa0cae20492e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58114-cwe-770-allocation-of-resources-wit-e74a13b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58114%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68429199182aa0cae20492c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48907-cwe-248-uncaught-exception-in-huawe-922e0545</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48907%3A%20CWE-248%20Uncaught%20Exception%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6842df031a426642debc955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48906-cwe-290-authentication-bypass-by-sp-8719f8ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48906%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6842df031a426642debc9556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48905-cwe-1068-inconsistency-between-impl-5d6f4534</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48905%3A%20CWE-1068%20Inconsistency%20Between%20Implementation%20and%20Documented%20Design%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6842df031a426642debc94a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48904-cwe-288-authentication-bypass-using-c16218ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48904%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6842df031a426642debc94a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48903-cwe-264-permissions-privileges-and--5bb9a65a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48903%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6842df031a426642debc94a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48902-cwe-118-incorrect-access-of-indexab-895939c3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48902%3A%20CWE-118%20Incorrect%20Access%20of%20Indexable%20Resource%20(&apos;Range%20Error&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68428e13182aa0cae204134a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5727-cross-site-scripting-in-sourcecodest-e2561674</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5727%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc9560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5726-cross-site-scripting-in-sourcecodest-2eb86641</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5726%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc9565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2921-cwe-89-sql-injection-in-unknown-shor-dbba38d6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2921%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Short%20URL&amp;severity=high&amp;id=6842871a182aa0cae2031526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5725-cross-site-scripting-in-sourcecodest-6de50921</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5725%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc956a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5724-cross-site-scripting-in-sourcecodest-65554161</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5724%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=68427fed182aa0cae20216a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1777-cwe-862-missing-authorization-in-sea-966dd036</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1777%3A%20CWE-862%20Missing%20Authorization%20in%20SeaTheme%20BM%20Content%20Builder&amp;severity=medium&amp;id=6842df031a426642debc956f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1778-cwe-862-missing-authorization-in-sea-5bab4eb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1778%3A%20CWE-862%20Missing%20Authorization%20in%20SeaTheme%20Art%20Theme&amp;severity=medium&amp;id=6842df031a426642debc9574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5723-cross-site-scripting-in-sourcecodest-07453b7a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5723%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6842790a182aa0cae201169b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5722-cross-site-scripting-in-sourcecodest-b048a41a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5722%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc9579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36513-cross-site-request-forgery-csrf-in--0f6bcacd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36513%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20i-PRO%20Co.%2C%20Ltd.%20Surveillance%20cameras%20provided%20by%20i-PRO%20Co.%2C%20Ltd.&amp;severity=medium&amp;id=684271ea182aa0cae2001472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5721-cross-site-scripting-in-sourcecodest-a90b5da0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5721%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=68426aef182aa0cae2ff170d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5733-cwe-201-insertion-of-sensitive-infor-81e828dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5733%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20webnus%2F%20Modern%20Events%20Calendar%20Lite&amp;severity=medium&amp;id=6842df031a426642debc9583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5719-cwe-306-missing-authentication-for-c-7a23e015</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5719%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20vivo%20Wallet&amp;severity=medium&amp;id=6842df031a426642debc957e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5716-sql-injection-in-sourcecodester-open-0922611c</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5716%3A%20SQL%20Injection%20in%20SourceCodester%20Open%20Source%20Clinic%20Management%20System&amp;severity=medium&amp;id=68426758182aa0cae2fe9807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46941-cwe-281-improper-preservation-of-pe-5ef4341b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46941%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20vivo%20SystemUI&amp;severity=medium&amp;id=684263cf182aa0cae2fe1948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5715-missing-critical-step-in-authenticat-669579bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5715%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Signal%20App&amp;severity=low&amp;id=6842df031a426642debc9635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5714-path-traversal-in-soluescoop-isolues-5c6d4c9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5714%3A%20Path%20Traversal%20in%20Solu%C3%A7%C3%B5esCoop%20iSolu%C3%A7%C3%B5esWEB&amp;severity=medium&amp;id=6842df031a426642debc9630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5713-cross-site-scripting-in-soluescoop-i-d6356650</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5713%3A%20Cross%20Site%20Scripting%20in%20Solu%C3%A7%C3%B5esCoop%20iSolu%C3%A7%C3%B5esWEB&amp;severity=medium&amp;id=6842df031a426642debc963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5712-sql-injection-in-sourcecodester-open-9cb34bf5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5712%3A%20SQL%20Injection%20in%20SourceCodester%20Open%20Source%20Clinic%20Management%20System&amp;severity=medium&amp;id=68425ce5182aa0cae2fd1a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5711-sql-injection-in-code-projects-real--ed1dfc2a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5711%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=68425246182aa0cae2fb8eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5710-sql-injection-in-code-projects-real--3093d0ab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5710%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc964e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5709-sql-injection-in-code-projects-real--84d1f621</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5709%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc9649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56343-cwe-771-missing-reference-to-active-c0c116c0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56343%3A%20CWE-771%20Missing%20Reference%20to%20Active%20Allocated%20Resource%20in%20IBM%20Verify%20Identity%20Access%20Digital%20Credentials&amp;severity=medium&amp;id=6842df031a426642debc9644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56342-cwe-209-generation-of-error-message-a3dee845</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56342%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Verify%20Identity%20Access%20Digital%20Credentials&amp;severity=medium&amp;id=6842df031a426642debc963f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22330-cwe-521-weak-password-requirements--554afd4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22330%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20IBM%20Security%20Verify%20Governance&amp;severity=medium&amp;id=68424b45182aa0cae2fa91cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5708-sql-injection-in-code-projects-real--8e2a3127</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5708%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=684240e2182aa0cae2f9148d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5707-sql-injection-in-phpgurukul-human-me-dbb344ec</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5707%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=684239bc182aa0cae2f81689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5706-sql-injection-in-phpgurukul-human-me-2342a214</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5706%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=684236c0182aa0cae2f79812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-06-854f15ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-06&amp;severity=medium&amp;id=68490f133cd93dcca831da51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49599-cwe-863-incorrect-authorization-in--37b43352</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49599%3A%20CWE-863%20Incorrect%20Authorization%20in%20Huawei%20EG8141A5&amp;severity=medium&amp;id=68431b5671f4d251b5d2d3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5705-sql-injection-in-code-projects-real--1fccd210</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5705%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=68422ba0182aa0cae2f6179a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5704-sql-injection-in-code-projects-real--ffcaad62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5704%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=684224a3182aa0cae2f51a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc1151-exploiting-roundcube-to-steal-user-credent-a6f122c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC1151%20exploiting%20Roundcube%20to%20steal%20user%20credentials%20in%20a%20spearphishing%20campaign&amp;severity=medium&amp;id=684298b5182aa0cae2059206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49012-cwe-287-improper-authentication-in--1dba70bc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49012%3A%20CWE-287%3A%20Improper%20Authentication%20in%20himmelblau-idm%20himmelblau&amp;severity=medium&amp;id=68421d96182aa0cae2f41d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5698-sql-injection-in-brilliance-golden-l-39772c27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5698%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=68421696182aa0cae2f320a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cards-are-still-the-weakest-link-ef662bae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cards%20Are%20Still%20the%20Weakest%20Link&amp;severity=medium&amp;id=68421312182aa0cae2f2a256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5697-sql-injection-in-brilliance-golden-l-56b2680b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5697%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=68420f89182aa0cae2f2232b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5696-sql-injection-in-brilliance-golden-l-4884cf5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5696%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=68420f89182aa0cae2f22329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-threat-actors-exploit-human-trust-a-breakdown--7d69d9f4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Threat%20Actors%20Exploit%20Human%20Trust%3A%20A%20Breakdown%20of%20the%20&apos;Prove%20You%20Are%20Human&apos;%20Malware%20Scheme&amp;severity=medium&amp;id=68420f7f182aa0cae2f222cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5695-command-injection-in-flir-ax8-65098767</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5695%3A%20Command%20Injection%20in%20Teledyne%20FLIR%20AX8&amp;severity=medium&amp;id=684208c0182aa0cae2f126f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47966-cwe-200-exposure-of-sensitive-infor-89cfa1e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47966%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Power%20Automate%20for%20Desktop&amp;severity=critical&amp;id=68420613182aa0cae2f0a905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48133-cwe-862-missing-authorization-in-un-ab87539c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48133%3A%20Missing%20Authorization%20in%20Uncanny%20Owl%20Uncanny%20Automator&amp;severity=null&amp;id=684204e8182aa0cae2f0a5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5694-sql-injection-in-phpgurukul-human-me-d2fb8030</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5694%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=68420061182aa0cae2ef99cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/old-atampt-data-leak-repackaged-to-link-ssns-dobs--0da8628b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Old%20AT%26amp%3BT%20data%20leak%20repackaged%20to%20link%20SSNs%2C%20DOBs%20to%2049M%20phone%20numbers&amp;severity=medium&amp;id=6842004e182aa0cae2ef99c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5693-sql-injection-in-phpgurukul-human-me-7e04cb03</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5693%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc96fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5685-stack-based-buffer-overflow-in-tenda-c2add8af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5685%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=6841fb73182aa0cae2ef1b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43026-cwe-281-improper-preservation-of-pe-501cb2cd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43026%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20HP%2C%20Inc.%20HP%20Support%20Assistant&amp;severity=high&amp;id=6841f369182aa0cae2ee1e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5680-deserialization-in-shenzhen-dashi-to-5df6ec20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5680%3A%20Deserialization%20in%20Shenzhen%20Dashi%20Tongzhou%20Information%20Technology%20AgileBPM&amp;severity=medium&amp;id=6841f6f6182aa0cae2ee9c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5745-vulnerability-in-the-gnu-c-library-g-7e49ef3c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5745%3A%20Vulnerability%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=6841efec182aa0cae2ed9f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5679-deserialization-in-shenzhen-dashi-to-47b56bdf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5679%3A%20Deserialization%20in%20Shenzhen%20Dashi%20Tongzhou%20Information%20Technology%20AgileBPM&amp;severity=medium&amp;id=6841ec61182aa0cae2ed1f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5677-sql-injection-in-campcodes-online-re-90f72aec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5677%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=6841ec61182aa0cae2ed1efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5676-sql-injection-in-campcodes-online-re-9fdf56b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5676%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=6841ec61182aa0cae2ed1efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5675-sql-injection-in-campcodes-online-te-64ce7848</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5675%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Teacher%20Record%20Management%20System&amp;severity=medium&amp;id=6841efec182aa0cae2ed9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5702-vulnerability-in-the-gnu-c-library-g-c1d3dae6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5702%3A%20Vulnerability%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=6842df031a426642debc965d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5674-sql-injection-in-code-projects-patie-3e28c21c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5674%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6841e8e0182aa0cae2eca02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46258-cwe-862-missing-authorization-in-bd-fedaa421</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46258%3A%20CWE-862%20Missing%20Authorization%20in%20BdThemes%20Element%20Pack%20Pro&amp;severity=medium&amp;id=6841d76c182aa0cae2e986cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46257-cwe-352-cross-site-request-forgery--cf7a7653</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46257%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BdThemes%20Element%20Pack%20Pro&amp;severity=medium&amp;id=6841d76c182aa0cae2e986cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unsecured-database-exposes-data-of-36-million-pass-2c4b4f8f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unsecured%20Database%20Exposes%20Data%20of%203.6%20Million%20Passion.io%20Creators&amp;severity=medium&amp;id=6841d75c182aa0cae2e986ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5672-buffer-overflow-in-totolink-n302r-pl-100e7dde</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5672%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N302R%20Plus&amp;severity=high&amp;id=6841d76c182aa0cae2e986d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5671-buffer-overflow-in-totolink-n302r-pl-58e30380</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5671%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N302R%20Plus&amp;severity=high&amp;id=6841d76c182aa0cae2e986d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5670-sql-injection-in-phpgurukul-medical--deec173a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5670%3A%20SQL%20Injection%20in%20PHPGurukul%20Medical%20Card%20Generation%20System&amp;severity=medium&amp;id=6841d069182aa0cae2e88601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-phantom-enigma-280fd35e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Phantom%20Enigma&amp;severity=medium&amp;id=6841d3cd182aa0cae2e9066b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49009-cwe-532-insertion-of-sensitive-info-b6262809</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49009%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Erudika%20para&amp;severity=medium&amp;id=6841cccd182aa0cae2e789a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48493-cwe-532-insertion-of-sensitive-info-2c438c0c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48493%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20yiisoft%20yii2-redis&amp;severity=medium&amp;id=6841c953182aa0cae2e70b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5669-sql-injection-in-phpgurukul-medical--dceeeb14</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5669%3A%20SQL%20Injection%20in%20PHPGurukul%20Medical%20Card%20Generation%20System&amp;severity=medium&amp;id=6841d76c182aa0cae2e986d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5668-sql-injection-in-phpgurukul-medical--c1696eea</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5668%3A%20SQL%20Injection%20in%20PHPGurukul%20Medical%20Card%20Generation%20System&amp;severity=medium&amp;id=6841d76c182aa0cae2e986d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-in-anthropics-mcp-full-schema-pois-070ed197</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20in%20Anthropic%E2%80%99s%20MCP%3A%20Full-Schema%20Poisoning%20%2B%20Secret-Leaking%20Tool%20Attacks%20(PoC%20Inside)&amp;severity=critical&amp;id=6841c5b3182aa0cae2e68ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5667-buffer-overflow-in-freefloat-ftp-ser-2451a293</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5667%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6841d069182aa0cae2e88629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-identified-wiper-malware-pathwiper-targets-c-334010a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20identified%20wiper%20malware%20&apos;PathWiper&apos;%20targets%20critical%20infrastructure%20in%20Ukraine&amp;severity=medium&amp;id=6841d3cd182aa0cae2e9072d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/be-careful-with-fake-zoom-client-downloads-f613387b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Be%20Careful%20With%20Fake%20Zoom%20Client%20Downloads&amp;severity=medium&amp;id=6841d3cd182aa0cae2e90730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5666-buffer-overflow-in-freefloat-ftp-ser-e206343e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5666%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6841bb1f182aa0cae2e51159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5665-buffer-overflow-in-freefloat-ftp-ser-ad03aa4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5665%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6841b441182aa0cae2e41445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5664-buffer-overflow-in-freefloat-ftp-ser-ae617a31</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5664%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6841ad2e182aa0cae2e31725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5663-sql-injection-in-phpgurukul-auto-tax-97835466</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5663%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=6841a64c182aa0cae2e21746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0691-cwe-284-improper-access-control-in-d-5e63c6f2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0691%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=6841a29c182aa0cae2e196c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5382-cwe-284-improper-access-control-in-d-42aa8ab4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5382%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=68419f11182aa0cae2e11689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3768-cwe-284-improper-access-control-in-d-2cd47842</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3768%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=68419f11182aa0cae2e11687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5661-cross-site-scripting-in-code-project-0b05fd7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5661%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Traffic%20Offense%20Reporting%20System&amp;severity=medium&amp;id=68419f11182aa0cae2e1168b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stopransomware-play-ransomware-2fd0f321</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StopRansomware%3A%20Play%20Ransomware&amp;severity=medium&amp;id=68419f00182aa0cae2e115ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27754-cwe-79-improper-neutralization-of-i-513ab45b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSBlog%20component%20for%20Joomla&amp;severity=medium&amp;id=6841a29c182aa0cae2e196d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27753-cwe-89-improper-neutralization-of-s-0dd27303</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27753%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rsjoomla.com%20RSMediaGallery%20component%20for%20Joomla&amp;severity=medium&amp;id=6841d069182aa0cae2e8865f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27445-cwe-35-path-traversal-in-rsjoomlaco-7a096a29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27445%3A%20CWE-35%3A%20Path%20Traversal%20in%20rsjoomla.com%20RSFirewall%20component%20for%20Joomla&amp;severity=medium&amp;id=68419b86182aa0cae2e09759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30084-cwe-79-improper-neutralization-of-i-6f72feef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSMail!%20component%20for%20Joomla&amp;severity=medium&amp;id=6841d069182aa0cae2e88661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5660-sql-injection-in-phpgurukul-complain-accd368c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5660%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=6841d069182aa0cae2e88655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5659-sql-injection-in-phpgurukul-complain-dab77b88</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5659%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=684197f2182aa0cae2e016e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5658-sql-injection-in-phpgurukul-complain-e8640636</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5658%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=6841911a182aa0cae2df17b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-email-scam-alert-fake-bookingcom-emails-d-4412d5c8</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Email%20Scam%20Alert%3A%20Fake%20Booking.com%20Emails%20Deliver%20Malware%20in%20New%20Attack&amp;severity=medium&amp;id=68418a1c182aa0cae2ddeec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5657-sql-injection-in-phpgurukul-complain-ec1438e3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5657%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68418d7c182aa0cae2de91bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2011-10007-cwe-78-improper-neutralization-of-s-3230ce14</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2011-10007%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RCLAMP%20File%3A%3AFind%3A%3ARule&amp;severity=high&amp;id=68418a24182aa0cae2ddeec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5656-sql-injection-in-phpgurukul-complain-d5037d6c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5656%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68418666182aa0cae2dd4bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5341-cwe-79-improper-neutralization-of-in-70662812</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5341%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=68418666182aa0cae2dd4bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5701-cwe-862-missing-authorization-in-sit-8ee62042</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5701%3A%20CWE-862%20Missing%20Authorization%20in%20siteheart%20HyperComments&amp;severity=high&amp;id=68418666182aa0cae2dd4bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5655-sql-injection-in-phpgurukul-complain-8a202f5e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5655%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccc9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5654-sql-injection-in-phpgurukul-complain-2e7797e4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5654%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5653-sql-injection-in-phpgurukul-complain-9aebd1fc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5653%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4568-cwe-89-improper-neutralization-of-sp-537cc914</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4568%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Trol%20InterMedia%202ClickPortal&amp;severity=critical&amp;id=68416e1d182aa0cae2d97f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5652-sql-injection-in-phpgurukul-complain-dbf46620</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5652%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68416e1d182aa0cae2d97f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5651-cross-site-scripting-in-code-project-0bf2ba89</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5651%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Traffic%20Offense%20Reporting%20System&amp;severity=medium&amp;id=68416e1d182aa0cae2d97f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5650-sql-injection-in-1000projects-online-8aa28835</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5650%3A%20SQL%20Injection%20in%201000projects%20Online%20Notice%20Board&amp;severity=medium&amp;id=684166d5182aa0cae2d879ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-arrested-for-breaching-5000-hosting-account-1f5c1cf9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20arrested%20for%20breaching%205%2C000%20hosting%20accounts%20to%20mine%20crypto&amp;severity=medium&amp;id=6841633c182aa0cae2d7fa00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraines-military-intelligence-agency-stole-44gb-o-7bb8f27e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%E2%80%99s%20military%20intelligence%20agency%20stole%204.4GB%20of%20highly%20classified%20internal%20data%20from%20Tupolev&amp;severity=medium&amp;id=684166cb182aa0cae2d879e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-offers-10m-for-tips-on-state-hackers-tied-to-re-b21b174f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20offers%20%2410M%20for%20tips%20on%20state%20hackers%20tied%20to%20RedLine%20malware&amp;severity=medium&amp;id=68416a5d182aa0cae2d8f9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-claims-kettering-health-breac-5873fabc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20ransomware%20claims%20Kettering%20Health%20breach%2C%20leaks%20stolen%20data&amp;severity=medium&amp;id=68416e01182aa0cae2d97f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5649-improper-access-controls-in-sourceco-bab8d824</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5649%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5648-memory-corruption-in-radare2-689c422a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5648%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=68415fd9182aa0cae2d772c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5647-memory-corruption-in-radare2-4d184fc2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5647%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=684158b1182aa0cae2d67439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-spyware-that-helped-to-compromise-a-sy-c1177956</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Spyware%20That%20Helped%20to%20Compromise%20a%20Syrian%20Army%20from%20Within&amp;severity=medium&amp;id=684151b4182aa0cae2d57264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5646-memory-corruption-in-radare2-3aaa88fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5646%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=684151b1182aa0cae2d5725e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5645-memory-corruption-in-radare2-c5a27eb3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5645%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=68414aaa182aa0cae2d47303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5644-use-after-free-in-radare2-12763e70</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5644%3A%20Use%20After%20Free%20in%20Radare2&amp;severity=low&amp;id=68418437182aa0cae2dccca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5643-memory-corruption-in-radare2-e9ac1fed</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5643%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=684143a1182aa0cae2d37153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5642-memory-corruption-in-radare2-f3322b31</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5642%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=68418437182aa0cae2dcccad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5641-memory-corruption-in-radare2-c6be342d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5641%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=68413c9b182aa0cae2d27232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5640-stack-based-buffer-overflow-in-px4-a-cf41731a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5640%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4-Autopilot&amp;severity=medium&amp;id=6841359d182aa0cae2d17542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5683-vulnerability-in-the-qt-company-qt-88add8f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5683%3A%20Vulnerability%20in%20The%20Qt%20Company%20Qt&amp;severity=medium&amp;id=68418437182aa0cae2dcccb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5639-sql-injection-in-phpgurukul-notice-b-5eb64f4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5639%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=68418437182aa0cae2dcccb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3055-cwe-22-improper-limitation-of-a-path-14027aeb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3055%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wedevs%20WP%20User%20Frontend%20Pro&amp;severity=high&amp;id=68418437182aa0cae2dcccb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3054-cwe-434-unrestricted-upload-of-file--f49070ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3054%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wedevs%20WP%20User%20Frontend%20Pro&amp;severity=high&amp;id=68412e7c182aa0cae2d07494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5638-sql-injection-in-phpgurukul-notice-b-51eccab6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5638%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=6841277c182aa0cae2cf73b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1793-cwe-89-improper-neutralization-of-sp-e5cb6292</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1793%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=critical&amp;id=68418437182aa0cae2dcccbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5637-buffer-overflow-in-pcman-ftp-server-f71ebab5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5637%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=68418437182aa0cae2dccc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5636-buffer-overflow-in-pcman-ftp-server-ee26d54c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5636%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=68418437182aa0cae2dccc97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5635-buffer-overflow-in-pcman-ftp-server-cb4610d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5635%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=68418437182aa0cae2dccca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5634-buffer-overflow-in-pcman-ftp-server-98bb59fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5634%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=6841198f182aa0cae2cd745c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5633-sql-injection-in-code-projects-conte-22b92407</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5633%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=684115e3182aa0cae2ccf0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5632-sql-injection-in-code-projects-conte-527e52f7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5632%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=68410ee8182aa0cae2cbe1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5631-sql-injection-in-code-projects-conte-d267ac83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5631%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detailed-research-for-roundcube-1610-post-auth-rce-cd9e1b70</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detailed%20research%20for%20Roundcube%20%E2%89%A4%201.6.10%20Post-Auth%20RCE%20is%20out&amp;severity=medium&amp;id=684100cc182aa0cae2c9db22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5630-stack-based-buffer-overflow-in-d-lin-7a7f2921</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5630%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=68418437182aa0cae2dcccaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5629-buffer-overflow-in-tenda-ac10-18152d82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5629%3A%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=68418437182aa0cae2dcccab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5628-cross-site-scripting-in-sourcecodest-5ba3d270</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5628%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Food%20Menu%20Manager&amp;severity=medium&amp;id=6840f64d182aa0cae2c85ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5627-sql-injection-in-code-projects-patie-057f517b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5627%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6840ef52182aa0cae2c76100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5626-sql-injection-in-campcodes-online-te-134e8b22</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5626%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Teacher%20Record%20Management%20System&amp;severity=medium&amp;id=6840ef52182aa0cae2c760fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5625-sql-injection-in-campcodes-online-te-867df9a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5625%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Teacher%20Record%20Management%20System&amp;severity=medium&amp;id=6840e83a182aa0cae2c66228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5624-stack-based-buffer-overflow-in-d-lin-5d9337eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5624%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=6840e83a182aa0cae2c66226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49008-cwe-78-improper-neutralization-of-s-d79ea871</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49008%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Atheos%20Atheos&amp;severity=critical&amp;id=6840e83a182aa0cae2c66224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5623-stack-based-buffer-overflow-in-d-lin-917c9507</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5623%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=68418437182aa0cae2dcccb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5622-stack-based-buffer-overflow-in-d-lin-8cab38f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5622%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=6840e152182aa0cae2c5652d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-05-f76fbfbf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-05&amp;severity=medium&amp;id=68490f133cd93dcca832046b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grandstream-gsd3710-101113-stack-overflow-c000c559</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grandstream%20GSD3710%201.0.11.13%20-%20Stack%20Overflow&amp;severity=medium&amp;id=68489d6c7e6d765d51d520a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudclassroom-php-project-10-sql-injection-21012147</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CloudClassroom%20PHP%20Project%201.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=68489c9c82cbcead92622827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-server-2025-jscript-engine-remot-2aee9b0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%20Server%202025%20JScript%20Engine%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68489c9682cbcead92621398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-launchdaemon-ios-172-privilege-escalation-47a8dfd7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20LaunchDaemon%20iOS%2017.2%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489c9182cbcead92621253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abb-cylon-aspect-30804-deploysource-remote-code-ex-ad0eabd3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ABB%20Cylon%20Aspect%203.08.04%20DeploySource%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68489c8b82cbcead926210e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apache-tomcat-10139-denial-of-service-dos-d63051e5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apache%20Tomcat%2010.1.39%20-%20Denial%20of%20Service%20(DoS)&amp;severity=medium&amp;id=68489c8082cbcead92620d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47827-na-in-na-8cb1533b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47827%3A%20n%2Fa&amp;severity=medium&amp;id=6841a29c182aa0cae2e196bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49466-cwe-23-relative-path-traversal-in-r-64ce5c06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49466%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20rjarry%20aerc&amp;severity=medium&amp;id=684107ee182aa0cae2cade2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48432-cwe-117-improper-output-neutralizat-8a169a4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48432%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20djangoproject%20Django&amp;severity=medium&amp;id=684100ca182aa0cae2c9db1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5621-os-command-injection-in-d-link-dir-8-7dbb8342</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5621%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-816&amp;severity=medium&amp;id=68418437182aa0cae2dcccb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5620-os-command-injection-in-d-link-dir-8-63d91bf1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5620%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-816&amp;severity=medium&amp;id=6840da1d182aa0cae2c463a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5619-stack-based-buffer-overflow-in-tenda-0fc8e603</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5619%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=6840d336182aa0cae2c366fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5618-sql-injection-in-phpgurukul-online-f-7bbadaf3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5618%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6840d336182aa0cae2c366f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49007-cwe-770-allocation-of-resources-wit-63770299</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49007%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20rack%20rack&amp;severity=medium&amp;id=6840cfa0182aa0cae2c2e7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5617-sql-injection-in-phpgurukul-online-f-68152aef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5617%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6840cc16182aa0cae2c26838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5616-sql-injection-in-phpgurukul-online-f-d17adf4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5616%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6840cc16182aa0cae2c26836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5615-sql-injection-in-phpgurukul-online-f-9113dfb9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5615%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68418437182aa0cae2dcccbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5614-sql-injection-in-phpgurukul-online-f-6e96ef4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5614%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6840c579182aa0cae2c16ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5690-exposure-of-sensitive-information-to-51c29cb0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5690%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20DALIBO%20PostgreSQL%20Anonymizer&amp;severity=medium&amp;id=68418437182aa0cae2dcccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5613-sql-injection-in-phpgurukul-online-f-a9b3eab8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5613%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68418437182aa0cae2dcccdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5612-sql-injection-in-phpgurukul-online-f-71daebff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5612%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6840c579182aa0cae2c16b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-gamer-to-malware-developer-exploring-silverra-d0582c8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Gamer%20to%20Malware%20Developer%3A%20Exploring%20SilverRat%20and%20Its%20Syrian%20Roots&amp;severity=medium&amp;id=6840eba9182aa0cae2c6e1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-sindoor-anatomy-of-a-digital-siege-88938cda</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Sindoor%20%E2%80%93%20Anatomy%20of%20a%20Digital%20Siege&amp;severity=medium&amp;id=6840eba9182aa0cae2c6e1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pumabot-novel-botnet-targeting-iot-surveillance-de-6ef13d39</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PumaBot%3A%20Novel%20Botnet%20Targeting%20IoT%20Surveillance%20Devices&amp;severity=medium&amp;id=6840eba9182aa0cae2c6e1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/behind-the-script-unmasking-phishing-attacks-using-bdc99944</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Behind%20the%20Script%3A%20Unmasking%20Phishing%20Attacks%20Using%20Google%20Apps%20Script&amp;severity=medium&amp;id=6840eba9182aa0cae2c6e1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-t-rex-coinminer-attacks-targeting-inte-69bc4d2a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20T-Rex%20CoinMiner%20Attacks%20Targeting%20Internet%20Caf%C3%A9s%20in%20Korea&amp;severity=medium&amp;id=6840e82a182aa0cae2c66207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5611-sql-injection-in-codeastro-real-esta-e6c84228</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5611%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=6840aff6182aa0cae2bdf337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5610-sql-injection-in-codeastro-real-esta-0e57f73b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5610%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=6840aff6182aa0cae2bdf335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48947-cwe-525-use-of-web-browser-cache-co-5767cf73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48947%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20auth0%20nextjs-auth0&amp;severity=high&amp;id=6840ac7f182aa0cae2bd73a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46341-cwe-918-server-side-request-forgery-ff52345a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46341%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FreshRSS%20FreshRSS&amp;severity=high&amp;id=6840ac7f182aa0cae2bd73a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46339-cwe-349-acceptance-of-extraneous-un-c517539b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46339%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=6840c579182aa0cae2c16b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5609-buffer-overflow-in-tenda-ac18-51ce10f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5609%3A%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=6840c579182aa0cae2c16b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5608-buffer-overflow-in-tenda-ac18-b3c3f70e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5608%3A%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=6840c579182aa0cae2c16b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32015-cwe-79-improper-neutralization-of-i-647b023d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32015%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=6840a8e8182aa0cae2bcf3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31482-cwe-352-cross-site-request-forgery--3f894a6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31482%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=6840a57a182aa0cae2bc751b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31136-cwe-79-improper-neutralization-of-i-0b95d75c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31136%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=6840ac7f182aa0cae2bd73a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31134-cwe-201-insertion-of-sensitive-info-fd83e722</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31134%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=6840a1e1182aa0cae2bbf440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22245-stored-cross-site-scripting-xss-vul-df2bec5d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22245%3A%20Stored%20Cross-Site%20Scripting%20(XSS)%20vulnerability%20in%20router%20port%20in%20VMware%20VMware%20NSX&amp;severity=medium&amp;id=6840c579182aa0cae2c16b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22244-stored-cross-site-scripting-xss-vul-ab7a6a88</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22244%3A%20Stored%20Cross-Site%20Scripting%20(XSS)%20vulnerability%20in%20gateway%20firewall%20in%20VMware%20VMware%20NSX&amp;severity=medium&amp;id=6840c579182aa0cae2c16b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22243-stored-cross-site-scripting-xss-vul-55bce768</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22243%3A%20Stored%20Cross-Site%20Scripting%20(XSS)%20vulnerability%20in%20Manager-UI%20in%20VMware%20VMware%20NSX&amp;severity=high&amp;id=6840c579182aa0cae2c16b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48935-cwe-863-incorrect-authorization-in--ba036a33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48935%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20denoland%20deno&amp;severity=medium&amp;id=6840c579182aa0cae2c16b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5607-buffer-overflow-in-tenda-ac18-48e0d7b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5607%3A%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=6840c579182aa0cae2c16b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-strange-tale-of-ischhfd83-when-cybercriminals--94ce7daa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20strange%20tale%20of%20ischhfd83%3A%20When%20cybercriminals%20eat%20their%20own&amp;severity=medium&amp;id=6840afe6182aa0cae2bdf2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amos-variant-distributed-via-clickfix-in-spectrum--b6f0f381</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMOS%20Variant%20Distributed%20Via%20Clickfix%20In%20Spectrum-Themed%20Dynamic%20Delivery%20Campaign%20By%20Russian%20Speaking%20Hackers&amp;severity=medium&amp;id=6840ac70182aa0cae2bd7373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-attacks-on-government-agencies-detect-and-in-0c65f458</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Attacks%20on%20Government%20Agencies%3A%20Detect%20and%20Investigate&amp;severity=medium&amp;id=68417b9b182aa0cae2db06eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48934-cwe-201-insertion-of-sensitive-info-0032e66c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48934%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20denoland%20deno&amp;severity=medium&amp;id=6840c579182aa0cae2c16b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48888-cwe-863-incorrect-authorization-in--cf77a0d0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48888%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20denoland%20deno&amp;severity=medium&amp;id=68409e60182aa0cae2bb74fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5606-command-injection-in-tenda-ac18-cf9fe034</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5606%3A%20Command%20Injection%20in%20Tenda%20AC18&amp;severity=medium&amp;id=68409aec182aa0cae2baf4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exclusive-hackers-leak-86-million-att-customer-rec-3edf6124</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exclusive%3A%20Hackers%20Leak%2086%20Million%20AT%26T%20Customer%20Records%20with%20Decrypted%20SSNs&amp;severity=medium&amp;id=684093f0182aa0cae2b9f7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5604-sql-injection-in-campcodes-hospital--e97074fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5604%3A%20SQL%20Injection%20in%20Campcodes%20Hospital%20Management%20System&amp;severity=medium&amp;id=68409408182aa0cae2b9f7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5603-sql-injection-in-campcodes-hospital--ad09f931</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5603%3A%20SQL%20Injection%20in%20Campcodes%20Hospital%20Management%20System&amp;severity=medium&amp;id=6840c579182aa0cae2c16b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5602-sql-injection-in-campcodes-hospital--56e2ed6f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5602%3A%20SQL%20Injection%20in%20Campcodes%20Hospital%20Management%20System&amp;severity=medium&amp;id=68408ce4182aa0cae2b8f903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5600-stack-based-buffer-overflow-in-totol-ec20f889</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5600%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=critical&amp;id=6840c579182aa0cae2c16b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5599-sql-injection-in-phpgurukul-student--38ad8de1</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5599%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=684085c3182aa0cae2b7f9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5688-cwe-787-out-of-bounds-write-in-amazo-ae890137</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5688%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Amazon%20FreeRTOS&amp;severity=high&amp;id=68407ee8182aa0cae2b6fadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5596-buffer-overflow-in-freefloat-ftp-ser-192c1277</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5596%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6840c579182aa0cae2c16b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2336-cwe-791-incomplete-filtering-of-spec-17d0a35d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2336%3A%20CWE-791%3A%20Incomplete%20Filtering%20of%20Special%20Elements%20in%20Google%20AngularJS&amp;severity=medium&amp;id=684077df182aa0cae2b5fa4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5595-buffer-overflow-in-freefloat-ftp-ser-bfb76e5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5595%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6840904c182aa0cae2b978f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/roundcube-webmail-under-fire-critical-exploit-foun-9a880b34</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Roundcube%20Webmail%20under%20fire%3A%20critical%20exploit%20found%20after%20a%20decade&amp;severity=critical&amp;id=684077cc182aa0cae2b5fa43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chaos-rat-malware-targets-windows-and-linux-via-fa-eaec992d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chaos%20RAT%20Malware%20Targets%20Windows%20and%20Linux%20via%20Fake%20Network%20Tool%20Downloads&amp;severity=medium&amp;id=68407b4a182aa0cae2b679cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kerberos-as-rep-roasting-attacks-what-you-need-to--cf933d7b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kerberos%20AS-REP%20roasting%20attacks%3A%20What%20you%20need%20to%20know&amp;severity=medium&amp;id=68407448182aa0cae2b579d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-hackers-target-salesforce-accounts-in-data--940f73cf</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%3A%20Hackers%20target%20Salesforce%20accounts%20in%20data%20extortion%20attacks&amp;severity=medium&amp;id=68407edd182aa0cae2b6fad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20259-improper-limitation-of-a-pathname-t-295d8da0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20259%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20ThousandEyes%20Endpoint%20Agent&amp;severity=medium&amp;id=6840745c182aa0cae2b579f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-cves-in-infoblox-netmri-rce-auth-bypass-s-36fcb4a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20CVEs%20in%20Infoblox%20NetMRI%3A%20RCE%2C%20Auth%20Bypass%2C%20SQLi%2C%20and%20File%20Read%20Vulnerabilities&amp;severity=medium&amp;id=6840745c182aa0cae2b579e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20286-use-of-hard-coded-password-in-cisco-9a4cd62f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20286%3A%20Use%20of%20Hard-coded%20Password%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=6840745c182aa0cae2b57a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20278-improper-neutralization-of-special--3f0b1308</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20278%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Finesse&amp;severity=medium&amp;id=6840745c182aa0cae2b57a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20279-improper-neutralization-of-input-du-cbd589a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20279%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=6840745c182aa0cae2b57a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20277-improper-limitation-of-a-pathname-t-595e5125</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20277%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=low&amp;id=6840745c182aa0cae2b57a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20276-deserialization-of-untrusted-data-i-69f7c319</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20276%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=low&amp;id=6840745c182aa0cae2b57a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20275-deserialization-of-untrusted-data-i-1be2e136</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20275%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=6840745c182aa0cae2b579ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20273-improper-neutralization-of-input-du-44cff521</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20273%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Intelligent%20Contact%20Management%20Enterprise&amp;severity=medium&amp;id=6840745c182aa0cae2b579fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20261-improper-restriction-of-communicati-884f9767</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20261%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=high&amp;id=6840745c182aa0cae2b579fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20163-key-exchange-without-entity-authent-ae073c90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20163%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20Cisco%20Cisco%20Data%20Center%20Network%20Manager&amp;severity=high&amp;id=6840745c182aa0cae2b579f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20129-exposure-of-sensitive-information-t-eb49ca89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20129%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20SocialMiner&amp;severity=medium&amp;id=6840745c182aa0cae2b579f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20130-improper-access-control-in-cisco-ci-c12caf56</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20130%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=6840745c182aa0cae2b579f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5594-buffer-overflow-in-freefloat-ftp-ser-55f95929</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5594%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=684070c6182aa0cae2b4fab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5593-buffer-overflow-in-freefloat-ftp-ser-d76cf919</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5593%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6840c579182aa0cae2c16b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5592-buffer-overflow-in-freefloat-ftp-ser-c1fc1bd3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5592%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6840c579182aa0cae2c16b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48962-cwe-918-in-acronis-acronis-cyber-pr-af209145</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48962%3A%20CWE-918%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=medium&amp;id=6840c579182aa0cae2c16b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48961-cwe-732-in-acronis-acronis-cyber-pr-8122e893</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48961%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=high&amp;id=6840511e182aa0cae2b0823a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48960-cwe-326-in-acronis-acronis-cyber-pr-99b3bbd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48960%3A%20CWE-326%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=medium&amp;id=68404d87182aa0cae2b003ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1701-cwe-20-improper-input-validation-in--c7e70de4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1701%3A%20CWE-20%20Improper%20Input%20Validation%20in%20MIM%20Software%20MIM%20Admin%20Service&amp;severity=high&amp;id=68404a07182aa0cae2af8410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48959-cwe-276-in-acronis-acronis-cyber-pr-d46af132</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48959%3A%20CWE-276%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=68403c03182aa0cae2ad7e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30415-cwe-1286-in-acronis-acronis-cyber-p-c07e0ef2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30415%3A%20CWE-1286%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=6840388a182aa0cae2acdb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5597-cwe-287-improper-authentication-in-w-3269af4b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5597%3A%20CWE-287%20Improper%20Authentication%20in%20WF%20Steuerungstechnik%20GmbH%20airleader%20MASTER&amp;severity=critical&amp;id=68403504182aa0cae2ac37d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5598-cwe-35-path-traversal-in-wf-steuerun-db084dde</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5598%3A%20CWE-35%20Path%20Traversal%20in%20WF%20Steuerungstechnik%20GmbH%20airleader%20MASTER&amp;severity=critical&amp;id=68403727182aa0cae2ac5d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-issues-security-patch-for-storeonce-bug-allowi-72a4be83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20Issues%20Security%20Patch%20for%20StoreOnce%20Bug%20Allowing%20Remote%20Authentication%20Bypass&amp;severity=medium&amp;id=6840238a182aa0cae2a97199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-multiple-qualcomm-chipsets-flaws-to-i-596fa77f</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Multiple%20Qualcomm%20chipsets%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68402706182aa0cae2a9f0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5601-cwe-120-buffer-copy-without-checking-73ce4ca9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5601%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=684023a2182aa0cae2a971c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5584-cross-site-scripting-in-phpgurukul-h-e627d01f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5584%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=68401c5a182aa0cae2a8735a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-25112-cwe-770-allocation-of-resources-wit-f93ab66f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-25112%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PHOENIX%20CONTACT%20ILC%20131&amp;severity=high&amp;id=68401554182aa0cae2a7706b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5583-sql-injection-in-codeastro-real-esta-3fe5c7c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5583%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=6840335a182aa0cae2abb99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stormwall-reveals-india-china-and-us-faced-most-dd-323c1481</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StormWall%20Reveals%20India%2C%20China%20and%20US%20Faced%20Most%20DDoS%20Attacks%20in%20Q1%202025&amp;severity=medium&amp;id=684011d0182aa0cae2a6f09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5582-sql-injection-in-codeastro-real-esta-64290493</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5582%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=6840335a182aa0cae2abb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5581-sql-injection-in-codeastro-real-esta-94c5d98b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5581%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68400e59182aa0cae2a6714b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5580-sql-injection-in-codeastro-real-esta-8e4482d4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5580%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=6840073c182aa0cae2a5368e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47728-cwe-787-out-of-bounds-write-in-delt-087dcf3b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47728%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft-G2&amp;severity=high&amp;id=6840003b182aa0cae2a406bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13967-cwe-384-session-fixation-in-abb-eib-6ec3a0b4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13967%3A%20CWE-384%20Session%20Fixation%20in%20ABB%20EIBPORT%20V3%20KNX&amp;severity=critical&amp;id=6840003b182aa0cae2a406b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5579-sql-injection-in-phpgurukul-dairy-fa-9e71e571</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5579%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6840003b182aa0cae2a406bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5578-sql-injection-in-phpgurukul-dairy-fa-8f969a8a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5578%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6840003b182aa0cae2a406bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5577-sql-injection-in-phpgurukul-dairy-fa-cfa9c436</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5577%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a387aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5576-sql-injection-in-phpgurukul-dairy-fa-b167bc45</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5576%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=683ff92a182aa0cae2a287d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47727-cwe-787-out-of-bounds-write-in-delt-06d09e6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47727%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft&amp;severity=high&amp;id=6840335a182aa0cae2abb9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27444-cwe-79-improper-neutralization-of-i-a9686496</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27444%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSform!Pro%20component%20for%20Joomla&amp;severity=medium&amp;id=683ff59c182aa0cae2a204b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47726-cwe-787-out-of-bounds-write-in-delt-892453a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47726%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft&amp;severity=high&amp;id=6840335a182aa0cae2abb9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47725-cwe-787-out-of-bounds-write-in-delt-49e1d554</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47725%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft&amp;severity=high&amp;id=6840335a182aa0cae2abb9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47724-cwe-787-out-of-bounds-write-in-delt-35125aec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47724%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft&amp;severity=high&amp;id=6840335a182aa0cae2abb9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5482-cwe-620-unverified-password-change-i-aa8d84a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5482%3A%20CWE-620%20Unverified%20Password%20Change%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart%20%E2%80%93%20Client%20Photo%20Gallery%20%26%20Photo%20Proofing%20for%20Photographers&amp;severity=high&amp;id=6840335a182aa0cae2abb9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5575-sql-injection-in-phpgurukul-dairy-fa-2106d77a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5575%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=683ff236182aa0cae2a183f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5574-sql-injection-in-phpgurukul-dairy-fa-340fb3bb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5574%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=683feb1c182aa0cae2a085e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5573-os-command-injection-in-d-link-dcs-9-54c294ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5573%3A%20OS%20Command%20Injection%20in%20D-Link%20DCS-932L&amp;severity=medium&amp;id=6840335a182aa0cae2abb9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5572-stack-based-buffer-overflow-in-d-lin-25e003ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5572%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-932L&amp;severity=high&amp;id=6840335a182aa0cae2abb9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4580-cwe-352-cross-site-request-forgery-c-ba08721f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4580%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20File%20Provider&amp;severity=medium&amp;id=6840335a182aa0cae2abb9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4578-cwe-89-sql-injection-in-unknown-file-120a00b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4578%3A%20CWE-89%20SQL%20Injection%20in%20File%20Provider&amp;severity=critical&amp;id=683fe42e182aa0cae29f8802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48710-cwe-441-unintended-proxy-or-interme-20f3e2aa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48710%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20kro.run%20kro&amp;severity=medium&amp;id=683fe089182aa0cae29f094d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5571-os-command-injection-in-d-link-dcs-9-654f930b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5571%3A%20OS%20Command%20Injection%20in%20D-Link%20DCS-932L&amp;severity=medium&amp;id=6840335a182aa0cae2abb9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5569-sql-injection-in-ideacms-cd832d6b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5569%3A%20SQL%20Injection%20in%20IdeaCMS&amp;severity=medium&amp;id=683fdd0d182aa0cae29e89ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5566-sql-injection-in-phpgurukul-notice-b-d6c0769f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5566%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a387c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5562-sql-injection-in-phpgurukul-curfew-e-593e141e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5562%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=683fd5f4182aa0cae29d2a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20996-cwe-285-improper-authorization-in-s-db2a8384</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20996%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=683ffd67182aa0cae2a387e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20995-cwe-280-improper-handling-of-insuff-4e9166d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20995%3A%20CWE-280%3A%20Improper%20handling%20of%20insufficient%20permission%20in%20Samsung%20Mobile%20Samsung%20Internet&amp;severity=medium&amp;id=683ffd67182aa0cae2a387e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20994-cwe-276-incorrect-default-permissio-9e642654</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20994%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Internet&amp;severity=medium&amp;id=683ffd67182aa0cae2a387e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20993-cwe-122-heap-based-buffer-overflow--621d1e48</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20993%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20992-cwe-122-heap-based-buffer-overflow--0b411766</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20992%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20991-cwe-926-improper-export-of-android--af228835</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20991%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20989-cwe-200-exposure-of-sensitive-infor-9f967dc1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20989%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20988-cwe-125-out-of-bounds-read-in-samsu-4b9888ad</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20988%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20987-cwe-200-exposure-of-sensitive-infor-55da835d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20987%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20986-cwe-284-improper-access-control-in--9cec28dd</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20986%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20985-cwe-269-improper-privilege-manageme-a1b48b20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20985%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20984-cwe-276-incorrect-default-permissio-24090562</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20984%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20981-cwe-284-improper-access-control-in--9ce0cef4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20981%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31127-cwe-346-origin-validation-error-in--55ebecf4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31127%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Zscaler%20Client%20Connector&amp;severity=high&amp;id=683fd273182aa0cae29ca5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5561-sql-injection-in-phpgurukul-curfew-e-17bb82a1</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5561%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=683fcf0a182aa0cae29c261c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5539-cwe-79-improper-neutralization-of-in-eb5428d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5539%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Simple%20Contact%20Form%20Plugin%20for%20WordPress%20%E2%80%93%20WP%20Easy%20Contact&amp;severity=medium&amp;id=683ffd67182aa0cae2a387e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5560-sql-injection-in-phpgurukul-curfew-e-bf8ed217</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5560%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a387e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5558-sql-injection-in-phpgurukul-teacher--416302d7</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5558%3A%20SQL%20Injection%20in%20PHPGurukul%20Teacher%20Subject%20Allocation%20Management%20System&amp;severity=medium&amp;id=683fc7ff182aa0cae29b2712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5532-cwe-79-improper-neutralization-of-in-914c7d2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5532%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Campus%20Directory%20%E2%80%93%20Faculty%2C%20Staff%20%26%20Student%20Directory%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=683ffd67182aa0cae2a387ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5531-cwe-79-improper-neutralization-of-in-89662c4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5531%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Employee%20Directory%20%E2%80%93%20Staff%20%26%20Team%20Directory&amp;severity=medium&amp;id=683fc46a182aa0cae29aa3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5557-sql-injection-in-phpgurukul-teacher--f6e49d44</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5557%3A%20SQL%20Injection%20in%20PHPGurukul%20Teacher%20Subject%20Allocation%20Management%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a387ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5556-sql-injection-in-phpgurukul-teacher--2d1d8fbc</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5556%3A%20SQL%20Injection%20in%20PHPGurukul%20Teacher%20Subject%20Allocation%20Management%20System&amp;severity=medium&amp;id=683fc0e0182aa0cae29a1e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5554-sql-injection-in-phpgurukul-rail-pas-c3b74611</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5554%3A%20SQL%20Injection%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a3880c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5553-sql-injection-in-phpgurukul-rail-pas-85b84f7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5553%3A%20SQL%20Injection%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a38810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5552-deserialization-in-chestnutcms-db9d70d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5552%3A%20Deserialization%20in%20ChestnutCMS&amp;severity=medium&amp;id=683ffd67182aa0cae2a3880e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49223-cwe-1321-improperly-controlled-modi-ebcac40f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49223%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20NAVER%20billboard.js&amp;severity=critical&amp;id=683faf5c182aa0cae297926e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5551-buffer-overflow-in-freefloat-ftp-ser-a0407149</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5551%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683fa4ee182aa0cae2961204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5550-buffer-overflow-in-freefloat-ftp-ser-4a2b964f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5550%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683ffd67182aa0cae2a3881d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5549-buffer-overflow-in-freefloat-ftp-ser-6961d3e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5549%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683f9dcf182aa0cae295101f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5548-buffer-overflow-in-freefloat-ftp-ser-361d0733</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5548%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683f9715182aa0cae2941023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5547-buffer-overflow-in-freefloat-ftp-ser-61a1d58a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5547%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683f8fcb182aa0cae2931125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-04-e8d853c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-04&amp;severity=medium&amp;id=68490f133cd93dcca83205b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46203-na-in-na-cb8a3f31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46203%3A%20n%2Fa&amp;severity=medium&amp;id=6840c579182aa0cae2c16b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46204-na-in-na-5ea67384</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46204%3A%20n%2Fa&amp;severity=medium&amp;id=6840c579182aa0cae2c16b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46011-na-in-na-0f87b9bc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46011%3A%20n%2Fa&amp;severity=medium&amp;id=6840b36c182aa0cae2be720e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29093-na-in-na-67f55da4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29093%3A%20n%2Fa&amp;severity=high&amp;id=6840aff6182aa0cae2bdf333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23096-na-in-na-ec630b43</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23096%3A%20n%2Fa&amp;severity=medium&amp;id=6840aff6182aa0cae2bdf331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29094-na-in-na-6c5f68af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29094%3A%20n%2Fa&amp;severity=medium&amp;id=6840745c182aa0cae2b57a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-russia-affiliated-actor-void-blizzard-ta-fc2cb2c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Russia-affiliated%20actor%20Void%20Blizzard%20targets%20critical%20sectors%20for%20espionage&amp;severity=low&amp;id=68406971182aa0cae2b3fad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23106-na-in-na-95272bb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23106%3A%20n%2Fa&amp;severity=medium&amp;id=68406659182aa0cae2b37aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23095-na-in-na-346653b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23095%3A%20n%2Fa&amp;severity=medium&amp;id=684062a5182aa0cae2b2faf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23101-na-in-na-3800da46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23101%3A%20n%2Fa&amp;severity=medium&amp;id=68405f1a182aa0cae2b27c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27811-na-in-na-15e96f20</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27811%3A%20n%2Fa&amp;severity=high&amp;id=68405482182aa0cae2b100b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5546-sql-injection-in-phpgurukul-daily-ex-72d0c802</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5546%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a3881f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5545-path-traversal-in-aaluoxiang-oasyste-067c41de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5545%3A%20Path%20Traversal%20in%20aaluoxiang%20oa_system&amp;severity=medium&amp;id=683f8896182aa0cae2920d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5544-path-traversal-in-aaluoxiang-oasyste-916b6959</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5544%3A%20Path%20Traversal%20in%20aaluoxiang%20oa_system&amp;severity=medium&amp;id=683f81a2182aa0cae291105a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24015-cwe-347-improper-verification-of-cr-f46d2db6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24015%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20denoland%20deno&amp;severity=high&amp;id=683f7e1a182aa0cae29091f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5543-cross-site-scripting-in-totolink-x20-a870db73</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5543%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20X2000R&amp;severity=medium&amp;id=683f7a98182aa0cae29012da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5542-cross-site-scripting-in-totolink-x20-39fa77c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5542%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20X2000R&amp;severity=medium&amp;id=683f73bf182aa0cae28f146a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49000-cwe-400-uncontrolled-resource-consu-eb1ecea1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49000%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20inventree%20InvenTree&amp;severity=low&amp;id=683f61ea182aa0cae28c99c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48951-cwe-502-deserialization-of-untruste-45b274a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48951%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20auth0%20auth0-PHP&amp;severity=critical&amp;id=683f61ea182aa0cae28c99c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rfc-draft-built-mathematical-solution-for-pkis-imp-24e445ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BRFC%20Draft%5D%20Built%20mathematical%20solution%20for%20PKI&apos;s%20&apos;impossible&apos;%20problem.%20Response%20time%3A%20months%E2%86%922%20hours.%20IETF%20interest%20level%3A%20%C2%AF%5C(%E3%83%84)%2F%C2%AF&amp;severity=critical&amp;id=683f5e64182aa0cae28c1a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49002-cwe-290-authentication-bypass-by-sp-f913e20e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49002%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20dataease%20dataease&amp;severity=high&amp;id=683f5e63182aa0cae28c1a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49001-cwe-287-improper-authentication-in--585d9b4c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49001%3A%20CWE-287%3A%20Improper%20Authentication%20in%20dataease%20dataease&amp;severity=high&amp;id=683f5e63182aa0cae28c1a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48999-cwe-923-improper-restriction-of-com-c71f1ebb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48999%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20dataease%20dataease&amp;severity=medium&amp;id=683f5e63182aa0cae28c1a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5527-stack-based-buffer-overflow-in-tenda-af08d1f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5527%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=683f5e63182aa0cae28c1a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5525-os-command-injection-in-jrohy-trojan-dd5f6b39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5525%3A%20OS%20Command%20Injection%20in%20Jrohy%20trojan&amp;severity=medium&amp;id=683f575d182aa0cae28b1ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coinbase-breach-tied-to-bribed-taskus-support-agen-1a2bdc48</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coinbase%20breach%20tied%20to%20bribed%20TaskUs%20support%20agents%20in%20India&amp;severity=medium&amp;id=683f53e6182aa0cae28a9c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5523-cross-site-scripting-in-enilu-web-fl-38076984</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5523%3A%20Cross%20Site%20Scripting%20in%20enilu%20web-flash&amp;severity=medium&amp;id=683f5057182aa0cae28a1d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35036-cwe-94-improper-control-of-generati-a26c5d7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35036%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hibernate%20Hibernate%20Validator&amp;severity=high&amp;id=683f5057182aa0cae28a1d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crocodilus-mobile-malware-evolving-fast-going-glob-c101ab48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crocodilus%20Mobile%20Malware%3A%20Evolving%20Fast%2C%20Going%20Global&amp;severity=medium&amp;id=683f6564182aa0cae28d1a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/victims-risk-asyncrat-infection-after-being-redire-c39b5f28</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Victims%20risk%20AsyncRAT%20infection%20after%20being%20redirected%20to%20fake%20Booking.com%20sites&amp;severity=medium&amp;id=683f6564182aa0cae28d1a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5522-improper-authorization-in-jack0240-b-7c9990ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5522%3A%20Improper%20Authorization%20in%20jack0240%20%E9%AD%8F%20bskms%20%E8%93%9D%E5%A4%A9%E5%B9%BC%E5%84%BF%E5%9B%AD%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=683f4959182aa0cae2891646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5521-cross-site-request-forgery-in-wukong-89b29e83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5521%3A%20Cross-Site%20Request%20Forgery%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=683f4260182aa0cae2881831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48998-cwe-89-improper-neutralization-of-s-e157e6e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48998%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dataease%20dataease&amp;severity=high&amp;id=683f4260182aa0cae288182f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/illuminating-transparent-tribe-78d14e87</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Illuminating%20Transparent%20Tribe&amp;severity=medium&amp;id=683f6564182aa0cae28d1a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-transparent-tribe-vibe-apt36-returns-with-capr-559e9743</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Transparent%20Tribe%20Vibe%3A%20APT36%20Returns%20With%20CapraRAT%20Impersonating%20Viber&amp;severity=medium&amp;id=683f6564182aa0cae28d1a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48997-cwe-248-uncaught-exception-in-expre-fc886d41</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48997%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20expressjs%20multer&amp;severity=high&amp;id=683f3ee7182aa0cae28796ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48953-cwe-434-unrestricted-upload-of-file-95733957</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48953%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=683f3ee7182aa0cae28796b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48950-cwe-276-incorrect-default-permissio-6ef977c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48950%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=683f3ee7182aa0cae28796b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5520-reachable-assertion-in-open5gs-9d7cf7ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5520%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=683f3b5c182aa0cae287156a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5516-cross-site-scripting-in-totolink-x20-4652da56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5516%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20X2000R&amp;severity=medium&amp;id=683f3b5c182aa0cae2871568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30360-cwe-346-origin-validation-error-in--f24f7d20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30360%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20webpack%20webpack-dev-server&amp;severity=medium&amp;id=683f37c9182aa0cae28696c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30359-cwe-749-exposed-dangerous-method-or-d4ade928</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30359%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20webpack%20webpack-dev-server&amp;severity=medium&amp;id=683f3437182aa0cae286172a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5515-command-injection-in-totolink-x2000r-2dbc9920</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5515%3A%20Command%20Injection%20in%20TOTOLINK%20X2000R&amp;severity=medium&amp;id=683f3437182aa0cae286172e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5513-cross-site-scripting-in-quequnlong-s-561116a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5513%3A%20Cross%20Site%20Scripting%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=683f3437182aa0cae286172c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-bug-at-compliance-firm-vanta-leaks-customer-d-fb75bcb7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20Bug%20at%20Compliance%20Firm%20Vanta%20Leaks%20Customer%20Data%20to%20Other%20Clients&amp;severity=medium&amp;id=683f30b8182aa0cae2859884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-rubygems-pose-as-fastlane-to-steal-teleg-ebbbff07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20RubyGems%20pose%20as%20Fastlane%20to%20steal%20Telegram%20API%20data&amp;severity=medium&amp;id=683f2d3a182aa0cae285196d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5512-improper-authentication-in-quequnlon-39be9316</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5512%3A%20Improper%20Authentication%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=683f2d48182aa0cae285197e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5511-improper-authorization-in-quequnlong-c94bb433</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5511%3A%20Improper%20Authorization%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=683f2d48182aa0cae285197c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30167-cwe-427-uncontrolled-search-path-el-0f72e488</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30167%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20jupyter%20jupyter_core&amp;severity=high&amp;id=683f29c4182aa0cae2849a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5510-server-side-request-forgery-in-quequ-b251f634</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5510%3A%20Server-Side%20Request%20Forgery%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=683f262f182aa0cae2841b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5509-path-traversal-in-quequnlong-shiyi-b-876f6f66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5509%3A%20Path%20Traversal%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=683f1f41182aa0cae2831b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5508-cross-site-scripting-in-totolink-a30-63ec22d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5508%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20A3002RU&amp;severity=medium&amp;id=683f1f41182aa0cae2831b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-banking-trojan-crocodilus-rapidly-evolves--3fb96657</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20banking%20trojan%20Crocodilus%20rapidly%20evolves%20and%20goes%20global&amp;severity=medium&amp;id=683f1baf182aa0cae2829bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-connectwise-screenconnect-bug-exploi-afcc9f21</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20warns%20of%20ConnectWise%20ScreenConnect%20bug%20exploited%20in%20attacks&amp;severity=medium&amp;id=683f1baf182aa0cae2829bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5507-cross-site-scripting-in-totolink-a30-f431b0b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5507%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20A3002RU&amp;severity=medium&amp;id=683f1834182aa0cae2821d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25020-cwe-1287-improper-validation-of-spe-78ab8c59</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25020%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20IBM%20QRadar%20Suite%20Software&amp;severity=medium&amp;id=683f1834182aa0cae2821d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1334-cwe-525-information-exposure-through-761b7d74</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1334%3A%20CWE-525%20Information%20Exposure%20Through%20Browser%20Caching%20in%20IBM%20QRadar%20Suite%20Software&amp;severity=medium&amp;id=683f14ab182aa0cae2819e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25021-cwe-94-improper-control-of-generati-c4106335</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25021%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20IBM%20QRadar%20Suite%20Software&amp;severity=high&amp;id=683f14ab182aa0cae2819e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25022-cwe-260-password-in-configuration-f-15d5de34</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25022%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20QRadar%20Suite%20Software&amp;severity=critical&amp;id=683f14ab182aa0cae2819e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25019-cwe-613-insufficient-session-expira-7e93af59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25019%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20QRadar%20Suite%20Software&amp;severity=medium&amp;id=683f14ab182aa0cae2819e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bypassing-tamper-protection-and-getting-root-shell-c6b02f1c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bypassing%20tamper%20protection%20and%20getting%20root%20shell%20access%20on%20a%20Worldline%20Yomani%20XR%20credit%20card%20terminal&amp;severity=medium&amp;id=683f1129182aa0cae2811ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5506-cross-site-scripting-in-totolink-a30-a68311e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5506%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20A3002RU&amp;severity=medium&amp;id=683f112a182aa0cae2811bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5505-cross-site-scripting-in-totolink-a30-3061c363</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5505%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20A3002RU&amp;severity=medium&amp;id=683f112a182aa0cae2811bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45655-cwe-732-incorrect-permission-assign-d0e9d293</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45655%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Application%20Gateway&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46548-cwe-287-improper-authentication-in--0de5ebe1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46548%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20Pekko%20Management&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36564-cwe-61-unix-symbolic-link-symlink-f-14d6dd48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36564%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Dell%20Encryption%20Admin%20Utilities&amp;severity=high&amp;id=683f0dc1182aa0cae27ff340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5504-command-injection-in-totolink-x2000r-0bd866ca</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5504%3A%20Command%20Injection%20in%20TOTOLINK%20X2000R&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5503-stack-based-buffer-overflow-in-totol-fa9120c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5503%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=683f0a31182aa0cae27f6e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5502-command-injection-in-totolink-x15-587764a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5502%3A%20Command%20Injection%20in%20TOTOLINK%20X15&amp;severity=medium&amp;id=683f034b182aa0cae27e66e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5501-reachable-assertion-in-open5gs-d30ca3e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5501%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=683f034b182aa0cae27e66e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5499-deserialization-in-slackero-phpwcms-319b885f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5499%3A%20Deserialization%20in%20slackero%20phpwcms&amp;severity=medium&amp;id=683eff8d182aa0cae27db846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5498-deserialization-in-slackero-phpwcms-171fc635</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5498%3A%20Deserialization%20in%20slackero%20phpwcms&amp;severity=medium&amp;id=683efc06182aa0cae27d3674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5497-deserialization-in-slackero-phpwcms-4c8ff217</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5497%3A%20Deserialization%20in%20slackero%20phpwcms&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12718-cwe-22-improper-limitation-of-a-pat-88a08eda</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12718%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=683ef51d182aa0cae27c315d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4435-vulnerability-in-python-software-fou-42b98ea4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4435%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=683f0dc3182aa0cae27ff441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4138-cwe-22-improper-limitation-of-a-path-75f77a24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4138%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=683ef89a182aa0cae27cb26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4330-cwe-22-improper-limitation-of-a-path-7f129b87</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4330%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=683eff8d182aa0cae27db842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4517-cwe-22-improper-limitation-of-a-path-dc08cfa8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4517%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=critical&amp;id=683eff8d182aa0cae27db844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5495-improper-authentication-in-netgear-w-3e4911b5</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5495%3A%20Improper%20Authentication%20in%20Netgear%20WNR614&amp;severity=medium&amp;id=683eedf4182aa0cae27b309b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-chrome-fixes-high-severity-zero-day-vulnera-f4b5bffe</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Chrome%20Fixes%20High-Severity%20Zero-Day%20Vulnerability%20in%20Out-of-Band%20Update&amp;severity=high&amp;id=683ee6fa182aa0cae27923e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4205-cwe-79-improper-neutralization-of-in-d02f2ece</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4205%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danieliser%20Popup%20Maker%20%E2%80%93%20Boost%20Sales%2C%20Conversions%2C%20Optins%2C%20Subscribers%20with%20the%20Ultimate%20WP%20Popup%20Builder&amp;severity=medium&amp;id=683ee361182aa0cae274169e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4671-cwe-79-improper-neutralization-of-in-1629d94f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=683ee361182aa0cae27416a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5340-cwe-79-improper-neutralization-of-in-e27f7d0c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartwpress%20Music%20Player%20for%20Elementor%20%E2%80%93%20Audio%20Player%20%26%20Podcast%20Player&amp;severity=medium&amp;id=683ee361182aa0cae27416a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5493-sql-injection-in-baison-channel-midd-aa990bc4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5493%3A%20SQL%20Injection%20in%20Baison%20Channel%20Middleware%20Product&amp;severity=medium&amp;id=683ee1eb182aa0cae273963c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5492-command-injection-in-d-link-di-500wf-fa25e589</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5492%3A%20Command%20Injection%20in%20D-Link%20DI-500WF-WT&amp;severity=medium&amp;id=683ed1c6182aa0cae27139d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52561-cwe-708-incorrect-ownership-assignm-29f8cc21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52561%3A%20CWE-708%3A%20Incorrect%20Ownership%20Assignment%20in%20Parallels%20Parallels%20Desktop%20for%20Mac&amp;severity=high&amp;id=683ee1eb182aa0cae27395f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54189-cwe-62-unix-hard-link-in-parallels--5e7743b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54189%3A%20CWE-62%3A%20UNIX%20Hard%20Link%20in%20Parallels%20Parallels%20Desktop%20for%20Mac&amp;severity=high&amp;id=683ee1eb182aa0cae2739638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36486-cwe-62-unix-hard-link-in-parallels--7b08acf1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36486%3A%20CWE-62%3A%20UNIX%20Hard%20Link%20in%20Parallels%20Parallels%20Desktop%20for%20Mac&amp;severity=high&amp;id=683ec755182aa0cae26fb3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31359-cwe-22-improper-limitation-of-a-pat-b48604e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31359%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Parallels%20Parallels%20Desktop%20for%20Mac&amp;severity=high&amp;id=683ee1eb182aa0cae273963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4392-cwe-79-improper-neutralization-of-in-0f7ef9d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anssilaitila%20Shared%20Files%20%E2%80%93%20Frontend%20File%20Upload%20Form%20%26%20Secure%20File%20Sharing&amp;severity=high&amp;id=683ec3d3182aa0cae26f31ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-north-face-warns-customers-of-april-credential-9f6157ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20North%20Face%20warns%20customers%20of%20April%20credential%20stuffing%20attack&amp;severity=medium&amp;id=683ec3c6182aa0cae26f31e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cartier-discloses-data-breach-amid-fashion-brand-c-301d06b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cartier%20discloses%20data%20breach%20amid%20fashion%20brand%20cyberattacks&amp;severity=medium&amp;id=683ec748182aa0cae26fb3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptojacking-campaign-relies-on-devops-tools-007e6806</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cryptojacking%20campaign%20relies%20on%20DevOps%20tools&amp;severity=medium&amp;id=683ecac3182aa0cae27037f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-chrome-to-distrust-two-certificate-authorit-26110c1c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Chrome%20to%20Distrust%20Two%20Certificate%20Authorities%20Over%20Compliance%20and%20Conduct%20Issues&amp;severity=medium&amp;id=683ece4c182aa0cae270b94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5103-cwe-89-improper-neutralization-of-sp-c5fee038</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5103%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpswings%20Ultimate%20Gift%20Cards%20for%20WooCommerce&amp;severity=medium&amp;id=683ee1eb182aa0cae2739640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5116-cwe-79-improper-neutralization-of-in-5139c626</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brikou%20WP%20Plugin%20Info%20Card&amp;severity=medium&amp;id=683ee1eb182aa0cae2739642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4420-cwe-79-improper-neutralization-of-in-45532c5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehunk%20Vayu%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=medium&amp;id=683ee1eb182aa0cae273963e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1725-cwe-434-unrestricted-upload-of-file--0a9fd12f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1725%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bitpressadmin%20File%20Manager&amp;severity=medium&amp;id=683eb229182aa0cae26c7bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46355-incorrect-default-permissions-in-ke-95aad16c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46355%3A%20Incorrect%20default%20permissions%20in%20Keiyo%20System%20Co.%2C%20LTD%20PC%20Time%20Tracer&amp;severity=high&amp;id=683ee1eb182aa0cae2739646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41428-improper-limitation-of-a-pathname-t-d5bb02a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41428%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Keiyo%20System%20Co.%2C%20LTD%20TimeWorks&amp;severity=medium&amp;id=683eaec1182aa0cae26bf6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21479-cwe-863-incorrect-authorization-in--c7b86d94</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21479%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e9d25182aa0cae2697072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4567-cwe-79-cross-site-scripting-xss-in-u-3a7e1456</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4567%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Post%20Slider%20and%20Post%20Carousel%20with%20Post%20Vertical%20Scrolling%20Widget&amp;severity=medium&amp;id=683ee1eb182aa0cae2739610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3662-cwe-79-cross-site-scripting-xss-in-u-71f17853</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3662%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20FancyBox%20for%20WordPress&amp;severity=medium&amp;id=683ee1eb182aa0cae2739648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3584-cwe-79-cross-site-scripting-xss-in-u-9c30f613</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3584%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Newsletter&amp;severity=medium&amp;id=683e92b3182aa0cae267ec93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27038-cwe-416-use-after-free-in-qualcomm--cf256d12</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27038%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27031-cwe-416-use-after-free-in-qualcomm--8323b10b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27031%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27029-cwe-126-buffer-over-read-in-qualcom-984a2cac</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27029%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21486-cwe-822-untrusted-pointer-dereferen-3220390e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21486%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21485-cwe-367-time-of-check-time-of-use-t-83707019</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21485%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21480-cwe-863-incorrect-authorization-in--a5183244</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21480%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21463-cwe-126-buffer-over-read-in-qualcom-ec23ac28</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21463%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53026-cwe-126-buffer-over-read-in-qualcom-d2533f0f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53026%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53021-cwe-126-buffer-over-read-in-qualcom-871994ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53021%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53020-cwe-126-buffer-over-read-in-qualcom-9759752d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53020%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267eca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53019-cwe-126-buffer-over-read-in-qualcom-2d5416bc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53019%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683ee1eb182aa0cae2739625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53018-cwe-367-time-of-check-time-of-use-t-ce3c5b8d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53018%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683ee1eb182aa0cae2739622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53017-cwe-823-use-of-out-of-range-pointer-e98f8158</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53017%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683ee1eb182aa0cae273961f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53016-cwe-367-time-of-check-time-of-use-t-fa8afb75</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53016%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683ee1eb182aa0cae273961c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53015-cwe-416-use-after-free-in-qualcomm--c9217da1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53015%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683ee1eb182aa0cae2739619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53013-cwe-120-buffer-copy-without-checkin-6c36f2a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53013%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683ee1eb182aa0cae2739616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53010-cwe-284-improper-access-control-in--12842816</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53010%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683ee1eb182aa0cae2739613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31712-cwe-120-buffer-copy-without-checkin-b1b0495b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31712%3A%20cwe-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=683ee1eb182aa0cae2739636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31711-cwe-476-null-pointer-dereference-in-02c5f903</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31711%3A%20cwe-476%20NULL%20Pointer%20Dereference%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=683ee1eb182aa0cae2739632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31710-cwe-77-improper-neutralization-of-s-60590290</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31710%3A%20cwe-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FT606%2FT612%2FT616%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=683e8efd182aa0cae2676dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4797-cwe-288-authentication-bypass-using--0fdcbd9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4797%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20uxper%20Golo%20-%20City%20Travel%20Guide%20WordPress%20Theme&amp;severity=critical&amp;id=683ee1eb182aa0cae2739655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4224-cwe-79-improper-neutralization-of-in-1749960f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4224%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpForo%20%2B%20wpForo%20Advanced%20Attachments&amp;severity=high&amp;id=683ee1eb182aa0cae2739664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2939-cwe-502-deserialization-of-untrusted-3f8c42c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2939%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20techjewel%20Ninja%20Tables%20%E2%80%93%20Easy%20Data%20Table%20Builder&amp;severity=medium&amp;id=683e685b182aa0cae261efe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4047-cwe-862-missing-authorization-in-wpm-3b4a3ccf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4047%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Broken%20Link%20Checker&amp;severity=medium&amp;id=683ee1eb182aa0cae2739657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23097-na-in-na-2da5fae0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23097%3A%20n%2Fa&amp;severity=critical&amp;id=683f53f9182aa0cae28a9c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23100-na-in-na-b7b8baf5</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23100%3A%20n%2Fa&amp;severity=high&amp;id=683f5057182aa0cae28a1d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23098-na-in-na-4fbfe96a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23098%3A%20n%2Fa&amp;severity=high&amp;id=683f4ce2182aa0cae2899665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23102-na-in-na-4d010e22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23102%3A%20n%2Fa&amp;severity=high&amp;id=683f45d9182aa0cae28897e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23107-na-in-na-7ee53446</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23107%3A%20n%2Fa&amp;severity=high&amp;id=683f2d48182aa0cae2851980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32106-na-in-na-b80af17a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32106%3A%20n%2Fa&amp;severity=critical&amp;id=683f22b8182aa0cae2839b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32105-na-in-na-dce76ee0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32105%3A%20n%2Fa&amp;severity=critical&amp;id=683f22b8182aa0cae2839b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23103-na-in-na-6d946119</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23103%3A%20n%2Fa&amp;severity=high&amp;id=683f1be9182aa0cae2829c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44148-na-in-na-bef9da02</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44148%3A%20n%2Fa&amp;severity=critical&amp;id=683f1834182aa0cae2821d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45854-na-in-na-c30f7f76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45854%3A%20CWE-862%20Missing%20Authorization%20in%20JEHc%20JEHC-BPM&amp;severity=critical&amp;id=683f14ab182aa0cae2819e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43925-na-in-na-b608be51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43925%3A%20n%2Fa&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43924-na-in-na-f55399d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43924%3A%20n%2Fa&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43923-na-in-na-3e6626a7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43923%3A%20n%2Fa&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45855-na-in-na-fce4e517</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45855%3A%20n%2Fa&amp;severity=medium&amp;id=683f034a182aa0cae27e65d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46154-na-in-na-9ff5e9ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46154%3A%20n%2Fa&amp;severity=high&amp;id=683eff8d182aa0cae27db82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5068-use-after-free-in-google-chrome-fdfa58aa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5068%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=683e5dc4182aa0cae2606b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5419-out-of-bounds-read-and-write-in-goog-18c2fa35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5419%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=683e5dc4182aa0cae2606b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-ios-activation-infrastructure-vulnerabili-91ae5a58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20iOS%20Activation%20Infrastructure%20Vulnerability%3A%20Unauthenticated%20Provisioning%20Injection%20at%20Apple%E2%80%99s%20SIM%20Activation%20Endpoint&amp;severity=critical&amp;id=683e338e182aa0cae25a622f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3919-cwe-79-improper-neutralization-of-in-1a0d3eac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtoffee%20Comments%20Import%20%26%20Export&amp;severity=medium&amp;id=683ee1eb182aa0cae27396a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pypi-supply-chain-attack-uncovered-colorama-and-co-77f61290</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PyPI%20Supply%20Chain%20Attack%20Uncovered%3A%20Colorama%20and%20Colorizr%20Name%20Confusion&amp;severity=medium&amp;id=683e2204182aa0cae257e951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47585-cwe-862-missing-authorization-in-ma-05059cfc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47585%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=683ee1eb182aa0cae27396aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48996-cwe-201-insertion-of-sensitive-info-9780e8e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48996%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=683ee1eb182aa0cae27396ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48387-cwe-22-improper-limitation-of-a-pat-dc3c504f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48387%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mafintosh%20tar-fs&amp;severity=high&amp;id=683dfb4f182aa0cae252782f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1051-cwe-122-heap-based-buffer-overflow-i-d52f9f85</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1051%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Sonos%20Era%20300&amp;severity=high&amp;id=683df7d6182aa0cae251f9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49069-cwe-352-cross-site-request-forgery--fb2bc6b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49069%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cimatti%20Contact%20Forms%20by%20Cimatti&amp;severity=null&amp;id=683df463182aa0cae2517ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5086-cwe-502-deserialization-of-untrusted-72e175c9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5086%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Apriso&amp;severity=critical&amp;id=683de64b182aa0cae24f7c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20298-the-product-specifies-permissions-f-cbf7659b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20298%3A%20The%20product%20specifies%20permissions%20for%20a%20security-critical%20resource%20in%20a%20way%20that%20allows%20that%20resource%20to%20be%20read%20or%20modified%20by%20unintended%20actors.%20in%20Splunk%20Splunk%2FUniversalForwarder%20for%20Windows&amp;severity=high&amp;id=683ddf3a182aa0cae24e7e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20297-the-software-does-not-neutralize-or-b50d8d08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20297%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=683ddf3a182aa0cae24e7e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5036-cwe-416-use-after-free-in-autodesk-r-187e5450</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5036%3A%20CWE-416%20Use-After-Free%20in%20Autodesk%20Revit&amp;severity=high&amp;id=683ddbb0182aa0cae24dff85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1440-cwe-601-url-redirection-to-untrusted-63666ce7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1440%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=683ddbb0182aa0cae24dff83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8008-cwe-79-improper-neutralization-of-in-08272c93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8008%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=683dd85d182aa0cae24d814d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3509-cwe-79-improper-neutralization-of-in-6c26d155</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=683dd85d182aa0cae24d8147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7074-cwe-434-unrestricted-upload-of-file--b91c5a3c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7074%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=683dd85d182aa0cae24d814b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7073-cwe-918-server-side-request-forgery--4892a3c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7073%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WSO2%20WSO2%20Identity%20Server%20as%20Key%20Manager&amp;severity=medium&amp;id=683dd85d182aa0cae24d8149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48995-cwe-208-observable-timing-discrepan-a83a5ccb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48995%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20XML-Security%20signxml&amp;severity=medium&amp;id=683dd4a1182aa0cae24c8319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48994-cwe-303-incorrect-implementation-of-2a8ee760</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48994%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20XML-Security%20signxml&amp;severity=medium&amp;id=683dd12a182aa0cae24c049d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48941-cwe-1230-exposure-of-sensitive-info-512a9e1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48941%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20mybb%20mybb&amp;severity=medium&amp;id=683dcda1182aa0cae24b862f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48940-cwe-22-improper-limitation-of-a-pat-70da709a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48940%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mybb%20mybb&amp;severity=high&amp;id=683dca2c182aa0cae24b06a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48866-cwe-1050-excessive-platform-resourc-865d3525</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48866%3A%20CWE-1050%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20owasp-modsecurity%20ModSecurity&amp;severity=high&amp;id=683dca2c182aa0cae24b06a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48877-cwe-680-integer-overflow-to-buffer--c03e6ecc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48877%3A%20CWE-680%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20xls2csv%20xls2csv&amp;severity=high&amp;id=683dbfa6182aa0cae249835c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52035-cwe-190-integer-overflow-or-wraparo-f2045f3f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52035%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20catdoc%20catdoc&amp;severity=high&amp;id=683dbfa6182aa0cae249835e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54028-cwe-191-integer-underflow-wrap-or-w-5994fa1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54028%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20catdoc%20catdoc&amp;severity=high&amp;id=683dbfa6182aa0cae2498360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20001-cwe-125-out-of-bounds-read-in-high--e8ed6ece</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20001%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20High-Logic%20FontCreator&amp;severity=medium&amp;id=683dbc14182aa0cae2490294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37096-vulnerability-in-hewlett-packard-en-c9f21051</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37096%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=high&amp;id=683db512182aa0cae2480401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37095-vulnerability-in-hewlett-packard-en-a6dd9a1f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37095%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=medium&amp;id=683dca2c182aa0cae24b06af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37094-vulnerability-in-hewlett-packard-en-daeae001</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37094%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=medium&amp;id=683db18d182aa0cae2478417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37093-vulnerability-in-hewlett-packard-en-815ac93d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37093%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=critical&amp;id=683dca2c182aa0cae24b06a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37092-vulnerability-in-hewlett-packard-en-6ba6bba2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37092%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=high&amp;id=683dadf9182aa0cae2470455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37091-vulnerability-in-hewlett-packard-en-6348e900</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37091%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=high&amp;id=683daa76182aa0cae2468219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5447-os-command-injection-in-linksys-re65-57dba825</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5447%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683dd85d182aa0cae24d816a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37090-vulnerability-in-hewlett-packard-en-223fd190</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37090%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=medium&amp;id=683dca2c182aa0cae24b06ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37089-vulnerability-in-hewlett-packard-en-7f5de9ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37089%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=high&amp;id=683dca2c182aa0cae24b06ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-robbinhood-ransomware-operator-pleads-guil-13a24c5c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Robbinhood%20Ransomware%20Operator%20Pleads%20Guilty%20in%20US%20City%20Attacks&amp;severity=medium&amp;id=683da37a182aa0cae2457b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26396-cwe-269-improper-privilege-manageme-7ce772ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26396%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SolarWinds%20Dameware%20Mini%20Remote%20Control%20Service&amp;severity=high&amp;id=683da38f182aa0cae2457b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5446-os-command-injection-in-linksys-re65-af7bf79b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5446%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683dd85d182aa0cae24d816c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12168-cwe-426-untrusted-search-path-in-ya-9f9af4a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12168%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Yandex%20Telemost&amp;severity=high&amp;id=683d9ffd182aa0cae244c3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5445-os-command-injection-in-linksys-re65-470d4ded</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5445%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683dd12a182aa0cae24c049f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46806-cwe-823-use-of-out-of-range-pointer-a993d2cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46806%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20https%3A%2F%2Fgithub.com%2Fyrutschle%2Fsslh%2Freleases%2Ftag%2Fv2.2.4%20sslh&amp;severity=medium&amp;id=683d9907182aa0cae2439cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5444-os-command-injection-in-linksys-re65-b13e1abc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5444%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d9584182aa0cae242f8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5443-os-command-injection-in-linksys-re65-12776e22</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5443%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d9584182aa0cae242f8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46807-cwe-770-allocation-of-resources-wit-f4692654</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46807%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20https%3A%2F%2Fgithub.com%2Fyrutschle%2Fsslh%2Freleases%2Ftag%2Fv2.2.4%20sslh&amp;severity=high&amp;id=683d9584182aa0cae242f8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-found-in-preinstalled-apps-on-andr-bde7f563</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Found%20in%20Preinstalled%20apps%20on%20Android%20Smartphones%20could%20perform%20factory%20reset%20of%20device%2C%20exfiltrate%20PIN%20code%20or%20inject%20an%20arbitrary%20intent%20with%20system-level%20privileges&amp;severity=medium&amp;id=683d8aea182aa0cae2412e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48990-cwe-122-heap-based-buffer-overflow--845ae16a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48990%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20nekernel-org%20nekernel&amp;severity=high&amp;id=683d9584182aa0cae242f8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48958-cwe-79-improper-neutralization-of-i-d2606a19</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48958%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20froxlor%20Froxlor&amp;severity=medium&amp;id=683d9584182aa0cae242f8b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48957-cwe-23-relative-path-traversal-in-a-a931fae5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48957%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20AstrBotDevs%20AstrBot&amp;severity=high&amp;id=683d9584182aa0cae242f8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48955-cwe-532-insertion-of-sensitive-info-a2a61473</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48955%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Erudika%20para&amp;severity=medium&amp;id=683d9584182aa0cae242f8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48495-cwe-79-improper-neutralization-of-i-741774ee</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48495%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=683d9584182aa0cae242f8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1246-cwe-119-improper-restriction-of-oper-1e39fb9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1246%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Arm%20Ltd%20Bifrost%20GPU%20Userspace%20Driver&amp;severity=high&amp;id=683d94ca182aa0cae24279e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0819-cwe-416-use-after-free-in-arm-ltd-bi-7aa7d51f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0819%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Bifrost%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=683d94ca182aa0cae24279e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0073-cwe-416-use-after-free-in-arm-ltd-va-56ca9432</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0073%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=683d94ca182aa0cae242798b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48494-cwe-79-improper-neutralization-of-i-05da17f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48494%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=683d94ca182aa0cae24279eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47289-cwe-1004-sensitive-cookie-without-h-32c58c11</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47289%3A%20CWE-1004%3A%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20CE-PhoenixCart%20PhoenixCart&amp;severity=medium&amp;id=683d94ca182aa0cae24279e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5442-os-command-injection-in-linksys-re65-8edf0e10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5442%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d94ca182aa0cae24279ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47272-cwe-306-missing-authentication-for--9a468408</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47272%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20CE-PhoenixCart%20PhoenixCart&amp;severity=medium&amp;id=683d83e8182aa0cae2402a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29785-cwe-248-uncaught-exception-in-quic--12f7622e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29785%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20quic-go%20quic-go&amp;severity=high&amp;id=683d94ca182aa0cae24279ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3454-cwe-285-in-grafana-grafana-513a6526</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3454%3A%20CWE-285%20in%20Grafana%20Grafana&amp;severity=medium&amp;id=683d806b182aa0cae23faafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5441-os-command-injection-in-linksys-re65-63033c30</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5441%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d94ca182aa0cae24279f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-recruiter-emails-target-cfos-using-legit-netb-d6924a33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Recruiter%20Emails%20Target%20CFOs%20Using%20Legit%20NetBird%20Tool%20Across%206%20Global%20Regions&amp;severity=medium&amp;id=683d805a182aa0cae23faaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cyberattack-hit-hospitals-operated-by-covenant-h-ef946af5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20cyberattack%20hit%20hospitals%20operated%20by%20Covenant%20Health&amp;severity=medium&amp;id=683d875f182aa0cae240aea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3260-cwe-863-in-grafana-grafana-b9138155</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3260%3A%20CWE-863%20in%20Grafana%20Grafana&amp;severity=high&amp;id=683d94ca182aa0cae24279f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1750-cwe-89-improper-neutralization-of-sp-2e5cf172</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1750%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=critical&amp;id=683d795f182aa0cae23eac2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5440-os-command-injection-in-linksys-re65-3d34da3e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5440%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d94ca182aa0cae24279f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/backdoors-in-python-and-npm-packages-spotted-targe-5c6f0cad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Backdoors%20in%20Python%20and%20NPM%20Packages%20Spotted%20Targeting%20Windows%20and%20Linux%20Systems&amp;severity=medium&amp;id=683d75dd182aa0cae23e2bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5439-os-command-injection-in-linksys-re65-570df564</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5439%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d723c182aa0cae23dac5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5438-command-injection-in-linksys-re6500-20b94095</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5438%3A%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d6b34182aa0cae23cac68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5455-cwe-20-improper-input-validation-in--df203ad0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5455%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Qt%20Company%20Qt&amp;severity=high&amp;id=683d67c1182aa0cae23c2b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5437-improper-authentication-in-multilase-82a6fa24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5437%3A%20Improper%20Authentication%20in%20Multilaser%20Sirius%20RE016&amp;severity=medium&amp;id=683d644c182aa0cae23bab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5436-information-disclosure-in-multilaser-c4a43896</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5436%3A%20Information%20Disclosure%20in%20Multilaser%20Sirius%20RE016&amp;severity=medium&amp;id=683d5d4a182aa0cae23aa79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0358-cwe-269-improper-privilege-managemen-ee3a78f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0358%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=high&amp;id=683d59b7182aa0cae23a2778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0325-cwe-1287-improper-validation-of-spec-1acfdc38</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0325%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=683d94ca182aa0cae24279a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0324-cwe-791-incomplete-filtering-of-spec-76828af4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0324%3A%20CWE-791%3A%20Incomplete%20Filtering%20of%20Special%20Elements%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=critical&amp;id=683d562a182aa0cae239a589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5435-sql-injection-in-marwal-infotech-cms-c64800e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5435%3A%20SQL%20Injection%20in%20Marwal%20Infotech%20CMS&amp;severity=medium&amp;id=683d94ca182aa0cae24279a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5113-cwe-77-improper-neutralization-of-sp-20aacc97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5113%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Diviotec%20nbr222p&amp;severity=high&amp;id=683d528d182aa0cae239267d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4010-cwe-77-improper-neutralization-of-sp-86cadf51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4010%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Netcomm%20NTC%206200&amp;severity=high&amp;id=683d4f22182aa0cae238a6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5434-sql-injection-in-aem-solutions-cms-ba10af9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5434%3A%20SQL%20Injection%20in%20Aem%20Solutions%20CMS&amp;severity=medium&amp;id=683d94ca182aa0cae24279a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5433-sql-injection-in-fengoffice-feng-off-cfeea14b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5433%3A%20SQL%20Injection%20in%20Fengoffice%20Feng%20Office&amp;severity=medium&amp;id=683d47f3182aa0cae237a96c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1235-cwe-190-integer-overflow-or-wraparou-0b725d95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1235%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20WAGO%20Fully%20Managed%20Switches%200852-0303&amp;severity=medium&amp;id=683d4476182aa0cae237287d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5432-sql-injection-in-assamlook-cms-5e48a1fd</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5432%3A%20SQL%20Injection%20in%20AssamLook%20CMS&amp;severity=medium&amp;id=683d94ca182aa0cae24279ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3951-cwe-89-sql-injection-in-unknown-wp-o-f5982aa8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3951%3A%20CWE-89%20SQL%20Injection%20in%20WP-Optimize&amp;severity=medium&amp;id=683d94ca182aa0cae24279aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1485-cwe-79-cross-site-scripting-xss-in-u-d5028dbf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1485%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Real%20Cookie%20Banner%3A%20GDPR%20%26%20ePrivacy%20Cookie%20Consent&amp;severity=medium&amp;id=683d4125182aa0cae236aa24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5431-sql-injection-in-assamlook-cms-811613ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5431%3A%20SQL%20Injection%20in%20AssamLook%20CMS&amp;severity=medium&amp;id=683d39f8182aa0cae235aa1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5430-sql-injection-in-assamlook-cms-342ef505</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5430%3A%20SQL%20Injection%20in%20AssamLook%20CMS&amp;severity=medium&amp;id=683d32fd182aa0cae234acbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5429-improper-access-controls-in-juzaweb--35af3e4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5429%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d94ca182aa0cae24279b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25179-cwe-280-improper-handling-of-insuff-08693b99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25179%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=683d2853182aa0cae23331c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5428-improper-access-controls-in-juzaweb--f5ad58e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5428%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d24dd182aa0cae232b354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5427-improper-access-controls-in-juzaweb--b63189b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5427%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d2157182aa0cae2322f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11857-cwe-59-improper-link-resolution-bef-54212dea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11857%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Realtek%20Bluetooth%20HCI%20Adaptor&amp;severity=high&amp;id=683d1df1182aa0cae231b0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5426-improper-access-controls-in-juzaweb--1b96323d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5426%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d16f6182aa0cae230af10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5425-improper-access-controls-in-juzaweb--d4c78a8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5425%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d16f6182aa0cae230af0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20678-cwe-674-uncontrolled-recursion-in-m-1b8759bc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20678%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6785U%2C%20MT6789%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=683d16f6182aa0cae230af0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20677-cwe-476-null-pointer-dereference-in-4af5c108</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20677%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=683d16f6182aa0cae230af0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20676-cwe-476-null-pointer-dereference-in-bcb4292e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20676%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=683d16f6182aa0cae230af08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20675-cwe-476-null-pointer-dereference-in-b3e46e72</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20675%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=683d16f6182aa0cae230af06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20674-cwe-863-incorrect-authorization-in--55098e9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20674%3A%20CWE-863%20Incorrect%20Authorization%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT6990%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986%2C%20MT7990%2C%20MT7992%2C%20MT7993&amp;severity=critical&amp;id=683d16f6182aa0cae230af04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20673-cwe-476-null-pointer-dereference-in-a3fe943a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20673%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=683d16f6182aa0cae230af02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20672-cwe-122-heap-overflow-in-mediatek-i-43208305</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20672%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=critical&amp;id=683d16f6182aa0cae230af00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5424-improper-access-controls-in-juzaweb--0990e4d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5424%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d0fd8182aa0cae22fb20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5423-improper-access-controls-in-juzaweb--37edb9c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5423%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d0534182aa0cae22e37c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5422-improper-access-controls-in-juzaweb--d3d0a4f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5422%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683cfaf4182aa0cae22cbd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5421-improper-access-controls-in-juzaweb--bf7cee7d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5421%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683cf3bf182aa0cae22bc11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5420-cross-site-scripting-in-juzaweb-cms-76e39d3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5420%3A%20Cross%20Site%20Scripting%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683cecc9182aa0cae22ac3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49164-cwe-321-use-of-hard-coded-cryptogra-5fc58b15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49164%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Arris%20VIP1113&amp;severity=medium&amp;id=683e5dc4182aa0cae2606b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49163-cwe-424-improper-protection-of-alte-12c3f626</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49163%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20Arris%20VIP1113&amp;severity=medium&amp;id=683e5dc4182aa0cae2606b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49162-cwe-424-improper-protection-of-alte-77806c1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49162%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20Arris%20VIP1113&amp;severity=medium&amp;id=683e3aa0182aa0cae25b608f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23104-na-in-na-9c2ebb3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23104%3A%20n%2Fa&amp;severity=medium&amp;id=683e0ce3182aa0cae254f0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23099-na-in-na-9fe410b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23099%3A%20n%2Fa&amp;severity=critical&amp;id=683df0d1182aa0cae250fc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23105-na-in-na-b8dc2ff2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23105%3A%20n%2Fa&amp;severity=high&amp;id=683ded3e182aa0cae2507d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27953-na-in-na-114f061e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27953%3A%20n%2Fa&amp;severity=medium&amp;id=683de64b182aa0cae24f7c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27955-na-in-na-68ab77cc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27955%3A%20n%2Fa&amp;severity=medium&amp;id=683de64b182aa0cae24f7c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27954-na-in-na-a953933d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27954%3A%20n%2Fa&amp;severity=medium&amp;id=683de64b182aa0cae24f7c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27956-na-in-na-5ec7daaa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27956%3A%20n%2Fa&amp;severity=high&amp;id=683de2b3182aa0cae24efd21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45387-na-in-na-982e3574</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45387%3A%20n%2Fa&amp;severity=medium&amp;id=683ddf3a182aa0cae24e7e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57783-cwe-79-improper-neutralization-of-i-90f58d53</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20alexpinel%20Dot&amp;severity=high&amp;id=683dd85d182aa0cae24d8168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45542-na-in-na-cd919715</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45542%3A%20n%2Fa&amp;severity=high&amp;id=683dcda1182aa0cae24b8633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57459-na-in-na-d6d8ca6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57459%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683dcda1182aa0cae24b8631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44115-na-in-na-6f38151b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44115%3A%20n%2Fa&amp;severity=medium&amp;id=683dc685182aa0cae24a84c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40114-na-in-na-54cdacd8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40114%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dc31f182aa0cae24a04cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40113-na-in-na-f0fd175f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40113%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dc31f182aa0cae24a04cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40112-na-in-na-29c1e58c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40112%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dc31f182aa0cae24a04c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44172-na-in-na-4f06a411</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44172%3A%20n%2Fa&amp;severity=medium&amp;id=683dbfa5182aa0cae249828d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49112-cwe-191-integer-underflow-wrap-or-w-88bc876e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49112%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Valkey%20Valkey&amp;severity=low&amp;id=683d94ca182aa0cae24279b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49113-cwe-502-deserialization-of-untruste-d0180bc6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49113%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Roundcube%20Webmail&amp;severity=critical&amp;id=683d2bda182aa0cae233b0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5412-cross-site-scripting-in-mist-communi-2dab0ddb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5412%3A%20Cross%20Site%20Scripting%20in%20Mist%20Community%20Edition&amp;severity=medium&amp;id=683ce5b1182aa0cae229c28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5411-cross-site-scripting-in-mist-communi-641c790e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5411%3A%20Cross%20Site%20Scripting%20in%20Mist%20Community%20Edition&amp;severity=medium&amp;id=683cde92182aa0cae228c6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5410-cross-site-request-forgery-in-mist-c-f0b60695</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5410%3A%20Cross-Site%20Request%20Forgery%20in%20Mist%20Community%20Edition&amp;severity=medium&amp;id=683cd785182aa0cae227c951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5409-improper-access-controls-in-mist-com-2a548bdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5409%3A%20Improper%20Access%20Controls%20in%20Mist%20Community%20Edition&amp;severity=medium&amp;id=683cd084182aa0cae226c66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5408-buffer-overflow-in-wavlink-quantum-d-eb4cee74</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5408%3A%20Buffer%20Overflow%20in%20WAVLINK%20QUANTUM%20D2G&amp;severity=critical&amp;id=683cc96a182aa0cae225ca16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5407-cross-site-scripting-in-chaitak-gora-e4f2f058</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5407%3A%20Cross%20Site%20Scripting%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683cc26c182aa0cae224cdf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5406-unrestricted-upload-in-chaitak-gorai-46225afd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5406%3A%20Unrestricted%20Upload%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c9f34182aa0cae21f5020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5405-cross-site-scripting-in-chaitak-gora-26810a23</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5405%3A%20Cross%20Site%20Scripting%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c9846182aa0cae21e53c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5404-denial-of-service-in-chaitak-gorai-b-5392f910</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5404%3A%20Denial%20of%20Service%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c831b182aa0cae21b5ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5403-sql-injection-in-chaitak-gorai-blogb-e8782057</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5403%3A%20SQL%20Injection%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c7c3a182aa0cae21a6263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5402-sql-injection-in-chaitak-gorai-blogb-5f5114bb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5402%3A%20SQL%20Injection%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c600b182aa0cae2166b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40908-cwe-552-files-or-directories-access-8db4a7c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40908%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20TINITA%20YAML%3A%3ALibYAML&amp;severity=critical&amp;id=683c58f0182aa0cae2156967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5401-sql-injection-in-chaitak-gorai-blogb-7e7e72b6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5401%3A%20SQL%20Injection%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c51f5182aa0cae2143187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33005-cwe-613-insufficient-session-expira-85b2b0bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33005%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=683c4b86182aa0cae212f9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33004-cwe-22-improper-limitation-of-a-pat-24844126</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33004%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=683c4b86182aa0cae212f9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2896-cwe-79-improper-neutralization-of-in-9df281ed</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=683c4afe182aa0cae212be0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25044-cwe-79-improper-neutralization-of-i-bce3575e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=683c475c182aa0cae212045c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1499-cwe-312-cleartext-storage-of-sensiti-576e88c2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1499%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=683c4b86182aa0cae212f9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5400-sql-injection-in-chaitak-gorai-blogb-535a69aa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5400%3A%20SQL%20Injection%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c129f182aa0cae20a1aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reverse-engineer-android-apps-for-api-key-e10043d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reverse%20Engineer%20Android%20Apps%20for%20API%20Key&amp;severity=medium&amp;id=683b898b182aa0cae2f6cd5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5390-improper-access-controls-in-jeewms-2221e380</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5390%3A%20Improper%20Access%20Controls%20in%20JeeWMS&amp;severity=medium&amp;id=683b54e3182aa0cae2eede5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5389-improper-access-controls-in-jeewms-32c31307</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5389%3A%20Improper%20Access%20Controls%20in%20JeeWMS&amp;severity=medium&amp;id=683b4dca182aa0cae2ede215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5388-sql-injection-in-jeewms-ff26520d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5388%3A%20SQL%20Injection%20in%20JeeWMS&amp;severity=medium&amp;id=683b46cf182aa0cae2ece5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5387-improper-access-controls-in-jeewms-4c8da34a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5387%3A%20Improper%20Access%20Controls%20in%20JeeWMS&amp;severity=medium&amp;id=683b3fb0182aa0cae2ebe9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-http-interceptsuite-for-tcptls-traffic-inte-4c935c54</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20HTTP%3A%20InterceptSuite%20for%20TCP%2FTLS%20Traffic%20Interception%20in%20Windows&amp;severity=medium&amp;id=683b3c40182aa0cae2eb6b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experimenting-with-usb-based-attacks-can-a-standar-42aad223</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experimenting%20with%20USB-Based%20Attacks%3A%20Can%20a%20Standard%20USB%20Become%20a%20Bad%20USB%3F%20(Write-up)&amp;severity=medium&amp;id=683b3c40182aa0cae2eb6b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5386-sql-injection-in-jeewms-b7b957a8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5386%3A%20SQL%20Injection%20in%20JeeWMS&amp;severity=medium&amp;id=683b38a5182aa0cae2eaed31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5385-path-traversal-in-jeewms-7f381571</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5385%3A%20Path%20Traversal%20in%20JeeWMS&amp;severity=medium&amp;id=683b31a0182aa0cae2e9f0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/case-study-real-world-wordpress-vulnerability-chai-537a8371</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Case%20Study%3A%20Real-world%20WordPress%20Vulnerability%20Chain%20(Found%20During%20Passive%20Testing)&amp;severity=medium&amp;id=683b31a2182aa0cae2e9f0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5384-sql-injection-in-jeewms-94da2dd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5384%3A%20SQL%20Injection%20in%20JeeWMS&amp;severity=medium&amp;id=683b2a9b182aa0cae2e8f4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5383-cross-site-scripting-in-yifang-cms-214b27c0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5383%3A%20Cross%20Site%20Scripting%20in%20Yifang%20CMS&amp;severity=medium&amp;id=683b1c85182aa0cae2e6fa90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-deploys-new-nodesnake-rat-in--628ff110</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20Ransomware%20Deploys%20New%20NodeSnake%20RAT%20in%20UK%20Attacks&amp;severity=medium&amp;id=683b1582182aa0cae2e5fe37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5381-path-traversal-in-yifang-cms-301c16e6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5381%3A%20Path%20Traversal%20in%20Yifang%20CMS&amp;severity=medium&amp;id=683b1598182aa0cae2e5fe45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5380-path-traversal-in-ashinigit-xuesheng-cb2244fb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5380%3A%20Path%20Traversal%20in%20ashinigit%20%E5%A4%A9%E9%9D%92%E4%B8%80%E7%99%BD%20XueShengZhuSu%20%E5%AD%A6%E7%94%9F%E4%BD%8F%E5%AE%BF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=683b0e91182aa0cae2e5002c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5379-hard-coded-credentials-in-nucom-nc-w-785262d3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5379%3A%20Hard-coded%20Credentials%20in%20NuCom%20NC-WR744G&amp;severity=medium&amp;id=683b076b182aa0cae2e401e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5378-cross-site-scripting-in-astun-techno-7f142b85</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5378%3A%20Cross%20Site%20Scripting%20in%20Astun%20Technology%20iShare%20Maps&amp;severity=medium&amp;id=683b03fd182aa0cae2e382a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5377-cross-site-scripting-in-astun-techno-8dc54a43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5377%3A%20Cross%20Site%20Scripting%20in%20Astun%20Technology%20iShare%20Maps&amp;severity=medium&amp;id=683afcfc182aa0cae2e20c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5376-sql-injection-in-sourcecodester-heal-3144ff35</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5376%3A%20SQL%20Injection%20in%20SourceCodester%20Health%20Center%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=683af5e1182aa0cae2e055b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4691-cwe-639-authorization-bypass-through-d339a0ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4691%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20syntactics%20eaSYNC%20Booking%20%E2%80%93%20Hotels%2C%20Restaurants%20%26%20Car%20Rentals&amp;severity=medium&amp;id=683af5e1182aa0cae2e055b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4857-cwe-22-improper-limitation-of-a-path-84afca11</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4857%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20contrid%20Newsletters&amp;severity=high&amp;id=683af5e1182aa0cae2e055b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-linux-flaws-allow-password-hash-theft-via-core-24309d42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Linux%20Flaws%20Allow%20Password%20Hash%20Theft%20via%20Core%20Dumps%20in%20Ubuntu%2C%20RHEL%2C%20Fedora&amp;severity=medium&amp;id=683ae0c9182aa0cae2dce654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5375-sql-injection-in-phpgurukul-hpguruku-0724f6e8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5375%3A%20SQL%20Injection%20in%20PHPGurukul%20HPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=683add41182aa0cae2dc680b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireless-pivots-how-trusted-networks-become-invisi-f4b53f60</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireless%20Pivots%3A%20How%20Trusted%20Networks%20Become%20Invisible%20Threat%20Vectors&amp;severity=medium&amp;id=683ad9cc182aa0cae2dbe9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5374-sql-injection-in-phpgurukul-online-b-d76a2f11</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5374%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=683ad652182aa0cae2db6abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5373-sql-injection-in-phpgurukul-online-b-0dec92ee</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5373%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=683ac129182aa0cae2d87357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5371-sql-injection-in-sourcecodester-heal-6847d3e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5371%3A%20SQL%20Injection%20in%20SourceCodester%20Health%20Center%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=683aba2c182aa0cae2d7774f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3813-cwe-79-improper-neutralization-of-in-50eb5dda</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=683ab30e182aa0cae2d67b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5290-cwe-79-improper-neutralization-of-in-373a861c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5290%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20visualmodo%20Borderless%20%E2%80%93%20Addons%20and%20Templates%20for%20Elementor&amp;severity=medium&amp;id=683ab30e182aa0cae2d67b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4595-cwe-79-improper-neutralization-of-in-92cd32e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4595%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jtewes%20FastSpring&amp;severity=medium&amp;id=683aa517182aa0cae2d47e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4631-cwe-285-improper-authorization-in-un-69c567db</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4631%3A%20CWE-285%20Improper%20Authorization%20in%20unitybusinesstechnology%20The%20E-Commerce%20ERP%3A%20Purchasing%2C%20Inventory%2C%20Fulfillment%2C%20Manufacturing%2C%20BOM%2C%20Accounting%2C%20Sales%20Analysis&amp;severity=critical&amp;id=683aa517182aa0cae2d47e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5285-cwe-79-improper-neutralization-of-in-93a8c9e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5285%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spiderwares%20Product%20Subtitle%20for%20WooCommerce&amp;severity=medium&amp;id=683aa517182aa0cae2d47e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5292-cwe-79-improper-neutralization-of-in-7c544388</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5292%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=683aa517182aa0cae2d47e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4607-cwe-330-use-of-insufficiently-random-d00dc492</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4607%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20empoweringprowebsite%20PSW%20Front-end%20Login%20%26%20Registration&amp;severity=critical&amp;id=683aa517182aa0cae2d47e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4672-cwe-285-improper-authorization-in-of-6dbd109f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4672%3A%20CWE-285%20Improper%20Authorization%20in%20offsprout%20Offsprout%20Page%20Builder&amp;severity=high&amp;id=683aa517182aa0cae2d47e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4590-cwe-79-improper-neutralization-of-in-5448edc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4590%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20daisycon%20Daisycon%20prijsvergelijkers&amp;severity=medium&amp;id=683aa517182aa0cae2d47e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4103-cwe-285-improper-authorization-in-lu-46aa1f20</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4103%3A%20CWE-285%20Improper%20Authorization%20in%20luminfire%20WP-GeoMeta&amp;severity=high&amp;id=683aa517182aa0cae2d47e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5370-sql-injection-in-phpgurukul-news-por-cc7d9a33</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5370%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=683a96f7182aa0cae2d28576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5369-sql-injection-in-sourcecodester-php--e8c30cec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5369%3A%20SQL%20Injection%20in%20SourceCodester%20PHP%20Display%20Username%20After%20Login&amp;severity=medium&amp;id=683a8feb182aa0cae2d188d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5368-sql-injection-in-phpgurukul-daily-ex-dd989d80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5368%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=683a81f2182aa0cae2cf8beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5016-cwe-79-improper-neutralization-of-in-d660ef45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5016%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Relevanssi%20Relevanssi%20Premium&amp;severity=medium&amp;id=683a7ada182aa0cae2ce8ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5367-sql-injection-in-phpgurukul-online-s-15feac18</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5367%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=683a5ecb182aa0cae2ca9873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5365-sql-injection-in-campcodes-online-ho-13d7fe46</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5365%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a50aa182aa0cae2c8a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-25111-cwe-277-insecure-inherited-permissi-712b516a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-25111%3A%20CWE-277%20Insecure%20Inherited%20Permissions%20in%20django-helpdesk%20Project%20django-helpdesk&amp;severity=medium&amp;id=683a50aa182aa0cae2c8a051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5364-sql-injection-in-campcodes-online-ho-4611a2fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5364%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a267c182aa0cae2c28cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/azure-arc-c2aas-e59ea6da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Azure%20Arc%20-%20C2aaS&amp;severity=medium&amp;id=683a22f4182aa0cae2c20e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5363-sql-injection-in-campcodes-online-ho-71753b88</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5363%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a1f77182aa0cae2c19033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5362-sql-injection-in-campcodes-online-ho-43d1a907</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5362%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a1865182aa0cae2c0131b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-are-exploiting-critical-flaw-in-vbulletin--6d915791</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20are%20exploiting%20critical%20flaw%20in%20vBulletin%20forum%20software&amp;severity=critical&amp;id=683a1169182aa0cae2bf163e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5361-sql-injection-in-campcodes-online-ho-22ed28cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5361%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a1182182aa0cae2bf164b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48882-cwe-611-improper-restriction-of-xml-780311e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48882%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20PHPOffice%20Math&amp;severity=high&amp;id=683a0def182aa0cae2be9814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48949-cwe-89-improper-neutralization-of-s-b5dcaa62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48949%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20navidrome%20navidrome&amp;severity=high&amp;id=683a0a8d182aa0cae2be195f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5360-sql-injection-in-campcodes-online-ho-de68f486</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5360%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a0a8d182aa0cae2be1965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48948-cwe-863-incorrect-authorization-in--5a8c4ff5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48948%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20navidrome%20navidrome&amp;severity=high&amp;id=683a0a8d182aa0cae2be196d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48946-cwe-327-use-of-a-broken-or-risky-cr-4447fbfd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48946%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20open-quantum-safe%20liboqs&amp;severity=low&amp;id=683a06f1182aa0cae2bd9a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2503-cwe-280-improper-handling-of-insuffi-1619b5df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2503%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Lenovo%20PC%20Manager&amp;severity=medium&amp;id=683a06f1182aa0cae2bd9a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2502-cwe-276-incorrect-default-permission-39a01477</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2502%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2501-cwe-426-untrusted-search-path-in-len-1bf3082c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2501%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1479-cwe-489-active-debug-code-in-lenovo--caf52495</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1479%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Lenovo%20Legion%20Space%20for%20Legion%20Go&amp;severity=medium&amp;id=683a06f1182aa0cae2bd9a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/germany-doxxes-conti-ransomware-and-trickbot-ring--fb69684d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Germany%20doxxes%20Conti%20ransomware%20and%20TrickBot%20ring%20leader&amp;severity=medium&amp;id=6839ffc9182aa0cae2bc9d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-takes-down-avcheck-site-used-by-cybercrimin-31da7014</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20takes%20down%20AVCheck%20site%20used%20by%20cybercriminals%20to%20scan%20malware&amp;severity=medium&amp;id=6839ffc9182aa0cae2bc9d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48883-cwe-79-improper-neutralization-of-i-3e6f9c23</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48883%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chrome-php%20chrome&amp;severity=medium&amp;id=6839ffe7182aa0cae2bc9d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48938-cwe-501-trust-boundary-violation-in-f4ffcdc3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48938%3A%20CWE-501%3A%20Trust%20Boundary%20Violation%20in%20cli%20go-gh&amp;severity=low&amp;id=6839ffe7182aa0cae2bc9d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48885-cwe-352-cross-site-request-forgery--e4f68140</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48885%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xwikisas%20application-urlshortener&amp;severity=medium&amp;id=6839ffe7182aa0cae2bc9d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48944-cwe-20-improper-input-validation-in-38395eb0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48944%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6839fc40182aa0cae2bc1f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48943-cwe-248-uncaught-exception-in-vllm--fea943b4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48943%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6839fc40182aa0cae2bc1f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48942-cwe-248-uncaught-exception-in-vllm--bda01e77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48942%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6839fc40182aa0cae2bc1f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5359-sql-injection-in-campcodes-online-ho-003659dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5359%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6839fc40182aa0cae2bc1f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5358-sql-injection-in-phpgurukul-cyber-ca-d41dbbc6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5358%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=6839f561182aa0cae2bb2301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5054-cwe-362-concurrent-execution-using-s-e03908c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5054%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Canonical%20Apport&amp;severity=medium&amp;id=6839ee3e182aa0cae2ba261f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48887-cwe-1333-inefficient-regular-expres-1a4b37f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48887%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6839ee3e182aa0cae2ba261d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5357-buffer-overflow-in-freefloat-ftp-ser-35c92b73</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5357%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6839ee3e182aa0cae2ba2621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26226-cwe-416-use-after-free-in-yandex-br-8054b99f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26226%3A%20CWE-416%20Use%20After%20Free%20in%20Yandex%20Browser&amp;severity=high&amp;id=6839ee3e182aa0cae2ba2623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5356-buffer-overflow-in-freefloat-ftp-ser-00b4b7aa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5356%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6839e03d182aa0cae2b82c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42191-cwe-427-uncontrolled-search-path-el-60c33ba2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42191%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20HCL%20Software%20HCL%20Traveler%20for%20Microsoft%20Outlook%20(HTMO)&amp;severity=medium&amp;id=6839d93f182aa0cae2b7304c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42190-cwe-427-uncontrolled-search-path-el-a408600c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42190%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20HCL%20Software%20HCL%20Traveler%20for%20Microsoft%20Outlook%20(HTMO)&amp;severity=medium&amp;id=6839d5aa182aa0cae2b6b0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23589-cwe-328-use-of-weak-hash-in-hcl-sof-ec15007f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23589%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20HCL%20Software%20HCL%20Glovius%20Cloud&amp;severity=medium&amp;id=6839d221182aa0cae2b630f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13917-cwe-926-improper-export-of-android--9a6d9aa9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13917%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Kruger%26Matz%20com.pri.applock&amp;severity=high&amp;id=6839ce93182aa0cae2b5b188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13916-cwe-497-exposure-of-sensitive-syste-54e04235</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13916%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Kruger%26Matz%20com.pri.applock&amp;severity=medium&amp;id=6839ce93182aa0cae2b5b186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13915-cwe-926-improper-export-of-android--27648c91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13915%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Ulefone%20com.pri.factorytest&amp;severity=medium&amp;id=6839ce93182aa0cae2b5b184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7097-vulnerability-in-wso2-wso2-open-bank-c33b59f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7097%3A%20Vulnerability%20in%20WSO2%20WSO2%20Open%20Banking%20AM&amp;severity=medium&amp;id=6839cb1d182aa0cae2b532ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7096-cwe-863-incorrect-authorization-in-w-6e2b9741</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7096%3A%20CWE-863%20Incorrect%20Authorization%20in%20WSO2%20WSO2%20Open%20Banking%20IAM&amp;severity=medium&amp;id=6839c7a1182aa0cae2b4b479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3611-cwe-863-incorrect-authorization-in-m-d059e91a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3611%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=low&amp;id=6839c41d182aa0cae2b43552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3230-cwe-303-incorrect-implementation-of--117701f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3230%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=6839c41d182aa0cae2b43558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2571-cwe-303-incorrect-implementation-of--088afa6d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2571%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=6839c41d182aa0cae2b43556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1792-cwe-863-incorrect-authorization-in-m-741e287a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1792%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=low&amp;id=6839c41d182aa0cae2b43554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0602-cwe-79-improper-neutralization-of-in-d032e6af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0602%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=6839c097182aa0cae2b3b6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4983-cwe-79-improper-neutralization-of-in-cceacba0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20City%20Referential%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4984-cwe-79-improper-neutralization-of-in-634474e3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4984%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20City%20Referential%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4985-cwe-79-improper-neutralization-of-in-ea4320da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Project%20Portfolio%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4986-cwe-79-improper-neutralization-of-in-c08c0eca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Product%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4988-cwe-79-improper-neutralization-of-in-33457036</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Multidisciplinary%20Optimization%20Engineer&amp;severity=high&amp;id=6839c097182aa0cae2b3b6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4989-cwe-79-improper-neutralization-of-in-c4bd2f42</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Product%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4990-cwe-79-improper-neutralization-of-in-cb75f5d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4990%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Product%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4991-cwe-79-improper-neutralization-of-in-9dc4acfc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4991%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=6839c097182aa0cae2b3b6b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4992-cwe-79-improper-neutralization-of-in-a616a7a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Service%20Process%20Engineer&amp;severity=high&amp;id=6839c097182aa0cae2b3b6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48331-cwe-201-insertion-of-sensitive-info-a984e92e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48331%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20vanquish%20WooCommerce%20Orders%20%26%20Customers%20Exporter&amp;severity=null&amp;id=6839bd14182aa0cae2b33819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-claims-tiktok-breach-puts-428-million-a79cbb0f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Claims%20TikTok%20Breach%2C%20Puts%20428%20Million%20Records%20Up%20for%20Sale&amp;severity=medium&amp;id=6839b281182aa0cae2b1bcaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4598-signal-handler-race-condition-in-red-617f7a39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4598%3A%20Signal%20Handler%20Race%20Condition&amp;severity=medium&amp;id=6839b29a182aa0cae2b1bcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2500-cwe-256-in-hitachi-energy-asset-suit-a4987bfc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2500%3A%20CWE-256%20in%20Hitachi%20Energy%20Asset%20Suite&amp;severity=critical&amp;id=6839a82d182aa0cae2af8892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1484-cwe-184-in-hitachi-energy-asset-suit-3b0cd901</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1484%3A%20CWE-184%20in%20Hitachi%20Energy%20Asset%20Suite&amp;severity=medium&amp;id=6839a82d182aa0cae2af8890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40909-cwe-362-concurrent-execution-using--3d86e44c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40909%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20perl%20perl&amp;severity=medium&amp;id=6839a82d182aa0cae2af8894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4433-cwe-284-improper-access-control-in-d-5b853df0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4433%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=high&amp;id=6839a468182aa0cae2aec752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5190-cwe-288-authentication-bypass-using--fadac962</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5190%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20sorich87%20Browse%20As&amp;severity=high&amp;id=6839a468182aa0cae2aec754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4944-cwe-79-improper-neutralization-of-in-c796be23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4944%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=6839a468182aa0cae2aec75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4597-cwe-862-missing-authorization-in-bc2-d24be6d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4597%3A%20CWE-862%20Missing%20Authorization%20in%20bc2018%20Woo%20Slider%20Pro%20%E2%80%93%20Drag%20Drop%20Slider%20Builder%20For%20WooCommerce&amp;severity=medium&amp;id=6839a468182aa0cae2aec758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1763-cwe-79-improper-neutralization-of-in-860c820c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1763%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GitLab%20GitLab&amp;severity=high&amp;id=6839a206182aa0cae2ae48fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-phishing-service-haozi-resurfaces-fueling--e2ec0cb8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Phishing%20Service%20Haozi%20Resurfaces%2C%20Fueling%20Criminal%20Profits%20Even%20for%20Script%20Kiddies&amp;severity=medium&amp;id=68398bee182aa0cae2aad549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-ssrfs-in-azure-devops-part-2-3a894564</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20SSRFs%20in%20Azure%20DevOps%20-%20Part%202&amp;severity=medium&amp;id=68398854182aa0cae2aa5704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-detailed-guide-to-stealth-syscall-and-edr-bypass-3898200e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20detailed%20guide%20to%20Stealth%20syscall%20and%20EDR%20Bypass&amp;severity=medium&amp;id=6839814c182aa0cae2a95289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-funnull-for-200m-romance-baiting-scam-4fa1fc9b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%20Funnull%20for%20%24200M%20Romance%20Baiting%20Scams%20Tied%20to%20Crypto%20Fraud&amp;severity=medium&amp;id=6839813a182aa0cae2a9527c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-cloud-provider-funnull-as-top-source--dcc4512e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%20Cloud%20Provider%20%E2%80%98Funnull%E2%80%99%20as%20Top%20Source%20of%20%E2%80%98Pig%20Butchering%E2%80%99%20Scams&amp;severity=medium&amp;id=68397dbd182aa0cae2a8d3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connectwise-hit-by-cyberattack-nation-state-actor--9544a1f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ConnectWise%20Hit%20by%20Cyberattack%3B%20Nation-State%20Actor%20Suspected%20in%20Targeted%20Breach&amp;severity=medium&amp;id=68397dbd182aa0cae2a8d3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5235-cwe-79-improper-neutralization-of-in-222ba9b2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5235%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opensheetmusicdisplay%20OpenSheetMusicDisplay&amp;severity=medium&amp;id=68397e09182aa0cae2a8d42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5142-cwe-352-cross-site-request-forgery-c-5b6ef455</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5142%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pluginsandsnippets%20Simple%20Page%20Access%20Restriction&amp;severity=medium&amp;id=68397e09182aa0cae2a8d42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48334-cwe-862-missing-authorization-in-bi-6fe76022</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48334%3A%20Missing%20Authorization%20in%20BinaryCarpenter%20Woo%20Slider%20Pro&amp;severity=null&amp;id=68397383182aa0cae2a75764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48912-cwe-89-improper-neutralization-of-s-e994426c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48912%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=68396faf182aa0cae2a6d7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4636-cwe-269-improper-privilege-managemen-5e7335c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4636%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20JCT%20Airpointer&amp;severity=high&amp;id=68396faf182aa0cae2a6d800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4635-cwe-20-improper-input-validation-in--72fbf094</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4635%3A%20CWE-20%20Improper%20Input%20Validation%20in%20JCT%20Airpointer&amp;severity=medium&amp;id=68396c31182aa0cae2a65785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4634-cwe-552-files-or-directories-accessi-c59f269a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4634%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20JCT%20Airpointer&amp;severity=medium&amp;id=68396c31182aa0cae2a65783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4633-cwe-798-use-of-hard-coded-credential-6fdb16ae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4633%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20JCT%20Airpointer&amp;severity=medium&amp;id=68396c31182aa0cae2a65781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5236-cwe-79-improper-neutralization-of-in-de4fee2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ninjateam%20WP%20Telegram%20Chat%20Widget&amp;severity=medium&amp;id=68395e2e182aa0cae2a45844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4431-cwe-284-improper-access-control-in-k-9d5cf247</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4431%3A%20CWE-284%20Improper%20Access%20Control%20in%20krasenslavov%20Featured%20Image%20Plus%20%E2%80%93%20Bulk%20Edit%20Featured%20Images%2C%20Unsplash%20%26%20Alt%20Text%20Manager&amp;severity=medium&amp;id=68395e2e182aa0cae2a45842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4943-cwe-79-improper-neutralization-of-in-6e83867f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4943%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=6839571e182aa0cae2a35b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47697-client-side-enforcement-of-server-s-d0795ca0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47697%3A%20Client-side%20enforcement%20of%20server-side%20security%20in%20UCHIDA%20YOKO%20CO.%2C%20LTD.%20wivia%205&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41406-cross-site-scripting-xss-in-uchida--ab8c5304</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41406%3A%20Cross-site%20scripting%20(XSS)%20in%20UCHIDA%20YOKO%20CO.%2C%20LTD.%20wivia%205&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41385-improper-neutralization-of-special--274f4539</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41385%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20UCHIDA%20YOKO%20CO.%2C%20LTD.%20wivia%205&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48936-cwe-601-url-redirection-to-untruste-4085625a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48936%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20zitadel%20zitadel&amp;severity=high&amp;id=683953b3182aa0cae2a2dd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48488-cwe-79-improper-neutralization-of-i-4054bfd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48488%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48880-cwe-362-concurrent-execution-using--919da431</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48880%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48875-cwe-79-improper-neutralization-of-i-b68a6915</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48875%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48489-cwe-79-improper-neutralization-of-i-c4bd8bb3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48489%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68395033182aa0cae2a25ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48487-cwe-79-improper-neutralization-of-i-71da7429</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48487%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68395033182aa0cae2a25ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48486-cwe-79-improper-neutralization-of-i-b6b23fd4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48486%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68395033182aa0cae2a25ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48485-cwe-79-improper-neutralization-of-i-06257bd9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48485%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68395033182aa0cae2a25ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48865-cwe-345-insufficient-verification-o-433caeef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48865%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20fabiolb%20fabio&amp;severity=critical&amp;id=68395033182aa0cae2a25eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48492-cwe-77-improper-neutralization-of-s-4a3a266a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48492%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20GetSimpleCMS-CE%20GetSimpleCMS-CE&amp;severity=high&amp;id=68395033182aa0cae2a25eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48889-cwe-434-unrestricted-upload-of-file-3f726810</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48889%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gradio-app%20gradio&amp;severity=medium&amp;id=68394cb3182aa0cae2a1e0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4429-cwe-79-cross-site-scripting-xss-in-u-f93d22f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4429%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Gearside%20Developer%20Dashboard&amp;severity=medium&amp;id=68394cb3182aa0cae2a1e0d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41235-vulnerability-in-vmware-spring-clou-6e2814ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41235%3A%20Vulnerability%20in%20VMware%20Spring%20cloud%20Gateway&amp;severity=high&amp;id=68394cb3182aa0cae2a1e0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48490-cwe-20-improper-input-validation-in-01083054</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48490%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Lomkit%20laravel-rest-api&amp;severity=medium&amp;id=6839459a182aa0cae2a0e215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4659-cwe-200-exposure-of-sensitive-inform-dc82eb38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4659%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20crmperks%20Integration%20for%20Salesforce%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%2C%20Ninja%20Forms&amp;severity=medium&amp;id=6839459a182aa0cae2a0e219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5259-cwe-79-improper-neutralization-of-in-2b3a21fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gonzomir%20Minimal%20Share%20Buttons&amp;severity=medium&amp;id=6839459a182aa0cae2a0e21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48881-cwe-863-incorrect-authorization-in--2160b61e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48881%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20valtimo-platform%20valtimo-backend-libraries&amp;severity=high&amp;id=6839459a182aa0cae2a0e217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48484-cwe-79-improper-neutralization-of-i-479c6111</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48484%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68393ecb182aa0cae29f615a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48483-cwe-79-improper-neutralization-of-i-2a016f8b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68393ecb182aa0cae29f6158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48482-cwe-841-improper-enforcement-of-beh-7608a250</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48482%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683937b2182aa0cae29e5f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48481-cwe-841-improper-enforcement-of-beh-68cd139f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48481%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683937b2182aa0cae29e5f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48480-cwe-841-improper-enforcement-of-beh-723df32a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48480%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683937b2182aa0cae29e5f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48479-cwe-841-improper-enforcement-of-beh-43a4f006</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48479%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683937b2182aa0cae29e5f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48478-cwe-841-improper-enforcement-of-beh-71c3b2af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48478%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683937b2182aa0cae29e5f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48477-cwe-841-improper-enforcement-of-beh-c9aa6fa4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48477%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683937b2182aa0cae29e5f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48476-cwe-841-improper-enforcement-of-beh-75855ce9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48476%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683937b2182aa0cae29e5f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48491-cwe-798-use-of-hard-coded-credentia-6ffa08b2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48491%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20aryan6673%20project-ai&amp;severity=low&amp;id=68392cfa182aa0cae29ce4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48381-cwe-201-insertion-of-sensitive-info-a8ac7ac7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48381%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=68392cfa182aa0cae29ce4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48068-cwe-1385-missing-origin-validation--c30e50c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48068%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20vercel%20next.js&amp;severity=low&amp;id=68392cfa182aa0cae29ce4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47952-cwe-22-improper-limitation-of-a-pat-8a08fc9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47952%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20traefik%20traefik&amp;severity=low&amp;id=68392967182aa0cae29c6692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12224-cwe-1289-in-servo-rust-url-073d32a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12224%3A%20CWE-1289%20in%20servo%20rust-url&amp;severity=medium&amp;id=683910e3182aa0cae298edcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36846-cwe-1395-dependency-on-vulnerable-t-9807f96d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36846%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20TIMLEGGE%20IO%3A%3ACompress%3A%3ABrotli&amp;severity=critical&amp;id=6839066b182aa0cae2977368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-lummac2-infrastructure-with-cats-c063cf94</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20LummaC2%20Infrastructure%20with%20Cats&amp;severity=medium&amp;id=68396fa3182aa0cae2a6d760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44906-na-in-na-5dd27b7f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44906%3A%20n%2Fa&amp;severity=high&amp;id=683925f1182aa0cae29be886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44905-na-in-na-801753aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44905%3A%20n%2Fa&amp;severity=high&amp;id=683925f1182aa0cae29be884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44904-na-in-na-8627adbf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44904%3A%20n%2Fa&amp;severity=high&amp;id=683925f1182aa0cae29be882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48757-cwe-863-incorrect-authorization-in--436e0ca2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48757%3A%20CWE-863%20Incorrect%20Authorization%20in%20Lovable%20Lovable&amp;severity=critical&amp;id=683917fc182aa0cae299e9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44619-na-in-na-8b68259f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44619%3A%20n%2Fa&amp;severity=critical&amp;id=683917fc182aa0cae299e9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44614-na-in-na-78c87af4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44614%3A%20n%2Fa&amp;severity=high&amp;id=683917fc182aa0cae299e9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44612-na-in-na-779d37bb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44612%3A%20n%2Fa&amp;severity=medium&amp;id=683917fc182aa0cae299e9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/introducing-xattacker-v50-pro-automated-web-exploi-bc9e6568</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%F0%9F%9A%80%20Introducing%20XAttacker%20V50%20Pro%20%E2%80%93%20Automated%20Web%20Exploitation%20Tool%20for%20Penetration%20Testers&amp;severity=low&amp;id=6838f154182aa0cae293f9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46352-cwe-798-in-consilium-safety-cs5000--6e733d9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46352%3A%20CWE-798%20in%20Consilium%20Safety%20CS5000%20Fire%20Panel&amp;severity=critical&amp;id=6838edb3182aa0cae2937bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41438-cwe-1188-in-consilium-safety-cs5000-82234352</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41438%3A%20CWE-1188%20in%20Consilium%20Safety%20CS5000%20Fire%20Panel&amp;severity=critical&amp;id=6838edb3182aa0cae2937bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1907-cwe-306-missing-authentication-for-c-20516d0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1907%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Instantel%20Micromate&amp;severity=critical&amp;id=6838edb3182aa0cae2937bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5332-sql-injection-in-1000-projects-onlin-8c1777c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5332%3A%20SQL%20Injection%20in%201000%20Projects%20Online%20Notice%20Board&amp;severity=medium&amp;id=6838e31c182aa0cae2920088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5307-cwe-125-out-of-bounds-read-in-santes-c0f7bfb5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5307%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Santesoft%20Sante%20DICOM%20Viewer%20Pro&amp;severity=high&amp;id=6838dc05182aa0cae29102fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5331-buffer-overflow-in-pcman-ftp-server-48498777</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5331%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=6838dc05182aa0cae29102fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30466-a-website-may-be-able-to-bypass-sam-63c283b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30466%3A%20A%20website%20may%20be%20able%20to%20bypass%20Same%20Origin%20Policy%20in%20Apple%20Safari&amp;severity=critical&amp;id=6838d4ef182aa0cae2900517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31261-an-app-may-be-able-to-access-protec-52972c51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31261%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838d4ef182aa0cae2900521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31231-an-app-may-be-able-to-read-sensitiv-b60aacb5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31231%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838d4ef182aa0cae290051f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31199-an-app-may-be-able-to-access-sensit-00df6d78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31199%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6838d4ef182aa0cae290051d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31264-an-attacker-with-physical-access-to-1791e516</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31264%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838d4ef182aa0cae2900525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31198-a-path-handling-issue-was-addressed-f3cbe692</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31198%3A%20A%20path%20handling%20issue%20was%20addressed%20with%20improved%20validation%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838d4ef182aa0cae290051b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31189-an-app-may-be-able-to-break-out-of--b168bee6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31189%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=6838d4ef182aa0cae2900519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31263-an-app-may-be-able-to-corrupt-copro-a825d89f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31263%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=6838d4ef182aa0cae2900523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5330-buffer-overflow-in-freefloat-ftp-ser-3e68e3c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5330%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6838d4ef182aa0cae2900527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5328-path-traversal-in-chshcms-mccms-f8f0d288</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5328%3A%20Path%20Traversal%20in%20chshcms%20mccms&amp;severity=medium&amp;id=6838ce1b182aa0cae28f06cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5327-server-side-request-forgery-in-chshc-dbe5a10f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5327%3A%20Server-Side%20Request%20Forgery%20in%20chshcms%20mccms&amp;severity=medium&amp;id=6838c719182aa0cae28d8814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5326-deserialization-in-zhilink-adp-appli-c0cdb559</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5326%3A%20Deserialization%20in%20zhilink%20%E6%99%BA%E4%BA%92%E8%81%94(%E6%B7%B1%E5%9C%B3)%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20ADP%20Application%20Developer%20Platform%20%E5%BA%94%E7%94%A8%E5%BC%80%E5%8F%91%E8%80%85%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=6838c00b182aa0cae28c8a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4967-cwe-918-server-side-request-forgery--c1d48849</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4967%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)SSRF%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=critical&amp;id=6838c00b182aa0cae28c8a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5325-improper-neutralization-of-special-e-042cab2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5325%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20zhilink%20%E6%99%BA%E4%BA%92%E8%81%94(%E6%B7%B1%E5%9C%B3)%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20ADP%20Application%20Developer%20Platform%20%E5%BA%94%E7%94%A8%E5%BC%80%E5%8F%91%E8%80%85%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=6838b90d182aa0cae28b8c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47933-cwe-79-improper-neutralization-of-i-f7a52242</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47933%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20argoproj%20argo-cd&amp;severity=critical&amp;id=6838b90d182aa0cae28b8c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47288-cwe-200-exposure-of-sensitive-infor-52ff3258</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47288%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse-policy&amp;severity=low&amp;id=6838b59f182aa0cae28b0cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chasing-eddies-new-rust-based-infostealer-used-in--8307134a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chasing%20Eddies%3A%20New%20Rust-based%20InfoStealer%20used%20in%20CAPTCHA%20campaigns&amp;severity=medium&amp;id=6838b591182aa0cae28b0cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49350-cwe-121-stack-based-buffer-overflow-24508402</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49350%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=6838b59f182aa0cae28b0cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2518-cwe-789-uncontrolled-memory-allocati-998dd24f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2518%3A%20CWE-789%20Uncontrolled%20Memory%20Allocation%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=6838b59f182aa0cae28b0d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3050-cwe-770-allocation-of-resources-with-acb505ff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3050%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=6838b59f182aa0cae28b0d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46701-cwe-178-improper-handling-of-case-s-856d000a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46701%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=6838b200182aa0cae28a8c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48336-cwe-502-deserialization-of-untruste-662f738a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48336%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThimPress%20Course%20Builder&amp;severity=null&amp;id=6838aece182aa0cae28a0d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32752-cwe-312-cleartext-storage-of-sensit-c9fd219f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32752%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Dell%20ThinOS&amp;severity=medium&amp;id=6838aece182aa0cae28a0d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-target-ai-users-with-malware-loaded-0c459324</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Target%20AI%20Users%20with%20Malware-Loaded%20Installers%20Posing%20as%20Popular%20Tools&amp;severity=medium&amp;id=6838aea5182aa0cae28a0ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-safari-exposes-users-to-fullscreen-browser-i-b0e06360</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Safari%20exposes%20users%20to%20fullscreen%20browser-in-the-middle%20attacks&amp;severity=medium&amp;id=6838aea5182aa0cae28a0ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-abuse-google-apps-script-in-evasive--a2254fe7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20actors%20abuse%20Google%20Apps%20Script%20in%20evasive%20phishing%20attacks&amp;severity=medium&amp;id=6838aea5182aa0cae28a0ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5324-memory-leak-in-techpowerup-gpu-z-93e2ff26</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5324%3A%20Memory%20Leak%20in%20TechPowerUp%20GPU-Z&amp;severity=medium&amp;id=6838ab0d182aa0cae2898e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5323-reliance-on-obfuscation-or-encryptio-bf9fab79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5323%3A%20Reliance%20on%20Obfuscation%20or%20Encryption%20of%20Security-Relevant%20Inputs%20without%20Integrity%20Checking%20in%20fossasia%20open-event-server&amp;severity=medium&amp;id=6838a40f182aa0cae2888dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46823-cwe-862-missing-authorization-in-op-f345dd9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46823%3A%20CWE-862%3A%20Missing%20Authorization%20in%20openmrs%20openmrs-module-fhir2&amp;severity=high&amp;id=6838ab0d182aa0cae2898e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46722-cwe-1288-improper-validation-of-con-f253e4ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46722%3A%20CWE-1288%3A%20Improper%20Validation%20of%20Consistency%20within%20Input%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=68389281182aa0cae2860f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46570-cwe-208-observable-timing-discrepan-ae00ed07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46570%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20vllm-project%20vllm&amp;severity=low&amp;id=68388f0b182aa0cae285909c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-chatgpt-and-invideo-ai-downloads-deliver-rans-e8902e4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20ChatGPT%20and%20InVideo%20AI%20Downloads%20Deliver%20Ransomware%2C%20warns%20Cisco%20Talos&amp;severity=medium&amp;id=68388efb182aa0cae285908b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48475-cwe-863-incorrect-authorization-in--6660d28b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48475%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68388f0b182aa0cae285909e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phaas-the-secrets-the-hidden-ties-between-tycoon2f-d1555f07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhaaS%20the%20Secrets%3A%20The%20Hidden%20Ties%20Between%20Tycoon2FA%20and%20Dadsec&apos;s%20Operations&amp;severity=medium&amp;id=6838b591182aa0cae28b0cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-analysis-reveals-sophisticated-rat-with-co-1aeb74c6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Analysis%20Reveals%20Sophisticated%20RAT%20With%20Corrupted%20Headers&amp;severity=medium&amp;id=6838b1f1182aa0cae28a8c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48474-cwe-863-incorrect-authorization-in--7d77def4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48474%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=6838cb41182aa0cae28e884f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48473-cwe-863-incorrect-authorization-in--9ecf59aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48473%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683880c6182aa0cae2839697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48472-cwe-863-incorrect-authorization-in--f46698a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48472%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68387d4e182aa0cae2831691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48471-cwe-434-unrestricted-upload-of-file-904b8905</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48471%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=68387d4e182aa0cae283168f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48390-cwe-94-improper-control-of-generati-dbda6ff0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48390%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=68387d4e182aa0cae283168d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48389-cwe-502-deserialization-of-untruste-940f43d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48389%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=68387d4e182aa0cae283168b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3913-cwe-863-incorrect-authorization-in-m-7dd3a159</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3913%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=68387d4e182aa0cae2831687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-camouflaging-threats-as-ai-tool-ins-5c94f556</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20camouflaging%20threats%20as%20AI%20tool%20installers&amp;severity=medium&amp;id=68387d2b182aa0cae28315f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5321-sandbox-issue-in-aimhubio-aim-0fa21e8d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5321%3A%20Sandbox%20Issue%20in%20aimhubio%20aim&amp;severity=medium&amp;id=683879c7182aa0cae2829645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5334-cwe-359-exposure-of-private-personal-861643e2</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5334%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=high&amp;id=68387633182aa0cae28217b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dragonforce-exploits-simplehelp-flaws-to-deploy-ra-a8814b4b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DragonForce%20Exploits%20SimpleHelp%20Flaws%20to%20Deploy%20Ransomware%20Across%20Customer%20Endpoints&amp;severity=medium&amp;id=68386f39182aa0cae2811a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/victorias-secret-takes-down-website-after-security-f7d52693</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Victoria%E2%80%99s%20Secret%20takes%20down%20website%20after%20security%20incident&amp;severity=medium&amp;id=68386f39182aa0cae2811a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4081-cwe-276-incorrect-default-permission-58d68bd7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4081%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Blackmagic%20Design%20DaVinci%20Resolve&amp;severity=medium&amp;id=68386f5b182aa0cae2811a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33043-cwe-20-improper-input-validation-in-3614fea2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33043%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68386ba5182aa0cae2809bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5320-origin-validation-error-in-gradio-ap-af7cd7df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5320%3A%20Origin%20Validation%20Error%20in%20gradio-app%20gradio&amp;severity=medium&amp;id=683864b2182aa0cae27f9cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37999-vulnerability-in-linux-linux-160a22c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37998-vulnerability-in-linux-linux-e557be0e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37997-vulnerability-in-linux-linux-f4566ec7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37996-vulnerability-in-linux-linux-fba7a31e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37995-vulnerability-in-linux-linux-92a9dd65</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37994-vulnerability-in-linux-linux-e19a9d89</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37993-vulnerability-in-linux-linux-41277f13</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=68386122182aa0cae27f1d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-spotted-corrupts-its-own-headers-to-bl-537a7a79</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Spotted%20Corrupts%20Its%20Own%20Headers%20to%20Block%20Analysis&amp;severity=medium&amp;id=68385dbc182aa0cae27e6175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48047-cwe-78-improper-neutralization-of-s-93f6da9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48047%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MICI%20Network%20Co.%20Ltd.%20NetFax%20Server&amp;severity=critical&amp;id=68385a2e182aa0cae27da588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48046-cwe-260-password-in-configuration-f-843c5b15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48046%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20MICI%20Network%20Co.%20Ltd.%20NetFax%20Server&amp;severity=medium&amp;id=68385a2e182aa0cae27da586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48045-cwe-201-insertion-of-sensitive-info-0db907d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48045%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20MICI%20Network%20Co.%20Ltd.%20NetFax%20Server&amp;severity=high&amp;id=68385671182aa0cae27ce98f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deguard-turning-a-t480-into-a-coreboot-laptop-10-m-67798617</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deguard%3A%20turning%20a%20T480%20into%20a%20coreboot%20laptop%20(10-min%20talk%20%2B%20live%20demo)&amp;severity=low&amp;id=683836fc182aa0cae277b995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pakistan-arrests-21-in-heartsender-malware-service-9e2cad5a</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pakistan%20Arrests%2021%20in%20%E2%80%98Heartsender%E2%80%99%20Malware%20Service&amp;severity=medium&amp;id=68382ff1182aa0cae276b89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-gang-deploys-new-nodesnake-ra-23828b07</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20ransomware%20gang%20deploys%20new%20NodeSnake%20RAT%20on%20universities&amp;severity=medium&amp;id=68382ff1182aa0cae276b89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt41-exploits-google-calendar-for-malware-e21e2deb</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT41%20Exploits%20Google%20Calendar%20for%20Malware%20Command-and-Control%20Operations&amp;severity=medium&amp;id=68382ff1182aa0cae276b8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ayysshush-botnet-compromised-over-9000-asus-ro-ddc13401</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20AyySSHush%20botnet%20compromised%20over%209%2C000%20ASUS%20routers%2C%20adding%20a%20persistent%20SSH%20backdoor.&amp;severity=medium&amp;id=68382ff1182aa0cae276b8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-broker-lexisnexis-discloses-data-breach-affec-6b8c2e10</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20broker%20LexisNexis%20discloses%20data%20breach%20affecting%20364%2C000%20people&amp;severity=medium&amp;id=68382ff1182aa0cae276b8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48388-cwe-134-use-of-externally-controlle-6a695c95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48388%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683828ea182aa0cae275bc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27151-cwe-20-improper-input-validation-in-a1cb5bd3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27151%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20redis%20redis&amp;severity=medium&amp;id=6838254f182aa0cae2753d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52588-cwe-918-server-side-request-forgery-bab174d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52588%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20strapi%20strapi&amp;severity=medium&amp;id=6838254f182aa0cae2753d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4687-vulnerability-in-teltonika-networks--77ababf4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4687%3A%20Vulnerability%20in%20Teltonika%20Networks%20RMS&amp;severity=high&amp;id=6838254f182aa0cae2753d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5286-cwe-79-improper-neutralization-of-in-da87cb35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5286%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=68381aae182aa0cae273c2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4670-cwe-79-improper-neutralization-of-in-3d71cc83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=68381aae182aa0cae273c2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5122-cwe-79-improper-neutralization-of-in-5c00d596</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5122%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goiblas%20Map%20Block%20Leaflet&amp;severity=medium&amp;id=68381aae182aa0cae273c2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5276-server-side-request-forgery-ssrf-in--1fc9c358</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5276%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mcp-markdownify-server&amp;severity=high&amp;id=6837ecfc182aa0cae26d541e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5273-files-or-directories-accessible-to-e-f2b1f50d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5273%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20mcp-markdownify-server&amp;severity=high&amp;id=6837ecfc182aa0cae26d541c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3755-cwe-1285-improper-validation-of-spec-2b301dd0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3755%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=critical&amp;id=6837e96e182aa0cae26cd081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4583-cwe-79-improper-neutralization-of-in-32f6637f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20https%3A%2F%2Fprofiles.wordpress.org%2Fsmub%2F%20Smash%20Balloon%20Instagram%20Feed%20Pro&amp;severity=medium&amp;id=6837e2a2182aa0cae26bcd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-venomrat-malware-campaign-216d30d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20VenomRAT%20Malware%20Campaign&amp;severity=medium&amp;id=6838058f182aa0cae270c8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-digits-plugin-8461-authentication-bypass-a1741efd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Digits%20Plugin%208.4.6.1%20-%20Authentication%20Bypass%20via%20OTP%20Bruteforcing&amp;severity=medium&amp;id=68489d917e6d765d51d52a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortra-goanywhere-mft-741-authentication-bypass-0cbcd619</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortra%20GoAnywhere%20MFT%207.4.1%20-%20Authentication%20Bypass&amp;severity=medium&amp;id=68489d8b7e6d765d51d52927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automic-agent-2430-hf4-privilege-escalation-ec31d0a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automic%20Agent%2024.3.0%20HF4%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489d847e6d765d51d52748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-file-explorer-windows-11-23h2-ntlm-hash-di-c460fc17</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20File%20Explorer%20Windows%2011%20(23H2)%20-%20NTLM%20Hash%20Disclosure&amp;severity=medium&amp;id=68489d7e7e6d765d51d525a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-serv-u-1542-hf1-directory-traversal-37899b25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Serv-U%2015.4.2%20HF1%20-%20Directory%20Traversal&amp;severity=medium&amp;id=68489d787e6d765d51d523ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/campcodes-online-hospital-management-system-10-sql-83147fa2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Campcodes%20Online%20Hospital%20Management%20System%201.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=68489d727e6d765d51d5225b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54952-na-in-na-725310d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54952%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6838bc8c182aa0cae28c0b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53423-na-in-na-06b73a41</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53423%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6838ab0d182aa0cae2898e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41591-na-in-na-ac68eae7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41591%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6838a78c182aa0cae2890f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29632-na-in-na-c35a83db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29632%3A%20n%2Fa&amp;severity=medium&amp;id=6838998d182aa0cae2870d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51392-na-in-na-1dd249e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51392%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68389616182aa0cae2868e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45474-na-in-na-fc7a1797</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45474%3A%20n%2Fa&amp;severity=high&amp;id=68387d4e182aa0cae2831689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48748-na-in-na-5dd9b741</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48748%3A%20n%2Fa&amp;severity=critical&amp;id=683879c7182aa0cae2829643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22654-na-in-na-2e5a32dd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22654%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68386f5b182aa0cae2811a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22653-na-in-na-4b9bd3de</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22653%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68386f5b182aa0cae2811a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46078-na-in-na-3e6607e5</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46078%3A%20n%2Fa&amp;severity=medium&amp;id=68386826182aa0cae2801b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46080-na-in-na-9fbb1221</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46080%3A%20n%2Fa&amp;severity=medium&amp;id=68386826182aa0cae2801b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/onedrive-file-picker-flaw-gives-apps-full-access-t-3879bf74</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OneDrive%20File%20Picker%20Flaw%20Gives%20Apps%20Full%20Access%20to%20User%20Drives%20-%20Millions%20At%20Risk&amp;severity=medium&amp;id=683791c6182aa0cae2605ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27706-vulnerability-in-absolute-security--cdc9f7ad</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27706%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=68377c97182aa0cae25d64fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27703-vulnerability-in-absolute-security--debf4e4c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27703%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=high&amp;id=68377c97182aa0cae25d64fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27702-vulnerability-in-absolute-security--817a8b67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27702%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=68377906182aa0cae25ce3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-entra-design-lets-guest-users-gain-azure-0adaecab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Entra%20Design%20Lets%20Guest%20Users%20Gain%20Azure%20Control%2C%20Researchers%20Say&amp;severity=medium&amp;id=68377590182aa0cae25c658a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mark-your-calendar-apt41-innovative-tactics-1c7317be</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mark%20Your%20Calendar%3A%20APT41%20Innovative%20Tactics&amp;severity=medium&amp;id=68377588182aa0cae25c657b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolution-of-zanubis-a-banking-trojan-for-android-869295a6</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolution%20of%20Zanubis%2C%20a%20banking%20Trojan%20for%20Android&amp;severity=medium&amp;id=683771fd182aa0cae25be6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vietnam-nexus-hackers-distribute-malware-via-fake--62128500</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vietnam-Nexus%20Hackers%20Distribute%20Malware%20Via%20Fake%20AI%20Video%20Generators&amp;severity=medium&amp;id=68377588182aa0cae25c6578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-bitdefender-site-spreads-trio-of-malware-tool-d87fc42c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Bitdefender%20Site%20Spreads%20Trio%20of%20Malware%20Tools&amp;severity=medium&amp;id=68377588182aa0cae25c6571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-post-you-couldnt-scan-for-is-back-b76e693a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20post%20you%20couldn%E2%80%99t%20scan%20for%20is%20back.&amp;severity=medium&amp;id=68374eda182aa0cae256f64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pakistan-telecommunication-company-ptcl-targeted-b-3861ecdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pakistan%20Telecommunication%20Company%20(PTCL)%20Targeted%20by%20Bitter%20APT%20During%20Heightened%20Regional%20Conflict&amp;severity=medium&amp;id=6837759f182aa0cae25c659a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5256-cwe-601-url-redirection-to-untrusted-e72e8c9a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5256%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Mautic%20Mautic&amp;severity=medium&amp;id=68374ee1182aa0cae256f67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47055-cwe-862-missing-authorization-in-ma-3aa759e0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47055%3A%20CWE-862%20Missing%20Authorization%20in%20Mautic%20Mautic&amp;severity=medium&amp;id=68374b89182aa0cae2567814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-ai-video-tool-ads-on-facebook-and-linkedin-sp-bceaa11b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20AI%20Video%20Tool%20Ads%20on%20Facebook%20and%20LinkedIn%20Spread%20Infostealers&amp;severity=medium&amp;id=68374b6e182aa0cae25677cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1461-cwe-79-improper-neutralization-of-in-1f430bc2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vuetify&amp;severity=medium&amp;id=68374b89182aa0cae2567843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47057-cwe-203-observable-discrepancy-in-m-dfa95962</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47057%3A%20CWE-203%20Observable%20Discrepancy%20in%20Mautic%20Mautic&amp;severity=medium&amp;id=68374b89182aa0cae2567816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32803-cwe-276-incorrect-default-permissio-cfb73a38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32803%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20ISC%20Kea&amp;severity=medium&amp;id=683747bb182aa0cae255f97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32802-cwe-73-external-control-of-file-nam-ba8fee6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32802%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20ISC%20Kea&amp;severity=medium&amp;id=6837447f182aa0cae2557b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32801-cwe-94-improper-control-of-generati-6e1a2dfd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32801%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ISC%20Kea&amp;severity=high&amp;id=6837447f182aa0cae2557b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-infection-to-access-a-24-hour-timeline-of-a-m-983c19d2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Infection%20to%20Access%3A%20A%2024-Hour%20Timeline%20of%20a%20Modern%20Stealer%20Campaign&amp;severity=medium&amp;id=68374430182aa0cae2557af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-onedrive-file-picker-flaw-grants-apps-fu-07fda1b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20OneDrive%20File%20Picker%20Flaw%20Grants%20Apps%20Full%20Cloud%20Access%20%E2%80%94%20Even%20When%20Uploading%20Just%20One%20File&amp;severity=medium&amp;id=68374430182aa0cae2557af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pumabot-targets-linux-iot-surveillance-devices-62eebae4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20PumaBot%20targets%20Linux%20IoT%20surveillance%20devices&amp;severity=medium&amp;id=68374430182aa0cae2557afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/czechia-blames-china-for-ministry-of-foreign-affai-32e4928b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Czechia%20blames%20China%20for%20Ministry%20of%20Foreign%20Affairs%20cyberattack&amp;severity=medium&amp;id=68374430182aa0cae2557afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47056-cwe-312-cleartext-storage-of-sensit-3a82edd4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47056%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mautic%20Mautic&amp;severity=medium&amp;id=68373d46182aa0cae2547e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5257-cwe-1284-improper-validation-of-spec-99498c8f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5257%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mautic%20Mautic&amp;severity=medium&amp;id=68373d46182aa0cae2547e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36572-cwe-798-use-of-hard-coded-credentia-b4c5581d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36572%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Dell%20PowerStore&amp;severity=medium&amp;id=683739c3182aa0cae253ffb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-hidden-in-ai-models-on-pypi-targets-alibab-49478f94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Hidden%20in%20AI%20Models%20on%20PyPI%20Targets%20Alibaba%20AI%20Labs%20Users&amp;severity=medium&amp;id=683732c2182aa0cae25301b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51453-cwe-22-improper-limitation-of-a-pat-d97fff31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51453%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Sterling%20Secure%20Proxy&amp;severity=medium&amp;id=68372bbe182aa0cae252024e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38341-cwe-328-use-of-weak-hash-in-ibm-ste-7a174b21</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38341%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20IBM%20Sterling%20Secure%20Proxy&amp;severity=medium&amp;id=68372bbe182aa0cae252024c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3357-cwe-1285-improper-validation-of-spec-23850123</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3357%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20IBM%20Tivoli%20Monitoring&amp;severity=critical&amp;id=68372487182aa0cae2510592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4134-cwe-552-files-or-directories-accessi-f99b7514</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4134%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Avast%20Avast%20Business%20Antivirus&amp;severity=high&amp;id=68371692182aa0cae24f0c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48734-cwe-284-improper-access-control-in--c9bc92cc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48734%3A%20CWE-284%20Improper%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20BeanUtils%201.x&amp;severity=high&amp;id=68371302182aa0cae24e8dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40651-cwe-79-improper-neutralization-of-i-c80574b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40651%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Real%20Easy%20Store%20Real%20Easy%20Store&amp;severity=medium&amp;id=68371302182aa0cae24e8dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5277-os-command-injection-in-alexei-led-a-5410f5a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5277%3A%20OS%20Command%20Injection%20in%20alexei-led%20aws-mcp-server&amp;severity=critical&amp;id=68370f8b182aa0cae24e0c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4493-cwe-266-incorrect-privilege-assignme-bb2c666b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4493%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Devolutions%20Server&amp;severity=medium&amp;id=683704ed182aa0cae249feee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5299-unrestricted-upload-in-sourcecodeste-7a176e88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5299%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=6837017a182aa0cae247946b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5298-sql-injection-in-campcodes-online-ho-8731c6ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5298%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6837017a182aa0cae247946f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5297-stack-based-buffer-overflow-in-sourc-1a27b5c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5297%3A%20Stack-based%20Buffer%20Overflow%20in%20SourceCodester%20Computer%20Store%20System&amp;severity=medium&amp;id=6837017a182aa0cae247946d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3864-cwe-772-missing-release-of-resource--4dab682a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3864%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20hackney%20hackney&amp;severity=low&amp;id=6837017a182aa0cae2479471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5295-buffer-overflow-in-freefloat-ftp-ser-79d84868</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5295%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6836fef4182aa0cae247165a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40673-cwe-862-missing-authorization-in-di-76e16346</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40673%3A%20CWE-862%20Missing%20Authorization%20in%20DinoRANK%20DinoRANK&amp;severity=medium&amp;id=6836fef4182aa0cae247165f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1753-cwe-78-improper-neutralization-of-sp-19dcb33e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1753%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=6836dadc182aa0cae240f29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4963-cwe-79-improper-neutralization-of-in-d087bbaf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=medium&amp;id=6836d743182aa0cae2406da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-code-execution-on-evertz-sdvn-cve-2025-4009-99d7cc88</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Code%20Execution%20on%20Evertz%20SDVN%20(CVE-2025-4009%20-%20Full%20Disclosure)&amp;severity=medium&amp;id=6836d3d2182aa0cae23fef73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5287-cwe-89-improper-neutralization-of-sp-2e2576ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5287%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20erumfaham%20Likes%20and%20Dislikes%20Plugin&amp;severity=high&amp;id=6836c933182aa0cae23e68ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27528-cwe-502-deserialization-of-untruste-8e3b8e91</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27528%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20InLong&amp;severity=critical&amp;id=6836c5ad182aa0cae23deab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27526-cwe-502-deserialization-of-untruste-add4e099</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27526%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20InLong&amp;severity=medium&amp;id=6836c5ad182aa0cae23deab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27522-cwe-502-deserialization-of-untruste-b24bf3ed</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27522%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20InLong&amp;severity=medium&amp;id=6836c5ad182aa0cae23deab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46777-information-disclosure-in-fortinet--857f8afd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46777%3A%20Information%20disclosure%20in%20Fortinet%20FortiPortal&amp;severity=low&amp;id=6836c5ad182aa0cae23deabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24473-information-disclosure-in-fortinet--a7a38fd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24473%3A%20Information%20disclosure%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=6836c5ad182aa0cae23deabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22252-escalation-of-privilege-in-fortinet-bbaab393</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22252%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiProxy&amp;severity=critical&amp;id=6836c5ad182aa0cae23deab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47294-denial-of-service-in-fortinet-forti-5a8815c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47294%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=6836c5ad182aa0cae23deabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54020-improper-access-control-in-fortinet-40f3317e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54020%3A%20Improper%20access%20control%20in%20Fortinet%20FortiManager&amp;severity=low&amp;id=6836c26c182aa0cae23d6c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47295-denial-of-service-in-fortinet-forti-b2280063</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47295%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=6836c26c182aa0cae23d6c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25251-escalation-of-privilege-in-fortinet-ecd506da</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25251%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientMac&amp;severity=high&amp;id=6836c26c182aa0cae23d6c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5082-cwe-79-improper-neutralization-of-in-5409029c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milmor%20WP%20Attachments&amp;severity=medium&amp;id=6836be9b182aa0cae23cee24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5025-cwe-295-improper-certificate-validat-7bfd125c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5025%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20curl%20curl&amp;severity=medium&amp;id=6836b081182aa0cae23af5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4947-cwe-295-improper-certificate-validat-663b40bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4947%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20curl%20curl&amp;severity=medium&amp;id=6836b081182aa0cae23af5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4800-cwe-434-unrestricted-upload-of-file--dade8c1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4800%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=high&amp;id=6836a280182aa0cae238f9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25029-cwe-116-improper-encoding-or-escapi-c37eab93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25029%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=68366a30182aa0cae22e6b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25026-cwe-863-incorrect-authorization-in--d9f779ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25026%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=68366a30182aa0cae22e6b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25025-cwe-209-generation-of-error-message-c63ace9e</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25025%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=68366a30182aa0cae22e6b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31501-cwe-79-improper-neutralization-of-i-51367af7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20bestpractical%20RT&amp;severity=high&amp;id=68374ee1182aa0cae256f67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31500-cwe-79-improper-neutralization-of-i-196fda38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20bestpractical%20RT&amp;severity=high&amp;id=68374ee1182aa0cae256f679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30087-cwe-79-improper-neutralization-of-i-52a7f1e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20bestpractical%20RT&amp;severity=high&amp;id=68374ee1182aa0cae256f677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48749-na-in-na-6e74e057</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48749%3A%20n%2Fa&amp;severity=critical&amp;id=68374b89182aa0cae2567847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57338-na-in-na-b392b7f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57338%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68374b89182aa0cae2567841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57337-na-in-na-243206b4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57337%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68374b89182aa0cae256783f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57336-na-in-na-289581b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57336%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68374b89182aa0cae256783d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48747-na-in-na-6c666cb2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48747%3A%20n%2Fa&amp;severity=medium&amp;id=683747bb182aa0cae255f97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47748-na-in-na-618f3857</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47748%3A%20n%2Fa&amp;severity=medium&amp;id=683747bb182aa0cae255f97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48927-cwe-1188-initialization-of-a-resour-05120e67</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48927%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20TeleMessage%20service&amp;severity=medium&amp;id=6837447f182aa0cae2557b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48928-cwe-528-exposure-of-core-dump-file--5f7ad3bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48928%3A%20CWE-528%20Exposure%20of%20Core%20Dump%20File%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TeleMessage%20service&amp;severity=medium&amp;id=6837447f182aa0cae2557b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48931-cwe-328-use-of-weak-hash-in-telemes-5a050077</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48931%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20TeleMessage%20service&amp;severity=low&amp;id=6837447f182aa0cae2557b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48930-cwe-316-cleartext-storage-of-sensit-765e5dd0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48930%3A%20CWE-316%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20TeleMessage%20service&amp;severity=low&amp;id=6837447f182aa0cae2557b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48929-cwe-922-insecure-storage-of-sensiti-5229d1f8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48929%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20TeleMessage%20service&amp;severity=medium&amp;id=6837447f182aa0cae2557b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48746-na-in-na-2aa346d3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48746%3A%20n%2Fa&amp;severity=medium&amp;id=6837447f182aa0cae2557b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48926-na-in-na-59eac169</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48926%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20TeleMessage%20service&amp;severity=medium&amp;id=683740ca182aa0cae254fcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48925-cwe-836-use-of-password-hash-instea-69e6cb9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48925%3A%20CWE-836%20Use%20of%20Password%20Hash%20Instead%20of%20Password%20for%20Authentication%20in%20TeleMessage%20service&amp;severity=medium&amp;id=683740ca182aa0cae254fcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45343-na-in-na-f67dbb31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45343%3A%20n%2Fa&amp;severity=critical&amp;id=68372f36182aa0cae2528325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45997-na-in-na-fa24eee2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45997%3A%20n%2Fa&amp;severity=high&amp;id=68371a22182aa0cae24f8aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nsis-abuse-and-srdi-shellcode-anatomy-of-the-winos-c2099fb9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NSIS%20Abuse%20and%20sRDI%20Shellcode%3A%20Anatomy%20of%20the%20Winos%204.0%20Campaign&amp;severity=medium&amp;id=6836d04b182aa0cae23f6946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-unit-26165-targets-western-logistics-and-t-346e1b0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Unit%2026165%20Targets%20Western%20Logistics%20and%20Technology%20Companies&amp;severity=medium&amp;id=6836d04b182aa0cae23f6936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta-shadowcricket-emerging-malware-trends-and-irc-s-297b83a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA-ShadowCricket%3A%20Emerging%20Malware%20Trends%20and%20IRC%20Server%20Tracking&amp;severity=medium&amp;id=6836d3c9182aa0cae23fef4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45094-cwe-79-improper-neutralization-of-i-f0439252</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45094%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Hardware%20Management%20Console&amp;severity=medium&amp;id=68364398182aa0cae228fda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2826-cwe-1284-improper-validation-of-spec-8e9bd058</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2826%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Arista%20Networks%20EOS&amp;severity=low&amp;id=6836400e182aa0cae2287fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2796-cwe-284-in-arista-networks-eos-67df2b11</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2796%3A%20cwe-284%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=68363c92182aa0cae227ff9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11185-cwe-1189-in-arista-networks-eos-7e3c000c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11185%3A%20cwe-1189%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=68363c92182aa0cae227ff9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32440-cwe-306-missing-authentication-for--ecdca621</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32440%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20jokob-sk%20NetAlertX&amp;severity=critical&amp;id=6836390e182aa0cae227819f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-o3-resists-shutdown-despite-instructions-s-295d101c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20o3%20Resists%20Shutdown%20Despite%20Instructions%2C%20Study%20Claims&amp;severity=medium&amp;id=6836320d182aa0cae22685a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40911-cwe-1287-improper-validation-of-spe-f0004c4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40911%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20RRWO%20Net%3A%3ACIDR%3A%3ASet&amp;severity=medium&amp;id=68362e69182aa0cae22607ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5278-stack-based-buffer-overflow-in-red-h-089be548</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5278%3A%20Stack-based%20Buffer%20Overflow&amp;severity=medium&amp;id=68362775182aa0cae2250913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5222-buffer-copy-without-checking-size-of-512cbad9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5222%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=high&amp;id=68362775182aa0cae2250911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5198-improper-neutralization-of-input-dur-4fa4c565</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5198%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=68362775182aa0cae225090f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5067-inappropriate-implementation-in-goog-95f84a26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5067%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362775182aa0cae225091d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5283-use-after-free-in-google-chrome-470e480c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5283%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362776182aa0cae2250926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5281-inappropriate-implementation-in-goog-566caac5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5281%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362775182aa0cae2250921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5066-inappropriate-implementation-in-goog-fd067acd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5066%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362775182aa0cae225091b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5065-inappropriate-implementation-in-goog-6cf544e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5065%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362775182aa0cae2250919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5064-inappropriate-implementation-in-goog-81c7dabe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5064%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362775182aa0cae2250917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5280-out-of-bounds-write-in-google-chrome-b7139663</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5280%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=68362775182aa0cae225091f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5063-use-after-free-in-google-chrome-3ad929ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5063%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68362775182aa0cae2250915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5279-cwe-295-improper-certificate-validat-5eae8922</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5279%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Amazon%20Redshift&amp;severity=high&amp;id=6836206f182aa0cae223c47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-sharp-taste-of-mimolette-analyzing-mimos-lates-243ecc59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Sharp%20Taste%20of%20Mimo&apos;lette%3A%20Analyzing%20Mimo&apos;s%20Latest%20Campaign%20targeting%20Craft%20CMS&amp;severity=medium&amp;id=68360ed7182aa0cae2207281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13966-cwe-1393-use-of-default-password-in-14ada46b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13966%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20ZKTeco%20BioTime&amp;severity=high&amp;id=683607d4182aa0cae21f75ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-breach-20-ngos-using-evilginx-phis-3c50e248</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Breach%2020%2B%20NGOs%20Using%20Evilginx%20Phishing%20via%20Fake%20Microsoft%20Entra%20Pages&amp;severity=medium&amp;id=6835f9c3182aa0cae21ceae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/matlab-dev-confirms-ransomware-attack-behind-servi-e9ff0626</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MATLAB%20dev%20confirms%20ransomware%20attack%20behind%20service%20outage&amp;severity=medium&amp;id=6835f9c3182aa0cae21ceae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-apt-laundry-bear-linked-to-2024-dutc-90eff741</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-linked%20APT%20Laundry%20Bear%20linked%20to%202024%20Dutch%20Police%20attack&amp;severity=medium&amp;id=6835f9c3182aa0cae21ceae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5252-sql-injection-in-phpgurukul-news-por-67779c5c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5252%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=6835f9e9182aa0cae21d0f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5251-sql-injection-in-phpgurukul-news-por-23bdfba7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5251%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=6835f2d0182aa0cae21bc9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5250-sql-injection-in-phpgurukul-news-por-b3599f29</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5250%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=6835f2d0182aa0cae21bc9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-or-llm-silent-werewolf-employs-new-loaders-e65119bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20or%20LLM%3F%20Silent%20Werewolf%20employs%20new%20loaders%20to%20attack%20Russian%20and%20Moldovan%20organizations&amp;severity=medium&amp;id=6835ef34182aa0cae21b26e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23247-cwe-130-in-nvidia-nvidia-cuda-toolk-630722e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23247%3A%20CWE-130%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=6835ef3f182aa0cae21b274e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48057-cwe-296-improper-following-of-a-cer-8b899e94</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48057%3A%20CWE-296%3A%20Improper%20Following%20of%20a%20Certificate&apos;s%20Chain%20of%20Trust%20in%20Icinga%20icinga2&amp;severity=critical&amp;id=6835ebbb182aa0cae21a8436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5249-sql-injection-in-phpgurukul-news-por-5b023d17</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5249%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=6835ebbb182aa0cae21a8438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5248-sql-injection-in-phpgurukul-company--c482638c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5248%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=6835e4b9182aa0cae2196356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adidas-confirms-cyber-attack-customer-data-stolen-2d34f573</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adidas%20Confirms%20Cyber%20Attack%2C%20Customer%20Data%20Stolen&amp;severity=medium&amp;id=6835e142182aa0cae218e4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27701-information-disclosure-in-google-an-870a2d6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27701%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6835e152182aa0cae218e508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27700-elevation-of-privilege-in-google-an-97a1c158</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27700%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6835e152182aa0cae218e506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56193-information-disclosure-in-google-an-9edc0fa4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56193%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6835e152182aa0cae218e504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48370-cwe-287-improper-authentication-in--5b61b211</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48370%3A%20CWE-287%3A%20Improper%20Authentication%20in%20supabase%20auth-js&amp;severity=low&amp;id=6835dda5182aa0cae2186689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48383-cwe-402-transmission-of-private-res-f86d4038</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48383%3A%20CWE-402%3A%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20codingjoe%20django-select2&amp;severity=high&amp;id=6835d69f182aa0cae2176716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2236-cwe-497-exposure-of-sensitive-system-5e80e3dc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2236%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20OpenText%20Advanced%20Authentication&amp;severity=low&amp;id=6835d69f182aa0cae2176714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5247-improper-authentication-in-gowabby-h-fefb72de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5247%3A%20Improper%20Authentication%20in%20Gowabby%20HFish&amp;severity=medium&amp;id=6835d69f182aa0cae2176718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3704-cwe-79-improper-neutralization-of-in-f6988af3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DBAR%20Productions%20Volunteer%20Sign%20Up%20Sheets&amp;severity=null&amp;id=6835d30c182aa0cae216c46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5246-sql-injection-in-campcodes-online-ho-d7a15142</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5246%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6835cf87182aa0cae21621ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5245-memory-corruption-in-gnu-binutils-a32704a9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5245%3A%20Memory%20Corruption%20in%20GNU%20Binutils&amp;severity=medium&amp;id=6835cf87182aa0cae21621aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48798-use-after-free-in-red-hat-red-hat-e-a9158f06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48798%3A%20Use%20After%20Free&amp;severity=high&amp;id=6835c887182aa0cae214dc96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48797-heap-based-buffer-overflow-in-red-h-1aa9c0d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48797%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=6835c887182aa0cae214dc94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48796-stack-based-buffer-overflow-in-red--37ec551b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48796%3A%20Stack-based%20Buffer%20Overflow&amp;severity=high&amp;id=6835c887182aa0cae214dc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5244-memory-corruption-in-gnu-binutils-cbac9388</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5244%3A%20Memory%20Corruption%20in%20GNU%20Binutils&amp;severity=medium&amp;id=6835ba7c182aa0cae2128088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-single-packet-shovel-digging-for-desync-powere-9bc2e3d8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Single-Packet%20Shovel%3A%20Digging%20for%20Desync-Powered%20Request%20Tunnelling&amp;severity=medium&amp;id=6835b382182aa0cae2110ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5272-memory-safety-bugs-fixed-in-firefox--3466196a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5272%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835b383182aa0cae2110b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5271-devtools-preview-ignored-csp-headers-0a4cdfb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5271%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5270-sni-was-sometimes-unencrypted-in-moz-b284f5a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5270%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835b383182aa0cae2110aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5269-memory-safety-bug-fixed-in-firefox-e-5dafbc2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5269%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835b383182aa0cae2110afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5268-memory-safety-bugs-fixed-in-firefox--4be69d2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5268%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835b383182aa0cae2110afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5267-clickjacking-vulnerability-could-hav-fdcd2cc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5267%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5266-script-element-events-leaked-cross-o-b11f31fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5266%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5265-potential-local-code-execution-in-co-0eef65ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5265%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5264-potential-local-code-execution-in-co-ead44164</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5264%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5263-error-handling-for-script-execution--9be5a8bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5263%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5262-double-free-in-libvpx-encoder-in-moz-1a010bfa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5262%3A%20Double-free%20in%20libvpx%20encoder%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=6835b383182aa0cae2110aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5117-cwe-862-missing-authorization-in-the-d0b2a659</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5117%3A%20CWE-862%20Missing%20Authorization%20in%20themeglow%20Property%20%E2%80%93%20Real%20Estate%20Directory%20Listing&amp;severity=high&amp;id=6835afe5182aa0cae2104bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/custom-arsenal-developed-to-target-multiple-indust-bb1a0859</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Custom%20Arsenal%20Developed%20to%20Target%20Multiple%20Industries&amp;severity=medium&amp;id=6835bdf7182aa0cae2133c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-hackers-target-tajikistan-government-572fd3ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Linked%20Hackers%20Target%20Tajikistan%20Government%20with%20Weaponized%20Word%20Documents&amp;severity=medium&amp;id=68359cde5d5f0974d01fda4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nova-scotia-power-confirms-it-was-hit-by-ransomwar-9e5e0219</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nova%20Scotia%20Power%20confirms%20it%20was%20hit%20by%20ransomware&amp;severity=medium&amp;id=68359cde5d5f0974d01fda4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adidas-warns-of-data-breach-after-customer-service-f27e81b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adidas%20warns%20of%20data%20breach%20after%20customer%20service%20provider%20hack&amp;severity=medium&amp;id=68359cde5d5f0974d01fda51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4412-cwe-276-incorrect-default-permission-0a1857de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4412%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20SparkLabs%20Viscosity&amp;severity=medium&amp;id=6835ae13182aa0cae20f9cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-leaks-coca-cola-employee-data-o-0cc8678e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Leaks%20Coca-Cola%20Employee%20Data%20Online&amp;severity=medium&amp;id=68359cde5d5f0974d01fda49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41653-cwe-410-insufficient-resource-pool--8e665b6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41653%3A%20CWE-410%20Insufficient%20Resource%20Pool%20in%20Weidmueller%20IE-SW-VL05M-5TX&amp;severity=high&amp;id=6835ae13182aa0cae20f9ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41652-cwe-656-reliance-on-security-throug-69490277</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41652%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20Weidmueller%20IE-SW-VL05M-5TX&amp;severity=critical&amp;id=6835ae13182aa0cae20f9ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41651-cwe-306-missing-authentication-for--8dcbb5fa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41651%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Weidmueller%20IE-SW-VL05M-5TX&amp;severity=critical&amp;id=6835ae13182aa0cae20f9cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41650-cwe-1287-improper-validation-of-spe-ed5c8adc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41650%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Weidmueller%20IE-SW-VL05M-5TX&amp;severity=high&amp;id=6835ae13182aa0cae20f9cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41649-cwe-787-out-of-bounds-write-in-weid-9a7686f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41649%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Weidmueller%20IE-SW-VL05M-5TX&amp;severity=high&amp;id=6835ae13182aa0cae20f9cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-prompt-injection-in-gitlab-duo-leads-to-sou-3ed46e7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Prompt%20Injection%20in%20GitLab%20Duo%20Leads%20to%20Source%20Code%20Theft&amp;severity=medium&amp;id=6835d306182aa0cae216c431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2407-cwe-306-missing-authentication-for-c-559f4bb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2407%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mobatime%20AMX%20MTAPI&amp;severity=critical&amp;id=6835ae13182aa0cae20f9ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-mcp-exploited-accessing-private-repositorie-8f3f7a6e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20MCP%20Exploited%3A%20Accessing%20private%20repositories%20via%20MCP&amp;severity=medium&amp;id=68359ce75d5f0974d01fda7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23393-cwe-80-improper-neutralization-of-s-39674bc3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23393%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20SUSE%20Container%20suse%2Fmanager%2F5.0%2Fx86_64%2Fserver%3A5.0.4.7.19.1&amp;severity=medium&amp;id=6835ae13182aa0cae20f9cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47090-cwe-79-improper-neutralization-of-i-51e61b05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47090%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nagvis%20Nagvis&amp;severity=medium&amp;id=6835ae13182aa0cae20f9cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38866-cwe-140-improper-neutralization-of--fdf7e800</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38866%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Nagvis%20Nagvis&amp;severity=medium&amp;id=6835ae13182aa0cae20f9cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5232-sql-injection-in-phpgurukul-student--c20226d6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5232%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Study%20Center%20Management%20System&amp;severity=medium&amp;id=6835ae13182aa0cae20f9d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48382-cwe-732-incorrect-permission-assign-9b53f492</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48382%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20codelibs%20fess&amp;severity=low&amp;id=6835ae13182aa0cae20f9d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5231-sql-injection-in-phpgurukul-company--aa06999b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5231%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=6835ae13182aa0cae20f9d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48054-cwe-1321-improperly-controlled-modi-7b70a16b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48054%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20radashi-org%20radashi&amp;severity=medium&amp;id=6835ae13182aa0cae20f9d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5230-sql-injection-in-phpgurukul-online-n-92fc32a2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5230%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Nurse%20Hiring%20System&amp;severity=medium&amp;id=6835ae13182aa0cae20f9da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5229-sql-injection-in-campcodes-online-ho-ead0ab88</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5229%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6835ae13182aa0cae20f9db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5228-stack-based-buffer-overflow-in-d-lin-4c5680bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5228%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=6835ae14182aa0cae20f9f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5227-sql-injection-in-phpgurukul-small-cr-22d14f85</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5227%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5226-sql-injection-in-phpgurukul-small-cr-3667e9d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5226%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5225-sql-injection-in-campcodes-advanced--3e42d734</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5225%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5224-sql-injection-in-campcodes-online-ho-634f4cb2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5224%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5221-buffer-overflow-in-freefloat-ftp-ser-f79c3aed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5221%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4682-cwe-79-improper-neutralization-of-in-30887a78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4683-cwe-862-missing-authorization-in-ins-c6830d33</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4683%3A%20CWE-862%20Missing%20Authorization%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5220-buffer-overflow-in-freefloat-ftp-ser-f707ec8a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5220%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6835ae14182aa0cae20fa016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33079-cwe-256-plaintext-storage-of-a-pass-ca765e28</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33079%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20Controller&amp;severity=medium&amp;id=6835ae14182aa0cae20fa013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5219-buffer-overflow-in-freefloat-ftp-ser-2d271080</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5219%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6835ae14182aa0cae20fa01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5218-buffer-overflow-in-freefloat-ftp-ser-08d29195</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5218%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6835ae14182aa0cae20fa019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5217-buffer-overflow-in-freefloat-ftp-ser-d6c771d9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5217%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6835ae14182aa0cae20fa022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5216-sql-injection-in-phpgurukul-student--35f36b43</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5216%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5215-stack-based-buffer-overflow-in-d-lin-85c20201</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5215%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-5020L&amp;severity=high&amp;id=6835ae14182aa0cae20fa025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46173-na-in-na-97e15ba9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46173%3A%20n%2Fa&amp;severity=medium&amp;id=68361951182aa0cae2227fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45529-na-in-na-9f89e186</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45529%3A%20n%2Fa&amp;severity=high&amp;id=68360ee1182aa0cae22072a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45475-na-in-na-bda1eec7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45475%3A%20n%2Fa&amp;severity=medium&amp;id=6835fd37182aa0cae21d8df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49197-na-in-na-21bcfd2c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49197%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835f633182aa0cae21c4824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22377-na-in-na-b243a582</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22377%3A%20n%2Fa&amp;severity=medium&amp;id=6835f2d0182aa0cae21bc9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49196-na-in-na-9d6ba5e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49196%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835f2d0182aa0cae21bc9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48744-cwe-22-improper-limitation-of-a-pat-b081d5d9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48744%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SIGB%20PMB&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48743-cwe-89-improper-neutralization-of-s-dd8f8d30</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SIGB%20PMB&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26211-cwe-352-cross-site-request-forgery--d6cbf8ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26211%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20GibbonEdu%20Gibbon&amp;severity=low&amp;id=6835ae14182aa0cae20f9e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48742-cwe-306-missing-authentication-for--c755b4e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48742%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SIGB%20PMB&amp;severity=medium&amp;id=6835ae13182aa0cae20f9dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48828-cwe-424-improper-protection-of-alte-d6a6ca0b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48828%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20vBulletin%20vBulletin&amp;severity=critical&amp;id=6835ae13182aa0cae20f9da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48827-cwe-424-improper-protection-of-alte-75df182d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48827%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20vBulletin%20vBulletin&amp;severity=critical&amp;id=6835ae13182aa0cae20f9d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5214-sql-injection-in-kashipara-responsiv-689beb06</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5214%3A%20SQL%20Injection%20in%20Kashipara%20Responsive%20Online%20Learing%20Platform&amp;severity=medium&amp;id=6835ae14182aa0cae20fa02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5213-sql-injection-in-projectworlds-respo-e198bad2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5213%3A%20SQL%20Injection%20in%20projectworlds%20Responsive%20E-Learning%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4783-cwe-79-improper-neutralization-of-in-db02b67c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6835ae14182aa0cae20fa02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/katz-stealer-threat-analysis-8fac4b6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Katz%20Stealer%20Threat%20Analysis&amp;severity=medium&amp;id=68359dbe5d5f0974d01fe933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5212-sql-injection-in-phpgurukul-employee-47718aac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5212%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5211-sql-injection-in-phpgurukul-employee-2820573f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5211%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5210-sql-injection-in-phpgurukul-employee-1852617f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5210%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5208-sql-injection-in-sourcecodester-onli-5b2bf4e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5208%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5207-sql-injection-in-sourcecodester-clie-7516a658</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5207%3A%20SQL%20Injection%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5206-sql-injection-in-pixelimity-ebc71026</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5206%3A%20SQL%20Injection%20in%20Pixelimity&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5205-sql-injection-in-1000-projects-daily-722d8700</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5205%3A%20SQL%20Injection%20in%201000%20Projects%20Daily%20College%20Class%20Work%20Report%20Book&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5204-out-of-bounds-read-in-open-asset-imp-79fb3022</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5204%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5203-out-of-bounds-read-in-open-asset-imp-9054658c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5203%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silverrat-source-code-leaked-online-heres-what-you-7456b223</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SilverRAT%20Source%20Code%20Leaked%20Online%3A%20Here%E2%80%99s%20What%20You%20Need%20to%20Know&amp;severity=medium&amp;id=68359cde5d5f0974d01fda47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5202-out-of-bounds-read-in-open-asset-imp-22f46024</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5202%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5201-out-of-bounds-read-in-open-asset-imp-30d652ed</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5201%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6835ae14182aa0cae20fa196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5200-out-of-bounds-read-in-open-asset-imp-4018ce88</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5200%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6835ae14182aa0cae20fa19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23392-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-suse-container-suse-manager-5-0-x86-64-server-5-0-4-7-19-1-2888bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23392%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20SUSE%20Container%20suse%2Fmanager%2F5.0%2Fx86_64%2Fserver%3A5.0.4.7.19.1&amp;severity=medium&amp;id=6834925b0acd01a2492888bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23394-cwe-61-unix-symbolic-link-symlink-following-in-suse-opensuse-tumbleweed-288851</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23394%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20SUSE%20openSUSE%20Tumbleweed&amp;severity=critical&amp;id=68348e960acd01a249288851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-exploit-cityworks-0-day-to-hit-us--06deb7d5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Exploit%20Cityworks%200-Day%20to%20Hit%20US%20Local%20Govt%20Agencies&amp;severity=medium&amp;id=68359cde5d5f0974d01fda41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23395-cwe-271-privilege-dropping-lowering-errors-288781</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23395%3A%20CWE-271%3A%20Privilege%20Dropping%20%2F%20Lowering%20Errors&amp;severity=high&amp;id=683487800acd01a249288781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46802-vulnerability-in-suse-suse-linux-enterprise-micro-5-3-288783</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46802%3A%20Vulnerability%20in%20SUSE%20SUSE%20Linux%20Enterprise%20Micro%205.3&amp;severity=medium&amp;id=683487800acd01a249288783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46803-cwe-276-incorrect-default-permissions-288785</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46803%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions&amp;severity=medium&amp;id=683487800acd01a249288785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37992-vulnerability-in-linux-linux-28870c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=6834841b0acd01a24928870c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39498-cwe-201-insertion-of-sensitive-information-into-sent-data-in-spotlight-spotlight-social-media-feeds-premium-2877e7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39498%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Spotlight%20Spotlight%20-%20Social%20Media%20Feeds%20(Premium)&amp;severity=low&amp;id=6834797f0acd01a2492877e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46804-cwe-203-observable-discrepancy-2876ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46804%3A%20CWE-203%3A%20Observable%20Discrepancy&amp;severity=low&amp;id=683471f80acd01a2492876ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5196-execution-with-unnecessary-privileges-in-wing-ftp-server-2876d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5196%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Wing%20FTP%20Server&amp;severity=high&amp;id=683471f80acd01a2492876d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46805-cwe-367-time-of-check-time-of-use-toctou-race-condition-28752b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46805%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition&amp;severity=medium&amp;id=68346e7e0acd01a24928752b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5186-server-side-request-forgery-in-thinkgem-jeesite-2874c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5186%3A%20Server-Side%20Request%20Forgery%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=68346b000acd01a2492874c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reborn-in-rust-attempt-to-thwart-malware-analysis-288700</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reborn%20in%20Rust%3A%20Attempt%20to%20thwart%20malware%20analysis&amp;severity=medium&amp;id=6834841a0acd01a249288700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40663-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-i2a-cronos-28744f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20i2A%20Cronos&amp;severity=medium&amp;id=683467830acd01a24928744f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40653-cwe-209-generation-of-error-message-containing-sensitive-information-in-m3m-m3m-printer-server-web-28744d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40653%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20M3M%20M3M%20Printer%20Server%20Web&amp;severity=medium&amp;id=683467830acd01a24928744d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40652-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-covermanager-covermanager-28744b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20CoverManager%20CoverManager&amp;severity=medium&amp;id=683467830acd01a24928744b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40650-cwe-639-authorization-bypass-through-user-controlled-key-in-clickedu-clickedu-287449</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40650%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Clickedu%20Clickedu&amp;severity=high&amp;id=683467830acd01a249287449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40667-cwe-862-missing-authorization-in-tcman-gim-287457</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40667%3A%20CWE-862%20Missing%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=683467830acd01a249287457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40666-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-287455</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40666%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=high&amp;id=683467830acd01a249287455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40665-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-287453</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40665%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=high&amp;id=683467830acd01a249287453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40664-cwe-306-missing-authentication-for-critical-function-in-tcman-gim-287451</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40664%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=683467830acd01a249287451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5185-cross-site-request-forgery-in-summer-pearl-group-vacation-rental-management-platform-2873d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5185%3A%20Cross-Site%20Request%20Forgery%20in%20Summer%20Pearl%20Group%20Vacation%20Rental%20Management%20Platform&amp;severity=medium&amp;id=683464010acd01a2492873d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5184-information-disclosure-in-summer-pearl-group-vacation-rental-management-platform-2871d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5184%3A%20Information%20Disclosure%20in%20Summer%20Pearl%20Group%20Vacation%20Rental%20Management%20Platform&amp;severity=medium&amp;id=68345d020acd01a2492871d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5183-open-redirect-in-summer-pearl-group-vacation-rental-management-platform-28599a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5183%3A%20Open%20Redirect%20in%20Summer%20Pearl%20Group%20Vacation%20Rental%20Management%20Platform&amp;severity=medium&amp;id=6834526c0acd01a24928599a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5182-authorization-bypass-in-summer-pearl-group-vacation-rental-management-platform-2858cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5182%3A%20Authorization%20Bypass%20in%20Summer%20Pearl%20Group%20Vacation%20Rental%20Management%20Platform&amp;severity=medium&amp;id=68344b560acd01a2492858cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5181-cross-site-scripting-in-summer-pearl-group-vacation-rental-management-platform-285861</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5181%3A%20Cross%20Site%20Scripting%20in%20Summer%20Pearl%20Group%20Vacation%20Rental%20Management%20Platform&amp;severity=medium&amp;id=683447ce0acd01a249285861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-of-tcc-bypasses-on-macos-c70b472e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20of%20TCC%20Bypasses%20on%20macOS&amp;severity=medium&amp;id=68359ce75d5f0974d01fda76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4053-cwe-312-cleartext-storage-of-sensitive-information-in-be-tech-mifare-classic-cards-285565</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4053%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Be-Tech%20Mifare%20Classic%20cards&amp;severity=medium&amp;id=683440d80acd01a249285565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35003-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-apache-software-foundation-apache-nuttx-rtos-285563</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35003%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS&amp;severity=critical&amp;id=683440d80acd01a249285563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5180-uncontrolled-search-path-in-wondershare-filmora-285458</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5180%3A%20Uncontrolled%20Search%20Path%20in%20Wondershare%20Filmora&amp;severity=high&amp;id=68343d700acd01a249285458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5179-cross-site-scripting-in-realce-tecnologia-queue-ticket-kiosk-2853ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5179%3A%20Cross%20Site%20Scripting%20in%20Realce%20Tecnologia%20Queue%20Ticket%20Kiosk&amp;severity=medium&amp;id=683439c50acd01a2492853ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-attack-method-on-hosted-ml-models-now-targets-pypi-284968</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20attack%20method%20on%20hosted%20ML%20models%20now%20targets%20PyPI&amp;severity=medium&amp;id=683432cd0acd01a249284968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-operation-disrupts-lumma-stealer-28497e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20operation%20disrupts%20Lumma%20Stealer&amp;severity=medium&amp;id=683432cd0acd01a24928497e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40671-cwe-93-improper-neutralization-of-crlf-sequences-crlf-injection-in-aes-multimedia-gestnet-28523f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40671%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20AES%20Multimedia%20Gestnet&amp;severity=critical&amp;id=6834363e0acd01a24928523f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40672-cwe-732-incorrect-permission-assignment-for-critical-resource-in-grupo-espiral-ms-proactivanet-285241</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40672%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Grupo%20Espiral%20MS%20Panloader.exe&amp;severity=high&amp;id=6834363e0acd01a249285241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5178-unrestricted-upload-in-realce-tecnologia-queue-ticket-kiosk-285247</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5178%3A%20Unrestricted%20Upload%20in%20Realce%20Tecnologia%20Queue%20Ticket%20Kiosk&amp;severity=medium&amp;id=6834363e0acd01a249285247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4057-use-of-weak-credentials-in-red-hat-red-hat-amq-broker-7-285243</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4057%3A%20Use%20of%20Weak%20Credentials&amp;severity=medium&amp;id=6834363e0acd01a249285243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5177-cross-site-scripting-in-realce-tecnologia-queue-ticket-kiosk-285245</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5177%3A%20Cross%20Site%20Scripting%20in%20Realce%20Tecnologia%20Queue%20Ticket%20Kiosk&amp;severity=medium&amp;id=6834363e0acd01a249285245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41655-cwe-306-missing-authentication-for-critical-function-in-pepperl-fuchs-profinet-gateway-fb8122a-1-el-28472d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41655%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pepperl%2BFuchs%20Profinet%20Gateway%20FB8122A.1.EL&amp;severity=high&amp;id=683428360acd01a24928472d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41654-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-pepperl-fuchs-profinet-gateway-fb8122a-1-el-28472b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41654%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pepperl%2BFuchs%20Profinet%20Gateway%20FB8122A.1.EL&amp;severity=high&amp;id=683428360acd01a24928472b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1985-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pepperl-fuchs-profinet-gateway-fb8122a-1-el-284729</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pepperl%2BFuchs%20Profinet%20Gateway%20FB8122A.1.EL&amp;severity=medium&amp;id=683428360acd01a249284729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5176-sql-injection-in-realce-tecnologia-queue-ticket-kiosk-2846a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5176%3A%20SQL%20Injection%20in%20Realce%20Tecnologia%20Queue%20Ticket%20Kiosk&amp;severity=medium&amp;id=683424ac0acd01a2492846a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5175-improper-authorization-in-erdogant-pypickle-284520</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5175%3A%20Improper%20Authorization%20in%20erdogant%20pypickle&amp;severity=medium&amp;id=68341da10acd01a249284520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5174-deserialization-in-erdogant-pypickle-28417a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5174%3A%20Deserialization%20in%20erdogant%20pypickle&amp;severity=medium&amp;id=683413410acd01a24928417a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5173-deserialization-in-humansignal-label-studio-ml-backend-28410e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5173%3A%20Deserialization%20in%20HumanSignal%20label-studio-ml-backend&amp;severity=medium&amp;id=68340f960acd01a24928410e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41441-generation-of-error-message-containing-sensitive-information-in-synck-graphica-mailform-pro-cgi-284070</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41441%3A%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20SYNCK%20GRAPHICA%20Mailform%20Pro%20CGI&amp;severity=low&amp;id=68340c190acd01a249284070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5172-sql-injection-in-econtrata-283f73</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5172%3A%20SQL%20Injection%20in%20Econtrata&amp;severity=medium&amp;id=683405400acd01a249283f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5171-unrestricted-upload-in-llisoft-mta-maita-training-system-283eb3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5171%3A%20Unrestricted%20Upload%20in%20llisoft%20MTA%20Maita%20Training%20System&amp;severity=medium&amp;id=6833fe6b0acd01a249283eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5170-sql-injection-in-llisoft-mta-maita-training-system-283d96</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5170%3A%20SQL%20Injection%20in%20llisoft%20MTA%20Maita%20Training%20System&amp;severity=medium&amp;id=6833f6f70acd01a249283d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5169-out-of-bounds-read-in-open-asset-import-library-assimp-283cfa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5169%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6833f3760acd01a249283cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5168-out-of-bounds-read-in-open-asset-import-library-assimp-283b9a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5168%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6833e9090acd01a249283b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5167-out-of-bounds-read-in-open-asset-import-library-assimp-283b2a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5167%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6833e5630acd01a249283b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5166-out-of-bounds-read-in-open-asset-import-library-assimp-283ac8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5166%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6833e2070acd01a249283ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5165-out-of-bounds-read-in-open-asset-import-library-assimp-283990</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5165%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6833daf10acd01a249283990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5164-use-of-hard-coded-cryptographic-key-in-perfreeblog-2837d4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5164%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PerfreeBlog&amp;severity=medium&amp;id=6833d3e00acd01a2492837d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5163-improper-access-controls-in-yangshare-warehousemanager-2835ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5163%3A%20Improper%20Access%20Controls%20in%20yangshare%20%E6%8A%80%E6%9C%AF%E6%9D%A8%E5%B7%A5%20warehouseManager%20%E4%BB%93%E5%BA%93%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=6833c9430acd01a2492835ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5162-unrestricted-upload-in-h3c-seccenter-smp-e1114p02-283431</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5162%3A%20Unrestricted%20Upload%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=6833bece0acd01a249283431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5161-path-traversal-in-h3c-seccenter-smp-e1114p02-283283</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5161%3A%20Path%20Traversal%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=6833b8270acd01a249283283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5160-path-traversal-in-h3c-seccenter-smp-e1114p02-2830ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5160%3A%20Path%20Traversal%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=6833b0e40acd01a2492830ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2146-cwe-787-out-of-bounds-write-in-canon-3bfdf75e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2146%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20MF656Cdw&amp;severity=critical&amp;id=6835ae14182aa0cae20fa1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5159-path-traversal-in-h3c-seccenter-smp--baef3511</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5159%3A%20Path%20Traversal%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=6835ae14182aa0cae20fa1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5158-path-traversal-in-h3c-seccenter-smp-e1114p02-282f1f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5158%3A%20Path%20Traversal%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=6833a2b50acd01a249282f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5157-path-traversal-in-h3c-seccenter-smp-e1114p02-282e4e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5157%3A%20Path%20Traversal%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=68339b8c0acd01a249282e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5156-buffer-overflow-in-h3c-gr-5400ax-282db0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5156%3A%20Buffer%20Overflow%20in%20H3C%20GR-5400AX&amp;severity=high&amp;id=6833980e0acd01a249282db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-silent-ransom-group-targeting-law-fir-6290b14d</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Silent%20Ransom%20Group%20Targeting%20Law%20Firms%20via%20Scam%20Calls&amp;severity=medium&amp;id=68359cde5d5f0974d01fda43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-ransom-group-targeting-law-firms-the-fbi-wa-7065945d</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Ransom%20Group%20targeting%20law%20firms%2C%20the%20FBI%20warns&amp;severity=medium&amp;id=68359cde5d5f0974d01fda55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bumblebee-malware-distributed-via-zenmap-winmrt-se-68ddc20e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bumblebee%20malware%20distributed%20via%20Zenmap%2C%20WinMRT%20SEO%20poisoning&amp;severity=medium&amp;id=68359cde5d5f0974d01fda53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-disrupted-global-ransomware-infr-45d10df3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20ENDGAME%20disrupted%20global%20ransomware%20infrastructure&amp;severity=medium&amp;id=68359cde5d5f0974d01fda5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-fake-vpn-and-browser-nsis-installers-t-63c9fdd8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20Fake%20VPN%20and%20Browser%20NSIS%20Installers%20to%20Deliver%20Winos%204.0%20Malware&amp;severity=medium&amp;id=68359cde5d5f0974d01fda5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5155-sql-injection-in-qianfox-foxcms-282589</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5155%3A%20SQL%20Injection%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=6833715c0acd01a249282589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5154-cleartext-storage-in-a-file-or-on-disk-in-phonepe-app-282258</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5154%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20PhonePe%20App&amp;severity=medium&amp;id=683363650acd01a249282258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5153-cross-site-scripting-in-cms-made-simple-281f89</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5153%3A%20Cross%20Site%20Scripting%20in%20CMS%20Made%20Simple&amp;severity=medium&amp;id=6833553e0acd01a249281f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5152-sql-injection-in-chanjet-crm-281cf8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5152%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=68334e470acd01a249281cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5151-code-injection-in-defog-ai-introspect-281bc3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5151%3A%20Code%20Injection%20in%20defog-ai%20introspect&amp;severity=medium&amp;id=683347550acd01a249281bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5150-improperly-controlled-modification-of-object-prototype-attributes-prototype-pollution-in-docarray-281766</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5150%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20docarray&amp;severity=medium&amp;id=683332320acd01a249281766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5149-improper-authentication-in-wcms-281283</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5149%3A%20Improper%20Authentication%20in%20WCMS&amp;severity=medium&amp;id=683319800acd01a249281283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5148-deserialization-in-funaudiollm-inspiremusic-280de2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5148%3A%20Deserialization%20in%20FunAudioLLM%20InspireMusic&amp;severity=medium&amp;id=683307eb0acd01a249280de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5147-command-injection-in-netcore-nbr1005gpev2-28293a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5147%3A%20Command%20Injection%20in%20Netcore%20NBR1005GPEV2&amp;severity=medium&amp;id=683387310acd01a24928293a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5146-command-injection-in-netcore-nbr1005gpev2-27fbf0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5146%3A%20Command%20Injection%20in%20Netcore%20NBR1005GPEV2&amp;severity=medium&amp;id=6832c1b90acd01a24927fbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5145-command-injection-in-netcore-nbr1005gpev2-27f709</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5145%3A%20Command%20Injection%20in%20Netcore%20NBR1005GPEV2&amp;severity=medium&amp;id=6832ac820acd01a24927f709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badusb-attack-explained-from-principles-to-practic-51dd1a5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BadUSB%20Attack%20Explained%3A%20From%20Principles%20to%20Practice%20and%20Defense&amp;severity=medium&amp;id=68367d92182aa0cae23259b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5140-server-side-request-forgery-in-seeyon-zhiyuan-oa-web-application-system-27eddb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5140%3A%20Server-Side%20Request%20Forgery%20in%20Seeyon%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=medium&amp;id=683277bd0acd01a24927eddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5139-command-injection-in-qualitor-27ecca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5139%3A%20Command%20Injection%20in%20Qualitor&amp;severity=medium&amp;id=683270c20acd01a24927ecca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5138-cross-site-scripting-in-bitwarden-27eb8f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5138%3A%20Cross%20Site%20Scripting%20in%20Bitwarden&amp;severity=medium&amp;id=683269b10acd01a24927eb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5137-code-injection-in-dedecms-27e8fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5137%3A%20Code%20Injection%20in%20DedeCMS&amp;severity=medium&amp;id=68325f620acd01a24927e8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-202415-unauthenticated-desktop-screenshot--88013390</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%202024.15%20-%20Unauthenticated%20Desktop%20Screenshot%20Capture&amp;severity=medium&amp;id=68489dc07e6d765d51d531e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-server-2016-win32k-elevation-of--ebf2484c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%20Server%202016%20-%20Win32k%20Elevation%20of%20Privilege&amp;severity=high&amp;id=68489db97e6d765d51d530f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-user-registration-membership-plugin-412--744eab9c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20User%20Registration%20%26%20Membership%20Plugin%204.1.2%20-%20Authentication%20Bypass&amp;severity=medium&amp;id=68489daf7e6d765d51d52f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grandstream-gsd3710-101113-stack-buffer-overflow-bc9dc2ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grandstream%20GSD3710%201.0.11.13%20-%20Stack%20Buffer%20Overflow&amp;severity=medium&amp;id=68489da97e6d765d51d52e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/java-springboot-codebase-11-arbitrary-file-read-db0cdc9b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Java-springboot-codebase%201.1%20-%20Arbitrary%20File%20Read&amp;severity=medium&amp;id=68489da37e6d765d51d52dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abb-cylon-aspect-30803-guest2root-privilege-escala-78d1976d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ABB%20Cylon%20Aspect%203.08.03%20-%20Guest2Root%20Privilege%20Escalation&amp;severity=high&amp;id=68489d9d7e6d765d51d52cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abb-cylon-aspect-studio-30803-binary-planting-3a972e0d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ABB%20Cylon%20Aspect%20Studio%203.08.03%20-%20Binary%20Planting&amp;severity=medium&amp;id=68489d977e6d765d51d52bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5136-insufficiently-random-values-in-tmall-demo-27e7fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5136%3A%20Insufficiently%20Random%20Values%20in%20Tmall%20Demo&amp;severity=low&amp;id=683258450acd01a24927e7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5135-cross-site-scripting-in-tmall-demo-28293f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5135%3A%20Cross%20Site%20Scripting%20in%20Tmall%20Demo&amp;severity=low&amp;id=683387310acd01a24928293f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5134-cross-site-scripting-in-tmall-demo-27e3e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5134%3A%20Cross%20Site%20Scripting%20in%20Tmall%20Demo&amp;severity=low&amp;id=683243390acd01a24927e3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5133-cross-site-scripting-in-tmall-demo-27e2d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5133%3A%20Cross%20Site%20Scripting%20in%20Tmall%20Demo&amp;severity=low&amp;id=68323bf80acd01a24927e2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5132-cross-site-request-forgery-in-tmall-demo-27e1c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5132%3A%20Cross-Site%20Request%20Forgery%20in%20Tmall%20Demo&amp;severity=low&amp;id=683238790acd01a24927e1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5131-unrestricted-upload-in-tmall-demo-27e1ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5131%3A%20Unrestricted%20Upload%20in%20Tmall%20Demo&amp;severity=low&amp;id=683238790acd01a24927e1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5130-unrestricted-upload-in-tmall-demo-27e1cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5130%3A%20Unrestricted%20Upload%20in%20Tmall%20Demo&amp;severity=low&amp;id=683238790acd01a24927e1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5129-uncontrolled-search-path-in-sangfor-atrust-27d521</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5129%3A%20Uncontrolled%20Search%20Path%20in%20Sangfor%20%E9%9B%B6%E4%BF%A1%E4%BB%BB%E8%AE%BF%E9%97%AE%E6%8E%A7%E5%88%B6%E7%B3%BB%E7%BB%9F%20aTrust&amp;severity=high&amp;id=6831f5b00acd01a24927d521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5128-sql-injection-in-scriptandtools-real-estate-website-in-php-27d458</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5128%3A%20SQL%20Injection%20in%20ScriptAndTools%20Real-Estate-website-in-PHP&amp;severity=medium&amp;id=6831eec40acd01a24927d458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5127-cross-site-scripting-in-flir-ax8-27d322</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5127%3A%20Cross%20Site%20Scripting%20in%20Teledyne%20FLIR%20AX8&amp;severity=medium&amp;id=6831eb200acd01a24927d322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5126-command-injection-in-flir-ax8-27cffa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5126%3A%20Command%20Injection%20in%20Teledyne%20FLIR%20AX8&amp;severity=high&amp;id=6831e0a60acd01a24927cffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xss-flaw-actively-exploited-in-zimbra-collaboratio-26fb3615</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XSS%20Flaw%20Actively%20Exploited%20in%20Zimbra%20Collaboration%20Suite%2C%20Over%20129%2C000%20Servers%20at%20Risk&amp;severity=medium&amp;id=68367d52182aa0cae232598b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5124-use-of-default-credentials-in-sony-snc-m1-27cd2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5124%3A%20Use%20of%20Default%20Credentials%20in%20Sony%20SNC-M1&amp;severity=critical&amp;id=6831c8040acd01a24927cd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4223-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-softaculous-page-builder-pagelayer-drag-and-drop-website-builder-279f7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4223%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=68314cf70acd01a249279f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/creating-custom-upi-vpa-by-bypassing-protecttai-in-ffd1a391</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Creating%20Custom%20UPI%20VPA%20by%20bypassing%20Protectt.AI%20in%20ICICI&apos;s%20banking%20app&amp;severity=medium&amp;id=68367d93182aa0cae23259ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5058-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-emagicone-emagicone-store-manager-for-woocommerce-277dc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5058%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20emagicone%20eMagicOne%20Store%20Manager%20for%20WooCommerce&amp;severity=critical&amp;id=683142850acd01a249277dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4336-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-emagicone-emagicone-store-manager-for-woocommerce-277dbe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4336%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20emagicone%20eMagicOne%20Store%20Manager%20for%20WooCommerce&amp;severity=high&amp;id=683142850acd01a249277dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4603-cwe-73-external-control-of-file-name-or-path-in-emagicone-emagicone-store-manager-for-woocommerce-277dc2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4603%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20emagicone%20eMagicOne%20Store%20Manager%20for%20WooCommerce&amp;severity=critical&amp;id=683142850acd01a249277dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4602-cwe-73-external-control-of-file-name-or-path-in-emagicone-emagicone-store-manager-for-woocommerce-277dc0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4602%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20emagicone%20eMagicOne%20Store%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=683142850acd01a249277dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5055-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-edgarrojas-smart-forms-when-you-need-more-than-just-a-contact-form-277b5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edgarrojas%20Smart%20Forms%20%E2%80%93%20when%20you%20need%20more%20than%20just%20a%20contact%20form&amp;severity=medium&amp;id=6831346e0acd01a249277b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3869-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-4stats-4stats-277b4c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%204stats%204stats&amp;severity=medium&amp;id=6831346e0acd01a249277b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13427-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-softaculous-page-builder-pagelayer-drag-and-drop-website-builder-277a28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=68312d5d0acd01a249277a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48756-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-maboroshinokiseki-scsir-277b58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48756%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20maboroshinokiseki%20scsir&amp;severity=low&amp;id=6831346e0acd01a249277b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48755-cwe-762-mismatched-memory-management-routines-in-blyssprivacy-sdk-277b56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48755%3A%20CWE-762%20Mismatched%20Memory%20Management%20Routines%20in%20blyssprivacy%20sdk&amp;severity=low&amp;id=6831346e0acd01a249277b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48754-cwe-369-divide-by-zero-in-fractalfir-memory-pages-277b54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48754%3A%20CWE-369%20Divide%20By%20Zero%20in%20FractalFir%20memory_pages&amp;severity=low&amp;id=6831346e0acd01a249277b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48753-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-obsidiandynamics-anode-277b52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48753%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20obsidiandynamics%20anode&amp;severity=low&amp;id=6831346e0acd01a249277b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48752-cwe-416-use-after-free-in-forestryks-process-sync-rs-277b50</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48752%3A%20CWE-416%20Use%20After%20Free%20in%20Forestryks%20process-sync-rs&amp;severity=low&amp;id=6831346e0acd01a249277b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48751-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-tickbh-processlock-277b4e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48751%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20tickbh%20ProcessLock&amp;severity=low&amp;id=6831346e0acd01a249277b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-badsuccessor-attack-exploits-windows-server-20-9ff1312d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20BadSuccessor%20Attack%20Exploits%20Windows%20Server%202025%20Flaw%20for%20Full%20Active%20Directory%20Takeover&amp;severity=medium&amp;id=68367d52182aa0cae232598f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5119-sql-injection-in-emlog-pro-275741</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5119%3A%20SQL%20Injection%20in%20Emlog%20Pro&amp;severity=medium&amp;id=6830e3930acd01a249275741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/case-of-larva-25004-group-related-to-kimsuky-exploiting-additional-certificate-malware-signed-with-nexaweb-certificate-2758c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Case%20of%20Larva-25004%20Group%20(Related%20to%20Kimsuky)%20Exploiting%20Additional%20Certificate%20-%20Malware%20Signed%20with%20Nexaweb%20Certificate&amp;severity=medium&amp;id=6830ee060acd01a2492758c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/danabot-analyzing-a-fallen-empire-2758ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Danabot%3A%20Analyzing%20a%20fallen%20empire&amp;severity=medium&amp;id=6830ee060acd01a2492758ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connectwise-screenconnect-tops-list-of-abused-rats-c50c97b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ConnectWise%20ScreenConnect%20Tops%20List%20of%20Abused%20RATs%20in%202025%20Attacks&amp;severity=medium&amp;id=68367d52182aa0cae2325991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-danabot-s-infrastructure-in-support-of-operation-endgame-ii-27526c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20DanaBot&apos;s%20Infrastructure%3A%20In%20Support%20of%20Operation%20Endgame%20II&amp;severity=medium&amp;id=6830c74b0acd01a24927526c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse-275258</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ViciousTrap%20-%20Infiltrate%2C%20Control%2C%20Lure%3A%20Turning%20edge%20devices%20into%20honeypots%20en%20masse.&amp;severity=medium&amp;id=6830c74b0acd01a249275258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-takes-down-danabot-malware-neutr-ee8734cb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Endgame%20Takes%20Down%20DanaBot%20Malware%2C%20Neutralizes%20300%20Servers&amp;severity=medium&amp;id=68367d52182aa0cae2325995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24917-cwe-284-improper-access-control-in-tenable-network-monitor-2740ad</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24917%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tenable%20Network%20Monitor&amp;severity=high&amp;id=68309d5f0acd01a2492740ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24916-cwe-284-improper-access-control-in-tenable-network-monitor-274022</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24916%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tenable%20Network%20Monitor&amp;severity=high&amp;id=683099ad0acd01a249274022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48375-cwe-770-allocation-of-resources-without-limits-or-throttling-in-schule111-schule-274024</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48375%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20schule111%20Schule&amp;severity=medium&amp;id=683099ad0acd01a249274024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48377-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dnnsoftware-dnn-platform-27402a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48377%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=683099ad0acd01a24927402a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48378-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dnnsoftware-dnn-platform-27402c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48378%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=683099ad0acd01a24927402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48376-cwe-841-improper-enforcement-of-behavioral-workflow-in-dnnsoftware-dnn-platform-274028</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48376%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20dnnsoftware%20Dnn.Platform&amp;severity=low&amp;id=683099ad0acd01a249274028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43860-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-openemr-openemr-274026</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43860%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openemr%20openemr&amp;severity=high&amp;id=683099ad0acd01a249274026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32967-cwe-778-insufficient-logging-in-openemr-openemr-273fad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32967%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20openemr%20openemr&amp;severity=medium&amp;id=6830962c0acd01a249273fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32794-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-openemr-openemr-273fb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32794%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openemr%20openemr&amp;severity=high&amp;id=6830962c0acd01a249273fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31812-cwe-125-out-of-bounds-read-in-siemens-sipass-integrated-273f3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SiPass%20integrated&amp;severity=high&amp;id=683092a10acd01a249273f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31807-cwe-347-improper-verification-of-cryptographic-signature-in-siemens-sipass-integrated-ac5102-acc-g2-273f39</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31807%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Siemens%20SiPass%20integrated%20AC5102%20(ACC-G2)&amp;severity=medium&amp;id=683092a10acd01a249273f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-25110-cwe-1333-inefficient-regular-expression-complexity-273ca0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-25110%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity&amp;severity=medium&amp;id=68308f330acd01a249273ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5114-deserialization-in-easysoft-zentaopms-273bae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5114%3A%20Deserialization%20in%20easysoft%20zentaopms&amp;severity=medium&amp;id=683088120acd01a249273bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5112-buffer-overflow-in-freefloat-ftp-server-2738de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5112%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6830811c0acd01a2492738de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5111-buffer-overflow-in-freefloat-ftp-server-2738dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5111%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6830811c0acd01a2492738dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3580-cwe-284-in-grafana-grafana-2726cf</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3580%3A%20CWE-284%20in%20Grafana%20Grafana&amp;severity=medium&amp;id=68307d900acd01a2492726cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-campaign-dbatloader-delivers-remcos-via-u-0d0967be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Campaign%3A%20DBatLoader%20Delivers%20Remcos%20via%20UAC%20Bypass&amp;severity=medium&amp;id=68367d52182aa0cae2325997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dont-call-that-protected-method-dissecting-an-n-da-a9679385</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Don&apos;t%20Call%20That%20%22Protected%22%20Method%3A%20Dissecting%20an%20N-Day%20vBulletin%20RCE&amp;severity=medium&amp;id=68367d92182aa0cae23259ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5110-buffer-overflow-in-freefloat-ftp-server-272663</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5110%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=68307a070acd01a249272663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5109-buffer-overflow-in-freefloat-ftp-server-272558</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5109%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683072f40acd01a249272558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31049-cwe-502-deserialization-of-untrusted-data-in-themeton-dash-27231c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31049%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20Dash&amp;severity=critical&amp;id=68306f8d0acd01a24927231c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31053-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-quantumcloud-kbx-pro-ultimate-27231e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31053%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20quantumcloud%20KBx%20Pro%20Ultimate&amp;severity=null&amp;id=68306f8d0acd01a24927231e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31056-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-techspawn-whatscart-whatsapp-abandoned-cart-recovery-order-notifications-chat-box-otp-for-woocommerce-272320</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31056%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Techspawn%20WhatsCart%20-%20Whatsapp%20Abandoned%20Cart%20Recovery%2C%20Order%20Notifications%2C%20Chat%20Box%2C%20OTP%20for%20WooCommerce&amp;severity=null&amp;id=68306f8d0acd01a249272320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31060-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-apustheme-capie-272322</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Capie&amp;severity=null&amp;id=68306f8d0acd01a249272322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31064-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-gavias-vizeon-business-consulting-272324</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Vizeon%20-%20Business%20Consulting&amp;severity=null&amp;id=68306f8d0acd01a249272324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31069-cwe-502-deserialization-of-untrusted-data-in-themeton-hotstar-multi-purpose-business-theme-272326</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31069%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20HotStar%20%E2%80%93%20Multi-Purpose%20Business%20Theme&amp;severity=critical&amp;id=68306f8d0acd01a249272326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31397-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-smartcms-bus-ticket-booking-with-seat-reservation-for-woocommerce-272328</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31397%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartcms%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a249272328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31423-cwe-502-deserialization-of-untrusted-data-in-ancorathemes-umberto-27232a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31423%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Umberto&amp;severity=null&amp;id=68306f8e0acd01a24927232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31430-cwe-502-deserialization-of-untrusted-data-in-themeton-the-business-272337</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31430%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20The%20Business&amp;severity=critical&amp;id=68306f8e0acd01a249272337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31631-cwe-502-deserialization-of-untrusted-data-in-ancorathemes-fish-house-272339</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31631%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Fish%20House&amp;severity=null&amp;id=68306f8e0acd01a249272339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31632-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-spyropress-la-boom-27233b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31632%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SpyroPress%20La%20Boom&amp;severity=high&amp;id=68306f8e0acd01a24927233b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31633-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-gavias-kiamo-responsive-business-service-wordpress-theme-27233d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31633%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Kiamo%20-%20Responsive%20Business%20Service%20WordPress%20Theme&amp;severity=high&amp;id=68306f8e0acd01a24927233d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31636-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-saurabhsharma-wp-post-modules-for-elementor-27233f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SaurabhSharma%20WP%20Post%20Modules%20for%20Elementor&amp;severity=null&amp;id=68306f8e0acd01a24927233f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31912-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-gavias-enzio-responsive-business-wordpress-theme-272341</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31912%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Enzio%20-%20Responsive%20Business%20WordPress%20Theme&amp;severity=null&amp;id=68306f8e0acd01a249272341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31913-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-apustheme-ogami-272343</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31913%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Ogami&amp;severity=null&amp;id=68306f8e0acd01a249272343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31914-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-kamleshyadav-pixel-wordpress-form-builderplugin-autoresponder-272345</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31914%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20Pixel%20WordPress%20Form%20BuilderPlugin%20%26%20Autoresponder&amp;severity=null&amp;id=68306f8e0acd01a249272345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31916-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-joy2012bd-jp-students-result-management-system-premium-272347</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31916%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20joy2012bd%20JP%20Students%20Result%20Management%20System%20Premium&amp;severity=low&amp;id=68306f8e0acd01a249272347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31918-cwe-266-incorrect-privilege-assignment-in-quantumcloud-simple-business-directory-pro-272349</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31918%3A%20Incorrect%20Privilege%20Assignment%20in%20quantumcloud%20Simple%20Business%20Directory%20Pro&amp;severity=null&amp;id=68306f8e0acd01a249272349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31924-cwe-502-deserialization-of-untrusted-data-in-designthemes-crafts-arts-272356</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31924%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Crafts%20%26%20Arts&amp;severity=null&amp;id=68306f8e0acd01a249272356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31927-cwe-502-deserialization-of-untrusted-data-in-themeton-acerola-272358</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31927%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20Acerola&amp;severity=critical&amp;id=68306f8e0acd01a249272358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32284-cwe-502-deserialization-of-untrusted-data-in-designthemes-pet-world-27235a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32284%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Pet%20World&amp;severity=null&amp;id=68306f8e0acd01a24927235a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32285-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apustheme-butcher-27235c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32285%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ApusTheme%20Butcher&amp;severity=null&amp;id=68306f8e0acd01a24927235c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32286-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-apustheme-butcher-27235e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32286%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Butcher&amp;severity=null&amp;id=68306f8e0acd01a24927235e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32289-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-apustheme-yozi-272360</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32289%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Yozi&amp;severity=null&amp;id=68306f8e0acd01a249272360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32292-cwe-502-deserialization-of-untrusted-data-in-ancorathemes-jarvis-night-club-concert-festival-wordpress-272362</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32292%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Jarvis%20%E2%80%93%20Night%20Club%2C%20Concert%2C%20Festival%20WordPress&amp;severity=null&amp;id=68306f8e0acd01a249272362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32293-cwe-502-deserialization-of-untrusted-data-in-designthemes-finance-consultant-272364</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32293%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Finance%20Consultant&amp;severity=null&amp;id=68306f8e0acd01a249272364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32294-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-gavias-oxpitan-272366</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32294%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Oxpitan&amp;severity=null&amp;id=68306f8e0acd01a249272366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32302-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-gavias-winnex-272368</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32302%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Winnex&amp;severity=null&amp;id=68306f8e0acd01a249272368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32309-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-thememove-healsoul-272375</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32309%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Healsoul&amp;severity=null&amp;id=68306f8e0acd01a249272375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39480-cwe-502-deserialization-of-untrusted-data-in-thememakers-car-dealer-272377</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39480%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeMakers%20Car%20Dealer&amp;severity=null&amp;id=68306f8e0acd01a249272377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39485-cwe-502-deserialization-of-untrusted-data-in-themegoods-grand-tour-travel-agency-wordpress-272379</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39485%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Tour&amp;severity=null&amp;id=68306f8e0acd01a249272379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39489-cwe-266-incorrect-privilege-assignment-in-pebas-couponxl-27237b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39489%3A%20Incorrect%20Privilege%20Assignment%20in%20pebas%20CouponXL&amp;severity=null&amp;id=68306f8e0acd01a24927237b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39490-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-mikado-themes-backpack-traveler-27237d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39490%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Backpack%20Traveler&amp;severity=null&amp;id=68306f8e0acd01a24927237d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39494-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-mikado-themes-wilm-r-27237f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39494%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wilm%C3%ABr&amp;severity=null&amp;id=68306f8e0acd01a24927237f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39495-cwe-502-deserialization-of-untrusted-data-in-boldthemes-avantage-272381</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39495%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Avantage&amp;severity=null&amp;id=68306f8e0acd01a249272381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39499-cwe-502-deserialization-of-untrusted-data-in-boldthemes-medicare-272383</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39499%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Medicare&amp;severity=null&amp;id=68306f8e0acd01a249272383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39500-cwe-502-deserialization-of-untrusted-data-in-goodlayers-goodlayers-hostel-272385</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39500%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GoodLayers%20Goodlayers%20Hostel&amp;severity=null&amp;id=68306f8e0acd01a249272385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39501-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-goodlayers-goodlayers-hostel-272387</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39501%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20GoodLayers%20Goodlayers%20Hostel&amp;severity=null&amp;id=68306f8e0acd01a249272387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39502-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-goodlayers-goodlayers-hostel-272394</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39502%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Goodlayers%20Hostel&amp;severity=null&amp;id=68306f8e0acd01a249272394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39503-cwe-502-deserialization-of-untrusted-data-in-goodlayers-goodlayers-hotel-272396</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39503%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GoodLayers%20Goodlayers%20Hotel&amp;severity=null&amp;id=68306f8e0acd01a249272396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39504-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-goodlayers-goodlayers-hotel-272398</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39504%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20GoodLayers%20Goodlayers%20Hotel&amp;severity=null&amp;id=68306f8e0acd01a249272398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39505-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-goodlayers-goodlayers-hotel-27239a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39505%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Goodlayers%20Hotel&amp;severity=null&amp;id=68306f8e0acd01a24927239a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39506-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-nasatheme-nasa-core-27239c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39506%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NasaTheme%20Nasa%20Core&amp;severity=null&amp;id=68306f8e0acd01a24927239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39536-cwe-862-missing-authorization-in-chimpstudio-jobhunt-job-alerts-27239e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39536%3A%20CWE-862%20Missing%20Authorization%20in%20Chimpstudio%20JobHunt%20Job%20Alerts&amp;severity=high&amp;id=68306f8e0acd01a24927239e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46437-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tayoricom-tayori-form-2723b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tayoricom%20Tayori%20Form&amp;severity=null&amp;id=68306f8e0acd01a2492723b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46440-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mark-kstats-reloaded-2723b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20kStats%20Reloaded&amp;severity=null&amp;id=68306f8e0acd01a2492723b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46444-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-scripteo-ads-pro-plugin-2723b7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46444%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20scripteo%20Ads%20Pro&amp;severity=null&amp;id=68306f8e0acd01a2492723b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46446-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ivanrojas-libro-de-reclamaciones-2723b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46446%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivanrojas%20Libro%20de%20Reclamaciones&amp;severity=null&amp;id=68306f8e0acd01a2492723b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46448-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-reifsnyderb-document-management-system-2723bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reifsnyderb%20Document%20Management%20System&amp;severity=null&amp;id=68306f8e0acd01a2492723bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46454-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-svil4ok-meta-keywords-amp-description-2723bd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46454%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20svil4ok%20Meta%20Keywords%20%26amp%3B%20Description&amp;severity=null&amp;id=68306f8e0acd01a2492723bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46455-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-indigothemes-wp-hrm-lite-2723bf</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46455%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IndigoThemes%20WP%20HRM%20LITE&amp;severity=null&amp;id=68306f8e0acd01a2492723bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46456-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jason-theme-blvd-sliders-2723c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46456%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jason%20Theme%20Blvd%20Sliders&amp;severity=null&amp;id=68306f8e0acd01a2492723c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46458-cwe-352-cross-site-request-forgery-csrf-in-x000x-occupancyplan-2723c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46458%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20x000x%20occupancyplan&amp;severity=null&amp;id=68306f8e0acd01a2492723c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46460-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-detheme-easy-guide-2723c5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46460%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Detheme%20Easy%20Guide&amp;severity=null&amp;id=68306f8e0acd01a2492723c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46463-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-yamna-khawaja-mailing-group-listserv-2723d2</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46463%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yamna%20Khawaja%20Mailing%20Group%20Listserv&amp;severity=null&amp;id=68306f8e0acd01a2492723d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46468-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-wpfable-fable-extra-2723d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46468%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WPFable%20Fable%20Extra&amp;severity=null&amp;id=68306f8e0acd01a2492723d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46474-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-seur-oficial-seur-oficial-2723d6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46474%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SEUR%20OFICIAL%20SEUR%20Oficial&amp;severity=high&amp;id=68306f8e0acd01a2492723d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46486-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-totalprocessing-nomupay-payment-processing-gateway-2723d8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46486%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20totalprocessing%20Nomupay%20Payment%20Processing%20Gateway&amp;severity=null&amp;id=68306f8e0acd01a2492723d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46487-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sftranna-ec-authorize-net-2723da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46487%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sftranna%20EC%20Authorize.net&amp;severity=null&amp;id=68306f8e0acd01a2492723da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46488-cwe-862-missing-authorization-in-dastan800-visual-builder-2723dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46488%3A%20Missing%20Authorization%20in%20dastan800%20Visual%20Builder&amp;severity=null&amp;id=68306f8e0acd01a2492723dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46490-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-wordwebsoftware-crossword-compiler-puzzles-2723de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46490%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wordwebsoftware%20Crossword%20Compiler%20Puzzles&amp;severity=null&amp;id=68306f8e0acd01a2492723de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46493-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wordwebsoftware-crossword-compiler-puzzles-2723e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordwebsoftware%20Crossword%20Compiler%20Puzzles&amp;severity=null&amp;id=68306f8e0acd01a2492723e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46515-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-m-a-vinoth-kumar-category-widget-2723e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M%20A%20Vinoth%20Kumar%20Category%20Widget&amp;severity=null&amp;id=68306f8e0acd01a2492723e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46518-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-phpaddicted-igit-related-posts-with-thumb-image-after-posts-2723e4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phpaddicted%20IGIT%20Related%20Posts%20With%20Thumb%20Image%20After%20Posts&amp;severity=null&amp;id=68306f8e0acd01a2492723e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46526-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-janekniefeldt-my-custom-widgets-2723f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20janekniefeldt%20My%20Custom%20Widgets&amp;severity=null&amp;id=68306f8e0acd01a2492723f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46527-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-likecoin-web3press-2723f3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46527%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LikeCoin%20Web3Press&amp;severity=null&amp;id=68306f8e0acd01a2492723f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46537-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ctltwp-section-widget-2723f5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ctltwp%20Section%20Widget&amp;severity=null&amp;id=68306f8e0acd01a2492723f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46539-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-wpfable-fable-extra-2723f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46539%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFable%20Fable%20Extra&amp;severity=null&amp;id=68306f8e0acd01a2492723f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47438-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-wpjobportal-wp-job-portal-2723f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47438%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=68306f8e0acd01a2492723f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47453-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-xylus-themes-wp-smart-import-2723fb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47453%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Xylus%20Themes%20WP%20Smart%20Import&amp;severity=null&amp;id=68306f8e0acd01a2492723fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47458-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-b2itech-b2i-investor-tools-2723fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47458%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20B2itech%20B2i%20Investor%20Tools&amp;severity=null&amp;id=68306f8e0acd01a2492723fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47461-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-mediaticus-subaccounts-for-woocommerce-2723ff</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47461%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20mediaticus%20Subaccounts%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a2492723ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47478-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-metagauss-profilegrid-272401</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47478%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=68306f8e0acd01a249272401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47492-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-add-ons-org-drag-and-drop-file-upload-for-elementor-forms-272403</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47492%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20add-ons.org%20Drag%20and%20Drop%20File%20Upload%20for%20Elementor%20Forms&amp;severity=null&amp;id=68306f8e0acd01a249272403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47512-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-tainacan-tainacan-272410</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47512%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tainacan%20Tainacan&amp;severity=high&amp;id=68306f8e0acd01a249272410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47513-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-james-laforge-infocob-crm-forms-272412</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47513%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20James%20Laforge%20Infocob%20CRM%20Forms&amp;severity=null&amp;id=68306f8e0acd01a249272412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47529-cwe-862-missing-authorization-in-ux-design-experts-experto-cta-widget-8211-call-to-action-sticky-cta-floating-button-plugin-272414</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47529%3A%20Missing%20Authorization%20in%20UX%20Design%20Experts%20Experto%20CTA%20Widget%20%26%238211%3B%20Call%20To%20Action%2C%20Sticky%20CTA%2C%20Floating%20Button%20Plugin&amp;severity=null&amp;id=68306f8e0acd01a249272414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47530-cwe-502-deserialization-of-untrusted-data-in-wpfunnels-wpfunnels-272416</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47530%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WPFunnels%20WPFunnels&amp;severity=critical&amp;id=68306f8e0acd01a249272416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47532-cwe-502-deserialization-of-untrusted-data-in-coinpayments-coinpayments-net-payment-gateway-for-woocommerce-272418</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47532%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CoinPayments%20CoinPayments.net%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a249272418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47535-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-wpopal-opal-woo-custom-product-variation-27241a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47535%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpopal%20Opal%20Woo%20Custom%20Product%20Variation&amp;severity=null&amp;id=68306f8e0acd01a24927241a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47539-cwe-266-incorrect-privilege-assignment-in-themewinter-eventin-27241c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47539%3A%20Incorrect%20Privilege%20Assignment%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=68306f8e0acd01a24927241c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47541-cwe-201-insertion-of-sensitive-information-into-sent-data-in-wpfunnels-mail-mint-27241e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47541%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPFunnels%20Mail%20Mint&amp;severity=null&amp;id=68306f8e0acd01a24927241e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47558-cwe-862-missing-authorization-in-romancode-mapsvg-272420</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47558%3A%20Missing%20Authorization%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=68306f8e0acd01a249272420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47568-cwe-502-deserialization-of-untrusted-data-in-zoomit-zoomsounds-272422</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47568%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ZoomIt%20ZoomSounds&amp;severity=null&amp;id=68306f8e0acd01a249272422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47575-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-school-management-27242f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47575%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20School%20Management&amp;severity=high&amp;id=68306f8e0acd01a24927242f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47599-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-facturante-facturante-272431</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47599%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20facturante%20Facturante&amp;severity=critical&amp;id=68306f8e0acd01a249272431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47603-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-belingo-belingogeo-272433</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47603%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Belingo%20belingoGeo&amp;severity=null&amp;id=68306f8e0acd01a249272433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47611-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-khaled-user-meta-272435</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47611%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Khaled%20User%20Meta&amp;severity=null&amp;id=68306f8e0acd01a249272435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47613-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mojoomla-school-management-272437</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojoomla%20School%20Management&amp;severity=high&amp;id=68306f8e0acd01a249272437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47618-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mortgage-calculator-bmi-adult-kid-calculator-272439</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47618%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mortgage%20Calculator%20BMI%20Adult%20%26%20Kid%20Calculator&amp;severity=null&amp;id=68306f8e0acd01a249272439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47619-cwe-862-missing-authorization-in-6storage-6storage-rentals-27243b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47619%3A%20Missing%20Authorization%20in%206Storage%206Storage%20Rentals&amp;severity=null&amp;id=68306f8e0acd01a24927243b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47631-cwe-266-incorrect-privilege-assignment-in-mojoomla-hospital-management-system-27243d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47631%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=high&amp;id=68306f8e0acd01a24927243d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47637-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-staggs-staggs-27243f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47637%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20STAGGS%20STAGGS&amp;severity=critical&amp;id=68306f8e0acd01a24927243f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47640-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-printcart-printcart-web-to-print-product-designer-for-woocommerce-272441</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47640%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20printcart%20Printcart%20Web%20to%20Print%20Product%20Designer%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a249272441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47641-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-printcart-printcart-web-to-print-product-designer-for-woocommerce-27244e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47641%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20printcart%20Printcart%20Web%20to%20Print%20Product%20Designer%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a24927244e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47642-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-ajar-productions-ajar-in5-embed-272450</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47642%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ajar%20Productions%20Ajar%20in5%20Embed&amp;severity=null&amp;id=68306f8e0acd01a249272450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47646-cwe-640-weak-password-recovery-mechanism-for-forgotten-password-in-gilblas-ngunte-possi-psw-front-end-login-amp-registration-272452</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47646%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Gilblas%20Ngunte%20Possi%20PSW%20Front-end%20Login%20%26amp%3B%20Registration&amp;severity=null&amp;id=68306f8e0acd01a249272452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47658-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-elextensions-elex-wordpress-helpdesk-customer-ticketing-system-272454</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47658%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ELEXtensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=null&amp;id=68306f8e0acd01a249272454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47660-cwe-502-deserialization-of-untrusted-data-in-codexpert-inc-wc-affiliate-272456</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47660%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Codexpert%2C%20Inc%20WC%20Affiliate&amp;severity=null&amp;id=68306f8e0acd01a249272456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47663-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-mojoomla-hospital-management-system-272458</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47663%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=critical&amp;id=68306f8e0acd01a249272458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47670-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-miniorange-wordpress-social-login-and-register-27245a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47670%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20miniOrange%20WordPress%20Social%20Login%20and%20Register&amp;severity=null&amp;id=68306f8e0acd01a24927245a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47671-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-letscms-mlm-software-binary-mlm-plan-27245c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47671%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LETSCMS%20MLM%20Software%20Binary%20MLM%20Plan&amp;severity=null&amp;id=68306f8e0acd01a24927245c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47672-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-miniorange-miniorange-discord-integration-27245e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47672%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20miniOrange%20miniOrange%20Discord%20Integration&amp;severity=null&amp;id=68306f8e0acd01a24927245e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47673-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tychesoftwares-arconix-shortcodes-272460</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47673%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=null&amp;id=68306f8e0acd01a249272460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47678-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-funnelcockpit-funnelcockpit-27246d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47678%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FunnelCockpit%20FunnelCockpit&amp;severity=high&amp;id=68306f8e0acd01a24927246d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47680-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-michel-xiligroup-dev-xili-tidy-tags-27246f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47680%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-tidy-tags&amp;severity=null&amp;id=68306f8e0acd01a24927246f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47687-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-storekeeper-b-v-storekeeper-for-woocommerce-272471</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47687%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StoreKeeper%20B.V.%20StoreKeeper%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a249272471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47690-cwe-862-missing-authorization-in-smackcoders-lead-form-data-collection-to-crm-272473</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47690%3A%20Missing%20Authorization%20in%20Smackcoders%20Inc.%2C%20Lead%20Form%20Data%20Collection%20to%20CRM&amp;severity=null&amp;id=68306f8e0acd01a249272473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48241-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-soft8soft-llc-verge3d-272475</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48241%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soft8Soft%20LLC%20Verge3D&amp;severity=null&amp;id=68306f8e0acd01a249272475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48245-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-fullworks-quick-contact-form-272477</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20Quick%20Contact%20Form&amp;severity=null&amp;id=68306f8e0acd01a249272477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48271-cwe-862-missing-authorization-in-leadinfo-leadinfo-272479</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48271%3A%20CWE-862%20Missing%20Authorization%20in%20Leadinfo%20Leadinfo&amp;severity=medium&amp;id=68306f8e0acd01a249272479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48273-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-wpjobportal-wp-job-portal-27247b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48273%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=68306f8e0acd01a24927247b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48275-cwe-862-missing-authorization-in-dastan800-visual-header-27247d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48275%3A%20Missing%20Authorization%20in%20dastan800%20Visual%20Header&amp;severity=null&amp;id=68306f8e0acd01a24927247d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48283-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-majestic-support-majestic-support-27247f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48283%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Majestic%20Support%20Majestic%20Support&amp;severity=critical&amp;id=68306f8e0acd01a24927247f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48286-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-catkin-redi-restaurant-reservation-272489</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48286%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catkin%20ReDi%20Restaurant%20Reservation&amp;severity=null&amp;id=68306f8e0acd01a249272489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48287-cwe-502-deserialization-of-untrusted-data-in-pagaleve-pix-4x-sem-juros-8211-pagaleve-27248b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48287%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Pagaleve%20Pix%204x%20sem%20juros%20-%20Pagaleve&amp;severity=null&amp;id=68306f8e0acd01a24927248b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48289-cwe-502-deserialization-of-untrusted-data-in-ancorathemes-kids-planet-27248d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48289%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Kids%20Planet&amp;severity=null&amp;id=68306f8e0acd01a24927248d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48292-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-goodlayers-tourmaster-27248f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48292%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20GoodLayers%20Tourmaster&amp;severity=null&amp;id=68306f8e0acd01a24927248f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41380-cwe-798-use-of-hard-coded-credentials-in-intellian-technologies-iridium-certus-700-2723a6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41380%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Intellian%20Technologies%20Iridium%20Certus%20700&amp;severity=medium&amp;id=68306f8e0acd01a2492723a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41379-cwe-20-improper-input-validation-in-intellian-technologies-iridium-certus-700-2723a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41379%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Intellian%20Technologies%20Iridium%20Certus%20700&amp;severity=medium&amp;id=68306f8e0acd01a2492723a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41378-cwe-20-improper-input-validation-in-intellian-technologies-iridium-certus-700-2723a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41378%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Intellian%20Technologies%20Iridium%20Certus%20700&amp;severity=medium&amp;id=68306f8e0acd01a2492723a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41377-cwe-20-improper-input-validation-in-intellian-technologies-iridium-certus-700-2723a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41377%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=68306f8e0acd01a2492723a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7803-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-272318</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7803%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=68306f8d0acd01a249272318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9163-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-gitlab-gitlab-27231a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9163%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20GitLab%20GitLab&amp;severity=low&amp;id=68306f8d0acd01a24927231a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5108-unrestricted-upload-in-zongzhige-shopxo-272493</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5108%3A%20Unrestricted%20Upload%20in%20zongzhige%20ShopXO&amp;severity=medium&amp;id=68306f8e0acd01a249272493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5107-sql-injection-in-fujian-kelixun-272491</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5107%3A%20SQL%20Injection%20in%20Fujian%20Kelixun&amp;severity=medium&amp;id=68306f8e0acd01a249272491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1123-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-solidwp-solid-mail-smtp-email-and-logging-made-by-solidwp-2722a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1123%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20solidwp%20Solid%20Mail%20%E2%80%93%20SMTP%20email%20and%20logging%20made%20by%20SolidWP&amp;severity=high&amp;id=68306c090acd01a2492722a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5106-os-command-injection-in-fujian-kelixun-2721d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5106%3A%20OS%20Command%20Injection%20in%20Fujian%20Kelixun&amp;severity=medium&amp;id=683065190acd01a2492721d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5105-improper-clearing-of-heap-memory-before-release-in-tozed-zlt-w51-2721d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5105%3A%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20in%20TOZED%20ZLT%20W51&amp;severity=medium&amp;id=683065190acd01a2492721d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41407-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adaudit-plus-271ebb</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41407%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=68304fd60acd01a249271ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36527-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adaudit-plus-271eb9</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36527%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=68304fd60acd01a249271eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3895-cwe-334-small-space-of-random-values-in-jan-syski-megabip-271e4c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3895%3A%20CWE-334%20Small%20Space%20of%20Random%20Values%20in%20Jan%20Syski%20MegaBIP&amp;severity=critical&amp;id=68304c460acd01a249271e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3894-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-jan-syski-megabip-271e4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Jan%20Syski%20MegaBIP&amp;severity=medium&amp;id=68304c460acd01a249271e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3893-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-jan-syski-megabip-271e48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3893%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jan%20Syski%20MegaBIP&amp;severity=high&amp;id=68304c460acd01a249271e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4379-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-studio-fabryka-dobrycms-271e4e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=medium&amp;id=68304c460acd01a249271e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-sindoor-anatomy-of-a-high-stakes-cyber-siege-272548</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Sindoor%3A%20Anatomy%20of%20a%20High-Stakes%20Cyber%20Siege&amp;severity=medium&amp;id=683072f20acd01a249272548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-2-0-272539</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Endgame%202.0&amp;severity=medium&amp;id=683072f20acd01a249272539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13945-cwe-36-absolute-path-traversal-in-abb-aspect-enterprise-271d18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13945%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=683041ba0acd01a249271d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47149-use-of-less-trusted-source-in-digital-arts-inc-i-filter-271cad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47149%3A%20Use%20of%20less%20trusted%20source%20in%20Digital%20Arts%20Inc.%20i-FILTER&amp;severity=medium&amp;id=68303e420acd01a249271cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5096-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tobiasbg-tablepress-tables-in-wordpress-made-easy-271b7f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5096%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=683033c10acd01a249271b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4594-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tournamatch-tournamatch-270c95</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4594%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tournamatch%20Tournamatch&amp;severity=medium&amp;id=682ff0f10acd01a249270c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5100-cwe-415-double-free-in-mobile-dynamix-printershare-mobile-print-27094c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5100%3A%20CWE-415%20Double%20Free%20in%20Mobile%20Dynamix%20PrinterShare%20Mobile%20Print&amp;severity=high&amp;id=682fd4b90acd01a24927094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5098-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-mobile-dynamix-printershare-mobile-print-270948</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5098%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Mobile%20Dynamix%20PrinterShare%20Mobile%20Print&amp;severity=critical&amp;id=682fd4b90acd01a249270948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5099-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-mobile-dynamix-printershare-mobile-print-27094a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5099%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Mobile%20Dynamix%20PrinterShare%20Mobile%20Print&amp;severity=critical&amp;id=682fd4b90acd01a24927094a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2394-cwe-798-use-of-hard-coded-credentials-in-ecovacs-ecovacs-mobile-and-android-application-270760</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2394%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Ecovacs%20Ecovacs%20Mobile%20and%20Android%20Application&amp;severity=medium&amp;id=682fc3a90acd01a249270760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48739-cwe-918-server-side-request-forgery-ssrf-in-strangebee-thehive-2755ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48739%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20StrangeBee%20TheHive&amp;severity=medium&amp;id=6830d8f30acd01a2492755ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48738-cwe-770-allocation-of-resources-without-limits-or-throttling-in-strangebee-thehive-2755ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48738%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20StrangeBee%20TheHive&amp;severity=medium&amp;id=6830d8f30acd01a2492755ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48741-cwe-266-incorrect-privilege-assignment-in-strangebee-thehive-2754fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48741%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20StrangeBee%20TheHive&amp;severity=medium&amp;id=6830d58c0acd01a2492754fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48740-cwe-352-cross-site-request-forgery-csrf-in-strangebee-thehive-2754fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48740%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StrangeBee%20TheHive&amp;severity=medium&amp;id=6830d58c0acd01a2492754fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48735-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-bos-ip-camera-27531d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48735%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BOS%20IP%20camera&amp;severity=medium&amp;id=6830cad90acd01a24927531d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46176-n-a-in-n-a-27512d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46176%3A%20n%2Fa&amp;severity=medium&amp;id=6830c04f0acd01a24927512d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44998-n-a-in-n-a-27512b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44998%3A%20n%2Fa&amp;severity=medium&amp;id=6830c04f0acd01a24927512b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51102-n-a-in-n-a-2750c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51102%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6830bcc50acd01a2492750c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34873-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-mobotix-p3-2743ab</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34873%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MOBOTIX%20P3&amp;severity=high&amp;id=6830b23b0acd01a2492743ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51099-n-a-in-n-a-273fb3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51099%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6830962c0acd01a249273fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48704-n-a-in-n-a-273fb1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48704%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6830962c0acd01a249273fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53154-cwe-125-out-of-bounds-read-in-cjson-project-cjson-273faf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53154%3A%20CWE-125%20Out-of-bounds%20Read%20in%20cJSON%20project%20cJSON&amp;severity=low&amp;id=6830962c0acd01a249273faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51103-n-a-in-n-a-273fab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51103%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6830962c0acd01a249273fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48702-n-a-in-n-a-273f3d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48702%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683092a10acd01a249273f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51101-n-a-in-n-a-273c9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51101%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68308f330acd01a249273c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51360-n-a-in-n-a-273c2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51360%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68308bb60acd01a249273c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51108-n-a-in-n-a-273c2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51108%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68308bb60acd01a249273c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51107-n-a-in-n-a-273c2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51107%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68308bb60acd01a249273c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48695-cwe-266-incorrect-privilege-assignment-in-cyberdava-cyberdava-271012</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48695%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20CyberDAVA%20CyberDAVA&amp;severity=medium&amp;id=682fff1b0acd01a249271012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48708-cwe-212-improper-removal-of-sensitive-information-before-storage-or-transfer-in-artifex-ghostscript-270dc0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48708%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Artifex%20Ghostscript&amp;severity=medium&amp;id=682ff7ee0acd01a249270dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48701-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-opendcim-opendcim-270c2b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48701%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20openDCIM%20openDCIM&amp;severity=medium&amp;id=682fed6f0acd01a249270c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4692-cwe-266-in-abup-abup-iot-cloud-platform-270540</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4692%3A%20CWE-266%20in%20ABUP%20ABUP%20IoT%20Cloud%20Platform&amp;severity=medium&amp;id=682fb19c0acd01a249270540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4338-cwe-611-improper-restriction-of-xml-external-entity-reference-in-lantronix-device-installer-270542</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4338%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Lantronix%20Device%20Installer&amp;severity=medium&amp;id=682fb19c0acd01a249270542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48371-cwe-285-improper-authorization-in-openfga-openfga-27040e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48371%3A%20CWE-285%3A%20Improper%20Authorization%20in%20openfga%20openfga&amp;severity=medium&amp;id=682fa72d0acd01a24927040e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coca-cola-and-bottling-partner-named-in-separate-r-f35f1518</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coca-Cola%20and%20Bottling%20Partner%20Named%20in%20Separate%20Ransomware%20and%20Data%20Breach%20Claims&amp;severity=medium&amp;id=68367d52182aa0cae2325993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47181-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-edge-chromium-based-updater-270269</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47181%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)%20Updater&amp;severity=high&amp;id=682fa3a90acd01a249270269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targets-tajikistan-new-macro-word-documents-phishing-tactics-272525</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targets%20Tajikistan%3A%20New%20Macro%20Word%20Documents%20Phishing%20Tactics&amp;severity=medium&amp;id=683072f20acd01a249272525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/caught-in-the-captcha-how-clickfix-is-weaponizing-verification-fatigue-to-deliver-rats-infostealers-27252d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Caught%20in%20the%20CAPTCHA%3A%20How%20ClickFix%20is%20Weaponizing%20Verification%20Fatigue%20to%20Deliver%20RATs%20%26%20Infostealers&amp;severity=medium&amp;id=683072f20acd01a24927252d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4975-cwe-269-improper-privilege-management-in-tp-link-systems-inc-tp-link-tapo-app-27002e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4975%3A%20CWE-863%20Incorrect%20Authorization%20in%20TP-Link%20Systems%20Inc.%20TP-Link%20Tapo%20app&amp;severity=medium&amp;id=682f99000acd01a24927002e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48374-cwe-532-insertion-of-sensitive-information-into-log-file-in-project-zot-zot-270034</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48374%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20project-zot%20zot&amp;severity=medium&amp;id=682f99000acd01a249270034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48373-cwe-863-incorrect-authorization-in-schule111-schule-27003c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48373%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20schule111%20Schule&amp;severity=medium&amp;id=682f99000acd01a24927003c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48372-cwe-521-weak-password-requirements-in-schule111-schule-27003a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48372%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20schule111%20Schule&amp;severity=medium&amp;id=682f99000acd01a24927003a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5962-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-wso2-wso2-api-manager-264b38</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5962%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=682f80630acd01a249264b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7487-cwe-287-improper-authentication-in-wso2-wso2-identity-server-264ac4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7487%3A%20CWE-287%20Improper%20Authentication%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=682f7ce40acd01a249264ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7103-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-wso2-wso2-identity-server-26479f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7103%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=682f725b0acd01a24926479f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51552-cwe-257-storing-passwords-in-a-recoverable-format-in-abb-aspect-enterprise-26479d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51552%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f725b0acd01a24926479d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13958-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-abb-aspect-enterprise-26479b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13958%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f725b0acd01a24926479b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13957-cwe-918-server-side-request-forgery-ssrf-in-abb-aspect-enterprise-264799</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13957%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f725b0acd01a249264799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13956-cwe-295-improper-certificate-validation-in-abb-aspect-enterprise-264797</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13956%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f725b0acd01a249264797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13955-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-abb-aspect-enterprise-264795</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13955%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=critical&amp;id=682f725b0acd01a249264795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13954-cwe-922-insecure-storage-of-sensitive-information-in-abb-aspect-enterprise-2646d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13954%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6ee00acd01a2492646d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13953-cwe-359-exposure-of-private-information-privacy-violation-in-abb-aspect-enterprise-2646d4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13953%3A%20CWE-359%20Exposure%20of%20Private%20Information%20(&apos;Privacy%20Violation&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6ee00acd01a2492646d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13952-cwe-94-improper-control-of-generation-of-code-in-abb-aspect-enterprise-2646d2</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13952%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f6ee00acd01a2492646d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6914-cwe-863-incorrect-authorization-in-wso2-wso2-api-manager-2646dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6914%3A%20CWE-863%20Incorrect%20Authorization%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=682f6ee00acd01a2492646dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51553-cwe-73-external-control-of-file-name-or-path-in-abb-aspect-enterprise-2646da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51553%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f6ee00acd01a2492646da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13951-cwe-760-use-of-a-one-way-hash-with-a-predictable-salt-in-abb-aspect-enterprise-2646d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13951%3A%20CWE-760%20Use%20of%20a%20One-Way%20Hash%20with%20a%20Predictable%20Salt%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6ee00acd01a2492646d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13950-cwe-79-improper-neutralization-of-input-during-web-page-generation-in-abb-aspect-enterprise-2646ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13950%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6ee00acd01a2492646ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13949-cwe-117-improper-output-neutralization-for-logs-in-abb-aspect-enterprise-2646cc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13949%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6ee00acd01a2492646cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48848-cwe-774-allocation-of-file-descriptors-or-handles-without-limits-or-throttling-in-abb-aspect-enterprise-2646d8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48848%3A%20CWE-774%20Allocation%20of%20File%20Descriptors%20or%20Handles%20Without%20Limits%20or%20Throttling%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f6ee00acd01a2492646d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13948-cwe-276-incorrect-default-permissions-in-abb-aspect-enterprise-264616</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13948%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6b520acd01a249264616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13947-cwe-863-incorrect-authorization-in-abb-aspect-enterprise-264614</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13947%3A%20CWE-863%20Incorrect%20Authorization%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f6b520acd01a249264614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13946-cwe-427-uncontrolled-search-path-element-in-abb-aspect-enterprise-264612</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13946%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f6b520acd01a249264612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13931-cwe-606-unchecked-input-for-loop-condition-in-abb-aspect-enterprise-264586</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13931%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f67ff0acd01a249264586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13930-cwe-606-unchecked-input-for-loop-condition-in-abb-aspect-enterprise-264584</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13930%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f67ff0acd01a249264584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13929-cwe-94-improper-control-of-generation-of-code-code-injection-in-abb-aspect-enterprise-264582</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13929%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f67ff0acd01a249264582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13928-cwe-94-improper-control-of-generation-of-code-code-injection-in-abb-aspect-enterprise-2645a0</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13928%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f67ff0acd01a2492645a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30169-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-abb-aspect-enterprise-264580</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30169%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f67ff0acd01a249264580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30173-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-abb-aspect-enterprise-2644b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30173%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f64490acd01a2492644b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30172-cwe-94-improper-control-of-generation-of-code-code-injection-in-abb-aspect-enterprise-2644b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30172%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f64490acd01a2492644b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30171-cwe-863-incorrect-authorization-in-abb-aspect-enterprise-2644b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30171%3A%20CWE-863%20Incorrect%20Authorization%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f64490acd01a2492644b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30170-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-abb-aspect-enterprise-2644d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30170%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f64490acd01a2492644d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2409-cwe-73-external-control-of-file-name-or-path-in-abb-aspect-enterprise-2644d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2409%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f64490acd01a2492644d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48369-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-intermesh-groupoffice-2644d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48369%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=682f64490acd01a2492644d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2410-cwe-36-absolute-path-traversal-in-abb-aspect-enterprise-2644d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2410%3A%20CWE-99%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f64490acd01a2492644d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48368-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-intermesh-groupoffice-264436</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48368%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=682f60d40acd01a249264436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48366-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-intermesh-groupoffice-264434</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48366%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=682f60d40acd01a249264434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9639-cwe-94-improper-control-of-generation-of-code-code-injection-in-abb-aspect-enterprise-26442e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9639%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f60d40acd01a24926442e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48075-cwe-129-improper-validation-of-array-index-in-gofiber-fiber-264432</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48075%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20gofiber%20fiber&amp;severity=high&amp;id=682f60d40acd01a249264432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48066-cwe-226-sensitive-information-in-resource-not-removed-before-reuse-in-wireapp-wire-webapp-264430</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48066%3A%20CWE-226%3A%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20wireapp%20wire-webapp&amp;severity=medium&amp;id=682f60d40acd01a249264430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48061-cwe-613-insufficient-session-expiration-in-wireapp-wire-webapp-264046</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48061%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20wireapp%20wire-webapp&amp;severity=medium&amp;id=682f5d2a0acd01a249264046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47780-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-asterisk-asterisk-263fd2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47780%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20asterisk%20asterisk&amp;severity=medium&amp;id=682f59b40acd01a249263fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47779-cwe-140-improper-neutralization-of-delimiters-in-asterisk-asterisk-263fda</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47779%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20asterisk%20asterisk&amp;severity=high&amp;id=682f59b40acd01a249263fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46716-cwe-125-out-of-bounds-read-in-sandboxie-plus-sandboxie-263fd8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46716%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20sandboxie-plus%20Sandboxie&amp;severity=medium&amp;id=682f59b40acd01a249263fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43596-cwe-276-incorrect-default-permissions-in-msp360-backup-263fd4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43596%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MSP360%20Backup&amp;severity=high&amp;id=682f59b40acd01a249263fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46715-cwe-787-out-of-bounds-write-in-sandboxie-plus-sandboxie-263f60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46715%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=682f56360acd01a249263f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48850-cwe-36-absolute-path-traversal-in-abb-aspect-enterprise-263f5a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48850%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f56360acd01a249263f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48853-cwe-286-incorrect-user-management-in-abb-aspect-enterprise-263f5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48853%3A%20CWE-286%20Incorrect%20User%20Management%20in%20ABB%20ASPECT-Enterprise&amp;severity=critical&amp;id=682f56360acd01a249263f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33138-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-ibm-aspera-faspex-263f5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33138%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=682f56360acd01a249263f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33137-cwe-602-client-side-enforcement-of-server-side-security-in-ibm-aspera-faspex-263f64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33137%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Aspera%20Faspex&amp;severity=high&amp;id=682f56360acd01a249263f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33136-cwe-471-modification-of-assumed-immutable-data-maid-in-ibm-aspera-faspex-263d8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33136%3A%20CWE-471%20Modification%20of%20Assumed-Immutable%20Data%20(MAID)%20in%20IBM%20Aspera%20Faspex&amp;severity=high&amp;id=682f52a60acd01a249263d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4366-cwe-444-inconsistent-interpretation-of-http-requests-http-request-response-smuggling-2622ce</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4366%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)&amp;severity=high&amp;id=682f4bbb0acd01a2492622ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23183-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-ubtech-freepass-262081</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23183%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20UBtech%20Freepass&amp;severity=medium&amp;id=682f44a50acd01a249262081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5081-sql-injection-in-campcodes-cybercafe-management-system-262083</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5081%3A%20SQL%20Injection%20in%20Campcodes%20Cybercafe%20Management%20System&amp;severity=medium&amp;id=682f44a50acd01a249262083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23182-cwe-203-observable-discrepancy-in-ubtech-freepass-26207f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23182%3A%20CWE-203%20Observable%20Discrepancy%20in%20UBtech%20Freepass&amp;severity=medium&amp;id=682f44a50acd01a24926207f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2506-cwe-862-missing-authorization-in-enterprisedb-pglogical-262087</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2506%3A%20CWE-862%20Missing%20Authorization%20in%20EnterpriseDB%20pglogical&amp;severity=medium&amp;id=682f44a50acd01a249262087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5080-stack-based-buffer-overflow-in-tenda-fh451-261df8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5080%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=682f3d940acd01a249261df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5024-uncontrolled-resource-consumption-in-red-hat-red-hat-enterprise-linux-10-261e04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5024%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=682f3d940acd01a249261e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploits-cityworks-zero-day-vulnerability-to-deliver-malware-2611c9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploits%20Cityworks%20zero-day%20vulnerability%20to%20deliver%20malware&amp;severity=medium&amp;id=682f3a100acd01a2492611c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12093-cwe-1288-improper-validation-of-consistency-within-input-in-gitlab-gitlab-261108</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12093%3A%20CWE-1288%3A%20Improper%20Validation%20of%20Consistency%20within%20Input%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f368b0acd01a249261108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0605-cwe-1390-weak-authentication-in-gitlab-gitlab-26110a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0605%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f368b0acd01a24926110a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0679-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-gitlab-gitlab-26110c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0679%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f368b0acd01a24926110c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0993-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-26110e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0993%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682f368b0acd01a24926110e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5079-sql-injection-in-campcodes-online-shopping-portal-261110</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5079%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682f368b0acd01a249261110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32915-cwe-732-incorrect-permission-assignment-for-critical-resource-in-checkmk-gmbh-checkmk-260fa2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32915%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=682f33050acd01a249260fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1110-cwe-1220-insufficient-granularity-of-access-control-in-gitlab-gitlab-260fac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1110%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682f33050acd01a249260fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5078-sql-injection-in-campcodes-online-shopping-portal-25c8cb</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5078%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682f2fb50acd01a24925c8cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5077-sql-injection-in-campcodes-online-shopping-portal-25c8c9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5077%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682f2fb50acd01a24925c8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4575-cwe-295-improper-certificate-validation-in-openssl-openssl-25c223</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4575%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20OpenSSL%20OpenSSL&amp;severity=medium&amp;id=682f2c0b0acd01a24925c223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5076-buffer-overflow-in-freefloat-ftp-server-25c227</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5076%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682f2c0b0acd01a24925c227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2853-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-25c21f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2853%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f2c0b0acd01a24925c21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3111-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-25c221</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3111%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f2c0b0acd01a24925c221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4979-cwe-1220-insufficient-granularity-of-access-control-in-gitlab-gitlab-25c225</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4979%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f2c0b0acd01a24925c225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pupkinstealer-net-infostealer-using-telegram-for-data-theft-2610f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PupkinStealer%20.NET%20Infostealer%20Using%20Telegram%20for%20Data%20Theft&amp;severity=medium&amp;id=682f36850acd01a2492610f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-adult-content-scam-targets-mobile-users-through-pwa-injection-2611e3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Adult%20Content%20Scam%20Targets%20Mobile%20Users%20Through%20PWA%20Injection&amp;severity=medium&amp;id=682f3a100acd01a2492611e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3945-cwe-88-improper-neutralization-of-argument-delimiters-in-a-command-argument-injection-in-tridium-niagara-framework-25b868</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3945%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Tridium%20Niagara%20Framework&amp;severity=high&amp;id=682f1e0e0acd01a24925b868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3944-cwe-732-incorrect-permission-assignment-for-critical-resource-in-tridium-niagara-framework-25b866</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3944%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Tridium%20Niagara%20Framework&amp;severity=high&amp;id=682f1e0e0acd01a24925b866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3943-cwe-598-use-of-get-request-method-with-sensitive-query-strings-in-tridium-niagara-framework-25b864</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3943%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3942-cwe-117-improper-output-neutralization-for-logs-in-tridium-niagara-framework-25b862</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3942%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3941-cwe-69-improper-handling-of-windows-data-alternate-data-stream-in-tridium-niagara-framework-25b860</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3941%3A%20CWE-69%20Improper%20Handling%20of%20Windows%20%3A%3ADATA%20Alternate%20Data%20Stream%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3940-cwe-1173-improper-use-of-validation-framework-in-tridium-niagara-framework-25b85e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3940%3A%20CWE-1173%20Improper%20Use%20of%20Validation%20Framework%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3939-cwe-204-observable-response-discrepancy-in-tridium-niagara-framework-25b85c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3939%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3938-cwe-325-missing-cryptographic-step-in-tridium-niagara-framework-25b85a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3938%3A%20CWE-325%20Missing%20Cryptographic%20Step%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5075-buffer-overflow-in-freefloat-ftp-server-25b86a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5075%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682f1e0e0acd01a24925b86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46714-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-sandboxie-plus-sandboxie-25abd6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46714%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=682f1a9a0acd01a24925abd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3937-cwe-916-use-of-password-hash-with-insufficient-computational-effort-in-tridium-niagara-framework-25abd2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3937%3A%20CWE-916%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Tridium%20Niagara%20Framework&amp;severity=high&amp;id=682f1a9a0acd01a24925abd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46713-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-sandboxie-plus-sandboxie-25abd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46713%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=682f1a9a0acd01a24925abd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2272-cwe-427-uncontrolled-search-path-element-in-forcepoint-fie-endpoint-25abce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2272%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Forcepoint%20FIE%20Endpoint&amp;severity=high&amp;id=682f1a9a0acd01a24925abce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3936-cwe-732-incorrect-permission-assignment-for-critical-resource-in-tridium-niagara-framework-25abd0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3936%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1a9a0acd01a24925abd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5074-buffer-overflow-in-freefloat-ftp-server-25a7e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5074%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682f13970acd01a24925a7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-stealing-chrome-extensions-impersonate-fortinet-youtube-vpns-258e9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data-stealing%20Chrome%20extensions%20impersonate%20Fortinet%2C%20YouTube%2C%20VPNs&amp;severity=medium&amp;id=682f08eb0acd01a249258e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5073-buffer-overflow-in-freefloat-ftp-server-258d24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5073%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682f05630acd01a249258d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41403-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adaudit-plus-258cbd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41403%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=682f01f40acd01a249258cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3836-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adaudit-plus-258cbb</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3836%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=682f01f40acd01a249258cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3444-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-manageengine-servicedesk-plus-msp-258a0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3444%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ManageEngine%20ServiceDesk%20Plus%20MSP&amp;severity=medium&amp;id=682efe550acd01a249258a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25010-cwe-20-improper-input-validation-in-ericsson-ericsson-ran-compute-basebands-all-bb-variants-257e23</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25010%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ericsson%20Ericsson%20RAN%20Compute%20Basebands%20(all%20BB%20variants)&amp;severity=high&amp;id=682eface0acd01a249257e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4280-cwe-276-incorrect-default-permissions-in-poedit-poedit-257db6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4280%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Poedit%20Poedit&amp;severity=medium&amp;id=682ef76d0acd01a249257db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4419-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-hotwptemplates-hot-random-image-257c56</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4419%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20hotwptemplates%20Hot%20Random%20Image&amp;severity=medium&amp;id=682ef04c0acd01a249257c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4405-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-hotwptemplates-hot-random-image-257c54</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hotwptemplates%20Hot%20Random%20Image&amp;severity=medium&amp;id=682ef04c0acd01a249257c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9544-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-mapsvg-mapsvg-257c52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9544%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20MapSVG%20MapSVG&amp;severity=medium&amp;id=682ef04c0acd01a249257c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/authenticated-remote-code-execution-in-netwrix-pas-ea1ff9af</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Authenticated%20Remote%20Code%20Execution%20in%20Netwrix%20Password%20Secure%20(CVE-2025-26817)&amp;severity=medium&amp;id=68367d92182aa0cae23259ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4123-cwe-79-in-grafana-grafana-256ff5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4123%3A%20CWE-79%20in%20Grafana%20Grafana&amp;severity=high&amp;id=682edeb90acd01a249256ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-enumerate-and-exploit-cefsharp-thick-client-082da1b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Enumerate%20and%20Exploit%20CefSharp%20Thick%20Clients%20Using%20CefEnum&amp;severity=medium&amp;id=68367d93182aa0cae23259c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4133-cwe-79-cross-site-scripting-xss-in-unknown-blog2social-social-media-auto-post-scheduler-254f4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4133%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=682ec2890acd01a249254f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5062-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-automattic-woocommerce-253bf4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20automattic%20WooCommerce&amp;severity=medium&amp;id=682e9f7d0acd01a249253bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2759-cwe-732-incorrect-permission-assignment-for-critical-resource-in-gstreamer-gstreamer-253206</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2759%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20GStreamer%20GStreamer&amp;severity=high&amp;id=682e78df0acd01a249253206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3486-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-allegra-allegra-253212</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3486%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Allegra%20Allegra&amp;severity=high&amp;id=682e78df0acd01a249253212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3480-cwe-522-insufficiently-protected-credentials-in-meddream-web-dicom-viewer-253208</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3480%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20MedDream%20WEB%20DICOM%20Viewer&amp;severity=medium&amp;id=682e78df0acd01a249253208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3481-cwe-121-stack-based-buffer-overflow-in-meddream-pacs-server-25320a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3481%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20MedDream%20PACS%20Server&amp;severity=critical&amp;id=682e78df0acd01a24925320a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3482-cwe-121-stack-based-buffer-overflow-in-meddream-pacs-server-25320c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3482%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20MedDream%20PACS%20Server&amp;severity=critical&amp;id=682e78df0acd01a24925320c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3483-cwe-121-stack-based-buffer-overflow-in-meddream-pacs-server-25320e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3483%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20MedDream%20PACS%20Server&amp;severity=critical&amp;id=682e78df0acd01a24925320e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3484-cwe-121-stack-based-buffer-overflow-in-meddream-pacs-server-253210</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3484%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20MedDream%20PACS%20Server&amp;severity=critical&amp;id=682e78df0acd01a249253210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3885-cwe-20-improper-input-validation-in-harman-becker-mgu21-253220</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3885%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Harman%20Becker%20MGU21&amp;severity=medium&amp;id=682e78df0acd01a249253220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3884-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-cloudera-hue-25321e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3884%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cloudera%20Hue&amp;severity=high&amp;id=682e78df0acd01a24925321e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3883-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-echarge-hardy-barth-cph2-253218</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3883%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20eCharge%20Hardy%20Barth%20cPH2&amp;severity=high&amp;id=682e78df0acd01a249253218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3882-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-echarge-hardy-barth-cph2-253216</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3882%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20eCharge%20Hardy%20Barth%20cPH2&amp;severity=high&amp;id=682e78df0acd01a249253216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3881-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-echarge-hardy-barth-cph2-253214</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3881%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20eCharge%20Hardy%20Barth%20cPH2&amp;severity=high&amp;id=682e78df0acd01a249253214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3887-cwe-121-stack-based-buffer-overflow-in-gstreamer-gstreamer-253222</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3887%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20GStreamer%20GStreamer&amp;severity=high&amp;id=682e78df0acd01a249253222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41198-n-a-in-n-a-266e5d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41198%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f866a0acd01a249266e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41197-n-a-in-n-a-266e5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41197%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f866a0acd01a249266e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41196-n-a-in-n-a-266e59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41196%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f866a0acd01a249266e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41195-n-a-in-n-a-266e57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41195%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f866a0acd01a249266e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40462-n-a-in-n-a-266e55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40462%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f866a0acd01a249266e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40461-n-a-in-n-a-266e53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40461%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f866a0acd01a249266e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40460-n-a-in-n-a-266e51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40460%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f866a0acd01a249266e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40459-n-a-in-n-a-266e4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40459%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f866a0acd01a249266e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40458-n-a-in-n-a-266e4d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40458%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f866a0acd01a249266e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41199-n-a-in-n-a-264b44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41199%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f80630acd01a249264b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52874-n-a-in-n-a-264044</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52874%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f5d2a0acd01a249264044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45472-n-a-in-n-a-263fd6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45472%3A%20n%2Fa&amp;severity=high&amp;id=682f59b40acd01a249263fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45468-n-a-in-n-a-26288d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45468%3A%20n%2Fa&amp;severity=high&amp;id=682f4f480acd01a24926288d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45471-n-a-in-n-a-261df6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45471%3A%20n%2Fa&amp;severity=high&amp;id=682f3d940acd01a249261df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32815-n-a-in-n-a-26122a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32815%3A%20n%2Fa&amp;severity=medium&amp;id=682f3a190acd01a24926122a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32813-n-a-in-n-a-261228</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32813%3A%20n%2Fa&amp;severity=high&amp;id=682f3a190acd01a249261228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54188-n-a-in-n-a-261226</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54188%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f3a190acd01a249261226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32814-n-a-in-n-a-261207</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32814%3A%20n%2Fa&amp;severity=critical&amp;id=682f3a190acd01a249261207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47466-cwe-476-null-pointer-dereference-in-taglib-taglib-260fae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47466%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TagLib%20TagLib&amp;severity=low&amp;id=682f33050acd01a249260fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dero-miner-spreads-inside-containerized-linux-environments-25636b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dero%20miner%20spreads%20inside%20containerized%20Linux%20environments&amp;severity=medium&amp;id=682ed0bd0acd01a24925636b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-is-out-of-business-25638b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20is%20Out...%20of%20business!&amp;severity=medium&amp;id=682ed0bd0acd01a24925638b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5059-unrestricted-upload-in-campcodes-online-shopping-portal-24f2ea</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5059%3A%20Unrestricted%20Upload%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682e559b0acd01a24924f2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34025-cwe-732-incorrect-permission-assignment-for-critical-resource-in-versa-concerto-24f2ec</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34025%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Versa%20Concerto&amp;severity=high&amp;id=682e559b0acd01a24924f2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48070-cwe-276-incorrect-default-permissions-in-makeplane-plane-24f1a4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48070%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20makeplane%20plane&amp;severity=low&amp;id=682e521b0acd01a24924f1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47947-cwe-1050-excessive-platform-resource-consumption-within-a-loop-in-owasp-modsecurity-modsecurity-24f1a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47947%3A%20CWE-1050%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20owasp-modsecurity%20ModSecurity&amp;severity=high&amp;id=682e521b0acd01a24924f1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34026-cwe-287-improper-authentication-in-versa-concerto-24f1a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34026%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Versa%20Concerto&amp;severity=critical&amp;id=682e521b0acd01a24924f1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5057-sql-injection-in-campcodes-online-shopping-portal-24f0d6</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5057%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682e4eb10acd01a24924f0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5056-sql-injection-in-campcodes-online-shopping-portal-24f0d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5056%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682e4eb10acd01a24924f0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34027-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-versa-concerto-24f0d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34027%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Versa%20Concerto&amp;severity=critical&amp;id=682e4eb10acd01a24924f0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47942-cwe-862-missing-authorization-in-openedx-edx-platform-24f008</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47942%3A%20CWE-862%3A%20Missing%20Authorization%20in%20openedx%20edx-platform&amp;severity=medium&amp;id=682e4b280acd01a24924f008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5053-buffer-overflow-in-freefloat-ftp-server-24f00c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5053%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682e4b280acd01a24924f00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5052-buffer-overflow-in-freefloat-ftp-server-24f00a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5052%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682e4b280acd01a24924f00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5051-buffer-overflow-in-freefloat-ftp-server-24ee89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5051%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682e44190acd01a24924ee89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36535-cwe-306-missing-authentication-for-critical-function-in-automationdirect-mb-gateway-24ee8d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36535%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20AutomationDirect%20MB-Gateway&amp;severity=critical&amp;id=682e44190acd01a24924ee8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41426-cwe-121-stack-based-buffer-overflow-in-vertiv-liebert-rdu101-2eda86</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41426%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Vertiv%20Liebert%20RDU101&amp;severity=critical&amp;id=682e2a713750f1bc872eda86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46412-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-vertiv-liebert-rdu101-2eda88</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46412%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Vertiv%20Liebert%20RDU101&amp;severity=critical&amp;id=682e2a713750f1bc872eda88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5050-buffer-overflow-in-freefloat-ftp-server-c6a545</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5050%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682e1d8dc4522896dcc6a545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5049-buffer-overflow-in-freefloat-ftp-server-c6a543</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5049%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682e1d8dc4522896dcc6a543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2261-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-tibco-software-inc-tibco-bpm-enterprise-c6a53f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TIBCO%20Software%20Inc%20TIBCO%20BPM%20Enterprise&amp;severity=high&amp;id=682e1d8dc4522896dcc6a53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3751-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tibco-software-inc-tibco-activematrix-businessworks-c69c19</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3751%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TIBCO%20Software%20Inc%20TIBCO%20ActiveMatrix%20BusinessWorks&amp;severity=high&amp;id=682e1a01c4522896dcc69c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48069-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-shopify-ejson2env-c69345</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48069%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shopify%20ejson2env&amp;severity=medium&amp;id=682e12f6c4522896dcc69345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48064-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-desktop-desktop-c6934f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48064%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20desktop%20desktop&amp;severity=low&amp;id=682e12f6c4522896dcc6934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48063-cwe-285-improper-authorization-in-xwiki-xwiki-platform-c6934d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48063%3A%20CWE-285%3A%20Improper%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682e12f6c4522896dcc6934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48060-cwe-121-stack-based-buffer-overflow-in-jqlang-jq-c513dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48060%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20jqlang%20jq&amp;severity=high&amp;id=682e0f74c4522896dcc513dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5033-cross-site-request-forgery-in-xiaobingby-teacms-c513de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5033%3A%20Cross-Site%20Request%20Forgery%20in%20XiaoBingby%20TeaCMS&amp;severity=medium&amp;id=682e0f74c4522896dcc513de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47291-cwe-266-incorrect-privilege-assignment-in-containerd-containerd-c513da</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47291%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20containerd%20containerd&amp;severity=medium&amp;id=682e0f74c4522896dcc513da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26147-authenticated-rce-in-denodo-schedul-138004f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26147%3A%20Authenticated%20RCE%20In%20Denodo%20Scheduler&amp;severity=medium&amp;id=68367d93182aa0cae23259c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46822-cwe-36-absolute-path-traversal-in-osamataher-java-springboot-codebase-c513d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46822%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20OsamaTaher%20Java-springboot-codebase&amp;severity=high&amp;id=682e0f74c4522896dcc513d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2102-cwe-59-improper-link-resolution-before-file-access-link-following-in-hypr-passwordless-c513e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2102%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20HYPR%20Passwordless&amp;severity=medium&amp;id=682e0f74c4522896dcc513e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5020-links-using-non-http-schemes-opened-from-other-apps-such-as-safari-could-have-allowed-spoofing-of-website-addresses-in-mozilla-firefox-for-ios-c513e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5020%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=682e0f74c4522896dcc513e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0372-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-hypr-passwordless-c43f67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0372%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20HYPR%20Passwordless&amp;severity=medium&amp;id=682e0bf8c4522896dcc43f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5032-sql-injection-in-campcodes-online-shopping-portal-c37277</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5032%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682e087cc4522896dcc37277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5031-resource-consumption-in-ackites-killwxapkg-c3725b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5031%3A%20Resource%20Consumption%20in%20Ackites%20KillWxapkg&amp;severity=low&amp;id=682e087cc4522896dcc3725b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-adversary-telegram-bots-help-to-reveal-threats-case-study-c32dcb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Adversary%20Telegram%20Bots%20Help%20to%20Reveal%20Threats%3A%20Case%20Study&amp;severity=medium&amp;id=682e0875c4522896dcc32dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20250-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cisco-cisco-webex-meetings-c246c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20250%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=682e04ecc4522896dcc246c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20247-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cisco-cisco-webex-meetings-c246c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20247%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=682e04ecc4522896dcc246c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20246-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cisco-cisco-webex-meetings-c246c3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20246%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=682e04ecc4522896dcc246c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20258-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-cisco-cisco-duo-c246cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20258%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Duo&amp;severity=medium&amp;id=682e04ecc4522896dcc246cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20255-acceptance-of-extraneous-untrusted-data-with-trusted-data-in-cisco-cisco-webex-meetings-c246c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20255%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=682e04ecc4522896dcc246c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20242-improper-access-control-in-cisco-cisco-unified-contact-center-enterprise-c246cd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20242%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=682e04ecc4522896dcc246cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5030-os-command-injection-in-ackites-killwxapkg-c246cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5030%3A%20OS%20Command%20Injection%20in%20Ackites%20KillWxapkg&amp;severity=low&amp;id=682e04ecc4522896dcc246cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48012-cwe-294-authentication-bypass-by-capture-replay-in-drupal-one-time-password-c0f080</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48012%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Drupal%20One%20Time%20Password&amp;severity=medium&amp;id=682e0169c4522896dcc0f080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48011-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-drupal-one-time-password-c0f078</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48011%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20One%20Time%20Password&amp;severity=medium&amp;id=682e0169c4522896dcc0f078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48010-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-drupal-one-time-password-c0f076</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48010%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20One%20Time%20Password&amp;severity=medium&amp;id=682e0169c4522896dcc0f076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48009-cwe-862-missing-authorization-in-drupal-single-content-sync-c0f074</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48009%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Single%20Content%20Sync&amp;severity=low&amp;id=682e0169c4522896dcc0f074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4416-cwe-770-allocation-of-resources-without-limits-or-throttling-in-drupal-events-log-track-c0f084</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4416%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Drupal%20Events%20Log%20Track&amp;severity=high&amp;id=682e0169c4522896dcc0f084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4415-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-piwik-pro-c0f082</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4415%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Piwik%20PRO&amp;severity=medium&amp;id=682e0169c4522896dcc0f082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20267-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-cisco-cisco-identity-services-engine-software-c0f072</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20267%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=682e0169c4522896dcc0f072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20257-incorrect-authorization-in-cisco-cisco-secure-network-analytics-c0f070</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20257%3A%20Incorrect%20Authorization%20in%20Cisco%20Cisco%20Secure%20Network%20Analytics&amp;severity=medium&amp;id=682e0169c4522896dcc0f070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20256-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-cisco-cisco-secure-network-analytics-c0f06e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20256%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Network%20Analytics&amp;severity=medium&amp;id=682e0169c4522896dcc0f06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20113-client-side-enforcement-of-server-side-security-in-cisco-cisco-unified-contact-center-express-c0f068</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20113%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=high&amp;id=682e0169c4522896dcc0f068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20114-authorization-bypass-through-user-controlled-key-in-cisco-cisco-unified-contact-center-express-c0f06a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20114%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=682e0169c4522896dcc0f06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20152-out-of-bounds-read-in-cisco-cisco-identity-services-engine-software-c0f06c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20152%3A%20Out-of-bounds%20Read%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=high&amp;id=682e0169c4522896dcc0f06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20112-privilege-chaining-in-cisco-cisco-emergency-responder-c0f066</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20112%3A%20Privilege%20Chaining%20in%20Cisco%20Cisco%20Emergency%20Responder&amp;severity=medium&amp;id=682e0169c4522896dcc0f066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-c435d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudy%20with%20a%20Chance%20of%20Hijacking%20Forgotten%20DNS%20Records%20Enable%20Scam%20Actor&amp;severity=medium&amp;id=682e0bf6c4522896dcc435d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-threats-of-dual-function-malware-found-in-chrome-extensions-c4356c</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20Threats%20of%20Dual-Function%20Malware%20Found%20in%20Chrome%20Extensions&amp;severity=medium&amp;id=682e0bf6c4522896dcc4356c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badsuccessor-abusing-dmsa-to-escalate-privileges-i-3e0de8fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BadSuccessor%3A%20Abusing%20dMSA%20to%20Escalate%20Privileges%20in%20Active%20Directory&amp;severity=medium&amp;id=68367d92182aa0cae23259af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-sting-of-fake-kling-facebook-malvertising-lures-victims-to-fake-ai-generation-website-c0ad64</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Sting%20of%20Fake%20Kling%3A%20Facebook%20Malvertising%20Lures%20Victims%20to%20Fake%20AI%20Generation%20Website&amp;severity=medium&amp;id=682df6d6c4522896dcc0ad64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4008-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-smartbedded-meteobridge-c0655d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4008%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Smartbedded%20MeteoBridge&amp;severity=high&amp;id=682df35bc4522896dcc0655d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23337-cwe-190-integer-overflow-or-wraparound-in-jqlang-jq-c0041f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23337%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20jqlang%20jq&amp;severity=medium&amp;id=682de8d1c4522896dcc0041f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5029-path-traversal-in-kingdee-cloud-galaxy-private-cloud-bbc-system-bfff82</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5029%3A%20Path%20Traversal%20in%20Kingdee%20Cloud%20Galaxy%20Private%20Cloud%20BBC%20System&amp;severity=medium&amp;id=682de546c4522896dcbfff82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dero-miner-zombies-biting-through-docker-apis-to-build-a-cryptojacking-horde-c32dc3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dero%20miner%20zombies%20biting%20through%20Docker%20APIs%20to%20build%20a%20cryptojacking%20horde&amp;severity=medium&amp;id=682e0875c4522896dcc32dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1421-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-proget-konsola-proget-bfd720</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1421%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Proget%20Proget&amp;severity=low&amp;id=682dd047c4522896dcbfd720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1420-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-proget-konsola-proget-bfd71e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proget%20Proget&amp;severity=low&amp;id=682dd047c4522896dcbfd71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1419-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-proget-konsola-proget-bfd71c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1419%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proget%20Proget&amp;severity=low&amp;id=682dd047c4522896dcbfd71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1418-cwe-863-incorrect-authorization-in-proget-konsola-proget-bfd71a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1418%3A%20CWE-863%20Incorrect%20Authorization%20in%20Proget%20Proget&amp;severity=medium&amp;id=682dd047c4522896dcbfd71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1417-cwe-863-incorrect-authorization-in-proget-konsola-proget-bfd718</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1417%3A%20CWE-863%20Incorrect%20Authorization%20in%20Proget%20Proget&amp;severity=medium&amp;id=682dd047c4522896dcbfd718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1416-cwe-863-incorrect-authorization-in-proget-konsola-proget-bfd716</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1416%3A%20CWE-863%20Incorrect%20Authorization%20in%20Proget%20Proget&amp;severity=high&amp;id=682dd047c4522896dcbfd716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40775-cwe-232-improper-handling-of-undefined-values-in-isc-bind-9-bfd2bc</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40775%3A%20CWE-232%20Improper%20Handling%20of%20Undefined%20Values%20in%20ISC%20BIND%209&amp;severity=high&amp;id=682dcca2c4522896dcbfd2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48417-cwe-321-use-of-hard-coded-cryptographic-key-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfcdcb</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48417%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=medium&amp;id=682dc923c4522896dcbfcdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48416-cwe-912-hidden-functionality-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfc975</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48416%3A%20CWE-912%20Hidden%20Functionality%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=high&amp;id=682dc591c4522896dcbfc975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48415-cwe-749-exposed-dangerous-method-or-function-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfc973</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48415%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=medium&amp;id=682dc591c4522896dcbfc973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48414-cwe-798-use-of-hard-coded-credentials-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfc038</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48414%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=medium&amp;id=682dbe9bc4522896dcbfc038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48413-cwe-798-use-of-hard-coded-credentials-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfc036</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48413%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=high&amp;id=682dbe9bc4522896dcbfc036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27804-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfc03a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27804%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=medium&amp;id=682dbe9bc4522896dcbfc03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27803-cwe-306-missing-authentication-for-critical-function-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfbbd3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27803%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=medium&amp;id=682dbb0ac4522896dcbfbbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1415-cwe-863-incorrect-authorization-in-proget-konsola-proget-bfaee0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1415%3A%20CWE-863%20Incorrect%20Authorization%20in%20Proget%20Proget&amp;severity=medium&amp;id=682db07dc4522896dcbfaee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41232-vulnerability-in-spring-spring-security-bfaa8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41232%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=critical&amp;id=682dad13c4522896dcbfaa8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evilworker-a-new-aitm-attack-framework-leveraging--a96383bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EvilWorker%3A%20a%20new%20AiTM%20attack%20framework%20leveraging%20service%20workers%20%E2%80%94%20much%20more%20effective%2C%20autonomous%2C%20and%20adaptable%20than%20Evilginx2%3F%20%F0%9F%8E%A3&amp;severity=medium&amp;id=68367d92182aa0cae23259b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4221-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-baswaniyash-animated-buttons-bf994e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4221%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baswaniyash%20Animated%20Buttons&amp;severity=medium&amp;id=682d9f07c4522896dcbf994e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4219-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-darkyudex-dpepress-bf994c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4219%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20darkyudex%20DPEPress&amp;severity=medium&amp;id=682d9f07c4522896dcbf994c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12561-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-wecantrack-affiliate-sales-in-google-analytics-and-other-tools-bf9942</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12561%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wecantrack%20Affiliate%20Sales%20in%20Google%20Analytics%20and%20other%20tools&amp;severity=medium&amp;id=682d9f07c4522896dcbf9942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4217-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-measuremarketing-wp-youtube-video-optimizer-bf994a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20measuremarketing%20WP%20YouTube%20Video%20Optimizer&amp;severity=medium&amp;id=682d9f07c4522896dcbf994a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3750-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-johnzenausa-network-posts-extended-bf9944</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnzenausa%20Network%20Posts%20Extended&amp;severity=medium&amp;id=682d9f07c4522896dcbf9944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4105-cwe-862-missing-authorization-in-splitit-splitit-bf9948</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4105%3A%20CWE-862%20Missing%20Authorization%20in%20splitit%20Splitit&amp;severity=medium&amp;id=682d9f07c4522896dcbf9948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4611-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rilwis-slim-seo-fast-automated-wordpress-seo-plugin-bf9950</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rilwis%20Slim%20SEO%20%E2%80%93%20A%20Fast%20%26%20Automated%20SEO%20Plugin%20For%20WordPress&amp;severity=medium&amp;id=682d9f07c4522896dcbf9950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4803-cwe-502-deserialization-of-untrusted-data-in-steinrein-glossary-by-wppedia-best-glossary-plugin-for-wordpress-bf9952</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4803%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20steinrein%20Glossary%20by%20WPPedia%20%E2%80%93%20Best%20Glossary%20plugin%20for%20WordPress&amp;severity=high&amp;id=682d9f07c4522896dcbf9952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3781-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-creativefreedomau-raisely-donation-form-bf9946</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3781%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativefreedomau%20Raisely%20Donation%20Form&amp;severity=medium&amp;id=682d9f07c4522896dcbf9946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1712-cwe-88-improper-neutralization-of-argument-delimiters-in-a-command-argument-injection-in-checkmk-gmbh-checkmk-bf9954</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1712%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=682d9f07c4522896dcbf9954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-16536-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-clickhouse-db-59d36f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-16536%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Clickhouse%20DB&amp;severity=high&amp;id=682d8121c631aa761259d36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25262-cwe-116-improper-encoding-or-escaping-of-output-in-yandex-browser-59d373</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25262%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Yandex%20Browser&amp;severity=medium&amp;id=682d8121c631aa761259d373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25255-cwe-20-improper-input-validation-in-yandex-browser-lite-59d371</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25255%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Yandex%20Browser%20Lite&amp;severity=high&amp;id=682d8121c631aa761259d371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25254-cwe-116-improper-encoding-or-escaping-of-output-in-yandex-browser-lite-59c0de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25254%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Yandex%20Browser%20Lite&amp;severity=high&amp;id=682d7b32c631aa761259c0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4949-cwe-611-improper-restriction-of-xml-external-entity-reference-in-eclipse-jgit-eclipse-jgit-59c0e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4949%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Eclipse%20JGit%20Eclipse%20JGit&amp;severity=medium&amp;id=682d7b32c631aa761259c0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4524-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-wpstylish-madara-responsive-and-modern-wordpress-theme-for-manga-sites-244ecb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4524%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WPStylish%20Madara%20%E2%80%93%20Responsive%20and%20modern%20WordPress%20theme%20for%20manga%20sites&amp;severity=critical&amp;id=682d76fed4f2164cc9244ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4094-cwe-287-improper-authentication-in-unknown-digits-wordpress-mobile-number-signup-and-login-243b17</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4094%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20DIGITS%3A%20WordPress%20Mobile%20Number%20Signup%20and%20Login&amp;severity=critical&amp;id=682d700cd4f2164cc9243b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4969-out-of-bounds-read-in-red-hat-red-hat-enterprise-linux-6-b3fabd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4969%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=682d38bc4d7c5ea9f4b3fabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5013-cross-site-scripting-in-hkcms-2430c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5013%3A%20Cross%20Site%20Scripting%20in%20HkCms&amp;severity=medium&amp;id=682d6c76d4f2164cc92430c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5011-cross-site-scripting-in-moonlightl-hexo-boot-b3d6b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5011%3A%20Cross%20Site%20Scripting%20in%20moonlightL%20hexo-boot&amp;severity=medium&amp;id=682d18f64d7c5ea9f4b3d6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-keyboard-desktop-101-remote-code-execution--8aec2a12</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Keyboard%20Desktop%201.0.1%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68489dc67e6d765d51d532bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-21-5e6e6a4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-21&amp;severity=medium&amp;id=68367c98182aa0cae2320576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-21-250aa9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-21&amp;severity=medium&amp;id=682e6a7b0acd01a249250aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45753-n-a-in-n-a-24f010</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45753%3A%20n%2Fa&amp;severity=high&amp;id=682e4b280acd01a24924f010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44040-n-a-in-n-a-24f00e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44040%3A%20n%2Fa&amp;severity=high&amp;id=682e4b280acd01a24924f00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45755-n-a-in-n-a-24ee8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45755%3A%20n%2Fa&amp;severity=medium&amp;id=682e44190acd01a24924ee8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27558-n-a-in-n-a-c6bb05</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27558%3A%20n%2Fa&amp;severity=critical&amp;id=682e248fc4522896dcc6bb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44083-n-a-in-n-a-c6bafd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44083%3A%20n%2Fa&amp;severity=critical&amp;id=682e248fc4522896dcc6bafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45752-n-a-in-n-a-c6a541</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45752%3A%20n%2Fa&amp;severity=high&amp;id=682e1d8dc4522896dcc6a541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57529-n-a-in-n-a-c6a53d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57529%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682e1d8dc4522896dcc6a53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45754-n-a-in-n-a-c43f80</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45754%3A%20n%2Fa&amp;severity=medium&amp;id=682e0bf8c4522896dcc43f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25539-n-a-in-n-a-c37240</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25539%3A%20n%2Fa&amp;severity=medium&amp;id=682e087cc4522896dcc37240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56428-n-a-in-n-a-c37224</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56428%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682e087cc4522896dcc37224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27997-n-a-in-n-a-c0ced6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27997%3A%20n%2Fa&amp;severity=high&amp;id=682dfdf5c4522896dcc0ced6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48207-cwe-425-direct-request-forced-browsing-in-typo3-reint-downloadmanager-extension-c0bbc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48207%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20TYPO3%20reint%20downloadmanager%20extension&amp;severity=high&amp;id=682dfa70c4522896dcc0bbc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27998-n-a-in-n-a-c0bbbe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27998%3A%20n%2Fa&amp;severity=high&amp;id=682dfa70c4522896dcc0bbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48206-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-typo3-ns-backup-extension-c0b1a8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48206%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20ns%20backup%20extension&amp;severity=medium&amp;id=682df6dbc4522896dcc0b1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48204-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-typo3-ns-backup-extension-c0b1a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48204%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TYPO3%20ns%20backup%20extension&amp;severity=medium&amp;id=682df6dbc4522896dcc0b1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48202-cwe-425-direct-request-forced-browsing-in-typo3-femanager-extension-c0b1a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48202%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20TYPO3%20femanager%20extension&amp;severity=medium&amp;id=682df6dbc4522896dcc0b1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48203-n-a-in-n-a-c0b19a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48203%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20cs%20seo%20extension&amp;severity=medium&amp;id=682df6dbc4522896dcc0b19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48200-cwe-502-deserialization-of-untrusted-data-in-typo3-sr-feuser-register-extension-c0657a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48200%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20sr%20feuser%20register%20extension&amp;severity=low&amp;id=682df35bc4522896dcc0657a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48205-cwe-425-direct-request-forced-browsing-in-typo3-sr-feuser-register-extension-c0655b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48205%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20TYPO3%20sr%20feuser%20register%20extension&amp;severity=low&amp;id=682df35bc4522896dcc0655b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48201-cwe-425-direct-request-forced-browsing-in-typo3-ns-backup-extension-c06557</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48201%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20TYPO3%20ns%20backup%20extension&amp;severity=high&amp;id=682df35bc4522896dcc06557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42922-n-a-in-n-a-bff6a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42922%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682dde53c4522896dcbff6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44895-n-a-in-n-a-bff6a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44895%3A%20n%2Fa&amp;severity=medium&amp;id=682dde53c4522896dcbff6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44892-n-a-in-n-a-bff6a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44892%3A%20n%2Fa&amp;severity=medium&amp;id=682dde53c4522896dcbff6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56429-cwe-321-use-of-hard-coded-cryptographic-key-in-itech-ilabclient-bfe632</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56429%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20itech%20iLabClient&amp;severity=high&amp;id=682dd745c4522896dcbfe632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5010-cross-site-scripting-in-moonlightl-hexo-boot-b3d2bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5010%3A%20Cross%20Site%20Scripting%20in%20moonlightL%20hexo-boot&amp;severity=medium&amp;id=682d153e4d7c5ea9f4b3d2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5008-sql-injection-in-projectworlds-online-time-table-generator-b3c5c7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5008%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Time%20Table%20Generator&amp;severity=medium&amp;id=682d0acf4d7c5ea9f4b3c5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5007-cross-site-scripting-in-part-db-b3c5c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5007%3A%20Cross%20Site%20Scripting%20in%20Part-DB&amp;severity=medium&amp;id=682d0acf4d7c5ea9f4b3c5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5006-sql-injection-in-campcodes-online-shopping-portal-b3bd17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5006%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682d03994d7c5ea9f4b3bd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5004-sql-injection-in-projectworlds-online-time-table-generator-b3bd15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5004%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Time%20Table%20Generator&amp;severity=medium&amp;id=682d03994d7c5ea9f4b3bd15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5003-sql-injection-in-projectworlds-online-time-table-generator-b3b47a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5003%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Time%20Table%20Generator&amp;severity=medium&amp;id=682cfcc94d7c5ea9f4b3b47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5002-sql-injection-in-sourcecodester-client-database-management-system-b3b478</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5002%3A%20SQL%20Injection%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=682cfcc94d7c5ea9f4b3b478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5001-integer-overflow-in-gnu-pspp-b3afd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5001%3A%20Integer%20Overflow%20in%20GNU%20PSPP&amp;severity=medium&amp;id=682cf9154d7c5ea9f4b3afd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brand-impersonation-online-ads-and-malicious-merchants-help-purchase-scam-network-prey-on-victims-b3a74b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brand%20impersonation%2C%20online%20ads%2C%20and%20malicious%20merchants%20help%20purchase%20scam%20network%20prey%20on%20victims&amp;severity=medium&amp;id=682cf5ae4d7c5ea9f4b3a74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malvertisings-new-threat-exploiting-trusted-google-ad736ce1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malvertising&apos;s%20New%20Threat%3A%20Exploiting%20Trusted%20Google%20Domains&amp;severity=medium&amp;id=68367d92182aa0cae23259bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5000-command-injection-in-linksys-fgw3000-ah-b3a1c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5000%3A%20Command%20Injection%20in%20Linksys%20FGW3000-AH&amp;severity=medium&amp;id=682cee834d7c5ea9f4b3a1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4999-command-injection-in-linksys-fgw3000-ah-b3a1c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4999%3A%20Command%20Injection%20in%20Linksys%20FGW3000-AH&amp;severity=medium&amp;id=682cee834d7c5ea9f4b3a1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4998-denial-of-service-in-h3c-magic-r200g-2430d5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4998%3A%20Denial%20of%20Service%20in%20H3C%20Magic%20R200G&amp;severity=high&amp;id=682d6c76d4f2164cc92430d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48056-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-cilium-hubble-b38a03</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48056%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20cilium%20hubble&amp;severity=medium&amp;id=682ce08d4d7c5ea9f4b38a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4997-denial-of-service-in-h3c-r2-prog-b37689</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4997%3A%20Denial%20of%20Service%20in%20H3C%20R2%2BProG&amp;severity=high&amp;id=682cd9834d7c5ea9f4b37689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-nitrogen-ransomware-targets-financial-firms-in-the-us-uk-and-canada-b37284</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Nitrogen%20Ransomware%20Targets%20Financial%20Firms%20in%20the%20US%2C%20UK%20and%20Canada&amp;severity=medium&amp;id=682cd9724d7c5ea9f4b37284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sarcoma-ransomware-unveiled-anatomy-of-a-double-extortion-gang-b3728a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sarcoma%20Ransomware%20Unveiled%3A%20Anatomy%20of%20a%20Double%20Extortion%20Gang&amp;severity=medium&amp;id=682cd9724d7c5ea9f4b3728a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4996-cross-site-scripting-in-intelbras-rf-301k-b364d1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4996%3A%20Cross%20Site%20Scripting%20in%20Intelbras%20RF%20301K&amp;severity=medium&amp;id=682cd5f64d7c5ea9f4b364d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47290-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-containerd-containerd-aeac70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47290%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20containerd%20containerd&amp;severity=high&amp;id=682cd0f71484d88663aeac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22157-privesc-privilege-escalation-in-atlassian-jira-core-data-center-aeac8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22157%3A%20PrivEsc%20(Privilege%20Escalation)%20in%20Atlassian%20Jira%20Core%20Data%20Center&amp;severity=high&amp;id=682cd0f71484d88663aeac8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4364-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-assured-telematics-inc-fleet-management-system-aeac91</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4364%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Assured%20Telematics%20Inc.%20Fleet%20Management%20System&amp;severity=high&amp;id=682cd0f71484d88663aeac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47854-cwe-601-in-jetbrains-teamcity-aeadde</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47854%3A%20CWE-601%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682cd0f71484d88663aeadde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47853-cwe-79-in-jetbrains-teamcity-aeaddc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47853%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682cd0f71484d88663aeaddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47852-cwe-79-in-jetbrains-teamcity-aeadcf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47852%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682cd0f71484d88663aeadcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47851-cwe-79-in-jetbrains-teamcity-aeadcd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47851%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682cd0f71484d88663aeadcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47850-cwe-306-in-jetbrains-youtrack-aeadcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47850%3A%20CWE-306%20in%20JetBrains%20YouTrack&amp;severity=medium&amp;id=682cd0f71484d88663aeadcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48391-cwe-306-in-jetbrains-youtrack-aeade0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48391%3A%20CWE-306%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=682cd0f71484d88663aeade0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47277-cwe-502-deserialization-of-untrusted-data-in-vllm-project-vllm-aeacae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47277%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20vllm-project%20vllm&amp;severity=critical&amp;id=682cd0f71484d88663aeacae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46725-cwe-94-improper-control-of-generation-of-code-code-injection-in-langroid-langroid-aeacac</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46725%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langroid%20langroid&amp;severity=high&amp;id=682cd0f71484d88663aeacac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46724-cwe-94-improper-control-of-generation-of-code-code-injection-in-langroid-langroid-aeacaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46724%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langroid%20langroid&amp;severity=critical&amp;id=682cd0f71484d88663aeacaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37991-vulnerability-in-linux-linux-aeae01</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37990-vulnerability-in-linux-linux-aeadff</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeadff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37989-vulnerability-in-linux-linux-aeadfd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeadfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37988-vulnerability-in-linux-linux-aeadfb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeadfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37987-vulnerability-in-linux-linux-aeadee</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeadee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37986-vulnerability-in-linux-linux-aeadec</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeadec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37985-vulnerability-in-linux-linux-aeadea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeadea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37984-vulnerability-in-linux-linux-aeade8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeade8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37983-vulnerability-in-linux-linux-aeade6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeade6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37982-vulnerability-in-linux-linux-aeae1e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37981-vulnerability-in-linux-linux-aeae1c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37980-vulnerability-in-linux-linux-aeae1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37979-vulnerability-in-linux-linux-aeae0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37978-vulnerability-in-linux-linux-aeae0b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37977-vulnerability-in-linux-linux-aeae09</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37976-vulnerability-in-linux-linux-aeae07</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37976&amp;severity=high&amp;id=682cd0f71484d88663aeae07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37975-vulnerability-in-linux-linux-aeae05</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37974-vulnerability-in-linux-linux-aeae3d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37973-vulnerability-in-linux-linux-aeae3b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37972-vulnerability-in-linux-linux-aeae39</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37972%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37971-vulnerability-in-linux-linux-aeae2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37970-vulnerability-in-linux-linux-aeae2a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37969-vulnerability-in-linux-linux-aeae28</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37968-vulnerability-in-linux-linux-aeae26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37967-vulnerability-in-linux-linux-aeae24</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37966-vulnerability-in-linux-linux-aeae22</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37965-vulnerability-in-linux-linux-aeae20</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37964-vulnerability-in-linux-linux-aeae9e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37963-vulnerability-in-linux-linux-aeae9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37962-vulnerability-in-linux-linux-aeae9a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37961-vulnerability-in-linux-linux-aeae98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37960-vulnerability-in-linux-linux-aeae96</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37959-vulnerability-in-linux-linux-aeae89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37958-vulnerability-in-linux-linux-aeae87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37957-vulnerability-in-linux-linux-aeae85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37956-vulnerability-in-linux-linux-aeae83</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37955-vulnerability-in-linux-linux-aeae81</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37954-vulnerability-in-linux-linux-aeae7f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37953-vulnerability-in-linux-linux-aeae7d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37952-vulnerability-in-linux-linux-aeae7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37951-vulnerability-in-linux-linux-aeae79</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37950-vulnerability-in-linux-linux-aeae77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37949-vulnerability-in-linux-linux-aeae6a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37948-vulnerability-in-linux-linux-aeae68</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37947-vulnerability-in-linux-linux-aeae66</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37946-vulnerability-in-linux-linux-aeae64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37945-vulnerability-in-linux-linux-aeaedc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37944-vulnerability-in-linux-linux-aeaeda</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37943-vulnerability-in-linux-linux-aeaed8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37942-vulnerability-in-linux-linux-aeaed6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37942&amp;severity=null&amp;id=682cd0f71484d88663aeaed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37941-vulnerability-in-linux-linux-aeaed4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37940-vulnerability-in-linux-linux-aeaec7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37939-vulnerability-in-linux-linux-aeaf1e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37938-vulnerability-in-linux-linux-aeaf1c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37937-vulnerability-in-linux-linux-aeaf1a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45641-cwe-295-improper-certificate-validation-in-ibm-security-reaqta-edr-aeaef5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45641%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Security%20ReaQta%20EDR&amp;severity=medium&amp;id=682cd0f71484d88663aeaef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37936-vulnerability-in-linux-linux-aeafb3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeafb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37935-vulnerability-in-linux-linux-aeafb1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeafb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37934-vulnerability-in-linux-linux-aeafaf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeafaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37933-vulnerability-in-linux-linux-aeafad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeafad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37932-vulnerability-in-linux-linux-aeafa0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeafa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37931-vulnerability-in-linux-linux-aeaf9e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37930-vulnerability-in-linux-linux-aeaf9c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37929-vulnerability-in-linux-linux-aeaf9a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37928-vulnerability-in-linux-linux-aeaf98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37927-vulnerability-in-linux-linux-aeaf96</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37926-vulnerability-in-linux-linux-aeaf94</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37924-vulnerability-in-linux-linux-aeaf92</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37923-vulnerability-in-linux-linux-aeaf90</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37922-vulnerability-in-linux-linux-aeaf8e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37921-vulnerability-in-linux-linux-aeaf81</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37920-vulnerability-in-linux-linux-aeaf7f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37919-vulnerability-in-linux-linux-aeaf7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37918-vulnerability-in-linux-linux-aeaf7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37917-vulnerability-in-linux-linux-aeaf79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37916-vulnerability-in-linux-linux-aeaf77</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37915-vulnerability-in-linux-linux-aeaf75</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37914-vulnerability-in-linux-linux-aeaf73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37913-vulnerability-in-linux-linux-aeaf71</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37912-vulnerability-in-linux-linux-aeaf6f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37911-vulnerability-in-linux-linux-aeaf62</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37910-vulnerability-in-linux-linux-aeaf60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37909-vulnerability-in-linux-linux-aeaf5e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37908-vulnerability-in-linux-linux-aeaf5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37907-vulnerability-in-linux-linux-aeaf5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37906-vulnerability-in-linux-linux-aeaf58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37905-vulnerability-in-linux-linux-aeaf56</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37904-vulnerability-in-linux-linux-aeaf54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37903-vulnerability-in-linux-linux-aeaf52</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37901-vulnerability-in-linux-linux-aeaf43</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37900-vulnerability-in-linux-linux-aeaf41</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37899-vulnerability-in-linux-linux-aeaf3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37898-vulnerability-in-linux-linux-aeaf3d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37897-vulnerability-in-linux-linux-aeaf3b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37896-vulnerability-in-linux-linux-aeaf39</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37895-vulnerability-in-linux-linux-aeaf37</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37894-vulnerability-in-linux-linux-aeaf35</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48018-cwe-502-deserialization-of-untrusted-data-in-schweitzer-engineering-laboratories-sel-5030-acselerator-quickset-software-aeaf18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48018%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5030%20acSELerator%20QuickSet%20Software&amp;severity=high&amp;id=682cd0f71484d88663aeaf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48017-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-schweitzer-engineering-laboratories-sel-5056-software-defined-network-flow-controller-aeaefd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48017%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5056%20Software-Defined%20Network%20Flow%20Controller&amp;severity=critical&amp;id=682cd0f71484d88663aeaefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48016-cwe-799-improper-control-of-interaction-frequency-in-schweitzer-engineering-laboratories-sel-5056-software-defined-network-flow-controller-aeaefb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48016%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5056%20Software-Defined%20Network%20Flow%20Controller&amp;severity=medium&amp;id=682cd0f71484d88663aeaefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48015-cwe-204-observable-response-discrepancy-in-schweitzer-engineering-laboratories-sel-5056-software-defined-network-flow-controller-aeaef9</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48015%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5056%20Software-Defined%20Network%20Flow%20Controller&amp;severity=low&amp;id=682cd0f71484d88663aeaef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48014-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-schweitzer-engineering-laboratories-sel-5056-software-defined-network-flow-controller-aeaef7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48014%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5056%20Software-Defined%20Network%20Flow%20Controller&amp;severity=high&amp;id=682cd0f71484d88663aeaef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33861-cwe-295-improper-certificate-validation-in-ibm-security-reaqta-edr-aeafd6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33861%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Security%20ReaQta%20EDR&amp;severity=medium&amp;id=682cd0f71484d88663aeafd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41228-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-vmware-vcenter-server-aeaf33</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41228%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20VMware%20vCenter%20Server&amp;severity=medium&amp;id=682cd0f71484d88663aeaf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41227-cwe-400-uncontrolled-resource-consumption-in-vmware-esxi-aeaec5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41227%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20VMware%20ESXi&amp;severity=medium&amp;id=682cd0f71484d88663aeaec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41226-cwe-400-uncontrolled-resource-consumption-in-vmware-esxi-aeaec3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41226%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20VMware%20ESXi&amp;severity=medium&amp;id=682cd0f71484d88663aeaec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41225-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-vmware-vcenter-server-aeaf14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41225%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20VMware%20vCenter%20Server&amp;severity=high&amp;id=682cd0f71484d88663aeaf14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47941-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-typo3-typo3-aeb088</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47941%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20TYPO3%20typo3&amp;severity=high&amp;id=682cd0f71484d88663aeb088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47940-cwe-283-unverified-ownership-in-typo3-typo3-aeb02b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47940%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20TYPO3%20typo3&amp;severity=high&amp;id=682cd0f71484d88663aeb02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47939-cwe-351-insufficient-type-distinction-in-typo3-typo3-aeb0ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47939%3A%20CWE-351%3A%20Insufficient%20Type%20Distinction%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682cd0f71484d88663aeb0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4980-information-disclosure-in-netgear-dgnd3700-aeb0e3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4980%3A%20Information%20Disclosure%20in%20Netgear%20DGND3700&amp;severity=medium&amp;id=682cd0f71484d88663aeb0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47938-cwe-620-unverified-password-change-in-typo3-typo3-aeb0a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47938%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20TYPO3%20typo3&amp;severity=low&amp;id=682cd0f71484d88663aeb0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47937-cwe-863-incorrect-authorization-in-typo3-typo3-aeb0a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47937%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20TYPO3%20typo3&amp;severity=low&amp;id=682cd0f71484d88663aeb0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47936-cwe-918-server-side-request-forgery-ssrf-in-typo3-typo3-aeb0ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47936%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TYPO3%20typo3&amp;severity=low&amp;id=682cd0f71484d88663aeb0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4978-improper-authentication-in-netgear-dgnd3700-aeafef</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4978%3A%20Improper%20Authentication%20in%20Netgear%20DGND3700&amp;severity=critical&amp;id=682cd0f71484d88663aeafef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4977-information-disclosure-in-netgear-dgnd3700-aeafed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4977%3A%20Information%20Disclosure%20in%20Netgear%20DGND3700&amp;severity=medium&amp;id=682cd0f71484d88663aeafed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41231-missing-authorisation-in-vmware-cloud-foundation-aeb15f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41231%3A%20Missing%20Authorisation%20in%20VMware%20Cloud%20Foundation&amp;severity=high&amp;id=682cd0f71484d88663aeb15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41230-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-vmware-cloud-foundation-aeb152</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41230%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20VMware%20Cloud%20Foundation&amp;severity=high&amp;id=682cd0f71484d88663aeb152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41229-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-vmware-cloud-foundation-aeb150</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41229%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20VMware%20Cloud%20Foundation&amp;severity=high&amp;id=682cd0f71484d88663aeb150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40635-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-comerzzia-comerzzia-backoffice-sales-orchestrator-aeafda</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40635%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Comerzzia%20Comerzzia%20Backoffice%3A%20Sales%20Orchestrator&amp;severity=critical&amp;id=682cd0f71484d88663aeafda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30193-cwe-674-uncontrolled-recursion-in-powerdns-dnsdist-aeb142</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30193%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20PowerDNS%20DNSdist&amp;severity=high&amp;id=682cd0f71484d88663aeb142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37892-vulnerability-in-linux-linux-aeb184</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40633-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-koibox-koibox-aeb14e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40633%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Koibox%20Koibox&amp;severity=medium&amp;id=682cd0f71484d88663aeb14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40634-cwe-121-stack-based-buffer-overflow-in-tp-link-link-archer-ax50-aeb131</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40634%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20TP-Link%20Link%20Archer%20AX50&amp;severity=critical&amp;id=682cd0f71484d88663aeb131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4951-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-rapid7-appspider-pro-aeb133</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4951%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Rapid7%20AppSpider%20Pro&amp;severity=medium&amp;id=682cd0f71484d88663aeb133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5878-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-aknieriem-simplelightbox-aeb123</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aknieriem%20Simplelightbox&amp;severity=medium&amp;id=682cd0f71484d88663aeb123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2929-cwe-79-cross-site-scripting-xss-in-unknown-order-delivery-date-aeb0eb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2929%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Order%20Delivery%20Date&amp;severity=high&amp;id=682cd0f71484d88663aeb0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4322-cwe-620-unverified-password-change-in-stylemixthemes-motors-car-dealer-rental-listing-wordpress-theme-aeb0d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4322%3A%20CWE-620%20Unverified%20Password%20Change%20in%20StylemixThemes%20Motors%20-%20Car%20Dealer%2C%20Rental%20%26%20Listing%20WordPress%20theme&amp;severity=critical&amp;id=682cd0f71484d88663aeb0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44898-n-a-in-n-a-2430d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44898%3A%20n%2Fa&amp;severity=critical&amp;id=682d6c76d4f2164cc92430d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44897-n-a-in-n-a-2430d1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44897%3A%20n%2Fa&amp;severity=critical&amp;id=682d6c76d4f2164cc92430d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44896-n-a-in-n-a-2430cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44896%3A%20n%2Fa&amp;severity=critical&amp;id=682d6c76d4f2164cc92430cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44894-n-a-in-n-a-2430cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44894%3A%20n%2Fa&amp;severity=critical&amp;id=682d6c76d4f2164cc92430cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44891-n-a-in-n-a-2430cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44891%3A%20n%2Fa&amp;severity=critical&amp;id=682d6c76d4f2164cc92430cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44883-n-a-in-n-a-b397b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44883%3A%20n%2Fa&amp;severity=critical&amp;id=682ce77b4d7c5ea9f4b397b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44882-n-a-in-n-a-b397b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44882%3A%20n%2Fa&amp;severity=critical&amp;id=682ce77b4d7c5ea9f4b397b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44880-n-a-in-n-a-b397af</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44880%3A%20n%2Fa&amp;severity=critical&amp;id=682ce77b4d7c5ea9f4b397af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44888-n-a-in-n-a-b3934d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44888%3A%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b3934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44887-n-a-in-n-a-b3934b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44887%3A%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b3934b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44886-n-a-in-n-a-b39349</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44886%3A%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b39349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44884-n-a-in-n-a-b39347</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44884%3A%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b39347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44881-n-a-in-n-a-b39345</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44881%3A%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b39345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44893-n-a-in-n-a-b389ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44893%3A%20n%2Fa&amp;severity=critical&amp;id=682ce08d4d7c5ea9f4b389ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44890-n-a-in-n-a-b389ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44890%3A%20n%2Fa&amp;severity=critical&amp;id=682ce08d4d7c5ea9f4b389ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44885-n-a-in-n-a-b389eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44885%3A%20n%2Fa&amp;severity=critical&amp;id=682ce08d4d7c5ea9f4b389eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26086-n-a-in-n-a-aeaf31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26086%3A%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeaf31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44084-n-a-in-n-a-aeae03</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44084%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeae03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45862-n-a-in-n-a-aeaca6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45862%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeaca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53359-n-a-in-n-a-aeac95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53359%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeac95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3079-cwe-522-insufficiently-protected-credentials-in-canon-inc-imagerunner-series-aeb0c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3079%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Canon%20Inc.%20imageRUNNER%20Series&amp;severity=medium&amp;id=682cd0f71484d88663aeb0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3078-cwe-522-insufficiently-protected-credentials-in-canon-inc-imagerunner-advance-series-aeb0c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3078%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Canon%20Inc.%20imageRUNNER%20ADVANCE%20Series&amp;severity=medium&amp;id=682cd0f71484d88663aeb0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4971-cwe-426-untrusted-search-path-in-broadcom-automic-automation-aeb0d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4971%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Broadcom%20Automic%20Automation&amp;severity=high&amp;id=682cd0f71484d88663aeb0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1308-cwe-116-improper-encoding-or-escaping-of-output-in-pure-storage-px-backup-aeb098</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1308%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Pure%20Storage%20PX%20Backup&amp;severity=high&amp;id=682cd0f71484d88663aeb098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3223-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-ge-vernova-workstationst-aeb16f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3223%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GE%20Vernova%20WorkstationST&amp;severity=medium&amp;id=682cd0f71484d88663aeb16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48340-cwe-352-cross-site-request-forgery-csrf-in-danny-vink-user-profile-meta-manager-aeb44f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48340%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Danny%20Vink%20User%20Profile%20Meta%20Manager&amp;severity=null&amp;id=682cd0f81484d88663aeb44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31027-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jocoxdesign-tiger-aeb3be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31027%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jocoxdesign%20Tiger&amp;severity=high&amp;id=682cd0f81484d88663aeb3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32924-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-roninwp-revy-aeb3cb</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32924%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roninwp%20Revy&amp;severity=null&amp;id=682cd0f81484d88663aeb3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32925-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-fantasticplugins-sumo-reward-points-aeb3cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32925%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20FantasticPlugins%20SUMO%20Reward%20Points&amp;severity=null&amp;id=682cd0f81484d88663aeb3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32926-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-themegoods-grand-restaurant-wordpress-aeb3cf</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32926%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=null&amp;id=682cd0f81484d88663aeb3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32927-cwe-502-deserialization-of-untrusted-data-in-chimpstudio-foodbakery-aeb3d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32927%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Chimpstudio%20FoodBakery&amp;severity=null&amp;id=682cd0f81484d88663aeb3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32928-cwe-502-deserialization-of-untrusted-data-in-themegoods-altair-aeb3d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32928%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Altair&amp;severity=null&amp;id=682cd0f81484d88663aeb3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39348-cwe-502-deserialization-of-untrusted-data-in-themegoods-grand-restaurant-wordpress-aeb3d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39348%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=null&amp;id=682cd0f81484d88663aeb3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39349-cwe-502-deserialization-of-untrusted-data-in-potenzaglobalsolutions-ciyashop-aeb3d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39349%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Potenzaglobalsolutions%20CiyaShop&amp;severity=null&amp;id=682cd0f81484d88663aeb3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39350-cwe-862-missing-authorization-in-rocket-apps-wproject-aeb3d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39350%3A%20CWE-862%20Missing%20Authorization%20in%20Rocket%20Apps%20wProject&amp;severity=high&amp;id=682cd0f81484d88663aeb3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39352-cwe-862-missing-authorization-in-themegoods-grand-restaurant-wordpress-aeb3db</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39352%3A%20Missing%20Authorization%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=null&amp;id=682cd0f81484d88663aeb3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39354-cwe-502-deserialization-of-untrusted-data-in-themegoods-grand-conference-aeb3dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39354%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Conference&amp;severity=null&amp;id=682cd0f81484d88663aeb3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39355-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-roninwp-fat-services-booking-aeb3ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39355%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roninwp%20FAT%20Services%20Booking&amp;severity=null&amp;id=682cd0f81484d88663aeb3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39356-cwe-502-deserialization-of-untrusted-data-in-chimpstudio-foodbakery-sticky-cart-aeb3ec</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39356%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Chimpstudio%20Foodbakery%20Sticky%20Cart&amp;severity=null&amp;id=682cd0f81484d88663aeb3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39357-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-hospital-management-system-aeb3ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39357%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=null&amp;id=682cd0f81484d88663aeb3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46441-cwe-35-path-traversal-in-ctltwp-section-widget-aeb44d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46441%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20ctltwp%20Section%20Widget&amp;severity=null&amp;id=682cd0f81484d88663aeb44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39365-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rocket-apps-wproject-aeb3f0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39365%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rocket%20Apps%20wProject&amp;severity=high&amp;id=682cd0f81484d88663aeb3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39366-cwe-266-incorrect-privilege-assignment-in-rocket-apps-wproject-aeb3f2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39366%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Rocket%20Apps%20wProject&amp;severity=high&amp;id=682cd0f81484d88663aeb3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39372-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-elbisnero-wordpress-events-calendar-registration-tickets-aeb3f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39372%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elbisnero%20WordPress%20Events%20Calendar%20Registration%20%26%20Tickets&amp;severity=null&amp;id=682cd0f81484d88663aeb3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39380-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-mojoomla-hospital-management-system-aeb3fc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39380%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=null&amp;id=682cd0f81484d88663aeb3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39386-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-hospital-management-system-aeb409</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39386%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=null&amp;id=682cd0f81484d88663aeb409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39389-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-solid-plugins-analyticswp-aeb40b</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39389%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Solid%20Plugins%20AnalyticsWP&amp;severity=critical&amp;id=682cd0f81484d88663aeb40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39392-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mojoomla-wpams-aeb40d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47949-cwe-347-improper-verification-of-cryptographic-signature-in-tngan-samlify-aeb182</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47949%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20tngan%20samlify&amp;severity=critical&amp;id=682cd0f71484d88663aeb182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39393-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mojoomla-hospital-management-system-aeb40f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39393%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=null&amp;id=682cd0f81484d88663aeb40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39395-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-wpams-aeb411</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39395%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39401-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-mojoomla-wpams-aeb417</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39401%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47946-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-symfony-ux-aeb180</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47946%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20symfony%20ux&amp;severity=medium&amp;id=682cd0f71484d88663aeb180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39402-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-mojoomla-wpams-aeb419</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39402%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47944-cwe-248-uncaught-exception-in-expressjs-multer-aeb16d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47944%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20expressjs%20multer&amp;severity=high&amp;id=682cd0f71484d88663aeb16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47935-cwe-401-missing-release-of-memory-after-effective-lifetime-in-expressjs-multer-aeb4a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47935%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20expressjs%20multer&amp;severity=high&amp;id=682cd0f81484d88663aeb4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39403-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-wpams-aeb41b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39403%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39405-cwe-266-incorrect-privilege-assignment-in-mojoomla-wpams-aeb428</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39405%3A%20Incorrect%20Privilege%20Assignment%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39406-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-mojoomla-wpams-aeb42a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39406%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39407-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-caseproof-llc-memberpress-aeb42c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39407%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Caseproof%2C%20LLC%20Memberpress&amp;severity=high&amp;id=682cd0f81484d88663aeb42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39409-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pressaholic-wordpress-video-robot-the-ultimate-video-importer-aeb42e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39409%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pressaholic%20WordPress%20Video%20Robot%20-%20The%20Ultimate%20Video%20Importer&amp;severity=high&amp;id=682cd0f81484d88663aeb42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39410-cwe-502-deserialization-of-untrusted-data-in-themegusta-smart-sections-theme-builder-wpbakery-page-builder-addon-aeb430</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39410%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themegusta%20Smart%20Sections%20Theme%20Builder%20-%20WPBakery%20Page%20Builder%20Addon&amp;severity=critical&amp;id=682cd0f81484d88663aeb430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39411-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-indie-plugins-whatsapp-click-to-chat-plugin-for-wordpress-aeb432</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39411%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Indie_Plugins%20WhatsApp%20Click%20to%20Chat%20Plugin%20for%20WordPress&amp;severity=null&amp;id=682cd0f81484d88663aeb432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47934-cwe-347-improper-verification-of-cryptographic-signature-in-openpgpjs-openpgpjs-aeb17e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47934%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20openpgpjs%20openpgpjs&amp;severity=high&amp;id=682cd0f71484d88663aeb17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39445-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-highwarden-super-store-finder-aeb434</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39445%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=682cd0f81484d88663aeb434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39446-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pluggabl-llc-booster-plus-for-woocommerce-aeb436</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39446%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pluggabl%20LLC%20Booster%20Plus%20for%20WooCommerce&amp;severity=high&amp;id=682cd0f81484d88663aeb436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47284-cwe-150-improper-neutralization-of-escape-meta-or-control-sequences-in-gardener-gardener-aeb171</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47284%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20gardener%20gardener&amp;severity=critical&amp;id=682cd0f71484d88663aeb171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39447-cwe-862-missing-authorization-in-crocoblock-jetelements-for-elementor-aeb438</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39447%3A%20Missing%20Authorization%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=682cd0f81484d88663aeb438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39449-cwe-862-missing-authorization-in-crocoblock-jetwoobuilder-aeb43a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39449%3A%20Missing%20Authorization%20in%20Crocoblock%20JetWooBuilder&amp;severity=null&amp;id=682cd0f81484d88663aeb43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39451-cwe-862-missing-authorization-in-crocoblock-jetblocks-for-elementor-aeb495</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39451%3A%20Missing%20Authorization%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=null&amp;id=682cd0f81484d88663aeb495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39458-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-mikado-themes-foton-aeb497</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39458%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Foton&amp;severity=null&amp;id=682cd0f81484d88663aeb497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39459-cwe-266-incorrect-privilege-assignment-in-contempo-themes-real-estate-7-aeb4a4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39459%3A%20Incorrect%20Privilege%20Assignment%20in%20contempoinc%20Real%20Estate%207&amp;severity=null&amp;id=682cd0f81484d88663aeb4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47283-cwe-20-improper-input-validation-in-gardener-gardener-aeb16b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47283%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20gardener%20gardener&amp;severity=critical&amp;id=682cd0f71484d88663aeb16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43832-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-andreyk-remote-images-grabber-aeb447</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43832%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andreyk%20Remote%20Images%20Grabber&amp;severity=null&amp;id=682cd0f81484d88663aeb447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43836-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-confuzzledduck-syndicate-out-aeb4c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43836%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20confuzzledduck%20Syndicate%20Out&amp;severity=null&amp;id=682cd0f81484d88663aeb4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43837-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-binti76-total-donations-aeb4c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43837%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20binti76%20Total%20Donations&amp;severity=null&amp;id=682cd0f81484d88663aeb4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43838-cwe-862-missing-authorization-in-choplugins-custom-pc-builder-lite-for-woocommerce-aeb4cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43838%3A%20Missing%20Authorization%20in%20ChoPlugins.com%20Custom%20PC%20Builder%20Lite%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43839-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-shanebp-bp-messages-tool-aeb4b0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43839%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanebp%20BP%20Messages%20Tool&amp;severity=null&amp;id=682cd0f81484d88663aeb4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47577-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-templateinvaders-ti-woocommerce-wishlist-aeb4b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47577%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=null&amp;id=682cd0f81484d88663aeb4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47581-cwe-502-deserialization-of-untrusted-data-in-elbisnero-wordpress-events-calendar-registration-tickets-aeb4b4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47581%3A%20Deserialization%20of%20Untrusted%20Data%20in%20elbisnero%20WordPress%20Events%20Calendar%20Registration%20%26%20Tickets&amp;severity=null&amp;id=682cd0f81484d88663aeb4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47582-cwe-502-deserialization-of-untrusted-data-in-quantumcloud-wpbot-pro-wordpress-chatbot-aeb503</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47582%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20QuantumCloud%20WPBot%20Pro%20Wordpress%20Chatbot&amp;severity=critical&amp;id=682cd0f81484d88663aeb503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27010-cwe-35-path-traversal-in-bslthemes-tastyc-aeb4aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27010%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20bslthemes%20Tastyc&amp;severity=null&amp;id=682cd0f81484d88663aeb4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26997-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-validas-wireless-butler-aeb4f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26997%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20validas%20Wireless%20Butler&amp;severity=null&amp;id=682cd0f81484d88663aeb4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26892-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-dkszone-celestial-aura-aeb4ee</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26892%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dkszone%20Celestial%20Aura&amp;severity=critical&amp;id=682cd0f81484d88663aeb4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26872-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-dkszone-eximius-aeb3bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26872%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dkszone%20Eximius&amp;severity=critical&amp;id=682cd0f81484d88663aeb3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26735-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-candid-themes-grip-aeb3ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26735%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Candid%20themes%20Grip&amp;severity=high&amp;id=682cd0f81484d88663aeb3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22287-cwe-862-missing-authorization-in-eniture-technology-ltl-freight-quotes-freightquote-edition-aeb140</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22287%3A%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20FreightQuote%20Edition&amp;severity=null&amp;id=682cd0f71484d88663aeb140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47282-cwe-20-improper-input-validation-in-gardener-external-dns-management-aeb169</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47282%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20gardener%20external-dns-management&amp;severity=critical&amp;id=682cd0f71484d88663aeb169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39448-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-crocoblock-jetelements-for-elementor-aeb146</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=682cd0f71484d88663aeb146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39450-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-crocoblock-jettabs-aeb148</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTabs&amp;severity=null&amp;id=682cd0f71484d88663aeb148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39454-cwe-862-missing-authorization-in-jeroen-peters-name-directory-aeb14a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39454%3A%20Missing%20Authorization%20in%20Jeroen%20Peters%20Name%20Directory&amp;severity=null&amp;id=682cd0f71484d88663aeb14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39460-cwe-862-missing-authorization-in-thimpress-eduma-aeb14c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39460%3A%20Missing%20Authorization%20in%20ThimPress%20Eduma&amp;severity=null&amp;id=682cd0f71484d88663aeb14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43833-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-amir-helzer-absolute-links-aeb0ca</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43833%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Amir%20Helzer%20Absolute%20Links&amp;severity=null&amp;id=682cd0f71484d88663aeb0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43834-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tox82-cookiebar-aeb161</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43834%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tox82%20cookieBAR&amp;severity=null&amp;id=682cd0f71484d88663aeb161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43835-cwe-352-cross-site-request-forgery-csrf-in-ktsvetkov-wp-cyr-cho-aeb163</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43835%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ktsvetkov%20wp-cyr-cho&amp;severity=null&amp;id=682cd0f71484d88663aeb163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39412-cwe-862-missing-authorization-in-averta-master-slider-aeb144</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39412%3A%20Missing%20Authorization%20in%20averta%20Master%20Slider&amp;severity=null&amp;id=682cd0f71484d88663aeb144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39398-cwe-862-missing-authorization-in-themovation-hotel-bed-and-breakfast-booking-calendar-theme-bellevue-aeb415</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39398%3A%20Missing%20Authorization%20in%20Themovation%20Bellevue&amp;severity=null&amp;id=682cd0f81484d88663aeb415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39396-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-crocoblock-jetreviews-aeb413</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39396%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Crocoblock%20JetReviews&amp;severity=null&amp;id=682cd0f81484d88663aeb413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43841-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jamesdbruner-wp-vegas-aeb44b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43841%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jamesdbruner%20WP%20Vegas&amp;severity=null&amp;id=682cd0f81484d88663aeb44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43840-cwe-352-cross-site-request-forgery-csrf-in-ref-checkbot-aeb449</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43840%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ref%20CheckBot&amp;severity=null&amp;id=682cd0f81484d88663aeb449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46262-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-zack-katz-mad-mimi-for-wordpress-aeb165</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46262%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zack%20Katz%20Mad%20Mimi%20for%20WordPress&amp;severity=null&amp;id=682cd0f71484d88663aeb165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46263-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-lloyd-saunders-author-box-after-posts-aeb167</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46263%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lloyd%20Saunders%20Author%20Box%20After%20Posts&amp;severity=null&amp;id=682cd0f71484d88663aeb167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46543-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-charly-leetham-enhanced-paypal-shortcodes-aeb0cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CharlyLeetham%20Enhanced%20Paypal%20Shortcodes&amp;severity=null&amp;id=682cd0f71484d88663aeb0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4945-integer-overflow-or-wraparound-in-red-hat-red-hat-enterprise-linux-6-aeb0d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4945%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=low&amp;id=682cd0f71484d88663aeb0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4941-sql-injection-in-phpgurukul-credit-card-application-management-system-aeb0d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4941%3A%20SQL%20Injection%20in%20PHPGurukul%20Credit%20Card%20Application%20Management%20System&amp;severity=medium&amp;id=682cd0f71484d88663aeb0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39394-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-solid-plugins-analyticswp-aeb0c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39394%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Solid%20Plugins%20AnalyticsWP&amp;severity=medium&amp;id=682cd0f71484d88663aeb0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26920-cwe-862-missing-authorization-in-pressmaximum-customify-aeb0b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26920%3A%20Missing%20Authorization%20in%20pressmaximum%20Customify&amp;severity=null&amp;id=682cd0f71484d88663aeb0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26867-cwe-862-missing-authorization-in-themes4wp-bulk-aeb0b1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26867%3A%20CWE-862%20Missing%20Authorization%20in%20Themes4WP%20Bulk&amp;severity=medium&amp;id=682cd0f71484d88663aeb0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39388-cwe-862-missing-authorization-in-solid-plugins-analyticswp-aeb0b7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39388%3A%20CWE-862%20Missing%20Authorization%20in%20Solid%20Plugins%20AnalyticsWP&amp;severity=medium&amp;id=682cd0f71484d88663aeb0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39376-cwe-862-missing-authorization-in-quanticalabs-car-park-booking-system-for-wordpress-aeb0b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39376%3A%20Missing%20Authorization%20in%20QuanticaLabs%20Car%20Park%20Booking%20System%20for%20WordPress&amp;severity=null&amp;id=682cd0f71484d88663aeb0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39375-cwe-352-cross-site-request-forgery-csrf-in-ashok-g-easy-child-theme-creator-aeb3fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39375%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ashok%20G%20Easy%20Child%20Theme%20Creator&amp;severity=null&amp;id=682cd0f81484d88663aeb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39374-cwe-352-cross-site-request-forgery-csrf-in-aseem1234-best-posts-summary-aeb3f8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39374%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aseem1234%20Best%20Posts%20Summary&amp;severity=null&amp;id=682cd0f81484d88663aeb3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39373-cwe-862-missing-authorization-in-jegtheme-jnews-aeb3f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39373%3A%20Missing%20Authorization%20in%20jegtheme%20JNews&amp;severity=null&amp;id=682cd0f81484d88663aeb3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39371-cwe-352-cross-site-request-forgery-csrf-in-sanjeev-mohindra-author-box-plugin-with-different-description-aeb55e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39371%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sanjeev%20Mohindra%20Author%20Box%20Plugin%20With%20Different%20Description&amp;severity=null&amp;id=682cd0f81484d88663aeb55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39370-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-cnilsson-icafe-library-aeb551</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39370%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cnilsson%20iCafe%20Library&amp;severity=null&amp;id=682cd0f81484d88663aeb551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39369-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sihibbs-posts-for-page-aeb54f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39369%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sihibbs%20Posts%20for%20Page&amp;severity=null&amp;id=682cd0f81484d88663aeb54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39368-cwe-862-missing-authorization-in-ed4becky-rootspersona-aeb54d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39368%3A%20Missing%20Authorization%20in%20ed4becky%20Rootspersona&amp;severity=null&amp;id=682cd0f81484d88663aeb54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4940-sql-injection-in-1000-projects-daily-college-class-work-report-book-aeb562</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4940%3A%20SQL%20Injection%20in%201000%20Projects%20Daily%20College%20Class%20Work%20Report%20Book&amp;severity=medium&amp;id=682cd0f81484d88663aeb562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39353-cwe-862-missing-authorization-in-themegoods-grand-restaurant-wordpress-aeb54b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39353%3A%20Missing%20Authorization%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=null&amp;id=682cd0f81484d88663aeb54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39351-cwe-352-cross-site-request-forgery-csrf-in-themegoods-grand-restaurant-wordpress-aeb549</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39351%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=null&amp;id=682cd0f81484d88663aeb549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39364-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-pluginever-product-category-slider-for-woocommerce-aeb56e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PluginEver%20Product%20Category%20Slider%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47576-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-bringthepixel-bimber-viral-magazine-wordpress-theme-aeb570</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47576%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Bringthepixel%20Bimber%20-%20Viral%20Magazine%20WordPress%20Theme&amp;severity=high&amp;id=682cd0f81484d88663aeb570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47583-cwe-352-cross-site-request-forgery-csrf-in-dimitri-grassi-salon-booking-system-aeb583</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47583%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=null&amp;id=682cd0f81484d88663aeb583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32920-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-templateinvaders-ti-woocommerce-wishlist-aeb56c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=null&amp;id=682cd0f81484d88663aeb56c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4876-cwe-798-use-of-hard-coded-credentials-in-connectwise-risk-assessment-aeb57d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4876%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ConnectWise%20Risk%20Assessment&amp;severity=medium&amp;id=682cd0f81484d88663aeb57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23988-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bruno-cavalcante-ghostwriter-aeb526</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bruno%20Cavalcante%20Ghostwriter&amp;severity=high&amp;id=682cd0f81484d88663aeb526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23986-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-fyrewurks-tiki-time-aeb524</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fyrewurks%20Tiki%20Time&amp;severity=high&amp;id=682cd0f81484d88663aeb524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23983-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tijaji-tijaji-aeb520</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tijaji%20Tijaji&amp;severity=high&amp;id=682cd0f81484d88663aeb520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26621-cwe-94-improper-control-of-generation-of-code-code-injection-in-opencti-platform-opencti-aeb511</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26621%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenCTI-Platform%20opencti&amp;severity=high&amp;id=682cd0f81484d88663aeb511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23981-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-takimi-themes-carzine-aeb50b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Takimi%20Themes%20CarZine&amp;severity=high&amp;id=682cd0f81484d88663aeb50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23979-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-duwasai-flashy-aeb509</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23979%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duwasai%20Flashy&amp;severity=high&amp;id=682cd0f81484d88663aeb509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22792-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jinwen-js-o3-lite-aeb507</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22792%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jinwen%20Js%20O3%20Lite&amp;severity=high&amp;id=682cd0f81484d88663aeb507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22791-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-twh-offset-writing-aeb545</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22791%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twh%20offset%20writing&amp;severity=high&amp;id=682cd0f81484d88663aeb545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24184-an-app-may-be-able-to-cause-unexpected-system-termination-in-apple-visionos-aeb547</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24184%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0f81484d88663aeb547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24189-processing-maliciously-crafted-web-content-may-lead-to-memory-corruption-in-apple-visionos-aeb1a5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24189%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682cd0f71484d88663aeb1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24183-a-local-user-may-be-able-to-modify-protected-parts-of-the-file-system-in-apple-macos-aeb566</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24183%3A%20A%20local%20user%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0f81484d88663aeb566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31185-photos-in-the-hidden-photos-album-may-be-viewed-without-authentication-in-apple-ios-and-ipados-aeb568</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31185%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=682cd0f81484d88663aeb568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31262-an-app-may-be-able-to-modify-protected-parts-of-the-file-system-in-apple-visionos-aeb56a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31262%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0f81484d88663aeb56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4939-cross-site-scripting-in-phpgurukul-credit-card-application-management-system-aeb560</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4939%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Credit%20Card%20Application%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22790-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-asmedia-moseter-aeb4ec</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22790%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20asmedia%20moseter&amp;severity=high&amp;id=682cd0f81484d88663aeb4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22789-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-fyrewurks-polka-dots-aeb4ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22789%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fyrewurks%20polka%20dots&amp;severity=high&amp;id=682cd0f81484d88663aeb4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22687-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-asmedia-tuaug4-aeb4e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Asmedia%20Tuaug4&amp;severity=high&amp;id=682cd0f81484d88663aeb4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22678-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mythemes-my-white-aeb4e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22678%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mythemes%20my%20white&amp;severity=high&amp;id=682cd0f81484d88663aeb4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4948-integer-underflow-wrap-or-wraparound-in-red-hat-red-hat-enterprise-linux-6-aeb564</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4948%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)&amp;severity=high&amp;id=682cd0f81484d88663aeb564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33939-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-masteriyo-masteriyo-lms-aeb543</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33939%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=null&amp;id=682cd0f81484d88663aeb543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4938-sql-injection-in-phpgurukul-employee-record-management-system-aeb5a6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4938%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4937-sql-injection-in-sourcecodester-apartment-visitor-management-system-aeb6dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4937%3A%20SQL%20Injection%20in%20SourceCodester%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3908-cwe-59-improper-link-resolution-before-file-access-link-following-in-openvpn-openvpn-3-linux-aeac99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3908%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20OpenVPN%20OpenVPN%203%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48346-cwe-862-missing-authorization-in-etsy360-embed-and-integrate-etsy-shop-aeb6e4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48346%3A%20Missing%20Authorization%20in%20Embed360%20Embed%20and%20Integrate%20Etsy%20Shop&amp;severity=null&amp;id=682cd0f81484d88663aeb6e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48344-cwe-352-cross-site-request-forgery-csrf-in-ed4becky-rootspersona-aeb683</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ed4becky%20Rootspersona&amp;severity=null&amp;id=682cd0f81484d88663aeb683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48342-cwe-352-cross-site-request-forgery-csrf-in-redefiningtheweb-dynamic-pricing-amp-discounts-lite-for-woocommerce-aeb681</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RedefiningTheWeb%20Dynamic%20Pricing%20%26amp%3B%20Discounts%20Lite%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48341-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-10web-form-maker-by-10web-aeb67f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010Web%20Form%20Maker%20by%2010Web&amp;severity=null&amp;id=682cd0f81484d88663aeb67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48288-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-element-invader-elementinvader-addons-for-elementor-aeb67d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48288%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=682cd0f81484d88663aeb67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48285-cwe-352-cross-site-request-forgery-csrf-in-sbouey-falang-multilanguage-aeb67b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48285%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sbouey%20Falang%20multilanguage&amp;severity=null&amp;id=682cd0f81484d88663aeb67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48284-cwe-352-cross-site-request-forgery-csrf-in-shohei-tanaka-japanized-for-woocommerce-aeb679</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48284%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shohei.tanaka%20Japanized%20For%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48282-cwe-862-missing-authorization-in-majestic-support-majestic-support-aeb677</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48282%3A%20CWE-862%20Missing%20Authorization%20in%20Majestic%20Support%20Majestic%20Support&amp;severity=medium&amp;id=682cd0f81484d88663aeb677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48280-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-ruben-garcia-automatorwp-aeb675</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48280%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ruben%20Garcia%20AutomatorWP&amp;severity=null&amp;id=682cd0f81484d88663aeb675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48278-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-davidfcarr-rsvpmarker-aeb668</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48278%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20davidfcarr%20RSVPMarker&amp;severity=null&amp;id=682cd0f81484d88663aeb668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48277-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-stylemix-cost-calculator-builder-aeb666</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48277%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stylemix%20Cost%20Calculator%20Builder&amp;severity=null&amp;id=682cd0f81484d88663aeb666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48276-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-visual-composer-visual-composer-website-builder-aeb664</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48276%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Visual%20Composer%20Visual%20Composer%20Website%20Builder&amp;severity=null&amp;id=682cd0f81484d88663aeb664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48272-cwe-862-missing-authorization-in-wpjobportal-wp-job-portal-aeb662</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48272%3A%20Missing%20Authorization%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=682cd0f81484d88663aeb662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48270-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sonalsinha21-skt-blocks-aeb660</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48270%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=682cd0f81484d88663aeb660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48269-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-greg-winiarski-wpadverts-aeb65e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48269%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=682cd0f81484d88663aeb65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48268-cwe-862-missing-authorization-in-guru-team-bot-for-telegram-on-woocommerce-aeb65c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48268%3A%20Missing%20Authorization%20in%20Guru%20Team%20Bot%20for%20Telegram%20on%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48266-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-realmag777-active-products-tables-for-woocommerce-aeb65a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20Active%20Products%20Tables%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48265-cwe-352-cross-site-request-forgery-csrf-in-pektsekye-year-make-model-search-for-woocommerce-aeb658</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48265%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pektsekye%20Year%20Make%20Model%20Search%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48264-cwe-352-cross-site-request-forgery-csrf-in-artiosmedia-product-code-for-woocommerce-aeb656</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48264%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20artiosmedia%20Product%20Code%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48263-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-multivendorx-multivendorx-aeb649</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MultiVendorX%20MultiVendorX&amp;severity=medium&amp;id=682cd0f81484d88663aeb649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48262-cwe-862-missing-authorization-in-michael-revellin-clerc-url-rewrite-analyzer-aeb647</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48262%3A%20Missing%20Authorization%20in%20M.Code%20Url%20Rewrite%20Analyzer&amp;severity=null&amp;id=682cd0f81484d88663aeb647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48260-cwe-862-missing-authorization-in-ninja-team-gdpr-ccpa-compliance-support-aeb645</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48260%3A%20Missing%20Authorization%20in%20Ninja%20Team%20GDPR%20CCPA%20Compliance%20Support&amp;severity=null&amp;id=682cd0f81484d88663aeb645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48259-cwe-352-cross-site-request-forgery-csrf-in-juan-carlos-wp-mapa-politico-espa-a-aeb643</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48259%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Juan%20Carlos%20WP%20Mapa%20Politico%20Espa%C3%B1a&amp;severity=null&amp;id=682cd0f81484d88663aeb643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48258-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jetmonsters-mega-menu-block-aeb641</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48258%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20Mega%20Menu%20Block&amp;severity=null&amp;id=682cd0f81484d88663aeb641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48257-cwe-862-missing-authorization-in-projectopia-projectopia-aeb63f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48257%3A%20CWE-862%20Missing%20Authorization%20in%20Projectopia%20Projectopia&amp;severity=medium&amp;id=682cd0f81484d88663aeb63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48256-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xylus-themes-import-social-events-aeb63d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48256%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xylus%20Themes%20Import%20Social%20Events&amp;severity=null&amp;id=682cd0f81484d88663aeb63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48255-cwe-352-cross-site-request-forgery-csrf-in-videowhisper-broadcast-live-video-live-streaming-webrtc-hls-rtsp-rtmp-aeb63b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48255%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20videowhisper%20Broadcast%20Live%20Video&amp;severity=null&amp;id=682cd0f81484d88663aeb63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48254-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-change-add-to-cart-button-text-for-woocommerce-aeb639</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48254%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Change%20Add%20to%20Cart%20Button%20Text%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48253-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-free-shipping-bar-amount-left-for-free-shipping-for-woocommerce-aeb637</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48253%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Free%20Shipping%20Bar%3A%20Amount%20Left%20for%20Free%20Shipping%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48252-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-back-button-widget-aeb62a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48252%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Back%20Button%20Widget&amp;severity=null&amp;id=682cd0f81484d88663aeb62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48251-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-additional-custom-emails-amp-recipients-for-woocommerce-aeb628</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48251%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Additional%20Custom%20Emails%20%26amp%3B%20Recipients%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48250-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-coupons-amp-add-to-cart-by-url-links-for-woocommerce-aeb626</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48250%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Coupons%20%26amp%3B%20Add%20to%20Cart%20by%20URL%20Links%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48249-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-ean-for-woocommerce-aeb624</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48249%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20EAN%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48248-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-sitewide-discount-for-woocommerce-apply-discount-to-all-products-aeb622</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48248%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Sitewide%20Discount%20for%20WooCommerce%3A%20Apply%20Discount%20to%20All%20Products&amp;severity=null&amp;id=682cd0f81484d88663aeb622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48247-cwe-862-missing-authorization-in-blair-williams-shortlinks-by-pretty-links-aeb620</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48247%3A%20Missing%20Authorization%20in%20Blair%20Williams%20Shortlinks%20by%20Pretty%20Links&amp;severity=null&amp;id=682cd0f81484d88663aeb620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48246-cwe-862-missing-authorization-in-the-events-calendar-the-events-calendar-aeb61e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48246%3A%20Missing%20Authorization%20in%20StellarWP%20The%20Events%20Calendar&amp;severity=null&amp;id=682cd0f81484d88663aeb61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48244-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tim-strifler-exclusive-addons-elementor-aeb61c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48244%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tim%20Strifler%20Exclusive%20Addons%20Elementor&amp;severity=null&amp;id=682cd0f81484d88663aeb61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48243-cwe-352-cross-site-request-forgery-csrf-in-bill-minozzi-recaptcha-for-all-aeb61a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48243%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sminozzi%20reCAPTCHA%20for%20all&amp;severity=null&amp;id=682cd0f81484d88663aeb61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48242-cwe-862-missing-authorization-in-wpwax-legal-pages-aeb618</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48242%3A%20Missing%20Authorization%20in%20wpWax%20Legal%20Pages&amp;severity=null&amp;id=682cd0f81484d88663aeb618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48240-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-cost-of-goods-for-woocommerce-aeb60b</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Cost%20of%20Goods%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48239-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-product-notes-tab-private-admin-notes-for-woocommerce-aeb609</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Product%20Notes%20Tab%20%26%20Private%20Admin%20Notes%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48238-cwe-352-cross-site-request-forgery-csrf-in-awcode-awcode-toolkit-aeb607</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48238%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20awcode%20AWcode%20Toolkit&amp;severity=null&amp;id=682cd0f81484d88663aeb607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48237-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-wishlist-for-woocommerce-aeb605</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Wishlist%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48236-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bunny-net-bunny-net-aeb603</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bunny.net%20bunny.net&amp;severity=high&amp;id=682cd0f81484d88663aeb603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48235-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bogdan-bendziukov-wp-image-mask-aeb601</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bogdan%20Bendziukov%20WP%20Image%20Mask&amp;severity=null&amp;id=682cd0f81484d88663aeb601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48234-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ultimate-blocks-ultimate-blocks-aeb5ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48234%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ultimate%20Blocks%20Ultimate%20Blocks&amp;severity=medium&amp;id=682cd0f81484d88663aeb5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48233-cwe-352-cross-site-request-forgery-csrf-in-affmngr-affiliates-manager-google-recaptcha-integration-aeb5fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48233%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20affmngr%20Affiliates%20Manager%20Google%20reCAPTCHA%20Integration&amp;severity=null&amp;id=682cd0f81484d88663aeb5fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48232-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xpro-xpro-addons-for-beaver-builder-8211-lite-aeb5fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48232%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xpro%20Xpro%20Addons%20For%20Beaver%20Builder%20%26%238211%3B%20Lite&amp;severity=null&amp;id=682cd0f81484d88663aeb5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4936-sql-injection-in-projectworlds-online-food-ordering-system-aeb6da</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4936%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4935-sql-injection-in-sourcecodester-stock-management-system-aeb6d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4935%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4934-sql-injection-in-phpgurukul-user-registration-login-and-user-management-system-aeb6d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4934%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4933-sql-injection-in-ponaravindb-hospital-management-system-aeb858</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4933%3A%20SQL%20Injection%20in%20ponaravindb%20Hospital-Management-System&amp;severity=medium&amp;id=682cd0f81484d88663aeb858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4932-sql-injection-in-projectworlds-online-lawyer-management-system-aeb867</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4932%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Lawyer%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4931-sql-injection-in-projectworlds-online-lawyer-management-system-aeb856</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4931%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Lawyer%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4930-sql-injection-in-campcodes-online-shopping-portal-aeb854</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4930%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682cd0f81484d88663aeb854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2099-cwe-1333-inefficient-regular-expression-complexity-in-huggingface-huggingface-transformers-aeb82f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2099%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=682cd0f81484d88663aeb82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4929-sql-injection-in-campcodes-online-shopping-portal-aeb7f7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4929%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682cd0f81484d88663aeb7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4928-sql-injection-in-projectworlds-online-lawyer-management-system-aeb7f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4928%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Lawyer%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4927-sql-injection-in-phpgurukul-online-marriage-registration-system-aeb7cc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4927%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Marriage%20Registration%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rat-dropped-by-two-layers-of-autoit-code-16a09c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code&amp;severity=medium&amp;id=682c992c7960f6956616a09c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4926-unrestricted-upload-in-phpgurukul-car-rental-project-aeb7ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4926%3A%20Unrestricted%20Upload%20in%20PHPGurukul%20Car%20Rental%20Project&amp;severity=medium&amp;id=682cd0f81484d88663aeb7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4925-sql-injection-in-phpgurukul-daily-expense-tracker-system-aeb760</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4925%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-confluence-bites-the-dust-falling-to-elpaco-team-ransomware-16a0c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20Confluence%20Bites%20the%20Dust%3A%20Falling%20to%20ELPACO-team%20Ransomware&amp;severity=medium&amp;id=682c992c7960f6956616a0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4924-sql-injection-in-sourcecodester-client-database-management-system-aeb75e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4924%3A%20SQL%20Injection%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27566-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-appleple-inc-a-blog-cms-aeb737</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27566%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20appleple%20inc.%20a-blog%20cms&amp;severity=low&amp;id=682cd0f81484d88663aeb737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32999-cross-site-scripting-xss-in-appleple-inc-a-blog-cms-aeb5de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32999%3A%20Cross-site%20scripting%20(XSS)%20in%20appleple%20inc.%20a-blog%20cms&amp;severity=medium&amp;id=682cd0f81484d88663aeb5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36560-server-side-request-forgery-ssrf-in-appleple-inc-a-blog-cms-aeb5ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36560%3A%20Server-side%20request%20forgery%20(SSRF)%20in%20appleple%20inc.%20a-blog%20cms&amp;severity=high&amp;id=682cd0f81484d88663aeb5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41429-improper-output-neutralization-for-logs-in-appleple-inc-a-blog-cms-aeb5ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41429%3A%20Improper%20output%20neutralization%20for%20logs%20in%20appleple%20inc.%20a-blog%20cms&amp;severity=medium&amp;id=682cd0f81484d88663aeb5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4923-unrestricted-upload-in-sourcecodester-client-database-management-system-aeb5bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4923%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47760-stack-based-buffer-overflow-in-fuji-electric-co-ltd-v-sft-aeb5bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47760%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47759-stack-based-buffer-overflow-in-fuji-electric-co-ltd-s-sft-aeb58f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47759%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20S-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47758-stack-based-buffer-overflow-in-fuji-electric-co-ltd-v-sft-aeb58d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47758%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47757-out-of-bounds-read-in-fuji-electric-co-ltd-v-sft-aeb71e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47757%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47756-out-of-bounds-read-in-fuji-electric-co-ltd-v-sft-aeb71c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47756%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47755-out-of-bounds-read-in-fuji-electric-co-ltd-v-sft-aeb6f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47755%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47754-out-of-bounds-read-in-fuji-electric-co-ltd-v-sft-aeb6e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47754%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47753-out-of-bounds-read-in-fuji-electric-co-ltd-v-sft-aeb5ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47753%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47752-out-of-bounds-write-in-fuji-electric-co-ltd-v-sft-aeb5ea</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47752%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47751-out-of-bounds-write-in-fuji-electric-co-ltd-v-sft-aeb5e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47751%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47750-out-of-bounds-write-in-fuji-electric-co-ltd-v-sft-aeb5e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47750%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47749-free-of-pointer-not-at-start-of-buffer-in-fuji-electric-co-ltd-v-sft-aeb5e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47749%3A%20Free%20of%20pointer%20not%20at%20start%20of%20buffer%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4917-sql-injection-in-phpgurukul-auto-taxi-stand-management-system-aeb59e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4917%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37891-vulnerability-in-linux-linux-aeb86f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f81484d88663aeb86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46801-authentication-bypass-by-primary-weakness-in-pgpool-global-development-group-pgpool-ii-aeb58b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46801%3A%20Authentication%20bypass%20by%20primary%20weakness%20in%20PgPool%20Global%20Development%20Group%20Pgpool-II&amp;severity=critical&amp;id=682cd0f81484d88663aeb58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4916-sql-injection-in-phpgurukul-auto-taxi-stand-management-system-aeb59c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4916%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4915-sql-injection-in-phpgurukul-auto-taxi-stand-management-system-aeb871</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4915%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4914-sql-injection-in-phpgurukul-auto-taxi-stand-management-system-aeb585</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4914%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2561-cwe-79-cross-site-scripting-xss-in-unknown-ninja-forms-aeb833</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2561%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ninja%20Forms&amp;severity=medium&amp;id=682cd0f81484d88663aeb833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2560-cwe-79-cross-site-scripting-xss-in-unknown-ninja-forms-aeb831</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2560%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ninja%20Forms&amp;severity=medium&amp;id=682cd0f81484d88663aeb831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2524-cwe-79-cross-site-scripting-xss-in-unknown-ninja-forms-aeb81a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2524%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ninja%20Forms&amp;severity=medium&amp;id=682cd0f81484d88663aeb81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1627-cwe-79-cross-site-scripting-xss-in-unknown-qi-blocks-aeb814</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1627%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Qi%20Blocks&amp;severity=medium&amp;id=682cd0f81484d88663aeb814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1626-cwe-79-cross-site-scripting-xss-in-unknown-qi-blocks-aeb7af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1626%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Qi%20Blocks&amp;severity=medium&amp;id=682cd0f81484d88663aeb7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1625-cwe-79-cross-site-scripting-xss-in-unknown-qi-blocks-aeb76f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1625%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Qi%20Blocks&amp;severity=medium&amp;id=682cd0f81484d88663aeb76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4477-cwe-862-missing-authorization-in-teamt5-threatsonar-anti-ransomware-aeb852</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4477%3A%20CWE-862%20Missing%20Authorization%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=682cd0f81484d88663aeb852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4913-sql-injection-in-phpgurukul-auto-taxi-stand-management-system-aeb848</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4913%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4912-path-traversal-in-sourcecodester-student-result-management-system-aeb846</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4912%3A%20Path%20Traversal%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4911-sql-injection-in-phpgurukul-zoo-management-system-aeb7f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4911%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2892-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-smub-all-in-one-seo-powerful-seo-plugin-to-boost-seo-rankings-increase-traffic-aeb835</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20All%20in%20One%20SEO%20%E2%80%93%20Powerful%20SEO%20Plugin%20to%20Boost%20SEO%20Rankings%20%26%20Increase%20Traffic&amp;severity=medium&amp;id=682cd0f81484d88663aeb835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4910-sql-injection-in-phpgurukul-zoo-management-system-aeb839</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4910%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4909-exposure-of-information-through-directory-listing-in-sourcecodester-client-database-management-system-aeb837</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4909%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4908-sql-injection-in-phpgurukul-daily-expense-tracker-system-aeb82d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4908%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4907-sql-injection-in-phpgurukul-daily-expense-tracker-system-aeb82b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4907%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4906-sql-injection-in-phpgurukul-notice-board-system-aeb829</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4906%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4905-deserialization-in-iop-apl-uw-basestation3-aeb827</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4905%3A%20Deserialization%20in%20iop-apl-uw%20basestation3&amp;severity=medium&amp;id=682cd0f81484d88663aeb827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23122-vulnerability-in-nodejs-node-aeb816</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23122&amp;severity=low&amp;id=682cd0f81484d88663aeb816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23165-vulnerability-in-nodejs-node-aeb818</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23165%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=682cd0f81484d88663aeb818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23123-vulnerability-in-ubiquiti-inc-unifi-protect-cameras-aeb7fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23123%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Protect%20Cameras&amp;severity=critical&amp;id=682cd0f81484d88663aeb7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23166-vulnerability-in-nodejs-node-aeb7b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23166%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=682cd0f81484d88663aeb7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23164-vulnerability-in-ubiquiti-inc-unifi-protect-application-aeb718</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23164%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Protect%20Application&amp;severity=medium&amp;id=682cd0f81484d88663aeb718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23167-vulnerability-in-nodejs-node-aeb6de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23167%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=682cd0f81484d88663aeb6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4904-information-disclosure-in-d-link-di-7003gv2-aeb6d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4904%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f81484d88663aeb6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4903-unverified-password-change-in-d-link-di-7003gv2-aeb6d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4903%3A%20Unverified%20Password%20Change%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f81484d88663aeb6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4902-information-disclosure-in-d-link-di-7003gv2-aeb810</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4902%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f81484d88663aeb810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43714-n-a-in-n-a-aeb5bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43714%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55063-n-a-in-n-a-aeb5a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55063%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30072-n-a-in-n-a-aeb5a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30072%3A%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51106-n-a-in-n-a-aeb5a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51106%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28371-n-a-in-n-a-aeb589</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28371%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44108-n-a-in-n-a-aeb4f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44108%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-19-29d8f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-19&amp;severity=medium&amp;id=682c7db0e8347ec82d29d8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-19-73d1a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-19&amp;severity=medium&amp;id=682c7ab6e3e6de8ceb73d1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4901-information-disclosure-in-d-link-di-7003gv2-aeb80e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4901%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f81484d88663aeb80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4900-sql-injection-in-campcodes-sales-and-inventory-system-aeb80c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4900%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4899-sql-injection-in-campcodes-sales-and-inventory-system-aeb80a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4899%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb80a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4898-path-traversal-in-sourcecodester-student-result-management-system-aeb808</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4898%3A%20Path%20Traversal%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4897-buffer-overflow-in-tenda-a15-aeb7f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4897%3A%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=high&amp;id=682cd0f81484d88663aeb7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4896-buffer-overflow-in-tenda-ac10-aeb7ef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4896%3A%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=682cd0f81484d88663aeb7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4895-sql-injection-in-sourcecodester-doctors-appointment-system-aeb7ed</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4895%3A%20SQL%20Injection%20in%20SourceCodester%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4894-inadequate-encryption-strength-in-calmkart-django-sso-server-aeb7eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4894%3A%20Inadequate%20Encryption%20Strength%20in%20calmkart%20Django-sso-server&amp;severity=medium&amp;id=682cd0f81484d88663aeb7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4893-path-traversal-in-jammy928-coinexchange-cryptoexchange-java-aeb7e9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4893%3A%20Path%20Traversal%20in%20jammy928%20CoinExchange_CryptoExchange_Java&amp;severity=medium&amp;id=682cd0f81484d88663aeb7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4892-stack-based-buffer-overflow-in-code-projects-police-station-management-system-aeb6c5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4892%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Police%20Station%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4891-buffer-overflow-in-code-projects-police-station-management-system-aeb735</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4891%3A%20Buffer%20Overflow%20in%20code-projects%20Police%20Station%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4890-stack-based-buffer-overflow-in-code-projects-tourism-management-system-aeb4d3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4890%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Tourism%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4889-buffer-overflow-in-code-projects-tourism-management-system-aeb6c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4889%3A%20Buffer%20Overflow%20in%20code-projects%20Tourism%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4888-buffer-overflow-in-code-projects-pharmacy-management-system-aeb6c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4888%3A%20Buffer%20Overflow%20in%20code-projects%20Pharmacy%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4887-cross-site-request-forgery-in-sourcecodester-online-student-clearance-system-aeb6bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4887%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4886-sql-injection-in-itsourcecode-sales-and-inventory-system-aeb6bd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4886%3A%20SQL%20Injection%20in%20itsourcecode%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4885-sql-injection-in-itsourcecode-sales-and-inventory-system-aeb6bb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4885%3A%20SQL%20Injection%20in%20itsourcecode%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4884-sql-injection-in-itsourcecode-restaurant-management-system-aeb6b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4884%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4883-stack-based-buffer-overflow-in-d-link-di-8100-aeb7dc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4883%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=682cd0f81484d88663aeb7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4882-sql-injection-in-itsourcecode-restaurant-management-system-aeb7ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4882%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4881-sql-injection-in-itsourcecode-restaurant-management-system-aeb7bd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4881%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4880-sql-injection-in-phpgurukul-news-portal-aeb7bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4880%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=682cd0f81484d88663aeb7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4875-sql-injection-in-campcodes-online-shopping-portal-aeb7b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4875%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682cd0f81484d88663aeb7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4874-sql-injection-in-phpgurukul-news-portal-project-aeb7b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4874%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=682cd0f81484d88663aeb7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4873-sql-injection-in-phpgurukul-news-portal-aeb7b5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4873%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=682cd0f81484d88663aeb7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4872-buffer-overflow-in-freefloat-ftp-server-aeb7b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4872%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4871-buffer-overflow-in-pcman-ftp-server-aeb7ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4871%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4870-sql-injection-in-itsourcecode-restaurant-management-system-aeb79e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4870%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4869-sql-injection-in-itsourcecode-restaurant-management-system-aeb6b7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4869%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4868-path-traversal-in-merikbest-ecommerce-spring-reactjs-aeb6b5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4868%3A%20Path%20Traversal%20in%20merikbest%20ecommerce-spring-reactjs&amp;severity=medium&amp;id=682cd0f81484d88663aeb6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4867-denial-of-service-in-tenda-a15-aeb6b3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4867%3A%20Denial%20of%20Service%20in%20Tenda%20A15&amp;severity=high&amp;id=682cd0f81484d88663aeb6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4866-code-injection-in-weibocom-rill-flow-aeb4d1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4866%3A%20Code%20Injection%20in%20weibocom%20rill-flow&amp;severity=medium&amp;id=682cd0f81484d88663aeb4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4865-sql-injection-in-itsourcecode-restaurant-management-system-aeb4cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4865%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4864-sql-injection-in-itsourcecode-restaurant-management-system-aeb4cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4864%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4863-sql-injection-in-advaya-softech-gems-erp-portal-aeb125</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4863%3A%20SQL%20Injection%20in%20Advaya%20Softech%20GEMS%20ERP%20Portal&amp;severity=medium&amp;id=682cd0f71484d88663aeb125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4862-cross-site-scripting-in-phpgurukul-directory-management-system-aeb0ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4862%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=682cd0f71484d88663aeb0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-roundpress-targeting-high-value-webmail-servers-16a06e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20RoundPress%20targeting%20high-value%20webmail%20servers&amp;severity=medium&amp;id=682c992c7960f6956616a06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4861-sql-injection-in-phpgurukul-beauty-parlour-management-system-aeb79c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4861%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3715-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boldthemes-bold-page-builder-aeb771</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3715%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=682cd0f81484d88663aeb771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4860-cross-site-scripting-in-d-link-dap-2695-aeb79a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4860%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=682cd0f81484d88663aeb79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4859-cross-site-scripting-in-d-link-dap-2695-aeb798</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4859%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=682cd0f81484d88663aeb798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4858-cross-site-scripting-in-d-link-dap-2695-aeb796</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4858%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=682cd0f81484d88663aeb796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4852-cross-site-scripting-in-totolink-a3002r-aeb794</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4852%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20A3002R&amp;severity=medium&amp;id=682cd0f81484d88663aeb794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4851-command-injection-in-totolink-n300rh-aeb792</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4851%3A%20Command%20Injection%20in%20TOTOLINK%20N300RH&amp;severity=medium&amp;id=682cd0f81484d88663aeb792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4850-command-injection-in-totolink-n300rh-aeb790</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4850%3A%20Command%20Injection%20in%20TOTOLINK%20N300RH&amp;severity=medium&amp;id=682cd0f81484d88663aeb790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4849-command-injection-in-totolink-n300rh-aeb78e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4849%3A%20Command%20Injection%20in%20TOTOLINK%20N300RH&amp;severity=medium&amp;id=682cd0f81484d88663aeb78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4848-buffer-overflow-in-freefloat-ftp-server-aeb78c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4848%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4847-buffer-overflow-in-freefloat-ftp-server-aeb6a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4847%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4846-buffer-overflow-in-freefloat-ftp-server-aeb6a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4846%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4845-buffer-overflow-in-freefloat-ftp-server-aeafeb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4845%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f71484d88663aeafeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4844-buffer-overflow-in-freefloat-ftp-server-aeb6a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4844%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zyxel-usg-flex-h-series-uos-131-privilege-escalati-2977b57a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zyxel%20USG%20FLEX%20H%20series%20uOS%201.31%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489dd87e6d765d51d5353f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invision-community-506-remote-code-execution-rce-9f6b4431</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invision%20Community%205.0.6%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68489dd27e6d765d51d53467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crushftp-1131-authentication-bypass-a8a19094</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrushFTP%2011.3.1%20-%20Authentication%20Bypass&amp;severity=medium&amp;id=68489dcc7e6d765d51d53394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48219-cwe-201-insertion-of-sensitive-information-into-sent-data-in-o2-uk-o2-aeb491</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48219%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20O2%20UK%20O2&amp;severity=low&amp;id=682cd0f81484d88663aeb491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-18-29d2aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-18&amp;severity=medium&amp;id=682c7db0e8347ec82d29d2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-18-f12841</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4843-stack-based-buffer-overflow-in-d-link-dcs-932l-aeb6a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4843%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-932L&amp;severity=high&amp;id=682cd0f81484d88663aeb6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4842-stack-based-buffer-overflow-in-d-link-dcs-932l-aeb69e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4842%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-932L&amp;severity=high&amp;id=682cd0f81484d88663aeb69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4841-stack-based-buffer-overflow-in-d-link-dcs-932l-aeb69c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4841%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-932L&amp;severity=high&amp;id=682cd0f81484d88663aeb69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4839-permissive-cross-domain-policy-with-untrusted-domains-in-itwanger-paicoding-aeb77f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4839%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20itwanger%20paicoding&amp;severity=low&amp;id=682cd0f81484d88663aeb77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4838-open-redirect-in-kanwangzjm-funiture-aeb75c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4838%3A%20Open%20Redirect%20in%20kanwangzjm%20Funiture&amp;severity=medium&amp;id=682cd0f81484d88663aeb75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4919-out-of-bounds-access-when-optimizing-linear-sums-in-mozilla-firefox-aeb1ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4919%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682cd0f71484d88663aeb1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4918-out-of-bounds-access-when-resolving-promise-objects-in-mozilla-firefox-aeb1a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4918%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=682cd0f71484d88663aeb1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4921-aeb884</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4921&amp;severity=low&amp;id=682cd0f81484d88663aeb884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4920-aeb877</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4920&amp;severity=low&amp;id=682cd0f81484d88663aeb877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4837-sql-injection-in-projectworlds-student-project-allocation-system-aeb75a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4837%3A%20SQL%20Injection%20in%20projectworlds%20Student%20Project%20Allocation%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4836-sql-injection-in-projectworlds-life-insurance-management-system-aeb758</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4836%3A%20SQL%20Injection%20in%20Projectworlds%20Life%20Insurance%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4835-buffer-overflow-in-totolink-a702r-aeb756</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4835%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4834-buffer-overflow-in-totolink-a702r-aeb754</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4834%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47948-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-cocotais-cocotais-bot-aeb74e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47948%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20cocotais%20cocotais-bot&amp;severity=high&amp;id=682cd0f81484d88663aeb74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47945-cwe-453-insecure-default-variable-initialization-in-donetick-donetick-aeb720</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47945%3A%20CWE-453%3A%20Insecure%20Default%20Variable%20Initialization%20in%20donetick%20donetick&amp;severity=critical&amp;id=682cd0f81484d88663aeb720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4833-buffer-overflow-in-totolink-a702r-aeb69a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4833%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4832-buffer-overflow-in-totolink-a702r-aeb698</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4832%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4831-buffer-overflow-in-totolink-a702r-aeafde</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4831%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f71484d88663aeafde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33103-cwe-250-execution-with-unnecessary-privileges-in-ibm-i-aeb1a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33103%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges&amp;severity=high&amp;id=682cd0f71484d88663aeb1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47931-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-librenms-librenms-aeb489</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47931%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20librenms%20librenms&amp;severity=low&amp;id=682cd0f81484d88663aeb489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47273-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-pypa-setuptools-aeb71a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47273%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pypa%20setuptools&amp;severity=high&amp;id=682cd0f81484d88663aeb71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4830-buffer-overflow-in-totolink-a702r-aeb733</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4830%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4829-buffer-overflow-in-totolink-a702r-aeb731</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4829%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4827-buffer-overflow-in-totolink-a702r-aeb72f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4827%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4101-cwe-863-incorrect-authorization-in-wcmp-multivendorx-woocommerce-multivendor-marketplace-solutions-aeb722</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4101%3A%20CWE-863%20Incorrect%20Authorization%20in%20wcmp%20MultiVendorX%20%E2%80%93%20WooCommerce%20Multivendor%20Marketplace%20Solutions&amp;severity=medium&amp;id=682cd0f81484d88663aeb722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13613-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-marcinlawrowski-wise-chat-aeb6f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13613%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20marcinlawrowski%20Wise%20Chat&amp;severity=high&amp;id=682cd0f81484d88663aeb6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4669-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpdevelop-wp-booking-calendar-aeb6ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4669%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=682cd0f81484d88663aeb6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3888-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-artbees-jupiter-x-core-aeb6fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artbees%20Jupiter%20X%20Core&amp;severity=medium&amp;id=682cd0f81484d88663aeb6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3527-cwe-862-missing-authorization-in-eventon-eventon-pro-wordpress-virtual-event-calendar-plugin-aeb6fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3527%3A%20CWE-862%20Missing%20Authorization%20in%20EventON%20EventON%20(Pro)%20-%20WordPress%20Virtual%20Event%20Calendar%20Plugin&amp;severity=medium&amp;id=682cd0f81484d88663aeb6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4826-buffer-overflow-in-totolink-a702r-aeb6f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4826%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4825-buffer-overflow-in-totolink-a702r-aeb696</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4825%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4824-buffer-overflow-in-totolink-a702r-aeafdc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4824%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f71484d88663aeafdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4823-buffer-overflow-in-totolink-a702r-aeb694</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4823%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4610-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cbutlerjr-wp-members-membership-plugin-aeb48b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=682cd0f81484d88663aeb48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4819-improper-authorization-in-y-project-ruoyi-aeb687</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4819%3A%20Improper%20Authorization%20in%20y_project%20RuoYi&amp;severity=low&amp;id=682cd0f81484d88663aeb687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4190-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-csv-mass-importer-aeb685</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4190%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CSV%20Mass%20Importer&amp;severity=high&amp;id=682cd0f81484d88663aeb685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3812-cwe-73-external-control-of-file-name-or-path-in-quantumcloud-wpbot-pro-wordpress-chatbot-aeb5c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3812%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20QuantumCloud%20WPBot%20Pro%20Wordpress%20Chatbot&amp;severity=high&amp;id=682cd0f81484d88663aeb5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4391-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-coderevolution-echo-rss-feed-post-generator-aeb5c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4391%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodeRevolution%20Echo%20RSS%20Feed%20Post%20Generator&amp;severity=critical&amp;id=682cd0f81484d88663aeb5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4389-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-coderevolution-crawlomatic-multipage-scraper-post-generator-aeb52a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4389%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodeRevolution%20Crawlomatic%20Multipage%20Scraper%20Post%20Generator&amp;severity=critical&amp;id=682cd0f81484d88663aeb52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4818-sql-injection-in-sourcecodester-doctor-s-appointment-system-aeb5dc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4818%3A%20SQL%20Injection%20in%20SourceCodester%20Doctor&apos;s%20Appointment%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4817-sql-injection-in-sourcecodester-doctor-s-appointment-system-aeb5da</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4817%3A%20SQL%20Injection%20in%20Sourcecodester%20Doctor&apos;s%20Appointment%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4194-cwe-352-cross-site-request-forgery-csrf-in-alti5-alt-monitoring-aeb5c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4194%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alti5%20AlT%20Monitoring&amp;severity=medium&amp;id=682cd0f81484d88663aeb5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4189-cwe-352-cross-site-request-forgery-csrf-in-naicuoctavian-audio-comments-plugin-aeb5c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4189%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20naicuoctavian%20Audio%20Comments%20Plugin&amp;severity=medium&amp;id=682cd0f81484d88663aeb5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4816-sql-injection-in-sourcecodester-doctor-s-appointment-system-aeb5cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4816%3A%20SQL%20Injection%20in%20SourceCodester%20Doctor&apos;s%20Appointment%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4815-sql-injection-in-campcodes-sales-and-inventory-system-aeb5cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4815%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4814-sql-injection-in-campcodes-sales-and-inventory-system-aeb5c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4814%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47893-cwe-cwe-823-use-of-out-of-range-pointer-offset-4-16-in-imagination-technologies-graphics-ddk-aeb485</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47893%3A%20CWE%20-%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20(4.16)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=682cd0f81484d88663aeb485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1706-cwe-416-use-after-free-in-imagination-technologies-graphics-ddk-aeb487</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1706%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=682cd0f81484d88663aeb487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48187-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-infiniflow-ragflow-aeb5a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48187%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20infiniflow%20RAGFlow&amp;severity=critical&amp;id=682cd0f81484d88663aeb5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-17-29e7b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-17&amp;severity=medium&amp;id=682c7db0e8347ec82d29e7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-17-f12aca</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4813-sql-injection-in-phpgurukul-human-metapneumovirus-testing-management-system-aeba48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4813%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aeba48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4812-sql-injection-in-phpgurukul-human-metapneumovirus-testing-management-system-aeba46</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4812%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aeba46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4811-sql-injection-in-codeastro-pharmacy-management-system-aeba44</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4811%3A%20SQL%20Injection%20in%20CodeAstro%20Pharmacy%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aeba44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4363-cwe-352-cross-site-request-forgery-csrf-in-unknown-wholesale-market-aeb92b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4363%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Wholesale%20Market&amp;severity=medium&amp;id=682cd0f91484d88663aeb92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4810-stack-based-buffer-overflow-in-tenda-ac7-aeba42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4810%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=682cd0f91484d88663aeba42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4805-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-watchguard-fireware-os-aeba3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=682cd0f91484d88663aeba3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4804-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-watchguard-fireware-os-aeba3a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=682cd0f91484d88663aeba3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4809-stack-based-buffer-overflow-in-tenda-ac7-aeba40</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4809%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=682cd0f91484d88663aeba40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4808-sql-injection-in-phpgurukul-park-ticketing-management-system-aeb08c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4808%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0f71484d88663aeb08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4802-cwe-426-untrusted-search-path-in-the-gnu-c-library-glibc-aeb108</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4802%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=682cd0f71484d88663aeb108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4807-exposure-of-information-through-directory-listing-in-sourcecodester-online-student-clearance-system-aeba3e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4807%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682cd0f91484d88663aeba3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22233-cwe-20-improper-input-validation-in-spring-spring-framework-aeb93e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22233%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Spring%20Spring%20Framework&amp;severity=low&amp;id=682cd0f91484d88663aeb93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4806-sql-injection-in-sourcecodester-stock-management-system-aeba9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4806%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aeba9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4795-sql-injection-in-gongfuxiang-schoolcms-aeba9f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4795%3A%20SQL%20Injection%20in%20gongfuxiang%20schoolcms&amp;severity=medium&amp;id=682cd0f91484d88663aeba9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4794-sql-injection-in-phpgurukul-online-course-registration-aebac2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4794%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=682cd0f91484d88663aebac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4793-sql-injection-in-phpgurukul-online-course-registration-aeba9d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4793%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=682cd0f91484d88663aeba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4476-null-pointer-dereference-in-red-hat-red-hat-enterprise-linux-6-aebad3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4476%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682cd0f91484d88663aebad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4792-buffer-overflow-in-freefloat-ftp-server-aebc76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4792%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-interlock-ransomware-affects-the-defense-industrial-base-supply-chain-16a37f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Interlock%20Ransomware%20Affects%20the%20Defense%20Industrial%20Base%20Supply%20Chain&amp;severity=medium&amp;id=682c992c7960f6956616a37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4791-buffer-overflow-in-freefloat-ftp-server-aebadb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4791%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4790-buffer-overflow-in-freefloat-ftp-server-aebad9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4790%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-16a37b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Good%2C%20the%20Bad%20and%20the%20Ugly%20in%20Cybersecurity%20%E2%80%93%20Week%2020&amp;severity=medium&amp;id=682c992c7960f6956616a37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shared-ssh-keys-expose-phishing-infrastructure-targeting-kuwait-16a32c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shared%20SSH%20Keys%20Expose%20Phishing%20Infrastructure%20Targeting%20Kuwait&amp;severity=medium&amp;id=682c992c7960f6956616a32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4789-buffer-overflow-in-freefloat-ftp-server-aebad7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4789%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4788-buffer-overflow-in-freefloat-ftp-server-aebad5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4788%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4787-sql-injection-in-sourcecodester-stock-management-system-aebd87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4787%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31062-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-redqteam-wishlist-aebd89</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31062%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20redqteam%20Wishlist&amp;severity=null&amp;id=682cd0f91484d88663aebd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31063-cwe-862-missing-authorization-in-redqteam-wishlist-aebd8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31063%3A%20Missing%20Authorization%20in%20redqteam%20Wishlist&amp;severity=null&amp;id=682cd0f91484d88663aebd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31065-cwe-862-missing-authorization-in-themeton-rozario-aebd8d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31065%3A%20CWE-862%20Missing%20Authorization%20in%20themeton%20Rozario&amp;severity=medium&amp;id=682cd0f91484d88663aebd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31066-cwe-862-missing-authorization-in-themeton-acerola-aebd9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31066%3A%20Missing%20Authorization%20in%20themeton%20Acerola&amp;severity=null&amp;id=682cd0f91484d88663aebd9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31068-cwe-352-cross-site-request-forgery-csrf-in-themeton-seven-stars-aebd9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31068%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeton%20Seven%20Stars&amp;severity=medium&amp;id=682cd0f91484d88663aebd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31071-cwe-862-missing-authorization-in-themeton-hotstar-multi-purpose-business-theme-aebd9e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31071%3A%20CWE-862%20Missing%20Authorization%20in%20themeton%20HotStar%20%E2%80%93%20Multi-Purpose%20Business%20Theme&amp;severity=medium&amp;id=682cd0f91484d88663aebd9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31630-cwe-862-missing-authorization-in-themeton-the-business-aebcd1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31630%3A%20CWE-862%20Missing%20Authorization%20in%20themeton%20The%20Business&amp;severity=medium&amp;id=682cd0f91484d88663aebcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31637-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-shout-aebcd3</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31637%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20SHOUT&amp;severity=null&amp;id=682cd0f91484d88663aebcd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31639-cwe-352-cross-site-request-forgery-csrf-in-themeton-spare-aebce0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31639%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeton%20Spare&amp;severity=medium&amp;id=682cd0f91484d88663aebce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31640-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-magic-responsive-slider-and-carousel-wordpress-aebce2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31640%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Magic%20Responsive%20Slider%20and%20Carousel%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31641-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-uberslider-aebce4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31641%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20UberSlider&amp;severity=null&amp;id=682cd0f91484d88663aebce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31915-cwe-352-cross-site-request-forgery-csrf-in-kamleshyadav-pixel-wordpress-form-builderplugin-autoresponder-aebce6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31915%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kamleshyadav%20Pixel%20WordPress%20Form%20BuilderPlugin%20%26%20Autoresponder&amp;severity=null&amp;id=682cd0f91484d88663aebce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31921-cwe-352-cross-site-request-forgery-csrf-in-loopus-wp-ultimate-tours-builder-aebce8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31921%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20loopus%20WP%20Ultimate%20Tours%20Builder&amp;severity=null&amp;id=682cd0f91484d88663aebce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31922-cwe-352-cross-site-request-forgery-csrf-in-quanticalabs-css3-accordions-for-wordpress-aebcea</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31922%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QuanticaLabs%20CSS3%20Accordions%20for%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebcea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31923-cwe-862-missing-authorization-in-quanticalabs-css3-accordions-for-wordpress-aebcec</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31923%3A%20Missing%20Authorization%20in%20QuanticaLabs%20CSS3%20Accordions%20for%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31926-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-sticky-radio-player-aebcee</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31926%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Sticky%20Radio%20Player&amp;severity=null&amp;id=682cd0f91484d88663aebcee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31928-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-multimedia-responsive-carousel-with-image-video-audio-support-aebd30</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31928%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Multimedia%20Responsive%20Carousel%20with%20Image%20Video%20Audio%20Support&amp;severity=null&amp;id=682cd0f91484d88663aebd30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32180-cwe-862-missing-authorization-in-quanticalabs-css3-tooltips-for-wordpress-aebd3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32180%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojofywp%20Product%20Carousel%20For%20WooCommerce%20%E2%80%93%20WoorouSell&amp;severity=null&amp;id=682cd0f91484d88663aebd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32245-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-apollo-aebcf0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32245%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chaser324%20Featured%20Posts%20Scroll&amp;severity=null&amp;id=682cd0f91484d88663aebcf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32287-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-responsive-html5-audio-player-pro-with-playlist-aebcf2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32287%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Responsive%20HTML5%20Audio%20Player%20PRO%20With%20Playlist&amp;severity=null&amp;id=682cd0f91484d88663aebcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32290-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-sticky-html5-music-player-aebcff</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32290%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Sticky%20HTML5%20Music%20Player&amp;severity=null&amp;id=682cd0f91484d88663aebcff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32295-cwe-862-missing-authorization-in-wordpresschef-salon-booking-pro-aebd01</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32295%3A%20Missing%20Authorization%20in%20wordpresschef%20Salon%20Booking%20Pro&amp;severity=null&amp;id=682cd0f91484d88663aebd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32296-cwe-862-missing-authorization-in-quantumcloud-simple-link-directory-pro-aebd03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32296%3A%20Missing%20Authorization%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=null&amp;id=682cd0f91484d88663aebd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32299-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-themovation-quickcal-aebd05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32299%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Themovation%20QuickCal%20-%20Appointment%20Booking%20Calendar%20for%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32301-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-countdown-pro-wp-plugin-aebd07</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32301%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20CountDown%20Pro%20WP%20Plugin&amp;severity=null&amp;id=682cd0f91484d88663aebd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32306-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-radio-player-shoutcast-icecast-wordpress-plugin-aebd09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32306%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Radio%20Player%20Shoutcast%20%26%20Icecast%20WordPress%20Plugin&amp;severity=null&amp;id=682cd0f91484d88663aebd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32307-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-chameleon-html5-audio-player-with-without-playlist-aebd0b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32307%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Chameleon%20HTML5%20Audio%20Player%20With%2FWithout%20Playlist&amp;severity=null&amp;id=682cd0f91484d88663aebd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32310-cwe-352-cross-site-request-forgery-csrf-in-thememove-quickcal-aebd0d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32310%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeMove%20QuickCal%20-%20Appointment%20Booking%20Calendar%20for%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32643-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-wpgym-aebd3f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32643%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20WPGYM&amp;severity=critical&amp;id=682cd0f91484d88663aebd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39481-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-imithemes-eventer-aebd41</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39481%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20imithemes%20Eventer&amp;severity=null&amp;id=682cd0f91484d88663aebd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39482-cwe-862-missing-authorization-in-imithemes-eventer-aebd43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39482%3A%20Missing%20Authorization%20in%20imithemes%20Eventer&amp;severity=null&amp;id=682cd0f91484d88663aebd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39491-cwe-35-path-traversal-in-whmpress-whmpress-aebd45</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39491%3A%20CWE-35%20Path%20Traversal%20in%20WHMPress%20WHMpress&amp;severity=high&amp;id=682cd0f91484d88663aebd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39492-cwe-35-path-traversal-in-whmpress-whmpress-aebd47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39492%3A%20CWE-35%20Path%20Traversal%20in%20WHMPress%20WHMpress&amp;severity=high&amp;id=682cd0f91484d88663aebd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39493-cwe-862-missing-authorization-in-valvepress-rankie-aebd49</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39493%3A%20Missing%20Authorization%20in%20ValvePress%20Rankie&amp;severity=null&amp;id=682cd0f91484d88663aebd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39507-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-nasatheme-nasa-core-aebd4b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39507%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NasaTheme%20Nasa%20Core&amp;severity=null&amp;id=682cd0f91484d88663aebd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39509-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-themencode-tnc-flipbook-aebd0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39509%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeNcode%20TNC%20FlipBook&amp;severity=null&amp;id=682cd0f91484d88663aebd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39511-cwe-862-missing-authorization-in-valvepress-pinterest-automatic-pin-aebd11</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39511%3A%20Missing%20Authorization%20in%20ValvePress%20Pinterest%20Automatic%20Pin&amp;severity=null&amp;id=682cd0f91484d88663aebd11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39537-cwe-639-authorization-bypass-through-user-controlled-key-in-chimpstudio-wp-jobhunt-aebd1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blaze%20Concepts%20Better%20Customer%20List%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f91484d88663aebd1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46464-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-scripteo-ads-pro-plugin-aebd20</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scripteo%20Ads%20Pro&amp;severity=null&amp;id=682cd0f91484d88663aebd20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47534-cwe-862-missing-authorization-in-valvepress-wordpress-auto-spinner-aebd22</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47534%3A%20Missing%20Authorization%20in%20ValvePress%20Wordpress%20Auto%20Spinner&amp;severity=null&amp;id=682cd0f91484d88663aebd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47556-cwe-862-missing-authorization-in-quanticalabs-css3-compare-pricing-tables-for-wordpress-aebca4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47556%3A%20Missing%20Authorization%20in%20QuanticaLabs%20CSS3%20Compare%20Pricing%20Tables%20for%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47557-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-romancode-mapsvg-aebad1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=682cd0f91484d88663aebad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47560-cwe-862-missing-authorization-in-romancode-mapsvg-aebca6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47560%3A%20Missing%20Authorization%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=682cd0f91484d88663aebca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47562-cwe-94-improper-control-of-generation-of-code-code-injection-in-romancode-mapsvg-aebca8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47562%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=682cd0f91484d88663aebca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47563-cwe-862-missing-authorization-in-villatheme-curcy-aebcaa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47563%3A%20Missing%20Authorization%20in%20villatheme%20CURCY&amp;severity=null&amp;id=682cd0f91484d88663aebcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47564-cwe-862-missing-authorization-in-ashanjay-eventon-aebd4d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47564%3A%20Missing%20Authorization%20in%20ashanjay%20EventON&amp;severity=null&amp;id=682cd0f91484d88663aebd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47567-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-video-player-fullscreen-video-background-aebd4f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47567%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Video%20Player%20%26%20FullScreen%20Video%20Background&amp;severity=null&amp;id=682cd0f91484d88663aebd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47693-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-roninwp-fat-services-booking-aebd5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47693%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20roninwp%20FAT%20Services%20Booking&amp;severity=null&amp;id=682cd0f91484d88663aebd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48146-cwe-352-cross-site-request-forgery-csrf-in-michael-lups-seo-flow-by-lupsonline-aebd83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48146%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Michael%20Lups%20SEO%20Flow%20by%20LupsOnline&amp;severity=null&amp;id=682cd0f91484d88663aebd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48144-cwe-352-cross-site-request-forgery-csrf-in-sidngr-import-export-for-woocommerce-aebd81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48144%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sidngr%20Import%20Export%20For%20WooCommerce&amp;severity=null&amp;id=682cd0f91484d88663aebd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48138-cwe-862-missing-authorization-in-berthaai-bertha-ai-aebd7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48138%3A%20Missing%20Authorization%20in%20Bertha%20AI%20%26%238211%3B%20Andrew%20Palmer%20BERTHA%20AI&amp;severity=null&amp;id=682cd0f91484d88663aebd7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48137-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-proxymis-interview-aebd7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48137%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20proxymis%20Interview&amp;severity=null&amp;id=682cd0f91484d88663aebd7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48136-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-estatik-mortgage-calculator-estatik-aebd7b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48136%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Estatik%20Mortgage%20Calculator%20Estatik&amp;severity=null&amp;id=682cd0f91484d88663aebd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48135-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-aptivadadev-aptivada-for-wp-aebd6e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aptivadadev%20Aptivada%20for%20WP&amp;severity=null&amp;id=682cd0f91484d88663aebd6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48134-cwe-502-deserialization-of-untrusted-data-in-shapedplugin-llc-wp-tabs-aebd6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48134%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ShapedPlugin%20LLC%20WP%20Tabs&amp;severity=null&amp;id=682cd0f91484d88663aebd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48132-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pencilwp-x-addons-for-elementor-aebcc7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48132%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pencilwp%20X%20Addons%20for%20Elementor&amp;severity=null&amp;id=682cd0f91484d88663aebcc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48131-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-saiful-islam-ultraaddons-elementor-lite-aebcc5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48131%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saiful%20Islam%20UltraAddons%20Elementor%20Lite&amp;severity=null&amp;id=682cd0f91484d88663aebcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48128-cwe-862-missing-authorization-in-sharespine-sharespine-woocommerce-connector-aebcc3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48128%3A%20Missing%20Authorization%20in%20Sharespine%20Sharespine%20Woocommerce%20Connector&amp;severity=null&amp;id=682cd0f91484d88663aebcc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48127-cwe-862-missing-authorization-in-app-cheap-push-notification-for-mobile-and-web-app-aebcc1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48127%3A%20Missing%20Authorization%20in%20App%20Cheap%20Push%20notification%20for%20Mobile%20and%20Web%20app&amp;severity=null&amp;id=682cd0f91484d88663aebcc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48121-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-steve-puddick-wp-notes-widget-aebcb4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48121%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Steve%20Puddick%20WP%20Notes%20Widget&amp;severity=null&amp;id=682cd0f91484d88663aebcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48120-cwe-94-improper-control-of-generation-of-code-code-injection-in-romancode-mapsvg-lite-aebcb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48120%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=682cd0f91484d88663aebcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48119-cwe-94-improper-control-of-generation-of-code-code-injection-in-rs-wp-themes-rs-wp-book-showcase-aebcb0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48119%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20RS%20WP%20THEMES%20RS%20WP%20Book%20Showcase&amp;severity=null&amp;id=682cd0f91484d88663aebcb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48117-cwe-862-missing-authorization-in-kilbot-woocommerce-pos-aebcae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48117%3A%20Missing%20Authorization%20in%20kilbot%20WooCommerce%20POS&amp;severity=null&amp;id=682cd0f91484d88663aebcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48116-cwe-862-missing-authorization-in-ashan-perera-eventon-aebcac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48116%3A%20Missing%20Authorization%20in%20Ashan%20Perera%20EventON&amp;severity=null&amp;id=682cd0f91484d88663aebcac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48115-cwe-352-cross-site-request-forgery-csrf-in-javier-revilla-validatecertify-aebd6a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48115%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Javier%20Revilla%20ValidateCertify&amp;severity=null&amp;id=682cd0f91484d88663aebd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48114-cwe-352-cross-site-request-forgery-csrf-in-shayan-farhang-pazhooh-shayanweb-admin-fontchanger-aebd68</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48114%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shayan%20Farhang%20Pazhooh%20ShayanWeb%20Admin%20FontChanger&amp;severity=null&amp;id=682cd0f91484d88663aebd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48113-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-broadstreet-broadstreet-aebd66</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48113%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Broadstreet%20Broadstreet%20Ads&amp;severity=null&amp;id=682cd0f91484d88663aebd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48112-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-karimmughal-dot-html-php-xml-etc-pages-aebd64</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karimmughal%20Dot%20html%2Cphp%2Cxml%20etc%20pages&amp;severity=null&amp;id=682cd0f91484d88663aebd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48080-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-uncanny-owl-uncanny-toolkit-for-learndash-aebd62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48080%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Uncanny%20Owl%20Uncanny%20Toolkit%20for%20LearnDash&amp;severity=null&amp;id=682cd0f91484d88663aebd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48079-cwe-862-missing-authorization-in-metagauss-profilegrid-aebd60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48079%3A%20Missing%20Authorization%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=682cd0f91484d88663aebd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4786-sql-injection-in-sourcecodester-stock-management-system-aebd85</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4786%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebd85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40906-cwe-1395-dependency-on-vulnerable-third-party-component-in-mongodb-bson-xs-aeba25</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40906%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20MONGODB%20BSON%3A%3AXS&amp;severity=critical&amp;id=682cd0f91484d88663aeba25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4785-sql-injection-in-phpgurukul-daily-expense-tracker-system-aebd2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4785%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47794-cwe-284-improper-access-control-in-nextcloud-security-advisories-aebe43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47794%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=682cd0f91484d88663aebe43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47793-cwe-770-allocation-of-resources-without-limits-or-throttling-in-nextcloud-security-advisories-aebe41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47793%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682cd0f91484d88663aebe41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4782-sql-injection-in-sourcecodester-stock-management-system-aebe47</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4782%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebe47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4781-sql-injection-in-phpgurukul-park-ticketing-management-system-aebe45</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4781%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebe45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4478-null-pointer-dereference-in-red-hat-red-hat-enterprise-linux-8-aebe54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4478%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682cd0f91484d88663aebe54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47792-cwe-284-improper-access-control-in-nextcloud-security-advisories-aebe56</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47792%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682cd0f91484d88663aebe56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47791-cwe-918-server-side-request-forgery-ssrf-in-nextcloud-security-advisories-aebe3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47791%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682cd0f91484d88663aebe3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47790-cwe-287-improper-authentication-in-nextcloud-security-advisories-aebe3d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47790%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682cd0f91484d88663aebe3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4780-sql-injection-in-phpgurukul-park-ticketing-management-system-aebe5a</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4780%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebe5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32962-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-dpgaspar-flask-appbuilder-aebe37</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32962%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20dpgaspar%20Flask-AppBuilder&amp;severity=medium&amp;id=682cd0f91484d88663aebe37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4600-cwe-20-improper-input-validation-in-google-cloud-classic-application-load-balancer-aebe39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4600%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Google%20Cloud%20Classic%20Application%20Load%20Balancer&amp;severity=high&amp;id=682cd0f91484d88663aebe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4778-sql-injection-in-phpgurukul-park-ticketing-management-system-aebe75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4778%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebe75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4211-cwe-59-improper-link-resolution-before-file-access-link-following-in-the-qt-company-qt-aebe73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4211%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20The%20Qt%20Company%20Qt&amp;severity=high&amp;id=682cd0f91484d88663aebe73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40907-cwe-1395-dependency-on-vulnerable-third-party-component-in-ether-fcgi-aebe22</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40907%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20ETHER%20FCGI&amp;severity=medium&amp;id=682cd0f91484d88663aebe22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37890-vulnerability-in-linux-linux-aebf16</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4777-sql-injection-in-phpgurukul-park-ticketing-management-system-aebee2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4777%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40629-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-pnetlab-pnetlab-aebf1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40629%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PNETLab%20PNETLab&amp;severity=high&amp;id=682cd0fa1484d88663aebf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4773-sql-injection-in-phpgurukul-online-course-registration-aebf20</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4773%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=682cd0fa1484d88663aebf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2306-cwe-284-improper-access-control-in-syncpilot-live-contract-aebf1a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2306%3A%20CWE-284%20Improper%20Access%20Control%20in%20SYNCPILOT%20LIVE%20CONTRACT&amp;severity=medium&amp;id=682cd0fa1484d88663aebf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2305-cwe-20-improper-input-validation-in-syncpilot-live-contract-aebf18</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2305%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SYNCPILOT%20LIVE%20CONTRACT&amp;severity=high&amp;id=682cd0fa1484d88663aebf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4772-sql-injection-in-phpgurukul-online-course-registration-aebf1e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4772%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=682cd0fa1484d88663aebf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4771-sql-injection-in-phpgurukul-online-course-registration-aebf2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4771%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=682cd0fa1484d88663aebf2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40632-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-icewarp-icewarp-mail-server-aebe96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Icewarp%20Icewarp%20Mail%20Server&amp;severity=low&amp;id=682cd0f91484d88663aebe96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40631-cwe-644-improper-neutralization-of-http-headers-for-scripting-syntax-in-icewarp-icewarp-mail-server-aebe94</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40631%3A%20CWE-644%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20Icewarp%20Icewarp%20Mail%20Server&amp;severity=low&amp;id=682cd0f91484d88663aebe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40630-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-icewarp-icewarp-mail-server-aebe92</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40630%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Icewarp%20Icewarp%20Mail%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebe92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4770-sql-injection-in-phpgurukul-park-ticketing-management-system-aebf14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4770%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebf14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4769-uncontrolled-search-path-in-cbewin-anytxt-searcher-aebe28</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4769%3A%20Uncontrolled%20Search%20Path%20in%20CBEWIN%20Anytxt%20Searcher&amp;severity=high&amp;id=682cd0f91484d88663aebe28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4768-unrestricted-upload-in-feng-ha-ha-ssm-erp-aebe26</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4768%3A%20Unrestricted%20Upload%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=682cd0f91484d88663aebe26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4767-code-injection-in-defog-ai-introspect-aebe09</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4767%3A%20Code%20Injection%20in%20defog-ai%20introspect&amp;severity=medium&amp;id=682cd0f91484d88663aebe09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4766-sql-injection-in-phpgurukul-zoo-management-system-aebe07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4766%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebe07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pixel-perfect-trap-the-surge-of-svg-borne-phishing-attacks-16a2fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pixel-Perfect%20Trap%3A%20The%20Surge%20of%20SVG-Borne%20Phishing%20Attacks&amp;severity=medium&amp;id=682c992c7960f6956616a2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mass-scanning-and-exploit-campaigns-16a302</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mass%20Scanning%20and%20Exploit%20Campaigns&amp;severity=critical&amp;id=682c992c7960f6956616a302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/part-2-compromised-wordpress-pages-and-malware-campaigns-16a2b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Part%202%3A%20Compromised%20WordPress%20Pages%20and%20Malware%20Campaigns&amp;severity=medium&amp;id=682c992c7960f6956616a2b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yet-another-nodejs-backdoor-yanb-a-modern-challenge-16a31f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yet%20Another%20NodeJS%20Backdoor%20(YaNB)%3A%20A%20Modern%20Challenge&amp;severity=medium&amp;id=682c992c7960f6956616a31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4679-insufficiently-protected-credentials-in-synology-active-backup-for-microsoft-365-aeb894</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4679%3A%20Insufficiently%20Protected%20Credentials%20in%20Synology%20Active%20Backup%20for%20Microsoft%20365&amp;severity=medium&amp;id=682cd0f81484d88663aeb894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4765-sql-injection-in-phpgurukul-zoo-management-system-aebdda</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4765%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1975-cwe-129-improper-validation-of-array-index-in-ollama-ollama-ollama-aebdc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1975%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20ollama%20ollama%2Follama&amp;severity=high&amp;id=682cd0f91484d88663aebdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/actionable-threat-hunting-with-threat-intelligence-i-hunting-malicious-desktop-files-16a5d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Actionable%20threat%20hunting%20with%20Threat%20Intelligence%20(I)%20-%20Hunting%20malicious%20desktop%20files&amp;severity=medium&amp;id=682c992c7960f6956616a5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4761-sql-injection-in-phpgurukul-complaint-management-system-aebdd8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4761%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4758-sql-injection-in-phpgurukul-beauty-parlour-management-system-aebdc1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4758%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4757-sql-injection-in-phpgurukul-beauty-parlour-management-system-aebdbf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4757%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4756-denial-of-service-in-d-link-di-7003gv2-aebdbd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4756%3A%20Denial%20of%20Service%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f91484d88663aebdbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53827-cwe-20-improper-input-validation-in-ericsson-packet-core-controller-aebdfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53827%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ericsson%20Packet%20Core%20Controller&amp;severity=high&amp;id=682cd0f91484d88663aebdfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4755-improper-authentication-in-d-link-di-7003gv2-aebe03</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4755%3A%20Improper%20Authentication%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f91484d88663aebe03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3624-cwe-862-missing-authorization-in-hitachi-hitachi-ops-center-analyzer-aebdff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3624%3A%20CWE-862%20Missing%20Authorization%20in%20Hitachi%20Hitachi%20Ops%20Center%20Analyzer&amp;severity=medium&amp;id=682cd0f91484d88663aebdff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8201-cwe-1385-missing-origin-validation-in-websockets-in-hitachi-hitachi-ops-center-analyzer-aebdfd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8201%3A%20CWE-1385%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20Hitachi%20Hitachi%20Ops%20Center%20Analyzer&amp;severity=medium&amp;id=682cd0f91484d88663aebdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4753-information-disclosure-in-d-link-di-7003gv2-aebe01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4753%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f91484d88663aebe01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1531-cwe-1392-use-of-default-credentials-in-hitachi-hitachi-ops-center-analyzer-viewpoint-aebde0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1531%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Hitachi%20Hitachi%20Ops%20Center%20Analyzer%20viewpoint&amp;severity=medium&amp;id=682cd0f91484d88663aebde0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1245-cwe-348-use-of-less-trusted-source-in-hitachi-hitachi-infrastructure-analytics-advisor-aebdde</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1245%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=medium&amp;id=682cd0f91484d88663aebdde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4752-information-disclosure-in-d-link-di-7003gv2-aebdea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4752%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f91484d88663aebdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4751-information-disclosure-in-d-link-di-7003gv2-aebf12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4751%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0fa1484d88663aebf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3516-cwe-79-cross-site-scripting-xss-in-unknown-simple-lightbox-aebc8f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3516%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Simple%20Lightbox&amp;severity=medium&amp;id=682cd0f91484d88663aebc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3201-cwe-79-cross-site-scripting-xss-in-unknown-contact-form-builder-with-drag-drop-for-wordpress-aebc8b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3201%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Contact%20Form%20builder%20with%20drag%20%26%20drop%20for%20WordPress&amp;severity=medium&amp;id=682cd0f91484d88663aebc8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4750-information-disclosure-in-d-link-di-7003gv2-aebdbb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4750%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f91484d88663aebdbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4749-denial-of-service-in-d-link-di-7003gv2-aebdb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4749%3A%20Denial%20of%20Service%20in%20D-Link%20DI-7003GV2&amp;severity=high&amp;id=682cd0f91484d88663aebdb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4747-command-injection-in-bohua-netdragon-firewall-aebdaa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4747%3A%20Command%20Injection%20in%20Bohua%20NetDragon%20Firewall&amp;severity=medium&amp;id=682cd0f91484d88663aebdaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4759-incorrect-behavior-order-early-validation-in-lockfile-lint-api-aebc87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4759%3A%20Incorrect%20Behavior%20Order%3A%20Early%20Validation%20in%20lockfile-lint-api&amp;severity=medium&amp;id=682cd0f91484d88663aebc87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4746-sql-injection-in-campcodes-sales-and-inventory-system-aebda8</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4746%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4745-cross-site-scripting-in-code-projects-employee-record-system-aebda6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4745%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Record%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4744-cross-site-scripting-in-code-projects-employee-record-system-aebda4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4744%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Record%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4743-sql-injection-in-code-projects-employee-record-system-aebda2</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4743%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Record%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4742-deserialization-in-xu-yijie-grpo-flat-aebde8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4742%3A%20Deserialization%20in%20XU-YIJIE%20grpo-flat&amp;severity=medium&amp;id=682cd0f91484d88663aebde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4741-sql-injection-in-campcodes-sales-and-inventory-system-aebde6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4741%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4740-deserialization-in-beamctrl-airiana-aebde4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4740%3A%20Deserialization%20in%20BeamCtrl%20Airiana&amp;severity=medium&amp;id=682cd0f91484d88663aebde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4169-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-urkekg-posts-per-cat-aebde2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4169%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20urkekg%20Posts%20per%20Cat&amp;severity=medium&amp;id=682cd0f91484d88663aebde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4739-sql-injection-in-projectworlds-hospital-database-management-system-aebdcb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4739%3A%20SQL%20Injection%20in%20projectworlds%20Hospital%20Database%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4736-sql-injection-in-phpgurukul-daily-expense-tracker-aebdc9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4736%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker&amp;severity=medium&amp;id=682cd0f91484d88663aebdc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4735-unrestricted-upload-in-campcodes-sales-and-inventory-system-aebdc7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4735%3A%20Unrestricted%20Upload%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4734-sql-injection-in-campcodes-sales-and-inventory-system-aebf10</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4734%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51475-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-ibm-content-navigator-aebeef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51475%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Content%20Navigator&amp;severity=medium&amp;id=682cd0fa1484d88663aebeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4733-buffer-overflow-in-totolink-a3002r-aebf0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4733%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=682cd0fa1484d88663aebf0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4732-buffer-overflow-in-totolink-a3002r-aebf01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4732%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=682cd0fa1484d88663aebf01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4731-buffer-overflow-in-totolink-a3002r-aebe24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4731%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=682cd0f91484d88663aebe24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4730-buffer-overflow-in-totolink-a3002r-aebee0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4730%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=682cd0fa1484d88663aebee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48175-cwe-190-integer-overflow-or-wraparound-in-aomedia-libavif-aebed8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48175%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20aomedia%20libavif&amp;severity=medium&amp;id=682cd0fa1484d88663aebed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48174-cwe-190-integer-overflow-or-wraparound-in-aomedia-libavif-aebed6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48174%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20aomedia%20libavif&amp;severity=medium&amp;id=682cd0fa1484d88663aebed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47809-cwe-272-least-privilege-violation-in-wibu-codemeter-aebebd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47809%3A%20CWE-272%20Least%20Privilege%20Violation%20in%20Wibu%20CodeMeter&amp;severity=high&amp;id=682cd0f91484d88663aebebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40120-n-a-in-n-a-aebe16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40120%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f91484d88663aebe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48188-cwe-125-out-of-bounds-read-in-gnu-pspp-aeba38</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48188%3A%20CWE-125%20Out-of-bounds%20Read%20in%20GNU%20PSPP&amp;severity=low&amp;id=682cd0f91484d88663aeba38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32407-n-a-in-n-a-aeba06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32407%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f91484d88663aeba06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47916-cwe-1336-improper-neutralization-of-special-elements-used-in-a-template-engine-in-invisioncommunity-invision-power-board-aeb8a9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47916%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20invisioncommunity%20Invision%20Power%20Board&amp;severity=critical&amp;id=682cd0f81484d88663aeb8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-16-29dfe7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-16&amp;severity=medium&amp;id=682c7db0e8347ec82d29dfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-16-f12803</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4729-command-injection-in-totolink-a3002r-aebeff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4729%3A%20Command%20Injection%20in%20TOTOLINK%20A3002R&amp;severity=medium&amp;id=682cd0fa1484d88663aebeff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47930-cwe-863-incorrect-authorization-in-zulip-zulip-aebef1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47930%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20zulip%20zulip&amp;severity=medium&amp;id=682cd0fa1484d88663aebef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4728-sql-injection-in-sourcecodester-best-online-news-portal-aebefd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4728%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Online%20News%20Portal&amp;severity=medium&amp;id=682cd0fa1484d88663aebefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4727-inefficient-regular-expression-complexity-in-meteor-aebede</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4727%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Meteor&amp;severity=medium&amp;id=682cd0fa1484d88663aebede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unfiltered-look-into-lockbit-s-operations-16a5e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unfiltered%20look%20into%20LockBit%E2%80%99s%20operations&amp;severity=medium&amp;id=682c992c7960f6956616a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0921-cwe-250-execution-with-unnecessary-privileges-in-mitsubishi-electric-corporation-genesis64-aebed2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0921%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=medium&amp;id=682cd0f91484d88663aebed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4726-sql-injection-in-itsourcecode-placement-management-system-aebefb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4726%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4725-sql-injection-in-itsourcecode-placement-management-system-aebef9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4725%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4724-sql-injection-in-itsourcecode-placement-management-system-aebef7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4724%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4723-sql-injection-in-itsourcecode-placement-management-system-aebef5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4723%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4722-sql-injection-in-itsourcecode-placement-management-system-aebedc</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4722%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47287-cwe-770-allocation-of-resources-without-limits-or-throttling-in-tornadoweb-tornado-aebebb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47287%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=682cd0f91484d88663aebebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47275-cwe-287-improper-authentication-in-auth0-auth0-php-aebeb7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47275%3A%20CWE-287%3A%20Improper%20Authentication%20in%20auth0%20auth0-PHP&amp;severity=critical&amp;id=682cd0f91484d88663aebeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4721-sql-injection-in-itsourcecode-placement-management-system-aebec1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4721%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4720-path-traversal-in-sourcecodester-student-result-management-system-aebebf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4720%3A%20Path%20Traversal%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4719-sql-injection-in-campcodes-sales-and-inventory-system-aec17e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4719%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4718-sql-injection-in-campcodes-sales-and-inventory-system-aec17c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4718%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fileless-execution-powershell-based-shellcode-loader-executes-remcos-rat-16a631</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fileless%20Execution%3A%20PowerShell%20Based%20Shellcode%20Loader%20Executes%20Remcos%20RAT&amp;severity=low&amp;id=682c992c7960f6956616a631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/backdoor-implant-discovered-on-pypi-posing-as-debugging-utility-16a61f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Backdoor%20implant%20discovered%20on%20PyPI%20posing%20as%20debugging%20utility&amp;severity=medium&amp;id=682c992c7960f6956616a61f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47929-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dumbwareio-dumbdrop-aec182</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47929%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DumbWareio%20DumbDrop&amp;severity=low&amp;id=682cd0fa1484d88663aec182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1138-cwe-548-exposure-of-information-through-directory-listing-in-ibm-infosphere-information-server-aebed4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1138%3A%20CWE-548%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47928-cwe-488-exposure-of-data-element-to-wrong-session-in-spotipy-dev-spotipy-aec184</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47928%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20spotipy-dev%20spotipy&amp;severity=critical&amp;id=682cd0fa1484d88663aec184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8009-cwe-863-incorrect-authorization-in-unknown-sensei-lms-aebe20</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8009%3A%20CWE-863%20Incorrect%20Authorization%20in%20Sensei%20LMS&amp;severity=medium&amp;id=682cd0f91484d88663aebe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6711-cwe-79-cross-site-scripting-xss-in-unknown-event-tickets-with-ticket-scanner-aebe1e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6711%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Event%20Tickets%20with%20Ticket%20Scanner&amp;severity=low&amp;id=682cd0f91484d88663aebe1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4665-cwe-284-improper-access-control-in-unknown-eventprime-aebe1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4665%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20EventPrime&amp;severity=medium&amp;id=682cd0f91484d88663aebe1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4091-cwe-79-cross-site-scripting-xss-in-unknown-responsive-gallery-grid-aebe1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4091%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Gallery%20Grid&amp;severity=low&amp;id=682cd0f91484d88663aebe1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4004-cwe-79-cross-site-scripting-xss-in-unknown-advanced-cron-manager-aebe18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4004%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Advanced%20Cron%20Manager&amp;severity=low&amp;id=682cd0f91484d88663aebe18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4002-cwe-79-cross-site-scripting-xss-in-unknown-carousel-slider-gallery-by-wp-carousel-aebd2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4002%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Carousel%2C%20Slider%2C%20Gallery%20by%20WP%20Carousel&amp;severity=low&amp;id=682cd0f91484d88663aebd2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3996-cwe-79-cross-site-scripting-xss-in-unknown-smart-post-show-aebd2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3996%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Smart%20Post%20Show&amp;severity=low&amp;id=682cd0f91484d88663aebd2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3901-cwe-79-cross-site-scripting-xss-in-unknown-genesis-blocks-aebd28</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3901%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Genesis%20Blocks&amp;severity=medium&amp;id=682cd0f91484d88663aebd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3062-cwe-79-cross-site-scripting-xss-in-unknown-save-as-image-plugin-by-pdfcrowd-aeb716</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3062%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Save%20as%20Image%20Plugin%20by%20Pdfcrowd&amp;severity=medium&amp;id=682cd0f81484d88663aeb716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2869-cwe-79-cross-site-scripting-xss-in-unknown-easy-property-listings-aeb714</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2869%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Easy%20Property%20Listings&amp;severity=medium&amp;id=682cd0f81484d88663aeb714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2643-cwe-79-cross-site-scripting-xss-in-unknown-floating-notification-bar-sticky-menu-on-scroll-announcement-banner-and-sticky-header-for-any-theme-aeb092</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2643%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Floating%20Notification%20Bar%2C%20Sticky%20Menu%20on%20Scroll%2C%20Announcement%20Banner%2C%20and%20Sticky%20Header%20for%20Any%20Theme&amp;severity=low&amp;id=682cd0f71484d88663aeb092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1663-cwe-79-cross-site-scripting-xss-in-unknown-ultimate-noindex-nofollow-tool-ii-aeb04c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1663%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Ultimate%20Noindex%20Nofollow%20Tool%20II&amp;severity=medium&amp;id=682cd0f71484d88663aeb04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12767-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-buddyboss-platform-aebd26</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12767%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20buddyboss-platform&amp;severity=low&amp;id=682cd0f91484d88663aebd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0970-cwe-290-authentication-bypass-by-spoofing-in-unknown-user-activity-tracking-and-log-aebd24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0970%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20User%20Activity%20Tracking%20and%20Log&amp;severity=medium&amp;id=682cd0f91484d88663aebd24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0852-cwe-79-cross-site-scripting-xss-in-unknown-coreactivity-activity-logging-for-wordpress-aebccf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0852%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20coreActivity%3A%20Activity%20Logging%20for%20WordPress&amp;severity=high&amp;id=682cd0f91484d88663aebccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0249-cwe-79-cross-site-scripting-xss-in-unknown-advanced-schedule-posts-aebccd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0249%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Advanced%20Schedule%20Posts&amp;severity=high&amp;id=682cd0f91484d88663aebccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7297-cwe-352-cross-site-request-forgery-csrf-in-unknown-twitterposts-aebccb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7297%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TwitterPosts&amp;severity=low&amp;id=682cd0f91484d88663aebccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7239-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-wp-dashboard-notes-aebcc9</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7239%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20WP%20Dashboard%20Notes&amp;severity=high&amp;id=682cd0f91484d88663aebcc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7231-cwe-284-improper-access-control-in-unknown-illi-link-party-aebca2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7231%3A%20CWE-284%20Improper%20Access%20Control%20in%20Unknown%20illi%20Link%20Party!&amp;severity=high&amp;id=682cd0f91484d88663aebca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7230-cwe-79-cross-site-scripting-xss-in-unknown-illi-link-party-aebc95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7230%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20illi%20Link%20Party!&amp;severity=medium&amp;id=682cd0f91484d88663aebc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7229-cwe-352-cross-site-request-forgery-csrf-in-unknown-illi-link-party-aebc93</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7229%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20illi%20Link%20Party!&amp;severity=medium&amp;id=682cd0f91484d88663aebc93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7228-cwe-79-cross-site-scripting-xss-in-unknown-illi-link-party-aebc91</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7228%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20illi%20Link%20Party!&amp;severity=medium&amp;id=682cd0f91484d88663aebc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7197-cwe-352-cross-site-request-forgery-csrf-in-unknown-marketing-twitter-bot-aeb03b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7197%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Marketing%20Twitter%20Bot&amp;severity=high&amp;id=682cd0f71484d88663aeb03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7196-cwe-352-cross-site-request-forgery-csrf-in-unknown-ultimate-noindex-nofollow-tool-aeafd8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7196%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Ultimate%20Noindex%20Nofollow%20Tool&amp;severity=medium&amp;id=682cd0f71484d88663aeafd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7195-cwe-352-cross-site-request-forgery-csrf-in-unknown-wp-reply-notify-aeafd2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7195%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20WP-Reply%20Notify&amp;severity=medium&amp;id=682cd0f71484d88663aeafd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7174-cwe-352-cross-site-request-forgery-csrf-in-unknown-abitgone-commentsafe-aeafd0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7174%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20aBitGone%20CommentSafe&amp;severity=high&amp;id=682cd0f71484d88663aeafd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7168-cwe-79-cross-site-scripting-xss-in-unknown-better-follow-button-for-jetpack-aeafce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7168%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Better%20Follow%20Button%20for%20Jetpack&amp;severity=medium&amp;id=682cd0f71484d88663aeafce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7088-cwe-79-cross-site-scripting-xss-in-unknown-add-svg-support-for-media-uploader-inventivo-aeb92f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7088%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Add%20SVG%20Support%20for%20Media%20Uploader%20%7C%20inventivo&amp;severity=medium&amp;id=682cd0f91484d88663aeb92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7086-cwe-79-cross-site-scripting-xss-in-unknown-svg-uploads-support-aeb92d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7086%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20SVG%20Uploads%20Support&amp;severity=medium&amp;id=682cd0f91484d88663aeb92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6786-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-unknown-payment-gateway-for-telcell-aeb900</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6786%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Unknown%20Payment%20Gateway%20for%20Telcell&amp;severity=medium&amp;id=682cd0f91484d88663aeb900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6783-cwe-79-cross-site-scripting-xss-in-unknown-wolfnet-idx-for-wordpress-aeb3b8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6783%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WolfNet%20IDX%20for%20WordPress&amp;severity=medium&amp;id=682cd0f81484d88663aeb3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6541-cwe-79-cross-site-scripting-xss-in-unknown-allow-svg-aebaba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6541%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Allow%20SVG&amp;severity=medium&amp;id=682cd0f91484d88663aebaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6030-cwe-89-sql-injection-in-unknown-logdash-activity-log-aebab8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6030%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20LogDash%20Activity%20Log&amp;severity=medium&amp;id=682cd0f91484d88663aebab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5934-cwe-352-cross-site-request-forgery-csrf-in-unknown-travelpayouts-all-travel-brands-in-one-place-aebab2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5934%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Travelpayouts%3A%20All%20Travel%20Brands%20in%20One%20Place&amp;severity=high&amp;id=682cd0f91484d88663aebab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5932-cwe-79-cross-site-scripting-xss-in-unknown-travelpayouts-all-travel-brands-in-one-place-aebaa5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5932%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Travelpayouts%3A%20All%20Travel%20Brands%20in%20One%20Place&amp;severity=medium&amp;id=682cd0f91484d88663aebaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5529-cwe-79-cross-site-scripting-xss-in-unknown-advanced-page-visit-counter-aebaa3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5529%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Advanced%20Page%20Visit%20Counter&amp;severity=medium&amp;id=682cd0f91484d88663aebaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2334-cwe-79-cross-site-scripting-xss-in-unknown-edd-google-sheet-connector-pro-aebaa1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2334%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20edd-google-sheet-connector-pro&amp;severity=medium&amp;id=682cd0f91484d88663aebaa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2248-cwe-352-cross-site-request-forgery-csrf-in-unknown-wp-pmanager-aeba99</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2248%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP-PManager&amp;severity=medium&amp;id=682cd0f91484d88663aeba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2247-cwe-352-cross-site-request-forgery-csrf-in-unknown-wp-pmanager-aeba97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2247%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP-PManager&amp;severity=medium&amp;id=682cd0f91484d88663aeba97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2203-cwe-89-sql-injection-in-unknown-funnelkit-aebab6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2203%3A%20CWE-89%20SQL%20Injection%20in%20FunnelKit&amp;severity=medium&amp;id=682cd0f91484d88663aebab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1454-cwe-79-cross-site-scripting-xss-in-unknown-ninja-pages-aeba95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1454%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ninja%20Pages&amp;severity=medium&amp;id=682cd0f91484d88663aeba95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1303-cwe-79-cross-site-scripting-xss-in-unknown-plugin-oficial-aeade4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1303%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Plugin%20Oficial&amp;severity=medium&amp;id=682cd0f71484d88663aeade4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1289-cwe-79-cross-site-scripting-xss-in-unknown-plugin-oficial-aeac6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1289%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Plugin%20Oficial&amp;severity=medium&amp;id=682cd0f71484d88663aeac6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1288-cwe-79-cross-site-scripting-xss-in-unknown-wooexim-aeac6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1288%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WOOEXIM&amp;severity=medium&amp;id=682cd0f71484d88663aeac6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1286-cwe-79-cross-site-scripting-xss-in-unknown-download-html-tinymce-button-aec2b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1286%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Download%20HTML%20TinyMCE%20Button&amp;severity=medium&amp;id=682cd0fa1484d88663aec2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1033-cwe-79-cross-site-scripting-xss-in-unknown-badgearoo-aec2b4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1033%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Badgearoo&amp;severity=medium&amp;id=682cd0fa1484d88663aec2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0688-cwe-79-cross-site-scripting-xss-in-unknown-spiritual-gifts-survey-and-optional-s-h-a-p-e-survey-aec2b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0688%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Spiritual%20Gifts%20Survey%20(and%20optional%20S.H.A.P.E%20survey)&amp;severity=medium&amp;id=682cd0fa1484d88663aec2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0687-cwe-79-cross-site-scripting-xss-in-unknown-spiritual-gifts-survey-and-optional-s-h-a-p-e-survey-aec2b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0687%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Spiritual%20Gifts%20Survey%20(and%20optional%20S.H.A.P.E%20survey)&amp;severity=medium&amp;id=682cd0fa1484d88663aec2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0329-cwe-79-cross-site-scripting-xss-in-unknown-ai-chatbot-for-wordpress-aec2a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0329%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20AI%20ChatBot%20for%20WordPress&amp;severity=medium&amp;id=682cd0fa1484d88663aec2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9882-cwe-79-cross-site-scripting-xss-in-unknown-salon-booking-system-appointment-scheduling-for-salons-spas-small-businesses-aeb929</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9882%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Salon%20Booking%20System%2C%20Appointment%20Scheduling%20for%20Salons%2C%20Spas%20%26%20Small%20Businesses&amp;severity=medium&amp;id=682cd0f91484d88663aeb929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9879-cwe-89-sql-injection-in-unknown-melapress-file-monitor-aeba93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9879%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Melapress%20File%20Monitor&amp;severity=medium&amp;id=682cd0f91484d88663aeba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9838-cwe-89-sql-injection-in-unknown-auto-affiliate-links-aeba86</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9838%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Auto%20Affiliate%20Links&amp;severity=medium&amp;id=682cd0f91484d88663aeba86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9831-cwe-89-sql-injection-in-unknown-taskbuilder-aebe64</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9831%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Taskbuilder&amp;severity=high&amp;id=682cd0f91484d88663aebe64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9765-cwe-552-files-or-directories-accessible-to-external-parties-in-unknown-ekc-tournament-manager-aeba84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9765%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Unknown%20EKC%20Tournament%20Manager&amp;severity=medium&amp;id=682cd0f91484d88663aeba84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9711-cwe-352-cross-site-request-forgery-csrf-in-unknown-ekc-tournament-manager-aeba82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9711%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20EKC%20Tournament%20Manager&amp;severity=medium&amp;id=682cd0f91484d88663aeba82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9709-cwe-352-cross-site-request-forgery-csrf-in-unknown-ekc-tournament-manager-aeba80</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9709%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20EKC%20Tournament%20Manager&amp;severity=medium&amp;id=682cd0f91484d88663aeba80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9663-cwe-79-cross-site-scripting-xss-in-unknown-cyan-backup-aeba7e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9663%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20CYAN%20Backup&amp;severity=medium&amp;id=682cd0f91484d88663aeba7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9662-cwe-79-cross-site-scripting-xss-in-unknown-cyan-backup-aeba7c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9662%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20CYAN%20Backup&amp;severity=medium&amp;id=682cd0f91484d88663aeba7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9645-cwe-79-cross-site-scripting-xss-in-unknown-post-grid-posts-slider-posts-carousel-post-filter-post-masonry-aeba7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9645%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Post%20Grid%2C%20Posts%20Slider%2C%20Posts%20Carousel%2C%20Post%20Filter%2C%20Post%20Masonry&amp;severity=medium&amp;id=682cd0f91484d88663aeba7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9599-cwe-79-cross-site-scripting-xss-in-unknown-popup-box-aeba78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9599%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Popup%20Box&amp;severity=medium&amp;id=682cd0f91484d88663aeba78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9450-cwe-352-cross-site-request-forgery-csrf-in-unknown-free-booking-plugin-for-hotels-restaurants-and-car-rentals-aeba76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9450%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Free%20Booking%20Plugin%20for%20Hotels%2C%20Restaurants%20and%20Car%20Rentals&amp;severity=medium&amp;id=682cd0f91484d88663aeba76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9390-cwe-79-cross-site-scripting-xss-in-unknown-registrationmagic-aeb927</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9390%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20RegistrationMagic&amp;severity=medium&amp;id=682cd0f91484d88663aeb927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9238-cwe-79-cross-site-scripting-xss-in-unknown-avif-uploader-aeb925</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9238%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AVIF%20Uploader&amp;severity=medium&amp;id=682cd0f91484d88663aeb925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9236-cwe-79-cross-site-scripting-xss-in-unknown-team-aeb923</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9236%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Team&amp;severity=medium&amp;id=682cd0f91484d88663aeb923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9233-cwe-352-cross-site-request-forgery-csrf-in-unknown-logo-slider-aeb921</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9233%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Logo%20Slider&amp;severity=medium&amp;id=682cd0f91484d88663aeb921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9227-cwe-79-cross-site-scripting-xss-in-unknown-powerpress-podcasting-plugin-by-blubrry-aeb91f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9227%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PowerPress%20Podcasting%20plugin%20by%20Blubrry&amp;severity=medium&amp;id=682cd0f91484d88663aeb91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9182-cwe-79-cross-site-scripting-xss-in-unknown-maspik-aeb912</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9182%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Maspik&amp;severity=medium&amp;id=682cd0f91484d88663aeb912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8854-cwe-79-cross-site-scripting-xss-in-unknown-polls-cp-aeba74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8854%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Polls%20CP&amp;severity=medium&amp;id=682cd0f91484d88663aeba74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8851-cwe-79-cross-site-scripting-xss-in-unknown-polls-cp-aeba67</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8851%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Polls%20CP&amp;severity=medium&amp;id=682cd0f91484d88663aeba67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8759-cwe-79-cross-site-scripting-xss-in-unknown-nested-pages-aeb910</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8759%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Nested%20Pages&amp;severity=medium&amp;id=682cd0f91484d88663aeb910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8703-cwe-79-cross-site-scripting-xss-in-unknown-z-downloads-aeb90e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8703%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Z-Downloads&amp;severity=medium&amp;id=682cd0f91484d88663aeb90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8702-cwe-79-cross-site-scripting-xss-in-unknown-backup-database-aeb90c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8702%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Backup%20Database&amp;severity=medium&amp;id=682cd0f91484d88663aeb90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8701-cwe-79-cross-site-scripting-xss-in-unknown-events-calendar-aec2a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8701%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20events-calendar&amp;severity=medium&amp;id=682cd0fa1484d88663aec2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8700-cwe-284-improper-access-control-in-unknown-event-calendar-aec29f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8700%3A%20CWE-284%20Improper%20Access%20Control%20in%20Unknown%20Event%20Calendar&amp;severity=high&amp;id=682cd0fa1484d88663aec29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8699-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-z-downloads-aec29d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8699%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20Z-Downloads&amp;severity=high&amp;id=682cd0fa1484d88663aec29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8673-cwe-79-cross-site-scripting-xss-in-unknown-z-downloads-aec29b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8673%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Z-Downloads&amp;severity=critical&amp;id=682cd0fa1484d88663aec29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8670-cwe-79-cross-site-scripting-xss-in-unknown-photo-gallery-by-10web-aeac6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8670%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Photo%20Gallery%20by%2010Web&amp;severity=medium&amp;id=682cd0f71484d88663aeac6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8620-cwe-79-cross-site-scripting-xss-in-unknown-mappress-maps-for-wordpress-aec299</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8620%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MapPress%20Maps%20for%20WordPress&amp;severity=medium&amp;id=682cd0fa1484d88663aec299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8619-cwe-79-cross-site-scripting-xss-in-unknown-ajax-search-lite-aec297</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8619%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Ajax%20Search%20Lite&amp;severity=medium&amp;id=682cd0fa1484d88663aec297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8618-cwe-79-cross-site-scripting-xss-in-unknown-page-builder-pagelayer-aec295</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8618%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Page%20Builder%3A%20Pagelayer&amp;severity=medium&amp;id=682cd0fa1484d88663aec295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8617-cwe-79-cross-site-scripting-xss-in-unknown-quiz-maker-aeb90a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8617%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Quiz%20Maker&amp;severity=medium&amp;id=682cd0f91484d88663aeb90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8542-cwe-79-cross-site-scripting-xss-in-unknown-everest-forms-aeb908</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8542%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Everest%20Forms&amp;severity=medium&amp;id=682cd0f91484d88663aeb908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8493-cwe-79-cross-site-scripting-xss-in-unknown-the-events-calendar-aeb906</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8493%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20The%20Events%20Calendar&amp;severity=medium&amp;id=682cd0f91484d88663aeb906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8492-cwe-79-cross-site-scripting-xss-in-unknown-hustle-aeb904</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8492%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Hustle&amp;severity=medium&amp;id=682cd0f91484d88663aeb904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8426-cwe-79-cross-site-scripting-xss-in-unknown-page-builder-pagelayer-aeb902</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8426%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Page%20Builder%3A%20Pagelayer&amp;severity=medium&amp;id=682cd0f91484d88663aeb902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8398-cwe-352-cross-site-request-forgery-csrf-in-unknown-simple-nav-archives-aeb8f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8398%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Simple%20Nav%20Archives&amp;severity=medium&amp;id=682cd0f91484d88663aeb8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8397-cwe-79-cross-site-scripting-xss-in-unknown-webtoffee-gdpr-cookie-consent-aeb8f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8397%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20webtoffee-gdpr-cookie-consent&amp;severity=medium&amp;id=682cd0f91484d88663aeb8f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8286-cwe-352-cross-site-request-forgery-csrf-in-unknown-webtoffee-gdpr-cookie-consent-aeb8ef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8286%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20webtoffee-gdpr-cookie-consent&amp;severity=medium&amp;id=682cd0f91484d88663aeb8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8284-cwe-79-cross-site-scripting-xss-in-unknown-download-manager-aeb8ed</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8284%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Download%20Manager&amp;severity=medium&amp;id=682cd0f91484d88663aeb8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8245-cwe-352-cross-site-request-forgery-csrf-in-unknown-gamipress-aeb8eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8245%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20GamiPress&amp;severity=medium&amp;id=682cd0f91484d88663aeb8eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8187-cwe-79-cross-site-scripting-xss-in-unknown-smart-post-show-aec293</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8187%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Smart%20Post%20Show&amp;severity=medium&amp;id=682cd0fa1484d88663aec293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8095-cwe-79-cross-site-scripting-xss-in-unknown-babelz-aec291</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8095%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20BabelZ&amp;severity=medium&amp;id=682cd0fa1484d88663aec291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8094-cwe-352-cross-site-request-forgery-csrf-in-unknown-ntz-antispam-aec284</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8094%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Ntz%20Antispam&amp;severity=medium&amp;id=682cd0fa1484d88663aec284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8090-cwe-79-cross-site-scripting-xss-in-unknown-javascript-logic-aec282</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8090%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20JavaScript%20Logic&amp;severity=medium&amp;id=682cd0fa1484d88663aec282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8085-cwe-79-cross-site-scripting-xss-in-unknown-peoplepond-aec280</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8085%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PeoplePond&amp;severity=medium&amp;id=682cd0fa1484d88663aec280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8082-cwe-352-cross-site-request-forgery-csrf-in-unknown-widgets-reset-aec27e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8082%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Widgets%20Reset&amp;severity=medium&amp;id=682cd0fa1484d88663aec27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8050-cwe-352-cross-site-request-forgery-csrf-in-unknown-custom-author-base-aec27c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8050%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Custom%20Author%20Base&amp;severity=medium&amp;id=682cd0fa1484d88663aec27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8032-cwe-79-cross-site-scripting-xss-in-unknown-smooth-gallery-replacement-aec27a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8032%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Smooth%20Gallery%20Replacement&amp;severity=medium&amp;id=682cd0fa1484d88663aec27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8031-cwe-552-files-or-directories-accessible-to-external-parties-in-unknown-secure-downloads-aeb8e9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8031%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Unknown%20Secure%20Downloads&amp;severity=medium&amp;id=682cd0f91484d88663aeb8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7984-cwe-352-cross-site-request-forgery-csrf-in-unknown-joy-of-text-lite-aeb8e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7984%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Joy%20Of%20Text%20Lite&amp;severity=medium&amp;id=682cd0f91484d88663aeb8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7769-cwe-79-cross-site-scripting-xss-in-unknown-clicksold-idx-aeb8e5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7769%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20ClickSold%20IDX&amp;severity=medium&amp;id=682cd0f91484d88663aeb8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7762-cwe-200-information-exposure-in-unknown-simple-job-board-aeb8e3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7762%3A%20CWE-200%20Information%20Exposure%20in%20Unknown%20Simple%20Job%20Board&amp;severity=high&amp;id=682cd0f91484d88663aeb8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7761-cwe-79-cross-site-scripting-xss-in-unknown-simple-job-board-aeb8e1</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7761%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20Job%20Board&amp;severity=medium&amp;id=682cd0f91484d88663aeb8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7759-cwe-79-cross-site-scripting-xss-in-unknown-pwa-for-wp-aeb8d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7759%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PWA%20for%20WP&amp;severity=medium&amp;id=682cd0f91484d88663aeb8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7758-cwe-79-cross-site-scripting-xss-in-unknown-stylish-price-list-aeb8d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7758%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Stylish%20Price%20List&amp;severity=medium&amp;id=682cd0f91484d88663aeb8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7556-cwe-79-cross-site-scripting-xss-in-unknown-simple-share-aeb8d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7556%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20Share&amp;severity=medium&amp;id=682cd0f91484d88663aeb8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6809-cwe-89-sql-injection-in-unknown-simple-video-directory-aeb8ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6809%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Simple%20Video%20Directory&amp;severity=critical&amp;id=682cd0f91484d88663aeb8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6798-cwe-79-cross-site-scripting-xss-in-unknown-dl-verification-aeb8cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6798%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20DL%20Verification&amp;severity=medium&amp;id=682cd0f91484d88663aeb8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6797-cwe-79-cross-site-scripting-xss-in-unknown-dl-robots-txt-aec278</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6797%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20DL%20Robots.txt&amp;severity=medium&amp;id=682cd0fa1484d88663aec278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6719-cwe-352-cross-site-request-forgery-csrf-in-unknown-offload-videos-aec276</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6719%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Offload%20Videos&amp;severity=high&amp;id=682cd0fa1484d88663aec276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6718-cwe-79-cross-site-scripting-xss-in-unknown-pvn-auth-popup-aec274</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6718%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PVN%20Auth%20Popup&amp;severity=medium&amp;id=682cd0fa1484d88663aec274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6713-cwe-79-cross-site-scripting-xss-in-unknown-pvn-auth-popup-aec272</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6713%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PVN%20Auth%20Popup&amp;severity=medium&amp;id=682cd0fa1484d88663aec272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6712-cwe-79-cross-site-scripting-xss-in-unknown-mapfig-studio-aec265</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6712%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MapFig%20Studio&amp;severity=medium&amp;id=682cd0fa1484d88663aec265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6708-cwe-79-cross-site-scripting-xss-in-unknown-user-profile-builder-aec263</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6708%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20User%20Profile%20Builder&amp;severity=medium&amp;id=682cd0fa1484d88663aec263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6693-cwe-79-cross-site-scripting-xss-in-unknown-wccp-pro-aec261</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6693%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20wccp-pro&amp;severity=medium&amp;id=682cd0fa1484d88663aec261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6690-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-unknown-wccp-pro-aec25f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6690%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Unknown%20wccp-pro&amp;severity=medium&amp;id=682cd0fa1484d88663aec25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6668-cwe-79-cross-site-scripting-xss-in-unknown-profilepro-aec25d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6668%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20ProfilePro&amp;severity=medium&amp;id=682cd0fa1484d88663aec25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6667-cwe-79-cross-site-scripting-xss-in-unknown-kbucket-your-curated-content-in-wordpress-aeb8ca</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6667%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20KBucket%3A%20Your%20Curated%20Content%20in%20WordPress&amp;severity=medium&amp;id=682cd0f91484d88663aeb8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6665-cwe-79-cross-site-scripting-xss-in-unknown-kbucket-your-curated-content-in-wordpress-aeb8c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6665%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20KBucket%3A%20Your%20Curated%20Content%20in%20WordPress&amp;severity=medium&amp;id=682cd0f91484d88663aeb8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6584-cwe-918-server-side-request-forgery-ssrf-in-unknown-jetpack-boost-aeb8c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6584%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Unknown%20Jetpack%20Boost&amp;severity=critical&amp;id=682cd0f91484d88663aeb8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6486-cwe-78-os-command-injection-in-unknown-imagemagick-engine-aec25b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6486%3A%20CWE-78%20OS%20Command%20Injection%20in%20Unknown%20ImageMagick%20Engine&amp;severity=high&amp;id=682cd0fa1484d88663aec25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6478-cwe-79-cross-site-scripting-xss-in-unknown-ctt-expresso-para-woocommerce-aec259</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6478%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20CTT%20Expresso%20para%20WooCommerce&amp;severity=medium&amp;id=682cd0fa1484d88663aec259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6462-cwe-79-cross-site-scripting-xss-in-unknown-dl-yandex-metrika-aec257</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6462%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20DL%20Yandex%20Metrika&amp;severity=medium&amp;id=682cd0fa1484d88663aec257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6335-cwe-79-cross-site-scripting-xss-in-unknown-tracking-code-manager-aec255</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6335%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Tracking%20Code%20Manager&amp;severity=medium&amp;id=682cd0fa1484d88663aec255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6159-cwe-89-sql-injection-in-unknown-push-notification-for-post-and-buddypress-aec253</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6159%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Push%20Notification%20for%20Post%20and%20BuddyPress&amp;severity=critical&amp;id=682cd0fa1484d88663aec253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5440-cwe-79-cross-site-scripting-xss-in-unknown-if-so-dynamic-content-personalization-aec246</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5440%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20If-So%20Dynamic%20Content%20Personalization&amp;severity=medium&amp;id=682cd0fa1484d88663aec246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5026-cwe-79-cross-site-scripting-xss-in-unknown-cm-tooltip-glossary-aec244</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5026%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20CM%20Tooltip%20Glossary&amp;severity=medium&amp;id=682cd0fa1484d88663aec244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13865-cwe-79-cross-site-scripting-xss-in-unknown-s3player-aec242</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13865%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20S3Player&amp;severity=medium&amp;id=682cd0fa1484d88663aec242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13828-cwe-79-cross-site-scripting-xss-in-unknown-badgearoo-aec240</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13828%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Badgearoo&amp;severity=medium&amp;id=682cd0fa1484d88663aec240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13823-cwe-79-cross-site-scripting-xss-in-unknown-360-product-rotation-aec23e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13823%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20360%20Product%20Rotation&amp;severity=medium&amp;id=682cd0fa1484d88663aec23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13730-cwe-79-cross-site-scripting-xss-in-unknown-podlove-podcast-publisher-aec23c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13730%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=682cd0fa1484d88663aec23c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13729-cwe-79-cross-site-scripting-xss-in-unknown-podlove-podcast-publisher-aec23a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13729%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=682cd0fa1484d88663aec23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13727-cwe-79-cross-site-scripting-xss-in-unknown-memberspace-aec238</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13727%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MemberSpace&amp;severity=medium&amp;id=682cd0fa1484d88663aec238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13621-cwe-79-cross-site-scripting-xss-in-unknown-the-gdpr-framework-by-data443-aec236</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13621%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20The%20GDPR%20Framework%20By%20Data443&amp;severity=medium&amp;id=682cd0fa1484d88663aec236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13619-cwe-79-cross-site-scripting-xss-in-unknown-lifterlms-aec234</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13619%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20LifterLMS&amp;severity=medium&amp;id=682cd0fa1484d88663aec234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13616-cwe-79-cross-site-scripting-xss-in-unknown-vikbooking-hotel-booking-engine-pms-aec227</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13616%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=medium&amp;id=682cd0fa1484d88663aec227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13486-cwe-79-cross-site-scripting-xss-in-unknown-icegram-engage-aec225</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13486%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Icegram%20Engage&amp;severity=medium&amp;id=682cd0fa1484d88663aec225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13482-cwe-287-improper-authentication-in-unknown-icegram-engage-aec223</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13482%3A%20CWE-287%20Improper%20Authentication%20in%20Unknown%20Icegram%20Engage&amp;severity=medium&amp;id=682cd0fa1484d88663aec223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13384-cwe-79-cross-site-scripting-xss-in-unknown-photo-gallery-images-slider-in-rbs-image-gallery-aec221</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13384%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Photo%20Gallery%2C%20Images%2C%20Slider%20in%20Rbs%20Image%20Gallery&amp;severity=medium&amp;id=682cd0fa1484d88663aec221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13383-cwe-79-cross-site-scripting-xss-in-unknown-hd-quiz-aec21f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13383%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20HD%20Quiz&amp;severity=medium&amp;id=682cd0fa1484d88663aec21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13382-cwe-79-cross-site-scripting-xss-in-unknown-calculated-fields-form-aec21d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13382%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=682cd0fa1484d88663aec21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13357-cwe-79-cross-site-scripting-xss-in-unknown-ditty-aec21b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13357%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Ditty&amp;severity=medium&amp;id=682cd0fa1484d88663aec21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13313-cwe-79-cross-site-scripting-xss-in-unknown-aweber-aec219</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13313%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AWeber&amp;severity=medium&amp;id=682cd0fa1484d88663aec219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13128-cwe-79-cross-site-scripting-xss-in-unknown-learnpress-aec217</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13128%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20LearnPress&amp;severity=medium&amp;id=682cd0fa1484d88663aec217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13127-cwe-79-cross-site-scripting-xss-in-unknown-learnpress-aec215</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13127%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20LearnPress&amp;severity=medium&amp;id=682cd0fa1484d88663aec215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13053-cwe-79-cross-site-scripting-xss-in-unknown-form-maker-by-10web-aec208</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13053%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Form%20Maker%20by%2010Web&amp;severity=medium&amp;id=682cd0fa1484d88663aec208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12874-cwe-79-cross-site-scripting-xss-in-unknown-top-comments-aec206</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12874%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Top%20Comments&amp;severity=medium&amp;id=682cd0fa1484d88663aec206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12873-cwe-79-cross-site-scripting-xss-in-unknown-custom-field-manager-aec204</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12873%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Custom%20Field%20Manager&amp;severity=medium&amp;id=682cd0fa1484d88663aec204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12812-cwe-284-improper-access-control-in-unknown-wp-erp-complete-hr-solution-with-recruitment-job-listings-woocommerce-crm-accounting-aec202</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12812%3A%20CWE-284%20Improper%20Access%20Control%20in%20Unknown%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=high&amp;id=682cd0fa1484d88663aec202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12808-cwe-79-cross-site-scripting-xss-in-unknown-wp-erp-complete-hr-solution-with-recruitment-job-listings-woocommerce-crm-accounting-aec200</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12808%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=medium&amp;id=682cd0fa1484d88663aec200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12800-cwe-79-cross-site-scripting-xss-in-unknown-ip-based-login-aec1fe</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12800%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20IP%20Based%20Login&amp;severity=medium&amp;id=682cd0fa1484d88663aec1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12770-cwe-79-cross-site-scripting-xss-in-unknown-wp-ulike-aec1fc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12770%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20ULike&amp;severity=medium&amp;id=682cd0fa1484d88663aec1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12750-cwe-352-cross-site-request-forgery-csrf-in-unknown-competition-form-aec1fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12750%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Competition%20Form&amp;severity=medium&amp;id=682cd0fa1484d88663aec1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12743-cwe-79-cross-site-scripting-xss-in-unknown-mailpoet-aec1f8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12743%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MailPoet&amp;severity=medium&amp;id=682cd0fa1484d88663aec1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12739-cwe-79-cross-site-scripting-xss-in-unknown-mobile-contact-bar-aec1f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12739%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Mobile%20Contact%20Bar&amp;severity=medium&amp;id=682cd0fa1484d88663aec1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12735-cwe-79-cross-site-scripting-xss-in-unknown-advance-post-prefix-aec1e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12735%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Advance%20Post%20Prefix&amp;severity=high&amp;id=682cd0fa1484d88663aec1e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12734-cwe-79-cross-site-scripting-xss-in-unknown-advance-post-prefix-aec1e7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12734%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Advance%20Post%20Prefix&amp;severity=medium&amp;id=682cd0fa1484d88663aec1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12733-cwe-79-cross-site-scripting-xss-in-unknown-affiliateimportereb-aec1e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12733%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AffiliateImporterEb&amp;severity=medium&amp;id=682cd0fa1484d88663aec1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12732-cwe-79-cross-site-scripting-xss-in-unknown-affiliateimportereb-aec1e3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12732%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AffiliateImporterEb&amp;severity=medium&amp;id=682cd0fa1484d88663aec1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12726-cwe-79-cross-site-scripting-xss-in-unknown-clipart-aec1e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12726%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20ClipArt&amp;severity=medium&amp;id=682cd0fa1484d88663aec1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12725-cwe-79-cross-site-scripting-xss-in-unknown-clasify-classified-listing-aec1df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12725%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Clasify%20Classified%20Listing&amp;severity=medium&amp;id=682cd0fa1484d88663aec1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12724-cwe-79-cross-site-scripting-xss-in-unknown-wp-desklite-aec1dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12724%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20DeskLite&amp;severity=medium&amp;id=682cd0fa1484d88663aec1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12722-cwe-79-cross-site-scripting-xss-in-unknown-twitter-bootstrap-collapse-aka-accordian-shortcode-aec1db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12722%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Twitter%20Bootstrap%20Collapse%20aka%20Accordian%20Shortcode&amp;severity=medium&amp;id=682cd0fa1484d88663aec1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12716-cwe-79-cross-site-scripting-xss-in-unknown-simple-basic-contact-form-aec1d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12716%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20Basic%20Contact%20Form&amp;severity=medium&amp;id=682cd0fa1484d88663aec1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12680-cwe-79-cross-site-scripting-xss-in-unknown-prisna-gwt-aec1d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12680%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Prisna%20GWT&amp;severity=medium&amp;id=682cd0fa1484d88663aec1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12679-cwe-79-cross-site-scripting-xss-in-unknown-prisna-gwt-aec1ca</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12679%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Prisna%20GWT&amp;severity=medium&amp;id=682cd0fa1484d88663aec1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12301-cwe-352-cross-site-request-forgery-csrf-in-unknown-jsp-store-locator-aec1c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12301%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20JSP%20Store%20Locator&amp;severity=medium&amp;id=682cd0fa1484d88663aec1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12282-cwe-79-cross-site-scripting-xss-in-unknown-wordpress-aec1c6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12282%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WordPress%E8%BF%9E%E6%8E%A5%E5%BE%AE%E5%8D%9A&amp;severity=medium&amp;id=682cd0fa1484d88663aec1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11843-cwe-79-cross-site-scripting-xss-in-unknown-panorama-aec1c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11843%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Panorama&amp;severity=medium&amp;id=682cd0fa1484d88663aec1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11719-cwe-79-cross-site-scripting-xss-in-unknown-tarteaucitron-wp-aec1c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11719%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20tarteaucitron-wp&amp;severity=medium&amp;id=682cd0fa1484d88663aec1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11718-cwe-79-cross-site-scripting-xss-in-unknown-tarteaucitron-wp-aec1c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11718%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20tarteaucitron-wp&amp;severity=medium&amp;id=682cd0fa1484d88663aec1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11502-cwe-79-cross-site-scripting-xss-in-unknown-planning-center-online-giving-aec1be</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11502%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Planning%20Center%20Online%20Giving&amp;severity=medium&amp;id=682cd0fa1484d88663aec1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11373-cwe-352-cross-site-request-forgery-csrf-in-unknown-connexion-logs-aec1bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11373%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Connexion%20Logs&amp;severity=medium&amp;id=682cd0fa1484d88663aec1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11372-cwe-89-sql-injection-in-unknown-connexion-logs-aec1ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11372%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Connexion%20Logs&amp;severity=high&amp;id=682cd0fa1484d88663aec1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11269-cwe-89-sql-injection-in-unknown-ahathat-plugin-aec1b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11269%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20AHAthat%20Plugin&amp;severity=high&amp;id=682cd0fa1484d88663aec1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11267-cwe-89-sql-injection-in-unknown-jsp-store-locator-aec1ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11267%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20JSP%20Store%20Locator&amp;severity=high&amp;id=682cd0fa1484d88663aec1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11266-cwe-79-cross-site-scripting-xss-in-unknown-geocache-stat-bar-widget-aec1a9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11266%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Geocache%20Stat%20Bar%20Widget&amp;severity=medium&amp;id=682cd0fa1484d88663aec1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11221-cwe-79-cross-site-scripting-xss-in-unknown-full-screen-page-background-image-slideshow-aec1a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11221%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Full%20Screen%20(Page)%20Background%20Image%20Slideshow&amp;severity=medium&amp;id=682cd0fa1484d88663aec1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11190-cwe-79-cross-site-scripting-xss-in-unknown-jwp-a11y-aec1a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11190%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20jwp-a11y&amp;severity=medium&amp;id=682cd0fa1484d88663aec1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11189-cwe-79-cross-site-scripting-xss-in-unknown-social-share-and-social-locker-aec1a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11189%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Social%20Share%20And%20Social%20Locker&amp;severity=medium&amp;id=682cd0fa1484d88663aec1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11141-cwe-79-cross-site-scripting-xss-in-unknown-sailthru-triggermail-aec1a1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11141%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Sailthru%20Triggermail&amp;severity=medium&amp;id=682cd0fa1484d88663aec1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11140-cwe-79-cross-site-scripting-xss-in-unknown-real-wp-shop-lite-ajax-ecommerce-shopping-cart-aeafbb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11140%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Real%20WP%20Shop%20Lite%20Ajax%20eCommerce%20Shopping%20Cart&amp;severity=low&amp;id=682cd0f71484d88663aeafbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11109-cwe-79-cross-site-scripting-xss-in-unknown-wp-google-review-slider-aeafb9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11109%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Google%20Review%20Slider&amp;severity=medium&amp;id=682cd0f71484d88663aeafb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10818-cwe-79-cross-site-scripting-xss-in-unknown-jsfiddle-shortcode-aec19f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10818%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20JSFiddle%20Shortcode&amp;severity=medium&amp;id=682cd0fa1484d88663aec19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10677-cwe-352-cross-site-request-forgery-csrf-in-unknown-btev-aec19d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10677%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20BTEV&amp;severity=medium&amp;id=682cd0fa1484d88663aec19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10639-cwe-79-cross-site-scripting-xss-in-unknown-auto-prune-posts-aec19b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10639%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Auto%20Prune%20Posts&amp;severity=medium&amp;id=682cd0fa1484d88663aec19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10634-cwe-79-cross-site-scripting-xss-in-unknown-nokaut-offers-box-aec199</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10634%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Nokaut%20Offers%20Box&amp;severity=medium&amp;id=682cd0fa1484d88663aec199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10632-cwe-79-cross-site-scripting-xss-in-unknown-nokaut-offers-box-aec18c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10632%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Nokaut%20Offers%20Box&amp;severity=medium&amp;id=682cd0fa1484d88663aec18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10631-cwe-79-cross-site-scripting-xss-in-unknown-countdown-timer-for-wordpress-block-editor-aeafb5</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10631%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Countdown%20Timer%20for%20WordPress%20Block%20Editor&amp;severity=medium&amp;id=682cd0f71484d88663aeafb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10504-cwe-79-cross-site-scripting-xss-in-unknown-contact-form-survey-quiz-popup-form-builder-aeaf24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10504%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Contact%20Form%2C%20Survey%2C%20Quiz%20%26%20Popup%20Form%20Builder&amp;severity=medium&amp;id=682cd0f71484d88663aeaf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10475-cwe-79-cross-site-scripting-xss-in-unknown-responsive-contact-form-builder-lead-generation-plugin-aec18a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10475%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Responsive%20Contact%20Form%20Builder%20%26%20Lead%20Generation%20Plugin&amp;severity=medium&amp;id=682cd0fa1484d88663aec18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10362-cwe-79-cross-site-scripting-xss-in-unknown-social-media-share-buttons-social-sharing-icons-aec188</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10362%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Social%20Media%20Share%20Buttons%20%26%20Social%20Sharing%20Icons&amp;severity=medium&amp;id=682cd0fa1484d88663aec188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10149-cwe-79-cross-site-scripting-xss-in-unknown-social-slider-feed-aeaf16</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10149%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Social%20Slider%20Feed&amp;severity=medium&amp;id=682cd0f71484d88663aeaf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10145-cwe-79-cross-site-scripting-xss-in-unknown-hubbub-lite-aeaf12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10145%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Hubbub%20Lite&amp;severity=medium&amp;id=682cd0f71484d88663aeaf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10144-cwe-79-cross-site-scripting-xss-in-unknown-photo-gallery-images-slider-in-rbs-image-gallery-aeaf05</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10144%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Photo%20Gallery%2C%20Images%2C%20Slider%20in%20Rbs%20Image%20Gallery&amp;severity=medium&amp;id=682cd0f71484d88663aeaf05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10143-cwe-79-cross-site-scripting-xss-in-unknown-mb-custom-post-types-custom-taxonomies-aeaf03</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10143%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MB%20Custom%20Post%20Types%20%26%20Custom%20Taxonomies&amp;severity=medium&amp;id=682cd0f71484d88663aeaf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10107-cwe-79-cross-site-scripting-xss-in-unknown-giveaways-and-contests-by-rafflepress-aeaef3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10107%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Giveaways%20and%20Contests%20by%20RafflePress&amp;severity=medium&amp;id=682cd0f71484d88663aeaef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10098-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-applyonline-aeaec1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10098%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20ApplyOnline&amp;severity=low&amp;id=682cd0f71484d88663aeaec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10076-cwe-79-cross-site-scripting-xss-in-unknown-jetpack-aeaebf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10076%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Jetpack&amp;severity=medium&amp;id=682cd0f71484d88663aeaebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10075-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-jetpack-aeae58</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10075%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Jetpack&amp;severity=medium&amp;id=682cd0f71484d88663aeae58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10054-cwe-79-cross-site-scripting-xss-in-unknown-happyforms-aeaebd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10054%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Happyforms&amp;severity=medium&amp;id=682cd0f71484d88663aeaebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10009-cwe-89-sql-injection-in-unknown-melapress-file-monitor-aeae4b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10009%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Melapress%20File%20Monitor&amp;severity=medium&amp;id=682cd0f71484d88663aeae4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4717-sql-injection-in-phpgurukul-company-visitor-management-system-aebeda</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4717%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47789-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-horilla-opensource-horilla-aebe3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47789%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=682cd0f91484d88663aebe3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47788-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-atheos-atheos-aeb741</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47788%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Atheos%20Atheos&amp;severity=critical&amp;id=682cd0f81484d88663aeb741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46834-cwe-863-incorrect-authorization-in-alchemyplatform-modular-account-aeb739</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46834%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20alchemyplatform%20modular-account&amp;severity=medium&amp;id=682cd0f81484d88663aeb739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47786-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-emlog-emlog-aeb73d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47786%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emlog%20emlog&amp;severity=low&amp;id=682cd0f81484d88663aeb73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4716-sql-injection-in-campcodes-sales-and-inventory-system-aeb752</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4716%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4715-sql-injection-in-campcodes-sales-and-inventory-system-aeb750</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4715%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47785-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-emlog-emlog-aeb73b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47785%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20emlog%20emlog&amp;severity=high&amp;id=682cd0f81484d88663aeb73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47787-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-emlog-emlog-aeb73f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47787%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20emlog%20emlog&amp;severity=high&amp;id=682cd0f81484d88663aeb73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47161-cwe-284-improper-access-control-in-microsoft-microsoft-defender-for-endpoint-for-linux-aeba27</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47161%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Linux&amp;severity=high&amp;id=682cd0f91484d88663aeba27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47784-cwe-502-deserialization-of-untrusted-data-in-emlog-emlog-aebd5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47784%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20emlog%20emlog&amp;severity=medium&amp;id=682cd0f91484d88663aebd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26481-cwe-400-uncontrolled-resource-consumption-in-dell-powerscale-onefs-aebabc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26481%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Dell%20PowerScale%20OneFS&amp;severity=high&amp;id=682cd0f91484d88663aebabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4714-sql-injection-in-campcodes-sales-and-inventory-system-aeb77d</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4714%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30476-cwe-400-uncontrolled-resource-consumption-in-dell-powerscale-insightiq-aebac0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30476%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Dell%20PowerScale%20InsightIQ&amp;severity=medium&amp;id=682cd0f91484d88663aebac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30475-cwe-269-improper-privilege-management-in-dell-powerscale-insightiq-aebabe</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30475%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20PowerScale%20InsightIQ&amp;severity=high&amp;id=682cd0f91484d88663aebabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4713-sql-injection-in-campcodes-sales-and-inventory-system-aeb77b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4713%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4712-sql-injection-in-campcodes-sales-and-inventory-system-aeb779</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4712%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51666-cwe-862-missing-authorization-in-automattic-tours-aec430</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51666%3A%20Missing%20Authorization%20in%20Tosin%20Oguntuyi%20Tours&amp;severity=null&amp;id=682cd0fa1484d88663aec430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56006-cwe-862-missing-authorization-in-automattic-jetpack-debug-tools-aec432</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56006%3A%20CWE-862%20Missing%20Authorization%20in%20Automattic%20Jetpack%20Debug%20Tools&amp;severity=medium&amp;id=682cd0fa1484d88663aec432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32922-cwe-352-cross-site-request-forgery-csrf-in-tobias-wp2leads-aec455</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32922%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=682cd0fa1484d88663aec455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4711-sql-injection-in-campcodes-sales-and-inventory-system-aec46c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4711%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47774-cwe-691-insufficient-control-flow-management-in-vyperlang-vyper-aec464</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47774%3A%20CWE-691%3A%20Insufficient%20Control%20Flow%20Management%20in%20vyperlang%20vyper&amp;severity=low&amp;id=682cd0fa1484d88663aec464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4710-sql-injection-in-campcodes-sales-and-inventory-system-aec46a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4710%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4709-sql-injection-in-campcodes-sales-and-inventory-system-aec468</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4709%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47285-cwe-691-insufficient-control-flow-management-in-vyperlang-vyper-aec462</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47285%3A%20CWE-691%3A%20Insufficient%20Control%20Flow%20Management%20in%20vyperlang%20vyper&amp;severity=low&amp;id=682cd0fa1484d88663aec462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47279-cwe-401-missing-release-of-memory-after-effective-lifetime-in-nodejs-undici-aebeb9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47279%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20nodejs%20undici&amp;severity=low&amp;id=682cd0f91484d88663aebeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43853-cwe-61-unix-symbolic-link-symlink-following-in-bytecodealliance-wasm-micro-runtime-aec48b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43853%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=high&amp;id=682cd0fa1484d88663aec48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47580-cwe-862-missing-authorization-in-rustaurius-front-end-users-aec483</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47580%3A%20Missing%20Authorization%20in%20Rustaurius%20Front%20End%20Users&amp;severity=null&amp;id=682cd0fa1484d88663aec483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4708-sql-injection-in-campcodes-sales-and-inventory-system-aec436</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4708%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4707-sql-injection-in-campcodes-sales-and-inventory-system-aec42c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4707%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30421-cwe-121-stack-based-buffer-overflow-in-ni-circuit-design-suite-aec407</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30421%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=682cd0fa1484d88663aec407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4706-sql-injection-in-projectworlds-online-examination-system-aec391</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4706%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Examination%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30420-cwe-125-out-of-bounds-read-in-ni-circuit-design-suite-aec2bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30420%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=682cd0fa1484d88663aec2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30419-cwe-125-in-ni-circuit-design-suite-aec2ba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30419%3A%20CWE-125%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=682cd0fa1484d88663aec2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1647-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-bootstrap-bootstrap-aec2b8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bootstrap%20Bootstrap&amp;severity=medium&amp;id=682cd0fa1484d88663aec2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30418-cwe-787-out-of-bounds-write-in-ni-circuit-design-suite-aec453</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30418%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=682cd0fa1484d88663aec453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30417-cwe-787-out-of-bounds-write-in-ni-circuit-design-suite-aec451</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30417%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=682cd0fa1484d88663aec451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4705-sql-injection-in-phpgurukul-vehicle-parking-management-system-aec466</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4705%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3440-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ibm-security-guardium-aeb6f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=682cd0f81484d88663aeb6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4704-sql-injection-in-phpgurukul-vehicle-parking-management-system-aec522</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4704%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4703-sql-injection-in-phpgurukul-vehicle-parking-management-system-aec520</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4703%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2570-cwe-863-incorrect-authorization-in-mattermost-mattermost-aec51c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2570%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=low&amp;id=682cd0fa1484d88663aec51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2527-cwe-863-incorrect-authorization-in-mattermost-mattermost-aec509</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2527%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682cd0fa1484d88663aec509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4702-sql-injection-in-phpgurukul-vehicle-parking-management-system-aec5fb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4702%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4701-deserialization-in-vita-mllm-freeze-omni-aec5f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4701%3A%20Deserialization%20in%20VITA-MLLM%20Freeze-Omni&amp;severity=medium&amp;id=682cd0fb1484d88663aec5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/excel-ent-obfuscation-regex-gone-rogue-16a64a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Excel(ent)%20Obfuscation%3A%20Regex%20Gone%20Rogue&amp;severity=medium&amp;id=682c992c7960f6956616a64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4699-sql-injection-in-phpgurukul-apartment-visitors-management-system-aec415</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4699%3A%20SQL%20Injection%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4698-sql-injection-in-phpgurukul-directory-management-system-aec413</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4698%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4516-cwe-416-use-after-free-in-python-software-foundation-cpython-aeb86b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4516%3A%20CWE-416%20Use%20After%20Free%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=682cd0f81484d88663aeb86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-dprk-spotting-malicious-remote-it-applicants-16a8cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20DPRK%3A%20Spotting%20Malicious%20Remote%20IT%20Applicants&amp;severity=medium&amp;id=682c992c7960f6956616a8cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4697-sql-injection-in-phpgurukul-directory-management-system-aec6d0</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4697%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4696-sql-injection-in-phpgurukul-cyber-cafe-management-system-aec6ce</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4696%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4695-sql-injection-in-phpgurukul-cyber-cafe-management-system-aec769</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4695%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/web-scanning-sonicwall-for-cve-2021-20016-update-16a848</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update&amp;severity=medium&amp;id=682c992c7960f6956616a848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4762-cwe-20-improper-input-validation-in-lleidanet-pki-esigna-aec76b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4762%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Lleidanet%20PKI%20eSigna&amp;severity=low&amp;id=682cd0fb1484d88663aec76b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4564-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-facturaone-ticketbai-facturas-para-woocommerce-aec75c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4564%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20facturaone%20TicketBAI%20Facturas%20para%20WooCommerce&amp;severity=critical&amp;id=682cd0fb1484d88663aec75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3446-cwe-863-incorrect-authorization-in-mattermost-mattermost-aec74c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3446%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682cd0fb1484d88663aec74c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31947-cwe-645-overly-restrictive-account-lockout-mechanism-in-mattermost-mattermost-aec72d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31947%3A%20CWE-645%3A%20Overly%20Restrictive%20Account%20Lockout%20Mechanism%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682cd0fb1484d88663aec72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32738-missing-authentication-for-critical-function-in-i-o-data-device-inc-hdl-tc1-aec718</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32738%3A%20Missing%20authentication%20for%20critical%20function%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20HDL-TC1&amp;severity=medium&amp;id=682cd0fb1484d88663aec718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32002-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-i-o-data-device-inc-hdl-tc1-aec710</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32002%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20HDL-TC1&amp;severity=critical&amp;id=682cd0fb1484d88663aec710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4737-cwe-312-cleartext-storage-of-sensitive-information-in-tecno-com-transsion-aivoiceassistant-aec4e8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4737%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20TECNO%20com.transsion.aivoiceassistant&amp;severity=medium&amp;id=682cd0fa1484d88663aec4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27525-cwe-525-use-of-web-browser-cache-containing-sensitive-information-in-hitachi-jp1-it-desktop-management-2-smart-device-manager-aec6ff</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27525%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Smart%20Device%20Manager&amp;severity=low&amp;id=682cd0fb1484d88663aec6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27524-cwe-326-inadequate-encryption-strength-in-hitachi-jp1-it-desktop-management-2-smart-device-manager-aec6dc</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27524%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Smart%20Device%20Manager&amp;severity=medium&amp;id=682cd0fb1484d88663aec6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27523-cwe-611-improper-restriction-of-xml-external-entity-reference-in-hitachi-jp1-it-desktop-management-2-smart-device-manager-aec4ff</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27523%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Smart%20Device%20Manager&amp;severity=high&amp;id=682cd0fa1484d88663aec4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3742-cwe-79-cross-site-scripting-xss-in-unknown-responsive-lightbox-gallery-aec501</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3742%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=682cd0fa1484d88663aec501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13914-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-wp-experts-file-manager-advanced-shortcode-aec5bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13914%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WP%20Experts%20File%20Manager%20Advanced%20Shortcode&amp;severity=high&amp;id=682cd0fb1484d88663aec5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3053-cwe-94-improper-control-of-generation-of-code-code-injection-in-admintwentytwenty-uipress-lite-effortless-custom-dashboards-admin-themes-and-pages-aec5c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3053%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=high&amp;id=682cd0fb1484d88663aec5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4591-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-welukame-weluka-lite-aec589</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20welukame%20Weluka%20Lite&amp;severity=medium&amp;id=682cd0fb1484d88663aec589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4126-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-emmanuelg-eg-series-aec6f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4126%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20emmanuelg%20EG-Series&amp;severity=medium&amp;id=682cd0fb1484d88663aec6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3917-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-kelerkgibo-seo-bing-aec6bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3917%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kelerkgibo%20SEO%E5%90%88%E9%9B%86(%E6%94%AF%E6%8C%81%E7%99%BE%E5%BA%A6%2FGoogle%2FBing%2F%E5%A4%B4%E6%9D%A1%E6%8E%A8%E9%80%81)&amp;severity=critical&amp;id=682cd0fb1484d88663aec6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4589-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nackle2k10-bon-toolkit-aec6bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nackle2k10%20Bon%20Toolkit&amp;severity=medium&amp;id=682cd0fb1484d88663aec6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4579-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dyland-wp-content-security-plugin-aec698</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4579%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dyland%20WP%20Content%20Security%20Plugin&amp;severity=high&amp;id=682cd0fb1484d88663aec698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-transferloader-16a852</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20TransferLoader&amp;severity=medium&amp;id=682c992c7960f6956616a852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-15-68f28e80</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-15&amp;severity=medium&amp;id=68367c97182aa0cae231d120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44182-n-a-in-n-a-aec6ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44182%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44181-n-a-in-n-a-aec6ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44181%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48027-cwe-290-authentication-bypass-by-spoofing-in-mutonufoai-pgina-fork-aec63d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48027%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20MutonUfoAI%20pGina.Fork&amp;severity=medium&amp;id=682cd0fb1484d88663aec63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48024-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-bluewave-checkmate-aec587</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48024%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20BlueWave%20Checkmate&amp;severity=medium&amp;id=682cd0fb1484d88663aec587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44180-n-a-in-n-a-aec4c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44180%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48051-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-lichess-lila-aec42e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48051%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lichess%20Lila&amp;severity=medium&amp;id=682cd0fa1484d88663aec42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46052-n-a-in-n-a-aec42a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46052%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44183-n-a-in-n-a-aec426</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44183%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44110-n-a-in-n-a-aebeb5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44110%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f91484d88663aebeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52880-n-a-in-n-a-aebe5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52880%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f91484d88663aebe5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48050-cwe-24-path-traversal-filedir-in-cure53-dompurify-aebe58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48050%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Cure53%20DOMPurify&amp;severity=high&amp;id=682cd0f91484d88663aebe58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46053-n-a-in-n-a-aeb501</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46053%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44185-n-a-in-n-a-aeb4f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44185%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52878-n-a-in-n-a-aeb493</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52878%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52879-n-a-in-n-a-aeb48f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52879%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52877-n-a-in-n-a-aeb48d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52877%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-15-73f782</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-15&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb73f782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-15-f127f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f127f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47783-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-humansignal-label-studio-aec562</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47783%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HumanSignal%20label-studio&amp;severity=high&amp;id=682cd0fb1484d88663aec562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46836-cwe-20-improper-input-validation-in-ecki-net-tools-aec560</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46836%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ecki%20net-tools&amp;severity=medium&amp;id=682cd0fb1484d88663aec560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32421-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-vercel-next-js-aec51e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32421%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20vercel%20next.js&amp;severity=low&amp;id=682cd0fa1484d88663aec51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45067-escalation-of-privilege-in-intel-r-gaudi-r-software-installers-aeb8ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45067%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Gaudi(R)%20software%20installers&amp;severity=medium&amp;id=682cd0f81484d88663aeb8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47889-vulnerability-in-jenkins-project-jenkins-wso2-oauth-plugin-aeb5f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47889%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20WSO2%20Oauth%20Plugin&amp;severity=critical&amp;id=682cd0f81484d88663aeb5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47888-vulnerability-in-jenkins-project-jenkins-dingtalk-plugin-aec75a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47888%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20DingTalk%20Plugin&amp;severity=medium&amp;id=682cd0fb1484d88663aec75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47887-vulnerability-in-jenkins-project-jenkins-cadence-vmanager-plugin-aec758</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47887%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Cadence%20vManager%20Plugin&amp;severity=medium&amp;id=682cd0fb1484d88663aec758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47886-vulnerability-in-jenkins-project-jenkins-cadence-vmanager-plugin-aec756</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47886%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Cadence%20vManager%20Plugin&amp;severity=medium&amp;id=682cd0fb1484d88663aec756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47885-vulnerability-in-jenkins-project-jenkins-health-advisor-by-cloudbees-plugin-aeb086</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47885%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Health%20Advisor%20by%20CloudBees%20Plugin&amp;severity=high&amp;id=682cd0f71484d88663aeb086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47884-vulnerability-in-jenkins-project-jenkins-openid-connect-provider-plugin-aec754</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47884%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20OpenID%20Connect%20Provider%20Plugin&amp;severity=critical&amp;id=682cd0fb1484d88663aec754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33104-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ibm-websphere-application-server-aec88a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33104%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=682cd0fb1484d88663aec88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/april-2025-threat-trend-report-on-apt-attacks-south-korea-16a85b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=April%202025%20Threat%20Trend%20Report%20on%20APT%20Attacks%20(South%20Korea)&amp;severity=medium&amp;id=682c992c7960f6956616a85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/april-2025-threat-trend-report-on-ransomware-16a865</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=April%202025%20Threat%20Trend%20Report%20on%20Ransomware&amp;severity=medium&amp;id=682c992c7960f6956616a865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2900-cwe-122-heap-based-buffer-overflow-in-ibm-semeru-runtime-aec888</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2900%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20IBM%20Semeru%20Runtime&amp;severity=high&amp;id=682cd0fb1484d88663aec888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0136-cwe-319-cleartext-transmission-of-sensitive-information-in-palo-alto-networks-cloud-ngfw-aec882</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0136%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=682cd0fb1484d88663aec882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0138-cwe-613-insufficient-session-expiration-in-palo-alto-networks-prisma-cloud-compute-edition-aec884</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0138%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Palo%20Alto%20Networks%20Prisma%20Cloud%20Compute%20Edition&amp;severity=low&amp;id=682cd0fb1484d88663aec884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0137-cwe-83-improper-neutralization-of-script-in-attributes-in-a-web-page-in-palo-alto-networks-cloud-ngfw-aec827</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0137%3A%20CWE-83%3A%20Improper%20Neutralization%20of%20Script%20in%20Attributes%20in%20a%20Web%20Page%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=682cd0fb1484d88663aec827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4641-cwe-611-improper-restriction-of-xml-external-entity-reference-in-bonigarcia-webdrivermanager-aec829</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4641%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20bonigarcia%20webdrivermanager&amp;severity=critical&amp;id=682cd0fb1484d88663aec829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0135-cwe-266-incorrect-privilege-assignment-in-palo-alto-networks-globalprotect-app-aec825</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0135%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=medium&amp;id=682cd0fb1484d88663aec825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0134-cwe-94-improper-control-of-generation-of-code-code-injection-in-palo-alto-networks-cortex-xdr-broker-vm-aec79a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0134%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=682cd0fb1484d88663aec79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0133-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-palo-alto-networks-pan-os-aec823</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0133%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=low&amp;id=682cd0fb1484d88663aec823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0132-cwe-306-missing-authentication-for-critical-function-in-palo-alto-networks-cortex-xdr-broker-vm-aec816</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0132%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=682cd0fb1484d88663aec816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4640-cwe-787-out-of-bounds-write-in-pointcloudlibrary-pcl-aec735</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4640%3A%20CWE-787%20Out-of-bounds%20Write%20in%20PointCloudLibrary%20pcl&amp;severity=high&amp;id=682cd0fb1484d88663aec735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0131-cwe-266-incorrect-privilege-assignment-in-opswat-metadefender-endpoint-security-sdk-aeb8af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0131%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20OPSWAT%20MetaDefender%20Endpoint%20Security%20SDK&amp;severity=high&amp;id=682cd0f81484d88663aeb8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4639-cwe-611-improper-restriction-of-xml-external-entity-reference-in-peergos-peergos-aec80c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4639%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Peergos%20Peergos&amp;severity=high&amp;id=682cd0fb1484d88663aec80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4638-vulnerability-in-pointcloudlibrary-pcl-aec733</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4638%3A%20Vulnerability%20in%20PointCloudLibrary%20pcl&amp;severity=critical&amp;id=682cd0fb1484d88663aec733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4637-cwe-369-divide-by-zero-in-davisking-dlib-aec6c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4637%3A%20CWE-369%20Divide%20By%20Zero%20in%20davisking%20dlib&amp;severity=high&amp;id=682cd0fb1484d88663aec6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46786-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-zoom-communications-inc-zoom-workplace-apps-aec8b1</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46786%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=medium&amp;id=682cd0fb1484d88663aec8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4664-insufficient-policy-enforcement-in-google-chrome-aeb8c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4664%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=682cd0f91484d88663aeb8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46785-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-zoom-communications-inc-zoom-workplace-apps-aec8af</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46785%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=medium&amp;id=682cd0fb1484d88663aec8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30668-cwe-476-null-pointer-dereference-in-zoom-communications-inc-zoom-workplace-apps-aec8ad</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30668%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=medium&amp;id=682cd0fb1484d88663aec8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0130-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-palo-alto-networks-cloud-ngfw-aec72b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0130%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=682cd0fb1484d88663aec72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30667-cwe-476-null-pointer-dereference-in-zoom-communications-inc-zoom-workplace-apps-aec8ab</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30667%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=medium&amp;id=682cd0fb1484d88663aec8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30666-cwe-476-null-pointer-dereference-in-zoom-communications-inc-zoom-workplace-apps-for-windows-aec8a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30666%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps%20for%20Windows&amp;severity=medium&amp;id=682cd0fb1484d88663aec8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30665-cwe-476-null-pointer-dereference-in-zoom-communications-inc-zoom-workplace-apps-for-windows-aec8a7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30665%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps%20for%20Windows&amp;severity=medium&amp;id=682cd0fb1484d88663aec8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30664-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-zoom-communications-inc-zoom-workplace-apps-aeb8b3</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=medium&amp;id=682cd0f81484d88663aeb8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30663-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-zoom-communications-inc-zoom-workplace-apps-aeb8b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30663%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=high&amp;id=682cd0f81484d88663aeb8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47710-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-drupal-enterprise-mfa-tfa-for-drupal-aeb777</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47710%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=high&amp;id=682cd0f81484d88663aeb777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47709-cwe-862-missing-authorization-in-drupal-enterprise-mfa-tfa-for-drupal-aeb775</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47709%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=medium&amp;id=682cd0f81484d88663aeb775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47708-cwe-352-cross-site-request-forgery-csrf-in-drupal-enterprise-mfa-tfa-for-drupal-aeae62</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47708%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=high&amp;id=682cd0f71484d88663aeae62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47707-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-drupal-enterprise-mfa-tfa-for-drupal-aec6bd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47707%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=high&amp;id=682cd0fb1484d88663aec6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47706-cwe-294-authentication-bypass-by-capture-replay-in-drupal-enterprise-mfa-tfa-for-drupal-aeb773</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47706%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=medium&amp;id=682cd0f81484d88663aeb773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47705-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-iframe-remove-filter-aec696</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20IFrame%20Remove%20Filter&amp;severity=medium&amp;id=682cd0fb1484d88663aec696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47704-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-klaro-cookie-consent-management-aeae60</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Klaro%20Cookie%20%26%20Consent%20Management&amp;severity=medium&amp;id=682cd0f71484d88663aeae60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47703-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-cookies-consent-management-aeae5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20COOKiES%20Consent%20Management&amp;severity=medium&amp;id=682cd0f71484d88663aeae5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47702-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-oembed-providers-aec694</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20oEmbed%20Providers&amp;severity=medium&amp;id=682cd0fb1484d88663aec694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47701-cwe-352-cross-site-request-forgery-csrf-in-drupal-restrict-route-by-ip-aeae5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47701%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Restrict%20route%20by%20IP&amp;severity=high&amp;id=682cd0f71484d88663aeae5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3932-tracking-links-in-attachments-bypassed-remote-content-blocking-in-mozilla-thunderbird-aec50b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3932%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=682cd0fa1484d88663aec50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3909-javascript-execution-via-spoofed-pdf-attachment-and-file-link-in-mozilla-thunderbird-aec0b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3909%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=682cd0fa1484d88663aec0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3877-unsolicited-file-download-disk-space-exhaustion-and-credential-leakage-via-mailbox-links-in-mozilla-thunderbird-aec4c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3877&amp;severity=medium&amp;id=682cd0fa1484d88663aec4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3875-sender-spoofing-via-malformed-from-header-in-thunderbird-in-mozilla-thunderbird-aec63b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3875%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=682cd0fb1484d88663aec63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40595-cwe-918-server-side-request-forgery-ssrf-in-sonicwall-sma1000-aec86f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40595%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=682cd0fb1484d88663aec86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47782-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-motioneye-project-motioneye-aec8e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47782%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20motioneye-project%20motioneye&amp;severity=high&amp;id=682cd0fb1484d88663aec8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47781-cwe-331-insufficient-entropy-in-lukevella-rallly-aec8e5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47781%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20lukevella%20rallly&amp;severity=critical&amp;id=682cd0fb1484d88663aec8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47778-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sulu-sulu-aec8dd</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47778%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20sulu%20sulu&amp;severity=medium&amp;id=682cd0fb1484d88663aec8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47777-cwe-20-improper-input-validation-in-nanbingxyz-5ire-aec965</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47777%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=682cd0fb1484d88663aec965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47775-cwe-201-insertion-of-sensitive-information-into-sent-data-in-bullfrogsec-bullfrog-aec948</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47775%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20bullfrogsec%20bullfrog&amp;severity=medium&amp;id=682cd0fb1484d88663aec948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24969-cwe-639-authorization-bypass-through-user-controlled-key-in-combodo-itop-aec944</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24969%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aec944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24785-cwe-20-improper-input-validation-in-combodo-itop-aec999</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24785%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aec999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24026-cwe-1333-inefficient-regular-expression-complexity-in-combodo-itop-aec9d5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24026%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aec9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24022-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-combodo-itop-aec9c8</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24022%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=682cd0fb1484d88663aec9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24021-cwe-862-missing-authorization-in-combodo-itop-aec9c6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24021%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aec9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56157-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-combodo-itop-aec9c2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56157%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aec9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52601-cwe-639-authorization-bypass-through-user-controlled-key-in-combodo-itop-aeca17</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52601%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aeca17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10865-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-opentext-advance-authentication-aeb04a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%20Advance%20Authentication&amp;severity=critical&amp;id=682cd0f71484d88663aeb04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10864-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-opentext-advance-authentication-aeb048</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10864%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OpenText%20Advance%20Authentication&amp;severity=high&amp;id=682cd0f71484d88663aeb048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/modern-incident-response-tackling-malicious-ml-artifacts-16ab56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Modern%20Incident%20Response%3A%20Tackling%20Malicious%20ML%20Artifacts&amp;severity=medium&amp;id=682c992c7960f6956616ab56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-incident-response-team-16a63c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32756%3A%20FortiVoice%20Zero-Day%20Exploit%20Alert&amp;severity=medium&amp;id=682c992c7960f6956616a63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chihuahua-stealer-targets-browser-data-and-crypto-wallets-16ab5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20&apos;Chihuahua%20Stealer&apos;%20Targets%20Browser%20Data%20and%20Crypto%20Wallets&amp;severity=medium&amp;id=682c992c7960f6956616ab5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3600-use-of-externally-controlled-input-to-select-classes-or-code-unsafe-reflection-in-progress-software-telerik-ui-for-asp-net-ajax-aeca7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3600%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=high&amp;id=682cd0fb1484d88663aeca7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47436-cwe-122-heap-based-buffer-overflow-in-apache-software-foundation-apache-orc-aec808</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47436%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Apache%20Software%20Foundation%20Apache%20ORC&amp;severity=medium&amp;id=682cd0fb1484d88663aec808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53146-vulnerability-in-linux-linux-aecb4d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fc1484d88663aecb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3931-improper-handling-of-insufficient-permissions-or-privileges-in-red-hat-red-hat-enterprise-linux-10-aecb17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3931%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges&amp;severity=high&amp;id=682cd0fc1484d88663aecb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47445-cwe-23-relative-path-traversal-in-themewinter-eventin-aecb2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47445%3A%20Relative%20Path%20Traversal%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=682cd0fc1484d88663aecb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3769-cwe-639-authorization-bypass-through-user-controlled-key-in-latepoint-latepoint-calendar-booking-plugin-for-appointments-and-events-aecb11</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3769%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=682cd0fc1484d88663aecb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3834-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adaudit-plus-aecb15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3834%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=682cd0fc1484d88663aecb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3833-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adselfservice-plus-aecb13</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3833%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADSelfService%20Plus&amp;severity=high&amp;id=682cd0fc1484d88663aecb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47292-cwe-502-deserialization-of-untrusted-data-in-cap-collectif-cap-collectif-aecb2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47292%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20cap-collectif%20cap-collectif&amp;severity=critical&amp;id=682cd0fc1484d88663aecb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26864-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-apache-software-foundation-apache-iotdb-aeb4ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26864%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=high&amp;id=682cd0f81484d88663aeb4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26795-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-apache-software-foundation-apache-iotdb-jdbc-driver-aeb4ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26795%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB%20JDBC%20driver&amp;severity=high&amp;id=682cd0f81484d88663aeb4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24780-remote-code-execution-with-untrusted-uri-of-user-defined-function-in-apache-software-foundation-apache-iotdb-aec78a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24780%3A%20Remote%20Code%20Execution%20with%20untrusted%20URI%20of%20User-defined%20function%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=critical&amp;id=682cd0fb1484d88663aec78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4430-cwe-862-missing-authorization-in-naukowa-i-akademicka-sie-komputerowa-pa-stwowy-instytut-badawczy-ezd-rp-aecaf2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4430%3A%20CWE-862%20Missing%20Authorization%20in%20Naukowa%20i%20Akademicka%20Sie%C4%87%20Komputerowa%20-%20Pa%C5%84stwowy%20Instytut%20Badawczy%20EZD%20RP&amp;severity=high&amp;id=682cd0fc1484d88663aecaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2875-cwe-610-externally-controlled-reference-to-a-resource-in-another-sphere-in-schneider-electric-modicon-controllers-m241-m251-aecadf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2875%3A%20CWE-610%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%20%2F%20M251&amp;severity=high&amp;id=682cd0fc1484d88663aecadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8988-cwe-639-authorization-bypass-through-user-controlled-key-in-peepso-peepso-core-file-uploads-aecb32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8988%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20PeepSo%20PeepSo%20Core%3A%20File%20Uploads&amp;severity=medium&amp;id=682cd0fc1484d88663aecb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13940-cwe-918-server-side-request-forgery-ssrf-in-ninja-forms-ninja-forms-webhooks-aecb30</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13940%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ninja%20Forms%20Ninja%20Forms%20Webhooks&amp;severity=medium&amp;id=682cd0fc1484d88663aecb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0020-aeb4a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0020&amp;severity=low&amp;id=682cd0f81484d88663aeb4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52290-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-lf-edge-ekuiper-aecaf8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52290%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lf-edge%20ekuiper&amp;severity=medium&amp;id=682cd0fc1484d88663aecaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4520-cwe-862-missing-authorization-in-uncannyowl-uncanny-automator-easy-automation-integration-webhooks-workflow-builder-plugin-aecb2e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4520%3A%20CWE-862%20Missing%20Authorization%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=medium&amp;id=682cd0fc1484d88663aecb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3623-cwe-502-deserialization-of-untrusted-data-in-uncannyowl-uncanny-automator-easy-automation-integration-webhooks-workflow-builder-plugin-aecb0f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3623%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=critical&amp;id=682cd0fc1484d88663aecb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29691-n-a-in-n-a-aec750</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29691%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44879-n-a-in-n-a-aec74e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44879%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25370-n-a-in-n-a-aec73d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25370%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57096-n-a-in-n-a-aec73b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57096%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55569-n-a-in-n-a-aec739</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55569%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44184-n-a-in-n-a-aec731</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44184%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32363-n-a-in-n-a-aec72f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32363%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44024-n-a-in-n-a-aec71a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44024%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29690-n-a-in-n-a-aec70e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29690%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29688-n-a-in-n-a-aec70c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29688%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58101-n-a-in-n-a-aec6fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58101%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29689-n-a-in-n-a-aec6de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29689%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26783-n-a-in-n-a-aec61c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26783%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29686-n-a-in-n-a-aec4c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29686%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45516-n-a-in-n-a-aeb76d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45516%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26785-n-a-in-n-a-aeb5aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26785%3A%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44186-n-a-in-n-a-aeb513</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44186%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26784-n-a-in-n-a-aeb50d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26784%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56427-n-a-in-n-a-aeb505</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56427%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27891-n-a-in-n-a-aeb075</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27891%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeb075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57273-n-a-in-n-a-aeb06d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57273%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeb06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54780-n-a-in-n-a-aeb06b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54780%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeb06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54779-n-a-in-n-a-aeb069</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54779%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeb069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-14-29f1bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-14&amp;severity=medium&amp;id=682c7db1e8347ec82d29f1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-14-f12de0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4574-double-free-aec771</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4574%3A%20Double%20Free&amp;severity=medium&amp;id=682cd0fb1484d88663aec771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26646-cwe-73-external-control-of-file-name-or-path-in-microsoft-net-8-0-aeb942</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26646%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=682cd0f91484d88663aeb942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48869-escalation-of-privilege-in-intel-r-xeon-r-6-processor-with-e-cores-when-using-intel-r-trust-domain-extensions-intel-r-tdx-or-intel-r-software-guard-extensions-intel-r-sgx-aec798</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48869%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20processor%20with%20E-cores%20when%20using%20Intel(R)%20Trust%20Domain%20Extensions%20(Intel(R)%20TDX)%20or%20Intel(R)%20Software%20Guard%20Extensions%20(Intel(R)%20SGX)&amp;severity=medium&amp;id=682cd0fb1484d88663aec798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47800-escalation-of-privilege-in-intel-r-graphics-driver-software-aec796</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47800%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47795-escalation-of-privilege-in-intel-r-oneapi-dpc-c-compiler-software-aec794</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47795%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20oneAPI%20DPC%2B%2B%2FC%2B%2B%20Compiler%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47550-escalation-of-privilege-in-endurance-gaming-mode-software-installers-aec8ed</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47550%3A%20Escalation%20of%20Privilege%20in%20Endurance%20Gaming%20Mode%20software%20installers&amp;severity=medium&amp;id=682cd0fb1484d88663aec8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46895-escalation-of-privilege-in-intel-r-arc-amp-iris-r-xe-graphics-software-aec792</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46895%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Arc%E2%84%A2%20%26amp%3B%20Iris(R)%20Xe%20graphics%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45371-denial-of-service-in-intel-r-arc-amp-iris-r-xe-graphics-software-aecad7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45371%3A%20Denial%20of%20Service%20in%20Intel(R)%20Arc%E2%84%A2%20%26amp%3B%20Iris(R)%20Xe%20graphics%20software&amp;severity=medium&amp;id=682cd0fc1484d88663aecad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45333-denial-of-service-in-intel-r-data-center-gpu-flex-series-for-windows-driver-aecacf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45333%3A%20Denial%20of%20Service%20in%20Intel(R)%20Data%20Center%20GPU%20Flex%20Series%20for%20Windows%20driver&amp;severity=medium&amp;id=682cd0fb1484d88663aecacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45332-information-disclosure-in-intel-r-processors-aecab8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45332%3A%20Information%20Disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aecab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43420-information-disclosure-in-intel-atom-r-processors-aeca91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43420%3A%20Information%20Disclosure%20in%20Intel%20Atom(R)%20processors&amp;severity=medium&amp;id=682cd0fb1484d88663aeca91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43101-denial-of-service-in-intel-r-data-center-gpu-flex-series-for-windows-driver-software-aecaf6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43101%3A%20Denial%20of%20Service%20in%20Intel(R)%20Data%20Center%20GPU%20Flex%20Series%20for%20Windows%20driver%20software&amp;severity=medium&amp;id=682cd0fc1484d88663aecaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39833-escalation-of-privilege-in-intel-r-qat-software-aec790</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39833%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20QAT%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39758-denial-of-service-in-intel-r-arc-amp-iris-r-xe-graphics-software-aeca72</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39758%3A%20Denial%20of%20Service%20in%20Intel(R)%20Arc%E2%84%A2%20%26amp%3B%20Iris(R)%20Xe%20graphics%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aeca72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36292-denial-of-service-in-intel-r-data-center-gpu-flex-series-for-windows-driver-aeca70</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36292%3A%20Denial%20of%20Service%20in%20Intel(R)%20Data%20Center%20GPU%20Flex%20Series%20for%20Windows%20driver&amp;severity=high&amp;id=682cd0fb1484d88663aeca70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31150-information-disclosure-in-intel-r-graphics-driver-software-aeca34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31150%3A%20Information%20Disclosure%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aeca34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31073-escalation-of-privilege-in-intel-r-oneapi-level-zero-software-aec78e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31073%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20oneAPI%20Level%20Zero%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29222-denial-of-service-in-intel-r-graphics-driver-software-aeca32</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29222%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aeca32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28956-information-disclosure-in-intel-r-processors-aeca25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28956%3A%20Information%20Disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aeca25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28954-escalation-of-privilege-in-intel-r-graphics-driver-installers-aec78c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28954%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20installers&amp;severity=medium&amp;id=682cd0fb1484d88663aec78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28036-denial-of-service-in-intel-r-arc-gpu-aec8eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28036%3A%20Denial%20of%20Service%20in%20Intel(R)%20Arc%E2%84%A2%20GPU&amp;severity=medium&amp;id=682cd0fb1484d88663aec8eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24495-information-disclosure-in-intel-r-core-ultra-processors-aec8ef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24495%3A%20Information%20Disclosure%20in%20Intel(R)%20Core%E2%84%A2%20Ultra%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aec8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24308-escalation-of-privilege-in-intel-r-server-d50dnp-and-m50fcp-aec0b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24308%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP&amp;severity=high&amp;id=682cd0fa1484d88663aec0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23233-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7b9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23233%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22895-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aecacd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22895%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aecacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22892-denial-of-service-in-openvino-model-server-software-maintained-by-intel-r-aecac0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22892%3A%20Denial%20of%20Service%20in%20OpenVINO%E2%84%A2%20model%20server%20software%20maintained%20by%20Intel(R)&amp;severity=high&amp;id=682cd0fb1484d88663aecac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22848-denial-of-service-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aecabe</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22848%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aecabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22844-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aecabc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22844%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aecabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22843-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22843%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=high&amp;id=682cd0fb1484d88663aec7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22448-denial-of-service-in-intel-r-simics-r-package-manager-software-aecaba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22448%3A%20Denial%20of%20Service%20in%20Intel(R)%20Simics(R)%20Package%20Manager%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aecaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22446-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7b5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22446%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21100-information-disclosure-in-intel-r-server-d50dnp-and-m50fcp-boards-aecadd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21100%3A%20Information%20Disclosure%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP%20boards&amp;severity=medium&amp;id=682cd0fc1484d88663aecadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21099-escalation-of-privilege-in-intel-r-graphics-software-aec7b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21099%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21094-escalation-of-privilege-in-intel-r-server-d50dnp-and-m50fcp-boards-aec0af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21094%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP%20boards&amp;severity=high&amp;id=682cd0fa1484d88663aec0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21081-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7b1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21081%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=low&amp;id=682cd0fb1484d88663aec7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20629-escalation-of-privilege-in-intel-r-ethernet-network-adapter-e810-series-aec7af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20629%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Ethernet%20Network%20Adapter%20E810%20Series&amp;severity=medium&amp;id=682cd0fb1484d88663aec7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20624-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec886</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20624%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20623-information-disclosure-in-intel-r-core-processors-10th-generation-aec9c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20623%3A%20Information%20Disclosure%20in%20Intel(R)%20Core%E2%84%A2%20processors%20(10th%20Generation)&amp;severity=medium&amp;id=682cd0fb1484d88663aec9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20618-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aec997</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20618%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aec997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20616-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20616%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=low&amp;id=682cd0fb1484d88663aec7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20612-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20612%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20611-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aecadb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20611%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fc1484d88663aecadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20108-escalation-of-privilege-in-intel-r-network-adapter-driver-installers-for-windows-11-aec7a9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20108%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Network%20Adapter%20Driver%20installers%20for%20Windows%2011&amp;severity=medium&amp;id=682cd0fb1484d88663aec7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20104-escalation-of-privilege-in-administrative-tools-for-some-intel-r-network-adapters-package-aecad9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20104%3A%20Escalation%20of%20Privilege%20in%20Administrative%20Tools%20for%20some%20Intel(R)%20Network%20Adapters%20package&amp;severity=medium&amp;id=682cd0fc1484d88663aecad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20103-denial-of-service-in-intel-r-processors-aecad3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20103%3A%20Denial%20of%20Service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aecad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20101-information-disclosure-denial-of-service-in-intel-r-graphics-drivers-aecad1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20101%3A%20Information%20Disclosure%2C%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers&amp;severity=medium&amp;id=682cd0fb1484d88663aecad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20100-escalation-of-privilege-in-intel-r-xeon-r-6-processor-with-e-cores-aec7f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20100%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20processor%20with%20E-cores&amp;severity=high&amp;id=682cd0fb1484d88663aec7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20095-escalation-of-privilege-in-intel-r-realsense-sdk-software-aec0ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20095%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20RealSense%E2%84%A2%20SDK%20software&amp;severity=medium&amp;id=682cd0fa1484d88663aec0ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20084-denial-of-service-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aecaae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20084%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aecaae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20083-escalation-of-privilege-in-intel-r-slim-bootloader-aec0ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20083%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Slim%20Bootloader&amp;severity=high&amp;id=682cd0fa1484d88663aec0ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20082-escalation-of-privilege-in-intel-r-server-d50dnp-and-m50fcp-boards-aec0a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20082%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP%20boards&amp;severity=high&amp;id=682cd0fa1484d88663aec0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20079-escalation-of-privilege-in-intel-r-advisor-software-aec0a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20079%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Advisor%20software&amp;severity=medium&amp;id=682cd0fa1484d88663aec0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20076-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec98a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20076%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=low&amp;id=682cd0fb1484d88663aec98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20071-denial-of-service-in-intel-r-graphics-drivers-aec988</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20071%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers&amp;severity=medium&amp;id=682cd0fb1484d88663aec988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20062-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aec963</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20062%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aec963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20057-denial-of-service-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec942</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20057%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20054-denial-of-service-in-intel-r-processors-aec925</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20054%3A%20Denial%20of%20Service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aec925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20052-denial-of-service-in-intel-r-graphics-software-aec8e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20052%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20047-escalation-of-privilege-in-intel-r-core-ultra-processors-aecaa1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20047%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Core%E2%84%A2%20Ultra%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aecaa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20046-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aeca9f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20046%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aeca9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20043-escalation-of-privilege-in-intel-r-realsense-sdk-software-aec0a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20043%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20RealSense%E2%84%A2%20SDK%20software&amp;severity=medium&amp;id=682cd0fa1484d88663aec0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20041-escalation-of-privilege-in-intel-r-graphics-software-for-intel-r-arc-graphics-and-intel-r-iris-r-xe-graphics-aeca9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20041%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20software%20for%20Intel(R)%20Arc%E2%84%A2%20graphics%20and%20Intel(R)%20Iris(R)%20Xe%20graphics&amp;severity=medium&amp;id=682cd0fb1484d88663aeca9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20039-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aeca9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20039%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=medium&amp;id=682cd0fb1484d88663aeca9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20034-information-disclosure-in-intel-r-server-d50dnp-and-m50fcp-boards-aeca99</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20034%3A%20Information%20Disclosure%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP%20boards&amp;severity=medium&amp;id=682cd0fb1484d88663aeca99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20032-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aeca97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20032%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aeca97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20031-denial-of-service-in-intel-r-graphics-drivers-aeca95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20031%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers&amp;severity=medium&amp;id=682cd0fb1484d88663aeca95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20030-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aeca78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20030%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=low&amp;id=682cd0fb1484d88663aeca78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20026-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aeca76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20026%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aeca76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20022-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec411</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20022%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fa1484d88663aec411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20018-escalation-of-privilege-in-intel-r-graphics-drivers-aec40f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20018%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Drivers&amp;severity=medium&amp;id=682cd0fa1484d88663aec40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20015-escalation-of-privilege-in-intel-r-ethernet-connection-software-aec0a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20015%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Ethernet%20Connection%20software&amp;severity=medium&amp;id=682cd0fa1484d88663aec0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tales-from-the-cloud-trenches-the-attacker-doth-persist-too-much-methinks-16ac4b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tales%20from%20the%20cloud%20trenches%3A%20The%20Attacker%20doth%20persist%20too%20much%2C%20methinks&amp;severity=medium&amp;id=682c99307960f6956616ac4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta406-pivots-to-the-front-16abe3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA406%20Pivots%20to%20the%20Front&amp;severity=medium&amp;id=682c992c7960f6956616abe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pypi-package-targets-solana-developers-16ac52</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PyPI%20package%20targets%20Solana%20developers&amp;severity=medium&amp;id=682c99307960f6956616ac52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20013-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec91b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20013%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20012-information-disclosure-in-intel-r-core-ultra-processors-aec40d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20012%3A%20Information%20Disclosure%20in%20Intel(R)%20Core%E2%84%A2%20Ultra%20Processors&amp;severity=medium&amp;id=682cd0fa1484d88663aec40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20009-information-disclosure-in-intel-r-server-d50dnp-and-m50fcp-boards-aec8e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20009%3A%20Information%20Disclosure%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP%20boards&amp;severity=medium&amp;id=682cd0fb1484d88663aec8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20008-escalation-of-privilege-in-intel-r-simics-r-package-manager-software-aec8d0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20008%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Simics(R)%20Package%20Manager%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20006-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aeca74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20006%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aeca74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20004-escalation-of-privilege-in-intel-r-xeon-r-6-processor-e-cores-firmware-aec7f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20004%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20processor%20E-Cores%20firmware&amp;severity=high&amp;id=682cd0fb1484d88663aec7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20003-escalation-of-privilege-in-intel-r-graphics-driver-software-installers-aec7a7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20003%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software%20installers&amp;severity=high&amp;id=682cd0fb1484d88663aec7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43565-incorrect-authorization-cwe-863-in-adobe-coldfusion-aec7e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43565%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=682cd0fb1484d88663aec7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43559-improper-input-validation-cwe-20-in-adobe-coldfusion-aec7ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43559%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43562-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-cwe-78-in-adobe-coldfusion-aec7d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43562%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43566-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-coldfusion-aeca80</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43566%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682cd0fb1484d88663aeca80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43564-incorrect-authorization-cwe-863-in-adobe-coldfusion-aec7d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43564%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43560-improper-input-validation-cwe-20-in-adobe-coldfusion-aec7d0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43560%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43563-improper-access-control-cwe-284-in-adobe-coldfusion-aec7d6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43563%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43561-incorrect-authorization-cwe-863-in-adobe-coldfusion-aec7d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43561%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30315-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-connect-aecbc9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30315%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=682cd0fc1484d88663aecbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30316-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-connect-aec8a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30316%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=682cd0fb1484d88663aec8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30314-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-connect-aec8a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30314%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=682cd0fb1484d88663aec8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43567-cross-site-scripting-reflected-xss-cwe-79-in-adobe-adobe-connect-aec7e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43567%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=682cd0fb1484d88663aec7e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43554-out-of-bounds-write-cwe-787-in-adobe-substance3d-modeler-aecbb4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43554%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=682cd0fc1484d88663aecbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43553-uncontrolled-search-path-element-cwe-427-in-adobe-substance3d-modeler-aecbb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43553%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=682cd0fc1484d88663aecbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43569-out-of-bounds-write-cwe-787-in-adobe-substance3d-stager-aec7eb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43569%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=682cd0fb1484d88663aec7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43571-use-after-free-cwe-416-in-adobe-substance3d-stager-aec7ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43571%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=682cd0fb1484d88663aec7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43570-use-after-free-cwe-416-in-adobe-substance3d-stager-aec7ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43570%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=682cd0fb1484d88663aec7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43551-out-of-bounds-read-cwe-125-in-adobe-substance3d-stager-aec91f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43551%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=medium&amp;id=682cd0fb1484d88663aec91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43568-use-after-free-cwe-416-in-adobe-substance3d-stager-aec7e9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43568%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=682cd0fb1484d88663aec7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43549-use-after-free-cwe-416-in-adobe-substance3d-stager-aec7cc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43549%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=682cd0fb1484d88663aec7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43572-out-of-bounds-write-cwe-787-in-adobe-dimension-aec7f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43572%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=682cd0fb1484d88663aec7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43548-out-of-bounds-write-cwe-787-in-adobe-dimension-aec7ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43548%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=682cd0fb1484d88663aec7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disruption-of-drone-supply-chains-through-coordinated-multi-wave-attacks-in-taiwan-16ac7c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disruption%20of%20Drone%20Supply%20Chains%20Through%20Coordinated%20Multi-Wave%20Attacks%20in%20Taiwan&amp;severity=medium&amp;id=682c99307960f6956616ac7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3744-cwe-266-incorrect-privilege-assignment-in-hashicorp-nomad-enterprise-aecc72</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3744%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20HashiCorp%20Nomad%20Enterprise&amp;severity=high&amp;id=682cd0fc1484d88663aecc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43547-integer-overflow-or-wraparound-cwe-190-in-adobe-bridge-bd5f53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43547%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=682d9815c4522896dcbd5f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43546-integer-underflow-wrap-or-wraparound-cwe-191-in-adobe-bridge-bd5f4d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43546%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=682d9815c4522896dcbd5f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43545-access-of-uninitialized-pointer-cwe-824-in-adobe-bridge-bd5f4b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43545%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=682d9815c4522896dcbd5f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30330-heap-based-buffer-overflow-cwe-122-in-adobe-illustrator-bd5ef2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30330%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=682d9815c4522896dcbd5ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30329-null-pointer-dereference-cwe-476-in-adobe-animate-bd5f7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30329%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9815c4522896dcbd5f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43557-access-of-uninitialized-pointer-cwe-824-in-adobe-animate-bd5f7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43557%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Animate&amp;severity=high&amp;id=682d9815c4522896dcbd5f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43556-integer-overflow-or-wraparound-cwe-190-in-adobe-animate-bd5f76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43556%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Animate&amp;severity=high&amp;id=682d9815c4522896dcbd5f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43555-integer-underflow-wrap-or-wraparound-cwe-191-in-adobe-animate-bd5f63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43555%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Animate&amp;severity=high&amp;id=682d9815c4522896dcbd5f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30328-out-of-bounds-write-cwe-787-in-adobe-animate-bd5f57</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30328%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Animate&amp;severity=high&amp;id=682d9815c4522896dcbd5f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4660-cwe-276-incorrect-default-permissions-in-forescout-secureconnector-bd5f0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4660%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Forescout%20SecureConnector&amp;severity=high&amp;id=682d9815c4522896dcbd5f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30325-integer-overflow-or-wraparound-cwe-190-in-adobe-photoshop-desktop-bd5f82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30325%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=682d9815c4522896dcbd5f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30326-access-of-uninitialized-pointer-cwe-824-in-adobe-photoshop-desktop-bd5f3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30326%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=682d9815c4522896dcbd5f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30324-integer-underflow-wrap-or-wraparound-cwe-191-in-adobe-photoshop-desktop-bd5f34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30324%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=682d9815c4522896dcbd5f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30322-out-of-bounds-write-cwe-787-in-adobe-substance3d-painter-bd5f23</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30322%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=682d9815c4522896dcbd5f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31359-cwe-276-incorrect-default-permissions-in-amd-aim-t-manageability-api-aec08e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31359%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AMD%20AIM-T%20Manageability%20API&amp;severity=high&amp;id=682cd0fa1484d88663aec08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31358-cwe-276-incorrect-default-permissions-in-amd-aim-t-manageability-api-aec08c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31358%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AMD%20AIM-T%20Manageability%20API&amp;severity=high&amp;id=682cd0fa1484d88663aec08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27197-out-of-bounds-write-cwe-787-in-adobe-lightroom-desktop-bd5fa3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27197%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Lightroom%20Desktop&amp;severity=high&amp;id=682d9815c4522896dcbd5fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30320-null-pointer-dereference-cwe-476-in-adobe-indesign-desktop-bd5fd3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30320%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=682d9815c4522896dcbd5fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30318-out-of-bounds-write-cwe-787-in-adobe-indesign-desktop-aecc11</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30318%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=682cd0fc1484d88663aecc11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30319-null-pointer-dereference-cwe-476-in-adobe-indesign-desktop-bd5fcf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30319%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=682d9815c4522896dcbd5fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0035-cwe-428-unquoted-search-path-or-element-in-amd-amd-cloud-manageability-service-aec0a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0035%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20AMD%20AMD%20Cloud%20Manageability%20Service&amp;severity=high&amp;id=682cd0fa1484d88663aec0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47280-cwe-116-improper-encoding-or-escaping-of-output-in-umbraco-umbraco-forms-issues-bd5fc1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47280%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20umbraco%20Umbraco.Forms.Issues&amp;severity=low&amp;id=682d9815c4522896dcbd5fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36321-cwe-428-unquoted-search-path-or-element-in-amd-aim-t-manageability-service-aec092</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36321%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20AMD%20AIM-T%20Manageability%20Service&amp;severity=high&amp;id=682cd0fa1484d88663aec092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6364-vulnerability-in-absolute-security-absolute-persistence-bd5f96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6364%3A%20Vulnerability%20in%20Absolute%20Security%20Absolute%20Persistence&amp;severity=medium&amp;id=682d9815c4522896dcbd5f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24063-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb940</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24063%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32707-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeba1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32707%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeba1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32705-cwe-125-out-of-bounds-read-in-microsoft-microsoft-365-apps-for-enterprise-aeba1b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32705%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeba1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32704-cwe-126-buffer-over-read-in-microsoft-microsoft-office-2019-aeba19</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32704%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeba19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32702-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-microsoft-microsoft-visual-studio-2019-version-16-11-includes-16-0-16-10-aeba0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32702%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202019%20version%2016.11%20(includes%2016.0%20-%2016.10)&amp;severity=high&amp;id=682cd0f91484d88663aeba0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30397-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-10-version-1809-aeba02</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30397%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeba02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30388-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-office-ltsc-for-mac-2021-aeb9fc</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30388%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=682cd0f91484d88663aeb9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30385-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb9eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30385%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29974-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-aeb9c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29974%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29963-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb9a3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29963%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aeb9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29962-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb9a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29962%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29961-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb99f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29961%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29958-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aeb98e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29958%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29957-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aeb98c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29957%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29956-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-aeb98a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29956%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29955-cwe-20-improper-input-validation-in-microsoft-windows-server-2025-server-core-installation-aeb988</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29955%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=682cd0f91484d88663aeb988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29954-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aeb986</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29954%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29842-cwe-349-acceptance-of-extraneous-untrusted-data-with-trusted-data-in-microsoft-windows-10-version-22h2-aeb984</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29842%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29841-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-server-2022-aeb982</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29841%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aeb982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29840-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb980</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29840%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29839-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb97e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29839%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29838-cwe-476-null-pointer-dereference-in-microsoft-windows-server-2025-server-core-installation-aeb97c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29838%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f91484d88663aeb97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29837-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-aeb96f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29837%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29836-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb96d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29836%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29835-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb96b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29835%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29833-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-aeb969</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29833%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29832-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb967</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29832%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29831-cwe-416-use-after-free-in-microsoft-windows-server-2019-aeb965</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29831%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=682cd0f91484d88663aeb965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29830-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aeb963</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29830%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29829-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aeb961</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29829%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26685-cwe-287-improper-authentication-in-microsoft-microsoft-defender-for-identity-aeb948</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26685%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20Defender%20for%20Identity&amp;severity=medium&amp;id=682cd0f91484d88663aeb948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27488-cwe-798-use-of-hard-coded-credentials-in-microsoft-windows-hlk-for-windows-server-2025-aeb94c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27488%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Microsoft%20Windows%2010%20HLK%20version%2020H2&amp;severity=medium&amp;id=682cd0f91484d88663aeb94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26677-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aeb944</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26677%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aeb944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32709-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeba21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32709%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeba21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21264-cwe-552-files-or-directories-accessible-to-external-parties-in-microsoft-visual-studio-code-aeb931</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21264%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=682cd0f91484d88663aeb931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32706-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aeba1d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32706%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeba1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32703-cwe-1220-insufficient-granularity-of-access-control-in-microsoft-microsoft-visual-studio-2017-version-15-9-includes-15-0-15-8-aeba17</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32703%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=medium&amp;id=682cd0f91484d88663aeba17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32701-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeba08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32701%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeba08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30400-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeba04</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30400%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aeba04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30394-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-aeba00</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30394%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202012&amp;severity=medium&amp;id=682cd0f91484d88663aeba00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29826-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-microsoft-microsoft-dataverse-aeb95d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29826%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Microsoft%20Dataverse&amp;severity=high&amp;id=682cd0f91484d88663aeb95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30393-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aeb9fe</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30393%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27468-cwe-269-improper-privilege-management-in-microsoft-windows-10-version-1809-aeb94a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27468%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30387-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-microsoft-azure-ai-document-intelligence-studio-aeb9fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30387%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20Azure%20AI%20Document%20Intelligence%20Studio&amp;severity=critical&amp;id=682cd0f91484d88663aeb9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30386-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb9f8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30386%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30384-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aeb9e9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30384%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aeb9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30383-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-office-online-server-aeb9e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30383%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30382-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aeb9e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30382%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aeb9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30381-cwe-125-out-of-bounds-read-in-microsoft-office-online-server-aeb9e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30381%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30379-cwe-763-release-of-invalid-pointer-or-reference-in-microsoft-office-online-server-aeb9e1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30379%3A%20CWE-763%3A%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30378-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aeb9df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30378%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aeb9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30377-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb9dd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30377%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30376-cwe-122-heap-based-buffer-overflow-in-microsoft-office-online-server-aeb9db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30376%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30375-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-office-online-server-aeb9d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30375%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29979-cwe-122-heap-based-buffer-overflow-in-microsoft-office-online-server-aeb9cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29979%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29978-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aeb9ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29978%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29977-cwe-416-use-after-free-in-microsoft-office-online-server-aeb9c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29977%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29976-cwe-269-improper-privilege-management-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aeb9c6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29976%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aeb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29975-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-pc-manager-aeb9c4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29975%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20PC%20Manager&amp;severity=high&amp;id=682cd0f91484d88663aeb9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29973-cwe-284-improper-access-control-in-microsoft-azure-file-sync-aeb9c0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29973%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20File%20Sync&amp;severity=high&amp;id=682cd0f91484d88663aeb9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29971-cwe-125-out-of-bounds-read-in-microsoft-windows-11-version-22h2-aeb9bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29971%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aeb9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29970-cwe-416-use-after-free-in-microsoft-windows-server-2025-server-core-installation-aeb9ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29970%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f91484d88663aeb9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29969-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-aeb9ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29969%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29968-cwe-20-improper-input-validation-in-microsoft-windows-server-2019-aeb9ab</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29968%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aeb9ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29967-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-app-client-for-windows-desktop-aeb9a9</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29967%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=682cd0f91484d88663aeb9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29966-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-app-client-for-windows-desktop-aeb9a7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29966%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=682cd0f91484d88663aeb9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29964-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb9a5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29964%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aeb9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29960-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb99d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29960%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29959-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aeb99b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29959%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26684-cwe-73-external-control-of-file-name-or-path-in-microsoft-microsoft-defender-for-endpoint-for-linux-aeb946</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26684%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Linux&amp;severity=medium&amp;id=682cd0f91484d88663aeb946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36339-cwe-276-incorrect-default-permissions-in-amd-amd-optimizing-cpu-libraries-aocl-aec094</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36339%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AMD%20AMD%20Optimizing%20CPU%20Libraries%20(AOCL)&amp;severity=high&amp;id=682cd0fa1484d88663aec094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21960-cwe-276-incorrect-default-permissions-in-amd-amd-optimizing-cpu-libraries-aocl-aec090</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21960%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AMD%20AMD%20Optimizing%20CPU%20Libraries%20(AOCL)&amp;severity=high&amp;id=682cd0fa1484d88663aec090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30310-access-of-resource-using-incompatible-type-type-confusion-cwe-843-in-adobe-dreamweaver-desktop-bd5fcb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30310%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20(CWE-843)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=682d9815c4522896dcbd5fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4658-cwe-305-authentication-bypass-by-primary-weakness-in-opkssh-opkssh-aecbe6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4658%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20OPKSSH%20OPKSSH&amp;severity=critical&amp;id=682cd0fc1484d88663aecbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3757-cwe-305-authentication-bypass-by-primary-weakness-in-opkssh-opkssh-aecbd7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3757%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20OPKSSH%20OPKSSH&amp;severity=critical&amp;id=682cd0fc1484d88663aecbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47278-cwe-683-function-call-with-incorrect-order-of-arguments-in-pallets-flask-aecbe4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47278%3A%20CWE-683%3A%20Function%20Call%20With%20Incorrect%20Order%20of%20Arguments%20in%20pallets%20flask&amp;severity=low&amp;id=682cd0fc1484d88663aecbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4428-cwe-94-improper-control-of-generation-of-code-code-injection-in-ivanti-endpoint-manager-mobile-aeb2f2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4428%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=682cd0f81484d88663aeb2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4427-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-ivanti-endpoint-manager-mobile-aeb2e5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4427%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=medium&amp;id=682cd0f81484d88663aeb2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47276-cwe-328-use-of-weak-hash-in-chewkeanho-actualizer-aecc43</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47276%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20ChewKeanHo%20Actualizer&amp;severity=high&amp;id=682cd0fc1484d88663aecc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46721-cwe-352-cross-site-request-forgery-csrf-in-justinas-nosurf-aecca0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46721%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20justinas%20nosurf&amp;severity=medium&amp;id=682cd0fc1484d88663aecca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31493-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-getkirby-kirby-aecc91</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31493%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=682cd0fc1484d88663aecc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30207-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-getkirby-kirby-aecc34</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30207%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getkirby%20kirby&amp;severity=low&amp;id=682cd0fc1484d88663aecc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22462-cwe-288-in-ivanti-neurons-for-itsm-on-prem-aecc2a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22462%3A%20CWE-288%20in%20Ivanti%20Neurons%20for%20ITSM%20(on-prem)&amp;severity=critical&amp;id=682cd0fc1484d88663aecc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22460-cwe-1392-use-of-default-credentials-in-ivanti-csa-cloud-services-appliance-aecc28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22460%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Ivanti%20CSA%20(Cloud%20Services%20Appliance)&amp;severity=high&amp;id=682cd0fc1484d88663aecc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30159-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-getkirby-kirby-aecc24</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30159%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=682cd0fc1484d88663aecc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12533-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-phoenix-securecore-technology-4-bd633f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12533%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Phoenix%20SecureCore%20Technology%204&amp;severity=low&amp;id=682d9815c4522896dcbd633f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22859-execute-unauthorized-code-or-commands-in-fortinet-forticlientems-bd635c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22859%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=682d9815c4522896dcbd635c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35281-execute-unauthorized-code-or-commands-in-fortinet-forticlientmac-bd6347</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35281%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientMac&amp;severity=low&amp;id=682d9815c4522896dcbd6347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36340-cwe-1386-insecure-operation-on-windows-junction-mount-point-in-amd-amd-prof-bd5fdb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36340%3A%20CWE-1386%20-%20Insecure%20Operation%20on%20Windows%20Junction%20%2F%20Mount%20Point%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=682d9815c4522896dcbd5fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42446-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-ami-aptiov-bd6358</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42446%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20AMI%20AptioV&amp;severity=high&amp;id=682d9815c4522896dcbd6358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-breed-of-infostealer-16ac70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20New%20Breed%20of%20Infostealer&amp;severity=medium&amp;id=682c99307960f6956616ac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4649-cwe-269-improper-privilege-management-in-centreon-web-bd667e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4649%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Centreon%20web&amp;severity=medium&amp;id=682d9816c4522896dcbd667e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32917-cwe-427-uncontrolled-search-path-element-in-checkmk-gmbh-checkmk-bd6638</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32917%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=682d9816c4522896dcbd6638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4648-cwe-494-download-of-code-without-integrity-check-in-centreon-web-bd666d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4648%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Centreon%20web&amp;severity=high&amp;id=682d9816c4522896dcbd666d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40583-cwe-319-cleartext-transmission-of-sensitive-information-in-siemens-scalance-lpe9403-bd6655</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40583%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9816c4522896dcbd6655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40582-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-siemens-scalance-lpe9403-bd65fa</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40582%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=high&amp;id=682d9816c4522896dcbd65fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40581-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-siemens-scalance-lpe9403-bd65f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40581%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=high&amp;id=682d9816c4522896dcbd65f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40580-cwe-121-stack-based-buffer-overflow-in-siemens-scalance-lpe9403-bd65f0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40580%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9816c4522896dcbd65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40579-cwe-121-stack-based-buffer-overflow-in-siemens-scalance-lpe9403-bd65cc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40579%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9816c4522896dcbd65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40578-cwe-125-out-of-bounds-read-in-siemens-scalance-lpe9403-bd65c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40578%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9816c4522896dcbd65c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40577-cwe-125-out-of-bounds-read-in-siemens-scalance-lpe9403-bd65bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40577%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9816c4522896dcbd65bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40576-cwe-476-null-pointer-dereference-in-siemens-scalance-lpe9403-bd5f86</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40576%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9815c4522896dcbd5f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40575-cwe-457-use-of-uninitialized-variable-in-siemens-scalance-lpe9403-bd5f5f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40575%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9815c4522896dcbd5f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40574-cwe-732-incorrect-permission-assignment-for-critical-resource-in-siemens-scalance-lpe9403-bd5f5b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40574%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=high&amp;id=682d9815c4522896dcbd5f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40573-cwe-35-path-traversal-in-siemens-scalance-lpe9403-bd5f06</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40573%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9815c4522896dcbd5f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40572-cwe-732-incorrect-permission-assignment-for-critical-resource-in-siemens-scalance-lpe9403-bd5f00</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40572%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9815c4522896dcbd5f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40571-cwe-266-incorrect-privilege-assignment-in-siemens-mendix-oidc-sso-mendix-10-compatible-bd5edf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40571%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Siemens%20Mendix%20OIDC%20SSO%20(Mendix%2010.12%20compatible)&amp;severity=low&amp;id=682d9815c4522896dcbd5edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40566-cwe-613-insufficient-session-expiration-in-siemens-simatic-pcs-neo-v4-1-bd5edb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40566%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=682d9815c4522896dcbd5edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40556-cwe-20-improper-input-validation-in-siemens-bacnet-atec-550-440-bd5ece</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40556%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20BACnet%20ATEC%20550-440&amp;severity=medium&amp;id=682d9815c4522896dcbd5ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40555-cwe-440-expected-behavior-violation-in-siemens-apogee-pxc-talon-tc-series-bacnet-bd65a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40555%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20Siemens%20APOGEE%20PXC%2BTALON%20TC%20Series%20(BACnet)&amp;severity=medium&amp;id=682d9816c4522896dcbd65a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33025-cwe-602-client-side-enforcement-of-server-side-security-in-siemens-ruggedcom-rox-mx5000-bd659f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33025%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=critical&amp;id=682d9816c4522896dcbd659f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33024-cwe-602-client-side-enforcement-of-server-side-security-in-siemens-ruggedcom-rox-mx5000-bd6586</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33024%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=critical&amp;id=682d9816c4522896dcbd6586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32469-cwe-602-client-side-enforcement-of-server-side-security-in-siemens-ruggedcom-rox-mx5000-bd6515</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32469%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=critical&amp;id=682d9815c4522896dcbd6515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32454-cwe-125-out-of-bounds-read-in-siemens-teamcenter-visualization-v14-3-bd64c0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32454%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Teamcenter%20Visualization%20V14.3&amp;severity=high&amp;id=682d9815c4522896dcbd64c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31930-cwe-1188-initialization-of-a-resource-with-an-insecure-default-in-siemens-iec-1ph-7-4kw-child-socket-bd640e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31930%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Siemens%20IEC%201Ph%207.4kW%20Child%20socket&amp;severity=high&amp;id=682d9815c4522896dcbd640e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31929-cwe-1326-missing-immutable-root-of-trust-in-hardware-in-siemens-iec-1ph-7-4kw-child-socket-bd6373</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31929%3A%20CWE-1326%3A%20Missing%20Immutable%20Root%20of%20Trust%20in%20Hardware%20in%20Siemens%20IEC%201Ph%207.4kW%20Child%20socket&amp;severity=medium&amp;id=682d9815c4522896dcbd6373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30176-cwe-125-out-of-bounds-read-in-siemens-simatic-pcs-neo-v4-1-bd608d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30176%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=682d9815c4522896dcbd608d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30175-cwe-787-out-of-bounds-write-in-siemens-simatic-pcs-neo-v4-1-bd6089</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30175%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=682d9815c4522896dcbd6089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30174-cwe-125-out-of-bounds-read-in-siemens-simatic-pcs-neo-v4-1-bd6085</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30174%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=682d9815c4522896dcbd6085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26390-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-siemens-ozw672-aeccb8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26390%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20OZW672&amp;severity=critical&amp;id=682cd0fc1484d88663aeccb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26389-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-siemens-ozw672-aeccb6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26389%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Siemens%20OZW672&amp;severity=critical&amp;id=682cd0fc1484d88663aeccb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24510-cwe-20-improper-input-validation-in-siemens-ms-tp-point-pickup-module-aeccac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24510%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20MS%2FTP%20Point%20Pickup%20Module&amp;severity=medium&amp;id=682cd0fc1484d88663aeccac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24009-cwe-732-incorrect-permission-assignment-for-critical-resource-in-siemens-sirius-3rk3-modular-safety-system-mss-aeccaa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24009%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SIRIUS%203RK3%20Modular%20Safety%20System%20(MSS)&amp;severity=medium&amp;id=682cd0fc1484d88663aeccaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24008-cwe-311-missing-encryption-of-sensitive-data-in-siemens-sirius-3rk3-modular-safety-system-mss-aecca8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24008%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Siemens%20SIRIUS%203RK3%20Modular%20Safety%20System%20(MSS)&amp;severity=medium&amp;id=682cd0fc1484d88663aecca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24007-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-siemens-sirius-3rk3-modular-safety-system-mss-bd605b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24007%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Siemens%20SIRIUS%203RK3%20Modular%20Safety%20System%20(MSS)&amp;severity=high&amp;id=682d9815c4522896dcbd605b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51447-cwe-204-observable-response-discrepancy-in-siemens-polarion-v2310-bd601d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51447%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Siemens%20Polarion%20V2310&amp;severity=medium&amp;id=682d9815c4522896dcbd601d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51446-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-siemens-polarion-v2310-bd6006</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51446%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20Polarion%20V2310&amp;severity=medium&amp;id=682d9815c4522896dcbd6006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51445-cwe-611-improper-restriction-of-xml-external-entity-reference-in-siemens-polarion-v2310-aecca6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51445%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Siemens%20Polarion%20V2310&amp;severity=medium&amp;id=682cd0fc1484d88663aecca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51444-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-siemens-polarion-v2310-aecca4</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51444%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20Polarion%20V2310&amp;severity=medium&amp;id=682cd0fc1484d88663aecca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23815-cwe-306-missing-authentication-for-critical-function-in-siemens-desigo-cc-aecca2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23815%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20Desigo%20CC&amp;severity=high&amp;id=682cd0fc1484d88663aecca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40628-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-domainspro-domainspro-aeccae</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40628%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20DomainsPRO%20DomainsPRO&amp;severity=critical&amp;id=682cd0fc1484d88663aeccae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4647-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-centreon-web-bd6665</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20web&amp;severity=high&amp;id=682d9816c4522896dcbd6665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4646-cwe-269-improper-privilege-management-in-centreon-web-bd665d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4646%3A%20CWE-863%20Incorrect%20Authorization%20in%20Centreon%20web&amp;severity=high&amp;id=682d9816c4522896dcbd665d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22248-vulnerability-in-vmware-bitnami-bd662b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22248%3A%20Vulnerability%20in%20VMware%20Bitnami&amp;severity=critical&amp;id=682d9816c4522896dcbd662b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41645-cwe-669-incorrect-resource-transfer-between-spheres-in-sma-www-sunnyportal-com-bd6602</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41645%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20SMA%20www.sunnyportal.com&amp;severity=high&amp;id=682d9816c4522896dcbd6602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3916-cwe-121-stack-based-buffer-overflow-in-schneider-electric-ecostruxure-power-build-rapsody-software-bd65b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3916%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Build%20Rapsody%20software&amp;severity=medium&amp;id=682d9816c4522896dcbd65b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27696-cwe-285-improper-authorization-in-apache-software-foundation-apache-superset-bd65a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27696%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=682d9816c4522896dcbd65a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4474-cwe-285-improper-authorization-in-vinoth06-frontend-dashboard-bd6612</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4474%3A%20CWE-285%20Improper%20Authorization%20in%20vinoth06%20Frontend%20Dashboard&amp;severity=high&amp;id=682d9816c4522896dcbd6612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4339-cwe-862-missing-authorization-in-codexthemes-thegem-aeccb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4339%3A%20CWE-862%20Missing%20Authorization%20in%20CodexThemes%20TheGem&amp;severity=medium&amp;id=682cd0fc1484d88663aeccb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4317-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-codexthemes-thegem-bd660a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4317%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodexThemes%20TheGem&amp;severity=high&amp;id=682d9816c4522896dcbd660a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3107-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-contrid-newsletters-bd65b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3107%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20contrid%20Newsletters&amp;severity=medium&amp;id=682d9816c4522896dcbd65b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4473-cwe-285-improper-authorization-in-vinoth06-frontend-dashboard-bd6569</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4473%3A%20CWE-285%20Improper%20Authorization%20in%20vinoth06%20Frontend%20Dashboard&amp;severity=high&amp;id=682d9816c4522896dcbd6569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4632-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-samsung-electronics-magicinfo-9-server-bd661a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4632%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=682d9816c4522896dcbd661a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22246-vulnerability-in-cloud-foundry-uaa-bd6571</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22246%3A%20Vulnerability%20in%20Cloud%20Foundry%20UAA&amp;severity=low&amp;id=682d9816c4522896dcbd6571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22249-vulnerability-in-vmware-vmware-aria-automation-bd6575</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22249%3A%20Vulnerability%20in%20VMware%20Vmware%20Aria%20Automation&amp;severity=high&amp;id=682d9816c4522896dcbd6575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4396-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-relevanssi-relevanssi-a-better-search-pro-bd6565</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4396%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Relevanssi%20Relevanssi%20Premium&amp;severity=high&amp;id=682d9816c4522896dcbd6565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35471-cwe-427-uncontrolled-search-path-element-in-conda-forge-openssl-feedstock-bd663c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35471%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20conda-forge%20openssl-feedstock&amp;severity=high&amp;id=682d9816c4522896dcbd663c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43011-cwe-862-missing-authorization-in-sap-se-sap-landscape-transformation-pcl-basis-bd64da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43011%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Landscape%20Transformation%20(PCL%20Basis)&amp;severity=high&amp;id=682d9815c4522896dcbd64da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43010-cwe-94-improper-control-of-generation-of-code-in-sap-se-sap-s-4hana-cloud-private-edition-or-on-premise-scm-master-data-layer-mdl-bd64d2</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43010%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20S%2F4HANA%20Cloud%20Private%20Edition%20or%20on%20Premise%20(SCM%20Master%20Data%20Layer%20(MDL))&amp;severity=high&amp;id=682d9815c4522896dcbd64d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43009-cwe-862-missing-authorization-in-sap-se-sap-service-parts-management-spm-bd64ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43009%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Service%20Parts%20Management%20(SPM)&amp;severity=medium&amp;id=682d9815c4522896dcbd64ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43008-cwe-862-missing-authorization-in-sap-se-sap-s-4hana-hcm-portugal-and-sap-erp-hcm-portugal-bd6563</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43008%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20HCM%20Portugal%20and%20SAP%20ERP%20HCM%20Portugal&amp;severity=medium&amp;id=682d9816c4522896dcbd6563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43007-cwe-862-missing-authorization-in-sap-se-sap-service-parts-management-spm-bd652d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43007%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Service%20Parts%20Management%20(SPM)&amp;severity=medium&amp;id=682d9815c4522896dcbd652d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43006-cwe-79-improper-neutralization-of-input-during-web-page-generation-in-sap-se-sap-supplier-relationship-management-master-data-management-catalog-bd6529</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43006%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Master%20Data%20Management%20Catalog)&amp;severity=medium&amp;id=682d9815c4522896dcbd6529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43005-cwe-256-plaintext-storage-of-a-password-in-sap-se-sap-gui-for-windows-bd6525</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43005%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20SAP_SE%20SAP%20GUI%20for%20Windows&amp;severity=medium&amp;id=682d9815c4522896dcbd6525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43004-cwe-862-missing-authorization-in-sap-se-sap-digital-manufacturing-production-operator-dashboard-bd6521</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43004%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Digital%20Manufacturing%20(Production%20Operator%20Dashboard)&amp;severity=medium&amp;id=682d9815c4522896dcbd6521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43003-cwe-749-exposed-dangerous-method-or-function-in-sap-se-sap-s-4hana-private-cloud-on-premise-bd651d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43003%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20%26%20On-Premise)&amp;severity=medium&amp;id=682d9815c4522896dcbd651d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43002-cwe-472-external-control-of-assumed-immutable-web-parameter-in-sap-se-sap-s4-hana-odata-meta-data-property-bd6519</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43002%3A%20CWE-472%3A%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20SAP_SE%20SAP%20S4%2FHANA%20(OData%20meta-data%20property)&amp;severity=medium&amp;id=682d9815c4522896dcbd6519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43000-cwe-862-missing-authorization-in-sap-se-sap-business-objects-business-intelligence-platform-pmw-bd64c4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43000%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Objects%20Business%20Intelligence%20Platform%20(PMW)&amp;severity=high&amp;id=682d9815c4522896dcbd64c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42999-cwe-502-deserialization-of-untrusted-data-in-sap-se-sap-netweaver-visual-composer-development-server-aeb8c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42999%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20(Visual%20Composer%20development%20server)&amp;severity=critical&amp;id=682cd0f81484d88663aeb8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42997-cwe-732-incorrect-permission-assignment-for-critical-resource-in-sap-se-sap-gateway-client-bd6554</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42997%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20SAP_SE%20SAP%20Gateway%20Client&amp;severity=medium&amp;id=682d9816c4522896dcbd6554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31329-cwe-141-improper-neutralization-of-parameter-argument-delimiters-in-sap-se-sap-netweaver-application-server-abap-and-abap-platform-bd654c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31329%3A%20CWE-141%3A%20Improper%20Neutralization%20of%20Parameter%2FArgument%20Delimiters%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=medium&amp;id=682d9815c4522896dcbd654c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30018-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sap-se-sap-supplier-relationship-management-live-auction-cockpit-bd64b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30018%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Live%20Auction%20Cockpit)&amp;severity=high&amp;id=682d9815c4522896dcbd64b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30012-cwe-502-deserialization-of-untrusted-data-in-sap-se-sap-supplier-relationship-management-live-auction-cockpit-bd64ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30012%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Live%20Auction%20Cockpit)&amp;severity=critical&amp;id=682d9815c4522896dcbd64ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30011-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-sap-se-sap-supplier-relationship-management-live-auction-cockpit-bd5eee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30011%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Live%20Auction%20Cockpit)&amp;severity=medium&amp;id=682d9815c4522896dcbd5eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30010-cwe-601-url-redirection-to-untrusted-site-in-sap-se-sap-supplier-relationship-management-live-auction-cockpit-bd6463</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30010%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Live%20Auction%20Cockpit)&amp;severity=medium&amp;id=682d9815c4522896dcbd6463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30009-cwe-79-improper-neutralization-of-input-during-web-page-generation-in-sap-se-sap-supplier-relationship-management-live-auction-cockpit-bd64a9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30009%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Live%20Auction%20Cockpit)&amp;severity=medium&amp;id=682d9815c4522896dcbd64a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26662-cwe-79-improper-neutralization-of-input-during-web-page-generation-in-sap-se-sap-data-services-management-console-bd6498</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26662%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Data%20Services%20Management%20Console&amp;severity=medium&amp;id=682d9815c4522896dcbd6498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rdpguard-999-privilege-escalation-3a85e6dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RDPGuard%209.9.9%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489df07e6d765d51d5386f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kentico-xperience-130178-cross-site-scripting-xss-4d379797</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kentico%20Xperience%2013.0.178%20-%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=68489dea7e6d765d51d5379c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-frontend-login-and-registration-blocks-p-5141b3c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Frontend%20Login%20and%20Registration%20Blocks%20Plugin%201.0.7%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489de47e6d765d51d536e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-vn020-f3vt-ttv621021-dhcp-stack-buffer-ove-94954b0e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20VN020%20F3v(T)%20TT_V6.2.1021)%20-%20DHCP%20Stack%20Buffer%20Overflow&amp;severity=medium&amp;id=68489dde7e6d765d51d53612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44039-n-a-in-n-a-bd6097</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44039%3A%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd6097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45858-n-a-in-n-a-bd5f0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45858%3A%20n%2Fa&amp;severity=critical&amp;id=682d9815c4522896dcbd5f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46506-cwe-306-missing-authentication-for-critical-function-in-netalertx-netalertx-aecc89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46506%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NetAlertX%20NetAlertX&amp;severity=critical&amp;id=682cd0fc1484d88663aecc89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48766-cwe-698-execution-after-redirect-ear-in-netalertx-netalertx-aecc15</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48766%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20NetAlertX%20NetAlertX&amp;severity=high&amp;id=682cd0fc1484d88663aecc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45865-n-a-in-n-a-aecb1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45865%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fc1484d88663aecb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45863-n-a-in-n-a-aecb1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45863%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fc1484d88663aecb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45746-n-a-in-n-a-aecb19</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45746%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ZKTeco%20ZKBio%20CVSecurity&amp;severity=medium&amp;id=682cd0fc1484d88663aecb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47204-n-a-in-n-a-aecaf0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47204%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fc1484d88663aecaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45861-n-a-in-n-a-aecaee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45861%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fc1484d88663aecaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45857-n-a-in-n-a-aecaec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45857%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fc1484d88663aecaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28056-n-a-in-n-a-aecab2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28056%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aecab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28055-n-a-in-n-a-aecab0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28055%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aecab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56526-n-a-in-n-a-aeca93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56526%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aeca93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44831-n-a-in-n-a-aeca82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44831%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aeca82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28057-n-a-in-n-a-aeca7a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28057%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aeca7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45867-n-a-in-n-a-aeca02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45867%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aeca02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45866-n-a-in-n-a-aeca00</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45866%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aeca00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45864-n-a-in-n-a-aec9fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45864%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45859-n-a-in-n-a-aec9fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45859%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47905-cwe-444-inconsistent-interpretation-of-http-requests-http-request-response-smuggling-in-varnish-software-varnish-cache-aec434</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47905%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=682cd0fa1484d88663aec434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-13-2a0298</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-13&amp;severity=medium&amp;id=682c7db1e8347ec82d2a0298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-13-f127c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f127c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49641-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-kashipara-group-billing-software-bd6490</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49641%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kashipara%20Group%20Billing%20Software&amp;severity=critical&amp;id=682d9815c4522896dcbd6490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46825-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kanboard-kanboard-bd6508</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46825%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kanboard%20kanboard&amp;severity=low&amp;id=682d9815c4522896dcbd6508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31220-a-malicious-app-may-be-able-to-read-sensitive-location-information-in-apple-macos-bd6320</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31220%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iPadOS&amp;severity=medium&amp;id=682d9815c4522896dcbd6320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24258-an-app-may-be-able-to-gain-root-privileges-in-apple-macos-bd6318</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24258%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d9815c4522896dcbd6318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31236-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aec9f8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31236%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24223-processing-maliciously-crafted-web-content-may-lead-to-memory-corruption-in-apple-tvos-bd63fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24223%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682d9815c4522896dcbd63fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24274-a-malicious-app-may-be-able-to-gain-root-privileges-in-apple-macos-aecbb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24274%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31241-a-remote-attacker-may-cause-an-unexpected-app-termination-in-apple-tvos-bd632f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31241%3A%20A%20remote%20attacker%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d9815c4522896dcbd632f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31257-processing-maliciously-crafted-web-content-may-lead-to-an-unexpected-safari-crash-in-apple-tvos-bd6337</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31257%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=682d9815c4522896dcbd6337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31256-hot-corner-may-unexpectedly-reveal-a-user-s-deleted-notes-in-apple-macos-aec9fa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31256%3A%20Hot%20corner%20may%20unexpectedly%20reveal%20a%20user%E2%80%99s%20deleted%20notes%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24111-an-app-may-be-able-to-cause-unexpected-system-termination-in-apple-visionos-aec9e7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24111%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31217-processing-maliciously-crafted-web-content-may-lead-to-an-unexpected-safari-crash-in-apple-tvos-aec9f6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31217%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=682cd0fb1484d88663aec9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31240-mounting-a-maliciously-crafted-afp-network-share-may-lead-to-system-termination-in-apple-macos-aecbd5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31240%3A%20Mounting%20a%20maliciously%20crafted%20AFP%20network%20share%20may%20lead%20to%20system%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24222-processing-maliciously-crafted-web-content-may-lead-to-an-unexpected-process-crash-in-apple-macos-aec9f4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24222%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31237-mounting-a-maliciously-crafted-afp-network-share-may-lead-to-system-termination-in-apple-macos-aecc0d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31237%3A%20Mounting%20a%20maliciously%20crafted%20AFP%20network%20share%20may%20lead%20to%20system%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31260-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aec9df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31260%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31221-a-remote-attacker-may-be-able-to-leak-memory-in-apple-tvos-aec9db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31221%3A%20A%20remote%20attacker%20may%20be%20able%20to%20leak%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fb1484d88663aec9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31247-an-attacker-may-gain-access-to-protected-parts-of-the-file-system-in-apple-macos-aecc13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31247%3A%20An%20attacker%20may%20gain%20access%20to%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31210-processing-web-content-may-lead-to-a-denial-of-service-in-apple-ipados-aec9d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31210%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31206-processing-maliciously-crafted-web-content-may-lead-to-an-unexpected-safari-crash-in-apple-tvos-aecc0b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31206%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=682cd0fc1484d88663aecc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30440-an-app-may-be-able-to-bypass-aslr-in-apple-macos-aeca7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30440%3A%20An%20app%20may%20be%20able%20to%20bypass%20ASLR%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aeca7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31251-processing-a-maliciously-crafted-media-file-may-lead-to-unexpected-app-termination-or-corrupt-process-memory-in-apple-tvos-aeca61</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31251%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aeca61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31226-processing-a-maliciously-crafted-image-may-lead-to-a-denial-of-service-in-apple-tvos-aeca5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31226%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aeca5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24225-processing-an-email-may-lead-to-user-interface-spoofing-in-apple-ipados-aeca5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24225%3A%20Processing%20an%20email%20may%20lead%20to%20user%20interface%20spoofing%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aeca5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31227-an-attacker-with-physical-access-to-a-device-may-be-able-to-access-a-deleted-call-recording-in-apple-ios-and-ipados-aeca5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31227%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20access%20a%20deleted%20call%20recording%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aeca5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30436-an-attacker-may-be-able-to-use-siri-to-enable-auto-answer-calls-in-apple-ios-and-ipados-aec90a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30436%3A%20An%20attacker%20may%20be%20able%20to%20use%20Siri%20to%20enable%20Auto-Answer%20Calls%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31196-processing-a-maliciously-crafted-file-may-lead-to-a-denial-of-service-or-potentially-disclose-memory-contents-in-apple-ipados-aecc09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31196%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20a%20denial-of-service%20or%20potentially%20disclose%20memory%20contents%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecc09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31250-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aecb0d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31250%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31207-an-app-may-be-able-to-enumerate-a-user-s-installed-apps-in-apple-ios-and-ipados-aec99b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31207%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fb1484d88663aec99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31246-connecting-to-a-malicious-afp-server-may-corrupt-kernel-memory-in-apple-macos-aecb70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31246%3A%20Connecting%20to%20a%20malicious%20AFP%20server%20may%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31195-an-app-may-be-able-to-break-out-of-its-sandbox-in-apple-macos-aecafe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31195%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31253-muting-the-microphone-during-a-facetime-call-may-not-result-in-audio-being-silenced-in-apple-ios-and-ipados-aec946</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31253%3A%20Muting%20the%20microphone%20during%20a%20FaceTime%20call%20may%20not%20result%20in%20audio%20being%20silenced%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fb1484d88663aec946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30442-an-app-may-be-able-to-gain-elevated-privileges-in-apple-macos-aecb53</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30442%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31204-processing-maliciously-crafted-web-content-may-lead-to-memory-corruption-in-apple-tvos-aecbd3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31204%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682cd0fc1484d88663aecbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24155-an-app-may-be-able-to-disclose-kernel-memory-in-apple-macos-aecafa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24155%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31212-an-app-may-be-able-to-access-sensitive-user-data-in-apple-tvos-aec9d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31212%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31245-an-app-may-be-able-to-cause-unexpected-system-termination-in-apple-tvos-aec9dd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31245%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31228-an-attacker-with-physical-access-to-a-device-may-be-able-to-access-notes-from-the-lock-screen-in-apple-ipados-aecc2c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31228%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20access%20notes%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31208-parsing-a-file-may-lead-to-an-unexpected-app-termination-in-apple-tvos-aecc41</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31208%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31249-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aecc66</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31249%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31232-a-sandboxed-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aecc8f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31232%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31224-an-app-may-be-able-to-bypass-certain-privacy-preferences-in-apple-macos-aecb5b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31224%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31225-call-history-from-deleted-apps-may-still-appear-in-spotlight-search-results-in-apple-ios-and-ipados-aecc8d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31225%3A%20Call%20history%20from%20deleted%20apps%20may%20still%20appear%20in%20spotlight%20search%20results%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31233-processing-a-maliciously-crafted-video-file-may-lead-to-unexpected-app-termination-or-corrupt-process-memory-in-apple-tvos-aeccba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31233%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fc1484d88663aeccba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31209-parsing-a-file-may-lead-to-disclosure-of-user-information-in-apple-tvos-bd5ef8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31209%3A%20Parsing%20a%20file%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d9815c4522896dcbd5ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31244-an-app-may-be-able-to-break-out-of-its-sandbox-in-apple-macos-aecb68</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31244%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31213-an-app-may-be-able-to-access-associated-usernames-and-websites-in-a-user-s-icloud-keychain-in-apple-macos-bd5f8e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31213%3A%20An%20app%20may%20be%20able%20to%20access%20associated%20usernames%20and%20websites%20in%20a%20user&apos;s%20iCloud%20Keychain%20in%20Apple%20iPadOS&amp;severity=high&amp;id=682d9815c4522896dcbd5f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24142-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aec908</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24142%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31205-a-malicious-website-may-exfiltrate-data-cross-origin-in-apple-tvos-bd6091</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31205%3A%20A%20malicious%20website%20may%20exfiltrate%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=medium&amp;id=682d9815c4522896dcbd6091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31259-an-app-may-be-able-to-gain-elevated-privileges-in-apple-macos-aecb6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31259%3A%20An%20app%20may%20be%20able%20to%20capture%20a%20screenshot%20of%20an%20app%20entering%20or%20exiting%20full%20screen%20mode%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30448-an-attacker-may-be-able-to-turn-on-sharing-of-an-icloud-folder-without-authentication-in-apple-ipados-aec902</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30448%3A%20An%20attacker%20may%20be%20able%20to%20turn%20on%20sharing%20of%20an%20iCloud%20folder%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31218-an-app-may-be-able-to-observe-the-hostnames-of-new-network-connections-in-apple-macos-aec873</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31218%3A%20An%20app%20may%20be%20able%20to%20observe%20the%20hostnames%20of%20new%20network%20connections%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31234-an-attacker-may-be-able-to-cause-unexpected-system-termination-or-corrupt-kernel-memory-in-apple-tvos-aec74a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31234%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fb1484d88663aec74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31222-a-user-may-be-able-to-elevate-privileges-in-apple-tvos-aecb57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31222%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31214-an-attacker-in-a-privileged-network-position-may-be-able-to-intercept-network-traffic-in-apple-ios-and-ipados-aec752</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31214%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20intercept%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fb1484d88663aec752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31238-processing-maliciously-crafted-web-content-may-lead-to-memory-corruption-in-apple-tvos-aeca19</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31238%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682cd0fb1484d88663aeca19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31239-parsing-a-file-may-lead-to-an-unexpected-app-termination-in-apple-tvos-bd65af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31239%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d9816c4522896dcbd65af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31242-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aecb0b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31242%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30453-a-malicious-app-may-be-able-to-gain-root-privileges-in-apple-macos-aecb55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30453%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31215-processing-maliciously-crafted-web-content-may-lead-to-an-unexpected-process-crash-in-apple-tvos-aec76f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31215%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=682cd0fb1484d88663aec76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24144-an-app-may-be-able-to-leak-sensitive-kernel-state-in-apple-visionos-aec76d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24144%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20kernel%20state%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31223-processing-maliciously-crafted-web-content-may-lead-to-memory-corruption-in-apple-tvos-aecb59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31223%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682cd0fc1484d88663aecb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31235-an-app-may-be-able-to-cause-unexpected-system-termination-in-apple-macos-bd65ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31235%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iPadOS&amp;severity=medium&amp;id=682d9816c4522896dcbd65ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24220-an-app-may-be-able-to-read-a-persistent-device-identifier-in-apple-ios-and-ipados-aeae5a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24220%3A%20An%20app%20may%20be%20able%20to%20read%20a%20persistent%20device%20identifier%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0f71484d88663aeae5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31219-an-attacker-may-be-able-to-cause-unexpected-system-termination-or-corrupt-kernel-memory-in-apple-tvos-bd5f92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31219%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d9815c4522896dcbd5f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31258-an-app-may-be-able-to-break-out-of-its-sandbox-in-apple-macos-aecb6a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31258%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3659-cwe-287-improper-authentication-in-digi-international-digi-portserver-ts-bd67d1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3659%3A%20CWE-287%20Improper%20Authentication%20in%20Digi%20International%20Digi%20PortServer%20TS&amp;severity=critical&amp;id=682d9816c4522896dcbd67d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1079-cwe-61-in-google-web-designer-bd683a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1079%3A%20CWE-61%20in%20Google%20Web%20Designer&amp;severity=high&amp;id=682d9816c4522896dcbd683a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4982-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-bd68d5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4982%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=682d9816c4522896dcbd68d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4981-files-or-directories-accessible-to-external-parties-bd68dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4981%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&amp;severity=high&amp;id=682d9816c4522896dcbd68dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeting-taiwan-japan-with-dll-implants-16ac58</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeting%20Taiwan%20%26%20Japan%20with%20DLL%20Implants&amp;severity=medium&amp;id=682c99307960f6956616ac58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47682-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-cozy-vision-technologies-pvt-ltd-sms-alert-order-notifications-woocommerce-bd69d7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47682%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=null&amp;id=682d9816c4522896dcbd69d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-noodlophile-stealer-distributes-via-fake-ai-vi-aa04d953</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Noodlophile%20Stealer%20Distributes%20Via%20Fake%20AI%20Video%20Generation%20Platforms&amp;severity=medium&amp;id=6849b82723110031d4104fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3632-cwe-789-uncontrolled-memory-allocation-in-ibm-4769-developers-toolkit-bd6b58</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3632%3A%20CWE-789%20Uncontrolled%20Memory%20Allocation%20in%20IBM%204769%20Developers%20Toolkit&amp;severity=high&amp;id=682d9816c4522896dcbd6b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46743-cwe-352-cross-site-request-forgery-csrf-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6b3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46743%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46750-cwe-305-in-schweitzer-engineering-laboratories-sel-3350-1-bd6b3f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46750%3A%20CWE-305%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-3350-1&amp;severity=medium&amp;id=682d9816c4522896dcbd6b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46749-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6b1a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46748-cwe-620-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6b12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46748%3A%20CWE-620%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=low&amp;id=682d9816c4522896dcbd6b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46747-cwe-497-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6ad8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46747%3A%20CWE-497%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46746-cwe-209-generation-of-error-message-containing-sensitive-information-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6ad4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46746%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46745-cwe-269-improper-privilege-management-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6ab5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46745%3A%20CWE-862%20Missing%20Authorization%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46744-cwe-269-improper-privilege-management-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6aa6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46744%3A%20CWE-863%20Incorrect%20Authorization%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=low&amp;id=682d9816c4522896dcbd6aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46742-cwe-284-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6a9e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46742%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46741-cwe-269-improper-privilege-management-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6a81</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46741%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46740-cwe-280-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6a7d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46740%3A%20CWE-280%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=high&amp;id=682d9816c4522896dcbd6a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46739-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6a60</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46739%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=high&amp;id=682d9816c4522896dcbd6a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46738-cwe-502-in-schweitzer-engineering-laboratories-sel-5033-acselerator-rtac-software-bd6a5c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46738%3A%20CWE-502%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5033%20acSELerator%20RTAC%20Software&amp;severity=medium&amp;id=682d9816c4522896dcbd6a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46737-cwe-346-origin-validation-error-in-schweitzer-engineering-laboratories-sel-5037-grid-configurator-bd6a58</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46737%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5037%20Grid%20Configurator&amp;severity=high&amp;id=682d9816c4522896dcbd6a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47578-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-edward-caissie-bns-twitter-follow-button-bd6a6d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Edward%20Caissie%20BNS%20Twitter%20Follow%20Button&amp;severity=null&amp;id=682d9816c4522896dcbd6a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47274-cwe-311-missing-encryption-of-sensitive-data-in-stacklok-toolhive-bd681d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47274%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20stacklok%20toolhive&amp;severity=low&amp;id=682d9816c4522896dcbd681d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46718-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-trifectatechfoundation-sudo-rs-bd6819</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46718%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20trifectatechfoundation%20sudo-rs&amp;severity=low&amp;id=682d9816c4522896dcbd6819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46717-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-trifectatechfoundation-sudo-rs-bd6815</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46717%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20trifectatechfoundation%20sudo-rs&amp;severity=low&amp;id=682d9816c4522896dcbd6815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40627-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-abantecart-abantecart-bd6966</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40627%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AbanteCart%20AbanteCart&amp;severity=medium&amp;id=682d9816c4522896dcbd6966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40626-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-abantecart-abantecart-bd7121</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AbanteCart%20AbanteCart&amp;severity=medium&amp;id=682d9817c4522896dcbd7121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47271-cwe-94-improper-control-of-generation-of-code-code-injection-in-ozi-project-publish-bd7166</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47271%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OZI-Project%20publish&amp;severity=medium&amp;id=682d9817c4522896dcbd7166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47270-cwe-400-uncontrolled-resource-consumption-in-nimiq-core-rs-albatross-bd7162</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47270%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=682d9817c4522896dcbd7162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22247-cwe-59-improper-link-resolution-before-file-access-link-following-in-vmware-tools-aec8fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22247%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20VMware%20Tools&amp;severity=medium&amp;id=682cd0fb1484d88663aec8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46729-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-julmud-phpdvdprofiler-bd7145</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46729%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20julmud%20phpDVDProfiler&amp;severity=low&amp;id=682d9817c4522896dcbd7145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32390-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-espocrm-espocrm-bd711d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32390%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20espocrm%20espocrm&amp;severity=high&amp;id=682d9817c4522896dcbd711d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1533-cwe-121-stack-based-buffer-overflow-in-asus-armoury-crate-bd6fee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1533%3A%20CWE-121%20-%20Stack-based%20Buffer%20Overflow%20in%20ASUS%20Armoury%20Crate&amp;severity=high&amp;id=682d9817c4522896dcbd6fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41393-cross-site-scripting-xss-in-ricoh-company-ltd-the-specific-versions-of-laser-printers-and-mfps-which-implement-web-image-monitor-bd700b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41393%3A%20Cross-site%20scripting%20(XSS)%20in%20Ricoh%20Company%2C%20Ltd.%20Multiple%20laser%20printers%20and%20MFPs%20which%20implement%20Web%20Image%20Monitor&amp;severity=medium&amp;id=682d9817c4522896dcbd700b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3496-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-auma-riester-ac1-2-aebf2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3496%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Auma%20Riester%20AC1.2&amp;severity=high&amp;id=682cd0fa1484d88663aebf2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4561-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-kinfor-kfox-bd6fc9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4561%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Kinfor%20KFOX&amp;severity=high&amp;id=682d9817c4522896dcbd6fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4560-cwe-306-missing-authentication-for-critical-function-in-netvision-isoinsight-bd6fba</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4560%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Netvision%20ISOinsight&amp;severity=medium&amp;id=682d9817c4522896dcbd6fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4559-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-netvision-isoinsight-bd6e4f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4559%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Netvision%20ISOinsight&amp;severity=critical&amp;id=682d9816c4522896dcbd6e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3649-cwe-79-cross-site-scripting-xss-in-unknown-lightpress-lightbox-bd6b6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3649%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20LightPress%20Lightbox&amp;severity=medium&amp;id=682d9816c4522896dcbd6b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3597-cwe-79-cross-site-scripting-xss-in-unknown-firelight-lightbox-bd6b37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3597%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Firelight%20Lightbox&amp;severity=medium&amp;id=682d9816c4522896dcbd6b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4558-cwe-620-unverified-password-change-in-wormhole-tech-gpm-bd6b33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4558%3A%20CWE-620%20Unverified%20Password%20Change%20in%20WormHole%20Tech%20GPM&amp;severity=critical&amp;id=682d9816c4522896dcbd6b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4557-cwe-306-missing-authentication-for-critical-function-in-zong-yu-parking-management-system-bd6b0e</loc>
    <lastmod>2026-04-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4557%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ZONG%20YU%20Parking%20Management%20System&amp;severity=critical&amp;id=682d9816c4522896dcbd6b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4556-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-zong-yu-okcat-parking-management-platform-bd6b0a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4556%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ZONG%20YU%20Okcat%20Parking%20Management%20Platform&amp;severity=critical&amp;id=682d9816c4522896dcbd6b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4555-cwe-306-missing-authentication-for-critical-function-in-zong-yu-okcat-parking-management-platform-bd6f4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4555%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ZONG%20YU%20Okcat%20Parking%20Management%20Platform&amp;severity=critical&amp;id=682d9816c4522896dcbd6f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4554-sql-injection-in-phpgurukul-apartment-visitors-management-system-bd6f47</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4554%3A%20SQL%20Injection%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4553-sql-injection-in-phpgurukul-apartment-visitors-management-system-bd6ea9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4553%3A%20SQL%20Injection%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46611-n-a-in-n-a-bd6811</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46611%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46610-n-a-in-n-a-bd67f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46610%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd67f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45835-n-a-in-n-a-bd67ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45835%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd67ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45779-n-a-in-n-a-bd67ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45779%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd67ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44830-n-a-in-n-a-bd67e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44830%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd67e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44022-n-a-in-n-a-bd67d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44022%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd67d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26846-n-a-in-n-a-bd67bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26846%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd67bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26841-n-a-in-n-a-bd67b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26841%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd67b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56524-n-a-in-n-a-bd6799</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56524%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56523-n-a-in-n-a-bd6795</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56523%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55466-n-a-in-n-a-bd601f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55466%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd601f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44175-n-a-in-n-a-bd5fd7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44175%3A%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd5fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34732-n-a-in-n-a-bd5fc7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34732%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd5fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44176-n-a-in-n-a-bd5fb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44176%3A%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd5fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-12-29f867</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-12&amp;severity=medium&amp;id=682c7db1e8347ec82d29f867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-12-f12dc5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-brief-cve-2025-31324-f0c546</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20Brief%3A%20CVE-2025-31324&amp;severity=low&amp;id=682acdbebbaf20d303f0c546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4552-unverified-password-change-in-continew-admin-bd6e40</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4552%3A%20Unverified%20Password%20Change%20in%20ContiNew%20Admin&amp;severity=medium&amp;id=682d9816c4522896dcbd6e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4551-cross-site-scripting-in-continew-admin-bd6e3a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4551%3A%20Cross%20Site%20Scripting%20in%20ContiNew%20Admin&amp;severity=medium&amp;id=682d9816c4522896dcbd6e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4550-sql-injection-in-phpgurukul-apartment-visitors-management-system-bd6e36</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4550%3A%20SQL%20Injection%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4549-sql-injection-in-campcodes-online-food-ordering-system-bd694f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4549%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4548-sql-injection-in-campcodes-online-food-ordering-system-bd694b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4548%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd694b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4547-cross-site-scripting-in-sourcecodester-web-based-pharmacy-product-management-system-bd6947</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4547%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4546-csv-injection-in-1panel-dev-maxkb-bd6936</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4546%3A%20CSV%20Injection%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=682d9816c4522896dcbd6936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4545-path-traversal-in-ctcms-content-management-system-bd692e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4545%3A%20Path%20Traversal%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd692e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4544-stack-based-buffer-overflow-in-d-link-di-8100-bd691e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4544%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=682d9816c4522896dcbd691e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brief-disruptions-bold-claims-the-tactical-reality-a4278ccb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brief%20Disruptions%2C%20Bold%20Claims%3A%20The%20Tactical%20Reality%20Behind%20the%20India-Pakistan%20Hacktivist%20Surge&amp;severity=medium&amp;id=6848765e813f166aeb362442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4543-sql-injection-in-lylme-spage-bd715e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4543%3A%20SQL%20Injection%20in%20LyLme%20Spage&amp;severity=medium&amp;id=682d9817c4522896dcbd715e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4542-permissive-cross-domain-policy-with-untrusted-domains-in-freeebird-hotel-api-bd7151</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4542%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Freeebird%20Hotel%20%E9%85%92%E5%BA%97%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20API&amp;severity=low&amp;id=682d9817c4522896dcbd7151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4541-sql-injection-in-lmxcms-bd714d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4541%3A%20SQL%20Injection%20in%20LmxCMS&amp;severity=medium&amp;id=682d9817c4522896dcbd714d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4540-unquoted-search-path-in-mtsoftware-c-lodop-bd7149</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4540%3A%20Unquoted%20Search%20Path%20in%20MTSoftware%20C-Lodop&amp;severity=high&amp;id=682d9817c4522896dcbd7149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4539-uncontrolled-search-path-in-hainan-todesk-bd70c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4539%3A%20Uncontrolled%20Search%20Path%20in%20Hainan%20ToDesk&amp;severity=high&amp;id=682d9817c4522896dcbd70c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4538-unrestricted-upload-in-kkfileview-bd70bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4538%3A%20Unrestricted%20Upload%20in%20kkFileView&amp;severity=medium&amp;id=682d9817c4522896dcbd70bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4537-cleartext-storage-of-sensitive-information-in-a-cookie-in-yangzongzhuan-ruoyi-vue-bd70bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4537%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20a%20Cookie%20in%20yangzongzhuan%20RuoYi-Vue&amp;severity=low&amp;id=682d9817c4522896dcbd70bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4536-information-disclosure-in-gosuncn-technology-group-audio-visual-integrated-management-platform-bd7034</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4536%3A%20Information%20Disclosure%20in%20Gosuncn%20Technology%20Group%20Audio-Visual%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=682d9817c4522896dcbd7034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4535-information-disclosure-in-gosuncn-technology-group-audio-visual-integrated-management-platform-bd7030</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4535%3A%20Information%20Disclosure%20in%20Gosuncn%20Technology%20Group%20Audio-Visual%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=682d9817c4522896dcbd7030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4534-weak-password-requirements-in-sungrow-logger1000-bd7105</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4534%3A%20Weak%20Password%20Requirements%20in%20SunGrow%20Logger1000&amp;severity=medium&amp;id=682d9817c4522896dcbd7105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4533-resource-consumption-in-jeecgboot-bd7101</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4533%3A%20Resource%20Consumption%20in%20JeecgBoot&amp;severity=medium&amp;id=682d9817c4522896dcbd7101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4532-uncontrolled-search-path-in-shanghai-bairui-information-technology-sunloginclient-bd70fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4532%3A%20Uncontrolled%20Search%20Path%20in%20Shanghai%20Bairui%20Information%20Technology%20SunloginClient&amp;severity=high&amp;id=682d9817c4522896dcbd70fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4531-code-injection-in-seeyon-zhiyuan-oa-web-application-system-bd70e8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4531%3A%20Code%20Injection%20in%20Seeyon%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd70e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/additional-features-of-ottercookie-malware-used-by-f9e7fd97</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Additional%20Features%20of%20OtterCookie%20Malware%20Used%20by%20WaterPlum&amp;severity=medium&amp;id=6847be78bab8eb36fc32ecf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4530-path-traversal-in-feng-ha-ha-ssm-erp-bd70db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4530%3A%20Path%20Traversal%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=682d9817c4522896dcbd70db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4529-path-traversal-in-seeyon-zhiyuan-oa-web-application-system-bd70d7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4529%3A%20Path%20Traversal%20in%20Seeyon%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd70d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4528-session-expiration-in-d-gitro-ngc-explorer-bd6fb6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4528%3A%20Session%20Expiration%20in%20D%C3%ADgitro%20NGC%20Explorer&amp;severity=medium&amp;id=682d9817c4522896dcbd6fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4527-client-side-enforcement-of-server-side-security-in-d-gitro-ngc-explorer-bd6fae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4527%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20D%C3%ADgitro%20NGC%20Explorer&amp;severity=medium&amp;id=682d9817c4522896dcbd6fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4526-missing-password-field-masking-in-d-gitro-ngc-explorer-bd6f80</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4526%3A%20Missing%20Password%20Field%20Masking%20in%20D%C3%ADgitro%20NGC%20Explorer&amp;severity=medium&amp;id=682d9817c4522896dcbd6f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47828-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-lumi-h5p-nodejs-library-bd6f63</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47828%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lumi%20H5P-Nodejs-library&amp;severity=medium&amp;id=682d9817c4522896dcbd6f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-11-29ed51</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-11&amp;severity=medium&amp;id=682c7db1e8347ec82d29ed51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-11-f12bf0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4525-uncontrolled-search-path-in-discord-bd6f7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4525%3A%20Uncontrolled%20Search%20Path%20in%20Discord&amp;severity=high&amp;id=682d9817c4522896dcbd6f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4515-permissive-cross-domain-policy-with-untrusted-domains-in-zylon-privategpt-bd6f78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4515%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Zylon%20PrivateGPT&amp;severity=medium&amp;id=682d9817c4522896dcbd6f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4514-sql-injection-in-zhengzhou-jiuhua-electronic-technology-mayicms-bd6f74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4514%3A%20SQL%20Injection%20in%20Zhengzhou%20Jiuhua%20Electronic%20Technology%20mayicms&amp;severity=medium&amp;id=682d9817c4522896dcbd6f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4513-open-redirect-in-catalyst-user-key-authentication-plugin-bd702e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4513%3A%20Open%20Redirect%20in%20Catalyst%20User%20Key%20Authentication%20Plugin&amp;severity=medium&amp;id=682d9817c4522896dcbd702e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4512-cross-site-scripting-in-inetum-iodas-bd702a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4512%3A%20Cross%20Site%20Scripting%20in%20Inetum%20IODAS&amp;severity=medium&amp;id=682d9817c4522896dcbd702a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4511-path-traversal-in-vector4wang-spring-boot-quick-bd701b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4511%3A%20Path%20Traversal%20in%20vector4wang%20spring-boot-quick&amp;severity=medium&amp;id=682d9817c4522896dcbd701b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4510-sql-injection-in-changjietong-ufida-crm-bd70d3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4510%3A%20SQL%20Injection%20in%20Changjietong%20UFIDA%20CRM&amp;severity=medium&amp;id=682d9817c4522896dcbd70d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4509-sql-injection-in-phpgurukul-e-diary-management-system-bd6ea3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4509%3A%20SQL%20Injection%20in%20PHPGurukul%20e-Diary%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4508-sql-injection-in-phpgurukul-e-diary-management-system-bd6e9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4508%3A%20SQL%20Injection%20in%20PHPGurukul%20e-Diary%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4507-sql-injection-in-campcodes-online-food-ordering-system-bd6e32</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4507%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4506-sql-injection-in-campcodes-online-food-ordering-system-bd6b2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4506%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4505-sql-injection-in-phpgurukul-apartment-visitors-management-system-bd6b2b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4505%3A%20SQL%20Injection%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4504-sql-injection-in-sourcecodester-online-college-library-system-bd6ae6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4504%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20College%20Library%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53145-vulnerability-in-linux-linux-bd7191</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd7191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4503-sql-injection-in-campcodes-sales-and-inventory-system-bd7013</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4503%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4502-sql-injection-in-campcodes-sales-and-inventory-system-bd6adc</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4502%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1752-cwe-400-uncontrolled-resource-consumption-in-run-llama-run-llama-llama-index-bd6abd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1752%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=682d9816c4522896dcbd6abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4501-stack-based-buffer-overflow-in-code-projects-album-management-system-bd6832</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4501%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Album%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4500-stack-based-buffer-overflow-in-code-projects-hotel-management-system-bd6825</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4500%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Hotel%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4499-stack-based-buffer-overflow-in-code-projects-simple-hospital-management-system-bd6821</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4499%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Simple%20Hospital%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3878-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cozyvision1-sms-alert-order-notifications-woocommerce-bd7119</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozyvision1%20SMS%20Alert%20%E2%80%93%20SMS%20%26%20OTP%20for%20WooCommerce%2C%20Order%20Notifications%20%26%20Abandoned%20Cart%20Recovery&amp;severity=medium&amp;id=682d9817c4522896dcbd7119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3876-cwe-862-missing-authorization-in-cozyvision1-sms-alert-order-notifications-woocommerce-bd7115</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3876%3A%20CWE-862%20Missing%20Authorization%20in%20cozyvision1%20SMS%20Alert%20%E2%80%93%20SMS%20%26%20OTP%20for%20WooCommerce%2C%20Order%20Notifications%20%26%20Abandoned%20Cart%20Recovery&amp;severity=high&amp;id=682d9817c4522896dcbd7115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4498-stack-based-buffer-overflow-in-code-projects-simple-bus-reservation-system-bd6ab9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4498%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Simple%20Bus%20Reservation%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2158-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-mythemeshop-wordpress-review-plugin-the-ultimate-solution-for-building-a-review-website-bd710d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2158%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mythemeshop%20WordPress%20Review%20Plugin%3A%20The%20Ultimate%20Solution%20for%20Building%20a%20Review%20Website&amp;severity=high&amp;id=682d9817c4522896dcbd710d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4497-buffer-overflow-in-code-projects-simple-banking-system-bd6a71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4497%3A%20Buffer%20Overflow%20in%20code-projects%20Simple%20Banking%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2944-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jegtheme-jeg-elementor-kit-bd7111</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2944%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Kit%20for%20Elementor%20%E2%80%93%20Powerful%20Addons%20for%20Elementor%2C%20Widgets%20%26%20Templates%20for%20WordPress&amp;severity=medium&amp;id=682d9817c4522896dcbd7111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4496-buffer-overflow-in-totolink-t10-bd68c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4496%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=682d9816c4522896dcbd68c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1137-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-ibm-storage-scale-bd66fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1137%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Storage%20Scale&amp;severity=high&amp;id=682d9816c4522896dcbd66fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4495-cross-site-scripting-in-jadmin-java-jadmin-bd731a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4495%3A%20Cross%20Site%20Scripting%20in%20JAdmin-JAVA%20JAdmin&amp;severity=medium&amp;id=682d9817c4522896dcbd731a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47817-cwe-472-external-control-of-assumed-immutable-web-parameter-in-bluewave-checkmate-bd68f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47817%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20BlueWave%20Checkmate&amp;severity=high&amp;id=682d9816c4522896dcbd68f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47816-cwe-125-out-of-bounds-read-in-gnu-pspp-bd68f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47816%3A%20CWE-125%20Out-of-bounds%20Read%20in%20GNU%20PSPP&amp;severity=low&amp;id=682d9816c4522896dcbd68f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47815-cwe-122-heap-based-buffer-overflow-in-gnu-pspp-bd68ee</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47815%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20GNU%20PSPP&amp;severity=medium&amp;id=682d9816c4522896dcbd68ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47814-cwe-122-heap-based-buffer-overflow-in-gnu-pspp-bd6412</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47814%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20GNU%20PSPP&amp;severity=medium&amp;id=682d9815c4522896dcbd6412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-10-2a1169</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-10&amp;severity=medium&amp;id=682c7db2e8347ec82d2a1169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-10-f12b1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3794-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-smub-wpforms-easy-form-builder-for-wordpress-contact-forms-payment-forms-surveys-more-bd7316</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20WPForms%20%E2%80%93%20Easy%20Form%20Builder%20for%20WordPress%20%E2%80%93%20Contact%20Forms%2C%20Payment%20Forms%2C%20Surveys%2C%20%26%20More&amp;severity=medium&amp;id=682d9817c4522896dcbd7316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4494-improper-authentication-in-jadmin-java-jadmin-bd7312</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4494%3A%20Improper%20Authentication%20in%20JAdmin-JAVA%20JAdmin&amp;severity=medium&amp;id=682d9817c4522896dcbd7312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4492-sql-injection-in-campcodes-online-food-ordering-system-bd7305</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4492%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4491-sql-injection-in-campcodes-online-food-ordering-system-bd7301</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4491%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4490-sql-injection-in-campcodes-online-food-ordering-system-bd72ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4490%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd72ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47269-cwe-441-unintended-proxy-or-intermediary-confused-deputy-in-coder-code-server-bd72de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47269%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20coder%20code-server&amp;severity=high&amp;id=682d9817c4522896dcbd72de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4447-cwe-121-stack-based-buffer-overflow-in-eclipse-foundation-openj9-bd72e2</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4447%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Eclipse%20Foundation%20OpenJ9&amp;severity=high&amp;id=682d9817c4522896dcbd72e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4489-sql-injection-in-campcodes-online-food-ordering-system-bd72ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4489%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd72ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4488-sql-injection-in-itsourcecode-gym-management-system-bd72e6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4488%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd72e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4487-sql-injection-in-itsourcecode-gym-management-system-bd68c3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4487%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd68c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4486-sql-injection-in-itsourcecode-gym-management-system-bd68bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4486%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd68bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4485-sql-injection-in-itsourcecode-gym-management-system-bd74af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4485%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd74af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4484-sql-injection-in-itsourcecode-gym-management-system-bd74ab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4484%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd74ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4483-sql-injection-in-itsourcecode-gym-management-system-bd7454</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4483%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4482-sql-injection-in-project-worlds-student-project-allocation-system-bd7433</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4482%3A%20SQL%20Injection%20in%20Project%20Worlds%20Student%20Project%20Allocation%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1993-cwe-521-weak-password-requirements-in-ibm-app-connect-enterprise-certified-container-bd7412</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1993%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20IBM%20App%20Connect%20Enterprise%20Certified%20Container&amp;severity=medium&amp;id=682d9817c4522896dcbd7412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4481-sql-injection-in-sourcecodester-apartment-visitor-management-system-bd73f3</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4481%3A%20SQL%20Injection%20in%20SourceCodester%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd73f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4480-stack-based-buffer-overflow-in-code-projects-simple-college-management-system-bd73e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4480%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Simple%20College%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd73e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8973-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-bd73da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8973%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9817c4522896dcbd73da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0549-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-gitlab-gitlab-bd73ca</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0549%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9817c4522896dcbd73ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1278-cwe-1220-insufficient-granularity-of-access-control-in-gitlab-gitlab-bd739a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1278%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9817c4522896dcbd739a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4432-allocation-of-resources-without-limits-or-throttling-in-red-hat-red-hat-enterprise-linux-6-bd773e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4432%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=682d9817c4522896dcbd773e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9524-cwe-59-improper-link-resolution-before-file-access-link-following-in-aira-prime-bd76e3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9524%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Aira%20Prime&amp;severity=high&amp;id=682d9817c4522896dcbd76e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13962-cwe-59-improper-link-resolution-before-file-access-link-following-in-avast-cleanup-premium-bd76d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13962%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20CleanUp%20Premium&amp;severity=low&amp;id=682d9817c4522896dcbd76d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13961-cwe-59-improper-link-resolution-before-file-access-link-following-in-avast-cleanup-premium-bd769f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13961%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20CleanUp%20Premium&amp;severity=low&amp;id=682d9817c4522896dcbd769f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13960-cwe-59-improper-link-resolution-before-file-access-link-following-in-avg-tuneup-bd7508</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13960%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AVG%20TuneUp&amp;severity=high&amp;id=682d9817c4522896dcbd7508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13959-cwe-59-improper-link-resolution-before-file-access-link-following-in-avg-tuneup-bd74e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13959%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AVG%20TuneUp&amp;severity=high&amp;id=682d9817c4522896dcbd74e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13759-cwe-59-improper-link-resolution-before-file-access-link-following-in-avira-prime-bd74e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13759%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avira%20Prime&amp;severity=high&amp;id=682d9817c4522896dcbd74e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13944-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-norton-norton-utilities-ultimate-bd74a3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13944%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Norton%20Norton%20Utilities%20Ultimate&amp;severity=high&amp;id=682d9817c4522896dcbd74a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealthy-net-malware-hiding-malicious-payloads-as--732edecc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealthy%20.NET%20Malware%3A%20Hiding%20Malicious%20Payloads%20as%20Bitmap%20Resources&amp;severity=medium&amp;id=684597ec71f4d251b55363c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12442-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-enersys-ampa-bd6439</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12442%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20EnerSys%20AMPA&amp;severity=critical&amp;id=682d9815c4522896dcbd6439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11861-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-enersys-ampa-bd6786</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11861%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20EnerSys%20AMPA&amp;severity=critical&amp;id=682d9816c4522896dcbd6786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4382-missing-authentication-for-critical-function-in-red-hat-red-hat-enterprise-linux-7-bd7b14</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4382%3A%20Missing%20Authentication%20for%20Critical%20Function&amp;severity=medium&amp;id=682d9818c4522896dcbd7b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thewizards-apt-group-uses-slaac-spoofing-to-perfor-132403a1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TheWizards%20APT%20group%20uses%20SLAAC%20spoofing%20to%20perform%20adversary-in-the-middle%20attacks&amp;severity=medium&amp;id=684570fc71f4d251b54b20e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3528-incorrect-default-permissions-in-red-hat-mirror-registry-for-red-hat-openshift-bd7a5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3528%3A%20Incorrect%20Default%20Permissions&amp;severity=high&amp;id=682d9818c4522896dcbd7a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1087-cwe-20-improper-input-validation-in-kong-inc-insomnia-bd7a2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1087%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kong%20Inc.%20Insomnia&amp;severity=critical&amp;id=682d9817c4522896dcbd7a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3897-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-diego-la-monica-eucookielaw-bd79bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3897%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20diego-la-monica%20EUCookieLaw&amp;severity=medium&amp;id=682d9817c4522896dcbd79bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4206-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-trainingbusinesspros-wordpress-crm-email-marketing-automation-for-wordpress-award-winner-groundhogg-bd779b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4206%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20trainingbusinesspros%20Groundhogg%20%E2%80%94%20CRM%2C%20Newsletters%2C%20and%20Marketing%20Automation&amp;severity=high&amp;id=682d9817c4522896dcbd779b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46392-cwe-400-uncontrolled-resource-consumption-in-apache-software-foundation-apache-commons-configuration-aecc7f</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46392%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20Configuration&amp;severity=medium&amp;id=682cd0fc1484d88663aecc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4403-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-glenwpcoder-drag-and-drop-multiple-file-upload-for-woocommerce-bd79ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4403%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20WooCommerce&amp;severity=critical&amp;id=682d9817c4522896dcbd79ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3949-cwe-862-missing-authorization-in-seedprod-website-builder-by-seedprod-theme-builder-landing-page-builder-coming-soon-page-maintenance-mode-bd789a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3949%3A%20CWE-862%20Missing%20Authorization%20in%20seedprod%20Website%20Builder%20by%20SeedProd%20%E2%80%94%20Theme%20Builder%2C%20Landing%20Page%20Builder%2C%20Coming%20Soon%20Page%2C%20Maintenance%20Mode&amp;severity=medium&amp;id=682d9817c4522896dcbd789a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4472-stack-based-buffer-overflow-in-code-projects-departmental-store-management-system-bd785b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4472%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Departmental%20Store%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd785b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4471-stack-based-buffer-overflow-in-code-projects-jewelery-store-management-system-bd71d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4471%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Jewelery%20Store%20Management%20system&amp;severity=medium&amp;id=682d9817c4522896dcbd71d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4470-cross-site-scripting-in-sourcecodester-online-student-clearance-system-bd7772</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4470%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4469-cross-site-scripting-in-sourcecodester-online-student-clearance-system-aebef3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4469%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37889-vulnerability-in-linux-linux-bd71aa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9817c4522896dcbd71aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37888-vulnerability-in-linux-linux-bd7c08</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37887-vulnerability-in-linux-linux-bd7c04</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37886-vulnerability-in-linux-linux-bd7c00</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37885-vulnerability-in-linux-linux-bd7bf1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37884-vulnerability-in-linux-linux-bd7be9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37883-vulnerability-in-linux-linux-bd7bd2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37882-vulnerability-in-linux-linux-bd7bce</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37881-vulnerability-in-linux-linux-bd7bca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37880-vulnerability-in-linux-linux-aeb88a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f81484d88663aeb88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37879-vulnerability-in-linux-linux-bd7bc6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37878-vulnerability-in-linux-linux-bd7bb5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37877-vulnerability-in-linux-linux-bd7bad</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37876-vulnerability-in-linux-linux-bd7097</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd7097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37875-vulnerability-in-linux-linux-bd7d6b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37874-vulnerability-in-linux-linux-bd7d50</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37873-vulnerability-in-linux-linux-bd7d4c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37872-vulnerability-in-linux-linux-bd7d48</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37871-vulnerability-in-linux-linux-bd7d44</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37870-vulnerability-in-linux-linux-bd7d40</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37869-vulnerability-in-linux-linux-bd7d3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37868-vulnerability-in-linux-linux-bd7d38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37867-vulnerability-in-linux-linux-bd7d34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37866-vulnerability-in-linux-linux-bd7d30</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37865-vulnerability-in-linux-linux-bd7d2c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37864-vulnerability-in-linux-linux-bd7d10</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37863-vulnerability-in-linux-linux-bd7cff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3455-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-1clickmigration-1-click-wordpress-migration-plugin-100-free-for-a-limited-time-bd7766</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3455%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%201clickmigration%201%20Click%20Migration%20%26%20Backup%3A%20Free%20WordPress%20Migration%20Plugin%20with%20Zero%20Downtime%20%26%20Easy%20Clone&amp;severity=high&amp;id=682d9817c4522896dcbd7766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11617-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-themekalia-envolve-plugin-bd7742</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11617%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ThemeKalia%20Envolve%20Plugin&amp;severity=critical&amp;id=682d9817c4522896dcbd7742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2253-cwe-620-unverified-password-change-in-imithemes-imithemes-listing-bd783d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2253%3A%20CWE-620%20Unverified%20Password%20Change%20in%20imithemes%20IMITHEMES%20Listing&amp;severity=critical&amp;id=682d9817c4522896dcbd783d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3605-cwe-639-authorization-bypass-through-user-controlled-key-in-arkenon-frontend-login-and-registration-blocks-bd7843</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3605%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20arkenon%20Login%2C%20Registration%20and%20Lost%20Password%20Blocks&amp;severity=critical&amp;id=682d9817c4522896dcbd7843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37862-vulnerability-in-linux-linux-bd7cf7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37861-vulnerability-in-linux-linux-bd7093</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd7093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37859-vulnerability-in-linux-linux-bd7cef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37858-vulnerability-in-linux-linux-bd7ce7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37857-vulnerability-in-linux-linux-bd7ce1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37856-vulnerability-in-linux-linux-bd7cdd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37855-vulnerability-in-linux-linux-bd7cd9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37854-vulnerability-in-linux-linux-bd7cc8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37853-vulnerability-in-linux-linux-bd7cc0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37852-vulnerability-in-linux-linux-bd7ca5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37851-vulnerability-in-linux-linux-bd708f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd708f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37850-vulnerability-in-linux-linux-bd7c96</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9818c4522896dcbd7c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37849-vulnerability-in-linux-linux-bd7c90</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37848-vulnerability-in-linux-linux-bd7c8a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37847-vulnerability-in-linux-linux-bd7c86</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37846-vulnerability-in-linux-linux-bd7c82</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37845-vulnerability-in-linux-linux-bd7c71</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37844-vulnerability-in-linux-linux-bd7c69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37843-vulnerability-in-linux-linux-bd7c61</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37842-vulnerability-in-linux-linux-bd7c59</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37841-vulnerability-in-linux-linux-bd7c39</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37840-vulnerability-in-linux-linux-bd7c28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37839-vulnerability-in-linux-linux-bd7c20</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37837-vulnerability-in-linux-linux-bd7c18</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37837%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37836-vulnerability-in-linux-linux-bd7c10</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37835-bd71c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37835&amp;severity=low&amp;id=682d9817c4522896dcbd71c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4468-unrestricted-upload-in-sourcecodester-online-student-clearance-system-bd77ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4468%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd77ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4467-sql-injection-in-sourcecodester-online-student-clearance-system-aec779</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4467%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4466-sql-injection-in-itsourcecode-gym-management-system-bd77e8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4466%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd77e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3463-cwe-295-improper-certificate-validation-in-asus-driverhub-aeb873</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3463%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUS%20DriverHub&amp;severity=critical&amp;id=682cd0f81484d88663aeb873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3462-cwe-346-origin-validation-error-in-asus-driverhub-aeb875</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3462%3A%20CWE-346%20Origin%20Validation%20Error%20in%20ASUS%20DriverHub&amp;severity=high&amp;id=682cd0f81484d88663aeb875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4465-sql-injection-in-itsourcecode-gym-management-system-bd7b3b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4465%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9818c4522896dcbd7b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4464-sql-injection-in-itsourcecode-gym-management-system-bd7b37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4464%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9818c4522896dcbd7b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4377-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-sparx-systems-pro-cloud-server-bd7b10</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4377%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Sparx%20Systems%20Pro%20Cloud%20Server&amp;severity=high&amp;id=682d9818c4522896dcbd7b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4376-cwe-20-improper-input-validation-in-sparx-systems-pro-cloud-server-bd7b01</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4376%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Sparx%20Systems%20Pro%20Cloud%20Server&amp;severity=medium&amp;id=682d9818c4522896dcbd7b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4375-cwe-352-cross-site-request-forgery-csrf-in-sparx-systems-pro-cloud-server-bd7afd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4375%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sparx%20Systems%20Pro%20Cloud%20Server&amp;severity=medium&amp;id=682d9818c4522896dcbd7afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4463-sql-injection-in-itsourcecode-gym-management-system-bd7b33</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4463%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9818c4522896dcbd7b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4462-buffer-overflow-in-totolink-n150rt-bd77de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4462%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d9817c4522896dcbd77de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4461-cross-site-scripting-in-totolink-n150rt-bd77cd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4461%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d9817c4522896dcbd77cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3714-cwe-121-stack-based-buffer-overflow-in-aten-cl5708im-bd7793</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3714%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ATEN%20CL5708IM&amp;severity=critical&amp;id=682d9817c4522896dcbd7793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3713-cwe-122-heap-based-buffer-overflow-in-aten-cl5708im-bd778d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3713%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20ATEN%20CL5708IM&amp;severity=high&amp;id=682d9817c4522896dcbd778d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3712-cwe-122-heap-based-buffer-overflow-in-aten-cl5708im-bd7789</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3712%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20ATEN%20CL5708IM&amp;severity=high&amp;id=682d9817c4522896dcbd7789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4460-cross-site-scripting-in-totolink-n150rt-bd776a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4460%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d9817c4522896dcbd776a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4459-sql-injection-in-code-projects-patient-record-management-system-bd7b1a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4459%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9818c4522896dcbd7b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3711-cwe-121-stack-based-buffer-overflow-in-aten-cl5708im-bd7af1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3711%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ATEN%20CL5708IM&amp;severity=critical&amp;id=682d9818c4522896dcbd7af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3710-cwe-121-stack-based-buffer-overflow-in-aten-cl5708im-bd7abf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3710%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ATEN%20CL5708IM&amp;severity=critical&amp;id=682d9818c4522896dcbd7abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4458-sql-injection-in-code-projects-patient-record-management-system-bd7a9e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4458%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9818c4522896dcbd7a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4457-sql-injection-in-project-worlds-car-rental-project-bd7e00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4457%3A%20SQL%20Injection%20in%20Project%20Worlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=682d9818c4522896dcbd7e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4456-sql-injection-in-project-worlds-car-rental-project-bd7dfa</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4456%3A%20SQL%20Injection%20in%20Project%20Worlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=682d9818c4522896dcbd7dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4455-uncontrolled-search-path-in-patch-my-pc-home-updater-bd7df6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4455%3A%20Uncontrolled%20Search%20Path%20in%20Patch%20My%20PC%20Home%20Updater&amp;severity=high&amp;id=682d9818c4522896dcbd7df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4454-command-injection-in-d-link-dir-619l-bd7df2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4454%3A%20Command%20Injection%20in%20D-Link%20DIR-619L&amp;severity=medium&amp;id=682d9818c4522896dcbd7df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4453-command-injection-in-d-link-dir-619l-bd7dee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4453%3A%20Command%20Injection%20in%20D-Link%20DIR-619L&amp;severity=medium&amp;id=682d9818c4522896dcbd7dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4434-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-andreyk-remote-images-grabber-bd7dc4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4434&amp;severity=high&amp;id=682d9818c4522896dcbd7dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3811-cwe-639-authorization-bypass-through-user-controlled-key-in-iqonicdesign-wpbookit-bd7da7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3811%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20iqonicdesign%20WPBookit&amp;severity=critical&amp;id=682d9818c4522896dcbd7da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3810-cwe-639-authorization-bypass-through-user-controlled-key-in-iqonicdesign-wpbookit-bd7da3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3810%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20iqonicdesign%20WPBookit&amp;severity=critical&amp;id=682d9818c4522896dcbd7da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4452-buffer-overflow-in-d-link-dir-619l-bd7dea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4452%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9818c4522896dcbd7dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4451-buffer-overflow-in-d-link-dir-619l-bd7ddd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4451%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9818c4522896dcbd7ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4450-buffer-overflow-in-d-link-dir-619l-bd7853</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4450%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9817c4522896dcbd7853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4449-buffer-overflow-in-d-link-dir-619l-bd784b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4449%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9817c4522896dcbd784b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4448-buffer-overflow-in-d-link-dir-619l-bd7dcc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4448%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9818c4522896dcbd7dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4446-buffer-overflow-in-h3c-gr-5400ax-bd7d9f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4446%3A%20Buffer%20Overflow%20in%20H3C%20GR-5400AX&amp;severity=high&amp;id=682d9818c4522896dcbd7d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4445-command-injection-in-d-link-dir-605l-bd7d9b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4445%3A%20Command%20Injection%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=682d9818c4522896dcbd7d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-11-pro-23h2-ancillary-function-d-8c9f77bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%2011%20Pro%2023H2%20-%20Ancillary%20Function%20Driver%20for%20WinSock%20Privilege%20Escalation&amp;severity=high&amp;id=68489e0f7e6d765d51d53d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-depicter-plugin-361-sql-injection-cf3763ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Depicter%20Plugin%203.6.1%20-%20SQL%20Injection&amp;severity=medium&amp;id=68489e097e6d765d51d53c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/suretriggers-ottokit-plugin-1082-privilege-escalat-46caf5a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SureTriggers%20OttoKit%20Plugin%201.0.82%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489e037e6d765d51d53ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/virtualbox-7016-privilege-escalation-3d130275</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VirtualBox%207.0.16%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489dfc7e6d765d51d539fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apache-activemq-616-denial-of-service-dos-c07ec420</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apache%20ActiveMQ%206.1.6%20-%20Denial%20of%20Service%20(DOS)&amp;severity=medium&amp;id=68489df67e6d765d51d53943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47736-cwe-228-improper-handling-of-syntactically-invalid-structure-in-gwenn-libsql-sqlite3-parser-bd7af9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47736%3A%20CWE-228%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20gwenn%20libsql-sqlite3-parser&amp;severity=low&amp;id=682d9818c4522896dcbd7af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47735-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-nugine-wgp-bd77e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47735%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Nugine%20wgp&amp;severity=low&amp;id=682d9817c4522896dcbd77e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47737-cwe-762-mismatched-memory-management-routines-in-geal-trailer-bd77da</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47737%3A%20CWE-762%20Mismatched%20Memory%20Management%20Routines%20in%20Geal%20trailer&amp;severity=low&amp;id=682d9817c4522896dcbd77da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46192-n-a-in-n-a-bd72da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46192%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46191-n-a-in-n-a-bd72d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46191%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46190-n-a-in-n-a-bd72d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46190%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46189-n-a-in-n-a-bd72ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46189%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46188-n-a-in-n-a-bd72ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46188%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45513-n-a-in-n-a-bd72b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45513%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29509-n-a-in-n-a-bd6e97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29509%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28202-n-a-in-n-a-bd6b86</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28202%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28201-n-a-in-n-a-bd6b77</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28201%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28203-n-a-in-n-a-bd6b71</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28203%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47424-cwe-348-use-of-less-trusted-source-in-retool-retool-bd68bb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47424%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20Retool%20Retool&amp;severity=high&amp;id=682d9816c4522896dcbd68bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45885-n-a-in-n-a-bd67f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45885%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd67f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46193-n-a-in-n-a-bd677e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46193%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd677e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45887-n-a-in-n-a-bd677a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45887%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd677a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28200-n-a-in-n-a-bd6776</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28200%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-09-2a135a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-09&amp;severity=medium&amp;id=682c7db2e8347ec82d2a135a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-09-f1220c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f1220c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4443-command-injection-in-d-link-dir-605l-bd7d97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4443%3A%20Command%20Injection%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=682d9818c4522896dcbd7d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4442-buffer-overflow-in-d-link-dir-605l-bd7d93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4442%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=682d9818c4522896dcbd7d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4441-buffer-overflow-in-d-link-dir-605l-bd7d8f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4441%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=682d9818c4522896dcbd7d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4440-buffer-overflow-in-h3c-gr-1800ax-bd7d8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4440%3A%20Buffer%20Overflow%20in%20H3C%20GR-1800AX&amp;severity=high&amp;id=682d9818c4522896dcbd7d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27720-cwe-319-cleartext-transmission-of-sensitive-information-in-pixmeo-osirix-md-bd7d73</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27720%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Pixmeo%20OsiriX%20MD&amp;severity=critical&amp;id=682d9818c4522896dcbd7d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31946-cwe-416-use-after-free-in-pixmeo-osirix-md-bd7aed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31946%3A%20CWE-416%20Use%20After%20Free%20in%20Pixmeo%20OsiriX%20MD&amp;severity=medium&amp;id=682d9818c4522896dcbd7aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27578-cwe-416-use-after-free-in-pixmeo-osirix-md-bd7ae9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27578%3A%20CWE-416%20Use%20After%20Free%20in%20Pixmeo%20OsiriX%20MD&amp;severity=high&amp;id=682d9818c4522896dcbd7ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47732-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-dataverse-aeba29</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47732%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Dataverse&amp;severity=high&amp;id=682cd0f91484d88663aeba29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47733-cwe-918-server-side-request-forgery-ssrf-in-microsoft-microsoft-power-apps-aeba36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47733%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Power%20Pages&amp;severity=critical&amp;id=682cd0f91484d88663aeba36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29813-cwe-302-authentication-bypass-by-assumed-immutable-data-in-microsoft-azure-devops-aeb94e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29813%3A%20CWE-302%3A%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Microsoft%20Azure%20DevOps&amp;severity=critical&amp;id=682cd0f91484d88663aeb94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29827-cwe-285-improper-authorization-in-microsoft-azure-automation-aeb95f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29827%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Automation&amp;severity=critical&amp;id=682cd0f91484d88663aeb95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29972-cwe-918-server-side-request-forgery-ssrf-in-microsoft-azure-storage-resource-provider-srp-aeb9be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29972%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Storage%20Resource%20Provider%20(SRP)&amp;severity=critical&amp;id=682cd0f91484d88663aeb9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33072-cwe-284-improper-access-control-in-microsoft-microsoft-msagsfeedback-azurewebsites-net-aeba23</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33072%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20msagsfeedback.azurewebsites.net&amp;severity=high&amp;id=682cd0f91484d88663aeba23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1331-cwe-242-use-of-inherently-dangerous-function-in-ibm-cics-tx-standard-bd71e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1331%3A%20CWE-242%20Use%20of%20Inherently%20Dangerous%20Function%20in%20IBM%20CICS%20TX%20Standard&amp;severity=high&amp;id=682d9817c4522896dcbd71e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1330-cwe-787-out-of-bounds-write-in-ibm-cics-tx-standard-bd71de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1330%3A%20CWE-787%20Out-of-bounds%20Write%20in%20IBM%20CICS%20TX%20Standard&amp;severity=high&amp;id=682d9817c4522896dcbd71de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1329-cwe-787-out-of-bounds-write-in-ibm-cics-tx-standard-bd71da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1329%3A%20CWE-787%20Out-of-bounds%20Write%20in%20IBM%20CICS%20TX%20Standard&amp;severity=high&amp;id=682d9817c4522896dcbd71da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4475-bd7e23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4475&amp;severity=low&amp;id=682d9818c4522896dcbd7e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46833-cwe-326-inadequate-encryption-strength-in-shashikantsingh09-python-progrrames-bd7ed4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46833%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20ShashikantSingh09%20python-progrrames&amp;severity=medium&amp;id=682d9818c4522896dcbd7ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46812-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-basecamp-trix-bd7eac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46812%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20basecamp%20trix&amp;severity=low&amp;id=682d9818c4522896dcbd7eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46712-cwe-440-expected-behavior-violation-in-erlang-otp-bd7ea8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46712%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20erlang%20otp&amp;severity=low&amp;id=682d9818c4522896dcbd7ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46336-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-rack-rack-session-bd7e5b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46336%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20rack%20rack-session&amp;severity=medium&amp;id=682d9818c4522896dcbd7e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9448-cwe-1284-improper-validation-of-specified-quantity-in-input-in-arista-networks-eos-bd7fe4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9448%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Arista%20Networks%20EOS&amp;severity=high&amp;id=682d9818c4522896dcbd7fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27695-cwe-290-authentication-bypass-by-spoofing-in-dell-wyse-management-suite-bd807d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27695%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=682d9818c4522896dcbd807d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12378-cwe-319-cleartext-transmission-of-sensitive-information-in-arista-networks-cloudvision-portal-bd8030</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12378%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Arista%20Networks%20CloudVision%20Portal&amp;severity=critical&amp;id=682d9818c4522896dcbd8030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11186-cwe-287-improper-authentication-in-arista-networks-cloudvision-portal-bd80ff</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11186%3A%20CWE-287%20Improper%20Authentication%20in%20Arista%20Networks%20CloudVision%20Portal&amp;severity=critical&amp;id=682d9818c4522896dcbd80ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0505-cwe-269-improper-privilege-management-in-arista-networks-cloudvision-portal-bd8140</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0505%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Arista%20Networks%20CloudVision%20Portal&amp;severity=critical&amp;id=682d9818c4522896dcbd8140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8100-cwe-269-improper-privilege-management-in-arista-networks-cloudvision-bd813c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8100%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Arista%20Networks%20CloudVision&amp;severity=high&amp;id=682d9818c4522896dcbd813c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1948-cwe-400-uncontrolled-resource-consumption-in-eclipse-foundation-jetty-bd8228</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1948%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Jetty&amp;severity=high&amp;id=682d9818c4522896dcbd8228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4098-cwe-125-out-of-bounds-read-in-horner-automation-cscape-bd731e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4098%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Horner%20Automation%20Cscape&amp;severity=high&amp;id=682d9817c4522896dcbd731e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30101-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-dell-powerscale-onefs-bd81e9</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30101%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=682d9818c4522896dcbd81e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30102-cwe-787-out-of-bounds-write-in-dell-powerscale-onefs-bd8179</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30102%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=682d9818c4522896dcbd8179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13009-cwe-404-improper-resource-shutdown-or-release-in-eclipse-foundation-jetty-bd812c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13009%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Eclipse%20Foundation%20Jetty&amp;severity=high&amp;id=682d9818c4522896dcbd812c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-campaign-targeting-brazil-abuses-remote-monit-e632dc89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%20campaign%20targeting%20Brazil%20abuses%20Remote%20Monitoring%20and%20Management%20tools&amp;severity=medium&amp;id=6844546471f4d251b51245cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4132-bd716a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4132&amp;severity=low&amp;id=682d9817c4522896dcbd716a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4207-buffer-over-read-in-postgresql-bd767a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4207%3A%20Buffer%20Over-read%20in%20PostgreSQL&amp;severity=medium&amp;id=682d9817c4522896dcbd767a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6648-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-apollo-theme-ap-page-builder-bd86b0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6648%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apollo%20Theme%20AP%20Page%20Builder&amp;severity=high&amp;id=682d9819c4522896dcbd86b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3506-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-checkmk-gmbh-checkmk-bd8695</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3506%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=682d9819c4522896dcbd8695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2806-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tagdiv-tagdiv-composer-bd8674</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=682d9819c4522896dcbd8674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3468-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-webaways-nex-forms-ultimate-forms-plugin-for-wordpress-bd868d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3468%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=682d9819c4522896dcbd868d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3862-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-contest-gallery-photos-files-youtube-twitter-instagram-tiktok-ecommerce-contest-gallery-upload-vote-sell-via-paypal-or-stripe-social-share-buttons-bd8634</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=682d9819c4522896dcbd8634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4208-cwe-94-improper-control-of-generation-of-code-code-injection-in-webaways-nex-forms-ultimate-forms-plugin-for-wordpress-bd864c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4208%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=682d9819c4522896dcbd864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3759-cwe-306-missing-authentication-for-critical-function-in-netis-systems-wf2220-bd8625</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3759%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Netis%20Systems%20WF2220&amp;severity=high&amp;id=682d9819c4522896dcbd8625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3758-cwe-306-missing-authentication-for-critical-function-in-netis-systems-wf2220-bd8615</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3758%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Netis%20Systems%20WF2220&amp;severity=high&amp;id=682d9819c4522896dcbd8615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41450-cwe-287-improper-authentication-in-danfoss-ak-sm-8xxa-series-aecb51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41450%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Danfoss%20AK-SM%208xxA%20Series&amp;severity=high&amp;id=682cd0fc1484d88663aecb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1254-cwe-125-out-of-bounds-read-in-rti-connext-professional-bd85f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1254%3A%20CWE-125%20Out-of-bounds%20Read%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=682d9819c4522896dcbd85f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1253-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-rti-connext-professional-bd85be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1253%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=682d9819c4522896dcbd85be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1252-cwe-122-heap-based-buffer-overflow-in-rti-connext-professional-bd85a9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1252%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=682d9819c4522896dcbd85a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40846-cwe-20-improper-input-validation-in-haloitsm-itsm-bd85dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40846%3A%20CWE-20%20Improper%20Input%20Validation%20in%20HaloITSM%20ITSM&amp;severity=high&amp;id=682d9819c4522896dcbd85dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4127-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kcseopro-wp-seo-structured-data-schema-bd85ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kcseopro%20WP%20SEO%20Structured%20Data%20Schema&amp;severity=medium&amp;id=682d9819c4522896dcbd85ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37834-vulnerability-in-linux-linux-bd88d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd88d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37833-vulnerability-in-linux-linux-bd88d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd88d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37832-vulnerability-in-linux-linux-bd88ae</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37832&amp;severity=high&amp;id=682d9819c4522896dcbd88ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37831-vulnerability-in-linux-linux-bd88a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd88a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37830-vulnerability-in-linux-linux-bd88a2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd88a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37829-vulnerability-in-linux-linux-bd889e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd889e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37828-vulnerability-in-linux-linux-bd888d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd888d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37827-vulnerability-in-linux-linux-bd8885</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37826-vulnerability-in-linux-linux-bd887d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd887d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37825-vulnerability-in-linux-linux-bd8879</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37824-vulnerability-in-linux-linux-bd8875</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37823-vulnerability-in-linux-linux-bd8866</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37822-vulnerability-in-linux-linux-bd8849</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37821-vulnerability-in-linux-linux-aeb888</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f81484d88663aeb888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37820-vulnerability-in-linux-linux-bd8836</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37820%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37819-vulnerability-in-linux-linux-bd7ba9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37818-vulnerability-in-linux-linux-aeb029</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37818%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37817-vulnerability-in-linux-linux-bd882e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd882e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37816-vulnerability-in-linux-linux-bd8826</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37816%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37815-vulnerability-in-linux-linux-bd8822</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37814-vulnerability-in-linux-linux-bd881e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd881e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37813-vulnerability-in-linux-linux-bd880d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd880d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37812-vulnerability-in-linux-linux-bd8805</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37812%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37811-vulnerability-in-linux-linux-bd87fd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd87fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37810-vulnerability-in-linux-linux-bd87f9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd87f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37809-vulnerability-in-linux-linux-bd87db</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd87db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37808-vulnerability-in-linux-linux-bd87d7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd87d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37807-vulnerability-in-linux-linux-bd87d3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9819c4522896dcbd87d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37806-vulnerability-in-linux-linux-bd708b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd708b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37805-vulnerability-in-linux-linux-bd7087</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9817c4522896dcbd7087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37804-aeb106</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37804&amp;severity=low&amp;id=682cd0f71484d88663aeb106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37803-vulnerability-in-linux-linux-bd7085</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd7085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37802-vulnerability-in-linux-linux-bd7081</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9817c4522896dcbd7081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37801-vulnerability-in-linux-linux-bd87cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd87cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37800-vulnerability-in-linux-linux-bd87cb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd87cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3419-cwe-73-external-control-of-file-name-or-path-in-themewinter-event-manager-events-calendar-tickets-registrations-eventin-bd8595</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3419%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=high&amp;id=682d9819c4522896dcbd8595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13793-cwe-94-improper-control-of-generation-of-code-code-injection-in-don-themes-wolmart-multi-vendor-marketplace-woocommerce-theme-bd858d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13793%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20don-themes%20Wolmart%20%7C%20Multi-Vendor%20Marketplace%20WooCommerce%20Theme&amp;severity=high&amp;id=682d9819c4522896dcbd858d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32873-cwe-770-allocation-of-resources-without-limits-or-throttling-in-djangoproject-django-bd8589</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32873%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20djangoproject%20Django&amp;severity=medium&amp;id=682d9819c4522896dcbd8589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47730-cwe-798-use-of-hard-coded-credentials-in-telemessage-archiving-backend-bd845a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47730%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20TeleMessage%20archiving%20backend&amp;severity=medium&amp;id=682d9819c4522896dcbd845a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26845-n-a-in-n-a-bd81e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26845%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd81e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26844-n-a-in-n-a-bd8171</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26844%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd8171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26842-n-a-in-n-a-bd8160</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26842%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd8160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26847-n-a-in-n-a-bd8120</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26847%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd8120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44021-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-openstack-ironic-bd7e3a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44021%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenStack%20Ironic&amp;severity=low&amp;id=682d9818c4522896dcbd7e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45843-n-a-in-n-a-bd7141</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45843%3A%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd7141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45842-n-a-in-n-a-bd713b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45842%3A%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd713b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51328-n-a-in-n-a-bd7109</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51328%3A%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45798-n-a-in-n-a-bd6a47</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45798%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45797-n-a-in-n-a-bd6a22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45797%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45790-n-a-in-n-a-bd6a1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45790%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45789-n-a-in-n-a-bd6a1a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45789%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45788-n-a-in-n-a-bd6a0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45788%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45787-n-a-in-n-a-bd6a0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45787%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44023-n-a-in-n-a-bd69fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44023%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45847-n-a-in-n-a-bd69cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45847%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45841-n-a-in-n-a-bd69c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45841%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45820-n-a-in-n-a-bd69c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45820%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45819-n-a-in-n-a-bd69bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45819%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45818-n-a-in-n-a-bd69b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45818%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43926-n-a-in-n-a-bd69a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43926%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28073-n-a-in-n-a-bd6996</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28073%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51295-n-a-in-n-a-bd689b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51295%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd689b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28074-n-a-in-n-a-bd67cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28074%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd67cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31585-n-a-in-n-a-bd6782</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31585%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47729-cwe-912-hidden-functionality-in-telemessage-archiving-backend-bd6772</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47729%3A%20CWE-912%20Hidden%20Functionality%20in%20TeleMessage%20archiving%20backend&amp;severity=low&amp;id=682d9816c4522896dcbd6772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45844-n-a-in-n-a-bd6504</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45844%3A%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd6504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45846-n-a-in-n-a-bd646b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45846%3A%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd646b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45845-n-a-in-n-a-bd6467</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45845%3A%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd6467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-08-2a0b30</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-08&amp;severity=medium&amp;id=682c7db2e8347ec82d2a0b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-08-f12344</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55651-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-portabilis-i-educar-bd85f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55651%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20portabilis%20i-educar&amp;severity=low&amp;id=682d9819c4522896dcbd85f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46727-cwe-400-uncontrolled-resource-consumption-in-rack-rack-bd85f8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46727%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rack%20rack&amp;severity=high&amp;id=682d9819c4522896dcbd85f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32441-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-rack-rack-bd85c6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32441%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20rack%20rack&amp;severity=medium&amp;id=682d9819c4522896dcbd85c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0936-cwe-256-in-arista-networks-eos-bd86db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0936%3A%20CWE-256%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=682d9819c4522896dcbd86db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35939-cwe-472-external-control-of-assumed-immutable-web-parameter-in-craft-cms-aecb6e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35939%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20Craft%20CMS&amp;severity=medium&amp;id=682cd0fc1484d88663aecb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41431-cwe-787-out-of-bounds-write-in-f5-big-ip-bd86f4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41431%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31644-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-f5-big-ip-aec7c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31644%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682cd0fb1484d88663aec7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35995-cwe-125-out-of-bounds-read-in-f5-big-ip-bd86ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35995%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36525-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-f5-big-ip-bd86c2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36525%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36504-cwe-770-allocation-of-resources-without-limits-or-throttling-in-f5-big-ip-bd86be</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36504%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41414-cwe-476-null-pointer-dereference-in-f5-big-ip-bd86c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41414%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41433-cwe-476-null-pointer-dereference-in-f5-big-ip-bd86ac</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41433%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46265-cwe-863-incorrect-authorization-in-f5-f5os-appliance-bd8707</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46265%3A%20CWE-863%20Incorrect%20Authorization%20in%20F5%20F5OS%20-%20Appliance&amp;severity=high&amp;id=682d9819c4522896dcbd8707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43878-cwe-149-improper-neutralization-of-quoting-syntax-in-f5-f5os-appliance-bd8703</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43878%3A%20CWE-149%3A%20Improper%20Neutralization%20of%20Quoting%20Syntax%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=682d9819c4522896dcbd8703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36546-cwe-863-incorrect-authorization-in-f5-f5os-appliance-bd86ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36546%3A%20CWE-863%20Incorrect%20Authorization%20in%20F5%20F5OS%20-%20Appliance&amp;severity=high&amp;id=682d9819c4522896dcbd86ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36557-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-f5-big-ip-aeb2db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36557%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682cd0f81484d88663aeb2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41399-cwe-404-improper-resource-shutdown-or-release-in-f5-big-ip-bd869d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41399%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd869d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7303-cross-site-scripting-in-q2apro-q2apro-on-site-notifications-bd8665</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7303%3A%20Cross%20Site%20Scripting%20in%20q2apro%20q2apro-on-site-notifications&amp;severity=medium&amp;id=682d9819c4522896dcbd8665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46826-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-insagenda-insa-auth-bd8644</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46826%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20INSAgenda%20insa-auth&amp;severity=low&amp;id=682d9819c4522896dcbd8644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46821-cwe-186-overly-restrictive-regular-expression-in-envoyproxy-envoy-bd8599</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46821%3A%20CWE-186%3A%20Overly%20Restrictive%20Regular%20Expression%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9819c4522896dcbd8599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31177-heap-based-buffer-overflow-bd857c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31177%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=682d9819c4522896dcbd857c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4043-cwe-1274-in-milesight-ug65-868m-ea-bd855a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4043%3A%20CWE-1274%20in%20Milesight%20UG65-868M-EA&amp;severity=medium&amp;id=682d9819c4522896dcbd855a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3925-cwe-250-in-brightsign-brightsign-os-series-4-players-bd85ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3925%3A%20CWE-250%20in%20BrightSign%20BrightSign%20OS%20series%204%20players&amp;severity=high&amp;id=682d9819c4522896dcbd85ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3272-cwe-863-incorrect-authorization-in-opentext-operations-bridge-manager-bd8dac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3272%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenText%E2%84%A2%20Operations%20Bridge%20Manager&amp;severity=medium&amp;id=682d9819c4522896dcbd8dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3476-cwe-863-incorrect-authorization-in-opentext-operations-bridge-manager-bd8e0b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3476%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenText%E2%84%A2%20Operations%20Bridge%20Manager&amp;severity=critical&amp;id=682d9819c4522896dcbd8e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30147-cwe-325-missing-cryptographic-step-in-hyperledger-besu-native-bd8e07</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30147%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20hyperledger%20besu-native&amp;severity=high&amp;id=682d9819c4522896dcbd8e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coldriver-using-new-malware-to-steal-documents-fro-168aa226</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=COLDRIVER%20Using%20New%20Malware%20To%20Steal%20Documents%20From%20Western%20Targets%20and%20NGOs&amp;severity=medium&amp;id=68421305182aa0cae2f2a22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20195-cross-site-request-forgery-csrf-in-cisco-cisco-ios-xe-software-bd8f8d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20195%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d981ac4522896dcbd8f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20194-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-cisco-cisco-ios-xe-software-bd890f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20194%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd890f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20193-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-cisco-cisco-ios-xe-software-bd93f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20193%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d981ac4522896dcbd93f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20201-improper-check-for-unusual-or-exceptional-conditions-in-cisco-cisco-ios-xe-software-bd8952</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20201%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd8952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20200-improper-check-for-unusual-or-exceptional-conditions-in-cisco-cisco-ios-xe-software-bd8943</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20200%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd8943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20199-vulnerability-in-cisco-cisco-ios-xe-software-bd893b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20199%3A%20Vulnerability%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd893b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20198-improper-check-for-unusual-or-exceptional-conditions-in-cisco-cisco-ios-xe-software-bd8935</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20198%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd8935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20197-improper-input-validation-in-cisco-cisco-ios-xe-software-bd8931</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20197%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd8931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20221-exposure-of-sensitive-information-to-an-unauthorized-actor-in-cisco-cisco-ios-xe-software-bd8f30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20221%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d981ac4522896dcbd8f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20162-uncontrolled-resource-consumption-in-cisco-cisco-ios-xe-software-bd8ee4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20162%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20196-improper-restriction-of-excessive-authentication-attempts-in-cisco-ios-bd8f24</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20196%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Cisco%20IOS&amp;severity=medium&amp;id=682d981ac4522896dcbd8f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46824-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-discourse-discourse-code-review-bd90cb</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46824%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20discourse%20discourse-code-review&amp;severity=low&amp;id=682d981ac4522896dcbd90cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20186-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-cisco-cisco-ios-xe-software-bd8907</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20186%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d9819c4522896dcbd8907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20223-improper-access-control-in-cisco-cisco-digital-network-architecture-center-dna-center-bd8f34</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20223%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=682d981ac4522896dcbd8f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20155-improper-validation-of-specified-type-of-input-in-cisco-cisco-ios-xe-software-bd88ff</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20155%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd88ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20140-uncontrolled-memory-allocation-in-cisco-cisco-ios-xe-software-bd9406</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20140%3A%20Uncontrolled%20Memory%20Allocation%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd9406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20164-missing-authorization-in-cisco-ios-bd8903</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20164%3A%20Missing%20Authorization%20in%20Cisco%20IOS&amp;severity=high&amp;id=682d9819c4522896dcbd8903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20192-improper-handling-of-undefined-values-in-cisco-cisco-ios-xe-software-bd8f13</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20192%3A%20Improper%20Handling%20of%20Undefined%20Values%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20189-mismatched-memory-management-routines-in-cisco-cisco-ios-xe-software-bd8ef2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20189%3A%20Mismatched%20Memory%20Management%20Routines%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20181-improper-verification-of-cryptographic-signature-in-cisco-ios-bd8eea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20181%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20IOS&amp;severity=medium&amp;id=682d981ac4522896dcbd8eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20202-buffer-access-with-incorrect-length-value-in-cisco-cisco-ios-xe-software-bd8f28</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20202%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20190-improper-access-control-in-cisco-cisco-ios-xe-software-bd8efa</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20190%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d981ac4522896dcbd8efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46828-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-labredescefetrj-wegia-bd8e0f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46828%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=682d9819c4522896dcbd8e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20188-use-of-hard-coded-credentials-in-cisco-cisco-ios-xe-software-bd890b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20188%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=critical&amp;id=682d9819c4522896dcbd890b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20214-authorization-bypass-through-user-controlled-key-in-cisco-cisco-ios-xe-software-bd8f2c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20214%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d981ac4522896dcbd8f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20137-improper-access-control-in-cisco-ios-bd8e83</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20137%3A%20Improper%20Access%20Control%20in%20Cisco%20IOS&amp;severity=medium&amp;id=682d981ac4522896dcbd8e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32821-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-sonicwall-sma100-bd89a2</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32821%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SonicWall%20SMA100&amp;severity=high&amp;id=682d9819c4522896dcbd89a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32820-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-sonicwall-sma100-bd8ffa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32820%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SonicWall%20SMA100&amp;severity=high&amp;id=682d981ac4522896dcbd8ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20147-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cisco-cisco-catalyst-sd-wan-manager-bd940e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20147%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=682d981ac4522896dcbd940e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20216-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-cisco-cisco-catalyst-sd-wan-manager-bd9416</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20216%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=682d981ac4522896dcbd9416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20154-improper-input-validation-in-cisco-cisco-ios-xr-software-bd8e87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20154%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20151-configuration-in-cisco-cisco-ios-xe-catalyst-sd-wan-bd8e85</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20151%3A%20Configuration%20in%20Cisco%20Cisco%20IOS%20XE%20Catalyst%20SD-WAN&amp;severity=medium&amp;id=682d981ac4522896dcbd8e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20191-buffer-access-with-incorrect-length-value-in-cisco-cisco-nx-os-software-bd8eae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20191%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20187-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-cisco-cisco-catalyst-sd-wan-manager-bd8e93</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20187%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=682d981ac4522896dcbd8e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20122-channel-accessible-by-non-endpoint-in-cisco-cisco-catalyst-sd-wan-manager-bd88f9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20122%3A%20Channel%20Accessible%20by%20Non-Endpoint%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=high&amp;id=682d9819c4522896dcbd88f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32819-cwe-552-files-or-directories-accessible-to-external-parties-in-sonicwall-sma100-bd6704</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32819%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20SonicWall%20SMA100&amp;severity=high&amp;id=682d9816c4522896dcbd6704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20213-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-cisco-cisco-catalyst-sd-wan-manager-bd8956</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20213%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=682d9819c4522896dcbd8956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20182-out-of-bounds-write-in-cisco-cisco-adaptive-security-appliance-asa-software-bd8e8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20182%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20157-improper-certificate-validation-in-cisco-cisco-catalyst-sd-wan-manager-bd8e8b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20157%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=682d981ac4522896dcbd8e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20210-missing-authentication-for-critical-function-in-cisco-cisco-digital-network-architecture-center-dna-center-bd8eb6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20210%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=high&amp;id=682d981ac4522896dcbd8eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46551-cwe-295-improper-certificate-validation-in-jruby-jruby-openssl-bd8cd7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46551%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20jruby%20jruby-openssl&amp;severity=medium&amp;id=682d9819c4522896dcbd8cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46827-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-graylog2-graylog2-server-bd96d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46827%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Graylog2%20graylog2-server&amp;severity=high&amp;id=682d981ac4522896dcbd96d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47619-cwe-295-improper-certificate-validation-in-syslog-ng-syslog-ng-bd945a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47619%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20syslog-ng%20syslog-ng&amp;severity=high&amp;id=682d981ac4522896dcbd945a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2777-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sysaid-sysaid-on-prem-bd899e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2777%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SysAid%20SysAid%20On-Prem&amp;severity=critical&amp;id=682d9819c4522896dcbd899e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2776-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sysaid-sysaid-on-prem-bd8996</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2776%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SysAid%20SysAid%20On-Prem&amp;severity=critical&amp;id=682d9819c4522896dcbd8996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2775-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sysaid-sysaid-on-prem-bd8992</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2775%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SysAid%20SysAid%20On-Prem&amp;severity=critical&amp;id=682d9819c4522896dcbd8992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47692-cwe-862-missing-authorization-in-contentstudio-contentstudio-bd9452</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47692%3A%20CWE-862%20Missing%20Authorization%20in%20contentstudio%20ContentStudio&amp;severity=medium&amp;id=682d981ac4522896dcbd9452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47691-cwe-94-improper-control-of-generation-of-code-code-injection-in-ultimate-member-ultimate-member-bd944a</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47691%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ultimate%20Member%20Ultimate%20Member&amp;severity=medium&amp;id=682d981ac4522896dcbd944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47688-cwe-862-missing-authorization-in-saad-iqbal-advanced-file-manager-bd93e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47688%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20Advanced%20File%20Manager&amp;severity=null&amp;id=682d981ac4522896dcbd93e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47686-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-delucks-delucks-seo-bd93df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47686%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=null&amp;id=682d981ac4522896dcbd93df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47685-cwe-352-cross-site-request-forgery-csrf-in-moloni-contribuinte-checkout-bd93d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47685%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Moloni%20Contribuinte%20Checkout&amp;severity=null&amp;id=682d981ac4522896dcbd93d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47684-cwe-352-cross-site-request-forgery-csrf-in-smaily-smaily-for-wp-bd93c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47684%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Smaily%20Smaily%20for%20WP&amp;severity=null&amp;id=682d981ac4522896dcbd93c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47683-cwe-502-deserialization-of-untrusted-data-in-florent-maillefaud-wp-maintenance-bd93c0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47683%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Florent%20Maillefaud%20WP%20Maintenance&amp;severity=null&amp;id=682d981ac4522896dcbd93c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47681-cwe-352-cross-site-request-forgery-csrf-in-ability-inc-web-accessibility-with-max-access-bd93a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47681%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ability%2C%20Inc%20Web%20Accessibility%20with%20Max%20Access&amp;severity=null&amp;id=682d981ac4522896dcbd93a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47679-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rs-wp-themes-rs-wp-book-showcase-bd9398</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47679%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RS%20WP%20THEMES%20RS%20WP%20Book%20Showcase&amp;severity=null&amp;id=682d981ac4522896dcbd9398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47677-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gt3themes-photo-gallery-gt3-image-gallery-gutenberg-block-gallery-bd9390</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47677%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gt3themes%20Photo%20Gallery&amp;severity=null&amp;id=682d981ac4522896dcbd9390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47676-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-faiyaz-alam-user-login-history-bd9388</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Faiyaz%20Alam%20User%20Login%20History&amp;severity=null&amp;id=682d981ac4522896dcbd9388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47675-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-woobox-woobox-bd9380</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woobox%20Woobox&amp;severity=medium&amp;id=682d981ac4522896dcbd9380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47674-cwe-352-cross-site-request-forgery-csrf-in-credova-financial-credova-financial-bd9371</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47674%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Credova%20Financial%20Credova_Financial&amp;severity=null&amp;id=682d981ac4522896dcbd9371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47669-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sabuj-kundu-cbx-map-for-google-map-openstreetmap-bd9369</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47669%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sabuj%20Kundu%20CBX%20Map%20for%20Google%20Map%20%26%20OpenStreetMap&amp;severity=null&amp;id=682d981ac4522896dcbd9369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47668-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cookiecode-cookiecode-bd935a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cookiecode%20CookieCode&amp;severity=medium&amp;id=682d981ac4522896dcbd935a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47667-cwe-352-cross-site-request-forgery-csrf-in-qusupport-liveagent-bd9354</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47667%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20qusupport%20LiveAgent&amp;severity=null&amp;id=682d981ac4522896dcbd9354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47665-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bistromatic-n360-splash-screen-bd934a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47665%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bistromatic%20N360%20%7C%20Splash%20Screen&amp;severity=null&amp;id=682d981ac4522896dcbd934a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47664-cwe-918-server-side-request-forgery-ssrf-in-thimpress-wp-pipes-bd9333</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47664%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThimPress%20WP%20Pipes&amp;severity=medium&amp;id=682d981ac4522896dcbd9333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47662-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-woobox-woobox-bd932f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woobox%20Woobox&amp;severity=medium&amp;id=682d981ac4522896dcbd932f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47661-cwe-352-cross-site-request-forgery-csrf-in-codemstory-bd932b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47661%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=null&amp;id=682d981ac4522896dcbd932b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47659-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-voidcoders-wpbakery-visual-composer-whmcs-elements-bd9327</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47659%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20voidcoders%20WPBakery%20Visual%20Composer%20WHMCS%20Elements&amp;severity=null&amp;id=682d981ac4522896dcbd9327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47657-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-productive-minds-productive-commerce-bd9323</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47657%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Productive%20Minds%20Productive%20Commerce&amp;severity=null&amp;id=682d981ac4522896dcbd9323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47656-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-spiraclethemes-spiraclethemes-site-library-bd8cdf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47656%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spiracle%20Themes%20Spiraclethemes%20Site%20Library&amp;severity=null&amp;id=682d9819c4522896dcbd8cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47655-cwe-352-cross-site-request-forgery-csrf-in-themarketer2023-themarketer-bd8c63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47655%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themarketer2023%20theMarketer&amp;severity=null&amp;id=682d9819c4522896dcbd8c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47653-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-tggfref-wp-recall-bd8bd6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47653%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20tggfref%20WP-Recall&amp;severity=high&amp;id=682d9819c4522896dcbd8bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47649-cwe-35-path-traversal-in-ilmosys-open-close-woocommerce-store-bd8bd2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47649%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20StackWC%20Open%20Close%20WooCommerce%20Store&amp;severity=null&amp;id=682d9819c4522896dcbd8bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47648-cwe-352-cross-site-request-forgery-csrf-in-axima-pays-woocommerce-payment-gateway-bd9312</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47648%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20axima%20Pays%20%E2%80%93%20WooCommerce%20Payment%20Gateway&amp;severity=null&amp;id=682d981ac4522896dcbd9312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47647-cwe-352-cross-site-request-forgery-csrf-in-otwthemes-sidebar-manager-light-bd930a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47647%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OTWthemes%20Sidebar%20Manager%20Light&amp;severity=null&amp;id=682d981ac4522896dcbd930a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47644-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-formsintegrations-integrations-of-zoho-crm-with-elementor-form-bd92fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47644%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20formsintegrations%20Integrations%20of%20Zoho%20CRM%20with%20Elementor%20form&amp;severity=null&amp;id=682d981ac4522896dcbd92fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47643-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-elextensions-elex-product-feed-for-woocommerce-bd8bce</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47643%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ELEXtensions%20ELEX%20Product%20Feed%20for%20WooCommerce&amp;severity=high&amp;id=682d9819c4522896dcbd8bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47639-cwe-352-cross-site-request-forgery-csrf-in-supertext-supertext-translation-and-proofreading-bd92f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47639%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Supertext%20Supertext%20Translation%20and%20Proofreading&amp;severity=null&amp;id=682d981ac4522896dcbd92f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47638-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sarvesh-m-rao-wp-discord-invite-bd8bca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sarvesh%20M%20Rao%20WP%20Discord%20Invite&amp;severity=null&amp;id=682d9819c4522896dcbd8bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47636-cwe-35-path-traversal-in-fernando-briano-list-category-posts-bd8bc6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47636%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Fernando%20Briano%20List%20category%20posts&amp;severity=null&amp;id=682d9819c4522896dcbd8bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47635-cwe-918-server-side-request-forgery-ssrf-in-wpwebinarsystem-webinarpress-bd92eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47635%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WPWebinarSystem%20WebinarPress&amp;severity=null&amp;id=682d981ac4522896dcbd92eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47633-cwe-352-cross-site-request-forgery-csrf-in-awin-awin-advertiser-tracking-for-woocommerce-bd8556</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47633%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Awin%20Awin%20%E2%80%93%20Advertiser%20Tracking%20for%20WooCommerce&amp;severity=null&amp;id=682d9819c4522896dcbd8556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47632-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-raihanul-islam-awesome-gallery-bd8552</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Raihanul%20Islam%20Awesome%20Gallery&amp;severity=null&amp;id=682d9819c4522896dcbd8552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47630-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-darren-cooney-ajax-load-more-bd854c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Darren%20Cooney%20Ajax%20Load%20More&amp;severity=null&amp;id=682d9819c4522896dcbd854c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47629-cwe-502-deserialization-of-untrusted-data-in-mario-peshev-wp-crm-system-bd92d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47629%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=null&amp;id=682d981ac4522896dcbd92d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47628-cwe-862-missing-authorization-in-quomodosoft-qs-dark-mode-bd8523</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47628%3A%20Missing%20Authorization%20in%20quomodosoft%20QS%20Dark%20Mode&amp;severity=null&amp;id=682d9819c4522896dcbd8523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47626-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apasionados-submission-dom-tracking-for-contact-form-7-bd851f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apasionados%20Submission%20DOM%20tracking%20for%20Contact%20Form%207&amp;severity=null&amp;id=682d9819c4522896dcbd851f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47625-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apasionados-dofollow-case-by-case-bd851b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apasionados%20DoFollow%20Case%20by%20Case&amp;severity=null&amp;id=682d9819c4522896dcbd851b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47624-cwe-352-cross-site-request-forgery-csrf-in-apasionados-dofollow-case-by-case-bd850e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47624%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20apasionados%20DoFollow%20Case%20by%20Case&amp;severity=null&amp;id=682d9819c4522896dcbd850e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47623-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-scott-paterson-easy-paypal-buy-now-button-bd84f8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Paterson%20Easy%20PayPal%20Buy%20Now%20Button&amp;severity=null&amp;id=682d9819c4522896dcbd84f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47622-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apasionados-email-notification-on-login-bd84de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47622%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apasionados%20Email%20Notification%20on%20Login&amp;severity=null&amp;id=682d9819c4522896dcbd84de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47621-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-meks-meks-flexible-shortcodes-bd84da</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Meks%20Meks%20Flexible%20Shortcodes&amp;severity=null&amp;id=682d9819c4522896dcbd84da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47620-cwe-352-cross-site-request-forgery-csrf-in-bundgaard-martins-free-monetized-ad-exchange-network-bd92d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47620%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bundgaard%20Martins%20Free%20Monetized%20Ad%20Exchange%20Network&amp;severity=null&amp;id=682d981ac4522896dcbd92d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47617-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-aharonyan-wp-front-user-submit-front-editor-bd92cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47617%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aharonyan%20WP%20Front%20User%20Submit%20%2F%20Front%20Editor&amp;severity=null&amp;id=682d981ac4522896dcbd92cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47616-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tushar-imran-ablocks-bd92c8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47616%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kodezen%20LLC%20aBlocks&amp;severity=null&amp;id=682d981ac4522896dcbd92c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47615-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-flowdee-amazon-product-in-a-post-bd92c4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flowdee%20Amazon%20Product%20in%20a%20Post&amp;severity=null&amp;id=682d981ac4522896dcbd92c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47614-cwe-352-cross-site-request-forgery-csrf-in-chris-clark-lessbuttons-social-sharing-and-statistics-bd83c8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47614%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chris%20Clark%20LessButtons%20Social%20Sharing%20and%20Statistics&amp;severity=null&amp;id=682d9818c4522896dcbd83c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47612-cwe-862-missing-authorization-in-flowdee-clickwhale-bd83c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47612%3A%20CWE-862%20Missing%20Authorization%20in%20flowdee%20ClickWhale&amp;severity=medium&amp;id=682d9818c4522896dcbd83c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47609-cwe-352-cross-site-request-forgery-csrf-in-easymebiz-easyme-connect-bd83b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47609%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20easymebiz%20EasyMe%20Connect&amp;severity=null&amp;id=682d9818c4522896dcbd83b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47607-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-appjetty-show-all-comments-bd83ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AppJetty%20Show%20All%20Comments&amp;severity=null&amp;id=682d9818c4522896dcbd83ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47606-cwe-352-cross-site-request-forgery-csrf-in-igor-benic-simple-giveaways-bd92b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47606%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Igor%20Benic%20Simple%20Giveaways&amp;severity=null&amp;id=682d981ac4522896dcbd92b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47605-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-appjetty-wp-jquery-datatable-bd92a4</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AppJetty%20WP%20jQuery%20DataTable&amp;severity=null&amp;id=682d981ac4522896dcbd92a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47604-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-data443-risk-migitation-inc-inline-related-posts-bd929c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47604%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Data443%20Risk%20Mitigation%2C%20Inc.%20Inline%20Related%20Posts&amp;severity=null&amp;id=682d981ac4522896dcbd929c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47602-cwe-862-missing-authorization-in-ammarahmad786-calculate-prices-based-on-distance-for-woocommerce-bd9294</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47602%3A%20Missing%20Authorization%20in%20ammarahmad786%20Calculate%20Prices%20based%20on%20Distance%20For%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd9294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47597-cwe-352-cross-site-request-forgery-csrf-in-maulik-vora-wp-podcasts-manager-bd928c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47597%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Maulik%20Vora%20WP%20Podcasts%20Manager&amp;severity=null&amp;id=682d981ac4522896dcbd928c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47596-cwe-352-cross-site-request-forgery-csrf-in-syed-balkhi-beacon-lead-magnets-and-lead-capture-bd9275</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47596%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Beacon%20Lead%20Magnets%20and%20Lead%20Capture&amp;severity=null&amp;id=682d981ac4522896dcbd9275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47595-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-darshan-saroya-color-your-bar-bd9271</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Darshan%20Saroya%20Color%20Your%20Bar&amp;severity=null&amp;id=682d981ac4522896dcbd9271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47594-cwe-352-cross-site-request-forgery-csrf-in-daext-soccer-live-scores-bd926d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47594%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DAEXT%20Soccer%20Live%20Scores&amp;severity=medium&amp;id=682d981ac4522896dcbd926d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47593-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jonas-hjalmarsson-really-simple-under-construction-page-bd9269</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonas%20Hjalmarsson%20Really%20Simple%20Under%20Construction%20Page&amp;severity=null&amp;id=682d981ac4522896dcbd9269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47592-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-lehel-m-tyus-legal-terms-and-conditions-popup-for-user-login-and-woocommerce-checkout-tpul-bd9265</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%C3%81rp%C3%A1d%20Lehel%20M%C3%A1tyus%20Terms%20Popup%20On%20User%20Login&amp;severity=null&amp;id=682d981ac4522896dcbd9265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47591-cwe-862-missing-authorization-in-creedally-bulk-featured-image-bd9258</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47591%3A%20Missing%20Authorization%20in%20CreedAlly%20Bulk%20Featured%20Image&amp;severity=null&amp;id=682d981ac4522896dcbd9258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47590-cwe-352-cross-site-request-forgery-csrf-in-john-dagelmore-wpspeed-bd9247</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47590%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JExtensions%20Store%20WPSpeed&amp;severity=null&amp;id=682d981ac4522896dcbd9247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47589-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-motov-net-ebook-store-bd923f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motov.net%20Ebook%20Store&amp;severity=null&amp;id=682d981ac4522896dcbd923f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47587-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-yaycommerce-yaysmtp-bd9237</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47587%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YaySMTP&amp;severity=null&amp;id=682d981ac4522896dcbd9237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47551-cwe-352-cross-site-request-forgery-csrf-in-ctltwp-wiki-embed-bd922f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47551%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ctltwp%20Wiki%20Embed&amp;severity=null&amp;id=682d981ac4522896dcbd922f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47550-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-themefic-instantio-bd7b50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47550%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themefic%20Instantio&amp;severity=null&amp;id=682d9818c4522896dcbd7b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47549-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-themefic-beaf-bd7b43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47549%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themefic%20BEAF&amp;severity=null&amp;id=682d9818c4522896dcbd7b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47548-cwe-918-server-side-request-forgery-ssrf-in-varun-dubey-wbcom-designs-activity-link-preview-for-buddypress-bd9218</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47548%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Varun%20Dubey%20Wbcom%20Designs%20-%20Activity%20Link%20Preview%20For%20BuddyPress&amp;severity=null&amp;id=682d981ac4522896dcbd9218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47547-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sendpulse-sendpulse-email-marketing-newsletter-bd920b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SendPulse%20SendPulse%20Email%20Marketing%20Newsletter&amp;severity=null&amp;id=682d981ac4522896dcbd920b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47546-cwe-352-cross-site-request-forgery-csrf-in-aresit-wp-compress-bd9203</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47546%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AresIT%20WP%20Compress&amp;severity=null&amp;id=682d981ac4522896dcbd9203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47545-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-ays-pro-poll-maker-bd91fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47545%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=682d981ac4522896dcbd91fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47544-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-acowebs-dynamic-pricing-with-discount-rules-for-woocommerce-bd91f3</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47544%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20acowebs%20Dynamic%20Pricing%20With%20Discount%20Rules%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd91f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47543-cwe-352-cross-site-request-forgery-csrf-in-themetechmount-truebooker-bd91eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47543%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themetechmount%20TrueBooker&amp;severity=null&amp;id=682d981ac4522896dcbd91eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47542-cwe-352-cross-site-request-forgery-csrf-in-michael-simple-calendar-for-elementor-bd91dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47542%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Michael%20Simple%20calendar%20for%20Elementor&amp;severity=null&amp;id=682d981ac4522896dcbd91dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47540-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-wedevs-wemail-bd91d6</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47540%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20weDevs%20weMail&amp;severity=null&amp;id=682d981ac4522896dcbd91d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47538-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-wpdever-cart-tracking-for-woocommerce-bd91d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47538%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdever%20Cart%20tracking%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd91d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47537-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-add-ons-org-pdf-invoices-for-woocommerce-drag-and-drop-template-builder-bd91c1</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47537%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20add-ons.org%20PDF%20Invoice%20Builder%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd91c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47533-cwe-352-cross-site-request-forgery-csrf-in-iqonic-design-graphina-bd91ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47533%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Iqonic%20Design%20Graphina&amp;severity=null&amp;id=682d981ac4522896dcbd91ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47531-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-xylus-themes-xt-event-widget-for-social-events-bd91a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Xylus%20Themes%20XT%20Event%20Widget%20for%20Social%20Events&amp;severity=null&amp;id=682d981ac4522896dcbd91a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47528-cwe-862-missing-authorization-in-pewilliams-ovation-elements-bd91a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47528%3A%20Missing%20Authorization%20in%20pewilliams%20Ovation%20Elements&amp;severity=null&amp;id=682d981ac4522896dcbd91a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47526-cwe-862-missing-authorization-in-gs-plugins-gs-variation-swatches-for-woocommerce-bd919c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47526%3A%20Missing%20Authorization%20in%20GS%20Plugins%20GS%20Variation%20Swatches%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd919c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47525-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boldthemes-bold-page-builder-bd9194</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=682d981ac4522896dcbd9194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47524-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-karim42-quran-multilanguage-text-audio-bd918c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karim42%20Quran%20multilanguage%20Text%20%26%20Audio&amp;severity=null&amp;id=682d981ac4522896dcbd918c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47523-cwe-352-cross-site-request-forgery-csrf-in-luk-hartmann-seznam-webmaster-bd917d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47523%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Luk%C3%A1%C5%A1%20Hartmann%20Seznam%20Webmaster&amp;severity=null&amp;id=682d981ac4522896dcbd917d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47522-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-aweos-gmbh-aweos-wp-lock-bd917b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47522%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AWEOS%20GmbH%20AWEOS%20WP%20Lock&amp;severity=null&amp;id=682d981ac4522896dcbd917b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47521-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-robosoft-robo-gallery-bd916c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery&amp;severity=null&amp;id=682d981ac4522896dcbd916c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47520-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-syed-balkhi-charitable-bd9164</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Charitable&amp;severity=null&amp;id=682d981ac4522896dcbd9164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47519-cwe-352-cross-site-request-forgery-csrf-in-scott-paterson-easy-paypal-events-bd9149</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47519%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Scott%20Paterson%20Easy%20PayPal%20Events&amp;severity=null&amp;id=682d981ac4522896dcbd9149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47518-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-scott-paterson-contact-form-7-paypal-stripe-add-on-bd9141</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Paterson%20Contact%20Form%207%20%E2%80%93%20PayPal%20%26%20Stripe%20Add-on&amp;severity=null&amp;id=682d981ac4522896dcbd9141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47517-cwe-352-cross-site-request-forgery-csrf-in-scott-paterson-accept-donations-with-paypal-bd9139</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47517%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Scott%20Paterson%20Accept%20Donations%20with%20PayPal%20%26%20Stripe&amp;severity=null&amp;id=682d981ac4522896dcbd9139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47516-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-scott-paterson-time-clock-bd9128</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Paterson%20Time%20Clock&amp;severity=null&amp;id=682d981ac4522896dcbd9128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47515-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-seb-wp-dpe-ges-bd9120</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Seb%20WP%20DPE-GES&amp;severity=null&amp;id=682d981ac4522896dcbd9120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47514-cwe-352-cross-site-request-forgery-csrf-in-eli-eli-s-related-posts-footer-links-and-widget-bd9118</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47514%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eli%20ELI&apos;s%20Related%20Posts%20Footer%20Links%20and%20Widget&amp;severity=null&amp;id=682d981ac4522896dcbd9118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47510-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-fullworks-display-eventbrite-events-bd9109</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47510%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fullworks%20Display%20Eventbrite%20Events&amp;severity=null&amp;id=682d981ac4522896dcbd9109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47509-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ajay-top-10-bd84d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47509%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Top%2010&amp;severity=null&amp;id=682d9819c4522896dcbd84d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47508-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-ruben-garcia-gamipress-bd84d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47508%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ruben%20Garcia%20GamiPress&amp;severity=null&amp;id=682d9819c4522896dcbd84d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47507-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ajay-better-search-bd8456</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47507%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Better%20Search&amp;severity=null&amp;id=682d9819c4522896dcbd8456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47506-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ajay-contextual-related-posts-bd8452</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47506%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Contextual%20Related%20Posts&amp;severity=null&amp;id=682d9819c4522896dcbd8452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47505-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-prowcplugins-product-time-countdown-for-woocommerce-bd8410</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47505%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ProWCPlugins%20Product%20Time%20Countdown%20for%20WooCommerce&amp;severity=null&amp;id=682d9819c4522896dcbd8410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47504-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-custom-checkout-fields-for-woocommerce-bd840c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47504%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Custom%20Checkout%20Fields%20for%20WooCommerce&amp;severity=null&amp;id=682d9819c4522896dcbd840c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47503-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpo-hr-ngg-smart-image-search-bd8408</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47503%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpo-HR%20NGG%20Smart%20Image%20Search&amp;severity=null&amp;id=682d9818c4522896dcbd8408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47502-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nick-mollie-forms-bd8404</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47502%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nick%20van%20Wobbie%20Mollie%20Forms&amp;severity=null&amp;id=682d9818c4522896dcbd8404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47501-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-code-atlantic-content-control-bd83fe</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47501%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Iser%20Content%20Control&amp;severity=null&amp;id=682d9818c4522896dcbd83fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47499-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jeff-starr-simple-blog-stats-bd83fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47499%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeff%20Starr%20Simple%20Blog%20Stats&amp;severity=null&amp;id=682d9818c4522896dcbd83fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47498-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-nicdark-hotel-booking-bd9544</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47498%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nicdark%20Hotel%20Booking&amp;severity=null&amp;id=682d981ac4522896dcbd9544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47497-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-themepoints-logo-showcase-bd953c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47497%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Logo%20Showcase&amp;severity=null&amp;id=682d981ac4522896dcbd953c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47496-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-publishpress-publishpress-authors-bd9534</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47496%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PublishPress%20PublishPress%20Authors&amp;severity=null&amp;id=682d981ac4522896dcbd9534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47495-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-blockspare-blockspare-bd952e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47495%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blockspare%20Blockspare&amp;severity=medium&amp;id=682d981ac4522896dcbd952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47494-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-ashan-perera-eventon-bd952a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47494%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ashan%20Perera%20EventON&amp;severity=null&amp;id=682d981ac4522896dcbd952a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47493-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ultimate-blocks-ultimate-blocks-bd9510</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47493%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ultimate%20Blocks%20Ultimate%20Blocks&amp;severity=medium&amp;id=682d981ac4522896dcbd9510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47491-cwe-352-cross-site-request-forgery-csrf-in-a-wp-life-contact-form-widget-bd8396</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47491%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20A%20WP%20Life%20Contact%20Form%20Widget&amp;severity=null&amp;id=682d9818c4522896dcbd8396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47490-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-rustaurius-ultimate-wp-mail-bd8392</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47490%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rustaurius%20Ultimate%20WP%20Mail&amp;severity=null&amp;id=682d9818c4522896dcbd8392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47489-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-markkinchin-beds24-online-booking-bd838c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47489%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markkinchin%20Beds24%20Online%20Booking&amp;severity=null&amp;id=682d9818c4522896dcbd838c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47488-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boldthemes-bold-page-builder-bd8388</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47488%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=682d9818c4522896dcbd8388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47486-cwe-862-missing-authorization-in-cyberchimps-gutenberg-elementor-templates-importer-for-responsive-bd8384</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47486%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Plus&amp;severity=null&amp;id=682d9818c4522896dcbd8384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47485-cwe-862-missing-authorization-in-cozythemes-cozy-blocks-bd8380</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47485%3A%20Missing%20Authorization%20in%20CozyThemes%20Cozy%20Blocks&amp;severity=null&amp;id=682d9818c4522896dcbd8380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47484-cwe-918-server-side-request-forgery-ssrf-in-oliver-campion-display-remote-posts-block-bd836f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47484%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Oliver%20Campion%20Display%20Remote%20Posts%20Block&amp;severity=null&amp;id=682d9818c4522896dcbd836f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47483-cwe-918-server-side-request-forgery-ssrf-in-iulia-cazan-easy-replace-image-bd83e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47483%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Iulia%20Cazan%20Easy%20Replace%20Image&amp;severity=null&amp;id=682d9818c4522896dcbd83e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47482-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sonalsinha21-skt-skill-bar-bd8360</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47482%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Skill%20Bar&amp;severity=null&amp;id=682d9818c4522896dcbd8360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47481-cwe-94-improper-control-of-generation-of-code-code-injection-in-gs-plugins-gs-testimonial-slider-bd835a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47481%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20GS%20Plugins%20GS%20Testimonial%20Slider&amp;severity=null&amp;id=682d9818c4522896dcbd835a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47480-cwe-862-missing-authorization-in-iqonic-design-graphina-bd9508</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47480%3A%20Missing%20Authorization%20in%20Iqonic%20Design%20Graphina&amp;severity=null&amp;id=682d981ac4522896dcbd9508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47476-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-add-ons-org-cost-calculator-for-elementor-bd94e9</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47476%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20add-ons.org%20Cost%20Calculator%20for%20Elementor&amp;severity=null&amp;id=682d981ac4522896dcbd94e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47475-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-artbees-jupiterx-core-bd94e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47475%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artbees%20JupiterX%20Core&amp;severity=null&amp;id=682d981ac4522896dcbd94e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47473-cwe-352-cross-site-request-forgery-csrf-in-pimwick-pw-woocommerce-bulk-edit-bd94e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47473%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pimwick%20PW%20WooCommerce%20Bulk%20Edit&amp;severity=null&amp;id=682d981ac4522896dcbd94e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47472-cwe-862-missing-authorization-in-codepeople-music-player-for-woocommerce-bd94dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47472%3A%20Missing%20Authorization%20in%20codepeople%20Music%20Player%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd94dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47471-cwe-862-missing-authorization-in-envothemes-envo-extra-bd94c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47471%3A%20Missing%20Authorization%20in%20EnvoThemes%20Envo%20Extra&amp;severity=null&amp;id=682d981ac4522896dcbd94c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47470-cwe-352-cross-site-request-forgery-csrf-in-senols-gpt3-ai-content-writer-bd94ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47470%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20senols%20GPT3%20AI%20Content%20Writer&amp;severity=null&amp;id=682d981ac4522896dcbd94ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47469-cwe-862-missing-authorization-in-slui-media-hygiene-bd94b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47469%3A%20Missing%20Authorization%20in%20slui%20Media%20Hygiene&amp;severity=null&amp;id=682d981ac4522896dcbd94b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47468-cwe-352-cross-site-request-forgery-csrf-in-hashthemes-hash-form-bd8356</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47468%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hashthemes%20Hash%20Form&amp;severity=null&amp;id=682d9818c4522896dcbd8356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47467-cwe-862-missing-authorization-in-gs-plugins-gs-testimonial-slider-bd9101</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47467%3A%20Missing%20Authorization%20in%20GS%20Plugins%20GS%20Testimonial%20Slider&amp;severity=null&amp;id=682d981ac4522896dcbd9101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47466-cwe-352-cross-site-request-forgery-csrf-in-rustaurius-ultimate-wp-mail-bd90f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47466%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rustaurius%20Ultimate%20WP%20Mail&amp;severity=null&amp;id=682d981ac4522896dcbd90f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47465-cwe-862-missing-authorization-in-creativethemes-blocksy-bd90f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47465%3A%20Missing%20Authorization%20in%20creativethemeshq%20Blocksy&amp;severity=null&amp;id=682d981ac4522896dcbd90f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47464-cwe-918-server-side-request-forgery-ssrf-in-solacewp-solace-extra-bd90d3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47464%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20solacewp%20Solace%20Extra&amp;severity=null&amp;id=682d981ac4522896dcbd90d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47462-cwe-352-cross-site-request-forgery-csrf-in-ohidul-islam-challan-bd90cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47462%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WebAppick%20Challan&amp;severity=null&amp;id=682d981ac4522896dcbd90cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47460-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-trackship-trackship-for-woocommerce-bd90c3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47460%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TrackShip%20TrackShip%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd90c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47459-cwe-352-cross-site-request-forgery-csrf-in-xpeedstudio-wp-fundraising-donation-and-crowdfunding-platform-bd90b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47459%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Roxnor%20FundEngine&amp;severity=null&amp;id=682d981ac4522896dcbd90b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47457-cwe-862-missing-authorization-in-dgamoni-locateandfilter-bd9855</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47457%3A%20Missing%20Authorization%20in%20dgamoni%20LocateAndFilter&amp;severity=null&amp;id=682d981bc4522896dcbd9855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47456-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-crm-perks-wp-gravity-forms-zendesk-bd90ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47456%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Zendesk&amp;severity=null&amp;id=682d981ac4522896dcbd90ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47455-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-crm-perks-integration-for-woocommerce-and-salesforce-bd9490</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47455%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20Integration%20for%20WooCommerce%20and%20Salesforce&amp;severity=null&amp;id=682d981ac4522896dcbd9490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47454-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-crm-perks-wp-gravity-forms-dynamics-crm-bd9488</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47454%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Dynamics%20CRM&amp;severity=null&amp;id=682d981ac4522896dcbd9488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47451-cwe-352-cross-site-request-forgery-csrf-in-silverplugins217-product-quantity-dropdown-for-woocommerce-bd9480</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47451%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20silverplugins217%20Product%20Quantity%20Dropdown%20For%20Woocommerce&amp;severity=null&amp;id=682d981ac4522896dcbd9480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47450-cwe-862-missing-authorization-in-mitchell-bennis-simple-file-list-bd9478</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47450%3A%20Missing%20Authorization%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=null&amp;id=682d981ac4522896dcbd9478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47449-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jordy-meow-meow-gallery-bd90a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jordy%20Meow%20Meow%20Gallery&amp;severity=null&amp;id=682d981ac4522896dcbd90a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47448-cwe-352-cross-site-request-forgery-csrf-in-thimpress-wp-hotel-booking-bd909c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47448%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=null&amp;id=682d981ac4522896dcbd909c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47447-cwe-352-cross-site-request-forgery-csrf-in-hossni-mubarak-cool-author-box-bd9094</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47447%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hossni%20Mubarak%20Cool%20Author%20Box&amp;severity=null&amp;id=682d981ac4522896dcbd9094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47446-cwe-352-cross-site-request-forgery-csrf-in-listamester-listamester-bd907f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47446%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20listamester%20Listamester&amp;severity=medium&amp;id=682d981ac4522896dcbd907f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47443-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpdevart-widget-countdown-bd906e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47443%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Widget%20Countdown&amp;severity=null&amp;id=682d981ac4522896dcbd906e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47442-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cc-cc-bmi-calculator-bd905f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CC%20CC%20BMI%20Calculator&amp;severity=null&amp;id=682d981ac4522896dcbd905f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47441-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-chris-reynolds-progress-bar-bd9057</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47441%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Reynolds%20Progress%20Bar&amp;severity=null&amp;id=682d981ac4522896dcbd9057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47440-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-greg-winiarski-wpadverts-bd9051</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47440%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=682d981ac4522896dcbd9051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47439-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-wp-chill-download-monitor-bd904d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47439%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Chill%20Download%20Monitor&amp;severity=null&amp;id=682d981ac4522896dcbd904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36791-vulnerability-in-linux-linux-bd988c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d981bc4522896dcbd988c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33093-cwe-260-password-in-configuration-file-in-ibm-sterling-partner-engagement-manager-bd9bb9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33093%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=high&amp;id=682d981bc4522896dcbd9bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-cyber-actors-impersonate-model-agency-in-s-85b0a71a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Cyber%20Actors%20Impersonate%20Model%20Agency%20in%20Suspected%20Espionage%20Operation&amp;severity=medium&amp;id=6842bf60182aa0cae20b29d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4104-cwe-285-improper-authorization-in-vinoth06-frontend-dashboard-bd9bfc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4104%3A%20CWE-285%20Improper%20Authorization%20in%20vinoth06%20Frontend%20Dashboard&amp;severity=critical&amp;id=682d981bc4522896dcbd9bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39361-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wproyal-royal-elementor-addons-bd9ac4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=682d981bc4522896dcbd9ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27533-cwe-789-memory-allocation-with-excessive-size-value-in-apache-software-foundation-apache-activemq-bd995f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27533%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=medium&amp;id=682d981bc4522896dcbd995f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20980-cwe-787-out-of-bounds-write-in-samsung-mobile-libsavscmn-bd8962</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20980%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20libsavscmn&amp;severity=medium&amp;id=682d9819c4522896dcbd8962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20979-cwe-787-out-of-bounds-write-in-samsung-mobile-libsavscmn-bd895e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20979%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20libsavscmn&amp;severity=high&amp;id=682d9819c4522896dcbd895e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20978-cwe-284-improper-access-control-in-samsung-mobile-penup-bd9957</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20978%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20PENUP&amp;severity=medium&amp;id=682d981bc4522896dcbd9957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20977-cwe-927-use-of-implicit-intent-for-sensitive-communication-in-samsung-mobile-samsung-notes-bd9951</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20977%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=low&amp;id=682d981bc4522896dcbd9951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20976-cwe-125-out-of-bounds-read-in-samsung-mobile-samsung-notes-bd98a5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20976%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=682d981bc4522896dcbd98a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20975-cwe-926-improper-export-of-android-application-components-in-samsung-mobile-aodservice-bd9851</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20975%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20AODService&amp;severity=medium&amp;id=682d981bc4522896dcbd9851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20974-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-samsung-mobile-packageinstallercn-bd984d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20974%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20PackageInstallerCN&amp;severity=medium&amp;id=682d981bc4522896dcbd984d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20973-cwe-287-improper-authentication-in-samsung-mobile-secure-folder-bd97f6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20973%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Secure%20Folder&amp;severity=medium&amp;id=682d981ac4522896dcbd97f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20972-cwe-925-improper-verification-of-intent-by-broadcast-receiver-in-samsung-mobile-samsung-flow-bd9771</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20972%3A%20CWE-925%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20Samsung%20Flow&amp;severity=medium&amp;id=682d981ac4522896dcbd9771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20971-cwe-20-improper-input-validation-in-samsung-mobile-samsung-flow-bd9750</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20971%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Flow&amp;severity=medium&amp;id=682d981ac4522896dcbd9750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20970-cwe-284-improper-access-control-in-samsung-mobile-bixby-vision-bd96ce</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20970%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Bixby%20Vision&amp;severity=medium&amp;id=682d981ac4522896dcbd96ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20969-cwe-20-improper-input-validation-in-samsung-mobile-samsung-gallery-bd96c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20969%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Gallery&amp;severity=medium&amp;id=682d981ac4522896dcbd96c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20968-cwe-284-improper-access-control-in-samsung-mobile-samsung-gallery-bd9607</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20968%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Gallery&amp;severity=high&amp;id=682d981ac4522896dcbd9607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20967-cwe-284-improper-access-control-in-samsung-mobile-samsung-gallery-bd9603</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20967%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Gallery&amp;severity=medium&amp;id=682d981ac4522896dcbd9603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20966-cwe-284-improper-access-control-in-samsung-mobile-samsung-gallery-bd95ff</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20966%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Gallery&amp;severity=medium&amp;id=682d981ac4522896dcbd95ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20965-cwe-280-improper-handling-of-insufficient-permissions-in-samsung-mobile-voice-wake-up-bd9469</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20965%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20in%20Samsung%20Mobile%20Voice%20wake-up&amp;severity=medium&amp;id=682d981ac4522896dcbd9469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20964-cwe-787-out-of-bounds-write-in-samsung-mobile-samsung-mobile-devices-aecc70</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20964%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682cd0fc1484d88663aecc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20963-cwe-787-out-of-bounds-write-in-samsung-mobile-samsung-mobile-devices-bd9442</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20963%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd9442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20962-cwe-285-improper-authorization-in-samsung-mobile-samsung-mobile-devices-bd943a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20962%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd943a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20961-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-samsung-mobile-samsung-mobile-devices-bd90c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20961%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd90c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20960-cwe-285-improper-authorization-in-samsung-mobile-samsung-mobile-devices-bd9045</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20960%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd9045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20959-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bd9013</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20959%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd9013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20958-cwe-925-improper-verification-of-intent-by-broadcast-receiver-in-samsung-mobile-samsung-mobile-devices-bd900f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20958%3A%20CWE-925%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd900f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20957-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bd8fa7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20957%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=682d981ac4522896dcbd8fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20956-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bd8f38</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20956%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd8f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20955-cwe-926-improper-export-of-android-application-components-in-samsung-mobile-samsung-mobile-devices-bd8ec6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20955%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd8ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20954-cwe-927-use-of-implicit-intent-for-sensitive-communication-in-samsung-mobile-samsung-mobile-devices-bd8ebe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20954%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd8ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20953-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bd8e2b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20953%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd8e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20949-cwe-35-path-traversal-39-39-in-samsung-mobile-samsung-members-bd8e27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20949%3A%20CWE-35%3A%20Path%20Traversal%3A%20%26%2339%3B...%2F...%2F%2F%26%2339%3B%20in%20Samsung%20Mobile%20Samsung%20Members&amp;severity=medium&amp;id=682d981ac4522896dcbd8e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20937-cwe-787-out-of-bounds-write-in-samsung-mobile-samsung-mobile-devices-bd895a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20937%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9819c4522896dcbd895a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0669-cwe-352-cross-site-request-forgery-csrf-in-boinc-boinc-server-bd9927</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0669%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BOINC%20BOINC%20Server&amp;severity=high&amp;id=682d981bc4522896dcbd9927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0668-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-boinc-boinc-server-bd991f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0668%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BOINC%20BOINC%20Server&amp;severity=critical&amp;id=682d981bc4522896dcbd991f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0667-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-boinc-boinc-server-bd9917</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20BOINC%20BOINC%20Server&amp;severity=high&amp;id=682d981bc4522896dcbd9917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0666-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-boinc-boinc-server-bd9911</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20BOINC%20BOINC%20Server&amp;severity=high&amp;id=682d981bc4522896dcbd9911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12120-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wproyal-royal-elementor-addons-and-templates-bd990d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=682d981bc4522896dcbd990d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4171-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ajay-wz-followed-posts-display-what-visitors-are-reading-bd9a15</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4171%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajay%20WZ%20Followed%20Posts%20%E2%80%93%20Display%20what%20visitors%20are%20reading&amp;severity=medium&amp;id=682d981bc4522896dcbd9a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32405-cwe-787-out-of-bounds-write-in-rt-labs-p-net-bd99be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32405%3A%20CWE-787%20Out-of-bounds%20Write%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd99be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32404-cwe-787-out-of-bounds-write-in-rt-labs-p-net-bd99ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32404%3A%20CWE-787%20Out-of-bounds%20Write%20in%20RT-Labs%20P-Net&amp;severity=medium&amp;id=682d981bc4522896dcbd99ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32403-cwe-787-out-of-bounds-write-in-rt-labs-p-net-bd99b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32403%3A%20CWE-787%20Out-of-bounds%20Write%20in%20RT-Labs%20P-Net&amp;severity=medium&amp;id=682d981bc4522896dcbd99b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32402-cwe-787-out-of-bounds-write-in-rt-labs-p-net-bd99b2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32402%3A%20CWE-787%20Out-of-bounds%20Write%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd99b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32401-cwe-122-heap-based-buffer-overflow-in-rt-labs-p-net-bd99ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32401%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RT-Labs%20P-Net&amp;severity=medium&amp;id=682d981bc4522896dcbd99ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32400-cwe-122-heap-based-buffer-overflow-in-rt-labs-p-net-bd99aa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32400%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd99aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32399-cwe-606-unchecked-input-for-loop-condition-in-rt-labs-p-net-bd9995</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32399%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20RT-Labs%20P-Net&amp;severity=medium&amp;id=682d981bc4522896dcbd9995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32398-cwe-476-null-pointer-dereference-in-rt-labs-p-net-bd9991</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32398%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd9991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32397-cwe-122-heap-based-buffer-overflow-in-rt-labs-p-net-bd9984</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32397%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd9984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32396-cwe-122-heap-based-buffer-overflow-in-rt-labs-p-net-bd9980</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32396%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd9980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1400-cwe-125-out-of-bounds-read-in-libplctag-libplctag-bd994d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1400%3A%20CWE-125%20Out-of-bounds%20Read%20in%20libplctag%20libplctag&amp;severity=low&amp;id=682d981bc4522896dcbd994d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1399-cwe-125-out-of-bounds-read-in-libplctag-libplctag-bd992f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1399%3A%20CWE-125%20Out-of-bounds%20Read%20in%20libplctag%20libplctag&amp;severity=low&amp;id=682d981bc4522896dcbd992f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3766-cwe-862-missing-authorization-in-webfactory-login-lockdown-protection-bd9be3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3766%3A%20CWE-862%20Missing%20Authorization%20in%20webfactory%20Login%20Lockdown%20%26%20Protection&amp;severity=medium&amp;id=682d981bc4522896dcbd9be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4054-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-msaari-relevanssi-a-better-search-bd9bf8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Relevanssi%20Relevanssi%20Premium&amp;severity=medium&amp;id=682d981bc4522896dcbd9bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4220-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xavinnydek-xavin-039-s-list-subpages-bd9c00</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4220%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xavinnydek%20Xavin%26%23039%3Bs%20List%20Subpages&amp;severity=medium&amp;id=682d981bc4522896dcbd9c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3860-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dealertrend-cardealerpress-bd99f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dealertrend%20CarDealerPress&amp;severity=medium&amp;id=682d981bc4522896dcbd99f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4055-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-josj404-multiple-post-type-order-bd9a11</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20josj404%20Multiple%20Post%20Type%20Order&amp;severity=medium&amp;id=682d981bc4522896dcbd9a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3921-cwe-285-improper-authorization-in-peprodev-peprodev-ultimate-profile-solutions-bd99f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3921%3A%20CWE-285%20Improper%20Authorization%20in%20peprodev%20PeproDev%20Ultimate%20Profile%20Solutions&amp;severity=high&amp;id=682d981bc4522896dcbd99f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3852-cwe-269-improper-privilege-management-in-eoxia-wpshop-2-e-commerce-bd99ca</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3852%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20eoxia%20WPshop%202%20%E2%80%93%20E-Commerce&amp;severity=high&amp;id=682d981bc4522896dcbd99ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4335-cwe-269-improper-privilege-management-in-n3wnormal-woocommerce-multiple-addresses-bd9a19</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4335%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20n3wnormal%20Woocommerce%20Multiple%20Addresses&amp;severity=high&amp;id=682d981bc4522896dcbd9a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3924-cwe-285-improper-authorization-in-peprodev-peprodev-ultimate-profile-solutions-bd9a01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3924%3A%20CWE-285%20Improper%20Authorization%20in%20peprodev%20PeproDev%20Ultimate%20Profile%20Solutions&amp;severity=medium&amp;id=682d981bc4522896dcbd9a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3844-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-peprodev-peprodev-ultimate-profile-solutions-bd99c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3844%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20peprodev%20PeproDev%20Ultimate%20Profile%20Solutions&amp;severity=critical&amp;id=682d981bc4522896dcbd99c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3851-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-themesgrove-download-manager-and-payment-form-wordpress-plugin-wp-smartpay-bd99c6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3851%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20themesgrove%20Download%20Manager%20and%20Payment%20Form%20WordPress%20Plugin%20%E2%80%93%20WP%20SmartPay&amp;severity=medium&amp;id=682d981bc4522896dcbd99c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2821-cwe-862-missing-authorization-in-quadlayers-search-exclude-bd996f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2821%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Search%20Exclude&amp;severity=medium&amp;id=682d981bc4522896dcbd996f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3853-cwe-639-authorization-bypass-through-user-controlled-key-in-eoxia-wpshop-2-e-commerce-bd99ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3853%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20eoxia%20WPshop%202%20%E2%80%93%20E-Commerce&amp;severity=medium&amp;id=682d981bc4522896dcbd99ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3218-cwe-295-improper-certificate-validation-in-ibm-i-bd9bdf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3218%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=682d981bc4522896dcbd9bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29152-n-a-in-n-a-bd9ab7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29152%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29153-n-a-in-n-a-bd9967</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29153%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47423-cwe-24-path-traversal-filedir-in-pwsdashboard-personal-weather-station-dashboard-bd8cdb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47423%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20pwsdashboard%20Personal%20Weather%20Station%20Dashboard&amp;severity=medium&amp;id=682d9819c4522896dcbd8cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26169-cwe-732-incorrect-permission-assignment-for-critical-resource-in-ixon-vpn-client-bd8cca</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26169%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IXON%20VPN%20Client&amp;severity=high&amp;id=682d9819c4522896dcbd8cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26168-cwe-732-incorrect-permission-assignment-for-critical-resource-in-ixon-vpn-client-bd8cc6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26168%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IXON%20VPN%20Client&amp;severity=high&amp;id=682d9819c4522896dcbd8cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29746-n-a-in-n-a-bd8548</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29746%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29602-n-a-in-n-a-bd8230</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29602%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd8230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29154-n-a-in-n-a-bd822c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29154%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd822c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45388-n-a-in-n-a-bd7af5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45388%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45514-n-a-in-n-a-bd69aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45514%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29448-n-a-in-n-a-bd699a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29448%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd699a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47203-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dropbear-ssh-project-dropbear-ssh-aeb88e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47203%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dropbear%20SSH%20Project%20Dropbear%20SSH&amp;severity=medium&amp;id=682cd0f81484d88663aeb88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-07-2a1889</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-07&amp;severity=medium&amp;id=682c7db2e8347ec82d2a1889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-07-f12bb6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0856-cwe-862-missing-authorization-in-potenza-global-solutions-pgs-core-bd9bb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0856%3A%20CWE-862%20Missing%20Authorization%20in%20Potenza%20Global%20Solutions%20PGS%20Core&amp;severity=high&amp;id=682d981bc4522896dcbd9bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0855-cwe-502-deserialization-of-untrusted-data-in-potenza-global-solutions-pgs-core-bd9bb1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0855%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Potenza%20Global%20Solutions%20PGS%20Core&amp;severity=critical&amp;id=682d981bc4522896dcbd9bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4372-use-after-free-in-google-chrome-bd89a8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4372%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d9819c4522896dcbd89a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47420-cwe-269-improper-privilege-management-in-crestron-automate-vx-bd9a0b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47420%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Crestron%20Automate%20VX&amp;severity=high&amp;id=682d981bc4522896dcbd9a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0853-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-potenza-global-solutions-pgs-core-bd9bad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0853%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Potenza%20Global%20Solutions%20PGS%20Core&amp;severity=high&amp;id=682d981bc4522896dcbd9bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47419-cwe-319-cleartext-transmission-of-sensitive-information-in-crestron-automate-vx-bd9a09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47419%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Crestron%20Automate%20VX&amp;severity=critical&amp;id=682d981bc4522896dcbd9a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cogui-phish-kit-targets-japan-with-millions-of-messages-16a085</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoGUI%20Phish%20Kit%20Targets%20Japan%20with%20Millions%20of%20Messages&amp;severity=medium&amp;id=682c992c7960f6956616a085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46573-cwe-287-improper-authentication-in-auth0-passport-wsfed-saml2-bd9758</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46573%3A%20CWE-287%3A%20Improper%20Authentication%20in%20auth0%20passport-wsfed-saml2&amp;severity=high&amp;id=682d981ac4522896dcbd9758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0649-cwe-121-in-google-tensorflow-bd9db0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0649%3A%20CWE-121%20in%20Google%20Tensorflow&amp;severity=high&amp;id=682d981bc4522896dcbd9db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46572-cwe-287-improper-authentication-in-auth0-passport-wsfed-saml2-aecc81</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46572%3A%20CWE-287%3A%20Improper%20Authentication%20in%20auth0%20passport-wsfed-saml2&amp;severity=critical&amp;id=682cd0fc1484d88663aecc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47418-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-crestron-automate-vx-bd9a05</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47418%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Crestron%20Automate%20VX&amp;severity=medium&amp;id=682d981bc4522896dcbd9a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12225-authentication-bypass-using-an-alternate-path-or-channel-bd81fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12225%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel&amp;severity=critical&amp;id=682d9818c4522896dcbd81fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47417-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-crestron-automate-vx-bd8234</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47417%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Crestron%20Automate%20VX&amp;severity=medium&amp;id=682d9818c4522896dcbd8234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-style-clickfix-attack-spoofs-indian-ministry-7b8a5642</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36-Style%20ClickFix%20Attack%20Spoofs%20Indian%20Ministry%20to%20Target%20Windows%20%26%20Linux&amp;severity=medium&amp;id=6841ec57182aa0cae2ed1ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46820-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-phpgt-dom-bda0b2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46820%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20phpgt%20Dom&amp;severity=high&amp;id=682d981bc4522896dcbda0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46816-cwe-284-improper-access-control-in-patrickhener-goshs-bd9f8d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46816%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=682d981bc4522896dcbd9f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4388-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-liferay-portal-bd9f22</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=682d981bc4522896dcbd9f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25014-cwe-1321-in-elastic-kibana-bd9d27</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25014%3A%20CWE-1321%20in%20Elastic%20Kibana&amp;severity=critical&amp;id=682d981bc4522896dcbd9d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37730-cwe-295-in-elastic-logstash-bda2ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37730%3A%20CWE-295%20in%20Elastic%20Logstash&amp;severity=medium&amp;id=682d981cc4522896dcbda2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46815-cwe-613-insufficient-session-expiration-in-zitadel-zitadel-bda280</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46815%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20zitadel%20zitadel&amp;severity=high&amp;id=682d981cc4522896dcbda280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46736-cwe-204-observable-response-discrepancy-in-umbraco-umbraco-cms-bd9f1c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46736%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=682d981bc4522896dcbd9f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46735-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-nrkno-terraform-provider-windns-bd9edd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46735%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20nrkno%20terraform-provider-windns&amp;severity=low&amp;id=682d981bc4522896dcbd9edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32022-cwe-787-out-of-bounds-write-in-troglobit-finit-bda31c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32022%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20troglobit%20finit&amp;severity=medium&amp;id=682d981cc4522896dcbda31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30165-cwe-502-deserialization-of-untrusted-data-in-vllm-project-vllm-bda304</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30165%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20vllm-project%20vllm&amp;severity=high&amp;id=682d981cc4522896dcbda304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4041-cwe-798-use-of-hard-coded-credentials-in-optigo-networks-ons-nc600-bda30c</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4041%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Optigo%20Networks%20ONS%20NC600&amp;severity=critical&amp;id=682d981cc4522896dcbda30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22476-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-dell-dell-storage-center-dell-storage-manager-bda2da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22476%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20Dell%20Storage%20Center%20-%20Dell%20Storage%20Manager&amp;severity=medium&amp;id=682d981cc4522896dcbda2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22477-cwe-287-improper-authentication-in-dell-dell-storage-center-dell-storage-manager-bd8966</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22477%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20Dell%20Storage%20Center%20-%20Dell%20Storage%20Manager&amp;severity=high&amp;id=682d9819c4522896dcbd8966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4384-cwe-298-improper-validation-of-certificate-expiration-in-arcinfo-pcvue-aec186</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4384%3A%20CWE-298%20Improper%20Validation%20of%20Certificate%20Expiration%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=682cd0fa1484d88663aec186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22478-cwe-611-improper-restriction-of-xml-external-entity-reference-in-dell-dell-storage-center-dell-storage-manager-bd8983</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22478%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20Dell%20Storage%20Center%20-%20Dell%20Storage%20Manager&amp;severity=high&amp;id=682d9819c4522896dcbd8983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22479-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-dell-dell-storage-center-dell-storage-manager-bda0f3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22479%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Dell%20Storage%20Center%20-%20Dell%20Storage%20Manager&amp;severity=low&amp;id=682d981bc4522896dcbda0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4368-buffer-overflow-in-tenda-ac8-bda4c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4368%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=682d981cc4522896dcbda4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4363-sql-injection-in-itsourcecode-gym-management-system-bda3d0</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4363%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23379-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dell-dell-storage-center-dell-storage-manager-bda442</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23379%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Dell%20Storage%20Center%20-%20Dell%20Storage%20Manager&amp;severity=low&amp;id=682d981cc4522896dcbda442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4362-sql-injection-in-itsourcecode-gym-management-system-bd9ec1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4362%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d981bc4522896dcbd9ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46814-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-rennf93-fastapi-guard-bd9e99</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46814%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20rennf93%20fastapi-guard&amp;severity=low&amp;id=682d981bc4522896dcbd9e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4374-incorrect-privilege-assignment-in-red-hat-red-hat-quay-3-bd9ec5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4374%3A%20Incorrect%20Privilege%20Assignment%20in%20Project%20Quay%20quay&amp;severity=medium&amp;id=682d981bc4522896dcbd9ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4373-buffer-underwrite-buffer-underflow-in-red-hat-red-hat-enterprise-linux-6-bda591</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4373%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)&amp;severity=medium&amp;id=682d981cc4522896dcbda591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2898-cwe-266-incorrect-privilege-assignment-in-ibm-maximo-application-suite-bd9d4b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2898%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20IBM%20Maximo%20Application%20Suite&amp;severity=high&amp;id=682d981bc4522896dcbd9d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4361-sql-injection-in-phpgurukul-company-visitor-management-system-bda61d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4361%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4360-sql-injection-in-itsourcecode-gym-management-system-bda619</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4360%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4359-sql-injection-in-itsourcecode-gym-management-system-bda79e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4359%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4358-sql-injection-in-phpgurukul-company-visitor-management-system-aec77b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4358%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4357-command-injection-in-tenda-rx3-bda730</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4357%3A%20Command%20Injection%20in%20Tenda%20RX3&amp;severity=medium&amp;id=682d981cc4522896dcbda730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4356-stack-based-buffer-overflow-in-tenda-dap-1520-bdaa71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4356%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20DAP-1520&amp;severity=high&amp;id=682d981cc4522896dcbdaa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4355-heap-based-buffer-overflow-in-tenda-dap-1520-bdaaf1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4355%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20DAP-1520&amp;severity=high&amp;id=682d981cc4522896dcbdaaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4354-stack-based-buffer-overflow-in-tenda-dap-1520-bdaac6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4354%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20DAP-1520&amp;severity=high&amp;id=682d981cc4522896dcbdaac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4353-sql-injection-in-golden-link-secondary-system-bdaac0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4353%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4352-sql-injection-in-golden-link-secondary-system-bdaaa0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4352%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaaa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4350-command-injection-in-d-link-dir-600l-bdaa96</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4350%3A%20Command%20Injection%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbdaa96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4349-command-injection-in-d-link-dir-600l-bdaa6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4349%3A%20Command%20Injection%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbdaa6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0984-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-netoloji-software-e-flow-bda9fd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0984%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Netoloji%20Software%20E-Flow&amp;severity=high&amp;id=682d981cc4522896dcbda9fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4348-buffer-overflow-in-d-link-dir-600l-bdaa5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4348%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbdaa5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lampion-is-back-with-clickfix-lures-6d7266e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lampion%20Is%20Back%20With%20ClickFix%20Lures&amp;severity=medium&amp;id=68416df7182aa0cae2d97f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40625-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-tcman-gim-bd9c0c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40625%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981bc4522896dcbd9c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40624-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-bda80b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40624%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981cc4522896dcbda80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40623-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-bda611</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40623%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981cc4522896dcbda611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40622-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-bda60d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40622%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981cc4522896dcbda60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40621-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-bda550</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40621%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981cc4522896dcbda550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40620-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-bda54c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40620%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981cc4522896dcbda54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4347-buffer-overflow-in-d-link-dir-600l-bda58d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4347%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4346-buffer-overflow-in-d-link-dir-600l-bda587</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4346%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4345-buffer-overflow-in-d-link-dir-600l-bda530</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4345%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4344-buffer-overflow-in-d-link-dir-600l-bda88f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4344%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3782-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cyclonecode-cision-block-bda803</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3782%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyclonecode%20Cision%20Block&amp;severity=medium&amp;id=682d981cc4522896dcbda803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2011-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-averta-popup-and-slider-builder-by-depicter-add-email-collecting-popup-popup-modal-coupon-popup-image-slider-carousel-slider-post-slider-carousel-bd9b48</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2011%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20averta%20Depicter%20%E2%80%94%20Popup%20%26%20Slider%20Builder&amp;severity=high&amp;id=682d981bc4522896dcbd9b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46762-cwe-73-external-control-of-file-name-or-path-in-apache-software-foundation-apache-parquet-java-bd9d4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46762%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Apache%20Software%20Foundation%20Apache%20Parquet%20Java&amp;severity=high&amp;id=682d981bc4522896dcbd9d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25052-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-openharmony-openharmony-bda68f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25052%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27241-cwe-476-null-pointer-dereference-in-openharmony-openharmony-bda653</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27241%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27248-cwe-476-null-pointer-dereference-in-openharmony-openharmony-bda5f6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27248%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22886-cwe-401-missing-release-of-memory-after-effective-lifetime-in-openharmony-openharmony-bda5e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22886%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27132-cwe-787-out-of-bounds-write-in-openharmony-openharmony-bda5e7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27132%3A%20CWE-787%20Out-of-bounds%20Write%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4343-buffer-overflow-in-d-link-dir-600l-bda615</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4343%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25218-cwe-476-null-pointer-dereference-in-openharmony-openharmony-bda4e7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25218%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21475-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-bd9d16</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21475%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21470-cwe-284-improper-access-control-in-qualcomm-inc-snapdragon-bd9d0e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21470%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21469-cwe-284-improper-access-control-in-qualcomm-inc-snapdragon-bd9d06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21469%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21468-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bd9cfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21468%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21467-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bd9cfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21467%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21462-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bd9cf6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21462%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21460-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd9ce5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21460%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21459-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-bda49f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21459%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981cc4522896dcbda49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21453-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9cdd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21453%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49847-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-bda337</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49847%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981cc4522896dcbda337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49846-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-bda40c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49846%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981cc4522896dcbda40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49845-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd9cd5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49845%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49844-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd9caf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49844%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49842-cwe-284-improper-access-control-in-qualcomm-inc-snapdragon-bd9cab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49842%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49841-cwe-390-detection-of-error-condition-without-action-in-qualcomm-inc-snapdragon-bd8ff2</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49841%3A%20CWE-390%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981ac4522896dcbd8ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49835-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bd9c9e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49835%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49830-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-qualcomm-inc-snapdragon-bd9c9a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49830%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981bc4522896dcbd9c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49829-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-qualcomm-inc-snapdragon-bd9c96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49829%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981bc4522896dcbd9c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45583-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9c92</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45583%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981bc4522896dcbd9c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45581-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bd9c8e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45581%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981bc4522896dcbd9c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45579-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd9c8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45579%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45578-cwe-129-improper-validation-of-array-index-in-qualcomm-inc-snapdragon-bd9c86</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45578%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45577-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd9c82</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45577%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45576-cwe-129-improper-validation-of-array-index-in-qualcomm-inc-snapdragon-bd9c65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45576%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45575-cwe-190-integer-overflow-or-wraparound-in-qualcomm-inc-snapdragon-bd9c61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45575%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45574-cwe-129-improper-validation-of-array-index-in-qualcomm-inc-snapdragon-bd9c5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45574%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45570-cwe-823-use-of-out-of-range-pointer-offset-in-qualcomm-inc-snapdragon-bdaa7e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45570%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981cc4522896dcbdaa7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45568-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-bd9c59</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45568%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981bc4522896dcbd9c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45567-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9c55</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45567%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45566-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9c48</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45566%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45565-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-qualcomm-inc-snapdragon-bd9c44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45565%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45564-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9c40</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45564%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45563-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bda9a4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45563%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981cc4522896dcbda9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45562-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bda99c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45562%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981cc4522896dcbda99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45554-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9c2f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45554%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4342-buffer-overflow-in-d-link-dir-600l-bda9f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4342%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4341-command-injection-in-d-link-dir-880l-bda9ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4341%3A%20Command%20Injection%20in%20D-Link%20DIR-880L&amp;severity=medium&amp;id=682d981cc4522896dcbda9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3020-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wiesemann-theis-erp-gateway-12x-digital-input-6x-digital-relais-bda923</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3020%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wiesemann%20%26%20Theis%20ERP-Gateway%2012x%20Digital%20Input%2C%206x%20Digital%20Relais&amp;severity=medium&amp;id=682d981cc4522896dcbda923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4340-command-injection-in-d-link-dir-890l-bda994</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4340%3A%20Command%20Injection%20in%20D-Link%20DIR-890L&amp;severity=medium&amp;id=682d981cc4522896dcbda994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4333-unrestricted-upload-in-feng-ha-ha-ssm-erp-bda98c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4333%3A%20Unrestricted%20Upload%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=682d981cc4522896dcbda98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4332-sql-injection-in-phpgurukul-company-visitor-management-system-bda964</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4332%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4331-sql-injection-in-sourcecodester-online-student-clearance-system-aeb08a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4331%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682cd0f71484d88663aeb08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3281-cwe-639-authorization-bypass-through-user-controlled-key-in-wpeverest-user-registration-membership-custom-registration-form-login-form-and-user-profile-bdaa82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3281%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=682d981cc4522896dcbdaa82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46593-cwe-264-permissions-privileges-and-access-controls-in-huawei-harmonyos-bdaa8e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46593%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbdaa8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46592-cwe-476-null-pointer-dereference-in-huawei-harmonyos-bdaa86</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46592%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbdaa86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46591-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-huawei-harmonyos-bdaa18</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46591%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbdaa18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46590-cwe-287-improper-authentication-in-huawei-harmonyos-bdaa14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46590%3A%20CWE-287%20Improper%20Authentication%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbdaa14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46589-cwe-199-information-management-errors-in-huawei-harmonyos-bda943</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46589%3A%20CWE-284%20Improper%20Access%20Control%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbda943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46588-cwe-199-information-management-errors-in-huawei-harmonyos-bda914</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46588%3A%20CWE-284%20Improper%20Access%20Control%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbda914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58252-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-huawei-harmonyos-bda8e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58252%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbda8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46587-cwe-264-permissions-privileges-and-access-controls-in-huawei-harmonyos-bda8f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46587%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbda8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46586-cwe-264-permissions-privileges-and-access-controls-in-huawei-harmonyos-bda8d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46586%3A%20CWE-862%20Missing%20Authorization%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbda8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46585-cwe-787-out-of-bounds-write-in-huawei-harmonyos-bda8cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46585%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d981cc4522896dcbda8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46584-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-huawei-harmonyos-bda8ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46584%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d981cc4522896dcbda8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4329-path-traversal-in-74cms-bda8dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4329%3A%20Path%20Traversal%20in%2074CMS&amp;severity=medium&amp;id=682d981cc4522896dcbda8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4328-open-redirect-in-fp2952-spring-cloud-base-bda885</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4328%3A%20Open%20Redirect%20in%20fp2952%20spring-cloud-base&amp;severity=medium&amp;id=682d981cc4522896dcbda885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4327-cross-site-request-forgery-in-mrcms-bda881</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4327%3A%20Cross-Site%20Request%20Forgery%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbda881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4326-cross-site-scripting-in-mrcms-bda9d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4326%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbda9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4325-cross-site-scripting-in-mrcms-bda9ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4325%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbda9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4324-cross-site-scripting-in-mrcms-bda953</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4324%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbda953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4323-cross-site-scripting-in-mrcms-bda94b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4323%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbda94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4314-sql-injection-in-sourcecodester-advanced-web-store-bda8d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4314%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20Web%20Store&amp;severity=medium&amp;id=682d981cc4522896dcbda8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4313-sql-injection-in-sourcecodester-advanced-web-store-bda728</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4313%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20Web%20Store&amp;severity=medium&amp;id=682d981cc4522896dcbda728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2802-cwe-94-improper-control-of-generation-of-code-code-injection-in-layoutboxx-layoutboxx-bda7fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2802%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20layoutboxx%20LayoutBoxx&amp;severity=high&amp;id=682d981cc4522896dcbda7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4337-cwe-352-cross-site-request-forgery-csrf-in-mitchelllevy-ahathat-plugin-bda88b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4337%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mitchelllevy%20AHAthat%20Plugin&amp;severity=medium&amp;id=682d981cc4522896dcbda88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4312-sql-injection-in-sourcecodester-advanced-web-store-bda87d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4312%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20Web%20Store&amp;severity=medium&amp;id=682d981cc4522896dcbda87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4311-sql-injection-in-itsourcecode-content-management-system-bda864</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4311%3A%20SQL%20Injection%20in%20itsourcecode%20Content%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4310-unrestricted-upload-in-itsourcecode-content-management-system-bda860</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4310%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Content%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4309-sql-injection-in-phpgurukul-art-gallery-management-system-bda6a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4309%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4308-sql-injection-in-phpgurukul-art-gallery-management-system-bdaa54</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4308%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaa54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4307-sql-injection-in-phpgurukul-art-gallery-management-system-bdacdd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4307%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdacdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4306-sql-injection-in-phpgurukul-nipah-virus-testing-management-system-bdacd9</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4306%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdacd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3609-cwe-863-incorrect-authorization-in-pixel-prime-reales-wp-stpt-bdac7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3609%3A%20CWE-863%20Incorrect%20Authorization%20in%20pixel_prime%20Reales%20WP%20STPT&amp;severity=medium&amp;id=682d981cc4522896dcbdac7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3610-cwe-639-authorization-bypass-through-user-controlled-key-in-pixel-prime-reales-wp-stpt-bdac84</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3610%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pixel_prime%20Reales%20WP%20STPT&amp;severity=high&amp;id=682d981cc4522896dcbdac84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4305-unrestricted-upload-in-kefaming-mayi-bdacd5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4305%3A%20Unrestricted%20Upload%20in%20kefaming%20mayi&amp;severity=medium&amp;id=682d981cc4522896dcbdacd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4304-sql-injection-in-phpgurukul-cyber-cafe-management-system-bdaccf</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4304%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39442-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc7731e-sc9832e-sc9863a-t310-t606-t612-t616-t610-t618-t750-t765-t760-t770-t820-s8000-t8300-t9300-bdac6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39442%3A%20cwe-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=682d981cc4522896dcbdac6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4303-sql-injection-in-phpgurukul-human-metapneumovirus-testing-management-system-bdacc2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4303%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdacc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2509-memory-corruption-in-google-chromeos-bd8085</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2509%3A%20Memory%20Corruption%20in%20Google%20ChromeOS&amp;severity=high&amp;id=682d9818c4522896dcbd8085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46728-cwe-400-uncontrolled-resource-consumption-in-yhirose-cpp-httplib-bdac8c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46728%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=682d981cc4522896dcbdac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4301-sql-injection-in-itsourcecode-content-management-system-bdaa33</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4301%3A%20SQL%20Injection%20in%20itsourcecode%20Content%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4300-sql-injection-in-itsourcecode-content-management-system-bdaa2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4300%3A%20SQL%20Injection%20in%20itsourcecode%20Content%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaa2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4299-buffer-overflow-in-tenda-ac1206-bdaa29</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4299%3A%20Buffer%20Overflow%20in%20Tenda%20AC1206&amp;severity=high&amp;id=682d981cc4522896dcbdaa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casdoor-19010-cross-site-request-forgery-csrf-3f563af4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casdoor%201.901.0%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=68489e217e6d765d51d53fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grokability-snipe-it-804-insecure-direct-object-re-5b4347f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grokability%20Snipe-IT%208.0.4%20-%20Insecure%20Direct%20Object%20Reference%20(IDOR)&amp;severity=medium&amp;id=68489e1b7e6d765d51d53eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/erpnext-14821-account-takeover-via-cross-site-requ-3abf1c3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ERPNext%2014.82.1%20-%20Account%20Takeover%20via%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=68489e157e6d765d51d53e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-06-ccbbd8f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-06&amp;severity=medium&amp;id=68367c97182aa0cae231c77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45487-n-a-in-n-a-bd9e7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45487%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45492-n-a-in-n-a-bd9e5a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45492%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45490-n-a-in-n-a-bd9e2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45490%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45489-n-a-in-n-a-bd9e2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45489%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45488-n-a-in-n-a-bd9e25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45488%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47256-cwe-191-integer-underflow-wrap-or-wraparound-in-libxmp-libxmp-bd9dd8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47256%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Libxmp%20Libxmp&amp;severity=medium&amp;id=682d981bc4522896dcbd9dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45250-n-a-in-n-a-bd9dd2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45250%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44900-n-a-in-n-a-bd9dce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44900%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26262-n-a-in-n-a-bd9dc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26262%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44073-n-a-in-n-a-bd9c04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44073%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45491-n-a-in-n-a-bd9bf4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45491%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44899-n-a-in-n-a-bd9be7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44899%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33770-n-a-in-n-a-bd81f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33770%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd81f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-06-73db44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-06&amp;severity=medium&amp;id=682c7ab8e3e6de8ceb73db44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-06-f12ebb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4298-buffer-overflow-in-tenda-ac1206-bdacb5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4298%3A%20Buffer%20Overflow%20in%20Tenda%20AC1206&amp;severity=high&amp;id=682d981cc4522896dcbdacb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4297-sql-injection-in-phpgurukul-men-salon-management-system-bdacb1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4297%3A%20SQL%20Injection%20in%20PHPGurukul%20Men%20Salon%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdacb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4293-cross-site-scripting-in-mrcms-bdacad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4293%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbdacad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4292-cross-site-scripting-in-mrcms-bdaca9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4292%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbdaca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4291-unrestricted-upload-in-ideacms-bdaca5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4291%3A%20Unrestricted%20Upload%20in%20IdeaCMS&amp;severity=medium&amp;id=682d981cc4522896dcbdaca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4290-buffer-overflow-in-pcman-ftp-server-bdac65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4290%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbdac65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4289-buffer-overflow-in-pcman-ftp-server-bdac5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4289%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbdac5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1493-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-ibm-db2-for-linux-unix-and-windows-aeba5b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1493%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=682cd0f91484d88663aeba5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0915-cwe-770-allocation-of-resources-without-limits-or-throttling-in-ibm-db2-for-linux-unix-and-windows-bdabdb</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0915%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=682d981cc4522896dcbdabdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1000-cwe-770-allocation-of-resources-without-limits-or-throttling-in-ibm-db2-for-linux-unix-and-windows-bdabe5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1000%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=682d981cc4522896dcbdabe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4288-buffer-overflow-in-pcman-ftp-server-bdaa25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4288%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbdaa25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46813-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bda9b9</loc>
    <lastmod>2026-04-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46813%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d981cc4522896dcbda9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4287-denial-of-service-in-pytorch-bda9cc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4287%3A%20Denial%20of%20Service%20in%20PyTorch&amp;severity=medium&amp;id=682d981cc4522896dcbda9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46734-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-thephpleague-commonmark-bda9b5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46734%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thephpleague%20commonmark&amp;severity=medium&amp;id=682d981cc4522896dcbda9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1909-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-buddyboss-buddyboss-platform-pro-bdadae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1909%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20BuddyBoss%20BuddyBoss%20Platform%20Pro&amp;severity=critical&amp;id=682d981dc4522896dcbdadae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46731-cwe-1336-improper-neutralization-of-special-elements-used-in-a-template-engine-in-craftcms-cms-bdadd5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46731%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=high&amp;id=682d981dc4522896dcbdadd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46730-cwe-409-improper-handling-of-highly-compressed-data-data-amplification-in-mobsf-mobile-security-framework-mobsf-bdadcd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46730%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=medium&amp;id=682d981dc4522896dcbdadcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4286-unprotected-storage-of-credentials-in-intelbras-incontrol-bdaddd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4286%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Intelbras%20InControl&amp;severity=medium&amp;id=682d981dc4522896dcbdaddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46726-cwe-611-improper-restriction-of-xml-external-entity-reference-in-langroid-langroid-bdadb4</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46726%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20langroid%20langroid&amp;severity=high&amp;id=682d981dc4522896dcbdadb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42213-cwe-531-inclusion-of-sensitive-information-in-test-code-in-hcl-software-hcl-bigfix-compliance-bdae55</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42213%3A%20CWE-531%20Inclusion%20of%20Sensitive%20Information%20in%20Test%20Code%20in%20HCL%20Software%20HCL%20BigFix%20Compliance&amp;severity=medium&amp;id=682d981dc4522896dcbdae55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46720-cwe-203-observable-discrepancy-in-keystonejs-keystone-bdae83</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46720%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20keystonejs%20keystone&amp;severity=low&amp;id=682d981dc4522896dcbdae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46719-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-open-webui-open-webui-bdae5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46719%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20open-webui%20open-webui&amp;severity=medium&amp;id=682d981dc4522896dcbdae5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46571-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-open-webui-open-webui-bdae76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46571%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20open-webui%20open-webui&amp;severity=medium&amp;id=682d981dc4522896dcbdae76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42212-cwe-1275-sensitive-cookie-with-improper-samesite-attribute-in-hcl-software-hcl-bigfix-compliance-bdae4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42212%3A%20CWE-1275%20%20Sensitive%20Cookie%20with%20Improper%20SameSite%20Attribute%20in%20HCL%20Software%20HCL%20BigFix%20Compliance&amp;severity=medium&amp;id=682d981dc4522896dcbdae4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46559-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-misskey-dev-misskey-bdaf20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46559%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20misskey-dev%20misskey&amp;severity=medium&amp;id=682d981dc4522896dcbdaf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46340-cwe-20-improper-input-validation-in-misskey-dev-misskey-bdaf1c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46340%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20misskey-dev%20misskey&amp;severity=high&amp;id=682d981dc4522896dcbdaf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4283-sql-injection-in-sourcecodester-stock-management-system-bdaedd</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4283%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682d981dc4522896dcbdaedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46553-cwe-693-protection-mechanism-failure-in-misskey-dev-summaly-bdaed9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46553%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20misskey-dev%20summaly&amp;severity=low&amp;id=682d981dc4522896dcbdaed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46335-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mobsf-mobile-security-framework-mobsf-bdaf30</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46335%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=high&amp;id=682d981dc4522896dcbdaf30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4279-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-muromuro-external-image-replace-bdaf34</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4279%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20muromuro%20External%20image%20replace&amp;severity=high&amp;id=682d981dc4522896dcbdaf34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43852-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaed5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43852%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43851-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaed1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43851%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43850-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaecd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43850%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43849-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaec9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43849%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4318-cwe-95-improper-neutralization-of-directives-in-dynamically-evaluated-code-eval-injection-in-amazon-amplify-studio-bdae87</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4318%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Amazon%20Amplify%20Studio&amp;severity=critical&amp;id=682d981dc4522896dcbdae87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4052-inappropriate-implementation-in-google-chrome-bda9bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4052%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=critical&amp;id=682d981cc4522896dcbda9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4051-insufficient-data-validation-in-google-chrome-bda0f7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4051%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=medium&amp;id=682d981bc4522896dcbda0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4050-out-of-bounds-memory-access-in-google-chrome-bdac44</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4050%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981cc4522896dcbdac44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4096-heap-buffer-overflow-in-google-chrome-bdac55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4096%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981cc4522896dcbdac55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4282-cross-site-request-forgery-in-sourcecodester-stock-management-system-bdae65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4282%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682d981dc4522896dcbdae65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43848-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdafd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43848%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdafd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43847-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaf2c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43847%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43846-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaf28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43846%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaf28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43845-cwe-94-improper-control-of-generation-of-code-code-injection-in-rvc-project-retrieval-based-voice-conversion-webui-bdaf24</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43845%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43844-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-rvc-project-retrieval-based-voice-conversion-webui-bda753</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43844%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981cc4522896dcbda753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43843-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-rvc-project-retrieval-based-voice-conversion-webui-bdb09e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43843%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdb09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43842-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-rvc-project-retrieval-based-voice-conversion-webui-bdb09a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43842%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdb09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24977-cwe-94-improper-control-of-generation-of-code-code-injection-in-opencti-platform-opencti-bdb028</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24977%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenCTI-Platform%20opencti&amp;severity=critical&amp;id=682d981dc4522896dcbdb028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51991-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-octobercms-october-bdb00b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51991%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20octobercms%20october&amp;severity=low&amp;id=682d981dc4522896dcbdb00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0217-cwe-287-improper-authentication-in-beyondtrust-privileged-remote-access-bdb0de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0217%3A%20CWE-287%20Improper%20Authentication%20in%20BeyondTrust%20Privileged%20Remote%20Access&amp;severity=high&amp;id=682d981dc4522896dcbdb0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1992-cwe-401-missing-release-of-memory-after-effective-lifetime-in-ibm-db2-for-linux-unix-and-windows-bdb0e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1992%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=682d981dc4522896dcbdb0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11615-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-themekalia-envolve-plugin-bdbd55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11615%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThemeKalia%20Envolve%20Plugin&amp;severity=medium&amp;id=682d981ec4522896dcbdbd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4281-information-disclosure-in-shenzhen-sixun-software-sixun-shanghui-group-business-management-system-bdc032</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4281%3A%20Information%20Disclosure%20in%20Shenzhen%20Sixun%20Software%20Sixun%20Shanghui%20Group%20Business%20Management%20System&amp;severity=medium&amp;id=682d981ec4522896dcbdc032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58237-vulnerability-in-linux-linux-bd7b94</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58237%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58100-vulnerability-in-linux-linux-bd7b8c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58098-vulnerability-in-linux-linux-bd7b71</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4316-cwe-284-improper-access-control-in-devolutions-server-aecb4f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4316%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=682cd0fc1484d88663aecb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2545-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-best-practical-solutions-request-tracker-bdcc78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2545%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Best%20Practical%20Solutions%20Request%20Tracker&amp;severity=low&amp;id=682d981fc4522896dcbdcc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4272-uncontrolled-search-path-in-mechrevo-control-console-bdcc74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4272%3A%20Uncontrolled%20Search%20Path%20in%20Mechrevo%20Control%20Console&amp;severity=high&amp;id=682d981fc4522896dcbdcc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2905-cwe-611-improper-restriction-of-xml-external-entity-reference-in-wso2-wso2-api-manager-bdcc5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2905%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=682d981fc4522896dcbdcc5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4271-information-disclosure-in-totolink-a720r-bdcbe5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4271%3A%20Information%20Disclosure%20in%20TOTOLINK%20A720R&amp;severity=medium&amp;id=682d981fc4522896dcbdcbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4270-information-disclosure-in-totolink-a720r-bdcbba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4270%3A%20Information%20Disclosure%20in%20TOTOLINK%20A720R&amp;severity=medium&amp;id=682d981fc4522896dcbdcbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4269-improper-access-controls-in-totolink-a720r-bdcbb6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4269%3A%20Improper%20Access%20Controls%20in%20TOTOLINK%20A720R&amp;severity=medium&amp;id=682d981fc4522896dcbdcbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4268-missing-authentication-in-totolink-a720r-bdcafd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4268%3A%20Missing%20Authentication%20in%20TOTOLINK%20A720R&amp;severity=medium&amp;id=682d981fc4522896dcbdcafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39363-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-alphaefficiencyteam-custom-login-and-registration-bdcaf5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AlphaEfficiencyTeam%20Custom%20Login%20and%20Registration&amp;severity=medium&amp;id=682d981fc4522896dcbdcaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4267-sql-injection-in-sourcecodester-stock-management-system-bdcaf9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4267%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdcaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3583-cwe-79-cross-site-scripting-xss-in-unknown-newsletter-bdca3b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3583%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Newsletter&amp;severity=low&amp;id=682d981fc4522896dcbdca3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4266-sql-injection-in-phpgurukul-notice-board-system-bdca59</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4266%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdca59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4265-sql-injection-in-phpgurukul-emergency-ambulance-hiring-portal-bdca55</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4265%3A%20SQL%20Injection%20in%20PHPGurukul%20Emergency%20Ambulance%20Hiring%20Portal&amp;severity=medium&amp;id=682d981fc4522896dcbdca55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4264-sql-injection-in-phpgurukul-emergency-ambulance-hiring-portal-bdc980</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4264%3A%20SQL%20Injection%20in%20PHPGurukul%20Emergency%20Ambulance%20Hiring%20Portal&amp;severity=medium&amp;id=682d981fc4522896dcbdc980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4263-sql-injection-in-phpgurukul-online-dj-booking-management-system-bdc877</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4263%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20DJ%20Booking%20Management%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4262-sql-injection-in-phpgurukul-online-dj-booking-management-system-bdc847</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4262%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20DJ%20Booking%20Management%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4261-code-injection-in-gair-nlp-factool-bdc7cf</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4261%3A%20Code%20Injection%20in%20GAIR-NLP%20factool&amp;severity=medium&amp;id=682d981fc4522896dcbdc7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20665-cwe-538-file-and-directory-information-exposure-in-mediatek-inc-mt6580-mt6761-mt6765-mt6768-mt6779-mt6781-mt6785-mt6789-mt6833-mt6835-mt6853-mt6855-mt6873-mt6877-mt6879-mt6883-mt6885-mt6886-mt6889-mt6893-mt6895-mt6983-mt6985-mt8175-mt8195-mt8196-mt8321-mt8365-mt8370-mt8385-mt8390-mt8395-mt8666-mt8667-mt8673-mt8678-mt8765-mt8766-mt8768-mt8771-mt8775-mt8781-mt8786-mt8788-mt8788e-mt8789-mt8791t-mt8795t-mt8796-mt8797-mt8798-mt8893-bd6a2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20665%3A%20CWE-538%20File%20and%20Directory%20Information%20Exposure%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8175%2C%20MT8195%2C%20MT8196%2C%20MT8321%2C%20MT8365%2C%20MT8370%2C%20MT8385%2C%20MT8390%2C%20MT8395%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8775%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8789%2C%20MT8791T%2C%20MT8795T%2C%20MT8796%2C%20MT8797%2C%20MT8798%2C%20MT8893&amp;severity=medium&amp;id=682d9816c4522896dcbd6a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20670-cwe-295-improper-certificate-validation-in-mediatek-inc-mt2737-mt6813-mt6835-mt6835t-mt6878-mt6878m-mt6879-mt6886-mt6895-mt6895tt-mt6896-mt6897-mt6899-mt6980-mt6980d-mt6983-mt6983t-mt6985-mt6985t-mt6989-mt6989t-mt6990-mt6991-mt8666-mt8667-mt8673-mt8675-mt8676-mt8678-mt8765-mt8766-mt8768-mt8771-mt8781-mt8786-mt8788-mt8788e-mt8789-mt8791-mt8791t-mt8795t-mt8797-mt8798-bd6a79</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20670%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6813%2C%20MT6835%2C%20MT6835T%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6886%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d9816c4522896dcbd6a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20668-cwe-787-out-of-bounds-write-in-mediatek-inc-mt6878-mt6897-mt6899-mt6989-mt6991-mt8775-mt8796-bd97e1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20668%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6878%2C%20MT6897%2C%20MT6899%2C%20MT6989%2C%20MT6991%2C%20MT8775%2C%20MT8796&amp;severity=medium&amp;id=682d981ac4522896dcbd97e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20671-cwe-787-out-of-bounds-write-in-mediatek-inc-mt2718-mt6878-mt6897-mt6899-mt6989-mt6991-mt8196-mt8391-mt8676-mt8678-bd97a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20671%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6878%2C%20MT6897%2C%20MT6899%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8391%2C%20MT8676%2C%20MT8678&amp;severity=medium&amp;id=682d981ac4522896dcbd97a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20667-cwe-326-inadequate-encryption-strength-in-mediatek-inc-mt2735-mt2737-mt6739-mt6761-mt6762-mt6762d-mt6762m-mt6763-mt6765-mt6765t-mt6767-mt6768-mt6769-mt6769k-mt6769s-mt6769t-mt6769z-mt6771-mt6779-mt6781-mt6783-mt6785-mt6785t-mt6785u-mt6789-mt6813-mt6833-mt6833p-mt6835-mt6835t-mt6853-mt6853t-mt6855-mt6855t-mt6873-mt6875-mt6875t-mt6877-mt6877t-mt6877tt-mt6878-mt6878m-mt6879-mt6880-mt6883-mt6885-mt6886-mt6889-mt6890-mt6891-mt6893-mt6895-mt6895tt-mt6896-mt6897-mt6899-mt6980-mt6980d-mt6983-mt6983t-mt6985-mt6985t-mt6989-mt6989t-mt6990-mt6991-mt8666-mt8667-mt8675-mt8676-mt8765-mt8766-mt8768-mt8771-mt8781-mt8786-mt8788-mt8788e-mt8789-mt8791-mt8791t-mt8797-bd6ac3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20667%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6785U%2C%20MT6789%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8675%2C%20MT8676%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=682d9816c4522896dcbd6ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20666-cwe-617-reachable-assertion-in-mediatek-inc-mt2735-mt6833-mt6833p-mt6853-mt6853t-mt6855-mt6855t-mt6873-mt6875-mt6875t-mt6877-mt6877t-mt6877tt-mt6880-mt6883-mt6885-mt6889-mt6890-mt6891-mt6893-mt8666-mt8667-mt8673-mt8675-mt8771-mt8791-mt8791t-mt8795t-mt8797-mt8798-bd6a75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20666%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d9816c4522896dcbd6a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4260-deserialization-in-zhangyanbo2007-youkefu-bdcae3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4260%3A%20Deserialization%20in%20zhangyanbo2007%20youkefu&amp;severity=medium&amp;id=682d981fc4522896dcbdcae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4259-unrestricted-upload-in-newbee-mall-bdcadf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4259%3A%20Unrestricted%20Upload%20in%20newbee-mall&amp;severity=medium&amp;id=682d981fc4522896dcbdcadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4258-unrestricted-upload-in-zhangyanbo2007-youkefu-bdcabb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4258%3A%20Unrestricted%20Upload%20in%20zhangyanbo2007%20youkefu&amp;severity=medium&amp;id=682d981fc4522896dcbdcabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4273-bdcc97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4273&amp;severity=low&amp;id=682d9820c4522896dcbdcc97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4257-cross-site-scripting-in-seacms-bd870f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4257%3A%20Cross%20Site%20Scripting%20in%20SeaCMS&amp;severity=medium&amp;id=682d9819c4522896dcbd870f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4256-cross-site-scripting-in-seacms-bdca0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4256%3A%20Cross%20Site%20Scripting%20in%20SeaCMS&amp;severity=medium&amp;id=682d981fc4522896dcbdca0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4255-buffer-overflow-in-pcman-ftp-server-bda85c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4255%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45042-n-a-in-n-a-bdc78f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45042%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27921-n-a-in-n-a-bdc685</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27921%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45322-n-a-in-n-a-bdc4ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45322%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45321-n-a-in-n-a-bdc4e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45321%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57232-n-a-in-n-a-bdb0da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57232%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57231-n-a-in-n-a-bdb0bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57231%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57229-n-a-in-n-a-bdb0b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57229%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45242-n-a-in-n-a-bdb0b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45242%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45240-n-a-in-n-a-bdb0a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45240%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57235-n-a-in-n-a-bdb089</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57235%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26241-n-a-in-n-a-bdb085</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26241%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25504-n-a-in-n-a-bdb081</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25504%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57234-n-a-in-n-a-bdb06a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57234%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57233-n-a-in-n-a-bdb066</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57233%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57230-n-a-in-n-a-bdb062</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57230%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47268-cwe-190-integer-overflow-or-wraparound-in-iputils-iputils-bdacf2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47268%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20iputils%20iputils&amp;severity=medium&amp;id=682d981cc4522896dcbdacf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45618-n-a-in-n-a-bdac3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45618%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbdac3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45617-n-a-in-n-a-bdac34</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45617%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbdac34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45616-n-a-in-n-a-bdac16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45616%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbdac16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45615-n-a-in-n-a-bdac12</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45615%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbdac12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45614-n-a-in-n-a-bdac0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45614%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbdac0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45237-n-a-in-n-a-bdac0a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45237%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbdac0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45236-n-a-in-n-a-bdac06</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45236%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbdac06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44074-n-a-in-n-a-bdac02</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44074%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbdac02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44072-n-a-in-n-a-bdabfe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44072%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbdabfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44071-n-a-in-n-a-bdabed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44071%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbdabed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45613-n-a-in-n-a-bdaa05</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45613%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbdaa05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45612-n-a-in-n-a-bda93b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45612%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45611-n-a-in-n-a-bda933</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45611%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45610-n-a-in-n-a-bda92b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45610%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45609-n-a-in-n-a-bda927</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45609%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45608-n-a-in-n-a-bda8ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45608%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45607-n-a-in-n-a-bda8e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45607%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda8e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29573-n-a-in-n-a-bda8e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29573%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45238-n-a-in-n-a-bda8aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45238%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45320-n-a-in-n-a-bd9b4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45320%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45751-n-a-in-n-a-bd8fda</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45751%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ac4522896dcbd8fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28168-cwe-602-client-side-enforcement-of-server-side-security-in-multi-uploaders-multiple-file-upload-bd8331</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28168%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Multi%20Uploaders%20Multiple%20File%20Upload&amp;severity=medium&amp;id=682d9818c4522896dcbd8331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45239-n-a-in-n-a-aecc9e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45239%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fc1484d88663aecc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28062-n-a-in-n-a-aecc8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28062%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fc1484d88663aecc8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43915-n-a-in-n-a-aeb6e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43915%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-05-2a20de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-05&amp;severity=medium&amp;id=682c7db2e8347ec82d2a20de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-05-f11fc7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4254-buffer-overflow-in-pcman-ftp-server-bda858</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4254%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4253-buffer-overflow-in-pcman-ftp-server-bda854</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4253%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4252-buffer-overflow-in-pcman-ftp-server-bda850</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4252%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4251-buffer-overflow-in-pcman-ftp-server-bda843</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4251%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4250-sql-injection-in-code-projects-nero-social-networking-site-bda8d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4250%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=682d981cc4522896dcbda8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4249-sql-injection-in-phpgurukul-e-diary-management-system-bda83f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4249%3A%20SQL%20Injection%20in%20PHPGurukul%20e-Diary%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4248-sql-injection-in-sourcecodester-simple-to-do-list-system-bdc9f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4248%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20To-Do%20List%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4247-sql-injection-in-sourcecodester-simple-to-do-list-system-bdc9eb</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4247%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20To-Do%20List%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-04-ea6d35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-04&amp;severity=medium&amp;id=682b7baad3ddd8cef2ea6d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-04-f12c76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4244-sql-injection-in-code-projects-online-bus-reservation-system-bdc9e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4244%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bus%20Reservation%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4243-sql-injection-in-code-projects-online-bus-reservation-system-bdc96f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4243%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bus%20Reservation%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4242-sql-injection-in-phpgurukul-online-birth-certificate-system-bda82e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4242%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1838-cwe-602-client-side-enforcement-of-server-side-security-in-ibm-cloud-pak-for-business-automation-bdc931</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1838%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=682d981fc4522896dcbdc931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4241-sql-injection-in-phpgurukul-teacher-subject-allocation-management-system-bda826</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4241%3A%20SQL%20Injection%20in%20PHPGurukul%20Teacher%20Subject%20Allocation%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4240-buffer-overflow-in-pcman-ftp-server-bda79a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4240%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4239-buffer-overflow-in-pcman-ftp-server-bda796</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4239%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1495-cwe-306-missing-authentication-for-critical-function-in-ibm-ibm-business-automation-workflow-bdc92d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1495%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20IBM%20IBM%20Business%20Automation%20Workflow&amp;severity=medium&amp;id=682d981fc4522896dcbdc92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4238-buffer-overflow-in-pcman-ftp-server-bda792</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4238%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58134-cwe-321-use-of-hard-coded-cryptographic-key-in-sri-mojolicious-bd6a12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58134%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20SRI%20Mojolicious&amp;severity=high&amp;id=682d9816c4522896dcbd6a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41753-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ibm-cloud-pak-for-business-automation-bdc929</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=682d981fc4522896dcbdc929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4237-buffer-overflow-in-pcman-ftp-server-bda78e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4237%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4236-buffer-overflow-in-pcman-ftp-server-bda763</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4236%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37799-vulnerability-in-linux-linux-bdcc93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcc93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4226-sql-injection-in-phpgurukul-cyber-cafe-management-system-bda75b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4226%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58135-cwe-338-use-of-cryptographically-weak-pseudo-random-number-generator-prng-in-sri-mojolicious-bd6a16</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58135%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20SRI%20Mojolicious&amp;severity=medium&amp;id=682d9816c4522896dcbd6a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3815-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-devsoftbaltic-surveyjs-drag-drop-wordpress-form-builder-to-create-style-and-embed-multiple-forms-of-any-complexity-bdc939</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=682d981fc4522896dcbdc939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/venom-spider-uses-server-side-polymorphism-to-weav-81ce9eda</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Venom%20Spider%20Uses%20Server-Side%20Polymorphism%20to%20Weave%20a%20Web%20Around%20Victims&amp;severity=medium&amp;id=683d16f3182aa0cae230aeca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13738-cwe-94-improper-control-of-generation-of-code-code-injection-in-stylemixthemes-motors-car-dealer-rental-listing-wordpress-theme-bda745</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13738%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20StylemixThemes%20Motors%20-%20Car%20Dealer%2C%20Rental%20%26%20Listing%20WordPress%20theme&amp;severity=high&amp;id=682d981cc4522896dcbda745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4222-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-neoslab-database-toolset-bd5f8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4222%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20neoslab%20Database%20Toolset&amp;severity=medium&amp;id=682d9815c4522896dcbd5f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3779-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-personizely-a-b-testing-popups-website-personalization-email-popup-exit-intent-pop-up-upsell-pop-up-personizely-bdc935</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3779%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20personizely%20Personizely%20%E2%80%94%20A%2FB%20Testing%2C%20Personalization%2C%20Popups%20%26%20CRO&amp;severity=medium&amp;id=682d981fc4522896dcbdc935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4199-cwe-352-cross-site-request-forgery-csrf-in-withinboredom-abundatrade-plugin-bdc941</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4199%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20withinboredom%20Abundatrade%20Plugin&amp;severity=medium&amp;id=682d981fc4522896dcbdc941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3918-cwe-285-improper-authorization-in-nootheme-job-listings-bda609</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3918%3A%20CWE-285%20Improper%20Authorization%20in%20nootheme%20Job%20Listings&amp;severity=critical&amp;id=682d981cc4522896dcbda609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4198-cwe-352-cross-site-request-forgery-csrf-in-todoapuestas-alink-tap-bdc93d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4198%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20todoapuestas%20Alink%20Tap&amp;severity=medium&amp;id=682d981fc4522896dcbdc93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4168-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-codework-subpage-list-bdc8ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4168%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20codework%20Subpage%20List&amp;severity=medium&amp;id=682d981fc4522896dcbdc8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4188-cwe-352-cross-site-request-forgery-csrf-in-balasahebbhise-advanced-reorder-image-text-slider-bdc91d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4188%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20balasahebbhise%20Advanced%20Reorder%20Image%20Text%20Slider&amp;severity=medium&amp;id=682d981fc4522896dcbdc91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4170-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xavinnydek-xavin-039-s-review-ratings-bdc8fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4170%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xavinnydek%20Xavin%26%23039%3Bs%20Review%20Ratings&amp;severity=medium&amp;id=682d981fc4522896dcbdc8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4172-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-katzwebdesign-verticalresponse-newsletter-widget-bdc8ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20katzwebdesign%20VerticalResponse%20Newsletter%20Widget&amp;severity=medium&amp;id=682d981fc4522896dcbdc8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47245-cwe-472-external-control-of-assumed-immutable-web-parameter-in-bluewave-checkmate-bdca75</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47245%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20BlueWave%20Checkmate&amp;severity=high&amp;id=682d981fc4522896dcbdca75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47244-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-inedo-proget-bdca71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47244%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Inedo%20ProGet&amp;severity=high&amp;id=682d981fc4522896dcbdca71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47241-cwe-647-use-of-non-canonical-url-paths-for-authorization-decisions-in-browser-use-browser-use-bdc79c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47241%3A%20CWE-647%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20browser-use%20browser-use&amp;severity=medium&amp;id=682d981fc4522896dcbdc79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47229-cwe-617-reachable-assertion-in-gnu-pspp-bdc4f0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47229%3A%20CWE-617%20Reachable%20Assertion%20in%20GNU%20PSPP&amp;severity=low&amp;id=682d981fc4522896dcbdc4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-03-2a1d00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-03&amp;severity=medium&amp;id=682c7db2e8347ec82d2a1d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-03-f1290c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f1290c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46723-cwe-131-incorrect-calculation-of-buffer-size-in-openvm-org-openvm-bda720</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46723%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20openvm-org%20openvm&amp;severity=high&amp;id=682d981cc4522896dcbda720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21546-vulnerability-in-linux-linux-bd7b54</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21546%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21572-opengrok-1-13-25-has-a-reflected-cross-site-scripting-xss-issue-when-producing-the-history-view-page-this-happens-through-improper-handling-of-path-segments-the-application-reflects-unsanitized-user-input-into-the-html-output-in-oracle-corporation-opengrok-bda5df</loc>
    <lastmod>2026-04-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21572%3A%20OpenGrok%201.13.25%20has%20a%20reflected%20Cross-Site%20Scripting%20(XSS)%20issue%20when%20producing%20the%20history%20view%20page.%20This%20happens%20through%20improper%20handling%20of%20path%20segments.%20The%20application%20reflects%20unsanitized%20user%20input%20into%20the%20HTML%20output.%20in%20Oracle%20Corporation%20OpenGrok&amp;severity=medium&amp;id=682d981cc4522896dcbda5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4218-code-injection-in-handrew-browserpilot-bdc967</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4218%3A%20Code%20Injection%20in%20handrew%20browserpilot&amp;severity=medium&amp;id=682d981fc4522896dcbdc967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4215-inefficient-regular-expression-complexity-in-gorhill-ublock-origin-bdc958</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4215%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20gorhill%20uBlock%20Origin&amp;severity=low&amp;id=682d981fc4522896dcbdc958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wget-to-wipeout-malicious-go-modules-fetch-destruc-31c87917</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=wget%20to%20Wipeout%3A%20Malicious%20Go%20Modules%20Fetch%20Destructive%20Payload&amp;severity=medium&amp;id=683cb462182aa0cae222541c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0782-aeb186</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0782&amp;severity=low&amp;id=682cd0f71484d88663aeb186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4214-sql-injection-in-phpguruku-online-dj-booking-management-system-beb989</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4214%3A%20SQL%20Injection%20in%20PHPGuruku%20Online%20DJ%20Booking%20Management%20System&amp;severity=medium&amp;id=682d9837c4522896dcbeb989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4213-sql-injection-in-phpgurukul-online-birth-certificate-system-bebd5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4213%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=682d9838c4522896dcbebd5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46332-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-vercel-flags-bebdbe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46332%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20vercel%20flags&amp;severity=medium&amp;id=682d9838c4522896dcbebdbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3879-cwe-863-incorrect-authorization-in-hashicorp-vault-bebe91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3879%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=682d9838c4522896dcbebe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53144-vulnerability-in-linux-linux-be711c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe711c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53143-vulnerability-in-linux-linux-be7116</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53143%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53142-vulnerability-in-linux-linux-be70f4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53142%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53141-vulnerability-in-linux-linux-be70ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53140-vulnerability-in-linux-linux-be70dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53140%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53139-vulnerability-in-linux-linux-be70d5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53139%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe70d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53138-vulnerability-in-linux-linux-be70cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53138%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe70cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53137-vulnerability-in-linux-linux-be70cb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53137%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe70cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53136-vulnerability-in-linux-linux-be70c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53136%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53135-vulnerability-in-linux-linux-be70bb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53135%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53134-vulnerability-in-linux-linux-be70ac</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53134%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53133-vulnerability-in-linux-linux-be70a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53133%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe70a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53132-vulnerability-in-linux-linux-be7086</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53132%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53131-vulnerability-in-linux-linux-bdd9c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53131%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53130-bd8766</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53130&amp;severity=low&amp;id=682d9819c4522896dcbd8766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53129-bd8762</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53129&amp;severity=low&amp;id=682d9819c4522896dcbd8762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53128-vulnerability-in-linux-linux-be7082</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53128%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53127-vulnerability-in-linux-linux-be707e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53127%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe707e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53126-vulnerability-in-linux-linux-be707a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53126%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe707a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53125-vulnerability-in-linux-linux-be7076</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53125%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53124-vulnerability-in-linux-linux-bdd9ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53124%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd9ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53123-vulnerability-in-linux-linux-be7072</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53123%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53122-bd875e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53122&amp;severity=low&amp;id=682d9819c4522896dcbd875e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53121-vulnerability-in-linux-linux-be706e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53121%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe706e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53120-vulnerability-in-linux-linux-be706a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53120%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe706a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53119-vulnerability-in-linux-linux-be7066</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53119%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53118-vulnerability-in-linux-linux-bdd9a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53118%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53117-vulnerability-in-linux-linux-be7060</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53117%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53116-vulnerability-in-linux-linux-be704d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53116%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe704d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53115-vulnerability-in-linux-linux-be704b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53115%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe704b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53114-vulnerability-in-linux-linux-be703c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe703c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53113-vulnerability-in-linux-linux-bdd99a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53113%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53112-vulnerability-in-linux-linux-be7034</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53112%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53111-vulnerability-in-linux-linux-be7023</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53111%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53110-vulnerability-in-linux-linux-be701b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53110%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe701b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53109-vulnerability-in-linux-linux-be7013</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53109%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53108-vulnerability-in-linux-linux-be700b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53108%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe700b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53107-vulnerability-in-linux-linux-be6ffc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53107%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53106-vulnerability-in-linux-linux-be6ff6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53106%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53105-vulnerability-in-linux-linux-be6fdb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53105%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53104-bd875a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53104&amp;severity=low&amp;id=682d9819c4522896dcbd875a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53103-vulnerability-in-linux-linux-be6fd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53103%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53102-vulnerability-in-linux-linux-be6fcb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53102%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53101-vulnerability-in-linux-linux-be6fb1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53101%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53100-vulnerability-in-linux-linux-be6fa9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53099-vulnerability-in-linux-linux-bdd996</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53098-vulnerability-in-linux-linux-be6fa1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53097-vulnerability-in-linux-linux-be6f99</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53096-vulnerability-in-linux-linux-be6f91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53095-vulnerability-in-linux-linux-be6f87</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53094-vulnerability-in-linux-linux-bdd992</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53093-vulnerability-in-linux-linux-be6f74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53092-vulnerability-in-linux-linux-be6f52</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53091-vulnerability-in-linux-linux-be6f4a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53090-vulnerability-in-linux-linux-be6f42</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53089-vulnerability-in-linux-linux-be6f38</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53088-vulnerability-in-linux-linux-bdd98e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53087-vulnerability-in-linux-linux-be6f30</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53086-vulnerability-in-linux-linux-be6f2a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53085-vulnerability-in-linux-linux-be6f26</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53084-vulnerability-in-linux-linux-bdd98a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53083-vulnerability-in-linux-linux-be6f0c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53082-vulnerability-in-linux-linux-be6f04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53081-vulnerability-in-linux-linux-bdd986</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53080-vulnerability-in-linux-linux-be6efc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53079-vulnerability-in-linux-linux-be6ee7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53078-vulnerability-in-linux-linux-bdd982</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53077-vulnerability-in-linux-linux-be6ee3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53076-bdc9d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53076&amp;severity=low&amp;id=682d981fc4522896dcbdc9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53075-vulnerability-in-linux-linux-be6edf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53074-vulnerability-in-linux-linux-be6edb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53073-vulnerability-in-linux-linux-be6ed7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53072-vulnerability-in-linux-linux-be6ed3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53071-vulnerability-in-linux-linux-be6ecf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53070-vulnerability-in-linux-linux-bdd971</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53069-vulnerability-in-linux-linux-be6ebe</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53068-vulnerability-in-linux-linux-be6eb6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53067-vulnerability-in-linux-linux-bd8486</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53066-vulnerability-in-linux-linux-be6eae</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53065-vulnerability-in-linux-linux-be6e8c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53064-vulnerability-in-linux-linux-bdd958</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53063-bd7195</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53063&amp;severity=low&amp;id=682d9817c4522896dcbd7195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53062-vulnerability-in-linux-linux-be6e84</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53061-vulnerability-in-linux-linux-be6e7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53060-vulnerability-in-linux-linux-bdd954</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53059-vulnerability-in-linux-linux-be6e74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53058-vulnerability-in-linux-linux-be6e5a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53057-vulnerability-in-linux-linux-be6e52</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53056-vulnerability-in-linux-linux-be6e4a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53055-vulnerability-in-linux-linux-bdd950</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53054-vulnerability-in-linux-linux-bdd94c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53053-vulnerability-in-linux-linux-be6e42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53052-vulnerability-in-linux-linux-be6e3a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53051-vulnerability-in-linux-linux-be6e32</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53050-vulnerability-in-linux-linux-be6e12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53050%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53049-vulnerability-in-linux-linux-be6e0a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53048-vulnerability-in-linux-linux-be6e02</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53047-vulnerability-in-linux-linux-be6dfa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53046-vulnerability-in-linux-linux-be6de9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53045-vulnerability-in-linux-linux-be6dda</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53045%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53044-vulnerability-in-linux-linux-be6dd4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53043-vulnerability-in-linux-linux-be6dd0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53043%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53042-vulnerability-in-linux-linux-be6dc8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53042%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53041-vulnerability-in-linux-linux-be6dc0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53041%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53040-vulnerability-in-linux-linux-be6dab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53040%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53039-vulnerability-in-linux-linux-be6da7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53039%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53038-vulnerability-in-linux-linux-be6da3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53038%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53037-vulnerability-in-linux-linux-bd704b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53037%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd704b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53036-vulnerability-in-linux-linux-be6d9f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53036%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53035-vulnerability-in-linux-linux-be6d9b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53035%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49933-aeb0e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49933&amp;severity=low&amp;id=682cd0f71484d88663aeb0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49932-vulnerability-in-linux-linux-be409d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe409d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4210-authorization-bypass-in-casdoor-bebe9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4210%3A%20Authorization%20Bypass%20in%20Casdoor&amp;severity=medium&amp;id=682d9838c4522896dcbebe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1884-cwe-416-use-after-free-in-dassault-syst-mes-solidworks-edrawings-bebf9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1884%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=682d9838c4522896dcbebf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1883-cwe-787-out-of-bounds-write-in-dassault-syst-mes-solidworks-edrawings-bebf9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1883%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=682d9838c4522896dcbebf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4166-cwe-209-generation-of-error-message-containing-sensitive-information-in-hashicorp-vault-bd870b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4166%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=682d9819c4522896dcbd870b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3927-cwe-1391-use-of-weak-credentials-in-digigram-pyko-out-bd6b8e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3927%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20Digigram%20PYKO-OUT&amp;severity=critical&amp;id=682d9816c4522896dcbd6b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37798-vulnerability-in-linux-linux-be8484</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37797-vulnerability-in-linux-linux-be8477</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2605-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-honeywell-mb-secure-aeb8a7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2605%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Honeywell%20MB-Secure&amp;severity=critical&amp;id=682cd0f81484d88663aeb8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4204-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-inception-software-llp-ultimate-auction-pro-bec156</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4204%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Inception%20Software%20LLP%20Ultimate%20Auction%20Pro&amp;severity=high&amp;id=682d9838c4522896dcbec156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2488-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-profelis-informatics-sambabox-bec22f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Profelis%20Informatics%20SambaBox&amp;severity=medium&amp;id=682d9838c4522896dcbec22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2421-cwe-94-improper-control-of-generation-of-code-code-injection-in-profelis-informatics-sambabox-bec22b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2421%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Profelis%20Informatics%20SambaBox&amp;severity=critical&amp;id=682d9838c4522896dcbec22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1301-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-yordam-informatics-library-automation-system-bec218</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1301%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Yordam%20Informatics%20Library%20Automation%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0427-cwe-416-use-after-free-in-arm-ltd-bifrost-gpu-kernel-driver-bd6ba8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0427%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Bifrost%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=682d9816c4522896dcbd6ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0072-cwe-416-use-after-free-in-arm-ltd-valhall-gpu-kernel-driver-bd6ba0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0072%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=682d9816c4522896dcbd6ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2812-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mydata-informatics-ticket-sales-automation-bec20a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2812%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mydata%20Informatics%20Ticket%20Sales%20Automation&amp;severity=critical&amp;id=682d9838c4522896dcbec20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11142-cwe-352-cross-site-request-forgery-csrf-in-gosoft-software-proticaret-e-commerce-bec1d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11142%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Gosoft%20Software%20Proticaret%20E-Commerce&amp;severity=high&amp;id=682d9838c4522896dcbec1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13859-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boss-media-buddyboss-platform-bd7682</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13859%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boss%20Media%20BuddyBoss%20Platform&amp;severity=medium&amp;id=682d9817c4522896dcbd7682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13860-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boss-media-buddyboss-platform-bd7686</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boss%20Media%20BuddyBoss%20Platform&amp;severity=medium&amp;id=682d9817c4522896dcbd7686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13858-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boss-media-buddyboss-platform-bd7661</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13858%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boss%20Media%20BuddyBoss%20Theme&amp;severity=medium&amp;id=682d9817c4522896dcbd7661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-stealc-you-tracking-the-rapid-changes-to-steal-e8a2025f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20StealC%20You%3A%20Tracking%20the%20Rapid%20Changes%20To%20Steal&amp;severity=medium&amp;id=683bef79182aa0cae2052660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3514-cwe-79-cross-site-scripting-xss-in-unknown-sureforms-bec0d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3514%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20SureForms&amp;severity=low&amp;id=682d9838c4522896dcbec0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3513-cwe-79-cross-site-scripting-xss-in-unknown-sureforms-bebf51</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3513%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20SureForms&amp;severity=low&amp;id=682d9838c4522896dcbebf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3438-cwe-269-improper-privilege-management-in-inspireui-mstore-api-create-native-android-ios-apps-on-the-cloud-bebf4d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3438%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=682d9838c4522896dcbebf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3488-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpml-wpml-bebf30</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPML%20WPML&amp;severity=medium&amp;id=682d9838c4522896dcbebf30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3858-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-michelegiorgi-formality-bebf1c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3858%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michelegiorgi%20Formality&amp;severity=medium&amp;id=682d9838c4522896dcbebf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1326-cwe-862-missing-authorization-in-fave-themes-homey-bebede</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1326%3A%20CWE-862%20Missing%20Authorization%20in%20Fave%20Themes%20Homey&amp;severity=medium&amp;id=682d9838c4522896dcbebede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13418-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-g5theme-benaa-framework-bec0c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13418%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20G5Theme%20Benaa%20Framework&amp;severity=high&amp;id=682d9838c4522896dcbec0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12023-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-fullservices-full-cliente-bec09a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12023%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fullservices%20FULL%20%E2%80%93%20Cliente&amp;severity=medium&amp;id=682d9838c4522896dcbec09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13420-cwe-94-improper-control-of-generation-of-code-code-injection-in-g5theme-benaa-framework-bec0bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13420%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20G5Theme%20Benaa%20Framework&amp;severity=medium&amp;id=682d9838c4522896dcbec0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13322-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-scripteo-ads-pro-plugin-multi-purpose-wordpress-advertising-manager-bec0b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13322%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=682d9838c4522896dcbec0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1327-cwe-639-authorization-bypass-through-user-controlled-key-in-fave-themes-homey-bec08a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1327%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Fave%20Themes%20Homey&amp;severity=medium&amp;id=682d9838c4522896dcbec08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13344-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-smartcms-advance-seat-reservation-management-for-woocommerce-bec079</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13344%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartcms%20Advance%20Seat%20Reservation%20Management%20for%20WooCommerce&amp;severity=high&amp;id=682d9838c4522896dcbec079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3510-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tagdiv-tagdiv-composer-bec08e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=682d9838c4522896dcbec08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3748-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-realmag777-taxonomy-chain-menu-bec041</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20Taxonomy%20Chain%20Menu&amp;severity=medium&amp;id=682d9838c4522896dcbec041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13419-cwe-862-missing-authorization-in-g5theme-benaa-framework-bec039</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13419%3A%20CWE-862%20Missing%20Authorization%20in%20G5Theme%20Benaa%20Framework&amp;severity=medium&amp;id=682d9838c4522896dcbec039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3709-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-flowring-technology-agentflow-bec03d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3709%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Flowring%20Technology%20Agentflow&amp;severity=critical&amp;id=682d9838c4522896dcbec03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3708-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-le-yan-le-show-bebee2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3708%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Le-yan%20Le-show&amp;severity=critical&amp;id=682d9838c4522896dcbebee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3707-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-sunnet-ehrd-ctms-bebeb0</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3707%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sunnet%20eHRD%20CTMS&amp;severity=medium&amp;id=682d9838c4522896dcbebeb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3670-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kiwichat-kiwichat-nextclient-bebdfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiwichat%20KiwiChat%20NextClient&amp;severity=medium&amp;id=682d9838c4522896dcbebdfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4177-cwe-862-missing-authorization-in-v1rustyle-flynax-bridge-bebe28</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4177%3A%20CWE-862%20Missing%20Authorization%20in%20v1rustyle%20Flynax%20Bridge&amp;severity=medium&amp;id=682d9838c4522896dcbebe28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2880-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-yame-yame-link-in-bio-bebdf2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2880%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yame%20Yame%20%7C%20Link%20In%20Bio&amp;severity=medium&amp;id=682d9838c4522896dcbebdf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4179-cwe-862-missing-authorization-in-v1rustyle-flynax-bridge-bebdfa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4179%3A%20CWE-862%20Missing%20Authorization%20in%20v1rustyle%20Flynax%20Bridge&amp;severity=high&amp;id=682d9838c4522896dcbebdfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3746-cwe-862-missing-authorization-in-thedrifted-otp-less-one-tap-sign-in-bd6b8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3746%3A%20CWE-862%20Missing%20Authorization%20in%20thedrifted%20OTP-less%20one%20tap%20Sign%20in&amp;severity=critical&amp;id=682d9816c4522896dcbd6b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4131-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-garubi-gmapsmania-bebec1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20garubi%20GmapsMania&amp;severity=medium&amp;id=682d9838c4522896dcbebec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4197-sql-injection-in-code-projects-patient-record-management-system-bebec5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4197%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbebec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4196-sql-injection-in-sourcecodester-patient-record-management-system-bebe79</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4196%3A%20SQL%20Injection%20in%20SourceCodester%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbebe79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29825-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-microsoft-microsoft-edge-chromium-based-aeb950</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29825%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0f91484d88663aeb950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4195-sql-injection-in-itsourcecode-gym-management-system-bec248</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4195%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4193-sql-injection-in-itsourcecode-restaurant-management-system-bec21c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4193%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55910-cwe-918-server-side-request-forgery-ssrf-in-ibm-concert-software-bec1ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55910%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=682d9838c4522896dcbec1ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55913-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-ibm-concert-software-bec206</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55913%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=682d9838c4522896dcbec206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55912-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-ibm-concert-software-bec1f5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55912%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=682d9838c4522896dcbec1f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55909-cwe-409-improper-handling-of-highly-compressed-data-data-amplification-in-ibm-concert-software-bec1d4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55909%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=682d9838c4522896dcbec1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4192-sql-injection-in-itsourcecode-restaurant-management-system-bec1c1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4192%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4191-sql-injection-in-phpgurukul-employee-record-management-system-bec1b9</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4191%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4186-path-traversal-in-wangshen-secgate-3600-bec1b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4186%3A%20Path%20Traversal%20in%20Wangshen%20SecGate%203600&amp;severity=medium&amp;id=682d9838c4522896dcbec1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47201-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-intrexx-portal-server-bec148</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47201%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Intrexx%20Portal%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbec148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58253-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-casualx-obfstr-bdc8e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58253%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20CasualX%20obfstr&amp;severity=low&amp;id=682d981fc4522896dcbdc8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47226-cwe-425-direct-request-forced-browsing-in-snipeitapp-snipe-it-bdc7bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47226%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20snipeitapp%20Snipe-IT&amp;severity=medium&amp;id=682d981fc4522896dcbdc7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44877-n-a-in-n-a-bda583</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44877%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44872-n-a-in-n-a-bda576</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44872%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44868-n-a-in-n-a-bda565</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44868%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55069-n-a-in-n-a-bd70cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55069%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd70cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45800-n-a-in-n-a-bd6b98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45800%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-02-2a2c04</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-02&amp;severity=medium&amp;id=682c7db2e8347ec82d2a2c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-02-f1208e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f1208e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4185-path-traversal-in-wangshen-secgate-3600-bec14e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4185%3A%20Path%20Traversal%20in%20Wangshen%20SecGate%203600&amp;severity=medium&amp;id=682d9838c4522896dcbec14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4184-buffer-overflow-in-pcman-ftp-server-bec0f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4184%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbec0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4183-buffer-overflow-in-pcman-ftp-server-bec0f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4183%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbec0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4182-buffer-overflow-in-pcman-ftp-server-bec122</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4182%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbec122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4181-buffer-overflow-in-pcman-ftp-server-bebe3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4181%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbebe3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52903-cwe-20-improper-input-validation-in-ibm-db2-for-linux-unix-and-windows-bec0e9</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52903%3A%20CWE-248%20Uncaught%20Exception%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=682d9838c4522896dcbec0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1333-cwe-214-invocation-of-process-using-visible-sensitive-information-in-ibm-mq-operator-bec0ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1333%3A%20CWE-214%20Invocation%20of%20Process%20Using%20Visible%20Sensitive%20Information%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=682d9838c4522896dcbec0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4180-buffer-overflow-in-pcman-ftp-server-bebe34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4180%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbebe34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4178-path-traversal-in-xiaowei1118-java-server-bebe30</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4178%3A%20Path%20Traversal%20in%20xiaowei1118%20java_server&amp;severity=medium&amp;id=682d9838c4522896dcbebe30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4176-sql-injection-in-phpgurukul-blood-bank-donor-management-system-bebe20</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4176%3A%20SQL%20Injection%20in%20PHPGurukul%20Blood%20Bank%20%26%20Donor%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbebe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27365-cwe-416-use-after-free-in-ibm-mq-operator-bec19d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27365%3A%20CWE-416%20Use%20After%20Free%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=682d9838c4522896dcbec19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43595-cwe-276-incorrect-default-permissions-in-msp360-backup-bd863c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43595%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MSP360%20Backup&amp;severity=high&amp;id=682d9819c4522896dcbd863c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/earth-kurma-apt-campaign-targets-southeast-asian-g-c9bcecf5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Earth%20Kurma%20APT%20Campaign%20Targets%20Southeast%20Asian%20Government%2C%20Telecom%20Sectors&amp;severity=medium&amp;id=683b62e6182aa0cae2f0d715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/earth-kasha-updates-ttps-in-latest-campaign-target-ecaf3ccc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Earth%20Kasha%20Updates%20TTPs%20in%20Latest%20Campaign%20Targeting%20Taiwan%20and%20Japan&amp;severity=medium&amp;id=683b62e6182aa0cae2f0d752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4175-path-traversal-in-alanbinu007-spring-boot-advanced-projects-bd71d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4175%3A%20Path%20Traversal%20in%20AlanBinu007%20Spring-Boot-Advanced-Projects&amp;severity=medium&amp;id=682d9817c4522896dcbd71d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46569-cwe-863-incorrect-authorization-in-open-policy-agent-opa-bebd9e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46569%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20open-policy-agent%20opa&amp;severity=high&amp;id=682d9838c4522896dcbebd9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4174-sql-injection-in-phpgurukul-covid19-testing-management-system-bec1a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4174%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36558-cwe-97-in-kunbus-gmbh-revolution-pi-pictory-bec1a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36558%3A%20CWE-97%20in%20KUNBUS%20GmbH%20Revolution%20Pi%20PiCtory&amp;severity=medium&amp;id=682d9838c4522896dcbec1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35996-cwe-97-in-kunbus-gmbh-revolution-pi-pictory-bec19b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35996%3A%20CWE-97%20in%20KUNBUS%20GmbH%20Revolution%20Pi%20PiCtory&amp;severity=critical&amp;id=682d9838c4522896dcbec19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32011-cwe-305-in-kunbus-gmbh-revolution-pi-pictory-bec15e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32011%3A%20CWE-305%20in%20KUNBUS%20GmbH%20Revolution%20Pi%20PiCtory&amp;severity=critical&amp;id=682d9838c4522896dcbec15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24522-cwe-305-in-kunbus-gmbh-revolution-pi-os-bookworm-bec5ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24522%3A%20CWE-305%20in%20KUNBUS%20GmbH%20Revolution%20Pi%20OS%20Bookworm&amp;severity=critical&amp;id=682d9838c4522896dcbec5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36521-cwe-125-out-of-bounds-read-in-microdicom-dicom-viewer-bec6d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36521%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MicroDicom%20DICOM%20Viewer&amp;severity=high&amp;id=682d9839c4522896dcbec6d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3517-cwe-266-incorrect-privilege-assignment-in-devolutions-devolutions-server-bec20e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3517%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Devolutions%20Devolutions%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbec20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35975-cwe-787-out-of-bounds-write-in-microdicom-dicom-viewer-bec6c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35975%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MicroDicom%20DICOM%20Viewer&amp;severity=high&amp;id=682d9839c4522896dcbec6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46568-cwe-918-server-side-request-forgery-ssrf-in-stirling-tools-stirling-pdf-bec144</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46568%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=682d9838c4522896dcbec144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46567-cwe-502-deserialization-of-untrusted-data-in-hiyouga-llama-factory-bebe0b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46567%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20hiyouga%20LLaMA-Factory&amp;severity=medium&amp;id=682d9838c4522896dcbebe0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46566-cwe-923-improper-restriction-of-communication-channel-to-intended-endpoints-in-dataease-dataease-bebdf6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46566%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20dataease%20dataease&amp;severity=medium&amp;id=682d9838c4522896dcbebdf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46565-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-vitejs-vite-bebdee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46565%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite&amp;severity=medium&amp;id=682d9838c4522896dcbebdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46345-cwe-290-authentication-bypass-by-spoofing-in-auth0-extensions-auth0-account-link-extension-bebde1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46345%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20auth0-extensions%20auth0-account-link-extension&amp;severity=medium&amp;id=682d9838c4522896dcbebde1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46337-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-adodb-adodb-bdcc6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46337%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ADOdb%20ADOdb&amp;severity=critical&amp;id=682d981fc4522896dcbdcc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4173-sql-injection-in-sourcecodester-online-eyewear-shop-bebdae</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4173%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Eyewear%20Shop&amp;severity=medium&amp;id=682d9838c4522896dcbebdae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-minhook-in-a-sideloading-attack-and-sweden-20237c8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20Minhook%20in%20a%20sideloading%20attack%20%E2%80%93%20and%20Sweden%20too&amp;severity=medium&amp;id=69399ca086adcdec9b1a61b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23246-cwe-400-uncontrolled-resource-consumption-in-nvidia-vgpu-software-cloud-gaming-becbcd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23246%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20NVIDIA%20vGPU%20Software%2C%20Cloud%20Gaming&amp;severity=medium&amp;id=682d9839c4522896dcbecbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49931-vulnerability-in-linux-linux-bdd79e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49930-vulnerability-in-linux-linux-be4098</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49929-vulnerability-in-linux-linux-be4092</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49928-vulnerability-in-linux-linux-be408e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe408e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49927-vulnerability-in-linux-linux-be4074</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49926-vulnerability-in-linux-linux-be4070</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49925-vulnerability-in-linux-linux-be406c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe406c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49924-vulnerability-in-linux-linux-be4068</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49923-vulnerability-in-linux-linux-be4064</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49922-vulnerability-in-linux-linux-be4060</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49921-vulnerability-in-linux-linux-bdd79a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49920-vulnerability-in-linux-linux-be405c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe405c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49919-vulnerability-in-linux-linux-bdd796</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49918-vulnerability-in-linux-linux-be4058</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49917-vulnerability-in-linux-linux-be4054</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49916-vulnerability-in-linux-linux-bdd785</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49915-vulnerability-in-linux-linux-be4050</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49914-vulnerability-in-linux-linux-be4030</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49913-vulnerability-in-linux-linux-be402c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49912-vulnerability-in-linux-linux-be4028</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982bc4522896dcbe4028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49911-vulnerability-in-linux-linux-be4022</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49910-vulnerability-in-linux-linux-be401e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe401e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49909-vulnerability-in-linux-linux-bdd781</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49908-vulnerability-in-linux-linux-be401a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe401a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49907-vulnerability-in-linux-linux-be4016</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49906-vulnerability-in-linux-linux-be4005</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49905-vulnerability-in-linux-linux-be3ffd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49904-vulnerability-in-linux-linux-bdd77d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49903-vulnerability-in-linux-linux-be3ff5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49902-vulnerability-in-linux-linux-be3fe0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49901-vulnerability-in-linux-linux-be3fdc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49900-vulnerability-in-linux-linux-be3fd8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49899-vulnerability-in-linux-linux-be3fd4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49898-vulnerability-in-linux-linux-be3fc3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49897-bd874d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49897&amp;severity=low&amp;id=682d9819c4522896dcbd874d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49896-vulnerability-in-linux-linux-be3fb2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49895-vulnerability-in-linux-linux-be3faa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49894-vulnerability-in-linux-linux-be3fa2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49893-vulnerability-in-linux-linux-be3f9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49892-vulnerability-in-linux-linux-bdd779</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49891-vulnerability-in-linux-linux-be3f94</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49890-vulnerability-in-linux-linux-be3f72</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49889-vulnerability-in-linux-linux-bdd775</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49888-vulnerability-in-linux-linux-be3f6a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49887-vulnerability-in-linux-linux-aeb010</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49886-vulnerability-in-linux-linux-be3f62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49885-vulnerability-in-linux-linux-be3f5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49884-vulnerability-in-linux-linux-be3f54</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49883-vulnerability-in-linux-linux-be3f47</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49882-vulnerability-in-linux-linux-be3f36</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49881-vulnerability-in-linux-linux-be4f20</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49880-vulnerability-in-linux-linux-be4f18</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49879-vulnerability-in-linux-linux-be4f10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49878-vulnerability-in-linux-linux-be4f08</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49877-vulnerability-in-linux-linux-bdd771</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49876-vulnerability-in-linux-linux-be4f02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49875-vulnerability-in-linux-linux-be4efe</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49874-vulnerability-in-linux-linux-be4ef6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49873-vulnerability-in-linux-linux-be4ee7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49872-vulnerability-in-linux-linux-bdd76d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49871-vulnerability-in-linux-linux-be4edf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49870-vulnerability-in-linux-linux-be4eca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49869-vulnerability-in-linux-linux-be4ec6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49868-vulnerability-in-linux-linux-be4eb5</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49867-vulnerability-in-linux-linux-be4ead</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49866-vulnerability-in-linux-linux-be4ea5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49865-vulnerability-in-linux-linux-be4e9d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49864-vulnerability-in-linux-linux-be4e97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49863-vulnerability-in-linux-linux-bdd769</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49862-vulnerability-in-linux-linux-bdd765</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49861-vulnerability-in-linux-linux-be4e93</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49860-vulnerability-in-linux-linux-be4e79</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49859-vulnerability-in-linux-linux-be4e71</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49858-vulnerability-in-linux-linux-be4e5c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49857-vulnerability-in-linux-linux-be4e58</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49856-bd8749</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49856&amp;severity=low&amp;id=682d9819c4522896dcbd8749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49855-vulnerability-in-linux-linux-be4e54</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49854-vulnerability-in-linux-linux-be4e50</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49853-vulnerability-in-linux-linux-be4e4c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49852-vulnerability-in-linux-linux-be4e48</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49851-vulnerability-in-linux-linux-bdd758</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49850-vulnerability-in-linux-linux-be4e44</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49849-vulnerability-in-linux-linux-be4e40</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49848-vulnerability-in-linux-linux-be4e3c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49847-vulnerability-in-linux-linux-be4e38</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49846-vulnerability-in-linux-linux-be4e25</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49845-vulnerability-in-linux-linux-be4e09</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49844-vulnerability-in-linux-linux-be4e01</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49843-bd8723</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49843&amp;severity=low&amp;id=682d9819c4522896dcbd8723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49842-vulnerability-in-linux-linux-be4df9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49841-vulnerability-in-linux-linux-be4df1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49840-vulnerability-in-linux-linux-be4de9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49839-vulnerability-in-linux-linux-be4de1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49838-vulnerability-in-linux-linux-be4dd2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49837-vulnerability-in-linux-linux-be4dca</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49837%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49836-vulnerability-in-linux-linux-be4dc2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49835-vulnerability-in-linux-linux-be4da2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49835%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49834-vulnerability-in-linux-linux-be4d9a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49833-vulnerability-in-linux-linux-aeb00e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeb00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49832-vulnerability-in-linux-linux-be4d92</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49832%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49831-vulnerability-in-linux-linux-be4d8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49830-vulnerability-in-linux-linux-be4d7b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49829-vulnerability-in-linux-linux-be4d73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49828-vulnerability-in-linux-linux-be4d6b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49827-vulnerability-in-linux-linux-be4d65</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49826-vulnerability-in-linux-linux-be4d5f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49825-vulnerability-in-linux-linux-be4d50</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49824-vulnerability-in-linux-linux-be4d39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49823-vulnerability-in-linux-linux-be4d35</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49822-vulnerability-in-linux-linux-be4d24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49821-vulnerability-in-linux-linux-be4d1c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49820-vulnerability-in-linux-linux-be4d14</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49820%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49819-vulnerability-in-linux-linux-be4d03</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49818-vulnerability-in-linux-linux-be4cfb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49818%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49817-vulnerability-in-linux-linux-be4cf3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49816-bec25f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49816&amp;severity=low&amp;id=682d9838c4522896dcbec25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49815-vulnerability-in-linux-linux-be4ceb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49814-vulnerability-in-linux-linux-be4ce3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49813-vulnerability-in-linux-linux-be4cc1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49812-vulnerability-in-linux-linux-be4cb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49812%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49811-vulnerability-in-linux-linux-be4ca8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49810-vulnerability-in-linux-linux-be4ca2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49809-vulnerability-in-linux-linux-bdd73a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49808-vulnerability-in-linux-linux-be4c98</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49807-vulnerability-in-linux-linux-be4c85</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49806-vulnerability-in-linux-linux-be4c7d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49805-vulnerability-in-linux-linux-be4c75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49804-vulnerability-in-linux-linux-be4c6d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49803-vulnerability-in-linux-linux-be4c65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49802-vulnerability-in-linux-linux-be4c3a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49801-vulnerability-in-linux-linux-bdd736</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49800-vulnerability-in-linux-linux-be4c32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49799-vulnerability-in-linux-linux-be4c2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49798-vulnerability-in-linux-linux-be4c22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49797-vulnerability-in-linux-linux-be4c1a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49796-vulnerability-in-linux-linux-be4c12</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49795-vulnerability-in-linux-linux-be4c03</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49794-vulnerability-in-linux-linux-be4bfb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49793-vulnerability-in-linux-linux-be4bf3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49792-vulnerability-in-linux-linux-be4beb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49791-vulnerability-in-linux-linux-be4bcf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49790-vulnerability-in-linux-linux-be4bcb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49789-vulnerability-in-linux-linux-be4bc7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49788-vulnerability-in-linux-linux-be4bc3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49787-vulnerability-in-linux-linux-be4bbf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49786-vulnerability-in-linux-linux-be4bbb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49785-vulnerability-in-linux-linux-be4bb7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49784-vulnerability-in-linux-linux-be4ba6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49783-vulnerability-in-linux-linux-be4b9e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49782-vulnerability-in-linux-linux-be4b96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49781-vulnerability-in-linux-linux-be4b79</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49780-vulnerability-in-linux-linux-be4b6c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49779-vulnerability-in-linux-linux-be4b5b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49778-vulnerability-in-linux-linux-be4b53</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49777-vulnerability-in-linux-linux-be4b4b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49776-vulnerability-in-linux-linux-be4b43</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49775-vulnerability-in-linux-linux-be4b3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49774-vulnerability-in-linux-linux-be4b35</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49773-vulnerability-in-linux-linux-be4b31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982cc4522896dcbe4b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49772-vulnerability-in-linux-linux-be4b2d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982cc4522896dcbe4b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49771-vulnerability-in-linux-linux-be4afe</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49770-vulnerability-in-linux-linux-be4af6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49769-vulnerability-in-linux-linux-be4aec</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49768-vulnerability-in-linux-linux-be4ae4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49767-vulnerability-in-linux-linux-be4ae0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49766-vulnerability-in-linux-linux-be4adc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49765-vulnerability-in-linux-linux-be4ad8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49764-vulnerability-in-linux-linux-be4acb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49763-vulnerability-in-linux-linux-be4ac3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49762-vulnerability-in-linux-linux-be4abb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49762%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36790-vulnerability-in-linux-linux-bea634</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23254-cwe-502-deserialization-of-untrusted-data-in-nvidia-tensorrt-llm-becbdc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23254%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20TensorRT-LLM&amp;severity=high&amp;id=682d9839c4522896dcbecbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23244-cwe-863-incorrect-authorization-in-nvidia-gpu-display-driver-vgpu-software-cloud-gaming-becbc3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23244%3A%20CWE-863%20Incorrect%20Authorization%20in%20NVIDIA%20GPU%20Display%20Driver%2C%20vGPU%20Software%2C%20Cloud%20Gaming&amp;severity=high&amp;id=682d9839c4522896dcbecbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23245-cwe-732-incorrect-permission-assignment-for-critical-resource-in-nvidia-vgpu-software-cloud-gaming-becbc7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23245%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20NVIDIA%20vGPU%20Software%2C%20Cloud%20Gaming&amp;severity=medium&amp;id=682d9839c4522896dcbecbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52979-cwe-400-uncontrolled-resource-consumption-in-elastic-elasticsearch-becf57</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52979%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=682d9839c4522896dcbecf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11390-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-elastic-kibana-becf3e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11390%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=682d9839c4522896dcbecf3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25016-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-elastic-kibana-bda233</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25016%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=682d981bc4522896dcbda233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37796-vulnerability-in-linux-linux-be8473</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37795-bd71c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37795&amp;severity=low&amp;id=682d9817c4522896dcbd71c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37794-vulnerability-in-linux-linux-be846f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe846f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37793-vulnerability-in-linux-linux-be845e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe845e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37792-vulnerability-in-linux-linux-be8456</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37791-vulnerability-in-linux-linux-be844e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe844e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37790-vulnerability-in-linux-linux-be8446</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37789-vulnerability-in-linux-linux-be843e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe843e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37788-vulnerability-in-linux-linux-be842d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe842d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37787-vulnerability-in-linux-linux-be8414</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37786-vulnerability-in-linux-linux-be840c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe840c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37784-vulnerability-in-linux-linux-be83f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe83f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37783-vulnerability-in-linux-linux-be83ef</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe83ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37782-vulnerability-in-linux-linux-be83eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37782&amp;severity=high&amp;id=682d9832c4522896dcbe83eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37781-vulnerability-in-linux-linux-be83e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe83e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37780-vulnerability-in-linux-linux-be83e1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37779-vulnerability-in-linux-linux-be83dd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37778-vulnerability-in-linux-linux-bd84ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd84ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37777-vulnerability-in-linux-linux-bd84ca</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd84ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37776-vulnerability-in-linux-linux-bd84c6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd84c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37775-vulnerability-in-linux-linux-bd84c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd84c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37774-vulnerability-in-linux-linux-be83ce</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37773-vulnerability-in-linux-linux-be83b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe83b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37772-vulnerability-in-linux-linux-be83aa</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37771-vulnerability-in-linux-linux-be83a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37770-vulnerability-in-linux-linux-be83a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe83a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37769-vulnerability-in-linux-linux-be839e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe839e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37768-vulnerability-in-linux-linux-be839a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe839a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37767-vulnerability-in-linux-linux-be8396</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37766-vulnerability-in-linux-linux-be8392</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37765-vulnerability-in-linux-linux-be838e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe838e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37764-vulnerability-in-linux-linux-be838a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe838a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37763-vulnerability-in-linux-linux-be8377</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37762-vulnerability-in-linux-linux-be8373</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37762%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37761-vulnerability-in-linux-linux-be836f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe836f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37760-vulnerability-in-linux-linux-bdd480</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11994-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-elastic-apm-server-beca46</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11994%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Elastic%20APM%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbeca46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52976-cwe-829-inclusion-of-functionality-from-untrusted-control-sphere-in-elastic-elastic-agent-beca6f</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52976%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Elastic%20Elastic%20Agent&amp;severity=medium&amp;id=682d9839c4522896dcbeca6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46669-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-elastic-elastic-agent-and-elastic-defend-beca3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46669%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Elastic%20Elastic%20Agent%20and%20Elastic%20Defend&amp;severity=medium&amp;id=682d9839c4522896dcbeca3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37759-vulnerability-in-linux-linux-be836b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe836b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37758-vulnerability-in-linux-linux-be835a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37758%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe835a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37757-vulnerability-in-linux-linux-be8347</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37757%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37756-vulnerability-in-linux-linux-be833f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe833f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37755-vulnerability-in-linux-linux-be8337</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37754-vulnerability-in-linux-linux-be832f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe832f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37753-vulnerability-in-linux-linux-be8327</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37753&amp;severity=low&amp;id=682d9832c4522896dcbe8327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37752-vulnerability-in-linux-linux-be8305</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37751-vulnerability-in-linux-linux-be82fd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe82fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37750-vulnerability-in-linux-linux-bdd47c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37749-vulnerability-in-linux-linux-be82f5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe82f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37748-vulnerability-in-linux-linux-be82f1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe82f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37747-vulnerability-in-linux-linux-bdd478</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37746-vulnerability-in-linux-linux-bd84be</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd84be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37745-vulnerability-in-linux-linux-be82e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe82e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37744-vulnerability-in-linux-linux-bd84ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd84ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37743-vulnerability-in-linux-linux-bd84a7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd84a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37742-vulnerability-in-linux-linux-be82d8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe82d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37741-vulnerability-in-linux-linux-be82d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe82d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37740-vulnerability-in-linux-linux-be82c8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe82c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37739-vulnerability-in-linux-linux-be82c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe82c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37738-vulnerability-in-linux-linux-be82b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe82b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23163-vulnerability-in-linux-linux-be829e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23163%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe829e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23162-vulnerability-in-linux-linux-bd849a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23162%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd849a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23161-vulnerability-in-linux-linux-be8291</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23161%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23160-vulnerability-in-linux-linux-bdd474</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23160%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23159-vulnerability-in-linux-linux-be828d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23159%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe828d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23158-vulnerability-in-linux-linux-be8289</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23158%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23157-vulnerability-in-linux-linux-be8285</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23157%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23156-vulnerability-in-linux-linux-be8281</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23156%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23155-vulnerability-in-linux-linux-be827b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23155%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe827b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23154-vulnerability-in-linux-linux-be8277</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23154%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23153-vulnerability-in-linux-linux-be8273</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23153%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23152-vulnerability-in-linux-linux-be826f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe826f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23151-vulnerability-in-linux-linux-bdd470</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23151%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23150-vulnerability-in-linux-linux-bdd453</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23150%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23149-vulnerability-in-linux-linux-bdd451</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23148-vulnerability-in-linux-linux-be825c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23148%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe825c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23147-vulnerability-in-linux-linux-be8258</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23147%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23146-vulnerability-in-linux-linux-be8249</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23145-vulnerability-in-linux-linux-be8241</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23144-vulnerability-in-linux-linux-be8239</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23143-vulnerability-in-linux-linux-be8235</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23143%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23142-vulnerability-in-linux-linux-bdd44d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23142%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23141-vulnerability-in-linux-linux-be8228</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23140-vulnerability-in-linux-linux-be8224</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23140%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23139-bd8776</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23139&amp;severity=low&amp;id=682d9819c4522896dcbd8776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4164-sql-injection-in-phpgurukul-employee-record-management-system-becfb8</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4164%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4163-sql-injection-in-phpgurukul-land-record-system-becf06</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4163%3A%20SQL%20Injection%20in%20PHPGurukul%20Land%20Record%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecf06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3890-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mra13-wordpress-simple-shopping-cart-becf00</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=682d9839c4522896dcbecf00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3874-cwe-639-authorization-bypass-through-user-controlled-key-in-mra13-wordpress-simple-shopping-cart-bece80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3874%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mra13%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=682d9839c4522896dcbece80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3889-cwe-639-authorization-bypass-through-user-controlled-key-in-mra13-wordpress-simple-shopping-cart-bece31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3889%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mra13%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=682d9839c4522896dcbece31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1529-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-johanaarstein-am-lottieplayer-becdc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1529%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johanaarstein%20AM%20LottiePlayer&amp;severity=medium&amp;id=682d9839c4522896dcbecdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4162-buffer-overflow-in-pcman-ftp-server-becd83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4162%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbecd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27007-cwe-266-incorrect-privilege-assignment-in-brainstorm-force-suretriggers-bdb33e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27007%3A%20Incorrect%20Privilege%20Assignment%20in%20Brainstorm%20Force%20OttoKit&amp;severity=null&amp;id=682d981dc4522896dcbdb33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4161-buffer-overflow-in-pcman-ftp-server-becd44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4161%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbecd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4160-buffer-overflow-in-pcman-ftp-server-becc68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4160%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbecc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4159-buffer-overflow-in-pcman-ftp-server-becaa3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4159%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbecaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4158-buffer-overflow-in-pcman-ftp-server-bec9e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4158%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbec9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4157-sql-injection-in-phpgurukul-boat-booking-system-bec982</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4157%3A%20SQL%20Injection%20in%20PHPGurukul%20Boat%20Booking%20System&amp;severity=medium&amp;id=682d9839c4522896dcbec982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4156-sql-injection-in-phpgurukul-boat-booking-system-bec980</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4156%3A%20SQL%20Injection%20in%20PHPGurukul%20Boat%20Booking%20System&amp;severity=medium&amp;id=682d9839c4522896dcbec980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4155-sql-injection-in-phpgurukul-boat-booking-system-bec939</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4155%3A%20SQL%20Injection%20in%20PHPGurukul%20Boat%20Booking%20System&amp;severity=medium&amp;id=682d9839c4522896dcbec939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4154-sql-injection-in-phpgurukul-pre-school-enrollment-system-bec927</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4154%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=682d9839c4522896dcbec927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3521-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-wpspeedo-team-members-best-wordpress-team-plugin-with-team-slider-team-showcase-team-builder-bec91f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3521%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpspeedo%20Team%20Members%20Showcase&amp;severity=medium&amp;id=682d9839c4522896dcbec91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4100-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-stur-nautic-pages-becc29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4100%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stur%20Nautic%20Pages&amp;severity=medium&amp;id=682d9839c4522896dcbecc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4153-sql-injection-in-phpgurukul-park-ticketing-management-system-becc31</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4153%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecc31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4152-sql-injection-in-phpgurukul-online-birth-certificate-system-becc2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4152%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3504-cwe-79-cross-site-scripting-xss-in-unknown-wp-maps-becc03</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3504%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Maps&amp;severity=low&amp;id=682d9839c4522896dcbecc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3503-cwe-79-cross-site-scripting-xss-in-unknown-wp-maps-bebff0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3503%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Maps&amp;severity=medium&amp;id=682d9838c4522896dcbebff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3502-cwe-79-cross-site-scripting-xss-in-unknown-wp-maps-becbb4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3502%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Maps&amp;severity=low&amp;id=682d9839c4522896dcbecbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13381-cwe-79-cross-site-scripting-xss-in-unknown-calculated-fields-form-bec81c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13381%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Calculated%20Fields%20Form&amp;severity=low&amp;id=682d9839c4522896dcbec81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4151-sql-injection-in-phpgurukul-curfew-e-pass-management-system-bec801</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4151%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=682d9839c4522896dcbec801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4150-buffer-overflow-in-netgear-ex6200-bec7f9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4150%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbec7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3952-cwe-862-missing-authorization-in-projectopia-projectopia-wordpress-project-management-becff4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3952%3A%20CWE-862%20Missing%20Authorization%20in%20projectopia%20Projectopia%20%E2%80%93%20Project%20Management%20Tool&amp;severity=high&amp;id=682d9839c4522896dcbecff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13845-cwe-918-server-side-request-forgery-ssrf-in-gravity-forms-gravity-forms-webhooks-becf4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13845%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Gravity%20Forms%20Gravity%20Forms%20WebHooks&amp;severity=medium&amp;id=682d9839c4522896dcbecf4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4099-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-theandystratton-list-children-becf80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4099%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theandystratton%20List%20Children&amp;severity=medium&amp;id=682d9839c4522896dcbecf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4149-buffer-overflow-in-netgear-ex6200-becfb0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4149%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbecfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2168-cwe-352-cross-site-request-forgery-csrf-in-bdthemes-ultimate-store-kit-elementor-powered-woocommerce-builder-80-widgets-and-template-builder-becf6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2168%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bdthemes%20Ultimate%20Store%20Kit%20%E2%80%93%20Addon%20For%20WooCommerce%2C%20EDD%20and%20Elementor&amp;severity=medium&amp;id=682d9839c4522896dcbecf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1304-cwe-862-missing-authorization-in-spicethemes-newsblogger-becf5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1304%3A%20CWE-862%20Missing%20Authorization%20in%20spicethemes%20NewsBlogger&amp;severity=high&amp;id=682d9839c4522896dcbecf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1305-cwe-352-cross-site-request-forgery-csrf-in-spicethemes-newsblogger-becf67</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1305%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20NewsBlogger&amp;severity=high&amp;id=682d9839c4522896dcbecf67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4148-buffer-overflow-in-netgear-ex6200-becfaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4148%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbecfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2816-cwe-862-missing-authorization-in-a3rev-page-view-count-becf71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2816%3A%20CWE-862%20Missing%20Authorization%20in%20a3rev%20Page%20View%20Count&amp;severity=high&amp;id=682d9839c4522896dcbecf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4147-buffer-overflow-in-netgear-ex6200-becf88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4147%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbecf88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4146-buffer-overflow-in-netgear-ex6200-beca9f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4146%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbeca9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4144-cwe-287-improper-authentication-beca97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4144%3A%20CWE-287%20Improper%20Authentication&amp;severity=medium&amp;id=682d9839c4522896dcbeca97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4143-cwe-601-url-redirection-to-untrusted-site-open-redirect-beca8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4143%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)&amp;severity=medium&amp;id=682d9839c4522896dcbeca8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4145-buffer-overflow-in-netgear-ex6200-beca9b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4145%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbeca9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-xrm-ms-file-ntlm-information-dis-6ebcaaf4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%20-%20XRM-MS%20File%20NTLM%20Information%20Disclosure%20Spoofing&amp;severity=medium&amp;id=68489e437e6d765d51d54352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/daikin-security-gateway-14-remote-password-reset-2d78c35f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Daikin%20Security%20Gateway%20%2014%20-%20Remote%20Password%20Reset&amp;severity=medium&amp;id=68489e3b7e6d765d51d542c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zte-zxv10-h201l-rce-via-authentication-bypass-5f397053</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZTE%20ZXV10%20H201L%20-%20RCE%20via%20authentication%20bypass&amp;severity=critical&amp;id=68489e307e6d765d51d5418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-ntlm-hash-disclosure-spoofing-library-ms-c9116782</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20-%20NTLM%20Hash%20Disclosure%20Spoofing%20(library-ms)&amp;severity=medium&amp;id=68489e2b7e6d765d51d540b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47154-cwe-820-missing-synchronization-in-ladybird-ladybird-beca77</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47154%3A%20CWE-820%20Missing%20Synchronization%20in%20Ladybird%20Ladybird&amp;severity=critical&amp;id=682d9839c4522896dcbeca77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32890-n-a-in-n-a-bec658</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32890%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32889-n-a-in-n-a-bec656</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32889%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32888-n-a-in-n-a-bec54d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32888%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32887-n-a-in-n-a-bec513</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32887%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32886-n-a-in-n-a-bec478</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32886%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32885-n-a-in-n-a-bec474</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32885%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32884-n-a-in-n-a-bec3f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32884%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32882-n-a-in-n-a-bec398</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32882%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32881-n-a-in-n-a-bec390</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32881%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44867-n-a-in-n-a-bec333</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44867%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44866-n-a-in-n-a-bec32b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44866%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44865-n-a-in-n-a-bec323</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44865%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44864-n-a-in-n-a-bec31b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44864%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44862-n-a-in-n-a-bec313</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44862%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44861-n-a-in-n-a-bec30f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44861%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44847-n-a-in-n-a-bec30b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44847%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44846-n-a-in-n-a-bec2e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44846%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44836-n-a-in-n-a-bec2e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44836%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44854-n-a-in-n-a-bec2d0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44854%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44838-n-a-in-n-a-bec2cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44838%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44837-n-a-in-n-a-bec2c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44837%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44835-n-a-in-n-a-bec2c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44835%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46625-n-a-in-n-a-bec166</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46625%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46635-n-a-in-n-a-bec0dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46635%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46634-n-a-in-n-a-bec096</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46634%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46633-n-a-in-n-a-bec092</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46633%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48907-n-a-in-n-a-bec07d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48907%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46632-n-a-in-n-a-bec075</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46632%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46631-n-a-in-n-a-bec066</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46631%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46630-n-a-in-n-a-bec05e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46630%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46629-n-a-in-n-a-bec02d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46629%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46628-n-a-in-n-a-bec02b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46628%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46627-n-a-in-n-a-bec01a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46627%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec01a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46626-n-a-in-n-a-bec016</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46626%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44860-n-a-in-n-a-bec012</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44860%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44863-n-a-in-n-a-bebfe0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44863%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44845-n-a-in-n-a-bebfdc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44845%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44844-n-a-in-n-a-bebfd8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44844%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44843-n-a-in-n-a-bebfd4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44843%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44842-n-a-in-n-a-bebfd0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44842%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44840-n-a-in-n-a-bebfcc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44840%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44839-n-a-in-n-a-bebfae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44839%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44841-n-a-in-n-a-bebf75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44841%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebf75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44848-n-a-in-n-a-bebd7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44848%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebd7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47153-cwe-1102-reliance-on-machine-dependent-data-representation-in-debian-trixie-bebb04</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47153%3A%20CWE-1102%20Reliance%20on%20Machine-Dependent%20Data%20Representation%20in%20Debian%20trixie&amp;severity=medium&amp;id=682d9837c4522896dcbebb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48906-n-a-in-n-a-bda548</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48906%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48905-n-a-in-n-a-bda4df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48905%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32883-bd73de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32883&amp;severity=low&amp;id=682d9817c4522896dcbd73de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-01-2a2605</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-01&amp;severity=medium&amp;id=682c7db2e8347ec82d2a2605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-01-f1241d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f1241d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4142-buffer-overflow-in-netgear-ex6200-bece84</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4142%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbece84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4141-buffer-overflow-in-netgear-ex6200-beca86</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4141%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbeca86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4140-buffer-overflow-in-netgear-ex6120-bebe9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4140%3A%20Buffer%20Overflow%20in%20Netgear%20EX6120&amp;severity=high&amp;id=682d9838c4522896dcbebe9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/advisory-pahalgam-attack-themed-decoys-used-by-apt-58f65376</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Advisory%3A%20Pahalgam%20Attack%20themed%20decoys%20used%20by%20APT36%20to%20target%20the%20Indian%20Government&amp;severity=medium&amp;id=683a1f6a182aa0cae2c19003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30146-cwe-284-improper-access-control-in-hcl-software-hcl-domino-leap-beca67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30146%3A%20CWE-284%20%20Improper%20access%20control%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=medium&amp;id=682d9839c4522896dcbeca67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30145-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-domino-leap-beca4a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30145%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=medium&amp;id=682d9839c4522896dcbeca4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30115-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-domino-leap-bec9e1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30115%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=medium&amp;id=682d9839c4522896dcbec9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45721-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-hcl-software-hcl-domino-leap-bec9dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45721%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=medium&amp;id=682d9839c4522896dcbec9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37535-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-domino-leap-bec9d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37535%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=high&amp;id=682d9839c4522896dcbec9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37517-cwe-524-use-of-cache-containing-sensitive-information-in-hcl-software-hcl-domino-leap-bec9cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37517%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=low&amp;id=682d9839c4522896dcbec9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42450-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-domino-volt-bec9bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Domino%20Volt&amp;severity=medium&amp;id=682d9839c4522896dcbec9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42449-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-hcl-software-hcl-domino-volt-bec9b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42449%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20HCL%20Domino%20Volt&amp;severity=medium&amp;id=682d9839c4522896dcbec9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27562-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-hcl-software-hcl-domino-volt-bec98e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27562%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20HCL%20Domino%20Volt&amp;severity=medium&amp;id=682d9839c4522896dcbec98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30422-an-attacker-on-the-local-network-may-cause-an-unexpected-app-termination-in-apple-airplay-audio-sdk-becfc8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30422%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20AirPlay%20audio%20SDK&amp;severity=medium&amp;id=682d9839c4522896dcbecfc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24132-an-attacker-on-the-local-network-may-cause-an-unexpected-app-termination-in-apple-airplay-audio-sdk-becfc0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24132%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20AirPlay%20audio%20SDK&amp;severity=medium&amp;id=682d9839c4522896dcbecfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4139-buffer-overflow-in-netgear-ex6120-bed658</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4139%3A%20Buffer%20Overflow%20in%20Netgear%20EX6120&amp;severity=high&amp;id=682d983ac4522896dcbed658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2082-cwe-190-integer-overflow-or-wraparound-in-tesla-model-3-bed739</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2082%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Tesla%20Model%203&amp;severity=high&amp;id=682d983ac4522896dcbed739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6032-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-tesla-model-s-bed735</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6032%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tesla%20Model%20S&amp;severity=high&amp;id=682d983ac4522896dcbed735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6030-cwe-250-execution-with-unnecessary-privileges-in-tesla-model-s-bed72d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6030%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Tesla%20Model%20S&amp;severity=high&amp;id=682d983ac4522896dcbed72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13943-cwe-20-improper-input-validation-in-tesla-model-s-bed6f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13943%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Tesla%20Model%20S&amp;severity=high&amp;id=682d983ac4522896dcbed6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6031-cwe-122-heap-based-buffer-overflow-in-tesla-model-s-bed731</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6031%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Tesla%20Model%20S&amp;severity=high&amp;id=682d983ac4522896dcbed731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6029-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-tesla-model-s-bed709</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6029%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Tesla%20Model%20S&amp;severity=medium&amp;id=682d983ac4522896dcbed709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27611-cwe-1007-insufficient-visual-distinction-of-homoglyphs-presented-to-user-in-cryptocoinjs-base-x-bec652</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27611%3A%20CWE-1007%3A%20Insufficient%20Visual%20Distinction%20of%20Homoglyphs%20Presented%20to%20User%20in%20cryptocoinjs%20base-x&amp;severity=high&amp;id=682d9838c4522896dcbec652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4136-improper-authorization-in-weitong-mall-bec66e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4136%3A%20Improper%20Authorization%20in%20Weitong%20Mall&amp;severity=medium&amp;id=682d9838c4522896dcbec66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2170-cwe-918-server-side-request-forgery-ssrf-in-sonicwall-sma1000-aec900</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2170%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=682cd0fb1484d88663aec900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9877-cwe-598-use-of-get-request-method-with-sensitive-query-strings-in-abb-anc-bed91a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9877%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20ABB%20ANC&amp;severity=medium&amp;id=682d983ac4522896dcbed91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9876-cwe-471-modification-of-assumed-immutable-data-maid-in-abb-anc-bed8bd</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9876%3A%20CWE-471%3A%20Modification%20of%20Assumed-Immutable%20Data%20(MAID)%20in%20ABB%20ANC&amp;severity=high&amp;id=682d983ac4522896dcbed8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46554-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bed8c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46554%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d983ac4522896dcbed8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46557-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bed8cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46557%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=682d983ac4522896dcbed8cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46558-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xwiki-contrib-syntax-markdown-bed885</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46558%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20syntax-markdown&amp;severity=critical&amp;id=682d983ac4522896dcbed885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24887-cwe-284-improper-access-control-in-opencti-platform-opencti-bed87d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24887%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=682d983ac4522896dcbed87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32777-cwe-770-allocation-of-resources-without-limits-or-throttling-in-volcano-sh-volcano-bec654</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32777%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20volcano-sh%20volcano&amp;severity=high&amp;id=682d9838c4522896dcbec654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46331-cwe-284-improper-access-control-in-openfga-openfga-bec65e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46331%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20openfga%20openfga&amp;severity=medium&amp;id=682d9838c4522896dcbec65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47784-cwe-620-unverified-password-change-in-abb-anc-bed745</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47784%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20ABB%20ANC&amp;severity=low&amp;id=682d983ac4522896dcbed745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4135-command-injection-in-netgear-wg302v2-bed9af</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4135%3A%20Command%20Injection%20in%20Netgear%20WG302v2&amp;severity=medium&amp;id=682d983ac4522896dcbed9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-are-targeting-us-tax-session-with-ne-f0225f8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20are%20Targeting%20US%20Tax-Session%20with%20new%20Tactics%20of%20Stealerium-infostealer&amp;severity=medium&amp;id=6839e730182aa0cae2b929df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24091-an-app-may-be-able-to-cause-a-denial-of-service-in-apple-ipados-bed6ce</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24091%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983ac4522896dcbed6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39413-cwe-862-missing-authorization-in-david-gwyer-simple-sitemap-create-a-responsive-html-sitemap-beda63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39413%3A%20Missing%20Authorization%20in%20David%20Gwyer%20Simple%20Sitemap%20%E2%80%93%20Create%20a%20Responsive%20HTML%20Sitemap&amp;severity=null&amp;id=682d983ac4522896dcbeda63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21416-cwe-862-missing-authorization-in-microsoft-azure-virtual-desktop-aebaf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21416%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Azure%20Virtual%20Desktop&amp;severity=high&amp;id=682cd0f91484d88663aebaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30392-cwe-285-improper-authorization-in-microsoft-azure-ai-bot-service-aebc70</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30392%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20AI%20Bot%20Service&amp;severity=critical&amp;id=682cd0f91484d88663aebc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30390-cwe-285-improper-authorization-in-microsoft-azure-machine-learning-aebc6c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30390%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Machine%20Learning&amp;severity=critical&amp;id=682cd0f91484d88663aebc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33074-cwe-347-improper-verification-of-cryptographic-signature-in-microsoft-azure-functions-aebc74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33074%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Azure%20Functions&amp;severity=high&amp;id=682cd0f91484d88663aebc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30389-cwe-285-improper-authorization-in-microsoft-azure-ai-bot-service-aebc6a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30389%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20AI%20Bot%20Service&amp;severity=high&amp;id=682cd0f91484d88663aebc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30391-cwe-20-improper-input-validation-in-microsoft-dynamics-365-customer-service-aebc6e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30391%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Dynamics%20365%20Customer%20Service&amp;severity=high&amp;id=682cd0f91484d88663aebc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3599-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-symantec-symantec-endpoint-protection-bedae5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3599%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Symantec%20Symantec%20Endpoint%20Protection&amp;severity=medium&amp;id=682d983ac4522896dcbedae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3859-firefox-focus-elide-url-allows-address-bar-spoofing-in-mozilla-focus-bd6be3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3859%3A%20Vulnerability%20in%20Mozilla%20Focus&amp;severity=medium&amp;id=682d9816c4522896dcbd6be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thewizards-apt-group-uses-slaac-spoofing-to-perfor-3bf21c25</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TheWizards%20APT%20group%20uses%20SLAAC%20spoofing%20to%20perform%20adversary-in-the-middle%20attacks&amp;severity=medium&amp;id=6839cb0b182aa0cae2b532cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32376-cwe-284-improper-access-control-in-discourse-discourse-bedff7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32376%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d983bc4522896dcbedff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46342-cwe-1287-improper-validation-of-specified-type-of-input-in-kyverno-kyverno-bedf5a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46342%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20kyverno%20kyverno&amp;severity=high&amp;id=682d983bc4522896dcbedf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27134-cwe-284-improper-access-control-in-laurent22-joplin-bedf0d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27134%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20laurent22%20joplin&amp;severity=high&amp;id=682d983bc4522896dcbedf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27409-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-laurent22-joplin-bedf1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27409%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20laurent22%20joplin&amp;severity=high&amp;id=682d983bc4522896dcbedf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32973-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bedf52</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32973%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=682d983bc4522896dcbedf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32974-cwe-116-improper-encoding-or-escaping-of-output-in-xwiki-xwiki-platform-bedf56</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32974%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=682d983bc4522896dcbedf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32972-cwe-285-improper-authorization-in-xwiki-xwiki-platform-bedf43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32972%3A%20CWE-285%3A%20Improper%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=low&amp;id=682d983bc4522896dcbedf43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32971-cwe-863-incorrect-authorization-in-xwiki-xwiki-platform-bedf3b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32971%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=low&amp;id=682d983bc4522896dcbedf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32970-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-xwiki-xwiki-platform-bedf1e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32970%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d983bc4522896dcbedf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4122-command-injection-in-netgear-jwnr2000v2-bedffb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4122%3A%20Command%20Injection%20in%20Netgear%20JWNR2000v2&amp;severity=medium&amp;id=682d983bc4522896dcbedffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4121-command-injection-in-netgear-jwnr2000v2-beddc7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4121%3A%20Command%20Injection%20in%20Netgear%20JWNR2000v2&amp;severity=medium&amp;id=682d983bc4522896dcbeddc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4120-buffer-overflow-in-netgear-jwnr2000v2-beddc3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4120%3A%20Buffer%20Overflow%20in%20Netgear%20JWNR2000v2&amp;severity=high&amp;id=682d983bc4522896dcbeddc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4119-improper-access-controls-in-weitong-mall-bee282</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4119%3A%20Improper%20Access%20Controls%20in%20Weitong%20Mall&amp;severity=medium&amp;id=682d983bc4522896dcbee282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4118-improper-access-controls-in-weitong-mall-bee265</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4118%3A%20Improper%20Access%20Controls%20in%20Weitong%20Mall&amp;severity=medium&amp;id=682d983bc4522896dcbee265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4117-buffer-overflow-in-netgear-jwnr2000v2-bee33a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4117%3A%20Buffer%20Overflow%20in%20Netgear%20JWNR2000v2&amp;severity=medium&amp;id=682d983bc4522896dcbee33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3395-cwe-732-incorrect-permission-assignment-for-critical-resource-in-abb-automation-builder-bee300</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3395%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ABB%20Automation%20Builder&amp;severity=high&amp;id=682d983bc4522896dcbee300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3394-cwe-732-incorrect-permission-assignment-for-critical-resource-in-abb-automation-builder-bee2ab</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3394%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ABB%20Automation%20Builder&amp;severity=high&amp;id=682d983bc4522896dcbee2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4116-buffer-overflow-in-netgear-jwnr2000v2-bee2db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4116%3A%20Buffer%20Overflow%20in%20Netgear%20JWNR2000v2&amp;severity=high&amp;id=682d983bc4522896dcbee2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4115-buffer-overflow-in-netgear-jwnr2000v2-bee292</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4115%3A%20Buffer%20Overflow%20in%20Netgear%20JWNR2000v2&amp;severity=high&amp;id=682d983bc4522896dcbee292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4114-buffer-overflow-in-netgear-jwnr2000v2-bee28e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4114%3A%20Buffer%20Overflow%20in%20Netgear%20JWNR2000v2&amp;severity=high&amp;id=682d983bc4522896dcbee28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27532-cwe-312-cleartext-storage-of-sensitive-information-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee218</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27532%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbee218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24351-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-bosch-rexroth-ag-ctrlx-os-device-admin-bed36d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24351%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=high&amp;id=682d983ac4522896dcbed36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24350-cwe-23-relative-path-traversal-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee19e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24350%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=high&amp;id=682d983bc4522896dcbee19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24349-cwe-183-permissive-list-of-allowed-inputs-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee196</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24349%3A%20CWE-183%20Permissive%20List%20of%20Allowed%20Inputs%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=high&amp;id=682d983bc4522896dcbee196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24348-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee139</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24348%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbee139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24347-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee131</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24347%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbee131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24346-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-bosch-rexroth-ag-ctrlx-os-device-admin-bed365</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24346%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=high&amp;id=682d983ac4522896dcbed365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24345-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee0c4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24345%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbee0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24344-cwe-81-improper-neutralization-of-script-in-an-error-message-web-page-in-bosch-rexroth-ag-ctrlx-os-solutions-bee05e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24344%3A%20CWE-81%20Improper%20Neutralization%20of%20Script%20in%20an%20Error%20Message%20Web%20Page%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Solutions&amp;severity=medium&amp;id=682d983bc4522896dcbee05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24343-cwe-23-relative-path-traversal-in-bosch-rexroth-ag-ctrlx-os-solutions-bedfd6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24343%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Solutions&amp;severity=medium&amp;id=682d983bc4522896dcbedfd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24342-cwe-204-observable-response-discrepancy-in-bosch-rexroth-ag-ctrlx-os-device-admin-bedfd2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24342%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbedfd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24341-cwe-770-allocation-of-resources-without-limits-or-throttling-in-bosch-rexroth-ag-ctrlx-os-device-admin-bedf09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24341%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbedf09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4113-sql-injection-in-phpgurukul-curfew-e-pass-management-system-bedecd</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4113%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=682d983bc4522896dcbedecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4112-sql-injection-in-phpgurukul-student-record-system-bede55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4112%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=682d983bc4522896dcbede55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24340-cwe-916-use-of-password-hash-with-insufficient-computational-effort-in-bosch-rexroth-ag-ctrlx-os-device-admin-bedd82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24340%3A%20CWE-916%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbedd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24339-cwe-644-improper-neutralization-of-http-headers-for-scripting-syntax-in-bosch-rexroth-ag-ctrlx-os-device-admin-bedd7a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24339%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbedd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24338-cwe-116-improper-encoding-or-escaping-of-output-in-bosch-rexroth-ag-ctrlx-os-solutions-bed35d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24338%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Solutions&amp;severity=high&amp;id=682d983ac4522896dcbed35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4111-sql-injection-in-phpgurukul-pre-school-enrollment-system-bedcb2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4111%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=682d983bc4522896dcbedcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4110-sql-injection-in-phpgurukul-pre-school-enrollment-system-bedbfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4110%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=682d983bc4522896dcbedbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4109-sql-injection-in-phpgurukul-pre-school-enrollment-system-bedb57</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4109%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=682d983bc4522896dcbedb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4108-sql-injection-in-phpgurukul-student-record-system-bedb53</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4108%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=682d983bc4522896dcbedb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2890-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tagdiv-tagdiv-opt-in-builder-bedb42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2890%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TagDiv%20tagDiv%20Opt-In%20Builder&amp;severity=medium&amp;id=682d983bc4522896dcbedb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4125-cwe-787-out-of-bounds-write-in-delta-electronics-ispsoft-bee357</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4125%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20ISPSoft&amp;severity=high&amp;id=682d983bc4522896dcbee357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4124-cwe-787-out-of-bounds-write-in-delta-electronics-ispsoft-bee353</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4124%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20ISPSoft&amp;severity=high&amp;id=682d983bc4522896dcbee353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22884-cwe-121-stack-based-buffer-overflow-in-delta-electronics-ispsoft-bee342</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22884%3A%20cwe-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ISPSoft&amp;severity=high&amp;id=682d983bc4522896dcbee342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22883-cwe-787-out-of-bounds-write-in-delta-electronics-ispsoft-bee2eb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22883%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20ISPSoft&amp;severity=high&amp;id=682d983bc4522896dcbee2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22882-cwe-121-stack-based-buffer-overflow-in-delta-electronics-ispsoft-bee2e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22882%3A%20cwe-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ISPSoft&amp;severity=high&amp;id=682d983bc4522896dcbee2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3471-cwe-863-incorrect-authorization-in-unknown-sureforms-bedad4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3471%3A%20CWE-863%20Incorrect%20Authorization%20in%20Unknown%20SureForms&amp;severity=medium&amp;id=682d983ac4522896dcbedad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3953-cwe-862-missing-authorization-in-veronalabs-wp-statistics-the-most-popular-privacy-friendly-analytics-plugin-bee302</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3953%3A%20CWE-862%20Missing%20Authorization%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=medium&amp;id=682d983bc4522896dcbee302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32444-cwe-502-deserialization-of-untrusted-data-in-vllm-project-vllm-bee2fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32444%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20vllm-project%20vllm&amp;severity=critical&amp;id=682d983bc4522896dcbee2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46560-cwe-1333-inefficient-regular-expression-complexity-in-vllm-project-vllm-bee332</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46560%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=682d983bc4522896dcbee332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30202-cwe-770-allocation-of-resources-without-limits-or-throttling-in-vllm-project-vllm-bee2fa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30202%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=high&amp;id=682d983bc4522896dcbee2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unzip-stream-031-arbitrary-file-write-65dd9e89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=unzip-stream%200.3.1%20-%20Arbitrary%20File%20Write&amp;severity=medium&amp;id=68489e497e6d765d51d543a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45020-n-a-in-n-a-bee150</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45020%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45007-n-a-in-n-a-bee14a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45007%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45011-n-a-in-n-a-bede51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45011%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbede51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45021-n-a-in-n-a-beddbd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45021%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbeddbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45010-n-a-in-n-a-beddbb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45010%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbeddbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45009-n-a-in-n-a-beddb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45009%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbeddb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46619-n-a-in-n-a-bec666</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46619%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44194-n-a-in-n-a-bec609</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44194%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44193-n-a-in-n-a-bec603</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44193%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44192-n-a-in-n-a-bebe95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44192%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9838c4522896dcbebe95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45019-n-a-in-n-a-bda528</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45019%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45018-n-a-in-n-a-bda517</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45018%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45017-n-a-in-n-a-bda508</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45017%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45015-n-a-in-n-a-bda4f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45015%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-30-2a3593</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-30&amp;severity=medium&amp;id=682c7db2e8347ec82d2a3593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-30-f12a69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29906-cwe-287-improper-authentication-in-troglobit-finit-bedace</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29906%3A%20CWE-287%3A%20Improper%20Authentication%20in%20troglobit%20finit&amp;severity=high&amp;id=682d983ac4522896dcbedace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46552-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-krypto-hashers-community-khc-invitation-automation-beda6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46552%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Krypto-Hashers-Community%20KHC-INVITATION-AUTOMATION&amp;severity=medium&amp;id=682d983ac4522896dcbeda6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3910-improper-authentication-in-red-hat-red-hat-build-of-keycloak-bedc53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3910%3A%20Improper%20Authentication&amp;severity=medium&amp;id=682d983bc4522896dcbedc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3501-improper-validation-of-certificate-with-host-mismatch-in-red-hat-red-hat-build-of-keycloak-bedc4f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3501%3A%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch&amp;severity=high&amp;id=682d983bc4522896dcbedc4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46344-cwe-613-insufficient-session-expiration-in-auth0-nextjs-auth0-bee306</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46344%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=682d983bc4522896dcbee306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46550-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yeswiki-yeswiki-bee30a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46550%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YesWiki%20yeswiki&amp;severity=medium&amp;id=682d983bc4522896dcbee30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46549-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yeswiki-yeswiki-bee2d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46549%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YesWiki%20yeswiki&amp;severity=medium&amp;id=682d983bc4522896dcbee2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46348-cwe-287-improper-authentication-in-yeswiki-yeswiki-bee2af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46348%3A%20CWE-287%3A%20Improper%20Authentication%20in%20YesWiki%20yeswiki&amp;severity=critical&amp;id=682d983bc4522896dcbee2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4078-path-traversal-in-wangshen-secgate-3600-bee6fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4078%3A%20Path%20Traversal%20in%20Wangshen%20SecGate%203600&amp;severity=medium&amp;id=682d983cc4522896dcbee6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0520-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-showdoc-showdoc-bee668</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0520%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ShowDoc%20ShowDoc&amp;severity=critical&amp;id=682d983cc4522896dcbee668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4080-sql-injection-in-phpgurukul-online-nurse-hiring-system-bee828</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4080%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Nurse%20Hiring%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4079-buffer-overflow-in-pcman-ftp-server-bee900</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4079%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d983cc4522896dcbee900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mintsloader-malware-analysis-multi-stage-loader-us-aa561143</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MintsLoader%20Malware%20Analysis%3A%20Multi-Stage%20Loader%20Used%20in%20Cyber%20Attacks&amp;severity=medium&amp;id=6838a3fe182aa0cae2888b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4077-stack-based-buffer-overflow-in-code-projects-school-billing-system-bee948</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4077%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20School%20Billing%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4076-command-injection-in-lb-link-bl-ac3600-bee91a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4076%3A%20Command%20Injection%20in%20LB-LINK%20BL-AC3600&amp;severity=medium&amp;id=682d983cc4522896dcbee91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4075-cross-site-scripting-in-vmsman-bee9c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4075%3A%20Cross%20Site%20Scripting%20in%20VMSMan&amp;severity=medium&amp;id=682d983cc4522896dcbee9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4074-sql-injection-in-phpgurukul-curfew-e-pass-management-system-bee99c</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4074%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3911-cwe-532-insertion-of-sensitive-information-into-log-file-in-docker-docker-desktop-bee954</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3911%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Docker%20Docker%20Desktop&amp;severity=medium&amp;id=682d983cc4522896dcbee954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4095-cwe-862-missing-authorization-in-docker-docker-desktop-bee97e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4095%3A%20CWE-862%20Missing%20Authorization%20in%20Docker%20Docker%20Desktop&amp;severity=medium&amp;id=682d983cc4522896dcbee97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46350-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yeswiki-yeswiki-bee95c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46350%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YesWiki%20yeswiki&amp;severity=low&amp;id=682d983cc4522896dcbee95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46349-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yeswiki-yeswiki-bee958</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46349%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YesWiki%20yeswiki&amp;severity=high&amp;id=682d983cc4522896dcbee958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46347-cwe-116-improper-encoding-or-escaping-of-output-in-yeswiki-yeswiki-bee950</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46347%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20YesWiki%20yeswiki&amp;severity=medium&amp;id=682d983cc4522896dcbee950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4073-sql-injection-in-phpgurukul-student-record-system-bee944</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4073%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4072-sql-injection-in-phpgurukul-online-nurse-hiring-system-bee940</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4072%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Nurse%20Hiring%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/outlaw-cybergang-attacking-targets-worldwide-c02e3191</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Outlaw%20cybergang%20attacking%20targets%20worldwide&amp;severity=medium&amp;id=68388802182aa0cae2849376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gremlin-stealer-new-stealer-on-sale-in-underground-399fed21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gremlin%20Stealer%3A%20New%20Stealer%20on%20Sale%20in%20Underground%20Forum&amp;severity=medium&amp;id=68388802182aa0cae2849385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0716-cwe-791-incomplete-filtering-of-special-elements-in-google-angularjs-aeb850</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0716%3A%20CWE-791%3A%20Incomplete%20Filtering%20of%20Special%20Elements%20in%20Google%20AngularJS&amp;severity=medium&amp;id=682cd0f81484d88663aeb850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23181-cwe-250-execution-with-unnecessary-privileges-in-ribbon-communications-apollo-9608-bee9c0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23181%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Ribbon%20Communications%20Apollo%209608&amp;severity=high&amp;id=682d983cc4522896dcbee9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23180-cwe-250-execution-with-unnecessary-privileges-in-ribbon-communications-apollo-9608-bee9a9</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23180%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Ribbon%20Communications%20Apollo%209608&amp;severity=high&amp;id=682d983cc4522896dcbee9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23179-cwe-798-use-of-hard-coded-credentials-in-ribbon-communications-apollo-9608-bee98c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23179%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Ribbon%20Communications%20Apollo%209608&amp;severity=medium&amp;id=682d983cc4522896dcbee98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23178-cwe-923-improper-restriction-of-communication-channel-to-intended-endpoints-in-ribbon-communications-apollo-9608-bee988</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23178%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Ribbon%20Communications%20Apollo%209608&amp;severity=high&amp;id=682d983cc4522896dcbee988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23177-cwe-427-uncontrolled-search-path-element-in-ribbon-communications-apollo-9608-bee984</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23177%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Ribbon%20Communications%20Apollo%209608&amp;severity=high&amp;id=682d983cc4522896dcbee984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4071-sql-injection-in-phpgurukul-covid19-testing-management-system-bee97a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4071%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4070-sql-injection-in-phpgurukul-rail-pass-management-system-bee960</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4070%3A%20SQL%20Injection%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40619-cwe-863-incorrect-authorization-in-bookgy-bookgy-beea4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40619%3A%20CWE-863%20Incorrect%20Authorization%20in%20Bookgy%20Bookgy&amp;severity=critical&amp;id=682d983cc4522896dcbeea4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40618-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-bookgy-bookgy-beeac0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40618%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bookgy%20Bookgy&amp;severity=critical&amp;id=682d983cc4522896dcbeeac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40617-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-bookgy-bookgy-beea27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40617%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bookgy%20Bookgy&amp;severity=critical&amp;id=682d983cc4522896dcbeea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1551-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ibm-operational-decision-manager-beea17</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Operational%20Decision%20Manager&amp;severity=medium&amp;id=682d983cc4522896dcbeea17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40616-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-bookgy-bookgy-beea1f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40616%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bookgy%20Bookgy&amp;severity=medium&amp;id=682d983cc4522896dcbeea1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40615-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-bookgy-bookgy-bee990</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bookgy%20Bookgy&amp;severity=medium&amp;id=682d983cc4522896dcbee990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46346-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yeswiki-yeswiki-bee994</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46346%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YesWiki%20yeswiki&amp;severity=medium&amp;id=682d983cc4522896dcbee994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4069-stack-based-buffer-overflow-in-code-projects-product-management-system-bee998</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4069%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Product%20Management%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4068-stack-based-buffer-overflow-in-code-projects-simple-movie-ticket-booking-system-beeaac</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4068%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Simple%20Movie%20Ticket%20Booking%20System&amp;severity=medium&amp;id=682d983cc4522896dcbeeaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4067-improper-access-controls-in-scriptandtools-online-travling-system-beebc0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4067%3A%20Improper%20Access%20Controls%20in%20ScriptAndTools%20Online-Travling-System&amp;severity=medium&amp;id=682d983cc4522896dcbeebc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4066-improper-access-controls-in-scriptandtools-online-travling-system-beedc1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4066%3A%20Improper%20Access%20Controls%20in%20ScriptAndTools%20Online-Travling-System&amp;severity=medium&amp;id=682d983cc4522896dcbeedc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4065-improper-access-controls-in-scriptandtools-online-travling-system-beedaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4065%3A%20Improper%20Access%20Controls%20in%20ScriptAndTools%20Online-Travling-System&amp;severity=medium&amp;id=682d983cc4522896dcbeedaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4064-improper-access-controls-in-scriptandtools-online-travling-system-beeeff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4064%3A%20Improper%20Access%20Controls%20in%20ScriptAndTools%20Online-Travling-System&amp;severity=medium&amp;id=682d983cc4522896dcbeeeff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3301-cwe-1255-comparison-logic-is-vulnerable-to-power-side-channel-attacks-in-silabs-com-series-2-socs-and-associated-modules-beef9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3301%3A%20CWE-1255%20Comparison%20Logic%20is%20Vulnerable%20to%20Power%20Side-Channel%20Attacks%20in%20silabs.com%20Series%202%20SoCs%20and%20associated%20modules&amp;severity=low&amp;id=682d983dc4522896dcbeef9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4063-stack-based-buffer-overflow-in-code-projects-student-information-management-system-bd70cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4063%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd70cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4062-stack-based-buffer-overflow-in-code-projects-theater-seat-booking-system-beed3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4062%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Theater%20Seat%20Booking%20System&amp;severity=medium&amp;id=682d983cc4522896dcbeed3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4093-memory-safety-bug-fixed-in-firefox-esr-128-10-and-thunderbird-128-10-in-mozilla-firefox-esr-beccf5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4093%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682d9839c4522896dcbeccf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4092-memory-safety-bugs-fixed-in-firefox-138-and-thunderbird-138-in-mozilla-firefox-beebc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4092%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d983cc4522896dcbeebc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4091-memory-safety-bugs-fixed-in-firefox-138-thunderbird-138-firefox-esr-128-10-and-thunderbird-128-10-in-mozilla-firefox-beccf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4091%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682d9839c4522896dcbeccf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4090-leaked-library-paths-in-thunderbird-for-android-in-mozilla-firefox-becced</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4090%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9839c4522896dcbecced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4089-potential-local-code-execution-in-copy-as-curl-command-in-mozilla-firefox-bee3d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4089%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d983bc4522896dcbee3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4088-cross-site-request-forgery-via-storage-access-api-redirects-in-mozilla-firefox-becce7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4088%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9839c4522896dcbecce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4087-unsafe-attribute-access-during-xpath-parsing-in-mozilla-firefox-becce3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4087%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9839c4522896dcbecce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4086-specially-crafted-filename-could-be-used-to-obscure-download-type-in-mozilla-firefox-beccd6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4086%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9839c4522896dcbeccd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4085-potential-information-leakage-and-privilege-escalation-in-uitour-actor-in-mozilla-firefox-bebfec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4085%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682d9838c4522896dcbebfec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4084-potential-local-code-execution-in-copy-as-curl-command-in-mozilla-firefox-esr-bebfe8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4084%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9838c4522896dcbebfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4083-process-isolation-bypass-using-javascript-uri-links-in-cross-origin-frames-in-mozilla-firefox-bd8f40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4083%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=682d981ac4522896dcbd8f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4082-webgl-shader-attribute-memory-corruption-in-thunderbird-for-macos-in-mozilla-firefox-bebfe4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4082%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9838c4522896dcbebfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2817-privilege-escalation-in-thunderbird-updater-in-mozilla-firefox-beccc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2817%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682d9839c4522896dcbeccc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4061-stack-based-buffer-overflow-in-code-projects-clothing-store-management-system-bef11f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4061%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Clothing%20Store%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4035-improper-handling-of-case-sensitivity-in-red-hat-red-hat-enterprise-linux-6-bef0ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4035%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=682d983dc4522896dcbef0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4060-sql-injection-in-phpgurukul-notice-board-system-bef11b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4060%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4059-stack-based-buffer-overflow-in-code-projects-prison-management-system-bef0cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4059%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Prison%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3891-uncaught-exception-in-red-hat-red-hat-enterprise-linux-8-bd6858</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3891%3A%20Uncaught%20Exception&amp;severity=high&amp;id=682d9816c4522896dcbd6858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58099-vulnerability-in-linux-linux-bde395</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3929-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-mdaemon-email-server-bef0de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3929%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20MDaemon%20Email%20Server&amp;severity=medium&amp;id=682d983dc4522896dcbef0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4058-sql-injection-in-projectworlds-online-examination-system-bef0f3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4058%3A%20SQL%20Injection%20in%20Projectworlds%20Online%20Examination%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1194-cwe-1333-inefficient-regular-expression-complexity-in-huggingface-huggingface-transformers-bef0d4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1194%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=682d983dc4522896dcbef0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30194-cwe-416-user-after-free-in-powerdns-dnsdist-bef0a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30194%3A%20CWE-416%20User%20After%20Free%20in%20PowerDNS%20DNSdist&amp;severity=high&amp;id=682d983dc4522896dcbef0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3452-cwe-862-missing-authorization-in-secupress-secupress-free-wordpress-security-bef0ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3452%3A%20CWE-862%20Missing%20Authorization%20in%20secupress%20SecuPress%20with%20Simple%20SSL%20%E2%80%93%20Simple%20and%20Performant%20Security&amp;severity=medium&amp;id=682d983dc4522896dcbef0ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2893-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jegstudio-gutenverse-ultimate-block-addons-and-page-builder-for-site-editor-bef07f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20%E2%80%93%20Ultimate%20WordPress%20FSE%20Blocks%20Addons%20%26%20Ecosystem&amp;severity=medium&amp;id=682d983dc4522896dcbef07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12273-cwe-79-cross-site-scripting-xss-in-unknown-calculated-fields-form-bef07b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12273%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Calculated%20Fields%20Form&amp;severity=low&amp;id=682d983dc4522896dcbef07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46329-cwe-532-insertion-of-sensitive-information-into-log-file-in-snowflakedb-libsnowflakeclient-bef0bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46329%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20snowflakedb%20libsnowflakeclient&amp;severity=low&amp;id=682d983dc4522896dcbef0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46343-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-n8n-io-n8n-bef0c4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46343%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=682d983dc4522896dcbef0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46338-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-advplyr-audiobookshelf-bef0c0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46338%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf&amp;severity=medium&amp;id=682d983dc4522896dcbef0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46330-cwe-573-improper-following-of-specification-by-caller-in-snowflakedb-libsnowflakeclient-bef056</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46330%3A%20CWE-573%3A%20Improper%20Following%20of%20Specification%20by%20Caller%20in%20snowflakedb%20libsnowflakeclient&amp;severity=low&amp;id=682d983dc4522896dcbef056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24252-an-attacker-on-the-local-network-may-be-able-to-corrupt-process-memory-in-apple-tvos-bed355</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24252%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d983ac4522896dcbed355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31197-an-attacker-on-the-local-network-may-cause-an-unexpected-app-termination-in-apple-tvos-bedd97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31197%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbedd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24179-an-attacker-on-the-local-network-may-be-able-to-cause-a-denial-of-service-in-apple-visionos-bede26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24179%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbede26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24270-an-attacker-on-the-local-network-may-be-able-to-leak-sensitive-user-information-in-apple-tvos-bede49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24270%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbede49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24271-an-unauthenticated-user-on-the-same-network-as-a-signed-in-mac-could-send-it-airplay-commands-without-pairing-in-apple-tvos-bede4d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24271%3A%20An%20unauthenticated%20user%20on%20the%20same%20network%20as%20a%20signed-in%20Mac%20could%20send%20it%20AirPlay%20commands%20without%20pairing%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbede4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24206-an-attacker-on-the-local-network-may-be-able-to-bypass-authentication-policy-in-apple-tvos-bed34f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24206%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20bypass%20authentication%20policy%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d983ac4522896dcbed34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24251-an-attacker-on-the-local-network-may-cause-an-unexpected-app-termination-in-apple-watchos-bede2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24251%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbede2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31202-an-attacker-on-the-local-network-may-be-able-to-cause-a-denial-of-service-in-apple-tvos-beec25</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31202%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983cc4522896dcbeec25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31203-an-attacker-on-the-local-network-may-be-able-to-cause-a-denial-of-service-in-apple-watchos-beddb3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31203%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbeddb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30445-an-attacker-on-the-local-network-may-cause-an-unexpected-app-termination-in-apple-tvos-bedd93</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30445%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbedd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57698-n-a-in-n-a-bee129</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57698%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45956-n-a-in-n-a-bda52c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45956%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25403-n-a-in-n-a-bda4ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25403%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32354-n-a-in-n-a-bda4ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25962-n-a-in-n-a-bda4a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25962%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-29-2a3124</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-29&amp;severity=medium&amp;id=682c7db2e8347ec82d2a3124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-29-f1291a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f1291a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46328-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-snowflakedb-snowflake-connector-nodejs-bef04e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46328%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20snowflakedb%20snowflake-connector-nodejs&amp;severity=low&amp;id=682d983dc4522896dcbef04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46327-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-snowflakedb-gosnowflake-bef046</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46327%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20snowflakedb%20gosnowflake&amp;severity=low&amp;id=682d983dc4522896dcbef046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46326-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-snowflakedb-snowflake-connector-net-bef02d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46326%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20snowflakedb%20snowflake-connector-net&amp;severity=low&amp;id=682d983dc4522896dcbef02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4039-sql-injection-in-phpgurukul-rail-pass-management-system-bef307</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4039%3A%20SQL%20Injection%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4038-stack-based-buffer-overflow-in-code-projects-train-ticket-reservation-system-bef2e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4038%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Train%20Ticket%20Reservation%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11922-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-fortra-goanywhere-mft-bef2ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=682d983dc4522896dcbef2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0049-cwe-209-generation-of-error-message-containing-sensitive-information-in-fortra-goanywhere-bef2d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0049%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Fortra%20GoAnywhere&amp;severity=low&amp;id=682d983dc4522896dcbef2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10635-cwe-20-improper-input-validation-in-proofpoint-enterprise-protection-bef2ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10635%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Proofpoint%20Enterprise%20Protection&amp;severity=medium&amp;id=682d983dc4522896dcbef2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4037-business-logic-errors-in-code-projects-atm-banking-bef2d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4037%3A%20Business%20Logic%20Errors%20in%20code-projects%20ATM%20Banking&amp;severity=medium&amp;id=682d983dc4522896dcbef2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4036-improper-access-controls-in-201206030-novel-bef36c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4036%3A%20Improper%20Access%20Controls%20in%20201206030%20Novel&amp;severity=medium&amp;id=682d983dc4522896dcbef36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4034-sql-injection-in-projectworlds-online-examination-system-bef368</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4034%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Examination%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3224-cwe-269-improper-privilege-management-in-docker-docker-desktop-bef420</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3224%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Docker%20Docker%20Desktop&amp;severity=high&amp;id=682d983dc4522896dcbef420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34491-cwe-502-deserialization-of-untrusted-data-in-gfi-mailessentials-bef41c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34491%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20MailEssentials&amp;severity=high&amp;id=682d983dc4522896dcbef41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31651-cwe-116-improper-encoding-or-escaping-of-output-in-apache-software-foundation-apache-tomcat-bd9e21</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31651%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=682d981bc4522896dcbd9e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31650-cwe-459-incomplete-cleanup-in-apache-software-foundation-apache-tomcat-bd9e72</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31650%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=682d981bc4522896dcbd9e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34490-cwe-611-improper-restriction-of-xml-external-entity-reference-in-gfi-mailessentials-bef3e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34490%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20GFI%20MailEssentials&amp;severity=medium&amp;id=682d983dc4522896dcbef3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4033-sql-injection-in-phpgurukul-nipah-virus-testing-management-system-bef3c9</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4033%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34489-cwe-502-deserialization-of-untrusted-data-in-gfi-mailessentials-bef428</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34489%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20MailEssentials&amp;severity=high&amp;id=682d983dc4522896dcbef428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4032-os-command-injection-in-inclusionai-aworld-bef466</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4032%3A%20OS%20Command%20Injection%20in%20inclusionAI%20AWorld&amp;severity=low&amp;id=682d983dc4522896dcbef466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4031-sql-injection-in-phpgurukul-pre-school-enrollment-system-bef43c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4031%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12706-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-opentext-digital-asset-management-bef438</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12706%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OpenText%E2%84%A2%20Digital%20Asset%20Management.&amp;severity=low&amp;id=682d983dc4522896dcbef438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4030-sql-injection-in-phpgurukul-covid19-testing-management-system-bef5bc</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4030%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4029-stack-based-buffer-overflow-in-code-projects-personal-diary-management-system-bef5f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4029%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Personal%20Diary%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4028-sql-injection-in-phpgurukul-covid19-testing-management-system-bef5b4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4028%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pick-your-poison-a-double-edged-email-attack-08b99aea</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pick%20your%20Poison%20-%20A%20Double-Edged%20Email%20Attack&amp;severity=medium&amp;id=6837364b182aa0cae25380fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43857-cwe-400-uncontrolled-resource-consumption-in-ruby-net-imap-bef596</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43857%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ruby%20net-imap&amp;severity=medium&amp;id=682d983dc4522896dcbef596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4027-sql-injection-in-phpgurukul-old-age-home-management-system-bef5ae</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4027%3A%20SQL%20Injection%20in%20PHPGurukul%20Old%20Age%20Home%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43854-cwe-1021-improper-restriction-of-rendered-ui-layers-or-frames-in-langgenius-dify-bef585</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43854%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20langgenius%20dify&amp;severity=low&amp;id=682d983dc4522896dcbef585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4026-sql-injection-in-phpgurukul-nipah-virus-testing-management-system-bdcc6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4026%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdcc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4025-sql-injection-in-itsourcecode-placement-management-system-bef63f</loc>
    <lastmod>2026-04-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4025%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23377-cwe-116-improper-encoding-or-escaping-of-output-in-dell-powerprotect-data-manager-bef888</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23377%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=682d983dc4522896dcbef888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23376-cwe-1336-improper-neutralization-of-special-elements-used-in-a-template-engine-in-dell-powerprotect-data-manager-reporting-bef622</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23376%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Dell%20PowerProtect%20Data%20Manager%20Reporting&amp;severity=low&amp;id=682d983dc4522896dcbef622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4024-sql-injection-in-itsourcecode-placement-management-system-bef630</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4024%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23375-cwe-648-incorrect-use-of-privileged-apis-in-dell-powerprotect-data-manager-bee3d1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23375%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=682d983bc4522896dcbee3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4023-sql-injection-in-itsourcecode-placement-management-system-bef97a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4023%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbef97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4022-code-injection-in-web-arena-x-webarena-bef317</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4022%3A%20Code%20Injection%20in%20web-arena-x%20webarena&amp;severity=medium&amp;id=682d983dc4522896dcbef317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4021-sql-injection-in-code-projects-patient-record-management-system-bef5aa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4021%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4020-sql-injection-in-phpgurukul-old-age-home-management-system-bef5a2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4020%3A%20SQL%20Injection%20in%20PHPGurukul%20Old%20Age%20Home%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32472-cwe-400-uncontrolled-resource-consumption-in-sick-ag-sick-multiscan1xx-bef69a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32472%3A%20CWE-400%20(Uncontrolled%20Resource%20Consumption)%20in%20SICK%20AG%20SICK%20multiScan1XX&amp;severity=medium&amp;id=682d983dc4522896dcbef69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4019-missing-authentication-in-20120630-novel-plus-bef59e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4019%3A%20Missing%20Authentication%20in%2020120630%20Novel-Plus&amp;severity=medium&amp;id=682d983dc4522896dcbef59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4018-missing-authentication-in-20120630-novel-plus-befa59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4018%3A%20Missing%20Authentication%20in%2020120630%20Novel-Plus&amp;severity=medium&amp;id=682d983ec4522896dcbefa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4017-improper-authorization-in-20120630-novel-plus-befa51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4017%3A%20Improper%20Authorization%20in%2020120630%20Novel-Plus&amp;severity=medium&amp;id=682d983ec4522896dcbefa51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4016-improper-authorization-in-20120630-novel-plus-befa3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4016%3A%20Improper%20Authorization%20in%2020120630%20Novel-Plus&amp;severity=medium&amp;id=682d983ec4522896dcbefa3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4015-missing-authentication-in-20120630-novel-plus-befa38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4015%3A%20Missing%20Authentication%20in%2020120630%20Novel-Plus&amp;severity=medium&amp;id=682d983ec4522896dcbefa38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3200-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-wiesemann-theis-com-server-befa34</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3200%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Wiesemann%20%26%20Theis%20Com-Server%2B%2B&amp;severity=critical&amp;id=682d983ec4522896dcbefa34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4014-sql-injection-in-phpgurukul-art-gallery-management-system-befa1c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4014%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbefa1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32471-cwe-1391-use-of-weak-credentials-in-sick-ag-sick-flx3-cpuc200-bef75e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32471%3A%20CWE-1391%20(Use%20of%20Weak%20Credentials)%20in%20SICK%20AG%20SICK%20FLX3-CPUC200&amp;severity=low&amp;id=682d983dc4522896dcbef75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39367-cwe-862-missing-authorization-in-seventhqueen-kleo-befa18</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39367%3A%20Missing%20Authorization%20in%20SeventhQueen%20Kleo&amp;severity=null&amp;id=682d983ec4522896dcbefa18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32470-cwe-284-improper-access-control-in-sick-ag-sick-flx0-gpnt100-bef756</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32470%3A%20CWE-284%20(Improper%20Access%20Control)%20in%20SICK%20AG%20SICK%20FLX0-GPNT100&amp;severity=high&amp;id=682d983dc4522896dcbef756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4013-sql-injection-in-phpgurukul-art-gallery-management-system-befa10</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4013%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbefa10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4012-server-side-request-forgery-in-playeduxyz-playedu-bef712</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4012%3A%20Server-Side%20Request%20Forgery%20in%20playeduxyz%20PlayEdu%20%E5%BC%80%E6%BA%90%E5%9F%B9%E8%AE%AD%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=682d983dc4522896dcbef712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42598-incorrect-default-permissions-in-seiko-epson-corporation-seiko-epson-printer-drivers-for-windows-os-bef6da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42598%3A%20Incorrect%20default%20permissions%20in%20SEIKO%20EPSON%20CORPORATION%20SEIKO%20EPSON%20printer%20drivers%20for%20Windows%20OS&amp;severity=high&amp;id=682d983dc4522896dcbef6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4011-cross-site-scripting-in-redmine-bef701</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4011%3A%20Cross%20Site%20Scripting%20in%20Redmine&amp;severity=medium&amp;id=682d983dc4522896dcbef701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4007-stack-based-buffer-overflow-in-tenda-w12-bef6ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4007%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W12&amp;severity=high&amp;id=682d983dc4522896dcbef6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22235-cwe-20-improper-input-validation-in-spring-spring-boot-aeba5d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22235%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=682cd0f91484d88663aeba5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4006-unrestricted-upload-in-youyiio-beyongcms-bef963</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4006%3A%20Unrestricted%20Upload%20in%20youyiio%20BeyongCms&amp;severity=medium&amp;id=682d983ec4522896dcbef963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4005-sql-injection-in-phpgurukul-covid19-testing-management-system-bef956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4005%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbef956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4004-sql-injection-in-phpgurukul-covid19-testing-management-system-bec259</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4004%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0627-cwe-79-cross-site-scripting-xss-in-unknown-wordpress-tag-category-and-taxonomy-manager-bef687</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0627%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WordPress%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager&amp;severity=low&amp;id=682d983dc4522896dcbef687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9771-cwe-89-sql-injection-in-unknown-wp-recall-bef658</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9771%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WP-Recall&amp;severity=low&amp;id=682d983dc4522896dcbef658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13688-cwe-287-improper-authentication-in-unknown-admin-and-site-enhancements-ase-bef60d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13688%3A%20CWE-287%20Improper%20Authentication%20in%20Unknown%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=medium&amp;id=682d983dc4522896dcbef60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4003-null-pointer-dereference-in-refindplusrepo-refindplus-bef94e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4003%3A%20NULL%20Pointer%20Dereference%20in%20RefindPlusRepo%20RefindPlus&amp;severity=medium&amp;id=682d983ec4522896dcbef94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4002-null-pointer-dereference-in-refindplusrepo-refindplus-bef94a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4002%3A%20NULL%20Pointer%20Dereference%20in%20RefindPlusRepo%20RefindPlus&amp;severity=medium&amp;id=682d983ec4522896dcbef94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4001-uncontrolled-file-descriptor-consumption-in-scipopt-scip-bef946</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4001%3A%20Uncontrolled%20File%20Descriptor%20Consumption%20in%20scipopt%20scip&amp;severity=medium&amp;id=682d983ec4522896dcbef946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4000-cross-site-scripting-in-seeyon-zhiyuan-oa-web-application-system-bef59a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4000%3A%20Cross%20Site%20Scripting%20in%20Seeyon%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3999-cross-site-scripting-in-seeyon-zhiyuan-oa-web-application-system-bd6be7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3999%3A%20Cross%20Site%20Scripting%20in%20Seeyon%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3998-sql-injection-in-codeastro-membership-management-system-bef568</loc>
    <lastmod>2026-04-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3998%3A%20SQL%20Injection%20in%20CodeAstro%20Membership%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3706-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-104-corporation-ehrms-bef53f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20104%20Corporation%20eHRMS&amp;severity=medium&amp;id=682d983dc4522896dcbef53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3997-cross-site-request-forgery-in-dazhouda-lecms-bef4cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3997%3A%20Cross-Site%20Request%20Forgery%20in%20dazhouda%20lecms&amp;severity=medium&amp;id=682d983dc4522896dcbef4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3996-cross-site-scripting-in-totolink-n150rt-bef4c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3996%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d983dc4522896dcbef4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3995-cross-site-scripting-in-totolink-n150rt-bef462</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3995%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d983dc4522896dcbef462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3994-cross-site-scripting-in-totolink-n150rt-bef92f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3994%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d983dc4522896dcbef92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3993-buffer-overflow-in-totolink-n150rt-bef8dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3993%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3992-buffer-overflow-in-totolink-n150rt-bef8d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3992%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-2079-cwe-96-improper-neutralization-of-directives-in-statically-saved-code-static-code-injection-in-usermin-usermin-bef837</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-2079%3A%20CWE-96%20Improper%20Neutralization%20of%20Directives%20in%20Statically%20Saved%20Code%20(&apos;Static%20Code%20Injection&apos;)%20in%20Usermin%20Usermin&amp;severity=critical&amp;id=682d983dc4522896dcbef837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46614-cwe-532-insertion-of-sensitive-information-into-log-file-in-snowflake-snowflake-odbc-bef739</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46614%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Snowflake%20Snowflake%20ODBC&amp;severity=low&amp;id=682d983dc4522896dcbef739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35814-cwe-502-deserialization-of-untrusted-data-in-devexpress-devexpress-bef731</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35814%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20DevExpress%20DevExpress&amp;severity=low&amp;id=682d983dc4522896dcbef731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41871-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-seppmail-seppmail-bef720</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41871%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SEPPmail%20SEPPmail&amp;severity=medium&amp;id=682d983dc4522896dcbef720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46661-cwe-1336-improper-neutralization-of-special-elements-used-in-a-template-engine-in-ipw-metazo-bef6c1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46661%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20IPW%20Metazo&amp;severity=critical&amp;id=682d983dc4522896dcbef6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25776-n-a-in-n-a-bef601</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25776%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-4582-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-thecartpress-boot-store-bef5f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-4582%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TheCartPress%20boot-store&amp;severity=high&amp;id=682d983dc4522896dcbef5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32499-cwe-94-improper-control-of-generation-of-code-code-injection-in-newforma-project-center-server-bef5ed</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32499%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Newforma%20Project%20Center%20Server&amp;severity=medium&amp;id=682d983dc4522896dcbef5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42404-cwe-94-improper-control-of-generation-of-code-code-injection-in-onevision-workspace-bef5e9</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42404%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OneVision%20Workspace&amp;severity=medium&amp;id=682d983dc4522896dcbef5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35817-cwe-918-server-side-request-forgery-ssrf-in-devexpress-devexpress-bef522</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35817%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20DevExpress%20DevExpress&amp;severity=medium&amp;id=682d983dc4522896dcbef522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35816-cwe-23-relative-path-traversal-in-devexpress-devexpress-bef51e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35816%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20DevExpress%20DevExpress&amp;severity=low&amp;id=682d983dc4522896dcbef51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35815-cwe-502-deserialization-of-untrusted-data-in-devexpress-devexpress-bef4f4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35815%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20DevExpress%20DevExpress&amp;severity=low&amp;id=682d983dc4522896dcbef4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45953-n-a-in-n-a-bef020</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45953%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45949-n-a-in-n-a-bef01c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45949%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45947-n-a-in-n-a-bef018</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45947%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-28-2a3d1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-28&amp;severity=medium&amp;id=682c7db2e8347ec82d2a3d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-28-f12421</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31144-improper-restriction-of-communication-channel-to-intended-endpoints-in-sios-technology-inc-quick-agent-v3-bef884</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31144%3A%20Improper%20restriction%20of%20communication%20channel%20to%20intended%20endpoints%20in%20SIOS%20Technology%2C%20Inc.%20Quick%20Agent%20V3&amp;severity=medium&amp;id=682d983dc4522896dcbef884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27937-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-sios-technology-inc-quick-agent-v3-bef873</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27937%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20SIOS%20Technology%2C%20Inc.%20Quick%20Agent%20V3&amp;severity=medium&amp;id=682d983dc4522896dcbef873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26692-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-sios-technology-inc-quick-agent-v3-bef84e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26692%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20SIOS%20Technology%2C%20Inc.%20Quick%20Agent%20V3&amp;severity=high&amp;id=682d983dc4522896dcbef84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3991-buffer-overflow-in-totolink-n150rt-bef86b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3991%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3990-buffer-overflow-in-totolink-n150rt-bef863</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3990%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3989-buffer-overflow-in-totolink-n150rt-bef7fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3989%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3988-buffer-overflow-in-totolink-n150rt-bef7e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3988%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3987-command-injection-in-totolink-n150rt-bef628</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3987%3A%20Command%20Injection%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d983dc4522896dcbef628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3986-inefficient-regular-expression-complexity-in-apereo-cas-bef609</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3986%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Apereo%20CAS&amp;severity=medium&amp;id=682d983dc4522896dcbef609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3985-inefficient-regular-expression-complexity-in-apereo-cas-bef564</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3985%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Apereo%20CAS&amp;severity=medium&amp;id=682d983dc4522896dcbef564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3984-code-injection-in-apereo-cas-bef553</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3984%3A%20Code%20Injection%20in%20Apereo%20CAS&amp;severity=low&amp;id=682d983dc4522896dcbef553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3983-command-injection-in-amtt-hotel-broadband-operation-system-bec267</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3983%3A%20Command%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2866-cwe-347-improper-verification-of-cryptographic-signature-in-the-document-foundation-libreoffice-bef9af</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2866%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=low&amp;id=682d983ec4522896dcbef9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3982-improperly-controlled-modification-of-object-prototype-attributes-prototype-pollution-in-nortikin-sverchok-bef54b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3982%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nortikin%20Sverchok&amp;severity=medium&amp;id=682d983dc4522896dcbef54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3981-improper-authorization-in-wowjoy-internet-doctor-workstation-system-bef9f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3981%3A%20Improper%20Authorization%20in%20wowjoy%20%E6%B5%99%E6%B1%9F%E6%B9%96%E5%B7%9E%E5%8D%8E%E5%8D%93%E4%BF%A1%E6%81%AF%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Internet%20Doctor%20Workstation%20System&amp;severity=medium&amp;id=682d983ec4522896dcbef9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3980-improper-authorization-in-wowjoy-internet-doctor-workstation-system-bef9ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3980%3A%20Improper%20Authorization%20in%20wowjoy%20%E6%B5%99%E6%B1%9F%E6%B9%96%E5%B7%9E%E5%8D%8E%E5%8D%93%E4%BF%A1%E6%81%AF%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Internet%20Doctor%20Workstation%20System&amp;severity=medium&amp;id=682d983ec4522896dcbef9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3979-cross-site-request-forgery-in-dazhouda-lecms-bef9c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3979%3A%20Cross-Site%20Request%20Forgery%20in%20dazhouda%20lecms&amp;severity=medium&amp;id=682d983ec4522896dcbef9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3978-information-disclosure-in-dazhouda-lecms-bef9be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3978%3A%20Information%20Disclosure%20in%20dazhouda%20lecms&amp;severity=medium&amp;id=682d983ec4522896dcbef9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3977-improper-authorization-in-iteachyou-dreamer-cms-bef9a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3977%3A%20Improper%20Authorization%20in%20iteachyou%20Dreamer%20CMS&amp;severity=medium&amp;id=682d983ec4522896dcbef9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3976-sql-injection-in-phpgurukul-covid19-testing-management-system-bef9a1</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3976%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbef9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3975-information-disclosure-in-scriptandtools-ecommerce-website-in-php-bef952</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3975%3A%20Information%20Disclosure%20in%20ScriptAndTools%20eCommerce-website-in-PHP&amp;severity=medium&amp;id=682d983ec4522896dcbef952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3974-sql-injection-in-phpgurukul-covid19-testing-management-system-bef925</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3974%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3973-sql-injection-in-phpgurukul-covid19-testing-management-system-bef91d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3973%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3972-sql-injection-in-phpgurukul-covid19-testing-management-system-bef313</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3972%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3971-sql-injection-in-phpgurukul-covid19-testing-management-system-bef30f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3971%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3970-cross-site-scripting-in-baseweb-jsite-bef30b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3970%3A%20Cross%20Site%20Scripting%20in%20baseweb%20JSite&amp;severity=medium&amp;id=682d983dc4522896dcbef30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3969-unrestricted-upload-in-codeprojects-news-publishing-site-dashboard-bef357</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3969%3A%20Unrestricted%20Upload%20in%20codeprojects%20News%20Publishing%20Site%20Dashboard&amp;severity=medium&amp;id=682d983dc4522896dcbef357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3968-sql-injection-in-codeprojects-news-publishing-site-dashboard-bef894</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3968%3A%20SQL%20Injection%20in%20codeprojects%20News%20Publishing%20Site%20Dashboard&amp;severity=medium&amp;id=682d983dc4522896dcbef894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3886-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-cato-networks-sdp-client-bef6aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3886%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Cato%20Networks%20SDP%20Client&amp;severity=medium&amp;id=682d983dc4522896dcbef6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3967-improper-authorization-in-itwanger-paicoding-bef890</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3967%3A%20Improper%20Authorization%20in%20itwanger%20paicoding&amp;severity=medium&amp;id=682d983dc4522896dcbef890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3966-information-disclosure-in-itwanger-paicoding-bef88c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3966%3A%20Information%20Disclosure%20in%20itwanger%20paicoding&amp;severity=medium&amp;id=682d983dc4522896dcbef88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3965-cross-site-scripting-in-itwanger-paicoding-bef85f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3965%3A%20Cross%20Site%20Scripting%20in%20itwanger%20paicoding&amp;severity=medium&amp;id=682d983dc4522896dcbef85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3964-cross-site-request-forgery-in-withstars-books-management-system-bef7c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3964%3A%20Cross-Site%20Request%20Forgery%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52888-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-checkpoint-check-point-mobile-access-bef683</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52888%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;).%20in%20checkpoint%20Check%20Point%20Mobile%20Access&amp;severity=medium&amp;id=682d983dc4522896dcbef683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52887-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-checkpoint-check-point-mobile-access-bef67f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52887%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;).%20in%20checkpoint%20Check%20Point%20Mobile%20Access&amp;severity=low&amp;id=682d983dc4522896dcbef67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3963-missing-authorization-in-withstars-books-management-system-bef906</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3963%3A%20Missing%20Authorization%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3962-cross-site-scripting-in-withstars-books-management-system-bef902</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3962%3A%20Cross%20Site%20Scripting%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3961-cross-site-scripting-in-withstars-books-management-system-bef8cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3961%3A%20Cross%20Site%20Scripting%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3960-missing-authorization-in-withstars-books-management-system-bef8c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3960%3A%20Missing%20Authorization%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3959-cross-site-request-forgery-in-withstars-books-management-system-bef7bd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3959%3A%20Cross-Site%20Request%20Forgery%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3958-cross-site-scripting-in-withstars-books-management-system-bef353</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3958%3A%20Cross%20Site%20Scripting%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3957-sql-injection-in-opplus-springboot-admin-bef34f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3957%3A%20SQL%20Injection%20in%20opplus%20springboot-admin&amp;severity=medium&amp;id=682d983dc4522896dcbef34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3956-sql-injection-in-201206030-novel-cloud-bef34b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3956%3A%20SQL%20Injection%20in%20201206030%20novel-cloud&amp;severity=medium&amp;id=682d983dc4522896dcbef34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46580-cwe-400-uncontrolled-resource-consumption-in-zte-goldendb-bef833</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46580%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20ZTE%20GoldenDB&amp;severity=high&amp;id=682d983dc4522896dcbef833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46579-cwe-94-improper-control-of-generation-of-code-code-injection-in-zte-goldendb-bef82f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46579%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ZTE%20GoldenDB&amp;severity=high&amp;id=682d983dc4522896dcbef82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46578-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-zte-goldendb-bef81e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46578%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ZTE%20GoldenDB&amp;severity=medium&amp;id=682d983dc4522896dcbef81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46577-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-zte-goldendb-bef816</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46577%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ZTE%20GoldenDB&amp;severity=medium&amp;id=682d983dc4522896dcbef816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46576-cwe-269-improper-privilege-management-in-zte-goldendb-bef80e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46576%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ZTE%20GoldenDB&amp;severity=medium&amp;id=682d983dc4522896dcbef80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46575-cwe-209-generation-of-error-message-containing-sensitive-information-in-zte-goldendb-bef806</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46575%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20ZTE%20GoldenDB&amp;severity=medium&amp;id=682d983dc4522896dcbef806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46574-cwe-20-improper-input-validation-in-zte-goldendb-bef7fe</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46574%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ZTE%20GoldenDB&amp;severity=medium&amp;id=682d983dc4522896dcbef7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3955-sql-injection-in-codeprojects-patient-record-management-system-bef543</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3955%3A%20SQL%20Injection%20in%20codeprojects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-27-17955e9b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-27&amp;severity=medium&amp;id=68367c97182aa0cae231c263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46690-cwe-425-direct-request-forced-browsing-in-ververica-ververica-platform-bef6e6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46690%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Ververica%20Ververica%20Platform&amp;severity=medium&amp;id=682d983dc4522896dcbef6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46689-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ververica-ververica-platform-bef6e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ververica%20Ververica%20Platform&amp;severity=medium&amp;id=682d983dc4522896dcbef6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46688-cwe-131-incorrect-calculation-of-buffer-size-in-quickjs-project-quickjs-bef6de</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46688%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20QuickJS%20Project%20QuickJS&amp;severity=medium&amp;id=682d983dc4522896dcbef6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46687-cwe-770-allocation-of-resources-without-limits-or-throttling-in-quickjs-project-quickjs-bef6d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46687%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20QuickJS%20Project%20QuickJS&amp;severity=medium&amp;id=682d983dc4522896dcbef6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46675-cwe-913-improper-control-of-dynamically-managed-code-resources-in-nasa-cryptolib-bef6d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46675%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20NASA%20CryptoLib&amp;severity=low&amp;id=682d983dc4522896dcbef6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46674-cwe-489-active-debug-code-in-nasa-cryptolib-bef6ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46674%3A%20CWE-489%20Active%20Debug%20Code%20in%20NASA%20CryptoLib&amp;severity=low&amp;id=682d983dc4522896dcbef6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46657-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-karaz-karazal-bef6bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46657%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Karaz%20Karazal&amp;severity=high&amp;id=682d983dc4522896dcbef6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46673-cwe-913-improper-control-of-dynamically-managed-code-resources-in-nasa-cryptolib-beecb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46673%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20NASA%20CryptoLib&amp;severity=medium&amp;id=682d983cc4522896dcbeecb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46672-cwe-252-unchecked-return-value-in-nasa-cryptolib-beecaa</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46672%3A%20CWE-252%20Unchecked%20Return%20Value%20in%20NASA%20CryptoLib&amp;severity=low&amp;id=682d983cc4522896dcbeecaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-27-73f0dd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-27&amp;severity=medium&amp;id=682c7ab8e3e6de8ceb73f0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-27-f12dff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3954-server-side-request-forgery-in-churchcrm-bef32d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3954%3A%20Server-Side%20Request%20Forgery%20in%20ChurchCRM&amp;severity=medium&amp;id=682d983dc4522896dcbef32d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hannibal-stealer-a-rebranded-threat-born-from-sharp-and-tx-lineage-28544e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HANNIBAL%20Stealer%3A%20A%20Rebranded%20Threat%20Born%20from%20Sharp%20and%20TX%20Lineage&amp;severity=medium&amp;id=68343d6f0acd01a24928544e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2101-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-thememove-edumall-professional-lms-education-center-wordpress-theme-bef790</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2101%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20EduMall%20-%20Professional%20LMS%20Education%20Center%20WordPress%20Theme&amp;severity=high&amp;id=682d983dc4522896dcbef790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13812-cwe-94-improper-control-of-generation-of-code-code-injection-in-anps-anps-theme-plugin-bef788</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13812%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Anps%20Anps%20Theme%20plugin&amp;severity=medium&amp;id=682d983dc4522896dcbef788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2851-buffer-overflow-in-gl-inet-gl-a1300-slate-plus-bef52e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2851%3A%20Buffer%20Overflow%20in%20GL.iNet%20GL-A1300%20Slate%20Plus&amp;severity=high&amp;id=682d983dc4522896dcbef52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2850-improper-authorization-in-gl-inet-gl-a1300-slate-plus-bef526</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2850%3A%20Improper%20Authorization%20in%20GL.iNet%20GL-A1300%20Slate%20Plus&amp;severity=medium&amp;id=682d983dc4522896dcbef526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2811-inefficient-regular-expression-complexity-in-gl-inet-gl-a1300-slate-plus-bef4bf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2811%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GL.iNet%20GL-A1300%20Slate%20Plus&amp;severity=medium&amp;id=682d983dc4522896dcbef4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2907-cwe-862-missing-authorization-in-unknown-order-delivery-date-beec1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2907%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Order%20Delivery%20Date&amp;severity=critical&amp;id=682d983cc4522896dcbeec1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3915-cwe-862-missing-authorization-in-aeropage-aeropage-sync-for-airtable-bef7b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3915%3A%20CWE-862%20Missing%20Authorization%20in%20aeropage%20Aeropage%20Sync%20for%20Airtable&amp;severity=medium&amp;id=682d983dc4522896dcbef7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3906-cwe-862-missing-authorization-in-felipe152-integra-o-entre-eduzz-e-woocommerce-bef7a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3906%3A%20CWE-862%20Missing%20Authorization%20in%20felipe152%20Integra%C3%A7%C3%A3o%20entre%20Eduzz%20e%20Woocommerce&amp;severity=high&amp;id=682d983dc4522896dcbef7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3914-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-aeropage-aeropage-sync-for-airtable-bef7af</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3914%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20aeropage%20Aeropage%20Sync%20for%20Airtable&amp;severity=high&amp;id=682d983dc4522896dcbef7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3491-cwe-94-improper-control-of-generation-of-code-code-injection-in-kiranpatil353-add-custom-page-template-bef798</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3491%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kiranpatil353%20Add%20custom%20page%20template&amp;severity=high&amp;id=682d983dc4522896dcbef798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1458-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bdthemes-element-pack-addons-for-elementor-best-elementor-addons-with-ready-templates-blocks-widgets-and-woocommerce-builder-bef31f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=682d983dc4522896dcbef31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2105-cwe-502-deserialization-of-untrusted-data-in-artbees-jupiter-x-core-bef325</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2105%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20artbees%20Jupiter%20X%20Core&amp;severity=high&amp;id=682d983dc4522896dcbef325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13808-cwe-94-improper-control-of-generation-of-code-code-injection-in-wpxpro-xpro-elementor-addons-pro-bef31b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13808%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WPXpro%20Xpro%20Elementor%20Addons%20-%20Pro&amp;severity=high&amp;id=682d983dc4522896dcbef31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-gif-leveraged-in-multi-stage-reverse-proxy-card-skimming-attack-283989</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20GIF%20Leveraged%20in%20Multi-Stage%20Reverse-Proxy%20Card%20Skimming%20Attack&amp;severity=medium&amp;id=6833daf00acd01a249283989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2801-cwe-94-improper-control-of-generation-of-code-code-injection-in-dorinabc-create-custom-forms-for-wordpress-with-a-smart-form-plugin-for-smart-businesses-form-builder-for-wordpress-bef329</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2801%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dorinabc%20Create%20custom%20forms%20for%20WordPress%20with%20a%20smart%20form%20plugin%20for%20smart%20businesses%20%E2%80%93%20Form%20builder%20for%20WordPress&amp;severity=high&amp;id=682d983dc4522896dcbef329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-persistent-threat-of-salt-typhoon-tracking-exposures-of-potentially-targeted-devices-283424</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Persistent%20Threat%20of%20Salt%20Typhoon%3A%20Tracking%20Exposures%20of%20Potentially%20Targeted%20Devices&amp;severity=medium&amp;id=6833becd0acd01a249283424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46652-cwe-830-inclusion-of-web-functionality-from-an-untrusted-source-in-izarc-izarc-bef752</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46652%3A%20CWE-830%20Inclusion%20of%20Web%20Functionality%20from%20an%20Untrusted%20Source%20in%20IZArc%20IZArc&amp;severity=medium&amp;id=682d983dc4522896dcbef752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46656-cwe-1284-improper-validation-of-specified-quantity-in-input-in-python-markdownify-python-markdownify-beeca6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46656%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20python-markdownify%20python-markdownify&amp;severity=low&amp;id=682d983cc4522896dcbeeca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46655-cwe-424-improper-protection-of-alternate-path-in-hackmd-codimd-beec97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46655%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20HackMD%20CodiMD&amp;severity=medium&amp;id=682d983cc4522896dcbeec97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46654-cwe-424-improper-protection-of-alternate-path-in-hackmd-codimd-beec80</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46654%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20HackMD%20CodiMD&amp;severity=medium&amp;id=682d983cc4522896dcbeec80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46653-cwe-338-use-of-cryptographically-weak-pseudo-random-number-generator-prng-in-node-formidable-formidable-beec7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46653%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20node-formidable%20Formidable&amp;severity=low&amp;id=682d983cc4522896dcbeec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46646-cwe-24-path-traversal-filedir-in-artifex-ghostscript-beec78</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46646%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Artifex%20Ghostscript&amp;severity=medium&amp;id=682d983cc4522896dcbeec78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53636-cwe-24-path-traversal-filedir-in-serosoft-academia-student-information-system-beec15</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53636%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Serosoft%20Academia%20Student%20Information%20System&amp;severity=medium&amp;id=682d983cc4522896dcbeec15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-26-2a3b76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-26&amp;severity=medium&amp;id=682c7db2e8347ec82d2a3b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-26-f130b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-26&amp;severity=medium&amp;id=682acdc2bbaf20d303f130b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46333-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-vancluever-z2d-bef937</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46333%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20vancluever%20z2d&amp;severity=high&amp;id=682d983dc4522896dcbef937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3935-cwe-287-improper-authentication-in-connectwise-screenconnect-beff58</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3935%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ConnectWise%20ScreenConnect&amp;severity=high&amp;id=682d983ec4522896dcbeff58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30152-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-hcl-software-hcl-sx-beffc5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30152%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20HCL%20Software%20HCL%20SX&amp;severity=medium&amp;id=682d983ec4522896dcbeffc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-version-of-triada-spreads-embedded-in-the-firmware-of-android-devices-2819c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20version%20of%20Triada%20spreads%20embedded%20in%20the%20firmware%20of%20Android%20devices&amp;severity=medium&amp;id=6833406d0acd01a2492819c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3928-cwe-noinfo-not-enough-information-in-commvault-web-server-bdcb59</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3928%3A%20CWE-noinfo%20Not%20enough%20information%20in%20Commvault%20Web%20Server&amp;severity=high&amp;id=682d981fc4522896dcbdcb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2070-cwe-611-improper-restriction-of-xml-external-entity-reference-xxe-in-filez-client-bf013e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2070%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20in%20FileZ%20Client&amp;severity=medium&amp;id=682d983ec4522896dcbf013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2069-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-filez-client-bf0136</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2069%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FileZ%20Client&amp;severity=medium&amp;id=682d983ec4522896dcbf0136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2068-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-filez-client-bf0132</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2068%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20FileZ%20Client&amp;severity=medium&amp;id=682d983ec4522896dcbf0132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56156-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-halo-dev-halo-befcc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56156%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20halo-dev%20halo&amp;severity=medium&amp;id=682d983ec4522896dcbefcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43862-cwe-284-improper-access-control-in-langgenius-dify-bf0244</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43862%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20langgenius%20dify&amp;severity=medium&amp;id=682d983ec4522896dcbf0244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32432-cwe-94-improper-control-of-generation-of-code-code-injection-in-craftcms-cms-bef27c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32432%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=critical&amp;id=682d983dc4522896dcbef27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32045-missing-authorization-bf0227</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32045%3A%20Missing%20Authorization&amp;severity=medium&amp;id=682d983ec4522896dcbf0227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32044-exposure-of-sensitive-information-to-an-unauthorized-actor-bf021f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32044%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=high&amp;id=682d983ec4522896dcbf021f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3647-incorrect-authorization-bef6a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3647%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=682d983dc4522896dcbef6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3645-incorrect-authorization-bef6a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3645%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=682d983dc4522896dcbef6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3644-incorrect-authorization-bef69e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3644%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=682d983dc4522896dcbef69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3643-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-bef67b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3643%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=682d983dc4522896dcbef67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3642-improper-control-of-generation-of-code-code-injection-bef668</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3642%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=682d983dc4522896dcbef668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3641-improper-control-of-generation-of-code-code-injection-bef664</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3641%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=682d983dc4522896dcbef664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3640-authorization-bypass-through-user-controlled-key-bef660</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3640%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&amp;severity=medium&amp;id=682d983dc4522896dcbef660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3638-cross-site-request-forgery-csrf-bef65c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3638%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=high&amp;id=682d983dc4522896dcbef65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3637-use-of-get-request-method-with-sensitive-query-strings-bf0240</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3637%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings&amp;severity=low&amp;id=682d983ec4522896dcbf0240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3636-authorization-bypass-through-user-controlled-key-bf022f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3636%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&amp;severity=medium&amp;id=682d983ec4522896dcbf022f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3635-cross-site-request-forgery-csrf-bf01db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3635%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=low&amp;id=682d983ec4522896dcbf01db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3628-exposure-of-sensitive-information-to-an-unauthorized-actor-bf01d7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3628%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=682d983ec4522896dcbf01d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3627-improper-authentication-bf01d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3627%3A%20Improper%20Authentication&amp;severity=medium&amp;id=682d983ec4522896dcbf01d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3625-authorization-bypass-through-user-controlled-key-bf01c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3625%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&amp;severity=high&amp;id=682d983ec4522896dcbf01c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46618-cwe-79-in-jetbrains-teamcity-bf0309</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46618%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682d983ec4522896dcbf0309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46433-cwe-23-in-jetbrains-teamcity-bf02d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46433%3A%20CWE-23%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682d983ec4522896dcbf02d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46432-cwe-532-in-jetbrains-teamcity-bf02c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46432%3A%20CWE-532%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682d983ec4522896dcbf02c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43016-cwe-23-in-jetbrains-rider-bf02b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43016%3A%20CWE-23%20in%20JetBrains%20Rider&amp;severity=medium&amp;id=682d983ec4522896dcbf02b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3634-improper-authentication-bf04a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3634%3A%20Improper%20Authentication&amp;severity=medium&amp;id=682d983fc4522896dcbf04a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6199-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-viasat-rm5110-bf04f2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6199%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ViaSat%20RM5110&amp;severity=medium&amp;id=682d983fc4522896dcbf04f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6198-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-viasat-rm4100-bd88de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6198%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ViaSat%20RM4100&amp;severity=high&amp;id=682d9819c4522896dcbd88de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2470-cwe-266-incorrect-privilege-assignment-in-aonetheme-service-finder-bookings-bf079c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2470%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=critical&amp;id=682d983fc4522896dcbf079c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11917-cwe-287-improper-authentication-in-eyecix-jobsearch-wp-job-board-bf0649</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11917%3A%20CWE-287%20Improper%20Authentication%20in%20eyecix%20JobSearch%20WP%20Job%20Board&amp;severity=high&amp;id=682d983fc4522896dcbf0649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3912-cwe-862-missing-authorization-in-westguard-ws-form-lite-drag-drop-contact-form-builder-for-wordpress-bf0651</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3912%3A%20CWE-862%20Missing%20Authorization%20in%20westguard%20WS%20Form%20LITE%20%E2%80%93%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=medium&amp;id=682d983fc4522896dcbf0651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2986-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ibm-maximo-asset-management-bf064d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Maximo%20Asset%20Management&amp;severity=medium&amp;id=682d983fc4522896dcbf064d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1565-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-teconcetheme-mayosis-core-bf04ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1565%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TeconceTheme%20Mayosis%20Core&amp;severity=high&amp;id=682d983fc4522896dcbf04ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1279-cwe-862-missing-authorization-in-seatheme-bm-content-builder-bf0180</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1279%3A%20CWE-862%20Missing%20Authorization%20in%20SeaTheme%20BM%20Content%20Builder&amp;severity=high&amp;id=682d983ec4522896dcbf0180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3870-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-olarmarius-1-decembrie-1918-bf051c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20olarmarius%201%20Decembrie%201918&amp;severity=medium&amp;id=682d983fc4522896dcbf051c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46535-cwe-862-missing-authorization-in-alphaefficiencyteam-custom-login-and-registration-bf052c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46535%3A%20CWE-862%20Missing%20Authorization%20in%20AlphaEfficiencyTeam%20Custom%20Login%20and%20Registration&amp;severity=medium&amp;id=682d983fc4522896dcbf052c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46482-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mythemeshop-wp-quiz-bf0524</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46482%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MyThemeShop%20WP%20Quiz&amp;severity=null&amp;id=682d983fc4522896dcbf0524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3743-cwe-472-external-control-of-assumed-immutable-web-parameter-in-wpswings-upsell-funnel-builder-for-woocommerce-bf0514</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3743%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20wpswings%20Upsell%20Funnel%20Builder%20for%20WooCommerce%20%E2%80%93%20Create%20Upsells%2C%20Cross-Sells%2C%20Order%20Bumps%2C%20Frequently%20Bought%2C%20and%20Popups.&amp;severity=medium&amp;id=682d983fc4522896dcbf0514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2238-cwe-269-improper-privilege-management-in-odin-design-vikinger-bf0188</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2238%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Odin_Design%20Vikinger&amp;severity=high&amp;id=682d983ec4522896dcbf0188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3868-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-codeandreload-custom-admin-bar-favorites-bf01e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeandreload%20Custom%20Admin-Bar%20Favorites&amp;severity=medium&amp;id=682d983ec4522896dcbf01e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3867-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rafe007-ajax-comment-form-cst-bf01e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafe007%20Ajax%20Comment%20Form%20CST&amp;severity=medium&amp;id=682d983ec4522896dcbf01e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3866-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rohanpawale-add-google-1-plus-one-social-share-button-bf01df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rohanpawale%20Add%20Google%20%2B1%20(Plus%20one)%20social%20share%20Button&amp;severity=medium&amp;id=682d983ec4522896dcbf01df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0671-cwe-79-cross-site-scripting-xss-in-unknown-icegram-express-befd6c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0671%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Icegram%20Express&amp;severity=medium&amp;id=682d983ec4522896dcbefd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3923-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-buildwps-prevent-direct-access-protect-wordpress-files-bf0353</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3923%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20buildwps%20Prevent%20Direct%20Access%20%E2%80%93%20Protect%20WordPress%20Files&amp;severity=medium&amp;id=682d983ec4522896dcbf0353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3861-cwe-863-incorrect-authorization-in-buildwps-prevent-direct-access-protect-wordpress-files-beff54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3861%3A%20CWE-863%20Incorrect%20Authorization%20in%20buildwps%20Prevent%20Direct%20Access%20%E2%80%93%20Protect%20WordPress%20Files&amp;severity=medium&amp;id=682d983ec4522896dcbeff54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2580-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bitpressadmin-contact-form-by-bit-form-multi-step-form-calculation-contact-form-payment-contact-form-custom-contact-form-builder-beff45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2580%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitpressadmin%20Bit%20Form%20%E2%80%93%20Custom%20Contact%20Form%2C%20Multi%20Step%2C%20Conversational%20Form%20%26%20Payment%20Form%20builder&amp;severity=medium&amp;id=682d983ec4522896dcbeff45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3511-cwe-1284-improper-validation-of-specified-quantity-in-input-in-mitsubishi-electric-corporation-cc-link-ie-tsn-remote-i-o-module-nz2gn2s1-32d-beff0b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3511%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20CC-Link%20IE%20TSN%20Remote%20I%2FO%20module%20NZ2GN2S1-32D&amp;severity=high&amp;id=682d983ec4522896dcbeff0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3752-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-terrillthompson-able-player-accessible-html5-media-player-befeef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joedolson%20Able%20Player%2C%20accessible%20HTML5%20media%20player&amp;severity=medium&amp;id=682d983ec4522896dcbefeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3775-cwe-918-server-side-request-forgery-ssrf-in-devitemsllc-shoplentor-woocommerce-builder-for-elementor-gutenberg-20-modules-all-in-one-solution-formerly-woolentor-bf034b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3775%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=medium&amp;id=682d983ec4522896dcbf034b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43865-cwe-345-insufficient-verification-of-data-authenticity-in-remix-run-react-router-bf035b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43865%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20remix-run%20react-router&amp;severity=medium&amp;id=682d983ec4522896dcbf035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43864-cwe-755-improper-handling-of-exceptional-conditions-in-remix-run-react-router-bf02b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43864%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20remix-run%20react-router&amp;severity=medium&amp;id=682d983ec4522896dcbf02b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46613-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-openplcproject-openplc-bf0549</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46613%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20openplcproject%20OpenPLC&amp;severity=medium&amp;id=682d983fc4522896dcbf0549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46599-cwe-1188-initialization-of-a-resource-with-an-insecure-default-in-k3s-k3s-bf0545</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46599%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20K3s%20K3s&amp;severity=medium&amp;id=682d983fc4522896dcbf0545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46595-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-backdropcms-flag-bf0541</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46595%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20backdropcms%20Flag&amp;severity=medium&amp;id=682d983fc4522896dcbf0541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46546-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-sherpa-orchestrator-bf053d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46546%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sherpa%20Orchestrator&amp;severity=medium&amp;id=682d983fc4522896dcbf053d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57375-cwe-1419-incorrect-initialization-of-resource-in-andamiro-pump-it-up-bf04ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57375%3A%20CWE-1419%20Incorrect%20Initialization%20of%20Resource%20in%20Andamiro%20Pump%20It%20Up&amp;severity=medium&amp;id=682d983fc4522896dcbf04ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46617-cwe-798-use-of-hard-coded-credentials-in-quantum-stornext-bf02ef</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46617%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Quantum%20StorNext&amp;severity=medium&amp;id=682d983ec4522896dcbf02ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46616-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-quantum-stornext-bf02e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46616%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Quantum%20StorNext&amp;severity=medium&amp;id=682d983ec4522896dcbf02e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46545-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-sherpa-orchestrator-bf02e5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46545%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sherpa%20Orchestrator&amp;severity=medium&amp;id=682d983ec4522896dcbf02e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46544-cwe-863-incorrect-authorization-in-sherpa-orchestrator-bf02dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46544%3A%20CWE-863%20Incorrect%20Authorization%20in%20Sherpa%20Orchestrator&amp;severity=medium&amp;id=682d983ec4522896dcbf02dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28076-n-a-in-n-a-bf0125</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28076%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbf0125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46547-cwe-352-cross-site-request-forgery-csrf-in-sherpa-orchestrator-bf00f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46547%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sherpa%20Orchestrator&amp;severity=medium&amp;id=682d983ec4522896dcbf00f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28354-n-a-in-n-a-bf00f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbf00f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25775-n-a-in-n-a-bf006d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25775%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbf006d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28128-n-a-in-n-a-befd01</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28128%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32984-n-a-in-n-a-befb15</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32984%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32983-n-a-in-n-a-befb0d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32983%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32979-n-a-in-n-a-beebbc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32979%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeebbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32981-n-a-in-n-a-beeb6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32981%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32986-n-a-in-n-a-beeb13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32986%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32985-n-a-in-n-a-beeb0b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32985%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeeb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32982-n-a-in-n-a-beeaf1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32982%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32980-bd7762</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32980%3A%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd7762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-25-2a4e99</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-25&amp;severity=medium&amp;id=682c7db2e8347ec82d2a4e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-25-f12c3e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2185-cwe-613-insufficient-session-expiration-in-albedo-telecom-net-time-ptp-ntp-clock-serial-no-nbc0081p-bf0184</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2185%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20ALBEDO%20Telecom%20Net.Time%20-%20PTP%2FNTP%20clock%20(Serial%20No.%20NBC0081P)&amp;severity=medium&amp;id=682d983ec4522896dcbf0184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3606-cwe-497-in-vestel-ac-charger-evc04-bf01bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3606%3A%20CWE-497%20in%20Vestel%20AC%20Charger%20EVC04&amp;severity=medium&amp;id=682d983ec4522896dcbf01bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46275-cwe-306-missing-authentication-for-critical-function-in-planet-technology-wgs-804hpt-v2-bf0217</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46275%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Planet%20Technology%20WGS-804HPT-V2&amp;severity=medium&amp;id=682d983ec4522896dcbf0217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46274-cwe-798-use-of-hard-coded-credentials-in-planet-technology-uni-nms-lite-bf02bc</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46274%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Planet%20Technology%20UNI-NMS-Lite&amp;severity=medium&amp;id=682d983ec4522896dcbf02bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46273-cwe-798-use-of-hard-coded-credentials-in-planet-technology-uni-nms-lite-bf0204</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46273%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Planet%20Technology%20UNI-NMS-Lite&amp;severity=medium&amp;id=682d983ec4522896dcbf0204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46272-cwe-78-os-command-injection-in-planet-technology-wgs-804hpt-v2-bf01ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46272%3A%20CWE-78%20OS%20Command%20Injection%20in%20Planet%20Technology%20WGS-804HPT-V2&amp;severity=medium&amp;id=682d983ec4522896dcbf01ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46271-cwe-78-os-command-injection-in-planet-technology-uni-nms-lite-bf01eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46271%3A%20CWE-78%20OS%20Command%20Injection%20in%20Planet%20Technology%20UNI-NMS-Lite&amp;severity=medium&amp;id=682d983ec4522896dcbf01eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1294-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpquark-eform-wordpress-form-builder-bf0148</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1294%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPQuark%20eForm%20-%20WordPress%20Form%20Builder&amp;severity=high&amp;id=682d983ec4522896dcbf0148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3749-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mgyura-breeze-display-befeed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mgyura%20Breeze%20Display&amp;severity=medium&amp;id=682d983ec4522896dcbefeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43861-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-miraheze-managewiki-befe81</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43861%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miraheze%20ManageWiki&amp;severity=medium&amp;id=682d983ec4522896dcbefe81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44759-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-leap-befe2e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44759%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983ec4522896dcbefe2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44760-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-hcl-software-hcl-leap-befe3d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44760%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983ec4522896dcbefe3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37516-cwe-524-use-of-cache-containing-sensitive-information-in-hcl-software-hcl-leap-befe47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37516%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983ec4522896dcbefe47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30127-cwe-524-use-of-cache-containing-sensitive-information-in-hcl-software-hcl-leap-befcc1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30127%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983ec4522896dcbefcc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26382-cwe-121-stack-based-buffer-overflow-in-johnson-controls-istar-configuration-utility-icu-bf08fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26382%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Johnson%20Controls%20iSTAR%20Configuration%20Utility%20(ICU)&amp;severity=medium&amp;id=682d983fc4522896dcbf08fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43859-cwe-444-inconsistent-interpretation-of-http-requests-http-request-response-smuggling-in-python-hyper-h11-bf0b21</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43859%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20python-hyper%20h11&amp;severity=medium&amp;id=682d983fc4522896dcbf0b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43858-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-bluegrams-youtubedlsharp-bf0b1d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43858%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Bluegrams%20YoutubeDLSharp&amp;severity=medium&amp;id=682d983fc4522896dcbf0b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-infrastructure-plays-crucial-role-in-north-korean-cybercrime-operations-27d709</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Infrastructure%20Plays%20Crucial%20Role%20in%20North%20Korean%20Cybercrime%20Operations&amp;severity=medium&amp;id=6831fcba0acd01a24927d709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37534-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-leap-bf0c6c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37534%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45720-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-hcl-software-hcl-leap-bf0c70</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45720%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30113-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-leap-bf0c26</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30113%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30114-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-leap-bf0c2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30114%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30147-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-leap-bf0bee</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30147%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30148-cwe-284-improper-access-control-in-hcl-software-hcl-leap-bf0c7c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30148%3A%20CWE-284%20%20Improper%20access%20control%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46498-cwe-352-cross-site-request-forgery-csrf-in-nghialuu-zalo-official-live-chat-bf0990</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46498%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nghialuu%20Zalo%20Official%20Live%20Chat&amp;severity=null&amp;id=682d983fc4522896dcbf0990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46473-cwe-502-deserialization-of-untrusted-data-in-djjmz-social-counter-bf094c</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46473%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Prisna%20Social%20Counter&amp;severity=null&amp;id=682d983fc4522896dcbf094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46523-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-devignstudiosltd-covid-19-coronavirus-update-your-customers-bf0a23</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46523%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devignstudiosltd%20COVID-19%20(Coronavirus)%20Update%20Your%20Customers&amp;severity=null&amp;id=682d983fc4522896dcbf0a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46507-cwe-352-cross-site-request-forgery-csrf-in-ldrumm-unsafe-mimetypes-bf09ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46507%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ldrumm%20Unsafe%20Mimetypes&amp;severity=null&amp;id=682d983fc4522896dcbf09ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46481-cwe-502-deserialization-of-untrusted-data-in-michael-cannon-flickr-shortcode-importer-bf096b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46481%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Michael%20Cannon%20Flickr%20Shortcode%20Importer&amp;severity=null&amp;id=682d983fc4522896dcbf096b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46447-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfable-fable-extra-bf0931</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46447%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFable%20Fable%20Extra&amp;severity=null&amp;id=682d983fc4522896dcbf0931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46531-cwe-918-server-side-request-forgery-ssrf-in-ankur-vishwakarma-wp-avcl-automation-helper-formerly-wpflyleads-bf0a45</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46531%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ankur%20Vishwakarma%20WP%20AVCL%20Automation%20Helper%20(formerly%20WPFlyLeads)&amp;severity=null&amp;id=682d983fc4522896dcbf0a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46519-cwe-862-missing-authorization-in-michael-revellin-clerc-media-library-downloader-bf0a00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46519%3A%20Missing%20Authorization%20in%20M.Code%20Media%20Library%20Downloader&amp;severity=null&amp;id=682d983fc4522896dcbf0a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46511-cwe-918-server-side-request-forgery-ssrf-in-derek-springer-beerxml-shortcode-bf09e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46511%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Derek%20Springer%20BeerXML%20Shortcode&amp;severity=null&amp;id=682d983fc4522896dcbf09e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46503-cwe-918-server-side-request-forgery-ssrf-in-josheli-simple-google-photos-grid-bf09b8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46503%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20josheli%20Simple%20Google%20Photos%20Grid&amp;severity=null&amp;id=682d983fc4522896dcbf09b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46489-cwe-862-missing-authorization-in-vinodvaswani9-bulk-assign-linked-products-for-woocommerce-bf0977</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46489%3A%20Missing%20Authorization%20in%20vinodvaswani9%20Bulk%20Assign%20Linked%20Products%20For%20WooCommerce&amp;severity=null&amp;id=682d983fc4522896dcbf0977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46485-cwe-862-missing-authorization-in-carlo-la-pera-wp-customize-login-page-bf0973</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46485%3A%20Missing%20Authorization%20in%20Carlo%20La%20Pera%20WP%20Customize%20Login%20Page&amp;severity=null&amp;id=682d983fc4522896dcbf0973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46477-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-carlo-la-pera-wp-customize-login-page-bf0963</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46477%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Carlo%20La%20Pera%20WP%20Customize%20Login%20Page&amp;severity=null&amp;id=682d983fc4522896dcbf0963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46469-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-benjamin-buddle-send-from-bf0946</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46469%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benjamin%20Buddle%20Send%20From&amp;severity=null&amp;id=682d983fc4522896dcbf0946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46459-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ralf-hortt-confirm-user-registration-bf0942</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46459%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ralf%20Hortt%20Confirm%20User%20Registration&amp;severity=null&amp;id=682d983fc4522896dcbf0942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46451-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-syed-balkhi-floating-social-bar-bf093e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Floating%20Social%20Bar&amp;severity=null&amp;id=682d983fc4522896dcbf093e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46442-cwe-352-cross-site-request-forgery-csrf-in-casey-johnson-loan-calculator-bf092d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46442%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Casey%20Johnson%20Loan%20Calculator&amp;severity=null&amp;id=682d983fc4522896dcbf092d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46541-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-elrata-wp-recaptcha-bp-bf0c13</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elrata_%20WP-reCAPTCHA-bp&amp;severity=null&amp;id=682d983fc4522896dcbf0c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46533-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpdrift-no-landing-pages-and-domain-aliases-for-wordpress-bf0a49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdrift.no%20Landing%20pages%20and%20Domain%20aliases%20for%20WordPress&amp;severity=null&amp;id=682d983fc4522896dcbf0a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46529-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-stressfree-sites-business-contact-widget-bf0a2b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StressFree%20Sites%20Business%20Contact%20Widget&amp;severity=null&amp;id=682d983fc4522896dcbf0a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46525-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-msmitley-wp-cookie-consent-bf0c07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20msmitley%20WP%20Cookie%20Consent&amp;severity=null&amp;id=682d983fc4522896dcbf0c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46521-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-silver-muru-ws-force-login-page-bf0a08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Silver%20Muru%20WS%20Force%20Login%20Page&amp;severity=null&amp;id=682d983fc4522896dcbf0a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46517-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpdiscover-blog-manager-wp-bf09fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Blog%20Manager%20WP&amp;severity=null&amp;id=682d983fc4522896dcbf09fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46513-cwe-352-cross-site-request-forgery-csrf-in-codebangers-all-in-one-time-clock-lite-bf09e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46513%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Codebangers%20All%20in%20One%20Time%20Clock%20Lite&amp;severity=null&amp;id=682d983fc4522896dcbf09e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46509-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-andrey-mikhalchuk-360-view-bf09d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46509%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andrey%20Mikhalchuk%20360%20View&amp;severity=null&amp;id=682d983fc4522896dcbf09d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46505-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-farinspace-peekaboo-bf09c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46505%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20farinspace%20Peekaboo&amp;severity=null&amp;id=682d983fc4522896dcbf09c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46501-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-biancardi-mixcloud-embed-bf09b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46501%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20biancardi%20Mixcloud%20Embed&amp;severity=null&amp;id=682d983fc4522896dcbf09b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46496-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-oniswap-mini-twitter-feed-bf0988</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46496%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oniswap%20Mini%20twitter%20feed&amp;severity=null&amp;id=682d983fc4522896dcbf0988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46491-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-matthew-muro-multi-column-taxonomy-list-bf0984</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matthew%20Muro%20Multi-Column%20Taxonomy%20List&amp;severity=null&amp;id=682d983fc4522896dcbf0984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46483-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-alex-moss-peadig-s-google-1-button-bf096f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46483%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Moss%20Peadig%E2%80%99s%20Google%20%2B1%20Button&amp;severity=null&amp;id=682d983fc4522896dcbf096f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46479-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-devyncjohnson-bbcode-deluxe-bf0967</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46479%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevynCJohnson%20BBCode%20Deluxe&amp;severity=null&amp;id=682d983fc4522896dcbf0967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46475-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-terrillthompson-able-player-bf095f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46475%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Dolson%20Able%20Player&amp;severity=null&amp;id=682d983fc4522896dcbf095f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46471-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gnanavelshenll-wp-custom-post-popup-bf0794</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46471%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gnanavelshenll%20WP%20Custom%20Post%20Popup&amp;severity=null&amp;id=682d983fc4522896dcbf0794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46467-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rahendra-putra-k-raphicon-bf0790</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rahendra%20Putra%20K%E2%84%A2%20RAphicon&amp;severity=null&amp;id=682d983fc4522896dcbf0790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46461-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-relentless-apps-rrssb-bf06b3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Relentless%20Apps%20RRSSB&amp;severity=null&amp;id=682d983fc4522896dcbf06b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46457-cwe-352-cross-site-request-forgery-csrf-in-digontoahsan-wp-custom-cms-block-bf06a4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46457%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ahsanullah%20Akanda%20Wp%20Custom%20CMS%20Block&amp;severity=null&amp;id=682d983fc4522896dcbf06a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46453-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-creatorteam-zoho-creator-forms-bd727f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreatorTeam%20Zoho%20Creator%20Forms&amp;severity=medium&amp;id=682d9817c4522896dcbd727f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46449-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-novium-wowhead-tooltips-bf068c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Novium%20WoWHead%20Tooltips&amp;severity=null&amp;id=682d983fc4522896dcbf068c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46445-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-preya-external-markdown-bf0688</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46445%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pReya%20External%20Markdown&amp;severity=null&amp;id=682d983fc4522896dcbf0688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46438-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-warmwhisky-gtdb-guitar-tuners-bf0662</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20warmwhisky%20GTDB%20Guitar%20Tuners&amp;severity=null&amp;id=682d983fc4522896dcbf0662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46542-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-themexpert-xpert-tab-bf0c22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeXpert%20Xpert%20Tab&amp;severity=null&amp;id=682d983fc4522896dcbf0c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46540-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-chris-mok-gna-search-shortcode-bf0c0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46540%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Mok%20GNA%20Search%20Shortcode&amp;severity=null&amp;id=682d983fc4522896dcbf0c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46538-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-webplanetsoft-inline-text-popup-bf0bc2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webplanetsoft%20Inline%20Text%20Popup&amp;severity=null&amp;id=682d983fc4522896dcbf0bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46536-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-richardharrison-carousel-of-post-images-bf078c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RichardHarrison%20Carousel-of-post-images&amp;severity=null&amp;id=682d983fc4522896dcbf078c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46534-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-danielriera-image-style-hover-bf0788</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46534%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DanielRiera%20Image%20Style%20Hover&amp;severity=null&amp;id=682d983fc4522896dcbf0788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46532-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-haris-zulfiqar-tooltip-bf0784</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Haris%20Zulfiqar%20Tooltip&amp;severity=null&amp;id=682d983fc4522896dcbf0784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46530-cwe-352-cross-site-request-forgery-csrf-in-huangye-wudeng-hacklog-remote-attachment-bf0780</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46530%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HuangYe%20WuDeng%20Hacklog%20Remote%20Attachment&amp;severity=null&amp;id=682d983fc4522896dcbf0780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46528-cwe-352-cross-site-request-forgery-csrf-in-steve-availability-calendar-bf0bba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46528%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Steve%20Availability%20Calendar&amp;severity=null&amp;id=682d983fc4522896dcbf0bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46524-cwe-352-cross-site-request-forgery-csrf-in-stesvis-wp-filter-post-category-bf0bb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46524%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stesvis%20WP%20Filter%20Post%20Category&amp;severity=null&amp;id=682d983fc4522896dcbf0bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46522-cwe-352-cross-site-request-forgery-csrf-in-billy-bryant-tabs-bf075a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46522%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Billy%20Bryant%20Tabs&amp;severity=null&amp;id=682d983fc4522896dcbf075a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46520-cwe-352-cross-site-request-forgery-csrf-in-alphasis-related-posts-via-taxonomies-bf0756</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46520%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alphasis%20Related%20Posts%20via%20Taxonomies&amp;severity=null&amp;id=682d983fc4522896dcbf0756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46516-cwe-352-cross-site-request-forgery-csrf-in-silencecm-twitter-card-generator-bf0752</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46516%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20silencecm%20Twitter%20Card%20Generator&amp;severity=null&amp;id=682d983fc4522896dcbf0752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46514-cwe-352-cross-site-request-forgery-csrf-in-milat-milat-jquery-automatic-popup-bf0745</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46514%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20milat%20Milat%20jQuery%20Automatic%20Popup&amp;severity=null&amp;id=682d983fc4522896dcbf0745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46512-cwe-352-cross-site-request-forgery-csrf-in-shamim-hasan-custom-functions-plugin-bf0741</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46512%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shamim%20Hasan%20Custom%20Functions%20Plugin&amp;severity=null&amp;id=682d983fc4522896dcbf0741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46510-cwe-352-cross-site-request-forgery-csrf-in-harrysudana-contact-form-7-calendar-bf073d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46510%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20harrysudana%20Contact%20Form%207%20Calendar&amp;severity=null&amp;id=682d983fc4522896dcbf073d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46508-cwe-352-cross-site-request-forgery-csrf-in-kasonzhao-advanced-lazy-load-bf0739</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46508%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kasonzhao%20Advanced%20lazy%20load&amp;severity=null&amp;id=682d983fc4522896dcbf0739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46506-cwe-352-cross-site-request-forgery-csrf-in-lora77-wpzon-amazon-affiliate-plugin-bf0735</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46506%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Lora77%20WpZon%20%E2%80%93%20Amazon%20Affiliate%20Plugin&amp;severity=null&amp;id=682d983fc4522896dcbf0735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46504-cwe-352-cross-site-request-forgery-csrf-in-olar-marius-vasaio-qr-code-bf0731</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46504%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Olar%20Marius%20Vasaio%20QR%20Code&amp;severity=null&amp;id=682d983fc4522896dcbf0731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46502-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bas-matthee-lsd-custom-taxonomy-and-category-meta-bf072d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46502%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bas%20Matthee%20LSD%20Custom%20taxonomy%20and%20category%20meta&amp;severity=null&amp;id=682d983fc4522896dcbf072d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46499-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-hccoder-paypal-express-checkout-bf0714</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46499%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hccoder%20PayPal%20Express%20Checkout&amp;severity=null&amp;id=682d983fc4522896dcbf0714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46497-cwe-352-cross-site-request-forgery-csrf-in-navegg-navegg-analytics-bf0707</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46497%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Navegg%20Navegg%20Analytics&amp;severity=null&amp;id=682d983fc4522896dcbf0707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46495-cwe-352-cross-site-request-forgery-csrf-in-tomontoast-drop-caps-bf0703</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46495%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tomontoast%20Drop%20Caps&amp;severity=null&amp;id=682d983fc4522896dcbf0703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46492-cwe-352-cross-site-request-forgery-csrf-in-pham-thanh-call-now-pht-blog-bf06ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46492%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pham%20Thanh%20Call%20Now%20PHT%20Blog&amp;severity=null&amp;id=682d983fc4522896dcbf06ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46484-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nasir179125-image-hover-effects-for-wpbakery-page-builder-bf06fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46484%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nasir179125%20Image%20Hover%20Effects%20For%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=682d983fc4522896dcbf06fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46480-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-padam-shankhadev-nepali-post-date-bf06f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46480%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Padam%20Shankhadev%20Nepali%20Post%20Date&amp;severity=null&amp;id=682d983fc4522896dcbf06f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46478-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-metaloha-dropdown-content-bf06f3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46478%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metaloha%20Dropdown%20Content&amp;severity=null&amp;id=682d983fc4522896dcbf06f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46476-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nayon46-awesome-wp-image-gallery-bf06ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46476%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nayon46%20Awesome%20Wp%20Image%20Gallery&amp;severity=null&amp;id=682d983fc4522896dcbf06ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46472-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-webangon-the-pack-elementor-addons-bf06eb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addons&amp;severity=null&amp;id=682d983fc4522896dcbf06eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46470-cwe-862-missing-authorization-in-peter-raschendorfer-smart-hashtags-hashtagger-bf06da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46470%3A%20Missing%20Authorization%20in%20Peter%20Raschendorfer%20Smart%20Hashtags%20%5B%23hashtagger%5D&amp;severity=null&amp;id=682d983fc4522896dcbf06da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46466-cwe-352-cross-site-request-forgery-csrf-in-felixtz-modern-polls-bf06bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46466%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20felixtz%20Modern%20Polls&amp;severity=null&amp;id=682d983fc4522896dcbf06bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46465-cwe-352-cross-site-request-forgery-csrf-in-john-weissberg-print-science-designer-bf06bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46465%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20John%20Weissberg%20Print%20Science%20Designer&amp;severity=null&amp;id=682d983fc4522896dcbf06bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46462-cwe-352-cross-site-request-forgery-csrf-in-tr-n-minh-qu-n-wpvn-bf06b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46462%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tr%C3%A2n%20Minh-Qu%C3%A2n%20WPVN&amp;severity=null&amp;id=682d983fc4522896dcbf06b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46452-cwe-352-cross-site-request-forgery-csrf-in-olav-kolbu-google-news-bf069c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46452%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Olav%20Kolbu%20Google%20News&amp;severity=medium&amp;id=682d983fc4522896dcbf069c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46450-cwe-352-cross-site-request-forgery-csrf-in-x000x-occupancyplan-bf0694</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46450%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20x000x%20occupancyplan&amp;severity=null&amp;id=682d983fc4522896dcbf0694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46443-cwe-918-server-side-request-forgery-ssrf-in-adam-pery-animate-bf0684</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46443%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Adam%20Pery%20Animate&amp;severity=null&amp;id=682d983fc4522896dcbf0684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46436-cwe-352-cross-site-request-forgery-csrf-in-sebastian-echeverry-scss-library-bf065e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46436%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sebastian%20Echeverry%20SCSS-Library&amp;severity=null&amp;id=682d983fc4522896dcbf065e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46439-cwe-352-cross-site-request-forgery-csrf-in-vladimir-prelovac-plugin-central-bf0645</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46439%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vladimir%20Prelovac%20Plugin%20Central&amp;severity=null&amp;id=682d983fc4522896dcbf0645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46435-cwe-352-cross-site-request-forgery-csrf-in-yash-binani-time-based-greeting-bf0641</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yash%20Binani%20Time%20Based%20Greeting&amp;severity=null&amp;id=682d983fc4522896dcbf0641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32921-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-wpoperation-arrival-bf0573</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32921%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpoperations%20Arrival&amp;severity=null&amp;id=682d983fc4522896dcbf0573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39359-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-code-work-web-cww-portfolio-bf057b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39359%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20codeworkweb%20CWW%20Portfolio&amp;severity=null&amp;id=682d983fc4522896dcbf057b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39360-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-everestthemes-grace-mag-bf0583</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39360%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20everestthemes%20Grace%20Mag&amp;severity=null&amp;id=682d983fc4522896dcbf0583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39377-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-wedevs-appsero-helper-bf058b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39377%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20weDevs%20Appsero%20Helper&amp;severity=null&amp;id=682d983fc4522896dcbf058b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39378-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-holest-engineering-spreadsheet-price-changer-for-woocommerce-and-wp-e-commerce-light-bf059a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39378%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Holest%20Engineering%20Spreadsheet%20Price%20Changer%20for%20WooCommerce%20and%20WP%20E-commerce%20%E2%80%93%20Light&amp;severity=null&amp;id=682d983fc4522896dcbf059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39379-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-capturly-capturly-bf059e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39379%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Capturly%20Capturly&amp;severity=medium&amp;id=682d983fc4522896dcbf059e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39381-cwe-352-cross-site-request-forgery-csrf-in-kiotviet-kiotviet-sync-bf05a2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39381%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kiotviet%20KiotViet%20Sync&amp;severity=medium&amp;id=682d983fc4522896dcbf05a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39382-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-danielpataki-acf-google-font-selector-bf05a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39382%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danielpataki%20ACF%3A%20Google%20Font%20Selector&amp;severity=null&amp;id=682d983fc4522896dcbf05a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39383-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-code-work-web-xews-lite-bf05ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20codeworkweb%20Xews%20Lite&amp;severity=null&amp;id=682d983fc4522896dcbf05ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39384-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-cedcommerce-product-lister-for-ebay-bf05d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39384%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cedcommerce%20Product%20Lister%20for%20eBay&amp;severity=null&amp;id=682d983fc4522896dcbf05d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39385-cwe-862-missing-authorization-in-vw-themes-sirat-bf05dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39385%3A%20Missing%20Authorization%20in%20vowelweb%20Sirat&amp;severity=null&amp;id=682d983fc4522896dcbf05dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39387-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-wpoperation-opstore-bf05e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpoperations%20Opstore&amp;severity=null&amp;id=682d983fc4522896dcbf05e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39390-cwe-862-missing-authorization-in-magepeopleteam-booking-and-rental-manager-bf05e8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39390%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=682d983fc4522896dcbf05e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39391-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-zamartz-checkout-field-visibility-for-woocommerce-bf05f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39391%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zamartz%20Checkout%20Field%20Visibility%20for%20WooCommerce&amp;severity=null&amp;id=682d983fc4522896dcbf05f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39397-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gopiplus-hotmail-com-anything-popup-bf05fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39397%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%40hotmail.com%20Anything%20Popup&amp;severity=null&amp;id=682d983fc4522896dcbf05fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39399-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-ashraful-sarkar-naiem-license-for-envato-bf05ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39399%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ashraful%20Sarkar%20Naiem%20License%20For%20Envato&amp;severity=null&amp;id=682d983fc4522896dcbf05ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39400-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpeverest-user-registration-bf0603</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39400%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration&amp;severity=null&amp;id=682d983fc4522896dcbf0603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39404-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-heateor-support-sassy-social-share-bf0607</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39404%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Heateor%20Support%20Sassy%20Social%20Share&amp;severity=null&amp;id=682d983fc4522896dcbf0607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39408-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-everpress-bruteguard-brute-force-login-protection-bf060f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39408%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EverPress%20BruteGuard%20%E2%80%93%20Brute%20Force%20Login%20Protection&amp;severity=null&amp;id=682d983fc4522896dcbf060f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46264-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-angelo-mandato-powerpress-podcasting-bf063d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46264%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=null&amp;id=682d983fc4522896dcbf063d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46230-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-ghozylab-popup-builder-bf0635</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46230%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20GhozyLab%20Popup%20Builder&amp;severity=null&amp;id=682d983fc4522896dcbf0635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46234-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-habibur-rahman-razib-control-listings-bf0639</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46234%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Habibur%20Rahman%20Razib%20Control%20Listings&amp;severity=null&amp;id=682d983fc4522896dcbf0639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46248-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-m-a-vinoth-kumar-frontend-dashboard-bf054d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46248%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20M%20A%20Vinoth%20Kumar%20Frontend%20Dashboard&amp;severity=null&amp;id=682d983fc4522896dcbf054d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46260-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wowdevs-sky-addons-for-elementor-bf0551</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46260%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wowDevs%20Sky%20Addons%20for%20Elementor&amp;severity=null&amp;id=682d983fc4522896dcbf0551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46261-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-craig-hewitt-seriously-simple-podcasting-bf056f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46261%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=null&amp;id=682d983fc4522896dcbf056f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43855-cwe-248-uncaught-exception-in-trpc-trpc-aec871</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43855%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20trpc%20trpc&amp;severity=high&amp;id=682cd0fb1484d88663aec871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snakekeylogger-a-multistage-info-stealer-malware-campaign-27ccb4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SnakeKeylogger%20%E2%80%93%20A%20Multistage%20Info%20Stealer%20Malware%20Campaign&amp;severity=medium&amp;id=6831c4770acd01a24927ccb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30409-cwe-770-in-acronis-acronis-cyber-protect-cloud-agent-bf1487</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30409%3A%20CWE-770%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf1487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30408-cwe-732-in-acronis-acronis-cyber-protect-cloud-agent-bf0806</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30408%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d983fc4522896dcbf0806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46421-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-red-hat-red-hat-enterprise-linux-10-aeb079</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46421%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere&amp;severity=medium&amp;id=682cd0f71484d88663aeb079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46420-missing-release-of-memory-after-effective-lifetime-in-red-hat-red-hat-enterprise-linux-8-aeb077</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46420%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime&amp;severity=medium&amp;id=682cd0f71484d88663aeb077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27820-psl-validation-bypass-in-apache-httpclient-5-4-x-in-apache-software-foundation-apache-httpcomponents-aeba65</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27820%3A%20PSL%20Validation%20Bypass%20in%20Apache%20HttpClient%205.4.x%20in%20Apache%20Software%20Foundation%20Apache%20HttpComponents&amp;severity=high&amp;id=682cd0f91484d88663aeba65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47664-cwe-203-observable-discrepancy-in-franka-robotics-franka-emika-robot-bf0ed8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47664%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20Franka%20Robotics%20Franka%20Emika%20Robot&amp;severity=medium&amp;id=682d9840c4522896dcbf0ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47663-cwe-613-insufficient-session-expiration-in-franka-robotics-franka-emika-robot-bf0ed4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47663%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Franka%20Robotics%20Franka%20Emika%20Robot&amp;severity=medium&amp;id=682d9840c4522896dcbf0ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47662-cwe-862-missing-authorization-in-franka-robotics-franka-emika-robot-bf0ed0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47662%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Franka%20Robotics%20Franka%20Emika%20Robot&amp;severity=medium&amp;id=682d9840c4522896dcbf0ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3872-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-centreon-centreon-bf0fca</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3872%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20Centreon&amp;severity=medium&amp;id=682d9840c4522896dcbf0fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3603-cwe-620-unverified-password-change-in-v1rustyle-flynax-bridge-bf158f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3603%3A%20CWE-620%20Unverified%20Password%20Change%20in%20v1rustyle%20Flynax%20Bridge&amp;severity=critical&amp;id=682d9840c4522896dcbf158f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3776-cwe-94-improper-control-of-generation-of-code-code-injection-in-cajka-verification-sms-with-targetsms-bf1597</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3776%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20cajka%20Verification%20SMS%20with%20TargetSMS&amp;severity=high&amp;id=682d9840c4522896dcbf1597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3793-cwe-620-unverified-password-change-in-lamarant-buddypress-force-password-change-bf15a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3793%3A%20CWE-620%20Unverified%20Password%20Change%20in%20lamarant%20Buddypress%20Force%20Password%20Change&amp;severity=medium&amp;id=682d9840c4522896dcbf15a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3280-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-elextensions-elex-woocommerce-advanced-bulk-edit-products-prices-attributes-bf1589</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3280%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20elextensions%20ELEX%20WooCommerce%20Bulk%20Edit%20Products%2C%20Prices%20%26%20Attributes%20(Basic)&amp;severity=medium&amp;id=682d9840c4522896dcbf1589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13307-cwe-862-missing-authorization-in-pixel-prime-reales-wp-real-estate-wordpress-theme-bf1566</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13307%3A%20CWE-862%20Missing%20Authorization%20in%20pixel_prime%20Reales%20WP%20-%20Real%20Estate%20WordPress%20Theme&amp;severity=medium&amp;id=682d9840c4522896dcbf1566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3300-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-ludwigyou-wpmastertoolkit-wpmtk-all-in-one-plugin-bf1409</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3300%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ludwigyou%20WPMasterToolKit%20(WPMTK)%20%E2%80%93%20All%20in%20one%20plugin&amp;severity=high&amp;id=682d9840c4522896dcbf1409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3832-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jeremyshapiro-fusedesk-bf1430</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3832%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremyshapiro%20FuseDesk&amp;severity=medium&amp;id=682d9840c4522896dcbf1430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2579-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bplugins-lottie-player-great-lottie-player-solution-bf13f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2579%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Lottie%20Player%20%E2%80%93%20Add%20Interactive%20Lottie%20Animations%20with%20Block%20Support&amp;severity=medium&amp;id=682d9840c4522896dcbf13f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3607-cwe-620-unverified-password-change-in-arkenon-frontend-login-and-registration-blocks-bf1428</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3607%3A%20CWE-620%20Unverified%20Password%20Change%20in%20arkenon%20Login%2C%20Registration%20and%20Lost%20Password%20Blocks&amp;severity=high&amp;id=682d9840c4522896dcbf1428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3604-cwe-862-missing-authorization-in-v1rustyle-flynax-bridge-bf1420</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3604%3A%20CWE-862%20Missing%20Authorization%20in%20v1rustyle%20Flynax%20Bridge&amp;severity=critical&amp;id=682d9840c4522896dcbf1420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2543-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-spiderdevs-advanced-accordion-gutenberg-block-bf1391</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2543%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spiderdevs%20Advanced%20Accordion%20Gutenberg%20Block%20%E2%80%93%20Create%20Beautiful%20FAQs%2C%20Content%20Accordions%20%26%20Interactive%20Tabs&amp;severity=medium&amp;id=682d9840c4522896dcbf1391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1284-cwe-639-authorization-bypass-through-user-controlled-key-in-xpertsclub-woocommerce-automatic-order-printing-formerly-woocommerce-google-cloud-print-bf0f8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1284%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20xpertsclub%20Woocommerce%20Automatic%20Order%20Printing%20%7C%20(%20Formerly%20WooCommerce%20Google%20Cloud%20Print)&amp;severity=medium&amp;id=682d9840c4522896dcbf0f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3101-cwe-269-improper-privilege-management-in-wp-configurator-configurator-theme-core-bf0fc6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3101%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wp-configurator%20Configurator%20Theme%20Core&amp;severity=high&amp;id=682d9840c4522896dcbf0fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3058-cwe-862-missing-authorization-in-jauharixelion-xelion-webchat-bf0f9a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3058%3A%20CWE-862%20Missing%20Authorization%20in%20jauharixelion%20Xelion%20Webchat&amp;severity=high&amp;id=682d9840c4522896dcbf0f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3065-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-neoslab-database-toolset-bf0fb5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3065%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20neoslab%20Database%20Toolset&amp;severity=critical&amp;id=682d9840c4522896dcbf0fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12244-cwe-862-missing-authorization-in-gitlab-gitlab-bf0f7e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12244%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9840c4522896dcbf0f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0639-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-bf0f8a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0639%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9840c4522896dcbf0f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1908-cwe-840-business-logic-errors-in-gitlab-gitlab-bf0f92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1908%3A%20CWE-840%3A%20Business%20Logic%20Errors%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9840c4522896dcbf0f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3761-cwe-269-improper-privilege-management-in-joedolson-my-tickets-accessible-event-ticketing-bf1593</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3761%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20joedolson%20My%20Tickets%20%E2%80%93%20Accessible%20Event%20Ticketing&amp;severity=high&amp;id=682d9840c4522896dcbf1593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41423-cwe-863-incorrect-authorization-in-mattermost-mattermost-bf15a8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41423%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682d9840c4522896dcbf15a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35965-cwe-770-allocation-of-resources-without-limits-or-throttling-in-mattermost-mattermost-bf1585</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35965%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682d9840c4522896dcbf1585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41395-cwe-1287-improper-validation-of-specified-type-of-input-in-mattermost-mattermost-bf13ae</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41395%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682d9840c4522896dcbf13ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32730-use-of-hard-coded-cryptographic-key-in-i-pro-co-ltd-i-pro-configuration-tool-bf1395</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32730%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20i-PRO%20Co.%2C%20Ltd.%20i-PRO%20Configuration%20Tool&amp;severity=medium&amp;id=682d9840c4522896dcbf1395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2558-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-unknown-the-wound-bf1219</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2558%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20the-wound&amp;severity=high&amp;id=682d9840c4522896dcbf1219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1453-cwe-79-cross-site-scripting-xss-in-unknown-category-posts-widget-bf1204</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1453%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Category%20Posts%20Widget&amp;severity=medium&amp;id=682d9840c4522896dcbf1204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3435-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kitae-park-mang-board-wp-bf1399</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3435%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kitae-park%20Mang%20Board%20WP&amp;severity=medium&amp;id=682d9840c4522896dcbf1399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1976-cwe-94-improper-control-of-generation-of-code-code-injection-in-brocade-fabric-os-bee3cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1976%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=682d983bc4522896dcbee3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-24-86f07cca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-24&amp;severity=medium&amp;id=68359c9a5d5f0974d01e32c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46419-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-westermo-weos-bf11a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46419%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Westermo%20WeOS&amp;severity=medium&amp;id=682d9840c4522896dcbf11a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46417-cwe-184-incomplete-list-of-disallowed-inputs-in-picklescan-picklescan-bf1135</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46417%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Picklescan%20Picklescan&amp;severity=medium&amp;id=682d9840c4522896dcbf1135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29568-n-a-in-n-a-bf0f96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29568%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf0f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44135-n-a-in-n-a-bf0df9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44135%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44134-n-a-in-n-a-bf0df1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44134%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29529-n-a-in-n-a-bf00f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29529%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbf00f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25777-n-a-in-n-a-bf00ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25777%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbf00ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-24-f181bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-24&amp;severity=medium&amp;id=682acdc2bbaf20d303f181bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-24-f12014</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-24-6e2f1c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-24&amp;severity=medium&amp;id=6828eab9e1a0c275ea6e2f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25046-cwe-319-cleartext-transmission-of-sensitive-information-in-ibm-infosphere-information-server-bf1129</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25046%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=low&amp;id=682d9840c4522896dcbf1129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25045-cwe-209-generation-of-error-message-containing-sensitive-information-in-ibm-infosphere-information-server-bf157d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25045%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682d9840c4522896dcbf157d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22351-cwe-613-insufficient-session-expiration-in-ibm-infosphere-information-server-bf156a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22351%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682d9840c4522896dcbf156a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/introducing-toymaker-2761e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Introducing%20ToyMaker&amp;severity=low&amp;id=6830f1b00acd01a2492761e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46400-null-pointer-dereference-aec804</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46400%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682cd0fb1484d88663aec804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46399-null-pointer-dereference-aec4ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46399%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682cd0fa1484d88663aec4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46398-stack-based-buffer-overflow-aec775</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46398%3A%20Stack-based%20Buffer%20Overflow&amp;severity=medium&amp;id=682cd0fb1484d88663aec775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46397-stack-based-buffer-overflow-aec773</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46397%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=high&amp;id=682cd0fb1484d88663aec773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32818-cwe-476-null-pointer-dereference-in-sonicwall-sonicos-bf16dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32818%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=682d9840c4522896dcbf16dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3907-cwe-352-cross-site-request-forgery-csrf-in-drupal-search-api-solr-bf3a89</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3907%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Search%20API%20Solr&amp;severity=medium&amp;id=682d9844c4522896dcbf3a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3904-vulnerability-in-drupal-sportsleague-bf29c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3904%3A%20Vulnerability%20in%20Drupal%20Sportsleague&amp;severity=high&amp;id=682d9842c4522896dcbf29c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3903-vulnerability-in-drupal-ueditor-bf29c1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3903%3A%20Vulnerability%20in%20Drupal%20UEditor%20-%20%E7%99%BE%E5%BA%A6%E7%BC%96%E8%BE%91%E5%99%A8&amp;severity=high&amp;id=682d9842c4522896dcbf29c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3902-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-block-class-bf2cde</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Block%20Class&amp;severity=medium&amp;id=682d9843c4522896dcbf2cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3901-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-bootstrap-site-alert-bf2cd1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Bootstrap%20Site%20Alert&amp;severity=medium&amp;id=682d9843c4522896dcbf2cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3900-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-colorbox-bf080a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Colorbox&amp;severity=medium&amp;id=682d983fc4522896dcbf080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2773-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-bec-technologies-multiple-routers-bf3c16</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2773%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BEC%20Technologies%20Multiple%20Routers&amp;severity=medium&amp;id=682d9844c4522896dcbf3c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2772-cwe-522-insufficiently-protected-credentials-in-bec-technologies-multiple-routers-bf3c07</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2772%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20BEC%20Technologies%20Multiple%20Routers&amp;severity=medium&amp;id=682d9844c4522896dcbf3c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2771-cwe-287-improper-authentication-in-bec-technologies-multiple-routers-bf3bf6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2771%3A%20CWE-287%3A%20Improper%20Authentication%20in%20BEC%20Technologies%20Multiple%20Routers&amp;severity=medium&amp;id=682d9844c4522896dcbf3bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2770-cwe-256-unprotected-storage-of-credentials-in-bec-technologies-multiple-routers-bf3859</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2770%3A%20CWE-256%3A%20Unprotected%20Storage%20of%20Credentials%20in%20BEC%20Technologies%20Multiple%20Routers&amp;severity=medium&amp;id=682d9844c4522896dcbf3859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2769-cwe-427-uncontrolled-search-path-element-in-bdrive-netdrive-bf3855</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2769%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Bdrive%20NetDrive&amp;severity=medium&amp;id=682d9844c4522896dcbf3855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2768-cwe-427-uncontrolled-search-path-element-in-bdrive-netdrive-bf3846</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2768%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Bdrive%20NetDrive&amp;severity=medium&amp;id=682d9844c4522896dcbf3846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2767-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-arista-ng-firewall-bf383e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2767%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arista%20NG%20Firewall&amp;severity=medium&amp;id=682d9844c4522896dcbf383e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2765-cwe-798-use-of-hard-coded-credentials-in-carlinkit-cpc200-ccpa-bf381f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2765%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20CarlinKit%20CPC200-CCPA&amp;severity=medium&amp;id=682d9844c4522896dcbf381f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2764-cwe-347-improper-verification-of-cryptographic-signature-in-carlinkit-cpc200-ccpa-bf3549</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2764%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20CarlinKit%20CPC200-CCPA&amp;severity=medium&amp;id=682d9844c4522896dcbf3549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2763-cwe-347-improper-verification-of-cryptographic-signature-in-carlinkit-cpc200-ccpa-bf3541</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2763%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20CarlinKit%20CPC200-CCPA&amp;severity=medium&amp;id=682d9844c4522896dcbf3541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2762-cwe-1326-missing-immutable-root-of-trust-in-hardware-in-carlinkit-cpc200-ccpa-bf319b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2762%3A%20CWE-1326%3A%20Missing%20Immutable%20Root%20of%20Trust%20in%20Hardware%20in%20CarlinKit%20CPC200-CCPA&amp;severity=medium&amp;id=682d9843c4522896dcbf319b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2761-cwe-787-out-of-bounds-write-in-gimp-gimp-bf3193</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2761%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20GIMP%20GIMP&amp;severity=medium&amp;id=682d9843c4522896dcbf3193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2760-cwe-190-integer-overflow-or-wraparound-in-gimp-gimp-bf318b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2760%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GIMP%20GIMP&amp;severity=medium&amp;id=682d9843c4522896dcbf318b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1522-cwe-918-server-side-request-forgery-ssrf-in-posthog-posthog-bf3187</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1522%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PostHog%20PostHog&amp;severity=medium&amp;id=682d9843c4522896dcbf3187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1521-cwe-918-server-side-request-forgery-ssrf-in-posthog-posthog-bf3539</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1521%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PostHog%20PostHog&amp;severity=medium&amp;id=682d9844c4522896dcbf3539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1520-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-posthog-posthog-bf3531</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1520%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PostHog%20PostHog&amp;severity=medium&amp;id=682d9844c4522896dcbf3531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1050-cwe-787-out-of-bounds-write-in-sonos-era-300-bf351a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1050%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Sonos%20Era%20300&amp;severity=medium&amp;id=682d9844c4522896dcbf351a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1049-cwe-122-heap-based-buffer-overflow-in-sonos-era-300-bf316d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1049%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Sonos%20Era%20300&amp;severity=medium&amp;id=682d9843c4522896dcbf316d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1048-cwe-416-use-after-free-in-sonos-era-300-bf3169</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1048%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Sonos%20Era%20300&amp;severity=medium&amp;id=682d9843c4522896dcbf3169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1047-cwe-824-access-of-uninitialized-pointer-in-luxion-keyshot-bf3165</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1047%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Luxion%20KeyShot&amp;severity=medium&amp;id=682d9843c4522896dcbf3165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1046-cwe-416-use-after-free-in-luxion-keyshot-bf3161</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1046%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Luxion%20KeyShot&amp;severity=medium&amp;id=682d9843c4522896dcbf3161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1045-cwe-122-heap-based-buffer-overflow-in-luxion-keyshot-viewer-bf2ccd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1045%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Luxion%20KeyShot%20Viewer&amp;severity=medium&amp;id=682d9843c4522896dcbf2ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stealer-on-the-horizon-2740a0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Stealer%20on%20the%20Horizon&amp;severity=medium&amp;id=68309d5c0acd01a2492740a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47829-cwe-328-use-of-weak-hash-in-pnpm-pnpm-bf5450</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47829%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20pnpm%20pnpm&amp;severity=medium&amp;id=682d9847c4522896dcbf5450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21605-cwe-770-allocation-of-resources-without-limits-or-throttling-in-redis-redis-bd6e93</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21605%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20redis%20redis&amp;severity=high&amp;id=682d9816c4522896dcbd6e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32969-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-xwiki-xwiki-platform-bf5456</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32969%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9847c4522896dcbf5456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32968-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-xwiki-xwiki-platform-bf5452</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32968%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9847c4522896dcbf5452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32966-cwe-290-authentication-bypass-by-spoofing-in-dataease-dataease-bf509f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32966%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20dataease%20dataease&amp;severity=medium&amp;id=682d9846c4522896dcbf509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2703-cwe-79-in-grafana-grafana-bf5ac3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2703%3A%20CWE-79%20in%20Grafana%20Grafana&amp;severity=medium&amp;id=682d9847c4522896dcbf5ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42605-cwe-639-authorization-bypass-through-user-controlled-key-in-meon-bidding-solutions-bf59f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42605%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Meon%20Bidding%20Solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf59f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42604-cwe-1295-debug-messages-revealing-unnecessary-information-in-meon-kyc-solutions-bf593e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42604%3A%20CWE-1295%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20Meon%20KYC%20solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf593e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42603-cwe-319-cleartext-transmission-of-sensitive-information-in-meon-kyc-solutions-bf57b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42603%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Meon%20KYC%20solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf57b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42602-cwe-613-insufficient-session-expiration-in-meon-kyc-solutions-bf5729</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42602%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Meon%20KYC%20solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf5729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42601-cwe-602-client-side-enforcement-of-server-side-security-in-meon-kyc-solutions-bf5725</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42601%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Meon%20KYC%20solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf5725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42600-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-meon-kyc-solutions-bf56c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42600%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Meon%20KYC%20solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf56c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10306-incorrect-authorization-aec8fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10306%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=682cd0fb1484d88663aec8fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1054-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-uicore-uicore-elements-free-elementor-widgets-and-templates-bf562d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uicore%20UiCore%20Elements%20%E2%80%93%20Free%20widgets%20and%20templates%20for%20Elementor&amp;severity=medium&amp;id=682d9847c4522896dcbf562d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2595-cwe-425-direct-request-forced-browsing-in-codesys-codesys-visualization-bf5097</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2595%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20CODESYS%20CODESYS%20Visualization&amp;severity=medium&amp;id=682d9846c4522896dcbf5097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3530-cwe-472-external-control-of-assumed-immutable-web-parameter-in-mra13-wordpress-simple-shopping-cart-bf50b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3530%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20mra13%20Simple%20Shopping%20Cart&amp;severity=high&amp;id=682d9846c4522896dcbf50b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3529-cwe-201-insertion-of-sensitive-information-into-sent-data-in-mra13-wordpress-simple-shopping-cart-bf31aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3529%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20mra13%20Simple%20Shopping%20Cart&amp;severity=high&amp;id=682d9843c4522896dcbf31aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0618-cwe-94-improper-control-of-generation-of-code-code-injection-in-trellix-fireeye-edr-hx-bf5c8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0618%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Trellix%20FireEye%20EDR%20HX&amp;severity=medium&amp;id=682d9848c4522896dcbf5c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0926-cwe-732-incorrect-permission-assignment-for-critical-resource-in-axis-communications-ab-axis-camera-station-pro-bf5c45</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0926%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=682d9848c4522896dcbf5c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1056-cwe-73-external-control-of-file-name-or-path-in-axis-communications-ab-axis-camera-station-pro-bf5c6f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1056%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=682d9848c4522896dcbf5c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1021-missing-authorization-in-synology-diskstation-manager-dsm-bf5c5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1021%3A%20Missing%20Authorization%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=medium&amp;id=682d9848c4522896dcbf5c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43716-cwe-180-incorrect-behavior-order-validate-before-canonicalize-in-ivanti-landesk-management-suite-bf5bff</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43716%3A%20CWE-180%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20Ivanti%20LANDesk%20Management%20Suite&amp;severity=medium&amp;id=682d9847c4522896dcbf5bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46393-cwe-131-incorrect-calculation-of-buffer-size-in-imagemagick-imagemagick-bf5735</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46393%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20ImageMagick%20ImageMagick&amp;severity=medium&amp;id=682d9847c4522896dcbf5735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45428-n-a-in-n-a-bf5731</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45428%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45427-n-a-in-n-a-bf572d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45427%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf572d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45429-n-a-in-n-a-bf56ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45429%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf56ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29526-n-a-in-n-a-bf29bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29526%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9842c4522896dcbf29bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58251-cwe-150-improper-neutralization-of-escape-meta-or-control-sequences-in-busybox-busybox-bf169a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58251%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20BusyBox%20BusyBox&amp;severity=medium&amp;id=682d9840c4522896dcbf169a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28169-n-a-in-n-a-bf1581</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28169%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf1581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27581-cwe-425-direct-request-forced-browsing-in-nih-brics-bf1131</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27581%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20NIH%20BRICS&amp;severity=medium&amp;id=682d9840c4522896dcbf1131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27580-cwe-335-incorrect-usage-of-seeds-in-pseudo-random-number-generator-prng-in-nih-brics-bf112d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27580%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20NIH%20BRICS&amp;severity=medium&amp;id=682d9840c4522896dcbf112d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28028-n-a-in-n-a-bf0d7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28028%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28025-n-a-in-n-a-bf0d77</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28025%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28022-n-a-in-n-a-bf0d73</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28022%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28021-n-a-in-n-a-bf0d66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28021%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28020-n-a-in-n-a-bf0d62</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28020%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28019-n-a-in-n-a-bf0d5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28019%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28018-n-a-in-n-a-bf0d4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28018%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28017-n-a-in-n-a-bf0d47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28017%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46394-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-busybox-busybox-bf0929</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46394%3A%20CWE-451%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20BusyBox%20BusyBox&amp;severity=medium&amp;id=682d983fc4522896dcbf0929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43965-cwe-131-incorrect-calculation-of-buffer-size-in-imagemagick-imagemagick-befa80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43965%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20ImageMagick%20ImageMagick&amp;severity=low&amp;id=682d983ec4522896dcbefa80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-23-2a48d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-23&amp;severity=medium&amp;id=682c7db2e8347ec82d2a48d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-23-f1239d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f1239d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37088-vulnerability-in-hewlett-packard-enterprise-hpe-hpe-cray-data-virtualization-service-dvs-bf04e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37088%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Cray%20Data%20Virtualization%20Service%20(DVS)&amp;severity=medium&amp;id=682d983fc4522896dcbf04e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27087-vulnerability-in-hewlett-packard-enterprise-hpe-hpe-cray-operating-system-cos-bf5c75</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27087%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Cray%20Operating%20System%20(COS)&amp;severity=medium&amp;id=682d9848c4522896dcbf5c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37087-vulnerability-in-hewlett-packard-enterprise-hpe-hpe-performance-cluster-manager-hpcm-bd8f3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37087%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Performance%20Cluster%20Manager%20(HPCM)&amp;severity=critical&amp;id=682d981ac4522896dcbd8f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32965-cwe-506-embedded-malicious-code-in-xrplf-xrpl-js-bf5c2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32965%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20XRPLF%20xrpl.js&amp;severity=medium&amp;id=682d9847c4522896dcbf5c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23253-cwe-547-use-of-hard-coded-security-relevant-constants-in-nvidia-nvidia-app-bf6042</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23253%3A%20CWE-547%20Use%20of%20Hard-coded%2C%20Security-relevant%20Constants%20in%20NVIDIA%20NVIDIA%20App&amp;severity=medium&amp;id=682d9848c4522896dcbf6042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31328-cwe-352-cross-site-request-forgery-csrf-in-sap-se-sap-s-4-hana-learning-solution-bf54f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31328%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SAP_SE%20SAP%20S%2F4%20HANA%20(Learning%20Solution)&amp;severity=medium&amp;id=682d9847c4522896dcbf54f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31327-cwe-472-external-control-of-assumed-immutable-web-parameter-in-sap-se-sap-field-logistics-bf54f1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31327%3A%20CWE-472%3A%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20SAP_SE%20SAP%20Field%20Logistics&amp;severity=medium&amp;id=682d9847c4522896dcbf54f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32961-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cuba-platform-jpawebapi-bf5518</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32961%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cuba-platform%20jpawebapi&amp;severity=medium&amp;id=682d9847c4522896dcbf5518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32960-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cuba-platform-restapi-bf5514</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32960%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cuba-platform%20restapi&amp;severity=medium&amp;id=682d9847c4522896dcbf5514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32959-cwe-770-allocation-of-resources-without-limits-or-throttling-in-cuba-platform-cuba-bf6084</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32959%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20cuba-platform%20cuba&amp;severity=medium&amp;id=682d9848c4522896dcbf6084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32951-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jmix-framework-jmix-bf019d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32951%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmix-framework%20jmix&amp;severity=medium&amp;id=682d983ec4522896dcbf019d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32952-cwe-770-allocation-of-resources-without-limits-or-throttling-in-jmix-framework-jmix-bf01a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32952%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20jmix-framework%20jmix&amp;severity=medium&amp;id=682d983ec4522896dcbf01a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32964-cwe-285-improper-authorization-in-miraheze-managewiki-bf683a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32964%3A%20CWE-285%3A%20Improper%20Authorization%20in%20miraheze%20ManageWiki&amp;severity=medium&amp;id=682d9849c4522896dcbf683a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32963-cwe-522-insufficiently-protected-credentials-in-minio-operator-bf01a5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32963%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20minio%20operator&amp;severity=medium&amp;id=682d983ec4522896dcbf01a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32950-cwe-35-path-traversal-in-jmix-framework-jmix-bf0190</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32950%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20jmix-framework%20jmix&amp;severity=medium&amp;id=682d983ec4522896dcbf0190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32788-cwe-290-authentication-bypass-by-spoofing-in-octoprint-octoprint-bf018c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32788%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20OctoPrint%20OctoPrint&amp;severity=medium&amp;id=682d983ec4522896dcbf018c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/case-of-attacks-targeting-ms-sql-servers-to-install-ammyy-admin-2622b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Case%20of%20Attacks%20Targeting%20MS-SQL%20Servers%20to%20Install%20Ammyy%20Admin&amp;severity=medium&amp;id=682f4bb70acd01a2492622b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34028-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-commvault-command-center-innovation-release-bd89e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34028%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Commvault%20Command%20Center%20Innovation%20Release&amp;severity=critical&amp;id=682d9819c4522896dcbd89e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27907-cwe-918-server-side-request-forgery-ssrf-in-ibm-websphere-application-server-bf6836</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27907%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=682d9849c4522896dcbf6836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23251-cwe-94-improper-control-of-generation-of-code-code-injection-in-nvidia-nemo-framework-bf54e3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23251%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=682d9847c4522896dcbf54e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23250-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-nvidia-nemo-framework-bf54df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23250%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=682d9847c4522896dcbf54df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23249-cwe-502-deserialization-of-untrusted-data-in-nvidia-nemo-framework-bf54b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23249%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=682d9847c4522896dcbf54b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3767-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-centreon-centreon-bam-bf6de5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3767%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20Centreon%20BAM&amp;severity=medium&amp;id=682d9849c4522896dcbf6de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1951-cwe-250-execution-with-unnecessary-privileges-in-ibm-hardware-management-console-power-systems-bf5cdc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1951%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Hardware%20Management%20Console%20-%20Power%20Systems&amp;severity=high&amp;id=682d9848c4522896dcbf5cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1950-cwe-114-process-control-in-ibm-hardware-management-console-power-systems-bf5cd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1950%3A%20CWE-114%20Process%20Control%20in%20IBM%20Hardware%20Management%20Console%20-%20Power%20Systems&amp;severity=critical&amp;id=682d9848c4522896dcbf5cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23176-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tecnick-tcexam-bf6de1</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23176%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=682d9849c4522896dcbf6de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23175-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-tecnick-tcexam-bf7739</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23175%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=682d984ac4522896dcbf7739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2092-cwe-532-insertion-of-sensitive-information-into-log-file-in-checkmk-gmbh-checkmk-bf7711</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2092%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=682d984ac4522896dcbf7711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11299-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-memberpress-memberpress-bf768e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11299%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MemberPress%20Memberpress&amp;severity=medium&amp;id=682d984ac4522896dcbf768e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3458-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-oceanwp-ocean-extra-bf76d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=682d984ac4522896dcbf76d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3472-cwe-94-improper-control-of-generation-of-code-code-injection-in-oceanwp-ocean-extra-bf76db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3472%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=682d984ac4522896dcbf76db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3457-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-oceanwp-ocean-extra-bf76cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=682d984ac4522896dcbf76cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46254-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-visual-composer-visual-composer-website-builder-bf76f3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46254%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Visual%20Composer%20Visual%20Composer%20Website%20Builder&amp;severity=null&amp;id=682d984ac4522896dcbf76f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46253-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ataur-r-gutenkit-bf76eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46253%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ataur%20R%20GutenKit&amp;severity=null&amp;id=682d984ac4522896dcbf76eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46252-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-kofimokome-message-filter-for-contact-form-7-bf7686</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46252%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kofi%20Mokome%20Message%20Filter%20for%20Contact%20Form%207&amp;severity=null&amp;id=682d984ac4522896dcbf7686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46251-cwe-352-cross-site-request-forgery-csrf-in-e4jvikwp-vikrestaurants-table-reservations-and-take-away-bf767e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46251%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20e4jvikwp%20VikRestaurants&amp;severity=null&amp;id=682d984ac4522896dcbf767e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46250-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-vikas-ratudi-vform-bf7676</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46250%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=682d984ac4522896dcbf7676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46249-cwe-352-cross-site-request-forgery-csrf-in-michael-simple-calendar-for-elementor-bf7657</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46249%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Michael%20Simple%20calendar%20for%20Elementor&amp;severity=null&amp;id=682d984ac4522896dcbf7657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46247-cwe-862-missing-authorization-in-codepeople-appointment-booking-calendar-bf6dfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46247%3A%20Missing%20Authorization%20in%20codepeople%20Appointment%20Booking%20Calendar&amp;severity=null&amp;id=682d9849c4522896dcbf6dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46246-cwe-352-cross-site-request-forgery-csrf-in-creativemindssolutions-cm-answers-bf6de9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46246%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CreativeMindsSolutions%20CM%20Answers&amp;severity=null&amp;id=682d9849c4522896dcbf6de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46245-cwe-352-cross-site-request-forgery-csrf-in-creativemindssolutions-cm-ad-changer-bf6b6f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46245%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CreativeMindsSolutions%20CM%20Ad%20Changer&amp;severity=null&amp;id=682d9849c4522896dcbf6b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46244-cwe-862-missing-authorization-in-dotstore-advanced-linked-variations-for-woocommerce-bf6b69</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46244%3A%20Missing%20Authorization%20in%20Dotstore%20Advanced%20Linked%20Variations%20for%20Woocommerce&amp;severity=null&amp;id=682d9849c4522896dcbf6b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46243-cwe-352-cross-site-request-forgery-csrf-in-sonalsinha21-recover-abandoned-cart-for-woocommerce-bf6ad4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46243%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sonalsinha21%20Recover%20abandoned%20cart%20for%20WooCommerce&amp;severity=null&amp;id=682d9849c4522896dcbf6ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46242-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-bob-watu-quiz-bf6ad0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46242%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bob%20Watu%20Quiz&amp;severity=null&amp;id=682d9849c4522896dcbf6ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46241-cwe-352-cross-site-request-forgery-csrf-in-codepeople-appointment-booking-calendar-bf6acc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46241%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codepeople%20Appointment%20Booking%20Calendar&amp;severity=null&amp;id=682d9849c4522896dcbf6acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46240-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jeff-starr-simple-download-counter-bf762f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeff%20Starr%20Simple%20Download%20Counter&amp;severity=null&amp;id=682d984ac4522896dcbf762f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46239-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jeff-starr-theme-switcha-bf762b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeff%20Starr%20Theme%20Switcha&amp;severity=null&amp;id=682d984ac4522896dcbf762b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46238-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rbaer-list-last-changes-bf75ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rbaer%20List%20Last%20Changes&amp;severity=null&amp;id=682d984ac4522896dcbf75ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46237-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yannick-lefebvre-link-library-bf75e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yannick%20Lefebvre%20Link%20Library&amp;severity=null&amp;id=682d984ac4522896dcbf75e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46236-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-link-software-llc-html-forms-bf75b4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46236%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Link%20Software%20LLC%20HTML%20Forms&amp;severity=null&amp;id=682d984ac4522896dcbf75b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46235-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sonalsinha21-skt-blocks-gutenberg-based-page-builder-bf7542</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=682d984ac4522896dcbf7542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46233-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sirv-cdn-and-image-hosting-sirv-bf753e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sirv%20CDN%20and%20Image%20Hosting%20Sirv&amp;severity=null&amp;id=682d984ac4522896dcbf753e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46232-cwe-862-missing-authorization-in-alttextai-download-alt-text-ai-bf7486</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46232%3A%20Missing%20Authorization%20in%20alttextai%20Download%20Alt%20Text%20AI&amp;severity=null&amp;id=682d984ac4522896dcbf7486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46231-cwe-352-cross-site-request-forgery-csrf-in-servit-software-solutions-affiliate-toolkit-bf7427</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46231%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SERVIT%20Software%20Solutions%20affiliate-toolkit&amp;severity=null&amp;id=682d984ac4522896dcbf7427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46229-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-israpil-textmetrics-bf7423</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46229%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Israpil%20Textmetrics&amp;severity=null&amp;id=682d984ac4522896dcbf7423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46228-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bastien-ho-event-post-bf6abf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=null&amp;id=682d9849c4522896dcbf6abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46227-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-brecht-custom-related-posts-bf6abb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46227%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brecht%20Custom%20Related%20Posts&amp;severity=null&amp;id=682d9849c4522896dcbf6abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46226-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ferranfg-mpl-publisher-bf6ab7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46226%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ferranfg%20MPL-Publisher&amp;severity=null&amp;id=682d9849c4522896dcbf6ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46225-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-michael-post-in-page-for-elementor-bf6aa6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46225%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michael%20Post%20in%20page%20for%20Elementor&amp;severity=medium&amp;id=682d9849c4522896dcbf6aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3519-cwe-639-authorization-bypass-through-user-controlled-key-in-unblu-inc-unblu-spark-bf604a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3519%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unblu%20inc.%20Unblu%20Spark&amp;severity=medium&amp;id=682d9848c4522896dcbf604a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3518-vulnerability-in-unblu-inc-unblu-spark-bf10ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3518%3A%20Vulnerability%20in%20Unblu%20inc.%20Unblu%20Spark&amp;severity=medium&amp;id=682d9840c4522896dcbf10ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26413-cwe-20-improper-input-validation-in-apache-software-foundation-apache-kvrocks-bd6bce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26413%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Kvrocks&amp;severity=high&amp;id=682d9816c4522896dcbd6bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2594-cwe-287-improper-authentication-in-unknown-user-registration-membership-bf741f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2594%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20User%20Registration%20%26%20Membership&amp;severity=high&amp;id=682d984ac4522896dcbf741f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13569-cwe-79-cross-site-scripting-xss-in-unknown-front-end-users-bf73fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13569%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Front%20End%20Users&amp;severity=high&amp;id=682d984ac4522896dcbf73fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3814-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wijnbergdevelopments-tax-switch-for-woocommerce-bf6059</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wijnbergdevelopments%20Tax%20Switch%20for%20WooCommerce&amp;severity=medium&amp;id=682d9848c4522896dcbf6059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2839-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-vjinfotech-wp-import-export-lite-bf7727</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2839%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vjinfotech%20WP%20Import%20Export%20Lite&amp;severity=medium&amp;id=682d984ac4522896dcbf7727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3616-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-wpsoul-greenshift-animation-and-page-builder-blocks-bf7731</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3616%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=high&amp;id=682d984ac4522896dcbf7731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46899-cwe-1392-use-of-default-credentials-in-hitachi-hitachi-ops-center-common-services-bf7696</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46899%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Hitachi%20Hitachi%20Ops%20Center%20Common%20Services&amp;severity=medium&amp;id=682d984ac4522896dcbf7696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2300-cwe-532-insertion-of-sensitive-information-into-log-file-in-hitachi-hitachi-ops-center-common-services-bf76ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2300%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20Common%20Services&amp;severity=medium&amp;id=682d984ac4522896dcbf76ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3577-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-zyxel-amg1302-t10b-firmware-bf76e3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3577%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zyxel%20AMG1302-T10B%20firmware&amp;severity=medium&amp;id=682d984ac4522896dcbf76e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1732-cwe-269-improper-privilege-management-in-zyxel-usg-flex-h-series-uos-firmware-bf5ccc</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1732%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Zyxel%20USG%20FLEX%20H%20series%20uOS%20firmware&amp;severity=medium&amp;id=682d9848c4522896dcbf5ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1731-cwe-732-incorrect-permission-assignment-for-critical-resource-in-zyxel-usg-flex-h-series-uos-firmware-bec284</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1731%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Zyxel%20USG%20FLEX%20H%20series%20uOS%20firmware&amp;severity=high&amp;id=682d9838c4522896dcbec284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3856-sql-injection-in-xxyopen-novel-plus-bf78ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3856%3A%20SQL%20Injection%20in%20xxyopen%20Novel-Plus&amp;severity=medium&amp;id=682d984ac4522896dcbf78ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3855-improper-control-of-resource-identifiers-in-codecanyon-rise-ultimate-project-manager-bf78e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3855%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20CodeCanyon%20RISE%20Ultimate%20Project%20Manager&amp;severity=medium&amp;id=682d984ac4522896dcbf78e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3854-buffer-overflow-in-h3c-gr-3000ax-bf78e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3854%3A%20Buffer%20Overflow%20in%20H3C%20GR-3000AX&amp;severity=medium&amp;id=682d984ac4522896dcbf78e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3850-improper-authentication-in-yxj2018-springboot-vue-onlineexam-bf78e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3850%3A%20Improper%20Authentication%20in%20YXJ2018%20SpringBoot-Vue-OnlineExam&amp;severity=medium&amp;id=682d984ac4522896dcbf78e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-11-23h2-clfssys-elevation-of-pri-44c16481</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%2011%2023h2%20-%20CLFS.sys%20Elevation%20of%20Privilege&amp;severity=high&amp;id=68489e837e6d765d51d546c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wondercms-342-remote-code-execution-rce-34314eed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WonderCMS%203.4.2%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68489e7d7e6d765d51d546bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-projects-online-exam-mastering-system-10-refl-d8906b5b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=code-projects%20Online%20Exam%20Mastering%20System%201.0%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=68489e777e6d765d51d546af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/firefox-esr-11511-pdfjs-arbitrary-javascript-execu-01e40610</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Firefox%20ESR%20115.11%20-%20PDF.js%20Arbitrary%20JavaScript%20execution&amp;severity=medium&amp;id=68489e6e7e6d765d51d546a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-core-62-directory-traversal-935994a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Core%206.2%20-%20Directory%20Traversal&amp;severity=medium&amp;id=68489e5c7e6d765d51d54674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-11-kernel-privilege-escalation-cae94a9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%2011%20-%20Kernel%20Privilege%20Escalation&amp;severity=high&amp;id=68489e527e6d765d51d543b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58250-cwe-426-untrusted-search-path-in-samba-ppp-bf78a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58250%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Samba%20ppp&amp;severity=medium&amp;id=682d984ac4522896dcbf78a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46546-n-a-in-n-a-bf7228</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46546%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28039-n-a-in-n-a-bf6032</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28039%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9848c4522896dcbf6032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28038-n-a-in-n-a-bf602a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28038%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9848c4522896dcbf602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28031-n-a-in-n-a-bf6004</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28031%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf6004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29547-n-a-in-n-a-bf5fb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29547%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33452-n-a-in-n-a-bf5fa1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33452%3A%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53569-n-a-in-n-a-bf5e9f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53569%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43952-n-a-in-n-a-bf5e4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43952%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29743-n-a-in-n-a-bf5df5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29743%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43948-n-a-in-n-a-bf5dd4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43948%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43947-n-a-in-n-a-bf5dcc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43947%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29621-n-a-in-n-a-bf5dc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29621%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26159-n-a-in-n-a-bf5dbe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26159%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43951-n-a-in-n-a-bf5c3d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43951%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9848c4522896dcbf5c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43950-n-a-in-n-a-bf5c35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43950%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43949-n-a-in-n-a-bf5c2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43949%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9848c4522896dcbf5c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44755-n-a-in-n-a-bf5c27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44755%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44752-n-a-in-n-a-bf5c18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44752%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29339-n-a-in-n-a-bf5be0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29339%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28030-n-a-in-n-a-bf5bdc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28030%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28024-n-a-in-n-a-bf5bd8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28024%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43958-n-a-in-n-a-bf5bd4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43958%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53568-n-a-in-n-a-bf5b7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53568%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28026-n-a-in-n-a-bf5b18</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28026%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28036-n-a-in-n-a-bf5abf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28036%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28035-n-a-in-n-a-bf5936</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28035%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28029-n-a-in-n-a-bf592e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28029%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf592e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28033-n-a-in-n-a-bf58b2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28033%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf58b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40446-n-a-in-n-a-bf58ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40446%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf58ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44753-n-a-in-n-a-bf5893</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44753%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43378-n-a-in-n-a-bf588f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43378%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf588f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28034-n-a-in-n-a-bf5822</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28034%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28032-n-a-in-n-a-bf581e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28032%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf581e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28037-n-a-in-n-a-bf54eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28037%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf54eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28027-n-a-in-n-a-bf479d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28027%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9845c4522896dcbf479d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43946-n-a-in-n-a-bf0436</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43946%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40445-n-a-in-n-a-bede22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40445%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbede22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-22-2a43f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-22&amp;severity=medium&amp;id=682c7db2e8347ec82d2a43f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-22-f1216f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f1216f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3849-unverified-password-change-in-yxj2018-springboot-vue-onlineexam-bf78dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3849%3A%20Unverified%20Password%20Change%20in%20YXJ2018%20SpringBoot-Vue-OnlineExam&amp;severity=medium&amp;id=682d984ac4522896dcbf78dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2987-cwe-918-server-side-request-forgery-ssrf-in-ibm-maximo-asset-management-bf78ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2987%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Maximo%20Asset%20Management&amp;severity=low&amp;id=682d984ac4522896dcbf78ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3847-sql-injection-in-markparticle-webserver-bf78bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3847%3A%20SQL%20Injection%20in%20markparticle%20WebServer&amp;severity=medium&amp;id=682d984ac4522896dcbf78bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3846-sql-injection-in-markparticle-webserver-bf78bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3846%3A%20SQL%20Injection%20in%20markparticle%20WebServer&amp;severity=medium&amp;id=682d984ac4522896dcbf78bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3845-buffer-overflow-in-markparticle-webserver-bf78b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3845%3A%20Buffer%20Overflow%20in%20markparticle%20WebServer&amp;severity=medium&amp;id=682d984ac4522896dcbf78b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3843-cross-site-request-forgery-in-panhainan-ds-java-bf78b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3843%3A%20Cross-Site%20Request%20Forgery%20in%20panhainan%20DS-Java&amp;severity=medium&amp;id=682d984ac4522896dcbf78b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32955-cwe-268-privilege-chaining-in-step-security-harden-runner-bf78af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32955%3A%20CWE-268%3A%20Privilege%20Chaining%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=682d984ac4522896dcbf78af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32956-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-miraheze-managewiki-bd6c48</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32956%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20miraheze%20ManageWiki&amp;severity=high&amp;id=682d9816c4522896dcbd6c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32958-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-adeptlanguage-adept-bf789f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32958%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AdeptLanguage%20Adept&amp;severity=medium&amp;id=682d984ac4522896dcbf789f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3842-code-injection-in-panhainan-ds-java-bf78a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3842%3A%20Code%20Injection%20in%20panhainan%20DS-Java&amp;severity=medium&amp;id=682d984ac4522896dcbf78a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3841-improper-neutralization-of-special-elements-used-in-a-template-engine-in-wix-incubator-jam-bf15bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3841%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20wix-incubator%20jam&amp;severity=medium&amp;id=682d9840c4522896dcbf15bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27086-vulnerability-in-hewlett-packard-enterprise-hpe-performance-cluster-manager-hpcm-bf7704</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27086%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20Performance%20Cluster%20Manager%20(HPCM)&amp;severity=high&amp;id=682d984ac4522896dcbf7704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23174-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-yoel-geva-android-app-bf7b1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23174%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Yoel%20Geva%20Android%20App&amp;severity=medium&amp;id=682d984bc4522896dcbf7b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32793-cwe-319-cleartext-transmission-of-sensitive-information-in-cilium-cilium-bf7bd7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32793%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20cilium%20cilium&amp;severity=medium&amp;id=682d984bc4522896dcbf7bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32431-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-traefik-traefik-bf7bcf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32431%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20traefik%20traefik&amp;severity=medium&amp;id=682d984bc4522896dcbf7bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12543-cwe-841-improper-enforcement-of-behavioral-workflow-in-opentext-opentext-content-management-bf7bfe</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12543%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20OpenText%20OpenText%20Content%20Management&amp;severity=medium&amp;id=682d984bc4522896dcbf7bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3857-cwe-835-loop-with-unreachable-exit-condition-infinite-loop-in-amazon-amazon-ion-dotnet-bf7c1e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3857%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Amazon%20Amazon%20Ion%20Dotnet&amp;severity=high&amp;id=682d984bc4522896dcbf7c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12863-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-opentext-opentext-content-management-bf7cb1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%20OpenText%20Content%20Management&amp;severity=medium&amp;id=682d984bc4522896dcbf7cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2298-cwe-862-missing-authorization-in-dremio-corporation-dremio-software-bf7bc7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2298%3A%20CWE-862%20Missing%20Authorization%20in%20Dremio%20Corporation%20Dremio%20Software&amp;severity=medium&amp;id=682d984bc4522896dcbf7bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2517-cwe-672-operation-on-a-resource-after-expiration-or-release-in-opentext-arcsight-enterprise-security-manager-bf7da7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2517%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20OpenText%20ArcSight%20Enterprise%20Security%20Manager&amp;severity=medium&amp;id=682d984bc4522896dcbf7da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12862-cwe-863-incorrect-authorization-in-opentext-content-server-bf7cad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12862%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenText%20Content%20Server&amp;severity=medium&amp;id=682d984bc4522896dcbf7cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3840-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-saviynt-ova-based-connect-bf84a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3840%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Saviynt%20OVA%20based%20Connect&amp;severity=medium&amp;id=682d984bc4522896dcbf84a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3838-cwe-863-incorrect-authorization-in-saviynt-ova-based-connect-bf8477</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3838%3A%20CWE-863%20Incorrect%20Authorization%20in%20Saviynt%20OVA%20based%20Connect&amp;severity=medium&amp;id=682d984bc4522896dcbf8477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3837-cwe-20-improper-input-validation-in-saviynt-ova-based-connect-bf8467</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3837%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Saviynt%20OVA%20based%20Connect&amp;severity=medium&amp;id=682d984bc4522896dcbf8467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25228-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-in-virtuemart-net-virtuemart-component-for-joomla-bd9c27</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25228%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20virtuemart.net%20Virtuemart%20component%20for%20Joomla&amp;severity=low&amp;id=682d981bc4522896dcbd9c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0632-cwe-98-improper-control-of-filename-for-include-in-formulatrix-rock-maker-web-befa61</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0632%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%20in%20Formulatrix%20Rock%20Maker%20Web&amp;severity=critical&amp;id=682d983ec4522896dcbefa61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43916-cwe-647-use-of-non-canonical-url-paths-for-authorization-decisions-in-sonos-api-sonos-com-bf7edb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43916%3A%20CWE-647%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20Sonos%20api.sonos.com&amp;severity=medium&amp;id=682d984bc4522896dcbf7edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41446-n-a-in-n-a-bf7da1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41446%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29659-n-a-in-n-a-bf7d69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29659%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29287-n-a-in-n-a-bf7d65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29287%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29660-n-a-in-n-a-bf7d2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29660%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28121-n-a-in-n-a-bf7d27</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28121%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28367-n-a-in-n-a-bf7bb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28367%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42699-n-a-in-n-a-bf7bb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42699%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43922-cwe-863-incorrect-authorization-in-filewave-filewave-bf7b78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43922%3A%20CWE-863%20Incorrect%20Authorization%20in%20FileWave%20FileWave&amp;severity=medium&amp;id=682d984bc4522896dcbf7b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28102-n-a-in-n-a-bf7abe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28102%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32408-cwe-863-incorrect-authorization-in-soffid-iam-bf5503</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32408%3A%20CWE-863%20Incorrect%20Authorization%20in%20Soffid%20IAM&amp;severity=medium&amp;id=682d9847c4522896dcbf5503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29446-n-a-in-n-a-bd707f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29446%3A%20n%2Fa&amp;severity=low&amp;id=682d9817c4522896dcbd707f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28103-n-a-in-n-a-bd7070</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28103%3A%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28099-n-a-in-n-a-bd7068</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28099%3A%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57394-n-a-in-n-a-bd704f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57394%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd704f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28104-n-a-in-n-a-bd6bdf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28104%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-21-2a4052</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-21&amp;severity=medium&amp;id=682c7db2e8347ec82d2a4052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-21-f12ea4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3824-cross-site-scripting-in-sourcecodester-web-based-pharmacy-product-management-system-bf8463</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3824%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=682d984bc4522896dcbf8463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3823-cross-site-scripting-in-sourcecodester-web-based-pharmacy-product-management-system-bf83f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3823%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=682d984bc4522896dcbf83f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43955-cwe-749-exposed-dangerous-method-or-function-in-convertigo-convertigo-bf8392</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43955%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Convertigo%20Convertigo&amp;severity=medium&amp;id=682d984bc4522896dcbf8392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43954-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-quasar-qmarkdown-bf8339</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43954%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Quasar%20QMarkdown&amp;severity=medium&amp;id=682d984bc4522896dcbf8339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43929-cwe-346-origin-validation-error-in-kitty-project-kitty-bf81c5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43929%3A%20CWE-346%20Origin%20Validation%20Error%20in%20kitty%20project%20kitty&amp;severity=medium&amp;id=682d984bc4522896dcbf81c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43928-cwe-24-path-traversal-filedir-in-infodraw-media-relay-service-bf7e19</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43928%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Infodraw%20Media%20Relay%20Service&amp;severity=medium&amp;id=682d984bc4522896dcbf7e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43921-cwe-863-incorrect-authorization-in-gnu-mailman-befa06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43921%3A%20CWE-863%20Incorrect%20Authorization%20in%20GNU%20Mailman&amp;severity=medium&amp;id=682d983ec4522896dcbefa06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43920-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-gnu-mailman-bef9fe</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43920%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20GNU%20Mailman&amp;severity=medium&amp;id=682d983ec4522896dcbef9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43919-cwe-24-path-traversal-filedir-in-gnu-mailman-bef9f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43919%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20GNU%20Mailman&amp;severity=medium&amp;id=682d983ec4522896dcbef9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-20-2a5423</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-20&amp;severity=medium&amp;id=682c7db3e8347ec82d2a5423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-20-f12816</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3820-stack-based-buffer-overflow-in-tenda-w12-bf7de5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3820%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W12&amp;severity=medium&amp;id=682d984bc4522896dcbf7de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3818-sql-injection-in-webpy-webpy-e91e0184</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3818%3A%20SQL%20Injection%20in%20webpy%20web.py&amp;severity=medium&amp;id=68386122182aa0cae27f1da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3805-injection-in-sarrionandia-tournatrack-bf84f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3805%3A%20Injection%20in%20sarrionandia%20tournatrack&amp;severity=medium&amp;id=682d984bc4522896dcbf84f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3804-injection-in-thautwarm-vscode-diana-bf84e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3804%3A%20Injection%20in%20thautwarm%20vscode-diana&amp;severity=medium&amp;id=682d984bc4522896dcbf84e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3802-stack-based-buffer-overflow-in-tenda-w12-bf7d88</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3802%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W12&amp;severity=medium&amp;id=682d984bc4522896dcbf7d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3801-cross-site-scripting-in-songquanpeng-one-api-bf800d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3801%3A%20Cross%20Site%20Scripting%20in%20songquanpeng%20one-api&amp;severity=medium&amp;id=682d984bc4522896dcbf800d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3800-sql-injection-in-wcms-bf7eca</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3800%3A%20SQL%20Injection%20in%20WCMS&amp;severity=medium&amp;id=682d984bc4522896dcbf7eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3799-sql-injection-in-wcms-bf7ec2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3799%3A%20SQL%20Injection%20in%20WCMS&amp;severity=medium&amp;id=682d984bc4522896dcbf7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3798-unrestricted-upload-in-wcms-bf7eb2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3798%3A%20Unrestricted%20Upload%20in%20WCMS&amp;severity=medium&amp;id=682d984bc4522896dcbf7eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3661-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bobbingwide-sb-chart-block-bf7d80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3661%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20SB%20Chart%20block&amp;severity=medium&amp;id=682d984bc4522896dcbf7d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3404-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-codename065-download-manager-bf7e9b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3404%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20codename065%20Download%20Manager&amp;severity=high&amp;id=682d984bc4522896dcbf7e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4455-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-codeflist-wordpress-plugin-smart-product-review-bf7e65</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4455%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Codeflist%20Wordpress%20Plugin%20Smart%20Product%20Review&amp;severity=medium&amp;id=682d984bc4522896dcbf7e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3809-cwe-79-improper-neutralization-of-in-f6fd01dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qriouslad%20Debug%20Log%20Manager%20%E2%80%93%20Conveniently%20Monitor%20and%20Inspect%20Errors&amp;severity=high&amp;id=699f6b2bb7ef31ef0b54ef86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2111-cwe-352-cross-site-request-forgery-c-8d67c42a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2111%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hiddenpearls%20Insert%20Headers%20And%20Footers&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3103-cwe-73-external-control-of-file-name-a99dbf92</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3103%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20LambertGroup%20CLEVER%20-%20HTML5%20Radio%20Player%20With%20History%20-%20Shoutcast%20and%20Icecast%20-%20Elementor%20Widget%20Addon&amp;severity=high&amp;id=699f6b29b7ef31ef0b54eca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1457-cwe-79-improper-neutralization-of-in-18ecd1ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3275-cwe-79-improper-neutralization-of-in-b209d946</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesflat%20Themesflat%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ecbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1093-cwe-434-unrestricted-upload-of-file--3c72ce7f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1093%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20LiquidThemes%20AI%20Hub%20-%20Startup%20%26%20Technology%20WordPress%20Theme&amp;severity=critical&amp;id=699f6b0eb7ef31ef0b54da46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2010-cwe-89-improper-neutralization-of-sp-65239a1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2010%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mhmrajib%20JobWP%20%E2%80%93%20Job%20Board%2C%20Job%20Listing%2C%20Career%20Page%20and%20Recruitment%20Plugin&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3278-cwe-269-improper-privilege-managemen-d0d1babe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3278%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Edge-Themes%20UrbanGo%20Membership&amp;severity=critical&amp;id=699f6b29b7ef31ef0b54ed8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3284-cwe-352-cross-site-request-forgery-csrf-in-wpeverest-user-registration-pro-custom-registration-form-login-form-and-user-profile-wordpress-plugin-bf7e97</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3284%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPEverest%20User%20Registration%20PRO%20%E2%80%93%20Custom%20Registration%20Form%2C%20Login%20Form%2C%20and%20User%20Profile%20WordPress%20Plugin&amp;severity=medium&amp;id=682d984bc4522896dcbf7e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-19-f9e573aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-19&amp;severity=medium&amp;id=68367c96182aa0cae23195a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43918-cwe-348-use-of-less-trusted-source-in-ssl-com-ssl-com-bf7e4c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43918%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20SSL.com%20SSL.com&amp;severity=medium&amp;id=682d984bc4522896dcbf7e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30421-cwe-407-inefficient-algorithmic-complexity-in-mjson-project-mjson-bf7e44</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30421%3A%20CWE-407%20Inefficient%20Algorithmic%20Complexity%20in%20mjson%20project%20mjson&amp;severity=medium&amp;id=682d984bc4522896dcbf7e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26819-cwe-440-expected-behavior-violation-in-cjson-project-cjson-bf7d12</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26819%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20cJSON%20Project%20cJSON&amp;severity=low&amp;id=682d984bc4522896dcbf7d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47112-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-7-zip-7-zip-bf7d0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47112%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%207-Zip%207-Zip&amp;severity=medium&amp;id=682d984bc4522896dcbf7d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47111-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-7-zip-7-zip-bf7d0a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47111%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%207-Zip%207-Zip&amp;severity=medium&amp;id=682d984bc4522896dcbf7d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43917-cwe-863-incorrect-authorization-in-pritunl-pritunl-client-bf7cb9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43917%3A%20CWE-863%20Incorrect%20Authorization%20in%20Pritunl%20Pritunl-Client&amp;severity=medium&amp;id=682d984bc4522896dcbf7cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-19-f21367</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-19&amp;severity=medium&amp;id=682acdc4bbaf20d303f21367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-19-f121b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f121b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3796-sql-injection-in-phpgurukul-men-salon-management-system-bf7e48</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3796%3A%20SQL%20Injection%20in%20PHPGurukul%20Men%20Salon%20Management%20System&amp;severity=medium&amp;id=682d984bc4522896dcbf7e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24914-cwe-276-incorrect-default-permissions-in-tenable-nessus-bf7782</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24914%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Tenable%20Nessus&amp;severity=high&amp;id=682d984ac4522896dcbf7782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1697-cwe-59-improper-link-resolution-before-file-access-link-following-in-hp-inc-hp-touchpoint-analytics-service-bf7766</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1697%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20HP%2C%20Inc.%20HP%20Touchpoint%20Analytics%20Service&amp;severity=medium&amp;id=682d984ac4522896dcbf7766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32792-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-endojs-endo-bf83f3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32792%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20endojs%20endo&amp;severity=medium&amp;id=682d984bc4522896dcbf83f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32442-cwe-1287-improper-validation-of-specified-type-of-input-in-fastify-fastify-bef605</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32442%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20fastify%20fastify&amp;severity=high&amp;id=682d983dc4522896dcbef605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29953-cwe-502-deserialization-of-untrusted-data-in-apache-software-foundation-apache-activemq-nms-openwire-client-bf5631</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29953%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20NMS%20OpenWire%20Client&amp;severity=critical&amp;id=682d9847c4522896dcbf5631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2950-cwe-644-improper-neutralization-of-h-c85eae04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2950%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax&amp;severity=medium&amp;id=68b08834ad5a09ad006e4982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37838-vulnerability-in-linux-linux-be8499</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40364-vulnerability-in-linux-linux-be853c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40364%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe853c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3106-cwe-79-improper-neutralization-of-in-04ed80e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3106%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ecb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2492-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-asus-router-aeb19f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2492%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ASUS%20Router&amp;severity=critical&amp;id=682cd0f71484d88663aeb19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3056-cwe-79-improper-neutralization-of-in-7d45feac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6b27b7ef31ef0b54ebc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proton66-compromised-wordpress-pages-and-malware-campaigns-16a125</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Proton66%3A%20Compromised%20WordPress%20Pages%20and%20Malware%20Campaigns&amp;severity=medium&amp;id=682c992c7960f6956616a125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40325-vulnerability-in-linux-linux-bdd49d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40325%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40114-vulnerability-in-linux-linux-be852b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe852b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40014-vulnerability-in-linux-linux-be8523</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39989-vulnerability-in-linux-linux-bdd490</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39930-vulnerability-in-linux-linux-be851f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe851f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39778-vulnerability-in-linux-linux-be850e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe850e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39755-vulnerability-in-linux-linux-be8504</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39735-vulnerability-in-linux-linux-bdd48c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39735%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39728-vulnerability-in-linux-linux-be84fc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39688-vulnerability-in-linux-linux-bdd488</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38637-vulnerability-in-linux-linux-be84e7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38575-vulnerability-in-linux-linux-be84e3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38575%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38479-vulnerability-in-linux-linux-be84df</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38479%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38240-vulnerability-in-linux-linux-be84db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38240%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38152-vulnerability-in-linux-linux-be84ca</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe84ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38104-vulnerability-in-linux-linux-bdd484</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38104%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38049-vulnerability-in-linux-linux-be84bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37925-vulnerability-in-linux-linux-be84b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37893-vulnerability-in-linux-linux-be84ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37860-vulnerability-in-linux-linux-be84a3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37785-vulnerability-in-linux-linux-be83fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3598-cwe-79-improper-neutralization-of-in-1942377e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3598%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elliotvs%20Coupon%20Affiliates%20%E2%80%93%20Affiliate%20Plugin%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39469-improper-neutralization-of-input-du-3ab2b606</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39469%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pantherius%20Modal%20Survey&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39470-path-traversal-in-thimpress-ivy-sch-13acfd8a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39470%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20ThimPress%20Ivy%20School&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39471-improper-neutralization-of-special--77b05dd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39471%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pantherius%20Modal%20Survey&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42599-stack-based-buffer-overflow-in-qualitia-co-ltd-active-mail-6-bee3d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42599%3A%20Stack-based%20buffer%20overflow%20in%20QUALITIA%20CO.%2C%20LTD.%20Active!%20mail%206&amp;severity=critical&amp;id=682d983bc4522896dcbee3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2613-cwe-79-improper-neutralization-of-in-7b7a5e99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mehrazmorshed%20Login%20Manager%20%E2%80%93%20Design%20Login%20Page%2C%20View%20Login%20Activity%2C%20Limit%20Login%20Attempts&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13650-cwe-79-improper-neutralization-of-i-3e527532</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fe02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3520-cwe-22-improper-limitation-of-a-path-3a15541e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3520%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wonderboymusic%20Avatar&amp;severity=high&amp;id=699f6b2bb7ef31ef0b54ef77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0467-cwe-cwe-823-use-of-out-of-range-pointer-offset-in-imagination-technologies-graphics-ddk-bf838e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0467%3A%20CWE%20-%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=682d984bc4522896dcbf838e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25427-cwe-79-improper-neutralization-of-i-530811e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TP-Link%20Systems%20Inc.%20TL-WR841N%20v14%2Fv14.6%2Fv14.8&amp;severity=high&amp;id=686427df6f40f0eb7290426b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28242-n-a-in-n-a-bf75e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28242%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf75e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28197-n-a-in-n-a-bf75e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28197%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf75e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57493-n-a-in-n-a-bf75d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57493%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf75d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28238-n-a-in-n-a-bf7594</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28238%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28237-n-a-in-n-a-bf7590</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28237%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28236-n-a-in-n-a-bf753a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28236%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf753a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28235-n-a-in-n-a-bf7536</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28235%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28233-n-a-in-n-a-bf751c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28233%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf751c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28231-n-a-in-n-a-bf7482</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28231%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28059-n-a-in-n-a-bf747e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28059%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf747e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29209-n-a-in-n-a-bf734b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29209%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf734b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28232-n-a-in-n-a-bf72fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28232%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf72fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28228-n-a-in-n-a-bf72f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28228%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf72f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28230-n-a-in-n-a-bf729e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28230%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf729e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28229-n-a-in-n-a-bf7230</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28229%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29643-n-a-in-n-a-bf7220</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29643%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-18-2a9f7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-18&amp;severity=medium&amp;id=682c7db3e8347ec82d2a9f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-18-f124db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f124db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3509-cwe-94-improper-control-of-generatio-aec4cfb1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=68532cb833c7acc04607adfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/keyplug-linked-server-exposes-fortinet-exploits-webshell-activity-targeting-a-major-japanese-company-16a159</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KeyPlug-Linked%20Server%20Exposes%20Fortinet%20Exploits%20%26%20Webshell%20Activity%20Targeting%20a%20Major%20Japanese%20Company&amp;severity=medium&amp;id=682c992c7960f6956616a159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47671-vulnerability-in-linux-linux-be96e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9834c4522896dcbe96e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47670-vulnerability-in-linux-linux-be96dc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe96dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47669-vulnerability-in-linux-linux-be96c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe96c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47668-vulnerability-in-linux-linux-be96bc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe96bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36789-vulnerability-in-linux-linux-bea62c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2947-cwe-278-insecure-preserved-inherited-permissions-in-ibm-i-bf778a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2947%3A%20CWE-278%20Insecure%20Preserved%20Inherited%20Permissions&amp;severity=high&amp;id=682d984ac4522896dcbf778a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-hwp-document-disguised-as-reunification-education-support-application-16a16e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20HWP%20Document%20Disguised%20as%20Reunification%20Education%20Support%20Application&amp;severity=medium&amp;id=682c992c7960f6956616a16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/downloader-malware-written-in-jphp-interpreter-16a179</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Downloader%20Malware%20Written%20in%20JPHP%20Interpreter&amp;severity=medium&amp;id=682c992c7960f6956616a179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43012-cwe-77-in-jetbrains-toolbox-app-7a7c9baa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43012%3A%20CWE-77%20in%20JetBrains%20Toolbox%20App&amp;severity=high&amp;id=69a0a1c885912abc71d0baa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23443-improper-neutralization-of-input-du-43359e56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23443%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Claire%20Ryan%20Author%20Showcase&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23448-improper-neutralization-of-input-du-2e1141a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dastan800%20visualslider%20Sldier&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23773-missing-authorization-in-mingocomme-2ed1aa57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23773%3A%20Missing%20Authorization%20in%20mingocommerce%20Delete%20All%20Posts&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee8608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23782-improper-neutralization-of-input-du-a42211e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23782%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TotalSuite%20TotalContest%20Lite&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee867c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23855-improper-neutralization-of-input-du-4aae0233</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fyljp%20SpiderDisplay&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23858-improper-neutralization-of-input-du-28fd28e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hiren%20Patel%20Custom%20Users%20Order&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23958-missing-authorization-in-fadi-med-e-98fcc467</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23958%3A%20Missing%20Authorization%20in%20FADI%20MED%20Editor%20Wysiwyg%20Background%20Color&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24539-improper-neutralization-of-input-du-29ae33d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debounce%20DeBounce%20Email%20Validator&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee919d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24548-improper-neutralization-of-input-du-c470713c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Autoglot%20Autoglot%20%E2%80%93%20Automatic%20WordPress%20Translation&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee91f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24550-improper-neutralization-of-input-du-25a53873</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JobScore%20Job%20Manager&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee91fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24553-improper-neutralization-of-input-du-038dfce3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Akadrama%20Shipping%20with%20Venipak%20for%20WooCommerce&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee9205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24577-missing-authorization-in-ays-pro-po-e5770879</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24577%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24581-missing-authorization-in-themefic-i-a116d026</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24581%3A%20Missing%20Authorization%20in%20Themefic%20Instantio&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24583-missing-authorization-in-aa-web-ser-c1ca5803</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24583%3A%20Missing%20Authorization%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24586-improper-neutralization-of-input-du-c17016a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitsstech%20Shipment%20Tracker%20for%20Woocommerce&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24619-improper-neutralization-of-input-du-2ff68e94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24619%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webheadcoder%20WP%20Log%20Action&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24621-improper-neutralization-of-input-du-82877d13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24624-improper-neutralization-of-input-du-5a81b8e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevItems%20HT%20Event&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24637-improper-neutralization-of-input-du-9cb3840d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24637%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Beacon%20Lead%20Magnets%20and%20Lead%20Capture&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24640-improper-neutralization-of-input-du-9293cfd7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24640%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dan-Lucian%20Stefancu%20Empty%20Tags%20Remover&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24645-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rob-scott-eazy-under-construction-aecafc</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24645%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rob%20Scott%20Eazy%20Under%20Construction&amp;severity=null&amp;id=682cd0fc1484d88663aecafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24651-insertion-of-sensitive-information--cd57af33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24651%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20WebToffee%20WordPress%20Backup%20%26%20Migration&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24655-improper-neutralization-of-input-du-87dcd9d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24655%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Wishlist&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24670-improper-neutralization-of-input-du-5cf96181</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24670%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dhanendran%20Rajagopal%20Term%20Taxonomy%20Converter&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24737-missing-authorization-in-mat-bao-co-9595143b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24737%3A%20Missing%20Authorization%20in%20Mat%20Bao%20Corporation%20WP%20Helper%20Premium&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24745-improper-neutralization-of-input-du-f52add9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24745%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RadiusTheme%20Classified%20Listing&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24752-improper-neutralization-of-input-du-a4be1934</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24752%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27282-unrestricted-upload-of-file-with-da-1357f86f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27282%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rockgod100%20Theme%20File%20Duplicator&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27283-improper-limitation-of-a-pathname-t-45aba022</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27283%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rockgod100%20Theme%20File%20Duplicator&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27284-improper-neutralization-of-input-du-e0dc5c1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27284%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20divspark%20Flagged%20Content&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27285-improper-neutralization-of-input-du-25085311</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27285%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Easy%20Form&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27286-deserialization-of-untrusted-data-i-158332a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27286%3A%20Deserialization%20of%20Untrusted%20Data%20in%20saoshyant1994%20Saoshyant%20Slider&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27287-deserialization-of-untrusted-data-i-0228ff43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27287%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ssvadim%20SS%20Quiz&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27288-improper-neutralization-of-input-du-daf4e5ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27288%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BjornW%20File%20Icons&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27289-improper-neutralization-of-input-du-3adb08be</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Antoine%20Guillien%20Restrict%20Taxonomies&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27291-improper-neutralization-of-input-du-c2e10186</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27291%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxgallery%20WordPress%20Photo%20Gallery%20%E2%80%93%20Image%20Gallery&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27292-improper-neutralization-of-input-du-eb3922be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PoppinsDigital.com%20WPYog%20Documents&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27293-improper-neutralization-of-input-du-d660f7fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27293%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webparexapp%20Shipmozo%20Courier%20Tracking&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27295-improper-neutralization-of-input-du-6eff949a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27295%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpion%20Live%20css&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deecea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27299-improper-limitation-of-a-pathname-t-8449c14c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27299%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WP%20Asia%20MyTicket%20Events&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27302-improper-neutralization-of-special--8daec795</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27302%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Claudio%20Adrian%20Marrero%20CHATLIVE&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27308-improper-neutralization-of-input-du-efb2c092</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27308%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmstactics%20WP%20Video%20Posts&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27309-improper-neutralization-of-input-du-9476737f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27309%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeannot%20Muller%20flickr-slideshow-wrapper&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27310-missing-authorization-in-radius-of--031d1dba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27310%3A%20Missing%20Authorization%20in%20Radius%20of%20Thought%20Page%20and%20Post%20Lister&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27313-improper-neutralization-of-input-du-bd14b7d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27313%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bernd%20Altmeier%20Google%20Maps%20GPX%20Viewer&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27314-improper-neutralization-of-input-du-ca80a92c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27314%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kush%20Sharma%20Kush%20Micro%20News&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27319-improper-neutralization-of-input-du-46067187</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27319%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivan82%20User%20List&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27322-improper-neutralization-of-input-du-e5a4ce59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bappa%20Mal%20QR%20Code%20for%20WooCommerce&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27324-improper-neutralization-of-input-du-aab7e720</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2017track%2017TRACK%20for%20WooCommerce&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27333-improper-neutralization-of-input-du-f78e41d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alvego%20Protected%20wp-login&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27337-improper-neutralization-of-input-du-589931b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27337%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kontur%20Fontsampler&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27338-improper-neutralization-of-input-du-92c94949</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27338%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20graphems%20List%20Urls&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27343-improper-neutralization-of-input-du-b81d1365</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webilop%20WooCommerce%20HTML5%20Video&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27345-improper-neutralization-of-input-du-8edf3841</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27345%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Deetronix%20Booking%20Ultra%20Pro&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27346-improper-neutralization-of-input-du-1b2c6b73</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27346%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gerrygooner%20Rebuild%20Permalinks&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27354-improper-neutralization-of-input-du-3ea20c74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phil88530%20Simple%20Email%20Subscriber&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31006-improper-neutralization-of-input-du-9fcac60c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arete-it%20Activity%20Reactions%20For%20Buddypress&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31018-improper-neutralization-of-input-du-9b0b0058</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FireDrum%20FireDrum%20Email%20Marketing&amp;severity=null&amp;id=69cd733be6bfc5ba1def0ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31030-improper-control-of-filename-for-in-b02b000a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31030%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Jiro%20Sasamoto%20Ray%20Enterprise%20Translation&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31380-weak-password-recovery-mechanism-fo-44f6d9f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31380%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32490-improper-neutralization-of-input-du-97db92e4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32490%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebsiteDefender%20wp%20secure&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32504-improper-neutralization-of-input-du-9edb6c5a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32504%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silvasoft%20Silvasoft%20boekhouden&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32506-improper-neutralization-of-input-du-8c163142</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32506%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BenDlz%20AT%20Internet%20SmartTag&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32507-improper-neutralization-of-input-du-66de7037</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32507%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aakif%20Kadiwala%20Event%20Espresso%20%E2%80%93%20Custom%20Email%20Template%20Shortcode&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32508-improper-neutralization-of-input-du-ec3be354</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32508%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ComMotion%20Course%20Booking%20System&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32511-improper-neutralization-of-input-du-3e12532a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32511%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Excellent%20Dynamics%20Make%20Email%20Customizer%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32512-improper-neutralization-of-input-du-c674c915</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32512%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revampcrm%20Revamp%20CRM%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32513-improper-neutralization-of-input-du-01b69467</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32513%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20totalprocessing%20Nomupay%20Payment%20Processing%20Gateway&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32514-improper-neutralization-of-input-du-dbd6f367</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32514%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cscode%20WooCommerce%20Estimate%20and%20Quote&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32515-improper-neutralization-of-input-du-306405f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20terminalafrica%20Terminal%20Africa&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32516-improper-neutralization-of-input-du-48b92647</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ilGhera%20Related%20Videos%20for%20JW%20Player&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32520-improper-neutralization-of-input-du-4c611a32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M.%20Ali%20Saleem%20WordPress%20Health%20and%20Server%20Condition%20%E2%80%93%20Integrated%20with%20Google%20Page%20Speed&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32521-improper-neutralization-of-input-du-76faee6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoolHappy%20Cool%20Flipbox%20%E2%80%93%20Shortcode%20%26%20Gutenberg%20Block&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32522-improper-neutralization-of-input-du-4e980224</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32522%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20License%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32526-improper-neutralization-of-input-du-98659764</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dylan%20James%20Zephyr%20Project%20Manager&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32527-improper-neutralization-of-input-du-bad781df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32527%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pey22%20T%26P%20Gallery%20Slider&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32528-improper-neutralization-of-input-du-0905691d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maximevalette%20iCal%20Feeds&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32529-improper-neutralization-of-input-du-f75adc2e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iONE360%20iONE360%20configurator&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32530-improper-neutralization-of-input-du-f256fa13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32530%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Swings%20Wallet%20System%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32531-improper-neutralization-of-input-du-a1b0432e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32531%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20FAQ&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32532-improper-neutralization-of-input-du-5b398c36</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pei%20Yong%20Goh%20UXsniff&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32533-improper-neutralization-of-input-du-bddab9ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matat%20Technologies%20Deliver%20via%20Shipos%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32535-improper-neutralization-of-input-du-307038af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32535%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digireturn%20DN%20Shipping%20by%20Weight%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32540-improper-neutralization-of-input-du-62587d23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32540%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20feedify%20Feedify%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32544-missing-authorization-in-the-right--01022e79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32544%3A%20Missing%20Authorization%20in%20The%20Right%20Software%20WooCommerce%20Loyal%20Customers&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32545-cross-site-request-forgery-csrf-in--08b9d8ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32545%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SOFTAGON%20WooCommerce%20Products%20without%20featured%20images&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32546-cross-site-request-forgery-csrf-in--c7d7c33e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32546%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gtlwpdev%20All%20push%20notification%20for%20WP&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32552-improper-neutralization-of-input-du-c3f8d93d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20MSRP%20(RRP)%20Pricing%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32554-improper-neutralization-of-input-du-9196e232</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Raptive%20Raptive%20Ads&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32557-improper-neutralization-of-input-du-289b9f7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rico%20Macchi%20WP%20Featured%20Screenshot&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32560-improper-neutralization-of-input-du-3b17990a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32560%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mohammad%20I.%20Okfie%20WP-Hijri&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32561-improper-neutralization-of-input-du-22e59b31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32561%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugins.club%20WP_DEBUG%20Toggle&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32562-improper-neutralization-of-input-du-e5ef73cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32562%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20WP%20Easy%20Poll&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32566-improper-neutralization-of-input-du-6fa23f7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashraful%20Sarkar%20Naiem%20License%20For%20Envato&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32571-deserialization-of-untrusted-data-i-72f9c8a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32571%3A%20Deserialization%20of%20Untrusted%20Data%20in%20TuriTop%20TuriTop%20Booking%20System&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32572-deserialization-of-untrusted-data-i-5670b7c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32572%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Climax%20Themes%20Kata%20Plus&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32578-improper-neutralization-of-input-du-acbdda83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mapro%20Collins%20Coming%20Soon%20Countdown&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32582-improper-neutralization-of-input-du-30ffc50f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32582%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EXEIdeas%20International%20WP%20AutoKeyword&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32583-improper-control-of-generation-of-c-e2712dff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32583%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20termel%20PDF%202%20Post&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32588-improper-neutralization-of-input-du-e48d689d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32588%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Credova%20Financial%20Credova_Financial&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32590-improper-neutralization-of-input-du-4cee4fcc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tzin111%20Web2application&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32592-improper-neutralization-of-input-du-6b898e07</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20TableOn&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32593-missing-authorization-in-bytes-tech-02bc28d1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32593%3A%20Missing%20Authorization%20in%20Bytes%20Technolab%20Add%20Product%20Frontend%20for%20WooCommerce&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32594-insertion-of-sensitive-information--78db6f71</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32594%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPMinds%20Simple%20WP%20Events&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32596-improper-control-of-generation-of-c-bc27b524</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32596%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32602-improper-neutralization-of-input-du-6812fe28</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32602%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcraft%20WooMS&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32604-improper-neutralization-of-input-du-433f1148</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32604%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sajjad%20Aslani%20AWSA%20Shipping&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32605-improper-neutralization-of-input-du-9fc6e531</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20expresstechsoftware%20MemberPress%20Discord%20Addon&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32606-cross-site-request-forgery-csrf-in--39dca69a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32606%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Deepak%20Khokhar%20Listings%20for%20Buildium&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32608-improper-neutralization-of-input-du-0b14c001</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32608%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Movylo%20Movylo%20Marketing%20Automation&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32609-improper-neutralization-of-input-du-6809bdb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32609%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Picture-Planet%20GmbH%20Verowa%20Connect&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32611-improper-neutralization-of-input-du-a0d4499a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32611%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20We%20Are%20De%20WooCommerce%20TBC%20Credit%20Card%20Payment%20Gateway%20(Free)&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32613-improper-neutralization-of-input-du-6b4a1f38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32613%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bowo%20Debug%20Log%20Manager&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32615-improper-neutralization-of-input-du-6c3d24f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Clinked%20Clinked%20Client%20Portal&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32620-missing-authorization-in-fromdopple-c75982d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32620%3A%20Missing%20Authorization%20in%20fromdoppler%20Doppler%20Forms&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32622-improper-neutralization-of-input-du-b544937c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32622%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTP-less%20OTP-less%20one%20tap%20Sign%20in&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32625-improper-neutralization-of-input-du-60497038</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pootlepress%20Mobile%20Pages&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32626-improper-neutralization-of-special--977b20fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32626%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32628-improper-neutralization-of-input-du-fc6b0d42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Wham%20Crowdfunding%20for%20WooCommerce&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32630-improper-neutralization-of-input-du-df116d6e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CMSJunkie%20-%20WordPress%20Business%20Directory%20Plugins%20WP-BusinessDirectory&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def4002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32634-improper-neutralization-of-input-du-c705f43d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32634%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdedev%20Run%20Contests%2C%20Raffles%2C%20and%20Giveaways%20with%20ContestsWP&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def402a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32636-improper-neutralization-of-special--1fb026bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32636%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20matthewrubin%20Local%20Magic&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def402d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32637-improper-neutralization-of-input-du-14c3c4fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32637%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ketanajani%20WP%20Donate&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32638-improper-neutralization-of-input-du-19a42eef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weptile%20Mobile%20App%20for%20WooCommerce&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32639-improper-neutralization-of-input-du-63eb55eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32639%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wecantrack%20Affiliate%20Links%20Lite&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32646-improper-neutralization-of-input-du-18b7bc44</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Question%20Answer&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32647-deserialization-of-untrusted-data-i-f721c407</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32647%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Question%20Answer&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32649-improper-neutralization-of-input-du-74c74295</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32649%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gb-plugins%20GB%20Gallery%20Slideshow&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32651-improper-neutralization-of-input-du-0ece3b4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32651%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20serpednet%20SERPed.net&amp;severity=null&amp;id=69cd73eae6bfc5ba1def407c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32652-unrestricted-upload-of-file-with-da-c737ffdd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32652%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20solacewp%20Solace%20Extra&amp;severity=null&amp;id=69cd73eae6bfc5ba1def407f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32653-improper-neutralization-of-input-du-b876a586</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32653%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lee%20Blue%20Cart66%20Cloud&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32655-cross-site-request-forgery-csrf-in--c5c29415</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32655%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DevriX%20Restrict%20User%20Registration&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32658-deserialization-of-untrusted-data-i-697bb58f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32658%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpWax%20HelpGent&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32660-unrestricted-upload-of-file-with-da-2ba09f08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32660%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32662-deserialization-of-untrusted-data-i-9940ce6f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32662%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Stylemix%20uListing&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32665-improper-neutralization-of-special--17b6c388</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32665%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WebbyTemplate%20Office%20Locator&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32670-improper-neutralization-of-input-du-ec9667a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32670%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20Parnell%20Spark%20GF%20Failed%20Submissions&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32674-improper-neutralization-of-input-du-cc193e83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Product%20Excel%20Import%20Export%20%26%20Bulk%20Edit%20for%20WooCommerce&amp;severity=null&amp;id=69cd73ede6bfc5ba1def417f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32682-unrestricted-upload-of-file-with-da-b52f99ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32682%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=69cd73efe6bfc5ba1def423e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32686-deserialization-of-untrusted-data-i-e3d797a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32686%3A%20Deserialization%20of%20Untrusted%20Data%20in%20WPSpeedo%20Team%20Members&amp;severity=null&amp;id=69cd73efe6bfc5ba1def424a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39519-improper-neutralization-of-input-du-7d5a2939</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39519%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20runthings.dev%20Bulk%20Page%20Stub%20Creator&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39521-improper-neutralization-of-input-du-ad1f564e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashish%20Ajani%20Contact%20Form%20vCard%20Generator&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39526-improper-control-of-filename-for-in-ed8f2d06</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39526%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nicdark%20Hotel%20Booking&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39527-deserialization-of-untrusted-data-i-c0172d72</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39527%3A%20Deserialization%20of%20Untrusted%20Data%20in%20bestweblayout%20Rating%20by%20BestWebSoft&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39532-missing-authorization-in-spicetheme-755cf2ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39532%3A%20Missing%20Authorization%20in%20spicethemes%20Spice%20Blocks&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39533-missing-authorization-in-starfish-r-09e15d2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39533%3A%20Missing%20Authorization%20in%20Starfish%20Reviews%20Starfish%20Review%20Generation%20%26%20Marketing&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39535-authentication-bypass-using-an-alte-fe33c135</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39535%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20appsbd%20Vitepos&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39542-incorrect-privilege-assignment-in-j-44c92d31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39542%3A%20Incorrect%20Privilege%20Assignment%20in%20Jauhari%20Xelion%20Xelion%20Webchat&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df011ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39550-deserialization-of-untrusted-data-i-fe768c83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39550%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Shahjahan%20Jewel%20FluentCommunity&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0123c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39551-deserialization-of-untrusted-data-i-426ca232</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39551%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mahmudul%20Hasan%20Arif%20FluentBoards&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39554-missing-authorization-in-elliot-sow-2427fcf6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39554%3A%20Missing%20Authorization%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20AI%20Text%20to%20Speech&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39559-missing-authorization-in-eivin-land-59a3c969</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39559%3A%20Missing%20Authorization%20in%20Eivin%20Landa%20Bring%20Fraktguiden%20for%20WooCommerce&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0124b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39562-improper-neutralization-of-input-du-ed6cc2ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39562%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Payment%20Form%20for%20PayPal%20Pro&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39567-improper-neutralization-of-input-du-3ed1b7b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39567%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shamalli%20Web%20Directory%20Free&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39568-improper-limitation-of-a-pathname-t-9ca2e7b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39568%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Arture%20B.V.%20StoreContrl%20Woocommerce&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39580-missing-authorization-in-jidaikobo--ef92b4b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39580%3A%20Missing%20Authorization%20in%20jidaikobo%20Dashi&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39583-missing-authorization-in-bertha-ai--b68946b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39583%3A%20Missing%20Authorization%20in%20Bertha%20AI%20%26%238211%3B%20Andrew%20Palmer%20BERTHA%20AI&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df013fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39586-improper-neutralization-of-special--1372fdd7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39586%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39587-improper-neutralization-of-special--0866f0a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39587%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20Cost%20Calculator%20Builder&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df01405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39588-deserialization-of-untrusted-data-i-f1221583</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39588%3A%20Deserialization%20of%20Untrusted%20Data%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39594-improper-neutralization-of-input-du-9f025cc2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Arigato%20Autoresponder%20and%20Newsletter&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39595-improper-neutralization-of-special--4878025a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39595%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quentn.com%20GmbH%20Quentn%20WP&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39596-weak-authentication-in-quentncom-gm-854c1c2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39596%3A%20Weak%20Authentication%20in%20Quentn.com%20GmbH%20Quentn%20WP&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22340-improper-neutralization-of-input-du-39df5aa3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22340%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20Data%20Dash&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22565-improper-neutralization-of-input-du-8d7610dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22565%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bill%20Zimmerman%20vooPlayer%20v4&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df0894b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22636-improper-neutralization-of-input-du-0851c140</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vicente%20Ruiz%20G%C3%A1lvez%20VR-Frases&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22651-improper-neutralization-of-input-du-2a6714ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22651%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wppluginboxdev%20Stylish%20Google%20Sheet%20Reader&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22655-improper-neutralization-of-special--e83db0d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22655%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Caio%20Web%20Dev%20CWD%20%E2%80%93%20Stealth%20Links&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22692-improper-neutralization-of-input-du-50da594d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22692%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rachanaS%20Sponsered%20Link&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22771-improper-neutralization-of-input-du-f0a51985</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Studio%20Hyperset%20The%20Great%20Firewords%20of%20China&amp;severity=null&amp;id=69cd760be6bfc5ba1df091c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22774-improper-neutralization-of-input-du-8ecae08e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22774%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CRUDLab%20CRUDLab%20Scroll%20to%20Top&amp;severity=null&amp;id=69cd760be6bfc5ba1df091cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22796-improper-neutralization-of-input-du-1d5aa0f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22796%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20platcom%20WP-Asambleas&amp;severity=null&amp;id=69cd7610e6bfc5ba1df0939b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39414-cross-site-request-forgery-csrf-in--5e77e028</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39414%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mike%20spam-stopper&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39415-cross-site-request-forgery-csrf-in--d2bb0fa8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39415%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jayesh%20Parejiya%20Social%20Media%20Links&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39416-cross-site-request-forgery-csrf-in--f6b57d74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39416%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ichi%20translit%20it!&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39417-cross-site-request-forgery-csrf-in--fbae37e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39417%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eslam%20Mahmoud%20Redirect%20wordpress%20to%20welcome%20or%20landing%20page&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39418-cross-site-request-forgery-csrf-in--d407f602</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39418%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ajayver%20RSS%20Manager&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39419-cross-site-request-forgery-csrf-in--8405c75f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39419%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Miller%20Revision%20Diet&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def434c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39420-improper-neutralization-of-input-du-963a9b47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39420%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ruudkok%20WP%20Twitter%20Button&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def434f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39421-cross-site-request-forgery-csrf-in--845ea827</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39421%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mustafa%20KUCUK%20WP%20Sticky%20Side%20Buttons&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39422-cross-site-request-forgery-csrf-in--4d0fed3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39422%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PResponsive%20WP%20Social%20Bookmarking&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39423-cross-site-request-forgery-csrf-in--64b11fa4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39423%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jenst%20Add%20to%20Header&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39424-cross-site-request-forgery-csrf-in--ef49f2ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39424%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20simplemaps%20Simple%20Maps&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def435b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39425-cross-site-request-forgery-csrf-in--9033fdc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39425%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pixelgrade%20Style%20Manager&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def435e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39426-cross-site-request-forgery-csrf-in--0d2b7eb9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39426%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20illow%20illow%20%E2%80%93%20Cookies%20Consent&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39427-improper-neutralization-of-input-du-9d82fa56</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Beth%20Tucker%20Long%20WP%20Post%20to%20PDF%20Enhanced&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39428-improper-neutralization-of-input-du-78f6a019</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39428%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maros%20Pristas%20Gravity%20Forms%20CSS%20Themes%20with%20Fontawesome%20and%20Placeholders&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39429-improper-control-of-filename-for-in-00ca6025</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20F%C3%B6ldesi%2C%20Mih%C3%A1ly%20Sz%C3%A9chenyi%202020%20Logo&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39430-cross-site-request-forgery-csrf-in--02d867eb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39430%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alexander%20Rauscha%20mLanguage&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39431-cross-site-request-forgery-csrf-in--d24f5a38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39431%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aaron%20Forgue%20Amazon%20Showcase%20WordPress%20Plugin&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39432-improper-neutralization-of-input-du-03f72f4a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39432%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antonchanning%20bbPress2%20shortcode%20whitelist&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39433-cross-site-request-forgery-csrf-in--a53f2b91</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39433%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20beke_ro%20Bknewsticker&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39434-authorization-bypass-through-user-c-40cdbfae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39434%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Scott%20Taylor%20Avatar&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39435-cross-site-request-forgery-csrf-in--5d131c07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20davidfcarr%20My%20Marginalia&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39436-unrestricted-upload-of-file-with-da-5021b3c7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39436%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20aidraw%20I%20Draw&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39437-cross-site-request-forgery-csrf-in--f64df32d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39437%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Boone%20Gorges%20Anthologize&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39438-cross-site-request-forgery-csrf-in--7d7b4914</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39438%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20momen2009%20Theme%20Changer&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def43f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39439-exposure-of-sensitive-system-inform-d739e4c2</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39439%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Markus%20Drubba%20wpLike2Get&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def43f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39440-cross-site-request-forgery-csrf-in--8923e5c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39440%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rajesh%20Broken%20Links%20Remover&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def43f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39441-cross-site-request-forgery-csrf-in--f1bae355</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39441%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20swedish%20boy%20Dashboard%20Notepads&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def43fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39442-cross-site-request-forgery-csrf-in--df9fe836</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39442%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MessageMetric%20Review%20Wave%20%E2%80%93%20Google%20Places%20Reviews&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def43fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39444-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-maxfoundry-maxbuttons-aecb4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39444%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maxfoundry%20MaxButtons&amp;severity=null&amp;id=682cd0fc1484d88663aecb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39443-cross-site-request-forgery-csrf-in--30df225e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39443%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Soft8Soft%20LLC%20Verge3D&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def4400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39452-improper-control-of-filename-for-in-047695d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39452%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Arraytics%20WPCafe&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def4403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39453-cross-site-request-forgery-csrf-in--eed89bf2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39453%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20algol.plus%20Advanced%20Dynamic%20Pricing%20for%20WooCommerce&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def4406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39455-cross-site-request-forgery-csrf-in--626b8417</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39455%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IP2Location%20IP2Location%20Variables&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def4409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39456-missing-authorization-in-itron-wp-l-82040be7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39456%3A%20Missing%20Authorization%20in%20iTRON%20WP%20Logger&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def440c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39457-missing-authorization-in-magepeople-5ae79fe6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39457%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39461-improper-control-of-filename-for-in-215ce0c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39461%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nawawi%20Jamili%20Docket%20Cache&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39462-improper-control-of-filename-for-in-df4ec927</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39462%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20teamzt%20Smart%20Agreements&amp;severity=null&amp;id=69cd73fae6bfc5ba1def444d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39464-improper-neutralization-of-input-du-5c7724fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rtowebsites%20AdminQuickbar&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/around-the-world-in-90-days-state-sponsored-actors-try-clickfix-16a0a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Around%20the%20World%20in%2090%20Days%3A%20State-Sponsored%20Actors%20Try%20ClickFix&amp;severity=medium&amp;id=682c992c7960f6956616a0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-new-xorddos-controller-and-infrastructure-16a186</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20the%20new%20XorDDoS%20controller%20and%20infrastructure&amp;severity=medium&amp;id=682c992c7960f6956616a186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3760-cwe-79-improper-neutralization-of-in-27d1b2a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68b9b0b1a333cd2f6cabe191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26477-cwe-20-improper-input-validation-in-dell-ecs-bf7786</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26477%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20ECS&amp;severity=medium&amp;id=682d984ac4522896dcbf7786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3479-cwe-354-improper-validation-of-integ-78e953df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3479%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3487-cwe-79-improper-neutralization-of-in-657edfce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3487%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3453-cwe-863-incorrect-authorization-in-s-524e5d85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3453%3A%20CWE-863%20Incorrect%20Authorization%20in%20saadiqbal%20Password%20Protected%20%E2%80%94%20Lock%20Entire%20Site%2C%20Pages%2C%20Posts%2C%20Categories%2C%20and%20Partial%20Content&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3615-cwe-79-improper-neutralization-of-in-af0f01bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3294-cwe-22-improper-limitation-of-a-path-0ee34974</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3294%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20benjaminprojas%20WP%20Editor&amp;severity=high&amp;id=699f6b29b7ef31ef0b54ed9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3295-cwe-22-improper-limitation-of-a-path-581743e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3295%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20benjaminprojas%20WP%20Editor&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ed9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1290-use-after-free-uaf-in-google-chromeos-bd8049</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1290%3A%20Use-After-Free%20(UAF)%20in%20Google%20ChromeOS&amp;severity=high&amp;id=682d9818c4522896dcbd8049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32415-cwe-1284-improper-validation-of-spe-4aab186d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32415%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20xmlsoft%20libxml2&amp;severity=low&amp;id=690909fb7fff0e30cee434c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29456-n-a-in-n-a-bf7afa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29456%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29455-n-a-in-n-a-bf7af2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29455%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29453-n-a-in-n-a-bf7aea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29453%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29454-n-a-in-n-a-bf7ace</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29454%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29450-n-a-in-n-a-bf79a9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29450%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf79a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29449-n-a-in-n-a-bf79a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29449%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf79a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56518-n-a-in-n-a-bf7471</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56518%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53924-n-a-in-n-a-bf746d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53924%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf746d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29460-n-a-in-n-a-bf5cb3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29460%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29459-n-a-in-n-a-bf5caf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29459%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29458-n-a-in-n-a-bf5c9e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29458%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29457-n-a-in-n-a-bf5c96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29457%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26269-cwe-191-integer-underflow-wrap-or-wraparound-in-dragonflydb-dragonfly-bf54e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26269%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20DragonflyDB%20Dragonfly&amp;severity=medium&amp;id=682d9847c4522896dcbf54e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29041-n-a-in-n-a-bec7f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29041%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbec7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29040-n-a-in-n-a-bec7f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29040%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbec7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29316-n-a-in-n-a-bdb08d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29316%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-17-2a5ace</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-17&amp;severity=medium&amp;id=682c7db3e8347ec82d2a5ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-17-f12fc1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-17&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1568-code-execution-in-google-chromeos-aeb071</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1568%3A%20Code%20execution%20in%20Google%20ChromeOS&amp;severity=high&amp;id=682cd0f71484d88663aeb071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2073-out-of-bounds-read-in-google-chromeos-bd8081</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2073%3A%20Out-of-Bounds%20Read%20in%20Google%20ChromeOS&amp;severity=high&amp;id=682d9818c4522896dcbd8081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1704-use-after-free-uaf-in-google-chromeos-bd8079</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1704%3A%20Use-After-Free%20(UAF)%20in%20Google%20ChromeOS&amp;severity=medium&amp;id=682d9818c4522896dcbd8079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1566-network-security-isolation-nsi-in-google-chromeos-bd8051</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1566%3A%20Network%20Security%20Isolation%20(NSI)%20in%20Google%20ChromeOS&amp;severity=high&amp;id=682d9818c4522896dcbd8051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24054-ntlm-exploit-in-the-wild-16a2ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24054%2C%20NTLM%20Exploit%20in%20the%20Wild&amp;severity=medium&amp;id=682c992c7960f6956616a2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32433-cwe-306-missing-authentication-for-critical-function-in-erlang-otp-befaef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32433%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20erlang%20otp&amp;severity=critical&amp;id=682d983ec4522896dcbefaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3730-denial-of-service-in-pytorch-2700bb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3730%3A%20Denial%20of%20Service%20in%20PyTorch&amp;severity=medium&amp;id=682f9c790acd01a2492700bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/latest-mustang-panda-arsenal-toneshell-starproxy-paklog-corklog-and-splatcloak-16a38c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Latest%20Mustang%20Panda%20Arsenal%3A%20Toneshell%2C%20StarProxy%2C%20PAKLOG%2C%20CorKLOG%2C%20and%20SplatCloak&amp;severity=medium&amp;id=682c992c7960f6956616a38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31200-processing-an-audio-stream-in-a-mal-3a401fdd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31200%3A%20Processing%20an%20audio%20stream%20in%20a%20maliciously%20crafted%20media%20file%20may%20result%20in%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20versions%20of%20iOS%20released%20before%20iOS%2018.4.1.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=683e0257182aa0cae25374e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31201-an-attacker-with-arbitrary-read-and-32232a7d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31201%3A%20An%20attacker%20with%20arbitrary%20read%20and%20write%20capability%20may%20be%20able%20to%20bypass%20Pointer%20Authentication.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20iOS.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68430d3871f4d251b5cfea8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2291-use-of-a-key-past-its-expiration-dat-8641dbb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2291%3A%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20PgBouncer&amp;severity=high&amp;id=690906907fff0e30cedefbf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39472-cwe-352-cross-site-request-forgery--08d0f8e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39472%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpweb%20WooCommerce%20Social%20Login&amp;severity=null&amp;id=6846dc927b622a9fdf23bfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22872-cwe-79-in-golang-org-x-net-golang-org-x-net-html-aeba5f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22872%3A%20CWE-79%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhtml&amp;severity=medium&amp;id=682cd0f91484d88663aeba5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20236-inclusion-of-functionality-from-unt-c502cf36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20236%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Cisco%20Cisco%20Webex%20Teams&amp;severity=high&amp;id=69a0a1b985912abc71d0a0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20178-improper-verification-of-cryptograp-95e5963e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20178%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20Cisco%20Secure%20Network%20Analytics&amp;severity=medium&amp;id=69a0a1b985912abc71d0a0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-bruted-black-basta-raas-used-automated-brute-forcing-framework-to-target-edge-network-devices-16a3c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20BRUTED%3A%20Black%20Basta%20(RaaS)%20Used%20Automated%20Brute%20Forcing%20Framework%20to%20Target%20Edge%20Network%20Devices&amp;severity=medium&amp;id=682c992c7960f6956616a3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brickstorm-backdoor-analysis-a-persistent-espionage-threat-to-european-industries-16a5ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BRICKSTORM%20Backdoor%20Analysis%3A%20A%20Persistent%20Espionage%20Threat%20to%20European%20Industries&amp;severity=medium&amp;id=682c992c7960f6956616a5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23138-vulnerability-in-linux-linux-bdd449</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23138%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23137-vulnerability-in-linux-linux-be8220</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23137%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23136-vulnerability-in-linux-linux-be821c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23136%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe821c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23135-vulnerability-in-linux-linux-be8209</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23135%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23134-vulnerability-in-linux-linux-be8201</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23134%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23133-vulnerability-in-linux-linux-bdd43c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23133%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23132-vulnerability-in-linux-linux-be81f9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23132%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe81f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23131-vulnerability-in-linux-linux-be81f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23131%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23130-vulnerability-in-linux-linux-be81e4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23130%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23129-vulnerability-in-linux-linux-bdd438</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23129%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22128-vulnerability-in-linux-linux-be81dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22128%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe81dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22127-vulnerability-in-linux-linux-be81d8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22127%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22126-vulnerability-in-linux-linux-be81cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22126%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22125-vulnerability-in-linux-linux-be81c7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22125%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe81c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22124-vulnerability-in-linux-linux-bdd434</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22124%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22123-vulnerability-in-linux-linux-be81c3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22123%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22122-vulnerability-in-linux-linux-be81b0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22122%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22121-vulnerability-in-linux-linux-be81ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22121%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22120-vulnerability-in-linux-linux-be81a8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22120%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22119-vulnerability-in-linux-linux-bdd425</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22119%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22118-vulnerability-in-linux-linux-be81a4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22118%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22117-vulnerability-in-linux-linux-be819e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22117%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe819e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22116-vulnerability-in-linux-linux-be819a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22116%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe819a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22115-vulnerability-in-linux-linux-bdd41d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22115%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22114-vulnerability-in-linux-linux-be8196</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22113-vulnerability-in-linux-linux-be8192</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22113%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22112-vulnerability-in-linux-linux-bdd415</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22112%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22111-vulnerability-in-linux-linux-be8183</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22111%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22110-vulnerability-in-linux-linux-be817b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22110%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe817b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22109-vulnerability-in-linux-linux-be8166</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22109%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22108-vulnerability-in-linux-linux-be8155</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22108%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22107-vulnerability-in-linux-linux-be814d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22107%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe814d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22106-vulnerability-in-linux-linux-be8145</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22106%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22105-vulnerability-in-linux-linux-be813d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22105%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe813d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22104-vulnerability-in-linux-linux-be8137</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22104%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22103-vulnerability-in-linux-linux-be8133</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22103%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22102-vulnerability-in-linux-linux-be8124</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22102%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22101-vulnerability-in-linux-linux-be8113</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22101%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22100-vulnerability-in-linux-linux-be810b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe810b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22099-vulnerability-in-linux-linux-be80f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe80f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22098-vulnerability-in-linux-linux-be80e8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe80e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22097-vulnerability-in-linux-linux-be80e0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22096-vulnerability-in-linux-linux-be80dc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe80dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22095-vulnerability-in-linux-linux-be80cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe80cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22094-vulnerability-in-linux-linux-be80c9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe80c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22093-vulnerability-in-linux-linux-be80c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe80c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22092-vulnerability-in-linux-linux-be80b8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe80b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22091-vulnerability-in-linux-linux-be80b4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe80b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22090-vulnerability-in-linux-linux-be80b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe80b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22089-vulnerability-in-linux-linux-be8097</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22088-vulnerability-in-linux-linux-be808f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe808f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22087-vulnerability-in-linux-linux-be8089</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22086-vulnerability-in-linux-linux-be807a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe807a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22085-vulnerability-in-linux-linux-be8072</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22084-vulnerability-in-linux-linux-be806a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe806a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22083-vulnerability-in-linux-linux-be8062</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22082-vulnerability-in-linux-linux-be805a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe805a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22081-vulnerability-in-linux-linux-be8049</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22080-vulnerability-in-linux-linux-be8045</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22079-vulnerability-in-linux-linux-be8021</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22078-vulnerability-in-linux-linux-be8019</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe8019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22077-vulnerability-in-linux-linux-be8011</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22076-vulnerability-in-linux-linux-be8007</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22075-vulnerability-in-linux-linux-be7ff4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22074-vulnerability-in-linux-linux-be7fee</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22073-vulnerability-in-linux-linux-be7fea</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22072-vulnerability-in-linux-linux-be7fe6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22071-vulnerability-in-linux-linux-be7fe2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22070-vulnerability-in-linux-linux-be7fde</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22069-vulnerability-in-linux-linux-be7fc0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22068-vulnerability-in-linux-linux-be7fbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22067-vulnerability-in-linux-linux-be7fb8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22066-vulnerability-in-linux-linux-be7fb4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22065-vulnerability-in-linux-linux-be7fb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22064-vulnerability-in-linux-linux-bdd3fa</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22063-vulnerability-in-linux-linux-be7fac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22062-vulnerability-in-linux-linux-be7fa8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22061-vulnerability-in-linux-linux-be7fa4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22060-vulnerability-in-linux-linux-be7fa0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22059-vulnerability-in-linux-linux-be7f8f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22058-vulnerability-in-linux-linux-be7f67</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22057-vulnerability-in-linux-linux-be7f63</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22056-vulnerability-in-linux-linux-be7f5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22055-vulnerability-in-linux-linux-be7f5b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22054-vulnerability-in-linux-linux-bdd3f6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22053-vulnerability-in-linux-linux-be7f57</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22052-vulnerability-in-linux-linux-be7f53</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22051-vulnerability-in-linux-linux-be7f4f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22050-vulnerability-in-linux-linux-bdd3f2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22050%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22049-vulnerability-in-linux-linux-be7f4b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22048-vulnerability-in-linux-linux-bdd3ee</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22047-vulnerability-in-linux-linux-be7f47</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22046-vulnerability-in-linux-linux-be7f43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22045-vulnerability-in-linux-linux-be7f1d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22045%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22044-vulnerability-in-linux-linux-be7f19</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22043-vulnerability-in-linux-linux-be7f15</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22043%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22042-vulnerability-in-linux-linux-be7f11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22042%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22041-vulnerability-in-linux-linux-be7f04</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22041%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22040-vulnerability-in-linux-linux-be7f00</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22040%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22039-vulnerability-in-linux-linux-be7efc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22039%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22038-vulnerability-in-linux-linux-be7ef8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22038%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22037-vulnerability-in-linux-linux-be7ef4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22037%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22036-vulnerability-in-linux-linux-be7ef0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22036%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22035-vulnerability-in-linux-linux-bdd3ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22035%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22034-vulnerability-in-linux-linux-be7ecc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22033-vulnerability-in-linux-linux-be7ec8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22033%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22032-vulnerability-in-linux-linux-be7ec4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22032%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22031-vulnerability-in-linux-linux-be7ec0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22030-vulnerability-in-linux-linux-be7ebc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22029-becd40</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22029&amp;severity=low&amp;id=682d9839c4522896dcbecd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22028-vulnerability-in-linux-linux-bdd3e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22027-vulnerability-in-linux-linux-be7eb6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22027%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22026-vulnerability-in-linux-linux-be7eb4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22025-vulnerability-in-linux-linux-be7eb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22025%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22024-vulnerability-in-linux-linux-be7eac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22024%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58097-vulnerability-in-linux-linux-bde37a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58096-vulnerability-in-linux-linux-bde376</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58095-vulnerability-in-linux-linux-bde369</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58094-vulnerability-in-linux-linux-bde365</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58093-vulnerability-in-linux-linux-bdd271</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53034-vulnerability-in-linux-linux-be6d8c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-evolving-under-the-radar-16a50b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20ransomware%20evolving%20under%20the%20radar&amp;severity=medium&amp;id=682c992c7960f6956616a50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39512-cross-site-request-forgery-csrf-in--d0646be8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39512%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yuya%20Hoshino%20Bulk%20Term%20Editor&amp;severity=null&amp;id=69cd73fae6bfc5ba1def445c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39513-missing-authorization-in-activedema-fa50aa34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39513%3A%20Missing%20Authorization%20in%20ActiveDEMAND%20Online%20Agency%20Marketing%20Automation%20ActiveDEMAND&amp;severity=null&amp;id=69cd73fae6bfc5ba1def445f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39514-improper-neutralization-of-input-du-f56d998b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39514%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Asgaros%20Asgaros%20Forum&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39515-improper-neutralization-of-input-du-fc7be66b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tnomi%20Attendance%20Manager&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df0118c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39516-improper-neutralization-of-input-du-95b10219</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alan%20Petersen%20Author%20WIP%20Progress%20Bar&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39517-cross-site-request-forgery-csrf-in--b8a3d038</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39517%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Map%20Plugins%20Basic%20Interactive%20World%20Map&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39518-improper-neutralization-of-special--7b20e917</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39518%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RedefiningTheWeb%20BMA%20Lite&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39520-improper-neutralization-of-input-du-142cec96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Wham%20Checkout%20Files%20Upload%20for%20WooCommerce&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39522-missing-authorization-in-service2cl-6ee5bbc2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39522%3A%20Missing%20Authorization%20in%20Service2Client%20LLC%20Dynamic%20Post&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39524-improper-neutralization-of-script-r-f2b3fc36</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39524%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20bPlugins%20Html5%20Audio%20Player&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39525-improper-neutralization-of-input-du-e929c28a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpWax%20Logo%20Carousel%20Slider&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39528-improper-neutralization-of-input-du-df64419b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rescue%20Themes%20Rescue%20Shortcodes&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39529-improper-neutralization-of-input-du-03841eab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robin%20Cornett%20Scriptless%20Social%20Sharing&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df0119e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39530-cross-site-request-forgery-csrf-in--b6ef4984</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39530%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dsky%20Site%20Search%20360&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df011a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39531-missing-authorization-in-slazzercom-86b90653</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39531%3A%20Missing%20Authorization%20in%20slazzercom%20Slazzer%20Background%20Changer&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df011a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39538-unrestricted-upload-of-file-with-da-5e14b5ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39538%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Mathieu%20Chartier%20WP-Advanced-Search&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39540-improper-neutralization-of-input-du-f837f97f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39540%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rhys%20Wynne%20WP%20Flipclock&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39543-improper-neutralization-of-input-du-a1e9da9a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39544-cross-site-request-forgery-csrf-in--463ac2e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39544%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sminozzi%20WP%20Tools&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39545-missing-authorization-in-miniorange-e1ee5bf7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39545%3A%20Missing%20Authorization%20in%20miniOrange%20WordPress%20REST%20API%20Authentication&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39546-cross-site-request-forgery-csrf-in--278df5dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39546%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20quomodosoft%20ElementsReady%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39547-cross-site-request-forgery-csrf-in--c39a928d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39547%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Toast%20Plugins%20Internal%20Link%20Optimiser&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39548-cross-site-request-forgery-csrf-in--02406bcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39548%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20A%20WP%20Life%20Right%20Click%20Disable%20OR%20Ban&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39549-improper-neutralization-of-input-du-43da08a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20whiletrue%20Most%20And%20Least%20Read%20Posts%20Widget&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39552-missing-authorization-in-dylan-jame-e79d2597</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39552%3A%20Missing%20Authorization%20in%20Dylan%20James%20Zephyr%20Project%20Manager&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0123f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39555-improper-neutralization-of-input-du-5b434bcf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39556-exposure-of-sensitive-system-inform-c618b784</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39556%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20mediavine%20Mediavine%20Control%20Panel&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39557-unrestricted-upload-of-file-with-da-f2c611e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39557%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StellarWP%20Kadence%20WooCommerce%20Email%20Designer&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39560-missing-authorization-in-shahjada-l-06f650e5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39560%3A%20Missing%20Authorization%20in%20Shahjada%20Live%20Forms&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39563-cross-site-request-forgery-csrf-in--b26bf426</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39563%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Trio%20Conditional%20Payments%20for%20WooCommerce&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0124e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39564-cross-site-request-forgery-csrf-in--02b0357a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39564%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Trio%20Conditional%20Shipping%20for%20WooCommerce&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0131b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39565-deserialization-of-untrusted-data-i-d84e7fb0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39565%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Melapress%20MelaPress%20Login%20Security&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0131e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39566-improper-neutralization-of-special--99bcaed9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39566%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bob%20Hostel&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39570-improper-control-of-filename-for-in-32bf0577</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39570%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Lomu%20WPCOM%20Member&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39571-missing-authorization-in-wpxpo-wows-be5695e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39571%3A%20Missing%20Authorization%20in%20WPXPO%20WowStore&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0132a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39572-improper-neutralization-of-input-du-7b63fa16</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39572%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Checkout%20for%20PayPal&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39573-improper-neutralization-of-input-du-a788c907</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teastudio.pl%20WP%20Posts%20Carousel&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39574-improper-neutralization-of-input-du-dcce08cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UIUX%20Lab%20Uix%20Shortcodes&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0132d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39575-improper-neutralization-of-input-du-c687ed98</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPSight%20WPCasa&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39576-improper-neutralization-of-input-du-2c954d1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39577-improper-neutralization-of-input-du-e7506567</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39577%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Property%20Hive%20PropertyHive&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39578-improper-neutralization-of-input-du-0eac3f9f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df013f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39579-improper-neutralization-of-input-du-347ffc23</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Swings%20Membership%20For%20WooCommerce&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df013f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39581-improper-neutralization-of-input-du-dc3e51e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Shortcodes&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df013f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39582-improper-neutralization-of-input-du-f9883650</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39582%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Passionate%20Programmer%20Peter%20WP%20Data%20Access&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39584-improper-control-of-filename-for-in-dc5f1e83</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39584%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df013ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39585-improper-neutralization-of-input-du-dde7c8be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Travelfic%20Toolkit&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df01402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39589-exposure-of-sensitive-system-inform-dbb6bab7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39589%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39590-improper-neutralization-of-input-du-d3dff6d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df01408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39591-missing-authorization-in-wp-shuffle-fa0eca4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39591%3A%20Missing%20Authorization%20in%20WP%20Shuffle%20WP%20Subscription%20Forms&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df0140b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39592-improper-control-of-filename-for-in-5edf23e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39592%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20Subscribe%20to%20Unlock%20Lite&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39593-cross-site-request-forgery-csrf-in--39fcb476</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39593%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EverAccounting%20Ever%20Accounting&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39597-url-redirection-to-untrusted-site-o-019476f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39597%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Arthur%20Yarwood%20Fast%20eBay%20Listings&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39598-path-traversal-in-qu-l-91-administr-7a82b47f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39598%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Qu%C3%BD%20L%C3%AA%2091%20Administrator%20Z&amp;severity=null&amp;id=69cd740de6bfc5ba1def4fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39599-url-redirection-to-untrusted-site-o-ec2769e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39599%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Webilia%20Inc.%20Listdom&amp;severity=null&amp;id=69cd740de6bfc5ba1def4fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39600-cross-site-request-forgery-csrf-in--dec37291</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39600%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CRM%20Perks%20Integration%20for%20WooCommerce%20and%20QuickBooks&amp;severity=null&amp;id=69cd740de6bfc5ba1def4fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39601-cross-site-request-forgery-csrf-in--5824c645</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39601%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPFactory%20Custom%20CSS%2C%20JS%20%26%20PHP&amp;severity=null&amp;id=69cd740de6bfc5ba1def4fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39602-missing-authorization-in-wc-product-a3388775</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39602%3A%20Missing%20Authorization%20in%20WC%20Product%20Table%20WooCommerce%20Product%20Table%20Lite&amp;severity=null&amp;id=69cd7410e6bfc5ba1def5032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58092-vulnerability-in-linux-linux-bde361</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30960-missing-authorization-in-fs-code-fs-dd05cb16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30960%3A%20Missing%20Authorization%20in%20fs-code%20FS%20Poster&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22023-vulnerability-in-linux-linux-be7ea8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22022-vulnerability-in-linux-linux-be7e8a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22021-vulnerability-in-linux-linux-be7e86</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22020-vulnerability-in-linux-linux-be7e82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22019-vulnerability-in-linux-linux-be7e7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22036-cwe-269-improper-privilege-manageme-1da7ebff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22036%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20SUSE%20rancher&amp;severity=critical&amp;id=69a0a1b885912abc71d0a0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52281-cwe-79-improper-neutralization-of-i-bb6ca204</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52281%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%26%2339%3BCross-site%20Scripting%26%2339%3B)%20in%20SUSE%20rancher&amp;severity=high&amp;id=69a0a1b985912abc71d0a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3677-deserialization-in-lm-sys-fastchat-bf84e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3677%3A%20Deserialization%20in%20lm-sys%20fastchat&amp;severity=medium&amp;id=682d984bc4522896dcbf84e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3104-cwe-200-exposure-of-sensitive-inform-a9b45532</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3104%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WPStaging%20WP%20STAGING%20Pro%20WordPress%20Backup%20Plugin&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3077-cwe-79-improper-neutralization-of-in-3133137f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=699f6b27b7ef31ef0b54ebd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jscript-to-powershell-breaking-down-a-loader-delivering-xworm-and-rhadamanthys-16a5f7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JScript%20to%20PowerShell%3A%20Breaking%20Down%20a%20Loader%20Delivering%20XWorm%20and%20Rhadamanthys&amp;severity=medium&amp;id=682c992c7960f6956616a5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3247-cwe-354-improper-validation-of-integ-fdc1eee9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3247%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20rocklobsterinc%20Contact%20Form%207&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ecb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22018-vulnerability-in-linux-linux-be7e7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3495-cwe-338-use-of-cryptographically-wea-0e9ad224</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3495%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Delta%20Electronics%20COMMGR&amp;severity=critical&amp;id=68a3c696ad5a09ad00e23102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3698-cwe-749-exposed-dangerous-method-or--b2de3588</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3698%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20TECNO%20com.transsion.carlcare&amp;severity=high&amp;id=68ba82f2791f3b772df65950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13452-cwe-79-improper-neutralization-of-i-64e14b4c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supsysticcom%20Contact%20Form%20by%20Supsystic&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59ea10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2314-cwe-79-improper-neutralization-of-in-1f9492bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30100-cwe-284-improper-access-control-in--8ab73772</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30100%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69a0a1c585912abc71d0b6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29653-b42569c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29653&amp;severity=low&amp;id=6850986ea8c921274384b7b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40073-n-a-in-n-a-bf741d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40073%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf741d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40072-n-a-in-n-a-bf741b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40072%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf741b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40071-n-a-in-n-a-bf7403</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40071%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29650-n-a-in-n-a-bf168d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29650&amp;severity=medium&amp;id=682d9840c4522896dcbf168d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29649-n-a-in-n-a-bf1689</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29649&amp;severity=medium&amp;id=682d9840c4522896dcbf1689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29648-n-a-in-n-a-bf1685</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29648&amp;severity=medium&amp;id=682d9840c4522896dcbf1685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29652-n-a-in-n-a-bf10c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29652&amp;severity=critical&amp;id=682d9840c4522896dcbf10c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29651-n-a-in-n-a-bf10ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29651&amp;severity=critical&amp;id=682d9840c4522896dcbf10ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-16-2a6182</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-16&amp;severity=medium&amp;id=682c7db3e8347ec82d2a6182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-16-f13098</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-16&amp;severity=medium&amp;id=682acdc2bbaf20d303f13098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32923-improper-neutralization-of-input-du-fef6e231</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Tourmaster&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30984-improper-neutralization-of-input-du-e7e85644</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dzynit%20SEO%20Tools&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30982-improper-neutralization-of-input-du-d502c5d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookProgress%20by%20Stormhill%20Media&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30970-improper-neutralization-of-input-du-47247ef9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30970%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottwallick%20Easy%20Contact&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27011-improper-control-of-filename-for-in-f78ebea6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27011%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26998-improper-neutralization-of-input-du-51ce8e92</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26998%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26996-improper-control-of-generation-of-c-1b348cba</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26996%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Fetch%20Designs%20Sign-up%20Sheets&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26953-missing-authorization-in-crocoblock-da85044e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26953%3A%20Missing%20Authorization%20in%20Crocoblock%20JetMenu&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26951-improper-neutralization-of-input-du-55c0e363</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20covertnine%20C9%20Blocks&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26950-improper-neutralization-of-input-du-2ef580ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26950%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AddonsPress%20Nepali%20Date%20Converter&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26934-improper-neutralization-of-input-du-2a9704f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26934%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20graphthemes%20Glossy%20Blog&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26930-improper-neutralization-of-input-du-2937d6d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alleythemes%20Home%20Services&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26927-unrestricted-upload-of-file-with-da-2482c719</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26927%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20LiquidThemes%20AI%20Hub&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26919-improper-neutralization-of-input-du-e599e076</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26919%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tainacan%20Tain%C3%A1&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26908-improper-neutralization-of-special--6b6a4f1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26908%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Gurmehub%20Kargo%20Entegrat%C3%B6r&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26906-improper-neutralization-of-input-du-d759d9e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ren%20Ventura%20WP%20Delete%20User%20Accounts&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26903-cross-site-request-forgery-csrf-in--dc0044e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26903%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RealMag777%20InPost%20Gallery&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26880-improper-neutralization-of-input-du-cc2c40a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Skill%20Bar&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26870-improper-neutralization-of-input-du-1b7eedf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26870%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26749-improper-neutralization-of-input-du-0a48ab1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Additional%20Custom%20Product%20Tabs%20for%20WooCommerce&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26748-cross-site-request-forgery-csrf-in--9a671dcc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26748%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20looswebstudio%20Arkhe&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26746-improper-neutralization-of-input-du-4f1e632f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20caalami%20Advanced%20Custom%20Fields%3A%20Link%20Picker%20Field&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26740-improper-neutralization-of-input-du-92c29144</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26740%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20burgersoftware%20SpaBiz&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22269-improper-neutralization-of-input-du-6a71e1e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22269%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ShapedPlugin%20LLC%20Real%20Testimonials&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22268-improper-neutralization-of-input-du-159e3d84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22268%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Uncanny%20Owl%20Uncanny%20Toolkit%20for%20LearnDash&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1274-cwe-787-out-of-bounds-write-in-autodesk-revit-bf0489</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1274%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d983fc4522896dcbf0489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1277-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-autodesk-revit-bf049a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1277%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d983fc4522896dcbf049a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1656-cwe-122-heap-based-buffer-overflow-in-autodesk-revit-bf04dd</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1656%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d983fc4522896dcbf04dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1273-cwe-122-heap-based-buffer-overflow-in-autodesk-revit-bf0485</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1273%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d983fc4522896dcbf0485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2497-cwe-122-heap-based-buffer-overflow-in-autodesk-revit-bf0ec1</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2497%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d9840c4522896dcbf0ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1276-cwe-787-out-of-bounds-write-in-autodesk-autocad-aec8ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1276%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682cd0fb1484d88663aec8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1275-cwe-122-heap-based-buffer-overflow-in-autodesk-revit-bf0496</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1275%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d983fc4522896dcbf0496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/server-side-phishing-how-credential-theft-campaigns-are-hiding-in-plain-sight-16a876</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Server-Side%20Phishing%3A%20How%20Credential%20Theft%20Campaigns%20Are%20Hiding%20in%20Plain%20Sight&amp;severity=medium&amp;id=682c992c7960f6956616a876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/byte-bandits-how-fake-pdf-converters-are-stealing-more-than-just-your-documents-16a887</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Byte%20Bandits%3A%20How%20Fake%20PDF%20Converters%20Are%20Stealing%20More%20Than%20Just%20Your%20Documents&amp;severity=medium&amp;id=682c992c7960f6956616a887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-misuse-node-js-to-deliver-malware-and-other-malicious-payloads-16a891</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20actors%20misuse%20Node.js%20to%20deliver%20malware%20and%20other%20malicious%20payloads&amp;severity=medium&amp;id=682c992c7960f6956616a891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30737-difficult-to-exploit-vulnerability--32d9ac36</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30737%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Smart%20View%20for%20Office.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Smart%20View%20for%20Office%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Smart%20View%20for%20Office%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Smart%20View%20for%20Office&amp;severity=medium&amp;id=69a0a1c685912abc71d0ba44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30736-difficult-to-exploit-vulnerability--d3ab3446</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30736%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Java%20VM%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Java%20VM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=69a0a1c685912abc71d0ba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30735-easily-exploitable-vulnerability-al-c8993b50</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30735%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20CC%20Common%20Application%20Objects.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20CC%20Common%20Application%20Objects%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20CC%20Common%20Application%20Objects%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20CC%20Common%20Application%20Objects&amp;severity=high&amp;id=69a0a1c685912abc71d0ba3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30733-easily-exploitable-vulnerability-allows-unauthenticated-attacker-with-network-access-via-oracle-net-to-compromise-rdbms-listener-successful-attacks-require-human-interaction-from-a-person-other-than-the-attacker-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-access-to-critical-data-or-complete-access-to-all-rdbms-listener-accessible-data-in-oracle-corporation-oracle-database-server-aeb865</loc>
    <lastmod>2026-04-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30733%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20RDBMS%20Listener.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20RDBMS%20Listener%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30727-easily-exploitable-vulnerability-al-8c5d99e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30727%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Scripting.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Scripting.%20in%20Oracle%20Corporation%20Oracle%20Scripting&amp;severity=critical&amp;id=69a0a1c685912abc71d0ba3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30722-difficult-to-exploit-vulnerability--590f7b98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30722%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20MySQL%20Cluster%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=69091549c28fd46ded7bb749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30721-difficult-to-exploit-vulnerability--169e6b56</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30721%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Server%20executes%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091549c28fd46ded7bb745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30715-easily-exploitable-vulnerability-al-ea218e03</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30715%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091549c28fd46ded7bb741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30712-easily-exploitable-vulnerability-allows-high-privileged-attacker-with-logon-to-the-infrastructure-where-oracle-vm-virtualbox-executes-to-compromise-oracle-vm-virtualbox-while-the-vulnerability-is-in-oracle-vm-virtualbox-attacks-may-significantly-impact-additional-products-scope-change-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-creation-deletion-or-modification-access-to-critical-data-or-all-oracle-vm-virtualbox-accessible-data-as-well-as-unauthorized-access-to-critical-data-or-complete-access-to-all-oracle-vm-virtualbox-accessible-data-and-unauthorized-ability-to-cause-a-partial-denial-of-service-partial-dos-of-oracle-vm-virtualbox-in-oracle-corporation-oracle-vm-virtualbox-aeb8b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30712%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20VM%20VirtualBox%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=682cd0f81484d88663aeb8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30706-difficult-to-exploit-vulnerability--88c6c670</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30706%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Connectors.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20MySQL%20Connectors.%20in%20Oracle%20Corporation%20MySQL%20Connectors&amp;severity=high&amp;id=69a0a1c685912abc71d0ba37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30705-easily-exploitable-vulnerability-al-74689c4d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30705%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091549c28fd46ded7bb73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30704-difficult-to-exploit-vulnerability--8d507316</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30704%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091549c28fd46ded7bb739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30703-easily-exploitable-vulnerability-al-d9a7b670</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30703%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=69091549c28fd46ded7bb735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30701-easily-exploitable-vulnerability-al-7f0598e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30701%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20having%20User%20Account%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20RAS%20Security.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20RAS%20Security%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20RAS%20Security%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=69a0a1c585912abc71d0b715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30699-easily-exploitable-vulnerability-al-202de228</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30699%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091549c28fd46ded7bb731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30698-difficult-to-exploit-vulnerability--dac06e2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30698%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69091547c28fd46ded7bb641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30696-easily-exploitable-vulnerability-al-f8325393</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30696%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30695-easily-exploitable-vulnerability-al-3b83a1a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30695%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30693-easily-exploitable-vulnerability-al-de4b8160</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30693%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Cluster%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=69091547c28fd46ded7bb634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30691-difficult-to-exploit-vulnerability--21fd18a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30691%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69091547c28fd46ded7bb62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30690-difficult-to-exploit-vulnerability--64e3fe49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30690%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=high&amp;id=69a0a1c585912abc71d0b712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30689-easily-exploitable-vulnerability-al-27c26ed7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30689%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30688-easily-exploitable-vulnerability-al-8c8de056</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30688%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30687-easily-exploitable-vulnerability-al-e5ec97a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30687%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30685-easily-exploitable-vulnerability-al-345e85e7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30685%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb61f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30684-easily-exploitable-vulnerability-al-45b1dba7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30684%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30683-easily-exploitable-vulnerability-al-449cc79b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30683%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091545c28fd46ded7bb60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30682-easily-exploitable-vulnerability-al-0de29e9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30682%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091545c28fd46ded7bb607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30681-easily-exploitable-vulnerability-al-977b69a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30681%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=low&amp;id=69091545c28fd46ded7bb603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21587-difficult-to-exploit-vulnerability--5b0a6b97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21587%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=690908597fff0e30cee23aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21585-easily-exploitable-vulnerability-al-b4e8725c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21585%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21584-easily-exploitable-vulnerability-al-eb4ecd90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21584%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21581-easily-exploitable-vulnerability-al-fd6fceca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21581%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21580-easily-exploitable-vulnerability-al-577a7cdf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21580%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21579-easily-exploitable-vulnerability-al-d8780338</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21579%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21578-easily-exploitable-vulnerability-al-7b91bf08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21578%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Secure%20Backup%20executes%20to%20compromise%20Oracle%20Secure%20Backup.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Secure%20Backup.%20in%20Oracle%20Corporation%20Oracle%20Secure%20Backup&amp;severity=medium&amp;id=69a0a1bf85912abc71d0ac2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21577-easily-exploitable-vulnerability-al-182c6652</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21577%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21575-easily-exploitable-vulnerability-al-bfdac0d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21575%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=690908597fff0e30cee23a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21574-easily-exploitable-vulnerability-al-7a43e4a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21574%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=690908597fff0e30cee23a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21573-difficult-to-exploit-vulnerability--573d822d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21573%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing&amp;severity=medium&amp;id=69a0a1bf85912abc71d0ac29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1122-out-of-bounds-write-in-google-chromeos-bd8045</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1122%3A%20Out-of-bounds%20Write%20in%20Google%20ChromeOS&amp;severity=medium&amp;id=682d9818c4522896dcbd8045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-registered-domains-distributing-spynote-malware-16a899</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Registered%20Domains%20Distributing%20SpyNote%20Malware&amp;severity=low&amp;id=682c992c7960f6956616a899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24358-cwe-352-cross-site-request-forgery-csrf-in-gorilla-csrf-becffc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24358%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gorilla%20csrf&amp;severity=medium&amp;id=682d9839c4522896dcbecffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32779-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-labsai-eddi-bf76cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32779%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20labsai%20EDDI&amp;severity=medium&amp;id=682d984ac4522896dcbf76cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29817-cwe-427-uncontrolled-search-path-element-in-microsoft-power-automate-for-desktop-aebc4f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29817%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Power%20Automate%20for%20Desktop&amp;severity=medium&amp;id=682cd0f91484d88663aebc4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32911-free-of-memory-not-on-the-heap-bd6441</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32911%3A%20Free%20of%20Memory%20not%20on%20the%20Heap&amp;severity=critical&amp;id=682d9815c4522896dcbd6441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3523-vulnerability-in-mozilla-thunderbird-b17e438d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3523%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=69dd057b82d89c981f0174eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2830-vulnerability-in-mozilla-thunderbird-cb604aa9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2830%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=69dd057b82d89c981f0174d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3522-vulnerability-in-mozilla-thunderbird-6031b7d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3522%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=69dd057b82d89c981f0174e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32947-cwe-835-loop-with-unreachable-exit--e2ef1fc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32947%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)&amp;severity=high&amp;id=68a592bbad5a09ad00037020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3608-race-condition-in-nshttptransaction--f9cbc950</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3608%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69a0a1c885912abc71d0baa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31011-improper-neutralization-of-input-du-287103c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ReichertBrothers%20SimplyRETS%20Real%20Estate%20IDX&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30985-deserialization-of-untrusted-data-i-19429695</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30985%3A%20Deserialization%20of%20Untrusted%20Data%20in%20kagla%20GNUCommerce&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30964-server-side-request-forgery-ssrf-in-9624f172</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30964%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemeGoods%20Photography&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30962-improper-neutralization-of-input-du-a6a802b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fs-code%20FS%20Poster&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26990-server-side-request-forgery-ssrf-in-028d3c75</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26990%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deecd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26982-improper-neutralization-of-input-du-95abc7ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eric-Oliver%20M%C3%A4chler%20DSGVO%20Youtube&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26959-missing-authorization-in-qu-l-91-ad-16d3700c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26959%3A%20Missing%20Authorization%20in%20Qu%C3%BD%20L%C3%AA%2091%20Administrator%20Z&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26958-missing-authorization-in-crocoblock-4b97debc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26958%3A%20Missing%20Authorization%20in%20Crocoblock%20JetBlog&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26955-missing-authorization-in-vowelweb-i-1f46c606</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26955%3A%20Missing%20Authorization%20in%20vowelweb%20Industrial%20Lite&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26954-improper-neutralization-of-input-du-c5e0a998</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26954%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201pluginjquery%20ZooEffect&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26944-missing-authorization-in-crocoblock-53504d9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26944%3A%20Missing%20Authorization%20in%20Crocoblock%20JetPopup&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26942-missing-authorization-in-crocoblock-33d459d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26942%3A%20Missing%20Authorization%20in%20Crocoblock%20JetTricks&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26894-improper-control-of-filename-for-in-c1ad80ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26894%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mobeen%20Abdullah%20Coming%20Soon%2C%20Maintenance%20Mode&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26889-improper-control-of-filename-for-in-3e8ff1b8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26889%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hockeydata%20hockeydata%20LOS&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26745-improper-neutralization-of-input-du-3dd078dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26745%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RSTheme%20RS%20Elements%20Elementor%20Addon&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26744-improper-neutralization-of-input-du-b8a23b5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlog&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26743-improper-neutralization-of-input-du-c85ebbce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TC.K%20Advance%20WP%20Query%20Search%20Filter&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26741-missing-authorization-in-aweos-gmbh-81ead4c7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26741%3A%20Missing%20Authorization%20in%20AWEOS%20GmbH%20Email%20Notifications%20for%20Updates&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32929-missing-authorization-in-dmitry-v-c-62796b50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32929%3A%20Missing%20Authorization%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Generator%20for%20WooCommerce&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26992-improper-neutralization-of-input-du-2c76a1db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Landing%20Page%20Cat&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1688-cwe-1394-use-of-default-cryptographi-b46c6e44</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1688%3A%20CWE-1394%3A%20Use%20of%20Default%20Cryptographic%20Key%20in%20Milestone%20Systems%20XProtect%20VMS&amp;severity=medium&amp;id=68c0983d9ed239a66bacc12c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2083-cwe-79-improper-neutralization-of-in-43c5f3ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20binsaifullah%20Awesome%20Logo%20Carousel%20Block&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3576-use-of-weak-hash-in-red-hat-red-hat-ansible-automation-platform-2-25c8e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3576%3A%20Use%20of%20Weak%20Hash&amp;severity=medium&amp;id=682f2fb50acd01a24925c8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3622-deserialization-in-xorbits-inference-bf84d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3622%3A%20Deserialization%20in%20Xorbits%20Inference&amp;severity=medium&amp;id=682d984bc4522896dcbf84d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2225-cwe-79-improper-neutralization-of-in-2c6c5836</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2225%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%2C%20Kits%20and%20Elementor%20Templates&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29984-cwe-284-improper-access-control-in--05900f45</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29984%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Dell%20Trusted%20Device%20Client&amp;severity=medium&amp;id=69a0a1c385912abc71d0b6b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29983-cwe-59-improper-link-resolution-bef-d10cc95a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29983%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%20Trusted%20Device%20Client&amp;severity=medium&amp;id=69a0a1c385912abc71d0b6af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3470-cwe-89-improper-neutralization-of-sp-12b63286</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3470%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20totalsoft%20TS%20Poll%20%E2%80%93%20Survey%2C%20Versus%20Poll%2C%20Image%20Poll%2C%20Video%20Poll&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33027-cwe-830-inclusion-of-web-functional-dfbe06ed</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33027%3A%20CWE-830%20Inclusion%20of%20Web%20Functionality%20from%20an%20Untrusted%20Source%20in%20Bandisoft%20Bandizip&amp;severity=medium&amp;id=68fbd506f816635ddaec8851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-15-33b150c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-15&amp;severity=medium&amp;id=68367c98182aa0cae231f107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32102-cwe-918-server-side-request-forgery-ssrf-in-crushftp-crushftp-bf7b02</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32102%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20CrushFTP%20CrushFTP&amp;severity=medium&amp;id=682d984bc4522896dcbf7b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33028-cwe-830-inclusion-of-web-functionality-from-an-untrusted-source-in-winzip-winzip-bdacfa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33028%3A%20CWE-830%20Inclusion%20of%20Web%20Functionality%20from%20an%20Untrusted%20Source%20in%20WinZip%20WinZip&amp;severity=medium&amp;id=682d981cc4522896dcbdacfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-15-751f7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-15&amp;severity=medium&amp;id=682c7abce3e6de8ceb751f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-15-f1305a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-15&amp;severity=medium&amp;id=682acdc2bbaf20d303f1305a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24797-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-meshtastic-firmware-bf7e86</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24797%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20meshtastic%20firmware&amp;severity=medium&amp;id=682d984bc4522896dcbf7e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/slow-pisces-targets-developers-with-coding-challenges-and-introduces-new-customized-python-malware-16ab19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Slow%20Pisces%20Targets%20Developers%20With%20Coding%20Challenges%20and%20Introduces%20New%20Customized%20Python%20Malware&amp;severity=medium&amp;id=682c992c7960f6956616ab19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1782-bedafc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1782&amp;severity=low&amp;id=682d983bc4522896dcbedafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atomic-and-exodus-crypto-wallets-targeted-in-malicious-npm-campaign-16abaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atomic%20and%20Exodus%20crypto%20wallets%20targeted%20in%20malicious%20npm%20campaign&amp;severity=medium&amp;id=682c992c7960f6956616abaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3277-cwe-122-heap-based-buffer-overflow-i-ebaa27f6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3277%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20SQLite%20sqlite&amp;severity=medium&amp;id=6835d30c182aa0cae216c480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22371-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-sicommnet-basec-bf84ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22371%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SicommNet%20BASEC&amp;severity=medium&amp;id=682d984bc4522896dcbf84ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32914-out-of-bounds-read-aecbaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32914%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=682cd0fc1484d88663aecbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32912-null-pointer-dereference-aecba8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32912%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682cd0fc1484d88663aecba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32910-null-pointer-dereference-bd89c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32910%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32909-null-pointer-dereference-bd89c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32909%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32908-misinterpretation-of-input-aecbcf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32908%3A%20Misinterpretation%20of%20Input&amp;severity=high&amp;id=682cd0fc1484d88663aecbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32907-excessive-platform-resource-consumption-within-a-loop-aecb99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32907%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop&amp;severity=medium&amp;id=682cd0fc1484d88663aecb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32906-out-of-bounds-read-aecbcd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32906%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=682cd0fc1484d88663aecbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32913-null-pointer-dereference-bd6452</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32913%3A%20NULL%20Pointer%20Dereference&amp;severity=high&amp;id=682d9815c4522896dcbd6452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3566-unrestricted-upload-in-veal98-echo-c43b9939</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3566%3A%20Unrestricted%20Upload%20in%20veal98%20%E5%B0%8F%E7%89%9B%E8%82%89%20Echo%20%E5%BC%80%E6%BA%90%E7%A4%BE%E5%8C%BA%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68ae0be1ad5a09ad005b075d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27009-cross-site-request-forgery-csrf-in--72a03a7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27009%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24859-cwe-613-insufficient-session-expira-be932498</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24859%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Apache%20Software%20Foundation%20Apache%20Roller&amp;severity=low&amp;id=69a0a1bf85912abc71d0ac3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2563-cwe-639-authorization-bypass-through-2e4a8f83</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2563%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20User%20Registration%20%26%20Membership&amp;severity=high&amp;id=68aef76ead5a09ad0061da18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3552-bdcc8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3552&amp;severity=low&amp;id=682d9820c4522896dcbdcc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3551-bdcc8b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3551&amp;severity=low&amp;id=682d9820c4522896dcbdcc8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3549-heap-based-buffer-overflow-in-open-a-f4e437f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3549%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6880a8b9ad5a09ad00232539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3548-heap-based-buffer-overflow-in-open-a-ddb77c2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3548%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6880a8b9ad5a09ad00232531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-14-2ae977</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-14&amp;severity=medium&amp;id=682c7db4e8347ec82d2ae977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-14-f123f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f123f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3423-cwe-79-improper-neutralization-of-in-77fffc2c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3423%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68b63b8cad5a09ad00d5d476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-13-0e95aacb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-13&amp;severity=medium&amp;id=68367c99182aa0cae2323387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2814-cwe-338-use-of-cryptographically-wea-f96fae41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2814%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20LDS%20Crypt%3A%3ACBC&amp;severity=medium&amp;id=684dd951a8c9212743820151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1456-cwe-79-improper-neutralization-of-in-b728138f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1456%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1455-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wproyal-royal-elementor-addons-and-templates-bd6c10</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1455%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=682d9816c4522896dcbd6c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13338-cwe-352-cross-site-request-forgery-csrf-in-creativemotion-clearfy-cache-wordpress-optimization-plugin-minify-html-css-js-defer-bd6bfb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13338%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativemotion%20Clearfy%20Cache%20%E2%80%93%20WordPress%20optimization%20plugin%2C%20Minify%20HTML%2C%20CSS%20%26%20JS%2C%20Defer&amp;severity=medium&amp;id=682d9816c4522896dcbd6bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3276-cwe-79-improper-neutralization-of-in-38453842</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks%20%E2%80%93%20Gutenberg%20based%20Page%20Builder&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ed8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13337-cwe-352-cross-site-request-forgery--29e29c4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13337%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativemotion%20Clearfy%20Cache%20%E2%80%93%20WordPress%20optimization%20plugin%2C%20Minify%20HTML%2C%20CSS%20%26%20JS%2C%20Defer&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3282-cwe-639-authorization-bypass-through-c3d441c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3282%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ed92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3418-cwe-269-improper-privilege-managemen-4fee7a49</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3418%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpclever%20WPC%20Admin%20Columns&amp;severity=high&amp;id=699f6b29b7ef31ef0b54eda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3292-cwe-639-authorization-bypass-through-49f6e97f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3292%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ed96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2871-cwe-352-cross-site-request-forgery-c-f107cebe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2871%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20quadlayers%20QuadMenu%20%E2%80%93%20Mega%20Menu&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2881-cwe-200-exposure-of-sensitive-inform-2e56ab5c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2881%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bap22%20Developer%20Toolbar&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2841-cwe-200-exposure-of-sensitive-inform-92070c5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2841%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20reality66%20Cart66%20Cloud%20%3A%3A%20WordPress%20Ecommerce%20The%20Easy%20Way&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29834-cwe-125-out-of-bounds-read-in-microsoft-microsoft-edge-chromium-based-aebc68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29834%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682cd0f91484d88663aebc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32726-cwe-284-improper-access-control-in-microsoft-visual-studio-code-aebc72</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32726%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=medium&amp;id=682cd0f91484d88663aebc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29803-cwe-427-uncontrolled-search-path-element-in-microsoft-visual-studio-tools-for-applications-vsta-aebc30</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29803%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20SQL%20Server%20Management%20Studio%2020.2&amp;severity=high&amp;id=682cd0f91484d88663aebc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-12-2ae020</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-12&amp;severity=medium&amp;id=682c7db4e8347ec82d2ae020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-12-f1209a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f1209a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2269-cwe-79-improper-neutralization-of-in-a64d3f59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2269%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0129-allowed-with-review-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-palo-alto-networks-prisma-access-browser-b3d2ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0129%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Prisma%20Access%20Browser&amp;severity=critical&amp;id=682d153e4d7c5ea9f4b3d2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32079-cwe-20-improper-input-validation-in-0584ac58</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32079%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments&amp;severity=medium&amp;id=6866b2446f40f0eb7299338c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32072-cwe-116-improper-encoding-or-escapi-fdaea10d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32072%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20Core%20-%20Feed%20Utils&amp;severity=medium&amp;id=690909fb7fff0e30cee434b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32073-cwe-20-improper-input-validation-in-f597d1e4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32073%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20HTML%20Tags&amp;severity=medium&amp;id=6866b2446f40f0eb7299337a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32074-cwe-116-improper-encoding-or-escapi-f46fb375</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32074%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Confirm%20Account%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb7299337e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32067-cwe-20-improper-input-validation-in-9063dbaf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32067%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Growth%20Experiments%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb72993366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32068-cwe-863-incorrect-authorization-in--f4f93cf2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32068%3A%20CWE-863%20Incorrect%20Authorization%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20OAuth%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb7299336a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32069-cwe-20-improper-input-validation-in-ae8b8bc8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32069%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikibase%20Media%20Info%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb7299336e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32070-cwe-20-improper-input-validation-in-dac92d2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32070%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20AJAX%20Poll%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb72993372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32071-cwe-20-improper-input-validation-in-86cb2e6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32071%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikidata%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb72993376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3421-cwe-79-improper-neutralization-of-in-5db041fa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3421%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%2C%20Quiz%2C%20Survey%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54edab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3422-cwe-94-improper-control-of-generatio-b0b28f64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3422%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%2C%20Quiz%2C%20Survey%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54edaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3439-cwe-502-deserialization-of-untrusted-101e3bec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3439%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%2C%20Quiz%2C%20Survey%20%26%20Custom%20Form%20Builder&amp;severity=critical&amp;id=699f6b2bb7ef31ef0b54ef5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13861-cwe-732-incorrect-permission-assign-80eaaafd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13861%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Sophos%20Taegis%20Endpoint%20Agent%20(Linux)&amp;severity=high&amp;id=69a0a1b885912abc71d0a0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2575-cwe-79-improper-neutralization-of-in-679dc9c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzita%20Z%20Companion&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2541-cwe-79-improper-neutralization-of-in-c67d4149</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2541%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wedevs%20Project%20Manager%20%E2%80%93%20AI%20Powered%20Project%20Management%2C%20Task%20Management%2C%20Kanban%20Board%20%26%20Time%20Tracker&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23389-cwe-284-improper-access-control-in--b2125768</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23389%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20SUSE%20rancher&amp;severity=high&amp;id=69a0a1bf85912abc71d0ac36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23391-cwe-266-incorrect-privilege-assignm-6b8dfb86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23391%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20SUSE%20rancher&amp;severity=critical&amp;id=69a0a1bf85912abc71d0ac3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2128-cwe-89-improper-neutralization-of-sp-23928b86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2128%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32681-improper-neutralization-of-special--1d8f7956</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32681%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Guru%20Error%20Log%20Viewer&amp;severity=null&amp;id=69cd73efe6bfc5ba1def423b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32672-improper-control-of-filename-for-in-93a305bd</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32672%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20g5theme%20Ultimate%20Bootstrap%20Elements%20for%20Elementor&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32671-improper-limitation-of-a-pathname-t-cbc9ab6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32671%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20John%20Weissberg%20Print%20Science%20Designer&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32663-improper-control-of-filename-for-in-e9bcca0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32663%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20roninwp%20FAT%20Cooming%20Soon&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32656-improper-control-of-filename-for-in-62f70b21</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32656%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Testimonial%20Slider%20And%20Showcase%20Pro&amp;severity=null&amp;id=69cd73eae6bfc5ba1def408b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32654-improper-control-of-filename-for-in-da207035</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32654%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Stylemix%20Motors&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32650-improper-neutralization-of-special--39790e3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32650%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ability%2C%20Inc%20Accessibility%20Suite&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32633-improper-limitation-of-a-pathname-t-59391158</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32633%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20neoslab%20Database%20Toolset&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def400b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32632-improper-neutralization-of-input-du-1ae2840d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KaizenCoders%20Automatic%20Ban%20IP&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def4008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32631-improper-limitation-of-a-pathname-t-db471e7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32631%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oxygensuite%20Oxygen%20MyData%20for%20WooCommerce&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def4005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32629-improper-limitation-of-a-pathname-t-99558844</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32629%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CMSJunkie%20-%20WordPress%20Business%20Directory%20Plugins%20WP-BusinessDirectory&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32627-improper-control-of-filename-for-in-94bebe1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32627%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32618-improper-neutralization-of-special--23491b66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32618%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PickPlugins%20Wishlist&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32614-improper-control-of-filename-for-in-72821cf5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32614%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ashan%20Perera%20EventON&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32607-deserialization-of-untrusted-data-i-ce8efbad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32607%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpBookingly&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32603-improper-neutralization-of-special--e347f859</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32603%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HK%20WP%20Online%20Users%20Stats&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32601-improper-neutralization-of-input-du-a849b520</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32601%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twispay%20Twispay%20Credit%20Card%20Payments&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32599-improper-neutralization-of-input-du-c49a87ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miunosoft%20Task%20Scheduler&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32589-improper-control-of-filename-for-in-b2bb6486</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32589%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20odude%20Flexi%20%E2%80%93%20Guest%20Submit&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32587-improper-limitation-of-a-pathname-t-e8981a18</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32587%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pickupp%20WooCommerce%20Pickupp&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32586-improper-neutralization-of-input-du-487425ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ABA%20Bank%20ABA%20PayWay%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32585-path-traversal-in-trusty-plugins-sh-08687598</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32585%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Trusty%20Plugins%20Shop%20Products%20Filter&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32579-unrestricted-upload-of-file-with-da-829e7a6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32579%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SoftClever%20Limited%20Sync%20Posts&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32577-improper-control-of-filename-for-in-75497160</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32577%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hakeemnala%20Build%20App%20Online&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32569-deserialization-of-untrusted-data-i-a7012541</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32569%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RealMag777%20TableOn&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32568-deserialization-of-untrusted-data-i-90fc723d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32568%3A%20Deserialization%20of%20Untrusted%20Data%20in%20empik%20EmpikPlace%20for%20Woocommerce&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32567-improper-neutralization-of-special--20b9353e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32567%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dev02ali%20Easy%20Post%20Duplicator&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32565-improper-neutralization-of-special--1affbf1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32565%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vertim%20Neon%20Product%20Designer&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32558-improper-neutralization-of-special--eba8865f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32558%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ketanajani%20Duplicate%20Title%20Checker&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32553-improper-neutralization-of-input-du-28f2426f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Magnigenie%20RestroPress&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32551-improper-neutralization-of-input-du-d525a145</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jaap%20Jansma%20Connector%20to%20CiviCRM%20with%20CiviMcRestFace&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32542-missing-authorization-in-eazyplugin-31bb91bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32542%3A%20Missing%20Authorization%20in%20EazyPlugins%20Eazy%20Plugin%20Manager&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32541-improper-neutralization-of-input-du-565db44b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20infosoftplugin%20WooCommerce%20Sales%20MIS%20Report&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32539-improper-neutralization-of-input-du-f51e8bb5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20Kohlbach%20Store%20Exporter&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32538-improper-neutralization-of-input-du-23d5890e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dev02ali%20Easy%20Post%20Duplicator&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32537-improper-neutralization-of-input-du-3627e79b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rachel%20Cherry%20Lock%20Your%20Updates&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32536-improper-neutralization-of-input-du-b4cc4ac1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sandeep%20Verma%20HTML5%20Video%20Player%20with%20Playlist&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32534-improper-neutralization-of-input-du-35d4974f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32534%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Workbox%20Workbox%20Video%20from%20Vimeo%20%26%20Youtube&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32525-improper-neutralization-of-input-du-b32507da</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MapGeo%20Interactive%20Geo%20Maps&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32524-improper-neutralization-of-input-du-612a9de3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MyWorks%20MyWorks%20WooCommerce%20Sync%20for%20QuickBooks%20Online&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32523-improper-neutralization-of-input-du-b94f361a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32523%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20payphone%20WooCommerce%20%E2%80%93%20Payphone%20Gateway&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32519-improper-control-of-filename-for-in-1e15452e</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32519%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Foysal%20Imran%20IDonate&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32517-improper-neutralization-of-input-du-68099408</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SCAND%20MultiMailer&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32509-improper-limitation-of-a-pathname-t-586a0f6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32509%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WPMinds%20Simple%20WP%20Events&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32491-incorrect-privilege-assignment-in-r-c6043489</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32491%3A%20Incorrect%20Privilege%20Assignment%20in%20Rankology%20Rankology%20SEO%20%E2%80%93%20On-site%20SEO&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32144-deserialization-of-untrusted-data-i-ed9bfa19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32144%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def324c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32143-deserialization-of-untrusted-data-i-c52aa579</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32143%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Accordion&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31599-improper-neutralization-of-special--c5318838</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31599%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20N-Media%20Bulk%20Product%20Sync&amp;severity=null&amp;id=69cd736ee6bfc5ba1def218f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31565-improper-neutralization-of-special--225c186c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31565%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Lisandro%20Martinez%20WPSmartContracts&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31379-improper-neutralization-of-input-du-2c177cef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31379%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20programphases%20Insert%20HTML%20Here&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31378-improper-neutralization-of-input-du-34a46f64</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31378%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danbwb%20Oppso%20Unit%20Converter&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31041-missing-authorization-in-anytrack-a-fa4c5483</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31041%3A%20Missing%20Authorization%20in%20AnyTrack%20AnyTrack%20Affiliate%20Link%20Manager&amp;severity=null&amp;id=69cd7340e6bfc5ba1def146c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31040-improper-control-of-filename-for-in-eea57f64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31040%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Exthemes%20WP%20Food%20ordering%20and%20Restaurant%20Menu&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31028-improper-neutralization-of-input-du-8aaca73d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31028%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Huseyin%20Berberoglu%20WP%20Hide%20Categories&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31021-improper-neutralization-of-input-du-2ad47fc2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dolby_uk%20Mobile%20Smart&amp;severity=null&amp;id=69cd733be6bfc5ba1def0eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31015-improper-control-of-filename-for-in-4b82b800</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31015%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Adrian%20Tobey%20WordPress%20SMTP%20Service%2C%20Email%20Delivery%20Solved!%20%E2%80%94%20MailHawk&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31014-improper-control-of-filename-for-in-cb099717</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31014%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Hossein%20Material%20Dashboard&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3434-cwe-79-improper-neutralization-of-in-1d3df565</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20SMTP%20for%20Amazon%20SES%20%E2%80%93%20YaySMTP&amp;severity=high&amp;id=699f6b2bb7ef31ef0b54eec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3512-cwe-122-heap-based-buffer-overflow-in-the-qt-company-qt-befffc</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3512%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20The%20Qt%20Company%20Qt&amp;severity=medium&amp;id=682d983ec4522896dcbefffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2636-cwe-22-improper-limitation-of-a-path-65fad1b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2636%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20instawp%20InstaWP%20Connect%20%E2%80%93%201-click%20WP%20Staging%20%26%20Migration&amp;severity=high&amp;id=699f6b25b7ef31ef0b54e9a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0120-cwe-250-execution-with-unnecessary-privileges-in-palo-alto-networks-globalprotect-app-bebafe</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0120%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=high&amp;id=682d9837c4522896dcbebafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-11-2adc6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-11&amp;severity=medium&amp;id=682c7db4e8347ec82d2adc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-11-f12fd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-11&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29918-cwe-835-loop-with-unreachable-exit--dd04711b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29918%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20OISF%20suricata&amp;severity=medium&amp;id=69091542c28fd46ded7bb2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32699-cwe-79-improper-neutralization-of-i-f27aab98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32699%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=690909fb7fff0e30cee434ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32698-cwe-200-exposure-of-sensitive-infor-fae80722</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32698%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=690909fb7fff0e30cee434ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27350-improper-neutralization-of-input-du-213cf6f0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hugh%20Mungus%20Vice%20Versa&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31411-improper-limitation-of-a-pathname-t-5bbd1ff4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31411%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aribhour%20Linet%20ERP-Woocommerce%20Integration&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22279-improper-control-of-filename-for-in-4137db8d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22279%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Crocoblock%20JetCompareWishlist&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32282-cross-site-request-forgery-csrf-in--b6ec7f68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32282%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ShareThis%20ShareThis%20Dashboard%20for%20Google%20Analytics&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32275-authentication-bypass-by-spoofing-i-897d98c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32275%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=null&amp;id=69cd73bfe6bfc5ba1def37c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32260-missing-authorization-in-detheme-de-08f557fa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32260%3A%20Missing%20Authorization%20in%20Detheme%20DethemeKit%20For%20Elementor&amp;severity=null&amp;id=69cd73bce6bfc5ba1def366e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32259-missing-authorization-in-alimir-wp--f72f23f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32259%3A%20Missing%20Authorization%20in%20Alimir%20WP%20ULike&amp;severity=null&amp;id=69cd73bce6bfc5ba1def366b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32244-missing-authorization-in-quantumclo-9a67d70e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32244%3A%20Missing%20Authorization%20in%20QuantumCloud%20SEO%20Help&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32243-missing-authorization-in-toast-plug-427bd0fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32243%3A%20Missing%20Authorization%20in%20Toast%20Plugins%20Internal%20Link%20Optimiser&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32240-missing-authorization-in-wpvsingh-s-8d05550a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32240%3A%20Missing%20Authorization%20in%20wpvsingh%20Site%20Notify&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32236-missing-authorization-in-vagonic-wo-dcb8afec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32236%3A%20Missing%20Authorization%20in%20Vagonic%20Woocommerce%20Products%20Reorder%20Drag%20Drop%20Multiple%20Sort%20%E2%80%93%20Sortable%2C%20Rearrange%20Products%20Vagonic&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32230-improper-neutralization-of-script-r-678363a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32230%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Themeum%20Tutor%20LMS&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32228-exposure-of-sensitive-system-inform-fb24fd13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32228%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WP%20Messiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32227-authentication-bypass-by-spoofing-i-eb70fd75</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32227%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Asgaros%20Asgaros%20Forum&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32221-missing-authorization-in-spider-the-63f24fb4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32221%3A%20Missing%20Authorization%20in%20Spider%20Themes%20EazyDocs&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32216-missing-authorization-in-spider-the-c984a3bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32216%3A%20Missing%20Authorization%20in%20Spider%20Themes%20Spider%20Elements&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def344a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32215-unrestricted-upload-of-file-with-da-1c6e5184</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32215%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ability%2C%20Inc%20Accessibility%20Suite&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32213-missing-authorization-in-flothemesp-1dcfe039</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32213%3A%20Missing%20Authorization%20in%20flothemesplugins%20Flo%20Forms&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32212-missing-authorization-in-specia-the-6644189c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32212%3A%20Missing%20Authorization%20in%20Specia%20Theme%20Specia%20Companion&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32210-missing-authorization-in-creativemi-28c4e375</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32210%3A%20Missing%20Authorization%20in%20CreativeMindsSolutions%20CM%20Registration%20and%20Invitation%20Codes&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def343b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32209-improper-limitation-of-a-pathname-t-ada73927</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32209%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20totalprocessing%20Nomupay%20Payment%20Processing%20Gateway&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32206-unrestricted-upload-of-file-with-da-2696662a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32206%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20LABCAT%20Processing%20Projects&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32205-improper-limitation-of-a-pathname-t-f552cf18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32205%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20piotnetdotcom%20Piotnet%20Forms&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32202-unrestricted-upload-of-file-with-da-0d21ea30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32202%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Brian%20Batt%20-%20elearningfreak.com%20Insert%20or%20Embed%20Articulate%20Content%20into%20WordPress&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32199-improper-neutralization-of-input-du-5ce3b55a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32199%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyale-vc%20Contact%20Form%20Builder%20by%20vcita&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32198-improper-neutralization-of-input-du-912d85ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32198%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32160-improper-control-of-filename-for-in-d74854c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32160%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ashan%20Perera%20EventON&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def32a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32158-improper-control-of-filename-for-in-cba499c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32158%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Syed%20Balkhi%20aThemes%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def32a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32145-deserialization-of-untrusted-data-i-6c401e55</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32145%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def324f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32140-unrestricted-upload-of-file-with-da-e19894dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32140%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Nirmal%20Kumar%20Ram%20WP%20Remote%20Thumbnail&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32139-improper-neutralization-of-input-du-8b588ace</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32139%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FooPlugins%20FooBox%20Image%20Lightbox&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32128-improper-neutralization-of-special--bf610bac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32128%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aaronfrey%20Nearby%20Locations&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32119-improper-neutralization-of-special--68571fa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32119%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CardGate%20CardGate%20Payments%20for%20WooCommerce&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def319f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32116-improper-neutralization-of-input-du-c1028e27</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32116%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Studi7%20QR%20Master&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32115-improper-neutralization-of-input-du-6114d2dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32115%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Popping%20Content%20Light&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def316d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32114-improper-neutralization-of-input-du-a6034af7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32114%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%205sterrenspecialist%20WordPress%205sterrenspecialist%20Plugin&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def316a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31524-incorrect-privilege-assignment-in-j-4b8a05b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31524%3A%20Incorrect%20Privilege%20Assignment%20in%20John%20James%20Jacoby%20WP%20User%20Profiles&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30582-improper-limitation-of-a-pathname-t-1eec1c48</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30582%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aytechnet%20DyaPress%20ERP%2FCRM&amp;severity=null&amp;id=69cd72fee6bfc5ba1deefff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32687-improper-neutralization-of-special--57464b71</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32687%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Magnigenie%20Review%20Stars%20Count%20For%20WooCommerce&amp;severity=null&amp;id=69cd73efe6bfc5ba1def424d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32668-improper-control-of-filename-for-in-6b0bd154</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32668%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3417-cwe-862-missing-authorization-in-str-c9026665</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3417%3A%20CWE-862%20Missing%20Authorization%20in%20stringfold%20Embedder&amp;severity=high&amp;id=699f6b29b7ef31ef0b54eda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13909-cwe-89-improper-neutralization-of-s-e1916140</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13909%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20accredible%20Accredible%20Certificates%20%26%20Open%20Badges&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2805-cwe-94-improper-control-of-generatio-4a7ed39e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2805%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vikashsrivastava1111989%20ORDER%20POST&amp;severity=high&amp;id=699f6b25b7ef31ef0b54ea34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2719-cwe-862-missing-authorization-in-has-577996b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2719%3A%20CWE-862%20Missing%20Authorization%20in%20hasthemes%20Swatchly%20%E2%80%93%20WooCommerce%20Variation%20Swatches%20for%20Products%20(product%20attributes%3A%20Image%20swatch%2C%20Color%20swatches%2C%20Label%20swatches)&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2809-cwe-94-improper-control-of-generatio-94decae4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2809%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20azurecurve%20azurecurve%20Shortcodes%20in%20Comments&amp;severity=high&amp;id=699f6b25b7ef31ef0b54ea41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10894-cwe-79-improper-neutralization-of-i-288316db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kendysond%20Payment%20Forms%20for%20Paystack&amp;severity=medium&amp;id=699f6e01b7ef31ef0b5936cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3102-cwe-697-incorrect-comparison-in-brai-d7064982</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3102%3A%20CWE-697%20Incorrect%20Comparison%20in%20brainstormforce%20OttoKit%3A%20All-in-One%20Automation%20Platform&amp;severity=high&amp;id=699f6b29b7ef31ef0b54eca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26330-cwe-863-incorrect-authorization-in--ace36425</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26330%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Dell%20PowerScale%20OneFS&amp;severity=high&amp;id=69a0a1bf85912abc71d0ac46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27690-cwe-1393-use-of-default-password-in-0080b7a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27690%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20Dell%20PowerScale%20OneFS&amp;severity=critical&amp;id=69a0a1c385912abc71d0b6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58136-cwe-424-improper-protection-of-alternate-path-in-yiiframework-yii-beb7da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58136%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20yiiframework%20Yii&amp;severity=critical&amp;id=682d9837c4522896dcbeb7da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32728-cwe-440-expected-behavior-violation-in-openbsd-openssh-bd86b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32728%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20OpenBSD%20OpenSSH&amp;severity=medium&amp;id=682d9819c4522896dcbd86b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-10-2afea6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-10&amp;severity=medium&amp;id=682c7db4e8347ec82d2afea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-10-f12225</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f12225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30645-cwe-476-null-pointer-dereference-in-juniper-networks-junos-os-bf0925</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30645%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d983fc4522896dcbf0925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30644-cwe-122-heap-based-buffer-overflow-in-juniper-networks-junos-os-bd8fd4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30644%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d981ac4522896dcbd8fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21591-cwe-805-buffer-access-with-incorrect-length-value-in-juniper-networks-junos-os-bef68b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21591%3A%20CWE-805%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d983dc4522896dcbef68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26888-missing-authorization-in-amir-helze-b2b825d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26888%3A%20Missing%20Authorization%20in%20Amir%20Helzer%20WooCommerce%20Multilingual%20%26%20Multicurrency&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3115-vulnerability-in-spotfire-spotfire-s-b74aed6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3115%3A%20Vulnerability%20in%20Spotfire%20Spotfire%20Statistics%20Services&amp;severity=critical&amp;id=69132437f1a0d9a2f12d6760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32695-incorrect-privilege-assignment-in-m-f3ec84d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32695%3A%20Incorrect%20Privilege%20Assignment%20in%20Mestres%20do%20WP%20Checkout%20Mestres%20WP&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31383-cross-site-request-forgery-csrf-in--35c0a2cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31383%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sodena%20FrescoChat%20Live%20Chat&amp;severity=null&amp;id=69cd7345e6bfc5ba1def1701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31385-cross-site-request-forgery-csrf-in--33ec8ee0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31385%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20intelcaprep%20Site%20Table%20of%20Contents&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31002-unrestricted-upload-of-file-with-da-4c070d88</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31002%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Bogdan%20Bendziukov%20Squeeze&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31003-exposure-of-sensitive-system-inform-90380d7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31003%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Bogdan%20Bendziukov%20Squeeze&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31004-missing-authorization-in-crooverinc-44370c5d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31004%3A%20Missing%20Authorization%20in%20Croover.inc%20Rich%20Table%20of%20Contents&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31005-cross-site-request-forgery-csrf-in--2ab7ed57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31005%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Uzair%20Easyfonts&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31008-improper-neutralization-of-input-du-3ea437d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Embeds%20For%20YouTube%20Plugin%20Support%20YouTube%20Embed&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31009-server-side-request-forgery-ssrf-in-4b576d14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31009%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Jan%20Boddez%20IndieBlocks&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31012-missing-authorization-in-phil-age-g-a3b21e20</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31012%3A%20Missing%20Authorization%20in%20Phil%20Age%20Gate&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31017-improper-neutralization-of-input-du-cd8f0b6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31017%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20Noakes%20Nav%20Menu%20Manager&amp;severity=null&amp;id=69cd733be6bfc5ba1def0ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31020-improper-neutralization-of-input-du-b66bd2d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webliberty%20Simple%20Spoiler&amp;severity=null&amp;id=69cd733be6bfc5ba1def0ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31023-cross-site-request-forgery-csrf-in--9293d5d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31023%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Purab%20Seo%20Meta%20Tags&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31026-cross-site-request-forgery-csrf-in--48eebe24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31026%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Austin%20Comment%20Validation%20Reloaded&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31032-cross-site-request-forgery-csrf-in--486c86b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31032%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pagopar%20-%20Grupo%20M%20S.A.%20Pagopar%20%E2%80%93%20WooCommerce%20Gateway&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31033-cross-site-request-forgery-csrf-in--ed3492ea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31033%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Adam%20Nowak%20Buddypress%20Humanity&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31034-cross-site-request-forgery-csrf-in--cb464ed4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31034%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AboZain%20Albanna%20Customize%20Login%20Page&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31035-improper-neutralization-of-input-du-6ec72693</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benjamin%20Chris%20WP%20Editor.md%20%E2%80%93%20The%20Perfect%20WordPress%20Markdown%20Editor&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31038-cross-site-request-forgery-csrf-in--8e38483a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31038%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Essential%20Marketer%20Essential%20Breadcrumbs&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31042-missing-authorization-in-rtakao-san-86807fcd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31042%3A%20Missing%20Authorization%20in%20rtakao%20Sandwich%20Adsense&amp;severity=null&amp;id=69cd7340e6bfc5ba1def146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31375-cross-site-request-forgery-csrf-in--2a729ad2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31375%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bhoogterp%20Scheduled&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31377-missing-authorization-in-asaquzzama-e068854c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31377%3A%20Missing%20Authorization%20in%20Asaquzzaman%20mishu%20Woo%20Product%20Feed%20For%20Marketing%20Channels&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31382-cross-site-request-forgery-csrf-in--3aecd0a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31382%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theode%20Language%20Field&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31388-cross-site-request-forgery-csrf-in--4d17d8c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31388%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20doa%20The%20World&amp;severity=null&amp;id=69cd7347e6bfc5ba1def173e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31390-cross-site-request-forgery-csrf-in--7463d8c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31390%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bdoga%20Social%20Crowd&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31391-cross-site-request-forgery-csrf-in--da29f73d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31391%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20regen%20Script%20Compressor&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31392-cross-site-request-forgery-csrf-in--57e177ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31392%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shameem%20Reza%20Smart%20Product%20Gallery%20Slider&amp;severity=null&amp;id=69cd7347e6bfc5ba1def174a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31393-cross-site-request-forgery-csrf-in--142abe7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31393%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vfvalent%20Social%20Bookmarking%20RELOADED&amp;severity=null&amp;id=69cd7347e6bfc5ba1def174d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31394-improper-neutralization-of-input-du-3a69ab3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31394%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kailey%20(trepmal)%20More%20Mime%20Type%20Filters&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31395-cross-site-request-forgery-csrf-in--b0967393</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31395%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20a.ankit%20Easy%20Custom%20CSS&amp;severity=null&amp;id=69cd734ae6bfc5ba1def1896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31399-cross-site-request-forgery-csrf-in--c3387b57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31399%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chandan%20Garg%20CG%20Scroll%20To%20Top&amp;severity=null&amp;id=69cd734ae6bfc5ba1def1899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31400-cross-site-request-forgery-csrf-in--5ef93a3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31400%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20icyleaf%20WS%20Audio%20Player&amp;severity=null&amp;id=69cd734ae6bfc5ba1def189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31401-cross-site-request-forgery-csrf-in--93a3af8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31401%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mmetrodw%20MMX%20%E2%80%93%20Make%20Me%20Christmas&amp;severity=null&amp;id=69cd734ae6bfc5ba1def189f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31402-cross-site-request-forgery-csrf-in--0fd8acb4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31402%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NewsBoard%20Plugin%20NewsBoard%20Post%20and%20RSS%20Scroller&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31404-cross-site-request-forgery-csrf-in--42cab642</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31404%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wladyslaw%20Madejczyk%20AF%20Tell%20a%20Friend&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32476-cross-site-request-forgery-csrf-in--11f29421</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32476%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blueinstyle%20Advanced%20Tag%20Lists&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32477-cross-site-request-forgery-csrf-in--0144cc79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32477%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jordi%20Salord%20WP-Easy%20Menu&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32478-cross-site-request-forgery-csrf-in--65584d2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32478%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mario%20Aguiar%20WP%20SexyLightBox&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32479-cross-site-request-forgery-csrf-in--c7dcaa58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32479%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ab-tools%20Flags%20Widget&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32480-cross-site-request-forgery-csrf-in--82760879</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32480%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dalziel%20Windows%20Live%20Writer&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32481-cross-site-request-forgery-csrf-in--90f1ddcf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32481%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ninotheme%20Nino%20Social%20Connect&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32482-cross-site-request-forgery-csrf-in--4f0870fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32482%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20quanganhdo%20Custom%20Smilies&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32483-improper-neutralization-of-input-du-fc87e0aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32483%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Salisbury%20Request%20Call%20Back&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32484-cross-site-request-forgery-csrf-in--310c6f53</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32484%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mathieu%20Chartier%20WP-Planification&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32485-cross-site-request-forgery-csrf-in--c45d6ad7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32485%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bjoern%20WP%20Performance%20Pack&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32487-server-side-request-forgery-ssrf-in-72429d1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32487%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Joe%20Waymark&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32488-improper-neutralization-of-input-du-76906503</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32488%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aria%20Font&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32489-improper-neutralization-of-input-du-e27b7d50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32489%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tim%20Wetterwarner&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32492-improper-neutralization-of-input-du-ac639276</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32492%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eliot%20Akira%20Admin%20Menu%20Post%20List&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32493-improper-neutralization-of-input-du-96ed7aaf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VibeThemes%20BP%20Social%20Connect&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32494-cross-site-request-forgery-csrf-in--e1e750e2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32494%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bozdoz%20reCAPTCHA%20Jetpack&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32495-improper-neutralization-of-input-du-0e3a8215</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32495%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Waymark&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32496-cross-site-request-forgery-csrf-in--96bd9d3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32496%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Uncodethemes%20Ultra%20Demo%20Importer&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32497-cross-site-request-forgery-csrf-in--2cd6f43f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32497%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20squiter%20Spoiler%20Block&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32498-cross-site-request-forgery-csrf-in--98319390</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32498%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20oleglark%20VKontakte%20Cross-Post&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32499-improper-control-of-filename-for-in-ffbdced6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32499%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpWax%20Logo%20Showcase%20Ultimate&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32500-cross-site-request-forgery-csrf-in--d91f94cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32500%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sudavar%20Codescar%20Radio%20Widget&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32501-cwe-352-cross-site-request-forgery--7e0b07c5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32501%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dimafreund%20Rentsyst&amp;severity=null&amp;id=6849b12023110031d41045f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32502-cross-site-request-forgery-csrf-in--b74138c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32502%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lemmentwickler%20ePaper%20Lister%20for%20Yumpu&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32503-improper-neutralization-of-input-du-bce6fca6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32503%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jose%20Conti%20Link%20Shield&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32505-cross-site-request-forgery-csrf-in--4dbf66b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32505%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SCAND%20MultiMailer&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32518-cross-site-request-forgery-csrf-in--50f79190</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32518%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hossainawlad%20ALD%20Login%20Page&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32543-improper-neutralization-of-input-du-63fa2770</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hivedigital%20Canonical%20Attachments&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32547-cross-site-request-forgery-csrf-in--1476117e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32547%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gtlwpdev%20All%20push%20notification%20for%20WP&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32555-cross-site-request-forgery-csrf-in--22ac582d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32555%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Edamam%20SEO%2C%20Nutrition%20and%20Print%20for%20Recipes%20by%20Edamam&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32556-cross-site-request-forgery-csrf-in--073520f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32556%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sandor%20Kovacs%20Simple%20Post%20Meta%20Manager&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32563-cross-site-request-forgery-csrf-in--4b7da938</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32563%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dangrossman%20WP%20Calais%20Auto%20Tagger&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32570-improper-neutralization-of-input-du-80b601ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChillPay%20ChillPay%20WooCommerce&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32575-cross-site-request-forgery-csrf-in--8094df52</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32575%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20axew3%20WP%20w3all%20phpBB&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32576-cross-site-request-forgery-csrf-in--24878f00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32576%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Agence%20web%20Eoxia%20-%20Montpellier%20WP%20shop&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32580-improper-neutralization-of-input-du-058be339</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32580%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debounce%20DeBounce%20Email%20Validator&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32581-improper-neutralization-of-input-du-d97897d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ankit%20Singla%20WordPress%20Spam%20Blocker&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32591-cross-site-request-forgery-csrf-in--404dd34e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32591%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kevon%20Adonis%20WP%20Abstracts&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32597-cross-site-request-forgery-csrf-in--bae6d512</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32597%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20George%20Sexton%20WordPress%20Events%20Calendar%20Plugin%20%E2%80%93%20connectDaily&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32610-cross-site-request-forgery-csrf-in--318b613d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32610%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FolioVision%20Foliopress%20WYSIWYG&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32612-cross-site-request-forgery-csrf-in--cb2d84ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32612%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rafasashi%20User%20Session%20Synchronizer&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32616-cross-site-request-forgery-csrf-in--f73be834</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32616%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nimbata%20Nimbata%20Call%20Tracking&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32617-cross-site-request-forgery-csrf-in--ca9bba04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ydesignservices%20Multiple%20Location%20Google%20Map&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32621-cross-site-request-forgery-csrf-in--f41fc6e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32621%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vsourz%20Digital%20WP%20Map%20Route%20Planner&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32623-cross-site-request-forgery-csrf-in--d01ad260</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32623%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20plainware%20PlainInventory&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32624-missing-authorization-in-czater-cza-82d3ae87</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32624%3A%20Missing%20Authorization%20in%20czater%20Czater.pl%20%E2%80%93%20live%20chat%20i%20telefon&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32640-improper-neutralization-of-input-du-83738bf2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32640%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Ally&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32641-cross-site-request-forgery-csrf-in--9af31d11</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32641%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anantaddons%20Anant%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def403c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32642-cross-site-request-forgery-csrf-in--67e2f4cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32642%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20appsbd%20Vite%20Coupon&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def403f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32644-cross-site-request-forgery-csrf-in--624bbedd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32644%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IP2Location%20IP2Location%20World%20Clock&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32645-cross-site-request-forgery-csrf-in--6b941f29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32645%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hiren%20Patel%20Custom%20Posts%20Order&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32659-cross-site-request-forgery-csrf-in--d02e72fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32659%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fraudlabspro%20FraudLabs%20Pro%20for%20WooCommerce&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32661-cross-site-request-forgery-csrf-in--4b33f09f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32661%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Map%20Plugins%20Interactive%20US%20Map&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32664-cross-site-request-forgery-csrf-in--59202252</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32664%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ashokbasnet%20Nepali%20Date%20Utilities&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32667-cross-site-request-forgery-csrf-in--8f94e13d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32667%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fromdoppler%20Doppler%20Forms&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32669-cross-site-request-forgery-csrf-in--08c8c24c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32669%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MERGADO%20Mergado%20Pack&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32673-cross-site-request-forgery-csrf-in--6027171e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32673%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20epeken%20Epeken%20All%20Kurir&amp;severity=null&amp;id=69cd73ede6bfc5ba1def417c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32675-server-side-request-forgery-ssrf-in-9e4cd45f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32675%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20QuantumCloud%20SEO%20Help&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32676-improper-neutralization-of-special--729abe5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32676%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Picture-Planet%20GmbH%20Verowa%20Connect&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32677-improper-neutralization-of-special--0e7e8c63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32677%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20solwininfotech%20WP%20Social%20Stream%20Designer&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32678-cross-site-request-forgery-csrf-in--c9d53979</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32678%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ashish%20Ajani%20WP%20Show%20Stats&amp;severity=null&amp;id=69cd73ede6bfc5ba1def418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32679-cross-site-request-forgery-csrf-in--a9e6da51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32679%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZealousWeb%20User%20Registration%20Using%20Contact%20Form%207&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32680-improper-neutralization-of-input-du-3e972f84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32680%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Grade%20Us%2C%20Inc.%20Review%20Stream&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32683-improper-neutralization-of-input-du-3fe03bb3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32684-missing-authorization-in-romancode--29211d0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32684%3A%20Missing%20Authorization%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32685-improper-neutralization-of-special--b18456d1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32685%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aristo%20Rinjuang%20WP%20Inquiries&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32690-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-angelo-mandato-powerpress-podcasting-bdb342</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32690%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=null&amp;id=682d981dc4522896dcbdb342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32691-server-side-request-forgery-ssrf-in-c44a5a40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32691%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32692-improper-control-of-filename-for-in-831f1057</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32692%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20WP%20Subscription%20Forms&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32693-url-redirection-to-untrusted-site-o-a4d1e7d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32693%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WPWebinarSystem%20WebinarPress&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32694-url-redirection-to-untrusted-site-o-c76a9ad1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32694%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Rustaurius%20Ultimate%20WP%20Mail&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25023-cwe-266-incorrect-privilege-assignm-1e77f656</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25023%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1968-cwe-613-insufficient-session-expiration-in-progress-software-corporation-sitefinity-bebfa2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1968%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Progress%20Software%20Corporation%20Sitefinity&amp;severity=high&amp;id=682d9838c4522896dcbebfa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31672-cwe-20-improper-input-validation-in-apache-software-foundation-apache-poi-2725d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31672%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20POI&amp;severity=medium&amp;id=683076940acd01a2492725d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3100-cwe-79-improper-neutralization-of-in-1acb5657</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3100%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wedevs%20Project%20Manager%20%E2%80%93%20AI%20Powered%20Project%20Management%2C%20Task%20Management%2C%20Kanban%20Board%20%26%20Time%20Tracker&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ec9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29988-cwe-121-stack-based-buffer-overflow-0e5cefec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29988%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20Dell%20Client%20Platform%20BIOS&amp;severity=medium&amp;id=69a0a1c385912abc71d0b6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29394-n-a-in-n-a-bf5d94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29394%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32464-cwe-1025-comparison-using-wrong-factors-in-haproxy-haproxy-bf16a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32464%3A%20CWE-1025%20Comparison%20Using%20Wrong%20Factors%20in%20HAProxy%20HAProxy&amp;severity=medium&amp;id=682d9840c4522896dcbf16a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-09-2af85b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-09&amp;severity=medium&amp;id=682c7db4e8347ec82d2af85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-09-f12bfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27188-incorrect-authorization-cwe-863-in-adobe-adobe-commerce-bec923</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27188%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=682d9839c4522896dcbec923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12556-cwe-1321-in-elastic-kibana-3611eab8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12556%3A%20CWE-1321%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69a0a1b885912abc71d0a0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30290-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-coldfusion-bd773a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30290%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=682d9817c4522896dcbd773a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30282-improper-authentication-cwe-287-in-adobe-coldfusion-bf5d60</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30282%3A%20Improper%20Authentication%20(CWE-287)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9848c4522896dcbf5d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30284-deserialization-of-untrusted-data-c-74e31853</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30284%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=68ba60380415b92ecddd1bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30294-improper-input-validation-cwe-20-in-adobe-coldfusion-bf5d71</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30294%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9848c4522896dcbf5d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30289-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-cwe-78-in-adobe-coldfusion-bf16c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30289%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=682d9840c4522896dcbf16c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30288-improper-access-control-cwe-284-in--6e8e11e2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30288%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=68ba60380415b92ecddd1bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24447-deserialization-of-untrusted-data-cwe-502-in-adobe-coldfusion-bf5d58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24447%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9848c4522896dcbf5d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30281-improper-access-control-cwe-284-in--c94e2999</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30281%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=685ae8830e5630b102ff2e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3416-use-after-free-in-red-hat-red-hat-directory-server-11-25c231</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3416%3A%20Use%20After%20Free&amp;severity=low&amp;id=682f2c0b0acd01a24925c231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30295-heap-based-buffer-overflow-cwe-122--d76c0eb3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30295%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30297-out-of-bounds-write-cwe-787-in-adob-18cb3231</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30297%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30304-out-of-bounds-write-cwe-787-in-adob-6949e348</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30304%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30299-heap-based-buffer-overflow-cwe-122--566b2f97</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30299%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30296-integer-underflow-wrap-or-wraparoun-784ac73b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30296%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30298-stack-based-buffer-overflow-cwe-121-4fc500fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30298%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27200-use-after-free-cwe-416-in-adobe-ani-4e95c46b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27200%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Animate&amp;severity=high&amp;id=69a0a1c385912abc71d0b6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27199-heap-based-buffer-overflow-cwe-122--e02349f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27199%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Animate&amp;severity=high&amp;id=69a0a1c185912abc71d0ac90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27198-heap-based-buffer-overflow-cwe-122--37e4de42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27198%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=69a0a1c185912abc71d0ac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27196-heap-based-buffer-overflow-cwe-122--4a774f5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27196%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Premiere%20Pro&amp;severity=high&amp;id=69a0a1c185912abc71d0ac8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27193-heap-based-buffer-overflow-cwe-122--9a123a44</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27193%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69a0a1c185912abc71d0ac81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27195-heap-based-buffer-overflow-cwe-122--48c0e5ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27195%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Media%20Encoder&amp;severity=high&amp;id=69a0a1c185912abc71d0ac87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27194-out-of-bounds-write-cwe-787-in-adob-7874d9de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27194%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Media%20Encoder&amp;severity=high&amp;id=69a0a1c185912abc71d0ac84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27182-out-of-bounds-write-cwe-787-in-adob-6ca3e4ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27182%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=69a0a1c185912abc71d0ac7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27183-out-of-bounds-write-cwe-787-in-adobe-after-effects-bebfa6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27183%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=682d9838c4522896dcbebfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26682-cwe-770-allocation-of-resources-without-limits-or-throttling-in-microsoft-asp-net-core-8-0-aebb74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26682%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Microsoft%20ASP.NET%20Core%208.0&amp;severity=high&amp;id=682cd0f91484d88663aebb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24062-cwe-20-improper-input-validation-in-microsoft-windows-server-2022-aebafe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24062%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aebafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24060-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebafc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24060%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29811-cwe-20-improper-input-validation-in-microsoft-windows-11-version-22h2-aebc47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29811%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aebc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29819-cwe-73-external-control-of-file-name-or-path-in-microsoft-windows-admin-center-in-azure-portal-aebc51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29819%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=medium&amp;id=682cd0f91484d88663aebc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29816-cwe-349-acceptance-of-extraneous-untrusted-data-with-trusted-data-in-microsoft-microsoft-office-2019-aebc4d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29816%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29812-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-server-2022-aebc49</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29812%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aebc49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29810-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-aebc45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29810%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29805-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-microsoft-outlook-for-android-aebc34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29805%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Outlook%20for%20Android&amp;severity=high&amp;id=682cd0f91484d88663aebc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29808-cwe-1240-use-of-a-cryptographic-primitive-with-a-risky-implementation-in-microsoft-windows-server-2022-aebc36</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29808%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Microsoft%20Windows%20Server%202022&amp;severity=medium&amp;id=682cd0f91484d88663aebc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29809-cwe-922-insecure-storage-of-sensitive-information-in-microsoft-windows-10-version-1809-aebc38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29809%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebc38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29804-cwe-284-improper-access-control-in-microsoft-microsoft-visual-studio-2022-version-17-13-aebc32</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29804%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.10&amp;severity=high&amp;id=682cd0f91484d88663aebc32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29801-cwe-276-incorrect-default-permissions-in-microsoft-microsoft-autoupdate-for-mac-aebc2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29801%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=682cd0f91484d88663aebc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29802-cwe-427-uncontrolled-search-path-element-in-microsoft-microsoft-visual-studio-2022-version-17-8-aebc2e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29802%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.10&amp;severity=high&amp;id=682cd0f91484d88663aebc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29800-cwe-269-improper-privilege-management-in-microsoft-microsoft-autoupdate-for-mac-aebc2a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29800%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=682cd0f91484d88663aebc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27739-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-aebbee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27739%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27738-cwe-284-improper-access-control-in-microsoft-windows-10-version-21h2-aebbec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27738%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27737-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebbea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27737%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27736-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-10-version-1809-aebbe8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27736%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=682cd0f91484d88663aebbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27735-cwe-345-insufficient-verification-of-data-authenticity-in-microsoft-windows-10-version-1809-aebbdb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27735%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27733-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aebbd9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27733%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27732-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebbd7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27732%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27730-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebbd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27730%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27731-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebbd5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27731%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27728-cwe-125-out-of-bounds-read-in-microsoft-windows-server-2025-server-core-installation-aebbcf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27728%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f91484d88663aebbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27729-cwe-416-use-after-free-in-microsoft-windows-10-version-21h2-aebbd1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27729%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aebbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27727-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-aebbcd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27727%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27490-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2022-aebbbc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27490%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aebbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27491-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebbc9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27491%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27492-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-server-2022-aebbcb</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27492%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aebbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27486-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebbb6</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27486%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27489-cwe-20-improper-input-validation-in-microsoft-azure-stack-os-hci-aebbba</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27489%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Azure%20Stack%20HCI%20OS&amp;severity=high&amp;id=682cd0f91484d88663aebbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27487-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-app-client-for-windows-desktop-aebbb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27487%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=682cd0f91484d88663aebbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27483-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aebbb0</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27483%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27482-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-aebbae</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27482%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aebbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27481-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebbac</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27481%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27480-cwe-416-use-after-free-in-microsoft-windows-server-2019-aebbaa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27480%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=682cd0f91484d88663aebbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27484-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebbb2</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27484%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27485-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebbb4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27485%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27469-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aebb7e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27469%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27467-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb7c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27467%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26679-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26679%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26678-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-aebb6c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26678%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26676-cwe-126-buffer-over-read-in-microsoft-windows-server-2019-aebb5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26676%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aebb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26675-cwe-125-out-of-bounds-read-in-microsoft-windows-server-2022-aebb5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26675%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aebb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26673-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aebb59</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26673%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26672-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-aebb57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26672%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26674-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb5b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26674%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26671-cwe-416-use-after-free-in-microsoft-windows-server-2019-aebb55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26671%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=682cd0f91484d88663aebb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26670-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26670%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26652-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebb38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26652%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26651-cwe-749-exposed-dangerous-method-or-function-in-microsoft-windows-server-2022-aebb36</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26651%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=682cd0f91484d88663aebb36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26647-cwe-20-improper-input-validation-in-microsoft-windows-server-2019-aebb30</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26647%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=682cd0f91484d88663aebb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26649-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-server-2022-aebb34</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26649%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aebb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26648-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebb32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26648%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26644-cwe-1039-automated-recognition-mechanism-with-inadequate-detection-or-handling-of-adversarial-input-perturbations-in-microsoft-windows-10-version-1809-aebb2e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26644%3A%20CWE-1039%3A%20Automated%20Recognition%20Mechanism%20with%20Inadequate%20Detection%20or%20Handling%20of%20Adversarial%20Input%20Perturbations%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f91484d88663aebb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26641-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aebb1f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26641%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26640-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb1d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26640%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26642-cwe-125-out-of-bounds-read-in-microsoft-office-online-server-aebb21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26642%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26637-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-aebb19</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26637%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26635-cwe-1390-weak-authentication-in-microsoft-windows-10-version-1809-aebb17</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26635%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f91484d88663aebb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26639-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-server-2022-aebb1b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26639%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aebb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26628-cwe-522-insufficiently-protected-credentials-in-microsoft-azure-local-cluster-aebb15</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26628%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20Local%20Cluster&amp;severity=high&amp;id=682cd0f91484d88663aebb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25002-cwe-532-insertion-of-sensitive-information-into-log-file-in-microsoft-azure-local-cluster-aebb13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25002%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Azure%20Local%20Cluster&amp;severity=medium&amp;id=682cd0f91484d88663aebb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24058-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebafa</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24058%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21222-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebaf6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21222%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21221-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebaf4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21221%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21204-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-server-2025-aebaf0</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21204%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21203-cwe-126-buffer-over-read-in-microsoft-windows-server-2019-aebae3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21203%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aebae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21205-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebaf2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21205%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21191-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-server-2025-aebadf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21191%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21197-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-aebae1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21197%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21174-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebadd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21174%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24073-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebb00</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24073%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24074-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebb02</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24074%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29824-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebc66</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29824%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29823-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aebc64</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29823%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29822-cwe-184-incomplete-list-of-disallowed-inputs-in-microsoft-microsoft-office-2019-aebc57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29822%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29820-cwe-416-use-after-free-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aebc53</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29820%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29821-cwe-20-improper-input-validation-in-microsoft-microsoft-dynamics-365-business-central-2024-wave-1-2024-aebc55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29821%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Dynamics%20365%20Business%20Central%202023%20Wave%202&amp;severity=medium&amp;id=682cd0f91484d88663aebc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29794-cwe-285-improper-authorization-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aebc26</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29794%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aebc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29792-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aebc17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29792%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29793-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aebc19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29793%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aebc19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29791-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-microsoft-office-2019-aebc15</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29791%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27750-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aebc0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27750%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27752-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-office-2019-aebc13</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27752%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27751-cwe-416-use-after-free-in-microsoft-office-online-server-aebc11</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27751%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27743-cwe-426-untrusted-search-path-in-microsoft-system-center-virtual-machine-manager-2022-aebbf6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27743%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20System%20Center%20Data%20Protection%20Manager%202019&amp;severity=high&amp;id=682cd0f91484d88663aebbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27749-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aebc0d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27749%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27747-cwe-822-untrusted-pointer-dereference-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aebc09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27747%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27748-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aebc0b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27748%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27746-cwe-416-use-after-free-in-microsoft-office-online-server-aebc07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27746%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27745-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aebbfa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27745%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27742-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aebbf4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27742%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27744-cwe-284-improper-access-control-in-microsoft-microsoft-office-2016-aebbf8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27744%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Office%202016&amp;severity=high&amp;id=682cd0f91484d88663aebbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27741-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aebbf2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27741%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27740-cwe-1390-weak-authentication-in-microsoft-windows-server-2019-aebbf0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27740%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=682cd0f91484d88663aebbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27479-cwe-410-insufficient-resource-pool-in-microsoft-windows-server-2019-aebb9d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27479%3A%20CWE-410%3A%20Insufficient%20Resource%20Pool%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=682cd0f91484d88663aebb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27478-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb9b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27478%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27477-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb99</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27477%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27475-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-11-version-22h2-aebb95</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27475%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aebb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27476-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb97</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27476%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27474-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-server-2019-aebb93</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27474%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aebb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27472-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1507-aebb8f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27472%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27473-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aebb91</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27473%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27470-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebb8b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27470%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27471-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebb8d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27471%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebb8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26688-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb7a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26688%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26687-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb78</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26687%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=682cd0f91484d88663aebb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26686-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebb76</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26686%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26680-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebb70</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26680%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebb70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26681-cwe-416-use-after-free-in-microsoft-windows-server-2022-aebb72</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26681%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=682cd0f91484d88663aebb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26668-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb4f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26668%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26667-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-server-2019-aebb4d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26667%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aebb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26669-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aebb51</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26669%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26666-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb40</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26666%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26665-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebb3e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26665%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26664-cwe-126-buffer-over-read-in-microsoft-windows-server-2019-aebb3c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26664%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aebb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26663-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb3a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26663%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32279-missing-authorization-in-shahjada-l-06cd180d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32279%3A%20Missing%20Authorization%20in%20Shahjada%20Live%20Forms&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32211-improper-neutralization-of-input-du-b5916d75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32211%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Broadstreet%20Broadstreet%20Ads&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def343e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32164-exposure-of-sensitive-system-inform-619fd008</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32164%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20maennchen1.de%20m1.DownloadList&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32117-improper-neutralization-of-input-du-9948aa0b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32117%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Widgetize%20Pages%20Light&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48887-escalation-of-privilege-in-fortinet-8ec37622</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48887%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSwitch&amp;severity=critical&amp;id=69a0a1b985912abc71d0a0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27082-vulnerability-in-hewlett-packard-en-5f7027ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27082%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS&amp;severity=high&amp;id=69a0a1c185912abc71d0ac7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27079-vulnerability-in-hewlett-packard-en-624c69ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27079%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-10%20AP&amp;severity=medium&amp;id=69a0a1c185912abc71d0ac78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27078-vulnerability-in-hewlett-packard-en-97264b91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27078%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-10%20AP&amp;severity=medium&amp;id=69a0a1c185912abc71d0ac75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1095-cwe-119-improper-restriction-of-oper-17cb7d3d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1095%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20IBM%20Personal%20Communications&amp;severity=high&amp;id=68b4f7b8ad5a09ad00c726f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22461-cwe-89-improper-neutralization-of-s-0386ef99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22461%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a1bf85912abc71d0ac2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22458-cwe-427-uncontrolled-search-path-element-in-ivanti-endpoint-manager-aeb8a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22458%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=682cd0f81484d88663aeb8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26013-improper-access-control-in-fortinet-fdcd1e7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26013%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=high&amp;id=69a0a1b885912abc71d0a0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32122-information-disclosure-in-fortinet--dd96f6f6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32122%3A%20Information%20disclosure%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=691ca899209f2030fa01698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54024-escalation-of-privilege-in-fortinet-ac85ea7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54024%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiIsolator&amp;severity=high&amp;id=69a0a1b985912abc71d0a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54025-escalation-of-privilege-in-fortinet-c0da5a11</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54025%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiIsolator&amp;severity=medium&amp;id=69a0a1b985912abc71d0a0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25254-execute-unauthorized-code-or-comman-1f2718fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25254%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69a0a1bf85912abc71d0ac43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2876-cwe-862-missing-authorization-in-mel-557c6b5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2876%3A%20CWE-862%20Missing%20Authorization%20in%20melapress%20MelaPress%20Login%20Security%20Premium&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2568-cwe-862-missing-authorization-in-the-b5bc7544</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2568%3A%20CWE-862%20Missing%20Authorization%20in%20themehunk%20Vayu%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2883-cwe-200-exposure-of-sensitive-inform-489f6272</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2883%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20zealopensource%20Accept%20SagePay%20Payments%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3437-cwe-862-missing-authorization-in-sty-57f67e00</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3437%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2808-cwe-79-improper-neutralization-of-in-c111a714</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54ea3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2807-cwe-862-missing-authorization-in-sty-18cee495</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2807%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=high&amp;id=699f6b25b7ef31ef0b54ea39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30280-cwe-204-observable-response-discrep-f1bc2996</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30280%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Siemens%20Mendix%20Runtime%20V10&amp;severity=medium&amp;id=68487f551b0bd07c3938a258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3064-cwe-352-cross-site-request-forgery-c-e4c479a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3064%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20syammohanm%20WPFront%20User%20Role%20Editor&amp;severity=high&amp;id=699f6b27b7ef31ef0b54ebca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3436-cwe-89-improper-neutralization-of-sp-d33f6228</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3436%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gdragon%20coreActivity%3A%20Activity%20Logging%20for%20WordPress&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3433-cwe-601-url-redirection-to-untrusted-697276ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3433%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20smartdevth%20Advanced%20Advertising%20System&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3432-cwe-79-improper-neutralization-of-in-7140f103</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elpix%20AAWP%20Obfuscator&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eeb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22017-vulnerability-in-linux-linux-be7e76</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22016-vulnerability-in-linux-linux-be7e72</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22015-vulnerability-in-linux-linux-be7e6e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22014-vulnerability-in-linux-linux-be7e5d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22013-vulnerability-in-linux-linux-be8f1c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22012-vulnerability-in-linux-linux-be8f0f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22011-vulnerability-in-linux-linux-be8f02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22010-vulnerability-in-linux-linux-be8eeb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22009-vulnerability-in-linux-linux-be8ee7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22008-vulnerability-in-linux-linux-be8ee3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2882-cwe-200-exposure-of-sensitive-inform-9d467943</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2882%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20greenmoney%20GreenPay(tm)%20by%20Green.Money&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3431-cwe-73-external-control-of-file-name-1dd8ebb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3431%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20ZoomIt%20ZoomSounds%20-%20WordPress%20Wave%20Audio%20Player%20with%20Playlist&amp;severity=high&amp;id=699f6b2bb7ef31ef0b54eeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31330-cwe-94-improper-control-of-generati-252470df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31330%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SAP_SE%20SAP%20Landscape%20Transformation%20(Analysis%20Platform)&amp;severity=critical&amp;id=69a0a1c685912abc71d0ba58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30016-cwe-921-storage-of-sensitive-data-i-b87cfaed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30016%3A%20CWE-921%3A%20Storage%20of%20Sensitive%20Data%20in%20a%20Mechanism%20without%20Access%20Control%20in%20SAP_SE%20SAP%20Financial%20Consolidation&amp;severity=critical&amp;id=69a0a1c385912abc71d0b6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30013-cwe-94-improper-control-of-generati-fccabf84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30013%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20ERP%20BW%20Business%20Content&amp;severity=medium&amp;id=69a0a1c385912abc71d0b6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27429-cwe-94-improper-control-of-generati-da6b29a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27429%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud)&amp;severity=critical&amp;id=69a0a1c385912abc71d0b6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26654-cwe-319-cleartext-transmission-of-s-c4dc5876</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26654%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20SAP_SE%20SAP%20Commerce%20Cloud%20(Public%20Cloud)&amp;severity=medium&amp;id=69a0a1bf85912abc71d0ac49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23186-cwe-94-improper-control-of-generati-0c23bc35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23186%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=high&amp;id=69a0a1bf85912abc71d0ac32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3428-cwe-89-improper-neutralization-of-sp-cb9584c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3428%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fuzzoid%203DPrint%20Lite&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3430-cwe-89-improper-neutralization-of-sp-a0a7f9a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3430%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fuzzoid%203DPrint%20Lite&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eeb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3429-cwe-89-improper-neutralization-of-sp-634f63e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3429%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fuzzoid%203DPrint%20Lite&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3427-cwe-89-improper-neutralization-of-sp-8c36dfa0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3427%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fuzzoid%203DPrint%20Lite&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20946-cwe-269-improper-privilege-manageme-9dd56e37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20946%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69a0a1bb85912abc71d0a14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20936-cwe-285-improper-authorization-in-s-8ac21f7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20936%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69a0a1bb85912abc71d0a14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2004-cwe-73-external-control-of-file-name-2239d279</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2004%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpminds%20Simple%20WP%20Events&amp;severity=critical&amp;id=699f6b1db7ef31ef0b54e3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13820-cwe-200-exposure-of-sensitive-infor-bdca3d5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13820%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20melhorenvio%20Melhor%20Envio&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2519-cwe-22-improper-limitation-of-a-path-8b094e6e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2519%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iqonicdesign%20Streamit&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2525-cwe-434-unrestricted-upload-of-file--8ea73fa3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2525%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20Streamit&amp;severity=high&amp;id=699f6b23b7ef31ef0b54e8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2526-cwe-639-authorization-bypass-through-2fa32afe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2526%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20iqonicdesign%20Streamit&amp;severity=high&amp;id=699f6b23b7ef31ef0b54e8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32414-cwe-393-return-of-wrong-status-code-e67ce8c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32414%3A%20CWE-393%20Return%20of%20Wrong%20Status%20Code%20in%20xmlsoft%20libxml2&amp;severity=medium&amp;id=690909fb7fff0e30cee434bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-08-2b00e2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-08&amp;severity=medium&amp;id=682c7db4e8347ec82d2b00e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-08-f123be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f123be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0942-cwe-89-improper-neutralization-of-sp-bb8e78c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0942%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jalios%20JPlatform&amp;severity=high&amp;id=690a7f07327a9365e24ec81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29769-cwe-122-heap-based-buffer-overflow-in-libvips-libvips-bed630</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29769%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips%20libvips&amp;severity=high&amp;id=682d983ac4522896dcbed630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3377-buffer-overflow-in-pcman-ftp-server-bd6c4c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3377%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9816c4522896dcbd6c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31476-cwe-79-improper-neutralization-of-i-742ed962</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31476%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AmauriC%20tarteaucitron.js&amp;severity=medium&amp;id=684b454f358c65714e6b022b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3248-cwe-306-missing-authentication-for-critical-function-in-langflow-ai-langflow-bdad02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3248%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=682d981cc4522896dcbdad02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2251-deserialization-of-untrusted-data-in-red-hat-red-hat-jboss-enterprise-application-platform-7-bf15d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2251%3A%20Deserialization%20of%20Untrusted%20Data&amp;severity=medium&amp;id=682d9840c4522896dcbf15d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3360-integer-overflow-or-wraparound-in-re-5bdc6ff3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3360%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=low&amp;id=686904636f40f0eb72a92976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3359-improper-check-for-unusual-or-exceptional-conditions-272495</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3359%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions&amp;severity=medium&amp;id=68306f8e0acd01a249272495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21447-cwe-129-improper-validation-of-arra-18c4d54f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21447%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21443-cwe-120-buffer-copy-without-checkin-d5928475</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21443%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21442-cwe-680-integer-overflow-to-buffer--1ba0ac14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21442%3A%20CWE-680%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21441-cwe-787-out-of-bounds-write-in-qual-8f87e1ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21441%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21440-cwe-787-out-of-bounds-write-in-qual-a08a5bcb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21440%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21439-cwe-787-out-of-bounds-write-in-qual-07823965</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21439%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21438-cwe-125-out-of-bounds-read-in-qualc-520d80bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21438%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21437-cwe-416-use-after-free-in-qualcomm--7ae9715b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21437%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21436-cwe-416-use-after-free-in-qualcomm--1173ac7c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21436%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21429-cwe-126-buffer-over-read-in-qualcom-1b0343d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21429%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21428-cwe-126-buffer-over-read-in-qualcom-051364e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21428%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bb85912abc71d0a159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21425-cwe-284-improper-access-control-in--0d88b54b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21425%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bb85912abc71d0a156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21423-cwe-129-improper-validation-of-arra-012944f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21423%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bb85912abc71d0a153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21421-cwe-126-buffer-over-read-in-qualcom-6bef18ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21421%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bb85912abc71d0a150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49848-cwe-416-use-after-free-in-qualcomm--e277662f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49848%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69a0a1b985912abc71d0a0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45557-cwe-823-use-of-out-of-range-pointer-ae0009e4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45557%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1b885912abc71d0a0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43067-cwe-367-time-of-check-time-of-use-t-0a442af6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43067%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1b885912abc71d0a0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30473-cwe-89-improper-neutralization-of-s-6eb79eca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30473%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Common%20SQL%20Provider&amp;severity=high&amp;id=69a0a1c585912abc71d0b70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31174-cwe-22-improper-limitation-of-a-pat-7164520d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31174%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68cc9f1bca83b36a9f700a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31171-cwe-200-exposure-of-sensitive-infor-dd99d603</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31171%3A%20CWE-862%20Missing%20Authorization%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6842df031a426642debc949d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20662-cwe-125-out-of-bounds-read-in-media-9e1e7dee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20662%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT9972&amp;severity=medium&amp;id=69a0a1bb85912abc71d0a147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20661-cwe-125-out-of-bounds-read-in-media-a24240ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20661%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT9972&amp;severity=medium&amp;id=69a0a1bb85912abc71d0a144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20660-cwe-125-out-of-bounds-read-in-media-98d1bb20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20660%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT9972&amp;severity=medium&amp;id=69a0a1bb85912abc71d0a141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20659-cwe-125-out-of-bounds-read-in-media-32c2cf62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20659%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6785U%2C%20MT6789%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791T%2C%20MT8796%2C%20MT8797%2C%20MT8798%2C%20MT8863&amp;severity=medium&amp;id=6994829080d747be20bad13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20657-cwe-787-out-of-bounds-write-in-medi-0c7fbd66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20657%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6877%2C%20MT6885%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8791T&amp;severity=medium&amp;id=69a0a1bb85912abc71d0a13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20654-cwe-787-out-of-bounds-write-in-medi-e6338fdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20654%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=critical&amp;id=69a0a1b985912abc71d0a0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29481-na-b8d515f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29481%3A%20n%2Fa&amp;severity=medium&amp;id=699eab2eb7ef31ef0be8930a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29480-na-032c807f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29480%3A%20n%2Fa&amp;severity=medium&amp;id=6880f613ad5a09ad00266d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-07-2af512</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-07&amp;severity=medium&amp;id=682c7db4e8347ec82d2af512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-07-f12726</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-trademark-related-invoice-f0c544</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20trademark-related%20invoice&amp;severity=low&amp;id=682acdbebbaf20d303f0c544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3323-sql-injection-in-godcheese-nimrod-43f5c52e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3323%3A%20SQL%20Injection%20in%20godcheese%20Nimrod&amp;severity=medium&amp;id=687936e6a83201eaace7c2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1264-cwe-89-improper-neutralization-of-sp-e19a56f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1264%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aioseo%20Broken%20Link%20Checker%20by%20AIOSEO%20%E2%80%93%20Easily%20Fix%2FMonitor%20Internal%20and%20External%20links&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-06-2af207</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-06&amp;severity=medium&amp;id=682c7db4e8347ec82d2af207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-06-f122c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f122c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2941-cwe-22-improper-limitation-of-a-path-b3e9f8b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2941%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20WooCommerce&amp;severity=critical&amp;id=699f6b27b7ef31ef0b54ebab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2789-cwe-862-missing-authorization-in-wcm-df557683</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2789%3A%20CWE-862%20Missing%20Authorization%20in%20wcmp%20MultiVendorX%20%E2%80%93%20WooCommerce%20Multivendor%20Marketplace%20Solutions&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54ea26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1233-cwe-862-missing-authorization-in-alt-e727ebdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1233%3A%20CWE-862%20Missing%20Authorization%20in%20AlThemist%20Lafka%20Plugin&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0839-cwe-79-improper-neutralization-of-in-6d6ae2ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0839%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZoomIt%20ZoomSounds%20-%20WordPress%20Wave%20Audio%20Player%20with%20Playlist&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b55542d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13776-cwe-862-missing-authorization-in-zo-e0138653</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13776%3A%20CWE-862%20Missing%20Authorization%20in%20ZoomIt%20ZoomSounds%20-%20WordPress%20Wave%20Audio%20Player%20with%20Playlist&amp;severity=high&amp;id=699f6e6db7ef31ef0b5a0734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2933-cwe-862-missing-authorization-in-awe-3c509c1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2933%3A%20CWE-862%20Missing%20Authorization%20in%20aweos%20Email%20Notifications%20for%20Updates&amp;severity=high&amp;id=699f6b27b7ef31ef0b54eba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2544-cwe-79-improper-neutralization-of-in-47a93a37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2544%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adamwillhoeft%20AI%20Content%20Pipelines%3A%20Content%20Engine%20%2B%20Analytics&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13604-cwe-200-exposure-of-sensitive-infor-df5b36c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13604%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20logoninc%20KB%20Support%20%E2%80%93%20Customer%20Support%20Ticket%20%26%20Helpdesk%20Plugin%2C%20Knowledge%20Base%20Plugin&amp;severity=high&amp;id=699f6e63b7ef31ef0b59f5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0810-cwe-352-cross-site-request-forgery-c-cb90f77d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0810%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edmonparker%20Read%20More%20%26%20Accordion&amp;severity=high&amp;id=699f6b6bb7ef31ef0b555412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1500-cwe-434-unrestricted-upload-of-file--755db737</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1500%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20Maximo%20Application%20Suite&amp;severity=medium&amp;id=689a2234ad5a09ad00274f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32365-cwe-125-out-of-bounds-read-in-freed-daeb72b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32365%3A%20CWE-125%20Out-of-bounds%20Read%20in%20freedesktop%20Poppler&amp;severity=medium&amp;id=690909fb7fff0e30cee434ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32364-cwe-190-integer-overflow-or-wraparo-5d6d3e9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32364%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20freedesktop%20Poppler&amp;severity=medium&amp;id=690909fb7fff0e30cee434b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-05-2b070a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-05&amp;severity=medium&amp;id=682c7db5e8347ec82d2b070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-05-f12b9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2889-cwe-79-improper-neutralization-of-in-214661c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Link%20Library&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11235-cwe-416-use-after-free-in-php-group-1d275969</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11235%3A%20CWE-416%20Use%20After%20Free%20in%20PHP%20Group%20PHP&amp;severity=critical&amp;id=69a0a1b885912abc71d0a0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32178-missing-authorization-in-6storage-6-590e121c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32178%3A%20Missing%20Authorization%20in%206Storage%206Storage%20Rentals&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32239-missing-authorization-in-joao-romao-5a6aa644</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32239%3A%20Missing%20Authorization%20in%20Joao%20Romao%20Social%20Share%20Buttons%20%26%20Analytics%20Plugin%20%E2%80%93%20GetSocial.io&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def357f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32224-missing-authorization-in-shivam-man-a2765d75</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32224%3A%20Missing%20Authorization%20in%20Shivam%20Mani%20Tripathi%20Privyr%20CRM%20Integration&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def351a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32280-cross-site-request-forgery-csrf-in--19362668</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32280%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20weDevs%20WP%20Project%20Manager&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32278-cross-site-request-forgery-csrf-in--d5731849</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32278%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wprio%20Table%20Block%20by%20RioVizual&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32277-missing-authorization-in-ateeq-rafe-7b13e83f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32277%3A%20Missing%20Authorization%20in%20Ateeq%20Rafeeq%20RepairBuddy&amp;severity=null&amp;id=69cd73bfe6bfc5ba1def37cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32276-cross-site-request-forgery-csrf-in--a79ef3d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32276%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Qu%C3%BD%20L%C3%AA%2091%20Administrator%20Z&amp;severity=null&amp;id=69cd73bfe6bfc5ba1def37ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32274-cross-site-request-forgery-csrf-in--4f333153</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32274%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20axew3%20WP%20w3all%20phpBB&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32273-cross-site-request-forgery-csrf-in--1f57ec36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32273%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20freetobook%20Freetobook%20Responsive%20Widget&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32272-cross-site-request-forgery-csrf-in--e31300b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32272%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PickPlugins%20Wishlist&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32271-cross-site-request-forgery-csrf-in--19c4d5b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32271%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ablancodev%20Woocommerce%20Role%20Pricing&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32270-cross-site-request-forgery-csrf-in--6f8aec31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32270%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Broadstreet%20Broadstreet%20Ads&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32269-cross-site-request-forgery-csrf-in--b836f4c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32269%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CRM%20Perks%20WP%20Zendesk%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32268-cross-site-request-forgery-csrf-in--992c18e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32268%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20www.15.to%20QR%20Code%20Tag%20for%20WC&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32267-cross-site-request-forgery-csrf-in--39abec0f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32267%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpzinc%20Post%20to%20Social%20Media%20%E2%80%93%20WordPress%20to%20Hootsuite&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32266-cross-site-request-forgery-csrf-in--173735d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32266%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp-buy%20404%20Image%20Redirection%20(Replace%20Broken%20Images)&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32265-cross-site-request-forgery-csrf-in--e9d0b693</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32265%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hossni%20Mubarak%20JobWP&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32264-cross-site-request-forgery-csrf-in--97f74f58</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32264%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saiful%20Islam%20UltraAddons%20Elementor%20Lite&amp;severity=null&amp;id=69cd73bce6bfc5ba1def367a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32263-cross-site-request-forgery-csrf-in--578cc9d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32263%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BeRocket%20Sequential%20Order%20Numbers%20for%20WooCommerce&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32262-cross-site-request-forgery-csrf-in--ba5445d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32262%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Robert%20D%20Payne%20RDP%20Wiki%20Embed&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32261-cross-site-request-forgery-csrf-in--d32a08bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32261%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kuppuraj%20Advanced%20All%20in%20One%20Admin%20Search%20by%20WP%20Spotlight&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32258-missing-authorization-in-infogiants-27f96800</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32258%3A%20Missing%20Authorization%20in%20InfoGiants%20Simple%20Website%20Logo&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32257-exposure-of-sensitive-system-inform-5b9c8fad</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32257%3A%20Exposure%20of%20Sensitive%20System%20Information%20Due%20to%20Uncleared%20Debug%20Information%20in%201clickmigration%201%20Click%20WordPress%20Migration&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32256-missing-authorization-in-devsoftbal-66278343</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32256%3A%20Missing%20Authorization%20in%20devsoftbaltic%20SurveyJS&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32255-exposure-of-sensitive-system-inform-8ec78427</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32255%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ERA404%20StaffList&amp;severity=null&amp;id=69cd73bce6bfc5ba1def365f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32254-missing-authorization-in-iqonic-des-fac61385</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32254%3A%20Missing%20Authorization%20in%20Iqonic%20Design%20WPBookit&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32253-missing-authorization-in-commotion--7971ef3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32253%3A%20Missing%20Authorization%20in%20ComMotion%20Course%20Booking%20System&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32252-missing-authorization-in-black-and--8e17540b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32252%3A%20Missing%20Authorization%20in%20Black%20and%20White%20WP%20Genealogy%20%E2%80%93%20Your%20Family%20History%20Website&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32251-exposure-of-sensitive-system-inform-5151fbb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32251%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20J.%20Tyler%20Wiest%20Jetpack%20Feedback%20Exporter&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32249-cross-site-request-forgery-csrf-in--06ff4fc4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32249%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Designinvento%20DirectoryPress&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32248-cross-site-request-forgery-csrf-in--0fd8a288</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32248%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SwiftXR%20SwiftXR%20(3D%2FAR%2FVR)%20Viewer&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32247-cross-site-request-forgery-csrf-in--357854e1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32247%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ABCdatos%20AI%20Content%20Creator&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32246-missing-authorization-in-tim-nguyen-a5652c09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32246%3A%20Missing%20Authorization%20in%20Tim%20Nguyen%201-Click%20Backup%20%26amp%3B%20Restore%20Database&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32241-cross-site-request-forgery-csrf-in--fc2d8eef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32241%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CleverReach%C2%AE%20Official%20CleverReach%20Plugin%20for%20WooCommerce&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32238-generation-of-error-message-contain-502f3bb7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32238%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def357c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32237-missing-authorization-in-stylemix-m-a508cfce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32237%3A%20Missing%20Authorization%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32235-missing-authorization-in-sonaar-mp3-09a4e5f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32235%3A%20Missing%20Authorization%20in%20sonaar%20MP3%20Audio%20Player%20for%20Music%2C%20Radio%20%26%20Podcast%20by%20Sonaar&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32234-missing-authorization-in-aleswebs-a-7de8657e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32234%3A%20Missing%20Authorization%20in%20aleswebs%20AdMail%20%E2%80%93%20Multilingual%20Back%20in-Stock%20Notifier%20for%20WooCommerce&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32233-missing-authorization-in-wp-chill-r-36e780ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32233%3A%20Missing%20Authorization%20in%20WP%20Chill%20Revive.so&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def356d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32232-missing-authorization-in-era404-sta-239ff881</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32232%3A%20Missing%20Authorization%20in%20ERA404%20StaffList&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def356a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32229-missing-authorization-in-bowo-varia-a9aeb94c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32229%3A%20Missing%20Authorization%20in%20Bowo%20Variable%20Inspector&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32226-missing-authorization-in-anzar-ahme-d8841da7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32226%3A%20Missing%20Authorization%20in%20Anzar%20Ahmed%20Display%20product%20variations%20dropdown%20on%20shop%20page&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def351d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32220-missing-authorization-in-dimitri-gr-4bba03e9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32220%3A%20Missing%20Authorization%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32219-missing-authorization-in-syntactics-1fb59d43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32219%3A%20Missing%20Authorization%20in%20Syntactics%2C%20Inc.%20eaSYNC&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32218-missing-authorization-in-realmag777-c161c17e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32218%3A%20Missing%20Authorization%20in%20RealMag777%20TableOn&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def350e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32217-missing-authorization-in-wp-messiah-ce40f2b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32217%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def344d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32207-improper-neutralization-of-input-du-e331e813</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32207%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Cost%20Of%20Goods&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32204-improper-neutralization-of-special--a42e2946</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32204%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rocketelements%20Split%20Test%20For%20Elementor&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32203-improper-neutralization-of-special--91d0ad75</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32203%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20manu225%20Falling%20things&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32201-missing-authorization-in-xpro-xpro--df97af22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32201%3A%20Missing%20Authorization%20in%20Xpro%20Xpro%20Theme%20Builder&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32197-improper-neutralization-of-input-du-8a5581f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32197%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32196-improper-neutralization-of-input-du-5d46d20b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32196%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blazethemes%20News%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32195-improper-neutralization-of-input-du-8cdc7ed0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32195%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart%20Ecwid%20Shopping%20Cart&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32194-improper-neutralization-of-input-du-9b7a0ddd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32194%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LA-Studio%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32193-improper-neutralization-of-input-du-09359a01</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32193%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPMinds%20Simple%20WP%20Events&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32192-improper-neutralization-of-input-du-f66c4c3a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32192%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UltraPress%20Ultra%20Addons%20Lite%20for%20Elementor&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32191-improper-neutralization-of-input-du-56bcbd6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32191%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20News%20Element%20Elementor%20Blog%20Magazine&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32190-improper-neutralization-of-input-du-72419077</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32190%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartwpress%20Musician&apos;s%20Pack%20For%20Elementor&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32189-improper-neutralization-of-input-du-0c4eed7a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32189%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Best%20WP%20Developer%20BWD%20Elementor%20Addons&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32188-improper-neutralization-of-input-du-257ac5a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32188%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ILLID%20Advanced%20Woo%20Labels&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32187-improper-neutralization-of-input-du-7ecb0552</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32187%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Qu%C3%BD%20L%C3%AA%2091%20Administrator%20Z&amp;severity=null&amp;id=69cd73afe6bfc5ba1def339f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32186-improper-neutralization-of-input-du-45a422c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32186%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Turbo%20Addons%20Turbo%20Addons%20Elementor&amp;severity=null&amp;id=69cd73afe6bfc5ba1def339c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32185-improper-neutralization-of-input-du-0af0a234</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32185%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Extend%20Themes%20Colibri%20Page%20Builder&amp;severity=null&amp;id=69cd73afe6bfc5ba1def3399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32184-improper-neutralization-of-input-du-144e0dd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32184%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32183-improper-neutralization-of-input-du-3b733c25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32183%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Galaxy%20Weblinks%20Video%20Playlist%20For%20YouTube&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32182-improper-neutralization-of-input-du-1ef2e4ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32182%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spider%20Themes%20Spider%20Elements&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32181-improper-neutralization-of-input-du-5c11e463</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32181%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fast%20Simon%20Search%2C%20Filters%20%26%20Merchandising%20for%20WooCommerce&amp;severity=null&amp;id=69cd73ade6bfc5ba1def334f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32179-improper-neutralization-of-input-du-e70184ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32179%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20Maps%20for%20WP&amp;severity=null&amp;id=69cd73ade6bfc5ba1def334c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32177-improper-neutralization-of-input-du-ffba9934</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32177%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pgn4web%20Embed%20Chessboard&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32176-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gallerycreator-gallery-blocks-with-lightbox-bf7762</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32176%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GalleryCreator%20SimpLy%20Gallery&amp;severity=null&amp;id=682d984ac4522896dcbf7762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32175-improper-neutralization-of-input-du-ae354623</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32175%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vektor%2CInc.%20VK%20Filter%20Search&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32174-improper-neutralization-of-input-du-e3e79fcb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32174%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tockify%20Tockify%20Events%20Calendar&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32173-improper-neutralization-of-input-du-4c7c07aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32173%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20B%20Blocks&amp;severity=null&amp;id=69cd73ade6bfc5ba1def333d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32172-improper-neutralization-of-input-du-e159808b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32172%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yuri%20Baranov%20YaMaps%20for%20WordPress&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32171-improper-neutralization-of-input-du-74da4111</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32171%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imtiaz%20Rayhan%20Table%20Block%20by%20Tableberg&amp;severity=null&amp;id=69cd73abe6bfc5ba1def332d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32170-improper-neutralization-of-input-du-fb9d0ffc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32170%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stylemix%20Motors&amp;severity=null&amp;id=69cd73abe6bfc5ba1def332a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32169-improper-neutralization-of-input-du-926e4117</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32169%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Suresh%20Prasad%20Showeblogin%20Social&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32168-improper-neutralization-of-input-du-a9ca0060</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32168%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeYatri%20Gutenify&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32167-improper-neutralization-of-input-du-4153185c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32167%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devsoftbaltic%20SurveyJS&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32166-improper-neutralization-of-input-du-08682f98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32166%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20John%20Housholder%20Emma%20for%20WordPress&amp;severity=null&amp;id=69cd73abe6bfc5ba1def331e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32165-improper-neutralization-of-input-du-dee4e540</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32165%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fromdoppler%20Doppler%20Forms&amp;severity=null&amp;id=69cd73abe6bfc5ba1def331b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32163-improper-neutralization-of-input-du-9168a1b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32163%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32161-improper-neutralization-of-input-du-2cac0749</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32161%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryo%20Arkhe%20Blocks&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def32ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32159-improper-control-of-filename-for-in-780fe993</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32159%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Radius%20Blocks&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def32a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32157-improper-control-of-filename-for-in-e352f44c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32157%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Jakub%20Glos%20Sparkle%20Elementor%20Kit&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def32a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32156-improper-control-of-filename-for-in-382a8600</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32156%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Alex%20Prokopenko%20%2F%20JustCoded%20Just%20Post%20Preview%20Widget&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def329d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32155-improper-control-of-filename-for-in-9947d01d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32155%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20markkinchin%20Beds24%20Online%20Booking&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def329a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32154-improper-control-of-filename-for-in-4107dbc4</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32154%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Catch%20Themes%20Catch%20Dark%20Mode&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def3297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32153-improper-control-of-filename-for-in-256a34ec</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32153%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20vinagecko%20VG%20WooCarousel&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def3294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32152-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-essential-plugins-by-wp-onlinesupport-slider-a-sliderspack-bd672c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32152%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Essential%20Plugin%20Slider%20a%20SlidersPack&amp;severity=null&amp;id=682d9816c4522896dcbd672c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32151-improper-control-of-filename-for-in-15100116</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32151%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Themekraft%20BuddyForms&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def3291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32150-improper-control-of-filename-for-in-882b8aba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32150%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def325e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32149-improper-neutralization-of-special--91b535f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32149%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20winkm89%20teachPress&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def325b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32148-improper-neutralization-of-special--25d747ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32148%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Daisycon%20Daisycon%20prijsvergelijkers&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32147-missing-authorization-in-coothemes--de4f594f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32147%3A%20Missing%20Authorization%20in%20coothemes%20Easy%20WP%20Optimizer&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32146-improper-control-of-filename-for-in-1400bf2f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32146%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32142-improper-control-of-filename-for-in-56ad54ca</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32142%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Stylemix%20Motors&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32141-improper-control-of-filename-for-in-1794f27f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32141%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32138-improper-restriction-of-xml-externa-c7836597</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32138%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20supsystic%20Easy%20Google%20Maps&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32137-relative-path-traversal-in-cristin--aba394d1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32137%3A%20Relative%20Path%20Traversal%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32135-improper-neutralization-of-input-du-c44f0d80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rocketelements%20Split%20Test%20For%20Elementor&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32134-improper-neutralization-of-input-du-d56ea341</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32134%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KaizenCoders%20URL%20Shortify&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32133-improper-neutralization-of-input-du-8a49916b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32133%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32131-improper-neutralization-of-input-du-c991420e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32131%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20socialintents%20Social%20Intents&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32130-improper-neutralization-of-input-du-1fbba044</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32130%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Data443%20Risk%20Mitigation%2C%20Inc.%20Posts%20Footer%20Manager&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32129-improper-neutralization-of-input-du-96ebc09b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32129%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Data443%20Risk%20Mitigation%2C%20Inc.%20Welcome%20Bar&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32127-improper-neutralization-of-special--3d12530d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32127%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onOffice%20GmbH%20onOffice%20for%20WP-Websites&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32126-improper-neutralization-of-special--27892640</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32126%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cmsMinds%20Pay%20with%20Contact%20Form%207&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32125-improper-neutralization-of-special--7ecd3cbd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32125%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20silvasoft%20Silvasoft%20boekhouden&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32124-improper-neutralization-of-special--6941ff6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32124%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32122-improper-neutralization-of-special--2e8c20bd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32122%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20uListing&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32121-improper-neutralization-of-special--7ce10150</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32121%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SuitePlugins%20Video%20%26%20Photo%20Gallery%20for%20Ultimate%20Member&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32120-improper-neutralization-of-special--713adc04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32120%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20edanzer%20Easy%20Query%20%E2%80%93%20WP%20Query%20Builder&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32118-unrestricted-upload-of-file-with-da-f262a36d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32118%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20NiteoThemes%20CMP%20%E2%80%93%20Coming%20Soon%20%26%20Maintenance&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32113-cross-site-request-forgery-csrf-in--fb3f3f83</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32113%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Renzo%20Tejada%20Libro%20de%20Reclamaciones%20y%20Quejas&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32112-cross-site-request-forgery-csrf-in--7a73903a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32112%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OTWthemes%20Sidebar%20Manager%20Light&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31130-cwe-328-use-of-weak-hash-in-gitoxid-383b1d89</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31130%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20GitoxideLabs%20gitoxide&amp;severity=medium&amp;id=6973adf94623b1157c52be9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22285-missing-authorization-in-enituretec-80e68509</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22285%3A%20Missing%20Authorization%20in%20enituretechnology%20Pallet%20Packaging%20for%20WooCommerce&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22281-improper-neutralization-of-input-du-435ace55</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22281%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joshix%20Simplish&amp;severity=null&amp;id=69cd75d5e6bfc5ba1df07fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31381-missing-authorization-in-shiptrack--772f160f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31381%3A%20Missing%20Authorization%20in%20shiptrack%20Booking%20Calendar%20and%20Notification&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2798-cwe-269-improper-privilege-managemen-f75c0f94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2798%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20XTENDIFY%20Woffice%20CRM&amp;severity=critical&amp;id=68487f5b1b0bd07c3938bd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31389-improper-neutralization-of-input-du-2f4e9606</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Introvoke%20Inc.%20dba%20Sequel.io%20Sequel&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31403-improper-neutralization-of-special--c93d9cc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31403%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shiptrack%20Booking%20Calendar%20and%20Notification&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31405-improper-control-of-filename-for-in-e6281cf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31405%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zankover%20Fami%20WooCommerce%20Compare&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31416-improper-neutralization-of-input-du-80eedd72</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31416%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AwesomeTOGI%20Awesome%20Event%20Booking&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31420-incorrect-privilege-assignment-in-t-0f5df71c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31420%3A%20Incorrect%20Privilege%20Assignment%20in%20Tomdever%20wpForo%20Forum&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31421-insertion-of-sensitive-information--f9c0971e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31421%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Oblak%20Studio%20Srbtranslatin&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3243-sql-injection-in-code-projects-patient-record-management-system-becfe3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3243%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecfe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3242-sql-injection-in-phpgurukul-e-diary-management-system-aec6e0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3242%3A%20SQL%20Injection%20in%20PHPGurukul%20e-Diary%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22282-improper-neutralization-of-input-du-91c1c050</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22282%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keksdieb%20ez%20Form%20Calculator%20Premium&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1865-cwe-284-in-elaborate-bytes-ag-virtua-edb9f1e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1865%3A%20CWE-284%20in%20Elaborate%20Bytes%20AG%20Virtual%20CloneDrive&amp;severity=high&amp;id=686c340d6f40f0eb72ecc5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3235-sql-injection-in-phpgurukul-old-age-home-management-system-befa7a</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3235%3A%20SQL%20Injection%20in%20PHPGurukul%20Old%20Age%20Home%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbefa7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3231-sql-injection-in-phpgurukul-zoo-mana-fa55a08f</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3231%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccc9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3105-cwe-269-improper-privilege-managemen-e6dd21aa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3105%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20TangibleWP%20Vehica%20Core&amp;severity=high&amp;id=699f6b29b7ef31ef0b54ecaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2780-cwe-434-unrestricted-upload-of-file--4b8997a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2780%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WofficeIO%20Woffice%20Core&amp;severity=high&amp;id=68487f5a1b0bd07c3938b49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2797-cwe-352-cross-site-request-forgery-c-e484dffe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2797%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WofficeIO%20Woffice%20Core&amp;severity=medium&amp;id=68487f5b1b0bd07c3938bc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3087-cwe-79-improper-neutralization-of-in-5ea86fdf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20M-Files%20Corporation%20M-Files%20Web&amp;severity=medium&amp;id=699c3036be58cf853b75f149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3086-cwe-653-in-m-files-corporation-m-fil-91afd790</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3086%3A%20CWE-653%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=699c3036be58cf853b75f145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2159-cwe-79-improper-neutralization-of-in-7a1682f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2159%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20M-Files%20Corporation%20M-Files%20Admin&amp;severity=medium&amp;id=699c3036be58cf853b75f141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3211-sql-injection-in-code-projects-patient-record-management-system-becfd0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3211%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13708-cwe-434-unrestricted-upload-of-file-b19565d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13708%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pluggabl%20Booster%20for%20WooCommerce&amp;severity=high&amp;id=699f6e6ab7ef31ef0b5a03be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2270-cwe-22-improper-limitation-of-a-path-c5c11d4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2270%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20adamskaat%20Countdown%2C%20Coming%20Soon%2C%20Maintenance%20%E2%80%93%20Countdown%20%26%20Clock&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2836-cwe-79-improper-neutralization-of-in-af470651</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2836%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54ea4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13898-cwe-79-improper-neutralization-of-i-6263ef8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rpetersen29%20Simple%20Banner%20%E2%80%93%20Easily%20add%20multiple%20Banners%2FBars%2FNotifications%2FAnnouncements%20to%20the%20top%20or%20bottom%20of%20your%20website&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56df28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13645-cwe-94-improper-control-of-generati-9efb10d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13645%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=critical&amp;id=699f6e64b7ef31ef0b59fdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2317-cwe-89-improper-neutralization-of-sp-a4d38e60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2317%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20woobewoo%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3192-server-side-request-forgery-ssrf-in--91681d31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3192%3A%20Server-side%20Request%20Forgery%20(SSRF)%20in%20spatie%2Fbrowsershot&amp;severity=high&amp;id=68460b9671f4d251b56ac5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13744-cwe-434-unrestricted-upload-of-file-163f6ee8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13744%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pluggabl%20Booster%20for%20WooCommerce&amp;severity=high&amp;id=699f6e6cb7ef31ef0b5a05f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2075-cwe-862-missing-authorization-in-unc-9f9417dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2075%3A%20CWE-862%20Missing%20Authorization%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3196-stack-based-buffer-overflow-in-open--39e4882d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3196%3A%20Stack-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6880a8b9ad5a09ad00232529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29796-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-microsoft-microsoft-edge-for-ios-aebc28</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29796%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20iOS&amp;severity=medium&amp;id=682cd0f91484d88663aebc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29815-cwe-416-use-after-free-in-microsoft-microsoft-edge-chromium-based-aebc4b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29815%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682cd0f91484d88663aebc4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25001-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-edge-for-ios-aebb11</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25001%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Edge%20for%20iOS&amp;severity=medium&amp;id=682cd0f91484d88663aebb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-04-2b049f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-04&amp;severity=medium&amp;id=682c7db5e8347ec82d2b049f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-04-f11fd8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25000-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-microsoft-edge-chromium-based-aebb0f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25000%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682cd0f91484d88663aebb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3173-sql-injection-in-project-worlds-online-lawyer-management-system-aeb88c</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3173%3A%20SQL%20Injection%20in%20Project%20Worlds%20Online%20Lawyer%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3165-deserialization-in-thu-pacman-chitu-bf84cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3165%3A%20Deserialization%20in%20thu-pacman%20chitu&amp;severity=medium&amp;id=682d984bc4522896dcbf84cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3163-code-injection-in-internlm-lmdeploy-bf84c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3163%3A%20Code%20Injection%20in%20InternLM%20LMDeploy&amp;severity=medium&amp;id=682d984bc4522896dcbf84c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22457-cwe-121-stack-based-buffer-overflow-in-ivanti-connect-secure-bf161e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22457%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Ivanti%20Connect%20Secure&amp;severity=critical&amp;id=682d9840c4522896dcbf161e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29987-cwe-1220-insufficient-granularity-o-c19b9159</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29987%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Dell%20DD%20OS%208.3&amp;severity=high&amp;id=69a0a1c385912abc71d0b6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3162-deserialization-in-internlm-lmdeploy-bf84b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3162%3A%20Deserialization%20in%20InternLM%20LMDeploy&amp;severity=medium&amp;id=682d984bc4522896dcbf84b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32053-buffer-over-read-aecb97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32053%3A%20Buffer%20Over-read&amp;severity=medium&amp;id=682cd0fc1484d88663aecb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32052-buffer-over-read-aecb95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32052%3A%20Buffer%20Over-read&amp;severity=medium&amp;id=682cd0fc1484d88663aecb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32051-improper-check-for-unusual-or-exceptional-conditions-bd7333</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32051%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions&amp;severity=medium&amp;id=682d9817c4522896dcbd7333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32050-buffer-under-read-aecb93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32050%3A%20Buffer%20Under-read&amp;severity=medium&amp;id=682cd0fc1484d88663aecb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32049-allocation-of-resources-without-limits-or-throttling-bd732f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32049%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=682d9817c4522896dcbd732f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3155-inclusion-of-functionality-from-untrusted-control-sphere-in-red-hat-red-hat-enterprise-linux-8-aec927</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3155%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)&amp;severity=high&amp;id=682cd0fb1484d88663aec927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31911-improper-neutralization-of-special--153d3706</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31911%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20Social%20Share%20And%20Social%20Locker&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31909-missing-authorization-in-apptivo-ap-0bd7da7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31909%3A%20Missing%20Authorization%20in%20Apptivo%20Apptivo%20Business%20Site%20CRM&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def315b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31907-improper-neutralization-of-input-du-50bf732a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Labib%20Ahmed%20Team%20Builder&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31905-improper-neutralization-of-input-du-1f111146</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20O&apos;Donnell%20Team%20Rosters&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31903-improper-neutralization-of-input-du-b8ffe1bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xavi%20Ivars%20XV%20Random%20Quotes&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def310b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31902-improper-neutralization-of-input-du-4ea41d39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31902%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reputeinfosystems%20Social%20Share%20And%20Social%20Locker&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31901-improper-neutralization-of-input-du-261d9a27</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31901%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Digihood%20Digihood%20HTML%20Sitemap&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31899-improper-neutralization-of-input-du-0a256895</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31899%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpshopee%20Awesome%20Logos&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31898-improper-neutralization-of-input-du-5e81f355</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dustinscarberry%20MediaView&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def30ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31896-missing-authorization-in-istmoplugi-3c73f95f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31896%3A%20Missing%20Authorization%20in%20istmoplugins%20GetBookingsWP&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31893-improper-neutralization-of-input-du-43942076</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31893%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cheesefather%20Botnet%20Attack%20Blocker&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31876-missing-authorization-in-gunnarpayd-5496ebf3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31876%3A%20Missing%20Authorization%20in%20gunnarpayday%20Payday&amp;severity=null&amp;id=69cd739ce6bfc5ba1def302f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31858-missing-authorization-in-matthewrub-681f202f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31858%3A%20Missing%20Authorization%20in%20matthewrubin%20Local%20Magic&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31841-missing-authorization-in-frank-p-wa-17a54a2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31841%3A%20Missing%20Authorization%20in%20Frank%20P.%20Walentynowicz%20FPW%20Category%20Thumbnails&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31827-improper-limitation-of-a-pathname-t-666891b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31827%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vlad.olaru%20Fonto&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31825-improper-limitation-of-a-pathname-t-6ae6c3af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31825%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pixelgrade%20Category%20Icon&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31795-missing-authorization-in-plugin-dev-e00ad6e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31795%3A%20Missing%20Authorization%20in%20Plugin%20Devs%20Shopify%20to%20WooCommerce%20Migration&amp;severity=null&amp;id=69cd7380e6bfc5ba1def2609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31794-missing-authorization-in-web-ready--a1d09327</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31794%3A%20Missing%20Authorization%20in%20Web%20Ready%20Now%20WR%20Price%20List%20Manager%20For%20Woocommerce&amp;severity=null&amp;id=69cd7380e6bfc5ba1def2606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31789-cwe-862-missing-authorization-in-matat-technologies-textme-sms-bd672a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31789%3A%20Missing%20Authorization%20in%20Matat%20Technologies%20TextMe%20SMS&amp;severity=null&amp;id=682d9816c4522896dcbd672a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31768-missing-authorization-in-otwthemes--ebba8187</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31768%3A%20Missing%20Authorization%20in%20OTWthemes%20Widget%20Manager%20Light&amp;severity=null&amp;id=69cd737de6bfc5ba1def2575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31758-missing-authorization-in-binarycarp-e969ffca</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31758%3A%20Missing%20Authorization%20in%20BinaryCarpenter%20Free%20Woocommerce%20Product%20Table%20View&amp;severity=null&amp;id=69cd737be6bfc5ba1def2509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31746-missing-authorization-in-think201-c-ced1ad0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31746%3A%20Missing%20Authorization%20in%20Think201%20Clients&amp;severity=null&amp;id=69cd7375e6bfc5ba1def23a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31739-missing-authorization-in-manuel-sch-f436913d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31739%3A%20Missing%20Authorization%20in%20Manuel%20Schmalstieg%20Minimalistic%20Event%20Manager&amp;severity=null&amp;id=69cd7375e6bfc5ba1def238d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31736-missing-authorization-in-richtexted-f9584f10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31736%3A%20Missing%20Authorization%20in%20richtexteditor%20Rich%20Text%20Editor&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31729-missing-authorization-in-jeffikus-w-fd8f7308</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31729%3A%20Missing%20Authorization%20in%20jeffikus%20WooTumblog&amp;severity=null&amp;id=69cd7373e6bfc5ba1def230e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31626-improper-neutralization-of-input-du-93facc40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M.%20Ali%20Saleem%20Support%20Helpdesk%20Ticket%20System%20Lite&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31622-improper-neutralization-of-input-du-1d4874dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31622%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Utkarsh%20Kukreti%20Advanced%20Typekit&amp;severity=null&amp;id=69cd7371e6bfc5ba1def220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31582-improper-neutralization-of-input-du-81d936f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31582%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashish%20Ajani%20Contact%20Form%20vCard%20Generator&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31581-missing-authorization-in-sandeep-ku-a3260314</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31581%3A%20Missing%20Authorization%20in%20Sandeep%20Kumar%20WP%20Video%20Playlist&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31573-improper-neutralization-of-input-du-fb531cbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pepro%20Dev.%20Group%20PeproDev%20CF7%20Database&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31558-insertion-of-sensitive-information--a93ebaca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31558%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Greg%20TailPress&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31541-missing-authorization-in-turitop-tu-53ecb8c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31541%3A%20Missing%20Authorization%20in%20TuriTop%20TuriTop%20Booking%20System&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31536-improper-neutralization-of-input-du-de1d69a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moshensky%20CF7%20Spreadsheets&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31468-improper-neutralization-of-input-du-6840e0ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31468%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottsm%20WP_Identicon&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31467-improper-neutralization-of-input-du-efba1259</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miro.mannino%20Flickr%20Photostream&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31442-improper-neutralization-of-input-du-9bf832e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e1tekoap42%20Search%20engine%20keywords%20highlighter&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31436-improper-neutralization-of-input-du-add11fc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31436%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Angelo%20Mandato%20Blubrry%20PowerPress%20Podcasting%20plugin%20MultiSite%20add-on&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31098-improper-control-of-filename-for-in-72538a6a</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31098%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20debounce%20DeBounce%20Email%20Validator&amp;severity=null&amp;id=69cd7344e6bfc5ba1def154e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31091-improper-neutralization-of-input-du-63ceaa7d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Header%20and%20Footer&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30916-missing-authorization-in-enituretec-ad618873</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30916%3A%20Missing%20Authorization%20in%20enituretechnology%20Residential%20Address%20Detection&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30915-missing-authorization-in-enituretec-28fa9767</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30915%3A%20Missing%20Authorization%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30908-cross-site-request-forgery-csrf-in--099cd264</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30908%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shamalli%20Web%20Directory%20Free&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30889-deserialization-of-untrusted-data-i-04002a09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30889%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Testimonial%20Slider&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30858-improper-neutralization-of-input-du-345cbb86</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tribulant%20Software%20Snow%20Storm&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30616-improper-neutralization-of-input-du-81713664</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30616%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Wood%20Latest%20Custom%20Post%20Type%20Updates&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30611-improper-neutralization-of-input-du-2071ec88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30611%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptobe%20Wptobe-signinup&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30596-improper-limitation-of-a-pathname-t-1c130acc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30596%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tstafford%20include-file&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2945-vulnerability-in-pgadminorg-pgadmin--e1efede0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2945%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=critical&amp;id=69a0a1c385912abc71d0b6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9416-cwe-79-improper-neutralization-of-in-56b7fd91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9416%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b551087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2299-cwe-79-improper-neutralization-of-in-329c616b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theluckywp%20LuckyWP%20Table%20of%20Contents&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1663-cwe-79-improper-neutralization-of-in-71873357</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=699f6b16b7ef31ef0b54df97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2874-cwe-79-improper-neutralization-of-in-11f7daef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13673-cwe-79-improper-neutralization-of-i-8862a629</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13673%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bigboomdesign%20Big%20Boom%20Directory&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22007-vulnerability-in-linux-linux-be8edf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22006-vulnerability-in-linux-linux-be8edb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22005-vulnerability-in-linux-linux-be8ed7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22004-vulnerability-in-linux-linux-be8ed3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22003-vulnerability-in-linux-linux-be8ecf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22002-vulnerability-in-linux-linux-be8ecb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22001-vulnerability-in-linux-linux-be8ec7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22000-vulnerability-in-linux-linux-be8eb4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21999-vulnerability-in-linux-linux-be8eb0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21998-vulnerability-in-linux-linux-be8eac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21997-vulnerability-in-linux-linux-be8e9b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21996-vulnerability-in-linux-linux-be8e8c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21995-vulnerability-in-linux-linux-be8e84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3146-sql-injection-in-phpgurukul-bus-pass-48b7ab70</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3146%3A%20SQL%20Injection%20in%20PHPGurukul%20Bus%20Pass%20Management%20System&amp;severity=medium&amp;id=69137fc747ab359031a1e1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2784-out-of-bounds-read-in-red-hat-red-hat-enterprise-linux-10-aecba6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2784%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=682cd0fc1484d88663aecba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31161-cwe-305-authentication-bypass-by-primary-weakness-in-crushftp-crushftp-bf7d37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31161%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20CrushFTP%20CrushFTP&amp;severity=critical&amp;id=682d984bc4522896dcbf7d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22931-n-a-in-n-a-bf7aa5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22931%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984bc4522896dcbf7aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22930-n-a-in-n-a-bf7a9d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22930%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22929-n-a-in-n-a-bf7a8c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22929%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22928-n-a-in-n-a-bf7a84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22928%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22927-n-a-in-n-a-bf7a7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22927%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-03-2b2b1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-03&amp;severity=medium&amp;id=682c7db5e8347ec82d2b2b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-03-f1212b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30218-cwe-200-exposure-of-sensitive-infor-ff277068</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30218%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20vercel%20next.js&amp;severity=low&amp;id=68ed1ec2e2beed89262b47a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31285-cwe-269-improper-privilege-mangemen-ce7b6b5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31285%3A%20CWE-269%3A%20Improper%20Privilege%20Mangement%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Vision%20One&amp;severity=medium&amp;id=69a0a1c685912abc71d0ba4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31284-cwe-269-improper-privilege-mangemen-ff51657e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31284%3A%20CWE-269%3A%20Improper%20Privilege%20Mangement%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Vision%20One&amp;severity=medium&amp;id=69a0a1c685912abc71d0ba4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31283-cwe-269-improper-privilege-mangemen-d948852a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31283%3A%20CWE-269%3A%20Improper%20Privilege%20Mangement%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Vision%20One&amp;severity=medium&amp;id=69a0a1c685912abc71d0ba47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31282-cwe-269-improper-privilege-mangement-in-trend-micro-inc-trend-vision-one-bebfaa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31282%3A%20CWE-269%3A%20Improper%20Privilege%20Mangement%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Vision%20One&amp;severity=medium&amp;id=682d9838c4522896dcbebfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0014-cwe-276-incorrect-default-permissions-in-amd-amd-ryzen-ai-software-bf161a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0014%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AMD%20AMD%20Ryzen%E2%84%A2%20AI%20Software&amp;severity=high&amp;id=682d9840c4522896dcbf161a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0154-cwe-644-improper-neutralization-of-h-35282908</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0154%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20TXSeries%20for%20Multiplatforms&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31722-vulnerability-in-jenkins-project-je-99adaf81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31722%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Templating%20Engine%20Plugin&amp;severity=high&amp;id=69a0a1c885912abc71d0ba84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25051-cwe-613-insufficient-session-expira-963767b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25051%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=medium&amp;id=69a0a1b885912abc71d0a0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21994-vulnerability-in-linux-linux-be8e7a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50385-cwe-459-incomplete-cleanup-in-stmic-1ad45490</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50385%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908517fff0e30cee23598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50384-cwe-459-incomplete-cleanup-in-stmic-cc9b7e67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50384%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908517fff0e30cee23594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50595-cwe-191-integer-underflow-wrap-or-w-12344ef4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50595%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908517fff0e30cee235a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50594-cwe-191-integer-underflow-wrap-or-w-4a00ea59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50594%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908517fff0e30cee2359c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50597-cwe-191-integer-underflow-wrap-or-w-c7f47a9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50597%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908537fff0e30cee23900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50596-cwe-191-integer-underflow-wrap-or-w-e96700b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50596%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908537fff0e30cee238fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21993-vulnerability-in-linux-linux-be8e72</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21992-vulnerability-in-linux-linux-be8e6a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21991-vulnerability-in-linux-linux-bdd3db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21990-vulnerability-in-linux-linux-be8e62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21989-vulnerability-in-linux-linux-be8e40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21988-vulnerability-in-linux-linux-be8e3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21987-vulnerability-in-linux-linux-be8e2f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2842-exposure-of-sensitive-information-to-an-unauthorized-actor-270038</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2842%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=682f99000acd01a249270038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2786-exposure-of-sensitive-information-to-an-unauthorized-actor-270036</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2786%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=682f99000acd01a249270036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3097-cwe-79-improper-neutralization-of-in-2b20d3d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3097%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paulgpetty%20wp%20Time%20Machine&amp;severity=medium&amp;id=699f6b27b7ef31ef0b54ebd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3063-cwe-862-missing-authorization-in-sho-66624cc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3063%3A%20CWE-862%20Missing%20Authorization%20in%20shopperapprovedapp%20Shopper%20Approved%20Reviews&amp;severity=high&amp;id=699f6b27b7ef31ef0b54ebc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2483-cwe-79-improper-neutralization-of-in-c96fe8e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2483%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobcares_plugins%20Gift%20Certificate%20Creator&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13637-cwe-862-missing-authorization-in-ro-7350ed1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13637%3A%20CWE-862%20Missing%20Authorization%20in%20romik84%20Demo%20Awesome&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12410-cwe-89-improper-neutralization-of-s-bca1b334</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12410%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rustaurius%20Front%20End%20Users&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2513-cwe-79-improper-neutralization-of-in-643a77b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartpixels%20Smart%20Icons%20For%20WordPress&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3098-cwe-79-improper-neutralization-of-in-2159ed19</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ulshamim%20Video%20Url&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ec90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3099-cwe-352-cross-site-request-forgery-c-39e49c6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3099%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dbejean%20Advanced%20Search%20by%20My%20Solr%20Server&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ec96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2005-cwe-434-unrestricted-upload-of-file--fc7fd52d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2005%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rustaurius%20Front%20End%20Users&amp;severity=critical&amp;id=699f6b1db7ef31ef0b54e3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2779-cwe-862-missing-authorization-in-htp-51672a7d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2779%3A%20CWE-862%20Missing%20Authorization%20in%20htplugins%20Insert%20Headers%20and%20Footers%20Code%20%E2%80%93%20HT%20Script&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3069-inappropriate-implementation-in-goog-eb18c37e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3069%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a1c885912abc71d0ba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3068-inappropriate-implementation-in-goog-fd4abe53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3068%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a1c885912abc71d0ba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3067-inappropriate-implementation-in-goog-a56973f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3067%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=68be1ecce3f0bafba8aa56b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3066-use-after-free-in-google-chrome-940d057b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3066%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a1c885912abc71d0ba95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-02-2b831b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-02&amp;severity=medium&amp;id=682c7db6e8347ec82d2b831b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-02-f12bc2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31135-cwe-20-improper-input-validation-in-49442506</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31135%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20phires%20go-guerrilla&amp;severity=medium&amp;id=697a92d04623b1157cf6c713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31819-improper-neutralization-of-input-du-2d7565cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31819%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Nova%20Blocks&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31628-missing-authorization-in-slicedinvo-28c2a20d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31628%3A%20Missing%20Authorization%20in%20SlicedInvoices%20Sliced%20Invoices&amp;severity=null&amp;id=69cd7371e6bfc5ba1def221f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31619-improper-neutralization-of-special--d4c0d238</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31619%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20marcoingraiti%20Actionwear%20products%20sync&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31612-deserialization-of-untrusted-data-i-db53c29d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31612%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Sabuj%20Kundu%20CBX%20Poll&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31594-improper-neutralization-of-input-du-26d3c28e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPglob%20Auto%20scroll%20for%20reading&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31580-missing-authorization-in-anzar-ahme-ac4a39b9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31580%3A%20Missing%20Authorization%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Product%20Enquiry&amp;severity=null&amp;id=69cd736ae6bfc5ba1def206d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31579-improper-neutralization-of-special--d4f73523</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31579%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20EXEIdeas%20International%20WP%20AutoKeyword&amp;severity=null&amp;id=69cd736ae6bfc5ba1def206a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31578-improper-neutralization-of-input-du-96afdeb6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wisdomlogix%20Solutions%20Pvt.%20Ltd.%20Fonts%20Manager%20%7C%20Custom%20Fonts&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31571-improper-neutralization-of-input-du-8c80528c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31571%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cynob%20IT%20Consultancy%20The%20Logo%20Slider&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31568-improper-neutralization-of-input-du-b11301f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31568%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wiredmindshelp%20LeadLab%20by%20wiredminds&amp;severity=null&amp;id=69cd7368e6bfc5ba1def201a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31564-improper-neutralization-of-special--4bdce61c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31564%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aitool%20Ai%20Auto%20Tool%20Content%20Writing%20Assistant%20(Gemini%20Writer%2C%20ChatGPT%20)%20All%20in%20One&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31563-improper-neutralization-of-input-du-92da161a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vimal%20Kava%20AI%20Search%20Bar&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31561-improper-neutralization-of-special--d67d7858</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31561%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CodeSolz%20Ultimate%20Push%20Notifications&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31560-incorrect-privilege-assignment-in-d-0295482b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31560%3A%20Incorrect%20Privilege%20Assignment%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31553-improper-neutralization-of-special--bad8ea80</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31553%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFactory%20Advanced%20WooCommerce%20Product%20Sales%20Reporting&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31552-improper-neutralization-of-special--51a3e404</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31552%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20davidfcarr%20RSVPMarker&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31551-improper-neutralization-of-special--6080a0d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31551%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Salesmate.io%20Salesmate%20Add-On%20for%20Gravity%20Forms&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31548-improper-neutralization-of-input-du-80e4351b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeSolz%20Ultimate%20Push%20Notifications&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31537-improper-neutralization-of-input-du-be783a46</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20madfishdigital%20Bulk%20NoIndex%20%26%20NoFollow%20Toolkit&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31534-improper-neutralization-of-special--dfbda298</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31534%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shopperdotcom%20Shopper&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31531-improper-neutralization-of-special--741c3d3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31531%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20click5%20History%20Log%20by%20click5&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31525-missing-authorization-in-wp-messiah-0621f9c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31525%3A%20Missing%20Authorization%20in%20WP%20Messiah%20WP%20Mobile%20Bottom%20Menu&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31462-improper-neutralization-of-input-du-eb2f20d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rzfarrell%20CGM%20Event%20Calendar&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31461-improper-neutralization-of-input-du-57d4b464</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mayeenul%20Islam%20NanoSupport&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31455-improper-neutralization-of-input-du-aa76680c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ralxz%20Limit%20Max%20IPs%20Per%20User&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31454-improper-neutralization-of-input-du-6f198610</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arefly%20Delete%20Post%20Revision&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31446-improper-neutralization-of-input-du-e1b29fe3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31446%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jiangmiao%20WP%20Cleaner&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31445-improper-neutralization-of-input-du-37c05994</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31445%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sed%20Lex%20Pages%20Order&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31441-improper-neutralization-of-input-du-91d54756</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31441%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WordPress%20Galleria&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31431-improper-neutralization-of-input-du-551b7e05</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31431%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20conlabz%20GmbH%20WP%20Bookmarks&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31097-improper-control-of-filename-for-in-1d102a88</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31097%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Hossein%20Material%20Dashboard&amp;severity=null&amp;id=69cd7344e6bfc5ba1def154b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31089-improper-neutralization-of-special--6ea4bf1e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31089%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Fahad%20Mahmood%20Order%20Splitter%20for%20WooCommerce&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31086-improper-neutralization-of-input-du-b537f499</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31086%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WBW%20Plugins%20Product%20Table%20by%20WBW&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31085-improper-neutralization-of-input-du-3880b65f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-language&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31082-improper-control-of-filename-for-in-982704f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31082%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20InfornWeb%20News%20%26%20Blog%20Designer%20Pack&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31081-improper-neutralization-of-input-du-70943e87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31081%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ShortPixel%20Enable%20Media%20Replace&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31080-improper-neutralization-of-input-du-fc35f741</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31080%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Link%20Software%20LLC%20HTML%20Forms&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31078-improper-neutralization-of-input-du-49b20d67</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31078%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30913-improper-neutralization-of-input-du-ae167550</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30913%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20podpirate%20Access%20Areas&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30906-improper-neutralization-of-input-du-e1f9a128</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lisandragetnet%20Plugin%20Oficial%20%E2%80%93%20Getnet%20para%20WooCommerce&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30905-improper-neutralization-of-input-du-cda394a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30892-deserialization-of-untrusted-data-i-4952c5c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30892%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpTravelly&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30853-missing-authorization-in-shortpixel-12dcc82b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30853%3A%20Missing%20Authorization%20in%20ShortPixel%20ShortPixel%20Adaptive%20Images&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30852-improper-neutralization-of-input-du-05835d4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30852%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emotionalonlinestorytelling%20Oracle%20Cards%20Lite&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30844-improper-neutralization-of-input-du-f9fa2ac1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30844%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Watu%20Quiz&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30841-improper-limitation-of-a-pathname-t-e6900ef8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30841%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20adamskaat%20Countdown%20%26%20Clock&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30825-missing-authorization-in-wpclever-w-a58f15fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30825%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Smart%20Linked%20Products%20-%20Upsells%20%26%20Cross-sells%20for%20WooCommerce&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30807-improper-neutralization-of-special--8af20a1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30807%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Martin%20Nguyen%20Next-Cart%20Store%20to%20WooCommerce%20Migration&amp;severity=null&amp;id=69cd731ee6bfc5ba1def082d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30778-improper-neutralization-of-input-du-faddb192</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=69cd730be6bfc5ba1def04c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30580-improper-control-of-generation-of-c-185e3ed8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30580%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kellydiek%20DigiWidgets%20Image%20Editor&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30554-improper-neutralization-of-input-du-f5a7c94b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Abhishek%20Kumar%20Frizzly&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefeb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31753-cross-site-request-forgery-csrf-in--97f53969</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31753%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Animesh%20Kumar%20Advanced%20Speed%20Increaser&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21986-vulnerability-in-linux-linux-bdd3ca</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21985-vulnerability-in-linux-linux-be8e2b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21984-vulnerability-in-linux-linux-be8e27</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21983-vulnerability-in-linux-linux-be8e23</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21982-vulnerability-in-linux-linux-be8e1f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21981-vulnerability-in-linux-linux-be8e1b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21980-vulnerability-in-linux-linux-be8e15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21979-vulnerability-in-linux-linux-be8e0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21978-vulnerability-in-linux-linux-be8dfe</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21977-vulnerability-in-linux-linux-be8def</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21976-vulnerability-in-linux-linux-be8de7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21975-vulnerability-in-linux-linux-be8ddf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21974-vulnerability-in-linux-linux-be8dd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8dd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21973-vulnerability-in-linux-linux-be8dcf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21972-vulnerability-in-linux-linux-be8dcb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21972%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21971-vulnerability-in-linux-linux-be8dba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21970-vulnerability-in-linux-linux-be8db6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21969-vulnerability-in-linux-linux-be8da5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21968-vulnerability-in-linux-linux-be8d8a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21967-vulnerability-in-linux-linux-be8d82</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21966-vulnerability-in-linux-linux-be8d7a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21965-vulnerability-in-linux-linux-be8d74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21964-vulnerability-in-linux-linux-be8d5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21963-vulnerability-in-linux-linux-be8d52</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21962-vulnerability-in-linux-linux-be8d4a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21961-vulnerability-in-linux-linux-be8d42</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21960-vulnerability-in-linux-linux-be8d3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21959-vulnerability-in-linux-linux-bdd3c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21958-vulnerability-in-linux-linux-be8d32</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21957-vulnerability-in-linux-linux-be8d0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21956-vulnerability-in-linux-linux-be8d06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21955-vulnerability-in-linux-linux-be8cfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21954-vulnerability-in-linux-linux-be8ced</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21953-vulnerability-in-linux-linux-be8ce7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21952-vulnerability-in-linux-linux-be8cd4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21951-vulnerability-in-linux-linux-be8cce</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21950-vulnerability-in-linux-linux-be8cc4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21949-vulnerability-in-linux-linux-be8cba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21948-vulnerability-in-linux-linux-be8cb2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21947-vulnerability-in-linux-linux-be8c92</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21946-vulnerability-in-linux-linux-be8c8e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21945-vulnerability-in-linux-linux-be8c8a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21944-vulnerability-in-linux-linux-be8c7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21943-vulnerability-in-linux-linux-be8c79</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21942-vulnerability-in-linux-linux-be8c75</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21941-vulnerability-in-linux-linux-be8c71</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21940-vulnerability-in-linux-linux-be8c6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21939-vulnerability-in-linux-linux-be8c69</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21938-vulnerability-in-linux-linux-be8c65</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21937-vulnerability-in-linux-linux-bdd3ba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21936-vulnerability-in-linux-linux-be8c46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21935-vulnerability-in-linux-linux-be8c42</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21934-vulnerability-in-linux-linux-be8c3e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21933-vulnerability-in-linux-linux-be8c31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21932-vulnerability-in-linux-linux-be8c2d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21931-vulnerability-in-linux-linux-bdd39b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21930-vulnerability-in-linux-linux-be8c29</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21929-vulnerability-in-linux-linux-be8c1c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21928-vulnerability-in-linux-linux-be8c18</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21927-vulnerability-in-linux-linux-be8c14</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21926-vulnerability-in-linux-linux-be8c10</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21925-vulnerability-in-linux-linux-be8bf7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21924-vulnerability-in-linux-linux-be8bf3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21923-vulnerability-in-linux-linux-be8bef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21922-vulnerability-in-linux-linux-be8beb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21921-vulnerability-in-linux-linux-be8be5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21920-vulnerability-in-linux-linux-be8be1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21919-vulnerability-in-linux-linux-be8bdd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21918-vulnerability-in-linux-linux-be8bd9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21917-vulnerability-in-linux-linux-be8bd5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21916-vulnerability-in-linux-linux-bdd397</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21915-vulnerability-in-linux-linux-be8bc8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21914-vulnerability-in-linux-linux-be8ba2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21913-vulnerability-in-linux-linux-be8b9e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21912-vulnerability-in-linux-linux-be8b9a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21911-vulnerability-in-linux-linux-be8b96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21910-vulnerability-in-linux-linux-be8b92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21909-vulnerability-in-linux-linux-be8b8e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21908-vulnerability-in-linux-linux-be8b8a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21907-vulnerability-in-linux-linux-bdd393</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21906-vulnerability-in-linux-linux-be8b86</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21905-vulnerability-in-linux-linux-be8b82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21904-vulnerability-in-linux-linux-be8b7e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21903-vulnerability-in-linux-linux-be8b69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21902-vulnerability-in-linux-linux-be8b5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21901-vulnerability-in-linux-linux-be8b58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21900-vulnerability-in-linux-linux-be8b4b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21899-vulnerability-in-linux-linux-be8b47</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21898-vulnerability-in-linux-linux-bdd382</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21897-vulnerability-in-linux-linux-be8b43</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21896-vulnerability-in-linux-linux-be8b3f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21895-vulnerability-in-linux-linux-be8b3b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21894-vulnerability-in-linux-linux-be8b37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31910-improper-neutralization-of-special--9f8387f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31910%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20BookingPress&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def315e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31908-cross-site-request-forgery-csrf-in--04bb24be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31908%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sami%20Ahmed%20Siddiqui%20JSON%20Structuring%20Markup&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31906-cross-site-request-forgery-csrf-in--77f06317</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31906%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ProfitShare.ro%20WP%20Profitshare&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31904-cross-site-request-forgery-csrf-in--6cf50fdd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31904%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Infoway%20LLC%20Ebook%20Downloader&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def310e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31897-improper-neutralization-of-input-du-92e881e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31897%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arrow%20Plugins%20Arrow%20Custom%20Feed%20for%20Twitter&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def30fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31895-improper-neutralization-of-input-du-53848b57</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31895%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paulrosen%20ABC%20Notation&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31894-improper-neutralization-of-input-du-af4f6582</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infoway%20LLC%20Ebook%20Downloader&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31892-improper-neutralization-of-input-du-bb61b73a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31892%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20WP%20Crowdfunding&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31891-improper-neutralization-of-input-du-b36944b2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gosign%20Gosign%20%E2%80%93%20Posts%20Slider%20Block&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31890-improper-neutralization-of-input-du-aa6f675b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mashi%20Simple%20Map%20No%20Api&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31888-cross-site-request-forgery-csrf-in--ee24da6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31888%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPExperts.io%20WP%20Multistore%20Locator&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31887-missing-authorization-in-zookatron--c6eb994a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31887%3A%20Missing%20Authorization%20in%20zookatron%20MyBookProgress%20by%20Stormhill%20Media&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31886-missing-authorization-in-repuso-soc-e1d87f8e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31886%3A%20Missing%20Authorization%20in%20Repuso%20Social%20proof%20testimonials%20and%20reviews%20by%20Repuso&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31885-improper-neutralization-of-input-du-f2bcf812</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31885%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Floeter%20Hyperlink%20Group%20Block&amp;severity=null&amp;id=69cd739ce6bfc5ba1def304b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31884-improper-neutralization-of-input-du-1fbaae97</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20CMS%20Ninja%20Norse%20Rune%20Oracle%20Plugin&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31883-improper-neutralization-of-input-du-dad6f871</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31883%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPWebinarSystem%20WebinarPress&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31882-missing-authorization-in-wpwebinars-a6021f38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31882%3A%20Missing%20Authorization%20in%20WPWebinarSystem%20WebinarPress&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31881-missing-authorization-in-stylemix-p-9e665167</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31881%3A%20Missing%20Authorization%20in%20Stylemix%20Pearl&amp;severity=null&amp;id=69cd739ce6bfc5ba1def303f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31880-cross-site-request-forgery-csrf-in--58a99163</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31880%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stylemix%20Pearl&amp;severity=null&amp;id=69cd739ce6bfc5ba1def303c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31879-missing-authorization-in-dmitry-v-c-4ee6cbbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31879%3A%20Missing%20Authorization%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Generator%20for%20WooCommerce&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31878-missing-authorization-in-dmitry-v-c-ac3108bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31878%3A%20Missing%20Authorization%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20UPC%2FEAN%2FGTIN%20Code%20Generator&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31877-missing-authorization-in-magnigenie-7543c366</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31877%3A%20Missing%20Authorization%20in%20Magnigenie%20RestroPress&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31875-improper-neutralization-of-input-du-2d40813b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pluginic%20FancyPost&amp;severity=null&amp;id=69cd739ae6bfc5ba1def3004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31874-improper-neutralization-of-input-du-06a9ae6b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31874%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20WebberZone%20Snippetz&amp;severity=null&amp;id=69cd739ae6bfc5ba1def3001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31872-missing-authorization-in-galaxy-web-22be6594</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31872%3A%20Missing%20Authorization%20in%20Galaxy%20Weblinks%20WP%20Clone%20any%20post%20type&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31871-url-redirection-to-untrusted-site-o-b0a71fc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31871%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Galaxy%20Weblinks%20WP%20Clone%20any%20post%20type&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31870-missing-authorization-in-exeideas-i-b6cdb01e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31870%3A%20Missing%20Authorization%20in%20EXEIdeas%20International%20WP%20AutoKeyword&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31869-improper-neutralization-of-input-du-c09fa038</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31869%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Modernaweb%20Studio%20Black%20Widgets%20For%20Elementor&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31868-missing-authorization-in-joomsky-js-591353f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31868%3A%20Missing%20Authorization%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31867-authorization-bypass-through-user-c-3d110784</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31867%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31866-missing-authorization-in-ship-depot-e3b4d78b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31866%3A%20Missing%20Authorization%20in%20Ship%20Depot%20ShipDepot%20for%20WooCommerce&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31864-improper-neutralization-of-input-du-b9655daa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31864%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Out%20the%20Box%20Beam%20me%20up%20Scotty&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31863-missing-authorization-in-inspry-age-110eaa7d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31863%3A%20Missing%20Authorization%20in%20inspry%20Agency%20Toolkit&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31862-missing-authorization-in-pickplugin-3623b861</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31862%3A%20Missing%20Authorization%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31861-improper-neutralization-of-input-du-2edb144d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31861%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPOrbit%20Support%20Perfect%20Font%20Awesome%20Integration&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31860-improper-neutralization-of-input-du-663ce4da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31860%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPeka%20WP%20AdCenter&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31859-cross-site-request-forgery-csrf-in--db19d7b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31859%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Feedbucket%20Feedbucket%20%E2%80%93%20Website%20Feedback%20Tool&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31857-improper-neutralization-of-input-du-a344d0ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31857%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpWax%20Directorist%20AddonsKit%20for%20Elementor&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31856-missing-authorization-in-brainvirei-d37cbc2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31856%3A%20Missing%20Authorization%20in%20brainvireinfo%20Export%20All%20Post%20Meta&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31855-improper-neutralization-of-input-du-27926ccb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softnwords%20SMM%20API&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31854-missing-authorization-in-sharaz-sha-f23d2ac5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31854%3A%20Missing%20Authorization%20in%20Sharaz%20Shahid%20Simple%20Sticky%20Add%20To%20Cart%20For%20WooCommerce&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31853-improper-neutralization-of-input-du-aedf36eb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31853%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Erez%20Hadas-Sonnenschein%20Smartarget%20Popup&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31852-cross-site-request-forgery-csrf-in--f75a4a72</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31852%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20N-Media%20Bulk%20Product%20Sync&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31851-improper-neutralization-of-input-du-51dd7af7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31851%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markkinchin%20Beds24%20Online%20Booking&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31850-improper-neutralization-of-input-du-ec03fd58</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RedefiningTheWeb%20PDF%20Generator%20Addon%20for%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31849-improper-neutralization-of-input-du-cc9072a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31849%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fbtemplates%20Nemesis%20All-in-One&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31848-missing-authorization-in-wpfactory--fa9c25b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31848%3A%20Missing%20Authorization%20in%20WPFactory%20Adverts&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31847-improper-neutralization-of-input-du-08bb07ad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelooks%20mFolio%20Lite&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31846-missing-authorization-in-jeroen-sch-08846538</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31846%3A%20Missing%20Authorization%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31845-cross-site-request-forgery-csrf-in--66eea60b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31845%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rohit%20Choudhary%20Theme%20Duplicator&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31844-improper-neutralization-of-input-du-6bbb46df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31844%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Magical%20Blocks&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31843-missing-authorization-in-wilson-ope-79ba86ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31843%3A%20Missing%20Authorization%20in%20Wilson%20OpenAI%20Tools%20for%20WordPress%20%26%20WooCommerce&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31842-insertion-of-sensitive-information--bd42c03b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31842%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20viralloops%20Viral%20Loops%20WP%20Integration&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31840-cross-site-request-forgery-csrf-in--70654b15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31840%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digireturn%20Simple%20Fixed%20Notice&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31839-cross-site-request-forgery-csrf-in--320163e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31839%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digireturn%20DN%20Footer%20Contacts&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31838-improper-neutralization-of-input-du-00f4dd34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eventbee%20Eventbee%20RSVP%20Widget&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31836-missing-authorization-in-matthewrub-da213fa9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31836%3A%20Missing%20Authorization%20in%20matthewrubin%20Review%20Manager&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31835-improper-neutralization-of-input-du-72ef7ab4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brice%20Capobianco%20WP%20Plugin%20Info%20Card&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31834-missing-authorization-in-themeglow--046fbaa0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31834%3A%20Missing%20Authorization%20in%20themeglow%20JobBoard%20Job%20listing&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31833-authorization-bypass-through-user-c-79fe731a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31833%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeglow%20JobBoard%20Job%20listing&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31832-exposure-of-sensitive-system-inform-a388192c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31832%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Beee%20ACF%20City%20Selector&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31831-missing-authorization-in-team-atomc-cfc7aa3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31831%3A%20Missing%20Authorization%20in%20Team%20AtomChat%20AtomChat&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31830-missing-authorization-in-uriahs-vic-c00d2262</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31830%3A%20Missing%20Authorization%20in%20Uriahs%20Victor%20Printus&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31829-improper-neutralization-of-input-du-ad57390f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31829%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devscred%20ShopCred&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31828-cross-site-request-forgery-csrf-in--243d820f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31828%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alextselegidis%20Easy!Appointments&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31826-missing-authorization-in-anzar-ahme-12a3de33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31826%3A%20Missing%20Authorization%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Cost%20Of%20Goods&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31824-server-side-request-forgery-ssrf-in-58103cde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31824%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Wombat%20Plugins%20WP%20Optin%20Wheel&amp;severity=null&amp;id=69cd738be6bfc5ba1def2cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31823-improper-neutralization-of-input-du-60bd667c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31823%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpoperations%20WPoperation%20Elementor%20Addons&amp;severity=null&amp;id=69cd738be6bfc5ba1def2cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31822-missing-authorization-in-ashish-aja-d94ed91d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31822%3A%20Missing%20Authorization%20in%20Ashish%20Ajani%20WP%20Simple%20HTML%20Sitemap&amp;severity=null&amp;id=69cd7386e6bfc5ba1def276f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31821-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-formsintegrations-integration-of-zoho-crm-and-contact-form-7-bd726c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31821%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20formsintegrations%20Integration%20of%20Zoho%20CRM%20and%20Contact%20Form%207&amp;severity=medium&amp;id=682d9817c4522896dcbd726c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31820-missing-authorization-in-webdevstud-dde0839a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31820%3A%20Missing%20Authorization%20in%20webdevstudios%20Automatic%20Featured%20Images%20from%20Videos&amp;severity=null&amp;id=69cd7386e6bfc5ba1def276c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31818-improper-neutralization-of-input-du-8b28fa9f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31818%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ContentBot.ai%20ContentBot%20AI%20Writer&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31817-improper-neutralization-of-input-du-7bbce83a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31817%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPWheels%20BlockWheels&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31816-missing-authorization-in-pietro-mob-50689108</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31816%3A%20Missing%20Authorization%20in%20pietro%20Mobile%20App%20Canvas&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31815-improper-neutralization-of-input-du-04a23417</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31815%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devscred%20Design%20Blocks&amp;severity=null&amp;id=69cd7386e6bfc5ba1def275d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31814-cross-site-request-forgery-csrf-in--b63bd6c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31814%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OwnerRez%20OwnerRez%20API&amp;severity=null&amp;id=69cd7386e6bfc5ba1def275a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31813-improper-neutralization-of-input-du-e1eb5b30</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31813%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Website366.com%20WPSHARE247%20Elementor%20Addons&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31812-improper-neutralization-of-input-du-5f77fa50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tomas%20BuddyPress%20Members%20Only&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31811-improper-neutralization-of-input-du-71615f95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31811%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xtreeme%20Planyo%20online%20reservation%20system&amp;severity=null&amp;id=69cd7383e6bfc5ba1def269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31810-missing-authorization-in-pickplugin-9b2d7fce</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31810%3A%20Missing%20Authorization%20in%20PickPlugins%20Question%20Answer&amp;severity=null&amp;id=69cd7383e6bfc5ba1def269a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31809-cross-site-request-forgery-csrf-in--2c7f9812</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31809%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Labinator%20Labinator%20Content%20Types%20Duplicator&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31808-cross-site-request-forgery-csrf-in--383eb7ff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31808%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IT%20Path%20Solutions%20SCSS%20WP%20Editor&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31807-cross-site-request-forgery-csrf-in--155c18f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31807%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CloudRedux%20Product%20Notices%20for%20WooCommerce&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31806-improper-neutralization-of-input-du-16ca3196</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31806%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uSystems%20Webling&amp;severity=null&amp;id=69cd7383e6bfc5ba1def268e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31805-improper-neutralization-of-input-du-6d61a3d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31805%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20Gutena%20Kit%20%E2%80%93%20Gutenberg%20Blocks%20and%20Templates&amp;severity=null&amp;id=69cd7383e6bfc5ba1def268b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31804-improper-neutralization-of-input-du-f9304aa2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31804%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DraftPress%20Team%20Follow%20Us%20Badges&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31803-improper-neutralization-of-input-du-c9a86f59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31803%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Neteuro%20Turisbook%20Booking%20System&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31802-missing-authorization-in-shiptimize-1f73e38a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31802%3A%20Missing%20Authorization%20in%20Shiptimize%20Shiptimize%20for%20WooCommerce&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31801-improper-neutralization-of-input-du-64dd3f9f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31801%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maksym%20Marko%20MX%20Time%20Zone%20Clocks&amp;severity=null&amp;id=69cd7380e6bfc5ba1def2613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31797-improper-neutralization-of-input-du-60791acc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31797%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Sprout%20Clients&amp;severity=null&amp;id=69cd7380e6bfc5ba1def2610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31796-server-side-request-forgery-ssrf-in-9ef8eb14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31796%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TheInnovs%20ElementsCSS%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7380e6bfc5ba1def260d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31793-improper-neutralization-of-input-du-4168b718</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31793%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Forms&amp;severity=null&amp;id=69cd7380e6bfc5ba1def2603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31792-improper-neutralization-of-input-du-57e74525</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31792%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Forms&amp;severity=null&amp;id=69cd7380e6bfc5ba1def25ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31791-missing-authorization-in-oliver-boy-b441590c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31791%3A%20Missing%20Authorization%20in%20Oliver%20Boyers%20Pin%20Generator&amp;severity=null&amp;id=69cd7380e6bfc5ba1def25fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31790-improper-neutralization-of-input-du-9630dd3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31790%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Binsaifullah%20Posten&amp;severity=null&amp;id=69cd7380e6bfc5ba1def25f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31788-insertion-of-sensitive-information--f804521e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31788%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Smackcoders%20Inc.%2C%20AIO%20Performance%20Profiler%2C%20Monitor%2C%20Optimize%2C%20Compress%20%26%20Debug&amp;severity=null&amp;id=69cd7380e6bfc5ba1def25f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31787-missing-authorization-in-audiotheme-75aeefab</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31787%3A%20Missing%20Authorization%20in%20AudioTheme%20Cue&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31786-missing-authorization-in-travis-sim-2343337d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31786%3A%20Missing%20Authorization%20in%20Travis%20Simple%20Icons&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31785-cross-site-request-forgery-csrf-in--3ab7a006</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31785%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Clearbit%20Clearbit%20Reveal&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31784-cross-site-request-forgery-csrf-in--d8262033</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31784%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rudy%20Susanto%20Embed%20Extended&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31783-improper-neutralization-of-input-du-e2996989</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31783%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Leartes.NET%20Leartes%20TRY%20Exchange%20Rates&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31782-missing-authorization-in-pupunzi-mb-d3e77a8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31782%3A%20Missing%20Authorization%20in%20pupunzi%20mb.YTPlayer&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31781-missing-authorization-in-ahmadshyk--cdbc9c0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31781%3A%20Missing%20Authorization%20in%20ahmadshyk%20Gift%20Cards%20for%20WooCommerce&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31780-missing-authorization-in-andy-strat-e097962a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31780%3A%20Missing%20Authorization%20in%20Andy%20Stratton%20Append%20Content&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31779-cross-site-request-forgery-csrf-in--37421fc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31779%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jonathan%20Daggerhart%20Query%20Wrangler&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31778-improper-neutralization-of-input-du-35bf0377</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20raphaelheide%20Donate%20Me&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31777-missing-authorization-in-beasttheme-887878ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31777%3A%20Missing%20Authorization%20in%20BeastThemes%20Clockinator%20Lite&amp;severity=null&amp;id=69cd737de6bfc5ba1def2590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31776-cross-site-request-forgery-csrf-in--ade09a19</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31776%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aphotrax%20Uptime%20Robot%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd737de6bfc5ba1def258d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31775-cross-site-request-forgery-csrf-in--39809868</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31775%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Smackcoders%20Inc.%2C%20Google%20SEO%20Pressor%20Snippet&amp;severity=null&amp;id=69cd737de6bfc5ba1def258a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31774-missing-authorization-in-webprotect-e9bacfd0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31774%3A%20Missing%20Authorization%20in%20WebProtect.ai%20Astra%20Security%20Suite&amp;severity=null&amp;id=69cd737de6bfc5ba1def2587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31773-missing-authorization-in-cedcommerc-1ccf733e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31773%3A%20Missing%20Authorization%20in%20cedcommerce%20Ship%20Per%20Product&amp;severity=null&amp;id=69cd737de6bfc5ba1def2584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31772-improper-neutralization-of-input-du-01d9eb1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31772%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20WP%20Modal%20Popup%20with%20Cookie%20Integration&amp;severity=null&amp;id=69cd737de6bfc5ba1def2581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31771-improper-neutralization-of-input-du-b8ca03d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sultan%20Nasir%20Uddin%20Team%20Members%20for%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd737de6bfc5ba1def257e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31770-improper-neutralization-of-input-du-89441cc1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Content%20Manager%20Light&amp;severity=null&amp;id=69cd737de6bfc5ba1def257b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31769-cross-site-request-forgery-csrf-in--ae9b37e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31769%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NiteoThemes%20CLP%20%E2%80%93%20Custom%20Login%20Page%20by%20NiteoThemes&amp;severity=null&amp;id=69cd737de6bfc5ba1def2578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31767-improper-neutralization-of-input-du-f9aae4c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31767%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Post%20Custom%20Templates%20Lite&amp;severity=null&amp;id=69cd737be6bfc5ba1def2524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31766-improper-neutralization-of-input-du-00da9b82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31766%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PhotoShelter%20PhotoShelter%20for%20Photographers%20Blog%20Feed%20Plugin&amp;severity=null&amp;id=69cd737be6bfc5ba1def2521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31765-missing-authorization-in-themeqx-gd-755f5250</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31765%3A%20Missing%20Authorization%20in%20themeqx%20GDPR%20Cookie%20Notice&amp;severity=null&amp;id=69cd737be6bfc5ba1def251e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31764-improper-neutralization-of-input-du-7b1dabdb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Preliot%20Cache%20control%20by%20Cacholong&amp;severity=null&amp;id=69cd737be6bfc5ba1def251b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31763-cross-site-request-forgery-csrf-in--68c0adf9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31763%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Preliot%20Cache%20control%20by%20Cacholong&amp;severity=null&amp;id=69cd737be6bfc5ba1def2518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31762-improper-neutralization-of-input-du-3771b2f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andreyazimov%20Sheet2Site&amp;severity=null&amp;id=69cd737be6bfc5ba1def2515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31761-improper-neutralization-of-input-du-30e503c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31761%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DEJAN%20Hypotext&amp;severity=null&amp;id=69cd737be6bfc5ba1def2512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31760-improper-neutralization-of-input-du-fac9e30e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snapwidget%20SnapWidget%20Social%20Photo%20Feed%20Widget&amp;severity=null&amp;id=69cd737be6bfc5ba1def250f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31759-improper-neutralization-of-input-du-d7f8be5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BooSpot%20Boo%20Recipes&amp;severity=null&amp;id=69cd737be6bfc5ba1def250c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31757-missing-authorization-in-binarycarp-b918a690</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31757%3A%20Missing%20Authorization%20in%20BinaryCarpenter%20Free%20Woocommerce%20Product%20Table%20View&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31756-cross-site-request-forgery-csrf-in--d8203969</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31756%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tuyennv%20TZ%20PlusGallery&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31755-missing-authorization-in-josselynj--0dbe84d2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31755%3A%20Missing%20Authorization%20in%20josselynj%20pCloud%20Backup&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31754-improper-neutralization-of-input-du-75d8f8fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DobsonDev%20DobsonDev%20Shortcodes&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31752-missing-authorization-in-termel-bul-369ec2cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31752%3A%20Missing%20Authorization%20in%20termel%20Bulk%20Fields%20Editor&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31751-cross-site-request-forgery-csrf-in--ea832fe8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31751%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20doit%20Breaking%20News%20WP&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31750-improper-neutralization-of-input-du-784be994</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20doit%20Breaking%20News%20WP&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31749-improper-neutralization-of-input-du-1b915e6b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPelite%20HMH%20Footer%20Builder%20For%20Elementor&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31748-improper-neutralization-of-input-du-f869b802</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpopal%20Opal%20Portfolio&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31747-improper-neutralization-of-input-du-ee53b806</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31747%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milan.latinovic%20WP%20Chrono&amp;severity=null&amp;id=69cd7375e6bfc5ba1def23a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31745-improper-neutralization-of-input-du-2c842a5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31745%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arni%20Cinco%20Subscription%20Form%20for%20Feedblitz&amp;severity=null&amp;id=69cd7375e6bfc5ba1def239f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31744-improper-neutralization-of-input-du-6e180596</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpszaki%20Lightweight%20and%20Responsive%20Youtube%20Embed&amp;severity=null&amp;id=69cd7375e6bfc5ba1def239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31743-improper-neutralization-of-input-du-3f6e7f9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpszaki%20Lightweight%20and%20Responsive%20Youtube%20Embed&amp;severity=null&amp;id=69cd7375e6bfc5ba1def2399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31742-improper-neutralization-of-input-du-16bbb71d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PixelDima%20Dima%20Take%20Action&amp;severity=null&amp;id=69cd7375e6bfc5ba1def2396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31741-improper-neutralization-of-input-du-53dc4e54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31741%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Filtr8%20Easy%20Magazine&amp;severity=null&amp;id=69cd7375e6bfc5ba1def2393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31740-improper-neutralization-of-input-du-7676f2a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31740%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aThemeArt%20News%2C%20Magazine%20and%20Blog%20Elements&amp;severity=null&amp;id=69cd7375e6bfc5ba1def2390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31738-improper-neutralization-of-input-du-6008b76e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yazamodeveloper%20LeadQuizzes&amp;severity=null&amp;id=69cd7375e6bfc5ba1def2389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31737-improper-neutralization-of-input-du-3a18513f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dxladner%20Client%20Showcase&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31735-improper-neutralization-of-input-du-0feba02f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20C.%20Johnson%20Footnotes%20for%20WordPress&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31734-improper-neutralization-of-input-du-f6c00ad3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Simple%20Post%20Expiration&amp;severity=null&amp;id=69cd7373e6bfc5ba1def231d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31733-improper-neutralization-of-input-du-8fdae0f5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31733%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boot%20Div%20WP%20Sitemap&amp;severity=null&amp;id=69cd7373e6bfc5ba1def231a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31732-missing-authorization-in-gb-plugins-4bfbbeb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31732%3A%20Missing%20Authorization%20in%20gb-plugins%20GB%20Gallery%20Slideshow&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31731-improper-neutralization-of-input-du-22fce52f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31731%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Philip%20John%20Author%20Bio%20Shortcode&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31730-improper-neutralization-of-input-du-52735306</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31730%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DigitalCourt%20Marketer%20Addons&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30224-cwe-200-exposure-of-sensitive-infor-7c915496</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30224%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mydumper%20mydumper&amp;severity=medium&amp;id=6838dc05182aa0cae2910300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1660-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-autodesk-navisworks-freedom-bef99b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1660%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Navisworks%20Freedom&amp;severity=high&amp;id=682d983ec4522896dcbef99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3035-vulnerability-in-mozilla-firefox-4bb6dfb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3035%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69dd057b82d89c981f0174e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3034-memory-safety-bugs-fixed-in-firefox--e356ca5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3034%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69a0a1c885912abc71d0ba90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3033-vulnerability-in-mozilla-firefox-eea95add</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3033%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69dd057b82d89c981f0174dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3032-leaking-file-descriptors-from-the-fo-3df47502</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3032%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69a0a1c885912abc71d0ba8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3031-vulnerability-in-mozilla-firefox-5c48451c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3031%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69dd057b82d89c981f0174d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3030-memory-safety-bugs-fixed-in-firefox--65b02c7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3030%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6909154cc28fd46ded7bb7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3029-url-bar-spoofing-via-non-bmp-unicode-bbdc1e6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3029%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6909154cc28fd46ded7bb7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3028-use-after-free-triggered-by-xsltproc-5b69f1fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3028%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909154cc28fd46ded7bb797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1659-cwe-125-out-of-bounds-read-in-autodesk-navisworks-freedom-bef98a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1659%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Navisworks%20Freedom&amp;severity=high&amp;id=682d983ec4522896dcbef98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1658-cwe-125-out-of-bounds-read-in-autodesk-navisworks-freedom-bef982</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1658%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Navisworks%20Freedom&amp;severity=high&amp;id=682d983ec4522896dcbef982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2237-cwe-269-improper-privilege-managemen-6bbdde9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2237%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ApusThemes%20WP%20RealEstate&amp;severity=critical&amp;id=699f6b1fb7ef31ef0b54e5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13553-cwe-288-authentication-bypass-using-4caa8ea6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13553%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20cozyvision1%20SMS%20Alert%20%E2%80%93%20SMS%20%26%20OTP%20for%20WooCommerce%2C%20Order%20Notifications%20%26%20Abandoned%20Cart%20Recovery&amp;severity=critical&amp;id=699f6e5fb7ef31ef0b59f201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2906-cwe-79-improper-neutralization-of-in-21738c04</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2906%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contempoinc%20Contempo%20Real%20Estate%20Core&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56325-cwe-288-authentication-bypass-using-adbcb906</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56325%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Apache%20Software%20Foundation%20Apache%20Pinot&amp;severity=critical&amp;id=68ffaa64ba6dffc5e2042189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30065-cwe-502-deserialization-of-untrusted-data-in-apache-software-foundation-apache-parquet-java-bd9c08</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30065%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Parquet%20Java&amp;severity=critical&amp;id=682d981bc4522896dcbd9c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2891-cwe-434-unrestricted-upload-of-file--36eae6ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2891%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20contempoinc%20Real%20Estate%207%20WordPress&amp;severity=high&amp;id=699f6b26b7ef31ef0b54eb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1512-cwe-79-improper-neutralization-of-in-d9d3692f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Addons%20for%20Elementor%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54de51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1267-cwe-79-improper-neutralization-of-in-01db749c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trainingbusinesspros%20Groundhogg%20%E2%80%94%20CRM%2C%20Newsletters%2C%20and%20Marketing%20Automation&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12189-cwe-79-improper-neutralization-of-i-d168438e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20WDesignKit%20%E2%80%93%20Elementor%20%26%20Gutenberg%20Starter%20Templates%2C%20Patterns%2C%20Cloud%20Workspace%20%26%20Widget%20Builder&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12278-cwe-79-improper-neutralization-of-i-29037bb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pluggabl%20Booster%20for%20WooCommerce%20%E2%80%93%20PDF%20Invoices%2C%20Abandoned%20Cart%2C%20Variation%20Swatches%20%26%20100%2B%20Tools&amp;severity=high&amp;id=699f6e35b7ef31ef0b597c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31024-improper-neutralization-of-special--d2276c04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31024%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20randyjensen%20RJ%20Quickcharts&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31001-debug-messages-revealing-unnecessar-0009e385</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31001%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20TLA%20Media%20GTM%20Kit&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30971-improper-neutralization-of-special--76e42c6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30971%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Xavi%20Ivars%20XV%20Random%20Quotes&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22277-authentication-bypass-using-an-alte-1245835a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22277%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20appsbd%20Vitepos&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31415-missing-authorization-in-yaycommerc-52be9888</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31415%3A%20Missing%20Authorization%20in%20YayCommerce%20YayExtra&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31095-authentication-bypass-using-an-alte-b7e7ad9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31095%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Hossein%20Material%20Dashboard&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31087-deserialization-of-untrusted-data-i-7fcc336a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31087%3A%20Deserialization%20of%20Untrusted%20Data%20in%20silverplugins217%20Multiple%20Shipping%20And%20Billing%20Address%20For%20Woocommerce&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31084-deserialization-of-untrusted-data-i-2785f736</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31084%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31074-deserialization-of-untrusted-data-i-10ee7f67</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31074%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MDJM%20Mobile%20DJ%20Manager&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30926-missing-authorization-in-kingaddons-3f2223cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30926%3A%20Missing%20Authorization%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30924-improper-neutralization-of-input-du-6f34f17a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30924%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20primersoftware%20Primer%20MyData%20for%20Woocommerce&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30917-improper-neutralization-of-input-du-f095a6d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Wham%20SKU%20Generator%20for%20WooCommerce&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30911-improper-control-of-generation-of-c-81a7177e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30911%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Rometheme%20RTMKit&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30910-improper-limitation-of-a-pathname-t-ca64dda4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30910%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CreativeMindsSolutions%20CM%20Download%20Manager&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30902-improper-neutralization-of-input-du-1787b2b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30902%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ATL%20Software%20SRL%20AEC%20Kiosque&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30901-improper-control-of-filename-for-in-fa7985d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30901%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30886-improper-neutralization-of-special--1db2f7c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30886%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30882-improper-limitation-of-a-pathname-t-d9d71618</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30882%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd732de6bfc5ba1def0be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30880-missing-authorization-in-joomsky-js-07906c3a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30880%3A%20Missing%20Authorization%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30878-improper-limitation-of-a-pathname-t-c39e9733</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30878%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30869-improper-neutralization-of-input-du-d87087cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30869%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Parakoos%20Image%20Wall&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30849-improper-control-of-filename-for-in-5d51bfa8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30849%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30848-improper-neutralization-of-input-du-0fb35719</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30848%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Hostel&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30840-improper-neutralization-of-input-du-1c4d3de0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30840%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-dictionary&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30837-improper-neutralization-of-input-du-ce77092b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30837%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cristiano%20Zanca%20WooCommerce%20Fattureincloud&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30834-path-traversal-in-bit-apps-bit-assi-821448b7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30834%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Bit%20Apps%20Bit%20Assist&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30827-improper-neutralization-of-input-du-0de1a340</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30827%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30808-improper-neutralization-of-input-du-e8bcc595</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30808%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Weblizar%20-%20WordPress%20Themes%20%26amp%3B%20Plugin%20About%20Author&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30802-exposure-of-sensitive-system-inform-b9a3a683</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30802%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPBean%20Our%20Team%20Members&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30798-improper-neutralization-of-input-du-d32330e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30798%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rickonline_nl%20Better%20WishList%20API&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30797-missing-authorization-in-bigdropgr--f3d0acf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30797%3A%20Missing%20Authorization%20in%20bigdrop.gr%20Greek%20Multi%20Tool%20%E2%80%93%20Fix%20peralinks%2C%20accents%2C%20auto%20create%20menus%20and%20more&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30796-improper-neutralization-of-input-du-76ed21d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30796%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Extended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30794-improper-neutralization-of-input-du-c842fcd2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30794%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20Event%20Tickets&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30793-improper-limitation-of-a-pathname-t-6b77972e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30793%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Property%20Hive%20Houzez%20Property%20Feed&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30782-improper-control-of-filename-for-in-61bfacbe</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30782%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20Subscribe%20to%20Download%20Lite&amp;severity=null&amp;id=69cd730be6bfc5ba1def04d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30774-improper-neutralization-of-special--50cd01ba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30774%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30622-improper-neutralization-of-special--1a98fa9e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30622%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20torsteino%20PostMash&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30614-improper-neutralization-of-input-du-c50fae67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Haozhe%20Xie%20Google%20Font%20Fix&amp;severity=null&amp;id=69cd7307e6bfc5ba1def01fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30613-improper-neutralization-of-input-du-3670c3c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30613%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20N-Media%20Nmedia%20MailChimp&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30607-improper-neutralization-of-input-du-7050599b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Name.ly%20Quick%20Localization&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30594-improper-limitation-of-a-pathname-t-a16fec08</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30594%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20samsk%20Include%20URL&amp;severity=null&amp;id=69cd7303e6bfc5ba1def012e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30589-improper-neutralization-of-special--73b2af69</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30589%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dourou%20Flickr%20set%20slideshows&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30579-improper-neutralization-of-input-du-7748790d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jakeii%20Pesapal%20Gateway%20for%20Woocommerce&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30563-improper-neutralization-of-input-du-3ae4e30a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20makong%20Tidekey&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30559-improper-neutralization-of-input-du-9347dfe1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsPoint%20Kento%20WordPress%20Stats&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30548-improper-neutralization-of-input-du-549bb52b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VarDump%20s.r.l.%20Advanced%20Post%20Search&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30547-improper-neutralization-of-input-du-060ce8f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Tufts%20WP%20Cards&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefde1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30544-improper-neutralization-of-input-du-e1cb32b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20svmidi%20OK%20Poster%20Group&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefdd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30520-improper-neutralization-of-input-du-ec03c4ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crosstec%20Breezing%20Forms&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1665-cwe-79-improper-neutralization-of-in-862f3778</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13567-cwe-200-exposure-of-sensitive-infor-2237a86c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13567%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=high&amp;id=699f6e61b7ef31ef0b59f411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2008-cwe-434-unrestricted-upload-of-file--4b3414d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2008%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2007-cwe-23-relative-path-traversal-in-sm-8832a31c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2007%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21384-cwe-693-protection-mechanism-failure-in-microsoft-azure-health-bot-aeb2fa</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21384%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Azure%20Health%20Bot&amp;severity=high&amp;id=682cd0f81484d88663aeb2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-01-2b0a53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-01&amp;severity=medium&amp;id=682c7db5e8347ec82d2b0a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-01-f12480</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f12480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24167-a-downloads-origin-may-be-incorrect-a82cac35</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24167%3A%20A%20download&apos;s%20origin%20may%20be%20incorrectly%20associated%20in%20Apple%20Safari&amp;severity=critical&amp;id=69091538c28fd46ded7baa10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30470-an-app-may-be-able-to-read-sensitiv-7d5af27e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30470%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091545c28fd46ded7bb5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30427-processing-maliciously-crafted-web--a7b2a511</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30427%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091543c28fd46ded7bb322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24262-a-sandboxed-app-may-be-able-to-acce-80e41871</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24262%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20system%20logs%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e14c28fd46ded86967f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40864-an-attacker-in-a-privileged-network-a9a79855</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40864%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20track%20a%20user&apos;s%20activity%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=6909214efe7723195e054580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24235-a-remote-attacker-may-be-able-to-ca-a2b525d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24235%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20or%20heap%20corruption%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092142fe7723195e053e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24242-an-app-with-root-privileges-may-be--73fe6a8e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24242%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e13c28fd46ded8695f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24215-a-malicious-app-may-be-able-to-acce-263796a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24215%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20iPadOS&amp;severity=medium&amp;id=69092140fe7723195e053aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24203-an-app-may-be-able-to-modify-protec-120de62d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24203%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092140fe7723195e053a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24192-visiting-a-website-may-leak-sensiti-92a91d12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24192%3A%20Visiting%20a%20website%20may%20leak%20sensitive%20data%20in%20Apple%20Safari&amp;severity=medium&amp;id=6909213efe7723195e053a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24254-a-user-may-be-able-to-elevate-privi-15e75c5f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24254%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e14c28fd46ded869657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30450-an-app-may-be-able-to-access-sensit-739f2f61</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30450%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e1ac28fd46ded869931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31187-an-app-may-be-able-to-modify-protec-3d833083</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31187%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e1dc28fd46ded869b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24278-an-app-may-be-able-to-access-protec-bde07eb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24278%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e16c28fd46ded869721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24281-an-app-may-be-able-to-access-sensit-b6dd4e31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24281%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e18c28fd46ded869861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30446-a-malicious-app-with-root-privilege-5e1d4f2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30446%3A%20A%20malicious%20app%20with%20root%20privileges%20may%20be%20able%20to%20modify%20the%20contents%20of%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e1ac28fd46ded869921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24239-an-app-may-be-able-to-access-protec-b7c2d0ff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24239%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e13c28fd46ded8695e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31191-an-app-may-be-able-to-access-sensitive-user-data-in-apple-tvos-bd7181</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31191%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d9817c4522896dcbd7181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24238-an-app-may-be-able-to-gain-elevated-cd22c68e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24238%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909153bc28fd46ded7bac5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30447-an-app-may-be-able-to-access-sensit-4de92c4f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30447%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091545c28fd46ded7bb5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24280-an-app-may-be-able-to-access-user-s-31a2f2f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24280%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e16c28fd46ded869731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24279-an-app-may-be-able-to-access-contac-21d6bf2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24279%3A%20An%20app%20may%20be%20able%20to%20access%20contacts%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e16c28fd46ded869729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30451-an-app-may-be-able-to-access-sensit-9dcc4641</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30451%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e1bc28fd46ded869a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24255-an-app-may-be-able-to-break-out-of--22518c42</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24255%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e14c28fd46ded86965f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24193-an-attacker-with-a-usb-c-connection-f5c5d8d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24193%3A%20An%20attacker%20with%20a%20USB-C%20connection%20to%20an%20unlocked%20device%20may%20be%20able%20to%20programmatically%20access%20photos%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=6909213efe7723195e053a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24202-an-app-may-be-able-to-access-sensit-273dd378</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24202%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092140fe7723195e053a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24214-an-app-may-be-able-to-access-sensit-d963dfbb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24214%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7bac23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24097-an-app-may-be-able-to-read-arbitrar-8682d8ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24097%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20file%20metadata%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091538c28fd46ded7ba9f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24243-processing-a-maliciously-crafted-fi-8436a2ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24243%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6909153bc28fd46ded7bac64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24234-a-malicious-app-may-be-able-to-gain-94c4457d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24234%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092142fe7723195e053e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24263-an-app-may-be-able-to-observe-unpro-ee30534f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24263%3A%20An%20app%20may%20be%20able%20to%20observe%20unprotected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded869683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24170-an-app-may-be-able-to-gain-root-pri-3cf246e3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24170%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6909213cfe7723195e05394a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30426-an-app-may-be-able-to-enumerate-a-u-80ea5484</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30426%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69091543c28fd46ded7bb31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24259-an-app-may-be-able-to-retrieve-safa-e32afa0a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24259%3A%20An%20app%20may%20be%20able%20to%20retrieve%20Safari%20bookmarks%20without%20an%20entitlement%20check%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=6909153bc28fd46ded7bac7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30471-a-remote-user-may-be-able-to-cause--892741c3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30471%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69091545c28fd46ded7bb5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30467-visiting-a-malicious-website-may-le-f733527d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30467%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091545c28fd46ded7bb5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24218-an-app-may-be-able-to-access-inform-cf42f093</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24218%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092140fe7723195e053ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30430-password-autofill-may-fill-in-passw-05226177</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30430%3A%20Password%20autofill%20may%20fill%20in%20passwords%20after%20failing%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69091543c28fd46ded7bb336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24182-processing-a-maliciously-crafted-fo-d8aac991</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24182%3A%20Processing%20a%20maliciously%20crafted%20font%20may%20result%20in%20the%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7babe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24244-processing-a-maliciously-crafted-fo-a3c5165c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24244%3A%20Processing%20a%20maliciously%20crafted%20font%20may%20result%20in%20the%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909153bc28fd46ded7bac6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24213-a-type-confusion-issue-could-lead-to-memory-corruption-in-apple-tvos-bd5fe3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24213%3A%20A%20type%20confusion%20issue%20could%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682d9815c4522896dcbd5fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24205-an-app-may-be-able-to-access-user-s-5a91cecb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24205%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092140fe7723195e053a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24194-processing-maliciously-crafted-web--342d6a39</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24194%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20result%20in%20the%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7babfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30456-an-app-may-be-able-to-gain-root-pri-aad8d5f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30456%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69091e1bc28fd46ded869aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24229-a-sandboxed-app-may-be-able-to-acce-6ca30ad8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24229%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69092142fe7723195e053de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24157-an-app-may-be-able-to-cause-unexpec-fa79712c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24157%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213cfe7723195e0538ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24248-an-app-may-be-able-to-enumerate-dev-fcdb554d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24248%3A%20An%20app%20may%20be%20able%20to%20enumerate%20devices%20that%20have%20signed%20into%20the%20user&apos;s%20Apple%20Account%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e13c28fd46ded86960f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30437-an-app-may-be-able-to-corrupt-copro-3564b855</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30437%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e19c28fd46ded869911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30460-an-app-may-be-able-to-access-protec-8e670d51</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30460%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e1bc28fd46ded869abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24209-processing-maliciously-crafted-web--2e0ce990</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24209%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=high&amp;id=69091539c28fd46ded7bac06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24198-an-attacker-with-physical-access-ma-81a98925</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24198%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20use%20Siri%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909213efe7723195e053a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54533-an-app-may-be-able-to-access-sensit-f054e522</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54533%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=690916cac28fd46ded7ccfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24272-an-app-may-be-able-to-modify-protec-78178c24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24272%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e16c28fd46ded869709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24264-processing-maliciously-crafted-web--9f552870</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24264%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=critical&amp;id=6909153bc28fd46ded7bac83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24233-a-malicious-app-may-be-able-to-read-3f762d76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24233%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20or%20write%20to%20protected%20files%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092142fe7723195e053dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24232-a-malicious-app-may-be-able-to-acce-5fa8894a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24232%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092142fe7723195e053df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24265-an-app-may-be-able-to-cause-unexpec-7ed98799</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24265%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e16c28fd46ded8696ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24273-an-app-may-be-able-to-cause-unexpec-e3e5efcb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24273%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=688a5e4dad5a09ad00ad892a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24199-an-app-may-be-able-to-cause-a-denia-37c127e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24199%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092140fe7723195e053a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24208-loading-a-malicious-iframe-may-lead-44dd12ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24208%3A%20Loading%20a%20malicious%20iframe%20may%20lead%20to%20a%20cross-site%20scripting%20attack%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091539c28fd46ded7bac01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30461-an-app-may-be-able-to-access-protec-8ca76c27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30461%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1bc28fd46ded869ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24249-an-app-may-be-able-to-check-the-exi-d3bd45f6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24249%3A%20An%20app%20may%20be%20able%20to%20check%20the%20existence%20of%20an%20arbitrary%20path%20on%20the%20file%20system%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded86963f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30441-an-app-may-be-able-to-overwrite-arb-dfea9882</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30441%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69091e19c28fd46ded869915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24269-an-app-may-be-able-to-cause-unexpec-f4ccbb74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24269%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e16c28fd46ded869705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24228-an-app-may-be-able-to-execute-arbit-fb9bb365</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24228%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092142fe7723195e053ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30457-a-malicious-app-may-be-able-to-crea-2af8c225</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30457%3A%20A%20malicious%20app%20may%20be%20able%20to%20create%20symlinks%20to%20protected%20regions%20of%20the%20disk%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1bc28fd46ded869ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24253-an-app-may-be-able-to-access-protec-aa1ec670</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24253%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded86964f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24195-a-user-may-be-able-to-elevate-privi-ccb1761f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24195%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=critical&amp;id=6909213efe7723195e053a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24204-an-app-may-be-able-to-access-protec-ac858e09</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24204%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092140fe7723195e053a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24212-an-app-may-be-able-to-break-out-of--e0651077</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24212%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7bac19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24245-a-malicious-app-may-be-able-to-acce-2c861ebb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24245%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20a%20user&apos;s%20saved%20passwords%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e13c28fd46ded8695fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31183-an-app-may-be-able-to-access-sensit-52101558</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31183%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909154cc28fd46ded7bb790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30454-a-malicious-app-may-be-able-to-acce-47dd71de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30454%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091545c28fd46ded7bb5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24250-a-malicious-app-acting-as-a-https-p-1bd31d57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24250%3A%20A%20malicious%20app%20acting%20as%20a%20HTTPS%20proxy%20could%20get%20access%20to%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded869647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24196-an-attacker-with-user-privileges-ma-8aabfbd9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24196%3A%20An%20attacker%20with%20user%20privileges%20may%20be%20able%20to%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=688a5e4dad5a09ad00ad8926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24207-an-app-may-be-able-to-enable-icloud-e6fb6c87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24207%3A%20An%20app%20may%20be%20able%20to%20enable%20iCloud%20storage%20features%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092140fe7723195e053a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24211-processing-a-maliciously-crafted-vi-87b933b9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24211%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69092140fe7723195e053a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24246-an-app-may-be-able-to-access-user-s-e8290301</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24246%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e13c28fd46ded8695ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30439-an-attacker-with-physical-access-to-9ab9ae48</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30439%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091545c28fd46ded7bb5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24180-a-malicious-website-may-be-able-to--5d3e2d14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24180%3A%20A%20malicious%20website%20may%20be%20able%20to%20claim%20WebAuthn%20credentials%20from%20another%20website%20that%20shares%20a%20registrable%20suffix%20in%20Apple%20Safari&amp;severity=high&amp;id=69091538c28fd46ded7baa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24231-an-app-may-be-able-to-modify-protec-d95d5858</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24231%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092142fe7723195e053def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24266-an-app-may-be-able-to-cause-unexpec-bb969c85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24266%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e16c28fd46ded8696f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30458-an-app-may-be-able-to-read-files-ou-698e4c6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30458%3A%20An%20app%20may%20be%20able%20to%20read%20files%20outside%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1bc28fd46ded869ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30462-apps-that-appear-to-use-app-sandbox-0f6fdfce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30462%3A%20Apps%20that%20appear%20to%20use%20App%20Sandbox%20may%20be%20able%20to%20launch%20without%20restrictions%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1bc28fd46ded869ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30435-a-sandboxed-app-may-be-able-to-acce-4ee03e54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30435%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20system%20logs%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e19c28fd46ded86990d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30434-processing-a-maliciously-crafted-fi-3f97e036</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30434%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20a%20cross%20site%20scripting%20attack%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091e19c28fd46ded869909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30463-an-app-may-be-able-to-access-sensit-d490632c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30463%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091e1bc28fd46ded869ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24226-a-malicious-app-may-be-able-to-acce-93bc302a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24226%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69092142fe7723195e053ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24267-an-app-may-be-able-to-gain-root-pri-4551b1c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24267%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e16c28fd46ded8696fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24230-playing-a-malicious-audio-file-may--fc9cb789</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24230%3A%20Playing%20a%20malicious%20audio%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909153bc28fd46ded7bac49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30438-a-malicious-app-may-be-able-to-dism-82f2b139</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30438%3A%20A%20malicious%20app%20may%20be%20able%20to%20dismiss%20the%20system%20notification%20on%20the%20Lock%20Screen%20that%20a%20recording%20was%20started%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68b092cead5a09ad006e7758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24181-an-app-may-be-able-to-access-protec-74d4502b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24181%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=6909213efe7723195e053a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24247-an-attacker-may-be-able-to-cause-un-f44d5835</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24247%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e13c28fd46ded869607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24210-parsing-an-image-may-lead-to-disclo-e35a35bb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24210%3A%20Parsing%20an%20image%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7bac0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24178-an-app-may-be-able-to-break-out-of--4f84363d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24178%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69091538c28fd46ded7baa20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30455-a-malicious-app-may-be-able-to-acce-be6cce81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30455%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e1bc28fd46ded869aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31182-an-app-may-be-able-to-delete-files--68643fa8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31182%3A%20An%20app%20may%20be%20able%20to%20delete%20files%20for%20which%20it%20does%20not%20have%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909154cc28fd46ded7bb787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30443-an-app-may-be-able-to-access-user-s-90988b7d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30443%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091545c28fd46ded7bb5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31194-a-shortcut-may-run-with-admin-privi-54711662</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31194%3A%20A%20Shortcut%20may%20run%20with%20admin%20privileges%20without%20authentication%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1dc28fd46ded869b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24237-an-app-may-be-able-to-cause-unexpec-f590157a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24237%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909153bc28fd46ded7bac53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24260-an-attacker-in-a-privileged-positio-45c06361</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24260%3A%20An%20attacker%20in%20a%20privileged%20position%20may%20be%20able%20to%20perform%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded86966f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24276-a-malicious-app-may-be-able-to-acce-cfef3340</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24276%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e16c28fd46ded869711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24221-sensitive-keychain-data-may-be-acce-52ea0181</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24221%3A%20Sensitive%20keychain%20data%20may%20be%20accessible%20from%20an%20iOS%20backup%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092140fe7723195e053abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30425-a-malicious-website-may-be-able-to--6d38eae6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30425%3A%20A%20malicious%20website%20may%20be%20able%20to%20track%20users%20in%20Safari%20private%20browsing%20mode%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091543c28fd46ded7bb312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24173-an-app-may-be-able-to-break-out-of--14fc68c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24173%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69091538c28fd46ded7baa16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30464-an-app-may-be-able-to-cause-unexpec-5b4182cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30464%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e1dc28fd46ded869b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30433-a-shortcut-may-be-able-to-access-fi-2c87fa8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30433%3A%20A%20shortcut%20may%20be%20able%20to%20access%20files%20that%20are%20normally%20inaccessible%20to%20the%20Shortcuts%20app%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69091543c28fd46ded7bb345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30444-mounting-a-maliciously-crafted-smb--e406029f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30444%3A%20Mounting%20a%20maliciously%20crafted%20SMB%20network%20share%20may%20lead%20to%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1ac28fd46ded869919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24283-an-app-may-be-able-to-access-sensit-05ceec51</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24283%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909153bc28fd46ded7bac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30452-an-input-validation-issue-was-addre-569a84c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30452%3A%20An%20input%20validation%20issue%20was%20addressed%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1bc28fd46ded869a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24256-an-app-may-be-able-to-disclose-kern-de2b792a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24256%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded869667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24190-processing-a-maliciously-crafted-vi-f324faf2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24190%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69091539c28fd46ded7babf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30429-an-app-may-be-able-to-break-out-of--06f9fe3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30429%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091543c28fd46ded7bb32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24217-an-app-may-be-able-to-access-sensit-13597cc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24217%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7bac34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24240-an-app-may-be-able-to-access-user-s-9837096b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24240%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e13c28fd46ded8695e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24241-an-app-may-be-able-to-trick-a-user--70adaf17</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24241%3A%20An%20app%20may%20be%20able%20to%20trick%20a%20user%20into%20copying%20sensitive%20data%20to%20the%20pasteboard%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e13c28fd46ded8695ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30469-a-person-with-physical-access-to-an-3d0cbd28</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30469%3A%20A%20person%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20access%20photos%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69091e1dc28fd46ded869b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24095-an-app-may-be-able-to-bypass-privac-2b992213</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24095%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69091a50c28fd46ded81d1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24216-processing-maliciously-crafted-web--ed320aa7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24216%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091539c28fd46ded7bac2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24191-an-app-may-be-able-to-modify-protec-d88a721a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24191%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213efe7723195e053a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30428-photos-in-the-hidden-photos-album-m-565ac100</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30428%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091e19c28fd46ded869903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24257-an-app-may-be-able-to-cause-unexpec-41227ad2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24257%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6909153bc28fd46ded7bac77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31184-an-app-may-gain-unauthorized-access-5f8126bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31184%3A%20An%20app%20may%20gain%20unauthorized%20access%20to%20Local%20Network%20in%20Apple%20Safari&amp;severity=high&amp;id=69091e1dc28fd46ded869b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24282-an-app-may-be-able-to-modify-protec-ae594235</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24282%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e18c28fd46ded869865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31192-a-website-may-be-able-to-access-sen-f814756e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31192%3A%20A%20website%20may%20be%20able%20to%20access%20sensor%20information%20without%20user%20consent%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091e1dc28fd46ded869b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30432-a-malicious-app-may-be-able-to-atte-5d89196c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30432%3A%20A%20malicious%20app%20may%20be%20able%20to%20attempt%20passcode%20entries%20on%20a%20locked%20device%20and%20thereby%20cause%20escalating%20time%20delays%20after%204%20failures%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091543c28fd46ded7bb33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24164-an-app-may-be-able-to-modify-protec-b7f26797</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24164%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213cfe7723195e05393c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30465-a-shortcut-may-be-able-to-access-fi-b5772062</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30465%3A%20A%20shortcut%20may%20be%20able%20to%20access%20files%20that%20are%20normally%20inaccessible%20to%20the%20Shortcuts%20app%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=69091e1dc28fd46ded869b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30424-deleting-a-conversation-in-messages-285f40b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30424%3A%20Deleting%20a%20conversation%20in%20Messages%20may%20expose%20user%20contact%20information%20in%20system%20logging%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e19c28fd46ded8698fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24172-block-all-remote-content-may-not-ap-fa4ca12e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24172%3A%20%22Block%20All%20Remote%20Content%22%20may%20not%20apply%20for%20all%20mail%20previews%20in%20Apple%20macOS&amp;severity=critical&amp;id=6909213efe7723195e053a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31188-an-app-may-be-able-to-bypass-privac-f9c9b998</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31188%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e1dc28fd46ded869b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24277-an-app-may-be-able-to-gain-root-pri-2941fdd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24277%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e16c28fd46ded869719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24261-an-app-may-be-able-to-modify-protec-1a1a3da6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24261%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e14c28fd46ded869677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24148-a-malicious-jar-file-may-bypass-gat-1f07178a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24148%3A%20A%20malicious%20JAR%20file%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213afe7723195e05381c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24236-an-app-may-be-able-to-access-sensit-43788f14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24236%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e13c28fd46ded8695dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30449-an-app-may-be-able-to-gain-root-pri-966b7ede</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30449%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e1ac28fd46ded869929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3059-vulnerability-in-drupal-profile-private-beed2e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3059%3A%20Vulnerability%20in%20Drupal%20Profile%20Private&amp;severity=medium&amp;id=682d983cc4522896dcbeed2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31697-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-formatter-suite-beec72</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Formatter%20Suite&amp;severity=medium&amp;id=682d983cc4522896dcbeec72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31696-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-rapidoc-oas-field-formatter-beec6e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20RapiDoc%20OAS%20Field%20Formatter&amp;severity=medium&amp;id=682d983cc4522896dcbeec6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31695-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-link-field-display-mode-formatter-beec6a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Link%20field%20display%20mode%20formatter&amp;severity=medium&amp;id=682d983cc4522896dcbeec6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31694-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-drupal-two-factor-authentication-tfa-beec66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31694%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Two-factor%20Authentication%20(TFA)&amp;severity=high&amp;id=682d983cc4522896dcbeec66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26683-cwe-285-improper-authorization-in-microsoft-azure-playwright-aeb3ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26683%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Playwright&amp;severity=high&amp;id=682cd0f81484d88663aeb3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31691-cwe-862-missing-authorization-in-drupal-oauth2-server-beec62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31691%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20OAuth2%20Server&amp;severity=critical&amp;id=682d983cc4522896dcbeec62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31690-cwe-352-cross-site-request-forgery-csrf-in-drupal-cache-utility-beec5e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31690%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Cache%20Utility&amp;severity=high&amp;id=682d983cc4522896dcbeec5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31689-cwe-352-cross-site-request-forgery-csrf-in-drupal-general-data-protection-regulation-beec4d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31689%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20General%20Data%20Protection%20Regulation&amp;severity=high&amp;id=682d983cc4522896dcbeec4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31688-cwe-352-cross-site-request-forgery-csrf-in-drupal-configuration-split-beebb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31688%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Configuration%20Split&amp;severity=medium&amp;id=682d983cc4522896dcbeebb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31687-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-spamspan-filter-beec2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20SpamSpan%20filter&amp;severity=medium&amp;id=682d983cc4522896dcbeec2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31686-cwe-862-missing-authorization-in-drupal-open-social-beebb4</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31686%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Open%20Social&amp;severity=high&amp;id=682d983cc4522896dcbeebb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31685-cwe-862-missing-authorization-in-drupal-open-social-beebb0</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31685%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Open%20Social&amp;severity=critical&amp;id=682d983cc4522896dcbeebb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31684-cwe-352-cross-site-request-forgery-csrf-in-drupal-oauth2-client-beebac</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31684%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20OAuth2%20Client&amp;severity=medium&amp;id=682d983cc4522896dcbeebac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31683-cwe-352-cross-site-request-forgery-csrf-in-drupal-google-tag-beeb9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31683%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Google%20Tag&amp;severity=medium&amp;id=682d983cc4522896dcbeeb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31682-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-google-tag-beeb99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Google%20Tag&amp;severity=medium&amp;id=682d983cc4522896dcbeeb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31681-cwe-862-missing-authorization-in-drupal-authenticator-login-beeb67</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31681%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Authenticator%20Login&amp;severity=critical&amp;id=682d983cc4522896dcbeeb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31680-cwe-352-cross-site-request-forgery-csrf-in-drupal-matomo-analytics-beeb63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31680%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Matomo%20Analytics&amp;severity=medium&amp;id=682d983cc4522896dcbeeb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31679-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-ignition-error-pages-beeb5f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31679%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Ignition%20Error%20Pages&amp;severity=medium&amp;id=682d983cc4522896dcbeeb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31678-cwe-862-missing-authorization-in-drupal-ai-artificial-intelligence-beeb5b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31678%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=high&amp;id=682d983cc4522896dcbeeb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31677-cwe-352-cross-site-request-forgery-csrf-in-drupal-ai-artificial-intelligence-beeb57</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31677%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=high&amp;id=682d983cc4522896dcbeeb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31676-cwe-1390-weak-authentication-in-drupal-email-tfa-beeb53</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31676%3A%20CWE-1390%20Weak%20Authentication%20in%20Drupal%20Email%20TFA&amp;severity=high&amp;id=682d983cc4522896dcbeeb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31675-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-drupal-core-beeae9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=682d983cc4522896dcbeeae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31673-cwe-863-incorrect-authorization-in-drupal-drupal-core-beeae1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31673%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=682d983cc4522896dcbeeae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21893-vulnerability-in-linux-linux-be8b33</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31128-cwe-79-improper-neutralization-of-i-f7b0ecde</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31128%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rubentd%20gifplayer&amp;severity=medium&amp;id=684b454f358c65714e6b0226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31125-cwe-200-exposure-of-sensitive-infor-fa40c483</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31125%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20vitejs%20vite&amp;severity=medium&amp;id=697271914623b1157c8544af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30006-cwe-79-improper-neutralization-of-i-3a3cb609</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30006%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xorcom%20CompletePBX&amp;severity=medium&amp;id=6929c5924121026312b3ca60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30005-cwe-22-improper-limitation-of-a-pat-9fe882a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30005%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Xorcom%20CompletePBX&amp;severity=high&amp;id=6929c5924121026312b3ca5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30004-cwe-78-improper-neutralization-of-s-82f0e846</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30004%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Xorcom%20CompletePBX&amp;severity=high&amp;id=6929c5924121026312b3ca58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2292-cwe-22-improper-limitation-of-a-path-b4a71292</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2292%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Xorcom%20CompletePBX&amp;severity=medium&amp;id=6929c5924121026312b3ca54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2794-cwe-470-use-of-externally-controlled-83f72599</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2794%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Kentico%20Xperience&amp;severity=high&amp;id=690a3b69ff58c9332ff0a5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3048-cwe-22-improper-limitation-of-a-path-355ec559</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3048%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20AWS%20AWS%20Serverless%20Application%20Model%20Command%20Line%20Interface&amp;severity=medium&amp;id=68ee9812d8f994a66ec3232f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3047-cwe-22-improper-limitation-of-a-path-7c50b0fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3047%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20AWS%20AWS%20Serverless%20Application%20Model%20Command%20Line%20Interface&amp;severity=medium&amp;id=68ee9812d8f994a66ec3232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31629-improper-neutralization-of-input-du-57e40db5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jacob%20Allred%20Infusionsoft%20Web%20Form%20JavaScript&amp;severity=null&amp;id=69cd7373e6bfc5ba1def230b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31627-improper-neutralization-of-input-du-aa5b2430</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=null&amp;id=69cd7371e6bfc5ba1def221c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31625-improper-neutralization-of-input-du-a7bf7239</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ramanparashar%20Useinfluence&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31624-improper-neutralization-of-input-du-b8fa3ac2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LABCAT%20Processing%20Projects&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31623-cross-site-request-forgery-csrf-in--cfabc7d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31623%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20richtexteditor%20Rich%20Text%20Editor&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31621-improper-neutralization-of-input-du-2f4ea6d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidpaulsson%20byBrick%20Accordion&amp;severity=null&amp;id=69cd7371e6bfc5ba1def220a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31620-improper-neutralization-of-input-du-ed6f6302</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carperfer%20CoverManager&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31618-missing-authorization-in-jaap-jansm-ce634aa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31618%3A%20Missing%20Authorization%20in%20Jaap%20Jansma%20Connector%20to%20CiviCRM%20with%20CiviMcRestFace&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31617-cross-site-request-forgery-csrf-in--ac80daf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Gagan%20Deep%20Singh%20PostmarkApp%20Email%20Integrator&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31616-cross-site-request-forgery-csrf-in--6759a0e4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31616%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AdminGeekZ%20Varnish%20WordPress&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31615-improper-neutralization-of-input-du-b9ad90bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20owenr88%20Simple%20Contact%20Forms&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31614-improper-neutralization-of-input-du-e6156864</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hiroprot%20Terms%20Before%20Download&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31613-cross-site-request-forgery-csrf-in--9336a20f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31613%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aboobacker.%20AB%20Google%20Map%20Travel&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31611-missing-authorization-in-shaharia-a-dab6c252</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31611%3A%20Missing%20Authorization%20in%20Shaharia%20Azam%20Auto%20Post%20After%20Image%20Upload&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31610-improper-neutralization-of-input-du-435592f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gingerplugins%20Notification%20Bar%2C%20Sticky%20Notification%20Bar%2C%20Sticky%20Welcome%20Bar%20for%20any%20theme&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31609-missing-authorization-in-arni-cinco-252afc48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31609%3A%20Missing%20Authorization%20in%20Arni%20Cinco%20WPCargo%20Track%20%26%20Trace&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31608-improper-neutralization-of-input-du-5ff4dc5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31608%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reDim%20GmbH%20CookieHint%20WP&amp;severity=null&amp;id=69cd736ee6bfc5ba1def21a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31607-improper-neutralization-of-input-du-736236fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flomei%20Simple-Audioplayer&amp;severity=null&amp;id=69cd736ee6bfc5ba1def21a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31606-missing-authorization-in-softpulsei-7305e327</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31606%3A%20Missing%20Authorization%20in%20softpulseinfotech%20SP%20Blog%20Designer&amp;severity=null&amp;id=69cd736ee6bfc5ba1def21a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31605-improper-neutralization-of-input-du-02d3f0a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WeblineIndia%20Welcome%20Popup&amp;severity=null&amp;id=69cd736ee6bfc5ba1def219e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31603-missing-authorization-in-moshensky--c35aa104</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31603%3A%20Missing%20Authorization%20in%20moshensky%20CF7%20Spreadsheets&amp;severity=null&amp;id=69cd736ee6bfc5ba1def219b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31602-cross-site-request-forgery-csrf-in--9bc15655</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31602%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Proptech%20Plugin%20Apimo%20Connector&amp;severity=null&amp;id=69cd736ee6bfc5ba1def2198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31601-cross-site-request-forgery-csrf-in--2abf03bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31601%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20appointy%20Appointy%20Appointment%20Scheduler&amp;severity=null&amp;id=69cd736ee6bfc5ba1def2195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31600-cross-site-request-forgery-csrf-in--441ec8d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31600%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20designnbuy%20DesignO&amp;severity=null&amp;id=69cd736ee6bfc5ba1def2192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31598-improper-neutralization-of-input-du-d7697d76</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Quantity%20Dynamic%20Pricing%20%26%20Bulk%20Discounts%20for%20WooCommerce&amp;severity=null&amp;id=69cd736ee6bfc5ba1def218c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31597-improper-neutralization-of-input-du-c44cefb3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31597%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crazycric%20Ultimate%20Live%20Cricket%20WordPress%20Lite&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31596-missing-authorization-in-chatwee-ch-841738a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31596%3A%20Missing%20Authorization%20in%20Chatwee%20Chat%20by%20Chatwee&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31595-improper-neutralization-of-input-du-6355428e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Timeline%20Event%20History&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31592-improper-neutralization-of-input-du-c1f2b96a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paolo%20Melchiorre%20Send%20E-mail&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31591-improper-neutralization-of-input-du-26ab59e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31591%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20promoz73%20Exit%20Popup%20Free&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31590-improper-neutralization-of-input-du-3414b657</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Denra.com%20WP%20Date%20and%20Time%20Shortcode&amp;severity=null&amp;id=69cd736ce6bfc5ba1def209f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31589-improper-neutralization-of-input-du-99370171</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kibru%20Demeke%20Ethiopian%20Calendar&amp;severity=null&amp;id=69cd736ce6bfc5ba1def209c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31588-cross-site-request-forgery-csrf-in--7253e9c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31588%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20elfsight%20Elfsight%20Testimonials%20Slider&amp;severity=null&amp;id=69cd736ce6bfc5ba1def2099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31587-improper-neutralization-of-input-du-90428b82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elfsight%20Elfsight%20Testimonials%20Slider&amp;severity=null&amp;id=69cd736ce6bfc5ba1def2096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31586-improper-neutralization-of-input-du-c79d2bc9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Gallery%20%E2%80%93%20Photo%20Albums%20Plugin&amp;severity=null&amp;id=69cd736ae6bfc5ba1def207f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31585-cross-site-request-forgery-csrf-in--cab43f09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31585%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20leadfox%20Leadfox%20for%20WordPress&amp;severity=null&amp;id=69cd736ae6bfc5ba1def207c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31584-missing-authorization-in-elfsight-e-97f0a8c1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31584%3A%20Missing%20Authorization%20in%20elfsight%20Elfsight%20Testimonials%20Slider&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31583-cross-site-request-forgery-csrf-in--9e94d5a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31583%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ashish%20Ajani%20WP%20Copy%20Media%20URL&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31576-missing-authorization-in-gagan-deep-65b2505e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31576%3A%20Missing%20Authorization%20in%20Gagan%20Deep%20Singh%20PostmarkApp%20Email%20Integrator&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31575-improper-neutralization-of-script-r-09990d4b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31575%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Vasilis%20Triantafyllou%20Flag%20Icons&amp;severity=null&amp;id=69cd7368e6bfc5ba1def202f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31574-improper-neutralization-of-input-du-d5af3cc9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SoftHopper%20Custom%20Content%20Scrollbar&amp;severity=null&amp;id=69cd7368e6bfc5ba1def202c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31572-cross-site-request-forgery-csrf-in--776ebed0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20v20202020%20Multi%20Days%20Events%20and%20Multi%20Events%20in%20One%20Day%20Calendar&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31570-cross-site-request-forgery-csrf-in--d967783b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31570%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp-buy%20Related%20Posts%20Widget%20with%20Thumbnails&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31569-cross-site-request-forgery-csrf-in--405d6afd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31569%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp-buy%20wordpress%20related%20Posts%20with%20thumbnails&amp;severity=null&amp;id=69cd7368e6bfc5ba1def201d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31567-improper-neutralization-of-input-du-4e609710</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31567%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themesflat%20themesflat-addons-for-elementor&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31566-cross-site-request-forgery-csrf-in--19e5b561</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31566%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20riosisgroup%20Rio%20Video%20Gallery&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31562-improper-neutralization-of-input-du-64657998</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31562%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aphotrax%20Uptime%20Robot%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31559-improper-neutralization-of-input-du-a0dc1974</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Caspio%20Bridge%20Custom%20Database%20Applications%20by%20Caspio&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31557-improper-neutralization-of-input-du-fe88e12e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MiKa%20OSM&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31556-improper-neutralization-of-input-du-8b4f5142</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IDX%20Broker%20IMPress%20for%20IDX%20Broker&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31555-missing-authorization-in-contentmx--ab3ae7d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31555%3A%20Missing%20Authorization%20in%20ContentMX%20ContentMX%20Content%20Publisher&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31549-improper-neutralization-of-input-du-607f7539</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agency%20Dominion%20Inc.%20Fusion&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31547-improper-neutralization-of-special--16655373</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31547%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aphotrax%20Uptime%20Robot%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31546-missing-authorization-in-wp-messiah-718476a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31546%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Swiss%20Toolkit%20For%20WP&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31545-missing-authorization-in-wp-messiah-3ee49481</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31545%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Safe%20Ai%20Malware%20Protection%20for%20WP&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31544-missing-authorization-in-wp-messiah-dd893eb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31544%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Swiss%20Toolkit%20For%20WP&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31542-improper-neutralization-of-special--0a012f13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31542%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31540-missing-authorization-in-acmemediak-556120aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31540%3A%20Missing%20Authorization%20in%20acmemediakits%20ACME%20Divi%20Modules&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31539-missing-authorization-in-blocksera--f1f01772</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31539%3A%20Missing%20Authorization%20in%20Blocksera%20Cryptocurrency%20Widgets%20Pack&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31538-improper-neutralization-of-input-du-b05b8a51</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20checklistcom%20Checklist&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31535-improper-neutralization-of-input-du-aca9505f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31535%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PressTigers%20Simple%20Owl%20Carousel&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31533-missing-authorization-in-salesmatei-cd217334</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31533%3A%20Missing%20Authorization%20in%20Salesmate.io%20Salesmate%20Add-On%20for%20Gravity%20Forms&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31532-improper-neutralization-of-input-du-3c179714</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Team%20AtomChat%20AtomChat&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31530-missing-authorization-in-smackcoder-cc3a9218</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31530%3A%20Missing%20Authorization%20in%20Smackcoders%20Inc.%2C%20Google%20SEO%20Pressor%20Snippet&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31529-missing-authorization-in-rashid-sli-3cc04775</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31529%3A%20Missing%20Authorization%20in%20Rashid%20Slider%20Path%20for%20Elementor&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31528-missing-authorization-in-wokamoto-s-69740b7d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31528%3A%20Missing%20Authorization%20in%20wokamoto%20StaticPress&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31527-server-side-request-forgery-ssrf-in-d00321c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31527%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kishan%20WP%20Link%20Preview&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31526-improper-neutralization-of-special--70ca8514</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31526%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2586-uncontrolled-resource-consumption-24f2ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2586%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=high&amp;id=682e559b0acd01a24924f2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30963-improper-neutralization-of-input-du-37ac1526</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30963%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSmartFilters&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31376-missing-authorization-in-mayeenul-i-b6b4357c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31376%3A%20Missing%20Authorization%20in%20Mayeenul%20Islam%20NanoSupport&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31386-missing-authorization-in-simplepres-4d7ca417</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31386%3A%20Missing%20Authorization%20in%20simplepress%20Simple%3APress&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30961-improper-neutralization-of-input-du-983289d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30961%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tinuzz%20Trackserver&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31406-missing-authorization-in-elextensio-f32fee1b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31406%3A%20Missing%20Authorization%20in%20ELEXtensions%20ELEX%20WooCommerce%20Request%20a%20Quote&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31410-cross-site-request-forgery-csrf-in--c6d41b8d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31410%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ashish%20Ajani%20WP%20Church%20Donation&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31414-improper-neutralization-of-input-du-32216edf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31414%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stylemix%20Cost%20Calculator%20Builder&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31412-improper-neutralization-of-input-du-cf1b279a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31412%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetProductGallery&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31387-improper-control-of-filename-for-in-bc2fe210</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20InstaWP%20InstaWP%20Connect&amp;severity=null&amp;id=69cd7347e6bfc5ba1def173b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31016-improper-control-of-filename-for-in-70b86b3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31016%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Crocoblock%20JetWooBuilder&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30987-improper-neutralization-of-input-du-80deb3c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30835-improper-control-of-filename-for-in-be6a880d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30835%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Bastien%20Ho%20Accounting%20for%20WooCommerce&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31417-missing-authorization-in-fahad-mahm-877670df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31417%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20WP%20Docs&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31043-improper-neutralization-of-input-du-6bc85872</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31043%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1268-cwe-787-out-of-bounds-write-in-canon-inc-generic-plus-pcl6-printer-driver-bd7e04</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1268%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Generic%20Plus%20PCL6%20Printer%20Driver&amp;severity=critical&amp;id=682d9818c4522896dcbd7e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22941-na-3128d890</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22941%3A%20n%2Fa&amp;severity=critical&amp;id=68a3592dad5a09ad00b0a8cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22940-na-3ceae0e0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22940%3A%20n%2Fa&amp;severity=critical&amp;id=68a3592dad5a09ad00b0a8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22939-na-b29ce44c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22939%3A%20n%2Fa&amp;severity=critical&amp;id=68a3592dad5a09ad00b0a8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22938-na-8561f32f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22938%3A%20n%2Fa&amp;severity=critical&amp;id=68a3592dad5a09ad00b0a8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22937-na-8fbeb99c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22937%3A%20n%2Fa&amp;severity=critical&amp;id=68a3592dad5a09ad00b0a8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30095-cwe-321-use-of-hard-coded-cryptographic-key-in-vyos-vyos-bf7a13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30095%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20VyOS%20VyOS&amp;severity=medium&amp;id=682d984ac4522896dcbf7a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-31-2bcaad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-31&amp;severity=medium&amp;id=682c7db7e8347ec82d2bcaad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-31-f1220a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f1220a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2953-denial-of-service-in-pytorch-bf775e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2953%3A%20Denial%20of%20Service%20in%20PyTorch&amp;severity=medium&amp;id=682d984ac4522896dcbf775e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1861-cwe-131-incorrect-calculation-of-buffer-size-in-php-group-php-2725d1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1861%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=683076940acd01a2492725d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1736-cwe-20-improper-input-validation-in-php-group-php-2725cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1736%3A%20CWE-20%20Improper%20Input%20Validation%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=683076940acd01a2492725cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1734-cwe-20-improper-input-validation-in-php-group-php-2725cd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1734%3A%20CWE-20%20Improper%20Input%20Validation%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=683076940acd01a2492725cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1219-vulnerability-in-php-group-php-2725cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1219%3A%20Vulnerability%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=683076940acd01a2492725cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-30-2bce1d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-30&amp;severity=medium&amp;id=682c7db7e8347ec82d2bce1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-30-f12b99</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11180-cwe-79-improper-neutralization-of-i-62e37830</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11180%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2249-cwe-434-unrestricted-upload-of-file--24ebf589</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2249%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20sojweb%20SoJ%20SoundSlides&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13557-cwe-94-improper-control-of-generati-5036160d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13557%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20United%20Themes%20Shortcodes%20by%20United%20Themes&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2006-cwe-434-unrestricted-upload-of-file--6acee76a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2006%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20berrypress%20Inline%20Image%20Upload%20for%20BBPress&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2266-cwe-862-missing-authorization-in-mes-e6e1a953</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2266%3A%20CWE-862%20Missing%20Authorization%20in%20mestresdowp%20Checkout%20Mestres%20do%20WP%20for%20WooCommerce&amp;severity=critical&amp;id=699f6b21b7ef31ef0b54e688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2803-cwe-94-improper-control-of-generatio-b8ac4b2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2803%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20davemacd%20So-Called%20Air%20Quotes&amp;severity=high&amp;id=699f6b25b7ef31ef0b54ea2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2840-cwe-200-exposure-of-sensitive-inform-a9d2bf9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2840%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bhuvnesh%20DAP%20to%20Autoresponders%20Email%20Syncing&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54ea51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1217-cwe-20-improper-input-validation-in-php-group-php-2725c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1217%3A%20CWE-20%20Improper%20Input%20Validation%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=683076940acd01a2492725c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-29-2bd550</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-29&amp;severity=medium&amp;id=682c7db7e8347ec82d2bd550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-29-f12092</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6875-missing-release-of-memory-after-effective-lifetime-bda3c6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6875%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime&amp;severity=medium&amp;id=682d981cc4522896dcbda3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2926-null-pointer-dereference-in-hdf5-683f941e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2926%3A%20NULL%20Pointer%20Dereference%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad00345658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2925-double-free-in-hdf5-db3961cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2925%3A%20Double%20Free%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad00345652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2924-heap-based-buffer-overflow-in-hdf5-b91e1f60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2924%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad0034564c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2923-heap-based-buffer-overflow-in-hdf5-625ee768</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2923%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad00345646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31162-cwe-369-in-xfig-fig2dev-36a28682</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31162%3A%20CWE-369%20in%20xfig%20fig2dev&amp;severity=medium&amp;id=69091549c28fd46ded7bb74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31163-cwe-476-in-xfig-fig2dev-059b350f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31163%3A%20CWE-476%20in%20xfig%20fig2dev&amp;severity=medium&amp;id=69091549c28fd46ded7bb752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31164-cwe-122-heap-based-buffer-overflow--e4517f3d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31164%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20xfig%20fig2dev&amp;severity=medium&amp;id=69091549c28fd46ded7bb756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2915-heap-based-buffer-overflow-in-hdf5-872dbf49</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2915%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad00345640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2914-heap-based-buffer-overflow-in-hdf5-5099c79f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2914%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad0034563a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2913-use-after-free-in-hdf5-8a7798b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2913%3A%20Use%20After%20Free%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad00345634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2912-heap-based-buffer-overflow-in-hdf5-933a1d95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2912%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad0034562e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2713-cwe-269-improper-privilege-managemen-4efab665</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2713%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Google%20gVisor&amp;severity=medium&amp;id=689c5f46ad5a09ad00402968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31010-cross-site-request-forgery-csrf-in--8b5034db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31010%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ReichertBrothers%20SimplyRETS%20Real%20Estate%20IDX&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22767-improper-neutralization-of-input-du-fc9da759</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22767%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Global%20Payments%20GlobalPayments%20WooCommerce&amp;severity=null&amp;id=69cd760be6bfc5ba1df091c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22575-improper-neutralization-of-input-du-d3843d91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendyourweb%20SUPER%20RESPONSIVE%20SLIDER&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22566-improper-neutralization-of-input-du-c4c09843</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendyourweb%20ULTIMATE%20VIDEO%20GALLERY&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df0894e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22526-deserialization-of-untrusted-data-i-88f66e10</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22526%3A%20Deserialization%20of%20Untrusted%20Data%20in%20mywebtonet%20PHP%2FMySQL%20CPU%20performance%20statistics&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22523-improper-neutralization-of-special--7103909c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22523%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scheduler%20Schedule&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22360-improper-neutralization-of-input-du-48393200</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20promact%20WP%20Azure%20offload&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54362-path-traversal-in-boggibill-getshop-6aca9c56</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54362%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20boggibill%20GetShop%20ecommerce&amp;severity=null&amp;id=69cd7599e6bfc5ba1df0679f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54291-improper-limitation-of-a-pathname-t-8b6ccc72</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54291%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20labs64%20PluginPass&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51624-improper-neutralization-of-input-du-ace14464</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jajapagamentos%20J%C3%A1-J%C3%A1%20Pagamentos%20for%20WooCommerce&amp;severity=null&amp;id=69cd750be6bfc5ba1df026c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30211-cwe-789-memory-allocation-with-exce-dd8bf3e2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30211%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20erlang%20otp&amp;severity=high&amp;id=69091543c28fd46ded7bb30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2901-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-bee35b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2901&amp;severity=medium&amp;id=682d983bc4522896dcbee35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2877-debug-messages-revealing-unnecessary-information-270030</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2877%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information&amp;severity=medium&amp;id=682f99000acd01a249270030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0986-cwe-409-improper-handling-of-highly--619167aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0986%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20IBM%20PowerVM%20Hypervisor&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31432-improper-control-of-filename-for-in-42e24643</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31432%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Chop%20Chop%20Pop-Up%20Chop%20Chop&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31433-improper-neutralization-of-input-du-22f06f92</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31433%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Miguel%20Sirvent%20Magic%20Embeds&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31434-improper-neutralization-of-input-du-0a90364d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31434%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Tobey%20FormLift%20for%20Infusionsoft%20Web%20Forms&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31435-cross-site-request-forgery-csrf-in--c0284492</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Efficient%20Scripts%20Microblog%20Poster&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31437-improper-neutralization-of-input-du-87f44c21</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Miller%20WP-OGP&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31438-cross-site-request-forgery-csrf-in--d5347df1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31438%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Benoit%20De%20Boeck%20WP%20Supersized&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31440-cross-site-request-forgery-csrf-in--8a43a803</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31440%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Strategy11%20Team%20Terms%20of%20Use&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31443-cross-site-request-forgery-csrf-in--47832f66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31443%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Krzysztof%20Furtak%20KK%20I%20Like%20It&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31444-cross-site-request-forgery-csrf-in--462f909e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31444%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20youtag%20ShowTime%20Slideshow&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31447-cross-site-request-forgery-csrf-in--7c9a365b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31447%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nertworks%20NertWorks%20All%20in%20One%20Social%20Share%20Tools&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31448-cross-site-request-forgery-csrf-in--3de2cd5e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31448%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20misteraon%20Simple%20Trackback%20Disabler&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31449-cross-site-request-forgery-csrf-in--00a5c9f7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31449%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EricH%20The%20Visitor%20Counter&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31450-improper-neutralization-of-input-du-57f1e690</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phantom.omaga%20Toggle%20Box&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31451-improper-neutralization-of-input-du-68e8386c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevinweber%20wBounce&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31452-improper-neutralization-of-input-du-21425aa0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mindshare%20Labs%2C%20Inc.%20WP%20Ultimate%20Search&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31453-improper-neutralization-of-input-du-d512ba87</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31453%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stian%20Andreassen%20YouTube%20SimpleGallery&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31456-cross-site-request-forgery-csrf-in--940a9024</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31456%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bsndev%20Ultimate%20Security%20Checker&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31457-cross-site-request-forgery-csrf-in--1bab65b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31457%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aur%C3%A9lien%20LWS%20LWS%20SMS&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31458-cross-site-request-forgery-csrf-in--f678910c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31458%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20forsgren%20Video%20Embedder&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31459-cross-site-request-forgery-csrf-in--e94fc9b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31459%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PasqualePuzio%20Login%20Alert&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31460-cross-site-request-forgery-csrf-in--27061b23</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31460%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20danielmuldernl%20OmniLeads%20Scripts%20and%20Tags%20Manager&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31463-improper-neutralization-of-input-du-df61b8ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20preetindersodhi%20TGG%20WP%20Optimizer&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31464-improper-neutralization-of-input-du-20b07296</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nazmur%20Rahman%20Text%20Selection%20Color&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31465-improper-neutralization-of-input-du-508925fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cornershop%20Better%20Section%20Navigation%20Widget&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31466-improper-neutralization-of-special--9b4758e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31466%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Falcon%20Solutions%20Duplicate%20Page%20and%20Post&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31469-missing-authorization-in-webrangers-92f8b83f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31469%3A%20Missing%20Authorization%20in%20webrangers%20Clear%20Sucuri%20Cache&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31470-improper-neutralization-of-input-du-1f2c647d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31470%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FancyThemes%20Page%20Takeover&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31471-improper-neutralization-of-input-du-76404d3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31471%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Falcon%20Solutions%20Duplicate%20Page%20and%20Post&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31472-improper-neutralization-of-input-du-4643f3e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michele%20Marri%20Flatty&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31473-improper-neutralization-of-input-du-749eba43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31473%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matthewprice1178%20WP%20Database%20Optimizer&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31474-cross-site-request-forgery-csrf-in--b0bb3b70</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31474%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20matthewprice1178%20WP%20Database%20Optimizer&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2815-cwe-862-missing-authorization-in-quy-6c7eeed9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2815%3A%20CWE-862%20Missing%20Authorization%20in%20quyle91%20Administrator%20Z&amp;severity=high&amp;id=699f6b25b7ef31ef0b54ea46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31073-improper-neutralization-of-input-du-cbb99a4d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31073%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bensibley%20Unlimited&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31075-improper-neutralization-of-script-r-d1836f0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31075%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20videowhisper%20MicroPayments&amp;severity=null&amp;id=69cd7340e6bfc5ba1def147b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31076-server-side-request-forgery-ssrf-in-8860ff1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31076%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WP%20Compress%20WP%20Compress%20for%20MainWP&amp;severity=null&amp;id=69cd7340e6bfc5ba1def147e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31083-improper-neutralization-of-input-du-dcd12c88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31083%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZEEN101%20Leaky%20Paywall&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31088-improper-neutralization-of-input-du-0dc324ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31090-improper-neutralization-of-input-du-723a85d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alordiel%20Dropdown%20Multisite%20selector&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31093-improper-neutralization-of-input-du-feaf246f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31093%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redpixelstudios%20RPS%20Include%20Content&amp;severity=null&amp;id=69cd7344e6bfc5ba1def153f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31094-improper-neutralization-of-input-du-d3158a4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teastudio.pl%20WP%20Posts%20Carousel&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31096-improper-neutralization-of-input-du-172f9ca7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPXPO%20PostX&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31099-improper-neutralization-of-special--845a85b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31099%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bestweblayout%20Slider%20by%20BestWebSoft&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31102-improper-neutralization-of-input-du-de75a26b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Hostel&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27001-insertion-of-sensitive-information--c82cfc30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27001%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shipmondo%20Shipmondo%20%E2%80%93%20A%20complete%20shipping%20solution%20for%20WooCommerce&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1705-cwe-79-improper-neutralization-of-in-b9bf4ad8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2074-cwe-89-improper-neutralization-of-sp-ece96c71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2074%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20webfactory%20Advanced%20Google%20reCAPTCHA&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2578-cwe-200-exposure-of-sensitive-inform-cf8e1f24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2578%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2485-cwe-502-deserialization-of-untrusted-data-in-glenwpcoder-drag-and-drop-multiple-file-upload-for-contact-form-7-bd9727</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2485%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=682d981ac4522896dcbd9727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2328-cwe-22-improper-limitation-of-a-path-4aa4881a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2328%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2804-cwe-79-improper-neutralization-of-in-854135bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54ea30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2294-cwe-22-improper-limitation-of-a-path-a88c8791</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2294%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20extendthemes%20Kubio%20AI%20Page%20Builder&amp;severity=critical&amp;id=699f6b21b7ef31ef0b54e6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24381-cwe-601-url-redirection-to-untruste-7115aa9f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24381%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24386-cwe-78-improper-neutralization-of-s-71e02524</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24386%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24377-cwe-78-improper-neutralization-of-s-b6646cbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24377%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45385912abc71d656bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24378-cwe-78-improper-neutralization-of-s-e59d3ff4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24378%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45385912abc71d656c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24379-cwe-78-improper-neutralization-of-s-b90f87ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24379%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24380-cwe-78-improper-neutralization-of-s-097ef765</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24380%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23383-cwe-78-improper-neutralization-of-s-13d82179</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23383%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45385912abc71d656b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24385-cwe-78-improper-neutralization-of-s-8b6c3791</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24385%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49601-cwe-78-improper-neutralization-of-s-b130fd13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49601%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a44285912abc71d630f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24382-cwe-78-improper-neutralization-of-s-dd58bb24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24382%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22398-cwe-78-improper-neutralization-of-s-cc656eab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22398%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=critical&amp;id=69a0a45385912abc71d656a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49563-cwe-78-improper-neutralization-of-s-5435dfc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49563%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a44285912abc71d630ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49564-cwe-78-improper-neutralization-of-s-deb583d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49564%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a44285912abc71d630f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49565-cwe-78-improper-neutralization-of-s-9c69b83e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49565%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a44285912abc71d630f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24383-cwe-78-improper-neutralization-of-s-cbb2ab58</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24383%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=critical&amp;id=69a0a45585912abc71d65d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1860-cwe-338-use-of-cryptographically-weak-pseudo-random-number-generator-prng-in-zefram-data-entropy-bd6c14</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1860%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20ZEFRAM%20Data%3A%3AEntropy&amp;severity=high&amp;id=682d9816c4522896dcbd6c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28221-n-a-in-n-a-bf7a0f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28221%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28220-n-a-in-n-a-bf79fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28220%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf79fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28219-n-a-in-n-a-bf79e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28219%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf79e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-28-2bc2a6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-28&amp;severity=medium&amp;id=682c7db7e8347ec82d2bc2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-28-f12430</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31092-improper-neutralization-of-input-du-b91e8e81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ninja%20Team%20Click%20to%20Chat%20%E2%80%93%20WP%20Support%20All-in-One%20Floating%20Widget&amp;severity=null&amp;id=69cd7344e6bfc5ba1def153c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2888-cwe-1025-comparison-using-wrong-fact-ce3a9617</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2888%3A%20CWE-1025%3A%20Comparison%20Using%20Wrong%20Factors%20in%20AWS%20tough&amp;severity=medium&amp;id=68ee9812d8f994a66ec32325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2887-cwe-1025-comparison-using-wrong-fact-d91168cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2887%3A%20CWE-1025%3A%20Comparison%20Using%20Wrong%20Factors%20in%20AWS%20tough&amp;severity=medium&amp;id=68ee9812d8f994a66ec32320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2886-cwe-670-always-incorrect-control-flo-12b155f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2886%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20AWS%20tough&amp;severity=medium&amp;id=68ee9812d8f994a66ec3231b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2885-cwe-1288-improper-validation-of-cons-318e43c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2885%3A%20CWE-1288%3A%20Improper%20Validation%20of%20Consistency%20within%20Input%20in%20AWS%20tough&amp;severity=medium&amp;id=68ee9812d8f994a66ec32316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31031-improper-neutralization-of-input-du-be480412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20Job%20Colors%20for%20WP%20Job%20Manager&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26733-missing-authorization-in-shinetheme-5a62a8e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26733%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26873-cwe-502-deserialization-of-untruste-250bfb90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26873%3A%20Deserialization%20of%20Untrusted%20Data%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=6846a2fd71f4d251b5895756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26890-improper-control-of-filename-for-in-afc3cd2f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26890%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RealMag777%20HUSKY&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26898-improper-neutralization-of-special--d377a05b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26898%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26956-missing-authorization-in-shinetheme-8ab41751</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26956%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecbff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22739-missing-authorization-in-thimpress--1252cf35</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22739%3A%20Missing%20Authorization%20in%20ThimPress%20LearnPress&amp;severity=null&amp;id=69cd7607e6bfc5ba1df09014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22740-missing-authorization-in-automattic-6dd03c8a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22740%3A%20Missing%20Authorization%20in%20Automattic%20Sensei%20LMS&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53033-vulnerability-in-linux-linux-be6d84</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53033%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53032-vulnerability-in-linux-linux-be6d75</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53032%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53031-vulnerability-in-linux-linux-be6d6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53030-vulnerability-in-linux-linux-bdd948</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53029-vulnerability-in-linux-linux-bdd944</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53029%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53028-vulnerability-in-linux-linux-bdd940</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53026-vulnerability-in-linux-linux-be6d67</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53025-vulnerability-in-linux-linux-be6d52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53025&amp;severity=critical&amp;id=682d9830c4522896dcbe6d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53024-vulnerability-in-linux-linux-bdd92f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53024%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53023-vulnerability-in-linux-linux-be6d4e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53022-vulnerability-in-linux-linux-be6d4a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53021-vulnerability-in-linux-linux-be6d46</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53020-vulnerability-in-linux-linux-be6d42</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53019-vulnerability-in-linux-linux-be6d3c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53018-vulnerability-in-linux-linux-be6d38</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53017-vulnerability-in-linux-linux-be6d34</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53016-vulnerability-in-linux-linux-be6d1a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53015-vulnerability-in-linux-linux-be6d12</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53014-vulnerability-in-linux-linux-be6cfb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53013-vulnerability-in-linux-linux-be6cf7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53012-vulnerability-in-linux-linux-bdd927</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53011-vulnerability-in-linux-linux-be6cf3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53010-vulnerability-in-linux-linux-be6cef</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53009-vulnerability-in-linux-linux-be6ceb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53008-vulnerability-in-linux-linux-be6ce7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53007-vulnerability-in-linux-linux-be6ce3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53006-vulnerability-in-linux-linux-be6cdf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53005-vulnerability-in-linux-linux-be6cdb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53004-vulnerability-in-linux-linux-be6cce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53003-vulnerability-in-linux-linux-be6cbb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53002-vulnerability-in-linux-linux-be6cb7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53001-vulnerability-in-linux-linux-be6cb3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53000-vulnerability-in-linux-linux-be6caf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52999-vulnerability-in-linux-linux-bdd91f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52998-vulnerability-in-linux-linux-be6ca0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52997-vulnerability-in-linux-linux-be6c98</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52996-vulnerability-in-linux-linux-be6c92</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52995-vulnerability-in-linux-linux-be6c8e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52994-vulnerability-in-linux-linux-bdd8fb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52993-vulnerability-in-linux-linux-be6c86</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52992-vulnerability-in-linux-linux-be6c7e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52991-vulnerability-in-linux-linux-be6c69</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52989-vulnerability-in-linux-linux-be6c5c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52988-vulnerability-in-linux-linux-be6c4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52987-vulnerability-in-linux-linux-be6c4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52986-vulnerability-in-linux-linux-be6c47</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52985-vulnerability-in-linux-linux-be6c43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52984-vulnerability-in-linux-linux-be6c3f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52983-vulnerability-in-linux-linux-bdd8f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52982-vulnerability-in-linux-linux-be6c3b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52981-vulnerability-in-linux-linux-be6c37</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52980-vulnerability-in-linux-linux-be6c33</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52979-vulnerability-in-linux-linux-bdd8ed</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52979&amp;severity=null&amp;id=682d9821c4522896dcbdd8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52978-vulnerability-in-linux-linux-be6c20</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52977-vulnerability-in-linux-linux-bdd8e7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52976-vulnerability-in-linux-linux-bdd8d6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52975-vulnerability-in-linux-linux-be6c1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52974-vulnerability-in-linux-linux-be6c18</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52973-vulnerability-in-linux-linux-be6c14</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49761-vulnerability-in-linux-linux-be4a93</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49760-vulnerability-in-linux-linux-be4a8f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49759-vulnerability-in-linux-linux-be4a8b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49758-vulnerability-in-linux-linux-be4a87</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49758%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49757-vulnerability-in-linux-linux-be4a7a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49757%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49756-vulnerability-in-linux-linux-be4a76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49755-vulnerability-in-linux-linux-be4a72</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49754-vulnerability-in-linux-linux-be4a6e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49753-vulnerability-in-linux-linux-be4a6a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49752-vulnerability-in-linux-linux-be4a66</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49751-vulnerability-in-linux-linux-be4a49</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49750-vulnerability-in-linux-linux-be4a45</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49749-vulnerability-in-linux-linux-be4a36</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49748-vulnerability-in-linux-linux-bdd732</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49747-vulnerability-in-linux-linux-be4a2e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49746-vulnerability-in-linux-linux-be4a28</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49745-vulnerability-in-linux-linux-be4a17</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49744-vulnerability-in-linux-linux-be4a0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49743-vulnerability-in-linux-linux-be4a07</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49742-vulnerability-in-linux-linux-be4a03</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49741-vulnerability-in-linux-linux-be49ff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe49ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49740-vulnerability-in-linux-linux-be49db</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe49db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49739-vulnerability-in-linux-linux-be49d3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe49d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49738-vulnerability-in-linux-linux-be49cb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe49cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52942-vulnerability-in-linux-linux-be6c10</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52941-vulnerability-in-linux-linux-bdd8ce</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52940-vulnerability-in-linux-linux-be6c0c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52939-vulnerability-in-linux-linux-be6c08</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52938-vulnerability-in-linux-linux-bdd8bd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52937-vulnerability-in-linux-linux-be6c04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52936-vulnerability-in-linux-linux-be6c00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52935-vulnerability-in-linux-linux-be6bfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52934-vulnerability-in-linux-linux-be6be0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52933-vulnerability-in-linux-linux-bdd8b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52932-vulnerability-in-linux-linux-be6bdc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52931-vulnerability-in-linux-linux-be6bcd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52930-vulnerability-in-linux-linux-be6bc9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52929-vulnerability-in-linux-linux-be6bc5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52928-vulnerability-in-linux-linux-be6bc1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4454-vulnerability-in-linux-linux-bde1c0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4454%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12905-cwe-59-improper-link-resolution-bef-9b7db923</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12905%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)&amp;severity=high&amp;id=690904b000ff46172d4a0e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22783-improper-neutralization-of-special--b3fbbc82</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22783%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SEO%20Squirrly%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26762-improper-neutralization-of-input-du-82109d7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Automattic%20WooCommerce&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26909-improper-control-of-filename-for-in-3c930a87</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26909%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20John%20Darrel%20Hide%20My%20WP%20Ghost&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22496-improper-neutralization-of-input-du-987650fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22496%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MarMar8x%20Notif%20Bell&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22497-improper-neutralization-of-input-du-ef0e5c13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22497%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bramwaas%20Simple%20Google%20Calendar%20Outlook%20Events%20Block%20Widget&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22628-improper-neutralization-of-input-du-a0516c3d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FolioVision%20Filled%20In&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22629-missing-authorization-in-inet-inet--167b5359</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22629%3A%20Missing%20Authorization%20in%20iNET%20iNET%20Webkit&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22634-cross-site-request-forgery-csrf-in--4a89baf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22634%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MD%20Abu%20Jubayer%20Hossain%20Easy%20Booked%20%E2%80%93%20Appointment%20Booking%20and%20Scheduling%20Management%20System%20for%20WordPress&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22637-cross-site-request-forgery-csrf-in--bb838ebb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22637%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20verkkovaraani%20Print%20PDF%20Generator%20and%20Publisher&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22638-improper-neutralization-of-input-du-84319f0f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20acowebs%20Product%20Table%20For%20WooCommerce&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22640-improper-neutralization-of-input-du-06417e70</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22640%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20integrationdevpaytm%20Paytm%20Payment%20Donation&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22644-improper-neutralization-of-input-du-07cdf10f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22644%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Vayu%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%20for%20WordPress%20%26%20WooCommerce&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31181-null-pointer-dereference-270032</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31181%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682f99000acd01a249270032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31180-null-pointer-dereference-bd89f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31180%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31179-null-pointer-dereference-bd89f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31179%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22646-improper-neutralization-of-input-du-4bf48951</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20aThemes%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22647-missing-authorization-in-smackcoder-fc83b59e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22647%3A%20Missing%20Authorization%20in%20Smackcoders%20Inc.%2C%20AIO%20Performance%20Profiler%2C%20Monitor%2C%20Optimize%2C%20Compress%20%26%20Debug&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31178-null-pointer-dereference-bd89e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31178%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22648-improper-neutralization-of-input-du-410f1c4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22648%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Plugin%20Devs%20Blog%2C%20Posts%20and%20Category%20Filter%20for%20Elementor&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31176-null-pointer-dereference-bd89ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31176%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48944-cwe-918-server-side-request-forgery-ssrf-in-apache-software-foundation-apache-kylin-bd876e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48944%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Kylin&amp;severity=medium&amp;id=682d9819c4522896dcbd876e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22649-improper-neutralization-of-input-du-c4903e68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22649%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weDevs%20WP%20Project%20Manager&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22652-improper-neutralization-of-special--6e29116a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22652%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kendysond%20Payment%20Forms%20for%20Paystack&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22659-improper-neutralization-of-input-du-9d9c4314</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22659%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21892-vulnerability-in-linux-linux-bdd37e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21891-vulnerability-in-linux-linux-be8b18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21890-vulnerability-in-linux-linux-be8b14</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21889-vulnerability-in-linux-linux-be8b10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21888-vulnerability-in-linux-linux-be8b0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21887-vulnerability-in-linux-linux-bdd378</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21886-vulnerability-in-linux-linux-be8b06</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21885-vulnerability-in-linux-linux-be8b04</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21884-vulnerability-in-linux-linux-be8b00</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21883-vulnerability-in-linux-linux-be8af3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21882-vulnerability-in-linux-linux-be8aef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21881-vulnerability-in-linux-linux-be8ade</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21880-vulnerability-in-linux-linux-be8ac3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21879-vulnerability-in-linux-linux-be8abf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21878-vulnerability-in-linux-linux-be8abb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21877-vulnerability-in-linux-linux-be8ab5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21876-vulnerability-in-linux-linux-be8ab1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21875-vulnerability-in-linux-linux-be8aad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21874-vulnerability-in-linux-linux-be8aa9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21873-vulnerability-in-linux-linux-be8aa5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21872-vulnerability-in-linux-linux-bd718d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9817c4522896dcbd718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58091-vulnerability-in-linux-linux-bde35d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58090-vulnerability-in-linux-linux-bde359</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1998-cwe-532-insertion-of-sensitive-infor-dea049b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1998%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20UrbanCode%20Deploy&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1997-cwe-80-improper-neutralization-of-sc-70e3cff5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1997%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20UrbanCode%20Deploy&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22660-improper-neutralization-of-input-du-a2f9ae7c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22660%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wolfgang%20Include%20Mastodon%20Feed&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22665-missing-authorization-in-shakeeb-sa-7be907d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22665%3A%20Missing%20Authorization%20in%20Shakeeb%20Sadikeen%20RapidLoad&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22667-missing-authorization-in-creative-w-b8af9246</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22667%3A%20Missing%20Authorization%20in%20Creative%20Werk%20Designs%20Export%20Order%2C%20Product%2C%20Customer%20%26%20Coupon%20for%20WooCommerce%20to%20Google%20Sheets&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22668-missing-authorization-in-awesometog-39b408e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22668%3A%20Missing%20Authorization%20in%20AwesomeTOGI%20Awesome%20Event%20Booking&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22669-cross-site-request-forgery-csrf-in--95811053</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22669%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AwesomeTOGI%20Awesome%20Event%20Booking&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22670-missing-authorization-in-e4jvikwp-v-359875b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22670%3A%20Missing%20Authorization%20in%20e4jvikwp%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22671-missing-authorization-in-leap13-dis-8a98c4d3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22671%3A%20Missing%20Authorization%20in%20Leap13%20Disable%20Elementor%20Editor%20Translation&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22673-missing-authorization-in-wpfactory--d4ada678</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22673%3A%20Missing%20Authorization%20in%20WPFactory%20EAN%20for%20WooCommerce&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22672-server-side-request-forgery-ssrf-in-bd112223</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22672%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SuitePlugins%20Video%20%26%20Photo%20Gallery%20for%20Ultimate%20Member&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25086-cross-site-request-forgery-csrf-in--6efb62ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25086%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPDeveloper%20Secret%20Meta&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22816-improper-neutralization-of-input-du-c04f628e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22816%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codetrendy%20Power%20Mag&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0946a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25100-cross-site-request-forgery-csrf-in--16f6dae7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25100%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20victoracano%20Cazamba&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26731-improper-neutralization-of-input-du-d9dd4bc3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26731%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26732-improper-neutralization-of-input-du-4308a678</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26732%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20burgersoftware%20StoreBiz&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26734-improper-neutralization-of-input-du-1a72aa3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peregrinethemes%20Hester&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26736-improper-neutralization-of-input-du-f9c195f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26736%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20victortihai%20MorningTime%20Lite&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26738-improper-neutralization-of-input-du-adf2a546</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Graham%20Quick%20Interest%20Slider&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21871-vulnerability-in-linux-linux-be8aa1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21870-vulnerability-in-linux-linux-be8a9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21869-vulnerability-in-linux-linux-be8a6e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21868-vulnerability-in-linux-linux-be8a66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21867-vulnerability-in-linux-linux-be8a5e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2857-incorrect-handle-could-lead-to-sandb-a9e48fc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2857%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6904bd22f54b4a89977ab6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30925-improper-neutralization-of-input-du-e0ba06a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30925%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addons&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30923-cross-site-request-forgery-csrf-in--49e18ac4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30923%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20powerfulwp%20Gift%20Message%20for%20WooCommerce&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30922-improper-neutralization-of-input-du-c792a504</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30922%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simplebooklet%20Simplebooklet%20PDF%20Viewer%20and%20Embedder&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30921-improper-neutralization-of-special--01787542</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30921%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tribulant%20Software%20Newsletters&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30920-improper-neutralization-of-input-du-00c227e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teastudio.pl%20WP%20Posts%20Carousel&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30919-cross-site-request-forgery-csrf-in--030f11f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30919%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Store%20Locator%20Widgets%20Store%20Locator%20Widget&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30918-improper-neutralization-of-input-du-a9f87b7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gordon%20B%C3%B6hme%20Structured%20Content&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30914-server-side-request-forgery-ssrf-in-224cabe8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30914%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Roxnor%20Metform&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30912-cross-site-request-forgery-csrf-in--13ca6ba1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30912%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Float%20menu&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30909-missing-authorization-in-conversios-88a8af30</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30909%3A%20Missing%20Authorization%20in%20Conversios%20Conversios.io&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30907-improper-neutralization-of-input-du-a569281f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SecuPress%20SecuPress%20Free&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30904-improper-neutralization-of-input-du-7ebe4d4c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Chartify&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30903-improper-neutralization-of-input-du-9507745a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Mills%20SyntaxHighlighter%20Evolved&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30900-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-zoho-subscriptions-zoho-billing-embed-payment-form-bd7268</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zoho%20Subscriptions%20Zoho%20Billing%20%E2%80%93%20Embed%20Payment%20Form&amp;severity=low&amp;id=682d9817c4522896dcbd7268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30899-improper-neutralization-of-input-du-57e445bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30899%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30898-improper-neutralization-of-input-du-24928c81</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30897-missing-authorization-in-adnan-anal-9808e1eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30897%3A%20Missing%20Authorization%20in%20Adnan%20Analytify&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30896-missing-authorization-in-wedevs-wp--34bc3cca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30896%3A%20Missing%20Authorization%20in%20weDevs%20WP%20ERP&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30895-improper-limitation-of-a-pathname-t-140fa6fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30895%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30894-missing-authorization-in-epsiloncoo-8d013e18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30894%3A%20Missing%20Authorization%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30891-improper-control-of-filename-for-in-e8e143f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30891%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magepeopleteam%20WpTravelly&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30890-improper-control-of-filename-for-in-daf8f133</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30890%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SuitePlugins%20Login%20Widget%20for%20Ultimate%20Member&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30888-cross-site-request-forgery-csrf-in--4da39398</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30888%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20silverplugins217%20Custom%20Fields%20Account%20Registration%20For%20Woocommerce&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30887-missing-authorization-in-magepeople-9eb9fe1f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30887%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30885-url-redirection-to-untrusted-site-o-4c14b416</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30885%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Bit%20Apps%20Bit%20Form&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30884-url-redirection-to-untrusted-site-o-ef281f6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30884%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Bit%20Apps%20Bit%20Integrations&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30883-missing-authorization-in-richplugin-b6fe4732</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30883%3A%20Missing%20Authorization%20in%20richplugins%20Trust.Reviews&amp;severity=null&amp;id=69cd732de6bfc5ba1def0be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30881-missing-authorization-in-themehunk--28358514</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30881%3A%20Missing%20Authorization%20in%20themehunk%20Big%20Store&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30879-improper-neutralization-of-special--c811f861</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30879%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Moreconvert%20Team%20MC%20Woocommerce%20Wishlist&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30877-missing-authorization-in-fatcatapps-9763e0b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30877%3A%20Missing%20Authorization%20in%20fatcatapps%20Quiz%20Cat&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30874-missing-authorization-in-jose-morte-accc023e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30874%3A%20Missing%20Authorization%20in%20Jose%20Mortellaro%20Specific%20Content%20For%20Mobile&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30873-improper-neutralization-of-input-du-a3a9c7e9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30872-cross-site-request-forgery-csrf-in--f13c1fc4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30872%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nitin%20Prakash%20Product%20Author%20for%20WooCommerce&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30868-improper-control-of-filename-for-in-9852d726</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30868%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Maidul%20Team%20Manager&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30866-missing-authorization-in-giannis-ki-934b67b2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30866%3A%20Missing%20Authorization%20in%20Giannis%20Kipouros%20Terms%20%26%20Conditions%20Per%20Product&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30865-cross-site-request-forgery-csrf-in--275e6c07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30865%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fuzzoid%203DPrint%20Lite&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30864-missing-authorization-in-falselight-1405711c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30864%3A%20Missing%20Authorization%20in%20falselight%20Exchange%20Rates&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30863-cross-site-request-forgery-csrf-in--9d8881c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30863%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CRM%20Perks%20Integration%20for%20Google%20Sheets%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Ninja%20Forms&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30862-cross-site-request-forgery-csrf-in--d2f10f74</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30862%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sminozzi%20reCAPTCHA%20for%20all&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30861-missing-authorization-in-rustaurius-246be91d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30861%3A%20Missing%20Authorization%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30860-improper-neutralization-of-input-du-1e45bfd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30860%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jory%20Hogeveen%20Off-Canvas%20Sidebars%20%26%20Menus%20(Slidebars)&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30859-url-redirection-to-untrusted-site-o-f0f2852b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30859%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20guru-aliexpress%20AliNext&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30857-cross-site-request-forgery-csrf-in--72a6e3f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30857%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PressMaximum%20Currency%20Switcher%20for%20WooCommerce&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30856-cross-site-request-forgery-csrf-in--b65b4726</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30856%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theme%20funda%20Custom%20Field%20For%20WP%20Job%20Manager&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30854-cross-site-request-forgery-csrf-in--01e8f1d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30854%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vollstart%20Serial%20Codes%20Generator%20and%20Validator%20with%20WooCommerce%20Support&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30850-improper-neutralization-of-input-du-8f1e2a8d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sfaerber%20Dr.%20Flex&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30847-improper-neutralization-of-input-du-3c8afe4d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashley%20Novelist&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30846-improper-control-of-filename-for-in-8cd8193d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30846%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jetmonsters%20Restaurant%20Menu%20by%20MotoPress&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30845-improper-control-of-filename-for-in-d5a052f7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30845%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addons&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30843-improper-neutralization-of-special--1e18b01c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30843%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20setriosoft%20bizcalendar-web&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30842-cross-site-request-forgery-csrf-in--a94041e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30842%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pixolette%20Christmas%20Panda&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30839-missing-authorization-in-magepeople-a5245ae7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30839%3A%20Missing%20Authorization%20in%20magepeopleteam%20Taxi%20Booking%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30838-improper-neutralization-of-input-du-1647ad1e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CozyThemes%20Cozy%20Blocks&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30833-cross-site-request-forgery-csrf-in--4459c917</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30833%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Soft8Soft%20LLC%20Verge3D&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30832-improper-neutralization-of-input-du-f7d1a259</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30832%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Event%20Post&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30831-improper-control-of-filename-for-in-85f47541</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30831%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themifyme%20Themify%20Event%20Post&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30830-missing-authorization-in-hossni-mub-07610506</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30830%3A%20Missing%20Authorization%20in%20Hossni%20Mubarak%20Cool%20Author%20Box&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30829-improper-control-of-filename-for-in-53c79e61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30829%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Arraytics%20WPCafe&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30828-missing-authorization-in-arraytics--fdc4ecbc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30828%3A%20Missing%20Authorization%20in%20Arraytics%20Timetics&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30826-improper-neutralization-of-input-du-2d222979</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30826%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pierre%20Lannoy%20IP%20Locator&amp;severity=null&amp;id=69cd7324e6bfc5ba1def09fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30824-missing-authorization-in-israpil-te-b2f3a2ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30824%3A%20Missing%20Authorization%20in%20Israpil%20Textmetrics&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30823-cross-site-request-forgery-csrf-in--f8a7453c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30823%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Boone%20Gorges%20Anthologize&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30822-cross-site-request-forgery-csrf-in--e1759880</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30822%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hakik%20Zaman%20Custom%20Login%20Logo&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30821-missing-authorization-in-otacke-sno-342b5846</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30821%3A%20Missing%20Authorization%20in%20otacke%20SNORDIAN&apos;s%20H5PxAPIkatchu&amp;severity=null&amp;id=69cd7322e6bfc5ba1def091d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30820-improper-control-of-filename-for-in-6ab8a010</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30820%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20HT%20Plugins%20WishSuite&amp;severity=null&amp;id=69cd7322e6bfc5ba1def091a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30819-improper-neutralization-of-special--21013ce6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30819%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Igor%20Benic%20Simple%20Giveaways&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30818-improper-neutralization-of-input-du-5dabbfdd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30818%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mlaza%20jAlbum%20Bridge&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30817-missing-authorization-in-wpzita-z-c-bc866f75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30817%3A%20Missing%20Authorization%20in%20wpzita%20Z%20Companion&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30816-cross-site-request-forgery-csrf-in--26a45eb4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30816%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nks%20publish%20post%20email%20notification&amp;severity=null&amp;id=69cd7322e6bfc5ba1def090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30815-cross-site-request-forgery-csrf-in--6d143bdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30815%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saeed%20Sattar%20Beglou%20Hesabfa%20Accounting&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30814-improper-control-of-filename-for-in-a6159c06</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30814%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20The%20Post%20Grid&amp;severity=null&amp;id=69cd731ee6bfc5ba1def083f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30812-improper-neutralization-of-input-du-efbabab2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd731ee6bfc5ba1def083c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30811-cross-site-request-forgery-csrf-in--1c41431c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30811%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Javier%20Revilla%20ValidateCertify&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30810-improper-neutralization-of-special--93f4535a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30810%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Smackcoders%20Inc.%2C%20Lead%20Form%20Data%20Collection%20to%20CRM&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30809-missing-authorization-in-shahjada-l-17ee0b7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30809%3A%20Missing%20Authorization%20in%20Shahjada%20Live%20Forms&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30806-improper-neutralization-of-special--9216ae7d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30806%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Constantin%20Boiangiu%20Vimeotheque&amp;severity=null&amp;id=69cd731ee6bfc5ba1def082a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30805-cross-site-request-forgery-csrf-in--438a0dea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30805%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdesk%20Flexible%20Cookies&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30804-cross-site-request-forgery-csrf-in--8b63bb1f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30804%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20maennchen1.de%20wpShopGermany%20IT-RECHT%20KANZLEI&amp;severity=null&amp;id=69cd7318e6bfc5ba1def077a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30803-missing-authorization-in-greg-ross--1b0660a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30803%3A%20Missing%20Authorization%20in%20Greg%20Ross%20Just%20Writing%20Statistics&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30801-cross-site-request-forgery-csrf-in--a62c7bd6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30801%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Abu%20Bakar%20TWB%20Woocommerce%20Reviews&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30800-improper-neutralization-of-input-du-4cb82aa9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30800%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atawai%20Gum%20Elementor%20Addon&amp;severity=null&amp;id=69cd7318e6bfc5ba1def076d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30799-improper-neutralization-of-input-du-45f8aed6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30799%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pagup%20WP%20Google%20Street%20View&amp;severity=null&amp;id=69cd7318e6bfc5ba1def076a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30795-url-redirection-to-untrusted-site-o-e8aa9d7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30795%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Aman%20FunnelKit%20Automations&amp;severity=null&amp;id=69cd7318e6bfc5ba1def075e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30792-improper-neutralization-of-input-du-efaace5b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30792%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ufukart%20Comment%20Approved%20Notifier%20Extended&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30791-improper-neutralization-of-special--e5813bb5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30791%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdever%20Cart%20tracking%20for%20WooCommerce&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30790-missing-authorization-in-alexvtn-ch-8635adb1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30790%3A%20Missing%20Authorization%20in%20alexvtn%20Chatbox%20Manager&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30789-improper-neutralization-of-input-du-0a8cb2fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30789%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clearoutio%20Clearout%20Email%20Validator&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30788-cross-site-request-forgery-csrf-in--b21dab45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30788%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eli%20EZ%20SQL%20Reports%20Shortcode%20Widget%20and%20DB%20Backup&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30787-cross-site-request-forgery-csrf-in--c572096a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30787%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eli%20EZ%20SQL%20Reports%20Shortcode%20Widget%20and%20DB%20Backup&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30786-improper-neutralization-of-input-du-a58e0dad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30786%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oooorgle%20Quotes%20llama&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30785-improper-control-of-filename-for-in-548996bf</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30785%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20Subscribe%20to%20Download%20Lite&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30784-improper-neutralization-of-special--35321717</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30784%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Shuffle%20WP%20Subscription%20Forms&amp;severity=null&amp;id=69cd730be6bfc5ba1def04db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30783-cross-site-request-forgery-csrf-in--65dff798</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30783%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jgwhite33%20WP%20Google%20Review%20Slider&amp;severity=null&amp;id=69cd730be6bfc5ba1def04d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30781-url-redirection-to-untrusted-site-o-660d6ca0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30781%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WPFactory%20Scheduled%20%26amp%3B%20Automatic%20Order%20Status%20Controller%20for%20WooCommerce&amp;severity=null&amp;id=69cd730be6bfc5ba1def04d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30780-improper-neutralization-of-input-du-c52f7fde</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30780%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cubecolour%20Audio%20Album&amp;severity=null&amp;id=69cd730be6bfc5ba1def04cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30779-improper-neutralization-of-input-du-23ff140f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30779%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nick%20van%20Wobbie%20Doneren%20met%20Mollie&amp;severity=null&amp;id=69cd730be6bfc5ba1def04cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30777-authorization-bypass-through-user-c-f2ab9bfd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30777%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20DevItems%20Support%20Genix&amp;severity=null&amp;id=69cd730be6bfc5ba1def04c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30776-improper-neutralization-of-input-du-804b21ff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30776%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Sitekit&amp;severity=null&amp;id=69cd730be6bfc5ba1def04c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30775-improper-neutralization-of-special--925e0ad0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30775%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=null&amp;id=69cd730be6bfc5ba1def04c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30773-deserialization-of-untrusted-data-i-8bb929f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30773%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cozmoslabs%20TranslatePress&amp;severity=null&amp;id=69cd7309e6bfc5ba1def025d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30771-improper-neutralization-of-input-du-4ac296f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alain-Aymerick%20FRANCOIS%20WP%20Cassify&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30770-improper-neutralization-of-input-du-c586c9ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Charitable&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30769-cross-site-request-forgery-csrf-in--193394ce</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30769%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alexvtn%20WIP%20WooCarousel%20Lite&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30772-missing-authorization-in-wpclever-w-7c45ad98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30772%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Smart%20Upsell%20Funnel%20for%20WooCommerce&amp;severity=null&amp;id=69cd7309e6bfc5ba1def025a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30768-improper-neutralization-of-input-du-8a319588</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30768%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mlaza%20jAlbum%20Bridge&amp;severity=null&amp;id=69cd7309e6bfc5ba1def024e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30767-missing-authorization-in-add-onsorg-9c2a9750</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30767%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=null&amp;id=69cd7309e6bfc5ba1def024a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30766-improper-neutralization-of-input-du-42d14faf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30766%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30765-improper-neutralization-of-special--87746c45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30765%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPPOOL%20FlexStock&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30764-cross-site-request-forgery-csrf-in--80de349c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30764%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AntoineH%20Football%20Pool&amp;severity=null&amp;id=69cd7307e6bfc5ba1def021a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30763-improper-neutralization-of-input-du-6177659b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30763%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Olaf%20Lederer%20EO4WP&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2685-cwe-79-improper-neutralization-of-in-2148734f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2685%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2332-cwe-502-deserialization-of-untrusted-510b8b6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2332%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20smackcoders%20Export%20All%20Posts%2C%20Products%2C%20Orders%2C%20Refunds%20%26%20Users&amp;severity=critical&amp;id=699f6b21b7ef31ef0b54e740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2481-cwe-79-improper-neutralization-of-in-3b2e81db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2481%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dman25560%20MediaView&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e80d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-27-2bd387</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-27&amp;severity=medium&amp;id=682c7db7e8347ec82d2bd387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-27-f121d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f121d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20229-the-software-does-not-restrict-or-i-98428fd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20229%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69a0a44d85912abc71d6524e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20231-information-written-to-log-files-ca-d66fff74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20231%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69a0a44d85912abc71d65251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30407-cwe-426-in-acronis-acronis-cyber-protect-cloud-agent-bf1652</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30407%3A%20CWE-426%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf1652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2600-cwe-285-improper-authorization-in-de-36d660fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2600%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=medium&amp;id=68adf6caad5a09ad005a54d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30351-cwe-672-operation-on-a-resource-aft-58f91212</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30351%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20directus%20directus&amp;severity=low&amp;id=68487f5b1b0bd07c3938c87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30164-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-icinga-icingaweb2-bd6c44</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30164%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Icinga%20icingaweb2&amp;severity=medium&amp;id=682d9816c4522896dcbd6c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2783-incorrect-handle-provided-in-unspeci-c347279f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2783%3A%20Incorrect%20handle%20provided%20in%20unspecified%20circumstances%20in%20Google%20Chrome&amp;severity=high&amp;id=6843110671f4d251b5d0a605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2098-cwe-732-incorrect-permission-assignm-699ad7d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2098%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Beijing%20Honghu%20Yuntu%20Technology%20Fast%20CAD%20Reader&amp;severity=high&amp;id=68dffc4fb7ee07964d95f635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26922-improper-neutralization-of-input-du-1a94b3d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26922%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techthemes%20AuraMart&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26923-improper-neutralization-of-input-du-c11b8d41</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26929-improper-neutralization-of-input-du-a90b2e3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26929%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Accounting%20for%20WooCommerce&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26941-improper-neutralization-of-special--1680b825</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26941%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26986-improper-control-of-filename-for-in-84fd3d0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26986%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Pearl%20-%20Corporate%20Business&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27014-improper-neutralization-of-input-du-996f4d96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27014%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designingmedia%20Hostiko&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27015-improper-control-of-filename-for-in-62deff00</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27015%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designingmedia%20Hostiko&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30524-improper-neutralization-of-special--18d52d89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30524%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20origincode%20Product%20Catalog&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28942-improper-neutralization-of-special--e94fc664</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28942%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Trust%20Payments%20Trust%20Payments%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28939-improper-neutralization-of-special--e0fcca4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28939%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20EuroCizia%20WP%20Google%20Calendar%20Manager&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28935-improper-neutralization-of-input-du-36808454</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28935%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20puzich%20Fancybox%20Plus&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28934-improper-neutralization-of-input-du-720b4414</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28934%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chaozh%20Simple%20Post%20Series&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28928-improper-neutralization-of-input-du-77373e9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sureshdsk%20Are%20you%20robot%20google%20recaptcha%20for%20wordpress&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28924-improper-neutralization-of-input-du-0b2b31a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28924%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simbul%20ZenphotoPress&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28921-improper-neutralization-of-input-du-68c32a6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28921%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homejunction%20SpatialMatch%20IDX&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28917-improper-neutralization-of-input-du-2e6ca1a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crazyloong%20Custom%20Smilies&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28916-improper-control-of-filename-for-in-56e49b5e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28916%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Rashid%20Docpro&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28911-improper-neutralization-of-input-du-e1bbe034</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gravity2pdf%20Gravity%202%20PDF&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28903-improper-neutralization-of-input-du-1ac64137</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hectorgarrofe%20Driving%20Directions&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28899-improper-neutralization-of-input-du-2bdfd7ef</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28899%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20toddhuish%20WP%20Event%20Ticketing&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28898-improper-neutralization-of-special--2bc10788</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28898%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPExperts.io%20WP%20Multistore%20Locator&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28893-improper-control-of-generation-of-c-de276741</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28893%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Govind%20Visual%20Text%20Editor&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28890-improper-neutralization-of-input-du-7203fd19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20puzich%20Lightview%20Plus&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28889-improper-neutralization-of-input-du-62d56e54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28889%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20starblank%20Custom%20Product%20Stickers%20for%20Woocommerce&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28885-improper-neutralization-of-input-du-994e9da8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28885%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fiverraffiliates%20Fiverr.com%20Official%20Search%20Box&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28882-improper-neutralization-of-input-du-3992e868</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Omnify%2C%20Inc.%20Omnify&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28880-improper-neutralization-of-input-du-cec15eff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jotis%20Blue%20Captcha&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28877-improper-neutralization-of-input-du-8d316841</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28877%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20m.tiggelaar%20Key4ce%20osTicket%20Bridge&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28873-improper-neutralization-of-special--43fc2974</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28873%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Scott%20Taylor%20Shuffle&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28869-improper-neutralization-of-input-du-40c57f59</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28869%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shauno%20NextGEN%20Gallery%20Voting&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28865-improper-neutralization-of-input-du-9447744e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28865%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lionelroux%20WP%20Colorful%20Tag%20Cloud&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28858-improper-neutralization-of-input-du-f5f0b603</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arrow%20Plugins%20Arrow%20Maps&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28855-improper-neutralization-of-input-du-661905ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20srcoley%20Teleport&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27267-improper-neutralization-of-input-du-8ba7e2c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27267%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20srcoley%20Random%20Quotes&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26584-improper-neutralization-of-input-du-3eb64a64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Travis%20Ballard%20TBTestimonials&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26583-improper-neutralization-of-input-du-87331571</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26583%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Video%20Share%20VOD&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26581-improper-neutralization-of-input-du-8b593920</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Picture%20Gallery&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26579-improper-neutralization-of-input-du-3c8964fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20MicroPayments&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26576-improper-neutralization-of-input-du-906a87f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20takumin%20WP%20Simple%20Slideshow&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26575-improper-neutralization-of-input-du-1f5b830a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kyle%20Maurer%20Display%20Post%20Meta&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26573-improper-neutralization-of-input-du-1b6988dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JamRizzi%20Technologies%20Rizzi%20Guestbook&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26566-improper-neutralization-of-input-du-d5f4f587</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Frank%20In%20Stock%20Mailer%20for%20WooCommerce&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26565-improper-neutralization-of-input-du-be777b30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26565%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kagla%20GNUPress&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26564-improper-neutralization-of-input-du-2b11eb12</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kagla%20GNUCommerce&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26560-improper-neutralization-of-input-du-49ed7730</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26560%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KKWangen%20WP%20Contact%20Form%20III&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26559-improper-neutralization-of-input-du-f6c1aa99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Taylor%20Secure%20Invites&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26546-improper-neutralization-of-input-du-648cb5ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26546%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pixelpro%20Cookies%20Pro&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26544-improper-neutralization-of-input-du-333b5552</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Max%20K%20UTM%20tags%20tracking%20for%20Contact%20Form%207&amp;severity=null&amp;id=69cd729de6bfc5ba1deec665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26542-improper-neutralization-of-input-du-d8bef843</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dang%20Ngoc%20Binh%20Zalo%20Live%20Chat&amp;severity=null&amp;id=69cd729de6bfc5ba1deec65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26541-improper-neutralization-of-input-du-c76bb0e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeSolz%20Bitcoin%20%2F%20AltCoin%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=69cd729de6bfc5ba1deec65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26537-improper-neutralization-of-input-du-c4648ffa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rolomak%20GDPR%20Tools&amp;severity=null&amp;id=69cd729de6bfc5ba1deec653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26536-improper-neutralization-of-input-du-3e78ae6c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yendif%20Player%20Another%20Events%20Calendar&amp;severity=null&amp;id=69cd729de6bfc5ba1deec650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25134-improper-neutralization-of-input-du-547c5555</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25134%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zenverse%20Theme%20Demo%20Bar&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24690-improper-control-of-filename-for-in-dc5c4872</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24690%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Michele%20Giorgi%20Formality&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23964-improper-neutralization-of-input-du-7edb64bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23964%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajitae%20Google%20Plus&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23952-improper-control-of-filename-for-in-08b06227</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23952%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ntm%20custom-field-list-widget&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee90a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23937-improper-control-of-filename-for-in-c3768b4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23937%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Alex%20Furr%20LinkedIn%20Lite&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee903f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23735-improper-neutralization-of-input-du-3c9376e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cosmin%20Schiopu%20Infugrator&amp;severity=null&amp;id=69cd722be6bfc5ba1dee84fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23728-improper-neutralization-of-input-du-99f2af03</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23728%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20atelierhyper%20AuMenu&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee844a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23714-improper-neutralization-of-input-du-5f476590</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23714%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20podspod%20AppReview&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23704-improper-neutralization-of-input-du-5ab181f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Reuven%20Karasik%20Your%20Lightbox&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23680-improper-neutralization-of-input-du-90085776</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23680%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Narnoo%20Narnoo%20Operator&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23666-improper-neutralization-of-input-du-99f61903</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cxc-sawa%20Management-screen-droptiles&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0aec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23638-improper-neutralization-of-input-du-4e2409ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Umesh%20Ghimire%20Frontend%20Post%20Submission&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23633-improper-neutralization-of-input-du-403c31b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23633%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20khanhtruong%20WP%20Database%20Audit&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23632-improper-neutralization-of-input-du-614590ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rhizome%20Networks%20CG%20Button&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0aca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23612-improper-neutralization-of-input-du-bc56a6f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23612%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pixobe%20Pixobe%20Cartography&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23546-improper-neutralization-of-input-du-3c27e711</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23546%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20D%20Payne%20RDP%20inGroups%2B&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23543-improper-neutralization-of-input-du-ef50a129</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fomopay%20FOMO%20Pay%20Chinese%20Payment%20Solution&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23542-improper-neutralization-of-input-du-26eeb2e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20D%20Payne%20RDP%20Linkedin%20Login&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23466-improper-neutralization-of-input-du-755a57d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23466%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsiteeditor%20Site%20Editor%20Google%20Map&amp;severity=null&amp;id=69cd761ee6bfc5ba1df09879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23460-improper-neutralization-of-input-du-c439f795</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rhizomaticweb%20RWS%20Enquiry%20And%20Lead%20Follow-up&amp;severity=null&amp;id=69cd761ae6bfc5ba1df09798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23459-improper-neutralization-of-input-du-9acc5549</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23459%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NsThemes%20NS%20Simple%20Intro%20Loader&amp;severity=null&amp;id=69cd761ae6bfc5ba1df09795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22283-improper-neutralization-of-input-du-cc860b82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22283%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Riyaz%20GetSocial&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23203-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-icinga-icingaweb2-module-director-bebf0d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23203%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Icinga%20icingaweb2-module-director&amp;severity=medium&amp;id=682d9838c4522896dcbebf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2228-cwe-200-exposure-of-sensitive-inform-70d37769</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2228%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cyberchimps%20Responsive%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%2C%20Kits%20and%20Elementor%20Templates&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1913-cwe-502-deserialization-of-untrusted-de1d69ea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1913%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webtoffee%20Product%20Import%20Export%20for%20WooCommerce%20%E2%80%93%20Import%20Export%20Product%20CSV%20Suite&amp;severity=high&amp;id=69330fa6f88dbe026cfb4084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1911-cwe-73-external-control-of-file-name-00692fec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1911%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20webtoffee%20Product%20Import%20Export%20for%20WooCommerce%20%E2%80%93%20Import%20Export%20Product%20CSV%20Suite&amp;severity=low&amp;id=699f6b19b7ef31ef0b54e234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1912-cwe-918-server-side-request-forgery--3f57f599</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1912%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20webtoffee%20Product%20Import%20Export%20for%20WooCommerce%20%E2%80%93%20Import%20Export%20Product%20CSV%20Suite&amp;severity=high&amp;id=699f6b19b7ef31ef0b54e23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1312-cwe-79-improper-neutralization-of-in-01bcf44d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1312%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimateblocks%20Ultimate%20Blocks%20%E2%80%93%2025%2B%20Gutenberg%20Blocks%20for%20Block%20Editor&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54db33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13411-cwe-918-server-side-request-forgery-79326742</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13411%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20zapier%20Zapier%20for%20WordPress&amp;severity=medium&amp;id=699f6e55b7ef31ef0b59e693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13889-cwe-502-deserialization-of-untruste-216c35ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13889%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wordpressdotorg%20WordPress%20Importer&amp;severity=high&amp;id=699f6d19b7ef31ef0b56df0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1769-cwe-22-improper-limitation-of-a-path-36d0490b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1769%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webtoffee%20Product%20Import%20Export%20for%20WooCommerce%20%E2%80%93%20Import%20Export%20Product%20CSV%20Suite&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2110-cwe-862-missing-authorization-in-sma-cc6987f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2110%3A%20CWE-862%20Missing%20Authorization%20in%20aresit%20WP%20Compress%20%E2%80%93%20Instant%20Performance%20%26%20Speed%20Optimization&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27552-cwe-338-use-of-cryptographically-we-88eb1a25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27552%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20WREIS%20DBIx%3A%3AClass%3A%3AEncodedColumn&amp;severity=medium&amp;id=68bae6eb9bc4cbad54150dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27551-cwe-338-use-of-cryptographically-we-2b0ed43d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27551%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20WREIS%20DBIx%3A%3AClass%3A%3AEncodedColumn&amp;severity=medium&amp;id=68bae6eb9bc4cbad54150dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1542-cwe-425-direct-request-forced-browsi-967fc2d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1542%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Infonet%20Projekt%20SA%20OXARI%20ServiceDesk&amp;severity=critical&amp;id=68dffc4fb7ee07964d95f631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1440-cwe-20-improper-input-validation-in--c44f29ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1440%3A%20CWE-20%20Improper%20Input%20Validation%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1703-cwe-79-improper-neutralization-of-in-f30dee24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimateblocks%20Ultimate%20Blocks%20%E2%80%93%2025%2B%20Gutenberg%20Blocks%20for%20Block%20Editor&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1437-cwe-79-improper-neutralization-of-in-c9d48311</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1439-cwe-79-improper-neutralization-of-in-e7facd64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1310-cwe-22-improper-limitation-of-a-path-4f161d90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1310%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blueglassch%20Job%20Postings&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54db20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13702-cwe-79-improper-neutralization-of-i-09df8dc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20CRM%20and%20Lead%20Management%20by%20vcita&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13801-cwe-862-missing-authorization-in-xe-eefa25af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13801%3A%20CWE-862%20Missing%20Authorization%20in%20xenioushk%20BWL%20Advanced%20FAQ%20Manager&amp;severity=high&amp;id=699f6d16b7ef31ef0b56dc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1514-cwe-20-improper-input-validation-in--b44708ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1514%3A%20CWE-20%20Improper%20Input%20Validation%20in%20realmag777%20Active%20Products%20Tables%20for%20WooCommerce.%20Use%20constructor%20to%20create%20tables&amp;severity=high&amp;id=699f6b14b7ef31ef0b54de59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2009-cwe-79-improper-neutralization-of-in-0ea0d9cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2009%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contrid%20Newsletters&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2167-cwe-79-improper-neutralization-of-in-7c14cb91</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2167%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bastho%20Event%20post&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2257-cwe-78-improper-neutralization-of-sp-e8c7e8e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2257%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20boldgrid%20Total%20Upkeep%20%E2%80%93%20WordPress%20Backup%20Plugin%20plus%20Restore%20%26%20Migrate%20by%20BoldGrid&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1784-cwe-79-improper-neutralization-of-in-532b0168</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1784%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Spectra%20Gutenberg%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1490-cwe-79-improper-neutralization-of-in-aaead73b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brijeshk89%20Smart%20Maintenance%20Mode&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2165-cwe-79-improper-neutralization-of-in-e161c151</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2165%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samhoamt%20SH%20Email%20Alert&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2573-cwe-79-improper-neutralization-of-in-95e93a5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2573%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zia420%20Amazing%20service%20box%20Addons%20For%20WPBakery%20Page%20Builder%20(formerly%20Visual%20Composer)&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2576-cwe-79-improper-neutralization-of-in-aa76d8a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2576%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themerox%20Ayyash%20Studio%20%E2%80%94%20The%20kick-start%20kit&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-26-2bdd71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-26&amp;severity=medium&amp;id=682c7db7e8347ec82d2bdd71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2025-03-26-84a43d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202025-03-26&amp;severity=medium&amp;id=682b68edd14de609c884a43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-26-f12fde</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-26&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2276-cwe-862-missing-authorization-in-dav-7e12d517</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2276%3A%20CWE-862%20Missing%20Authorization%20in%20davidvongries%20Ultimate%20Dashboard%20%E2%80%93%20Custom%20WordPress%20Dashboard&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2302-cwe-79-improper-neutralization-of-in-7a8f1c1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mihail-barinov%20Advanced%20Woo%20Search%20%E2%80%93%20Product%20Search%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47516-improper-neutralization-of-argument-08082617</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47516%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)&amp;severity=critical&amp;id=699f6d08b7ef31ef0b56d5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28904-improper-neutralization-of-special--e5d4e759</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28904%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shamalli%20Web%20Directory%20Free&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58105-vulnerability-in-trend-micro-inc-tr-9aa9a538</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58105%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=69a0a44985912abc71d64ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58104-vulnerability-in-trend-micro-inc-tr-de2a293a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58104%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=69a0a44985912abc71d64abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26742-improper-neutralization-of-input-du-dda73318</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Gallery%20for%20Social%20Photo&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27632-cwe-644-improper-neutralization-of--445c5cb7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27632%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20Hitachi%20Energy%20TRMTracker&amp;severity=medium&amp;id=68fb6f3e65a68e41108fc15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2109-cwe-918-server-side-request-forgery--6089c3de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2109%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20aresit%20WP%20Compress%20%E2%80%93%20Instant%20Performance%20%26%20Speed%20Optimization&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2635-cwe-79-improper-neutralization-of-in-bc808392</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2635%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeverve%20Digital%20License%20Manager&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2542-cwe-79-improper-neutralization-of-in-3fac5729</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2542%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20obbdpu%20Your%20Simple%20SVG%20Support&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2319-cwe-352-cross-site-request-forgery-c-d7552cc6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2319%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scheeeli%20EZ%20SQL%20Reports%20Shortcode%20Widget%20and%20DB%20Backup&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13690-cwe-79-improper-neutralization-of-i-7da04d83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ashishajani%20WP%20Church%20Donation&amp;severity=high&amp;id=699f6e68b7ef31ef0b5a0180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13731-cwe-79-improper-neutralization-of-i-188a5493</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Alert%20Box%20Block%20%E2%80%93%20Display%20Custom%20Alerts%20and%20Messages&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a045d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13710-cwe-352-cross-site-request-forgery--4c7a4100</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13710%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20estatebud%20Estatebud%20%E2%80%93%20Properties%20%26%20Listings&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2510-cwe-79-improper-neutralization-of-in-9ea9eae9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bittokazi%20Frndzk%20Expandable%20Bottom%20Bar&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2559-allocation-of-resources-without-limits-or-throttling-in-red-hat-red-hat-build-of-keycloak-bee413</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2559%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=682d983bc4522896dcbee413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12623-cwe-79-improper-neutralization-of-i-22ff8765</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivmartel%20DICOM%20Support&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1320-cwe-352-cross-site-request-forgery-c-5e334fa3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1320%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20winkm89%20teachPress&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54db96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2252-cwe-200-exposure-of-sensitive-inform-f351f243</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2252%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2224-cwe-862-missing-authorization-in-wpw-180708fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2224%3A%20CWE-862%20Missing%20Authorization%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%2C%20Listings%20%26%20Classified%20Ads&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0845-cwe-79-improper-neutralization-of-in-164634b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Core%20Features&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2724-bf775a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2724&amp;severity=medium&amp;id=682d984ac4522896dcbf775a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2723-bf7756</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2723&amp;severity=medium&amp;id=682d984ac4522896dcbf7756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2722-bf7752</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2722&amp;severity=medium&amp;id=682d984ac4522896dcbf7752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2721-bf7741</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2721&amp;severity=medium&amp;id=682d984ac4522896dcbf7741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27836-na-1426de51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27836%3A%20n%2Fa&amp;severity=critical&amp;id=69091542c28fd46ded7bb2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27835-na-0a1f9a49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27835%3A%20n%2Fa&amp;severity=high&amp;id=69091542c28fd46ded7bb2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27832-na-b36c4448</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27832%3A%20n%2Fa&amp;severity=critical&amp;id=69091542c28fd46ded7bb2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27831-na-75c52992</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27831%3A%20n%2Fa&amp;severity=critical&amp;id=69091542c28fd46ded7bb2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27830-na-db6de96b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27830%3A%20n%2Fa&amp;severity=high&amp;id=69091542c28fd46ded7bb2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-25-10434e67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-25&amp;severity=medium&amp;id=68359c9e5d5f0974d01f8f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-25-f1fef2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-25&amp;severity=medium&amp;id=682acdc3bbaf20d303f1fef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-25-f12b1b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-25-07ad5c91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-25&amp;severity=medium&amp;id=6829b2d4c469c0a05b456c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24514-cwe-20-improper-input-validation-in-124084ea</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24514%3A%20CWE-20%20Improper%20Input%20Validation%20in%20kubernetes%20ingress-nginx&amp;severity=high&amp;id=69091e18c28fd46ded86986d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24513-cwe-20-improper-input-validation-in-767b7116</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24513%3A%20CWE-20%20Improper%20Input%20Validation%20in%20kubernetes%20ingress-nginx&amp;severity=medium&amp;id=69091e18c28fd46ded869869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1098-cwe-20-improper-input-validation-in--6c77fd13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1098%3A%20CWE-20%20Improper%20Input%20Validation%20in%20kubernetes%20ingress-nginx&amp;severity=high&amp;id=69091a49c28fd46ded81d033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1097-cwe-20-improper-input-validation-in--b24403e2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1097%3A%20CWE-20%20Improper%20Input%20Validation%20in%20kubernetes%20ingress-nginx&amp;severity=high&amp;id=69091a49c28fd46ded81d02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1974-cwe-653-improper-isolation-or-compar-d63877a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1974%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20kubernetes%20ingress-nginx&amp;severity=critical&amp;id=69091a4ac28fd46ded81d089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26512-cwe-266-in-netapp-snapcenter-a2e40abf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26512%3A%20CWE-266%20in%20NetApp%20SnapCenter&amp;severity=critical&amp;id=69a0a45985912abc71d662bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2748-cwe-79-improper-neutralization-of-in-582489fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=691dd88c52987e43f71b4d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2749-cwe-22-improper-limitation-of-a-path-ac8956b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2749%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Kentico%20Xperience&amp;severity=high&amp;id=690a6f059e609817bf702f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2747-cwe-288-authentication-bypass-using--3424e606</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2747%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Kentico%20Xperience&amp;severity=critical&amp;id=68d2c21e1b7eb49f20a06622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2746-cwe-288-authentication-bypass-using--d7975bdb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2746%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Kentico%20Xperience&amp;severity=critical&amp;id=68d2c21e1b7eb49f20a0661d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30623-improper-neutralization-of-input-du-8f1ab00a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rachel%20Cherry%20wA11y%20%E2%80%93%20The%20Web%20Accessibility%20Toolbox&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30621-cross-site-request-forgery-csrf-in--475301b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30621%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kornelly%20Translator&amp;severity=null&amp;id=69cd7307e6bfc5ba1def020d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30620-cross-site-request-forgery-csrf-in--6de5179b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30620%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20coderscom%20WP%20Odoo%20Form%20Integrator&amp;severity=null&amp;id=69cd7307e6bfc5ba1def020a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30617-cross-site-request-forgery-csrf-in--31ea2f1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20takien%20Rewrite&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30615-cross-site-request-forgery-csrf-in--4938b66a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30615%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jacob%20Schwartz%20WP%20e-Commerce%20Style%20Email&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30612-cross-site-request-forgery-csrf-in--dc9ea00c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30612%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mandegarweb%20Replace%20Default%20Words&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30610-improper-neutralization-of-input-du-de6bcf59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchsquare%20WP%20Social%20Widget&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30609-insertion-of-sensitive-information--d4f81eb5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30609%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Saad%20Iqbal%20AppExperts&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30608-cross-site-request-forgery-csrf-in--9a07635b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30608%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Anthony%20WordPress%20SQL%20Backup&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30606-improper-neutralization-of-input-du-6825778c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30606%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Logan%20Carlile%20Easy%20Page%20Transition&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30605-missing-authorization-in-ldwin79-so-33e22787</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30605%3A%20Missing%20Authorization%20in%20ldwin79%20sourceplay-navermap&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30604-improper-neutralization-of-special--acc1e0bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30604%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jiangqie%20JiangQie%20Official%20Website%20Mini%20Program&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30603-cross-site-request-forgery-csrf-in--227b0cf2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30603%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DEJAN%20CopyLink&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30602-improper-neutralization-of-input-du-057c7939</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30602%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alphasis%20Related%20Posts%20via%20Categories&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30601-cross-site-request-forgery-csrf-in--2df7c574</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30601%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flipdish%20Flipdish%20Ordering%20System&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30600-improper-neutralization-of-input-du-25160620</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30600%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thiagogsrwp%20WP%20Hotjar&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30599-improper-neutralization-of-input-du-eff5158c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wp-maverick%20WP%20Parallax%20Content%20Slider&amp;severity=null&amp;id=69cd7303e6bfc5ba1def013d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30598-cross-site-request-forgery-csrf-in--807adf17</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30598%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Link%20OSS%20Upload&amp;severity=null&amp;id=69cd7303e6bfc5ba1def013a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30597-improper-neutralization-of-input-du-2c992c25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30597%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iografica%20IG%20Shortcodes&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30595-improper-neutralization-of-input-du-455bb7d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tstafford%20include-file&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30593-improper-neutralization-of-input-du-29a4b2c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samsk%20Include%20URL&amp;severity=null&amp;id=69cd7300e6bfc5ba1def005e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30592-missing-authorization-in-westerndea-0e4730b3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30592%3A%20Missing%20Authorization%20in%20WesternDeal%20Advanced%20Dewplayer&amp;severity=null&amp;id=69cd7300e6bfc5ba1def005b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30591-missing-authorization-in-tuyennv-mu-4a5e71ee</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30591%3A%20Missing%20Authorization%20in%20tuyennv%20Music%20Press%20Pro&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30590-improper-neutralization-of-special--00eca2c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30590%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dourou%20Flickr%20set%20slideshows&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30588-cross-site-request-forgery-csrf-in--dbe516d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30588%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ryan_xantoo%20Map%20Contact&amp;severity=null&amp;id=69cd7300e6bfc5ba1def004f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30587-cross-site-request-forgery-csrf-in--0307c5c5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30587%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shawfactor%20LH%20OGP%20Meta&amp;severity=null&amp;id=69cd7300e6bfc5ba1def004c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30586-cross-site-request-forgery-csrf-in--07118faf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30586%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bbodine1%20cTabs&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30585-cross-site-request-forgery-csrf-in--fc7dd7f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30585%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marynixie%20Generate%20Post%20Thumbnails&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30584-cross-site-request-forgery-csrf-in--fc83ceaa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30584%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alphaomegaplugins%20AlphaOmega%20Captcha%20%26amp%3B%20Anti-Spam%20Filter&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30583-cross-site-request-forgery-csrf-in--c917ba5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30583%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ProRankTracker%20Pro%20Rank%20Tracker&amp;severity=null&amp;id=69cd72fee6bfc5ba1deefff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30581-missing-authorization-in-pluginops--0fe9cffa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30581%3A%20Missing%20Authorization%20in%20PluginOps%20Top%20Bar&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30578-cross-site-request-forgery-csrf-in--1debe53f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30578%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hotvanrod%20AdSense%20Privacy%20Policy&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30577-cross-site-request-forgery-csrf-in--ea4c91f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30577%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mendibass%20Browser%20Address%20Bar%20Color&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30576-cross-site-request-forgery-csrf-in--75504311</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30576%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HuangYe%20WuDeng%20Hacklog%20Remote%20Image%20Autosave&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30575-improper-neutralization-of-input-du-aca89b07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arefly%20Login%20Redirect&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30574-improper-neutralization-of-input-du-fb42ed15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jenst%20Mobile%20Navigation&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30573-improper-neutralization-of-input-du-db88eadb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrdenny%20My%20Default%20Post%20Content&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30572-cross-site-request-forgery-csrf-in--9b524ce6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Igor%20Yavych%20Simple%20Rating&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30571-improper-neutralization-of-special--9d49212a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30571%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20STEdb%20Corp.%20STEdb%20Forms&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30570-improper-neutralization-of-special--7cd2e3ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30570%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30569-improper-neutralization-of-special--2964b980</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30569%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jahertor%20WP%20Featured%20Entries&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30568-cross-site-request-forgery-csrf-in--6b9b5aa3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30568%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hitoy%20Super%20Static%20Cache&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30566-improper-neutralization-of-input-du-ec48bbe8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aryan%20Themes%20Clink&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30565-cross-site-request-forgery-csrf-in--f8c6071b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30565%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20karrikas%20banner-manager&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30564-cross-site-request-forgery-csrf-in--ae2b62cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30564%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpwox%20Custom%20Script%20Integration&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30561-cross-site-request-forgery-csrf-in--0edd3e88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30561%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Henrique%20Mouta%20CAS%20Maestro&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30560-cross-site-request-forgery-csrf-in--5918745c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30560%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sana%20Ullah%20jQuery%20Dropdown%20Menu&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30558-cross-site-request-forgery-csrf-in--b6f79e45</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30558%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EnzoCostantini55%20ANAC%20XML%20Render&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30557-cross-site-request-forgery-csrf-in--9c280ccb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30557%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20odihost%20Easy%20301%20Redirects&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30556-cross-site-request-forgery-csrf-in--72b50f76</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30556%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flyaga%20Fix%20Rss%20Feeds&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30555-cross-site-request-forgery-csrf-in--28471f7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30555%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20iiiryan%20WordPres%20%E5%90%8C%E6%AD%A5%E5%BE%AE%E5%8D%9A&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefeb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30553-improper-neutralization-of-input-du-f0cc278a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Z.com%20byGMO%20GMO%20Font%20Agent&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefeb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30552-cross-site-request-forgery-csrf-in--7a3c8014</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30552%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Donald%20Gilbert%20WordPress%20Admin%20Bar%20Improved&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30551-improper-neutralization-of-input-du-b2a72ba7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartredfox%20Pretty%20file%20links&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30550-cross-site-request-forgery-csrf-in--b1a79127</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30550%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPShop.ru%20CallPhone&apos;r&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30549-cross-site-request-forgery-csrf-in--7a0d06f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30549%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yummly%20Yummly%20Rich%20Recipes&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefde7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30546-cross-site-request-forgery-csrf-in--766ecddf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30546%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20boroV%20Cackle&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefdde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30545-improper-neutralization-of-input-du-d8d05e8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixeline%20issuuPress&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30543-missing-authorization-in-swayamtejw-c7a0cde8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30543%3A%20Missing%20Authorization%20in%20swayam.tejwani%20Menu%20Duplicator&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefdd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30542-cross-site-request-forgery-csrf-in--38d42aa3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30542%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpsolutions%20SoundCloud%20Ultimate&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30541-cross-site-request-forgery-csrf-in--b74eaa7d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30541%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OTWthemes%20Info%20Boxes%20Shortcode%20and%20Widget&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30539-improper-neutralization-of-input-du-83c1ac2f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benedikt%20Mo%20BMo%20Expo&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30538-cross-site-request-forgery-csrf-in--e93adb2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30538%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ChrisHurst%20Simple%20Optimizer&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30537-improper-neutralization-of-input-du-908a4b24</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cristian%20Sarov%20Upload%20Quota%20per%20User&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30536-improper-neutralization-of-input-du-ded0ef6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zeitwesentech%20Beautiful%20Link%20Preview&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30535-cross-site-request-forgery-csrf-in--a22519e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30535%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20muro%20External%20image%20replace&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30534-cross-site-request-forgery-csrf-in--bb9164f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30534%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20captcha.soft%20Image%20Captcha&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30533-improper-neutralization-of-input-du-3bfa8bbe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Message%20ticker&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df0117a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30532-improper-neutralization-of-input-du-cbc9c27a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MorganF%20Weather%20Layer&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30531-cross-site-request-forgery-csrf-in--2d3f6fc0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30531%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20GBS%20Developer%20WP%20Ride%20Booking&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df01081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30530-improper-neutralization-of-input-du-70f58703</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30530%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atikul%20AI%20Preloader&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df0107e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30529-cross-site-request-forgery-csrf-in--70672bc7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30529%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20S%C3%A9bastien%20Dumont%20Auto%20Load%20Next%20Post&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30528-cross-site-request-forgery-csrf-in--99d1ff5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30528%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpshopee%20Awesome%20Logos&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30527-improper-neutralization-of-input-du-dc3f69c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30527%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codetoolbox%20My%20Bootstrap%20Menu&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30526-cross-site-request-forgery-csrf-in--76506083</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30526%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lucksy%20Typekit%20plugin%20for%20WordPress&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30525-improper-neutralization-of-special--83eb3831</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30525%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ProfitShare.ro%20WP%20Profitshare&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30523-improper-neutralization-of-special--cbc5ae9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30523%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Marcel-NL%20Super%20Simple%20Subscriptions&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30522-cross-site-request-forgery-csrf-in--f43518f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30522%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Damian%20Orzol%20Contact%20Form%207%20Material%20Design&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30521-cross-site-request-forgery-csrf-in--95ac9ee0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30521%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20giangmd93%20GP%20Back%20To%20Top&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-24-2be417</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-24&amp;severity=medium&amp;id=682c7db7e8347ec82d2be417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-24-f122cc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f122cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2655-sql-injection-in-sourcecodester-ac-r-8404aa77</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2655%3A%20SQL%20Injection%20in%20SourceCodester%20AC%20Repair%20and%20Services%20System&amp;severity=medium&amp;id=6921edc532b9fb10dcd3d962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29795-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-edge-update-setup-aeb3b0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29795%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Edge%20Update%20Setup&amp;severity=high&amp;id=682cd0f81484d88663aeb3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29806-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-microsoft-edge-chromium-based-aeb3b2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29806%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0f81484d88663aeb3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0927-1f5fe559</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0927&amp;severity=null&amp;id=69725c7b4623b1157c8074af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-23-2bf065</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-23&amp;severity=medium&amp;id=682c7db7e8347ec82d2bf065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-23-f12dee</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2186-cwe-89-improper-neutralization-of-sp-ca2684a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2186%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1973-cwe-22-improper-limitation-of-a-path-958b5a81</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1973%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webtoffee%20Export%20and%20Import%20Users%20and%20Customers&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2331-cwe-200-exposure-of-sensitive-inform-5cedf7c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2331%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1970-cwe-918-server-side-request-forgery--6720eb2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1970%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20webtoffee%20Export%20and%20Import%20Users%20and%20Customers&amp;severity=high&amp;id=699f6b19b7ef31ef0b54e244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1971-cwe-502-deserialization-of-untrusted-5b8deb3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1971%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webtoffee%20Export%20and%20Import%20Users%20and%20Customers&amp;severity=high&amp;id=699f6b19b7ef31ef0b54e24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1972-cwe-73-external-control-of-file-name-0d5b93b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1972%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20webtoffee%20Export%20and%20Import%20Users%20and%20Customers&amp;severity=low&amp;id=699f6b19b7ef31ef0b54e251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2577-cwe-79-improper-neutralization-of-in-95a5332d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitspecter%20Bitspecter%20Suite&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13666-cwe-20-improper-input-validation-in-ebf66827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13666%3A%20CWE-20%20Improper%20Input%20Validation%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13768-cwe-352-cross-site-request-forgery--b93c05b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13768%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ashikcse%20CITS%20Support%20svg%2C%20webp%20Media%20and%20TTF%2COTF%20File%20Upload%2C%20Use%20Custom%20Fonts&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a0713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2478-cwe-89-improper-neutralization-of-sp-7fcef9f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2478%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20allhart%20Code%20Clone&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13856-cwe-918-server-side-request-forgery-6f3bd158</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13856%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20thethemefoundry%20Your%20Friendly%20Drag%20and%20Drop%20Page%20Builder%20%E2%80%94%20Make%20Builder&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1311-cwe-89-improper-neutralization-of-sp-7ee31bc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1311%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wclovers%20WCFM%20%E2%80%93%20Multivendor%20Marketplace%20REST%20API%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54db29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2482-cwe-79-improper-neutralization-of-in-31ef65fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2482%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pienaro%20Gotcha%20%7C%20Gesture-based%20Captcha&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2303-cwe-94-improper-control-of-generatio-9b9ce573</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2303%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20landwire%20Block%20Logic%20%E2%80%93%20Full%20Block%20Display%20Control&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2484-cwe-79-improper-neutralization-of-in-c39db133</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skustes%20Multi%20Video%20Box&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0807-cwe-352-cross-site-request-forgery-c-eee55fe8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0807%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ashikcse%20CITS%20Support%20svg%2C%20webp%20Media%20and%20TTF%2COTF%20File%20Upload%2C%20Use%20Custom%20Fonts&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2479-cwe-79-improper-neutralization-of-in-efe68bd4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duogeek%20Easy%20Custom%20Admin%20Bar&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0724-cwe-502-deserialization-of-untrusted-8564c7ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0724%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=high&amp;id=699f6b6bb7ef31ef0b55538c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1408-cwe-862-missing-authorization-in-met-5c95562c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1408%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13739-cwe-79-improper-neutralization-of-i-9e3fa0d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contrid%20Newsletters&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0723-cwe-89-improper-neutralization-of-sp-fb361ca6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0723%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13737-cwe-862-missing-authorization-in-st-dc836bfe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13737%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a055d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-22-2bd94f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-22&amp;severity=medium&amp;id=682c7db7e8347ec82d2bd94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-22-f123c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f123c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2609-cwe-79-improper-neutralization-of-in-92feb597</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20MagnusSolution%20MagnusBilling&amp;severity=high&amp;id=692136eec842cd8eff5f2704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2610-cwe-79-improper-neutralization-of-in-e4836a34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20MagnusSolution%20MagnusBilling&amp;severity=high&amp;id=691dd88c52987e43f71b4d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25036-cwe-611-improper-restriction-of-xml-3051729b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25036%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Jalios%20JPlatform&amp;severity=medium&amp;id=691e29f04d0ffcb40bb6a620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25035-cwe-79-improper-neutralization-of-i-d14e0820</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25035%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Jalios%20JPlatform&amp;severity=high&amp;id=691e29f04d0ffcb40bb6a619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2598-cwe-497-exposure-of-sensitive-system-98db85f1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2598%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20AWS%20Cloud%20Development%20Kit%20Command%20Line%20Interface&amp;severity=medium&amp;id=68ee9ba2d8f994a66eca6021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24915-cwe-276-incorrect-default-permissio-b478c642</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24915%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Tenable%20Nessus%20Agent&amp;severity=high&amp;id=69a0a45985912abc71d662b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2583-cross-site-scripting-in-simplemachines-smf-bf84a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2583%3A%20Cross%20Site%20Scripting%20in%20SimpleMachines%20SMF&amp;severity=medium&amp;id=682d984bc4522896dcbf84a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2582-cross-site-scripting-in-simplemachines-smf-bf849d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2582%3A%20Cross%20Site%20Scripting%20in%20SimpleMachines%20SMF&amp;severity=medium&amp;id=682d984bc4522896dcbf849d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50053-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-manageengine-servicedesk-plus-bdcba3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ManageEngine%20ServiceDesk%20Plus&amp;severity=medium&amp;id=682d981fc4522896dcbdcba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2581-integer-underflow-in-xmedcon-8653e73c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2581%3A%20Integer%20Underflow%20in%20xmedcon&amp;severity=medium&amp;id=69091543c28fd46ded7bb307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29814-cwe-20-improper-input-validation-in-microsoft-microsoft-partner-center-aeb3b6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29814%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Partner%20Center&amp;severity=critical&amp;id=682cd0f81484d88663aeb3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29807-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-dataverse-aeb3b4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29807%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Dataverse&amp;severity=high&amp;id=682cd0f81484d88663aeb3b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-21-2c16d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-21&amp;severity=medium&amp;id=682c7db8e8347ec82d2c16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-21-f12e6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44305-an-app-may-be-able-to-gain-root-pri-79c947f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44305%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69a0a43f85912abc71d6302a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54564-a-file-received-from-airdrop-may-no-6a8b0c1d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54564%3A%20A%20file%20received%20from%20AirDrop%20may%20not%20have%20the%20quarantine%20flag%20applied%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44199-an-app-may-be-able-to-cause-unexpec-de6b97f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44199%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb82ce6bfc5ba1df6ea63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54551-processing-web-content-may-lead-to--cc7e7d80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54551%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=high&amp;id=690908537fff0e30cee23913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2538-cwe-798-use-of-hard-coded-credential-961a8935</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2538%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=critical&amp;id=686e82c46f40f0eb72045fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13920-cwe-22-improper-limitation-of-a-pat-ec054d4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13920%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webtoffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d1cb7ef31ef0b56e05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13921-cwe-502-deserialization-of-untruste-07fe231a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13921%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webtoffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=high&amp;id=699f6d1cb7ef31ef0b56e061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1802-cwe-79-improper-neutralization-of-in-4857310e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%20%26%20Template%20Builder&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2539-cwe-327-use-of-a-broken-or-risky-cry-fbf9ee30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2539%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20thomstark%20File%20Away&amp;severity=high&amp;id=699f6b23b7ef31ef0b54e8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13558-cwe-639-authorization-bypass-throug-ef420e3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13558%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20gplsaver%20NP%20Quote%20Request%20for%20WooCommerce&amp;severity=high&amp;id=699f6e60b7ef31ef0b59f2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13922-cwe-73-external-control-of-file-nam-722a539e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13922%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20webtoffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=low&amp;id=699f6d1cb7ef31ef0b56e068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13923-cwe-918-server-side-request-forgery-b4c6e0aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13923%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20webtoffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=high&amp;id=699f6d1cb7ef31ef0b56e06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12215-cwe-94-improper-control-of-generati-ef3007f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12215%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20kedro-org%20kedro-org%2Fkedro&amp;severity=high&amp;id=68ef9b24178f764e1f470ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8613-cwe-639-authorization-bypass-through-036726a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8613%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=high&amp;id=68ef9b2d178f764e1f470e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6825-cwe-94-improper-control-of-generatio-f3427894</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6825%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20berriai%20berriai%2Flitellm&amp;severity=high&amp;id=68ef9b2a178f764e1f470d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10549-cwe-1333-inefficient-regular-expres-a82ede4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10549%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=high&amp;id=68ef9b22178f764e1f4709f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0508-cwe-328-reversible-one-way-hash-in-a-c804c7d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0508%3A%20CWE-328%20Reversible%20One-Way%20Hash%20in%20aws%20aws%2Fsagemaker-python-sdk&amp;severity=medium&amp;id=68ef9b30178f764e1f470f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10650-cwe-770-allocation-of-resources-wit-3a8d73e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10650%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=high&amp;id=68ef9b22178f764e1f470a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8769-cwe-22-improper-limitation-of-a-path-59a05456</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8769%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aimhubio%20aimhubio%2Faim&amp;severity=critical&amp;id=68ef9b2e178f764e1f470e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12387-cwe-409-improper-handling-of-highly-28cdcb25</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12387%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=medium&amp;id=68ef9b24178f764e1f470ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7767-cwe-862-missing-authorization-in-dan-a03b66e6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7767%3A%20CWE-862%20Missing%20Authorization%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=medium&amp;id=68ef9b2c178f764e1f470dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12869-cwe-306-missing-authentication-for--9c91373b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12869%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20infiniflow%20infiniflow%2Fragflow&amp;severity=medium&amp;id=68ef9b25178f764e1f470b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11300-cwe-639-authorization-bypass-throug-b1b8dfd3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11300%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b24178f764e1f470ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8524-cwe-22-improper-limitation-of-a-path-933d9e36</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8524%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelscope%20modelscope%2Fagentscope&amp;severity=high&amp;id=68ef9b2d178f764e1f470e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8238-cwe-1336-improper-neutralization-of--5c5caddc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8238%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20aimhubio%20aimhubio%2Faim&amp;severity=medium&amp;id=68ef9b2d178f764e1f470e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10272-cwe-862-missing-authorization-in-lu-96292b0d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10272%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b22178f764e1f4709d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1040-cwe-1336-improper-neutralization-of--64537a1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1040%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20significant-gravitas%20significant-gravitas%2Fautogpt&amp;severity=high&amp;id=68ef9b30178f764e1f470f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8966-cwe-770-allocation-of-resources-with-2bde0631</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8966%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20gradio-app%20gradio-app%2Fgradio&amp;severity=high&amp;id=68ef9b2e178f764e1f470e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0453-cwe-410-insufficient-resource-pool-i-51a061cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0453%3A%20CWE-410%20Insufficient%20Resource%20Pool%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=medium&amp;id=68ef9b30178f764e1f470f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7039-cwe-863-incorrect-authorization-in-o-6fb71eaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7039%3A%20CWE-863%20Incorrect%20Authorization%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=high&amp;id=68ef9b2a178f764e1f470d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10955-cwe-1333-inefficient-regular-expres-0b57aa04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10955%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=medium&amp;id=68ef9b23178f764e1f470a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6866-cwe-178-improper-handling-of-case-se-2482cd4c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6866%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20corydolphin%20corydolphin%2Fflask-cors&amp;severity=medium&amp;id=690908577fff0e30cee23a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10986-cwe-59-improper-link-resolution-bef-5d209d94</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10986%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b23178f764e1f470a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0189-cwe-770-allocation-of-resources-with-ce04a760</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0189%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aimhubio%20aimhubio%2Faim&amp;severity=high&amp;id=68ef9b30178f764e1f470f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10051-cwe-770-allocation-of-resources-wit-35f68ed8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10051%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20shaunwei%20shaunwei%2Frealchar&amp;severity=high&amp;id=68ef9b21178f764e1f4709a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6844-cwe-346-origin-validation-error-in-c-68d0fea7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6844%3A%20CWE-346%20Origin%20Validation%20Error%20in%20corydolphin%20corydolphin%2Fflask-cors&amp;severity=medium&amp;id=68ef9b2a178f764e1f470d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1451-cwe-770-allocation-of-resources-with-83c3e4bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1451%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=high&amp;id=68ef9b30178f764e1f470f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7768-cwe-770-allocation-of-resources-with-a29e1b7b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7768%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=high&amp;id=68ef9b2c178f764e1f470ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8057-cwe-306-missing-authentication-for-c-3865271b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8057%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=medium&amp;id=68ef9b2c178f764e1f470df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10954-cwe-94-improper-control-of-generati-5e08681d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10954%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b23178f764e1f470a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0628-cwe-266-incorrect-privilege-assignme-6ebe4a2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0628%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20berriai%20berriai%2Flitellm&amp;severity=high&amp;id=68ef9b30178f764e1f470f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10624-cwe-1333-inefficient-regular-expres-41f599c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10624%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20gradio-app%20gradio-app%2Fgradio&amp;severity=high&amp;id=68ef9b22178f764e1f470a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9229-cwe-770-allocation-of-resources-with-61df720a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9229%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stangirard%20stangirard%2Fquivr&amp;severity=high&amp;id=68ef9b2f178f764e1f470edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10252-cwe-94-improper-control-of-generati-09e0cd1b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10252%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20langgenius%20langgenius%2Fdify&amp;severity=high&amp;id=68ef9b21178f764e1f4709b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9437-cwe-770-allocation-of-resources-with-1b19eaf9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9437%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20transformeroptimus%20transformeroptimus%2Fsuperagi&amp;severity=high&amp;id=68ef9b2f178f764e1f470ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7043-cwe-862-missing-authorization-in-ope-63e54127</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7043%3A%20CWE-862%20Missing%20Authorization%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=high&amp;id=68ef9b2b178f764e1f470d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10950-cwe-94-improper-control-of-generati-23a62dbe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10950%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b23178f764e1f470a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12390-cwe-59-improper-link-resolution-bef-8d0d8f51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12390%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b24178f764e1f470aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7983-cwe-770-allocation-of-resources-with-c8926224</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7983%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=high&amp;id=68ef9b2c178f764e1f470de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10714-cwe-770-allocation-of-resources-wit-862bcf3e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10714%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b22178f764e1f470a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12391-cwe-1333-inefficient-regular-expres-125c7c13</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12391%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=medium&amp;id=68ef9b24178f764e1f470af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8018-cwe-770-allocation-of-resources-with-a75ef66c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8018%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20imartinez%20imartinez%2Fprivategpt&amp;severity=high&amp;id=68ef9b2c178f764e1f470de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6863-cwe-749-exposed-dangerous-method-or--6fb15eaf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6863%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=medium&amp;id=68ef9b2a178f764e1f470d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10330-cwe-862-missing-authorization-in-lu-6cd3a467</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10330%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b22178f764e1f4709e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8789-cwe-1333-inefficient-regular-express-c3479777</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8789%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2e178f764e1f470e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12886-cwe-409-improper-handling-of-highly-556e2072</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12886%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20ollama%20ollama%2Follama&amp;severity=high&amp;id=68ef9b25178f764e1f470b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6842-cwe-306-missing-authentication-for-c-7b270cf7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6842%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=high&amp;id=68ef9b2a178f764e1f470d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10819-cwe-352-cross-site-request-forgery--3d701485</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10819%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b22178f764e1f470a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9617-cwe-639-authorization-bypass-through-1bf9054a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9617%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=medium&amp;id=68ef9b30178f764e1f470f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9311-cwe-352-cross-site-request-forgery-c-f7f48fa3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9311%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20haotian-liu%20haotian-liu%2Fllava&amp;severity=medium&amp;id=68ef9b2f178f764e1f470edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8551-cwe-23-relative-path-traversal-in-mo-df909623</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8551%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20modelscope%20modelscope%2Fagentscope&amp;severity=critical&amp;id=68ef9b2d178f764e1f470e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8055-cwe-89-improper-neutralization-of-sp-d5325048</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8055%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20vanna-ai%20vanna-ai%2Fvanna&amp;severity=high&amp;id=68ef9b2c178f764e1f470dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10363-cwe-862-missing-authorization-in-da-d4555947</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10363%3A%20CWE-862%20Missing%20Authorization%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68ef9b22178f764e1f4709ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11171-cwe-770-allocation-of-resources-wit-64c2972f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11171%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=high&amp;id=68ef9b23178f764e1f470a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7045-cwe-862-missing-authorization-in-ope-a76d040f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7045%3A%20CWE-862%20Missing%20Authorization%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0245-cwe-276-incorrect-default-permission-ada75b58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0245%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20hamza417%20hamza417%2Finure&amp;severity=medium&amp;id=68ef9b21178f764e1f47099e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10833-cwe-36-absolute-path-traversal-in-e-1965ef79</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10833%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20eosphoros-ai%20eosphoros-ai%2Fdb-gpt&amp;severity=critical&amp;id=68ef9b22178f764e1f470a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8954-cwe-304-missing-critical-step-in-aut-89788429</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8954%3A%20CWE-304%20Missing%20Critical%20Step%20in%20Authentication%20in%20composiohq%20composiohq%2Fcomposio&amp;severity=critical&amp;id=68ef9b2e178f764e1f470e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10019-cwe-78-improper-neutralization-of-s-5ce18c4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10019%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=medium&amp;id=68ef9b21178f764e1f4709a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9070-cwe-502-deserialization-of-untrusted-cf947bce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9070%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20bentoml%20bentoml%2Fbentoml&amp;severity=critical&amp;id=68ef9b2f178f764e1f470ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10907-cwe-835-loop-with-unreachable-exit--b1ac2e5b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10907%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20lm-sys%20lm-sys%2Ffastchat&amp;severity=high&amp;id=68ef9b23178f764e1f470a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9056-cwe-770-allocation-of-resources-with-7a52c783</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9056%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20bentoml%20bentoml%2Fbentoml&amp;severity=high&amp;id=68ef9b2f178f764e1f470eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12778-cwe-770-allocation-of-resources-wit-e8f8e10d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12778%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aimhubio%20aimhubio%2Faim&amp;severity=high&amp;id=68ef9b25178f764e1f470b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8061-cwe-1088-synchronous-access-of-remot-bf2ba835</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8061%3A%20CWE-1088%20Synchronous%20Access%20of%20Remote%20Resource%20without%20Timeout%20in%20aimhubio%20aimhubio%2Faim&amp;severity=high&amp;id=68ef9b2d178f764e1f470e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11172-cwe-248-uncaught-exception-in-danny-52941414</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11172%3A%20CWE-248%20Uncaught%20Exception%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=high&amp;id=68ef9b24178f764e1f470ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12388-cwe-1333-inefficient-regular-expres-d3f0abb4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12388%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=medium&amp;id=68ef9b24178f764e1f470aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0182-cwe-770-allocation-of-resources-with-346baa33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0182%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=high&amp;id=68ef9b30178f764e1f470f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7476-cwe-639-authorization-bypass-through-2e25401f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7476%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10707-cwe-22-improper-limitation-of-a-pat-682a3314</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10707%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=medium&amp;id=68ef9b22178f764e1f470a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9919-cwe-306-missing-authentication-for-c-1c5ee92a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9919%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=high&amp;id=68ef9b30178f764e1f470f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6827-cwe-444-inconsistent-interpretation--0ef6c7ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6827%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20in%20benoitc%20benoitc%2Fgunicorn&amp;severity=high&amp;id=68ef9b2a178f764e1f470d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10190-cwe-502-deserialization-of-untruste-205224d6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10190%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20horovod%20horovod%2Fhorovod&amp;severity=critical&amp;id=68ef9b21178f764e1f4709af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8028-cwe-770-allocation-of-resources-with-470a537e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8028%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=high&amp;id=68ef9b2c178f764e1f470deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10935-cwe-770-allocation-of-resources-wit-5a9d0a9a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10935%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20automatic1111%20automatic1111%2Fstable-diffusion-webui&amp;severity=high&amp;id=68ef9b23178f764e1f470a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10829-cwe-835-loop-with-unreachable-exit--094c5294</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10829%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20eosphoros-ai%20eosphoros-ai%2Fdb-gpt&amp;severity=high&amp;id=68ef9b22178f764e1f470a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12065-cwe-22-improper-limitation-of-a-pat-69eb64b5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12065%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20haotian-liu%20haotian-liu%2Fllava&amp;severity=high&amp;id=68ef9b24178f764e1f470ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8060-cwe-22-improper-limitation-of-a-path-b485c45f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8060%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=high&amp;id=68ef9b2c178f764e1f470df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9431-cwe-620-unverified-password-change-i-a27f60f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9431%3A%20CWE-620%20Unverified%20Password%20Change%20in%20transformeroptimus%20transformeroptimus%2Fsuperagi&amp;severity=medium&amp;id=68ef9b2f178f764e1f470ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7040-cwe-639-authorization-bypass-through-e13a9417</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7040%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12911-cwe-89-improper-neutralization-of-s-2835efaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12911%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68ef9b25178f764e1f470b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6839-cwe-41-improper-resolution-of-path-e-a61fcf21</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6839%3A%20CWE-41%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20corydolphin%20corydolphin%2Fflask-cors&amp;severity=medium&amp;id=690908577fff0e30cee23a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9096-cwe-862-missing-authorization-in-lun-07b6bee3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9096%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2f178f764e1f470ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9098-cwe-863-incorrect-authorization-in-l-0b3251c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9098%3A%20CWE-863%20Incorrect%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2f178f764e1f470ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7046-cwe-862-missing-authorization-in-ope-58a78243</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7046%3A%20CWE-862%20Missing%20Authorization%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12880-cwe-639-authorization-bypass-throug-6c4f3471</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12880%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20infiniflow%20infiniflow%2Fragflow&amp;severity=high&amp;id=68ef9b25178f764e1f470b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8764-cwe-1333-inefficient-regular-express-7b72557b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8764%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2e178f764e1f470e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9053-cwe-502-deserialization-of-untrusted-9161f013</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9053%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20vllm-project%20vllm-project%2Fvllm&amp;severity=critical&amp;id=68ef9b2e178f764e1f470ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12216-cwe-59-improper-link-resolution-bef-aca29ac3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12216%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20dmlc%20dmlc%2Fgluon-cv&amp;severity=high&amp;id=68ef9b24178f764e1f470ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10572-cwe-94-improper-control-of-generati-342ada0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10572%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=high&amp;id=68ef9b22178f764e1f4709f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8955-cwe-918-server-side-request-forgery--b82e50da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8955%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20composiohq%20composiohq%2Fcomposio&amp;severity=medium&amp;id=68ef9b2e178f764e1f470e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8020-cwe-248-uncaught-exception-in-lightn-2790df5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8020%3A%20CWE-248%20Uncaught%20Exception%20in%20lightning-ai%20lightning-ai%2Fpytorch-lightning&amp;severity=high&amp;id=68ef9b2c178f764e1f470de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9000-cwe-862-missing-authorization-in-lun-104ad3e8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9000%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2e178f764e1f470e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8581-cwe-22-improper-limitation-of-a-path-b106e34d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8581%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=critical&amp;id=68ef9b2d178f764e1f470e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9418-cwe-256-unprotected-storage-of-crede-fea982a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9418%3A%20CWE-256%20Unprotected%20Storage%20of%20Credentials%20in%20transformeroptimus%20transformeroptimus%2Fsuperagi&amp;severity=medium&amp;id=68ef9b2f178f764e1f470ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8984-cwe-770-allocation-of-resources-with-aa5c4065</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8984%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20berriai%20berriai%2Flitellm&amp;severity=high&amp;id=68ef9b2e178f764e1f470e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10902-cwe-22-improper-limitation-of-a-pat-fe6161c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10902%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20eosphoros-ai%20eosphoros-ai%2Fdb-gpt&amp;severity=critical&amp;id=68ef9b23178f764e1f470a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10821-cwe-835-loop-with-unreachable-exit--8f9e1250</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10821%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20invoke-ai%20invoke-ai%2Finvokeai&amp;severity=high&amp;id=68ef9b22178f764e1f470a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10275-cwe-863-incorrect-authorization-in--bb9f6638</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10275%3A%20CWE-863%20Incorrect%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b22178f764e1f4709e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8156-cwe-77-improper-neutralization-of-sp-20026134</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8156%3A%20CWE-77%20%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20significant-gravitas%20significant-gravitas%2Fautogpt&amp;severity=high&amp;id=68ef9b2d178f764e1f470e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12910-cwe-674-uncontrolled-recursion-in-r-920ab6f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12910%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=68ef9b25178f764e1f470b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10361-cwe-22-improper-limitation-of-a-pat-91ad47c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10361%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=high&amp;id=68ef9b22178f764e1f4709ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0188-cwe-918-server-side-request-forgery--159b1558</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0188%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=medium&amp;id=68ef9b30178f764e1f470f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2292-cwe-862-missing-authorization-in-cha-2f0f1d83</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2292%3A%20CWE-862%20Missing%20Authorization%20in%20changeweb%20changeweb%2Funifiedtransform&amp;severity=high&amp;id=68ef9b26178f764e1f470b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12704-cwe-835-loop-with-unreachable-exit--7237e645</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12704%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68ef9b24178f764e1f470af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10274-cwe-862-missing-authorization-in-lu-fffb3359</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10274%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b22178f764e1f4709de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10481-cwe-352-cross-site-request-forgery--95661be4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10481%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20comfyanonymous%20comfyanonymous%2Fcomfyui&amp;severity=medium&amp;id=68ef9b22178f764e1f4709f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11137-cwe-639-authorization-bypass-throug-68011124</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11137%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b23178f764e1f470a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8763-cwe-1333-inefficient-regular-express-c64c351b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8763%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2d178f764e1f470e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10225-cwe-770-allocation-of-resources-wit-460c9825</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10225%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20haotian-liu%20haotian-liu%2Fllava&amp;severity=high&amp;id=68ef9b21178f764e1f4709b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7779-cwe-1333-inefficient-regular-express-d74b0d43</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7779%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=high&amp;id=68ef9b2c178f764e1f470ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11042-cwe-73-external-control-of-file-nam-1e51e0c8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11042%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20invoke-ai%20invoke-ai%2Finvokeai&amp;severity=critical&amp;id=68ef9b23178f764e1f470a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8999-cwe-862-missing-authorization-in-lun-bcc785d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8999%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=68ef9b2e178f764e1f470e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8251-cwe-89-improper-neutralization-of-sp-2fb1891f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8251%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=medium&amp;id=68ef9b2d178f764e1f470e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10273-cwe-863-incorrect-authorization-in--f712b0df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10273%3A%20CWE-863%20Incorrect%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b22178f764e1f4709da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9095-cwe-862-missing-authorization-in-lun-4ec16bc8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9095%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=68ef9b2f178f764e1f470ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10713-cwe-770-allocation-of-resources-wit-f80e4134</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10713%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20szad670401%20szad670401%2Fhyperlpr&amp;severity=high&amp;id=68ef9b22178f764e1f470a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1796-cwe-338-use-of-cryptographically-wea-335e4ec4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1796%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20langgenius%20langgenius%2Fdify&amp;severity=high&amp;id=68ef9b30178f764e1f470f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13060-cwe-862-missing-authorization-in-mi-0119e80e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13060%3A%20CWE-862%20Missing%20Authorization%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=medium&amp;id=68ef9b25178f764e1f470b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47552-cwe-502-deserialization-of-untruste-c97f900f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47552%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Seata%20(incubating)&amp;severity=critical&amp;id=69c2bc3ff4197a8e3b4e78c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2505-cwe-22-improper-limitation-of-a-path-215ac041</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2505%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20philsbury%20Age%20Gate&amp;severity=critical&amp;id=699f6b23b7ef31ef0b54e822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2108-cwe-79-improper-neutralization-of-in-f0c84f6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2108%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22228-vulnerability-in-spring-spring-security-befae9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22228%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=682d983ec4522896dcbefae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1766-cwe-862-missing-authorization-in-the-faa15c18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1766%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1770-cwe-22-improper-limitation-of-a-path-c26689e3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1770%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=high&amp;id=699f6b19b7ef31ef0b54e16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1314-cwe-352-cross-site-request-forgery-c-f98b2e02</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1314%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smub%20Custom%20Twitter%20Feeds%20%E2%80%93%20A%20Tweets%20Widget%20or%20X%20Feed%20Widget&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54db84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57440-na-7e8f7901</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57440%3A%20n%2Fa&amp;severity=high&amp;id=696fe03c4623b1157c4c7685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-20-2bff06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-20&amp;severity=medium&amp;id=682c7db8e8347ec82d2bff06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-20-f12af8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7631-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-bda3cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7631%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=medium&amp;id=682d981cc4522896dcbda3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51459-cwe-280-improper-handling-of-insuff-d8c2f62c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51459%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=69a0a44485912abc71d6313a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25132-uncontrolled-resource-consumption-263fdc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25132%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=682f59b40acd01a249263fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26486-cwe-327-use-of-a-broken-or-risky-cr-7030be73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26486%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Beta80%20Life%201st&amp;severity=medium&amp;id=686544a26f40f0eb7292f612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26485-cwe-200-exposure-of-sensitive-infor-13fef3d7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26485%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Beta80%20Life%201st&amp;severity=medium&amp;id=6865411f6f40f0eb7292ee11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2512-cwe-434-unrestricted-upload-of-file--efc58aaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2512%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20thomstark%20File%20Away&amp;severity=critical&amp;id=699f6b23b7ef31ef0b54e82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2511-cwe-89-improper-neutralization-of-sp-8e64a6f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2511%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mitchelllevy%20AHAthat%20Plugin&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12920-cwe-862-missing-authorization-in-ch-4e0184ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12920%3A%20CWE-862%20Missing%20Authorization%20in%20Chimpstudio%20FoodBakery%20%7C%20Delivery%20Restaurant%20Directory%20WordPress%20Theme&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13442-cwe-288-authentication-bypass-using-6bfc3022</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13442%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=critical&amp;id=699f6e57b7ef31ef0b59e90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13933-cwe-352-cross-site-request-forgery--6c9c5631</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13933%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chimpstudio%20FoodBakery%20%7C%20Delivery%20Restaurant%20Directory%20WordPress%20Theme&amp;severity=high&amp;id=699f6d1cb7ef31ef0b56e078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13790-cwe-98-improper-control-of-filename-c0dd7c5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13790%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20MinimogWP%20%E2%80%93%20The%20High%20Converting%20eCommerce%20WordPress%20Theme&amp;severity=critical&amp;id=699f6d14b7ef31ef0b56db84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13412-cwe-862-missing-authorization-in-lo-524b209b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13412%3A%20CWE-862%20Missing%20Authorization%20in%20LoftOcean%20CozyStay%20-%20Hotel%20Booking%20WordPress%20Theme&amp;severity=high&amp;id=699f6e55b7ef31ef0b59e69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13410-cwe-502-deserialization-of-untruste-2839d461</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13410%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20LoftOcean%20CozyStay%20-%20Hotel%20Booking%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e55b7ef31ef0b59e68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12922-cwe-862-missing-authorization-in-th-cc2c1882</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12922%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeGoods%20Altair&amp;severity=critical&amp;id=699f6e4cb7ef31ef0b59c7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12295-cwe-640-weak-password-recovery-mech-c3c04c74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12295%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20PX-lab%20BoomBox%20Theme%20Extensions&amp;severity=high&amp;id=699f6e35b7ef31ef0b597ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2290-cwe-862-missing-authorization-in-chr-690c925d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2290%3A%20CWE-862%20Missing%20Authorization%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-19-2bf9fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-19&amp;severity=medium&amp;id=682c7db8e8347ec82d2bf9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-19-f12338</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f12338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12563-cwe-98-improper-control-of-filename-4fd1252b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12563%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Sharks%20s2Member%20Pro&amp;severity=high&amp;id=699f6e43b7ef31ef0b59bef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22514-rce-remote-code-execution-in-atlassian-sourcetree-for-mac-bd6bf3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22514%3A%20RCE%20(Remote%20Code%20Execution)%20in%20Atlassian%20Sourcetree%20for%20Mac&amp;severity=high&amp;id=682d9816c4522896dcbd6bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2487-null-pointer-dereference-in-red-hat-red-hat-directory-server-12-4-eus-for-rhel-9-bd6582</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2487%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9816c4522896dcbd6582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56347-cwe-114-process-control-in-ibm-aix-b7a330f9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56347%3A%20CWE-114%20Process%20Control%20in%20IBM%20AIX&amp;severity=critical&amp;id=69a0a44985912abc71d64abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56346-cwe-114-process-control-in-ibm-aix-61e4ce7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56346%3A%20CWE-114%20Process%20Control%20in%20IBM%20AIX&amp;severity=critical&amp;id=69a0a44985912abc71d64ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27688-cwe-732-incorrect-permission-assign-c782207d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27688%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20Wyse%20Proprietary%20OS%20(Modern%20ThinOS)&amp;severity=high&amp;id=69a0a45d85912abc71d66aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0755-cwe-122-heap-based-buffer-overflow-in-mongodb-inc-libbson-bf15da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0755%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20MongoDB%20Inc%20libbson&amp;severity=high&amp;id=682d9840c4522896dcbf15da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2262-cwe-862-missing-authorization-in-sam-44555beb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2262%3A%20CWE-862%20Missing%20Authorization%20in%20samdani%20Logo%20Slider%20%E2%80%93%20Logo%20Showcase%2C%20Logo%20Carousel%2C%20Logo%20Gallery%20and%20Client%20Logo%20Presentation&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-18-2c2209</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-18&amp;severity=medium&amp;id=682c7db8e8347ec82d2c2209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-18-f12d51</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22512-dos-denial-of-service-in-atlassian-confluence-data-center-bd6beb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22512%3A%20DoS%20(Denial%20of%20Service)%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=high&amp;id=682d9816c4522896dcbd6beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40635-cwe-190-integer-overflow-or-wraparound-in-containerd-containerd-bdcc9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40635%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20containerd%20containerd&amp;severity=medium&amp;id=682d9820c4522896dcbdcc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44276-a-user-in-a-privileged-network-posi-7809eea5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44276%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20leak%20sensitive%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb82ee6bfc5ba1df6ed26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24185-parsing-a-maliciously-crafted-file--de57f663</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24185%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54559-an-app-may-be-able-to-access-sensit-2c7e2e33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54559%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54525-restoring-a-maliciously-crafted-bac-b3470755</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54525%3A%20Restoring%20a%20maliciously%20crafted%20backup%20file%20may%20lead%20to%20modification%20of%20protected%20system%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb833e6bfc5ba1df6ee30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54565-an-app-may-be-able-to-access-sensit-9c35095f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54565%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22472-cwe-77-improper-neutralization-of-s-08dcf352</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22472%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a45385912abc71d656ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22473-cwe-77-improper-neutralization-of-s-c9ff2632</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22473%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a45385912abc71d656b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49561-cwe-266-incorrect-privilege-assignm-924fe6e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49561%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a44285912abc71d630e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49559-cwe-1393-use-of-default-password-in-1916b9f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49559%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a44285912abc71d630e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48017-cwe-77-improper-neutralization-of-s-efe2d4fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48017%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=69a0a44285912abc71d630d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48015-cwe-77-improper-neutralization-of-s-2a9e4c19</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48015%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=69a0a44285912abc71d630cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48830-cwe-77-improper-neutralization-of-s-09456b50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48830%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a44285912abc71d630db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48013-cwe-250-execution-with-unnecessary--b9c6f516</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48013%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a44285912abc71d630c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2241-insecure-storage-of-sensitive-information-24efad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2241%3A%20Insecure%20Storage%20of%20Sensitive%20Information&amp;severity=high&amp;id=682e4ad00acd01a24924efad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29786-cwe-770-allocation-of-resources-wit-71ff70c8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29786%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20expr-lang%20expr&amp;severity=high&amp;id=6973a6f24623b1157c4f2e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54027-improper-access-control-in-fortinet-1bcdeb87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54027%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6967a2148330e0671671d0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2357-memory-corruption-in-dcmtk-3d3dff52</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2357%3A%20Memory%20Corruption%20in%20DCMTK&amp;severity=medium&amp;id=69091543c28fd46ded7bb2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26042-na-ed9e331a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26042%3A%20n%2Fa&amp;severity=medium&amp;id=697790e84623b1157ca22c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-17-2c0959</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-17&amp;severity=medium&amp;id=682c7db8e8347ec82d2c0959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-17-f12720</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2338-heap-based-buffer-overflow-in-tbeu-m-88f48fd2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2338%3A%20Heap-based%20Buffer%20Overflow%20in%20tbeu%20matio&amp;severity=medium&amp;id=688204c6ad5a09ad00345627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2337-heap-based-buffer-overflow-in-tbeu-m-55d9f5d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2337%3A%20Heap-based%20Buffer%20Overflow%20in%20tbeu%20matio&amp;severity=medium&amp;id=688204c6ad5a09ad0034561f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-16-2c3350</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-16&amp;severity=medium&amp;id=682c7db8e8347ec82d2c3350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-16-f123f8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f123f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27281-improper-neutralization-of-special--bf989d33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27281%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cookforweb%20All%20In%20Menu&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26978-improper-neutralization-of-special--3db40094</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26978%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fs-code%20FS%20Poster&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26961-missing-authorization-in-freshface--ef0349da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26961%3A%20Missing%20Authorization%20in%20FRESHFACE%20Fresh%20Framework&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26924-improper-control-of-generation-of-c-24186739</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26924%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20colabrio%20Ohio%20Extra&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26921-deserialization-of-untrusted-data-i-61dac7b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26921%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26899-cross-site-request-forgery-csrf-in--5908f7da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26899%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Recapture%20Cart%20Recovery%20and%20Email%20Marketing%20Recapture%20for%20WooCommerce&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26895-improper-neutralization-of-input-du-3a861e87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26895%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maennchen1.de%20m1.DownloadList&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26886-improper-neutralization-of-special--f5bc619c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26886%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PublishPress%20PublishPress%20Authors&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26875-improper-neutralization-of-special--315ef8fb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26875%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20silverplugins217%20Multiple%20Shipping%20And%20Billing%20Address%20For%20Woocommerce&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26556-improper-neutralization-of-input-du-6d84f8b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zzmaster%20WP%20AntiDDOS&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26555-improper-neutralization-of-input-du-2c036c34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Thorsten%20Ott%20Debug-Bar-Extender&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26554-improper-neutralization-of-input-du-36a3d8fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nicola%20Mustone%20WP%20Discord%20Post&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26553-improper-neutralization-of-input-du-bf8e7d14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spring%20Devs%20Pre%20Order%20Addon%20for%20WooCommerce%20%E2%80%93%20Advance%20Order%2FBackorder%20Plugin&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26548-improper-neutralization-of-input-du-eea5ca2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kdmurray%20Random%20Image%20Selector&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23744-improper-neutralization-of-input-du-1945a373</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dvs11%20Random%20Posts%2C%20Mp3%20Player%20%2B%20ShareButton&amp;severity=null&amp;id=69cd722de6bfc5ba1dee8550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1530-cwe-352-cross-site-request-forgery-c-cfdedc9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1530%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tripetto%20WordPress%20form%20builder%20plugin%20for%20contact%20forms%2C%20surveys%20and%20quizzes%20%E2%80%93%20Tripetto&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54dee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2025-cwe-862-missing-authorization-in-giv-76c835c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2025%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1057-incorrect-type-conversion-or-cast-919e86c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1057%3A%20Incorrect%20Type%20Conversion%20or%20Cast&amp;severity=medium&amp;id=6868be146f40f0eb72a6ac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2325-cwe-79-improper-neutralization-of-in-6a60ee78</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2325%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boopathi0001%20WP%20Test%20Email&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2157-insecure-storage-of-sensitive-information-in-red-hat-satellite-server-24ee8f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2157%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Red%20Hat%20Satellite%20Server&amp;severity=low&amp;id=682e44190acd01a24924ee8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13497-cwe-80-improper-neutralization-of-s-a1b5e7ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13497%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20tripetto%20WordPress%20form%20builder%20plugin%20for%20contact%20forms%2C%20surveys%20and%20quizzes%20%E2%80%93%20Tripetto&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1771-cwe-98-improper-control-of-filename--a9bc9890</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1771%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ShineTheme%20Travel%20Booking%20WordPress%20Theme&amp;severity=critical&amp;id=699f6b19b7ef31ef0b54e175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1773-cwe-79-improper-neutralization-of-in-336737be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1773%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ShineTheme%20Travel%20Booking%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1668-cwe-862-missing-authorization-in-jds-5c8ee50e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1668%3A%20CWE-862%20Missing%20Authorization%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1670-cwe-89-improper-neutralization-of-sp-3ab28bb2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1670%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1667-cwe-639-authorization-bypass-through-2ccf1737</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1667%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e01a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12336-cwe-862-missing-authorization-in-co-3a588f07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12336%3A%20CWE-862%20Missing%20Authorization%20in%20codexpert%20WC%20Affiliate%20%E2%80%93%20WooCommerce%20Affiliate%20Plugin&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1669-cwe-89-improper-neutralization-of-sp-1a09ac98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1669%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2267-cwe-862-missing-authorization-in-wp0-a41f827b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2267%3A%20CWE-862%20Missing%20Authorization%20in%20wp01ru%20WP01%20%E2%80%93%20Speed%2C%20Security%2C%20SEO%20consultant&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2163-cwe-79-improper-neutralization-of-in-95c9c034</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2163%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zoorum%20Zoorum%20Comments&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13847-bd76cb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13847&amp;severity=low&amp;id=682d9817c4522896dcbd76cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1653-cwe-266-incorrect-privilege-assignme-020550b5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1653%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20stylemix%20Directory%20Listings%20WordPress%20plugin%20%E2%80%93%20uListing&amp;severity=high&amp;id=699f6b16b7ef31ef0b54df85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1657-cwe-862-missing-authorization-in-sty-7a503db3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1657%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Directory%20Listings%20WordPress%20plugin%20%E2%80%93%20uListing&amp;severity=high&amp;id=699f6b16b7ef31ef0b54df89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30066-cwe-506-embedded-malicious-code-in--f10c6f03</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30066%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20tj-actions%20changed-files&amp;severity=high&amp;id=68881728ad5a09ad0088bc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-15-2c2c0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-15&amp;severity=medium&amp;id=682c7db8e8347ec82d2c2c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-15-f1298a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f1298a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2310-heap-based-buffer-overflow-in-hdf5-bd87c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2310%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=682d9819c4522896dcbd87c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2309-heap-based-buffer-overflow-in-hdf5-bd87ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2309%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=682d9819c4522896dcbd87ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2308-heap-based-buffer-overflow-in-hdf5-bd87b6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2308%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=682d9819c4522896dcbd87b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46662-escalation-of-privilege-in-fortinet-228d926e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46662%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiManager&amp;severity=high&amp;id=69a0a43f85912abc71d6303c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45643-cwe-327-use-of-a-broken-or-risky-cr-9b615e4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45643%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20QRadar%20EDR&amp;severity=medium&amp;id=69a0a43f85912abc71d63039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52927-vulnerability-in-linux-linux-be6bbd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2000-cwe-502-deserialization-of-untrusted-3fb58616</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2000%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20Qiskit%20SDK&amp;severity=critical&amp;id=6883ae32ad5a09ad00530b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13773-cwe-321-use-of-hard-coded-cryptogra-6e57283b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13773%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20uxper%20Civi%20-%20Job%20Board%20%26%20Freelance%20Marketplace%20WordPress%20Theme&amp;severity=high&amp;id=699f6e6db7ef31ef0b5a0727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13772-cwe-288-authentication-bypass-using-74565836</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13772%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20uxper%20Civi%20-%20Job%20Board%20%26%20Freelance%20Marketplace%20WordPress%20Theme&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a0723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2232-cwe-269-improper-privilege-managemen-db353f61</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2232%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20PureThemes%20Realteo&amp;severity=critical&amp;id=699f6b1fb7ef31ef0b54e5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13771-cwe-288-authentication-bypass-using-b7b6ad2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13771%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20uxper%20Civi%20-%20Job%20Board%20%26%20Freelance%20Marketplace%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e6db7ef31ef0b5a071f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12810-cwe-862-missing-authorization-in-jo-e3efdf46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12810%3A%20CWE-862%20Missing%20Authorization%20in%20JobCareer%20%7C%20Job%20Board%20Responsive%20WordPress%20Theme&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26006-execute-unauthorized-code-or-comman-543505c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26006%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=69a0a43c85912abc71d620db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1507-cwe-862-missing-authorization-in-sha-845c0b8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1507%3A%20CWE-862%20Missing%20Authorization%20in%20sharethis%20ShareThis%20Dashboard%20for%20Google%20Analytics&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54de3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8176-uncontrolled-recursion-aecbac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8176%3A%20Uncontrolled%20Recursion&amp;severity=high&amp;id=682cd0fc1484d88663aecbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13407-cwe-639-authorization-bypass-throug-20139901</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13407%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20omnipressteam%20Omnipress&amp;severity=medium&amp;id=699f6e55b7ef31ef0b59e680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13321-cwe-89-improper-neutralization-of-s-c9db8a4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13321%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Solid%20Plugins%20AnalyticsWP&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59ca9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1526-cwe-79-improper-neutralization-of-in-1b14ce26</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1526%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20detheme%20DethemeKit%20for%20Elementor&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54ded3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13824-cwe-502-deserialization-of-untruste-2e9e8238</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13824%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Potenzaglobalsolutions%20CiyaShop%20-%20Multipurpose%20WooCommerce%20Theme&amp;severity=critical&amp;id=699f6d17b7ef31ef0b56dd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2221-cwe-89-improper-neutralization-of-sp-d065d22a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2221%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20whyun%20WPCOM%20Member&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13913-cwe-352-cross-site-request-forgery--3aae37d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13913%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20instawp%20InstaWP%20Connect%20%E2%80%93%201-click%20WP%20Staging%20%26%20Migration&amp;severity=high&amp;id=699f6d1cb7ef31ef0b56e055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2103-cwe-862-missing-authorization-in-iro-56ddf246</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2103%3A%20CWE-862%20Missing%20Authorization%20in%20IronTemplates%20SoundRise%20Music&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13376-cwe-269-improper-privilege-manageme-008b606a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13376%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Anps%20Industrial&amp;severity=high&amp;id=699f6e52b7ef31ef0b59e3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0952-cwe-862-missing-authorization-in-cms-bc980a33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0952%3A%20CWE-862%20Missing%20Authorization%20in%20cmsmasters%20Eco%20Nature%20-%20Environment%20%26%20Ecology%20WordPress%20Theme&amp;severity=high&amp;id=699f6b6db7ef31ef0b55557e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2289-cwe-862-missing-authorization-in-zoz-18e2822b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2289%3A%20CWE-862%20Missing%20Authorization%20in%20zozothemes%20Zegen%20-%20Church%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1764-cwe-352-cross-site-request-forgery-c-f34768d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1764%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hiddenpearls%20LoginPress%20%7C%20wp-login%20Custom%20Login%20Page%20Customizer&amp;severity=high&amp;id=699f6b19b7ef31ef0b54e150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2056-cwe-23-relative-path-traversal-in-jo-bb3818c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2056%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20johndarrel%20WP%20Ghost%20(Hide%20My%20WP%20Ghost)%20%E2%80%93%20Security%20%26%20Firewall&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0955-cwe-862-missing-authorization-in-bee-cce10301</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0955%3A%20CWE-862%20Missing%20Authorization%20in%20beeteam368%20VidoRev%20Extensions&amp;severity=medium&amp;id=699f6b6db7ef31ef0b55558e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11283-cwe-289-authentication-bypass-by-al-2f0807ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11283%3A%20CWE-289%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20WP%20JobHunt&amp;severity=high&amp;id=699f6e0bb7ef31ef0b59430f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11286-cwe-288-authentication-bypass-using-37d75175</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11286%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20WP%20JobHunt&amp;severity=critical&amp;id=699f6e0cb7ef31ef0b5943e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2166-cwe-79-improper-neutralization-of-in-0b35bc4d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2166%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20FAQ%20%20%E2%80%93%20Simplify%20support%20with%20an%20intuitive%20FAQ%20management%20tool&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11284-cwe-639-authorization-bypass-throug-c2c30735</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11284%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20JobHunt&amp;severity=critical&amp;id=699f6e0bb7ef31ef0b594313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1528-cwe-862-missing-authorization-in-sea-8251c7ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1528%3A%20CWE-862%20Missing%20Authorization%20in%20Search%20%26%20Filter%20Search%20%26%20Filter%20Pro&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54dedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1285-cwe-862-missing-authorization-in-sma-701cccfa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1285%3A%20CWE-862%20Missing%20Authorization%20in%20SmartDataSoft%20Resido%20-%20Real%20Estate%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54daed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11285-cwe-639-authorization-bypass-throug-361fb5dd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11285%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20JobHunt&amp;severity=critical&amp;id=699f6e0cb7ef31ef0b5943d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55549-cwe-416-use-after-free-in-xmlsoft-l-a1ff218f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55549%3A%20CWE-416%20Use%20After%20Free%20in%20xmlsoft%20libxslt&amp;severity=high&amp;id=690916cac28fd46ded7ccfdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24855-cwe-416-use-after-free-in-xmlsoft-l-4102076a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24855%3A%20CWE-416%20Use%20After%20Free%20in%20xmlsoft%20libxslt&amp;severity=high&amp;id=688d9167ad5a09ad00d109f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-14-86485bf0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-14&amp;severity=medium&amp;id=68367c98182aa0cae231e707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-14-750c12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-14&amp;severity=medium&amp;id=682c7abce3e6de8ceb750c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-14-f12d30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24053-cwe-285-improper-authorization-in-microsoft-microsoft-dataverse-aeb319</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24053%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Dataverse&amp;severity=high&amp;id=682cd0f81484d88663aeb319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29768-cwe-88-improper-neutralization-of-argument-delimiters-in-a-command-argument-injection-in-vim-vim-beb7cb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29768%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20vim%20vim&amp;severity=medium&amp;id=682d9837c4522896dcbeb7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1652-cwe-125-out-of-bounds-read-in-autodesk-autocad-bf0804</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1652%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf0804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1651-cwe-122-heap-based-buffer-overflow-in-autodesk-autocad-bf07f3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1651%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1650-cwe-457-use-of-uninitialized-variable-in-autodesk-autocad-bf07ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1650%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1649-cwe-457-use-of-uninitialized-variable-in-autodesk-autocad-bf07eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1649%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1433-cwe-125-out-of-bounds-read-in-autodesk-autocad-bf0829</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1433%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf0829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1432-cwe-416-use-after-free-in-autodesk-autocad-bf07e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1432%3A%20CWE-416%20Use%20After%20Free%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1431-cwe-125-out-of-bounds-read-in-autodesk-autocad-bf07e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1431%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1430-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-autodesk-autocad-bf07d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1430%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1429-cwe-122-heap-based-buffer-overflow-in-autodesk-autocad-bf07ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1429%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1428-cwe-125-out-of-bounds-read-in-autodesk-autocad-bf07a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1428%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1427-cwe-457-use-of-uninitialized-variable-in-autodesk-autocad-bf07a0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1427%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10942-cwe-502-deserialization-of-untruste-f3de830a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10942%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20servmask%20All-in-One%20WP%20Migration%20and%20Backup&amp;severity=high&amp;id=699f6e03b7ef31ef0b593925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21104-cwe-601-url-redirection-to-untruste-23845375</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21104%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Dell%20NetWorker&amp;severity=medium&amp;id=69901848c9e1ff5ad867f2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1785-cwe-22-improper-limitation-of-a-path-861abb90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1785%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1119-cwe-94-improper-control-of-generatio-982643dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1119%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=699f6b0eb7ef31ef0b54da4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1503-cwe-79-improper-neutralization-of-in-0cd51336</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1503%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1561-cwe-79-improper-neutralization-of-in-8f717590</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1561%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottopolis%20AppPresser%20%E2%80%93%20Mobile%20App%20Framework&amp;severity=high&amp;id=699f6b15b7ef31ef0b54def2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2104-cwe-862-missing-authorization-in-sof-68d35137</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2104%3A%20CWE-862%20Missing%20Authorization%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2250-cwe-89-improper-neutralization-of-sp-68dda5d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2250%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sminozzi%20ReportAttacks%20%E2%80%94%20Brute%20Force%20%26%20Login%20Protection&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13887-cwe-639-authorization-bypass-throug-f1671023</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13887%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56df01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2107-cwe-89-improper-neutralization-of-sp-63e5222f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2107%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20arielbrailovsky%20ArielBrailovsky-ViralAd&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13703-cwe-862-missing-authorization-in-vc-5c2284fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13703%3A%20CWE-862%20Missing%20Authorization%20in%20vcita%20CRM%20and%20Lead%20Management%20by%20vcita&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1559-cwe-79-improper-neutralization-of-in-0100d1df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clearcodehq%20CC-IMG-Shortcode&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54dee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2106-cwe-89-improper-neutralization-of-sp-0d4e617c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2106%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20arielbrailovsky%20ArielBrailovsky-ViralAd&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-13-2c3771</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-13&amp;severity=medium&amp;id=682c7db8e8347ec82d2c3771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-13-f13144</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-13&amp;severity=medium&amp;id=682acdc2bbaf20d303f13144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25292-cwe-347-improper-verification-of-cr-73c270e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25292%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAML-Toolkits%20ruby-saml&amp;severity=critical&amp;id=68c4a9e26da8ad0abf36f295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25291-cwe-347-improper-verification-of-cr-f6125a3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25291%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAML-Toolkits%20ruby-saml&amp;severity=critical&amp;id=68c4a9e26da8ad0abf36f287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25293-cwe-400-uncontrolled-resource-consu-b6be3dc6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25293%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SAML-Toolkits%20ruby-saml&amp;severity=high&amp;id=68c4a9e26da8ad0abf36f2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0117-cwe-807-reliance-on-untrusted-inputs-5606ec22</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0117%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=high&amp;id=69a0a44985912abc71d64ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22870-cwe-115-misinterpretation-of-input-in-golang-org-x-net-golang-org-x-net-http-httpproxy-bd73a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22870%3A%20CWE-115%20Misinterpretation%20of%20Input%20in%20Go%20standard%20library%20net%2Fhttp&amp;severity=medium&amp;id=682d9817c4522896dcbd73a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27407-cwe-94-improper-control-of-generati-a808e7ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27407%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rmosolgo%20graphql-ruby&amp;severity=critical&amp;id=6909153cc28fd46ded7bacba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20177-improper-handling-of-insufficient-p-be40fc74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20177%3A%20Improper%20Handling%20of%20Insufficient%20Privileges%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=69a0a44d85912abc71d65247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20143-improper-verification-of-cryptograp-1275a033</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20143%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=69a0a44b85912abc71d64b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20138-improper-neutralization-of-special--737c6918</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20138%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69a0a44b85912abc71d64b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1984-cwe-428-unquoted-search-path-or-element-in-xerox-xerox-desktop-print-experience-bd6cb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1984%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Xerox%20Xerox%C2%AE%20Desktop%20Print%20Experience&amp;severity=medium&amp;id=682d9816c4522896dcbd6cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1683-cwe-59-improper-link-resolution-before-file-access-link-following-in-1e-1e-client-aec639</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1683%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%201E%201E%20Client&amp;severity=high&amp;id=682cd0fb1484d88663aec639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2002-cwe-532-insertion-of-sensitive-information-into-log-file-in-schneider-electric-ecostruxure-panel-server-bd6cce</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2002%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Schneider%20Electric%20EcoStruxure%20Panel%20Server&amp;severity=medium&amp;id=682d9816c4522896dcbd6cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0883-cwe-81-improper-neutralization-of-script-in-an-error-message-web-page-in-opentext-service-manager-bd6c79</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0883%3A%20CWE-81%20Improper%20Neutralization%20of%20Script%20in%20an%20Error%20Message%20Web%20Page%20in%20OpenText%E2%84%A2%20Service%20Manager&amp;severity=low&amp;id=682d9816c4522896dcbd6c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0884-cwe-428-unquoted-search-path-or-element-in-opentext-service-manager-bd6c9a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0884%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20OpenText%E2%84%A2%20Service%20Manager&amp;severity=high&amp;id=682d9816c4522896dcbd6c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2240-improperly-controlled-sequential-memory-allocation-in-red-hat-red-hat-build-of-apache-camel-4-8-for-quarkus-3-15-bd6c33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2240%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation&amp;severity=high&amp;id=682d9816c4522896dcbd6c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21590-cwe-653-improper-isolation-or-compartmentalization-in-juniper-networks-junos-os-bdab10</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21590%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d981cc4522896dcbdab10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1527-cwe-79-improper-neutralization-of-in-280fbd1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1527%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54ded8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21866-vulnerability-in-linux-linux-be8a56</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21865-vulnerability-in-linux-linux-be8a52</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21864-vulnerability-in-linux-linux-be8a4e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21863-vulnerability-in-linux-linux-be8a3f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21862-vulnerability-in-linux-linux-be8a37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21861-vulnerability-in-linux-linux-be8a2f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21860-vulnerability-in-linux-linux-be8a2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21859-vulnerability-in-linux-linux-be8a0f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21858-vulnerability-in-linux-linux-be8a0b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21857-vulnerability-in-linux-linux-be8a07</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21856-vulnerability-in-linux-linux-be8a03</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21855-vulnerability-in-linux-linux-be89ff</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21854-vulnerability-in-linux-linux-be89fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21853-vulnerability-in-linux-linux-be89f7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe89f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21852-vulnerability-in-linux-linux-be89f3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21851-vulnerability-in-linux-linux-be89ef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe89ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21850-vulnerability-in-linux-linux-be89de</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21849-vulnerability-in-linux-linux-be89b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe89b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21848-vulnerability-in-linux-linux-be89b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21847-vulnerability-in-linux-linux-be89ac</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe89ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21846-vulnerability-in-linux-linux-be89a8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21845-vulnerability-in-linux-linux-be89a4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21844-vulnerability-in-linux-linux-be89a0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe89a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58089-vulnerability-in-linux-linux-bdd26d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58088-vulnerability-in-linux-linux-bde355</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13446-cwe-288-authentication-bypass-using-f48fa035</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13446%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20AmentoTech%20Workreap&amp;severity=critical&amp;id=699f6e57b7ef31ef0b59e9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13430-cwe-284-improper-access-control-in--e1a3fdd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13430%3A%20CWE-284%20Improper%20Access%20Control%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58087-vulnerability-in-linux-linux-bde351</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12589-cwe-79-improper-neutralization-of-i-2eb3c40e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20djeet%20Finale%20Lite%20%E2%80%93%20Sales%20Countdown%20Timer%20%26%20Discount%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13838-cwe-918-server-side-request-forgery-6a3884b8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13838%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56dddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13498-cwe-200-exposure-of-sensitive-infor-326d6eb5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13498%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e5bb7ef31ef0b59ed7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2077-cwe-79-improper-neutralization-of-in-f573cd56</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duogeek%20Simple%20Amazon%20Affiliate&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2078-cwe-79-improper-neutralization-of-in-40627ca3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2078%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpenverne%20BlogBuzzTime%20for%20WP&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1508-cwe-862-missing-authorization-in-the-dec0e542</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1508%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20WP%20Crowdfunding&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54de40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2076-cwe-79-improper-neutralization-of-in-1b589bdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gnarf%20binlayerpress&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2205-cwe-79-improper-neutralization-of-in-157d58a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2205%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mooveagency%20GDPR%20Cookie%20Compliance%20%E2%80%93%20Cookie%20Banner%2C%20Cookie%20Consent%2C%20Cookie%20Notice%20for%20CCPA%2C%20EU%20Cookie%20Law&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27915-na-ccc41c7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27915%3A%20n%2Fa&amp;severity=medium&amp;id=68e490596ce96be75a027aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25568-na-bb73b969</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25568%3A%20n%2Fa&amp;severity=critical&amp;id=687c00d4a83201eaacff312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25567-na-6511b0e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25567%3A%20n%2Fa&amp;severity=critical&amp;id=687c00d4a83201eaacff311f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25566-na-e0dffd9e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25566%3A%20n%2Fa&amp;severity=medium&amp;id=687c00d4a83201eaacff3115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25565-na-a0c8b552</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25565%3A%20n%2Fa&amp;severity=critical&amp;id=687c00d4a83201eaacff3108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-12-2c2ecb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-12&amp;severity=medium&amp;id=682c7db8e8347ec82d2c2ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-12-f11ff5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f11ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2233-cwe-347-improper-verification-of-cry-f17ffa48</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2233%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20SmartThings&amp;severity=high&amp;id=69a0a45f85912abc71d66bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1707-cwe-98-improper-control-of-filename--b68683d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1707%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20techlabpro1%20Review%20Schema%20%E2%80%93%20Review%20%26%20Structure%20Data%20Schema%20Plugin&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28868-cross-site-request-forgery-csrf-in--24715a62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28868%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZipList%20ZipList%20Recipe&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28943-improper-neutralization-of-input-du-bbd5a6ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mylo2h2s%20DP%20ALTerminator%20-%20Missing%20ALT%20manager&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28941-cross-site-request-forgery-csrf-in--f59f7867</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28941%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ohtan%20Spam%20Byebye&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28940-cross-site-request-forgery-csrf-in--5041c561</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28940%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arkapravamajumder%20Back%20To%20Top&amp;severity=null&amp;id=69cd7224e6bfc5ba1dee83f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28938-missing-authorization-in-bjoern-wp--0584118a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28938%3A%20Missing%20Authorization%20in%20Bjoern%20WP%20Performance%20Pack&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28937-improper-neutralization-of-input-du-d042a1b8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28937%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lavacode%20Lava%20Ajax%20Search&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28936-improper-neutralization-of-input-du-f8aa61e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sakurapixel%20Lunar&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28933-cross-site-request-forgery-csrf-in--b37fe810</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28933%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20maxfoundry%20MaxA%2FB&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28932-cross-site-request-forgery-csrf-in--12e3cff9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28932%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BCS%20Website%20Solutions%20Insert%20Code&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28931-cross-site-request-forgery-csrf-in--0527288b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28931%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DevriX%20Hashtags&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28930-improper-neutralization-of-input-du-cf3e83c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rodolphe%20MOULIN%20List%20Mixcloud&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28929-improper-neutralization-of-input-du-7c2b746a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28929%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vivek%20Marakana%20Tabbed%20Login%20Widget&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28927-cross-site-request-forgery-csrf-in--52025383</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28927%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20A.%20Chappard%20Display%20Template%20Name&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28926-improper-neutralization-of-input-du-9d4b1896</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28926%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20popeating%20Post%20Read%20Time&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28925-cross-site-request-forgery-csrf-in--2ee586b7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28925%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hieu%20Nguyen%20WATI%20Chat%20and%20Notification&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28923-cross-site-request-forgery-csrf-in--2efdb1d0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28923%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20philippe%20No%20Disposable%20Email&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28922-cross-site-request-forgery-csrf-in--c06aa924</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28922%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Terence%20D.%20Go%20To%20Top&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28920-missing-authorization-in-jogesh-res-e35caf52</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28920%3A%20Missing%20Authorization%20in%20Jogesh%20Responsive%20Google%20Map&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28919-improper-neutralization-of-input-du-88a14815</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28919%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shellbot%20Easy%20Image%20Display&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28918-improper-neutralization-of-input-du-07597452</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20A.%20Jones%20Featured%20Image%20Thumbnail%20Grid&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28915-unrestricted-upload-of-file-with-da-57ae8327</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28915%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Theme%20Egg%20ThemeEgg%20ToolKit&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28914-improper-neutralization-of-input-du-df5ba351</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28914%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Sharma%20wordpress%20login%20form%20to%20anywhere&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28913-cross-site-request-forgery-csrf-in--a87f95db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28913%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aftab%20Ali%20Muni%20WP%20Add%20Active%20Class%20To%20Menu%20Item&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28912-cross-site-request-forgery-csrf-in--a05f7b4d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28912%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Muntasir%20Rahman%20Custom%20Dashboard%20Page&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef51d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28910-cross-site-request-forgery-csrf-in--e8ae81fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28910%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ravinder%20Khurana%20WP%20Hide%20Admin%20Bar&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28909-cross-site-request-forgery-csrf-in--88397544</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28909%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edwardw%20WP%20No-Bot%20Question&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28908-improper-neutralization-of-input-du-a3cb6c3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28908%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pipdig%20pipDisqus&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28907-improper-neutralization-of-input-du-ca7b572b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rahul%20Arora%20WP%20Last%20Modified&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28906-improper-neutralization-of-input-du-ae1724df</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Thiago%20S.F.%20Skitter%20Slideshow&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28905-improper-neutralization-of-input-du-72e86d15</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chaser324%20Featured%20Posts%20Grid&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28902-cross-site-request-forgery-csrf-in--2f2f59d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28902%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Benjamin%20Pick%20Contact%20Form%207%20Select%20Box%20Editor%20Button&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28901-cross-site-request-forgery-csrf-in--be7a3473</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28901%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Naren%20Members%20page%20only%20for%20logged%20in%20users&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28900-cross-site-request-forgery-csrf-in--b491c800</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28900%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webgarb%20TabGarb%20Pro&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28897-cross-site-request-forgery-csrf-in--90209fcd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28897%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Steveorevo%20Domain%20Theme&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28896-url-redirection-to-untrusted-site-o-8bad1af9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28896%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Akshar%20Soft%20Solutions%20AS%20English%20Admin&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28895-improper-neutralization-of-input-du-388b55f6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28895%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Suman%20Biswas%20Custom%20top%20bar&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28894-cross-site-request-forgery-csrf-in--feae34a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28894%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frucomerci%20List%20of%20Posts%20from%20each%20Category%20plugin%20for%20WordPress&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28892-cross-site-request-forgery-csrf-in--55062db7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28892%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20a2rocklobster%20FTP%20Sync&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28891-cross-site-request-forgery-csrf-in--7ada3a99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28891%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jazzigor%20price-calc&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28887-cross-site-request-forgery-csrf-in--92151ab8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28887%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Fastmover%20Plugins%20Last%20Updated%20Column&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28886-cross-site-request-forgery-csrf-in--07b65d4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28886%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xjb%20REST%20API%20TO%20MiniProgram&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28884-cross-site-request-forgery-csrf-in--1955987f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28884%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rajesh%20Kumar%20WP%20Bulk%20Post%20Duplicator&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28883-cross-site-request-forgery-csrf-in--91a33427</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28883%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Martin%20WP%20Compare%20Tables&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28881-cross-site-request-forgery-csrf-in--017994f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28881%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mg12%20Mobile%20Themes&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28879-improper-neutralization-of-input-du-a2ba9361</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28879%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aumsrini%20Bee%20Layer%20Slider&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28878-improper-neutralization-of-input-du-fdfb0821</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Will%20Brubaker%20Awesome%20Surveys&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28876-cross-site-request-forgery-csrf-in--36c6fb78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28876%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Skrill_Team%20Skrill%20Official&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28875-improper-neutralization-of-input-du-318ac0bd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanebp%20BP%20Email%20Assign%20Templates&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28874-authorization-bypass-through-user-c-7b348348</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28874%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20shanebp%20BP%20Email%20Assign%20Templates&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28872-missing-authorization-in-jwpegram-b-ec42ed54</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28872%3A%20Missing%20Authorization%20in%20jwpegram%20Block%20Spam%20By%20Math%20Reloaded&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28871-improper-neutralization-of-input-du-04d273f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jwpegram%20Block%20Spam%20By%20Math%20Reloaded&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28870-improper-neutralization-of-input-du-70993d2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28870%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amocrm%20amoCRM%20WebForm&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28867-cross-site-request-forgery-csrf-in--a12537ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28867%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stesvis%20Frontpage%20category%20filter&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28866-cross-site-request-forgery-csrf-in--51da95d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28866%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smerriman%20Login%20Logger&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28864-cross-site-request-forgery-csrf-in--6117cc18</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28864%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20planetstudio%20Builder%20for%20Contact%20Form%207%20by%20Webconstruct&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28863-cross-site-request-forgery-csrf-in--8b7715e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28863%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Carlos%20Minatti%20Delete%20Original%20Image&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28862-cross-site-request-forgery-csrf-in--c818352d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28862%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Venugopal%20Comment%20Date%20and%20Gravatar%20remover&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28861-cross-site-request-forgery-csrf-in--33d8d410</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28861%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bhzad%20WP%20jQuery%20Persian%20Datepicker&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28860-cross-site-request-forgery-csrf-in--cd1be293</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28860%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PPDPurveyor%20Google%20News%20Editors%20Picks%20Feed%20Generator&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28859-cross-site-request-forgery-csrf-in--c0dc8125</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28859%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CodeVibrant%20Maintenance%20Notice&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28857-cross-site-request-forgery-csrf-in--0c93f33d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28857%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rankchecker%20Rankchecker.io%20Integration&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28856-cross-site-request-forgery-csrf-in--626f6f86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28856%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dangrossman%20W3Counter%20Free%20Real-Time%20Web%20Stats&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27773-cwe-347-improper-verification-of-cryptographic-signature-in-simplesamlphp-saml2-bd73c4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27773%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20simplesamlphp%20saml2&amp;severity=high&amp;id=682d9817c4522896dcbd73c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24431-out-of-bounds-read-cwe-125-in-adobe-fee1bb63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24431%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69a0a45785912abc71d66286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27158-access-of-uninitialized-pointer-cwe-aa5b0f7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27158%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45b85912abc71d66875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27161-out-of-bounds-read-cwe-125-in-adobe-595f35ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27161%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45b85912abc71d6687f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27164-out-of-bounds-read-cwe-125-in-adobe-936d29fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27164%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69a0a45b85912abc71d66889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27174-use-after-free-cwe-416-in-adobe-acr-e511140a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27174%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45d85912abc71d66a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27162-access-of-uninitialized-pointer-cwe-c0eaaaf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27162%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45b85912abc71d66882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27160-use-after-free-cwe-416-in-adobe-acr-5bc56c57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27160%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45b85912abc71d6687c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27159-use-after-free-cwe-416-in-adobe-acr-cb244d4d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27159%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45b85912abc71d66879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27163-out-of-bounds-read-cwe-125-in-adobe-ef54cb03</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27163%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69a0a45b85912abc71d66885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24201-maliciously-crafted-web-content-may-63557ddb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24201%3A%20Maliciously%20crafted%20web%20content%20may%20be%20able%20to%20break%20out%20of%20Web%20Content%20sandbox.%20This%20is%20a%20supplementary%20fix%20for%20an%20attack%20that%20was%20blocked%20in%20iOS%2017.2.%20(Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20versions%20of%20iOS%20before%20iOS%2017.2.)%20in%20Apple%20Safari&amp;severity=critical&amp;id=68881727ad5a09ad0088bc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27169-out-of-bounds-write-cwe-787-in-adob-22fac314</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27169%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69a0a45b85912abc71d66890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27166-out-of-bounds-write-cwe-787-in-adob-ea7cfab3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27166%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45b85912abc71d6688d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27175-out-of-bounds-write-cwe-787-in-adob-d5f00cfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27175%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45d85912abc71d66aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27177-heap-based-buffer-overflow-cwe-122--a04eae6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27177%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45d85912abc71d66aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27178-out-of-bounds-write-cwe-787-in-adob-c020170f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27178%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45d85912abc71d66aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24453-heap-based-buffer-overflow-cwe-122--fa34d12c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24453%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45985912abc71d662ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24452-out-of-bounds-write-cwe-787-in-adob-59e8a49b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24452%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45985912abc71d662aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24440-out-of-bounds-write-cwe-787-in-adob-cf2fc4d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24440%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=high&amp;id=69a0a45785912abc71d6628f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24451-out-of-bounds-write-cwe-787-in-adob-0a9cce8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24451%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=69a0a45985912abc71d662a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24450-out-of-bounds-write-cwe-787-in-adob-0a3b7454</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24450%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=69a0a45985912abc71d662a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26645-cwe-23-relative-path-traversal-in-microsoft-windows-app-client-for-windows-desktop-aeb3ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26645%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=682cd0f81484d88663aeb3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26633-cwe-707-improper-neutralization-in-microsoft-windows-10-version-1809-aeb39b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26633%3A%20CWE-707%3A%20Improper%20Neutralization%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26631-cwe-427-uncontrolled-search-path-element-in-microsoft-visual-studio-code-aeb399</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26631%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=682cd0f81484d88663aeb399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26630-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb397</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26630%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26629-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aeb395</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26629%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26627-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-microsoft-azure-arc-aeb393</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26627%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Azure%20ARC&amp;severity=high&amp;id=682cd0f81484d88663aeb393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24049-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-microsoft-azure-cli-aeb313</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24049%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Azure%20CLI&amp;severity=high&amp;id=682cd0f81484d88663aeb313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24994-cwe-284-improper-access-control-in-microsoft-windows-11-version-22h2-aeb37a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24994%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f81484d88663aeb37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24993-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb378</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24993%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24992-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-aeb376</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24992%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24991-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb374</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24991%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24985-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-aeb361</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24985%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24984-cwe-532-insertion-of-sensitive-information-into-log-file-in-microsoft-windows-10-version-1809-aeb35f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24984%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24983-cwe-416-use-after-free-in-microsoft-windows-10-version-1507-aeb35d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24983%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24084-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-server-2022-aeb35b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24084%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f81484d88663aeb35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24076-cwe-284-improper-access-control-in-microsoft-windows-11-version-22h2-aeb340</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24076%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f81484d88663aeb340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24075-cwe-121-stack-based-buffer-overflow-in-microsoft-office-online-server-aeb33e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24075%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24072-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb33c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24072%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24067-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb336</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24067%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24066-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb334</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24066%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24064-cwe-416-use-after-free-in-microsoft-windows-server-2019-aeb332</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24064%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=682cd0f81484d88663aeb332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24061-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-aeb330</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24061%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24059-cwe-681-incorrect-conversion-between-numeric-types-in-microsoft-windows-10-version-1809-aeb323</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24059%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24056-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb31f</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24056%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24055-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb31d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24055%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24054-cwe-73-external-control-of-file-name-or-path-in-microsoft-windows-10-version-1809-aeb31b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24054%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24051-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb317</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24051%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24050-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb315</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24050%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=682cd0f81484d88663aeb315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24048-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb311</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24048%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=682cd0f81484d88663aeb311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24046-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb304</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24046%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24045-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-aeb302</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24045%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=682cd0f81484d88663aeb302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21199-cwe-269-improper-privilege-management-in-microsoft-azure-agent-for-site-recovery-aeb2f6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21199%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Azure%20Agent%20for%20Backup&amp;severity=medium&amp;id=682cd0f81484d88663aeb2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21247-cwe-41-improper-resolution-of-path-equivalence-in-microsoft-windows-server-2025-aeb2f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21247%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25008-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-server-2019-aeb391</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25008%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=682cd0f81484d88663aeb391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25003-cwe-427-uncontrolled-search-path-element-in-microsoft-microsoft-visual-studio-2019-version-16-11-includes-16-0-16-10-aeb38f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25003%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Visual%20Studio%202019%20version%2016.11%20(includes%2016.0%20-%2016.10)&amp;severity=high&amp;id=682cd0f81484d88663aeb38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24998-cwe-427-uncontrolled-search-path-element-in-microsoft-microsoft-visual-studio-2022-version-17-13-aeb38d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24998%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=682cd0f81484d88663aeb38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24997-cwe-476-null-pointer-dereference-in-microsoft-windows-server-2022-aeb380</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24997%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=682cd0f81484d88663aeb380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24996-cwe-73-external-control-of-file-name-or-path-in-microsoft-windows-10-version-1809-aeb37e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24996%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24995-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb37c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24995%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21180-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb2f4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21180%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb2f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24988-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb372</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24988%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24987-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb370</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24987%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24986-cwe-653-improper-isolation-or-compartmentalization-in-microsoft-azure-promptflow-core-aeb36e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24986%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Microsoft%20Azure%20promptflow-core&amp;severity=medium&amp;id=682cd0f81484d88663aeb36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24083-cwe-822-untrusted-pointer-dereference-in-microsoft-microsoft-office-2019-aeb359</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24083%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24082-cwe-416-use-after-free-in-microsoft-office-online-server-aeb357</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24082%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24081-cwe-416-use-after-free-in-microsoft-office-online-server-aeb355</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24081%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24080-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb353</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24080%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24079-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb351</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24079%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24078-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb34f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24078%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24077-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aeb342</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24077%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24070-cwe-1390-weak-authentication-in-microsoft-asp-net-core-8-0-aeb338</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24070%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20ASP.NET%20Core%208.0&amp;severity=high&amp;id=682cd0f81484d88663aeb338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24057-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-office-2019-aeb321</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24057%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24043-cwe-347-improper-verification-of-cryptographic-signature-in-microsoft-windbg-aeb2fe</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24043%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20WinDbg&amp;severity=high&amp;id=682cd0f81484d88663aeb2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24044-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb300</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24044%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24035-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aeb2fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24035%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26634-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb39d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26634%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21169-heap-based-buffer-overflow-cwe-122--ff776894</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21169%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=69a0a45185912abc71d6564a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27172-out-of-bounds-write-cwe-787-in-adob-562033cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27172%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=69a0a45d85912abc71d66a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54026-execute-unauthorized-code-or-comman-d04e7780</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54026%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a963d0ff220b9507e1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32123-execute-unauthorized-code-or-comman-021a36e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32123%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=69a0a43d85912abc71d6248c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54018-execute-unauthorized-code-or-comman-212afffe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54018%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a2148330e0671671d0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52960-improper-access-control-in-fortinet-199a8b1d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52960%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a963d0ff220b9507e1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45324-execute-unauthorized-code-or-comman-d23164fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45324%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=high&amp;id=68f0c1e29f8a5dbaeac5cdaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46663-escalation-of-privilege-in-fortinet-74ee00b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46663%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiMail&amp;severity=medium&amp;id=69a0a43f85912abc71d6303f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52961-execute-unauthorized-code-or-comman-e1c79375</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52961%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6967a963d0ff220b9507e1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45328-escalation-of-privilege-in-fortinet-5c769758</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45328%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=69a0a43f85912abc71d6302d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22454-cwe-732-incorrect-permission-assign-c477622f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22454%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Ivanti%20Secure%20Access%20Client&amp;severity=high&amp;id=69a0a45385912abc71d656a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54085-cwe-290-authentication-bypass-by-sp-a060c498</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54085%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20AMI%20MegaRAC-SPx&amp;severity=critical&amp;id=68f7d9b6247d717aace26c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27363-out-of-bounds-write-cwe-787-in-freetype-freetype-bd9d47</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27363%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20FreeType%20FreeType&amp;severity=high&amp;id=682d981bc4522896dcbd9d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56182-cwe-693-protection-mechanism-failur-c7010e5d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56182%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Siemens%20SIMATIC%20Field%20PG%20M5&amp;severity=high&amp;id=68487f551b0bd07c3938a242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56181-cwe-693-protection-mechanism-failur-c683d847</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56181%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Siemens%20SIMATIC%20Field%20PG%20M5&amp;severity=high&amp;id=68487f541b0bd07c3938a1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1550-cwe-94-improper-control-of-generatio-b993c60a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1550%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Google%20Keras&amp;severity=high&amp;id=687fb240a83201eaac1d91b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2190-cwe-297-improper-validation-of-certi-37811817</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2190%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20TECNO%20com.transsnet.store&amp;severity=high&amp;id=68bb425f535f4a97730e494b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13228-cwe-359-exposure-of-private-persona-7cb71ab9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13228%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20themeum%20Qubely%20%E2%80%93%20Advanced%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13413-cwe-79-improper-neutralization-of-i-0a9e2002</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13413%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frazahmed%20ProductDyno&amp;severity=medium&amp;id=699f6e55b7ef31ef0b59e69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13436-cwe-352-cross-site-request-forgery--236cd57d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13436%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wedevs%20Appsero%20Helper&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2169-cwe-94-improper-control-of-generatio-545072be</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2169%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20realmag777%20WPCS%20%E2%80%93%20WordPress%20Currency%20Switcher%20Professional&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1661-cwe-22-improper-limitation-of-a-path-16e39c8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1661%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=critical&amp;id=699f6b16b7ef31ef0b54df8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12010-cwe-78-improper-neutralization-of-s-4d946627</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12010%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20AX7501-B1%20firmware&amp;severity=high&amp;id=69a0a43a85912abc71d62099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12009-cwe-78-improper-neutralization-of-s-6dad8e25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12009%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20EX5601-T1%20firmware&amp;severity=high&amp;id=69a0a43a85912abc71d62096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11253-cwe-78-improper-neutralization-of-s-2b5d1140</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11253%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20VMG8825-T50K%20firmware&amp;severity=high&amp;id=69a0a43a85912abc71d62093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27434-cwe-79-improper-neutralization-of-i-3d527bf6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27434%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAP_SE%20SAP%20Commerce%20(Swagger%20UI)&amp;severity=high&amp;id=69a0a45d85912abc71d66aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26661-cwe-862-missing-authorization-in-sa-1172b3a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26661%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20(ABAP%20Class%20Builder)&amp;severity=high&amp;id=69a0a45b85912abc71d66871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26658-cwe-384-session-fixation-in-sapse-s-3b79290d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26658%3A%20CWE-384%3A%20Session%20Fixation%20in%20SAP_SE%20SAP%20Business%20One%20(Service%20Layer)&amp;severity=medium&amp;id=69a0a45985912abc71d662c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-11-9f79f3b9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-11&amp;severity=medium&amp;id=68367c98182aa0cae231dc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-11-74d6b1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-11&amp;severity=medium&amp;id=682c7abbe3e6de8ceb74d6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-11-f12e68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-2-400-ip-addresses-linked-to-astrill-vpn-often-used-by-north-korean-fake-it-workers-f0c540</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%202%2C400%20IP%20addresses%20linked%20to%20Astrill%20VPN%2C%20often%20used%20by%20North%20Korean%20fake%20IT%20workers.&amp;severity=low&amp;id=682acdbebbaf20d303f0c540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1828-cwe-338-use-of-cryptographically-wea-0925d30f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1828%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20perl%20Crypt%3A%3ARandom&amp;severity=high&amp;id=68bae6eb9bc4cbad54150db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2137-out-of-bounds-read-in-google-chrome-d7056896</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2137%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a45d85912abc71d66aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2136-use-after-free-in-google-chrome-58101e5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2136%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a45d85912abc71d66ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2135-type-confusion-in-google-chrome-eaae171e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2135%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a45d85912abc71d66ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1920-type-confusion-in-google-chrome-05066c7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1920%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44b85912abc71d64b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54558-an-app-may-be-able-to-trick-a-user--11941d72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54558%3A%20An%20app%20may%20be%20able%20to%20trick%20a%20user%20into%20granting%20access%20to%20photos%20from%20the%20user&apos;s%20photo%20library%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb834e6bfc5ba1df6eed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54467-a-malicious-website-may-exfiltrate--5a9fa4de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54467%3A%20A%20malicious%20website%20may%20exfiltrate%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=medium&amp;id=690908537fff0e30cee2390a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44179-an-attacker-with-physical-access-to-32a00677</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44179%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20read%20contact%20numbers%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb82ce6bfc5ba1df6ea5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44227-an-app-may-be-able-to-cause-unexpec-a0bae5a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44227%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb82ee6bfc5ba1df6ecf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54546-an-app-may-be-able-to-cause-unexpec-39de47b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54546%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb834e6bfc5ba1df6eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54463-an-app-may-be-able-to-access-remova-833e4d36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54463%3A%20An%20app%20may%20be%20able%20to%20access%20removable%20volumes%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb82fe6bfc5ba1df6ed59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54560-a-malicious-app-may-be-able-to-modi-688ff931</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54560%3A%20A%20malicious%20app%20may%20be%20able%20to%20modify%20other%20apps%20without%20having%20App%20Management%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44192-processing-maliciously-crafted-web--8f132ffb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44192%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=6909084f7fff0e30cee23521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54469-a-local-user-may-be-able-to-leak-se-6b52dde4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54469%3A%20A%20local%20user%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82fe6bfc5ba1df6ed65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54473-an-app-may-be-able-to-access-user-s-7acff8c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54473%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb82fe6bfc5ba1df6ed77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26695-vulnerability-in-mozilla-thunderbir-45347337</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26695%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=69dd057782d89c981f01728f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26696-vulnerability-in-mozilla-thunderbir-f5ee0d63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26696%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=69dd057782d89c981f017294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24813-cwe-44-path-equivalence-filename-in-0acbd49b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24813%3A%20CWE-44%20Path%20Equivalence%3A%20&apos;file.name&apos;%20(Internal%20Dot)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=687e795da83201eaac11f328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26916-improper-control-of-filename-for-in-4a8e855a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26916%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Pixflow%20Massive%20Dynamic&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26910-cross-site-request-forgery-csrf-in--3114caec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26910%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Iqonic%20Design%20WPBookit&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26936-improper-control-of-generation-of-c-753d8b95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26936%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FRESHFACE%20Fresh%20Framework&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26933-improper-control-of-filename-for-in-f45c33f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26933%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nitin%20Prakash%20WC%20Place%20Order%20Without%20Payment&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2153-heap-based-buffer-overflow-in-hdf5-bd6d08</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2153%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=low&amp;id=682d9816c4522896dcbd6d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1497-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-mljar-plotai-bd6cb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1497%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MLJAR%20PlotAI&amp;severity=critical&amp;id=682d9816c4522896dcbd6cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2152-heap-based-buffer-overflow-in-open-asset-import-library-assimp-bd6d06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2152%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=682d9816c4522896dcbd6d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1945-cwe-345-insufficient-verification-of-6cdd6c0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1945%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20mmaitre314%20picklescan&amp;severity=medium&amp;id=695450bedb813ff03e2bf902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1944-cwe-345-insufficient-verification-of-cb4b0626</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1944%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20mmaitre314%20picklescan&amp;severity=medium&amp;id=695450bedb813ff03e2bf8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27254-cwe-282-improper-ownership-manageme-9a119de4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27254%3A%20CWE-282%20Improper%20Ownership%20Management%20in%20GE%20Vernova%20EnerVista%20UR%20Setup&amp;severity=high&amp;id=68e52419a677756fc9926607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27253-cwe-15-external-control-of-system-o-4fbd11aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27253%3A%20CWE-15%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20GE%20Vernova%20N60%20multilin&amp;severity=medium&amp;id=68e52419a677756fc9926603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1926-cwe-352-cross-site-request-forgery-c-4cc92928</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1926%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-10-2c4253</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-10&amp;severity=medium&amp;id=682c7dbce8347ec82d2c4253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-10-f12f22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-10&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27636-bypassinjection-in-apache-software--7223bc04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27636%3A%20Bypass%2FInjection%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=medium&amp;id=68f86065b6f30825d64afcbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2119-use-of-default-credentials-in-thinkware-car-dashcam-f800-pro-bd6cf7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2119%3A%20Use%20of%20Default%20Credentials%20in%20Thinkware%20Car%20Dashcam%20F800%20Pro&amp;severity=low&amp;id=682d9816c4522896dcbd6cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2118-sql-injection-in-quantico-tecnologia-prmv-bd6cef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2118%3A%20SQL%20Injection%20in%20Quantico%20Tecnologia%20PRMV&amp;severity=medium&amp;id=682d9816c4522896dcbd6cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1382-cwe-79-cross-site-scripting-xss-in-c-53238db4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1382%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Contact%20Us%20By%20Lord%20Linus&amp;severity=medium&amp;id=696166b3047de42cfc9dfbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-09-2c3c06</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-09&amp;severity=medium&amp;id=682c7dbce8347ec82d2c3c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-09-f12cea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13924-cwe-918-server-side-request-forgery-3a6af0b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13924%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20fancywp%20Starter%20Templates%20by%20FancyWP&amp;severity=medium&amp;id=699f6d1cb7ef31ef0b56e074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10326-cwe-862-missing-authorization-in-ro-9282c475</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10326%3A%20CWE-862%20Missing%20Authorization%20in%20rometheme%20RTMKit&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13675-cwe-79-improper-neutralization-of-i-4673ce55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amans2k%20SlingBlocks%20%E2%80%93%20Gutenberg%20Blocks%20by%20FunnelKit%20(Formerly%20WooFunnels)&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a0096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1664-cwe-79-improper-neutralization-of-in-a44b3674</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11640-cwe-352-cross-site-request-forgery--2bc3afb8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11640%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20e4jvikwp%20VikRentCar%20Car%20Rental%20Management%20System&amp;severity=high&amp;id=699f6e18b7ef31ef0b59514e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13649-cwe-79-improper-neutralization-of-i-4e3f8953</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1783-cwe-79-improper-neutralization-of-in-82f8fd74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kometschuh%20Gallery%20Styles&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1322-cwe-200-exposure-of-sensitive-inform-d1f31a12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1322%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wppost%20WP-Recall%20%E2%80%93%20Registration%2C%20Profile%2C%20Commerce%20%26%20More&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54db9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1323-cwe-89-improper-neutralization-of-sp-cc94e8a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1323%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wppost%20WP-Recall%20%E2%80%93%20Registration%2C%20Profile%2C%20Commerce%20%26%20More&amp;severity=high&amp;id=699f6b10b7ef31ef0b54dba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1325-cwe-862-missing-authorization-in-wpp-80580c32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1325%3A%20CWE-862%20Missing%20Authorization%20in%20wppost%20WP-Recall%20%E2%80%93%20Registration%2C%20Profile%2C%20Commerce%20%26%20More&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54dbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13359-cwe-434-unrestricted-upload-of-file-4067d877</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13359%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tychesoftwares%20Product%20Input%20Fields%20for%20WooCommerce&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1324-cwe-79-improper-neutralization-of-in-e6ce7bdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wppost%20WP-Recall%20%E2%80%93%20Registration%2C%20Profile%2C%20Commerce%20%26%20More&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54dba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1287-cwe-79-improper-neutralization-of-in-b3b0be69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1287%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54daf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0177-cwe-269-improper-privilege-managemen-a8f4bfed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0177%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20javothemes%20Javo%20Core&amp;severity=critical&amp;id=699f6b67b7ef31ef0b555079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13882-cwe-434-unrestricted-upload-of-file-4a9f9b5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13882%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodeRevolution%20Aiomatic%20-%20Automatic%20AI%20Content%20Writer%20%26%20Editor%2C%20GPT-3%20%26%20GPT-4%2C%20ChatGPT%20ChatBot%20%26%20AI%20Toolkit&amp;severity=high&amp;id=699f6d19b7ef31ef0b56def9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13816-cwe-862-missing-authorization-in-co-00b0d012</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13816%3A%20CWE-862%20Missing%20Authorization%20in%20CodeRevolution%20Aiomatic%20-%20Automatic%20AI%20Content%20Writer%20%26%20Editor%2C%20GPT-3%20%26%20GPT-4%2C%20ChatGPT%20ChatBot%20%26%20AI%20Toolkit&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10321-cwe-200-exposure-of-sensitive-infor-8134b578</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10321%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shamsbd71%20All-in-One%20Addons%20for%20Elementor%20%E2%80%93%20WidgetKit&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11087-cwe-287-improper-authentication-in--c018760d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11087%3A%20CWE-287%20Improper%20Authentication%20in%20cyberlord92%20miniOrange%20Social%20Login%20and%20Register%20(Discord%2C%20Google%2C%20Twitter%2C%20LinkedIn)&amp;severity=high&amp;id=699f6e06b7ef31ef0b593c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13908-cwe-434-unrestricted-upload-of-file-ed0000d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13908%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bestweblayout%20SMTP%20by%20BestWebSoft&amp;severity=high&amp;id=699f6d1bb7ef31ef0b56dfcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12114-cwe-639-authorization-bypass-throug-c50c1bd8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12114%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20fooplugins%20Gallery%20by%20FooGallery&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12119-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bradvin-foogallery-responsive-photo-gallery-image-viewer-justified-masonry-carousel-bd6c67</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12119%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fooplugins%20Gallery%20by%20FooGallery&amp;severity=medium&amp;id=682d9816c4522896dcbd6c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13844-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-saadiqbal-post-smtp-wp-smtp-plugin-with-email-logs-and-mobile-app-for-failure-notifications-gmail-smtp-office-365-brevo-mailgun-amazon-ses-and-more-bd6c71</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13844%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=medium&amp;id=682d9816c4522896dcbd6c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13640-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-tychesoftwares-print-invoice-delivery-notes-for-woocommerce-bd6c6b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13640%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=medium&amp;id=682d9816c4522896dcbd6c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13774-cwe-352-cross-site-request-forgery--070de3a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13774%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcodefactory%20Wishlist%20for%20WooCommerce%3A%20Multi%20Wishlists%20Per%20Customer&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a072b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13895-cwe-94-improper-control-of-generati-3dd24071</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13895%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20jtsternberg%20Code%20Snippets%20CPT&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56df1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13835-cwe-269-improper-privilege-manageme-3e45c397</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13835%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20gandhihitesh9%20Post%20Meta%20Data%20Manager&amp;severity=high&amp;id=699f6d18b7ef31ef0b56dddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1504-cwe-862-missing-authorization-in-and-24bb0322</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1504%3A%20CWE-862%20Missing%20Authorization%20in%20andyexeter%20Post%20Lockdown&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13890-cwe-94-improper-control-of-generati-2bd4c750</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13890%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sksdev%20Allow%20PHP%20Execute&amp;severity=high&amp;id=699f6d19b7ef31ef0b56df14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12460-cwe-79-improper-neutralization-of-i-58535485</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20laurencebahiirwa%20Years%20Since%20%E2%80%93%20Timeless%20Texts&amp;severity=medium&amp;id=699f6e3db7ef31ef0b59b772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1481-cwe-862-missing-authorization-in-man-0ba10657</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1481%3A%20CWE-862%20Missing%20Authorization%20in%20mandooox%20Shortcode%20Cleaner%20Lite&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1261-cwe-79-improper-neutralization-of-in-3f722d8e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%20%26%20Template%20Builder&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27840-cwe-912-hidden-functionality-in-espressif-esp32-bd6cca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27840%3A%20CWE-912%20Hidden%20Functionality%20in%20Espressif%20ESP32&amp;severity=medium&amp;id=682d9816c4522896dcbd6cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52971-cwe-1038-insecure-automated-optimizations-in-mariadb-mariadb-bd6c63</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52971%3A%20CWE-1038%20Insecure%20Automated%20Optimizations%20in%20MariaDB%20MariaDB&amp;severity=medium&amp;id=682d9816c4522896dcbd6c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52970-cwe-1038-insecure-automated-optimizations-in-mariadb-mariadb-bd6c54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52970%3A%20CWE-1038%20Insecure%20Automated%20Optimizations%20in%20MariaDB%20MariaDB&amp;severity=medium&amp;id=682d9816c4522896dcbd6c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-08-2c4c1e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-08&amp;severity=medium&amp;id=682c7dbce8347ec82d2c4c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-08-f12593</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26643-cwe-449-the-ui-performs-the-wrong-action-in-microsoft-microsoft-edge-chromium-based-aeb39f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26643%3A%20CWE-449%3A%20The%20UI%20Performs%20the%20Wrong%20Action%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0f81484d88663aeb39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0162-cwe-611-improper-restriction-of-xml--e09bb403</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0162%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20Aspera%20Shares&amp;severity=high&amp;id=68b4f7b8ad5a09ad00c726e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12634-cwe-352-cross-site-request-forgery--72b6c6d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12634%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pickplugins%20Related%20Posts%2C%20Inline%20Related%20Posts%2C%20Contextual%20Related%20Posts%2C%20Related%20Content%20By%20PickPlugins&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1768-cwe-89-improper-neutralization-of-sp-9c3e33ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1768%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cifi%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9458-cwe-79-cross-site-scripting-xss-in-r-60c39974</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9458%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Reservit%20Hotel&amp;severity=medium&amp;id=696166b3047de42cfc9dfbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13857-cwe-918-server-side-request-forgery-728d88c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13857%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20davidanderson%20WPGet%20API%20%E2%80%93%20Connect%20to%20any%20external%20REST%20API&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13635-cwe-284-improper-access-control-in--8d65415f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13635%3A%20CWE-284%20Improper%20Access%20Control%20in%20vektor-inc%20VK%20Blocks&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13552-cwe-285-improper-authorization-in-s-626e0621</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13552%3A%20CWE-285%20Improper%20Authorization%20in%20psmplugins%20SupportCandy%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13805-cwe-79-improper-neutralization-of-i-4069330d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Advanced%20File%20Manager%20%E2%80%93%20Ultimate%20File%20Manager%20for%20WordPress%20And%20Document%20Library%20Solution&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21843-vulnerability-in-linux-linux-be899c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe899c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21842-vulnerability-in-linux-linux-be8998</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21841-vulnerability-in-linux-linux-be8994</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21840-vulnerability-in-linux-linux-be8990</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21839-vulnerability-in-linux-linux-bd7ba5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21838-vulnerability-in-linux-linux-be8968</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21837-aeb104</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21837&amp;severity=low&amp;id=682cd0f71484d88663aeb104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21836-vulnerability-in-linux-linux-be8960</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21835-vulnerability-in-linux-linux-be895c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21835%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe895c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13431-cwe-79-improper-neutralization-of-i-ee0df6ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13431%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12876-cwe-862-missing-authorization-in-ux-22e40209</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12876%3A%20CWE-862%20Missing%20Authorization%20in%20uxper%20Golo%20-%20City%20Travel%20Guide%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e4bb7ef31ef0b59c706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1315-cwe-288-authentication-bypass-using--0b499471</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1315%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20sfwebservice%20InWave%20Jobs&amp;severity=critical&amp;id=699f6b10b7ef31ef0b54db8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0959-cwe-564-sql-injection-hibernate-in-i-438c2496</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0959%3A%20CWE-564%20SQL%20Injection%3A%20Hibernate%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9658-cwe-288-authentication-bypass-using--5dc3fe6b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9658%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=high&amp;id=699f6b56b7ef31ef0b553133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12609-cwe-89-improper-neutralization-of-s-07038443</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12609%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12610-cwe-862-missing-authorization-in-da-04b783c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12610%3A%20CWE-862%20Missing%20Authorization%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13904-cwe-918-server-side-request-forgery-dcc3dcc9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13904%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20platformlycom%20Platform.ly%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13781-cwe-89-improper-neutralization-of-s-13146ebd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13781%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Hero%20Plugins%20Hero%20Maps%20Premium&amp;severity=medium&amp;id=699f6e6fb7ef31ef0b5a093a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12036-cwe-73-external-control-of-file-nam-db85ba81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12036%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Chimpstudio%20CS%20Framework&amp;severity=high&amp;id=699f6e2bb7ef31ef0b5971c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10804-cwe-22-improper-limitation-of-a-pat-b4aec1fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10804%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FWDesign%20Ultimate%20Video%20Player%20WordPress%20%26%20WooCommerce%20Plugin&amp;severity=high&amp;id=699f6dfeb7ef31ef0b5926ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12611-cwe-862-missing-authorization-in-da-016203c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12611%3A%20CWE-862%20Missing%20Authorization%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12035-cwe-22-improper-limitation-of-a-pat-cf78b3c0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12035%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Chimpstudio%20CS%20Framework&amp;severity=high&amp;id=699f6e2bb7ef31ef0b5971be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12607-cwe-89-improper-neutralization-of-s-f1f4a5d5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12607%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26331-cwe-77-improper-neutralization-of-s-68385dab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26331%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20Wyse%20Proprietary%20OS%20(Modern%20ThinOS)&amp;severity=high&amp;id=69a0a45985912abc71d662bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13906-cwe-502-deserialization-of-untruste-a1820da4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13906%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20bestwebsoft%20Gallery%20by%20BestWebSoft%20%E2%80%93%20Customizable%20Image%20and%20Photo%20Galleries%20for%20WordPress&amp;severity=high&amp;id=699f6d1bb7ef31ef0b56dfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1309-cwe-862-missing-authorization-in-adm-018996f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1309%3A%20CWE-862%20Missing%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=high&amp;id=699f6b0fb7ef31ef0b54db16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0863-cwe-79-improper-neutralization-of-in-42734676</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX%20Plugin&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13320-cwe-89-improper-neutralization-of-s-e24d8cfb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13320%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20villatheme%20CURCY%20-%20WooCommerce%20Multi%20Currency%20-%20Currency%20Switcher&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59ca96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13655-cwe-862-missing-authorization-in-mv-42717f4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13655%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20Flex%20Mag%20-%20Responsive%20WordPress%20News%20Theme&amp;severity=high&amp;id=699f6e65b7ef31ef0b59feee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12809-cwe-79-improper-neutralization-of-i-819cd85e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pickplugins%20Wishlist&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1475-cwe-287-improper-authentication-in-w-8dfb0c0b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1475%3A%20CWE-287%20Improper%20Authentication%20in%20whyun%20WPCOM%20Member&amp;severity=critical&amp;id=699f6b12b7ef31ef0b54dcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0748-cwe-352-cross-site-request-forgery-c-e21b0db3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0748%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Fave%20Themes%20Homey&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13526-cwe-862-missing-authorization-in-me-7515cf24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13526%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6e5eb7ef31ef0b59efe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0749-cwe-288-authentication-bypass-using--3ce631f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0749%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Fave%20Themes%20Homey&amp;severity=high&amp;id=699f6b6bb7ef31ef0b555394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-07-2c4d94</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-07&amp;severity=medium&amp;id=682c7dbce8347ec82d2c4d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-07-f12271</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1121-code-execution-and-privilege-escalation-in-google-chromeos-bd8041</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1121%3A%20Code%20execution%20and%20%0APrivilege%20Escalation%20in%20Google%20ChromeOS&amp;severity=medium&amp;id=682d9818c4522896dcbd8041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58086-vulnerability-in-linux-linux-bde34d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21834-vulnerability-in-linux-linux-be8958</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21833-vulnerability-in-linux-linux-bd7189</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd7189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21832-vulnerability-in-linux-linux-bd7185</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21832%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9817c4522896dcbd7185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21831-vulnerability-in-linux-linux-be894b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe894b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58085-vulnerability-in-linux-linux-bde325</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58084-vulnerability-in-linux-linux-bde31d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58083-vulnerability-in-linux-linux-bdd269</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58082-vulnerability-in-linux-linux-bde315</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58081-vulnerability-in-linux-linux-bdd265</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58080-vulnerability-in-linux-linux-bde311</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58079-vulnerability-in-linux-linux-bde30d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58078-vulnerability-in-linux-linux-bde300</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58077-vulnerability-in-linux-linux-bde2fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58076-vulnerability-in-linux-linux-bde2f8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21830-vulnerability-in-linux-linux-be8947</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21829-vulnerability-in-linux-linux-be8943</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21828-vulnerability-in-linux-linux-be893f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe893f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21827-vulnerability-in-linux-linux-be893b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe893b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21826-vulnerability-in-linux-linux-bdd367</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21825-vulnerability-in-linux-linux-be8937</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58075-vulnerability-in-linux-linux-bde2e9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58074-vulnerability-in-linux-linux-bde2e1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58073-vulnerability-in-linux-linux-bde2c4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58072-vulnerability-in-linux-linux-bde2c0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58071-vulnerability-in-linux-linux-bde2bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58070-vulnerability-in-linux-linux-bde2b8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58069-vulnerability-in-linux-linux-bde2b4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58068-vulnerability-in-linux-linux-bde2b0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58067-vulnerability-in-linux-linux-bde2ae</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58066-vulnerability-in-linux-linux-bde2aa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58065-vulnerability-in-linux-linux-bde29d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58064-vulnerability-in-linux-linux-bde299</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58063-vulnerability-in-linux-linux-bde275</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58062-vulnerability-in-linux-linux-bde26d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58061-vulnerability-in-linux-linux-bde265</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58060-vulnerability-in-linux-linux-bde25d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58059-vulnerability-in-linux-linux-bde255</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58058-vulnerability-in-linux-linux-bde251</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58057-vulnerability-in-linux-linux-bde244</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58056-vulnerability-in-linux-linux-bde240</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58055-vulnerability-in-linux-linux-bde22f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58054-vulnerability-in-linux-linux-bde227</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58053-vulnerability-in-linux-linux-bde206</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58052-vulnerability-in-linux-linux-bde202</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58051-vulnerability-in-linux-linux-bde1fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12146-cwe-89-improper-neutralization-of-s-fc6f3512</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12146%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Finder%20Fire%20Safety%20Finder%20ERP%2FCRM%20(New%20System)&amp;severity=high&amp;id=68ee4921509368ccaa72489e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13892-cwe-78-improper-neutralization-of-s-828e91a4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13892%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Smartwares%20CIP-37210AT&amp;severity=high&amp;id=68e0f3beb66c7f7acdd3cbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1666-cwe-862-missing-authorization-in-coo-e477885d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1666%3A%20CWE-862%20Missing%20Authorization%20in%20cookiebot%20Cookiebot%20by%20Usercentrics%20%E2%80%93%20Automatic%20Cookie%20Banner%20for%20GDPR%2FCCPA%20%26%20Google%20Consent%20Mode&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1383-cwe-352-cross-site-request-forgery-c-c8719fd4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1383%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20eteubert%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1672-cwe-79-improper-neutralization-of-in-bad5cfcb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ninjateam%20Notibar%20%E2%80%93%20Notification%20Bar%20for%20WordPress&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13897-cwe-22-improper-limitation-of-a-pat-8739f0a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13897%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20katsushi-kawamori%20Moving%20Media%20Library&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56df21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20931-cwe-122-heap-based-buffer-overflow--119909f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20931%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=high&amp;id=69a0a44f85912abc71d652b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20929-cwe-122-heap-based-buffer-overflow--3b006085</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20929%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=high&amp;id=69a0a44d85912abc71d65260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20903-cwe-284-improper-access-control-in--4decc9f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20903%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69a0a44d85912abc71d6525d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-greynoise-observes-active-exploitation-of-cisco-vulnerabilities-tied-to-salt-typhoon-attacks-2d85d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20GreyNoise%20Observes%20Active%20Exploitation%20of%20Cisco%20Vulnerabilities%20Tied%20to%20Salt%20Typhoon%20Attacks&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d85d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-06-2c6900</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-06&amp;severity=medium&amp;id=682c7dbde8347ec82d2c6900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-06-f12342</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f12342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27516-cwe-1336-improper-neutralization-of-special-elements-used-in-a-template-engine-in-pallets-jinja-bed375</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27516%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20pallets%20jinja&amp;severity=medium&amp;id=682d983ac4522896dcbed375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20206-improper-verification-of-cryptograp-cf44e080</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20206%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20Cisco%20Secure%20Client&amp;severity=high&amp;id=69a0a44d85912abc71d6524b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11153-cwe-200-exposure-of-sensitive-infor-49abfc31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11153%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20danieliser%20Content%20Control%20%E2%80%93%20The%20Ultimate%20Content%20Restriction%20Plugin!%20Restrict%20Content%2C%20Create%20Conditional%20Blocks%20%26%20More&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11951-cwe-269-improper-privilege-manageme-44a0027f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11951%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Fave%20Themes%20Homey%20Login%20Register&amp;severity=critical&amp;id=699f6e29b7ef31ef0b596fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12281-cwe-269-improper-privilege-manageme-77e9a138</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12281%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Fave%20Themes%20Homey&amp;severity=critical&amp;id=699f6e35b7ef31ef0b597c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1702-cwe-89-improper-neutralization-of-sp-e85e1531</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1702%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13423-cwe-862-missing-authorization-in-si-d86009c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13423%3A%20CWE-862%20Missing%20Authorization%20in%20silkalns%20Sparkling&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13471-cwe-22-improper-limitation-of-a-pat-aed8a257</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13471%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20designthemes%20DesignThemes%20Core%20Features&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1463-cwe-352-cross-site-request-forgery-c-975eb462</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1463%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20javmah%20WPGSI%3A%20Spreadsheet%20Integration&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25015-cwe-1321-improperly-controlled-modi-5fa4cc89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25015%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20Elastic%20Kibana&amp;severity=critical&amp;id=69a0a45985912abc71d662b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13232-cwe-862-missing-authorization-in-dd-8dbc5352</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13232%3A%20CWE-862%20Missing%20Authorization%20in%20ddeveloper%20WordPress%20Awesome%20Import%20%26%20Export%20Plugin%20-%20Import%20%26%20Export%20WordPress%20Data&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59c9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11731-cwe-79-improper-neutralization-of-i-82769296</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20%E2%80%93%20Responsive%20Touch%20Slider&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13747-cwe-862-missing-authorization-in-ci-efceac74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13747%3A%20CWE-862%20Missing%20Authorization%20in%20CidCode%20WooMail%20-%20WooCommerce%20Email%20Customizer&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13815-cwe-94-improper-control-of-generati-722298fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13815%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Themographics%20Listingo&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dcc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13810-cwe-862-missing-authorization-in-al-d61fc50c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13810%3A%20CWE-862%20Missing%20Authorization%20in%20AlThemist%20Zass%20-%20WooCommerce%20Theme%20for%20Handmade%20Artists%20and%20Artisans&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dcb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13787-cwe-502-deserialization-of-untruste-8b4507bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13787%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20VEDA%20-%20MultiPurpose%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e6fb7ef31ef0b5a0942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12815-cwe-79-improper-neutralization-of-i-6e3daadd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zipang%20Point%20Maker&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13809-cwe-89-improper-neutralization-of-s-e28c2b50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13809%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20heroplugins%20Hero%20Slider%20-%20WordPress%20Slider%20Plugin&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dcaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1515-cwe-288-authentication-bypass-using--ad45f631</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1515%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Chimpstudio%20WP%20Real%20Estate%20Manager&amp;severity=critical&amp;id=699f6b14b7ef31ef0b54de5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13839-cwe-79-improper-neutralization-of-i-ffca881b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13839%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richardgabriel%20Staff%20Directory%20Plugin%3A%20Company%20Directory&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56dde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0954-cwe-862-missing-authorization-in-fut-960a5d47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0954%3A%20CWE-862%20Missing%20Authorization%20in%20futuredesigngrp%20WP%20Online%20Contract&amp;severity=medium&amp;id=699f6b6db7ef31ef0b55558a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13778-cwe-89-improper-neutralization-of-s-9ade44e9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13778%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20heroplugins%20Hero%20Mega%20Menu%20-%20Responsive%20WordPress%20Menu%20Plugin&amp;severity=medium&amp;id=699f6e6fb7ef31ef0b5a092e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13811-cwe-862-missing-authorization-in-al-7e6bfdd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13811%3A%20CWE-862%20Missing%20Authorization%20in%20AlThemist%20Lafka%20-%20Multi%20Store%20Burger%20-%20Pizza%20%26%20Food%20Delivery%20WooCommerce%20Theme&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dcb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5667-cwe-79-improper-neutralization-of-in-f2a48bd8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cipherdevgroup%20WP%20Featherlight%20%E2%80%93%20A%20Simple%20jQuery%20Lightbox&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13757-cwe-79-improper-neutralization-of-i-e4c60a05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20%E2%80%93%20Responsive%20Touch%20Slider&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a06c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13777-cwe-502-deserialization-of-untruste-2cb3e9ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13777%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ZoomIt%20ZoomSounds%20-%20WordPress%20Wave%20Audio%20Player%20with%20Playlist&amp;severity=high&amp;id=699f6e6fb7ef31ef0b5a092a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13779-cwe-79-improper-neutralization-of-i-10fad7e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13779%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heroplugins%20Hero%20Mega%20Menu%20-%20Responsive%20WordPress%20Menu%20Plugin&amp;severity=medium&amp;id=699f6e6fb7ef31ef0b5a0932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13780-cwe-862-missing-authorization-in-he-0c5fbf57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13780%3A%20CWE-862%20Missing%20Authorization%20in%20heroplugins%20Hero%20Mega%20Menu%20-%20Responsive%20WordPress%20Menu%20Plugin&amp;severity=medium&amp;id=699f6e6fb7ef31ef0b5a0936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0956-cwe-20-improper-input-validation-in--17fd6f3c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0956%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20FantasticPlugins%20WooCommerce%20Recover%20Abandoned%20Cart&amp;severity=high&amp;id=699f6b6db7ef31ef0b555592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13866-cwe-79-improper-neutralization-of-i-109d90e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appsbd%20Simple%20Notification&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1008-cwe-79-improper-neutralization-of-in-a9283caa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1008%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20worldweb%20Recently%20Purchased%20Products%20For%20Woo&amp;severity=medium&amp;id=699f6b0db7ef31ef0b54d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13827-cwe-79-improper-neutralization-of-i-4e341b83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20razorpay%20Razorpay%20Subscription%20Button%20Elementor%20Plugin&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13350-cwe-79-improper-neutralization-of-i-b5da2223</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20searchiq%20SearchIQ%20%E2%80%93%20The%20Search%20Solution&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8682-cwe-862-missing-authorization-in-htt-7efcc82c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8682%3A%20CWE-862%20Missing%20Authorization%20in%20https%3A%2F%2Fthemeforest.net%2Fitem%2Fjnews-one-stop-solution-for-web-publishing%2F20566392%20JNews%20-%20WordPress%20Newspaper%20Magazine%20Blog%20AMP%20Theme&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0990-cwe-352-cross-site-request-forgery-c-a4a57d18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0990%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webtroniclabs%20I%20Am%20Gloria&amp;severity=medium&amp;id=699f6b6eb7ef31ef0b55562d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1435-cwe-352-cross-site-request-forgery-c-5d20daee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1435%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20johnjamesjacoby%20bbPress&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1919-out-of-bounds-read-in-google-chrome-9685ec21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1919%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44b85912abc71d64b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1918-out-of-bounds-read-in-google-chrome-4edb04ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1918%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44b85912abc71d64b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1916-use-after-free-in-google-chrome-547b7da9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1916%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44b85912abc71d64b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1915-improper-limitation-of-a-pathname-to-a7fdab29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1915%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44b85912abc71d64b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1914-out-of-bounds-read-in-google-chrome-c7b45108</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1914%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44985912abc71d64acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0114-cwe-1244-in-nvidia-nvidia-hopper-hgx-99d9ee02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0114%3A%20CWE-1244%20in%20NVIDIA%20NVIDIA%20Hopper%20HGX%208-GPU&amp;severity=high&amp;id=69a0a43885912abc71d61ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27685-na-19baf12a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27685%3A%20n%2Fa&amp;severity=high&amp;id=69091542c28fd46ded7bb2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27684-na-cd303ef4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27684%3A%20n%2Fa&amp;severity=high&amp;id=69091542c28fd46ded7bb2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27683-na-47bbb323</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27683%3A%20n%2Fa&amp;severity=high&amp;id=69091542c28fd46ded7bb2cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27682-na-d15ff643</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27682%3A%20n%2Fa&amp;severity=critical&amp;id=69091542c28fd46ded7bb2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27681-na-f002bbbf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27681%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27680-na-d01bdda8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27680%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27679-na-da12a6ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27679%3A%20n%2Fa&amp;severity=medium&amp;id=69091540c28fd46ded7bb2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27678-na-e6247672</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27678%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27677-na-f0a55e7d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27677%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27675-na-2d3efd41</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27675%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27674-na-83fccdc1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27674%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27657-na-3e50d0af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27657%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27656-na-4931b0c6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27656%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27655-na-0891e835</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27655%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27652-na-0184774c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27652%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bad12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27651-na-bec24f5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27651%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bad0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27650-na-353ef471</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27650%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bad08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27649-na-727132f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27649%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bad03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27648-na-7348d830</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27648%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bacfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27647-na-60b389e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27647%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bacf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27646-na-9e7c0307</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27646%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bacf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27645-na-f6561a43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27645%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bacef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27644-na-bcdf20d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27644%3A%20n%2Fa&amp;severity=high&amp;id=6909153ec28fd46ded7bacea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27643-na-ca422e38</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27643%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bace5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27642-na-be15e4b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27642%3A%20n%2Fa&amp;severity=critical&amp;id=6909153dc28fd46ded7bacd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27641-na-6402c947</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27641%3A%20n%2Fa&amp;severity=critical&amp;id=6909153dc28fd46ded7bacd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27639-na-3212ca4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27639%3A%20n%2Fa&amp;severity=high&amp;id=6909153dc28fd46ded7baccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27638-na-1d2efea4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27638%3A%20n%2Fa&amp;severity=critical&amp;id=6909153cc28fd46ded7bacc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51144-na-35e015fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51144%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3c4b66c7f7acdd3ea24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27676-n-a-in-n-a-bf55d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27676%3A%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf55d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27654-n-a-in-n-a-bf55d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27654%3A%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf55d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27653-n-a-in-n-a-bf55ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27653%3A%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf55ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27637-n-a-in-n-a-bf55c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27637%3A%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf55c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-05-2c5407</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-05&amp;severity=medium&amp;id=682c7dbce8347ec82d2c5407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-05-f12b00</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1316-cwe-78-improper-neutralization-of-sp-14f94dfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1316%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Edimax%20IC-7100%20IP%20Camera&amp;severity=critical&amp;id=68881726ad5a09ad0088bbbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1080-cwe-20-improper-input-validation-in--069e723a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1080%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=high&amp;id=690908577fff0e30cee23a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1969-cwe-346-origin-validation-error-in-a-ffccd564</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1969%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20AWS%20Temporary%20Elevated%20Access%20Management%20(TEAM)%20for%20AWS%20IAM%20Identity%20Center&amp;severity=medium&amp;id=68ee9ba2d8f994a66eca601c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23368-improper-restriction-of-excessive-authentication-attempts-bef3d9</loc>
    <lastmod>2026-04-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23368%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&amp;severity=high&amp;id=682d983dc4522896dcbef3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27425-vulnerability-in-mozilla-firefox-fo-cbe8e2cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27425%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=69dd057782d89c981f01729d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27424-vulnerability-in-mozilla-firefox-fo-33b920bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27424%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=69dd057782d89c981f017299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27426-vulnerability-in-mozilla-firefox-fo-2a3a5682</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27426%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=69dd057782d89c981f0172a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1943-memory-safety-bugs-fixed-in-firefox--19b5966e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1943%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69a0a44b85912abc71d64b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1938-memory-safety-bugs-fixed-in-firefox--1c753600</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1938%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69091a4ac28fd46ded81d081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1937-memory-safety-bugs-fixed-in-firefox--d21749ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1937%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a4ac28fd46ded81d077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1936-adding-00-and-a-fake-extension-to-a--2df68ca8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1936%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a4ac28fd46ded81d06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1935-clickjacking-the-registerprotocolhan-8762297a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1935%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69091a4ac28fd46ded81d067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1942-vulnerability-in-mozilla-firefox-6cdaf24f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1942%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69dd057782d89c981f017282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1941-vulnerability-in-mozilla-firefox-fc881dc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1941%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69dd057782d89c981f01727e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1934-unexpected-gc-during-regexp-bailout--81242f94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1934%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69091a49c28fd46ded81d051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1940-vulnerability-in-mozilla-firefox-94a4052d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1940%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69dd057782d89c981f01727a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1933-jit-corruption-of-wasm-i32-return-va-dffe0f6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1933%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a49c28fd46ded81d048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1932-inconsistent-comparator-in-xslt-sort-e302e30a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1932%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a49c28fd46ded81d040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1931-use-after-free-in-webtransportchild--dc85e905</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1931%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a49c28fd46ded81d037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1939-tapjacking-in-android-custom-tabs-us-c5cf591f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1939%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=low&amp;id=68be1ecce3f0bafba8aa56b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1930-vulnerability-in-mozilla-firefox-c524bf5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1930%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69dd057382d89c981f016fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22226-information-disclosure-vulnerabilit-e519b5ba</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22226%3A%20Information%20disclosure%20vulnerability%20in%20ESXi&amp;severity=high&amp;id=68881727ad5a09ad0088bc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22225-arbitrary-write-vulnerability-in-vm-7f910012</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22225%3A%20Arbitrary%20write%20vulnerability%20in%20VMware%20ESXi&amp;severity=high&amp;id=68881727ad5a09ad0088bc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22224-heap-overflow-vulnerability-in-vmwa-af1dd0c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22224%3A%20Heap-overflow%20vulnerability%20in%20VMware%20ESXi&amp;severity=critical&amp;id=68881727ad5a09ad0088bc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0370-cwe-79-improper-neutralization-of-in-1bd9665d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0370%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=699f6b69b7ef31ef0b55524c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0958-cwe-20-improper-input-validation-in--99f5f465</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0958%3A%20CWE-20%20Improper%20Input%20Validation%20in%20nitesh_singh%20Ultimate%20WordPress%20Auction%20Plugin&amp;severity=medium&amp;id=699f6b6eb7ef31ef0b55561c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0433-cwe-79-improper-neutralization-of-in-f890218c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20For%20Elementor%20%E2%80%93%20Widgets%2C%20Extensions%2C%20Theme%20Builder%2C%20Popup%20Builder%20%26%20Template%20Kits&amp;severity=medium&amp;id=699f6b69b7ef31ef0b55526f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13724-cwe-285-improper-authorization-in-w-a2c8fafd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13724%3A%20CWE-285%20Improper%20Authorization%20in%20wpswings%20Wallet%20System%20for%20WooCommerce%20%E2%80%93%20Digital%20Wallet%2C%20Buy%20Now%20Pay%20Later%20(BNPL)%2C%20Instant%20Cashback%2C%20Referral%20program%2C%20Partial%20%26%20Subscription%20Payments&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a0450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9618-cwe-79-improper-neutralization-of-in-31afa767</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20For%20Elementor%20%E2%80%93%20Widgets%2C%20Extensions%2C%20Theme%20Builder%2C%20Popup%20Builder%20%26%20Template%20Kits&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0512-cwe-79-improper-neutralization-of-in-aefab2ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gorbo%20Structured%20Content%20(JSON-LD)%20%23wpsc&amp;severity=medium&amp;id=699f6b69b7ef31ef0b5552fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13682-cwe-352-cross-site-request-forgery--1a310193</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13682%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpswings%20Wallet%20System%20for%20WooCommerce%20%E2%80%93%20Digital%20Wallet%2C%20Buy%20Now%20Pay%20Later%20(BNPL)%2C%20Instant%20Cashback%2C%20Referral%20program%2C%20Partial%20%26%20Subscription%20Payments&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a00b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27521-cwe-280-improper-handling-of-insuff-74b80d37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27521%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68cc9f1bca83b36a9f700a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1307-cwe-862-missing-authorization-in-spi-605c600e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1307%3A%20CWE-862%20Missing%20Authorization%20in%20spicethemes%20Newscrunch&amp;severity=critical&amp;id=699f6b0fb7ef31ef0b54db0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1306-cwe-352-cross-site-request-forgery-c-4e3c1706</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1306%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20Newscrunch&amp;severity=high&amp;id=699f6b0fb7ef31ef0b54db01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1639-cwe-862-missing-authorization-in-cro-de62c26a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1639%3A%20CWE-862%20Missing%20Authorization%20in%20crowdyTheme%20Animation%20Addons%20for%20Elementor%20Pro&amp;severity=high&amp;id=699f6b16b7ef31ef0b54df7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1321-cwe-89-improper-neutralization-of-sp-2443a0fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1321%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20winkm89%20teachPress&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54db9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0912-cwe-502-deserialization-of-untrusted-9f230cbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0912%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=critical&amp;id=699f6b6cb7ef31ef0b5554da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13686-cwe-862-missing-authorization-in-vo-09fcd7b0</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13686%3A%20CWE-862%20Missing%20Authorization%20in%20vowelweb%20VW%20Storefront&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a00bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26318-cwe-201-insertion-of-sensitive-info-b0a264ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26318%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20TSplus%20TSplus%20Remote%20Access&amp;severity=medium&amp;id=68ae0f66ad5a09ad005b18c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48248-cwe-36-absolute-path-traversal-in-n-de78952a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48248%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20NAKIVO%20Backup%20%26%20Replication%20Director&amp;severity=high&amp;id=6835fd37182aa0cae21d8deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50706-n-a-in-n-a-bf711f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50706%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf711f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-04-2c58de</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-04&amp;severity=medium&amp;id=682c7dbce8347ec82d2c58de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-04-f12b1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1891-cross-site-request-forgery-in-shishu-62217cbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1891%3A%20Cross-Site%20Request%20Forgery%20in%20shishuocms&amp;severity=medium&amp;id=68ae12eaad5a09ad005b31a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51962-cwe-89-improper-neutralization-of-s-bc4cdd99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51962%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=high&amp;id=69858a71f9fa50a62fe12649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51954-cwe-284-improper-access-control-in--fc0dde7a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51954%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Esri%20ArcGIS%20Server&amp;severity=high&amp;id=69858a71f9fa50a62fe12646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1889-cwe-646-reliance-on-file-name-or-ext-7d2432d4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1889%3A%20CWE-646%20Reliance%20on%20File%20Name%20or%20Extension%20of%20Externally-Supplied%20File%20in%20mmaitre314%20picklescan&amp;severity=medium&amp;id=695450bedb813ff03e2bf8f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0686-out-of-bounds-write-caa6f37a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0686%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=6868be146f40f0eb72a6ac88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0685-out-of-bounds-write-d02fc793</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0685%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=6868be146f40f0eb72a6ac84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0684-out-of-bounds-write-34043ac1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0684%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=6868be146f40f0eb72a6ac80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0678-integer-overflow-or-wraparound-64958b94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0678%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=high&amp;id=6868be146f40f0eb72a6ac7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45782-out-of-bounds-write-85cc6e0b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45782%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=6916966eb9f11918f9c6af21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45778-integer-overflow-or-wraparound-08345dbb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45778%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=6916966eb9f11918f9c6af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27423-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-vim-vim-beb7c7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27423%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20vim%20vim&amp;severity=high&amp;id=682d9837c4522896dcbeb7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0285-cwe-1287-improper-validation-of-spec-a9be0278</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0285%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Paragon%20Software%20Migrate%20OS%20to%20SSD&amp;severity=high&amp;id=68bad2de5490eb7ab31ac7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0286-cwe-787-out-of-bounds-write-in-parag-8a9244fa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0286%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Paragon%20Software%20Partition%20Manager&amp;severity=high&amp;id=68bb425f535f4a97730e4934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0287-cwe-476-null-pointer-dereference-in--20ca53d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0287%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Paragon%20Software%20Migrate%20OS%20to%20SSD&amp;severity=medium&amp;id=68bb425f535f4a97730e4939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0288-cwe-131-incorrect-calculation-of-buf-e5bf3850</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0288%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Paragon%20Software%20Migrate%20OS%20to%20SSD&amp;severity=high&amp;id=68bb425f535f4a97730e493e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0289-cwe-1287-improper-validation-of-spec-4ab03247</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0289%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Paragon%20Software%20Migrate%20OS%20to%20SSD&amp;severity=high&amp;id=68bb425f535f4a97730e4943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43169-cwe-494-download-of-code-without-in-c57f5b33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43169%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20IBM%20Engineering%20Requirements%20Management%20DOORS%20Next&amp;severity=high&amp;id=69a0a43d85912abc71d624a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1801-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-c6c685</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1801%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)&amp;severity=high&amp;id=682e280cc4522896dcc6c685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45779-integer-overflow-or-wraparound-6ee0c43b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45779%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=6916966eb9f11918f9c6af1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45780-out-of-bounds-write-cbd58763</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45780%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=68e0f3bdb66c7f7acdd3cbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0689-buffer-copy-without-checking-size-of-0099afbb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0689%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=high&amp;id=6868be146f40f0eb72a6ac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1125-out-of-bounds-write-53b13c45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1125%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=6868be146f40f0eb72a6ac95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26994-improper-neutralization-of-input-du-3504e2e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26994%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softdiscover%20Zigaform%20%E2%80%93%20Price%20Calculator%20%26%20Cost%20Estimation%20Form%20Builder%20Lite&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26989-improper-neutralization-of-input-du-6092d4ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softdiscover%20Zigaform&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deecd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26988-improper-neutralization-of-special--bea987a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26988%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26984-improper-neutralization-of-input-du-9a07d1fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26970-improper-control-of-generation-of-c-26e4504e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26970%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FRESHFACE%20Ark%20Theme%20Core&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26967-deserialization-of-untrusted-data-i-6a853726</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26967%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Stiofan%20Events%20Calendar%20for%20GeoDirectory&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26918-improper-neutralization-of-input-du-6145eb7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26917-improper-neutralization-of-input-du-08ab3d40</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HasThemes%20WP%20Templata&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26914-improper-neutralization-of-input-du-0773f284</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26914%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bowo%20Variable%20Inspector&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26885-deserialization-of-untrusted-data-i-e50beab7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26885%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Beaver%20Builder%20WordPress%20Assistant&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26879-improper-neutralization-of-input-du-3985698a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26879%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27279-improper-neutralization-of-input-du-faeb0f38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27279%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lynk%20Flashfader&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deecdfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27278-improper-neutralization-of-input-du-f1e0b18e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27278%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Ghedini%20AcuGIS%20Leaflet%20Maps&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deecdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27275-improper-neutralization-of-input-du-d79c7589</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27275%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andrew_fisher%20WOO%20Codice%20Fiscale&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27274-path-traversal-in-axelkeller-gpx-vi-c0b77a95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27274%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20axelkeller%20GPX%20Viewer&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27273-improper-neutralization-of-input-du-9519644b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27273%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20winking%20Affiliate%20Links%20Manager&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27271-improper-neutralization-of-input-du-a9171631</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27271%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alberto%20Cocchiara%20DB%20Tables%20Import%2FExport&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecdd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27270-missing-authorization-in-enituretec-5485819c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27270%3A%20Missing%20Authorization%20in%20enituretechnology%20Residential%20Address%20Detection&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecdd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27269-improper-neutralization-of-input-du-fcc4d076</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27269%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anton%20Aleksandrov%20.htaccess%20Login%20block&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecdd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27268-improper-neutralization-of-special--64c5d392</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27268%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecdcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27264-improper-control-of-filename-for-in-ff30d910</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27264%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creativeitem%20Doctor%20Appointment%20Booking&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27263-improper-neutralization-of-special--6b3e2d58</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27263%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Creativeitem%20Doctor%20Appointment%20Booking&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26589-improper-neutralization-of-input-du-8cd1bb0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cristopher%20Dino%20IE%20CSS3%20Support&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26588-improper-neutralization-of-input-du-4efcea5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26588%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gabrielperezs%20TTT%20Crop&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26587-improper-neutralization-of-input-du-04f01d50</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nghorta%20sidebarTabs&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26586-improper-neutralization-of-input-du-4b7758f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20abelony%20Events%20Planner&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26585-improper-neutralization-of-input-du-79ad563b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DyadyaLesha%20DL%20Leadback&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26563-improper-neutralization-of-input-du-f46a30a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Muneeb%20Mobile&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26557-improper-neutralization-of-input-du-6142e903</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viperchill%20ViperBar&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26535-improper-neutralization-of-special--94870af4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26535%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CodeSolz%20Bitcoin%20%2F%20AltCoin%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=69cd729de6bfc5ba1deec64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25170-improper-neutralization-of-input-du-883d27d7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25170%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DotsquaresLtd%20Migrate%20Posts&amp;severity=null&amp;id=69cd729de6bfc5ba1deec64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25169-improper-neutralization-of-input-du-a96ad141</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25169%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rachel%20Cherry%20Authors%20Autocomplete%20Meta%20Box&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25165-improper-neutralization-of-input-du-5ce649ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25165%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richardgabriel%20Staff%20Directory%20Plugin%3A%20Company%20Directory&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25164-improper-neutralization-of-input-du-9f036337</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25164%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yuichiro%20ABE%20Meta%20Accelerator&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25162-improper-limitation-of-a-pathname-t-fe912d6f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25162%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kutu62%20Sports%20Rankings%20and%20Lists&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25161-improper-neutralization-of-input-du-df435c75</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25161%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SocialEvolution%20WP%20Find%20Your%20Nearest&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25158-improper-neutralization-of-input-du-c893cca7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25158%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Antonio%20Sanchez%20Uncomplicated%20SEO&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25157-improper-neutralization-of-input-du-654adc67</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25157%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchurchteam%20WP%20Church%20Center&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25150-improper-neutralization-of-special--3433a406</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25150%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20uListing&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25142-improper-neutralization-of-input-du-2ccbc3e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25142%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Jake%20Group%20WP%20Less%20Compiler&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25137-cross-site-request-forgery-csrf-in--95ef8275</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25137%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kareemsultan%20Social%20Links&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25133-improper-neutralization-of-input-du-69bdde5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25133%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20newbiesup%20WP%20Frontend%20Submit&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25132-improper-neutralization-of-input-du-b402ed58</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25132%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ravi%20Singh%20Visitor%20Details&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeaced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25131-improper-neutralization-of-input-du-f398b985</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25131%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20randyjensen%20RJ%20Quickcharts&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25130-relative-path-traversal-in-shah-alo-794418d2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25130%3A%20Relative%20Path%20Traversal%20in%20Shah%20Alom%20Delete%20Comments%20By%20Status&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeace7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25127-improper-neutralization-of-input-du-9fbb5bbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25127%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rohitashv%20Singhal%20Contact%20Us%20By%20Lord%20Linus&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25124-improper-neutralization-of-input-du-836f32fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25124%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devu%20Status%20Updater&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25122-path-traversal-in-hashshop-wizshop-a0cd9b33</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25122%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20hashshop%20WizShop&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25121-cross-site-request-forgery-csrf-in--af578e4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25121%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shyammakwana%20Theme%20Options%20Z&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25119-improper-neutralization-of-input-du-57b21fc3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25119%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alejandro%20Aranda%20Woocommerce%20osCommerce%20Sync&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25118-improper-neutralization-of-input-du-9dd94921</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25118%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Danish%20Ali%20Malik%20Top%20Bar%20%E2%80%93%20PopUps%20%E2%80%93%20by%20WPOptin&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25115-improper-neutralization-of-input-du-6e6c60bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25115%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zeshan%20Abdullah%20Like%20dislike%20plus%20counter&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25114-improper-neutralization-of-input-du-fc50f92d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25114%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ehabstar%20User%20Role&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25113-improper-neutralization-of-input-du-a8368aad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25113%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Senktec%20Implied%20Cookie%20Consent&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25112-improper-neutralization-of-special--2a181919</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25112%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kareemsultan%20Social%20Links&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25109-improper-control-of-filename-for-in-7846a48e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25109%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JoomSky%20WP%20Vehicle%20Manager&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25108-improper-neutralization-of-input-du-f0e5fd79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25108%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shalomworld%20SW%20Plus&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25102-improper-neutralization-of-input-du-d7e75616</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20Harrison%20Yahoo%20BOSS&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25099-improper-neutralization-of-input-du-77fca706</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25099%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20accreteinfosolution%20Appointment%20Buddy%20Widget&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeaba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25092-improper-neutralization-of-input-du-28111209</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gtlwpdev%20All%20push%20notification%20for%20WP&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25090-cwe-79-improper-neutralization-of-i-d3834b24</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dreamstime%20Dreamstime%20Stock%20Photos&amp;severity=null&amp;id=683ee1ec182aa0cae27396ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25089-improper-neutralization-of-input-du-7b3a5637</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25089%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appten%20Image%20Rotator&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25087-improper-neutralization-of-input-du-b0df7952</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25087%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tim%20seekXL%20Snapr&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25084-improper-neutralization-of-input-du-9881ef91</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25084%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antrouss%20UniTimetable&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25083-improper-neutralization-of-input-du-6e05405a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25083%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dave%20Lavoie%20EP4%20More%20Embeds&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25070-improper-neutralization-of-input-du-444da394</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25070%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ed%20atrero%20Album%20Reviewer&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24758-improper-neutralization-of-input-du-73716060</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24758%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Map%20Locations&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24694-improper-neutralization-of-input-du-620affff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24694%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Pop-Up%20banners&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23956-improper-neutralization-of-input-du-9a18d15b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23956%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Richard%20Leishman%20WP%20Easy%20Post%20Mailer&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee90a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23945-improper-control-of-filename-for-in-9008f03d</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23945%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Webliup%20Popliup&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23904-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-rebrand-fluent-forms-bd6cc6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebrandpress%20Rebrand%20Fluent%20Forms&amp;severity=null&amp;id=682d9816c4522896dcbd6cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23903-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-local-shipping-labels-for-woocommerce-bd6cc2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woofx%20Local%20Shipping%20Labels%20for%20WooCommerce&amp;severity=null&amp;id=682d9816c4522896dcbd6cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23883-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-stray-random-quotes-bd6cbe</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23883%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unalignedcoder%20Stray%20Random%20Quotes&amp;severity=null&amp;id=682d9816c4522896dcbd6cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23881-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-lj-custom-menu-links-bd6cba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23881%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20littlejon%20LJ%20Custom%20Menu%20Links&amp;severity=null&amp;id=682d9816c4522896dcbd6cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23879-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pillardev-easy-automatic-newsletter-lite-bd6cb8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23879%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PillarDev%20Easy%20Automatic%20Newsletter%20Lite&amp;severity=null&amp;id=682d9816c4522896dcbd6cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23852-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-first-comment-redirect-bd6d86</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23852%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robin90%20First%20Comment%20Redirect&amp;severity=null&amp;id=682d9816c4522896dcbd6d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23850-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-mojo-under-construction-bd6d7c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojowill%20Mojo%20Under%20Construction&amp;severity=null&amp;id=682d9816c4522896dcbd6d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23847-improper-neutralization-of-input-du-b29fbb51</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saill%20Site%20Launcher&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23843-improper-neutralization-of-input-du-63dcbc0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23843%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphrmanager%20WP-HR%20Manager%3A%20The%20Human%20Resources%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23829-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-woo-update-variations-in-cart-bd6d74</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23829%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codingkart%20Woo%20Update%20Variations%20In%20Cart&amp;severity=null&amp;id=682d9816c4522896dcbd6d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23814-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-crudlab-like-box-bd6d70</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23814%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CRUDLab%20CRUDLab%20Like%20Box&amp;severity=null&amp;id=682d9816c4522896dcbd6d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23813-improper-neutralization-of-input-du-942a0f09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23813%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tony%20Hayes%20Guten%20Free%20Options&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23762-improper-neutralization-of-input-du-58544e14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Justin%20Sternberg%20DsgnWrks%20Twitter%20Importer&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23753-improper-neutralization-of-input-du-6c7c8cba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23753%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digireturn%20DN%20Sitemap%20Control&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23741-improper-neutralization-of-input-du-61b28f4c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23741%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Florian%20Chaillou%20Notifications%20Center&amp;severity=null&amp;id=69cd722be6bfc5ba1dee8510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23740-improper-neutralization-of-input-du-a8dce8b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23740%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zbynek%20Nedoma%20Easy%20School%20Registration&amp;severity=null&amp;id=69cd722be6bfc5ba1dee850d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23739-improper-neutralization-of-input-du-9bcb76fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23739%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jtibbles%20WP%20Ultimate%20Reviews%20FREE&amp;severity=null&amp;id=69cd722be6bfc5ba1dee850a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23738-improper-neutralization-of-input-du-06492c6c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Padam%20Shankhadev%20Ps%20Ads%20Pro&amp;severity=null&amp;id=69cd722be6bfc5ba1dee8507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23736-improper-neutralization-of-input-du-63bbb48f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23736%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webgdawg%20Form%20To%20JSON&amp;severity=null&amp;id=69cd722be6bfc5ba1dee8501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23731-improper-neutralization-of-input-du-360441cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23731%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20infosoftplugin%20Tax%20Report%20for%20WooCommerce&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23726-improper-neutralization-of-input-du-097cb2c6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23726%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thebloghouse%20ComparePress&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23721-improper-neutralization-of-input-du-0ab2e5e1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23721%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cloudvn%20Mobigate&amp;severity=null&amp;id=69cd7224e6bfc5ba1dee8403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23718-improper-neutralization-of-input-du-1f843f4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23718%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mancx%20Mancx%20AskMe%20Widget&amp;severity=null&amp;id=69cd7224e6bfc5ba1dee83fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23716-improper-neutralization-of-input-du-897e2f11</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23716%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JkmAS%20Login%20Watchdog&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23688-improper-neutralization-of-input-du-4a44ad5f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23688%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20editionskezzal%20Cobwebo%20URL%20Plugin&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23670-improper-neutralization-of-input-du-d460664b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23670%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20montashov%204%20author%20cheer%20up%20donate&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23668-improper-neutralization-of-input-du-7d188761</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23668%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mauricio%20Urrego%20ChatGPT%20Open%20AI%20Images%20%26%20Content%20for%20WooCommerce&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23663-improper-neutralization-of-input-du-6a67f5d1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23663%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Vaquez%20Contexto&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0aebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23637-improper-neutralization-of-input-du-04cac78f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23637%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fxy060608%20%E6%96%B0%E6%B7%98%E5%AE%A2WordPress%E6%8F%92%E4%BB%B6&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23635-improper-neutralization-of-input-du-6f1ee8e3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23635%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mobde3net%20ePermissions&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23619-improper-neutralization-of-input-du-a1c122b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23619%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Catch%20Themes%20Catch%20Duplicate%20Switcher&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23616-improper-neutralization-of-input-du-474f8f0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23616%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Steve%20Canalplan&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23615-missing-authorization-in-gtekelis-i-06d33255</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23615%3A%20Missing%20Authorization%20in%20gtekelis%20Interactive%20Page%20Hierarchy&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23613-missing-authorization-in-mediabeta--7fe50bff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23613%3A%20Missing%20Authorization%20in%20mediabeta%20WP%20Journal&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0abdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23600-improper-neutralization-of-input-du-563134d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23600%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pinal.shah%20Send%20to%20a%20Friend%20Addon&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23595-improper-neutralization-of-input-du-60021f92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainpulse%20Page%20Health-O-Meter&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23587-improper-neutralization-of-input-du-652643ec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashek%20Al%20Mahmud%20all-in-one-box-login&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23586-improper-neutralization-of-input-du-a7c0c429</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MAL73049%20WP%20Post%20Category%20Notifications&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23585-improper-neutralization-of-input-du-66457e0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CantonBolo%20Goo.gl%20Url%20Shorter&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23584-improper-neutralization-of-input-du-6cc8599c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arsh91%20Pin%20Locations%20on%20Map&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23579-improper-neutralization-of-input-du-c3446b6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digitalzoomstudio%20DZS%20Ajaxer%20Lite&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23576-improper-neutralization-of-input-du-de8ad9e1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cfuze%20WP%20Intro.JS&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23575-improper-neutralization-of-input-du-136a9b5b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevriX%20DX%20Sales%20CRM&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23570-improper-neutralization-of-input-du-27eca3a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mitchell%20Bundy%20WP%20Social%20Links&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23565-improper-neutralization-of-input-du-4fc2d13b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23565%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Taylor%20Wibstats&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a8fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23564-improper-neutralization-of-input-du-913513a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohsenshahbazi%20WP%20FixTag&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23563-improper-neutralization-of-input-du-623c0d2d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mbyte%20Explore%20pages&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23556-improper-neutralization-of-input-du-43bed377</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netbitsolutions%20Push%20Envoy%20Notifications&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23555-improper-neutralization-of-input-du-a41ab539</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chenyenming%20Ui%20Slider%20Filter%20By%20Price&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23553-improper-neutralization-of-input-du-7f3c89fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Cramer%20Userbase%20Access%20Control&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23552-improper-neutralization-of-input-du-215e98f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yashar%20Texteller&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23549-improper-neutralization-of-input-du-b3e49716</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20agora32%20Maniac%20SEO&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23539-improper-neutralization-of-input-du-9683836a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surror%20Awesome%20Hooks&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23538-improper-neutralization-of-input-du-644ca994</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sophia%20M%20Williams%20WP%20Contest&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23536-improper-neutralization-of-input-du-a930500c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mndpsingh287%20Track%20Page%20Scroll&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23526-improper-neutralization-of-input-du-06949b9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SwiftCloud%20Swift%20Calendar%20Online%20Appointment%20Scheduling&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23524-improper-neutralization-of-input-du-ce6a00bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dactum%20ClickBank%20Storefront&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23521-improper-neutralization-of-input-du-b86e23f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Goodlayers%20Blocks&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23519-improper-neutralization-of-input-du-3f723950</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23519%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jas%20Saran%20G%20Web%20Pro%20Store%20Locator&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23518-improper-neutralization-of-input-du-79f9c3dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrsaucier%20GoogleMapper&amp;severity=null&amp;id=69cd7633e6bfc5ba1df0a6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23517-improper-neutralization-of-input-du-b9352817</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sunil%20chaulagain%20Google%20Map%20on%20Post%2FPage&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23516-improper-neutralization-of-input-du-8c550884</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainvireinfo%20Sale%20with%20Razorpay&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23515-missing-authorization-in-tsecher-ts-92c95331</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23515%3A%20Missing%20Authorization%20in%20tsecher%20ts-tree&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23505-improper-neutralization-of-input-du-aa5e9d28</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23505%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pantho%20Bihosh%20Pit%20Login%20Welcome&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a51d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23502-cross-site-request-forgery-csrf-in--0f25400b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23502%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ned%20Curated%20Search&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23496-improper-neutralization-of-input-du-07aebc23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23496%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20husani%20WP%20FPO&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23494-improper-neutralization-of-input-du-00b23121</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23494%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20binnyva%20Quizzin&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23493-improper-neutralization-of-input-du-c839ffa9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moallemi%20Google%20Transliteration&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23490-improper-neutralization-of-input-du-ef0a735b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23490%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michael%20Stursberg%20Browser-Update-Notify&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23488-improper-neutralization-of-input-du-fab41a84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23488%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Abolfazl%20Sabagh%20rng-refresh&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23487-improper-neutralization-of-input-du-e2a39dfc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23487%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20odihost%20Easy%20Gallery&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23485-improper-neutralization-of-input-du-d7a1bc9c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23485%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richestsoft%20RS%20Survey&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23484-improper-neutralization-of-input-du-42781e12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23484%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cojecto%20Predict%20When&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23482-improper-neutralization-of-input-du-00f3d261</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23482%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azurecurve%20azurecurve%20Floating%20Featured%20Image&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23481-improper-neutralization-of-input-du-a20aa18c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23481%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Sales%20Report%20Email&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23480-improper-neutralization-of-input-du-77177837</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23480%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MicahBlu%20RSVP%20ME&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23478-improper-neutralization-of-input-du-7ef809d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23478%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmsaccount%20Photo%20Video%20Store&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23473-improper-neutralization-of-input-du-9be7f38c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23473%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Punit%20Bhalodiya%20Killer%20Theme%20Options&amp;severity=null&amp;id=69cd761ee6bfc5ba1df0988b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23472-improper-neutralization-of-input-du-9509115d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexostudio%20Flexo%20Slider&amp;severity=null&amp;id=69cd761ee6bfc5ba1df09888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23468-improper-neutralization-of-input-du-78f24841</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23468%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wrenchpilot%20Essay%20Wizard%20(wpCRES)&amp;severity=null&amp;id=69cd761ee6bfc5ba1df0987f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23465-improper-neutralization-of-input-du-9326395e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magent%20Vampire%20Character%20Manager&amp;severity=null&amp;id=69cd761ae6bfc5ba1df097af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23464-improper-neutralization-of-input-du-e125caaf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Keir%20Whitaker%20Twitter%20News%20Feed&amp;severity=null&amp;id=69cd761ae6bfc5ba1df097ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23451-improper-neutralization-of-input-du-5884ed35</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20titodevera%20Awesome%20Twitter%20Feeds&amp;severity=null&amp;id=69cd7619e6bfc5ba1df09700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23450-improper-neutralization-of-input-du-3ec66deb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20agenwebsite%20AW%20WooCommerce%20Kode%20Pembayaran&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23447-improper-neutralization-of-input-du-8816508f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23447%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kundan%20Yevale%20Smooth%20Dynamic%20Slider&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23446-cross-site-request-forgery-csrf-in--a88f0c7e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23446%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20KokoenDE%20WP%20SpaceContent&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23441-improper-neutralization-of-input-du-afac91bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23441%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dkukral%20Attach%20Gallery%20Posts&amp;severity=null&amp;id=69cd7616e6bfc5ba1df0962f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23440-missing-authorization-in-radicaldes-7b483d68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23440%3A%20Missing%20Authorization%20in%20radicaldesigns%20radSLIDE&amp;severity=null&amp;id=69cd7616e6bfc5ba1df0962c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23439-improper-neutralization-of-input-du-f09cdf19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23439%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20willshouse%20TinyMCE%20Extended%20Config&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23437-improper-neutralization-of-input-du-ee3c6820</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nord_tramper%20ntp-header-images&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23433-improper-neutralization-of-input-du-2fc03fe1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23433%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jnwry%20vcOS&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23425-improper-neutralization-of-input-du-9b86c3ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23425%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marekki%20Marekkis%20Watermark&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26999-deserialization-of-untrusted-data-i-ad4d9174</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26999%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21424-cwe-416-use-after-free-in-qualcomm--f660a8cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21424%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a45185912abc71d6564d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53034-cwe-822-untrusted-pointer-dereferen-14c9b5b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53034%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d64381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53033-cwe-822-untrusted-pointer-dereferen-b04e521e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53033%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d6437d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53032-cwe-367-time-of-check-time-of-use-t-8a833278</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53032%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d64379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53031-cwe-20-improper-input-validation-in-ab529f39</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53031%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d64375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53030-cwe-20-improper-input-validation-in-76a354dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53030%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d64371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53029-cwe-20-improper-input-validation-in-2cb3d5a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53029%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d642d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53028-cwe-367-time-of-check-time-of-use-t-5293fe1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53028%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d642d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53024-cwe-476-null-pointer-dereference-in-71e31243</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53024%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d642cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53023-cwe-416-use-after-free-in-qualcomm--cff7df8a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53023%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d642ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53022-cwe-20-improper-input-validation-in-05f07db9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53022%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d642c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53014-cwe-129-improper-validation-of-arra-efa3d5af</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53014%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44485912abc71d63147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53012-cwe-20-improper-input-validation-in-4d01e572</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53012%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44485912abc71d63144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53011-cwe-264-permissions-privileges-and--42d38051</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53011%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44485912abc71d63141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49836-cwe-129-improper-validation-of-arra-26552a53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49836%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44485912abc71d6312e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45580-cwe-416-use-after-free-in-qualcomm--bfc4a6c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45580%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a43f85912abc71d63036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24654-missing-authorization-in-seo-squirr-a22d7118</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24654%3A%20Missing%20Authorization%20in%20SEO%20Squirrly%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20650-cwe-787-out-of-bounds-write-in-medi-036660ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20650%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6781%2C%20MT6789%2C%20MT6835%2C%20MT6855%2C%20MT6878%2C%20MT6879%2C%20MT6880%2C%20MT6886%2C%20MT6890%2C%20MT6895%2C%20MT6897%2C%20MT6980%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT8370%2C%20MT8390%2C%20MT8676%2C%20MT8678&amp;severity=medium&amp;id=69a0a44d85912abc71d6525a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20647-cwe-476-null-pointer-dereference-in-7a13ced4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20647%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6785U%2C%20MT6789%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8666%2C%20MT8667%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=6994829080d747be20bad139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20646-cwe-787-out-of-bounds-write-in-medi-8ca6b954</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20646%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=critical&amp;id=69a0a44d85912abc71d65257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20645-cwe-787-out-of-bounds-write-in-medi-15057bf6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20645%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6765%2C%20MT6768%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6879%2C%20MT6886%2C%20MT6893%2C%20MT6897%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT8796&amp;severity=high&amp;id=69a0a44d85912abc71d65254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20644-cwe-1286-syntactic-correctness-in-m-b84d2e46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20644%3A%20CWE-1286%20Syntactic%20Correctness%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8673%2C%20MT8791T%2C%20MT8795T%2C%20MT8798&amp;severity=medium&amp;id=6994829080d747be20bad136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25952-na-bcfc49d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25952%3A%20n%2Fa&amp;severity=medium&amp;id=693c347d2e981ee9614b5bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25951-na-562aff23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25951%3A%20n%2Fa&amp;severity=high&amp;id=693c347d2e981ee9614b5baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25950-na-77c454a6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25950%3A%20n%2Fa&amp;severity=high&amp;id=693c347d2e981ee9614b5baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25949-na-d2e08919</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25949%3A%20n%2Fa&amp;severity=medium&amp;id=693c347d2e981ee9614b5ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25948-na-91c26d32</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25948%3A%20n%2Fa&amp;severity=critical&amp;id=693c347d2e981ee9614b5ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27220-cwe-1333-inefficient-regular-expres-e947e271</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27220%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20ruby-lang%20CGI&amp;severity=medium&amp;id=69091e18c28fd46ded86988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27219-cwe-770-allocation-of-resources-wit-a1c4600e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27219%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ruby-lang%20CGI&amp;severity=medium&amp;id=69091e18c28fd46ded869889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27221-cwe-212-improper-removal-of-sensiti-767844f8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27221%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20ruby-lang%20URI&amp;severity=low&amp;id=6909153cc28fd46ded7bacb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25953-n-a-in-n-a-bf5565</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25953%3A%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27371-cwe-305-authentication-bypass-by-primary-weakness-in-ietf-rfc-7523-bf04a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27371%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IETF%20RFC%207523&amp;severity=medium&amp;id=682d983fc4522896dcbf04a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27370-cwe-305-authentication-bypass-by-primary-weakness-in-openid-openid-connect-bf04a0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27370%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20OpenID%20OpenID%20Connect&amp;severity=medium&amp;id=682d983fc4522896dcbf04a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-03-2c6d33</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-03&amp;severity=medium&amp;id=682c7dbde8347ec82d2c6d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-03-f12956</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa25-071a-stop-ransomware-medusa-ransomware-f0c542</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA25-071A%20Stop%20Ransomware%3A%20Medusa%20Ransomware&amp;severity=low&amp;id=682acdbebbaf20d303f0c542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36353-cwe-459-incomplete-cleanup-in-amd-a-7cc7f3cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36353%3A%20CWE-459%20%20Incomplete%20Cleanup%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=68ee8c743dd1bfb0b7f039ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0895-cwe-215-insertion-of-sensitive-infor-78f79487</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0895%3A%20CWE-215%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20IBM%20Cognos%20Analytics%20Mobile&amp;severity=low&amp;id=68b4f7b8ad5a09ad00c726ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49733-vulnerability-in-linux-linux-be49c3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49733%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe49c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-02-2c61c2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-02&amp;severity=medium&amp;id=682c7dbde8347ec82d2c61c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-02-f1224a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f1224a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1491-cwe-79-improper-neutralization-of-in-48ef3fad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1491%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teastudiopl%20WP%20Posts%20Carousel&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13833-cwe-502-deserialization-of-untruste-2586027e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13833%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20awordpresslife%20Album%20Gallery&amp;severity=high&amp;id=699f6d17b7ef31ef0b56dd79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1404-cwe-862-missing-authorization-in-ays-fc2ee6ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1404%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13546-cwe-200-exposure-of-sensitive-infor-0be33cb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13546%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20edge22%20GenerateBlocks&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13910-cwe-22-improper-limitation-of-a-pat-e924c193</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13910%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sminozzi%20Database%20Backup%20and%20Table%20Integrity%20Check%20with%20Automated%20Scheduling&amp;severity=high&amp;id=699f6d1bb7ef31ef0b56dfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13697-cwe-918-server-side-request-forgery-6136dd96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13697%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wordplus%20Better%20Messages%20%E2%80%93%20Live%20Chat%2C%20Chat%20Rooms%2C%20Real-Time%20Messaging%20%26%20Private%20Messages&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a0270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1291-cwe-79-improper-neutralization-of-in-4c286301</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1291%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54daf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13611-cwe-200-exposure-of-sensitive-infor-b97257d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13611%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wordplus%20Better%20Messages%20%E2%80%93%20Live%20Chat%2C%20Chat%20Rooms%2C%20Real-Time%20Messaging%20%26%20Private%20Messages&amp;severity=high&amp;id=699f6e64b7ef31ef0b59fcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12544-cwe-862-missing-authorization-in-de-897d18a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12544%3A%20CWE-862%20Missing%20Authorization%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=699f6e41b7ef31ef0b59bc96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13806-cwe-94-improper-control-of-generati-5bc976bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13806%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpkube%20Authors%20List&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13911-cwe-200-exposure-of-sensitive-infor-12bfed0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13911%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sminozzi%20Database%20Backup%20and%20Table%20Integrity%20Check%20with%20Automated%20Scheduling&amp;severity=high&amp;id=699f6d1bb7ef31ef0b56dfdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1564-cwe-288-authentication-bypass-using--275c3222</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1564%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Select-Themes%20SetSail%20Membership&amp;severity=critical&amp;id=699f6b15b7ef31ef0b54def7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1671-cwe-288-authentication-bypass-using--4c4e81c5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1671%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated-Themes%20Academist%20Membership&amp;severity=critical&amp;id=699f6b17b7ef31ef0b54e02a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1638-cwe-288-authentication-bypass-using--f4d59d17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1638%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Edge-Themes%20Alloggio%20Membership&amp;severity=critical&amp;id=699f6b16b7ef31ef0b54df78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1459-cwe-79-improper-neutralization-of-in-0126df48</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20Page%20Builder%20by%20SiteOrigin&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1730-cwe-73-external-control-of-file-name-8a0240e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1730%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20specialk%20Simple%20Download%20Counter&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1502-cwe-862-missing-authorization-in-ip2-3154ca82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1502%3A%20CWE-862%20Missing%20Authorization%20in%20ip2location%20IP2Location%20Redirection&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13373-cwe-620-unverified-password-change--cac17f42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13373%3A%20CWE-620%20Unverified%20Password%20Change%20in%20scriptsbundle%20Exertio%20Framework&amp;severity=high&amp;id=699f6e52b7ef31ef0b59e3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12824-cwe-620-unverified-password-change--d3090196</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12824%3A%20CWE-620%20Unverified%20Password%20Change%20in%20scriptsbundle%20Nokri%20%E2%80%93%20Job%20Board%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e48b7ef31ef0b59c4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13901-cwe-79-improper-neutralization-of-i-f7fc94b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcalc%20Counter%20Box%20%E2%80%93%20Add%20Countdowns%2C%20Timers%20%26%20Dynamic%20Counters%20to%20WordPress&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9212-cwe-79-improper-neutralization-of-in-eadb91d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwham%20SKU%20Generator%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13559-cwe-79-improper-neutralization-of-i-082d854b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marsian%20TemplatesNext%20ToolKit&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13518-cwe-352-cross-site-request-forgery--42cd0b9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13518%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20simplepress%20Simple%3APress%20Forum&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13750-cwe-89-improper-neutralization-of-s-c9aaf672</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13750%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20prismitsystems%20Multilevel%20Referral%20Plugin%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a0694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13746-cwe-862-missing-authorization-in-im-1748795a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13746%3A%20CWE-862%20Missing%20Authorization%20in%20imznarf%20Booking%20Calendar%20and%20Notification&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9217-cwe-79-improper-neutralization-of-in-be469367</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwham%20Currency%20Switcher%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0820-cwe-79-improper-neutralization-of-in-8c4d5488</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clicface%20Clicface%20Trombi&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13568-cwe-200-exposure-of-sensitive-infor-b3fe4a84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13568%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20techjewel%20Fluent%20Support%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=high&amp;id=699f6e61b7ef31ef0b59f417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1780-cwe-862-missing-authorization-in-sve-f04c7fc3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1780%3A%20CWE-862%20Missing%20Authorization%20in%20themekraft%20BuddyPress%20WooCommerce%20My%20Account%20Integration.%20Create%20WooCommerce%20Member%20Pages&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13358-cwe-862-missing-authorization-in-sv-cc2173c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13358%3A%20CWE-862%20Missing%20Authorization%20in%20themekraft%20BuddyPress%20WooCommerce%20My%20Account%20Integration.%20Create%20WooCommerce%20Member%20Pages&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-01-2c7936</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-01&amp;severity=medium&amp;id=682c7dbde8347ec82d2c7936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-01-f12461</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f12461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26466-allocation-of-resources-without-lim-1c6a4ace</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26466%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=6835dda5182aa0cae2186687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0159-cwe-288-authentication-bypass-using--b5703286</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0159%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20IBM%20Storage%20Virtualize&amp;severity=critical&amp;id=69a0a1b985912abc71d0a0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1795-vulnerability-in-python-software-fou-c4694068</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1795%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=6908cdd1bdcf00867c4fc65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0985-cwe-526-cleartext-storage-of-sensiti-0f7bd1ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0985%3A%20CWE-526%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20IBM%20MQ&amp;severity=medium&amp;id=68ae12eaad5a09ad005b3199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27400-cwe-79-improper-neutralization-of-i-e300f188</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27400%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenMage%20magento-lts&amp;severity=low&amp;id=68502ef4a8c9212743843bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1319-cwe-79-improper-neutralization-of-in-7dcfda90</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Site%20Mailer%20%E2%80%93%20SMTP%20Replacement%2C%20Email%20API%20Deliverability%20%26%20Email%20Log&amp;severity=high&amp;id=699f6b10b7ef31ef0b54db90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10860-cwe-862-missing-authorization-in-xl-56b12e74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10860%3A%20CWE-862%20Missing%20Authorization%20in%20xlplugins%20NextMove%20Lite%20%E2%80%93%20Thank%20You%20Page%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1413-cwe-732-incorrect-permission-assignm-b01dc190</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1413%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Blackmagic%20Design%20Inc%20DaVinci%20Resolve&amp;severity=high&amp;id=68dffc4fb7ee07964d95f62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22491-cwe-79-improper-neutralization-of-i-30e92a5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22491%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Eaton%20Foreseer%20Reporting%20Software%20(FRS)&amp;severity=medium&amp;id=68ad8d4dad5a09ad005730d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8420-cwe-266-incorrect-privilege-assignme-6c992a83</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8420%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SiteSao%20DHVC%20Form&amp;severity=critical&amp;id=699f6c28b7ef31ef0b560929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13851-cwe-79-improper-neutralization-of-i-b86ac635</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20evigeo%20Modal%20Portfolio&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9195-cwe-862-missing-authorization-in-cre-1c398882</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9195%3A%20CWE-862%20Missing%20Authorization%20in%20creativeon%20WHMCS%20Client%20Area%20for%20WordPress%20by%20WHMpress&amp;severity=high&amp;id=699f6b43b7ef31ef0b550989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1662-cwe-918-server-side-request-forgery--fef90f2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1662%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20apprhyme%20URL%20Media%20Uploader&amp;severity=medium&amp;id=699f6b16b7ef31ef0b54df93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1570-cwe-640-weak-password-recovery-mecha-e4877170</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1570%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%2C%20Listings%20%26%20Classified%20Ads&amp;severity=high&amp;id=699f6b15b7ef31ef0b54defb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13638-cwe-200-exposure-of-sensitive-infor-59e5651f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13638%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sldesignpl%20Order%20Attachments%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13831-cwe-502-deserialization-of-untruste-e33d4a2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13831%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpbranch%20Tabs%20for%20WooCommerce&amp;severity=high&amp;id=699f6d17b7ef31ef0b56dd71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8425-cwe-434-unrestricted-upload-of-file--04a12499</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8425%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Swings%20WooCommerce%20Ultimate%20Gift%20Card&amp;severity=critical&amp;id=699f6c28b7ef31ef0b56092d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9193-cwe-98-improper-control-of-filename--b29728f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9193%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20creativeon%20WHMpress%20-%20WHMCS%20WordPress%20Integration%20Plugin&amp;severity=critical&amp;id=699f6b43b7ef31ef0b550985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9019-cwe-79-improper-neutralization-of-in-764b794f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20secupress%20SecuPress%20with%20Simple%20SSL%20%E2%80%93%20Simple%20and%20Performant%20Security&amp;severity=medium&amp;id=699f6b3cb7ef31ef0b54f987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13469-cwe-79-improper-neutralization-of-i-926cfd9e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13469%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pickplugins%20PickPlugins%20Pricing%20Table&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59ec16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13716-cwe-862-missing-authorization-in-ta-a9a0ed77</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13716%3A%20CWE-862%20Missing%20Authorization%20in%20tarborali%20Forex%20Calculators&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13832-cwe-639-authorization-bypass-throug-8bdf7871</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13832%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ultrapressorg%20Ultra%20Addons%20Lite%20for%20Elementor&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1560-cwe-79-improper-neutralization-of-in-e0abebe7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1560%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20darkosxrc%20WOW%20Entrance%20Effects%20(WEE!)&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54deed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1572-cwe-89-improper-neutralization-of-sp-620f984f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1572%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=medium&amp;id=699f6b16b7ef31ef0b54df70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1571-cwe-79-improper-neutralization-of-in-a4df7e3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1571%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b16b7ef31ef0b54df6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1405-cwe-79-improper-neutralization-of-in-d108d972</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20implecode%20Product%20Catalog%20Simple&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0764-cwe-20-improper-input-validation-in--f2b0b84c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0764%3A%20CWE-20%20Improper%20Input%20Validation%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1506-cwe-352-cross-site-request-forgery-c-d13c8379</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1506%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20roxnor%20Wp%20Social%20Login%20and%20Register%20Social%20Counter&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54de37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12820-cwe-79-improper-neutralization-of-i-5470439e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manoj_rana91986%20MK%20Google%20Directions&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1513-cwe-79-improper-neutralization-of-in-ebaeb295</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=high&amp;id=699f6b14b7ef31ef0b54de55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1511-cwe-79-improper-neutralization-of-in-913cc173</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1511%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54de4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0801-cwe-352-cross-site-request-forgery-c-6a4d356b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0801%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ratemyagent%20RateMyAgent%20Official&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b5553a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1505-cwe-79-improper-neutralization-of-in-18cba8e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20berocket%20Advanced%20AJAX%20Product%20Filters&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1757-cwe-79-improper-neutralization-of-in-de626bd5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20portfoliohub%20WordPress%20Portfolio%20Builder%20%E2%80%93%20Portfolio%20Gallery&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13796-cwe-200-exposure-of-sensitive-infor-93f616c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13796%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pickplugins%20Post%20Grid&amp;severity=medium&amp;id=699f6d15b7ef31ef0b56dc12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56340-cwe-23-relative-path-traversal-in-i-12db0fae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56340%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20IBM%20Cognos%20Analytics&amp;severity=medium&amp;id=68f2616f9c34d0947f2ce855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0975-cwe-150-improper-neutralization-of-e-144ed766</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0975%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20IBM%20MQ&amp;severity=high&amp;id=69a0a1b985912abc71d0a0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25635-na-6fc862c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25635%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e372a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-28-2c7318</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-28&amp;severity=medium&amp;id=682c7dbde8347ec82d2c7318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-28-f12645</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12811-cwe-98-improper-control-of-filename-a5e72783</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12811%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ShineTheme%20Travel%20Booking%20WordPress%20Theme&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1687-cwe-352-cross-site-request-forgery-c-dc00a823</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1687%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeMakers%20Car%20Dealer%20Automotive%20WordPress%20Theme%20%E2%80%93%20Responsive&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1682-cwe-862-missing-authorization-in-the-323e3112</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1682%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeMakers%20Car%20Dealer%20Automotive%20WordPress%20Theme%20%E2%80%93%20Responsive&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1681-cwe-862-missing-authorization-in-the-aa0da4b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1681%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeMakers%20Car%20Dealer%20Automotive%20WordPress%20Theme%20%E2%80%93%20Responsive&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21824-vulnerability-in-linux-linux-be8915</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21823-vulnerability-in-linux-linux-be8911</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21822-vulnerability-in-linux-linux-be890d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe890d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21821-vulnerability-in-linux-linux-be8909</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21820-vulnerability-in-linux-linux-be8905</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21820%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21819-vulnerability-in-linux-linux-be8901</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21817-vulnerability-in-linux-linux-be88fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21816-vulnerability-in-linux-linux-bdd35f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21816%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21815-vulnerability-in-linux-linux-be88f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe88f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21814-vulnerability-in-linux-linux-be88f5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe88f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21813-vulnerability-in-linux-linux-be88f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe88f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21812-vulnerability-in-linux-linux-bdd357</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21812%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21811-vulnerability-in-linux-linux-be88d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21810-vulnerability-in-linux-linux-be88cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21809-vulnerability-in-linux-linux-bdd34f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21808-vulnerability-in-linux-linux-be88c3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21807-vulnerability-in-linux-linux-be88bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21806-vulnerability-in-linux-linux-be88bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe88bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21805-vulnerability-in-linux-linux-be88aa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21804-vulnerability-in-linux-linux-be88a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe88a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21803-vulnerability-in-linux-linux-be889e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe889e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21802-vulnerability-in-linux-linux-bdd338</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21801-vulnerability-in-linux-linux-be889a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe889a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21800-vulnerability-in-linux-linux-be8889</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21799-vulnerability-in-linux-linux-be886e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe886e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21798-vulnerability-in-linux-linux-be8866</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58042-vulnerability-in-linux-linux-bde1ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58042%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58034-vulnerability-in-linux-linux-bde1e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58022-vulnerability-in-linux-linux-bde1df</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22624-cwe-79-improper-neutralization-of-i-d382ebe1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20bradvin%20FooGallery%20-%20Responsive%20Photo%20Gallery%2C%20Image%20Viewer%2C%20Justified%2C%20Masonry%20%26%20Carousel&amp;severity=medium&amp;id=6863cffd6f40f0eb728f46a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23687-improper-neutralization-of-input-du-a8cbb75f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23687%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simonhunter%20Woo%20Store%20Mode&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22280-missing-authorization-in-revmakx-de-7606ed9a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22280%3A%20Missing%20Authorization%20in%20revmakx%20DefendWP%20Firewall&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13402-cwe-79-improper-neutralization-of-i-9a4454ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13402%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boss%20Media%20BuddyBoss%20Platform&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13217-cwe-359-exposure-of-private-persona-432dae5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13217%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20jegtheme%20Jeg%20Kit%20for%20Elementor%20%E2%80%93%20Powerful%20Addons%20for%20Elementor%2C%20Widgets%20%26%20Templates%20for%20WordPress&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1450-cwe-79-improper-neutralization-of-in-f2ab801a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20premio%20Floating%20Chat%20Widget%3A%20Contact%20Chat%20Icons%2C%20Telegram%20Chat%2C%20Line%20Messenger%2C%20WeChat%2C%20Email%2C%20SMS%2C%20Call%20Button%20%E2%80%93%20Chaty&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13734-cwe-79-improper-neutralization-of-i-1f537515</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13734%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techeshta%20Card%20Elements%20for%20Elementor&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a053b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1282-cwe-22-improper-limitation-of-a-path-8b66bfe7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1282%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThemeMakers%20Car%20Dealer%20Automotive%20WordPress%20Theme%20%E2%80%93%20Responsive&amp;severity=high&amp;id=699f6b0eb7ef31ef0b54da71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1690-cwe-79-improper-neutralization-of-in-da379dd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeMakers%20ThemeMakers%20Stripe%20Checkout&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1717-cwe-288-authentication-bypass-using--dc2fd08a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1717%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20pluginly%20Login%20Me%20Now%20%E2%80%93%20Passwordless%2C%20Magic%20Link%2C%20OTP%20%26%20Social%20Login%20for%20WordPress&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1689-cwe-79-improper-neutralization-of-in-7d6dc477</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeMakers%20ThemeMakers%20PayPal%20Express%20Checkout&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13907-cwe-918-server-side-request-forgery-f76b99a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13907%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20boldgrid%20Total%20Upkeep%20%E2%80%93%20WordPress%20Backup%20Plugin%20plus%20Restore%20%26%20Migrate%20by%20BoldGrid&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2297-cwe-269-improper-privilege-managemen-394c381e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2297%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Bricks%20Builder%20Bricks&amp;severity=high&amp;id=699f6dacb7ef31ef0b58a81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6261-cwe-79-improper-neutralization-of-in-29217e9b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1295-cwe-269-improper-privilege-managemen-75b36694</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1295%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Templines%20Templines%20Elementor%20Helper%20Core&amp;severity=high&amp;id=699f6b0fb7ef31ef0b54dafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1686-external-control-of-file-name-or-pat-d4bb9b2b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1686%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20io.pebbletemplates%3Apebble&amp;severity=medium&amp;id=694579a3133fda1465c274c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13905-cwe-918-server-side-request-forgery-5d9ffd7c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13905%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sainwp%20OneStore%20Sites&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13647-cwe-352-cross-site-request-forgery--f3575f74</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13647%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themesawesome%20School%20Management%20System%20%E2%80%93%20SakolaWP&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fdf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0469-cwe-79-improper-neutralization-of-in-d7754650</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0469%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b69b7ef31ef0b55527a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21797-vulnerability-in-linux-linux-be8862</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21796-vulnerability-in-linux-linux-be885e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe885e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21795-vulnerability-in-linux-linux-be884d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe884d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21794-vulnerability-in-linux-linux-be8849</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21793-vulnerability-in-linux-linux-be8845</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21792-vulnerability-in-linux-linux-bdd336</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21791-vulnerability-in-linux-linux-be8834</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21790-vulnerability-in-linux-linux-be882c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe882c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21789-vulnerability-in-linux-linux-be8824</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21788-vulnerability-in-linux-linux-be8809</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21787-vulnerability-in-linux-linux-be8805</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21786-vulnerability-in-linux-linux-be8801</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21785-vulnerability-in-linux-linux-be87e7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe87e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21784-vulnerability-in-linux-linux-be87df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe87df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21783-vulnerability-in-linux-linux-be87d5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe87d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21782-vulnerability-in-linux-linux-be87cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe87cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21781-vulnerability-in-linux-linux-be87c5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe87c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21780-vulnerability-in-linux-linux-be87bf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe87bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21779-vulnerability-in-linux-linux-be87bb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe87bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21778-vulnerability-in-linux-linux-be879d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe879d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21777-vulnerability-in-linux-linux-be8799</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21776-vulnerability-in-linux-linux-be8791</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21775-vulnerability-in-linux-linux-be878d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe878d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21774-vulnerability-in-linux-linux-be8789</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21773-vulnerability-in-linux-linux-be8778</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21772-vulnerability-in-linux-linux-be8770</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21771-vulnerability-in-linux-linux-be8768</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21770-vulnerability-in-linux-linux-be8760</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21769-vulnerability-in-linux-linux-be875c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe875c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21768-vulnerability-in-linux-linux-be8731</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21767-vulnerability-in-linux-linux-bdd334</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21766-vulnerability-in-linux-linux-bdd31a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21765-vulnerability-in-linux-linux-be8729</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21764-vulnerability-in-linux-linux-be8721</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21763-vulnerability-in-linux-linux-be8719</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21762-vulnerability-in-linux-linux-be8711</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21762%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21761-vulnerability-in-linux-linux-be870b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe870b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21760-vulnerability-in-linux-linux-be8707</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21759-vulnerability-in-linux-linux-be86f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21758-vulnerability-in-linux-linux-be86f0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21758%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21756-vulnerability-in-linux-linux-be86ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58021-vulnerability-in-linux-linux-bde1ce</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58020-vulnerability-in-linux-linux-bdd256</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57852-vulnerability-in-linux-linux-bde8eb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57834-vulnerability-in-linux-linux-bde8b3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54458-vulnerability-in-linux-linux-bdf0e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54458%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54456-vulnerability-in-linux-linux-bdf0e3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54456%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52560-vulnerability-in-linux-linux-bdf7d0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52560%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52559-vulnerability-in-linux-linux-bdf7c8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52559%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf7c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52557-vulnerability-in-linux-linux-bdf7b3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52557%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49570-vulnerability-in-linux-linux-be0741</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49570%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21754-vulnerability-in-linux-linux-be86c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21753-vulnerability-in-linux-linux-be86c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21752-vulnerability-in-linux-linux-be86bc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21751-vulnerability-in-linux-linux-be86b4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21750-vulnerability-in-linux-linux-be86ac</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21749-vulnerability-in-linux-linux-be86a8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe86a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21748-vulnerability-in-linux-linux-be86a4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21747-vulnerability-in-linux-linux-be8697</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9832c4522896dcbe8697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21746-vulnerability-in-linux-linux-be8686</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21745-vulnerability-in-linux-linux-be867e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe867e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21744-vulnerability-in-linux-linux-be865d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe865d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21743-vulnerability-in-linux-linux-be8657</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21742-vulnerability-in-linux-linux-be8655</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21741-vulnerability-in-linux-linux-be8651</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21739-vulnerability-in-linux-linux-be8644</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21738-vulnerability-in-linux-linux-be8640</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21737-vulnerability-in-linux-linux-be863c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21737%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe863c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21736-vulnerability-in-linux-linux-be8638</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21736%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21735-vulnerability-in-linux-linux-be8634</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21735%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21734-vulnerability-in-linux-linux-be8630</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21734%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21733-vulnerability-in-linux-linux-be8610</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21733%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21732-vulnerability-in-linux-linux-be860c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21732%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe860c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58019-vulnerability-in-linux-linux-bde1c6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58018-vulnerability-in-linux-linux-bded0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58017-vulnerability-in-linux-linux-bded09</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58016-vulnerability-in-linux-linux-bded05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58015-vulnerability-in-linux-linux-bded01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58014-vulnerability-in-linux-linux-aec08a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58013-vulnerability-in-linux-linux-bdecfd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdecfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58012-vulnerability-in-linux-linux-bdecf9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdecf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58011-vulnerability-in-linux-linux-bdecea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdecea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58010-vulnerability-in-linux-linux-bdecc6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdecc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58009-vulnerability-in-linux-linux-bdecbe</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdecbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58008-vulnerability-in-linux-linux-bdd24e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58007-vulnerability-in-linux-linux-bdecb6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdecb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58006-vulnerability-in-linux-linux-bdecae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdecae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58005-vulnerability-in-linux-linux-bdeca6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58004-vulnerability-in-linux-linux-bdec93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58003-vulnerability-in-linux-linux-bdec8b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdec8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58002-vulnerability-in-linux-linux-bdec7a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58001-vulnerability-in-linux-linux-bdec72</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdec72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21731-vulnerability-in-linux-linux-be8608</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21731%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21730-vulnerability-in-linux-linux-be8604</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21729-vulnerability-in-linux-linux-be8600</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21728-vulnerability-in-linux-linux-bdd312</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21727-vulnerability-in-linux-linux-be85fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21727%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21726-vulnerability-in-linux-linux-bdd30a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21726%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21725-vulnerability-in-linux-linux-be85f8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21725%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe85f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21724-vulnerability-in-linux-linux-be85f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21724%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe85f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21723-vulnerability-in-linux-linux-be85ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21723%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe85ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21722-vulnerability-in-linux-linux-be85ea</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21722%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21721-vulnerability-in-linux-linux-be85c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21721%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21720-vulnerability-in-linux-linux-be85c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21720%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21719-vulnerability-in-linux-linux-be85b3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21719%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21718-vulnerability-in-linux-linux-be85ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21718%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21717-vulnerability-in-linux-linux-be85a3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21717%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21716-vulnerability-in-linux-linux-be859d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21716%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe859d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21715-vulnerability-in-linux-linux-bdd300</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21715%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21714-vulnerability-in-linux-linux-be8599</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21714%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21713-vulnerability-in-linux-linux-be8588</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21713%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21712-vulnerability-in-linux-linux-be8580</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21712%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21711-vulnerability-in-linux-linux-be8576</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21711%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21710-vulnerability-in-linux-linux-be8554</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21710%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21709-vulnerability-in-linux-linux-be854c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21709%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe854c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21708-vulnerability-in-linux-linux-be8544</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21707-vulnerability-in-linux-linux-be988b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe988b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21706-vulnerability-in-linux-linux-be9883</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21705-vulnerability-in-linux-linux-bdd2f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58000-vulnerability-in-linux-linux-bdec68</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57999-vulnerability-in-linux-linux-bdec53</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57998-vulnerability-in-linux-linux-bdec42</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57997-vulnerability-in-linux-linux-bdec3a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdec3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57996-vulnerability-in-linux-linux-bdec32</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdec32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57995-vulnerability-in-linux-linux-bdec2a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57994-vulnerability-in-linux-linux-bdec22</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57993-vulnerability-in-linux-linux-bdec08</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdec08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57992-vulnerability-in-linux-linux-bdec00</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57991-vulnerability-in-linux-linux-bdebf8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57990-vulnerability-in-linux-linux-bdd246</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57989-vulnerability-in-linux-linux-bdebf0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57988-vulnerability-in-linux-linux-bdebdb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57987-vulnerability-in-linux-linux-bdebd7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57986-vulnerability-in-linux-linux-bdebd3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57985-vulnerability-in-linux-linux-bdebcf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57984-vulnerability-in-linux-linux-bdebcb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdebcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57983-vulnerability-in-linux-linux-bdebba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57982-vulnerability-in-linux-linux-bdebb2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdebb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57981-vulnerability-in-linux-linux-bdebaa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57980-vulnerability-in-linux-linux-bdeb9b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57979-vulnerability-in-linux-linux-bdd23e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57978-vulnerability-in-linux-linux-bdeb91</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57977-vulnerability-in-linux-linux-bdeb7c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57976-vulnerability-in-linux-linux-bdeb78</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57975-vulnerability-in-linux-linux-bdeb6b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57974-vulnerability-in-linux-linux-bdeb67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57973-vulnerability-in-linux-linux-bdeb63</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57953-vulnerability-in-linux-linux-bdeb5f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-27-815adcb7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-27&amp;severity=medium&amp;id=68367c99182aa0cae2324b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41339-n-a-in-n-a-bda2d2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41339%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41334-n-a-in-n-a-bda2ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41334%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2025-02-27-87e65b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202025-02-27&amp;severity=medium&amp;id=682b68f7d14de609c887e65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1634-missing-release-of-memory-after-effe-c98235e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1634%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime&amp;severity=high&amp;id=68629a946f40f0eb728bd83d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49732-vulnerability-in-linux-linux-be49bf</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49732%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe49bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1716-cwe-184-incomplete-list-of-disallowe-3daf4515</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1716%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20mmaitre314%20picklescan&amp;severity=medium&amp;id=695450bedb813ff03e2bf8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1249-missing-authorization-in-marcus-aka--fccd5c1b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1249%3A%20Missing%20Authorization%20in%20Marcus%20(aka%20%40msykes)%20Events%20Manager&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6810-cwe-79-improper-neutralization-of-in-f21ac7ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quizorganizer%20Quiz%20Organizer&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1517-cwe-79-improper-neutralization-of-in-f25a7883</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1517%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54deca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13560-cwe-352-cross-site-request-forgery--359bed92</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13560%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scottpaterson%20Subscriptions%20%26%20Memberships%20for%20PayPal&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13803-cwe-79-improper-neutralization-of-i-44eb1e59</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13669-cwe-79-cross-site-scripting-xss-in--6b18e3a6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13669%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20CalendApp&amp;severity=medium&amp;id=696166b3047de42cfc9dfbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12434-cwe-200-exposure-of-sensitive-infor-10868051</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12434%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Brainstorm%20Force%20SureMembers&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b59898d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49731-vulnerability-in-linux-linux-be49bd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49731%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe49bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49730-vulnerability-in-linux-linux-be49b0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe49b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49729-vulnerability-in-linux-linux-be499f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe499f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49728-vulnerability-in-linux-linux-be4997</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49727-vulnerability-in-linux-linux-be498f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49727%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe498f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49726-vulnerability-in-linux-linux-be4970</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49726%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49725-vulnerability-in-linux-linux-be496c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49725%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe496c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49724-vulnerability-in-linux-linux-be4968</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49724%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49723-vulnerability-in-linux-linux-be4964</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49723%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49722-vulnerability-in-linux-linux-be4957</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49722%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49721-vulnerability-in-linux-linux-be4955</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49721%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49720-vulnerability-in-linux-linux-be4946</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49720%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49719-vulnerability-in-linux-linux-be493e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49719%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe493e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49718-vulnerability-in-linux-linux-be4936</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49718%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49717-vulnerability-in-linux-linux-be492e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49717%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe492e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49716-vulnerability-in-linux-linux-be4911</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49716%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49715-vulnerability-in-linux-linux-be490d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49715%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe490d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49714-vulnerability-in-linux-linux-be4909</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49714%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49713-vulnerability-in-linux-linux-bdd72c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49713%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd72c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49712-vulnerability-in-linux-linux-be48fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49712%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49711-vulnerability-in-linux-linux-be48f8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49711%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe48f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49710-vulnerability-in-linux-linux-be48f4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49710%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49709-vulnerability-in-linux-linux-be48e5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49709%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49708-vulnerability-in-linux-linux-bdd728</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49707-vulnerability-in-linux-linux-be48e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49706-vulnerability-in-linux-linux-be48db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49705-vulnerability-in-linux-linux-be48d7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49704-vulnerability-in-linux-linux-be48ba</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49703-vulnerability-in-linux-linux-be48b6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe48b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49702-vulnerability-in-linux-linux-be48b2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49701-vulnerability-in-linux-linux-be48ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49701%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe48ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49700-vulnerability-in-linux-linux-be489f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49700%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe489f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49699-vulnerability-in-linux-linux-be4897</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49698-vulnerability-in-linux-linux-be4893</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49698%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49697-vulnerability-in-linux-linux-be488f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe488f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49696-vulnerability-in-linux-linux-bdd722</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49695-vulnerability-in-linux-linux-be488b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe488b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49694-vulnerability-in-linux-linux-be487a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe487a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49693-vulnerability-in-linux-linux-be485b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe485b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49692-vulnerability-in-linux-linux-be4857</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49691-vulnerability-in-linux-linux-be4853</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49688-vulnerability-in-linux-linux-bdd71e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49687-vulnerability-in-linux-linux-be4844</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49686-vulnerability-in-linux-linux-be483c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49686%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe483c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49685-vulnerability-in-linux-linux-be4838</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49684-vulnerability-in-linux-linux-be4834</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49684%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49683-vulnerability-in-linux-linux-be4830</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49682-vulnerability-in-linux-linux-be481f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe481f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49681-vulnerability-in-linux-linux-be4817</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49680-vulnerability-in-linux-linux-be47fc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49679-vulnerability-in-linux-linux-be47f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49679%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49678-vulnerability-in-linux-linux-be47f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49678%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49677-vulnerability-in-linux-linux-be47f0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49677%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49676-vulnerability-in-linux-linux-be47e3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49676%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49675-vulnerability-in-linux-linux-be47df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49674-vulnerability-in-linux-linux-be47db</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe47db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49673-vulnerability-in-linux-linux-be47ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe47ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49672-vulnerability-in-linux-linux-be47ca</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49672%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe47ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49671-vulnerability-in-linux-linux-be47c6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49670-vulnerability-in-linux-linux-be47a9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49669-vulnerability-in-linux-linux-be47a5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe47a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49668-vulnerability-in-linux-linux-be47a1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49667-vulnerability-in-linux-linux-be479d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe479d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49666-vulnerability-in-linux-linux-bdd71a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49666%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49665-vulnerability-in-linux-linux-be4799</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49665%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49664-vulnerability-in-linux-linux-bdd716</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49663-vulnerability-in-linux-linux-be4795</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49662-vulnerability-in-linux-linux-be4791</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49661-vulnerability-in-linux-linux-be478d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe478d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49659-vulnerability-in-linux-linux-be4789</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49658-vulnerability-in-linux-linux-be477c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe477c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49657-vulnerability-in-linux-linux-be475c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe475c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49656-vulnerability-in-linux-linux-be4758</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49655-vulnerability-in-linux-linux-be4754</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49654-vulnerability-in-linux-linux-be4750</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49653-vulnerability-in-linux-linux-bdd712</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49652-vulnerability-in-linux-linux-be474c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe474c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49651-vulnerability-in-linux-linux-be4748</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49651%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49650-vulnerability-in-linux-linux-be4744</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49650%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49649-vulnerability-in-linux-linux-be4740</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49648-vulnerability-in-linux-linux-bdd701</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49647-vulnerability-in-linux-linux-be473a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe473a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49646-vulnerability-in-linux-linux-be4736</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49645-vulnerability-in-linux-linux-be471d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe471d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49644-vulnerability-in-linux-linux-be471b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe471b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49643-vulnerability-in-linux-linux-be4719</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49642-vulnerability-in-linux-linux-be4701</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49641-vulnerability-in-linux-linux-bdd6fd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49640-vulnerability-in-linux-linux-be46f9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49639-vulnerability-in-linux-linux-be46f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49638-vulnerability-in-linux-linux-be46e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49637-vulnerability-in-linux-linux-be46df</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49636-vulnerability-in-linux-linux-be46d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49635-vulnerability-in-linux-linux-be46d3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49634-vulnerability-in-linux-linux-be46b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49633-vulnerability-in-linux-linux-be46ab</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49633%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49632-vulnerability-in-linux-linux-be46a7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49631-vulnerability-in-linux-linux-be4696</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49630-vulnerability-in-linux-linux-be468e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49630%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe468e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49629-vulnerability-in-linux-linux-be4688</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49629%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49628-vulnerability-in-linux-linux-be4684</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49628%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49627-vulnerability-in-linux-linux-be4680</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49627%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49626-vulnerability-in-linux-linux-be4671</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49626%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49625-vulnerability-in-linux-linux-be4667</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49625%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49624-vulnerability-in-linux-linux-bdd6f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49624%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49623-vulnerability-in-linux-linux-be464c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49623%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe464c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49622-vulnerability-in-linux-linux-be4648</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49622%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49621-vulnerability-in-linux-linux-be463b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49621%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe463b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49620-vulnerability-in-linux-linux-be4637</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49620%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49619-vulnerability-in-linux-linux-be4633</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49619%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49618-vulnerability-in-linux-linux-be462f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49618%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe462f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49617-vulnerability-in-linux-linux-be462b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49617%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe462b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49616-vulnerability-in-linux-linux-be4627</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49616%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49615-vulnerability-in-linux-linux-be4623</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49615%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49613-vulnerability-in-linux-linux-be461f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49613%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe461f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49612-vulnerability-in-linux-linux-be45fd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49612%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49611-vulnerability-in-linux-linux-be45f9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49611%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe45f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49610-vulnerability-in-linux-linux-be45f5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49610%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe45f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49609-vulnerability-in-linux-linux-be45f1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49609%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49608-vulnerability-in-linux-linux-be45ed</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49608%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49607-vulnerability-in-linux-linux-bdd6e8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49607%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49606-vulnerability-in-linux-linux-be45e9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49606%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe45e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49605-vulnerability-in-linux-linux-be45e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49605%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49604-vulnerability-in-linux-linux-be45e1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49604%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49603-vulnerability-in-linux-linux-be45d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49603%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49602-vulnerability-in-linux-linux-be45c8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49602%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49601-vulnerability-in-linux-linux-be45af</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49601%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe45af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49600-vulnerability-in-linux-linux-be45a2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49600%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe45a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49599-vulnerability-in-linux-linux-be459e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49599%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe459e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49598-vulnerability-in-linux-linux-be459a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49598%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe459a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49597-vulnerability-in-linux-linux-be4594</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49597%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49596-vulnerability-in-linux-linux-bdd6e0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49596%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49595-vulnerability-in-linux-linux-be4590</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49595%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49594-vulnerability-in-linux-linux-be458c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49594%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe458c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49593-vulnerability-in-linux-linux-be4588</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49593%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49592-vulnerability-in-linux-linux-be4584</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49592%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49591-vulnerability-in-linux-linux-be4575</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49591%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49590-vulnerability-in-linux-linux-be4558</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49590%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49589-vulnerability-in-linux-linux-be4554</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49589%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49588-vulnerability-in-linux-linux-bdd6dc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49588%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49587-vulnerability-in-linux-linux-be4550</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49587%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49586-vulnerability-in-linux-linux-be454c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49586%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe454c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49585-vulnerability-in-linux-linux-be453d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49585%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe453d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49584-vulnerability-in-linux-linux-be4535</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49584%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49583-vulnerability-in-linux-linux-bdd6cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49583%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49582-vulnerability-in-linux-linux-be452f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49582%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe452f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49581-vulnerability-in-linux-linux-be4529</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49581%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49580-vulnerability-in-linux-linux-be451a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49580%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe451a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49579-vulnerability-in-linux-linux-be4512</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49579%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49578-vulnerability-in-linux-linux-be44f5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49578%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe44f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49577-vulnerability-in-linux-linux-be44f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49577%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49576-vulnerability-in-linux-linux-be44ed</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49576%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe44ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49575-vulnerability-in-linux-linux-be44de</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49575%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49574-vulnerability-in-linux-linux-be44d8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49574%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49573-vulnerability-in-linux-linux-be44d4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49573%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49572-vulnerability-in-linux-linux-be44c1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49572%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49571-vulnerability-in-linux-linux-be44b9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49571%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49570-vulnerability-in-linux-linux-be44b1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49570%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49569-vulnerability-in-linux-linux-be44a9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49569%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49568-vulnerability-in-linux-linux-be4492</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49568%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49567-vulnerability-in-linux-linux-be4490</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49567%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49566-vulnerability-in-linux-linux-be448e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49566%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe448e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49565-vulnerability-in-linux-linux-be4474</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49565%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49564-vulnerability-in-linux-linux-be446c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49564%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe446c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49563-vulnerability-in-linux-linux-aebf96</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49563%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4453-vulnerability-in-linux-linux-bea82f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4453%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9836c4522896dcbea82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49562-vulnerability-in-linux-linux-be4464</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49562%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49561-vulnerability-in-linux-linux-be445c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49561%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe445c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49560-vulnerability-in-linux-linux-be4454</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49560%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49559-vulnerability-in-linux-linux-be444e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49559%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe444e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49558-vulnerability-in-linux-linux-be444a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49558%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe444a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49557-vulnerability-in-linux-linux-be442c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49557%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe442c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49556-vulnerability-in-linux-linux-be4428</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49556%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49555-vulnerability-in-linux-linux-be4424</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49555%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49554-vulnerability-in-linux-linux-be4420</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49554%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49553-vulnerability-in-linux-linux-be441c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49553%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe441c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49552-vulnerability-in-linux-linux-be4418</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49552%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49551-vulnerability-in-linux-linux-be4414</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49551%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49550-vulnerability-in-linux-linux-be4410</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49550%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49549-vulnerability-in-linux-linux-be43ff</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49549%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49548-vulnerability-in-linux-linux-be43f7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49548%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe43f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49547-vulnerability-in-linux-linux-bdd6c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49547%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49546-vulnerability-in-linux-linux-be43de</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49546%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49545-vulnerability-in-linux-linux-be43da</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49545%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49544-vulnerability-in-linux-linux-be43cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49544%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49543-vulnerability-in-linux-linux-be43c9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49543%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49542-vulnerability-in-linux-linux-be43c5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49542%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe43c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49541-vulnerability-in-linux-linux-be43c1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49541%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe43c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49540-vulnerability-in-linux-linux-be43bd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49540%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49539-vulnerability-in-linux-linux-be43b9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49539%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49538-vulnerability-in-linux-linux-be43b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49538%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49537-vulnerability-in-linux-linux-be43b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49537%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49536-vulnerability-in-linux-linux-be4387</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49536%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49535-vulnerability-in-linux-linux-be437f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49535%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe437f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49534-vulnerability-in-linux-linux-be437b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49534%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe437b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49533-vulnerability-in-linux-linux-be4377</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49533%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49532-vulnerability-in-linux-linux-be436a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49532%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe436a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49531-vulnerability-in-linux-linux-be4366</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49531%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49530-vulnerability-in-linux-linux-be4362</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49530%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49529-vulnerability-in-linux-linux-be435e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49529%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe435e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49528-vulnerability-in-linux-linux-be435a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49528%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe435a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49527-vulnerability-in-linux-linux-be4356</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49527%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49526-vulnerability-in-linux-linux-be4332</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49526%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49525-vulnerability-in-linux-linux-be432e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49525%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe432e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49524-vulnerability-in-linux-linux-be432a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49524%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe432a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49523-vulnerability-in-linux-linux-be4326</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49523%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49522-vulnerability-in-linux-linux-be4322</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49522%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49521-vulnerability-in-linux-linux-be5cce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49521%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49520-vulnerability-in-linux-linux-be5cc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49520%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982ec4522896dcbe5cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49519-vulnerability-in-linux-linux-be5cbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49519%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49518-vulnerability-in-linux-linux-be5cba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49518%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49517-vulnerability-in-linux-linux-be5cad</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49517%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49516-vulnerability-in-linux-linux-be5c91</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49516%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49515-vulnerability-in-linux-linux-be5c8d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49515%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49514-vulnerability-in-linux-linux-be5c89</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49514%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49513-vulnerability-in-linux-linux-be5c83</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49513%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49512-vulnerability-in-linux-linux-be5c7f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49512%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49511-vulnerability-in-linux-linux-be5c7b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49511%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49510-vulnerability-in-linux-linux-be5c77</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49510%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49509-vulnerability-in-linux-linux-be5c73</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49509%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49508-vulnerability-in-linux-linux-be5c6f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49508%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49507-vulnerability-in-linux-linux-be5c6b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49507%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49506-vulnerability-in-linux-linux-be5c58</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49506%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49505-vulnerability-in-linux-linux-bdd6c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49505%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49504-vulnerability-in-linux-linux-be5c54</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49504%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49503-vulnerability-in-linux-linux-be5c50</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49503%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49502-vulnerability-in-linux-linux-be5c4c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49502%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49501-vulnerability-in-linux-linux-be5c48</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49501%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49500-vulnerability-in-linux-linux-be5c44</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49500%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49499-vulnerability-in-linux-linux-be5c37</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49499%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49498-vulnerability-in-linux-linux-be5c26</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49498%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49497-vulnerability-in-linux-linux-be5c1e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49497%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49496-vulnerability-in-linux-linux-be5c18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49496%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49495-vulnerability-in-linux-linux-be5c03</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49495%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49494-vulnerability-in-linux-linux-be5bff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49494%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49493-vulnerability-in-linux-linux-be5bfb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49493%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49492-vulnerability-in-linux-linux-be5bf7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49492%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49491-vulnerability-in-linux-linux-be5bf3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49491%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49490-vulnerability-in-linux-linux-be5bef</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49490%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49489-vulnerability-in-linux-linux-be5beb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49489%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49488-vulnerability-in-linux-linux-be5be7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49488%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49487-vulnerability-in-linux-linux-be5bd8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49487%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49486-vulnerability-in-linux-linux-be5bd0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49486%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49485-vulnerability-in-linux-linux-be5bb2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49485%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49484-vulnerability-in-linux-linux-be5bac</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49484%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49483-vulnerability-in-linux-linux-be5ba8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49483%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49482-vulnerability-in-linux-linux-be5ba4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49482%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49481-vulnerability-in-linux-linux-be5b9e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49481%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49480-vulnerability-in-linux-linux-be5b9a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49480%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49479-vulnerability-in-linux-linux-be5b94</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49479%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49478-vulnerability-in-linux-linux-be5b90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49478%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49477-vulnerability-in-linux-linux-be5b8c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49477%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49476-vulnerability-in-linux-linux-be5b7b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49476%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49475-vulnerability-in-linux-linux-be5b62</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49475%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49474-vulnerability-in-linux-linux-bdd6b7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49474%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49473-vulnerability-in-linux-linux-be5b5a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49473%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49472-vulnerability-in-linux-linux-be5b4b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49472%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49471-vulnerability-in-linux-linux-be5b43</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49471%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49470-vulnerability-in-linux-linux-be5b3b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49470%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49469-vulnerability-in-linux-linux-be5b2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49469%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49468-vulnerability-in-linux-linux-be5b24</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49468%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49467-vulnerability-in-linux-linux-be5b1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49467%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49466-vulnerability-in-linux-linux-be5b14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49466%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49465-vulnerability-in-linux-linux-aebf94</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49465%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49464-vulnerability-in-linux-linux-be5b0c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49464%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49463-vulnerability-in-linux-linux-be5ae1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49463%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49462-vulnerability-in-linux-linux-be5ad9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49462%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49461-vulnerability-in-linux-linux-be5ad1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49461%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49460-vulnerability-in-linux-linux-be5ac9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49460%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49459-vulnerability-in-linux-linux-be5ac1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49459%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49458-vulnerability-in-linux-linux-be5abb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49458%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49457-vulnerability-in-linux-linux-be5aac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49457%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49456-vulnerability-in-linux-linux-be5aa4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49456%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49455-vulnerability-in-linux-linux-be5a9c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49455%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49454-vulnerability-in-linux-linux-be5a94</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49454%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49453-vulnerability-in-linux-linux-be5a76</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49453%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49452-vulnerability-in-linux-linux-be5a72</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49452%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49451-vulnerability-in-linux-linux-be5a6e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49451%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49450-vulnerability-in-linux-linux-be5a68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49450%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49449-vulnerability-in-linux-linux-be5a64</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49449%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49448-vulnerability-in-linux-linux-be5a57</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49448%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49447-vulnerability-in-linux-linux-be5a53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49447%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49446-vulnerability-in-linux-linux-be5a4f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49446%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49445-vulnerability-in-linux-linux-be5a4b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49445%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49444-vulnerability-in-linux-linux-bdd6a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49444%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49443-vulnerability-in-linux-linux-be5a47</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49443%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49442-vulnerability-in-linux-linux-be5a32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49442%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49441-vulnerability-in-linux-linux-bdd693</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49441%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49440-vulnerability-in-linux-linux-be5a2e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49440%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49439-vulnerability-in-linux-linux-be5a2a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49439%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49438-vulnerability-in-linux-linux-be5a26</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49438%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49437-vulnerability-in-linux-linux-be5a22</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49437%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49436-vulnerability-in-linux-linux-be5a1e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49436%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49435-vulnerability-in-linux-linux-be5a1a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49435%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49434-vulnerability-in-linux-linux-be5a09</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49434%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49433-vulnerability-in-linux-linux-be5a01</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49433%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49432-vulnerability-in-linux-linux-be59fb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49432%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe59fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49431-vulnerability-in-linux-linux-be59d9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49431%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe59d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49430-vulnerability-in-linux-linux-be59d1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49430%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe59d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49429-vulnerability-in-linux-linux-be59c9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49429%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe59c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49428-vulnerability-in-linux-linux-be59c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49428%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe59c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49427-vulnerability-in-linux-linux-bdd68f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49427%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49426-vulnerability-in-linux-linux-be59bf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49426%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe59bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49425-vulnerability-in-linux-linux-be59ae</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49425%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe59ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49424-vulnerability-in-linux-linux-bdd68b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49424%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49423-vulnerability-in-linux-linux-be59aa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49423%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe59aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49422-vulnerability-in-linux-linux-be59a6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49422%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe59a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49421-vulnerability-in-linux-linux-be5995</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49421%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49420-vulnerability-in-linux-linux-be598b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49420%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe598b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49419-vulnerability-in-linux-linux-be5972</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49419%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49418-vulnerability-in-linux-linux-be596e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49418%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe596e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49417-vulnerability-in-linux-linux-be5968</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49417%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49416-vulnerability-in-linux-linux-be5964</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49416%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49415-vulnerability-in-linux-linux-be5960</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49415%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49414-vulnerability-in-linux-linux-be594f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49414%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe594f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49413-vulnerability-in-linux-linux-be594b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49413%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe594b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49412-vulnerability-in-linux-linux-be593a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49412%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe593a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49411-vulnerability-in-linux-linux-be5932</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49411%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49410-vulnerability-in-linux-linux-be592a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49410%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe592a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49409-vulnerability-in-linux-linux-bdd687</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49409%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49408-vulnerability-in-linux-linux-be5913</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49408%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49407-vulnerability-in-linux-linux-be590f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49407%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe590f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49406-vulnerability-in-linux-linux-be590b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49406%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe590b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49405-vulnerability-in-linux-linux-be5907</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49405%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49404-vulnerability-in-linux-linux-be5903</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49404%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49403-vulnerability-in-linux-linux-be58ff</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49403%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe58ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49402-vulnerability-in-linux-linux-be58f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49402%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe58f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49401-vulnerability-in-linux-linux-be58e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49401%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe58e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49400-vulnerability-in-linux-linux-bdd683</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49400%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49399-vulnerability-in-linux-linux-be58d9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49399%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe58d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49398-vulnerability-in-linux-linux-bdd681</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49398%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49397-vulnerability-in-linux-linux-be58d1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49397%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe58d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49396-vulnerability-in-linux-linux-be58ba</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49396%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe58ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49395-vulnerability-in-linux-linux-be58b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49395%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe58b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49394-vulnerability-in-linux-linux-bdd672</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49394%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49393-vulnerability-in-linux-linux-be58b0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49393%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe58b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49392-vulnerability-in-linux-linux-be58a3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49392%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe58a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49391-vulnerability-in-linux-linux-be589f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49391%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe589f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49390-vulnerability-in-linux-linux-bdd66a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49390%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49389-vulnerability-in-linux-linux-bdd660</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49389%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49388-vulnerability-in-linux-linux-be589b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49388%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe589b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49387-vulnerability-in-linux-linux-be5897</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49387%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49386-vulnerability-in-linux-linux-be5893</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49386%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49385-vulnerability-in-linux-linux-be588d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49385%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe588d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49384-vulnerability-in-linux-linux-bdd64b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49384%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49383-vulnerability-in-linux-linux-be5889</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49383%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49382-vulnerability-in-linux-linux-be5878</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49382%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49381-vulnerability-in-linux-linux-be5869</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49381%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49380-vulnerability-in-linux-linux-be5861</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49380%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49379-vulnerability-in-linux-linux-be5859</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49379%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49378-vulnerability-in-linux-linux-be5851</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49378%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49377-vulnerability-in-linux-linux-be584b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49377%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe584b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49376-vulnerability-in-linux-linux-be5847</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49376%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49375-vulnerability-in-linux-linux-be5836</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49375%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49374-vulnerability-in-linux-linux-be5832</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49374%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49373-vulnerability-in-linux-linux-be5821</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49373%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49372-vulnerability-in-linux-linux-be5808</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49372%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49371-vulnerability-in-linux-linux-be5800</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49371%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49370-vulnerability-in-linux-linux-be57fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49370%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49369-vulnerability-in-linux-linux-be57f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49369%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49368-vulnerability-in-linux-linux-be57f0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49368%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49367-vulnerability-in-linux-linux-be57e3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49367%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49366-vulnerability-in-linux-linux-be57db</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49366%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49365-vulnerability-in-linux-linux-be57d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49365%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe57d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49364-vulnerability-in-linux-linux-be57d1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49364%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe57d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49363-vulnerability-in-linux-linux-be57c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49363%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe57c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49362-vulnerability-in-linux-linux-be57a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49362%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe57a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49361-vulnerability-in-linux-linux-be57a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49361%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49360-vulnerability-in-linux-linux-be5799</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49360%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49359-vulnerability-in-linux-linux-bdd647</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49359%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49358-vulnerability-in-linux-linux-be5795</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49358%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49357-vulnerability-in-linux-linux-be5784</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49357%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49356-vulnerability-in-linux-linux-be577c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49356%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe577c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49354-vulnerability-in-linux-linux-be5776</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49354%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49353-vulnerability-in-linux-linux-be5770</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49353%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49352-vulnerability-in-linux-linux-be575f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49352%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe575f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49351-vulnerability-in-linux-linux-be5757</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49351%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49350-vulnerability-in-linux-linux-be573e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49350%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe573e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49349-vulnerability-in-linux-linux-be573a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49349%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe573a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49348-vulnerability-in-linux-linux-be5729</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49348%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49347-vulnerability-in-linux-linux-be5721</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49347%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49346-vulnerability-in-linux-linux-be571d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49346%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe571d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49345-vulnerability-in-linux-linux-be5710</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49345%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49344-vulnerability-in-linux-linux-bdd643</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49344%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49343-vulnerability-in-linux-linux-be570c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49343%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe570c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49342-vulnerability-in-linux-linux-be5708</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49342%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49341-vulnerability-in-linux-linux-be5702</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49341%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49340-vulnerability-in-linux-linux-bdd63f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49340%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49339-vulnerability-in-linux-linux-be56fc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49339%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49338-vulnerability-in-linux-linux-be56eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49338%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe56eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49337-vulnerability-in-linux-linux-be56e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49337%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe56e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49336-vulnerability-in-linux-linux-be56e3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49336%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49335-vulnerability-in-linux-linux-be56df</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49335%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe56df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49334-vulnerability-in-linux-linux-be56db</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49334%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49333-vulnerability-in-linux-linux-bdd63b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49333%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49332-vulnerability-in-linux-linux-be56d7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49332%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49331-vulnerability-in-linux-linux-be56ca</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49331%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49330-vulnerability-in-linux-linux-be56c6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49330%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe56c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49329-vulnerability-in-linux-linux-be56c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49329%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49328-vulnerability-in-linux-linux-be56be</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49328%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe56be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49327-vulnerability-in-linux-linux-be56a9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49327%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49326-vulnerability-in-linux-linux-be5698</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49326%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49325-vulnerability-in-linux-linux-be5690</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49325%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49324-vulnerability-in-linux-linux-be5686</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49324%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49323-vulnerability-in-linux-linux-be567e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49323%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe567e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49322-vulnerability-in-linux-linux-be5676</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49322%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49321-vulnerability-in-linux-linux-be565c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49321%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe565c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49320-vulnerability-in-linux-linux-be5654</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49320%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49319-vulnerability-in-linux-linux-be564c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49319%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe564c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49318-vulnerability-in-linux-linux-be5644</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49318%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49317-vulnerability-in-linux-linux-be5629</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49317%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49316-vulnerability-in-linux-linux-be5623</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49316%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49315-vulnerability-in-linux-linux-be561f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49315%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe561f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49314-vulnerability-in-linux-linux-be5605</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49314%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49313-vulnerability-in-linux-linux-be55fd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49313%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49312-vulnerability-in-linux-linux-be55f5</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49312%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49311-vulnerability-in-linux-linux-be55ed</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49311%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49310-vulnerability-in-linux-linux-be55e5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49310%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49309-vulnerability-in-linux-linux-be55dd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49309%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49308-vulnerability-in-linux-linux-be55d9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49308%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49307-vulnerability-in-linux-linux-be55b5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49307%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49306-vulnerability-in-linux-linux-be55a8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49306%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49305-vulnerability-in-linux-linux-be55a4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49305%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49304-vulnerability-in-linux-linux-be55a0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49304%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49303-vulnerability-in-linux-linux-be559c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49303%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe559c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49302-vulnerability-in-linux-linux-be5598</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49302%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49301-vulnerability-in-linux-linux-be5594</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49301%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49300-vulnerability-in-linux-linux-be5590</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49300%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49299-vulnerability-in-linux-linux-aebf92</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49299%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47660-vulnerability-in-linux-linux-be96b8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47660%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47659-vulnerability-in-linux-linux-aebf5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49298-vulnerability-in-linux-linux-be558c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49298%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe558c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49297-vulnerability-in-linux-linux-be5588</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49297%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49296-vulnerability-in-linux-linux-be5573</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49296%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49295-vulnerability-in-linux-linux-be556f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49295%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe556f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49294-vulnerability-in-linux-linux-be556b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49294%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe556b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47658-vulnerability-in-linux-linux-be96ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49293-vulnerability-in-linux-linux-be5567</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49293%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49292-vulnerability-in-linux-linux-be5563</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49292%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49291-vulnerability-in-linux-linux-be5554</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49291%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49290-vulnerability-in-linux-linux-bdd637</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49290%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49289-vulnerability-in-linux-linux-be554c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49289%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe554c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49288-vulnerability-in-linux-linux-be5548</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49288%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49287-vulnerability-in-linux-linux-be553b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49287%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe553b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49286-vulnerability-in-linux-linux-be5537</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49286%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49285-vulnerability-in-linux-linux-be5522</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49285%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49284-vulnerability-in-linux-linux-be551e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49284%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe551e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49283-vulnerability-in-linux-linux-be551a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49283%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe551a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49282-vulnerability-in-linux-linux-bdd62a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49282%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49281-vulnerability-in-linux-linux-be5516</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49281%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49280-vulnerability-in-linux-linux-be5512</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49280%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49279-vulnerability-in-linux-linux-be550e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49279%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe550e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49278-vulnerability-in-linux-linux-be550a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49278%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe550a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49277-vulnerability-in-linux-linux-be5506</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49277%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49276-vulnerability-in-linux-linux-be5502</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49276%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49275-vulnerability-in-linux-linux-be54fe</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49275%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe54fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49274-vulnerability-in-linux-linux-be54e4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49274%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49273-vulnerability-in-linux-linux-be54e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49273%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49272-vulnerability-in-linux-linux-be54dc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49272%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49271-vulnerability-in-linux-linux-be54d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49271%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe54d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49270-vulnerability-in-linux-linux-be54d2</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49270%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe54d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49269-vulnerability-in-linux-linux-be54ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49269%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49268-vulnerability-in-linux-linux-be54c1</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49268%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49267-vulnerability-in-linux-linux-be54bd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49267%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe54bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49266-vulnerability-in-linux-linux-bdd626</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49266%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49265-vulnerability-in-linux-linux-be54b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49265%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49264-vulnerability-in-linux-linux-be54b5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49264%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe54b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49263-vulnerability-in-linux-linux-be549c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49263%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe549c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49262-vulnerability-in-linux-linux-be5494</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49262%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49261-vulnerability-in-linux-linux-be548c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49261%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe548c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49260-vulnerability-in-linux-linux-be547d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49260%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe547d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49259-vulnerability-in-linux-linux-be546c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49259%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe546c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49258-vulnerability-in-linux-linux-be5466</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49258%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49257-vulnerability-in-linux-linux-be5462</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49257%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49256-vulnerability-in-linux-linux-be545a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49256%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe545a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49255-vulnerability-in-linux-linux-be5452</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49255%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49254-vulnerability-in-linux-linux-be544a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49254%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49253-vulnerability-in-linux-linux-be542a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49253%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe542a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49252-vulnerability-in-linux-linux-be5426</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49252%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49251-vulnerability-in-linux-linux-be5422</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49251%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49250-vulnerability-in-linux-linux-be541e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49250%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe541e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49249-vulnerability-in-linux-linux-be541a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49249%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe541a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49248-vulnerability-in-linux-linux-be5416</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49248%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49247-vulnerability-in-linux-linux-be5412</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49247%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49246-vulnerability-in-linux-linux-be540e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49246%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe540e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49245-vulnerability-in-linux-linux-be540a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49245%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe540a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49244-vulnerability-in-linux-linux-be53f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49244%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49243-vulnerability-in-linux-linux-be53e0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49243%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49242-vulnerability-in-linux-linux-be53d8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49242%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49241-vulnerability-in-linux-linux-be53c9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49241%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49240-vulnerability-in-linux-linux-be53c1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49240%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49239-vulnerability-in-linux-linux-be53b9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49239%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49238-vulnerability-in-linux-linux-be53aa</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49238%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe53aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49237-vulnerability-in-linux-linux-be53a2</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49237%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49236-vulnerability-in-linux-linux-be539a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49236%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe539a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49235-vulnerability-in-linux-linux-be5392</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49235%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49234-vulnerability-in-linux-linux-be538a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49234%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe538a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49233-vulnerability-in-linux-linux-be5377</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49233%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49232-vulnerability-in-linux-linux-be536a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49232%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe536a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49231-vulnerability-in-linux-linux-be535d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49231%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe535d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49230-vulnerability-in-linux-linux-be5355</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49230%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49229-vulnerability-in-linux-linux-be534d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49229%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe534d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49228-vulnerability-in-linux-linux-be5343</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49228%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49227-vulnerability-in-linux-linux-be533d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49227%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe533d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49226-vulnerability-in-linux-linux-be5339</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49226%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49225-vulnerability-in-linux-linux-be5331</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49225%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49224-vulnerability-in-linux-linux-be532d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49224%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe532d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49223-vulnerability-in-linux-linux-be5309</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49223%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49222-vulnerability-in-linux-linux-be5303</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49222%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49221-vulnerability-in-linux-linux-bdd622</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49221%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49220-vulnerability-in-linux-linux-be52f4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49220%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe52f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49219-vulnerability-in-linux-linux-be52ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49219%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe52ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49218-vulnerability-in-linux-linux-be52e4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49218%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe52e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49217-vulnerability-in-linux-linux-be52dc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49217%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe52dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49216-vulnerability-in-linux-linux-be52d4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49216%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe52d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49215-vulnerability-in-linux-linux-be52d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49215%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe52d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49214-vulnerability-in-linux-linux-be52c1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49214%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe52c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49213-vulnerability-in-linux-linux-be52bd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49213%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe52bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49212-vulnerability-in-linux-linux-be529b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49212%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe529b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49211-vulnerability-in-linux-linux-be5293</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49211%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49210-vulnerability-in-linux-linux-be528b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49210%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe528b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49209-vulnerability-in-linux-linux-be5285</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49209%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49208-vulnerability-in-linux-linux-be5281</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49208%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49207-vulnerability-in-linux-linux-be5272</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49207%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49206-vulnerability-in-linux-linux-be526a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49206%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe526a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49205-vulnerability-in-linux-linux-be5262</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49205%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49204-vulnerability-in-linux-linux-be525a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49204%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe525a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49203-vulnerability-in-linux-linux-be5252</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49203%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49202-vulnerability-in-linux-linux-be5229</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49202%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49201-vulnerability-in-linux-linux-be5225</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49201%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49200-vulnerability-in-linux-linux-be5221</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49200%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49199-vulnerability-in-linux-linux-be521d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49199%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe521d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49198-vulnerability-in-linux-linux-be5219</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49198%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49197-vulnerability-in-linux-linux-be5215</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49197%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49196-vulnerability-in-linux-linux-bdd613</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49196%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49195-vulnerability-in-linux-linux-be5211</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49195%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49194-vulnerability-in-linux-linux-be520d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49194%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe520d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49193-vulnerability-in-linux-linux-be5209</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49193%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49192-vulnerability-in-linux-linux-be5205</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49192%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49191-vulnerability-in-linux-linux-be51ec</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49191%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49190-vulnerability-in-linux-linux-be51e8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49190%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49189-vulnerability-in-linux-linux-be51e2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49189%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49188-vulnerability-in-linux-linux-be51e0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49188%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49187-vulnerability-in-linux-linux-be51dc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49187%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49186-vulnerability-in-linux-linux-be51cf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49186%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe51cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49185-vulnerability-in-linux-linux-be51be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49185%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49184-vulnerability-in-linux-linux-be51b6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49184%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49183-vulnerability-in-linux-linux-bdd5f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49183%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49182-vulnerability-in-linux-linux-be51ae</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49182%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe51ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49180-vulnerability-in-linux-linux-be51a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49180%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49179-vulnerability-in-linux-linux-be5180</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49179%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49178-vulnerability-in-linux-linux-be517a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49178%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe517a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49177-vulnerability-in-linux-linux-aeb031</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49177%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49176-vulnerability-in-linux-linux-be5176</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49176%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49175-vulnerability-in-linux-linux-be516e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49175%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe516e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49174-vulnerability-in-linux-linux-be5166</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49174%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49173-vulnerability-in-linux-linux-be5157</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49173%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49172-vulnerability-in-linux-linux-be514f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49172%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe514f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49171-vulnerability-in-linux-linux-be5147</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49171%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49170-vulnerability-in-linux-linux-be5138</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49170%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49169-vulnerability-in-linux-linux-be5132</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49169%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49168-vulnerability-in-linux-linux-be511f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49168%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49167-vulnerability-in-linux-linux-be5117</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49167%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49166-vulnerability-in-linux-linux-be5111</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49166%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49165-vulnerability-in-linux-linux-be510d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49165%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe510d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49164-vulnerability-in-linux-linux-be5105</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49164%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49163-vulnerability-in-linux-linux-be50f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49163%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe50f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49162-vulnerability-in-linux-linux-be50e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49162%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe50e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49161-vulnerability-in-linux-linux-be50dd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49161%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe50dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49160-vulnerability-in-linux-linux-be50d5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49160%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe50d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49159-vulnerability-in-linux-linux-be50cd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49159%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe50cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49158-vulnerability-in-linux-linux-be50b8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49158%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe50b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49157-vulnerability-in-linux-linux-be50a7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49157%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe50a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49156-vulnerability-in-linux-linux-be509f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49156%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49155-vulnerability-in-linux-linux-be5097</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49155%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49154-vulnerability-in-linux-linux-be508f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49154%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49153-vulnerability-in-linux-linux-be5087</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49153%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49152-vulnerability-in-linux-linux-be506d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe506d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49151-vulnerability-in-linux-linux-be5065</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49151%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49150-vulnerability-in-linux-linux-be505d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49150%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe505d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49149-vulnerability-in-linux-linux-be5055</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49148-vulnerability-in-linux-linux-be5040</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49148%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49147-vulnerability-in-linux-linux-be503a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49147%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe503a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49146-vulnerability-in-linux-linux-be5036</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49145-vulnerability-in-linux-linux-be5032</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49144-vulnerability-in-linux-linux-be502e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe502e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49142-vulnerability-in-linux-linux-bdd5f0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49142%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49141-vulnerability-in-linux-linux-be501d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe501d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49139-vulnerability-in-linux-linux-be5015</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49139%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49138-vulnerability-in-linux-linux-be5004</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49138%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49137-vulnerability-in-linux-linux-be4ffc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49137%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe4ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49136-vulnerability-in-linux-linux-be4ff6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49136%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe4ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49135-vulnerability-in-linux-linux-be4fd8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49135%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe4fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49134-vulnerability-in-linux-linux-be4fd2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49134%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe4fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49133-vulnerability-in-linux-linux-be4fce</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49133%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe4fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49132-vulnerability-in-linux-linux-be4fca</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49132%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe4fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49131-vulnerability-in-linux-linux-be4fc6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49131%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49130-vulnerability-in-linux-linux-be4fc2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49130%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49129-vulnerability-in-linux-linux-be4fbe</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49129%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49128-vulnerability-in-linux-linux-be4fba</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49128%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49127-vulnerability-in-linux-linux-be4fb6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49127%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49126-vulnerability-in-linux-linux-be4fb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49126%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49125-vulnerability-in-linux-linux-be4f9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49125%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49124-vulnerability-in-linux-linux-be4f99</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49124%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49123-vulnerability-in-linux-linux-be4f97</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49123%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49122-vulnerability-in-linux-linux-be4f88</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49122%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49121-vulnerability-in-linux-linux-be4f80</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49121%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49120-vulnerability-in-linux-linux-be4f71</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49120%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49119-vulnerability-in-linux-linux-be4f67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49119%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49118-vulnerability-in-linux-linux-be4f5f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49118%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49117-vulnerability-in-linux-linux-be4f57</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49117%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49116-vulnerability-in-linux-linux-be4f4f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49116%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49115-vulnerability-in-linux-linux-be4f2f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49115%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49114-vulnerability-in-linux-linux-aebf90</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49113-vulnerability-in-linux-linux-be6bb5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49113%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49112-vulnerability-in-linux-linux-be6bb1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49112%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49111-vulnerability-in-linux-linux-be6b92</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49111%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49110-vulnerability-in-linux-linux-be6b8e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49110%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49109-vulnerability-in-linux-linux-be6b81</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49109%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49108-vulnerability-in-linux-linux-be6b7d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49108%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49107-vulnerability-in-linux-linux-be6b79</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49107%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49106-vulnerability-in-linux-linux-be6b75</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49106%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49105-vulnerability-in-linux-linux-be6b66</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49105%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49104-vulnerability-in-linux-linux-be6b60</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49104%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49103-vulnerability-in-linux-linux-be6b5a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49103%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49102-vulnerability-in-linux-linux-be6b54</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49102%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49100-vulnerability-in-linux-linux-be6b30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49099-vulnerability-in-linux-linux-be6b2c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49098-vulnerability-in-linux-linux-bdd5e8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49097-vulnerability-in-linux-linux-be6b28</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49096-vulnerability-in-linux-linux-be6b24</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49095-vulnerability-in-linux-linux-be6b20</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49094-vulnerability-in-linux-linux-be6b1c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49093-vulnerability-in-linux-linux-be6b18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49092-vulnerability-in-linux-linux-be6b14</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49091-vulnerability-in-linux-linux-be6b10</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49090-vulnerability-in-linux-linux-be6b0c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49089-vulnerability-in-linux-linux-bdd5e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49088-vulnerability-in-linux-linux-be6af2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49087-vulnerability-in-linux-linux-be6aec</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49086-vulnerability-in-linux-linux-be6ae8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49085-vulnerability-in-linux-linux-be6ae4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49084-vulnerability-in-linux-linux-be6ae0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49083-vulnerability-in-linux-linux-be6adc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49082-vulnerability-in-linux-linux-be6ad8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49081-vulnerability-in-linux-linux-be6ad4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49080-vulnerability-in-linux-linux-be6ad0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49079-vulnerability-in-linux-linux-be6acc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49078-vulnerability-in-linux-linux-be6aa6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49077-vulnerability-in-linux-linux-be6a9e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982fc4522896dcbe6a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49076-vulnerability-in-linux-linux-bdd5dc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49075-vulnerability-in-linux-linux-be6a9a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49074-vulnerability-in-linux-linux-be6a96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49073-vulnerability-in-linux-linux-be6a87</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49072-vulnerability-in-linux-linux-be6a81</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49071-vulnerability-in-linux-linux-be6a7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49070-vulnerability-in-linux-linux-be6a77</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49069-vulnerability-in-linux-linux-be6a68</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49068-vulnerability-in-linux-linux-bdd5cf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49067-vulnerability-in-linux-linux-be6a64</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49066-vulnerability-in-linux-linux-be6a47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49065-vulnerability-in-linux-linux-be6a43</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49064-vulnerability-in-linux-linux-be6a3f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49063-vulnerability-in-linux-linux-be6a3b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49062-vulnerability-in-linux-linux-be6a37</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49061-vulnerability-in-linux-linux-be6a2a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49060-vulnerability-in-linux-linux-be6a22</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49059-vulnerability-in-linux-linux-be6a1a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49058-vulnerability-in-linux-linux-be6a14</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49057-vulnerability-in-linux-linux-be6a10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49056-aeb0f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49056&amp;severity=low&amp;id=682cd0f71484d88663aeb0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49055-vulnerability-in-linux-linux-aebf8e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49054-vulnerability-in-linux-linux-be69ec</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe69ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49053-vulnerability-in-linux-linux-aebf8c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49052-vulnerability-in-linux-linux-be69e8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe69e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49051-vulnerability-in-linux-linux-be69e4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe69e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49050-vulnerability-in-linux-linux-be69e0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49050%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe69e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49049-vulnerability-in-linux-linux-be69cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe69cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49048-vulnerability-in-linux-linux-bdd5c9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49047-vulnerability-in-linux-linux-be69c7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe69c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49046-vulnerability-in-linux-linux-bdd5c5</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49044-vulnerability-in-linux-linux-be69bf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe69bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47657-vulnerability-in-linux-linux-bde1bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47656-vulnerability-in-linux-linux-be96a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe96a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47655-vulnerability-in-linux-linux-be96a3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47654-vulnerability-in-linux-linux-be969f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe969f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47653-vulnerability-in-linux-linux-be969b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe969b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47652-vulnerability-in-linux-linux-be9695</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47651-vulnerability-in-linux-linux-be968f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47651%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe968f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47650-vulnerability-in-linux-linux-be967a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47650%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe967a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47649-vulnerability-in-linux-linux-be9674</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47648-vulnerability-in-linux-linux-be966e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe966e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47647-vulnerability-in-linux-linux-be966a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe966a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47646-vulnerability-in-linux-linux-be965d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe965d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47645-vulnerability-in-linux-linux-be9659</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47644-vulnerability-in-linux-linux-be9655</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47643-vulnerability-in-linux-linux-be9648</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47642-vulnerability-in-linux-linux-be9644</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47641-vulnerability-in-linux-linux-be9640</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47640-vulnerability-in-linux-linux-bde19c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47639-vulnerability-in-linux-linux-be962d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe962d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47638-vulnerability-in-linux-linux-be9629</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47637-vulnerability-in-linux-linux-be9625</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47636-vulnerability-in-linux-linux-be9621</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47635-vulnerability-in-linux-linux-be961d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe961d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47634-vulnerability-in-linux-linux-bde194</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47633-vulnerability-in-linux-linux-aebf5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47633%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47632-vulnerability-in-linux-linux-be9619</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47631-vulnerability-in-linux-linux-be9615</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-26-2c9cf9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-26&amp;severity=medium&amp;id=682c7dbde8347ec82d2c9cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-26-f12df0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27239-cwe-416-use-after-free-in-zoom-comm-e9c4a7c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27239%3A%20CWE-416%20Use%20After%20Free%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps%20and%20SDKs&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26601-use-after-free-aeba63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26601%3A%20Use%20After%20Free&amp;severity=high&amp;id=682cd0f91484d88663aeba63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26600-use-after-free-aeba61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26600%3A%20Use%20After%20Free&amp;severity=high&amp;id=682cd0f91484d88663aeba61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26599-access-of-uninitialized-pointer-aecc07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26599%3A%20Access%20of%20Uninitialized%20Pointer&amp;severity=high&amp;id=682cd0fc1484d88663aecc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26598-out-of-bounds-write-aecc05</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26598%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=682cd0fc1484d88663aecc05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26597-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-aecc03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26597%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer&amp;severity=high&amp;id=682cd0fc1484d88663aecc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26596-out-of-bounds-write-aecbf6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26596%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=682cd0fc1484d88663aecbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26595-stack-based-buffer-overflow-aecbf4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26595%3A%20Stack-based%20Buffer%20Overflow&amp;severity=high&amp;id=682cd0fc1484d88663aecbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26594-use-after-free-aecbf2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26594%3A%20Use%20After%20Free&amp;severity=high&amp;id=682cd0fc1484d88663aecbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26995-missing-authorization-in-anton-vany-0fe26bce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26995%3A%20Missing%20Authorization%20in%20Anton%20Vanyukov%20Market%20Exporter&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26993-improper-neutralization-of-input-du-ad1f20ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26993%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vito%20Peleg%20Atarim&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26991-improper-neutralization-of-input-du-c9f783ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ollybach%20WPPizza&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deecd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26983-missing-authorization-in-wpzoom-rec-0e08d5c9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26983%3A%20Missing%20Authorization%20in%20WPZOOM%20Recipe%20Card%20Blocks%20for%20Gutenberg%20%26%20Elementor&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26981-improper-neutralization-of-input-du-8e01af06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26981%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20accessiBe%20Web%20Accessibility%20By%20accessiBe&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deecced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26980-improper-neutralization-of-input-du-b30ccf1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wired%20Impact%20Wired%20Impact%20Volunteer%20Management&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26979-improper-control-of-filename-for-in-f84ead65</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26979%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Aman%20Funnel%20Builder%20by%20FunnelKit&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26977-authorization-bypass-through-user-c-3b6d8991</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26977%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Ninja%20Team%20Filebird&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26975-missing-authorization-in-wp-chill-s-56c34ae4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26975%3A%20Missing%20Authorization%20in%20WP%20Chill%20Strong%20Testimonials&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26974-improper-neutralization-of-special--143a01f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26974%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPExperts.io%20WP%20Multistore%20Locator&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26971-improper-neutralization-of-special--7c095a3d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26971%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26965-authorization-bypass-through-user-c-d415dc05</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26965%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ameliabooking%20Amelia&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26964-improper-control-of-filename-for-in-6b2b1553</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26964%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26962-improper-neutralization-of-input-du-579ea141</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Easy%20Contact%20Form%20Lite&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26960-missing-authorization-in-enituretec-35b20d19</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26960%3A%20Missing%20Authorization%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26957-improper-control-of-filename-for-in-023ca19b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26957%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Deetronix%20Affiliate%20Coupons&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26952-improper-neutralization-of-input-du-cd25925d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Business%20Card%20Block&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26949-improper-neutralization-of-input-du-56c645de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Team%20Section%20Block&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26947-improper-neutralization-of-input-du-8e7697ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Services%20Section%20block&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26946-improper-neutralization-of-special--32448643</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26946%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jgwhite33%20WP%20Yelp%20Review%20Slider&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26945-improper-neutralization-of-input-du-408d9307</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26945%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Info%20Cards&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26943-improper-neutralization-of-special--f6372142</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20J%C3%BCrgen%20M%C3%BCller%20Easy%20Quotes&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26939-improper-neutralization-of-input-du-63158c13</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Counters%20Block&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26938-improper-neutralization-of-input-du-cf4be813</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Countdown%20Timer&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26937-improper-neutralization-of-input-du-a969e2c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26937%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Icon%20List%20Block&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26935-path-traversal-in-wpjobportal-wp-jo-3b3679e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26935%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26932-improper-control-of-filename-for-in-d47ba9f8</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26932%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20QuantumCloud%20ChatBot&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26931-cross-site-request-forgery-csrf-in--16ff186f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26931%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tribulant%20Software%20Tribulant%20Gallery%20Voting&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26928-missing-authorization-in-xfinitysof-e6218407</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26928%3A%20Missing%20Authorization%20in%20Xfinitysoft%20Order%20Limit%20for%20WooCommerce&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26926-cross-site-request-forgery-csrf-in--28017976</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26926%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fs-code%20Booknetic&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26915-improper-neutralization-of-special--9b852ed5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26915%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PickPlugins%20Wishlist&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26913-improper-neutralization-of-input-du-656e9b87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26913%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webandprint%20AR%20For%20WordPress&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26912-improper-neutralization-of-input-du-08d6f619</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26911-exposure-of-sensitive-system-inform-bbf03953</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26911%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Bowo%20System%20Dashboard&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26907-improper-neutralization-of-input-du-202d1cc7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Estatik%20Mortgage%20Calculator%20Estatik&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26904-improper-neutralization-of-input-du-4ffd59cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gal_op%20WP%20Responsive%20Auto%20Fit%20Text&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26900-deserialization-of-untrusted-data-i-f00c8fff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26900%3A%20Deserialization%20of%20Untrusted%20Data%20in%20flexmls%20Flexmls%C2%AE%20IDX&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26897-improper-neutralization-of-input-du-b3d0cb9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26897%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Baden%20List%20Related%20Attachments&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26896-improper-neutralization-of-input-du-94cf23b1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26896%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vpiwigo%20PiwigoPress&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26893-improper-neutralization-of-input-du-bd979f0e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26893%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kiran%20Potphode%20Easy%20Charts&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26891-improper-neutralization-of-input-du-afcd9d0b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VW%20THEMES%20Ibtana&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26887-improper-neutralization-of-input-du-26a40ab3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eli%20EZ%20SQL%20Reports%20Shortcode%20Widget%20and%20DB%20Backup&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26884-improper-neutralization-of-input-du-b4e09bd9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26882-improper-neutralization-of-input-du-ac92bdaf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Popup%20Builder&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26881-improper-neutralization-of-input-du-e679ece9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26881%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Sticky%20Content&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26878-improper-neutralization-of-input-du-f0ea2324</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20patternsinthecloud%20Autoship%20Cloud%20for%20WooCommerce%20Subscription%20Products&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26877-cwe-79-improper-neutralization-of-i-f1135102</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26877%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rustaurius%20Front%20End%20Users&amp;severity=null&amp;id=68ae0f66ad5a09ad005b18d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26876-cwe-35-path-traversal-in-codemanas--7d838297</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26876%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20CodeManas%20Search%20with%20Typesense&amp;severity=null&amp;id=68ae0f66ad5a09ad005b18cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26871-missing-authorization-in-wpdevelope-0c4874c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26871%3A%20Missing%20Authorization%20in%20WPDeveloper%20Essential%20Blocks%20for%20Gutenberg&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deeca01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26868-improper-neutralization-of-input-du-f6ab933c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26868%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fastflow%20Fast%20Flow&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26753-improper-limitation-of-a-pathname-t-1d40d75d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26753%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20videowhisper%20Broadcast%20Live%20Video&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26752-improper-limitation-of-a-pathname-t-66a4779e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26752%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20videowhisper%20Broadcast%20Live%20Video&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26751-improper-neutralization-of-input-du-b951f857</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26751%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fahad%20Mahmood%20Alphabetic%20Pagination&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54444-improper-neutralization-of-input-du-23ee484d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54444%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27000-missing-authorization-in-george-pat-e2cc7a72</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27000%3A%20Missing%20Authorization%20in%20George%20Pattichis%20Simple%20Photo%20Feed&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26987-improper-neutralization-of-input-du-df715736</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shabti%20Kaplan%20Frontend%20Admin%20by%20DynamiApps&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1262-cwe-804-guessable-captcha-in-webfact-ff452271</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1262%3A%20CWE-804%20Guessable%20CAPTCHA%20in%20webfactory%20Advanced%20Google%20reCAPTCHA&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13695-cwe-918-server-side-request-forgery-083bd005</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13695%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kriesi%20Enfold%20-%20Responsive%20Multi-Purpose%20Theme&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a019d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13693-cwe-284-improper-access-control-in--84b2aec0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13693%3A%20CWE-284%20Improper%20Access%20Control%20in%20Kriesi%20Enfold%20-%20Responsive%20Multi-Purpose%20Theme&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a0192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13494-cwe-352-cross-site-request-forgery--24935456</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13494%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nickboss%20Iptanus%20File%20Upload&amp;severity=medium&amp;id=699f6e5bb7ef31ef0b59ed68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1063-cwe-200-exposure-of-sensitive-inform-ec380da6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1063%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20AI-Powered%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=699f6b0db7ef31ef0b54d971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1128-cwe-434-unrestricted-upload-of-file--53140187</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1128%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%2C%20Quiz%2C%20Survey%20%26%20Custom%20Form%20Builder&amp;severity=critical&amp;id=699f6b0eb7ef31ef0b54da4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1648-cwe-89-improper-neutralization-of-sp-bdf29de5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1648%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20yawaveadmin%20Yawave&amp;severity=high&amp;id=699f6b16b7ef31ef0b54df80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-25-2c8141</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-25&amp;severity=medium&amp;id=682c7dbde8347ec82d2c8141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-25-f1287f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f1287f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22495-cwe-78-improper-neutralization-of-s-af752dfd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22495%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Eaton%20Network%20M2&amp;severity=high&amp;id=68ad8d4dad5a09ad005730d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27357-cross-site-request-forgery-csrf-in--de1e87a7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27357%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Musa%20AVCI%20%C3%96nceki%20Yaz%C4%B1%20Link&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27356-missing-authorization-in-hardik-sti-b27fef93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27356%3A%20Missing%20Authorization%20in%20Hardik%20Sticky%20Header%20On%20Scroll&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27355-cross-site-request-forgery-csrf-in--e5754f2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27355%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nicolas%20GRILLET%20Woocommerce%20%E2%80%93%20Loi%20Hamon&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27353-cross-site-request-forgery-csrf-in--4b8189e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27353%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bob%20Namaste!%20LMS&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27352-improper-neutralization-of-input-du-ef2b9bc7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27351-improper-neutralization-of-input-du-36a94c99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ExpertBusinessSearch%20Local%20Search%20SEO%20Contact%20Page&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27349-cwe-79-improper-neutralization-of-i-a77ec3d8</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nurelm%20Get%20Posts&amp;severity=null&amp;id=688301e5ad5a09ad004d878c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27348-improper-neutralization-of-input-du-4fed8351</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27348%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20WP%20Social%20SEO%20Booster%20%E2%80%93%20Knowledge%20Graph%20Social%20Signals%20SEO&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27347-improper-neutralization-of-input-du-1d3475e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techmix%20Direct%20Checkout%20Button%20for%20WooCommerce&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27344-cross-site-request-forgery-csrf-in--8d99af7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20filipstepanov%20Phee&apos;s%20LinkPreview&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27342-cross-site-request-forgery-csrf-in--24cbe05e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20josesan%20WooCommerce%20Recargo%20de%20Equivalencia&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27341-improper-neutralization-of-input-du-9ac99b68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20afzal_du%20Reactive%20Mortgage%20Calculator&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27340-cross-site-request-forgery-csrf-in--44616bff</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27340%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Forge12%20Interactive%20GmbH%20F12-Profiler&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27339-cross-site-request-forgery-csrf-in--3f2c321b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27339%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Will%20Anderson%20Minimum%20Password%20Strength&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27336-cross-site-request-forgery-csrf-in--b4aab369</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27336%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alex%20Prokopenko%20%2F%20JustCoded%20Just%20Variables&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27335-cross-site-request-forgery-csrf-in--970e8d0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27335%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Free%20plug%20in%20by%20SEO%20Roma%20Auto%20Tag%20Links&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27332-cross-site-request-forgery-csrf-in--eb67da9e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27332%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gmnazmul%20Smart%20Maintenance%20%26%20Countdown&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27331-improper-neutralization-of-input-du-193e41cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27331%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20S%C3%A9bastien%20Dumont%20WooCommerce%20Display%20Products%20by%20Tags&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27329-improper-neutralization-of-input-du-8d241961</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27329%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20inlinkz%20EZ%20InLinkz%20linkup&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27328-cross-site-request-forgery-csrf-in--6041ddcd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27328%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20queeez%20WP-PostRatings%20Cheater&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27327-improper-neutralization-of-input-du-fedd6acf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27327%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Winlin%20Live%20Streaming%20Video%20Player%20%E2%80%93%20by%20SRS%20Player&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26883-missing-authorization-in-bplugins-a-7c669b46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26883%3A%20Missing%20Authorization%20in%20bPlugins%20Animated%20Text%20Block&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27325-improper-neutralization-of-input-du-0147e66e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27325%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bruce%20Video.js%20HLS%20Player&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27323-improper-neutralization-of-input-du-fedfded6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jon%20Bishop%20WP%20About%20Author&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27321-cross-site-request-forgery-csrf-in--2740c4c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27321%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Blighty%20Blightly%20Explorer&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27320-improper-neutralization-of-input-du-c2d21f87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27320%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pankaj%20Mondal%20Profile%20Widget%20Ninja&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27318-cross-site-request-forgery-csrf-in--177753ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27318%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ixiter%20Simple%20Google%20Sitemap&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27317-cross-site-request-forgery-csrf-in--94023f25</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27317%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IT-RAYS%20RAYS%20Grid&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27316-cross-site-request-forgery-csrf-in--4dedad36</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27316%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hosting.io%20JPG%2C%20PNG%20Compression%20and%20Optimization&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27315-cross-site-request-forgery-csrf-in--3694382e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27315%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wptom%20All-In-One%20Cufon&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27312-improper-neutralization-of-special--874539db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27312%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jenst%20WP%20Sitemap&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27311-cross-site-request-forgery-csrf-in--b9841ffe</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27311%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20luk3thomas%20Bulk%20Content%20Creator&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27307-improper-neutralization-of-input-du-561f7fb1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oooorgle%20Quotes%20llama&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27305-improper-neutralization-of-input-du-60dd8d53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Achal%20Jain%20Table%20of%20Contents%20Block&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27304-improper-neutralization-of-input-du-7fcff742</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelogger%20Contact%20Form%207%20Star%20Rating%20with%20font%20Awesome&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27303-improper-neutralization-of-input-du-0736b231</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27303%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelogger%20Contact%20Form%207%20Star%20Rating&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27301-deserialization-of-untrusted-data-i-e968ac91</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27301%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Nazmul%20Hasan%20Robin%20NHR%20Options%20Table%20Manager&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27300-deserialization-of-untrusted-data-i-d3492319</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27300%3A%20Deserialization%20of%20Untrusted%20Data%20in%20giuliopanda%20ADFO&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27298-cross-site-request-forgery-csrf-in--66bb4f7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27298%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cmstactics%20WP%20Video%20Posts&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27297-improper-neutralization-of-special--da144653</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27297%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20guelben%20Bravo%20Search%20%26%20Replace&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deecea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27296-missing-authorization-in-revenuefle-d8d30e1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27296%3A%20Missing%20Authorization%20in%20revenueflex%20Auto%20Ad%20Inserter%20%E2%80%93%20Increase%20Google%20Adsense%20and%20Ad%20Manager%20Revenue&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deecea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27294-missing-authorization-in-platcom-wp-ef51e753</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27294%3A%20Missing%20Authorization%20in%20platcom%20WP-Asambleas&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27290-cross-site-request-forgery-csrf-in--72ee9f62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27290%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20seyyed-amir%20Erima%20Zarinpal%20Donate&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27280-improper-neutralization-of-input-du-c3773c53</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27280%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alobaidi%20Archive%20Page&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deecdff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27277-cross-site-request-forgery-csrf-in--9312269c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27277%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tiefpunkt%20Add%20Linked%20Images%20To%20Gallery&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27276-cross-site-request-forgery-csrf-in--d5aef198</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27276%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lizeipe%20Photo%20Gallery%20(%20Responsive%20)&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecde5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27272-improper-control-of-filename-for-in-99895489</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27272%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20vinagecko%20VG%20PostCarousel&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecdd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27266-improper-neutralization-of-input-du-e167dc12</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ignacio%20Perez%20Hover%20Image%20Button&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27265-improper-neutralization-of-input-du-d692dc7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27265%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aaron%20D.%20Campbell%20Google%20Maps%20for%20WordPress&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1488-cwe-601-url-redirection-to-untrusted-4562a768</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1488%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpo365%20WPO365%20%7C%20MICROSOFT%20365%20GRAPH%20MAILER&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52926-vulnerability-in-linux-linux-be6bb9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0690-out-of-bounds-write-aeb06f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0690%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682cd0f71484d88663aeb06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-24-2cb616</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-24&amp;severity=medium&amp;id=682c7dbee8347ec82d2cb616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-24-f12131</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22635-improper-neutralization-of-input-du-fd095d21</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22635%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imithemes%20Eventer&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22633-insertion-of-sensitive-information--6d399710</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22633%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20StellarWP%20Give%20%E2%80%93%20Divi%20Donation%20Modules&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22632-improper-neutralization-of-input-du-334cba9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20totalsoft%20WooCommerce%20Pricing%20%E2%80%93%20Product%20Pricing&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22631-improper-neutralization-of-input-du-d472ef7e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vbout%20Marketing%20Automation&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1578-sql-injection-in-phpgurukul-online-shopping-portal-aeb073</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1578%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682cd0f71484d88663aeb073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13728-cwe-79-improper-neutralization-of-i-a6c7f3b3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13728%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottpaterson%20Accept%20Donations%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a0459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-23-2cc12e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-23&amp;severity=medium&amp;id=682c7dbee8347ec82d2cc12e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-23-f12eac</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26774-improper-neutralization-of-input-du-c1e8a2d4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26774%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rock%20Solid%20Responsive%20Modal%20Builder%20for%20High%20Conversion%20%E2%80%93%20Easy%20Popups&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26764-missing-authorization-in-enituretec-64fcba5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26764%3A%20Missing%20Authorization%20in%20enituretechnology%20Distance%20Based%20Shipping%20Calculator&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26763-deserialization-of-untrusted-data-i-1506e6e0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26763%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MetaSlider%20Responsive%20Slider%20by%20MetaSlider&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26760-improper-control-of-filename-for-in-496b96c5</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26760%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Wow-Company%20Calculator%20Builder&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27012-cross-site-request-forgery-csrf-in--43962413</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27012%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20a1post%20A1POST.BG%20Shipping%20for%20Woo&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26973-improper-neutralization-of-input-du-27958563</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WarfarePlugins%20Social%20Warfare&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26756-improper-neutralization-of-input-du-7ac208b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26756%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grimdonkey%20Magic%20the%20Gathering%20Card%20Tooltips&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26750-missing-authorization-in-appsbd-vit-0757ba09</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26750%3A%20Missing%20Authorization%20in%20appsbd%20Vitepos&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0957-cwe-79-improper-neutralization-of-in-0d767f77</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0957%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20SMTP%20for%20Amazon%20SES%20%E2%80%93%20YaySMTP&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0953-cwe-79-improper-neutralization-of-in-94c0b43f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0953%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20SMTP%20for%20Sendinblue%20%E2%80%93%20YaySMTP&amp;severity=high&amp;id=699f6b6db7ef31ef0b555582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0918-cwe-79-improper-neutralization-of-in-c259b0f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0918%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20SMTP%20for%20SendGrid%20%E2%80%93%20YaySMTP&amp;severity=high&amp;id=699f6b6db7ef31ef0b555565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13869-cwe-434-unrestricted-upload-of-file-c47836d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13869%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpvividplugins%20WPvivid%20%E2%80%94%20Backup%2C%20Migration%20%26%20Staging&amp;severity=high&amp;id=699f6d19b7ef31ef0b56de8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21704-vulnerability-in-linux-linux-be987b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe987b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1361-cwe-285-improper-authorization-in-ip-e6b5ca09</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1361%3A%20CWE-285%20Improper%20Authorization%20in%20ip2location%20IP2Location%20Country%20Blocker&amp;severity=high&amp;id=699f6b11b7ef31ef0b54dc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13564-cwe-79-improper-neutralization-of-i-fb1d9358</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13564%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apollo13themes%20Rife%20Extensions%20%26%20Templates%20for%20Elementor&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12038-cwe-79-improper-neutralization-of-i-0ff50b95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12038%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themekraft%20Post%20Form%20%E2%80%93%20Registration%20Form%20%E2%80%93%20Profile%20Form%20for%20User%20Profiles%20%E2%80%93%20Frontend%20Content%20Forms%20for%20User%20Submissions%20(UGC)&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12467-cwe-79-improper-neutralization-of-i-7ca42bf1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grafreak%20Pago%20por%20Redsys&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13798-cwe-20-improper-input-validation-in-46782ce7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13798%3A%20CWE-20%20Improper%20Input%20Validation%20in%20pickplugins%20Post%20Grid&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13474-cwe-89-improper-neutralization-of-s-0d4f801a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13474%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Purolator%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13899-cwe-502-deserialization-of-untruste-148580cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13899%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20misterpah%20Mambo%20Importer&amp;severity=high&amp;id=699f6d19b7ef31ef0b56df2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1510-cwe-94-improper-control-of-generatio-966a62eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1510%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20keesiemeijer%20Custom%20Post%20Type%20Date%20Archives&amp;severity=high&amp;id=699f6b14b7ef31ef0b54de48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1509-cwe-94-improper-control-of-generatio-8dca1a5a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20versluis%20Show%20Me%20The%20Cookies&amp;severity=high&amp;id=699f6b14b7ef31ef0b54de44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13873-cwe-639-authorization-bypass-throug-fb7c1d50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13873%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22341-cwe-73-external-control-of-file-nam-5a9d4283</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22341%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IBM%20Watson%20Query%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=68e0f3c4b66c7f7acdd3ea1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-22-c415fcfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-22&amp;severity=medium&amp;id=68367c99182aa0cae2321fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-22-761935</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-22&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb761935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-22-f12d8d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1403-cwe-502-deserialization-of-untrusted-3248fa64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1403%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20Qiskit%20SDK&amp;severity=high&amp;id=689a2234ad5a09ad00274f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1546-os-command-injection-in-bdcom-behavi-c7dddd1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1546%3A%20OS%20Command%20Injection%20in%20BDCOM%20Behavior%20Management%20and%20Auditing%20System&amp;severity=medium&amp;id=68ae12eaad5a09ad005b31a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10222-cwe-79-improper-neutralization-of-i-6b9a9325</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10222%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20benbodhi%20SVG%20Support&amp;severity=medium&amp;id=699f6defb7ef31ef0b590fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13846-cwe-89-improper-neutralization-of-s-5637c0bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13846%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20azzaroco%20Indeed%20Ultimate%20Learning%20Pro&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1402-cwe-862-missing-authorization-in-the-8c1dd514</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1402%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Event%20Tickets%20and%20Registration&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13455-cwe-79-improper-neutralization-of-i-f8548149</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13455%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smtm%20igumbi%20Online%20Booking&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13713-cwe-89-improper-neutralization-of-s-afc42801</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13713%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20saadiqbal%20WPExperts%20Square%20For%20GiveWP&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1489-cwe-79-improper-neutralization-of-in-bf0f4d58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marcelismus%20WP-Appbox&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13900-cwe-94-improper-control-of-generati-3ddf0801</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13900%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20satollo%20Head%2C%20Footer%20and%20Post%20Injections&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12452-cwe-79-improper-neutralization-of-i-c4fb09e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oliverfriedmann%20Ziggeo&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13648-cwe-79-improper-neutralization-of-i-d647a886</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13648%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20Maps%20for%20WP&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fdf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13353-cwe-98-improper-control-of-filename-a30907eb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13353%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cyberchimps%20Responsive%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%2C%20Kits%20and%20Elementor%20Templates&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12276-cwe-89-improper-neutralization-of-s-ffd472b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12276%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13461-cwe-79-improper-neutralization-of-i-36819c30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20patternsinthecloud%20Autoship%20Cloud%20for%20WooCommerce%20Subscription%20Products&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1410-cwe-79-improper-neutralization-of-in-6b6e3414</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1410%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apexws%20Pie%20Calendar%20%E2%80%93%20Events%20Calendar%20Made%20Simple&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11260-cwe-89-improper-neutralization-of-s-35bbcfee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11260%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=high&amp;id=699f6e0ab7ef31ef0b5941d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13751-cwe-79-improper-neutralization-of-i-eef9c693</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20labibahmed42%203D%20Photo%20Gallery&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a069c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13537-cwe-209-generation-of-error-message-51927db3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13537%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20ttoomey%20C9%20Blocks&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1406-cwe-79-improper-neutralization-of-in-4bbfbd8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1406%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20s56bouya%20Newpost%20Catch&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1407-cwe-79-improper-neutralization-of-in-b6a67844</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1407%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amothemo%20AMO%20Team%20Showcase&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13672-cwe-79-improper-neutralization-of-i-299e0dc4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minicoursegenerator%20Mini%20Course%20Generator%20%7C%20Embed%20mini-courses%20and%20interactive%20content&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13379-cwe-79-improper-neutralization-of-i-f1f0e10c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ttoomey%20C9%20Admin%20Dashboard&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13818-cwe-532-insertion-of-sensitive-info-46b5d618</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13818%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20genetechproducts%20Pie%20Register%20%E2%80%93%20User%20Registration%2C%20Profiles%20%26%20Content%20Restriction&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13883-cwe-352-cross-site-request-forgery--4adf13b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13883%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20victorfreitas%20WPUpper%20Share%20Buttons&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56defd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13235-cwe-89-improper-neutralization-of-s-7cf26faf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13235%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dotonpaper%20Pinpoint%20Booking%20System%20%E2%80%93%20Version%202&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13388-cwe-79-improper-neutralization-of-i-06e1c99f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tcoder%20TCBD%20Tooltip&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-21-2cba99</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-21&amp;severity=medium&amp;id=682c7dbee8347ec82d2cba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-21-f1318c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f1318c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24893-cwe-95-improper-neutralization-of-d-d0bf6576</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24893%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=6902eea9a7d593c9933c3428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26618-cwe-789-memory-allocation-with-exce-2a12ac8a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26618%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20erlang%20otp&amp;severity=high&amp;id=6909153cc28fd46ded7bacaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0161-cwe-94-improper-control-of-generatio-5b7ce931</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0161%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20IBM%20Security%20Verify%20Access&amp;severity=high&amp;id=689a2234ad5a09ad00274f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1039-cwe-79-improper-neutralization-of-in-bf5c1b80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yonifre%20Lenix%20Leads%20Collector&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0868-cwe-95-improper-neutralization-of-di-4b4f1f36</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0868%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Arc53%20DocsGPT&amp;severity=critical&amp;id=68df90890c40395553ed987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1043-cwe-918-server-side-request-forgery--b67743ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1043%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20awsmin%20Embed%20Any%20Document%20%E2%80%93%20Embed%20PDF%2C%20Word%2C%20PowerPoint%20and%20Excel%20Files&amp;severity=medium&amp;id=699f6b0db7ef31ef0b54d95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1328-cwe-79-improper-neutralization-of-in-adb0434f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1328%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrlegend1235%20Typed%20JS%3A%20A%20typewriter%20style%20animation&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54dbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13792-cwe-94-improper-control-of-generati-ccf07869</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13792%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ex-Themes%20WooCommerce%20Food%20-%20Restaurant%20Menu%20%26%20Food%20ordering&amp;severity=high&amp;id=699f6d15b7ef31ef0b56dc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13802-cwe-79-improper-neutralization-of-i-62a32dad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kwestion505%20Bandsintown%20Events&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13855-cwe-284-improper-access-control-in--990fd127</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13855%3A%20CWE-284%20Improper%20Access%20Control%20in%20nilambar%20Prime%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13476-cwe-89-improper-neutralization-of-s-4621225a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13476%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20GlobalTranz%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13753-cwe-352-cross-site-request-forgery--ed9d1d99</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13753%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webcodingplace%20Ultimate%20Classified%20Listings&amp;severity=high&amp;id=699f6e6db7ef31ef0b5a06b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0866-cwe-89-improper-neutralization-of-sp-95bdd93f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0866%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20torviswesley%20Legoeso%20PDF%20Manager&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13789-cwe-502-deserialization-of-untruste-d39e0b4b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13789%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20matiskiba%20ravpage&amp;severity=critical&amp;id=699f6e6fb7ef31ef0b5a0946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13748-cwe-79-improper-neutralization-of-i-a6540eec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webcodingplace%20Ultimate%20Classified%20Listings&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13849-cwe-79-improper-neutralization-of-i-2d5a8cbd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13849%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dcurasi%20Cookie%20Notice%20Bar&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6432-cwe-79-improper-neutralization-of-in-65285307</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vanderwijk%20Content%20Blocks%20(Custom%20Post%20Widget)&amp;severity=medium&amp;id=699f6c03b7ef31ef0b55ef51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13520-cwe-862-missing-authorization-in-co-e0aae49a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13520%3A%20CWE-862%20Missing%20Authorization%20in%20codemenschen%20Gift%20Cards%20(Gift%20Vouchers%20and%20Packages)%20(WooCommerce%20Supported)&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1483-cwe-862-missing-authorization-in-eni-ea5e7f49</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1483%3A%20CWE-862%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20GlobalTranz%20Edition&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0897-cwe-79-improper-neutralization-of-in-6b90e165</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcalc%20Modal%20Window%20%E2%80%93%20create%20popup%20modal%20window&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1064-cwe-79-improper-neutralization-of-in-1f3e4a59</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xootix%20Login%20%26%20Register%20Customizer%20%E2%80%93%20Popup%20%7C%20Slider%20%7C%20Inline%20%7C%20WooCommerce&amp;severity=medium&amp;id=699f6b0db7ef31ef0b54d992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13888-cwe-601-url-redirection-to-untruste-9f5bbe88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13888%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20amauric%20WPMobile.App&amp;severity=high&amp;id=699f6d19b7ef31ef0b56df05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13155-cwe-79-improper-neutralization-of-i-7e3fc677</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13155%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=699f6e4db7ef31ef0b59c8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13445-cwe-79-improper-neutralization-of-i-2456e32a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1492-cwe-674-uncontrolled-recursion-in-wi-e2b8ec1f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1492%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69c6949d3c064ed76fb5b80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51339-na-1983732f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51339%3A%20n%2Fa&amp;severity=medium&amp;id=690a47446d939959c802221a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51338-na-be0ffb7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51338%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c802201d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51337-na-74476cd5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51337%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8022018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51336-na-926fc4f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51336%3A%20n%2Fa&amp;severity=high&amp;id=690a47436d939959c8022013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51335-na-113ef1ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51335%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c802200e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51334-na-b60b16c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51334%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8022009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51333-na-d15b5f0d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51333%3A%20n%2Fa&amp;severity=high&amp;id=690a47436d939959c8022004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51332-na-c3472c8c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51332%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8021fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51331-na-a9ce7648</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51331%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8021ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51330-na-ddd306f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51330%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8021ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51327-na-db169e1c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51327%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8021ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51326-na-6f181400</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51326%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51325-na-1228f1a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51325%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51324-na-0d2a0534</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51324%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51323-na-88e66d6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51323%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51321-na-1eb971ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51321%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51320-na-565a1d25</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51320%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51319-na-9935cbab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51319%3A%20n%2Fa&amp;severity=high&amp;id=690a47416d939959c8021fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51318-na-a98183af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51318%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51317-na-0105b371</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51317%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51316-na-d6613959</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51316%3A%20n%2Fa&amp;severity=high&amp;id=690a47416d939959c8021fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51315-na-aeb225ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51315%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51314-na-d9f626db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51314%3A%20n%2Fa&amp;severity=high&amp;id=690a47406d939959c8021fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51312-na-021e14ee</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51312%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51311-na-25035e98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51311%3A%20n%2Fa&amp;severity=high&amp;id=690a47406d939959c8021f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51310-na-c596de9a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51310%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51309-na-3665bf95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51309%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51308-na-ac74b357</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51308%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51306-na-f2bd588a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51306%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-20-2cd6ae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-20&amp;severity=medium&amp;id=682c7dbee8347ec82d2cd6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-20-f12f24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12284-cwe-269-improper-privilege-manageme-94179494</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12284%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NetScaler%20Console&amp;severity=high&amp;id=69a0a43a85912abc71d6209c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24989-cwe-284-improper-access-control-in--6f8364a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24989%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Power%20Pages&amp;severity=high&amp;id=68881727ad5a09ad0088bc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21355-cwe-306-missing-authentication-for--38ad52ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21355%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Microsoft%20Bing&amp;severity=high&amp;id=69432f00058703ef3fc98020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0677-out-of-bounds-write-aebe5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0677%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682cd0f91484d88663aebe5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0624-out-of-bounds-write-aeba59</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0624%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=682cd0f91484d88663aeba59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1118-trust-boundary-violation-aebe60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1118%3A%20Trust%20Boundary%20Violation&amp;severity=medium&amp;id=682cd0f91484d88663aebe60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45777-out-of-bounds-write-bda2eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45777%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682d981cc4522896dcbda2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45084-cwe-1236-improper-neutralization-of-5ea079a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45084%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20IBM%20Cognos%20Controller&amp;severity=high&amp;id=68e0f3c5b66c7f7acdd3ea58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13534-cwe-89-improper-neutralization-of-s-aa308fab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13534%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=high&amp;id=699f6e5eb7ef31ef0b59f0f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13533-cwe-89-improper-neutralization-of-s-362f8fdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13533%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20USPS%20Edition&amp;severity=high&amp;id=699f6e5eb7ef31ef0b59f026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13483-cwe-89-improper-neutralization-of-s-806613d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13483%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20SAIA%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13491-cwe-89-improper-neutralization-of-s-1afaa660</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13491%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20For%20Customers%20of%20FedEx&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13481-cwe-89-improper-neutralization-of-s-3e585702</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13481%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20R%2BL%20Carriers%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13485-cwe-89-improper-neutralization-of-s-709ea3ea</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13485%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20ABF%20Freight%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13479-cwe-89-improper-neutralization-of-s-75b5a8b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13479%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20SEFL%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0968-cwe-284-improper-access-control-in-x-777cea85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0968%3A%20CWE-284%20Improper%20Access%20Control%20in%20roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b6eb7ef31ef0b555627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13478-cwe-89-improper-neutralization-of-s-ac210ad9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13478%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20TForce%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0916-cwe-79-improper-neutralization-of-in-44677395</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0916%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20YaySMTP%20and%20Email%20Logs%3A%20Amazon%20SES%2C%20SendGrid%2C%20Outlook%2C%20Mailgun%2C%20Brevo%2C%20Google%20and%20Any%20SMTP%20Service&amp;severity=high&amp;id=699f6b6db7ef31ef0b55555e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1075-cwe-532-insertion-of-sensitive-infor-99aaaa51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1075%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=6915d923f0c8e942cdf2749b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13489-cwe-89-improper-neutralization-of-s-b3c5acd9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13489%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Old%20Dominion%20Edition&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13363-cwe-79-improper-neutralization-of-i-25867bd5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20raptive%20Raptive%20Ads&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13339-cwe-352-cross-site-request-forgery--372d5bfc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13339%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20debounce%20DeBounce%20Email%20Validator&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cb9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13364-cwe-862-missing-authorization-in-ad-38d8122e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13364%3A%20CWE-862%20Missing%20Authorization%20in%20raptive%20Raptive%20Ads&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13336-cwe-352-cross-site-request-forgery--ff1f85f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13336%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20exeebit%20Disable%20Auto%20Updates&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13231-cwe-862-missing-authorization-in-po-122a704a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13231%3A%20CWE-862%20Missing%20Authorization%20in%20portfoliohub%20WordPress%20Portfolio%20Builder%20%E2%80%93%20Portfolio%20Gallery&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13679-cwe-79-improper-neutralization-of-i-2ae45996</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13679%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simply4net%20Widget%20BUY.BOX&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a00a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13405-cwe-352-cross-site-request-forgery--933da71b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13405%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20apptivo%20Apptivo%20Business%20Site&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13592-cwe-98-improper-control-of-filename-7e30bba0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13592%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20labibahmed42%20Team%20Builder%20For%20WPBakery%20Page%20Builder(Formerly%20Visual%20Composer)&amp;severity=high&amp;id=699f6e61b7ef31ef0b59f4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13468-cwe-862-missing-authorization-in-so-825f5e1a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13468%3A%20CWE-862%20Missing%20Authorization%20in%20solwininfotech%20Trash%20Duplicate%20and%20301%20Redirect&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13591-cwe-79-improper-neutralization-of-i-2f3e9256</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20labibahmed42%20Team%20Builder%20For%20WPBakery%20Page%20Builder(Formerly%20Visual%20Composer)&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13736-cwe-79-improper-neutralization-of-i-ed9c07df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pure-chat%20Pure%20Chat%20%E2%80%93%20Live%20Chat%20%26%20More!&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13657-cwe-79-improper-neutralization-of-i-e1d762d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13657%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20store-locator-pro%20Store%20Locator%20Widget&amp;severity=medium&amp;id=699f6e65b7ef31ef0b59fef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13676-cwe-89-improper-neutralization-of-s-82d9458f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13676%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wamasoftware%20Categorized%20Gallery%20Plugin&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a009a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11753-cwe-79-improper-neutralization-of-i-3f302275</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20umichitswebhosting%20UMich%20OIDC%20Login&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11778-cwe-79-improper-neutralization-of-i-3394785e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11778%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20canadahelps%20CanadaHelps%20Embedded%20Donation%20Form&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11335-cwe-79-improper-neutralization-of-i-d8f0a84e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11335%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultradevs%20UltraEmbed%20%E2%80%93%20Advanced%20Iframe%20Plugin%20For%20WordPress%20with%20Gutenberg%20Block%20Included&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13462-cwe-79-improper-neutralization-of-i-85e6091c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nida78%20WP%20Wiki%20Tooltip&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12339-cwe-79-improper-neutralization-of-i-95374b90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12339%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digihood%20Digihood%20HTML%20Sitemap&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13660-cwe-79-improper-neutralization-of-i-e3122d73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13660%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robertmsiaorg%20Responsive%20Flickr%20Slideshow&amp;severity=medium&amp;id=699f6e65b7ef31ef0b59fefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13674-cwe-79-improper-neutralization-of-i-e8c527c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13674%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20berginformatik%20Cosmic%20Blocks%20(40%2B)%20Content%20Editor%20Blocks%20Collection&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13854-cwe-284-improper-access-control-in--5ab916a5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13854%3A%20CWE-284%20Improper%20Access%20Control%20in%20nicheaddons%20Education%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13711-cwe-79-improper-neutralization-of-i-73d885b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20binnyva%20Pollin&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12522-cwe-79-improper-neutralization-of-i-d612acf5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12522%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yayforms%20Yay!%20Forms&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13719-cwe-862-missing-authorization-in-pe-3b9d27c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13719%3A%20CWE-862%20Missing%20Authorization%20in%20peprodev%20PeproDev%20Ultimate%20Invoice&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a0444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13390-cwe-79-improper-neutralization-of-i-aeb14232</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13390%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20giuliopanda%20ADFO%20%E2%80%93%20Custom%20data%20in%20admin%20dashboard&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13712-cwe-89-improper-neutralization-of-s-3c86b5e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13712%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20binnyva%20Pollin&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13589-cwe-79-improper-neutralization-of-i-ae018def</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnnya23%20YouTube%20Playlists%20with%20Schema&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0865-cwe-352-cross-site-request-forgery-c-17bef11e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0865%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20debaat%20WP%20Media%20Category%20Management&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13663-cwe-79-improper-neutralization-of-i-775eea34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markodonnell%20Coaching%20Staffs&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13799-cwe-79-improper-neutralization-of-i-f96d3855</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deepakkite%20File%20Sharing%20%26%20Download%20Manager%20%E2%80%93%20User%20Private%20Files&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dc1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1065-cwe-79-improper-neutralization-of-in-d76253aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1065%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Visualizer%3A%20Tables%20and%20Charts%20Manager%20for%20WordPress&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1441-cwe-352-cross-site-request-forgery-c-6398b326</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1441%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13443-cwe-79-improper-neutralization-of-i-28223baf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13443%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20easypromosapp%20Easypromos%20Plugin&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11582-cwe-79-improper-neutralization-of-i-4c5643c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11582%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wedevs%20Subscribe2%20%E2%80%93%20Form%2C%20Email%20Subscribers%20%26%20Newsletters&amp;severity=high&amp;id=699f6e18b7ef31ef0b595126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51305-na-2ed3944d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51305%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51303-na-a388e5d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51303%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51301-na-3f979335</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51301%3A%20n%2Fa&amp;severity=high&amp;id=690a473e6d939959c8021f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51300-na-c30950f3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51300%3A%20n%2Fa&amp;severity=medium&amp;id=690a473e6d939959c8021f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51299-na-6b52b31e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51299%3A%20n%2Fa&amp;severity=medium&amp;id=690a473e6d939959c8021f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51296-na-a67c8a10</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51296%3A%20n%2Fa&amp;severity=medium&amp;id=690a473e6d939959c8021f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51293-n-a-in-n-a-aeb012</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51293%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeb012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-19-2d18a6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-19&amp;severity=medium&amp;id=682c7dbfe8347ec82d2d18a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-19-f12f45</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-19&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-signals-of-trouble-multiple-russia-aligned-threat-actors-actively-targeting-signal-messenger-f0c53c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Signals%20of%20Trouble%3A%20Multiple%20Russia-Aligned%20Threat%20Actors%20Actively%20Targeting%20Signal%20Messenger&amp;severity=low&amp;id=682acdbebbaf20d303f0c53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13508-cwe-79-improper-neutralization-of-i-905b4551</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20masaakitanaka%20Booking%20Package&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59eec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13743-cwe-79-improper-neutralization-of-i-497f4564</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13743%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wonderplugin%20Wonder%20Video%20Embed&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22663-improper-limitation-of-a-pathname-t-3e71f21c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22663%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22657-missing-authorization-in-vito-peleg-17bc65de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22657%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22656-improper-control-of-filename-for-in-82581ed1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22656%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Oscar%20Alvarez%20Cookie%20Monster&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22654-unrestricted-upload-of-file-with-da-225701dc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22654%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kodeshpa%20Simplified&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22650-improper-neutralization-of-input-du-64135d26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22650%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Erez%20Hadas-Sonnenschein%20Smartarget&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22645-improper-restriction-of-excessive-a-5524bb8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22645%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22639-improper-neutralization-of-special--38f5450a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22639%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Techspawn%20Distance%20Rate%20Shipping%20for%20WooCommerce&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56000-incorrect-privilege-assignment-in-s-e6889e09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56000%3A%20Incorrect%20Privilege%20Assignment%20in%20SeventhQueen%20K%20Elements&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27013-missing-authorization-in-quanticala-bc3e0fb4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27013%3A%20Missing%20Authorization%20in%20QuanticaLabs%20MediCenter%20-%20Health%20Medical%20Clinic&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0622-use-after-free-aebe66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0622%3A%20Use%20After%20Free&amp;severity=medium&amp;id=682cd0f91484d88663aebe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45783-improper-update-of-reference-count-aecc64</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45783%3A%20Improper%20Update%20of%20Reference%20Count&amp;severity=medium&amp;id=682cd0fc1484d88663aecc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45781-out-of-bounds-write-aecc62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45781%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682cd0fc1484d88663aecc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45776-out-of-bounds-write-aecc60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45776%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682cd0fc1484d88663aecc60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45775-unchecked-return-value-aecc53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45775%3A%20Unchecked%20Return%20Value&amp;severity=medium&amp;id=682cd0fc1484d88663aecc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26465-detection-of-error-condition-without-action-aebe62</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26465%3A%20Detection%20of%20Error%20Condition%20Without%20Action&amp;severity=medium&amp;id=682cd0f91484d88663aebe62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45774-out-of-bounds-write-aecc51</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45774%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682cd0fc1484d88663aecc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4028-improper-input-validation-f8203fd3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4028%3A%20Improper%20Input%20Validation&amp;severity=low&amp;id=692013a1ce2640f942c6ad4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21703-vulnerability-in-linux-linux-be9866</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21702-vulnerability-in-linux-linux-be9862</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9834c4522896dcbe9862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13689-cwe-94-improper-control-of-generati-98b2a567</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13689%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20undsgn%20Uncode%20Core&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a017c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1414-vulnerability-in-mozilla-firefox-98ca8b2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1414%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69dd057382d89c981f016fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13691-cwe-20-improper-input-validation-in-967d5f98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13691%3A%20CWE-20%20Improper%20Input%20Validation%20in%20undsgn%20Uncode&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a0186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13667-cwe-79-improper-neutralization-of-i-2dec712e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20undsgn%20Uncode&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13681-cwe-20-improper-input-validation-in-707de67c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13681%3A%20CWE-20%20Improper%20Input%20Validation%20in%20undsgn%20Uncode&amp;severity=high&amp;id=699f6e67b7ef31ef0b5a00ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0521-cwe-79-improper-neutralization-of-in-0958e20f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=high&amp;id=699f6b69b7ef31ef0b555307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13797-cwe-94-improper-control-of-generati-17d6f9b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13797%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PressLayouts%20PressMart%20-%20Modern%20Elementor%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=699f6d16b7ef31ef0b56dc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13369-cwe-89-improper-neutralization-of-s-d0affe59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13369%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20GoodLayers%20Tour%20Master%20-%20Tour%20Booking%2C%20Travel%2C%20Hotel&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13395-cwe-79-improper-neutralization-of-i-ef013590</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13395%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kerryoco%20Threepress&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12860-cwe-620-unverified-password-change--86cc1e2d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12860%3A%20CWE-620%20Unverified%20Password%20Change%20in%20scriptsbundle%20CarSpot%20%E2%80%93%20Dealership%20Wordpress%20Classified%20Theme&amp;severity=critical&amp;id=699f6e4bb7ef31ef0b59c6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13316-cwe-862-missing-authorization-in-ak-8ece6233</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13316%3A%20CWE-862%20Missing%20Authorization%20in%20akashmalik%20Scratch%20%26%20Win%20%E2%80%93%20Giveaways%20and%20Contests.%20Boost%20subscribers%2C%20traffic%2C%20repeat%20visits%2C%20%20referrals%2C%20sales%20and%20more&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13718-cwe-352-cross-site-request-forgery--931073c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13718%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdesk%20Flexible%20Wishlist%20for%20WooCommerce%20%E2%80%93%20Ecommerce%20Wishlist%20%26%20Save%20for%20later&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a0440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13575-cwe-79-improper-neutralization-of-i-5cb87946</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Web%20Stories%20Enhancer%20%E2%80%93%20Level%20Up%20Your%20Web%20Stories&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0864-cwe-79-improper-neutralization-of-in-d26cde5e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0864%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20Active%20Products%20Tables%20for%20WooCommerce.%20Use%20constructor%20to%20create%20tables&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13795-cwe-352-cross-site-request-forgery--3cfa2129</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13795%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ecwid%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart&amp;severity=medium&amp;id=699f6d15b7ef31ef0b56dc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13465-cwe-79-improper-neutralization-of-i-62686dc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13465%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kodezen%20aBlocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20User%20Dashboard%20Builder%2C%20Popup%20Builder%2C%20Form%20Builder%20%26%20Animation%20Builder&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11895-cwe-79-improper-neutralization-of-i-9b7f2e64</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Online%20Payments%20%E2%80%93%20Get%20Paid%20with%20PayPal%2C%20Square%20%26%20Stripe&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13704-cwe-80-improper-neutralization-of-s-86940488</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13704%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20themepoints%20Super%20Testimonial%20%E2%80%93%20Testimonial%20%26%20Customer%20Review%20Slider%20Plugin%20for%20WordPress&amp;severity=high&amp;id=699f6e69b7ef31ef0b5a02fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11376-cwe-79-improper-neutralization-of-i-40acf8c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=medium&amp;id=699f6e10b7ef31ef0b59483c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13523-cwe-352-cross-site-request-forgery--7bd31ed5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13523%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shenyanzhi%20MemorialDay&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13315-cwe-352-cross-site-request-forgery--c99cfe6a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13315%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shopwarden%20Shopwarden%20%E2%80%93%20Automated%20WooCommerce%20monitoring%20%26%20testing&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59ca7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13556-cwe-862-missing-authorization-in-we-ec34cfa4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13556%3A%20CWE-862%20Missing%20Authorization%20in%20wecantrack%20Affiliate%20Links%20%E2%80%93%20Link%20Cloaking%20and%20Management&amp;severity=high&amp;id=699f6e5fb7ef31ef0b59f20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13438-cwe-352-cross-site-request-forgery--d18f8412</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13438%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20speedsize%20SpeedSize%20Image%20%26%20Video%20AI-Optimizer&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13582-cwe-79-improper-neutralization-of-i-4abb9384</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13582%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20labibahmed42%20Simple%20Pricing%20Tables%20For%20WPBakery%20Page%20Builder(Formerly%20Visual%20Composer)&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13609-cwe-200-exposure-of-sensitive-infor-df7d9423</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13609%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%201clickmigration%201%20Click%20Migration%20%26%20Backup%3A%20Free%20WordPress%20Migration%20Plugin%20with%20Zero%20Downtime%20%26%20Easy%20Clone&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13464-cwe-79-improper-neutralization-of-i-977a596f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13464%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photonicgnostic%20Library%20Bookshelves&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13565-cwe-79-improper-neutralization-of-i-9e81b58a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonback2%20Simple%20Map%20No%20Api&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13677-cwe-862-missing-authorization-in-is-cc5b55b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13677%3A%20CWE-862%20Missing%20Authorization%20in%20istmoplugins%20GetBookingsWP%20%E2%80%93%20Appointments%20Booking%20Calendar%20Plugin%20For%20WordPress&amp;severity=high&amp;id=699f6e67b7ef31ef0b5a009e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13555-cwe-352-cross-site-request-forgery--e9cdac46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13555%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%201clickmigration%201%20Click%20Migration%20%26%20Backup%3A%20Free%20WordPress%20Migration%20Plugin%20with%20Zero%20Downtime%20%26%20Easy%20Clone&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13622-cwe-200-exposure-of-sensitive-infor-19137d2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13622%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20imagisol%20File%20Uploads%20Addon%20for%20WooCommerce&amp;severity=high&amp;id=699f6e64b7ef31ef0b59fcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13848-cwe-79-improper-neutralization-of-i-f91419fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13848%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jakob42%20Reaction%20Buttons&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13687-cwe-862-missing-authorization-in-la-cca1c355</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13687%3A%20CWE-862%20Missing%20Authorization%20in%20labibahmed42%20Team%20Builder%20%E2%80%93%20Meet%20the%20Team&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a0178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13573-cwe-79-improper-neutralization-of-i-23571cb7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13573%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softdiscover%20Zigaform%20%E2%80%93%20Form%20Builder%20Lite&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12314-cwe-524-use-of-cache-containing-sen-db9ff696</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12314%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20megaoptim%20Rapid%20Cache&amp;severity=high&amp;id=699f6e36b7ef31ef0b597db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13535-cwe-209-generation-of-error-message-847ccab6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13535%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20marcoingraiti%20Actionwear%20products%20sync&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13576-cwe-79-improper-neutralization-of-i-ca3c3de0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13576%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adityapatadia%20Gumlet%20Video&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13725-cwe-22-improper-limitation-of-a-pat-f2ec91a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13725%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20infusionsoft%20Keap%20Official%20Opt-in%20Forms&amp;severity=critical&amp;id=699f6e6ab7ef31ef0b5a0454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12525-cwe-79-improper-neutralization-of-i-d976dfb5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12525%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homeasap%20Easy%20MLS%20Listings%20Import&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13588-cwe-79-improper-neutralization-of-i-fa0bdb83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kenkwasnicki%20Simplebooklet%20PDF%20Viewer%20and%20Embedder&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13852-cwe-352-cross-site-request-forgery--d1f588d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13852%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20backie%20Option%20Editor&amp;severity=high&amp;id=699f6d19b7ef31ef0b56de6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13577-cwe-79-improper-neutralization-of-i-639472ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catssoft%20CATS%20Job%20Listings&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13540-cwe-209-generation-of-error-message-ae0f52c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13540%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20mdalabar%20WooODT%20Lite%20%E2%80%93%20Delivery%20%26%20pickup%20date%20time%20location%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12813-cwe-79-improper-neutralization-of-i-1a6203d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Open%20Hours%20%E2%80%93%20%20Easy%20Opening%20Hours&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0796-cwe-352-cross-site-request-forgery-c-8bfe695b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0796%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kevin-brent%20WPrequal&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b55539c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13579-cwe-79-improper-neutralization-of-i-a5f13fa7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13579%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20platcom%20WP-Asambleas&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13595-cwe-89-improper-neutralization-of-s-4cb0f229</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13595%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pantherius%20Simple%20Signup%20Form&amp;severity=medium&amp;id=699f6e63b7ef31ef0b59f59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13501-cwe-79-improper-neutralization-of-i-0c995711</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veerwest%20WP-FormAssembly&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13684-cwe-352-cross-site-request-forgery--490bd880</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13684%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shubhamgrover7256%20Reset&amp;severity=high&amp;id=699f6e67b7ef31ef0b5a00b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13578-cwe-79-improper-neutralization-of-i-e9b644db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13578%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zjhzxhz%20WP-BibTeX&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0805-cwe-79-improper-neutralization-of-in-b32afd15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mlcalc%20Mortgage%20Calculator%20%2F%20Loan%20Calculator&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b5553a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13538-cwe-209-generation-of-error-message-55ee76e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13538%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20devsmip%20BigBuy%20Dropshipping%20Connector%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13581-cwe-79-improper-neutralization-of-i-9cb4f0d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13581%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supporthost%20Simple%20Charts&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13587-cwe-79-improper-neutralization-of-i-b45c01d3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softdiscover%20Zigaform%20%E2%80%93%20Price%20Calculator%20%26%20Cost%20Estimation%20Form%20Builder%20Lite&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13522-cwe-352-cross-site-request-forgery--6d7bcb6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13522%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20magayo%20magayo%20Lottery%20Results&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13740-cwe-639-authorization-bypass-throug-957fd7e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13740%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13741-cwe-918-server-side-request-forgery-88ef03e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13741%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57049-na-e23ed985</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57049%3A%20n%2Fa&amp;severity=critical&amp;id=698d69274b57a58fa1db4948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25473-na-46439387</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25473%3A%20n%2Fa&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22921-na-2c7c625f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22921%3A%20n%2Fa&amp;severity=medium&amp;id=69091a4fc28fd46ded81d15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22919-na-67acf0ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22919%3A%20n%2Fa&amp;severity=medium&amp;id=69091a4fc28fd46ded81d157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27113-cwe-476-null-pointer-dereference-in-75a4b032</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27113%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20xmlsoft%20libxml2&amp;severity=low&amp;id=6909153cc28fd46ded7bacb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25475-na-94c1de95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25475%3A%20n%2Fa&amp;severity=high&amp;id=6909153cc28fd46ded7baca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25474-na-e5c68781</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25474%3A%20n%2Fa&amp;severity=medium&amp;id=6909153cc28fd46ded7baca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25472-na-fe5f9d99</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25472%3A%20n%2Fa&amp;severity=medium&amp;id=6909153bc28fd46ded7bac93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57259-cwe-193-off-by-one-error-in-denx-u--9179adaf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57259%3A%20CWE-193%20Off-by-one%20Error%20in%20denx%20U-Boot&amp;severity=high&amp;id=690908557fff0e30cee23980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57258-cwe-190-integer-overflow-or-wraparo-82363f1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57258%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20denx%20U-Boot&amp;severity=high&amp;id=690908557fff0e30cee23979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57257-cwe-674-uncontrolled-recursion-in-d-9f870cf9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57257%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20denx%20U-Boot&amp;severity=low&amp;id=690908557fff0e30cee23973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57256-cwe-190-integer-overflow-or-wraparo-c218a953</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57256%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20denx%20U-Boot&amp;severity=high&amp;id=690908557fff0e30cee2396e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57255-cwe-190-integer-overflow-or-wraparo-d81f6306</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57255%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20denx%20U-Boot&amp;severity=high&amp;id=690908557fff0e30cee23969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57254-cwe-190-integer-overflow-or-wraparo-3c1396fd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57254%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20denx%20U-Boot&amp;severity=high&amp;id=690908557fff0e30cee23964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56171-cwe-416-use-after-free-in-xmlsoft-l-51875da0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56171%3A%20CWE-416%20Use%20After%20Free%20in%20xmlsoft%20libxml2&amp;severity=high&amp;id=690908537fff0e30cee23922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24928-cwe-121-stack-based-buffer-overflow-cce572d2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24928%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20xmlsoft%20libxml2&amp;severity=high&amp;id=68806268ad5a09ad0006f89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-18-a9bf971d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-18&amp;severity=medium&amp;id=68367c98182aa0cae231e1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-18-7503ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-18&amp;severity=medium&amp;id=682c7abce3e6de8ceb7503ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-18-f129a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f129a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13879-cwe-918-server-side-request-forgery-044313e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13879%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20xwp%20Stream&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1391-improper-access-control-2dfb31a1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1391%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=68b36dfcad5a09ad00944d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23845-improper-neutralization-of-input-du-424eb0e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23845%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ERA404%20ImageMeta&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23840-improper-neutralization-of-input-du-ff25b4db</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23840%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webjema%20WP-NOTCAPTCHA&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26778-improper-neutralization-of-input-du-19c2d726</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jordy%20Meow%20Gallery&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26775-improper-neutralization-of-input-du-d5e0be8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26775%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20BEAR&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26773-missing-authorization-in-adnan-anal-e54c98bd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26773%3A%20Missing%20Authorization%20in%20Adnan%20Analytify&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26772-improper-neutralization-of-input-du-a263b15a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26772%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Detheme%20DethemeKit%20For%20Elementor&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26771-improper-neutralization-of-input-du-0649c42a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26770-improper-neutralization-of-input-du-8055292f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Waymark&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26769-improper-neutralization-of-input-du-0c78d7d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26769%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webilia%20Inc.%20Vertex%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26758-exposure-of-sensitive-system-inform-27fe90eb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26758%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20RebelCode%20Spotlight%20Social%20Media%20Feeds&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26754-improper-neutralization-of-input-du-9aab8df4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Timeline%20Block&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec98f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0924-cwe-79-improper-neutralization-of-in-1ce7aa7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20melapress%20WP%20Activity%20Log&amp;severity=high&amp;id=699f6b6db7ef31ef0b55556c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-17-2cf031</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-17&amp;severity=medium&amp;id=682c7dbee8347ec82d2cf031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-17-f130f5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-17&amp;severity=medium&amp;id=682acdc2bbaf20d303f130f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26779-improper-limitation-of-a-pathname-t-7c41b6c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26779%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Fahad%20Mahmood%20Keep%20Backup%20Daily&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26768-cross-site-request-forgery-csrf-in--5d8a0bbb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26768%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20what3words%20what3words%20Address%20Field&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26767-improper-neutralization-of-input-du-5cd54f54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26767%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Qubely&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26766-improper-neutralization-of-input-du-5596464a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26766%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VaultDweller%20Leyka&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26765-missing-authorization-in-enituretec-b6a1b9ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26765%3A%20Missing%20Authorization%20in%20enituretechnology%20Distance%20Based%20Shipping%20Calculator&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26761-improper-neutralization-of-input-du-d0e7632e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26761%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26759-cross-site-request-forgery-csrf-in--9b73a6d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26759%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alexvtn%20Content%20Snippet%20Manager&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26755-improper-neutralization-of-special--7547153c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26755%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jgwhite33%20WP%20Airbnb%20Review%20Slider&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23975-improper-neutralization-of-input-du-1cd6726e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23975%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cheesefather%20Botnet%20Attack%20Blocker&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee912d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22689-improper-neutralization-of-input-du-ae297f40</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22689%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Levan%20Tarbor%20Forex%20Calculators&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22676-improper-neutralization-of-input-du-c5b63350</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20upcasted%20AWS%20S3%20for%20WordPress%20Plugin%20%E2%80%93%20Upcasted&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22291-missing-authorization-in-enituretec-6362ef1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22291%3A%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22290-improper-neutralization-of-special--88fbc0d3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22290%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20FreightQuote%20Edition&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22289-missing-authorization-in-enituretec-7766c6a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22289%3A%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22286-improper-neutralization-of-input-du-0329b97f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22286%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22284-improper-neutralization-of-input-du-bfb6e338</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22284%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44044-improper-neutralization-of-input-du-583b1c39</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandexponents%20Oshine%20Modules&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-16-42080994</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-16&amp;severity=medium&amp;id=68359c9e5d5f0974d01f9ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-16-f20062</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-16&amp;severity=medium&amp;id=682acdc3bbaf20d303f20062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-16-f12dec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13834-cwe-918-server-side-request-forgery-69a09588</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13834%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20cyberchimps%20Responsive%20Plus%20%E2%80%93%20Elementor%20Templates%20%26%20Starter%20Sites&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0822-cwe-23-relative-path-traversal-in-bi-e9d0d73b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0822%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20bitpressadmin%20Chat%20Widget%3A%20Floating%20Customer%20Support%20Button%20for%2030%2B%20Channels%2C%20Supporting%20SMS%2C%20Calls%2C%20and%20Chat%20%E2%80%93%20Bit%20Assist&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13488-cwe-89-improper-neutralization-of-s-d4f743d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13488%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Estes%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13500-cwe-89-improper-neutralization-of-s-4831b1a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13500%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20Project%20Manager%20%E2%80%93%20AI%20Powered%20Project%20Management%2C%20Task%20Management%2C%20Kanban%20Board%20%26%20Time%20Tracker&amp;severity=medium&amp;id=699f6e5bb7ef31ef0b59ed8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13439-cwe-862-missing-authorization-in-te-f7e3ad27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13439%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Team%20%E2%80%93%20Team%20Members%20Showcase%20Plugin&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10581-cwe-352-cross-site-request-forgery--14752895</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10581%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20designinvento%20DirectoryPress%20Frontend&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13752-cwe-862-missing-authorization-in-we-43761d98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13752%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20Project%20Manager%20%E2%80%93%20AI%20Powered%20Project%20Management%2C%20Task%20Management%2C%20Kanban%20Board%20%26%20Time%20Tracker&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a06a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12562-cwe-502-deserialization-of-untruste-acc97f5e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12562%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WP%20Sharks%20s2Member%20Pro&amp;severity=critical&amp;id=699f6e43b7ef31ef0b59beef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1005-cwe-79-improper-neutralization-of-in-1e273f32</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b0db7ef31ef0b54d93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13525-cwe-200-exposure-of-sensitive-infor-61c4a041</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13525%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpcodefactory%20Customer%20Email%20Verification%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e5eb7ef31ef0b59efdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0935-cwe-862-missing-authorization-in-max-37508874</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0935%3A%20CWE-862%20Missing%20Authorization%20in%20maxfoundry%20Media%20Library%20Folders&amp;severity=medium&amp;id=699f6b6db7ef31ef0b555573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13563-cwe-79-improper-neutralization-of-i-6dfc5348</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13563%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Front%20End%20Users&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13513-cwe-862-missing-authorization-in-ol-bdb1b0e6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13513%3A%20CWE-862%20Missing%20Authorization%20in%20oliverpos%20Oliver%20POS%20%E2%80%93%20A%20WooCommerce%20Point%20of%20Sale%20(POS)&amp;severity=critical&amp;id=699f6e5cb7ef31ef0b59ef12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-15-2cedfe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-15&amp;severity=medium&amp;id=682c7dbee8347ec82d2cedfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-15-f12649</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f12649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21401-cwe-601-url-redirection-to-untruste-0b40a0f1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21401%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69432f03058703ef3fc9859c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31144-vulnerability-in-xen-project-xen-befaa5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31144%3A%20Vulnerability%20in%20Xen%20Project%20Xen&amp;severity=low&amp;id=682d983ec4522896dcbefaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25290-cwe-1333-inefficient-regular-expres-2caeb344</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25290%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20octokit%20request.js&amp;severity=medium&amp;id=696a7aa9b22c7ad868c5764f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13152-cwe-89-improper-neutralization-of-s-0fdc0e8f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13152%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BSS%20Software%20Mobuy%20Online%20Machinery%20Monitoring%20Panel&amp;severity=critical&amp;id=68ee4921509368ccaa7248ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23905-improper-neutralization-of-input-du-944be09a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Johannes%20van%20Poelgeest%20Admin%20Options%20Pages&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22705-cross-site-request-forgery-csrf-in--ba368f12</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22705%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20godthor%20Disqus%20Popular%20Posts&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22702-missing-authorization-in-themegoods-a3a1ffa8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22702%3A%20Missing%20Authorization%20in%20ThemeGoods%20Photography&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22698-missing-authorization-in-ability-in-88d840bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22698%3A%20Missing%20Authorization%20in%20Ability%2C%20Inc%20Accessibility%20Suite&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52500-missing-authorization-in-monetagwp--a3352553</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52500%3A%20Missing%20Authorization%20in%20monetagwp%20Monetag%20Official%20Plugin&amp;severity=null&amp;id=69cd7554e6bfc5ba1df04125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24692-missing-authorization-in-mcode-bulk-1e839b1e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24692%3A%20Missing%20Authorization%20in%20M.Code%20Bulk%20Menu%20Edit&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24688-improper-neutralization-of-input-du-d8833de8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24688%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24700-improper-neutralization-of-input-du-be97e2fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24700%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xylus%20Themes%20WP%20Event%20Aggregator&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24699-cross-site-request-forgery-csrf-in--964aca51</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24699%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20WP%20Coder&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24641-improper-neutralization-of-input-du-6338fb5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24641%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rickonline_nl%20Better%20WishList%20API&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24617-improper-neutralization-of-input-du-be0a255b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24617%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AcyMailing%20Newsletter%20Team%20AcyMailing%20SMTP%20Newsletter&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24616-improper-neutralization-of-input-du-6869cd02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24616%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UIUX%20Lab%20Uix%20Page%20Builder&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24615-improper-neutralization-of-input-du-499288b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Analytics%20Cat&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24614-improper-neutralization-of-input-du-1f7a17c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agile%20Logix%20Post%20Timeline&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24607-missing-authorization-in-northern-b-72ba51ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24607%3A%20Missing%20Authorization%20in%20Northern%20Beaches%20Websites%20IdeaPush&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24592-improper-neutralization-of-input-du-c2abe301</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SysBasics%20Customize%20My%20Account%20for%20WooCommerce&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee952d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24567-insertion-of-sensitive-information--12e436b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24567%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24566-improper-neutralization-of-input-du-8836ca03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tom%C3%A1%C5%A1%20Groul%C3%ADk%20Intro%20Tour%20Tutorial%20DeepPresentation&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24565-improper-neutralization-of-input-du-3e09db55</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24565%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24564-improper-neutralization-of-input-du-86c3f75a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20Contact%20Form%20With%20Shortcode&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24554-improper-neutralization-of-input-du-25541c92</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awcode%20AWcode%20Toolkit&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee9208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23857-improper-neutralization-of-input-du-acd609da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23857%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SmartDataSoft%20Essential%20WP%20Real%20Estate&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23853-improper-neutralization-of-input-du-df65e38d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23853%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michelem%20NoFollow%20Free&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23851-improper-neutralization-of-input-du-7f1ca2ef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23851%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Khushwant%20Singh%20Coronavirus%20(COVID-19)%20Outbreak%20Data%20Widgets&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23789-improper-neutralization-of-input-du-2b90b836</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23789%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tahminajannat%20URL%20Shortener%20%7C%20Conversion%20Tracking%20%20%7C%20AB%20Testing%20%20%7C%20WooCommerce&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee871c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23788-improper-neutralization-of-input-du-b2b0fb17</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23788%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Roni%20Saha%20Easy%20Filter&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23787-improper-neutralization-of-input-du-58cd6122</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23787%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Foxskav%20Easy%20Bet&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23786-improper-neutralization-of-input-du-336d782c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23786%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DuoGeek%20Email%20to%20Download&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23771-missing-authorization-in-murali-pus-f3303780</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23771%3A%20Missing%20Authorization%20in%20Murali%20Push%20Notification%20for%20Post%20and%20BuddyPress&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee8602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23766-missing-authorization-in-ashamil-op-bccb8139</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23766%3A%20Missing%20Authorization%20in%20ashamil%20OPSI%20Israel%20Domestic%20Shipments&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23751-improper-neutralization-of-input-du-5d234921</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23751%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20Data%20Dash&amp;severity=null&amp;id=69cd722de6bfc5ba1dee856b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23750-improper-neutralization-of-input-du-d145595d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devbunchuk%20Custom%20Widget%20Creator&amp;severity=null&amp;id=69cd722de6bfc5ba1dee8566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23748-improper-neutralization-of-input-du-550109c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Singsys%20Singsys%20-Awesome%20Gallery&amp;severity=null&amp;id=69cd722de6bfc5ba1dee855f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23742-improper-neutralization-of-input-du-40e1b977</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Podamibe%20Nepal%20Podamibe%20Twilio%20Private%20Call&amp;severity=null&amp;id=69cd722de6bfc5ba1dee854a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23658-improper-neutralization-of-input-du-90a8ec6e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23658%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tauhidul%20Alam%20Advanced%20Angular%20Contact%20Form&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23657-improper-neutralization-of-input-du-29957367</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23657%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RusAlex%20WordPress-to-candidate%20for%20Salesforce%20CRM&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23655-improper-neutralization-of-input-du-98f17f96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23655%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crystalwebpro%20Contact%20Form%207%20%E2%80%93%20Paystack%20Add-on&amp;severity=null&amp;id=69cd7646e6bfc5ba1df0ae45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23653-improper-neutralization-of-input-du-60cf80b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23653%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nabeel%20Tahir%20Form%20To%20Online%20Booking&amp;severity=null&amp;id=69cd7646e6bfc5ba1df0ae3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23652-improper-neutralization-of-input-du-1d108754</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23652%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fabio%20Zuanon%20Add%20custom%20content%20after%20post&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0addc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23651-improper-neutralization-of-input-du-0c395a73</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23651%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adamskaat%20Scroll%20Top&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0add9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23650-improper-neutralization-of-input-du-52ef1b06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23650%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20razvypp%20Tidy.ro&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0add6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23648-improper-neutralization-of-input-du-6ec53fa3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23648%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wjharil%20AdsMiddle&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0add0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23647-improper-neutralization-of-input-du-50f1e548</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23647%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ariagle%20WP-Clap&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0adcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23646-improper-neutralization-of-input-du-10514033</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matt%20Brooks%20Library%20Instruction%20Recorder&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0adca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23598-improper-neutralization-of-input-du-52d6f4c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craig.edmunds%40gmail.com%20Recip.ly&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23571-improper-neutralization-of-input-du-6d56ef7e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23571%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20makong%20Internal%20Links%20Generator&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23568-improper-neutralization-of-input-du-a03d34b0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23568%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fredsted%20WP%20Login%20Attempt%20Log&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23534-missing-authorization-in-mark-winia-0cd81b7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23534%3A%20Missing%20Authorization%20in%20Mark%20Winiarski%20WPLingo&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23525-improper-neutralization-of-input-du-3000349f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kvvaradha%20Kv%20Compose%20Email%20From%20Dashboard&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23523-improper-neutralization-of-input-du-96139f37</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23523%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hoststreamsell%20HSS%20Embed%20Streaming%20Video&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a6f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23492-improper-neutralization-of-input-du-eb957a5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23492%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CantonBolo%20WordPress%20%E6%B7%98%E5%AE%9D%E5%AE%A2%E6%8F%92%E4%BB%B6&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23474-improper-neutralization-of-input-du-98983753</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23474%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mike%20Martel%20Live%20Dashboard&amp;severity=null&amp;id=69cd761ee6bfc5ba1df0988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23431-improper-neutralization-of-input-du-be209dde</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23431%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20khaninejad%20Envato%20Affiliater&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23428-improper-neutralization-of-input-du-f0588008</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23428%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arash%20Safari%20QMean%20%E2%80%93%20WordPress%20Did%20You%20Mean&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0821-cwe-89-improper-neutralization-of-sp-5164d7dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0821%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bitpressadmin%20Chat%20Widget%3A%20Floating%20Customer%20Support%20Button%20for%2030%2B%20Channels%2C%20Supporting%20SMS%2C%20Calls%2C%20and%20Chat%20%E2%80%93%20Bit%20Assist&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b55541d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13791-cwe-23-relative-path-traversal-in-b-cffc71c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13791%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20bitpressadmin%20Chat%20Widget%3A%20Floating%20Customer%20Support%20Button%20for%2030%2B%20Channels%2C%20Supporting%20SMS%2C%20Calls%2C%20and%20Chat%20%E2%80%93%20Bit%20Assist&amp;severity=medium&amp;id=699f6d15b7ef31ef0b56dc00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13735-cwe-79-improper-neutralization-of-i-1a0a7b59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nlemsieh%20HurryTimer%20%E2%80%93%20An%20Scarcity%20and%20Urgency%20Countdown%20Timer%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1298-cwe-290-authentication-bypass-by-spo-63ef08b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1298%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20TECNO%20com.transsion.carlcare&amp;severity=critical&amp;id=68ba82f2791f3b772df6594c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22630-improper-neutralization-of-special--b2e60aea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22630%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Marketing%20Fire%20Widget%20Options&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9601-cwe-79-improper-neutralization-of-in-f30bc9c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9601%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeum%20Qubely%20%E2%80%93%20Advanced%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13692-cwe-285-improper-authorization-in-w-aeab5c09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13692%3A%20CWE-285%20Improper%20Authorization%20in%20wpswings%20Return%20Refund%20and%20Exchange%20For%20WooCommerce&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a018a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13641-cwe-200-exposure-of-sensitive-infor-1c52b0a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13641%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpswings%20Return%20Refund%20and%20Exchange%20For%20WooCommerce&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1053-cwe-532-insertion-of-sensitive-infor-0edf72eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1053%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Brocade%20Brocade%20SANnav&amp;severity=high&amp;id=68c07ba9b6075907d2127cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-14-2d4fb2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-14&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d4fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-14-f129b1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f129b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26511-cwe-863-in-netapp-instaclustr-fork--d1793807</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26511%3A%20CWE-863%20in%20NetApp%20Instaclustr%20fork%20of%20Stratio&apos;s%20Cassandra-Lucene-Index%20plugin&amp;severity=high&amp;id=69727fa14623b1157c88acd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25287-cwe-79-improper-neutralization-of-i-34387eb0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25287%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lakejason0%20mediawiki-skins-Lakeus&amp;severity=medium&amp;id=687e3a12a83201eaac0f8677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21701-vulnerability-in-linux-linux-bdd2f2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21701%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26539-improper-neutralization-of-input-du-886eb9bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20petkivim%20Embed%20Google%20Map&amp;severity=null&amp;id=69cd729de6bfc5ba1deec659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26538-improper-neutralization-of-input-du-cfc1207c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dan%20Rossiter%20Prezi%20Embedder&amp;severity=null&amp;id=69cd729de6bfc5ba1deec656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26582-cross-site-request-forgery-csrf-in--c127c38d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26582%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Blackbam%20TinyMCE%20Advanced%20qTranslate%20fix%20editor%20problems&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26580-cross-site-request-forgery-csrf-in--a8ad5a7a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26580%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Complete%20SEO%20Page%2FPost%20Specific%20Social%20Share%20Buttons&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26578-cross-site-request-forgery-csrf-in--8734ddaf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26578%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mathieuhays%20Simple%20Documentation&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26577-cross-site-request-forgery-csrf-in--40565375</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26577%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20daxiawp%20DX-auto-publish&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26574-improper-neutralization-of-input-du-923c28c8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Moch%20Amir%20Google%20Drive%20WP%20Media&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26572-cross-site-request-forgery-csrf-in--bac562fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jesseheap%20WP%20PHPList&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26571-cross-site-request-forgery-csrf-in--a6fcea60</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26571%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wibiya%20Wibiya%20Toolbar&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26570-cross-site-request-forgery-csrf-in--fb44709f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26570%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20uamv%20Glance%20That&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26569-cross-site-request-forgery-csrf-in--e660544e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26569%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20callmeforsox%20Post%20Thumbs&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26568-cross-site-request-forgery-csrf-in--29b1426f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26568%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jensmueller%20Easy%20Amazon%20Product%20Information&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26567-improper-neutralization-of-input-du-3cd22cdb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26567%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20farjana55%20Font%20Awesome%20WP&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26562-cross-site-request-forgery-csrf-in--1531d8b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26562%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shambhu%20Patnaik%20RSS%20Filter&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26561-improper-neutralization-of-input-du-9f622fbb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26561%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elfsight%20Elfsight%20Yottie%20Lite&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26558-improper-neutralization-of-input-du-bf06d311</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mkkmail%20Aparat%20Responsive&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26552-improper-neutralization-of-input-du-cec09da8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20badrHan%20Naver%20Syndication%20V2&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26551-improper-neutralization-of-input-du-86cbba33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sureshdsk%20Bootstrap%20collapse&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26550-cross-site-request-forgery-csrf-in--d694db88</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26550%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kunal%20Shivale%20Global%20Meta%20Keyword%20%26%20Description&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26549-cross-site-request-forgery-csrf-in--07facaca</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26549%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pa1%20WP%20Html%20Page%20Sitemap&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26547-cross-site-request-forgery-csrf-in--3379ecad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26547%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nagarjunsonti%20My%20Login%20Logout%20Plugin&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26545-cross-site-request-forgery-csrf-in--c9866d36</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26545%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shisuh%20Related%20Posts%20Line-up-Exactly%20by%20Milliard&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26543-cross-site-request-forgery-csrf-in--433806a8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26543%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pukhraj%20Suthar%20Simple%20Responsive%20Menu&amp;severity=null&amp;id=69cd729de6bfc5ba1deec662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1247-exposure-of-data-element-to-wrong-se-622f2b34</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1247%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session&amp;severity=high&amp;id=68af0c87ad5a09ad00627bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13182-cwe-288-authentication-bypass-using-336c9d1a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13182%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Chimpstudio%20WP%20Directorybox%20Manager&amp;severity=critical&amp;id=699f6e4db7ef31ef0b59c8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21700-vulnerability-in-linux-linux-be985e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21700%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe985e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13606-cwe-200-exposure-of-sensitive-infor-d9587167</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13606%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20rabilal%20JS%20Help%20Desk%20%E2%80%93%20AI-Powered%20Support%20%26%20Ticketing%20System&amp;severity=high&amp;id=699f6e63b7ef31ef0b59f5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13867-cwe-79-improper-neutralization-of-i-29172f79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TangibleWP%20Listivo%20-%20Classified%20Ads%20WordPress%20Theme&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46910-cwe-80-improper-neutralization-of-s-88f51fc0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46910%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Apache%20Software%20Foundation%20Apache%20Atlas&amp;severity=high&amp;id=68f268709c34d0947f2fc052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13639-cwe-862-missing-authorization-in-ed-85fa665d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13639%3A%20CWE-862%20Missing%20Authorization%20in%20edmonparker%20Read%20More%20%26%20Accordion&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13345-cwe-94-improper-control-of-generati-3e7a56e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13345%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13346-cwe-94-improper-control-of-generati-11c5281f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13346%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThemeFusion%20Avada%20%7C%20Website%20Builder%20For%20WordPress%20%26%20WooCommerce&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0661-cwe-639-authorization-bypass-through-1a867fb5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0661%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20detheme%20DethemeKit%20for%20Elementor&amp;severity=medium&amp;id=699f6b69b7ef31ef0b55530f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10763-cwe-22-improper-limitation-of-a-pat-86590ec0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10763%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ApusTheme%20Campress&amp;severity=critical&amp;id=699f6dfcb7ef31ef0b59245d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13770-cwe-502-deserialization-of-untruste-c19c3755</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13770%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Puzzles%20%7C%20WP%20Magazine%20%2F%20Review%20with%20Store%20WordPress%20Theme%20%2B%20RTL&amp;severity=high&amp;id=699f6e6db7ef31ef0b5a071b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0837-cwe-79-improper-neutralization-of-in-9a84fb3c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeREX%20Puzzles%20%7C%20WP%20Magazine%20%2F%20Review%20with%20Store%20WordPress%20Theme%20%2B%20RTL&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13229-cwe-284-improper-access-control-in--236d6cc7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13229%3A%20CWE-284%20Improper%20Access%20Control%20in%20rankmath%20Rank%20Math%20SEO%20%E2%80%93%20AI%20SEO%20Tools%20to%20Dominate%20SEO%20Rankings&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13227-cwe-79-improper-neutralization-of-i-c3bec664</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13227%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rankmath%20Rank%20Math%20SEO%20%E2%80%93%20AI%20SEO%20Tools%20to%20Dominate%20SEO%20Rankings&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13644-cwe-79-improper-neutralization-of-i-7aecce87</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20detheme%20DethemeKit%20for%20Elementor&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-13-2d460b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-13&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d460b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-13-f121ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f121ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31068-denial-of-service-in-intelr-process-cd437fa6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31068%3A%20Denial%20of%20Service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=6909214afe7723195e0544de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36293-denial-of-service-in-intelr-process-eedc763b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36293%3A%20Denial%20of%20Service%20in%20Intel(R)%20Processors%20with%20Intel(R)%20SGX&amp;severity=medium&amp;id=6909214afe7723195e05450a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37020-denial-of-service-in-intelr-xeonr-p-38ea3b93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37020%3A%20Denial%20of%20Service%20in%20Intel(R)%20Xeon(R)%20Processors&amp;severity=medium&amp;id=6909214cfe7723195e05453a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39805-escalation-of-privilege-in-intelr-d-390ce571</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39805%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20DSA%20software&amp;severity=high&amp;id=69a0a43d85912abc71d62498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39355-denial-of-service-in-intelr-process-549c9e46</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39355%3A%20Denial%20of%20Service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=6909214cfe7723195e054552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28047-information-disclosure-in-intelr-pr-dcaca9c5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28047%3A%20Information%20Disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=69092149fe7723195e054412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31157-information-disclosure-in-intelr-pr-1ed928f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31157%3A%20Information%20Disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=6909214afe7723195e0544e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39279-denial-of-service-in-intelr-process-afcdf6e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39279%3A%20Denial%20of%20Service%20in%20Intel(R)%20processors&amp;severity=medium&amp;id=6909214cfe7723195e05454e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28127-escalation-of-privilege-in-intelr-p-4a6118ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28127%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=69092149fe7723195e054416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29214-escalation-of-privilege-in-intelr-p-16dd3766</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29214%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=69092149fe7723195e05441f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24582-escalation-of-privilege-in-intelr-p-410a9060</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24582%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20processors&amp;severity=high&amp;id=69092148fe7723195e0543f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34440-escalation-of-privilege-in-intelr-p-d672db8a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34440%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=69092143fe7723195e053f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43758-escalation-of-privilege-in-intelr-p-649e59a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43758%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20processors&amp;severity=high&amp;id=69092145fe7723195e053fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31155-escalation-of-privilege-in-intelr-p-edb5ea81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31155%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=69a0a43c85912abc71d620e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37355-escalation-of-privilege-in-intelr-g-02b8c991</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37355%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20software&amp;severity=high&amp;id=69a0a43d85912abc71d62495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31858-escalation-of-privilege-in-intelr-q-e63c7ae3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31858%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20QuickAssist%20Technology%20software&amp;severity=high&amp;id=69a0a43d85912abc71d62489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0110-cwe-78-improper-neutralization-of-sp-06b7b9bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0110%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20PAN-OS%20OpenConfig%20Plugin&amp;severity=high&amp;id=69a0a44985912abc71d64ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0111-cwe-73-external-control-of-file-name-23aa1f5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0111%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=68881726ad5a09ad0088bbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0108-cwe-306-missing-authentication-for-c-ac1ae732</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0108%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=68881726ad5a09ad0088bba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1244-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-bef741</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1244%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=682d983dc4522896dcbef741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21699-vulnerability-in-linux-linux-be985a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe985a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57952-vulnerability-in-linux-linux-bdd236</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26358-cwe-20-improper-input-validation-in-fb21569e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26358%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Q-Free%20MaxTime&amp;severity=medium&amp;id=68e52419a677756fc9926600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21697-vulnerability-in-linux-linux-be9856</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21696-vulnerability-in-linux-linux-be983e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe983e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21695-vulnerability-in-linux-linux-be983a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe983a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21694-vulnerability-in-linux-linux-bdd2ee</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57951-vulnerability-in-linux-linux-bdd216</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10322-cwe-79-improper-neutralization-of-i-7305fa14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10322%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12386-cwe-352-cross-site-request-forgery--58a2554d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12386%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kevonadonis%20WP%20Abstracts&amp;severity=high&amp;id=699f6e38b7ef31ef0b5980bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13480-cwe-89-improper-neutralization-of-s-703acaca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13480%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20For%20Customers%20of%20FedEx%20Freight&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13532-cwe-89-improper-neutralization-of-s-1ef8de37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13532%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Purolator%20Edition&amp;severity=high&amp;id=699f6e5eb7ef31ef0b59f01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13477-cwe-89-improper-neutralization-of-s-c90db2fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0511-cwe-79-improper-neutralization-of-in-7708dd8a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0511%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=high&amp;id=699f6b69b7ef31ef0b5552f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10960-cwe-434-unrestricted-upload-of-file-67f4bc6a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10960%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=critical&amp;id=699f6e04b7ef31ef0b5939b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12296-cwe-862-missing-authorization-in-ap-f400d6c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12296%3A%20CWE-862%20Missing%20Authorization%20in%20ApusTheme%20Apus%20Framework&amp;severity=high&amp;id=699f6e35b7ef31ef0b597cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13531-cwe-89-improper-neutralization-of-s-a6a211ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13531%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20ShipEngine%20Shipping%20Quotes&amp;severity=high&amp;id=699f6e5eb7ef31ef0b59f013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13475-cwe-89-improper-neutralization-of-s-b8305f43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13475%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20UPS%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13437-cwe-352-cross-site-request-forgery--f0bcb428</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13437%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chuhpl%20Book%20a%20Room&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13459-cwe-79-improper-neutralization-of-i-a61d3bbf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremyshapiro%20FuseDesk&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13365-cwe-434-unrestricted-upload-of-file-464e688e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13365%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20cleantalk%20Login%20Security%2C%20FireWall%2C%20Malware%20removal%20by%20CleanTalk&amp;severity=critical&amp;id=699f6e51b7ef31ef0b59e2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13490-cwe-89-improper-neutralization-of-s-634f1ec2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13490%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20XPO%20Edition&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12213-cwe-266-incorrect-privilege-assignm-55a00651</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12213%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20http%3A%2F%2Fapusthemes.com%2F%20WP%20Job%20Board%20Pro&amp;severity=critical&amp;id=699f6e32b7ef31ef0b597982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13456-cwe-79-improper-neutralization-of-i-d8077e49</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13456%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nmedia%20Easy%20Quiz%20Maker&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13435-cwe-89-improper-neutralization-of-s-fc808e3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13435%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iwcontribution%20Ebook%20Downloader&amp;severity=high&amp;id=699f6e57b7ef31ef0b59e8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13473-cwe-89-improper-neutralization-of-s-30fdf130</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13473%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0506-cwe-79-improper-neutralization-of-in-1354f835</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eaglethemes%20Rise%20Blocks%20%E2%80%93%20A%20Complete%20Gutenberg%20Page%20Builder&amp;severity=medium&amp;id=699f6b69b7ef31ef0b5552ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13528-cwe-287-improper-authentication-in--55fd2791</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13528%3A%20CWE-287%20Improper%20Authentication%20in%20wpcodefactory%20Customer%20Email%20Verification%20for%20WooCommerce&amp;severity=high&amp;id=699f6e5eb7ef31ef0b59eff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13814-cwe-94-improper-control-of-generati-d624a8a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13814%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20LCweb%20Global%20Gallery%20-%20WordPress%20Responsive%20Gallery&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dcbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12315-cwe-922-insecure-storage-of-sensiti-2ef9e563</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12315%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20smackcoders%20Export%20All%20Posts%2C%20Products%2C%20Orders%2C%20Refunds%20%26%20Users&amp;severity=high&amp;id=699f6e36b7ef31ef0b597db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13794-cwe-693-protection-mechanism-failur-3b0ca1c8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13794%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20johndarrel%20WP%20Ghost%20(Hide%20My%20WP%20Ghost)%20%E2%80%93%20Security%20%26%20Firewall&amp;severity=medium&amp;id=699f6d15b7ef31ef0b56dc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13821-cwe-285-improper-authorization-in-w-045cbfcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13821%3A%20CWE-285%20Improper%20Authorization%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13601-cwe-639-authorization-bypass-throug-46f2c89a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13601%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ahmadmj%20Majestic%20Support%20%E2%80%93%20The%20Leading-Edge%20Help%20Desk%20%26%20Customer%20Support%20Plugin&amp;severity=medium&amp;id=699f6e63b7ef31ef0b59f5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13600-cwe-200-exposure-of-sensitive-infor-978af408</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13600%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ahmadmj%20Majestic%20Support%20%E2%80%93%20The%20Leading-Edge%20Help%20Desk%20%26%20Customer%20Support%20Plugin&amp;severity=high&amp;id=699f6e63b7ef31ef0b59f5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13714-cwe-434-unrestricted-upload-of-file-d6ca8dab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13714%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20allimages%20All-Images.ai%20%E2%80%93%20IA%20Image%20Bank%20and%20Custom%20Image%20creation&amp;severity=high&amp;id=699f6e6ab7ef31ef0b5a03d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13374-cwe-862-missing-authorization-in-jo-e01f1fc1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13374%3A%20CWE-862%20Missing%20Authorization%20in%20JoomUnited%20WP%20Table%20Manager&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13654-cwe-862-missing-authorization-in-mv-93293189</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13654%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20ZoxPress%20-%20The%20All-In-One%20WordPress%20News%20Theme&amp;severity=high&amp;id=699f6e65b7ef31ef0b59feea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13656-cwe-862-missing-authorization-in-mv-4abb0757</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13656%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20Click%20Mag%20-%20Viral%20WordPress%20News%20Magazine%2FBlog%20Theme&amp;severity=high&amp;id=699f6e65b7ef31ef0b59fef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13658-cwe-79-improper-neutralization-of-i-3703bf7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13658%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpo-hr%20NGG%20Smart%20Image%20Search&amp;severity=medium&amp;id=699f6e65b7ef31ef0b59fefa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13665-cwe-79-improper-neutralization-of-i-7de25545</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20Admire%20Extra&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13653-cwe-862-missing-authorization-in-mv-63cb7c88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13653%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20ZoxPress%20-%20The%20All-In-One%20WordPress%20News%20Theme&amp;severity=high&amp;id=699f6e65b7ef31ef0b59fee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13421-cwe-266-incorrect-privilege-assignm-a0c2229c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13421%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20contempoinc%20Real%20Estate%207%20WordPress&amp;severity=critical&amp;id=699f6e55b7ef31ef0b59e6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12164-cwe-862-missing-authorization-in-cr-81c8d080</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12164%3A%20CWE-862%20Missing%20Authorization%20in%20creativewerkdesigns%20WPSyncSheets%20For%20WPForms%20%E2%80%93%20Google%20Sheets%20Connector%20for%20WPForms%20%26%20Real%E2%80%91Time%20Data%20Export&amp;severity=medium&amp;id=699f6e30b7ef31ef0b5976ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13800-cwe-862-missing-authorization-in-br-82a9464a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13800%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20ConvertPlus&amp;severity=high&amp;id=699f6d16b7ef31ef0b56dc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11746-cwe-79-improper-neutralization-of-i-ca0d89dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samdani%20GS%20Brands%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b5955a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13769-cwe-862-missing-authorization-in-th-2e38997b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13769%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeREX%20Puzzles%20%7C%20WP%20Magazine%20%2F%20Review%20with%20Store%20WordPress%20Theme%20%2B%20RTL&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a0717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13541-cwe-862-missing-authorization-in-ad-ab226c66</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13541%3A%20CWE-862%20Missing%20Authorization%20in%20adirectory%20aDirectory%20%E2%80%93%20WP%20Business%20Directory%20Plugin%20and%20Classified%20Ads%20Listings%20Directory&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13701-cwe-79-improper-neutralization-of-i-c7088bfb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stklcode%20Liveticker%20(by%20stklcode)&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13749-cwe-79-improper-neutralization-of-i-197678a7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20era404%20StaffList&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0808-cwe-352-cross-site-request-forgery-c-a15f2cf7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0808%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20propertyhive%20Houzez%20Property%20Feed&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b55540a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13539-cwe-209-generation-of-error-message-b321bcc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13539%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20vividcolorsjp%20AForms%20Eats&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13554-cwe-862-missing-authorization-in-wp-80854d58</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13554%3A%20CWE-862%20Missing%20Authorization%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0145-cwe-122-heap-based-buffer-overflow-i-8b9311de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0145%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20NVIDIA%20nvJPEG2000&amp;severity=medium&amp;id=69a0a43885912abc71d61ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0144-cwe-120-buffer-copy-without-checking-e57acbfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0144%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20NVIDIA%20nvJPEG2000&amp;severity=medium&amp;id=69a0a43885912abc71d61acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0143-cwe-787-out-of-bounds-write-in-nvidi-78164104</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0143%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20nvJPEG2000&amp;severity=medium&amp;id=69a0a43885912abc71d61ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0142-cwe-787-out-of-bounds-write-in-nvidi-a209bfac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0142%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20nvJPEG2000&amp;severity=medium&amp;id=69a0a43885912abc71d61ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25351-n-a-in-n-a-bd6d8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25351%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-12-2d3fad</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-12&amp;severity=medium&amp;id=682c7dbfe8347ec82d2d3fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-12-f12969</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31345-cwe-20-improper-input-validation-in-amd-amd-epyc-7003-processors-bf15f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31345%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Processors&amp;severity=medium&amp;id=682d9840c4522896dcbf15f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31342-cwe-20-improper-input-validation-in-amd-amd-epyc-7003-processors-bf15ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31342%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Processors&amp;severity=medium&amp;id=682d9840c4522896dcbf15ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0179-cwe-20-improper-input-validation-in-amd-amd-ryzen-3000-series-desktop-processors-bf1601</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0179%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMD%20AMD%20Ryzen%E2%84%A2%203000%20Series%20Desktop%20Processors&amp;severity=high&amp;id=682d9840c4522896dcbf1601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24042-cwe-284-improper-access-control-in--1795961f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24042%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Visual%20Studio%20Code%20-%20JS%20Debug%20Extension&amp;severity=high&amp;id=69432f05058703ef3fc985ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21373-cwe-59-improper-link-resolution-bef-eaa66e24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21373%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f02058703ef3fc9855f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21414-cwe-122-heap-based-buffer-overflow--29bb435e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21414%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f05058703ef3fc985dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21322-cwe-59-improper-link-resolution-bef-bf49f17a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21322%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20PC%20Manager&amp;severity=high&amp;id=69432efe058703ef3fc97fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21254-cwe-125-out-of-bounds-read-in-micro-6fa78491</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21254%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69432efe058703ef3fc97fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21216-cwe-125-out-of-bounds-read-in-micro-063cfda9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21216%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69432efe058703ef3fc97fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21212-cwe-125-out-of-bounds-read-in-micro-4aefa2c1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21212%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69432efc058703ef3fc97fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21184-cwe-122-heap-based-buffer-overflow--a7d15b6f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21184%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432efc058703ef3fc97f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21181-cwe-400-uncontrolled-resource-consu-a9594891</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21181%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432efa058703ef3fc97f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21179-cwe-125-out-of-bounds-read-in-micro-a3e437ee</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21179%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69432efa058703ef3fc97f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21400-cwe-285-improper-authorization-in-m-78a0360b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21400%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69432f03058703ef3fc98599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21397-cwe-416-use-after-free-in-microsoft-0aba3281</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21397%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f03058703ef3fc98596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21394-cwe-416-use-after-free-in-microsoft-252ca093</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21394%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f03058703ef3fc98593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21392-cwe-416-use-after-free-in-microsoft-32763dbc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21392%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f03058703ef3fc98590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21390-cwe-122-heap-based-buffer-overflow--6b1a3060</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21390%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f03058703ef3fc9858d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21387-cwe-416-use-after-free-in-microsoft-7d59178a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21387%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f03058703ef3fc9858a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21386-cwe-416-use-after-free-in-microsoft-fbea614a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21386%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f02058703ef3fc98574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21381-cwe-822-untrusted-pointer-dereferen-aeb93ef6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21381%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f02058703ef3fc9856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21377-cwe-73-external-control-of-file-nam-b029a0b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21377%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69432f02058703ef3fc98568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21371-cwe-122-heap-based-buffer-overflow--050724a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21371%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f02058703ef3fc9855a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21367-cwe-416-use-after-free-in-microsoft-d0a43e14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21367%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69432f00058703ef3fc98029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21359-cwe-284-improper-access-control-in--1d73ef3c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21359%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f00058703ef3fc98026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21358-cwe-822-untrusted-pointer-dereferen-1d95dceb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21358%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f00058703ef3fc98023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21350-cwe-20-improper-input-validation-in-b183e6e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21350%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69432f00058703ef3fc98017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21349-cwe-287-improper-authentication-in--34ce0ed8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21349%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69432f00058703ef3fc98014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21347-cwe-59-improper-link-resolution-bef-cf7d3f7b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21347%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69432f00058703ef3fc98011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21337-cwe-284-improper-access-control-in--e77a457d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21337%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=69432efe058703ef3fc97ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21198-cwe-306-missing-authentication-for--2e9b2473</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21198%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Microsoft%20HPC%20Pack%202016&amp;severity=critical&amp;id=69432efc058703ef3fc97f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21201-cwe-415-double-free-in-microsoft-wi-0343c1a9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21201%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432efc058703ef3fc97f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21200-cwe-122-heap-based-buffer-overflow--5abc135d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21200%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432efc058703ef3fc97f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21190-cwe-122-heap-based-buffer-overflow--947bbeef</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21190%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432efc058703ef3fc97f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21410-cwe-122-heap-based-buffer-overflow--e125a748</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21410%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=69432f05058703ef3fc985da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21407-cwe-122-heap-based-buffer-overflow--c6b0c3a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21407%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f03058703ef3fc985a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21406-cwe-416-use-after-free-in-microsoft-d25a7f30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21406%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f03058703ef3fc985a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21208-cwe-122-heap-based-buffer-overflow--2822546c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21208%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=69432efc058703ef3fc97fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21194-cwe-20-improper-input-validation-in-ff7e442e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21194%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Surface%20Go&amp;severity=high&amp;id=69432efc058703ef3fc97f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21259-cwe-451-user-interface-ui-misrepres-5fd02126</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21259%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Outlook%20for%20Android&amp;severity=medium&amp;id=69432efe058703ef3fc97fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24039-cwe-427-uncontrolled-search-path-el-888c8ec8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24039%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=69432f05058703ef3fc985e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24036-cwe-367-time-of-check-time-of-use-t-90d27972</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24036%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=69432f05058703ef3fc985e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21420-cwe-59-improper-link-resolution-bef-5c20ee61</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21420%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f05058703ef3fc985e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21419-cwe-59-improper-link-resolution-bef-1b6db11d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21419%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f05058703ef3fc985e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21418-cwe-122-heap-based-buffer-overflow--544f43cf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21418%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68881726ad5a09ad0088bbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21391-cwe-59-improper-link-resolution-bef-6744ec94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21391%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68881726ad5a09ad0088bbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21183-cwe-415-double-free-in-microsoft-wi-a0d24234</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21183%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69432efa058703ef3fc97f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21182-cwe-415-double-free-in-microsoft-wi-751a9027</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21182%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69432efa058703ef3fc97f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21383-cwe-125-out-of-bounds-read-in-micro-afdb624b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21383%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f02058703ef3fc98571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21379-cwe-416-use-after-free-in-microsoft-438b6af3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21379%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69432f02058703ef3fc9856b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21376-cwe-362-concurrent-execution-using--d159869a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21376%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f02058703ef3fc98565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21375-cwe-20-improper-input-validation-in-04f05043</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21375%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f02058703ef3fc98562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21369-cwe-122-heap-based-buffer-overflow--e73a8d9d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21369%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f02058703ef3fc98557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21368-cwe-122-heap-based-buffer-overflow--9a835bb5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21368%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f00058703ef3fc9802c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21352-cwe-400-uncontrolled-resource-consu-3b8fe767</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21352%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69432f00058703ef3fc9801d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21351-cwe-400-uncontrolled-resource-consu-cfa72f53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21351%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69432f00058703ef3fc9801a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21206-cwe-427-uncontrolled-search-path-el-2b34bbb4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21206%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=69432efc058703ef3fc97fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21188-cwe-59-improper-link-resolution-bef-1164187a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21188%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20Network%20Watcher%20VM%20Extension&amp;severity=medium&amp;id=69432efc058703ef3fc97f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24414-cross-site-scripting-stored-xss-cwe-aa5ac732</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24414%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d66277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24434-incorrect-authorization-cwe-863-in--5cc72c55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24434%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=critical&amp;id=69a0a45785912abc71d66289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24415-cross-site-scripting-stored-xss-cwe-2f733d3b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24415%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d6627a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24411-improper-access-control-cwe-284-in--a87c1be2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24411%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45585912abc71d65d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24416-cross-site-scripting-stored-xss-cwe-6bf9348d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24416%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d6627d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24413-cross-site-scripting-stored-xss-cwe-e7ccf5ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24413%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d66273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24438-cross-site-scripting-stored-xss-cwe-7c3be1eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24438%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d6628c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24418-improper-authorization-cwe-285-in-a-70c558a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24418%3A%20Improper%20Authorization%20(CWE-285)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d66283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24417-cross-site-scripting-stored-xss-cwe-cdf1f1d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24417%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d66280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24412-cross-site-scripting-stored-xss-cwe-15783af1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24412%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45585912abc71d65d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24410-cross-site-scripting-stored-xss-cwe-2c8c9e7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24410%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45585912abc71d65d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21160-integer-underflow-wrap-or-wraparoun-aed5dde0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21160%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69a0a44f85912abc71d652cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21163-stack-based-buffer-overflow-cwe-121-3305ea07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21163%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69a0a45185912abc71d65647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21159-use-after-free-cwe-416-in-adobe-ill-ed1c99dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21159%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69a0a44f85912abc71d652cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21156-integer-underflow-wrap-or-wraparoun-6bf77e6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21156%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69a0a44f85912abc71d652c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21158-integer-underflow-wrap-or-wraparoun-a37b26b9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21158%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a44f85912abc71d652c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21157-out-of-bounds-write-cwe-787-in-adob-c44f1baf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21157%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a44f85912abc71d652c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12756-cwe-1287-in-avaya-avaya-spaces-04bd0339</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12756%3A%20CWE-1287%20in%20Avaya%20Avaya%20Spaces&amp;severity=high&amp;id=68e0f3c3b66c7f7acdd3e9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24472-execute-unauthorized-code-or-comman-cf355135</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24472%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiProxy&amp;severity=high&amp;id=68881727ad5a09ad0088bc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27781-execute-unauthorized-code-or-comman-9275f537</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27781%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a2148330e0671671d0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50567-execute-unauthorized-code-or-comman-132490ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50567%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69a0a44485912abc71d63134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35279-execute-unauthorized-code-or-comman-1443be00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35279%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=69a0a43d85912abc71d62492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40591-escalation-of-privilege-in-fortinet-73216677</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40591%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=69a0a43d85912abc71d6249b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50569-execute-unauthorized-code-or-comman-474d8058</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50569%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69a0a44485912abc71d63137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10644-cwe-94-improper-control-of-generati-ae87405d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10644%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ivanti%20Connect%20Secure&amp;severity=critical&amp;id=69a0a43885912abc71d61ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22467-cwe-121-stack-based-buffer-overflow-0707e2c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22467%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Ivanti%20Connect%20Secure&amp;severity=critical&amp;id=69a0a45385912abc71d656aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47908-cwe-78-improper-neutralization-of-s-18444143</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47908%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Cloud%20Services%20Application&amp;severity=critical&amp;id=69a0a44085912abc71d63042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13506-cwe-79-improper-neutralization-of-i-83dfa0ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paoltaia%20GeoDirectory%20%E2%80%93%20WP%20Business%20Directory%20Plugin%20and%20Classified%20Listings%20Directory&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59eeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0862-cwe-79-improper-neutralization-of-in-7048e759</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supersaas%20SuperSaaS%20%E2%80%93%20online%20appointment%20scheduling&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23363-cwe-601-url-redirection-to-untruste-666945b9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23363%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Siemens%20Teamcenter%20V14.1&amp;severity=high&amp;id=68487f551b0bd07c3938a245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54015-cwe-1392-use-of-default-credentials-in-siemens-siprotec-5-6md84-cp300-bd66df</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54015%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=high&amp;id=682d9816c4522896dcbd66df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53648-cwe-489-active-debug-code-in-siemen-77e77ea5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53648%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=medium&amp;id=6913a08cf4d5bbdab5b1c78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26411-cwe-434-unrestricted-upload-of-file-957c52f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26411%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Wattsense%20Wattsense%20Bridge&amp;severity=high&amp;id=69091e18c28fd46ded869883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26410-cwe-798-use-of-hard-coded-credentia-224292d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26410%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Wattsense%20Wattsense%20Bridge&amp;severity=critical&amp;id=69091e18c28fd46ded86987d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26409-cwe-1299-missing-protection-mechani-e88bd6c0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26409%3A%20CWE-1299%20Missing%20Protection%20Mechanism%20for%20Alternate%20Hardware%20Interface%20in%20Wattsense%20Wattsense%20Bridge&amp;severity=medium&amp;id=69091e18c28fd46ded869877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26408-cwe-1191-on-chip-debug-and-test-int-2d6f5740</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26408%3A%20CWE-1191%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Wattsense%20Wattsense%20Bridge&amp;severity=medium&amp;id=69091e18c28fd46ded869871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1181-memory-corruption-in-gnu-binutils-befae5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1181%3A%20Memory%20Corruption%20in%20GNU%20Binutils&amp;severity=medium&amp;id=682d983ec4522896dcbefae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13643-cwe-862-missing-authorization-in-mv-ff62438b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13643%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20Zox%20News%20-%20Professional%20WordPress%20News%20%26%20Magazine%20Theme&amp;severity=high&amp;id=699f6e64b7ef31ef0b59fde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52612-cwe-79-improper-neutralization-of-i-f2a001bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Platform&amp;severity=medium&amp;id=69a0a44485912abc71d6313d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0181-cwe-288-authentication-bypass-using--ea901b43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0181%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Chimpstudio%20WP%20Foodbakery&amp;severity=critical&amp;id=699f6b67b7ef31ef0b555089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0180-cwe-269-improper-privilege-managemen-d52f1364</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0180%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Chimpstudio%20WP%20Foodbakery&amp;severity=critical&amp;id=699f6b67b7ef31ef0b555081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12599-cwe-79-improper-neutralization-of-i-727cad8a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12599%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%20%26%20Template%20Builder&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c01d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1144-cwe-497-exposure-of-sensitive-system-76dac808</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1144%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Quanxun%20School%20Affairs%20System&amp;severity=critical&amp;id=68ae12eaad5a09ad005b319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57000-b0b20448</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57000&amp;severity=null&amp;id=699f6bd4b7ef31ef0b55b492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-11-2d5a1b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-11&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d5a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-11-f12a0e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24016-cwe-502-deserialization-of-untruste-c86cccb8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24016%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wazuh%20wazuh&amp;severity=critical&amp;id=68487f501b0bd07c39389a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24200-a-physical-attack-may-disable-usb-r-122136a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24200%3A%20A%20physical%20attack%20may%20disable%20USB%20Restricted%20Mode%20on%20a%20locked%20device.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68881727ad5a09ad0088bc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10649-cwe-306-missing-authentication-for--74ee2ac5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10649%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20wandb%20wandb%2Fopenui&amp;severity=medium&amp;id=68ef9b22178f764e1f470a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13010-cwe-79-improper-neutralization-of-i-fa1983fd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13010%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chimpstudio%20WP%20Foodbakery&amp;severity=medium&amp;id=699f6e4cb7ef31ef0b59c7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13011-cwe-434-unrestricted-upload-of-file-83e87d0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13011%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Chimpstudio%20WP%20Foodbakery&amp;severity=critical&amp;id=699f6e4cb7ef31ef0b59c7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27859-processing-web-content-may-lead-to--8c55e413</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27859%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb827e6bfc5ba1df6e8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54658-processing-web-content-may-lead-to--459159e4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54658%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21693-vulnerability-in-linux-linux-be9832</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21692-vulnerability-in-linux-linux-be982a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe982a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21691-vulnerability-in-linux-linux-be9822</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21690-vulnerability-in-linux-linux-be980d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe980d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21689-vulnerability-in-linux-linux-be9809</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21689%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21688-vulnerability-in-linux-linux-be9805</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21687-vulnerability-in-linux-linux-be97f8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21686-aeb102</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21686&amp;severity=low&amp;id=682cd0f71484d88663aeb102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57950-vulnerability-in-linux-linux-bdeb5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24032-cwe-287-improper-authentication-in-opensc-pam-pkcs11-c0b1a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24032%3A%20CWE-287%3A%20Improper%20Authentication%20in%20OpenSC%20pam_pkcs11&amp;severity=critical&amp;id=682df6dbc4522896dcc0b1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12243-inefficient-algorithmic-complexity-aecbc7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12243%3A%20Inefficient%20Algorithmic%20Complexity&amp;severity=medium&amp;id=682cd0fc1484d88663aecbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12133-inefficient-algorithmic-complexity-b3ca1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12133%3A%20Inefficient%20Algorithmic%20Complexity&amp;severity=medium&amp;id=682d0e424d7c5ea9f4b3ca1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11831-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-24150d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11831%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=682d68e7d4f2164cc924150d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57177-na-f9951c5b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57177%3A%20n%2Fa&amp;severity=high&amp;id=6942d536b2cbfb3efaa86df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-10-71c2de23</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-10&amp;severity=medium&amp;id=68359c9d5d5f0974d01f5470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-10-f1d29d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-10&amp;severity=medium&amp;id=682acdc3bbaf20d303f1d29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-10-f1234a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f1234a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21685-vulnerability-in-linux-linux-be97f4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe97f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21684-vulnerability-in-linux-linux-be97f0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21684%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe97f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57949-vulnerability-in-linux-linux-bdd212</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-09-2d7529</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-09&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d7529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-09-f13156</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-09&amp;severity=medium&amp;id=682acdc2bbaf20d303f13156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0169-cwe-79-improper-neutralization-of-in-02f0f2a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0169%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scriptsbundle%20DWT%20-%20Directory%20%26%20Listing%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b67b7ef31ef0b55506c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0316-cwe-288-authentication-bypass-using--6f7a5472</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0316%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Chimpstudio%20WP%20Directorybox%20Manager&amp;severity=critical&amp;id=699f6b67b7ef31ef0b55511b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13850-cwe-79-improper-neutralization-of-i-b3ceea96</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13850%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ramon-fincken%20Simple%20add%20pages%20or%20posts&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-08-2d6782</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-08&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d6782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-08-f1314e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-08&amp;severity=medium&amp;id=682acdc2bbaf20d303f1314e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24980-cwe-204-observable-response-discrep-4290d5d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24980%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20pimcore%20admin-ui-classic-bundle&amp;severity=medium&amp;id=696a7724b22c7ad868c428a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7425-cwe-94-improper-control-of-generatio-1a194f4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7425%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WP%20All%20Import%20WP%20All%20Export%20Pro&amp;severity=medium&amp;id=699f6c18b7ef31ef0b55fd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9661-cwe-352-cross-site-request-forgery-c-3691799f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9661%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Soflyy%20WP%20All%20Import%20Pro&amp;severity=medium&amp;id=699f6b56b7ef31ef0b55313f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7419-cwe-94-improper-control-of-generatio-fdc81f56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7419%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WP%20All%20Import%20WP%20All%20Export%20Pro&amp;severity=high&amp;id=699f6c16b7ef31ef0b55fcd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9664-cwe-502-deserialization-of-untrusted-ee4b0acd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9664%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Soflyy%20WP%20All%20Import%20Pro&amp;severity=high&amp;id=699f6b59b7ef31ef0b554792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25167-missing-authorization-in-black-and--9f8044a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25167%3A%20Missing%20Authorization%20in%20Black%20and%20White%20BookPress%20%E2%80%93%20For%20Book%20Authors&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25168-cross-site-request-forgery-csrf-in--0cc2b977</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25168%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Black%20and%20White%20BookPress%20%E2%80%93%20For%20Book%20Authors&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25166-cross-site-request-forgery-csrf-in--7bd2b0d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25166%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gabrieldarezzo%20InLocation&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25163-improper-limitation-of-a-pathname-t-70b171e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25163%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zach%20Swetz%20Plugin%20A%2FB%20Image%20Optimizer&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25155-improper-limitation-of-a-pathname-t-a823cf94</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25155%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20efreja%20Music%20Sheet%20Viewer&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25154-cross-site-request-forgery-csrf-in--4a21d4bc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25154%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scweber%20Custom%20Comment%20Notifications&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25159-improper-neutralization-of-input-du-854bc23b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25159%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robert_kolatzek%20WP%20doodlez&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeaea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25160-cross-site-request-forgery-csrf-in--4c89e24f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25160%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mark%20Barnes%20Style%20Tweaker&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25152-cross-site-request-forgery-csrf-in--367441fe</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25152%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LukaszWiecek%20Smart%20DoFollow&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25156-cross-site-request-forgery-csrf-in--7b74f30f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25156%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stanko%20Metodiev%20Quote%20Comments&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25153-cross-site-request-forgery-csrf-in--696d63eb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25153%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20djjmz%20Simple%20Auto%20Tag&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25151-improper-neutralization-of-special--ee2ad124</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25151%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20uListing&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25149-cross-site-request-forgery-csrf-in--2c05095f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25149%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Danillo%20Nunes%20Login-box&amp;severity=null&amp;id=69cd7291e6bfc5ba1deeada7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25141-improper-control-of-filename-for-in-49e86af6</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25141%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zankover%20Fami%20Sales%20Popup&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25143-cross-site-request-forgery-csrf-in--0b74f16e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25143%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ibasit%20GlobalQuran&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25147-cross-site-request-forgery-csrf-in--fe53a74b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25147%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Phillip.Gooch%20Auto%20SEO&amp;severity=null&amp;id=69cd7291e6bfc5ba1deeada1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25138-cross-site-request-forgery-csrf-in--3969a96c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25138%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rishi%20On%20Page%20SEO%20%2B%20Whatsapp%20Chat%20Button&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25135-cross-site-request-forgery-csrf-in--c2e0fa4b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25135%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Victor%20Barkalov%20Custom%20Links%20On%20Admin%20Dashboard%20Toolbar&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25148-cross-site-request-forgery-csrf-in--ecbc0e98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25148%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ElbowRobo%20Read%20More%20Copy%20Link&amp;severity=null&amp;id=69cd7291e6bfc5ba1deeada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25140-cross-site-request-forgery-csrf-in--0f1ebfd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25140%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Scriptonite%20Simple%20User%20Profile&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25139-cross-site-request-forgery-csrf-in--b94187a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25139%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cynob%20IT%20Consultancy%20WP%20Custom%20Post%20RSS%20Feed&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25145-cross-site-request-forgery-csrf-in--5a46b55a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25145%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jordan.hatch%20Infusionsoft%20Analytics&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25136-improper-neutralization-of-input-du-08f3ce1e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25136%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shujahat21%20Optimate%20Ads&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25146-cross-site-request-forgery-csrf-in--1bd9c1d6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25146%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20saleandro%20Songkick%20Concerts%20and%20Festivals&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25128-cross-site-request-forgery-csrf-in--b4cb2be0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25128%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20orlandolac%20Facilita%20Form%20Tracker&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeace4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25123-cross-site-request-forgery-csrf-in--342a7ba2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25123%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xdark%20Easy%20Related%20Posts&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25125-cross-site-request-forgery-csrf-in--14c4e2f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25125%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CyrilG%20Fyrebox%20Quizzes&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25116-improper-neutralization-of-special--c4c027e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25116%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sudipto%20Link%20to%20URL%20%2F%20Post&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25117-improper-neutralization-of-input-du-ef3af354</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25117%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Polonski%20Smart%20Countdown%20FX&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25120-missing-authorization-in-melodic-me-b5875843</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25120%3A%20Missing%20Authorization%20in%20Melodic%20Media%20Slide%20Banners&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25103-cross-site-request-forgery-csrf-in--184a3a8e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25103%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bnielsen%20Indeed%20API&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25105-improper-neutralization-of-input-du-04387dcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25105%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coffeestudios%20Pop%20Up&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25101-cross-site-request-forgery-csrf-in--f4b783f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25101%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MetricThemes%20Munk%20Sites&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25107-cross-site-request-forgery-csrf-in--cbc5106b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25107%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sainwp%20OneStore%20Sites&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25106-cross-site-request-forgery-csrf-in--de73248e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25106%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FancyWP%20Starter%20Templates%20by%20FancyWP&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25097-improper-neutralization-of-input-du-6c87caf5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25097%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kwiliarty%20External%20Video%20For%20Everybody&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeaba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25088-cross-site-request-forgery-csrf-in--494b1708</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25088%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blackus3r%20WP%20Keyword%20Monitor&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25110-missing-authorization-in-metagauss--f74916a6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25110%3A%20Missing%20Authorization%20in%20Metagauss%20Event%20Kikfyre&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25081-missing-authorization-in-deannas-em-89d18005</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25081%3A%20Missing%20Authorization%20in%20DeannaS%20Embed%20RSS&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25104-cross-site-request-forgery-csrf-in--78bb1893</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25104%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mraliende%20URL-Preview-Box&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25093-cross-site-request-forgery-csrf-in--9a656e3e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25093%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20paulswarthout%20Child%20Themes%20Helper&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25095-improper-neutralization-of-input-du-538639be</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25095%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reverbnationdev%20ReverbNation%20Widgets&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25096-improper-neutralization-of-input-du-0982439d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20titusbicknell%20RSS%20in%20Page&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeab9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25085-improper-neutralization-of-input-du-9098889b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matt_mcbrien%20WP%20SimpleWeather&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25071-cross-site-request-forgery-csrf-in--2f0c7738</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25071%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20topplugins%20Vignette%20Ads&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25094-improper-neutralization-of-input-du-5c8e6e57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amitythemes.com%20Breaking%20News%20Ticker&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25080-improper-neutralization-of-input-du-f459f1b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25080%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gubbigubbi%20Kona%20Gallery%20Block&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25077-improper-neutralization-of-input-du-1b96321a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25077%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dugbug%20Easy%20Chart%20Builder%20for%20WordPress&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25075-cross-site-request-forgery-csrf-in--e0aa9a3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25075%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Venugopal%20Show%20notice%20or%20message%20on%20admin%20area&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25078-improper-neutralization-of-input-du-b206f83c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25078%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andrew%20Norcross%20Google%20Earth%20Embed&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25074-cross-site-request-forgery-csrf-in--6f2dc822</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25074%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nirmal%20Kumar%20Ram%20WP%20Social%20Stream&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25079-improper-neutralization-of-input-du-42f5e38f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25079%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Garrett%20Grimm%20Simple%20Select%20All%20Text%20Box&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25098-improper-neutralization-of-input-du-e7cb0bf7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zack%20Katz%20Links%20in%20Captions&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeaba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25073-improper-neutralization-of-input-du-f74edbcc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25073%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vasilis%20Triantafyllou%20Easy%20WP%20Tiles&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25082-improper-neutralization-of-input-du-f3edf623</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25082%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Max%20Chirkov%20FlexIDX%20Home%20Search&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25072-cross-site-request-forgery-csrf-in--7f2bc69a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25072%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20thunderbax%20WP%20Admin%20Custom%20Page&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25091-improper-neutralization-of-input-du-e39cfa15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zackdesign%20NextGen%20Cooliris%20Gallery&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25076-improper-neutralization-of-input-du-c1671777</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicholaswilson%20Graceful%20Email%20Obfuscation&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23085-vulnerability-in-nodejs-node-bed62c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23085%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13841-cwe-639-authorization-bypass-throug-851d7273</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13841%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20daveshine%20Builder%20Shortcode%20Extras%20%E2%80%93%20WordPress%20Shortcodes%20Collection%20to%20Save%20You%20Time&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56dde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13352-cwe-79-cross-site-scripting-xss-in--188bd700</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13352%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Legull&amp;severity=high&amp;id=696166b3047de42cfc9dfbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1061-cwe-288-authentication-bypass-using--cab36140</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1061%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20nextendweb%20Nextend%20Social%20Login%20Pro&amp;severity=critical&amp;id=699f6b0db7ef31ef0b54d967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-07-2d6c5f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-07&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d6c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-07-f12413</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21342-cwe-843-access-of-resource-using-in-05f10f39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21342%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=69432efe058703ef3fc97ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21408-cwe-843-access-of-resource-using-in-34cda5e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21408%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=69432f05058703ef3fc985d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21283-cwe-1222-insufficient-granularity-o-13dba3cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21283%3A%20CWE-1222%3A%20Insufficient%20Granularity%20of%20Address%20Regions%20Protected%20by%20Register%20Locks%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69432efe058703ef3fc97feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21253-cwe-451-user-interface-ui-misrepres-c0f4df47</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21253%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=69432efe058703ef3fc97fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21177-cwe-918-server-side-request-forgery-96676cd6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21177%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Dynamics%20365%20Sales&amp;severity=high&amp;id=69432efa058703ef3fc97f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21279-cwe-843-access-of-resource-using-in-a07310b4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21279%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69432efe058703ef3fc97fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21267-cwe-358-improperly-implemented-secu-6fd9e2c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21267%3A%20CWE-358%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69432efe058703ef3fc97fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21404-cwe-449-the-ui-performs-the-wrong-a-67635379</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21404%3A%20CWE-449%3A%20The%20UI%20Performs%20the%20Wrong%20Action%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69432f03058703ef3fc9859f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47258-cwe-295-improper-certificate-valida-a44a5089</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47258%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%202N%202N%20Access%20Commander&amp;severity=high&amp;id=696109bd7a8fb5c58f6e7c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47256-cwe-321-use-of-hard-coded-cryptogra-5ae24490</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47256%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%202N%202N%20Access%20Commander&amp;severity=medium&amp;id=696109bd7a8fb5c58f6e7c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13417-cwe-248-uncaught-exception-in-2n-2n-22efba1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13417%3A%20CWE-248%3A%20Uncaught%20Exception%20in%202N%202N%20OS&amp;severity=medium&amp;id=696109bd7a8fb5c58f6e7c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13416-cwe-532-insertion-of-sensitive-info-46b157a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13416%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%202N%202N%20OS&amp;severity=medium&amp;id=696109bd7a8fb5c58f6e7c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0994-cwe-502-deserialization-of-untrusted-a9c9a49b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0994%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Trimble%20Cityworks&amp;severity=high&amp;id=68881726ad5a09ad0088bbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0859-cwe-22-improper-limitation-of-a-path-58287c71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0859%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20boldgrid%20Post%20and%20Page%20Builder%20by%20BoldGrid%20%E2%80%93%20Visual%20Drag%20and%20Drop%20Editor&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13487-cwe-94-improper-control-of-generati-b4bd5d2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13487%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20villatheme%20CURCY%20%E2%80%93%20Multi%20Currency%20for%20WooCommerce%20%E2%80%93%20Smoothly%20on%20WooCommerce%209.x&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51547-cwe-312-cleartext-storage-of-sensitive-information-in-abb-aspect-enterprise-264656</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51547%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20ABB%20ASPECT-Enterprise&amp;severity=critical&amp;id=682f6b520acd01a249264656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-06-16a69c03</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-06&amp;severity=medium&amp;id=68359c9a5d5f0974d01e1095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-06-f13aa7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-06&amp;severity=medium&amp;id=682acdc2bbaf20d303f13aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-06-f12509</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f12509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-06-6e27d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-06&amp;severity=medium&amp;id=6828eab8e1a0c275ea6e27d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7596-cwe-290-authentication-bypass-by-spo-b8adbdbe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7596%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20IETF%20draft-ietf-intarea-gue-09&amp;severity=medium&amp;id=69091a47c28fd46ded81cf2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7595-cwe-290-authentication-bypass-by-spo-be0cb818</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7595%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20IETF%20RFC2784%20-%20Generic%20Routing%20Encapsulation%20(GRE)&amp;severity=medium&amp;id=69091a47c28fd46ded81cf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23419-cwe-287-improper-authentication-in--0343618b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23419%3A%20CWE-863%20Incorrect%20Authorization%20in%20F5%20NGINX%20Open%20Source&amp;severity=medium&amp;id=69091a4fc28fd46ded81d16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20029-cwe-78-improper-neutralization-of-s-a67261e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20029%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=69a0a44b85912abc71d64b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24320-cwe-79-improper-neutralization-of-i-4d607a38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=69a0a45385912abc71d656bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23239-cwe-77-improper-neutralization-of-s-a7a6a008</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23239%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=69814899f9fa50a62f6fcdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20124-deserialization-of-untrusted-data-i-e9726ca0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20124%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69a0a44b85912abc71d64b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-malicious-hwp-cases-of-apt37-group-dis-0b26c084</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20malicious%20HWP%20cases%20of%20&apos;APT37&apos;%20group%20distributed%20through%20K%20messenger&amp;severity=medium&amp;id=68a866f3ad5a09ad001ee057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52925-vulnerability-in-linux-linux-bdd8ad</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52924-vulnerability-in-linux-linux-be792c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe792c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13829-cwe-200-exposure-of-sensitive-infor-c520e4dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13829%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tripetto%20WordPress%20form%20builder%20plugin%20for%20contact%20forms%2C%20surveys%20and%20quizzes%20%E2%80%93%20Tripetto&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1028-cwe-434-unrestricted-upload-of-file--d31ffdf5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1028%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kleor%20Contact%20Manager&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57520-na-30df39bf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57520%3A%20n%2Fa&amp;severity=critical&amp;id=690ca00948bc5002b401c23c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-05-2d69ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-05&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d69ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-05-f11fbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13722-cwe-79-improper-neutralization-of-i-cefe327a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20NagVis&amp;severity=medium&amp;id=690904b000ff46172d4a0e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13723-cwe-434-unrestricted-upload-of-file-b8166dad</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13723%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Checkmk%20NagVis&amp;severity=high&amp;id=690904b000ff46172d4a0e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0364-cwe-288-authentication-bypass-using--111b8f5f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0364%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20BigAntSoft%20BigAnt%20Server&amp;severity=critical&amp;id=691e29f04d0ffcb40bb6a615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9644-cwe-489-active-debug-code-in-four-fa-221d610c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9644%3A%20CWE-489%20Active%20Debug%20Code%20in%20Four-Faith%20F3x36&amp;severity=critical&amp;id=691e29f04d0ffcb40bb6a612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9643-cwe-489-active-debug-code-in-four-fa-63472ce1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9643%3A%20CWE-489%20Active%20Debug%20Code%20in%20Four-Faith%20F3x36&amp;severity=critical&amp;id=692136eec842cd8eff5f2700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23690-cwe-78-improper-neutralization-of-s-b8aab35d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23690%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Netgear%20FVS336Gv3&amp;severity=high&amp;id=6921acbf8e780dcd644b6535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22794-improper-neutralization-of-input-du-b03edf99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22794%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ianhaycox%20World%20Cup%20Predictor&amp;severity=null&amp;id=69cd7610e6bfc5ba1df09395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22730-missing-authorization-in-ksher-thai-a2b997c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22730%3A%20Missing%20Authorization%20in%20ksher%20thailand%20Ksher&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22675-improper-neutralization-of-input-du-3cb5ec0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22675%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Alert%20Box%20Block%20%E2%80%93%20Display%20notice%2Falerts%20in%20the%20front%20end&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22674-improper-neutralization-of-input-du-c7e5f32a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Get%20Bowtied%20Product%20Blocks%20for%20WooCommerce&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22664-improper-neutralization-of-input-du-d10f0bfb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22664%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22662-improper-neutralization-of-input-du-4041235f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22662%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SendPulse%20SendPulse%20Email%20Marketing%20Newsletter&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22653-improper-neutralization-of-input-du-3abb3139</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22653%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tuyennv%20Music%20Press%20Pro&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22643-missing-authorization-in-famethemes-43e3771d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22643%3A%20Missing%20Authorization%20in%20famethemes%20OnePress&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22642-improper-neutralization-of-input-du-06770b5f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22642%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rtowebsites%20Dynamic%20Conditions&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22641-improper-neutralization-of-input-du-0f95e891</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22641%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Prem%20Tiwari%20FM%20Notification%20Bar&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24677-improper-control-of-generation-of-c-2eca4784</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24677%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpspin%20Post%2FPage%20Copying%20Tool&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24648-incorrect-privilege-assignment-in-b-92fa2bed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24648%3A%20Incorrect%20Privilege%20Assignment%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24602-improper-neutralization-of-input-du-d3a1ddd6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24602%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP24%20WP24%20Domain%20Check&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24599-improper-neutralization-of-input-du-0016ae96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tribulant%20Software%20Newsletters&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24598-improper-neutralization-of-input-du-33d29ebd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee953f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23645-improper-neutralization-of-input-du-a186c75a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23645%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Optimize%20Worldwide%20Find%20Content%20IDs&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22700-improper-neutralization-of-special--589f784a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22700%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler%20Code&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22699-improper-neutralization-of-special--1a22d4d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22699%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler%20Code&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22697-improper-neutralization-of-input-du-1c3478b0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22697%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22696-missing-authorization-in-wpdevelope-b0196978</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22696%3A%20Missing%20Authorization%20in%20WPDeveloper%20Document%20Block%20%E2%80%93%20Upload%20%26%20Embed%20Docs&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0825-cwe-113-improper-neutralization-of-crlf-sequences-in-http-headers-http-request-response-splitting-27255a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0825%3A%20CWE-113%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)&amp;severity=medium&amp;id=683072f40acd01a24927255a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1015-vulnerability-in-mozilla-thunderbird-026e550c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1015%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=69dd057382d89c981f016f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1020-vulnerability-in-mozilla-firefox-b70f0c45</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1020%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69dd057382d89c981f016fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1017-memory-safety-bugs-fixed-in-firefox--0e92a2a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1017%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a49c28fd46ded81d027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1016-memory-safety-bugs-fixed-in-firefox--0cc67c68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1016%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a49c28fd46ded81d01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0510-vulnerability-in-mozilla-thunderbird-7d8c9803</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0510%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=69dd057382d89c981f016f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1014-certificate-length-was-not-properly--a7819098</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1014%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a49c28fd46ded81d016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1013-potential-opening-of-private-browsin-cc49c29c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1013%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69091a49c28fd46ded81d00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1019-vulnerability-in-mozilla-firefox-23254984</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1019%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69dd057382d89c981f016f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1012-use-after-free-during-concurrent-del-2885bed9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1012%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a47c28fd46ded81cf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1011-a-bug-in-webassembly-code-generation-52ca3cdf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1011%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a47c28fd46ded81cf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1018-vulnerability-in-mozilla-firefox-56dcfd95</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1018%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69dd057382d89c981f016f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1010-use-after-free-in-custom-highlight-i-09bf6e6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1010%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a47c28fd46ded81cf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1009-use-after-free-in-xslt-in-mozilla-fi-eb53e0bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1009%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a47c28fd46ded81cf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13699-cwe-79-improper-neutralization-of-i-93dd777e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13699%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40891-cwe-78-improper-neutralization-of-s-3dd50ba3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40891%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20VMG4325-B10A%20firmware&amp;severity=high&amp;id=68f7d9b4247d717aace26a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40890-cwe-78-improper-neutralization-of-s-4af17e14</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40890%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20VMG4325-B10A%20firmware&amp;severity=high&amp;id=68f7d9b4247d717aace26a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13529-cwe-862-missing-authorization-in-iq-c6c1ec65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13529%3A%20CWE-862%20Missing%20Authorization%20in%20iqonicdesign%20SocialV%20-%20Social%20Network%20and%20Community%20BuddyPress%20Theme&amp;severity=medium&amp;id=699f6e5eb7ef31ef0b59effd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13733-cwe-79-improper-neutralization-of-i-9033342b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13733%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks%20%E2%80%93%20Gutenberg%20based%20Page%20Builder&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13356-cwe-352-cross-site-request-forgery--89a227cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13356%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mlfactory%20DSGVO%20All%20in%20one%20for%20WP&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13403-cwe-79-improper-neutralization-of-i-96d65205</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13403%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20WPForms%20%E2%80%93%20Easy%20Form%20Builder%20for%20WordPress%20%E2%80%93%20Contact%20Forms%2C%20Payment%20Forms%2C%20Surveys%2C%20%26%20More&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12046-cwe-639-authorization-bypass-throug-1e299578</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12046%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nicheaddons%20Medical%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13514-cwe-284-improper-access-control-in--a12273dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13514%3A%20CWE-284%20Improper%20Access%20Control%20in%20bplugins%20bSlider%20%E2%80%93%20Create%20Responsive%20Image%2C%20Post%2C%20Product%2C%20and%20Video%20Sliders&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13607-cwe-639-authorization-bypass-throug-aa5a0528</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13607%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20rabilal%20JS%20Help%20Desk%20%E2%80%93%20AI-Powered%20Support%20%26%20Ticketing%20System&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59f5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12597-cwe-79-improper-neutralization-of-i-a5df7df6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12597%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%20%26%20Template%20Builder&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0466-cwe-862-missing-authorization-in-sen-06796aad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0466%3A%20CWE-862%20Missing%20Authorization%20in%20Sensei%20LMS&amp;severity=medium&amp;id=68aef76ead5a09ad0061da15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-04-2d804d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-04&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d804d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-04-f12954</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24902-cwe-89-improper-neutralization-of-s-c60ce45e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24902%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68a8d773ad5a09ad00225db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12859-cwe-98-improper-control-of-filename-3ae0fad7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12859%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PX-lab%20BoomBox%20Theme%20Extensions&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11134-cwe-862-missing-authorization-in-im-29116d6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11134%3A%20CWE-862%20Missing%20Authorization%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11132-cwe-79-improper-neutralization-of-i-5b49ef80</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11133-cwe-862-missing-authorization-in-im-630dc971</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11133%3A%20CWE-862%20Missing%20Authorization%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49837-cwe-129-improper-validation-of-arra-3abcb295</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49837%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44485912abc71d63131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45569-cwe-129-improper-validation-of-arra-af7367e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45569%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=69a0a43f85912abc71d63033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24661-cwe-502-deserialization-of-untrusted-data-in-magepeople-team-taxi-booking-manager-for-woocommerce-aeb587</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24661%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Taxi%20Booking%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23984-improper-neutralization-of-input-du-21da8f4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainvireinfo%20Dynamic%20URL%20SEO&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee913f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22775-improper-neutralization-of-input-du-7ea78c3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22775%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20idiatech%20Catalog%20Importer%2C%20Scraper%20%26%20Crawler&amp;severity=null&amp;id=69cd760be6bfc5ba1df091d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22704-improper-neutralization-of-input-du-6068c9a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Abinav%20Thakuri%20WordPress%20Signature&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22703-cross-site-request-forgery-csrf-in--c3d7765d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22703%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20manuelvicedo%20Forge%20%E2%80%93%20Front-End%20Page%20Builder&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22701-server-side-request-forgery-ssrf-in-63e31a50</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22701%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20shinetheme%20Traveler%20Layout%20Essential%20For%20Elementor&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22695-authorization-bypass-through-user-c-80e5c8fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22695%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20NirWp%20Team%20Nirweb%20support&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22694-missing-authorization-in-dotstore-h-22a904b0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22694%3A%20Missing%20Authorization%20in%20Dotstore%20Hide%20Shipping%20Method%20For%20WooCommerce&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22693-improper-neutralization-of-special--54cb26fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22693%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22690-cross-site-request-forgery-csrf-in--93a6722f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22690%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DigiTimber%20DigiTimber%20cPanel%20Integration&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22688-cross-site-request-forgery-csrf-in--4e368496</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22688%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ederson%20Peka%20Unlimited%20Page%20Sidebars&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22686-missing-authorization-in-westerndea-72b18279</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22686%3A%20Missing%20Authorization%20in%20WesternDeal%20CF7%20Google%20Sheets%20Connector&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22685-cross-site-request-forgery-csrf-in--70960885</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22685%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CheGevara29%20Tags%20to%20Keywords&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22684-improper-neutralization-of-input-du-84c5c8b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22684%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hakan%20Ozevin%20WP%20BASE%20Booking&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22683-improper-neutralization-of-input-du-e9db2eb1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20NotificationX&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22682-improper-neutralization-of-input-du-89590c2e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22682%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saeed%20Sattar%20Beglou%20Hesabfa%20Accounting&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22681-missing-authorization-in-xfinitysof-a1ff4c52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22681%3A%20Missing%20Authorization%20in%20Xfinitysoft%20Content%20Cloner&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22679-improper-neutralization-of-input-du-0d9fd6c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22679%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22677-missing-authorization-in-uiux-lab-u-acc88fc6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22677%3A%20Missing%20Authorization%20in%20UIUX%20Lab%20Uix%20Shortcodes&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22292-improper-neutralization-of-input-du-684cb56e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Felipe%20Peixoto%20Powerful%20Auto%20Chat&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22260-missing-authorization-in-marcus-aka-17aaf447</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22260%3A%20Missing%20Authorization%20in%20Marcus%20(aka%20%40msykes)%20Meta%20Tag%20Manager&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50500-missing-authorization-in-averta-sho-e3c6e868</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50500%3A%20Missing%20Authorization%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=null&amp;id=69cd74fbe6bfc5ba1df020d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24707-improper-neutralization-of-input-du-5c98c131</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24707%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gt3themes%20Photo%20Gallery&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24697-missing-authorization-in-realwebcar-bffb7aa4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24697%3A%20Missing%20Authorization%20in%20Realwebcare%20Image%20Gallery%20%E2%80%93%20Responsive%20Photo%20Gallery&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24684-improper-neutralization-of-input-du-33b34c99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24684%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ederson%20Peka%20Media%20Downloader&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24676-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-umangmetatagg-custom-wp-store-locator-aeb522</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20umangmetatagg%20Custom%20WP%20Store%20Locator&amp;severity=null&amp;id=682cd0f81484d88663aeb522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24660-improper-neutralization-of-input-du-6fec856a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24660%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wp.insider%20Simple%20Membership%20Custom%20Messages&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24656-improper-neutralization-of-input-du-a0307dc4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24656%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Realtyna%20Realtyna%20Provisioning&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24646-improper-neutralization-of-input-du-80003c4a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20XML%20for%20Avito&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24643-missing-authorization-in-amentotech-48a374a9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24643%3A%20Missing%20Authorization%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=null&amp;id=69cd7273e6bfc5ba1dee9ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24642-missing-authorization-in-theme-fund-4c497649</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24642%3A%20Missing%20Authorization%20in%20theme%20funda%20Setup%20Default%20Featured%20Image&amp;severity=null&amp;id=69cd7273e6bfc5ba1dee9ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24639-insertion-of-sensitive-information--eabb7258</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24639%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Greys%20Korea%20for%20WooCommerce&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24631-improper-neutralization-of-input-du-dc9c15f5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanebp%20BP%20Email%20Assign%20Templates&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24630-improper-neutralization-of-input-du-e9047ccb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MantraBrain%20Sikshya%20LMS&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24629-improper-neutralization-of-input-du-69ff90de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpgear%20Import%20Excel%20to%20Gravity%20Forms&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24620-improper-neutralization-of-input-du-77f0badd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hkharpreetkumar1%20AIO%20Shortcodes&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24605-improper-limitation-of-a-pathname-t-be58ac93</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24605%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RealMag777%20WOLF&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24576-improper-neutralization-of-input-du-e28e3f63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Landing%20Page%20Cat&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24574-improper-neutralization-of-input-du-af8729bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pepro%20Dev.%20Group%20PeproDev%20WooCommerce%20Receipt%20Uploader&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24569-improper-limitation-of-a-pathname-t-6a29b1b1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24569%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RedefiningTheWeb%20PDF%20Generator%20Addon%20for%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24559-improper-neutralization-of-input-du-359051dc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24557-improper-neutralization-of-input-du-bdf81b23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plainware%20PlainInventory&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee9211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24556-insertion-of-sensitive-information--aeb164c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24556%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20DualCube%20MooWoodle&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee920e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24545-improper-neutralization-of-input-du-f5f8d117</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bannersky%20BSK%20Forms%20Validation&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24544-improper-neutralization-of-input-du-a45cc10c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dashed-slug.net%20Bitcoin%20and%20Altcoin%20Wallets&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24541-improper-neutralization-of-input-du-39ef36d4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dinamiko%20DK%20White%20Label&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23923-improper-neutralization-of-input-du-94fd7055</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wackey%20Lockets&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23920-improper-neutralization-of-input-du-81353b88</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sourcing%20Team%20ApplicantPro&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23819-improper-limitation-of-a-pathname-t-f32d65f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23819%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marco%20Milesi%20WP%20Cloud&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23799-improper-neutralization-of-input-du-fb186c62</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23799%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tubegtld%20.TUBE%20Video%20Curator&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee879e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23755-improper-neutralization-of-input-du-6970f462</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23755%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tosend.it%20PAFacile&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23747-improper-neutralization-of-input-du-b3d6cac8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23747%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nitesh%20Awesome%20Timeline&amp;severity=null&amp;id=69cd722de6bfc5ba1dee855c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23685-improper-neutralization-of-input-du-50825eb5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23685%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebTechGlobal%20RomanCart&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23614-improper-neutralization-of-input-du-4a3c7c98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20niksudan%20WordPress%20Additional%20Logins&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0abfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23599-improper-neutralization-of-input-du-b57cfe98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aarvansh%20Infotech%20eMarksheet&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23594-improper-neutralization-of-input-du-f842d050</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Uzzal%20Mondal%20Google%20Map%20With%20Fancybox&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23593-improper-neutralization-of-input-du-ac47c1ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kvvaradha%20EmailPress&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23591-improper-neutralization-of-input-du-cfecbd8b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23591%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blulogistics1%20blu%20Logistics&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23590-improper-neutralization-of-input-du-d0b2fc46</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dezdy.com%20Dezdy&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23588-improper-neutralization-of-input-du-6c236e0c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23588%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baonguyenyam%20WOW%20Best%20CSS%20Compiler&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23582-improper-neutralization-of-input-du-0ccbd36c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23582%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Haider%20Ali%20Bulk%20Categories%20Assign&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23581-improper-neutralization-of-input-du-94f4cdb3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digitalzoomstudio%20Demo%20User%20DZS&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23561-improper-neutralization-of-input-du-c0f6d8f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23561%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robertkay%20MLL%20Audio%20Player%20MP3%20Ajax&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23527-missing-authorization-in-hemnathmou-32f0d8b2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23527%3A%20Missing%20Authorization%20in%20hemnathmouli%20WC%20Wallet&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23491-improper-neutralization-of-input-du-bcba5eec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vikash%20Srivastava%20VSTEMPLATE%20Creator&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20634-cwe-787-out-of-bounds-write-in-medi-24cf9e46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20634%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6813%2C%20MT6835%2C%20MT6835T%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6886%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8795T%2C%20MT8798%2C%20MT8863&amp;severity=high&amp;id=6994829080d747be20bad133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25064-na-e27076cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25064%3A%20n%2Fa&amp;severity=high&amp;id=69a0a45985912abc71d662b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22978-na-0108ace2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22978%3A%20n%2Fa&amp;severity=critical&amp;id=696feab04623b1157c4e3b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52163-na-7d1d089f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52163%3A%20n%2Fa&amp;severity=high&amp;id=6949c5ae66e722bb4ce934e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57968-cwe-434-unrestricted-upload-of-file-cf309efa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57968%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Advantive%20VeraCore&amp;severity=critical&amp;id=68f7d9b6247d717aace26c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25181-cwe-89-improper-neutralization-of-s-0125e05a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25181%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantive%20VeraCore&amp;severity=medium&amp;id=68881728ad5a09ad0088bc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25062-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-backdropcms-backdrop-bd7b3f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20backdropcms%20backdrop&amp;severity=medium&amp;id=682d9818c4522896dcbd7b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-03-2d8337</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-03&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d8337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-03-f13aa5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-03&amp;severity=medium&amp;id=682acdc2bbaf20d303f13aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-02-7646c5e7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-02&amp;severity=medium&amp;id=68367c99182aa0cae232460f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13775-cwe-862-missing-authorization-in-va-63296ab9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13775%3A%20CWE-862%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Support%20Ticket%20System&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a0730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13612-cwe-79-improper-neutralization-of-i-9a7704fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordplus%20Better%20Messages%20%E2%80%93%20Live%20Chat%2C%20Chat%20Rooms%2C%20Real-Time%20Messaging%20%26%20Private%20Messages&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13372-cwe-639-authorization-bypass-throug-d5465626</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13372%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13371-cwe-862-missing-authorization-in-wp-7c9023e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13371%3A%20CWE-862%20Missing%20Authorization%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13428-cwe-639-authorization-bypass-throug-291d2b46</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13428%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13425-cwe-639-authorization-bypass-throug-044e06cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13425%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13429-cwe-639-authorization-bypass-throug-5bc075ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13429%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12825-cwe-862-missing-authorization-in-br-6dbbe302</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12825%3A%20CWE-862%20Missing%20Authorization%20in%20brechtvds%20Custom%20Related%20Posts&amp;severity=medium&amp;id=699f6e49b7ef31ef0b59c583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11829-cwe-79-improper-neutralization-of-i-d00c6b55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11829%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0939-cwe-862-missing-authorization-in-dco-147c0da0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0939%3A%20CWE-862%20Missing%20Authorization%20in%20dcooperman%20MagicForm&amp;severity=medium&amp;id=699f6b6db7ef31ef0b55557a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13341-cwe-89-improper-neutralization-of-s-fec3a3a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13341%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Techspawn%20MultiLoca%20-%20WooCommerce%20Multi%20Locations%20Inventory%20Management&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0365-cwe-22-improper-limitation-of-a-path-415550f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0365%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20artbees%20Jupiter%20X%20Core&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0366-cwe-98-improper-control-of-filename--595006c7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0366%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20artbees%20Jupiter%20X%20Core&amp;severity=high&amp;id=699f6b67b7ef31ef0b555148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12041-cwe-359-exposure-of-private-persona-41b0aed0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12041%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%2C%20Listings%20%26%20Classified%20Ads&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12171-cwe-862-missing-authorization-in-el-11b03ad1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12171%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=high&amp;id=699f6e30b7ef31ef0b597787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13651-cwe-862-missing-authorization-in-sh-14062114</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13651%3A%20CWE-862%20Missing%20Authorization%20in%20shakee93%20RapidLoad%20AI%20%E2%80%93%20Optimize%20Web%20Vitals%20Automatically&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fe06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12620-cwe-862-missing-authorization-in-cr-eaf48345</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12620%3A%20CWE-862%20Missing%20Authorization%20in%20creativeinteractivemedia%20AnimateGL%20Animations%20for%20WordPress%20%E2%80%93%20Elementor%20%26%20Gutenberg%20Blocks%20Animations&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12184-cwe-862-missing-authorization-in-ci-2fc6beed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12184%3A%20CWE-862%20Missing%20Authorization%20in%20cimatti%20Contact%20Forms%20by%20Cimatti&amp;severity=medium&amp;id=699f6e30b7ef31ef0b5977a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11780-cwe-79-improper-neutralization-of-i-9be815a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dsky%20Site%20Search%20360&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b59646d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13547-cwe-79-improper-neutralization-of-i-42faf125</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13547%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20aThemes%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13343-cwe-269-improper-privilege-manageme-3108a832</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13343%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Vanquish%20WooCommerce%20Customers%20Manager&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-01-f3fbb901</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-01&amp;severity=medium&amp;id=68359c9b5d5f0974d01e66e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-01-f1884b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f1884b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-01-f12280</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f12280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0938-cwe-20-improper-input-validation-in-python-software-foundation-cpython-bf00a0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0938%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=682d983ec4522896dcbf00a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11741-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-grafana-grafana-bd7384</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11741%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Grafana%20Grafana&amp;severity=medium&amp;id=682d9817c4522896dcbd7384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24828-cwe-426-in-acronis-acronis-cyber-protect-cloud-agent-bf1639</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24828%3A%20CWE-426%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf1639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24827-cwe-426-in-acronis-acronis-cyber-protect-cloud-agent-bf1635</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24827%3A%20CWE-426%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf1635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24829-cwe-426-in-acronis-acronis-cyber-protect-cloud-agent-bf163d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24829%3A%20CWE-426%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf163d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24830-cwe-426-in-acronis-acronis-cyber-protect-cloud-agent-bf164a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24830%3A%20CWE-426%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf164a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24831-cwe-428-in-acronis-acronis-cyber-protect-cloud-agent-bf164e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24831%3A%20CWE-428%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf164e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21683-vulnerability-in-linux-linux-be97ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe97ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21682-vulnerability-in-linux-linux-be97e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21681-vulnerability-in-linux-linux-bdd2d2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21680-vulnerability-in-linux-linux-be97e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21679-vulnerability-in-linux-linux-be97e0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21679%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21678-vulnerability-in-linux-linux-be97cd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21678%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21677-vulnerability-in-linux-linux-be97c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21677%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21676-vulnerability-in-linux-linux-be97bc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21676%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21675-vulnerability-in-linux-linux-be97b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21674-vulnerability-in-linux-linux-be97b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21673-vulnerability-in-linux-linux-bdd2ce</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21672-vulnerability-in-linux-linux-be97b0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21672%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe97b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21671-vulnerability-in-linux-linux-be97ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21670-vulnerability-in-linux-linux-be97a8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21669-vulnerability-in-linux-linux-be97a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21668-vulnerability-in-linux-linux-be97a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21667-vulnerability-in-linux-linux-be9784</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21666-vulnerability-in-linux-linux-be9780</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21666%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21665-vulnerability-in-linux-linux-be977c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21665%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe977c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57948-vulnerability-in-linux-linux-bdeb57</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12037-cwe-79-improper-neutralization-of-i-2b153d74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12037%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themekraft%20Post%20Form%20%E2%80%93%20Registration%20Form%20%E2%80%93%20Profile%20Form%20for%20User%20Profiles%20%E2%80%93%20Frontend%20Content%20Forms%20for%20User%20Submissions%20(UGC)&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13662-cwe-79-improper-neutralization-of-i-30512c8f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vernonsystems%20eHive%20Objects%20Image%20Grid&amp;severity=medium&amp;id=699f6e66b7ef31ef0b59ffa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12415-cwe-94-improper-control-of-generati-22c74bde</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12415%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20quantumcloud%20AI%20Infographic%20Maker&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b59821e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12267-cwe-73-external-control-of-file-nam-31dec27f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12267%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13472-cwe-94-improper-control-of-generati-ee2897f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13472%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wcproducttable%20Product%20Table%20and%20List%20Builder%20for%20WooCommerce%20Lite&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24718-improper-neutralization-of-input-du-40626449</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24718%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20activity-log.com%20WP%20Sessions%20Time%20Monitoring%20Full%20Automatic&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24710-improper-neutralization-of-input-du-ca92aaa4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24710%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marcel%20Pol%20Gwolle%20Guestbook&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24686-improper-neutralization-of-input-du-2976798b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24686%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Metagauss%20RegistrationMagic&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24635-improper-neutralization-of-input-du-c49324d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24635%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20integrationdevpaytm%20Paytm%20Payment%20Donation&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24632-improper-neutralization-of-input-du-15aa74f8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algol.plus%20Advanced%20Dynamic%20Pricing%20for%20WooCommerce&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24609-improper-neutralization-of-input-du-b0c15d6f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24609%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PORTONE%20PORTONE%20%EC%9A%B0%EC%BB%A4%EB%A8%B8%EC%8A%A4%20%EA%B2%B0%EC%A0%9C&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24608-improper-neutralization-of-input-du-2f029b5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24608%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Milan%20Petrovic%20GD%20Mail%20Queue&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24597-insertion-of-sensitive-information--193d0e83</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24597%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Generator%20for%20WooCommerce&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee953c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24563-improper-neutralization-of-input-du-0b783615</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeglow%20Cleanup%20%E2%80%93%20Directory%20Listing%20%26%20Classifieds%20WordPress%20Plugin&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24560-improper-neutralization-of-input-du-bbd4e66e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24560%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AwesomeTOGI%20Awesome%20Event%20Booking&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24551-improper-neutralization-of-input-du-9e7233a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oneteamsoftware%20Radio%20Buttons%20and%20Swatches%20for%20WooCommerce&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee91ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24549-cross-site-request-forgery-csrf-in--3f953f8f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24549%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mahbubur%20Rahman%20Post%20Meta&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee91f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24535-improper-neutralization-of-input-du-c20cde04</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24535%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Donation&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24534-improper-neutralization-of-input-du-12768558</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24534%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dinamiko%20DPortfolio&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23759-improper-neutralization-of-input-du-19466b0c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gavin%20Affiliate%20Tools%20Vi%E1%BB%87t%20Nam&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23671-improper-neutralization-of-input-du-2dd2e5e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23671%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sav%20WP%20OpenSearch&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23596-improper-neutralization-of-input-du-2884991e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23596%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grafeon%20Notifik%C3%A1cie.sk&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23990-cross-site-request-forgery-csrf-in--4ef4d5fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23990%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jablonczay%20Scroll%20Styler&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23989-cross-site-request-forgery-csrf-in--1847822c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23989%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alessandro%20Piconi%20Internal%20Link%20Builder&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23987-improper-neutralization-of-input-du-87a37466</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codegearthemes%20Designer&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23985-cross-site-request-forgery-csrf-in--dd220de9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23985%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brainvireinfo%20Dynamic%20URL%20SEO&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23980-cross-site-request-forgery-csrf-in--3bd18e90</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23980%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20James%20Andrews%20Full%20Circle&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23978-cross-site-request-forgery-csrf-in--514e11cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23978%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ninos%20FlashCounter&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23977-cross-site-request-forgery-csrf-in--a9ccc832</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23977%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bhaskar%20Dhote%20Post%20Carousel%20Slider&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23976-cross-site-request-forgery-csrf-in--545fa48d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23976%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20operationsissuu%20Issuu%20Panel&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22757-improper-neutralization-of-input-du-d99081f8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22757%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeBard%20CodeBard%20Help%20Desk&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22720-missing-authorization-in-magepeople-cb3cda8e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22720%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22564-improper-neutralization-of-input-du-a9d04d00</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faaiq%20Pretty%20Url&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df08948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22341-improper-neutralization-of-input-du-1e055996</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parswp%20Hide%20Login%2B&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22332-improper-neutralization-of-input-du-08eb86c9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22332%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanaver%20CloudFlare(R)%20Cache%20Purge&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22265-missing-authorization-in-mgplugin-e-2efd080c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22265%3A%20Missing%20Authorization%20in%20mgplugin%20EMI%20Calculator&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44055-server-side-request-forgery-ssrf-in-42497867</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44055%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20brandexponents%20Oshine%20Modules&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13566-cwe-79-improper-neutralization-of-i-3f39e515</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13566%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samsk%20WP%20DataTable&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13157-cwe-79-improper-neutralization-of-i-ee4de638</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13157%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=699f6e4db7ef31ef0b59c8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13530-cwe-862-missing-authorization-in-zi-65a92d48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13530%3A%20CWE-862%20Missing%20Authorization%20in%20zia-imtiaz%20Login%20Page%20Styler%20%E2%80%93%20Custom%20WordPress%20Login%20Page%20Customizer%20%26%20Security&amp;severity=medium&amp;id=699f6e5eb7ef31ef0b59f007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13623-cwe-200-exposure-of-sensitive-infor-75ee781b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13623%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20webfactory%20Order%20Export%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13219-cwe-79-cross-site-scripting-xss-in--5f331641</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13219%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Privacy%20Policy%20Genius&amp;severity=medium&amp;id=696166b3047de42cfc9dfbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13424-cwe-862-missing-authorization-in-an-cbd20bd8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13424%3A%20CWE-862%20Missing%20Authorization%20in%20anzia%20Ni%20Sales%20Commission%20For%20WooCommerce&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13415-cwe-862-missing-authorization-in-te-6fce5d76</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13415%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Food%20Menu%20%E2%80%93%20Restaurant%20Menu%20%26%20Online%20Ordering%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e55b7ef31ef0b59e6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13504-cwe-79-improper-neutralization-of-i-52274300</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anssilaitila%20Shared%20Files%20%E2%80%93%20Frontend%20File%20Upload%20Form%20%26%20Secure%20File%20Sharing&amp;severity=high&amp;id=699f6e5cb7ef31ef0b59ee99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13717-cwe-862-missing-authorization-in-vc-76144bd4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13717%3A%20CWE-862%20Missing%20Authorization%20in%20vcita%20Contact%20Form%20and%20Calls%20To%20Action%20by%20vcita&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11886-cwe-79-improper-neutralization-of-i-a48e904e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11886%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Contact%20Form%20and%20Calls%20To%20Action%20by%20vcita&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0809-cwe-79-improper-neutralization-of-in-5c481b64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kpgraham%20Link%20Fixer&amp;severity=high&amp;id=699f6b6bb7ef31ef0b55540e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13216-cwe-359-exposure-of-private-persona-22833b53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13216%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20devitemsllc%20HT%20Event%20%E2%80%93%20WordPress%20Event%20Manager%20Plugin%20for%20Elementor&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10867-cwe-79-improper-neutralization-of-i-f77ec638</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20visualmodo%20Borderless%20%E2%80%93%20Addons%20and%20Templates%20for%20Elementor&amp;severity=medium&amp;id=699f6e01b7ef31ef0b59353d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0493-cwe-22-improper-limitation-of-a-path-45cb8593</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0493%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wcmp%20MultiVendorX%20%E2%80%93%20WooCommerce%20Multivendor%20Marketplace%20Solutions&amp;severity=critical&amp;id=699f6b69b7ef31ef0b5552e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0507-cwe-79-improper-neutralization-of-in-60efe148</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0507%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snexed%20Ticketmeo%20%E2%80%93%20Sell%20Tickets%20%E2%80%93%20Event%20Ticketing&amp;severity=medium&amp;id=699f6b69b7ef31ef0b5552f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0470-cwe-79-improper-neutralization-of-in-a3dc5e0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0470%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b69b7ef31ef0b5552e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13463-cwe-79-improper-neutralization-of-i-9023817e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13463%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thesiim%20SeatReg&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13397-cwe-79-improper-neutralization-of-i-0322dd54</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20casterfm%20WPRadio%20%E2%80%93%20WordPress%20Radio%20Streaming%20Plugin&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13396-cwe-79-improper-neutralization-of-i-cb47a568</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spgajjar%20Frictionless&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13767-cwe-862-missing-authorization-in-ji-e4919d00</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13767%3A%20CWE-862%20Missing%20Authorization%20in%20jiangweifang%20Live2DWebCanvas&amp;severity=high&amp;id=699f6e6db7ef31ef0b5a070f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13399-cwe-79-improper-neutralization-of-i-942d8b09</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gosign%20Gosign%20%E2%80%93%20Posts%20Slider%20Block&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-31-45b1b053</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-31&amp;severity=medium&amp;id=68367c9a182aa0cae23257b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44142-processing-a-maliciously-crafted-im-8e658499</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44142%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20GarageBand&amp;severity=high&amp;id=69ceb82ae6bfc5ba1df6e9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24099-a-local-attacker-may-be-able-to-ele-83ff497e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24099%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22220-vulnerability-in-vmware-vmware-aria-c09ecf5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22220%3A%20Vulnerability%20in%20VMware%20VMware%20Aria%20Operations%20for%20Logs&amp;severity=medium&amp;id=69a0a45385912abc71d656a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23367-improper-access-control-bd9e1d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23367%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=682d981bc4522896dcbd9e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13349-cwe-79-improper-neutralization-of-i-fa4d9cfe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stockdio%20Stockdio%20Historical%20Chart&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13400-cwe-79-improper-neutralization-of-i-00f49c84</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13400%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gubbigubbi%20Kona%20Gallery%20Block&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12102-cwe-639-authorization-bypass-throug-eef914ef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12102%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20seventhqueen%20Typer%20Core&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10591-cwe-862-missing-authorization-in-ma-feefbdf0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10591%3A%20CWE-862%20Missing%20Authorization%20in%20makewebbetter%20MWB%20HubSpot%20for%20WooCommerce%20%E2%80%93%20CRM%2C%20Abandoned%20Cart%2C%20Email%20Marketing%2C%20Marketing%20Automation%20%26%20Analytics&amp;severity=high&amp;id=699f6df8b7ef31ef0b591903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10847-cwe-79-improper-neutralization-of-i-3c9922b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10847%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sellerthemes%20Storely&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b592716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13664-cwe-79-improper-neutralization-of-i-60095b09</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbean%20WP%20Post%20List%20Table&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12129-cwe-862-missing-authorization-in-ro-c365a02e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12129%3A%20CWE-862%20Missing%20Authorization%20in%20Royal-Flush%20Royal%20Core&amp;severity=high&amp;id=699f6e2eb7ef31ef0b59759e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12822-cwe-862-missing-authorization-in-de-7b3777fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12822%3A%20CWE-862%20Missing%20Authorization%20in%20DeluxeThemes%20Media%20Manager%20for%20UserPro&amp;severity=critical&amp;id=699f6e48b7ef31ef0b59c4e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13596-cwe-89-improper-neutralization-of-s-6f6ac3d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13596%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pantherius%20WordPress%20Survey%20%26%20Poll%20%E2%80%93%20Quiz%2C%20Survey%20and%20Poll%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e63b7ef31ef0b59f5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12299-cwe-79-improper-neutralization-of-i-77cfb9bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qriouslad%20System%20Dashboard&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12451-cwe-79-improper-neutralization-of-i-905171a0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20proxymis%20HTML5%20Chat&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13715-cwe-862-missing-authorization-in-il-9c77bf16</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13715%3A%20CWE-862%20Missing%20Authorization%20in%20ilenejohnson%20zStore%20Manager%20Basic&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8494-cwe-200-exposure-of-sensitive-inform-e0b38c48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8494%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20https%3A%2F%2Felementor.com%2F%20Elementor%20Website%20Builder%20Pro&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12177-cwe-79-improper-neutralization-of-i-d4175f9e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmessiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=medium&amp;id=699f6e30b7ef31ef0b5977a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13670-cwe-79-improper-neutralization-of-i-d5c18d2d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20efreja%20Music%20Sheet%20Viewer&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12861-cwe-73-external-control-of-file-nam-26ae5e1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12861%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20villatheme%20W2S%20%E2%80%93%20Migrate%20WooCommerce%20to%20Shopify&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13646-cwe-285-improper-authorization-in-a-9f88fe84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13646%3A%20CWE-285%20Improper%20Authorization%20in%20aakashbhagat23%20Single-user-chat&amp;severity=high&amp;id=699f6e64b7ef31ef0b59fdf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12821-cwe-862-missing-authorization-in-de-62ab3ae8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12821%3A%20CWE-862%20Missing%20Authorization%20in%20DeluxeThemes%20Media%20Manager%20for%20UserPro&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12320-cwe-79-improper-neutralization-of-i-ae4605ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markodonnell%20Team%20Rosters&amp;severity=medium&amp;id=699f6e36b7ef31ef0b597dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13549-cwe-79-improper-neutralization-of-i-2a65fe13</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13549%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20areoimiles%20All%20Bootstrap%20Blocks&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13460-cwe-79-improper-neutralization-of-i-b0d1d4cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordpresteem%20WE%20%E2%80%93%20Testimonial%20Slider&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13742-cwe-502-deserialization-of-untruste-b72198c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13742%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20paultgoodchild%20iControlWP&amp;severity=critical&amp;id=699f6e6cb7ef31ef0b5a0581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13707-cwe-352-cross-site-request-forgery--59392b05</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13707%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20filipmedia%20WP%20Image%20Uploader&amp;severity=high&amp;id=699f6e69b7ef31ef0b5a0308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11600-cwe-94-improper-control-of-generati-86bb4d60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11600%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20visualmodo%20Borderless%20%E2%80%93%20Addons%20and%20Templates%20for%20Elementor&amp;severity=high&amp;id=699f6e18b7ef31ef0b595139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13652-cwe-862-missing-authorization-in-ec-e6638038</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13652%3A%20CWE-862%20Missing%20Authorization%20in%20ecpaytechsupport%20ECPay%20Ecommerce%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e65b7ef31ef0b59fee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13671-cwe-22-improper-limitation-of-a-pat-ff3bfea2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13671%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20efreja%20Music%20Sheet%20Viewer&amp;severity=high&amp;id=699f6e67b7ef31ef0b59ffd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12269-cwe-862-missing-authorization-in-en-8fe57e38</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12269%3A%20CWE-862%20Missing%20Authorization%20in%20wpmessiah%20Safe%20Ai%20Malware%20Protection%20for%20WP&amp;severity=high&amp;id=699f6e35b7ef31ef0b597c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13705-cwe-79-improper-neutralization-of-i-c6837284</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20malcolm-oph%20StageShow&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a0300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13720-cwe-352-cross-site-request-forgery--0552d2aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13720%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20filipmedia%20WP%20Image%20Uploader&amp;severity=high&amp;id=699f6e6ab7ef31ef0b5a0448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13512-cwe-352-cross-site-request-forgery--6451198f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13512%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edigermatthew%20Wonder%20FontAwesome&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59eedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13661-cwe-79-improper-neutralization-of-i-056c703f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13661%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptableeditor%20Table%20Editor&amp;severity=medium&amp;id=699f6e65b7ef31ef0b59ff02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13700-cwe-79-improper-neutralization-of-i-34e9db50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spanrig%20Embed%20Swagger%20UI&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12444-cwe-79-improper-neutralization-of-i-95445e05</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12444%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deviodigital%20WP%20Dispensary&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11583-cwe-862-missing-authorization-in-vi-1c15c8a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11583%3A%20CWE-862%20Missing%20Authorization%20in%20visualmodo%20Borderless%20%E2%80%93%20Addons%20and%20Templates%20for%20Elementor&amp;severity=medium&amp;id=699f6e18b7ef31ef0b595131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13466-cwe-79-improper-neutralization-of-i-1399280c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20atakanau%20Automatically%20Hierarchic%20Categories%20in%20Menu&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59ebfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13380-cwe-79-improper-neutralization-of-i-8d538cb0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13380%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexreservations%20Alex%20Reservations%3A%20Smart%20Restaurant%20Booking&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13706-cwe-79-improper-neutralization-of-i-b5d0d2ba</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20filipmedia%20WP%20Image%20Uploader&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a0304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12409-cwe-79-improper-neutralization-of-i-b75ac82f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12409%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simplepress%20Simple%3APress%20Forum&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13453-cwe-94-improper-control-of-generati-6910cc95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13453%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20smub%20Contact%20Form%20%26%20SMTP%20Plugin%20for%20WordPress%20by%20PirateForms&amp;severity=high&amp;id=699f6e57b7ef31ef0b59ea15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12524-cwe-79-improper-neutralization-of-i-9660ee81</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12524%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clinked%20Clinked%20Client%20Portal&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0860-cwe-79-improper-neutralization-of-in-9b1b9cf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vruizg%20VR-Frases&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0861-cwe-89-improper-neutralization-of-sp-284c8c06</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0861%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vruizg%20VR-Frases&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13694-cwe-285-improper-authorization-in-m-7f3894fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13694%3A%20CWE-285%20Improper%20Authorization%20in%20moreconvert%20MoreConvert%20Wishlist%20for%20WooCommerce&amp;severity=high&amp;id=699f6e68b7ef31ef0b5a0196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13758-cwe-352-cross-site-request-forgery--ab3ac5ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13758%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codepeople%20CP%20Contact%20Form%20with%20PayPal&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a06ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13732-cwe-79-improper-neutralization-of-i-5a4a126c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a0461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13470-cwe-79-improper-neutralization-of-i-384b6de6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13470%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59ec1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13642-cwe-79-improper-neutralization-of-i-49a69a79</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13642%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20Stratum%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13457-cwe-284-improper-access-control-in--8ee18775</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13457%3A%20CWE-284%20Improper%20Access%20Control%20in%20stellarwp%20Event%20Tickets%20and%20Registration&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12921-cwe-79-improper-neutralization-of-i-f797c8d9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12921%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ethereumicoio%20EthereumICO&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55417-na-271a68af</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55417%3A%20n%2Fa&amp;severity=medium&amp;id=69a0a44985912abc71d64ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-30-43bd44e8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-30&amp;severity=medium&amp;id=68367c99182aa0cae2325136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21396-cwe-862-missing-authorization-in-mi-db15147f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21396%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Microsoft%20Account&amp;severity=high&amp;id=68c0bd549ed239a66badec66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21415-cwe-290-authentication-bypass-by-sp-52245d31</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21415%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Microsoft%20Azure%20AI%20Face%20Service&amp;severity=critical&amp;id=68c0bd549ed239a66badec78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0851-cwe-36-absolute-path-traversal-in-aw-ab72db48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0851%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20AWS%20DeepJavaLibrary&amp;severity=critical&amp;id=68ee9ba2d8f994a66eca6017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0353-cwe-79-improper-neutralization-of-in-94e756cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20badhonrocks%20Divi%20Torque%20Lite%20%E2%80%93%20Divi%20Theme%2C%20Divi%20Builder%20%26%20Extra%20Theme&amp;severity=medium&amp;id=699f6b67b7ef31ef0b55512f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13561-cwe-79-improper-neutralization-of-i-f6965d72</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13561%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nebojsadabic%20Target%20Video%20Easy%20Publish&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13696-cwe-79-improper-neutralization-of-i-1a73ee08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdesk%20Flexible%20Wishlist%20for%20WooCommerce%20%E2%80%93%20Ecommerce%20Wishlist%20%26%20Save%20for%20later&amp;severity=high&amp;id=699f6e68b7ef31ef0b5a01a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0804-cwe-79-improper-neutralization-of-in-79600720</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clickwhale%20ClickWhale%20%E2%80%93%20Link%20Manager%2C%20Link%20Shortener%20and%20Click%20Tracker%20for%20Affiliate%20Links%20%26%20Link%20Pages&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b5553a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-29-2d90cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-29&amp;severity=medium&amp;id=682c7dc1e8347ec82d2d90cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-29-f12a42</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24826-cwe-276-in-acronis-acronis-snap-deploy-bf1622</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24826%3A%20CWE-276%20in%20Acronis%20Acronis%20Snap%20Deploy&amp;severity=medium&amp;id=682d9840c4522896dcbf1622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22217-cwe-89-improper-neutralization-of-s-2aeca39b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22217%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VMware%20AVI%20Load%20Balancer&amp;severity=high&amp;id=69a0a45185912abc71d65662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13484-exposure-of-resource-to-wrong-sphere-aec165</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13484%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere&amp;severity=high&amp;id=682cd0fa1484d88663aec165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7881-cwe-1422-exposure-of-sensitive-infor-030203cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7881%3A%20CWE-1422%3A%20Exposure%20of%20Sensitive%20Information%20caused%20by%20Incorrect%20Data%20Forwarding%20during%20Transient%20Execution%20in%20Arm%20Neoverse%20V2&amp;severity=medium&amp;id=691c7a583fd37bbc3955e449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0754-improper-output-neutralization-for-l-4e919937</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0754%3A%20Improper%20Output%20Neutralization%20for%20Logs&amp;severity=medium&amp;id=68a87f90ad5a09ad001f8195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0752-inconsistent-interpretation-of-http--9ec95201</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0752%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)&amp;severity=high&amp;id=68a87f90ad5a09ad001f8191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0750-improper-limitation-of-a-pathname-to-583e0dfd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0750%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=medium&amp;id=68b36a78ad5a09ad009428ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0736-insertion-of-sensitive-information-i-0cffb8f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0736%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&amp;severity=medium&amp;id=68b36a78ad5a09ad009428c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13527-cwe-79-improper-neutralization-of-i-b33f54b0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13527%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20philantro%20Philantro%20%E2%80%93%20Donations%20and%20Donor%20Management&amp;severity=medium&amp;id=699f6e5eb7ef31ef0b59efef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13521-cwe-352-cross-site-request-forgery--80940517</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13521%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ghera74%20MailUp%20Auto%20Subscription&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0321-cwe-79-improper-neutralization-of-in-8a85084d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0321%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmet%20ElementsKit%20Pro&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13509-cwe-79-improper-neutralization-of-i-fa8afbb4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20westguard%20WS%20Form%20LITE%20%E2%80%93%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=699f6e5cb7ef31ef0b59eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13448-cwe-434-unrestricted-upload-of-file-ab235a50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13448%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ThemeREX%20ThemeREX%20Addons&amp;severity=critical&amp;id=699f6e57b7ef31ef0b59e9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23084-vulnerability-in-nodejs-node-bed628</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23084%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11135-cwe-89-improper-neutralization-of-s-669fc1ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11135%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=high&amp;id=699f6e07b7ef31ef0b593e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-28-2d93e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-28&amp;severity=medium&amp;id=682c7dc1e8347ec82d2d93e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-28-f11f87</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24130-an-app-may-be-able-to-modify-protec-59e133b2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24130%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092139fe7723195e053730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54519-an-app-may-be-able-to-read-sensitiv-a8c4e4ee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54519%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb831e6bfc5ba1df6edaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24126-an-attacker-on-the-local-network-ma-1462966c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24126%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69092137fe7723195e053615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54523-an-app-may-be-able-to-corrupt-copro-6f6e3d5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54523%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb833e6bfc5ba1df6ee2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24096-a-malicious-app-may-be-able-to-acce-90356a69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24096%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091a50c28fd46ded81d1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54542-private-browsing-tabs-may-be-access-656ce44b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54542%3A%20Private%20Browsing%20tabs%20may%20be%20accessed%20without%20authentication%20in%20Apple%20Safari&amp;severity=critical&amp;id=69ceb834e6bfc5ba1df6eeb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24106-parsing-a-file-may-lead-to-an-unexp-9e06eb6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24106%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54539-an-app-may-be-able-to-capture-keybo-92dd857f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54539%3A%20An%20app%20may%20be%20able%20to%20capture%20keyboard%20events%20from%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb833e6bfc5ba1df6ee55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24151-an-app-may-be-able-to-cause-unexpec-98d1abcf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24151%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213afe7723195e05383e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24146-deleting-a-conversation-in-messages-f3b63730</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24146%3A%20Deleting%20a%20conversation%20in%20Messages%20may%20expose%20user%20contact%20information%20in%20system%20logging%20in%20Apple%20macOS&amp;severity=critical&amp;id=6909213afe7723195e053814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24150-copying-a-url-from-web-inspector-ma-d0bcc7d8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24150%3A%20Copying%20a%20URL%20from%20Web%20Inspector%20may%20lead%20to%20command%20injection%20in%20Apple%20Safari&amp;severity=high&amp;id=6909213afe7723195e053835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24107-a-malicious-app-may-be-able-to-gain-bf84062b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24107%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092135fe7723195e0534c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54543-processing-maliciously-crafted-web--311ceb90</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54543%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=690916cac28fd46ded7ccfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54522-an-app-may-be-able-to-corrupt-copro-ab7e9a56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54522%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb833e6bfc5ba1df6ee24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54488-photos-in-the-hidden-photos-album-m-dba11758</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54488%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb831e6bfc5ba1df6ed89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44172-an-app-may-be-able-to-access-contac-5d4ca0aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44172%3A%20An%20app%20may%20be%20able%20to%20access%20contacts%20in%20Apple%20macOS&amp;severity=low&amp;id=6909214efe7723195e0545a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24127-parsing-a-file-may-lead-to-an-unexp-dbe49dd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24127%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092137fe7723195e053620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54518-an-app-may-be-able-to-corrupt-copro-8c2df4a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54518%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb831e6bfc5ba1df6eda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24131-an-attacker-in-a-privileged-positio-e429fe6a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24131%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092139fe7723195e053738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24086-processing-an-image-may-lead-to-a-d-338f885c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24086%3A%20Processing%20an%20image%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091a4fc28fd46ded81d170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24100-an-app-may-be-able-to-access-inform-30466448</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24100%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20macOS&amp;severity=low&amp;id=69091a50c28fd46ded81d1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24141-an-attacker-with-physical-access-to-5919ca92</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24141%3A%20An%20attacker%20with%20physical%20access%20to%20an%20unlocked%20device%20may%20be%20able%20to%20access%20Photos%20while%20the%20app%20is%20locked%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69092139fe7723195e053777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24116-an-app-may-be-able-to-bypass-privac-63c30ad9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24116%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24161-parsing-a-file-may-lead-to-an-unexp-531f1294</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24161%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909213cfe7723195e053920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54509-an-app-may-be-able-to-cause-unexpec-153ef37e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54509%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=690916cac28fd46ded7ccfbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24136-a-malicious-app-may-be-able-to-crea-e3797e59</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24136%3A%20A%20malicious%20app%20may%20be%20able%20to%20create%20symlinks%20to%20protected%20regions%20of%20the%20disk%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092139fe7723195e05374b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24120-an-attacker-may-be-able-to-cause-un-54b897d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24120%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=69092137fe7723195e0535dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24177-a-remote-attacker-may-be-able-to-ca-815fcd70</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24177%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6909213efe7723195e053a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54499-processing-a-maliciously-crafted-im-670f8fee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54499%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb831e6bfc5ba1df6ed90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24176-a-local-attacker-may-be-able-to-ele-ca39765c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24176%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6909213efe7723195e053a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54549-an-app-may-be-able-to-access-user-s-dc58028e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54549%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24121-an-app-may-be-able-to-modify-protec-938af271</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24121%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=low&amp;id=69092137fe7723195e0535e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24137-a-remote-attacker-may-cause-an-unex-3267ed02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24137%3A%20An%20attacker%20on%20the%20local%20network%20may%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092139fe7723195e053753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24160-parsing-a-file-may-lead-to-an-unexp-b8347f93</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24160%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909213cfe7723195e053911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24117-an-app-may-be-able-to-fingerprint-t-3cf0d6ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24117%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092135fe7723195e0534f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24140-files-downloaded-from-the-internet--9c3eb203</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24140%3A%20Files%20downloaded%20from%20the%20internet%20may%20not%20have%20the%20quarantine%20flag%20applied%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092139fe7723195e053773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24156-an-app-may-be-able-to-elevate-privi-0c525bc4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24156%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6909213cfe7723195e0538e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24101-an-app-may-be-able-to-access-user-s-84fea33d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24101%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091a50c28fd46ded81d1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54512-a-system-binary-could-be-used-to-fi-0d372e5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54512%3A%20A%20system%20binary%20could%20be%20used%20to%20fingerprint%20a%20user&apos;s%20Apple%20Account%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb831e6bfc5ba1df6ed9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24087-an-app-may-be-able-to-access-protec-6dfab1e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24087%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091a50c28fd46ded81d18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24114-an-app-may-be-able-to-modify-protec-d551c3ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24114%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24143-a-maliciously-crafted-webpage-may-b-e0cf450a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24143%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=medium&amp;id=6909213afe7723195e053804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54497-processing-web-content-may-lead-to--06560aa6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54497%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690916c8c28fd46ded7ccf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54478-processing-maliciously-crafted-web--416121d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54478%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690916c8c28fd46ded7ccf8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24102-an-app-may-be-able-to-determine-a-u-24a47a04</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24102%3A%20An%20app%20may%20be%20able%20to%20determine%20a%20user%E2%80%99s%20current%20location%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=69091a50c28fd46ded81d1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54507-an-attacker-with-user-privileges-ma-aa01d866</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54507%3A%20An%20attacker%20with%20user%20privileges%20may%20be%20able%20to%20read%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb831e6bfc5ba1df6ed97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24092-an-app-may-be-able-to-read-sensitiv-b3d30e68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24092%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091a50c28fd46ded81d192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24138-a-malicious-application-may-be-able-f0964ff9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24138%3A%20A%20malicious%20application%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092139fe7723195e053762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54550-an-app-may-be-able-to-view-autocomp-cf2c81bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54550%3A%20An%20app%20may%20be%20able%20to%20view%20autocompleted%20contact%20information%20from%20Messages%20and%20Mail%20in%20system%20logs%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24118-an-app-may-be-able-to-cause-unexpec-b7e9f226</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24118%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=69092137fe7723195e0535d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24159-an-app-may-be-able-to-execute-arbit-66403b8c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24159%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6909213cfe7723195e053902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24122-an-app-may-be-able-to-modify-protec-00072293</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24122%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092137fe7723195e0535ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24134-an-app-may-be-able-to-access-user-s-784a792e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24134%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092139fe7723195e053743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24163-parsing-a-file-may-lead-to-an-unexp-19a527bf</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24163%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091538c28fd46ded7baa06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24162-processing-maliciously-crafted-web--929281cb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24162%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=6909213cfe7723195e05392f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24135-an-app-may-be-able-to-gain-elevated-5789d9db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24135%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092139fe7723195e053747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24123-parsing-a-file-may-lead-to-an-unexp-723a2caa</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24123%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092137fe7723195e0535f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24174-an-app-may-be-able-to-bypass-privac-c66e26c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24174%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=6909213efe7723195e053a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54530-password-autofill-may-fill-in-passw-6bf8d211</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54530%3A%20Password%20autofill%20may%20fill%20in%20passwords%20after%20failing%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb833e6bfc5ba1df6ee37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54475-an-app-may-be-able-to-determine-a-u-bb69a21d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54475%3A%20An%20app%20may%20be%20able%20to%20determine%20a%20user%E2%80%99s%20current%20location%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb831e6bfc5ba1df6ed84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24158-processing-web-content-may-lead-to--96e1fded</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24158%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=medium&amp;id=6909213cfe7723195e0538f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24093-an-app-may-be-able-to-access-remova-6d5153bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24093%3A%20An%20app%20may%20be%20able%20to%20access%20removable%20volumes%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091a50c28fd46ded81d198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24139-parsing-a-maliciously-crafted-file--cb1c8b8a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24139%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=69092139fe7723195e05376a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24085-a-malicious-application-may-be-able-3886796d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24085%3A%20A%20malicious%20application%20may%20be%20able%20to%20elevate%20privileges.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20before%20iOS%2017.2.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68881727ad5a09ad0088bc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54547-an-app-may-be-able-to-access-protec-8ef481f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54547%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24103-an-app-may-be-able-to-access-protec-086d86e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24103%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091a50c28fd46ded81d1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24154-an-attacker-may-be-able-to-cause-un-b1ec69c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24154%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909213afe7723195e05384e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24115-an-app-may-be-able-to-read-files-ou-8282524e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24115%3A%20An%20app%20may%20be%20able%20to%20read%20files%20outside%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24149-parsing-a-file-may-lead-to-disclosu-f094239b</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24149%3A%20Parsing%20a%20file%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909213afe7723195e053824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24108-an-app-may-be-able-to-access-protec-67808aaa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24108%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54537-an-app-may-be-able-to-read-and-writ-1ce069d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54537%3A%20An%20app%20may%20be%20able%20to%20read%20and%20write%20files%20outside%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb833e6bfc5ba1df6ee46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24124-parsing-a-file-may-lead-to-an-unexp-88557f6a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24124%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092137fe7723195e053605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54468-an-app-may-be-able-to-break-out-of--ea8d400d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54468%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb82fe6bfc5ba1df6ed5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24112-parsing-a-file-may-lead-to-an-unexp-fcc1fbe7</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24112%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24145-an-app-may-be-able-to-view-a-contac-b576eff6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24145%3A%20An%20app%20may%20be%20able%20to%20view%20a%20contact&apos;s%20phone%20number%20in%20system%20logs%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=6909213afe7723195e05380e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24153-an-app-with-root-privileges-may-be--b4e9be0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24153%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213afe7723195e05384a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24104-restoring-a-maliciously-crafted-bac-1adf4ecb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24104%3A%20Restoring%20a%20maliciously%20crafted%20backup%20file%20may%20lead%20to%20modification%20of%20protected%20system%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091a52c28fd46ded81d20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54517-an-app-may-be-able-to-corrupt-copro-0c94d4de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54517%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb831e6bfc5ba1df6eda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24128-visiting-a-malicious-website-may-le-0038a9ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24128%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69092137fe7723195e05362f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24094-an-app-may-be-able-to-access-user-s-0585a312</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24094%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091a50c28fd46ded81d19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24169-a-malicious-app-may-be-able-to-bypa-8ad87a21</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24169%3A%20A%20malicious%20app%20may%20be%20able%20to%20bypass%20browser%20extension%20authentication%20in%20Apple%20Safari&amp;severity=high&amp;id=6909213cfe7723195e053944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54557-an-attacker-may-gain-access-to-prot-a815559d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54557%3A%20An%20attacker%20may%20gain%20access%20to%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb834e6bfc5ba1df6eece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24129-a-remote-attacker-may-cause-an-unex-93bafde8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24129%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092137fe7723195e053637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54516-an-app-may-be-able-to-approve-a-lau-756c7c78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54516%3A%20An%20app%20may%20be%20able%20to%20approve%20a%20launch%20daemon%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb831e6bfc5ba1df6ed9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54541-an-app-may-be-able-to-access-user-s-5cbde8c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54541%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24152-an-app-may-be-able-to-cause-unexpec-cc2e93f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24152%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213afe7723195e053846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24113-visiting-a-malicious-website-may-le-d2100b59</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24113%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20user%20interface%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091538c28fd46ded7ba9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54536-an-app-may-be-able-to-edit-nvram-va-8d598301</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54536%3A%20An%20app%20may%20be%20able%20to%20edit%20NVRAM%20variables%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb833e6bfc5ba1df6ee43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24109-an-app-may-be-able-to-access-sensit-3d0c56f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24109%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092135fe7723195e0534d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54520-an-app-may-be-able-to-overwrite-arb-01af93fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54520%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb831e6bfc5ba1df6edb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22316-cwe-863-incorrect-authorization-in--e1040505</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22316%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Sterling%20File%20Gateway&amp;severity=medium&amp;id=68e0f3c6b66c7f7acdd3ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24782-improper-control-of-filename-for-in-bc091983</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24782%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpWax%20Post%20Grid%2C%20Slider%20%26%20Carousel%20Ultimate&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23982-missing-authorization-in-gopi-krish-6c50cac1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23982%3A%20Missing%20Authorization%20in%20Gopi%20krishnan%20Fare%20Calculator&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee913c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24747-missing-authorization-in-favethemes-9aaa27d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24747%3A%20Missing%20Authorization%20in%20favethemes%20Houzez&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24743-missing-authorization-in-rometheme--e4c3fd82</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24743%3A%20Missing%20Authorization%20in%20Rometheme%20RTMKit&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24742-cross-site-request-forgery-csrf-in--9f379f0d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24742%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPGMaps%20WP%20Go%20Maps&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24741-url-redirection-to-untrusted-site-o-43cf6851</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24741%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LOGON%20KB%20Support&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24740-url-redirection-to-untrusted-site-o-dc861b95</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24740%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20ThimPress%20LearnPress&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24734-missing-authorization-in-codesolz-b-ec976904</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24734%3A%20Missing%20Authorization%20in%20CodeSolz%20Better%20Find%20and%20Replace&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24708-improper-neutralization-of-input-du-d41e7c0b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24708%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CRM%20Perks%20WP%20Dynamics%20CRM%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24689-insertion-of-sensitive-information--042ca9f2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24689%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Javier%20Carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24680-improper-neutralization-of-script-r-6ed0f358</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24680%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20WPExperts.io%20WP%20Multistore%20Locator&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24671-deserialization-of-untrusted-data-i-ad25b0ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24671%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Pdfcrowd%20Dev%20Team%20Save%20as%20PDF&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24667-improper-neutralization-of-special--6954b9a8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24667%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24665-improper-neutralization-of-special--14438fa8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24665%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24628-authentication-bypass-by-spoofing-i-07995e99</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24628%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20bestwebsoft%20Google%20Captcha&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24626-improper-neutralization-of-input-du-ff55f626</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Music%20Store&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24606-missing-authorization-in-boldgrid-c-cb9212de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24606%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24603-missing-authorization-in-dmitry-v-c-fdd6d62f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24603%3A%20Missing%20Authorization%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Print%20Barcode%20Labels%20for%20your%20WooCommerce%20products%2Forders&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24600-missing-authorization-in-davidfcarr-dcfdbb3b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24600%3A%20Missing%20Authorization%20in%20davidfcarr%20RSVPMarker&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24593-improper-neutralization-of-input-du-6fe4d957</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WisdmLabs%20Edwiser%20Bridge&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24540-cross-site-request-forgery-csrf-in--05ec4cc9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24540%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SeedProd%20Coming%20Soon%20Page%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20by%20SeedProd&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24538-cross-site-request-forgery-csrf-in--ee324d6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24538%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Slava%20Abakumov%20BuddyPress%20Groups%20Extras&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee919a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24537-cross-site-request-forgery-csrf-in--ce842fef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24537%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20The%20Events%20Calendar&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee9197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23849-missing-authorization-in-bpiwowar-p-d65df2e3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23849%3A%20Missing%20Authorization%20in%20bpiwowar%20PAPERCITE&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23756-improper-neutralization-of-input-du-030aef87</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23756%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivanchernyakov%20LawPress%20%E2%80%93%20Law%20Firm%20Website%20Management&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23754-improper-neutralization-of-input-du-43d4e043</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ulrich%20Sossou%20The%20Loops&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23752-improper-neutralization-of-input-du-eec0a6d7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23752%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Clifton%20Griffin%20CGD%20Arrange%20Terms&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23669-improper-neutralization-of-input-du-52b1c05c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23669%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nurul%20Amin%20WP%20Smart%20Tooltip&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23656-missing-authorization-in-saul-moral-fe371268</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23656%3A%20Missing%20Authorization%20in%20Saul%20Morales%20Pacheco%20Donate%20visa&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23574-improper-neutralization-of-input-du-809594d5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonathan%20Lau%20CubePM&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23531-improper-neutralization-of-input-du-46e86d3a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23531%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidfcarr%20RSVPMaker%20Volunteer%20Roles&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23529-missing-authorization-in-blokhauswp-c83baeb3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23529%3A%20Missing%20Authorization%20in%20blokhauswp%20Minterpress&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22513-improper-neutralization-of-input-du-2f04b9ad</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22513%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kyle%20Phillips%20Simple%20Locator&amp;severity=null&amp;id=69cd75ede6bfc5ba1df08676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24754-missing-authorization-in-favethemes-37742750</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24754%3A%20Missing%20Authorization%20in%20favethemes%20Houzez&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24685-path-traversal-in-ihor-kit-morkva-u-5e1e0fa6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24685%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Ihor%20Kit%20Morkva%20UA%20Shipping&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24664-improper-neutralization-of-special--19365b5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24664%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24612-improper-neutralization-of-special--e06e5317</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24612%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ihor%20Kit%20Shipping%20for%20Nova%20Poshta&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24601-deserialization-of-untrusted-data-i-89c1848c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24601%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThimPress%20FundPress&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24584-missing-authorization-in-bdthemes-u-4c709edc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24584%3A%20Missing%20Authorization%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24533-cross-site-request-forgery-csrf-in--1f34c52a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24533%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MetaSlider%20Responsive%20Slider%20by%20MetaSlider&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee916e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23792-improper-neutralization-of-input-du-a0d1aa04</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23792%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Busters%20Passwordless%20WP%20%E2%80%93%20Login%20with%20your%20glance%20or%20fingerprint&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23457-improper-neutralization-of-input-du-98487204</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23457%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shipdeoplugin%20Shipdeo&amp;severity=null&amp;id=69cd761ae6bfc5ba1df09792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12774-cwe-352-cross-site-request-forgery--9a61f245</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12774%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Altra%20Side%20Menu&amp;severity=medium&amp;id=696166b3047de42cfc9dfbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-27-2d8907</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-27&amp;severity=medium&amp;id=682c7dc1e8347ec82d2d8907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-27-f12196</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13505-cwe-79-improper-neutralization-of-i-c7e55171</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Survey%20Maker&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59eea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12334-cwe-79-improper-neutralization-of-i-ffc614d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12334%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codexpert%20WC%20Affiliate%20%E2%80%93%20WooCommerce%20Affiliate%20Plugin&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11641-cwe-352-cross-site-request-forgery--fbd48e0e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11641%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20e4jvikwp%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=high&amp;id=699f6e18b7ef31ef0b595152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11936-cwe-862-missing-authorization-in-mv-58ad0398</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11936%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20Zox%20News&amp;severity=high&amp;id=699f6e27b7ef31ef0b596e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10705-cwe-918-server-side-request-forgery-cf13dd74</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10705%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20themeisle%20Multiple%20Page%20Generator%20Plugin%20%E2%80%93%20MPG&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b5923a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11090-cwe-200-exposure-of-sensitive-infor-0b8310c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11090%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=699f6e06b7ef31ef0b593c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10633-cwe-95-improper-neutralization-of-d-2a40bccf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10633%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20AYS%20Pro%20Plugins%20Quiz%20Maker%20Developer&amp;severity=high&amp;id=699f6df9b7ef31ef0b5919b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10574-cwe-862-missing-authorization-in-ay-2bee49f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10574%3A%20CWE-862%20Missing%20Authorization%20in%20AYS%20Pro%20Plugins%20Quiz%20Maker%20Developer&amp;severity=high&amp;id=699f6df6b7ef31ef0b59179d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10628-cwe-89-improper-neutralization-of-s-2f14de68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10628%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AYS%20Pro%20Plugins%20Quiz%20Maker%20Business&amp;severity=high&amp;id=699f6df9b7ef31ef0b5919ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10636-cwe-79-improper-neutralization-of-i-474acbf4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10636%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AYS%20Pro%20Plugins%20Quiz%20Maker%20Developer&amp;severity=medium&amp;id=699f6df9b7ef31ef0b5919bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-26-2d98b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-26&amp;severity=medium&amp;id=682c7dc1e8347ec82d2d98b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-26-f1250f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f1250f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39750-cwe-120-buffer-copy-without-checkin-c971eb01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39750%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20IBM%20Analytics%20Content%20Hub&amp;severity=high&amp;id=68e0f3c6b66c7f7acdd3ea81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13562-cwe-200-exposure-of-sensitive-infor-cc983c3a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13562%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20jcollings%20Import%20WP%20%E2%80%93%20Export%20and%20Import%20CSV%20and%20XML%20files%20to%20WordPress&amp;severity=high&amp;id=699f6e60b7ef31ef0b59f30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0350-cwe-79-improper-neutralization-of-in-990e6a08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20badhonrocks%20Divi%20Carousel%20Free%20(Divi5%20Support)&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13450-cwe-918-server-side-request-forgery-54548659</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13450%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bitpressadmin%20Bit%20Form%20%E2%80%93%20Custom%20Contact%20Form%2C%20Multi%20Step%2C%20Conversational%20Form%20%26%20Payment%20Form%20builder&amp;severity=low&amp;id=699f6e57b7ef31ef0b59ea02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13449-cwe-862-missing-authorization-in-ib-ace207b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13449%3A%20CWE-862%20Missing%20Authorization%20in%20ibsofts%20Boom%20Fest&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e9fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12826-cwe-862-missing-authorization-in-nm-4085b074</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12826%3A%20CWE-862%20Missing%20Authorization%20in%20nmedia%20GoHero%20Store%20Customizer%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e49b7ef31ef0b59c589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13370-cwe-862-missing-authorization-in-yo-7b6ff5c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13370%3A%20CWE-862%20Missing%20Authorization%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13550-cwe-22-improper-limitation-of-a-pat-4cd1be1f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13550%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20paulrosen%20ABC%20Notation&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13551-cwe-79-improper-neutralization-of-i-ec8732e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paulrosen%20ABC%20Notation&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13441-cwe-79-improper-neutralization-of-i-702690e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13441%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Bilingual%20Linker&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12817-cwe-79-improper-neutralization-of-i-c2f52030</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coreymcollins%20Etsy%20Importer&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13586-cwe-79-improper-neutralization-of-i-e12e893c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13586%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imdr%20Masy%20Gallery&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13467-cwe-79-improper-neutralization-of-i-cc0fcac3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hk1993%20WP%20Contact%20Form7%20Email%20Spam%20Blocker&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59ec06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11825-cwe-79-improper-neutralization-of-i-a2a10bea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11825%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20broadstreetads%20Broadstreet&amp;severity=medium&amp;id=699f6e22b7ef31ef0b59675b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13368-cwe-862-missing-authorization-in-yo-97a68325</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13368%3A%20CWE-862%20Missing%20Authorization%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12113-cwe-862-missing-authorization-in-yo-32a6b62e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12113%3A%20CWE-862%20Missing%20Authorization%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13458-cwe-79-improper-neutralization-of-i-aae9b628</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qchantelnotice%20WordPress%20SEO%20Friendly%20Accordion%20FAQ%20with%20AI%20assisted%20content%20generation&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13599-cwe-79-improper-neutralization-of-i-8528d590</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13599%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=699f6e63b7ef31ef0b59f5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13548-cwe-79-improper-neutralization-of-i-b581f336</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13548%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dotrex%20Power%20Ups%20for%20Elementor&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12885-cwe-22-improper-limitation-of-a-pat-59c4f859</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12885%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20shazahm1hotmailcom%20Connections%20Business%20Directory&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12529-cwe-79-improper-neutralization-of-i-f65bca1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12529%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brodosnet%20brodos.net%20Onlineshop%20Plugin&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12076-cwe-79-improper-neutralization-of-i-d9302be2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nebojsadabic%20Target%20Video%20Easy%20Publish&amp;severity=medium&amp;id=699f6e2db7ef31ef0b59738e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12512-cwe-79-improper-neutralization-of-i-96f5b953</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arunbasillal%20Ask%20Me%20Anything%20(Anonymously)&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12816-cwe-79-improper-neutralization-of-i-5f507381</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12816%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mastowkir%20NOTICE%20BOARD%20BY%20TOWKIR&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12600-cwe-502-deserialization-of-untruste-5da5f798</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12600%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20skyverge%20Custom%20Product%20Tabs%20Lite%20for%20WooCommerce&amp;severity=high&amp;id=699f6e44b7ef31ef0b59c021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10552-cwe-79-improper-neutralization-of-i-ae543440</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX%20Plugin&amp;severity=medium&amp;id=699f6df6b7ef31ef0b59178b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13721-cwe-85-doubled-character-xss-manipu-f45a7859</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13721%3A%20CWE-85%20Doubled%20Character%20XSS%20Manipulations%20in%20plethoraplugins%20Plethora%20Plugins%20Tabs%20%2B%20Accordions&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a044c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0682-cwe-98-improper-control-of-filename--cc6cfd6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0682%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ThemeREX%20Addons&amp;severity=high&amp;id=699f6b6bb7ef31ef0b555383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13709-cwe-352-cross-site-request-forgery--47bf6536</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13709%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20linearoy%20Linear&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0357-cwe-434-unrestricted-upload-of-file--2b5544fc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0357%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Iqonic%20Design%20WPBookit&amp;severity=critical&amp;id=699f6b67b7ef31ef0b555140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-25-2db12d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-25&amp;severity=medium&amp;id=682c7dc1e8347ec82d2db12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-25-f12a40</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21262-cwe-451-user-interface-ui-misrepres-3914402b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21262%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68c0c0d09ed239a66badfcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52807-cwe-611-improper-restriction-of-xml-13d88698</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52807%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20HL7%20fhir-ig-publisher&amp;severity=high&amp;id=697a9d5c4623b1157cfb7df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24587-improper-neutralization-of-special--9df40b10</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24587%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nks%20Email%20Subscription%20Popup&amp;severity=null&amp;id=69cd7650e6bfc5ba1df0b2b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35122-cwe-266-incorrect-privilege-assignm-d75fbcd1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35122%3A%20CWE-266%20Incorrect%20Privilege%20Assignment&amp;severity=low&amp;id=68e0f3c5b66c7f7acdd3ea67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24736-missing-authorization-in-metaphorcr-65e96142</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24736%3A%20Missing%20Authorization%20in%20metaphorcreations%20Post%20Duplicator&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24746-improper-neutralization-of-input-du-0c008b2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Iser%20Popup%20Maker&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24755-improper-neutralization-of-input-du-a1474454</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24755%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20add-ons.org%20PDF%20Invoice%20Builder%20for%20WooCommerce&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24753-missing-authorization-in-stellarwp--e44e9532</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24753%3A%20Missing%20Authorization%20in%20StellarWP%20Gutenberg%20Blocks%20by%20Kadence%20Blocks&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24751-missing-authorization-in-godaddy-co-2bc5e804</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24751%3A%20Missing%20Authorization%20in%20GoDaddy%20CoBlocks&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24750-missing-authorization-in-syed-balkh-3a3e394b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24750%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20ExactMetrics&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24756-cross-site-request-forgery-csrf-in--996d253a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24756%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mgplugin%20Roi%20Calculator&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24729-improper-neutralization-of-input-du-8a1bafdb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24729%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7281e6bfc5ba1deeaa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24721-improper-neutralization-of-input-du-6aa01de4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24721%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aleksandar%20Uro%C5%A1evi%C4%87%20Easy%20YouTube%20Gallery&amp;severity=null&amp;id=69cd7280e6bfc5ba1deeaa41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24733-improper-control-of-filename-for-in-5710347b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24733%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Akhtarujjaman%20Shuvo%20Post%20Grid%20Master&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24726-improper-neutralization-of-input-du-cef552f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24726%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Contact%20Form%207&amp;severity=null&amp;id=69cd7281e6bfc5ba1deeaa50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24725-missing-authorization-in-thimpress--e9ec1921</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24725%3A%20Missing%20Authorization%20in%20ThimPress%20Thim%20Elementor%20Kit&amp;severity=null&amp;id=69cd7281e6bfc5ba1deeaa4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24730-improper-neutralization-of-input-du-78e50be8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24730%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RexTheme%20WP%20VR&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24738-cross-site-request-forgery-csrf-in--9ceae180</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24738%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jerry%20Rietveld%20Call%20Now%20Button&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24728-improper-neutralization-of-special--d0df6c9e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24728%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yannick%20Lefebvre%20Bug%20Library&amp;severity=null&amp;id=69cd7281e6bfc5ba1deeaa56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24723-improper-neutralization-of-input-du-0e0684e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24723%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Booking%20Calendar%20Contact%20Form&amp;severity=null&amp;id=69cd7280e6bfc5ba1deeaa47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24719-improper-neutralization-of-input-du-371348c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24719%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Widget%20Countdown&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24731-improper-neutralization-of-input-du-7b6aa600</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24731%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IP2Location%20Download%20IP2Location%20Country%20Blocker&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24732-improper-neutralization-of-input-du-e1c73ff8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24732%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reputeinfosystems%20BookingPress&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24724-cross-site-request-forgery-csrf-in--2aa2b30c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24724%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Side%20Menu%20Lite&amp;severity=null&amp;id=69cd7280e6bfc5ba1deeaa4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24739-cross-site-request-forgery-csrf-in--6e9e8bdd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24739%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjahan%20Jewel%20FluentSMTP&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24716-cross-site-request-forgery-csrf-in--143f05ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24716%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Herd%20Effects&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24727-improper-neutralization-of-input-du-eac27d7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24727%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Contact%20Form%20Email&amp;severity=null&amp;id=69cd7281e6bfc5ba1deeaa53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24717-cross-site-request-forgery-csrf-in--e358a787</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24717%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Modal%20Window&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24703-server-side-request-forgery-ssrf-in-e23c80c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24703%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ronald%20Huereca%20Comment%20Edit%20Core%20%E2%80%93%20Simple%20Comment%20Editing&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24715-cross-site-request-forgery-csrf-in--91707afb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24715%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Counter%20Box&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24713-cross-site-request-forgery-csrf-in--31970b5d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24713%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Button%20Generator%20%E2%80%93%20easily%20Button%20Builder&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24722-improper-neutralization-of-input-du-ebefac34</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24722%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20FAQ%20Builder%20AYS&amp;severity=null&amp;id=69cd7280e6bfc5ba1deeaa44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24720-cross-site-request-forgery-csrf-in--4e5fe2a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24720%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Sticky%20Buttons&amp;severity=null&amp;id=69cd7280e6bfc5ba1deeaa3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24696-cross-site-request-forgery-csrf-in--2465e842</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24696%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shafaet%20Alam%20Attire%20Blocks&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24709-improper-neutralization-of-input-du-621893a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Plethora%20Plugins%20Plethora%20Plugins%20Tabs%20%2B%20Accordions&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24712-cross-site-request-forgery-csrf-in--f72cd94d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24712%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RadiusTheme%20Radius%20Blocks&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24698-cross-site-request-forgery-csrf-in--44a2d901</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24698%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24711-cross-site-request-forgery-csrf-in--dd69a886</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24711%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Popup%20Box&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24714-cross-site-request-forgery-csrf-in--3bf85403</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24714%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Bubble%20Menu%20%E2%80%93%20circle%20floating%20menu&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24705-missing-authorization-in-arshid-woo-9df525c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24705%3A%20Missing%20Authorization%20in%20Arshid%20WooCommerce%20Quick%20View&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24704-improper-neutralization-of-input-du-e01f2ec4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grimdonkey%20Magic%20the%20Gathering%20Card%20Tooltips&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24674-improper-neutralization-of-input-du-4de30d4b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Denis%20Cherniatev%20ShMapper%20by%20Teplitsa&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24683-improper-neutralization-of-special--8504c1b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24683%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Chill%20RSVP%20and%20Event%20Management&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24695-server-side-request-forgery-ssrf-in-d9445039</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24695%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HT%20Plugins%20Extensions%20For%20CF7&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24701-server-side-request-forgery-ssrf-in-4859a2cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24701%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Bob%20Chained%20Quiz&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24691-missing-authorization-in-ctltwp-peo-83a07b2f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24691%3A%20Missing%20Authorization%20in%20ctltwp%20People%20Lists&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24693-missing-authorization-in-yehi-advan-04db9bfd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24693%3A%20Missing%20Authorization%20in%20Yehi%20Advanced%20Notifications&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24681-improper-neutralization-of-input-du-6cedd5d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24681%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpWax%20Product%20Carousel%20Slider%20%26%20Grid%20Ultimate%20for%20WooCommerce&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24682-missing-authorization-in-michael-su-ead1e811</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24682%3A%20Missing%20Authorization%20in%20Michael%20Super%20Block%20Slider&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24687-improper-neutralization-of-input-du-791b5234</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24687%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lars%20Wallenborn%20Show%2FHide%20Shortcode&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24675-improper-neutralization-of-input-du-34209b93</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24675%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24666-improper-neutralization-of-input-du-0cac771d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeisle%20AI%20Chatbot%20for%20WordPress%20%E2%80%93%20Hyve%20Lite&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24679-missing-authorization-in-webraketen-c5832133</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24679%3A%20Missing%20Authorization%20in%20webraketen%20Internal%20Links%20Manager&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24673-improper-neutralization-of-script-r-c67e942e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24673%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20AyeCode%20Ketchup%20Shortcodes&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24669-improper-neutralization-of-special--f6bfbe54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24669%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20serpednet%20SERPed.net&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24658-improper-neutralization-of-input-du-afaddb7b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24658%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Auction%20Nudge%20%E2%80%93%20Your%20eBay%20on%20Your%20Site&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24672-improper-neutralization-of-special--f55f0db0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24672%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20codepeople%20Form%20Builder%20CP&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24668-improper-neutralization-of-input-du-aa151cd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24668%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeisle%20PPOM%20for%20WooCommerce&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24659-improper-neutralization-of-special--d28ad6da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24659%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjada%20WPDM%20%E2%80%93%20Premium%20Packages&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24649-missing-authorization-in-bowo-admin-451e3477</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24649%3A%20Missing%20Authorization%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24663-improper-neutralization-of-special--1ca01635</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24663%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mra13%20Simple%20Download%20Monitor&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24657-improper-neutralization-of-input-du-e8126a82</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24657%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebToffee%20Wishlist%20for%20WooCommerce&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24644-improper-neutralization-of-input-du-ccf98c36</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24644%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebToffee%20WooCommerce%20PDF%20Invoices%2C%20Packing%20Slips%2C%20Delivery%20Notes%20and%20Shipping%20Labels&amp;severity=null&amp;id=69cd7273e6bfc5ba1dee9ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24647-cross-site-request-forgery-csrf-in--bec77a3a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24647%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20datafeedr%20WooCommerce%20Cloak%20Affiliate%20Links&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24650-unrestricted-upload-of-file-with-da-02df5981</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24650%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themefic%20Tourfic&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24625-missing-authorization-in-marco-alme-b15c2f09</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24625%3A%20Missing%20Authorization%20in%20Marco%20Almeida%20%7C%20Webdados%20Taxonomy%2FTerm%20and%20Role%20based%20Discounts%20for%20WooCommerce&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24623-cross-site-request-forgery-csrf-in--7f6adcdb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24623%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Really%20Simple%20Plugins%20Really%20Simple%20SSL&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24638-improper-neutralization-of-input-du-4c2670b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pddring%20Create%20with%20Code&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24627-improper-neutralization-of-input-du-6658e2b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Linnea%20Huxford%20Blur%20Text&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24652-missing-authorization-in-revmakx-wp-af2c7031</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24652%3A%20Missing%20Authorization%20in%20revmakx%20WP%20Duplicate&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24634-improper-neutralization-of-input-du-31ae7428</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24634%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Svetoslav%20Marinov%20Orbisius%20Simple%20Notice&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24613-missing-authorization-in-foliovisio-026d42b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24613%3A%20Missing%20Authorization%20in%20FolioVision%20FV%20Thoughtful%20Comments&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24610-improper-neutralization-of-input-du-854e0fd2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Christian%20Leuenberg%20Restrict%20Anonymous%20Access&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24622-cross-site-request-forgery-csrf-in--5b79b529</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24622%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24618-missing-authorization-in-element-in-1ec55267</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24618%3A%20Missing%20Authorization%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24636-cross-site-request-forgery-csrf-in--fbd72407</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24636%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rick%20Laymance%20MachForm%20Shortcode&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24633-missing-authorization-in-silverplug-b1cc67d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24633%3A%20Missing%20Authorization%20in%20silverplugins217%20Build%20Private%20Store%20For%20Woocommerce&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24611-improper-limitation-of-a-pathname-t-b8302ec4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24611%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Smackcoders%20Inc.%2C%20WP%20Ultimate%20Exporter&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24596-missing-authorization-in-wc-product-adb6b389</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24596%3A%20Missing%20Authorization%20in%20WC%20Product%20Table%20WooCommerce%20Product%20Table%20Lite&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24604-missing-authorization-in-vikas-ratu-a8b863e0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24604%3A%20Missing%20Authorization%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24594-missing-authorization-in-aribhour-l-8675c523</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24594%3A%20Missing%20Authorization%20in%20aribhour%20Linet%20ERP-Woocommerce%20Integration&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24562-cross-site-request-forgery-csrf-in--40e1174e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24562%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Optimal%20Access%20KBucket&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24595-improper-neutralization-of-input-du-4e84a431</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20All%20Embed%20%E2%80%93%20Elementor%20Addons&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24572-cross-site-request-forgery-csrf-in--7c42029f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24588-missing-authorization-in-patreon-pa-32604ebb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24588%3A%20Missing%20Authorization%20in%20patreon%20Patreon%20WordPress&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24543-cross-site-request-forgery-csrf-in--13ccea32</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24543%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RSTheme%20Ultimate%20Coming%20Soon%20%26%20Maintenance&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24573-improper-neutralization-of-input-du-4b0f8fcc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Softaculous%20PageLayer&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24547-improper-neutralization-of-input-du-1630428d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matthias.wagner%20Caching%20Compatible%20Cookie%20Opt-In%20and%20JavaScript&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24552-generation-of-error-message-contain-870face3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24552%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20paytiumsupport%20Paytium&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee9202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24570-improper-neutralization-of-input-du-ca4bef70</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vito%20Peleg%20Atarim&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24579-improper-neutralization-of-input-du-920e9f64</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kyle%20Phillips%20Nested%20Pages&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24589-missing-authorization-in-js-morisse-6408f199</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24589%3A%20Missing%20Authorization%20in%20JS%20Morisset%20JSM%20Show%20Post%20Metadata&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24585-improper-neutralization-of-input-du-65c53b18</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24578-improper-neutralization-of-input-du-9a8a288b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24571-missing-authorization-in-epsiloncoo-c8a3c089</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24571%3A%20Missing%20Authorization%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24591-missing-authorization-in-ninja-team-b56ab005</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24591%3A%20Missing%20Authorization%20in%20Ninja%20Team%20GDPR%20CCPA%20Compliance%20Support&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24546-cross-site-request-forgery-csrf-in--bddce8f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24546%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RSTheme%20Ultimate%20Coming%20Soon%20%26%20Maintenance&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24582-insertion-of-sensitive-information--c2adbc1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24582%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24561-cross-site-request-forgery-csrf-in--d60c9f29</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24561%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20awcode%20ReviewsTap&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24580-missing-authorization-in-aa-web-ser-560df0e7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24580%3A%20Missing%20Authorization%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24568-cross-site-request-forgery-csrf-in--70c841a6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24568%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Brainstorm%20Force%20Starter%20Templates&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24555-cross-site-request-forgery-csrf-in--e74147e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24555%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20subscriptiondna%20Subscription%20DNA&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee920b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23991-missing-authorization-in-dotstore-p-22f2fae1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23991%3A%20Missing%20Authorization%20in%20Dotstore%20Product%20Size%20Charts%20Plugin%20for%20WooCommerce&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee915c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13698-cwe-862-missing-authorization-in-as-a00753d8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13698%3A%20CWE-862%20Missing%20Authorization%20in%20Astoundify%20Jobify%20-%20Job%20Board%20WordPress%20Theme&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41757-cwe-319-cleartext-transmission-of-s-43c5acd8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41757%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68e0f3c6b66c7f7acdd3ea84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10324-cwe-1230-exposure-of-sensitive-info-2a562a4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10324%3A%20CWE-1230%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20rometheme%20RTMKit&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11913-cwe-918-server-side-request-forgery-c0ea5175</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11913%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20buddydev%20Activity%20Plus%20Reloaded%20for%20BuddyPress&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13408-cwe-98-improper-control-of-filename-fe69bae3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13408%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpwax%20Post%20Grid%2C%20Slider%20%26%20Carousel%20Ultimate%20%E2%80%93%20with%20Shortcode%2C%20Gutenberg%20Block%20%26%20Elementor%20Widget&amp;severity=high&amp;id=699f6e55b7ef31ef0b59e684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13354-cwe-79-improper-neutralization-of-i-ed8af861</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13354%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%2C%20Kits%20and%20Elementor%20Templates&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13335-cwe-862-missing-authorization-in-te-96d7a28d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13335%3A%20CWE-862%20Missing%20Authorization%20in%20templatescoderthemes%20Spexo%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Widgets%2C%20Mega%20Menu%2C%20Popup%20Builder%2C%20Template%20Kits%20and%20Starter%20Templates%20for%20Elementor&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13542-cwe-79-improper-neutralization-of-i-be8e4391</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13542%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pagup%20WP%20Google%20Street%20View%20(with%20360%C2%B0%20virtual%20tour)%20%26%20Google%20maps%20%2B%20Local%20SEO&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13594-cwe-89-improper-neutralization-of-s-92840151</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13594%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20neofix%20Simple%20Downloads%20List&amp;severity=medium&amp;id=699f6e63b7ef31ef0b59f598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13572-cwe-79-improper-neutralization-of-i-87e1fd93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13572%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nfusionsolutions%20Precious%20Metals%20Charts%20and%20Widgets%20for%20WordPress&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13409-cwe-22-improper-limitation-of-a-pat-b4dab3c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13409%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpwax%20Post%20Grid%2C%20Slider%20%26%20Carousel%20Ultimate%20%E2%80%93%20with%20Shortcode%2C%20Gutenberg%20Block%20%26%20Elementor%20Widget&amp;severity=high&amp;id=699f6e55b7ef31ef0b59e688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22714-improper-neutralization-of-input-du-3876517e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22714%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MDJM%20Mobile%20DJ%20Manager&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23889-improper-neutralization-of-input-du-687db174</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23889%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tormorten%20FooGallery%20Captions&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23888-improper-neutralization-of-input-du-5257ff49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23888%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GrandSlambert%20Custom%20Page%20Extensions&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23885-improper-neutralization-of-input-du-4d4605a5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23885%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anildhiman%20MJ%20Contact%20us&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23839-improper-neutralization-of-input-du-1ad1e8a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23839%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Asif%20Shakeel%20Sticky%20Button&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23838-improper-neutralization-of-input-du-7ca2b361</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rally%20Vincent%20Bauernregeln&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23837-improper-neutralization-of-input-du-0167322b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23837%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20martinjuhasz%20One%20Backend%20Language&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23737-improper-neutralization-of-input-du-f1b02a8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thobian%20Network-Favorites&amp;severity=null&amp;id=69cd722be6bfc5ba1dee8504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23734-improper-neutralization-of-input-du-a4bcc2f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Casey%20Bisson%20Gigaom%20Sphinx&amp;severity=null&amp;id=69cd722be6bfc5ba1dee84fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23711-improper-neutralization-of-input-du-ef1b94be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23711%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Quincy%20Kwende%20Quote%20me&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23622-improper-neutralization-of-input-du-8b35f392</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23622%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sabuj%20Kundu%20CBX%20Accounting%20%26%20Bookkeeping&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23621-improper-neutralization-of-input-du-0572fcfd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algothemes%20Causes%20%E2%80%93%20Donation%20Plugin&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23522-improper-neutralization-of-input-du-3df5aa24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23522%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matthew%20Haines-Young%20HM%20Portfolio&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23427-improper-neutralization-of-input-du-ad655c4a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Anderson%20%2F%20Team%20Updraft%20Redux%20Converter&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23422-improper-limitation-of-a-pathname-t-f9f0b958</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23422%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moaluko%20Store%20Locator&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12494-cwe-79-improper-neutralization-of-i-2b0a8d90</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12494%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20otrok7%20BMLT%20Meeting%20Map&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13583-cwe-79-improper-neutralization-of-i-0e2b2a65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jitendra742744%20Simple%20Gallery%20with%20Filter&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13545-cwe-22-improper-limitation-of-a-pat-7f672a5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13545%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20eminozlem%20Bootstrap%20Ultimate&amp;severity=critical&amp;id=699f6e5fb7ef31ef0b59f17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13683-cwe-352-cross-site-request-forgery--13c8b301</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13683%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sperse%20Automate%20Hub%20Free%20by%20Sperse.IO&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a00b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13680-cwe-89-improper-neutralization-of-s-562f67e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13680%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20codepeople%20Form%20Builder%20CP&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a00a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57277-na-32d5b975</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57277%3A%20n%2Fa&amp;severity=medium&amp;id=69777f554623b1157c9acd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-24-2dbc37</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-24&amp;severity=medium&amp;id=682c7dc1e8347ec82d2dbc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-24-f129c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f129c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0693-cwe-204-observable-response-discrepa-b4b6ddc7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0693%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20AWS%20AWS%20Sign-in%20IAM%20Login%20Flow&amp;severity=medium&amp;id=68ee9ba2d8f994a66eca6014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52331-cwe-494-download-of-code-without-in-e70ed510</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52331%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ECOVACS%20Unspecified%20robots&amp;severity=high&amp;id=68e0f3c0b66c7f7acdd3d07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0650-improper-access-control-8a95edc9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0650%3A%20Improper%20Access%20Control&amp;severity=high&amp;id=68af0c87ad5a09ad00627bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23960-improper-neutralization-of-input-du-1194ce25</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20basteln3rk%20Save%20%26%20Import%20Image%20from%20URL&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23894-improper-neutralization-of-input-du-df73fde6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tatsuya%20wp-flickr-press&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23836-improper-neutralization-of-input-du-1e6f54e1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23836%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SuryaBhan%20Custom%20Coming%20Soon&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23835-improper-neutralization-of-input-du-077cab22</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmraya%20Legal%20%2B&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23834-improper-neutralization-of-input-du-27172f88</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23834%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RaminMT%20Links%2FProblem%20Reporter&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23733-improper-neutralization-of-input-du-fffaf0ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23733%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sayoko%20SC%20Simple%20Zazzle&amp;severity=null&amp;id=69cd722be6bfc5ba1dee84f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23730-improper-neutralization-of-input-du-721e501f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23730%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flx0%20FLX%20Dashboard%20Groups&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23729-improper-neutralization-of-input-du-ebbfd90a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23729%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fures%20XTRA%20Settings&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee844d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23727-improper-neutralization-of-input-du-b0daf4fd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23727%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antonzaroutski%20AZ%20Content%20Finder&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23725-improper-neutralization-of-input-du-2e2f24f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23725%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pshikli%20Accessibility%20Task%20Manager&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23724-improper-neutralization-of-input-du-7dca415f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23724%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oleksandr87%20University%20Quizzes%20Online&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee843e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23723-improper-neutralization-of-input-du-0efbcb98</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23723%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hdw%20player%20Plestar%20Directory%20Listing&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee843b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23722-improper-neutralization-of-input-du-c3755fc2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23722%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mind3dom%20Mind3doM%20RyeBread%20Widgets&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23636-improper-neutralization-of-input-du-6f3a2788</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dimitar%20A.%20My%20Favorite%20Car&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23634-improper-neutralization-of-input-du-e8588711</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23634%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codehandling%20Youtube%20Video%20Grid&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23629-improper-neutralization-of-input-du-fc0df104</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Subhasis%20Laha%20Gallerio&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23628-improper-neutralization-of-input-du-f02af922</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NewMediaOne%20GeoDigs&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23626-improper-neutralization-of-input-du-54c8e088</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fukushima%20Kumihimo&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23624-improper-neutralization-of-input-du-a7259583</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alessandro%20Benoit%20WpDevTool&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23545-improper-neutralization-of-input-du-299e7d6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Navnish%20Bhardwaj%20WP%20Social%20Broadcast&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23544-improper-neutralization-of-input-du-e8985310</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heart5%20StatPressCN&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23541-improper-neutralization-of-input-du-e2790f86</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edmon.parker%20Download%2C%20Downloads&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22768-cross-site-request-forgery-csrf-in--887a604b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22768%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JinHan%20Park%20Rocket%20Media%20Library%20Mime%20Type&amp;severity=null&amp;id=69cd760be6bfc5ba1df091c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22264-improper-neutralization-of-input-du-a2e96711</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22264%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Patel%20WP%20Query%20Creator&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10846-cwe-20-improper-input-validation-in-compose-spec-compose-go-befad5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10846%3A%20CWE-20%20Improper%20Input%20Validation%20in%20compose-spec%20compose-go&amp;severity=medium&amp;id=682d983ec4522896dcbefad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23540-improper-neutralization-of-input-du-78bb53eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23540%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mohsin%20Khan%20WP%20Front-end%20login%20and%20register&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57947-vulnerability-in-linux-linux-bdeb53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23006-cwe-502-deserialization-of-untruste-0472e24f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23006%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SonicWall%20SMA1000&amp;severity=critical&amp;id=68881727ad5a09ad0088bc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13340-cwe-79-improper-neutralization-of-i-a5e5bc4f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20MDTF%20%E2%80%93%20Meta%20Data%20and%20Taxonomies%20Filter&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12118-cwe-79-improper-neutralization-of-i-faa36a82</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b597584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13422-cwe-79-improper-neutralization-of-i-7244c59c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13422%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20suhas93%20SEO%20Blogger%20to%20WordPress%20Migration%20using%20301%20Redirection&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13236-cwe-89-improper-neutralization-of-s-5bd698ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13236%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20leogermani%20Tainacan&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12504-cwe-79-improper-neutralization-of-i-91e823ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Broadcast%20Live%20Video%20%E2%80%93%20Live%20Streaming%20%3A%20WebRTC%2C%20HLS%2C%20RTSP%2C%20RTMP&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13234-cwe-89-improper-neutralization-of-s-49291497</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13234%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20woobewoo%20Product%20Table%20for%20WooCommerce%20by%20WBW&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59ca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12043-cwe-79-improper-neutralization-of-i-6812b69e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0635-cwe-770-allocation-of-resources-with-b1aeca27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0635%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=699c3036be58cf853b75f139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0619-cwe-522-insufficiently-protected-cre-47f21a87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0619%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=699c3035be58cf853b75f120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0648-cwe-248-uncaught-exception-in-m-file-af4d78a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0648%3A%20CWE-248%20Uncaught%20Exception%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=699c3036be58cf853b75f13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13593-cwe-98-improper-control-of-filename-ff431b34</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13593%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20otrok7%20BMLT%20Meeting%20Map&amp;severity=high&amp;id=699f6e63b7ef31ef0b59f593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13511-cwe-352-cross-site-request-forgery--7cc1250d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13511%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themehunk%20Variation%20Swatches%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59eed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-23-2d9fcb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-23&amp;severity=medium&amp;id=682c7dc1e8347ec82d2d9fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-23-f130f3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f130f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12477-cwe-79-improper-neutralization-of-i-16ac37ff</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12477%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20156-improper-handling-of-insufficient-p-a826055a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20156%3A%20Improper%20Handling%20of%20Insufficient%20Privileges%20in%20Cisco%20Cisco%20Meeting%20Management&amp;severity=critical&amp;id=69a0a44d85912abc71d65242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20128-heap-based-buffer-overflow-in-cisco-654cee68</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20128%3A%20Heap-based%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Secure%20Endpoint&amp;severity=medium&amp;id=6908f50df612d110fe9cbec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23914-deserialization-of-untrusted-data-i-0eeaefc1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23914%3A%20Deserialization%20of%20Untrusted%20Data%20in%20muzaara%20Muzaara%20Google%20Ads%20Report&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23809-improper-neutralization-of-input-du-ed0b3d58</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23809%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sunil%20Nanda%20Blue%20Wrench%20Video%20Widget&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23992-improper-neutralization-of-input-du-42618fd7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20toocheke%20Toocheke%20Companion&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee915f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0604-improper-authentication-bec2dc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0604%3A%20Improper%20Authentication&amp;severity=medium&amp;id=682d9838c4522896dcbec2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23882-improper-neutralization-of-input-du-adfde36f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20misanthrop%20WP%20Download%20Codes&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23846-improper-neutralization-of-input-du-86df55d0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23846%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thaikolja%20Flexible%20Blogtitle&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23812-improper-neutralization-of-input-du-04716063</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Jeffrey%20Contact%20Form%207%20Round%20Robin%20Lead%20Distribution&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23768-improper-neutralization-of-input-du-f39192be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23768%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20inwavethemes%20InFunding&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee85f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23746-improper-neutralization-of-input-du-b22988d9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Edem%20CMC%20MIGRATE&amp;severity=null&amp;id=69cd722de6bfc5ba1dee8557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23709-improper-neutralization-of-input-du-1535877b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiroro%20Formatted%20post&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23643-improper-neutralization-of-input-du-61066ce2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23643%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20a.ankit%20ReadMe%20Creator&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23506-improper-neutralization-of-input-du-c770dd66</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23506%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imsoftware%20WP%20IMAP%20Auth&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23486-missing-authorization-in-tamlyn-dat-0e5ae4e8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23486%3A%20Missing%20Authorization%20in%20tamlyn%20Database%20Sync&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23475-improper-neutralization-of-input-du-0cca4697</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23475%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fireantology%20History%20timeline&amp;severity=null&amp;id=69cd761ee6bfc5ba1df09891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23462-improper-neutralization-of-input-du-cb55eab5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anil%20Jailta%20FWD%20Slider&amp;severity=null&amp;id=69cd761ae6bfc5ba1df0979e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23449-improper-neutralization-of-input-du-b600fc63</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidpuc%20Simple%20shortcode%20buttons&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22772-improper-neutralization-of-input-du-879335db</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22772%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stephanemartinw%20Mapbox%20for%20WP%20Advanced&amp;severity=null&amp;id=69cd760be6bfc5ba1df091c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23966-improper-neutralization-of-input-du-a70c433c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23966%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ala%20Falaki%20a%20Gateway%20for%20Pasargad%20Bank%20on%20WooCommerce&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23959-improper-neutralization-of-input-du-0e18e05f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Linus%20Lundahl%20Good%20Old%20Gallery&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23953-unrestricted-upload-of-file-with-da-459be43e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23953%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Scriptonite%20user%20files&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee90a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23949-improper-control-of-filename-for-in-21cd3c38</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23949%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dzeriho%20Improved%20Sale%20Badges%20%E2%80%93%20Free%20Version&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee9097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23948-improper-control-of-filename-for-in-da9d56cd</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23948%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Webarea%20Background%20animation%20blocks&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee9094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23944-deserialization-of-untrusted-data-i-4ee0a6da</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23944%3A%20Deserialization%20of%20Untrusted%20Data%20in%20bulktheme%20WOOEXIM&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23942-unrestricted-upload-of-file-with-da-22902b79</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23942%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ngocuct0912%20WP%20Load%20Gallery&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee904e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23938-improper-control-of-filename-for-in-8377ffc0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23938%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CRUDLab%20Image%20Gallery%20Box%20by%20CRUDLab&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23932-deserialization-of-untrusted-data-i-9dc6f76b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23932%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Marko-M%20Quick%20Count&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23931-improper-neutralization-of-special--c607a8bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23931%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Oliver%20Fuhrmann%20WordPress%20Local%20SEO&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23921-unrestricted-upload-of-file-with-da-dfe50543</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23921%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20sh1zen%20Multi%20Uploader%20for%20Gravity%20Forms&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23918-unrestricted-upload-of-file-with-da-e97d2075</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23918%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Enrico%20Sandoli%20Smallerik%20File%20Browser&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23910-improper-neutralization-of-special--0b52c95f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23910%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20keighl%20Menus%20Plus%2B&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23874-improper-neutralization-of-input-du-9ac0f11f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23874%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FalconTheme%20Team%20WP%20Block%20Pack&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23867-improper-neutralization-of-input-du-81bb54d9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23867%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markcoker%20WordPress%20File%20Search&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23866-improper-neutralization-of-input-du-d50c113e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23866%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20E.%20Marten%20EU%20DSGVO%20Helper&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23811-improper-neutralization-of-input-du-f9878f61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23811%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ghasemy14%20WP2APP&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23806-cross-site-request-forgery-csrf-in--adf4ae8b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23806%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeFarmer%20Ultimate%20Subscribe&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23803-cross-site-request-forgery-csrf-in--c267390d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23803%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rik%20Schennink%20Snippy&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23798-cwe-79-improper-neutralization-of-i-5294a726</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23798%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ElbowRobo%20Mass%20Messaging%20in%20BuddyPress&amp;severity=null&amp;id=68ae0f66ad5a09ad005b18c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23784-improper-neutralization-of-special--38706734</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23784%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20David%20Jeffrey%20Contact%20Form%207%20Round%20Robin%20Lead%20Distribution&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23781-insertion-of-sensitive-information--cd993a02</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23781%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Web%20Mumbai%20WM%20Options%20Import%20Export&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23774-insertion-of-sensitive-information--8fdccc7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23774%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Niket%20Joshi%20WPDB%20to%20Sql&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee860b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23770-improper-neutralization-of-input-du-2126f031</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Caspie%20Fast%20Tube&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee85ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23769-improper-neutralization-of-input-du-1c510097</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23769%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dreamsofmatter%20Content%20Mirror&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee85fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23758-improper-neutralization-of-input-du-3be3ece6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23758%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pootlepress%20Pootle%20button&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23732-improper-neutralization-of-input-du-3610acd7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23732%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20franciscopalacios%20Easy%20Filtering&amp;severity=null&amp;id=69cd722be6bfc5ba1dee84f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23706-improper-neutralization-of-input-du-79b38cee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23706%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milordk%20Jet%20Skinner%20for%20BuddyPress&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23701-improper-neutralization-of-input-du-74074365</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23701%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20limesquare%20Lime%20Developer%20Login&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23700-improper-neutralization-of-input-du-585784bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23700%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yonisink%20yCyclista&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23697-improper-neutralization-of-input-du-caa0e2b0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23697%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webdeal%20Pod%C4%8Dl%C3%A1nkov%C3%A1%20inzerce&amp;severity=null&amp;id=69cd764ce6bfc5ba1df0b0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23696-improper-neutralization-of-input-du-6b4c671a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23696%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ronan%20Mockett%20Staging%20CDN&amp;severity=null&amp;id=69cd764ce6bfc5ba1df0b0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23695-improper-neutralization-of-input-du-c4a15e6d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23695%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kinlane%20CtyGrid%20Hyp3rL0cal%20Search&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23686-improper-neutralization-of-input-du-1af8048d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23686%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phpdevca%20Admin%20Menu%20Organizer&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23684-missing-authorization-in-eugen-bobr-e3057fd2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23684%3A%20Missing%20Authorization%20in%20Eugen%20Bobrowski%20Debug%20Tool&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23683-improper-neutralization-of-input-du-1b77dce6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xdxdVSxdxd%20MACME&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23682-improper-neutralization-of-input-du-c4df4579</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23682%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bhuvnesh%20Gupta%20Preloader%20Quotes&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23681-improper-neutralization-of-input-du-5c8b6da0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23681%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tahminajannat%20REDIRECTION%20PLUS&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23679-improper-neutralization-of-input-du-9cf569dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23679%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Flourish%20Pixel%20FP%20RSS%20Category%20Excluder&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23678-improper-neutralization-of-input-du-4925cf95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23678%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Md%20Imranur%20Rahman%20LocalGrid&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23676-improper-neutralization-of-input-du-4a5eafee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shawfactor%20LH%20Email&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0af01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23674-improper-neutralization-of-input-du-658ff6e9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andygauk%20Bit.ly%20linker&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23672-improper-neutralization-of-input-du-3f3c9308</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23672%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tenteeglobal%20Instant%20Appointment&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23631-improper-neutralization-of-input-du-429a3eee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sarah%20Lewis%20Content%20Planner&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0aca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23630-improper-neutralization-of-input-du-0992eb67</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Irshad%20A.Khan%20Cyber%20Slider&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23625-improper-neutralization-of-input-du-b938a36d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awcode%20Unique%20UX&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23611-improper-neutralization-of-input-du-0da31919</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23611%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webhue%20WH%20Cache%20%26%20Security&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23610-improper-neutralization-of-input-du-b0d90bf8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tehsmash%20Ultimate%20Events&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23609-improper-neutralization-of-input-du-c81230d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23609%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Helle1%20Tagesteller&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23607-improper-neutralization-of-input-du-506b5790</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Camoo%20Sarl%20CAMOO%20SMS&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23606-improper-neutralization-of-input-du-3f8133dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23606%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sebkay%20Calendi&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23605-improper-neutralization-of-input-du-dfb85ee4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lampd%20Call%20To%20Action%20Popup&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23604-improper-neutralization-of-input-du-f34ab856</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23604%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maeve%20Lander%20Rezdy%20Reloaded&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23603-improper-neutralization-of-input-du-60cadaff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23603%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MohammadJafar%20Khajeh%20Group%20category%20creator&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23602-improper-neutralization-of-input-du-f1b05ae9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23602%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Europe%20Ecologie%20Les%20Verts%20EELV%20Newsletter&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23601-improper-neutralization-of-input-du-96e8f6a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23601%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20patrice%20Tab%20My%20Content&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23597-improper-neutralization-of-input-du-44556073</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23597%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sabareesha%20Rio%20Photo%20Gallery&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23592-improper-neutralization-of-input-du-b512d50f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20animexxx%20dForms&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23589-improper-neutralization-of-input-du-28d5610a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markugwuanyi%20ContentOptin%20Lite&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23583-improper-neutralization-of-input-du-46a6300e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23583%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Explara%20Explara%20Membership&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23578-improper-neutralization-of-input-du-072229bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Custom%20CSS%20Addons&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23562-improper-limitation-of-a-pathname-t-e1214956</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23562%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pitinca%20XLSXviewer&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23548-improper-neutralization-of-input-du-c0ae7121</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bilal%20TAS%20Responsivity&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23535-improper-neutralization-of-input-du-dfdf84c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23535%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20martin_ziegert%20REAL%20WordPress%20Sidebar&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a75d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23512-missing-authorization-in-118group-t-ec3a0e8c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23512%3A%20Missing%20Authorization%20in%20118group%20Team%20118GROUP%20Agent&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23509-improper-neutralization-of-input-du-0b561ce7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23509%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siteheart%20HyperComments&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23507-improper-neutralization-of-input-du-141324e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23507%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blrt%20Blrt%20WP%20Embed&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23503-improper-neutralization-of-input-du-4fc65552</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23503%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osolwordpress%20Customizable%20Captcha%20and%20Contact%20Us&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23500-improper-neutralization-of-input-du-bfcd974e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faaiq%20Simple%20Custom%20post%20type%20custom%20field&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23498-improper-neutralization-of-input-du-b5c6b122</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23498%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ContentLocalized%20Translation.Pro&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23495-improper-neutralization-of-input-du-b6810143</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23495%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chetan%20Khandla%20WooCommerce%20Order%20Search&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0395-cwe-131-incorrect-calculation-of-buffer-size-in-the-gnu-c-library-glibc-bee39b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0395%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=682d983bc4522896dcbee39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13496-cwe-89-improper-neutralization-of-s-e80a426a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13496%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rubengc%20GamiPress%20%E2%80%93%20Gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13447-cwe-862-missing-authorization-in-th-213848c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13447%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13499-cwe-94-improper-control-of-generati-91c7831a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13499%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rubengc%20GamiPress%20%E2%80%93%20Gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13495-cwe-94-improper-control-of-generati-1a86848d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13495%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rubengc%20GamiPress%20%E2%80%93%20Gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0429-cwe-502-deserialization-of-untrusted-72754ac8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0429%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20senols%20AI%20Puffer%20%E2%80%93%20Your%20AI%20engine%20for%20WordPress%20(formerly%20AI%20Power)&amp;severity=high&amp;id=699f6b69b7ef31ef0b55526b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13319-cwe-79-improper-neutralization-of-i-81f44d29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Builder&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0428-cwe-502-deserialization-of-untrusted-43955ce8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0428%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20senols%20AI%20Puffer%20%E2%80%93%20Your%20AI%20engine%20for%20WordPress%20(formerly%20AI%20Power)&amp;severity=high&amp;id=699f6b69b7ef31ef0b555267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13360-cwe-918-server-side-request-forgery-930f7928</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13360%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20senols%20AI%20Puffer%20%E2%80%93%20Your%20AI%20engine%20for%20WordPress%20(formerly%20AI%20Power)&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13361-cwe-862-missing-authorization-in-se-4d956701</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13361%3A%20CWE-862%20Missing%20Authorization%20in%20senols%20AI%20Puffer%20%E2%80%93%20Your%20AI%20engine%20for%20WordPress%20(formerly%20AI%20Power)&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12117-cwe-79-improper-neutralization-of-i-62219fe0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bfintal%20Stackable%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12857-cwe-288-authentication-bypass-using-9752f3da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12857%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=699f6e4bb7ef31ef0b59c680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13406-cwe-79-improper-neutralization-of-i-2a3f14a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13406%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20XML%20for%20Google%20Merchant%20Center&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12879-cwe-862-missing-authorization-in-qu-49ad34eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12879%3A%20CWE-862%20Missing%20Authorization%20in%20QuantumCloud%20WPBot%20Pro%20Wordpress%20Chatbot&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11218-improper-privilege-management-bd877e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11218%3A%20Improper%20Privilege%20Management&amp;severity=high&amp;id=682d9819c4522896dcbd877e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13590-cwe-79-improper-neutralization-of-i-e2c3ed18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13590%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ayecode%20Ketchup%20Shortcodes&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13584-cwe-79-improper-neutralization-of-i-029f7b73</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13584%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Picture%20Gallery%20%E2%80%93%20Frontend%20Image%20Uploads%2C%20AJAX%20Photo%20List&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13426-cwe-89-improper-neutralization-of-s-eeb80730</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13426%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gamerz%20WP-Polls&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23090-84411a74</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23090&amp;severity=null&amp;id=687ad5bda83201eaacf7835e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23083-vulnerability-in-nodejs-node-bed624</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23083%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-22-23521633</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-22&amp;severity=medium&amp;id=68367c97182aa0cae231a15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-22-f26571</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-22&amp;severity=medium&amp;id=682acdc4bbaf20d303f26571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-22-f120ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f120ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13091-cwe-434-unrestricted-upload-of-file-815cbfc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13091%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20QuantumCloud%20WPBot%20Pro%20Wordpress%20Chatbot&amp;severity=critical&amp;id=699f6e4db7ef31ef0b59c8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49749-remote-code-execution-in-google-and-d6f2812d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49749%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=69a0a44485912abc71d6312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43765-elevation-of-privilege-in-google-an-a1ee741e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43765%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a43d85912abc71d624a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43095-elevation-of-privilege-in-google-an-0dc34d93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43095%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a43d85912abc71d6249e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34730-elevation-of-privilege-in-google-an-6a09b08d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34730%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a43d85912abc71d6248f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45479-cwe-918-server-side-request-forgery-b952b9cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45479%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=critical&amp;id=68487f591b0bd07c3938aa6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45478-cwe-79-improper-neutralization-of-i-dd660770</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45478%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=medium&amp;id=68487f591b0bd07c3938aa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21569-difficult-to-exploit-vulnerability--db5d9055</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21569%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hyperion%20Data%20Relationship%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Hyperion%20Data%20Relationship%20Management.%20in%20Oracle%20Corporation%20Oracle%20Hyperion%20Data%20Relationship%20Management&amp;severity=medium&amp;id=69a0a45185912abc71d6565f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21567-easily-exploitable-vulnerability-al-30c22148</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21567%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4fc28fd46ded81d153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21566-easily-exploitable-vulnerability-al-932117a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21566%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4fc28fd46ded81d14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21559-easily-exploitable-vulnerability-al-f706df0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21559%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4fc28fd46ded81d14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21556-easily-exploitable-vulnerability-al-b52254f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21556%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20PLM%20Framework.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Agile%20PLM%20Framework%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Agile%20PLM%20Framework.%20in%20Oracle%20Corporation%20Oracle%20Agile%20PLM%20Framework&amp;severity=critical&amp;id=69a0a45185912abc71d6565c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21555-easily-exploitable-vulnerability-al-e5fd629d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21555%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4fc28fd46ded81d147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21546-easily-exploitable-vulnerability-al-911fbd5c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21546%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=69091a4dc28fd46ded81d113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21543-easily-exploitable-vulnerability-al-94f417ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21543%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=69091a4dc28fd46ded81d10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21540-easily-exploitable-vulnerability-al-38481d81</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21540%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21536-easily-exploitable-vulnerability-al-10b5b939</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21536%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21535-easily-exploitable-vulnerability-al-65ad2f63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21535%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20T3%2C%20IIOP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20WebLogic%20Server.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=critical&amp;id=69a0a45185912abc71d65659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21534-easily-exploitable-vulnerability-al-82711270</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21534%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21532-easily-exploitable-vulnerability-al-93fe2dd0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21532%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Analytics%20Desktop%20executes%20to%20compromise%20Oracle%20Analytics%20Desktop.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Analytics%20Desktop.%20in%20Oracle%20Corporation%20Oracle%20Analytics%20Desktop&amp;severity=high&amp;id=69a0a45185912abc71d65656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21531-easily-exploitable-vulnerability-al-0632b51c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21531%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=69091a4dc28fd46ded81d0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21529-easily-exploitable-vulnerability-al-b4adb944</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21529%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21525-easily-exploitable-vulnerability-al-1903875d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21525%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21524-easily-exploitable-vulnerability-al-524494f7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21524%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20JD%20Edwards%20EnterpriseOne%20Tools.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=critical&amp;id=69a0a45185912abc71d65653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21523-easily-exploitable-vulnerability-al-6170ccf3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21523%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21522-easily-exploitable-vulnerability-al-d7ae6b3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21522%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21521-easily-exploitable-vulnerability-al-56effc3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21521%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=high&amp;id=69091a4cc28fd46ded81d0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21520-difficult-to-exploit-vulnerability--552e91ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21520%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Cluster%20executes%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Cluster%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=low&amp;id=69091a4cc28fd46ded81d0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21519-difficult-to-exploit-vulnerability--a9c0bdc7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21519%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21518-easily-exploitable-vulnerability-al-c7925807</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21518%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21515-easily-exploitable-vulnerability-al-7db0d531</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21515%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20JD%20Edwards%20EnterpriseOne%20Tools.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=high&amp;id=69a0a45185912abc71d65650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21505-easily-exploitable-vulnerability-al-b75fe706</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21505%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21504-easily-exploitable-vulnerability-al-bb78dd21</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21504%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21503-easily-exploitable-vulnerability-al-2e546a02</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21503%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21501-easily-exploitable-vulnerability-al-1c54f7fe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21501%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21500-easily-exploitable-vulnerability-al-d4632947</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21500%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21499-easily-exploitable-vulnerability-al-1c129e73</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21499%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21497-easily-exploitable-vulnerability-al-ba6e7739</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21497%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4ac28fd46ded81d09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21494-difficult-to-exploit-vulnerability--6869fe7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21494%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Server%20executes%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4ac28fd46ded81d09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21493-difficult-to-exploit-vulnerability--049c32a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21493%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4ac28fd46ded81d096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21491-easily-exploitable-vulnerability-al-1e366011</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21491%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4ac28fd46ded81d092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21490-easily-exploitable-vulnerability-al-e23979d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21490%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4ac28fd46ded81d08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23994-improper-neutralization-of-input-du-b0316db9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23994%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Estatebud%20Estatebud%20%E2%80%93%20Properties%20%26%20Listings&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22722-missing-authorization-in-marketing--e5c87f5d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22722%3A%20Missing%20Authorization%20in%20Marketing%20Fire%20Widget%20Options&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22721-missing-authorization-in-farhan-noo-a8d42323</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22721%3A%20Missing%20Authorization%20in%20Farhan%20Noor%20ApplyOnline&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22661-improper-neutralization-of-input-du-1a6e1b29</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22661%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Online%20Payments%20%E2%80%93%20Get%20Paid%20with%20PayPal%2C%20Square%20%26%20Stripe&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22276-improper-neutralization-of-input-du-6a6c9711</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22276%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enguerranws%20Related%20Post%20Shortcode&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22267-improper-neutralization-of-input-du-8af72e24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22267%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweaver%20Weaver%20Themes%20Shortcode%20Compatibility&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23580-improper-neutralization-of-input-du-fa3104df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23580%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matthew%20BizLibrary&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23551-improper-neutralization-of-input-du-e0effac0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20razvypp%20SexBundle&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a83d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23489-improper-neutralization-of-input-du-d979b7d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23489%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brian%20Messenlehner%20WP-Announcements&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23477-missing-authorization-in-realtywork-cd8e3418</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23477%3A%20Missing%20Authorization%20in%20realtyworkstation%20Realty%20Workstation&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23461-improper-neutralization-of-input-du-57121c7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xkollsoftware%20Social2Blog&amp;severity=null&amp;id=69cd761ae6bfc5ba1df0979b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23454-improper-neutralization-of-input-du-275a9ddd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flashmaniac%20Nature%20FlipBook&amp;severity=null&amp;id=69cd761ae6bfc5ba1df09763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24001-cross-site-request-forgery-csrf-in--a5eb8dde</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24001%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ng%C3%B4%20Th%E1%BA%AFng%20IT%20PPO%20Call%20To%20Actions&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee916b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23998-improper-neutralization-of-input-du-21e412ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23998%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20raratheme%20UltraLight&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23997-improper-neutralization-of-input-du-656a80bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23997%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tamara%20Solution%20Tamara%20Checkout&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22825-improper-neutralization-of-input-du-b554460a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22825%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdesk%20Flexible%20PDF%20Coupons&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22733-improper-neutralization-of-input-du-e41564df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22733%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22732-improper-neutralization-of-input-du-f3cee18f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22732%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Admiral%20Ad%20Blocking%20Detector&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22727-improper-neutralization-of-input-du-1cd6196b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22727%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginOps%20MailChimp%20Subscribe%20Forms&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22723-unrestricted-upload-of-file-with-da-3e0932df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22723%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22719-improper-neutralization-of-input-du-bb00d036</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22719%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikAppointments%20Services%20Booking%20Calendar&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22718-improper-neutralization-of-input-du-afdb5568</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22718%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roninwp%20FAT%20Event%20Lite&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22717-missing-authorization-in-joe-dolson-b1b9c2b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22717%3A%20Missing%20Authorization%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22711-improper-neutralization-of-input-du-45866789</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22711%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Thomas%20Maier%20Image%20Source%20Control&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22710-improper-neutralization-of-special--09e11c25</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22710%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20storeapps%20Smart%20Manager&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22709-improper-neutralization-of-input-du-ba46dfe4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soft8Soft%20LLC%20Verge3D&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22262-improper-neutralization-of-input-du-d7956cec</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22262%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WittyFolk%20Bonjour%20Bar&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32555-incorrect-privilege-assignment-in-i-40b749e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32555%3A%20Incorrect%20Privilege%20Assignment%20in%20InspiryThemes%20Easy%20Real%20Estate&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22735-improper-neutralization-of-input-du-e0d2346b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Steve%20Burge%20WordPress%20Tag%20Cloud%20Plugin%20%E2%80%93%20Tag%20Groups&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22553-improper-neutralization-of-special--ba3e11cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22553%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dhananjaysingh%20Multiple%20Carousel&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22322-improper-neutralization-of-input-du-b233000a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DeluxeThemes%20Private%20Messages%20for%20UserPro&amp;severity=null&amp;id=69cd75dae6bfc5ba1df0819d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22318-missing-authorization-in-enituretec-f4dc4e6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22318%3A%20Missing%20Authorization%20in%20enituretechnology%20Standard%20Box%20Sizes%20%E2%80%93%20for%20WooCommerce&amp;severity=null&amp;id=69cd75dae6bfc5ba1df08197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22311-improper-control-of-filename-for-in-15062d63</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22311%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20DeluxeThemes%20Private%20Messages%20for%20UserPro&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df08133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56277-improper-encoding-or-escaping-of-ou-da884850</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56277%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51919-unrestricted-upload-of-file-with-da-7abb603a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51919%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=null&amp;id=69cd7535e6bfc5ba1df03668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51888-incorrect-privilege-assignment-in-f-0393f389</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51888%3A%20Incorrect%20Privilege%20Assignment%20in%20favethemes%20Homey%20Login%20Register&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51818-improper-neutralization-of-special--a8236362</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51818%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49700-improper-neutralization-of-input-du-1ccf43da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49700%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49699-deserialization-of-untrusted-data-i-1c4e0498</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49699%3A%20Deserialization%20of%20Untrusted%20Data%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49688-deserialization-of-untrusted-data-i-2445cc88</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49688%3A%20Deserialization%20of%20Untrusted%20Data%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df01994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49666-improper-neutralization-of-special--1363acd5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49666%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df01860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49655-improper-neutralization-of-special--33408bef</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49655%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df01767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57946-vulnerability-in-linux-linux-bdeb4f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21664-vulnerability-in-linux-linux-be9778</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21663-vulnerability-in-linux-linux-be9774</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21662-vulnerability-in-linux-linux-bdd2ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21661-vulnerability-in-linux-linux-be9770</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21660-vulnerability-in-linux-linux-bdd2c6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21660%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21659-vulnerability-in-linux-linux-be976c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe976c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21658-vulnerability-in-linux-linux-be9768</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21657-vulnerability-in-linux-linux-be9764</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21656-vulnerability-in-linux-linux-be975e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe975e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57945-vulnerability-in-linux-linux-bdd203</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57944-vulnerability-in-linux-linux-bdeb3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57943-vulnerability-in-linux-linux-bdeb2b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57942-vulnerability-in-linux-linux-bdeb23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57941-vulnerability-in-linux-linux-bdeb1b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57940-vulnerability-in-linux-linux-bdeb13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57939-vulnerability-in-linux-linux-bdeb0b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57938-vulnerability-in-linux-linux-bdeafc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57936-vulnerability-in-linux-linux-bdeaeb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57935-vulnerability-in-linux-linux-bdd1fb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd1fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57934-vulnerability-in-linux-linux-bdeae3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57933-vulnerability-in-linux-linux-bdeadb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57932-vulnerability-in-linux-linux-bdeac4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57931-vulnerability-in-linux-linux-bdeac0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57930-vulnerability-in-linux-linux-bdeaba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13444-cwe-352-cross-site-request-forgery--8d51a498</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13444%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tuxlog%20wp-greet&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11226-cwe-79-improper-neutralization-of-i-6fa3377b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexmoss%20FireCask%20Like%20%26%20Share%20Button&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b59416f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13230-cwe-89-improper-neutralization-of-s-a2a5b31d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13230%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20the_champ%20Social%20Share%2C%20Social%20Login%20and%20Social%20Comments%20Plugin%20%E2%80%93%20Super%20Socializer&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0450-cwe-79-improper-neutralization-of-in-5bb773ae</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=699f6b69b7ef31ef0b555276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23184-cwe-400-uncontrolled-resource-consu-b7456c2e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23184%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20CXF&amp;severity=medium&amp;id=69403410d9bcdf3f3de99382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13404-cwe-79-improper-neutralization-of-i-7d606183</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13404%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Link%20Library&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12104-cwe-862-missing-authorization-in-wp-00076b42</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12104%3A%20CWE-862%20Missing%20Authorization%20in%20wpfeedback%20Atarim%20%E2%80%93%20Visual%20Feedback%2C%20Review%20%26%20AI%20Collaboration&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12005-cwe-352-cross-site-request-forgery--9fa106bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12005%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zjhzxhz%20WP-BibTeX&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0371-cwe-79-improper-neutralization-of-in-e552e46a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0371%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements&amp;severity=medium&amp;id=699f6b69b7ef31ef0b555252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10936-cwe-502-deserialization-of-untruste-23c43f80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10936%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20instawp%20String%20locator&amp;severity=high&amp;id=699f6e03b7ef31ef0b593913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13536-cwe-209-generation-of-error-message-e069d76e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13536%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%208blocks%201003%20Mortgage%20Application&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56998-na-6baa1228</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56998%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56997-na-62cf5acc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56997%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54795-na-159395dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54795%3A%20n%2Fa&amp;severity=medium&amp;id=68f2616f9c34d0947f2ce865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54794-na-e6924899</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54794%3A%20n%2Fa&amp;severity=critical&amp;id=68f2616f9c34d0947f2ce861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54792-na-39141dec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54792%3A%20n%2Fa&amp;severity=medium&amp;id=68f2616f9c34d0947f2ce85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-21-2dabeb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-21&amp;severity=medium&amp;id=682c7dc1e8347ec82d2dabeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-21-f1258b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f1258b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21655-vulnerability-in-linux-linux-be9744</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13176-cwe-385-covert-timing-channel-in-openssl-openssl-289643</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13176%3A%20CWE-385%20Covert%20Timing%20Channel%20in%20OpenSSL%20OpenSSL&amp;severity=medium&amp;id=6834b1540acd01a249289643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52923-vulnerability-in-linux-linux-be7928</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24337-cwe-281-improper-preservation-of-pe-38bef327</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24337%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Musing%20Studio%20WriteFreely&amp;severity=high&amp;id=699f6b1bb7ef31ef0b54e370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-20-2dec89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-20&amp;severity=medium&amp;id=682c7dc2e8347ec82d2dec89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-20-f1300e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f1300e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57929-vulnerability-in-linux-linux-bdeaa9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57928-vulnerability-in-linux-linux-bdeaa1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeaa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57927-vulnerability-in-linux-linux-bdea99</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57926-vulnerability-in-linux-linux-bdea91</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdea91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57925-vulnerability-in-linux-linux-bdea80</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdea80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57924-vulnerability-in-linux-linux-bdea7a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57923-vulnerability-in-linux-linux-bdea69</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdea69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57922-vulnerability-in-linux-linux-bdea54</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57921-vulnerability-in-linux-linux-bdea4c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdea4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57920-vulnerability-in-linux-linux-bdea44</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57919-vulnerability-in-linux-linux-bdea3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57918-vulnerability-in-linux-linux-bdea38</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57917-vulnerability-in-linux-linux-bdea2b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57916-vulnerability-in-linux-linux-bdea27</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57914-vulnerability-in-linux-linux-bdea23</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57913-vulnerability-in-linux-linux-bdea1f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57912-vulnerability-in-linux-linux-bdea1b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57911-vulnerability-in-linux-linux-bdea0a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbdea0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57910-vulnerability-in-linux-linux-bdd1f3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57909-vulnerability-in-linux-linux-bde9fd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57908-vulnerability-in-linux-linux-bde9f9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57907-vulnerability-in-linux-linux-bde9f5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57906-vulnerability-in-linux-linux-bdd1eb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57905-vulnerability-in-linux-linux-bde9f1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57904-vulnerability-in-linux-linux-bde9ed</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21654-vulnerability-in-linux-linux-be9740</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21653-vulnerability-in-linux-linux-be973c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe973c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21652-vulnerability-in-linux-linux-be9738</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21651-vulnerability-in-linux-linux-be9734</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21651%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21650-vulnerability-in-linux-linux-bdd2c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21650%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21649-vulnerability-in-linux-linux-be9730</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21648-vulnerability-in-linux-linux-be972c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe972c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21647-vulnerability-in-linux-linux-bdd2be</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21646-vulnerability-in-linux-linux-be9728</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21645-vulnerability-in-linux-linux-bdd2ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21644-vulnerability-in-linux-linux-be9724</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21643-vulnerability-in-linux-linux-be9717</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21642-vulnerability-in-linux-linux-bdd2a9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21641-vulnerability-in-linux-linux-be9704</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21640-vulnerability-in-linux-linux-be9700</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21639-vulnerability-in-linux-linux-be96fc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21638-vulnerability-in-linux-linux-bdd2a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21637-vulnerability-in-linux-linux-be96f8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21636-vulnerability-in-linux-linux-be96f4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21635-vulnerability-in-linux-linux-be96f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21634-vulnerability-in-linux-linux-be96ea</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe96ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21633-aeb0f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21633&amp;severity=low&amp;id=682cd0f71484d88663aeb0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21632-vulnerability-in-linux-linux-be96e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21631-vulnerability-in-linux-linux-bdd29b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8722-cwe-79-improper-neutralization-of-in-5d63ab47</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soflyy%20WP%20All%20Import%20Pro&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-19-2dcf65</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-19&amp;severity=medium&amp;id=682c7dc1e8347ec82d2dcf65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-19-f12973</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13375-cwe-620-unverified-password-change--59f12fb9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13375%3A%20CWE-620%20Unverified%20Password%20Change%20in%20spoonthemes%20Adifier%20System&amp;severity=critical&amp;id=699f6e52b7ef31ef0b59e3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13184-cwe-89-improper-neutralization-of-s-b5cabaed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13184%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59c945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13392-cwe-79-improper-neutralization-of-i-d98f7f37</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Rate%20Star%20Review%20Vote%20%E2%80%93%20AJAX%20Reviews%2C%20Votes%2C%20Star%20Ratings&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13433-cwe-79-improper-neutralization-of-i-b04ac0f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yunra%20Utilities%20for%20MTG&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13393-cwe-79-improper-neutralization-of-i-d829e4b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13393%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Video%20Share%20VOD%20%E2%80%93%20Turnkey%20Video%20Site%20Builder%20Script&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0369-cwe-79-improper-neutralization-of-in-09251557</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=medium&amp;id=699f6b67b7ef31ef0b55514d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12696-cwe-79-improper-neutralization-of-i-ce37939e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Picture%20Gallery%20%E2%80%93%20Frontend%20Image%20Uploads%2C%20AJAX%20Photo%20List&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13385-cwe-79-improper-neutralization-of-i-6390eeeb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jsmoriss%20JSM%20Screenshot%20Machine%20Shortcode&amp;severity=medium&amp;id=699f6e53b7ef31ef0b59e4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13517-cwe-79-improper-neutralization-of-i-da7c6385</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13517%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12385-cwe-352-cross-site-request-forgery--75aa3759</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12385%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kevonadonis%20WP%20Abstracts&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13519-cwe-79-improper-neutralization-of-i-d29a67e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13519%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webwizardsdev%20MarketKing%20%E2%80%94%20Ultimate%20WooCommerce%20Multivendor%20Marketplace%20Solution&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13317-cwe-352-cross-site-request-forgery--ae968016</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13317%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20advancedcreation%20ShipWorks%20Connector%20for%20Woocommerce&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0515-cwe-862-missing-authorization-in-cms-7c5e7b5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0515%3A%20CWE-862%20Missing%20Authorization%20in%20cmsmasters%20Buzz%20Club%20%E2%80%93%20Night%20Club%2C%20DJ%20and%20Music%20Festival%20Event%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b69b7ef31ef0b555303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13432-cwe-352-cross-site-request-forgery--c24fc5f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13432%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sjhand%20Webcamconsult&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13391-cwe-79-improper-neutralization-of-i-92cf067a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20MicroPayments%20%E2%80%93%20Fans%20Paysite%3A%20Paid%20Creator%20Subscriptions%2C%20Digital%20Assets%2C%20Wallet&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0308-cwe-89-improper-neutralization-of-sp-b74c741f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0308%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=high&amp;id=699f6b67b7ef31ef0b5550a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13516-cwe-79-improper-neutralization-of-i-0420206d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13516%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13515-cwe-79-improper-neutralization-of-i-9e2d41ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13515%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webzunft%20Image%20Source%20Control%20Lite%20%E2%80%93%20Show%20Image%20Credits%20and%20Captions&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0318-cwe-200-exposure-of-sensitive-inform-e2e6bdf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0318%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=699f6b67b7ef31ef0b55511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0554-cwe-79-improper-neutralization-of-in-db0b37a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eteubert%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=699f6b69b7ef31ef0b55530b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12071-cwe-862-missing-authorization-in-ev-9836b779</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12071%3A%20CWE-862%20Missing%20Authorization%20in%20evergreencontentposter%20Evergreen%20Content%20Poster%20%E2%80%93%20Auto%20Post%20and%20Schedule%20Your%20Best%20Content%20to%20Social%20Media&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23209-cwe-94-improper-control-of-generati-04886799</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23209%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=68881727ad5a09ad0088bc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-18-2dc816</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-18&amp;severity=medium&amp;id=682c7dc1e8347ec82d2dc816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-18-f1310c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-18&amp;severity=medium&amp;id=682acdc2bbaf20d303f1310c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23206-cwe-347-improper-verification-of-cr-f85980a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23206%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20aws%20aws-cdk&amp;severity=low&amp;id=697391d84623b1157c4b18cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21185-cwe-284-improper-access-control-in--ae2fecd6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21185%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68c0c0d09ed239a66badfce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21399-cwe-426-untrusted-search-path-in-mi-aaac28ae</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21399%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20Edge%20Update%20Setup&amp;severity=high&amp;id=6852d15033c7acc046ee0911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12370-cwe-284-improper-access-control-in--9ff5f363</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12370%3A%20CWE-284%20Improper%20Access%20Control%20in%20thimpress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12203-cwe-79-improper-neutralization-of-i-0c92c9d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12203%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandondove%20RSS%20Icon%20Widget&amp;severity=medium&amp;id=699f6e31b7ef31ef0b59783f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12466-cwe-79-improper-neutralization-of-i-4e27291a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scribit%20Proofreading&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12598-cwe-79-improper-neutralization-of-i-9ad17c98</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12598%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookProgress%20by%20Stormhill%20Media&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12637-cwe-200-exposure-of-sensitive-infor-f8afb38d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12637%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20katsushi-kawamori%20Moving%20Users&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13367-cwe-862-missing-authorization-in-ba-f8629f95</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13367%3A%20CWE-862%20Missing%20Authorization%20in%20barteled%20Sandbox&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13386-cwe-79-improper-neutralization-of-i-29fc3723</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13386%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobig%20quote-posttype-plugin&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13366-cwe-79-improper-neutralization-of-i-b58c5131</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13366%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20barteled%20Sandbox&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e2fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12508-cwe-79-improper-neutralization-of-i-3b0c12c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glofoxwebdev%20Glofox%20Shortcodes&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59baa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10799-cwe-22-improper-limitation-of-a-pat-b91ebb5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10799%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b592685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13333-cwe-434-unrestricted-upload-of-file-a02949a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13333%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20saadiqbal%20Advanced%20File%20Manager%20%E2%80%94%20Ultimate%20WordPress%20File%20Manager%20and%20Document%20Library%20Plugin&amp;severity=high&amp;id=699f6e50b7ef31ef0b59cb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13398-cwe-79-improper-neutralization-of-i-0612829d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20naa986%20Checkout%20for%20PayPal&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13434-cwe-79-improper-neutralization-of-i-f04ff764</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chuck1982%20WP%20Inventory%20Manager&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13401-cwe-79-improper-neutralization-of-i-d9c5b9f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13401%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20naa986%20Payment%20Button%20for%20PayPal&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21325-cwe-732-incorrect-permission-assign-389b7cb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21325%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c0c0d09ed239a66badfd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57372-na-bdb0b219</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57372%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57252-na-28381db4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57252%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57030-na-dd5a7716</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57030%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52870-na-6c05a364</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52870%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb9b7ef31ef0b55a691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-17-2ddb14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-17&amp;severity=medium&amp;id=682c7dc2e8347ec82d2ddb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-17-f1288c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f1288c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23764-missing-authorization-in-ujjavaljan-53ed6b9d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23764%3A%20Missing%20Authorization%20in%20ujjavaljani%20Copy%20Move%20Posts&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23793-cross-site-request-forgery-csrf-in--ef2a8bf8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23793%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ciprian%20Turcu%20Auto%20FTP&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23957-missing-authorization-in-surdotly-s-be3e0eae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23957%3A%20Missing%20Authorization%20in%20surdotly%20Sur.ly&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23965-improper-neutralization-of-input-du-deb1f530</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23965%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kopatheme%20Kopa%20Nictitate%20Toolkit&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23961-missing-authorization-in-wptasker-w-fe0d74b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23961%3A%20Missing%20Authorization%20in%20wptasker%20WordPress%20Graphs%20%26%20Charts&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23963-missing-authorization-in-flymke-mar-415bbd6f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23963%3A%20Missing%20Authorization%20in%20flymke%20Mark%20Posts&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23962-missing-authorization-in-jjtrabucco-b5ba0ec3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23962%3A%20Missing%20Authorization%20in%20jjtrabucco%20Goldstar&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23954-missing-authorization-in-awcode-sal-0ef2a3f8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23954%3A%20Missing%20Authorization%20in%20awcode%20Salvador%20%E2%80%93%20AI%20Image%20Generator&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee90a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23939-improper-neutralization-of-input-du-7ffe8982</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KHAN-IT%20Image%20Switcher&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23950-improper-neutralization-of-input-du-c3ee6b2a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23950%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ezmarketing%20EZPlayer&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee909a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23943-improper-neutralization-of-input-du-7a76bed5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aruvi%20PDF.js%20Shortcode&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23946-improper-neutralization-of-input-du-695fb4a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23946%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Le-Pixel-Solitaire%20Enhanced%20YouTube%20Shortcode&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee908e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23941-improper-neutralization-of-input-du-22fbd12e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23941%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20meinturnierplan%20MeinTurnierplan.de%20Widget%20Viewer&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee904b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23951-improper-neutralization-of-input-du-529029ac</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DIVENGINE%20Gallery%3A%20Hybrid%20%E2%80%93%20Advanced%20Visual%20Gallery&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee909d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23947-improper-neutralization-of-input-du-a4f359e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M.J%20WP-Player&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee9091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23934-improper-neutralization-of-input-du-4c2ca572</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23934%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sam%20Brodie%20Giveaways%20and%20Contests%20by%20PromoSimple&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee9003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23940-improper-neutralization-of-input-du-465c4f4c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horiyuki%20Image%20Switcher&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23928-improper-neutralization-of-input-du-7b78fad5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aleksandar%20Arsovski%20Google%20Org%20Chart&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23924-improper-neutralization-of-input-du-12cc3bfb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23924%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeremy%20WP%20Photo%20Sphere&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23935-improper-neutralization-of-input-du-dd01d133</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23935%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fengler%20Magic%20Google%20Maps&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee9006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23933-improper-neutralization-of-input-du-cd85ffa1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23933%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpfreeware%20WpF%20Ultimate%20Carousel&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee9000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23930-missing-authorization-in-paypalmuse-222a10f0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23930%3A%20Missing%20Authorization%20in%20paypalmuse%20PayPal%20Marketing%20Solutions&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23925-improper-neutralization-of-input-du-a80f5967</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23925%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jp2112%20Feedburner%20Optin%20Form&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23936-improper-neutralization-of-input-du-f02e245c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Harun%20R.%20Rayhan(thecrazycoder)%20CC%20Circle%20Progress%20Bar&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee903c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23927-improper-neutralization-of-input-du-cc932d07</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20massimo.serpilli%20Incredible%20Font%20Awesome&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23929-missing-authorization-in-wishfulthe-2cf33de1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23929%3A%20Missing%20Authorization%20in%20wishfulthemes%20Email%20Capture%20%26%20Lead%20Generation&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23922-cross-site-request-forgery-csrf-in--c3111838</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23922%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Harsh%20iSpring%20Embedder&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23915-improper-control-of-filename-for-in-0170f031</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23915%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20roninwp%20FAT%20Event%20Lite&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23926-improper-neutralization-of-input-du-2c31aa62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23926%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TC.K%20Ajax%20WP%20Query%20Search%20Filter&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23916-missing-authorization-in-nuanced-me-76f53526</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23916%3A%20Missing%20Authorization%20in%20Nuanced%20Media%20WP%20Meetup&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23919-improper-neutralization-of-script-r-e2babab5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23919%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Ella%20Van%20Durpe%20Slides%20%26%20Presentations&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23912-improper-neutralization-of-special--5509891e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23912%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Philipp%20Speck%20WordPress%20Custom%20Sidebar&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23901-cross-site-request-forgery-csrf-in--3fd0d040</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23901%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cybio%20GravatarLocalCache&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23913-improper-neutralization-of-special--4bd17ed5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23913%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pankajpragma%20WordPress%20Google%20Map%20Professional&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23911-improper-neutralization-of-special--c41e898f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23911%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20solidres%20Solidres%20%E2%80%93%20Hotel%20booking%20plugin&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23909-improper-neutralization-of-input-du-431c291f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23909%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Common%20Ninja%20Compare%20Ninja&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23908-improper-neutralization-of-input-du-2cd834ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23908%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rami%20Yushuvaev%20Pastebin&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23900-cross-site-request-forgery-csrf-in--0c69a52c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23900%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20genkisan%20Genki%20Announcement&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23902-cross-site-request-forgery-csrf-in--b9eb412f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23902%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Taras%20Dashkevych%20Error%20Notification&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23897-improper-neutralization-of-input-du-206817aa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23897%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivobrett%20Apply%20with%20LinkedIn%20buttons&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23898-cross-site-request-forgery-csrf-in--44e61e01</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23898%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ivobrett%20Apply%20with%20LinkedIn%20buttons&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23887-improper-neutralization-of-input-du-02846c7f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottwallick%20Blog%20Summary&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23891-improper-neutralization-of-input-du-1332980a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vincent%20Loy%20Yet%20Another%20Countdown&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23884-cross-site-request-forgery-csrf-in--456bb138</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23884%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chris%20Roberts%20Annie&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23892-improper-neutralization-of-input-du-5a4a6a9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23892%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Furr%20Progress%20Tracker&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23896-improper-neutralization-of-input-du-e93c61db</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23896%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thom4%20Mindmeister%20Shortcode&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23890-improper-neutralization-of-input-du-85eac786</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tom%20Ewer%20Easy%20Tweet%20Embed&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23895-cross-site-request-forgery-csrf-in--1391fd48</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23895%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dan%20Cameron%20Add%20RSS&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23876-improper-neutralization-of-input-du-f38cdb96</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23876%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20No-Nonsense%20WP%20krpano&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23893-improper-neutralization-of-input-du-e607e6ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23893%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Manny%20Costales%20GMap%20Shortcode&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23875-cross-site-request-forgery-csrf-in--8f4af25d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23875%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20madeglobal%20Better%20Protected%20Pages&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23886-improper-neutralization-of-input-du-a1862759</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23886%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Roberts%20Annie&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23880-cross-site-request-forgery-csrf-in--c65c5537</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23880%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anmari%20amr%20personalise&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23878-improper-neutralization-of-input-du-eac989ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Reilly%20Post-to-Post%20Links&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23873-improper-neutralization-of-input-du-bbab9c43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anshi%20Solutions%20Category%20D3%20Tree&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23877-improper-neutralization-of-input-du-38470afd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23877%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nitethemes%20Nite%20Shortcodes&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23864-improper-neutralization-of-input-du-e8580d9c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23864%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Luke%20America%20WCS%20QR%20Code%20Generator&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23868-improper-neutralization-of-input-du-296e05bf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23868%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mliebelt%20Chess%20Tempo%20Viewer&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23871-cross-site-request-forgery-csrf-in--d3bba753</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23871%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bas%20Matthee%20LSD%20Google%20Maps%20Embedder&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23865-improper-neutralization-of-input-du-4b2ac529</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23865%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pressfore%20Winning%20Portfolio&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23863-improper-neutralization-of-input-du-044d9c67</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sabaoh%20Rollover%20Tab&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23870-cross-site-request-forgery-csrf-in--99403b91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23870%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wygk%20Copyright%20Safeguard%20Footer%20Notice&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23854-improper-neutralization-of-input-du-06483dfd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23854%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yesstreamingdev%20Shoutcast%20and%20Icecast%20HTML5%20Web%20Radio%20Player%20by%20YesStreaming.com&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23869-cross-site-request-forgery-csrf-in--fb5280db</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23869%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shibulijack%20CJ%20Custom%20Content&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23859-improper-neutralization-of-input-du-6f1ad22a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23859%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jd7777%20Daily%20Proverb&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23860-improper-neutralization-of-input-du-7bd5fea7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23860%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crea8xion%20Charity-thermometer&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23862-missing-authorization-in-szmake-con-2ab33f5e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23862%3A%20Missing%20Authorization%20in%20SzMake%20Contact%20Form%207%20Anti%20Spambot&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23861-cross-site-request-forgery-csrf-in--760ef346</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23861%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Zack%20Katz%20Debt%20Calculator&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23856-improper-neutralization-of-input-du-af4e43fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23856%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Odyno%20Simple%20Vertical%20Timeline&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23848-cross-site-request-forgery-csrf-in--2a7086f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23848%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dpowney%20Hotspots%20Analytics&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23842-cross-site-request-forgery-csrf-in--e084e07a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23842%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nilesh%20Shiragave%20WordPress%20Gallery%20Plugin&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23830-improper-neutralization-of-input-du-9d9eb6d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23830%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jobair%20JB%20Horizontal%20Scroller%20News%20Ticker&amp;severity=null&amp;id=69cd723be6bfc5ba1dee883e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23841-improper-neutralization-of-input-du-49d608ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23841%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foo123%20Top%20Flash%20Embed&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23844-cross-site-request-forgery-csrf-in--ee4a6d66</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23844%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jamsheer%20K%20Custom%20Widget%20Classes&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23831-improper-neutralization-of-input-du-dbb45897</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23831%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mobstac%20QR%20Code%20Generator&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23828-improper-neutralization-of-input-du-da672d73</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23828%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sindhi%20WordPress%20Data%20Guard&amp;severity=null&amp;id=69cd723be6bfc5ba1dee883b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23826-improper-neutralization-of-input-du-45c63d14</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23826%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pedjas%20Stop%20Comment%20Spam&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23833-improper-neutralization-of-input-du-8ff45987</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23833%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RaminMT%20Links%2FProblem%20Reporter&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23823-cross-site-request-forgery-csrf-in--5b71f96b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23823%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jprintf%20CNZZ%2651LA%20for%20WordPress&amp;severity=null&amp;id=69cd723be6bfc5ba1dee882f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23825-improper-neutralization-of-input-du-5c94ccd5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23825%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osuthorpe%20Easy%20Shortcode%20Buttons&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23821-cross-site-request-forgery-csrf-in--4c457aa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23821%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aleapp%20WP%20Cookies%20Alert&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23832-cross-site-request-forgery-csrf-in--df1c42fb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23832%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Matt%20Gibbs%20Admin%20Cleanup&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23820-cross-site-request-forgery-csrf-in--fa66e4f5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23820%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20thapa.laxman%20Content%20Security%20Policy%20Pro&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23827-improper-neutralization-of-input-du-4a32d8e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23827%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20straps%20Strx%20Magic%20Floating%20Sidebar%20Maker&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23818-cross-site-request-forgery-csrf-in--6ae11c45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23818%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pyko%20More%20Link%20Modifier&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23807-improper-neutralization-of-input-du-afe5b70e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23807%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jim2212001%20Spiderpowa%20Embed%20PDF&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23822-cross-site-request-forgery-csrf-in--b3256a69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23822%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alicornea%20Category%20Custom%20Fields&amp;severity=null&amp;id=69cd723be6bfc5ba1dee882c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23808-cross-site-request-forgery-csrf-in--d6d48433</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23808%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dutch%20van%20Andel%20Custom%20List%20Table%20Example&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23805-cross-site-request-forgery-csrf-in--a439c6bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23805%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20itamarg%20SEOReseller%20Partner&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23817-cross-site-request-forgery-csrf-in--e900108a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23817%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mahadirz%20MHR-Custom-Anti-Copy&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23810-cross-site-request-forgery-csrf-in--9e854f57</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23810%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Igor%20Sazonov%20Len%20Slider&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23801-cross-site-request-forgery-csrf-in--720e4d80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23801%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FuzzGuard%20Style%20Admin&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23804-cross-site-request-forgery-csrf-in--9224bd4c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23804%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shiv%20Prakash%20Tiwari%20WP%20Service%20Payment%20Form%20With%20Authorize.net&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23797-cross-site-request-forgery-csrf-in--623db17b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23797%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mike%20Selander%20WP%20Options%20Editor&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23795-improper-neutralization-of-input-du-7adcae0f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23795%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ghuger%20Easy%20FAQs&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee872b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23800-cross-site-request-forgery-csrf-in--90cf733f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23800%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nova706%20OrangeBox&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23802-improper-neutralization-of-input-du-8a71380b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23802%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SteveSoehl%20WP-Revive%20Adserver&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23796-improper-neutralization-of-input-du-658f6158</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23796%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tushar%20Patel%20Easy%20Portfolio&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee872e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23791-improper-neutralization-of-input-du-bda6117c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23791%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mikakaltoft%20Horizontal%20Line%20Shortcode&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee871f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23794-improper-neutralization-of-input-du-57e5ddd9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23794%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20_rccoder_%20wp_amaps&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23780-improper-neutralization-of-special--db75d00a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23780%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Alpha%20BPO%20Easy%20Code%20Snippets&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23785-missing-authorization-in-august-inf-81223d60</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23785%3A%20Missing%20Authorization%20in%20August%20Infotech%20AI%20Responsive%20Gallery%20Album&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23778-missing-authorization-in-pravin-dur-9c8c82fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23778%3A%20Missing%20Authorization%20in%20Pravin%20Durugkar%20User%20Sync%20ActiveCampaign&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23779-improper-neutralization-of-special--c5e1183d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23779%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20web-mv%20ResAds&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23777-improper-neutralization-of-input-du-099d472c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23777%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20willowsconsulting%20GDPR%20Personal%20Data%20Reports&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee866d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23772-improper-neutralization-of-input-du-5d123462</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23772%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eugenio%20Petulla%26%238217%3B%20imaGenius&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee8605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23775-improper-neutralization-of-input-du-28d52a2a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23775%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWP%20GMAPS%20for%20WPBakery%20Page%20Builder%20Free&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee860e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23776-missing-authorization-in-ekaterir-c-5b7f5c59</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23776%3A%20Missing%20Authorization%20in%20ekaterir%20Cache%20Sniper%20for%20Nginx&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee8611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23783-improper-neutralization-of-input-du-ff56892c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23783%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carrotbits%20Greek%20Namedays%20Widget%20From%20Eortologio.Net&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee867f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23767-improper-neutralization-of-input-du-9209ceff</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23767%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revoxis%20Marmoset%20Viewer&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee85f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23749-cross-site-request-forgery-csrf-in--181d6bf0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23749%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20progpars.net%20mybb%20Last%20Topics&amp;severity=null&amp;id=69cd722de6bfc5ba1dee8562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23713-cross-site-request-forgery-csrf-in--75fed646</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23713%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20artanik%20Hack%20me%20if%20you%20can&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23745-cross-site-request-forgery-csrf-in--ff6224be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23745%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tussendoor%20B.V.%20Call%20me%20Now&amp;severity=null&amp;id=69cd722de6bfc5ba1dee8553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23743-cross-site-request-forgery-csrf-in--70727389</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23743%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MartijnScheijbeler%20Social%20Analytics&amp;severity=null&amp;id=69cd722de6bfc5ba1dee854d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23717-cross-site-request-forgery-csrf-in--49a6ea24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23717%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20itmooti%20Theme%20My%20Ontraport%20Smartform&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23720-cross-site-request-forgery-csrf-in--47715a55</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23720%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marco%20Castelluccio%20Web%20Push&amp;severity=null&amp;id=69cd7224e6bfc5ba1dee8400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23702-cross-site-request-forgery-csrf-in--9aae9598</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23702%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Schalk%20Burger%20Anonymize%20Links&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23712-cross-site-request-forgery-csrf-in--4dad1302</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23712%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kapostintegrations%20Kapost&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23715-cross-site-request-forgery-csrf-in--27705c14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23715%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RaymondDesign%20Post%20%26%20Page%20Notes&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23703-cross-site-request-forgery-csrf-in--b6f0ade4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23703%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cstoltenkamp%20Free%20MailClient%20FMC&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23710-cross-site-request-forgery-csrf-in--54ee0c85</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23710%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mayur%20Sojitra%20Flying%20Twitter%20Birds&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23708-cross-site-request-forgery-csrf-in--0045ed40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23708%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dominic%20Fallows%20DF%20Draggable&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23698-cross-site-request-forgery-csrf-in--cea72dc5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23698%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ivanra10%20WP%20Custom%20Google%20Search&amp;severity=null&amp;id=69cd764ce6bfc5ba1df0b0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23694-cross-site-request-forgery-csrf-in--e90e1486</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23694%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shabboscommerce%20Shabbos%20and%20Yom%20Tov&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b04f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23699-improper-neutralization-of-input-du-d3430bd7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23699%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techmix%20Event%20Countdown%20Timer%20Plugin%20by%20TechMix&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23692-cross-site-request-forgery-csrf-in--c4302f9b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23692%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20artanik%20Slider%20for%20Writers&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23690-cross-site-request-forgery-csrf-in--aa3f1330</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23690%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ArtkanMedia%20Book%20a%20Place&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23675-cross-site-request-forgery-csrf-in--da9c8032</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23675%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sana%20Ullah%20Import%20Users%20to%20MailChimp&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23677-cross-site-request-forgery-csrf-in--6866767c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23677%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DSmidge%20HTTP%20to%20HTTPS%20link%20changer%20by%20Eyga.net&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0af04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23673-cross-site-request-forgery-csrf-in--7b5b2237</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23673%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dkukral%20Email%20on%20Publish&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23693-cross-site-request-forgery-csrf-in--c94579a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23693%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20uosiu%20Secure%20CAPTCHA&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23691-cross-site-request-forgery-csrf-in--56a571a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23691%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Braulio%20Aquino%20Send%20to%20Twitter&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23665-cross-site-request-forgery-csrf-in--cee73e02</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23665%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ravi%20Kumar%20Vanukuru%20RSV%20GMaps&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0aebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23644-improper-neutralization-of-input-du-a719c15f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23644%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justin.kuepper%20QuoteMedia%20Tools&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23661-cross-site-request-forgery-csrf-in--181d9f6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23661%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ryscript%20NV%20Slider&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23649-cross-site-request-forgery-csrf-in--9840172f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23649%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kreg%20Steppe%20Auphonic%20Importer&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0add3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23654-cross-site-request-forgery-csrf-in--262af321</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23654%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20krolow%20Twitter%20Post&amp;severity=null&amp;id=69cd7646e6bfc5ba1df0ae42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23660-cross-site-request-forgery-csrf-in--715412ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23660%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20waltercerrudo%20MFPlugin&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23662-cross-site-request-forgery-csrf-in--89872be0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23662%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ryscript%20WP%20Panoramio&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23659-cross-site-request-forgery-csrf-in--80524594</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23659%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hernanjh%20MercadoLibre%20Integration&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23642-improper-neutralization-of-input-du-eb41db92</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23642%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pflonk%20Sidebar-Content%20from%20Shortcode&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23640-cross-site-request-forgery-csrf-in--89d44069</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23640%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nazmul%20Ahsan%20Rename%20Author%20Slug&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0ad6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23623-improper-neutralization-of-input-du-80ee1b9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mahesh%20Bisen%20Contact%20Form%207%20%E2%80%93%20CCAvenue%20Add-on&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23641-improper-neutralization-of-input-du-d881d57d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23641%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PowieT%20Powie&apos;s%20pLinks%20PagePeeker&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23627-cross-site-request-forgery-csrf-in--6e67f89b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23627%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frenchsquared%20Comment-Emailer&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23639-cross-site-request-forgery-csrf-in--13294b69</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23639%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nazmul%20Ahsan%20MDC%20YouTube%20Downloader&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0ad6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23573-cross-site-request-forgery-csrf-in--1033ac7e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23573%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sammyb%20WP%20Background%20Tile&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23618-cross-site-request-forgery-csrf-in--87d2fd2a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23618%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20starise%20Twitter%20Shortcode&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23577-cross-site-request-forgery-csrf-in--64f776c4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23577%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sourov%20Amin%20Word%20Freshener&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23617-cross-site-request-forgery-csrf-in--764d91eb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cybio%20Floatbox%20Plus&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23567-cross-site-request-forgery-csrf-in--77d2ce00</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23567%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tamer%20Ziady%20GDReseller&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23547-improper-neutralization-of-input-du-8e34a0c5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shawfactor%20LH%20Login%20Page&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23569-cross-site-request-forgery-csrf-in--9d84af65</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23569%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kelvin%20Ng%20Shortcode%20in%20Comment&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23620-improper-neutralization-of-input-du-4e92737e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trof%20Captchelfie%20%E2%80%93%20Captcha%20by%20Selfie&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23572-cross-site-request-forgery-csrf-in--355d6c2c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dave%20Konopka%20UpDownUpDown&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a96c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23557-cross-site-request-forgery-csrf-in--bb3a7bf1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23557%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kathleen%20Malone%20Find%20Your%20Reps&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a84c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23560-cross-site-request-forgery-csrf-in--2acb63d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23560%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20plumwd%20Web%20Testimonials&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23566-cross-site-request-forgery-csrf-in--df705fc2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23566%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20syedamirhussain91%20Custom%20Post&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23528-incorrect-privilege-assignment-in-m-bef268d4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23528%3A%20Incorrect%20Privilege%20Assignment%20in%20Mosterd3d%20DD%20Roles&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23532-cross-site-request-forgery-csrf-in--bfa6da52</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23532%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Regios%20MyAnime%20Widget&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23558-cross-site-request-forgery-csrf-in--9a83f465</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23558%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digitalfisherman%20Geotagged%20Media&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23537-cross-site-request-forgery-csrf-in--9e48beb6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23537%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20add%20custom%20google%20tag%20manager&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23510-cross-site-request-forgery-csrf-in--06be8331</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23510%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jan%20%C5%A0t%C4%9Btina%20WordPress%20Logging%20Service&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23511-cross-site-request-forgery-csrf-in--d408ecfc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23511%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stargazer%20WP-BlackCheck&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23530-cross-site-request-forgery-csrf-in--86c34bcc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23530%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonisink%20Custom%20Post%20Type%20Lockdown&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23533-cross-site-request-forgery-csrf-in--04f09f47</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23533%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zetxek%20WP%20Lyrics&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23514-missing-authorization-in-sanjay-pra-11c8df7e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23514%3A%20Missing%20Authorization%20in%20Sanjay%20Prasad%20Loginplus&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23513-cross-site-request-forgery-csrf-in--8e6ff663</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23513%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jd7777%20Bible%20Embed&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23499-cross-site-request-forgery-csrf-in--2e6e39b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23499%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pascal%20Casier%20Board%20Election&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23508-cross-site-request-forgery-csrf-in--b41576a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23508%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OrigoThemes%20Extra%20Options%20%E2%80%93%20Favicons&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23501-cross-site-request-forgery-csrf-in--913f94b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23501%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SpruceJoy%20Cookie%20Consent%20%26%20Autoblock%20for%20GDPR%2FCCPA&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23435-cross-site-request-forgery-csrf-in--4c0631a9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marcucci%20Password%20Protect%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd7616e6bfc5ba1df0961c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23452-improper-neutralization-of-input-du-fc273fac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EditionGuard%20EditionGuard%20for%20WooCommerce%20%E2%80%93%20eBook%20Sales%20with%20DRM&amp;severity=null&amp;id=69cd7619e6bfc5ba1df09703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23438-improper-neutralization-of-input-du-f0c9351c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vincent%20Mimoun-Prat%20WP%20PT-Viewer&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23497-cross-site-request-forgery-csrf-in--42ece6a4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23497%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20albdesign%20Simple%20Project%20Manager&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23434-improper-neutralization-of-input-du-ec75e448</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23434%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viher3%20Easy%20EU%20Cookie%20law&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23471-cross-site-request-forgery-csrf-in--eab46745</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23471%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20etemplates%20ECT%20Add%20to%20Cart%20Button&amp;severity=null&amp;id=69cd761ee6bfc5ba1df09885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23444-improper-neutralization-of-input-du-4037a9aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23444%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nasir179125%20Scroll%20Top%20Advanced&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23424-cross-site-request-forgery-csrf-in--66065971</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23424%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bnovotny%20Marquee%20Style%20RSS%20News%20Ticker&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0951f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23426-cross-site-request-forgery-csrf-in--842d6cd4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23426%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Binesh%20Dobhal%20go%20Social&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23453-improper-neutralization-of-input-du-42b802de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23453%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Myriad%20Solutionz%20Stars%20SMTP%20Mailer&amp;severity=null&amp;id=69cd7619e6bfc5ba1df09706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23445-cross-site-request-forgery-csrf-in--54632a9d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23445%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scottswezey%20Easy%20Tynt&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23430-cross-site-request-forgery-csrf-in--ad7a51a0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23430%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oren%20Yomtov%20Mass%20Custom%20Fields%20Manager&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23455-cross-site-request-forgery-csrf-in--aef35567</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23455%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Master%20Software%20Solutions%20WP%20VTiger%20Synchronization&amp;severity=null&amp;id=69cd761ae6bfc5ba1df0978c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23436-cross-site-request-forgery-csrf-in--682fc947</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23436%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20capa%20Wp-Scribd-List&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23442-cross-site-request-forgery-csrf-in--0304951b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23442%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mschertel%20Shockingly%20Big%20IE6%20Warning&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23456-cross-site-request-forgery-csrf-in--0649978c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23456%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oddthinking%20EmailShroud&amp;severity=null&amp;id=69cd761ae6bfc5ba1df0978f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23476-cross-site-request-forgery-csrf-in--08ee5f89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23476%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20isnowfy%20my-related-posts&amp;severity=null&amp;id=69cd7624e6bfc5ba1df099a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23429-improper-neutralization-of-input-du-befa9635</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23429%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20altima-interactive%20Altima%20Lookbook%20Free%20for%20WooCommerce&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23483-cross-site-request-forgery-csrf-in--a9b827f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23483%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hoyce%20Universal%20Analytics%20Injector&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23463-cross-site-request-forgery-csrf-in--f087a22e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23463%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mukesh%20Dak%20MD%20Custom%20content%20after%20or%20before%20of%20post&amp;severity=null&amp;id=69cd761ae6bfc5ba1df097a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23432-improper-neutralization-of-input-du-848d31d6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23432%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AlTi5%20AlT%20Report&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23470-cross-site-request-forgery-csrf-in--879e9606</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23470%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xavsio4%20Visit%20Site%20Link%20enhanced&amp;severity=null&amp;id=69cd761ee6bfc5ba1df09882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23467-cross-site-request-forgery-csrf-in--ae2b4d59</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23467%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vimal.ghorecha%20RSS%20News%20Scroller&amp;severity=null&amp;id=69cd761ee6bfc5ba1df0987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23423-missing-authorization-in-smackcoder-8203ca0b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23423%3A%20Missing%20Authorization%20in%20Smackcoders%20Inc.%2C%20SendGrid%20for%20WordPress&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0951c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12427-cwe-862-missing-authorization-in-mo-94875142</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12427%3A%20CWE-862%20Missing%20Authorization%20in%20mondula2016%20Multi%20Step%20Form&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b59897f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12613-cwe-89-improper-neutralization-of-s-3eb7e8ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12613%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20coder426%20Passwords%20Manager&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12615-cwe-89-improper-neutralization-of-s-8dc6c391</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12615%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20coder426%20Passwords%20Manager&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12614-cwe-89-improper-neutralization-of-s-7995990f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12614%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20coder426%20Passwords%20Manager&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13355-cwe-434-unrestricted-upload-of-file-0b3ae2ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13355%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20nmedia%20Admin%20and%20Customer%20Messages%20After%20Order%20for%20WooCommerce%3A%20OrderConvo&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13387-cwe-79-improper-neutralization-of-i-cb7d09a8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20WP%20Responsive%20Tabs&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48885-escalation-of-privilege-in-fortinet-bf75e57b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48885%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiRecorder&amp;severity=medium&amp;id=696793f38330e067163e9f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10789-cwe-352-cross-site-request-forgery--54badc53</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10789%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpeventmanager%20WP%20User%20Profile%20Avatar&amp;severity=medium&amp;id=699f6dfdb7ef31ef0b592566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11452-cwe-79-improper-neutralization-of-i-76f0490f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gwendydd%20Chamber%20Dashboard%20Business%20Directory&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10970-cwe-94-improper-control-of-generati-02f7e83a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10970%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=medium&amp;id=699f6e04b7ef31ef0b5939c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0170-cwe-79-improper-neutralization-of-in-c0a72b52</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0170%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scriptsbundle%20DWT%20-%20Directory%20%26%20Listing%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57774-na-d23100f3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57774%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57773-na-85b4182f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57773%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57772-na-ce43409a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57772%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57771-na-d04d3bee</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57771%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57684-na-3f8c12ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57684%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bdbb7ef31ef0b55b7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57578-na-15111bc6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57578%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57577-na-401693e6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57577%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-16-2ddec7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-16&amp;severity=medium&amp;id=682c7dc2e8347ec82d2ddec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-16-f120dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f120dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0215-cwe-79-improper-neutralization-of-in-bf124e86</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0215%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidanderson%20UpdraftPlus%3A%20WP%20Backup%20%26%20Migration%20Plugin&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54470-an-attacker-with-physical-access-ma-3f2dfb1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54470%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20access%20contacts%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82fe6bfc5ba1df6ed6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54535-an-attacker-with-access-to-calendar-3fc63c74</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54535%3A%20An%20attacker%20with%20access%20to%20calendar%20data%20could%20also%20read%20reminders%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb833e6bfc5ba1df6ee3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40854-an-app-may-be-able-to-cause-unexpec-2b279b67</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40854%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82ae6bfc5ba1df6e9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40839-an-attacker-with-physical-access-to-fd360c2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40839%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20view%20notification%20contents%20from%20the%20Lock%20Screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb82ae6bfc5ba1df6e9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40771-an-app-may-be-able-to-execute-arbit-508a59e1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40771%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb827e6bfc5ba1df6e90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27856-processing-a-file-may-lead-to-unexp-8bd6e495</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27856%3A%20Processing%20a%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=69a0a43c85912abc71d620de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44136-an-attacker-with-physical-access-to-7f870f20</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44136%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20disable%20Stolen%20Device%20Protection%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb82ae6bfc5ba1df6e9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54540-processing-maliciously-crafted-web--2b7dd9eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54540%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20internal%20states%20of%20the%20app%20in%20Apple%20Apple%20Music&amp;severity=medium&amp;id=69ceb833e6bfc5ba1df6ee5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0501-cwe-295-improper-certificate-validat-aa074525</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0501%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Amazon%20WorkSpaces%20Client&amp;severity=high&amp;id=68ee9df131414aa8fc5b889c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0500-cwe-295-improper-certificate-validat-57dbb957</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0500%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Amazon%20WorkSpaces%20Client&amp;severity=high&amp;id=68ee9df131414aa8fc5b8894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56295-missing-authorization-in-ays-pro-po-adc7b30e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56295%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22317-improper-neutralization-of-input-du-b09f6cdd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22317%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gallery%20Ape%20Photo%20Gallery%20%E2%80%93%20Image%20Gallery%20by%20Ape&amp;severity=null&amp;id=69cd75dae6bfc5ba1df08194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22329-improper-neutralization-of-input-du-39761c0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22329%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agile%20Logix%20Free%20Google%20Maps&amp;severity=null&amp;id=69cd75dce6bfc5ba1df0822a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22587-improper-neutralization-of-input-du-66cde2b2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atanas%20Krachev%20SEO%20Bulk%20Editor&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22729-missing-authorization-in-infomaniak-3a9d5f7d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22729%3A%20Missing%20Authorization%20in%20Infomaniak%20Network%20VOD%20Infomaniak&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22731-cross-site-request-forgery-csrf-in--0dd4027c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22731%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20silverplugins217%20Build%20Private%20Store%20For%20Woocommerce&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22734-improper-neutralization-of-input-du-c155bfdd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Data443%20Risk%20Mitigation%2C%20Inc.%20Posts%20Footer%20Manager&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22736-incorrect-privilege-assignment-in-s-60755062</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22736%3A%20Incorrect%20Privilege%20Assignment%20in%20Saad%20Iqbal%20User%20Management&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22737-missing-authorization-in-magepeople-839866d8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22737%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpTravelly&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22738-improper-neutralization-of-input-du-f961e3fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alimir%20WP%20ULike&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22742-improper-neutralization-of-input-du-45c00f7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falldeaf%20WP%20ViewSTL&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22743-improper-neutralization-of-input-du-3ef14ca5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mohsin%20Rasool%20Twitter%20Bootstrap%20Collapse%20aka%20Accordian%20Shortcode&amp;severity=null&amp;id=69cd7608e6bfc5ba1df0902b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22744-improper-neutralization-of-input-du-3c2a28c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Seodev%20S-DEV%20SEO&amp;severity=null&amp;id=69cd7608e6bfc5ba1df0902e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22745-improper-neutralization-of-input-du-309b6289</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22745%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bjoerne%20Navigation%20Du%20Lapin%20Blanc&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22746-improper-neutralization-of-input-du-7d9ea568</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zartis%20HireHive%20Job%20Plugin&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22747-improper-neutralization-of-input-du-866fd669</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22747%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tormorten%20Foundation%20Columns&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22748-improper-neutralization-of-input-du-4965fb03</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Setmore%20SetMore%20Theme%20%E2%80%93%20Custom%20Post%20Types&amp;severity=null&amp;id=69cd7608e6bfc5ba1df0903a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22749-improper-neutralization-of-input-du-f49e3fc6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemesCraft.co%20Social%20Media%20Engine&amp;severity=null&amp;id=69cd7608e6bfc5ba1df0903d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22750-improper-neutralization-of-input-du-60cc9c68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Patel%20Post%20Carousel%20%26%20Slider&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22751-improper-neutralization-of-input-du-7428a0c7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22751%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20farinspace%20Partners&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22752-improper-neutralization-of-input-du-f885c7cc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22752%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WesternDeal%20GSheetConnector%20for%20Forminator%20Forms&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22754-improper-neutralization-of-input-du-b3a427df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Berkman%20Klein%20Center%20Amber&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22755-improper-neutralization-of-input-du-514284dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22755%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bavington%20WP%20Headmaster&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22758-improper-neutralization-of-input-du-daea499f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22758%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Harnani%20Elementor%20AI%20Addons&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22759-improper-neutralization-of-input-du-6c776542</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22760-improper-neutralization-of-input-du-48e31de3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeBard%20CodeBard%20Help%20Desk&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22761-improper-neutralization-of-input-du-ff7ac9c0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22761%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Olaf%20Lederer%20Ajax%20Contact%20Form&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22762-improper-neutralization-of-input-du-10bc34e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Octrace%20WordPress%20HelpDesk%20%26%20Support%20Ticket%20System%20Plugin%20%E2%80%93%20Octrace%20Support&amp;severity=null&amp;id=69cd760be6bfc5ba1df09198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22764-improper-neutralization-of-input-du-23b8a7ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vipul%20Jariwala%20WP%20Post%20Corrector&amp;severity=null&amp;id=69cd760be6bfc5ba1df091b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22765-improper-neutralization-of-input-du-929dde7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22765%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weiluri%20WP%20Order%20By&amp;severity=null&amp;id=69cd760be6bfc5ba1df091ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22766-improper-neutralization-of-input-du-b0bb3a24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22766%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Masoud%20Amini%20Zarinpal%20Paid%20Download&amp;severity=null&amp;id=69cd760be6bfc5ba1df091bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22773-insertion-of-sensitive-information--0e783ff0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22773%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20WP%20Chill%20Htaccess%20File%20Editor&amp;severity=null&amp;id=69cd760be6bfc5ba1df091cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22776-improper-neutralization-of-input-du-298b2284</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22776%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codebycarter%20WP%20Bulletin%20Board&amp;severity=null&amp;id=69cd760ce6bfc5ba1df0925e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22778-improper-neutralization-of-input-du-609db6a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damniel%20Lijit%20Search&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22779-missing-authorization-in-codeaffair-a30a8ea3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22779%3A%20Missing%20Authorization%20in%20codeaffairs%20WP%20News%20Sliders&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22780-improper-neutralization-of-input-du-75b59587</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22780%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andrey%20wp-pano&amp;severity=null&amp;id=69cd760ce6bfc5ba1df0926b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22782-unrestricted-upload-of-file-with-da-c809f241</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22782%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Web%20Ready%20Now%20WR%20Price%20List%20Manager%20For%20Woocommerce&amp;severity=null&amp;id=69cd760ce6bfc5ba1df0926e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22784-cross-site-request-forgery-csrf-in--0e468ba1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22784%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20swedish%20boy%20Background%20Control&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22785-improper-neutralization-of-special--167ba4e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22785%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ComMotion%20Course%20Booking%20System&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22786-path-traversal-in-element-invader-e-f106a338</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22786%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd760fe6bfc5ba1df09379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22787-missing-authorization-in-bplugins-b-16328a4b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22787%3A%20Missing%20Authorization%20in%20bPlugins%20Button%20Block&amp;severity=null&amp;id=69cd7610e6bfc5ba1df0938c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22788-improper-neutralization-of-input-du-b2413566</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22788%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Codexpert%2C%20Inc%20CoDesigner&amp;severity=null&amp;id=69cd7610e6bfc5ba1df0938f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22793-improper-neutralization-of-input-du-48425dd8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22793%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bold%20Bold%20pagos%20en%20linea&amp;severity=null&amp;id=69cd7610e6bfc5ba1df09392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22795-improper-neutralization-of-input-du-8616f9ef</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22795%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digitaldonkey%20Multilang%20Contact%20Form&amp;severity=null&amp;id=69cd7610e6bfc5ba1df09398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22797-improper-neutralization-of-input-du-b6adf961</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22797%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20O%C4%9Fulcan%20%C3%96z%C3%BCgen%C3%A7%20Gallery%20and%20Lightbox&amp;severity=null&amp;id=69cd7610e6bfc5ba1df0939e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22798-improper-neutralization-of-input-du-e4d7d049</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22798%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CHR%20Designer%20Responsive%20jQuery%20Slider&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22799-improper-neutralization-of-special--e18a3e5c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22799%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vertim%20Neon%20Product%20Designer&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12084-heap-based-buffer-overflow-259513</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12084%3A%20Heap-based%20Buffer%20Overflow&amp;severity=critical&amp;id=682f0c680acd01a249259513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57857-vulnerability-in-linux-linux-bde8f3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57844-vulnerability-in-linux-linux-bde8db</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57841-vulnerability-in-linux-linux-bdd1af</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57802-vulnerability-in-linux-linux-bde886</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57801-vulnerability-in-linux-linux-bde882</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57795-vulnerability-in-linux-linux-bde86b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54031-vulnerability-in-linux-linux-bdf0d7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53681-vulnerability-in-linux-linux-bdf08a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39282-vulnerability-in-linux-linux-be2c46</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39282%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36476-vulnerability-in-linux-linux-be254a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36476%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe254a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21629-vulnerability-in-linux-linux-bdd280</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21629%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57903-vulnerability-in-linux-linux-bdd1e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57902-vulnerability-in-linux-linux-bdd1db</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57901-vulnerability-in-linux-linux-bdd1d7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57900-vulnerability-in-linux-linux-bde9e9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57899-vulnerability-in-linux-linux-bde9e5</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57898-vulnerability-in-linux-linux-bde9e1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57897-vulnerability-in-linux-linux-bde9dd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57896-vulnerability-in-linux-linux-bde9cc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57895-vulnerability-in-linux-linux-bde9c8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57893-vulnerability-in-linux-linux-bde9c4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57892-vulnerability-in-linux-linux-bde9c0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57891-vulnerability-in-linux-linux-bde9bc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57890-vulnerability-in-linux-linux-bde9ad</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57889-vulnerability-in-linux-linux-bde9a9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57888-vulnerability-in-linux-linux-bde9a1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57887-vulnerability-in-linux-linux-bde99b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57886-vulnerability-in-linux-linux-bde995</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57885-vulnerability-in-linux-linux-bde973</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57884-vulnerability-in-linux-linux-bde96b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57883-vulnerability-in-linux-linux-bde963</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57882-vulnerability-in-linux-linux-bde95f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11029-exposure-of-sensitive-system-inform-0d53cf9b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11029%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13215-cwe-359-exposure-of-private-persona-736dd0a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13215%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpvibes%20Addon%20Elements%20for%20Elementor%20(formerly%20Elementor%20Addon%20Elements)&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11851-cwe-862-missing-authorization-in-ni-6a5ad27f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11851%3A%20CWE-862%20Missing%20Authorization%20in%20nitropack%20NitroPack%20%E2%80%93%20Performance%2C%20Page%20Speed%20%26%20Cache%20Plugin%20for%20Core%20Web%20Vitals%2C%20CDN%20%26%20Image%20Optimization&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12593-cwe-79-improper-neutralization-of-i-8fd1ce3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12593%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20addonsorg%20PDF%20for%20WPForms%20%2B%20Drag%20and%20Drop%20Template%20Builder&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11848-cwe-862-missing-authorization-in-ni-22f2ede0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11848%3A%20CWE-862%20Missing%20Authorization%20in%20nitropack%20NitroPack%20%E2%80%93%20Performance%2C%20Page%20Speed%20%26%20Cache%20Plugin%20for%20Core%20Web%20Vitals%2C%20CDN%20%26%20Image%20Optimization&amp;severity=high&amp;id=699f6e22b7ef31ef0b59682c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35280-execute-unauthorized-code-or-comman-26e5b9ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35280%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiDeceptor&amp;severity=medium&amp;id=69834d77f9fa50a62f8e393e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13351-cwe-79-improper-neutralization-of-i-736eca07</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13351%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neran%20Reviews%20Widgets%20for%20Google%20%26%2045%2B%20platforms%20by%20Repuso&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12818-cwe-79-improper-neutralization-of-i-1ce60c3c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robdavenport%20WP%20Smart%20TV&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12403-cwe-79-improper-neutralization-of-i-635be8f9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12403%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realwebcare%20Awesome%20Responsive%20Photo%20Gallery%20%E2%80%93%20Image%20%26%20Video%20Lightbox%20Gallery&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12423-cwe-79-improper-neutralization-of-i-64b8b8f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12423%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottpaterson%20Business%20Essentials%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b59897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10775-cwe-639-authorization-bypass-throug-004af03a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10775%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b592465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9636-cwe-269-improper-privilege-managemen-1206f14d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9636%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20pickplugins%20Post%20Grid%20and%20Gutenberg%20Blocks%20%E2%80%93%20ComboBlocks&amp;severity=critical&amp;id=699f6b56b7ef31ef0b553073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11870-cwe-79-improper-neutralization-of-i-8e408816</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Event%20Registration%20Calendar%20By%20vcita&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13394-cwe-79-improper-neutralization-of-i-aa41f4f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13394%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20swarminteractive%20ViewMedica%209&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13334-cwe-79-improper-neutralization-of-i-e80475a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13334%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theverylastperson%20Car%20Demon&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41453-na-84730205</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41453%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb8b7ef31ef0b56867d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57025-na-ff143773</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57025%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57024-na-069f8296</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57024%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57023-na-97a82f4c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57023%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23061-cwe-94-improper-control-of-generati-d36cdc50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23061%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mongoosejs%20Mongoose&amp;severity=critical&amp;id=699f6b1bb7ef31ef0b54e35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57727-na-in-na-94bbaf2e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57727%3A%20n%2Fa&amp;severity=critical&amp;id=68432d2d71f4d251b5d66f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-15-2e0279</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-15&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e0279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-15-f12ccf</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55893-cwe-352-cross-site-request-forgery-csrf-in-typo3-typo3-aeac89</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55893%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682cd0f71484d88663aeac89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55894-cwe-352-cross-site-request-forgery-csrf-in-typo3-typo3-aeac97</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55894%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682cd0f71484d88663aeac97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21134-integer-underflow-wrap-or-wraparoun-85e15a1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21134%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=69a0a44f85912abc71d652c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21133-integer-underflow-wrap-or-wraparoun-f46ba9bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21133%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=69a0a44f85912abc71d652bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21122-integer-underflow-wrap-or-wraparoun-a6a9b0f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21122%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=69a0a44f85912abc71d652b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21127-uncontrolled-search-path-element-cw-8d96faa5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21127%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=69a0a44f85912abc71d652ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23073-cwe-200-exposure-of-sensitive-infor-7d2d4b8f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23073%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20GlobalBlocking%20Extension&amp;severity=low&amp;id=68f178b69f8a5dbaea26afab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21245-cwe-122-heap-based-buffer-overflow--86920ad3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21245%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21409-cwe-122-heap-based-buffer-overflow--bed5e1a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21409%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfd20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21223-cwe-122-heap-based-buffer-overflow--1b98fc6b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21223%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21238-cwe-122-heap-based-buffer-overflow--8f5fadf7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21238%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21240-cwe-122-heap-based-buffer-overflow--fe23ab78</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21240%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21250-cwe-122-heap-based-buffer-overflow--044df045</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21250%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21417-cwe-122-heap-based-buffer-overflow--11924513</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21417%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21246-cwe-122-heap-based-buffer-overflow--d9739d80</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21246%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21334-cwe-416-use-after-free-in-microsoft-eed873c9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21334%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68881726ad5a09ad0088bbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21333-cwe-122-heap-based-buffer-overflow--00382cd0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21333%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68881726ad5a09ad0088bbc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21311-cwe-303-incorrect-implementation-of-51949c7e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21311%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=critical&amp;id=68c0c0d09ed239a66badfd0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21326-cwe-843-access-of-resource-using-in-541cb787</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21326%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=68c0c0d09ed239a66badfd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21332-cwe-41-improper-resolution-of-path--b0b36c84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21332%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0c0d09ed239a66badfd1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21313-cwe-833-deadlock-in-microsoft-windo-2b04e55b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21313%3A%20CWE-833%3A%20Deadlock%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68c0c0d09ed239a66badfd11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21218-cwe-400-uncontrolled-resource-consu-399d5233</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21218%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=68c0bd4d9ed239a66badea77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21402-cwe-641-improper-restriction-of-nam-0445617c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21402%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Microsoft%20Office%20LTSC%20for%20Mac%202021&amp;severity=high&amp;id=68c0bd549ed239a66badec69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21378-cwe-122-heap-based-buffer-overflow--a506f176</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21378%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd539ed239a66badec47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21374-cwe-125-out-of-bounds-read-in-micro-6be9d38b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21374%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd539ed239a66badec44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21372-cwe-416-use-after-free-in-microsoft-9daa3ce6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21372%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68c0bd539ed239a66badec41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21370-cwe-20-improper-input-validation-in-fcd65ee1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21370%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68c0bd539ed239a66badec3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21361-cwe-641-improper-restriction-of-nam-34b4d1ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21361%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Microsoft%20Office%20LTSC%20for%20Mac%202021&amp;severity=high&amp;id=68c0bd539ed239a66badec22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21360-cwe-269-improper-privilege-manageme-0683795d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21360%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=68c0bd539ed239a66badec1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21343-cwe-269-improper-privilege-manageme-fd4fb47a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21343%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68c0bd529ed239a66badebf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21340-cwe-284-improper-access-control-in--f5337416</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21340%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68c0bd529ed239a66badebf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21339-cwe-122-heap-based-buffer-overflow--7df35e53</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21339%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd529ed239a66badebee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21338-cwe-190-integer-overflow-or-wraparo-05cd36a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21338%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=68c0bd529ed239a66badebeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21336-cwe-203-observable-discrepancy-in-m-825686fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21336%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0c0d09ed239a66badfd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21331-cwe-59-improper-link-resolution-bef-186ac2dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21331%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd529ed239a66badebe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21324-cwe-125-out-of-bounds-read-in-micro-0edde373</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21324%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21172-cwe-190-integer-overflow-or-wraparound-in-microsoft-microsoft-visual-studio-2017-version-15-9-includes-15-0-15-8-bda89b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21172%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=682d981cc4522896dcbda89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21323-cwe-532-insertion-of-sensitive-info-aca161bd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21323%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21317-cwe-532-insertion-of-sensitive-info-d312843d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21317%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=68c0bd529ed239a66badebbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21312-cwe-908-use-of-uninitialized-resour-0be8c66c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21312%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=68c0bd519ed239a66badeba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21310-cwe-125-out-of-bounds-read-in-micro-d0cbce68</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21310%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd519ed239a66badeba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21308-cwe-200-exposure-of-sensitive-infor-2339fc87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21308%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd519ed239a66badeb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21307-cwe-416-use-after-free-in-microsoft-f66afa45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21307%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=critical&amp;id=68c0bd519ed239a66badeb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21305-cwe-122-heap-based-buffer-overflow--bbee9d6d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21305%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd519ed239a66badeb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21300-cwe-400-uncontrolled-resource-consu-fe1b1f04</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21300%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21292-cwe-94-improper-control-of-generati-d243dcb8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21292%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd509ed239a66badeb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21287-cwe-269-improper-privilege-manageme-aa5db345</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21287%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21286-cwe-122-heap-based-buffer-overflow--9fa2d31f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21286%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21276-cwe-191-integer-underflow-wrap-or-w-b43513ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21276%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21275-cwe-285-improper-authorization-in-m-0c219cea</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21275%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21274-cwe-59-improper-link-resolution-bef-03287817</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21274%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21273-cwe-122-heap-based-buffer-overflow--da3bfa5b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21273%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21189-cwe-41-improper-resolution-of-path--6ad5ffd1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21189%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21261-cwe-125-out-of-bounds-read-in-micro-ebb9cd50</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21261%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21256-cwe-125-out-of-bounds-read-in-micro-f009048e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21256%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badead9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21232-cwe-125-out-of-bounds-read-in-micro-ad71bf35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21232%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badea9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21231-cwe-400-uncontrolled-resource-consu-14de3fd2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21231%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badea9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21230-cwe-20-improper-input-validation-in-3b84355d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21230%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badea99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21229-cwe-125-out-of-bounds-read-in-micro-bddca4ac</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21229%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badea96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21228-cwe-125-out-of-bounds-read-in-micro-1812b280</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21228%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21227-cwe-125-out-of-bounds-read-in-micro-536155a4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21227%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21226-cwe-125-out-of-bounds-read-in-micro-86eb8f62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21226%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21225-cwe-843-access-of-resource-using-in-c1f11d07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21225%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21224-cwe-591-sensitive-data-storage-in-i-ade77298</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21224%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68386826182aa0cae2801b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21213-cwe-284-improper-access-control-in--94f2bf87</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21213%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21211-cwe-693-protection-mechanism-failur-843c2c0c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21211%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21186-cwe-122-heap-based-buffer-overflow--24b4c679</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21186%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd4c9ed239a66badea43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21187-cwe-94-improper-control-of-generati-2703654c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21187%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Power%20Automate%20for%20Desktop&amp;severity=high&amp;id=68c0bd4c9ed239a66badea46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21202-cwe-284-improper-access-control-in--76790578</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21202%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21207-cwe-400-uncontrolled-resource-consu-0427377a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21207%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd4c9ed239a66badea52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21193-cwe-352-cross-site-request-forgery--dcef42f3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21193%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21335-cwe-416-use-after-free-in-microsoft-f4888926</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21335%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68881726ad5a09ad0088bbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21220-cwe-908-use-of-uninitialized-resour-b87b1719</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21220%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4d9ed239a66badea7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21330-cwe-400-uncontrolled-resource-consu-851e0af0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21330%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd529ed239a66badebe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21328-cwe-41-improper-resolution-of-path--e3aec682</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21328%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21329-cwe-41-improper-resolution-of-path--5e776fb7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21329%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21278-cwe-362-concurrent-execution-using--c4027d3f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21278%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21405-cwe-284-improper-access-control-in--af0914e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21405%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.12&amp;severity=high&amp;id=68c0bd549ed239a66badec6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21217-cwe-693-protection-mechanism-failur-6bbbd5b5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21217%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21403-cwe-863-incorrect-authorization-in--2333e401</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21403%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Microsoft%20On-Premises%20Data%20Gateway&amp;severity=medium&amp;id=68c0bd549ed239a66badec6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21395-cwe-122-heap-based-buffer-overflow--b730fdd9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21395%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd549ed239a66badec63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21393-cwe-79-improper-neutralization-of-i-e5d3c1b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21393%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=68c0bd549ed239a66badec60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21389-cwe-400-uncontrolled-resource-consu-742306c3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21389%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd539ed239a66badec53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21219-cwe-41-improper-resolution-of-path--9d000a0a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21219%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21382-cwe-190-integer-overflow-or-wraparo-3a6f1c6e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21382%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd539ed239a66badec4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21366-cwe-416-use-after-free-in-microsoft-992c9b1c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21366%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21365-cwe-426-untrusted-search-path-in-mi-4b1be7b6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21365%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21364-cwe-502-deserialization-of-untruste-458a0306</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21364%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21363-cwe-822-untrusted-pointer-dereferen-6a81413b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21363%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21362-cwe-416-use-after-free-in-microsoft-466d428b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21362%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21357-cwe-908-use-of-uninitialized-resour-e404e656</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21357%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=68c0bd539ed239a66badec1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21356-cwe-843-access-of-resource-using-in-dfcc7049</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21356%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21354-cwe-822-untrusted-pointer-dereferen-f685ad06</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21354%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21348-cwe-285-improper-authorization-in-m-aa421657</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21348%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68c0bd539ed239a66badec13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21346-cwe-693-protection-mechanism-failur-2a458b10</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21346%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21345-cwe-416-use-after-free-in-microsoft-78d2177a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21345%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd529ed239a66badebfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21344-cwe-20-improper-input-validation-in-09484071</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21344%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68c0bd529ed239a66badebfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21341-cwe-125-out-of-bounds-read-in-micro-37d0b079</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21341%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21173-cwe-379-creation-of-temporary-file-in-directory-with-insecure-permissions-in-microsoft-net-8-0-bda74b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21173%3A%20CWE-379%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=682d981cc4522896dcbda74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21178-cwe-122-heap-based-buffer-overflow--684289ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21178%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Visual%20Studio%202015%20Update%203&amp;severity=high&amp;id=68c0c0d09ed239a66badfce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21176-cwe-126-buffer-over-read-in-microsoft-microsoft-visual-studio-2017-version-15-9-includes-15-0-15-8-bda7f9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21176%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=682d981cc4522896dcbda7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21327-cwe-125-out-of-bounds-read-in-micro-d20af7fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21327%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21321-cwe-532-insertion-of-sensitive-info-e270dd04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21321%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21320-cwe-532-insertion-of-sensitive-info-a5e489b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21320%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21319-cwe-532-insertion-of-sensitive-info-20d7ca6d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21319%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21318-cwe-532-insertion-of-sensitive-info-2038d2aa</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21318%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21316-cwe-532-insertion-of-sensitive-info-1623ffdf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21316%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21315-cwe-416-use-after-free-in-microsoft-b60bb0eb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21315%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68c0bd519ed239a66badebad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21314-cwe-451-user-interface-ui-misrepres-c51fbd48</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21314%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68c0bd519ed239a66badebaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21309-cwe-591-sensitive-data-storage-in-i-64e15c1d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21309%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=68c0bd519ed239a66badeba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21306-cwe-122-heap-based-buffer-overflow--14251da8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21306%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd519ed239a66badeb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21304-cwe-416-use-after-free-in-microsoft-67aec62f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21304%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68c0bd519ed239a66badeb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21303-cwe-122-heap-based-buffer-overflow--c5ffb4c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21303%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21302-cwe-122-heap-based-buffer-overflow--c2362e4b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21302%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21301-cwe-284-improper-access-control-in--197edccd</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21301%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd509ed239a66badeb79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21299-cwe-922-insecure-storage-of-sensiti-2bc0dc7f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21299%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21298-cwe-416-use-after-free-in-microsoft-7820f14b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21298%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=critical&amp;id=68c0bd509ed239a66badeb70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21297-cwe-416-use-after-free-in-microsoft-881c5e70</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21297%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=68c0bd509ed239a66badeb6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21296-cwe-416-use-after-free-in-microsoft-efd8078f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21296%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21295-cwe-416-use-after-free-in-microsoft-953cb809</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21295%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21294-cwe-591-sensitive-data-storage-in-i-61a6e2ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21294%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21293-cwe-284-improper-access-control-in--41461686</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21293%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21291-cwe-415-double-free-in-microsoft-wi-cba08858</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21291%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd509ed239a66badeb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21290-cwe-400-uncontrolled-resource-consu-59a70c37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21290%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21289-cwe-400-uncontrolled-resource-consu-775b2a09</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21289%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21288-cwe-908-use-of-uninitialized-resour-09b9c1d1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21288%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd509ed239a66badeb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21285-cwe-476-null-pointer-dereference-in-9d3f8b89</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21285%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21284-cwe-20-improper-input-validation-in-56748142</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21284%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd509ed239a66badeb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21282-cwe-122-heap-based-buffer-overflow--80d5a8cf</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21282%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21281-cwe-416-use-after-free-in-microsoft-a05aba8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21281%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21280-cwe-20-improper-input-validation-in-e07aefc4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21280%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21277-cwe-126-buffer-over-read-in-microso-37671960</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21277%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21272-cwe-908-use-of-uninitialized-resour-f8618328</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21272%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21271-cwe-126-buffer-over-read-in-microso-517bc838</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21271%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21270-cwe-400-uncontrolled-resource-consu-1a684468</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21270%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21269-cwe-41-improper-resolution-of-path--f4c3b8bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21269%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21268-cwe-41-improper-resolution-of-path--8e8585ec</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21268%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21266-cwe-122-heap-based-buffer-overflow--247a69f5</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21266%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21265-cwe-125-out-of-bounds-read-in-micro-4c095ca4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21265%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21263-cwe-125-out-of-bounds-read-in-micro-649ece31</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21263%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21260-cwe-125-out-of-bounds-read-in-micro-47b8a562</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21260%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21258-cwe-125-out-of-bounds-read-in-micro-91932919</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21258%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21257-cwe-125-out-of-bounds-read-in-micro-fb39df5a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21257%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21255-cwe-125-out-of-bounds-read-in-micro-4b8bcfd6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21255%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badead6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21252-cwe-122-heap-based-buffer-overflow--98c64ffd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21252%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badead3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21251-cwe-400-uncontrolled-resource-consu-0a478655</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21251%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badead0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21249-cwe-125-out-of-bounds-read-in-micro-a9a24032</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21249%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badeacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21248-cwe-122-heap-based-buffer-overflow--4968a0d7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21248%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21244-cwe-190-integer-overflow-or-wraparo-7968ce03</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21244%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21243-cwe-190-integer-overflow-or-wraparo-b68e09d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21243%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21242-cwe-200-exposure-of-sensitive-infor-e6cc2d22</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21242%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badeac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21241-cwe-122-heap-based-buffer-overflow--ad200e1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21241%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21239-cwe-122-heap-based-buffer-overflow--c6f15e3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21239%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21237-cwe-122-heap-based-buffer-overflow--644cb14d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21237%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21236-cwe-122-heap-based-buffer-overflow--26aa6ea5</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21236%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21235-cwe-20-improper-input-validation-in-8cf4326e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21235%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21234-cwe-20-improper-input-validation-in-13dceebd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21234%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21233-cwe-122-heap-based-buffer-overflow--8f25ca3b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21233%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21215-cwe-125-out-of-bounds-read-in-micro-0fa90214</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21215%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21214-cwe-200-exposure-of-sensitive-infor-5b56d697</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21214%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21210-cwe-636-not-failing-securely-failin-36824c57</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21210%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21171-cwe-122-heap-based-buffer-overflow--6bafdd3e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21171%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20.NET%209.0&amp;severity=high&amp;id=68c0bd4c9ed239a66badea40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21413-cwe-122-heap-based-buffer-overflow--5a3f919f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21413%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd549ed239a66badec75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21411-cwe-122-heap-based-buffer-overflow--380acf68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21411%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd549ed239a66badec72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12087-path-traversal-bd6699</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12087%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=medium&amp;id=682d9816c4522896dcbd6699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23366-improper-neutralization-of-input-du-b63c24ad</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23366%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=68b38a1cad5a09ad0096159f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12747-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-bd66b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12747%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)&amp;severity=medium&amp;id=682d9816c4522896dcbd66b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12088-path-traversal-bd669d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12088%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=medium&amp;id=682d9816c4522896dcbd669d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12086-detection-of-error-condition-without-action-bd9dbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12086%3A%20Detection%20of%20Error%20Condition%20Without%20Action&amp;severity=medium&amp;id=682d981bc4522896dcbd9dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12085-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-259515</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12085%3A%20Use%20of%20Uninitialized%20Resource&amp;severity=high&amp;id=682f0c680acd01a249259515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21607-cwe-670-always-incorrect-control-flow-implementation-in-vyperlang-vyper-bf1215</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21607%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20vyperlang%20vyper&amp;severity=medium&amp;id=682d9840c4522896dcbf1215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13162-cwe-89-improper-neutralization-of-s-34f4bd4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13162%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43a85912abc71d620a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13163-cwe-502-deserialization-of-untruste-cfb369c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13163%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43a85912abc71d620a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13164-cwe-908-use-of-uninitialized-resour-01f4baa5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13164%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43a85912abc71d620a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13169-cwe-125-out-of-bounds-read-in-ivant-d8cbb97b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13169%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43a85912abc71d620ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13171-cwe-434-unrestricted-upload-of-file-27495616</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13171%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43c85912abc71d620c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13172-cwe-347-improper-verification-of-cr-530fd99b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13172%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43c85912abc71d620c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13158-cwe-426-untrusted-search-path-in-iv-b30b5dd5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13158%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43a85912abc71d6209f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13159-cwe-36-absolute-path-traversal-in-i-8d866fb7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13159%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=68f7d9b0247d717aace268b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13160-cwe-36-absolute-path-traversal-in-i-acf6a555</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13160%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=68f7d9b0247d717aace268be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13161-cwe-36-absolute-path-traversal-in-i-3a9bb4bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13161%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=68f7d9b0247d717aace268c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10811-cwe-36-absolute-path-traversal-in-i-2eebbb91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10811%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=69a0a43a85912abc71d6208e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10630-cwe-366-race-condition-within-a-thr-b51b3948</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10630%3A%20CWE-366%3A%20Race%20Condition%20within%20a%20Thread%20in%20Ivanti%20Application%20Control%20Engine&amp;severity=high&amp;id=69a0a43885912abc71d61ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39761-cwe-77-improper-neutralization-of-s-5d0060d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39761%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39760-cwe-77-improper-neutralization-of-s-a734abb3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39760%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39759-cwe-77-improper-neutralization-of-s-0175eed5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39759%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39765-cwe-77-improper-neutralization-of-s-78a2f427</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39765%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39764-cwe-77-improper-neutralization-of-s-317d69d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39764%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39763-cwe-77-improper-neutralization-of-s-0d4d248f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39763%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39762-cwe-77-improper-neutralization-of-s-d4078243</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39762%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39770-cwe-120-buffer-copy-without-checkin-61f1ee4e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39770%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39769-cwe-120-buffer-copy-without-checkin-d8a52584</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39769%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39768-cwe-120-buffer-copy-without-checkin-9e7329e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39768%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39783-cwe-77-improper-neutralization-of-s-a0a65961</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39783%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39782-cwe-77-improper-neutralization-of-s-1afa5de6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39782%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39781-cwe-77-improper-neutralization-of-s-4beb719d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39781%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39803-cwe-120-buffer-copy-without-checkin-cdb40e27</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39803%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929b1fe7723195e0fd852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39802-cwe-120-buffer-copy-without-checkin-cb5d9bc2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39802%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929b1fe7723195e0fd84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39801-cwe-120-buffer-copy-without-checkin-672a1986</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39801%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39800-cwe-15-external-control-of-system-o-a5e6f7ba</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39800%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39799-cwe-15-external-control-of-system-o-50414f96</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39799%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39798-cwe-15-external-control-of-system-o-a8cd9fcb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39798%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39795-cwe-15-external-control-of-system-o-47aad5a1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39795%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39794-cwe-15-external-control-of-system-o-fdb85ade</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39794%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39793-cwe-15-external-control-of-system-o-3df738e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39793%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39790-cwe-15-external-control-of-system-o-f3bb938c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39790%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39789-cwe-15-external-control-of-system-o-b57ba482</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39789%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39788-cwe-15-external-control-of-system-o-807b55ea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39788%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39787-cwe-22-improper-limitation-of-a-pat-915b3901</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39787%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39786-cwe-22-improper-limitation-of-a-pat-d6dcc723</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39786%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39785-cwe-74-improper-neutralization-of-s-20df6530</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39785%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39784-cwe-74-improper-neutralization-of-s-ab4bb436</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39784%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45326-improper-access-control-in-fortinet-1490e032</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45326%3A%20Improper%20access%20control%20in%20Fortinet%20FortiDeceptor&amp;severity=low&amp;id=6983546df9fa50a62f8ff38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27778-execute-unauthorized-code-or-comman-a0c1ef26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27778%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6967a963d0ff220b9507e1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48884-escalation-of-privilege-in-fortinet-d5aca854</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48884%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiProxy&amp;severity=high&amp;id=696793f38330e067163e9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46668-denial-of-service-in-fortinet-forti-b01b2595</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46668%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=696762bf8330e0671657350a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46669-denial-of-service-in-fortinet-forti-90a02bbb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46669%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=696762bf8330e0671657350d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50566-execute-unauthorized-code-or-comman-84780c0d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50566%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=high&amp;id=696793f38330e067163e9f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55591-execute-unauthorized-code-or-comman-1234e539</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55591%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=critical&amp;id=68f7d9b6247d717aace26c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12240-cwe-79-improper-neutralization-of-i-cc9c79ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20Page%20Builder%20by%20SiteOrigin&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53649-cwe-552-files-or-directories-access-334a64ec</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53649%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=medium&amp;id=6913a08cf4d5bbdab5b1c78d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12919-cwe-287-improper-authentication-in--fd0388f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12919%3A%20CWE-287%20Improper%20Authentication%20in%20cozmoslabs%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=critical&amp;id=699f6e4bb7ef31ef0b59c71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11736-cleartext-storage-of-sensitive-info-7ba2ed87</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11736%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11734-protection-mechanism-failure-ff3c2357</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11734%3A%20Protection%20Mechanism%20Failure&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13156-cwe-79-improper-neutralization-of-i-6f2e9a0a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13156%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20HTML5%20Video%20Player%20%E2%80%93%20Embed%20and%20Play%20Videos%20in%20Custom%20Player&amp;severity=medium&amp;id=699f6e4db7ef31ef0b59c8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0394-cwe-434-unrestricted-upload-of-file--ee48e311</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0394%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20trainingbusinesspros%20Groundhogg%20%E2%80%94%20CRM%2C%20Newsletters%2C%20and%20Marketing%20Automation&amp;severity=high&amp;id=699f6b69b7ef31ef0b55525d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0393-cwe-352-cross-site-request-forgery-c-67fea99e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0393%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=699f6b69b7ef31ef0b555256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12008-cwe-200-exposure-of-sensitive-infor-419c7df3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12008%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20boldgrid%20W3%20Total%20Cache&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12006-cwe-862-missing-authorization-in-bo-a1a1f556</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12006%3A%20CWE-862%20Missing%20Authorization%20in%20boldgrid%20W3%20Total%20Cache&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12365-cwe-862-missing-authorization-in-bo-cf140daf</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12365%3A%20CWE-862%20Missing%20Authorization%20in%20boldgrid%20W3%20Total%20Cache&amp;severity=high&amp;id=699f6e38b7ef31ef0b597fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13323-cwe-79-improper-neutralization-of-i-2ec53f2f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13323%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12083-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-omron-corporation-machine-automation-controller-nj-series-bd9d53</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12083%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OMRON%20Corporation%20Machine%20Automation%20Controller%20NJ-series&amp;severity=medium&amp;id=682d981bc4522896dcbd9d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57661-na-552bc345</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57661%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57659-na-03fa2dcb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57659%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57654-na-e608315f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57654%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57652-na-0d5bb54e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57652%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57651-na-373bb06d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57651%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57650-na-845bd7ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57650%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57649-na-fc87fd71</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57649%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57648-na-ea27c076</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57648%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57647-na-698cbf30</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57647%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57646-na-1ef19e62</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57646%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57645-na-1ce541d8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57645%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57644-na-af06af6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57644%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57643-na-e47614c1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57643%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57642-na-bedefa2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57642%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57641-na-b174e928</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57641%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57640-na-285d515b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57640%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57639-na-16a7829c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57639%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57638-na-58c2b291</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57638%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57637-na-b1d7d725</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57637%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57636-na-fd7e513d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57636%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57635-na-ad4734ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57635%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57634-na-c868bc37</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57634%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57633-na-0d3fee1d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57633%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57632-na-16a06721</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57632%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57631-na-ac6db4af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57631%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57630-na-4a509fe6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57630%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57629-na-23dbcd94</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57629%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57628-na-61ba4a40</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57628%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57627-na-5159ee01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57627%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57626-na-1dabdc7b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57626%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57625-na-afe2caab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57625%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57624-na-eae2e808</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57624%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57623-na-db029701</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57623%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57622-na-ecdaddb5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57622%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57621-na-c62c42e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57621%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57620-na-904a6e38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57620%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57619-na-18265dac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57619%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57618-na-4f4e1556</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57618%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57617-na-ffd2bf6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57617%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57616-na-455d9a36</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57616%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57615-na-575b4a0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57615%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55000-na-28cdeb93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55000%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53563-na-a38cbcd7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53563%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbfb7ef31ef0b55a9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50861-na-51ec2675</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50861%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b5575eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50859-na-b44d642c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50859%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b5575e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50858-na-a5b3e22e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50858%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba2b7ef31ef0b5575e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50857-na-02ddba20</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50857%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b5575dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22997-na-50bfe253</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22997%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22996-na-617e7e1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22996%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23019-cwe-940-improper-verification-of-so-8f994196</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23019%3A%20CWE-940%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20IETF%20IPv6&amp;severity=medium&amp;id=69091a4fc28fd46ded81d165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23018-cwe-940-improper-verification-of-so-0351b5ba</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23018%3A%20CWE-940%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20IETF%20IPv6&amp;severity=medium&amp;id=69091a4fc28fd46ded81d15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-14-2e0be8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-14&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e0be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-14-f13a9f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-14&amp;severity=medium&amp;id=682acdc2bbaf20d303f13a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11396-cwe-359-exposure-of-private-persona-fa41f7fb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11396%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20awordpresslife%20Event%20Monster%20%E2%80%93%20Manager%20%26%20Ticket%20Booking&amp;severity=medium&amp;id=699f6e12b7ef31ef0b594a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52333-cwe-119-improper-restriction-of-ope-56b456be</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52333%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20OFFIS%20DCMTK&amp;severity=high&amp;id=690916c8c28fd46ded7ccf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47796-cwe-119-improper-restriction-of-ope-5e14216a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47796%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20OFFIS%20DCMTK&amp;severity=high&amp;id=690908517fff0e30cee23581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56065-improper-neutralization-of-input-du-926b76a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56065%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56301-improper-neutralization-of-input-du-35f4ce13</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56301%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20Distance%20Based%20Shipping%20Calculator&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22800-missing-authorization-in-saad-iqbal-233de3d9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22800%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20Post%20SMTP&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22314-improper-neutralization-of-input-du-ad87c590</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22314%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Scripts%20Food%20Store%20%E2%80%93%20Online%20Food%20Delivery%20%26%20Pickup&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0813c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22337-improper-neutralization-of-input-du-9e644b28</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22337%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20infosoftplugin%20Order%20Audit%20Log%20for%20WooCommerce&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22344-improper-neutralization-of-input-du-eb574c89</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22344%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timmcdaniels%20Media%20Category%20Library&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22498-improper-neutralization-of-input-du-6c54c615</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22498%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20N3wNormal%20LucidLMS&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22499-improper-neutralization-of-input-du-4845817d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22499%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FAKTOR%20VIER%20F4%20Post%20Tree&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22514-improper-neutralization-of-input-du-4e0c8034</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22514%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yamna%20Khawaja%20KNR%20Author%20List%20Widget&amp;severity=null&amp;id=69cd75ede6bfc5ba1df08679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22567-improper-neutralization-of-input-du-af41d417</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22567%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustist%20TRUSTist%20REVIEWer&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df08951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22568-improper-neutralization-of-input-du-712110f8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22568%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arete-it%20Post%20And%20Page%20Reactions&amp;severity=null&amp;id=69cd75f6e6bfc5ba1df08954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22569-improper-neutralization-of-input-du-288960f3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22569%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GrandSlambert%20Featured%20Page%20Widget&amp;severity=null&amp;id=69cd75f6e6bfc5ba1df08957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22570-improper-neutralization-of-input-du-8529dce4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdjekic%20Inline%20Tweets&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22576-improper-neutralization-of-input-du-6e45af3e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marcus%20Downing%20Site%20PIN&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22583-improper-neutralization-of-input-du-cc05754d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22583%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anshulsojatia%20Scan%20External%20Links&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22586-improper-neutralization-of-input-du-56f7e369</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dstoever%20WPEX%20Replace%20DB%20Urls&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22588-improper-neutralization-of-input-du-7c94c58e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22588%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intelligence_lab%20Scanventory&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22777-deserialization-of-untrusted-data-i-0260d14f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22777%3A%20Deserialization%20of%20Untrusted%20Data%20in%20StellarWP%20GiveWP&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0412-cwe-119-improper-restriction-of-oper-d56d750b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0412%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Luxion%20KeyShot%20Viewer&amp;severity=high&amp;id=699f6b69b7ef31ef0b555263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46920-na-a9badbcb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46920%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d06b7ef31ef0b56d479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46919-na-6ad05b10</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46919%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d06b7ef31ef0b56d475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46481-cwe-601-url-redirection-to-untruste-d2571bc8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46481%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Venki%20Supravizio%20BPM&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46480-cwe-522-insufficiently-protected-cr-3b491dbe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46480%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Venki%20Supravizio%20BPM&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46479-cwe-434-unrestricted-upload-of-file-6d2374cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46479%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Venki%20Supravizio%20BPM&amp;severity=critical&amp;id=699f6d00b7ef31ef0b56c2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46310-na-aaa4b416</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46310%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfcb7ef31ef0b56ab28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44771-na-f090f014</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44771%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce2b7ef31ef0b569e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57811-na-53c18a56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57811%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bdbb7ef31ef0b55b7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57488-na-8268d590</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57488%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57487-na-dc12d7b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57487%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54999-na-d7063f68</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54999%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48883-na-033617a2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48883%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7cb7ef31ef0b555d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22963-cwe-352-cross-site-request-forgery--f7d1ca88</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22963%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sismics%20Teedy&amp;severity=high&amp;id=6896070dad5a09ad0004626d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/packets-everywhere-report-about-delivery-abuse-sys-56443ff8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Packets%20everywhere!%22%20report%20about%20delivery%20abuse%20system%20and%20phishing&amp;severity=low&amp;id=68367c06182aa0cae231036a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-13-2e094d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-13&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e094d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-13-f12058</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f12058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/packets-everywhere-report-about-delivery-abuse-system-and-phishing-f0c53a</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Packets%20everywhere!%22%20report%20about%20delivery%20abuse%20system%20and%20phishing&amp;severity=low&amp;id=682acdbebbaf20d303f0c53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-12-2df9b6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-12&amp;severity=medium&amp;id=682c7dc2e8347ec82d2df9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-12-f122c8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f122c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57881-vulnerability-in-linux-linux-bde94e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57880-vulnerability-in-linux-linux-bde946</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57879-vulnerability-in-linux-linux-bdd1c8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57878-vulnerability-in-linux-linux-bde935</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57877-vulnerability-in-linux-linux-bde92d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57876-vulnerability-in-linux-linux-bdd1b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57875-vulnerability-in-linux-linux-bde925</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57874-vulnerability-in-linux-linux-bde91f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57872-vulnerability-in-linux-linux-bde8fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57850-vulnerability-in-linux-linux-bde8e3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57849-vulnerability-in-linux-linux-bde8dd</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57843-vulnerability-in-linux-linux-bde8d9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57839-vulnerability-in-linux-linux-bde8cc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57838-vulnerability-in-linux-linux-bde8bb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57809-vulnerability-in-linux-linux-bde896</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57807-vulnerability-in-linux-linux-bde892</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57806-vulnerability-in-linux-linux-bde88e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57805-vulnerability-in-linux-linux-bdd1a2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57804-vulnerability-in-linux-linux-bde88a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57800-vulnerability-in-linux-linux-bde87e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57799-vulnerability-in-linux-linux-bde87a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57798-vulnerability-in-linux-linux-bde878</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57793-vulnerability-in-linux-linux-bde849</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57792-vulnerability-in-linux-linux-bde841</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57791-vulnerability-in-linux-linux-bde839</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56788-vulnerability-in-linux-linux-bde833</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56372-vulnerability-in-linux-linux-bdf13a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56372%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56369-vulnerability-in-linux-linux-bdf12d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56369%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56368-vulnerability-in-linux-linux-bdf12b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56368%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55916-vulnerability-in-linux-linux-bdf127</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55881-vulnerability-in-linux-linux-bdf11a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54455-vulnerability-in-linux-linux-bdf0df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54455%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54193-vulnerability-in-linux-linux-bdf0db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54193%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53690-vulnerability-in-linux-linux-bdf0bf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53685-vulnerability-in-linux-linux-bdf0af</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52319-vulnerability-in-linux-linux-bdf7a2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52319%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51729-vulnerability-in-linux-linux-bdf79e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49573-vulnerability-in-linux-linux-be0763</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49573%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49571-vulnerability-in-linux-linux-be0745</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49571%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49568-vulnerability-in-linux-linux-be073d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49568%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe073d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47408-vulnerability-in-linux-linux-be03f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47408%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe03f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46896-vulnerability-in-linux-linux-be03e0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe03e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41149-vulnerability-in-linux-linux-be18fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe18fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55642-vulnerability-in-linux-linux-bdf112</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55641-vulnerability-in-linux-linux-bdf10a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55639-vulnerability-in-linux-linux-bdf0ef</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54683-vulnerability-in-linux-linux-bdf0eb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54460-vulnerability-in-linux-linux-bdd0b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54460%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54191-vulnerability-in-linux-linux-bdd0b1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54191%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53687-vulnerability-in-linux-linux-bdf0b7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53682-vulnerability-in-linux-linux-bdf08e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53680-vulnerability-in-linux-linux-bdf086</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52332-vulnerability-in-linux-linux-bdf7a6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52332%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50051-vulnerability-in-linux-linux-bdfdd4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfdd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49569-vulnerability-in-linux-linux-bdce98</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49569%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48881-vulnerability-in-linux-linux-bdce87</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdce87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48876-vulnerability-in-linux-linux-be0737</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48875-vulnerability-in-linux-linux-be0733</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48873-vulnerability-in-linux-linux-be072f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe072f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47809-vulnerability-in-linux-linux-be072b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe072b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47794-vulnerability-in-linux-linux-be0727</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47143-vulnerability-in-linux-linux-be03f0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47143%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe03f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47141-vulnerability-in-linux-linux-be03e8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe03e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45828-vulnerability-in-linux-linux-be0f43</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43098-vulnerability-in-linux-linux-be1f46</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41935-vulnerability-in-linux-linux-be190b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe190b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41932-vulnerability-in-linux-linux-be1907</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12407-cwe-79-improper-neutralization-of-i-bab64f48</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12407%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20murali-indiacitys%20Push%20Notification%20for%20Post%20and%20BuddyPress&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b5981fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11386-cwe-79-improper-neutralization-of-i-d2f20ce7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11386%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wow-analytics%20GatorMail%20SmartForms&amp;severity=medium&amp;id=699f6e12b7ef31ef0b594a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12527-cwe-79-improper-neutralization-of-i-1fb6fcbd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12527%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alanperfectportal%20Perfect%20Portal%20Widgets&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11892-cwe-79-improper-neutralization-of-i-b38120e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bqworks%20Accordion%20Slider%20Lite&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12877-cwe-502-deserialization-of-untruste-390f358b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12877%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=critical&amp;id=699f6e4bb7ef31ef0b59c70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12412-cwe-79-improper-neutralization-of-i-e6f9bd51</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12412%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager%20for%20Bike%20%7C%20Car%20%7C%20Resort%20%7C%20Appointment%20%7C%20Dress%20%7C%20Equipment&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12520-cwe-79-improper-neutralization-of-i-739c7148</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12520%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reader87%20Dominion%20%E2%80%93%20Domain%20Checker%20for%20WPBakery&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12116-cwe-639-authorization-bypass-throug-db8a5ae0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12116%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codepopular%20Unlimited%20Theme%20Addon%20For%20Elementor&amp;severity=medium&amp;id=699f6e2db7ef31ef0b59750f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12519-cwe-79-improper-neutralization-of-i-2d1ab9b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12519%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tcoder%20TCBD%20Auto%20Refresher&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11874-cwe-79-improper-neutralization-of-i-6b20c7e6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bqworks%20Grid%20Accordion%20Lite&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11915-cwe-639-authorization-bypass-throug-01fdd65d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11915%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20rrdevs%20RRAddons%20for%20Elementor&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11758-cwe-79-improper-neutralization-of-i-2fd89372</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11758%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milmor%20WP%20SPID%20Italia&amp;severity=medium&amp;id=699f6e1db7ef31ef0b59577f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23109-vulnerability-in-mozilla-firefox-fo-60b5096a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23109%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=69dd057782d89c981f01728b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23108-vulnerability-in-mozilla-firefox-fo-e0c7c539</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23108%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=69dd057782d89c981f017287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12304-cwe-79-improper-neutralization-of-i-e2834e56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=699f6e36b7ef31ef0b597d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12204-cwe-862-missing-authorization-in-ga-f15531ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12204%3A%20CWE-862%20Missing%20Authorization%20in%20premio%20Coupon%20X%20%E2%80%93%20Discount%20Popups%20%26%20Promo%20Codes%20Pop%20Ups%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e31b7ef31ef0b597844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11327-cwe-79-improper-neutralization-of-i-4f15c13e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11327%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clickwhale%20ClickWhale%20%E2%80%93%20Link%20Manager%2C%20Link%20Shortener%20and%20Click%20Tracker%20for%20Affiliate%20Links%20%26%20Link%20Pages&amp;severity=medium&amp;id=699f6e0db7ef31ef0b5944f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12505-cwe-79-improper-neutralization-of-i-6b2824cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tinuzz%20Trackserver&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12627-cwe-502-deserialization-of-untruste-349ea7fb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12627%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20premio%20Coupon%20X%20%E2%80%93%20Discount%20Popups%20%26%20Promo%20Codes%20Pop%20Ups%20for%20WooCommerce&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12472-cwe-639-authorization-bypass-throug-52445a6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12472%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20metaphorcreations%20Post%20Duplicator&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12404-cwe-89-improper-neutralization-of-s-ff29cad9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12404%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20crowdfavorite%20CF%20Internal%20Link%20Shortcode&amp;severity=high&amp;id=699f6e38b7ef31ef0b5980e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-11-2e00d1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-11&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e00d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-11-f12eda</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12847-cwe-78-improper-neutralization-of-s-02d1fbc1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12847%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NETGEAR%20DGN1000&amp;severity=critical&amp;id=691f8f1bb342c1dca41c33d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22598-cwe-79-improper-neutralization-of-i-3c126dca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22598%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68ae0f66ad5a09ad005b18c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22597-cwe-79-improper-neutralization-of-i-73da38b7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22597%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68ae0f66ad5a09ad005b18bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13318-cwe-463-deletion-of-data-structure--322e88ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13318%3A%20CWE-463%20Deletion%20of%20Data%20Structure%20Sentinel%20in%20smartdatasoft%20Essential%20WP%20Real%20Estate&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13183-cwe-79-improper-neutralization-of-i-d8b9f6ea</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%3A%20Duplicate%20Page%2C%20Menu%20Icons%2C%20SVG%20Support%2C%20Cookie%20Notice%2C%20Custom%20Fonts%20%26%20More&amp;severity=medium&amp;id=699f6e4db7ef31ef0b59c8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0311-cwe-79-improper-neutralization-of-in-f53b592b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0311%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%3A%20Duplicate%20Page%2C%20Menu%20Icons%2C%20SVG%20Support%2C%20Cookie%20Notice%2C%20Custom%20Fonts%20%26%20More&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12473-cwe-89-improper-neutralization-of-s-3d8fd906</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12473%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opacewebdesign%20Opace%20AI%20Scribe%3A%20SEO%20Content%20Creator%20%26%20Humaizer%20for%20OpenAI%20%26%20Anthropic&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12606-cwe-862-missing-authorization-in-op-3cb54b84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12606%3A%20CWE-862%20Missing%20Authorization%20in%20opacewebdesign%20Opace%20AI%20Scribe%3A%20SEO%20Content%20Creator%20%26%20Humaizer%20for%20OpenAI%20%26%20Anthropic&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29971-na-d9568c8c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29971%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da2b7ef31ef0b5899d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29970-na-375f89f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29970%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da2b7ef31ef0b5899d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25371-na-10f25d06</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25371%3A%20n%2Fa&amp;severity=high&amp;id=699f6d65b7ef31ef0b571d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33299-na-a7fc2be2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33299%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3db7ef31ef0b561780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33298-na-ed1c467b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33298%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3db7ef31ef0b56177d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33297-na-547e6a28</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33297%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3db7ef31ef0b56177a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57687-na-59152441</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57687%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bdbb7ef31ef0b55b7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57228-na-ff9983f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57228%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57227-na-9bb5547b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57227%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57226-na-bd655bea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57226%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57225-na-da7d0779</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57225%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd6b7ef31ef0b55b53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57224-na-e7ab829d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57224%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd6b7ef31ef0b55b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57223-na-211d9c97</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57223%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd6b7ef31ef0b55b538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57222-na-b15889da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57222%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57214-na-81b00022</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57214%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57213-na-0185f54b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57213%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57212-na-96dd90e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57212%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57211-na-ec7ee695</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57211%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54998-na-d98bc4ae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54998%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54997-na-0286a1a4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54997%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54996-na-41f700cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54996%3A%20n%2Fa&amp;severity=high&amp;id=699f6bcab7ef31ef0b55af7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54994-na-13d21559</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54994%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54910-na-02e9bed9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54910%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc8b7ef31ef0b55ae51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54849-na-145de692</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54849%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc8b7ef31ef0b55ae3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54848-na-5306d8fd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54848%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc8b7ef31ef0b55ae38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54847-na-0e98968d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54847%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc8b7ef31ef0b55ae33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54846-na-c7aac4ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54846%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc8b7ef31ef0b55ae2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54687-na-e8bbde3d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54687%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55ad4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23113-cwe-352-cross-site-request-forgery--31a15136</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23113%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vanderbilt%20REDCap&amp;severity=low&amp;id=699f6b1bb7ef31ef0b54e36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23112-cwe-79-improper-neutralization-of-i-610d38e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vanderbilt%20REDCap&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23111-cwe-79-improper-neutralization-of-i-a829cf1e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23111%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vanderbilt%20REDCap&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23110-cwe-79-improper-neutralization-of-i-b49f13ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23110%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vanderbilt%20REDCap&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22949-na-393f3e80</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22949%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b1bb7ef31ef0b54e355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22946-na-61d8908f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22946%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b1bb7ef31ef0b54e308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57823-cwe-191-integer-underflow-wrap-or-w-084b4782</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57823%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20librdf%20Raptor%20RDF%20Syntax%20Library&amp;severity=critical&amp;id=6908ed741c2a0078ae510274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57822-cwe-125-out-of-bounds-read-in-librd-5519c1c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57822%3A%20CWE-125%20Out-of-bounds%20Read%20in%20librdf%20Raptor%20RDF%20Syntax%20Library&amp;severity=medium&amp;id=6908ed741c2a0078ae51026e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23016-cwe-190-integer-overflow-or-wraparound-in-fastcgi-fcgi-bf1098</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23016%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20FastCGI%20fcgi&amp;severity=critical&amp;id=682d9840c4522896dcbf1098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-10-2e2638</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-10&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e2638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-10-f1283f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f1283f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21380-cwe-284-improper-access-control-in--8d68f498</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21380%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Marketplace%20SaaS&amp;severity=high&amp;id=68c0bd539ed239a66badec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21385-cwe-918-server-side-request-forgery-3b6754ee</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21385%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=68c0bd539ed239a66badec50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10215-cwe-639-authorization-bypass-throug-c8171729</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10215%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Iqonic%20Design%20WPBookit&amp;severity=critical&amp;id=699f6deeb7ef31ef0b590f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22149-cwe-672-operation-on-a-resource-after-expiration-or-release-in-micahparks-jwkset-275509</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22149%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20MicahParks%20jwkset&amp;severity=low&amp;id=6830d58c0acd01a249275509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22295-improper-neutralization-of-input-du-954ca8f0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22295%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tripetto%20WordPress%20form%20builder%20plugin%20for%20contact%20forms%2C%20surveys%20and%20quizzes%20%E2%80%93%20Tripetto&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df08068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22307-improper-neutralization-of-input-du-72a0afe4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saiful%20Islam%20Product%20Table%20for%20WooCommerce&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0811d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22313-improper-neutralization-of-input-du-df55186b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22313%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Widgetize%20Pages%20Light&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df08139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22330-improper-neutralization-of-input-du-68673f1b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22330%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mahesh%20Waghmare%20MG%20Parallax%20Slider&amp;severity=null&amp;id=69cd75dce6bfc5ba1df0822e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22331-improper-neutralization-of-input-du-32b89354</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22331%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20P3JX%20Cf7Save%20Extension&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22345-improper-neutralization-of-input-du-a4831a35</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22345%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tsinf%20TS%20Comfort%20DB&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22361-improper-neutralization-of-input-du-b3fa7700</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Opentracker%20Opentracker%20Analytics&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22504-unrestricted-upload-of-file-with-da-9bb40655</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22504%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20jumpdemand%204ECPS%20Web%20Forms&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22505-improper-neutralization-of-special--c5932711</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22505%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crispweb%20NC%20Wishlist%20for%20Woocommerce&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22508-improper-control-of-filename-for-in-6792a086</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22508%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20roninwp%20FAT%20Event%20Lite&amp;severity=null&amp;id=69cd75ede6bfc5ba1df0866a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22510-deserialization-of-untrusted-data-i-30d7821b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22510%3A%20Deserialization%20of%20Untrusted%20Data%20in%20kkarpieszuk%20WC%20Price%20History%20for%20Omnibus&amp;severity=null&amp;id=69cd75ede6bfc5ba1df0866d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22521-improper-neutralization-of-input-du-2e47249b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Farrell%20wp%20Hosting%20Performance%20Check&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22527-improper-neutralization-of-special--349496a3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22527%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yamna%20Khawaja%20Mailing%20Group%20Listserv&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22535-improper-neutralization-of-special--04cecf75</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22535%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jonkern%20WPListCal&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22537-improper-neutralization-of-special--70edb1e6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22537%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20traveller11%20Google%20Maps%20Travel%20Route&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22539-improper-neutralization-of-input-du-9f43b124</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ka2%20Custom%20DataBase%20Tables&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df087ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22540-improper-neutralization-of-special--93cf0bf9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22540%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20seballero%20Emailing%20Subscription&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22542-improper-neutralization-of-special--1308b9c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22542%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ofek%20Nakar%20Virtual%20Bot&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22561-missing-authorization-in-kbowson-ti-69bf3ac1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22561%3A%20Missing%20Authorization%20in%20kbowson%20Title%20Experiments%20Free&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df0893f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22594-improper-neutralization-of-input-du-38ec0ce6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hccoder%20Better%20User%20Shortcodes&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22595-improper-neutralization-of-input-du-9412817f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yamna%20Khawaja%20Mailing%20Group%20Listserv&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22801-improper-neutralization-of-input-du-cdca543a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22801%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HasThemes%20Free%20WooCommerce%20Theme%2099fy%20Extension&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22802-improper-neutralization-of-input-du-4727955b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22802%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20add-ons.org%20Email%20Templates%20Customizer%20for%20WordPress%20%E2%80%93%20Drag%20And%20Drop%20Email%20Templates%20Builder%20%E2%80%93%20YeeMail&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22803-improper-neutralization-of-input-du-42a8be26</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22803%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20Advanced%20Product%20Information%20for%20WooCommerce&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22804-improper-neutralization-of-input-du-6e0d8b1a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22804%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paul%20Bearne%20Author%20Avatars%20List%2FBlock&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22805-improper-neutralization-of-input-du-0bcc5402</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22805%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Skill%20Bar&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22806-improper-neutralization-of-input-du-b7087dc4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22806%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Modernaweb%20Studio%20Black%20Widgets%20For%20Elementor&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22807-improper-neutralization-of-input-du-a1e7afb4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22807%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20Responsive%20Flickr%20Slideshow&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22808-improper-neutralization-of-input-du-21532de3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22808%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Surbma%20Surbma%20%7C%20Premium%20WP&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22809-improper-neutralization-of-input-du-ea445604</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22809%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theme%20funda%20PDF%20Catalog%20Woocommerce&amp;severity=null&amp;id=69cd7610e6bfc5ba1df09402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22810-improper-neutralization-of-input-du-907ea4e5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22810%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phi%20Phan%20Content%20Blocks%20Builder&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22811-improper-neutralization-of-input-du-8e6e9ee4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22811%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cristian%20Stan%20MT%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22812-improper-neutralization-of-input-du-584d7ce3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aezaz%20Shaikh%20News%20Ticker%20Widget%20for%20Elementor&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0944d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22813-improper-neutralization-of-input-du-6ddce914</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22813%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuantumCloud%20Conversational%20Forms%20for%20ChatBot&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22814-cross-site-request-forgery-csrf-in--2cf46d33</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22814%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dylan%20James%20Zephyr%20Admin%20Theme&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0945e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22815-improper-neutralization-of-input-du-9b522a76</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22815%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Button%20Block&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22817-improper-neutralization-of-input-du-7f6889fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22817%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Venutius%20BP%20Profile%20Shortcodes%20Extra&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0946e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22818-improper-neutralization-of-input-du-bce22563</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22818%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20S3Bubble%20S3Player%20%E2%80%93%20WooCommerce%20%26%20Elementor%20Integration&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22819-improper-neutralization-of-input-du-4e649f5e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22819%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Roberto%20Bottalico%20Qr%20Code%20and%20Barcode%20Scanner%20Reader&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22820-improper-neutralization-of-input-du-52b359b9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22820%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goldsounds%20VR%20Views&amp;severity=null&amp;id=69cd7613e6bfc5ba1df094f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22821-improper-neutralization-of-input-du-cfc787e0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22821%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vfthemes%20StorePress&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22822-improper-neutralization-of-input-du-387145de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22822%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bishawjit-das%20wp%20custom%20countdown&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22823-improper-neutralization-of-input-du-407b3e32</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22823%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jtwerdy%20Genesis%20Style%20Shortcodes&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0950a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22824-improper-neutralization-of-input-du-fb1a12c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22824%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lucia.intelisano%20Live%20Flight%20Radar&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0950d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22826-improper-neutralization-of-input-du-96188377</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22826%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpecommerce%20Sell%20Digital%20Downloads&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22827-improper-neutralization-of-input-du-6cf46c61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22827%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joomag%20WP%20Joomag&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10106-cwe-120-in-silabscom-ember-znet-sdk-21a2c58b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10106%3A%20cwe-120%20in%20silabs.com%20Ember%20ZNet%20SDK&amp;severity=low&amp;id=69e135ad82d89c981fbaa763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6155-cwe-862-missing-authorization-in-wps-099d4733</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6155%3A%20CWE-862%20Missing%20Authorization%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=699f6bfcb7ef31ef0b55d549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12514-cwe-79-improper-neutralization-of-i-4dfbb9d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12514%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%203dvieweronline%203D%20Viewer%20Online&amp;severity=medium&amp;id=69d737011cc7ad14da419478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12394-cwe-352-cross-site-request-forgery--b4dfa5db</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12394%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20concertedaction%20Action%20Network&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11642-cwe-22-improper-limitation-of-a-pat-fe6fd3ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11642%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mdshuvo%20Post%20Grid%20Master%20%E2%80%94%20Post%20Grids%20%26%20AJAX%20Filters&amp;severity=critical&amp;id=699f6e18b7ef31ef0b595156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12616-cwe-862-missing-authorization-in-bi-b596146a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12616%3A%20CWE-862%20Missing%20Authorization%20in%20bitlydeveloper%20Bitly&apos;s%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12491-cwe-79-improper-neutralization-of-i-d970b4f4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12491%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reichertbrothers%20SimplyRETS%20Real%20Estate%20IDX&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12515-cwe-79-improper-neutralization-of-i-2a36e5b0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12515%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20masjidal%20Muslim%20Prayer%20Time-Salah%2FIqamah&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12848-cwe-862-missing-authorization-in-so-6fa5cf32</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12848%3A%20CWE-862%20Missing%20Authorization%20in%20sonalsinha21%20SKT%20Page%20Builder&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11686-cwe-79-improper-neutralization-of-i-daf4cdbc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11686%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manycontacts%20WhatsApp%20%F0%9F%9A%80%20click%20to%20chat&amp;severity=medium&amp;id=699f6e19b7ef31ef0b59524e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11815-cwe-79-improper-neutralization-of-i-a7cefdfb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posturinn%20P%C3%B3sturinn%5C&apos;s%20Shipping%20with%20WooCommerce&amp;severity=medium&amp;id=699f6e22b7ef31ef0b59674d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11907-cwe-79-improper-neutralization-of-i-27b54089</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11907%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skyword%20Skyword%20XMLRPC%20publishing&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12621-cwe-79-improper-neutralization-of-i-79d3e5de</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12621%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yumpu%20Yumpu%20E-Paper%20publishing&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11328-cwe-79-improper-neutralization-of-i-efadc593</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11328%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cluevo%20CLUEVO%20LMS%2C%20E-Learning%20Platform&amp;severity=medium&amp;id=699f6e0db7ef31ef0b5944f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12218-cwe-352-cross-site-request-forgery--5c18ddfa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12218%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20phoeniixx%20Woocommerce%20check%20pincode%2Fzipcode%20for%20shipping&amp;severity=medium&amp;id=699f6e32b7ef31ef0b59798b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11929-cwe-862-missing-authorization-in-mp-f30bdd93</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11929%3A%20CWE-862%20Missing%20Authorization%20in%20mpc%20Responsive%20FlipBook%20Plugin%20Wordpress&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12605-cwe-352-cross-site-request-forgery--35880256</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12605%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20opacewebdesign%20Opace%20AI%20Scribe%3A%20SEO%20Content%20Creator%20%26%20Humaizer%20for%20OpenAI%20%26%20Anthropic&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12067-cwe-89-improper-neutralization-of-s-4524c693</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12067%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wptravel%20WP%20Travel%20%E2%80%93%20Ultimate%20Travel%20Booking%20System%2C%20Tour%20Management%20Engine&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12206-cwe-352-cross-site-request-forgery--0a8c6921</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12206%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stylemix%20Pearl%20%E2%80%93%20Header%20Builder&amp;severity=medium&amp;id=699f6e31b7ef31ef0b59784c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5769-cwe-862-missing-authorization-in-sur-2a766ea3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5769%3A%20CWE-862%20Missing%20Authorization%20in%20surakrai%20MIMO%20Woocommerce%20Order%20Tracking&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55cda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12285-cwe-79-improper-neutralization-of-i-dd2353ff</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12285%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ssema%20SEMA%20API&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12330-cwe-530-exposure-of-backup-file-to--07edd1a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12330%3A%20CWE-530%20Exposure%20of%20Backup%20File%20to%20an%20Unauthorized%20Control%20Sphere%20in%20databasebackup%20WP%20Database%20Backup%20%E2%80%93%20Unlimited%20Database%20%26%20Files%20Backup%20by%20Backup%20for%20WP&amp;severity=high&amp;id=699f6e37b7ef31ef0b597ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12222-cwe-79-improper-neutralization-of-i-bc04819e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12222%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amitrotem%20Deliver%20via%20Shipos%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e32b7ef31ef0b5979a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12249-cwe-862-missing-authorization-in-sa-eb5a60b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12249%3A%20CWE-862%20Missing%20Authorization%20in%20samdani%20GS%20Insever%20Portfolio&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12496-cwe-79-improper-neutralization-of-i-ffa4751e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linearoy%20Linear&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12493-cwe-79-improper-neutralization-of-i-49a0ed91</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12493%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blueberryacc%20Files%20Download%20Delay&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12122-cwe-79-improper-neutralization-of-i-d6a4e912</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12122%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20web-mv%20ResAds&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b59758d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13153-cwe-79-improper-neutralization-of-i-b8b4e8a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13153%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=699f6e4db7ef31ef0b59c8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53706-cwe-269-improper-privilege-manageme-c1595b8c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53706%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=69a0a44985912abc71d64ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53704-cwe-287-improper-authentication-in--7234e0cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53704%3A%20CWE-287%20Improper%20Authentication%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=68f7d9b6247d717aace26c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0306-covert-timing-channel-aec585</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0306%3A%20Covert%20Timing%20Channel&amp;severity=high&amp;id=682cd0fb1484d88663aec585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56827-heap-based-buffer-overflow-bd66f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56827%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=682d9816c4522896dcbd66f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56826-heap-based-buffer-overflow-bd66ec</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56826%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=682d9816c4522896dcbd66ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28362-vulnerability-in-rails-action-pack-beb7b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28362%3A%20Vulnerability%20in%20Rails%20Action%20Pack&amp;severity=medium&amp;id=682d9837c4522896dcbeb7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27980-vulnerability-in-nodejs-node-bed5e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27980%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37372-vulnerability-in-nodejs-node-beb7bb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37372%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=low&amp;id=682d9837c4522896dcbeb7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46464-na-ccb97b4e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46464%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfeb7ef31ef0b56ac77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42898-na-2ad73764</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42898%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b56945d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56377-cwe-79-improper-neutralization-of-i-c10d4f4f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56377%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vanderbilt%20REDCap&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56376-cwe-79-improper-neutralization-of-i-eab45aa6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vanderbilt%20REDCap&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56114-na-01dfdd35</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56114%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55494-na-2a51c8b5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55494%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd0b7ef31ef0b55b207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55226-na-b3be98c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55226%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55b087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55225-na-6b433551</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55225%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55224-na-4ae15649</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55224%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54887-na-f6fe3876</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54887%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc8b7ef31ef0b55ae4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54762-na-7117b1bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54762%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55adb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54761-na-2cec1df2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54761%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55ad68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54724-na-97aaa822</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54724%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55ad50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51229-na-bb4705c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51229%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b55895c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48806-na-ab97d0e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48806%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7bb7ef31ef0b555cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-09-2e1a2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-09&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e1a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-09-f12208</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f12208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0283-cwe-121-stack-based-buffer-overflow--2eb44d50</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0283%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=69a0a44985912abc71d64aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56787-vulnerability-in-linux-linux-bde82f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56786-vulnerability-in-linux-linux-aec088</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56785-vulnerability-in-linux-linux-bde827</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56784-vulnerability-in-linux-linux-bde823</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56783-vulnerability-in-linux-linux-bdd19e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56782-vulnerability-in-linux-linux-bde81f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56781-vulnerability-in-linux-linux-bde81b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56781&amp;severity=null&amp;id=682d9822c4522896dcbde81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56780-vulnerability-in-linux-linux-bdd19a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56779-vulnerability-in-linux-linux-bde819</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56778-vulnerability-in-linux-linux-bde7e4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56777-vulnerability-in-linux-linux-bde7dc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56776-vulnerability-in-linux-linux-bde7d4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde7d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56775-vulnerability-in-linux-linux-bde7ce</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56774-vulnerability-in-linux-linux-bde7bd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56773-vulnerability-in-linux-linux-bde7b7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56772-vulnerability-in-linux-linux-bde7b3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56771-vulnerability-in-linux-linux-bde7af</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56770-vulnerability-in-linux-linux-bde7ab</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12337-cwe-79-improper-neutralization-of-i-d1aaf22f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12337%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webwirkung%20Shipping%20via%20Planzer%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11830-cwe-79-improper-neutralization-of-i-3e0c0186</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dearhive%20Dear%20Flipbook%20%E2%80%93%20PDF%20Flipbook%2C%203D%20Flipbook%2C%20PDF%20embed%2C%20PDF%20viewer&amp;severity=medium&amp;id=699f6e22b7ef31ef0b59681a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11423-cwe-862-missing-authorization-in-wp-c54f8b1c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11423%3A%20CWE-862%20Missing%20Authorization%20in%20WP%20Swings%20Gift%20Cards%20for%20WooCommerce%20Pro&amp;severity=high&amp;id=699f6e13b7ef31ef0b594c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12853-cwe-434-unrestricted-upload-of-file-b5138f50</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12853%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12854-cwe-434-unrestricted-upload-of-file-897329d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12854%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ggnomes%20Garden%20Gnome%20Package&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12712-cwe-862-missing-authorization-in-le-4dc18ef4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12712%3A%20CWE-862%20Missing%20Authorization%20in%20levelfourstorefront%20Shopping%20Cart%20%26%20eCommerce%20Store&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12855-cwe-862-missing-authorization-in-sc-e0dce5f9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12855%3A%20CWE-862%20Missing%20Authorization%20in%20scriptsbundle%20AdForest&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11939-cwe-89-improper-neutralization-of-s-21eb9b01</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11939%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20StylemixThemes%20Cost%20Calculator%20Builder%20PRO&amp;severity=high&amp;id=699f6e28b7ef31ef0b596efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9939-cwe-22-improper-limitation-of-a-path-c72f55f2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9939%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nickboss%20Iptanus%20File%20Upload&amp;severity=high&amp;id=699f6b65b7ef31ef0b554f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11350-cwe-640-weak-password-recovery-mech-5a6a2ddb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11350%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=699f6e0fb7ef31ef0b5946da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12328-cwe-79-improper-neutralization-of-i-9c808bf7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12328%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20madrasthemes%20MAS%20Elementor&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11635-cwe-94-improper-control-of-generati-add3dfa7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11635%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nickboss%20Iptanus%20File%20Upload&amp;severity=critical&amp;id=699f6e18b7ef31ef0b59514a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12045-cwe-79-improper-neutralization-of-i-4d3e0ac3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12584-cwe-200-exposure-of-sensitive-infor-79a33f35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12584%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12852-cwe-79-improper-neutralization-of-i-d05d4b66</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12851-cwe-79-improper-neutralization-of-i-2a7671e4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11613-cwe-94-improper-control-of-generati-f4e6607a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11613%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nickboss%20Iptanus%20File%20Upload&amp;severity=critical&amp;id=699f6e18b7ef31ef0b595145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10585-cwe-22-improper-limitation-of-a-pat-0797b331</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10585%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20revmakx%20InfiniteWP%20Client&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11270-cwe-862-missing-authorization-in-wp-d72c6e89</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11270%3A%20CWE-862%20Missing%20Authorization%20in%20wpwebinarsystem%20WebinarPress%20%E2%80%93%20Webinar%20System%20for%20WordPress&amp;severity=high&amp;id=699f6e0ab7ef31ef0b5941db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12030-cwe-89-improper-neutralization-of-s-07a12f45</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12030%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20realmag777%20MDTF%20%E2%80%93%20Meta%20Data%20and%20Taxonomies%20Filter&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11271-cwe-862-missing-authorization-in-wp-3ca4b8a8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11271%3A%20CWE-862%20Missing%20Authorization%20in%20wpwebinarsystem%20WebinarPress%20%E2%80%93%20Webinar%20System%20for%20WordPress&amp;severity=high&amp;id=699f6e0ab7ef31ef0b5941df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12205-cwe-79-improper-neutralization-of-i-9e1d42a0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12205%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesflat%20Themesflat%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6e31b7ef31ef0b597848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11816-cwe-862-missing-authorization-in-wp-9ebd3348</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11816%3A%20CWE-862%20Missing%20Authorization%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=699f6e22b7ef31ef0b596751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12112-cwe-79-improper-neutralization-of-i-39b959c4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hassantafreshi%20Easy%20Form%20Builder%20by%20WhiteStudio%20%E2%80%94%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11916-cwe-862-missing-authorization-in-wp-66b39aba</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11916%3A%20CWE-862%20Missing%20Authorization%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=699f6e27b7ef31ef0b596dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12713-cwe-862-missing-authorization-in-br-4e6de07c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12713%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12521-cwe-79-improper-neutralization-of-i-6ed16e7a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teonos%20Slotti%20Ajanvaraus&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55517-na-6c04716c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55517%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd0b7ef31ef0b55b26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55459-na-6c14f0cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55459%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54818-na-b763b2c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54818%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc6b7ef31ef0b55add1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54731-cwe-674-uncontrolled-recursion-in-c-3fe071d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54731%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Coherent%20Graphics%20CPDF&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55ad54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51442-na-93978b83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51442%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb3b7ef31ef0b55a337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50603-cwe-78-improper-neutralization-of-s-2f9040f9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50603%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Aviatrix%20Controller&amp;severity=critical&amp;id=68f7d9b5247d717aace26bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-08-2e1300</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-08&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e1300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-08-f12660</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0218-generation-of-predictable-numbers-or-191828b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0218%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20pgAgent&amp;severity=medium&amp;id=6908ed741c2a0078ae51027a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22306-insertion-of-sensitive-information--6171eb0e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22306%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0811a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22363-missing-authorization-in-hermann-la-a8cf86e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22363%3A%20Missing%20Authorization%20in%20Hermann%20LAHAMI%20Allada%20T-shirt%20Designer%20for%20Woocommerce&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df0847d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22296-improper-neutralization-of-input-du-5520f7fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Hash%20Elements&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df0806b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12429-cwe-22-improper-limitation-of-a-pat-1eb6b66a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12429%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ABB%20AC500%20V3&amp;severity=medium&amp;id=69092616fe7723195e0b35ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22500-improper-neutralization-of-input-du-41934c54</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ali%20Ali%20Alpha%20Price%20Table%20For%20Elementor&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56270-missing-authorization-in-securesubm-a8feed1b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56270%3A%20Missing%20Authorization%20in%20SecureSubmit%20WP%20SecureSubmit&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56272-missing-authorization-in-themesuppo-1137554f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56272%3A%20Missing%20Authorization%20in%20ThemeSupport%20Hide%20Category%20by%20User%20Role%20for%20WooCommerce&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12430-cwe-280-improper-handling-of-insuff-1f1eb96d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12430%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20ABB%20AC500%20V3&amp;severity=high&amp;id=69092618fe7723195e0b379a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0247-vulnerability-in-mozilla-firefox-311fd085</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0247%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69dd057382d89c981f016f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0243-memory-safety-bugs-fixed-in-firefox--bb30292e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0243%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e8309a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0242-memory-safety-bugs-fixed-in-firefox--937a6165</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0242%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e8309a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0241-memory-corruption-when-using-javascr-1d33d5ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0241%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6909325c35043901e8309a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0240-compartment-mismatch-when-parsing-ja-a2574750</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0240%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e8309a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0239-alt-svc-alpn-validation-failure-when-e6a987f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0239%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e83099ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0238-use-after-free-when-breaking-lines-i-69ef2ab0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0238%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e83099f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0237-webchannel-apis-susceptible-to-confu-74fe341e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0237%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e83099ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0246-vulnerability-in-mozilla-firefox-41fc406d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0246%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69dd057382d89c981f016f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0245-vulnerability-in-mozilla-firefox-038303f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0245%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=low&amp;id=69dd057382d89c981f016f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0244-vulnerability-in-mozilla-firefox-4a522924</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0244%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69dd057082d89c981f016da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0297-sql-injection-in-code-projects-onlin-c8729c48</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0297%3A%20SQL%20Injection%20in%20code-projects%20Online%20Book%20Shop&amp;severity=medium&amp;id=68ae166dad5a09ad005b4cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56056-improper-neutralization-of-input-du-87eb346b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56056%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kmfoysal06%20SimpleCharm&amp;severity=high&amp;id=69cd75bfe6bfc5ba1df07327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22294-improper-neutralization-of-input-du-5f23b535</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22294%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theme%20funda%20Custom%20Field%20For%20WP%20Job%20Manager&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22335-improper-neutralization-of-input-du-20a66d84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22335%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rajib.dewan%20Opencart%20Product%20in%20WP&amp;severity=null&amp;id=69cd75dce6bfc5ba1df0823b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22338-improper-neutralization-of-input-du-6329121c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22338%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lich_wang%20WP-tagMaker&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22502-improper-neutralization-of-special--096eb7d6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22502%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mindvalley%20MindValley%20Super%20PageMash&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22503-cross-site-request-forgery-csrf-in--4285e91b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22503%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digitalzoomstudio%20Admin%20debug%20wordpress%20%E2%80%93%20enable%20debug&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22507-improper-neutralization-of-special--6565d8e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22507%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iDo8p%20WPMU%20Prefill%20Post&amp;severity=null&amp;id=69cd75ede6bfc5ba1df08667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22511-improper-neutralization-of-input-du-55638941</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22511%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ella%20Van%20Durpe%20Slides%20%26%20Presentations&amp;severity=null&amp;id=69cd75ede6bfc5ba1df08670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22512-missing-authorization-in-boldgrid-h-d6a82563</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22512%3A%20Missing%20Authorization%20in%20BoldGrid%20Help%20Scout&amp;severity=null&amp;id=69cd75ede6bfc5ba1df08673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22515-improper-neutralization-of-input-du-76c5fe98</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simon%20Show%20Google%20Analytics%20widget&amp;severity=null&amp;id=69cd75ede6bfc5ba1df0867c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22516-improper-neutralization-of-input-du-64aaafda</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hpinfosys%20Metadata%20SEO&amp;severity=null&amp;id=69cd75ede6bfc5ba1df0867f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22517-improper-neutralization-of-input-du-a42a829c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ben%20Huson%20List%20Pages%20at%20Depth&amp;severity=null&amp;id=69cd75eee6bfc5ba1df086b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22518-improper-neutralization-of-input-du-65df3ea8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsPoint%20Justified%20Image%20Gallery&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22519-improper-neutralization-of-special--d7b8bc1d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22519%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jerodmoore%20eDoc%20Easy%20Tables&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22520-cross-site-request-forgery-csrf-in--6f898a2d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22520%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tock%20Tock%20Widget&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22522-improper-neutralization-of-input-du-bb3d5e77</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22522%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roya%20khosravi%20SingSong&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22524-improper-neutralization-of-input-du-1b968038</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22525-improper-neutralization-of-input-du-2c982a5d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bharat%20Kambariya%20Donation%20Block%20For%20PayPal&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22528-improper-neutralization-of-input-du-d529bcde</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Huurkalender.nl%20Huurkalender%20WP&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22529-improper-neutralization-of-input-du-7791e839</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordpresteem%20WE%20Blocks&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22530-improper-neutralization-of-input-du-346483b4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22530%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22531-cwe-79-improper-neutralization-of-i-e02cdb07</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22531%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M%20Bilal%20M%20Urdu%20Formatter%20%E2%80%93%20Shamil&amp;severity=medium&amp;id=68ae12eaad5a09ad005b31b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22532-cwe-79-improper-neutralization-of-i-aeae0c6a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snagysandor%20Simple%20Photo%20Sphere&amp;severity=null&amp;id=68ae0f66ad5a09ad005b18bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22533-improper-neutralization-of-special--90f85b2a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22533%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bulktheme%20WOOEXIM&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22534-missing-authorization-in-ella-van-d-c3f19ca4</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22534%3A%20Missing%20Authorization%20in%20Ella%20Van%20Durpe%20Slides%20%26%20Presentations&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22536-improper-neutralization-of-special--55ac1806</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22536%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hiren.sabd%20WP%20Music%20Player&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22538-cross-site-request-forgery-csrf-in--6416a9cc</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22538%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ofek%20Nakar%20Virtual%20Bot&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22541-missing-authorization-in-etruel-wp--2f5d6f0a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22541%3A%20Missing%20Authorization%20in%20etruel%20WP%20Delete%20Post%20Copies&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22543-missing-authorization-in-beautifult-3a1c58d0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22543%3A%20Missing%20Authorization%20in%20beautifultemplates%20ST%20Gallery%20WP&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df0880b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22544-improper-neutralization-of-input-du-05ae12ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mind%20Doodle%20Mind%20Doodle%20Visual%20Sitemaps%20%26%20Tasks&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df0880e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22545-improper-neutralization-of-input-du-314027d5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sw.galati%20iframe%20to%20embed&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22546-improper-neutralization-of-input-du-c4c9f8ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22546%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Obaid%20Hossain%20jQuery%20TwentyTwenty&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22547-improper-neutralization-of-input-du-374b16c5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jaykrishnang%20JK%20Html%20To%20Pdf&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22548-improper-neutralization-of-input-du-1c2783ae</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frankkoenen%20ldap_login_password_and_role_manager&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df0881a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22549-improper-neutralization-of-input-du-39d3843a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seinoxygen%20WP%20Github&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df0881d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22550-improper-neutralization-of-input-du-8b2cf590</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Rhoney%20AddFunc%20Mobile%20Detect&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22551-improper-neutralization-of-input-du-a44b9c97</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20albedo0%20Boot-Modal&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22552-cross-site-request-forgery-csrf-in--151890cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22552%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bnielsen%20Affiliate%20Disclosure%20Statement&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22554-improper-neutralization-of-input-du-1dac4148</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fdfranklin06%20Video%20Embed%20Optimizer&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22555-cross-site-request-forgery-csrf-in--a9209259</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22555%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20njshofe%20Smoothness%20Slider%20Shortcode&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22556-cross-site-request-forgery-csrf-in--b1260ce1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22556%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20CMS%20Ninja%20Norse%20Rune%20Oracle%20Plugin&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df088bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22557-cross-site-request-forgery-csrf-in--16d606cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22557%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cdowp%20News%20Publisher%20Autopilot&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df088c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22558-improper-neutralization-of-input-du-d754273b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marcus%20C.%20J.%20Hartmann%20mcjh%20button%20shortcode&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df088c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22559-cross-site-request-forgery-csrf-in--6c2e8324</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22559%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tubepress%20TubePress.NET&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df08923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22560-missing-authorization-in-saoshyant1-af311859</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22560%3A%20Missing%20Authorization%20in%20saoshyant1994%20Saoshyant%20Page%20Builder&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df0893b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22562-cross-site-request-forgery-csrf-in--e34eb96d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22562%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kbowson%20Title%20Experiments%20Free&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df08942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22563-cross-site-request-forgery-csrf-in--6138079b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22563%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20faaiq%20Pretty%20Url&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df08945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22572-improper-neutralization-of-input-du-6695a5f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22572%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brian%20Legacy%20ePlayer&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22573-improper-neutralization-of-input-du-2a4cea8e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20copist%20Icons%20Enricher&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22574-improper-neutralization-of-input-du-945e705d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cleanshooter%20ICS%20Button&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22577-improper-neutralization-of-input-du-2bf5f345</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22577%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Damion%20Armentrout%20Able%20Player&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22578-improper-neutralization-of-input-du-ea147d57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aazztech%20WP%20Cookie&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22579-improper-neutralization-of-input-du-4a99a8ae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arefly%20WP%20Header%20Notification&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22580-improper-neutralization-of-input-du-eeb7462d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22580%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Auto%20IT%20Biltorvet%20Dealer%20Tools&amp;severity=null&amp;id=69cd75f8e6bfc5ba1df08a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22581-improper-neutralization-of-input-du-e3189c7b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bytephp%20Arcade%20Ready&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22582-cross-site-request-forgery-csrf-in--12b7211b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22582%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Scott%20Nelle%20Uptime%20Robot&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22584-improper-neutralization-of-input-du-5c4cdd5d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsPoint%20Timeline%20Pro&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22585-improper-neutralization-of-input-du-3792a4da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20Ultimate%20Image%20Hover%20Effects&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22589-cross-site-request-forgery-csrf-in--8ae79519</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22589%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bozdoz%20Quote%20Tweet&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22590-cross-site-request-forgery-csrf-in--651ffddb</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22590%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mmrs151%20Prayer%20Times%20Anywhere&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22591-missing-authorization-in-8blocks-10-b8517a49</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22591%3A%20Missing%20Authorization%20in%208blocks%201003%20Mortgage%20Application&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22592-missing-authorization-in-8blocks-10-cbecc5a9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22592%3A%20Missing%20Authorization%20in%208blocks%201003%20Mortgage%20Application&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22593-improper-neutralization-of-input-du-2e139a98</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20burria%20Laika%20Pedigree%20Tree&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0296-sql-injection-in-code-projects-onlin-c39ccc5e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0296%3A%20SQL%20Injection%20in%20code-projects%20Online%20Book%20Shop&amp;severity=medium&amp;id=68ae04daad5a09ad005ad9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0295-cross-site-scripting-in-code-project-09f7b4f1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0295%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Book%20Shop&amp;severity=medium&amp;id=68ae04daad5a09ad005ad9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12131-cwe-639-authorization-bypass-throug-aee26c3a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12131%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b5975a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12738-cwe-79-improper-neutralization-of-i-f8dbe51e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12738%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12426-cwe-200-exposure-of-sensitive-infor-3c7b067d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12426%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=medium&amp;id=69092147fe7723195e054085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12425-cwe-22-improper-limitation-of-a-pat-1652123b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12425%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=low&amp;id=69092147fe7723195e054081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11826-cwe-79-improper-neutralization-of-i-0c7da600</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdmag%20Quill%20Forms%20%7C%20Conversational%20Multi%20Step%20Forms%2C%20Surveys%20%26%20quizzes&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12711-cwe-862-missing-authorization-in-wp-12e3e7bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12711%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20RSVP%20and%20Event%20Management&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12532-cwe-200-exposure-of-sensitive-infor-6e532297</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12532%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bestwpdeveloper%20BWD%20Elementor%20Addons&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12033-cwe-862-missing-authorization-in-ar-4c13dd4f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12033%3A%20CWE-862%20Missing%20Authorization%20in%20artbees%20Jupiter%20X%20Core&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12316-cwe-862-missing-authorization-in-ar-e825e932</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12316%3A%20CWE-862%20Missing%20Authorization%20in%20artbees%20Jupiter%20X%20Core&amp;severity=medium&amp;id=699f6e36b7ef31ef0b597dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43243-unrestricted-upload-of-file-with-da-32862c86</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43243%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeglow%20JobBoard%20Job%20listing&amp;severity=null&amp;id=69cd746de6bfc5ba1def77fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49222-deserialization-of-untrusted-data-i-2bf2e105</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49222%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=null&amp;id=69cd74aee6bfc5ba1def8707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49249-path-traversal-in-smsa-express-smsa-cf1c09ac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49249%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20SMSA%20Express%20SMSA%20Shipping&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def882a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49294-cross-site-request-forgery-csrf-in--dc0426b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49294%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20magepeopleteam%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49633-improper-neutralization-of-input-du-85196db3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49633%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Designinvento%20DirectoryPress&amp;severity=null&amp;id=69cd74dce6bfc5ba1df01425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49644-incorrect-privilege-assignment-in-a-c4772636</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49644%3A%20Incorrect%20Privilege%20Assignment%20in%20AllAccessible%20Accessibility%20by%20AllAccessible&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49649-improper-control-of-filename-for-in-37232787</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49649%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hakeemnala%20Build%20App%20Online&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51651-missing-authorization-in-imran-tauq-c5f28822</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51651%3A%20Missing%20Authorization%20in%20Imran%20Tauqeer%20CubeWP%20Forms&amp;severity=null&amp;id=69cd750fe6bfc5ba1df02855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51700-improper-neutralization-of-input-du-80fb7949</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51700%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eutrue%20NAVER%20Analytics&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56271-missing-authorization-in-securesubm-3e8734c6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56271%3A%20Missing%20Authorization%20in%20SecureSubmit%20WP%20SecureSubmit&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56273-missing-authorization-in-wpvividplu-f3b619aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56273%3A%20Missing%20Authorization%20in%20wpvividplugins%20WPvivid%20Backup%20and%20Migration&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56274-improper-neutralization-of-input-du-743f8e10</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56274%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Astra%20Widgets&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56276-missing-authorization-in-syed-balkh-1052da4b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56276%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56278-improper-control-of-generation-of-c-c31261d8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56278%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Smackcoders%20Inc.%2C%20WP%20Ultimate%20Exporter&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56279-server-side-request-forgery-ssrf-in-9c5202a6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56279%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mra13%20Compact%20WP%20Audio%20Player&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56280-incorrect-privilege-assignment-in-a-eb021c45</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56280%3A%20Incorrect%20Privilege%20Assignment%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56281-improper-control-of-filename-for-in-c77f2c91</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56281%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56282-improper-control-of-filename-for-in-1564c2d7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56282%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elicus%20WPMozo%20Addons%20Lite%20for%20Elementor&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56283-deserialization-of-untrusted-data-i-b75391d3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56283%3A%20Deserialization%20of%20Untrusted%20Data%20in%20plainware%20Locatoraid%20Store%20Locator&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56284-improper-neutralization-of-special--453471cf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56284%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sslplugins%20SSL%20Wireless%20SMS%20Notification&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56285-improper-neutralization-of-input-du-8cde37ac</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56285%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56286-improper-limitation-of-a-pathname-t-59156aa5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56286%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webcodingplace%20Classic%20Addons%20%E2%80%93%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56287-improper-neutralization-of-input-du-8b3ab55e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56287%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AppJetty%20WP%20jQuery%20DataTable&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56288-improper-neutralization-of-input-du-cf226aac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56288%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fahad%20Mahmood%20WP%20Docs&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56289-improper-neutralization-of-input-du-d46e6909</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56290-improper-neutralization-of-special--cdec7389</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56290%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20silverplugins217%20Multiple%20Shipping%20And%20Billing%20Address%20For%20Woocommerce&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56291-deserialization-of-untrusted-data-i-e85f8698</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56291%3A%20Deserialization%20of%20Untrusted%20Data%20in%20plainware%20PlainInventory&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56292-improper-neutralization-of-input-du-53efcdc6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Email%20Reminders&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56293-improper-neutralization-of-input-du-bb29c9d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56293%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nasir%20Ahmed%20Advanced%20Form%20Integration&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56294-missing-authorization-in-posimyth-n-17483f88</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56294%3A%20Missing%20Authorization%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56296-improper-neutralization-of-input-du-b1f9b786</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kitae%20Park%20Mang%20Board%20WP&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56297-improper-neutralization-of-input-du-ae8ca13c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56297%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuantumCloud%20Highlight&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56298-improper-neutralization-of-input-du-094f7d24</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56298%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rob%20%40%205%20Star%20Plugins%20Pretty%20Simple%20Popup%20Builder&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56299-improper-neutralization-of-input-du-61167c58</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56299%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pektsekye%20Notify%20Odoo&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56300-insertion-of-sensitive-information--02709339</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56300%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20wpspin%20Post%2FPage%20Copying%20Tool&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22261-improper-neutralization-of-input-du-23493abb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22261%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marcus%20(aka%20%40msykes)%20WP%20FullCalendar&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22297-cross-site-request-forgery-csrf-in--fb939837</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22297%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aipost%20AI%20WP%20Writer&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df0806e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22299-missing-authorization-in-space-code-157a0089</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22299%3A%20Missing%20Authorization%20in%20Space%20Codes%20AI%20for%20SEO&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df08071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22300-cross-site-request-forgery-csrf-in--e49498a3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22300%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PixelYourSite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df08074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22301-cross-site-request-forgery-csrf-in--94c8fee4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22301%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zookatron%20MyBookTable%20Bookstore&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df08077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22302-missing-authorization-in-wp-grids-w-8fa72136</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22302%3A%20Missing%20Authorization%20in%20WP%20Grids%20WP%20Wand&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df0807a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22303-insertion-of-sensitive-information--e81a52be</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22303%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df0807d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22304-missing-authorization-in-osamaesh-w-29a88f96</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22304%3A%20Missing%20Authorization%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df08080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22305-improper-control-of-filename-for-in-0f23091e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22305%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Essential%20Plugin%20Hero%20Banner%20Ultimate&amp;severity=null&amp;id=69cd75d8e6bfc5ba1df08106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22308-improper-neutralization-of-input-du-04128b3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22308%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Takashi%20Kitajima%20Smart%20Custom%20Fields&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df08121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22309-improper-neutralization-of-input-du-7659cc6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22309%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RopeSwingHld%20SpeakOut!%20Email%20Petitions&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0812a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22310-improper-neutralization-of-input-du-249c7e68</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22310%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marsian%20TemplatesNext%20ToolKit&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0812f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22312-improper-neutralization-of-input-du-a92ae576</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22312%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20Thim%20Elementor%20Kit&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df08136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22315-improper-neutralization-of-input-du-036c65df</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22315%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Typing%20Text&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0813f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22316-improper-neutralization-of-input-du-c8989610</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd75dae6bfc5ba1df08191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22321-improper-neutralization-of-input-du-ef97f23b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22321%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TheInnovs%20ElementsCSS%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd75dae6bfc5ba1df0819a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22323-improper-neutralization-of-input-du-61b43138</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Image%20Hover%20Effects%20for%20Elementor&amp;severity=null&amp;id=69cd75dae6bfc5ba1df081a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22324-improper-neutralization-of-input-du-fca27f60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andon%20Ivanov%20OZ%20Canonical&amp;severity=null&amp;id=69cd75dae6bfc5ba1df081a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22325-cross-site-request-forgery-csrf-in--8bf7f946</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22325%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nchankov%20Autocompleter&amp;severity=null&amp;id=69cd75dae6bfc5ba1df081a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22327-improper-neutralization-of-input-du-876620bc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22327%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Olaf%20Lederer%20EO4WP&amp;severity=null&amp;id=69cd75dae6bfc5ba1df081aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22328-cross-site-request-forgery-csrf-in--0dd6dee1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22328%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Elevio%20by%20Dixa%20Elevio&amp;severity=null&amp;id=69cd75dce6bfc5ba1df0820a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22333-improper-neutralization-of-input-du-fa199b57</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22336-cross-site-request-forgery-csrf-in--6ecb4e69</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22336%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Amos%20Lee%EF%BC%88%E4%B8%80%E5%88%80%EF%BC%89%20Wizhi%20Multi%20Filters%20by%20Wenprise&amp;severity=null&amp;id=69cd75dce6bfc5ba1df0823e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22339-improper-neutralization-of-input-du-09c4ac9d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22339%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20athemeart%20Store%20Commerce&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22342-cross-site-request-forgery-csrf-in--b3a0c0da</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jenst%20WP%20Simple%20Sitemap&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22343-cross-site-request-forgery-csrf-in--8b23117c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20koter84%20wpSOL&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22347-cross-site-request-forgery-csrf-in--b107a96b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22347%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bannersky%20BSK%20Forms%20Blacklist&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22348-improper-neutralization-of-special--3a8359c3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22348%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rtowebsites%20DynamicTags&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22349-improper-neutralization-of-special--24e06217</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22349%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Marka%20WordPress%20Auction%20Plugin&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22351-improper-neutralization-of-special--45993bfb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22351%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20penguinarts%20Contact%20Form%207%20Database%20%E2%80%93%20CFDB7&amp;severity=null&amp;id=69cd75e2e6bfc5ba1df08430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22352-improper-neutralization-of-special--0a3334f9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22352%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ELEXtensions%20ELEX%20WooCommerce%20Advanced%20Bulk%20Edit%20Products%2C%20Prices%20%26%20Attributes&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df0843f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22353-improper-neutralization-of-input-du-c49f6af3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bvads%20BVD%20Easy%20Gallery%20Manager&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22355-improper-neutralization-of-input-du-21c3ae03</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20asokaaso2%20Kikx%20Simple%20Post%20Author%20Filter&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22357-improper-neutralization-of-input-du-6906a528</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdever%20Target%20Notifications&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22358-improper-neutralization-of-input-du-70794dc5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simone%20Marcon%20Wp%20advertising%20management&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df0844b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22359-improper-neutralization-of-input-du-d6582361</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22359%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pjfc%20SyncFields&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df0844e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22362-improper-neutralization-of-input-du-bce14325</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Bakovic%20WPAchievements%20Free&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22364-improper-control-of-filename-for-in-a0b20915</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Service%20Shogun%20Ach%20Invoice%20App&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12699-cwe-79-improper-neutralization-of-i-f722e500</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12699%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepoints%20Service%20Box&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12152-cwe-22-improper-limitation-of-a-pat-27868458</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12152%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mulika%20MIPL%20Multistore%20Sync%20for%20WooCommerce.%20Sync%20Products%2C%20Stock%20and%20Orders.&amp;severity=high&amp;id=699f6e30b7ef31ef0b597684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12719-cwe-862-missing-authorization-in-ni-d878ae5c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12719%3A%20CWE-862%20Missing%20Authorization%20in%20nickboss%20Iptanus%20File%20Upload&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12516-cwe-79-improper-neutralization-of-i-189f0812</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12516%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vickydalmia%20Coupon%20Plugin&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12077-cwe-79-improper-neutralization-of-i-2323d5b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12202-cwe-862-missing-authorization-in-ir-6dee5fe5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12202%3A%20CWE-862%20Missing%20Authorization%20in%20IronTemplates%20Croma%20Music&amp;severity=high&amp;id=699f6e31b7ef31ef0b59783b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10866-cwe-862-missing-authorization-in-ak-ad7e32cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10866%3A%20CWE-862%20Missing%20Authorization%20in%20akshay-menariya%20Export%20Import%20Menus&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12437-cwe-79-improper-neutralization-of-i-e2ca752e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lumiblog%20Marketplace%20Items&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12781-cwe-862-missing-authorization-in-la-d389b599</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12781%3A%20CWE-862%20Missing%20Authorization%20in%20Laborator%20Aurum%20-%20WordPress%20%26%20WooCommerce%20Shopping%20Theme&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11764-cwe-79-improper-neutralization-of-i-acfe273f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11764%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20covertcommunication%20Solar%20Wizard%20Lite&amp;severity=medium&amp;id=699f6e1db7ef31ef0b59578c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12499-cwe-79-improper-neutralization-of-i-848c2676</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20biztechc%20WP%20jQuery%20DataTable&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12495-cwe-79-improper-neutralization-of-i-42fc998d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12495%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20virgial%20Bootstrap%20Blocks%20for%20WP%20Editor%20v2&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9354-cwe-79-improper-neutralization-of-in-86bcfef9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9354%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20estatik%20Estatik%20Mortgage%20Calculator&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9502-cwe-79-improper-neutralization-of-in-6db87e07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20For%20Elementor%20%E2%80%93%20Widgets%2C%20Extensions%2C%20Theme%20Builder%2C%20Popup%20Builder%20%26%20Template%20Kits&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b55148e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12624-cwe-79-improper-neutralization-of-i-bf6d9986</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11725-cwe-862-missing-authorization-in-co-ab338277</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11725%3A%20CWE-862%20Missing%20Authorization%20in%20cozyvision1%20SMS%20Alert%20%E2%80%93%20SMS%20%26%20OTP%20for%20WooCommerce%2C%20Order%20Notifications%20%26%20Abandoned%20Cart%20Recovery&amp;severity=high&amp;id=699f6e1bb7ef31ef0b59544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11282-cwe-200-exposure-of-sensitive-infor-512ea3d3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11282%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpchill%20Passster%20%E2%80%93%20Password%20Protect%20Pages%20and%20Content&amp;severity=medium&amp;id=699f6e0bb7ef31ef0b59430b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12384-cwe-79-improper-neutralization-of-i-da8c4519</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20letscms%20Binary%20MLM%20For%20WooCommerce&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11756-cwe-79-improper-neutralization-of-i-247f169a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sweepwidget%20SweepWidget%20%E2%80%93%20Contests%2C%20Giveaways%2C%20Sweepstakes%20%26%20Photo%20Contests&amp;severity=medium&amp;id=699f6e1db7ef31ef0b595777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10536-cwe-862-missing-authorization-in-wp-39b902da</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10536%3A%20CWE-862%20Missing%20Authorization%20in%20wpqode%20FancyPost%20%E2%80%93%20Post%20Blocks%2C%20Grids%20%26%20Sliders%20for%20Block%20Editor%20and%20Elementor&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11887-cwe-79-improper-neutralization-of-i-3c0d40e1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20geotargetly%20Geo%20Content&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12073-cwe-79-improper-neutralization-of-i-e79fd95f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jleuze%20Meteor%20Slides&amp;severity=medium&amp;id=699f6e2db7ef31ef0b59738a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12471-cwe-94-improper-control-of-generati-8d6c34ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12471%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20postsaint%20Post%20Saint%3A%20ChatGPT%2C%20GPT4%2C%20DALL-E%2C%20Stable%20Diffusion%2C%20Pexels%2C%20Dezgo%20AI%20Text%20%26%20Image%20Generator&amp;severity=high&amp;id=699f6e3eb7ef31ef0b59b89a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12633-cwe-79-improper-neutralization-of-i-6867f09f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12633%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beardev%20JoomSport%20%E2%80%93%20for%20Sports%3A%20Team%20%26%20League%2C%20Football%2C%20Hockey%20%26%20more&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12383-cwe-352-cross-site-request-forgery--7e7fe73c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12383%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20letscms%20Binary%20MLM%20For%20WooCommerce&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12438-cwe-79-improper-neutralization-of-i-b6a68e37</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flickrocket%20Digital%20Content%20Delivery%20(incl.%20DRM)%20by%20Flickrocket%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9702-cwe-79-improper-neutralization-of-in-b46287b9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20socialrocket%20Social%20Rocket%20%E2%80%93%20Social%20Sharing%20Plugin&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5548b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12535-cwe-862-missing-authorization-in-ef-b47c3f31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12535%3A%20CWE-862%20Missing%20Authorization%20in%20eflyjason%20Host%20PHP%20Info&amp;severity=high&amp;id=699f6e41b7ef31ef0b59bbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12464-cwe-79-improper-neutralization-of-i-4d248551</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12464%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chatroll%20Chatroll%20Live%20Chat&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12261-cwe-79-improper-neutralization-of-i-e7022c94</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marekzak01%20SmartEmailing&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12439-cwe-79-improper-neutralization-of-i-0428a280</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lumiblog%20Marketplace%20Items&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12849-cwe-22-improper-limitation-of-a-pat-86d1bc7d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12849%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpguruin%20Error%20Log%20Viewer%20By%20WP%20Guru&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11369-cwe-79-improper-neutralization-of-i-fb8a3cdc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rajeshsingh520%20Store%20credit%20%2F%20Gift%20cards%20for%20woocommerce&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9697-cwe-862-missing-authorization-in-soc-01393ce0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9697%3A%20CWE-862%20Missing%20Authorization%20in%20socialrocket%20Social%20Rocket%20%E2%80%93%20Social%20Sharing%20Plugin&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5548a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11749-cwe-79-improper-neutralization-of-i-1a5bf45b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appizy%20App%20Embed&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12324-cwe-79-improper-neutralization-of-i-a86514af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20letscms%20Unilevel%20MLM%20Plan&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12435-cwe-79-improper-neutralization-of-i-45634203</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12435%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20a3rev%20Compare%20Products%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11382-cwe-79-improper-neutralization-of-i-f5572dee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11382%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20commonninja%20Common%20Ninja%3A%20Fully%20Customizable%20%26%20Perfectly%20Responsive%20Free%20Widgets%20for%20WordPress%20Websites&amp;severity=medium&amp;id=699f6e10b7ef31ef0b59492f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12445-cwe-79-improper-neutralization-of-i-cfe9720c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rightmessage%20RightMessage%20WP&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12322-cwe-352-cross-site-request-forgery--7f00832f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12322%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theperfectwedding%20ThePerfectWedding.nl%20Widget&amp;severity=high&amp;id=699f6e36b7ef31ef0b597dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11810-cwe-79-improper-neutralization-of-i-599afcc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paygreen%20PayGreen%20Payment%20Gateway&amp;severity=medium&amp;id=699f6e20b7ef31ef0b59667a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12470-cwe-266-incorrect-privilege-assignm-e0d5406d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12470%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20themesawesome%20School%20Management%20System%20%E2%80%93%20SakolaWP&amp;severity=critical&amp;id=699f6e3eb7ef31ef0b59b7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9208-cwe-79-improper-neutralization-of-in-8b0515e3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20upress%20Enable%20Accessibility&amp;severity=medium&amp;id=699f6b43b7ef31ef0b5509a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12327-cwe-862-missing-authorization-in-pr-df9d2b2c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12327%3A%20CWE-862%20Missing%20Authorization%20in%20proloybhaduri%20LazyLoad%20Background%20Images&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11496-cwe-862-missing-authorization-in-in-9311148a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11496%3A%20CWE-862%20Missing%20Authorization%20in%20infility%20Infility%20Global&amp;severity=medium&amp;id=699f6e18b7ef31ef0b5950de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12159-cwe-200-exposure-of-sensitive-infor-2bd0788f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12159%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20muzaara%20Optimize%20Your%20Campaigns%20%E2%80%93%20Google%20Shopping%20%E2%80%93%20Google%20Ads%20%E2%80%93%20Google%20Adwords&amp;severity=medium&amp;id=699f6e30b7ef31ef0b59769e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12256-cwe-79-improper-neutralization-of-i-069cf482</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12256%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maximize%20Simple%20Video%20Management%20System&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12176-cwe-862-missing-authorization-in-wo-c5bfcded</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12176%3A%20CWE-862%20Missing%20Authorization%20in%20wordlift%20WordLift%20%E2%80%93%20AI%20powered%20SEO%20%E2%80%93%20Schema&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12332-cwe-89-improper-neutralization-of-s-06737eee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12332%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12140-cwe-200-exposure-of-sensitive-infor-0f1e9bb6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12140%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20aiwp%20Elementor%20Addons%20AI%20Addons%20%E2%80%93%2070%20Widgets%2C%20Premium%20Templates%2C%20Ultimate%20Elements&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12264-cwe-287-improper-authentication-in--a4bb78e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12264%3A%20CWE-287%20Improper%20Authentication%20in%20payuplugin%20PayU%20CommercePro%20Plugin&amp;severity=critical&amp;id=699f6e33b7ef31ef0b597afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11290-cwe-200-exposure-of-sensitive-infor-acabeb59</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11290%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20brownoxford%20Member%20Access&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b5943ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11377-cwe-79-improper-neutralization-of-i-b78f98c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11377%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sperse%20Automate%20Hub%20Free%20by%20Sperse.IO&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12158-cwe-862-missing-authorization-in-ar-0588009a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12158%3A%20CWE-862%20Missing%20Authorization%20in%20arrowplugins%20Popup%20%E2%80%93%20MailChimp%2C%20GetResponse%20and%20ActiveCampaign%20Intergrations&amp;severity=medium&amp;id=699f6e30b7ef31ef0b59769a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12153-cwe-79-improper-neutralization-of-i-033dd349</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12153%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grandy%20GDY%20Modular%20Content&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11363-cwe-79-improper-neutralization-of-i-a66c1efc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20outtheboxthemes%20Same%20but%20Different%20%E2%80%93%20Related%20Posts%20by%20Taxonomy&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12453-cwe-79-improper-neutralization-of-i-93349fa9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uptodown%20Uptodown%20APK%20Download%20Widget&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12457-cwe-79-improper-neutralization-of-i-a54db42e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faysal61%20Chat%20Support%20for%20Viber%20%E2%80%93%20Chat%20Bubble%20and%20Chat%20Button%20for%20Gutenberg%2C%20Elementor%20and%20Shortcode&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12207-cwe-79-improper-neutralization-of-i-2e3d18e0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12207%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20otwthemes%20Toggles%20Shortcode%20and%20Widget&amp;severity=medium&amp;id=699f6e31b7ef31ef0b597850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11337-cwe-79-improper-neutralization-of-i-1668f262</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11337%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20divineapi%20Divine%20Astro&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12252-cwe-94-improper-control-of-generati-e71972d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12252%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20seobeginner%20SEO%20LAT%20Auto%20Post&amp;severity=critical&amp;id=699f6e33b7ef31ef0b597a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12291-cwe-352-cross-site-request-forgery--6a2d8fdc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12291%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20swarminteractive%20ViewMedica%209&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12313-cwe-502-deserialization-of-untruste-7ba3399b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12313%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20a3rev%20Compare%20Products%20for%20WooCommerce&amp;severity=high&amp;id=699f6e36b7ef31ef0b597dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12290-cwe-79-improper-neutralization-of-i-fb4335e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12290%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20infility%20Infility%20Global&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12170-cwe-352-cross-site-request-forgery--0a5cf09a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12170%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20swarminteractive%20ViewMedica%209&amp;severity=medium&amp;id=699f6e30b7ef31ef0b59777f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11445-cwe-79-improper-neutralization-of-i-b607f4d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sazzadh%20Image%20Magnify&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12288-cwe-352-cross-site-request-forgery--4c5e10ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12288%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ramon-fincken%20Simple%20add%20pages%20or%20posts&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11378-cwe-79-improper-neutralization-of-i-fa467a1b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bizappventures%20Bizapp%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e10b7ef31ef0b59491e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12157-cwe-89-improper-neutralization-of-s-1d5f6330</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12157%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20arrowplugins%20Popup%20%E2%80%93%20MailChimp%2C%20GetResponse%20and%20ActiveCampaign%20Intergrations&amp;severity=high&amp;id=699f6e30b7ef31ef0b597696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12126-cwe-79-improper-neutralization-of-i-44b32b5b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12126%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seomantis%20SEO%20Keywords&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b597591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11690-cwe-79-improper-neutralization-of-i-af81040d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deios%20Financial%20Stocks%20%26%20Crypto%20Market%20Data%20Plugin&amp;severity=medium&amp;id=699f6e19b7ef31ef0b59525f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12214-cwe-79-improper-neutralization-of-i-b5c2e7a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12214%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hoststreamsell%20WooCommerce%20HSS%20Extension%20for%20Streaming%20Video&amp;severity=medium&amp;id=699f6e32b7ef31ef0b597987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11465-cwe-502-deserialization-of-untruste-25c18712</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11465%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20eherman24%20Custom%20Product%20Tabs%20for%20WooCommerce&amp;severity=high&amp;id=699f6e16b7ef31ef0b594f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11434-cwe-79-improper-neutralization-of-i-78b5823e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intergotelecom%20WP%20%E2%80%93%20Bulk%20SMS%20%E2%80%93%20by%20SMS.to&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11338-cwe-79-improper-neutralization-of-i-df2500cd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11338%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20daniel1088%20PIXNET%20Plugin&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12462-cwe-79-improper-neutralization-of-i-80e98ccf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andersyogo%20YOGO%20Booking&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10527-cwe-862-missing-authorization-in-cl-7eff537e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10527%3A%20CWE-862%20Missing%20Authorization%20in%20clevelandwebdeveloper%20Spacer&amp;severity=low&amp;id=699f6df4b7ef31ef0b59155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12049-cwe-79-improper-neutralization-of-i-948ec5b4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12049%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bandido%20Ukrposhta&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11383-cwe-79-improper-neutralization-of-i-e07a963b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20calculatorscanadaca%20CC%20Canadian%20Mortgage%20Calculator&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12538-cwe-200-exposure-of-sensitive-infor-3d636e53</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12538%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20binsaifullah%20Duplicate%20Post%2C%20Page%20and%20Any%20Custom%20Post&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11899-cwe-79-improper-neutralization-of-i-a8209827</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bqworks%20Slider%20Pro%20Lite&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12559-cwe-862-missing-authorization-in-1c-731d6617</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12559%3A%20CWE-862%20Missing%20Authorization%20in%201clickdesigns%20ClickDesigns&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12098-cwe-79-improper-neutralization-of-i-0a6b9d23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arsdeveloper%20ARS%20Affiliate%20Page%20Plugin&amp;severity=medium&amp;id=699f6e2db7ef31ef0b59739d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11777-cwe-79-improper-neutralization-of-i-3d2b4cfc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11777%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20endortrails%20Sell%20Media&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b59644c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12416-cwe-89-improper-neutralization-of-s-aaee55ff</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12416%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20delabon%20Live%20Sales%20Notification%20for%20Woocommerce%20%E2%80%93%20Woomotiv&amp;severity=high&amp;id=699f6e3bb7ef31ef0b598953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12541-cwe-352-cross-site-request-forgery--10554237</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12541%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chative%20Chative%20Live%20chat%20and%20Chatbot&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12419-cwe-94-improper-control-of-generati-235b9196</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12419%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20tobias_conrad%20WOW%20Styler%20for%20CF7%20%E2%80%93%20Visual%20Styler%20for%20Contact%20Form%207%20Forms&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12528-cwe-79-improper-neutralization-of-i-d1eb12ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pantherius%20WordPress%20Survey%20%26%20Poll%20%E2%80%93%20Quiz%2C%20Survey%20and%20Poll%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11934-cwe-79-improper-neutralization-of-i-9bc22e03</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11934%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20formaloo%20Formaloo%20Form%20Maker%20%26%20Customer%20Analytics%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12557-cwe-352-cross-site-request-forgery--9eaf7c3e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12557%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20transportersio%20Transporters.io&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12402-cwe-288-authentication-bypass-using-1548ad65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12402%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20themescoder%20TC%20Ecommerce%20%E2%80%93%20Create%20Android%20%26%20iOS%20Apps%20for%20WooCommerce&amp;severity=critical&amp;id=699f6e38b7ef31ef0b5980dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11437-cwe-89-improper-neutralization-of-s-e3d2818a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11437%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20solwininfotech%20Timeline%20Designer&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12590-cwe-79-improper-neutralization-of-i-7d42895e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12590%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20india-web-developer%20WP%20Youtube%20Gallery&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48245-na-6ec2d24b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48245%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56d9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46603-na-c48b4de0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46603%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56d2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46602-na-a51dc5bf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46602%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56d2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46601-na-e4cfc41b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46601%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56c3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46242-na-728e641e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46242%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfab7ef31ef0b56aa9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44450-na-1c392bed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44450%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdeb7ef31ef0b569ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40427-na-cf59767c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40427%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca9b7ef31ef0b567d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35532-na-914c9603</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35532%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5ab7ef31ef0b563409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55556-na-a5451277</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55556%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55555-na-582627f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55555%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd0b7ef31ef0b55b274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55414-na-687c1e3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55414%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bceb7ef31ef0b55b163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55413-na-4cc9e1b1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55413%3A%20n%2Fa&amp;severity=high&amp;id=699f6bceb7ef31ef0b55b15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55412-na-09c975cd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55412%3A%20n%2Fa&amp;severity=high&amp;id=699f6bceb7ef31ef0b55b15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55411-na-ef322c4a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55411%3A%20n%2Fa&amp;severity=high&amp;id=699f6bceb7ef31ef0b55b157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55218-na-a21591cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55218%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55b079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55008-na-e6867e24</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55008%3A%20n%2Fa&amp;severity=high&amp;id=699f6bcab7ef31ef0b55af8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53522-na-397ff069</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53522%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbfb7ef31ef0b55a9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53345-na-cb3b2e5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53345%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50660-na-90a6ec25</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50660%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9cb7ef31ef0b557389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50659-na-053a2d83</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50659%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9cb7ef31ef0b557384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50658-na-e6d055da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50658%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9cb7ef31ef0b55737f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54819-na-732445ca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54819%3A%20n%2Fa&amp;severity=critical&amp;id=698f5d11c9e1ff5ad84e3939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-07-2e1674</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-07&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e1674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-07-f12f3d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-07&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55626-cwe-680-integer-overflow-to-buffer--3f921501</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55626%3A%20CWE-680%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=low&amp;id=690908537fff0e30cee2391c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6605-improper-control-of-resource-identif-18fcd1da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6605%3A%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)&amp;severity=high&amp;id=690904b000ff46172d4a0e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6604-improper-control-of-resource-identif-00ba6af5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6604%3A%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)&amp;severity=medium&amp;id=690904ae00ff46172d4a0dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6601-improper-control-of-resource-identif-da46b897</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6601%3A%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)&amp;severity=medium&amp;id=690904ae00ff46172d4a0de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56769-vulnerability-in-linux-linux-bde7a7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56768-vulnerability-in-linux-linux-bde783</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56767-vulnerability-in-linux-linux-bde77b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56766-vulnerability-in-linux-linux-bdd196</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56765-vulnerability-in-linux-linux-bde773</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56764-vulnerability-in-linux-linux-bde76f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56763-vulnerability-in-linux-linux-bde76b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde76b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56761-vulnerability-in-linux-linux-bde767</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56760-vulnerability-in-linux-linux-bde75a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56759-vulnerability-in-linux-linux-bde758</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56758-vulnerability-in-linux-linux-bdd192</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56758%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56757-vulnerability-in-linux-linux-bde754</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56757%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21612-cwe-79-improper-neutralization-of-i-b936d913</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21612%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-extensions-TabberNeue&amp;severity=high&amp;id=68ae12eaad5a09ad005b31ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45553-cwe-416-use-after-free-in-qualcomm--575474af</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45553%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a43f85912abc71d63030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21464-cwe-120-buffer-copy-without-checkin-0b5658f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21464%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a43c85912abc71d620d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20105-cwe-787-out-of-bounds-write-in-medi-93b9a4ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20105%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8768&amp;severity=medium&amp;id=69a0a43c85912abc71d620cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20148-cwe-787-out-of-bounds-write-in-medi-0cc4bbcc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20148%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT3603%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT7902%2C%20MT7920%2C%20MT7922%2C%20MT8518S%2C%20MT8532%2C%20MT8766%2C%20MT8768%2C%20MT8775%2C%20MT8796%2C%20MT8798&amp;severity=critical&amp;id=69a0a43c85912abc71d620d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20146-cwe-787-out-of-bounds-write-in-medi-41c28128</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20146%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT3603%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6990%2C%20MT7902%2C%20MT7920%2C%20MT7922%2C%20MT8365%2C%20MT8518S%2C%20MT8532%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8755%2C%20MT8766%2C%20MT8768%2C%20MT8775%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8796%2C%20MT8798%2C%20MT8893&amp;severity=high&amp;id=69a0a43c85912abc71d620d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20140-cwe-787-out-of-bounds-write-in-medi-0d3057d1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20140%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6768%2C%20MT6781%2C%20MT6833%2C%20MT6853%2C%20MT6877%2C%20MT6885%2C%20MT6893%2C%20MT8518S%2C%20MT8532&amp;severity=medium&amp;id=69a0a43c85912abc71d620cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20154-cwe-121-stack-overflow-in-mediatek--3863fd93</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20154%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6785U%2C%20MT6789%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6880T%2C%20MT6880U%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8666%2C%20MT8673%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8789%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798&amp;severity=high&amp;id=6994829080d747be20bad130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46622-na-a902f193</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46622%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d02b7ef31ef0b56d2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46209-na-a02fe4f7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46209%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aa34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46073-na-68dbe1cc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46073%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf7b7ef31ef0b56a912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35498-na-e6184085</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35498%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5ab7ef31ef0b5633f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56828-na-ab78fa01</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56828%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd4b7ef31ef0b55b484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55529-na-c8f3f717</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55529%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55408-cwe-862-missing-authorization-in-as-5286bb08</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55408%3A%20CWE-862%20Missing%20Authorization%20in%20ASUS%20ASCI&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55407-na-096b38bb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55407%3A%20n%2Fa&amp;severity=high&amp;id=699f6bceb7ef31ef0b55b10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55076-cwe-352-cross-site-request-forgery--7603c487</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55076%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Grocy%20project%20Grocy&amp;severity=high&amp;id=699f6bccb7ef31ef0b55affd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55075-cwe-425-direct-request-forced-brows-48da61fe</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55075%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Grocy%20project%20Grocy&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55affa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55074-cwe-79-improper-neutralization-of-i-13d9022f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Grocy%20project%20Grocy&amp;severity=high&amp;id=699f6bccb7ef31ef0b55aff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54880-na-5b69160e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54880%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55ae46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54879-na-c3374a79</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54879%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55ae42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54764-na-b5fc6e7e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54764%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55adbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54763-na-02151ed7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54763%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55adbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53936-na-353de077</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53936%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55ac2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53935-na-35bfc310</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53935%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc2b7ef31ef0b55ab92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53934-na-654682a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53934%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc2b7ef31ef0b55ab8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53933-na-aca50751</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53933%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc2b7ef31ef0b55ab8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51112-na-9b1e5116</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51112%3A%20n%2Fa&amp;severity=medium&amp;id=699f6baab7ef31ef0b557a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51111-na-3479434a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51111%3A%20n%2Fa&amp;severity=medium&amp;id=699f6baab7ef31ef0b557a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48457-na-c964a9c2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48457%3A%20n%2Fa&amp;severity=high&amp;id=699f6b72b7ef31ef0b555800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48456-na-b572546b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48456%3A%20n%2Fa&amp;severity=high&amp;id=699f6b72b7ef31ef0b5557fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48455-na-4c4a4e12</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48455%3A%20n%2Fa&amp;severity=low&amp;id=699f6b72b7ef31ef0b5557f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-06-2e0fdd</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-06&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e0fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-06-f12ee2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-05-2e41f6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-05&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e41f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-05-f12ef9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10957-cwe-502-deserialization-of-untruste-288e4140</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10957%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20davidanderson%20UpdraftPlus%3A%20WP%20Backup%20%26%20Migration%20Plugin&amp;severity=high&amp;id=699f6e04b7ef31ef0b5939a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12195-cwe-89-improper-neutralization-of-s-0b4ec88c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12195%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20Project%20Manager%20%E2%80%93%20AI%20Powered%20Project%20Management%2C%20Task%20Management%2C%20Kanban%20Board%20%26%20Time%20Tracker&amp;severity=medium&amp;id=699f6e31b7ef31ef0b597832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12279-cwe-352-cross-site-request-forgery--5e2eb20a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12279%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20justin_k%20WP%20Social%20AutoConnect&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12475-cwe-79-improper-neutralization-of-i-ab16cfce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12475%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpexpertsio%20WP%20Multistore%20Locator%20%E2%80%94%20WP%20Store%20Locator%20Plugin%3A%20Effortless%20Integration%20With%20Snazzy%20Maps&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12221-cwe-79-improper-neutralization-of-i-0fb0aa4a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12221%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweaver%20Turnkey%20bbPress%20by%20WeaverTheme&amp;severity=medium&amp;id=699f6e32b7ef31ef0b59799b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11930-cwe-79-improper-neutralization-of-i-4ef501be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11930%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12583-cwe-1336-improper-neutralization-of-3b1738f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12583%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20alexacrm%20Dynamics%20365%20Integration&amp;severity=critical&amp;id=699f6e43b7ef31ef0b59bfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10932-cwe-502-deserialization-of-untruste-8c4eb8ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10932%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20inisev%20BackupBliss%20%E2%80%93%20Backup%20%26%20Migration%20with%20Free%20Cloud%20Storage&amp;severity=high&amp;id=699f6e03b7ef31ef0b593909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12545-cwe-352-cross-site-request-forgery--0190e7aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12545%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20akashmalik%20Scratch%20%26%20Win%20%E2%80%93%20Giveaways%20and%20Contests.%20Boost%20subscribers%2C%20traffic%2C%20repeat%20visits%2C%20%20referrals%2C%20sales%20and%20more&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11974-cwe-79-improper-neutralization-of-i-56b828aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11974%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=699f6e29b7ef31ef0b596ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12701-cwe-79-improper-neutralization-of-i-9d6dcee5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xylus%20WP%20Smart%20Import%20%3A%20Import%20any%20XML%20File%20to%20WordPress&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12047-cwe-79-improper-neutralization-of-i-38dd5b7b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12047%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aresit%20WP%20Compress%20%E2%80%93%20Instant%20Performance%20%26%20Speed%20Optimization&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22390-cwe-521-weak-password-requirements-495f9527</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22390%3A%20CWE-521%20Weak%20Password%20Requirements&amp;severity=high&amp;id=699f6b1bb7ef31ef0b54e305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22388-cwe-79-improper-neutralization-of-i-3aa5fb0a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22387-cwe-598-use-of-get-request-method-w-99e0877f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22387%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings&amp;severity=high&amp;id=699f6b1bb7ef31ef0b54e2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22386-cwe-613-insufficient-session-expira-e178152d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22386%3A%20CWE-613%20Insufficient%20Session%20Expiration&amp;severity=high&amp;id=699f6b1bb7ef31ef0b54e2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22385-cwe-862-missing-authorization-e8f7a535</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22385%3A%20CWE-862%20Missing%20Authorization&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22384-cwe-472-external-control-of-assumed-bd35a191</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22384%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter&amp;severity=high&amp;id=699f6b1bb7ef31ef0b54e2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22383-cwe-79-improper-neutralization-of-i-6a3e335f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-04-2e3bf6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-04&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e3bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-04-f13075</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-04&amp;severity=medium&amp;id=682acdc2bbaf20d303f13075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11733-cwe-94-improper-control-of-generati-fa984264</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11733%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20hcabrera%20WP%20Popular%20Posts&amp;severity=high&amp;id=699f6e1bb7ef31ef0b59559e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12237-cwe-918-server-side-request-forgery-c8ae663b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12237%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nik00726%20Photo%20Gallery%20Slideshow%20%26%20Masonry%20Tiled%20Gallery&amp;severity=medium&amp;id=699f6e32b7ef31ef0b5979a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56408-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-phpoffice-phpspreadsheet-aeac8b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56408%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PHPOffice%20PhpSpreadsheet&amp;severity=high&amp;id=682cd0f71484d88663aeac8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12132-cwe-639-authorization-bypass-throug-f7ddf44c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12132%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b5975a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36613-na-517b9d57</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36613%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c61b7ef31ef0b5637f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35365-na-5d571f64</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35365%3A%20n%2Fa&amp;severity=high&amp;id=699f6c58b7ef31ef0b56328c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55507-na-5c00dbbc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55507%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55078-na-5e1b1362</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55078%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48814-na-d25954d0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48814%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7cb7ef31ef0b555d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22376-cwe-338-use-of-cryptographically-we-17ded964</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22376%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-03-2e3984</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-03&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e3984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-03-f12cf8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43768-elevation-of-privilege-in-google-an-8c6708df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43768%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a43f85912abc71d63026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43097-elevation-of-privilege-in-google-an-3678010d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43097%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6909214efe7723195e054596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8447-deadlock-aec806</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8447%3A%20Deadlock&amp;severity=medium&amp;id=682cd0fb1484d88663aec806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9950-cwe-379-in-forescout-secureconnector-fb3ff974</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9950%3A%20CWE-379%20in%20Forescout%20SecureConnector&amp;severity=high&amp;id=683ffd67182aa0cae2a3884c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55542-cwe-266-in-acronis-acronis-cyber-protect-16-bf1609</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55542%3A%20CWE-266%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=medium&amp;id=682d9840c4522896dcbf1609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49035-vulnerability-in-linux-linux-be69b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49035%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe69b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49385-cwe-732-in-acronis-acronis-true-ima-ea369b60</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49385%3A%20CWE-732%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69d900441cc7ad14dabf8fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55538-cwe-306-in-acronis-acronis-true-ima-ad52da3a</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55538%3A%20CWE-306%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69d900441cc7ad14dabf8fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37237-cross-site-request-forgery-csrf-in--7f394371</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37237%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fs-code%20FS%20Poster&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38778-cross-site-request-forgery-csrf-in--d542048b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38778%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39623-cross-site-request-forgery-csrf-in--27b6e5ce</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39623%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CridioStudio%20ListingPro&amp;severity=null&amp;id=69cd7467e6bfc5ba1def7126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56257-improper-neutralization-of-input-du-803028ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56257%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoolPlugins%20Coins%20MarketCap&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56268-improper-neutralization-of-input-du-72dbfd5a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56268%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hookandhook%20Post%20Grid%20Elementor%20Addon&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56302-improper-neutralization-of-input-du-47ad1a49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56302%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jorisderuiter%20ConvertCalculator%20for%20WordPress&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56267-improper-neutralization-of-input-du-1dda396a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56267%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20html5maps%20Interactive%20UK%20Map&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56266-missing-authorization-in-sonaar-mp3-925592ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56266%3A%20Missing%20Authorization%20in%20sonaar%20MP3%20Audio%20Player%20for%20Music%2C%20Radio%20%26%20Podcast%20by%20Sonaar&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56264-unrestricted-upload-of-file-with-da-2f94bc4a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56264%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Beee%20ACF%20City%20Selector&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56263-improper-neutralization-of-input-du-dc5b3713</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56263%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GS%20Plugins%20GS%20Shots%20for%20Dribbble&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56262-improper-neutralization-of-input-du-1d42daf3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56262%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GS%20Plugins%20GS%20Coaches&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56261-improper-neutralization-of-input-du-405d009d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56261%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GS%20Plugins%20Project%20Showcase&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56260-improper-neutralization-of-input-du-a849e3d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56260%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StorePlugin%20ShopElement&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56259-improper-neutralization-of-input-du-f42e74c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56259%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paolo%20GeoDirectory&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56258-improper-neutralization-of-input-du-28db75c4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56258%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BlockArt%20Magazine%20Blocks&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56255-missing-authorization-in-stiofan-ay-5516f450</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56255%3A%20Missing%20Authorization%20in%20Stiofan%20AyeCode%20Connect&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56254-improper-neutralization-of-input-du-39591500</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56254%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moveaddons%20Move%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56253-missing-authorization-in-supsystic--6875954b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56253%3A%20Missing%20Authorization%20in%20supsystic%20Data%20Tables%20Generator%20by%20Supsystic&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56252-improper-neutralization-of-input-du-fbc352ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56252%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelooks%20Enter%20Addons&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56251-cross-site-request-forgery-csrf-in--d3ef7493</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56251%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Event%20Espresso%20Event%20Espresso%204%20Decaf&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56250-improper-neutralization-of-special--a01f1a0c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56250%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Greg%20Ross%20Just%20Writing%20Statistics&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56249-unrestricted-upload-of-file-with-da-fb1416ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56249%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ludwig%20You%20WPMasterToolKit&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56248-improper-limitation-of-a-pathname-t-6945267a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56248%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ludwig%20You%20WPMasterToolKit&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56247-improper-neutralization-of-special--9e2c58f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56247%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AF%20themes%20WP%20Post%20Author&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56246-improper-neutralization-of-input-du-6f6e8ed5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56246%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56245-improper-neutralization-of-input-du-093b1dc4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Leap13%20Premium%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%20for%20WordPress&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56244-missing-authorization-in-wp-royal-a-8d056653</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56244%3A%20Missing%20Authorization%20in%20WP%20Royal%20Ashe%20Extra&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56243-missing-authorization-in-js-morisse-0ced9ade</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56243%3A%20Missing%20Authorization%20in%20JS%20Morisset%20WPSSO%20Core&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56242-improper-neutralization-of-input-du-a2c7c4a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56242%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56241-improper-neutralization-of-input-du-6cd2f184</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56241%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkoithemes%20WPKoi%20Templates%20for%20Elementor&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56240-improper-neutralization-of-input-du-107a2153</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pronamic%20Pronamic%20Google%20Maps&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56239-improper-neutralization-of-input-du-f12c0b7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Audio%20Dock&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56238-missing-authorization-in-quantumclo-7a778163</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56238%3A%20Missing%20Authorization%20in%20QuantumCloud%20Floating%20Action%20Buttons&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56237-improper-neutralization-of-input-du-ca419f6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56236-missing-authorization-in-juni-hesti-32beb854</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56236%3A%20Missing%20Authorization%20in%20Juni%20Hestia%20Nginx%20Cache&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56026-improper-neutralization-of-input-du-143e3ba1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Greg%20%26%238211%3B%20SiteOrigin%20Simple%20Proxy&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56025-improper-neutralization-of-input-du-e9944031</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adworkmedia%20AdWork%20Media%20EZ%20Content%20Locker&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56024-improper-neutralization-of-input-du-e210441d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56024%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DuoGeek%20Custom%20Dashboard%20Widget&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56023-improper-neutralization-of-input-du-915a82ed</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56023%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PerfectSolution%20WP%20eCommerce%20Quickpay&amp;severity=null&amp;id=69cd75bae6bfc5ba1df0710e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56022-improper-neutralization-of-input-du-a4486ff8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56022%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WordPress%20Monsters%20Preloader%20by%20WordPress%20Monsters&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df0708f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56018-improper-neutralization-of-input-du-c145f4e4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BU%20Web%20Team%20BU%20Section%20Editing&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43927-cross-site-request-forgery-csrf-in--4b2c318f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43927%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Till%20Kr%C3%BCss%20Email%20Address%20Encoder&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38790-cross-site-request-forgery-csrf-in--d9225f36</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38790%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Smartsupp%20Smartsupp%20%E2%80%93%20live%20chat%2C%20chatbots%2C%20AI%20and%20lead%20generation&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38789-cross-site-request-forgery-csrf-in--e4b24a62</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38789%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marco%20Milesi%20Telegram%20Bot%20%26%20Channel&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38766-cross-site-request-forgery-csrf-in--bf879af2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38766%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20matomoteam%20Matomo%20Analytics&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38765-cross-site-request-forgery-csrf-in--b7614ce1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38765%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20outtheboxthemes%20Oceanic&amp;severity=null&amp;id=69cd7465e6bfc5ba1def709e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38763-cross-site-request-forgery-csrf-in--305961b6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38763%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themes4wp%20Popularis%20Verse&amp;severity=null&amp;id=69cd7465e6bfc5ba1def709b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38762-cross-site-request-forgery-csrf-in--708927c4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38762%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20Event%20Tickets&amp;severity=null&amp;id=69cd7463e6bfc5ba1def7022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38753-cross-site-request-forgery-csrf-in--69d9cff5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38753%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Labib%20Ahmed%20Animated%20Rotating%20Words&amp;severity=null&amp;id=69cd7463e6bfc5ba1def701f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38751-cross-site-request-forgery-csrf-in--2758d341</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38751%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Magazine3%20Google%20Adsense%20%26%20Banner%20Ads%20by%20AdsforWP&amp;severity=null&amp;id=69cd7463e6bfc5ba1def701c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38729-cross-site-request-forgery-csrf-in--7c0107c8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38729%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mbeelink%20MBE%20eShip&amp;severity=null&amp;id=69cd7463e6bfc5ba1def7015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38691-cross-site-request-forgery-csrf-in--d8b1d9e7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38691%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Metorik%20Metorik%20%E2%80%93%20Reports%20%26%20Email%20Automation%20for%20WooCommerce&amp;severity=null&amp;id=69cd7463e6bfc5ba1def7003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37937-cross-site-request-forgery-csrf-in--ae7fcc6a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37937%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Rara%20Business&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37543-cross-site-request-forgery-csrf-in--2c944dd1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37543%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nitesh%20Ultimate%20Auction&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37540-cross-site-request-forgery-csrf-in--73a0fb5d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37540%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZEEN101%20Leaky%20Paywall&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37518-cross-site-request-forgery-csrf-in--ea9469c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37518%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20The%20Events%20Calendar&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37511-cross-site-request-forgery-csrf-in--87a0b6e9</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37511%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20swte%20Swift%20Performance%20Lite&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37508-cross-site-request-forgery-csrf-in--1d821095</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37508%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Construction%20Landing%20Page&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37503-cross-site-request-forgery-csrf-in--c748b074</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37503%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Lawyer%20Landing%20Page&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37493-cross-site-request-forgery-csrf-in--ab934e43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37493%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sonalsinha21%20Posterity&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37491-cross-site-request-forgery-csrf-in--5013a0b1</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37491%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20apollo13themes%20Rife%20Free&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37490-cross-site-request-forgery-csrf-in--056b6ea7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37490%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Bard&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37478-cross-site-request-forgery-csrf-in--10378cb7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37478%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Ashe&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37473-cross-site-request-forgery-csrf-in--dac6ce49</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37473%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blazethemes%20Trendy%20News&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37469-cross-site-request-forgery-csrf-in--c1118fb8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37469%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativethemeshq%20Blocksy&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37467-cross-site-request-forgery-csrf-in--13cf38d9</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37467%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeisle%20Hestia&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37458-cross-site-request-forgery-csrf-in--fa3e6249</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37458%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20extendthemes%20Highlight&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37451-cross-site-request-forgery-csrf-in--f1c441c6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37451%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Travel%20Agency&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37450-cross-site-request-forgery-csrf-in--b2866ecd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37450%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Benevolent&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37448-cross-site-request-forgery-csrf-in--7775fc6d</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37448%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20famethemes%20OnePress&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37441-cross-site-request-forgery-csrf-in--0621a94f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37441%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20desertthemes%20NewsMash&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37435-cross-site-request-forgery-csrf-in--e1724403</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Perfect%20Portfolio&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37431-cross-site-request-forgery-csrf-in--eb92de7c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37431%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20extendthemes%20Mesmerize&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37426-cross-site-request-forgery-csrf-in--6d0cd0c5</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37426%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Elegant%20Pink&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37421-cross-site-request-forgery-csrf-in--7a539f71</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37421%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20JobScout&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37417-cross-site-request-forgery-csrf-in--72b5007f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37417%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcoachify%20Coachify&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37413-cross-site-request-forgery-csrf-in--03f52016</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37413%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Preschool%20and%20Kindergarten&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37412-cross-site-request-forgery-csrf-in--73b0e02c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37412%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blossomthemes%20Blossom%20Shop&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37274-cross-site-request-forgery-csrf-in--004468e6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37274%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rui%20Guerreiro%20WP%20Mobile%20Menu&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37272-cross-site-request-forgery-csrf-in--a827ca26</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37272%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wptravelengine%20Travel%20Monster&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37243-cross-site-request-forgery-csrf-in--50df2272</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37243%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blossomthemes%20Vandana%20Lite&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37242-cross-site-request-forgery-csrf-in--00932fde</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37242%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Automattic%20Newspack%20Newsletters&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37240-cross-site-request-forgery-csrf-in--34ed2bae</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37240%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sbouey%20Falang%20multilanguage&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37238-cross-site-request-forgery-csrf-in--fa8e26cd</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37238%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37236-cross-site-request-forgery-csrf-in--164f6617</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37236%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tim%20W%20Loco%20Translate&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37235-cross-site-request-forgery-csrf-in--265b2a77</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37235%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37104-cross-site-request-forgery-csrf-in--e0cd514f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37104%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Chic%20Lite&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37103-cross-site-request-forgery-csrf-in--63648c16</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37103%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Education%20Zone&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37102-cross-site-request-forgery-csrf-in--78ca654c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37102%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blossomthemes%20Vilva&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37093-cross-site-request-forgery-csrf-in--036f4c5b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37093%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=69cd7448e6bfc5ba1def693f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56027-improper-neutralization-of-input-du-c2388ec1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bizswoop%20Leads%20CRM&amp;severity=null&amp;id=69cd75bae6bfc5ba1df0711a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56028-improper-neutralization-of-input-du-0f989e3c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56028%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lemonadestudio%20Lemonade%20Social%20Networks%20Autoposter%20Pinterest&amp;severity=null&amp;id=69cd75bae6bfc5ba1df0711d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56029-improper-neutralization-of-input-du-5d883624</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56029%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dreamwinner%20Easy%20Language%20Switcher&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56030-improper-neutralization-of-input-du-2853095e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56030%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Carver%20Lab%2010CentMail&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56032-improper-neutralization-of-input-du-75ec8ca0</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FolioVision%20FV%20Descriptions&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df0715f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56033-improper-neutralization-of-input-du-adcea01c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20FAQs&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56019-improper-neutralization-of-input-du-15f97b61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56019%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gavinr%20Inline%20Footnotes&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56034-improper-neutralization-of-input-du-f349eb7c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56034%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Irshad%20A.Khan%20Services%20updates%20for%20customers&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df0716a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56035-improper-neutralization-of-input-du-681a2767</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kurt%20Payne%20Upload%20Scanner&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df0716d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56036-improper-neutralization-of-input-du-bd3bed66</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56036%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ondrej%20Donek%20odPhotogallery&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56037-improper-neutralization-of-input-du-7b4a5099</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SoftClever%20Limited%20User%20Referral&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56038-improper-neutralization-of-input-du-f92822fb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56038%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catalinsendsms%20SendSMS&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56060-improper-neutralization-of-input-du-db312543</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56060%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Link%20Software%20LLC%20HTML%20Forms&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56069-improper-neutralization-of-input-du-4d28b04d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56069%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azzaroco%20WP%20SuperBackup&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48197-na-6689e00d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48197%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0db7ef31ef0b56d838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56829-cwe-434-unrestricted-upload-of-file-a904606f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56829%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&amp;severity=critical&amp;id=699f6bd4b7ef31ef0b55b489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22214-cwe-89-improper-neutralization-of-s-a2c7ed56</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22214%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-02-2e3525</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-02&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e3525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-02-f12724</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-01-08b424b6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-01&amp;severity=medium&amp;id=68367c99182aa0cae2321cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-01-7610d7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-01&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb7610d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-01-f12d32</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56020-improper-neutralization-of-input-du-9692629f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20svegliadesign%20SvegliaT%20Buttons&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56021-improper-neutralization-of-input-du-c67a0791</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ibnuyahya%20Category%20Post%20Shortcode&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df0708c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56062-improper-neutralization-of-input-du-4b7d8200</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56062%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56063-improper-neutralization-of-input-du-4f280299</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56063%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df0743e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13080-cross-site-scripting-in-phpgurukul-land-record-system-bed988</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13080%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Land%20Record%20System&amp;severity=medium&amp;id=682d983ac4522896dcbed988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25133-improper-access-control-3b9d1cf1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25133%3A%20Improper%20Access%20Control&amp;severity=high&amp;id=699f6d60b7ef31ef0b570d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6602-improper-control-of-resource-identif-a415aee8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6602%3A%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)&amp;severity=medium&amp;id=690904ae00ff46172d4a0dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49686-missing-authorization-in-fatcatapps-5b25768b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49686%3A%20Missing%20Authorization%20in%20fatcatapps%20Landing%20Page%20Cat&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df0198e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49687-missing-authorization-in-storeapps--a44a7c89</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49687%3A%20Missing%20Authorization%20in%20storeapps%20Smart%20Manager&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df01991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49694-missing-authorization-in-imw3-my-wp-c4e607d1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49694%3A%20Missing%20Authorization%20in%20imw3%20My%20Wp%20Brand&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49698-missing-authorization-in-pricelisto-f979294b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49698%3A%20Missing%20Authorization%20in%20PriceListo%20Best%20Restaurant%20Menu%20by%20PriceListo&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51667-missing-authorization-in-paytiumsup-51dce5d5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51667%3A%20Missing%20Authorization%20in%20paytiumsupport%20Paytium&amp;severity=null&amp;id=69cd7510e6bfc5ba1df02908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55995-missing-authorization-in-torod-comp-cabc2a44</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55995%3A%20Missing%20Authorization%20in%20Torod%20Company%20for%20Information%20Technology%20Torod&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56002-missing-authorization-in-mightyform-1c036221</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56002%3A%20Missing%20Authorization%20in%20mightyforms%20Contact%20Form%2C%20Survey%20%26%20Form%20Builder%20%E2%80%93%20MightyForms&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df0703b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56070-missing-authorization-in-azzaroco-w-b8f3d3eb</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56070%3A%20Missing%20Authorization%20in%20azzaroco%20WP%20SuperBackup&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56207-cross-site-request-forgery-csrf-in--11c1ba29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56207%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EditionGuard%20EditionGuard%20for%20WooCommerce%20%E2%80%93%20eBook%20Sales%20with%20DRM&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56206-cross-site-request-forgery-csrf-in--7d059543</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56206%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20krishankakkar%20gap-hub-user-role&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56204-cross-site-request-forgery-csrf-in--44c6b376</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56204%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonisink%20Sinking%20Dropdowns&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56203-cross-site-request-forgery-csrf-in--44364627</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56203%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gholme4%20Wayne%20Audio%20Player&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56066-missing-authorization-in-inspry-age-125ea5a8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56066%3A%20Missing%20Authorization%20in%20inspry%20Agency%20Toolkit&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56061-missing-authorization-in-ateeq-rafe-70fef8a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56061%3A%20Missing%20Authorization%20in%20Ateeq%20Rafeeq%20RepairBuddy&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56045-path-traversal-in-vibethemes-wplms-1b496559</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56045%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56044-authentication-bypass-using-an-alte-0dec3fc2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56044%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56043-incorrect-privilege-assignment-in-v-5680c809</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56043%3A%20Incorrect%20Privilege%20Assignment%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56040-incorrect-privilege-assignment-in-v-4a60ea73</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56040%3A%20Incorrect%20Privilege%20Assignment%20in%20VibeThemes%20VibeBP&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df0717c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56042-improper-neutralization-of-special--e5956baf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56042%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56041-improper-neutralization-of-special--61481b15</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56041%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VibeThemes%20VibeBP&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df0717f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56039-improper-neutralization-of-special--e47230ce</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56039%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VibeThemes%20VibeBP&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56064-unrestricted-upload-of-file-with-da-ccc7b396</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56064%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20azzaroco%20WP%20SuperBackup&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56046-unrestricted-upload-of-file-with-da-20362d52</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56046%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df0725b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56068-deserialization-of-untrusted-data-i-7ec83575</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56068%3A%20Deserialization%20of%20Untrusted%20Data%20in%20azzaroco%20WP%20SuperBackup&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df0744d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55991-missing-authorization-in-mario-pesh-28be1912</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55991%3A%20Missing%20Authorization%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56031-missing-authorization-in-yulio-alem-2f90a27f</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56031%3A%20Missing%20Authorization%20in%20Yulio%20Aleman%20Jimenez%20Smart%20Shopify%20Product&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56067-missing-authorization-in-azzaroco-w-36abe609</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56067%3A%20Missing%20Authorization%20in%20azzaroco%20WP%20SuperBackup&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df0744a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56071-incorrect-privilege-assignment-in-m-b9a1b2d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56071%3A%20Incorrect%20Privilege%20Assignment%20in%20mikeleembruggen%20Simple%20Dashboard&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56205-incorrect-privilege-assignment-in-s-cb57e5a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56205%3A%20Incorrect%20Privilege%20Assignment%20in%20SunnyKai%20AI%20Magic&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56209-improper-neutralization-of-input-du-e40bba24</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56209%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeventhQueen%20Kleo&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56210-improper-neutralization-of-input-du-dfafb7e1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56210%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DeluxeThemes%20Userpro&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56221-improper-neutralization-of-input-du-8e73c90e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56221%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elicus%20WPMozo%20Addons%20Lite%20for%20Elementor&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56223-improper-neutralization-of-input-du-0c5c9581</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56223%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fahad%20Mahmood%20Gulri%20Slider&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df0796c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56226-improper-neutralization-of-input-du-74738b01</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56226%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56228-improper-neutralization-of-input-du-5cfa778a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Wishlist%20for%20WooCommerce&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56231-improper-neutralization-of-input-du-a4fd56f7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Debuggers%20Studio%20SaasPricing&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56233-improper-neutralization-of-input-du-f5d5556b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kinhelios%20KinTPV%20WooConnect&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56234-missing-authorization-in-vowelweb-v-a2b8cdf9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56234%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Automobile%20Lite&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56227-missing-authorization-in-wp-royal-r-72f19af9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56227%3A%20Missing%20Authorization%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56225-missing-authorization-in-leap13-pre-24d77ad7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56225%3A%20Missing%20Authorization%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd75c6e6bfc5ba1df079f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56219-missing-authorization-in-marketing--5546a714</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56219%3A%20Missing%20Authorization%20in%20Marketing%20Fire%20Widget%20Options&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56217-missing-authorization-in-shahjada-d-ffd12e50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56217%3A%20Missing%20Authorization%20in%20Shahjada%20Download%20Manager&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df0795a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56215-missing-authorization-in-dbar-produ-81d09800</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56215%3A%20Missing%20Authorization%20in%20DBAR%20Productions%20Member%20Directory%20and%20Contact%20Form&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56235-improper-neutralization-of-input-du-1e5666a7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vicky%20Kumar%20Coupon&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56256-improper-neutralization-of-input-du-cc0b8ae6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56256%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andy%20Fragen%20Embed%20PDF%20Viewer&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56265-improper-neutralization-of-input-du-01e64d3b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56265%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweb%20WooCommerce%20PDF%20Vouchers&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56218-cross-site-request-forgery-csrf-in--fcd1e86c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56218%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sevenspark%20Contact%20Form%207%20%E2%80%93%20Dynamic%20Text%20Extension&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df0795d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56222-cross-site-request-forgery-csrf-in--04e6a145</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56222%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CodeBard%20CodeBard%20Help%20Desk&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56232-cross-site-request-forgery-csrf-in--ef466dbd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56232%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alex%20Volkov%20WP%20Nice%20Loader&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56220-incorrect-privilege-assignment-in-s-77b14dbc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56220%3A%20Incorrect%20Privilege%20Assignment%20in%20sslplugins%20SSL%20Wireless%20SMS%20Notification&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56212-improper-neutralization-of-special--8728bad0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56212%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20DeluxeThemes%20Userpro&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56211-missing-authorization-in-deluxethem-51db3a5a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56211%3A%20Missing%20Authorization%20in%20DeluxeThemes%20Userpro&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56213-path-traversal-in-arraytics-eventin-b5578946</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56213%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df07902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56214-path-traversal-in-deluxethemes-user-8e65362a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56214%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20DeluxeThemes%20Userpro&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df07905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56216-improper-control-of-filename-for-in-3e0508ef</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56216%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themifyme%20Themify%20Builder&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56230-improper-control-of-filename-for-in-13fd04de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56230%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Maidul%20Dynamic%20Product%20Category%20Grid%2C%20Slider%20for%20WooCommerce&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45497-incorrect-permission-assignment-for-485f4856</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45497%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource&amp;severity=high&amp;id=68467fab71f4d251b582404b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-31-2e6e83</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-31&amp;severity=medium&amp;id=682c7dc4e8347ec82d2e6e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-31-f128ab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f128ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13051-cwe-122-heap-based-buffer-overflow--ba4a8d15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13051%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=699f6e4db7ef31ef0b59c8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13050-cwe-122-heap-based-buffer-overflow--833b8d82</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13050%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=699f6e4db7ef31ef0b59c8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13049-cwe-843-access-of-resource-using-in-ab087255</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13049%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13048-cwe-787-out-of-bounds-write-in-ashl-ca13f8de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13048%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13047-cwe-843-access-of-resource-using-in-301e7e6d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13047%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13046-cwe-787-out-of-bounds-write-in-ashl-d787f626</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13046%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13045-cwe-121-stack-based-buffer-overflow-ad5bf27c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13045%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13044-cwe-787-out-of-bounds-write-in-ashl-0bab3dd3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13044%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12753-cwe-59-improper-link-resolution-bef-db4fdeb7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12753%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12752-cwe-119-improper-restriction-of-ope-40d0a799</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12752%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12751-cwe-125-out-of-bounds-read-in-foxit-2edbc509</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12751%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13043-cwe-59-improper-link-resolution-bef-59dc9be6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13043%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Panda%20Security%20Dome&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11946-cwe-319-cleartext-transmission-of-s-e1d8a95f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11946%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20iXsystems%20TrueNAS%20CORE&amp;severity=low&amp;id=699f6e28b7ef31ef0b596f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11944-cwe-22-improper-limitation-of-a-pat-54461056</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11944%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iXsystems%20TrueNAS%20CORE&amp;severity=high&amp;id=699f6e28b7ef31ef0b596f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12836-cwe-843-access-of-resource-using-in-0a030d18</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12836%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Delta%20Electronics%20DRASimuCAD&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12835-cwe-787-out-of-bounds-write-in-delt-7750d26c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12835%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20DRASimuCAD&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12834-cwe-843-access-of-resource-using-in-0e50ef57</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12834%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Delta%20Electronics%20DRASimuCAD&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46542-cwe-89-improper-neutralization-of-s-cffc9308</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46542%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Veritas%20Data%20Insight&amp;severity=medium&amp;id=68f25a599c34d0947f29dfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-30-2e50df</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-30&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e50df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-30-f123c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f123c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56756-vulnerability-in-linux-linux-bde750</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56755-vulnerability-in-linux-linux-bde726</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56754-vulnerability-in-linux-linux-bde71e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56753-vulnerability-in-linux-linux-bde71a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56752-vulnerability-in-linux-linux-bde716</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56751-vulnerability-in-linux-linux-bde712</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56750-vulnerability-in-linux-linux-bde703</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56749-vulnerability-in-linux-linux-bde6fb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56748-vulnerability-in-linux-linux-bde6f3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56747-vulnerability-in-linux-linux-bde6ed</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56746-vulnerability-in-linux-linux-bde6dc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56745-vulnerability-in-linux-linux-bde6bf</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56744-vulnerability-in-linux-linux-bdd18c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56743-vulnerability-in-linux-linux-bde6bb</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56742-vulnerability-in-linux-linux-bde6b7</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56740-vulnerability-in-linux-linux-bde6b3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56739-vulnerability-in-linux-linux-bde6a2</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56730-vulnerability-in-linux-linux-bde69e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56729-vulnerability-in-linux-linux-bde69a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56728-vulnerability-in-linux-linux-bde696</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56727-vulnerability-in-linux-linux-bde685</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56727%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56726-vulnerability-in-linux-linux-bde67b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56726%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56725-vulnerability-in-linux-linux-bde65e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56725%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56724-vulnerability-in-linux-linux-bde65a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56724%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56723-vulnerability-in-linux-linux-bde656</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56723%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56722-vulnerability-in-linux-linux-bde654</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56722%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56721-vulnerability-in-linux-linux-bde63c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56721%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56720-vulnerability-in-linux-linux-bde634</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56720%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56719-vulnerability-in-linux-linux-bdd188</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56719%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56718-vulnerability-in-linux-linux-bde62c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56718%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56717-vulnerability-in-linux-linux-bdd184</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56717%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56716-vulnerability-in-linux-linux-bde626</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56716%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56715-vulnerability-in-linux-linux-bde622</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56715%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56714-vulnerability-in-linux-linux-bde61a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56714%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56713-vulnerability-in-linux-linux-bde5f2</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56713%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56712-vulnerability-in-linux-linux-bde5ee</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56712%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56711-vulnerability-in-linux-linux-bde5ea</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56711%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56710-vulnerability-in-linux-linux-bde5e6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56710%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56709-vulnerability-in-linux-linux-bde5e2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56709%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12238-cwe-94-improper-control-of-generati-4747d499</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12238%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=699f6e32b7ef31ef0b5979d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56738-cwe-208-observable-timing-discrepan-73461fad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56738%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20GNU%20GRUB2&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56737-cwe-122-heap-based-buffer-overflow--f45b0109</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56737%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20GNU%20GRUB2&amp;severity=high&amp;id=699f6bd4b7ef31ef0b55b47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-29-2e4d2b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-29&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e4d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-29-f1207b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f1207b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56708-vulnerability-in-linux-linux-bde5de</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56707-vulnerability-in-linux-linux-bde5cd</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56706-vulnerability-in-linux-linux-bde5c5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56705-vulnerability-in-linux-linux-bde5bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56704-vulnerability-in-linux-linux-bde5b5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56703-vulnerability-in-linux-linux-bde5a0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56702-vulnerability-in-linux-linux-bde593</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56701-vulnerability-in-linux-linux-bde58f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56701%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56700-vulnerability-in-linux-linux-bde582</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56700%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56699-vulnerability-in-linux-linux-bde57e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56698-vulnerability-in-linux-linux-bde57a</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56698%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56697-vulnerability-in-linux-linux-bde576</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56696-vulnerability-in-linux-linux-bde572</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56695-vulnerability-in-linux-linux-bde56e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56694-vulnerability-in-linux-linux-bdd160</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56693-vulnerability-in-linux-linux-bde56a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56692-vulnerability-in-linux-linux-bde54d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56691-vulnerability-in-linux-linux-bde549</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56690-vulnerability-in-linux-linux-bdd15c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd15c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56689-vulnerability-in-linux-linux-bde545</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56689%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56688-vulnerability-in-linux-linux-bde53f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56687-vulnerability-in-linux-linux-bde53d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56685-vulnerability-in-linux-linux-bde539</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56684-vulnerability-in-linux-linux-bde537</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56684%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56683-vulnerability-in-linux-linux-bdd154</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56682-vulnerability-in-linux-linux-bde535</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56681-vulnerability-in-linux-linux-bde533</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56680-vulnerability-in-linux-linux-bde526</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56679-vulnerability-in-linux-linux-bde504</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56679%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56678-vulnerability-in-linux-linux-bde500</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56678%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56677-vulnerability-in-linux-linux-bde4fc</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56677%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56676-vulnerability-in-linux-linux-bde4f8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56676%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-28-2e4838</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-28&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e4838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-28-f130ab</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f130ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12856-cwe-78-improper-neutralization-of-s-0b2870dd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12856%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Four-Faith%20F3x24&amp;severity=high&amp;id=6921acbf8e780dcd644b652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12987-os-command-injection-in-draytek-vigor2960-aeb8ab</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12987%3A%20OS%20Command%20Injection%20in%20DrayTek%20Vigor2960&amp;severity=medium&amp;id=682cd0f81484d88663aeb8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12986-os-command-injection-in-draytek-vigor2960-aebab4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12986%3A%20OS%20Command%20Injection%20in%20DrayTek%20Vigor2960&amp;severity=medium&amp;id=682cd0f91484d88663aebab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56675-vulnerability-in-linux-linux-bde4f4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56674-vulnerability-in-linux-linux-bde4f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56673-vulnerability-in-linux-linux-bde4ec</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56672-vulnerability-in-linux-linux-bde4e8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56672%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56671-vulnerability-in-linux-linux-bde4e4</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56670-vulnerability-in-linux-linux-bde4e0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56669-vulnerability-in-linux-linux-bde4be</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56668-vulnerability-in-linux-linux-bde4b8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56667-vulnerability-in-linux-linux-bde4b6</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56666-vulnerability-in-linux-linux-bde4b2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56666%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56665-vulnerability-in-linux-linux-bdd14c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56665%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56664-vulnerability-in-linux-linux-bde4b0</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56663-vulnerability-in-linux-linux-bdd148</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56662-vulnerability-in-linux-linux-bdd144</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56661-vulnerability-in-linux-linux-bde4a1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56660-vulnerability-in-linux-linux-bde49d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56660%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56659-vulnerability-in-linux-linux-bde497</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56658-vulnerability-in-linux-linux-bdd133</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56657-vulnerability-in-linux-linux-bde493</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56656-vulnerability-in-linux-linux-bde48f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56655-vulnerability-in-linux-linux-bdd12b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56654-vulnerability-in-linux-linux-bdd123</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56653-vulnerability-in-linux-linux-bde472</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56652-vulnerability-in-linux-linux-bde46e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56651-vulnerability-in-linux-linux-bdd11f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56651%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56650-vulnerability-in-linux-linux-bde46a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56650%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56649-vulnerability-in-linux-linux-bde466</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56648-vulnerability-in-linux-linux-bdd0ff</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56647-vulnerability-in-linux-linux-bde464</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56646-vulnerability-in-linux-linux-bde455</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56645-vulnerability-in-linux-linux-bde451</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56644-vulnerability-in-linux-linux-bdd0f7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56643-vulnerability-in-linux-linux-bde44d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56642-vulnerability-in-linux-linux-bdd0f1</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56641-vulnerability-in-linux-linux-bde449</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56640-vulnerability-in-linux-linux-bde43c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56639-vulnerability-in-linux-linux-bde41b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56638-vulnerability-in-linux-linux-bde415</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56637-vulnerability-in-linux-linux-bde411</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56636-vulnerability-in-linux-linux-bde40d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56635-vulnerability-in-linux-linux-bde3fe</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56634-vulnerability-in-linux-linux-bde3f8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56633-vulnerability-in-linux-linux-bde3f4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56633%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56632-vulnerability-in-linux-linux-bde3ec</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56631-vulnerability-in-linux-linux-bdd0eb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56630-vulnerability-in-linux-linux-bde3e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56630%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56629-vulnerability-in-linux-linux-bde3e4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56629%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56628-vulnerability-in-linux-linux-bde3c2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56628%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56627-vulnerability-in-linux-linux-bde3be</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56627%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56626-vulnerability-in-linux-linux-bde3ba</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56626%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56625-vulnerability-in-linux-linux-bde3b6</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56625%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56624-vulnerability-in-linux-linux-bde3b2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56624%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56623-vulnerability-in-linux-linux-aec086</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56623%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56622-vulnerability-in-linux-linux-bde3a5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56622%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56621-vulnerability-in-linux-linux-bde3a1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56621%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56620-vulnerability-in-linux-linux-bde39d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56620%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56619-vulnerability-in-linux-linux-bde399</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56619%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56618-vulnerability-in-linux-linux-bdf3cc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56618%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56617-vulnerability-in-linux-linux-bdf3c8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56617%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56616-vulnerability-in-linux-linux-bdf3c4</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56616%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56615-vulnerability-in-linux-linux-bdf3c0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56615%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56614-vulnerability-in-linux-linux-bdf3bc</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56614%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9823c4522896dcbdf3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56613-vulnerability-in-linux-linux-bdf3b8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56613%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56612-vulnerability-in-linux-linux-bdf3b2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56612%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56611-vulnerability-in-linux-linux-bdf3ac</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56611%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56610-vulnerability-in-linux-linux-bdf39b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56610%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56609-vulnerability-in-linux-linux-bdf397</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56609%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56608-vulnerability-in-linux-linux-bdf393</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56608%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56607-vulnerability-in-linux-linux-bdf38f</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56607%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56606-vulnerability-in-linux-linux-bdf38b</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56606%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56605-vulnerability-in-linux-linux-bdf37e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56605%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56604-vulnerability-in-linux-linux-bdf37a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56604%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56603-vulnerability-in-linux-linux-bdf376</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56603%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56602-vulnerability-in-linux-linux-bdf372</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56602%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56601-vulnerability-in-linux-linux-aec084</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56601%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56600-vulnerability-in-linux-linux-aec082</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56600%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56599-vulnerability-in-linux-linux-bdf36e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56599%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56598-vulnerability-in-linux-linux-bdf352</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56598%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56597-vulnerability-in-linux-linux-bdf34e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56597%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56596-vulnerability-in-linux-linux-bdf34a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56596%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56595-vulnerability-in-linux-linux-bdf346</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56595%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56594-vulnerability-in-linux-linux-bdf342</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56594%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56593-vulnerability-in-linux-linux-bdf33e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56593%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56592-vulnerability-in-linux-linux-bdf33a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56592%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56591-vulnerability-in-linux-linux-bdf336</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56591%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56590-vulnerability-in-linux-linux-bdf332</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56590%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56589-vulnerability-in-linux-linux-bdf32e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56589%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56588-vulnerability-in-linux-linux-bdf31b</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56588%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56587-vulnerability-in-linux-linux-bdf317</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56587%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56586-vulnerability-in-linux-linux-bdf313</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56586%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56585-vulnerability-in-linux-linux-bdf306</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56585%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56584-vulnerability-in-linux-linux-bdf302</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56584%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56583-vulnerability-in-linux-linux-bdd0da</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56583%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56582-vulnerability-in-linux-linux-bdf2fe</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56582%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56581-vulnerability-in-linux-linux-bdf2fa</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56581%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56580-vulnerability-in-linux-linux-bdf2f6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56580%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56579-vulnerability-in-linux-linux-bdf2f2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56579%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56578-vulnerability-in-linux-linux-bdf2ee</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56578%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56577-vulnerability-in-linux-linux-bdf2ce</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56577%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56576-vulnerability-in-linux-linux-bdf2ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56576%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56575-vulnerability-in-linux-linux-bdf2c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56575%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56574-vulnerability-in-linux-linux-bdf2ba</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56574%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56573-vulnerability-in-linux-linux-bdf2b6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56573%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56572-vulnerability-in-linux-linux-bdf2b2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56572%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9823c4522896dcbdf2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56570-vulnerability-in-linux-linux-bdf2a1</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56570%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56569-vulnerability-in-linux-linux-bdf299</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56569%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56568-vulnerability-in-linux-linux-bdf295</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56568%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56567-vulnerability-in-linux-linux-bdf291</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56567%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56566-vulnerability-in-linux-linux-bdf267</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56566%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56565-vulnerability-in-linux-linux-bdf261</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56565%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56564-vulnerability-in-linux-linux-bdf25d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56564%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56563-vulnerability-in-linux-linux-bdf255</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56563%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56562-vulnerability-in-linux-linux-bdf251</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56562%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56561-vulnerability-in-linux-linux-bdd0d4</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56561%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56560-vulnerability-in-linux-linux-bdf24d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56560%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56559-vulnerability-in-linux-linux-bdf240</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56559%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56558-vulnerability-in-linux-linux-bdf231</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56558%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56557-vulnerability-in-linux-linux-bdf229</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56557%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56556-vulnerability-in-linux-linux-bdf221</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56556%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56555-vulnerability-in-linux-linux-bdf200</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56555%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56554-vulnerability-in-linux-linux-bdf1fc</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56554%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56553-vulnerability-in-linux-linux-bdf1f8</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56553%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9823c4522896dcbdf1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56552-vulnerability-in-linux-linux-bdf1eb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56552%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56551-vulnerability-in-linux-linux-bdf1e7</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56551%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56550-vulnerability-in-linux-linux-bdd0d0</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56550%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56549-vulnerability-in-linux-linux-bdf1e3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56549%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56548-vulnerability-in-linux-linux-bdd0c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56548%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56547-vulnerability-in-linux-linux-bdf1df</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56547%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56546-vulnerability-in-linux-linux-bdf1d0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56546%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56545-vulnerability-in-linux-linux-bdf1c8</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56545%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56544-vulnerability-in-linux-linux-bdf1c0</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56544%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56543-vulnerability-in-linux-linux-bdf1a5</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56543%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56542-vulnerability-in-linux-linux-bdf1a1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56542%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56541-vulnerability-in-linux-linux-bdf19d</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56541%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56540-vulnerability-in-linux-linux-bdf199</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56540%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56539-vulnerability-in-linux-linux-bdf195</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56539%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56538-vulnerability-in-linux-linux-bdf188</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56538%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56537-vulnerability-in-linux-linux-bdf186</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56537%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56536-vulnerability-in-linux-linux-bdf177</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56536%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56535-vulnerability-in-linux-linux-bdf16f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56535%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56534-vulnerability-in-linux-linux-bdf167</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56534%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56533-vulnerability-in-linux-linux-bdf146</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56533%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56532-vulnerability-in-linux-linux-bdf142</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56532%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56531-vulnerability-in-linux-linux-bdf13e</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56531%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53239-vulnerability-in-linux-linux-bdf06d</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53239%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53238-vulnerability-in-linux-linux-bdf069</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53238%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53237-vulnerability-in-linux-linux-bdd094</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53237%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53236-vulnerability-in-linux-linux-bdf065</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53236%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53235-vulnerability-in-linux-linux-bdf061</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53235%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53234-vulnerability-in-linux-linux-bdd090</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53234%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53233-vulnerability-in-linux-linux-bdf052</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53233%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53232-vulnerability-in-linux-linux-bdf04a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53232%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53231-vulnerability-in-linux-linux-bdf026</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53231%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53230-vulnerability-in-linux-linux-bdf01e</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53230%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53229-vulnerability-in-linux-linux-bdf016</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53229%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53228-vulnerability-in-linux-linux-bdf00e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53228%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53227-vulnerability-in-linux-linux-bdf006</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53227%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53226-vulnerability-in-linux-linux-bdd08c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53226%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53225-vulnerability-in-linux-linux-bdf002</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53225%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53224-vulnerability-in-linux-linux-bdefe8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53224%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdefe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53223-vulnerability-in-linux-linux-bdefde</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53223%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdefde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53222-vulnerability-in-linux-linux-bdefd4</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53222%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdefd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53221-vulnerability-in-linux-linux-bdefca</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53221%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdefca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53220-vulnerability-in-linux-linux-bdefa2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53220%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdefa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53219-vulnerability-in-linux-linux-bdef91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53219%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53218-vulnerability-in-linux-linux-bdef89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53218%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53217-vulnerability-in-linux-linux-bdef81</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53217%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53216-vulnerability-in-linux-linux-bdef79</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53216%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53215-vulnerability-in-linux-linux-bdef71</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53215%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53214-vulnerability-in-linux-linux-bdef62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53214%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53213-vulnerability-in-linux-linux-bdef5a</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53213%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53212-vulnerability-in-linux-linux-bdef52</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53212%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53211-vulnerability-in-linux-linux-bdef4a</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53211%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53210-vulnerability-in-linux-linux-bdef33</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53210%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53209-vulnerability-in-linux-linux-bdd088</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53209%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53208-vulnerability-in-linux-linux-bdef2f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53208%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53207-vulnerability-in-linux-linux-bdd084</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53207%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53206-vulnerability-in-linux-linux-bdd077</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53206%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53205-vulnerability-in-linux-linux-bdef22</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53205%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53204-vulnerability-in-linux-linux-bdef15</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53204%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53203-vulnerability-in-linux-linux-bdef11</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53203%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53202-vulnerability-in-linux-linux-bdef0d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53202%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53201-vulnerability-in-linux-linux-bdd066</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53201%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53200-vulnerability-in-linux-linux-bdef09</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53200%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53199-vulnerability-in-linux-linux-bdef03</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53199%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53198-vulnerability-in-linux-linux-bdeeff</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53198%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeeff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53197-vulnerability-in-linux-linux-bdeefb</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53197%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53196-vulnerability-in-linux-linux-bdeee2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53196%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53195-vulnerability-in-linux-linux-bdeede</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53195%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53194-vulnerability-in-linux-linux-bdeeda</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53194%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53193-vulnerability-in-linux-linux-bdeed6</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53193%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53192-vulnerability-in-linux-linux-bdeed2</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53192%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53191-vulnerability-in-linux-linux-bdeece</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53191%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53190-vulnerability-in-linux-linux-bdeeca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53190%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeeca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53189-vulnerability-in-linux-linux-bdeeb9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53189%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53188-vulnerability-in-linux-linux-bdeea8</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53188%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53187-vulnerability-in-linux-linux-bdee9e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53187%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53186-vulnerability-in-linux-linux-bdd05e</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53186%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53185-vulnerability-in-linux-linux-bdee87</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53185%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53184-vulnerability-in-linux-linux-bdee83</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53184%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53183-vulnerability-in-linux-linux-bdee7f</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53183%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53182-vulnerability-in-linux-linux-bdee7b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53182%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53181-vulnerability-in-linux-linux-bdee77</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53181%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53180-vulnerability-in-linux-linux-bdee73</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53180%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53179-vulnerability-in-linux-linux-bdee64</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53179%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53178-vulnerability-in-linux-linux-bdee5c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53178%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53177-vulnerability-in-linux-linux-bdee54</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53177%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53176-vulnerability-in-linux-linux-bdee43</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53176%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53175-vulnerability-in-linux-linux-bdee2e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53175%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53174-vulnerability-in-linux-linux-bdee26</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53174%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53173-vulnerability-in-linux-linux-bdee1e</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53173%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53172-vulnerability-in-linux-linux-bdee1a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53172%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53171-vulnerability-in-linux-linux-bdee09</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53171%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53170-vulnerability-in-linux-linux-bdee01</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53170%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53169-vulnerability-in-linux-linux-bdd056</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53169%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53168-vulnerability-in-linux-linux-bdedf9</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53168%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdedf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53167-vulnerability-in-linux-linux-bdedea</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53167%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdedea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53166-vulnerability-in-linux-linux-bdede2</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53166%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdede2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53165-vulnerability-in-linux-linux-bdedda</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53165%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdedda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49034-vulnerability-in-linux-linux-be69b3</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982fc4522896dcbe69b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53164-vulnerability-in-linux-linux-bdedc3</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53164%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdedc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3393-cwe-754-improper-check-for-unusual-o-f11207db</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3393%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=68f7d9b3247d717aace26a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9774-improper-neutralization-of-escape-me-e7b311c3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9774%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences&amp;severity=medium&amp;id=699f6b5fb7ef31ef0b554bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39025-na-e17c52d5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39025%3A%20n%2Fa&amp;severity=high&amp;id=699f6c81b7ef31ef0b565b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54775-na-bdf1198d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54775%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55adc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54774-na-18b5f1dd</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54774%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55adc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54454-na-829134cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54454%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55acb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54453-na-3ac5e474</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54453%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc4b7ef31ef0b55acac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54452-na-9d1c2833</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54452%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55aca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54451-na-c2900097</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54451%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55aca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54450-na-779b3843</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54450%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc4b7ef31ef0b55ac4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53476-na-37e9909a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53476%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbeb7ef31ef0b55a94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50944-na-89791874</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50944%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba2b7ef31ef0b557661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50717-na-c294c54c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50717%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9eb7ef31ef0b55741a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50716-na-977e0b1c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50716%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9eb7ef31ef0b557416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50715-na-5df8748b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50715%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9eb7ef31ef0b557412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50714-na-13c00327</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50714%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9eb7ef31ef0b55740e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50713-na-9a67b25a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50713%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9eb7ef31ef0b55740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56527-cwe-79-improper-neutralization-of-i-ff48337e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56527%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20tecnick%20tcpdf&amp;severity=high&amp;id=690908557fff0e30cee2395d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56522-na-in-tecnick-tcpdf-1ac198de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56522%3A%20n%2Fa%20in%20tecnick%20tcpdf&amp;severity=high&amp;id=690908557fff0e30cee23956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56520-na-in-tecnick-tcpdf-7ebc4280</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56520%3A%20n%2Fa%20in%20tecnick%20tcpdf&amp;severity=high&amp;id=690908557fff0e30cee2394e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56519-na-in-tecnick-tcpdf-3ac2b4e4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56519%3A%20n%2Fa%20in%20tecnick%20tcpdf&amp;severity=high&amp;id=690908537fff0e30cee23933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-27-2e497b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-27&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e497b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-27-f127f7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f127f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12950-sql-injection-in-code-projects-travel-management-system-aeb886</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12950%3A%20SQL%20Injection%20in%20code-projects%20Travel%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56433-cwe-1188-initialization-of-a-resour-24812db8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56433%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20shadow-maint%20shadow-utils&amp;severity=low&amp;id=699f6bd4b7ef31ef0b55b42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54907-na-53869259</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54907%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc8b7ef31ef0b55ae4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-26-2ea936</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-26&amp;severity=medium&amp;id=682c7dc4e8347ec82d2ea936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-26-f12a08</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47102-cwe-863-incorrect-authorization-in--674783c3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47102%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20AIX&amp;severity=medium&amp;id=68e0f3c5b66c7f7acdd3ea64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10862-cwe-89-improper-neutralization-of-s-760918d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10862%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12335-cwe-639-authorization-bypass-throug-1ce9949e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12335%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11281-cwe-862-missing-authorization-in-we-702e4c16</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11281%3A%20CWE-862%20Missing%20Authorization%20in%20Webkul%20WooCommerce%20Point%20of%20Sale&amp;severity=critical&amp;id=699f6e0bb7ef31ef0b594307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12428-cwe-89-improper-neutralization-of-s-4a97fb46</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12428%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20peterschulznl%20WP%20Data%20Access%20%E2%80%93%20App%20Builder%20for%20Tables%2C%20Forms%2C%20Charts%2C%20Maps%20%26%20Dashboards&amp;severity=high&amp;id=699f6e3bb7ef31ef0b598985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12636-cwe-352-cross-site-request-forgery--eea6ecc5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12636%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wplegalpages%20Privacy%20Policy%20Generator%20%E2%80%93%20WPLP%20Legal%20Pages&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12190-cwe-862-missing-authorization-in-bi-5a9aef0f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12190%3A%20CWE-862%20Missing%20Authorization%20in%20bitpressadmin%20Bit%20Form%20%E2%80%93%20Custom%20Contact%20Form%2C%20Multi%20Step%2C%20Conversational%20Form%20%26%20Payment%20Form%20builder&amp;severity=medium&amp;id=699f6e31b7ef31ef0b59782d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12272-cwe-98-improper-control-of-filename-12e5a246</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12272%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Elementor%20Widgets%20%7C%20Create%20Travel%20Booking%20Website%20Using%20WordPress%20and%20Elementor&amp;severity=high&amp;id=699f6e35b7ef31ef0b597c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12413-cwe-862-missing-authorization-in-we-b55940fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12413%3A%20CWE-862%20Missing%20Authorization%20in%20webwizardsdev%20MarketKing%20%E2%80%94%20Ultimate%20WooCommerce%20Multivendor%20Marketplace%20Solution&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12032-cwe-89-improper-neutralization-of-s-79a84afa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12032%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themefic%20Tourfic%20%E2%80%93%20Travel%20Booking%2C%20Hotel%20Booking%20%26%20Car%20Rental%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56430-cwe-476-null-pointer-dereference-in-openfhe-openfhe-befabe</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56430%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenFHE%20OpenFHE&amp;severity=medium&amp;id=682d983ec4522896dcbefabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56431-n-a-in-n-a-bd8e61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56431%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd8e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-25-2eab77</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-25&amp;severity=medium&amp;id=682c7dc4e8347ec82d2eab77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-25-f127bb</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f127bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12746-cwe-89-improper-neutralization-of-s-2b4b1cfe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12746%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Amazon%20Amazon%20Redshift%20ODBC%20Driver&amp;severity=high&amp;id=68ee9df131414aa8fc5b888f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12745-cwe-89-improper-neutralization-of-s-329b03f8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12745%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Amazon%20Amazon%20Redshift%20Python%20Connector&amp;severity=high&amp;id=68ee9ff531414aa8fc5df08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12744-cwe-89-improper-neutralization-of-s-5dd14b8b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12744%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Amazon%20Amazon%20Redshift%20JDBC%20Driver&amp;severity=high&amp;id=68ee9ff531414aa8fc5df089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53163-vulnerability-in-linux-linux-bdedbf</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53163%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdedbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53162-vulnerability-in-linux-linux-bdedb2</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53162%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdedb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53161-vulnerability-in-linux-linux-bdedae</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53161%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdedae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53160-vulnerability-in-linux-linux-bdedaa</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53160%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdedaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53158-vulnerability-in-linux-linux-bdeda6</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53158%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53157-vulnerability-in-linux-linux-bdeda2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53157%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53156-vulnerability-in-linux-linux-bded91</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53156%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53155-vulnerability-in-linux-linux-bded89</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53155%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53154-vulnerability-in-linux-linux-bded81</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53154%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53153-vulnerability-in-linux-linux-bded6c</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53153%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53152-vulnerability-in-linux-linux-bded68</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53151-vulnerability-in-linux-linux-bded64</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53151%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53150-vulnerability-in-linux-linux-bded60</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53150%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53149-vulnerability-in-linux-linux-bded5c</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53148-vulnerability-in-linux-linux-bded58</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53148%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53147-vulnerability-in-linux-linux-bded54</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53147%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53146-vulnerability-in-linux-linux-bded47</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53145-vulnerability-in-linux-linux-bded36</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10856-cwe-89-improper-neutralization-of-s-1e9fe17d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10856%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=medium&amp;id=699f6dffb7ef31ef0b5927fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11726-cwe-89-improper-neutralization-of-s-ddc82510</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11726%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20Appointment%20Booking%20Calendar%20Plugin%20and%20Scheduling%20Plugin%20%E2%80%93%20BookingPress&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10584-cwe-434-unrestricted-upload-of-file-2fdd98d6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10584%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20designinvento%20DirectoryPress%20%E2%80%93%20Business%20Directory%20And%20Classified%20Ad%20Listing&amp;severity=medium&amp;id=699f6df6b7ef31ef0b59181f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12268-cwe-79-improper-neutralization-of-i-091dc120</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53241-vulnerability-in-linux-linux-bdf075</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53241%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53240-vulnerability-in-linux-linux-bdd098</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53240%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12881-cwe-862-missing-authorization-in-gi-fc6ba954</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12881%3A%20CWE-862%20Missing%20Authorization%20in%20giuse%20PlugVersions%20%E2%80%93%20Easily%20roll%20back%20to%20previous%20versions%20of%20your%20plugins.&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12850-cwe-22-improper-limitation-of-a-pat-c5f50ac2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12850%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sminozzi%20Database%20Backup%20and%20Table%20Integrity%20Check%20with%20Automated%20Scheduling&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12031-cwe-89-improper-neutralization-of-s-dc9421ec</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12031%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CodeTides%20Advanced%20Floating%20Content&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12103-cwe-639-authorization-bypass-throug-a49b7ed2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12103%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20giuse%20Content%20No%20Cache%20%7C%20Serve%20uncached%20partial%20content%20even%20when%20you%20add%20it%20to%20a%20page%20that%20is%20fully%20cached.&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8721-cwe-79-improper-neutralization-of-in-2a75be38</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20data443%20Tracking%20Code%20Manager&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12468-cwe-79-improper-neutralization-of-i-a6f15beb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12468%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20WP%20Datepicker&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11896-cwe-79-improper-neutralization-of-i-311f0594</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flippercode%20Text%20Prompter%20%E2%80%93%20Unlimited%20chatgpt%20text%20prompts%20for%20openai%20tasks&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12814-cwe-79-improper-neutralization-of-i-8200de32</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aerin%20Loan%20Comparison&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41882-cwe-121-stack-based-buffer-overflow-7fe7da6e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41882%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20XRN-420S&amp;severity=medium&amp;id=68e0f3c3b66c7f7acdd3e9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41885-cwe-547-use-of-hard-coded-security--38f3463b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41885%3A%20CWE-547%20Use%20of%20Hard-coded%2C%20Security-relevant%20Constants%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20XRN-420S&amp;severity=medium&amp;id=68e0f3c3b66c7f7acdd3e9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41886-cwe-755-improper-handling-of-except-95832833</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41886%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20XRN-420S&amp;severity=medium&amp;id=68e0f3c3b66c7f7acdd3e9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12405-cwe-79-improper-neutralization-of-i-ea001e9c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20Export%20Customers%20Data&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12100-cwe-79-improper-neutralization-of-i-6eb21f16</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12100%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getalby%20Bitcoin%20Lightning%20Publisher%20for%20WordPress&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5973a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12622-cwe-79-improper-neutralization-of-i-ef0fa18e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12622%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12594-cwe-862-missing-authorization-in-zi-f5f5f7c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12594%3A%20CWE-862%20Missing%20Authorization%20in%20zia-imtiaz%20Login%20Page%20Styler%20%E2%80%93%20Custom%20WordPress%20Login%20Page%20Customizer%20%26%20Security&amp;severity=high&amp;id=699f6e43b7ef31ef0b59bfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12210-cwe-862-missing-authorization-in-ty-d60f580e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12210%3A%20CWE-862%20Missing%20Authorization%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e32b7ef31ef0b59797e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11885-cwe-79-improper-neutralization-of-i-67cc642e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ninjateam%20WP%20Telegram%20Chat%20Widget&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12034-cwe-340-generation-of-predictable-n-4d56d289</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12034%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20webfactory%20Advanced%20Google%20reCAPTCHA&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41887-cwe-22-improper-limitation-of-a-pat-c6b181c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41887%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20XRN-420S&amp;severity=medium&amp;id=68e0f3c3b66c7f7acdd3e9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12617-cwe-862-missing-authorization-in-kk-0ae77bc9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12617%3A%20CWE-862%20Missing%20Authorization%20in%20kkarpieszuk%20WC%20Price%20History&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12507-cwe-79-improper-neutralization-of-i-e44d469a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12507%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optio%20Optio%20Dentistry&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12518-cwe-79-improper-neutralization-of-i-da886c2a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12518%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20denischerniatev%20ShMapper%20by%20Teplitsa&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12710-cwe-79-improper-neutralization-of-i-9f7a37ee</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marcelismus%20WP-Appbox&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12266-cwe-862-missing-authorization-in-el-aede92ad</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12266%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WooCommerce%20Dynamic%20Pricing%20and%20Discounts&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12582-authentication-bypass-by-primary-weakness-aebac4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12582%3A%20Authentication%20Bypass%20by%20Primary%20Weakness&amp;severity=high&amp;id=682cd0f91484d88663aebac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47515-unix-symbolic-link-symlink-followin-e8f77f1a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47515%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following&amp;severity=high&amp;id=699f6d08b7ef31ef0b56d5ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9427-improper-encoding-or-escaping-of-out-5986abeb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9427%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5512e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-24-2eae63</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-24&amp;severity=medium&amp;id=682c7dc4e8347ec82d2eae63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-24-f122e7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f122e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56326-cwe-1336-improper-neutralization-of-f2446132</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56326%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20pallets%20jinja&amp;severity=medium&amp;id=690908537fff0e30cee23927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55539-cwe-327-in-acronis-acronis-cyber-pr-4585c20b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55539%3A%20CWE-327%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=low&amp;id=6840c579182aa0cae2c16b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11230-cwe-79-improper-neutralization-of-i-a1fc50f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11230%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Ultimate%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5941bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-23-4400e1aa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-23&amp;severity=medium&amp;id=68367c96182aa0cae23194c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-23-f214be</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-23&amp;severity=medium&amp;id=682acdc4bbaf20d303f214be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-23-f130e9</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f130e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11852-cwe-862-missing-authorization-in-bd-b338ec94</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11852%3A%20CWE-862%20Missing%20Authorization%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56375-cwe-191-integer-underflow-wrap-or-w-2d8e0277</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56375%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20nicmx%20fort-validator&amp;severity=high&amp;id=699f6bd4b7ef31ef0b55b423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56378-na-5fee72cb</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56378%3A%20n%2Fa&amp;severity=medium&amp;id=690908537fff0e30cee2392d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-22-2ea759</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-22&amp;severity=medium&amp;id=682c7dc4e8347ec82d2ea759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-22-f13112</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-22&amp;severity=medium&amp;id=682acdc2bbaf20d303f13112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51463-cwe-918-server-side-request-forgery-2fadafb6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51463%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=69092eea35043901e82cab3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51464-cwe-288-authentication-bypass-using-496525a3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51464%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel&amp;severity=medium&amp;id=69092eea35043901e82cab3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12875-cwe-73-external-control-of-file-nam-ba658b78</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12875%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12591-cwe-79-improper-neutralization-of-i-a4f8a052</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wbolt%20MagicPost%20%E2%80%93%20WordPress%E6%96%87%E7%AB%A0%E7%AE%A1%E7%90%86%E5%8A%9F%E8%83%BD%E5%A2%9E%E5%BC%BA%E6%8F%92%E4%BB%B6&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10453-cwe-79-improper-neutralization-of-i-3733e345</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=699f6df4b7ef31ef0b5914c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11688-cwe-79-improper-neutralization-of-i-2cc2dc79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11688%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20van-abel%20LaTeX2HTML&amp;severity=medium&amp;id=699f6e19b7ef31ef0b595256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11722-cwe-89-improper-neutralization-of-s-12c171f0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11722%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12408-cwe-79-improper-neutralization-of-i-be544bd4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12408%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpseahorse%20WP%20on%20AWS&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12558-cwe-862-missing-authorization-in-pu-e3355edd</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12558%3A%20CWE-862%20Missing%20Authorization%20in%20puckrobin%20WP%20BASE%20Booking%20of%20Appointments%2C%20Services%20and%20Events&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59be83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10797-cwe-639-authorization-bypass-throug-cb71580a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10797%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20solitweb%20Full%20Screen%20Menu%20for%20Elementor&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b592675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11808-cwe-79-improper-neutralization-of-i-0dee5848</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pingmeter%20Pingmeter%20Uptime%20Monitoring&amp;severity=medium&amp;id=699f6e20b7ef31ef0b596672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12588-cwe-79-improper-neutralization-of-i-5df9e959</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9545-cwe-79-improper-neutralization-of-in-70b0a9d1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9545%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5521f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11975-cwe-352-cross-site-request-forgery--8d8cdc14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11975%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reactflow%20Reactflow%20Visitor%20Recording%20and%20Heatmaps&amp;severity=medium&amp;id=699f6e29b7ef31ef0b597003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11682-cwe-79-improper-neutralization-of-i-a66694f6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moonheart%20G%20Web%20Pro%20Store%20Locator&amp;severity=medium&amp;id=699f6e18b7ef31ef0b59523d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11196-cwe-79-improper-neutralization-of-i-5c68cc54</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11196%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tugbucket%20Multi-column%20Tag%20Map&amp;severity=medium&amp;id=699f6e08b7ef31ef0b593f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12697-cwe-79-improper-neutralization-of-i-529cd99f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmaster-1%20real.Kit&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12262-cwe-79-improper-neutralization-of-i-253d6632</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12262%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motovnet%20Ebook%20Store&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12635-cwe-89-improper-neutralization-of-s-76e2fd75</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12635%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fahadmahmood%20WP%20Docs&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11938-cwe-79-improper-neutralization-of-i-d6c8c286</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11938%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpswings%20One%20Click%20Upsell%20Funnel%20for%20Woocommerce&amp;severity=medium&amp;id=699f6e28b7ef31ef0b596ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12721-cwe-502-deserialization-of-untruste-529d4f2f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12721%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webbuilder143%20Custom%20Product%20tabs%20for%20WooCommerce&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12771-cwe-352-cross-site-request-forgery--4b51b2e3</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12771%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20implecode%20eCommerce%20Product%20Catalog%20Plugin%20for%20WordPress&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12066-cwe-73-external-control-of-file-nam-30bc68ed</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12066%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20smsaexpress%20SMSA%20Shipping%20(official)&amp;severity=high&amp;id=699f6e2db7ef31ef0b597375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11287-cwe-79-improper-neutralization-of-i-2bd2aac7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11287%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motovnet%20Ebook%20Store&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b5943e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11977-cwe-94-improper-control-of-generati-c3c5aad9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11977%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20properfraction%20kk%20Star%20Ratings%20%E2%80%93%20Rate%20Post%20%26%20Collect%20User%20Feedbacks&amp;severity=high&amp;id=699f6e29b7ef31ef0b597008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11349-cwe-288-authentication-bypass-using-d4a22556</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11349%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=699f6e0fb7ef31ef0b5946cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-21-f12f5e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11811-cwe-79-improper-neutralization-of-i-702c9399</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20feedify%20Feedify%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=medium&amp;id=699f6e22b7ef31ef0b59673d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12840-bd683e</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12840&amp;severity=low&amp;id=682d9816c4522896dcbd683e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56337-cwe-367-time-of-check-time-of-use-t-6d46fd7b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56337%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=690204553aaa02566521b568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12014-cwe-20-improper-input-validation-in-lleidanet-pki-esigna-aeb014</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12014%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Lleidanet%20PKI%20eSigna&amp;severity=low&amp;id=682cd0f71484d88663aeb014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11878-cwe-79-improper-neutralization-of-i-57b884ad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gbsdeveloper%20Category%20Post%20Slider&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12506-cwe-79-improper-neutralization-of-i-77007fc5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magblogapi%20NACC%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11774-cwe-79-improper-neutralization-of-i-bb9d437d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11774%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20outdooractive%20Outdooractive%20Embed&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b59642d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11783-cwe-79-improper-neutralization-of-i-17ca58a4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20financecalculatorwp%20Financial%20Calculator&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b5964a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11806-cwe-79-improper-neutralization-of-i-f78e7af5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carlosfrancopkt1%20PKT1%20Centro%20de%20envios&amp;severity=medium&amp;id=699f6e20b7ef31ef0b59666a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11893-cwe-79-improper-neutralization-of-i-308039e5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spoki%20Spoki%20%E2%80%93%20Chat%20Buttons%20and%20WooCommerce%20Notifications&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11331-cwe-79-improper-neutralization-of-i-848a5f49</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11331%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6e0db7ef31ef0b59450b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11784-cwe-79-improper-neutralization-of-i-92667a75</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11784%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ticketsource%20TicketSource%20Ticket%20Shop&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b5964a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9619-cwe-79-improper-neutralization-of-in-c07704bc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20holithemes%20WP%20SHAPES&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11297-cwe-200-exposure-of-sensitive-infor-ea7193df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11297%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cyberlord92%20Page%20and%20Post%20Restriction&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b594406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12509-cwe-79-improper-neutralization-of-i-a19fc89a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rluks%20Embed%20Twine&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11812-cwe-352-cross-site-request-forgery--a6590fca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11812%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20seopilot%20Wtyczka%20SeoPilot%20dla%20WP&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12571-cwe-98-improper-control-of-filename-dcc6c7d2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12571%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20moaluko%20Store%20Locator%20for%20WordPress%20with%20Google%20Maps%20%E2%80%93%20LotsOfLocales&amp;severity=critical&amp;id=699f6e43b7ef31ef0b59bef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11411-cwe-79-improper-neutralization-of-i-90418d0c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20socratous139%20Spotlightr&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11775-cwe-79-improper-neutralization-of-i-414db0ab</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11775%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aasthasolutions%20Particle%20Background&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9503-cwe-284-improper-access-control-in-y-b9f8c8ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9503%3A%20CWE-284%20Improper%20Access%20Control%20in%20ilyasine%20Maintenance%20%26%20Coming%20Soon%20Redirect%20Animation&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b551496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21549-improper-input-validation-in-spatie-ef29ca2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21549%3A%20Improper%20Input%20Validation%20in%20spatie%2Fbrowsershot&amp;severity=high&amp;id=68e0f3c1b66c7f7acdd3e952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44298-an-app-may-be-able-to-access-inform-cb47bd56</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44298%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7635043901e828b267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44293-a-user-may-be-able-to-view-sensitiv-9a50f156</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44293%3A%20A%20user%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7435043901e828ad72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44211-an-app-may-be-able-to-access-user-s-6eb7ae46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44211%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a3fe7723195e0fd273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44231-a-person-with-physical-access-to-a--48bed393</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44231%3A%20A%20person%20with%20physical%20access%20to%20a%20Mac%20may%20be%20able%20to%20bypass%20Login%20Window%20during%20a%20software%20update%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a5fe7723195e0fd3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44292-an-app-may-be-able-to-access-sensit-ed340ed6</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44292%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7435043901e828ad6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44195-an-app-may-be-able-to-read-arbitrar-67a739a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44195%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a1fe7723195e0fd1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44223-an-attacker-with-physical-access-to-ca389ec7</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44223%3A%20An%20attacker%20with%20physical%20access%20to%20a%20Mac%20may%20be%20able%20to%20view%20protected%20content%20from%20the%20Login%20Window%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a5fe7723195e0fd397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42867-an-app-may-be-able-to-gain-root-pri-73301ec0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42867%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20GarageBand&amp;severity=high&amp;id=690a554ca730e5a3d9d77d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11776-cwe-79-improper-neutralization-of-i-0fe377c2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mstdev%20PCRecruiter%20Extensions&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54538-a-remote-attacker-may-be-able-to-ca-ca1c3054</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54538%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb833e6bfc5ba1df6ee4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12831-cwe-863-incorrect-authorization-in--e7480ed5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12831%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Arista%20NG%20Firewall&amp;severity=medium&amp;id=699f6e49b7ef31ef0b59c598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12832-cwe-89-improper-neutralization-of-s-0547d6b3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12832%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Arista%20NG%20Firewall&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12830-cwe-22-improper-limitation-of-a-pat-9fc5f39a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12830%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Arista%20NG%20Firewall&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12829-cwe-78-improper-neutralization-of-s-04658dd4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12829%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Arista%20NG%20Firewall&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37758-na-79d7bf3f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37758%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6db7ef31ef0b563ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55509-na-27761b17</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55509%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55471-na-0a1b5049</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55471%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55470-na-332d0185</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55470%3A%20n%2Fa&amp;severity=high&amp;id=699f6bceb7ef31ef0b55b177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55342-na-bce61153</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55342%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55341-na-6fc9ca66</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55341%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55186-na-902b584b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55186%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55b072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-20-f12d0d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12111-cwe-77-improper-neutralization-of-s-32e0b055</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12111%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20OpenText%20Privileged%20Access%20Manager&amp;severity=high&amp;id=68e8048eba0e608b4faa7cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7139-cwe-787-out-of-bounds-write-in-silab-f03ca53f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7139%3A%20CWE-787%20Out-of-bounds%20Write%20in%20silabs.com%20RS9116%20Bluetooth%20SDK&amp;severity=medium&amp;id=68371302182aa0cae24e8df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7138-cwe-617-reachable-assertion-in-silab-fbeafb39</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7138%3A%20CWE-617%20Reachable%20Assertion%20in%20silabs.com%20RS9116%20Bluetooth%20SDK&amp;severity=medium&amp;id=68371302182aa0cae24e8df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7137-cwe-787-out-of-bounds-write-in-silab-31515c10</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7137%3A%20CWE-787%20Out-of-bounds%20Write%20in%20silabs.com%20RS9116%20Bluetooth%20SDK&amp;severity=medium&amp;id=68371302182aa0cae24e8df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7005-cwe-757-selection-of-less-secure-alg-31e555f1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7005%3A%20CWE-757%3A%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20Sciener%20TTLock%20App&amp;severity=high&amp;id=690a47466d939959c80222e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25131-improper-input-validation-f5ba9b27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25131%3A%20Improper%20Input%20Validation&amp;severity=high&amp;id=699f6d5fb7ef31ef0b570c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37962-improper-neutralization-of-input-du-f8005dfa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agency%20Dominion%20Inc.%20Fusion&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12626-cwe-79-improper-neutralization-of-i-582f3527</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rubengc%20AutomatorWP%20%E2%80%93%20Automator%20plugin%20for%20no-code%20automations%2C%20webhooks%20%26%20custom%20integrations%20in%20WordPress&amp;severity=critical&amp;id=699f6e46b7ef31ef0b59c260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12331-cwe-862-missing-authorization-in-ni-8188a7ca</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12331%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20File%20Manager%20Pro%20%E2%80%93%20Filester&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11616-cwe-125-out-of-bounds-read-in-netsk-1aa033af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11616%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Netskope%20Inc.%20Endpoint%20DLP&amp;severity=medium&amp;id=68487f5c1b0bd07c3938d492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12560-cwe-200-exposure-of-sensitive-infor-4367c46f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12560%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bplugins%20Button%20Block%20%E2%80%93%20Design%20Stylish%2C%20Interactive%2C%20and%20Multi-Functional%20Buttons&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59beeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11768-cwe-285-improper-authorization-in-c-84485711</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11768%3A%20CWE-285%20Improper%20Authorization%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11740-cwe-94-improper-control-of-generati-2f16088c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11740%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20codename065%20Download%20Manager&amp;severity=high&amp;id=699f6e1bb7ef31ef0b5955a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12121-cwe-918-server-side-request-forgery-254e8786</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12121%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20cyberlord92%20Broken%20Link%20Checker%20%7C%20Finder&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b597589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10548-cwe-200-exposure-of-sensitive-infor-ec36cf83</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10548%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wedevs%20Project%20Manager%20%E2%80%93%20AI%20Powered%20Project%20Management%2C%20Task%20Management%2C%20Kanban%20Board%20%26%20Time%20Tracker&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35141-cwe-250-execution-with-unnecessary--859c3c5d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35141%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Verify%20Access%20Docker&amp;severity=high&amp;id=69092624fe7723195e0b47b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55196-na-720551df</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55196%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55082-na-89741141</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55082%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55081-na-ff7ef29f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55081%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54984-na-c0964204</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54984%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bcab7ef31ef0b55af35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54983-na-c628e6f1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54983%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bcab7ef31ef0b55af32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54982-na-82c984a4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54982%3A%20n%2Fa&amp;severity=null&amp;id=699f6bcab7ef31ef0b55af2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54790-na-9f42e346</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54790%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc6b7ef31ef0b55adc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54663-na-043898c9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54663%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc4b7ef31ef0b55acbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-19-f127b7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f127b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56145-cwe-94-improper-control-of-generati-9fe73915</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56145%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=critical&amp;id=6839b29a182aa0cae2b1bcf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12686-cwe-78-improper-neutralization-of-s-e59dcf8c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12686%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BeyondTrust%20Remote%20Support(RS)%20%26%20Privileged%20Remote%20Access(PRA)&amp;severity=medium&amp;id=68f7d9b0247d717aace268b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56047-improper-neutralization-of-special--6d07cc41</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56047%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df0725e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56053-improper-neutralization-of-special--bb3567ef</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56053%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df0731e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56048-missing-authorization-in-vibethemes-568db5b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56048%3A%20Missing%20Authorization%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56050-unrestricted-upload-of-file-with-da-e1c58de0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56050%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56052-unrestricted-upload-of-file-with-da-97ee6a1e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56052%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bee6bfc5ba1df07315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56054-unrestricted-upload-of-file-with-da-17f6a1fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56054%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56057-unrestricted-upload-of-file-with-da-8a7cfff5</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56057%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df0732a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54381-missing-authorization-in-dotstore-a-99d1f845</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54381%3A%20Missing%20Authorization%20in%20Dotstore%20Advance%20Menu%20Manager&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54383-incorrect-privilege-assignment-in-w-d7e18378</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54383%3A%20Incorrect%20Privilege%20Assignment%20in%20wpweb%20WooCommerce%20PDF%20Vouchers&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56049-path-traversal-in-vibethemes-wplms-987f8ef5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56049%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56055-path-traversal-in-vibethemes-wplms-22dc8d4d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56055%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56051-improper-control-of-generation-of-c-238e4dc8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56051%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df0726a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52485-missing-authorization-in-yudiz-solu-e8985bf9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52485%3A%20Missing%20Authorization%20in%20Yudiz%20Solutions%20Ltd.%20WP%20Menu%20Image&amp;severity=null&amp;id=69cd7553e6bfc5ba1df040a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55997-missing-authorization-in-webchunky--67cf3ed7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55997%3A%20Missing%20Authorization%20in%20webchunky%20Order%20Delivery%20%26%20Pickup%20Location%20Date%20Time&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49677-improper-neutralization-of-input-du-a4bb9453</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49677%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Cramer%20Bootstrap%20Buttons&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51646-improper-neutralization-of-input-du-d4e09c63</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saoshyant1994%20Saoshyant%20Element&amp;severity=high&amp;id=69cd750de6bfc5ba1df027c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54350-improper-neutralization-of-input-du-0b3489e5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hjyl%20hmd&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56010-improper-neutralization-of-input-du-b62347dd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56010%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pierre%20Lannoy%20Device%20Detector&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56016-improper-neutralization-of-input-du-919165bc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56016%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maartenhemmes%20Image%20Mapper&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55975-improper-neutralization-of-special--b9c947ed</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55975%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rohit%20Urane%20Dr%20Affiliate&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55984-improper-neutralization-of-special--b59ff7a3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55984%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20susheelhbti%20Saksh%20Escrow%20System&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55985-improper-neutralization-of-special--796eec06</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55985%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ydesignservices%20YDS%20Support%20Ticket%20System&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56058-deserialization-of-untrusted-data-i-16800b56</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56058%3A%20Deserialization%20of%20Untrusted%20Data%20in%20denniskravetstns%20VRPConnector&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df0732d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56059-improperly-controlled-modification--c9509616</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56059%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20farinspace%20Partners&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56008-missing-authorization-in-spreadr-sp-4a391a8b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56008%3A%20Missing%20Authorization%20in%20spreadr%20Spreadr%20Woocommerce&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df0704a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4996-cwe-259-use-of-hard-coded-password-i-e97650c2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4996%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Asseco%20Business%20Solutions%20S.A.%20Wapro%20ERP%20Desktop&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4995-cwe-757-selection-of-less-secure-alg-9627418e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4995%3A%20CWE-757%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20Asseco%20Business%20Solutions%20S.A.%20Wapro%20ERP%20Desktop&amp;severity=critical&amp;id=68e0f3bfb66c7f7acdd3cbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11912-cwe-89-improper-neutralization-of-s-a5a6a755</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11912%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ShineTheme%20Travel%20Booking%20WordPress%20Theme&amp;severity=high&amp;id=699f6e27b7ef31ef0b596d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11291-cwe-200-exposure-of-sensitive-infor-7926587b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11291%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cozmoslabs%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b5943f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11926-cwe-862-missing-authorization-in-sh-929e5864</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11926%3A%20CWE-862%20Missing%20Authorization%20in%20ShineTheme%20Travel%20Booking%20WordPress%20Theme&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12454-cwe-352-cross-site-request-forgery--c679f564</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12454%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20iovamihai%20Affiliate%20Program%20Suite%20%E2%80%94%20SliceWP%20Affiliates&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12554-cwe-352-cross-site-request-forgery--2a5f333b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12554%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pkthree%20Peter%E2%80%99s%20Custom%20Anti-Spam&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12340-cwe-200-exposure-of-sensitive-infor-b2774ca0</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12340%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wealcoder%20Animation%20Addons%20for%20Elementor%20%E2%80%93%20GSAP%20Motion%20Elementor%20Addons%20%26%20Website%20Templates&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11614-out-of-bounds-read-68e135ee</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11614%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=690ebb293a8fd010ecf4f0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11295-cwe-200-exposure-of-sensitive-infor-920f314c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11295%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pluginsandsnippets%20Simple%20Page%20Access%20Restriction&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b594401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12287-cwe-287-improper-authentication-in--82db2f4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12287%3A%20CWE-287%20Improper%20Authentication%20in%20Mikado-Themes%20Biagiotti%20Membership&amp;severity=critical&amp;id=699f6e35b7ef31ef0b597cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12698-uncontrolled-resource-consumption-644f09bb</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12698%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=691f5eed11cb603d890ffb75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12061-cwe-639-authorization-bypass-throug-f8968da8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12061%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nicheaddons%20Events%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12250-cwe-200-exposure-of-sensitive-infor-78307a31</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12250%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20zealopensource%20Accept%20Authorize.NET%20Payments%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12449-cwe-79-improper-neutralization-of-i-64decf1d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Video%20Share%20VOD%20%E2%80%93%20Turnkey%20Video%20Site%20Builder%20Script&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12596-cwe-862-missing-authorization-in-ch-e333da15</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12596%3A%20CWE-862%20Missing%20Authorization%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59c00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12259-cwe-862-missing-authorization-in-sw-a3cca9b9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12259%3A%20CWE-862%20Missing%20Authorization%20in%20sweetdaisy86%20RepairBuddy%20%E2%80%93%20Repair%20Shop%20CRM%20%26%20Booking%20Plugin%20for%20WordPress&amp;severity=high&amp;id=699f6e33b7ef31ef0b597ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11254-cwe-79-improper-neutralization-of-i-96aae237</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11254%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5941cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12025-cwe-89-improper-neutralization-of-s-a91544b6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12025%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robfelty%20Collapsing%20Categories&amp;severity=high&amp;id=699f6e2ab7ef31ef0b5970ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12432-cwe-330-use-of-insufficiently-rando-c0b48066</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12432%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20wpclever%20WPC%20Shop%20as%20a%20Customer%20for%20WooCommerce&amp;severity=high&amp;id=699f6e3bb7ef31ef0b598989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12513-cwe-79-improper-neutralization-of-i-f39949ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rewardsfuel%20Contests%20by%20Rewards%20Fuel&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11881-cwe-79-improper-neutralization-of-i-a40b4ad2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11881%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tymotey%20Easy%20Waveform%20Player&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12500-cwe-79-improper-neutralization-of-i-db071bd7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20philantro%20Philantro%20%E2%80%93%20Donations%20and%20Donor%20Management&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11748-cwe-79-improper-neutralization-of-i-e87bc101</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taeggie%20Taeggie%20Feed&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b5955b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11439-cwe-79-improper-neutralization-of-i-db56514a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aklaren%20ScanCircle&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39703-cwe-77-improper-neutralization-of-s-41a2005b</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39703%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ThreatQuotient%20ThreatQ&amp;severity=high&amp;id=699f6c87b7ef31ef0b565e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37649-na-48eb3db1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37649%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6ab7ef31ef0b563d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56175-na-a6a57ea0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56175%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56174-na-82894965</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56174%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd4b7ef31ef0b55b41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56173-na-a48d97f3</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56173%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56170-na-679e03e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56170%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56116-na-663464da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56116%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd4b7ef31ef0b55b414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56115-na-efecd47d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56115%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55506-na-84bae616</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55506%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd0b7ef31ef0b55b212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55492-na-62658497</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55492%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd0b7ef31ef0b55b204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55461-na-fa95add8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55461%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bceb7ef31ef0b55b174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55239-na-9186174e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55239%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55232-na-0d340010</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55232%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55231-na-1101bc43</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55231%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55088-na-8ccb3abf</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55088%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55086-na-06e2877c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55086%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49202-na-c62dcc03</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49202%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7eb7ef31ef0b555f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49201-na-32e32027</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49201%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7eb7ef31ef0b555f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53580-na-47eb6df2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53580%3A%20n%2Fa&amp;severity=high&amp;id=690916c8c28fd46ded7ccf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-qualcomm-dsp-driver-how-serbian-authorities-have-deployed-surveillance-technology-and-digital-repression-tactics-775699</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Qualcomm%20DSP%20Driver%20-%20How%20Serbian%20authorities%20have%20deployed%20surveillance%20technology%20and%20digital%20repression%20tactics&amp;severity=low&amp;id=682c7ad6e3e6de8ceb775699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-18-f1222b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f1222b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-qualcomm-dsp-driver-how-serbian-authorities-have-deployed-surveillance-technology-and-digital-repression-tactics-f0c538</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Qualcomm%20DSP%20Driver%20-%20How%20Serbian%20authorities%20have%20deployed%20surveillance%20technology%20and%20digital%20repression%20tactics&amp;severity=low&amp;id=682acdbebbaf20d303f0c538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10973-cleartext-transmission-of-sensitive-cea2ee02</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10973%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information&amp;severity=medium&amp;id=691f5c4ee672cd9080e8d4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9779-trust-boundary-violation-466771f6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9779%3A%20Incorrect%20Privilege%20Assignment&amp;severity=high&amp;id=691f769028b41f27b43d128a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53144-vulnerability-in-linux-linux-bdd039</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12178-cwe-787-out-of-bounds-write-in-auto-6bc3f712</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12178%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Navisworks%20Freedom&amp;severity=high&amp;id=697275ff4623b1157c865181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10356-cwe-200-exposure-of-sensitive-infor-7c50559e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10356%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20quomodosoft%20ElementsReady%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54677-cwe-400-uncontrolled-resource-consu-6f69d5ac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54677%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=690204553aaa02566521b57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50379-cwe-367-time-of-check-time-of-use-t-8b074b84</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50379%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=690204553aaa02566521b56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11280-cwe-200-exposure-of-sensitive-infor-fe8cc27c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11280%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20buildwps%20PPWP%20%E2%80%93%20Password%20Protect%20Pages&amp;severity=medium&amp;id=699f6e0bb7ef31ef0b594303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9654-cwe-863-incorrect-authorization-in-s-e2ba65cd</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9654%3A%20CWE-863%20Incorrect%20Authorization%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=low&amp;id=699f6b56b7ef31ef0b55311b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12395-cwe-79-improper-neutralization-of-i-2757d2ce</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12395%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amitwpdeveloper%20Additional%20Fees%20For%20WooCommerce%20Checkout&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12601-cwe-400-uncontrolled-resource-consu-6f42d1ac</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12601%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12469-cwe-79-improper-neutralization-of-i-da58aaf7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12469%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20puckrobin%20WP%20BASE%20Booking%20of%20Appointments%2C%20Services%20and%20Events&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12127-cwe-80-improper-neutralization-of-s-3efe2daf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12127%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mantrabrain%20Learning%20Management%20System%2C%20eLearning%2C%20Course%20Builder%2C%20WordPress%20LMS%20Plugin%20%E2%80%93%20Sikshya%20LMS&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b597595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12024-cwe-79-improper-neutralization-of-i-4058fca1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12024%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=high&amp;id=699f6e2ab7ef31ef0b5970c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8326-cwe-200-exposure-of-sensitive-inform-5250c388</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8326%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=high&amp;id=699f6c26b7ef31ef0b5607e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12293-cwe-352-cross-site-request-forgery--0aa7c66b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12293%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shinephp%20User%20Role%20Editor&amp;severity=high&amp;id=699f6e35b7ef31ef0b597cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11294-cwe-200-exposure-of-sensitive-infor-99013c88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11294%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20memberful%20Memberful%20%E2%80%93%20Membership%20Plugin&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b5943fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12220-cwe-352-cross-site-request-forgery--6b6c706d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12220%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theafricanboss%20SMS%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e32b7ef31ef0b597996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12219-cwe-352-cross-site-request-forgery--7649af6d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12219%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tomroyal%20Stop%20Registration%20Spam&amp;severity=medium&amp;id=699f6e32b7ef31ef0b597991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9624-cwe-918-server-side-request-forgery--a39dcd27</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9624%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Soflyy%20WP%20All%20Import%20Pro&amp;severity=high&amp;id=699f6b54b7ef31ef0b552435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12356-cwe-77-improper-neutralization-of-s-205fd629</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12356%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20BeyondTrust%20Remote%20Support&amp;severity=critical&amp;id=68f7d9b0247d717aace268ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12239-cwe-79-improper-neutralization-of-i-aef469a7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Lite%20for%20Beaver%20Builder&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31668-na-8a583600</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31668%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd5b7ef31ef0b58f06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29646-na-fb948604</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29646%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da0b7ef31ef0b589860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37607-na-168ae79d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37607%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37606-na-7c5a8168</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37606%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37605-na-ddac1006</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37605%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36832-na-54cf0ed1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36832%3A%20n%2Fa&amp;severity=high&amp;id=699f6c66b7ef31ef0b563a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36831-na-142b5259</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36831%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c66b7ef31ef0b5639fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55516-na-f3b0bd14</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55516%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55515-na-fc04413b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55515%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55514-na-ce0c83de</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55514%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd0b7ef31ef0b55b21e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55513-na-4cdc2c0e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55513%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55496-na-269b07ea</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55496%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55059-na-e946103f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55059%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55aff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55058-na-5e331fae</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55058%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55057-na-7e03937f</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55057%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55056-na-09b71953</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55056%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54662-na-1dac1fd1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54662%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc4b7ef31ef0b55acb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51175-na-c9f9f557</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51175%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b55888b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-17-f121cc</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f121cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11906-cwe-79-improper-neutralization-of-i-5ec0b8e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11906%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cswaim%20TPG%20Get%20Posts&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11905-cwe-79-improper-neutralization-of-i-15e09f7f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11905%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freeben%20Animated%20Counters&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11902-cwe-79-improper-neutralization-of-i-5ee79fc8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20slopeit%20Slope%20Widgets&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11900-cwe-79-improper-neutralization-of-i-c6f47b2e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20logichunt%20Portfolio%20%E2%80%93%20Filterable%20Masonry%20Portfolio%20Gallery%20for%20Professionals&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12443-cwe-79-improper-neutralization-of-i-7fa000fa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12443%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crmperks%20CRM%20Perks%20%E2%80%93%20WordPress%20HelpDesk%20Integration%20%E2%80%93%20Zendesk%2C%20Freshdesk%2C%20HelpScout&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54357-cross-site-request-forgery-csrf-in--a393baef</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54357%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeFusion%20Avada&amp;severity=null&amp;id=69cd7597e6bfc5ba1df06705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54376-improper-control-of-filename-for-in-40976bbc</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54376%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Spider%20Themes%20EazyDocs&amp;severity=null&amp;id=69cd759be6bfc5ba1df06829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56003-missing-authorization-in-david-cram-6608d3d6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56003%3A%20Missing%20Authorization%20in%20David%20Cramer%20Caldera%20SMTP%20Mailer&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df0703e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55999-missing-authorization-in-marco-gian-ecd82a03</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55999%3A%20Missing%20Authorization%20in%20Marco%20Giannini%20XML%20Multilanguage%20Sitemap%20Generator&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54348-improper-neutralization-of-input-du-48701d23</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54348%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20Brand&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54280-improper-neutralization-of-special--a1549160</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54280%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Iqonic%20Design%20WPBookit&amp;severity=null&amp;id=69cd758ce6bfc5ba1df062ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54279-exposure-of-sensitive-system-inform-dc92dee9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54279%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Tobias%20Keller%20WP-NERD%20Toolkit&amp;severity=null&amp;id=69cd758ce6bfc5ba1df062fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43234-authentication-bypass-using-an-alte-94a6195d</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43234%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20WofficeIO%20Woffice&amp;severity=null&amp;id=69cd746be6bfc5ba1def71ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54229-incorrect-privilege-assignment-in-s-12dbe047</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54229%3A%20Incorrect%20Privilege%20Assignment%20in%20straightvisions%20GmbH%20SV100%20Companion&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49775-cwe-122-heap-based-buffer-overflow--d018ac85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49775%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20Opcenter%20Execution%20Foundation&amp;severity=critical&amp;id=696616cfa60475309f9ce616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54354-missing-authorization-in-beatk-term-74be1f4a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54354%3A%20Missing%20Authorization%20in%20beat.k%20Termin-Kalender&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54358-improper-neutralization-of-input-du-82614ed1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Enrico%20Cantori%203D%20Avatar%20User%20Profile&amp;severity=null&amp;id=69cd7597e6bfc5ba1df06708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54359-missing-authorization-in-saul-moral-6e7e9a31</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54359%3A%20Missing%20Authorization%20in%20Saul%20Morales%20Pacheco%20Banner%20System&amp;severity=null&amp;id=69cd7599e6bfc5ba1df06796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54361-improper-neutralization-of-special--3a60bca2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54361%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tenteeglobal%20Instant%20Appointment&amp;severity=null&amp;id=69cd7599e6bfc5ba1df0679c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54363-incorrect-privilege-assignment-in-s-76348cb9</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54363%3A%20Incorrect%20Privilege%20Assignment%20in%20saiful.total%20Wp%20NssUser%20Register&amp;severity=null&amp;id=69cd7599e6bfc5ba1df067a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54364-improper-neutralization-of-input-du-37c5eac6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54364%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spartac%20Feedpress%20Generator&amp;severity=null&amp;id=69cd7599e6bfc5ba1df067a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54365-incorrect-privilege-assignment-in-k-04042b5a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54365%3A%20Incorrect%20Privilege%20Assignment%20in%20Knowhalim%20KH%20Easy%20User%20Settings&amp;severity=null&amp;id=69cd7599e6bfc5ba1df067a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54367-deserialization-of-untrusted-data-i-c9f8c6fb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54367%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Ultimate%20Member%20ForumWP&amp;severity=null&amp;id=69cd7599e6bfc5ba1df067ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54368-cross-site-request-forgery-csrf-in--492f649b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54368%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rubengarzajr%20GitSync&amp;severity=null&amp;id=69cd759ae6bfc5ba1df067e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54369-missing-authorization-in-themehunk--9bb16171</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54369%3A%20Missing%20Authorization%20in%20ThemeHunk%20Zita%20Site%20Builder&amp;severity=null&amp;id=69cd759be6bfc5ba1df06814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54370-unrestricted-upload-of-file-with-da-ae85f1fe</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54370%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SuitePlugins%20Video%20%26%20Photo%20Gallery%20for%20Ultimate%20Member&amp;severity=null&amp;id=69cd759be6bfc5ba1df06818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54374-improper-limitation-of-a-pathname-t-3b5a8192</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54374%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Sabri%20Sogrid&amp;severity=null&amp;id=69cd759be6bfc5ba1df06823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54375-improper-limitation-of-a-pathname-t-53cb1882</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54375%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Sabri%20Woolook&amp;severity=null&amp;id=69cd759be6bfc5ba1df06826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54378-missing-authorization-in-quietly-qu-5d40e663</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54378%3A%20Missing%20Authorization%20in%20Quietly%20Quietly%20Insights&amp;severity=null&amp;id=69cd759be6bfc5ba1df0682c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54379-missing-authorization-in-blokhauswp-c4de9a2b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54379%3A%20Missing%20Authorization%20in%20blokhauswp%20Minterpress&amp;severity=null&amp;id=69cd759be6bfc5ba1df0682f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54380-improper-limitation-of-a-pathname-t-32c0247f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54380%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Filippo%20Bodei%20WP%20Cookies%20Enabler&amp;severity=null&amp;id=69cd759be6bfc5ba1df06832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54382-improper-limitation-of-a-pathname-t-045a78a5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54382%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54385-server-side-request-forgery-ssrf-in-0b2f50d8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54385%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20princeahmed%20Radio%20Player&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54387-improper-neutralization-of-input-du-6129b37e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54387%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jaytesh%20Barange%20Posts%20Date%20Ranges&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54390-improper-neutralization-of-input-du-8a666f15</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54390%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bouzid%20Nazim%20Zitouni%20TagGator&amp;severity=null&amp;id=69cd759ee6bfc5ba1df0695c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54395-improper-neutralization-of-input-du-5c480b7f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54395%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20preblogging%20Increase%20Sociability&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54403-improper-neutralization-of-input-du-3b02db7a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54403%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oktoberfive%20Visual%20Recent%20Posts&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54406-improper-neutralization-of-input-du-0929c8c1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54406%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moallemi%20Comments%20On%20Feed&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54422-improper-neutralization-of-input-du-6be21b3b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54422%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tgw365%20Evernote%20Sync&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55972-improper-neutralization-of-special--03b0c309</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55972%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chriscarvache%20eTemplates&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55973-improper-neutralization-of-special--05817e3c</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55973%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rnystrom%20TSB%20Occasion%20Editor&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55974-improper-neutralization-of-special--294b483a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55974%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mart%C3%AD%20Batlles%20Martinez%20Mimoos&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55976-improper-neutralization-of-special--b188cc60</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55976%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mikeleembruggen%20Critical%20Site%20Intel&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55977-improper-neutralization-of-special--2886cb19</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55977%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BinaryCarpenter%20LaunchPage.app%20Importer&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55978-improper-neutralization-of-special--4c5bc280</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55978%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WalletStation%20Code%20Generator%20Pro&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55979-improper-neutralization-of-special--31c416a7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55979%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robindkumar%20Wr%20Age%20Verification&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55980-improper-neutralization-of-special--9c441061</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55980%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robindkumar%20Wr%20Age%20Verification&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55981-improper-neutralization-of-special--3cd3446b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55981%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nabajit%20Roy%20Nabz%20Image%20Gallery&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55982-improper-neutralization-of-special--2e5abde6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55982%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20richteam%20Share%20Buttons%20%E2%80%93%20Social%20Media&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55986-improper-neutralization-of-special--00b39407</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55986%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tiny13%20Service&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55987-improper-neutralization-of-special--31624822</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55987%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ritesh%20Sanap%20Advanced%20What%20should%20we%20write%20next%20about&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55988-improper-neutralization-of-special--e3bf1333</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55988%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Amol%20Nirmala%20Waman%20Navayan%20CSV%20Export&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55996-missing-authorization-in-dreamfox-d-ac0795c1</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55996%3A%20Missing%20Authorization%20in%20dreamfox%20Dreamfox%20Media%20Payment%20gateway%20per%20Product%20for%20Woocommerce&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56013-authentication-bypass-using-an-alte-e2871d61</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56013%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20wovax%20Wovax%20IDX&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df0707d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54384-missing-authorization-in-anh-tran-f-a4475a1b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54384%3A%20Missing%20Authorization%20in%20Anh%20Tran%20Falcon%20%E2%80%93%20WordPress%20Optimizations%20%26%20Tweaks&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54417-missing-authorization-in-pixelgrade-23afeec8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54417%3A%20Missing%20Authorization%20in%20pixelgrade%20PixProof&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55992-missing-authorization-in-open-tools-d409e377</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55992%3A%20Missing%20Authorization%20in%20Open%20Tools%20WooCommerce%20Basic%20Ordernumbers&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55993-missing-authorization-in-pickplugin-8307e06a</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55993%3A%20Missing%20Authorization%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55994-missing-authorization-8180d98e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55994%3A%20Missing%20Authorization&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56001-missing-authorization-in-ksher-thai-43bf0671</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56001%3A%20Missing%20Authorization%20in%20ksher%20thailand%20Ksher&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56007-missing-authorization-in-leader-cod-ca8e2b08</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56007%3A%20Missing%20Authorization%20in%20leader%20codes%20Leader&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56009-missing-authorization-in-spreadr-sp-5e74d7b7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56009%3A%20Missing%20Authorization%20in%20spreadr%20Spreadr%20Woocommerce&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df0706b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54360-improper-neutralization-of-input-du-ebd96494</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20premila%20Gutensee&amp;severity=null&amp;id=69cd7599e6bfc5ba1df06799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54441-improper-neutralization-of-input-du-2da8e35a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54441%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Meini%20Utech%20World%20Time&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54442-improper-neutralization-of-input-du-61261ea6</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cortesfrau%20Better%20WP%20Login%20Page&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54443-improper-neutralization-of-input-du-85406a1e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54443%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsCafe%20Advanced%20Data%20Table%20For%20Elementor&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56011-improper-neutralization-of-input-du-30cdee5e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ilja%20Zaglov%20Responsive%20Google%20Maps%20%7C%20by%20imbaa&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54331-cross-site-request-forgery-csrf-in--70d3d042</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54331%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Micha%20I%20Plant%20A%20Tree&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54352-cross-site-request-forgery-csrf-in--3b25e89b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sabri%20Sogrid&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54355-cross-site-request-forgery-csrf-in--6c88662e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54355%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54356-cross-site-request-forgery-csrf-in--d207811c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54356%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=null&amp;id=69cd7597e6bfc5ba1df06702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54372-cross-site-request-forgery-csrf-in--29e36036</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54372%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sourov%20Amin%20Insertify&amp;severity=null&amp;id=69cd759be6bfc5ba1df0681c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54396-cross-site-request-forgery-csrf-in--b6ed0bd3</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54396%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20elmervillanueva%20Bet%20sport%20Free&amp;severity=null&amp;id=69cd759ee6bfc5ba1df0697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54418-cross-site-request-forgery-csrf-in--2e06af33</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54418%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Diversified%20Technology%20Corp.%20DTC%20Documents&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54419-cross-site-request-forgery-csrf-in--a82c49fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54419%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chenyenming%20Ui%20Slider%20Filter%20By%20Price&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56005-cross-site-request-forgery-csrf-in--a7b3bcf9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56005%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Posti%20Posti%20Shipping&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54332-cross-site-request-forgery-csrf-in--fdf0a76a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54332%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPFactory%20WP%20Currency%20Exchange%20Rates&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54353-cross-site-request-forgery-csrf-in--d5fc2ae1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54353%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpgear%20Hack-Info&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54386-cross-site-request-forgery-csrf-in--c4d29cd9</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54386%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pushmonkey%20Push%20Monkey%20Pro%20%E2%80%93%20Web%20Push%20Notifications%20and%20WooCommerce%20Abandoned%20Cart&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54388-cross-site-request-forgery-csrf-in--4b5a57e8</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54388%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Phuc%20Pham%20Multiple%20Admin%20Emails&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54389-cross-site-request-forgery-csrf-in--285e6a29</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54389%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eduardo%20addWeather&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54391-cross-site-request-forgery-csrf-in--1b783fac</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54391%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mattwalters%20WordPress%20Filter&amp;severity=null&amp;id=69cd759ee6bfc5ba1df0696d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54392-cross-site-request-forgery-csrf-in--b770023f</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54392%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20midoks%20WP%E5%BE%AE%E4%BF%A1%E6%9C%BA%E5%99%A8%E4%BA%BA&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54393-cross-site-request-forgery-csrf-in--e9247a64</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54393%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sheikh%20Heera%20WP%20Fiddle&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54394-cross-site-request-forgery-csrf-in--c290d72c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54394%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20khubbaib%20Mandrill%20WP&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54397-cross-site-request-forgery-csrf-in--40ef069c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54397%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20antonio.gocaj%20Go%20Animate&amp;severity=null&amp;id=69cd759ee6bfc5ba1df0697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54398-cross-site-request-forgery-csrf-in--77adeec5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54398%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jcaruso001%20Flaming%20Forms&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54399-cross-site-request-forgery-csrf-in--c459ad30</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54399%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CRUDLab%20CRUDLab%20Google%20Plus%20Button&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54400-cross-site-request-forgery-csrf-in--1671f5bb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54400%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20meloniq%20AppMaps&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54401-cross-site-request-forgery-csrf-in--61b64522</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54401%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ciprian%20Turcu%20Advanced%20Fancybox&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54402-missing-authorization-in-mohamed-ab-831c432d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54402%3A%20Missing%20Authorization%20in%20Mohamed%20Abd%20Elhalim%20Arabic%20Webfonts&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54404-cross-site-request-forgery-csrf-in--2a56684e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54404%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nazmul%20Ahsan%20MDC%20Comment%20Toolbar&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54405-cross-site-request-forgery-csrf-in--0b84df4d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54405%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20etemplates%20ECT%20Social%20Share&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54407-cross-site-request-forgery-csrf-in--614c1171</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54407%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20a328496647%20CK%20and%20SyntaxHighlighter&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54408-cross-site-request-forgery-csrf-in--bc5bf1fd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54408%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codehandling%20Youtube%20Video%20Grid&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54409-cross-site-request-forgery-csrf-in--2dc424e7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54409%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fzmaster%20XPD%20Reduce%20Image%20Filesize&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54410-cross-site-request-forgery-csrf-in--9d5b1b05</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54410%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20eagerterrier%20SOPA%20Blackout&amp;severity=null&amp;id=69cd75a2e6bfc5ba1df06ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54411-cross-site-request-forgery-csrf-in--f7cb79f5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54411%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hosting.io%20WP%20Controller&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54412-cross-site-request-forgery-csrf-in--692f0247</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54412%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20etemplates%20ECT%20Product%20Carousel&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54413-cross-site-request-forgery-csrf-in--d8f2d5a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54413%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brandt-net%20Display%20Future%20Posts&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54414-cross-site-request-forgery-csrf-in--04e9799b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54414%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20geoWP%20Geoportail%20Shortcode&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54415-cross-site-request-forgery-csrf-in--077868fc</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54415%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cconoly%20WP-HideThat&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54416-cross-site-request-forgery-csrf-in--9129894b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54416%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Navdeep%20Wp%20Login%20with%20Ajax&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54420-cross-site-request-forgery-csrf-in--d428000a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54420%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aleksandr%20Novikov%20Metrika&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54421-cross-site-request-forgery-csrf-in--f90c85ef</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54421%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sanjay_Negi%20Floating%20Video%20Player&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54423-cross-site-request-forgery-csrf-in--34a3b31a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54423%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jesse%20Overright%20Social%20Media%20Sharing&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54424-improper-neutralization-of-input-du-268dd8d0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54424%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ilya_compman%20Like%20in%20Vk.com&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54425-cross-site-request-forgery-csrf-in--28b2e193</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54425%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LionScripts.com%20LionScripts%3A%20Site%20Maintenance%20%26%20Noindex%20Nofollow%20Plugin&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54426-cross-site-request-forgery-csrf-in--1e963620</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54426%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20crossfitatgg%20LeaderBoard%20Plugin&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54427-cross-site-request-forgery-csrf-in--2733b4f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54427%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ljmacphee%20Category%20of%20Posts&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54428-cross-site-request-forgery-csrf-in--16794709</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54428%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20onigetoc%20Add%20image%20to%20Post&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54429-cross-site-request-forgery-csrf-in--f74d90b1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54429%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ivan-ovsyannikov%20Aphorismus&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54430-cross-site-request-forgery-csrf-in--81971c94</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54430%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Europe%20Ecologie%20Les%20Verts%20EELV%20Newsletter&amp;severity=null&amp;id=69cd75ace6bfc5ba1df06d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54431-cross-site-request-forgery-csrf-in--faa4a3e1</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54431%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20phpdevp%20Admin%20Customization&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54432-cross-site-request-forgery-csrf-in--e5e3c249</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54432%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shambhu%20Patnaik%20WP%20Flipkart%20Importer&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54433-cross-site-request-forgery-csrf-in--3a3027fa</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54433%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marcel%20CL%20Simple%20Booking%20Widget&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54434-cross-site-request-forgery-csrf-in--9fc2d0ca</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54434%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BenJemin%20phZoom&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54435-cross-site-request-forgery-csrf-in--ed28d7f2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Thomas%20Hoefter%20Onlywire%20Multi%20Autosubmitter&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54436-cross-site-request-forgery-csrf-in--ead853c2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54436%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20milordk%20Jet%20Footer%20Code&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54437-improper-neutralization-of-input-du-c470bb62</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20koolkatwebdesigns%20jCarousel&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54438-cross-site-request-forgery-csrf-in--1c492030</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54438%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gaxx%20Gaxx%20Keywords&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54439-cross-site-request-forgery-csrf-in--ff6de27c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54439%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alok%20Tiwari%20Amazon%20Product%20Price&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54440-cross-site-request-forgery-csrf-in--5095fa4e</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54440%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blueskyy%20WP-Ban-User&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56012-cross-site-request-forgery-csrf-in--98a56da8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56012%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lizeipe%20Flash%20News%20%2F%20Post%20(Responsive)&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df0707a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55989-improper-neutralization-of-special--0a9af90c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55989%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kyle%20M%20Brown%20WP%20Simple%20Pay%20Lite%20Manager&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55990-improper-neutralization-of-special--1cee85dd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55990%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tsjippy%20Mollie%20for%20Contact%20Form%207&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54373-improper-limitation-of-a-pathname-t-a7a80b0c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54373%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Chris%20Gardenberg%20EduAdmin%20Booking&amp;severity=null&amp;id=69cd759be6bfc5ba1df06820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55998-missing-authorization-in-eric-sloan-e8a6ef67</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55998%3A%20Missing%20Authorization%20in%20Eric%20Sloan%20Popup%20Surveys%20%26%20Polls%20for%20WordPress%20(Mare.io)&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56004-missing-authorization-in-awfowler-e-b891380d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56004%3A%20Missing%20Authorization%20in%20awfowler%20Easy%20Site%20Importer&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54366-generation-of-error-message-contain-e9bcd9b5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54366%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20videogallery%20Vimeography&amp;severity=null&amp;id=69cd7599e6bfc5ba1df067ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29671-na-36df76cf</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29671%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da1b7ef31ef0b5898d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37776-na-d92f0563</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37776%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6fb7ef31ef0b563fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37775-na-893e1c41</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37775%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6fb7ef31ef0b563fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37774-na-939e6c9d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37774%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6fb7ef31ef0b563f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37773-na-fdb969f2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37773%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6fb7ef31ef0b563f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56112-na-31d8c763</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56112%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56087-na-4a6a5a9c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56087%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56086-na-73575f14</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56086%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56085-na-4c78a6cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56085%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56084-cwe-77-improper-neutralization-of-s-e78bee50</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56084%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56083-na-16442c07</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56083%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55557-na-6c0b9758</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55557%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55554-na-aae976f5</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55554%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd0b7ef31ef0b55b271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55452-na-bff91b80</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55452%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55451-na-ed4d7cac</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55451%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55104-na-cb150003</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55104%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55103-na-dedfd66c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55103%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55100-na-da0d1ac4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55100%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55b066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55085-na-09c0db85</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55085%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53376-na-d2340891</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53376%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-16-fb9d2349</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-16&amp;severity=medium&amp;id=68367c98182aa0cae231eefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lookout-discovers-two-russian-android-spywar-f349adf3</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Lookout%20Discovers%20Two%20Russian%20Android%20Spyware%20Families%20from%20Gamaredon%20APT&amp;severity=low&amp;id=68367c0d182aa0cae23126f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-16-752393</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-16&amp;severity=medium&amp;id=682c7abce3e6de8ceb752393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-16-f12908</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lookout-discovers-two-russian-android-spyware-families-from-gamaredon-apt-f0c322</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Lookout%20Discovers%20Two%20Russian%20Android%20Spyware%20Families%20from%20Gamaredon%20APT&amp;severity=low&amp;id=682acdbebbaf20d303f0c322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitigating-brute-force-attacks-on-netscaler-devices-f0c320</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mitigating%20Brute%20Force%20Attacks%20on%20NetScaler%20Devices&amp;severity=low&amp;id=682acdbebbaf20d303f0c320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11858-improper-neutralization-of-special--bd9a3b85</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11858%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=699f6e23b7ef31ef0b5968d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56082-na-b8bd51d7</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56082%3A%20n%2Fa&amp;severity=low&amp;id=699f6bd2b7ef31ef0b55b36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56074-na-5c7e49da</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56074%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56073-na-87ee6a8a</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56073%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56072-na-2269025e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56072%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55970-na-3d7a4915</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55970%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55969-na-61198dc1</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55969%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd2b7ef31ef0b55b307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-15-f125cd</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f125cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11721-cwe-269-improper-privilege-manageme-08547f79</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11721%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=699f6e1ab7ef31ef0b5953a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11720-cwe-79-improper-neutralization-of-i-d5d56ae8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=699f6e1ab7ef31ef0b5953a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11712-cwe-359-exposure-of-private-persona-b4367f0b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11712%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b595390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11710-cwe-89-improper-neutralization-of-s-ba8c9d48</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11710%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b595386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11711-cwe-89-improper-neutralization-of-s-13fc1b0e</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11711%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=high&amp;id=699f6e1ab7ef31ef0b59538b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11714-cwe-89-improper-neutralization-of-s-1de17625</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11714%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b59539b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11713-cwe-89-improper-neutralization-of-s-00544348</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11713%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b595396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11715-cwe-862-missing-authorization-in-wp-f50a4f8b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11715%3A%20CWE-862%20Missing%20Authorization%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b5953a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12446-cwe-79-improper-neutralization-of-i-7d50029c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12446%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gravitymaster97%20PDF%20Generator%20for%20Posts%20%26%20Pages%20%E2%80%93%20Export%20Any%20Post%20Type%20to%20PDF&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12628-cwe-79-improper-neutralization-of-i-7d4487c7</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12628%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20budiony%20bodi0%60s%20Easy%20cache&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12422-cwe-79-improper-neutralization-of-i-94b61be2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12422%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xylus%20Import%20Eventbrite%20Events&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12459-cwe-79-improper-neutralization-of-i-474c776a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ganohr%20Ganohrs%20Toggle%20Shortcode&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11752-cwe-79-improper-neutralization-of-i-5983cf51</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20babo2015%20Eveeno&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12474-cwe-79-improper-neutralization-of-i-80a352f2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12474%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20geodatasource%20GeoDataSource%20Country%20Region%20DropDown&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10690-cwe-639-authorization-bypass-throug-dd79fa50</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10690%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20rstheme2017%20Shortcodes%20for%20Elementor&amp;severity=medium&amp;id=699f6dfab7ef31ef0b5922d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10646-cwe-79-improper-neutralization-of-i-058661e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=high&amp;id=699f6df9b7ef31ef0b5919c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12501-cwe-79-improper-neutralization-of-i-45b68b84</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kylephillips%20Simple%20Locator&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11884-cwe-79-improper-neutralization-of-i-eb26c9cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Wp%20photo%20text%20slider%2050&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9698-cwe-434-unrestricted-upload-of-file--2ce3a869</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9698%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20aruphash%20Crafthemes%20Demo%20Import&amp;severity=high&amp;id=699f6b59b7ef31ef0b5548ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11888-cwe-79-improper-neutralization-of-i-abe56ee9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ider%20IDer%20Login%20for%20WordPress&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11869-cwe-79-improper-neutralization-of-i-c15c95e8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uvstudio%20Buk%20for%20WordPress&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11877-cwe-79-improper-neutralization-of-i-14c70cd7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpscore%20Cricket%20Live%20Score&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12502-cwe-79-improper-neutralization-of-i-53b22908</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homeasap%20My%20IDX%20Home%20Search&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11894-cwe-79-improper-neutralization-of-i-191fd3b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theandystratton%20The%20Permalinker&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11855-cwe-79-improper-neutralization-of-i-8d249d72</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11855%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20koalendar%20Koalendar%20%E2%80%93%20Easy%20Appointment%20Scheduling%20%26%20Booking%20Plugin&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12447-cwe-639-authorization-bypass-throug-30a5678d</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12447%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20webdeveric%20Get%20Post%20Content%20Shortcode&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12523-cwe-79-improper-neutralization-of-i-2bbb29e7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12523%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wssoffice21%20States%20Map%20US&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12458-cwe-79-improper-neutralization-of-i-232b517b</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devnethr%20Smart%20PopUp%20Blaster&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12411-cwe-79-improper-neutralization-of-i-ffcb89bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onetarek%20WP%20Ad%20Guru%20%E2%80%93%20Banner%20ad%2C%20Responsive%20popup%2C%20Popup%20maker%2C%20Ad%20rotator%20%26%20More&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b59820d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12448-cwe-79-improper-neutralization-of-i-179c8e5a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coderpress%20Posts%20and%20Products%20Views%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11883-cwe-79-improper-neutralization-of-i-e2084d9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11883%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20connatix%20Connatix%20Video%20Embed&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12517-cwe-79-improper-neutralization-of-i-c538eab5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12517%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prontotools%20WooCommerce%20Cart%20Count%20Shortcode&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11462-cwe-79-improper-neutralization-of-i-d1a15c26</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20filestack%20Filestack%20WP%20Upload&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11770-cwe-79-improper-neutralization-of-i-6d7ccb6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tarakpatel18%20Post%20Carousel%20%26%20Slider&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11095-cwe-79-improper-neutralization-of-i-f80906e2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11095%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20visualmodo%20Visualmodo%20Elements&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11876-cwe-79-improper-neutralization-of-i-8b068091</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoannr35%20Kredeum%20NFTs%2C%20the%20easiest%20way%20to%20sell%20your%20NFTs%20directly%20on%20your%20WordPress%20site&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11751-cwe-79-improper-neutralization-of-i-0266a7a9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tcoder%20TCBD%20Popover&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11755-cwe-79-improper-neutralization-of-i-47ce1c14</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11755%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20acewebx%20IMS%20Countdown&amp;severity=medium&amp;id=699f6e1db7ef31ef0b595773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12578-cwe-200-exposure-of-sensitive-infor-4d457a0b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12578%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tickera%20Tickera%20%E2%80%93%20Sell%20Tickets%20%26%20Manage%20Events&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bf07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11865-cwe-79-improper-neutralization-of-i-5c37ed2b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20html5maps%20Tabs%20Maker&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11867-cwe-79-improper-neutralization-of-i-ca54cb62</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20papin%20Companion%20Portfolio%20%E2%80%93%20Responsive%20Portfolio%20Plugin&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11889-cwe-79-improper-neutralization-of-i-0f4a07a5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homeasap%20My%20IDX%20Home%20Search&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11873-cwe-79-improper-neutralization-of-i-f0362dd6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glomex%20glomex%20oEmbed&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12555-cwe-352-cross-site-request-forgery--b3d02bf8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12555%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mgplugin%20SIP%20Calculator&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-14-f12118</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f12118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12553-cwe-862-missing-authorization-in-ge-09a7494e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12553%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GeoVision%20GV-ASManager&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12552-cwe-59-improper-link-resolution-bef-eef61c95</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12552%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Wacom%20Center&amp;severity=high&amp;id=699f6e41b7ef31ef0b59bca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54351-cross-site-request-forgery-csrf-in--a3582945</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54351%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Thomas%20K%20Landis%20Fancy%20Roller%20Scroller&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54349-improper-neutralization-of-input-du-21c2c702</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mashiurz%20Plain%20Post&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54347-improper-neutralization-of-input-du-be28bee2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BAKKBONE%20Australia%20FloristPress&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54346-improper-neutralization-of-input-du-40669aad</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54346%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20Barter&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54345-improper-neutralization-of-input-du-b6300ad9</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54345%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20Bicycleshop&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54344-improper-neutralization-of-input-du-1469a518</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54344%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fahad%20Mahmood%20WP%20Quick%20Shop&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54343-improper-neutralization-of-input-du-95cbaef8</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehowarde%20Connect%20Contact%20Form%207%20to%20Constant%20Contact&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54341-improper-neutralization-of-input-du-66a5903f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabelGrid%20LabelGrid%20Tools&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54340-improper-neutralization-of-input-du-d2d12253</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54340%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sylviavanos%20Simple%20Presenter&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54339-improper-neutralization-of-input-du-4ca10bc2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54339%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jbd7%20geoFlickr&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54338-improper-neutralization-of-input-du-3efe437d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54338%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20christer_f%20Hello%20Event%20Widgets%20For%20Elementor&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54337-cross-site-request-forgery-csrf-in--53135983</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54337%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DevriX%20DX%20Dark%20Site&amp;severity=null&amp;id=69cd7596e6bfc5ba1df06697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54335-improper-neutralization-of-input-du-58718a46</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54335%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ImmoSoft%20ImmoToolBox%20Connect&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54334-improper-neutralization-of-input-du-f94deea5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54334%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zeshanb%20Quran%20Phrases%20About%20Most%20People%20Shortcodes&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54333-improper-neutralization-of-input-du-0575ce03</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silverplugins217%20Check%20Pincode%20For%20Woocommerce&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54330-server-side-request-forgery-ssrf-in-d507e0c7</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54330%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20hurraki%20Hurrakify&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54329-improper-neutralization-of-input-du-f68f8d91</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54329%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Metup%20CleverNode%20Related%20Content&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54328-improper-neutralization-of-input-du-ede327f0</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54328%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linknacional%20Invoice%20Payment%20for%20WooCommerce&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54326-missing-authorization-in-eyal-fitou-f8b36353</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54326%3A%20Missing%20Authorization%20in%20Eyal%20Fitoussi%20GEO%20my%20WordPress&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54325-improper-neutralization-of-input-du-cf8cf7a1</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54325%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DealerTrend%20CarDealerPress&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54324-improper-neutralization-of-input-du-e7ef41cb</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mtomic%20SMSify&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54323-missing-authorization-in-saad-iqbal-f1baa2e0</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54323%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54322-improper-neutralization-of-input-du-1d8e3a40</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ederson%20Peka%20Media%20Downloader&amp;severity=null&amp;id=69cd7593e6bfc5ba1df0657d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54320-improper-neutralization-of-input-du-09861977</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54320%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icdsoft%20ICDSoft%20Reseller%20Store&amp;severity=null&amp;id=69cd7593e6bfc5ba1df0657a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54317-improper-neutralization-of-input-du-fefaa22e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54317%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Google%20Web%20Stories&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54316-improper-neutralization-of-input-du-979557bd</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Restaurant%20%26%20Cafe%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54315-improper-neutralization-of-input-du-3293e980</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54315%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Events%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54314-improper-neutralization-of-input-du-6bc0b1b8</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54314%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Primary%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7593e6bfc5ba1df0656e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54312-improper-neutralization-of-input-du-89b97e36</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54312%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PersianScript%20Persian%20Woocommerce%20SMS&amp;severity=null&amp;id=69cd7593e6bfc5ba1df0656b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54311-missing-authorization-in-ilychkov-m-3bc04c65</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54311%3A%20Missing%20Authorization%20in%20i.lychkov%20Mark%20New%20Posts&amp;severity=null&amp;id=69cd7593e6bfc5ba1df0654e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54310-missing-authorization-in-aslam-khan-3bf6170b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54310%3A%20Missing%20Authorization%20in%20Aslam%20Khan%20Gouran%20Gou%20Manage%20My%20Account%20Menu&amp;severity=null&amp;id=69cd7590e6bfc5ba1df064a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54309-insertion-of-sensitive-information--a081ea2c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54309%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20wpdebuglog%20PostBox&amp;severity=null&amp;id=69cd7590e6bfc5ba1df0649c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54308-improper-neutralization-of-input-du-15d50402</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54308%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falselight%20Cryptocurrency%20Price%20Widget&amp;severity=null&amp;id=69cd7590e6bfc5ba1df06493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54307-cross-site-request-forgery-csrf-in--1adf6c95</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54307%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aipost%20AIcomments&amp;severity=null&amp;id=69cd7590e6bfc5ba1df0648f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54306-cross-site-request-forgery-csrf-in--d165e9ab</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54306%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aitool%20AIKCT%20Engine%20Chatbot%2C%20ChatGPT%2C%20Gemini%2C%20GPT-4o%20Best%20AI%20Chatbot&amp;severity=null&amp;id=69cd7590e6bfc5ba1df0648c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54305-improper-neutralization-of-input-du-eb1f83c7</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jtexpress%20J%26T%20Express%20Malaysia&amp;severity=null&amp;id=69cd7590e6bfc5ba1df06489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54303-improper-neutralization-of-input-du-89685843</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54303%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ido%20Kobelkowsky%20Simple%20Payment&amp;severity=null&amp;id=69cd7590e6bfc5ba1df06486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54302-improper-neutralization-of-input-du-c764db65</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54302%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=69cd7590e6bfc5ba1df06483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54301-improper-neutralization-of-input-du-e2fcae95</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54301%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manidoraisamy%20FormFacade&amp;severity=null&amp;id=69cd7590e6bfc5ba1df06480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54300-cross-site-request-forgery-csrf-in--b0232ed4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54300%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Basar%20Ventures%20AutoWP&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54299-improper-neutralization-of-input-du-8f46f3ed</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54299%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revidev%20Revi.io&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54298-missing-authorization-in-sminozzi-c-e1cba5cb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54298%3A%20Missing%20Authorization%20in%20sminozzi%20Car%20Dealer&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54297-authentication-bypass-using-an-alte-da461ef2</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54297%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20extremeidea%20vBSSO-lite&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54296-authentication-bypass-using-an-alte-ef723ccc</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54296%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Codexpert%2C%20Inc%20CoSchool%20LMS&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54295-authentication-bypass-using-an-alte-21b91e15</loc>
    <lastmod>2026-04-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54295%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20FluxBuilder%20ListApp%20Mobile%20Manager&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54294-authentication-bypass-using-an-alte-0e785bc3</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54294%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Appgenix%20Infotech%20Firebase%20OTP%20Authentication&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54293-incorrect-privilege-assignment-in-c-3e747291</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54293%3A%20Incorrect%20Privilege%20Assignment%20in%20CE21%20CE21%20Suite&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54290-improper-neutralization-of-input-du-0b3940c3</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54290%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Justin%20Fletcher%20Role%20Includer&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54289-missing-authorization-in-awesomesup-08f1f24d</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54289%3A%20Missing%20Authorization%20in%20awesomesupport%20Awesome%20Support&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54288-improper-neutralization-of-input-du-c7ee4735</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54288%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LDD%20Web%20Design%20LDD%20Directory%20Lite&amp;severity=null&amp;id=69cd758ce6bfc5ba1df0630b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54287-improper-neutralization-of-input-du-ffa83385</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54287%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Best%20WP%20Developer%20Advanced%20Blog%20Post%20Block&amp;severity=null&amp;id=69cd758ce6bfc5ba1df06308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54286-improper-neutralization-of-input-du-865c2a23</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54286%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Smaily%20Smaily%20for%20WP&amp;severity=null&amp;id=69cd758ce6bfc5ba1df06305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54282-deserialization-of-untrusted-data-i-75bfbd23</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54282%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Themeum%20WP%20Mega%20Menu&amp;severity=null&amp;id=69cd758ce6bfc5ba1df06302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54278-missing-authorization-in-plugin-dev-5d569103</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54278%3A%20Missing%20Authorization%20in%20Plugin%20Devs%20News%20Ticker%20for%20Elementor&amp;severity=null&amp;id=69cd758ce6bfc5ba1df062f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54277-improper-neutralization-of-input-du-63c6f917</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54277%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alireza%20Aliniya%20Nias%20course&amp;severity=null&amp;id=69cd758ce6bfc5ba1df062f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54276-improper-neutralization-of-input-du-134c0752</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54276%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devfelixmoira%20Poll%20Builder&amp;severity=null&amp;id=69cd758ce6bfc5ba1df062f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54275-improper-neutralization-of-input-du-881113e5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54275%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wibergsweb%20CSV%20to%20html&amp;severity=null&amp;id=69cd758be6bfc5ba1df06189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54274-improper-neutralization-of-input-du-94fc4a08</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54274%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Octrace%20WordPress%20HelpDesk%20%26%20Support%20Ticket%20System%20Plugin%20%E2%80%93%20Octrace%20Support&amp;severity=null&amp;id=69cd758be6bfc5ba1df06186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54273-deserialization-of-untrusted-data-i-15c08070</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54273%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Mail%20Picker&amp;severity=null&amp;id=69cd758be6bfc5ba1df06183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54272-improper-neutralization-of-input-du-675d2d39</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54272%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RadiusTheme%20Radius%20Blocks&amp;severity=null&amp;id=69cd758be6bfc5ba1df06180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54271-missing-authorization-in-arni-cinco-e5f5cd86</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54271%3A%20Missing%20Authorization%20in%20Arni%20Cinco%20WPCargo%20Track%20%26%20Trace&amp;severity=null&amp;id=69cd758be6bfc5ba1df0617d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54268-missing-authorization-in-greg-siteo-713eba79</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54268%3A%20Missing%20Authorization%20in%20Greg%20-%20SiteOrigin%20SiteOrigin%20Widgets%20Bundle&amp;severity=null&amp;id=69cd758be6bfc5ba1df06177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54267-missing-authorization-in-creativemi-cfaf9d74</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54267%3A%20Missing%20Authorization%20in%20CreativeMindsSolutions%20CM%20Answers&amp;severity=null&amp;id=69cd758be6bfc5ba1df06174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54266-improper-neutralization-of-input-du-875edb69</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ImageRecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=null&amp;id=69cd758ae6bfc5ba1df06171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54265-improper-neutralization-of-input-du-ed04a652</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54265%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=69cd758ae6bfc5ba1df0616e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54264-improper-neutralization-of-input-du-a429335b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54264%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmorillas1%20Shortcodes%20Blocks%20Creator%20Ultimate&amp;severity=null&amp;id=69cd758ae6bfc5ba1df06162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54262-unrestricted-upload-of-file-with-da-b77a592b</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54262%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20sidngr%20Import%20Export%20For%20WooCommerce&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54261-improper-neutralization-of-special--f4b4706d</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54261%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HK%20Digital%20Agency%20LLC%20TAX%20SERVICE%20Electronic%20HDM&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54259-improper-limitation-of-a-pathname-t-97734693</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54259%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54258-improper-neutralization-of-special--4620bec7</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54258%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Anzar%20Ahmed%20Ni%20CRM%20Lead&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54256-missing-authorization-in-seerox-eas-54738377</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54256%3A%20Missing%20Authorization%20in%20Seerox%20Easy%20Blocks%20pro&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54252-missing-authorization-in-dotonpaper-b009c723</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54252%3A%20Missing%20Authorization%20in%20DOTonPAPER%20Pinpoint%20Booking%20System&amp;severity=null&amp;id=69cd7586e6bfc5ba1df0601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54250-improper-neutralization-of-input-du-42a30e65</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54250%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prodigycommerce%20Prodigy%20Commerce&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54248-cross-site-request-forgery-csrf-in--c4bdad84</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54248%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20eewee%20eewee%20admin%20custom&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54246-improper-neutralization-of-input-du-420a5ee5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54246%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20FAQs&amp;severity=null&amp;id=69cd7586e6bfc5ba1df0600f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54245-improper-neutralization-of-input-du-ae7d7399</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20Clients&amp;severity=null&amp;id=69cd7586e6bfc5ba1df0600c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54244-improper-neutralization-of-input-du-0b2d22be</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54244%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20Easy%20Replace&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54243-improper-neutralization-of-input-du-dcfb985e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54243%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20Echoza&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54242-missing-authorization-in-appsbd-sim-4a71d188</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54242%3A%20Missing%20Authorization%20in%20appsbd%20Simple%20Notification&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54240-improper-neutralization-of-input-du-6c1d2667</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blazeonline%20Blaze%20Online%20eParcel%20for%20WooCommerce&amp;severity=null&amp;id=69cd7586e6bfc5ba1df05fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54239-missing-authorization-in-dugudlabs--ae73e74a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54239%3A%20Missing%20Authorization%20in%20dugudlabs%20Eyewear%20prescription%20form&amp;severity=null&amp;id=69cd7586e6bfc5ba1df05fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54238-improper-neutralization-of-input-du-f33f8ea4</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cleveland%20Heights-University%20Heights%20Public%20Library%20Webdeveloper%20Board%20Document%20Manager%20from%20CHUHPL&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54237-improper-neutralization-of-input-du-43e4cdf2</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anzar%20Ahmed%20Ni%20CRM%20Lead&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54236-improper-neutralization-of-input-du-723fc7d2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54236%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Bulk%20Product%20Editor&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54235-improper-neutralization-of-input-du-4a3d89e2</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shiptimize%20Shiptimize%20for%20WooCommerce&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54234-improper-neutralization-of-special--eb1c7f05</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54234%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wp-buy%20Limit%20Login%20Attempts&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54233-improper-neutralization-of-input-du-b0545cea</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20overclokk%20Advanced%20Control%20Manager%20for%20WordPress%20by%20ItalyStrap&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54231-improper-neutralization-of-input-du-d4a9f6fa</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Order%20Export&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9608-cwe-79-improper-neutralization-of-in-85f0b31f</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richardperdaan%20MyParcel&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11827-cwe-79-improper-neutralization-of-i-60b82bdb</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gsarig%20Out%20of%20the%20Block%3A%20OpenStreetMap&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52059-cwe-120-buffer-copy-without-checkin-59f358b5</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52059%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=692f11fa0eb63243a5f7cdc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10783-cwe-862-missing-authorization-in-ma-cddeb7b2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10783%3A%20CWE-862%20Missing%20Authorization%20in%20mainwp%20MainWP%20Child%20%E2%80%93%20Securely%20Connects%20to%20the%20MainWP%20Dashboard%20to%20Manage%20Multiple%20Sites&amp;severity=high&amp;id=699f6dfcb7ef31ef0b592483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9290-cwe-434-unrestricted-upload-of-file--a2e1a864</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9290%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20azzaroco%20Super%20Backup%20%26%20Clone%20-%20Migrate%20for%20WordPress&amp;severity=critical&amp;id=699f6b47b7ef31ef0b550d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11012-cwe-94-improper-control-of-generati-24f3b121</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11012%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ninjateam%20Notibar%20%E2%80%93%20Notification%20Bar%20for%20WordPress&amp;severity=medium&amp;id=699f6e04b7ef31ef0b593ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12465-cwe-79-improper-neutralization-of-i-c1a8273b</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12465%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20propertyhive%20Property%20Hive%20Stamp%20Duty%20Calculator&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11275-cwe-639-authorization-bypass-throug-b63e6199</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11275%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20arraytics%20Timetics%20%E2%80%93%20Appointment%20Booking%20%26%20Scheduling&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5941e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12309-cwe-639-authorization-bypass-throug-98b72f42</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12309%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20properfraction%20Rate%20My%20Post%20%E2%80%93%20Star%20Rating%20Plugin%20by%20FeedbackWP&amp;severity=medium&amp;id=699f6e36b7ef31ef0b597da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12417-cwe-94-improper-control-of-generati-8a69070f</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12417%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11910-cwe-79-improper-neutralization-of-i-f42f58b5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeum%20WP%20Crowdfunding&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12042-cwe-434-unrestricted-upload-of-file-3719b299</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12042%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11911-cwe-862-missing-authorization-in-th-358b46c6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11911%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20WP%20Crowdfunding&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11754-cwe-79-improper-neutralization-of-i-b5b4c1d1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ameliabooking%20Booking%20System%20Trafft&amp;severity=medium&amp;id=699f6e1db7ef31ef0b59576f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12421-cwe-94-improper-control-of-generati-29414f8e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12421%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20elliotvs%20Coupon%20Affiliates%20%E2%80%93%20Affiliate%20Plugin%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b59896f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12420-cwe-94-improper-control-of-generati-0c143b50</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12420%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20amauric%20WPMobile.App&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b59896b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12414-cwe-352-cross-site-request-forgery--e17d9e2e</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12414%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themifyme%20Themify%20Store%20Locator&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11832-cwe-79-improper-neutralization-of-i-7486d5cf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11832%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=699f6e22b7ef31ef0b59681f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12581-cwe-79-improper-neutralization-of-i-14126489</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12581%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21544-improper-input-validation-in-spatie-b6436778</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21544%3A%20Improper%20Input%20Validation%20in%20spatie%2Fbrowsershot&amp;severity=high&amp;id=68e0f3c1b66c7f7acdd3e957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11809-cwe-79-improper-neutralization-of-i-9b622fb1</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20primersoftware%20Primer%20MyData%20for%20Woocommerce&amp;severity=medium&amp;id=699f6e20b7ef31ef0b596676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12579-cwe-400-uncontrolled-resource-consu-df3c6604</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12579%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20teckel%20Minify%20HTML&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bf0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12574-cwe-79-improper-neutralization-of-i-42133a96</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amrendesign%20SVG%20Shortcode&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59beff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12300-cwe-862-missing-authorization-in-we-f40ec984</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12300%3A%20CWE-862%20Missing%20Authorization%20in%20webandprint%20AR%20for%20WordPress&amp;severity=low&amp;id=699f6e35b7ef31ef0b597cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12572-cwe-352-cross-site-request-forgery--920d49bf</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12572%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stathisg%20Hello%20In%20All%20Languages&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59befb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55918-na-7e57b341</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55918%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55956-na-2ecd6085</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55956%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9b6247d717aace26c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-13-f1207f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f1207f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spearphishing-campaign-targeted-at-least-20-autonomous-system-as-owners-f0c31e</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=spearphishing%20campaign%20targeted%20at%20least%2020%20Autonomous%20System%20(AS)%20owners&amp;severity=low&amp;id=682acdbebbaf20d303f0c31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49071-cwe-612-improper-authorization-of-index-containing-sensitive-information-in-microsoft-microsoft-defender-for-endpoint-for-windows-bd6109</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49071%3A%20CWE-612%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Windows&amp;severity=medium&amp;id=682d9815c4522896dcbd6109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49147-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-update-catalog-bd6310</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49147%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Update%20Catalog&amp;severity=critical&amp;id=682d9815c4522896dcbd6310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28143-cwe-620-unverified-password-change--34164ed5</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28143%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=high&amp;id=69092621fe7723195e0b46fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28146-cwe-798-use-of-hard-coded-credentia-ac4d7a8b</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28146%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=high&amp;id=69092623fe7723195e0b471f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50584-cwe-89-improper-neutralization-of-s-8a01f671</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50584%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092eea35043901e82cab18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28145-cwe-89-improper-neutralization-of-s-3d262251</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28145%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092623fe7723195e0b471a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28144-cwe-384-session-fixation-in-image-a-8e5d4222</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28144%3A%20CWE-384%20Session%20Fixation%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092621fe7723195e0b46ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36494-cwe-79-improper-neutralization-of-i-f9f85194</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36494%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092626fe7723195e0b5aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36498-cwe-79-improper-neutralization-of-i-0e4c0cbf</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092626fe7723195e0b5ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12271-cwe-79-improper-neutralization-of-i-f2047ef2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12271%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jtermaat%20360%20Javascript%20Viewer&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47947-cwe-79-improper-neutralization-of-i-73edf082</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47947%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092ee835043901e82caab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28142-cwe-79-improper-neutralization-of-i-2d0f1f88</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092621fe7723195e0b46f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12401-improper-input-validation-bd841c</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12401%3A%20Improper%20Input%20Validation&amp;severity=medium&amp;id=682d9819c4522896dcbd841c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12397-inconsistent-interpretation-of-http-requests-http-request-response-smuggling-bebeae</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12397%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)&amp;severity=high&amp;id=682d9838c4522896dcbebeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12160-cwe-79-improper-neutralization-of-i-09b150c5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12160%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seraphinitesoft%20Seraphinite%20Bulk%20Discounts%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e30b7ef31ef0b5976a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11760-cwe-79-improper-neutralization-of-i-3ed2ade2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falselight%20Currency%20Converter%20Widget%20%E2%9A%A1%20PRO&amp;severity=medium&amp;id=699f6e1db7ef31ef0b595784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12333-cwe-94-improper-control-of-generati-e05c2263</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12333%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20xTemos%20Woodmart&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12329-cwe-200-exposure-of-sensitive-infor-6914bcde</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12329%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11724-cwe-862-missing-authorization-in-wp-0f3eb5bc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11724%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Cookie%20Banner%20for%20GDPR%20%2F%20CCPA%20%E2%80%93%20WPLP%20Cookie%20Consent&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12201-cwe-862-missing-authorization-in-ha-24f048ec</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12201%3A%20CWE-862%20Missing%20Authorization%20in%20hashthemes%20Hash%20Form%20%E2%80%93%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=699f6e31b7ef31ef0b597837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12312-cwe-502-deserialization-of-untruste-a0529fa2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12312%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20johnwwweissberg%20Print%20Science%20Designer&amp;severity=high&amp;id=699f6e36b7ef31ef0b597da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10583-cwe-79-improper-neutralization-of-i-640fbd0c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danieliser%20Popup%20Maker%20%E2%80%93%20Boost%20Sales%2C%20Conversions%2C%20Optins%2C%20Subscribers%20with%20the%20Ultimate%20WP%20Popup%20Builder&amp;severity=medium&amp;id=699f6df6b7ef31ef0b59181b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11727-cwe-79-improper-neutralization-of-i-cd2b032c</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20NotificationX%20%E2%80%93%20FOMO%2C%20Live%20Sales%20Notification%2C%20WooCommerce%20Sales%20Popup%2C%20GDPR%2C%20Social%20Proof%2C%20Announcement%20Banner%20%26%20Floating%20Notification%20Bar&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11181-cwe-639-authorization-bypass-throug-6627f1c9</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11181%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10784-cwe-79-improper-neutralization-of-i-5046a50f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10784%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=699f6dfdb7ef31ef0b592550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12263-cwe-862-missing-authorization-in-lo-59bde238</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12263%3A%20CWE-862%20Missing%20Authorization%20in%20lordspace%20Child%20Theme%20Creator%20by%20Orbisius&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12059-cwe-639-authorization-bypass-throug-af233ab6</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12059%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20elementinvader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12265-cwe-862-missing-authorization-in-de-c32df124</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12265%3A%20CWE-862%20Missing%20Authorization%20in%20depayfi%20Web3%20Crypto%20Payments%20by%20DePay%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11052-cwe-79-improper-neutralization-of-i-0f26277c</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11052%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=high&amp;id=699f6e04b7ef31ef0b593ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11766-cwe-79-improper-neutralization-of-i-9b231b1f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11766%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samdani%20GS%20Books%20Showcase%20%E2%80%93%20Display%20Books%20in%20Grid%2C%20Slider%20%26%20More%20%7C%20Library%20for%20WordPress&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11785-cwe-79-improper-neutralization-of-i-401792df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11785%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hanthuy%20Integrate%20Firebase&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b5964ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11871-cwe-79-improper-neutralization-of-i-f0d4449a</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11871%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tw2113%20Social%20Media%20Shortcodes&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11757-cwe-79-improper-neutralization-of-i-7a03e5d4</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sojahu%20WP%20GeoNames&amp;severity=medium&amp;id=699f6e1db7ef31ef0b59577b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12255-cwe-200-exposure-of-sensitive-infor-68aafb78</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12255%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20zealopensource%20Accept%20Stripe%20Payments%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10124-cwe-284-improper-access-control-in--3fef3920</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10124%3A%20CWE-284%20Improper%20Access%20Control%20in%20themehunk%20Vayu%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=critical&amp;id=699f6decb7ef31ef0b590d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12172-cwe-862-missing-authorization-in-ho-55e63517</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12172%3A%20CWE-862%20Missing%20Authorization%20in%20hookandhook%20WP%20Courses%20LMS%20%E2%80%93%20Online%20Courses%20Builder%2C%20eLearning%20Courses%2C%20Courses%20Solution%2C%20Education%20Courses&amp;severity=high&amp;id=699f6e30b7ef31ef0b597791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11765-cwe-79-improper-neutralization-of-i-c2afb320</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samdani%20GS%20Portfolio%20%E2%80%93%20A%20Plugin%20for%20Making%20Filterable%20Portfolio%20Grid%2C%20Portfolio%20Slider%20and%20more&amp;severity=medium&amp;id=699f6e1db7ef31ef0b595790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12072-cwe-79-improper-neutralization-of-i-52bccee6</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Analytics%20Cat%20%E2%80%93%20Google%20Analytics%20Made%20Easy&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12018-cwe-862-missing-authorization-in-al-7ce1d053</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12018%3A%20CWE-862%20Missing%20Authorization%20in%20aliakro%20Snippet%20Shortcodes&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11359-cwe-79-improper-neutralization-of-i-d1379ac3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11359%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photonicgnostic%20Library%20Bookshelves&amp;severity=medium&amp;id=699f6e0fb7ef31ef0b5946f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12040-cwe-98-improper-control-of-filename-50b4961b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12040%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpwax%20Product%20Carousel%20Slider%20%26%20Grid%20Ultimate%20for%20WooCommerce&amp;severity=high&amp;id=699f6e2bb7ef31ef0b5971ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11781-cwe-79-improper-neutralization-of-i-6105dd84</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11781%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartagenda%20SmartAgenda%20%E2%80%93%20Prise%20de%20rendez-vous%20en%20ligne&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b59649a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11882-cwe-79-improper-neutralization-of-i-e908acab</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11882%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Awesome%20FAQ%20%20%E2%80%93%20Modern%20Accordion%2C%20Tabs%2CResponsive%20%26%20Super%20Fast%20FAQ%20Builder.&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12526-cwe-352-cross-site-request-forgery--70c0af49</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12526%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arenaim%20Arena.IM%20%E2%80%93%20Live%20Blogging%20for%20real-time%20events&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11709-cwe-862-missing-authorization-in-ke-e849af88</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11709%3A%20CWE-862%20Missing%20Authorization%20in%20kekotron%20AI%20Post%20Generator%20%7C%20AutoWriter&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b595381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12441-cwe-79-improper-neutralization-of-i-d48dcc04</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12441%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanebp%20BP%20Email%20Assign%20Templates&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12156-cwe-79-improper-neutralization-of-i-2481d457</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12156%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quantumcloud%20QC%20SEO%20Help%20for%20llms.txt%2C%20AI%20Analytics%2C%20AI%20Content%20Writer%2C%20Subtitle%20to%20Article&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12162-cwe-79-improper-neutralization-of-i-3d1d48c2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12162%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20suiteplugins%20Video%20%26%20Photo%20Gallery%20for%20Ultimate%20Member&amp;severity=medium&amp;id=699f6e30b7ef31ef0b5976a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11459-cwe-79-improper-neutralization-of-i-2f10c746</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karlkiesinger%20Country%20Blocker&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11804-cwe-79-improper-neutralization-of-i-8a0b34f8</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20planaday%20Planaday%20API&amp;severity=medium&amp;id=699f6e20b7ef31ef0b596662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10182-cwe-79-improper-neutralization-of-i-05272d10</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10182%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cognitoapps%20Cognito%20Forms&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12463-cwe-79-improper-neutralization-of-i-3e3cb63f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12463%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arenaim%20Arena.IM%20%E2%80%93%20Live%20Blogging%20for%20real-time%20events&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11384-cwe-79-improper-neutralization-of-i-2af3080f</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arenaim%20Arena.IM%20%E2%80%93%20Live%20Blogging%20for%20real-time%20events&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11410-cwe-79-improper-neutralization-of-i-81359284</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11410%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sharabindu%20Yoo%20Bar%20%E2%80%93%20Floating%20Notification%20%26%20Promo%20Bar%20for%20Website&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10590-cwe-434-unrestricted-upload-of-file-66834c54</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10590%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20halfdata%20Opt-In%20Downloads&amp;severity=high&amp;id=699f6df6b7ef31ef0b591838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11875-cwe-79-improper-neutralization-of-i-dae42a27</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hage%20Add%20infos%20to%20The%20Events%20Calendar&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10910-cwe-94-improper-control-of-generati-157e2849</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10910%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20g5theme%20Grid%20Plus%20%E2%80%93%20Unlimited%20grid%20layout&amp;severity=high&amp;id=699f6e03b7ef31ef0b5938f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11750-cwe-79-improper-neutralization-of-i-e2eab2ca</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onlyoffice%20ONLYOFFICE%20DocSpace&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11891-cwe-79-improper-neutralization-of-i-b6bec49b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaushik07%20Perfect%20Font%20Awesome%20Integration&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12406-cwe-89-improper-neutralization-of-s-dcca3999</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12406%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20owthub%20Library%20Management%20System&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11723-cwe-79-improper-neutralization-of-i-600bab35</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11723%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20insiderealestate%20kvCORE%20IDX&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11683-cwe-79-improper-neutralization-of-i-1ec5fdf5</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11683%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hanif-khan%20Newsletter%20Subscriptions&amp;severity=medium&amp;id=699f6e18b7ef31ef0b595241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12258-cwe-79-improper-neutralization-of-i-98dcf112</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shivtiwari%20WP%20Service%20Payment%20Form%20With%20Authorize.net&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12260-cwe-79-improper-neutralization-of-i-75304c46</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12260%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dipankarpal212%20Ultimate%20Endpoints%20With%20Rest%20Api&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12338-cwe-79-improper-neutralization-of-i-b645dde7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12338%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20websitetoolbox%20Website%20Toolbox%20Forum&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10111-cwe-287-improper-authentication-in--9318b2a2</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10111%3A%20CWE-287%20Improper%20Authentication%20in%20cyberlord92%20OAuth%20Single%20Sign%20On%20%E2%80%93%20SSO%20(OAuth%20Client)&amp;severity=high&amp;id=699f6decb7ef31ef0b590ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11901-cwe-79-improper-neutralization-of-i-d548af9b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberlord92%20PowerBI%20Embed%20Reports&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11417-cwe-352-cross-site-request-forgery--12e88c6a</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11417%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dejureorg%20dejure.org%20Vernetzungsfunktion&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11015-cwe-287-improper-authentication-in--864a7506</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11015%3A%20CWE-287%20Improper%20Authentication%20in%20tarecord%20Sign%20In%20With%20Google&amp;severity=critical&amp;id=699f6e04b7ef31ef0b593abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11443-cwe-862-missing-authorization-in-de-e14d94aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11443%3A%20CWE-862%20Missing%20Authorization%20in%20decollete%20de%3Abranding&amp;severity=high&amp;id=699f6e15b7ef31ef0b594e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11419-cwe-352-cross-site-request-forgery--3f8a43aa</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11419%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20get3code%20Password%20for%20WP&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12461-cwe-79-improper-neutralization-of-i-f67e01a3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zoan%20WP-Revive%20Adserver&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11433-cwe-79-improper-neutralization-of-i-85b096b3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20SalesAutopilot%20Shortcode&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11914-cwe-79-improper-neutralization-of-i-133d7af7</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shafayat-alam%20Gutenberg%20Blocks%20and%20Page%20Layouts%20%E2%80%93%20Attire%20Blocks&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11427-cwe-79-improper-neutralization-of-i-28e40c21</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maheshmaharjan%20Catch%20Popup&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11279-cwe-79-improper-neutralization-of-i-015743dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11279%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vberkel%20Schema%20App%20Structured%20Data&amp;severity=medium&amp;id=699f6e0bb7ef31ef0b5942ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11689-cwe-352-cross-site-request-forgery--c9e7d696</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11689%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20caagsoftware%20HQ%20Rental%20Software&amp;severity=high&amp;id=699f6e19b7ef31ef0b59525a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11413-cwe-79-improper-neutralization-of-i-d78c41dc</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11413%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hostfact%20HostFact%20bestelformulier%20integratie&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11430-cwe-89-improper-neutralization-of-s-b53a40c3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11430%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20elvinhaci%20SQL%20Chart%20Builder&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12341-cwe-862-missing-authorization-in-ma-b9cb61df</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12341%3A%20CWE-862%20Missing%20Authorization%20in%20mahendrapatidarmp%20Custom%20Skins%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11442-cwe-79-improper-neutralization-of-i-317b0336</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11442%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Horizontal%20scroll%20image%20slideshow&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31670-na-b8e1e0f4</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31670%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd5b7ef31ef0b58f074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55099-na-f01ff91d</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55099%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54842-na-d01e450d</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54842%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55add5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54811-na-631a9cc2</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54811%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55adce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54810-na-09a72a85</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54810%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55adcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-12-f12f16</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-12&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44299-an-attacker-may-be-able-to-cause-un-2422821e</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44299%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20arbitrary%20code%20execution%20in%20DCP%20firmware%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb82fe6bfc5ba1df6ed4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54466-an-encrypted-volume-may-be-accessed-2959285b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54466%3A%20An%20encrypted%20volume%20may%20be%20accessed%20by%20a%20different%20user%20without%20prompting%20for%20the%20password%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092eed35043901e82cb12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54489-running-a-mount-command-may-unexpec-2b9289fc</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54489%3A%20Running%20a%20mount%20command%20may%20unexpectedly%20execute%20arbitrary%20code%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef035043901e82cb20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54503-muting-a-call-while-ringing-may-not-09df9251</loc>
    <lastmod>2026-04-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54503%3A%20Muting%20a%20call%20while%20ringing%20may%20not%20result%20in%20mute%20being%20enabled%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69092ef235043901e82cb27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54515-a-malicious-app-may-be-able-to-gain-eafa07e3</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54515%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092ef435043901e82cb396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54493-privacy-indicators-for-microphone-a-0b437d6c</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54493%3A%20Privacy%20indicators%20for%20microphone%20access%20may%20be%20attributed%20incorrectly%20in%20Apple%20macOS&amp;severity=low&amp;id=69092ef235043901e82cb23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44201-processing-a-malicious-crafted-file-2f8a7431</loc>
    <lastmod>2026-04-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44201%3A%20Processing%20a%20malicious%20crafted%20file%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a3fe7723195e0fd262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54485-an-attacker-with-physical-access-to-ec3326e9</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54485%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20view%20notification%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092eef35043901e82cb1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54484-an-app-may-be-able-to-access-user-s-c8304747</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54484%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092eef35043901e82cb1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44200-an-app-may-be-able-to-read-sensitiv-c6be41c5</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44200%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82ce6bfc5ba1df6ea66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54492-an-attacker-in-a-privileged-network-aa98a080</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54492%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20alter%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69092ef035043901e82cb21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44241-an-attacker-may-be-able-to-cause-un-790c2819</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44241%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20arbitrary%20code%20execution%20in%20DCP%20firmware%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb82ee6bfc5ba1df6ed1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54514-an-app-may-be-able-to-break-out-of--3f737664</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54514%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092ef435043901e82cb38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54502-processing-maliciously-crafted-web--b75f3578</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54502%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=690916c8c28fd46ded7ccfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54471-a-malicious-application-may-be-able-1b453719</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54471%3A%20A%20malicious%20application%20may%20be%20able%20to%20leak%20a%20user&apos;s%20credentials%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb82fe6bfc5ba1df6ed70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54534-processing-maliciously-crafted-web--88fd2e1b</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54534%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=690916cac28fd46ded7ccfc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44220-parsing-a-maliciously-crafted-video-5f5fe120</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44220%3A%20Parsing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a3fe7723195e0fd29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54505-processing-maliciously-crafted-web--c294c936</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54505%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=medium&amp;id=69092ef235043901e82cb284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54513-an-app-may-be-able-to-access-sensit-cd9acef2</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54513%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092ef435043901e82cb37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44246-on-a-device-with-private-relay-enab-5f6e634b</loc>
    <lastmod>2026-04-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44246%3A%20On%20a%20device%20with%20Private%20Relay%20enabled%2C%20adding%20a%20website%20to%20the%20Safari%20Reading%20List%20may%20reveal%20the%20originating%20IP%20address%20to%20the%20website%20in%20Apple%20Safari&amp;severity=medium&amp;id=690929a7fe7723195e0fd564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54495-an-app-may-be-able-to-modify-protec-5130e995</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54495%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef235043901e82cb251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54529-an-app-may-be-able-to-execute-arbit-a94c28af</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54529%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092ef435043901e82cb3bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54476-an-app-may-be-able-to-access-user-s-01f06007</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54476%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092eef35043901e82cb1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54524-a-malicious-app-may-be-able-to-acce-494191f0</loc>
    <lastmod>2026-04-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54524%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef435043901e82cb39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54477-an-app-may-be-able-to-access-user-s-554d1959</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54477%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092eef35043901e82cb1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54498-an-app-may-be-able-to-break-out-of--ec7c16b4</loc>
    <lastmod>2026-04-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54498%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69092ef235043901e82cb257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54508-processing-maliciously-crafted-web--7b9b1c5a</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54508%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=high&amp;id=690916c8c28fd46ded7ccfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54528-an-app-may-be-able-to-overwrite-arb-bdf91a3c</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54528%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=high&amp;id=69092ef435043901e82cb3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54494-an-attacker-may-be-able-to-create-a-ba902b4f</loc>
    <lastmod>2026-04-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54494%3A%20An%20attacker%20may%20be%20able%20to%20create%20a%20read-only%20memory%20mapping%20that%20can%20be%20written%20to%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092ef235043901e82cb242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54504-an-app-may-be-able-to-access-user-s-60c2d6d8</loc>
    <lastmod>2026-04-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54504%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef235043901e82cb280</image:loc>
    </image:image>
  </url>
</urlset>